Skip to content
Snippets Groups Projects
  1. Mar 23, 2020
  2. Mar 18, 2020
  3. Mar 13, 2020
  4. Mar 12, 2020
  5. Mar 10, 2020
  6. Mar 01, 2020
  7. Feb 27, 2020
  8. Feb 19, 2020
  9. Feb 14, 2020
  10. Feb 13, 2020
  11. Feb 05, 2020
  12. Jan 13, 2020
  13. Jan 11, 2020
  14. Dec 22, 2019
  15. Dec 20, 2019
  16. Dec 17, 2019
  17. Dec 11, 2019
  18. Dec 10, 2019
  19. Dec 05, 2019
  20. Nov 26, 2019
  21. Nov 07, 2019
  22. Nov 04, 2019
  23. Nov 01, 2019
  24. Oct 16, 2019
  25. Oct 08, 2019
  26. Oct 07, 2019
  27. Oct 04, 2019
  28. Sep 13, 2019
  29. Sep 06, 2019
    • Krasimir Angelov's avatar
      Add skeleton Pages internal API · 477ba2b3
      Krasimir Angelov authored
      Basic `/internal/pages` endpoint that will be used for Pages virtual
      domains internal API. The endpoint is currently behind feature flag and
      provides authetication similar to how Workhorse is authenticating with
      the GitLab.
      477ba2b3
  30. Aug 29, 2019
    • Patrick Bajao's avatar
      Set default authorized_keys_file · 95ffd22f
      Patrick Bajao authored
      This is the same as gitlab-shell's default. This is to ensure
      that it's always set.
      
      It needs to be the same as gitlab-shell's default because we
      don't set a default value in omnibus-gitlab. If users don't
      set the value of that config in their install and they upgraded,
      we must ensure that it's still going to point to the same
      authorized keys file.
      95ffd22f
  31. Aug 27, 2019
  32. Aug 20, 2019
    • Diego Louzán's avatar
      feat: SMIME signed notification emails · 0dcb9d21
      Diego Louzán authored
      - Add mail interceptor the signs outgoing email with SMIME
      - Add lib and helpers to work with SMIME data
      - New configuration params for setting up SMIME key and cert files
      0dcb9d21
  33. Aug 07, 2019
    • Stan Hu's avatar
      Add support for Content-Security-Policy · 5fbbd3dd
      Stan Hu authored and Ash McKenzie's avatar Ash McKenzie committed
      A nonce-based Content-Security-Policy thwarts XSS attacks by allowing
      inline JavaScript to execute if the script nonce matches the header
      value. Rails 5.2 supports nonce-based Content-Security-Policy headers,
      so provide configuration to enable this and make it work.
      
      To support this, we need to change all `:javascript` HAML filters to the
      following form:
      
      ```
      = javascript_tag nonce: true do
        :plain
          ...
      ```
      
      We use `%script` throughout our HAML to store JSON and other text, but
      since this doesn't execute, browsers don't appear to block this content
      from being used and require the nonce value to be present.
      Unverified
      5fbbd3dd
  34. Aug 01, 2019
  35. Jul 24, 2019
  36. Jul 22, 2019
  37. Jul 10, 2019
Loading