BigW Consortium Gitlab

  1. 05 Sep, 2017 1 commit
  2. 31 Aug, 2017 2 commits
    • `current_application_settings` belongs on `Gitlab::CurrentSettings` · 5883ce95
      Sean McGivern authored
      The initializers including this were doing so at the top level, so every object
      loaded after them had a `current_application_settings` method. However, if
      someone had rack-attack enabled (which was loaded before these initializers), it
      would try to load the API, and fail, because `Gitlab::CurrentSettings` didn't
      have that method.
      
      To fix this:
      
      1. Don't include `Gitlab::CurrentSettings` at the top level. We do not need
         `Object.new.current_application_settings` to work.
      2. Make `Gitlab::CurrentSettings` explicitly `extend self`, as we already use it
         like that in several places.
      3. Change the initializers to use that new form.
  3. 17 Aug, 2017 2 commits
  4. 08 Aug, 2017 1 commit
  5. 28 Jul, 2017 1 commit
  6. 25 Jul, 2017 1 commit
  7. 07 Jul, 2017 1 commit
  8. 28 Jun, 2017 1 commit
  9. 16 Jun, 2017 1 commit
  10. 05 Jun, 2017 1 commit
  11. 11 May, 2017 1 commit
  12. 04 May, 2017 1 commit
  13. 03 May, 2017 1 commit
    • Generate and handle a gl_repository param to pass around components · c45341c8
      Alejandro Rodríguez authored
      This new param allows us to share project information between components
      that don't share or don't have access to the same filesystem
      mountpoints, for example between Gitaly and Rails or between Rails and
      Gitlab-Shell hooks. The previous parameters are still supported, but if
      found, gl_repository is prefered. The old parameters should be deprecated
      once all components support the new format.
  14. 14 Apr, 2017 2 commits
  15. 10 Apr, 2017 1 commit
  16. 31 Mar, 2017 1 commit
  17. 20 Mar, 2017 1 commit
    • Remove legacy Runners support in /api/v4/jobs/request · e79ab111
      Tomasz Maczukin authored
      In Runner v1.3.0 we've started to send User-Agent header with Runner's
      version data. Since GitLab v8.12.0 we've started to use this header to check
      if used Runner's version supports 204 status code instead of 404 as a
      response when there is no jobs to execute by a Runner.
      
      In APIv4 (introduced in GitLab 9.0.0) will require Runner v9.0.0. And
      writing more accurately: GitLab Runner v9.0.0 will require GitLab at
      least 9.0.0. Because of such breaking change we are able to switch
      entirely to 204 response code and there is no need to do check of
      User-Agent.
      
      This commit removes useless code and complexity.
  18. 03 Mar, 2017 1 commit
  19. 02 Mar, 2017 6 commits
  20. 16 Feb, 2017 4 commits
  21. 03 Feb, 2017 1 commit
  22. 16 Dec, 2016 1 commit
    • Accept environment variables from the `pre-receive` script. · f82d549d
      Timothy Andrew authored
      1. Starting version 2.11, git changed the way the pre-receive flow works.
      
        - Previously, the new potential objects would be added to the main repo. If the
          pre-receive passes, the new objects stay in the repo but are linked up. If
          the pre-receive fails, the new objects stay orphaned in the repo, and are
          cleaned up during the next `git gc`.
      
        - In 2.11, the new potential objects are added to a temporary "alternate object
          directory", that git creates for this purpose. If the pre-receive passes, the
          objects from the alternate object directory are migrated to the main repo. If
          the pre-receive fails the alternate object directory is simply deleted.
      
      2. In our workflow, the pre-recieve script (in `gitlab-shell) calls the
         `/allowed` endpoint, which calls out directly to git to perform
         various checks. These direct calls to git do _not_ have the necessary
         environment variables set which allow access to the "alternate object
         directory" (explained above). Therefore these calls to git are not able to
         access any of the new potential objects to be added during this push.
      
      3. We fix this by accepting the relevant environment variables
         (GIT_ALTERNATE_OBJECT_DIRECTORIES, GIT_OBJECT_DIRECTORY) on the
         `/allowed` endpoint, and then include these environment variables while
         calling out to git.
      
      4. This commit includes (whitelisted) these environment variables while making
         the "force push" check. A `Gitlab::Git::RevList` module is extracted to
         prevent `ForcePush` from being littered with these checks.
  23. 15 Dec, 2016 1 commit
  24. 07 Dec, 2016 1 commit
  25. 24 Nov, 2016 1 commit
  26. 16 Nov, 2016 1 commit
    • Fix POST /internal/allowed to cope with gitlab-shell v4.0.0 project paths · 1c994dbc
      Nick Thomas authored
      gitlab-shell v3.6.6 would give project paths like so:
      
      * namespace/project
      
      gitlab-shell v4.0.0 can give project paths like so:
      
      * /namespace1/namespace2/project
      * /namespace/project
      * /path/to/repository/storage/namespace1/namespace2/project
      * /path/to/repository/storage/namespace/project
  27. 10 Aug, 2016 1 commit
  28. 28 Apr, 2016 2 commits