Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Make gitaly executable mapping clearergo-wrappers | Jacob Vosmaer | 2017-05-23 | 1 | -8/+12 |
| | |||||
* | Explain chdir | Jacob Vosmaer | 2017-05-23 | 1 | -0/+1 |
| | |||||
* | Use gitaly-upload-pack and gitaly-receive-pack | Jacob Vosmaer | 2017-05-23 | 1 | -4/+24 |
| | |||||
* | Handle GL_REPOSITORY env variable and use it in api calls | Alejandro Rodríguez | 2017-05-11 | 1 | -3/+5 |
| | |||||
* | Remove git annex support | Pawel Chojnacki | 2017-02-24 | 1 | -41/+2 |
| | |||||
* | Instrument GitLab Shell and log metrics data to a file | Paco Guzman | 2016-10-11 | 1 | -5/+8 |
| | |||||
* | Enable GIT_TRACE/GIT_TRACE_PACKET/GIT_TRACE_PERFORMANCE by providing the ↵59-git-tracing | Paco Guzman | 2016-09-27 | 1 | -0/+26 |
| | | | | | | git_trace_log_file config key The value of the variable if present must be a writable absolute path. If it’s not the case we log a proper message and not enable tracing to not throw output to the users. | ||||
* | Style fixes and better tests. | Patricio Cano | 2016-09-06 | 1 | -1/+1 |
| | |||||
* | Refactored LFS auth logic to use its own API endpoint. | Patricio Cano | 2016-09-06 | 1 | -5/+5 |
| | |||||
* | Refactored JSON header generation to its own class and added tests for it | Patricio Cano | 2016-09-06 | 1 | -10/+2 |
| | |||||
* | Added LFS support to SSH | Patricio Cano | 2016-09-06 | 1 | -1/+22 |
| | | | | - Required changes to GitLab Shell include the actual handling of the `git-lfs-authenticate` command and the retrieval of the correct credentials. | ||||
* | Add option to recover 2FA via SSH | Drew Blessing | 2016-08-26 | 1 | -9/+47 |
| | |||||
* | Add an error message when using shell commands with incompatible GitLab versions | Alejandro Rodríguez | 2016-07-06 | 1 | -0/+1 |
| | |||||
* | Make use of a constant for the used SSH protocol | Patricio Cano | 2016-07-05 | 1 | -2/+3 |
| | |||||
* | Rename ENV['PROTOCOL'] to ENV['GL_PROTOCOL'] and make it mandatory with no ↵ | Patricio Cano | 2016-07-05 | 1 | -1/+1 |
| | | | | fallback value | ||||
* | Simplify protocol assign, and populate ENV['PROTOCOL'] variable when calling ↵ | Patricio Cano | 2016-07-05 | 1 | -1/+2 |
| | | | | hooks via SSH | ||||
* | Allow GitLab Shell to check for allowed access based on the used Git protocol. | Patricio Cano | 2016-07-05 | 1 | -1/+1 |
| | |||||
* | Refactor repository paths handling to allow multiple git mount pointsshards | Alejandro Rodríguez | 2016-06-29 | 1 | -29/+25 |
| | |||||
* | get git annex to work when using custom SSH port | James Lopez | 2016-03-16 | 1 | -3/+2 |
| | |||||
* | Merge branch 'stricter-exec_cmd' into 'master' | Dmitriy Zaporozhets | 2015-12-01 | 1 | -12/+20 |
|\ | | | | | | | | | | | | | | | Stricter exec cmd In response to the gitlab-shell 2.6.6-2.6.7 remote code execution vulnerability. See merge request !33 | ||||
| * | Add comment about untrusted origin_cmdstricter-exec_cmd | Jacob Vosmaer | 2015-11-26 | 1 | -0/+3 |
| | | |||||
| * | Limit availability of SSH_ORIGINAL_COMMAND | Jacob Vosmaer | 2015-11-25 | 1 | -12/+10 |
| | | | | | | | | | | Hoping this makes it more obvious when code touches the very unsafe contents of this variable. | ||||
| * | Disallow execing strings | Jacob Vosmaer | 2015-11-25 | 1 | -0/+7 |
| | | | | | | | | Passing strings to Kernel::exec leads to remote code execution. | ||||
* | | Merge branch 'y/git-home' into 'master' | Dmitriy Zaporozhets | 2015-11-25 | 1 | -0/+1 |
|\ \ | |/ |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Pass $HOME to git as well [ this patch has the same rationale and reasoning as https://gitlab.com/gitlab-org/gitlab-workhorse/commit/0d0bd209 details follow ] Git has 3 places for configs: - system - global (per user), and - local (per repository) System config location is hardcoded at git compile time (to usually $prefix/etc/gitconfig). Local configuration is usually picked because we pass full repo path to subcommand. But global configuration is currently not picked at all, because HOME env variable is not passed to git. Pass $HOME through and let git see it's "global" config. Currently GitLab omnibus stores gitlab user name/email + "autocrlf = true" in global config, so missing it should not be a blocker for receive/send-pack operations. But having it is more correct and can be handy in the future if/when more git operations are done from-under gitlab-shell. Having $HOME properly set is also needed when one cannot change system git config and have to put site-wide configuration into global git config under $HOME. That was the case I've hit and the reason for this patch. /cc @dzaporozhets, @jacobvosmaer See merge request !32 | ||||
