Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-workhorse
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kazuhiko Shiozaki
gitlab-workhorse
Commits
c4287a08
Commit
c4287a08
authored
Jan 06, 2016
by
Jacob Vosmaer
Browse files
Options
Browse Files
Download
Plain Diff
Merge commit '
7620c2fa
' into readme
parents
e2ba5727
7620c2fa
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
13 additions
and
14 deletions
+13
-14
README.md
README.md
+13
-14
No files found.
README.md
View file @
c4287a08
# gitlab-workhorse
# gitlab-workhorse
gitlab-workhorse was designed to unload Git HTTP traffic from
Gitlab-workhorse is a smart reverse proxy for GitLab. It handles
the GitLab Rails app (Unicorn) to a separate daemon. It also serves
"large" HTTP requests such as file downloads, file uploads, Git
'git archive' downloads for GitLab. All authentication and
push/pull and Git archive downloads.
authorization logic is still handled by the GitLab Rails app.
Architecture: Git client -> NGINX -> gitlab-workhorse (makes
auth request to GitLab Rails app) -> git-upload-pack
## Usage
## Usage
...
@@ -18,6 +15,10 @@ Options:
...
@@ -18,6 +15,10 @@ Options:
Authentication/authorization backend (default "http://localhost:8080")
Authentication/authorization backend (default "http://localhost:8080")
-authSocket string
-authSocket string
Optional: Unix domain socket to dial authBackend at
Optional: Unix domain socket to dial authBackend at
-developmentMode
Allow to serve assets from Rails app
-documentRoot string
Path to static files content (default "public")
-listenAddr string
-listenAddr string
Listen address for HTTP server (default "localhost:8181")
Listen address for HTTP server (default "localhost:8181")
-listenNetwork string
-listenNetwork string
...
@@ -26,19 +27,17 @@ Options:
...
@@ -26,19 +27,17 @@ Options:
Umask for Unix socket, default: 022 (default 18)
Umask for Unix socket, default: 022 (default 18)
-pprofListenAddr string
-pprofListenAddr string
pprof listening address, e.g. 'localhost:6060'
pprof listening address, e.g. 'localhost:6060'
-proxyHeadersTimeout duration
How long to wait for response headers when proxying the request (default 1m0s)
-relativeURLRoot string
GitLab relative URL root (default "/")
-version
-version
Print version and exit
Print version and exit
```
```
gitlab-workhorse allows Git HTTP clients to push and pull to
The 'auth backend' refers to the GitLab Rails applicatoin. The name is a holdover from when gitlab-workhorse only handled Git push/pull over HTTP.
and from Git repositories. Each incoming request is first replayed
(with an empty request body) to an external authentication/authorization
HTTP server: the 'auth backend'. The auth backend is expected to
be a GitLab Unicorn process. The 'auth response' is a JSON message
which tells gitlab-workhorse the path of the Git repository
to read from/write to.
g
itlab-workhorse can listen on either a TCP or a Unix domain socket. It
G
itlab-workhorse can listen on either a TCP or a Unix domain socket. It
can also open a second listening TCP listening socket with the Go
can also open a second listening TCP listening socket with the Go
[
net/http/pprof profiler server
](
http://golang.org/pkg/net/http/pprof/
)
.
[
net/http/pprof profiler server
](
http://golang.org/pkg/net/http/pprof/
)
.
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment