2018-11-18 11:00:15 +05:30
|
|
|
# Integrity Check Rake Task
|
2017-08-17 22:00:37 +05:30
|
|
|
|
|
|
|
## Repository Integrity
|
|
|
|
|
|
|
|
Even though Git is very resilient and tries to prevent data integrity issues,
|
|
|
|
there are times when things go wrong. The following Rake tasks intend to
|
|
|
|
help GitLab administrators diagnose problem repositories so they can be fixed.
|
|
|
|
|
|
|
|
There are 3 things that are checked to determine integrity.
|
|
|
|
|
2019-12-21 20:55:43 +05:30
|
|
|
1. Git repository file system check ([`git fsck`](https://git-scm.com/docs/git-fsck)).
|
2017-08-17 22:00:37 +05:30
|
|
|
This step verifies the connectivity and validity of objects in the repository.
|
|
|
|
1. Check for `config.lock` in the repository directory.
|
|
|
|
1. Check for any branch/references lock files in `refs/heads`.
|
|
|
|
|
|
|
|
It's important to note that the existence of `config.lock` or reference locks
|
|
|
|
alone do not necessarily indicate a problem. Lock files are routinely created
|
|
|
|
and removed as Git and GitLab perform operations on the repository. They serve
|
|
|
|
to prevent data integrity issues. However, if a Git operation is interrupted these
|
|
|
|
locks may not be cleaned up properly.
|
|
|
|
|
|
|
|
The following symptoms may indicate a problem with repository integrity. If users
|
2020-04-22 19:07:51 +05:30
|
|
|
experience these symptoms you may use the Rake tasks described below to determine
|
2017-08-17 22:00:37 +05:30
|
|
|
exactly which repositories are causing the trouble.
|
|
|
|
|
|
|
|
- Receiving an error when trying to push code - `remote: error: cannot lock ref`
|
|
|
|
- A 500 error when viewing the GitLab dashboard or when accessing a specific project.
|
|
|
|
|
|
|
|
### Check all GitLab repositories
|
|
|
|
|
|
|
|
This task loops through all repositories on the GitLab server and runs the
|
2018-11-18 11:00:15 +05:30
|
|
|
integrity check described previously.
|
2017-08-17 22:00:37 +05:30
|
|
|
|
|
|
|
**Omnibus Installation**
|
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
```shell
|
2018-03-17 18:26:18 +05:30
|
|
|
sudo gitlab-rake gitlab:git:fsck
|
2017-08-17 22:00:37 +05:30
|
|
|
```
|
|
|
|
|
|
|
|
**Source Installation**
|
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
```shell
|
2018-03-17 18:26:18 +05:30
|
|
|
sudo -u git -H bundle exec rake gitlab:git:fsck RAILS_ENV=production
|
2017-08-17 22:00:37 +05:30
|
|
|
```
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
## Uploaded Files Integrity
|
|
|
|
|
2018-11-08 19:23:39 +05:30
|
|
|
Various types of files can be uploaded to a GitLab installation by users.
|
|
|
|
These integrity checks can detect missing files. Additionally, for locally
|
|
|
|
stored files, checksums are generated and stored in the database upon upload,
|
|
|
|
and these checks will verify them against current files.
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2018-03-27 19:54:05 +05:30
|
|
|
Currently, integrity checks are supported for the following types of file:
|
|
|
|
|
2019-03-02 22:35:43 +05:30
|
|
|
- CI artifacts (Available from version 10.7.0)
|
|
|
|
- LFS objects (Available from version 10.6.0)
|
|
|
|
- User uploads (Available from version 10.6.0)
|
2018-03-17 18:26:18 +05:30
|
|
|
|
|
|
|
**Omnibus Installation**
|
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
```shell
|
2018-05-09 12:01:36 +05:30
|
|
|
sudo gitlab-rake gitlab:artifacts:check
|
2018-03-27 19:54:05 +05:30
|
|
|
sudo gitlab-rake gitlab:lfs:check
|
2018-03-17 18:26:18 +05:30
|
|
|
sudo gitlab-rake gitlab:uploads:check
|
|
|
|
```
|
|
|
|
|
|
|
|
**Source Installation**
|
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
```shell
|
2018-05-09 12:01:36 +05:30
|
|
|
sudo -u git -H bundle exec rake gitlab:artifacts:check RAILS_ENV=production
|
2018-03-27 19:54:05 +05:30
|
|
|
sudo -u git -H bundle exec rake gitlab:lfs:check RAILS_ENV=production
|
2018-03-17 18:26:18 +05:30
|
|
|
sudo -u git -H bundle exec rake gitlab:uploads:check RAILS_ENV=production
|
|
|
|
```
|
|
|
|
|
2018-03-27 19:54:05 +05:30
|
|
|
These tasks also accept some environment variables which you can use to override
|
2018-03-17 18:26:18 +05:30
|
|
|
certain values:
|
|
|
|
|
2018-03-27 19:54:05 +05:30
|
|
|
Variable | Type | Description
|
|
|
|
--------- | ------- | -----------
|
|
|
|
`BATCH` | integer | Specifies the size of the batch. Defaults to 200.
