debian-mirror-gitlab/lib/api/debian_project_packages.rb

89 lines
3.3 KiB
Ruby
Raw Normal View History

2021-01-03 14:25:43 +05:30
# frozen_string_literal: true
module API
class DebianProjectPackages < ::API::Base
params do
requires :id, type: String, desc: 'The ID of a project'
end
resource :projects, requirements: API::NAMESPACE_OR_PROJECT_REQUIREMENTS do
2021-09-04 01:27:46 +05:30
rescue_from ArgumentError do |e|
render_api_error!(e.message, 400)
end
rescue_from ActiveRecord::RecordInvalid do |e|
render_api_error!(e.message, 400)
end
after_validation do
2021-03-11 19:13:27 +05:30
require_packages_enabled!
2021-01-03 14:25:43 +05:30
not_found! unless ::Feature.enabled?(:debian_packages, user_project)
authorize_read_package!
end
2021-06-08 01:23:25 +05:30
namespace ':id' do
2021-09-04 01:27:46 +05:30
helpers do
def project_or_group
user_project
end
end
include ::API::Concerns::Packages::DebianPackageEndpoints
2021-01-03 14:25:43 +05:30
params do
requires :file_name, type: String, desc: 'The file name'
end
2021-06-08 01:23:25 +05:30
namespace 'packages/debian/:file_name', requirements: FILE_NAME_REQUIREMENTS do
2021-09-04 01:27:46 +05:30
format :txt
2021-03-08 18:12:59 +05:30
content_type :json, Gitlab::Workhorse::INTERNAL_API_CONTENT_TYPE
2021-03-11 19:13:27 +05:30
# PUT {projects|groups}/:id/packages/debian/:file_name
2021-01-03 14:25:43 +05:30
params do
requires :file, type: ::API::Validations::Types::WorkhorseFile, desc: 'The package file to be published (generated by Multipart middleware)'
end
2021-03-11 19:13:27 +05:30
route_setting :authentication, deploy_token_allowed: true, basic_auth_personal_access_token: true, job_token_allowed: :basic_auth, authenticate_non_public: true
2021-01-03 14:25:43 +05:30
put do
authorize_upload!(authorized_user_project)
bad_request!('File is too large') if authorized_user_project.actual_limits.exceeded?(:debian_max_file_size, params[:file].size)
2021-09-04 01:27:46 +05:30
file_params = {
file: params['file'],
file_name: params['file_name'],
file_sha1: params['file.sha1'],
file_md5: params['file.md5']
}
package = ::Packages::Debian::FindOrCreateIncomingService.new(authorized_user_project, current_user).execute
package_file = ::Packages::Debian::CreatePackageFileService.new(package, file_params).execute
if params['file_name'].end_with? '.changes'
::Packages::Debian::ProcessChangesWorker.perform_async(package_file.id, current_user.id) # rubocop:disable CodeReuse/Worker
end
2021-01-03 14:25:43 +05:30
2021-09-04 01:27:46 +05:30
track_package_event('push_package', :debian, user: current_user, project: authorized_user_project, namespace: authorized_user_project.namespace)
2021-01-03 14:25:43 +05:30
created!
rescue ObjectStorage::RemoteStoreError => e
Gitlab::ErrorTracking.track_exception(e, extra: { file_name: params[:file_name], project_id: authorized_user_project.id })
forbidden!
end
2021-03-11 19:13:27 +05:30
# PUT {projects|groups}/:id/packages/debian/:file_name/authorize
route_setting :authentication, deploy_token_allowed: true, basic_auth_personal_access_token: true, job_token_allowed: :basic_auth, authenticate_non_public: true
2021-03-08 18:12:59 +05:30
put 'authorize' do
2021-01-03 14:25:43 +05:30
authorize_workhorse!(
subject: authorized_user_project,
maximum_size: authorized_user_project.actual_limits.debian_max_file_size
)
end
end
end
end
end
end