1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77
|
# frozen_string_literal: true
class Projects::RefsController < Projects::ApplicationController
include ExtractsPath
include TreeHelper
around_action :allow_gitaly_ref_name_caching, only: [:logs_tree]
before_action :require_non_empty_project
before_action :validate_ref_id
before_action :assign_ref_vars
before_action :authorize_read_code!
feature_category :source_code_management
urgency :low, [:switch, :logs_tree]
def switch
Gitlab::PathTraversal.check_path_traversal!(@id)
respond_to do |format|
format.html do
new_path =
case permitted_params[:destination]
when "tree"
project_tree_path(@project, @id)
when "blob"
project_blob_path(@project, @id)
when "graph"
project_network_path(@project, @id, ref_type: ref_type)
when "graphs"
project_graph_path(@project, @id, ref_type: ref_type)
when "find_file"
project_find_file_path(@project, @id)
when "graphs_commits"
commits_project_graph_path(@project, @id)
when "badges"
project_settings_ci_cd_path(@project, ref: @id)
else
project_commits_path(@project, @id, ref_type: ref_type)
end
redirect_to new_path
end
end
rescue Gitlab::PathTraversal::PathTraversalAttackError, ActionController::UrlGenerationError
head :bad_request
end
def logs_tree
respond_to do |format|
format.json do
logs, next_offset = tree_summary.fetch_logs
response.headers["More-Logs-Offset"] = next_offset.to_s if next_offset
render json: logs
end
end
end
private
def tree_summary
::Gitlab::TreeSummary.new(
@commit, @project, current_user,
path: @path, offset: permitted_params[:offset], limit: 25
)
end
def validate_ref_id
not_found if permitted_params[:id].present? && permitted_params[:id] !~ Gitlab::PathRegex.git_reference_regex
end
def permitted_params
params.permit(:id, :offset, :destination)
end
end
|