gitlab-org--gitlab-foss/app/services/ci/create_pipeline_service.rb

189 lines
4.9 KiB
Ruby
Raw Normal View History

2016-05-09 19:26:13 -04:00
module Ci
class CreatePipelineService < BaseService
attr_reader :pipeline
2017-05-24 09:13:51 -04:00
def execute(source, ignore_skip_ci: false, save_on_errors: true, trigger_request: nil, schedule: nil)
@pipeline = Ci::Pipeline.new(
2017-05-24 09:13:51 -04:00
source: source,
project: project,
ref: ref,
sha: sha,
before_sha: before_sha,
tag: tag?,
trigger_requests: Array(trigger_request),
user: current_user,
pipeline_schedule: schedule
)
result = validate(current_user || trigger_request.trigger.owner,
ignore_skip_ci: ignore_skip_ci,
save_on_errors: save_on_errors)
2017-07-26 09:58:31 -04:00
return result if result
begin
2017-07-26 05:31:09 -04:00
Ci::Pipeline.transaction do
pipeline.save!
2017-07-21 05:49:32 -04:00
2017-07-26 05:31:09 -04:00
yield(pipeline) if block_given?
Ci::CreatePipelineStagesService
.new(project, current_user)
.execute(pipeline)
end
rescue ActiveRecord::RecordInvalid => e
return error("Failed to persist the pipeline: #{e}")
2017-07-21 05:49:32 -04:00
end
2017-07-26 05:31:09 -04:00
update_merge_requests_head_pipeline
2017-07-21 05:49:32 -04:00
cancel_pending_pipelines if project.auto_cancel_pending_pipelines?
pipeline_created_counter.increment(source: source)
pipeline.tap(&:process!)
end
private
def validate(triggering_user, ignore_skip_ci:, save_on_errors:)
unless project.builds_enabled?
return error('Pipeline is disabled')
end
unless allowed_to_trigger_pipeline?(triggering_user)
if can?(triggering_user, :create_pipeline, project)
return error("Insufficient permissions for protected ref '#{ref}'")
else
return error('Insufficient permissions to create a new pipeline')
end
2016-05-09 19:26:13 -04:00
end
unless branch? || tag?
return error('Reference not found')
end
unless commit
return error('Commit not found')
2016-05-09 19:26:13 -04:00
end
unless pipeline.config_processor
unless pipeline.ci_yaml_file
return error("Missing #{pipeline.ci_yaml_file_path} file")
end
return error(pipeline.yaml_errors, save: save_on_errors)
end
2016-05-14 20:47:16 -04:00
if !ignore_skip_ci && skip_ci?
pipeline.skip if save_on_errors
2017-07-27 02:52:55 -04:00
raise InsufficientConditionError, pipeline
end
2016-05-09 19:26:13 -04:00
unless pipeline.has_stage_seeds?
return error('No stages / jobs for this pipeline.')
2016-05-09 19:26:13 -04:00
end
end
def allowed_to_trigger_pipeline?(triggering_user)
2017-07-06 05:37:27 -04:00
if triggering_user
allowed_to_create?(triggering_user)
else # legacy triggers don't have a corresponding user
2017-07-03 17:20:44 -04:00
!project.protected_for?(ref)
2017-07-06 05:37:27 -04:00
end
2017-07-03 17:20:44 -04:00
end
def allowed_to_create?(triggering_user)
access = Gitlab::UserAccess.new(triggering_user, project: project)
can?(triggering_user, :create_pipeline, project) &&
if branch?
access.can_update_branch?(ref)
elsif tag?
access.can_create_tag?(ref)
else
true # Allow it for now and we'll reject when we check ref existence
end
end
def update_merge_requests_head_pipeline
return unless pipeline.latest?
2017-06-21 09:48:12 -04:00
MergeRequest.where(source_project: @pipeline.project, source_branch: @pipeline.ref)
.update_all(head_pipeline_id: @pipeline.id)
end
def skip_ci?
return false unless pipeline.git_commit_message
pipeline.git_commit_message =~ /\[(ci[ _-]skip|skip[ _-]ci)\]/i
2016-05-09 19:26:13 -04:00
end
def cancel_pending_pipelines
Gitlab::OptimisticLocking.retry_lock(auto_cancelable_pipelines) do |cancelables|
cancelables.find_each do |cancelable|
cancelable.auto_cancel_running(pipeline)
end
end
end
def auto_cancelable_pipelines
project.pipelines
.where(ref: pipeline.ref)
.where.not(id: pipeline.id)
.where.not(sha: project.repository.sha_from_ref(pipeline.ref))
.created_or_pending
end
2016-05-09 19:26:13 -04:00
def commit
@commit ||= project.commit(origin_sha || origin_ref)
end
def sha
commit.try(:id)
end
def before_sha
params[:checkout_sha] || params[:before] || Gitlab::Git::BLANK_SHA
end
def origin_sha
params[:checkout_sha] || params[:after]
end
def origin_ref
params[:ref]
end
def branch?
return @is_branch if defined?(@is_branch)
@is_branch =
project.repository.ref_exists?(Gitlab::Git::BRANCH_REF_PREFIX + ref)
end
def tag?
return @is_tag if defined?(@is_tag)
@is_tag =
project.repository.ref_exists?(Gitlab::Git::TAG_REF_PREFIX + ref)
end
def ref
@ref ||= Gitlab::Git.ref_name(origin_ref)
end
def valid_sha?
origin_sha && origin_sha != Gitlab::Git::BLANK_SHA
end
def error(message, save: false)
pipeline.errors.add(:base, message)
pipeline.drop if save
pipeline
2016-05-09 19:26:13 -04:00
end
def pipeline_created_counter
@pipeline_created_counter ||= Gitlab::Metrics.counter(:pipelines_created_total, "Counter of pipelines created")
end
2016-05-09 19:26:13 -04:00
end
2016-05-12 14:08:18 -04:00
end