Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-10-25Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2022-09-01Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2022-05-19Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2021-10-20Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2021-09-01Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2021-07-03Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2021-04-23Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2021-02-23Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2021-02-10Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2021-01-27Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-12-09Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-11-19Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-09-10Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-09-07Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-08-31Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-08-20Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-08-20Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-08-05Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-07-03Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-06-19Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-06-05Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-05-27Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2018-10-08Enable even more frozen string in lib/**/*.rbgfyoung
Enables frozen string for the following files: * lib/generators/**/*.rb * lib/gitaly/**/*.rb * lib/google_api/**/*.rb * lib/haml_lint/**/*.rb * lib/json_web_token/**/*.rb * lib/mattermost/**/*.rb * lib/microsoft_teams/**/*.rb * lib/object_storage/**/*.rb * lib/omni_auth/**/*.rb * lib/peek/**/*.rb * lib/rouge/**/*.rb * lib/rspec_flaky/**/*.rb * lib/system_check/**/*.rb Partially addresses #47424.
2018-09-14Fix object storage uploads not working with AWS v2Stan Hu
Because we were passing query strings as symbols, the fog-aws storage driver was omitting the uploadId and partNumber query strings from the signature in multipart uploads. This fix makes AWS and Ceph work with v2 signatures. See: https://github.com/fog/fog-aws/blob/v3.0.0/lib/fog/aws/storage.rb#L733 Closes https://gitlab.com/gitlab-org/gitlab-workhorse/issues/181
2018-09-06Fix attachments not displaying inline with Google Cloud StorageStan Hu
There were several issues: 1. With Google Cloud Storage, we can't override the Content-Type with Response-Content-Type once it is set. Setting the value to `application/octet-stream` doesn't buy us anything. GCS defaults to `application/octet-stream`, and AWS uses `binary/octet-stream`. Just remove this `Content-Type` when we upload new files. 2. CarrierWave and fog-google need to support query parameters: https://github.com/fog/fog-google/pull/409/files, https://github.com/carrierwaveuploader/carrierwave/pull/2332/files. CarrierWave has been monkey-patched until an official release. 3. Workhorse also needs to remove the Content-Type header in the request (https://gitlab.com/gitlab-org/gitlab-workhorse/blob/ef80978ff89e628c8eeb66556720e30587d3deb6/internal/objectstore/object.go#L66), or we'll get a 403 error when uploading due to signed URLs not matching the headers. Upgrading to Workhorse 6.1.0 for https://gitlab.com/gitlab-org/gitlab-workhorse/merge_requests/297 will make Workhorse use the headers that are used by Rails. Closes #49957
2018-08-23Send required object storage PUT headers in /uploads/authorize APIStan Hu
As revealed in https://gitlab.com/gitlab-org/gitlab-ce/issues/49957, Rails generates a signed URL with a fixed HTTP header with `Content-Type: application/octet-stream`. However, if we change or remove that for some reason in Workhorse, this breaks the upload with a 403 Unauthorized because the signed URL is not valid. We can make this more robust by doing the following: 1. In the `/uploads/authorize` request, Rails can return a `StoreHeaders` key-value pair in the JSON response containing the required headers that the PUT request must include. 2. Use those HTTP headers if that value is present. 3. For backwards compatibility, if that key is not present, default to the old behavior of sending the fixed `Content-Type` header. See https://gitlab.com/gitlab-org/gitlab-workhorse/merge_requests/297 as well.
2018-06-04Update validatorKamil Trzciński
2018-06-04Support presigned multipart uploadsKamil Trzciński