- Mar 28, 2018
-
-
Jacob Vosmaer (GitLab) authored
-
- Mar 05, 2018
-
-
- Feb 28, 2018
-
-
Horatiu Eugen Vlad authored
-
- Feb 25, 2018
-
-
Michael Kozono authored
-
- Feb 22, 2018
-
-
- Feb 07, 2018
-
-
Nick Thomas authored
-
- Feb 06, 2018
-
-
Tiago Botelho authored
-
Tiago Botelho authored
-
Tiago Botelho authored
-
- Dec 22, 2017
-
-
blackst0ne authored
-
- Dec 08, 2017
-
-
- Nov 23, 2017
-
-
- Oct 20, 2017
-
-
Jacopo authored
-
- Aug 02, 2017
-
-
Robert Speicher authored
-
- Aug 01, 2017
-
-
Gabriel Mazetto authored
-
- Jul 27, 2017
-
-
Rémy Coutable authored
Remove superfluous lib: true, type: redis, service: true, models: true, services: true, no_db: true, api: true Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- Jul 13, 2017
-
-
Robin Bobbitt authored
When sign-in is disabled: - skip password expiration checks - prevent password reset requests - don’t show Password tab in User Settings - don’t allow login with username/password for Git over HTTP requests - render 404 on requests to Profiles::PasswordsController
-
- Jul 11, 2017
-
-
- Jun 21, 2017
-
-
Grzegorz Bizon authored
-
- Jun 16, 2017
-
-
Michael Kozono authored
This test and its context exist only to ensure this behavior is fixed: https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/11259#note_29262426
-
Michael Kozono authored
-
- Jun 14, 2017
-
-
Robert Speicher authored
-
- Jun 08, 2017
-
-
Robin Bobbitt authored
If internal auth is disabled and LDAP is not configured on the instance, present the user with a message to create a personal access token if his Git over HTTP auth attempt fails.
-
- Jun 07, 2017
-
-
Douwe Maan authored
-
- Jun 05, 2017
-
-
Michael Kozono authored
And refactor to self-document a little better.
-
Michael Kozono authored
-
Michael Kozono authored
* The spec has 7 failures at this point * Specify rendered error messages * Render the GitAccess message rather than “Access denied” * Render the Not Found message provided by GitAccess, instead of a custom one * Expect GitAccess to check the config for whether Git-over-HTTP pull or push is disabled, rather than doing it in the controller * Add more thorough testing for authentication * Dried up a lot of tests * Fixed some broken tests
-
- Apr 17, 2017
-
-
Sean McGivern authored
-
- Apr 14, 2017
-
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
Sean McGivern authored
-
James Lopez authored
It uses a user activity table instead of a column in users. Tested with mySQL and postgreSQL
-
- Apr 13, 2017
-
-
Timothy Andrew authored
- We currently support fetching code with username = 'oauth2' and password = <access_token>. - Trying to _push_ code with the same credentials fails with an authentication error. - There's no reason this shouldn't be enabled, especially since we allow the OAuth client to create deploy keys with push access: https://docs.gitlab.com/ce/api/deploy_keys.html#add-deploy-key
-
- Mar 07, 2017
-
-
Markus Koller authored
Gitlab::Auth.find_with_user_password is currently used in these places: - resource_owner_from_credentials in config/initializers/doorkeeper.rb, which is used for the OAuth Resource Owner Password Credentials flow - the /session API call in lib/api/session.rb, which is used to reveal the user's current authentication_token In both cases users should only be authenticated if they're in the active state.
-
- Feb 23, 2017
-
-
Douwe Maan authored
This reverts commit cb10b725c8929b8b4460f89c9d96c773af39ba6b.
-
Douwe Maan authored
-
- Feb 05, 2017
-
- Jan 26, 2017
-
-
Robert Speicher authored
-
- Jan 25, 2017
-
-
Douglas Barbosa Alexandre authored
-
- Dec 16, 2016
-
-
Timothy Andrew authored
- This module is used for git-over-http, as well as JWT. - The only valid scope here is `api`, currently.
-