2018-10-22 07:00:50 +00:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-06-19 10:17:54 +00:00
|
|
|
# Gitaly note: SSH key operations are not part of Gitaly so will never be migrated.
|
2017-07-13 15:58:45 +00:00
|
|
|
|
2016-06-24 19:06:46 +00:00
|
|
|
require 'securerandom'
|
|
|
|
|
2012-05-26 10:37:49 +00:00
|
|
|
module Gitlab
|
2013-02-04 13:07:56 +00:00
|
|
|
class Shell
|
2017-07-03 18:28:29 +00:00
|
|
|
GITLAB_SHELL_ENV_VARS = %w(GIT_TERMINAL_PROMPT).freeze
|
|
|
|
|
2017-03-01 11:00:37 +00:00
|
|
|
Error = Class.new(StandardError)
|
2012-09-07 05:16:29 +00:00
|
|
|
|
2014-11-05 16:14:22 +00:00
|
|
|
class << self
|
2020-01-27 12:08:35 +00:00
|
|
|
# Retrieve GitLab Shell secret token
|
|
|
|
#
|
|
|
|
# @return [String] secret token
|
2016-09-29 16:46:54 +00:00
|
|
|
def secret_token
|
|
|
|
@secret_token ||= begin
|
|
|
|
File.read(Gitlab.config.gitlab_shell.secret_file).chomp
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
# Ensure gitlab shell has a secret token stored in the secret_file
|
|
|
|
# if that was never generated, generate a new one
|
2016-09-29 16:46:54 +00:00
|
|
|
def ensure_secret_token!
|
|
|
|
return if File.exist?(File.join(Gitlab.config.gitlab_shell.path, '.gitlab_shell_secret'))
|
|
|
|
|
|
|
|
generate_and_link_secret_token
|
|
|
|
end
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
# Returns required GitLab shell version
|
|
|
|
#
|
|
|
|
# @return [String] version from the manifest file
|
2014-11-05 16:14:22 +00:00
|
|
|
def version_required
|
2017-06-21 13:48:12 +00:00
|
|
|
@version_required ||= File.read(Rails.root
|
|
|
|
.join('GITLAB_SHELL_VERSION')).strip
|
2014-11-05 16:14:22 +00:00
|
|
|
end
|
2016-09-16 09:43:05 +00:00
|
|
|
|
2016-09-29 16:46:54 +00:00
|
|
|
private
|
|
|
|
|
|
|
|
# Create (if necessary) and link the secret token file
|
|
|
|
def generate_and_link_secret_token
|
|
|
|
secret_file = Gitlab.config.gitlab_shell.secret_file
|
|
|
|
shell_path = Gitlab.config.gitlab_shell.path
|
|
|
|
|
|
|
|
unless File.size?(secret_file)
|
|
|
|
# Generate a new token of 16 random hexadecimal characters and store it in secret_file.
|
2016-10-13 08:04:58 +00:00
|
|
|
@secret_token = SecureRandom.hex(16)
|
|
|
|
File.write(secret_file, @secret_token)
|
2016-09-29 16:46:54 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
link_path = File.join(shell_path, '.gitlab_shell_secret')
|
|
|
|
if File.exist?(shell_path) && !File.exist?(link_path)
|
|
|
|
FileUtils.symlink(secret_file, link_path)
|
|
|
|
end
|
|
|
|
end
|
2014-11-05 16:14:22 +00:00
|
|
|
end
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
# Initialize a new project repository using a Project model
|
|
|
|
#
|
|
|
|
# @param [Project] project
|
|
|
|
# @return [Boolean] whether repository could be created
|
2019-01-17 21:50:18 +00:00
|
|
|
def create_project_repository(project)
|
|
|
|
create_repository(project.repository_storage, project.disk_path, project.full_path)
|
|
|
|
end
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
# Initialize a new wiki repository using a Project model
|
|
|
|
#
|
|
|
|
# @param [Project] project
|
|
|
|
# @return [Boolean] whether repository could be created
|
2019-01-17 21:50:18 +00:00
|
|
|
def create_wiki_repository(project)
|
|
|
|
create_repository(project.repository_storage, project.wiki.disk_path, project.wiki.full_path)
|
|
|
|
end
|
|
|
|
|
2013-02-04 13:07:56 +00:00
|
|
|
# Init new repository
|
2013-01-28 19:02:10 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @example Create a repository
|
2018-12-23 07:34:35 +00:00
|
|
|
# create_repository("default", "path/to/gitlab-ci", "gitlab/gitlab-ci")
|
2013-01-28 15:39:02 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @param [String] storage the shard key
|
|
|
|
# @param [String] disk_path project path on disk
|
|
|
|
# @param [String] gl_project_path project name
|
|
|
|
# @return [Boolean] whether repository could be created
|
2019-01-24 19:37:26 +00:00
|
|
|
def create_repository(storage, disk_path, gl_project_path)
|
2019-01-17 19:17:14 +00:00
|
|
|
relative_path = disk_path.dup
|
2017-09-28 17:07:22 +00:00
|
|
|
relative_path << '.git' unless relative_path.end_with?('.git')
