debian-mirror-gitlab/app/controllers/projects/jobs_controller.rb

186 lines
4.7 KiB
Ruby
Raw Normal View History

2017-09-10 17:25:29 +05:30
class Projects::JobsController < Projects::ApplicationController
2018-05-09 12:01:36 +05:30
include SendFileUpload
2017-09-10 17:25:29 +05:30
2018-05-09 12:01:36 +05:30
before_action :build, except: [:index, :cancel_all]
2018-11-08 19:23:39 +05:30
before_action :authorize_read_build!
2017-09-10 17:25:29 +05:30
before_action :authorize_update_build!,
2018-03-17 18:26:18 +05:30
except: [:index, :show, :status, :raw, :trace, :cancel_all, :erase]
before_action :authorize_erase_build!, only: [:erase]
2018-11-08 19:23:39 +05:30
before_action :authorize_use_build_terminal!, only: [:terminal, :terminal_workhorse_authorize]
before_action :verify_api_request!, only: :terminal_websocket_authorize
2017-09-10 17:25:29 +05:30
layout 'project'
def index
@scope = params[:scope]
@all_builds = project.builds.relevant
2018-03-17 18:26:18 +05:30
@builds = @all_builds.order('ci_builds.id DESC')
2017-09-10 17:25:29 +05:30
@builds =
case @scope
when 'pending'
@builds.pending.reverse_order
when 'running'
@builds.running.reverse_order
when 'finished'
@builds.finished
else
@builds
end
@builds = @builds.includes([
{ pipeline: :project },
:project,
:tags
])
2018-03-17 18:26:18 +05:30
@builds = @builds.page(params[:page]).per(30).without_count
2017-09-10 17:25:29 +05:30
end
def cancel_all
return access_denied! unless can?(current_user, :update_build, project)
@project.builds.running_or_pending.each do |build|
build.cancel if can?(current_user, :update_build, build)
end
redirect_to project_jobs_path(project)
end
def show
2018-11-08 19:23:39 +05:30
@pipeline = @build.pipeline
@builds = @pipeline.builds
2018-05-09 12:01:36 +05:30
.order('id DESC')
.present(current_user: current_user)
2017-09-10 17:25:29 +05:30
respond_to do |format|
format.html
format.json do
Gitlab::PollingInterval.set_header(response, interval: 10_000)
render json: BuildSerializer
.new(project: @project, current_user: @current_user)
.represent(@build, {}, BuildDetailsEntity)
end
end
end
def trace
build.trace.read do |stream|
respond_to do |format|
format.json do
result = {
id: @build.id, status: @build.status, complete: @build.complete?
}
if stream.valid?
stream.limit
state = params[:state].presence
trace = stream.html_with_state(state)
result.merge!(trace.to_h)
end
render json: result
end
end
end
end
def retry
return respond_422 unless @build.retryable?
build = Ci::Build.retry(@build, current_user)
redirect_to build_path(build)
end
def play
return respond_422 unless @build.playable?
build = @build.play(current_user)
redirect_to build_path(build)
end
def cancel
return respond_422 unless @build.cancelable?
@build.cancel
redirect_to build_path(@build)
end
def status
render json: BuildSerializer
.new(project: @project, current_user: @current_user)
.represent_status(@build)
end
def erase
if @build.erase(erased_by: current_user)
redirect_to project_job_path(project, @build),
2018-03-17 18:26:18 +05:30
notice: "Job has been successfully erased!"
2017-09-10 17:25:29 +05:30
else
respond_422
end
end
def raw
2018-05-09 12:01:36 +05:30
if trace_artifact_file
send_upload(trace_artifact_file,
send_params: raw_send_params,
redirect_params: raw_redirect_params)
else
build.trace.read do |stream|
if stream.file?
send_file stream.path, type: 'text/plain; charset=utf-8', disposition: 'inline'
else
send_data stream.raw, type: 'text/plain; charset=utf-8', disposition: 'inline', filename: 'job.log'
end
2017-09-10 17:25:29 +05:30
end
end
end
2018-11-08 19:23:39 +05:30
def terminal
end
# GET .../terminal.ws : implemented in gitlab-workhorse
def terminal_websocket_authorize
set_workhorse_internal_api_content_type
render json: Gitlab::Workhorse.terminal_websocket(@build.terminal_specification)
end
2017-09-10 17:25:29 +05:30
private
def authorize_update_build!
return access_denied! unless can?(current_user, :update_build, build)
end
2018-03-17 18:26:18 +05:30
def authorize_erase_build!
return access_denied! unless can?(current_user, :erase_build, build)
end
2018-11-08 19:23:39 +05:30
def authorize_use_build_terminal!
return access_denied! unless can?(current_user, :create_build_terminal, build)
end
def verify_api_request!
Gitlab::Workhorse.verify_api_request!(request.headers)
end
2018-05-09 12:01:36 +05:30
def raw_send_params
{ type: 'text/plain; charset=utf-8', disposition: 'inline' }
end
def raw_redirect_params
{ query: { 'response-content-type' => 'text/plain; charset=utf-8', 'response-content-disposition' => 'inline' } }
end
def trace_artifact_file
@trace_artifact_file ||= build.job_artifacts_trace&.file
end
2017-09-10 17:25:29 +05:30
def build
@build ||= project.builds.find(params[:id])
2018-11-08 19:23:39 +05:30
.present(current_user: current_user)
2017-09-10 17:25:29 +05:30
end
def build_path(build)
project_job_path(build.project, build)
end
end