- Mar 09, 2021
-
-
Jacob Vosmaer authored
-
- Mar 05, 2021
-
-
Jacob Vosmaer authored
-
- Mar 03, 2021
-
-
Patrick Bajao authored
-
- Mar 01, 2021
-
-
This reverts commit 4f0c3682.
-
- Feb 17, 2021
-
-
This reverts commit 4f0c3682.
-
- Feb 16, 2021
-
-
Nick Thomas authored
-
- Feb 10, 2021
-
-
Steve Abrams authored
-
- Jan 21, 2021
-
-
Nick Thomas authored
-
- Jan 19, 2021
-
-
Markus Koller authored
Changes: - Support Git HTTP on toplevel repositories gitlab-workhorse!670 - Update GoCloud to v0.21.1+ gitlab-workhorse!675 - Allow blank S3 regions to be used gitlab-workhorse!677
-
- Jan 11, 2021
-
-
too long method name results in too long prometheus label name, which can crash prometheus
-
- Jan 05, 2021
-
-
too long method name results in too long prometheus label name, which can crash prometheus
-
- Dec 09, 2020
-
-
Stan Hu authored
Changes: https://gitlab.com/gitlab-org/gitlab-workhorse/-/blob/master/CHANGELOG - Support alternate document root directory gitlab-org/gitlab-workhorse!626 - Fix uploader not returning 413 when artifact too large gitlab-org/gitlab-workhorse!663 - Auto-register Prometheus metrics gitlab-org/gitlab-workhorse!660 - Do not resize when image is less than 8 bytes gitlab-org/gitlab-workhorse!666
-
- Nov 26, 2020
-
-
Eugenia Grieff authored
-
Alessio Caiazza authored
-
- Nov 20, 2020
-
-
Workhorse version bump to v8.55.0 to support direct_upload on the new API endpoint
-
- Nov 13, 2020
-
-
Aleksei Lipniagov authored
-
- Nov 02, 2020
-
-
- Oct 21, 2020
-
-
Stan Hu authored
Full list of changes: https://gitlab.com/gitlab-org/gitlab-workhorse/-/blob/master/CHANGELOG
-
- Oct 15, 2020
-
-
Aleksei Lipniagov authored
-
- Oct 02, 2020
-
-
Stan Hu authored
This brings in gitlab-workhorse!619, which updates Gitaly's latest Protocol Buffer definitions. This is needed to support a new flag (`IncludeLfsBlobs`) in the `GetArchiveRequest` RPC for #15079.
-
- Oct 01, 2020
-
-
Aleksei Lipniagov authored
-
- Sep 28, 2020
-
-
Aleksei Lipniagov authored
-
- Sep 21, 2020
-
-
Nick Thomas authored
-
- Sep 05, 2020
-
-
Stan Hu authored
This brings in support for Azure custom storage domains: gitlab-org/gitlab-workhorse!593
-
- Sep 03, 2020
-
-
Erick Bajao authored
-
- Sep 01, 2020
-
-
Nick Thomas authored
-
- Aug 20, 2020
-
-
Stan Hu authored
This fixes a critical regression which happens when no `[object_storage]` config is defined in `config.toml`.
-
Stan Hu authored
This adds Azure Blob Storage support. Full list of changes: https://gitlab.com/gitlab-org/gitlab-workhorse/-/blob/master/CHANGELOG
-
- Aug 12, 2020
-
-
Stan Hu authored
This updates Workhorse to v8.39.0 to fix an issue with `gitlab-zip-metadata`. This relates to gitlab-org/gitlab#223806. Full list of Workhorse changes: https://gitlab.com/gitlab-org/gitlab-workhorse/-/blob/master/CHANGELOG
-
- Aug 11, 2020
-
-
Stan Hu authored
This adds support for adding S3 encryption headers to uploads. Full list of changes: https://gitlab.com/gitlab-org/gitlab-workhorse/-/blob/master/CHANGELOG
-
- Jul 15, 2020
-
-
Patrick Bajao authored
Updates GITLAB_WORKHORSE_VERSION to latest version that includes LSIF references support behind `code_navigation_references` feature flag.
-
- Jun 17, 2020
-
-
Igor Drozdov authored
-
- Jun 04, 2020
-
-
Nick Thomas authored
-
- Jun 01, 2020
-
-
Stan Hu authored
This fixes a ZIP download issue with some S3 providers (gitlab-org/gitlab-workhorse!508) and adds support for uploading files directly via an S3 client inside Workhorse. Full list of changes: https://gitlab.com/gitlab-org/gitlab-workhorse/-/blob/master/CHANGELOG
-
- May 28, 2020
-
-
Jacob Vosmaer authored
-
- May 26, 2020
-
-
- May 22, 2020
-
-
Igor Drozdov authored
That's done in order to tell Workhorse whether Lsif artifact should be parsed
-
- May 08, 2020
-
-
David Fernandez authored
-
- Apr 10, 2020
-
-
Stan Hu authored
The attack is outlined in gitlab-org/gitlab#213139. It exploits the fact that the artifacts endpoint reads `file.path` directly using `UploadedFile.from_params`. `file.path` can be given by the user and pass through workhorse. As such, it's an untrusted source and could contain the path of any file in `Dir.tmpdir`. This results in creating a `Ci::JobArtifact` pointing to an arbitrary temporary file. To counter this, this commit relies on the fact that the upload endpoint deals with a multipart upload. This type of uploads are handled by `Gitlab::Middleware::Multipart` which will read the upload file from a trusted source (the workhorse JWT token) and build a `UploadedFile` object out of it. Thus, in the Grape endpoint, we can simply read the param directly and validate that it's an `UploadedFile`.
-
- Apr 06, 2020
-
-
Heinrich Lee Yu authored
This enables support for proxying ActionCable connections
-