2017-07-13 11:58:45 -04:00
|
|
|
# Gitaly note: JV: two sets of straightforward RPC's. 1 Hard RPC: fork_repository.
|
|
|
|
# SSH key operations are not part of Gitaly so will never be migrated.
|
|
|
|
|
2016-06-24 15:06:46 -04:00
|
|
|
require 'securerandom'
|
|
|
|
|
2012-05-26 06:37:49 -04:00
|
|
|
module Gitlab
|
2013-02-04 08:07:56 -05:00
|
|
|
class Shell
|
2017-07-03 14:28:29 -04:00
|
|
|
GITLAB_SHELL_ENV_VARS = %w(GIT_TERMINAL_PROMPT).freeze
|
|
|
|
|
2017-03-01 06:00:37 -05:00
|
|
|
Error = Class.new(StandardError)
|
2012-09-07 01:16:29 -04:00
|
|
|
|
2015-12-14 21:53:52 -05:00
|
|
|
KeyAdder = Struct.new(:io) do
|
2014-03-13 13:32:30 -04:00
|
|
|
def add_key(id, key)
|
2016-09-16 05:43:05 -04:00
|
|
|
key = Gitlab::Shell.strip_key(key)
|
|
|
|
# Newline and tab are part of the 'protocol' used to transmit id+key to the other end
|
|
|
|
if key.include?("\t") || key.include?("\n")
|
|
|
|
raise Error.new("Invalid key: #{key.inspect}")
|
|
|
|
end
|
|
|
|
|
2015-10-08 20:34:50 -04:00
|
|
|
io.puts("#{id}\t#{key}")
|
2014-03-13 13:32:30 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-11-05 11:14:22 -05:00
|
|
|
class << self
|
2016-09-29 12:46:54 -04:00
|
|
|
def secret_token
|
|
|
|
@secret_token ||= begin
|
|
|
|
File.read(Gitlab.config.gitlab_shell.secret_file).chomp
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def ensure_secret_token!
|
|
|
|
return if File.exist?(File.join(Gitlab.config.gitlab_shell.path, '.gitlab_shell_secret'))
|
|
|
|
|
|
|
|
generate_and_link_secret_token
|
|
|
|
end
|
|
|
|
|
2014-11-05 11:14:22 -05:00
|
|
|
def version_required
|
2017-06-21 09:48:12 -04:00
|
|
|
@version_required ||= File.read(Rails.root
|
|
|
|
.join('GITLAB_SHELL_VERSION')).strip
|
2014-11-05 11:14:22 -05:00
|
|
|
end
|
2016-09-16 05:43:05 -04:00
|
|
|
|
|
|
|
def strip_key(key)
|
2017-04-05 02:09:04 -04:00
|
|
|
key.split(/[ ]+/)[0, 2].join(' ')
|
2016-09-16 05:43:05 -04:00
|
|
|
end
|
2016-09-29 12:46:54 -04:00
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
# Create (if necessary) and link the secret token file
|
|
|
|
def generate_and_link_secret_token
|
|
|
|
secret_file = Gitlab.config.gitlab_shell.secret_file
|
|
|
|
shell_path = Gitlab.config.gitlab_shell.path
|
|
|
|
|
|
|
|
unless File.size?(secret_file)
|
|
|
|
# Generate a new token of 16 random hexadecimal characters and store it in secret_file.
|
2016-10-13 04:04:58 -04:00
|
|
|
@secret_token = SecureRandom.hex(16)
|
|
|
|
File.write(secret_file, @secret_token)
|
2016-09-29 12:46:54 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
link_path = File.join(shell_path, '.gitlab_shell_secret')
|
|
|
|
if File.exist?(shell_path) && !File.exist?(link_path)
|
|
|
|
FileUtils.symlink(secret_file, link_path)
