779 lines
32 KiB
Ruby
779 lines
32 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
module API
|
|
class Projects < ::API::Base
|
|
include PaginationParams
|
|
include Helpers::CustomAttributes
|
|
|
|
helpers Helpers::ProjectsHelpers
|
|
|
|
before { authenticate_non_get! }
|
|
|
|
feature_category :projects, ['/projects/:id/custom_attributes', '/projects/:id/custom_attributes/:key']
|
|
|
|
PROJECT_ATTACHMENT_SIZE_EXEMPT = 1.gigabyte
|
|
|
|
helpers do
|
|
# EE::API::Projects would override this method
|
|
def apply_filters(projects)
|
|
projects = projects.with_issues_available_for_user(current_user) if params[:with_issues_enabled]
|
|
projects = projects.with_merge_requests_enabled if params[:with_merge_requests_enabled]
|
|
projects = projects.with_statistics if params[:statistics]
|
|
projects = projects.joins(:statistics) if params[:order_by].include?('project_statistics') # rubocop: disable CodeReuse/ActiveRecord
|
|
projects = projects.created_by(current_user).imported.with_import_state if params[:imported]
|
|
|
|
lang = params[:with_programming_language]
|
|
projects = projects.with_programming_language(lang) if lang
|
|
|
|
projects
|
|
end
|
|
|
|
def verify_update_project_attrs!(project, attrs)
|
|
attrs.delete(:repository_storage) unless can?(current_user, :change_repository_storage, project)
|
|
end
|
|
|
|
def verify_project_filters!(attrs)
|
|
attrs.delete(:repository_storage) unless can?(current_user, :use_project_statistics_filters)
|
|
end
|
|
|
|
def verify_statistics_order_by_projects!
|
|
return unless Helpers::ProjectsHelpers::STATISTICS_SORT_PARAMS.include?(params[:order_by])
|
|
|
|
params[:order_by] = if can?(current_user, :use_project_statistics_filters)
|
|
"project_statistics.#{params[:order_by]}"
|
|
else
|
|
route.params['order_by'][:default]
|
|
end
|
|
end
|
|
|
|
def support_order_by_similarity!(attrs)
|
|
return unless params[:order_by] == 'similarity'
|
|
|
|
if order_by_similarity?(allow_unauthorized: false)
|
|
# Limit to projects the current user is a member of.
|
|
# Do not include all public projects because it
|
|
# could cause long running queries
|
|
attrs[:non_public] = true
|
|
attrs[:sort] = params['order_by']
|
|
else
|
|
params[:order_by] = route.params['order_by'][:default]
|
|
end
|
|
end
|
|
|
|
def delete_project(user_project)
|
|
destroy_conditionally!(user_project) do
|
|
::Projects::DestroyService.new(user_project, current_user, {}).async_execute
|
|
end
|
|
|
|
accepted!
|
|
end
|
|
|
|
def exempt_from_global_attachment_size?(user_project)
|
|
list = ::Gitlab::RackAttack::UserAllowlist.new(ENV['GITLAB_UPLOAD_API_ALLOWLIST'])
|
|
list.include?(user_project.id)
|
|
end
|
|
|
|
# Temporarily introduced for upload API: https://gitlab.com/gitlab-org/gitlab/-/issues/325788
|
|
def project_attachment_size(user_project)
|
|
return PROJECT_ATTACHMENT_SIZE_EXEMPT if exempt_from_global_attachment_size?(user_project)
|
|
return user_project.max_attachment_size if Feature.enabled?(:enforce_max_attachment_size_upload_api, user_project)
|
|
|
|
PROJECT_ATTACHMENT_SIZE_EXEMPT
|
|
end
|
|
|
|
# This is to help determine which projects to use in https://gitlab.com/gitlab-org/gitlab/-/issues/325788
|
|
def log_if_upload_exceed_max_size(user_project, file)
|
|
return if file.size <= user_project.max_attachment_size
|
|
|
|
if file.size > user_project.max_attachment_size
|
|
allowed = exempt_from_global_attachment_size?(user_project)
|
|
Gitlab::AppLogger.info({ message: "File exceeds maximum size", file_bytes: file.size, project_id: user_project.id, project_path: user_project.full_path, upload_allowed: allowed })
|
|
end
|
|
end
|
|
end
|
|
|
|
helpers do
|
|
params :statistics_params do
|
|
optional :statistics, type: Boolean, default: false, desc: 'Include project statistics'
|
|
end
|
|
|
|
params :collection_params do
|
|
use :sort_params
|
|
use :filter_params
|
|
use :pagination
|
|
|
|
optional :simple, type: Boolean, default: false,
|
|
desc: 'Return only the ID, URL, name, and path of each project'
|
|
end
|
|
|
|
params :sort_params do
|
|
optional :order_by, type: String,
|
|
values: %w[id name path created_at updated_at last_activity_at similarity] + Helpers::ProjectsHelpers::STATISTICS_SORT_PARAMS,
|
|
default: 'created_at', desc: "Return projects ordered by field. #{Helpers::ProjectsHelpers::STATISTICS_SORT_PARAMS.join(', ')} are only available to admins. Similarity is available when searching and is limited to projects the user has access to."
