- Sep 06, 2023
-
-
Ash McKenzie authored
-
- Aug 02, 2023
-
-
Ash McKenzie authored
-
- Jul 06, 2023
-
-
Ash McKenzie authored
-
- Jun 29, 2023
-
-
Ash McKenzie authored
-
Ash McKenzie authored
-
- May 18, 2022
-
-
Sean Carroll authored
-
- Feb 02, 2022
-
-
Ash McKenzie authored
-
Ash McKenzie authored
-
- Jan 18, 2021
-
-
Nick Thomas authored
-
- Aug 17, 2020
-
-
Taylan Develioglu authored
Implements the feature requested in gitlab-org/gitlab#19672 This requires the internal api counterpart in gitlab-org/gitlab!36302 to be merged first. It can be used as follows: ``` censored@censored-VirtualBox:~/git/gitlab$ ssh git@gitlab-2004 personal_access_token remote: remote: ======================================================================== remote: remote: Usage: personal_access_token <name> <scope1[,scope2,...]> [ttl_days] remote: remote: ======================================================================== remote: censored@censored-VirtualBox:~/git/gitlab$ ssh git@gitlab-2004 personal_access_token newtoken read_api,read_repository 30 Token: aAY1G3YPeemECgUvxuXY Scopes: read_api,read_repository Expires: 2020-08-07 ```
-
- Jun 06, 2020
-
-
Takuya Noguchi authored
Signed-off-by:
Takuya Noguchi <takninnovationresearch@gmail.com>
-
- Oct 15, 2019
-
-
Nick Thomas authored
-
- Oct 08, 2019
-
-
Nick Thomas authored
-
- Aug 15, 2019
-
-
Patrick Bajao authored
We had `gitlab-shell-authorized-keys-check` and `gitlab-shell-authorized-principals-check` as symlinks to `gitlab-shell` before. We determine the `Command` and `CommandArgs` that we build based on the `Name` of the `Executable`. We also use that to know which fallback ruby executable should we fallback to. We use `os.Executable()` to do that. `os.Executable()` behaves differently depending on OS. It may return the symlink or the target's name. That can result to a buggy behavior. The fix is to create binaries for each instead of using a symlink. That way we don't need to rely on `os.Executable()` to get the name. We pass the `Name` of the executable instead.
-
- Sep 28, 2018
-
-
Nick Thomas authored
-
- Mar 20, 2018
-
-
Alejandro Rodríguez authored
-
- May 23, 2017
-
-
Jacob Vosmaer authored
-
- Apr 12, 2017
-
-
Jacob Vosmaer authored
-
- Feb 24, 2017
-
-
Pawel Chojnacki authored
-
- Dec 12, 2016
-
-
Sean McGivern authored
Add a new configuration option, custom_hooks_dir. When this is set, we will look for global custom hooks in: <custom_hooks_dir>/{pre-receive,update,post-receive}.d/* When this is not set, default to <REPO_PATH>/hooks.
-
- Dec 01, 2016
-
-
Dirk Hörner authored
This commit adds the option of having another set of global custom hooks along with the already supported repository local custom hooks. The repository local custom hook is executed first (if available). If successful, execution continues with the global custom hook (if available). This way, local custom hooks get priority over global custom hooks. Global custom hooks can be enabled by placing an executable file into the "custom_hooks" directory within gitlab-shell (create if it does not exist, yet).
-
- May 12, 2016
- Oct 15, 2014
-
-
Valery Sizov authored
-
- Oct 04, 2014
-
-
Ciro Santilli authored
-
Ciro Santilli authored
-
- Aug 13, 2014
-
-
Dmitriy Zaporozhets authored
Signed-off-by:
Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
- Jul 17, 2014
-
-
Liam Monahan authored
Something like gitlab-shell.log-20140626.gz will not be caught by the original pattern match since '.' is taken as a literal character.
-
- Apr 18, 2014
-
-
Dmitriy Zaporozhets authored
This prevents concurrent modification of authorized_keys file Signed-off-by:
Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
-
- Nov 10, 2013
-
-
Tuomo Tanskanen authored
Ignore gzipped logs as well.
-
- May 18, 2013
-
-
ash authored
-
- Feb 05, 2013
-
-
Dmitriy Zaporozhets authored
-
- Feb 03, 2013
-
-
Dmitriy Zaporozhets authored
-