debian-mirror-gitlab/app/controllers/import/bulk_imports_controller.rb

136 lines
2.9 KiB
Ruby
Raw Normal View History

2021-01-03 14:25:43 +05:30
# frozen_string_literal: true
class Import::BulkImportsController < ApplicationController
before_action :ensure_group_import_enabled
before_action :verify_blocked_uri, only: :status
feature_category :importers
2021-01-29 00:20:46 +05:30
rescue_from BulkImports::Clients::Http::ConnectionError, with: :bulk_import_connection_error
2021-01-03 14:25:43 +05:30
def configure
2021-01-29 00:20:46 +05:30
session[access_token_key] = configure_params[access_token_key]&.strip
session[url_key] = configure_params[url_key]
2021-01-03 14:25:43 +05:30
2021-01-29 00:20:46 +05:30
redirect_to status_import_bulk_imports_url
2021-01-03 14:25:43 +05:30
end
def status
respond_to do |format|
format.json do
render json: { importable_data: serialized_importable_data }
end
format.html
end
end
2021-01-29 00:20:46 +05:30
def create
BulkImportService.new(current_user, create_params, credentials).execute
render json: :ok
end
2021-01-03 14:25:43 +05:30
private
def serialized_importable_data
serializer.represent(importable_data, {}, Import::BulkImportEntity)
end
def serializer
@serializer ||= BaseSerializer.new(current_user: current_user)
end
def importable_data
2021-01-29 00:20:46 +05:30
client.get('groups', top_level_only: true).parsed_response
2021-01-03 14:25:43 +05:30
end
def client
2021-01-29 00:20:46 +05:30
@client ||= BulkImports::Clients::Http.new(
2021-01-03 14:25:43 +05:30
uri: session[url_key],
token: session[access_token_key]
)
end
2021-01-29 00:20:46 +05:30
def configure_params
2021-01-03 14:25:43 +05:30
params.permit(access_token_key, url_key)
end
2021-01-29 00:20:46 +05:30
def create_params
params.permit(:bulk_import, [*bulk_import_params])
end
def bulk_import_params
%i[
source_type
source_full_path
destination_name
destination_namespace
]
end
2021-01-03 14:25:43 +05:30
def ensure_group_import_enabled
render_404 unless Feature.enabled?(:bulk_import)
end
def access_token_key
:bulk_import_gitlab_access_token
end
def url_key
:bulk_import_gitlab_url
end
def verify_blocked_uri
Gitlab::UrlBlocker.validate!(
session[url_key],
**{
allow_localhost: allow_local_requests?,
allow_local_network: allow_local_requests?,
schemes: %w(http https)
}
)
rescue Gitlab::UrlBlocker::BlockedUrlError => e
clear_session_data
redirect_to new_group_path, alert: _('Specified URL cannot be used: "%{reason}"') % { reason: e.message }
end
def allow_local_requests?
Gitlab::CurrentSettings.allow_local_requests_from_web_hooks_and_services?
end
def bulk_import_connection_error(error)
clear_session_data
error_message = _("Unable to connect to server: %{error}") % { error: error }
flash[:alert] = error_message
respond_to do |format|
format.json do
render json: {
error: {
message: error_message,
redirect: new_group_path
}
}, status: :unprocessable_entity
end
format.html do
redirect_to new_group_path
end
end
end
def clear_session_data
session[url_key] = nil
session[access_token_key] = nil
end
2021-01-29 00:20:46 +05:30
def credentials
{
url: session[url_key],
access_token: [access_token_key]
}
end
2021-01-03 14:25:43 +05:30
end