Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2018-04-07Use proper auth_scope for deploy tokenKamil Trzciński
2018-04-07Increase test suite around deploy tokens behaviorMayra Cabrera
Also, fixes broken specs
2018-04-07Fixes broken schema and minor changesMayra Cabrera
2018-04-07Include ProjectDeployTokensMayra Cabrera
Also: - Changes scopes from serializer to use boolean columns - Fixes broken specs
2018-04-07Support Deploy Tokens properly without hacking abilitiesKamil Trzciński
2018-04-07Addreses backend review suggestionsMayra Cabrera
- Remove extra method for authorize_admin_project - Ensure project presence - Rename 'read_repo' to 'read_repository' to be more verbose
2018-04-07Removes logic from Jwt and handle different scenarios on Gitlab::AuthMayra Cabrera
- When using 'read_repo' password and project are sent, so we used both of them to fetch for the token - When using 'read_registry' only the password is sent, so we only use that for fetching the token
2018-04-07Implement read_registry for DeployTokensMayra Cabrera
2018-04-07Implement 'read_repo' for DeployTokensMayra Cabrera
This will allow to download a repo using the token from the DeployToken
2018-03-27Fix LDAP login without user in DBHoratiu Eugen Vlad
2018-02-28Moved o_auth/saml/ldap modules under gitlab/authHoratiu Eugen Vlad
2018-01-17Merge branch 'sh-migrate-can-push-to-deploy-keys-projects-10-3' into ↵Douwe Maan
'security-10-3' [10.3] Migrate `can_push` column from `keys` to `deploy_keys_project` See merge request gitlab/gitlabhq!2276 (cherry picked from commit f6ca52d31bac350a23938e0aebf717c767b4710c) 1f2bd3c0 Backport to 10.3
2017-11-24Merge branch 'dm-fix-registry-with-sudo-token' into 'master'Sean McGivern
Fix pulling and pushing using a personal access token with the sudo scope Closes #40466 See merge request gitlab-org/gitlab-ce!15571
2017-11-23Fix pulling and pushing using a personal access token with the sudo scopeDouwe Maan
2017-11-23Allow password authentication to be disabled entirelyMarkus Koller
2017-11-08Fix Error 500 when pushing LFS objects with a write deploy keyStan Hu
2017-11-02Add sudo API scopeDouwe Maan
2017-11-02Consistently use PersonalAccessToken instead of PersonalTokenDouwe Maan
2017-09-18Clean up read_registry scope changesRobin Bobbitt
Closes #37789
2017-09-12Merge branch 'hide-read-registry-scope-when-registry-disabled' into 'master'Kamil Trzciński
Hide read_registry scope when registry is disabled on instance See merge request !13314
2017-09-01Rollsback changes made to signing_enabled.Tiago Botelho
2017-08-22Hide read_registry scope when registry is disabled on instanceRobin Bobbitt
2017-08-07Merge remote-tracking branch 'upstream/master' into add-star-for-action-scopeLin Jen-Shin
* upstream/master: (184 commits) Fix issues with pdf-js dependencies fix missing changelog entries for security release on 2017-01-23 Update top bar issues icon Fix pipeline icon in contextual nav for projects Since mysql is not a priority anymore, test it less Fix order of CI lint ace editor loading Add container registry and spam logs icons Fix different Markdown styles Backport to CE for: Make new dropdown dividers full width Fix spec Fix spec Fix spec Bump GITLAB_SHELL_VERSION and GITALY_VERSION to support unhiding refs Add changelog Install yarn via apt in update guides Use long curl options fix Add a spec for concurrent process Remove monkey-patched Array.prototype.first() and last() methods ...
2017-08-03Change all `:empty_project` to `:project`Robert Speicher
2017-08-02Cleanup tests and add admin_container_image toLin Jen-Shin
full_authentication_abilities. This is fine because we're going to check with can?(..) anyway
2017-07-27Remove superfluous lib: true, type: redis, service: true, models: true, ↵Rémy Coutable
services: true, no_db: true, api: true Signed-off-by: Rémy Coutable <remy@rymai.me>
2017-07-13Fixes needed when GitLab sign-in is not enabledRobin Bobbitt
When sign-in is disabled: - skip password expiration checks - prevent password reset requests - don’t show Password tab in User Settings - don’t allow login with username/password for Git over HTTP requests - render 404 on requests to Profiles::PasswordsController
2017-06-08Instruct user to use a personal access token for Git over HTTPRobin Bobbitt
If internal auth is disabled and LDAP is not configured on the instance, present the user with a message to create a personal access token if his Git over HTTP auth attempt fails.
