- Mar 18, 2020
-
-
GitLab Bot authored
-
- Feb 13, 2020
-
-
GitLab Bot authored
-
- Feb 11, 2020
-
-
GitLab Bot authored
-
- Feb 04, 2020
-
-
GitLab Bot authored
-
- Jan 30, 2020
-
-
GitLab Bot authored
-
- Jan 23, 2020
-
-
GitLab Bot authored
-
- Jan 08, 2020
-
-
GitLab Bot authored
-
- Dec 24, 2019
-
-
GitLab Bot authored
-
- Dec 23, 2019
-
-
GitLab Bot authored
-
- Dec 17, 2019
-
-
GitLab Bot authored
-
GitLab Bot authored
-
- Dec 03, 2019
-
-
GitLab Bot authored
-
- Nov 14, 2019
-
-
GitLab Bot authored
-
- Nov 04, 2019
-
-
GitLab Bot authored
-
- Oct 18, 2019
-
-
GitLab Bot authored
-
- Oct 10, 2019
-
-
GitLab Bot authored
-
- Sep 30, 2019
-
-
GitLab Bot authored
-
- Jul 25, 2019
-
-
Thong Kuah authored
Using the sed script from https://gitlab.com/gitlab-org/gitlab-ce/issues/59758
-
- Jul 11, 2019
-
-
GitLab uses a kubernetes service account to perform deployments. For serverless deployments to work as expected with externally created clusters with their own knative installations (e.g. via Cloud Run), this account requires additional permissions in the serving.knative.dev API group.
-
- Jun 21, 2019
-
-
Dylan Griffith authored
Since Kubernetes is creating the Secret and token asynchronously it is necessary that we implement some delay or retrying logic to avoid a race condition where we fetch a Secret before the token is even set. There does not appear to be any way for us to force it to be set with any synchronous API call so retrying seems to be the only option.
-
- May 29, 2019
-
-
João Cunha authored
Remove Kn services cache from Clusters::Application::Knative Knative function can exist even if user did not installed Knative via GitLab managed apps. -> Move responsibility of finding services into the Cluster -> Responsability is inside Clusters::Cluster::KnativeServiceFinder -> Projects::Serverless::FunctionsFinder now calls depends solely on a cluster to find the Kn services. -> Detect Knative by resource presence instead of service presence -> Mock knative_installed response temporarily for frontend to develop Display loader while `installed === 'checking'` Added frontend work to determine if Knative is installed Memoize with_reactive_cache(*args, &block) to avoid race conditions When calling with_reactive_cache more than once, it's possible that the second call will already have the value populated. Therefore, in cases where we need the sequential calls to have consistent results, we'd fall under a race condition. Check knative installation via Knative resource presence Only load pods if Knative is discovered Always return a response in FunctionsController#index - Always indicate if Knative is installed, not installed or checking - Always indicate the partial response for functions. Final response is guaranteed when knative_installed is either true | false. Adds specs for Clusters::Cluster#knative_services_finder Fix method name when calling on specs Add an explicit check for functions Added an explicit check to see if there are any functions available Fix Serverless feature spec - we don't find knative installation via database anymore, rather via Knative resource Display error message for request timeouts Display an error message if the request times out Adds feature specs for when functions exist Remove a test purposed hardcoded flag Add ability to partially load functions Added the ability to partially load functions on the frontend Add frontend unit tests Added tests for the new frontend additions Generate new translations Generated new frontend translations Address review comments Cleaned up the frontend unit test. Added computed prop for `isInstalled`. Move string to constant Simplify nil to array conversion Put knative_installed states in a frozen hash for better read Pluralize list of Knative states Quey services and pods filtering name This way we don't need to filter the namespace in memory. Also, the data we get from the network is much smaller. Simplify cache_key and fix bug - Simplifies the cache_key by removing namespace duplicate - Fixes a bug with reactive_cache memoization
-
- May 21, 2019
-
-
Tiger Watson authored
When Kubernetes clusters were originally built they could only exist at the project level, and so there was logic included that assumed there would only ever be a single Kubernetes namespace per cluster. We now support clusters at the group and instance level, which allows multiple namespaces. This change consolidates various project-specific fallbacks to generate namespaces, and hands all responsibility to the Clusters::KubernetesNamespace model. There is now no concept of a single namespace for a Clusters::Platforms::Kubernetes; to retrieve a namespace a project must now be supplied in all cases. This simplifies upcoming work to use a separate Kubernetes namespace per project environment (instead of a namespace per project).
-
- Mar 21, 2019
-
-
James Fargher authored
Deploy boards now will check for app.gitlab.com/env and app.gitlab.com/app
-
- Mar 07, 2019
-
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- Jan 29, 2019
-
-
Andrew Newdigate authored
Re-enables and autocorrects all instances of the Style/MethodCallWithoutArgsParentheses rule
-
- Jan 10, 2019
-
-
Chris Baumbauer authored
-
- Dec 27, 2018
-
-
Mayra Cabrera authored
Stub methods were added for: - GET service account - PUT service account - GET role binding - PUT role binding
-
- Dec 06, 2018
-
-
Dylan Griffith authored
-
- Dec 04, 2018
-
-
Thong Kuah authored
If the service fails mid-point, then we should be able to re-run this service. So, detect presence of any previously created Kubernetes resource and update or create accordingly. Fix specs accordingly. In the case of finalize_creation_service_spec.rb, I decided to stub out the async worker rather than maintaining individual stubs for various kubeclient calls for that worker.
-
Thong Kuah authored
If the service fails mid-point, then we should be able to re-run this service. So, detect presence of any previously created Kubernetes resource and update or create accordingly. Fix specs accordingly. In the case of finalize_creation_service_spec.rb, I decided to stub out the async worker rather than maintaining individual stubs for various kubeclient calls for that worker. Also add test cases for group clusters
-
- Nov 15, 2018
-
-
Chris Baumbauer authored
-
- Nov 13, 2018
-
-
Thong Kuah authored
-
- Oct 22, 2018
-
-
Mayra Cabrera authored
Add create_role_binding, create_namespace and get_namespace kubernetes spec helpers. This new helpers are going to be used on https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/22011
-
- Sep 14, 2018
-
-
Thong Kuah authored
In our case it's 'default'.
-
Thong Kuah authored
This also solves the async nature of the automatic creation of default service tokens for service accounts. It also makes explicit which service account token we always use. create cluster role binding only if the provider has legacy_abac disabled.
-
Thong Kuah authored
When provisioning a new cluster, create gitlab service account so that GitLab can perform operations in a RBAC-enabled cluster. Correspondingly, use the token of the gitlab service account, vs the default service account token which will have no privs.
-
- Sep 06, 2018
-
-
Thong Kuah authored
-
- May 10, 2018
-
-
Matija Čupić authored
-
- Apr 23, 2018
-
-
Rémy Coutable authored
Signed-off-by:
Rémy Coutable <remy@rymai.me>
-
- Nov 02, 2017
-
-
Shinya Maeda authored
-