summaryrefslogtreecommitdiff
path: root/lib/support
Commit message (Collapse)AuthorAgeFilesLines
* Add support for git lfs.lfsMarin Jankovski2015-11-162-2/+16
|
* Fix nginx config to use @gitlab-workhorseKamil Trzcinski2015-11-102-8/+8
|
* Implement Build ArtifactsKamil Trzcinski2015-11-102-0/+32
| | | | | | | - Offloads uploading to GitLab Workhorse - Use /authorize request for fast uploading - Added backup recipes for artifacts - Support download acceleration using X-Sendfile
* Switch to gitlab-workhorseJacob Vosmaer2015-10-294-63/+60
|
* Fix NGINX API download regexJacob Vosmaer2015-10-142-2/+2
| | | | Users are allowed to supply namespace%2Fproject instead of a numeric ID
* Let gitlab-git-http-server handle archive downloadsJacob Vosmaer2015-10-082-2/+38
| | | | This change relies on changes in gitlab_git and gitlab-git-http-server.
* Add missing rake and change nginx config for CI migrationKamil Trzcinski2015-09-221-12/+0
|
* Add missing proxy requests to migration docsfix-nginxKamil Trzcinski2015-09-161-0/+12
|
* Added migration docs and updated installation documentationKamil Trzcinski2015-09-161-0/+29
|
* The good stuff needs NGINX 1.7.11nginx-git-httpJacob Vosmaer2015-09-072-6/+10
|
* Do not let NGINX buffer Git HTTP requestsJacob Vosmaer2015-09-072-0/+14
| | | | | | | | | | | | Before this change NGINX would convert a chunked HTTP POST (e.g. git push) into a HTTP 1.0 single large POST. This creates an unnecessary delay, and it creates unnecessary memory pressure on gitlab-git-http-server. For the response ('proxy_buffering') I am less sure that NGINX 's buffering behavior is harmful, but it still makes more sense to me not to interfere with gitlab-git-http-server (and the Golang net/http server).
* Be more defensive when running 'kill'gitlab-git-http-serverJacob Vosmaer2015-08-311-1/+1
|
* Replace grack with gitlab-git-http-serverJacob Vosmaer2015-08-314-65/+107
|
* Fix init script for Reply by emailDouwe Maan2015-08-251-1/+1
|
* Fix init.d script.Douwe Maan2015-08-191-15/+15
|
* Fix lib/support/init.d/gitlab.Douwe Maan2015-08-191-20/+22
|
* Update init scripts.Douwe Maan2015-08-192-20/+84
|
* Experimental support for gitlab-git-http-serverJacob Vosmaer2015-07-282-0/+50
| | | | | | | | | | | | | https://gitlab.com/gitlab-org/gitlab-git-http-server This change introduces the GITLAB_GRACK_AUTH_ONLY environment variable. When set, Grack requests to GitLab will only respond with the user's GL_ID (if the request is OK) or an error. This allows gitlab-git-http-server to use the main GitLab application as an authentication and authorization backend. If we like how this works we should drop the GITLAB_GRACK_AUTH_ONLY variable at some point in the future.
* Merge pull request #9400 from tuxillo/patch-1Jacob Vosmaer2015-07-201-1/+1
|\ | | | | Use whoami instead of $USER
| * Use whoami instead of $USERAntonio Huete Jimenez2015-06-191-1/+1
| | | | | | - Use whoami instead of relying on the existence of $USER enviroment variable which is not always present
* | Merge branch 'nginx_defaulthost_documentation' into 'master'Dmitriy Zaporozhets2015-06-222-0/+8
|\ \ | |/ |/| | | | | | | | | | | | | | | | | | | | | Close #178 Nginx conf default_host documentation This closes #178 We're just making it clear that some nginx installs such as by default on recent Ubuntu's, the /etc/nginx/sites-enabled/default file will conflict the listen line of the gitlab nginx conf's due to the default_server directive. changed installation.md to identify the issue to a user added notes to both nginx configs for gitlab and gitlab-ssl [ci-skip See merge request !225
| * fixed typoLuke Ashe-Browne2014-12-031-2/+2
| |
| * adding notes to gitlab nginx confLuke Ashe-Browne2014-12-032-1/+9
| | | | | | | | | | We want to make users aware that the nginx default config will conflict with the gitlab default_server conf file.
* | Update SSL ciphers per logjam vulnerability recommendations.update_ssl_ciphersMarin Jankovski2015-06-151-1/+1
| |
* | Add a note that changing example configuration files requires changing ↵note_about_omnibus_changesMarin Jankovski2015-06-112-2/+14
| | | | | | | | omnibus-gitlab.
* | Merge pull request #8730 from drunkard/masterMarin Jankovski2015-06-022-1/+7
|\ \ | | | | | | Specify shell while run me as git user
| * | Improve comments for shell_pathDrunkard Zhang2015-05-041-3/+2
| | |
| * | Specify shell while run me as git userDrunkard Zhang2015-02-042-1/+8
| |/ | | | | | | | | | | | | | | Some users disabled "git" user's shell after finished installation, this will lead to "This account is currently not available" and could not run /etc/init.d/gitlab, this dirty trick fix it. Signed-off-by: Drunkard Zhang <gongfan193@gmail.com>
* | Fix typoVasilij Schneidermann2015-03-141-1/+1
| |
* | Revert "Merge branch 'go-get-workaround-nginx' of ↵Douwe Maan2015-03-032-20/+0
| | | | | | | | | | | | | | https://github.com/mattes/gitlabhq into mattes-go-get-workaround-nginx" This reverts commit 51349ca3c83c56e072f87253d375316f7164b49a, reversing changes made to b180476bd69bdf99b1727b041116fa8447c0201f.
* | Merge branch 'go-get-workaround-nginx' of https://github.com/mattes/gitlabhq ↵Marin Jankovski2015-02-202-0/+20
|\ \ | | | | | | | | | | | | | | | | | | | | | into mattes-go-get-workaround-nginx Conflicts: lib/support/nginx/gitlab lib/support/nginx/gitlab-ssl
| * | remove optional html tagsmattes2014-12-312-12/+2
| | |
| * | allow for private repositoriesmattes2014-12-312-0/+30
| |/
* | Restore nginx config a little more.Douwe Maan2015-02-202-0/+2
| |
* | Make changes to nginx config less likely to break something.Douwe Maan2015-02-202-35/+66
| |
* | Modify nginx config to let /uploads go through to unicorn.Douwe Maan2015-02-202-37/+47
| |
* | Socket [::]:123 on Linux listens on IPv4 and IPv6sbeh2014-11-261-2/+2
|/ | | | | | | | | | | | This will ensure nginx starts up without the following errors messages: nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] still could not bind() Googling for them leads you to this site: https://chrisjean.com/2014/02/10/fix-nginx-emerg-bind-to-80-failed-98-address-already-in-use/
* Merge pull request #8273 from bbodenmiller/nginx-updatesMarin Jankovski2014-11-102-16/+15
|\ | | | | Nginx updates
| * minor updates & formatting changesBen Bodenmiller2014-11-082-16/+15
| | | | | | | | | | | | | | | | | | minor updates @ formatting changes to match other versions of file. Unify formatting of https://github.com/gitlabhq/gitlabhq/blob/master/lib/support/nginx/gitlab, https://github.com/gitlabhq/gitlabhq/blob/master/lib/support/nginx/gitlab-ssl, & https://gitlab.com/gitlab-org/omnibus-gitlab/blob/master/files/gitlab-cookbooks/gitlab/templates/default/nginx-gitlab-http.conf.erb
* | Don't enable IPv4 *only* on nginx.Hugo Osvaldo Barrera2014-11-032-3/+6
|/ | | | | | | | | The current configuration sample files only enable IPv4 by default, making the server inaccesible for many remote hosts (and an increasing amount every day). Enable IPv4 and IPv6 by default. Older servers with no external IPv6 connectivity will not fail since they'll have a local-link IPv6 address to bind to anyway.
* Merge pull request #8054 from bbodenmiller/patch-4Dmitriy Zaporozhets2014-10-221-8/+6
|\ | | | | match latest config from https://cipherli.st/
| * match latest config from https://cipherli.st/Ben Bodenmiller2014-10-151-8/+6
| |
* | simplify DHE parameter generationBen Bodenmiller2014-10-161-2/+1
|/
* Add a comment on why we are using backward compatible ciphers.Marin Jankovski2014-10-101-3/+4
|
* Revert "update ssl_ciphers"Marin Jankovski2014-10-101-1/+1
| | | | This reverts commit c41e5f5018d059a9c57d2c19088e6c274cc60e10.
* Merge pull request #7664 from bbodenmiller/patch-2Sytse Sijbrandij2014-10-031-0/+2
|\ | | | | add HSTS Policy warning
| * add HSTS Policy warningBen Bodenmiller2014-09-011-0/+2
| | | | | | Add warning about HSTS header as it means user will need to provide secure connection access to site for next 24 months from page view. See https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security for more details.
* | fail_timeout=0 as recommended by UnicornBen Bodenmiller2014-09-122-2/+2
| | | | | | | | | | | | Set's fail_timeout=0 as recommended by http://unicorn.bogomips.org/Unicorn/Configurator.html#method-i-timeout when Unicorn is running behind nginx.
* | Merge pull request #7654 from bbodenmiller/patch-13Sytse Sijbrandij2014-09-081-1/+1
|\ \ | | | | | | update ssl_ciphers
| * | update ssl_ciphersBen Bodenmiller2014-09-071-1/+1
| |/ | | | | | | | | | | | | | | | | taken from https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html / https://cipherli.st/ backwards compatible ciphers not needed since gitlab does not support ie8