summaryrefslogtreecommitdiff
path: root/lib
Commit message (Collapse)AuthorAgeFilesLines
...
* | Fix bug when changes to post-receive worker was not dumped properlyv2.0.1Dmitriy Zaporozhets2014-09-251-1/+1
| | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | Add '.old' when renaming existing hooks directoryJacob Vosmaer2014-09-161-1/+1
| |
* | Symlink the whole hooks directoryJacob Vosmaer2014-09-161-4/+6
| |
* | Git remote remove only available in git > 1.7.12Dmitriy Zaporozhets2014-09-121-1/+1
| | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | Make sure user got redis defaults if not setDmitriy Zaporozhets2014-09-121-0/+2
| | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | support using custom redis database, fixes #173Tao2014-09-131-3/+4
| |
* | Merge pull request #91 from raphendyr/patch-1Dmitriy Zaporozhets2014-09-111-2/+6
|\ \ | | | | | | Replace build in home folder with environment
| * | Replace build in home folder with environmentJaakko Kantojärvi2013-09-131-2/+6
| | | | | | | | | | | | | | | You can't ever assume that user's home is /home/$USERNAME or /home/git Preferable is to assume that user running gitlab-shell has repositories in his home (get from the environment).
* | | Merge pull request #175 from yglukhov/security-issueDmitriy Zaporozhets2014-09-111-2/+20
|\ \ \ | | | | | | | | Security issue: imported URLs are stored along with password.
| * | | Security issue: imported URLs are stored along with password.uran2014-08-281-2/+20
| | | |
* | | | Merge pull request #141 from attiks/support-redis-passwordDmitriy Zaporozhets2014-09-111-1/+5
|\ \ \ \ | | | | | | | | | | added support for redis password
| * | | | added support for redis passwordPeter2014-03-211-1/+5
| | | | |
* | | | | GitLab /api/allowed endpoint requires POST requestDmitriy Zaporozhets2014-09-032-5/+27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit made changes to GitLab shell to work with huge pushed (ex. 1k branhes) using POST request to API Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | | | Update GitlabNet to match new logicDmitriy Zaporozhets2014-09-011-8/+4
| | | | | | | | | | | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | | | Remove update hook logicDmitriy Zaporozhets2014-09-011-58/+0
| | | | | | | | | | | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | | | GitlabAccess and GitlabPostReceive classes addedDmitriy Zaporozhets2014-09-013-3/+70
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Gitlab Access handles security check. GitlabPostReceive creates a sidekiq job Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | | | Use a different style of one-line classesJacob Vosmaer2014-08-271-1/+1
| | | | |
* | | | | Handle invalid number of argumentsJacob Vosmaer2014-08-271-3/+8
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When a remote user with a valid SSH key runs something like 'ssh git@gitlab.example.com foobar', gitlab-shell would raise an exception in the GitlabShell#escape_path method. With this change, we catch an invalid number of arguments as soon as possible and exit.
* | | | | use abort isntead of raise when checking pathJob van der Voort2014-08-271-1/+1
| |/ / / |/| | |
* | | | Fix invalid repo_name/repo_path parsing by GitlabUpdateDmitriy Zaporozhets2014-08-132-12/+21
| | | | | | | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | | Adding support+tests for annotated tags.Sean Edge2014-07-091-1/+6
| | | |
* | | | Merge pull request #155 from ssandler/masterDmitriy Zaporozhets2014-07-041-1/+1
|\ \ \ \ | | | | | | | | | | GitlabUpdate: use stripped path for repo_name
| * | | | GitlabUpdate: use stripped path for repo_nameScott Sandler2014-06-161-1/+1
| | | | |
* | | | | Improve coverage.Gabor Nagy2014-06-231-16/+19
|/ / / /
* | | | Expliclity require 'timeout' from the stdlibJacob Vosmaer2014-06-101-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | This avoids getting the following error on some platforms: NameError: uninitialized constant GitlabKeys::Timeout
* | | | Use authorized_keys lock when add new key to fileDmitriy Zaporozhets2014-05-311-3/+5
| | | | | | | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | | Put authorized_keys.lock in the .ssh directoryJacob Vosmaer2014-05-301-1/+1
| | | |
* | | | Use lock file when add or remove keys from authorized_keys fileDmitriy Zaporozhets2014-04-181-14/+34
| | | | | | | | | | | | | | | | | | | | | | | | This prevents concurrent modification of authorized_keys file Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | | Merge pull request #145 from lsjostro/fix_envJacob Vosmaer2014-04-111-1/+1
|\ \ \ \ | | | | | | | | | | Preserve LD_LIBRARY_PATH for Kernel::exec
| * | | | set LD_LIBRARY_PATH for Kernel::execLars Sjöström2014-03-261-1/+1
| |/ / /
* | | | Fix fatal: bad object 0000 when do new branch pushDmitriy Zaporozhets2014-04-031-2/+6
| | | | | | | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | | Make force push detection actually workDmitriy Zaporozhets2014-04-032-2/+3
| | | | | | | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | | first setup to protect protected branched to force updatesSteven Thonus2014-03-252-2/+7
|/ / / | | | | | | | | | rebased for new code
* | | Pass tag name to update hook tooDmitriy Zaporozhets2014-03-201-6/+6
| | | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | Fix testsDmitriy Zaporozhets2014-03-191-2/+3
| | | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | Send api.allowed? request for both http and ssh pushDmitriy Zaporozhets2014-03-192-21/+22
| | | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | Add gitlab-keys batch-add-keysJacob Vosmaer2014-03-141-0/+18
| | | | | | | | | | | | | | | This command is intended to be called by the GitLab Rails code when restoring an application backup.
* | | Generate key_line in separate methodJacob Vosmaer2014-03-141-1/+5
| | |
* | | Add process wait for importDmitriy Zaporozhets2014-03-131-1/+3
| | | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | Dont import repo if existsDmitriy Zaporozhets2014-03-131-0/+3
| | | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | Merge branch 'import-timeout' into 'master'v1.8.3Dmitriy Zaporozhets2014-03-121-1/+19
|\ \ \ | | | | | | | | | | | | Import Timeout
| * | | Use KILL instead of TERMDmitriy Zaporozhets2014-03-121-1/+1
| | | | | | | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
| * | | Use Process spawnDmitriy Zaporozhets2014-03-121-2/+5
| | | | | | | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
| * | | Add support for import repo timeoutDmitriy Zaporozhets2014-03-121-1/+16
| | | | | | | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* | | | Explain why GitlabShell#exec_cmd has no testsJacob Vosmaer2014-03-121-0/+1
|/ / /
* | | Fix typo in Kernel::exec optionsJacob Vosmaer2014-03-121-1/+1
| | |
* | | Restrict env variables passed to git-xxx-packJacob Vosmaer2014-03-071-2/+2
| | |
* | | Make GitlabProjects#create_hooks a class methodJacob Vosmaer2014-02-261-9/+9
| | |
* | | Merge branch 'gitlab_keys_return_values' of ↵Dmitriy Zaporozhets2013-11-251-0/+3
|\ \ \ | | | | | | | | | | | | /home/git/repositories/gitlab/gitlab-shell
| * | | Fix return values in GitlabKeysJacob Vosmaer2013-11-201-0/+3
| | | |