Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-pages.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2020-08-07Revert "Merge branch 'revert-a3365a7b' into 'master'"revert-185e0a0Jaime Martinez
This reverts commit 185e0a0e5c621f350335495291c535e5c05df89b, reversing changes made to a3365a7b1b41b3dee206cbcf27e915ee45d556a5.
2020-08-04Revert "Merge branch 'use-domain-config-source-disk' into 'master'"revert-a3365a7bVladimir Shushlin
This reverts merge request !305
2020-08-04Update acceptance tests without gitlabsourceconfigJaime Martinez
2020-07-02fix default value for gitlab-server to include scheme and portIgor
2020-05-28Add .golangci.yml linter configurationJaime Martinez
As part of https://gitlab.com/gitlab-org/gitlab-pages/-/issues/385 we have introduced the use of a custom `.golangci.yml` file with some custom rules for linting. This replaces the need of downloading and using `golint`, `gofmt` `go vet` and `gocyclo` manually. We take advantage of the custom `golangci-lint` docker image as stated in the [Automatic lintinb] (https://docs.gitlab.com/ee/development/go_guide/#automatic-linting) section of the Go standards and style guidelines. This iteration enables a subset of linters, with the remaining of them enabled on a separate MR as described in the issue above. The main changes introduced by this linter include: - gosec: potential hardcoded credentials - goconst: DRY by declaring and using constants - gosimple: reduce statements complexity and improve return statements
2020-05-19Rename flag to domain-config-sourceJaime Martinez
2020-05-18Add domain-source config flagJaime Martinez
This is an incremental step for adding `-domain-source` as described in https://gitlab.com/gitlab-org/gitlab/-/issues/217912. We are only adding the flag here but it's not doing anything at the moment. Add TODO for implementation
2020-05-08Enforce loading secrets from fileJaime Martinez
Passing secrets via command line is not allowed anymore. A config file should be used instead. The default filename is `gitlab-pages-config`. The following command line options will throw an error and prevent pages from running if set explicitly: - `-auth-client-id` - `-auth-client-secret` - `-auth-secret`
2020-05-08Fix deprecated args validationJaime Martinez
Fixes check for deprecated arguments to cater for key=value arugments. It also logs the warning if a deprecated flag is used.
2020-04-30make internalGitLabServerFromFlags unexportedIgor Wiedler
2020-04-30change back to internal-gitlab-server as per @@vshushlinIgor Wiedler
2020-04-30rename internal-gitlab-server to gitlab-api-server (as per @@krasio)Igor Wiedler
2020-04-29introduce separate config flag internal-gitlab-serverIgor Wiedler
2020-02-11Add prometheus metrics for GitLab API clientJaime Martinez
Refactor metrics initialization removing init function from the metrics package.
2020-01-28Implement support for incremental rolloutKrasimir Angelov
This adds support for specifying rollout strategy via the following attributes: * percentage - integer value that specifies how many % of requests should be enabled * stickiness - if not specified guarantees stickiness for the provided actor. If set to "random" no stickiness is guaranteed.
2020-01-21use flag.Duration for the new configs instead of int64Jaime Martinez
2020-01-16add -gitlab-client-http-timeout -gitlab-client-jwt-expiry config flagsJaime Martinez
2019-12-05Base64 decode GitLab API secretKrasimir Angelov
before using it.
2019-12-04Make GitLab API Secret a supported parameterGrzegorz Bizon
2019-12-04Improve error reporting in the main packageGrzegorz Bizon
2019-11-27Read the context of api-secret-key file and store it in app configKrasimir Angelov
as GitLabAPISecretKey
2019-11-06Add minimal support for the api-secret-key config flagKrasimir Angelov
Related to https://gitlab.com/gitlab-org/gitlab/issues/28781 and https://gitlab.com/gitlab-org/gitlab-pages/issues/253.
