debian-mirror-gitlab/app/controllers/uploads_controller.rb

115 lines
2.8 KiB
Ruby
Raw Normal View History

2018-12-05 23:21:45 +05:30
# frozen_string_literal: true
2015-04-26 12:48:37 +05:30
class UploadsController < ApplicationController
2017-08-17 22:00:37 +05:30
include UploadsActions
2019-09-04 21:01:54 +05:30
include WorkhorseRequest
2015-04-26 12:48:37 +05:30
2018-03-17 18:26:18 +05:30
UnknownUploadModelError = Class.new(StandardError)
MODEL_CLASSES = {
"user" => User,
"project" => Project,
"note" => Note,
"group" => Group,
"appearance" => Appearance,
"personal_snippet" => PersonalSnippet,
nil => PersonalSnippet
}.freeze
rescue_from UnknownUploadModelError, with: :render_404
2017-08-17 22:00:37 +05:30
skip_before_action :authenticate_user!
2020-11-24 15:15:51 +05:30
skip_before_action :check_two_factor_requirement, only: [:show]
2018-03-17 18:26:18 +05:30
before_action :upload_mount_satisfied?
2017-08-17 22:00:37 +05:30
before_action :authorize_access!, only: [:show]
2019-09-04 21:01:54 +05:30
before_action :authorize_create_access!, only: [:create, :authorize]
before_action :verify_workhorse_api!, only: [:authorize]
2015-04-26 12:48:37 +05:30
2021-01-03 14:25:43 +05:30
feature_category :not_owned
2018-03-17 18:26:18 +05:30
def uploader_class
PersonalFileUploader
end
2015-04-26 12:48:37 +05:30
def find_model
2019-07-07 11:18:12 +05:30
return unless params[:id]
2017-09-10 17:25:29 +05:30
2018-03-17 18:26:18 +05:30
upload_model_class.find(params[:id])
2015-04-26 12:48:37 +05:30
end
def authorize_access!
2019-07-07 11:18:12 +05:30
return unless model
2017-09-10 17:25:29 +05:30
2015-09-11 14:41:01 +05:30
authorized =
2017-08-17 22:00:37 +05:30
case model
2015-04-26 12:48:37 +05:30
when Note
2017-08-17 22:00:37 +05:30
can?(current_user, :read_project, model.project)
2020-03-13 15:44:24 +05:30
when Snippet, ProjectSnippet
can?(current_user, :read_snippet, model)
2017-08-17 22:00:37 +05:30
when User
2019-07-07 11:18:12 +05:30
# We validate the current user has enough (writing)
# access to itself when a secret is given.
# For instance, user avatars are readable by anyone,
# while temporary, user snippet uploads are not.
!secret? || can?(current_user, :update_user, model)
2017-08-17 22:00:37 +05:30
when Appearance
true
else
2019-09-04 21:01:54 +05:30
permission = "read_#{model.class.underscore}".to_sym
2017-08-17 22:00:37 +05:30
can?(current_user, permission, model)
2015-04-26 12:48:37 +05:30
end
2017-08-17 22:00:37 +05:30
render_unauthorized unless authorized
end
def authorize_create_access!
2019-07-07 11:18:12 +05:30
return unless model
2017-09-10 17:25:29 +05:30
2019-07-07 11:18:12 +05:30
authorized =
case model
when User
can?(current_user, :update_user, model)
else
2019-07-31 22:56:46 +05:30
can?(current_user, :create_note, model)
2019-07-07 11:18:12 +05:30
end
2015-04-26 12:48:37 +05:30
2017-08-17 22:00:37 +05:30
render_unauthorized unless authorized
end
def render_unauthorized
2019-09-04 21:01:54 +05:30
if current_user || workhorse_authorize_request?
2015-10-24 18:46:33 +05:30
render_404
2015-04-26 12:48:37 +05:30
else
authenticate_user!
end
end
2019-12-21 20:55:43 +05:30
def cache_settings
case model
when User, Appearance
[5.minutes, { public: true, must_revalidate: false }]
when Project, Group
[5.minutes, { private: true, must_revalidate: true }]
end
2019-03-02 22:35:43 +05:30
end
2019-07-07 11:18:12 +05:30
def secret?
params[:secret].present?
end
2018-03-17 18:26:18 +05:30
def upload_model_class
MODEL_CLASSES[params[:model]] || raise(UnknownUploadModelError)
2015-04-26 12:48:37 +05:30
end
2017-08-17 22:00:37 +05:30
2018-03-17 18:26:18 +05:30
def upload_model_class_has_mounts?
upload_model_class < CarrierWave::Mount::Extension
2017-08-17 22:00:37 +05:30
end
2018-03-17 18:26:18 +05:30
def upload_mount_satisfied?
return true unless upload_model_class_has_mounts?
2017-08-17 22:00:37 +05:30
2018-03-17 18:26:18 +05:30
upload_model_class.uploader_options.has_key?(upload_mount)
2017-08-17 22:00:37 +05:30
end
2015-04-26 12:48:37 +05:30
end