- Feb 21, 2020
-
-
GitLab Bot authored
-
- Jan 06, 2020
-
-
GitLab Bot authored
-
- Nov 01, 2019
-
-
GitLab Bot authored
-
- Oct 23, 2019
-
-
GitLab Bot authored
-
- Oct 10, 2019
-
-
GitLab Bot authored
-
- Sep 13, 2019
-
-
GitLab Bot authored
-
- Aug 31, 2019
-
-
dineshpanda authored
-
- Jul 31, 2019
-
-
mksionek authored
Add method to store session ids by ip Add new specs for storing session ids Add cleaning up records after login Add retrieving anonymous sessions Add login recaptcha setting Add new setting to sessions controller Add conditions for showing captcha Add sessions controller specs Add admin settings specs for login protection Add new settings to api Add stub to devise spec Add new translation key Add cr remarks Rename class call Add cr remarks Change if-clause for consistency Add cr remarks Add code review remarks Refactor AnonymousSession class Add changelog entry Move AnonymousSession class to lib Move store unauthenticated sessions to sessions controller Move link to recaptcha info Regenerate text file Improve copy on the spam page Change action filter for storing anonymous sessions Fix rubocop offences Add code review remarks
-
- Jul 26, 2019
-
-
By not triggering the callback: - ActiveSession lookup keys are not cleaned - Devise also misses its hook related to session cleanup
-
- Jul 18, 2019
-
-
George Thomas authored
Closes #55564 This is first discovered in #54739 (comment 122609857) that if both if: and only: are used in a before_action or after_action or alike, if: is completely ignored.
-
- May 21, 2019
-
-
James Edwards-Jones authored
-
- Apr 24, 2019
-
-
- Apr 08, 2019
-
-
Martin Wortschack authored
- Externalize strings in controllers - Update PO file
-
- Nov 15, 2018
-
-
Jasper Maes authored
-
- Sep 19, 2018
-
-
gfyoung authored
Enables frozen string for the following: * app/controllers/*.rb * app/controllers/admin/**/*.rb * app/controllers/boards/**/*.rb * app/controllers/ci/**/*.rb * app/controllers/concerns/**/*.rb Partially addresses #47424.
-
- Sep 11, 2018
-
-
Yorick Peterse authored
This whitelists all existing offenses for the various CodeReuse cops, of which most are triggered by the CodeReuse/ActiveRecord cop.
-
- Jul 23, 2018
-
-
Grzegorz Bizon authored
-
- Jul 20, 2018
-
-
Lin Jen-Shin authored
We also try to unify the way we setup OmniAuth, and how we check if it's enabled or not.
-
- Jul 09, 2018
-
-
Lin Jen-Shin authored
-
- Jul 03, 2018
-
-
Stan Hu authored
-
- Jun 21, 2018
-
-
Stan Hu authored
This will only be displayed if `X-GitLab-Show-Login-Captcha` is set as an HTTP header.
-
- May 04, 2018
-
-
Bob Van Landuyt authored
`InternalRedirect` prevents Open redirect issues by only allowing redirection to paths on the same host. It cleans up any unwanted strings from the path that could point to another host (fe. //about.gitlab.com/hello). While preserving the querystring and fragment of the uri. It is already used by: - `TermsController` - `ContinueParams` - `ImportsController` - `ForksController` - `SessionsController`: Only for verifying the host in CE. EE allows redirecting to a different instance using Geo.
-
- Feb 28, 2018
-
-
Horatiu Eugen Vlad authored
-
- Jan 11, 2018
-
-
- Nov 23, 2017
-
-
- Oct 06, 2017
-
-
Toon Claes authored
In GitLab EE, a GitLab instance can be read-only (e.g. when it's a Geo secondary node). But in GitLab CE it also might be useful to have the "read-only" idea around. So port it back to GitLab CE. Also having the principle of read-only in GitLab CE would hopefully lead to less errors introduced, doing write operations when there aren't allowed for read-only calls. Closes gitlab-org/gitlab-ce#37534.
-
- Oct 05, 2017
-
-
Valery Sizov authored
-
- Sep 29, 2017
-
-
Brian Neel authored
-
- Sep 28, 2017
-
-
James Lopez authored
-
James Lopez authored
-
Brian Neel authored
-
Brian Neel authored
# This is the 1st commit message: Add logging for all web authentication events # This is the commit message #2: Re-add underscore to after_inactive_sign_up_path_for # This is the commit message #3: Standardize on username= # This is the commit message #4: after_filter -> after_action, _resource -> resource # This is the commit message #5: Add two-factor login failures and account lockouts # This is the commit message #6: Move logging from two-factor concern to user model # This is the commit message #7: Add spaces around default parameter assignments # This is the commit message #8: Move logs out of user model # This is the commit message #9: Replace filtered_params with user_params # This is the commit message #10: Standardize case # This is the commit message #1: Fixes for username and AppLogger.info
-
- Aug 24, 2017
-
-
Bob Van Landuyt authored
This avoids loading the `OmniAuthCallbacksController` at boot time so it doesn't mess up the `before_action`-chain
-
- Jul 27, 2017
-
-
Rubén Dávila authored
-
- Jul 24, 2017
-
-
Bob Van Landuyt authored
Otherwise the token might be cleared before authentication is done, causing the authentication itself to fail
-
- Jul 13, 2017
-
-
Robin Bobbitt authored
When sign-in is disabled: - skip password expiration checks - prevent password reset requests - don’t show Password tab in User Settings - don’t allow login with username/password for Git over HTTP requests - render 404 on requests to Profiles::PasswordsController
-
- Jul 12, 2017
-
-
Ben Kochie authored
-
- Jun 23, 2017
-
-
James Lopez authored
-
James Lopez authored
-
James Lopez authored
-