gitlab-org--gitlab-foss/lib/tasks/gitlab/check.rake

587 lines
17 KiB
Ruby
Raw Normal View History

# Temporary hack, until we migrate all checks to SystemCheck format
require 'system_check'
require 'system_check/helpers'
2012-04-03 18:02:54 -04:00
namespace :gitlab do
desc 'GitLab | Check the configuration of GitLab and its environment'
2015-06-03 05:26:57 -04:00
task check: %w{gitlab:gitlab_shell:check
2013-01-09 18:08:15 -05:00
gitlab:sidekiq:check
gitlab:incoming_email:check
2013-11-28 09:20:40 -05:00
gitlab:ldap:check
2012-12-13 06:11:41 -05:00
gitlab:app:check}
2012-04-03 18:02:54 -04:00
namespace :app do
desc 'GitLab | Check the configuration of the GitLab Rails app'
2012-12-10 08:50:55 -05:00
task check: :environment do
2012-12-13 06:11:41 -05:00
warn_user_is_not_gitlab
checks = [
SystemCheck::App::GitConfigCheck,
SystemCheck::App::DatabaseConfigExistsCheck,
SystemCheck::App::MigrationsAreUpCheck,
SystemCheck::App::OrphanedGroupMembersCheck,
SystemCheck::App::GitlabConfigExistsCheck,
SystemCheck::App::GitlabConfigUpToDateCheck,
SystemCheck::App::LogWritableCheck,
SystemCheck::App::TmpWritableCheck,
SystemCheck::App::UploadsDirectoryExistsCheck,
SystemCheck::App::UploadsPathPermissionCheck,
SystemCheck::App::UploadsPathTmpPermissionCheck,
SystemCheck::App::InitScriptExistsCheck,
SystemCheck::App::InitScriptUpToDateCheck,
SystemCheck::App::ProjectsHaveNamespaceCheck,
SystemCheck::App::RedisVersionCheck,
SystemCheck::App::RubyVersionCheck,
2017-05-25 19:46:30 -04:00
SystemCheck::App::GitVersionCheck,
SystemCheck::App::ActiveUsersCheck
]
SystemCheck.run('GitLab', checks)
2013-04-20 08:56:13 -04:00
end
2012-12-10 08:50:55 -05:00
end
2013-02-11 12:16:59 -05:00
namespace :gitlab_shell do
include SystemCheck::Helpers
desc "GitLab | Check the configuration of GitLab Shell"
2012-12-10 08:50:55 -05:00
task check: :environment do
2012-12-13 06:11:41 -05:00
warn_user_is_not_gitlab
2013-05-19 05:13:39 -04:00
start_checking "GitLab Shell"
2012-12-13 06:11:41 -05:00
check_gitlab_shell
2012-12-13 06:11:41 -05:00
check_repo_base_exists
check_repo_base_is_not_symlink
2012-12-13 06:11:41 -05:00
check_repo_base_user_and_group
check_repo_base_permissions
check_repos_hooks_directory_is_link
check_gitlab_shell_self_test
2012-12-13 06:11:41 -05:00
2013-05-19 05:13:39 -04:00
finished_checking "GitLab Shell"
2012-12-13 06:11:41 -05:00
end
# Checks
########################
def check_repo_base_exists
puts "Repo base directory exists?"
2012-12-13 06:11:41 -05:00
Gitlab.config.repositories.storages.each do |name, repository_storage|
repo_base_path = repository_storage['path']
print "#{name}... "
2012-12-13 06:11:41 -05:00
if File.exist?(repo_base_path)
puts "yes".color(:green)
else
puts "no".color(:red)
puts "#{repo_base_path} is missing".color(:red)
try_fixing_it(
"This should have been created when setting up GitLab Shell.",
"Make sure it's set correctly in config/gitlab.yml",
"Make sure GitLab Shell is installed correctly."
)
for_more_information(
see_installation_guide_section "GitLab Shell"
)
fix_and_rerun
end
2012-12-13 06:11:41 -05:00
end
end
def check_repo_base_is_not_symlink
puts "Repo storage directories are symlinks?"