2017-06-06Fix test failuresZ.J. van de Weg
2017-06-05Create read_registry scope with JWT authZ.J. van de Weg
This is the first commit doing mainly 3 things: 1. create a new scope and allow users to use it 2. Have the JWTController respond correctly on this 3. Updates documentation to suggest usage of PATs There is one gotcha, there will be no support for impersonation tokens, as this seems not needed. Fixes gitlab-org/gitlab-ce#19219
2017-05-10Enable the Style/TrailingCommaInArguments copRémy Coutable
Use the EnforcedStyleForMultiline: no_comma option. Signed-off-by: Rémy Coutable <remy@rymai.me>
2017-04-13Allow OAuth clients to push codeTimothy Andrew
- We currently support fetching code with username = 'oauth2' and password = <access_token>. - Trying to _push_ code with the same credentials fails with an authentication error. - There's no reason this shouldn't be enabled, especially since we allow the OAuth client to create deploy keys with push access: https://docs.gitlab.com/ce/api/deploy_keys.html#add-deploy-key
2017-03-07Merge branch 'siemens/gitlab-ce-feature/openid-connect'Sean McGivern
2017-03-07Merge remote-tracking branch ↵Douwe Maan
'origin/personal_access_token_api_and_impersonation_token'
2017-03-07Only use API scopes for personal access tokensMarkus Koller
2017-03-07Don't allow blocked users to authenticate through other meansMarkus Koller
Gitlab::Auth.find_with_user_password is currently used in these places: - resource_owner_from_credentials in config/initializers/doorkeeper.rb, which is used for the OAuth Resource Owner Password Credentials flow - the /session API call in lib/api/session.rb, which is used to reveal the user's current authentication_token In both cases users should only be authenticated if they're in the active state.
2017-03-06apply codestyle and implementation changes to the respective feature codeTiago Botelho
2017-03-06Remove unecessary calls to limit_user!, UniqueIps Middleware, and address MR ↵Pawel Chojnacki
review - cleanup formating in haml - clarify time window is in seconds - cleanup straneous chunks in db/schema - rename count_uniqe_ips to update_and_return_ips_count - other
2017-03-06Cleanup RSpec testsPawel Chojnacki
2017-03-06Test various login scenarios if the limit gets enforcedPawel Chojnacki
2017-03-01refactors finder and correlated codeTiago Botelho
2017-03-01add impersonation tokenSimon Vocella
2017-01-30Reduce hits to LDAP on Git HTTP auth by reordering auth mechanismsDrew Blessing
We accept half a dozen different authentication mechanisms for Git over HTTP. Fairly high in the list we were checking user password, which would also query LDAP. In the case of LFS, OAuth tokens or personal access tokens, we were unnecessarily hitting LDAP when the authentication will not succeed. This was causing some LDAP/AD systems to lock the account. Now, user password authentication is the last mechanism tried since it's the most expensive.
2016-12-16View-related (and other minor) changes to !5951 based on @rymai's review.Timothy Andrew
- The `scopes_form` partial can be used in the `admin/applications` view as well - Don't allow partials to access instance variables directly. Instead, pass in the instance variables as local variables, and use `local_assigns.fetch` to assert that the variables are passed in as expected. - Change a few instances of `render :partial` to `render` - Remove an instance of `required: false` in a view, since this is the default - Inline many instances of a local variable (`ip = 'ip'`) in `auth_spec`
2016-12-16Validate access token scopes in `Gitlab::Auth`Timothy Andrew
- This module is used for git-over-http, as well as JWT. - The only valid scope here is `api`, currently.
2016-09-28Handle LFS token creation and retrieval in the same method, and in the same ↵Patricio Cano
Redis connection. Reset expiry time of token, if token is retrieved again before it expires.
2016-09-19Fix test failureKamil Trzcinski
2016-09-19Revert "Revert all changes introduced by ↵Kamil Trzcinski
https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/6043" This reverts commit 6d43c95b7011ec7ec4600e00bdc8df76bb39813c.
2016-09-19Revert all changes introduced by ↵Kamil Trzcinski
https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/6043
2016-09-19Fix spec failuresKamil Trzcinski