|
|
|
|
end
|
|
|
|
end
|
2014-11-05 11:14:22 -05:00
|
|
|
end
|
|
|
|
|
2013-02-04 08:07:56 -05:00
|
|
|
# Init new repository
|
2013-01-28 14:02:10 -05:00
|
|
|
#
|
2017-09-28 13:07:22 -04:00
|
|
|
# storage - project's storage name
|
2017-12-11 12:52:07 -05:00
|
|
|
# name - project disk path
|
2013-01-28 10:39:02 -05:00
|
|
|
#
|
|
|
|
# Ex.
|
2016-06-22 17:04:51 -04:00
|
|
|
# add_repository("/path/to/storage", "gitlab/gitlab-ci")
|
2013-01-28 10:39:02 -05:00
|
|
|
#
|
2016-06-22 17:04:51 -04:00
|
|
|
def add_repository(storage, name)
|
2017-09-28 13:07:22 -04:00
|
|
|
relative_path = name.dup
|
|
|
|
relative_path << '.git' unless relative_path.end_with?('.git')
|
|
|
|
|
|
|
|
gitaly_migrate(:create_repository) do |is_enabled|
|
|
|
|
if is_enabled
|
|
|
|
repository = Gitlab::Git::Repository.new(storage, relative_path, '')
|
|
|
|
repository.gitaly_repository_client.create_repository
|
|
|
|
true
|
|
|
|
else
|
|
|
|
repo_path = File.join(Gitlab.config.repositories.storages[storage]['path'], relative_path)
|
|
|
|
Gitlab::Git::Repository.create(repo_path, bare: true, symlink_hooks_to: gitlab_shell_hooks_path)
|
|
|
|
end
|
|
|
|
end
|
2017-08-14 07:29:47 -04:00
|
|
|
rescue => err
|
|
|
|
Rails.logger.error("Failed to add repository #{storage}/#{name}: #{err}")
|
|
|
|
false
|
2012-11-21 00:54:05 -05:00
|
|
|
end
|
|
|
|
|
2013-02-11 12:41:02 -05:00
|
|
|
# Import repository
|
|
|
|
#
|
2016-06-22 17:04:51 -04:00
|
|
|
# storage - project's storage path
|
2017-12-11 12:52:07 -05:00
|
|
|
# name - project disk path
|
|
|
|
# url - URL to import from
|
2013-02-11 12:41:02 -05:00
|
|
|
#
|
|
|
|
# Ex.
|
2017-12-11 12:52:07 -05:00
|
|
|
# import_repository("/path/to/storage", "gitlab/gitlab-ci", "https://gitlab.com/gitlab-org/gitlab-test.git")
|
2013-02-11 12:41:02 -05:00
|
|
|
#
|
2018-01-04 09:44:00 -05:00
|
|
|
# Gitaly migration: https://gitlab.com/gitlab-org/gitaly/issues/874
|
2016-06-22 17:04:51 -04:00
|
|
|
def import_repository(storage, name, url)
|
2018-01-04 12:05:49 -05:00
|
|
|
if url.start_with?('.', '/')
|
2018-01-04 10:34:37 -05:00
|
|
|
raise Error.new("don't use disk paths with import_repository: #{url.inspect}")
|
|
|
|
end
|
|
|
|
|
2017-11-21 12:13:21 -05:00
|
|
|
# The timeout ensures the subprocess won't hang forever
|
2017-12-11 12:52:07 -05:00
|
|
|
cmd = gitlab_projects(storage, "#{name}.git")
|
|
|
|
success = cmd.import_project(url, git_timeout)
