- Nov 25, 2019
-
-
Arturo Herrero authored
We had concerns about the cached values on Redis with the previous two releases strategy: First release (this commit): - Create new encrypted fields in the database. - Start populating new encrypted fields, read the encrypted fields or fallback to the plaintext fields. - Backfill the data removing the plaintext fields to the encrypted fields. Second release: - Remove the virtual attribute (created in step 2). - Drop plaintext columns from the database (empty columns after step 3). We end up with a better strategy only using migration scripts in one release: - Pre-deployment migration: Add columns required for storing encrypted values. - Pre-deployment migration: Store the encrypted values in the new columns. - Post-deployment migration: Remove the old unencrypted columns
-
- Nov 21, 2019
-
-
Arturo Herrero authored
This is the plan to encrypt the plaintext tokens: First release (this commit): 1. Create new encrypted fields in the database. 2. Start populating new encrypted fields, read the encrypted fields or fallback to the plaintext fields. 3. Backfill the data removing the plaintext fields to the encrypted fields. Second release: 4. Remove the virtual attribute (created in step 2). 5. Drop plaintext columns from the database (empty columns after step 3).
-
- Nov 19, 2019
-
-
GitLab Bot authored
-
- Oct 22, 2019
-
-
GitLab Bot authored
-
- Sep 13, 2019
-
-
GitLab Bot authored
-
- Sep 10, 2019
-
-
Signed-off-by:
Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
Ahmad Sherif authored
It consists of two parts: 1. Redirecting users to the configured external storage 1. Allowing the external storage to request the static object(s) on behalf of the user by means of specific tokens Part of https://gitlab.com/gitlab-com/gl-infra/infrastructure/issues/6829
-
- Aug 30, 2019
-
-
Stan Hu authored
This is to accomodate prepended modules.
-
- Aug 29, 2019
-
-
dineshpanda authored
-
- Aug 24, 2019
-
-
Brett Walker authored
User images and videos will get proxied through the Camo server in order to keep malicious sites from collecting the IP address of users.
-
- Aug 14, 2019
-
-
This introduces several changes, but these are all just ported from the EE project.
-
- Aug 07, 2019
-
-
Reuben Pereira authored
- This will make it easy to identify the project even if admins change the name of the project or move it.
-
- Jul 31, 2019
-
-
mksionek authored
Add method to store session ids by ip Add new specs for storing session ids Add cleaning up records after login Add retrieving anonymous sessions Add login recaptcha setting Add new setting to sessions controller Add conditions for showing captcha Add sessions controller specs Add admin settings specs for login protection Add new settings to api Add stub to devise spec Add new translation key Add cr remarks Rename class call Add cr remarks Change if-clause for consistency Add cr remarks Add code review remarks Refactor AnonymousSession class Add changelog entry Move AnonymousSession class to lib Move store unauthenticated sessions to sessions controller Move link to recaptcha info Regenerate text file Improve copy on the spam page Change action filter for storing anonymous sessions Fix rubocop offences Add code review remarks
-
- The most common use case for qualified_domain_validator currently is to allow blank ([]) but not allow nil. Modify the qualified_domain_validator to support this use case.
-
- Jul 24, 2019
-
-
Signed-off-by:
Istvan szalai <istvan.szalai@savoirfairelinux.com>
-
- Jul 02, 2019
-
-
Stan Hu authored
Loading `ApplicationSetting` from Redis was responsible for at least 50% of the CPU load of the Redis cluster on GitLab.com. Since these values generally don't change very much, we can load this from the database and cache it in memory, skipping Redis altogther. We use `ActiveSupport::Cache::MemoryStore` as a drop-in replacement for `RedisCacheStore` even though we probably don't need synchronized access within `Thread.current`. Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/63977
-
- Jun 28, 2019
-
-
Zeger-Jan van de Weg authored
The circuit breaker itself got removed a while ago, when that happened some parts got left behind. Using grep old stale settings and validations were found and are now removed.
-
- Jun 25, 2019
-
-
Roger Meier authored
-
- May 28, 2019
-
-
vshushlin authored
Storing this key in secrets.yml was a bad idea, it would require users using HA setups to manually replicate secrets across nodes during update, it also needed support from omnibus package * Revert "Generate Let's Encrypt private key" This reverts commit 444959bf. * Add Let's Encrypt private key to settings as encrypted attribute * Generate Let's Encrypt private key in database migration
-
- Apr 27, 2019
-
-
vshushlin authored
Store Let's Encrypt account email in application settings Also add explicit terms of service consent
-
- Apr 12, 2019
-
-
- Update PO file
-
- Apr 11, 2019
-
-
Renamed UrlValidator to AddressableUrlValidator to avoid 'url:' naming collision with ActiveModel::Validations::UrlValidator in 'validates' statement. Make use of the options attribute of the parent class ActiveModel::EachValidator. Add more options: allow_nil, allow_blank, message. Renamed 'protocols' option to 'schemes' to match the option naming from UrlValidator.
-
- Apr 10, 2019
-
-
Rémy Coutable authored
It could happen that there's a cached (in Redis) ApplicationSetting record, and calling `Gitlab::CurrentSettings.current_application_settings` only returns it instead of creating a new DB record, which makes the `ApplicationSetting.current_without_cache.update!` call fail. Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- Apr 09, 2019
-
-
Move Contribution Analytics related spec in spec/features/groups/group_page_with_external_authorization_service_spec to EE
-
- Apr 05, 2019
-
-
Andreas Brandl authored
This reverts merge request !26823
-
Move Contribution Analytics related spec in spec/features/groups/group_page_with_external_authorization_service_spec to EE
-
- Apr 04, 2019
-
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- Mar 28, 2019
-
-
Nick Thomas authored
-
- Mar 19, 2019
-
-
Lin Jen-Shin authored
-
Lin Jen-Shin authored
So the fake can enjoy it, too. We don't use `prepend` because that'll require we change `allow_any_instance_of` to `expect_next_instance_of`, but that's not very easy to do. We can do that later.
-
- Mar 18, 2019
-
-
Kamil Trzcińśki authored
-
- Mar 06, 2019
-
-
This makes code to support encrypted runner tokens. This code also finished previously started encryption process.
-
- Mar 05, 2019
-
-
Horatiu Eugen Vlad authored
Renamed EmailValidator to DeviseEmailValidator to avoid 'email:' naming collision with ActiveModel::Validations::EmailValidator in 'validates' statement. Make use of the options attribute of the parent class ActiveModel::EachValidator. Add more options: regex.
-
- Feb 06, 2019
-
-
Jan Provaznik authored
Cached markdown version is composed both from global and local markdown version. This allows admins to bump version locally when needed (e.g. when external URL is changed).
-
Fabian Schneider authored
-
Fabian Schneider authored
-
- Dec 19, 2018
-
-
Lin Jen-Shin authored
-
Rémy Coutable authored
This replaces the use of fake_application_settings with `::ApplicationSetting.build`_from_defaults. The reason is that `fake_application_settings` doesn't have the custom accessors that `ApplicationSetting` has, e.g. `#commit_email_hostname`, thus this can lead to unexpected `nil` values which comes from the database column instead of `.default_commit_email_hostname` returned by `ApplicationSetting#commit_email_hostname`. Using `::ApplicationSetting.build_from_defaults` should be safe as it doesn't try to `INSERT` a DB record, in contrary to `::ApplicationSetting.create_from_defaults` which we used to use, and which created issues that the introduction of `fake_application_settings` tried to resolve (575dced5). Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- Nov 29, 2018
-
-
Alexis Reigel authored
-
- Nov 15, 2018
-
-
Grzegorz Bizon authored
-