|
|
optional :sort, type: String, values: %w[asc desc], default: 'desc',
|
|
desc: 'Return projects sorted in ascending and descending order'
|
|
end
|
|
|
|
params :filter_params do
|
|
optional :archived, type: Boolean, desc: 'Limit by archived status'
|
|
optional :visibility, type: String, values: Gitlab::VisibilityLevel.string_values,
|
|
desc: 'Limit by visibility'
|
|
optional :search, type: String, desc: 'Return list of projects matching the search criteria'
|
|
optional :search_namespaces, type: Boolean, desc: "Include ancestor namespaces when matching search criteria"
|
|
optional :owned, type: Boolean, default: false, desc: 'Limit by owned by authenticated user'
|
|
optional :starred, type: Boolean, default: false, desc: 'Limit by starred status'
|
|
optional :imported, type: Boolean, default: false, desc: 'Limit by imported by authenticated user'
|
|
optional :membership, type: Boolean, default: false, desc: 'Limit by projects that the current user is a member of'
|
|
optional :with_issues_enabled, type: Boolean, default: false, desc: 'Limit by enabled issues feature'
|
|
optional :with_merge_requests_enabled, type: Boolean, default: false, desc: 'Limit by enabled merge requests feature'
|
|
optional :with_programming_language, type: String, desc: 'Limit to repositories which use the given programming language'
|
|
optional :min_access_level, type: Integer, values: Gitlab::Access.all_values, desc: 'Limit by minimum access level of authenticated user'
|
|
optional :id_after, type: Integer, desc: 'Limit results to projects with IDs greater than the specified ID'
|
|
optional :id_before, type: Integer, desc: 'Limit results to projects with IDs less than the specified ID'
|
|
optional :last_activity_after, type: DateTime, desc: 'Limit results to projects with last_activity after specified time. Format: ISO 8601 YYYY-MM-DDTHH:MM:SSZ'
|
|
optional :last_activity_before, type: DateTime, desc: 'Limit results to projects with last_activity before specified time. Format: ISO 8601 YYYY-MM-DDTHH:MM:SSZ'
|
|
optional :repository_storage, type: String, desc: 'Which storage shard the repository is on. Available only to admins'
|
|
optional :topic, type: Array[String], coerce_with: ::API::Validations::Types::CommaSeparatedToArray.coerce, desc: 'Comma-separated list of topics. Limit results to projects having all topics'
|
|
optional :topic_id, type: Integer, desc: 'Limit results to projects with the assigned topic given by the topic ID'
|
|
|
|
use :optional_filter_params_ee
|
|
end
|
|
|
|
params :create_params do
|
|
optional :namespace_id, type: Integer, desc: 'Namespace ID for the new project. Default to the user namespace.'
|
|
optional :import_url, type: String, desc: 'URL from which the project is imported'
|
|
optional :template_name, type: String, desc: "Name of template from which to create project"
|
|
optional :template_project_id, type: Integer, desc: "Project ID of template from which to create project"
|
|
mutually_exclusive :import_url, :template_name, :template_project_id
|
|
end
|
|
|
|
def load_projects
|
|
project_params = project_finder_params
|
|
support_order_by_similarity!(project_params)
|
|
verify_project_filters!(project_params)
|
|
|
|
ProjectsFinder.new(current_user: current_user, params: project_params).execute
|
|
end
|
|
|
|
def present_project(project, options = {})
|
|
options[:with].preload_resource(project) if options[:with].respond_to?(:preload_resource)
|
|
|
|
present project, options
|
|
end
|
|
|
|
def present_projects(projects, options = {})
|
|
verify_statistics_order_by_projects!
