# frozen_string_literal: true module API class Projects < ::API::Base include PaginationParams include Helpers::CustomAttributes helpers Helpers::ProjectsHelpers before { authenticate_non_get! } feature_category :projects, ['/projects/:id/custom_attributes', '/projects/:id/custom_attributes/:key'] PROJECT_ATTACHMENT_SIZE_EXEMPT = 1.gigabyte helpers do # EE::API::Projects would override this method def apply_filters(projects) projects = projects.with_issues_available_for_user(current_user) if params[:with_issues_enabled] projects = projects.with_merge_requests_enabled if params[:with_merge_requests_enabled] projects = projects.with_statistics if params[:statistics] projects = projects.joins(:statistics) if params[:order_by].include?('project_statistics') # rubocop: disable CodeReuse/ActiveRecord lang = params[:with_programming_language] projects = projects.with_programming_language(lang) if lang projects end def verify_update_project_attrs!(project, attrs) attrs.delete(:repository_storage) unless can?(current_user, :change_repository_storage, project) end def verify_project_filters!(attrs) attrs.delete(:repository_storage) unless can?(current_user, :use_project_statistics_filters) end def verify_statistics_order_by_projects! return unless Helpers::ProjectsHelpers::STATISTICS_SORT_PARAMS.include?(params[:order_by]) params[:order_by] = if can?(current_user, :use_project_statistics_filters) "project_statistics.#{params[:order_by]}" else route.params['order_by'][:default] end end def delete_project(user_project) destroy_conditionally!(user_project) do ::Projects::DestroyService.new(user_project, current_user, {}).async_execute end accepted! end def exempt_from_global_attachment_size?(user_project) list = ::Gitlab::RackAttack::UserAllowlist.new(ENV['GITLAB_UPLOAD_API_ALLOWLIST']) list.include?(user_project.id) end # Temporarily introduced for upload API: https://gitlab.com/gitlab-org/gitlab/-/issues/325788 def project_attachment_size(user_project) return PROJECT_ATTACHMENT_SIZE_EXEMPT if exempt_from_global_attachment_size?(user_project) return user_project.max_attachment_size if Feature.enabled?(:enforce_max_attachment_size_upload_api, user_project, default_enabled: :yaml) PROJECT_ATTACHMENT_SIZE_EXEMPT end # This is to help determine which projects to use in https://gitlab.com/gitlab-org/gitlab/-/issues/325788 def log_if_upload_exceed_max_size(user_project, file) return if file.size <= user_project.max_attachment_size if file.size > user_project.max_attachment_size allowed = exempt_from_global_attachment_size?(user_project) Gitlab::AppLogger.info({ message: "File exceeds maximum size", file_bytes: file.size, project_id: user_project.id, project_path: user_project.full_path, upload_allowed: allowed }) end end def check_import_by_url_is_enabled forbidden! unless Gitlab::CurrentSettings.import_sources&.include?('git') end end helpers do params :statistics_params do optional :statistics, type: Boolean, default: false, desc: 'Include project statistics' end params :collection_params do use :sort_params use :filter_params use :pagination optional :simple, type: Boolean, default: false, desc: 'Return only the ID, URL, name, and path of each project' end params :sort_params do optional :order_by, type: String, values: %w[id name path created_at updated_at last_activity_at] + Helpers::ProjectsHelpers::STATISTICS_SORT_PARAMS, default: 'created_at', desc: "Return projects ordered by field. #{Helpers::ProjectsHelpers::STATISTICS_SORT_PARAMS.join(', ')} are only available to admins." optional :sort, type: String, values: %w[asc desc], default: 'desc', desc: 'Return projects sorted in ascending and descending order' end params :filter_params do optional :archived, type: Boolean, desc: 'Limit by archived status' optional :visibility, type: String, values: Gitlab::VisibilityLevel.string_values, desc: 'Limit by visibility' optional :search, type: String, desc: 'Return list of projects matching the search criteria' optional :search_namespaces, type: Boolean, desc: "Include ancestor namespaces when matching search criteria" optional :owned, type: Boolean, default: false, desc: 'Limit by owned by authenticated user' optional :starred, type: Boolean, default: false, desc: 'Limit by starred status' optional :membership, type: Boolean, default: false, desc: 'Limit by projects that the current user is a member of' optional :with_issues_enabled, type: Boolean, default: false, desc: 'Limit by enabled issues feature' optional :with_merge_requests_enabled, type: Boolean, default: false, desc: 'Limit by enabled merge requests feature' optional :with_programming_language, type: String, desc: 'Limit to repositories which use the given programming language' optional :min_access_level, type: Integer, values: Gitlab::Access.all_values, desc: 'Limit by minimum access level of authenticated user' optional :id_after, type: Integer, desc: 'Limit results to projects with IDs greater than the specified ID' optional :id_before, type: Integer, desc: 'Limit results to projects with IDs less than the specified ID' optional :last_activity_after, type: DateTime, desc: 'Limit results to projects with last_activity after specified time. Format: ISO 8601 YYYY-MM-DDTHH:MM:SSZ' optional :last_activity_before, type: DateTime, desc: 'Limit results to projects with last_activity before specified time. Format: ISO 8601 YYYY-MM-DDTHH:MM:SSZ' optional :repository_storage, type: String, desc: 'Which storage shard the repository is on. Available only to admins' optional :topic, type: Array[String], coerce_with: ::API::Validations::Types::CommaSeparatedToArray.coerce, desc: 'Comma-separated list of topics. Limit results to projects having all topics' use :optional_filter_params_ee end params :create_params do optional :namespace_id, type: Integer, desc: 'Namespace ID for the new project. Default to the user namespace.' optional :import_url, type: String, desc: 'URL from which the project is imported' optional :template_name, type: String, desc: "Name of template from which to create project" optional :template_project_id, type: Integer, desc: "Project ID of template from which to create project" mutually_exclusive :import_url, :template_name, :template_project_id end def load_projects params = project_finder_params verify_project_filters!(params) ProjectsFinder.new(current_user: current_user, params: params).execute end def present_projects(projects, options = {}) verify_statistics_order_by_projects! projects = reorder_projects(projects) projects = apply_filters(projects) records, options = paginate_with_strategies(projects, options[:request_scope]) do |projects| projects, options = with_custom_attributes(projects, options) options = options.reverse_merge( with: current_user ? Entities::ProjectWithAccess : Entities::BasicProjectDetails, statistics: params[:statistics], current_user: current_user, license: false ) options[:with] = Entities::BasicProjectDetails if params[:simple] [options[:with].prepare_relation(projects, options), options] end Preloaders::UserMaxAccessLevelInProjectsPreloader.new(records, current_user).execute if current_user present records, options end def present_groups(groups) options = { with: Entities::PublicGroupDetails, current_user: current_user } groups, options = with_custom_attributes(groups, options) present paginate(groups), options end def translate_params_for_compatibility(params) params[:builds_enabled] = params.delete(:jobs_enabled) if params.key?(:jobs_enabled) params end end resource :users, requirements: API::USER_REQUIREMENTS do desc 'Get a user projects' do success Entities::BasicProjectDetails end params do requires :user_id, type: String, desc: 'The ID or username of the user' use :collection_params use :statistics_params use :with_custom_attributes end get ":user_id/projects", feature_category: :projects do user = find_user(params[:user_id]) not_found!('User') unless user params[:user] = user present_projects load_projects end desc 'Get projects starred by a user' do success Entities::BasicProjectDetails end params do requires :user_id, type: String, desc: 'The ID or username of the user' use :collection_params use :statistics_params end get ":user_id/starred_projects", feature_category: :projects do user = find_user(params[:user_id]) not_found!('User') unless user starred_projects = StarredProjectsFinder.new(user, params: project_finder_params, current_user: current_user).execute present_projects starred_projects end end resource :projects do include CustomAttributesEndpoints desc 'Get a list of visible projects for authenticated user' do success Entities::BasicProjectDetails end params do use :collection_params use :statistics_params use :with_custom_attributes end get feature_category: :projects do present_projects load_projects end desc 'Create new project' do success Entities::Project end params do optional :name, type: String, desc: 'The name of the project' optional :path, type: String, desc: 'The path of the repository' optional :default_branch, type: String, desc: 'The default branch of the project' at_least_one_of :name, :path use :optional_create_project_params use :create_params end post do Gitlab::QueryLimiting.disable!('https://gitlab.com/gitlab-org/gitlab/issues/21139') attrs = declared_params(include_missing: false) attrs = translate_params_for_compatibility(attrs) filter_attributes_using_license!(attrs) check_import_by_url_is_enabled if params[:import_url].present? project = ::Projects::CreateService.new(current_user, attrs).execute if project.saved? present project, with: Entities::Project, user_can_admin_project: can?