Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2019-01-04Track Sentry error when namespace cannot be movedValery Sizov
Backport of https://gitlab.com/gitlab-org/gitlab-ee/merge_requests/8926
2018-11-06Stop Repository#fetch_remote from using Gitlab::ShellNick Thomas
This indirection doesn't provide any value, so remove it
2018-10-22Enable frozen string for lib/gitlab/*.rbgfyoung
2018-09-13Merge branch 'rubocop-code-reuse' into 'master'Robert Speicher
Add RuboCop cops to enforce code reusing rules See merge request gitlab-org/gitlab-ce!21391
2018-09-12Remove Rugged and shell code from Gitlab::GitAlejandro RodrĂ­guez
2018-09-11Disable existing offenses for the CodeReuse copsYorick Peterse
This whitelists all existing offenses for the various CodeReuse cops, of which most are triggered by the CodeReuse/ActiveRecord cop.
2018-07-09Use Gitaly for fetches and creating bundlesJacob Vosmaer
2018-07-06Make more things mandatoryJacob Vosmaer
2018-06-19Move forking to GitalyZeger-Jan van de Weg
Closes https://gitlab.com/gitlab-org/gitaly/issues/817 Closes https://gitlab.com/gitlab-org/gitaly/issues/1236
2018-06-12Find and mark more Git disk access locations, part 2Jacob Vosmaer
2018-05-02Remove old GitLab Shell implementationZeger-Jan van de Weg
Moves the calls to Gitaly, no matter what the feature flag values are.
2018-04-25Gitlab::Shell works on shard name, not pathZeger-Jan van de Weg
Direct disk access is done through Gitaly now, so the legacy path was deprecated. This path was used in Gitlab::Shell however. This required the refactoring in this commit. Added is the removal of direct path access on the project model, as that lookup wasn't needed anymore is most cases. Closes https://gitlab.com/gitlab-org/gitaly/issues/1111
2018-04-18Resolve "Make a Rubocop that forbids returning from a block"🙈 jacopo beschi 🙉
2018-04-03Use shard name in Git::GitlabProjects instead of shard pathAhmad Sherif
Closes gitaly#1110
2018-03-23Merge branch 'mark-legacy-git-access' into 'master'Sean McGivern
Route path lookups through legacy_disk_path See merge request gitlab-org/gitlab-ce!17743
2018-03-21Route path lookups through legacy_disk_pathJacob Vosmaer
2018-03-14Set Gitlab::Shell#create_repository as OPT_OUTZeger-Jan van de Weg
On .com repositories are created through Gitaly for a while now. For customers this is not the case unless these have chosen to do so through feature flags. By moving this to opt out, everyone will be using this. This move is part of the migration issue https://gitlab.com/gitlab-org/gitaly/issues/593 The bigger impact this commit will have is that tests that use a repository through `FactoryBot.create(:project, :repository)` will now use Gitaly to do so. As tests run on the same disk, or at least machine, this will most probably slow them down.
2018-03-14Change Gitlab::Shell#add_namespace to #create_namespaceZeger-Jan van de Weg
Prior to this change, this method was called add_namespace, which broke the CRUD convention and made it harder to grep for what I was looking for. Given the change was a find and replace kind of fix, this was changed without opening an issue and on another feature branch. If more dynamic calls are made to add_namespace, these could've been missed which might lead to incorrect bahaviour. However, going through the commit log it seems thats not the case.
2018-03-06Make --prune a configurable parameter in fetching a git remoteStan Hu
By default, --prune is added to the command-line of a `git fetch` operation, but for repositories with many references this can take a long time to run. We shouldn't need to run --prune the first time we fetch a new repository.
