Commit Graph

17 Commits

Author SHA1 Message Date
Illya Klymov 3eff85a97c Remove "You are already signed in" banner 2019-04-24 13:23:07 +00:00
Stan Hu bf286d1172 Fix failing spec in spec/features/users/login_spec.rb
This spec would start to fail on the first of the month because the
generated text would have a zero-padded day (e.g. 01 vs 1), whereas the
expected text check used an unpadded day via the `-d` parameter in
strftime (https://apidock.com/ruby/Date/strftime). To fix this, we
use use the `d` parameter to pad zeros.

This spec was introduced recently in
https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/25731.

Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/59731
2019-03-29 21:05:37 -07:00
Gosia Ksionek 66d3354f36 Add additional link to 2fa page 2019-03-20 08:17:11 +00:00
Imre Farkas 02326fa4b1
Backport of ee/8120: Smartcard authentication 2018-11-18 21:00:28 +01:00
Grzegorz Bizon de8f8cdf06 Improve authentication activity code readability 2018-07-31 09:24:19 +02:00
Grzegorz Bizon 656985bf75 Make authentication metrics events explicit is specs 2018-07-26 18:36:04 +02:00
Grzegorz Bizon 68547bc0e0 Track blocked users and two factor authentications 2018-07-23 15:13:11 +02:00
Grzegorz Bizon 33e11345e0 Add custom expectations for authentication activity metrics 2018-07-20 15:06:11 +02:00
Grzegorz Bizon ac4b954c5f Rename authentication activity observer methods 2018-07-19 10:34:58 +02:00
Winnie Hellmann 3db2f32759 Enable Capybara/FeatureMethods cop 2018-07-05 06:32:05 +00:00
Roger Rüttimann 2efe27ba18 Honor saml assurance level to allow 2FA bypassing 2018-06-25 15:32:03 +00:00
Annabel Dunstone Gray 5322de32d1
Fix login_spec 2018-05-25 04:53:26 -07:00
Bob Van Landuyt f25e00bc1e Enforce terms acceptance before other requirements
This prevents a redirect loop when a user has to enable 2FA and accept
the terms.

Now they will need to accept the terms, then enable 2FA, or any other requirements.
2018-05-11 14:27:22 +02:00
Bob Van Landuyt 7684217d68 Enforces terms in the web application
This enforces the terms in the web application. These cases are
specced:

- Logging in: When terms are enforced, and a user logs in that has not
  accepted the terms, they are presented with the screen. They get
  directed to their customized root path afterwards.
- Signing up: After signing up, the first screen the user is presented
  with the screen to accept the terms. After they accept they are
  directed to the dashboard.
- While a session is active:
  - For a GET: The user will be directed to the terms page first,
    after they accept the terms, they will be directed to the page
    they were going to
  - For any other request: They are directed to the terms, after they
    accept the terms, they are directed back to the page they came
    from to retry the request. Any information entered would be
    persisted in localstorage and available on the page.
2018-05-04 13:54:43 +02:00
Takuya Noguchi 21e6c7acf2 Refactor CSS to eliminate vertical misalignment of login nav 2018-04-11 23:52:47 +09:00
Douwe Maan 6deed66eda
Merge branch 'sh-fix-otp-backup-invalidation-10-5' into 'security-10-5'
Ensure that OTP backup codes are always invalidated - 10.5 port

See merge request gitlab/gitlabhq!2324
2018-03-07 13:36:43 +01:00
Rémy Coutable fc7f1aa244
Fix user feature specs that were hardcoding 'user1'
Signed-off-by: Rémy Coutable <remy@rymai.me>
2018-02-22 12:44:14 +01:00