gitlab-org--gitlab-foss/app/controllers/projects/jobs_controller.rb

236 lines
6.8 KiB
Ruby
Raw Normal View History

# frozen_string_literal: true
class Projects::JobsController < Projects::ApplicationController
2018-03-02 21:19:17 +00:00
include SendFileUpload
include ContinueParams
2018-03-02 21:19:17 +00:00
before_action :build, except: [:index]
2018-07-05 13:55:10 +00:00
before_action :authorize_read_build!
before_action :authorize_update_build!,
except: [:index, :show, :status, :raw, :trace, :erase]
2017-11-06 13:20:44 +00:00
before_action :authorize_erase_build!, only: [:erase]
2018-12-17 18:22:03 +00:00
before_action :authorize_use_build_terminal!, only: [:terminal, :terminal_websocket_authorize]
2018-07-05 13:55:10 +00:00
before_action :verify_api_request!, only: :terminal_websocket_authorize
before_action :authorize_create_proxy_build!, only: :proxy_websocket_authorize
before_action :verify_proxy_request!, only: :proxy_websocket_authorize
layout 'project'
2015-10-14 10:15:03 +00:00
def index
# We need all builds for tabs counters
@all_builds = Ci::JobsFinder.new(current_user: current_user, project: @project).execute
2015-10-14 10:15:03 +00:00
@scope = params[:scope]
@builds = Ci::JobsFinder.new(current_user: current_user, project: @project, params: params).execute
@builds = @builds.eager_load_everything
@builds = @builds.page(params[:page]).per(30).without_count
2015-10-14 10:15:03 +00:00
end
# rubocop: disable CodeReuse/ActiveRecord
def show
2018-06-29 15:45:32 +00:00
@pipeline = @build.pipeline
@builds = @pipeline.builds
.order('id DESC')
.present(current_user: current_user)
respond_to do |format|
format.html
format.json do
Gitlab::PollingInterval.set_header(response, interval: 10_000)
render json: BuildSerializer
.new(project: @project, current_user: @current_user)
2017-05-31 20:10:00 +00:00
.represent(@build, {}, BuildDetailsEntity)
end
end
end
# rubocop: enable CodeReuse/ActiveRecord
def trace
build.trace.read do |stream|
respond_to do |format|
format.json do
build.trace.being_watched!
build_trace = Ci::BuildTrace.new(
build: @build,
stream: stream,
state: params[:state])
render json: BuildTraceSerializer
.new(project: @project, current_user: @current_user)
.represent(build_trace)
end
end
end
end
def retry
return respond_422 unless @build.retryable?
2016-06-10 21:36:54 +00:00
build = Ci::Build.retry(@build, current_user)
redirect_to build_path(build)
end
2016-07-16 16:39:58 +00:00
def play
return respond_422 unless @build.playable?
2016-07-16 16:39:58 +00:00
build = @build.play(current_user, play_params[:job_variables_attributes])
2016-07-16 16:39:58 +00:00
redirect_to build_path(build)
end
def cancel
return respond_422 unless @build.cancelable?
@build.cancel
if continue_params[:to]
redirect_to continue_params[:to]
else
redirect_to builds_project_pipeline_path(@project, @build.pipeline.id)
end
end
def unschedule
return respond_422 unless @build.scheduled?
2018-09-21 02:17:37 +00:00
@build.unschedule!
redirect_to build_path(@build)
end
def status
render json: BuildSerializer
2017-05-09 04:15:34 +00:00
.new(project: @project, current_user: @current_user)
2017-03-10 17:44:41 +00:00
.represent_status(@build)
end
def erase
if @build.erase(erased_by: current_user)
redirect_to project_job_path(project, @build),
notice: _("Job has been successfully erased!")
else
respond_422
end
end
def raw
2018-04-03 12:30:14 +00:00
if trace_artifact_file
workhorse_set_content_type!
2018-04-03 12:30:14 +00:00
send_upload(trace_artifact_file,
send_params: raw_send_params,
redirect_params: raw_redirect_params)
else
build.trace.read do |stream|
if stream.file?
workhorse_set_content_type!
2018-04-03 12:30:14 +00:00
send_file stream.path, type: 'text/plain; charset=utf-8', disposition: 'inline'
else
# In this case we can't use workhorse_set_content_type! and let
# Workhorse handle the response because the data is streamed directly
# to the user but, because we have the trace content, we can calculate
# the proper content type and disposition here.
raw_data = stream.raw
send_data raw_data, type: 'text/plain; charset=utf-8', disposition: raw_trace_content_disposition(raw_data), filename: 'job.log'
2018-04-03 12:30:14 +00:00
end
end
end
end
2018-07-05 13:55:10 +00:00
def terminal
end
# GET .../terminal.ws : implemented in gitlab-workhorse
def terminal_websocket_authorize
set_workhorse_internal_api_content_type
render json: Gitlab::Workhorse.channel_websocket(@build.terminal_specification)
2018-07-05 13:55:10 +00:00
end
def proxy_websocket_authorize
render json: proxy_websocket_service(build_service_specification)
end
private
def authorize_update_build!
return access_denied! unless can?(current_user, :update_build, build)
end
2017-11-06 13:20:44 +00:00
def authorize_erase_build!
return access_denied! unless can?(current_user, :erase_build, build)
end
2018-07-05 13:55:10 +00:00
def authorize_use_build_terminal!
return access_denied! unless can?(current_user, :create_build_terminal, build)
end
def authorize_create_proxy_build!
return access_denied! unless can?(current_user, :create_build_service_proxy, build)
end
2018-07-05 13:55:10 +00:00
def verify_api_request!
Gitlab::Workhorse.verify_api_request!(request.headers)
end
def verify_proxy_request!
verify_api_request!
set_workhorse_internal_api_content_type
end
2018-04-03 12:30:14 +00:00
def raw_send_params
{ type: 'text/plain; charset=utf-8', disposition: 'inline' }
end
def raw_redirect_params
{ query: { 'response-content-type' => 'text/plain; charset=utf-8', 'response-content-disposition' => 'inline' } }
end
def play_params
params.permit(job_variables_attributes: %i[key secret_value])
end
2018-03-01 21:30:31 +00:00
def trace_artifact_file
@trace_artifact_file ||= build.job_artifacts_trace&.file
end
def build
@build ||= project.builds.find(params[:id])
2018-06-25 17:33:12 +00:00
.present(current_user: current_user)
end
def build_path(build)
project_job_path(build.project, build)
end
def raw_trace_content_disposition(raw_data)
mime_type = MimeMagic.by_magic(raw_data)
# if mime_type is nil can also represent 'text/plain'
return 'inline' if mime_type.nil? || mime_type.type == 'text/plain'
'attachment'
end
def build_service_specification
build.service_specification(service: params['service'],
port: params['port'],
path: params['path'],
subprotocols: proxy_subprotocol)
end
def proxy_subprotocol
# This will allow to reuse the same subprotocol set
# in the original websocket connection
request.headers['HTTP_SEC_WEBSOCKET_PROTOCOL'].presence || ::Ci::BuildRunnerSession::TERMINAL_SUBPROTOCOL
end
# This method provides the information to Workhorse
# about the service we want to proxy to.
# For security reasons, in case this operation is started by JS,
# it's important to use only sourced GitLab JS code
def proxy_websocket_service(service)
service[:url] = ::Gitlab::UrlHelpers.as_wss(service[:url])
::Gitlab::Workhorse.channel_websocket(service)
end
end