Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Boxiang Sun
gitlab-ce
Commits
edb9db37
Commit
edb9db37
authored
Jun 01, 2018
by
Jacob Vosmaer (GitLab)
Committed by
Douwe Maan
Jun 01, 2018
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Add "deny disk access" Gitaly feature (tripswitch)
parent
cc5890f2
Changes
15
Show whitespace changes
Inline
Side-by-side
Showing
15 changed files
with
226 additions
and
68 deletions
+226
-68
config/initializers/1_settings.rb
config/initializers/1_settings.rb
+4
-2
config/initializers/6_validations.rb
config/initializers/6_validations.rb
+6
-4
lib/gitlab/cycle_analytics/summary/commit.rb
lib/gitlab/cycle_analytics/summary/commit.rb
+3
-1
lib/gitlab/git/repository.rb
lib/gitlab/git/repository.rb
+12
-10
lib/gitlab/git/storage/checker.rb
lib/gitlab/git/storage/checker.rb
+1
-1
lib/gitlab/git/storage/circuit_breaker.rb
lib/gitlab/git/storage/circuit_breaker.rb
+8
-7
lib/gitlab/gitaly_client.rb
lib/gitlab/gitaly_client.rb
+6
-1
lib/gitlab/gitaly_client/storage_settings.rb
lib/gitlab/gitaly_client/storage_settings.rb
+25
-1
lib/gitlab/health_checks/fs_shards_check.rb
lib/gitlab/health_checks/fs_shards_check.rb
+3
-1
lib/gitlab/temporarily_allow.rb
lib/gitlab/temporarily_allow.rb
+42
-0
spec/lib/gitlab/background_migration/deserialize_merge_request_diffs_and_commits_spec.rb
...ation/deserialize_merge_request_diffs_and_commits_spec.rb
+10
-2
spec/lib/gitlab/checks/lfs_integrity_spec.rb
spec/lib/gitlab/checks/lfs_integrity_spec.rb
+3
-1
spec/lib/gitlab/conflict/file_spec.rb
spec/lib/gitlab/conflict/file_spec.rb
+1
-1
spec/lib/gitlab/git/repository_spec.rb
spec/lib/gitlab/git/repository_spec.rb
+98
-35
spec/support/gitaly.rb
spec/support/gitaly.rb
+4
-1
No files found.
config/initializers/1_settings.rb
View file @
edb9db37
...
...
@@ -391,8 +391,10 @@ repositories_storages = Settings.repositories.storages.values
repository_downloads_path
=
Settings
.
gitlab
[
'repository_downloads_path'
].
to_s
.
gsub
(
%r{/$}
,
''
)
repository_downloads_full_path
=
File
.
expand_path
(
repository_downloads_path
,
Settings
.
gitlab
[
'user_home'
])
if
repository_downloads_path
.
blank?
||
repositories_storages
.
any?
{
|
rs
|
[
repository_downloads_path
,
repository_downloads_full_path
].
include?
(
rs
.
legacy_disk_path
.
gsub
(
%r{/$}
,
''
))
}
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
if
repository_downloads_path
.
blank?
||
repositories_storages
.
any?
{
|
rs
|
[
repository_downloads_path
,
repository_downloads_full_path
].
include?
(
rs
.
legacy_disk_path
.
gsub
(
%r{/$}
,
''
))
}
Settings
.
gitlab
[
'repository_downloads_path'
]
=
File
.
join
(
Settings
.
shared
[
'path'
],
'cache/archive'
)
end
end
#
...
...
config/initializers/6_validations.rb
View file @
edb9db37
...
...
@@ -38,12 +38,14 @@ def validate_storages_config
end
def
validate_storages_paths
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
Gitlab
.
config
.
repositories
.
storages
.
each
do
|
name
,
repository_storage
|
parent_name
,
_parent_path
=
find_parent_path
(
name
,
repository_storage
.
legacy_disk_path
)
if
parent_name
storage_validation_error
(
"
#{
name
}
is a nested path of
#{
parent_name
}
. Nested paths are not supported for repository storages"
)
end
end
end
end
validate_storages_config
...
...
lib/gitlab/cycle_analytics/summary/commit.rb
View file @
edb9db37
...
