summaryrefslogtreecommitdiff
path: root/spec/requests/api/settings_spec.rb
Commit message (Collapse)AuthorAgeFilesLines
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-03-021-22/+22
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-02-171-1/+1
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-01-161-8/+0
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-01-131-0/+8
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-12-171-0/+1
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-12-021-1/+4
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-11-151-0/+19
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-11-131-0/+3
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-11-121-48/+0
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-11-081-1/+1
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-11-081-0/+55
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-10-311-1/+2
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-10-291-0/+2
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-10-221-0/+48
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-10-171-1/+3
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-10-161-1/+3
|
* Settings API: domain_{black,white}list should be arraysMathieu Parent2019-09-091-0/+38
| | | | | | | | As in documentation. Fixes: #58180. Also remove the requirement between domain_blacklist_enabled and domain_blacklist.
* Add support for using a Camo proxy serverBrett Walker2019-08-231-0/+28
| | | | | | User images and videos will get proxied through the Camo server in order to keep malicious sites from collecting the IP address of users.
* Migrates Snowplow backend from EE to CEJeremy Jackson2019-08-141-0/+51
| | | | | This introduces several changes, but these are all just ported from the EE project.
* Add backwards compatibility for legacy settingGeorge Koltsov2019-08-021-1/+16
| | | | | `allow_local_requests_for_hooks_and_services` was renamed to `allow_local_requests_for_web_hooks_and_services`.
* CE port of Move EE specific lines in API::SettingsImre Farkas2019-05-301-0/+1
|
* Move Contribution Analytics related spec in ↵Imre Farkas2019-04-091-0/+33
| | | | spec/features/groups/group_page_with_external_authorization_service_spec to EE
* Add part of needed codeGosia Ksionek2019-04-051-1/+3
| | | | | | | | | | | | | | | | | Add columns to store project creation settings Add project creation level column in groups and default project creation column in application settings Remove obsolete line from schema Update migration with project_creation_level column existence check Rename migrations to avoid conflicts Update migration methods Update migration method
* Revert "Merge branch 'if-57131-external_auth_to_ce' into 'master'"Andreas Brandl2019-04-051-33/+0
| | | This reverts merge request !26823
* Move Contribution Analytics related spec in ↵Imre Farkas2019-04-051-0/+33
| | | | spec/features/groups/group_page_with_external_authorization_service_spec to EE
* Add local markdown versionlocal-markdown-versionJan Provaznik2019-02-061-1/+3
| | | | | | Cached markdown version is composed both from global and local markdown version. This allows admins to bump version locally when needed (e.g. when external URL is changed).
* API: Fix default branch protection setting for Admin APIRobert Schilling2019-01-151-1/+3
|
* Update specs to rails5 formatblackst0ne-convert-specs-rails5-styleblackst0ne2018-12-191-25/+29
| | | | | | | | | | Updates specs to use new rails5 format. The old format: `get :show, { some: params }, { some: headers }` The new format: `get :show, params: { some: params }, headers: { some: headers }`
* Remove Koding integration and documentationStan Hu2018-10-121-15/+0
| | | | | | This integration no longer works and does not appear to be supported. Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/39697
* Remove Git circuit breakerZeger-Jan van de Weg2018-10-101-4/+2
| | | | | | | Was introduced in the time that GitLab still used NFS, which is not required anymore in most cases. By removing this, the API it calls will return empty responses. This interface has to be removed in the next major release, expected to be 12.0.
* Make single diff patch limit configurableosw-configurable-single-diff-file-limitOswaldo Ferreira2018-10-011-1/+3
| | | | | | | | | | - Creates a new column to hold the single patch limit value on application_settings - Allows updating this value through the application_settings API - Calculates single diff patch collapsing limit based on diff_max_patch_bytes column - Updates diff limit documentation - Adds documentation (with warning) as of how one can update this limit
* Revert "Merge branch 'bvl-instance-stats-default' into 'master'"revert-77c75d2bBob Van Landuyt2018-08-061-1/+1
| | | This reverts merge request !21044
* Hide instance statistics on new installationsBob Van Landuyt2018-08-061-1/+1
| | | | | Making the migrations and the default do the right thing in the first place. This makes 20180806094307 a no-op.
