summaryrefslogtreecommitdiff
path: root/app/services
Commit message (Collapse)AuthorAgeFilesLines
* Add latest changes from gitlab-org/gitlab@12-6-stable-eeGitLab Bot2019-12-2082-496/+1024
|
* Trigger Elasticsearch indexing when public group moved to privateDylan Griffith2019-12-061-1/+14
| | | | | | This fixes https://gitlab.com/gitlab-org/gitlab/issues/37766 which is caused by the fact that we leave the stale permissions data in the index after a group is moved to another group.
* Add latest changes from gitlab-org/gitlab@12-5-stable-eeGitLab Bot2019-12-031-17/+26
|
* Add latest changes from gitlab-org/gitlab@12-5-stable-eeGitLab Bot2019-11-1970-399/+1760
|
* Merge branch 'security-mask-sentry-token-12-4-ce' into '12-4-stable'GitLab Release Tools Bot2019-10-252-3/+12
|\ | | | | | | | | Mask Sentry auth token See merge request gitlab/gitlabhq!3504
| * Mask Sentry auth tokenRyan Cobb2019-10-242-3/+12
| | | | | | | | | | This makes it so we mask Sentry's auth token. This mask only occurs in the UI.
* | Merge branch 'security-bvl-validate-force-remove-branch-on-mrs-12-4-ce' into ↵GitLab Release Tools Bot2019-10-246-9/+44
|\ \ | | | | | | | | | | | | | | | | | | '12-4-stable' Only assign merge params when allowed See merge request gitlab/gitlabhq!3487
| * | Only assign merge params when allowedBob Van Landuyt2019-10-236-9/+44
| |/ | | | | | | | | | | | | | | | | When a user updates a merge request coming from a fork, they should not be able to set `force_remove_source_branch` if they cannot push code to the source project. Otherwise developers of the target project could remove the source branch of the source project by setting this flag through the API.
* | Merge branch 'security-developer-transfer-project-12-4' into '12-4-stable'GitLab Release Tools Bot2019-10-241-1/+1
|\ \ | | | | | | | | | | | | Require Maintainer permission on group where project is transferred to See merge request gitlab/gitlabhq!3486
| * | Require maintainer permission to transfer projectsmanojmj2019-10-231-1/+1
| |/
* | Merge branch 'security-33689-post-filter-search-results-ce-12-4' into ↵GitLab Release Tools Bot2019-10-241-1/+1
|\ \ | | | | | | | | | | | | | | | | | | '12-4-stable' Filter out search results based on permissions to avoid bugs leaking data See merge request gitlab/gitlabhq!3496
| * | Change Note#to_ability_name to 'note'Dylan Griffith2019-10-231-1/+1
| |/ | | | | | | | | | | This is to be more consistent as there is already a :read_note policy in NotePolicy. To keep other behaviour the same we've introduced a Note#noteable_ability_name that is used anywhere this was expected.
* | Pick only those groups that the viewing user has access to,Aakriti Gupta2019-10-241-2/+55
|/ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | in a project members' list. Add tests for possible scenarios Re-factor and remove N + 1 queries Remove author from changelog Don't use memoisation when not needed Include users part of parents of project's group Re-factor tests Create and add users according to roles Re-use group created earlier Add incomplete test for ancestoral groups Rename method to clarify category of groups Skip pending test, remove comments not needed Remove extra line Include ancestors from invited groups as well Add specs for participants service Add more specs Add more specs use instead of Use public group owner instead of project maintainer to test owner acess Remove tests that have now been moved into participants_service_spec Use :context instead of :all Create nested group instead of creating an ancestor separately Add comment explaining doubt on the failing spec Imrpove test setup Optimize sql queries Refactor specs file Add rubocop disablement Add special case for project owners Add small refactor Add explanation to the docs Fix wording Refactor group check Add small changes in specs Add cr remarks Add cr remarks Add specs Add small refactor Add code review remarks Refactor for better database usage Fix failing spec Remove rubocop offences Add cr remarks
* Add latest changes from gitlab-org/gitlab@12-4-stable-eeGitLab Bot2019-10-2260-586/+1197
|
* Merge branch 'security-fp-stop-jobs-when-blocking-user-12-3' into '12-3-stable'GitLab Release Tools Bot2019-09-261-0/+13
|\ | | | | | | | | Cancel all running CI jobs when user is blocked See merge request gitlab/gitlabhq!3436
| * Cancel all running CI jobs when user is blockedFabio Pitino2019-09-241-0/+13
| | | | | | | | | | | | This prevents a MITM attack where attacker could still access Git repository if any jobs were running long enough.
* | Add latest changes from gitlab-org/gitlab@12-3-stable-eeGitLab Bot2019-09-241-7/+3
|/
* Add latest changes from gitlab-org/gitlab@12-3-stableGitLab Bot2019-09-203-76/+6
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-09-192-1/+67
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-09-191-5/+9
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-09-1828-47/+63
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-09-171-1/+1
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-09-176-3/+11
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-09-171-1/+22
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-09-163-13/+17
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-09-162-3/+3
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-09-141-0/+90
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-09-13100-0/+200
|
* Fix create MR from issue using a tag as ref🙈 jacopo beschi 🙉2019-09-121-2/+28
| | | | | Creating a MR from an issue using a tag as ref correctly creates the source branch starting from the tag.
