Skip to content

Commit c6dc2c3

Browse files
author
GitLab Bot
committed
Add latest changes from gitlab-org/gitlab@master
1 parent b61b54c commit c6dc2c3

File tree

8 files changed

+40
-28
lines changed

8 files changed

+40
-28
lines changed

app/services/audit_event_service.rb

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,9 @@ class AuditEventService
66

77
# Instantiates a new service
88
#
9+
# @deprecated This service is deprecated. Use Gitlab::Audit::Auditor instead.
10+
# More information: https://docs.gitlab.com/ee/development/audit_event_guide/#how-to-instrument-new-audit-events
11+
#
912
# @param [User, token String] author the entity who authors the change
1013
# @param [User, Project, Group] entity the scope which audit event belongs to
1114
# This param is also used to determine the visibility of the audit event.

doc/administration/gitaly/troubleshooting.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -242,8 +242,6 @@ update the secrets file on the Gitaly server to match the Gitaly client, then
242242
If you've confirmed that your `gitlab-secrets.json` file is the same on all Gitaly servers and clients,
243243
the application might be fetching this secret from a different file. Your Gitaly server's
244244
`config.toml file` indicates the secrets file in use.
245-
If that setting is missing, GitLab defaults to using `.gitlab_shell_secret` under
246-
`/opt/gitlab/embedded/service/gitlab-rails/.gitlab_shell_secret`.
247245

248246
## Repository pushes fail with `401 Unauthorized` and `JWT::VerificationError`
249247

doc/development/fips_compliance.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -346,6 +346,23 @@ These are [consumed by the GitLab Environment Toolkit](#install-gitlab-with-fips
346346

347347
See [the section on how FIPS builds are created](#how-fips-builds-are-created).
348348

349+
### System Libgcrypt
350+
351+
Because of a bug, FIPS Linux packages for GitLab 17.6 and earlier did not use the system
352+
[Libgcrypt](https://www.gnupg.org/software/libgcrypt/index.html), but the same Libgcrypt
353+
bundled with regular Linux packages.
354+
355+
This issue is fixed for all FIPS Linux packages for GitLab 17.7, except for AmazonLinux 2.
356+
The Libgcrypt version of AmazonLinux 2 is not compatible with the
357+
[GPGME](https://gnupg.org/software/gpgme/index.html) and [GnuPG](https://gnupg.org/)
358+
versions shipped with the FIPS Linux packages.
359+
360+
FIPS Linux packages for AmazonLinux 2 will continue to use the same Libgcrypt bundled with
361+
the regular Linux packages, otherwise we would have to downgrade GPGME and GnuPG.
362+
363+
If you require full compliance, you must migrate to another operating
364+
system for which FIPS Linux packages are available.
365+
349366
### Nightly Omnibus FIPS builds
350367

351368
The Distribution team has created [nightly FIPS Omnibus builds](https://packages.gitlab.com/gitlab/nightly-fips-builds),

doc/update/versions/gitlab_17_changes.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -186,6 +186,9 @@ For more information, see [issue 480328](https://gitlab.com/gitlab-org/gitlab/-/
186186
## 17.7.0
187187

188188
- Git 2.47.0 and later is required by Gitaly. For installations from source, you should use the [Git version provided by Gitaly](../../install/installation.md#git).
189+
- FIPS Linux packages now use the system Libgcrypt, except FIPS Linux packages for AmazonLinux 2. Previous versions of the FIPS Linux packages used the
190+
same Libgcrypt used by the regular Linux packages, which was a bug. For more information, see
191+
[the FIPS documentation](../../development/fips_compliance.md#system-libgcrypt).
189192

190193
### OpenSSL 3 upgrade
191194

doc/user/application_security/vulnerability_report/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ You can filter by:
9595
- **Severity**: Critical, high, medium, low, info, unknown.
9696
- **Tool**: For more details, see [Tool filter](#tool-filter).
9797
- **Activity**: For more details, see [Activity filter](#activity-filter).
98-
- **Identifier**: Filter by the vulnerability's identifier. (available only for projects, groups is tracked in [issue 508713](https://gitlab.com/gitlab-org/gitlab/-/issues/508713).)
98+
- **Identifier**: Filter by the vulnerability's identifier (available only for projects, support for groups is proposed in [issue 508713](https://gitlab.com/gitlab-org/gitlab/-/issues/508713)).
9999
- **Project**: Filter vulnerabilities in specific projects (available only for groups).
100100

