Maximilian Dischner activity https://gitlab.com/mdischner 2026-03-17T08:53:32Z tag:gitlab.com,2026-03-17:5211626904 Maximilian Dischner commented on issue #424246 at GitLab.org / GitLab 2026-03-17T08:53:32Z mdischner Maximilian Dischner

@m_frankiewicz @paulobarros I am writing to you regarding the current situation we're facing due to this bug. We need this to work, otherwise our pipelines are broken and this makes GitLab as a platform unusable for us at the moment in its current configuration. I hope you can prioritize this. Are there any updates and next steps?

Feel free to reach out to me if you need more context or if we can test a workaround.

https://gitlab.my.salesforce.com/0014M00001kI5MG PremiumBlocker

tag:gitlab.com,2025-07-04:4404372300 Maximilian Dischner commented on issue #433257 at GitLab.org / GitLab 2025-07-04T04:57:14Z mdischner Maximilian Dischner

Thanks for the update Manuel. Sounds like a good approach for your backlog!

tag:gitlab.com,2025-07-02:4398768898 Maximilian Dischner commented on issue #331415 at GitLab.org / GitLab 2025-07-02T12:32:20Z mdischner Maximilian Dischner

Hi @rutshah,

Is there any update on the timeline for this issue?

As you can see multiple customers are affected...

tag:gitlab.com,2025-07-02:4398758298 Maximilian Dischner commented on issue #433257 at GitLab.org / GitLab 2025-07-02T12:29:39Z mdischner Maximilian Dischner

As currently described, the limitation breaks expected CI/CD logic workflows when diffs exceed certain thresholds.

Could we please consider increasing this issue’s priority? It’s risking product consistency product conformity.

@marknuzzo I wonder why this is being pushed form candidate to candidate label. Already GL18 now... As you can see other super large customers are also affected...

tag:gitlab.com,2025-06-17:4356880540 Maximilian Dischner commented on issue #541017 at GitLab.org / GitLab 2025-06-17T15:39:48Z mdischner Maximilian Dischner

Hi @phikai,
I'm reaching out from a team using GitLab Premium, and we’d really love to see this feature implemented. It would make a big difference in our daily work — being able to quickly spot other open MRs that touch the same files would help us avoid conflicts and streamline collaboration across teams.

Do you have any sense of when this might get picked up? We'd really appreciate any insights on the timeline or roadmap status.

Thanks a lot for all the great work you and the team are doing!

https://gitlab.my.salesforce.com/0014M00001kI5MG

tag:gitlab.com,2025-04-25:4215476424 Maximilian Dischner commented on epic #15990 at GitLab.org 2025-04-25T11:27:06Z mdischner Maximilian Dischner

Hi @paulobarros,

Do you have any update on the timeline for this? It’s currently blocking a major part of our project development, specifically user onboarding, so we’d really appreciate any insight on expected availability. Also curious if there are still significant technical or organisational barriers to overcome?

Thanks a lot in advance!
Maximilian

Customer-ID: https://gitlab.my.salesforce.com/0014M00001kI5MG

tag:gitlab.com,2025-04-24:4211059636 Maximilian Dischner commented on issue #536408 at GitLab.org / GitLab 2025-04-24T06:44:21Z mdischner Maximilian Dischner

Hi @phikai, a change in review process for example? It is not uncommon that this might change, due to changes in the working-guideline.

tag:gitlab.com,2025-04-17:4194473342 Maximilian Dischner commented on issue #536408 at GitLab.org / GitLab 2025-04-17T06:12:38Z mdischner Maximilian Dischner

Hi @lalabi, hi @phikai,

we're a Premium customer and this issue is causing serious trouble for us — when a branch rule is deleted, its approval rules suddenly apply to all branches. This breaks our workflows and could significant damage to product and workflows.

We’ve opened a Salesforce case here: https://gitlab.my.salesforce.com/0014M00001kI5MG\ Would really appreciate it if this could be looked at with urgency. Thanks!

tag:gitlab.com,2025-03-21:4120282137 Maximilian Dischner commented on issue #509428 at GitLab.org / GitLab 2025-03-21T08:09:25Z mdischner Maximilian Dischner

Hi @paulobarros, unfortunately this feature didn't make it into 17.10. How optimistic are you about 17.11?

Can't wait for this feature. It is currently blocking a mayor transformation on a big project right ahead. https://gitlab.my.salesforce.com/0014M00001kI5MG

tag:gitlab.com,2025-03-07:4082932643 Maximilian Dischner commented on issue #38540 at GitLab.org / gitlab-runner 2025-03-07T09:59:23Z mdischner Maximilian Dischner

Hi @avonbertoldi, thanks for the insights.

I wonder why this fix cannot be applied to provide a first rather quick solution to the issue: #38587 (comment 2369732201)

FROM registry.gitlab.com/gitlab-org/gitlab-runner/gitlab-runner-helper:x86_64-v17.8.3-servercore21H2
ENV GIT_CONFIG_NOSYSTEM=
tag:gitlab.com,2025-03-06:4078935047 Maximilian Dischner commented on issue #38540 at GitLab.org / gitlab-runner 2025-03-06T07:07:40Z mdischner Maximilian Dischner

Hi @avonbertoldi, hi @ajwalker, as already commented here, his issue has a significant impact on Windows-based builds.

Which of the two issues is prioritised?

What I don’t understand is why this bug, reported in the 17.8 release, was not addressed in the 17.9 release. Could you clarify what the technical complexity is in fixing this?

https://gitlab.my.salesforce.com/0014M00001kI5MG

tag:gitlab.com,2025-03-06:4078925730 Maximilian Dischner commented on issue #38635 at GitLab.org / gitlab-runner 2025-03-06T07:03:39Z mdischner Maximilian Dischner

Hi @avonbertoldi, hi @ajwalker,

wasn't able to find this issue directly and support in 609819.