* Fixes non interruptible scope nameCédric Tabin2019-09-121-1/+1
|
* Backport changes for 16252 in EE add current_user to report comparison servicesCan Eldem2019-09-111-1/+1
|
* Add 30 and 60 minute bucketsElliot Rushton2019-09-111-1/+1
|
* Prevent archived projects from showing up in global searchDavid Palubin2019-09-101-1/+1
|
* Merge branch 'fj-62807-not-prefill-target-branch' into 'master'Lin Jen-Shin2019-09-101-4/+17
|\ | | | | | | | | | | | | Avoid filling target branch when unknown and source is default branch Closes #62807 See merge request gitlab-org/gitlab-ce!32701
| * Avoid setting merge request target branch when source if default branchfj-62807-not-prefill-target-branchFrancisco Javier López2019-09-101-4/+17
| | | | | | | | | | | | | | In case the source and the target project are the same, the source branch is the default branch, and the target branch is not present, we will avoid prefilling the target branch with the repository default branch. Letting the user decide.
* | Merge branch 'sh-add-sidekiq-logging-for-bad-ci' into 'master'Grzegorz Bizon2019-09-061-1/+27
|\ \ | | | | | | | | | | | | Log errors for failed pipeline creation in PostReceive See merge request gitlab-org/gitlab-ce!32633
| * | Log errors for failed pipeline creation in PostReceivesh-add-sidekiq-logging-for-bad-ciStan Hu2019-09-051-1/+27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When a pipeline fails to create in `PostReceive`, the error is silently discarded, making it difficult to understand why a pipeline was not created. We now add a Sidekiq warning message for this. Adding a Sentry exception when this happens would generate a lot of noise for invalid CI files. Relates to https://gitlab.com/gitlab-org/gitlab-ee/issues/14720
* | | Merge branch 'ce-detect-github-pull-requests' into 'master'Kamil Trzciński2019-09-062-1/+33
|\ \ \ | |/ / |/| | | | | | | | Port CreateGithubPullRequestEvents migration from EE See merge request gitlab-org/gitlab-ce!31802
| * | CE port for pipelines for external pull requestsce-detect-github-pull-requestsFabio Pitino2019-09-052-1/+33
| |/ | | | | | | | | | | | | | | | | | | | | | | | | | | | | Detect if pipeline runs for a GitHub pull request When using a mirror for CI/CD only we register a pull_request webhook. When a pull_request webhook is received, if the source branch SHA matches the actual head of the branch in the repository we create immediately a new pipeline for the external pull request. Otherwise we store the pull request info for when the push webhook is received. When using "only/except: external_pull_requests" we can detect if the pipeline has a open pull request on GitHub and create or not the job based on that.
* | Merge branch 'add-label-push-opts' into 'master'Ash McKenzie2019-09-065-14/+37
|\ \ | | | | | | | | | | | | | | | | | | Support adding and removing labels w/ push opts Closes #5942 See merge request gitlab-org/gitlab-ce!31831
| * | Simplify filter_labels method in IssuableBaseServiceadd-label-push-optsChristian Couder2019-09-041-15/+9
| | | | | | | | | | | | | | | IssuableBaseService::filter_labels() has been refactored to call a new `label_ids_to_filter` method.
| * | Avoid creating labels when removing themChristian Couder2019-09-043-6/+8
| | | | | | | | | | | | | | | IssuableBaseService has been updated so that labels are not created when push options to remove them are received.
| * | Support adding and removing labels w/ push optsChristian Couder2019-09-044-6/+33
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | MergeRequests::PushOptionsHandlerService has been updated to allow adding and removing labels to a merge request using git push options. To create a new merge request and add 2 labels to it: git push -u origin -o merge_request.create \ -o merge_request.label="My label 1" \ -o merge_request.label="My label 2" To update an existing merge request and remove a label while adding a different label: git push -u origin -o merge_request.label="My added label" \ -o merge_request.unlabel="My removed label" Issue https://gitlab.com/gitlab-org/gitlab-ce/issues/64320
* | | New interruptible attribute supported in YAML parsing.Cédric Tabin2019-09-051-5/+15
| | | | | | | | | | | | | | | | | | | | | Since it is not possible to dynamically detect if a job is automatically cancellable or not, a this new attribute is necessary. Moreover, it let the maintainer of the repo to adjust the behaviour of the auto cancellation feature to match exactly what he needs.
* | | Add structure to support EE feature of COARKerri Miller2019-09-051-1/+6
| |/ |/| | | | | | | | | | | These are the structural changes for supporting the EE feature of moving "code_owner_approval_required" state from existing on a project to being on the protected branches individually, allowing for CODEOWNER validation on push events.
* | Bring method back that was mistakenly removedJoão Cunha2019-09-042-1/+9
| | | | | | | | - We're also improving specs to avoid this could happen again
* | Add service to transfer group milestonesEugenia Grieff2019-09-044-0/+122
| | | | | | | | | | | | | | | | | | | | | | - Add new service that transfers milestones from a group to a project - Include new service in Projects transfer service - Include FromUnion module in Milestone model to use in transfer service - Add specs for new milestones service - Add specs for transferring milestones in project transfer service
* | Merge branch 'osw-record-repo-push-events' into 'master'James Lopez2019-09-041-4/+4
|\ \ | | | | | | | | | | | | Backport EE "Track repository pushes as audit events" See merge request gitlab-org/gitlab-ce!32304
| * | Backport "Track repository pushes as audit events"Oswaldo Ferreira2019-09-041-4/+4
| | |
* | | Avoid calling freeze on already frozen strings in app/servicesdineshpanda2019-09-0411-14/+14
|/ /