| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
| |
[ci skip]
|
|\
| |
| |
| |
| | |
Install lsb-release for repo URL construction
See merge request gitlab/gitlabhq!3592
|
|/ |
|
| |
|
|
|
|
| |
This reverts commit e29a2ba5402c20341af02399b1631405e137f344.
|
|
|
|
| |
This reverts commit dda1b34cd24fb1b53521dc4949bb4146ac7c6f18.
|
| |
|
|
|
| |
[ci skip]
|
| |
|
|
|
|
| |
This reverts commit 426287d282d2f9bb5af1dd5d68cec48f2cdc8823.
|
|
|
|
| |
This reverts commit fb3833cda0e13644bddac51fe36aa59860dc6290.
|
| |
|
|
|
| |
[ci skip]
|
|\
| |
| |
| |
| | |
Backport reliable fetcher to 12.2
See merge request gitlab/gitlabhq!3585
|
| |
| |
| |
| |
| |
| | |
backport https://gitlab.com/gitlab-org/gitlab/commit/2be136b6cdf59f4664d9fbbe91e16498a47ba227
see https://gitlab.com/gitlab-org/gitlab/commit/3baeb0c7fd6829b8c083a43370163d16f7700263
see https://gitlab.com/gitlab-org/gitlab/merge_requests/21161
|
|/ |
|
|\ |
|
| | |
|
| |
| |
| | |
[ci skip]
|
| |\
| | |
| | |
| | |
| | |
| | |
| | | |
'12-2-stable'
Return 404 on LFS request if project doesn't exist
See merge request gitlab/gitlabhq!3508
|
| |/ |
|
| |\
| | |
| | |
| | |
| | |
| | |
| | | |
'12-2-stable'
Only assign merge params when allowed
See merge request gitlab/gitlabhq!3460
|
| |/
|/|
| |
| |
| |
| |
| |
| |
| | |
When a user updates a merge request coming from a fork, they should
not be able to set `force_remove_source_branch` if they cannot push
code to the source project.
Otherwise developers of the target project could remove the source
branch of the source project by setting this flag through the API.
|
| |\
| | |
| | |
| | |
| | | |
Nested GraphQL query with circular relationship can cause Denial of Service
See merge request gitlab/gitlabhq!3385
|
| | | |
|
| | | |
|
| |/
|/|
| |
| |
| |
| |
| |
| |
| |
| | |
- List all overly-recursive fields
- Reduce recursion threshold to 2
- Add test for not-recursive-enough query
- Use reusable methods in tests
- Add changelog
- Set changeable acceptable recursion level
- Add error check test helpers
|
| |\
| | |
| | |
| | |
| | |
| | |
| | | |
into '12-2-stable'
Improper access control allows the attacker to comment in internal commit after they are no longer admin
See merge request gitlab/gitlabhq!3392
|
| |/
| |
| |
| | |
after they are no longer admin
|
| |\
| | |
| | |
| | |
| | |
| | |
| | | |
'security-2914-labels-visible-despite-no-access-to-issues-repositories-12-2' into '12-2-stable'
Labels visible despite no access to issues & repositories
See merge request gitlab/gitlabhq!3431
|
| |/
|/|
| |
| | |
https://dev.gitlab.org/gitlab/gitlabhq/merge_requests/3409
|
| |\
| | |
| | |
| | |
| | |
| | |
| | | |
'12-2-stable'
Project path reveals labels from Private project if the issue is moved to public project
See merge request gitlab/gitlabhq!3445
|
| | |
| | |
| | |
| | | |
https://dev.gitlab.org/gitlab/gitlabhq/merge_requests/3419
|
| |\ \
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
'security-ag-hide-private-members-in-project-member-autocomplete-12-2' into '12-2-stable'
Hide private members in project member autocomplete
See merge request gitlab/gitlabhq!3448
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
in a project members' list. Add tests for possible scenarios
Re-factor and remove N + 1 queries
Remove author from changelog
Don't use memoisation when not needed
Include users part of parents of project's group
Re-factor tests
Create and add users according to roles
Re-use group created earlier
Add incomplete test for ancestoral groups
