debian-mirror-gitlab/config/settings.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

224 lines
6.4 KiB
Ruby
Raw Permalink Normal View History

2020-04-08 14:13:33 +05:30
# frozen_string_literal: true
2023-07-09 08:55:56 +05:30
require_relative '../lib/gitlab_settings'
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
file = ENV.fetch('GITLAB_CONFIG') { Rails.root.join('config/gitlab.yml') }
section = ENV.fetch('GITLAB_ENV') { Rails.env }
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
Settings = GitlabSettings.load(file, section) do
def gitlab_on_standard_port?
on_standard_port?(gitlab)
end
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
def build_ci_component_fqdn
custom_port = ":#{gitlab.port}" unless on_standard_port?(gitlab)
2023-04-23 21:23:45 +05:30
2023-07-09 08:55:56 +05:30
[
gitlab.host,
custom_port,
gitlab.relative_url_root,
'/'
].join('')
end
2023-04-23 21:23:45 +05:30
2023-07-09 08:55:56 +05:30
def host_without_www(url)
host(url).sub('www.', '')
end
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
def build_gitlab_ci_url
custom_port =
if on_standard_port?(gitlab)
nil
else
":#{gitlab.port}"
end
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
[
gitlab.protocol,
"://",
gitlab.host,
custom_port,
gitlab.relative_url_root
].join('')
end
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
def build_pages_url
base_url(pages).join('')
end
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
def build_gitlab_shell_ssh_path_prefix
user = "#{gitlab_shell.ssh_user}@" unless gitlab_shell.ssh_user.empty?
user_host = "#{user}#{gitlab_shell.ssh_host}"
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
if gitlab_shell.ssh_port != 22
"ssh://#{user_host}:#{gitlab_shell.ssh_port}/"
elsif gitlab_shell.ssh_host.include? ':'
"[#{user_host}]:"
else
"#{user_host}:"
2018-10-15 14:42:47 +05:30
end
2023-07-09 08:55:56 +05:30
end
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
def build_base_gitlab_url
base_url(gitlab).join('')
end
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
def build_gitlab_url
(base_url(gitlab) + [gitlab.relative_url_root]).join('')
end
2020-06-23 00:09:42 +05:30
2023-07-09 08:55:56 +05:30
def build_gitlab_go_url
# "Go package paths are not URLs, and do not include port numbers"
# https://github.com/golang/go/issues/38213#issuecomment-607851460
"#{gitlab.host}#{gitlab.relative_url_root}"
end
2019-09-30 21:07:59 +05:30
2023-07-09 08:55:56 +05:30
def kerberos_protocol
kerberos.https ? "https" : "http"
end
2019-09-30 21:07:59 +05:30
2023-07-09 08:55:56 +05:30
def kerberos_port
kerberos.use_dedicated_port ? kerberos.port : gitlab.port
end
2019-09-30 21:07:59 +05:30
2023-07-09 08:55:56 +05:30
# Curl expects username/password for authentication. However when using GSS-Negotiate not credentials should be needed.
# By inserting in the Kerberos dedicated URL ":@", we give to curl an empty username and password and GSS auth goes ahead
# Known bug reported in http://sourceforge.net/p/curl/bugs/440/ and http://curl.haxx.se/docs/knownbugs.html
def build_gitlab_kerberos_url
[
kerberos_protocol,
"://:@",
gitlab.host,
":#{kerberos_port}",
gitlab.relative_url_root
].join('')
end
2019-09-30 21:07:59 +05:30
2023-07-09 08:55:56 +05:30
def alternative_gitlab_kerberos_url?
kerberos.enabled && (build_gitlab_kerberos_url != build_gitlab_url)
end
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
# check that values in `current` (string or integer) is a contant in `modul`.
def verify_constant_array(modul, current, default)
values = default || []
unless current.nil?