...
@@ -7,8 +7,10 @@ module Gitlab
end
def
value
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
@value
||=
count_commits
end
end
private
...
...
lib/gitlab/git/repository.rb
View file @
edb9db37
...
...
@@ -1185,6 +1185,7 @@ module Gitlab
end
def
compare_source_branch
(
target_branch_name
,
source_repository
,
source_branch_name
,
straight
:)
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
with_repo_branch_commit
(
source_repository
,
source_branch_name
)
do
|
commit
|
break
unless
commit
...
...
@@ -1196,6 +1197,7 @@ module Gitlab
)
end
end
end
def
write_ref
(
ref_path
,
ref
,
old_ref:
nil
,
shell:
true
)
ref_path
=
"
#{
Gitlab
::
Git
::
BRANCH_REF_PREFIX
}#{
ref_path
}
"
unless
ref_path
.
start_with?
(
"refs/"
)
||
ref_path
==
"HEAD"
...
...
@@ -1455,7 +1457,7 @@ module Gitlab
gitaly_repository_client
.
cleanup
if
is_enabled
&&
exists?
end
rescue
Gitlab
::
Git
::
CommandError
=>
e
# Don't fail if we can't cleanup
Rails
.
logger
.
error
(
"Unable to clean repository on storage
#{
storage
}
with
path
#{
path
}
:
#{
e
.
message
}
"
)
Rails
.
logger
.
error
(
"Unable to clean repository on storage
#{
storage
}
with
relative path
#{
relative_
path
}
:
#{
e
.
message
}
"
)
Gitlab
::
Metrics
.
counter
(
:failed_repository_cleanup_total
,
'Number of failed repository cleanup events'
...
...
lib/gitlab/git/storage/checker.rb
View file @
edb9db37
...
...
@@ -35,7 +35,7 @@ module Gitlab
def
initialize
(
storage
,
logger
=
Rails
.
logger
)
@storage
=
storage
config
=
Gitlab
.
config
.
repositories
.
storages
[
@storage
]
@storage_path
=
config
.
legacy_disk_path
@storage_path
=
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
{
config
.
legacy_disk_path
}
@logger
=
logger
@hostname
=
Gitlab
::
Environment
.
hostname
...
...
lib/gitlab/git/storage/circuit_breaker.rb
View file @
edb9db37
...
...
@@ -22,7 +22,7 @@ module Gitlab
def
self
.
build
(
storage
,
hostname
=
Gitlab
::
Environment
.
hostname
)
config
=
Gitlab
.
config
.
repositories
.
storages
[
storage
]
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
if
!
config
.
present?
NullCircuitBreaker
.
new
(
storage
,
hostname
,
error:
Misconfiguration
.
new
(
"Storage '
#{
storage
}
' is not configured"
))
elsif
!
config
.
legacy_disk_path
.
present?
...
...
@@ -31,6 +31,7 @@ module Gitlab
new
(
storage
,
hostname
)
end
end
end
def
initialize
(
storage
,
hostname
)
@storage
=
storage
...
...
lib/gitlab/gitaly_client.rb
View file @
edb9db37
...
...
@@ -33,6 +33,11 @@ module Gitlab
MAXIMUM_GITALY_CALLS
=
35
CLIENT_NAME
=
(
Sidekiq
.
server?
?
'gitlab-sidekiq'
:
'gitlab-web'
).
freeze
# We have a mechanism to let GitLab automatically opt in to all Gitaly
# features. We want to be able to exclude some features from automatic
# opt-in. That is what EXPLICIT_OPT_IN_REQUIRED is for.
EXPLICIT_OPT_IN_REQUIRED
=
[
Gitlab
::
GitalyClient
::
StorageSettings
::
DISK_ACCESS_DENIED_FLAG
].
freeze
MUTEX
=
Mutex
.
new
class
<<
self
...
...
@@ -234,7 +239,7 @@ module Gitlab
when
MigrationStatus
::
OPT_OUT
true
when
MigrationStatus
::
OPT_IN
opt_into_all_features?
opt_into_all_features?
&&
!
EXPLICIT_OPT_IN_REQUIRED
.
include?