This issue has a significant impact on Windows-based builds. This leads to build failures whenever paths exceed the 260-character limit, which is a critical blocker for many projects.

We had no choice but to roll back our entire Windows runner fleet, resulting in a significant loss of development time and disruption to our workflows. This regression is unacceptable — Windows long path support is essential, and breaking it without a fix in place has caused major setbacks.

Can we get an urgent update on a resolution or workaround? Restoring system-level Git configurations must be prioritised to prevent further damage.

https://gitlab.my.salesforce.com/0014M00001kI5MG

tag:gitlab.com,2025-02-27:4060773691 Maximilian Dischner commented on issue #383662 at GitLab.org / GitLab 2025-02-27T09:20:25Z mdischner Maximilian Dischner

This feature is critical for our organization as it impacts our ability to manage permissions effectively and maintain security compliance.

The number of people requesting this and creating duplicate issues should be more than enough reasons to give this weight, right?

Could you please provide an update on the current status and any estimated timelines for its implementation? https://gitlab.my.salesforce.com/0014M00001kI5MG

tag:gitlab.com,2025-02-25:4055074260 Maximilian Dischner commented on issue #338480 at GitLab.org / GitLab 2025-02-25T14:12:10Z mdischner Maximilian Dischner

One more question: We have been deleting pipelines in this matter:

    def get_pipelines_in_range(
        self, project_id: int, before: str, max_pipelines: int = 100
    ) -> list:  # type: ignore[type-arg]
        
        # GET /projects/:id/pipelines
        max_pages = int(max_pipelines / 20)
        pipelines = self.gl.get_request_with_pagination(
            f"projects/{project_id}/pipelines",
            {"updated_before": before, "order_by": "updated_at", "sort": "asc"},
            max_page=max_pages,
        )
        logger.info("Pipelines in range: " + str(len(pipelines)))
        return pipelines  # type: ignore[no-any-return]


    def delete_pipeline(self, project_id: int, pipeline: dict) -> requests.Response:
        # DELETE /projects/:id/pipelines/:pipeline_id
        responce = self.gl.delete_request(f"projects/{project_id}/pipelines", pipeline["id"])
# Some filtering
        return responce

    def clean_pipelines(self, project_id: int, before: str) -> None:
        """Clean the pipelines in a given range.

        Args:
            project_id: Id of the project.
            before: ISO 8601 string.
        """
        # Get 100 pipelines and delete them
        pipelines = [0]
        while pipelines:
            pipelines = self.get_pipelines_in_range(project_id, before, max_pipelines=100)
            logger.info(f"Successfully fetched {len(pipelines)} pipelines")
            if not pipelines:
                break
            threads = [Thread(target=self.delete_pipeline, args=(project_id, pipeline)) for pipeline in pipelines]  # type: ignore[index]
            for thread in threads:
                thread.start()
            for thread in threads:
                thread.join()

We have a lot of bridge and downstream-pipelines. Could I be that they are not deleted properly by the new feature?

tag:gitlab.com,2025-02-19:4040145985 Maximilian Dischner commented on issue #331415 at GitLab.org / GitLab 2025-02-19T12:38:31Z mdischner Maximilian Dischner

Hi @hfyngvason, your assumption is right. Looking forward for your next steps in resolving this (major) issue...

BR Maximilian

tag:gitlab.com,2025-02-19:4039879285 Maximilian Dischner commented on issue #433257 at GitLab.org / GitLab 2025-02-19T11:15:23Z mdischner Maximilian Dischner

Hi @dzalbo, how positive are you about the current candidate label. Can't wait to get this one off my list...

tag:gitlab.com,2025-02-19:4039863154 Maximilian Dischner commented on issue #442031 at GitLab.org / GitLab 2025-02-19T11:10:26Z mdischner Maximilian Dischner

Hi @rutshah,

can't wait to get this one off the list. How positive are you about getting this in the product by 17.11?

BR Maximilian

tag:gitlab.com,2025-02-18:4037134893 Maximilian Dischner commented on issue #22086 at GitLab.org / GitLab 2025-02-18T14:42:49Z mdischner Maximilian Dischner

I've been looking through gitlab-foss#44798 (closed) and linked issues and that's how I found this, most recent, one. I was not able to find any possibility for me as admin to provide data on when a user confirmed terms & conditions (and which one) as depicted in this original requirement:

The accept is logged in the database with at least the timestamp. (To capture the audit requirement.)

gitlab-foss#44798 (closed)

Has this ever been implemented?

@jeremy_ @jramsay @reprazent

tag:gitlab.com,2025-02-13:4025040889 Maximilian Dischner commented on issue #338480 at GitLab.org / GitLab 2025-02-13T08:08:01Z mdischner Maximilian Dischner

@mbobin thanks for the ultra-fast reply. I already have a script to do this on hand, however while going through the process I thought of new projects, which won't have the setting unless I run this script on a regular basis...

tag:gitlab.com,2025-02-13:4024979545 Maximilian Dischner commented on issue #338480 at GitLab.org / GitLab 2025-02-13T07:44:02Z mdischner Maximilian Dischner

Thanks for the good work @mbobin @drew. Can't wait for the final release. I am already testing on GL 17.8.1 on our on prem instance. Big pipeline templating causes a lot of junk being collected in DB can't wait to run the prune to see the results.

One question that I still have: Will this be instance-wide on prem setting in the admin CI/CD section?