2023-05-12 17:27:50 +00:00
|
|
|
// Copyright 2023 The Gitea Authors. All rights reserved.
|
|
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
|
|
|
|
package alpine
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/x509"
|
|
|
|
"encoding/hex"
|
|
|
|
"encoding/pem"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
packages_model "code.gitea.io/gitea/models/packages"
|
2024-02-11 18:02:56 +00:00
|
|
|
alpine_model "code.gitea.io/gitea/models/packages/alpine"
|
2023-05-12 17:27:50 +00:00
|
|
|
"code.gitea.io/gitea/modules/json"
|
|
|
|
packages_module "code.gitea.io/gitea/modules/packages"
|
|
|
|
alpine_module "code.gitea.io/gitea/modules/packages/alpine"
|
|
|
|
"code.gitea.io/gitea/modules/util"
|
|
|
|
"code.gitea.io/gitea/routers/api/packages/helper"
|
2024-02-27 07:12:22 +00:00
|
|
|
"code.gitea.io/gitea/services/context"
|
2023-05-12 17:27:50 +00:00
|
|
|
packages_service "code.gitea.io/gitea/services/packages"
|
|
|
|
alpine_service "code.gitea.io/gitea/services/packages/alpine"
|
|
|
|
)
|
|
|
|
|
2023-07-04 18:36:08 +00:00
|
|
|
func apiError(ctx *context.Context, status int, obj any) {
|
2023-05-12 17:27:50 +00:00
|
|
|
helper.LogAndProcessError(ctx, status, obj, func(message string) {
|
|
|
|
ctx.PlainText(status, message)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2024-02-11 18:02:56 +00:00
|
|
|
func createOrAddToExisting(ctx *context.Context, pck *alpine_module.Package, branch, repository, architecture string, buf packages_module.HashedSizeReader, fileMetadataRaw []byte) {
|
|
|
|
_, _, err := packages_service.CreatePackageOrAddFileToExisting(
|
|
|
|
ctx,
|
|
|
|
&packages_service.PackageCreationInfo{
|
|
|
|
PackageInfo: packages_service.PackageInfo{
|
|
|
|
Owner: ctx.Package.Owner,
|
|
|
|
PackageType: packages_model.TypeAlpine,
|
|
|
|
Name: pck.Name,
|
|
|
|
Version: pck.Version,
|
|
|
|
},
|
|
|
|
Creator: ctx.Doer,
|
|
|
|
Metadata: pck.VersionMetadata,
|
|
|
|
},
|
|
|
|
&packages_service.PackageFileCreationInfo{
|
|
|
|
PackageFileInfo: packages_service.PackageFileInfo{
|
|
|
|
Filename: fmt.Sprintf("%s-%s.apk", pck.Name, pck.Version),
|
|
|
|
CompositeKey: fmt.Sprintf("%s|%s|%s", branch, repository, architecture),
|
|
|
|
},
|
|
|
|
Creator: ctx.Doer,
|
|
|
|
Data: buf,
|
|
|
|
IsLead: true,
|
|
|
|
Properties: map[string]string{
|
|
|
|
alpine_module.PropertyBranch: branch,
|
|
|
|
alpine_module.PropertyRepository: repository,
|
|
|
|
alpine_module.PropertyArchitecture: architecture,
|
|
|
|
alpine_module.PropertyMetadata: string(fileMetadataRaw),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
switch err {
|
|
|
|
case packages_model.ErrDuplicatePackageVersion, packages_model.ErrDuplicatePackageFile:
|
|
|
|
apiError(ctx, http.StatusConflict, err)
|
|
|
|
case packages_service.ErrQuotaTotalCount, packages_service.ErrQuotaTypeSize, packages_service.ErrQuotaTotalSize:
|
|
|
|
apiError(ctx, http.StatusForbidden, err)
|
|
|
|
default:
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := alpine_service.BuildSpecificRepositoryFiles(ctx, ctx.Package.Owner.ID, branch, repository, pck.FileMetadata.Architecture); err != nil {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-05-12 17:27:50 +00:00
|
|
|
func GetRepositoryKey(ctx *context.Context) {
|
2023-09-15 06:13:19 +00:00
|
|
|
_, pub, err := alpine_service.GetOrCreateKeyPair(ctx, ctx.Package.Owner.ID)
|
2023-05-12 17:27:50 +00:00
|
|
|
if err != nil {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
pubPem, _ := pem.Decode([]byte(pub))
|
|
|
|
if pubPem == nil {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, "failed to decode private key pem")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
pubKey, err := x509.ParsePKIXPublicKey(pubPem.Bytes)
|
|
|
|
if err != nil {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
fingerprint, err := util.CreatePublicKeyFingerprint(pubKey)
|
|
|
|
if err != nil {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.ServeContent(strings.NewReader(pub), &context.ServeHeaderOptions{
|
|
|
|
ContentType: "application/x-pem-file",
|
|
|
|
Filename: fmt.Sprintf("%s@%s.rsa.pub", ctx.Package.Owner.LowerName, hex.EncodeToString(fingerprint)),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func GetRepositoryFile(ctx *context.Context) {
|
2023-09-25 13:17:37 +00:00
|
|
|
pv, err := alpine_service.GetOrCreateRepositoryVersion(ctx, ctx.Package.Owner.ID)
|
2023-05-12 17:27:50 +00:00
|
|
|
if err != nil {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-07-03 13:33:28 +00:00
|
|
|
s, u, pf, err := packages_service.GetFileStreamByPackageVersion(
|
2023-05-12 17:27:50 +00:00
|
|
|
ctx,
|
|
|
|
pv,
|
|
|
|
&packages_service.PackageFileInfo{
|
2024-06-24 12:31:24 +00:00
|
|
|
Filename: alpine_service.IndexArchiveFilename,
|
2023-05-12 17:27:50 +00:00
|
|
|
CompositeKey: fmt.Sprintf("%s|%s|%s", ctx.Params("branch"), ctx.Params("repository"), ctx.Params("architecture")),
|
|
|
|
},
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
if errors.Is(err, util.ErrNotExist) {
|
|
|
|
apiError(ctx, http.StatusNotFound, err)
|
|
|
|
} else {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-07-03 13:33:28 +00:00
|
|
|
helper.ServePackageFile(ctx, s, u, pf)
|
2023-05-12 17:27:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func UploadPackageFile(ctx *context.Context) {
|
|
|
|
branch := strings.TrimSpace(ctx.Params("branch"))
|
|
|
|
repository := strings.TrimSpace(ctx.Params("repository"))
|
|
|
|
if branch == "" || repository == "" {
|
|
|
|
apiError(ctx, http.StatusBadRequest, "invalid branch or repository")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-04-22 11:48:42 +00:00
|
|
|
upload, needToClose, err := ctx.UploadStream()
|
2023-05-12 17:27:50 +00:00
|
|
|
if err != nil {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
2024-04-22 11:48:42 +00:00
|
|
|
if needToClose {
|
2023-05-12 17:27:50 +00:00
|
|
|
defer upload.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
buf, err := packages_module.CreateHashedBufferFromReader(upload)
|
|
|
|
if err != nil {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer buf.Close()
|
|
|
|
|
|
|
|
pck, err := alpine_module.ParsePackage(buf)
|
|
|
|
if err != nil {
|
|
|
|
if errors.Is(err, util.ErrInvalidArgument) || err == io.EOF {
|
|
|
|
apiError(ctx, http.StatusBadRequest, err)
|
|
|
|
} else {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := buf.Seek(0, io.SeekStart); err != nil {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
fileMetadataRaw, err := json.Marshal(pck.FileMetadata)
|
|
|
|
if err != nil {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-02-11 18:02:56 +00:00
|
|
|
// Check whether the package being uploaded has no architecture defined.