(
feature_name
)
else
false
end
...
...
lib/gitlab/gitaly_client/storage_settings.rb
View file @
edb9db37
...
...
@@ -4,6 +4,8 @@ module Gitlab
# where production code (app, config, db, lib) touches Git repositories
# directly.
class
StorageSettings
extend
Gitlab
::
TemporarilyAllow
DirectPathAccessError
=
Class
.
new
(
StandardError
)
InvalidConfigurationError
=
Class
.
new
(
StandardError
)
...
...
@@ -17,7 +19,21 @@ module Gitlab
# This class will give easily recognizable NoMethodErrors
Deprecated
=
Class
.
new
attr_reader
:legacy_disk_path
MUTEX
=
Mutex
.
new
DISK_ACCESS_DENIED_FLAG
=
:deny_disk_access
ALLOW_KEY
=
:allow_disk_access
# If your code needs this method then your code needs to be fixed.
def
self
.
allow_disk_access
temporarily_allow
(
ALLOW_KEY
)
{
yield
}
end
def
self
.
disk_access_denied?
!
temporarily_allowed?
(
ALLOW_KEY
)
&&
GitalyClient
.
feature_enabled?
(
DISK_ACCESS_DENIED_FLAG
)
rescue
false
# Err on the side of caution, don't break gitlab for people
end
def
initialize
(
storage
)
raise
InvalidConfigurationError
,
"expected a Hash, got a
#{
storage
.
class
.
name
}
"
unless
storage
.
is_a?
(
Hash
)
...
...
@@ -34,6 +50,14 @@ module Gitlab
@hash
.
fetch
(
:gitaly_address
)
end
def
legacy_disk_path
if
self
.
class
.
disk_access_denied?
raise
DirectPathAccessError
,
"git disk access denied via the gitaly_
#{
DISK_ACCESS_DENIED_FLAG
}
feature"
end
@legacy_disk_path
end
private
def
method_missing
(
m
,
*
args
,
&
block
)
...
...
lib/gitlab/health_checks/fs_shards_check.rb
View file @
edb9db37
...
...
@@ -77,8 +77,10 @@ module Gitlab
end
def
storage_path
(
storage_name
)
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
storages_paths
[
storage_name
]
&
.
legacy_disk_path
end
end
# All below test methods use shell commands to perform actions on storage volumes.
# In case a storage volume have connectivity problems causing pure Ruby IO operation to wait indefinitely,
...
...
lib/gitlab/temporarily_allow.rb
0 → 100644
View file @
edb9db37
module
Gitlab
module
TemporarilyAllow
TEMPORARILY_ALLOW_MUTEX
=
Mutex
.
new
def
temporarily_allow
(
key
)
temporarily_allow_add
(
key
,
1
)
yield
ensure
temporarily_allow_add
(
key
,
-
1
)
end
def
temporarily_allowed?
(
key
)
if
RequestStore
.
active?
temporarily_allow_request_store
[
key
]
>
0
else
TEMPORARILY_ALLOW_MUTEX
.
synchronize
do
temporarily_allow_ivar
[
key
]
>
0
end
end
end
private
def
temporarily_allow_ivar
@temporarily_allow
||=
Hash
.
new
(
0
)
end
def
temporarily_allow_request_store
RequestStore
[
:temporarily_allow
]
||=
Hash
.
new
(
0
)
end
def
temporarily_allow_add
(
key
,
value
)
if
RequestStore
.
active?
temporarily_allow_request_store
[
key
]
+=
value
else
TEMPORARILY_ALLOW_MUTEX
.
synchronize
do
temporarily_allow_ivar
[
key
]
+=
value
end
end
end
end
end
spec/lib/gitlab/background_migration/deserialize_merge_request_diffs_and_commits_spec.rb
View file @
edb9db37
...
...