|
|
|
|
|
|
|
|
raise Error, cmd.output unless success
|
|
|
|
|
|
|
|
success
|
2013-02-11 12:41:02 -05:00
|
|
|
end
|
|
|
|
|
2017-03-27 10:43:03 -04:00
|
|
|
# Fetch remote for repository
|
|
|
|
#
|
2017-08-10 10:08:48 -04:00
|
|
|
# repository - an instance of Git::Repository
|
2017-03-27 10:43:03 -04:00
|
|
|
# remote - remote name
|
2017-12-11 12:52:07 -05:00
|
|
|
# ssh_auth - SSH known_hosts data and a private key to use for public-key authentication
|
2017-03-27 10:43:03 -04:00
|
|
|
# forced - should we use --force flag?
|
2017-04-03 15:36:14 -04:00
|
|
|
# no_tags - should we use --no-tags flag?
|
2017-03-27 10:43:03 -04:00
|
|
|
#
|
|
|
|
# Ex.
|
2017-08-10 10:08:48 -04:00
|
|
|
# fetch_remote(my_repo, "upstream")
|
2017-03-27 10:43:03 -04:00
|
|
|
#
|
2017-08-10 10:08:48 -04:00
|
|
|
def fetch_remote(repository, remote, ssh_auth: nil, forced: false, no_tags: false)
|
|
|
|
gitaly_migrate(:fetch_remote) do |is_enabled|
|
|
|
|
if is_enabled
|
2018-01-04 21:34:31 -05:00
|
|
|
repository.gitaly_repository_client.fetch_remote(remote, ssh_auth: ssh_auth, forced: forced, no_tags: no_tags, timeout: git_timeout)
|
2017-08-10 10:08:48 -04:00
|
|
|
else
|
|
|
|
storage_path = Gitlab.config.repositories.storages[repository.storage]["path"]
|
|
|
|
local_fetch_remote(storage_path, repository.relative_path, remote, ssh_auth: ssh_auth, forced: forced, no_tags: no_tags)
|
2017-08-03 08:19:11 -04:00
|
|
|
end
|
|
|
|
end
|
2017-03-27 10:43:03 -04:00
|
|
|
end
|
|
|
|
|
2018-01-05 07:29:04 -05:00
|
|
|
# Move repository reroutes to mv_directory which is an alias for
|
|
|
|
# mv_namespace. Given the underlying implementation is a move action,
|
|
|
|
# indescriminate of what the folders might be.
|
|
|
|
#
|
2016-06-22 17:04:51 -04:00
|
|
|
# storage - project's storage path
|
2017-12-11 12:52:07 -05:00
|
|
|
# path - project disk path
|
|
|
|
# new_path - new project disk path
|
2013-03-12 06:37:53 -04:00
|
|
|
#
|
|
|
|
# Ex.
|
2016-06-22 17:04:51 -04:00
|
|
|
# mv_repository("/path/to/storage", "gitlab/gitlab-ci", "randx/gitlab-ci-new")
|
2013-03-12 06:37:53 -04:00
|
|
|
#
|
2018-01-04 09:44:00 -05:00
|
|
|
# Gitaly migration: https://gitlab.com/gitlab-org/gitaly/issues/873
|
2016-06-22 17:04:51 -04:00
|
|
|
def mv_repository(storage, path, new_path)
|
2018-01-05 07:29:04 -05:00
|
|
|
return false if path.empty? || new_path.empty?
|
|
|
|
|
|
|
|
!!mv_directory(storage, "#{path}.git", "#{new_path}.git")
|
2013-03-12 06:37:53 -04:00
|
|
|
end
|
|
|
|
|
2017-11-30 16:34:31 -05:00
|
|
|
# Fork repository to new path
|
2016-07-26 17:22:13 -04:00
|
|
|
# forked_from_storage - forked-from project's storage path
|
2017-11-30 16:34:31 -05:00
|
|
|
# forked_from_disk_path - project disk path
|
2016-07-26 17:22:13 -04:00
|
|
|
# forked_to_storage - forked-to project's storage path
|
2017-11-30 16:34:31 -05:00
|
|
|
# forked_to_disk_path - forked project disk path
|
2013-03-19 11:37:50 -04:00
|
|
|
#
|
|
|
|
# Ex.
|
2017-11-30 16:34:31 -05:00
|
|
|
# fork_repository("/path/to/forked_from/storage", "gitlab/gitlab-ci", "/path/to/forked_to/storage", "new-namespace/gitlab-ci")
|
2013-03-19 11:37:50 -04:00
|
|
|
#
|
2018-01-04 09:44:00 -05:00
|
|
|
# Gitaly migration: https://gitlab.com/gitlab-org/gitaly/issues/817
|
2017-11-30 16:34:31 -05:00
|
|
|
def fork_repository(forked_from_storage, forked_from_disk_path, forked_to_storage, forked_to_disk_path)
|
2017-12-11 12:52:07 -05:00
|
|
|
gitlab_projects(forked_from_storage, "#{forked_from_disk_path}.git")
|
|
|
|
.fork_repository(forked_to_storage, "#{forked_to_disk_path}.git")
