summaryrefslogtreecommitdiff
path: root/lib/gitlab/regex.rb
Commit message (Collapse)AuthorAgeFilesLines
* Add documentation and specs for webhook URL rewritingSean McGivern2018-07-061-0/+26
|
* Ensure users can't create environments with leading or trailing slashes ↵39885-ensure-users-cannot-create-environments-with-leading-slashesDylan Griffith2018-02-131-2/+6
| | | | (Fixes #39885)
* Merge branch 'ac/41346-xss-ci-job-output' into 'security-10-3'Robert Speicher2018-01-161-1/+1
| | | | | | | | | | [10.3] Fix XSS vulnerability in Pipeline job trace See merge request gitlab/gitlabhq!2258 (cherry picked from commit 44caa80ed9a2514a74a5eeab10ff51849d64851b) 5f86f3ff Fix XSS vulnerability in Pipeline job trace
* Merge branch 'check-environment-regex' into 'master'Grzegorz Bizon2018-01-081-1/+1
| | | | | | Fix environment scope regex See merge request gitlab-org/gitlab-ee!3641
* Update container repository path referenceGrzegorz Bizon2017-11-161-1/+1
| | | | | | | We should allow to use double underscore in the path, and it seems that our container repository path regexp was outdated. See https://github.com/docker/distribution/blob/master/reference/regexp.go
* Add CI build trace sections extractorAlessio Caiazza2017-10-051-0/+4
|
* Enfouce namespace for Kubernetes to lowercaseShinya Maeda2017-08-221-1/+2
|
* Add a test for container repository name regexpGrzegorz Bizon2017-07-191-0/+4
|
* Fix docker tag reference routing constraintsGrzegorz Bizon2017-07-191-5/+7
|
* Backports for ee-2112Lin Jen-Shin2017-07-061-1/+5
| | | | https://gitlab.com/gitlab-org/gitlab-ee/merge_requests/2112
* Removes file_name_regex from Gitlab::Regex32408-allow-creation-of-files-and-dirs-with-spaces-in-web-uiTiago Botelho2017-07-051-8/+0
|
* Allow creation of files and directories with spaces in web UITiago Botelho2017-07-051-1/+1
|
* Replace invalid chars while seeding environmentsZeger-Jan van de Weg2017-06-211-1/+1
|
* Revert "Remove changes that are not absolutely necessary"Douwe Maan2017-05-241-262/+1
| | | This reverts commit b0498c176fa134761d899c9b369be12f1ca789c5
* Remove changes that are not absolutely necessarydm-fix-routesDouwe Maan2017-05-231-1/+262
|
* Fix ambiguous routing issues by teaching router about reserved wordsDouwe Maan2017-05-231-79/+1
|
* Reuse Gitlab::Regex.full_namespace_regex in the DynamicPathValidatorBob Van Landuyt2017-05-021-0/+4
|
* Refactor changing files in web UIDouwe Maan2017-04-201-16/+0
|
* Check registry repository name against regexpGrzegorz Bizon2017-04-031-0/+7
| | | | | This regexp is extracted from Docker Distribution 2.4.1 docs, contains additional `/` element that can be a separator of components.
* Use Namespace#full_path instead of #path where appropriatedm-more-namespace-full-pathDouwe Maan2017-02-231-5/+6
|
* Add GFM support to nested groupsdz-nested-groups-gfm-altDmitriy Zaporozhets2017-02-131-0/+4
| | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* Allow to use + symbol in filenamesblackst0ne2017-01-151-2/+2
|
* Add an environment slugNick Thomas2016-12-151-0/+9
|
* Introduce deployment services, starting with a KubernetesServiceNick Thomas2016-12-141-0/+8
|
* Allow all alphanumeric characters in file names (!8002)winniehell2016-12-131-2/+2
|
* Add nested groups support to the routingdz-allow-nested-group-routingDmitriy Zaporozhets2016-11-231-2/+12
| | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* Fix 500 error when group name ends with gitDmitriy Zaporozhets2016-11-211-1/+1
| | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* Allow registering users where the username contains dots (.).Timothy Andrew2016-11-181-1/+8
| | | | | | | | | | | | | | | | | | Javascript does not support the negative lookbehind assertion (?<!) used in the Ruby regex (to disallow usernames ending in `.git` or `.atom`. Getting the client side code to fully support this format is non-trivial, since we'd either have to heavily complicate the regex used, or modify the frontend code to support more complex validation schemes (it currently uses HTML5 validations). The pragmatic choice is to create a `Gitlab::Regex::NAMESPACE_REGEX_STR_SIMPLE` regex to serve as a Javascript-compatible version of `NAMESPACE_REGEX_STR`. The client-side code will not display an error for usernames ending in `.git` and `.atom`, but these will be caught by the server-side validation.