* Add instance statistics settings to APIBob Van Landuyt2018-07-271-1/+4
|
* Revert "Merge branch '41416-making-instance-wide-data-tools-more-accessible' ↵Sean McGivern2018-07-271-4/+1
| | | | | into 'master'" This reverts merge request !20679
* Add instance statistics settings to APIBob Van Landuyt2018-07-271-1/+4
|
* Add a custom storage config instead of overwritingBob Van Landuyt2018-06-061-1/+3
| | | | | Otherwise the ApplicationSetting that is currently stored would be invalid as it specifies a storage that is not configured
* Ensure ApplicationSetting#performance_bar_allowed_group_id is properly set ↵Rémy Coutable2018-05-291-1/+25
| | | | | | when retrieved from cache Signed-off-by: Rémy Coutable <remy@rymai.me>
* Store application wide termsBob Van Landuyt2018-05-041-1/+5
| | | | | | | | This allows admins to define terms in the application settings. Every time the terms are adjusted, a new version is stored and becomes the 'active' version. This allows tracking which specific version was accepted by a user.
* Move the circuitbreaker check out in a separate processbvl-circuitbreaker-processBob Van Landuyt2017-12-081-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | Moving the check out of the general requests, makes sure we don't have any slowdown in the regular requests. To keep the process performing this checks small, the check is still performed inside a unicorn. But that is called from a process running on the same server. Because the checks are now done outside normal request, we can have a simpler failure strategy: The check is now performed in the background every `circuitbreaker_check_interval`. Failures are logged in redis. The failures are reset when the check succeeds. Per check we will try `circuitbreaker_access_retries` times within `circuitbreaker_storage_timeout` seconds. When the number of failures exceeds `circuitbreaker_failure_count_threshold`, we will block access to the storage. After `failure_reset_time` of no checks, we will clear the stored failures. This could happen when the process that performs the checks is not running.
* Allow password authentication to be disabled entirelyMarkus Koller2017-11-231-3/+3
|
* Refactor `have_http_status` into `have_gitlab_http_status` in the specsJacopo2017-10-201-4/+4
|
* Allow configuring the circuitbreaker through the API and UIBob Van Landuyt2017-10-171-1/+4
|
* Rework the permissions model for SSH key restrictionsNick Thomas2017-08-301-15/+12
| | | | | | | | | | | | | | | `allowed_key_types` is removed and the `minimum_<type>_bits` fields are renamed to `<tech>_key_restriction`. A special sentinel value (`-1`) signifies that the key type is disabled. This also feeds through to the UI - checkboxes per key type are out, inline selection of "forbidden" and "allowed" (i.e., no restrictions) are in. As with the previous model, unknown key types are disallowed, even if the underlying ssh daemon happens to support them. The defaults have also been changed from the lowest known bit size to "no restriction". So if someone does happen to have a 768-bit RSA key, it will continue to work on upgrade, at least until the administrator restricts them.
* Add settings for minimum key strength and allowed key typeNick Thomas2017-08-301-1/+16
| | | | | | | | This is an amalgamation of: * Cory Hinshaw: Initial implementation !5552 * Rémy Coutable: Updates !9350 * Nick Thomas: Resolve conflicts and add ED25519 support !13712
* Enable Layout/TrailingWhitespace cop and auto-correct offensesRobert Speicher2017-08-151-1/+1
|
* Add option to disable project export on instanceRobin Bobbitt2017-08-111-1/+4
|
* Remove deprecated `repository_storage` attributebvl-add-all-settings-to-apiBob Van Landuyt2017-07-271-3/+2
| | | | In favor of the new `repository_storages`
* Fixes needed when GitLab sign-in is not enabledRobin Bobbitt2017-07-131-3/+3
| | | | | | | | | When sign-in is disabled: - skip password expiration checks - prevent password reset requests - don’t show Password tab in User Settings - don’t allow login with username/password for Git over HTTP requests - render 404 on requests to Profiles::PasswordsController
* Help landing page customizationsRobin Bobbitt2017-06-141-1/+7
|