mirror of
				https://gitee.com/gitea/gitea
				synced 2025-11-04 08:30:25 +08:00 
			
		
		
		
	Backport of #21580 Co-authored-by: Lauris BH <lauris@nix.lv> Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
This commit is contained in:
		@@ -433,6 +433,10 @@ func TestPackageContainer(t *testing.T) {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
				assert.Equal(t, fmt.Sprintf("%d", len(blobContent)), resp.Header().Get("Content-Length"))
 | 
									assert.Equal(t, fmt.Sprintf("%d", len(blobContent)), resp.Header().Get("Content-Length"))
 | 
				
			||||||
				assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
 | 
									assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									req = NewRequest(t, "HEAD", fmt.Sprintf("%s/blobs/%s", url, blobDigest))
 | 
				
			||||||
 | 
									addTokenAuthHeader(req, anonymousToken)
 | 
				
			||||||
 | 
									MakeRequest(t, req, http.StatusOK)
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			t.Run("GetBlob", func(t *testing.T) {
 | 
								t.Run("GetBlob", func(t *testing.T) {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -24,6 +24,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
func TestPackageAPI(t *testing.T) {
 | 
					func TestPackageAPI(t *testing.T) {
 | 
				
			||||||
	defer prepareTestEnv(t)()
 | 
						defer prepareTestEnv(t)()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 4}).(*user_model.User)
 | 
						user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 4}).(*user_model.User)
 | 
				
			||||||
	session := loginUser(t, user.Name)
 | 
						session := loginUser(t, user.Name)
 | 
				
			||||||
	token := getTokenForLoggedInUser(t, session)
 | 
						token := getTokenForLoggedInUser(t, session)
 | 
				
			||||||
@@ -143,6 +144,27 @@ func TestPackageAPI(t *testing.T) {
 | 
				
			|||||||
	})
 | 
						})
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func TestPackageAccess(t *testing.T) {
 | 
				
			||||||
 | 
						defer prepareTestEnv(t)()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						admin := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1}).(*user_model.User)
 | 
				
			||||||
 | 
						user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 5}).(*user_model.User)
 | 
				
			||||||
 | 
						inactive := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 9}).(*user_model.User)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						uploadPackage := func(doer, owner *user_model.User, expectedStatus int) {
 | 
				
			||||||
 | 
							url := fmt.Sprintf("/api/packages/%s/generic/test-package/1.0/file.bin", owner.Name)
 | 
				
			||||||
 | 
							req := NewRequestWithBody(t, "PUT", url, bytes.NewReader([]byte{1}))
 | 
				
			||||||
 | 
							AddBasicAuthHeader(req, doer.Name)
 | 
				
			||||||
 | 
							MakeRequest(t, req, expectedStatus)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						uploadPackage(user, inactive, http.StatusUnauthorized)
 | 
				
			||||||
 | 
						uploadPackage(inactive, inactive, http.StatusUnauthorized)
 | 
				
			||||||
 | 
						uploadPackage(inactive, user, http.StatusUnauthorized)
 | 
				
			||||||
 | 
						uploadPackage(admin, inactive, http.StatusCreated)
 | 
				
			||||||
 | 
						uploadPackage(admin, user, http.StatusCreated)
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func TestPackageCleanup(t *testing.T) {
 | 
					func TestPackageCleanup(t *testing.T) {
 | 
				
			||||||
	defer prepareTestEnv(t)()
 | 
						defer prepareTestEnv(t)()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -83,12 +83,15 @@ func packageAssignment(ctx *Context, errCb func(int, string, interface{})) {
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func determineAccessMode(ctx *Context) (perm.AccessMode, error) {
 | 
					func determineAccessMode(ctx *Context) (perm.AccessMode, error) {
 | 
				
			||||||
	accessMode := perm.AccessModeNone
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if setting.Service.RequireSignInView && ctx.Doer == nil {
 | 
						if setting.Service.RequireSignInView && ctx.Doer == nil {
 | 
				
			||||||
		return accessMode, nil
 | 
							return perm.AccessModeNone, nil
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if ctx.Doer != nil && !ctx.Doer.IsGhost() && (!ctx.Doer.IsActive || ctx.Doer.ProhibitLogin) {
 | 
				
			||||||
 | 
							return perm.AccessModeNone, nil
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						accessMode := perm.AccessModeNone
 | 
				
			||||||
	if ctx.Package.Owner.IsOrganization() {
 | 
						if ctx.Package.Owner.IsOrganization() {
 | 
				
			||||||
		org := organization.OrgFromUser(ctx.Package.Owner)
 | 
							org := organization.OrgFromUser(ctx.Package.Owner)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -55,6 +55,7 @@ func Routes() *web.Route {
 | 
				
			|||||||
	authGroup := auth.NewGroup(authMethods...)
 | 
						authGroup := auth.NewGroup(authMethods...)
 | 
				
			||||||
	r.Use(func(ctx *context.Context) {
 | 
						r.Use(func(ctx *context.Context) {
 | 
				
			||||||
		ctx.Doer = authGroup.Verify(ctx.Req, ctx.Resp, ctx, ctx.Session)
 | 
							ctx.Doer = authGroup.Verify(ctx.Req, ctx.Resp, ctx, ctx.Session)
 | 
				
			||||||
 | 
							ctx.IsSigned = ctx.Doer != nil
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	r.Group("/{username}", func() {
 | 
						r.Group("/{username}", func() {
 | 
				
			||||||
@@ -256,6 +257,7 @@ func ContainerRoutes() *web.Route {
 | 
				
			|||||||
	authGroup := auth.NewGroup(authMethods...)
 | 
						authGroup := auth.NewGroup(authMethods...)
 | 
				
			||||||
	r.Use(func(ctx *context.Context) {
 | 
						r.Use(func(ctx *context.Context) {
 | 
				
			||||||
		ctx.Doer = authGroup.Verify(ctx.Req, ctx.Resp, ctx, ctx.Session)
 | 
							ctx.Doer = authGroup.Verify(ctx.Req, ctx.Resp, ctx, ctx.Session)
 | 
				
			||||||
 | 
							ctx.IsSigned = ctx.Doer != nil
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	r.Get("", container.ReqContainerAccess, container.DetermineSupport)
 | 
						r.Get("", container.ReqContainerAccess, container.DetermineSupport)
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user