@@ -299,7 +299,11 @@ describe Gitlab::BackgroundMigration::DeserializeMergeRequestDiffsAndCommits, :m
let
(
:commits
)
{
merge_request_diff
.
commits
.
map
(
&
:to_hash
)
}
let
(
:first_commit
)
{
project
.
repository
.
commit
(
merge_request_diff
.
head_commit_sha
)
}
let
(
:expected_commits
)
{
commits
}
let
(
:diffs
)
{
first_commit
.
rugged_diff_from_parent
.
patches
}
let
(
:diffs
)
do
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
first_commit
.
rugged_diff_from_parent
.
patches
end
end
let
(
:expected_diffs
)
{
[]
}
include_examples
'updated MR diff'
...
...
@@ -309,7 +313,11 @@ describe Gitlab::BackgroundMigration::DeserializeMergeRequestDiffsAndCommits, :m
let
(
:commits
)
{
merge_request_diff
.
commits
.
map
(
&
:to_hash
)
}
let
(
:first_commit
)
{
project
.
repository
.
commit
(
merge_request_diff
.
head_commit_sha
)
}
let
(
:expected_commits
)
{
commits
}
let
(
:diffs
)
{
first_commit
.
rugged_diff_from_parent
.
deltas
}
let
(
:diffs
)
do
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
first_commit
.
rugged_diff_from_parent
.
deltas
end
end
let
(
:expected_diffs
)
{
[]
}
include_examples
'updated MR diff'
...
...
spec/lib/gitlab/checks/lfs_integrity_spec.rb
View file @
edb9db37
...
...
@@ -6,7 +6,9 @@ describe Gitlab::Checks::LfsIntegrity do
let
(
:project
)
{
create
(
:project
,
:repository
)
}
let
(
:repository
)
{
project
.
repository
}
let
(
:newrev
)
do
operations
=
BareRepoOperations
.
new
(
repository
.
path
)
operations
=
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
BareRepoOperations
.
new
(
repository
.
path
)
end
# Create a commit not pointed at by any ref to emulate being in the
# pre-receive hook so that `--not --all` returns some objects
...
...
spec/lib/gitlab/conflict/file_spec.rb
View file @
edb9db37
...
...
@@ -3,7 +3,7 @@ require 'spec_helper'
describe
Gitlab
::
Conflict
::
File
do
let
(
:project
)
{
create
(
:project
,
:repository
)
}
let
(
:repository
)
{
project
.
repository
}
let
(
:rugged
)
{
repository
.
rugged
}
let
(
:rugged
)
{
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
{
repository
.
rugged
}
}
let
(
:their_commit
)
{
rugged
.
branches
[
'conflict-start'
].
target
}
let
(
:our_commit
)
{
rugged
.
branches
[
'conflict-resolvable'
].
target
}
let
(
:merge_request
)
{
create
(
:merge_request
,
source_branch:
'conflict-resolvable'
,
target_branch:
'conflict-start'
,
source_project:
project
)
}
...
...
spec/lib/gitlab/git/repository_spec.rb
View file @
edb9db37
...
...
@@ -114,7 +114,9 @@ describe Gitlab::Git::Repository, seed_helper: true do
it
'raises a no repository exception when there is no repo'
do
broken_repo
=
described_class
.
new
(
'default'
,
'a/path.git'
,
''
)
expect
{
broken_repo
.
rugged
}.
to
raise_error
(
Gitlab
::
Git
::
Repository
::
NoRepository
)
expect
do
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
{
broken_repo
.
rugged
}
end
.
to
raise_error
(
Gitlab
::
Git
::
Repository
::
NoRepository
)
end
describe
'alternates keyword argument'
do
...
...
@@ -124,9 +126,9 @@ describe Gitlab::Git::Repository, seed_helper: true do
end
it
"is passed an empty array"
do
expect
(
Rugged
::
Repository
).
to
receive
(
:new
).
with
(
repository
.
path
,
alternates:
[])
expect
(
Rugged
::
Repository
).
to
receive
(
:new
).
with
(
repository
_
path
,
alternates:
[])
repository
.
rugged
repository
_
rugged
end
end
...
...
