Francisco Javier López
ae84eaeba7
Add better LDAP connection handling
2018-04-04 09:07:28 +00:00
Horatiu Eugen Vlad
7d01792614
Fix LDAP login without user in DB
2018-03-27 09:21:17 +02:00
Rubén Dávila
afe2c15e6b
Fix provider server URL used when listing repos to import
...
Also use Gitlab::Auth::OAuth::Provider.config_for to access OmniAuth config
2018-03-12 16:01:43 -05:00
Gabriel Mazetto
5c7a738105
[CE] Add Naming/FileName rule checking expected class/module per filename
2018-03-08 12:56:54 +00:00
Horatiu Eugen Vlad
6d3cb7e22e
Make oauth provider login generic
2018-03-05 22:26:40 +00:00
Horatiu Eugen Vlad
1ad5df49b1
Moved o_auth/saml/ldap modules under gitlab/auth
2018-02-28 16:53:02 +01:00
Douwe Maan
7a6c7bd66b
Allow token authentication on go-get request
2018-02-23 10:33:46 +00:00
Francisco Javier López
4f6e0379b4
Fixing request json mime type
2018-01-15 09:09:21 +00:00
Stan Hu
0d187a9a65
Log and send a system hook if a blocked user fails to login
...
Closes #41633
2018-01-14 22:22:06 -08:00
Francisco Lopez
4188c10c07
Renaming AuthenticationException to AuthenticationError
2017-11-17 13:33:21 +01:00
Francisco Lopez
7f0317917a
Changes after rebase
2017-11-17 10:09:56 +01:00
Francisco Lopez
b810f479d5
Removing Offender
2017-11-17 10:02:11 +01:00
Francisco Lopez
1436598e49
Moved Exceptions to Gitlab::Auth
2017-11-17 10:02:11 +01:00
Francisco Lopez
aa84ef1e1a
Moving exceptions to UserAuthFinders
2017-11-17 10:02:11 +01:00
Francisco Lopez
98f7982cec
Leaving atom? query to fix tests
2017-11-17 10:02:11 +01:00
Francisco Lopez
29521a313a
Change the rss url guard clause
2017-11-17 10:02:11 +01:00
Francisco Lopez
f189657523
Added some more comments
2017-11-17 10:02:11 +01:00
Francisco Lopez
2d5397d928
Removed method handle_return_value
2017-11-17 10:02:11 +01:00
Francisco Lopez
21153a4f47
Homogenising the type of the request handled by UserAuthFinder. Also tests fixed
2017-11-17 10:02:11 +01:00
Francisco Lopez
aecc3eb080
Applied some code review comments
2017-11-17 10:02:10 +01:00
Francisco Lopez
374179a970
Removing private token
2017-11-17 10:01:21 +01:00
Francisco Lopez
41ebd06ddc
Some fixes after rebase
2017-11-17 10:01:20 +01:00
Francisco Lopez
470b5dc326
Updated refactor and pushing to see if test fails
2017-11-17 10:00:48 +01:00
Francisco Lopez
d948e67913
First refactor
2017-11-17 10:00:08 +01:00
Michael Kozono
4e5a97d4f3
Refactor with ActionDispatch::Request
2017-11-17 09:58:18 +01:00
Michael Kozono
43a682ccaa
Fix OAuth API and RSS rate limiting
2017-11-17 09:58:18 +01:00
Robert Speicher
4edfad9678
Enable Layout/TrailingWhitespace cop and auto-correct offenses
2017-08-15 13:44:37 -04:00
Paul Charlton
cb3b4a15e6
Support multiple Redis instances based on queue type
2017-07-11 03:35:47 +00:00
Z.J. van de Weg
0b81b5ace0
Create read_registry scope with JWT auth
...
This is the first commit doing mainly 3 things:
1. create a new scope and allow users to use it
2. Have the JWTController respond correctly on this
3. Updates documentation to suggest usage of PATs
There is one gotcha, there will be no support for impersonation tokens, as this
seems not needed.
Fixes gitlab-org/gitlab-ce#19219
2017-06-05 12:26:49 +02:00
Pawel Chojnacki
70b9d8da4c
Remove unecessary defaults for uniq ip block, cleanup refactoring leftovers
2017-03-06 15:45:43 +01:00
Pawel Chojnacki
8a9bc24ef8
align schema.rb with upstream and fix rubocop warning about not freezing mutable constants and empty error classes
2017-03-06 15:41:50 +01:00
Pawel Chojnacki
0ef8a64348
Remove unecessary calls to limit_user!, UniqueIps Middleware, and address MR review
...
- cleanup formating in haml
- clarify time window is in seconds
- cleanup straneous chunks in db/schema
- rename count_uniqe_ips to update_and_return_ips_count
- other
2017-03-06 15:41:25 +01:00
Pawel Chojnacki
9cc0ff8f46
Cleanup common code in Unique Ips tests
2017-03-06 15:41:25 +01:00
Pawel Chojnacki
8993801f0c
Test various login scenarios if the limit gets enforced
2017-03-06 15:41:25 +01:00
Pawel Chojnacki
66dc71599c
Cleanup formatting
2017-03-06 15:41:24 +01:00
Pawel Chojnacki
e5cf3f51fb
Allow limiting logging in users from too many different IPs.
2017-03-06 15:41:24 +01:00
Lin Jen-Shin
a9765fb47f
Introduce has_access_to? so that we could reuse it
...
Feedback:
https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/7383#note_18439108
2016-11-16 20:31:23 +08:00
Kamil Trzcinski
795acf2e4e
Move logic to check ci? or lfs_deploy_token? to Gitlab::Auth::Result
2016-09-20 11:03:10 +02:00
Kamil Trzcinski
3c1bb3432b
Revert "Revert all changes introduced by https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/6043 "
...
This reverts commit 6d43c95b70 .
2016-09-19 16:34:32 +02:00
Kamil Trzcinski
135be3cabb
Solve code review comments
2016-09-19 14:23:18 +02:00
Kamil Trzcinski
dc29685465
Properly support Gitlab::Auth::Result
2016-09-19 13:50:28 +02:00
Kamil Trzcinski
6d43c95b70
Revert all changes introduced by https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/6043
2016-09-19 13:45:28 +02:00
Kamil Trzcinski
79f60e2b5c
Move Gitlab::Auth.Result to separate file
2016-09-19 13:42:10 +02:00
Jacob Vosmaer
07f49626d0
Fix tests
2016-06-06 17:40:26 +02:00
Jacob Vosmaer
03bec6b0e9
Argh mixed up all the negatives
2016-06-03 17:14:13 +02:00
Jacob Vosmaer
fa35aea3dd
Refactor Gitlab::Auth rate limiting
2016-06-03 17:07:40 +02:00