2018-11-20 20:47:30 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
require 'set'
|
|
|
|
|
2014-09-02 18:07:02 +05:30
|
|
|
namespace :gitlab do
|
|
|
|
namespace :cleanup do
|
2015-09-11 14:41:01 +05:30
|
|
|
desc "GitLab | Cleanup | Clean namespaces"
|
2018-03-17 18:26:18 +05:30
|
|
|
task dirs: :gitlab_environment do
|
2018-11-20 20:47:30 +05:30
|
|
|
namespaces = Set.new(Namespace.pluck(:path))
|
2019-02-15 15:39:39 +05:30
|
|
|
namespaces << Storage::HashedProject::REPOSITORY_PATH_PREFIX
|
2014-09-02 18:07:02 +05:30
|
|
|
|
2018-11-20 20:47:30 +05:30
|
|
|
Gitaly::Server.all.each do |server|
|
|
|
|
all_dirs = Gitlab::GitalyClient::StorageService
|
|
|
|
.new(server.storage)
|
|
|
|
.list_directories(depth: 0)
|
|
|
|
.reject { |dir| dir.ends_with?('.git') || namespaces.include?(File.basename(dir)) }
|
2014-09-02 18:07:02 +05:30
|
|
|
|
2016-08-24 12:49:21 +05:30
|
|
|
puts "Looking for directories to remove... "
|
|
|
|
all_dirs.each do |dir_path|
|
2018-11-18 11:00:15 +05:30
|
|
|
if remove?
|
2018-11-20 20:47:30 +05:30
|
|
|
begin
|
|
|
|
Gitlab::GitalyClient::NamespaceService.new(server.storage)
|
|
|
|
.remove(dir_path)
|
|
|
|
|
|
|
|
puts "Removed...#{dir_path}"
|
|
|
|
rescue StandardError => e
|
|
|
|
puts "Cannot remove #{dir_path}: #{e.message}".color(:red)
|
2016-08-24 12:49:21 +05:30
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
else
|
2016-08-24 12:49:21 +05:30
|
|
|
puts "Can be removed: #{dir_path}".color(:red)
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
unless remove?
|
2016-06-16 23:09:34 +05:30
|
|
|
puts "To cleanup this directories run this command with REMOVE=true".color(:yellow)
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-09-11 14:41:01 +05:30
|
|
|
desc "GitLab | Cleanup | Clean repositories"
|
2018-03-17 18:26:18 +05:30
|
|
|
task repos: :gitlab_environment do
|
2015-10-24 18:46:33 +05:30
|
|
|
move_suffix = "+orphaned+#{Time.now.to_i}"
|
2018-11-08 19:23:39 +05:30
|
|
|
|
2018-11-20 20:47:30 +05:30
|
|
|
Gitaly::Server.all.each do |server|
|
|
|
|
Gitlab::GitalyClient::StorageService
|
|
|
|
.new(server.storage)
|
|
|
|
.list_directories
|
|
|
|
.each do |path|
|
|
|
|
repo_with_namespace = path.chomp('.git').chomp('.wiki')
|
|
|
|
|
|
|
|
# TODO ignoring hashed repositories for now. But revisit to fully support
|
|
|
|
# possible orphaned hashed repos
|
2019-02-15 15:39:39 +05:30
|
|
|
next if repo_with_namespace.start_with?(Storage::HashedProject::REPOSITORY_PATH_PREFIX)
|
2018-11-20 20:47:30 +05:30
|
|
|
next if Project.find_by_full_path(repo_with_namespace)
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2018-11-20 20:47:30 +05:30
|
|
|
new_path = path + move_suffix
|
|
|
|
puts path.inspect + ' -> ' + new_path.inspect
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2018-11-20 20:47:30 +05:30
|
|
|
begin
|
|
|
|
Gitlab::GitalyClient::NamespaceService
|
|
|
|
.new(server.storage)
|
|
|
|
.rename(path, new_path)
|
|
|
|
rescue StandardError => e
|
2019-07-07 11:18:12 +05:30
|
|
|
puts "Error occurred while moving the repository: #{e.message}".color(:red)
|
2016-08-24 12:49:21 +05:30
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-09-11 14:41:01 +05:30
|
|
|
desc "GitLab | Cleanup | Block users that have been removed in LDAP"
|
2018-03-17 18:26:18 +05:30
|
|
|
task block_removed_ldap_users: :gitlab_environment do
|
2014-09-02 18:07:02 +05:30
|
|
|
warn_user_is_not_gitlab
|
|
|
|
block_flag = ENV['BLOCK']
|
|
|
|
|
2015-04-26 12:48:37 +05:30
|
|
|
User.find_each do |user|
|
|
|
|
next unless user.ldap_user?
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2015-04-26 12:48:37 +05:30
|
|
|
print "#{user.name} (#{user.ldap_identity.extern_uid}) ..."
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2018-03-27 19:54:05 +05:30
|
|
|
if Gitlab::Auth::LDAP::Access.allowed?(user)
|
2016-06-16 23:09:34 +05:30
|
|
|
puts " [OK]".color(:green)
|
2014-09-02 18:07:02 +05:30
|
|
|
else
|
|
|
|
if block_flag
|
2015-04-26 12:48:37 +05:30
|
|
|
user.block! unless user.blocked?
|
2016-06-16 23:09:34 +05:30
|
|
|
puts " [BLOCKED]".color(:red)
|
2014-09-02 18:07:02 +05:30
|
|
|
else
|
2016-06-16 23:09:34 +05:30
|
|
|
puts " [NOT IN LDAP]".color(:yellow)
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
unless block_flag
|
2016-06-16 23:09:34 +05:30
|
|
|
puts "To block these users run this command with BLOCK=true".color(:yellow)
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
desc "GitLab | Cleanup | Clean orphaned project uploads"
|
|
|
|
task project_uploads: :gitlab_environment do
|
|
|
|
warn_user_is_not_gitlab
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
cleaner = Gitlab::Cleanup::ProjectUploads.new(logger: logger)
|
|
|
|
cleaner.run!(dry_run: dry_run?)
