- 22 Aug, 2017 1 commit
-
-
Shinya Maeda authored
-
- 19 Jul, 2017 2 commits
-
-
Grzegorz Bizon authored
-
Grzegorz Bizon authored
-
- 06 Jul, 2017 1 commit
-
- 05 Jul, 2017 2 commits
-
-
Tiago Botelho authored
-
Tiago Botelho authored
-
- 21 Jun, 2017 1 commit
-
-
Zeger-Jan van de Weg authored
-
- 24 May, 2017 3 commits
-
-
Douwe Maan authored
This reverts commit b0498c17
-
Douwe Maan authored
-
Douwe Maan authored
-
- 02 May, 2017 1 commit
-
-
Bob Van Landuyt authored
-
- 20 Apr, 2017 1 commit
-
-
Douwe Maan authored
-
- 03 Apr, 2017 1 commit
-
-
Grzegorz Bizon authored
This regexp is extracted from Docker Distribution 2.4.1 docs, contains additional `/` element that can be a separator of components.
-
- 23 Feb, 2017 1 commit
-
-
Douwe Maan authored
-
- 13 Feb, 2017 1 commit
-
-
Dmitriy Zaporozhets authored
Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
- 15 Jan, 2017 1 commit
-
-
blackst0ne authored
-
- 15 Dec, 2016 1 commit
-
-
Nick Thomas authored
-
- 14 Dec, 2016 1 commit
-
-
Nick Thomas authored
-
- 13 Dec, 2016 1 commit
-
-
winniehell authored
-
- 23 Nov, 2016 1 commit
-
-
Dmitriy Zaporozhets authored
Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
- 21 Nov, 2016 1 commit
-
-
Dmitriy Zaporozhets authored
Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
- 18 Nov, 2016 1 commit
-
-
Timothy Andrew authored
Javascript does not support the negative lookbehind assertion (?<!) used in the Ruby regex (to disallow usernames ending in `.git` or `.atom`. Getting the client side code to fully support this format is non-trivial, since we'd either have to heavily complicate the regex used, or modify the frontend code to support more complex validation schemes (it currently uses HTML5 validations). The pragmatic choice is to create a `Gitlab::Regex::NAMESPACE_REGEX_STR_SIMPLE` regex to serve as a Javascript-compatible version of `NAMESPACE_REGEX_STR`. The client-side code will not display an error for usernames ending in `.git` and `.atom`, but these will be caught by the server-side validation.
-
- 12 Nov, 2016 1 commit
-
-
Vincent Composieux authored
Added ability to put emojis into repository name
-
- 07 Nov, 2016 1 commit
-
-
Dmitriy Zaporozhets authored
Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
- 07 Oct, 2016 1 commit
-
-
Will Starms authored
Adds .git and .atom to the master namespace regex Updates existing group tests and adds two new ones Updates path cleaning to also forbid .atom
-
- 20 Sep, 2016 1 commit
-
-
Robert Speicher authored
-
- 19 Sep, 2016 3 commits
-
-
Kamil Trzcinski authored
Squashed commits: [f9a9315] Use : to test invalid environment name
-
Kamil Trzcinski authored
-
Kamil Trzcinski authored
Environments that can have a URL with predefined CI variables.
-
- 01 Jul, 2016 1 commit
-
-
Grzegorz Bizon authored
-
- 16 Jun, 2016 2 commits
-
-
James Lopez authored
This reverts commit 13e37a3e.
-
James Lopez authored
-
- 14 Jun, 2016 1 commit
-
-
Kamil Trzcinski authored
-
- 03 Jun, 2016 2 commits
-
-
James Lopez authored
This reverts commit 3e991230.
-
James Lopez authored
# Conflicts: # app/models/project.rb
-
- 08 May, 2016 1 commit
-
-
Kamil Trzcinski authored
-
- 04 May, 2016 1 commit
-
-
Kamil Trzcinski authored
-
- 01 Feb, 2016 1 commit
-
-
Jacob Vosmaer authored
-
- 29 Jan, 2016 1 commit
-
-
James Lopez authored
-
- 29 Oct, 2015 1 commit
-
-
Ben Ford authored
Simply type a name with a `/` directory separator and new directories will be created. This does not do the fancy UI work that github.com does, but it will get the job done. I could not find tests for file creation, so I didn't add a test for this slight behaviour modification. I did test directory traversals though, using both absolute paths like `/tmp/foo.txt` and relative paths like `../../foo.txt`. Neither case escaped the repository, though attempting to traverse with a relative path resulted in a 500 error that did not affect application stability upon reload.
-