|
|
|
|
projects = reorder_projects(projects) unless order_by_similarity?(allow_unauthorized: false)
|
|
projects = apply_filters(projects)
|
|
|
|
records, options = paginate_with_strategies(projects, options[:request_scope]) do |projects|
|
|
projects, options = with_custom_attributes(projects, options)
|
|
|
|
options = options.reverse_merge(
|
|
with: current_user ? Entities::ProjectWithAccess : Entities::BasicProjectDetails,
|
|
statistics: params[:statistics],
|
|
current_user: current_user,
|
|
license: false
|
|
)
|
|
options[:with] = Entities::BasicProjectDetails if params[:simple]
|
|
|
|
[options[:with].prepare_relation(projects, options), options]
|
|
end
|
|
|
|
present records, options
|
|
end
|
|
|
|
def present_groups(groups)
|
|
options = {
|
|
with: Entities::PublicGroupDetails,
|
|
current_user: current_user
|
|
}
|
|
|
|
groups, options = with_custom_attributes(groups, options)
|
|
|
|
present paginate(groups), options
|
|
end
|
|
|
|
def translate_params_for_compatibility(params)
|
|
params[:builds_enabled] = params.delete(:jobs_enabled) if params.key?(:jobs_enabled)
|
|
params
|
|
end
|
|
|
|
def add_import_params(params)
|
|
params[:import_type] = 'git' if params[:import_url]&.present?
|
|
params
|
|
end
|
|
end
|
|
|
|
resource :users, requirements: API::USER_REQUIREMENTS do
|
|
desc 'Get a user projects' do
|
|
success Entities::BasicProjectDetails
|
|
end
|
|
params do
|
|
requires :user_id, type: String, desc: 'The ID or username of the user'
|
|
use :collection_params
|
|
use :statistics_params
|
|
use :with_custom_attributes
|
|
end
|
|
get ":user_id/projects", feature_category: :projects, urgency: :low do
|
|
user = find_user(params[:user_id])
|
|
not_found!('User') unless user
|
|
|
|
params[:user] = user
|
|
|
|
present_projects load_projects
|
|
end
|
|
|
|
desc 'Get projects starred by a user' do
|
|
success Entities::BasicProjectDetails
|
|
end
|
|
params do
|
|
requires :user_id, type: String, desc: 'The ID or username of the user'
|
|
use :collection_params
|
|
use :statistics_params
|
|
end
|
|
get ":user_id/starred_projects", feature_category: :projects, urgency: :low do
|
|
user = find_user(params[:user_id])
|
|
not_found!('User') unless user
|
|
|
|
starred_projects = StarredProjectsFinder.new(user, params: project_finder_params, current_user: current_user).execute
|
|
present_projects starred_projects
|
|
end
|
|
end
|
|
|
|
resource :projects do
|
|
include CustomAttributesEndpoints
|
|
|
|
desc 'Get a list of visible projects for authenticated user' do
|
|
success Entities::BasicProjectDetails
|
|
end
|
|
params do
|
|
use :collection_params
|
|
use :statistics_params
|
|
use :with_custom_attributes
|
|
end
|
|
# TODO: Set higher urgency https://gitlab.com/gitlab-org/gitlab/-/issues/211495
|
|
get feature_category: :projects, urgency: :low do
|
|
present_projects load_projects
|
|
end
|
|
|
|
desc 'Create new project' do
|
|
success Entities::Project
|
|
end
|
|
params do
|
|
optional :name, type: String, desc: 'The name of the project'
|
|
optional :path, type: String, desc: 'The path of the repository'
|
|
optional :default_branch, type: String, desc: 'The default branch of the project'
|
|
at_least_one_of :name, :path
|
|
use :optional_create_project_params
|
|
use :create_params
|
|
end
|
|
post urgency: :low do
|
|
Gitlab::QueryLimiting.disable!('https://gitlab.com/gitlab-org/gitlab/issues/21139')
|
|
attrs = declared_params(include_missing: false)
|
|
attrs = translate_params_for_compatibility(attrs)
|
|
attrs = add_import_params(attrs)
|
|
filter_attributes_using_license!(attrs)
|
|
|
|
validate_git_import_url!(params[:import_url])
|
|
|
|
project = ::Projects::CreateService.new(current_user, attrs).execute
|
|
|
|
if project.saved?
