Files
gitlab-foss/lib/gitlab/import_export/command_line_util.rb
2025-07-31 18:08:00 +00:00

159 lines
5.1 KiB
Ruby

# frozen_string_literal: true
module Gitlab
module ImportExport
module CommandLineUtil
UNTAR_MASK = 'u+rwX,go+rX,go-w'
DEFAULT_DIR_MODE = 0700
CLEAN_DIR_IGNORE_FILE_NAMES = %w[. ..].freeze
CommandLineUtilError = Class.new(StandardError)
FileOversizedError = Class.new(CommandLineUtilError)
HardLinkError = Class.new(CommandLineUtilError)
def tar_czf(archive:, dir:)
tar_with_options(archive: archive, dir: dir, options: 'czf')
end
def untar_zxf(archive:, dir:)
untar_with_options(archive: archive, dir: dir, options: 'zxf')
end
def tar_cf(archive:, dir:)
tar_with_options(archive: archive, dir: dir, options: 'cf')
end
def untar_xf(archive:, dir:)
untar_with_options(archive: archive, dir: dir, options: 'xf')
end
def gzip(dir:, filename:)
gzip_with_options(dir: dir, filename: filename)
end
def gunzip(dir:, filename:)
gzip_with_options(dir: dir, filename: filename, options: 'd')
end
def gzip_with_options(dir:, filename:, options: nil)
filepath = File.join(dir, filename)
cmd = %W[gzip #{filepath}]
cmd << "-#{options}" if options
output, status = Gitlab::Popen.popen(cmd)
return status if status == 0
message = cmd_error_message(output, status)
raise Gitlab::ImportExport::Error.file_compression_error(message)
end
def mkdir_p(path)
FileUtils.mkdir_p(path, mode: DEFAULT_DIR_MODE)
FileUtils.chmod(DEFAULT_DIR_MODE, path)
end
private
def download_or_copy_upload(uploader, upload_path, size_limit: 0)
if uploader.upload.local?
copy_files(uploader.path, upload_path)
else
download(uploader.url, upload_path, size_limit: size_limit)
end
end
def download(url, upload_path, size_limit: 0)
File.open(upload_path, 'wb') do |file|
current_size = 0
# When migrating from Gitlab::HTTP to Gitlab:HTTP_V2, we need to pass `extra_allowed_uris` as an option
# instead of `allow_object_storage`.
options = { stream_body: true, allow_object_storage: true, headers: { 'Accept-Encoding' => 'identity' } }
Gitlab::HTTP.get(url, options) do |fragment|
if [301, 302, 303, 307].include?(fragment.code)
::Import::Framework::Logger.warn(message: "received redirect fragment", fragment_code: fragment.code)
elsif fragment.code == 200
current_size += fragment.bytesize
raise FileOversizedError if size_limit > 0 && current_size > size_limit
file.write(fragment)
else
raise Gitlab::ImportExport::Error, "unsupported response downloading fragment #{fragment.code}"
end
end
end
rescue FileOversizedError
nil
end
def tar_with_options(archive:, dir:, options:)
execute_cmd(%W[tar -#{options} #{archive} -C #{dir} .])
end
def untar_with_options(archive:, dir:, options:)
execute_cmd(%W[tar -#{options} #{archive} -C #{dir}])
execute_cmd(%W[chmod -R #{UNTAR_MASK} #{dir}])
clean_extraction_dir!(dir)
end
# rubocop:disable Gitlab/ModuleWithInstanceVariables
def execute_cmd(cmd)
output, status = Gitlab::Popen.popen(cmd)
return true if status == 0
message = cmd_error_message(output, status)
if @shared.respond_to?(:error)
@shared.error(Gitlab::ImportExport::Error.new(message))
false
else
raise Gitlab::ImportExport::Error, message
end
end
# rubocop:enable Gitlab/ModuleWithInstanceVariables
def copy_files(source, destination)
# if we are copying files, create the destination folder
destination_folder = File.file?(source) ? File.dirname(destination) : destination
mkdir_p(destination_folder)
FileUtils.copy_entry(source, destination)
true
end
# Scans and cleans the directory tree.
# Symlinks are considered legal but are removed.
# Files sharing hard links are considered illegal and the directory will be removed
# and a `HardLinkError` exception will be raised.
#
# @raise [HardLinkError] if there multiple hard links to the same file detected.
# @return [Boolean] true
def clean_extraction_dir!(dir)
# Using File::FNM_DOTMATCH to also delete symlinks starting with "."
Dir.glob("#{dir}/**/*", File::FNM_DOTMATCH).each do |filepath|
next if CLEAN_DIR_IGNORE_FILE_NAMES.include?(File.basename(filepath))
raise HardLinkError, 'File shares hard link' if Gitlab::Utils::FileInfo.shares_hard_link?(filepath)
FileUtils.rm(filepath) if Gitlab::Utils::FileInfo.linked?(filepath) || File.pipe?(filepath)
end
true
rescue HardLinkError
FileUtils.remove_dir(dir)
raise
end
def cmd_error_message(output, status)
message = "Command exited with error code #{status}"
message << ": #{output.strip}" unless output.blank?
message
end
end
end
end