summaryrefslogtreecommitdiff
path: root/spec/requests/api/helpers_spec.rb
Commit message (Collapse)AuthorAgeFilesLines
* Add latest changes from gitlab-org/gitlab@14-1-stable-eev14.1.0-rc42GitLab Bot2021-07-201-0/+1
|
* Add latest changes from gitlab-org/gitlab@13-12-stable-eev13.12.0-rc42GitLab Bot2021-05-191-1/+1
|
* Add latest changes from gitlab-org/gitlab@13-10-stable-eev13.10.0-rc40GitLab Bot2021-03-161-18/+2
|
* Add latest changes from gitlab-org/gitlab@13-5-stable-eev13.5.0-rc42GitLab Bot2020-10-211-1/+62
|
* Add latest changes from gitlab-org/gitlab@13-4-stable-eeGitLab Bot2020-09-191-1/+1
|
* Add latest changes from gitlab-org/security/gitlab@13-3-stable-eeGitLab Bot2020-09-011-0/+21
|
* Add latest changes from gitlab-org/gitlab@13-3-stable-eeGitLab Bot2020-08-201-0/+1
|
* Add latest changes from gitlab-org/gitlab@13-2-stable-eeGitLab Bot2020-07-201-1/+1
|
* Add latest changes from gitlab-org/gitlab@13-0-stable-eeGitLab Bot2020-05-201-0/+4
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-02-251-1/+1
|
* Add latest changes from gitlab-org/gitlab@masterogolowinski-master-patch-80898GitLab Bot2019-12-161-2/+2
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-12-131-2/+2
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-12-111-11/+11
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-10-291-0/+2
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-09-261-0/+2
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-09-181-1/+1
|
* refactor: remove Sentry from application settingsRoger Meier2019-06-251-4/+2
|
* Add correlation id to all sentry errorsBob Van Landuyt2019-05-131-3/+2
| | | | | | | | Before this, we were only adding the correlation id to the "acceptable exceptions" which we handle in code. But we need to add it to the default raven context so the information would be available for uncaught exceptions.
* Migrate correlation and tracing code to LabKitan-use-labkitAndrew Newdigate2019-04-181-1/+1
| | | | | | | | | | | | | | | This change is a fairly straightforward refactor to extract the tracing and correlation-id code from the gitlab rails codebase into the new LabKit-Ruby project. The corresponding import into LabKit-Ruby was in https://gitlab.com/gitlab-org/labkit-ruby/merge_requests/1 The code itself remains very similar for now. Extracting it allows us to reuse it in other projects, such as Gitaly-Ruby. This will give us the advantages of correlation-ids and distributed tracing in that project too.
* Update specs to rails5 formatblackst0ne-convert-specs-rails5-styleblackst0ne2018-12-191-1/+1
| | | | | | | | | | Updates specs to use new rails5 format. The old format: `get :show, { some: params }, { some: headers }` The new format: `get :show, params: { some: params }, headers: { some: headers }`
* Log and pass correlation-id between Unicorn, Sidekiq and GitalyKamil Trzciński2018-12-061-16/+14
| | | | | | | | The Correlation ID is taken or generated from received X-Request-ID. Then it is being passed to all executed services (sidekiq workers or gitaly calls). The Correlation ID is logged in all structured logs as `correlation_id`.
* Add config to disable impersonationImre Farkas2018-11-291-0/+13
| | | | | | | | Adds gitlab.impersonation_enabled config option defaulting to true to keep the current default behaviour. Only the act of impersonation is modified, impersonation token management is not affected.
* Make getting a user by the username case insensitiveWilliam George2018-10-181-0/+16
|
* Updates from `rubocop -a`Lin Jen-Shin2018-07-091-1/+1
|
* Add username to terms message in git and API callsbvl-add-username-to-terms-messageBob Van Landuyt2018-05-241-1/+1
| | | | | | | | This will make it clearer to users which account is being used to make the API/git call. So they know which account needs to be used to accept the terms. Closes #46649
* Block access to API & git when terms are enforcedBob Van Landuyt2018-05-101-0/+18
| | | | | | When terms are enforced, but the user has not accepted the terms access to the API & git is rejected with a message directing the user to the web app to accept the terms.
* Save user ID and username in Grape API log (api_json.log)sh-store-user-in-api-logsStan Hu2018-01-081-0/+6
| | | | | | This will enable admins to identify who actually made the API request. Relates to #36960
* Moved Exceptions to Gitlab::AuthFrancisco Lopez2017-11-171-4/+4
|
* Moving exceptions to UserAuthFindersFrancisco Lopez2017-11-171-4/+4
|
* Homogenising the type of the request handled by UserAuthFinder. Also tests fixedFrancisco Lopez2017-11-171-16/+21
|
* First refactorFrancisco Lopez2017-11-171-0/+1
|
* Update specs for sudo behaviorDouwe Maan2017-11-021-235/+144
|
* Add sudo API scopeDouwe Maan2017-11-021-4/+4
|
* Remove authentication using user.private_tokenDouwe Maan2017-11-021-49/+4
|
* Move all API authentication code to APIGuardDouwe Maan2017-10-121-9/+9
|
* Send API parameters as extra data for sentry errorsapi-sentry-extraAlejandro Rodríguez2017-10-051-1/+27
|
* Ensure no exception is raised when Raven tries to get the current user in ↵38571-fix-exception-in-raven-reportRémy Coutable2017-09-291-0/+21
| | | | | | API context Signed-off-by: Rémy Coutable <remy@rymai.me>
* Make sure API responds with 401 when invalid authentication info is provideddm-api-unauthorizedDouwe Maan2017-09-281-38/+40
|
* Enable the Layout/SpaceBeforeBlockBraces coprc/enable-the-Layout/SpaceBeforeBlockBraces-copRémy Coutable2017-08-091-2/+2
| | | | Signed-off-by: Rémy Coutable <remy@rymai.me>
* Add specsDouwe Maan2017-07-271-6/+44
|
* Test OAuth token scope verification in the `API::Users` endpointTimothy Andrew2017-06-281-1/+3
|
* Allow API scope declarations to be applied conditionally.Timothy Andrew2017-06-281-1/+2
| | | | | | | | | | | - Scope declarations of the form: allow_access_with_scope :read_user, if: -> (request) { request.get? } will only apply for `GET` requests - Add a negative test to a `POST` endpoint in the `users` API to test this. Also test for this case in the `AccessTokenValidationService` unit tests.
* Correct RSpec/SingleLineHook cop offensesRobert Speicher2017-06-141-8/+30
|
* Auto-correct `RSpec/DescribedClass` violationsrs-described_class-cop-2Robert Speicher2017-05-011-1/+1
|
* Merge branch '29505-allow-admins-sudo-to-blocked-users' into 'master' Rémy Coutable2017-04-271-1/+27
|\ | | | | | | | | Allow admins to sudo to blocked users See merge request !10842
| * Allow admins to sudo to blocked users.29505-allow-admins-sudo-to-blocked-usersTimothy Andrew2017-04-261-1/+27
| | | | | | | | | | | | | | | | | | | | - Currently, (for example) admins can't delete snippets for blocked users, which is an unexpected limitation. - We modify `authenticate!` to conduct the `access_api` policy check against the `initial_current_user`, instead of the user being impersonated. - Update CHANGELOG for !10842
* | Unnecessary "include WaitForAjax" and "include ApiHelpers"Jacopo2017-04-211-1/+1
|/ | | | | Removed all the unnecessary include of `WaitForAjax` and `ApiHelpers` in the specs. Removed unnecessary usage of `api:true`
* fix a brittle stubhttp://jneen.net/2017-03-091-1/+1
| | | | | true is neither nil nor a user and doesn't make sense as the return value of `current_user`
* Fix specsKamil Trzcinski2017-01-191-1/+2
|
* Fix a Grape deprecation, use `#request_method` instead of `#route_method`fix-api-deprecationRémy Coutable2016-12-231-2/+2
| | | | Signed-off-by: Rémy Coutable <remy@rymai.me>