Files
gitlab-foss/lib/gitlab/github_import/attachments_downloader.rb
2025-07-10 15:09:50 +00:00

110 lines
3.3 KiB
Ruby

# frozen_string_literal: true
module Gitlab
module GithubImport
class AttachmentsDownloader
include ::Gitlab::ImportExport::CommandLineUtil
include ::BulkImports::FileDownloads::FilenameFetch
include ::BulkImports::FileDownloads::Validations
DownloadError = Class.new(StandardError)
FILENAME_SIZE_LIMIT = 255 # chars before the extension
DEFAULT_FILE_SIZE_LIMIT = Gitlab::CurrentSettings.max_attachment_size.megabytes
TMP_DIR = File.join(Dir.tmpdir, 'github_attachments').freeze
SUPPORTED_VIDEO_MEDIA_TYPES = %w[mov mp4 webm].freeze
attr_reader :file_url, :filename, :file_size_limit, :options
def initialize(file_url, options: {}, file_size_limit: DEFAULT_FILE_SIZE_LIMIT)
@file_url = file_url
@options = options
@file_size_limit = file_size_limit
filename = URI(file_url).path.split('/').last
@filename = ensure_filename_size(filename)
end
def perform
validate_filepath
download_url = get_assets_download_redirection_url
parsed_file_name = File.basename(URI.parse(download_url).path)
# if the file is a media type, we update both the @filename and @filepath with the filetype extension
if parsed_file_name.end_with?(*SUPPORTED_VIDEO_MEDIA_TYPES.map { |ext| ".#{ext}" })
@filename = ensure_filename_size(parsed_file_name)
add_extension_to_file_path(filename)
end
file = download_from(download_url)
validate_symlink
file
end
def delete
FileUtils.rm_rf File.dirname(filepath)
end
private
def raise_error(message)
raise DownloadError, message
end
# Github /assets redirection link will redirect to aws which has its own authorization.
# Keeping our bearer token will cause request rejection
# eg. Only one auth mechanism allowed; only the X-Amz-Algorithm query parameter,
# Signature query string parameter or the Authorization header should be specified.
def get_assets_download_redirection_url
return file_url unless file_url.starts_with?(github_assets_url_regex)
options[:follow_redirects] = false
response = ::Import::Clients::HTTP.get(file_url, options)
if response.redirection?
response.headers[:location]
else
file_url
end
end
def github_assets_url_regex
%r{#{Regexp.escape(::Gitlab::GithubImport::MarkdownText.github_url)}/.*/(assets|files)/}
end
def download_from(url)
file = File.open(filepath, 'wb')
Gitlab::HTTP.perform_request(Net::HTTP::Get, url, stream_body: true) do |chunk|
next if [301, 302, 303, 307, 308].include?(chunk.code)
raise DownloadError, "Error downloading file from #{url}. Error code: #{chunk.code}" if chunk.code != 200
file.write(chunk)
validate_size!(file.size)
rescue Gitlab::GithubImport::AttachmentsDownloader::DownloadError
delete
raise
end
file
end
def filepath
@filepath ||= begin
dir = File.join(TMP_DIR, SecureRandom.uuid)
mkdir_p dir
File.join(dir, filename)
end
end
def add_extension_to_file_path(filename)
@filepath = "#{filepath}#{File.extname(filename)}"
end
end
end
end