Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Boxiang Sun
gitlab-ce
Commits
a4e75e7a
Commit
a4e75e7a
authored
Jul 09, 2018
by
Jacob Vosmaer
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Use Gitaly for fetches and creating bundles
parent
5e471c78
Changes
5
Hide whitespace changes
Inline
Side-by-side
Showing
5 changed files
with
73 additions
and
186 deletions
+73
-186
lib/gitlab/git/repository.rb
lib/gitlab/git/repository.rb
+4
-12
lib/gitlab/shell.rb
lib/gitlab/shell.rb
+3
-41
spec/lib/gitlab/git/repository_spec.rb
spec/lib/gitlab/git/repository_spec.rb
+31
-39
spec/lib/gitlab/shell_spec.rb
spec/lib/gitlab/shell_spec.rb
+24
-81
spec/lib/gitlab/workhorse_spec.rb
spec/lib/gitlab/workhorse_spec.rb
+11
-13
No files found.
lib/gitlab/git/repository.rb
View file @
a4e75e7a
...
@@ -898,12 +898,8 @@ module Gitlab
...
@@ -898,12 +898,8 @@ module Gitlab
end
end
def
fetch_source_branch!
(
source_repository
,
source_branch
,
local_ref
)
def
fetch_source_branch!
(
source_repository
,
source_branch
,
local_ref
)
Gitlab
::
GitalyClient
.
migrate
(
:fetch_source_branch
)
do
|
is_enabled
|
wrapped_gitaly_errors
do
if
is_enabled
gitaly_repository_client
.
fetch_source_branch
(
source_repository
,
source_branch
,
local_ref
)
gitaly_repository_client
.
fetch_source_branch
(
source_repository
,
source_branch
,
local_ref
)
else
rugged_fetch_source_branch
(
source_repository
,
source_branch
,
local_ref
)
end
end
end
end
end
...
@@ -1058,12 +1054,8 @@ module Gitlab
...
@@ -1058,12 +1054,8 @@ module Gitlab
end
end
def
bundle_to_disk
(
save_path
)
def
bundle_to_disk
(
save_path
)
gitaly_migrate
(
:bundle_to_disk
)
do
|
is_enabled
|
wrapped_gitaly_errors
do
if
is_enabled
gitaly_repository_client
.
create_bundle
(
save_path
)
gitaly_repository_client
.
create_bundle
(
save_path
)
else
run_git!
(
%W(bundle create
#{
save_path
}
--all)
)
end
end
end
true
true
...
...
lib/gitlab/shell.rb
View file @
a4e75e7a
...
@@ -92,21 +92,13 @@ module Gitlab
...
@@ -92,21 +92,13 @@ module Gitlab
# Ex.
# Ex.
# import_repository("nfs-file06", "gitlab/gitlab-ci", "https://gitlab.com/gitlab-org/gitlab-test.git")
# import_repository("nfs-file06", "gitlab/gitlab-ci", "https://gitlab.com/gitlab-org/gitlab-test.git")
#
#
# Gitaly migration: https://gitlab.com/gitlab-org/gitaly/issues/874
def
import_repository
(
storage
,
name
,
url
)
def
import_repository
(
storage
,
name
,
url
)
if
url
.
start_with?
(
'.'
,
'/'
)
if
url
.
start_with?
(
'.'
,
'/'
)
raise
Error
.
new
(
"don't use disk paths with import_repository:
#{
url
.
inspect
}
"
)
raise
Error
.
new
(
"don't use disk paths with import_repository:
#{
url
.
inspect
}
"
)
end
end
relative_path
=
"
#{
name
}
.git"
relative_path
=
"
#{
name
}
.git"
cmd
=
gitaly_migrate
(
:import_repository
,
status:
Gitlab
::
GitalyClient
::
MigrationStatus
::
OPT_OUT
)
do
|
is_enabled
|
cmd
=
GitalyGitlabProjects
.
new
(
storage
,
relative_path
)
if
is_enabled
GitalyGitlabProjects
.
new
(
storage
,
relative_path
)
else
# The timeout ensures the subprocess won't hang forever
gitlab_projects
(
storage
,
relative_path
)
end
end
success
=
cmd
.
import_project
(
url
,
git_timeout
)
success
=
cmd
.
import_project
(
url
,
git_timeout
)
raise
Error
,
cmd
.
output
unless
success
raise
Error
,
cmd
.
output
unless
success
...
@@ -126,12 +118,8 @@ module Gitlab
...
