- Feb 04, 2020
-
-
GitLab Bot authored
-
GitLab Bot authored
-
- Jan 27, 2020
-
-
GitLab Bot authored
-
- Jan 22, 2020
-
-
GitLab Bot authored
-
- Jan 13, 2020
-
-
GitLab Bot authored
-
- Jan 09, 2020
-
-
GitLab Bot authored
-
- Dec 17, 2019
-
-
GitLab Bot authored
-
- Dec 11, 2019
-
-
GitLab Bot authored
-
- Dec 10, 2019
-
-
GitLab Bot authored
-
- Dec 06, 2019
-
-
GitLab Bot authored
-
- Dec 03, 2019
-
-
GitLab Bot authored
-
- Nov 08, 2019
-
-
GitLab Bot authored
-
- Nov 01, 2019
-
-
GitLab Bot authored
-
- Oct 10, 2019
-
-
GitLab Bot authored
-
- Sep 30, 2019
-
-
Sebastián Arcila Valenzuela authored
If the request wasn't initiated by gitlab we shouldn't add the new identity to the user, and instead show that we weren't able to link the identity to the user. This should fix: https://gitlab.com/gitlab-org/gitlab-ce/issues/56509
-
- Sep 26, 2019
-
-
GitLab Bot authored
-
GitLab Bot authored
-
- Sep 21, 2019
-
-
Sebastián Arcila Valenzuela authored
If the request wasn't initiated by gitlab we shouldn't add the new identity to the user, and instead show that we weren't able to link the identity to the user. This should fix: https://gitlab.com/gitlab-org/gitlab-ce/issues/56509
-
- Sep 17, 2019
-
-
GitLab Bot authored
-
- Sep 13, 2019
-
-
GitLab Bot authored
-
- Sep 10, 2019
-
-
Ahmad Sherif authored
It consists of two parts: 1. Redirecting users to the configured external storage 1. Allowing the external storage to request the static object(s) on behalf of the user by means of specific tokens Part of https://gitlab.com/gitlab-com/gl-infra/infrastructure/issues/6829
-
- Sep 04, 2019
-
-
dineshpanda authored
-
- Aug 27, 2019
-
-
dodocat authored
allow_bypass_two_factor configration dose not work with saml provider
-
- Jul 26, 2019
-
-
By not triggering the callback: - ActiveSession lookup keys are not cleaned - Devise also misses its hook related to session cleanup
-
- Jul 25, 2019
-
-
Thong Kuah authored
This was shown in specs but surely this will be happening in application code as well if this method is passes a frozen string. We were also trying to force_encode a OmniAuth::AuthHash which had the very confusing behaviour of returning nil when it was sent a method that it did not define. Fix that by only force_encoding a String.
-
- Jul 22, 2019
-
-
Steve Abrams authored
PATs are accepted using the OAuth2 compliant header "Authorization: Bearer {token}" in order to allow for OAuth requests while 2FA is enabled.
-
- Jul 10, 2019
-
-
Mayra Cabrera authored
Suggests to use a JSON structured log instead Related to https://gitlab.com/gitlab-org/gitlab-ce/issues/54102
-
- Jun 28, 2019
-
-
Stan Hu authored
This will make it possible to whitelist multiple IP addresses (e.g. 192.168.0.1/24).
-
- Jun 18, 2019
-
-
Kartikey Tanna authored
Disabled password authentication for the users registered using omniauth-ultraauth strategy
-
- May 27, 2019
-
-
- Add .no-tabs to login-box - Externalize strings in common signup box - Leverage render_if_exists - Update PO file
-
- May 05, 2019
-
-
Stan Hu authored
-
- Mar 25, 2019
-
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- Mar 20, 2019
-
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- Mar 06, 2019
-
-
Andrew Newdigate authored
This style change enforces `return if ...` instead of `return nil if ...` to save maintainers a few minor review points
-
- Mar 04, 2019
-
-
Drew Blessing authored
We've previously exposed ca_file and ssl_version but there are many possible options that can be used inside tls_options. Instead of exposing individual ones, simply expose the entire hash so it can be passed in and we won't have to add things in the future.
-
- Jan 27, 2019
-
-
Imre (Admin) authored
-
- Jan 23, 2019
-
-
James Edwards-Jones authored
-
Imre (Admin) authored
-
- Jan 16, 2019
-
-
Semyon Pupkov authored
-
- Nov 29, 2018
-
-
Imre (Admin) authored
Adds gitlab.impersonation_enabled config option defaulting to true to keep the current default behaviour. Only the act of impersonation is modified, impersonation token management is not affected.
-