Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2018-06-27Migrate storage nesting check to GitalyJacob Vosmaer (GitLab)
2018-06-05Fix Fog mockingKamil Trzciński
2018-06-04Update validatorKamil Trzciński
2018-06-04Support presigned multipart uploadsKamil Trzciński
2018-06-01Merge branch 'sh-bump-ruby-2.4' into 'master'Stan Hu
Upgrade to Ruby 2.4.4 See merge request gitlab-org/gitlab-ce!19055
2018-05-30Replace grape-route-helpers with our own grape-path-helpersStan Hu
This gem (https://gitlab.com/gitlab-org/grape-path-helpers) makes a number of changes: 1. Brings in @mdelaossa's changes in https://github.com/reprah/grape-route-helpers/pull/21 2. Fixes some broken specs and code for Grape 1.0+ 3. Optimizes the generation of paths by bringing in @dblessing's HashWithIndifferentAccess changes in https://gitlab.com/gitlab-org/gitlab-ce/issues/45718#note_70123793 Closes #45718
2018-05-30Upgrade to Ruby 2.4.4Stan Hu
Fixes that make this work: * A change in Ruby (https://github.com/ruby/ruby/commit/ce635262f53b760284d56bb1027baebaaec175d1) requires passing in the exact required length for OpenSSL keys and IVs. * Ensure the secrets.yml is generated before any prepended modules are loaded. This is done by renaming the `secret_token.rb` initializer to `01_secret_token.rb`, which is a bit ugly but involves the least impact on other files.
2018-05-11Remove method call to deprecated methodZeger-Jan van de Weg
Given the settings initializer creates Gitaly Storage Settings objects already, the calls to path can be moved to that initializer.
2018-04-13Replacing gollum libs for custom gitlab onesFrancisco Javier López
2018-04-05Add `direct_upload` setting for artifactsKamil Trzciński
2018-03-27Merge branch '40781-os-to-ce' into 'master'Sean McGivern
Bring Object Storage to CE Closes #4171, #4163, #3370, #2841, and #29203 See merge request gitlab-org/gitlab-ce!17358
2018-03-21Route path lookups through legacy_disk_pathJacob Vosmaer
2018-02-28Merge branch '4879-support-private-https-urls-for-object-storage' into 'master'Sean McGivern
Resolve ""Support private HTTPS urls for object storage"" Closes #4879 See merge request gitlab-org/gitlab-ee!4475
2018-01-30Fix grape-route-helper route shadowingMario de la Ossa
Bringing in https://github.com/reprah/grape-route-helpers/pull/21 as a monkey patch since the grape-route-helpers project seems to be abandoned
2018-01-25Default to HTTPS for all Gravatar URLsAchilleas Pipinellis
If using gravatar.com, both plain_url and ssl_url in settings are now served via HTTPS. Make this the default.
2018-01-09Fixing bug related to wiki last versionFrancisco Javier López
2017-11-02Fix rspec errors, and add more tests to MethodCall and ActionViewPawel Chojnacki
2017-10-17Read circuitbreaker settings from `Gitlab::CurrentSettings`Bob Van Landuyt
Instead of from the configuration file
2017-09-20Upgrade doorkeeper-openid_connectMarkus Koller
2017-09-18Clean up read_registry scope changesRobin Bobbitt
Closes #37789
2017-09-13Fix doorkeeper failureKamil Trzciński
2017-08-18Setup repositories settings properlyMichael Kozono
2017-08-18Setup LDAP settings properlyMichael Kozono
2017-08-04Add a Circuitbreaker for storage pathsBob Van Landuyt
2017-07-27Use described_class when possibleRémy Coutable
Signed-off-by: Rémy Coutable <remy@rymai.me>
2017-07-27Remove superfluous lib: true, type: redis, service: true, models: true, ↵Rémy Coutable
services: true, no_db: true, api: true Signed-off-by: Rémy Coutable <remy@rymai.me>
2017-07-04Instrument Unicorn with Ruby exporterPaweł Chojnacki
2017-06-14Instrument MergeRequestDiff#load_commitsSean McGivern
This instrumentation isn't needed strictly for performance measurements, but just to see which controller actions call this method at all. See <https://gitlab.com/gitlab-org/gitlab-ce/issues/30224#note_32306159> for more details.
2017-04-02Enable Style/Proc cop for rubocopmhasbini
2017-03-08Improve storage validation after configuration structure updateAlejandro Rodríguez
Besides improving the error message to specify what exactly you need to do to solve the error, we now don't skip all storage validations on the test environment, so that you also get a nice error message if you're running tests. Now if conditions are met to skip valitaions (test env or env variable) we still make sure the settings _look_ sane, we just skip verifying the paths exists and meet the given conditions.
