Date: Wednesday, June 1, 2022 @ 18:16:04 Author: anatolik Revision: 1218328
archrelease: copy trunk to community-x86_64 Added: gitlab/repos/community-x86_64/PKGBUILD (from rev 1218327, gitlab/trunk/PKGBUILD) gitlab/repos/community-x86_64/configs.patch (from rev 1218327, gitlab/trunk/configs.patch) gitlab/repos/community-x86_64/environment (from rev 1218327, gitlab/trunk/environment) gitlab/repos/community-x86_64/fixes.patch (from rev 1218327, gitlab/trunk/fixes.patch) gitlab/repos/community-x86_64/gitlab-backup.service (from rev 1218327, gitlab/trunk/gitlab-backup.service) gitlab/repos/community-x86_64/gitlab-backup.timer (from rev 1218327, gitlab/trunk/gitlab-backup.timer) gitlab/repos/community-x86_64/gitlab-mailroom.service (from rev 1218327, gitlab/trunk/gitlab-mailroom.service) gitlab/repos/community-x86_64/gitlab-puma.service (from rev 1218327, gitlab/trunk/gitlab-puma.service) gitlab/repos/community-x86_64/gitlab-sidekiq.service (from rev 1218327, gitlab/trunk/gitlab-sidekiq.service) gitlab/repos/community-x86_64/gitlab.install (from rev 1218327, gitlab/trunk/gitlab.install) gitlab/repos/community-x86_64/gitlab.logrotate (from rev 1218327, gitlab/trunk/gitlab.logrotate) gitlab/repos/community-x86_64/gitlab.target (from rev 1218327, gitlab/trunk/gitlab.target) gitlab/repos/community-x86_64/gitlab.tmpfiles.d (from rev 1218327, gitlab/trunk/gitlab.tmpfiles.d) Deleted: gitlab/repos/community-x86_64/PKGBUILD gitlab/repos/community-x86_64/configs.patch gitlab/repos/community-x86_64/environment gitlab/repos/community-x86_64/fixes.patch gitlab/repos/community-x86_64/gitlab-backup.service gitlab/repos/community-x86_64/gitlab-backup.timer gitlab/repos/community-x86_64/gitlab-mailroom.service gitlab/repos/community-x86_64/gitlab-puma.service gitlab/repos/community-x86_64/gitlab-sidekiq.service gitlab/repos/community-x86_64/gitlab.install gitlab/repos/community-x86_64/gitlab.logrotate gitlab/repos/community-x86_64/gitlab.target gitlab/repos/community-x86_64/gitlab.tmpfiles.d -------------------------+ PKGBUILD | 370 ++++++++++++++-------------- configs.patch | 604 +++++++++++++++++++++++----------------------- environment | 6 fixes.patch | 40 +-- gitlab-backup.service | 38 +- gitlab-backup.timer | 20 - gitlab-mailroom.service | 42 +-- gitlab-puma.service | 68 ++--- gitlab-sidekiq.service | 60 ++-- gitlab.install | 68 ++--- gitlab.logrotate | 12 gitlab.target | 14 - gitlab.tmpfiles.d | 2 13 files changed, 672 insertions(+), 672 deletions(-) Deleted: PKGBUILD =================================================================== --- PKGBUILD 2022-06-01 18:14:59 UTC (rev 1218327) +++ PKGBUILD 2022-06-01 18:16:04 UTC (rev 1218328) @@ -1,185 +0,0 @@ -# Maintainer: Anatol Pomozov <anatol.pomo...@gmail.com> -# Contributor: Sven-Hendrik Haase <svenst...@gmail.com> -# Contributor: Pavol (Lopo) Hluchy <lopo AT losys DOT eu> -# Contributor: Jonas Heinrich <o...@project-insanity.org> -# Contributor: Massimiliano Torromeo <massimiliano.torro...@gmail.com> -# Contributor: Tobias Hunger <tobias DOT hunger AT gmail DOT com> -# Contributor: Stefan Tatschner <ste...@sevenbyte.org> -# Contributor: Caleb Maclennan <ca...@alerque.com> - -pkgname=gitlab -pkgver=14.10.2 -pkgrel=1 -pkgdesc="Project management and code hosting application" -arch=('x86_64') -url="https://gitlab.com/gitlab-org/gitlab-foss" -license=('MIT') -options=(!buildflags) -depends=('ruby2.7' 'git' 'gitlab-workhorse' 'gitlab-gitaly' 'openssh' 'redis' 'libxslt' 'icu' 're2' 'http-parser' 'nodejs' 'openssl') -makedepends=('cmake' 'postgresql' 'yarn' 'go' 'nodejs') -optdepends=('postgresql: database backend' - 'python-docutils: reStructuredText markup language support' - 'smtp-server: mail server in order to receive mail notifications') -backup=("etc/webapps/gitlab/database.yml" - "etc/webapps/gitlab/gitlab.yml" - "etc/webapps/gitlab/resque.yml" - "etc/webapps/gitlab/puma.rb" - "etc/webapps/gitlab/smtp_settings.rb" - "etc/logrotate.d/gitlab") -source=(git+https://gitlab.com/gitlab-org/gitlab-foss.git#tag=v$pkgver - configs.patch - fixes.patch - environment - gitlab-puma.service - gitlab-sidekiq.service - gitlab-backup.service - gitlab-mailroom.service - gitlab-backup.timer - gitlab.target - gitlab.tmpfiles.d - gitlab.logrotate) -install='gitlab.install' -sha512sums=('SKIP' - '8de5f5a11a8b772d13e6c056e9150f253b6bb0ab21c7d3913c848571cfea2a5fb64f65511b4da1773c7a225efac66ea4010dedbbaec117bd6f43864a0960018a' - '3eb5058d6edc2d16f5558a3ee485ba796aa64fb4b9eb7595390322344b809fcb47a45be9d7fe36c822ac2724aeecb2905a0ea9a868a56349ac2bc5c8c9f070e3' - '5b1ca2958f03a5baf1c5576a1568072e8ed749e2d15745ecbcc4860d2dbd543f2f3ed077e8d87afac2670c9436b19fe498217b49916d56a4e31fb9811aeb9067' - '451a030940f124bccd6d29c1924861b361d52db32cff6e745c144286c2afc7065e117f825721145ed2dd4406f5bcfa97e228a80b968aaa9a675613b71b776eba' - '419848c668928276620b5229e457a39e0ed7e111f1da68a30c3e0ae1a644af1c869b004b35435ccec4ddcdf6cf7418b1ab71e6e2ee8a2c861c6625c8bfd908f6' - 'd86e16747ad79f514ce180646c68bec8b6fa61764b2b14b1621db998f48955c3fb81f4e19ecb0fbab9d603dd25d95929e6d72a473652608373e6551f26244738' - 'f8067d1ee444a50dc9b2ed871974225ad521c310eb191e075adb0e45e47168da7d16b92f2e40d7ce755041dd4426a05f0ad1385392b4db526aeaf8a638eb024f' - 'c76d634647336aaf157bc66ba094a363e971c0d275875a7df4521819147f54cd4c709eb8e024cdac9e900d99167e8a78a222587e7292e915573ef29060e6ec21' - '879be339148123e32b58a5669fdd3d3bb8b5d711326cb618f95b1680a6ac3a83c85d8862f2691b352fa26c95e4764dbb827856e22a3e2b9e4a76c13fe42864b5' - 'abacbff0d7be918337a17b56481c84e6bf3eddd9551efe78ba9fb74337179e95c9b60f41c49f275e05074a4074a616be36fa208a48fc12d5b940f0554fbd89c3' - '88e199d2f63e4f235930c35c6dfde80e6010e590907bd4de0af1fbfe6d5491ff56845aefcfe8edefa707712bd84fef96880655747b8bfb949ceeadc0456b0121') - - -_appdir="/usr/share/webapps/gitlab" # the app source code location -_etcdir="/etc/webapps/gitlab" -_datadir="/var/lib/gitlab" # directory with gitlab data and it also $HOME for 'gitlab' user -_logdir="/var/log/gitlab" - -prepare() { - cd gitlab-foss - - # GitLab tries to read its revision information from a file. - git rev-parse --short HEAD > REVISION - - patch -p1 < ../fixes.patch - patch -p1 < ../configs.patch - # '/home/git' path in the config files indicates a default path that need to be adjusted - grep -FqR '/home/git' config || exit 1 - - cp config/gitlab.yml.example config/gitlab.yml - cp config/database.yml.postgresql config/database.yml - cp config/puma.rb.example config/puma.rb - cp config/resque.yml.example config/resque.yml - cp config/initializers/smtp_settings.rb.sample config/initializers/smtp_settings.rb - - echo "Setting up systemd service files ..." - for service_file in gitlab-sidekiq.service gitlab-puma.service gitlab.logrotate gitlab-backup.service gitlab-mailroom.service; do - sed -i "s|<DATADIR>|${_datadir}|g" "${srcdir}/${service_file}" - sed -i "s|<APPDIR>|${_appdir}|g" "${srcdir}/${service_file}" - sed -i "s|<LOGDIR>|${_logdir}|g" "${srcdir}/${service_file}" - done - - # https://github.com/bundler/bundler/issues/6882 - sed -e '/BUNDLED WITH/,+1d' -i Gemfile.lock - bundle-2.7 lock --update=bundler-audit - # 'lock' adds 'BUNDLED WITH' back. Remove it again. - sed -e '/BUNDLED WITH/,+1d' -i Gemfile.lock -} - -build() { - cd gitlab-foss - - echo "Fetching bundled gems..." - # Gems will be installed into vendor/bundle - bundle-2.7 config build.gpgme --use-system-libraries # See https://bugs.archlinux.org/task/63654 - bundle-2.7 config force_ruby_platform true # some native gems are not available for newer ruby - bundle-2.7 install --jobs=$(nproc) --no-cache --deployment --without development test aws kerberos - - yarn install --production --pure-lockfile - bundle-2.7 exec rake gettext:compile RAILS_ENV=production NODE_ENV=production USE_DB=false SKIP_STORAGE_VALIDATION=true NODE_OPTIONS="--max_old_space_size=3584" - bundle-2.7 exec rake gitlab:assets:compile RAILS_ENV=production NODE_ENV=production USE_DB=false SKIP_STORAGE_VALIDATION=true NODE_OPTIONS="--max_old_space_size=3584" -} - -package() { - depends+=('gitlab-shell') - - cd gitlab-foss - - install -d "${pkgdir}/usr/share/webapps" - - cp -r "${srcdir}"/gitlab-foss "${pkgdir}${_appdir}" - # Remove unneeded directories: node_modules is only needed during build - rm -r "${pkgdir}${_appdir}/node_modules" - # https://gitlab.com/gitlab-org/omnibus-gitlab/blob/194cf8f12e51c26980c09de6388bbd08409e1209/config/software/gitlab-rails.rb#L179 - for dir in spec qa rubocop app/assets vendor/assets; do - rm -r "${pkgdir}${_appdir}/${dir}" - done - - chown -R root:root "${pkgdir}${_appdir}" - chmod 755 "${pkgdir}${_appdir}" - - install -dm750 -o 105 -g 105 "${pkgdir}${_datadir}" - install -dm750 -o 105 -g 105 "${pkgdir}${_datadir}/satellites" - install -dm750 -o 105 -g 105 "${pkgdir}${_datadir}/shared/"{,artifacts,lfs-objects} - install -dm750 -o 105 -g 105 "${pkgdir}${_datadir}/builds" - install -dm700 -o 105 -g 105 "${pkgdir}${_datadir}/uploads" - install -dm750 -o 105 -g 105 "${pkgdir}${_datadir}/backups" - install -dm755 -o 105 -g 105 "${pkgdir}${_etcdir}" - install -dm755 -o 105 -g 105 "${pkgdir}${_logdir}" - install -dm755 "${pkgdir}/usr/share/doc/gitlab" - - rm -r "${pkgdir}${_appdir}"/{.git,builds,tmp,log,shared} - - # Rails app hardcodes/configures by default that data is stored under $_appdir - # Create symlinks that point to data directories under /var - ln -fs "${_logdir}" "${pkgdir}${_appdir}/log" - ln -fs "${_datadir}/builds" "${pkgdir}${_appdir}/builds" - mkdir "${pkgdir}${_appdir}/tmp/" - ln -fs "${_datadir}/backups" "${pkgdir}${_appdir}/tmp/backups" - ln -fs "${_datadir}/uploads" "${pkgdir}${_appdir}/public/uploads" - ln -fs "${_datadir}/shared" "${pkgdir}${_appdir}/shared" - - # TODO: workhorse and shell secret files are the application data and should be stored under /var/lib/gitlab - ln -fs "${_etcdir}/gitlab_workhorse_secret" "${pkgdir}${_appdir}/.gitlab_workhorse_secret" - ln -fs /etc/webapps/gitlab-shell/secret "${pkgdir}${_appdir}/.gitlab_shell_secret" - - # Install config files - for config_file in gitlab.yml database.yml puma.rb resque.yml; do - mv "config/${config_file}" "${pkgdir}${_etcdir}/" - # TODO: configure rails app to use configs right from /etc - ln -fs "${_etcdir}/${config_file}" "${pkgdir}${_appdir}/config/" - done - mv "config/initializers/smtp_settings.rb" "${pkgdir}${_etcdir}/" - ln -fs "${_etcdir}/smtp_settings.rb" "${pkgdir}${_appdir}/config/initializers/smtp_settings.rb" - - # Install secrets symlink - # TODO: ruby uses _appdir to load config files. Figure out if we can load files directly from /etc - ln -fs "${_etcdir}/secrets.yml" "${pkgdir}${_appdir}/config/secrets.yml" - - # files with passwords/secrets are set world-unreadable - for secret_file in smtp_settings.rb; do - chmod 660 "${pkgdir}${_etcdir}/${secret_file}" - # TODO: should we just leave the secret files root owned? - chown root:105 "${pkgdir}${_etcdir}/${secret_file}" - done - - install -Dm644 "${srcdir}/environment" "${pkgdir}${_appdir}" - - # Install license and help files - mv README.md MAINTENANCE.md CONTRIBUTING.md CHANGELOG.md PROCESS.md VERSION config/*.{example,postgresql} "${pkgdir}/usr/share/doc/gitlab" - install -Dm644 "LICENSE" "${pkgdir}/usr/share/licenses/gitlab/LICENSE" - - # TODO: structure.sql looks more like an application data and should be stored under /var/lib/gitlab - chown 105:105 "${pkgdir}${_appdir}/db/structure.sql" - - # Install systemd service files - for service_file in gitlab-puma.service gitlab-sidekiq.service gitlab-backup.service gitlab-backup.timer gitlab.target gitlab-mailroom.service; do - install -Dm644 "${srcdir}/${service_file}" "${pkgdir}/usr/lib/systemd/system/${service_file}" - done - - install -Dm644 "${srcdir}/gitlab.tmpfiles.d" "${pkgdir}/usr/lib/tmpfiles.d/gitlab.conf" - install -Dm644 "${srcdir}/gitlab.logrotate" "${pkgdir}/etc/logrotate.d/gitlab" -} Copied: gitlab/repos/community-x86_64/PKGBUILD (from rev 1218327, gitlab/trunk/PKGBUILD) =================================================================== --- PKGBUILD (rev 0) +++ PKGBUILD 2022-06-01 18:16:04 UTC (rev 1218328) @@ -0,0 +1,185 @@ +# Maintainer: Anatol Pomozov <anatol.pomo...@gmail.com> +# Contributor: Sven-Hendrik Haase <svenst...@gmail.com> +# Contributor: Pavol (Lopo) Hluchy <lopo AT losys DOT eu> +# Contributor: Jonas Heinrich <o...@project-insanity.org> +# Contributor: Massimiliano Torromeo <massimiliano.torro...@gmail.com> +# Contributor: Tobias Hunger <tobias DOT hunger AT gmail DOT com> +# Contributor: Stefan Tatschner <ste...@sevenbyte.org> +# Contributor: Caleb Maclennan <ca...@alerque.com> + +pkgname=gitlab +pkgver=15.0.0 +pkgrel=1 +pkgdesc="Project management and code hosting application" +arch=('x86_64') +url="https://gitlab.com/gitlab-org/gitlab-foss" +license=('MIT') +options=(!buildflags) +depends=('ruby2.7' 'git' 'gitlab-workhorse' 'gitlab-gitaly' 'openssh' 'redis' 'libxslt' 'icu' 're2' 'http-parser' 'nodejs' 'openssl') +makedepends=('cmake' 'postgresql' 'yarn' 'go' 'nodejs') +optdepends=('postgresql: database backend' + 'python-docutils: reStructuredText markup language support' + 'smtp-server: mail server in order to receive mail notifications') +backup=("etc/webapps/gitlab/database.yml" + "etc/webapps/gitlab/gitlab.yml" + "etc/webapps/gitlab/resque.yml" + "etc/webapps/gitlab/puma.rb" + "etc/webapps/gitlab/smtp_settings.rb" + "etc/logrotate.d/gitlab") +source=(git+https://gitlab.com/gitlab-org/gitlab-foss.git#tag=v$pkgver + configs.patch + fixes.patch + environment + gitlab-puma.service + gitlab-sidekiq.service + gitlab-backup.service + gitlab-mailroom.service + gitlab-backup.timer + gitlab.target + gitlab.tmpfiles.d + gitlab.logrotate) +install='gitlab.install' +sha512sums=('SKIP' + '8de5f5a11a8b772d13e6c056e9150f253b6bb0ab21c7d3913c848571cfea2a5fb64f65511b4da1773c7a225efac66ea4010dedbbaec117bd6f43864a0960018a' + '3eb5058d6edc2d16f5558a3ee485ba796aa64fb4b9eb7595390322344b809fcb47a45be9d7fe36c822ac2724aeecb2905a0ea9a868a56349ac2bc5c8c9f070e3' + '5b1ca2958f03a5baf1c5576a1568072e8ed749e2d15745ecbcc4860d2dbd543f2f3ed077e8d87afac2670c9436b19fe498217b49916d56a4e31fb9811aeb9067' + '451a030940f124bccd6d29c1924861b361d52db32cff6e745c144286c2afc7065e117f825721145ed2dd4406f5bcfa97e228a80b968aaa9a675613b71b776eba' + '419848c668928276620b5229e457a39e0ed7e111f1da68a30c3e0ae1a644af1c869b004b35435ccec4ddcdf6cf7418b1ab71e6e2ee8a2c861c6625c8bfd908f6' + 'd86e16747ad79f514ce180646c68bec8b6fa61764b2b14b1621db998f48955c3fb81f4e19ecb0fbab9d603dd25d95929e6d72a473652608373e6551f26244738' + 'f8067d1ee444a50dc9b2ed871974225ad521c310eb191e075adb0e45e47168da7d16b92f2e40d7ce755041dd4426a05f0ad1385392b4db526aeaf8a638eb024f' + 'c76d634647336aaf157bc66ba094a363e971c0d275875a7df4521819147f54cd4c709eb8e024cdac9e900d99167e8a78a222587e7292e915573ef29060e6ec21' + '879be339148123e32b58a5669fdd3d3bb8b5d711326cb618f95b1680a6ac3a83c85d8862f2691b352fa26c95e4764dbb827856e22a3e2b9e4a76c13fe42864b5' + 'abacbff0d7be918337a17b56481c84e6bf3eddd9551efe78ba9fb74337179e95c9b60f41c49f275e05074a4074a616be36fa208a48fc12d5b940f0554fbd89c3' + '88e199d2f63e4f235930c35c6dfde80e6010e590907bd4de0af1fbfe6d5491ff56845aefcfe8edefa707712bd84fef96880655747b8bfb949ceeadc0456b0121') + + +_appdir="/usr/share/webapps/gitlab" # the app source code location +_etcdir="/etc/webapps/gitlab" +_datadir="/var/lib/gitlab" # directory with gitlab data and it also $HOME for 'gitlab' user +_logdir="/var/log/gitlab" + +prepare() { + cd gitlab-foss + + # GitLab tries to read its revision information from a file. + git rev-parse --short HEAD > REVISION + + patch -p1 < ../fixes.patch + patch -p1 < ../configs.patch + # '/home/git' path in the config files indicates a default path that need to be adjusted + grep -FqR '/home/git' config || exit 1 + + cp config/gitlab.yml.example config/gitlab.yml + cp config/database.yml.postgresql config/database.yml + cp config/puma.rb.example config/puma.rb + cp config/resque.yml.example config/resque.yml + cp config/initializers/smtp_settings.rb.sample config/initializers/smtp_settings.rb + + echo "Setting up systemd service files ..." + for service_file in gitlab-sidekiq.service gitlab-puma.service gitlab.logrotate gitlab-backup.service gitlab-mailroom.service; do + sed -i "s|<DATADIR>|${_datadir}|g" "${srcdir}/${service_file}" + sed -i "s|<APPDIR>|${_appdir}|g" "${srcdir}/${service_file}" + sed -i "s|<LOGDIR>|${_logdir}|g" "${srcdir}/${service_file}" + done + + # https://github.com/bundler/bundler/issues/6882 + sed -e '/BUNDLED WITH/,+1d' -i Gemfile.lock + bundle-2.7 lock --update=bundler-audit + # 'lock' adds 'BUNDLED WITH' back. Remove it again. + sed -e '/BUNDLED WITH/,+1d' -i Gemfile.lock +} + +build() { + cd gitlab-foss + + echo "Fetching bundled gems..." + # Gems will be installed into vendor/bundle + bundle-2.7 config build.gpgme --use-system-libraries # See https://bugs.archlinux.org/task/63654 + bundle-2.7 config force_ruby_platform true # some native gems are not available for newer ruby + bundle-2.7 install --jobs=$(nproc) --no-cache --deployment --without development test aws kerberos + + yarn install --production --pure-lockfile + bundle-2.7 exec rake gettext:compile RAILS_ENV=production NODE_ENV=production USE_DB=false SKIP_STORAGE_VALIDATION=true NODE_OPTIONS="--max_old_space_size=3584" + bundle-2.7 exec rake gitlab:assets:compile RAILS_ENV=production NODE_ENV=production USE_DB=false SKIP_STORAGE_VALIDATION=true NODE_OPTIONS="--max_old_space_size=3584" +} + +package() { + depends+=('gitlab-shell') + + cd gitlab-foss + + install -d "${pkgdir}/usr/share/webapps" + + cp -r "${srcdir}"/gitlab-foss "${pkgdir}${_appdir}" + # Remove unneeded directories: node_modules is only needed during build + rm -r "${pkgdir}${_appdir}/node_modules" + # https://gitlab.com/gitlab-org/omnibus-gitlab/blob/194cf8f12e51c26980c09de6388bbd08409e1209/config/software/gitlab-rails.rb#L179 + for dir in spec qa rubocop app/assets vendor/assets; do + rm -r "${pkgdir}${_appdir}/${dir}" + done + + chown -R root:root "${pkgdir}${_appdir}" + chmod 755 "${pkgdir}${_appdir}" + + install -dm750 -o 105 -g 105 "${pkgdir}${_datadir}" + install -dm750 -o 105 -g 105 "${pkgdir}${_datadir}/satellites" + install -dm750 -o 105 -g 105 "${pkgdir}${_datadir}/shared/"{,artifacts,lfs-objects} + install -dm750 -o 105 -g 105 "${pkgdir}${_datadir}/builds" + install -dm700 -o 105 -g 105 "${pkgdir}${_datadir}/uploads" + install -dm750 -o 105 -g 105 "${pkgdir}${_datadir}/backups" + install -dm755 -o 105 -g 105 "${pkgdir}${_etcdir}" + install -dm755 -o 105 -g 105 "${pkgdir}${_logdir}" + install -dm755 "${pkgdir}/usr/share/doc/gitlab" + + rm -r "${pkgdir}${_appdir}"/{.git,builds,tmp,log,shared} + + # Rails app hardcodes/configures by default that data is stored under $_appdir + # Create symlinks that point to data directories under /var + ln -fs "${_logdir}" "${pkgdir}${_appdir}/log" + ln -fs "${_datadir}/builds" "${pkgdir}${_appdir}/builds" + mkdir "${pkgdir}${_appdir}/tmp/" + ln -fs "${_datadir}/backups" "${pkgdir}${_appdir}/tmp/backups" + ln -fs "${_datadir}/uploads" "${pkgdir}${_appdir}/public/uploads" + ln -fs "${_datadir}/shared" "${pkgdir}${_appdir}/shared" + + # TODO: workhorse and shell secret files are the application data and should be stored under /var/lib/gitlab + ln -fs "${_etcdir}/gitlab_workhorse_secret" "${pkgdir}${_appdir}/.gitlab_workhorse_secret" + ln -fs /etc/webapps/gitlab-shell/secret "${pkgdir}${_appdir}/.gitlab_shell_secret" + + # Install config files + for config_file in gitlab.yml database.yml puma.rb resque.yml; do + mv "config/${config_file}" "${pkgdir}${_etcdir}/" + # TODO: configure rails app to use configs right from /etc + ln -fs "${_etcdir}/${config_file}" "${pkgdir}${_appdir}/config/" + done + mv "config/initializers/smtp_settings.rb" "${pkgdir}${_etcdir}/" + ln -fs "${_etcdir}/smtp_settings.rb" "${pkgdir}${_appdir}/config/initializers/smtp_settings.rb" + + # Install secrets symlink + # TODO: ruby uses _appdir to load config files. Figure out if we can load files directly from /etc + ln -fs "${_etcdir}/secrets.yml" "${pkgdir}${_appdir}/config/secrets.yml" + + # files with passwords/secrets are set world-unreadable + for secret_file in smtp_settings.rb; do + chmod 660 "${pkgdir}${_etcdir}/${secret_file}" + # TODO: should we just leave the secret files root owned? + chown root:105 "${pkgdir}${_etcdir}/${secret_file}" + done + + install -Dm644 "${srcdir}/environment" "${pkgdir}${_appdir}" + + # Install license and help files + mv README.md MAINTENANCE.md CONTRIBUTING.md CHANGELOG.md PROCESS.md VERSION config/*.{example,postgresql} "${pkgdir}/usr/share/doc/gitlab" + install -Dm644 "LICENSE" "${pkgdir}/usr/share/licenses/gitlab/LICENSE" + + # TODO: structure.sql looks more like an application data and should be stored under /var/lib/gitlab + chown 105:105 "${pkgdir}${_appdir}/db/structure.sql" + + # Install systemd service files + for service_file in gitlab-puma.service gitlab-sidekiq.service gitlab-backup.service gitlab-backup.timer gitlab.target gitlab-mailroom.service; do + install -Dm644 "${srcdir}/${service_file}" "${pkgdir}/usr/lib/systemd/system/${service_file}" + done + + install -Dm644 "${srcdir}/gitlab.tmpfiles.d" "${pkgdir}/usr/lib/tmpfiles.d/gitlab.conf" + install -Dm644 "${srcdir}/gitlab.logrotate" "${pkgdir}/etc/logrotate.d/gitlab" +} Deleted: configs.patch =================================================================== --- configs.patch 2022-06-01 18:14:59 UTC (rev 1218327) +++ configs.patch 2022-06-01 18:16:04 UTC (rev 1218328) @@ -1,302 +0,0 @@ -commit 55bf276ffc622fd5788b73df5bfff574c31ee68a -Author: Anatol Pomozov <anatol.pomo...@gmail.com> -Date: Tue May 26 00:01:38 2020 -0700 - - Patch config files with Arch Linux specific locations - - Arch uses upstream's default config files as a base for its configs. - But directory structure at Arch is completely different from the default - one specified by gitlab project. - We used to have a lot of seds expressions to adjust the files but as - complexity of configs grew 'sed' makes it easy to miss a changed/added - option. - - Track set of diffs as a patch. If upstream modifies config file then it - will cause a conflict that needs to be reviewed manually. - -diff --git a/config/database.yml.postgresql b/config/database.yml.postgresql -index a4daab1fd0c7..19c33fdd1f56 100644 ---- a/config/database.yml.postgresql -+++ b/config/database.yml.postgresql -@@ -6,7 +6,7 @@ production: - adapter: postgresql - encoding: unicode - database: gitlabhq_production -- username: git -+ username: gitlab - password: "secure password" - host: localhost - # load_balancing: -@@ -41,7 +41,7 @@ staging: - adapter: postgresql - encoding: unicode - database: gitlabhq_staging -- username: git -+ username: gitlab - password: "secure password" - host: localhost - -diff --git a/config/gitlab.yml.example b/config/gitlab.yml.example -index 57106120fb2a..30145c6ace6c 100644 ---- a/config/gitlab.yml.example -+++ b/config/gitlab.yml.example -@@ -91,7 +91,7 @@ production: &base - #- 2001:0db8::/32 - - # Uncomment and customize if you can't use the default user to run GitLab (default: 'git') -- # user: git -+ user: gitlab - - ## Date & Time settings - # Uncomment and customize if you want to change the default time zone of GitLab application. -@@ -111,15 +111,15 @@ production: &base - # enabled: false - # S/MIME private key file in PEM format, unencrypted - # Default is '.gitlab_smime_key' relative to Rails.root (i.e. root of the GitLab app). -- # key_file: /home/git/gitlab/.gitlab_smime_key -+ # key_file: /var/lib/gitlab/.gitlab_smime_key - # S/MIME public certificate key in PEM format, will be attached to signed messages - # Default is '.gitlab_smime_cert' relative to Rails.root (i.e. root of the GitLab app). -- # cert_file: /home/git/gitlab/.gitlab_smime_cert -+ # cert_file: /var/lib/gitlab/.gitlab_smime_cert - # S/MIME extra CA public certificates in PEM format, will be attached to signed messages - # Optional -- # ca_certs_file: /home/git/gitlab/.gitlab_smime_ca_certs -+ # ca_certs_file: /var/lib/gitlab/.gitlab_smime_ca_certs - -- # Email server smtp settings are in config/initializers/smtp_settings.rb.sample -+ # Email server smtp settings are in /etc/webapps/gitlab/smtp_settings.rb - # File location to read encrypted SMTP secrets from - # email_smtp_secret_file: /mnt/gitlab/smtp.yaml.enc # Default: shared/encrypted_settings/smtp.yaml.enc - -@@ -167,7 +167,7 @@ production: &base - ## Repository downloads directory - # When a user clicks e.g. 