|
|
|
|
|
2019-01-17 19:21:29 +00:00
|
|
|
# During creation of a repository, gl_repository may not be known
|
|
|
|
# because that depends on a yet-to-be assigned project ID in the
|
|
|
|
# database (e.g. project-1234), so for now it is blank.
|
2019-01-24 19:37:26 +00:00
|
|
|
repository = Gitlab::Git::Repository.new(storage, relative_path, '', gl_project_path)
|
2018-07-06 12:44:54 +00:00
|
|
|
wrapped_gitaly_errors { repository.gitaly_repository_client.create_repository }
|
|
|
|
|
|
|
|
true
|
2018-03-14 09:33:41 +00:00
|
|
|
rescue => err # Once the Rugged codes gets removes this can be improved
|
2019-07-10 19:26:47 +00:00
|
|
|
Rails.logger.error("Failed to add repository #{storage}/#{disk_path}: #{err}") # rubocop:disable Gitlab/RailsLogger
|
2017-08-14 11:29:47 +00:00
|
|
|
false
|
2012-11-21 05:54:05 +00:00
|
|
|
end
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
# Import wiki repository from external service
|
|
|
|
#
|
|
|
|
# @param [Project] project
|
|
|
|
# @param [Gitlab::LegacyGithubImport::WikiFormatter, Gitlab::BitbucketImport::WikiFormatter] wiki_formatter
|
|
|
|
# @return [Boolean] whether repository could be imported
|
2019-01-17 08:35:40 +00:00
|
|
|
def import_wiki_repository(project, wiki_formatter)
|
|
|
|
import_repository(project.repository_storage, wiki_formatter.disk_path, wiki_formatter.import_url, project.wiki.full_path)
|
|
|
|
end
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
# Import project repository from external service
|
|
|
|
#
|
|
|
|
# @param [Project] project
|
|
|
|
# @return [Boolean] whether repository could be imported
|
2019-01-17 08:35:40 +00:00
|
|
|
def import_project_repository(project)
|
|
|
|
import_repository(project.repository_storage, project.disk_path, project.import_url, project.full_path)
|
|
|
|
end
|
|
|
|
|
2013-02-11 17:41:02 +00:00
|
|
|
# Import repository
|
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @example Import a repository
|
|
|
|
# import_repository("nfs-file06", "gitlab/gitlab-ci", "https://gitlab.com/gitlab-org/gitlab-test.git", "gitlab/gitlab-ci")
|
2013-02-11 17:41:02 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @param [String] storage project's storage name
|
|
|
|
# @param [String] disk_path project path on disk
|
|
|
|
# @param [String] url from external resource to import from
|
|
|
|
# @param [String] gl_project_path project name
|
|
|
|
# @return [Boolean] whether repository could be imported
|
|
|
|
def import_repository(storage, disk_path, url, gl_project_path)
|
2018-01-04 17:05:49 +00:00
|
|
|
if url.start_with?('.', '/')
|
2018-01-04 15:34:37 +00:00
|
|
|
raise Error.new("don't use disk paths with import_repository: #{url.inspect}")
|
|
|
|
end
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
relative_path = "#{disk_path}.git"
|
2019-01-24 19:37:26 +00:00
|
|
|
cmd = GitalyGitlabProjects.new(storage, relative_path, gl_project_path)
|
2017-12-11 17:52:07 +00:00
|
|
|
|
2018-06-05 15:58:28 +00:00
|
|
|
success = cmd.import_project(url, git_timeout)
|
2017-12-11 17:52:07 +00:00
|
|
|
raise Error, cmd.output unless success
|
|
|
|
|
|
|
|
success
|
2013-02-11 17:41:02 +00:00
|
|
|
end
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
# Move or rename a repository
|
2013-03-12 10:37:53 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @example Move/rename a repository
|
2016-06-22 21:04:51 +00:00
|
|
|
# mv_repository("/path/to/storage", "gitlab/gitlab-ci", "randx/gitlab-ci-new")
|
2020-01-27 12:08:35 +00:00
|
|
|
#
|
|
|
|
# @param [String] storage project's storage path
|
|
|
|
# @param [String] disk_path current project path on disk
|
|
|
|
# @param [String] new_disk_path new project path on disk
|
|
|
|
# @return [Boolean] whether repository could be moved/renamed on disk
|
|
|
|
def mv_repository(storage, disk_path, new_disk_path)
|
|
|
|
return false if disk_path.empty? || new_disk_path.empty?
|
2018-01-05 12:29:04 +00:00
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
Gitlab::Git::Repository.new(storage, "#{disk_path}.git", nil, nil).rename("#{new_disk_path}.git")
|
2019-10-02 15:06:12 +00:00
|
|
|
|
|
|
|
true
|
|
|
|
rescue => e
|
2020-01-27 12:08:35 +00:00
|
|
|
Gitlab::ErrorTracking.track_exception(e, path: disk_path, new_path: new_disk_path, storage: storage)
|
2019-10-02 15:06:12 +00:00
|
|
|
|
|
|
|
false
|
2013-03-12 10:37:53 +00:00
|
|
|
end
|
|
|
|
|
2017-11-30 21:34:31 +00:00
|
|
|
# Fork repository to new path
|
2020-01-27 12:08:35 +00:00
|
|
|
#
|
|
|
|
# @param [Project] source_project forked-from Project
|
|
|
|
# @param [Project] target_project forked-to Project
|
2019-01-17 06:40:23 +00:00
|
|
|
def fork_repository(source_project, target_project)
|
|
|
|
forked_from_relative_path = "#{source_project.disk_path}.git"
|
|
|
|
fork_args = [target_project.repository_storage, "#{target_project.disk_path}.git", target_project.full_path]
|
|
|
|
|
|
|
|
GitalyGitlabProjects.new(source_project.repository_storage, forked_from_relative_path, source_project.full_path).fork_repository(*fork_args)
|
2013-03-19 15:37:50 +00:00
|
|
|
end
|
|
|
|
|
2018-01-05 12:29:04 +00:00
|
|
|
# Removes a repository from file system, using rm_diretory which is an alias
|
|
|
|
# for rm_namespace. Given the underlying implementation removes the name
|
|
|
|
# passed as second argument on the passed storage.
|
2013-01-28 15:22:45 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @example Remove a repository
|
2016-06-22 21:04:51 +00:00
|
|
|
# remove_repository("/path/to/storage", "gitlab/gitlab-ci")
|
2020-01-27 12:08:35 +00:00
|
|
|
#
|
|
|
|
# @param [String] storage project's storage path
|
|
|
|
# @param [String] disk_path current project path on disk
|
|
|
|
def remove_repository(storage, disk_path)
|
|
|
|
return false if disk_path.empty?
|
2018-01-05 12:29:04 +00:00
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
Gitlab::Git::Repository.new(storage, "#{disk_path}.git", nil, nil).remove
|
2019-10-02 15:06:12 +00:00
|
|
|
|
|
|
|
true
|
|
|
|
rescue => e
|
2020-01-27 12:08:35 +00:00
|
|
|
Rails.logger.warn("Repository does not exist: #{e} at: #{disk_path}.git") # rubocop:disable Gitlab/RailsLogger
|
|
|
|
Gitlab::ErrorTracking.track_exception(e, path: disk_path, storage: storage)
|
2019-10-02 15:06:12 +00:00
|
|
|
|
2018-01-05 12:29:04 +00:00
|
|
|
false
|
2012-03-05 22:26:40 +00:00
|
|
|
end
|
|
|
|
|
2019-03-19 11:16:21 +00:00
|
|
|
# Add new key to authorized_keys
|
2013-02-04 12:28:10 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @example Add new key
