gitlab-org--gitlab-foss/lib/gitlab/import_export/uploads_manager.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

97 lines
2.6 KiB
Ruby
Raw Normal View History

# frozen_string_literal: true
2018-07-10 05:40:39 -04:00
module Gitlab
module ImportExport
class UploadsManager
include Gitlab::ImportExport::CommandLineUtil
UPLOADS_BATCH_SIZE = 100
def initialize(project:, shared:, relative_export_path: 'uploads')
2018-07-10 05:40:39 -04:00
@project = project
@shared = shared
@relative_export_path = relative_export_path
end
2018-07-11 04:24:59 -04:00
def save
copy_project_uploads
2018-07-10 10:33:40 -04:00
true
rescue StandardError => e
2018-07-10 10:33:40 -04:00
@shared.error(e)
false
2018-07-10 05:40:39 -04:00
end
2018-07-11 04:24:59 -04:00
def restore
Dir["#{uploads_export_path}/**/*"].each do |upload|
next if File.directory?(upload)
2018-07-11 09:58:42 -04:00
add_upload(upload)
2018-07-11 08:52:48 -04:00
end
2018-07-11 09:58:42 -04:00
true
rescue StandardError => e
2018-07-11 04:24:59 -04:00
@shared.error(e)
false
end
2018-07-10 05:40:39 -04:00
private
2018-07-11 09:58:42 -04:00
def add_upload(upload)
uploader_context = FileUploader.extract_dynamic_path(upload).named_captures.symbolize_keys
2018-07-11 09:58:42 -04:00
UploadService.new(@project, File.open(upload, 'r'), FileUploader, **uploader_context).execute.to_h
2018-07-11 09:58:42 -04:00
end
def copy_project_uploads
2018-07-16 05:45:11 -04:00
each_uploader do |uploader|
2018-07-13 09:41:24 -04:00
next unless uploader.file
2018-07-10 05:40:39 -04:00
if uploader.upload.local?
next unless uploader.upload.exist?
copy_files(uploader.absolute_path, File.join(uploads_export_path, uploader.upload.path))
else
download_and_copy(uploader)
end
2018-07-10 05:40:39 -04:00
end
end
def uploads_export_path
@uploads_export_path ||= File.join(@shared.export_path, @relative_export_path)
end
2018-07-16 05:45:11 -04:00
def each_uploader
avatar_path = @project.avatar&.upload&.path
if @relative_export_path == 'avatar'
yield(@project.avatar)
else
2018-07-16 05:45:11 -04:00
project_uploads_except_avatar(avatar_path).find_each(batch_size: UPLOADS_BATCH_SIZE) do |upload|
yield(upload.retrieve_uploader)
2018-07-10 05:40:39 -04:00
end
end
end
2018-07-16 05:45:11 -04:00
def project_uploads_except_avatar(avatar_path)
return @project.uploads unless avatar_path
@project.uploads.where.not(path: avatar_path)
end
2018-07-10 05:40:39 -04:00
def download_and_copy(upload)
2018-07-10 10:33:40 -04:00
secret = upload.try(:secret) || ''
upload_path = File.join(uploads_export_path, secret, upload.filename)
2018-07-10 09:29:31 -04:00
2018-07-10 10:33:40 -04:00
mkdir_p(File.join(uploads_export_path, secret))
2018-07-10 05:40:39 -04:00
download_or_copy_upload(upload, upload_path)
rescue Errno::ENAMETOOLONG => e
# Do not fail entire project export if downloaded file has filename that exceeds 255 characters.
# Ignore raised exception, skip such upload, log the error and keep going with the export instead.
Gitlab::ErrorTracking.log_exception(e, project_id: @project.id)
2018-07-10 05:40:39 -04:00
end
end
end
end