'Download zip' on a project, a temporary zip file is created in the following directory. - # The default is 'shared/cache/archive/' relative to the root of the Rails app. -- # repository_downloads_path: shared/cache/archive/ -+ repository_downloads_path: /var/lib/gitlab/shared/cache/archive - - ## Impersonation settings - impersonation_enabled: true -@@ -218,7 +218,7 @@ production: &base - # Since `mail_room` is run independently of Rails, an absolute path is preferred. - # The default is 'log/mail_room_json.log' relative to the root of the Rails app. - # -- # log_path: log/mail_room_json.log -+ log_path: /var/log/gitlab/mail_room_json.log - - # Whether to expunge (permanently remove) messages from the mailbox when they are deleted after delivery - expunge_deleted: false -@@ -248,7 +248,7 @@ production: &base - # contains the shared secret key for verifying access for mailroom's - # incoming_email. - # Default is '.gitlab_mailroom_secret' relative to Rails.root (i.e. root of the GitLab app). -- # secret_file: /home/git/gitlab/.gitlab_mailroom_secret -+ # secret_file: /var/lib/gitlab/.gitlab_mailroom_secret - - ## Consolidated object store config - ## This will only take effect if the object_store sections are not defined -@@ -284,7 +284,7 @@ production: &base - artifacts: - enabled: true - # The location where build artifacts are stored (default: shared/artifacts). -- # path: shared/artifacts -+ path: /var/lib/gitlab/shared/artifacts - # object_store: - # enabled: false - # remote_directory: artifacts # The bucket name -@@ -304,7 +304,7 @@ production: &base - # be stored on disk, or in object storage - enabled: false - # The location where external diffs are stored (default: shared/lfs-external-diffs). -- # storage_path: shared/external-diffs -+ storage_path: /var/lib/gitlab/shared/external-diffs - # object_store: - # enabled: false - # remote_directory: external-diffs -@@ -320,7 +320,7 @@ production: &base - lfs: - enabled: true - # The location where LFS objects are stored (default: shared/lfs-objects). -- # storage_path: shared/lfs-objects -+ storage_path: /var/lib/gitlab/shared/lfs-objects - object_store: - enabled: false - remote_directory: lfs-objects # Bucket name -@@ -364,7 +364,7 @@ production: &base - enabled: true - dpkg_deb_path: /usr/bin/dpkg-deb - # The location where build packages are stored (default: shared/packages). -- # storage_path: shared/packages -+ storage_path: /var/lib/gitlab/shared/packages - object_store: - enabled: false - remote_directory: packages # The bucket name -@@ -385,7 +385,7 @@ production: &base - dependency_proxy: - enabled: true - # The location where build packages are stored (default: shared/dependency_proxy). -- # storage_path: shared/dependency_proxy -+ storage_path: /var/lib/gitlab/shared/dependency_proxy - object_store: - enabled: false - remote_directory: dependency_proxy # The bucket name -@@ -406,7 +406,7 @@ production: &base - terraform_state: - enabled: true - # The location where Terraform state files are stored (default: shared/terraform_state). -- # storage_path: shared/terraform_state -+ storage_path: /var/lib/gitlab/shared/terraform_state - object_store: - enabled: false - remote_directory: terraform # The bucket name -@@ -442,7 +442,7 @@ production: &base - enabled: false - access_control: false - # The location where pages are stored (default: shared/pages). -- # path: shared/pages -+ path: /var/lib/gitlab/shared/pages - - # The domain under which the pages are served: - # http://group.example.com/project -@@ -456,7 +456,7 @@ production: &base - - # File that contains the shared secret key for verifying access for gitlab-pages. - # Default is '.gitlab_pages_secret' relative to Rails.root (i.e. root of the GitLab app). -- # secret_file: /home/git/gitlab/.gitlab_pages_secret -+ secret_file: /var/lib/gitlab/.gitlab_pages_secret - object_store: - enabled: false - remote_directory: pages # The bucket name -@@ -627,7 +627,7 @@ production: &base - # port: 5005 - # api_url: http://localhost:5000/ # internal address to the registry, will be used by GitLab to directly communicate with API - # key: config/registry.key -- # path: shared/registry -+ path: /var/lib/gitlab/shared/registry - # issuer: gitlab-issuer - # notification_secret: '' # only set it when you use Geo replication feature without built-in Registry - -@@ -684,7 +684,7 @@ production: &base - # add_pusher: true - - # The location where build traces are stored (default: builds/). Relative paths are relative to Rails.root -- # builds_path: builds/ -+ builds_path: /var/lib/gitlab/builds - - # - # 3. Auth settings -@@ -1150,7 +1150,7 @@ production: &base - - # Shared file storage settings - shared: -- # path: /mnt/gitlab # Default: shared -+ path: /var/lib/gitlab/shared # Default: shared - - # Encrypted Settings configuration - encrypted_settings: -@@ -1175,14 +1175,14 @@ production: &base - # real path not the symlink. - storages: # You must have at least a `default` storage path. - default: -- path: /home/git/repositories/ -- gitaly_address: unix:/home/git/gitlab/tmp/sockets/private/gitaly.socket # TCP connections are supported too (e.g. tcp://host:port). TLS connections are also supported using the system certificate pool (eg: tls://host:port). -+ path: /var/lib/gitlab/repositories -+ gitaly_address: unix:/run/gitlab/gitlab-gitaly.socket # TCP connections are supported too (e.g. tcp://host:port). TLS connections are also supported using the system certificate pool (eg: tls://host:port). - # gitaly_token: 'special token' # Optional: override global gitaly.token for this storage. - - ## Backup settings - backup: -- path: "tmp/backups" # Relative paths are relative to Rails.root (default: tmp/backups/) -- # gitaly_backup_path: /home/git/gitaly/_build/bin/gitaly-backup # Path of the gitaly-backup binary (default: searches $PATH) -+ path: "/var/lib/gitlab/backups" # Relative paths are relative to Rails.root (default: tmp/backups/) -+ # gitaly_backup_path: /var/lib/gitaly/_build/bin/gitaly-backup # Path of the gitaly-backup binary (default: searches $PATH) - # archive_permissions: 0640 # Permissions for the resulting backup.tar file (default: 0600) - # keep_time: 604800 # default: 0 (forever) (in seconds) - # pg_schema: public # default: nil, it means that all schemas will be backed up -@@ -1231,12 +1231,12 @@ production: &base - - ## GitLab Shell settings - gitlab_shell: -- path: /home/git/gitlab-shell/ -- authorized_keys_file: /home/git/.ssh/authorized_keys -+ path: /usr/share/webapps/gitlab-shell -+ authorized_keys_file: /var/lib/gitlab/.ssh/authorized_keys - - # File that contains the secret key for verifying access for gitlab-shell. - # Default is '.gitlab_shell_secret' relative to Rails.root (i.e. root of the GitLab app). -- # secret_file: /home/git/gitlab/.gitlab_shell_secret -+ # secret_file: /var/lib/gitlab/.gitlab_shell_secret - - # Git over HTTP - upload_pack: true -@@ -1251,13 +1251,13 @@ production: &base - workhorse: - # File that contains the secret key for verifying access for gitlab-workhorse. - # Default is '.gitlab_workhorse_secret' relative to Rails.root (i.e. root of the GitLab app). -- # secret_file: /home/git/gitlab/.gitlab_workhorse_secret -+ # secret_file: /var/lib/gitlab/.gitlab_workhorse_secret - - gitlab_kas: - # enabled: true - # File that contains the secret key for verifying access for gitlab-kas. - # Default is '.gitlab_kas_secret' relative to Rails.root (i.e. root of the GitLab app). -- # secret_file: /home/git/gitlab/.gitlab_kas_secret -+ # secret_file: /var/lib/gitlab/.gitlab_kas_secret - - # The URL to the external KAS API (used by the Kubernetes agents) - # external_url: wss://kas.example.com -@@ -1270,7 +1270,7 @@ production: &base - - ## GitLab Elasticsearch settings - elasticsearch: -- indexer_path: /home/git/gitlab-elasticsearch-indexer/ -+ indexer_path: /var/lib/gitlab/elasticsearch-indexer - - ## Git