summaryrefslogtreecommitdiff
path: root/spec/initializers
Commit message (Collapse)AuthorAgeFilesLines
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-02-061-0/+207
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-01-291-0/+28
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-01-241-3/+19
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-01-201-1/+4
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-01-161-15/+9
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-12-271-1/+1
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-12-221-0/+1
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-12-171-1/+0
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-12-111-0/+1
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-12-071-2/+15
|
* Merge branch 'security-dns-rebind-ssrf-in-slack-notifications-ce' into 'master'GitLab Release Tools Bot2019-11-262-140/+39
|\ | | | | | | | | Use Gitlab::HTTP for all chat notifications See merge request gitlab/gitlabhq!3517
| * Use Gitlab::HTTP for all chat notificationsHordur Freyr Yngvason2019-11-212-140/+39
| |
* | Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-11-221-3/+3
|/
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-11-181-0/+48
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-10-301-0/+73
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-10-2012-0/+24
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-10-171-0/+33
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-09-231-0/+17
|
* Merge branch 'security-enable-image-proxy' into 'master'GitLab Release Tools Bot2019-08-291-0/+13
|\ | | | | | | | | | | | | Use image proxy to mitigate stealing ip addresses Closes #2812 See merge request gitlab/gitlabhq!2926
| * Add support for using a Camo proxy serverBrett Walker2019-08-231-0/+13
| | | | | | | | | | | | User images and videos will get proxied through the Camo server in order to keep malicious sites from collecting the IP address of users.
* | Merge branch 'security-ssrf-kubernetes-dns-12-3' into 'master'GitLab Release Tools Bot2019-08-291-0/+147
|\ \ | |/ |/| | | | | DNS Rebind SSRF in Kubernetes Integration See merge request gitlab/gitlabhq!3345
| * Column was renamed in 12.2Thong Kuah2019-08-211-1/+1
| |
| * Override hostname when connecting via KubeclientThong Kuah2019-08-211-0/+147
| | | | | | | | | | | | | | | | | | | | Kubeclient uses rest-client. We hack into to access the net/http object so that we can patch to connect to the resolved IP + set hostname_override. Add specs for discord. The discord integration also uses rest-client, so since we patched rest-client, spec that the DNS rebinding protection works
* | feat: SMIME signed notification emailsDiego Louzán2019-08-201-0/+46
|/ | | | | | - Add mail interceptor the signs outgoing email with SMIME - Add lib and helpers to work with SMIME data - New configuration params for setting up SMIME key and cert files
* Remove ignored circuit_breaker columnsZeger-Jan van de Weg2019-06-281-20/+0
| | | | | | The circuit breaker itself got removed a while ago, when that happened some parts got left behind. Using grep old stale settings and validations were found and are now removed.
* Store Let's Encrypt private key in settingsVladimir Shushlin2019-05-281-11/+0
| | | | | | | | | | | | | | | | Storing this key in secrets.yml was a bad idea, it would require users using HA setups to manually replicate secrets across nodes during update, it also needed support from omnibus package * Revert "Generate Let's Encrypt private key" This reverts commit 444959bfa0b79e827a2a1a7a314acac19390f976. * Add Let's Encrypt private key to settings as encrypted attribute * Generate Let's Encrypt private key in database migration
* Generate Let's Encrypt private keyVladimir Shushlin2019-05-091-0/+11
|
* Run rubocop -a on CE filessh-upgrade-rubocop-0.68.0-ceStan Hu2019-05-051-2/+2
|
* Support both 0 and NULL lock_versionsDouwe Maan2018-12-271-0/+44
|
* Always load the metrics the lastLin Jen-Shin2018-12-211-1/+1
| | | | | Because this could potentially load a model and we shouldn't load models before all the patches we have in places.
* Update specs to rails5 formatblackst0ne-convert-specs-rails5-styleblackst0ne2018-12-191-2/+2
| | | | | | | | | | Updates specs to use new rails5 format. The old format: `get :show, { some: params }, { some: headers }` The new format: `get :show, params: { some: params }, headers: { some: headers }`
* Revert "Prefer to use correlation-id in logs"Kamil Trzciński2018-12-061-3/+3
| | | | This reverts commit 3560b11922fd180eea5cafd0e763e0e601c5c4ee.