|
2013-03-19 11:37:50 -04:00
|
|
|
end
|
|
|
|
|
2018-01-05 07:29:04 -05:00
|
|
|
# Removes a repository from file system, using rm_diretory which is an alias
|
|
|
|
# for rm_namespace. Given the underlying implementation removes the name
|
|
|
|
# passed as second argument on the passed storage.
|
2013-01-28 10:22:45 -05:00
|
|
|
#
|
2016-06-22 17:04:51 -04:00
|
|
|
# storage - project's storage path
|
2017-12-11 12:52:07 -05:00
|
|
|
# name - project disk path
|
2013-01-28 10:22:45 -05:00
|
|
|
#
|
|
|
|
# Ex.
|
2016-06-22 17:04:51 -04:00
|
|
|
# remove_repository("/path/to/storage", "gitlab/gitlab-ci")
|
2013-01-28 10:22:45 -05:00
|
|
|
#
|
2018-01-04 09:44:00 -05:00
|
|
|
# Gitaly migration: https://gitlab.com/gitlab-org/gitaly/issues/873
|
2016-06-22 17:04:51 -04:00
|
|
|
def remove_repository(storage, name)
|
2018-01-05 07:29:04 -05:00
|
|
|
return false if name.empty?
|
|
|
|
|
|
|
|
!!rm_directory(storage, "#{name}.git")
|
|
|
|
rescue ArgumentError => e
|
|
|
|
Rails.logger.warn("Repository does not exist: #{e} at: #{name}.git")
|
|
|
|
false
|
2012-03-05 17:26:40 -05:00
|
|
|
end
|
|
|
|
|
2013-02-04 08:07:56 -05:00
|
|
|
# Add new key to gitlab-shell
|
2013-02-04 07:28:10 -05:00
|
|
|
#
|
2013-02-04 08:07:56 -05:00
|
|
|
# Ex.
|
2013-02-05 04:12:15 -05:00
|
|
|
# add_key("key-42", "sha-rsa ...")
|
2013-02-04 08:07:56 -05:00
|
|
|
#
|
2013-02-05 04:12:15 -05:00
|
|
|
def add_key(key_id, key_content)
|
2017-05-30 19:24:45 -04:00
|
|
|
return unless self.authorized_keys_enabled?
|
|
|
|
|
2017-07-03 14:28:29 -04:00
|
|
|
gitlab_shell_fast_execute([gitlab_shell_keys_path,
|
|
|
|
'add-key', key_id, self.class.strip_key(key_content)])
|
2013-02-04 08:07:56 -05:00
|
|
|
end
|
|
|
|
|
2014-03-13 13:32:30 -04:00
|
|
|
# Batch-add keys to authorized_keys
|
|
|
|
#
|
|
|
|
# Ex.
|
|
|
|
# batch_add_keys { |adder| adder.add_key("key-42", "sha-rsa ...") }
|
|
|
|
def batch_add_keys(&block)
|
2017-05-30 19:24:45 -04:00
|
|
|
return unless self.authorized_keys_enabled?
|
|
|
|
|
2014-03-13 13:32:30 -04:00
|
|
|
IO.popen(%W(#{gitlab_shell_path}/bin/gitlab-keys batch-add-keys), 'w') do |io|
|
2017-02-21 18:59:42 -05:00
|
|
|
yield(KeyAdder.new(io))
|
2014-03-13 13:32:30 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-04 08:07:56 -05:00
|
|
|
# Remove ssh key from gitlab shell
|
2013-01-28 10:39:02 -05:00
|
|
|
#
|
|
|
|
# Ex.
|
2013-02-05 04:12:15 -05:00
|
|
|
# remove_key("key-342", "sha-rsa ...")
|
2013-01-28 10:39:02 -05:00
|
|
|
#
|
2017-06-26 17:40:08 -04:00
|
|
|
def remove_key(key_id, key_content = nil)
|
2017-05-30 19:24:45 -04:00
|
|
|
return unless self.authorized_keys_enabled?