2017-03-07Merge branch '28447-hybrid-repository-storages' into 'master' Sean McGivern
Update storage settings to allow extra values per shard See merge request !9597
2017-03-07Add specs for Doorkeeper resource_owner_authenticatorMarkus Koller
2017-03-07Only use API scopes for personal access tokensMarkus Koller
2017-03-07Implement OpenID Connect identity providerMarkus Koller
2017-03-03Update storage settings to allow extra values per shardAlejandro Rodríguez
This will be necessary when adding gitaly settings. This version doesn't make any functional changes, but allows us to include this breaking change in 9.0 and add the needed extra settings in the future with backwards compatibility
2017-03-01Execute metrics initializer earlierAdam Niedzielski
This makes sure that Gitlab::Metrics::RackMiddleware is added before Gitlab::EtagCaching::Middleware.
2017-02-23Enable Style/SpaceInsideBracketsDouwe Maan
2017-01-24Add metric initializer specSean McGivern
An empty file in one of the instrumented directories will cause the app to fail to start when metrics are enabled. Metrics aren't enabled by default in development or test. We could handle the empty file case explicitly, but a file could still not define the constant it is expected to, so instead run the initializer manually in a spec and check that it succeeds.
2017-01-09Introduce "stub_env" test helper for safely stubbing environment variablesAdam Niedzielski
2016-08-03Give priority to environment variablesSean McGivern
If an environment variable exists for secret_key_base, use that - always. But don't save it to secrets.yml. Also ensure that we never write to secrets.yml if there's a non-blank value there.
2016-08-03Store all secret keys in secrets.ymlSean McGivern
Move the last secret from .secret to config/secrets.yml, and delete .secret if it exists.
2016-08-03Store OTP secret key in secrets.ymlSean McGivern
.secret stores the secret token used for both encrypting login cookies and for encrypting stored OTP secrets. We can't rotate this, because that would invalidate all existing OTP secrets. If the secret token is present in the .secret file or an environment variable, save it as otp_key_base in secrets.yml. Now .secret can be rotated without invalidating OTP secrets. If the secret token isn't present (initial setup), then just generate a separate otp_key_base and save in secrets.yml. Update the docs to reflect that secrets.yml needs to be retained past upgrades, but .secret doesn't.
2016-07-31Ignore invalid IPs in X-Forwarded-For when trusted proxies are configured.lookatmike
2016-07-24Ignore invalid trusted proxies in X-Forwarded-For headerStan Hu
Certain reverse proxies can send invalid IP addresses in the X-Forwarded-For header For example, Apache can send (null). Closes #20194
2016-07-22Skip repository storage path valitaions on test environmentAlejandro Rodríguez
Storage path are not created until `TestEnv.init`, so we must skip their validation on initialization.
2016-07-22Use Pathname to make the repository storage path validations more robustAlejandro Rodríguez
2016-07-01Enable Style/EmptyLines cop, remove redundant onesGrzegorz Bizon
2016-06-30Merge branch 'rack-request-trusted-proxies' into 'master' Douwe Maan
Make Rack::Request use our trusted proxies when filtering IP addresses ## What does this MR do? This allows us to control the trusted proxies while deployed in a private network. ## Are there points in the code the reviewer needs to double check? If we want to limit what is impacted, we can do this specifically for the rack_attack request object. ## Why was this MR needed? Normally Rack::Request will trust all private IPs as trusted proxies, which can cause problems if your users are connection on you network via private IP ranges. Normally in a rails app this is handled by action_dispatch request, but rack_attack is specifically using the Rack::Request object instead. ## What are the relevant issue numbers? Fixes https://gitlab.com/gitlab-org/gitlab-ce/issues/17550 ## Does this MR meet the acceptance criteria? - [x] [CHANGELOG](https://gitlab.com/gitlab-org/gitlab-ce/blob/master/CHANGELOG) entry added - [ ] ~~[Documentation created/updated](https://gitlab.com/gitlab-org/gitlab-ce/blob/master/doc/development/doc_styleguide.md)~~ - [ ] ~~API support added~~ - Tests - [x] Added for this feature/bug - [x] All builds are passing - [x] Conform by the [style guides](https://gitlab.com/gitlab-org/gitlab-ce/blob/master/CONTRIBUTING.md#style-guides) - [ ] Branch has no merge conflicts with `master` (if you do - rebase it please) - [ ] [Squashed related commits together](https://git-scm.com/book/en/Git-Tools-Rewriting-History#Squashing-Commits) \cc @stanhu See merge request !4958
2016-06-30Make Rack::Request use our trusted proxies when filtering IP addressesDJ Mountney
This allows us to control the trusted proxies while deployed in a private network. Normally Rack::Request will trust all private IPs as trusted proxies, which can caue problems if your users are connection on you network via private IP ranges. Normally in a rails app this is handled by action_dispatch request, but rack_attack is specifically using the Rack::Request object instead.
2016-06-30Refactor repository paths handling to allow multiple git mount pointsAlejandro Rodríguez