Gitlab.config.repositories.storages.each do |name, repository_storage|
repo_base_path = repository_storage['path']
print "#{name}... "
unless File.exist?(repo_base_path)
puts "can't check because of previous errors".color(:magenta)
break
end
unless File.symlink?(repo_base_path)
puts "no".color(:green)
else
puts "yes".color(:red)
try_fixing_it(
"Make sure it's set to the real directory in config/gitlab.yml"
)
fix_and_rerun
end
end
end
2012-12-13 06:11:41 -05:00
def check_repo_base_permissions
puts "Repo paths access is drwxrws---?"
2012-12-13 06:11:41 -05:00
Gitlab.config.repositories.storages.each do |name, repository_storage|
repo_base_path = repository_storage['path']
print "#{name}... "
2012-04-03 18:02:54 -04:00
unless File.exist?(repo_base_path)
puts "can't check because of previous errors".color(:magenta)
break
end
if File.stat(repo_base_path).mode.to_s(8).ends_with?("2770")
puts "yes".color(:green)
else
puts "no".color(:red)
try_fixing_it(
"sudo chmod -R ug+rwX,o-rwx #{repo_base_path}",
"sudo chmod -R ug-s #{repo_base_path}",
"sudo find #{repo_base_path} -type d -print0 | sudo xargs -0 chmod g+s"
)
for_more_information(
see_installation_guide_section "GitLab Shell"
)
fix_and_rerun
end
2012-12-13 06:11:41 -05:00
end
end
def check_repo_base_user_and_group
2013-02-11 12:16:59 -05:00
gitlab_shell_ssh_user = Gitlab.config.gitlab_shell.ssh_user
puts "Repo paths owned by #{gitlab_shell_ssh_user}:root, or #{gitlab_shell_ssh_user}:#{Gitlab.config.gitlab_shell.owner_group}?"
2012-12-13 06:11:41 -05:00
Gitlab.config.repositories.storages.each do |name, repository_storage|
repo_base_path = repository_storage['path']
print "#{name}... "
unless File.exist?(repo_base_path)
puts "can't check because of previous errors".color(:magenta)
break
end
user_id = uid_for(gitlab_shell_ssh_user)
root_group_id = gid_for('root')
group_ids = [root_group_id, gid_for(Gitlab.config.gitlab_shell.owner_group)]
if File.stat(repo_base_path).uid == user_id && group_ids.include?(File.stat(repo_base_path).gid)
puts "yes".color(:green)
else
puts "no".color(:red)
puts " User id for #{gitlab_shell_ssh_user}: #{user_id}. Groupd id for root: #{root_group_id}".color(:blue)
try_fixing_it(
"sudo chown -R #{gitlab_shell_ssh_user}:root #{repo_base_path}"
)
for_more_information(
see_installation_guide_section "GitLab Shell"
)
fix_and_rerun
end
2012-12-13 06:11:41 -05:00
end
end
def check_repos_hooks_directory_is_link
print "hooks directories in repos are links: ... "
2012-12-13 06:11:41 -05:00
gitlab_shell_hooks_path = Gitlab.config.gitlab_shell.hooks_path
2012-12-13 06:11:41 -05:00
unless Project.count > 0
puts "can't check, you have no projects".color(:magenta)
2012-12-13 06:11:41 -05:00
return
end
puts ""
2012-12-13 06:11:41 -05:00
Project.find_each(batch_size: 100) do |project|
2014-07-07 08:19:32 -04:00
print sanitized_message(project)
project_hook_directory = File.join(project.repository.path_to_repo, "hooks")
2013-02-01 15:18:09 -05:00
if project.empty_repo?
puts "repository is empty".color(:magenta)
elsif File.directory?(project_hook_directory) && File.directory?(gitlab_shell_hooks_path) &&
(File.realpath(project_hook_directory) == File.realpath(gitlab_shell_hooks_path))
puts 'ok'.color(:green)
2012-12-13 06:11:41 -05:00
else
puts "wrong or missing hooks".color(:red)
try_fixing_it(
sudo_gitlab("#{File.join(gitlab_shell_path, 'bin/create-hooks')} #{repository_storage_paths_args.join(' ')}"),
'Check the hooks_path in config/gitlab.yml',
'Check your gitlab-shell installation'
)
for_more_information(
see_installation_guide_section "GitLab Shell"
)
fix_and_rerun
end
end
2012-12-10 08:50:55 -05:00
end
2012-12-13 06:11:41 -05:00
def check_gitlab_shell_self_test
gitlab_shell_repo_base = gitlab_shell_path
check_cmd = File.expand_path('bin/check', gitlab_shell_repo_base)
puts "Running #{check_cmd}"
if system(check_cmd, chdir: gitlab_shell_repo_base)
puts 'gitlab-shell self-check successful'.color(:green)
else
puts 'gitlab-shell self-check failed'.color(:red)
try_fixing_it(
'Make sure GitLab is running;',
'Check the gitlab-shell configuration file:',
sudo_gitlab("editor #{File.expand_path('config.yml', gitlab_shell_repo_base)}")
)
fix_and_rerun
end
end
2012-12-13 06:11:41 -05:00
# Helper methods
########################
def gitlab_shell_path
Gitlab.config.gitlab_shell.path
2012-12-13 06:11:41 -05:00
end
2013-02-11 12:16:59 -05:00
def gitlab_shell_version
Gitlab::Shell.new.version
2012-12-13 06:11:41 -05:00
end
def gitlab_shell_major_version
2014-11-05 11:14:22 -05:00
Gitlab::Shell.version_required.split('.')[0].to_i
end
def gitlab_shell_minor_version
2014-11-05 11:14:22 -05:00
Gitlab::Shell.version_required.split('.')[1].to_i
end
def gitlab_shell_patch_version
2014-11-05 11:14:22 -05:00
Gitlab::Shell.version_required.split('.')[2].to_i
end
2012-12-10 08:50:55 -05:00
end
2013-01-09 18:08:15 -05:00
namespace :sidekiq do
include SystemCheck::Helpers
desc "GitLab | Check the configuration of Sidekiq"
2012-12-10 08:50:55 -05:00
task check: :environment do
2012-12-13 06:11:41 -05:00
warn_user_is_not_gitlab
2013-01-09 18:08:15 -05:00
start_checking "Sidekiq"
2012-12-13 06:11:41 -05:00
2013-01-09 18:08:15 -05:00
check_sidekiq_running
only_one_sidekiq_running
2012-12-13 06:11:41 -05:00
2013-01-09 18:08:15 -05:00
finished_checking "Sidekiq"
2012-12-13 06:11:41 -05:00
end
# Checks
########################
2013-01-09 18:08:15 -05:00
def check_sidekiq_running
2012-12-13 06:11:41 -05:00
print "Running? ... "
if sidekiq_process_count > 0
puts "yes".color(:green)
2012-12-13 06:11:41 -05:00
else
puts "no".color(:red)
2012-12-13 06:11:41 -05:00
try_fixing_it(
2014-05-27 11:14:41 -04:00
sudo_gitlab("RAILS_ENV=production bin/background_jobs start")
2012-12-13 06:11:41 -05:00
)
for_more_information(
see_installation_guide_section("Install Init Script"),
2013-01-09 01:14:05 -05:00
"see log/sidekiq.log for possible errors"
2012-12-13 06:11:41 -05:00
)
2012-12-22 19:33:58 -05:00
fix_and_rerun
2012-12-13 06:11:41 -05:00
end
end
def only_one_sidekiq_running
process_count = sidekiq_process_count
return if process_count.zero?
print 'Number of Sidekiq processes ... '
if process_count == 1
puts '1'.color(:green)
else
puts "#{process_count}".color(:red)
try_fixing_it(
'sudo service gitlab stop',
"sudo pkill -u #{gitlab_user} -f sidekiq",
"sleep 10 && sudo pkill -9 -u #{gitlab_user} -f sidekiq",
'sudo service gitlab start'
)
fix_and_rerun
end
end
def sidekiq_process_count
ps_ux, _ = Gitlab::Popen.popen(%w(ps uxww))
2014-02-25 06:12:09 -05:00
ps_ux.scan(/sidekiq \d+\.\d+\.\d+/).count
end
2012-12-13 06:11:41 -05:00
end
namespace :incoming_email do
include SystemCheck::Helpers
desc "GitLab | Check the configuration of Reply by email"
task check: :environment do
warn_user_is_not_gitlab
start_checking "Reply by email"
if Gitlab.config.incoming_email.enabled
check_imap_authentication
2015-08-21 18:06:04 -04:00
2015-08-21 18:03:16 -04:00
if Rails.env.production?
check_initd_configured_correctly
check_mail_room_running
else
check_foreman_configured_correctly
end
else
puts 'Reply by email is disabled in config/gitlab.yml'
end
finished_checking "Reply by email"
end
# Checks
########################
def check_initd_configured_correctly
return if omnibus_gitlab?
print "Init.d configured correctly? ... "
path = "/etc/default/gitlab"
if File.exist?(path) && File.read(path).include?("mail_room_enabled=true")
puts "yes".color(:green)
else
puts "no".color(:red)
try_fixing_it(
"Enable mail_room in the init.d configuration."
)
for_more_information(
"doc/administration/reply_by_email.md"
)
fix_and_rerun
end
end
2015-08-21 18:03:16 -04:00
def check_foreman_configured_correctly
print "Foreman configured correctly? ... "
path = Rails.root.join("Procfile")
2015-08-21 18:06:04 -04:00
if File.exist?(path) && File.read(path) =~ /^mail_room:/
puts "yes".color(:green)
2015-08-21 18:03:16 -04:00
else
puts "no".color(:red)
2015-08-21 18:03:16 -04:00
try_fixing_it(
"Enable mail_room in your Procfile."
)
for_more_information(
"doc/administration/reply_by_email.md"
2015-08-21 18:03:16 -04:00
)
fix_and_rerun
end
end
def check_mail_room_running
return if omnibus_gitlab?
print "MailRoom running? ... "
path = "/etc/default/gitlab"
unless File.exist?(path) && File.read(path).include?("mail_room_enabled=true")
puts "can't check because of previous errors".color(:magenta)
return
end
2015-08-20 17:09:37 -04:00
if mail_room_running?
puts "yes".color(:green)
else
puts "no".color(:red)
try_fixing_it(
sudo_gitlab("RAILS_ENV=production bin/mail_room start")
)
for_more_information(
see_installation_guide_section("Install Init Script"),
"see log/mail_room.log for possible errors"
)
fix_and_rerun
end
end
def check_imap_authentication
print "IMAP server credentials are correct? ... "
config_path = Rails.root.join('config', 'mail_room.yml').to_s
erb = ERB.new(File.read(config_path))
erb.filename = config_path
config_file = YAML.load(erb.result)
config = config_file[:mailboxes].first
if config
begin
imap = Net::IMAP.new(config[:host], port: config[:port], ssl: config[:ssl])
imap.starttls if config[:start_tls]
imap.login(config[:email], config[:password])
connected = true
rescue
connected = false
end
end
if connected
puts "yes".color(:green)
else
puts "no".color(:red)
try_fixing_it(
"Check that the information in config/gitlab.yml is correct"
)
for_more_information(
"doc/administration/reply_by_email.md"
)
fix_and_rerun
end
end
2015-08-20 17:09:37 -04:00
def mail_room_running?
ps_ux, _ = Gitlab::Popen.popen(%w(ps uxww))
2015-08-20 17:09:37 -04:00
ps_ux.include?("mail_room")
end
end
2013-11-28 09:20:40 -05:00
namespace :ldap do
include SystemCheck::Helpers
task :check, [:limit] => :environment do |_, args|
# Only show up to 100 results because LDAP directories can be very big.
# This setting only affects the `rake gitlab:check` script.
args.with_defaults(limit: 100)
2013-11-28 09:20:40 -05:00
warn_user_is_not_gitlab
start_checking "LDAP"
if Gitlab::LDAP::Config.enabled?
check_ldap(args.limit)
else
puts 'LDAP is disabled in config/gitlab.yml'
end
2013-11-28 09:20:40 -05:00
finished_checking "LDAP"
end
def check_ldap(limit)
servers = Gitlab::LDAP::Config.providers
2014-03-26 10:38:14 -04:00
servers.each do |server|
puts "Server: #{server}"
begin
Gitlab::LDAP::Adapter.open(server) do |adapter|
check_ldap_auth(adapter)
puts "LDAP users with access to your GitLab server (only showing the first #{limit} results)"
users = adapter.users(adapter.config.uid, '*', limit)
users.each do |user|
puts "\tDN: #{user.dn}\t #{adapter.config.uid}: #{user.uid}"
end
end
rescue Net::LDAP::ConnectionRefusedError, Errno::ECONNREFUSED => e
puts "Could not connect to the LDAP server: #{e.message}".color(:red)
end
2014-03-26 10:38:14 -04:00
end
2013-11-28 09:20:40 -05:00
end
def check_ldap_auth(adapter)
auth = adapter.config.has_auth?
message = if auth && adapter.ldap.bind
'Success'.color(:green)
elsif auth
'Failed. Check `bind_dn` and `password` configuration values'.color(:red)
else
'Anonymous. No `bind_dn` or `password` configured'.color(:yellow)
end
puts "LDAP authentication... #{message}"
end
2013-11-28 09:20:40 -05:00
end
2012-12-13 06:11:41 -05:00
namespace :repo do
include SystemCheck::Helpers
desc "GitLab | Check the integrity of the repositories managed by GitLab"
task check: :environment do
Gitlab.config.repositories.storages.each do |name, repository_storage|
namespace_dirs = Dir.glob(File.join(repository_storage['path'], '*'))
namespace_dirs.each do |namespace_dir|
repo_dirs = Dir.glob(File.join(namespace_dir, '*'))
repo_dirs.each { |repo_dir| check_repo_integrity(repo_dir) }
end
end
end
end
namespace :user do
include SystemCheck::Helpers
desc "GitLab | Check the integrity of a specific user's repositories"
task :check_repos, [:username] => :environment do |t, args|
username = args[:username] || prompt("Check repository integrity for fsername? ".color(:blue))
user = User.find_by(username: username)
if user
repo_dirs = user.authorized_projects.map do |p|
File.join(
p.repository_storage_path,
"#{p.path_with_namespace}.git"
)
end
repo_dirs.each { |repo_dir| check_repo_integrity(repo_dir) }
else
puts "\nUser '#{username}' not found".color(:red)
end
end
end
2012-12-13 06:11:41 -05:00
# Helper methods
##########################
def check_gitlab_shell
required_version = Gitlab::VersionInfo.new(gitlab_shell_major_version, gitlab_shell_minor_version, gitlab_shell_patch_version)
current_version = Gitlab::VersionInfo.parse(gitlab_shell_version)
2013-04-30 07:49:35 -04:00
print "GitLab Shell version >= #{required_version} ? ... "
if current_version.valid? && required_version <= current_version
puts "OK (#{current_version})".color(:green)
else
puts "FAIL. Please update gitlab-shell to #{required_version} from #{current_version}".color(:red)
end
end
2013-05-06 08:08:53 -04:00
def check_repo_integrity(repo_dir)
puts "\nChecking repo at #{repo_dir.color(:yellow)}"
git_fsck(repo_dir)
check_config_lock(repo_dir)
check_ref_locks(repo_dir)
end
def git_fsck(repo_dir)
puts "Running `git fsck`".color(:yellow)
system(*%W(#{Gitlab.config.git.bin_path} fsck), chdir: repo_dir)
end
def check_config_lock(repo_dir)
config_exists = File.exist?(File.join(repo_dir, 'config.lock'))
config_output = config_exists ? 'yes'.color(:red) : 'no'.color(:green)
puts "'config.lock' file exists?".color(:yellow) + " ... #{config_output}"
end
def check_ref_locks(repo_dir)
lock_files = Dir.glob(File.join(repo_dir, 'refs/heads/*.lock'))
if lock_files.present?
puts "Ref lock files exist:".color(:red)
lock_files.each do |lock_file|
puts " #{lock_file}"
end
else
puts "No ref lock files exist".color(:green)
end
end
2012-04-03 18:02:54 -04:00
end