2021-03-11 19:13:27 +05:30
# frozen_string_literal: true
2018-10-15 14:42:47 +05:30
require_relative '../settings'
2018-11-18 11:00:15 +05:30
require_relative '../object_store_settings'
2019-12-04 20:38:33 +05:30
require_relative '../smime_signature_settings'
2014-09-02 18:07:02 +05:30
# Default settings
2021-02-22 17:27:13 +05:30
Settings [ 'shared' ] || = Settingslogic . new ( { } )
Settings . shared [ 'path' ] = Settings . absolute ( Settings . shared [ 'path' ] || " shared " )
Settings [ 'encrypted_settings' ] || = Settingslogic . new ( { } )
Settings . encrypted_settings [ 'path' ] || = File . join ( Settings . shared [ 'path' ] , " encrypted_settings " )
Settings . encrypted_settings [ 'path' ] = Settings . absolute ( Settings . encrypted_settings [ 'path' ] )
2014-09-02 18:07:02 +05:30
Settings [ 'ldap' ] || = Settingslogic . new ( { } )
Settings . ldap [ 'enabled' ] = false if Settings . ldap [ 'enabled' ] . nil?
2021-03-08 18:12:59 +05:30
Settings . ldap [ 'servers' ] || = Settingslogic . new ( { } )
2019-12-26 22:10:19 +05:30
Settings . ldap [ 'prevent_ldap_sign_in' ] = false if Settings . ldap [ 'prevent_ldap_sign_in' ] . blank?
2021-02-22 17:27:13 +05:30
Settings . ldap [ 'secret_file' ] = Settings . absolute ( Settings . ldap [ 'secret_file' ] || File . join ( Settings . encrypted_settings [ 'path' ] , " ldap.yaml.enc " ) )
2015-04-26 12:48:37 +05:30
2019-09-30 21:07:59 +05:30
Gitlab . ee do
Settings . ldap [ 'sync_time' ] = 3600 if Settings . ldap [ 'sync_time' ] . nil?
Settings . ldap [ 'schedule_sync_daily' ] = 1 if Settings . ldap [ 'schedule_sync_daily' ] . nil?
Settings . ldap [ 'schedule_sync_hour' ] = 1 if Settings . ldap [ 'schedule_sync_hour' ] . nil?
Settings . ldap [ 'schedule_sync_minute' ] = 30 if Settings . ldap [ 'schedule_sync_minute' ] . nil?
end
2015-04-26 12:48:37 +05:30
# backwards compatibility, we only have one host
if Settings . ldap [ 'enabled' ] || Rails . env . test?
if Settings . ldap [ 'host' ] . present?
# We detected old LDAP configuration syntax. Update the config to make it
# look like it was entered with the new syntax.
server = Settings . ldap . except ( 'sync_time' )
Settings . ldap [ 'servers' ] = {
'main' = > server
}
end
Settings . ldap [ 'servers' ] . each do | key , server |
2018-03-17 18:26:18 +05:30
server = Settingslogic . new ( server )
2015-04-26 12:48:37 +05:30
server [ 'label' ] || = 'LDAP'
2016-01-14 18:37:52 +05:30
server [ 'timeout' ] || = 10 . seconds
2015-04-26 12:48:37 +05:30
server [ 'block_auto_created_users' ] = false if server [ 'block_auto_created_users' ] . nil?
server [ 'allow_username_or_email_login' ] = false if server [ 'allow_username_or_email_login' ] . nil?
2019-09-30 21:07:59 +05:30
server [ 'smartcard_auth' ] = false unless %w[ optional required ] . include? ( server [ 'smartcard_auth' ] )
2015-04-26 12:48:37 +05:30
server [ 'active_directory' ] = true if server [ 'active_directory' ] . nil?
2015-09-25 12:07:36 +05:30
server [ 'attributes' ] = { } if server [ 'attributes' ] . nil?
2018-03-17 18:26:18 +05:30
server [ 'lowercase_usernames' ] = false if server [ 'lowercase_usernames' ] . nil?
2015-04-26 12:48:37 +05:30
server [ 'provider_name' ] || = " ldap #{ key } " . downcase
server [ 'provider_class' ] = OmniAuth :: Utils . camelize ( server [ 'provider_name' ] )
2019-09-30 21:07:59 +05:30
server [ 'external_groups' ] = [ ] if server [ 'external_groups' ] . nil?
server [ 'sync_ssh_keys' ] = 'sshPublicKey' if server [ 'sync_ssh_keys' ] . to_s == 'true'
2017-09-10 17:25:29 +05:30
# For backwards compatibility
server [ 'encryption' ] || = server [ 'method' ]
server [ 'encryption' ] = 'simple_tls' if server [ 'encryption' ] == 'ssl'
server [ 'encryption' ] = 'start_tls' if server [ 'encryption' ] == 'tls'
2018-03-17 18:26:18 +05:30
# Certificate verification was added in 9.4.2, and defaulted to false for
# backwards-compatibility.
#
# Since GitLab 10.0, verify_certificates defaults to true for security.
server [ 'verify_certificates' ] = true if server [ 'verify_certificates' ] . nil?
2019-07-07 11:18:12 +05:30
# Expose ability to set `tls_options` directly. Deprecate `ca_file` and
# `ssl_version` in favor of `tls_options` hash option.
server [ 'tls_options' ] || = { }
if server [ 'ssl_version' ] || server [ 'ca_file' ]
2021-04-29 21:17:54 +05:30
Gitlab :: AppLogger . warn 'DEPRECATED: LDAP options `ssl_version` and `ca_file` should be nested within `tls_options`'
2019-07-07 11:18:12 +05:30
end
if server [ 'ssl_version' ]
server [ 'tls_options' ] [ 'ssl_version' ] || = server [ 'ssl_version' ]
server . delete ( 'ssl_version' )
end
if server [ 'ca_file' ]
server [ 'tls_options' ] [ 'ca_file' ] || = server [ 'ca_file' ]
server . delete ( 'ca_file' )
end
2018-03-17 18:26:18 +05:30
Settings . ldap [ 'servers' ] [ key ] = server
2015-04-26 12:48:37 +05:30
end
end
2014-09-02 18:07:02 +05:30
Settings [ 'omniauth' ] || = Settingslogic . new ( { } )
2018-12-05 23:21:45 +05:30
Settings . omniauth [ 'enabled' ] = true if Settings . omniauth [ 'enabled' ] . nil?
2015-09-11 14:41:01 +05:30
Settings . omniauth [ 'auto_sign_in_with_provider' ] = false if Settings . omniauth [ 'auto_sign_in_with_provider' ] . nil?
Settings . omniauth [ 'allow_single_sign_on' ] = false if Settings . omniauth [ 'allow_single_sign_on' ] . nil?
2019-12-04 20:38:33 +05:30
Settings . omniauth [ 'allow_bypass_two_factor' ] = false if Settings . omniauth [ 'allow_bypass_two_factor' ] . nil?
2016-06-02 11:05:42 +05:30
Settings . omniauth [ 'external_providers' ] = [ ] if Settings . omniauth [ 'external_providers' ] . nil?
2015-09-11 14:41:01 +05:30
Settings . omniauth [ 'block_auto_created_users' ] = true if Settings . omniauth [ 'block_auto_created_users' ] . nil?
Settings . omniauth [ 'auto_link_ldap_user' ] = false if Settings . omniauth [ 'auto_link_ldap_user' ] . nil?
2016-06-02 11:05:42 +05:30
Settings . omniauth [ 'auto_link_saml_user' ] = false if Settings . omniauth [ 'auto_link_saml_user' ] . nil?
2020-10-24 23:57:45 +05:30
Settings . omniauth [ 'auto_link_user' ] = false if Settings . omniauth [ 'auto_link_user' ] . nil?
2021-11-11 11:23:49 +05:30
Settings . omniauth [ 'saml_message_max_byte_size' ] = 250000 if Settings . omniauth [ 'saml_message_max_byte_size' ] . nil?
2018-03-17 18:26:18 +05:30
Settings . omniauth [ 'sync_profile_from_provider' ] = false if Settings . omniauth [ 'sync_profile_from_provider' ] . nil?
Settings . omniauth [ 'sync_profile_attributes' ] = [ 'email' ] if Settings . omniauth [ 'sync_profile_attributes' ] . nil?
# Handle backwards compatibility with merge request 11268
if Settings . omniauth [ 'sync_email_from_provider' ]
if Settings . omniauth [ 'sync_profile_from_provider' ] . is_a? ( Array )
Settings . omniauth [ 'sync_profile_from_provider' ] |= [ Settings . omniauth [ 'sync_email_from_provider' ] ]
elsif ! Settings . omniauth [ 'sync_profile_from_provider' ]
Settings . omniauth [ 'sync_profile_from_provider' ] = [ Settings . omniauth [ 'sync_email_from_provider' ] ]
end
Settings . omniauth [ 'sync_profile_attributes' ] |= [ 'email' ] unless Settings . omniauth [ 'sync_profile_attributes' ] == true
end
2015-09-11 14:41:01 +05:30
2016-06-02 11:05:42 +05:30
Settings . omniauth [ 'providers' ] || = [ ]
2016-01-14 18:37:52 +05:30
Settings . omniauth [ 'cas3' ] || = Settingslogic . new ( { } )
Settings . omniauth . cas3 [ 'session_duration' ] || = 8 . hours
Settings . omniauth [ 'session_tickets' ] || = Settingslogic . new ( { } )
Settings . omniauth . session_tickets [ 'cas3' ] = 'ticket'
2022-10-11 01:57:18 +05:30
# Handle backward compatibility with the renamed kerberos_spnego provider
# https://gitlab.com/gitlab-org/gitlab/-/merge_requests/96335#note_1094265436
Gitlab . ee do
kerberos_spnego = Settings . omniauth . providers . find { | p | p . name == 'kerberos_spnego' }
if kerberos_spnego
Settings . omniauth . providers . delete_if { | p | p . name == 'kerberos' }
kerberos_spnego [ 'name' ] = 'kerberos'
omniauth_keys = %w( allow_single_sign_on auto_link_user external_providers sync_profile_from_provider allow_bypass_two_factor )
omniauth_keys . each do | key |
next unless Settings . omniauth [ key ] . is_a? ( Array )
Settings . omniauth [ key ] . map! { | p | p == 'kerberos_spnego' ? 'kerberos' : p }
end
if Settings . omniauth [ 'auto_sign_in_with_provider' ] == 'kerberos_spnego'
Settings . omniauth [ 'auto_sign_in_with_provider' ] = 'kerberos'
end
end
end
2016-06-02 11:05:42 +05:30
# Fill out omniauth-gitlab settings. It is needed for easy set up GHE or GH by just specifying url.
github_default_url = " https://github.com "
github_settings = Settings . omniauth [ 'providers' ] . find { | provider | provider [ " name " ] == " github " }
if github_settings
# For compatibility with old config files (before 7.8)
# where people dont have url in github settings
if github_settings [ 'url' ] . blank?
github_settings [ 'url' ] = github_default_url
end
github_settings [ " args " ] || = Settingslogic . new ( { } )
2017-08-17 22:00:37 +05:30
github_settings [ " args " ] [ " client_options " ] =
if github_settings [ " url " ] . include? ( github_default_url )
OmniAuth :: Strategies :: GitHub . default_options [ :client_options ]
else
{
2022-08-27 11:52:29 +05:30
" site " = > File . join ( github_settings [ " url " ] , " api/v3 " ) ,
2017-08-17 22:00:37 +05:30
" authorize_url " = > File . join ( github_settings [ " url " ] , " login/oauth/authorize " ) ,
2022-08-27 11:52:29 +05:30
" token_url " = > File . join ( github_settings [ " url " ] , " login/oauth/access_token " )
2017-08-17 22:00:37 +05:30
}
end
2016-06-02 11:05:42 +05:30
end
2014-09-02 18:07:02 +05:30
2019-09-30 21:07:59 +05:30
# SAML should be enabled for the tests automatically, but only for EE.
saml_provider_enabled = Settings . omniauth . providers . any? do | provider |
provider [ 'name' ] == 'group_saml'
end
if Gitlab . ee? && Rails . env . test? && ! saml_provider_enabled
Settings . omniauth . providers << Settingslogic . new ( { 'name' = > 'group_saml' } )
end
2016-06-02 11:05:42 +05:30
Settings [ 'issues_tracker' ] || = { }
2014-09-02 18:07:02 +05:30
#
# GitLab
#
Settings [ 'gitlab' ] || = Settingslogic . new ( { } )
2019-07-07 11:18:12 +05:30
Settings . gitlab [ 'default_project_creation' ] || = :: Gitlab :: Access :: DEVELOPER_MAINTAINER_PROJECT_ACCESS
2019-09-30 21:07:59 +05:30
Settings . gitlab [ 'default_project_deletion_protection' ] || = false
2017-08-17 22:00:37 +05:30
Settings . gitlab [ 'default_projects_limit' ] || = 100000
2015-04-26 12:48:37 +05:30
Settings . gitlab [ 'default_branch_protection' ] || = 2
2022-11-25 23:54:43 +05:30
# `default_can_create_group` is deprecated since GitLab 15.5 in favour of the `can_create_group` column on `ApplicationSetting`.
