| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
| |
To help with analysis, try to detect if the instance is running inside
a container. Some containers are detected, but this is probably not
exhaustive. At least a Docker container should be detectable.
Report in the runtime manager to the log if a container was detected.
|
|
|
|
|
|
| |
Zero out the password to remove it from memory after use.
This is only a first step, implementing it for one method:
`AuthenticationManager.authenticate(String, char[], String)`.
|
|
|
|
|
|
|
|
|
|
| |
The upgrade of a MD5 stored password hash to a PBKDF password hash
destroys the stored password. The has check zeroes out the password that
is tested, so that the new hash is built over the zeroed out value.
This fix prevents that an also adds a check to the test.
Fixes #1335
|
|\ |
|
| |
| |
| |
| |
| |
| | |
Integrate the `PasswordHash` class and subclass in the user
and password editing and authentication. Replaces the old code and
the previous `SecurePasswordHashingUtils` class.
|
| | |
|
| | |
|
| |
| |
| |
| | |
Addresses #1166
|
| |
| |
| |
| | |
This reverts commit 51b9b7f9016899bbf8a39f6bc33a916a3d2b3838.
|
| | |
|
| | |
|
| | |
|
|/
|
|
| |
IRuntimeManager as a parameter
|
|\
| |
| | |
Secure cookies
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Mark the user authentication cookie to be only used for HTTP, making
it inaccessible for JavaScript engines.
If only HTTPS is used and no HTTP (i.e. also if HTTP is redirected to
HTTPS) then mark the user cookie to be sent only over secure connections.
|
|\ \
| | |
| | | |
Merge strategy
|
| |/
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Add the option to merge a ticket branch to the integration branch
only when it can be fast-forwarded, or
always with a merge commit, or
by fast-foward if possible, otherwise with a merge commit.
Adds a new property ticket.mergeType with the valid values
FAST_FOWARD_ONLY, MERGE_ALWAYS and MERGE_IF_NECESSARY.
Merging and canMerge were refactored to make use of a new
IntegrationStrategy class for each type of strategy.
|
|/
|
|
|
|
|
|
|
|
| |
* Make the CommitCache fully thread-safe. It was using a
ConcurrentHashMap containing lists, but then handed out these lists.
It also did multiple operations on that map that as a whole should
be atomic.
* Use isEmpty() instead of size() == 0.
* Run the loading of the commit cache in a background daemon thread
|
| |
|
|\
| |
| | |
Fix authentication failure warning log messages for FEDERATION_USER
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
The AuthenticationManager did not encounter for FEDERATION_USER and would unnecessarily
generate a lot of failure warning log messages, e.g:
Failed login attempt for $gitblit, invalid credentials from XXX.XX.XX.XX
A simple condition will prematurely return null bypassing the regular authentication path
and immediately make the authentication be routed via FederationManager.
|
|/
|
|
|
|
|
|
|
| |
When calling a servlet which has already been authenticated, the server would produce
a lot of superfluous log entries, e.g:
Called servlet authenticate when request is already authenticated.
The log level for this log entry has been lowered down to DEBUG.
|
| |
|
|
|
|
|
|
| |
+ Filestore listing filtered by user view permissions
+ Configuration help for filestore relocated to website files
+ Added migration example
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
| |
+ Adds standard logging for all authentication providers
+ Updates help page to use default GitBlit SSH port
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
+ Metadata maintained in append-only JSON file providing complete audit
history.
+ Filestore menu item
+ Lists filestore items
+ Current size and availability
+ Link to GitBlit Filestore help page (top right)
+ Hooks into existing repository permissions
+ Uses default repository path for out-of-box operation with Git-LFS
client
+ accessRestrictionFilter now has access to http method and auth header
+ Testing for servlet and manager
|
|
|
|
|
| |
+ use request instead of session to flag authentication status
and user, for external authentication types
|
|\
| |
| | |
allow internal privilege evaluation external URLs
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
commit c20191fc0931a19bec0df1ab2b56f287e5d8b7c7 enabled support
for hiding internal URLs, but didn't consider that it broke the
evaluation of permissions (used for tickets, etc.), and caused
a NPE on repoUrl.permission when trying to view the TicketPage.
With all internal mechanisms disabled, it would result in the
first URL being external with unknown permissions. This adds an
option to use internal permissions even for external URLs.
Note that this does not grant any additional permissions, but
does offer the option to have gitblit advertise the full set of
what is allowed, even if the external URL imposes additional
restrictions.
|
|/ |
|
|\
| |
| | |
fix permission capping for HTTP/HTTPS
|
| |
| |
| |
| |
| |
| | |
Previously used request scheme, but request scheme is unrelated to
the URL being generated. Instead, base the permission capping on the
scheme of the URL itself.
|
|/ |
|
| |
|
|\ |
|
| | |
|
|/
|
|
|
| |
- try userRealm as a file only if class is not found, other exeptions are real error
- log userService only after setup, for better logging, as it can use gitblit.properties for custom .toString
|
| |
|
|
|
|
| |
if the webapp container can fill it.
|
|
|
|
| |
args4j, Jedis, waffle-jna, Unboundid
|
|\ |
|
| | |
|
| | |
|
| |
| |
| |
| | |
PluginManager
|
| |
| |
| |
| |
| | |
Formerly by default the PluginMaganer would support no proxy setting.
For servers behind firewall and HTTP proxy this would prevent installation of gitblit plugins.
|
| | |
|