Skip to content
Snippets Groups Projects
  1. Mar 27, 2018
  2. Mar 26, 2018
  3. Mar 06, 2018
  4. Mar 05, 2018
  5. Feb 28, 2018
  6. Feb 26, 2018
  7. Feb 23, 2018
  8. Feb 08, 2018
  9. Feb 03, 2018
  10. Feb 02, 2018
  11. Jan 22, 2018
  12. Jan 18, 2018
  13. Jan 17, 2018
  14. Jan 04, 2018
  15. Dec 22, 2017
  16. Dec 15, 2017
  17. Dec 14, 2017
  18. Dec 08, 2017
    • Bob Van Landuyt's avatar
      Move the circuitbreaker check out in a separate process · f1ae1e39
      Bob Van Landuyt authored
      Moving the check out of the general requests, makes sure we don't have
      any slowdown in the regular requests.
      
      To keep the process performing this checks small, the check is still
      performed inside a unicorn. But that is called from a process running
      on the same server.
      
      Because the checks are now done outside normal request, we can have a
      simpler failure strategy:
      
      The check is now performed in the background every
      `circuitbreaker_check_interval`. Failures are logged in redis. The
      failures are reset when the check succeeds. Per check we will try
      `circuitbreaker_access_retries` times within
      `circuitbreaker_storage_timeout` seconds.
      
      When the number of failures exceeds
      `circuitbreaker_failure_count_threshold`, we will block access to the
      storage.
      
      After `failure_reset_time` of no checks, we will clear the stored
      failures. This could happen when the process that performs the checks
      is not running.
      f1ae1e39
  19. Dec 04, 2017
  20. Nov 20, 2017
  21. Oct 30, 2017
  22. Oct 26, 2017
  23. Oct 17, 2017
  24. Oct 14, 2017
  25. Oct 13, 2017
  26. Oct 07, 2017
    • Jacopo's avatar
      Replaces `tag: true` into `:tag` in the specs · 0ce67858
      Jacopo authored
      Replaces all the explicit include metadata syntax in the specs (tag:
      true) into the implicit one (:tag).
      Added a cop to prevent future errors and handle autocorrection.
      0ce67858
  27. Oct 04, 2017
  28. Oct 03, 2017
  29. Sep 27, 2017
  30. Sep 06, 2017
  31. Aug 30, 2017
    • Nick Thomas's avatar
      Rework the permissions model for SSH key restrictions · 68470602
      Nick Thomas authored
      `allowed_key_types` is removed and the `minimum_<type>_bits` fields are
      renamed to `<tech>_key_restriction`. A special sentinel value (`-1`) signifies
      that the key type is disabled.
      
      This also feeds through to the UI - checkboxes per key type are out, inline
      selection of "forbidden" and "allowed" (i.e., no restrictions) are in.
      
      As with the previous model, unknown key types are disallowed, even if the
      underlying ssh daemon happens to support them. The defaults have also been
      changed from the lowest known bit size to "no restriction". So if someone
      does happen to have a 768-bit RSA key, it will continue to work on upgrade, at
      least until the administrator restricts them.
      68470602
    • Nick Thomas's avatar
      Add settings for minimum key strength and allowed key type · b0f982fb
      Nick Thomas authored
      This is an amalgamation of:
      
      * Cory Hinshaw: Initial implementation !5552
      * Rémy Coutable: Updates !9350
      * Nick Thomas: Resolve conflicts and add ED25519 support !13712
      b0f982fb
  32. Aug 29, 2017
  33. Aug 24, 2017
Loading