|
|
|
|
|
2017-07-03 14:28:29 -04:00
|
|
|
args = [gitlab_shell_keys_path, 'rm-key', key_id]
|
|
|
|
args << key_content if key_content
|
|
|
|
gitlab_shell_fast_execute(args)
|
2013-01-28 10:39:02 -05:00
|
|
|
end
|
|
|
|
|
2013-07-18 06:55:01 -04:00
|
|
|
# Remove all ssh keys from gitlab shell
|
|
|
|
#
|
|
|
|
# Ex.
|
2013-07-29 06:46:00 -04:00
|
|
|
# remove_all_keys
|
2013-07-18 06:55:01 -04:00
|
|
|
#
|
|
|
|
def remove_all_keys
|
2017-05-30 19:24:45 -04:00
|
|
|
return unless self.authorized_keys_enabled?
|
|
|
|
|
2017-07-03 14:28:29 -04:00
|
|
|
gitlab_shell_fast_execute([gitlab_shell_keys_path, 'clear'])
|
2013-07-18 06:55:01 -04:00
|
|
|
end
|
|
|
|
|
2017-06-26 17:40:08 -04:00
|
|
|
# Remove ssh keys from gitlab shell that are not in the DB
|
|
|
|
#
|
|
|
|
# Ex.
|
|
|
|
# remove_keys_not_found_in_db
|
|
|
|
#
|
|
|
|
def remove_keys_not_found_in_db
|
|
|
|
return unless self.authorized_keys_enabled?
|
|
|
|
|
|
|
|
Rails.logger.info("Removing keys not found in DB")
|
|
|
|
|
|
|
|
batch_read_key_ids do |ids_in_file|
|
|
|
|
ids_in_file.uniq!
|
|
|
|
keys_in_db = Key.where(id: ids_in_file)
|
|
|
|
|
|
|
|
next unless ids_in_file.size > keys_in_db.count # optimization
|
|
|
|
|
|
|
|
ids_to_remove = ids_in_file - keys_in_db.pluck(:id)
|
|
|
|
ids_to_remove.each do |id|
|
|
|
|
Rails.logger.info("Removing key-#{id} not found in DB")
|
|
|
|
remove_key("key-#{id}")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# Iterate over all ssh key IDs from gitlab shell, in batches
|
|
|
|
#
|
|
|
|
# Ex.
|
|
|
|
# batch_read_key_ids { |batch| keys = Key.where(id: batch) }
|
|
|
|
#
|
|
|
|
def batch_read_key_ids(batch_size: 100, &block)
|
|
|
|
return unless self.authorized_keys_enabled?
|
|
|
|
|
|
|
|
list_key_ids do |key_id_stream|
|
|
|
|
key_id_stream.lazy.each_slice(batch_size) do |lines|
|
|
|
|
key_ids = lines.map { |l| l.chomp.to_i }
|
|
|
|
yield(key_ids)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# Stream all ssh key IDs from gitlab shell, separated by newlines
|
|
|
|
#
|
|
|
|
# Ex.
|
|
|
|
# list_key_ids
|
|
|
|
#
|
|
|
|
def list_key_ids(&block)
|
|
|
|
return unless self.authorized_keys_enabled?
|
|
|
|
|
|
|
|
IO.popen(%W(#{gitlab_shell_path}/bin/gitlab-keys list-key-ids), &block)
|
|
|
|
end
|
|
|
|
|
2013-03-21 16:11:08 -04:00
|
|
|
# Add empty directory for storing repositories
|
|
|
|
#
|
|
|
|
# Ex.
|
2016-06-22 17:04:51 -04:00
|
|
|
# add_namespace("/path/to/storage", "gitlab")
|
2013-03-21 16:11:08 -04:00
|
|
|
#
|
2016-06-22 17:04:51 -04:00
|
|
|
def add_namespace(storage, name)
|
2017-12-13 08:20:20 -05:00
|
|
|
Gitlab::GitalyClient.migrate(:add_namespace,
|
|
|
|
status: Gitlab::GitalyClient::MigrationStatus::OPT_OUT) do |enabled|
|
2017-09-12 06:26:59 -04:00
|
|
|
if enabled
|
|
|
|
gitaly_namespace_client(storage).add(name)
|
|
|
|
else
|
|
|
|
path = full_path(storage, name)
|
|
|
|
FileUtils.mkdir_p(path, mode: 0770) unless exists?(storage, name)
|
|
|
|
end
|
|
|
|
end
|
2017-03-27 16:22:01 -04:00
|
|
|
rescue Errno::EEXIST => e
|
|
|
|
Rails.logger.warn("Directory exists as a file: #{e} at: #{path}")
