Commit bb884125 authored by Dmitriy Zaporozhets's avatar Dmitriy Zaporozhets

Merge branch 'git-annex' into 'master'

Git annex support

- [x] fix auth for git-annex
- [x] enable git-annex for repository on first annex call
- [x] config option to disable it
- [x] write tests

See merge request !55
parents f61186ba 6c12bf39
v2.5.0
- Support git-annex tool
v2.4.3 v2.4.3
- Print broadcast message if one is available - Print broadcast message if one is available
......
...@@ -46,3 +46,8 @@ log_level: INFO ...@@ -46,3 +46,8 @@ log_level: INFO
# Set to true to see real usernames in the logs instead of key ids, which is easier to follow, but # Set to true to see real usernames in the logs instead of key ids, which is easier to follow, but
# incurs an extra API call on every gitlab-shell command. # incurs an extra API call on every gitlab-shell command.
audit_usernames: false audit_usernames: false
# Enable git-annex support
# git-annex allows managing files with git, without checking the file contents into git
# See https://git-annex.branchable.com/ for documentation
git_annex_enabled: true
...@@ -47,6 +47,10 @@ class GitlabConfig ...@@ -47,6 +47,10 @@ class GitlabConfig
@config['audit_usernames'] ||= false @config['audit_usernames'] ||= false
end end
def git_annex_enabled?
@config['git_annex_enabled'] ||= true
end
# Build redis command to write update event in gitlab queue # Build redis command to write update event in gitlab queue
def redis_command def redis_command
if redis.empty? if redis.empty?
......
...@@ -22,6 +22,7 @@ class GitlabShell ...@@ -22,6 +22,7 @@ class GitlabShell
ENV['GL_ID'] = @key_id ENV['GL_ID'] = @key_id
access = api.check_access(@git_cmd, @repo_name, @key_id, '_any') access = api.check_access(@git_cmd, @repo_name, @key_id, '_any')
if access.allowed? if access.allowed?
process_cmd process_cmd
else else
...@@ -47,20 +48,46 @@ class GitlabShell ...@@ -47,20 +48,46 @@ class GitlabShell
def parse_cmd def parse_cmd
args = Shellwords.shellwords(@origin_cmd) args = Shellwords.shellwords(@origin_cmd)
@git_cmd = args.first
if @git_cmd == 'git-annex-shell' && @config.git_annex_enabled?
@repo_name = escape_path(args[2].gsub("\/~\/", ''))
# Make sure repository has git-annex enabled
init_git_annex(@repo_name)
else
raise DisallowedCommandError unless args.count == 2 raise DisallowedCommandError unless args.count == 2
@git_cmd = args[0] @repo_name = escape_path(args.last)
@repo_name = escape_path(args[1]) end
end end
def git_cmds def git_cmds
%w(git-upload-pack git-receive-pack git-upload-archive) %w(git-upload-pack git-receive-pack git-upload-archive git-annex-shell)
end end
def process_cmd def process_cmd
repo_full_path = File.join(repos_path, repo_name) repo_full_path = File.join(repos_path, repo_name)
if @git_cmd == 'git-annex-shell' && @config.git_annex_enabled?
args = Shellwords.shellwords(@origin_cmd)
parsed_args =
args.map do |arg|
# Convert /~/group/project.git to group/project.git
# to make git annex path compatible with gitlab-shell
if arg =~ /\A\/~\/.*\.git\Z/
repo_full_path
else
arg
end
end
$logger.info "gitlab-shell: executing git-annex command <#{parsed_args.join(' ')}> for #{log_username}."
exec_cmd(*parsed_args)
else
$logger.info "gitlab-shell: executing git command <#{@git_cmd} #{repo_full_path}> for #{log_username}." $logger.info "gitlab-shell: executing git command <#{@git_cmd} #{repo_full_path}> for #{log_username}."
exec_cmd(@git_cmd, repo_full_path) exec_cmd(@git_cmd, repo_full_path)
end end
end
# This method is not covered by Rspec because it ends the current Ruby process. # This method is not covered by Rspec because it ends the current Ruby process.
def exec_cmd(*args) def exec_cmd(*args)
...@@ -99,4 +126,14 @@ class GitlabShell ...@@ -99,4 +126,14 @@ class GitlabShell
abort "Wrong repository path" abort "Wrong repository path"
end end
end end
def init_git_annex(path)
full_repo_path = File.join(repos_path, path)
unless File.exists?(File.join(full_repo_path, '.git', 'annex'))
cmd = %W(git --git-dir=#{full_repo_path} annex init "GitLab")
system(*cmd)
$logger.info "Enable git-annex for repository: #{path}."
end
end
end end
...@@ -3,6 +3,14 @@ require_relative '../lib/gitlab_shell' ...@@ -3,6 +3,14 @@ require_relative '../lib/gitlab_shell'
require_relative '../lib/gitlab_access_status' require_relative '../lib/gitlab_access_status'
describe GitlabShell do describe GitlabShell do
before do
FileUtils.mkdir_p(tmp_repos_path)
end
after do
FileUtils.rm_rf(tmp_repos_path)
end
subject do subject do
ARGV[0] = key_id ARGV[0] = key_id
GitlabShell.new.tap do |shell| GitlabShell.new.tap do |shell|
...@@ -10,26 +18,30 @@ describe GitlabShell do ...@@ -10,26 +18,30 @@ describe GitlabShell do
shell.stub(api: api) shell.stub(api: api)
end end
end end
let(:api) do let(:api) do
double(GitlabNet).tap do |api| double(GitlabNet).tap do |api|
api.stub(discover: { 'name' => 'John Doe' }) api.stub(discover: { 'name' => 'John Doe' })
api.stub(check_access: GitAccessStatus.new(true)) api.stub(check_access: GitAccessStatus.new(true))
end end
end end
let(:key_id) { "key-#{rand(100) + 100}" } let(:key_id) { "key-#{rand(100) + 100}" }
let(:repository_path) { "/home/git#{rand(100)}/repos" } let(:tmp_repos_path) { File.join(ROOT_PATH, 'tmp', 'repositories') }
before do before do
GitlabConfig.any_instance.stub(repos_path: repository_path, audit_usernames: false) GitlabConfig.any_instance.stub(repos_path: tmp_repos_path, audit_usernames: false)
end end
describe :initialize do describe :initialize do
before { ssh_cmd 'git-receive-pack' } before { ssh_cmd 'git-receive-pack' }
its(:key_id) { should == key_id } its(:key_id) { should == key_id }
its(:repos_path) { should == repository_path } its(:repos_path) { should == tmp_repos_path }
end end
describe :parse_cmd do describe :parse_cmd do
describe 'git' do
context 'w/o namespace' do context 'w/o namespace' do
before do before do
ssh_cmd 'git-upload-pack gitlab-ci.git' ssh_cmd 'git-upload-pack gitlab-ci.git'
...@@ -59,6 +71,28 @@ describe GitlabShell do ...@@ -59,6 +71,28 @@ describe GitlabShell do
end end
end end
describe 'git-annex' do
let(:repo_path) { File.join(tmp_repos_path, 'dzaporozhets/gitlab.git') }
before do
# Create existing project
FileUtils.mkdir_p(repo_path)
cmd = %W(git --git-dir=#{repo_path} init --bare)
system(*cmd)
ssh_cmd 'git-annex-shell inannex /~/dzaporozhets/gitlab.git SHA256E'
subject.send :parse_cmd
end
its(:repo_name) { should == 'dzaporozhets/gitlab.git' }
its(:git_cmd) { should == 'git-annex-shell' }
it 'should init git-annex' do
File.exists?(File.join(tmp_repos_path, 'dzaporozhets/gitlab.git/annex')).should be_true
end
end
end
describe :exec do describe :exec do
context 'git-upload-pack' do context 'git-upload-pack' do
before { ssh_cmd 'git-upload-pack gitlab-ci.git' } before { ssh_cmd 'git-upload-pack gitlab-ci.git' }
...@@ -69,7 +103,7 @@ describe GitlabShell do ...@@ -69,7 +103,7 @@ describe GitlabShell do
end end
it "should execute the command" do it "should execute the command" do
subject.should_receive(:exec_cmd).with("git-upload-pack", File.join(repository_path, 'gitlab-ci.git')) subject.should_receive(:exec_cmd).with("git-upload-pack", File.join(tmp_repos_path, 'gitlab-ci.git'))
end end
it "should set the GL_ID environment variable" do it "should set the GL_ID environment variable" do
...@@ -78,7 +112,7 @@ describe GitlabShell do ...@@ -78,7 +112,7 @@ describe GitlabShell do
it "should log the command execution" do it "should log the command execution" do
message = "gitlab-shell: executing git command " message = "gitlab-shell: executing git command "
message << "<git-upload-pack #{File.join(repository_path, 'gitlab-ci.git')}> " message << "<git-upload-pack #{File.join(tmp_repos_path, 'gitlab-ci.git')}> "
message << "for user with key #{key_id}." message << "for user with key #{key_id}."
$logger.should_receive(:info).with(message) $logger.should_receive(:info).with(message)
end end
...@@ -98,12 +132,12 @@ describe GitlabShell do ...@@ -98,12 +132,12 @@ describe GitlabShell do
end end
it "should execute the command" do it "should execute the command" do
subject.should_receive(:exec_cmd).with("git-receive-pack", File.join(repository_path, 'gitlab-ci.git')) subject.should_receive(:exec_cmd).with("git-receive-pack", File.join(tmp_repos_path, 'gitlab-ci.git'))
end end
it "should log the command execution" do it "should log the command execution" do
message = "gitlab-shell: executing git command " message = "gitlab-shell: executing git command "
message << "<git-receive-pack #{File.join(repository_path, 'gitlab-ci.git')}> " message << "<git-receive-pack #{File.join(tmp_repos_path, 'gitlab-ci.git')}> "
message << "for user with key #{key_id}." message << "for user with key #{key_id}."
$logger.should_receive(:info).with(message) $logger.should_receive(:info).with(message)
end end
...@@ -151,6 +185,15 @@ describe GitlabShell do ...@@ -151,6 +185,15 @@ describe GitlabShell do
subject.should_not_receive(:exec_cmd) subject.should_not_receive(:exec_cmd)
end end
end end
describe 'git-annex' do
before { ssh_cmd 'git-annex-shell commit /~/gitlab-ci.git SHA256' }
after { subject.exec }
it "should execute the command" do
subject.should_receive(:exec_cmd).with("git-annex-shell", "commit", File.join(tmp_repos_path, 'gitlab-ci.git'), "SHA256")
end
end
end end
describe :validate_access do describe :validate_access do
...@@ -198,5 +241,4 @@ describe GitlabShell do ...@@ -198,5 +241,4 @@ describe GitlabShell do
def ssh_cmd(cmd) def ssh_cmd(cmd)
ENV['SSH_ORIGINAL_COMMAND'] = cmd ENV['SSH_ORIGINAL_COMMAND'] = cmd
end end
end end
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment