debian-mirror-gitlab/lib/api/helpers/packages_helpers.rb

102 lines
3.4 KiB
Ruby
Raw Normal View History

2020-07-28 23:09:34 +05:30
# frozen_string_literal: true
module API
module Helpers
module PackagesHelpers
2023-01-13 00:05:48 +05:30
extend ::Gitlab::Utils::Override
2020-07-28 23:09:34 +05:30
MAX_PACKAGE_FILE_SIZE = 50.megabytes.freeze
def require_packages_enabled!
not_found! unless ::Gitlab.config.packages.enabled
end
def require_dependency_proxy_enabled!
not_found! unless ::Gitlab.config.dependency_proxy.enabled
end
def authorize_read_package!(subject = user_project)
2022-10-11 01:57:18 +05:30
authorize!(:read_package, subject.try(:packages_policy_subject) || subject)
2020-07-28 23:09:34 +05:30
end
def authorize_create_package!(subject = user_project)
authorize!(:create_package, subject)
end
def authorize_destroy_package!(subject = user_project)
authorize!(:destroy_package, subject)
end
def authorize_packages_access!(subject = user_project)
require_packages_enabled!
authorize_read_package!(subject)
end
def authorize_workhorse!(subject: user_project, has_length: true, maximum_size: MAX_PACKAGE_FILE_SIZE)
authorize_upload!(subject)
Gitlab::Workhorse.verify_api_request!(headers)
status 200
content_type Gitlab::Workhorse::INTERNAL_API_CONTENT_TYPE
params = { has_length: has_length }
params[:maximum_size] = maximum_size unless has_length
2021-01-03 14:25:43 +05:30
::Packages::PackageFileUploader.workhorse_authorize(**params)
2020-07-28 23:09:34 +05:30
end
def authorize_upload!(subject = user_project)
authorize_create_package!(subject)
require_gitlab_workhorse!
end
2020-11-24 15:15:51 +05:30
2023-01-13 00:05:48 +05:30
override :user_project
def user_project(action: :read_project)
case action
when :read_project
super()
when :read_package
user_project_with_read_package
else
raise ArgumentError, "unexpected action: #{action}"
end
end
# This function is similar to the `find_project!` function, but it considers the `read_package` ability.
def user_project_with_read_package
strong_memoize(:user_project_with_read_package) do
project = find_project(params[:id])
next forbidden! unless authorized_project_scope?(project)
next project if can?(current_user, :read_package, project&.packages_policy_subject)
# guest users can have :read_project but not :read_package
next forbidden! if can?(current_user, :read_project, project)
next unauthorized! if authenticate_non_public?
not_found!('Project')
end
end
2023-03-04 22:38:38 +05:30
def track_package_event(action, scope, **args)
::Packages::CreateEventService.new(nil, current_user, event_name: action, scope: scope).execute
2021-04-29 21:17:54 +05:30
category = args.delete(:category) || self.options[:for].name
2023-03-04 22:38:38 +05:30
event_name = "i_package_#{scope}_user"
::Gitlab::Tracking.event(
category,
action.to_s,
property: event_name,
label: 'redis_hll_counters.user_packages.user_packages_total_unique_counts_monthly',
context: [Gitlab::Tracking::ServicePingContext.new(data_source: :redis_hll, event: event_name).to_context],
**args
)
2020-11-24 15:15:51 +05:30
end
2022-10-11 01:57:18 +05:30
def present_package_file!(package_file, supports_direct_download: true)
package_file.package.touch_last_downloaded_at
present_carrierwave_file!(package_file.file, supports_direct_download: supports_direct_download)
end
2020-07-28 23:09:34 +05:30
end
end
end