- 03 9月, 2019 1 次提交
-
-
由 Giorgenes Gelatti 提交于
Extends the permission of $CI_REGISTRY_USER to allow them to delete tags in addition to just pushing. https://gitlab.com/gitlab-org/gitlab-ce/issues/40096
-
- 23 8月, 2019 1 次提交
-
-
由 Marius Bobin 提交于
-
- 26 7月, 2019 1 次提交
-
-
由 Thong Kuah 提交于
Using the sed script from https://gitlab.com/gitlab-org/gitlab-ce/issues/59758
-
- 18 7月, 2019 1 次提交
-
-
由 Krasimir Angelov 提交于
Ensure correct behaviour when deploy tokens have the same username or deploy token and user have the same username.
-
- 03 7月, 2019 1 次提交
-
-
由 Krasimir Angelov 提交于
This new attribute is optional and used when set instead of the default format `gitlab+deploy-token-#{id}`. Empty usernames will be saved as null in the database. Related to https://gitlab.com/gitlab-org/gitlab-ce/issues/50228.
-
- 15 4月, 2019 1 次提交
-
-
由 Horatiu Eugen Vlad 提交于
-
- 07 2月, 2019 1 次提交
-
-
由 GotenXiao 提交于
-
- 24 1月, 2019 1 次提交
-
-
由 Rémy Coutable 提交于
Signed-off-by: NRémy Coutable <remy@rymai.me>
-
- 07 4月, 2018 9 次提交
-
-
由 Kamil Trzciński 提交于
-
由 Mayra Cabrera 提交于
Also, fixes broken specs
-
由 Mayra Cabrera 提交于
-
由 Mayra Cabrera 提交于
Also: - Changes scopes from serializer to use boolean columns - Fixes broken specs
-
由 Kamil Trzciński 提交于
-
由 Mayra Cabrera 提交于
- Remove extra method for authorize_admin_project - Ensure project presence - Rename 'read_repo' to 'read_repository' to be more verbose
-
由 Mayra Cabrera 提交于
- When using 'read_repo' password and project are sent, so we used both of them to fetch for the token - When using 'read_registry' only the password is sent, so we only use that for fetching the token
-
由 Mayra Cabrera 提交于
-
由 Mayra Cabrera 提交于
This will allow to download a repo using the token from the DeployToken
-
- 27 3月, 2018 1 次提交
-
-
由 Horatiu Eugen Vlad 提交于
-
- 28 2月, 2018 1 次提交
-
-
由 Horatiu Eugen Vlad 提交于
-
- 17 1月, 2018 1 次提交
-
-
由 Douwe Maan 提交于
[10.3] Migrate `can_push` column from `keys` to `deploy_keys_project` See merge request gitlab/gitlabhq!2276 (cherry picked from commit f6ca52d31bac350a23938e0aebf717c767b4710c) 1f2bd3c0 Backport to 10.3
-
- 23 11月, 2017 2 次提交
-
-
由 Douwe Maan 提交于
-
由 Markus Koller 提交于
-
- 09 11月, 2017 1 次提交
-
-
由 Stan Hu 提交于
-
- 02 11月, 2017 2 次提交
-
-
由 Douwe Maan 提交于
-
由 Douwe Maan 提交于
-
- 18 9月, 2017 1 次提交
-
-
由 Robin Bobbitt 提交于
Closes #37789
-
- 01 9月, 2017 1 次提交
-
-
由 Tiago Botelho 提交于
-
- 22 8月, 2017 1 次提交
-
-
由 Robin Bobbitt 提交于
-
- 03 8月, 2017 1 次提交
-
-
由 Robert Speicher 提交于
-
- 02 8月, 2017 1 次提交
-
-
由 Lin Jen-Shin 提交于
full_authentication_abilities. This is fine because we're going to check with can?(..) anyway
-
- 27 7月, 2017 1 次提交
-
-
由 Rémy Coutable 提交于
Remove superfluous lib: true, type: redis, service: true, models: true, services: true, no_db: true, api: true Signed-off-by: NRémy Coutable <remy@rymai.me>
-
- 13 7月, 2017 1 次提交
-
-
由 Robin Bobbitt 提交于
When sign-in is disabled: - skip password expiration checks - prevent password reset requests - don’t show Password tab in User Settings - don’t allow login with username/password for Git over HTTP requests - render 404 on requests to Profiles::PasswordsController
-
- 08 6月, 2017 1 次提交
-
-
由 Robin Bobbitt 提交于
If internal auth is disabled and LDAP is not configured on the instance, present the user with a message to create a personal access token if his Git over HTTP auth attempt fails.
-
- 06 6月, 2017 1 次提交
-
-
由 Z.J. van de Weg 提交于
-
- 05 6月, 2017 1 次提交
-
-
由 Z.J. van de Weg 提交于
This is the first commit doing mainly 3 things: 1. create a new scope and allow users to use it 2. Have the JWTController respond correctly on this 3. Updates documentation to suggest usage of PATs There is one gotcha, there will be no support for impersonation tokens, as this seems not needed. Fixes gitlab-org/gitlab-ce#19219
-
- 11 5月, 2017 1 次提交
-
-
由 Rémy Coutable 提交于
Use the EnforcedStyleForMultiline: no_comma option. Signed-off-by: NRémy Coutable <remy@rymai.me>
-
- 13 4月, 2017 1 次提交
-
-
由 Timothy Andrew 提交于
- We currently support fetching code with username = 'oauth2' and password = <access_token>. - Trying to _push_ code with the same credentials fails with an authentication error. - There's no reason this shouldn't be enabled, especially since we allow the OAuth client to create deploy keys with push access: https://docs.gitlab.com/ce/api/deploy_keys.html#add-deploy-key
-
- 07 3月, 2017 3 次提交
-
-
由 Markus Koller 提交于
-
由 Markus Koller 提交于
Gitlab::Auth.find_with_user_password is currently used in these places: - resource_owner_from_credentials in config/initializers/doorkeeper.rb, which is used for the OAuth Resource Owner Password Credentials flow - the /session API call in lib/api/session.rb, which is used to reveal the user's current authentication_token In both cases users should only be authenticated if they're in the active state.
-
由 Tiago Botelho 提交于
-