- Feb 13, 2018
-
-
Dylan Griffith authored
-
- Jan 17, 2018
-
-
Robert Speicher authored
[10.3] Fix XSS vulnerability in Pipeline job trace See merge request gitlab/gitlabhq!2258 (cherry picked from commit 44caa80ed9a2514a74a5eeab10ff51849d64851b) 5f86f3ff Fix XSS vulnerability in Pipeline job trace
-
- Jan 08, 2018
-
-
Fix environment scope regex See merge request gitlab-org/gitlab-ee!3641
-
- Nov 16, 2017
-
-
Grzegorz Bizon authored
We should allow to use double underscore in the path, and it seems that our container repository path regexp was outdated. See https://github.com/docker/distribution/blob/master/reference/regexp.go
-
- Oct 05, 2017
-
-
Alessio Caiazza authored
-
- Sep 18, 2017
-
-
Lin Jen-Shin authored
-
Lin Jen-Shin authored
-
- Aug 22, 2017
-
-
Shinya Maeda authored
-
- Jul 19, 2017
-
-
Grzegorz Bizon authored
-
Grzegorz Bizon authored
-
- Jul 06, 2017
-
- Jul 05, 2017
-
-
Tiago Botelho authored
-
Tiago Botelho authored
-
- Jun 21, 2017
-
-
- May 24, 2017
-
-
Douwe Maan authored
This reverts commit b0498c17
-
Douwe Maan authored
-
Douwe Maan authored
-
- May 02, 2017
-
-
Bob Van Landuyt :neckbeard: authored
-
- Apr 20, 2017
-
-
- Apr 03, 2017
-
-
Grzegorz Bizon authored
This regexp is extracted from Docker Distribution 2.4.1 docs, contains additional `/` element that can be a separator of components.
-
- Feb 23, 2017
-
-
Douwe Maan authored
-
- Feb 13, 2017
-
-
Dmitriy Zaporozhets authored
Signed-off-by:
Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
- Jan 15, 2017
-
-
blackst0ne authored
-
- Dec 15, 2016
-
-
Nick Thomas authored
-
- Dec 14, 2016
-
-
Nick Thomas authored
-
- Dec 13, 2016
-
-
winniehell authored
-
- Nov 23, 2016
-
-
Dmitriy Zaporozhets authored
Signed-off-by:
Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
- Nov 21, 2016
-
-
Dmitriy Zaporozhets authored
Signed-off-by:
Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
- Nov 18, 2016
-
-
Timothy Andrew authored
Javascript does not support the negative lookbehind assertion (?<!) used in the Ruby regex (to disallow usernames ending in `.git` or `.atom`. Getting the client side code to fully support this format is non-trivial, since we'd either have to heavily complicate the regex used, or modify the frontend code to support more complex validation schemes (it currently uses HTML5 validations). The pragmatic choice is to create a `Gitlab::Regex::NAMESPACE_REGEX_STR_SIMPLE` regex to serve as a Javascript-compatible version of `NAMESPACE_REGEX_STR`. The client-side code will not display an error for usernames ending in `.git` and `.atom`, but these will be caught by the server-side validation.
-
- Nov 12, 2016
-
-
Vincent Composieux authored
Added ability to put emojis into repository name
-
- Nov 07, 2016
-
-
Dmitriy Zaporozhets authored
Signed-off-by:
Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
- Oct 07, 2016
-
-
Will Starms authored
Adds .git and .atom to the master namespace regex Updates existing group tests and adds two new ones Updates path cleaning to also forbid .atom
-
- Sep 20, 2016
-
-
Robert Speicher authored
-
- Sep 19, 2016
-
-
Kamil Trzcińśki authored
Squashed commits: [f9a9315] Use : to test invalid environment name
-
Kamil Trzcińśki authored
-
Kamil Trzcińśki authored
Environments that can have a URL with predefined CI variables.
-
- Jul 01, 2016
-
-
Grzegorz Bizon authored
-
- Jun 16, 2016
-
-
James Lopez authored
This reverts commit 13e37a3e.
-
James Lopez authored
-
- Jun 14, 2016
-
-
Kamil Trzcińśki authored
-