1_settings.rb 30.7 KB
Newer Older
Kamil Trzciński's avatar
Kamil Trzciński committed
1
require_relative '../settings'
2
require_relative '../object_store_settings'
3 4 5

# Default settings
Settings['ldap'] ||= Settingslogic.new({})
6
Settings.ldap['enabled'] = false if Settings.ldap['enabled'].nil?
7
Settings.ldap['sync_time'] = 3600 if Settings.ldap['sync_time'].nil?
8
Settings.ldap['schedule_sync_daily'] = 1 if Settings.ldap['schedule_sync_daily'].nil?
9
Settings.ldap['schedule_sync_hour'] = 1 if Settings.ldap['schedule_sync_hour'].nil?
10
Settings.ldap['schedule_sync_minute'] = 30 if Settings.ldap['schedule_sync_minute'].nil?
11

12 13 14
# backwards compatibility, we only have one host
if Settings.ldap['enabled'] || Rails.env.test?
  if Settings.ldap['host'].present?
15 16
    # We detected old LDAP configuration syntax. Update the config to make it
    # look like it was entered with the new syntax.
17
    server = Settings.ldap.except('sync_time')
18
    Settings.ldap['servers'] = {
19
      'main' => server
20
    }
21 22
  end

23
  Settings.ldap['servers'].each do |key, server|
24
    server = Settingslogic.new(server)
25

26
    server['label'] ||= 'LDAP'
27
    server['timeout'] ||= 10.seconds
28
    server['block_auto_created_users'] = false if server['block_auto_created_users'].nil?
29
    server['allow_username_or_email_login'] = false if server['allow_username_or_email_login'].nil?
30
    server['smartcard_auth'] = false unless %w[optional required].include?(server['smartcard_auth'])
31
    server['active_directory'] = true if server['active_directory'].nil?
32
    server['attributes'] = {} if server['attributes'].nil?
Francisco Javier López's avatar
Francisco Javier López committed
33
    server['lowercase_usernames'] = false if server['lowercase_usernames'].nil?
34
    server['provider_name'] ||= "ldap#{key}".downcase
35
    server['provider_class'] = OmniAuth::Utils.camelize(server['provider_name'])
36
    server['external_groups'] = [] if server['external_groups'].nil?
37
    server['sync_ssh_keys'] = 'sshPublicKey' if server['sync_ssh_keys'].to_s == 'true'
38 39 40 41 42

    # For backwards compatibility
    server['encryption'] ||= server['method']
    server['encryption'] = 'simple_tls' if server['encryption'] == 'ssl'
    server['encryption'] = 'start_tls' if server['encryption'] == 'tls'
Michael Kozono's avatar
Michael Kozono committed
43

44 45 46 47 48
    # Certificate verification was added in 9.4.2, and defaulted to false for
    # backwards-compatibility.
    #
    # Since GitLab 10.0, verify_certificates defaults to true for security.
    server['verify_certificates'] = true if server['verify_certificates'].nil?
49

50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67
    # Expose ability to set `tls_options` directly. Deprecate `ca_file` and
    # `ssl_version` in favor of `tls_options` hash option.
    server['tls_options'] ||= {}

    if server['ssl_version'] || server['ca_file']
      Rails.logger.warn 'DEPRECATED: LDAP options `ssl_version` and `ca_file` should be nested within `tls_options`'
    end

    if server['ssl_version']
      server['tls_options']['ssl_version'] ||= server['ssl_version']
      server.delete('ssl_version')
    end

    if server['ca_file']
      server['tls_options']['ca_file'] ||= server['ca_file']
      server.delete('ca_file')
    end

68
    Settings.ldap['servers'][key] = server
69 70
  end
end
71

72 73
Settings['smartcard'] ||= Settingslogic.new({})
Settings.smartcard['enabled'] = false if Settings.smartcard['enabled'].nil?
74
Settings.smartcard['client_certificate_required_port'] = 3444 if Settings.smartcard['client_certificate_required_port'].nil?
75

76
Settings['omniauth'] ||= Settingslogic.new({})
Nick Thomas's avatar
Nick Thomas committed
77
Settings.omniauth['enabled'] = true if Settings.omniauth['enabled'].nil?
78
Settings.omniauth['auto_sign_in_with_provider'] = false if Settings.omniauth['auto_sign_in_with_provider'].nil?
79
Settings.omniauth['allow_single_sign_on'] = false if Settings.omniauth['allow_single_sign_on'].nil?
80
Settings.omniauth['external_providers'] = [] if Settings.omniauth['external_providers'].nil?
81 82
Settings.omniauth['block_auto_created_users'] = true if Settings.omniauth['block_auto_created_users'].nil?
Settings.omniauth['auto_link_ldap_user'] = false if Settings.omniauth['auto_link_ldap_user'].nil?
83
Settings.omniauth['auto_link_saml_user'] = false if Settings.omniauth['auto_link_saml_user'].nil?
84 85 86 87 88 89 90 91 92 93 94 95 96 97

Settings.omniauth['sync_profile_from_provider'] = false if Settings.omniauth['sync_profile_from_provider'].nil?
Settings.omniauth['sync_profile_attributes'] = ['email'] if Settings.omniauth['sync_profile_attributes'].nil?

# Handle backwards compatibility with merge request 11268
if Settings.omniauth['sync_email_from_provider']
  if Settings.omniauth['sync_profile_from_provider'].is_a?(Array)
    Settings.omniauth['sync_profile_from_provider'] |= [Settings.omniauth['sync_email_from_provider']]
  elsif !Settings.omniauth['sync_profile_from_provider']
    Settings.omniauth['sync_profile_from_provider'] = [Settings.omniauth['sync_email_from_provider']]
  end

  Settings.omniauth['sync_profile_attributes'] |= ['email'] unless Settings.omniauth['sync_profile_attributes'] == true
end
98

99
Settings.omniauth['providers'] ||= []
tduehr's avatar
tduehr committed
100 101 102 103
Settings.omniauth['cas3'] ||= Settingslogic.new({})
Settings.omniauth.cas3['session_duration'] ||= 8.hours
Settings.omniauth['session_tickets'] ||= Settingslogic.new({})
Settings.omniauth.session_tickets['cas3'] = 'ticket'
104

105
# Fill out omniauth-gitlab settings. It is needed for easy set up GHE or GH by just specifying url.
106 107

github_default_url = "https://github.com"
108
github_settings = Settings.omniauth['providers'].find { |provider| provider["name"] == "github" }
109

Valery Sizov's avatar
Valery Sizov committed
110
if github_settings
111 112 113 114 115 116
  # For compatibility with old config files (before 7.8)
  # where people dont have url in github settings
  if github_settings['url'].blank?
    github_settings['url'] = github_default_url
  end

117 118
  github_settings["args"] ||= Settingslogic.new({})

Douwe Maan's avatar
Douwe Maan committed
119 120 121 122 123 124 125 126 127 128
  github_settings["args"]["client_options"] =
    if github_settings["url"].include?(github_default_url)
      OmniAuth::Strategies::GitHub.default_options[:client_options]
    else
      {
        "site"          => File.join(github_settings["url"], "api/v3"),
        "authorize_url" => File.join(github_settings["url"], "login/oauth/authorize"),
        "token_url"     => File.join(github_settings["url"], "login/oauth/access_token")
      }
    end
129 130
end

131
Settings['shared'] ||= Settingslogic.new({})
132
Settings.shared['path'] = Settings.absolute(Settings.shared['path'] || "shared")
133