|
|
present_project project, with: Entities::Project,
|
|
user_can_admin_project: can?(current_user, :admin_project, project),
|
|
current_user: current_user
|
|
else
|
|
if project.errors[:limit_reached].present?
|
|
error!(project.errors[:limit_reached], 403)
|
|
end
|
|
|
|
forbidden! if project.errors[:import_source_disabled].present?
|
|
|
|
render_validation_error!(project)
|
|
end
|
|
end
|
|
|
|
desc 'Create new project for a specified user. Only available to admin users.' do
|
|
success Entities::Project
|
|
end
|
|
params do
|
|
requires :name, type: String, desc: 'The name of the project'
|
|
requires :user_id, type: Integer, desc: 'The ID of a user'
|
|
optional :path, type: String, desc: 'The path of the repository'
|
|
optional :default_branch, type: String, desc: 'The default branch of the project'
|
|
use :optional_project_params
|
|
use :optional_create_project_params
|
|
use :create_params
|
|
end
|
|
# rubocop: disable CodeReuse/ActiveRecord
|
|
post "user/:user_id", feature_category: :projects do
|
|
Gitlab::QueryLimiting.disable!('https://gitlab.com/gitlab-org/gitlab/issues/21139')
|
|
authenticated_as_admin!
|
|
user = User.find_by(id: params.delete(:user_id))
|
|
not_found!('User') unless user
|
|
|
|
attrs = declared_params(include_missing: false)
|
|
attrs = translate_params_for_compatibility(attrs)
|
|
attrs = add_import_params(attrs)
|
|
filter_attributes_using_license!(attrs)
|
|
validate_git_import_url!(params[:import_url])
|
|
|
|
project = ::Projects::CreateService.new(user, attrs).execute
|
|
|
|
if project.saved?
|
|
present_project project, with: Entities::Project,
|
|
user_can_admin_project: can?(current_user, :admin_project, project),
|
|
current_user: current_user
|
|
else
|
|
forbidden! if project.errors[:import_source_disabled].present?
|
|
|
|
render_validation_error!(project)
|
|
end
|
|
end
|
|
# rubocop: enable CodeReuse/ActiveRecord
|
|
end
|
|
|
|
params do
|
|
requires :id, type: String, desc: 'The ID of a project'
|
|
end
|
|
resource :projects, requirements: API::NAMESPACE_OR_PROJECT_REQUIREMENTS do
|
|
desc 'Get a single project' do
|
|
success Entities::ProjectWithAccess
|
|
end
|
|
params do
|
|
use :statistics_params
|
|
use :with_custom_attributes
|
|
|
|
optional :license, type: Boolean, default: false,
|
|
desc: 'Include project license data'
|
|
end
|
|
# TODO: Set higher urgency https://gitlab.com/gitlab-org/gitlab/-/issues/357622
|
|
get ":id", feature_category: :projects, urgency: :low do
|
|
options = {
|
|
with: current_user ? Entities::ProjectWithAccess : Entities::BasicProjectDetails,
|
|
current_user: current_user,
|
|
user_can_admin_project: can?(current_user, :admin_project, user_project),
|
|
statistics: params[:statistics],
|
|
license: params[:license]
|
|
}
|
|
|
|
project, options = with_custom_attributes(user_project, options)
|
|
|
|
present_project project, options
|
|
end
|
|
|
|
desc 'Fork new project for the current user or provided namespace.' do
|
|
success Entities::Project
|
|
end
|
|
params do
|
|
optional :namespace, type: String, desc: '(deprecated) The ID or name of the namespace that the project will be forked into'
|
|
optional :namespace_id, type: Integer, desc: 'The ID of the namespace that the project will be forked into'
|
|
optional :namespace_path, type: String, desc: 'The path of the namespace that the project will be forked into'
|
|
optional :path, type: String, desc: 'The path that will be assigned to the fork'
|
|
optional :name, type: String, desc: 'The name that will be assigned to the fork'
|
|
optional :description, type: String, desc: 'The description that will be assigned to the fork'
|
|
optional :visibility, type: String, values: Gitlab::VisibilityLevel.string_values, desc: 'The visibility of the fork'
|
|
optional :mr_default_target_self, Boolean, desc: 'Merge requests of this forked project targets itself by default'
|
|
end
|
|
post ':id/fork', feature_category: :source_code_management do
|
|
Gitlab::QueryLimiting.disable!('https://gitlab.com/gitlab-org/gitlab/-/issues/20759')
|
|
|
|
not_found! unless can?(current_user, :fork_project, user_project)
|
|
|
|
fork_params = declared_params(include_missing: false)
|
|
|
|
fork_params[:namespace] =
|
|
if fork_params[:namespace_id].present?
