- Mar 27, 2018
-
-
Dmitriy Zaporozhets authored
Signed-off-by:
Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
- Mar 26, 2018
-
-
Dmitriy Zaporozhets authored
Signed-off-by:
Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
Dmitriy Zaporozhets authored
Signed-off-by:
Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
Dmitriy Zaporozhets authored
* Replace btn-save with btn-success * Add id to each section so it can be directly linked Signed-off-by:
Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
Dmitriy Zaporozhets authored
To make design consistent with project settings Next admin area application settings are afected by this commit: * Visibility and access control * Account and limit settings * Sign in * Sign up * Help page * Pages Signed-off-by:
Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
- Mar 21, 2018
-
-
Server Side Request Forgery in Services and Web Hooks See merge request gitlab/gitlabhq!2337
-
- Mar 07, 2018
-
-
Sean McGivern authored
-
- Mar 02, 2018
-
-
Sean McGivern authored
-
- Feb 28, 2018
-
-
Horatiu Eugen Vlad authored
-
- Feb 23, 2018
-
-
Nick Thomas authored
-
- Feb 21, 2018
-
-
Victor Wu authored
This reverts merge request !17257
-
Toon Claes authored
-
- Jan 31, 2018
-
-
Nick Thomas authored
-
- Jan 30, 2018
-
-
Matija Čupić authored
-
- Jan 22, 2018
-
-
Matija Čupić authored
-
- Jan 08, 2018
-
-
Michael Kozono authored
Originally branch 'mk-toggle-writing-to-auth-keys-1631' See merge request !2004 Squashed commits: Add authorized_keys_enabled to Application Settings Ensure default settings are exposed in UI Without this change, `authorized_keys_enabled` is unchecked when it is nil, even if it should be checked by default. Add “Speed up SSH operations” documentation Clarify the reasons for disabling writes Add "How to go back" section Tweak copy Update Application Setting screenshot
-
- Dec 08, 2017
-
-
Bob Van Landuyt authored
Moving the check out of the general requests, makes sure we don't have any slowdown in the regular requests. To keep the process performing this checks small, the check is still performed inside a unicorn. But that is called from a process running on the same server. Because the checks are now done outside normal request, we can have a simpler failure strategy: The check is now performed in the background every `circuitbreaker_check_interval`. Failures are logged in redis. The failures are reset when the check succeeds. Per check we will try `circuitbreaker_access_retries` times within `circuitbreaker_storage_timeout` seconds. When the number of failures exceeds `circuitbreaker_failure_count_threshold`, we will block access to the storage. After `failure_reset_time` of no checks, we will clear the stored failures. This could happen when the process that performs the checks is not running.
-
- Nov 29, 2017
-
-
Andrew Newdigate authored
-
- Nov 23, 2017
-
-
Pawel Chojnacki authored
-
Pawel Chojnacki authored
-
-
- Nov 17, 2017
-
-
- Oct 23, 2017
-
-
Bob Van Landuyt authored
-
- Oct 17, 2017
-
-
Bob Van Landuyt authored
-
- Sep 04, 2017
-
-
Zeger-Jan van de Weg authored
-
- Sep 01, 2017
-
-
Mike Bartlett authored
-
Tiago Botelho authored
-
- Aug 31, 2017
-
-
Zeger-Jan van de Weg authored
-
Zeger-Jan van de Weg authored
Behind an application setting, which defaults to false, this commit implements the implied CI/CD config. Which means that in the case we can't find the `.gitlab-ci.yml` on the commit we want to start a pipeline for, we fall back to an implied configuration. For now the Bash template has been copied to `Auto-Devops.gitlab-ci.yml` so the tests actually work. Fixes #34777
-
- Aug 30, 2017
-
-
Nick Thomas authored
`allowed_key_types` is removed and the `minimum_<type>_bits` fields are renamed to `<tech>_key_restriction`. A special sentinel value (`-1`) signifies that the key type is disabled. This also feeds through to the UI - checkboxes per key type are out, inline selection of "forbidden" and "allowed" (i.e., no restrictions) are in. As with the previous model, unknown key types are disallowed, even if the underlying ssh daemon happens to support them. The defaults have also been changed from the lowest known bit size to "no restriction". So if someone does happen to have a 768-bit RSA key, it will continue to work on upgrade, at least until the administrator restricts them.
-
Nick Thomas authored
This is an amalgamation of: * Cory Hinshaw: Initial implementation !5552 * Rémy Coutable: Updates !9350 * Nick Thomas: Resolve conflicts and add ED25519 support !13712
-
- Aug 26, 2017
-
-
Mike Greiling authored
rename .project-visibility-level-holder to .visibility-level-setting and move from projects.scss to settings.scss
-
- Aug 22, 2017
-
-
Gabriel Mazetto authored
-
Gabriel Mazetto authored
-
- Aug 21, 2017
-
-
Sean McGivern authored
This gem allows Sidekiq jobs to be throttled. Unfortunately, it has a side-effect: when we haven't enabled job throttling, it will still hit Redis a lot (and miss, because nothing is configured). As this setting already required a restart, ensure that the library is only required when it's enabled.
-
- Aug 11, 2017
-
-
Robin Bobbitt authored
-
- Aug 02, 2017
-
-
Pawel Chojnacki authored
-
- Jul 20, 2017
-
-
Pawel Chojnacki authored
- Change the wording a little bit
-
- Jul 13, 2017
-
-
Robin Bobbitt authored
When sign-in is disabled: - skip password expiration checks - prevent password reset requests - don’t show Password tab in User Settings - don’t allow login with username/password for Git over HTTP requests - render 404 on requests to Profiles::PasswordsController
-
- Jul 12, 2017
-
-
Phil Hughes authored
`breadcrumb_title` is then overriden when needed
-