As we reevaluate how to best support and maintain Staging Ref in the future, we encourage development teams using this environment to highlight their use cases in the following issue: https://gitlab.com/gitlab-com/gl-infra/software-delivery/framework/software-delivery-framework-issue-tracker/-/issues/36.

Skip to content
Snippets Groups Projects
  1. Feb 08, 2017
  2. Feb 07, 2017
  3. Feb 06, 2017
    • Rémy Coutable's avatar
      Add 3.6.7 CHANGELOG · a812dc29
      Rémy Coutable authored
      
      Signed-off-by: default avatarRémy Coutable <remy@rymai.me>
      Unverified
      a812dc29
    • Timothy Andrew's avatar
      Pass relevant git environment variables while calling `/allowed` · 752536bb
      Timothy Andrew authored
      
      1. Starting version 2.11, git changed the way the pre-receive flow works.
      
        - Previously, the new potential objects would be added to the main repo. If the
          pre-receive passes, the new objects stay in the repo but are linked up. If
          the pre-receive fails, the new objects stay orphaned in the repo, and are
          cleaned up during the next `git gc`.
      
        - In 2.11, the new potential objects are added to a temporary "alternate object
          directory", that git creates for this purpose. If the pre-receive passes, the
          objects from the alternate object directory are migrated to the main repo. If
          the pre-receive fails the alternate object directory is simply deleted.
      
      2. In our workflow, the pre-recieve script calls the `/allowed` endpoint on the
         rails server. This `/allowed` endpoint calls out directly to git to perform
         various checks. These direct calls to git do _not_ have the necessary
         environment variables set which allow access to the "alternate object
         directory" (explained above). Therefore these calls to git are not able to
         access any of the new potential objects to be added during this push.
      
      3. We fix this by passing the relevant environment variables
         (GIT_ALTERNATE_OBJECT_DIRECTORIES, GIT_OBJECT_DIRECTORY, and
         GIT_QUARANTINE_PATH) to the `/allowed` endpoint, which will then include
         these environment variables while calling out to git.
      
      Signed-off-by: default avatarRémy Coutable <remy@rymai.me>
      Unverified
      752536bb
  4. Oct 12, 2016
  5. Oct 11, 2016
  6. Oct 10, 2016
  7. Oct 07, 2016
  8. Oct 05, 2016
  9. Sep 30, 2016
  10. Sep 27, 2016
    • Rémy Coutable's avatar
      Merge branch '59-git-tracing' into 'master' · 0b4fd0af
      Rémy Coutable authored
      Enable GIT_TRACE_PERFORMANCE through a config variable.
      
      The value of the variable must an absolute path needs to exist so we’re able to check if we can write in that file. Because in the 
      case we cannot write we’ll throw a warning to the output of the users.
      
      ```sh
      ~/dev/gitlab/local/pacoguzman/gitlab-ce (master=)$ git push origin master
      warning: could not open '/wadus' for tracing: Permission denied
      Everything up-to-date
      ```
      
      Closes #59
      
      See merge request !91
    • Paco Guzman's avatar
      Enable GIT_TRACE/GIT_TRACE_PACKET/GIT_TRACE_PERFORMANCE by providing the... · 192e2bd3
      Paco Guzman authored
      Enable GIT_TRACE/GIT_TRACE_PACKET/GIT_TRACE_PERFORMANCE by providing the git_trace_log_file config key
      
      The value of the variable if present must be a writable absolute path. If it’s
      not the case we log a proper message and not enable tracing to not throw output to the users.
      192e2bd3
  11. Sep 26, 2016
  12. Sep 23, 2016
  13. Sep 20, 2016
  14. Sep 08, 2016
  15. Sep 06, 2016
  16. Sep 02, 2016
  17. Aug 26, 2016
  18. Aug 19, 2016
Loading