summaryrefslogtreecommitdiff
path: root/lib/support
Commit message (Collapse)AuthorAgeFilesLines
* The GitLab Pages external-http and external-https arguments can be specified ↵Nick Thomas2017-03-081-2/+2
| | | | multiple times
* Stop setting Strict-Transport-Securty header from within the appPaweł Chojnacki2017-03-031-0/+3
|
* Fix syntax error in init.d/gitlab after Pages -> CEDrew Blessing2017-02-071-1/+1
| | | Cherry-picked ‘Fix syntax error in conditional statement’
* Add missing gitlab-pages related vars in init.d/gitlabAchilleas Pipinellis2017-01-311-2/+2
|
* Simplify NGINX server_name regexAchilleas Pipinellis2017-01-312-3/+3
|
* chmod 644 gitlab.default.exampleAchilleas Pipinellis2017-01-311-0/+0
| | | | No need to be executable since it is sourced in /etc/init.d/gitlab
* Set pages daemon to falseAchilleas Pipinellis2017-01-311-5/+5
|
* Add missing variables for gitlab-pagesAchilleas Pipinellis2017-01-311-0/+5
| | | | [ci skip]
* Change the pages daemon proxy listen port to 8090Achilleas Pipinellis2017-01-313-3/+3
| | | | So as to be consistent with what is set in Omnibus
* Change NGINX pages configs to account for the Pages daemonAchilleas Pipinellis2017-01-312-19/+15
|
* Add init scripts for GitLab Pages daemonAchilleas Pipinellis2017-01-312-7/+78
|
* Fix confusing implementation detail in nginx config about how gitlab-pages ↵Kamil Trzcinski2017-01-312-6/+4
| | | | work [ci skip]
* Bring back GitLab Pages SSL configKamil Trzcinski2017-01-312-0/+84
|
* Revert "Store pages in shared/pages/fqdn/fqdn/public or ↵Kamil Trzcinski2017-01-312-87/+4
| | | | | | shared/pages/fqdn/subpath/public - makes it simpler to implement CNAMEs in future" This reverts commit 86a2a78f0d13a678899460638add6b862059433e.
* Store pages in shared/pages/fqdn/fqdn/public or ↵Kamil Trzcinski2017-01-312-4/+87
| | | | shared/pages/fqdn/subpath/public - makes it simpler to implement CNAMEs in future
* Add GitLab PagesKamil Trzcinski2017-01-311-0/+27
| | | | | | | | | | | | | | | | - The pages are created when build artifacts for `pages` job are uploaded - Pages serve the content under: http://group.pages.domain.com/project - Pages can be used to serve the group page, special project named as host: group.pages.domain.com - User can provide own 403 and 404 error pages by creating 403.html and 404.html in group page project - Pages can be explicitly removed from the project by clicking Remove Pages in Project Settings - The size of pages is limited by Application Setting: max pages size, which limits the maximum size of unpacked archive (default: 100MB) - The public/ is extracted from artifacts and content is served as static pages - Pages asynchronous worker use `dd` to limit the unpacked tar size - Pages needs to be explicitly enabled and domain needs to be specified in gitlab.yml - Pages are part of backups - Pages notify the deployment status using Commit Status API - Pages use a new sidekiq queue: pages - Pages use a separate nginx config which needs to be explicitly added
* update scripts and docs to reference the newly namespaced rake taskrelative-url-assetsMike Greiling2017-01-271-2/+2
|
* Upgrade NGINX configuration files to add websocket supportNick Thomas2016-12-122-0/+15
|
* Revert "Defend against 'Host' header injection"Jacob Vosmaer2016-08-082-12/+2
| | | | | | This reverts commit 47b5b441395921e9f8e9982bb3f560e5db5a67bc. See https://gitlab.com/gitlab-org/gitlab-ce/issues/17877#note_13488047
* Defend against 'Host' header injectionJacob Vosmaer2016-07-122-2/+12
| | | | | | | | | | | | | | | | | | | | | | Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/17877 . This change adds 'defense in depth' against 'Host' HTTP header injection. It affects normal users in the following way. Suppose your GitLab server has IP address 1.2.3.4 and hostname gitlab.example.com. Currently, if you enter 1.2.3.4 in your browser, you get redirected to 1.2.3.4/users/sign_in. After this change, you get redirected from 1.2.3.4 to gitlab.example.com/users/sign_in. This is because the address you typed in the address bar of your browser ('1.2.3.4'), which gets stored in the 'Host' header, is now being overwritten to 'gitlab.example.com' in NGINX. In this change we also make NGINX clear the 'X-Forwarded-Host' header because Ruby on Rails also uses that header the same wayas the 'Host' header. We think that for most GitLab servers this is the right behavior, and if not then administrators can change this behavior themselves at the NGINX level.
