mirror of
				https://gitee.com/gitea/gitea
				synced 2025-11-04 08:30:25 +08:00 
			
		
		
		
	Add Package Registry (#16510)
* Added package store settings. * Added models. * Added generic package registry. * Added tests. * Added NuGet package registry. * Moved service index to api file. * Added NPM package registry. * Added Maven package registry. * Added PyPI package registry. * Summary is deprecated. * Changed npm name. * Sanitize project url. * Allow only scoped packages. * Added user interface. * Changed method name. * Added missing migration file. * Set page info. * Added documentation. * Added documentation links. * Fixed wrong error message. * Lint template files. * Fixed merge errors. * Fixed unit test storage path. * Switch to json module. * Added suggestions. * Added package webhook. * Add package api. * Fixed swagger file. * Fixed enum and comments. * Fixed NuGet pagination. * Print test names. * Added api tests. * Fixed access level. * Fix User unmarshal. * Added RubyGems package registry. * Fix lint. * Implemented io.Writer. * Added support for sha256/sha512 checksum files. * Improved maven-metadata.xml support. * Added support for symbol package uploads. * Added tests. * Added overview docs. * Added npm dependencies and keywords. * Added no-packages information. * Display file size. * Display asset count. * Fixed filter alignment. * Added package icons. * Formatted instructions. * Allow anonymous package downloads. * Fixed comments. * Fixed postgres test. * Moved file. * Moved models to models/packages. * Use correct error response format per client. * Use simpler search form. * Fixed IsProd. * Restructured data model. * Prevent empty filename. * Fix swagger. * Implemented user/org registry. * Implemented UI. * Use GetUserByIDCtx. * Use table for dependencies. * make svg * Added support for unscoped npm packages. * Add support for npm dist tags. * Added tests for npm tags. * Unlink packages if repository gets deleted. * Prevent user/org delete if a packages exist. * Use package unlink in repository service. * Added support for composer packages. * Restructured package docs. * Added missing tests. * Fixed generic content page. * Fixed docs. * Fixed swagger. * Added missing type. * Fixed ambiguous column. * Organize content store by sha256 hash. * Added admin package management. * Added support for sorting. * Add support for multiple identical versions/files. * Added missing repository unlink. * Added file properties. * make fmt * lint * Added Conan package registry. * Updated docs. * Unify package names. * Added swagger enum. * Use longer TEXT column type. * Removed version composite key. * Merged package and container registry. * Removed index. * Use dedicated package router. * Moved files to new location. * Updated docs. * Fixed JOIN order. * Fixed GROUP BY statement. * Fixed GROUP BY #2. * Added symbol server support. * Added more tests. * Set NOT NULL. * Added setting to disable package registries. * Moved auth into service. * refactor * Use ctx everywhere. * Added package cleanup task. * Changed packages path. * Added container registry. * Refactoring * Updated comparison. * Fix swagger. * Fixed table order. * Use token auth for npm routes. * Enabled ReverseProxy auth. * Added packages link for orgs. * Fixed anonymous org access. * Enable copy button for setup instructions. * Merge error * Added suggestions. * Fixed merge. * Handle "generic". * Added link for TODO. * Added suggestions. * Changed temporary buffer filename. * Added suggestions. * Apply suggestions from code review Co-authored-by: Thomas Boerger <thomas@webhippie.de> * Update docs/content/doc/packages/nuget.en-us.md Co-authored-by: wxiaoguang <wxiaoguang@gmail.com> Co-authored-by: Thomas Boerger <thomas@webhippie.de>
This commit is contained in:
		@@ -70,6 +70,7 @@ type Context struct {
 | 
			
		||||
	ContextUser *user_model.User
 | 
			
		||||
	Repo        *Repository
 | 
			
		||||
	Org         *Organization
 | 
			
		||||
	Package     *Package
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// TrHTMLEscapeArgs runs Tr but pre-escapes all arguments with html.EscapeString.
 | 
			
		||||
@@ -331,6 +332,18 @@ func (ctx *Context) RespHeader() http.Header {
 | 
			
		||||
	return ctx.Resp.Header()
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SetServeHeaders sets necessary content serve headers
 | 
			
		||||
func (ctx *Context) SetServeHeaders(filename string) {
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Description", "File Transfer")
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Type", "application/octet-stream")
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Disposition", "attachment; filename="+filename)
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Transfer-Encoding", "binary")
 | 
			
		||||
	ctx.Resp.Header().Set("Expires", "0")
 | 
			
		||||
	ctx.Resp.Header().Set("Cache-Control", "must-revalidate")
 | 
			
		||||
	ctx.Resp.Header().Set("Pragma", "public")
 | 
			
		||||
	ctx.Resp.Header().Set("Access-Control-Expose-Headers", "Content-Disposition")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ServeContent serves content to http request
 | 
			
		||||
func (ctx *Context) ServeContent(name string, r io.ReadSeeker, params ...interface{}) {
 | 
			
		||||
	modTime := time.Now()
 | 
			
		||||
@@ -340,14 +353,7 @@ func (ctx *Context) ServeContent(name string, r io.ReadSeeker, params ...interfa
 | 
			
		||||
			modTime = v
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Description", "File Transfer")
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Type", "application/octet-stream")
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Disposition", "attachment; filename="+name)
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Transfer-Encoding", "binary")
 | 
			
		||||
	ctx.Resp.Header().Set("Expires", "0")
 | 
			
		||||
	ctx.Resp.Header().Set("Cache-Control", "must-revalidate")
 | 
			
		||||
	ctx.Resp.Header().Set("Pragma", "public")
 | 
			
		||||
	ctx.Resp.Header().Set("Access-Control-Expose-Headers", "Content-Disposition")
 | 
			
		||||
	ctx.SetServeHeaders(name)
 | 
			
		||||
	http.ServeContent(ctx.Resp, ctx.Req, name, modTime, r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@@ -359,31 +365,41 @@ func (ctx *Context) ServeFile(file string, names ...string) {
 | 
			
		||||
	} else {
 | 
			
		||||
		name = path.Base(file)
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Description", "File Transfer")
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Type", "application/octet-stream")
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Disposition", "attachment; filename="+name)
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Transfer-Encoding", "binary")
 | 
			
		||||
	ctx.Resp.Header().Set("Expires", "0")
 | 
			
		||||
	ctx.Resp.Header().Set("Cache-Control", "must-revalidate")
 | 
			
		||||
	ctx.Resp.Header().Set("Pragma", "public")
 | 
			
		||||
	ctx.SetServeHeaders(name)
 | 
			
		||||
	http.ServeFile(ctx.Resp, ctx.Req, file)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ServeStream serves file via io stream
 | 
			
		||||
func (ctx *Context) ServeStream(rd io.Reader, name string) {
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Description", "File Transfer")
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Type", "application/octet-stream")
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Disposition", "attachment; filename="+name)
 | 
			
		||||
	ctx.Resp.Header().Set("Content-Transfer-Encoding", "binary")
 | 
			
		||||
	ctx.Resp.Header().Set("Expires", "0")
 | 
			
		||||
	ctx.Resp.Header().Set("Cache-Control", "must-revalidate")
 | 
			
		||||
	ctx.Resp.Header().Set("Pragma", "public")
 | 
			
		||||
	ctx.SetServeHeaders(name)
 | 
			
		||||
	_, err := io.Copy(ctx.Resp, rd)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("Download file failed", err)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// UploadStream returns the request body or the first form file
 | 
			
		||||
// Only form files need to get closed.
 | 
			
		||||
func (ctx *Context) UploadStream() (rd io.ReadCloser, needToClose bool, err error) {
 | 
			
		||||
	contentType := strings.ToLower(ctx.Req.Header.Get("Content-Type"))
 | 
			
		||||
	if strings.HasPrefix(contentType, "application/x-www-form-urlencoded") || strings.HasPrefix(contentType, "multipart/form-data") {
 | 
			
		||||
		if err := ctx.Req.ParseMultipartForm(32 << 20); err != nil {
 | 
			
		||||
			return nil, false, err
 | 
			
		||||
		}
 | 
			
		||||
		if ctx.Req.MultipartForm.File == nil {
 | 
			
		||||
			return nil, false, http.ErrMissingFile
 | 
			
		||||
		}
 | 
			
		||||
		for _, files := range ctx.Req.MultipartForm.File {
 | 
			
		||||
			if len(files) > 0 {
 | 
			
		||||
				r, err := files[0].Open()
 | 
			
		||||
				return r, true, err
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
		return nil, false, http.ErrMissingFile
 | 
			
		||||
	}
 | 
			
		||||
	return ctx.Req.Body, false, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Error returned an error to web browser
 | 
			
		||||
func (ctx *Context) Error(status int, contents ...string) {
 | 
			
		||||
	v := http.StatusText(status)
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										109
									
								
								modules/context/package.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										109
									
								
								modules/context/package.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,109 @@
 | 
			
		||||
// Copyright 2021 The Gitea Authors. All rights reserved.
 | 
			
		||||
// Use of this source code is governed by a MIT-style
 | 
			
		||||
// license that can be found in the LICENSE file.
 | 
			
		||||
 | 
			
		||||
package context
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"net/http"
 | 
			