* Added ability to put emojis into repository nameVincent Composieux2016-11-121-3/+3
| | | | Added ability to put emojis into repository name
* Refactor namespace regexdz-refactor-namespace-regexDmitriy Zaporozhets2016-11-071-0/+4
| | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* Correct namespace validation to forbid bad names #21077Will Starms2016-10-071-2/+2
| | | | | | Adds .git and .atom to the master namespace regex Updates existing group tests and adds two new ones Updates path cleaning to also forbid .atom
* Remove trailing spaces from messages in Gitlab::Regexrs-trailing-spaces-in-regex-messagesRobert Speicher2016-09-201-3/+3
|
* Fix validation regexs (+1 squashed commit)Kamil Trzcinski2016-09-191-2/+2
| | | | | Squashed commits: [f9a9315] Use : to test invalid environment name
* Fix environments handlingKamil Trzcinski2016-09-191-2/+2
|
* Add support for dynamic environmentsKamil Trzcinski2016-09-191-2/+2
| | | | Environments that can have a URL with predefined CI variables.
* Enable Style/EmptyLines cop, remove redundant onesrubocop/enable-cops-for-empty-linesGrzegorz Bizon2016-07-011-6/+0
|
* Validate environment name with regexKamil Trzcinski2016-06-141-0/+8
|
* WIPKamil Trzcinski2016-05-081-1/+1
|
* Added docker registry viewKamil Trzcinski2016-05-041-0/+4
|
* Merge branch 'master' of gitlab.com:gitlab-org/gitlab-ce into fix/atom-url-issueJames Lopez2016-02-021-4/+4
|\
| * Allow "@" in file names and pathallow-@Jacob Vosmaer2016-02-011-4/+4
| |
* | refactor previous test and add validation to project modelJames Lopez2016-01-291-2/+2
|/
* Add ability to create directories in the editorBen Ford2015-10-291-0/+17
| | | | | | | | | | | | | Simply type a name with a `/` directory separator and new directories will be created. This does not do the fancy UI work that github.com does, but it will get the job done. I could not find tests for file creation, so I didn't add a test for this slight behaviour modification. I did test directory traversals though, using both absolute paths like `/tmp/foo.txt` and relative paths like `../../foo.txt`. Neither case escaped the repository, though attempting to traverse with a relative path resulted in a 500 error that did not affect application stability upon reload.
* Fix (project_)name_regex to accept non-ASCII letters and dashJakub Jirutka2015-04-271-4/+4
|
* Revert "Rename namespace_regex to namespace_path_regex."Douwe Maan2015-04-241-4/+4
| | | | This reverts commit c0116926c743818b2593474946abb40b56d8fefa.
* Rename namespace_regex to namespace_path_regex.Douwe Maan2015-04-241-4/+4
|
* Revert "Revert disallowing usernames to end in period."Douwe Maan2015-04-241-2/+2
| | | | This reverts commit c75c6b840ba9ed82bb01eca52e968c2b0ec985e6.
* Revert disallowing usernames to end in period.revert-username-periodDouwe Maan2015-04-201-2/+2
|
* Don't allow username to end in period.Douwe Maan2015-03-271-2/+4
|
* Use more specific regexes.Douwe Maan2015-03-271-30/+34
|