Commit 66706570 authored by Achilleas Pipinellis's avatar Achilleas Pipinellis

Merge branch 'user_file_uploads_documentation' into 'master'

Document file upload random uuid security

This documents the current state of file uploads regarding random UUID and security.
Fixes #3569 

Thanks to @DouweM for the language.

cc/ @sytses @JobV @axil Does this look OK?

See merge request !2055
parents fb07f706 63a1a581
......@@ -4,4 +4,5 @@
- [Rack attack](rack_attack.md)
- [Web Hooks and insecure internal web services](webhooks.md)
- [Information exclusivity](information_exclusivity.md)
- [Reset your root password](reset_root_password.md)
\ No newline at end of file
- [Reset your root password](reset_root_password.md)
- [User File Uploads](user_file_uploads.md)
# User File Uploads
Images attached to issues, merge requests or comments do not require authentication
to be viewed if someone knows the direct URL. This direct URL contains a random
32-character ID that prevents unauthorized people from guessing the URL to an
image containing sensitive information. We don't enable authentication because
these images need to be visible in the body of notification emails, which are
often read from email clients that are not authenticated with GitLab, like
Outlook, Apple Mail, or the Mail app on your mobile device.
Note that non-image attachments do require authentication to be viewed.
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment