2013-02-07 03:06:39 -05:00
|
|
|
namespace :gitlab do
|
|
|
|
namespace :shell do
|
2015-06-23 10:52:40 -04:00
|
|
|
desc "GitLab | Install or upgrade gitlab-shell"
|
2014-04-05 15:31:07 -04:00
|
|
|
task :install, [:tag, :repo] => :environment do |t, args|
|
|
|
|
warn_user_is_not_gitlab
|
|
|
|
|
2014-11-05 11:14:22 -05:00
|
|
|
default_version = Gitlab::Shell.version_required
|
2016-09-28 06:45:46 -04:00
|
|
|
default_version_tag = "v#{default_version}"
|
|
|
|
args.with_defaults(tag: default_version_tag, repo: 'https://gitlab.com/gitlab-org/gitlab-shell.git')
|
2014-04-05 15:31:07 -04:00
|
|
|
|
2014-10-10 05:06:08 -04:00
|
|
|
gitlab_url = Gitlab.config.gitlab.url
|
2014-04-05 15:31:07 -04:00
|
|
|
# gitlab-shell requires a / at the end of the url
|
2014-10-18 16:36:00 -04:00
|
|
|
gitlab_url += '/' unless gitlab_url.end_with?('/')
|
2014-05-02 06:46:32 -04:00
|
|
|
target_dir = Gitlab.config.gitlab_shell.path
|
2014-04-05 15:31:07 -04:00
|
|
|
|
2016-09-28 06:45:46 -04:00
|
|
|
checkout_or_clone_tag(tag: default_version_tag, repo: args.repo, target_dir: target_dir)
|
2014-04-05 15:31:07 -04:00
|
|
|
|
|
|
|
# Make sure we're on the right tag
|
|
|
|
Dir.chdir(target_dir) do
|
|
|
|
config = {
|
2016-09-28 06:45:46 -04:00
|
|
|
user: Gitlab.config.gitlab.user,
|
2014-04-05 15:31:07 -04:00
|
|
|
gitlab_url: gitlab_url,
|
2014-05-02 07:13:45 -04:00
|
|
|
http_settings: {self_signed_cert: false}.stringify_keys,
|
2016-09-28 06:45:46 -04:00
|
|
|
auth_file: File.join(user_home, ".ssh", "authorized_keys"),
|
2014-04-05 15:31:07 -04:00
|
|
|
redis: {
|
|
|
|
bin: %x{which redis-cli}.chomp,
|
|
|
|
namespace: "resque:gitlab"
|
2014-05-02 07:13:45 -04:00
|
|
|
}.stringify_keys,
|
2014-11-18 10:14:36 -05:00
|
|
|
log_level: "INFO",
|
2014-04-05 15:31:07 -04:00
|
|
|
audit_usernames: false
|
2014-05-02 06:46:32 -04:00
|
|
|
}.stringify_keys
|
2014-04-05 15:31:07 -04:00
|
|
|
|
2014-09-22 09:02:46 -04:00
|
|
|
redis_url = URI.parse(ENV['REDIS_URL'] || "redis://localhost:6379")
|
|
|
|
|
|
|
|
if redis_url.scheme == 'unix'
|
|
|
|
config['redis']['socket'] = redis_url.path
|
|
|
|
else
|
|
|
|
config['redis']['host'] = redis_url.host
|
|
|
|
config['redis']['port'] = redis_url.port
|
|
|
|
end
|
|
|
|
|
2014-04-05 15:31:07 -04:00
|
|
|
# Generate config.yml based on existing gitlab settings
|
|
|
|
File.open("config.yml", "w+") {|f| f.puts config.to_yaml}
|
|
|
|
|
|
|
|
# Launch installation process
|
2016-06-22 17:04:51 -04:00
|
|
|
system(*%W(bin/install) + repository_storage_paths_args)
|
2014-04-05 15:31:07 -04:00
|
|
|
end
|
|
|
|
|
2016-08-03 00:46:43 -04:00
|
|
|
# (Re)create hooks
|
|
|
|
Rake::Task['gitlab:shell:create_hooks'].invoke
|
|
|
|
|
2014-04-05 15:31:07 -04:00
|
|
|
# Required for debian packaging with PKGR: Setup .ssh/environment with
|
|
|
|
# the current PATH, so that the correct ruby version gets loaded
|
|
|
|
# Requires to set "PermitUserEnvironment yes" in sshd config (should not
|
|
|
|
# be an issue since it is more than likely that there are no "normal"
|
|
|
|
# user accounts on a gitlab server). The alternative is for the admin to
|
|
|
|
# install a ruby (1.9.3+) in the global path.
|
2016-09-28 06:45:46 -04:00
|
|
|
File.open(File.join(user_home, ".ssh", "environment"), "w+") do |f|
|
2014-04-05 15:31:07 -04:00
|
|
|
f.puts "PATH=#{ENV['PATH']}"
|
|
|
|
end
|
2016-06-24 15:06:46 -04:00
|
|
|
|
2016-09-29 12:46:54 -04:00
|
|
|
Gitlab::Shell.ensure_secret_token!
|
2014-04-05 15:31:07 -04:00
|
|
|
end
|
|
|
|
|
2015-06-23 10:52:40 -04:00
|
|
|
desc "GitLab | Setup gitlab-shell"
|
2013-02-09 05:30:49 -05:00
|
|
|
task setup: :environment do
|
2013-02-07 03:06:39 -05:00
|
|
|
setup
|
|
|
|
end
|
2013-02-09 05:30:49 -05:00
|
|
|
|
2015-06-23 10:52:40 -04:00
|
|
|
desc "GitLab | Build missing projects"
|
2013-02-09 05:30:49 -05:00
|
|
|
task build_missing_projects: :environment do
|
|
|
|
Project.find_each(batch_size: 1000) do |project|
|
2014-11-05 11:51:08 -05:00
|
|
|
path_to_repo = project.repository.path_to_repo
|
2016-08-09 17:23:25 -04:00
|
|
|
if File.exist?(path_to_repo)
|
2013-02-09 05:30:49 -05:00
|
|
|
print '-'
|
|
|
|
else
|
2016-06-22 17:04:51 -04:00
|
|
|
if Gitlab::Shell.new.add_repository(project.repository_storage_path,
|
|
|
|
project.path_with_namespace)
|
2013-02-09 05:30:49 -05:00
|
|
|
print '.'
|
|
|
|
else
|
|
|
|
print 'F'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2016-08-03 00:46:43 -04:00
|
|
|
|
|
|
|
desc 'Create or repair repository hooks symlink'
|
|
|
|
task create_hooks: :environment do
|
|
|
|
warn_user_is_not_gitlab
|
|
|
|
|
|
|
|
puts 'Creating/Repairing hooks symlinks for all repositories'
|
|
|
|
system(*%W(#{Gitlab.config.gitlab_shell.path}/bin/create-hooks) + repository_storage_paths_args)
|
|
|
|
puts 'done'.color(:green)
|
|
|
|
end
|
2013-02-07 03:06:39 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def setup
|
|
|
|
warn_user_is_not_gitlab
|
|
|
|
|
2013-05-29 15:19:23 -04:00
|
|
|
unless ENV['force'] == 'yes'
|
|
|
|
puts "This will rebuild an authorized_keys file."
|
2013-07-18 06:55:01 -04:00
|
|
|
puts "You will lose any data stored in authorized_keys file."
|
2013-05-29 15:19:23 -04:00
|
|
|
ask_to_continue
|
|
|
|
puts ""
|
|
|
|
end
|
2013-02-07 03:06:39 -05:00
|
|
|
|
2013-07-18 06:55:01 -04:00
|
|
|
Gitlab::Shell.new.remove_all_keys
|
2013-02-07 03:06:39 -05:00
|
|
|
|
2014-03-13 13:32:30 -04:00
|
|
|
Gitlab::Shell.new.batch_add_keys do |adder|
|
|
|
|
Key.find_each(batch_size: 1000) do |key|
|
|
|
|
adder.add_key(key.shell_id, key.key)
|
2013-02-07 03:06:39 -05:00
|
|
|
print '.'
|
|
|
|
end
|
|
|
|
end
|
2015-03-20 13:43:52 -04:00
|
|
|
puts ""
|
2013-02-07 03:06:39 -05:00
|
|
|
|
2014-03-13 13:32:30 -04:00
|
|
|
unless $?.success?
|
2016-06-01 18:37:15 -04:00
|
|
|
puts "Failed to add keys...".color(:red)
|
2014-03-13 13:32:30 -04:00
|
|
|
exit 1
|
|
|
|
end
|
|
|
|
|
2013-02-07 03:06:39 -05:00
|
|
|
rescue Gitlab::TaskAbortedByUserError
|
2016-06-01 18:37:15 -04:00
|
|
|
puts "Quitting...".color(:red)
|
2013-02-07 03:06:39 -05:00
|
|
|
exit 1
|
|
|
|
end
|
|
|
|
end
|