Rename method to clarify category of groups
Skip pending test, remove comments not needed
Remove extra line
Include ancestors from invited groups as well
Add specs for participants service
Add more specs
Add more specs
use instead of
Use public group owner instead of project maintainer to test owner acess
Remove tests that have now been moved into participants_service_spec
Use :context instead of :all
Create nested group instead of creating an ancestor separately
Add comment explaining doubt on the failing spec
Imrpove test setup
Optimize sql queries
Refactor specs file
Add rubocop disablement
Add special case for project owners
Add small refactor
Add explanation to the docs
Fix wording
Refactor group check
Add small changes in specs
Add cr remarks
Add cr remarks
Add specs
Add small refactor
Add code review remarks
Refactor for better database usage
Fix failing spec
Remove rubocop offences
Add cr remarks
|
| |\ \ \
| | | | |
| | | | |
| | | | |
| | | | | |
Private/internal repository enumeration via bruteforce on a vulnerable URL
See merge request gitlab/gitlabhq!3456
|
| |/ / /
|/| | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
This method, #route_not_found, is executed as the final fallback for
unrecognized routes (as the name might imply.) We want to avoid
`#authenticate_user!` when calling `#route_not_found`;
`#authenticate_user!` can, depending on the request format, return a 401
instead of redirecting to a login page. This opens a subtle security
exploit where anonymous users will receive a 401 response when
attempting to access a private repo, while a recognized user will
receive a 404, exposing the existence of the private, hidden repo.
|
| |\ \ \
| | | | |
| | | | |
| | | | |
| | | | | |
Mask sentry auth token
See merge request gitlab/gitlabhq!3464
|
| |/ / /
|/| | |
| | | |
| | | |
| | | | |
This makes it so we mask Sentry's auth token. This mask only occurs in
the UI.
|
| |\ \ \
| | | | |
| | | | |
| | | | |
| | | | | |
Sanitize search text to prevent XSS
See merge request gitlab/gitlabhq!3470
|
| |/ / /
|/| | | |
|
| |\ \ \
| | | | |
| | | | |
| | | | |
| | | | | |
Require Maintainer permission on group where project is transferred to
See merge request gitlab/gitlabhq!3473
|
| |/ / /
|/| | | |
|
| |\ \ \
| | | | |
| | | | |
| | | | |
| | | | | |
Use the '\A' and '\z' regex anchors in `InternalRedirect` to mitigate an Open Redirect issue.
See merge request gitlab/gitlabhq!3476
|
| | | | | |
|
| |/ / /
|/| | |
| | | |
| | | |
| | | |
| | | | |
Open Redirect issue.
Fixes https://dev.gitlab.org/gitlab/gitlabhq/issues/2934 and https://gitlab.com/gitlab-org/gitlab/issues/33569
|
| |\ \ \
| | | | |
| | | | |
| | | | |
| | | | | |
Pass all wiki markup formats through our Banzai pipeline filters
See merge request gitlab/gitlabhq!3479
|
| |/ / /
|/| | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Previously, when the wiki page format was anything other than `markdown`
or `asciidoc` the formatted content would be returned though a Gitaly
call. Gitaly in turn would delegate formatting to the gitlab-gollum-lib
gem, which in turn would delegate that to various gems (like RDoc for
`rdoc`) and then apply some very liberal sanitization.
It was too liberal!
This change brings our wiki content formatting in line with how we
format other markdown at GitLab, so we have a SSOT for sanitization.
https://gitlab.com/gitlab-org/gitlab/issues/30540
|
| |\ \ \
| | | | |
| | | | |
| | | | |
| | | | | |
Handle Stored XSS for Grafana URL in settings
See merge request gitlab/gitlabhq!3481
|