Skip to content
Snippets Groups Projects
  1. Jan 23, 2018
    • Jan Provaznik's avatar
      Use limit for search count queries · 090ca9c3
      Jan Provaznik authored
      Search query is especially slow if a user searches a generic string
      which matches many records, in such case search can take tens of
      seconds or time out. To speed up the search query, we search only for
      first 1000 records, if there is >1000 matching records we just display
      "1000+" instead of precise total count supposing that with such amount
      the exact count is not so important for the user.
      
      Because for issues even limited search was not fast enough, 2-phase
      approach is used for issues: first we use simpler/faster query to get
      all public issues, if this exceeds the limit, we just return the limit.
      If the amount of matching results is lower than limit, we re-run more
      complex search query (which includes also confidential issues).
      Re-running the complex query should be fast enough in such case because the
      amount of matching issues is lower than limit.
      
      Because exact total_count is now limited, this patch also switches to
      to "prev/next" pagination.
      
      Related #40540
      090ca9c3
  2. Jan 22, 2018
  3. Jan 19, 2018
  4. Jan 18, 2018
    • Felipe Artur's avatar
      a956fac2
    • Jan Provaznik's avatar
      Return last edited time instead of update time · 4b6b8ecc
      Jan Provaznik authored
      For issuable models we keep two timestamps:
      updated_at which is updated whenever any model attribute is changed,
      last_edited_at which is changed when only title or description is
      changed.
      
      In UI bellow description we display who and when updated the item. But
      last_edited_by (used for 'who') is mistakenly combined with updated_at
      (when), last_edited_at should be used instead.
      
      Closes #41247
      4b6b8ecc
  5. Jan 17, 2018
  6. Jan 16, 2018
  7. Jan 11, 2018
  8. Jan 09, 2018
  9. Jan 08, 2018
    • Michael Kozono's avatar
      Backport option to disable writing to `authorized_keys` file · 255a0f85
      Michael Kozono authored
      Originally branch 'mk-toggle-writing-to-auth-keys-1631'
      
      See merge request !2004
      
      Squashed commits:
      Add authorized_keys_enabled to Application Settings
      Ensure default settings are exposed in UI
      Without this change, `authorized_keys_enabled` is unchecked when it is nil, even if it should be checked by default.
      Add “Speed up SSH operations” documentation
      Clarify the reasons for disabling writes
      Add "How to go back" section
      Tweak copy
      Update Application Setting screenshot
      255a0f85
  10. Jan 05, 2018
  11. Jan 04, 2018
  12. Jan 03, 2018
  13. Dec 21, 2017
  14. Dec 20, 2017
  15. Dec 19, 2017
  16. Dec 18, 2017
  17. Dec 15, 2017
  18. Dec 13, 2017
  19. Dec 12, 2017
  20. Dec 11, 2017
  21. Dec 08, 2017
    • Douwe Maan's avatar
      Merge branch '36679-non-authorized-user-may-see-wikis-or-pipeline-page' into 'security-10-2' · d332c8c7
      Douwe Maan authored
      Fixes project visibility guidelines
      
      See merge request gitlab/gitlabhq!2226
      
      (cherry picked from commit 877c42c0aaf3298d6001614c9706bc366ae4014c)
      
      e4fd1c26 Ensure project wiki visibility guidelines are met
      d332c8c7
    • Bob Van Landuyt's avatar
      Move the circuitbreaker check out in a separate process · f1ae1e39
      Bob Van Landuyt authored
      Moving the check out of the general requests, makes sure we don't have
      any slowdown in the regular requests.
      
      To keep the process performing this checks small, the check is still
      performed inside a unicorn. But that is called from a process running
      on the same server.
      
      Because the checks are now done outside normal request, we can have a
      simpler failure strategy:
      
      The check is now performed in the background every
      `circuitbreaker_check_interval`. Failures are logged in redis. The
      failures are reset when the check succeeds. Per check we will try
      `circuitbreaker_access_retries` times within
      `circuitbreaker_storage_timeout` seconds.
      
      When the number of failures exceeds
      `circuitbreaker_failure_count_threshold`, we will block access to the
      storage.
      
      After `failure_reset_time` of no checks, we will clear the stored
      failures. This could happen when the process that performs the checks
      is not running.
      f1ae1e39
  22. Dec 07, 2017
Loading