|
|
find_namespace!(fork_params[:namespace_id])
|
|
elsif fork_params[:namespace_path].present?
|
|
find_namespace_by_path!(fork_params[:namespace_path])
|
|
elsif fork_params[:namespace].present?
|
|
find_namespace!(fork_params[:namespace])
|
|
end
|
|
|
|
service = ::Projects::ForkService.new(user_project, current_user, fork_params)
|
|
|
|
not_found!('Target Namespace') unless service.valid_fork_target?
|
|
|
|
forked_project = service.execute
|
|
|
|
if forked_project.errors.any?
|
|
conflict!(forked_project.errors.messages)
|
|
else
|
|
present_project forked_project, {
|
|
with: Entities::Project,
|
|
user_can_admin_project: can?(current_user, :admin_project, forked_project),
|
|
current_user: current_user
|
|
}
|
|
end
|
|
end
|
|
|
|
desc 'List forks of this project' do
|
|
success Entities::Project
|
|
end
|
|
params do
|
|
use :collection_params
|
|
use :with_custom_attributes
|
|
end
|
|
get ':id/forks', feature_category: :source_code_management, urgency: :low do
|
|
forks = ForkProjectsFinder.new(user_project, params: project_finder_params, current_user: current_user).execute
|
|
|
|
present_projects forks, request_scope: user_project
|
|
end
|
|
|
|
desc 'Check pages access of this project'
|
|
get ':id/pages_access', feature_category: :pages do
|
|
authorize! :read_pages_content, user_project unless user_project.public_pages?
|
|
status 200
|
|
end
|
|
|
|
desc 'Update an existing project' do
|
|
success Entities::Project
|
|
end
|
|
params do
|
|
optional :name, type: String, desc: 'The name of the project'
|
|
optional :default_branch, type: String, desc: 'The default branch of the project'
|
|
optional :path, type: String, desc: 'The path of the repository'
|
|
|
|
use :optional_project_params
|
|
use :optional_update_params
|
|
|
|
at_least_one_of(*Helpers::ProjectsHelpers.update_params_at_least_one_of)
|
|
end
|
|
put ':id', feature_category: :projects do
|
|
authorize_admin_project
|
|
attrs = declared_params(include_missing: false)
|
|
authorize! :rename_project, user_project if attrs[:name].present?
|
|
authorize! :change_visibility_level, user_project if user_project.visibility_attribute_present?(attrs)
|
|
|
|
attrs = translate_params_for_compatibility(attrs)
|
|
attrs = add_import_params(attrs)
|
|
filter_attributes_using_license!(attrs)
|
|
verify_update_project_attrs!(user_project, attrs)
|
|
|
|
user_project.remove_avatar! if attrs.key?(:avatar) && attrs[:avatar].nil?
|
|
|
|
result = ::Projects::UpdateService.new(user_project, current_user, attrs).execute
|
|
|
|
if result[:status] == :success
|
|
present_project user_project, with: Entities::Project,
|
|
user_can_admin_project: can?(current_user, :admin_project, user_project),
|
|
current_user: current_user
|
|
else
|
|
render_validation_error!(user_project)
|
|
end
|
|
end
|
|
|
|
desc 'Archive a project' do
|
|
success Entities::Project
|
|
end
|
|
post ':id/archive', feature_category: :projects do
|
|
authorize!(:archive_project, user_project)
|
|
|
|
::Projects::UpdateService.new(user_project, current_user, archived: true).execute
|
|
|
|
present_project user_project, with: Entities::Project, current_user: current_user
|
|
end
|
|
|
|
desc 'Unarchive a project' do
|
|
success Entities::Project
|
|
end
|
|
post ':id/unarchive', feature_category: :projects, urgency: :default do
|
|
authorize!(:archive_project, user_project)
|
|
|
|
::Projects::UpdateService.new(user_project, current_user, archived: false).execute
|
|
|
|
present_project user_project, with: Entities::Project, current_user: current_user
|
|
end
|
|
|
|
desc 'Star a project' do
|
|
success Entities::Project
|
|
end
|
|
post ':id/star', feature_category: :projects do
|
|
if current_user.starred?(user_project)
|
|
not_modified!