values = []
current.each do |constant|
values.push(verify_constant(modul, constant, nil))
end
values.delete_if { |value| value.nil? }
2018-10-15 14:42:47 +05:30
end
2023-07-09 08:55:56 +05:30
values
end
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
# check that `current` (string or integer) is a contant in `modul`.
def verify_constant(modul, current, default)
constant = modul.constants.find { |name| modul.const_get(name, false) == current }
value = constant.nil? ? default : modul.const_get(constant, false)
if current.is_a? String
value = begin
modul.const_get(current.upcase, false)
rescue StandardError
default
end
2018-10-15 14:42:47 +05:30
end
2023-07-09 08:55:56 +05:30
value
end
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
def absolute(path)
File.expand_path(path, Rails.root)
end
2018-11-08 19:23:39 +05:30
2023-07-09 08:55:56 +05:30
# Don't use this in new code, use attr_encrypted_db_key_base_32 instead!
def attr_encrypted_db_key_base_truncated
Gitlab::Application.secrets.db_key_base[0..31]
end
2019-02-15 15:39:39 +05:30
2023-07-09 08:55:56 +05:30
# Ruby 2.4+ requires passing in the exact required length for OpenSSL keys
# (https://github.com/ruby/ruby/commit/ce635262f53b760284d56bb1027baebaaec175d1).
# Previous versions quietly truncated the input.
#
# Makes sure the key is exactly 32 bytes long, either by
# truncating or right-padding it with ASCII 0s. Use this when
# using :per_attribute_iv mode for attr_encrypted.
def attr_encrypted_db_key_base_32
Gitlab::Utils.ensure_utf8_size(attr_encrypted_db_key_base, bytes: 32.bytes)
end
2019-02-15 15:39:39 +05:30
2023-07-09 08:55:56 +05:30
def attr_encrypted_db_key_base_12
Gitlab::Utils.ensure_utf8_size(attr_encrypted_db_key_base, bytes: 12.bytes)
end
2018-11-08 19:23:39 +05:30
2023-07-09 08:55:56 +05:30
# This should be used for :per_attribute_salt_and_iv mode. There is no
# need to truncate the key because the encryptor will use the salt to
# generate a hash of the password:
# https://github.com/attr-encrypted/encryptor/blob/c3a62c4a9e74686dd95e0548f9dc2a361fdc95d1/lib/encryptor.rb#L77
def attr_encrypted_db_key_base
Gitlab::Application.secrets.db_key_base
end
2021-02-22 17:27:13 +05:30
2023-07-09 08:55:56 +05:30
def encrypted(path)
Gitlab::EncryptedConfiguration.new(
content_path: path,
base_key: Gitlab::Application.secrets.encrypted_settings_key_base,
previous_keys: Gitlab::Application.secrets.rotated_encrypted_settings_key_base || []
)
end
2020-04-08 14:13:33 +05:30
2023-07-09 08:55:56 +05:30
def load_dynamic_cron_schedules!
cron_jobs['gitlab_service_ping_worker']['cron'] ||= cron_for_service_ping
end
2023-05-27 22:25:52 +05:30
2023-07-09 08:55:56 +05:30
# Route all jobs to 'default' queue. This setting is meant for self-managed instances use to keep things simple.
# See https://gitlab.com/gitlab-com/gl-infra/scalability/-/issues/1491
def build_sidekiq_routing_rules(rules)
return rules unless rules.nil? || rules&.empty?
2023-05-27 22:25:52 +05:30
2023-07-09 08:55:56 +05:30
[[Gitlab::SidekiqConfig::WorkerMatcher::WILDCARD_MATCH, 'default']]
end
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
private
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
def base_url(config)
custom_port = on_standard_port?(config) ? nil : ":#{config.port}"
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
[
config.protocol,
"://",
config.host,
custom_port
]
end
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
def on_standard_port?(config)
config.port.to_i == (config.https ? 443 : 80)
end
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
# Extract the host part of the given +url+.
def host(url)
url = url.downcase
url = "http://#{url}" unless url.start_with?('http')
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
# Get rid of the path so that we don't even have to encode it
url_without_path = url.sub(%r{(https?://[^/]+)/?.*}, '\1')
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
URI.parse(url_without_path).host
end
2020-07-28 23:09:34 +05:30
2023-07-09 08:55:56 +05:30
# Runs at a consistent random time of day on a day of the week based on
# the instance UUID. This is to balance the load on the service receiving
# these pings. The sidekiq job handles temporary http failures.
def cron_for_service_ping
# Set a default UUID for the case when the UUID hasn't been initialized.
uuid = Gitlab::CurrentSettings.uuid || 'uuid-not-set'
2018-10-15 14:42:47 +05:30
2023-07-09 08:55:56 +05:30
minute = Digest::SHA256.hexdigest(uuid + 'minute').to_i(16) % 60
hour = Digest::SHA256.hexdigest(uuid + 'hour').to_i(16) % 24
day_of_week = Digest::SHA256.hexdigest(uuid).to_i(16) % 7
"#{minute} #{hour} * * #{day_of_week}"
2018-10-15 14:42:47 +05:30
end
end