|
|
|
|
`ID_FROM` | integer | Specifies the ID to start from, inclusive of the value.
|
|
|
|
`ID_TO` | integer | Specifies the ID value to end at, inclusive of the value.
|
|
|
|
`VERBOSE` | boolean | Causes failures to be listed individually, rather than being summarized.
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
```shell
|
2018-05-09 12:01:36 +05:30
|
|
|
sudo gitlab-rake gitlab:artifacts:check BATCH=100 ID_FROM=50 ID_TO=250
|
2018-03-27 19:54:05 +05:30
|
|
|
sudo gitlab-rake gitlab:lfs:check BATCH=100 ID_FROM=50 ID_TO=250
|
2018-03-17 18:26:18 +05:30
|
|
|
sudo gitlab-rake gitlab:uploads:check BATCH=100 ID_FROM=50 ID_TO=250
|
|
|
|
```
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
Example output:
|
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
```shell
|
2018-11-18 11:00:15 +05:30
|
|
|
$ sudo gitlab-rake gitlab:uploads:check
|
|
|
|
Checking integrity of Uploads
|
|
|
|
- 1..1350: Failures: 0
|
|
|
|
- 1351..2743: Failures: 0
|
|
|
|
- 2745..4349: Failures: 2
|
|
|
|
- 4357..5762: Failures: 1
|
|
|
|
- 5764..7140: Failures: 2
|
|
|
|
- 7142..8651: Failures: 0
|
|
|
|
- 8653..10134: Failures: 0
|
|
|
|
- 10135..11773: Failures: 0
|
|
|
|
- 11777..13315: Failures: 0
|
|
|
|
Done!
|
|
|
|
```
|
|
|
|
|
|
|
|
Example verbose output:
|
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
```shell
|
2018-11-18 11:00:15 +05:30
|
|
|
$ sudo gitlab-rake gitlab:uploads:check VERBOSE=1
|
|
|
|
Checking integrity of Uploads
|
|
|
|
- 1..1350: Failures: 0
|
|
|
|
- 1351..2743: Failures: 0
|
|
|
|
- 2745..4349: Failures: 2
|
|
|
|
- Upload: 3573: #<Errno::ENOENT: No such file or directory @ rb_sysopen - /opt/gitlab/embedded/service/gitlab-rails/public/uploads/user-foo/project-bar/7a77cc52947bfe188adeff42f890bb77/image.png>
|
|
|
|
- Upload: 3580: #<Errno::ENOENT: No such file or directory @ rb_sysopen - /opt/gitlab/embedded/service/gitlab-rails/public/uploads/user-foo/project-bar/2840ba1ba3b2ecfa3478a7b161375f8a/pug.png>
|
|
|
|
- 4357..5762: Failures: 1
|
|
|
|
- Upload: 4636: #<Google::Apis::ServerError: Server error>
|
|
|
|
- 5764..7140: Failures: 2
|
|
|
|
- Upload: 5812: #<NoMethodError: undefined method `hashed_storage?' for nil:NilClass>
|
|
|
|
- Upload: 5837: #<NoMethodError: undefined method `hashed_storage?' for nil:NilClass>
|
|
|
|
- 7142..8651: Failures: 0
|
|
|
|
- 8653..10134: Failures: 0
|
|
|
|
- 10135..11773: Failures: 0
|
|
|
|
- 11777..13315: Failures: 0
|
|
|
|
Done!
|
|
|
|
```
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
## LDAP Check
|
|
|
|
|
2020-04-22 19:07:51 +05:30
|
|
|
The LDAP check Rake task will test the bind DN and password credentials
|
2017-08-17 22:00:37 +05:30
|
|
|
(if configured) and will list a sample of LDAP users. This task is also
|
|
|
|
executed as part of the `gitlab:check` task, but can run independently.
|
|
|
|
See [LDAP Rake Tasks - LDAP Check](ldap.md#check) for details.
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
[git-fsck]: https://git-scm.com/docs/git-fsck
|