This repository was archived by the owner on Apr 12, 2021. It is now read-only.
-
-
Notifications
You must be signed in to change notification settings - Fork 105
Permalink
Choose a base ref
{{ refName }}
default
Choose a head ref
{{ refName }}
default
Comparing changes
Choose two branches to see what’s changed or to start a new pull request.
If you need to, you can also or
learn more about diff comparisons.
Open a pull request
Create a new pull request by comparing changes across two branches. If you need to, you can also .
Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 7d31bbceaa12
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: dca7ec628e55
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
- 8 commits
- 15 files changed
- 3 contributors
Commits on Mar 5, 2020
-
Configuration menu - View commit details
-
Copy full SHA for cf3cc7a - Browse repository at this point
Copy the full SHA cf3cc7aView commit details -
(cherry-picked from commit facef28)
Configuration menu - View commit details
-
Copy full SHA for e72a27e - Browse repository at this point
Copy the full SHA e72a27eView commit details -
gitlab-workhorse: 8.20.0 -> 8.21.0
(cherry-picked from commit f2bb523)
Configuration menu - View commit details
-
Copy full SHA for 802ff69 - Browse repository at this point
Copy the full SHA 802ff69View commit details -
gitlab-shell: Change name from gitlab-shell-go to gitlab-shell
This is left over from when gitlab-shell had a ruby part and a go part. The ruby part is now gone, so let's call the go part gitlab-shell. (cherry-picked from commit a3b2828)
Configuration menu - View commit details
-
Copy full SHA for 7537484 - Browse repository at this point
Copy the full SHA 7537484View commit details -
bundlerEnv: Add option to copy gem files instead of symlinking
The way ruby loads gems and keeps track of their paths seems to not always work very well when the gems are accessed through symlinks. Ruby will then complain that the same files are loaded multiple times; it relies on the file's full path to determine whether the file is loaded or not. This adds an option to simply copy all gem files into the environment instead, which gets rid of this issue, but may instead result in major file duplication. (cherry-picked from commit affcf9b)
Configuration menu - View commit details
-
Copy full SHA for 00a06a7 - Browse repository at this point
Copy the full SHA 00a06a7View commit details -
gitaly: Copy gem files into bundler env instead of symlinking
This fixes issue #79374, where gitaly prints warning messages on the client side when running push or fetch. (cherry-picked from commit 74769b6)
Configuration menu - View commit details
-
Copy full SHA for 1b2ab5d - Browse repository at this point
Copy the full SHA 1b2ab5dView commit details -
gitlab: 12.8.1 -> 12.8.2 (#81803)
Includes multiple security fixes mentioned in https://about.gitlab.com/releases/2020/03/04/gitlab-12-dot-8-dot-2-released/ (unfortunately, no CVE numbers as of yet) - Directory Traversal to Arbitrary File Read - Account Takeover Through Expired Link - Server Side Request Forgery Through Deprecated Service - Group Two-Factor Authentication Requirement Bypass - Stored XSS in Merge Request Pages - Stored XSS in Merge Request Submission Form - Stored XSS in File View - Stored XSS in Grafana Integration - Contribution Analytics Exposed to Non-members - Incorrect Access Control in Docker Registry via Deploy Tokens - Denial of Service via Permission Checks - Denial of Service in Design For Public Issue - GitHub Tokens Displayed in Plaintext on Integrations Page - Incorrect Access Control via LFS Import - Unescaped HTML in Header - Private Merge Request Titles Leaked via Widget - Project Namespace Exposed via Vulnerability Feedback Endpoint - Denial of Service Through Recursive Requests - Project Authorization Not Being Updated - Incorrect Permission Level For Group Invites - Disclosure of Private Group Epic Information - User IP Address Exposed via Badge images - Update postgresql (GitLab Omnibus) (cherry-picked from commit c25756f)
Milan committedMar 5, 2020 Configuration menu - View commit details
-
Copy full SHA for 3f97de1 - Browse repository at this point
Copy the full SHA 3f97de1View commit details -
Configuration menu - View commit details
-
Copy full SHA for dca7ec6 - Browse repository at this point
Copy the full SHA dca7ec6View commit details
There are no files selected for viewing
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.