134
Settings['issues_tracker'] ||= {}
135

136 137 138
#
# GitLab
#
139
Settings['gitlab'] ||= Settingslogic.new({})
140
Settings.gitlab['default_project_creation'] ||= ::EE::Gitlab::Access::DEVELOPER_MAINTAINER_PROJECT_ACCESS
141
Settings.gitlab['default_projects_limit'] ||= 100000
142
Settings.gitlab['default_branch_protection'] ||= 2
143
Settings.gitlab['default_can_create_group'] = true if Settings.gitlab['default_can_create_group'].nil?
144
Settings.gitlab['default_theme'] = Gitlab::Themes::APPLICATION_DEFAULT if Settings.gitlab['default_theme'].nil?
145
Settings.gitlab['host']       ||= ENV['GITLAB_HOST'] || 'localhost'
146
Settings.gitlab['ssh_host']   ||= Settings.gitlab.host
147
Settings.gitlab['https']        = false if Settings.gitlab['https'].nil?
148
Settings.gitlab['port']       ||= ENV['GITLAB_PORT'] || (Settings.gitlab.https ? 443 : 80)
149
Settings.gitlab['relative_url_root'] ||= ENV['RAILS_RELATIVE_URL_ROOT'] || ''
150
Settings.gitlab['protocol'] ||= Settings.gitlab.https ? "https" : "http"
151
Settings.gitlab['email_enabled'] ||= true if Settings.gitlab['email_enabled'].nil?
152 153 154
Settings.gitlab['email_from'] ||= ENV['GITLAB_EMAIL_FROM'] || "gitlab@#{Settings.gitlab.host}"
Settings.gitlab['email_display_name'] ||= ENV['GITLAB_EMAIL_DISPLAY_NAME'] || 'GitLab'
Settings.gitlab['email_reply_to'] ||= ENV['GITLAB_EMAIL_REPLY_TO'] || "noreply@#{Settings.gitlab.host}"
155
Settings.gitlab['email_subject_suffix'] ||= ENV['GITLAB_EMAIL_SUBJECT_SUFFIX'] || ""
156 157
Settings.gitlab['base_url']   ||= Settings.__send__(:build_base_gitlab_url)
Settings.gitlab['url']        ||= Settings.__send__(:build_gitlab_url)
158
Settings.gitlab['user']       ||= 'git'
159 160 161 162 163
Settings.gitlab['user_home']  ||= begin
  Etc.getpwnam(Settings.gitlab['user']).dir
rescue ArgumentError # no user configured
  '/home/' + Settings.gitlab['user']
end
164
Settings.gitlab['time_zone'] ||= nil
Dmitriy Zaporozhets's avatar
Dmitriy Zaporozhets committed
165
Settings.gitlab['signup_enabled'] ||= true if Settings.gitlab['signup_enabled'].nil?
166
Settings.gitlab['signin_enabled'] ||= true if Settings.gitlab['signin_enabled'].nil?
167
Settings.gitlab['restricted_visibility_levels'] = Settings.__send__(:verify_constant_array, Gitlab::VisibilityLevel, Settings.gitlab['restricted_visibility_levels'], [])
168
Settings.gitlab['username_changing_enabled'] = true if Settings.gitlab['username_changing_enabled'].nil?
169
Settings.gitlab['issue_closing_pattern'] = '\b((?:[Cc]los(?:e[sd]?|ing)|\b[Ff]ix(?:e[sd]|ing)?|\b[Rr]esolv(?:e[sd]?|ing)|\b[Ii]mplement(?:s|ed|ing)?)(:?) +(?:(?:issues? +)?%{issue_ref}(?:(?: *,? +and +| *,? *)?)|([A-Z][A-Z0-9_]+-\d+))+)' if Settings.gitlab['issue_closing_pattern'].nil?
170
Settings.gitlab['default_projects_features'] ||= {}
171
Settings.gitlab['webhook_timeout'] ||= 10
172
Settings.gitlab['max_attachment_size'] ||= 10
173
Settings.gitlab['session_expire_delay'] ||= 10080
174
Settings.gitlab['unauthenticated_session_expire_delay'] ||= 2.hours.to_i
175
Settings.gitlab['mirror_max_delay'] ||= 300
176 177
Settings.gitlab['mirror_max_capacity'] ||= 30
Settings.gitlab['mirror_capacity_threshold'] ||= 15
178 179 180
Settings.gitlab.default_projects_features['issues']             = true if Settings.gitlab.default_projects_features['issues'].nil?
Settings.gitlab.default_projects_features['merge_requests']     = true if Settings.gitlab.default_projects_features['merge_requests'].nil?
Settings.gitlab.default_projects_features['wiki']               = true if Settings.gitlab.default_projects_features['wiki'].nil?
181
Settings.gitlab.default_projects_features['snippets']           = true if Settings.gitlab.default_projects_features['snippets'].nil?
182 183
Settings.gitlab.default_projects_features['builds']             = true if Settings.gitlab.default_projects_features['builds'].nil?
Settings.gitlab.default_projects_features['container_registry'] = true if Settings.gitlab.default_projects_features['container_registry'].nil?
184
Settings.gitlab.default_projects_features['visibility_level']   = Settings.__send__(:verify_constant, Gitlab::VisibilityLevel, Settings.gitlab.default_projects_features['visibility_level'], Gitlab::VisibilityLevel::PRIVATE)
185
Settings.gitlab['domain_whitelist'] ||= []
186
Settings.gitlab['import_sources'] ||= Gitlab::ImportSources.values
187
Settings.gitlab['trusted_proxies'] ||= []
188
Settings.gitlab['no_todos_messages'] ||= YAML.load_file(Rails.root.join('config', 'no_todos_messages.yml'))
189
Settings.gitlab['impersonation_enabled'] ||= true if Settings.gitlab['impersonation_enabled'].nil?
190
Settings.gitlab['usage_ping_enabled'] = true if Settings.gitlab['usage_ping_enabled'].nil?
191

192 193 194 195 196
#
# Elasticseacrh
#
Settings['elasticsearch'] ||= Settingslogic.new({})
Settings.elasticsearch['enabled'] = false if Settings.elasticsearch['enabled'].nil?
197
Settings.elasticsearch['url'] = ENV['ELASTIC_URL'] || "http://localhost:9200"
198

Valery Sizov's avatar
Valery Sizov committed
199 200 201 202
#
# CI
#
Settings['gitlab_ci'] ||= Settingslogic.new({})
203 204 205
Settings.gitlab_ci['shared_runners_enabled'] = true if Settings.gitlab_ci['shared_runners_enabled'].nil?
Settings.gitlab_ci['all_broken_builds']     = true if Settings.gitlab_ci['all_broken_builds'].nil?
Settings.gitlab_ci['add_pusher']            = false if Settings.gitlab_ci['add_pusher'].nil?
206
Settings.gitlab_ci['builds_path']           = Settings.absolute(Settings.gitlab_ci['builds_path'] || "builds/")
207
Settings.gitlab_ci['url']                 ||= Settings.__send__(:build_gitlab_ci_url)
Valery Sizov's avatar
Valery Sizov committed
208

Douwe Maan's avatar
Douwe Maan committed
209 210 211
#
# Reply by email
#
212
Settings['incoming_email'] ||= Settingslogic.new({})
213
Settings.incoming_email['enabled'] = false if Settings.incoming_email['enabled'].nil?
214

215 216 217 218 219 220
#
# Build Artifacts
#
Settings['artifacts'] ||= Settingslogic.new({})
Settings.artifacts['enabled']      = true if Settings.artifacts['enabled'].nil?
Settings.artifacts['storage_path'] = Settings.absolute(Settings.artifacts.values_at('path', 'storage_path').compact.first || File.join(Settings.shared['path'], "artifacts"))
221
# Settings.artifact['path'] is deprecated, use `storage_path` instead
222 223
Settings.artifacts['path']         = Settings.artifacts['storage_path']
Settings.artifacts['max_size'] ||= 100 # in megabytes
224
Settings.artifacts['object_store'] = ObjectStoreSettings.parse(Settings.artifacts['object_store'])
Kamil Trzcinski's avatar
Kamil Trzcinski committed
225

226 227 228 229
#
# Registry
#
Settings['registry'] ||= Settingslogic.new({})
230 231
Settings.registry['enabled']       ||= false
Settings.registry['host']          ||= "example.com"
232
Settings.registry['port']          ||= nil
233 234 235
Settings.registry['api_url']       ||= "http://localhost:5000/"
Settings.registry['key']           ||= nil
Settings.registry['issuer']        ||= nil
Kamil Trzcinski's avatar
Kamil Trzcinski committed
236
Settings.registry['host_port']     ||= [Settings.registry['host'], Settings.registry['port']].compact.join(':')
237
Settings.registry['path']            = Settings.absolute(Settings.registry['path'] || File.join(Settings.shared['path'], 'registry'))
Kamil Trzcinski's avatar
Kamil Trzcinski committed
238

239
#
Kamil Trzcinski's avatar
Kamil Trzcinski committed
240
# Pages
241
#
Kamil Trzcinski's avatar
Kamil Trzcinski committed
242
Settings['pages'] ||= Settingslogic.new({})
243
Settings.pages['enabled']           = false if Settings.pages['enabled'].nil?
244
Settings.pages['access_control']    = false if Settings.pages['access_control'].nil?
245 246 247 248 249 250 251 252
Settings.pages['path']              = Settings.absolute(Settings.pages['path'] || File.join(Settings.shared['path'], "pages"))
Settings.pages['https']             = false if Settings.pages['https'].nil?
Settings.pages['host']              ||= "example.com"
Settings.pages['port']              ||= Settings.pages.https ? 443 : 80
Settings.pages['protocol']          ||= Settings.pages.https ? "https" : "http"
Settings.pages['url']               ||= Settings.__send__(:build_pages_url)
Settings.pages['external_http']     ||= false unless Settings.pages['external_http'].present?
Settings.pages['external_https']    ||= false unless Settings.pages['external_https'].present?
253
Settings.pages['artifacts_server']  ||= Settings.pages['enabled'] if Settings.pages['artifacts_server'].nil?
Kamil Trzcinski's avatar
Kamil Trzcinski committed
254

255 256 257
Settings.pages['admin'] ||= Settingslogic.new({})
Settings.pages.admin['certificate'] ||= ''

258 259 260 261 262
#
# Geo
#
Settings.gitlab['geo_status_timeout'] ||= 10

263 264 265 266 267 268 269 270
#
# External merge request diffs
#
Settings['external_diffs'] ||= Settingslogic.new({})
Settings.external_diffs['enabled']      = false if Settings.external_diffs['enabled'].nil?
Settings.external_diffs['storage_path'] = Settings.absolute(Settings.external_diffs['storage_path'] || File.join(Settings.shared['path'], 'external-diffs'))
Settings.external_diffs['object_store'] = ObjectStoreSettings.parse(Settings.external_diffs['object_store'])

Marin Jankovski's avatar
Marin Jankovski committed
271 272 273 274
#
# Git LFS
#
Settings['lfs'] ||= Settingslogic.new({})
Marin Jankovski's avatar
Marin Jankovski committed
275
Settings.lfs['enabled']      = true if Settings.lfs['enabled'].nil?
276
Settings.lfs['storage_path'] = Settings.absolute(Settings.lfs['storage_path'] || File.join(Settings.shared['path'], "lfs-objects"))
277
Settings.lfs['object_store'] = ObjectStoreSettings.parse(Settings.lfs['object_store'])
Marin Jankovski's avatar
Marin Jankovski committed
278

Micaël Bergeron's avatar
Micaël Bergeron committed
279 280 281 282 283 284
#
# Uploads
#
Settings['uploads'] ||= Settingslogic.new({})
Settings.uploads['storage_path'] = Settings.absolute(Settings.uploads['storage_path'] || 'public')
Settings.uploads['base_dir'] = Settings.uploads['base_dir'] || 'uploads/-/system'
285
Settings.uploads['object_store'] = ObjectStoreSettings.parse(Settings.uploads['object_store'])
286
Settings.uploads['object_store']['remote_directory'] ||= 'uploads'
287

288 289 290 291 292 293
#
# Packages
#
Settings['packages'] ||= Settingslogic.new({})
Settings.packages['enabled']      = true if Settings.packages['enabled'].nil?
Settings.packages['storage_path'] = Settings.absolute(Settings.packages['storage_path'] || File.join(Settings.shared['path'], "packages"))
294
Settings.packages['object_store'] = ObjectStoreSettings.parse(Settings.packages['object_store'])
295

