- Sep 13, 2019
-
-
GitLab Bot authored
-
- Jul 26, 2019
-
-
By not triggering the callback: - ActiveSession lookup keys are not cleaned - Devise also misses its hook related to session cleanup
-
- May 06, 2019
-
-
James Edwards-Jones authored
Adds two methods for us to extend in EE: - OmniauthCallbacksController#link_identity - GroupPolicy#lookup_access_level!
-
- Apr 08, 2019
-
-
Martin Wortschack authored
- Externalize strings in controllers - Update PO file
-
- Mar 19, 2019
-
-
pshutsin authored
We can extend the policy in EE for additional behavior
-
- Feb 06, 2019
-
-
James Edwards-Jones authored
-
- Feb 04, 2019
-
-
James Edwards-Jones authored
SAML and OAuth failures should cause a message to be presented, as well as logging that an attempt was made. These were incorrectly prevented by the CSRF check on POST endpoints such as SAML. In addition we were using a NullSession forgery protection, which made testing more difficult and could have allowed account linking to take place if a CSRF was ever needed but not present.
-
- Jan 10, 2019
-
-
Scott Escue authored
Replacing inline JS with ES 2015 functions included in pages/sessions/new. Also applying suggested server-side syntax improvements to OmniAuthCallbacksController.
-
Scott Escue authored
If window.location contains a URL fragment, append the fragment to all sign-in forms, the sign-up form, and all button based providers.
-
- Sep 19, 2018
-
-
gfyoung authored
Enables frozen string for the following: * app/controllers/*.rb * app/controllers/admin/**/*.rb * app/controllers/boards/**/*.rb * app/controllers/ci/**/*.rb * app/controllers/concerns/**/*.rb Partially addresses #47424.
-
- Jun 25, 2018
-
-
- Jun 21, 2018
-
-
blackst0ne authored
Since Rails 5.0 the `protect_from_forgery` callback doesn't run first by default anymore. [1] Instead it gets inserted into callbacks chain where callbacks get called in order. This commit forces the callback to run first. [1]: https://github.com/rails/rails/commit/39794037817703575c35a75f1961b01b83791191
-
- May 21, 2018
-
-
James Edwards-Jones authored
-
- May 04, 2018
-
-
James Edwards-Jones authored
-
- Apr 30, 2018
-
-
James Edwards-Jones authored
-
- Apr 23, 2018
-
-
James Edwards-Jones authored
-
James Edwards-Jones authored
-
- Apr 22, 2018
-
-
James Edwards-Jones authored
-
James Edwards-Jones authored
Moves LDAP to its own controller with tests Provides path forward for implementing GroupSaml
-
- Mar 22, 2018
-
-
Tiago Botelho authored
-
Tiago Botelho authored
Tracks the number of failed attempts made by a user trying to authenticate with any external authentication method
-
- Mar 21, 2018
-
-
[10.6] Fix GitLab Auth0 integration signs in the wrong user See merge request gitlab/gitlabhq!2354
-
- Feb 28, 2018
-
-
Horatiu Eugen Vlad authored
-
- Feb 02, 2018
-
-
Mario de la Ossa authored
-
- Jan 17, 2018
-
-
Robert Speicher authored
[10.3] Prevent login with disabled OAuth providers See merge request gitlab/gitlabhq!2296 (cherry picked from commit 4936650427ffc88e6ee927aedbb2c724d24b094c) a0f9d222 Prevents login with disabled OAuth providers
-
- Jan 11, 2018
-
-
- Nov 23, 2017
-
-
- Nov 17, 2017
-
-
-
Francisco Javier López authored
-
- Aug 24, 2017
-
-
Bob Van Landuyt authored
This avoids loading the `OmniAuthCallbacksController` at boot time so it doesn't mess up the `before_action`-chain
-
- Aug 15, 2017
-
-
Robert Speicher authored
-
- Aug 07, 2017
-
-
James Lopez authored
-
- Jul 06, 2017
-
-
Timothy Andrew authored
- Don't use `request.env['omniauth.params']` if it isn't present. - Remove the `saml` section from the `gitlab.yml` test section. Some tests depend on this section not being initially present, so it can be overridden in the test. This MR doesn't add any tests for SAML, so we didn't really need this in the first place anyway. - Clean up the test -> omniauth section of `gitlab.yml`
-
Timothy Andrew authored
- Pass a `remember_me` query parameter along with the initial OAuth request, and pick this parameter up during the omniauth callback from request.env['omniauth.params']`. - For 2FA-based login, copy the `remember_me` param from `omniauth.params` to `params`, which the 2FA process will pick up. - For non-2FA-based login, simply call the `remember_me` devise method to set the session cookie.
-
- Jul 05, 2017
-
-
Sean McGivern authored
This reverts merge request !11963
-
- Jul 03, 2017
-
-
Timothy Andrew authored
- Don't use `request.env['omniauth.params']` if it isn't present. - Remove the `saml` section from the `gitlab.yml` test section. Some tests depend on this section not being initially present, so it can be overridden in the test. This MR doesn't add any tests for SAML, so we didn't really need this in the first place anyway. - Clean up the test -> omniauth section of `gitlab.yml`
-
Timothy Andrew authored
- Pass a `remember_me` query parameter along with the initial OAuth request, and pick this parameter up during the omniauth callback from request.env['omniauth.params']` - For 2FA-based login, copy the `remember_me` param from `omniauth.params` to `params`, which the 2FA process will pick up. - For non-2FA-based login, simply call the `remember_me` devise method to set the session cookie.
-
- Jun 21, 2017
-
-
Grzegorz Bizon authored
-
- May 05, 2017
-
-
Annabel Dunstone Gray authored
-
- Feb 23, 2017
-
-
Douwe Maan authored
This reverts commit cb10b725c8929b8b4460f89c9d96c773af39ba6b.
-