# frozen_string_literal: true module Ci class JobArtifact < ApplicationRecord include AfterCommitQueue include ObjectStorage::BackgroundMove include UpdateProjectStatistics include UsageStatistics include Sortable include IgnorableColumns include Artifactable include FileStoreMounter extend Gitlab::Ci::Model ignore_columns :locked, remove_after: '2020-07-22', remove_with: '13.4' TEST_REPORT_FILE_TYPES = %w[junit].freeze COVERAGE_REPORT_FILE_TYPES = %w[cobertura].freeze ACCESSIBILITY_REPORT_FILE_TYPES = %w[accessibility].freeze NON_ERASABLE_FILE_TYPES = %w[trace].freeze TERRAFORM_REPORT_FILE_TYPES = %w[terraform].freeze UNSUPPORTED_FILE_TYPES = %i[license_management].freeze DEFAULT_FILE_NAMES = { archive: nil, metadata: nil, trace: nil, metrics_referee: nil, network_referee: nil, junit: 'junit.xml', accessibility: 'gl-accessibility.json', codequality: 'gl-code-quality-report.json', sast: 'gl-sast-report.json', secret_detection: 'gl-secret-detection-report.json', dependency_scanning: 'gl-dependency-scanning-report.json', container_scanning: 'gl-container-scanning-report.json', dast: 'gl-dast-report.json', license_management: 'gl-license-management-report.json', license_scanning: 'gl-license-scanning-report.json', performance: 'performance.json', browser_performance: 'browser-performance.json', load_performance: 'load-performance.json', metrics: 'metrics.txt', lsif: 'lsif.json', dotenv: '.env', cobertura: 'cobertura-coverage.xml', terraform: 'tfplan.json', cluster_applications: 'gl-cluster-applications.json', requirements: 'requirements.json', coverage_fuzzing: 'gl-coverage-fuzzing.json', api_fuzzing: 'gl-api-fuzzing-report.json' }.freeze INTERNAL_TYPES = { archive: :zip, metadata: :gzip, trace: :raw }.freeze REPORT_TYPES = { junit: :gzip, metrics: :gzip, metrics_referee: :gzip, network_referee: :gzip, dotenv: :gzip, cobertura: :gzip, cluster_applications: :gzip, lsif: :zip, # Security reports and license scanning reports are raw artifacts # because they used to be fetched by the frontend, but this is not the case anymore. sast: :raw, secret_detection: :raw, dependency_scanning: :raw, container_scanning: :raw, dast: :raw, license_management: :raw, license_scanning: :raw, # All these file formats use `raw` as we need to store them uncompressed # for Frontend to fetch the files and do analysis # When they will be only used by backend, they can be `gzipped`. accessibility: :raw, codequality: :raw, performance: :raw, browser_performance: :raw, load_performance: :raw, terraform: :raw, requirements: :raw, coverage_fuzzing: :raw, api_fuzzing: :raw }.freeze DOWNLOADABLE_TYPES = %w[ accessibility api_fuzzing archive cobertura codequality container_scanning dast dependency_scanning dotenv junit license_management license_scanning lsif metrics performance browser_performance load_performance sast secret_detection requirements ].freeze TYPE_AND_FORMAT_PAIRS = INTERNAL_TYPES.merge(REPORT_TYPES).freeze PLAN_LIMIT_PREFIX = 'ci_max_artifact_size_' belongs_to :project belongs_to :job, class_name: "Ci::Build", foreign_key: :job_id mount_file_store_uploader JobArtifactUploader validates :file_format, presence: true, unless: :trace?, on: :create validate :validate_supported_file_format!, on: :create validate :validate_file_format!, unless: :trace?, on: :create before_save :set_size, if: :file_changed? update_project_statistics project_statistics_name: :build_artifacts_size scope :not_expired, -> { where('expire_at IS NULL OR expire_at > ?', Time.current) } scope :with_files_stored_locally, -> { where(file_store: ::JobArtifactUploader::Store::LOCAL) } scope :with_files_stored_remotely, -> { where(file_store: ::JobArtifactUploader::Store::REMOTE) } scope :for_sha, ->(sha, project_id) { joins(job: :pipeline).where(ci_pipelines: { sha: sha, project_id: project_id }) } scope :for_job_name, ->(name) { joins(:job).where(ci_builds: { name: name }) } scope :with_file_types, -> (file_types) do types = self.file_types.select { |file_type| file_types.include?(file_type) }.values where(file_type: types) end scope :with_reports, -> do with_file_types(REPORT_TYPES.keys.map(&:to_s)) end scope :test_reports, -> do with_file_types(TEST_REPORT_FILE_TYPES) end scope :accessibility_reports, -> do with_file_types(ACCESSIBILITY_REPORT_FILE_TYPES) end scope :coverage_reports, -> do with_file_types(COVERAGE_REPORT_FILE_TYPES) end scope :terraform_reports, -> do with_file_types(TERRAFORM_REPORT_FILE_TYPES) end scope :erasable, -> do types = self.file_types.reject { |file_type| NON_ERASABLE_FILE_TYPES.include?(file_type) }.values where(file_type: types) end scope :downloadable, -> { where(file_type: DOWNLOADABLE_TYPES) } scope :unlocked, -> { joins(job: :pipeline).merge(::Ci::Pipeline.unlocked).order(expire_at: :desc) } scope :with_destroy_preloads, -> { includes(project: [:route, :statistics]) } scope :scoped_project, -> { where('ci_job_artifacts.project_id = projects.id') } delegate :filename, :exists?, :open, to: :file enum file_type: { archive: 1, metadata: 2, trace: 3, junit: 4, sast: 5, ## EE-specific dependency_scanning: 6, ## EE-specific container_scanning: 7, ## EE-specific dast: 8, ## EE-specific codequality: 9, ## EE-specific license_management: 10, ## EE-specific license_scanning: 101, ## EE-specific till 13.0 performance: 11, ## EE-specific till 13.2 metrics: 12, ## EE-specific metrics_referee: 13, ## runner referees network_referee: 14, ## runner referees lsif: 15, # LSIF data for code navigation dotenv: 16, cobertura: 17, terraform: 18, # Transformed json accessibility: 19, cluster_applications: 20, secret_detection: 21, ## EE-specific requirements: 22, ## EE-specific coverage_fuzzing: 23, ## EE-specific browser_performance: 24, ## EE-specific load_performance: 25, ## EE-specific api_fuzzing: 26 ## EE-specific } # `file_location` indicates where actual files are stored. # Ideally, actual files should be stored in the same directory, and use the same # convention to generate its path. However, sometimes we can't do so due to backward-compatibility. # # legacy_path ... The actual file is stored at a path consists of a timestamp # and raw project/model IDs. Those rows were migrated from # `ci_builds.artifacts_file` and `ci_builds.artifacts_metadata` # hashed_path ... The actual file is stored at a path consists of a SHA2 based on the project ID. # This is the default value. enum file_location: { legacy_path: 1, hashed_path: 2 } def validate_supported_file_format! return if Feature.disabled?(:drop_license_management_artifact, project, default_enabled: true) if UNSUPPORTED_FILE_TYPES.include?(self.file_type&.to_sym) errors.add(:base, _("File format is no longer supported")) end end def validate_file_format! unless TYPE_AND_FORMAT_PAIRS[self.file_type&.to_sym] == self.file_format&.to_sym errors.add(:base, _('Invalid file format with specified file type')) end end def self.associated_file_types_for(file_type) return unless file_types.include?(file_type) [file_type] end def self.total_size self.sum(:size) end def self.artifacts_size_for(project) self.where(project: project).sum(:size) end def local_store? [nil, ::JobArtifactUploader::Store::LOCAL].include?(self.file_store) end def hashed_path? return true if trace? # ArchiveLegacyTraces background migration might not have `file_location` column super || self.file_location.nil? end def expired? expire_at.present? && expire_at < Time.current end def expiring? expire_at.present? && expire_at > Time.current end def expire_in expire_at - Time.current if expire_at end def expire_in=(value) self.expire_at = if value ::Gitlab::Ci::Build::Artifacts::ExpireInParser.new(value).seconds_from_now end end def self.archived_trace_exists_for?(job_id) where(job_id: job_id).trace.take&.file&.file&.exists? end def self.max_artifact_size(type:, project:) limit_name = "#{PLAN_LIMIT_PREFIX}#{type}" max_size = project.actual_limits.limit_for( limit_name, alternate_limit: -> { project.closest_setting(:max_artifacts_size) } ) max_size&.megabytes.to_i end def to_deleted_object_attrs { file_store: file_store, store_dir: file.store_dir.to_s, file: file_identifier, pick_up_at: expire_at || Time.current } end private def set_size self.size = file.size end def project_destroyed? # Use job.project to avoid extra DB query for project job.project.pending_delete? end end end Ci::JobArtifact.prepend_if_ee('EE::Ci::JobArtifact')