|
2017-09-12 06:26:59 -04:00
|
|
|
rescue GRPC::InvalidArgument => e
|
|
|
|
raise ArgumentError, e.message
|
2013-03-21 16:11:08 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
# Remove directory from repositories storage
|
|
|
|
# Every repository inside this directory will be removed too
|
|
|
|
#
|
|
|
|
# Ex.
|
2016-06-22 17:04:51 -04:00
|
|
|
# rm_namespace("/path/to/storage", "gitlab")
|
2013-03-21 16:11:08 -04:00
|
|
|
#
|
2016-06-22 17:04:51 -04:00
|
|
|
def rm_namespace(storage, name)
|
2017-12-13 08:20:20 -05:00
|
|
|
Gitlab::GitalyClient.migrate(:remove_namespace,
|
|
|
|
status: Gitlab::GitalyClient::MigrationStatus::OPT_OUT) do |enabled|
|
2017-09-12 06:26:59 -04:00
|
|
|
if enabled
|
|
|
|
gitaly_namespace_client(storage).remove(name)
|
|
|
|
else
|
|
|
|
FileUtils.rm_r(full_path(storage, name), force: true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
rescue GRPC::InvalidArgument => e
|
|
|
|
raise ArgumentError, e.message
|
2013-03-21 16:11:08 -04:00
|
|
|
end
|
2018-01-05 07:29:04 -05:00
|
|
|
alias_method :rm_directory, :rm_namespace
|
2013-03-21 16:11:08 -04:00
|
|
|
|
|
|
|
# Move namespace directory inside repositories storage
|
|
|
|
#
|
|
|
|
# Ex.
|
2016-06-22 17:04:51 -04:00
|
|
|
# mv_namespace("/path/to/storage", "gitlab", "gitlabhq")
|
2013-03-21 16:11:08 -04:00
|
|
|
#
|
2016-06-22 17:04:51 -04:00
|
|
|
def mv_namespace(storage, old_name, new_name)
|
2017-12-13 08:20:20 -05:00
|
|
|
Gitlab::GitalyClient.migrate(:rename_namespace,
|
|
|
|
status: Gitlab::GitalyClient::MigrationStatus::OPT_OUT) do |enabled|
|
2017-09-12 06:26:59 -04:00
|
|
|
if enabled
|
|
|
|
gitaly_namespace_client(storage).rename(old_name, new_name)
|
|
|
|
else
|
|
|
|
return false if exists?(storage, new_name) || !exists?(storage, old_name)
|
2013-03-21 16:11:08 -04:00
|
|
|
|
2017-09-12 06:26:59 -04:00
|
|
|
FileUtils.mv(full_path(storage, old_name), full_path(storage, new_name))
|
|
|
|
end
|
|
|
|
end
|
2017-10-05 09:01:26 -04:00
|
|
|
rescue GRPC::InvalidArgument
|
|
|
|
false
|
2013-03-21 16:11:08 -04:00
|
|
|
end
|
2018-01-05 07:29:04 -05:00
|
|
|
alias_method :mv_directory, :mv_namespace
|
2013-03-21 16:11:08 -04:00
|
|
|
|
2014-09-25 18:07:40 -04:00
|
|
|
def url_to_repo(path)
|
2013-02-11 12:16:59 -05:00
|
|
|
Gitlab.config.gitlab_shell.ssh_path_prefix + "#{path}.git"
|
2012-08-28 17:04:06 -04:00
|
|
|
end
|
2013-03-12 06:37:53 -04:00
|
|
|
|
2013-11-20 06:41:41 -05:00
|
|
|
# Return GitLab shell version
|
|
|
|
def version
|
2013-12-09 12:32:37 -05:00
|
|
|
gitlab_shell_version_file = "#{gitlab_shell_path}/VERSION"
|
2013-11-20 06:41:41 -05:00
|
|
|
|
|
|
|
if File.readable?(gitlab_shell_version_file)
|
2015-04-06 08:02:49 -04:00
|
|
|
File.read(gitlab_shell_version_file).chomp
|
2013-11-20 06:41:41 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-06-03 05:50:08 -04:00