(current_user, :admin_project, project), current_user: current_user else if project.errors[:limit_reached].present? error!(project.errors[:limit_reached], 403) end render_validation_error!(project) end end desc 'Create new project for a specified user. Only available to admin users.' do success Entities::Project end params do requires :name, type: String, desc: 'The name of the project' requires :user_id, type: Integer, desc: 'The ID of a user' optional :path, type: String, desc: 'The path of the repository' optional :default_branch, type: String, desc: 'The default branch of the project' use :optional_project_params use :optional_create_project_params use :create_params end # rubocop: disable CodeReuse/ActiveRecord post "user/:user_id", feature_category: :projects do Gitlab::QueryLimiting.disable!('https://gitlab.com/gitlab-org/gitlab/issues/21139') authenticated_as_admin! user = User.find_by(id: params.delete(:user_id)) not_found!('User') unless user attrs = declared_params(include_missing: false) attrs = translate_params_for_compatibility(attrs) filter_attributes_using_license!(attrs) project = ::Projects::CreateService.new(user, attrs).execute if project.saved? present project, with: Entities::Project, user_can_admin_project: can?(current_user, :admin_project, project), current_user: current_user else render_validation_error!(project) end end # rubocop: enable CodeReuse/ActiveRecord end params do requires :id, type: String, desc: 'The ID of a project' end resource :projects, requirements: API::NAMESPACE_OR_PROJECT_REQUIREMENTS do desc 'Get a single project' do success Entities::ProjectWithAccess end params do use :statistics_params use :with_custom_attributes optional :license, type: Boolean, default: false, desc: 'Include project license data' end get ":id", feature_category: :projects do options = { with: current_user ? Entities::ProjectWithAccess : Entities::BasicProjectDetails, current_user: current_user, user_can_admin_project: can?(current_user, :admin_project, user_project), statistics: params[:statistics], license: params[:license] } project, options = with_custom_attributes(user_project, options) present project, options end desc 'Fork new project for the current user or provided namespace.' do success Entities::Project end params do optional :namespace, type: String, desc: '(deprecated) The ID or name of the namespace that the project will be forked into' optional :namespace_id, type: Integer, desc: 'The ID of the namespace that the project will be forked into' optional :namespace_path, type: String, desc: 'The path of the namespace that the project will be forked into' optional :path, type: String, desc: 'The path that will be assigned to the fork' optional :name, type: String, desc: 'The name that will be assigned to the fork' optional :description, type: String, desc: 'The description that will be assigned to the fork' optional :visibility, type: String, values: Gitlab::VisibilityLevel.string_values, desc: 'The visibility of the fork' end post ':id/fork', feature_category: :source_code_management do Gitlab::QueryLimiting.disable!('https://gitlab.com/gitlab-org/gitlab/-/issues/20759') not_found! unless can?(current_user, :fork_project, user_project) fork_params = declared_params(include_missing: false) fork_params[:namespace] = if fork_params[:namespace_id].present? find_namespace!(fork_params[:namespace_id]) elsif fork_params[:namespace_path].present? find_namespace_by_path!(fork_params[:namespace_path]) elsif fork_params[:namespace].present? find_namespace!(fork_params[:namespace]) end service = ::Projects::ForkService.new(user_project, current_user, fork_params) not_found!('Target Namespace') unless service.valid_fork_target? forked_project = service.execute if forked_project.errors.any? conflict!(forked_project.errors.messages) else present forked_project, with: Entities::Project, user_can_admin_project: can?(current_user, :admin_project, forked_project), current_user: current_user end end desc 'List forks of this project' do success Entities::Project end params do use :collection_params use :with_custom_attributes end get ':id/forks', feature_category: :source_code_management do forks = ForkProjectsFinder.new(user_project, params: project_finder_params, current_user: current_user).execute present_projects forks, request_scope: user_project end desc 'Check pages access of this project' get ':id/pages_access', feature_category: :pages do authorize! :read_pages_content, user_project unless user_project.public_pages? status 200 end desc 'Update an existing project' do success Entities::Project end params do optional :name, type: String, desc: 'The name of the project' optional :default_branch, type: String, desc: 'The default branch of the project' optional :path, type: String, desc: 'The path of the repository' use :optional_project_params use :optional_update_params at_least_one_of(*Helpers::ProjectsHelpers.update_params_at_least_one_of) end put ':id', feature_category: :projects do authorize_admin_project attrs = declared_params(include_missing: false) authorize! :rename_project, user_project if attrs[:name].present? authorize! :change_visibility_level, user_project if attrs[:visibility].present? attrs = translate_params_for_compatibility(attrs) filter_attributes_using_license!