1. 14 2月, 2019 2 次提交
  2. 13 2月, 2019 2 次提交
  3. 07 2月, 2019 3 次提交
  4. 05 2月, 2019 2 次提交
  5. 04 2月, 2019 1 次提交
  6. 31 1月, 2019 9 次提交
  7. 30 1月, 2019 1 次提交
  8. 25 1月, 2019 1 次提交
    • K
      Add Container Registry API · 045d07ba
      Kamil Trzciński 提交于
      This includes a set of APIs to manipulate container registry.
      This includes also an ability to delete tags based on requested
      criteria, like keep-last-n, matching-name, older-than.
      045d07ba
  9. 24 1月, 2019 2 次提交
  10. 23 1月, 2019 1 次提交
    • N
      Verify that LFS upload requests are genuine · 87c5abfc
      Nick Thomas 提交于
      LFS uploads are handled in concert by workhorse and rails. In normal
      use, workhorse:
      
      * Authorizes the request with rails (upload_authorize)
      * Handles the upload of the file to a tempfile - disk or object storage
      * Validates the file size and contents
      * Hands off to rails to complete the upload (upload_finalize)
      
      In `upload_finalize`, the LFS object is linked to the project. As LFS
      objects are deduplicated across all projects, it may already exist. If
      not, the temporary file is copied to the correct place, and will be
      used by all future LFS objects with the same OID.
      
      Workhorse uses the Content-Type of the request to decide to follow this
      routine, as the URLs are ambiguous. If the Content-Type is anything but
      "application/octet-stream", the request is proxied directly to rails,
      on the assumption that this is a normal file edit request. If it's an
      actual LFS request with a different content-type, however, it is routed
      to the Rails `upload_finalize` action, which treats it as an LFS upload
      just as it would a workhorse-modified request.
      
      The outcome is that users can upload LFS objects that don't match the
      declared size or OID. They can also create links to LFS objects they
      don't really own, allowing them to read the contents of files if they
      know just the size or OID.
      
      We can close this hole by requiring requests to `upload_finalize` to be
      sourced from Workhorse. The mechanism to do this already exists.
      87c5abfc
  11. 22 1月, 2019 3 次提交
  12. 21 1月, 2019 1 次提交
  13. 20 1月, 2019 1 次提交
  14. 17 1月, 2019 3 次提交
    • B
      API for importing external repos · 1e2bd853
      Ben 提交于
      1e2bd853
    • J
      Actually set raise_on_unfiltered_parameters to true · 4724afa0
      Jasper Maes 提交于
      4724afa0
    • A
      Return max group access level in the projects API · ab94a5a5
      Alejandro Rodríguez 提交于
      Currently if a project is inside a nested group and a user doesn't have
      specific permissions for that group but does have permissions on a
      parent group the `GET /projects/:id` API call will return the following
      permissions:
      
      ```json
      permissions: { project_access: null, group_access: null }
      ```
      
      It could also happen that the group specific permissions are of lower
      level than the ones the user has in parent groups. This patch makes it
      so that the permission returned for `group_access` is the highest from
      amongst the hierarchy, which is (ostensibly) the information that the
      API user is interested in for that field.
      ab94a5a5
  15. 16 1月, 2019 3 次提交
  16. 15 1月, 2019 2 次提交
  17. 14 1月, 2019 2 次提交
  18. 11 1月, 2019 1 次提交