<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/gitlab/gitlab-ce.git/app/controllers/omniauth_callbacks_controller.rb, branch patch-53</title>
<subtitle>gitlab.com: gitlab-org/gitlab-ce.git
</subtitle>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/'/>
<entry>
<title>Externalize strings in flash messages</title>
<updated>2019-04-08T14:17:45+00:00</updated>
<author>
<name>Martin Wortschack</name>
<email>mwortschack@gitlab.com</email>
</author>
<published>2019-04-08T14:17:45+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=76e8960f4ab30e91e7e9aca0ae82e10ba23d460d'/>
<id>76e8960f4ab30e91e7e9aca0ae82e10ba23d460d</id>
<content type='text'>
- Externalize strings in controllers
- Update PO file
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
- Externalize strings in controllers
- Update PO file
</pre>
</div>
</content>
</entry>
<entry>
<title>Move out link\unlink ability checks to a policy</title>
<updated>2019-03-19T12:38:16+00:00</updated>
<author>
<name>Pavel Shutsin</name>
<email>pshutsin@gitlab.com</email>
</author>
<published>2019-03-18T14:36:34+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=8ee1927db90d43205b4e6f8bd13f209c74b41bd1'/>
<id>8ee1927db90d43205b4e6f8bd13f209c74b41bd1</id>
<content type='text'>
We can extend the policy in EE for additional behavior
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We can extend the policy in EE for additional behavior
</pre>
</div>
</content>
</entry>
<entry>
<title>Backport build_auth_user for GroupSAML callback</title>
<updated>2019-02-06T17:28:35+00:00</updated>
<author>
<name>James Edwards-Jones</name>
<email>jedwardsjones@gitlab.com</email>
</author>
<published>2019-02-06T17:28:35+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=24f3f9600484efcf088c73509a4f3c72fc30fff0'/>
<id>24f3f9600484efcf088c73509a4f3c72fc30fff0</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Avoid CSRF check on SAML failure endpoint</title>
<updated>2019-02-04T10:10:51+00:00</updated>
<author>
<name>James Edwards-Jones</name>
<email>jedwardsjones@gitlab.com</email>
</author>
<published>2019-01-19T20:41:39+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=6548e01f18c24ec8703bb85557d7509dbeace013'/>
<id>6548e01f18c24ec8703bb85557d7509dbeace013</id>
<content type='text'>
SAML and OAuth failures should cause a message to be presented, as well
as logging that an attempt was made. These were incorrectly prevented by
the CSRF check on POST endpoints such as SAML.

In addition we were using a NullSession forgery protection, which made
testing more difficult and could have allowed account linking to take
place if a CSRF was ever needed but not present.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
SAML and OAuth failures should cause a message to be presented, as well
as logging that an attempt was made. These were incorrectly prevented by
the CSRF check on POST endpoints such as SAML.

In addition we were using a NullSession forgery protection, which made
testing more difficult and could have allowed account linking to take
place if a CSRF was ever needed but not present.
</pre>
</div>
</content>
</entry>
<entry>
<title>Addressing peer review feedback.</title>
<updated>2019-01-10T06:00:39+00:00</updated>
<author>
<name>Scott Escue</name>
<email>scott.escue@gmail.com</email>
</author>
<published>2018-06-04T21:28:18+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=4dcaa4df3622ae267363fcff184d0929b2102035'/>
<id>4dcaa4df3622ae267363fcff184d0929b2102035</id>
<content type='text'>
Replacing inline JS with ES 2015 functions included in pages/sessions/new. Also applying suggested server-side syntax improvements to OmniAuthCallbacksController.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Replacing inline JS with ES 2015 functions included in pages/sessions/new. Also applying suggested server-side syntax improvements to OmniAuthCallbacksController.
</pre>
</div>
</content>
</entry>
<entry>
<title>Preserve URL fragment across sign-in and sign-up redirects</title>
<updated>2019-01-10T06:00:38+00:00</updated>
<author>
<name>Scott Escue</name>
<email>scott.escue@gmail.com</email>
</author>
<published>2018-05-22T20:04:19+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=6540a9468a8bce3f496423179db1862cfb9f5c8c'/>
<id>6540a9468a8bce3f496423179db1862cfb9f5c8c</id>
<content type='text'>
If window.location contains a URL fragment, append the fragment to all sign-in forms, the sign-up form, and all button based providers.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
If window.location contains a URL fragment, append the fragment to all sign-in forms, the sign-up form, and all button based providers.
</pre>
</div>
</content>
</entry>
<entry>
<title>Enable frozen string in app/controllers/**/*.rb</title>
<updated>2018-09-19T04:22:45+00:00</updated>
<author>
<name>gfyoung</name>
<email>gfyoung17@gmail.com</email>
</author>
<published>2018-09-14T05:42:05+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=73322a0e551bbbc42d429b15e7ad9fd375ab761d'/>
<id>73322a0e551bbbc42d429b15e7ad9fd375ab761d</id>
<content type='text'>
Enables frozen string for the following:

* app/controllers/*.rb
* app/controllers/admin/**/*.rb
* app/controllers/boards/**/*.rb
* app/controllers/ci/**/*.rb
* app/controllers/concerns/**/*.rb

Partially addresses #47424.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Enables frozen string for the following:

* app/controllers/*.rb
* app/controllers/admin/**/*.rb
* app/controllers/boards/**/*.rb
* app/controllers/ci/**/*.rb
* app/controllers/concerns/**/*.rb

Partially addresses #47424.
</pre>
</div>
</content>
</entry>
<entry>
<title>Honor saml assurance level to allow 2FA bypassing</title>
<updated>2018-06-25T15:32:03+00:00</updated>
<author>
<name>Roger Rüttimann</name>
<email>roger.ruettimann@gmail.com</email>
</author>
<published>2018-06-25T15:32:03+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=2efe27ba181daa18db9e227b13be428ebdfc23f1'/>
<id>2efe27ba181daa18db9e227b13be428ebdfc23f1</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>[Rails5] Force the `protect_from_forgery` callback run first</title>
<updated>2018-06-21T10:44:31+00:00</updated>
<author>
<name>blackst0ne</name>
<email>blackst0ne.ru@gmail.com</email>
</author>
<published>2018-06-21T10:44:31+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=6fef87f17fa6fde7c15668faa43b563eebc0a918'/>
<id>6fef87f17fa6fde7c15668faa43b563eebc0a918</id>
<content type='text'>
Since Rails 5.0 the `protect_from_forgery` callback doesn't run first by
default anymore. [1]

Instead it gets inserted into callbacks chain where callbacks get
called in order.

This commit forces the callback to run first.

[1]: https://github.com/rails/rails/commit/39794037817703575c35a75f1961b01b83791191
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Since Rails 5.0 the `protect_from_forgery` callback doesn't run first by
default anymore. [1]

Instead it gets inserted into callbacks chain where callbacks get
called in order.

This commit forces the callback to run first.

[1]: https://github.com/rails/rails/commit/39794037817703575c35a75f1961b01b83791191
</pre>
</div>
</content>
</entry>
<entry>
<title>Backport helpers from GroupSAML failure messages</title>
<updated>2018-05-21T15:43:12+00:00</updated>
<author>
<name>James Edwards-Jones</name>
<email>jedwardsjones@gitlab.com</email>
</author>
<published>2018-04-22T23:17:49+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/gitlab/gitlab-ce.git/commit/?id=b98a88cfe9033b5d694ac237a50ad4fe923ad95d'/>
<id>b98a88cfe9033b5d694ac237a50ad4fe923ad95d</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
