As we reevaluate how to best support and maintain Staging Ref in the future, we encourage development teams using this environment to highlight their use cases in the following issue: https://gitlab.com/gitlab-com/gl-infra/software-delivery/framework/software-delivery-framework-issue-tracker/-/issues/36.

Skip to content
Snippets Groups Projects
  1. Jul 06, 2023
  2. Jun 29, 2023
  3. Jun 16, 2023
  4. Apr 13, 2023
  5. Apr 07, 2023
  6. Mar 07, 2023
  7. Feb 08, 2023
  8. Jan 27, 2023
  9. Jun 23, 2022
  10. May 05, 2022
  11. Apr 18, 2022
  12. Feb 02, 2022
  13. Sep 16, 2021
    • Kevin's avatar
      makefile: properly quote '$' in VERSION_STRING · 726945b3
      Kevin authored
      If git is not available or gitlab-shell is not built in a repository, it falls back the VERSION file. That command is not properly escaped and results in the message:
      
      > awk: cmd. line:1: Unexpected token
      
      When you remove the `2>/dev/null`. Escape the '$' characters to solve this.
      726945b3
  14. Sep 07, 2021
  15. Jul 26, 2021
  16. Jul 01, 2021
  17. May 17, 2021
    • Nick Thomas's avatar
      Fix opentracing setup for gitlab-sshd · de13980f
      Nick Thomas authored
      Previously, opentracing (if configured) was initialized late in the
      gitlab-shell process's lifespan, coming just before making a gRPC
      call to Gitaly.
      
      By moving the opentracing initialization to be at process startup, we
      make it available for the whole process lifecycle, which is very useful
      to gitlab-sshd, as it means we'll only call tracing.Initialize() once
      on process startup, rather than once per SSH connection.
      
      To get this working, we need to introduce a context to gitlab-sshd.
      This carries the client/service name, but also carries an initial
      correlation ID. The main outcome of this is that all calls to the
      authorized_keys endpoint from a given gitlab-sshd process will now
      share a correlation ID. I don't have a strong opinion about this either
      way.
      
      Changelog: fixed
      de13980f
  18. Apr 12, 2021
  19. Nov 05, 2020
  20. Oct 16, 2020
  21. Jun 06, 2020
  22. May 11, 2020
  23. Oct 18, 2019
  24. Oct 15, 2019
  25. Oct 08, 2019
  26. Aug 15, 2019
    • Patrick Bajao's avatar
      Replace symlinks with actual binaries · 41f919eb
      Patrick Bajao authored
      We had `gitlab-shell-authorized-keys-check` and
      `gitlab-shell-authorized-principals-check` as symlinks to
      `gitlab-shell` before.
      
      We determine the `Command` and `CommandArgs` that we build based
      on the `Name` of the `Executable`. We also use that to know which
      fallback ruby executable should we fallback to. We use
      `os.Executable()` to do that.
      
      `os.Executable()` behaves differently depending on OS. It may
      return the symlink or the target's name. That can result to a
      buggy behavior.
      
      The fix is to create binaries for each instead of using a symlink.
      That way we don't need to rely on `os.Executable()` to get the name.
      We pass the `Name` of the executable instead.
      41f919eb
  27. Jul 29, 2019
    • Patrick Bajao's avatar
      Support falling back to ruby version of checkers · aab85f36
      Patrick Bajao authored
      Rename the ruby scripts to have `-ruby` suffix and add a symlink
      for both to `./gitlab-shell`. The executable name will be used to
      determine how args will be parsed.
      
      For now, we only parse the arguments for gitlab-shell commands. If
      the executable is `gitlab-shell-authorized-keys-check` or
      `gitlab-shell-authorized-principals-check`, it'll always fallback
      to the ruby version.
      
      Ruby specs test the ruby script, the fallback from go to ruby and
      go implementation of both (still pending).
      aab85f36
  28. Jun 28, 2019
  29. Jun 27, 2019
  30. Jan 12, 2018
  31. Jul 22, 2017
  32. May 12, 2016
Loading