debian-mirror-gitlab/app/models/upload.rb

128 lines
3 KiB
Ruby
Raw Normal View History

2018-11-18 11:00:15 +05:30
# frozen_string_literal: true
2019-07-07 11:18:12 +05:30
class Upload < ApplicationRecord
2017-08-17 22:00:37 +05:30
# Upper limit for foreground checksum processing
CHECKSUM_THRESHOLD = 100.megabytes
2017-09-10 17:25:29 +05:30
belongs_to :model, polymorphic: true # rubocop:disable Cop/PolymorphicAssociations
2017-08-17 22:00:37 +05:30
validates :size, presence: true
validates :path, presence: true
validates :model, presence: true
validates :uploader, presence: true
2018-12-13 13:39:08 +05:30
scope :with_files_stored_locally, -> { where(store: ObjectStorage::Store::LOCAL) }
scope :with_files_stored_remotely, -> { where(store: ObjectStorage::Store::REMOTE) }
2018-05-09 12:01:36 +05:30
2018-03-17 18:26:18 +05:30
before_save :calculate_checksum!, if: :foreground_checksummable?
after_commit :schedule_checksum, if: :checksummable?
2017-08-17 22:00:37 +05:30
2018-03-17 18:26:18 +05:30
# as the FileUploader is not mounted, the default CarrierWave ActiveRecord
# hooks are not executed and the file will not be deleted
after_destroy :delete_file!, if: -> { uploader_class <= FileUploader }
2017-08-17 22:00:37 +05:30
2018-03-17 18:26:18 +05:30
def self.hexdigest(path)
Digest::SHA256.file(path).hexdigest
2017-08-17 22:00:37 +05:30
end
2019-02-15 15:39:39 +05:30
class << self
##
# FastDestroyAll concerns
def begin_fast_destroy
{
Uploads::Local => Uploads::Local.new.keys(with_files_stored_locally),
Uploads::Fog => Uploads::Fog.new.keys(with_files_stored_remotely)
}
end
##
# FastDestroyAll concerns
def finalize_fast_destroy(keys)
keys.each do |store_class, paths|
store_class.new.delete_keys_async(paths)
end
end
end
2017-08-17 22:00:37 +05:30
def absolute_path
2019-07-31 22:56:46 +05:30
raise ObjectStorage::RemoteStoreError, _("Remote object has no absolute path.") unless local?
2017-08-17 22:00:37 +05:30
return path unless relative_path?
uploader_class.absolute_path(self)
end
2018-03-17 18:26:18 +05:30
def calculate_checksum!
self.checksum = nil
return unless checksummable?
2018-05-09 12:01:36 +05:30
self.checksum = Digest::SHA256.file(absolute_path).hexdigest
2018-03-17 18:26:18 +05:30
end
2017-08-17 22:00:37 +05:30
2018-05-09 12:01:36 +05:30
def build_uploader(mounted_as = nil)
uploader_class.new(model, mounted_as || mount_point).tap do |uploader|
2018-03-17 18:26:18 +05:30
uploader.upload = self
uploader.retrieve_from_store!(identifier)
end
2017-08-17 22:00:37 +05:30
end
def exist?
2018-12-13 13:39:08 +05:30
exist = File.exist?(absolute_path)
# Help sysadmins find missing upload files
if persisted? && !exist
if Gitlab::Sentry.enabled?
2019-07-31 22:56:46 +05:30
Raven.capture_message(_("Upload file does not exist"), extra: self.attributes)
2018-12-13 13:39:08 +05:30
end
2019-07-31 22:56:46 +05:30
Gitlab::Metrics.counter(:upload_file_does_not_exist_total, _('The number of times an upload record could not find its file')).increment
2018-12-13 13:39:08 +05:30
end
exist
2017-08-17 22:00:37 +05:30
end
2018-03-17 18:26:18 +05:30
def uploader_context
{
identifier: identifier,
secret: secret
}.compact
end
2018-05-09 12:01:36 +05:30
def local?
store == ObjectStorage::Store::LOCAL
end
2017-08-17 22:00:37 +05:30
private
2018-03-17 18:26:18 +05:30
def delete_file!
build_uploader.remove!
end
def checksummable?
checksum.nil? && local? && exist?
end
def foreground_checksummable?
checksummable? && size <= CHECKSUM_THRESHOLD
2017-08-17 22:00:37 +05:30
end
def schedule_checksum
UploadChecksumWorker.perform_async(id)
end
def relative_path?
!path.start_with?('/')
end
def uploader_class
Object.const_get(uploader)
end
2018-03-17 18:26:18 +05:30
def identifier
File.basename(path)
end
def mount_point
super&.to_sym
end
2017-08-17 22:00:37 +05:30
end