Skip to content
Snippets Groups Projects
  1. Jan 24, 2018
  2. Jan 23, 2018
    • Jan Provaznik's avatar
      Use limit for search count queries · 090ca9c3
      Jan Provaznik authored
      Search query is especially slow if a user searches a generic string
      which matches many records, in such case search can take tens of
      seconds or time out. To speed up the search query, we search only for
      first 1000 records, if there is >1000 matching records we just display
      "1000+" instead of precise total count supposing that with such amount
      the exact count is not so important for the user.
      
      Because for issues even limited search was not fast enough, 2-phase
      approach is used for issues: first we use simpler/faster query to get
      all public issues, if this exceeds the limit, we just return the limit.
      If the amount of matching results is lower than limit, we re-run more
      complex search query (which includes also confidential issues).
      Re-running the complex query should be fast enough in such case because the
      amount of matching issues is lower than limit.
      
      Because exact total_count is now limited, this patch also switches to
      to "prev/next" pagination.
      
      Related #40540
      090ca9c3
    • Rémy Coutable's avatar
  3. Jan 22, 2018
  4. Jan 21, 2018
  5. Jan 19, 2018
  6. Jan 18, 2018
  7. Jan 17, 2018
  8. Jan 16, 2018
  9. Jan 15, 2018
  10. Jan 11, 2018
  11. Jan 10, 2018
  12. Jan 09, 2018
  13. Jan 08, 2018
    • James Edwards-Jones's avatar
      Fix spec in shell_spec.rb · bd9ead68
      James Edwards-Jones authored
      The spec for "#add_key does nothing" would always have passed,
      since the expectation was on both the wrong object and message.
      bd9ead68
    • Valery Sizov's avatar
      d9557e43
    • Michael Kozono's avatar
      Backport authorized_keys_enabled defaults to true' · 797fe0a6
      Michael Kozono authored
      Originally from branch 'fix-authorized-keys-enabled-default-2738' via merge request https://gitlab.com/gitlab-org/gitlab-ee/merge_requests/2240
      
      Removed background migrations which were intended to fix state after using Gitlab
      without a default having been set
      
      Squashed commits:
      Locally, if Spring was not restarted, `current_application_settings` was still cached, which prevented the migration from editing the file. This will also ensure that any app server somehow hitting old cache data will properly default this setting regardless.
      Retroactively fix migration
        This allows us to identify customers who ran the broken migration. Their `authorized_keys_enabled` column does not have a default at this point.
        We will fix the column after we fix the `authorized_keys` file.
      Fix authorized_keys file if needed
      Add default to authorized_keys_enabled setting
        Reminder: The original migration was fixed retroactively a few commits ago, so people who did not ever run GitLab 9.3.0 already have a column that defaults to true and disallows nulls. I have tested on PostgreSQL and MySQL that it is safe to run this migration regardless.
        Affected customers who did run 9.3.0 are the ones who need this migration to fix the authorized_keys_enabled column.
        The reason for the retroactive fix plus this migration is that it allows us to run a migration in between to fix the authorized_keys file only for those who ran 9.3.0.
      Tweaks to address feedback
      Extract work into background migration
      Move batch-add-logic to background migration
        Do the work synchronously to avoid multiple workers attempting to add batches of keys at the same time.
        Also, make the delete portion wait until after adding is done.
      Do read and delete work in background migration
      Fix Rubocop offenses
      Add changelog entry
      Inform the user of actions taken or not taken
      Prevent unnecessary `select`s and `remove_key`s
      Add logs for action taken
      Fix optimization
      Reuse `Gitlab::ShellAdapter`
      Guarantee the earliest key
      Fix migration spec for MySQL
      797fe0a6
    • Michael Kozono's avatar
      Backport option to disable writing to `authorized_keys` file · 255a0f85
      Michael Kozono authored
      Originally branch 'mk-toggle-writing-to-auth-keys-1631'
      
      See merge request !2004
      
      Squashed commits:
      Add authorized_keys_enabled to Application Settings
      Ensure default settings are exposed in UI
      Without this change, `authorized_keys_enabled` is unchecked when it is nil, even if it should be checked by default.
      Add “Speed up SSH operations” documentation
      Clarify the reasons for disabling writes
      Add "How to go back" section
      Tweak copy
      Update Application Setting screenshot
      255a0f85
    • Pablo Carranza's avatar
      Backport authorized_keys branch 'find-key-by-fingerprint' · ac86b204
      Pablo Carranza authored
      Add find key by base64 key or fingerprint to the internal API
      
      See merge request !250
      
      Squashed changes:
      Add unique index to fingerprint
      Add new index to schema
      Add internal api to get ssh key by fingerprint
      Change API endpoint to authorized_keys
      Add InsecureKeyFingerprint that calculates the fingerprint without shelling out
      Add require for gitlab key fingerprint
      Remove uniqueness of fingerprint index
      Remove unique option from migration
      Fix spec style in fingerprint test
      Fix rubocop complain
      Extract insecure key fingerprint to separate file
      Change migration to support building index concurrently
      Remove those hideous tabs
      ac86b204
    • Yorick Peterse's avatar
      Remove soft removals related code · d0b8f536
      Yorick Peterse authored
      This removes all usage of soft removals except for the "pending delete"
      system implemented for projects. This in turn simplifies all the query
      plans of the models that used soft removals. Since we don't really use
      soft removals for anything useful there's no point in keeping it around.
      
      This _does_ mean that hard removals of issues (which only admins can do
      if I'm not mistaken) can influence the "iid" values, but that code is
      broken to begin with. More on this (and how to fix it) can be found in
      https://gitlab.com/gitlab-org/gitlab-ce/issues/31114.
      
      Fixes https://gitlab.com/gitlab-org/gitlab-ce/issues/37447
      Unverified
      d0b8f536
    • Shinya Maeda's avatar
      Add spec · c519e4a7
      Shinya Maeda authored
      c519e4a7
Loading