BigW Consortium Gitlab

  1. 29 Nov, 2017 1 commit
  2. 23 Nov, 2017 3 commits
  3. 17 Nov, 2017 1 commit
  4. 15 Nov, 2017 1 commit
    • When a custom header logo is present, don't show GitLab type logo · 0332356d
      Drew Blessing authored
      In the new navigation header, when a user uploads a custom header
      logo GitLab will still show the 'GitLab' type logo. This is often
      undesirable as the user may want to upload a logo with their own
      name present. This change will toggle the GitLab type logo if a
      custom header logo is present.
  5. 14 Nov, 2017 1 commit
  6. 12 Nov, 2017 1 commit
  7. 06 Nov, 2017 1 commit
  8. 02 Nov, 2017 1 commit
  9. 01 Nov, 2017 1 commit
  10. 26 Oct, 2017 1 commit
  11. 23 Oct, 2017 1 commit
  12. 17 Oct, 2017 1 commit
  13. 04 Oct, 2017 2 commits
  14. 03 Oct, 2017 1 commit
  15. 25 Sep, 2017 1 commit
  16. 19 Sep, 2017 2 commits
  17. 08 Sep, 2017 1 commit
  18. 06 Sep, 2017 1 commit
  19. 04 Sep, 2017 1 commit
  20. 01 Sep, 2017 2 commits
  21. 31 Aug, 2017 2 commits
  22. 30 Aug, 2017 2 commits
    • Rework the permissions model for SSH key restrictions · 68470602
      Nick Thomas authored
      `allowed_key_types` is removed and the `minimum_<type>_bits` fields are
      renamed to `<tech>_key_restriction`. A special sentinel value (`-1`) signifies
      that the key type is disabled.
      
      This also feeds through to the UI - checkboxes per key type are out, inline
      selection of "forbidden" and "allowed" (i.e., no restrictions) are in.
      
      As with the previous model, unknown key types are disallowed, even if the
      underlying ssh daemon happens to support them. The defaults have also been
      changed from the lowest known bit size to "no restriction". So if someone
      does happen to have a 768-bit RSA key, it will continue to work on upgrade, at
      least until the administrator restricts them.
    • Add settings for minimum key strength and allowed key type · b0f982fb
      Nick Thomas authored
      This is an amalgamation of:
      
      * Cory Hinshaw: Initial implementation !5552
      * Rémy Coutable: Updates !9350
      * Nick Thomas: Resolve conflicts and add ED25519 support !13712
  23. 26 Aug, 2017 1 commit
  24. 22 Aug, 2017 3 commits
  25. 21 Aug, 2017 1 commit
    • Only require sidekiq-limit_fetch when enabled in settings · 0db5f576
      Sean McGivern authored
      This gem allows Sidekiq jobs to be throttled. Unfortunately, it has a
      side-effect: when we haven't enabled job throttling, it will still hit Redis a
      lot (and miss, because nothing is configured).
      
      As this setting already required a restart, ensure that the library is only
      required when it's enabled.
  26. 18 Aug, 2017 2 commits
  27. 17 Aug, 2017 1 commit
  28. 11 Aug, 2017 1 commit
  29. 04 Aug, 2017 1 commit
  30. 02 Aug, 2017 1 commit