- Aug 16, 2022
-
-
Igor Drozdov authored
-
- Aug 11, 2022
-
-
Patrick Bajao authored
Update gitlab-dangerfiles gem See merge request gitlab-org/gitlab-shell!678
-
Igor Drozdov authored
-
Igor Drozdov authored
Release 14.11.0 See merge request gitlab-org/gitlab-shell!677
-
Igor Drozdov authored
-
- Aug 10, 2022
-
-
Patrick Bajao authored
Update Gitaly to v15 See merge request gitlab-org/gitlab-shell!676
-
- Aug 05, 2022
-
-
Igor Drozdov authored
Fixed extra slashes in API request paths generated for geo See merge request gitlab-org/gitlab-shell!673
-
-
Igor Drozdov authored
This commit also excludes gitlab-shell from dependencies: Gitaly specifies Gitlab Shell as a dependency as well in order to use gitlabnet client to perform API endpoints to Gitlab Rails. As a result, Gitlab Shell requires Gitaly -> Gitaly requires an older version of Gitlab Shell -> that version requires an older version of Gitlab Shell, etc. Let's use exclude to break the chain earlier
-
Stan Hu authored
Fix failing TestGitReceivePackSuccess See merge request gitlab-org/gitlab-shell!675
-
Igor Drozdov authored
After https://gitlab.com/gitlab-org/gitaly/-/merge_requests/4766 has been introduced, the test started fail because we basically cancel the git-receive-pack after the output is received This commit gracefully closes the connection to make the test pass
-
- Jul 28, 2022
-
-
Patrick Bajao authored
Add simple_roulette to Dangerfile See merge request gitlab-org/gitlab-shell!672
-
- Jul 26, 2022
-
-
Terri Chu authored
-
- Jul 21, 2022
-
-
Igor Drozdov authored
Release v14.10.0 See merge request gitlab-org/gitlab-shell!671
-
Igor Drozdov authored
-
Patrick Bajao authored
Implement Push Auth support for 2FA verification Closes #506 See merge request gitlab-org/gitlab-shell!454
-
- Jul 20, 2022
-
-
Igor Drozdov authored
Use a single channel to handle both Push Auth and OTP results
-
- Jul 18, 2022
-
-
When `2fa_verify` command is executed: - A user is asked to enter OTP - A blocking call for push auth is performed Then: - If the push auth request fails, the user is still able to enter OTP - If OTP is invalid, the `2fa_verify` command ends the execution - If OTP is valid or push auth request succeeded, then the user is successfully authenticated - If 30 seconds passed while no OTP or Push have been provided, then the `2fa_verify` command ends the execution
-
- Jul 15, 2022
-
-
Igor Drozdov authored
Fix flaky race test Closes #590 See merge request gitlab-org/gitlab-shell!670
-
Stan Hu authored
Release v14.9.0 See merge request gitlab-org/gitlab-shell!669
-
Stan Hu authored
`ignoredError.err` was being used in a Goroutine handler, but the value of `ignoredError` changes with each test case. To avoid a race, make a local copy of the error before each Goroutine runs. Closes https://gitlab.com/gitlab-org/gitlab-shell/-/issues/590
-
Stan Hu authored
- Update LabKit library to v1.16.0 !668 (https://gitlab.com/gitlab-org/labkit/-/releases/v1.16.0)
-
- Jul 13, 2022
-
-
Stan Hu authored
Update LabKit library to v1.16.0 See merge request gitlab-org/gitlab-shell!668
-
Alejandro Rodríguez authored
* include original address in correlation CIDR checks ([ae96001](https://gitlab.com/gitlab-org/labkit/commit/ae9600163a6f5fa2ad06676a00b310af36573df4)) * run make recipes in parallel during backward compat check ([efa9c71](https://gitlab.com/gitlab-org/labkit/commit/efa9c71e13ef2bfe4415278e6b1e5c5ee8cc8022)) See https://gitlab.com/gitlab-org/labkit/-/releases/v1.16.0
-
- Jul 05, 2022
-
-
Igor Drozdov authored
Release v14.8.0 See merge request gitlab-org/gitlab-shell!667
-
Igor Drozdov authored
- go: Bump major version to v14 !666 - Pass original IP from PROXY requests to internal API calls !665 - Fix make install copying the wrong binaries !664 - gitlab-sshd: Add support for configuring host certificates !661