|
|
|
# Check if such directory exists in repositories.
|
|
|
|
#
|
|
|
|
# Usage:
|
2016-06-22 17:04:51 -04:00
|
|
|
# exists?(storage, 'gitlab')
|
|
|
|
# exists?(storage, 'gitlab/cookies.git')
|
2015-06-03 05:50:08 -04:00
|
|
|
#
|
2017-07-13 11:58:45 -04:00
|
|
|
# Gitaly migration: https://gitlab.com/gitlab-org/gitaly/issues/385
|
2016-06-22 17:04:51 -04:00
|
|
|
def exists?(storage, dir_name)
|
2017-12-13 08:20:20 -05:00
|
|
|
Gitlab::GitalyClient.migrate(:namespace_exists,
|
|
|
|
status: Gitlab::GitalyClient::MigrationStatus::OPT_OUT) do |enabled|
|
2017-09-12 06:26:59 -04:00
|
|
|
if enabled
|
|
|
|
gitaly_namespace_client(storage).exists?(dir_name)
|
|
|
|
else
|
|
|
|
File.exist?(full_path(storage, dir_name))
|
|
|
|
end
|
|
|
|
end
|
2015-06-03 05:50:08 -04:00
|
|
|
end
|
|
|
|
|
2013-03-21 16:11:08 -04:00
|
|
|
protected
|
|
|
|
|
2013-12-09 12:32:37 -05:00
|
|
|
def gitlab_shell_path
|
2017-08-14 07:29:47 -04:00
|
|
|
File.expand_path(Gitlab.config.gitlab_shell.path)
|
|
|
|
end
|
|
|
|
|
|
|
|
def gitlab_shell_hooks_path
|
|
|
|
File.expand_path(Gitlab.config.gitlab_shell.hooks_path)
|
2013-12-09 12:32:37 -05:00
|
|
|
end
|
|
|
|
|
2013-02-14 18:10:18 -05:00
|
|
|
def gitlab_shell_user_home
|
|
|
|
File.expand_path("~#{Gitlab.config.gitlab_shell.ssh_user}")
|
|
|
|
end
|
|
|
|
|
2016-06-22 17:04:51 -04:00
|
|
|
def full_path(storage, dir_name)
|
2013-03-21 16:11:08 -04:00
|
|
|
raise ArgumentError.new("Directory name can't be blank") if dir_name.blank?
|
|
|
|
|
2016-06-22 17:04:51 -04:00
|
|
|
File.join(storage, dir_name)
|
2013-03-21 16:11:08 -04:00
|
|
|
end
|
|
|
|
|
2014-10-31 08:00:50 -04:00
|
|
|
def gitlab_shell_projects_path
|
|
|
|
File.join(gitlab_shell_path, 'bin', 'gitlab-projects')
|
|
|
|
end
|
|
|
|
|
|
|
|
def gitlab_shell_keys_path
|
|
|
|
File.join(gitlab_shell_path, 'bin', 'gitlab-keys')
|
|
|
|
end
|
2017-07-03 14:28:29 -04:00
|
|
|
|
2017-09-01 11:20:49 -04:00
|
|
|
def authorized_keys_enabled?
|
|
|
|
# Return true if nil to ensure the authorized_keys methods work while
|
|
|
|
# fixing the authorized_keys file during migration.
|
|
|
|
return true if Gitlab::CurrentSettings.current_application_settings.authorized_keys_enabled.nil?
|
|
|
|
|
|
|
|
Gitlab::CurrentSettings.current_application_settings.authorized_keys_enabled
|
|
|
|
end
|
|
|
|
|
2017-07-03 14:28:29 -04:00
|
|
|
private
|
|
|
|
|
2017-12-11 12:52:07 -05:00
|
|
|
def gitlab_projects(shard_path, disk_path)
|
|
|
|
Gitlab::Git::GitlabProjects.new(
|
|
|
|
shard_path,
|
|
|
|
disk_path,
|
|
|
|
global_hooks_path: Gitlab.config.gitlab_shell.hooks_path,
|
|
|
|
logger: Rails.logger
|
|
|
|
)
|
|
|
|
end
|
2017-08-10 10:08:48 -04:00
|
|
|
|
2017-12-11 12:52:07 -05:00
|
|
|
def local_fetch_remote(storage_path, repository_relative_path, remote, ssh_auth: nil, forced: false, no_tags: false)
|
|
|
|
vars = { force: forced, tags: !no_tags }
|
2017-08-10 10:08:48 -04:00
|
|
|
|
|
|
|
if ssh_auth&.ssh_import?