* Add note about port needed in NGINX configAchilleas Pipinellis2016-05-221-0/+2
|
* Add NGINX config file for RegistryAchilleas Pipinellis2016-05-221-0/+51
|
* Replace gitlab-workhorse with GitLab Workhorse where appropriateinitd_gitlab_workhorse_renameAchilleas Pipinellis2016-04-281-6/+6
|
* Add a branded 503 static error pagers-503-pageRobert Speicher2016-04-222-2/+4
| | | | | | [ci skip] Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/15398
* Remove deprecated NGINX CI configAchilleas Pipinellis2016-04-141-29/+0
|
* Do not serve anything via nginx as we have workhorseArtem Sidorenko2016-03-112-2/+19
| | | | | Otherwise this might 'hide' problems https://github.com/gitlabhq/gitlabhq/issues/10053#issuecomment-188919319
* Merge branch 'doc_relative_url' into 'master' Achilleas Pipinellis2016-02-101-4/+9
|\ | | | | | | | | | | | | Add documentation on relative URL support closes #12773 See merge request !2770
| * Edit configuration files for relative URL supportAchilleas Pipinellis2016-02-091-4/+9
| | | | | | | | [ci skip]
* | Merge branch 'fix-init' into 'master' Rémy Coutable2016-02-081-1/+1
|\ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixed init.d script not working on OS X -s flag of su doesn't work correctly on OS X, logging in as the user and not running the requested command. By moving the bash shell init inside the su command we avoid the issue Fixes Issue #3309 See merge request !1728
| * | Fixed init.d script not working on OS Xritave2016-02-081-1/+1
| |/ | | | | | | | | | | -s flag of su doesn't work correctly on some systems, loging in the user and not running the requested command. By moving the bash shell init inside the su command we avoid the issue
* | suppress only errors in init-script while determining canonical path of ↵Harald Spaethe2016-02-081-1/+1
|/ | | | gitlab_workhorse_dir
* Consistent rails_socket use.fbretel2016-01-251-1/+1
|
* Init script changes for gitlab-workhorse in 8.4Jacob Vosmaer2016-01-212-3/+9
|
* Fix spelling of "it's" to "its" where appropriate.cafuego2015-12-242-7/+7
|
* Update init script options for gitlab-workhorseJacob Vosmaer2015-12-152-2/+3
|
* Pass all requests from NGINX to gitlab-workhorseJacob Vosmaer2015-12-112-290/+3
|
* Merge pull request #9892 from stetskevych/fix_nginx_ssl_configJacob Vosmaer2015-12-071-1/+1
|\ | | | | Fix gitlab-ssl nginx config to work when multiple server_names are served over https
| * Fix gitlab-ssl nginx config to work when multiple server_names are served ↵Vyacheslav Stetskevych2015-12-061-1/+1
| | | | | | | | over https
* | Check GitLab Workhorse status in init.d script when reporting all components ↵Stan Hu2015-12-041-1/+1
|/ | | | | | are up and running Closes https://github.com/gitlabhq/gitlabhq/issues/9869
* Fix alignmentRobert Speicher2015-11-271-6/+6
| | | | [ci skip]
* Fix indentation in NGINX confignginx-workhorse-upload-limitJacob Vosmaer2015-11-271-6/+6
|
* Repeat "client_max_body_size 0" everywhereJacob Vosmaer2015-11-272-0/+12
| | | | | It turns out that if we do not the declaration from "location /" wins.
* Merge branch 'client-max-body-size' into 'master' Robert Speicher2015-11-192-6/+2
|\ | | | | | | | | | | | | Do not limit workhorse POST/PUT size in NGINX Limiting, if any, should happen in gitlab-workhorse. See merge request !1831
| * Do not limit workhorse POST/PUT size in NGINXJacob Vosmaer2015-11-192-6/+2
| | | | | | | | Limiting, if any, should happen in gitlab-workhorse.
* | Deploy page should be shown for all pages not just rootDrew Blessing2015-11-182-2/+2
|/
* Add support for git lfs.lfsMarin Jankovski2015-11-162-2/+16
|
* Fix nginx config to use @gitlab-workhorseKamil Trzcinski2015-11-102-8/+8
|
* Implement Build ArtifactsKamil Trzcinski2015-11-102-0/+32
| | | | | | | - Offloads uploading to GitLab Workhorse - Use /authorize request for fast uploading - Added backup recipes for artifacts - Support download acceleration using X-Sendfile
* Switch to gitlab-workhorseJacob Vosmaer2015-10-294-63/+60
|
* Fix NGINX API download regexJacob Vosmaer2015-10-142-2/+2
| | | | Users are allowed to supply namespace%2Fproject instead of a numeric ID