Skip to content
Snippets Groups Projects
Select Git revision
  • move-gl-dropdown
  • improve-table-pagination-spec
  • move-markdown-preview
  • winh-fix-merge-request-spec
  • master default
  • index-namespaces-lower-name
  • winh-single-karma-test
  • 10-3-stable
  • 36782-replace-team-user-role-with-add_role-user-in-specs
  • winh-modal-internal-state
  • tz-ide-file-icons
  • 38869-milestone-select
  • update-autodevops-template
  • jivl-activate-repo-cookie-preferences
  • qa-add-deploy-key
  • docs-move-article-ldap
  • 40780-choose-file
  • 22643-manual-job-page
  • refactor-cluster-show-page-conservative
  • dm-sidekiq-versioning
  • v10.4.0.pre
  • v10.3.0
  • v10.3.0-rc5
  • v10.3.0-rc4
  • v10.3.0-rc3
  • v10.3.0-rc2
  • v10.2.5
  • v10.3.0-rc1
  • v10.0.7
  • v10.1.5
  • v10.2.4
  • v10.2.3
  • v10.2.2
  • v10.2.1
  • v10.3.0.pre
  • v10.2.0
  • v10.2.0-rc4
  • v10.2.0-rc3
  • v10.1.4
  • v10.2.0-rc2
40 results

auth.rb

Forked from GitLab.org / GitLab FOSS
Source project has a limited visibility.
  • Drew Blessing's avatar
    29414ab0
    Reduce hits to LDAP on Git HTTP auth by reordering auth mechanisms · 29414ab0
    Drew Blessing authored
    We accept half a dozen different authentication mechanisms for
    Git over HTTP. Fairly high in the list we were checking user
    password, which would also query LDAP. In the case of LFS,
    OAuth tokens or personal access tokens, we were unnecessarily
    hitting LDAP when the authentication will not succeed. This
    was causing some LDAP/AD systems to lock the account. Now,
    user password authentication is the last mechanism tried since
    it's the most expensive.
    29414ab0
    History
    Reduce hits to LDAP on Git HTTP auth by reordering auth mechanisms
    Drew Blessing authored
    We accept half a dozen different authentication mechanisms for
    Git over HTTP. Fairly high in the list we were checking user
    password, which would also query LDAP. In the case of LFS,
    OAuth tokens or personal access tokens, we were unnecessarily
    hitting LDAP when the authentication will not succeed. This
    was causing some LDAP/AD systems to lock the account. Now,
    user password authentication is the last mechanism tried since
    it's the most expensive.