|
|
else
|
|
current_user.toggle_star(user_project)
|
|
user_project.reset
|
|
|
|
present_project user_project, with: Entities::Project, current_user: current_user
|
|
end
|
|
end
|
|
|
|
desc 'Unstar a project' do
|
|
success Entities::Project
|
|
end
|
|
post ':id/unstar', feature_category: :projects do
|
|
if current_user.starred?(user_project)
|
|
current_user.toggle_star(user_project)
|
|
user_project.reset
|
|
|
|
present_project user_project, with: Entities::Project, current_user: current_user
|
|
else
|
|
not_modified!
|
|
end
|
|
end
|
|
|
|
desc 'Get the users who starred a project' do
|
|
success Entities::UserBasic
|
|
end
|
|
params do
|
|
optional :search, type: String, desc: 'Return list of users matching the search criteria'
|
|
use :pagination
|
|
end
|
|
get ':id/starrers', feature_category: :projects do
|
|
starrers = UsersStarProjectsFinder.new(user_project, params, current_user: current_user).execute
|
|
|
|
present paginate(starrers), with: Entities::UserStarsProject
|
|
end
|
|
|
|
desc 'Get languages in project repository'
|
|
get ':id/languages', feature_category: :source_code_management, urgency: :medium do
|
|
::Projects::RepositoryLanguagesService
|
|
.new(user_project, current_user)
|
|
.execute.to_h { |lang| [lang.name, lang.share] }
|
|
end
|
|
|
|
desc 'Delete a project'
|
|
delete ":id", feature_category: :projects do
|
|
authorize! :remove_project, user_project
|
|
|
|
delete_project(user_project)
|
|
end
|
|
|
|
desc 'Mark this project as forked from another'
|
|
params do
|
|
requires :forked_from_id, type: String, desc: 'The ID of the project it was forked from'
|
|
end
|
|
post ":id/fork/:forked_from_id", feature_category: :source_code_management do
|
|
authorize! :admin_project, user_project
|
|
|
|
fork_from_project = find_project!(params[:forked_from_id])
|
|
|
|
not_found!("Source Project") unless fork_from_project
|
|
|
|
authorize! :fork_project, fork_from_project
|
|
|
|
result = ::Projects::ForkService.new(fork_from_project, current_user).execute(user_project)
|
|
|
|
if result
|
|
present_project user_project.reset, with: Entities::Project, current_user: current_user
|
|
else
|
|
render_api_error!("Project already forked", 409) if user_project.forked?
|
|
end
|
|
end
|
|
|
|
desc 'Remove a forked_from relationship'
|
|
delete ":id/fork", feature_category: :source_code_management do
|
|
authorize! :remove_fork_project, user_project
|
|
|
|
result = destroy_conditionally!(user_project) do
|
|
::Projects::UnlinkForkService.new(user_project, current_user).execute
|
|
end
|
|
|
|
not_modified! unless result
|
|
end
|
|
|
|
desc 'Share the project with a group' do
|
|
success Entities::ProjectGroupLink
|
|
end
|
|
params do
|
|
requires :group_id, type: Integer, desc: 'The ID of a group'
|
|
requires :group_access, type: Integer, values: Gitlab::Access.values, as: :link_group_access, desc: 'The group access level'
|
|
optional :expires_at, type: Date, desc: 'Share expiration date'
|
|
end
|
|
post ":id/share", feature_category: :authentication_and_authorization do
|
|
authorize! :admin_project, user_project
|
|
shared_with_group = Group.find_by_id(params[:group_id])
|
|
|
|
unless user_project.allowed_to_share_with_group?
