An error occurred fetching the project authors.
- 08 Dec, 2017 1 commit
-
-
Mayra Cabrera authored
-
- 07 Dec, 2017 1 commit
-
-
James Lopez authored
-
- 24 Oct, 2017 1 commit
-
-
Alejandro Rodríguez authored
We also delete some unused code related to the aforementioned feature.
-
- 06 Oct, 2017 1 commit
-
-
Toon Claes authored
In GitLab EE, a GitLab instance can be read-only (e.g. when it's a Geo secondary node). But in GitLab CE it also might be useful to have the "read-only" idea around. So port it back to GitLab CE. Also having the principle of read-only in GitLab CE would hopefully lead to less errors introduced, doing write operations when there aren't allowed for read-only calls. Closes gitlab-org/gitlab-ce#37534.
-
- 28 Sep, 2017 1 commit
-
-
Gabriel Mazetto authored
This is used in EE for the storage migration, and we want to use this in CE as well to be able to migrate projects to hashed_storage.
-
- 30 Aug, 2017 2 commits
-
-
Nick Thomas authored
-
Nick Thomas authored
This is an amalgamation of: * Cory Hinshaw: Initial implementation !5552 * Rémy Coutable: Updates !9350 * Nick Thomas: Resolve conflicts and add ED25519 support !13712
-
- 18 Aug, 2017 1 commit
-
-
Robert Speicher authored
- Adds a new `ProjectMovedError` class to encapsulate that error condition. Inherits from `NotFoundError` so existing rescues should continue to work. - Separating that condition out of `NotFoundError` allowed us to simplify the `raise_not_found` helper and avoid repeating the literal string. - Spec makes use of `ERROR_MESSAGES` hash to avoid repeating literal error message strings.
-
- 16 Jun, 2017 1 commit
-
-
Michael Kozono authored
-
- 05 Jun, 2017 9 commits
-
-
Michael Kozono authored
Because it is sometimes never used.
-
Michael Kozono authored
-
Michael Kozono authored
-
Michael Kozono authored
https://gitlab.com/gitlab-org/gitlab-ce/commit/57e3e942de1adef2c8621905370f07d7da7870c4 I changed it to a separate condition rather than depending on the order of the case-when statements to prevent this mistake again.
-
Michael Kozono authored
And refactor to self-document a little better.
-
Michael Kozono authored
No external behavior change. This allows `GitHttpController` to set the HTTP status based on the type of error. Alternatively, we could have added an attribute to GitAccessStatus, but this pattern seemed appropriate.
-
Michael Kozono authored
-
Michael Kozono authored
-
Michael Kozono authored
* The spec has 7 failures at this point * Specify rendered error messages * Render the GitAccess message rather than “Access denied” * Render the Not Found message provided by GitAccess, instead of a custom one * Expect GitAccess to check the config for whether Git-over-HTTP pull or push is disabled, rather than doing it in the controller * Add more thorough testing for authentication * Dried up a lot of tests * Fixed some broken tests
-
- 10 Apr, 2017 1 commit
-
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- 13 Mar, 2017 1 commit
-
-
Adam Niedzielski authored
-
- 23 Feb, 2017 1 commit
-
-
Douwe Maan authored
-
- 20 Dec, 2016 2 commits
-
-
Lin Jen-Shin authored
-
Lin Jen-Shin authored
and move those checks to be private. Feedback: https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/7383#note_20285012 https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/7383#note_20285279
-
- 16 Dec, 2016 1 commit
-
-
Timothy Andrew authored
1. Starting version 2.11, git changed the way the pre-receive flow works. - Previously, the new potential objects would be added to the main repo. If the pre-receive passes, the new objects stay in the repo but are linked up. If the pre-receive fails, the new objects stay orphaned in the repo, and are cleaned up during the next `git gc`. - In 2.11, the new potential objects are added to a temporary "alternate object directory", that git creates for this purpose. If the pre-receive passes, the objects from the alternate object directory are migrated to the main repo. If the pre-receive fails the alternate object directory is simply deleted. 2. In our workflow, the pre-recieve script (in `gitlab-shell) calls the `/allowed` endpoint, which calls out directly to git to perform various checks. These direct calls to git do _not_ have the necessary environment variables set which allow access to the "alternate object directory" (explained above). Therefore these calls to git are not able to access any of the new potential objects to be added during this push. 3. We fix this by accepting the relevant environment variables (GIT_ALTERNATE_OBJECT_DIRECTORIES, GIT_OBJECT_DIRECTORY) on the `/allowed` endpoint, and then include these environment variables while calling out to git. 4. This commit includes (whitelisted) these environment variables while making the "force push" check. A `Gitlab::Git::RevList` module is extracted to prevent `ForcePush` from being littered with these checks.
-
- 09 Dec, 2016 2 commits
-
-
Lin Jen-Shin authored
we don't have to check for deploy key for downloading because deploy key could certainly download when it could already read the project. Feedback: https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/7383#note_19578626
-
- 06 Dec, 2016 2 commits
-
-
Lin Jen-Shin authored
-
Lin Jen-Shin authored
-
- 30 Nov, 2016 1 commit
-
-
Douglas Barbosa Alexandre authored
-
- 18 Nov, 2016 1 commit
-
-
Lin Jen-Shin authored
add another error message for the new error.
-
- 17 Nov, 2016 3 commits
-
-
Lin Jen-Shin authored
- 16 Nov, 2016 2 commits
- 11 Nov, 2016 4 commits
-
-
Lin Jen-Shin authored
-
Lin Jen-Shin authored
-
Lin Jen-Shin authored
-
Lin Jen-Shin authored
-
- 09 Nov, 2016 1 commit
-
-
Douwe Maan authored
Ensure external users are not able to clone disabled repositories. Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/23788 See merge request !2017 Signed-off-by:
Rémy Coutable <remy@rymai.me>
-