296 297 298 299
#
# Mattermost
#
Settings['mattermost'] ||= Settingslogic.new({})
Kamil Trzcinski's avatar
Kamil Trzcinski committed
300 301
Settings.mattermost['enabled'] = false if Settings.mattermost['enabled'].nil?
Settings.mattermost['host'] = nil unless Settings.mattermost.enabled
302

303 304 305
#
# Gravatar
#
306
Settings['gravatar'] ||= Settingslogic.new({})
307
Settings.gravatar['enabled']      = true if Settings.gravatar['enabled'].nil?
308
Settings.gravatar['plain_url']  ||= 'https://www.gravatar.com/avatar/%{hash}?s=%{size}&d=identicon'
309
Settings.gravatar['ssl_url']    ||= 'https://secure.gravatar.com/avatar/%{hash}?s=%{size}&d=identicon'
310
Settings.gravatar['host']         = Settings.host_without_www(Settings.gravatar['plain_url'])
311

312 313 314 315
#
# Cron Jobs
#
Settings['cron_jobs'] ||= Settingslogic.new({})
316 317 318
Settings.cron_jobs['stuck_ci_jobs_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['stuck_ci_jobs_worker']['cron'] ||= '0 * * * *'
Settings.cron_jobs['stuck_ci_jobs_worker']['job_class'] = 'StuckCiJobsWorker'
319
Settings.cron_jobs['pipeline_schedule_worker'] ||= Settingslogic.new({})
320
Settings.cron_jobs['pipeline_schedule_worker']['cron'] ||= '19 * * * *'
321
Settings.cron_jobs['pipeline_schedule_worker']['job_class'] = 'PipelineScheduleWorker'
322
Settings.cron_jobs['expire_build_artifacts_worker'] ||= Settingslogic.new({})
323
Settings.cron_jobs['expire_build_artifacts_worker']['cron'] ||= '50 * * * *'
324
Settings.cron_jobs['expire_build_artifacts_worker']['job_class'] = 'ExpireBuildArtifactsWorker'
325 326
Settings.cron_jobs['repository_check_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['repository_check_worker']['cron'] ||= '20 * * * *'
327
Settings.cron_jobs['repository_check_worker']['job_class'] = 'RepositoryCheck::DispatchWorker'
Jacob Vosmaer's avatar
Jacob Vosmaer committed
328
Settings.cron_jobs['admin_email_worker'] ||= Settingslogic.new({})
329
Settings.cron_jobs['admin_email_worker']['cron'] ||= '0 0 * * 0'
Jacob Vosmaer's avatar
Jacob Vosmaer committed
330
Settings.cron_jobs['admin_email_worker']['job_class'] = 'AdminEmailWorker'
331 332 333
Settings.cron_jobs['repository_archive_cache_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['repository_archive_cache_worker']['cron'] ||= '0 * * * *'
Settings.cron_jobs['repository_archive_cache_worker']['job_class'] = 'RepositoryArchiveCacheWorker'
334 335
Settings.cron_jobs['historical_data_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['historical_data_worker']['cron'] ||= '0 12 * * *'
336
Settings.cron_jobs['historical_data_worker']['job_class'] = 'HistoricalDataWorker'
337 338
Settings.cron_jobs['ldap_sync_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['ldap_sync_worker']['cron'] ||= '30 1 * * *'
339
Settings.cron_jobs['ldap_sync_worker']['job_class'] = 'LdapSyncWorker'
340 341
Settings.cron_jobs['ldap_group_sync_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['ldap_group_sync_worker']['cron'] ||= '0 * * * *'
342
Settings.cron_jobs['ldap_group_sync_worker']['job_class'] = 'LdapAllGroupsSyncWorker'
343 344 345
Settings.cron_jobs['geo_metrics_update_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['geo_metrics_update_worker']['cron'] ||= '*/1 * * * *'
Settings.cron_jobs['geo_metrics_update_worker']['job_class'] ||= 'Geo::MetricsUpdateWorker'
346
Settings.cron_jobs['geo_repository_sync_worker'] ||= Settingslogic.new({})
347
Settings.cron_jobs['geo_repository_sync_worker']['cron'] ||= '*/1 * * * *'
348
Settings.cron_jobs['geo_repository_sync_worker']['job_class'] ||= 'Geo::RepositorySyncWorker'
349
Settings.cron_jobs['geo_file_download_dispatch_worker'] ||= Settingslogic.new({})
350
Settings.cron_jobs['geo_file_download_dispatch_worker']['cron'] ||= '*/1 * * * *'
351
Settings.cron_jobs['geo_file_download_dispatch_worker']['job_class'] ||= 'Geo::FileDownloadDispatchWorker'
352
Settings.cron_jobs['geo_prune_event_log_worker'] ||= Settingslogic.new({})
353
Settings.cron_jobs['geo_prune_event_log_worker']['cron'] ||= '*/5 * * * *'
354
Settings.cron_jobs['geo_prune_event_log_worker']['job_class'] ||= 'Geo::PruneEventLogWorker'
355 356 357
Settings.cron_jobs['geo_repository_verification_primary_batch_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['geo_repository_verification_primary_batch_worker']['cron'] ||= '*/1 * * * *'
Settings.cron_jobs['geo_repository_verification_primary_batch_worker']['job_class'] ||= 'Geo::RepositoryVerification::Primary::BatchWorker'
358 359 360
Settings.cron_jobs['geo_repository_verification_secondary_scheduler_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['geo_repository_verification_secondary_scheduler_worker']['cron'] ||= '*/1 * * * *'
Settings.cron_jobs['geo_repository_verification_secondary_scheduler_worker']['job_class'] ||= 'Geo::RepositoryVerification::Secondary::SchedulerWorker'
361 362 363
Settings.cron_jobs['geo_migrated_local_files_clean_up_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['geo_migrated_local_files_clean_up_worker']['cron'] ||= '15 */6 * * *'
Settings.cron_jobs['geo_migrated_local_files_clean_up_worker']['job_class'] ||= 'Geo::MigratedLocalFilesCleanUpWorker'
364 365 366
Settings.cron_jobs['import_export_project_cleanup_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['import_export_project_cleanup_worker']['cron'] ||= '0 * * * *'
Settings.cron_jobs['import_export_project_cleanup_worker']['job_class'] = 'ImportExportProjectCleanupWorker'
367 368 369
Settings.cron_jobs['ci_archive_traces_cron_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['ci_archive_traces_cron_worker']['cron'] ||= '17 * * * *'
Settings.cron_jobs['ci_archive_traces_cron_worker']['job_class'] = 'Ci::ArchiveTracesCronWorker'
370 371 372
Settings.cron_jobs['requests_profiles_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['requests_profiles_worker']['cron'] ||= '0 0 * * *'
Settings.cron_jobs['requests_profiles_worker']['job_class'] = 'RequestsProfilesWorker'
373 374 375 376 377 378
Settings.cron_jobs['remove_expired_members_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['remove_expired_members_worker']['cron'] ||= '10 0 * * *'
Settings.cron_jobs['remove_expired_members_worker']['job_class'] = 'RemoveExpiredMembersWorker'
Settings.cron_jobs['remove_expired_group_links_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['remove_expired_group_links_worker']['cron'] ||= '10 0 * * *'
Settings.cron_jobs['remove_expired_group_links_worker']['job_class'] = 'RemoveExpiredGroupLinksWorker'
379
Settings.cron_jobs['prune_old_events_worker'] ||= Settingslogic.new({})
380
Settings.cron_jobs['prune_old_events_worker']['cron'] ||= '0 */6 * * *'
381
Settings.cron_jobs['prune_old_events_worker']['job_class'] = 'PruneOldEventsWorker'
382

