debian-mirror-gitlab/lib/api/generic_packages.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

127 lines
5.4 KiB
Ruby
Raw Normal View History

2020-11-24 15:15:51 +05:30
# frozen_string_literal: true
module API
2021-01-03 14:25:43 +05:30
class GenericPackages < ::API::Base
GENERIC_PACKAGES_REQUIREMENTS = {
package_name: API::NO_SLASH_URL_PART_REGEX,
file_name: API::NO_SLASH_URL_PART_REGEX
}.freeze
2021-03-11 19:13:27 +05:30
ALLOWED_STATUSES = %w[default hidden].freeze
2021-01-29 00:20:46 +05:30
feature_category :package_registry
2022-07-16 23:28:13 +05:30
urgency :low
2021-01-29 00:20:46 +05:30
2020-11-24 15:15:51 +05:30
before do
require_packages_enabled!
2021-04-17 20:07:23 +05:30
authenticate_non_get!
2020-11-24 15:15:51 +05:30
end
params do
requires :id, type: String, desc: 'The ID of a project'
end
resource :projects, requirements: API::NAMESPACE_OR_PROJECT_REQUIREMENTS do
2021-03-08 18:12:59 +05:30
route_setting :authentication, job_token_allowed: true, basic_auth_personal_access_token: true, deploy_token_allowed: true
2020-11-24 15:15:51 +05:30
namespace ':id/packages/generic' do
2021-01-03 14:25:43 +05:30
namespace ':package_name/*package_version/:file_name', requirements: GENERIC_PACKAGES_REQUIREMENTS do
desc 'Workhorse authorize generic package file' do
detail 'This feature was introduced in GitLab 13.5'
end
2021-03-08 18:12:59 +05:30
route_setting :authentication, job_token_allowed: true, basic_auth_personal_access_token: true, deploy_token_allowed: true
2021-01-03 14:25:43 +05:30
params do
requires :package_name, type: String, desc: 'Package name', regexp: Gitlab::Regex.generic_package_name_regex, file_path: true
requires :package_version, type: String, desc: 'Package version', regexp: Gitlab::Regex.generic_package_version_regex
requires :file_name, type: String, desc: 'Package file name', regexp: Gitlab::Regex.generic_package_file_name_regex, file_path: true
2021-03-11 19:13:27 +05:30
optional :status, type: String, values: ALLOWED_STATUSES, desc: 'Package status'
2021-01-03 14:25:43 +05:30
end
put 'authorize' do
2022-11-25 23:54:43 +05:30
project = authorized_user_project
2021-01-03 14:25:43 +05:30
authorize_workhorse!(subject: project, maximum_size: project.actual_limits.generic_packages_max_file_size)
end
desc 'Upload package file' do
detail 'This feature was introduced in GitLab 13.5'
end
params do
requires :package_name, type: String, desc: 'Package name', regexp: Gitlab::Regex.generic_package_name_regex, file_path: true
requires :package_version, type: String, desc: 'Package version', regexp: Gitlab::Regex.generic_package_version_regex
requires :file_name, type: String, desc: 'Package file name', regexp: Gitlab::Regex.generic_package_file_name_regex, file_path: true
2021-03-11 19:13:27 +05:30
optional :status, type: String, values: ALLOWED_STATUSES, desc: 'Package status'
2021-01-03 14:25:43 +05:30
requires :file, type: ::API::Validations::Types::WorkhorseFile, desc: 'The package file to be published (generated by Multipart middleware)'
2021-12-11 22:18:48 +05:30
optional :select, type: String, values: %w[package_file]
2021-01-03 14:25:43 +05:30
end
2021-03-08 18:12:59 +05:30
route_setting :authentication, job_token_allowed: true, basic_auth_personal_access_token: true, deploy_token_allowed: true
2021-01-03 14:25:43 +05:30
put do
2022-11-25 23:54:43 +05:30
project = authorized_user_project
2021-01-03 14:25:43 +05:30
authorize_upload!(project)
bad_request!('File is too large') if max_file_size_exceeded?
2021-11-11 11:23:49 +05:30
track_package_event('push_package', :generic, project: project, user: current_user, namespace: project.namespace)
2021-01-03 14:25:43 +05:30
create_package_file_params = declared_params.merge(build: current_authenticated_job)
2021-12-11 22:18:48 +05:30
package_file = ::Packages::Generic::CreatePackageFileService
2021-01-03 14:25:43 +05:30
.new(project, current_user, create_package_file_params)
.execute
2021-12-11 22:18:48 +05:30
if params[:select] == 'package_file'
present package_file
else
created!
end
2021-01-03 14:25:43 +05:30
rescue ObjectStorage::RemoteStoreError => e
Gitlab::ErrorTracking.track_exception(e, extra: { file_name: params[:file_name], project_id: project.id })
forbidden!
2021-06-08 01:23:25 +05:30
rescue ::Packages::DuplicatePackageError
bad_request!('Duplicate package is not allowed')
2021-01-03 14:25:43 +05:30
end
desc 'Download package file' do
detail 'This feature was introduced in GitLab 13.5'
end
params do
requires :package_name, type: String, desc: 'Package name', regexp: Gitlab::Regex.generic_package_name_regex, file_path: true
requires :package_version, type: String, desc: 'Package version', regexp: Gitlab::Regex.generic_package_version_regex
requires :file_name, type: String, desc: 'Package file name', regexp: Gitlab::Regex.generic_package_file_name_regex, file_path: true
end
2021-03-08 18:12:59 +05:30
route_setting :authentication, job_token_allowed: true, basic_auth_personal_access_token: true, deploy_token_allowed: true
2021-01-03 14:25:43 +05:30
get do
2022-11-25 23:54:43 +05:30
project = authorized_user_project(action: :read_package)
2021-01-03 14:25:43 +05:30
authorize_read_package!(project)
package = ::Packages::Generic::PackageFinder.new(project).execute!(params[:package_name], params[:package_version])
package_file = ::Packages::PackageFileFinder.new(package, params[:file_name]).execute!
2021-11-11 11:23:49 +05:30
track_package_event('pull_package', :generic, project: project, user: current_user, namespace: project.namespace)
2021-01-03 14:25:43 +05:30
2022-10-11 01:57:18 +05:30
present_package_file!(package_file)
2021-01-03 14:25:43 +05:30
end
2020-11-24 15:15:51 +05:30
end
end
end
helpers do
include ::API::Helpers::PackagesHelpers
2021-01-03 14:25:43 +05:30
include ::API::Helpers::Packages::BasicAuthHelpers
2020-11-24 15:15:51 +05:30
2021-01-03 14:25:43 +05:30
def max_file_size_exceeded?
2022-11-25 23:54:43 +05:30
authorized_user_project.actual_limits.exceeded?(:generic_packages_max_file_size, params[:file].size)
2020-11-24 15:15:51 +05:30
end
end
end
end