Skip to content
Snippets Groups Projects
  1. Jan 30, 2020
  2. Jan 28, 2020
  3. Jan 13, 2020
  4. Jan 10, 2020
  5. Jan 02, 2020
  6. Dec 31, 2019
  7. Dec 16, 2019
  8. Dec 03, 2019
  9. Nov 27, 2019
  10. Nov 26, 2019
  11. Nov 25, 2019
  12. Nov 22, 2019
  13. Nov 21, 2019
  14. Nov 20, 2019
  15. Nov 19, 2019
  16. Nov 04, 2019
  17. Oct 28, 2019
  18. Oct 25, 2019
  19. Oct 24, 2019
    • Ryan Cobb's avatar
      Mask Sentry auth token · 5c072495
      Ryan Cobb authored
      This makes it so we mask Sentry's auth token. This mask only occurs in
      the UI.
      5c072495
    • Eugenia Grieff's avatar
      Add milestone and label note types to cross refs · 3c60e336
      Eugenia Grieff authored
      - Include new types in SystemNoteMetadata
      - Add Label and Milestone reference_pattern to
      Mentionable::ReferenceRegexes to be checked for cross references
      3c60e336
    • Aakriti Gupta's avatar
      Pick only those groups that the viewing user has access to, · 9347f47a
      Aakriti Gupta authored and mksionek's avatar mksionek committed
      in a project members' list. Add tests for possible scenarios
      
      Re-factor and remove N + 1 queries
      
      Remove author from changelog
      
      Don't use memoisation when not needed
      
      Include users part of parents of project's group
      
      Re-factor tests
      
      Create and add users according to roles
      
      Re-use group created earlier
      
      Add incomplete test for ancestoral groups
      
      Rename method to clarify category of groups
      
      Skip pending test, remove comments not needed
      
      Remove extra line
      
      Include ancestors from invited groups as well
      
      Add specs for participants service
      
      Add more specs
      
      Add more specs
      
      use  instead of
      
      Use public group owner instead of project maintainer to test owner acess
      
      Remove tests that have now been moved into participants_service_spec
      
      Use :context instead of :all
      
      Create nested group instead of creating an ancestor separately
      
      Add comment explaining doubt on the failing spec
      
      Imrpove test setup
      
      Optimize sql queries
      
      Refactor specs file
      
      Add rubocop disablement
      
      Add special case for project owners
      
      Add small refactor
      
      Add explanation to the docs
      
      Fix wording
      
      Refactor group check
      
      Add small changes in specs
      
      Add cr remarks
      
      Add cr remarks
      
      Add specs
      
      Add small refactor
      
      Add code review remarks
      
      Refactor for better database usage
      
      Fix failing spec
      
      Remove rubocop offences
      
      Add cr remarks
      9347f47a
  20. Oct 23, 2019
  21. Oct 22, 2019
    • Luke Duncalfe's avatar
      Pass all wiki markup formats through pipelines · bc534868
      Luke Duncalfe authored
      Previously, when the wiki page format was anything other than `markdown`
      or `asciidoc` the formatted content would be returned though a Gitaly
      call. Gitaly in turn would delegate formatting to the gitlab-gollum-lib
      gem, which in turn would delegate that to various gems (like RDoc for
      `rdoc`) and then apply some very liberal sanitization.
      
      It was too liberal!
      
      This change brings our wiki content formatting in line with how we
      format other markdown at GitLab, so we have a SSOT for sanitization.
      
      https://gitlab.com/gitlab-org/gitlab/issues/30540
      bc534868
    • Kerri Miller's avatar
      Avoid #authenticate_user! in #route_not_found · 2a4457ea
      Kerri Miller authored
      This method, #route_not_found, is executed as the final fallback for
      unrecognized routes (as the name might imply.) We want to avoid
      `#authenticate_user!` when calling `#route_not_found`;
      `#authenticate_user!` can, depending on the request format, return a 401
      instead of redirecting to a login page. This opens a subtle security
      exploit where anonymous users will receive a 401 response when
      attempting to access a private repo, while a recognized user will
      receive a 404, exposing the existence of the private, hidden repo.
      2a4457ea
Loading