debian-mirror-gitlab/workhorse/internal/upload/multipart_uploader.go

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

34 lines
1.3 KiB
Go
Raw Normal View History

2021-02-22 17:27:13 +05:30
package upload
import (
"net/http"
2021-10-27 15:23:28 +05:30
"gitlab.com/gitlab-org/gitlab/workhorse/internal/api"
2021-02-22 17:27:13 +05:30
)
2022-04-04 11:22:00 +05:30
// Multipart is a request middleware. If the request has a MIME multipart
// request body, the middleware will iterate through the multipart parts.
// When it finds a file part (filename != ""), the middleware will save
// the file contents to a temporary location and replace the file part
// with a reference to the temporary location.
func Multipart(rails PreAuthorizer, h http.Handler, p Preparer) http.Handler {
2021-02-22 17:27:13 +05:30
return rails.PreAuthorizeHandler(func(w http.ResponseWriter, r *http.Request, a *api.Response) {
s := &SavedFileTracker{Request: r}
2022-07-23 23:45:48 +05:30
interceptMultipartFiles(w, r, h, s, &eagerAuthorizer{a}, p)
}, "/authorize")
}
2022-08-13 15:12:31 +05:30
// FixedPreAuthMultipart behaves like Multipart except it makes lazy
// preauthorization requests when it encounters a multipart upload. The
// preauthorization requests go to a fixed internal GitLab Rails API
// endpoint. This endpoint currently does not support direct upload, so
// using FixedPreAuthMultipart implies disk buffering.
func FixedPreAuthMultipart(myAPI *api.API, h http.Handler, p Preparer) http.Handler {
2022-07-23 23:45:48 +05:30
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
s := &SavedFileTracker{Request: r}
2022-08-13 15:12:31 +05:30
fa := &apiAuthorizer{myAPI}
2022-07-23 23:45:48 +05:30
interceptMultipartFiles(w, r, h, s, fa, p)
})
2021-02-22 17:27:13 +05:30
}