(attrs) verify_update_project_attrs!(user_project, attrs) result = ::Projects::UpdateService.new(user_project, current_user, attrs).execute if result[:status] == :success present user_project, with: Entities::Project, user_can_admin_project: can?(current_user, :admin_project, user_project), current_user: current_user else render_validation_error!(user_project) end end desc 'Archive a project' do success Entities::Project end post ':id/archive', feature_category: :projects do authorize!(:archive_project, user_project) ::Projects::UpdateService.new(user_project, current_user, archived: true).execute present user_project, with: Entities::Project, current_user: current_user end desc 'Unarchive a project' do success Entities::Project end post ':id/unarchive', feature_category: :projects do authorize!(:archive_project, user_project) ::Projects::UpdateService.new(user_project, current_user, archived: false).execute present user_project, with: Entities::Project, current_user: current_user end desc 'Star a project' do success Entities::Project end post ':id/star', feature_category: :projects do if current_user.starred?(user_project) not_modified! else current_user.toggle_star(user_project) user_project.reset present user_project, with: Entities::Project, current_user: current_user end end desc 'Unstar a project' do success Entities::Project end post ':id/unstar', feature_category: :projects do if current_user.starred?(user_project) current_user.toggle_star(user_project) user_project.reset present user_project, with: Entities::Project, current_user: current_user else not_modified! end end desc 'Get the users who starred a project' do success Entities::UserBasic end params do optional :search, type: String, desc: 'Return list of users matching the search criteria' use :pagination end get ':id/starrers', feature_category: :projects do starrers = UsersStarProjectsFinder.new(user_project, params, current_user: current_user).execute present paginate(starrers), with: Entities::UserStarsProject end desc 'Get languages in project repository' get ':id/languages', feature_category: :source_code_management do ::Projects::RepositoryLanguagesService .new(user_project, current_user) .execute.to_h { |lang| [lang.name, lang.share] } end desc 'Delete a project' delete ":id", feature_category: :projects do authorize! :remove_project, user_project delete_project(user_project) end desc 'Mark this project as forked from another' params do requires :forked_from_id, type: String, desc: 'The ID of the project it was forked from' end post ":id/fork/:forked_from_id", feature_category: :source_code_management do authorize! :admin_project, user_project fork_from_project = find_project!(params[:forked_from_id]) not_found!("Source Project") unless fork_from_project authorize! :fork_project, fork_from_project result = ::Projects::ForkService.new(fork_from_project, current_user).execute(user_project) if result present user_project.reset, with: Entities::Project, current_user: current_user else render_api_error!("Project already forked", 409) if user_project.forked? end end desc 'Remove a forked_from relationship' delete ":id/fork", feature_category: :source_code_management do authorize! :remove_fork_project, user_project result = destroy_conditionally!(user_project) do ::Projects::UnlinkForkService.new(user_project, current_user).execute end not_modified! unless result end desc 'Share the project with a group' do success Entities::ProjectGroupLink end params do requires :group_id, type: Integer, desc: 'The ID of a group' requires :group_access, type: Integer, values: Gitlab::Access.values, as: :link_group_access, desc: 'The group access level' optional :expires_at, type: Date, desc: 'Share expiration date' end post ":id/share", feature_category: :authentication_and_authorization do authorize! :admin_project, user_project group = Group.find_by_id(params[:group_id]) unless user_project.allowed_to_share_with_group? break render_api_error!("The project sharing with group is disabled", 400) end result = ::Projects::GroupLinks::CreateService.new(user_project, current_user, declared_params(include_missing: false)) .execute(group) if result[:status] == :success present result[:link], with: Entities::ProjectGroupLink else render_api_error!