- 19 Jul, 2018 26 commits
-
-
GitLab Bot authored
# Conflicts: # config/initializers/1_settings.rb # config/sidekiq_queues.yml [ci skip]
-
Rémy Coutable authored
Remove duplicated include IgnorableColumn in user model See merge request gitlab-org/gitlab-ce!20710
-
Grzegorz Bizon authored
Escape username and password in UrlSanitizer#full_url See merge request gitlab-org/gitlab-ce!20684
-
Sean McGivern authored
Resolve "Clean up after RemoveCommaFromWeightSystemNotes migration" Closes #6793 See merge request gitlab-org/gitlab-ee!6571
-
Marin Jankovski authored
CE upstream - 2018-07-19 09:25 UTC See merge request gitlab-org/gitlab-ee!6588
-
Douwe Maan authored
Use rugged to validate ref name Closes #49043 See merge request gitlab-org/gitlab-ce!20669
-
Rémy Coutable authored
Rails5 fix user sees revert modal spec See merge request gitlab-org/gitlab-ce!20706
-
Rémy Coutable authored
Delete UserActivities and related workers Closes #43312 See merge request gitlab-org/gitlab-ce!20597
-
Rémy Coutable authored
Delete UserActivities and related workers See merge request gitlab-org/gitlab-ee!6570
-
Douwe Maan authored
Add button to regenerate 2FA codes. Closes #48408 See merge request gitlab-org/gitlab-ce!20295
-
Luke Picciau authored
-
Ahmad Hassan authored
-
Stan Hu authored
If a user uses a password with certain characters (e.g. /, #, +, etc.) UrlSanitizer#full_url will generate an invalid URL that cannot be parsed properly by Addressable::URI. If used with UrlBlocker, this will be flagged as an invalid URI.
-
Sean McGivern authored
Improve email address parsing Closes #44676 See merge request gitlab-org/gitlab-ce!18192
-
Sean McGivern authored
-
Lin Jen-Shin authored
It's probably duplicated during resolving a conflict?
-
GitLab Bot authored
-
Douwe Maan authored
Incorporate Gitaly's RefService.FindAllRemoteBranches RPC See merge request gitlab-org/gitlab-ce!20701
-
Douwe Maan authored
Incorporate Gitaly's RefService.FindAllRemoteBranches RPC See merge request gitlab-org/gitlab-ee!6583
-
Douwe Maan authored
Rails5 fix undefined method 'namespace_project_settings_repository_path' Closes #6931 See merge request gitlab-org/gitlab-ee!6581
-
Filipa Lacerda authored
Resolve "bad alignment in merge request widget (code climate, security report, etc.)" Closes #6940 See merge request gitlab-org/gitlab-ee!6580
-
Annabel Gray authored
-
Jasper Maes authored
-
George Thomas authored
If you enter the following RFC 2822 compliant address: `John Doe <john@doe.com>` Gitlab will attempt to send three emails: 1) John 2) Doe 3) john@doe.com With this change given the following: `John Doe <johndoe@example.com>` `Jane Doe <janedoe@example.com>` Gitlab will send emails to `johndoe@example.com` and `janedoe@example.com`
-
Stan Hu authored
CE upstream - 2018-07-18 22:42 UTC See merge request gitlab-org/gitlab-ee!6587
-
Alejandro Rodríguez authored
-
- 18 Jul, 2018 14 commits
-
-
Robert Speicher authored
Limit the TTL for anonymous sessions to 1 hour (EE port) Closes gitlab-ce#48101 See merge request gitlab-org/gitlab-ee!6586
-
Stan Hu authored
-
GitLab Bot authored
# Conflicts: # config/initializers/1_settings.rb [ci skip]
-
Robert Speicher authored
Limit the TTL for anonymous sessions to 1 hour Closes #48101 See merge request gitlab-org/gitlab-ce!20700
-
Stan Hu authored
Resolve "Geo: Uninitialized constant Gitlab::Geo::ImportExportDownloader" Closes #6929 See merge request gitlab-org/gitlab-ee!6567
-
Stan Hu authored
By default, all sessions are given the same expiration time configured in the session store (e.g. 1 week). However, unauthenticated users can generate a lot of sessions, primarily for CSRF verification. It makes sense to reduce the TTL for unauthenticated to something much lower than the default (e.g. 1 hour) to limit Redis memory. In addition, Rails creates a new session after login, so the short TTL doesn't even need to be extended. Closes #48101
-
Alejandro Rodríguez authored
-
Robert Speicher authored
CE upstream - 2018-07-18 18:21 UTC See merge request gitlab-org/gitlab-ee!6585
-
Stan Hu authored
By default, all sessions are given the same expiration time configured in the session store (e.g. 1 week). However, unauthenticated users can generate a lot of sessions, primarily for CSRF verification. It makes sense to reduce the TTL for unauthenticated to something much lower than the default (e.g. 1 hour) to limit Redis memory. In addition, Rails creates a new session after login, so the short TTL doesn't even need to be extended. Closes #48101
-
Robert Speicher authored
-
Robert Speicher authored
Resolve "Tell people to rebase themselves when ee-specific-lines-check failed to rebase" Closes #6915 See merge request gitlab-org/gitlab-ee!6562
-
Robert Speicher authored
[ci skip]
-
Annabel Gray authored
Add related issues loading icon top margin See merge request gitlab-org/gitlab-ee!6527
-
GitLab Bot authored
# Conflicts: # locale/gitlab.pot [ci skip]
-