@@ -142,10 +144,10 @@ describe Gitlab::Git::Repository, seed_helper: true do
end
it
"is passed the relative object dir envvars after being converted to absolute ones"
do
alternates
=
%w[foo bar baz]
.
map
{
|
d
|
File
.
join
(
repository
.
path
,
'./objects'
,
d
)
}
expect
(
Rugged
::
Repository
).
to
receive
(
:new
).
with
(
repository
.
path
,
alternates:
alternates
)
alternates
=
%w[foo bar baz]
.
map
{
|
d
|
File
.
join
(
repository
_
path
,
'./objects'
,
d
)
}
expect
(
Rugged
::
Repository
).
to
receive
(
:new
).
with
(
repository
_
path
,
alternates:
alternates
)
repository
.
rugged
repository
_
rugged
end
end
end
...
...
@@ -156,16 +158,22 @@ describe Gitlab::Git::Repository, seed_helper: true do
let
(
:feature
)
{
'feature'
}
let
(
:feature2
)
{
'feature2'
}
around
do
|
example
|
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
example
.
run
end
end
it
"returns 'master' when master exists"
do
expect
(
repository
).
to
receive
(
:branch_names
).
at_least
(
:once
).
and_return
([
feature
,
master
])
expect
(
repository
.
discover_default_branch
).
to
eq
(
'master'
)
end
it
"returns non-master when master exists but default branch is set to something else"
do
File
.
write
(
File
.
join
(
repository
.
path
,
'HEAD'
),
'ref: refs/heads/feature'
)
File
.
write
(
File
.
join
(
repository
_
path
,
'HEAD'
),
'ref: refs/heads/feature'
)
expect
(
repository
).
to
receive
(
:branch_names
).
at_least
(
:once
).
and_return
([
feature
,
master
])
expect
(
repository
.
discover_default_branch
).
to
eq
(
'feature'
)
File
.
write
(
File
.
join
(
repository
.
path
,
'HEAD'
),
'ref: refs/heads/master'
)
File
.
write
(
File
.
join
(
repository
_
path
,
'HEAD'
),
'ref: refs/heads/master'
)
end
it
"returns a non-master branch when only one exists"
do
...
...
@@ -364,6 +372,12 @@ describe Gitlab::Git::Repository, seed_helper: true do
end
context
'#submodules'
do
around
do
|
example
|
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
example
.
run
end
end
let
(
:repository
)
{
Gitlab
::
Git
::
Repository
.
new
(
'default'
,
TEST_REPO_PATH
,
''
)
}
context
'where repo has submodules'
do
...
...
@@ -474,8 +488,8 @@ describe Gitlab::Git::Repository, seed_helper: true do
# Sanity check
expect
(
repository
.
has_local_branches?
).
to
eq
(
true
)
FileUtils
.
rm_rf
(
File
.
join
(
repository
.
path
,
'packed-refs'
))
heads_dir
=
File
.
join
(
repository
.
path
,
'refs/heads'
)
FileUtils
.
rm_rf
(
File
.
join
(
repository
_
path
,
'packed-refs'
))
heads_dir
=
File
.
join
(
repository
_
path
,
'refs/heads'
)
FileUtils
.
rm_rf
(
heads_dir
)
FileUtils
.
mkdir_p
(
heads_dir
)
...
...
@@ -516,10 +530,10 @@ describe Gitlab::Git::Repository, seed_helper: true do
branch_name
=
"to-be-deleted-soon"
repository
.
create_branch
(
branch_name
)
expect
(
repository
.
rugged
.
branches
[
branch_name
]).
not_to
be_nil
expect
(
repository
_
rugged
.
branches
[
branch_name
]).
not_to
be_nil
repository
.
delete_branch
(
branch_name
)
expect
(
repository
.
rugged
.
branches
[
branch_name
]).
to
be_nil
expect
(
repository
_
rugged
.
branches
[
branch_name
]).
to
be_nil
end
context
"when branch does not exist"
do
...
...
@@ -577,6 +591,12 @@ describe Gitlab::Git::Repository, seed_helper: true do
shared_examples
'deleting refs'
do
let
(
:repo
)
{
Gitlab
::
Git
::
Repository
.
new
(
'default'
,
TEST_MUTABLE_REPO_PATH
,
''
)
}
def
repo_rugged
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
repo
.
rugged
end
end
after
do
ensure_seeds
end
...
...
