Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitaly.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2020-09-04Update VERSION to 13.1.11v13.1.1113-1-stableGitLab Release Tools Bot
2020-09-04Update CHANGELOG.md for 13.1.11GitLab Release Tools Bot
[ci skip]
2020-09-03Merge branch 'zj-info-ref-fix-backport-13.1' into '13-1-stable'Zeger-Jan van de Weg
Backport 13.1: Fix hanging info/refs cache when error occurs See merge request gitlab-org/gitaly!2517
2020-09-03Backport 13.1: Fix hanging info/refs cache when error occursZeger-Jan van de Weg
2020-09-03Merge remote-tracking branch 'dev/13-1-stable' into 13-1-stableGitLab Release Tools Bot
2020-09-02Update VERSION to 13.1.10v13.1.10GitLab Release Tools Bot
2020-09-02Update CHANGELOG.md for 13.1.10GitLab Release Tools Bot
[ci skip]
2020-09-02Merge remote-tracking branch 'dev/13-1-stable' into 13-1-stableGitLab Release Tools Bot
2020-09-02Update VERSION filesv13.1.9GitLab Release Tools Bot
[ci skip]
2020-09-02Update CHANGELOG.md for 13.1.9GitLab Release Tools Bot
[ci skip]
2020-08-29Merge branch 'security-207-dont-expand-wiki-paths-13-1' into '13-1-stable'GitLab Release Tools Bot
Don't expand filesystem paths of wiki pages See merge request gitlab-org/security/gitaly!14
2020-08-19Don't expand filesystem paths of wiki pagesMarkus Koller
Paths starting with a `~` tilde character were getting expanded by the call to `File.expand_path` in `BlobEntry.normalize_dir`. This can cause an exception when the tilde is followed by an invalid username, which makes the whole wiki unusable. This overrides `BlobEntry.normalize_dir` so it doesn't expand tildes anymore, and in our case we also don't need to handle symlinks or Windows paths.
2020-08-18Merge remote-tracking branch 'dev/13-1-stable' into 13-1-stableGitLab Release Tools Bot
2020-08-18Update VERSION to 13.1.8v13.1.8GitLab Release Tools Bot
2020-08-18Update CHANGELOG.md for 13.1.8GitLab Release Tools Bot
[ci skip]
2020-08-18Merge remote-tracking branch 'dev/13-1-stable' into 13-1-stableGitLab Release Tools Bot
2020-08-17Update VERSION to 13.1.7v13.1.7GitLab Release Tools Bot
2020-08-17Update CHANGELOG.md for 13.1.7GitLab Release Tools Bot
[ci skip]
2020-08-05Merge remote-tracking branch 'dev/13-1-stable' into 13-1-stableGitLab Release Tools Bot
2020-08-05Update VERSION to 13.1.6v13.1.6GitLab Release Tools Bot
2020-08-05Update CHANGELOG.md for 13.1.6GitLab Release Tools Bot
[ci skip]
2020-08-04Merge branch 'security-pks-create-from-url-creds-13.1' into '13-1-stable'GitLab Release Tools Bot
Injection of `http.<url>.*` git config settings leading to SSRF See merge request gitlab-org/security/gitaly!10
2020-08-04repository: do not persist config when creating from URLPatrick Steinhardt
When creating a new repository from URL, we currently execute the equivalent of `git clone -c $CFG1`. There's a slight gotcha here in that `git clone -c` will persist the configuration into the new repo's gitconfig file, while `git -c $CFG1 clone` does not persist the configuration to disk. There's two parts we're thus currently persisting to disk with one being "http.followRedirects" and the other one being "http.$URL.extraHeader". While the former one doesn't hurt much (but is not required to be persisted), the extra header is used to pass along credentials to the remote. As a result, we accidentally persist user credentials to disk in an unexpected way. Fix the issue by instead passing all configuration options as global configuration parameters to `git` instead of passing them to `git clone`.