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
if dry_run?
|
|
|
|
logger.info "To clean up these files run this command with DRY_RUN=false".color(:yellow)
|
|
|
|
end
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
desc 'GitLab | Cleanup | Clean orphan remote upload files that do not exist in the db'
|
|
|
|
task remote_upload_files: :environment do
|
|
|
|
cleaner = Gitlab::Cleanup::RemoteUploads.new(logger: logger)
|
|
|
|
cleaner.run!(dry_run: dry_run?)
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
if dry_run?
|
|
|
|
logger.info "To cleanup these files run this command with DRY_RUN=false".color(:yellow)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
2018-11-18 11:00:15 +05:30
|
|
|
|
2019-09-30 21:07:59 +05:30
|
|
|
desc 'GitLab | Cleanup | Clean orphan job artifact files'
|
|
|
|
task orphan_job_artifact_files: :gitlab_environment do
|
|
|
|
warn_user_is_not_gitlab
|
|
|
|
|
|
|
|
cleaner = Gitlab::Cleanup::OrphanJobArtifactFiles.new(limit: limit, dry_run: dry_run?, niceness: niceness, logger: logger)
|
|
|
|
cleaner.run!
|
|
|
|
|
|
|
|
if dry_run?
|
|
|
|
logger.info "To clean up these files run this command with DRY_RUN=false".color(:yellow)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
namespace :sessions do
|
|
|
|
desc "GitLab | Cleanup | Sessions | Clean ActiveSession lookup keys"
|
|
|
|
task active_sessions_lookup_keys: :gitlab_environment do
|
|
|
|
session_key_pattern = "#{Gitlab::Redis::SharedState::USER_SESSIONS_LOOKUP_NAMESPACE}:*"
|
|
|
|
last_save_check = Time.at(0)
|
|
|
|
wait_time = 10.seconds
|
|
|
|
cursor = 0
|
|
|
|
total_users_scanned = 0
|
|
|
|
|
|
|
|
Gitlab::Redis::SharedState.with do |redis|
|
|
|
|
begin
|
|
|
|
cursor, keys = redis.scan(cursor, match: session_key_pattern)
|
|
|
|
total_users_scanned += keys.count
|
|
|
|
|
|
|
|
if last_save_check < Time.now - 1.second
|
|
|
|
while redis.info('persistence')['rdb_bgsave_in_progress'] == '1'
|
|
|
|
puts "BGSAVE in progress, waiting #{wait_time} seconds"
|
|
|
|
sleep(wait_time)
|
|
|
|
end
|
|
|
|
last_save_check = Time.now
|
|
|
|
end
|
|
|
|
|
|
|
|
keys.each do |key|
|
|
|
|
user_id = key.split(':').last
|
|
|
|
|
|
|
|
lookup_key_count = redis.scard(key)
|
|
|
|
|
|
|
|
session_ids = ActiveSession.session_ids_for_user(user_id)
|
|
|
|
entries = ActiveSession.raw_active_session_entries(session_ids, user_id)
|
|
|
|
session_ids_and_entries = session_ids.zip(entries)
|
|
|
|
|
|
|
|
inactive_session_ids = session_ids_and_entries.map do |session_id, session|
|
|
|
|
session_id if session.nil?
|
|
|
|
end.compact
|
|
|
|
|
|
|
|
redis.pipelined do |conn|
|
|
|
|
inactive_session_ids.each do |session_id|
|
|
|
|
conn.srem(key, session_id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
if inactive_session_ids
|
|
|
|
puts "deleted #{inactive_session_ids.count} out of #{lookup_key_count} lookup keys for User ##{user_id}"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end while cursor.to_i != 0
|
|
|
|
|
|
|
|
puts "--- All done! Total number of scanned users: #{total_users_scanned}"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
def remove?
|
|
|
|
ENV['REMOVE'] == 'true'
|
|
|
|
end
|
|
|
|
|
|
|
|
def dry_run?
|
|
|
|
ENV['DRY_RUN'] != 'false'
|
|
|
|
end
|
|
|
|
|
2019-09-30 21:07:59 +05:30
|
|
|
def debug?
|
|
|
|
ENV['DEBUG'].present?
|
|
|
|
end
|
|
|
|
|
|
|
|
def limit
|
|
|
|
ENV['LIMIT']&.to_i
|
|
|
|
end
|
|
|
|
|
|
|
|
def niceness
|
|
|
|
ENV['NICENESS'].presence
|
|
|
|
end
|
|
|
|
|
|
|
|
# rubocop:disable Gitlab/RailsLogger
|
2018-11-18 11:00:15 +05:30
|
|
|
def logger
|
|
|
|
return @logger if defined?(@logger)
|
|
|
|
|
|
|
|
@logger = if Rails.env.development? || Rails.env.production?
|
|
|
|
Logger.new(STDOUT).tap do |stdout_logger|
|
|
|
|
stdout_logger.extend(ActiveSupport::Logger.broadcast(Rails.logger))
|
2019-09-30 21:07:59 +05:30
|
|
|
stdout_logger.level = debug? ? Logger::DEBUG : Logger::INFO
|
2018-11-18 11:00:15 +05:30
|
|
|
end
|
|
|
|
else
|
|
|
|
Rails.logger
|
|
|
|
end
|
|
|
|
end
|
2019-09-30 21:07:59 +05:30
|
|
|
# rubocop:enable Gitlab/RailsLogger
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
end
|