@@ -126,12 +118,8 @@ module Gitlab
# fetch_remote(my_repo, "upstream")
# fetch_remote(my_repo, "upstream")
#
#
def
fetch_remote
(
repository
,
remote
,
ssh_auth:
nil
,
forced:
false
,
no_tags:
false
,
prune:
true
)
def
fetch_remote
(
repository
,
remote
,
ssh_auth:
nil
,
forced:
false
,
no_tags:
false
,
prune:
true
)
gitaly_migrate
(
:fetch_remote
)
do
|
is_enabled
|
wrapped_gitaly_errors
do
if
is_enabled
repository
.
gitaly_repository_client
.
fetch_remote
(
remote
,
ssh_auth:
ssh_auth
,
forced:
forced
,
no_tags:
no_tags
,
timeout:
git_timeout
,
prune:
prune
)
repository
.
gitaly_repository_client
.
fetch_remote
(
remote
,
ssh_auth:
ssh_auth
,
forced:
forced
,
no_tags:
no_tags
,
timeout:
git_timeout
,
prune:
prune
)
else
local_fetch_remote
(
repository
.
storage
,
repository
.
relative_path
,
remote
,
ssh_auth:
ssh_auth
,
forced:
forced
,
no_tags:
no_tags
,
prune:
prune
)
end
end
end
end
end
...
@@ -389,28 +377,6 @@ module Gitlab
...
@@ -389,28 +377,6 @@ module Gitlab
)
)
end
end
def
local_fetch_remote
(
storage_name
,
repository_relative_path
,
remote
,
ssh_auth:
nil
,
forced:
false
,
no_tags:
false
,
prune:
true
)
vars
=
{
force:
forced
,
tags:
!
no_tags
,
prune:
prune
}
if
ssh_auth
&
.
ssh_import?
if
ssh_auth
.
ssh_key_auth?
&&
ssh_auth
.
ssh_private_key
.
present?
vars
[
:ssh_key
]
=
ssh_auth
.
ssh_private_key
end
if
ssh_auth
.
ssh_known_hosts
.
present?
vars
[
:known_hosts
]
=
ssh_auth
.
ssh_known_hosts
end
end
cmd
=
gitlab_projects
(
storage_name
,
repository_relative_path
)
success
=
cmd
.
fetch_remote
(
remote
,
git_timeout
,
vars
)
raise
Error
,
cmd
.
output
unless
success
success
end
def
gitlab_shell_fast_execute
(
cmd
)
def
gitlab_shell_fast_execute
(
cmd
)
output
,
status
=
gitlab_shell_fast_execute_helper
(
cmd
)
output
,
status
=
gitlab_shell_fast_execute_helper
(
cmd
)
...
@@ -440,10 +406,6 @@ module Gitlab
...
@@ -440,10 +406,6 @@ module Gitlab
Gitlab
.
config
.
gitlab_shell
.
git_timeout
Gitlab
.
config
.
gitlab_shell
.
git_timeout
end
end
def
gitaly_migrate
(
method
,
status:
Gitlab
::
GitalyClient
::
MigrationStatus
::
OPT_IN
,
&
block
)
wrapped_gitaly_errors
{
Gitlab
::
GitalyClient
.
migrate
(
method
,
status:
status
,
&
block
)
}
end
def
wrapped_gitaly_errors
def
wrapped_gitaly_errors
yield
yield
rescue
GRPC
::
NotFound
,
GRPC
::
BadStatus
=>
e
rescue
GRPC
::
NotFound
,
GRPC
::
BadStatus
=>
e
...
...
spec/lib/gitlab/git/repository_spec.rb
View file @
a4e75e7a
...
@@ -1716,59 +1716,51 @@ describe Gitlab::Git::Repository, seed_helper: true do
...
@@ -1716,59 +1716,51 @@ describe Gitlab::Git::Repository, seed_helper: true do
end
end
describe
'#fetch_source_branch!'
do
describe
'#fetch_source_branch!'
do
shared_examples
'#fetch_source_branch!'
do
let
(
:local_ref
)
{
'refs/merge-requests/1/head'
}
let
(
:local_ref
)
{
'refs/merge-requests/1/head'
}
let
(
:repository
)
{
Gitlab
::
Git
::
Repository
.
new
(
'default'
,
TEST_REPO_PATH
,
''
)
}
let
(
:repository
)
{
Gitlab
::
Git
::
Repository
.
new
(
'default'
,
TEST_REPO_PATH
,
''
)
}
let
(
:source_repository
)
{
Gitlab
::
Git
::
Repository
.
