Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2018-07-10Make sure we're matching the same way.Lin Jen-Shin
Ruby's regular expression is unicode aware, therefore 'å' also matches against /\p{alnum}/. If we want only ASCII-7bit, use [a-zA-Z0-9]+ so they always match the same thing
2018-07-02DRY group creation code in nested groups fixturesDmitriy Zaporozhets
Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
2018-06-07Enable hashed storage for new projects by default in developmentValery Sizov
2018-04-23Move spec helpers/matchers/shared examples/contexts to their relevant folderRémy Coutable
Signed-off-by: Rémy Coutable <remy@rymai.me>
2018-04-12Merge branch 'dm-archived-read-only' into 'master'Robert Speicher
Make archived projects completely read-only Closes #44788 See merge request gitlab-org/gitlab-ce!18136
2018-04-11Rename `create_merge_request` permissionsBob Van Landuyt
So we can distinguish between the permissions on the source and the target project. - `create_merge_request_from` indicates a user can create a merge request with the project as a source_project - `create_merge_request_in` indicates a user can create a merge request with the project as a target_project
2018-04-11Merge branch 'zj-fix-environments-fixtures' into 'master'Robert Speicher
Fix enviroments seeding on certain branch names Closes #45051 See merge request gitlab-org/gitlab-ce!18263
2018-04-10Make sure hooks run when seeding admin userDouwe Maan
2018-04-10Fix enviroments seeding on certain branch namesZeger-Jan van de Weg
Bit of a cryptic commit title, but our seeding will try to guard against branchnames being anything but alphanumerical. These charachters we gsub away but can't have an empty string as replacement. This change is less efficient, but given that the number of seeded MRs per project is very limited, this should be ok.
2018-03-15Add labeled issues seedFelipe Artur
2018-02-15Remove root user 100 project limit to rely on default 100,000Eric Eastwood
See https://gitlab.com/gitlab-org/gitlab-ce/issues/43271
2018-01-06Merge branch 'sh-reuse-disk-repositories-seeder' into 'master'Stan Hu
Skip project repository disk validation in development project seeder Closes gitlab-development-kit#310 See merge request gitlab-org/gitlab-ce!16257
2018-01-05Remove labeled issues seedFelipe Artur
2018-01-05Skip project repository disk validation in development project seederStan Hu
When seeding the GDK with new projects, it's very common to reuse the same repository names on disk. Previously, the validation would fail and leave the projects in a half-broken state. We can skip the validation to avoid causing odd errors. Closes gitlab-org/gitlab-development-kit#310
2018-01-05Merge branch 'issue_40500' into 'master'Sean McGivern
Improve filtering issues by label performance Closes #40500 and #37143 See merge request gitlab-org/gitlab-ce!16136
2018-01-05Improve filtering issues by label performanceFelipe Artur
2017-12-27Fix Gitlab::Access.values to Gitlab::Access.sym_options at 06_teams on ↵ogom
development db fixtures
2017-12-22Replace '.team << [user, role]' with 'add_role(user)' in specsblackst0ne
2017-12-14Replace factory_girl_rails with factory_bot_railsRémy Coutable
I've followed the [upgrade guide](https://github.com/thoughtbot/factory_bot/blob/4-9-0-stable/UPGRADE_FROM_FACTORY_GIRL.md) and ran these two commands: ``` grep -e FactoryGirl **/*.rake **/*.rb -s -l | xargs sed -i "" "s|FactoryGirl|FactoryBot|" grep -e factory_girl **/*.rake **/*.rb -s -l | xargs sed -i "" "s|factory_girl|factory_bot|" ``` Signed-off-by: Rémy Coutable <remy@rymai.me>
2017-12-03Rename artifacts_* to legacy_artifacts_*Kamil Trzcinski
2017-11-17Update CycleAnalytics seed to account for multiple issue assigneesRobert Speicher
2017-09-20Remove depreceted and big projectsZeger-Jan van de Weg
2017-08-23Move GitHooksService to Gitlab::GitJacob Vosmaer
2017-08-11Skip creating the merge request if repo is emptyLin Jen-Shin
2017-06-21Replace invalid chars while seeding environmentsZeger-Jan van de Weg
2017-06-06Fix error while seeding projects in databaseDouglas Barbosa Alexandre
2017-06-05Merge branch 'sidekiq-transaction' into 'master'Sean McGivern
Forbid Sidekiq scheduling in transactions Closes #27233 See merge request !9376
2017-06-05Merge branch '30469-convdev-index' into 'master'Sean McGivern
ConvDev Index Closes #30469 See merge request !11377
2017-06-02Fix keys seedDouwe Maan
2017-06-02Make sure that environment was created before deployingLin Jen-Shin
2017-06-01Fix other use of CreateDeploymentService and makeLin Jen-Shin
it a bit more robust against missing options, which we did guard on for some cases.
