# Gitaly note: SSH key operations are not part of Gitaly so will never be migrated. require 'securerandom' module Gitlab class Shell GITLAB_SHELL_ENV_VARS = %w(GIT_TERMINAL_PROMPT).freeze Error = Class.new(StandardError) KeyAdder = Struct.new(:io) do def add_key(id, key) key = Gitlab::Shell.strip_key(key) # Newline and tab are part of the 'protocol' used to transmit id+key to the other end if key.include?("\t") || key.include?("\n") raise Error.new("Invalid key: #{key.inspect}") end io.puts("#{id}\t#{key}") end end class << self def secret_token @secret_token ||= begin File.read(Gitlab.config.gitlab_shell.secret_file).chomp end end def ensure_secret_token! return if File.exist?(File.join(Gitlab.config.gitlab_shell.path, '.gitlab_shell_secret')) generate_and_link_secret_token end def version_required @version_required ||= File.read(Rails.root .join('GITLAB_SHELL_VERSION')).strip end def strip_key(key) key.split(/[ ]+/)[0, 2].join(' ') end private # Create (if necessary) and link the secret token file def generate_and_link_secret_token secret_file = Gitlab.config.gitlab_shell.secret_file shell_path = Gitlab.config.gitlab_shell.path unless File.size?(secret_file) # Generate a new token of 16 random hexadecimal characters and store it in secret_file. @secret_token = SecureRandom.hex(16) File.write(secret_file, @secret_token) end link_path = File.join(shell_path, '.gitlab_shell_secret') if File.exist?(shell_path) && !File.exist?(link_path) FileUtils.symlink(secret_file, link_path) end end end # Init new repository # # storage - the shard key # name - project disk path # # Ex. # create_repository("default", "gitlab/gitlab-ci") # def create_repository(storage, name) relative_path = name.dup relative_path << '.git' unless relative_path.end_with?('.git') repository = Gitlab::Git::Repository.new(storage, relative_path, '') wrapped_gitaly_errors { repository.gitaly_repository_client.create_repository } true rescue => err # Once the Rugged codes gets removes this can be improved Rails.logger.error("Failed to add repository #{storage}/#{name}: #{err}") false end # Import repository # # storage - project's storage name # name - project disk path # url - URL to import from # # Ex. # import_repository("nfs-file06", "gitlab/gitlab-ci", "https://gitlab.com/gitlab-org/gitlab-test.git") # def import_repository(storage, name, url) if url.start_with?('.', '/') raise Error.new("don't use disk paths with import_repository: #{url.inspect}") end relative_path = "#{name}.git" cmd = GitalyGitlabProjects.new(storage, relative_path) success = cmd.import_project(url, git_timeout) raise Error, cmd.output unless success success end # Fetch remote for repository # # repository - an instance of Git::Repository # remote - remote name # ssh_auth - SSH known_hosts data and a private key to use for public-key authentication # forced - should we use --force flag? # no_tags - should we use --no-tags flag? # # Ex. # fetch_remote(my_repo, "upstream") # def fetch_remote(repository, remote, ssh_auth: nil, forced: false, no_tags: false, prune: true) wrapped_gitaly_errors do repository.gitaly_repository_client.fetch_remote(remote, ssh_auth: ssh_auth, forced: forced, no_tags: no_tags, timeout: git_timeout, prune: prune) end end # Move repository reroutes to mv_directory which is an alias for # mv_namespace. Given the underlying implementation is a move action, # indescriminate of what the folders might be. # # storage - project's storage path # path - project disk path # new_path - new project disk path # # Ex. # mv_repository("/path/to/storage", "gitlab/gitlab-ci", "randx/gitlab-ci-new") def mv_repository(storage, path, new_path) return false if path.empty? || new_path.empty? !!mv_directory(storage, "#{path}.git", "#{new_path}.git") end # Fork repository to new path # forked_from_storage - forked-from project's storage name # forked_from_disk_path - project disk relative path # forked_to_storage - forked-to project's storage name # forked_to_disk_path - forked project disk relative path # # Ex. # fork_repository("nfs-file06", "gitlab/gitlab-ci", "nfs-file07", "new-namespace/gitlab-ci") def fork_repository(forked_from_storage, forked_from_disk_path, forked_to_storage, forked_to_disk_path) forked_from_relative_path = "#{forked_from_disk_path}.git" fork_args = [forked_to_storage, "#{forked_to_disk_path}.git"] GitalyGitlabProjects.new(forked_from_storage, forked_from_relative_path).fork_repository(*fork_args) end # Removes a repository from file system, using rm_diretory which is an alias # for rm_namespace. Given the underlying implementation removes the name # passed as second argument on the passed storage. # # storage - project's storage path # name - project disk path # # Ex. # remove_repository("/path/to/storage", "gitlab/gitlab-ci") def remove_repository(storage, name) return false if name.empty? !!rm_directory(storage, "#{name}.git") rescue ArgumentError => e Rails.logger.warn("Repository does not exist: #{e} at: #{name}.git") false end # Add new key to gitlab-shell # # Ex. # add_key("key-42", "sha-rsa ...") # def add_key(key_id, key_content) return unless self.authorized_keys_enabled? gitlab_shell_fast_execute([gitlab_shell_keys_path, 'add-key', key_id, self.class.strip_key(key_content)]) end # Batch-add keys to authorized_keys # # Ex. # batch_add_keys { |adder| adder.add_key("key-42", "sha-rsa ...") } def batch_add_keys(&block) return unless self.authorized_keys_enabled? IO.popen(%W(#{gitlab_shell_path}/bin/gitlab-keys batch-add-keys), 'w') do |io| yield(KeyAdder.new(io)) end end # Remove ssh key from gitlab shell # # Ex. # remove_key("key-342", "sha-rsa ...") # def remove_key(key_id, key_content = nil) return unless self.authorized_keys_enabled? args = [gitlab_shell_keys_path, 'rm-key', key_id] args << key_content if key_content gitlab_shell_fast_execute(args) end # Remove all ssh keys from gitlab shell # # Ex. # remove_all_keys # def remove_all_keys return unless self.authorized_keys_enabled? gitlab_shell_fast_execute([gitlab_shell_keys_path, 'clear']) end # Remove ssh keys from gitlab shell that are not in the DB # # Ex. # remove_keys_not_found_in_db # def remove_keys_not_found_in_db return unless self.authorized_keys_enabled? Rails.logger.info("Removing keys not found in DB") batch_read_key_ids do |ids_in_file| ids_in_file.uniq! keys_in_db = Key.where(id: ids_in_file) next unless ids_in_file.size > keys_in_db.count # optimization ids_to_remove = ids_in_file - keys_in_db.pluck(:id) ids_to_remove.each do |id| Rails.logger.info("Removing key-#{id} not found in DB") remove_key("key-#{id}") end end end # Iterate over all ssh key IDs from gitlab shell, in batches # # Ex. # batch_read_key_ids { |batch| keys = Key.where(id: batch) } # def batch_read_key_ids(batch_size: 100, &block) return unless self.authorized_keys_enabled? list_key_ids do |key_id_stream| key_id_stream.lazy.each_slice(batch_size) do |lines| key_ids = lines.map { |l| l.chomp.to_i } yield(key_ids) end end end # Stream all ssh key IDs from gitlab shell, separated by newlines # # Ex. # list_key_ids # def list_key_ids(&block) return unless self.authorized_keys_enabled? IO.popen(%W(#{gitlab_shell_path}/bin/gitlab-keys list-key-ids), &block) end # Add empty directory for storing repositories # # Ex. # add_namespace("default", "gitlab") # def add_namespace(storage, name) Gitlab::GitalyClient::NamespaceService.new(storage).add(name) rescue GRPC::InvalidArgument => e raise ArgumentError, e.message end # Remove directory from repositories storage # Every repository inside this directory will be removed too # # Ex. # rm_namespace("default", "gitlab") # def rm_namespace(storage, name) Gitlab::GitalyClient::NamespaceService.new(storage).remove(name) rescue GRPC::InvalidArgument => e raise ArgumentError, e.message end alias_method :rm_directory, :rm_namespace # Move namespace directory inside repositories storage # # Ex. # mv_namespace("/path/to/storage", "gitlab", "gitlabhq") # def mv_namespace(storage, old_name, new_name) Gitlab::GitalyClient::NamespaceService.new(storage).rename(old_name, new_name) rescue GRPC::InvalidArgument false end alias_method :mv_directory, :mv_namespace def url_to_repo(path) Gitlab.config.gitlab_shell.ssh_path_prefix + "#{path}.git" end # Return GitLab shell version def version gitlab_shell_version_file = "#{gitlab_shell_path}/VERSION" if File.readable?