Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
249c2489
Commit
249c2489
authored
Jun 27, 2018
by
Jan Provaznik
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Updated multipart to support workhorse direct uploads
parent
ad086fa8
Changes
2
Show whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
50 additions
and
39 deletions
+50
-39
lib/gitlab/middleware/multipart.rb
lib/gitlab/middleware/multipart.rb
+9
-7
spec/lib/gitlab/middleware/multipart_spec.rb
spec/lib/gitlab/middleware/multipart_spec.rb
+41
-32
No files found.
lib/gitlab/middleware/multipart.rb
View file @
249c2489
...
...
@@ -42,10 +42,10 @@ module Gitlab
key
,
value
=
parsed_field
.
first
if
value
.
nil?
value
=
open_file
(
tmp_path
,
@request
.
params
[
"
#{
key
}
.name"
]
)
value
=
open_file
(
@request
.
params
,
key
)
@open_files
<<
value
else
value
=
decorate_params_value
(
value
,
@request
.
params
[
key
]
,
tmp_path
)
value
=
decorate_params_value
(
value
,
@request
.
params
[
key
])
end
@request
.
update_param
(
key
,
value
)
...
...
@@ -57,7 +57,7 @@ module Gitlab
end
# This function calls itself recursively
def
decorate_params_value
(
path_hash
,
value_hash
,
tmp_path
)
def
decorate_params_value
(
path_hash
,
value_hash
)
unless
path_hash
.
is_a?
(
Hash
)
&&
path_hash
.
count
==
1
raise
"invalid path:
#{
path_hash
.
inspect
}
"
end
...
...
@@ -70,19 +70,21 @@ module Gitlab
case
path_value
when
nil
value_hash
[
path_key
]
=
open_file
(
tmp_path
,
value_hash
.
dig
(
path_key
,
'.name'
)
)
value_hash
[
path_key
]
=
open_file
(
value_hash
.
dig
(
path_key
),
''
)
@open_files
<<
value_hash
[
path_key
]
value_hash
when
Hash
decorate_params_value
(
path_value
,
value_hash
[
path_key
]
,
tmp_path
)
decorate_params_value
(
path_value
,
value_hash
[
path_key
])
value_hash
else
raise
"unexpected path value:
#{
path_value
.
inspect
}
"
end
end
def
open_file
(
path
,
name
)
::
UploadedFile
.
new
(
path
,
filename:
name
||
File
.
basename
(
path
),
content_type:
'application/octet-stream'
)
def
open_file
(
params
,
key
)
::
UploadedFile
.
from_params
(
params
,
key
,
Gitlab
.
config
.
uploads
.
storage_path
)
end
end
...
...
spec/lib/gitlab/middleware/multipart_spec.rb
View file @
249c2489
...
...
@@ -7,44 +7,23 @@ describe Gitlab::Middleware::Multipart do
let
(
:middleware
)
{
described_class
.
new
(
app
)
}
let
(
:original_filename
)
{
'filename'
}
shared_examples_for
'multipart upload files'
do
it
'opens top-level files'
do
Tempfile
.
open
(
'top-level'
)
do
|
tempfile
|
env
=
post_env
({
'file'
=>
tempfile
.
path
},
{
'file.name'
=>
original_filename
},
Gitlab
::
Workhorse
.
secret
,
'gitlab-workhorse'
)
env
=
post_env
({
'file'
=>
tempfile
.
path
},
{
'file.name'
=>
original_filename
,
'file.path'
=>
tempfile
.
path
,
'file.remote_id'
=>
remote_id
},
Gitlab
::
Workhorse
.
secret
,
'gitlab-workhorse'
)
expect
(
app
).
to
receive
(
:call
)
do
|
env
|
file
=
Rack
::
Request
.
new
(
env
).
params
[
'file'
]
expect
(
file
).
to
be_a
(
::
UploadedFile
)
expect
(
file
.
path
).
to
eq
(
tempfile
.
path
)
expect
(
file
.
original_filename
).
to
eq
(
original_filename
)
end
expect_uploaded_file
(
tempfile
,
%w(file)
)
middleware
.
call
(
env
)
end
end
it
'rejects headers signed with the wrong secret'
do
env
=
post_env
({
'file'
=>
'/var/empty/nonesuch'
},
{},
'x'
*
32
,
'gitlab-workhorse'
)
expect
{
middleware
.