new
(
'default'
,
TEST_MUTABLE_REPO_PATH
,
''
)
}
let
(
:source_repository
)
{
Gitlab
::
Git
::
Repository
.
new
(
'default'
,
TEST_MUTABLE_REPO_PATH
,
''
)
}
after
do
ensure_seeds
end
context
'when the branch exists'
do
after
do
context
'when the commit does not exist locally'
do
ensure_seeds
let
(
:source_branch
)
{
'new-branch-for-fetch-source-branch'
}
end
let
(
:source_rugged
)
{
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
{
source_repository
.
rugged
}
}
let
(
:new_oid
)
{
new_commit_edit_old_file
(
source_rugged
).
oid
}
before
do
context
'when the branch exists'
do
source_rugged
.
branches
.
create
(
source_branch
,
new_oid
)
context
'when the commit does not exist locally'
do
end
let
(
:source_branch
)
{
'new-branch-for-fetch-source-branch'
}
let
(
:source_rugged
)
{
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
{
source_repository
.
rugged
}
}
let
(
:new_oid
)
{
new_commit_edit_old_file
(
source_rugged
).
oid
}
it
'writes the ref'
do
before
do
expect
(
repository
.
fetch_source_branch!
(
source_repository
,
source_branch
,
local_ref
)).
to
eq
(
true
)
source_rugged
.
branches
.
create
(
source_branch
,
new_oid
)
expect
(
repository
.
commit
(
local_ref
).
sha
).
to
eq
(
new_oid
)
end
end
end
context
'when the commit exists locally'
do
it
'writes the ref'
do
let
(
:source_branch
)
{
'master'
}
expect
(
repository
.
fetch_source_branch!
(
source_repository
,
source_branch
,
local_ref
)).
to
eq
(
true
)
let
(
:expected_oid
)
{
SeedRepo
::
LastCommit
::
ID
}
expect
(
repository
.
commit
(
local_ref
).
sha
).
to
eq
(
new_oid
)
it
'writes the ref'
do
# Sanity check: the commit should already exist
expect
(
repository
.
commit
(
expected_oid
)).
not_to
be_nil
expect
(
repository
.
fetch_source_branch!
(
source_repository
,
source_branch
,
local_ref
)).
to
eq
(
true
)
expect
(
repository
.
commit
(
local_ref
).
sha
).
to
eq
(
expected_oid
)
end
end
end
end
end
context
'when the branch does not exist'
do
context
'when the commit exists locally'
do
let
(
:source_branch
)
{
'definitely-not-master'
}
let
(
:source_branch
)
{
'master'
}
let
(
:expected_oid
)
{
SeedRepo
::
LastCommit
::
ID
}
it
'writes the ref'
do
# Sanity check: the commit should already exist
expect
(
repository
.
commit
(
expected_oid
)).
not_to
be_nil
it
'does not write the ref'
do
expect
(
repository
.
fetch_source_branch!
(
source_repository
,
source_branch
,
local_ref
)).
to
eq
(
true
)
expect
(
repository
.
fetch_source_branch!
(
source_repository
,
source_branch
,
local_ref
)).
to
eq
(
false
)
expect
(
repository
.
commit
(
local_ref
).
sha
).
to
eq
(
expected_oid
)
expect
(
repository
.
commit
(
local_ref
)).
to
be_nil
end
end
end
end
end
end
it_behaves_like
'#fetch_source_branch!'
context
'when the branch does not exist'
do
let
(
:source_branch
)
{
'definitely-not-master'
}
context
'without gitaly'
,
:skip_gitaly_mock
do
it
'does not write the ref'
do
it_behaves_like
'#fetch_source_branch!'
expect
(
repository
.
fetch_source_branch!
(
source_repository
,
source_branch
,
local_ref
)).
to
eq
(
false
)
expect
(
repository
.
commit
(
local_ref
)).
to
be_nil
end
end
end
end
end
...
...
spec/lib/gitlab/shell_spec.rb
View file @
a4e75e7a
...
@@ -403,46 +403,36 @@ describe Gitlab::Shell do
...
