60 lines
1.7 KiB
Ruby
60 lines
1.7 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
module Terraform
|
|
class StateUploader < GitlabUploader
|
|
include ObjectStorage::Concern
|
|
|
|
storage_location :terraform_state
|
|
|
|
# TODO: Remove this line
|
|
# See https://gitlab.com/gitlab-org/gitlab/-/issues/232917
|
|
alias_method :upload, :model
|
|
|
|
delegate :terraform_state, :project_id, to: :model
|
|
|
|
# Use Lockbox to encrypt/decrypt the stored file (registers CarrierWave callbacks)
|
|
encrypt(key: :key)
|
|
|
|
def filename
|
|
# This check is required to maintain backwards compatibility with
|
|
# states that were created prior to versioning being supported.
|
|
# This can be removed in 14.0 when support for these states is dropped.
|
|
# See https://gitlab.com/gitlab-org/gitlab/-/issues/258960
|
|
if terraform_state.versioning_enabled?
|
|
"#{model.version}.tfstate"
|
|
else
|
|
"#{model.uuid}.tfstate"
|
|
end
|
|
end
|
|
|
|
def store_dir
|
|
# This check is required to maintain backwards compatibility with
|
|
# states that were created prior to versioning being supported.
|
|
# This can be removed in 14.0 when support for these states is dropped.
|
|
# See https://gitlab.com/gitlab-org/gitlab/-/issues/258960
|
|
if terraform_state.versioning_enabled?
|
|
Gitlab::HashedPath.new(model.uuid, root_hash: project_id)
|
|
else
|
|
project_id.to_s
|
|
end
|
|
end
|
|
|
|
def key
|
|
OpenSSL::HMAC.digest('SHA256', Gitlab::Application.secrets.db_key_base, project_id.to_s)
|
|
end
|
|
|
|
class << self
|
|
def direct_upload_enabled?
|
|
false
|
|
end
|
|
|
|
def proxy_download_enabled?
|
|
true
|
|
end
|
|
|
|
def default_store
|
|
object_store_enabled? ? ObjectStorage::Store::REMOTE : ObjectStorage::Store::LOCAL
|
|
end
|
|
end
|
|
end
|
|
end
|