383 384 385
Settings.cron_jobs['trending_projects_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['trending_projects_worker']['cron'] = '0 1 * * *'
Settings.cron_jobs['trending_projects_worker']['job_class'] = 'TrendingProjectsWorker'
386 387 388
Settings.cron_jobs['remove_unreferenced_lfs_objects_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['remove_unreferenced_lfs_objects_worker']['cron'] ||= '20 0 * * *'
Settings.cron_jobs['remove_unreferenced_lfs_objects_worker']['job_class'] = 'RemoveUnreferencedLfsObjectsWorker'
389 390 391
Settings.cron_jobs['stuck_import_jobs_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['stuck_import_jobs_worker']['cron'] ||= '15 * * * *'
Settings.cron_jobs['stuck_import_jobs_worker']['job_class'] = 'StuckImportJobsWorker'
392
Settings.cron_jobs['gitlab_usage_ping_worker'] ||= Settingslogic.new({})
393
Settings.cron_jobs['gitlab_usage_ping_worker']['cron'] ||= Settings.__send__(:cron_for_usage_ping)
394
Settings.cron_jobs['gitlab_usage_ping_worker']['job_class'] = 'GitlabUsagePingWorker'
395

Micaël Bergeron's avatar
Micaël Bergeron committed
396 397 398
Settings.cron_jobs['pseudonymizer_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['pseudonymizer_worker']['cron'] ||= '0 23 * * *'
Settings.cron_jobs['pseudonymizer_worker']['job_class'] ||= 'PseudonymizerWorker'
399

400 401 402 403
Settings.cron_jobs['clear_shared_runners_minutes_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['clear_shared_runners_minutes_worker']['cron'] ||= '0 0 1 * *'
Settings.cron_jobs['clear_shared_runners_minutes_worker']['job_class'] = 'ClearSharedRunnersMinutesWorker'

404 405 406 407
Settings.cron_jobs['stuck_merge_jobs_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['stuck_merge_jobs_worker']['cron'] ||= '0 */2 * * *'
Settings.cron_jobs['stuck_merge_jobs_worker']['job_class'] = 'StuckMergeJobsWorker'

408 409 410 411
Settings.cron_jobs['pages_domain_verification_cron_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['pages_domain_verification_cron_worker']['cron'] ||= '*/15 * * * *'
Settings.cron_jobs['pages_domain_verification_cron_worker']['job_class'] = 'PagesDomainVerificationCronWorker'

