2021-09-04 01:27:46 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2022-03-02 08:16:31 +05:30
|
|
|
# File Download Service allows remote file download into tmp directory.
|
|
|
|
#
|
|
|
|
# @param configuration [BulkImports::Configuration] Config object containing url and access token
|
|
|
|
# @param relative_url [String] Relative URL to download the file from
|
|
|
|
# @param tmpdir [String] Temp directory to store downloaded file to. Must be located under `Dir.tmpdir`.
|
|
|
|
# @param file_size_limit [Integer] Maximum allowed file size
|
|
|
|
# @param allowed_content_types [Array<String>] Allowed file content types
|
|
|
|
# @param filename [String] Name of the file to download, if known. Use remote filename if none given.
|
2021-09-04 01:27:46 +05:30
|
|
|
module BulkImports
|
|
|
|
class FileDownloadService
|
2022-10-11 01:57:18 +05:30
|
|
|
include ::BulkImports::FileDownloads::FilenameFetch
|
|
|
|
include ::BulkImports::FileDownloads::Validations
|
|
|
|
|
2021-09-04 01:27:46 +05:30
|
|
|
ServiceError = Class.new(StandardError)
|
|
|
|
|
2021-12-11 22:18:48 +05:30
|
|
|
DEFAULT_FILE_SIZE_LIMIT = 5.gigabytes
|
|
|
|
DEFAULT_ALLOWED_CONTENT_TYPES = %w(application/gzip application/octet-stream).freeze
|
|
|
|
|
|
|
|
def initialize(
|
|
|
|
configuration:,
|
|
|
|
relative_url:,
|
2022-03-02 08:16:31 +05:30
|
|
|
tmpdir:,
|
2021-12-11 22:18:48 +05:30
|
|
|
file_size_limit: DEFAULT_FILE_SIZE_LIMIT,
|
|
|
|
allowed_content_types: DEFAULT_ALLOWED_CONTENT_TYPES,
|
|
|
|
filename: nil)
|
2021-09-04 01:27:46 +05:30
|
|
|
@configuration = configuration
|
|
|
|
@relative_url = relative_url
|
|
|
|
@filename = filename
|
2022-03-02 08:16:31 +05:30
|
|
|
@tmpdir = tmpdir
|
2021-09-30 23:02:18 +05:30
|
|
|
@file_size_limit = file_size_limit
|
|
|
|
@allowed_content_types = allowed_content_types
|
2023-03-04 22:38:38 +05:30
|
|
|
@remote_content_validated = false
|
2021-09-04 01:27:46 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def execute
|
2022-03-02 08:16:31 +05:30
|
|
|
validate_tmpdir
|
|
|
|
validate_filepath
|
2021-09-04 01:27:46 +05:30
|
|
|
validate_url
|
|
|
|
|
|
|
|
download_file
|
|
|
|
|
|
|
|
validate_symlink
|
|
|
|
|
|
|
|
filepath
|
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
2023-03-04 22:38:38 +05:30
|
|
|
attr_reader :configuration, :relative_url, :tmpdir, :file_size_limit, :allowed_content_types, :response_headers
|
2021-09-04 01:27:46 +05:30
|
|
|
|
|
|
|
def download_file
|
|
|
|
File.open(filepath, 'wb') do |file|
|
|
|
|
bytes_downloaded = 0
|
|
|
|
|
|
|
|
http_client.stream(relative_url) do |chunk|
|
2022-08-27 11:52:29 +05:30
|
|
|
next if bytes_downloaded == 0 && [301, 302, 303, 307, 308].include?(chunk.code)
|
|
|
|
|
2023-03-04 22:38:38 +05:30
|
|
|
@response_headers ||= Gitlab::HTTP::Response::Headers.new(chunk.http_response.to_hash)
|
|
|
|
|
|
|
|
unless @remote_content_validated
|
|
|
|
validate_content_type
|
|
|
|
validate_content_length
|
|
|
|
|
|
|
|
@remote_content_validated = true
|
|
|
|
end
|
|
|
|
|
2021-09-04 01:27:46 +05:30
|
|
|
bytes_downloaded += chunk.size
|
|
|
|
|
2021-09-30 23:02:18 +05:30
|
|
|
validate_size!(bytes_downloaded)
|
2021-09-04 01:27:46 +05:30
|
|
|
|
2022-08-27 11:52:29 +05:30
|
|
|
if chunk.code == 200
|
|
|
|
file.write(chunk)
|
|
|
|
else
|
|
|
|
raise(ServiceError, "File download error #{chunk.code}")
|
|
|
|
end
|
2021-09-04 01:27:46 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
rescue StandardError => e
|
|
|
|
File.delete(filepath) if File.exist?(filepath)
|
|
|
|
|
|
|
|
raise e
|
|
|
|
end
|
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
def raise_error(message)
|
|
|
|
raise ServiceError, message
|
|
|
|
end
|
|
|
|
|
2021-09-04 01:27:46 +05:30
|
|
|
def http_client
|
|
|
|
@http_client ||= BulkImports::Clients::HTTP.new(
|
2021-09-30 23:02:18 +05:30
|
|
|
url: configuration.url,
|
2021-09-04 01:27:46 +05:30
|
|
|
token: configuration.access_token
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
def allow_local_requests?
|
|
|
|
::Gitlab::CurrentSettings.allow_local_requests_from_web_hooks_and_services?
|
|
|
|
end
|
|
|
|
|
2022-03-02 08:16:31 +05:30
|
|
|
def validate_tmpdir
|
|
|
|
Gitlab::Utils.check_allowed_absolute_path!(tmpdir, [Dir.tmpdir])
|
2021-09-04 01:27:46 +05:30
|
|
|
end
|
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
def filepath
|
|
|
|
@filepath ||= File.join(@tmpdir, filename)
|
|
|
|
end
|
2021-09-04 01:27:46 +05:30
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
def filename
|
|
|
|
@filename.presence || remote_filename
|
2021-09-04 01:27:46 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def validate_url
|
|
|
|
::Gitlab::UrlBlocker.validate!(
|
|
|
|
http_client.resource_url(relative_url),
|
|
|
|
allow_localhost: allow_local_requests?,
|
|
|
|
allow_local_network: allow_local_requests?,
|
|
|
|
schemes: %w(http https)
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|