-
Igor Drozdov authored
go: Bump major version to v14 Closes #593 See merge request gitlab-org/gitlab-shell!666
-
Patrick Steinhardt authored
While gitlab-shell currently has a major version of v14, the module path it exposes is not using that major version like it is required by the Go standard. This makes it impossible for dependents to import gitlab-shell as a dependency without using a commit as version. Fix this by changing the module path of gitlab-shell to instead be `gitlab.com/gitlab-org/gitlab-shell/v14` and adjust all imports accordingly. Changelog: fixed
-
- Jul 01, 2022
-
-
Igor Drozdov authored
Pass original IP from PROXY requests to internal API calls See merge request gitlab-org/gitlab-shell!665
-
- Jun 30, 2022
-
-
Alejandro Rodríguez authored
-
- Jun 29, 2022
-
-
Igor Drozdov authored
gitlab-sshd: Add support for configuring host certificates See merge request gitlab-org/gitlab-shell!661
-
- Jun 26, 2022
-
-
Stan Hu authored
This adds support for specifying host certificates via the `host_cert_files` option and advertises the signed key to the client. This acts similarly to OpenSSH's `HostCertificate` parameter: gitlab-sshd attempts to match a host key to its certificate, and then substitutes the matching host key with a certificate signed by a trusted certificate authority's key. This is the first requirement to supporting SSH certificates. This will enable the client to trust the server if both trust a common certificate authority. The `TrustedUserCAKeys` option will need to be supported later for the server to trust all user keys signed by this certificate authority. Relates to https://gitlab.com/gitlab-org/gitlab-shell/-/issues/495
-
- Jun 23, 2022
-
-
Igor Drozdov authored
Fix make install copying the wrong binaries See merge request gitlab-org/gitlab-shell!664
-
Stan Hu authored
While testing https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1062, we found `make install` was not copying the right binaries, such as `gitlab-shell-authorized-keys-check`. This might have originally been written with a single binary in mind (https://gitlab.com/gitlab-org/gitlab-shell/-/issues/207). Changelog: fixed
-
- Jun 16, 2022
-
-
Igor Drozdov authored
Release v14.7.4 See merge request gitlab-org/gitlab-shell!663
-
Igor Drozdov authored
- Update crypto module to fix RSA keys with old gpg-agent
-
Igor Drozdov authored
gitlab-sshd: Update crypto module to fix RSA keys with old gpg-agent See merge request gitlab-org/gitlab-shell!662
-
Stan Hu authored
When we put gitlab-sshd in production, we noticed a number of clients using RSA keys would fail to login. The server would report: ``` ssh: signature "ssh-rsa" not compatible with selected algorithm "rsa-sha2-512" ``` This is reproducible on Ubuntu 18.04, which ships gpg-agent v2.2.4 and OpenSSH v7.6. That version of gpg-agent does not support `rsa-sha2-256` or `rsa-sha2-512`, but OpenSSH does. As a result, OpenSSH specifies `rsa-sha-512` as the public key algorithm to use in the user authentication request message, but gpg-agent includes an `ssh-rsa` signature. OpenSSH servers tolerates this discrepancy, but the Go implementation fails because it expects a strict match. This commit pulls in https://gitlab.com/gitlab-org/golang-crypto/-/merge_requests/9 to fix the problem. Relates to: 1. https://github.com/golang/go/issues/53391 2. https://gitlab.com/gitlab-org/gitlab-shell/-/issues/587 Changelog: fixed
-
- Jun 14, 2022
-
-
Igor Drozdov authored
Set BUNDLE_FROZEN to true Closes #562 See merge request gitlab-org/gitlab-shell!659
-
- Jun 10, 2022
-
-
Alejandro Rodríguez authored
To follow rubygems' security adisory https://github.com/rubygems/rubygems.org/security/advisories/GHSA-hccv-rwq6-vh79:
-