412 413 414
Settings.cron_jobs['issue_due_scheduler_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['issue_due_scheduler_worker']['cron'] ||= '50 00 * * *'
Settings.cron_jobs['issue_due_scheduler_worker']['job_class'] = 'IssueDueSchedulerWorker'
415

416 417 418 419
Settings.cron_jobs['prune_web_hook_logs_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['prune_web_hook_logs_worker']['cron'] ||= '0 */1 * * *'
Settings.cron_jobs['prune_web_hook_logs_worker']['job_class'] = 'PruneWebHookLogsWorker'

420 421 422 423
Settings.cron_jobs['update_max_seats_used_for_gitlab_com_subscriptions_worker'] ||= Settingslogic.new({})
Settings.cron_jobs['update_max_seats_used_for_gitlab_com_subscriptions_worker']['cron'] ||= '0 12 * * *'
Settings.cron_jobs['update_max_seats_used_for_gitlab_com_subscriptions_worker']['job_class'] = 'UpdateMaxSeatsUsedForGitlabComSubscriptionsWorker'

424 425 426 427 428 429
#
# Sidekiq
#
Settings['sidekiq'] ||= Settingslogic.new({})
Settings['sidekiq']['log_format'] ||= 'default'

430 431 432 433
#
# GitLab Shell
#
Settings['gitlab_shell'] ||= Settingslogic.new({})
434
Settings.gitlab_shell['path']           = Settings.absolute(Settings.gitlab_shell['path'] || Settings.gitlab['user_home'] + '/gitlab-shell/')
435
Settings.gitlab_shell['hooks_path']     = :deprecated_use_gitlab_shell_path_instead
436
Settings.gitlab_shell['authorized_keys_file'] ||= nil
437
Settings.gitlab_shell['secret_file'] ||= Rails.root.join('.gitlab_shell_secret')
438 439
Settings.gitlab_shell['receive_pack']   = true if Settings.gitlab_shell['receive_pack'].nil?
Settings.gitlab_shell['upload_pack']    = true if Settings.gitlab_shell['upload_pack'].nil?
440
Settings.gitlab_shell['ssh_host']     ||= Settings.gitlab.ssh_host
441 442 443
Settings.gitlab_shell['ssh_port']     ||= 22
Settings.gitlab_shell['ssh_user']     ||= Settings.gitlab.user
Settings.gitlab_shell['owner_group']  ||= Settings.gitlab.user
444
Settings.gitlab_shell['ssh_path_prefix'] ||= Settings.__send__(:build_gitlab_shell_ssh_path_prefix)
445
Settings.gitlab_shell['git_timeout'] ||= 10800
446

447 448 449 450 451 452
#
# Workhorse
#
Settings['workhorse'] ||= Settingslogic.new({})
Settings.workhorse['secret_file'] ||= Rails.root.join('.gitlab_workhorse_secret')

453 454 455 456 457
#
# Repositories
#
Settings['repositories'] ||= Settingslogic.new({})
Settings.repositories['storages'] ||= {}
458 459 460 461 462 463 464
unless Settings.repositories.storages['default']
  Settings.repositories.storages['default'] ||= {}
  # We set the path only if the default storage doesn't exist, in case it exists
  # but follows the pre-9.0 configuration structure. `6_validations.rb` initializer
  # will validate all storages and throw a relevant error to the user if necessary.
  Settings.repositories.storages['default']['path'] ||= Settings.gitlab['user_home'] + '/repositories/'
end
465

466
Settings.repositories.storages.each do |key, storage|
467
  Settings.repositories.storages[key] = Gitlab::GitalyClient::StorageSettings.new(storage)
468 469
end

470 471 472 473 474 475 476
#
# The repository_downloads_path is used to remove outdated repository
# archives, if someone has it configured incorrectly, and it points
# to the path where repositories are stored this can cause some
# data-integrity issue. In this case, we sets it to the default
# repository_downloads_path value.
#
477
repositories_storages          = Settings.repositories.storages.values
478
repository_downloads_path      = Settings.gitlab['repository_downloads_path'].to_s.gsub(%r{/$}, '')
479 480
repository_downloads_full_path = File.expand_path(repository_downloads_path, Settings.gitlab['user_home'])

481
# Gitaly migration: https://gitlab.com/gitlab-org/gitaly/issues/1255
482 483 484 485
Gitlab::GitalyClient::StorageSettings.allow_disk_access do
  if repository_downloads_path.blank? || repositories_storages.any? { |rs| [repository_downloads_path, repository_downloads_full_path].include?(rs.legacy_disk_path.gsub(%r{/$}, '')) }
    Settings.gitlab['repository_downloads_path'] = File.join(Settings.shared['path'], 'cache/archive')
  end
486 487
end