settings - # CAUTION! -diff --git a/config/puma.rb.example b/config/puma.rb.example -index c70baf6570e6..1dce6a00c165 100644 ---- a/config/puma.rb.example -+++ b/config/puma.rb.example -@@ -5,11 +5,11 @@ - # The default is "config.ru". - # - rackup 'config.ru' --pidfile '/home/git/gitlab/tmp/pids/puma.pid' --state_path '/home/git/gitlab/tmp/pids/puma.state' -+pidfile '/run/gitlab/puma.pid' -+state_path '/run/gitlab/puma.state' - --stdout_redirect '/home/git/gitlab/log/puma.stdout.log', -- '/home/git/gitlab/log/puma.stderr.log', -+stdout_redirect '/var/log/gitlab/puma.stdout.log', -+ '/var/log/gitlab/puma.stderr.log', - true - - # Configure "min" to be the minimum number of threads to use to answer -@@ -31,12 +31,12 @@ queue_requests false - - # Bind the server to "url". "tcp://", "unix://" and "ssl://" are the only - # accepted protocols. --bind 'unix:///home/git/gitlab/tmp/sockets/gitlab.socket' -+bind 'unix:///run/gitlab/gitlab.socket' - - workers 3 - --require_relative "/home/git/gitlab/lib/gitlab/cluster/lifecycle_events" --require_relative "/home/git/gitlab/lib/gitlab/cluster/puma_worker_killer_initializer" -+require_relative "/usr/share/webapps/gitlab/lib/gitlab/cluster/lifecycle_events" -+require_relative "/usr/share/webapps/gitlab/lib/gitlab/cluster/puma_worker_killer_initializer" - - on_restart do - # Signal application hooks that we're about to restart -@@ -76,7 +76,7 @@ wait_for_less_busy_worker ENV.fetch('PUMA_WAIT_FOR_LESS_BUSY_WORKER', 0.001).to_ - nakayoshi_fork unless ENV['DISABLE_PUMA_NAKAYOSHI_FORK'] == 'true' - - # Use json formatter --require_relative "/home/git/gitlab/lib/gitlab/puma_logging/json_formatter" -+require_relative "/usr/share/webapps/gitlab/lib/gitlab/puma_logging/json_formatter" - - json_formatter = Gitlab::PumaLogging::JSONFormatter.new - log_formatter do |str| Copied: gitlab/repos/community-x86_64/configs.patch (from rev 1218327, gitlab/trunk/configs.patch) =================================================================== --- configs.patch (rev 0) +++ configs.patch 2022-06-01 18:16:04 UTC (rev 1218328) @@ -0,0 +1,302 @@ +commit 55bf276ffc622fd5788b73df5bfff574c31ee68a +Author: Anatol Pomozov <anatol.pomo...@gmail.com> +Date: Tue May 26 00:01:38 2020 -0700 + + Patch config files with Arch Linux specific locations + + Arch uses upstream's default config files as a base for its configs. + But directory structure at Arch is completely different from the default + one specified by gitlab project. + We used to have a lot of seds expressions to adjust the files but as + complexity of configs grew 'sed' makes it easy to miss a changed/added + option. + + Track set of diffs as a patch. If upstream modifies config file then it + will cause a conflict that needs to be reviewed manually. + +diff --git a/config/database.yml.postgresql b/config/database.yml.postgresql +index a4daab1fd0c7..19c33fdd1f56 100644 +--- a/config/database.yml.postgresql ++++ b/config/database.yml.postgresql +@@ -6,7 +6,7 @@ production: + adapter: postgresql + encoding: unicode + database: gitlabhq_production +- username: git ++ username: gitlab + password: "secure password" + host: localhost + # load_balancing: +@@ -41,7 +41,7 @@ staging: + adapter: postgresql + encoding: unicode + database: gitlabhq_staging +- username: git ++ username: gitlab + password: "secure password" + host: localhost + +diff --git a/config/gitlab.yml.example b/config/gitlab.yml.example +index 57106120fb2a..30145c6ace6c 100644 +--- a/config/gitlab.yml.example ++++ b/config/gitlab.yml.example +@@ -91,7 +91,7 @@ production: &base + #- 2001:0db8::/32 + + # Uncomment and customize if you can't use the default user to run GitLab (default: 'git') +- # user: git ++ user: gitlab + + ## Date & Time settings + # Uncomment and customize if you want to change the default time zone of GitLab application. +@@ -111,15 +111,15 @@ production: &base + # enabled: false + # S/MIME private key file in PEM format, unencrypted + # Default is '.gitlab_smime_key' relative to Rails.root (i.e. root of the GitLab app). +- # key_file: /home/git/gitlab/.gitlab_smime_key ++ # key_file: /var/lib/gitlab/.gitlab_smime_key + # S/MIME public certificate key in PEM format, will be attached to signed messages + # Default is '.gitlab_smime_cert' relative to Rails.root (i.e. root of the GitLab app). +- # cert_file: /home/git/gitlab/.gitlab_smime_cert ++ # cert_file: /var/lib/gitlab/.gitlab_smime_cert + # S/MIME extra CA public certificates in PEM format, will be attached to signed messages + # Optional +- # ca_certs_file: /home/git/gitlab/.gitlab_smime_ca_certs ++ # ca_certs_file: /var/lib/gitlab/.gitlab_smime_ca_certs + +- # Email server smtp settings are in config/initializers/smtp_settings.rb.sample ++ # Email server smtp settings are in /etc/webapps/gitlab/smtp_settings.rb + # File location to read encrypted SMTP secrets from + # email_smtp_secret_file: /mnt/gitlab/smtp.yaml.enc # Default: shared/encrypted_settings/smtp.yaml.enc + +@@ -167,7 +167,7 @@ production: &base + ## Repository downloads directory + # When a user clicks e.g. 'Download zip' on a project, a temporary zip file is created in the following directory. + # The default is 'shared/cache/archive/' relative to the root of the Rails app. +- # repository_downloads_path: shared/cache/archive/ ++ repository_downloads_path: /var/lib/gitlab/shared/cache/archive + + ## Impersonation settings + impersonation_enabled: true +@@ -218,7 +218,7 @@ production: &base + # Since `mail_room` is run independently of Rails, an absolute path is preferred. + # The default is 'log/mail_room_json.log' relative to the root of the Rails app. + # +- # log_path: log/mail_room_json.log ++ log_path: /var/log/gitlab/mail_room_json.log + + # Whether to expunge (permanently remove) messages from the mailbox when they are deleted after delivery + expunge_deleted: false +@@ -248,7 +248,7 @@ production: &base + # contains the shared secret key for verifying access for mailroom's + # incoming_email. + # Default is '.gitlab_mailroom_secret' relative to Rails.root (i.e. root of the GitLab app). +- # secret_file: /home/git/gitlab/.gitlab_mailroom_secret ++ # secret_file: /var/lib/gitlab/.gitlab_mailroom_secret + + ## Consolidated object store config + ## This will only take effect if the object_store sections are not defined +@@ -284,7 +284,7 @@ production: &base + artifacts: + enabled: true + # The location where build artifacts are stored (default: shared/artifacts). +- # path: shared/artifacts ++ path: /var/lib/gitlab/shared/artifacts + # object_store: + # enabled: false + # remote_directory: artifacts # The bucket name +@@ -304,7 +304,7 @@ production: &base + # be stored on disk, or in object storage + enabled: false + # The location where external diffs are stored (default: shared/lfs-external-diffs). +- # storage_path: shared/external-diffs ++ storage_path: /var/lib/gitlab/shared/external-diffs + # object_store: + # enabled: false + # remote_directory: external-diffs +@@ -320,7 +320,7 @@ production: &base + lfs: + enabled: true + # The location where LFS objects are stored (default: shared/lfs-objects). +- # storage_path: shared/lfs-objects ++ storage_path: /var/lib/gitlab/shared/lfs-objects + object_store: + enabled: false + remote_directory: lfs-objects # Bucket name +@@ -364,7 +364,7 @@ production: &base + enabled: true + dpkg_deb_path: /usr/bin/dpkg-deb + # The location where build packages are stored (default: shared/packages). +- # storage_path: shared/packages ++ storage_path: /var/lib/gitlab/shared/packages + object_store: + enabled: false + remote_directory: packages # The bucket name +@@ -385,7 +385,7 @@ production: &base + dependency_proxy: + enabled: true + # The location where build packages are stored (default: shared/dependency_proxy). +- # storage_path: shared/dependency_proxy ++ storage_path: /var/lib/gitlab/shared/dependency_proxy + object_store: + enabled: false + remote_directory: dependency_proxy # The bucket name +@@ -406,7 +406,7 @@ production: &base + terraform_state: + enabled: true + # The location where Terraform state files are stored (default: shared/terraform_state). +- # storage_path: shared/terraform_state ++ storage_path: /var/lib/gitlab/shared/terraform_state + object_store: + enabled: false + remote_directory: terraform # The bucket name +@@ -442,7 +442,7 @@ production: &base + enabled: false + access_control: false + # The location where pages are stored (default: shared/pages). +- # path: shared/pages ++ path: /var/lib/gitlab/shared/pages + + # The domain under which the pages are served: + # http://group.example.com/project +@@ -456,7 +456,7 @@ production: &base + + # File that contains the shared secret key for verifying access for gitlab-pages. + # Default is '.gitlab_pages_secret' relative to Rails.root (i.e. root of the GitLab app). +- # secret_file: /home/git/gitlab/.gitlab_pages_secret ++ secret_file: /var/lib/gitlab/.gitlab_pages_secret + object_store: + enabled: false + remote_directory: pages # The bucket name +@@ -627,7 +627,7 @@ production: &base + # port: 5005 + # api_url: http://localhost:5000/ # internal address to the registry, will be used by GitLab to directly communicate with API + # key: config/registry.key +- # path: shared/registry ++ path: /var/lib/gitlab/shared/registry + # issuer: gitlab-issuer + # notification_secret: '' # only set it when you use Geo replication feature without built-in Registry + +@@ -684,7 +684,7 @@ production: &base + # add_pusher: true + + # The location where build traces are stored (default: builds/). Relative paths are relative to Rails.root +- # builds_path: builds/ ++ builds_path: /var/lib/gitlab/builds + + # + # 3. Auth settings +@@ -1150,7 +1150,7 @@ production: &base + + # Shared file storage settings + shared: +- # path: /mnt/gitlab # Default: shared ++ path: /var/lib/gitlab/shared # Default: shared + + # Encrypted Settings configuration + encrypted_settings: +@@ -1175,14 +1175,14 @@ production: &base + # real path not the symlink. + storages: # You must have at least a `default` storage path. + default: +- path: /home/git/repositories/ +- gitaly_address: unix:/home/git/gitlab/tmp/sockets/private/gitaly.socket # TCP connections are supported too (e.g. tcp://host:port). TLS connections are also supported using the system certificate pool (eg: tls://host:port). ++ path: /var/lib/gitlab/repositories ++ gitaly_address: unix:/run/gitlab/gitlab-gitaly.socket # TCP connections are supported too (e.g. tcp://host:port). TLS connections are also supported using the system certificate pool (eg: tls://host:port). + # gitaly_token: 'special token' # Optional: override global gitaly.token for this storage. + + ## Backup settings + backup: +- path: "tmp/backups" # Relative paths are relative to Rails.root (default: tmp/backups/) +- # gitaly_backup_path: /home/git/gitaly/_build/bin/gitaly-backup # Path of the gitaly-backup binary (default: searches $PATH) ++ path: "/var/lib/gitlab/backups" # Relative paths are relative to Rails.root (default: tmp/backups/) ++ # gitaly_backup_path: /var/lib/gitaly/_build/bin/gitaly-backup # Path of the gitaly-backup binary (default: searches $PATH) + # archive_permissions: 0640 # Permissions for the resulting backup.tar file (default: 0600) + # keep_time: 604800 # default: 0 (forever) (in seconds) + # pg_schema: public # default: nil, it means that all schemas will be backed up +@@ -1231,12 +1231,12 @@ production: &base + + ## GitLab Shell settings + gitlab_shell: +- path: /home/git/gitlab-shell/ +- authorized_keys_file: /home/git/.ssh/authorized_keys ++ path: /usr/share/webapps/gitlab-shell ++ authorized_keys_file: /var/lib/gitlab/.ssh/authorized_keys + + # File that contains the secret key for verifying access for gitlab-shell. + # Default is '.gitlab_shell_secret' relative to Rails.root (i.e. root of the GitLab app). +- # secret_file: /home/git/gitlab/.gitlab_shell_secret ++ # secret_file: /var/lib/gitlab/.gitlab_shell_secret + + # Git over HTTP + upload_pack: true +@@ -1251,13 +1251,13 @@ production: &base + workhorse: + # File that contains the secret key for verifying access for gitlab-workhorse. + # Default is '.gitlab_workhorse_secret' relative to Rails.root (i.e. root of the GitLab app). +- # secret_file: /home/git/gitlab/.gitlab_workhorse_secret ++ # secret_file: /var/lib/gitlab/.gitlab_workhorse_secret + + gitlab_kas: + # enabled: true + # File that contains the secret key for verifying access for gitlab-kas. + # Default is '.gitlab_kas_secret' relative to Rails.root (i.e. root of the GitLab app). +- # secret_file: /home/git/gitlab/.gitlab_kas_secret ++ # secret_file: /var/lib/gitlab/.gitlab_kas_secret + + # The URL to the external KAS API (used by the Kubernetes agents) + # external_url: wss://kas.example.com +@@ -1270,7 +1270,7 @@ production: &base + + ## GitLab Elasticsearch settings + elasticsearch: +- indexer_path: /home/git/gitlab-elasticsearch-indexer/ ++ indexer_path: /var/lib/gitlab/elasticsearch-indexer + + ## Git settings + # CAUTION! +diff --git a/config/puma.rb.example b/config/puma.rb.example +index c70baf6570e6..1dce6a00c165 100644 +--- a/config/puma.rb.example ++++ b/config/puma.rb.example +@@ -5,11 +5,11 @@ + # The default is "config.ru". + # + rackup 'config.ru' +-pidfile '/home/git/gitlab/tmp/pids/puma.pid' +-state_path '/home/git/gitlab/tmp/pids/puma.state' ++pidfile '/run/gitlab/puma.pid' ++state_path '/run/gitlab/puma.state' + +-stdout_redirect '/home/git/gitlab/log/puma.stdout.log', +- '/home/git/gitlab/log/puma.stderr.log', ++stdout_redirect '/var/log/gitlab/puma.stdout.log', ++ '/var/log/gitlab/puma.stderr.log', + true + + # Configure "min" to be the minimum number of threads to use to answer +@@ -31,12 +31,12 @@ queue_requests false + + # Bind the server to "url". "tcp://", "unix://" and "ssl://" are the only + # accepted protocols. +-bind 'unix:///home/git/gitlab/tmp/sockets/gitlab.socket' ++bind 'unix:///run/gitlab/gitlab.socket' + + workers 3 + +-require_relative "/home/git/gitlab/lib/gitlab/cluster/lifecycle_events" +-require_relative "/home/git/gitlab/lib/gitlab/cluster/puma_worker_killer_initializer" ++require_relative "/usr/share/webapps/gitlab/lib/gitlab/cluster/lifecycle_events" ++require_relative "/usr/share/webapps/gitlab/lib/gitlab/cluster/puma_worker_killer_initializer" + + on_restart do + # Signal application hooks that we're about to restart +@@ -76,7 +76,7 @@ wait_for_less_busy_worker ENV.fetch('PUMA_WAIT_FOR_LESS_BUSY_WORKER', 0.001).to_ + nakayoshi_fork unless ENV['DISABLE_PUMA_NAKAYOSHI_FORK'] == 'true' + + # Use json formatter +-require_relative "/home/git/gitlab/lib/gitlab/puma_logging/json_formatter" ++require_relative "/usr/share/webapps/gitlab/lib/gitlab/puma_logging/json_formatter" + + json_formatter = Gitlab::PumaLogging::JSONFormatter.new + log_formatter do |str| Deleted: environment =================================================================== --- environment 2022-06-01 18:14:59 UTC (rev 1218327) +++ environment 2022-06-01 18:16:04 UTC (rev 1218328) @@ -1,3 +0,0 @@ -RAILS_ENV=production -EXECJS_RUNTIME=Disabled -RUBYOPT='-W:no-deprecated' Copied: gitlab/repos/community-x86_64/environment (from rev 1218327, gitlab/trunk/environment) =================================================================== --- environment (rev 0) +++ environment 2022-06-01 18:16:04 UTC (rev 1218328) @@ -0,0 +1,3 @@ +RAILS_ENV=production +EXECJS_RUNTIME=Disabled +RUBYOPT='-W:no-deprecated' Deleted: fixes.patch =================================================================== --- fixes.patch 2022-06-01 18:14:59 UTC (rev 1218327) +++ fixes.patch 2022-06-01 18:16:04 UTC (rev 1218328) @@ -1,20 +0,0 @@ -commit 12f6321d679fb5aedef23680bb618a1443146c4f -Author: Anatol Pomozov <anatol.pomo...@gmail.com> -Date: Sat Mar 21 09:13:31 2020 -0700 - - ArchLinux fixes - -diff --git a/Gemfile b/Gemfile -index 6f9340ebd7dc..1fb09413b91d 100644 ---- a/Gemfile -+++ b/Gemfile -@@ -330,6 +330,9 @@ gem 'gettext', '~> 3.3', require: false, group: :development - - gem 'batch-loader', '~> 2.0.1' - -+gem 'irb' # https://bugs.archlinux.org/task/68569 -+gem 'rake' -+ - # Perf bar - gem 'peek', '~> 1.1' - Copied: gitlab/repos/community-x86_64/fixes.patch (from rev 1218327, gitlab/trunk/fixes.patch) =================================================================== --- fixes.patch (rev 0) +++ fixes.patch 2022-06-01 18:16:04 UTC (rev 1218328) @@ -0,0 +1,20 @@ +commit 12f6321d679fb5aedef23680bb618a1443146c4f +Author: Anatol Pomozov <anatol.pomo...