Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-shell
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Kirill Smelkov
gitlab-shell
Commits
4bbda0b2
Commit
4bbda0b2
authored
Mar 10, 2013
by
Michael
Browse files
Options
Browse Files
Download
Plain Diff
Merge pull request #1 from gitlabhq/master
Master Sync
parents
381f4cdb
fc8bd8f7
Changes
15
Hide whitespace changes
Inline
Side-by-side
Showing
15 changed files
with
80 additions
and
40 deletions
+80
-40
CHANGELOG
CHANGELOG
+5
-0
README.md
README.md
+2
-2
VERSION
VERSION
+1
-1
bin/gitlab-projects
bin/gitlab-projects
+2
-0
bin/install
bin/install
+8
-5
hooks/post-receive
hooks/post-receive
+4
-9
hooks/update
hooks/update
+1
-1
lib/gitlab_keys.rb
lib/gitlab_keys.rb
+1
-1
lib/gitlab_net.rb
lib/gitlab_net.rb
+8
-2
lib/gitlab_projects.rb
lib/gitlab_projects.rb
+2
-2
lib/gitlab_shell.rb
lib/gitlab_shell.rb
+1
-1
lib/gitlab_update.rb
lib/gitlab_update.rb
+31
-5
spec/gitlab_keys_spec.rb
spec/gitlab_keys_spec.rb
+2
-2
support/rewrite-hooks.sh
support/rewrite-hooks.sh
+8
-7
support/truncate_repositories.sh
support/truncate_repositories.sh
+4
-2
No files found.
CHANGELOG
0 → 100644
View file @
4bbda0b2
v1.0.4
- requires gitlab c9ca15e
- dont use post-receive file any more. Make all updates in update
- fixed issue with invalid GL_USER
- use GL_ID instead of GL_USER
README.md
View file @
4bbda0b2
### gitlab-shell: ssh access and repos
ti
ory management
### gitlab-shell: ssh access and repos
it
ory management
[
![CI
](
http://ci.gitlab.org/projects/4/status?ref=master
)
](http://ci.gitlab.org/projects/4?ref=master)
...
...
@@ -25,7 +25,7 @@ Remove repo
Import repo
./bin/gitlab-projects import-project https://github.com/randx/six.git
./bin/gitlab-projects import-project
randx/six.git
https://github.com/randx/six.git
### Keys:
...
...
VERSION
View file @
4bbda0b2
1.0.
0
1.0.
4
bin/gitlab-projects
View file @
4bbda0b2
...
...
@@ -11,6 +11,8 @@ require_relative '../lib/gitlab_init'
#
# /bin/gitlab-projects rm-project gitlab/gitlab-ci.git
#
# /bin/gitlab-projects import-project randx/six.git https://github.com/randx/six.git
#
require
File
.
join
(
ROOT_PATH
,
'lib'
,
'gitlab_projects'
)
GitlabProjects
.
new
.
exec
...
...
bin/install
View file @
4bbda0b2
...
...
@@ -6,12 +6,15 @@ require_relative '../lib/gitlab_init'
# GitLab shell, invoked from ~/.ssh/authorized_keys
#
config
=
GitlabConfig
.
new
key_dir
=
File
.
dirname
(
"
#{
config
.
auth_file
}
"
)
commands
=
[
"mkdir -p
/home/git/repositories
"
,
"mkdir -p
/home/git/.ssh
"
,
"touch
/home/git/.ssh/authorized_keys
"
,
"chmod -R ug+rwX,o-rwx
/home/git/repositories/
"
,
"find
/home/git/repositories
-type d -print0 | xargs -0 chmod g+s"
"mkdir -p
#{
config
.
repos_path
}
"
,
"mkdir -p
#{
key_dir
}
"
,
"touch
#{
config
.
auth_file
}
"
,
"chmod -R ug+rwX,o-rwx
#{
config
.
repos_path
}
"
,
"find
#{
config
.
repos_path
}
-type d -print0 | xargs -0 chmod g+s"
]
commands
.
each
do
|
cmd
|
...
...
hooks/post-receive
View file @
4bbda0b2
#!/usr/bin/env
bash
#!/usr/bin/env
ruby
# This file was placed here by GitLab. It makes sure that your pushed commits
# will be processed properly.
# This file was placed here by GitLab.
# IT IS DEPRECATED NOW.
# All GitLab logic handled by update hook
while
read
oldrev newrev ref
do
# For every branch or tag that was pushed, create a Resque job in redis.
repo_path
=
`
pwd
`
env
-i
redis-cli rpush
"resque:gitlab:queue:post_receive"
"{
\"
class
\"
:
\"
PostReceive
\"
,
\"
args
\"
:[
\"
$repo_path
\"
,
\"
$oldrev
\"
,
\"
$newrev
\"
,
\"
$ref
\"
,
\"
$GL_USER
\"
]}"
>
/dev/null 2>&1
done
hooks/update
View file @
4bbda0b2
...
...
