<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/gitlab/gitlab-ce.git/app/views/devise, branch koding-setting-api</title>
<subtitle>gitlab.com: gitlab-org/gitlab-ce.git
</subtitle>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/gitlab/gitlab-ce.git/'/>
<entry>
<title>fix LDAP omniauth regression (Closes: #22357)</title>
<updated>2016-09-21T04:10:21+00:00</updated>
<author>
<name>Dmitry Smirnov</name>
<email>onlyjob@member.fsf.org</email>
</author>
<published>2016-09-21T04:10:21+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/gitlab/gitlab-ce.git/commit/?id=0d74154abcbdc56264b20b39ea6f3e4445c6a42c'/>
<id>0d74154abcbdc56264b20b39ea6f3e4445c6a42c</id>
<content type='text'>
~~~~
ActionView::Template::Error (undefined method `user_omniauth_callback_path'
~~~~

Signed-off-by: Dmitry Smirnov &lt;onlyjob@member.fsf.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
~~~~
ActionView::Template::Error (undefined method `user_omniauth_callback_path'
~~~~

Signed-off-by: Dmitry Smirnov &lt;onlyjob@member.fsf.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Pass the remember_me option into the u2f form and support it while authenticating</title>
<updated>2016-09-02T00:11:42+00:00</updated>
<author>
<name>DJ Mountney</name>
<email>david@twkie.net</email>
</author>
<published>2016-08-20T01:51:56+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/gitlab/gitlab-ce.git/commit/?id=9224f031cfcb8283566f9d1dcc336ae644faf062'/>
<id>9224f031cfcb8283566f9d1dcc336ae644faf062</id>
<content type='text'>
Matches the changes done for non-u2f two-factor auth
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Matches the changes done for non-u2f two-factor auth
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove provider path, replace with dynamic path.</title>
<updated>2016-08-03T17:50:38+00:00</updated>
<author>
<name>Connor Shea</name>
<email>connor.james.shea@gmail.com</email>
</author>
<published>2016-07-25T17:40:40+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/gitlab/gitlab-ce.git/commit/?id=602fe111912bac119e752b0dfa3b4b3cd81585ff'/>
<id>602fe111912bac119e752b0dfa3b4b3cd81585ff</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Add an oauth provider path helper.</title>
<updated>2016-08-03T17:50:29+00:00</updated>
<author>
<name>Connor Shea</name>
<email>connor.james.shea@gmail.com</email>
</author>
<published>2016-07-18T21:14:30+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/gitlab/gitlab-ce.git/commit/?id=e8c6f119cd7cf519db3ad1622786aad3156324d4'/>
<id>e8c6f119cd7cf519db3ad1622786aad3156324d4</id>
<content type='text'>
The helper constructs the path for a given oauth provider since Devise 4.0 deprecated passing the provider to the omniauth authentication path.

Fixes #18110.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The helper constructs the path for a given oauth provider since Devise 4.0 deprecated passing the provider to the omniauth authentication path.

Fixes #18110.
</pre>
</div>
</content>
</entry>
<entry>
<title>Add a U2F feature spec for multiple devices owned by the same user.</title>
<updated>2016-07-14T02:49:09+00:00</updated>
<author>
<name>Timothy Andrew</name>
<email>mail@timothyandrew.net</email>
</author>
<published>2016-07-11T07:53:02+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/gitlab/gitlab-ce.git/commit/?id=341d8bc3f7fbe3763250af1e89020b81dad34bb8'/>
<id>341d8bc3f7fbe3763250af1e89020b81dad34bb8</id>
<content type='text'>
1. This scenario was previously tested for the registration flow, but
   not authentication.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
1. This scenario was previously tested for the registration flow, but
   not authentication.
</pre>
</div>
</content>
</entry>
<entry>
<title>Load Javascript U2F library selectively.</title>
<updated>2016-07-14T02:49:09+00:00</updated>
<author>
<name>Timothy Andrew</name>
<email>mail@timothyandrew.net</email>
</author>
<published>2016-07-11T07:30:22+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/gitlab/gitlab-ce.git/commit/?id=4b33c4c6d1aa529ec22606995123cfa3a151ccee'/>
<id>4b33c4c6d1aa529ec22606995123cfa3a151ccee</id>
<content type='text'>
1. Only on supported Chrome versions

2. Mainly, this lets us simplify the javascript-based U2F check to
   `window.u2f`, where `window.u2f` can either be loaded from the GitLab
   server (for Chrome) or from the Firefox extension.