2017-06-01Add Conversational Development Index page to admin panelTaurie Davis, Simon Knox and Adam Niedzielski
2017-05-31Introduce source to pipeline entityKamil Trzcinski
2017-05-04Backport of multiple_assignees_feature [ci skip]Valery Sizov
2017-04-10Move the nested groups seed behind an environment flagRobert Speicher
This seed downloads 2.1 GB worth of repositories. Google can afford the bandwidth, but if a person using the GDK is on a metered connection, that's not so great. Also the GDK test suite runs this seed, so every CI run for that project had to download those as well. Needlessly wasteful.
2017-04-06Optimise trace handling code to use streaming instead of full readKamil Trzciński
2017-04-05Added mock deployment and monitoring service with environments fixturesKamil Trzciński
2017-04-04Ensure we generate unique usernames otherwise validations failRémy Coutable
Signed-off-by: Rémy Coutable <remy@rymai.me>
2017-04-03Ensure the AbuseReport fixtures create unique reported usersRémy Coutable
Signed-off-by: Rémy Coutable <remy@rymai.me>
2017-04-03Don't use FFaker in factories, use sequences insteadRémy Coutable
Signed-off-by: Rémy Coutable <remy@rymai.me>
2017-04-03Fix the AbuseReport seederRémy Coutable
Signed-off-by: Rémy Coutable <remy@rymai.me>
2017-03-20Remove useless options from db/fixtures/development/17_cycle_analytics.rbRémy Coutable
Signed-off-by: Rémy Coutable <remy@rymai.me>
2017-03-07Fix up @DouweM reviewEric Eastwood
2017-03-03Fix the `Gitlab::Seeder` monkey patch to disable mail deliveryRobert Speicher
2017-02-27Add development fixtures for nested groupsDmitriy Zaporozhets
Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
2017-02-24Rename commit_file, commit_dir and remove_file and update specsDouwe Maan
2017-02-24Consistently create, update, and delete files, taking CRLF settings into accountDouwe Maan
2017-02-16Seed abuse reportsEric Eastwood
``` rake db:seed_fu FILTER=abuse_reports ``` Thanks to @stanhu, https://gitlab.com/gitlab-org/gitlab-ce/issues/28059#note_23325328
2017-02-03replace `find_with_namespace` with `find_by_full_path`Adam Pahlevi
add complete changelog for !8949
2017-01-25Fix race conditions for AuthorizedProjectsWorkerYorick Peterse
There were two cases that could be problematic: 1. Because sometimes AuthorizedProjectsWorker would be scheduled in a transaction it was possible for a job to run/complete before a COMMIT; resulting in it either producing an error, or producing no new data. 2. When scheduling jobs the code would not wait until completion. This could lead to a user creating a project and then immediately trying to push to it. Usually this will work fine, but given enough load it might take a few seconds before a user has access. The first one is problematic, the second one is mostly just annoying (but annoying enough to warrant a solution). This commit changes two things to deal with this: 1. Sidekiq scheduling now takes places after a COMMIT, this is ensured by scheduling using Rails' after_commit hook instead of doing so in an arbitrary method. 2. When scheduling jobs the calling thread now waits for all jobs to complete. Solution 2 requires tracking of job completions. Sidekiq provides a way to find a job by its ID, but this involves scanning over the entire queue; something that is very in-efficient for large queues. As such a more efficient solution is necessary. There are two main Gems that can do this in a more efficient manner: * sidekiq-status * sidekiq_status No, this is not a joke. Both Gems do a similar thing (but slightly different), and the only difference in their name is a dash vs an underscore. Both Gems however provide far more than just checking if a job has been completed, and both have their problems. sidekiq-status does not appear to be actively maintained, with the last release being in 2015. It also has some issues during testing as API calls are not stubbed in any way. sidekiq_status on the other hand does not appear to be very popular, and introduces a similar amount of code. Because of this I opted to write a simple home grown solution. After all, all we need is storing a job ID somewhere so we can efficiently look it up; we don't need extra web UIs (as provided by sidekiq-status) or complex APIs to update progress, etc. This is where Gitlab::SidekiqStatus comes in handy. This namespace contains some code used for tracking, removing, and looking up job IDs; all without having to scan over an entire queue. Data is removed explicitly, but also expires automatically just in case. Using this API we can now schedule jobs in a fork-join like manner: we schedule the jobs in Sidekiq, process them in parallel, then wait for completion. By using Sidekiq we can leverage all the benefits such as being able to scale across multiple cores and hosts, retrying failed jobs, etc. The one downside is that we need to make sure we can deal with unexpected increases in job processing timings. To deal with this the class Gitlab::JobWaiter (used for waiting for jobs to complete) will only wait a number of seconds (30 by default). Once this timeout is reached it will simply return. For GitLab.com almost all AuthorizedProjectWorker jobs complete in seconds, only very rarely do we spike to job timings of around a minute. These in turn seem to be the result of external factors (e.g. deploys), in which case a user is most likely not able to use the system anyway. In short, this new solution should ensure that jobs are processed properly and that in almost all cases a user has access to their resources whenever they need to have access.