| * | Pass $HOME to git as well | Kirill Smelkov | 2015-11-24 | 1 | -0/+1 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [ this patch has the same rationale and reasoning as https://gitlab.com/gitlab-org/gitlab-workhorse/commit/0d0bd209 details follow ] Git has 3 places for configs: - system - global (per user), and - local (per repository) System config location is hardcoded at git compile time (to usually $prefix/etc/gitconfig). Local configuration is usually picked because we pass full repo path to subcommand. But global configuration is currently not picked at all, because HOME env variable is not passed to git. Pass $HOME through and let git see it's "global" config. Currently GitLab omnibus stores gitlab user name/email + "autocrlf = true" in global config, so missing it should not be a blocker for receive/send-pack operations. But having it is more correct and can be handy in the future if/when more git operations are done from-under gitlab-shell. Having $HOME properly set is also needed when one cannot change system git config and have to put site-wide configuration into global git config under $HOME. That was the case I've hit and the reason for this patch. | ||||
* | | Revert "Run git-lfs-authenticate script with original command line arguments" | Dmitriy Zaporozhets | 2015-11-25 | 1 | -2/+0 |
|/ | | | | | | This reverts commit 8449979ff029af51be0c675c5b6262bc4adc8b3d. Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com> | ||||
* | Merge branch 'master' of gitlab.com:gitlab-org/gitlab-shell into ↵ | Jacob Vosmaer | 2015-10-01 | 1 | -0/+3 |
|\ | | | | | | | no-init-on-gcryptsetup | ||||
| * | Merge branch 'bozaro/gitlab-shell-git-lfs-authenticate' | Dmitriy Zaporozhets | 2015-09-10 | 1 | -0/+2 |
| |\ | | | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com> | ||||
| | * | Run git-lfs-authenticate script with original command line arguments | Artem V. Navrotskiy | 2015-09-09 | 1 | -0/+2 |
| | | | |||||
| * | | Do not clean LANG environment variable for the git hooks when working ↵ | Artem V. Navrotskiy | 2015-09-09 | 1 | -0/+1 |
| |/ | | | | | | | | | | | through the SSH-protocol When cleaning this environment variable can be problems with the processing of non-ASCII data | ||||
* | | Skip 'git annex init' when using 'gcryptsetup'no-init-on-gcryptsetup | Jacob Vosmaer | 2015-08-11 | 1 | -1/+6 |
|/ | | | | | 'gcryptsetup' is a special git-annex feature that does its own initialization. | ||||
* | If git-annex is enabled set GIT_ANNEX_SHELL_LIMITED variable.git_annex_env_variable | Marin Jankovski | 2015-07-16 | 1 | -1/+11 |
| | |||||
* | Add git-lfs-authenticate to command white list | Artem V. Navrotskiy | 2015-06-29 | 1 | -3/+16 |
| | |||||
* | Refactor GitlabShell#exec a bit. | Douwe Maan | 2015-04-06 | 1 | -7/+9 |
| | |||||
* | GitlabShell doesn't need to set GL_ID at all. | Douwe Maan | 2015-04-06 | 1 | -5/+4 |
| | |||||
* | Write GitlabShell error to stderr.nice-error-message | Douwe Maan | 2015-04-06 | 1 | -18/+30 |
| | |||||
* | Fail early on invalid input (raise ... unless ...) | Jacob Vosmaer | 2015-02-20 | 1 | -34/+28 |
| | | | | | This intention of this change is to make the normal flow of execution easier to read, and to prevent mistakes in deeply nested if-else trees. | ||||
* | Immediatly raise exception if git-annex is disabled | Dmitriy Zaporozhets | 2015-02-19 | 1 | -17/+25 |
| | |||||
* | Safer line sub for git-annex commandv2.5.2 | Dmitriy Zaporozhets | 2015-02-18 | 1 | -1/+1 |
| | |||||
* | Fix syntax of git init command | Dmitriy Zaporozhets | 2015-02-17 | 1 | -1/+1 |
| | |||||
* | Fix git-annex init repo | Dmitriy Zaporozhets | 2015-02-17 | 1 | -3/+3 |
| | |||||
* | Make fixes to pass rubocop | Dmitriy Zaporozhets | 2015-02-16 | 1 | -1/+1 |
| | |||||
* | Add config option to disable git-annex | Dmitriy Zaporozhets | 2015-02-16 | 1 | -4/+4 |
| | |||||
* | Enable git-annex on first command | Dmitriy Zaporozhets | 2015-02-13 | 1 | -9/+14 |
| | |||||
* | Improve logging for git-annex | Dmitriy Zaporozhets | 2015-02-12 | 1 | -1/+4 |
| | |||||
* | Merge branch 'master' into git-annex | Dmitriy Zaporozhets | 2015-02-12 | 1 | -14/+12 |
|\ | | | | | | | | | Conflicts: lib/gitlab_shell.rb | ||||
| * | Log full Net::HTTP error. | Douwe Maan | 2015-02-12 | 1 | -1/+0 |
| | | |||||
| * | Show nice error message when internal API is unreachable. | Douwe Maan | 2015-02-11 | 1 | -11/+12 |
| | | |||||
* | | Enable git-annex validate access | GitLab | 2015-02-12 | 1 | -6/+5 |
| | | |||||
* | | Patch gitlab-shell to work with git-annex-shell | Dmitriy Zaporozhets | 2015-02-11 | 1 | -6/+38 |
|/ |