debian-mirror-gitlab/lib/api/helpers/internal_helpers.rb

122 lines
3.5 KiB
Ruby
Raw Normal View History

2018-12-05 23:21:45 +05:30
# frozen_string_literal: true
2017-08-17 22:00:37 +05:30
module API
module Helpers
module InternalHelpers
2018-03-17 18:26:18 +05:30
attr_reader :redirected_path
2017-09-10 17:25:29 +05:30
2019-07-07 11:18:12 +05:30
delegate :wiki?, to: :repo_type
2020-01-01 13:55:28 +05:30
def actor
@actor ||= Support::GitAccessActor.from_params(params)
end
2019-07-07 11:18:12 +05:30
def repo_type
set_project unless defined?(@repo_type) # rubocop:disable Gitlab/ModuleWithInstanceVariables
@repo_type # rubocop:disable Gitlab/ModuleWithInstanceVariables
2017-08-17 22:00:37 +05:30
end
def project
2018-03-17 18:26:18 +05:30
set_project unless defined?(@project) # rubocop:disable Gitlab/ModuleWithInstanceVariables
@project # rubocop:disable Gitlab/ModuleWithInstanceVariables
2017-09-10 17:25:29 +05:30
end
2019-12-04 20:38:33 +05:30
def access_checker_for(actor, protocol)
access_checker_klass.new(actor.key_or_user, project, protocol,
authentication_abilities: ssh_authentication_abilities,
namespace_path: namespace_path,
project_path: project_path,
redirected_path: redirected_path)
end
def access_checker_klass
repo_type.access_checker_class
end
2017-08-17 22:00:37 +05:30
def ssh_authentication_abilities
[
:read_project,
:download_code,
:push_code
]
end
def parse_env
return {} if params[:env].blank?
JSON.parse(params[:env])
rescue JSON::ParserError
{}
end
def log_user_activity(actor)
commands = Gitlab::GitAccess::DOWNLOAD_COMMANDS
2020-03-09 13:42:32 +05:30
::Users::ActivityService.new(actor).execute if commands.include?(params[:action])
2019-07-07 11:18:12 +05:30
end
2018-03-17 18:26:18 +05:30
def redis_ping
result = Gitlab::Redis::SharedState.with { |redis| redis.ping }
result == 'PONG'
rescue => e
2019-09-30 21:07:59 +05:30
Rails.logger.warn("GitLab: An unexpected error occurred in pinging to Redis: #{e}") # rubocop:disable Gitlab/RailsLogger
2018-03-17 18:26:18 +05:30
false
end
def project_path
project&.path || project_path_match[:project_path]
end
def namespace_path
project&.namespace&.full_path || project_path_match[:namespace_path]
end
2017-08-17 22:00:37 +05:30
private
2018-03-17 18:26:18 +05:30
def project_path_match
@project_path_match ||= params[:project].match(Gitlab::PathRegex.full_project_git_path_regex) || {}
end
# rubocop:disable Gitlab/ModuleWithInstanceVariables
2017-08-17 22:00:37 +05:30
def set_project
2020-03-09 13:42:32 +05:30
@project, @repo_type, @redirected_path =
if params[:gl_repository]
Gitlab::GlRepository.parse(params[:gl_repository])
elsif params[:project]
Gitlab::RepoPath.parse(params[:project])
end
2017-09-10 17:25:29 +05:30
end
2018-03-17 18:26:18 +05:30
# rubocop:enable Gitlab/ModuleWithInstanceVariables
2017-09-10 17:25:29 +05:30
# Project id to pass between components that don't share/don't have
# access to the same filesystem mounts
def gl_repository
2020-03-09 13:42:32 +05:30
repo_type.identifier_for_container(project)
2019-07-07 11:18:12 +05:30
end
def gl_project_path
2020-03-09 13:42:32 +05:30
repository.full_path
2017-09-10 17:25:29 +05:30
end
# Return the repository depending on whether we want the wiki or the
# regular repository
def repository
2020-03-09 13:42:32 +05:30
@repository ||= repo_type.repository_for(project)
2017-08-17 22:00:37 +05:30
end
2017-09-10 17:25:29 +05:30
# Return the Gitaly Address if it is enabled
def gitaly_payload(action)
2018-05-09 12:01:36 +05:30
return unless %w[git-receive-pack git-upload-pack git-upload-archive].include?(action)
2018-03-17 18:26:18 +05:30
2017-09-10 17:25:29 +05:30
{
repository: repository.gitaly_repository,
address: Gitlab::GitalyClient.address(project.repository_storage),
2019-12-26 22:10:19 +05:30
token: Gitlab::GitalyClient.token(project.repository_storage),
features: Feature::Gitaly.server_feature_flags
2017-09-10 17:25:29 +05:30
}
end
2017-08-17 22:00:37 +05:30
end
end
end