2019-10-18Merge branch '208-secrets-should-not-be-given-on-command-line' into 'master'258-enable-let-s-encrypt-certificates-for-new-pages-domains-by-default-if-it-s-enabled-on-the-instance-levelNick Thomas
Secrets should not be given on command line See merge request gitlab-org/gitlab-pages!182
2019-10-18Secrets should not allowed on command lineSean Carroll
2019-10-07Remove unused Admin gRPC APIKrasimir Angelov
It was ever used. See gitlab-org/omnibus-gitlab/merge_requests/3444#note_194217889 for more details. Done as part of https://gitlab.com/gitlab-org/gitlab/issues/28781.
2019-08-30Add full HTTP metrics and logging to GitLab pages using LabKitAndrew Newdigate
2019-07-12feat: add flag to define custom response headersMax Wittig
2019-07-10Revert "chore: vendor complete dependency tree"Max Wittig
This reverts commit 27bd4d83cade6a721330e8583874e7c715bf3a26.
2019-06-03Redirect unknown ACME challenges to the GitLab instanceVladimir Shushlin
2019-05-28Add config flags to specify TLS versionsKrasimir Angelov
Introduce two new configuration options -tls-min-version and -tls-max-version to control which TLS versions will be supported by the server. Accepted values are ssl3, tls1.0, tls1.1, tls1.2, and tls1.3. Closing https://gitlab.com/gitlab-org/gitlab-pages/issues/187
2019-05-16Disable 3DES and other insecure cipher suitesKrasimir Angelov
Supported cipher suites: tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305 tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Closes https://gitlab.com/gitlab-org/gitlab-pages/issues/150.
2019-02-25Print output of -version flag to STDOUTBalasankar "Balu" C
2018-10-26Allow the maximum connection concurrency to be specifiedNick Thomas
2018-10-24Fix import paths for goimportNick Thomas
2018-10-12Fix version display to include a newlineNick Thomas
2018-06-30Add support for private projects and authentication with GitLab APITuomo Ala-Vannesluoma
2018-04-27Restore the old in-place chroot behaviour as a command-line optionNick Thomas
2018-04-23Add gRPC admin health checkJacob Vosmaer (GitLab)
2018-04-10Make listening flags easier to findJacob Vosmaer
2018-03-13Add more logging to gitlab pages daemonmaxmeyer
2018-03-07Structured loggingJacob Vosmaer (GitLab)
2017-09-08Add multiflag support for new flag implementationZeger-Jan van de Weg
In the parent of this commit, I've added a new flag implementation to support config using env vars or a config file. This commits add support for multiflag value setting, when using a csv like structure for those values. This was needed as for those only the first value was being read.
2017-09-08Use namsral/flag to support environment vars for configZeger-Jan van de Weg
2017-09-08Add an artifacts proxy to GitLab PagesJ. Shuster
2017-07-05Add disabled-by-default status check endpointNick Thomas
2017-06-15Add CORS support to GET requestsNick Thomas
2017-03-13Fix and clarify redirect HTTP logicStan Hu
redirect-http seemed to suggest the Pages daemon would redirect from HTTPS to HTTP, but it seems that the opposite was implied. Fixes issue manifested by https://gitlab.com/gitlab-org/omnibus-gitlab/merge_requests/1348
2017-02-07Improve complexity metricsZ.J. van de Weg
Also fixed the dependencies, moved metrics to its own package and updated the tests
2017-02-02Prometheus monitoring for GitLab PagesZ.J. van de Weg
This starts of the prometheus monitoring for GitLab Pages, and resolves gitlab-org/gitlab-pages#42 Point to check: - Are the metric names good, keeping Prometheus' conventions in mind? - Golang, general style etc - Shouldn't I do some voodoo magic to import this in the library?
2016-09-09Allow -listen-http, -listen-https and -listen-proxy to be given more than onceNick Thomas
Per issue #13, sometimes you want to listen on more than one port for each type of listener. This commit adds support for that.