- Feb 25, 2020
-
-
GitLab Bot authored
-
- Dec 16, 2019
-
-
GitLab Bot authored
-
- Dec 13, 2019
-
-
GitLab Bot authored
-
- Dec 11, 2019
-
-
GitLab Bot authored
-
- Oct 29, 2019
-
-
GitLab Bot authored
-
- Sep 26, 2019
-
-
GitLab Bot authored
-
- Sep 18, 2019
-
-
GitLab Bot authored
-
- Jun 25, 2019
-
-
Roger Meier authored
-
- May 13, 2019
-
-
Bob Van Landuyt authored
Before this, we were only adding the correlation id to the "acceptable exceptions" which we handle in code. But we need to add it to the default raven context so the information would be available for uncaught exceptions.
-
- Apr 18, 2019
-
-
Andrew Newdigate authored
This change is a fairly straightforward refactor to extract the tracing and correlation-id code from the gitlab rails codebase into the new LabKit-Ruby project. The corresponding import into LabKit-Ruby was in https://gitlab.com/gitlab-org/labkit-ruby/merge_requests/1 The code itself remains very similar for now. Extracting it allows us to reuse it in other projects, such as Gitaly-Ruby. This will give us the advantages of correlation-ids and distributed tracing in that project too.
-
- Dec 18, 2018
-
-
blackst0ne authored
Updates specs to use new rails5 format. The old format: `get :show, { some: params }, { some: headers }` The new format: `get :show, params: { some: params }, headers: { some: headers }`
-
- Dec 06, 2018
-
-
Kamil Trzcińśki authored
The Correlation ID is taken or generated from received X-Request-ID. Then it is being passed to all executed services (sidekiq workers or gitaly calls). The Correlation ID is logged in all structured logs as `correlation_id`.
-
- Nov 29, 2018
-
-
Imre (Admin) authored
Adds gitlab.impersonation_enabled config option defaulting to true to keep the current default behaviour. Only the act of impersonation is modified, impersonation token management is not affected.
-
- Oct 18, 2018
-
-
William George authored
-
- Jul 09, 2018
-
-
Lin Jen-Shin authored
-
- May 24, 2018
-
-
Bob Van Landuyt authored
This will make it clearer to users which account is being used to make the API/git call. So they know which account needs to be used to accept the terms. Closes #46649
-
- May 10, 2018
-
-
Bob Van Landuyt authored
When terms are enforced, but the user has not accepted the terms access to the API & git is rejected with a message directing the user to the web app to accept the terms.
-
- Jan 09, 2018
-
-
Stan Hu authored
This will enable admins to identify who actually made the API request. Relates to #36960
-
- Nov 17, 2017
-
-
Francisco Javier López authored
-
Francisco Javier López authored
-
Francisco Javier López authored
-
Francisco Javier López authored
-
- Nov 02, 2017
-
-
Douwe Maan authored
-
Douwe Maan authored
-
Douwe Maan authored
-
- Oct 12, 2017
-
-
Douwe Maan authored
-
- Oct 05, 2017
-
-
Alejandro Rodríguez authored
-
- Sep 29, 2017
-
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- Sep 28, 2017
-
-
Douwe Maan authored
-
- Aug 09, 2017
-
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- Jul 27, 2017
-
-
Douwe Maan authored
-
- Jun 28, 2017
-
-
Timothy Andrew authored
-
Timothy Andrew authored
- Scope declarations of the form: allow_access_with_scope :read_user, if: -> (request) { request.get? } will only apply for `GET` requests - Add a negative test to a `POST` endpoint in the `users` API to test this. Also test for this case in the `AccessTokenValidationService` unit tests.
-
- Jun 14, 2017
-
-
Robert Speicher authored
-
- May 01, 2017
-
-
Robert Speicher authored
-
- Apr 26, 2017
-
-
Timothy Andrew authored
- Currently, (for example) admins can't delete snippets for blocked users, which is an unexpected limitation. - We modify `authenticate!` to conduct the `access_api` policy check against the `initial_current_user`, instead of the user being impersonated. - Update CHANGELOG for !10842
-
- Apr 21, 2017
-
-
Jacopo authored
Removed all the unnecessary include of `WaitForAjax` and `ApiHelpers` in the specs. Removed unnecessary usage of `api:true`
-
- Mar 09, 2017
-
-
http://jneen.net/ authored
true is neither nil nor a user and doesn't make sense as the return value of `current_user`
-
- Jan 19, 2017
-
-
Kamil Trzcińśki authored
-
- Dec 23, 2016
-
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-