debian-mirror-gitlab/app/services/bulk_imports/file_download_service.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

123 lines
3.4 KiB
Ruby
Raw Normal View History

2021-09-04 01:27:46 +05:30
# frozen_string_literal: true
2022-03-02 08:16:31 +05:30
# File Download Service allows remote file download into tmp directory.
#
# @param configuration [BulkImports::Configuration] Config object containing url and access token
# @param relative_url [String] Relative URL to download the file from
# @param tmpdir [String] Temp directory to store downloaded file to. Must be located under `Dir.tmpdir`.
# @param file_size_limit [Integer] Maximum allowed file size
# @param allowed_content_types [Array<String>] Allowed file content types
# @param filename [String] Name of the file to download, if known. Use remote filename if none given.
2021-09-04 01:27:46 +05:30
module BulkImports
class FileDownloadService
2022-10-11 01:57:18 +05:30
include ::BulkImports::FileDownloads::FilenameFetch
include ::BulkImports::FileDownloads::Validations
2021-09-04 01:27:46 +05:30
ServiceError = Class.new(StandardError)
2021-12-11 22:18:48 +05:30
DEFAULT_FILE_SIZE_LIMIT = 5.gigabytes
DEFAULT_ALLOWED_CONTENT_TYPES = %w(application/gzip application/octet-stream).freeze
def initialize(
configuration:,
relative_url:,
2022-03-02 08:16:31 +05:30
tmpdir:,
2021-12-11 22:18:48 +05:30
file_size_limit: DEFAULT_FILE_SIZE_LIMIT,
allowed_content_types: DEFAULT_ALLOWED_CONTENT_TYPES,
filename: nil)
2021-09-04 01:27:46 +05:30
@configuration = configuration
@relative_url = relative_url
@filename = filename
2022-03-02 08:16:31 +05:30
@tmpdir = tmpdir
2021-09-30 23:02:18 +05:30
@file_size_limit = file_size_limit
@allowed_content_types = allowed_content_types
2023-03-04 22:38:38 +05:30
@remote_content_validated = false
2021-09-04 01:27:46 +05:30
end
def execute
2022-03-02 08:16:31 +05:30
validate_tmpdir
validate_filepath
2021-09-04 01:27:46 +05:30
validate_url
download_file
validate_symlink
filepath
end
private
2023-03-04 22:38:38 +05:30
attr_reader :configuration, :relative_url, :tmpdir, :file_size_limit, :allowed_content_types, :response_headers
2021-09-04 01:27:46 +05:30
def download_file
File.open(filepath, 'wb') do |file|
bytes_downloaded = 0
http_client.stream(relative_url) do |chunk|
2022-08-27 11:52:29 +05:30
next if bytes_downloaded == 0 && [301, 302, 303, 307, 308].include?(chunk.code)
2023-03-04 22:38:38 +05:30
@response_headers ||= Gitlab::HTTP::Response::Headers.new(chunk.http_response.to_hash)
unless @remote_content_validated
validate_content_type
validate_content_length
@remote_content_validated = true
end
2021-09-04 01:27:46 +05:30
bytes_downloaded += chunk.size
2021-09-30 23:02:18 +05:30
validate_size!(bytes_downloaded)
2021-09-04 01:27:46 +05:30
2022-08-27 11:52:29 +05:30
if chunk.code == 200
file.write(chunk)
else
raise(ServiceError, "File download error #{chunk.code}")
end
2021-09-04 01:27:46 +05:30
end
end
rescue StandardError => e
File.delete(filepath) if File.exist?(filepath)
raise e
end
2022-10-11 01:57:18 +05:30
def raise_error(message)
raise ServiceError, message
end
2021-09-04 01:27:46 +05:30
def http_client
@http_client ||= BulkImports::Clients::HTTP.new(
2021-09-30 23:02:18 +05:30
url: configuration.url,
2021-09-04 01:27:46 +05:30
token: configuration.access_token
)
end
def allow_local_requests?
::Gitlab::CurrentSettings.allow_local_requests_from_web_hooks_and_services?
end
2022-03-02 08:16:31 +05:30
def validate_tmpdir
Gitlab::Utils.check_allowed_absolute_path!(tmpdir, [Dir.tmpdir])
2021-09-04 01:27:46 +05:30
end
2022-10-11 01:57:18 +05:30
def filepath
@filepath ||= File.join(@tmpdir, filename)
end
2021-09-04 01:27:46 +05:30
2022-10-11 01:57:18 +05:30
def filename
@filename.presence || remote_filename
2021-09-04 01:27:46 +05:30
end
def validate_url
::Gitlab::UrlBlocker.validate!(
http_client.resource_url(relative_url),
allow_localhost: allow_local_requests?,
allow_local_network: allow_local_requests?,
schemes: %w(http https)
)
end
end
end