<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/gitlab/gitlab-ce.git, branch complexity/descrease-abc-size-threshold</title>
<subtitle>gitlab.com: gitlab-org/gitlab-ce.git
</subtitle>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/'/>
<entry>
<title>Decrease threshold for ABC Size metric in Rubocop</title>
<updated>2016-04-11T08:27:13+00:00</updated>
<author>
<name>Grzegorz Bizon</name>
<email>grzesiek.bizon@gmail.com</email>
</author>
<published>2016-04-07T15:13:57+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=0e8aaad51044bbbd5fc544c322d2a17d1c1ce22a'/>
<id>0e8aaad51044bbbd5fc544c322d2a17d1c1ce22a</id>
<content type='text'>
To 60.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
To 60.
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'master' of dev.gitlab.org:gitlab/gitlabhq</title>
<updated>2016-04-07T12:10:28+00:00</updated>
<author>
<name>Grzegorz Bizon</name>
<email>grzesiek.bizon@gmail.com</email>
</author>
<published>2016-04-07T12:10:28+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=b30ebdaa1a704f4e81e91153b1b33a4c1c1a5c12'/>
<id>b30ebdaa1a704f4e81e91153b1b33a4c1c1a5c12</id>
<content type='text'>
* 'master' of dev.gitlab.org:gitlab/gitlabhq:
  Make sessions controller specs more explicit
  Fix 2FA authentication spoofing vulnerability
  Add specs for sessions controller  including 2FA
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* 'master' of dev.gitlab.org:gitlab/gitlabhq:
  Make sessions controller specs more explicit
  Fix 2FA authentication spoofing vulnerability
  Add specs for sessions controller  including 2FA
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'fix/2fa-authentication-spoofing' into 'master'</title>
<updated>2016-04-07T11:56:44+00:00</updated>
<author>
<name>Rémy Coutable</name>
<email>remy@gitlab.com</email>
</author>
<published>2016-04-07T11:56:44+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=237324cc17c57d0ac96c413864b67388d278bfb1'/>
<id>237324cc17c57d0ac96c413864b67388d278bfb1</id>
<content type='text'>

Fix 2FA authentication spoofing

## Summary

This is security fix for vulnerability described at 
https://gitlab.com/gitlab-org/gitlab-ce/issues/14900.

Attacker was able to bypass password authentication of users that have 2FA enabled, and consequently sign is as a different user, without knowing his password, if he managed to guess 2FA One Time Password for that user.

It was also possible to enumerate users and check if they have 2FA enabled, because GitLab responded with different error for each case.

## Fix

This MR attempts to change default user search scope if `otp_user_id` session variable has been set. If it is present, it means that user has 2FA enabled, and has already been verified with login and password. In this case we should look for user with `otp_user_id` first, before picking it up by `login`.

Both, 2FA authentication spoofing and 2FA discovery have been covered by specs.

## Further work

Current 2FA code is a bit tricky, so it probably needs some refactoring.



See merge request !1947</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>

Fix 2FA authentication spoofing

## Summary

This is security fix for vulnerability described at 
https://gitlab.com/gitlab-org/gitlab-ce/issues/14900.

Attacker was able to bypass password authentication of users that have 2FA enabled, and consequently sign is as a different user, without knowing his password, if he managed to guess 2FA One Time Password for that user.

It was also possible to enumerate users and check if they have 2FA enabled, because GitLab responded with different error for each case.

## Fix

This MR attempts to change default user search scope if `otp_user_id` session variable has been set. If it is present, it means that user has 2FA enabled, and has already been verified with login and password. In this case we should look for user with `otp_user_id` first, before picking it up by `login`.

Both, 2FA authentication spoofing and 2FA discovery have been covered by specs.

## Further work

Current 2FA code is a bit tricky, so it probably needs some refactoring.



See merge request !1947</pre>
</div>
</content>
</entry>
<entry>
<title>Make sessions controller specs more explicit</title>
<updated>2016-04-07T11:16:48+00:00</updated>
<author>
<name>Grzegorz Bizon</name>
<email>grzesiek.bizon@gmail.com</email>
</author>
<published>2016-04-07T09:45:04+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=33a8dfd04fbd1c0858ead20c020ede07e7b0962a'/>
<id>33a8dfd04fbd1c0858ead20c020ede07e7b0962a</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'fix-project-404-cache-issue' into 'master'</title>
<updated>2016-04-07T10:31:04+00:00</updated>
<author>
<name>Yorick Peterse</name>
<email>yorickpeterse@gmail.com</email>
</author>
<published>2016-04-07T10:31:04+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=a918e8bf277418048776a5d9c34a64b39f4e56f3'/>
<id>a918e8bf277418048776a5d9c34a64b39f4e56f3</id>
<content type='text'>