|
|
|
|
// If true, loop through the available architectures in the repo and create
|
|
|
|
// the package file for the each architecture. If there are no architectures
|
|
|
|
// available on the repository, fallback to x86_64
|
|
|
|
if pck.FileMetadata.Architecture == "noarch" {
|
|
|
|
architectures, err := alpine_model.GetArchitectures(ctx, ctx.Package.Owner.ID, repository)
|
|
|
|
if err != nil {
|
2023-05-12 17:27:50 +00:00
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
2024-02-11 18:02:56 +00:00
|
|
|
return
|
2023-05-12 17:27:50 +00:00
|
|
|
}
|
|
|
|
|
2024-02-11 18:02:56 +00:00
|
|
|
if len(architectures) == 0 {
|
|
|
|
architectures = []string{
|
|
|
|
"x86_64",
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, arch := range architectures {
|
|
|
|
pck.FileMetadata.Architecture = arch
|
|
|
|
|
|
|
|
fileMetadataRaw, err := json.Marshal(pck.FileMetadata)
|
|
|
|
if err != nil {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
createOrAddToExisting(ctx, pck, branch, repository, pck.FileMetadata.Architecture, buf, fileMetadataRaw)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
createOrAddToExisting(ctx, pck, branch, repository, pck.FileMetadata.Architecture, buf, fileMetadataRaw)
|
2023-05-12 17:27:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Status(http.StatusCreated)
|
|
|
|
}
|
|
|
|
|
|
|
|
func DownloadPackageFile(ctx *context.Context) {
|
2024-06-24 12:31:24 +00:00
|
|
|
branch := ctx.Params("branch")
|
|
|
|
repository := ctx.Params("repository")
|
|
|
|
architecture := ctx.Params("architecture")
|
|
|
|
|
|
|
|
opts := &packages_model.PackageFileSearchOptions{
|
2023-05-12 17:27:50 +00:00
|
|
|
OwnerID: ctx.Package.Owner.ID,
|
|
|
|
PackageType: packages_model.TypeAlpine,
|
|
|
|
Query: ctx.Params("filename"),
|
2024-06-24 12:31:24 +00:00
|
|
|
CompositeKey: fmt.Sprintf("%s|%s|%s", branch, repository, architecture),
|
|
|
|
}
|
|
|
|
|
|
|
|
pfs, _, err := packages_model.SearchFiles(ctx, opts)
|
2023-05-12 17:27:50 +00:00
|
|
|
if err != nil {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
2024-06-24 12:31:24 +00:00
|
|
|
if len(pfs) == 0 {
|
2023-05-12 17:27:50 +00:00
|
|
|
apiError(ctx, http.StatusNotFound, nil)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-07-03 13:33:28 +00:00
|
|
|
s, u, pf, err := packages_service.GetPackageFileStream(ctx, pfs[0])
|
2023-05-12 17:27:50 +00:00
|
|
|
if err != nil {
|
|
|
|
if errors.Is(err, util.ErrNotExist) {
|
|
|
|
apiError(ctx, http.StatusNotFound, err)
|
|
|
|
} else {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-07-03 13:33:28 +00:00
|
|
|
helper.ServePackageFile(ctx, s, u, pf)
|
2023-05-12 17:27:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func DeletePackageFile(ctx *context.Context) {
|
|
|
|
branch, repository, architecture := ctx.Params("branch"), ctx.Params("repository"), ctx.Params("architecture")
|
|
|
|
|
|
|
|
pfs, _, err := packages_model.SearchFiles(ctx, &packages_model.PackageFileSearchOptions{
|
|
|
|
OwnerID: ctx.Package.Owner.ID,
|
|
|
|
PackageType: packages_model.TypeAlpine,
|
|
|
|
Query: ctx.Params("filename"),
|
|
|
|
CompositeKey: fmt.Sprintf("%s|%s|%s", branch, repository, architecture),
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if len(pfs) != 1 {
|
|
|
|
apiError(ctx, http.StatusNotFound, nil)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-09-25 13:17:37 +00:00
|
|
|
if err := packages_service.RemovePackageFileAndVersionIfUnreferenced(ctx, ctx.Doer, pfs[0]); err != nil {
|
2023-05-12 17:27:50 +00:00
|
|
|
if errors.Is(err, util.ErrNotExist) {
|
|
|
|
apiError(ctx, http.StatusNotFound, err)
|
|
|
|
} else {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := alpine_service.BuildSpecificRepositoryFiles(ctx, ctx.Package.Owner.ID, branch, repository, architecture); err != nil {
|
|
|
|
apiError(ctx, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Status(http.StatusNoContent)
|
|
|
|
}
|