* Prefer to use correlation-id in logsKamil Trzciński2018-12-061-3/+3
| | | | This changes `correlation_id` to be `correlation-id` when passed via jobs
* Log and pass correlation-id between Unicorn, Sidekiq and GitalyKamil Trzciński2018-12-061-0/+38
| | | | | | | | The Correlation ID is taken or generated from received X-Request-ID. Then it is being passed to all executed services (sidekiq workers or gitaly calls). The Correlation ID is logged in all structured logs as `correlation_id`.
* Correctly handle data-loss scenarios when encrypting columnsNick Thomas2018-11-271-0/+30
| | | | | | | | | If the EncryptColumns background migration runs in a sidekiq with a stale view of the database schema, or when the purported destination columns don't actually exist, data loss can result. Attempt to work around these issues by reloading schema information before running the migration, and raising errors if the model reports that any of its source or destination columns are missing.
* Eliminate duplicated wordsTakuya Noguchi2018-11-221-1/+1
| | | | Signed-off-by: Takuya Noguchi <takninnovationresearch@gmail.com>
* Migrate storage nesting check to GitalyJacob Vosmaer (GitLab)2018-06-271-43/+0
|
* Fix Fog mockingKamil Trzciński2018-06-051-6/+6
|
* Update validatorpresigned-multipart-uploadsKamil Trzciński2018-06-041-3/+4
|
* Support presigned multipart uploadsKamil Trzciński2018-06-042-71/+89
|
* Merge branch 'sh-bump-ruby-2.4' into 'master'Stan Hu2018-06-011-1/+1
|\ | | | | | | | | Upgrade to Ruby 2.4.4 See merge request gitlab-org/gitlab-ce!19055
| * Upgrade to Ruby 2.4.4sh-bump-ruby-2.4Stan Hu2018-05-291-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | Fixes that make this work: * A change in Ruby (https://github.com/ruby/ruby/commit/ce635262f53b760284d56bb1027baebaaec175d1) requires passing in the exact required length for OpenSSL keys and IVs. * Ensure the secrets.yml is generated before any prepended modules are loaded. This is done by renaming the `secret_token.rb` initializer to `01_secret_token.rb`, which is a bit ugly but involves the least impact on other files.
* | Replace grape-route-helpers with our own grape-path-helpersStan Hu2018-05-301-14/+0
|/ | | | | | | | | | | This gem (https://gitlab.com/gitlab-org/grape-path-helpers) makes a number of changes: 1. Brings in @mdelaossa's changes in https://github.com/reprah/grape-route-helpers/pull/21 2. Fixes some broken specs and code for Grape 1.0+ 3. Optimizes the generation of paths by bringing in @dblessing's HashWithIndifferentAccess changes in https://gitlab.com/gitlab-org/gitlab-ce/issues/45718#note_70123793 Closes #45718
* Remove method call to deprecated methodZeger-Jan van de Weg2018-05-111-20/+0
| | | | | Given the settings initializer creates Gitaly Storage Settings objects already, the calls to path can be moved to that initializer.
* Replacing gollum libs for custom gitlab onesFrancisco Javier López2018-04-131-62/+0
|
* Add `direct_upload` setting for artifactsdirect-upload-of-artifactsKamil Trzciński2018-04-051-0/+71
|
* Merge branch '40781-os-to-ce' into 'master'Sean McGivern2018-03-271-0/+24
|\ | | | | | | | | | | | | Bring Object Storage to CE Closes #4171, #4163, #3370, #2841, and #29203 See merge request gitlab-org/gitlab-ce!17358
| * Merge branch '4879-support-private-https-urls-for-object-storage' into 'master'Sean McGivern2018-02-281-0/+24
| | | | | | | | | | | | | | Resolve ""Support private HTTPS urls for object storage"" Closes #4879 See merge request gitlab-org/gitlab-ee!4475
* | Route path lookups through legacy_disk_pathmark-legacy-git-accessJacob Vosmaer2018-03-212-8/+8
|/
* Fix grape-route-helper route shadowinggrape-router-helpers-bugfixMario de la Ossa2018-01-291-0/+14
| | | | | Bringing in https://github.com/reprah/grape-route-helpers/pull/21 as a monkey patch since the grape-route-helpers project seems to be abandoned