Skip to content

Follow Symbolic Links for Artifact Paths

Everyone can contribute. Help move this issue forward while earning points, leveling up and collecting rewards.

Summary

The output of my build just happens to be in /foo. I realize that mostly everything in the gitlab runner is done in the PWD (e.g. /home/gitlab-runner/builds) which most likely does not correspond to /foo.

Users should be able to use the following YAML snippet to create an archive rather than first copying the files into the PWD.

Why? COPYING IS BAAAAAAAAAD (i.e. it is unnecessarily time / space consuming). Follow symbolic links!!!

Steps to reproduce

image: ubuntu:xenial

stages:
  - build

do_build:
  stage: build
  script:
    - mkdir /foo
    - touch /foo/bar.txt
    - ln -sf /foo foo
  artifacts:
    paths
      - foo/

Example Project

What is the current bug behavior?

artifacts.zip is empty

What is the expected correct behavior?

artifacts.zip should contain entry "foo/bar.txt"

Relevant logs and/or screenshots

WARNING: foo/: no matching files

Results of GitLab environment info

Expand for output related to GitLab environment info
System information                                                                                                                                     
System:                                                                                                                                                
Current User:   git                                                                                                                                    
Using RVM:      no                                                                                                                                     
Ruby Version:   2.3.3p222                                                                                                                              
Gem Version:    2.6.6                                                                                                                                  
Bundler Version:1.13.7                                                                                                                                 
Rake Version:   12.0.0                                                                                                                                 
Redis Version:  3.2.5                                                                                                                                  
Git Version:    2.13.5                                                                                                                                 
Sidekiq Version:5.0.4                                                                                                                                  
Go Version:     unknown                                                                                                                                

GitLab information
Version: 9.5.4
Revision: fbffc27
Directory: /opt/gitlab/embedded/service/gitlab-rails
DB Adapter: postgresql
URL: https://example.com
HTTP Clone URL: https://example.com/some-group/some-project.git SSH Clone URL: git@example.com:some-group/some-project.git Using LDAP: no Using Omniauth: no

GitLab Shell Version: 5.8.0 Repository storage paths:

  • default: /var/opt/gitlab/git-data/repositories Hooks: /opt/gitlab/embedded/service/gitlab-shell/hooks Git: /opt/gitlab/embedded/bin/git

Results of GitLab application Check

Expand for output related to the GitLab application check
Checking GitLab Shell ...

GitLab Shell version >= 5.8.0 ? ... OK (5.8.0) Repo base directory exists? default... yes Repo storage directories are symlinks? default... no Repo paths owned by git:root, or git:git? default... yes Repo paths access is drwxrws---? default... yes hooks directories in repos are links: ... 9/6 ... ok 9/7 ... ok 10/8 ... ok 2/10 ... ok 10/11 ... ok 2/12 ... ok 2/13 ... ok 10/14 ... ok 2/15 ... ok 2/17 ... ok 9/21 ... ok Running /opt/gitlab/embedded/service/gitlab-shell/bin/check Check GitLab API access: OK Access to /var/opt/gitlab/.ssh/authorized_keys: OK Send ping to redis server: OK gitlab-shell self-check successful

Checking GitLab Shell ... Finished

Checking Sidekiq ...

Running? ... yes Number of Sidekiq processes ... 1

Checking Sidekiq ... Finished

Checking Reply by email ...

Reply by email is disabled in config/gitlab.yml

Checking Reply by email ... Finished

Checking LDAP ...

LDAP is disabled in config/gitlab.yml

Checking LDAP ... Finished

Checking GitLab ...

Git configured correctly? ... yes Database config exists? ... yes All migrations up? ... yes Database contains orphaned GroupMembers? ... no GitLab config exists? ... yes GitLab config up to date? ... yes Log directory writable? ... yes Tmp directory writable? ... yes Uploads directory exists? ... yes Uploads directory has correct permissions? ... yes Uploads directory tmp has correct permissions? ... skipped (no tmp uploads folder yet) Init script exists? ... skipped (omnibus-gitlab has no init script) Init script up-to-date? ... skipped (omnibus-gitlab has no init script) Projects have namespace: ... 9/6 ... yes 9/7 ... yes 10/8 ... yes 2/10 ... yes 10/11 ... yes 2/12 ... yes 2/13 ... yes 10/14 ... yes 2/15 ... yes 2/17 ... yes 9/21 ... yes Redis version >= 2.8.0? ... yes Ruby version >= 2.3.3 ? ... yes (2.3.3) Git version >= 2.7.3 ? ... yes (2.13.5) Active users: ... 3

Checking GitLab ... Finished

Possible fixes

The error exists somewhere in zip_create.go

https://gitlab.com/gitlab-org/gitlab-runner/blob/master/helpers/archives/zip_create.go#L25

It looks as though current checks to attempt to see if the file is a symlink, but it assumes that the target of the link is a regular file. Realistically, the target of the link could be another link, or a directory, a regular file, or a "special" file (e.g. a. pipe, character device, block device, etc) and we need to have reasonable actions to take in each of those cases. The simplest solution would be to use a recursive function and to pass in the depth of the recursion. Of course, we do not want the recursion to go on indefinitely, so maybe limit the maximum depth to something like 1024.

It might also be wise to consider a special case (namely, the one I am complaining about), when the recursion depth is zero and the target is a symlink'ed directory, just so we don't pull in the entire filesystem by accident.

Also, I vaguely remember that with some versions of zip symbolic links are not supported. They seem to work now in Linux at least.

Edited by 🤖 GitLab Bot 🤖