summaryrefslogtreecommitdiff
path: root/config/initializers
diff options
context:
space:
mode:
authorDmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>2014-08-28 15:03:22 +0300
committerDmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>2014-08-28 15:03:22 +0300
commitc1d2640b2ea5aec67401ef17ae8e637677aa5d7f (patch)
tree4e043ee0dcf2ee1e982fbb1807e369762345048c /config/initializers
parentdb88190636456a84db747a3f9335a55ca9819274 (diff)
parentfc62664146458f023c5573d7e6dead5f11c6fd4b (diff)
downloadgitlab-ce-c1d2640b2ea5aec67401ef17ae8e637677aa5d7f.tar.gz
Merge branch 'redis_settings'
Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com> Conflicts: CHANGELOG
Diffstat (limited to 'config/initializers')
-rw-r--r--config/initializers/7_cache_settings.rb20
-rw-r--r--config/initializers/session_store.rb2
2 files changed, 21 insertions, 1 deletions
diff --git a/config/initializers/7_cache_settings.rb b/config/initializers/7_cache_settings.rb
new file mode 100644
index 00000000000..5367a4d431c
--- /dev/null
+++ b/config/initializers/7_cache_settings.rb
@@ -0,0 +1,20 @@
+Gitlab::Application.configure do
+ redis_config_file = Rails.root.join('config', 'resque.yml')
+
+ redis_url_string = if File.exists?(redis_config_file)
+ YAML.load_file(redis_config_file)[Rails.env]
+ else
+ "redis://localhost:6379"
+ end
+
+ # Redis::Store does not handle Unix sockets well, so let's do it for them
+ redis_config_hash = Redis::Store::Factory.extract_host_options_from_uri(redis_url_string)
+ redis_uri = URI.parse(redis_url_string)
+ if redis_uri.scheme == 'unix'
+ redis_config_hash[:path] = redis_uri.path
+ end
+
+ redis_config_hash[:namespace] = 'cache:gitlab'
+
+ config.cache_store = :redis_store, redis_config_hash
+end
diff --git a/config/initializers/session_store.rb b/config/initializers/session_store.rb
index b3fa648f2a6..b2d59f1c4b7 100644
--- a/config/initializers/session_store.rb
+++ b/config/initializers/session_store.rb
@@ -2,7 +2,7 @@
Gitlab::Application.config.session_store(
:redis_store, # Using the cookie_store would enable session replay attacks.
- servers: Gitlab::Application.config.cache_store[1], # re-use the Redis config from the Rails cache store
+ servers: Gitlab::Application.config.cache_store[1].merge(namespace: 'session:gitlab'), # re-use the Redis config from the Rails cache store
key: '_gitlab_session',
secure: Gitlab.config.gitlab.https,
httponly: true,