@@ -403,46 +403,36 @@ describe Gitlab::Shell do
end
end
describe
'#create_repository'
do
describe
'#create_repository'
do
shared_examples
'#create_repository'
do
let
(
:repository_storage
)
{
'default'
}
let
(
:repository_storage
)
{
'default'
}
let
(
:repository_storage_path
)
do
let
(
:repository_storage_path
)
do
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
Gitlab
.
config
.
repositories
.
storages
[
repository_storage
].
legacy_disk_path
Gitlab
.
config
.
repositories
.
storages
[
repository_storage
].
legacy_disk_path
end
end
let
(
:repo_name
)
{
'project/path'
}
let
(
:created_path
)
{
File
.
join
(
repository_storage_path
,
repo_name
+
'.git'
)
}
after
do
FileUtils
.
rm_rf
(
created_path
)
end
end
end
let
(
:repo_name
)
{
'project/path'
}
let
(
:created_path
)
{
File
.
join
(
repository_storage_path
,
repo_name
+
'.git'
)
}
it
'creates a repository'
do
after
do
expect
(
gitlab_shell
.
create_repository
(
repository_storage
,
repo_name
)).
to
be_truthy
FileUtils
.
rm_rf
(
created_path
)
end
expect
(
File
.
stat
(
created_path
).
mode
&
0
o777
).
to
eq
(
0
o770
)
hooks_path
=
File
.
join
(
created_path
,
'hooks'
)
it
'creates a repository'
do
expect
(
File
.
lstat
(
hooks_path
)).
to
be_symlink
expect
(
gitlab_shell
.
create_repository
(
repository_storage
,
repo_name
)).
to
be_truthy
expect
(
File
.
realpath
(
hooks_path
)).
to
eq
(
gitlab_shell_hooks_path
)
end
it
'returns false when the command fails'
do
expect
(
File
.
stat
(
created_path
).
mode
&
0
o777
).
to
eq
(
0
o770
)
FileUtils
.
mkdir_p
(
File
.
dirname
(
created_path
))
# This file will block the creation of the repo's .git directory. That
# should cause #create_repository to fail.
FileUtils
.
touch
(
created_path
)
expect
(
gitlab_shell
.
create_repository
(
repository_storage
,
repo_name
)).
to
be_falsy
hooks_path
=
File
.
join
(
created_path
,
'hooks'
)
end
expect
(
File
.
lstat
(
hooks_path
)).
to
be_symlink
expect
(
File
.
realpath
(
hooks_path
)).
to
eq
(
gitlab_shell_hooks_path
)
end
end
context
'with gitaly'
do
it
'returns false when the command fails'
do
it_behaves_like
'#create_repository'
FileUtils
.
mkdir_p
(
File
.
dirname
(
created_path
))
end
# This file will block the creation of the repo's .git directory. That
# should cause #create_repository to fail.
FileUtils
.
touch
(
created_path
)
context
'without gitaly'
,
:skip_gitaly_mock
do
expect
(
gitlab_shell
.
create_repository
(
repository_storage
,
repo_name
)).
to
be_falsy
it_behaves_like
'#create_repository'
end
end
end
end
...
@@ -513,22 +503,12 @@ describe Gitlab::Shell do
...
@@ -513,22 +503,12 @@ describe Gitlab::Shell do
end
end
end
end
shared_examples
'fetch_remote'
do
|
gitaly_on
|
describe
'#fetch_remote'
do
def
fetch_remote
(
ssh_auth
=
nil
,
prune
=
true
)
def
fetch_remote
(
ssh_auth
=
nil
,
prune
=
true
)
gitlab_shell
.
fetch_remote
(
repository
.
raw_repository
,
'remote-name'
,
ssh_auth:
ssh_auth
,
prune:
prune
)
gitlab_shell
.
fetch_remote
(
repository
.
raw_repository
,
'remote-name'
,
ssh_auth:
ssh_auth
,
prune:
prune
)
end
end
def
expect_gitlab_projects
(
fail
=
false
,
options
=
{})
def
expect_call
(
fail
,
options
=
{})
expect
(
gitlab_projects
).
to
receive
(
:fetch_remote
).
with
(
'remote-name'
,
timeout
,
options
).
and_return
(
!
fail
)
allow
(
gitlab_projects
).
to
receive
(
:output
).
and_return
(
'error'
)
if
fail
end
def
expect_gitaly_call
(
fail
,
options
=
{})
receive_fetch_remote
=
receive_fetch_remote
=
if
fail
if
fail
receive
(
:fetch_remote
).
and_raise
(
GRPC
::
NotFound
)
receive
(
:fetch_remote
).
and_raise
(
GRPC
::
NotFound
)
...
@@ -539,16 +519,6 @@ describe Gitlab::Shell do
...