101101
<!-- vale gitlab_base.SubstitutionWarning = YES -->

qa/qa/ce/strategy.rb

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,13 @@ def initialize_admin_api_client!
5151
)
5252

5353
Runtime::Browser.visit(:gitlab, Page::Main::Login)
54-
Page::Main::Login.perform(&:sign_in_using_admin_credentials)
54+
Page::Main::Login.perform do |login|
55+
admin_user = Runtime::User::Store.admin_user
56+
login.sign_in_using_credentials(user: admin_user)
57+
rescue Runtime::User::ExpiredPasswordError
58+
login.set_up_new_password(user: admin_user)
59+
end
60+
5561
Page::Main::Menu.perform(&:sign_out_if_signed_in)
5662

5763
Runtime::User::Store.initialize_admin_api_client # re-initialize admin client after password reset

qa/qa/page/main/login.rb

Lines changed: 6 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -81,8 +81,6 @@ def sign_in_using_credentials(user: nil, skip_page_validation: false, raise_on_i
8181
raise_on_invalid_login: raise_on_invalid_login
8282
)
8383
end
84-
85-
set_up_new_password_if_required(user: test_user, skip_page_validation: skip_page_validation)
8684
end
8785
end
8886

@@ -92,8 +90,6 @@ def sign_in_using_admin_credentials
9290
sign_in_using_gitlab_credentials(user: admin_user)
9391
end
9492

95-
set_up_new_password_if_required(user: admin_user, skip_page_validation: false)
96-
9793
Page::Main::Menu.perform(&:has_personal_area?)
9894
end
9995

@@ -194,23 +190,15 @@ def redirect_to_login_page(address)
194190
Runtime::Browser.visit(address, Page::Main::Login)
195191
end
196192

197-
private
198-
199-
# Handle request for password change
200-
# Happens on clean GDK installations when seeded root admin password is expired
201-
#
202-
def set_up_new_password_if_required(user:, skip_page_validation:)
203-
Support::WaitForRequests.wait_for_requests
204-
return unless has_content?('Update password for', wait: 1)
205-
193+
def set_up_new_password(user:)
206194
Profile::Password.perform do |new_password_page|
207195
password = user.password
208196
new_password_page.set_new_password(password, password)
209197
end
210-
211-
sign_in_using_credentials(user: user, skip_page_validation: skip_page_validation)
212198
end
213199

200+
private
201+
214202
def sign_in_using_gitlab_credentials(user:, skip_page_validation: false, raise_on_invalid_login: true)
215203
wait_if_retry_later
216204

@@ -233,7 +221,9 @@ def sign_in_using_gitlab_credentials(user:, skip_page_validation: false, raise_o
233221

234222
# Return if new password page is shown
235223
# Happens on clean GDK installations when seeded root admin password is expired
236-
return if has_content?('Update password for', wait: 1)
224+
if has_content?('Update password for', wait: 0)
225+
raise Runtime::User::ExpiredPasswordError, "Password for #{user.username} is expired and must be reset"
226+
end
237227

238228
Page::Main::Terms.perform do |terms|
239229
terms.accept_terms if terms.visible?

qa/qa/specs/features/api/1_manage/import/import_github_repo_spec.rb

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,7 @@ module QA
1010
end
1111

1212
context 'when imported via api' do
13-
it 'imports project', :blocking,
14-
quarantine: {
15-
issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/503715',
16-
type: :stale
17-
},
18-
testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347670' do
13+
it 'imports project', :blocking, testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347670' do
1914
expect_project_import_finished_successfully
2015

2116
aggregate_failures do
@@ -162,8 +157,8 @@ def verify_merge_requests_import
162157
"*Created by: gitlab-qa-github*\n\n```suggestion:-0+0\nProject for GitHub import test to GitLab\r\n```",
163158
"*Created by: gitlab-qa-github*\n\nSome test PR comment",
164159
"*Created by: gitlab-qa*\n\n**Review:** Approved",
165-
"assigned to @#{user.username}",
166-
"requested review from @#{user.username}"
160+
"assigned to `@gitlab-qa-github`",
161+
"requested review from `@gitlab-qa`"
167162
]
168163
)
169164
expect(events).to match_array(

0 commit comments

Comments
 (0)