This project is mirrored from https://:*****@gitlab.com/gitlab-org/omnibus-gitlab.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
- Oct 15, 2020
-
-
Robert Marshall authored
- Had removed sockets_directory method from most places, but needed to remove it from the helper and that exposed it being used in one other location Signed-off-by:
Robert Marshall <rmarshall@gitlab.com>
-
Robert Marshall authored
- Restart workhorse if the socket directory changes. In its own commit so it can be reverted by the maintainer if not approved Signed-off-by:
Robert Marshall <rmarshall@gitlab.com>
-
Balasankar "Balu" C authored
Signed-off-by:
Balasankar "Balu" C <balasankarc@autistici.org>
-
Robert Marshall authored
- Remove the workhorse helper methods that are refactored out - Fix workhorse helper tests Signed-off-by:
Robert Marshall <rmarshall@gitlab.com>
-
- Oct 13, 2020
-
-
Robert Marshall authored
- Do not automatically use sockets directory, allow a user to set the directory Signed-off-by:
Robert Marshall <rmarshall@gitlab.com>
-
- Oct 12, 2020
-
-
Robert Marshall authored
- Adds a suite of rspec tests for the gitlab workhorse helper - Checks for and removes orphan workhorse socket files if present Signed-off-by:
Robert Marshall <rmarshall@gitlab.com>
-
- Oct 05, 2020
-
-
Robert Marshall authored
- Run the SELinux helper after GitLab Workhorse and other files are created ensuring their file contexts are restored - Place GitLab Workhorse socket files into a sockets directory allowing the SELinux file context to be inherited on service restarts - Add a GitLab Workhorse helper to ensure that new UNIX sockets for Workhorse always inherit the proper SELinux file context Signed-off-by:
Robert Marshall <rmarshall@gitlab.com>
-
- Aug 21, 2020
-
-
Stan Hu authored
Unlike AWS and Google, Azure needs to use an Azure client inside Workhorse to support direct uploads. Using standard HTTP transfers with pre-signed URLs with the Azure Put Blob API (https://docs.microsoft.com/en-us/rest/api/storageservices/put-blob) doesn't work because Azure doesn't support chunked transfer encoding. However, Azure does support uploading files in segments via the Put Block and Put Block List API (https://docs.microsoft.com/en-us/rest/api/storageservices/put-block), but this requires an Azure client. To support this, this commit extracts the Azure Fog credentials from the Rails connection information and adds them to the Workhorse configuration. This changes requires two merge requests to work: 1. https://gitlab.com/gitlab-org/gitlab-workhorse/-/merge_requests/555 2. https://gitlab.com/gitlab-org/gitlab/-/merge_requests/38882 Part of https://gitlab.com/gitlab-org/gitlab/-/issues/25877
-
- Jul 03, 2020
-
-
Stan Hu authored
This adds support for the gitlab.yml changes in https://gitlab.com/gitlab-org/gitlab/-/merge_requests/34460. This allows GitLab to use the Workhorse S3 client with a single credential, enabling proper MD5 checksums and multipart uploads, and paves the way for user-specified keys for encrypted buckets. These changes require https://gitlab.com/gitlab-org/gitlab/-/merge_requests/35480 to work.
-
- Jun 01, 2020
-
-
* Incoroporates our changes to the coobkook so we get our desired behavior * Use start_down instead of down * Stop checking for permissions on log directories. The runit cookbook does not explicitly create this. * Rename runit control templates. Don't use -control in the name anymore, upstream has removed that * In the v5 version of the runit cookbook, they are colliding with the chef service properties
-
- May 07, 2020
-
-
- Mar 12, 2020
-
-
Balasankar "Balu" C authored
Signed-off-by:
Balasankar "Balu" C <balasankarc@autistici.org>
-
- Aug 20, 2019
-
-
Aric Buerer authored
-
- Aug 14, 2019
-
-
Aric Buerer authored
When the Consul service is disabled, Omnibus will delete the Consul service so Prometheus will no long try to discover it and collect metrics.
-
- Jun 13, 2019
-
-
Drew Blessing authored
When Consul is enabled on a given node, Omnibus will register each enabled exporter as a service in Consul. Then, when Consul is enabled on the Prometheus server, Prometheus will be configured to pull job configuration from Consul.
-
- Dec 04, 2018
-
-
Balasankar C authored
Earlier, we replaced gitlab['redis_*'] settings with redis['master_*'] values in sentinel mode. However, this worked only for gitlab-rails and not for several other services like gitlab-monitor. This commit changes that and get gitlab-rails the necessary details based on the knowledge whether sentinels are present or not.
-
- Nov 19, 2018
-
-
rediss://Stan Hu authored
This merge request brings redis[s]:// support to Workhorse and Rails. This makes it possible for users to set up stunnel to provide encryption via https://redislabs.com/blog/stunnel-secure-redis-ssl/ or use AWS ElasticCache. This also deprecates the tcp:// scheme since it is no longer needed by Workhorse. Trusted Redis SSL certificates should be managed by the standard Omnibus procedure: https://docs.gitlab.com/omnibus/settings/ssl.html#install-custom-public-certificates Note that Redis Sentinel does not yet support SSL. https://github.com/antirez/redis/pull/4855 may bring native support to Redis 6.0, but time will tell. Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/47702
-
- Nov 15, 2018
-
-
Balasankar C authored
Move env directory of all services to /opt/gitlab/etc/<service>/env
-
- Oct 24, 2018
-
-
- Jun 27, 2018
-
-
- Apr 03, 2018
-
-
DJ Mountney authored
-
- Jan 29, 2018
-
-
Balasankar C authored
-
- Sep 26, 2017
-
-
Balasankar C authored
This reverts commit eb78019b2ec79babb24160fc379221fba33e5cf4.
-
Balasankar C authored
-
- Mar 08, 2017
-
-
- Mar 08, 2016
-
-
Marin Jankovski authored
-
- Feb 18, 2016
-
-
Jeroen Nijhof authored
-
- Jan 21, 2016
-
-
Marin Jankovski authored
-
- Oct 30, 2015
-
-
Jacob Vosmaer authored
-
- Sep 24, 2015
-
-
Jacob Vosmaer authored
-
- Sep 23, 2015
-
-
Marin Jankovski authored
-
- Sep 15, 2015
-
-
Marin Jankovski authored
-
- Jul 31, 2015
-
-
Jacob Vosmaer authored
-
Jacob Vosmaer authored
-