You can prohibit filenames using push rules to prevent certain types of files being added to the repo. However, the negative lookback/lookahead are not supported for security reasons, which prevents more complex rules like:
prohibit all jar files except if they are in the `resources1 directory
Add a new push rule to bypass the Prohibited filenames push rule:
Prohibited filename exemptions
Prohibited filenames that match this regular expression will be exempted and may be pushed. If this field is empty no filenames will be exempted.
Links / references
Edited
Designs
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related or that one is blocking others.
Learn more.
@stanhu yes, lack of negative lookahead/lookback are basically why we're using RE2. It's simply not safe to provide untrusted regexps to the ruby standard regexp library.
I'd suggest that as we come across use cases that can't be expressed in the more-limited regexp functionality, we could consider splitting them into their own push rule section. "Forbid these paths/extensions" or "Only permit these paths/extensions" is something we could support without requiring people to write regexps like the one in this issue's description, for instance, which I'm having a very hard time unpicking.
^ = start of line(?!(?:.*\/)?python\/shim(?:\/|$)) = allow anything in a python/shim folder, anything in it is allowed(?!(?:.*\/)?src\/test\/resources(?:\/|$)) = allow anything in the src/test/resources folder, anything in it is allowed(?!.*gradle-wrapper\.jar$) = allow filenames gradle-wrapper.jar, no matter where its at.*\.?:jar|exe|a|ar|cpio|shar|iso|LBR|lbr|mar|sbx|tar|bz2|F|gz|lz|lzma|lzo|rz|sfark|sz|xz|z|Z|7z|s7z|ace|afa|alz|apk|arc|arj|b1|ba|bh|cab|car|cfs|cpt|dar|dd|dgc|dmg|ear|gca|ha|hki|ice|kgb|lzh|lha|lzx|pak|partimg|paq6|paq7|paq8|pea|pim|pit|qda|rar|rk|sda|sea|sen|sfx|shk|sit|sitx|sqx|tar\.gz|tgz|tar\.Z|tar\.bz2|tbz2|tar\.lzma|tlz|uc|uc0|uc2|ucn|ur2|ue2|uca|uha|war|wim|xar|xp3|yz1|zip|zipx|zoo|zpaq|zz|dll) = flag any other file that has any of these extensions.$ = end of line
@scphantm one option might be to use a custom pre-receive hook to reject non-compliant pushes, instead of the regexp? These are documented here: https://docs.gitlab.com/ee/administration/custom_hooks.html and can be arbitrarily complex. You can set them globally, or just for specific projects.
I can't recommend downgrading - if you're only coming across this problem now, that suggests you've upgraded from a version that's been out of security support for a long time.
@nick.thomas One of our issues is that we are not allowed direct access to the directories running the Gitlab server. We have a very strict security policy that denies the creation or updating of files on a running application server. So, we are unable to create custom hooks which must be placed on the Gitlab server.
it would be more accurate to say that we upgraded to 10.7 shortly after that was released due to other bugs and had no indication that this stopped working. It was just dumb luck that I was updating the regex on one of our projects this week and realized it wasn't working. Started searching and found every project created since we upgraded to 10.7 has no push rule, and many of those projects are already violating policy. So we are likely going to have to nuke those projects and tell them to start over again (screw the history, just create a new repo).
i was looking for hooks, i couldn't remember where they lived. but yea, this may be a solution.
I was just thinking. We know that the regex thats above still works, because we get calls that the system blocked pushes all the time, thats what prompted me to go and try to modify it. So am I correct in that RE2 is used as a validator on the input, but Ruby is used for the actual execution?
If thats the case, we may be able to use the configuration system we built (when we adjust settings, its not to one project, its to hundreds, so we wrote a system to do it) to insert the regex directly into the database. That may get us by until we come up with a better idea.
I'd suggest that as we come across use cases that can't be expressed in the more-limited regexp functionality, we could consider splitting them into their own push rule section. "Forbid these paths/extensions" or "Only permit these paths/extensions" is something we could support without requiring people to write regexps like the one in this issue's description, for instance, which I'm having a very hard time unpicking.
@nick.thomas we had the same issue with the push rule for commit messages.
That's why I added a new field for it in 11.1 that does exactly what you're suggesting.
So I agree with you that's probably the easiest solution.
Is there any update or solution to this issue? We would like to know how we can resolve this through the UI without modifications to any hooks on the server.
@Neumsy could you confirm I understand your intention: reject all commits containing files with certain extensions, except if they are in a specific directory?
James Ramsay (ex-GitLab)changed title from RE2 does not allow for negative look back/ahead causes usability issues for prohibited files. to Add prohibited filename exemptions
changed title from RE2 does not allow for negative look back/ahead causes usability issues for prohibited files. to Add prohibited filename exemptions