2020-04-22 19:07:51 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
module Terraform
|
|
|
|
class RemoteStateHandler < BaseService
|
|
|
|
include Gitlab::OptimisticLocking
|
|
|
|
|
|
|
|
StateLockedError = Class.new(StandardError)
|
2020-07-28 23:09:34 +05:30
|
|
|
UnauthorizedError = Class.new(StandardError)
|
2020-04-22 19:07:51 +05:30
|
|
|
|
|
|
|
def find_with_lock
|
2020-07-28 23:09:34 +05:30
|
|
|
retrieve_with_lock(find_only: true) do |state|
|
|
|
|
yield state if block_given?
|
|
|
|
end
|
2020-04-22 19:07:51 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def handle_with_lock
|
2020-07-28 23:09:34 +05:30
|
|
|
raise UnauthorizedError unless can_modify_state?
|
|
|
|
|
2020-04-22 19:07:51 +05:30
|
|
|
retrieve_with_lock do |state|
|
|
|
|
raise StateLockedError unless lock_matches?(state)
|
|
|
|
|
|
|
|
yield state if block_given?
|
|
|
|
|
|
|
|
state.save! unless state.destroyed?
|
|
|
|
end
|
2020-11-05 12:06:23 +05:30
|
|
|
|
|
|
|
nil
|
2020-04-22 19:07:51 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def lock!
|
|
|
|
raise ArgumentError if params[:lock_id].blank?
|
2020-07-28 23:09:34 +05:30
|
|
|
raise UnauthorizedError unless can_modify_state?
|
2020-04-22 19:07:51 +05:30
|
|
|
|
|
|
|
retrieve_with_lock do |state|
|
|
|
|
raise StateLockedError if state.locked?
|
|
|
|
|
|
|
|
state.lock_xid = params[:lock_id]
|
|
|
|
state.locked_by_user = current_user
|
2020-05-24 23:13:21 +05:30
|
|
|
state.locked_at = Time.current
|
2020-04-22 19:07:51 +05:30
|
|
|
|
|
|
|
state.save!
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def unlock!
|
2020-07-28 23:09:34 +05:30
|
|
|
raise UnauthorizedError unless can_modify_state?
|
|
|
|
|
2020-04-22 19:07:51 +05:30
|
|
|
retrieve_with_lock do |state|
|
|
|
|
# force-unlock does not pass ID, so we ignore it if it is missing
|
|
|
|
raise StateLockedError unless params[:lock_id].nil? || lock_matches?(state)
|
|
|
|
|
|
|
|
state.lock_xid = nil
|
|
|
|
state.locked_by_user = nil
|
|
|
|
state.locked_at = nil
|
|
|
|
|
|
|
|
state.save!
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
def retrieve_with_lock(find_only: false)
|
|
|
|
create_or_find!(find_only: find_only).tap { |state| retry_optimistic_lock(state) { |state| yield state } }
|
|
|
|
end
|
|
|
|
|
|
|
|
def create_or_find!(find_only:)
|
|
|
|
raise ArgumentError unless params[:name].present?
|
|
|
|
|
|
|
|
find_params = { project: project, name: params[:name] }
|
|
|
|
|
|
|
|
if find_only
|
|
|
|
Terraform::State.find_by(find_params) || # rubocop: disable CodeReuse/ActiveRecord
|
|
|
|
raise(ActiveRecord::RecordNotFound.new("Couldn't find state"))
|
|
|
|
else
|
|
|
|
Terraform::State.create_or_find_by(find_params)
|
|
|
|
end
|
2020-04-22 19:07:51 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def lock_matches?(state)
|
|
|
|
return true if state.lock_xid.nil? && params[:lock_id].nil?
|
|
|
|
|
|
|
|
ActiveSupport::SecurityUtils
|
|
|
|
.secure_compare(state.lock_xid.to_s, params[:lock_id].to_s)
|
|
|
|
end
|
2020-07-28 23:09:34 +05:30
|
|
|
|
|
|
|
def can_modify_state?
|
|
|
|
current_user.can?(:admin_terraform_state, project)
|
|
|
|
end
|
2020-04-22 19:07:51 +05:30
|
|
|
end
|
|
|
|
end
|