Skip to content
Snippets Groups Projects
  1. Oct 02, 2019
  2. Oct 01, 2019
  3. Sep 25, 2019
  4. Sep 17, 2019
  5. Sep 11, 2019
  6. Sep 05, 2019
    • Fabio Pitino's avatar
      CE port for pipelines for external pull requests · ca6a1f33
      Fabio Pitino authored
      Detect if pipeline runs for a GitHub pull request
      
      When using a mirror for CI/CD only we register a pull_request
      webhook. When a pull_request webhook is received, if the
      source branch SHA matches the actual head of the branch in the
      repository we create immediately a new pipeline for the
      external pull request. Otherwise we store the
      pull request info for when the push webhook is received.
      
      When using "only/except: external_pull_requests" we can detect
      if the pipeline has a open pull request on GitHub and create or
      not the job based on that.
      ca6a1f33
  7. Aug 30, 2019
  8. Aug 26, 2019
  9. Aug 15, 2019
  10. Aug 13, 2019
    • Bob Van Landuyt :neckbeard:'s avatar
      Rework retry strategy for remote mirrors · 452bc36d
      Bob Van Landuyt :neckbeard: authored and Douwe Maan's avatar Douwe Maan committed
      **Prevention of running 2 simultaneous updates**
      
      Instead of using `RemoteMirror#update_status` and raise an error if
      it's already running to prevent the same mirror being updated at the
      same time we now use `Gitlab::ExclusiveLease` for that.
      
      When we fail to obtain a lease in 3 tries, 30 seconds apart, we bail
      and reschedule. We'll reschedule faster for the protected branches.
      
      If the mirror already ran since it was scheduled, the job will be
      skipped.
      
      **Error handling: Remote side**
      
      When an update fails because of a `Gitlab::Git::CommandError`, we
      won't track this error in sentry, this could be on the remote side:
      for example when branches have diverged.
      
      In this case, we'll try 3 times scheduled 1 or 5 minutes apart.
      
      In between, the mirror is marked as "to_retry", the error would be
      visible to the user when they visit the settings page.
      
      After 3 tries we'll mark the mirror as failed and notify the user.
      
      We won't track this error in sentry, as it's not likely we can help
      it.
      
      The next event that would trigger a new refresh.
      
      **Error handling: our side**
      
      If an unexpected error occurs, we mark the mirror as failed, but we'd
      still retry the job based on the regular sidekiq retries with
      backoff. Same as we used to
      
      The error would be reported in sentry, since its likely we need to do
      something about it.
      452bc36d
    • Stan Hu's avatar
      Reduce Gitaly calls in PostReceive · 4e2bb4e5
      Stan Hu authored
      This commit reduces I/O load and memory utilization during PostReceive
      for the common case when no project hooks or services are set up.
      
      We saw a Gitaly N+1 issue in `CommitDelta` when many tags or branches
      are pushed. We can reduce this overhead in the common case because we
      observe that most new projects do not have any Web hooks or services,
      especially when they are first created. Previously, `BaseHooksService`
      unconditionally iterated through the last 20 commits of each ref to
      build the `push_data` structure. The `push_data` structured was used in
      numerous places:
      
      1. Building the push payload in `EventCreateService`
      2. Creating a CI pipeline
      3. Executing project Web or system hooks
      4. Executing project services
      5. As the return value of `BaseHooksService#execute`
      6. `BranchHooksService#invalidated_file_types`
      
      We only need to generate the full `push_data` for items 3, 4, and 6.
      
      Item 1: `EventCreateService` only needs the last commit and doesn't
      actually need the commit deltas.
      
      Item 2: In addition, `Ci::CreatePipelineService` only needed a subset of
      the parameters.
      
      Item 5: The return value of `BaseHooksService#execute` also wasn't being
      used anywhere.
      
      Item 6: This is only used when pushing to the default branch, so if
      many tags are pushed we can save significant I/O here.
      
      Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/65878
      
      Fic
      4e2bb4e5
  11. Aug 08, 2019
  12. Aug 07, 2019
    • Tiger Watson's avatar
      Use separate Kubernetes namespaces per environment · 36a01a88
      Tiger Watson authored and Thong Kuah's avatar Thong Kuah committed
      Kubernetes deployments on new clusters will now have
      a separate namespace per project environment, instead
      of sharing a single namespace for the project.
      
      Behaviour of existing clusters is unchanged.
      
      All new functionality is controlled by the
      :kubernetes_namespace_per_environment feature flag,
      which is safe to enable/disable at any time.
      36a01a88
  13. Aug 06, 2019
  14. Aug 01, 2019
  15. Jul 31, 2019
  16. Jul 25, 2019
  17. Jul 24, 2019
    • Kamil Trzcińśki's avatar
      Optimise import performance · 8d1e97fc
      Kamil Trzcińśki authored
      - Fix `O(n)` complexity of `append_or_update_attribute`,
        we append objects to an array and re-save project
      - Remove the usage of `keys.include?` as it performs `O(n)`
        search, instead use `.has_key?`
      - Remove the usage of `.keys.first` as it performs a copy
        of all keys, instead use `.first.first`
      8d1e97fc
  18. Jul 23, 2019
  19. Jul 22, 2019
  20. Jul 13, 2019
  21. Jun 27, 2019
    • Thong Kuah's avatar
      Remove group_clusters feature flag · 3f759e16
      Thong Kuah authored
      Now we have terminals for instance and group clusters we can remove the
      FF now. Deploying to group clusters has been working without complaints
      too.
      3f759e16
  22. Jun 21, 2019
  23. Jun 18, 2019
    • James Fargher's avatar
      Make KubernetesService readonly · 6b9157d5
      James Fargher authored and Thong Kuah's avatar Thong Kuah committed
      We are deprecating this service in favor of instance wide clusters.
      Therefore we removed some code that is not anymore needed for a
      readonly cluster and also we added some flags to allow for this
      deprecation. These flags are to be removed in the next release when
      we finally completelly remove KubernetesService.
      6b9157d5
  24. Jun 17, 2019
  25. Jun 16, 2019
  26. Jun 14, 2019
    • Stan Hu's avatar
      Fix inability to set visibility_level on project via API · dcba5279
      Stan Hu authored
      Consider the scenario:
      
      1. The default visibility level is set to internal
      2. A user attempts to create a private project within a private group
      
      Previously this would always fail because default_value_for would
      overwrite the private visibility setting, no matter what
      visibility_level were specified. This was happening because
      default_value_for was confused by the default value of 0 specified by
      the database schema.
      
      default_value_for attempts to assign the default value in the block by
      checking whether the attribute has changed. The problem is that since
      the default value by the database was 0, and the user requested 0, this
      appeared as though no changes were made. As a result, default_value_for
      would always overwrite the user's preference.
      
      To fix this, we remove the use of default_value_for and only set the
      visibility level to the default application setting when no preference
      has been given at creation time.
      
      Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/63158
      dcba5279
  27. May 29, 2019
  28. May 24, 2019
  29. May 20, 2019
  30. May 14, 2019
  31. May 07, 2019
  32. Apr 20, 2019
  33. Apr 10, 2019
  34. Apr 09, 2019
Loading