Bhagavan Das
4bc7d98d65
Remove hardcoded refernce to gitlab-shell home. so that gitlab can be installed on any unix account other than git
2013-02-14 23:10:18 +00:00
Dmitriy Zaporozhets
c9ca15e8d6
require missing lib
2013-02-14 15:25:55 +02:00
Dmitriy Zaporozhets
49cf9badbc
Gitlab::ShellEnv added
2013-02-14 15:17:43 +02:00
Dmitriy Zaporozhets
b698094d4d
Update post-receive worker to use correct identifier
2013-02-14 14:00:02 +02:00
Dmitriy Zaporozhets
2a1fac9e4f
add import repo gitlab_shell call
2013-02-11 19:41:02 +02:00
Dmitriy Zaporozhets
d64090b8a9
No gitolite in project any more
2013-02-11 19:16:59 +02:00
Dmitriy Zaporozhets
39e37677f2
add remove keys from gitlab-shell by id
2013-02-05 11:12:15 +02:00
Dmitriy Zaporozhets
081c272b85
Remove outdated specs and fixed key remove
2013-02-05 10:15:49 +02:00
Dmitriy Zaporozhets
27d9ac0fe8
Make gitlab works with gitlab-shell
2013-02-04 15:07:56 +02:00
Dmitriy Zaporozhets
6b9a609044
preparing for gitlab-shell
2013-02-04 14:28:10 +02:00
Dmitriy Zaporozhets
299a9a1040
keys to gitolite via sidekiq now
2013-01-28 21:02:10 +02:00
Dmitriy Zaporozhets
8b54b7233e
Async perform for add/remove team members
2013-01-28 17:39:02 +02:00
Dmitriy Zaporozhets
1c5876eb7b
Do gitolite calls async. Remove satellite with project remove
2013-01-28 17:22:45 +02:00
Dmitriy Zaporozhets
2812e6f1f5
Fix removeing project if repo not exists
2013-01-25 13:47:54 +02:00
Dmitriy Zaporozhets
d770714578
Use subproccess instead subshell for git calls
2013-01-22 10:35:58 +02:00
Dmitriy Zaporozhets
cb96cc030a
Uncomment forgotten code
2013-01-19 13:57:50 +02:00
Dmitriy Zaporozhets
54a24608a2
Remove chdir inside runtime. Improved gitolite shell commands
2013-01-19 13:56:55 +02:00
Dmitriy Zaporozhets
569a88a456
raise exception if gitolite is broken
2013-01-19 11:58:36 +02:00
Dmitriy Zaporozhets
5c3fdfaacb
Fixed developer push to protected branch. Closes #2647
2013-01-19 11:11:25 +02:00
Jeremy Slater
80b8921a9a
Public HTTP clones and remove auth request for public projects
2013-01-14 09:46:55 -05:00
Dmitriy Zaporozhets
4c6224aad1
Public git read-only access via http
2013-01-13 17:25:18 +02:00
Dmitriy Zaporozhets
dccd8b6eaa
Continue refactoring. Use repostory and team
2013-01-04 08:43:25 +02:00
Chris Frohoff
21e55ca318
added RAILS_RELATIVE_URL_ROOT support
2012-12-28 18:11:28 +00:00
Riyad Preukschas
19eb637419
Update uses of Gitolite.config.foo settings
2012-12-20 16:54:28 +01:00
Jeremy Slater
6cf5d7c96d
Support read-only access for git over HTTP
2012-12-11 15:28:40 -05:00
Dmitriy Zaporozhets
039996bd0a
Fix invalid method call for gitolite
2012-11-27 16:35:00 +02:00
Dmitriy Zaporozhets
f5551efdfd
Rewrite and improve git backend logic. Fix project movind. Raise exception to prevent unexpected issues
2012-11-27 09:31:15 +03:00
Dmitriy Zaporozhets
70bf7f6e19
Project -> update repo only on create and destroy. Fixtures Updated with namespaces. Fixed moving repo
2012-11-21 08:54:05 +03:00
Dmitriy Zaporozhets
585eb70588
Fix http push with namespaces. Allow use of username as login
2012-11-26 11:23:08 +02:00
Dmitriy Zaporozhets
04b51a2b89
Improve activate_namespace task to build missing dirs and moving repos correctly
2012-11-25 18:24:27 +02:00
Dmitriy Zaporozhets
a4d1bc1791
Use namespace in gitolite config
2012-11-22 22:51:26 +03:00
David Barri
93f0a8c9b3
Merge remote-tracking branch 'gitlabhq/master' into git_commit_fix
...
Conflicts:
doc/install/installation.md
2012-11-11 21:27:55 +11:00
David Barri
944d3823c3
Fix for git commit when nothing to commit.
...
Turns out git commit returns with 128 when user.name config not present.
2012-11-09 08:32:00 +11:00
David Barri
6f25967c47
Fixed issue with git commit silently failing.
...
Also updated status task and installation instuctions.
2012-11-08 10:47:11 +11:00
Valeriy Sizov
0d4568db78
gitolite custom config
2012-11-07 00:47:33 +02:00
Markus Grobelin
bd50a9f466
grack: allow repositories to have dots in name, e.g. serverconfigs-example.com.git
2012-10-26 14:05:57 +02:00
Dmitriy Zaporozhets
893ce9ae24
Fix git over HTTP
2012-10-22 18:45:42 +03:00
randx
0189ee97ed
Security for online editor. Replace dev_access?, master_access? with can? method usage
2012-10-21 12:12:14 +03:00
Saito
83626d05cd
add shared repository support
2012-10-17 15:43:44 +08:00
Dmitriy Zaporozhets
2985697af7
Real fix for removing keys. Closes PR #1616
2012-10-03 15:56:41 +03:00
Vincent Bonmalais
1fe45898d7
Fix deletion of tmp/gitlabhq-gitolite* folders in a NFS environment.
...
When working inside of a Vagrant box with NFS enabled, the deletion of a
repository in tmp/ doesn't work every time.
It is related to NFS inability to delete a folder if it's still used by
a resource (e.g. `rm -rf ./folder` would leave the folder and a .nfs*
file in it). In this case it's the temporary repository which can't
be deleted because `ga_repo` is still using it.
De-allocating ga_repo is not possible (thanks Ruby), but deleting the
folder it points to in the first place fixes the issue.
Reference:
http://stackoverflow.com/questions/11228079/python-remove-directory-error-file-exists
2012-09-28 16:53:02 +10:00
Robert Speicher
afc4a75499
Use Rails.root.join where appropriate
2012-09-26 16:32:26 -04:00
Saito
aaa916f15c
use high level api and compatibility with Passenger
2012-09-17 18:36:23 +08:00
randx
0523b4265b
Application logger
2012-09-11 23:24:53 +03:00
Cyril
e7f483f9f4
fix typo
2012-09-10 10:50:07 +02:00
randx
a56cec1132
specify gitolite-admin owner in config
2012-08-29 02:08:39 +03:00
Dae Myung
8559d9a156
sending argument project but there is no project to send
2012-09-08 04:24:38 -07:00
randx
e8f39a0a61
gitolite -> more exceptions
2012-09-07 20:43:51 +03:00
Dmitriy Zaporozhets
963746f978
Refactor gitolite_config
2012-09-07 09:15:30 +03:00
randx
b994a65fc3
change gitolite backend behaviour to prevent error when config directory removed
2012-09-07 15:36:40 +03:00