2014-09-02 18:07:02 +05:30
Settings . gitlab [ 'default_can_create_group' ] = true if Settings . gitlab [ 'default_can_create_group' ] . nil?
2018-03-17 18:26:18 +05:30
Settings . gitlab [ 'default_theme' ] = Gitlab :: Themes :: APPLICATION_DEFAULT if Settings . gitlab [ 'default_theme' ] . nil?
2020-03-13 15:44:24 +05:30
Settings . gitlab [ 'host' ] || = ENV [ 'GITLAB_HOST' ] || 'localhost'
2021-10-27 15:23:28 +05:30
Settings . gitlab [ 'cdn_host' ] || = ENV [ 'GITLAB_CDN_HOST' ] . presence
2020-03-13 15:44:24 +05:30
Settings . gitlab [ 'ssh_host' ] || = Settings . gitlab . host
2014-09-02 18:07:02 +05:30
Settings . gitlab [ 'https' ] = false if Settings . gitlab [ 'https' ] . nil?
2017-09-10 17:25:29 +05:30
Settings . gitlab [ 'port' ] || = ENV [ 'GITLAB_PORT' ] || ( Settings . gitlab . https ? 443 : 80 )
2014-09-02 18:07:02 +05:30
Settings . gitlab [ 'relative_url_root' ] || = ENV [ 'RAILS_RELATIVE_URL_ROOT' ] || ''
2019-07-31 22:56:46 +05:30
# / is not a valid relative URL root
Settings . gitlab [ 'relative_url_root' ] = '' if Settings . gitlab [ 'relative_url_root' ] == '/'
2016-06-02 11:05:42 +05:30
Settings . gitlab [ 'protocol' ] || = Settings . gitlab . https ? " https " : " http "
2015-04-26 12:48:37 +05:30
Settings . gitlab [ 'email_enabled' ] || = true if Settings . gitlab [ 'email_enabled' ] . nil?
2016-01-14 18:37:52 +05:30
Settings . gitlab [ 'email_from' ] || = ENV [ 'GITLAB_EMAIL_FROM' ] || " gitlab@ #{ Settings . gitlab . host } "
Settings . gitlab [ 'email_display_name' ] || = ENV [ 'GITLAB_EMAIL_DISPLAY_NAME' ] || 'GitLab'
Settings . gitlab [ 'email_reply_to' ] || = ENV [ 'GITLAB_EMAIL_REPLY_TO' ] || " noreply@ #{ Settings . gitlab . host } "
2016-11-03 12:29:30 +05:30
Settings . gitlab [ 'email_subject_suffix' ] || = ENV [ 'GITLAB_EMAIL_SUBJECT_SUFFIX' ] || " "
2019-12-04 20:38:33 +05:30
Settings . gitlab [ 'email_smime' ] = SmimeSignatureSettings . parse ( Settings . gitlab [ 'email_smime' ] )
2021-10-27 15:23:28 +05:30
Settings . gitlab [ 'email_smtp_secret_file' ] = Settings . absolute ( Settings . gitlab [ 'email_smtp_secret_file' ] || File . join ( Settings . encrypted_settings [ 'path' ] , " smtp.yaml.enc " ) )
2020-03-13 15:44:24 +05:30
Settings . gitlab [ 'base_url' ] || = Settings . __send__ ( :build_base_gitlab_url )
Settings . gitlab [ 'url' ] || = Settings . __send__ ( :build_gitlab_url )
Settings . gitlab [ 'user' ] || = 'git'
2020-04-08 14:13:33 +05:30
# External configuration may cause the ssh user to differ from the GitLab user
Settings . gitlab [ 'ssh_user' ] || = Settings . gitlab . user
2020-03-13 15:44:24 +05:30
Settings . gitlab [ 'user_home' ] || = begin
2014-09-02 18:07:02 +05:30
Etc . getpwnam ( Settings . gitlab [ 'user' ] ) . dir
2021-04-29 21:17:54 +05:30
rescue ArgumentError # no user configured
'/home/' + Settings . gitlab [ 'user' ]
2014-09-02 18:07:02 +05:30
end
2016-06-02 11:05:42 +05:30
Settings . gitlab [ 'time_zone' ] || = nil
2015-04-26 12:48:37 +05:30
Settings . gitlab [ 'signup_enabled' ] || = true if Settings . gitlab [ 'signup_enabled' ] . nil?
2018-03-17 18:26:18 +05:30
Settings . gitlab [ 'signin_enabled' ] || = true if Settings . gitlab [ 'signin_enabled' ] . nil?
2017-08-17 22:00:37 +05:30
Settings . gitlab [ 'restricted_visibility_levels' ] = Settings . __send__ ( :verify_constant_array , Gitlab :: VisibilityLevel , Settings . gitlab [ 'restricted_visibility_levels' ] , [ ] )
2014-09-02 18:07:02 +05:30
Settings . gitlab [ 'username_changing_enabled' ] = true if Settings . gitlab [ 'username_changing_enabled' ] . nil?
2018-11-20 20:47:30 +05:30
Settings . gitlab [ 'issue_closing_pattern' ] = '\b((?:[Cc]los(?:e[sd]?|ing)|\b[Ff]ix(?:e[sd]|ing)?|\b[Rr]esolv(?:e[sd]?|ing)|\b[Ii]mplement(?:s|ed|ing)?)(:?) +(?:(?:issues? +)?%{issue_ref}(?:(?: *,? +and +| *,? *)?)|([A-Z][A-Z0-9_]+-\d+))+)' if Settings . gitlab [ 'issue_closing_pattern' ] . nil?
2014-09-02 18:07:02 +05:30
Settings . gitlab [ 'default_projects_features' ] || = { }
2015-04-26 12:48:37 +05:30
Settings . gitlab [ 'webhook_timeout' ] || = 10
2020-03-13 15:44:24 +05:30
Settings . gitlab [ 'graphql_timeout' ] || = 30
2023-03-04 22:38:38 +05:30
Settings . gitlab [ 'max_attachment_size' ] || = 100
2015-09-11 14:41:01 +05:30
Settings . gitlab [ 'session_expire_delay' ] || = 10080
2018-11-20 20:47:30 +05:30
Settings . gitlab [ 'unauthenticated_session_expire_delay' ] || = 2 . hours . to_i
2016-06-02 11:05:42 +05:30
Settings . gitlab . default_projects_features [ 'issues' ] = true if Settings . gitlab . default_projects_features [ 'issues' ] . nil?
Settings . gitlab . default_projects_features [ 'merge_requests' ] = true if Settings . gitlab . default_projects_features [ 'merge_requests' ] . nil?
Settings . gitlab . default_projects_features [ 'wiki' ] = true if Settings . gitlab . default_projects_features [ 'wiki' ] . nil?
2017-08-17 22:00:37 +05:30
Settings . gitlab . default_projects_features [ 'snippets' ] = true if Settings . gitlab . default_projects_features [ 'snippets' ] . nil?
2016-06-02 11:05:42 +05:30
Settings . gitlab . default_projects_features [ 'builds' ] = true if Settings . gitlab . default_projects_features [ 'builds' ] . nil?
Settings . gitlab . default_projects_features [ 'container_registry' ] = true if Settings . gitlab . default_projects_features [ 'container_registry' ] . nil?
2017-08-17 22:00:37 +05:30
Settings . gitlab . default_projects_features [ 'visibility_level' ] = Settings . __send__ ( :verify_constant , Gitlab :: VisibilityLevel , Settings . gitlab . default_projects_features [ 'visibility_level' ] , Gitlab :: VisibilityLevel :: PRIVATE )
2021-01-29 00:20:46 +05:30
Settings . gitlab [ 'domain_allowlist' ] || = [ ]
2018-03-17 18:26:18 +05:30
Settings . gitlab [ 'import_sources' ] || = Gitlab :: ImportSources . values
2016-06-02 11:05:42 +05:30
Settings . gitlab [ 'trusted_proxies' ] || = [ ]
2021-10-27 15:23:28 +05:30
Settings . gitlab [ 'content_security_policy' ] || = { }
2021-04-17 20:07:23 +05:30
Settings . gitlab [ 'allowed_hosts' ] || = [ ]
2019-02-15 15:39:39 +05:30
Settings . gitlab [ 'impersonation_enabled' ] || = true if Settings . gitlab [ 'impersonation_enabled' ] . nil?
2017-08-17 22:00:37 +05:30
Settings . gitlab [ 'usage_ping_enabled' ] = true if Settings . gitlab [ 'usage_ping_enabled' ] . nil?
2020-03-13 15:44:24 +05:30
Settings . gitlab [ 'max_request_duration_seconds' ] || = 57
2021-10-29 20:43:33 +05:30
Settings . gitlab [ 'display_initial_root_password' ] = false if Settings . gitlab [ 'display_initial_root_password' ] . nil?
2022-10-11 01:57:18 +05:30
Settings . gitlab [ 'weak_passwords_digest_set' ] || = YAML . safe_load ( File . open ( Rails . root . join ( 'config' , 'weak_password_digests.yml' ) ) , permitted_classes : [ String ] ) . to_set . freeze
2021-09-04 01:27:46 +05:30
2019-09-30 21:07:59 +05:30
Gitlab . ee do
Settings . gitlab [ 'mirror_max_delay' ] || = 300
Settings . gitlab [ 'mirror_max_capacity' ] || = 30
Settings . gitlab [ 'mirror_capacity_threshold' ] || = 15
end
#
# Elasticseacrh
#
Gitlab . ee do
Settings [ 'elasticsearch' ] || = Settingslogic . new ( { } )
Settings . elasticsearch [ 'enabled' ] = false if Settings . elasticsearch [ 'enabled' ] . nil?
Settings . elasticsearch [ 'url' ] = ENV [ 'ELASTIC_URL' ] || " http://localhost:9200 "
2019-10-12 21:52:04 +05:30
Settings . elasticsearch [ 'indexer_path' ] || = Gitlab :: Utils . which ( 'gitlab-elasticsearch-indexer' )
2019-09-30 21:07:59 +05:30
end
2015-09-25 12:07:36 +05:30
#
# CI
#
Settings [ 'gitlab_ci' ] || = Settingslogic . new ( { } )
2015-11-26 14:37:03 +05:30
Settings . gitlab_ci [ 'shared_runners_enabled' ] = true if Settings . gitlab_ci [ 'shared_runners_enabled' ] . nil?
2017-08-17 22:00:37 +05:30
Settings . gitlab_ci [ 'builds_path' ] = Settings . absolute ( Settings . gitlab_ci [ 'builds_path' ] || " builds/ " )
Settings . gitlab_ci [ 'url' ] || = Settings . __send__ ( :build_gitlab_ci_url )
2015-09-25 12:07:36 +05:30
2022-03-02 08:16:31 +05:30
#
# CI Secure Files
#
Settings [ 'ci_secure_files' ] || = Settingslogic . new ( { } )
Settings . ci_secure_files [ 'enabled' ] = true if Settings . ci_secure_files [ 'enabled' ] . nil?
Settings . ci_secure_files [ 'storage_path' ] = Settings . absolute ( Settings . ci_secure_files [ 'storage_path' ] || File . join ( Settings . shared [ 'path' ] , " ci_secure_files " ) )
2022-07-16 23:28:13 +05:30
Settings . ci_secure_files [ 'object_store' ] = ObjectStoreSettings . legacy_parse ( Settings . ci_secure_files [ 'object_store' ] , 'secure_files' )
2022-03-02 08:16:31 +05:30
2015-09-25 12:07:36 +05:30
#
# Reply by email
#
Settings [ 'incoming_email' ] || = Settingslogic . new ( { } )
2016-06-02 11:05:42 +05:30
Settings . incoming_email [ 'enabled' ] = false if Settings . incoming_email [ 'enabled' ] . nil?
2021-11-11 11:23:49 +05:30
Settings . incoming_email [ 'inbox_method' ] || = 'imap'
2014-09-02 18:07:02 +05:30
2020-04-08 14:13:33 +05:30
#
# Service desk email
#
Settings [ 'service_desk_email' ] || = Settingslogic . new ( { } )
Settings . service_desk_email [ 'enabled' ] = false if Settings . service_desk_email [ 'enabled' ] . nil?
2015-11-26 14:37:03 +05:30
#
# Build Artifacts
#
Settings [ 'artifacts' ] || = Settingslogic . new ( { } )
Settings . artifacts [ 'enabled' ] = true if Settings . artifacts [ 'enabled' ] . nil?