|
|
break render_api_error!("The project sharing with group is disabled", 400)
|
|
end
|
|
|
|
result = ::Projects::GroupLinks::CreateService
|
|
.new(user_project, shared_with_group, current_user, declared_params(include_missing: false)).execute
|
|
|
|
if result[:status] == :success
|
|
present result[:link], with: Entities::ProjectGroupLink
|
|
else
|
|
render_api_error!(result[:message], result[:http_status])
|
|
end
|
|
end
|
|
|
|
params do
|
|
requires :group_id, type: Integer, desc: 'The ID of the group'
|
|
end
|
|
# rubocop: disable CodeReuse/ActiveRecord
|
|
delete ":id/share/:group_id", feature_category: :authentication_and_authorization do
|
|
authorize! :admin_project, user_project
|
|
|
|
link = user_project.project_group_links.find_by(group_id: params[:group_id])
|
|
not_found!('Group Link') unless link
|
|
|
|
destroy_conditionally!(link) do
|
|
::Projects::GroupLinks::DestroyService.new(user_project, current_user).execute(link)
|
|
end
|
|
end
|
|
# rubocop: enable CodeReuse/ActiveRecord
|
|
|
|
desc 'Import members from another project' do
|
|
detail 'This feature was introduced in GitLab 14.2'
|
|
end
|
|
params do
|
|
requires :project_id, type: Integer, desc: 'The ID of the source project to import the members from.'
|
|
end
|
|
post ":id/import_project_members/:project_id", feature_category: :projects do
|
|
::Gitlab::QueryLimiting.disable!('https://gitlab.com/gitlab-org/gitlab/-/issues/355916')
|
|
authorize! :admin_project, user_project
|
|
|
|
source_project = Project.find_by_id(params[:project_id])
|
|
not_found!('Project') unless source_project && can?(current_user, :read_project, source_project)
|
|
forbidden!('Project') unless source_project && can?(current_user, :admin_project_member, source_project)
|
|
|
|
result = ::Members::ImportProjectTeamService.new(current_user, params).execute
|
|
|
|
if result
|
|
{ status: result, message: 'Successfully imported' }
|
|
else
|
|
render_api_error!('Import failed', :unprocessable_entity)
|
|
end
|
|
end
|
|
|
|
desc 'Workhorse authorize the file upload' do
|
|
detail 'This feature was introduced in GitLab 13.11'
|
|
end
|
|
post ':id/uploads/authorize', feature_category: :not_owned do # rubocop:todo Gitlab/AvoidFeatureCategoryNotOwned
|
|
require_gitlab_workhorse!
|
|
|
|
status 200
|
|
content_type Gitlab::Workhorse::INTERNAL_API_CONTENT_TYPE
|
|
FileUploader.workhorse_authorize(has_length: false, maximum_size: project_attachment_size(user_project))
|
|
end
|
|
|
|
desc 'Upload a file'
|
|
params do
|
|
requires :file, types: [Rack::Multipart::UploadedFile, ::API::Validations::Types::WorkhorseFile], desc: 'The attachment file to be uploaded'
|
|
end
|
|
post ":id/uploads", feature_category: :not_owned do # rubocop:todo Gitlab/AvoidFeatureCategoryNotOwned
|
|
log_if_upload_exceed_max_size(user_project, params[:file])
|
|
|
|
service = UploadService.new(user_project, params[:file])
|
|
service.override_max_attachment_size = project_attachment_size(user_project)
|
|
upload = service.execute
|
|
|
|
present upload, with: Entities::ProjectUpload
|
|
end
|
|
|
|
desc 'Get the users list of a project' do
|
|
success Entities::UserBasic
|
|
end
|
|
params do
|
|
optional :search, type: String, desc: 'Return list of users matching the search criteria'
|
|
optional :skip_users, type: Array[Integer], coerce_with: ::API::Validations::Types::CommaSeparatedToIntegerArray.coerce, desc: 'Filter out users with the specified IDs'
|
|
use :pagination
|
|
end
|
|
get ':id/users', urgency: :low, feature_category: :authentication_and_authorization do
|
|
users = DeclarativePolicy.subject_scope { user_project.team.users }
|
|
users = users.search(params[:search]) if params[:search].present?