|
2013-02-05 09:12:15 +00:00
|
|
|
# add_key("key-42", "sha-rsa ...")
|
2013-02-04 13:07:56 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @param [String] key_id identifier of the key
|
|
|
|
# @param [String] key_content key content (public certificate)
|
|
|
|
# @return [Boolean] whether key could be added
|
2013-02-05 09:12:15 +00:00
|
|
|
def add_key(key_id, key_content)
|
2017-05-30 23:24:45 +00:00
|
|
|
return unless self.authorized_keys_enabled?
|
|
|
|
|
2019-08-23 05:53:40 +00:00
|
|
|
gitlab_authorized_keys.add_key(key_id, key_content)
|
2013-02-04 13:07:56 +00:00
|
|
|
end
|
|
|
|
|
2014-03-13 17:32:30 +00:00
|
|
|
# Batch-add keys to authorized_keys
|
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @example
|
2019-03-19 11:16:21 +00:00
|
|
|
# batch_add_keys(Key.all)
|
2020-01-27 12:08:35 +00:00
|
|
|
#
|
|
|
|
# @param [Array<Key>] keys
|
|
|
|
# @return [Boolean] whether keys could be added
|
2019-03-19 11:16:21 +00:00
|
|
|
def batch_add_keys(keys)
|
2017-05-30 23:24:45 +00:00
|
|
|
return unless self.authorized_keys_enabled?
|
|
|
|
|
2019-08-23 05:53:40 +00:00
|
|
|
gitlab_authorized_keys.batch_add_keys(keys)
|
2014-03-13 17:32:30 +00:00
|
|
|
end
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
# Remove SSH key from authorized_keys
|
2013-01-28 15:39:02 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @example Remove a key
|
2019-03-19 11:16:21 +00:00
|
|
|
# remove_key("key-342")
|
2013-01-28 15:39:02 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @param [String] key_id
|
|
|
|
# @return [Boolean] whether key could be removed or not
|
|
|
|
def remove_key(key_id, _ = nil)
|
2017-05-30 23:24:45 +00:00
|
|
|
return unless self.authorized_keys_enabled?
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
gitlab_authorized_keys.rm_key(key_id)
|
2013-01-28 15:39:02 +00:00
|
|
|
end
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
# Remove all SSH keys from gitlab shell
|
2013-07-18 10:55:01 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @example Remove all keys
|
2013-07-29 10:46:00 +00:00
|
|
|
# remove_all_keys
|
2013-07-18 10:55:01 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @return [Boolean] whether keys could be removed or not
|
2013-07-18 10:55:01 +00:00
|
|
|
def remove_all_keys
|
2017-05-30 23:24:45 +00:00
|
|
|
return unless self.authorized_keys_enabled?
|
|
|
|
|
2019-08-23 05:53:40 +00:00
|
|
|
gitlab_authorized_keys.clear
|
2013-07-18 10:55:01 +00:00
|
|
|
end
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
# Remove SSH keys from gitlab shell that are not in the DB
|
2017-06-26 21:40:08 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @example Remove keys not on the database
|
2017-06-26 21:40:08 +00:00
|
|
|
# remove_keys_not_found_in_db
|
|
|
|
#
|
2018-08-27 15:31:01 +00:00
|
|
|
# rubocop: disable CodeReuse/ActiveRecord
|
2017-06-26 21:40:08 +00:00
|
|
|
def remove_keys_not_found_in_db
|
|
|
|
return unless self.authorized_keys_enabled?
|
|
|
|
|
2019-07-10 19:26:47 +00:00
|
|
|
Rails.logger.info("Removing keys not found in DB") # rubocop:disable Gitlab/RailsLogger
|
2017-06-26 21:40:08 +00:00
|
|
|
|
|
|
|
batch_read_key_ids do |ids_in_file|
|
|
|
|
ids_in_file.uniq!
|
|
|
|
keys_in_db = Key.where(id: ids_in_file)
|
|
|
|
|
|
|
|
next unless ids_in_file.size > keys_in_db.count # optimization
|
|
|
|
|
|
|
|
ids_to_remove = ids_in_file - keys_in_db.pluck(:id)
|
|
|
|
ids_to_remove.each do |id|
|
2019-07-10 19:26:47 +00:00
|
|
|
Rails.logger.info("Removing key-#{id} not found in DB") # rubocop:disable Gitlab/RailsLogger
|
2017-06-26 21:40:08 +00:00
|
|
|
remove_key("key-#{id}")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2018-08-27 15:31:01 +00:00
|
|
|
# rubocop: enable CodeReuse/ActiveRecord
|
2017-06-26 21:40:08 +00:00
|
|
|
|
2013-03-21 20:11:08 +00:00
|
|
|
# Add empty directory for storing repositories
|
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @example Add new namespace directory
|
2018-04-13 10:57:19 +00:00
|
|
|
# add_namespace("default", "gitlab")
|
2013-03-21 20:11:08 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @param [String] storage project's storage path
|
|
|
|
# @param [String] name namespace name
|
2016-06-22 21:04:51 +00:00
|
|
|
def add_namespace(storage, name)
|
2019-02-22 14:51:27 +00:00
|
|
|
Gitlab::GitalyClient.allow_n_plus_1_calls do
|
|
|
|
Gitlab::GitalyClient::NamespaceService.new(storage).add(name)
|
|
|
|
end
|
2017-09-12 10:26:59 +00:00
|
|
|
rescue GRPC::InvalidArgument => e
|
|
|
|
raise ArgumentError, e.message
|
2013-03-21 20:11:08 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Remove directory from repositories storage
|
|
|
|
# Every repository inside this directory will be removed too
|
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @example Remove namespace directory
|
2018-04-13 10:57:19 +00:00
|
|
|
# rm_namespace("default", "gitlab")
|
2013-03-21 20:11:08 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @param [String] storage project's storage path
|
|
|
|
# @param [String] name namespace name
|
2016-06-22 21:04:51 +00:00
|
|
|
def rm_namespace(storage, name)
|
2018-05-02 09:22:15 +00:00
|
|
|
Gitlab::GitalyClient::NamespaceService.new(storage).remove(name)
|
2017-09-12 10:26:59 +00:00
|
|
|
rescue GRPC::InvalidArgument => e
|
|
|
|
raise ArgumentError, e.message
|
2013-03-21 20:11:08 +00:00
|
|
|
end
|
2018-01-05 12:29:04 +00:00
|
|
|
alias_method :rm_directory, :rm_namespace
|
2013-03-21 20:11:08 +00:00
|
|
|
|
|
|
|
# Move namespace directory inside repositories storage
|
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @example Move/rename a namespace directory
|
2016-06-22 21:04:51 +00:00
|
|
|
# mv_namespace("/path/to/storage", "gitlab", "gitlabhq")
|
2013-03-21 20:11:08 +00:00
|
|
|
#
|
2020-01-27 12:08:35 +00:00
|
|
|
# @param [String] storage project's storage path
|
|
|
|
# @param [String] old_name current namespace name
|
|
|
|
# @param [String] new_name new namespace name
|
2016-06-22 21:04:51 +00:00
|
|
|
def mv_namespace(storage, old_name, new_name)
|
2018-05-02 09:22:15 +00:00
|
|
|
Gitlab::GitalyClient::NamespaceService.new(storage).rename(old_name, new_name)
|
2019-01-03 21:03:35 +00:00
|
|
|
rescue GRPC::InvalidArgument => e
|
2019-12-16 12:07:43 +00:00
|
|
|
Gitlab::ErrorTracking.track_exception(e, old_name: old_name, new_name: new_name, storage: storage)
|
2019-01-03 21:03:35 +00:00
|
|
|
|
2017-10-05 13:01:26 +00:00
|
|
|
false
|
2013-03-21 20:11:08 +00:00
|
|
|
end
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
# Return a SSH url for a given project path
|
|
|
|
#
|
|
|
|
# @param [String] full_path project path (URL)
|
|
|
|
# @return [String] SSH URL
|
|
|
|
def url_to_repo(full_path)
|
|
|
|
Gitlab.config.gitlab_shell.ssh_path_prefix + "#{full_path}.git"
|
2012-08-28 21:04:06 +00:00
|
|
|
end
|
2013-03-12 10:37:53 +00:00
|
|
|
|
2013-11-20 11:41:41 +00:00
|
|
|
# Return GitLab shell version
|
2020-01-27 12:08:35 +00:00
|
|
|
#
|
|
|
|
# @return [String] version
|
2013-11-20 11:41:41 +00:00
|
|
|
def version
|
2013-12-09 17:32:37 +00:00
|
|
|
gitlab_shell_version_file = "#{gitlab_shell_path}/VERSION"
|
2013-11-20 11:41:41 +00:00
|
|
|
|
|
|
|
if File.readable?(gitlab_shell_version_file)
|
2015-04-06 12:02:49 +00:00
|
|
|
File.read(gitlab_shell_version_file).chomp
|
2013-11-20 11:41:41 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
# Check if repository exists on disk
|
|
|
|
#
|
|
|
|
# @example Check if repository exists
|
|
|
|
# repository_exists?('default', 'gitlab-org/gitlab.git')
|
|
|
|
#
|
|
|
|
# @return [Boolean] whether repository exists or not
|
|
|
|
# @param [String] storage project's storage path
|
|
|
|
# @param [Object] dir_name repository dir name
|
2019-10-09 09:06:19 +00:00
|
|
|
def repository_exists?(storage, dir_name)
|
|
|
|
Gitlab::Git::Repository.new(storage, dir_name, nil, nil).exists?
|
|
|
|
rescue GRPC::Internal
|
|
|
|
false
|
|
|
|
end
|
|
|
|
|
2020-01-27 12:08:35 +00:00
|
|
|
# Return hooks folder path used by projects
|
|
|
|
#
|
|
|
|
# @return [String] path
|
2019-02-27 10:58:21 +00:00
|
|
|
def hooks_path
|
|
|
|
File.join(gitlab_shell_path, 'hooks')
|
|
|
|
end
|
|
|
|
|
2013-03-21 20:11:08 +00:00
|
|
|
protected
|
|
|
|
|
2013-12-09 17:32:37 +00:00
|
|
|
def gitlab_shell_path
|
2017-08-14 11:29:47 +00:00
|
|
|
File.expand_path(Gitlab.config.gitlab_shell.path)
|
|
|
|
end
|
|
|
|
|
2013-02-14 23:10:18 +00:00
|
|
|
def gitlab_shell_user_home
|
|
|
|
File.expand_path("~#{Gitlab.config.gitlab_shell.ssh_user}")
|
|
|
|
end
|
|
|
|
|
2016-06-22 21:04:51 +00:00
|
|
|
def full_path(storage, dir_name)
|
2013-03-21 20:11:08 +00:00
|
|
|
raise ArgumentError.new("Directory name can't be blank") if dir_name.blank?
|
|
|
|
|
2018-04-13 10:57:19 +00:00
|
|
|
File.join(Gitlab.config.repositories.storages[storage].legacy_disk_path, dir_name)
|
2013-03-21 20:11:08 +00:00
|
|
|
end
|
|
|
|
|
2017-09-01 15:20:49 +00:00
|
|
|
def authorized_keys_enabled?
|
|
|
|
# Return true if nil to ensure the authorized_keys methods work while
|
|
|
|
# fixing the authorized_keys file during migration.
|
|
|
|
return true if Gitlab::CurrentSettings.current_application_settings.authorized_keys_enabled.nil?