@@ -4,7 +4,7 @@
# will be processed properly.
refname
=
ARGV
[
0
]
key_id
=
ENV
[
'GL_
USER
'
]
key_id
=
ENV
[
'GL_
ID
'
]
repo_path
=
`pwd`
require_relative
'../lib/gitlab_update'
...
...
lib/gitlab_keys.rb
View file @
4bbda0b2
...
...
@@ -28,7 +28,7 @@ class GitlabKeys
end
def
rm_key
cmd
=
"sed -i '/
#{
@key_id
}
/d'
#{
auth_file
}
"
cmd
=
"sed -i '/
shell
#{
@key_id
}
/d'
#{
auth_file
}
"
system
(
cmd
)
end
end
lib/gitlab_net.rb
View file @
4bbda0b2
...
...
@@ -6,7 +6,9 @@ require_relative 'gitlab_config'
class
GitlabNet
def
allowed?
(
cmd
,
repo
,
key
,
ref
)
project_name
=
repo
.
gsub
(
"'"
,
""
)
project_name
=
project_name
.
gsub
(
/\.git$/
,
""
)
project_name
=
project_name
.
gsub
(
/\.git\Z/
,
""
)
project_name
=
project_name
.
gsub
(
/\A\//
,
""
)
key_id
=
key
.
gsub
(
"key-"
,
""
)
url
=
"
#{
host
}
/allowed?key_id=
#{
key_id
}
&action=
#{
cmd
}
&ref=
#{
ref
}
&project=
#{
project_name
}
"
...
...
@@ -33,6 +35,10 @@ class GitlabNet
end
def
get
(
url
)
Net
::
HTTP
.
get_response
(
URI
.
parse
(
url
))
url
=
URI
.
parse
(
url
)
http
=
Net
::
HTTP
.
new
(
url
.
host
,
url
.
port
)
http
.
use_ssl
=
(
url
.
port
==
443
)
request
=
Net
::
HTTP
::
Get
.
new
(
url
.
request_uri
)
http
.
start
{
|
http
|
http
.
request
(
request
)
}
end
end
lib/gitlab_projects.rb
View file @
4bbda0b2
...
...
@@ -41,8 +41,8 @@ class GitlabProjects
end
def
import_project
dir
=
@project_name
.
match
(
/[a-zA-Z\.\_\-]+\.git$/
).
to_s
cmd
=
"cd
#{
@repos_path
}
&& git clone --bare
#{
@
project_name
}
#{
dir
}
&&
#{
create_hooks_cmd
}
"
@source
=
ARGV
.
shift
cmd
=
"cd
#{
@repos_path
}
&& git clone --bare
#{
@
source
}
#{
@project_name
}
&&
#{
create_hooks_cmd
}
"
system
(
cmd
)
end
end
lib/gitlab_shell.rb
View file @
4bbda0b2
...
...
@@ -16,7 +16,7 @@ class GitlabShell
parse_cmd
if
git_cmds
.
include?
(
@git_cmd
)
ENV
[
'GL_
USER
'
]
=
@key_id
ENV
[
'GL_
ID
'
]
=
@key_id
if
validate_access
process_cmd
...
...
lib/gitlab_update.rb
View file @
4bbda0b2
...
...
@@ -3,21 +3,38 @@ require_relative 'gitlab_net'
class
GitlabUpdate
def
initialize
(
repo_path
,
key_id
,
refname
)
@repo_path
=
repo_path
.
strip
@repo_name
=
repo_path
@repo_name
.
gsub!
(
GitlabConfig
.
new
.
repos_path
.
to_s
,
""
)
@repo_name
.
gsub!
(
/.git$/
,
""
)
@repo_name
.
gsub!
(
/^\//
,
""
)
@key_id
=
key_id
@refname
=
/refs\/heads\/([\w\.-]+)/
.
match
(
refname
).
to_a
.
last
@refname
=
refname
@branch_name
=
/refs\/heads\/([\w\.-]+)/
.
match
(
refname
).
to_a
.
last
@oldrev
=
ARGV
[
1
]
@newrev
=
ARGV
[
2
]
end
def
exec
if
api
.
allowed?
(
'git-receive-pack'
,
@repo_name
,
@key_id
,
@refname
)
exit
0
# reset GL_ID env since we already
# get value from it
ENV
[
'GL_ID'
]
=
nil
# If its push over ssh
# we need to check user persmission per branch first
if
ssh?
if
api
.
allowed?
(
'git-receive-pack'
,
@repo_name
,
@key_id
,
@branch_name
)
update_redis
exit
0
else
puts
"GitLab: You are not allowed to access
#{
@branch_name
}
! "
exit
1
end
else
puts
"GitLab: You are not allowed to access
#{
@refname
}
! "
exit
1
update_redis
exit
0
end
end
...
...
@@ -26,4 +43,13 @@ class GitlabUpdate
def
api
GitlabNet
.
new
end
def
ssh?
@key_id
=~
/\Akey\-\d+\Z/
end
def
update_redis
command
=
"env -i redis-cli rpush 'resque:gitlab:queue:post_receive' '{
\"
class
\"
:
\"
PostReceive
\"
,
\"
args
\"
:[
\"
#{
@repo_path
}
\"
,
\"
#{
@oldrev
}
\"
,
\"
#{
@newrev
}
\"
,
\"
#{
@refname
}
\"
,
\"
#{
@key_id
}
\"
]}' > /dev/null 2>&1"
system
(
command
)
end
end
spec/gitlab_keys_spec.rb
View file @
4bbda0b2
...
...
@@ -20,7 +20,7 @@ describe GitlabKeys do
end
it
"should receive valid cmd"
do
valid_cmd
=
"echo 'command=
\"
#{
ROOT_PATH
}
/bin/gitlab-shell key-741
\"
,no-port-forwarding,no-X11-forwarding,no-agent-forwarding,no-pty ssh-rsa AAAAB3NzaDAxx2E' >>
/home/git/.ssh/authorized_keys
"
valid_cmd
=
"echo 'command=
\"
#{
ROOT_PATH
}
/bin/gitlab-shell key-741
\"
,no-port-forwarding,no-X11-forwarding,no-agent-forwarding,no-pty ssh-rsa AAAAB3NzaDAxx2E' >>
#{
GitlabConfig
.
new
.
auth_file
}
"
@gl_keys
.
should_receive
(
:system
).
with
(
valid_cmd
)
@gl_keys
.
send
:add_key
end
...
...
@@ -33,7 +33,7 @@ describe GitlabKeys do
end
it
"should receive valid cmd"
do
valid_cmd
=
"sed -i '/
key-741/d' /home/git/.ssh/authorized_keys
"
valid_cmd
=
"sed -i '/
shell key-741/d'
#{
GitlabConfig
.
new
.
auth_file
}
"
@gl_keys
.
should_receive
(
:system
).
with
(
valid_cmd
)
@gl_keys
.
send
:rm_key
end
...
...
support/rewrite-hooks.sh
View file @
4bbda0b2
#!/bin/bash
src
=
"/home/git/repositories"
home_dir
=
"/home/git"
src
=
"
$home_dir
/repositories"
for
dir
in
`
ls
"
$src
/"
`
do
...
...
@@ -11,25 +12,25 @@ do
continue
fi
if
[[
"
$dir
"
=
~ ^.
*
.git
$
]]
if
[[
"
$dir
"
=
~ ^.
*
\
.
git
$
]]
then
project_hook
=
"
$src
/
$dir
/hooks/post-receive"
gitolite_hook
=
"
/home/git
/gitlab-shell/hooks/post-receive"
gitolite_hook
=
"
$home_dir
/gitlab-shell/hooks/post-receive"
ln
-s
-f
$gitolite_hook
$project_hook
project_hook
=
"
$src
/
$dir
/hooks/update"
gitolite_hook
=
"
/home/git
/gitlab-shell/hooks/update"
gitolite_hook
=
"
$home_dir
/gitlab-shell/hooks/update"
ln
-s
-f
$gitolite_hook
$project_hook
else
for
subdir
in
`
ls
"
$src
/
$dir
/"
`
do
if
[
-d
"
$src
/
$dir
/
$subdir
"
]
&&
[[
"
$subdir
"
=
~ ^.
*
.git
$
]]
;
then
if
[
-d
"
$src
/
$dir
/
$subdir
"
]
&&
[[
"
$subdir
"
=
~ ^.
*
\
.
git
$
]]
;
then
project_hook
=
"
$src
/
$dir
/
$subdir
/hooks/post-receive"
gitolite_hook
=
"
/home/git
/gitlab-shell/hooks/post-receive"
gitolite_hook
=
"
$home_dir
/gitlab-shell/hooks/post-receive"
ln
-s
-f
$gitolite_hook
$project_hook
project_hook
=
"
$src
/
$dir
/
$subdir
/hooks/update"
gitolite_hook
=
"
/home/git
/gitlab-shell/hooks/update"
gitolite_hook
=
"
$home_dir
/gitlab-shell/hooks/update"
ln
-s
-f
$gitolite_hook
$project_hook
fi
done
...
...
support/truncate_repositories.sh
View file @
4bbda0b2
#!/bin/bash
home_dir
=
"/home/git"
echo
"Danger!!! Data Loss"
while
true
;
do
read
-p
"Do you wish to
all directories except gitolite-admin.git from /home/git
/repositories/ (y/n) ?: "
yn
read
-p
"Do you wish to
delete all directories (except gitolite-admin.git) from
$home_dir
/repositories/ (y/n) ?: "
yn
case
$yn
in
[
Yy]
*
)
sh
-c
"find
/home/git/repositories/. -maxdepth 1 -not -name 'gitolite-admin.git' -not -name '.' | xargs sudo
rm -rf"
;
break
;;
[
Yy]
*
)
sh
-c
"find
$home_dir
/repositories/. -maxdepth 1 -not -name 'gitolite-admin.git' -not -name '.' | xargs
rm -rf"
;
break
;;
[
Nn]
*
)
exit
;;
*
)
echo
"Please answer yes or no."
;;
esac
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment