- 06 Jan, 2022 13 commits
-
-
Dylan Griffith authored
We will remove the foreign key in a later MR but for now we can start with adding the LFK. These have all been determined as safe to be converted to a loose foreign key in https://gitlab.com/gitlab-org/gitlab/-/issues/348269 .
-
Thong Kuah authored
Do not show participants invisible to the user See merge request gitlab-org/gitlab!77021
-
Marcel Amirault authored
It is called here documents See merge request gitlab-org/gitlab!77599
-
Mitar authored
-
Ezekiel Kigbo authored
Add solution section See merge request gitlab-org/gitlab!77572
-
Ezekiel Kigbo authored
Externalize strings for translation in todos template See merge request gitlab-org/gitlab!77402
-
Martin Wortschack authored
Changelog: fixed
-
Michael Kozono authored
Geo: adapt verification timed out query to use state table See merge request gitlab-org/gitlab!77364
-
Ash McKenzie authored
Fix broken link in default ReadME See merge request gitlab-org/gitlab!77026
-
Patrick Bair authored
Merge branch '341195-reschedule-pending-recalculatevulnerabilitiesoccurrencesuuid-jobs' into 'master' Recalculate UUID for all Vulnerability::Finding records, attempt 2 See merge request gitlab-org/gitlab!75546
-
Michał Zając authored
There are two major reasons for this: 1. We made a mistake in the algorithm when recalculating this for the first time. See: https://gitlab.com/gitlab-org/gitlab/-/merge_requests/67578 2. The algorithm changed yet again to improve the tracking method See: https://gitlab.com/gitlab-org/gitlab/-/issues/322044 Changes: * Update background migration to use signatures * Make previous reschedule a no-op so customers doing major version leaps will not schedule the same job multiple times * Remove ALL jobs from `background_migration_jobs` table. Succeeded jobs should be removed anyway and pending jobs were not finished because we had records for which the recalculation yielded identical UUIDv5. The reason we had such records was due to mistake outlined in point 1. This situation was fixed by https://gitlab.com/gitlab-org/gitlab/-/merge_requests/74008 * Schedule `RecalculateVulnerabilitiesOccurrencesUuid` over entire `vulnerability_occurrences` table so we can leverage our new algorithm and finish the migration path from UUIDv4 to UUIDv5. Changelog: added
-
Marcel Amirault authored
Adding resolution to common error message See merge request gitlab-org/gitlab!77390
-
Justin Bellucci authored
-
- 05 Jan, 2022 27 commits
-
-
Nick Gaskill authored
Add terraform_module to package_type values See merge request gitlab-org/gitlab!77299
-
Viktor Nagy (GitLab) authored
-
Mayra Cabrera authored
Remove `resources :user_callouts` from `config/routes.rb` See merge request gitlab-org/gitlab!77033
-
Doug Stull authored
-
Nick Gaskill authored
Update Package Next Steps after install See merge request gitlab-org/gitlab!77522
-
Kenny Johnston authored
-
Lin Jen-Shin authored
Rate limit update username action See merge request gitlab-org/gitlab!77221
-
Lin Jen-Shin authored
ci: Skip flaky tests automatically and allow to opt-out See merge request gitlab-org/gitlab!77329
-
Amy Qualls authored
Add migrate local data to object storage steps for consolidated form See merge request gitlab-org/gitlab!77468
-
Ben Bodenmiller authored
Fix 347168
-
Russell Dickenson authored
Updated Vale to use latest Readability extension See merge request gitlab-org/gitlab!77531
-
Suzanne Selhorn authored
-
Susan Tacker authored
Updated title to try to clarify that it's about development See merge request gitlab-org/gitlab!77541
-
Douglas Barbosa Alexandre authored
Refactoring FileRegistryRemoval service and specs See merge request gitlab-org/gitlab!77539
-
Valery Sizov authored
It refactors FileRegistryRemoval but mostly we optimized its spec
-
Andrejs Cunskis authored
Match address of host when checking whether to login See merge request gitlab-org/gitlab!73492
-
Ian Baum authored
* Makes sure we are on the login page of the desired host before deciding whether we need to re-login. Currently only checks if we're on the login page. For Geo specs, we need to sign into different hosts Changelog: fixed MR: https://gitlab.com/gitlab-org/gitlab/-/merge_requests/73492 EE: true
-
Jan Provaznik authored
Add createdAt to Runner GraphQL API See merge request gitlab-org/gitlab!77561
-
Douglas Barbosa Alexandre authored
Improve LFS client performance and fix compatibility with Azure DevOps See merge request gitlab-org/gitlab!77326
-
Bob Van Landuyt authored
Make navigation themes translatable See merge request gitlab-org/gitlab!77483
-
Martin Wortschack authored
Changelog: changed
-
Craig Norris authored
Mention that this doc is about the minimum requirements See merge request gitlab-org/gitlab!77596
-
Achilleas Pipinellis authored
Minor content edit
-
Olena Horal-Koretska authored
Updated SBOM Survey Banner Heading See merge request gitlab-org/gitlab!77588
-
Stan Hu authored
The LFS client that is used in repository mirroring had a few shortcomings: 1. Chunked transfers were never used because the Content-Length was always specified. We now only including Content-Length if chunked encodings are not requested. 2. Azure DevOps passes in the username in the upload URL, but this cause HTTParty to serialize this in the Authorization header instead of using the mirror credentials. We now strip the URL of username/passwords if HTTP Basic Auth is used. Relates to https://gitlab.com/gitlab-org/gitlab/-/issues/340482 Changelog: fixed
-
Douglas Barbosa Alexandre authored
Backfill Escalation Statuses for Incident issues See merge request gitlab-org/gitlab!76714
-
Suzanne Selhorn authored
Squash and merge page - CTRT revisions See merge request gitlab-org/gitlab!77452
-