		||||
 | 
			
		||||
	"code.gitea.io/gitea/models/organization"
 | 
			
		||||
	packages_model "code.gitea.io/gitea/models/packages"
 | 
			
		||||
	"code.gitea.io/gitea/models/perm"
 | 
			
		||||
	user_model "code.gitea.io/gitea/models/user"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// Package contains owner, access mode and optional the package descriptor
 | 
			
		||||
type Package struct {
 | 
			
		||||
	Owner      *user_model.User
 | 
			
		||||
	AccessMode perm.AccessMode
 | 
			
		||||
	Descriptor *packages_model.PackageDescriptor
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// PackageAssignment returns a middleware to handle Context.Package assignment
 | 
			
		||||
func PackageAssignment() func(ctx *Context) {
 | 
			
		||||
	return func(ctx *Context) {
 | 
			
		||||
		packageAssignment(ctx, func(status int, title string, obj interface{}) {
 | 
			
		||||
			err, ok := obj.(error)
 | 
			
		||||
			if !ok {
 | 
			
		||||
				err = fmt.Errorf("%s", obj)
 | 
			
		||||
			}
 | 
			
		||||
			if status == http.StatusNotFound {
 | 
			
		||||
				ctx.NotFound(title, err)
 | 
			
		||||
			} else {
 | 
			
		||||
				ctx.ServerError(title, err)
 | 
			
		||||
			}
 | 
			
		||||
		})
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// PackageAssignmentAPI returns a middleware to handle Context.Package assignment
 | 
			
		||||
func PackageAssignmentAPI() func(ctx *APIContext) {
 | 
			
		||||
	return func(ctx *APIContext) {
 | 
			
		||||
		packageAssignment(ctx.Context, ctx.Error)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func packageAssignment(ctx *Context, errCb func(int, string, interface{})) {
 | 
			
		||||
	ctx.Package = &Package{
 | 
			
		||||
		Owner: ctx.ContextUser,
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if ctx.Doer != nil && ctx.Doer.ID == ctx.ContextUser.ID {
 | 
			
		||||
		ctx.Package.AccessMode = perm.AccessModeOwner
 | 
			
		||||
	} else {
 | 
			
		||||
		if ctx.Package.Owner.IsOrganization() {
 | 
			
		||||
			if organization.HasOrgOrUserVisible(ctx, ctx.Package.Owner, ctx.Doer) {
 | 
			
		||||
				ctx.Package.AccessMode = perm.AccessModeRead
 | 
			
		||||
				if ctx.Doer != nil {
 | 
			
		||||
					var err error
 | 
			
		||||
					ctx.Package.AccessMode, err = organization.OrgFromUser(ctx.Package.Owner).GetOrgUserMaxAuthorizeLevel(ctx.Doer.ID)
 | 
			
		||||
					if err != nil {
 | 
			
		||||
						errCb(http.StatusInternalServerError, "GetOrgUserMaxAuthorizeLevel", err)
 | 
			
		||||
						return
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		} else {
 | 
			
		||||
			ctx.Package.AccessMode = perm.AccessModeRead
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	packageType := ctx.Params("type")
 | 
			
		||||
	name := ctx.Params("name")
 | 
			
		||||
	version := ctx.Params("version")
 | 
			
		||||
	if packageType != "" && name != "" && version != "" {
 | 
			
		||||
		pv, err := packages_model.GetVersionByNameAndVersion(ctx, ctx.Package.Owner.ID, packages_model.Type(packageType), name, version)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			if err == packages_model.ErrPackageNotExist {
 | 
			
		||||
				errCb(http.StatusNotFound, "GetVersionByNameAndVersion", err)
 | 
			
		||||
			} else {
 | 
			
		||||
				errCb(http.StatusInternalServerError, "GetVersionByNameAndVersion", err)
 | 
			
		||||
			}
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		ctx.Package.Descriptor, err = packages_model.GetPackageDescriptor(ctx, pv)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			errCb(http.StatusInternalServerError, "GetPackageDescriptor", err)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// PackageContexter initializes a package context for a request.
 | 
			
		||||
func PackageContexter() func(next http.Handler) http.Handler {
 | 
			
		||||
	return func(next http.Handler) http.Handler {
 | 
			
		||||
		return http.HandlerFunc(func(resp http.ResponseWriter, req *http.Request) {
 | 
			
		||||
			ctx := Context{
 | 
			
		||||
				Resp: NewResponse(resp),
 | 
			
		||||
				Data: map[string]interface{}{},
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			ctx.Req = WithContext(req, &ctx)
 | 
			
		||||
 | 
			
		||||
			next.ServeHTTP(ctx.Resp, ctx.Req)
 | 
			
		||||
		})
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
		Reference in New Issue
	
	Block a user