1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196
|
# frozen_string_literal: true
class Projects::ArtifactsController < Projects::ApplicationController
include Ci::AuthBuildTrace
include ExtractsPath
include RendersBlob
include SendFileUpload
include Gitlab::Ci::Artifacts::Logger
urgency :low, [:browse, :file, :latest_succeeded]
layout 'project'
before_action :authorize_read_build!
before_action :authorize_read_build_trace!, only: [:download]
before_action :authorize_read_job_artifacts!, only: [:download, :browse, :raw]
before_action :authorize_update_build!, only: [:keep]
before_action :authorize_destroy_artifacts!, only: [:destroy]
before_action :extract_ref_name_and_path
before_action :validate_artifacts!, except: [:index, :download, :raw, :destroy]
before_action :entry, only: [:external_file, :file]
MAX_PER_PAGE = 20
feature_category :job_artifacts
def index; end
def destroy
notice = if artifact.destroy
_('Artifact was successfully deleted.')
else
_('Artifact could not be deleted.')
end
redirect_to project_artifacts_path(@project), status: :see_other, notice: notice
end
def download
return render_404 unless artifact_file
log_artifacts_filesize(artifact_file.model)
audit_download(build, artifact_file.filename)
send_upload(artifact_file, attachment: artifact_file.filename, proxy: params[:proxy])
end
def browse
@path = params[:path]
directory = @path ? "#{@path}/" : ''
@entry = build.artifacts_metadata_entry(directory)
render_404 unless @entry.exists?
end
# External files are redirected to Gitlab Pages and might have unsecure content
# To warn the user about the possible unsecure content, we show a warning page
# before redirecting the user.
def external_file
@blob = @entry.blob
end
def file
blob = @entry.blob
conditionally_expand_blob(blob)
if blob.external_link?(build)
if Gitlab::CurrentSettings.enable_artifact_external_redirect_warning_page
redirect_to external_file_project_job_artifacts_path(@project, @build, path: params[:path])
else
redirect_to blob.external_url(build)
end
else
respond_to do |format|
format.html do
render 'file'
end
format.json do
render_blob_json(blob)
end
end
end
end
def raw
return render_404 unless zip_artifact?
return render_404 unless artifact_file
path = Gitlab::Ci::Build::Artifacts::Path.new(params[:path])
send_artifacts_entry(artifact_file, path)
end
def keep
build.keep_artifacts!
redirect_to project_job_path(project, build)
end
def latest_succeeded
target_path = artifacts_action_path(@path, project, build)
if target_path
redirect_to(target_path)
else
render_404
end
end
private
def audit_download(build, filename)
# overridden in EE
end
def extract_ref_name_and_path
return unless params[:ref_name_and_path]
ref_extractor = ExtractsRef::RefExtractor.new(@project, {})
@ref_name, @path = ref_extractor.extract_ref(params[:ref_name_and_path])
end
def artifacts_params
params.permit(:sort)
end
def validate_artifacts!
render_404 unless build&.available_artifacts?
end
def build
@build ||= begin
build = build_from_id || build_from_sha || build_from_ref
build&.present(current_user: current_user)
end
end
def artifact
@artifact ||=
project.job_artifacts.find(params[:id])
end
def build_from_id
project.builds.find_by_id(params[:job_id]) if params[:job_id]
end
def build_from_sha
return if params[:job].blank?
return unless @ref_name
commit = project.commit(@ref_name)
return unless commit
project.latest_successful_build_for_sha(params[:job], commit.id)
end
def build_from_ref
return if params[:job].blank?
return unless @ref_name
project.latest_successful_build_for_ref(params[:job], @ref_name)
end
def job_artifact
@job_artifact ||= build&.artifact_for_type(params[:file_type] || :archive)
end
def artifact_file
@artifact_file ||= job_artifact&.file
end
def zip_artifact?
types = HashWithIndifferentAccess.new(Enums::Ci::JobArtifact.type_and_format_pairs)
file_type = params[:file_type] || :archive
types[file_type] == :zip
end
def entry
@entry = build.artifacts_metadata_entry(params[:path])
render_404 unless @entry.exists?
end
def authorize_read_build_trace!
return unless params[:file_type] == 'trace'
super
end
def authorize_read_job_artifacts!
access_denied! unless can?(current_user, :read_job_artifacts, job_artifact)
end
end
Projects::ArtifactsController.prepend_mod
|