summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Clarify feature flag status in PROCESS.mdMarin Jankovski2019-02-121-1/+11
|
* Update CHANGELOG.md for 11.6.8GitLab Release Tools Bot2019-01-311-0/+4
| | | [ci skip]
* Fix requiring the rubyzip GemYorick Peterse2019-01-311-1/+1
| | | | | | | In commit 6fa5fd8515e0f2d5a6341134560021f353d84362 the `require: false` was removed to ensure the Gem was loaded at run time. Unfortunately, the `require` necessary for the rubyzip Gem is "zip" and not "rubyzip". As a result, Bundler would not require the Gem. This meant that we would still run into constant errors when referring to `Zip::File`.
* Update CHANGELOG.md for 11.7.2GitLab Release Tools Bot2019-01-311-0/+34
| | | [ci skip]
* Fix uninitialized constant with GitLab Pages deployStan Hu2019-01-313-2/+7
| | | | | | | | | | | | pages:deploy step was failing with the following error: ``` unitialized constant SafeZip::Extract::Zip ``` Since license_finder already pulls in rubyzip, we can make it a required gem. We also use the scope operator to make the reference to Zip::File explicit.
* Update CHANGELOG.md for 11.5.8GitLab Release Tools Bot2019-01-311-0/+27
| | | [ci skip]
* Update CHANGELOG.md for 11.7.1GitLab Release Tools Bot2019-01-3121-101/+30
| | | [ci skip]
* Merge branch '56860-fix-spec-race-condition-upside-the-head' into 'master'Douglas Barbosa Alexandre2019-01-311-0/+3
| | | | | | | Fix a JS race in a spec Closes #56860 See merge request gitlab-org/gitlab-ce!24684
* [master] Pipelines section is available to unauthorized usersKamil Trzciński2019-01-3135-95/+324
|
* [master] Check access rights when creating/updating ProtectedRefsFrancisco Javier López2019-01-312-23/+8
|
* Add subresources removal to member destroy serviceJames Lopez2019-01-3110-11/+114
|
* [master] Resolve "[Security] Stored XSS via KaTeX"Constance Okoghenun2019-01-312-1/+22
|
* Disable git v2 protocol temporarilyNick Thomas2019-01-313-1/+13
|
* Fix tree restorer visibility levelJames Lopez2019-01-315-2/+219
|
* Stop showing ci for guest usersSteve Azzopardi2019-01-313-1/+27
| | | | | | When a user is a guest user, and the "Public Pipeline" is set to false inside of "Settings > CI/CD > General" the commit status in the project dashboard should not be shown.
* Sent notification only to authorized usersJan Provaznik2019-01-316-7/+59
| | | | | | | | | | | When moving a project, it's possible that some users who had access to the project in old path can not access the project in the new path. Because `project_authorizations` records are updated asynchronously, when we send the notification about moved project the list of project team members contains old project members, we want to notify all these members except the old users who can not access the new location.
* Use sanitized user status message for user popoverDennis Tang2019-01-313-7/+12
|
* Alias GitHub and BitBucket OAuth2 callback URLsStan Hu2019-01-318-8/+43
| | | | | | | | | | | | | | | | | | | | To prevent an OAuth2 covert redirect vulnerability, this commit adds and uses an alias for the GitHub and BitBucket OAuth2 callback URLs to the following paths: GitHub: /users/auth/-/import/github Bitbucket: /users/auth/-/import/bitbucket This allows admins to put a more restrictive callback URL in the OAuth2 configuration settings. Instead of https://example.com, admins can now use: https://example.com/users/auth It's possible but not trivial to change Devise and OmniAuth to use a different prefix for callback URLs instead of /users/auth. For now, aliasing the import URLs under the /users/auth namespace should suffice. Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/56663
* Verify that LFS upload requests are genuineNick Thomas2019-01-314-7/+25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | LFS uploads are handled in concert by workhorse and rails. In normal use, workhorse: * Authorizes the request with rails (upload_authorize) * Handles the upload of the file to a tempfile - disk or object storage * Validates the file size and contents * Hands off to rails to complete the upload (upload_finalize) In `upload_finalize`, the LFS object is linked to the project. As LFS objects are deduplicated across all projects, it may already exist. If not, the temporary file is copied to the correct place, and will be used by all future LFS objects with the same OID. Workhorse uses the Content-Type of the request to decide to follow this routine, as the URLs are ambiguous. If the Content-Type is anything but "application/octet-stream", the request is proxied directly to rails, on the assumption that this is a normal file edit request. If it's an actual LFS request with a different content-type, however, it is routed to the Rails `upload_finalize` action, which treats it as an LFS upload just as it would a workhorse-modified request. The outcome is that users can upload LFS objects that don't match the declared size or OID. They can also create links to LFS objects they don't really own, allowing them to read the contents of files if they know just the size or OID. We can close this hole by requiring requests to `upload_finalize` to be sourced from Workhorse. The mechanism to do this already exists.
* Extract GitLab Pages using RubyZipKamil Trzciński2019-01-3117-25/+594
| | | | | | | | | | | | | | RubyZip allows us to perform strong validation of expanded paths where we do extract file. We introduce the following additional checks to extract routines: 1. None of path components can be symlinked, 2. We drop privileges support for directories, 3. Symlink source needs to point within the target directory, like `public/`, 4. The symlink source needs to exist ahead of time.
