# frozen_string_literal: true module API class DebianProjectPackages < ::API::Base PACKAGE_FILE_REQUIREMENTS = { id: API::NO_SLASH_URL_PART_REGEX, distribution: ::Packages::Debian::DISTRIBUTION_REGEX, letter: ::Packages::Debian::LETTER_REGEX, package_name: API::NO_SLASH_URL_PART_REGEX, package_version: API::NO_SLASH_URL_PART_REGEX, file_name: API::NO_SLASH_URL_PART_REGEX }.freeze FILE_NAME_REQUIREMENTS = { file_name: API::NO_SLASH_URL_PART_REGEX }.freeze before do not_found! if Gitlab::FIPS.enabled? end resource :projects, requirements: API::NAMESPACE_OR_PROJECT_REQUIREMENTS do helpers do def project_or_group user_project end end after_validation do require_packages_enabled! not_found! unless ::Feature.enabled?(:debian_packages, user_project) authorize_read_package! end params do requires :id, types: [String, Integer], desc: 'The ID or URL-encoded path of the project' end namespace ':id/packages/debian' do include ::API::Concerns::Packages::DebianPackageEndpoints # GET projects/:id/packages/debian/pool/:distribution/:letter/:package_name/:package_version/:file_name params do use :shared_package_file_params end desc 'The package' do detail 'This feature was introduced in GitLab 14.2' end route_setting :authentication, authenticate_non_public: true get 'pool/:distribution/:letter/:package_name/:package_version/:file_name', requirements: PACKAGE_FILE_REQUIREMENTS do present_distribution_package_file! end params do requires :file_name, type: String, desc: 'The file name' end namespace ':file_name', requirements: FILE_NAME_REQUIREMENTS do format :txt content_type :json, Gitlab::Workhorse::INTERNAL_API_CONTENT_TYPE # PUT {projects|groups}/:id/packages/debian/:file_name params do requires :file, type: ::API::Validations::Types::WorkhorseFile, desc: 'The package file to be published (generated by Multipart middleware)' end route_setting :authentication, deploy_token_allowed: true, basic_auth_personal_access_token: true, job_token_allowed: :basic_auth, authenticate_non_public: true put do authorize_upload!(authorized_user_project) bad_request!('File is too large') if authorized_user_project.actual_limits.exceeded?(:debian_max_file_size, params[:file].size) file_params = { file: params['file'], file_name: params['file_name'], file_sha1: params['file.sha1'], file_md5: params['file.md5'] } package = ::Packages::Debian::FindOrCreateIncomingService.new(authorized_user_project, current_user).execute ::Packages::Debian::CreatePackageFileService.new(package: package, current_user: current_user, params: file_params).execute created! rescue ObjectStorage::RemoteStoreError => e Gitlab::ErrorTracking.track_exception(e, extra: { file_name: params[:file_name], project_id: authorized_user_project.id }) forbidden! end # PUT {projects|groups}/:id/packages/debian/:file_name/authorize route_setting :authentication, deploy_token_allowed: true, basic_auth_personal_access_token: true, job_token_allowed: :basic_auth, authenticate_non_public: true put 'authorize' do authorize_workhorse!( subject: authorized_user_project, maximum_size: authorized_user_project.actual_limits.debian_max_file_size ) end end end end end end