(gitlab_shell_version_file) File.read(gitlab_shell_version_file).chomp end end # Check if such directory exists in repositories. # # Usage: # exists?(storage, 'gitlab') # exists?(storage, 'gitlab/cookies.git') # def exists?(storage, dir_name) Gitlab::GitalyClient::NamespaceService.new(storage).exists?(dir_name) end protected def gitlab_shell_path File.expand_path(Gitlab.config.gitlab_shell.path) end def gitlab_shell_hooks_path File.expand_path(Gitlab.config.gitlab_shell.hooks_path) end def gitlab_shell_user_home File.expand_path("~#{Gitlab.config.gitlab_shell.ssh_user}") end def full_path(storage, dir_name) raise ArgumentError.new("Directory name can't be blank") if dir_name.blank? File.join(Gitlab.config.repositories.storages[storage].legacy_disk_path, dir_name) end def gitlab_shell_projects_path File.join(gitlab_shell_path, 'bin', 'gitlab-projects') end def gitlab_shell_keys_path File.join(gitlab_shell_path, 'bin', 'gitlab-keys') end def authorized_keys_enabled? # Return true if nil to ensure the authorized_keys methods work while # fixing the authorized_keys file during migration. return true if Gitlab::CurrentSettings.current_application_settings.authorized_keys_enabled.nil? Gitlab::CurrentSettings.current_application_settings.authorized_keys_enabled end private def gitlab_projects(shard_name, disk_path) Gitlab::Git::GitlabProjects.new( shard_name, disk_path, global_hooks_path: Gitlab.config.gitlab_shell.hooks_path, logger: Rails.logger ) end def gitlab_shell_fast_execute(cmd) output, status = gitlab_shell_fast_execute_helper(cmd) return true if status.zero? Rails.logger.error("gitlab-shell failed with error #{status}: #{output}") false end def gitlab_shell_fast_execute_raise_error(cmd, vars = {}) output, status = gitlab_shell_fast_execute_helper(cmd, vars) raise Error, output unless status.zero? true end def gitlab_shell_fast_execute_helper(cmd, vars = {}) vars.merge!(ENV.to_h.slice(*GITLAB_SHELL_ENV_VARS)) # Don't pass along the entire parent environment to prevent gitlab-shell # from wasting I/O by searching through GEM_PATH Bundler.with_original_env { Popen.popen(cmd, nil, vars) } end def git_timeout Gitlab.config.gitlab_shell.git_timeout end def wrapped_gitaly_errors yield rescue GRPC::NotFound, GRPC::BadStatus => e # Old Popen code returns [Error, output] to the caller, so we # need to do the same here... raise Error, e end class GitalyGitlabProjects attr_reader :shard_name, :repository_relative_path, :output def initialize(shard_name, repository_relative_path) @shard_name = shard_name @repository_relative_path = repository_relative_path @output = '' end def import_project(source, _timeout) raw_repository = Gitlab::Git::Repository.new(shard_name, repository_relative_path, nil) Gitlab::GitalyClient::RepositoryService.new(raw_repository).import_repository(source) true rescue GRPC::BadStatus => e @output = e.message false end def fork_repository(new_shard_name, new_repository_relative_path) target_repository = Gitlab::Git::Repository.new(new_shard_name, new_repository_relative_path, nil) raw_repository = Gitlab::Git::Repository.new(shard_name, repository_relative_path, nil) Gitlab::GitalyClient::RepositoryService.new(target_repository).fork_repository(raw_repository) rescue GRPC::BadStatus => e logger.error "fork-repository failed: #{e.message}" false end def logger Rails.logger end end end end