@@ -539,16 +519,6 @@ describe Gitlab::Shell do
expect_any_instance_of
(
Gitlab
::
GitalyClient
::
RepositoryService
).
to
receive_fetch_remote
expect_any_instance_of
(
Gitlab
::
GitalyClient
::
RepositoryService
).
to
receive_fetch_remote
end
end
if
gitaly_on
def
expect_call
(
fail
,
options
=
{})
expect_gitaly_call
(
fail
,
options
)
end
else
def
expect_call
(
fail
,
options
=
{})
expect_gitlab_projects
(
fail
,
options
)
end
end
def
build_ssh_auth
(
opts
=
{})
def
build_ssh_auth
(
opts
=
{})
defaults
=
{
defaults
=
{
ssh_import?:
true
,
ssh_import?:
true
,
...
@@ -634,14 +604,6 @@ describe Gitlab::Shell do
...
@@ -634,14 +604,6 @@ describe Gitlab::Shell do
expect
(
fetch_remote
(
ssh_auth
)).
to
be_truthy
expect
(
fetch_remote
(
ssh_auth
)).
to
be_truthy
end
end
end
end
end
describe
'#fetch_remote local'
,
:skip_gitaly_mock
do
it_should_behave_like
'fetch_remote'
,
false
end
describe
'#fetch_remote gitaly'
do
it_should_behave_like
'fetch_remote'
,
true
context
'gitaly call'
do
context
'gitaly call'
do
let
(
:remote_name
)
{
'remote-name'
}
let
(
:remote_name
)
{
'remote-name'
}
...
@@ -683,25 +645,6 @@ describe Gitlab::Shell do
...
@@ -683,25 +645,6 @@ describe Gitlab::Shell do
end
.
to
raise_error
(
Gitlab
::
Shell
::
Error
,
"error"
)
end
.
to
raise_error
(
Gitlab
::
Shell
::
Error
,
"error"
)
end
end
end
end
context
'without gitaly'
,
:disable_gitaly
do
it
'returns true when the command succeeds'
do
expect
(
gitlab_projects
).
to
receive
(
:import_project
).
with
(
import_url
,
timeout
)
{
true
}
result
=
gitlab_shell
.
import_repository
(
project
.
repository_storage
,
project
.
disk_path
,
import_url
)
expect
(
result
).
to
be_truthy
end
it
'raises an exception when the command fails'
do
allow
(
gitlab_projects
).
to
receive
(
:output
)
{
'error'
}
expect
(
gitlab_projects
).
to
receive
(
:import_project
)
{
false
}
expect
do
gitlab_shell
.
import_repository
(
project
.
repository_storage
,
project
.
disk_path
,
import_url
)
end
.
to
raise_error
(
Gitlab
::
Shell
::
Error
,
"error"
)
end
end
end
end
end
end
...
...
spec/lib/gitlab/workhorse_spec.rb
View file @
a4e75e7a
...
@@ -36,22 +36,20 @@ describe Gitlab::Workhorse do
...
@@ -36,22 +36,20 @@ describe Gitlab::Workhorse do
allow
(
described_class
).
to
receive
(
:git_archive_cache_disabled?
).
and_return
(
cache_disabled
)
allow
(
described_class
).
to
receive
(
:git_archive_cache_disabled?
).
and_return
(
cache_disabled
)
end
end
context
'when Gitaly workhorse_archive feature is enabled'
do
it
'sets the header correctly'
do
it
'sets the header correctly'
do
key
,
command
,
params
=
decode_workhorse_header
(
subject
)
key
,
command
,
params
=
decode_workhorse_header
(
subject
)
expect
(
key
).
to
eq
(
'Gitlab-Workhorse-Send-Data'
)
expect
(
key
).
to
eq
(
'Gitlab-Workhorse-Send-Data'
)
expect
(
command
).
to
eq
(
'git-archive'
)
expect
(
command
).
to
eq
(
'git-archive'
)
expect
(
params
).
to
include
(
gitaly_params
)
expect
(
params
).
to
include
(
gitaly_params
)
end
end
context
'when archive caching is disabled'
do
context
'when archive caching is disabled'
do
let
(
:cache_disabled
)
{
true
}
let
(
:cache_disabled
)
{
true
}
it
'tells workhorse not to use the cache'
do
it
'tells workhorse not to use the cache'
do
_
,
_
,
params
=
decode_workhorse_header
(
subject
)
_
,
_
,
params
=
decode_workhorse_header
(
subject
)
expect
(
params
).
to
include
({
'DisableCache'
=>
true
})
expect
(
params
).
to
include
({
'DisableCache'
=>
true
})
end
end
end
end
end
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment