debian-mirror-gitlab/lib/gitlab/workhorse.rb

140 lines
3.6 KiB
Ruby
Raw Normal View History

2016-04-02 18:10:28 +05:30
require 'base64'
require 'json'
2016-09-29 09:46:39 +05:30
require 'securerandom'
2016-04-02 18:10:28 +05:30
module Gitlab
class Workhorse
2016-06-02 11:05:42 +05:30
SEND_DATA_HEADER = 'Gitlab-Workhorse-Send-Data'
2016-09-13 17:45:13 +05:30
VERSION_FILE = 'GITLAB_WORKHORSE_VERSION'
2016-09-29 09:46:39 +05:30
INTERNAL_API_CONTENT_TYPE = 'application/vnd.gitlab-workhorse+json'
INTERNAL_API_REQUEST_HEADER = 'Gitlab-Workhorse-Api-Request'
# Supposedly the effective key size for HMAC-SHA256 is 256 bits, i.e. 32
# bytes https://tools.ietf.org/html/rfc4868#section-2.6
SECRET_LENGTH = 32
2016-06-02 11:05:42 +05:30
2016-04-02 18:10:28 +05:30
class << self
def git_http_ok(repository, user)
{
2016-09-29 09:46:39 +05:30
GL_ID: Gitlab::GlId.gl_id(user),
RepoPath: repository.path_to_repo,
}
end
2016-09-29 09:46:39 +05:30
def lfs_upload_ok(oid, size)
{
StoreLFSPath: "#{Gitlab.config.lfs.storage_path}/tmp/upload",
LfsOid: oid,
LfsSize: size,
}
end
def artifact_upload_ok
{ TempPath: ArtifactUploader.artifacts_upload_path }
end
2016-04-02 18:10:28 +05:30
def send_git_blob(repository, blob)
2016-06-02 11:05:42 +05:30
params = {
2016-04-02 18:10:28 +05:30
'RepoPath' => repository.path_to_repo,
'BlobId' => blob.id,
}
[
2016-06-02 11:05:42 +05:30
SEND_DATA_HEADER,
"git-blob:#{encode(params)}"
2016-04-02 18:10:28 +05:30
]
end
2016-06-02 11:05:42 +05:30
def send_git_archive(repository, ref:, format:)
2016-06-02 11:05:42 +05:30
format ||= 'tar.gz'
format.downcase!
params = repository.archive_metadata(ref, Gitlab.config.gitlab.repository_downloads_path, format)
2016-06-02 11:05:42 +05:30
raise "Repository or ref not found" if params.empty?
[
SEND_DATA_HEADER,
"git-archive:#{encode(params)}"
2016-06-02 11:05:42 +05:30
]
end
def send_git_diff(repository, diff_refs)
params = {
'RepoPath' => repository.path_to_repo,
2016-11-03 12:29:30 +05:30
'ShaFrom' => diff_refs.base_sha,
2016-08-24 12:49:21 +05:30
'ShaTo' => diff_refs.head_sha
}
[
SEND_DATA_HEADER,
"git-diff:#{encode(params)}"
]
end
2016-08-24 12:49:21 +05:30
def send_git_patch(repository, diff_refs)
params = {
'RepoPath' => repository.path_to_repo,
2016-11-03 12:29:30 +05:30
'ShaFrom' => diff_refs.base_sha,
2016-08-24 12:49:21 +05:30
'ShaTo' => diff_refs.head_sha
}
[
SEND_DATA_HEADER,
"git-format-patch:#{encode(params)}"
]
end
def send_artifacts_entry(build, entry)
params = {
'Archive' => build.artifacts_file.path,
'Entry' => Base64.encode64(entry.path)
}
[
SEND_DATA_HEADER,
"artifacts-entry:#{encode(params)}"
]
end
2016-09-13 17:45:13 +05:30
def version
path = Rails.root.join(VERSION_FILE)
path.readable? ? path.read.chomp : 'unknown'
end
2016-09-29 09:46:39 +05:30
def secret
@secret ||= begin
bytes = Base64.strict_decode64(File.read(secret_path).chomp)
raise "#{secret_path} does not contain #{SECRET_LENGTH} bytes" if bytes.length != SECRET_LENGTH
bytes
end
end
2016-11-03 12:29:30 +05:30
2016-09-29 09:46:39 +05:30
def write_secret
bytes = SecureRandom.random_bytes(SECRET_LENGTH)
2016-11-03 12:29:30 +05:30
File.open(secret_path, 'w:BINARY', 0600) do |f|
f.chmod(0600) # If the file already existed, the '0600' passed to 'open' above was a no-op.
2016-09-29 09:46:39 +05:30
f.write(Base64.strict_encode64(bytes))
end
end
2016-11-03 12:29:30 +05:30
2016-09-29 09:46:39 +05:30
def verify_api_request!(request_headers)
JWT.decode(
request_headers[INTERNAL_API_REQUEST_HEADER],
secret,
true,
{ iss: 'gitlab-workhorse', verify_iss: true, algorithm: 'HS256' },
)
end
def secret_path
Rails.root.join('.gitlab_workhorse_secret')
end
2016-11-03 12:29:30 +05:30
2016-06-02 11:05:42 +05:30
protected
2016-06-02 11:05:42 +05:30
def encode(hash)
Base64.urlsafe_encode64(JSON.dump(hash))
end
2016-04-02 18:10:28 +05:30
end
end
end