Skip to content
Snippets Groups Projects
  1. Mar 28, 2018
  2. Mar 05, 2018
  3. Feb 28, 2018
  4. Feb 25, 2018
  5. Feb 22, 2018
  6. Feb 07, 2018
  7. Feb 06, 2018
  8. Dec 22, 2017
  9. Dec 08, 2017
  10. Nov 23, 2017
  11. Oct 20, 2017
  12. Aug 02, 2017
  13. Aug 01, 2017
  14. Jul 27, 2017
  15. Jul 13, 2017
    • Robin Bobbitt's avatar
      Fixes needed when GitLab sign-in is not enabled · 672a68d3
      Robin Bobbitt authored
      When sign-in is disabled:
       - skip password expiration checks
       - prevent password reset requests
       - don’t show Password tab in User Settings
       - don’t allow login with username/password for Git over HTTP requests
       - render 404 on requests to Profiles::PasswordsController
      672a68d3
  16. Jul 11, 2017
  17. Jun 21, 2017
  18. Jun 16, 2017
  19. Jun 14, 2017
  20. Jun 08, 2017
  21. Jun 07, 2017
  22. Jun 05, 2017
    • Michael Kozono's avatar
      Clarify error messages · e8972c11
      Michael Kozono authored
      And refactor to self-document a little better.
      e8972c11
    • Michael Kozono's avatar
      Move CI access logic into GitAccess · bad08fbe
      Michael Kozono authored
      bad08fbe
    • Michael Kozono's avatar
      Fix Git over HTTP spec · ff8a053d
      Michael Kozono authored
      * The spec has 7 failures at this point
      * Specify rendered error messages
      * Render the GitAccess message rather than “Access denied”
      * Render the Not Found message provided by GitAccess, instead of a custom one
      * Expect GitAccess to check the config for whether Git-over-HTTP pull or push is disabled, rather than doing it in the controller
      * Add more thorough testing for authentication
      * Dried up a lot of tests
      * Fixed some broken tests
      ff8a053d
  23. Apr 17, 2017
  24. Apr 14, 2017
  25. Apr 13, 2017
  26. Mar 07, 2017
    • Markus Koller's avatar
      Don't allow blocked users to authenticate through other means · 93daeee1
      Markus Koller authored
      Gitlab::Auth.find_with_user_password is currently used in these places:
      
      - resource_owner_from_credentials in config/initializers/doorkeeper.rb,
        which is used for the OAuth Resource Owner Password Credentials flow
      
      - the /session API call in lib/api/session.rb, which is used to reveal
        the user's current authentication_token
      
      In both cases users should only be authenticated if they're in the
      active state.
      93daeee1
  27. Feb 23, 2017
  28. Feb 05, 2017
  29. Jan 26, 2017
  30. Jan 25, 2017
  31. Dec 16, 2016
Loading