(result[:message], result[:http_status]) end end params do requires :group_id, type: Integer, desc: 'The ID of the group' end # rubocop: disable CodeReuse/ActiveRecord delete ":id/share/:group_id", feature_category: :authentication_and_authorization do authorize! :admin_project, user_project link = user_project.project_group_links.find_by(group_id: params[:group_id]) not_found!('Group Link') unless link destroy_conditionally!(link) do ::Projects::GroupLinks::DestroyService.new(user_project, current_user).execute(link) end end # rubocop: enable CodeReuse/ActiveRecord desc 'Workhorse authorize the file upload' do detail 'This feature was introduced in GitLab 13.11' end post ':id/uploads/authorize', feature_category: :not_owned do require_gitlab_workhorse! status 200 content_type Gitlab::Workhorse::INTERNAL_API_CONTENT_TYPE FileUploader.workhorse_authorize(has_length: false, maximum_size: project_attachment_size(user_project)) end desc 'Upload a file' params do requires :file, types: [Rack::Multipart::UploadedFile, ::API::Validations::Types::WorkhorseFile], desc: 'The attachment file to be uploaded' end post ":id/uploads", feature_category: :not_owned do log_if_upload_exceed_max_size(user_project, params[:file]) service = UploadService.new(user_project, params[:file]) service.override_max_attachment_size = project_attachment_size(user_project) upload = service.execute present upload, with: Entities::ProjectUpload end desc 'Get the users list of a project' do success Entities::UserBasic end params do optional :search, type: String, desc: 'Return list of users matching the search criteria' optional :skip_users, type: Array[Integer], coerce_with: ::API::Validations::Types::CommaSeparatedToIntegerArray.coerce, desc: 'Filter out users with the specified IDs' use :pagination end get ':id/users', feature_category: :authentication_and_authorization do users = DeclarativePolicy.subject_scope { user_project.team.users } users = users.search(params[:search]) if params[:search].present? users = users.where_not_in(params[:skip_users]) if params[:skip_users].present? if Feature.enabled?(:sort_by_project_users_by_project_authorizations_user_id, user_project, default_enabled: :yaml) users = users.order('project_authorizations.user_id' => :asc) # rubocop: disable CodeReuse/ActiveRecord end present paginate(users), with: Entities::UserBasic end desc 'Get ancestor and shared groups for a project' do success Entities::PublicGroupDetails end params do optional :search, type: String, desc: 'Return list of groups matching the search criteria' optional :skip_groups, type: Array[Integer], coerce_with: ::API::Validations::Types::CommaSeparatedToIntegerArray.coerce, desc: 'Array of group ids to exclude from list' optional :with_shared, type: Boolean, default: false, desc: 'Include shared groups' optional :shared_visible_only, type: Boolean, default: false, desc: 'Limit to shared groups user has access to' optional :shared_min_access_level, type: Integer, values: Gitlab::Access.all_values, desc: 'Limit returned shared groups by minimum access level to the project' use :pagination end get ':id/groups', feature_category: :source_code_management do groups = ::Projects::GroupsFinder.new(project: user_project, current_user: current_user, params: declared_params(include_missing: false)).execute groups = groups.search(params[:search]) if params[:search].present? present_groups groups end desc 'Start the housekeeping task for a project' do detail 'This feature was introduced in GitLab 9.0.' end post ':id/housekeeping', feature_category: :source_code_management do authorize_admin_project begin ::Repositories::HousekeepingService.new(user_project, :gc).execute rescue ::Repositories::HousekeepingService::LeaseTaken => error conflict!(error.message) end end desc 'Transfer a project to a new namespace' params do requires :namespace, type: String, desc: 'The ID or path of the new namespace' end put ":id/transfer", feature_category: :projects do authorize! :change_namespace, user_project namespace = find_namespace!(params[:namespace]) result = ::Projects::TransferService.new(user_project, current_user).execute(namespace) if result present user_project, with: Entities::Project, current_user: current_user else render_api_error!("Failed to transfer project #{user_project.errors.messages}", 400) end end desc 'Show the storage information' do success Entities::ProjectRepositoryStorage end params do requires :id, type: String, desc: 'ID of a project' end get ':id/storage', feature_category: :projects do authenticated_as_admin! present user_project, with: Entities::ProjectRepositoryStorage, current_user: current_user end end end end API::Projects.prepend_mod_with('API::Projects')