2020-07-23Update VERSION to 13.1.5v13.1.5GitLab Release Tools Bot
2020-07-23Update CHANGELOG.md for 13.1.5GitLab Release Tools Bot
[ci skip]
2020-07-17Merge branch 'jc-simplify-git-object-dir-handling-13-1' into '13-1-stable'John Cai
Fix pre-receive hooks not working with symlinked paths (13-1-stable backport) See merge request gitlab-org/gitaly!2387
2020-07-16Merge branch 'jc-simplify-git-object-dir-handling' into 'master'Sami Hiltunen
Fix pre-receive hooks not working with symlinked paths Closes gitlab#223839 See merge request gitlab-org/gitaly!2381
2020-07-09Update VERSION to 13.1.4v13.1.4GitLab Release Tools Bot
2020-07-09Update CHANGELOG.md for 13.1.4GitLab Release Tools Bot
[ci skip]
2020-07-08Merge branch 'jc-hotfix-add-gl-project-path' into 'master'Pavlo Strokov
Add GL_PROJECT_PATH for custom hooks Closes #2902 See merge request gitlab-org/gitaly!2313 (cherry picked from commit 547bcbcd2c2aee8634af59666a1e9bbb9c26e549) 88ca6bcb Add GL_PROJECT_PATH for custom hooks
2020-07-07Merge remote-tracking branch 'dev/13-1-stable' into 13-1-stableGitLab Release Tools Bot
2020-07-06Update VERSION to 13.1.3v13.1.3GitLab Release Tools Bot
2020-07-06Update CHANGELOG.md for 13.1.3GitLab Release Tools Bot
[ci skip]
2020-07-01Merge branch 'sh-http-proxy-fix-13-1' into '13-1-stable'John Cai
Fix HTTP proxies not working in Gitaly hooks (13.1 stable) See merge request gitlab-org/gitaly!2337
2020-07-01Merge remote-tracking branch 'dev/13-1-stable' into 13-1-stableGitLab Release Tools Bot
2020-07-01Merge branch 'sh-fix-issue-2913' into 'master'Patrick Steinhardt
Fix HTTP proxies not working in Gitaly hooks Closes #2913 See merge request gitlab-org/gitaly!2325
2020-07-01Update VERSION to 13.1.2v13.1.2GitLab Release Tools Bot
2020-07-01Update CHANGELOG.md for 13.1.2GitLab Release Tools Bot
[ci skip]
2020-06-30Merge branch 'jc-add-hotfix-to-13-1-stable' into '13-1-stable'John Cai
Add GL_PROJECT_PATH hotfix to 13-1-stable See merge request gitlab-org/gitaly!2324
2020-06-29Merge branch 'security-pks-worktree-race-13.1' into '13-1-stable'Mayra Cabrera
worktree: Add random suffix to worktree paths to obstruct path traversal See merge request gitlab-org/security/gitaly!9
2020-06-29worktree: Add random suffix to worktree paths to obstruct path traversalPatrick Steinhardt
Currently, worktree paths used for operations like rebase or squash that require access to checked-out files are generated deterministically by using an operation-specific prefix as well as the ID of the given operation. If given a path-traversal vulnerability, this makes it easy to use those worktree paths as an attack vector to read arbitrary files and directories. To improve our defense-in-depth mechanisms, this commit adds a random 16-digit hex suffix so that the resulting path is not deterministic. As we use blocks to manage worktrees, we know that the paths are not used outside of a given block anyway and can thus safely be changed.
2020-06-25Merge branch 'jc-hotfix-add-gl-project-path' into 'master'jc-add-hotfix-to-13-1-stablePavlo Strokov
Add GL_PROJECT_PATH for custom hooks Closes #2902 See merge request gitlab-org/gitaly!2313
2020-06-23Update VERSION to 13.1.1v13.1.1GitLab Release Tools Bot
2020-06-23Update CHANGELOG.md for 13.1.1GitLab Release Tools Bot
[ci skip]
2020-06-19Update VERSION to 13.1.0v13.1.0GitLab Release Tools Bot
2020-06-19Update CHANGELOG.md for 13.1.0GitLab Release Tools Bot
[ci skip]
2020-06-18Merge branch 'sk/2756-fix-temp-dir-cleanup' into 'master'Paul Okstad
Fix hourly tmp folder cleanup See merge request gitlab-org/gitaly!2212
2020-06-18Fix hourly tmp folder cleanupSashi
2020-06-17Merge branch 'ps-dequeue-with-skip-in-progress' into 'master'Zeger-Jan van de Weg
Replication not working on Praefect Closes #2801 See merge request gitlab-org/gitaly!2281
2020-06-17Replication not working on PraefectPavlo Strokov
Replications for different repositories on the same storage must be dequeued independently from each other. It is safe to run N replication jobs at the same time on the same storage for different repositories. 'in_progress' replications should not block other replication entries to be consumed from the queue. Closes: https://gitlab.com/gitlab-org/gitaly/-/issues/2801