summaryrefslogtreecommitdiffstats
path: root/src/test
Commit message (Collapse)AuthorAgeFilesLines
* Retrieve public SSH keys from LDAP.Florian Zschocke2016-11-292-0/+755
| | | | | | | | | | | | Add new class `LdapPublicKeyManager` which retrieves public SSH keys from LDAP. The attribute can be configured with the new configuration option `realm.ldap.sshPublicKey`. The setting can be a simple attribute name, like `sshPublicKey`, or an attribute name and a prefix for the value, like `altSecurityIdentities:SshKey`, in which case attributes are selected that have the name `altSecurityIdentities` and whose values start with `SshKey:`.
* Extract LdapConnection into new class from LdapAuthProviderFlorian Zschocke2016-11-231-0/+248
| | | | | | | | Extract the inner class `LdapConnection` from the `LdapAuthProvider` into a separate class, so that it can be used from multiple classes that have to connect to an LDAP directory. The new class is placed into the new package `com.gitblit.ldap`, since it isn't specific to authentication.
* Create base unit test class for LDAP tests.Florian Zschocke2016-11-232-332/+416
| | | | | | Extract the creation of the in-memory servers and the interceptor code to a base class that LDAP related unit tests can extend to have the servers available.
* Set "can admin" permission on LDAP users and teams correctlymerged--fixAdminRoleLDAPFlorian Zschocke2016-11-182-7/+264
| | | | | | | | | | | | | | | | | | | | | | | The canAdmin permission is set on a LDAP user, when the user is listed in `realm.ldap.admins` or is a member of a team listed in `realm.ldap.admins`. This leads to inconsistent and surprising behaviour on the EditUser page when clicking the "can admin" checkbox. Also, the "can admin" checkbox is disabled, but not checked, for teams that are listed as admin teams. The new behaviour implemented in this patch makes users and teams from LDAP match local ones. That means: * LDAP teams that are listed in `realm.ldap.admins` get the canAdmin property set if teams are maintained in LDAP. * LDAP users that are listed in `realm.ldap.admins` get the canAdmin property set if teams are maintained in LDAP. * LDAP users do not get the canAdmin property set, if they are only a member of a team listed in `realm.ldap.admins`. * The `supportsRoleChanges` method for users and teams of the `LdapAuthProvider` unconditially returns false if teams are maintained in LDAP, not only for users and teams listed in `realm.ldap.admins`. * Therefore, for all LDAP users and teams the "can admin" checkbox is always disabled if teams are maintained in LDAP.
* Extend LDAP tests to use LDAP servers with access restrictions.Florian Zschocke2016-11-091-45/+257
| | | | | | | | | | | | | | Add access restrictions to the LDAP test server instances. New modes used a test parameters are ANONYMOUS, DS_MANAGER and USR_MANAGER. ANONYMOUS can bind anonymously and access users and groups. In DS_MANAGER the server requires authentication and will only allow the DIRECTORY_MANAGER user to search for users and groups. In USR_MANAGER only the user can search groups, the USER_MANAGER, which is used to bind in this mode, can not. A third server instance is created because I did fear side effects should the tests be run in parallel, had I tried to configure the access restriction in Before.
* Extend LDAP authentication tests to use different modes.Florian Zschocke2016-11-061-23/+107
| | | | | | | Instantiate two LDAP servers, one that allows anonymous access, and one that requires authentication for all operations. The JUnit test is parameterized to run all tests with both instances. It uses different settings for each mode.
* TicketReference Testing #1048Paul Martin2016-06-181-4/+36
| | | | + Multiple commits in a single push
* Ticket Reference handling #1048Paul Martin2016-04-273-1/+942
| | | | | | | | | | | | | | | + Supports referencing: + Tickets from other tickets via comments + Tickets from commits on any branch + Common TicketLink class used for both commits and tickets + TicketLink is temporary and persisted to ticket as a Reference + Support deletion of ticket references + Rebasing patchsets/branches will generate new references + Deleting old patchsets/branches will remove the relevant references + Substantial testing of use cases + With and without patchsets, deleting, amending + BranchTicketService used during testing to allow end-to-end ref testing + Relocated common git helper functions to JGitUtils
* Fix for #976 - Filestore links via browserPaul Martin2015-12-251-3/+3
| | | | | | | | | | | | | + GitLFS client support + FilestoreModel now parses meta file + Read meta heading from cache if available + Authentication based on accept headers for browser view filestore login + PathModel & PathChangeModel now understands filestore items + Zip & Rar downloads contain include filestore items + Filestore servlet returns LFS JSON error only if accepted by client + DiffStat now knows repository to allow identification of filestore items + Filestore items identified and returned via view, raw & blob links on blame, commitDiff, commit and Tree pages
* Log update for Fail2Ban usagePaul Martin2015-10-255-34/+34
| | | | | + Adds standard logging for all authentication providers + Updates help page to use default GitBlit SSH port
* Git-LFS supportPaul Martin2015-10-104-1/+908
| | | | | | | | | | | | | | + Metadata maintained in append-only JSON file providing complete audit history. + Filestore menu item + Lists filestore items + Current size and availability + Link to GitBlit Filestore help page (top right) + Hooks into existing repository permissions + Uses default repository path for out-of-box operation with Git-LFS client + accessRestrictionFilter now has access to http method and auth header + Testing for servlet and manager
* Revert manual specification of ssh user auth factoriesJames Moger2015-10-054-16/+8
|
* Update to SSHD 1.0.0James Moger2015-09-182-8/+8
|
* Revised AvatarGenerator to be injectableJames Moger2015-06-152-52/+50
|
* First draft for a customized avatar imageFabrice Bacchella2015-06-151-0/+77
|
* Invalid kerberos patches, works now and with a test.Fabrice Bacchella2015-05-262-1/+77
|
* Implement configurable tab length support for blob viewsJames Moger2015-05-222-4/+4
|
* Merged #247 "Add Kerberos5/GSS authentication to ssh"James Moger2015-05-213-0/+11
|\
| * Adding Kerberos5/GSS authentication to sshFabrice Bacchella2015-05-043-0/+11
| | | | | | | | Adding the possibility to define authentication method order for ssh
* | A patch that allows to extract a new user informations from the HTTP sessionFabrice Bacchella2015-05-151-17/+658
|/ | | | if the webapp container can fill it.
* Add links to commit diff and blob diff pages to toggle whitespace settingJames Moger2015-03-071-3/+3
|
* Add DiffComparator argument to all DiffUtils calls, default to ignore all ↵James Moger2015-03-071-3/+4
| | | | whitespace
* #230 - Improve empty folder navigation.Milos Cubrilo2015-01-113-7/+82
| | | | Empty folders are automatically skipped when browsing repository tree (similar to github "folder jumping" feature).
* Tickets - Priority, Severity optionsPaul Martin2014-10-203-4/+193
| | | | | | | | | + Severity indicated via new character indicator and color of ticket icon on ticket list + Priority indicated via new priority icon and color on ticket list + Indexed as integers to provide sorting and maintain language neutral index + Colours and indicator text controlled through CSS classes priority-<x> & severity-<x> + UITicketTest created to generate tickets of all types to ease debugging
* Merge release-1.6.1James Moger2014-10-201-1/+1
|\
| * Correct unit test assertionJames Moger2014-10-201-1/+1
| |
| * Fix GitBlitTest.testGitblitSettings()James Moger2014-10-131-1/+5
| |
* | Fix GitBlitTest.testGitblitSettings()James Moger2014-10-131-1/+5
| |
* | Merge branch 'ticket/202' into developJames Moger2014-10-062-2/+2
|\|
| * Treat .ico and .jpeg files as imagesBerke Viktor2014-10-062-2/+2
| |
* | Merge branch 'ticket/161' into developJames Moger2014-09-081-4/+4
|\|
| * Expose setting to control Lucene repository indexing frequencyJames Moger2014-09-081-4/+4
| |
* | Merge branch 'ticket/164' into developJames Moger2014-09-079-14/+45
|\|
| * Create infrastructure for XSS sanitizationJames Moger2014-09-079-14/+45
| |
* | Extract services manager into a top-level injectable managerJames Moger2014-07-031-20/+0
| |
* | Use Guice-Servlet rather than custom code and expose the InjectorJames Moger2014-07-031-0/+6
|/ | | | | | | | | | | | | | | This is a fairly functional variation of Gitblit with one notable exception: The security filters are not working properly. This is a design flaw in Guice that I have reported upstream [1]. The general idea is that Guice-Servlet filters are not properly wrapping the ServletRequest. This has historically been a problem for Guice-Servlet servlets but Google has fixed most of those issues. Unfortunately, all the same flaws reported against the servlet delegation also exist in Guice-Servlet filter delegation. :( [1]: https://code.google.com/p/google-guice/issues/detail?id=807
* Add repository and user/team lifecycle listener extension pointsJames Moger2014-06-099-26/+22
|
* Add a basic SSH public key management UIJames Moger2014-06-051-0/+15
|
* Change enum name and unit test RSS tag queriesJames Moger2014-05-081-1/+35
|
* Revise, complete, and fully test the FORK rpcJames Moger2014-05-083-17/+64
|
* Implement FORK RPC request typemanisha2014-05-083-1/+17
|
* Implementation of a ticket mgration toolJames Moger2014-05-021-1/+4
|
* Fix inconsistency with owner permissions checkJames Moger2014-05-011-2/+40
|
* Fix forcing default locale to en or LANG_CC for web uiJames Moger2014-04-281-0/+6
|
* Prevent adding empty or invalid SSH public keysJames Moger2014-04-251-0/+14
|
* [findbugs] Fix Selenium testJames Moger2014-04-171-8/+6
|
* [findbugs] Reorder asserts to avoid potential NPE in JGitUtilsTestJames Moger2014-04-171-3/+5
|
* Organize importsJames Moger2014-04-171-1/+1
|
* Merge pr-170 'ticket-fix' from https://github.com/lucidd/gitblitJames Moger2014-04-151-0/+4
|\
| * fix NullPointerException in ITicketService and add TestCaseKevin Walter2014-04-151-0/+4
| |