@gmail.com> +Date: Sat Mar 21 09:13:31 2020 -0700 + + ArchLinux fixes + +diff --git a/Gemfile b/Gemfile +index 6f9340ebd7dc..1fb09413b91d 100644 +--- a/Gemfile ++++ b/Gemfile +@@ -330,6 +330,9 @@ gem 'gettext', '~> 3.3', require: false, group: :development + + gem 'batch-loader', '~> 2.0.1' + ++gem 'irb' # https://bugs.archlinux.org/task/68569 ++gem 'rake' ++ + # Perf bar + gem 'peek', '~> 1.1' + Deleted: gitlab-backup.service =================================================================== --- gitlab-backup.service 2022-06-01 18:14:59 UTC (rev 1218327) +++ gitlab-backup.service 2022-06-01 18:16:04 UTC (rev 1218328) @@ -1,19 +0,0 @@ -[Unit] -Description=GitLab Backup process -Requires= -After=network.target - -[Service] -Type=oneshot -User=gitlab -Group=gitlab -SyslogIdentifier=gitlab-backup -WorkingDirectory=<APPDIR> -EnvironmentFile=<APPDIR>/environment -CapabilityBoundingSet= -PrivateTmp=true -PrivateDevices=true -ProtectSystem=full -ProtectHome=true -NoNewPrivileges=true -ExecStart=/usr/bin/bundle-2.7 exec rake gitlab:backup:create Copied: gitlab/repos/community-x86_64/gitlab-backup.service (from rev 1218327, gitlab/trunk/gitlab-backup.service) =================================================================== --- gitlab-backup.service (rev 0) +++ gitlab-backup.service 2022-06-01 18:16:04 UTC (rev 1218328) @@ -0,0 +1,19 @@ +[Unit] +Description=GitLab Backup process +Requires= +After=network.target + +[Service] +Type=oneshot +User=gitlab +Group=gitlab +SyslogIdentifier=gitlab-backup +WorkingDirectory=<APPDIR> +EnvironmentFile=<APPDIR>/environment +CapabilityBoundingSet= +PrivateTmp=true +PrivateDevices=true +ProtectSystem=full +ProtectHome=true +NoNewPrivileges=true +ExecStart=/usr/bin/bundle-2.7 exec rake gitlab:backup:create Deleted: gitlab-backup.timer =================================================================== --- gitlab-backup.timer 2022-06-01 18:14:59 UTC (rev 1218327) +++ gitlab-backup.timer 2022-06-01 18:16:04 UTC (rev 1218328) @@ -1,10 +0,0 @@ -[Unit] -Description=Daily gitlab backup - -[Timer] -OnCalendar=daily -AccuracySec=12h -Persistent=true - -[Install] -WantedBy=timers.target Copied: gitlab/repos/community-x86_64/gitlab-backup.timer (from rev 1218327, gitlab/trunk/gitlab-backup.timer) =================================================================== --- gitlab-backup.timer (rev 0) +++ gitlab-backup.timer 2022-06-01 18:16:04 UTC (rev 1218328) @@ -0,0 +1,10 @@ +[Unit] +Description=Daily gitlab backup + +[Timer] +OnCalendar=daily +AccuracySec=12h +Persistent=true + +[Install] +WantedBy=timers.target Deleted: gitlab-mailroom.service =================================================================== --- gitlab-mailroom.service 2022-06-01 18:14:59 UTC (rev 1218327) +++ gitlab-mailroom.service 2022-06-01 18:16:04 UTC (rev 1218328) @@ -1,21 +0,0 @@ -[Unit] -Description=Gitlab Mailroom Worker -Requires=gitlab-puma.service -Wants=gitlab-puma.service -After=gitlab-puma.service -StartLimitIntervalSec=100s - -[Service] -User=gitlab -Group=gitlab -WorkingDirectory=<APPDIR> -EnvironmentFile=<APPDIR>/environment -SyslogIdentifier=gitlab-mailroom -PIDFile=/run/gitlab/mailroom.pid -ExecStart=/usr/bin/bundle-2.7 exec mail_room -q -c <APPDIR>/config/mail_room.yml -ExecStop=/usr/bin/kill -QUIT $MAINPID -Restart=on-failure -RestartSec=1 - -[Install] -WantedBy=multi-user.target Copied: gitlab/repos/community-x86_64/gitlab-mailroom.service (from rev 1218327, gitlab/trunk/gitlab-mailroom.service) =================================================================== --- gitlab-mailroom.service (rev 0) +++ gitlab-mailroom.service 2022-06-01 18:16:04 UTC (rev 1218328) @@ -0,0 +1,21 @@ +[Unit] +Description=Gitlab Mailroom Worker +Requires=gitlab-puma.service +Wants=gitlab-puma.service +After=gitlab-puma.service +StartLimitIntervalSec=100s + +[Service] +User=gitlab +Group=gitlab +WorkingDirectory=<APPDIR> +EnvironmentFile=<APPDIR>/environment +SyslogIdentifier=gitlab-mailroom +PIDFile=/run/gitlab/mailroom.pid +ExecStart=/usr/bin/bundle-2.7 exec mail_room -q -c <APPDIR>/config/mail_room.yml +ExecStop=/usr/bin/kill -QUIT $MAINPID +Restart=on-failure +RestartSec=1 + +[Install] +WantedBy=multi-user.target Deleted: gitlab-puma.service =================================================================== --- gitlab-puma.service 2022-06-01 18:14:59 UTC (rev 1218327) +++ gitlab-puma.service 2022-06-01 18:16:04 UTC (rev 1218328) @@ -1,34 +0,0 @@ -[Unit] -Description=GitLab Puma Server -Requires=redis.service -Wants=postgresql.service -After=redis.service postgresql.service network.target -StartLimitIntervalSec=100s - -[Service] -User=gitlab -Group=gitlab -WorkingDirectory=<APPDIR> -EnvironmentFile=<APPDIR>/environment -SyslogIdentifier=gitlab-puma -PIDFile=/run/gitlab/puma.pid -RuntimeDirectory=gitlab -RuntimeDirectoryPreserve=yes -RuntimeDirectoryMode=775 -PrivateTmp=true -PrivateDevices=true -ProtectSystem=full -ProtectHome=true -# These options break Gitlab's email delivery if you -# use postfix' sendmail wrapper. If you use an SMTP server -# instead you can safely enable these security features. -#NoNewPrivileges=true -#CapabilityBoundingSet= -ExecStart=/usr/bin/bundle-2.7 exec puma -C <APPDIR>/config/puma.rb -e production -ExecStop=/usr/bin/kill -QUIT $MAINPID -ExecReload=/usr/bin/kill -USR2 $MAINPID -Restart=on-failure -RestartSec=1 - -[Install] -WantedBy=multi-user.target Copied: gitlab/repos/community-x86_64/gitlab-puma.service (from rev 1218327, gitlab/trunk/gitlab-puma.service) =================================================================== --- gitlab-puma.service (rev 0) +++ gitlab-puma.service 2022-06-01 18:16:04 UTC (rev 1218328) @@ -0,0 +1,34 @@ +[Unit] +Description=GitLab Puma Server +Requires=redis.service +Wants=postgresql.service +After=redis.service postgresql.service network.target +StartLimitIntervalSec=100s + +[Service] +User=gitlab +Group=gitlab +WorkingDirectory=<APPDIR> +EnvironmentFile=<APPDIR>/environment +SyslogIdentifier=gitlab-puma +PIDFile=/run/gitlab/puma.pid +RuntimeDirectory=gitlab +RuntimeDirectoryPreserve=yes +RuntimeDirectoryMode=775 +PrivateTmp=true +PrivateDevices=true +ProtectSystem=full +ProtectHome=true +# These options break Gitlab's email delivery if you +# use postfix' sendmail wrapper. If you use an SMTP server +# instead you can safely enable these security features. +#NoNewPrivileges=true +#CapabilityBoundingSet= +ExecStart=/usr/bin/bundle-2.7 exec puma -C <APPDIR>/config/puma.rb -e production +ExecStop=/usr/bin/kill -QUIT $MAINPID +ExecReload=/usr/bin/kill -USR2 $MAINPID +Restart=on-failure +RestartSec=1 + +[Install] +WantedBy=multi-user.target Deleted: gitlab-sidekiq.service =================================================================== --- gitlab-sidekiq.service 2022-06-01 18:14:59 UTC (rev 1218327) +++ gitlab-sidekiq.service 2022-06-01 18:16:04 UTC (rev 1218328) @@ -1,30 +0,0 @@ -[Unit] -Description=GitLab Sidekiq Worker -Requires=redis.service gitlab-puma.service -Wants=postgresql.service -After=redis.service postgresql.service network.target gitlab-puma.service -JoinsNamespaceOf=gitlab-puma.service -StartLimitIntervalSec=100s - -[Service] -User=gitlab -Group=gitlab -WorkingDirectory=<APPDIR> -EnvironmentFile=<APPDIR>/environment -SyslogIdentifier=gitlab-sidekiq -PIDFile=/run/gitlab/sidekiq.pid -PrivateTmp=true -ProtectSystem=full -ProtectHome=true -# These options break Gitlab's email delivery if you -# use postfix' sendmail wrapper. If you use an SMTP server -# instead you can safely enable these security features. -#NoNewPrivileges=true -#CapabilityBoundingSet= -ExecStart=/usr/bin/bundle-2.7 exec sidekiq -C <APPDIR>/config/sidekiq_queues.yml -e production -ExecStop=/usr/bin/bundle-2.7 exec sidekiqctl stop /run/gitlab/sidekiq.pid -Restart=on-failure -RestartSec=1 - -[Install] -WantedBy=multi-user.target