Skip to content
Snippets Groups Projects
  1. Feb 20, 2020
  2. Jan 28, 2020
  3. Jan 27, 2020
  4. Jan 13, 2020
  5. Dec 20, 2019
  6. Dec 16, 2019
  7. Dec 11, 2019
  8. Dec 02, 2019
  9. Dec 01, 2019
  10. Nov 26, 2019
    • Arturo Herrero's avatar
      Encrypt application settings with pre and post deployments · aaae14c0
      Arturo Herrero authored and Alessio Caiazza's avatar Alessio Caiazza committed
      We had concerns about the cached values on Redis with the previous two
      releases strategy:
      
      First release (this commit):
        - Create new encrypted fields in the database.
        - Start populating new encrypted fields, read the encrypted fields or
          fallback to the plaintext fields.
        - Backfill the data removing the plaintext fields to the encrypted
          fields.
      Second release:
        - Remove the virtual attribute (created in step 2).
        - Drop plaintext columns from the database (empty columns after
          step 3).
      
      We end up with a better strategy only using migration scripts in one
      release:
        - Pre-deployment migration: Add columns required for storing encrypted
          values.
        - Pre-deployment migration: Store the encrypted values in the new
          columns.
        - Post-deployment migration: Remove the old unencrypted columns
      aaae14c0
    • Arturo Herrero's avatar
      Encrypt application setting tokens · 9183bf94
      Arturo Herrero authored and Alessio Caiazza's avatar Alessio Caiazza committed
      This is the plan to encrypt the plaintext tokens:
      
      First release (this commit):
        1. Create new encrypted fields in the database.
        2. Start populating new encrypted fields, read the encrypted fields or
           fallback to the plaintext fields.
        3. Backfill the data removing the plaintext fields to the encrypted fields.
      
      Second release:
        4. Remove the virtual attribute (created in step 2).
        5. Drop plaintext columns from the database (empty columns after step 3).
      9183bf94
  11. Nov 15, 2019
  12. Nov 13, 2019
  13. Nov 12, 2019
  14. Nov 08, 2019
  15. Nov 04, 2019
  16. Oct 31, 2019
  17. Oct 22, 2019
  18. Oct 17, 2019
  19. Oct 16, 2019
  20. Sep 26, 2019
  21. Sep 13, 2019
  22. Sep 10, 2019
  23. Aug 30, 2019
  24. Aug 29, 2019
  25. Aug 24, 2019
  26. Aug 14, 2019
  27. Aug 07, 2019
  28. Jul 31, 2019
    • mksionek's avatar
      Add captcha if there are multiple failed login attempts · dfcf4cf5
      mksionek authored
      Add method to store session ids by ip
      
      Add new specs for storing session ids
      
      Add cleaning up records after login
      
      Add retrieving anonymous sessions
      
      Add login recaptcha setting
      
      Add new setting to sessions controller
      
      Add conditions for showing captcha
      
      Add sessions controller specs
      
      Add admin settings specs for login protection
      
      Add new settings to api
      
      Add stub to devise spec
      
      Add new translation key
      
      Add cr remarks
      
      Rename class call
      
      Add cr remarks
      
      Change if-clause for consistency
      
      Add cr remarks
      
      Add code review remarks
      
      Refactor AnonymousSession class
      
      Add changelog entry
      
      Move AnonymousSession class to lib
      
      Move store unauthenticated sessions to sessions controller
      
      Move link to recaptcha info
      
      Regenerate text file
      
      Improve copy on the spam page
      
      Change action filter for storing anonymous sessions
      
      Fix rubocop offences
      
      Add code review remarks
      dfcf4cf5
    • Reuben Pereira's avatar
      Allow blank but not nil in validations · 5c7f2853
      Reuben Pereira authored and James Lopez's avatar James Lopez committed
      - The most common use case for qualified_domain_validator currently is
      to allow blank ([]) but not allow nil. Modify the
      qualified_domain_validator to support this use case.
      5c7f2853
  29. Jul 24, 2019
  30. Jul 02, 2019
    • Stan Hu's avatar
      Add a memory cache local to the thread to reduce Redis load · 978647c6
      Stan Hu authored
      Loading `ApplicationSetting` from Redis was responsible for at least 50%
      of the CPU load of the Redis cluster on GitLab.com. Since these values
      generally don't change very much, we can load this from the database and
      cache it in memory, skipping Redis altogther. We use
      `ActiveSupport::Cache::MemoryStore` as a drop-in replacement for
      `RedisCacheStore` even though we probably don't need synchronized access
      within `Thread.current`.
      
      Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/63977
      978647c6
  31. Jun 28, 2019
  32. Jun 25, 2019
  33. May 28, 2019
    • vshushlin's avatar
      Store Let's Encrypt private key in settings · 4687ff7c
      vshushlin authored
      Storing this key in secrets.yml was a bad idea,
      it would require users using HA setups to manually
      replicate secrets across nodes during update,
      it also needed support from omnibus package
      
      * Revert "Generate Let's Encrypt private key"
        This reverts commit 444959bf.
      
      * Add Let's Encrypt private key to settings
        as encrypted attribute
      
      * Generate Let's Encrypt private key
        in database migration
      4687ff7c
  34. Apr 27, 2019
  35. Apr 12, 2019
  36. Apr 11, 2019
    • Thong Kuah's avatar
      Align UrlValidator to validate_url gem implementation. · d119d3d1
      Thong Kuah authored and James Lopez's avatar James Lopez committed
      Renamed UrlValidator to AddressableUrlValidator to avoid 'url:' naming collision with ActiveModel::Validations::UrlValidator in 'validates' statement.
      Make use of the options attribute of the parent class ActiveModel::EachValidator.
      Add more options: allow_nil, allow_blank, message.
      Renamed 'protocols' option to 'schemes' to match the option naming from UrlValidator.
      d119d3d1
Loading