- 29 4月, 2017 1 次提交
-
-
由 Stan Hu 提交于
This reverts merge request !10845
-
- 28 4月, 2017 2 次提交
-
-
由 Tiago Botelho 提交于
-
由 Douwe Maan 提交于
-
- 27 4月, 2017 7 次提交
-
-
由 Timothy Andrew 提交于
- We upgraded `rugged` to 0.25.1.1 in !10286 for %9.1 - Prior to this upgrade, the default sort order for commits returned by `Gitlab::Git::Repository#find_commits` was `Rugged::SORT_DATE`, which the graph relied on. - While upgrading `rugged`, the MR also changed this default to `Rugged::SORT_NONE`, which broke commit ordering in the graph. - This commit adds an option to `Gitlab::Git::Repository#find_commits` to sort by date, and changes the graph builder `Network::Graph` so it explictly requests the `:date` sort order
-
由 Toon Claes 提交于
-
由 Douwe Maan 提交于
-
由 Toon Claes 提交于
Because the post-processing of the rendered README is dependent on the context (i.e. the current user), do the post-processing when the README is being displayed.
-
由 Toon Claes 提交于
TodoService should not call `.select(&:id)` on todos, because this is bad performance. So instead use sub-queries, which will result in a single SQL query to the database. https://docs.gitlab.com/ee/development/sql.html#plucking-ids
-
由 Luigi Leoni 提交于
-
-
- 26 4月, 2017 18 次提交
-
-
由 Zeger-Jan van de Weg 提交于
-
由 Jacob Vosmaer 提交于
-
由 Bob Van Landuyt 提交于
-
由 Maxim Rydkin 提交于
-
由 Maxim Rydkin 提交于
-
由 Timothy Andrew 提交于
- Currently, (for example) admins can't delete snippets for blocked users, which is an unexpected limitation. - We modify `authenticate!` to conduct the `access_api` policy check against the `initial_current_user`, instead of the user being impersonated. - Update CHANGELOG for !10842
-
由 Lin Jen-Shin 提交于
-
-
-
由 Jeff Stubler 提交于
-
-
由 Robert Schilling 提交于
-
-
-
-
由 Lin Jen-Shin 提交于
-
-
-
- 25 4月, 2017 12 次提交
-
-
由 Sean McGivern 提交于
The problem is that we often go via a diff object constructed from the diffs stored in the DB. Those diffs, by definition, don't overflow, so we don't have access to the 'correct' `real_size` - that is stored on the MR diff object iself.
-
由 Lin Jen-Shin 提交于
Closes #31280
-
由 blackst0ne 提交于
-
由 Timothy Andrew 提交于
- To prevent an attacker from enumerating the `/users` API to get a list of all the admins. - Display the `is_admin?` flag wherever we display the `private_token` - at the moment, there are two instances: - When an admin uses `sudo` to view the `/user` endpoint - When logging in using the `/session` endpoint
-
由 Achilleas Pipinellis 提交于
Instead of doing hacks like http://stackoverflow.com/a/26082612/974710
-
-
-
由 Douwe Maan 提交于
-
-
-
-
-