2018-02-08Merge branch 'zj-namespace-gitaly-opt-out' into 'master'Sean McGivern
Move Namespace to Gitaly using OPT-OUT See merge request gitlab-org/gitlab-ce!15910
2018-01-10Merge branch 'zj-migrate-gitlab-project-rm-mv' into 'master'Douwe Maan
Migrate GitlabProject (re)move project endpoints Closes gitaly#873 See merge request gitlab-org/gitlab-ce!16249
2018-01-09Migrate GitlabProject (re)move project endpointsZeger-Jan van de Weg
Migration is done through a small refactoring, which makes us call endpoins which are performing the same actions for namespaces. Tests are added to ensure only the project is removed that should be removed. Closes gitlab-org/gitaly#873
2018-01-09Merge branch 'jej/backport-authorized-keys-to-ce' into 'master'Douwe Maan
Backport authorized_keys Closes gitlab-ee#3953 See merge request gitlab-org/gitlab-ce!16014
2018-01-08Make Gitlab::CurrentSettings available when getting settingsSean McGivern
2018-01-08Backport authorized_keys_enabled defaults to true'Michael Kozono
Originally from branch 'fix-authorized-keys-enabled-default-2738' via merge request https://gitlab.com/gitlab-org/gitlab-ee/merge_requests/2240 Removed background migrations which were intended to fix state after using Gitlab without a default having been set Squashed commits: Locally, if Spring was not restarted, `current_application_settings` was still cached, which prevented the migration from editing the file. This will also ensure that any app server somehow hitting old cache data will properly default this setting regardless. Retroactively fix migration This allows us to identify customers who ran the broken migration. Their `authorized_keys_enabled` column does not have a default at this point. We will fix the column after we fix the `authorized_keys` file. Fix authorized_keys file if needed Add default to authorized_keys_enabled setting Reminder: The original migration was fixed retroactively a few commits ago, so people who did not ever run GitLab 9.3.0 already have a column that defaults to true and disallows nulls. I have tested on PostgreSQL and MySQL that it is safe to run this migration regardless. Affected customers who did run 9.3.0 are the ones who need this migration to fix the authorized_keys_enabled column. The reason for the retroactive fix plus this migration is that it allows us to run a migration in between to fix the authorized_keys file only for those who ran 9.3.0. Tweaks to address feedback Extract work into background migration Move batch-add-logic to background migration Do the work synchronously to avoid multiple workers attempting to add batches of keys at the same time. Also, make the delete portion wait until after adding is done. Do read and delete work in background migration Fix Rubocop offenses Add changelog entry Inform the user of actions taken or not taken Prevent unnecessary `select`s and `remove_key`s Add logs for action taken Fix optimization Reuse `Gitlab::ShellAdapter` Guarantee the earliest key Fix migration spec for MySQL
2018-01-08Backport option to disable writing to `authorized_keys` fileMichael Kozono
Originally branch 'mk-toggle-writing-to-auth-keys-1631' See merge request !2004 Squashed commits: Add authorized_keys_enabled to Application Settings Ensure default settings are exposed in UI Without this change, `authorized_keys_enabled` is unchecked when it is nil, even if it should be checked by default. Add “Speed up SSH operations” documentation Clarify the reasons for disabling writes Add "How to go back" section Tweak copy Update Application Setting screenshot
2018-01-06Pass timeout to RepositoryService.FetchRemote Gitaly RPC callsAlejandro RodrĂ­guez
2018-01-05Merge branch 'ban-disk-import' into 'master'Sean McGivern
Don't use Gitlab::Shell#import_repository on local paths See merge request gitlab-org/gitlab-ce!16228
2018-01-05Merge branch 'gitaly-annotations-20180104' into 'master'Sean McGivern
Update some Gitaly annotations in Gitlab::Shell See merge request gitlab-org/gitlab-ce!16226
2018-01-04rubocopJacob Vosmaer
2018-01-04get it workingJacob Vosmaer
2018-01-04Update some Gitaly annotations in Gitlab::ShellJacob Vosmaer
2018-01-04Move delete_remote_branches from Gitlab::Shell to Gitlab::Git::RepositoryAlejandro RodrĂ­guez
2018-01-04Move push_remote_branches from Gitlab::Shell to Gitlab::Git::RepositoryAlejandro RodrĂ­guez
2017-12-14Import gitlab_projects.rb from gitlab-shellNick Thomas
By importing this Ruby code into gitlab-rails (and gitaly-ruby), we avoid 200ms of startup time for each gitlab_projects subprocess we are eliminating. By not having a gitlab_projects subprocess between gitlab-rails / sidekiq and any git subprocesses (e.g. for fork_project, fetch_remote, etc, calls), we can also manage these git processes more cleanly, and avoid sending SIGKILL to them
2017-12-13Move Namespace to Gitaly using OPT-OUTZeger-Jan van de Weg
2017-12-04Fix the fork project functionality for projects with hashed storageNick Thomas
Note the dependency on gitlab-shell v5.10.0
2017-11-21Set the default gitlab-shell timeout to 3 hoursNick Thomas
2017-11-16Adds Rubocop rule for line break after guard clauseJacopo
Adds a rubocop rule (with autocorrect) to ensure line break after guard clauses.
2017-10-05Fix namespace deletion testsZeger-Jan van de Weg
2017-10-05Gitaly namespace service enabled for GitLabZeger-Jan van de Weg
2017-09-29Create repositories via GitalyJacob Vosmaer
2017-08-30Migrate Repository.FetchRemote to GitalyKim "BKC" CarlbÀcker
- `Gitlab::Shell.fetch_remote` now takes a `Gitlab::Git::Repository` instead
2017-08-15Speed up project creation by inlining repository creationNick Thomas
2017-08-07Backport changes in ↔Nick Thomas
https://gitlab.com/gitlab-org/gitlab-ee/merge_requests/2551 to CE
2017-07-13More Gitaly annotationsJacob Vosmaer
2017-07-03Speed up operations performed by gitlab-shellStan Hu
2017-06-21Enable Style/DotPosition Rubocop :cop:Grzegorz Bizon
2017-04-27Add configurable timeout for git fetch and clone operationsChris Wilson
GitLab uses the import_project method in GitLab Shell, This method uses a timeout for the operation, hardcoded to 800 seconds. With this MR the timeout is now configurable in the gitlab_shell settings.
2017-04-05Handle SSH keys that have multiple spaces between each markerStan Hu
Notice what happens when a user adds a key with a space in between: ``` irb(main):004:0> 'ssh-rsa foobar'.split(/ /) => ["ssh-rsa", "", "foobar"] ``` This would cause gitlab-shell to receive a blank argument for the actual key, leading to users unable to login.