@@ -584,7 +604,7 @@ describe Gitlab::Git::Repository, seed_helper: true do
it
'deletes the ref'
do
repo
.
delete_refs
(
'refs/heads/feature'
)
expect
(
repo
.
rugged
.
references
[
'refs/heads/feature'
]).
to
be_nil
expect
(
repo
_
rugged
.
references
[
'refs/heads/feature'
]).
to
be_nil
end
it
'deletes all refs'
do
...
...
@@ -592,7 +612,7 @@ describe Gitlab::Git::Repository, seed_helper: true do
repo
.
delete_refs
(
*
refs
)
refs
.
each
do
|
ref
|
expect
(
repo
.
rugged
.
references
[
ref
]).
to
be_nil
expect
(
repo
_
rugged
.
references
[
ref
]).
to
be_nil
end
end
...
...
@@ -615,7 +635,7 @@ describe Gitlab::Git::Repository, seed_helper: true do
end
describe
'#branch_names_contains_sha'
do
let
(
:head_id
)
{
repository
.
rugged
.
head
.
target
.
oid
}
let
(
:head_id
)
{
repository
_
rugged
.
head
.
target
.
oid
}
let
(
:new_branch
)
{
head_id
}
let
(
:utf8_branch
)
{
'branch-é'
}
...
...
@@ -699,7 +719,7 @@ describe Gitlab::Git::Repository, seed_helper: true do
it
'fetches a repository as a mirror remote'
do
subject
expect
(
refs
(
new_repository
.
path
)).
to
eq
(
refs
(
repository
.
path
))
expect
(
refs
(
new_repository
_path
)).
to
eq
(
refs
(
repository_
path
))
end
context
'with keep-around refs'
do
...
...
@@ -708,15 +728,15 @@ describe Gitlab::Git::Repository, seed_helper: true do
let
(
:tmp_ref
)
{
"refs/tmp/
#{
SecureRandom
.
hex
}
"
}
before
do
repository
.
rugged
.
references
.
create
(
keep_around_ref
,
sha
,
force:
true
)
repository
.
rugged
.
references
.
create
(
tmp_ref
,
sha
,
force:
true
)
repository
_
rugged
.
references
.
create
(
keep_around_ref
,
sha
,
force:
true
)
repository
_
rugged
.
references
.
create
(
tmp_ref
,
sha
,
force:
true
)
end
it
'includes the temporary and keep-around refs'
do
subject
expect
(
refs
(
new_repository
.
path
)).
to
include
(
keep_around_ref
)
expect
(
refs
(
new_repository
.
path
)).
to
include
(
tmp_ref
)
expect
(
refs
(
new_repository
_
path
)).
to
include
(
keep_around_ref
)
expect
(
refs
(
new_repository
_
path
)).
to
include
(
tmp_ref
)
end
end
end
...
...
@@ -728,6 +748,12 @@ describe Gitlab::Git::Repository, seed_helper: true do
context
'with gitaly enabled'
,
:skip_gitaly_mock
do
it_behaves_like
'repository mirror fecthing'
end
def
new_repository_path
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
new_repository
.
path
end
end
end
describe
'#remote_tags'
do
...
...
@@ -739,10 +765,17 @@ describe Gitlab::Git::Repository, seed_helper: true do
Gitlab
::
Git
::
Repository
.
new
(
'default'
,
TEST_MUTABLE_REPO_PATH
,
''
)
end
around
do
|
example
|
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
example
.
run
end
end
subject
{
repository
.
remote_tags
(
remote_name
)
}
before
do
repository
.
add_remote
(
remote_name
,
remote_repository
.
path
)
remote_repository_path
=
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
{
remote_repository
.
path
}
repository
.
add_remote
(
remote_name
,
remote_repository_path
)
remote_repository
.
add_tag
(
tag_name
,
user:
user
,
target:
target_commit_id
)
end
...
...
@@ -975,10 +1008,12 @@ describe Gitlab::Git::Repository, seed_helper: true do
let
(
:options
)
{
{
ref:
'master'
,
path:
[
'PROCESS.md'
,
'README.md'
]
}
}
def
commit_files
(
commit
)
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
commit
.
rugged_diff_from_parent
.
deltas
.
flat_map
do
|
delta
|
[
delta
.
old_file
[
:path
],
delta
.
new_file
[
:path
]].
uniq
.
compact
end
end
end
it
'only returns commits matching at least one path'
do
commits
=
repository
.
log
(
options
)
...
...
@@ -1019,6 +1054,12 @@ describe Gitlab::Git::Repository, seed_helper: true do
end
describe
"#rugged_commits_between"
do
around
do
|
example
|
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
example
.
run
end
end
context
'two SHAs'
do
let
(
:first_sha
)
{
'b0e52af38d7ea43cf41d8a6f2471351ac036d6c9'
}
let
(
:second_sha
)
{
'0e50ec4d3c7ce42ab74dda1d422cb2cbffe1e326'
}
...
...
@@ -1363,7 +1404,7 @@ describe Gitlab::Git::Repository, seed_helper: true do
allow
(
ref
).
to
receive
(
:target
)
{
raise
Rugged
::
ReferenceError
}
branches
=
double
()
allow
(
branches
).
to
receive
(
:each
)
{
[
ref
].
each
}
allow
(
repository
.
rugged
).
to
receive
(
:branches
)
{
branches
}
allow
(
repository
_
rugged
).
to
receive
(
:branches
)
{
branches
}
expect
(
subject
).
to
be_empty
end
...
...
@@ -1661,6 +1702,12 @@ describe Gitlab::Git::Repository, seed_helper: true do
describe
'#batch_existence'
do
let
(
:refs
)
{
[
'deadbeef'
,
SeedRepo
::
RubyBlob
::
ID
,
'909e6157199'
]
}
around
do
|
example
|
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
example
.
run
end
end
it
'returns existing refs back'
do
result
=
repository
.
batch_existence
(
refs
)
...
...
@@ -1840,7 +1887,7 @@ describe Gitlab::Git::Repository, seed_helper: true do
context
'when the branch exists'
do
context
'when the commit does not exist locally'
do
let
(
:source_branch
)
{
'new-branch-for-fetch-source-branch'
}
let
(
:source_rugged
)
{
source_repository
.
rugged
}
let
(
:source_rugged
)
{
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
{
source_repository
.
rugged
}
}
let
(
:new_oid
)
{
new_commit_edit_old_file
(
source_rugged
).
oid
}
before
do
...
...
@@ -1898,7 +1945,7 @@ describe Gitlab::Git::Repository, seed_helper: true do
it
"removes the branch from the repo"
do
repository
.
rm_branch
(
branch_name
,
user:
user
)
expect
(
repository
.
rugged
.
branches
[
branch_name
]).
to
be_nil
expect
(
repository
_
rugged
.
branches
[
branch_name
]).
to
be_nil
end
end
...
...
@@ -1930,7 +1977,7 @@ describe Gitlab::Git::Repository, seed_helper: true do
describe
'#write_config'
do
before
do
repository
.
rugged
.
config
[
"gitlab.fullpath"
]
=
repository
.
path
repository
_rugged
.
config
[
"gitlab.fullpath"
]
=
repository_
path
end
shared_examples
'writing repo config'
do
...
...
@@ -1938,7 +1985,7 @@ describe Gitlab::Git::Repository, seed_helper: true do
it
'writes it to disk'
do
repository
.
write_config
(
full_path:
"not-the/real-path.git"
)
config
=
File
.
read
(
File
.
join
(
repository
.
path
,
"config"
))
config
=
File
.
read
(
File
.
join
(
repository
_
path
,
"config"
))
expect
(
config
).
to
include
(
"[gitlab]"
)
expect
(
config
).
to
include
(
"fullpath = not-the/real-path.git"
)
...
...
@@ -1949,10 +1996,10 @@ describe Gitlab::Git::Repository, seed_helper: true do
it
'does not write it to disk'
do
repository
.
write_config
(
full_path:
""
)
config
=
File
.
read
(
File
.
join
(
repository
.
path
,
"config"
))
config
=
File
.
read
(
File
.
join
(
repository
_
path
,
"config"
))
expect
(
config
).
to
include
(
"[gitlab]"
)
expect
(
config
).
to
include
(
"fullpath =
#{
repository
.
path
}
"
)
expect
(
config
).
to
include
(
"fullpath =
#{
repository
_
path
}
"
)
end
end
end
...