2018-03-17 18:26:18 +05:30
Settings . artifacts [ 'storage_path' ] = Settings . absolute ( Settings . artifacts . values_at ( 'path' , 'storage_path' ) . compact . first || File . join ( Settings . shared [ 'path' ] , " artifacts " ) )
# Settings.artifact['path'] is deprecated, use `storage_path` instead
Settings . artifacts [ 'path' ] = Settings . artifacts [ 'storage_path' ]
Settings . artifacts [ 'max_size' ] || = 100 # in megabytes
2022-07-16 23:28:13 +05:30
Settings . artifacts [ 'object_store' ] = ObjectStoreSettings . legacy_parse ( Settings . artifacts [ 'object_store' ] , 'artifacts' )
2016-06-02 11:05:42 +05:30
#
# Registry
#
Settings [ 'registry' ] || = Settingslogic . new ( { } )
2020-03-13 15:44:24 +05:30
Settings . registry [ 'enabled' ] || = false
Settings . registry [ 'host' ] || = " example.com "
Settings . registry [ 'port' ] || = nil
Settings . registry [ 'api_url' ] || = " http://localhost:5000/ "
Settings . registry [ 'key' ] || = nil
Settings . registry [ 'issuer' ] || = nil
Settings . registry [ 'host_port' ] || = [ Settings . registry [ 'host' ] , Settings . registry [ 'port' ] ] . compact . join ( ':' )
2017-08-17 22:00:37 +05:30
Settings . registry [ 'path' ] = Settings . absolute ( Settings . registry [ 'path' ] || File . join ( Settings . shared [ 'path' ] , 'registry' ) )
2019-10-12 21:52:04 +05:30
Settings . registry [ 'notifications' ] || = [ ]
2017-08-17 22:00:37 +05:30
2019-07-31 22:56:46 +05:30
#
# Error Reporting and Logging with Sentry
#
Settings [ 'sentry' ] || = Settingslogic . new ( { } )
Settings . sentry [ 'enabled' ] || = false
Settings . sentry [ 'dsn' ] || = nil
Settings . sentry [ 'environment' ] || = nil
Settings . sentry [ 'clientside_dsn' ] || = nil
2017-08-17 22:00:37 +05:30
#
# Pages
#
Settings [ 'pages' ] || = Settingslogic . new ( { } )
2020-10-24 23:57:45 +05:30
Settings [ 'pages' ] = :: Gitlab :: Pages :: Settings . new ( Settings . pages ) # For path access detection https://gitlab.com/gitlab-org/gitlab/-/issues/230702
2018-03-17 18:26:18 +05:30
Settings . pages [ 'enabled' ] = false if Settings . pages [ 'enabled' ] . nil?
2018-12-05 23:21:45 +05:30
Settings . pages [ 'access_control' ] = false if Settings . pages [ 'access_control' ] . nil?
2018-03-17 18:26:18 +05:30
Settings . pages [ 'path' ] = Settings . absolute ( Settings . pages [ 'path' ] || File . join ( Settings . shared [ 'path' ] , " pages " ) )
Settings . pages [ 'https' ] = false if Settings . pages [ 'https' ] . nil?
2020-03-13 15:44:24 +05:30
Settings . pages [ 'host' ] || = " example.com "
Settings . pages [ 'port' ] || = Settings . pages . https ? 443 : 80
Settings . pages [ 'protocol' ] || = Settings . pages . https ? " https " : " http "
Settings . pages [ 'url' ] || = Settings . __send__ ( :build_pages_url )
Settings . pages [ 'external_http' ] || = false unless Settings . pages [ 'external_http' ] . present?
Settings . pages [ 'external_https' ] || = false unless Settings . pages [ 'external_https' ] . present?
Settings . pages [ 'artifacts_server' ] || = Settings . pages [ 'enabled' ] if Settings . pages [ 'artifacts_server' ] . nil?
2020-01-01 13:55:28 +05:30
Settings . pages [ 'secret_file' ] || = Rails . root . join ( '.gitlab_pages_secret' )
2021-01-03 14:25:43 +05:30
# We want pages zip archives to be stored on the same directory as old pages hierarchical structure
# this will allow us to easier migrate existing instances with NFS
Settings . pages [ 'storage_path' ] = Settings . pages [ 'path' ]
2022-07-16 23:28:13 +05:30
Settings . pages [ 'object_store' ] = ObjectStoreSettings . legacy_parse ( Settings . pages [ 'object_store' ] , 'pages' )
2021-04-29 21:17:54 +05:30
Settings . pages [ 'local_store' ] || = Settingslogic . new ( { } )
Settings . pages [ 'local_store' ] [ 'path' ] = Settings . absolute ( Settings . pages [ 'local_store' ] [ 'path' ] || File . join ( Settings . shared [ 'path' ] , " pages " ) )
Settings . pages [ 'local_store' ] [ 'enabled' ] = true if Settings . pages [ 'local_store' ] [ 'enabled' ] . nil?
2018-10-15 14:42:47 +05:30
2021-03-11 19:13:27 +05:30
#
# GitLab documentation
#
Settings [ 'gitlab_docs' ] || = Settingslogic . new ( { } )
Settings . gitlab_docs [ 'enabled' ] || = false
Settings . gitlab_docs [ 'host' ] = nil unless Settings . gitlab_docs . enabled
2019-09-30 21:07:59 +05:30
#
# Geo
#
Gitlab . ee do
Settings [ 'geo' ] || = Settingslogic . new ( { } )
# For backwards compatibility, default to gitlab_url and if so, ensure it ends with "/"
Settings . geo [ 'node_name' ] = Settings . geo [ 'node_name' ] . presence || Settings . gitlab [ 'url' ] . chomp ( '/' ) . concat ( '/' )
2019-10-12 21:52:04 +05:30
#
# Registry replication
#
Settings . geo [ 'registry_replication' ] || = Settingslogic . new ( { } )
Settings . geo . registry_replication [ 'enabled' ] || = false
2019-09-30 21:07:59 +05:30
end
2019-12-26 22:10:19 +05:30
#
# Unleash
#
Settings [ 'feature_flags' ] || = Settingslogic . new ( { } )
Settings . feature_flags [ 'unleash' ] || = Settingslogic . new ( { } )
Settings . feature_flags . unleash [ 'enabled' ] = false if Settings . feature_flags . unleash [ 'enabled' ] . nil?
2019-03-02 22:35:43 +05:30
#
# External merge request diffs
#
Settings [ 'external_diffs' ] || = Settingslogic . new ( { } )
Settings . external_diffs [ 'enabled' ] = false if Settings . external_diffs [ 'enabled' ] . nil?
2019-07-07 11:18:12 +05:30
Settings . external_diffs [ 'when' ] = 'always' if Settings . external_diffs [ 'when' ] . nil?
2019-03-02 22:35:43 +05:30
Settings . external_diffs [ 'storage_path' ] = Settings . absolute ( Settings . external_diffs [ 'storage_path' ] || File . join ( Settings . shared [ 'path' ] , 'external-diffs' ) )
2022-07-16 23:28:13 +05:30
Settings . external_diffs [ 'object_store' ] = ObjectStoreSettings . legacy_parse ( Settings . external_diffs [ 'object_store' ] , 'external_diffs' )
2019-03-02 22:35:43 +05:30
2015-11-26 14:37:03 +05:30
#
# Git LFS
#
Settings [ 'lfs' ] || = Settingslogic . new ( { } )
Settings . lfs [ 'enabled' ] = true if Settings . lfs [ 'enabled' ] . nil?
2017-08-17 22:00:37 +05:30
Settings . lfs [ 'storage_path' ] = Settings . absolute ( Settings . lfs [ 'storage_path' ] || File . join ( Settings . shared [ 'path' ] , " lfs-objects " ) )
2022-07-16 23:28:13 +05:30
Settings . lfs [ 'object_store' ] = ObjectStoreSettings . legacy_parse ( Settings . lfs [ 'object_store' ] , 'lfs' )
2017-08-17 22:00:37 +05:30
2018-03-17 18:26:18 +05:30
#
# Uploads
#
Settings [ 'uploads' ] || = Settingslogic . new ( { } )
Settings . uploads [ 'storage_path' ] = Settings . absolute ( Settings . uploads [ 'storage_path' ] || 'public' )
Settings . uploads [ 'base_dir' ] = Settings . uploads [ 'base_dir' ] || 'uploads/-/system'
2022-07-16 23:28:13 +05:30
Settings . uploads [ 'object_store' ] = ObjectStoreSettings . legacy_parse ( Settings . uploads [ 'object_store' ] , 'uploads' )
2018-05-09 12:01:36 +05:30
Settings . uploads [ 'object_store' ] [ 'remote_directory' ] || = 'uploads'
2018-03-17 18:26:18 +05:30
2019-09-30 21:07:59 +05:30
#
# Packages
#
2020-07-28 23:09:34 +05:30
Settings [ 'packages' ] || = Settingslogic . new ( { } )
2021-01-29 00:20:46 +05:30
Settings . packages [ 'enabled' ] = true if Settings . packages [ 'enabled' ] . nil?
Settings . packages [ 'dpkg_deb_path' ] = '/usr/bin/dpkg-deb' if Settings . packages [ 'dpkg_deb_path' ] . nil?
Settings . packages [ 'storage_path' ] = Settings . absolute ( Settings . packages [ 'storage_path' ] || File . join ( Settings . shared [ 'path' ] , " packages " ) )
2022-07-16 23:28:13 +05:30
Settings . packages [ 'object_store' ] = ObjectStoreSettings . legacy_parse ( Settings . packages [ 'object_store' ] , 'packages' )
2019-09-30 21:07:59 +05:30
#
# Dependency Proxy
#
2021-01-29 00:20:46 +05:30
Settings [ 'dependency_proxy' ] || = Settingslogic . new ( { } )
Settings . dependency_proxy [ 'enabled' ] = true if Settings . dependency_proxy [ 'enabled' ] . nil?
Settings . dependency_proxy [ 'storage_path' ] = Settings . absolute ( Settings . dependency_proxy [ 'storage_path' ] || File . join ( Settings . shared [ 'path' ] , " dependency_proxy " ) )
2022-07-16 23:28:13 +05:30
Settings . dependency_proxy [ 'object_store' ] = ObjectStoreSettings . legacy_parse ( Settings . dependency_proxy [ 'object_store' ] , 'dependency_proxy' )
2021-01-29 00:20:46 +05:30
# For first iteration dependency proxy uses Rails server to download blobs.
# To ensure acceptable performance we only allow feature to be used with
# multithreaded web-server Puma. This will be removed once download logic is moved
# to GitLab workhorse
Settings . dependency_proxy [ 'enabled' ] = false unless Gitlab :: Runtime . puma?
2019-09-30 21:07:59 +05:30
2020-04-22 19:07:51 +05:30
#
# Terraform state
#
Settings [ 'terraform_state' ] || = Settingslogic . new ( { } )
Settings . terraform_state [ 'enabled' ] = true if Settings . terraform_state [ 'enabled' ] . nil?
Settings . terraform_state [ 'storage_path' ] = Settings . absolute ( Settings . terraform_state [ 'storage_path' ] || File . join ( Settings . shared [ 'path' ] , " terraform_state " ) )
2022-07-16 23:28:13 +05:30
Settings . terraform_state [ 'object_store' ] = ObjectStoreSettings . legacy_parse ( Settings . terraform_state [ 'object_store' ] , 'terraform_state' )
2020-04-22 19:07:51 +05:30
2017-08-17 22:00:37 +05:30
#
# Mattermost
#
Settings [ 'mattermost' ] || = Settingslogic . new ( { } )
Settings . mattermost [ 'enabled' ] = false if Settings . mattermost [ 'enabled' ] . nil?
Settings . mattermost [ 'host' ] = nil unless Settings . mattermost . enabled
2015-11-26 14:37:03 +05:30
2023-03-04 22:38:38 +05:30
#
# Jira Connect (GitLab.com for Jira Cloud App)
#
Settings [ 'jira_connect' ] || = Settingslogic . new ( { } )
Settings . jira_connect [ 'atlassian_js_url' ] || = 'https://connect-cdn.atl-paas.net/all.js'
Settings . jira_connect [ 'enable_public_keys_storage' ] || = false
Settings . jira_connect [ 'enable_public_keys_storage' ] = true if Gitlab . com?
Settings . jira_connect [ 'enforce_jira_base_url_https' ] = true if Settings . jira_connect [ 'enforce_jira_base_url_https' ] . nil?
Settings . jira_connect [ 'additional_iframe_ancestors' ] || = [ ]
2014-09-02 18:07:02 +05:30
#
# Gravatar
#
Settings [ 'gravatar' ] || = Settingslogic . new ( { } )
Settings . gravatar [ 'enabled' ] = true if Settings . gravatar [ 'enabled' ] . nil?
2018-03-17 18:26:18 +05:30
Settings . gravatar [ 'plain_url' ] || = 'https://www.gravatar.com/avatar/%{hash}?s=%{size}&d=identicon'
2014-09-02 18:07:02 +05:30
Settings . gravatar [ 'ssl_url' ] || = 'https://secure.gravatar.com/avatar/%{hash}?s=%{size}&d=identicon'
2016-01-29 22:53:50 +05:30
Settings . gravatar [ 'host' ] = Settings . host_without_www ( Settings . gravatar [ 'plain_url' ] )
2014-09-02 18:07:02 +05:30
2016-01-14 18:37:52 +05:30
#
# Cron Jobs
#
Settings [ 'cron_jobs' ] || = Settingslogic . new ( { } )
2019-09-30 21:07:59 +05:30
if Gitlab . ee? && Settings [ 'ee_cron_jobs' ]
Settings . cron_jobs . merge! ( Settings . ee_cron_jobs )
end
2023-01-13 00:05:48 +05:30
Settings . cron_jobs [ 'poll_interval' ] || = nil
2017-08-17 22:00:37 +05:30
Settings . cron_jobs [ 'stuck_ci_jobs_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'stuck_ci_jobs_worker' ] [ 'cron' ] || = '0 * * * *'
Settings . cron_jobs [ 'stuck_ci_jobs_worker' ] [ 'job_class' ] = 'StuckCiJobsWorker'
Settings . cron_jobs [ 'pipeline_schedule_worker' ] || = Settingslogic . new ( { } )
2021-03-11 19:13:27 +05:30
Settings . cron_jobs [ 'pipeline_schedule_worker' ] [ 'cron' ] || = '3-59/10 * * * *'
2017-08-17 22:00:37 +05:30
Settings . cron_jobs [ 'pipeline_schedule_worker' ] [ 'job_class' ] = 'PipelineScheduleWorker'
2016-06-16 23:09:34 +05:30
Settings . cron_jobs [ 'expire_build_artifacts_worker' ] || = Settingslogic . new ( { } )
2021-01-29 00:20:46 +05:30
Settings . cron_jobs [ 'expire_build_artifacts_worker' ] [ 'cron' ] || = '*/7 * * * *'
2016-06-16 23:09:34 +05:30
Settings . cron_jobs [ 'expire_build_artifacts_worker' ] [ 'job_class' ] = 'ExpireBuildArtifactsWorker'
2022-06-21 17:19:12 +05:30
Settings . cron_jobs [ 'update_locked_unknown_artifacts_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'update_locked_unknown_artifacts_worker' ] [ 'cron' ] || = '*/7 * * * *'
Settings . cron_jobs [ 'update_locked_unknown_artifacts_worker' ] [ 'job_class' ] = 'Ci::UpdateLockedUnknownArtifactsWorker'
2021-03-08 18:12:59 +05:30
Settings . cron_jobs [ 'ci_pipelines_expire_artifacts_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'ci_pipelines_expire_artifacts_worker' ] [ 'cron' ] || = '*/23 * * * *'
Settings . cron_jobs [ 'ci_pipelines_expire_artifacts_worker' ] [ 'job_class' ] = 'Ci::PipelineArtifacts::ExpireArtifactsWorker'
2021-01-03 14:25:43 +05:30
Settings . cron_jobs [ 'ci_schedule_delete_objects_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'ci_schedule_delete_objects_worker' ] [ 'cron' ] || = '*/16 * * * *'
Settings . cron_jobs [ 'ci_schedule_delete_objects_worker' ] [ 'job_class' ] = 'Ci::ScheduleDeleteObjectsCronWorker'
2020-03-13 15:44:24 +05:30
Settings . cron_jobs [ 'environments_auto_stop_cron_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'environments_auto_stop_cron_worker' ] [ 'cron' ] || = '24 * * * *'
Settings . cron_jobs [ 'environments_auto_stop_cron_worker' ] [ 'job_class' ] = 'Environments::AutoStopCronWorker'
2021-10-27 15:23:28 +05:30
Settings . cron_jobs [ 'environments_auto_delete_cron_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'environments_auto_delete_cron_worker' ] [ 'cron' ] || = '34 * * * *'
Settings . cron_jobs [ 'environments_auto_delete_cron_worker' ] [ 'job_class' ] = 'Environments::AutoDeleteCronWorker'
2016-06-02 11:05:42 +05:30
Settings . cron_jobs [ 'repository_check_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'repository_check_worker' ] [ 'cron' ] || = '20 * * * *'
2018-11-08 19:23:39 +05:30
Settings . cron_jobs [ 'repository_check_worker' ] [ 'job_class' ] = 'RepositoryCheck::DispatchWorker'
2016-06-02 11:05:42 +05:30
Settings . cron_jobs [ 'admin_email_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'admin_email_worker' ] [ 'cron' ] || = '0 0 * * 0'
Settings . cron_jobs [ 'admin_email_worker' ] [ 'job_class' ] = 'AdminEmailWorker'
2020-01-01 13:55:28 +05:30
Settings . cron_jobs [ 'personal_access_tokens_expiring_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'personal_access_tokens_expiring_worker' ] [ 'cron' ] || = '0 1 * * *'
Settings . cron_jobs [ 'personal_access_tokens_expiring_worker' ] [ 'job_class' ] = 'PersonalAccessTokens::ExpiringWorker'
2020-10-24 23:57:45 +05:30
Settings . cron_jobs [ 'personal_access_tokens_expired_notification_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'personal_access_tokens_expired_notification_worker' ] [ 'cron' ] || = '0 2 * * *'
Settings . cron_jobs [ 'personal_access_tokens_expired_notification_worker' ] [ 'job_class' ] = 'PersonalAccessTokens::ExpiredNotificationWorker'
2016-06-02 11:05:42 +05:30
Settings . cron_jobs [ 'repository_archive_cache_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'repository_archive_cache_worker' ] [ 'cron' ] || = '0 * * * *'
Settings . cron_jobs [ 'repository_archive_cache_worker' ] [ 'job_class' ] = 'RepositoryArchiveCacheWorker'
2016-08-24 12:49:21 +05:30
Settings . cron_jobs [ 'import_export_project_cleanup_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'import_export_project_cleanup_worker' ] [ 'cron' ] || = '0 * * * *'
Settings . cron_jobs [ 'import_export_project_cleanup_worker' ] [ 'job_class' ] = 'ImportExportProjectCleanupWorker'
2018-11-08 19:23:39 +05:30
Settings . cron_jobs [ 'ci_archive_traces_cron_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'ci_archive_traces_cron_worker' ] [ 'cron' ] || = '17 * * * *'
Settings . cron_jobs [ 'ci_archive_traces_cron_worker' ] [ 'job_class' ] = 'Ci::ArchiveTracesCronWorker'
2016-09-13 17:45:13 +05:30
Settings . cron_jobs [ 'remove_expired_members_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'remove_expired_members_worker' ] [ 'cron' ] || = '10 0 * * *'
Settings . cron_jobs [ 'remove_expired_members_worker' ] [ 'job_class' ] = 'RemoveExpiredMembersWorker'
Settings . cron_jobs [ 'remove_expired_group_links_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'remove_expired_group_links_worker' ] [ 'cron' ] || = '10 0 * * *'
Settings . cron_jobs [ 'remove_expired_group_links_worker' ] [ 'job_class' ] = 'RemoveExpiredGroupLinksWorker'
2020-10-04 03:57:07 +05:30
Settings . cron_jobs [ 'remove_unaccepted_member_invites_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'remove_unaccepted_member_invites_worker' ] [ 'cron' ] || = '10 15 * * *'
Settings . cron_jobs [ 'remove_unaccepted_member_invites_worker' ] [ 'job_class' ] = 'RemoveUnacceptedMemberInvitesWorker'
2016-09-29 09:46:39 +05:30
Settings . cron_jobs [ 'prune_old_events_worker' ] || = Settingslogic . new ( { } )
2017-08-17 22:00:37 +05:30
Settings . cron_jobs [ 'prune_old_events_worker' ] [ 'cron' ] || = '0 */6 * * *'
2016-09-29 09:46:39 +05:30
Settings . cron_jobs [ 'prune_old_events_worker' ] [ 'job_class' ] = 'PruneOldEventsWorker'
2023-03-04 22:38:38 +05:30
Settings . cron_jobs [ 'gitlab_export_prune_project_export_jobs_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'gitlab_export_prune_project_export_jobs_worker' ] [ 'cron' ] || = '30 3 * * */7'
Settings . cron_jobs [ 'gitlab_export_prune_project_export_jobs_worker' ] [ 'job_class' ] = 'Gitlab::Export::PruneProjectExportJobsWorker'
2016-11-03 12:29:30 +05:30
Settings . cron_jobs [ 'trending_projects_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'trending_projects_worker' ] [ 'cron' ] = '0 1 * * *'
Settings . cron_jobs [ 'trending_projects_worker' ] [ 'job_class' ] = 'TrendingProjectsWorker'
2017-08-17 22:00:37 +05:30
Settings . cron_jobs [ 'remove_unreferenced_lfs_objects_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'remove_unreferenced_lfs_objects_worker' ] [ 'cron' ] || = '20 0 * * *'
Settings . cron_jobs [ 'remove_unreferenced_lfs_objects_worker' ] [ 'job_class' ] = 'RemoveUnreferencedLfsObjectsWorker'
2022-06-21 17:19:12 +05:30
Settings . cron_jobs [ 'bulk_imports_stuck_import_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'bulk_imports_stuck_import_worker' ] [ 'cron' ] || = '0 */4 * * *'
Settings . cron_jobs [ 'bulk_imports_stuck_import_worker' ] [ 'job_class' ] = 'BulkImports::StuckImportWorker'
2020-06-23 00:09:42 +05:30
Settings . cron_jobs [ 'import_stuck_project_import_jobs' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'import_stuck_project_import_jobs' ] [ 'cron' ] || = '15 * * * *'
Settings . cron_jobs [ 'import_stuck_project_import_jobs' ] [ 'job_class' ] = 'Gitlab::Import::StuckProjectImportJobsWorker'
Settings . cron_jobs [ 'jira_import_stuck_jira_import_jobs' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'jira_import_stuck_jira_import_jobs' ] [ 'cron' ] || = '* 0/15 * * *'
Settings . cron_jobs [ 'jira_import_stuck_jira_import_jobs' ] [ 'job_class' ] = 'Gitlab::JiraImport::StuckJiraImportJobsWorker'
2020-04-08 14:13:33 +05:30
Settings . cron_jobs [ 'stuck_export_jobs_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'stuck_export_jobs_worker' ] [ 'cron' ] || = '30 * * * *'
Settings . cron_jobs [ 'stuck_export_jobs_worker' ] [ 'job_class' ] = 'StuckExportJobsWorker'
2021-09-30 23:02:18 +05:30
Settings . cron_jobs [ 'gitlab_service_ping_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'gitlab_service_ping_worker' ] [ 'cron' ] || = nil # This is dynamically loaded in the sidekiq initializer
Settings . cron_jobs [ 'gitlab_service_ping_worker' ] [ 'job_class' ] = 'GitlabServicePingWorker'
2017-09-10 17:25:29 +05:30
Settings . cron_jobs [ 'stuck_merge_jobs_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'stuck_merge_jobs_worker' ] [ 'cron' ] || = '0 */2 * * *'
Settings . cron_jobs [ 'stuck_merge_jobs_worker' ] [ 'job_class' ] = 'StuckMergeJobsWorker'
2018-03-17 18:26:18 +05:30
Settings . cron_jobs [ 'pages_domain_verification_cron_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'pages_domain_verification_cron_worker' ] [ 'cron' ] || = '*/15 * * * *'
Settings . cron_jobs [ 'pages_domain_verification_cron_worker' ] [ 'job_class' ] = 'PagesDomainVerificationCronWorker'
2019-07-31 22:56:46 +05:30
Settings . cron_jobs [ 'pages_domain_removal_cron_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'pages_domain_removal_cron_worker' ] [ 'cron' ] || = '47 0 * * *'
Settings . cron_jobs [ 'pages_domain_removal_cron_worker' ] [ 'job_class' ] = 'PagesDomainRemovalCronWorker'
2019-09-30 21:07:59 +05:30
Settings . cron_jobs [ 'pages_domain_ssl_renewal_cron_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'pages_domain_ssl_renewal_cron_worker' ] [ 'cron' ] || = '*/10 * * * *'
Settings . cron_jobs [ 'pages_domain_ssl_renewal_cron_worker' ] [ 'job_class' ] = 'PagesDomainSslRenewalCronWorker'
2018-10-15 14:42:47 +05:30
Settings . cron_jobs [ 'issue_due_scheduler_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'issue_due_scheduler_worker' ] [ 'cron' ] || = '50 00 * * *'
Settings . cron_jobs [ 'issue_due_scheduler_worker' ] [ 'job_class' ] = 'IssueDueSchedulerWorker'
2020-06-23 00:09:42 +05:30
Settings . cron_jobs [ 'metrics_dashboard_schedule_annotations_prune_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'metrics_dashboard_schedule_annotations_prune_worker' ] [ 'cron' ] || = '0 1 * * *'
Settings . cron_jobs [ 'metrics_dashboard_schedule_annotations_prune_worker' ] [ 'job_class' ] = 'Metrics::Dashboard::ScheduleAnnotationsPruneWorker'
2019-07-07 11:18:12 +05:30
Settings . cron_jobs [ 'schedule_migrate_external_diffs_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'schedule_migrate_external_diffs_worker' ] [ 'cron' ] || = '15 * * * *'
Settings . cron_jobs [ 'schedule_migrate_external_diffs_worker' ] [ 'job_class' ] = 'ScheduleMigrateExternalDiffsWorker'
2019-09-30 21:07:59 +05:30
Settings . cron_jobs [ 'namespaces_prune_aggregation_schedules_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'namespaces_prune_aggregation_schedules_worker' ] [ 'cron' ] || = '5 1 * * *'
Settings . cron_jobs [ 'namespaces_prune_aggregation_schedules_worker' ] [ 'job_class' ] = 'Namespaces::PruneAggregationSchedulesWorker'
2020-03-13 15:44:24 +05:30
Settings . cron_jobs [ 'container_expiration_policy_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'container_expiration_policy_worker' ] [ 'cron' ] || = '50 * * * *'
Settings . cron_jobs [ 'container_expiration_policy_worker' ] [ 'job_class' ] = 'ContainerExpirationPolicyWorker'
2022-04-04 11:22:00 +05:30
Settings . cron_jobs [ 'container_registry_migration_guard_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'container_registry_migration_guard_worker' ] [ 'cron' ] || = '*/10 * * * *'
Settings . cron_jobs [ 'container_registry_migration_guard_worker' ] [ 'job_class' ] = 'ContainerRegistry::Migration::GuardWorker'
Settings . cron_jobs [ 'container_registry_migration_observer_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'container_registry_migration_observer_worker' ] [ 'cron' ] || = '*/30 * * * *'
Settings . cron_jobs [ 'container_registry_migration_observer_worker' ] [ 'job_class' ] = 'ContainerRegistry::Migration::ObserverWorker'
Settings . cron_jobs [ 'container_registry_migration_enqueuer_worker' ] || = Settingslogic . new ( { } )
2022-10-11 01:57:18 +05:30
Settings . cron_jobs [ 'container_registry_migration_enqueuer_worker' ] [ 'cron' ] || = '15,45 */1 * * *'
2022-04-04 11:22:00 +05:30
Settings . cron_jobs [ 'container_registry_migration_enqueuer_worker' ] [ 'job_class' ] = 'ContainerRegistry::Migration::EnqueuerWorker'
2023-01-13 00:05:48 +05:30
Settings . cron_jobs [ 'cleanup_container_registry_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'cleanup_container_registry_worker' ] [ 'cron' ] || = '*/5 * * * *'
Settings . cron_jobs [ 'cleanup_container_registry_worker' ] [ 'job_class' ] = 'ContainerRegistry::CleanupWorker'
2021-11-18 22:05:49 +05:30
Settings . cron_jobs [ 'image_ttl_group_policy_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'image_ttl_group_policy_worker' ] [ 'cron' ] || = '40 0 * * *'
Settings . cron_jobs [ 'image_ttl_group_policy_worker' ] [ 'job_class' ] = 'DependencyProxy::ImageTtlGroupPolicyWorker'
2022-01-12 12:59:36 +05:30
Settings . cron_jobs [ 'cleanup_dependency_proxy_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'cleanup_dependency_proxy_worker' ] [ 'cron' ] || = '20 3,15 * * *'
Settings . cron_jobs [ 'cleanup_dependency_proxy_worker' ] [ 'job_class' ] = 'DependencyProxy::CleanupDependencyProxyWorker'
2022-03-02 08:16:31 +05:30
Settings . cron_jobs [ 'cleanup_package_registry_worker' ] || = Settingslogic . new ( { } )
2023-01-13 00:05:48 +05:30
Settings . cron_jobs [ 'cleanup_package_registry_worker' ] [ 'cron' ] || = '20 * * * *'
2022-03-02 08:16:31 +05:30
Settings . cron_jobs [ 'cleanup_package_registry_worker' ] [ 'job_class' ] = 'Packages::CleanupPackageRegistryWorker'
2020-05-24 23:13:21 +05:30
Settings . cron_jobs [ 'x509_issuer_crl_check_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'x509_issuer_crl_check_worker' ] [ 'cron' ] || = '30 1 * * *'
Settings . cron_jobs [ 'x509_issuer_crl_check_worker' ] [ 'job_class' ] = 'X509IssuerCrlCheckWorker'
Settings . cron_jobs [ 'users_create_statistics_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'users_create_statistics_worker' ] [ 'cron' ] || = '2 15 * * *'
Settings . cron_jobs [ 'users_create_statistics_worker' ] [ 'job_class' ] = 'Users::CreateStatisticsWorker'
2020-07-01 16:08:20 +05:30
Settings . cron_jobs [ 'authorized_project_update_periodic_recalculate_worker' ] || = Settingslogic . new ( { } )
2021-04-17 20:07:23 +05:30
Settings . cron_jobs [ 'authorized_project_update_periodic_recalculate_worker' ] [ 'cron' ] || = '45 1 1,15 * *'
2020-07-01 16:08:20 +05:30
Settings . cron_jobs [ 'authorized_project_update_periodic_recalculate_worker' ] [ 'job_class' ] = 'AuthorizedProjectUpdate::PeriodicRecalculateWorker'
2020-07-28 23:09:34 +05:30
Settings . cron_jobs [ 'update_container_registry_info_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'update_container_registry_info_worker' ] [ 'cron' ] || = '0 0 * * *'
Settings . cron_jobs [ 'update_container_registry_info_worker' ] [ 'job_class' ] = 'UpdateContainerRegistryInfoWorker'
2021-09-30 23:02:18 +05:30
Settings . cron_jobs [ 'postgres_dynamic_partitions_manager' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'postgres_dynamic_partitions_manager' ] [ 'cron' ] || = '21 */6 * * *'
Settings . cron_jobs [ 'postgres_dynamic_partitions_manager' ] [ 'job_class' ] || = 'Database::PartitionManagementWorker'
2021-10-27 15:23:28 +05:30
Settings . cron_jobs [ 'postgres_dynamic_partitions_dropper' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'postgres_dynamic_partitions_dropper' ] [ 'cron' ] || = '45 12 * * *'
Settings . cron_jobs [ 'postgres_dynamic_partitions_dropper' ] [ 'job_class' ] || = 'Database::DropDetachedPartitionsWorker'
2020-11-24 15:15:51 +05:30
Settings . cron_jobs [ 'ci_platform_metrics_update_cron_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'ci_platform_metrics_update_cron_worker' ] [ 'cron' ] || = '47 9 * * *'
Settings . cron_jobs [ 'ci_platform_metrics_update_cron_worker' ] [ 'job_class' ] = 'CiPlatformMetricsUpdateCronWorker'
2021-04-17 20:07:23 +05:30
Settings . cron_jobs [ 'analytics_usage_trends_count_job_trigger_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'analytics_usage_trends_count_job_trigger_worker' ] [ 'cron' ] || = '50 23 */1 * *'
Settings . cron_jobs [ 'analytics_usage_trends_count_job_trigger_worker' ] [ 'job_class' ] || = 'Analytics::UsageTrends::CountJobTriggerWorker'
2021-01-03 14:25:43 +05:30
Settings . cron_jobs [ 'member_invitation_reminder_emails_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'member_invitation_reminder_emails_worker' ] [ 'cron' ] || = '0 0 * * *'
Settings . cron_jobs [ 'member_invitation_reminder_emails_worker' ] [ 'job_class' ] = 'MemberInvitationReminderEmailsWorker'
2021-01-29 00:20:46 +05:30
Settings . cron_jobs [ 'schedule_merge_request_cleanup_refs_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'schedule_merge_request_cleanup_refs_worker' ] [ 'cron' ] || = '* * * * *'
Settings . cron_jobs [ 'schedule_merge_request_cleanup_refs_worker' ] [ 'job_class' ] = 'ScheduleMergeRequestCleanupRefsWorker'
2021-02-22 17:27:13 +05:30
Settings . cron_jobs [ 'manage_evidence_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'manage_evidence_worker' ] [ 'cron' ] || = '0 * * * *'
Settings . cron_jobs [ 'manage_evidence_worker' ] [ 'job_class' ] = 'Releases::ManageEvidenceWorker'
2021-03-11 19:13:27 +05:30
Settings . cron_jobs [ 'user_status_cleanup_batch_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'user_status_cleanup_batch_worker' ] [ 'cron' ] || = '* * * * *'
Settings . cron_jobs [ 'user_status_cleanup_batch_worker' ] [ 'job_class' ] = 'UserStatusCleanup::BatchWorker'
2021-04-29 21:17:54 +05:30
Settings . cron_jobs [ 'ssh_keys_expired_notification_worker' ] || = Settingslogic . new ( { } )
2021-12-11 22:18:48 +05:30
Settings . cron_jobs [ 'ssh_keys_expired_notification_worker' ] [ 'cron' ] || = '0 2,14 * * *'
2021-04-29 21:17:54 +05:30
Settings . cron_jobs [ 'ssh_keys_expired_notification_worker' ] [ 'job_class' ] = 'SshKeys::ExpiredNotificationWorker'
Settings . cron_jobs [ 'namespaces_in_product_marketing_emails_worker' ] || = Settingslogic . new ( { } )
2021-06-08 01:23:25 +05:30
Settings . cron_jobs [ 'namespaces_in_product_marketing_emails_worker' ] [ 'cron' ] || = '0 16 * * *'
2021-04-29 21:17:54 +05:30
Settings . cron_jobs [ 'namespaces_in_product_marketing_emails_worker' ] [ 'job_class' ] = 'Namespaces::InProductMarketingEmailsWorker'
Settings . cron_jobs [ 'ssh_keys_expiring_soon_notification_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'ssh_keys_expiring_soon_notification_worker' ] [ 'cron' ] || = '0 1 * * *'
Settings . cron_jobs [ 'ssh_keys_expiring_soon_notification_worker' ] [ 'job_class' ] = 'SshKeys::ExpiringSoonNotificationWorker'
2021-06-08 01:23:25 +05:30
Settings . cron_jobs [ 'users_deactivate_dormant_users_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'users_deactivate_dormant_users_worker' ] [ 'cron' ] || = '21,42 0-4 * * *'
Settings . cron_jobs [ 'users_deactivate_dormant_users_worker' ] [ 'job_class' ] = 'Users::DeactivateDormantUsersWorker'
Settings . cron_jobs [ 'ci_delete_unit_tests_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'ci_delete_unit_tests_worker' ] [ 'cron' ] || = '0 0 * * *'
Settings . cron_jobs [ 'ci_delete_unit_tests_worker' ] [ 'job_class' ] = 'Ci::DeleteUnitTestsWorker'
2021-09-04 01:27:46 +05:30
Settings . cron_jobs [ 'batched_background_migrations_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'batched_background_migrations_worker' ] [ 'cron' ] || = '* * * * *'
Settings . cron_jobs [ 'batched_background_migrations_worker' ] [ 'job_class' ] = 'Database::BatchedBackgroundMigrationWorker'
2022-05-07 20:08:51 +05:30
Settings . cron_jobs [ 'batched_background_migration_worker_ci_database' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'batched_background_migration_worker_ci_database' ] [ 'cron' ] || = '* * * * *'
Settings . cron_jobs [ 'batched_background_migration_worker_ci_database' ] [ 'job_class' ] = 'Database::BatchedBackgroundMigration::CiDatabaseWorker'
2021-12-11 22:18:48 +05:30
Settings . cron_jobs [ 'issues_reschedule_stuck_issue_rebalances' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'issues_reschedule_stuck_issue_rebalances' ] [ 'cron' ] || = '*/15 * * * *'
Settings . cron_jobs [ 'issues_reschedule_stuck_issue_rebalances' ] [ 'job_class' ] = 'Issues::RescheduleStuckIssueRebalancesWorker'
Settings . cron_jobs [ 'clusters_integrations_check_prometheus_health_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'clusters_integrations_check_prometheus_health_worker' ] [ 'cron' ] || = '0 * * * *'
Settings . cron_jobs [ 'clusters_integrations_check_prometheus_health_worker' ] [ 'job_class' ] = 'Clusters::Integrations::CheckPrometheusHealthWorker'
2022-05-07 20:08:51 +05:30
Settings . cron_jobs [ 'projects_schedule_refresh_build_artifacts_size_statistics_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'projects_schedule_refresh_build_artifacts_size_statistics_worker' ] [ 'cron' ] || = '2/17 * * * *'
Settings . cron_jobs [ 'projects_schedule_refresh_build_artifacts_size_statistics_worker' ] [ 'job_class' ] = 'Projects::ScheduleRefreshBuildArtifactsSizeStatisticsWorker'
2022-07-16 23:28:13 +05:30
Settings . cron_jobs [ 'inactive_projects_deletion_cron_worker' ] || = Settingslogic . new ( { } )
2022-07-23 23:45:48 +05:30
Settings . cron_jobs [ 'inactive_projects_deletion_cron_worker' ] [ 'cron' ] || = '*/10 * * * *'
2022-07-16 23:28:13 +05:30
Settings . cron_jobs [ 'inactive_projects_deletion_cron_worker' ] [ 'job_class' ] = 'Projects::InactiveProjectsDeletionCronWorker'
Settings . cron_jobs [ 'loose_foreign_keys_cleanup_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'loose_foreign_keys_cleanup_worker' ] [ 'cron' ] || = '*/1 * * * *'
Settings . cron_jobs [ 'loose_foreign_keys_cleanup_worker' ] [ 'job_class' ] = 'LooseForeignKeys::CleanupWorker'
2022-08-13 15:12:31 +05:30
Settings . cron_jobs [ 'ci_runner_versions_reconciliation_worker' ] || = Settingslogic . new ( { } )
2022-08-27 11:52:29 +05:30
Settings . cron_jobs [ 'ci_runner_versions_reconciliation_worker' ] [ 'cron' ] || = '@daily'
2022-08-13 15:12:31 +05:30
Settings . cron_jobs [ 'ci_runner_versions_reconciliation_worker' ] [ 'job_class' ] = 'Ci::Runners::ReconcileExistingRunnerVersionsCronWorker'
2022-10-11 01:57:18 +05:30
Settings . cron_jobs [ 'users_migrate_records_to_ghost_user_in_batches_worker' ] || = Settingslogic . new ( { } )
2022-11-25 23:54:43 +05:30
Settings . cron_jobs [ 'users_migrate_records_to_ghost_user_in_batches_worker' ] [ 'cron' ] || = '*/2 * * * *'
2022-10-11 01:57:18 +05:30
Settings . cron_jobs [ 'users_migrate_records_to_ghost_user_in_batches_worker' ] [ 'job_class' ] = 'Users::MigrateRecordsToGhostUserInBatchesWorker'
2019-09-30 21:07:59 +05:30
Gitlab . ee do
2021-02-22 17:27:13 +05:30
Settings . cron_jobs [ 'analytics_devops_adoption_create_all_snapshots_worker' ] || = Settingslogic . new ( { } )
2021-09-30 23:02:18 +05:30
Settings . cron_jobs [ 'analytics_devops_adoption_create_all_snapshots_worker' ] [ 'cron' ] || = '0 1 * * *'
2021-02-22 17:27:13 +05:30
Settings . cron_jobs [ 'analytics_devops_adoption_create_all_snapshots_worker' ] [ 'job_class' ] = 'Analytics::DevopsAdoption::CreateAllSnapshotsWorker'
2022-05-07 20:08:51 +05:30
Settings . cron_jobs [ 'analytics_cycle_analytics_incremental_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'analytics_cycle_analytics_incremental_worker' ] [ 'cron' ] || = '*/10 * * * *'
Settings . cron_jobs [ 'analytics_cycle_analytics_incremental_worker' ] [ 'job_class' ] = 'Analytics::CycleAnalytics::IncrementalWorker'
Settings . cron_jobs [ 'analytics_cycle_analytics_consistency_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'analytics_cycle_analytics_consistency_worker' ] [ 'cron' ] || = '*/30 * * * *'
Settings . cron_jobs [ 'analytics_cycle_analytics_consistency_worker' ] [ 'job_class' ] = 'Analytics::CycleAnalytics::ConsistencyWorker'
2022-06-21 17:19:12 +05:30
Settings . cron_jobs [ 'analytics_cycle_analytics_reaggregation_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'analytics_cycle_analytics_reaggregation_worker' ] [ 'cron' ] || = '44 * * * *'
Settings . cron_jobs [ 'analytics_cycle_analytics_reaggregation_worker' ] [ 'job_class' ] = 'Analytics::CycleAnalytics::ReaggregationWorker'
2021-01-03 14:25:43 +05:30
Settings . cron_jobs [ 'active_user_count_threshold_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'active_user_count_threshold_worker' ] [ 'cron' ] || = '0 12 * * *'
Settings . cron_jobs [ 'active_user_count_threshold_worker' ] [ 'job_class' ] = 'ActiveUserCountThresholdWorker'
2020-01-01 13:55:28 +05:30
Settings . cron_jobs [ 'adjourned_group_deletion_worker' ] || = Settingslogic . new ( { } )
2022-05-07 20:08:51 +05:30
Settings . cron_jobs [ 'adjourned_group_deletion_worker' ] [ 'cron' ] || = '0 2 * * *'
2020-01-01 13:55:28 +05:30
Settings . cron_jobs [ 'adjourned_group_deletion_worker' ] [ 'job_class' ] = 'AdjournedGroupDeletionWorker'
2019-09-30 21:07:59 +05:30
Settings . cron_jobs [ 'clear_shared_runners_minutes_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'clear_shared_runners_minutes_worker' ] [ 'cron' ] || = '0 0 1 * *'
Settings . cron_jobs [ 'clear_shared_runners_minutes_worker' ] [ 'job_class' ] = 'ClearSharedRunnersMinutesWorker'
2020-01-01 13:55:28 +05:30
Settings . cron_jobs [ 'adjourned_projects_deletion_cron_worker' ] || = Settingslogic . new ( { } )
2022-05-07 20:08:51 +05:30
Settings . cron_jobs [ 'adjourned_projects_deletion_cron_worker' ] [ 'cron' ] || = '0 7 * * *'
2020-01-01 13:55:28 +05:30
Settings . cron_jobs [ 'adjourned_projects_deletion_cron_worker' ] [ 'job_class' ] = 'AdjournedProjectsDeletionCronWorker'
2021-02-22 17:27:13 +05:30
Settings . cron_jobs [ 'geo_verification_cron_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'geo_verification_cron_worker' ] [ 'cron' ] || = '* * * * *'
Settings . cron_jobs [ 'geo_verification_cron_worker' ] [ 'job_class' ] || = 'Geo::VerificationCronWorker'
2021-04-29 21:17:54 +05:30
Settings . cron_jobs [ 'geo_sync_timeout_cron_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'geo_sync_timeout_cron_worker' ] [ 'cron' ] || = '*/10 * * * *'
Settings . cron_jobs [ 'geo_sync_timeout_cron_worker' ] [ 'job_class' ] || = 'Geo::SyncTimeoutCronWorker'
2021-04-17 20:07:23 +05:30
Settings . cron_jobs [ 'geo_secondary_usage_data_cron_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'geo_secondary_usage_data_cron_worker' ] [ 'cron' ] || = '0 0 * * 0'
Settings . cron_jobs [ 'geo_secondary_usage_data_cron_worker' ] [ 'job_class' ] || = 'Geo::SecondaryUsageDataCronWorker'
2020-06-23 00:09:42 +05:30
Settings . cron_jobs [ 'geo_registry_sync_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'geo_registry_sync_worker' ] [ 'cron' ] || = '*/1 * * * *'
Settings . cron_jobs [ 'geo_registry_sync_worker' ] [ 'job_class' ] || = 'Geo::RegistrySyncWorker'
2019-09-30 21:07:59 +05:30
Settings . cron_jobs [ 'geo_metrics_update_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'geo_metrics_update_worker' ] [ 'cron' ] || = '*/1 * * * *'
Settings . cron_jobs [ 'geo_metrics_update_worker' ] [ 'job_class' ] || = 'Geo::MetricsUpdateWorker'
Settings . cron_jobs [ 'geo_prune_event_log_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'geo_prune_event_log_worker' ] [ 'cron' ] || = '*/5 * * * *'
Settings . cron_jobs [ 'geo_prune_event_log_worker' ] [ 'job_class' ] || = 'Geo::PruneEventLogWorker'
Settings . cron_jobs [ 'geo_repository_sync_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'geo_repository_sync_worker' ] [ 'cron' ] || = '*/1 * * * *'
Settings . cron_jobs [ 'geo_repository_sync_worker' ] [ 'job_class' ] || = 'Geo::RepositorySyncWorker'
2020-03-13 15:44:24 +05:30
Settings . cron_jobs [ 'geo_secondary_registry_consistency_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'geo_secondary_registry_consistency_worker' ] [ 'cron' ] || = '* * * * *'
Settings . cron_jobs [ 'geo_secondary_registry_consistency_worker' ] [ 'job_class' ] || = 'Geo::Secondary::RegistryConsistencyWorker'
2019-09-30 21:07:59 +05:30
Settings . cron_jobs [ 'geo_repository_verification_primary_batch_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'geo_repository_verification_primary_batch_worker' ] [ 'cron' ] || = '*/1 * * * *'
Settings . cron_jobs [ 'geo_repository_verification_primary_batch_worker' ] [ 'job_class' ] || = 'Geo::RepositoryVerification::Primary::BatchWorker'
Settings . cron_jobs [ 'geo_repository_verification_secondary_scheduler_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'geo_repository_verification_secondary_scheduler_worker' ] [ 'cron' ] || = '*/1 * * * *'
Settings . cron_jobs [ 'geo_repository_verification_secondary_scheduler_worker' ] [ 'job_class' ] || = 'Geo::RepositoryVerification::Secondary::SchedulerWorker'
Settings . cron_jobs [ 'historical_data_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'historical_data_worker' ] [ 'cron' ] || = '0 12 * * *'
Settings . cron_jobs [ 'historical_data_worker' ] [ 'job_class' ] = 'HistoricalDataWorker'
2021-01-03 14:25:43 +05:30
Settings . cron_jobs [ 'incident_sla_exceeded_check_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'incident_sla_exceeded_check_worker' ] [ 'cron' ] || = '*/2 * * * *'
Settings . cron_jobs [ 'incident_sla_exceeded_check_worker' ] [ 'job_class' ] = 'IncidentManagement::IncidentSlaExceededCheckWorker'
2021-03-11 19:13:27 +05:30
Settings . cron_jobs [ 'incident_management_persist_oncall_rotation_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'incident_management_persist_oncall_rotation_worker' ] [ 'cron' ] || = '*/5 * * * *'
Settings . cron_jobs [ 'incident_management_persist_oncall_rotation_worker' ] [ 'job_class' ] = 'IncidentManagement::OncallRotations::PersistAllRotationsShiftsJob'
2021-09-30 23:02:18 +05:30
Settings . cron_jobs [ 'incident_management_schedule_escalation_check_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'incident_management_schedule_escalation_check_worker' ] [ 'cron' ] || = '*/1 * * * *'
Settings . cron_jobs [ 'incident_management_schedule_escalation_check_worker' ] [ 'job_class' ] = 'IncidentManagement::PendingEscalations::ScheduleCheckCronWorker'
2019-12-21 20:55:43 +05:30
Settings . cron_jobs [ 'import_software_licenses_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'import_software_licenses_worker' ] [ 'cron' ] || = '0 3 * * 0'
Settings . cron_jobs [ 'import_software_licenses_worker' ] [ 'job_class' ] = 'ImportSoftwareLicensesWorker'
2019-09-30 21:07:59 +05:30
Settings . cron_jobs [ 'ldap_group_sync_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'ldap_group_sync_worker' ] [ 'cron' ] || = '0 * * * *'
Settings . cron_jobs [ 'ldap_group_sync_worker' ] [ 'job_class' ] = 'LdapAllGroupsSyncWorker'
Settings . cron_jobs [ 'ldap_sync_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'ldap_sync_worker' ] [ 'cron' ] || = '30 1 * * *'
Settings . cron_jobs [ 'ldap_sync_worker' ] [ 'job_class' ] = 'LdapSyncWorker'
Settings . cron_jobs [ 'update_max_seats_used_for_gitlab_com_subscriptions_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'update_max_seats_used_for_gitlab_com_subscriptions_worker' ] [ 'cron' ] || = '0 12 * * *'
Settings . cron_jobs [ 'update_max_seats_used_for_gitlab_com_subscriptions_worker' ] [ 'job_class' ] = 'UpdateMaxSeatsUsedForGitlabComSubscriptionsWorker'
2020-04-08 14:13:33 +05:30
Settings . cron_jobs [ 'elastic_index_bulk_cron_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'elastic_index_bulk_cron_worker' ] [ 'cron' ] || = '*/1 * * * *'
Settings . cron_jobs [ 'elastic_index_bulk_cron_worker' ] [ 'job_class' ] || = 'ElasticIndexBulkCronWorker'
2020-06-23 00:09:42 +05:30
Settings . cron_jobs [ 'elastic_index_initial_bulk_cron_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'elastic_index_initial_bulk_cron_worker' ] [ 'cron' ] || = '*/1 * * * *'
Settings . cron_jobs [ 'elastic_index_initial_bulk_cron_worker' ] [ 'job_class' ] || = 'ElasticIndexInitialBulkCronWorker'
2020-07-28 23:09:34 +05:30
Settings . cron_jobs [ 'elastic_cluster_reindexing_cron_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'elastic_cluster_reindexing_cron_worker' ] [ 'cron' ] || = '*/10 * * * *'
Settings . cron_jobs [ 'elastic_cluster_reindexing_cron_worker' ] [ 'job_class' ] || = 'ElasticClusterReindexingCronWorker'
2020-10-24 23:57:45 +05:30
Settings . cron_jobs [ 'elastic_remove_expired_namespace_subscriptions_from_index_cron_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'elastic_remove_expired_namespace_subscriptions_from_index_cron_worker' ] [ 'cron' ] || = '10 3 * * *'
Settings . cron_jobs [ 'elastic_remove_expired_namespace_subscriptions_from_index_cron_worker' ] [ 'job_class' ] || = 'ElasticRemoveExpiredNamespaceSubscriptionsFromIndexCronWorker'
2021-01-29 00:20:46 +05:30
Settings . cron_jobs [ 'elastic_migration_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'elastic_migration_worker' ] [ 'cron' ] || = '*/30 * * * *'
Settings . cron_jobs [ 'elastic_migration_worker' ] [ 'job_class' ] || = 'Elastic::MigrationWorker'
2020-04-08 14:13:33 +05:30
Settings . cron_jobs [ 'sync_seat_link_worker' ] || = Settingslogic . new ( { } )
2022-01-26 12:08:38 +05:30
Settings . cron_jobs [ 'sync_seat_link_worker' ] [ 'cron' ] || = " #{ rand ( 60 ) } #{ rand ( 3 .. 4 ) } * * * UTC "
2020-04-08 14:13:33 +05:30
Settings . cron_jobs [ 'sync_seat_link_worker' ] [ 'job_class' ] = 'SyncSeatLinkWorker'
2020-07-28 23:09:34 +05:30
Settings . cron_jobs [ 'users_create_statistics_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'users_create_statistics_worker' ] [ 'cron' ] || = '2 15 * * *'
Settings . cron_jobs [ 'users_create_statistics_worker' ] [ 'job_class' ] = 'Users::CreateStatisticsWorker'
Settings . cron_jobs [ 'iterations_update_status_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'iterations_update_status_worker' ] [ 'cron' ] || = '5 0 * * *'
Settings . cron_jobs [ 'iterations_update_status_worker' ] [ 'job_class' ] = 'IterationsUpdateStatusWorker'
2021-09-04 01:27:46 +05:30
Settings . cron_jobs [ 'iterations_generator_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'iterations_generator_worker' ] [ 'cron' ] || = '5 0 * * *'
Settings . cron_jobs [ 'iterations_generator_worker' ] [ 'job_class' ] = 'Iterations::Cadences::ScheduleCreateIterationsWorker'
2020-07-28 23:09:34 +05:30
Settings . cron_jobs [ 'vulnerability_statistics_schedule_worker' ] || = Settingslogic . new ( { } )
2023-01-13 00:05:48 +05:30
Settings . cron_jobs [ 'vulnerability_statistics_schedule_worker' ] [ 'cron' ] || = '15 1,20 * * *'
2020-07-28 23:09:34 +05:30
Settings . cron_jobs [ 'vulnerability_statistics_schedule_worker' ] [ 'job_class' ] = 'Vulnerabilities::Statistics::ScheduleWorker'
2020-10-24 23:57:45 +05:30
Settings . cron_jobs [ 'vulnerability_historical_statistics_deletion_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'vulnerability_historical_statistics_deletion_worker' ] [ 'cron' ] || = '15 3 * * *'
Settings . cron_jobs [ 'vulnerability_historical_statistics_deletion_worker' ] [ 'job_class' ] = 'Vulnerabilities::HistoricalStatistics::DeletionWorker'
2021-06-08 01:23:25 +05:30
Settings . cron_jobs [ 'security_create_orchestration_policy_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'security_create_orchestration_policy_worker' ] [ 'cron' ] || = '*/10 * * * *'
Settings . cron_jobs [ 'security_create_orchestration_policy_worker' ] [ 'job_class' ] = 'Security::CreateOrchestrationPolicyWorker'
Settings . cron_jobs [ 'security_orchestration_policy_rule_schedule_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'security_orchestration_policy_rule_schedule_worker' ] [ 'cron' ] || = '*/15 * * * *'
Settings . cron_jobs [ 'security_orchestration_policy_rule_schedule_worker' ] [ 'job_class' ] = 'Security::OrchestrationPolicyRuleScheduleWorker'
2022-11-25 23:54:43 +05:30
Settings . cron_jobs [ 'security_scans_purge_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'security_scans_purge_worker' ] [ 'cron' ] || = '0 */4 * * 6,0'
Settings . cron_jobs [ 'security_scans_purge_worker' ] [ 'job_class' ] = 'Security::Scans::PurgeWorker'
2021-10-27 15:23:28 +05:30
Settings . cron_jobs [ 'app_sec_dast_profile_schedule_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'app_sec_dast_profile_schedule_worker' ] [ 'cron' ] || = '7-59/15 * * * *'
Settings . cron_jobs [ 'app_sec_dast_profile_schedule_worker' ] [ 'job_class' ] = 'AppSec::Dast::ProfileScheduleWorker'
2022-06-21 17:19:12 +05:30
Settings . cron_jobs [ 'ci_namespace_mirrors_consistency_check_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'ci_namespace_mirrors_consistency_check_worker' ] [ 'cron' ] || = '*/4 * * * *'
Settings . cron_jobs [ 'ci_namespace_mirrors_consistency_check_worker' ] [ 'job_class' ] = 'Database::CiNamespaceMirrorsConsistencyCheckWorker'
Settings . cron_jobs [ 'ci_project_mirrors_consistency_check_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'ci_project_mirrors_consistency_check_worker' ] [ 'cron' ] || = '2-58/4 * * * *'
Settings . cron_jobs [ 'ci_project_mirrors_consistency_check_worker' ] [ 'job_class' ] = 'Database::CiProjectMirrorsConsistencyCheckWorker'
2022-07-16 23:28:13 +05:30
Settings . cron_jobs [ 'arkose_blocked_users_report_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'arkose_blocked_users_report_worker' ] [ 'cron' ] || = '0 6 * * *'
Settings . cron_jobs [ 'arkose_blocked_users_report_worker' ] [ 'job_class' ] = 'Arkose::BlockedUsersReportWorker'
Settings . cron_jobs [ 'ci_runners_stale_group_runners_prune_worker_cron' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'ci_runners_stale_group_runners_prune_worker_cron' ] [ 'cron' ] || = '30 * * * *'
Settings . cron_jobs [ 'ci_runners_stale_group_runners_prune_worker_cron' ] [ 'job_class' ] = 'Ci::Runners::StaleGroupRunnersPruneCronWorker'
2022-07-23 23:45:48 +05:30
Settings . cron_jobs [ 'licenses_reset_submit_license_usage_data_banner' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'licenses_reset_submit_license_usage_data_banner' ] [ 'cron' ] || = " 0 0 * * * "
Settings . cron_jobs [ 'licenses_reset_submit_license_usage_data_banner' ] [ 'job_class' ] = 'Licenses::ResetSubmitLicenseUsageDataBannerWorker'
2022-08-27 11:52:29 +05:30
Gitlab . com do
Settings . cron_jobs [ 'disable_legacy_open_source_license_for_inactive_projects' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'disable_legacy_open_source_license_for_inactive_projects' ] [ 'cron' ] || = " 30 5 * * 0 "
Settings . cron_jobs [ 'disable_legacy_open_source_license_for_inactive_projects' ] [ 'job_class' ] = 'Projects::DisableLegacyOpenSourceLicenseForInactiveProjectsWorker'
2023-03-04 22:38:38 +05:30
Settings . cron_jobs [ 'notify_seats_exceeded_batch_worker' ] || = Settingslogic . new ( { } )
Settings . cron_jobs [ 'notify_seats_exceeded_batch_worker' ] [ 'cron' ] || = '0 3 * * *'
Settings . cron_jobs [ 'notify_seats_exceeded_batch_worker' ] [ 'job_class' ] || = 'GitlabSubscriptions::NotifySeatsExceededBatchWorker'
2022-08-27 11:52:29 +05:30
end
2019-09-30 21:07:59 +05:30
end
2019-07-07 11:18:12 +05:30
2018-05-09 12:01:36 +05:30
#
# Sidekiq
#
Settings [ 'sidekiq' ] || = Settingslogic . new ( { } )
Settings [ 'sidekiq' ] [ 'log_format' ] || = 'default'
2022-11-25 23:54:43 +05:30
Settings [ 'sidekiq' ] [ 'routing_rules' ] || = [ ]
2018-05-09 12:01:36 +05:30
2014-09-02 18:07:02 +05:30
#
# GitLab Shell
#
Settings [ 'gitlab_shell' ] || = Settingslogic . new ( { } )
2017-08-17 22:00:37 +05:30
Settings . gitlab_shell [ 'path' ] = Settings . absolute ( Settings . gitlab_shell [ 'path' ] || Settings . gitlab [ 'user_home' ] + '/gitlab-shell/' )
2019-07-07 11:18:12 +05:30
Settings . gitlab_shell [ 'hooks_path' ] = :deprecated_use_gitlab_shell_path_instead
2019-12-04 20:38:33 +05:30
Settings . gitlab_shell [ 'authorized_keys_file' ] || = File . join ( Dir . home , '.ssh' , 'authorized_keys' )
2015-09-11 14:41:01 +05:30
Settings . gitlab_shell [ 'secret_file' ] || = Rails . root . join ( '.gitlab_shell_secret' )
2014-09-02 18:07:02 +05:30
Settings . gitlab_shell [ 'receive_pack' ] = true if Settings . gitlab_shell [ 'receive_pack' ] . nil?
Settings . gitlab_shell [ 'upload_pack' ] = true if Settings . gitlab_shell [ 'upload_pack' ] . nil?
Settings . gitlab_shell [ 'ssh_host' ] || = Settings . gitlab . ssh_host
Settings . gitlab_shell [ 'ssh_port' ] || = 22
2020-04-08 14:13:33 +05:30
Settings . gitlab_shell [ 'ssh_user' ] = Settings . gitlab . ssh_user
2014-09-02 18:07:02 +05:30
Settings . gitlab_shell [ 'owner_group' ] || = Settings . gitlab . user
2017-08-17 22:00:37 +05:30
Settings . gitlab_shell [ 'ssh_path_prefix' ] || = Settings . __send__ ( :build_gitlab_shell_ssh_path_prefix )
2018-03-17 18:26:18 +05:30
Settings . gitlab_shell [ 'git_timeout' ] || = 10800
2017-08-17 22:00:37 +05:30
2020-07-28 23:09:34 +05:30
# Object storage
ObjectStoreSettings . new ( Settings ) . parse!
2017-08-17 22:00:37 +05:30
#
# Workhorse
#
Settings [ 'workhorse' ] || = Settingslogic . new ( { } )
Settings . workhorse [ 'secret_file' ] || = Rails . root . join ( '.gitlab_workhorse_secret' )
2014-09-02 18:07:02 +05:30
2020-11-24 15:15:51 +05:30
#
# GitLab KAS
#
Settings [ 'gitlab_kas' ] || = Settingslogic . new ( { } )
2021-04-17 20:07:23 +05:30
Settings . gitlab_kas [ 'enabled' ] || = false
2020-11-24 15:15:51 +05:30
Settings . gitlab_kas [ 'secret_file' ] || = Rails . root . join ( '.gitlab_kas_secret' )
2021-04-17 20:07:23 +05:30
Settings . gitlab_kas [ 'external_url' ] || = 'wss://kas.example.com'
Settings . gitlab_kas [ 'internal_url' ] || = 'grpc://localhost:8153'
2021-11-18 22:05:49 +05:30
# Settings.gitlab_kas['external_k8s_proxy_url'] ||= 'grpc://localhost:8154' # NOTE: Do not set a default until all distributions have been updated with a correct value
2020-11-24 15:15:51 +05:30
2016-08-24 12:49:21 +05:30
#
# Repositories
#
Settings [ 'repositories' ] || = Settingslogic . new ( { } )
Settings . repositories [ 'storages' ] || = { }
2017-08-17 22:00:37 +05:30
2018-03-17 18:26:18 +05:30
Settings . repositories . storages . each do | key , storage |
2018-05-09 12:01:36 +05:30
Settings . repositories . storages [ key ] = Gitlab :: GitalyClient :: StorageSettings . new ( storage )
2017-08-17 22:00:37 +05:30
end
2016-08-24 12:49:21 +05:30
#
# The repository_downloads_path is used to remove outdated repository
# archives, if someone has it configured incorrectly, and it points
# to the path where repositories are stored this can cause some
# data-integrity issue. In this case, we sets it to the default
# repository_downloads_path value.
#
2017-08-17 22:00:37 +05:30
repositories_storages = Settings . repositories . storages . values
2018-03-17 18:26:18 +05:30
repository_downloads_path = Settings . gitlab [ 'repository_downloads_path' ] . to_s . gsub ( %r{ /$ } , '' )
2016-08-24 12:49:21 +05:30
repository_downloads_full_path = File . expand_path ( repository_downloads_path , Settings . gitlab [ 'user_home' ] )
2018-11-08 19:23:39 +05:30
# Gitaly migration: https://gitlab.com/gitlab-org/gitaly/issues/1255
Gitlab :: GitalyClient :: StorageSettings . allow_disk_access do
if repository_downloads_path . blank? || repositories_storages . any? { | rs | [ repository_downloads_path , repository_downloads_full_path ] . include? ( rs . legacy_disk_path . gsub ( %r{ /$ } , '' ) ) }
Settings . gitlab [ 'repository_downloads_path' ] = File . join ( Settings . shared [ 'path' ] , 'cache/archive' )
end
2016-08-24 12:49:21 +05:30
end
2014-09-02 18:07:02 +05:30
#
# Backup
#
Settings [ 'backup' ] || = Settingslogic . new ( { } )
2020-03-13 15:44:24 +05:30
Settings . backup [ 'keep_time' ] || = 0
2015-09-25 12:07:36 +05:30
Settings . backup [ 'pg_schema' ] = nil
2017-08-17 22:00:37 +05:30
Settings . backup [ 'path' ] = Settings . absolute ( Settings . backup [ 'path' ] || " tmp/backups/ " )
2016-06-02 11:05:42 +05:30
Settings . backup [ 'archive_permissions' ] || = 0600
2015-04-26 12:48:37 +05:30
Settings . backup [ 'upload' ] || = Settingslogic . new ( { 'remote_directory' = > nil , 'connection' = > nil } )
2015-09-11 14:41:01 +05:30
Settings . backup [ 'upload' ] [ 'multipart_chunk_size' ] || = 104857600
2015-10-24 18:46:33 +05:30
Settings . backup [ 'upload' ] [ 'encryption' ] || = nil
2019-03-02 22:35:43 +05:30
Settings . backup [ 'upload' ] [ 'encryption_key' ] || = ENV [ 'GITLAB_BACKUP_ENCRYPTION_KEY' ]
2017-08-17 22:00:37 +05:30
Settings . backup [ 'upload' ] [ 'storage_class' ] || = nil
2021-09-30 23:02:18 +05:30
Settings . backup [ 'gitaly_backup_path' ] || = Gitlab :: Utils . which ( 'gitaly-backup' )
2014-09-02 18:07:02 +05:30
#
# Git
#
Settings [ 'git' ] || = Settingslogic . new ( { } )
2018-03-17 18:26:18 +05:30
Settings . git [ 'bin_path' ] || = '/usr/bin/git'
2014-09-02 18:07:02 +05:30
2015-11-26 14:37:03 +05:30
# Important: keep the satellites.path setting until GitLab 9.0 at
# least. This setting is fed to 'rm -rf' in
# db/migrate/20151023144219_remove_satellites.rb
2014-09-02 18:07:02 +05:30
Settings [ 'satellites' ] || = Settingslogic . new ( { } )
2017-08-17 22:00:37 +05:30
Settings . satellites [ 'path' ] = Settings . absolute ( Settings . satellites [ 'path' ] || " tmp/repo_satellites/ " )
2015-11-26 14:37:03 +05:30
2022-10-11 01:57:18 +05:30
#
# Microsoft Graph Mailer
#
Settings [ 'microsoft_graph_mailer' ] || = Settingslogic . new ( { } )
Settings . microsoft_graph_mailer [ 'enabled' ] = false if Settings . microsoft_graph_mailer [ 'enabled' ] . nil?
Settings . microsoft_graph_mailer [ 'user_id' ] || = nil
Settings . microsoft_graph_mailer [ 'tenant' ] || = nil
Settings . microsoft_graph_mailer [ 'client_id' ] || = nil
Settings . microsoft_graph_mailer [ 'client_secret' ] || = nil
Settings . microsoft_graph_mailer [ 'azure_ad_endpoint' ] || = 'https://login.microsoftonline.com'
Settings . microsoft_graph_mailer [ 'graph_endpoint' ] || = 'https://graph.microsoft.com'
2019-09-30 21:07:59 +05:30
#
# Kerberos
#
Gitlab . ee do
Settings [ 'kerberos' ] || = Settingslogic . new ( { } )
Settings . kerberos [ 'enabled' ] = false if Settings . kerberos [ 'enabled' ] . nil?
Settings . kerberos [ 'keytab' ] = nil if Settings . kerberos [ 'keytab' ] . blank? # nil means use default keytab
2021-01-03 14:25:43 +05:30
Settings . kerberos [ 'simple_ldap_linking_allowed_realms' ] = [ ] if Settings . kerberos [ 'simple_ldap_linking_allowed_realms' ] . blank?
2019-09-30 21:07:59 +05:30
Settings . kerberos [ 'service_principal_name' ] = nil if Settings . kerberos [ 'service_principal_name' ] . blank? # nil means any SPN in keytab
Settings . kerberos [ 'use_dedicated_port' ] = false if Settings . kerberos [ 'use_dedicated_port' ] . nil?
Settings . kerberos [ 'https' ] = Settings . gitlab . https if Settings . kerberos [ 'https' ] . nil?
Settings . kerberos [ 'port' ] || = Settings . kerberos . https ? 8443 : 8088
2022-10-11 01:57:18 +05:30
if Settings . kerberos [ 'enabled' ] && ! Settings . omniauth . providers . map ( & :name ) . include? ( 'kerberos' )
Settings . omniauth . providers << Settingslogic . new ( { 'name' = > 'kerberos' } )
2019-09-30 21:07:59 +05:30
end
end
2020-04-22 19:07:51 +05:30
#
# Smartcard
#
Gitlab . ee do
Settings [ 'smartcard' ] || = Settingslogic . new ( { } )
Settings . smartcard [ 'enabled' ] = false if Settings . smartcard [ 'enabled' ] . nil?
Settings . smartcard [ 'client_certificate_required_host' ] = Settings . gitlab . host if Settings . smartcard [ 'client_certificate_required_host' ] . nil?
Settings . smartcard [ 'client_certificate_required_port' ] = 3444 if Settings . smartcard [ 'client_certificate_required_port' ] . nil?
Settings . smartcard [ 'required_for_git_access' ] = false if Settings . smartcard [ 'required_for_git_access' ] . nil?
Settings . smartcard [ 'san_extensions' ] = false if Settings . smartcard [ 'san_extensions' ] . nil?
end
2021-01-03 14:25:43 +05:30
#
# FortiAuthenticator
#
Settings [ 'forti_authenticator' ] || = Settingslogic . new ( { } )
Settings . forti_authenticator [ 'enabled' ] = false if Settings . forti_authenticator [ 'enabled' ] . nil?
Settings . forti_authenticator [ 'port' ] = 443 if Settings . forti_authenticator [ 'port' ] . to_i == 0
2021-02-22 17:27:13 +05:30
#
# FortiToken Cloud
#
Settings [ 'forti_token_cloud' ] || = Settingslogic . new ( { } )
Settings . forti_token_cloud [ 'enabled' ] = false if Settings . forti_token_cloud [ 'enabled' ] . nil?
2014-09-02 18:07:02 +05:30
#
# Extra customization
#
Settings [ 'extra' ] || = Settingslogic . new ( { } )
2021-02-22 17:27:13 +05:30
Settings . extra [ 'matomo_site_id' ] || = Settings . extra [ 'piwik_site_id' ] if Settings . extra [ 'piwik_site_id' ] . present?
Settings . extra [ 'matomo_url' ] || = Settings . extra [ 'piwik_url' ] if Settings . extra [ 'piwik_url' ] . present?
2021-03-11 19:13:27 +05:30
Settings . extra [ 'matomo_disable_cookies' ] = false if Settings . extra [ 'matomo_disable_cookies' ] . nil?
2021-06-08 01:23:25 +05:30
Settings . extra [ 'maximum_text_highlight_size_kilobytes' ] = Settings . extra . fetch ( 'maximum_text_highlight_size_kilobytes' , 512 ) . kilobytes
2014-09-02 18:07:02 +05:30
2015-04-26 12:48:37 +05:30
#
# Rack::Attack settings
#
Settings [ 'rack_attack' ] || = Settingslogic . new ( { } )
Settings . rack_attack [ 'git_basic_auth' ] || = Settingslogic . new ( { } )
2018-11-18 11:00:15 +05:30
Settings . rack_attack . git_basic_auth [ 'enabled' ] = false if Settings . rack_attack . git_basic_auth [ 'enabled' ] . nil?
2015-04-26 12:48:37 +05:30
Settings . rack_attack . git_basic_auth [ 'ip_whitelist' ] || = %w{ 127.0.0.1 }
Settings . rack_attack . git_basic_auth [ 'maxretry' ] || = 10
Settings . rack_attack . git_basic_auth [ 'findtime' ] || = 1 . minute
Settings . rack_attack . git_basic_auth [ 'bantime' ] || = 1 . hour
2017-08-17 22:00:37 +05:30
#
# Gitaly
#
Settings [ 'gitaly' ] || = Settingslogic . new ( { } )
#
# Webpack settings
#
Settings [ 'webpack' ] || = Settingslogic . new ( { } )
2021-01-03 14:25:43 +05:30
Settings . webpack [ 'config_file' ] || = 'config/webpack.config.js'
Settings . webpack [ 'output_dir' ] || = 'public/assets/webpack'
Settings . webpack [ 'public_path' ] || = 'assets/webpack'
Settings . webpack [ 'manifest_filename' ] || = 'manifest.json'
2017-08-17 22:00:37 +05:30
Settings . webpack [ 'dev_server' ] || = Settingslogic . new ( { } )
Settings . webpack . dev_server [ 'enabled' ] || = false
Settings . webpack . dev_server [ 'host' ] || = 'localhost'
Settings . webpack . dev_server [ 'port' ] || = 3808
2021-01-03 14:25:43 +05:30
Settings . webpack . dev_server [ 'https' ] || = false
2017-08-17 22:00:37 +05:30
2017-09-10 17:25:29 +05:30
#
# Monitoring settings
#
Settings [ 'monitoring' ] || = Settingslogic . new ( { } )
Settings . monitoring [ 'ip_whitelist' ] || = [ '127.0.0.1/8' ]
2022-01-26 12:08:38 +05:30
2017-09-10 17:25:29 +05:30
Settings . monitoring [ 'sidekiq_exporter' ] || = Settingslogic . new ( { } )
Settings . monitoring . sidekiq_exporter [ 'enabled' ] || = false
2020-11-24 15:15:51 +05:30
Settings . monitoring . sidekiq_exporter [ 'log_enabled' ] || = false
2017-09-10 17:25:29 +05:30
Settings . monitoring . sidekiq_exporter [ 'address' ] || = 'localhost'
2019-12-21 20:55:43 +05:30
Settings . monitoring . sidekiq_exporter [ 'port' ] || = 8082
2022-08-13 15:12:31 +05:30
Settings . monitoring . sidekiq_exporter [ 'tls_enabled' ] || = false
Settings . monitoring . sidekiq_exporter [ 'tls_cert_path' ] || = nil
Settings . monitoring . sidekiq_exporter [ 'tls_key_path' ] || = nil
2022-01-26 12:08:38 +05:30
Settings . monitoring [ 'sidekiq_health_checks' ] || = Settingslogic . new ( { } )
2022-07-16 23:28:13 +05:30
Settings . monitoring . sidekiq_health_checks [ 'enabled' ] || = false
Settings . monitoring . sidekiq_health_checks [ 'address' ] || = 'localhost'
Settings . monitoring . sidekiq_health_checks [ 'port' ] || = 8092
2022-01-26 12:08:38 +05:30
2019-12-21 20:55:43 +05:30
Settings . monitoring [ 'web_exporter' ] || = Settingslogic . new ( { } )
Settings . monitoring . web_exporter [ 'enabled' ] || = false
2023-01-13 00:05:48 +05:30
Settings . monitoring . web_exporter [ 'log_enabled' ] || = true
2019-12-21 20:55:43 +05:30
Settings . monitoring . web_exporter [ 'address' ] || = 'localhost'
Settings . monitoring . web_exporter [ 'port' ] || = 8083
2022-08-13 15:12:31 +05:30
Settings . monitoring . web_exporter [ 'tls_enabled' ] || = false
Settings . monitoring . web_exporter [ 'tls_cert_path' ] || = nil
Settings . monitoring . web_exporter [ 'tls_key_path' ] || = nil
2019-12-26 22:10:19 +05:30
2021-03-08 18:12:59 +05:30
#
# Prometheus settings
#
Settings [ 'prometheus' ] || = Settingslogic . new ( { } )
2021-09-30 23:02:18 +05:30
Settings . prometheus [ 'enabled' ] || = false
Settings . prometheus [ 'server_address' ] || = nil
2021-03-08 18:12:59 +05:30
2023-03-04 22:38:38 +05:30
#
# Bullet settings
#
Settings [ 'bullet' ] || = Settingslogic . new ( { } )
Settings . bullet [ 'enabled' ] || = Rails . env . development?
2019-12-26 22:10:19 +05:30
#
# Shutdown settings
#
Settings [ 'shutdown' ] || = Settingslogic . new ( { } )
Settings . shutdown [ 'blackout_seconds' ] || = 10
2017-09-10 17:25:29 +05:30
2014-09-02 18:07:02 +05:30
#
# Testing settings
#
if Rails . env . test?
Settings . gitlab [ 'default_projects_limit' ] = 42
2022-11-25 23:54:43 +05:30
# `default_can_create_group` is deprecated since GitLab 15.5 in favour of the `can_create_group` column on `ApplicationSetting`.
2014-09-02 18:07:02 +05:30
Settings . gitlab [ 'default_can_create_group' ] = true
Settings . gitlab [ 'default_can_create_team' ] = false
end