Copied: gitlab/repos/community-x86_64/gitlab-sidekiq.service (from rev 1218327, gitlab/trunk/gitlab-sidekiq.service) =================================================================== --- gitlab-sidekiq.service (rev 0) +++ gitlab-sidekiq.service 2022-06-01 18:16:04 UTC (rev 1218328) @@ -0,0 +1,30 @@ +[Unit] +Description=GitLab Sidekiq Worker +Requires=redis.service gitlab-puma.service +Wants=postgresql.service +After=redis.service postgresql.service network.target gitlab-puma.service +JoinsNamespaceOf=gitlab-puma.service +StartLimitIntervalSec=100s + +[Service] +User=gitlab +Group=gitlab +WorkingDirectory=<APPDIR> +EnvironmentFile=<APPDIR>/environment +SyslogIdentifier=gitlab-sidekiq +PIDFile=/run/gitlab/sidekiq.pid +PrivateTmp=true +ProtectSystem=full +ProtectHome=true +# These options break Gitlab's email delivery if you +# use postfix' sendmail wrapper. If you use an SMTP server +# instead you can safely enable these security features. +#NoNewPrivileges=true +#CapabilityBoundingSet= +ExecStart=/usr/bin/bundle-2.7 exec sidekiq -C <APPDIR>/config/sidekiq_queues.yml -e production +ExecStop=/usr/bin/bundle-2.7 exec sidekiqctl stop /run/gitlab/sidekiq.pid +Restart=on-failure +RestartSec=1 + +[Install] +WantedBy=multi-user.target Deleted: gitlab.install =================================================================== --- gitlab.install 2022-06-01 18:14:59 UTC (rev 1218327) +++ gitlab.install 2022-06-01 18:16:04 UTC (rev 1218328) @@ -1,34 +0,0 @@ -post_install() { - echo "Configure your /etc/webapps/gitlab/gitlab.yml" - echo "Set up your redis to run on /run/redis/redis.sock or configure gitlab to use redis TCP" - echo "Put a secret bytestring to /etc/webapps/gitlab/secret" - echo "Copy /usr/share/webapps/gitlab/config/secrets.yml.example to /etc/webapps/gitlab/secrets.yml and configure it" - echo "Setup the database:" - echo "$ (cd /usr/share/webapps/gitlab && sudo -u gitlab \$(cat environment | xargs) bundle-2.7 exec rake gitlab:setup)" - echo "Finally run the following commands to check your installation:" - echo "$ (cd /usr/share/webapps/gitlab && sudo -u gitlab \$(cat environment | xargs) bundle-2.7 exec rake gitlab:env:info)" - echo "$ (cd /usr/share/webapps/gitlab && sudo -u gitlab \$(cat environment | xargs) bundle-2.7 exec rake gitlab:check)" -} - -post_upgrade() { - echo "You should upgrade your database:" - echo "$ (cd /usr/share/webapps/gitlab && sudo -u gitlab \$(cat environment | xargs) bundle-2.7 exec rake db:migrate)" - echo "Afterwards, restart gitlab-related services:" - echo "# systemctl daemon-reload" - echo "# systemctl restart gitlab-sidekiq gitlab-puma gitlab-workhorse gitlab-gitaly" - - if (( $(vercmp $2 13.0.0) < 0)); then - echo "==========" - echo "Since 13.0.0, upstream switched default Ruby web server from Unicorn to Puma." - echo "Please use 'gitlab-puma' systemd service instead of 'gitlab-unicorn'." - fi - - if (( $(vercmp $2 13.0.1) < 0)); then - echo "==========" - echo "The new Puma server uses socket files by default thus configuration for gitlab-gitlay and gitlab-shell need to be updated." - echo "Please check new option values for 'gitlab_url' and 'secret_file' in /etc/webapps/gitlab-shell/config.yml and /etc/gitlab-gitaly/config.toml." - - echo "==========" - echo "Legacy symlinks /var/lib/gitlab/{gitlab-shell,log,pids,sockets} and /usr/share/webapps/gitlab/{builds,log,tmp} have been removed. Please check your config files and make sure you use direct target location such as /var/log/gitlab, /var/tmp, /run/gitlab ..." - fi -} Copied: gitlab/repos/community-x86_64/gitlab.install (from rev 1218327, gitlab/trunk/gitlab.install) =================================================================== --- gitlab.install (rev 0) +++ gitlab.install 2022-06-01 18:16:04 UTC (rev 1218328) @@ -0,0 +1,34 @@ +post_install() { + echo "Configure your /etc/webapps/gitlab/gitlab.yml" + echo "Set up your redis to run on /run/redis/redis.sock or configure gitlab to use redis TCP" + echo "Put a secret bytestring to /etc/webapps/gitlab/secret" + echo "Copy /usr/share/webapps/gitlab/config/secrets.yml.example to /etc/webapps/gitlab/secrets.yml and configure it" + echo "Setup the database:" + echo "$ (cd /usr/share/webapps/gitlab && sudo -u gitlab \$(cat environment | xargs) bundle-2.7 exec rake gitlab:setup)" + echo "Finally run the following commands to check your installation:" + echo "$ (cd /usr/share/webapps/gitlab && sudo -u gitlab \$(cat environment | xargs) bundle-2.7 exec rake gitlab:env:info)" + echo "$ (cd /usr/share/webapps/gitlab && sudo -u gitlab \$(cat environment | xargs) bundle-2.7 exec rake gitlab:check)" +} + +post_upgrade() { + echo "You should upgrade your database:" + echo "$ (cd /usr/share/webapps/gitlab && sudo -u gitlab \$(cat environment | xargs) bundle-2.7 exec rake db:migrate)" + echo "Afterwards, restart gitlab-related services:" + echo "# systemctl daemon-reload" + echo "# systemctl restart gitlab-sidekiq gitlab-puma gitlab-workhorse gitlab-gitaly" + + if (( $(vercmp $2 13.0.0) < 0)); then + echo "==========" + echo "Since 13.0.0, upstream switched default Ruby web server from Unicorn to Puma." + echo "Please use 'gitlab-puma' systemd service instead of 'gitlab-unicorn'." + fi + + if (( $(vercmp $2 13.0.1) < 0)); then + echo "==========" + echo "The new Puma server uses socket files by default thus configuration for gitlab-gitlay and gitlab-shell need to be updated." + echo "Please check new option values for 'gitlab_url' and 'secret_file' in /etc/webapps/gitlab-shell/config.yml and /etc/gitlab-gitaly/config.toml." + + echo "==========" + echo "Legacy symlinks /var/lib/gitlab/{gitlab-shell,log,pids,sockets} and /usr/share/webapps/gitlab/{builds,log,tmp} have been removed. Please check your config files and make sure you use direct target location such as /var/log/gitlab, /var/tmp, /run/gitlab ..." + fi +} Deleted: gitlab.logrotate =================================================================== --- gitlab.logrotate 2022-06-01 18:14:59 UTC (rev 1218327) +++ gitlab.logrotate 2022-06-01 18:16:04 UTC (rev 1218328) @@ -1,6 +0,0 @@ -<LOGDIR>/*.log { - missingok - compress - notifempty - copytruncate -} Copied: gitlab/repos/community-x86_64/gitlab.logrotate (from rev 1218327, gitlab/trunk/gitlab.logrotate) =================================================================== --- gitlab.logrotate (rev 0) +++ gitlab.logrotate 2022-06-01 18:16:04 UTC (rev 1218328) @@ -0,0 +1,6 @@ +<LOGDIR>/*.log { + missingok + compress + notifempty + copytruncate +} Deleted: gitlab.target =================================================================== --- gitlab.target 2022-06-01 18:14:59 UTC (rev 1218327) +++ gitlab.target 2022-06-01 18:16:04 UTC (rev 1218328) @@ -1,7 +0,0 @@ -[Unit] -Description=GitLab - Self Hosted Git Management -Requires=gitlab-puma.service gitlab-workhorse.service -Wants=gitlab-sidekiq.service gitlab-backup.timer gitlab-gitaly.service gitlab-mailroom.service - -[Install] -WantedBy=multi-user.target Copied: gitlab/repos/community-x86_64/gitlab.target (from rev 1218327, gitlab/trunk/gitlab.target) =================================================================== --- gitlab.target (rev 0) +++ gitlab.target 2022-06-01 18:16:04 UTC (rev 1218328) @@ -0,0 +1,7 @@ +[Unit] +Description=GitLab - Self Hosted Git Management +Requires=gitlab-puma.service gitlab-workhorse.service +Wants=gitlab-sidekiq.service gitlab-backup.timer gitlab-gitaly.service gitlab-mailroom.service + +[Install] +WantedBy=multi-user.target Deleted: gitlab.tmpfiles.d =================================================================== --- gitlab.tmpfiles.d 2022-06-01 18:14:59 UTC (rev 1218327) +++ gitlab.tmpfiles.d 2022-06-01 18:16:04 UTC (rev 1218328) @@ -1 +0,0 @@ -d /run/gitlab 0775 gitlab gitlab - - Copied: gitlab/repos/community-x86_64/gitlab.tmpfiles.d (from rev 1218327, gitlab/trunk/gitlab.tmpfiles.d) =================================================================== --- gitlab.tmpfiles.d (rev 0) +++ gitlab.tmpfiles.d 2022-06-01 18:16:04 UTC (rev 1218328) @@ -0,0 +1 @@ +d /run/gitlab 0775 gitlab gitlab - -