|
|
|
|
|
|
|
|
Gitlab::CurrentSettings.current_application_settings.authorized_keys_enabled
|
|
|
|
end
|
|
|
|
|
2017-07-03 18:28:29 +00:00
|
|
|
private
|
|
|
|
|
2017-12-11 17:52:07 +00:00
|
|
|
def git_timeout
|
|
|
|
Gitlab.config.gitlab_shell.git_timeout
|
|
|
|
end
|
|
|
|
|
2018-07-06 12:44:54 +00:00
|
|
|
def wrapped_gitaly_errors
|
|
|
|
yield
|
2017-08-10 14:08:48 +00:00
|
|
|
rescue GRPC::NotFound, GRPC::BadStatus => e
|
|
|
|
# Old Popen code returns [Error, output] to the caller, so we
|
|
|
|
# need to do the same here...
|
|
|
|
raise Error, e
|
|
|
|
end
|
2018-06-05 15:58:28 +00:00
|
|
|
|
2019-03-19 11:16:21 +00:00
|
|
|
def gitlab_authorized_keys
|
|
|
|
@gitlab_authorized_keys ||= Gitlab::AuthorizedKeys.new
|
|
|
|
end
|
|
|
|
|
|
|
|
def batch_read_key_ids(batch_size: 100, &block)
|
|
|
|
return unless self.authorized_keys_enabled?
|
|
|
|
|
2019-08-23 05:53:40 +00:00
|
|
|
gitlab_authorized_keys.list_key_ids.lazy.each_slice(batch_size) do |key_ids|
|
|
|
|
yield(key_ids)
|
2019-03-19 11:16:21 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def strip_key(key)
|
|
|
|
key.split(/[ ]+/)[0, 2].join(' ')
|
|
|
|
end
|
|
|
|
|
|
|
|
def add_keys_to_io(keys, io)
|
|
|
|
keys.each do |k|
|
|
|
|
key = strip_key(k.key)
|
|
|
|
|
|
|
|
raise Error.new("Invalid key: #{key.inspect}") if key.include?("\t") || key.include?("\n")
|
|
|
|
|
|
|
|
io.puts("#{k.shell_id}\t#{key}")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-06-05 15:58:28 +00:00
|
|
|
class GitalyGitlabProjects
|
2019-01-24 19:37:26 +00:00
|
|
|
attr_reader :shard_name, :repository_relative_path, :output, :gl_project_path
|
2018-06-05 15:58:28 +00:00
|
|
|
|
2019-01-24 19:37:26 +00:00
|
|
|
def initialize(shard_name, repository_relative_path, gl_project_path)
|
2018-06-05 15:58:28 +00:00
|
|
|
@shard_name = shard_name
|
|
|
|
@repository_relative_path = repository_relative_path
|
|
|
|
@output = ''
|
2019-01-24 19:37:26 +00:00
|
|
|
@gl_project_path = gl_project_path
|
2018-06-05 15:58:28 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def import_project(source, _timeout)
|
2019-01-24 19:37:26 +00:00
|
|
|
raw_repository = Gitlab::Git::Repository.new(shard_name, repository_relative_path, nil, gl_project_path)
|
2018-06-05 15:58:28 +00:00
|
|
|
|
|
|
|
Gitlab::GitalyClient::RepositoryService.new(raw_repository).import_repository(source)
|
|
|
|
true
|
|
|
|
rescue GRPC::BadStatus => e
|
|
|
|
@output = e.message
|
|
|
|
false
|
|
|
|
end
|
|
|
|
|
2018-12-23 07:34:35 +00:00
|
|
|
def fork_repository(new_shard_name, new_repository_relative_path, new_project_name)
|
|
|
|
target_repository = Gitlab::Git::Repository.new(new_shard_name, new_repository_relative_path, nil, new_project_name)
|
2019-01-24 19:37:26 +00:00
|
|
|
raw_repository = Gitlab::Git::Repository.new(shard_name, repository_relative_path, nil, gl_project_path)
|
2018-06-05 15:58:28 +00:00
|
|
|
|
|
|
|
Gitlab::GitalyClient::RepositoryService.new(target_repository).fork_repository(raw_repository)
|
|
|
|
rescue GRPC::BadStatus => e
|
|
|
|
logger.error "fork-repository failed: #{e.message}"
|
|
|
|
false
|
|
|
|
end
|
|
|
|
|
|
|
|
def logger
|
2019-07-10 19:26:47 +00:00
|
|
|
Rails.logger # rubocop:disable Gitlab/RailsLogger
|
2018-06-05 15:58:28 +00:00
|
|
|
end
|
|
|
|
end
|
2011-12-03 23:44:59 +00:00
|
|
|
end
|
|
|
|
end
|