call
(
env
)
}.
to
raise_error
(
JWT
::
VerificationError
)
end
it
'rejects headers signed with the wrong issuer'
do
env
=
post_env
({
'file'
=>
'/var/empty/nonesuch'
},
{},
Gitlab
::
Workhorse
.
secret
,
'acme-inc'
)
expect
{
middleware
.
call
(
env
)
}.
to
raise_error
(
JWT
::
InvalidIssuerError
)
end
it
'opens files one level deep'
do
Tempfile
.
open
(
'one-level'
)
do
|
tempfile
|
in_params
=
{
'user'
=>
{
'avatar'
=>
{
'.name'
=>
original_filename
}
}
}
in_params
=
{
'user'
=>
{
'avatar'
=>
{
'.name'
=>
original_filename
,
'.path'
=>
tempfile
.
path
,
'.remote_id'
=>
remote_id
}
}
}
env
=
post_env
({
'user[avatar]'
=>
tempfile
.
path
},
in_params
,
Gitlab
::
Workhorse
.
secret
,
'gitlab-workhorse'
)
expect
(
app
).
to
receive
(
:call
)
do
|
env
|
file
=
Rack
::
Request
.
new
(
env
).
params
[
'user'
][
'avatar'
]
expect
(
file
).
to
be_a
(
::
UploadedFile
)
expect
(
file
.
path
).
to
eq
(
tempfile
.
path
)
expect
(
file
.
original_filename
).
to
eq
(
original_filename
)
end
expect_uploaded_file
(
tempfile
,
%w(user avatar)
)
middleware
.
call
(
env
)
end
...
...
@@ -52,18 +31,48 @@ describe Gitlab::Middleware::Multipart do
it
'opens files two levels deep'
do
Tempfile
.
open
(
'two-levels'
)
do
|
tempfile
|
in_params
=
{
'project'
=>
{
'milestone'
=>
{
'themesong'
=>
{
'.name'
=>
original_filename
}
}
}
}
in_params
=
{
'project'
=>
{
'milestone'
=>
{
'themesong'
=>
{
'.name'
=>
original_filename
,
'.path'
=>
tempfile
.
path
,
'.remote_id'
=>
remote_id
}
}
}
}
env
=
post_env
({
'project[milestone][themesong]'
=>
tempfile
.
path
},
in_params
,
Gitlab
::
Workhorse
.
secret
,
'gitlab-workhorse'
)
expect_uploaded_file
(
tempfile
,
%w(project milestone themesong)
)
middleware
.
call
(
env
)
end
end
def
expect_uploaded_file
(
tempfile
,
path
,
remote:
false
)
expect
(
app
).
to
receive
(
:call
)
do
|
env
|
file
=
Rack
::
Request
.
new
(
env
).
params
[
'project'
][
'milestone'
][
'themesong'
]
file
=
Rack
::
Request
.
new
(
env
).
params
.
dig
(
*
path
)
expect
(
file
).
to
be_a
(
::
UploadedFile
)
expect
(
file
.
path
).
to
eq
(
tempfile
.
path
)
expect
(
file
.
original_filename
).
to
eq
(
original_filename
)
expect
(
file
.
remote_id
).
to
eq
(
remote_id
)
end
end
end
middleware
.
call
(
env
)
it
'rejects headers signed with the wrong secret'
do
env
=
post_env
({
'file'
=>
'/var/empty/nonesuch'
},
{},
'x'
*
32
,
'gitlab-workhorse'
)
expect
{
middleware
.
call
(
env
)
}.
to
raise_error
(
JWT
::
VerificationError
)
end
it
'rejects headers signed with the wrong issuer'
do
env
=
post_env
({
'file'
=>
'/var/empty/nonesuch'
},
{},
Gitlab
::
Workhorse
.
secret
,
'acme-inc'
)
expect
{
middleware
.
call
(
env
)
}.
to
raise_error
(
JWT
::
InvalidIssuerError
)
end
context
'with remote file'
do
let
(
:remote_id
)
{
'someid'
}
it_behaves_like
'multipart upload files'
end
context
'with local file'
do
let
(
:remote_id
)
{
nil
}
it_behaves_like
'multipart upload files'
end
def
post_env
(
rewritten_fields
,
params
,
secret
,
issuer
)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment