2018-03-14 09:42:49 -04:00
|
|
|
module Gitlab
|
|
|
|
module GitalyClient
|
|
|
|
# This is a chokepoint that is meant to help us stop remove all places
|
|
|
|
# where production code (app, config, db, lib) touches Git repositories
|
|
|
|
# directly.
|
|
|
|
class StorageSettings
|
2018-06-01 07:56:29 -04:00
|
|
|
extend Gitlab::TemporarilyAllow
|
|
|
|
|
2018-03-14 09:42:49 -04:00
|
|
|
DirectPathAccessError = Class.new(StandardError)
|
2018-05-08 07:13:56 -04:00
|
|
|
InvalidConfigurationError = Class.new(StandardError)
|
|
|
|
|
|
|
|
INVALID_STORAGE_MESSAGE = <<~MSG.freeze
|
|
|
|
Storage is invalid because it has no `path` key.
|
|
|
|
|
|
|
|
For source installations, update your config/gitlab.yml Refer to gitlab.yml.example for an updated example.
|
|
|
|
If you're using the Gitlab Development Kit, you can update your configuration running `gdk reconfigure`.
|
|
|
|
MSG
|
2018-03-14 09:42:49 -04:00
|
|
|
|
|
|
|
# This class will give easily recognizable NoMethodErrors
|
|
|
|
Deprecated = Class.new
|
|
|
|
|
2018-06-01 07:56:29 -04:00
|
|
|
MUTEX = Mutex.new
|
|
|
|
|
|
|
|
DISK_ACCESS_DENIED_FLAG = :deny_disk_access
|
|
|
|
ALLOW_KEY = :allow_disk_access
|
|
|
|
|
|
|
|
# If your code needs this method then your code needs to be fixed.
|
|
|
|
def self.allow_disk_access
|
|
|
|
temporarily_allow(ALLOW_KEY) { yield }
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.disk_access_denied?
|
|
|
|
!temporarily_allowed?(ALLOW_KEY) && GitalyClient.feature_enabled?(DISK_ACCESS_DENIED_FLAG)
|
|
|
|
rescue
|
|
|
|
false # Err on the side of caution, don't break gitlab for people
|
|
|
|
end
|
2018-03-14 09:42:49 -04:00
|
|
|
|
|
|
|
def initialize(storage)
|
2018-05-08 07:13:56 -04:00
|
|
|
raise InvalidConfigurationError, "expected a Hash, got a #{storage.class.name}" unless storage.is_a?(Hash)
|
|
|
|
raise InvalidConfigurationError, INVALID_STORAGE_MESSAGE unless storage.has_key?('path')
|
2018-03-14 09:42:49 -04:00
|
|
|
|
|
|
|
# Support a nil 'path' field because some of the circuit breaker tests use it.
|
|
|
|
@legacy_disk_path = File.expand_path(storage['path'], Rails.root) if storage['path']
|
|
|
|
|
|
|
|
storage['path'] = Deprecated
|
|
|
|
@hash = storage
|
|
|
|
end
|
|
|
|
|
|
|
|
def gitaly_address
|
|
|
|
@hash.fetch(:gitaly_address)
|
|
|
|
end
|
|
|
|
|
2018-06-01 07:56:29 -04:00
|
|
|
def legacy_disk_path
|
|
|
|
if self.class.disk_access_denied?
|
|
|
|
raise DirectPathAccessError, "git disk access denied via the gitaly_#{DISK_ACCESS_DENIED_FLAG} feature"
|
|
|
|
end
|
|
|
|
|
|
|
|
@legacy_disk_path
|
|
|
|
end
|
|
|
|
|
2018-03-14 09:42:49 -04:00
|
|
|
private
|
|
|
|
|
|
|
|
def method_missing(m, *args, &block)
|
|
|
|
@hash.public_send(m, *args, &block) # rubocop:disable GitlabSecurity/PublicSend
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|