|
|
|
|
if ssh_auth.ssh_key_auth? && ssh_auth.ssh_private_key.present?
|
2017-12-11 12:52:07 -05:00
|
|
|
vars[:ssh_key] = ssh_auth.ssh_private_key
|
2017-08-10 10:08:48 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
if ssh_auth.ssh_known_hosts.present?
|
2017-12-11 12:52:07 -05:00
|
|
|
vars[:known_hosts] = ssh_auth.ssh_known_hosts
|
2017-08-10 10:08:48 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-12-11 12:52:07 -05:00
|
|
|
cmd = gitlab_projects(storage_path, repository_relative_path)
|
|
|
|
|
|
|
|
success = cmd.fetch_remote(remote, git_timeout, vars)
|
|
|
|
|
|
|
|
raise Error, cmd.output unless success
|
|
|
|
|
|
|
|
success
|
2017-08-10 10:08:48 -04:00
|
|
|
end
|
|
|
|
|
2017-07-03 14:28:29 -04:00
|
|
|
def gitlab_shell_fast_execute(cmd)
|
|
|
|
output, status = gitlab_shell_fast_execute_helper(cmd)
|
|
|
|
|
|
|
|
return true if status.zero?
|
|
|
|
|
|
|
|
Rails.logger.error("gitlab-shell failed with error #{status}: #{output}")
|
|
|
|
false
|
|
|
|
end
|
|
|
|
|
2017-08-03 08:19:11 -04:00
|
|
|
def gitlab_shell_fast_execute_raise_error(cmd, vars = {})
|
|
|
|
output, status = gitlab_shell_fast_execute_helper(cmd, vars)
|
2017-07-03 14:28:29 -04:00
|
|
|
|
|
|
|
raise Error, output unless status.zero?
|
2017-11-14 04:02:39 -05:00
|
|
|
|
2017-07-03 14:28:29 -04:00
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2017-08-03 08:19:11 -04:00
|
|
|
def gitlab_shell_fast_execute_helper(cmd, vars = {})
|
|
|
|
vars.merge!(ENV.to_h.slice(*GITLAB_SHELL_ENV_VARS))
|
2017-07-03 14:28:29 -04:00
|
|
|
|
|
|
|
# Don't pass along the entire parent environment to prevent gitlab-shell
|
|
|
|
# from wasting I/O by searching through GEM_PATH
|
|
|
|
Bundler.with_original_env { Popen.popen(cmd, nil, vars) }
|
|
|
|
end
|
2017-08-10 10:08:48 -04:00
|
|
|
|
2017-09-12 06:26:59 -04:00
|
|
|
def gitaly_namespace_client(storage_path)
|
|
|
|
storage, _value = Gitlab.config.repositories.storages.find do |storage, value|
|
|
|
|
value['path'] == storage_path
|
|
|
|
end
|
|
|
|
|
|
|
|
Gitlab::GitalyClient::NamespaceService.new(storage)
|
|
|
|
end
|
|
|
|
|
2017-12-11 12:52:07 -05:00
|
|
|
def git_timeout
|
|
|
|
Gitlab.config.gitlab_shell.git_timeout
|
|
|
|
end
|
|
|
|
|
2017-08-10 10:08:48 -04:00
|
|
|
def gitaly_migrate(method, &block)
|
|
|
|
Gitlab::GitalyClient.migrate(method, &block)
|
|
|
|
rescue GRPC::NotFound, GRPC::BadStatus => e
|
|
|
|
# Old Popen code returns [Error, output] to the caller, so we
|
|
|
|
# need to do the same here...
|
|
|
|
raise Error, e
|
|
|
|
end
|
2011-12-03 18:44:59 -05:00
|
|
|
end
|
|
|
|
end
|