3. This is a better way to provide browser detection for U2F.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
1. Only on supported Chrome versions

2. Mainly, this lets us simplify the javascript-based U2F check to
   `window.u2f`, where `window.u2f` can either be loaded from the GitLab
   server (for Chrome) or from the Firefox extension.

3. This is a better way to provide browser detection for U2F.
</pre>
</div>
</content>
</entry>
<entry>
<title>Customize the Devise `unlock_instructions` email</title>
<updated>2016-06-17T00:10:52+00:00</updated>
<author>
<name>Robert Speicher</name>
<email>rspeicher@gmail.com</email>
</author>
<published>2016-05-25T21:53:13+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/gitlab/gitlab-ce.git/commit/?id=933cd3478d8930fa5472d509d78bb7dd481d2360'/>
<id>933cd3478d8930fa5472d509d78bb7dd481d2360</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Customize the Devise `reset_password_instructions` email</title>
<updated>2016-06-17T00:10:52+00:00</updated>
<author>
<name>Robert Speicher</name>
<email>rspeicher@gmail.com</email>
</author>
<published>2016-05-25T21:51:52+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/gitlab/gitlab-ce.git/commit/?id=3a5315d3ceed547de47685ba1a57b31cc8b67c96'/>
<id>3a5315d3ceed547de47685ba1a57b31cc8b67c96</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Customize the Devise `password_change` emails</title>
<updated>2016-06-17T00:10:52+00:00</updated>
<author>
<name>Robert Speicher</name>
<email>rspeicher@gmail.com</email>
</author>
<published>2016-05-25T21:49:34+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/gitlab/gitlab-ce.git/commit/?id=dd1f56b5c4aa630d3f84e41c12af666f53e88dea'/>
<id>dd1f56b5c4aa630d3f84e41c12af666f53e88dea</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'rs-fix-ldap-2fa-login' into 'master'</title>
<updated>2016-06-09T18:43:22+00:00</updated>
<author>
<name>Robert Speicher</name>
<email>robert@gitlab.com</email>
</author>
<published>2016-06-09T18:43:22+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/gitlab/gitlab-ce.git/commit/?id=8138f340f81d5144290893a7fc6897d9a502bbdb'/>
<id>8138f340f81d5144290893a7fc6897d9a502bbdb</id>
<content type='text'>

Fix 2FA-based login for LDAP users

The OTP input form is shared by both LDAP and standard logins, but when
coming from an LDAP-based form, the form parameters aren't nested in a
Hash based on the `resource_name` value.

Now we check for a nested `remember_me` parameter and use that if it
exists, or fall back to the non-nested parameters if it doesn't.

Somewhat confusingly, the OTP input form _does_ nest parameters under
the `resource_name`, regardless of what type of login we're coming from,
so that allows everything else to work as normal.

Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/18185

See merge request !4493</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>

Fix 2FA-based login for LDAP users

The OTP input form is shared by both LDAP and standard logins, but when
coming from an LDAP-based form, the form parameters aren't nested in a
Hash based on the `resource_name` value.

Now we check for a nested `remember_me` parameter and use that if it
exists, or fall back to the non-nested parameters if it doesn't.

Somewhat confusingly, the OTP input form _does_ nest parameters under
the `resource_name`, regardless of what type of login we're coming from,
so that allows everything else to work as normal.

Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/18185

See merge request !4493</pre>
</div>
</content>
</entry>
</feed>
