BigW Consortium Gitlab

  1. 22 Aug, 2017 1 commit
  2. 19 Jul, 2017 2 commits
  3. 06 Jul, 2017 1 commit
  4. 05 Jul, 2017 2 commits
  5. 21 Jun, 2017 1 commit
  6. 24 May, 2017 3 commits
  7. 02 May, 2017 1 commit
  8. 20 Apr, 2017 1 commit
  9. 03 Apr, 2017 1 commit
  10. 23 Feb, 2017 1 commit
  11. 13 Feb, 2017 1 commit
  12. 15 Jan, 2017 1 commit
  13. 15 Dec, 2016 1 commit
  14. 14 Dec, 2016 1 commit
  15. 13 Dec, 2016 1 commit
  16. 23 Nov, 2016 1 commit
  17. 21 Nov, 2016 1 commit
  18. 18 Nov, 2016 1 commit
    • Allow registering users where the username contains dots (.). · 78b6d662
      Timothy Andrew authored
      Javascript does not support the negative lookbehind assertion (?<!) used
      in the Ruby regex (to disallow usernames ending in `.git` or `.atom`.
      
      Getting the client side code to fully support this format is
      non-trivial, since we'd either have to heavily complicate the
      regex used, or modify the frontend code to support more complex
      validation schemes (it currently uses HTML5 validations).
      
      The pragmatic choice is to create a
      `Gitlab::Regex::NAMESPACE_REGEX_STR_SIMPLE` regex to serve as a
      Javascript-compatible version of `NAMESPACE_REGEX_STR`.
      
      The client-side code will not display an error for usernames ending in
      `.git` and `.atom`, but these will be caught by the server-side
      validation.
  19. 12 Nov, 2016 1 commit
  20. 07 Nov, 2016 1 commit
  21. 07 Oct, 2016 1 commit
  22. 20 Sep, 2016 1 commit
  23. 19 Sep, 2016 3 commits
  24. 01 Jul, 2016 1 commit
  25. 16 Jun, 2016 2 commits
  26. 14 Jun, 2016 1 commit
  27. 03 Jun, 2016 2 commits
  28. 08 May, 2016 1 commit
  29. 04 May, 2016 1 commit
  30. 01 Feb, 2016 1 commit
  31. 29 Jan, 2016 1 commit
  32. 29 Oct, 2015 1 commit
    • Add ability to create directories in the editor · 3be9d2c4
      Ben Ford authored
      Simply type a name with a `/` directory separator and new directories
      will be created. This does not do the fancy UI work that github.com
      does, but it will get the job done.
      
      I could not find tests for file creation, so I didn't add a test for
      this slight behaviour modification. I did test directory traversals
      though, using both absolute paths like `/tmp/foo.txt` and relative paths
      like `../../foo.txt`. Neither case escaped the repository, though
      attempting to traverse with a relative path resulted in a 500 error that
      did not affect application stability upon reload.