488 489 490
#
# Backup
#
491
Settings['backup'] ||= Settingslogic.new({})
492
Settings.backup['keep_time']  ||= 0
493
Settings.backup['pg_schema']    = nil
494
Settings.backup['path']         = Settings.absolute(Settings.backup['path'] || "tmp/backups/")
495
Settings.backup['archive_permissions'] ||= 0600
496
Settings.backup['upload'] ||= Settingslogic.new({ 'remote_directory' => nil, 'connection' => nil })
497
Settings.backup['upload']['multipart_chunk_size'] ||= 104857600
498
Settings.backup['upload']['encryption'] ||= nil
499
Settings.backup['upload']['encryption_key'] ||= ENV['GITLAB_BACKUP_ENCRYPTION_KEY']
500
Settings.backup['upload']['storage_class'] ||= nil
501

502 503 504 505
#
# Pseudonymizer
#
Settings['pseudonymizer'] ||= Settingslogic.new({})
Micaël Bergeron's avatar
Micaël Bergeron committed
506
Settings.pseudonymizer['manifest'] = Settings.absolute(Settings.pseudonymizer['manifest'] || Rails.root.join("config/pseudonymizer.yml"))
507 508 509
Settings.pseudonymizer['upload'] ||= Settingslogic.new({ 'remote_directory' => nil, 'connection' => nil })
# Settings.pseudonymizer['upload']['multipart_chunk_size'] ||= 104857600

510 511 512
#
# Git
#
513
Settings['git'] ||= Settingslogic.new({})
514
Settings.git['bin_path'] ||= '/usr/bin/git'
515

516 517 518
# Important: keep the satellites.path setting until GitLab 9.0 at
# least. This setting is fed to 'rm -rf' in
# db/migrate/20151023144219_remove_satellites.rb
519
Settings['satellites'] ||= Settingslogic.new({})
520
Settings.satellites['path'] = Settings.absolute(Settings.satellites['path'] || "tmp/repo_satellites/")
521

522 523 524 525 526
#
# Kerberos
#
Settings['kerberos'] ||= Settingslogic.new({})
Settings.kerberos['enabled'] = false if Settings.kerberos['enabled'].nil?
Valery Sizov's avatar
Valery Sizov committed
527 528
Settings.kerberos['keytab'] = nil if Settings.kerberos['keytab'].blank? # nil means use default keytab
Settings.kerberos['service_principal_name'] = nil if Settings.kerberos['service_principal_name'].blank? # nil means any SPN in keytab
529
Settings.kerberos['use_dedicated_port'] = false if Settings.kerberos['use_dedicated_port'].nil?
530 531 532
Settings.kerberos['https'] = Settings.gitlab.https if Settings.kerberos['https'].nil?
Settings.kerberos['port'] ||= Settings.kerberos.https ? 8443 : 8088

533 534 535 536
if Settings.kerberos['enabled'] && !Settings.omniauth.providers.map(&:name).include?('kerberos_spnego')
  Settings.omniauth.providers << Settingslogic.new({ 'name' => 'kerberos_spnego' })
end

537 538 539 540
#
# Extra customization
#
Settings['extra'] ||= Settingslogic.new({})
541

542 543 544 545 546
#
# Rack::Attack settings
#
Settings['rack_attack'] ||= Settingslogic.new({})
Settings.rack_attack['git_basic_auth'] ||= Settingslogic.new({})
547
Settings.rack_attack.git_basic_auth['enabled'] = false if Settings.rack_attack.git_basic_auth['enabled'].nil?
548
Settings.rack_attack.git_basic_auth['ip_whitelist'] ||= %w{127.0.0.1}
549 550 551 552
Settings.rack_attack.git_basic_auth['maxretry'] ||= 10
Settings.rack_attack.git_basic_auth['findtime'] ||= 1.minute
Settings.rack_attack.git_basic_auth['bantime'] ||= 1.hour

553 554 555 556 557
#
# Gitaly
#
Settings['gitaly'] ||= Settingslogic.new({})

558 559 560 561 562 563 564 565 566
#
# Webpack settings
#
Settings['webpack'] ||= Settingslogic.new({})
Settings.webpack['dev_server'] ||= Settingslogic.new({})
Settings.webpack.dev_server['enabled'] ||= false
Settings.webpack.dev_server['host']    ||= 'localhost'
Settings.webpack.dev_server['port']    ||= 3808

567
#
568
# Monitoring settings
569
#
570
Settings['monitoring'] ||= Settingslogic.new({})
571
Settings.monitoring['ip_whitelist'] ||= ['127.0.0.1/8']
572
Settings.monitoring['unicorn_sampler_interval'] ||= 10
573
Settings.monitoring['ruby_sampler_interval'] ||= 60
574 575 576 577
Settings.monitoring['sidekiq_exporter'] ||= Settingslogic.new({})
Settings.monitoring.sidekiq_exporter['enabled'] ||= false
Settings.monitoring.sidekiq_exporter['address'] ||= 'localhost'
Settings.monitoring.sidekiq_exporter['port'] ||= 3807
578

579 580 581 582 583
#
# Testing settings
#
if Rails.env.test?
  Settings.gitlab['default_projects_limit']   = 42
584
  Settings.gitlab['default_can_create_group'] = true
585 586
  Settings.gitlab['default_can_create_team']  = false
end