- Aug 01, 2018
-
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- Jul 31, 2018
-
-
Luke "Jared" Bennett authored
-
Luke "Jared" Bennett authored
-
- Jul 30, 2018
-
-
Marcel Amirault authored
-
- Jul 27, 2018
-
-
Luke Bennett authored
-
Sean McGivern authored
This reverts merge request !20679
-
- Jul 26, 2018
-
-
Luke Bennett authored
-
- Jul 10, 2018
-
-
Dennis Tang authored
-
- Jun 26, 2018
-
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- May 31, 2018
-
-
- May 30, 2018
-
-
Francisco Javier López authored
-
- May 29, 2018
-
-
Rémy Coutable authored
Ensure ApplicationSetting#performance_bar_allowed_group_id is properly set when retrieved from cache Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- May 23, 2018
-
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- May 07, 2018
-
-
Tiago Botelho authored
-
- May 04, 2018
-
-
Bob Van Landuyt authored
This allows admins to define terms in the application settings. Every time the terms are adjusted, a new version is stored and becomes the 'active' version. This allows tracking which specific version was accepted by a user.
-
- Mar 21, 2018
-
-
Server Side Request Forgery in Services and Web Hooks See merge request gitlab/gitlabhq!2337
-
- Mar 15, 2018
-
-
Stan Hu authored
This is most a backport of https://gitlab.com/gitlab-org/gitlab-ee/merge_requests/4987/diffs but includes other columns that use column_exists? in a way that may cause unnecessary schema loads.
-
- Jan 22, 2018
-
-
Matija Čupić authored
-
- Jan 11, 2018
-
-
- Jan 08, 2018
-
-
Michael Kozono authored
Originally branch 'mk-toggle-writing-to-auth-keys-1631' See merge request !2004 Squashed commits: Add authorized_keys_enabled to Application Settings Ensure default settings are exposed in UI Without this change, `authorized_keys_enabled` is unchecked when it is nil, even if it should be checked by default. Add “Speed up SSH operations” documentation Clarify the reasons for disabling writes Add "How to go back" section Tweak copy Update Application Setting screenshot
-
- Dec 08, 2017
-
-
Bob Van Landuyt authored
Moving the check out of the general requests, makes sure we don't have any slowdown in the regular requests. To keep the process performing this checks small, the check is still performed inside a unicorn. But that is called from a process running on the same server. Because the checks are now done outside normal request, we can have a simpler failure strategy: The check is now performed in the background every `circuitbreaker_check_interval`. Failures are logged in redis. The failures are reset when the check succeeds. Per check we will try `circuitbreaker_access_retries` times within `circuitbreaker_storage_timeout` seconds. When the number of failures exceeds `circuitbreaker_failure_count_threshold`, we will block access to the storage. After `failure_reset_time` of no checks, we will clear the stored failures. This could happen when the process that performs the checks is not running.
-
- Nov 29, 2017
-
-
Andrew Newdigate authored
-
- Nov 23, 2017
-
-
- Nov 17, 2017
-
-
- Oct 30, 2017
-
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- Oct 23, 2017
-
-
Bob Van Landuyt authored
-
- Oct 21, 2017
-
-
- Oct 19, 2017
-
-
Kamil Trzcińśki authored
-
- Oct 17, 2017
-
-
Bob Van Landuyt authored
-
- Oct 16, 2017
-
-
Kamil Trzcińśki authored
-
- Sep 11, 2017
-
-
Alex Lossent authored
This enables skipping a lesser housekeeping task (incremental or full repack) by consistently scheduling a higher task (respectively full repack or gc) with the same period. Cf. #34981
-
- Sep 09, 2017
-
- Aug 30, 2017
-
-
Nick Thomas authored
-
Nick Thomas authored
-
Nick Thomas authored
-
Nick Thomas authored
`allowed_key_types` is removed and the `minimum_<type>_bits` fields are renamed to `<tech>_key_restriction`. A special sentinel value (`-1`) signifies that the key type is disabled. This also feeds through to the UI - checkboxes per key type are out, inline selection of "forbidden" and "allowed" (i.e., no restrictions) are in. As with the previous model, unknown key types are disallowed, even if the underlying ssh daemon happens to support them. The defaults have also been changed from the lowest known bit size to "no restriction". So if someone does happen to have a 768-bit RSA key, it will continue to work on upgrade, at least until the administrator restricts them.
-
Nick Thomas authored
This is an amalgamation of: * Cory Hinshaw: Initial implementation !5552 * Rémy Coutable: Updates !9350 * Nick Thomas: Resolve conflicts and add ED25519 support !13712
-
- Aug 11, 2017
-
-
Robin Bobbitt authored
-
- Jul 27, 2017
-
-
Bob Van Landuyt authored
In favor of the new `repository_storages`
-
- Jul 13, 2017
-
-
Robin Bobbitt authored
When sign-in is disabled: - skip password expiration checks - prevent password reset requests - don’t show Password tab in User Settings - don’t allow login with username/password for Git over HTTP requests - render 404 on requests to Profiles::PasswordsController
-