Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Fix filename for accelerated uploads | Jan Provaznik | 2018-07-18 | 1 | -1/+11 |
| | |||||
* | Added test and used Array() instead of .wrap | Jan Provaznik | 2018-07-09 | 1 | -1/+1 |
| | |||||
* | Add FileUploader.root to allowed upload paths | Jan Provaznik | 2018-07-08 | 1 | -2/+3 |
| | | | | | | | | | | | | | | | | Currently we check if uploaded file is under `Gitlab.config.uploads.storage_path`, the problem is that uploads are placed in `uploads` subdirectory which is symlink. In allow_path? method we check real (expanded) paths, which causes that `Gitlab.config.uploads.storage_path` is expaned into symlink path and there is a mismatch with upload file path. By adding `Gitlab.config.uploads.storage_path/uploads` into allowed paths, this path is expaned during path check. `Gitlab.config.uploads.storage_path` is left there intentionally in case some uploader wouldn't use `uploads` subdir. | ||||
* | Add `direct_upload` setting for artifactsdirect-upload-of-artifacts | Kamil TrzciĆski | 2018-04-05 | 1 | -3/+37 |
| | |||||
* | Whitelist or fix additional `Gitlab/PublicSend` cop violationsrs-more-public-send-whitelists | Robert Speicher | 2017-08-14 | 1 | -1/+1 |
| | | | | | An upcoming update to rubocop-gitlab-security added additional violations. | ||||
* | Enable Style/EmptyLines cop, remove redundant onesrubocop/enable-cops-for-empty-lines | Grzegorz Bizon | 2016-07-01 | 1 | -1/+0 |
| | |||||
* | Implement Build Artifacts | Kamil Trzcinski | 2015-11-10 | 1 | -0/+37 |
- Offloads uploading to GitLab Workhorse - Use /authorize request for fast uploading - Added backup recipes for artifacts - Support download acceleration using X-Sendfile |