* Add changelog entryKushal Pandya2019-01-311-0/+6
|
* Use `sanitize_name` to sanitize URL in user full nameKushal Pandya2019-01-3137-54/+56
|
* Prevent comments by email when issue is lockedHeinrich Lee Yu2019-01-3112-37/+94
| | | | | | | | | This changes the permission check so it uses the policy on Noteable instead of Project. This prevents bypassing of rules defined in Noteable for locked discussions and confidential issues. Also rechecks permissions when reply_to_discussion_id is provided since the discussion_id may be from a different noteable.
* Add `sanitize_name` helper to sanitize URLs in user full nameKushal Pandya2019-01-312-0/+22
|
* Bump the CACHE_COMMONMARK_VERSIONBrett Walker2019-01-311-1/+1
| | | | | | | | Since we needed to bump the version to 13 in the backports, and we know that an MR on master also bumped it to 13, bump to 14 to ensure that when a customer upgrades to the most recent release, the markdown gets recalcuated as necessary.
* Show tooltip for malicious looking linksBrett Walker2019-01-318-11/+226
| | | | | | | Such as those with IDN homographs or embedded right-to-left (RTLO) characters. Autolinked hrefs should be escaped
* Added validations to prevent LFS object forgeryFrancisco Javier López2019-01-3113-103/+359
|
* Group Guests are no longer able to see merge requestsTiago Botelho2019-01-317-20/+154
| | | | | | | Group guests will only be displayed merge requests to projects they have a access level to, higher than Reporter. Visible projects will still display the merge requests to Guests
* Fixed bug when external wiki is enabledFrancisco Javier López2019-01-3114-51/+131
| | | | | | | | When the external wiki is enabled, the internal wiki link is replaced by the external wiki url. But the internal wiki is still accessible. In this change the external wiki will have its own tab in the sidebar and only if the services are disabled the tab (and access rights) will not be displayed.
* Fix private user email being visible in tag webhooksLuke Duncalfe2019-01-313-3/+8
| | | | Fixes #54721
* Add changelog for trigger token exposure fixGrzegorz Bizon2019-01-311-0/+5
|
* Fix subject in trigger presenter testsGrzegorz Bizon2019-01-311-1/+1
|
* Add some specs for trigger presenterGrzegorz Bizon2019-01-311-0/+51
|
* Present all pipeline triggers using trigger presenterGrzegorz Bizon2019-01-313-4/+6
|
* Do not expose trigger token when user should not see itGrzegorz Bizon2019-01-318-13/+68
|
* Prevent award_emoji to notes not visible to userHeinrich Lee Yu2019-01-313-0/+8
| | | | | When the parent noteable is not visible to the user (e.g. confidential) we prevent the user from adding emoji reactions to notes
* Prefer build() rather than create()Luke Duncalfe2019-01-311-1/+1
|
* Use common error for unauthenticated usersHeinrich Lee Yu2019-01-313-10/+7
| | | | Removes special error message when creating new issues
* Fix slow project reference pattern regexHeinrich Lee Yu2019-01-314-1/+14
|
* Don't process MR refs for guests in the notesOswaldo Ferreira2019-01-313-2/+17
|
* Fix contributed projects finder shown private infoJames Lopez2019-01-314-0/+56
|
* Fix path disclosure on Project ImportJames Lopez2019-01-318-17/+107
|
* Merge branch 'kp-add-ignore-rules-for-object-convert-util' into 'master'Fatih Acet2019-01-312-38/+140
|\ | | | | | | | | Support for ignore rules in 'convertObjectPropsToCamelCase' helper See merge request gitlab-org/gitlab-ce!24790
| * Support for ignore rules in 'convertObjectPropsToCamelCase' helperKushal Pandya2019-01-312-38/+140
| | | | | | | | | | | | | | | | Does following enhancements to `convertObjectPropsToCamelCase` helper; - Adds support for `dropKeys` within options param to discard properties. - Adds support for `allowKeys` within options param to skip converting property names.
* | Merge branch 'winh-ee_else_ce-docs' into 'master'Marcia Ramos2019-01-311-0/+14
|\ \ | | | | | | | | | | | | Document ee_else_ce alias for splitting CE/EE JavaScript See merge request gitlab-org/gitlab-ce!24798
| * | Document ee_else_ce alias for splitting CE/EE JavaScriptWinnie Hellmann2019-01-301-0/+14
| | |
* | | Merge branch '45791-number-of-repositories-usage-ping' into 'master'48742-reword-could-not-connect-to-the-ci-server-please-check-your-settings-and-try-againRémy Coutable2019-01-313-0/+10
|\ \ \ | | | | | | | | | | | | | | | | | | | | | | | | Add number of repositories to usage ping data Closes #45791 See merge request gitlab-org/gitlab-ce!24823
| * | | Add number of repositories to usage ping dataBalasankar "Balu" C2019-01-313-0/+10
| | |/ | |/|
* | | Merge branch 'patch-41' into 'master'Grzegorz Bizon2019-01-311-0/+3
|\ \ \ | | | | | | | | | | | | | | | | | | | | | | | | Add nyc coverage regex to example pattern list Closes #29642 See merge request gitlab-org/gitlab-ce!24782
| * | | Add nyc coverage regex to example pattern listDan Quist2019-01-311-0/+3
|/ / /