Expire caches after project creation to ensure a consistent state

See merge request !3586</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>

Expire caches after project creation to ensure a consistent state

See merge request !3586</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'update_main_lang_if_unset' into 'master'</title>
<updated>2016-04-07T09:41:51+00:00</updated>
<author>
<name>Rémy Coutable</name>
<email>remy@rymai.me</email>
</author>
<published>2016-04-07T09:41:51+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=144912851c388327c31387094ed9054a8e2b322c'/>
<id>144912851c388327c31387094ed9054a8e2b322c</id>
<content type='text'>

Only update main language if it is not already set

Related to gitlab-org/gitlab-ce#14937 (but does not fully fix) This is a temporary fix so performance isn't affected so much. 

cc @yorickpeterse @ayufan how does this look?

See merge request !3556</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>

Only update main language if it is not already set

Related to gitlab-org/gitlab-ce#14937 (but does not fully fix) This is a temporary fix so performance isn't affected so much. 

cc @yorickpeterse @ayufan how does this look?

See merge request !3556</pre>
</div>
</content>
</entry>
<entry>
<title>Fix 2FA authentication spoofing vulnerability</title>
<updated>2016-04-07T09:19:29+00:00</updated>
<author>
<name>Grzegorz Bizon</name>
<email>grzesiek.bizon@gmail.com</email>
</author>
<published>2016-04-07T09:19:29+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=00da609cfd8bf1105fe433dfc92ab263d6205eaf'/>
<id>00da609cfd8bf1105fe433dfc92ab263d6205eaf</id>
<content type='text'>
This commit attempts to change default user search scope if otp_user_id
session variable has been set. If it is present, it means that user has
2FA enabled, and has already been verified with login and password. In
this case we should look for user with otp_user_id first, before picking
it up by login.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This commit attempts to change default user search scope if otp_user_id
session variable has been set. If it is present, it means that user has
2FA enabled, and has already been verified with login and password. In
this case we should look for user with otp_user_id first, before picking
it up by login.
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'api-filter-milestone' into 'master'</title>
<updated>2016-04-07T08:45:35+00:00</updated>
<author>
<name>Rémy Coutable</name>
<email>remy@rymai.me</email>
</author>
<published>2016-04-07T08:45:35+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=92897d7683bdf17da9708e065465d55ecd808dff'/>
<id>92897d7683bdf17da9708e065465d55ecd808dff</id>
<content type='text'>

API: Ability to filter milestones by state

Ability to filter milestones by `active` and `closed` state.

* Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/14931

See merge request !3566</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>

API: Ability to filter milestones by state

Ability to filter milestones by `active` and `closed` state.

* Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/14931

See merge request !3566</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'feature/expose-builds-badge' into 'master'</title>
<updated>2016-04-07T08:40:15+00:00</updated>
<author>
<name>Rémy Coutable</name>
<email>remy@rymai.me</email>
</author>
<published>2016-04-07T08:40:15+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=8eae7b10888826bf3497fc219ee59435288c4cc6'/>
<id>8eae7b10888826bf3497fc219ee59435288c4cc6</id>
<content type='text'>

Expose badges

This MR exposes badge somewhere in visible place.

![expose_badges](/uploads/d2e290d3013d1ef2b1bdeebbbe2c5d8b/expose_badges.png)

Closes #13801

See merge request !3326</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>

Expose badges

This MR exposes badge somewhere in visible place.

![expose_badges](/uploads/d2e290d3013d1ef2b1bdeebbbe2c5d8b/expose_badges.png)

Closes #13801

See merge request !3326</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'fix_14638' into 'master'</title>
<updated>2016-04-07T08:35:38+00:00</updated>
<author>
<name>Rémy Coutable</name>
<email>remy@rymai.me</email>
</author>
<published>2016-04-07T08:35:38+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=d62a3decf945b448a7fcf2fdcf4c523d0b7d2eae'/>
<id>d62a3decf945b448a7fcf2fdcf4c523d0b7d2eae</id>
<content type='text'>

Fixes #14638.

The SQL query was ambiguous and in this case we want to filter projects.

See merge request !3462</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>

Fixes #14638.

The SQL query was ambiguous and in this case we want to filter projects.

See merge request !3462</pre>
</div>
</content>
</entry>
</feed>