|
|
users = users.where_not_in(params[:skip_users]) if params[:skip_users].present?
|
|
users = users.order('project_authorizations.user_id' => :asc) # rubocop: disable CodeReuse/ActiveRecord
|
|
|
|
present paginate(users), with: Entities::UserBasic
|
|
end
|
|
|
|
desc 'Get ancestor and shared groups for a project' do
|
|
success Entities::PublicGroupDetails
|
|
end
|
|
params do
|
|
optional :search, type: String, desc: 'Return list of groups matching the search criteria'
|
|
optional :skip_groups, type: Array[Integer], coerce_with: ::API::Validations::Types::CommaSeparatedToIntegerArray.coerce, desc: 'Array of group ids to exclude from list'
|
|
optional :with_shared, type: Boolean, default: false,
|
|
desc: 'Include shared groups'
|
|
optional :shared_visible_only, type: Boolean, default: false,
|
|
desc: 'Limit to shared groups user has access to'
|
|
optional :shared_min_access_level, type: Integer, values: Gitlab::Access.all_values,
|
|
desc: 'Limit returned shared groups by minimum access level to the project'
|
|
use :pagination
|
|
end
|
|
get ':id/groups', feature_category: :source_code_management do
|
|
groups = ::Projects::GroupsFinder.new(project: user_project, current_user: current_user, params: declared_params(include_missing: false)).execute
|
|
groups = groups.search(params[:search]) if params[:search].present?
|
|
|
|
present_groups groups
|
|
end
|
|
|
|
desc 'Start the housekeeping task for a project' do
|
|
detail 'This feature was introduced in GitLab 9.0.'
|
|
end
|
|
post ':id/housekeeping', feature_category: :source_code_management do
|
|
authorize_admin_project
|
|
|
|
begin
|
|
::Repositories::HousekeepingService.new(user_project, :gc).execute
|
|
rescue ::Repositories::HousekeepingService::LeaseTaken => error
|
|
conflict!(error.message)
|
|
end
|
|
end
|
|
|
|
desc 'Start a task to recalculate repository size for a project' do
|
|
detail 'This feature was introduced in GitLab 15.0.'
|
|
end
|
|
post ':id/repository_size', feature_category: :source_code_management do
|
|
authorize_admin_project
|
|
|
|
user_project.repository.expire_statistics_caches
|
|
|
|
::Projects::UpdateStatisticsService.new(user_project, nil, statistics: [:repository_size, :lfs_objects_size]).execute
|
|
end
|
|
|
|
desc 'Transfer a project to a new namespace'
|
|
params do
|
|
requires :namespace, type: String, desc: 'The ID or path of the new namespace'
|
|
end
|
|
put ":id/transfer", feature_category: :projects do
|
|
authorize! :change_namespace, user_project
|
|
|
|
namespace = find_namespace!(params[:namespace])
|
|
result = ::Projects::TransferService.new(user_project, current_user).execute(namespace)
|
|
|
|
if result
|
|
present_project user_project, with: Entities::Project, current_user: current_user
|
|
else
|
|
render_api_error!("Failed to transfer project #{user_project.errors.messages}", 400)
|
|
end
|
|
end
|
|
|
|
desc 'Get the namespaces to where the project can be transferred'
|
|
params do
|
|
optional :search, type: String, desc: 'Return list of namespaces matching the search criteria'
|
|
use :pagination
|
|
end
|
|
get ":id/transfer_locations", feature_category: :projects do
|
|
authorize! :change_namespace, user_project
|
|
args = declared_params(include_missing: false)
|
|
args[:permission_scope] = :transfer_projects
|
|
|
|
groups = ::Groups::UserGroupsFinder.new(current_user, current_user, args).execute
|
|
groups = groups.with_route
|
|
|
|
present_groups(groups)
|
|
end
|
|
|
|
desc 'Show the storage information' do
|
|
success Entities::ProjectRepositoryStorage
|
|
end
|
|
params do
|
|
requires :id, type: String, desc: 'ID of a project'
|
|
end
|
|
get ':id/storage', feature_category: :source_code_management do
|
|
authenticated_as_admin!
|
|
|
|
present user_project, with: Entities::ProjectRepositoryStorage, current_user: current_user
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
API::Projects.prepend_mod_with('API::Projects')
|