...
@@ -2173,7 +2220,11 @@ describe Gitlab::Git::Repository, seed_helper: true do
describe
'#gitlab_projects'
do
subject
{
repository
.
gitlab_projects
}
it
{
expect
(
subject
.
shard_path
).
to
eq
(
storage_path
)
}
it
do
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
expect
(
subject
.
shard_path
).
to
eq
(
storage_path
)
end
end
it
{
expect
(
subject
.
repository_relative_path
).
to
eq
(
repository
.
relative_path
)
}
end
...
...
@@ -2189,7 +2240,7 @@ describe Gitlab::Git::Repository, seed_helper: true do
repository
.
bundle_to_disk
(
save_path
)
success
=
system
(
*
%W(
#{
Gitlab
.
config
.
git
.
bin_path
}
-C
#{
repository
.
path
}
bundle verify
#{
save_path
}
)
,
*
%W(
#{
Gitlab
.
config
.
git
.
bin_path
}
-C
#{
repository
_
path
}
bundle verify
#{
save_path
}
)
,
[
:out
,
:err
]
=>
'/dev/null'
)
expect
(
success
).
to
be
true
...
...
@@ -2231,7 +2282,7 @@ describe Gitlab::Git::Repository, seed_helper: true do
it
'creates a symlink to the global hooks dir'
do
imported_repo
.
create_from_bundle
(
bundle_path
)
hooks_path
=
File
.
join
(
imported_repo
.
path
,
'hooks'
)
hooks_path
=
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
{
File
.
join
(
imported_repo
.
path
,
'hooks'
)
}
expect
(
File
.
readlink
(
hooks_path
)).
to
eq
(
Gitlab
.
config
.
gitlab_shell
.
hooks_path
)
end
...
...
@@ -2360,7 +2411,7 @@ describe Gitlab::Git::Repository, seed_helper: true do
end
describe
'#clean_stale_repository_files'
do
let
(
:worktree_path
)
{
File
.
join
(
repository
.
path
,
'worktrees'
,
'delete-me'
)
}
let
(
:worktree_path
)
{
File
.
join
(
repository
_
path
,
'worktrees'
,
'delete-me'
)
}
it
'cleans up the files'
do
repository
.
with_worktree
(
worktree_path
,
'master'
,
env:
ENV
)
do
...
...
@@ -2507,7 +2558,7 @@ describe Gitlab::Git::Repository, seed_helper: true do
def
create_remote_branch
(
repository
,
remote_name
,
branch_name
,
source_branch_name
)
source_branch
=
repository
.
branches
.
find
{
|
branch
|
branch
.
name
==
source_branch_name
}
rugged
=
repository
.
rugged
rugged
=
repository
_
rugged
rugged
.
references
.
create
(
"refs/remotes/
#{
remote_name
}
/
#{
branch_name
}
"
,
source_branch
.
dereferenced_target
.
sha
)
end
...
...
@@ -2586,4 +2637,16 @@ describe Gitlab::Git::Repository, seed_helper: true do
line
.
split
(
"
\t
"
).
last
end
end
def
repository_rugged
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
repository
.
rugged
end
end
def
repository_path
Gitlab
::
GitalyClient
::
StorageSettings
.
allow_disk_access
do
repository
.
path
end
end
end
spec/support/gitaly.rb
View file @
edb9db37
...
...
@@ -7,7 +7,10 @@ RSpec.configure do |config|
next
if
example
.
metadata
[
:skip_gitaly_mock
]
# Use 'and_wrap_original' to make sure the arguments are valid
allow
(
Gitlab
::
GitalyClient
).
to
receive
(
:feature_enabled?
).
and_wrap_original
{
|
m
,
*
args
|
m
.
call
(
*
args
)
||
true
}
allow
(
Gitlab
::
GitalyClient
).
to
receive
(
:feature_enabled?
).
and_wrap_original
do
|
m
,
*
args
|
m
.
call
(
*
args
)
!
Gitlab
::
GitalyClient
::
EXPLICIT_OPT_IN_REQUIRED
.
include?
(
args
.
first
)
end
end
end
end
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment