gitea源码

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575
  1. // Copyright 2022 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package packages
  4. import (
  5. "net/http"
  6. auth_model "code.gitea.io/gitea/models/auth"
  7. "code.gitea.io/gitea/models/perm"
  8. "code.gitea.io/gitea/modules/log"
  9. "code.gitea.io/gitea/modules/setting"
  10. "code.gitea.io/gitea/modules/web"
  11. "code.gitea.io/gitea/routers/api/packages/alpine"
  12. "code.gitea.io/gitea/routers/api/packages/arch"
  13. "code.gitea.io/gitea/routers/api/packages/cargo"
  14. "code.gitea.io/gitea/routers/api/packages/chef"
  15. "code.gitea.io/gitea/routers/api/packages/composer"
  16. "code.gitea.io/gitea/routers/api/packages/conan"
  17. "code.gitea.io/gitea/routers/api/packages/conda"
  18. "code.gitea.io/gitea/routers/api/packages/container"
  19. "code.gitea.io/gitea/routers/api/packages/cran"
  20. "code.gitea.io/gitea/routers/api/packages/debian"
  21. "code.gitea.io/gitea/routers/api/packages/generic"
  22. "code.gitea.io/gitea/routers/api/packages/goproxy"
  23. "code.gitea.io/gitea/routers/api/packages/helm"
  24. "code.gitea.io/gitea/routers/api/packages/maven"
  25. "code.gitea.io/gitea/routers/api/packages/npm"
  26. "code.gitea.io/gitea/routers/api/packages/nuget"
  27. "code.gitea.io/gitea/routers/api/packages/pub"
  28. "code.gitea.io/gitea/routers/api/packages/pypi"
  29. "code.gitea.io/gitea/routers/api/packages/rpm"
  30. "code.gitea.io/gitea/routers/api/packages/rubygems"
  31. "code.gitea.io/gitea/routers/api/packages/swift"
  32. "code.gitea.io/gitea/routers/api/packages/vagrant"
  33. "code.gitea.io/gitea/services/auth"
  34. "code.gitea.io/gitea/services/context"
  35. )
  36. func reqPackageAccess(accessMode perm.AccessMode) func(ctx *context.Context) {
  37. return func(ctx *context.Context) {
  38. if ctx.Data["IsApiToken"] == true {
  39. scope, ok := ctx.Data["ApiTokenScope"].(auth_model.AccessTokenScope)
  40. if ok { // it's a personal access token but not oauth2 token
  41. scopeMatched := false
  42. var err error
  43. switch accessMode {
  44. case perm.AccessModeRead:
  45. scopeMatched, err = scope.HasScope(auth_model.AccessTokenScopeReadPackage)
  46. if err != nil {
  47. ctx.HTTPError(http.StatusInternalServerError, "HasScope", err.Error())
  48. return
  49. }
  50. case perm.AccessModeWrite:
  51. scopeMatched, err = scope.HasScope(auth_model.AccessTokenScopeWritePackage)
  52. if err != nil {
  53. ctx.HTTPError(http.StatusInternalServerError, "HasScope", err.Error())
  54. return
  55. }
  56. }
  57. if !scopeMatched {
  58. ctx.Resp.Header().Set("WWW-Authenticate", `Basic realm="Gitea Package API"`)
  59. ctx.HTTPError(http.StatusUnauthorized, "reqPackageAccess", "user should have specific permission or be a site admin")
  60. return
  61. }
  62. // check if scope only applies to public resources
  63. publicOnly, err := scope.PublicOnly()
  64. if err != nil {
  65. ctx.HTTPError(http.StatusForbidden, "tokenRequiresScope", "parsing public resource scope failed: "+err.Error())
  66. return
  67. }
  68. if publicOnly {
  69. if ctx.Package != nil && ctx.Package.Owner.Visibility.IsPrivate() {
  70. ctx.HTTPError(http.StatusForbidden, "reqToken", "token scope is limited to public packages")
  71. return
  72. }
  73. }
  74. }
  75. }
  76. if ctx.Package.AccessMode < accessMode && !ctx.IsUserSiteAdmin() {
  77. ctx.Resp.Header().Set("WWW-Authenticate", `Basic realm="Gitea Package API"`)
  78. ctx.HTTPError(http.StatusUnauthorized, "reqPackageAccess", "user should have specific permission or be a site admin")
  79. return
  80. }
  81. }
  82. }
  83. func verifyAuth(r *web.Router, authMethods []auth.Method) {
  84. if setting.Service.EnableReverseProxyAuth {
  85. authMethods = append(authMethods, &auth.ReverseProxy{})
  86. }
  87. authGroup := auth.NewGroup(authMethods...)
  88. r.Use(func(ctx *context.Context) {
  89. var err error
  90. ctx.Doer, err = authGroup.Verify(ctx.Req, ctx.Resp, ctx, ctx.Session)
  91. if err != nil {
  92. log.Error("Failed to verify user: %v", err)
  93. ctx.HTTPError(http.StatusUnauthorized, "Failed to authenticate user")
  94. return
  95. }
  96. ctx.IsSigned = ctx.Doer != nil
  97. })
  98. }
  99. // CommonRoutes provide endpoints for most package managers (except containers - see below)
  100. // These are mounted on `/api/packages` (not `/api/v1/packages`)
  101. func CommonRoutes() *web.Router {
  102. r := web.NewRouter()
  103. r.Use(context.PackageContexter())
  104. verifyAuth(r, []auth.Method{
  105. &auth.OAuth2{},
  106. &auth.Basic{},
  107. &nuget.Auth{},
  108. &conan.Auth{},
  109. &chef.Auth{},
  110. })
  111. r.Group("/{username}", func() {
  112. r.Group("/alpine", func() {
  113. r.Get("/key", alpine.GetRepositoryKey)
  114. r.Group("/{branch}/{repository}", func() {
  115. r.Put("", reqPackageAccess(perm.AccessModeWrite), alpine.UploadPackageFile)
  116. r.Group("/{architecture}", func() {
  117. r.Get("/APKINDEX.tar.gz", alpine.GetRepositoryFile)
  118. r.Group("/{filename}", func() {
  119. r.Get("", alpine.DownloadPackageFile)
  120. r.Delete("", reqPackageAccess(perm.AccessModeWrite), alpine.DeletePackageFile)
  121. })
  122. })
  123. })
  124. }, reqPackageAccess(perm.AccessModeRead))
  125. r.Group("/arch", func() {
  126. r.Methods("HEAD,GET", "/repository.key", arch.GetRepositoryKey)
  127. r.Methods("PUT", "" /* no repository */, reqPackageAccess(perm.AccessModeWrite), arch.UploadPackageFile)
  128. r.PathGroup("/*", func(g *web.RouterPathGroup) {
  129. g.MatchPath("PUT", "/<repository:*>", reqPackageAccess(perm.AccessModeWrite), arch.UploadPackageFile)
  130. g.MatchPath("HEAD,GET", "/<repository:*>/<architecture>/<filename>", arch.GetPackageOrRepositoryFile)
  131. g.MatchPath("DELETE", "/<repository:*>/<name>/<version>/<architecture>", reqPackageAccess(perm.AccessModeWrite), arch.DeletePackageVersion)
  132. })
  133. }, reqPackageAccess(perm.AccessModeRead))
  134. r.Group("/cargo", func() {
  135. r.Group("/api/v1/crates", func() {
  136. r.Get("", cargo.SearchPackages)
  137. r.Put("/new", reqPackageAccess(perm.AccessModeWrite), cargo.UploadPackage)
  138. r.Group("/{package}", func() {
  139. r.Group("/{version}", func() {
  140. r.Get("/download", cargo.DownloadPackageFile)
  141. r.Delete("/yank", reqPackageAccess(perm.AccessModeWrite), cargo.YankPackage)
  142. r.Put("/unyank", reqPackageAccess(perm.AccessModeWrite), cargo.UnyankPackage)
  143. })
  144. r.Get("/owners", cargo.ListOwners)
  145. })
  146. })
  147. r.Get("/config.json", cargo.RepositoryConfig)
  148. r.Get("/1/{package}", cargo.EnumeratePackageVersions)
  149. r.Get("/2/{package}", cargo.EnumeratePackageVersions)
  150. // Use dummy placeholders because these parts are not of interest
  151. r.Get("/3/{_}/{package}", cargo.EnumeratePackageVersions)
  152. r.Get("/{_}/{__}/{package}", cargo.EnumeratePackageVersions)
  153. }, reqPackageAccess(perm.AccessModeRead))
  154. r.Group("/chef", func() {
  155. r.Group("/api/v1", func() {
  156. r.Get("/universe", chef.PackagesUniverse)
  157. r.Get("/search", chef.EnumeratePackages)
  158. r.Group("/cookbooks", func() {
  159. r.Get("", chef.EnumeratePackages)
  160. r.Post("", reqPackageAccess(perm.AccessModeWrite), chef.UploadPackage)
  161. r.Group("/{name}", func() {
  162. r.Get("", chef.PackageMetadata)
  163. r.Group("/versions/{version}", func() {
  164. r.Get("", chef.PackageVersionMetadata)
  165. r.Delete("", reqPackageAccess(perm.AccessModeWrite), chef.DeletePackageVersion)
  166. r.Get("/download", chef.DownloadPackage)
  167. })
  168. r.Delete("", reqPackageAccess(perm.AccessModeWrite), chef.DeletePackage)
  169. })
  170. })
  171. })
  172. }, reqPackageAccess(perm.AccessModeRead))
  173. r.Group("/composer", func() {
  174. r.Get("/packages.json", composer.ServiceIndex)
  175. r.Get("/search.json", composer.SearchPackages)
  176. r.Get("/list.json", composer.EnumeratePackages)
  177. r.Get("/p2/{vendorname}/{projectname}~dev.json", composer.PackageMetadata)
  178. r.Get("/p2/{vendorname}/{projectname}.json", composer.PackageMetadata)
  179. r.Get("/files/{package}/{version}/{filename}", composer.DownloadPackageFile)
  180. r.Put("", reqPackageAccess(perm.AccessModeWrite), composer.UploadPackage)
  181. }, reqPackageAccess(perm.AccessModeRead))
  182. r.Group("/conan", func() {
  183. r.Group("/v1", func() {
  184. r.Get("/ping", conan.Ping)
  185. r.Group("/users", func() {
  186. r.Get("/authenticate", conan.Authenticate)
  187. r.Get("/check_credentials", conan.CheckCredentials)
  188. })
  189. r.Group("/conans", func() {
  190. r.Get("/search", conan.SearchRecipes)
  191. r.Group("/{name}/{version}/{user}/{channel}", func() {
  192. r.Get("", conan.RecipeSnapshot)
  193. r.Delete("", reqPackageAccess(perm.AccessModeWrite), conan.DeleteRecipeV1)
  194. r.Get("/search", conan.SearchPackagesV1)
  195. r.Get("/digest", conan.RecipeDownloadURLs)
  196. r.Post("/upload_urls", reqPackageAccess(perm.AccessModeWrite), conan.RecipeUploadURLs)
  197. r.Get("/download_urls", conan.RecipeDownloadURLs)
  198. r.Group("/packages", func() {
  199. r.Post("/delete", reqPackageAccess(perm.AccessModeWrite), conan.DeletePackageV1)
  200. r.Group("/{package_reference}", func() {
  201. r.Get("", conan.PackageSnapshot)
  202. r.Get("/digest", conan.PackageDownloadURLs)
  203. r.Post("/upload_urls", reqPackageAccess(perm.AccessModeWrite), conan.PackageUploadURLs)
  204. r.Get("/download_urls", conan.PackageDownloadURLs)
  205. })
  206. })
  207. }, conan.ExtractPathParameters)
  208. })
  209. r.Group("/files/{name}/{version}/{user}/{channel}/{recipe_revision}", func() {
  210. r.Group("/recipe/{filename}", func() {
  211. r.Get("", conan.DownloadRecipeFile)
  212. r.Put("", reqPackageAccess(perm.AccessModeWrite), conan.UploadRecipeFile)
  213. })
  214. r.Group("/package/{package_reference}/{package_revision}/{filename}", func() {
  215. r.Get("", conan.DownloadPackageFile)
  216. r.Put("", reqPackageAccess(perm.AccessModeWrite), conan.UploadPackageFile)
  217. })
  218. }, conan.ExtractPathParameters)
  219. })
  220. r.Group("/v2", func() {
  221. r.Get("/ping", conan.Ping)
  222. r.Group("/users", func() {
  223. r.Get("/authenticate", conan.Authenticate)
  224. r.Get("/check_credentials", conan.CheckCredentials)
  225. })
  226. r.Group("/conans", func() {
  227. r.Get("/search", conan.SearchRecipes)
  228. r.Group("/{name}/{version}/{user}/{channel}", func() {
  229. r.Delete("", reqPackageAccess(perm.AccessModeWrite), conan.DeleteRecipeV2)
  230. r.Get("/search", conan.SearchPackagesV2)
  231. r.Get("/latest", conan.LatestRecipeRevision)
  232. r.Group("/revisions", func() {
  233. r.Get("", conan.ListRecipeRevisions)
  234. r.Group("/{recipe_revision}", func() {
  235. r.Delete("", reqPackageAccess(perm.AccessModeWrite), conan.DeleteRecipeV2)
  236. r.Get("/search", conan.SearchPackagesV2)
  237. r.Group("/files", func() {
  238. r.Get("", conan.ListRecipeRevisionFiles)
  239. r.Group("/{filename}", func() {
  240. r.Get("", conan.DownloadRecipeFile)
  241. r.Put("", reqPackageAccess(perm.AccessModeWrite), conan.UploadRecipeFile)
  242. })
  243. })
  244. r.Group("/packages", func() {
  245. r.Delete("", reqPackageAccess(perm.AccessModeWrite), conan.DeletePackageV2)
  246. r.Group("/{package_reference}", func() {
  247. r.Delete("", reqPackageAccess(perm.AccessModeWrite), conan.DeletePackageV2)
  248. r.Get("/latest", conan.LatestPackageRevision)
  249. r.Group("/revisions", func() {
  250. r.Get("", conan.ListPackageRevisions)
  251. r.Group("/{package_revision}", func() {
  252. r.Delete("", reqPackageAccess(perm.AccessModeWrite), conan.DeletePackageV2)
  253. r.Group("/files", func() {
  254. r.Get("", conan.ListPackageRevisionFiles)
  255. r.Group("/{filename}", func() {
  256. r.Get("", conan.DownloadPackageFile)
  257. r.Put("", reqPackageAccess(perm.AccessModeWrite), conan.UploadPackageFile)
  258. })
  259. })
  260. })
  261. })
  262. })
  263. })
  264. })
  265. })
  266. }, conan.ExtractPathParameters)
  267. })
  268. })
  269. }, reqPackageAccess(perm.AccessModeRead))
  270. r.PathGroup("/conda/*", func(g *web.RouterPathGroup) {
  271. g.MatchPath("GET", "/<architecture>/<filename>", conda.ListOrGetPackages)
  272. g.MatchPath("GET", "/<channel:*>/<architecture>/<filename>", conda.ListOrGetPackages)
  273. g.MatchPath("PUT", "/<channel:*>/<filename>", reqPackageAccess(perm.AccessModeWrite), conda.UploadPackageFile)
  274. }, reqPackageAccess(perm.AccessModeRead))
  275. r.Group("/cran", func() {
  276. r.Group("/src", func() {
  277. r.Group("/contrib", func() {
  278. r.Get("/PACKAGES", cran.EnumerateSourcePackages)
  279. r.Get("/PACKAGES{format}", cran.EnumerateSourcePackages)
  280. r.Get("/{filename}", cran.DownloadSourcePackageFile)
  281. r.Get("/Archive/{packagename}/{filename}", cran.DownloadSourcePackageFile)
  282. })
  283. r.Put("", reqPackageAccess(perm.AccessModeWrite), cran.UploadSourcePackageFile)
  284. })
  285. r.Group("/bin", func() {
  286. r.Group("/{platform}/contrib/{rversion}", func() {
  287. r.Get("/PACKAGES", cran.EnumerateBinaryPackages)
  288. r.Get("/PACKAGES{format}", cran.EnumerateBinaryPackages)
  289. r.Get("/{filename}", cran.DownloadBinaryPackageFile)
  290. })
  291. r.Put("", reqPackageAccess(perm.AccessModeWrite), cran.UploadBinaryPackageFile)
  292. })
  293. }, reqPackageAccess(perm.AccessModeRead))
  294. r.Group("/debian", func() {
  295. r.Get("/repository.key", debian.GetRepositoryKey)
  296. r.Group("/dists/{distribution}", func() {
  297. r.Get("/{filename}", debian.GetRepositoryFile)
  298. r.Get("/by-hash/{algorithm}/{hash}", debian.GetRepositoryFileByHash)
  299. r.Group("/{component}/{architecture}", func() {
  300. r.Get("/{filename}", debian.GetRepositoryFile)
  301. r.Get("/by-hash/{algorithm}/{hash}", debian.GetRepositoryFileByHash)
  302. })
  303. })
  304. r.Group("/pool/{distribution}/{component}", func() {
  305. r.Get("/{name}_{version}_{architecture}.deb", debian.DownloadPackageFile)
  306. r.Group("", func() {
  307. r.Put("/upload", debian.UploadPackageFile)
  308. r.Delete("/{name}/{version}/{architecture}", debian.DeletePackageFile)
  309. }, reqPackageAccess(perm.AccessModeWrite))
  310. })
  311. }, reqPackageAccess(perm.AccessModeRead))
  312. r.Group("/go", func() {
  313. r.Put("/upload", reqPackageAccess(perm.AccessModeWrite), goproxy.UploadPackage)
  314. r.Get("/sumdb/sum.golang.org/supported", http.NotFound)
  315. // https://go.dev/ref/mod#goproxy-protocol
  316. r.PathGroup("/*", func(g *web.RouterPathGroup) {
  317. g.MatchPath("GET", "/<name:*>/@<version:latest>", goproxy.PackageVersionMetadata)
  318. g.MatchPath("GET", "/<name:*>/@v/list", goproxy.EnumeratePackageVersions)
  319. g.MatchPath("GET", "/<name:*>/@v/<version>.zip", goproxy.DownloadPackageFile)
  320. g.MatchPath("GET", "/<name:*>/@v/<version>.info", goproxy.PackageVersionMetadata)
  321. g.MatchPath("GET", "/<name:*>/@v/<version>.mod", goproxy.PackageVersionGoModContent)
  322. })
  323. }, reqPackageAccess(perm.AccessModeRead))
  324. r.Group("/generic", func() {
  325. r.Group("/{packagename}/{packageversion}", func() {
  326. r.Delete("", reqPackageAccess(perm.AccessModeWrite), generic.DeletePackage)
  327. r.Group("/{filename}", func() {
  328. r.Methods("HEAD,GET", "", generic.DownloadPackageFile)
  329. r.Group("", func() {
  330. r.Put("", generic.UploadPackage)
  331. r.Delete("", generic.DeletePackageFile)
  332. }, reqPackageAccess(perm.AccessModeWrite))
  333. })
  334. })
  335. }, reqPackageAccess(perm.AccessModeRead))
  336. r.Group("/helm", func() {
  337. r.Get("/index.yaml", helm.Index)
  338. r.Get("/{filename}", helm.DownloadPackageFile)
  339. r.Post("/api/charts", reqPackageAccess(perm.AccessModeWrite), helm.UploadPackage)
  340. }, reqPackageAccess(perm.AccessModeRead))
  341. r.Group("/maven", func() {
  342. r.Put("/*", reqPackageAccess(perm.AccessModeWrite), maven.UploadPackageFile)
  343. r.Get("/*", maven.DownloadPackageFile)
  344. r.Head("/*", maven.ProvidePackageFileHeader)
  345. }, reqPackageAccess(perm.AccessModeRead))
  346. r.Group("/nuget", func() {
  347. r.Group("", func() { // Needs to be unauthenticated for the NuGet client.
  348. r.Get("/", nuget.ServiceIndexV2)
  349. r.Get("/index.json", nuget.ServiceIndexV3)
  350. r.Get("/$metadata", nuget.FeedCapabilityResource)
  351. })
  352. r.Group("", func() {
  353. r.Get("/query", nuget.SearchServiceV3)
  354. r.Group("/registration/{id}", func() {
  355. r.Get("/index.json", nuget.RegistrationIndex)
  356. r.Get("/{version}", nuget.RegistrationLeafV3)
  357. })
  358. r.Group("/package/{id}", func() {
  359. r.Get("/index.json", nuget.EnumeratePackageVersionsV3)
  360. r.Get("/{version}/{filename}", nuget.DownloadPackageFile)
  361. })
  362. r.Group("", func() {
  363. r.Put("/", nuget.UploadPackage)
  364. r.Put("/symbolpackage", nuget.UploadSymbolPackage)
  365. r.Delete("/{id}/{version}", nuget.DeletePackage)
  366. }, reqPackageAccess(perm.AccessModeWrite))
  367. r.Get("/symbols/{filename}/{guid:[0-9a-fA-F]{32}[fF]{8}}/{filename2}", nuget.DownloadSymbolFile)
  368. r.Get("/Packages(Id='{id:[^']+}',Version='{version:[^']+}')", nuget.RegistrationLeafV2)
  369. r.Group("/Packages()", func() {
  370. r.Get("", nuget.SearchServiceV2)
  371. r.Get("/$count", nuget.SearchServiceV2Count)
  372. })
  373. r.Group("/FindPackagesById()", func() {
  374. r.Get("", nuget.EnumeratePackageVersionsV2)
  375. r.Get("/$count", nuget.EnumeratePackageVersionsV2Count)
  376. })
  377. r.Group("/Search()", func() {
  378. r.Get("", nuget.SearchServiceV2)
  379. r.Get("/$count", nuget.SearchServiceV2Count)
  380. })
  381. }, reqPackageAccess(perm.AccessModeRead))
  382. })
  383. r.Group("/npm", func() {
  384. r.Group("/@{scope}/{id}", func() {
  385. r.Get("", npm.PackageMetadata)
  386. r.Put("", reqPackageAccess(perm.AccessModeWrite), npm.UploadPackage)
  387. r.Group("/-/{version}/{filename}", func() {
  388. r.Get("", npm.DownloadPackageFile)
  389. r.Delete("/-rev/{revision}", reqPackageAccess(perm.AccessModeWrite), npm.DeletePackageVersion)
  390. })
  391. r.Get("/-/{filename}", npm.DownloadPackageFileByName)
  392. r.Group("/-rev/{revision}", func() {
  393. r.Delete("", npm.DeletePackage)
  394. r.Put("", npm.DeletePreview)
  395. }, reqPackageAccess(perm.AccessModeWrite))
  396. })
  397. r.Group("/{id}", func() {
  398. r.Get("", npm.PackageMetadata)
  399. r.Put("", reqPackageAccess(perm.AccessModeWrite), npm.UploadPackage)
  400. r.Group("/-/{version}/{filename}", func() {
  401. r.Get("", npm.DownloadPackageFile)
  402. r.Delete("/-rev/{revision}", reqPackageAccess(perm.AccessModeWrite), npm.DeletePackageVersion)
  403. })
  404. r.Get("/-/{filename}", npm.DownloadPackageFileByName)
  405. r.Group("/-rev/{revision}", func() {
  406. r.Delete("", npm.DeletePackage)
  407. r.Put("", npm.DeletePreview)
  408. }, reqPackageAccess(perm.AccessModeWrite))
  409. })
  410. r.Group("/-/package/@{scope}/{id}/dist-tags", func() {
  411. r.Get("", npm.ListPackageTags)
  412. r.Group("/{tag}", func() {
  413. r.Put("", npm.AddPackageTag)
  414. r.Delete("", npm.DeletePackageTag)
  415. }, reqPackageAccess(perm.AccessModeWrite))
  416. })
  417. r.Group("/-/package/{id}/dist-tags", func() {
  418. r.Get("", npm.ListPackageTags)
  419. r.Group("/{tag}", func() {
  420. r.Put("", npm.AddPackageTag)
  421. r.Delete("", npm.DeletePackageTag)
  422. }, reqPackageAccess(perm.AccessModeWrite))
  423. })
  424. r.Group("/-/v1/search", func() {
  425. r.Get("", npm.PackageSearch)
  426. })
  427. }, reqPackageAccess(perm.AccessModeRead))
  428. r.Group("/pub", func() {
  429. r.Group("/api/packages", func() {
  430. r.Group("/versions/new", func() {
  431. r.Get("", pub.RequestUpload)
  432. r.Post("/upload", pub.UploadPackageFile)
  433. r.Get("/finalize/{id}/{version}", pub.FinalizePackage)
  434. }, reqPackageAccess(perm.AccessModeWrite))
  435. r.Group("/{id}", func() {
  436. r.Get("", pub.EnumeratePackageVersions)
  437. r.Get("/files/{version}", pub.DownloadPackageFile)
  438. r.Get("/{version}", pub.PackageVersionMetadata)
  439. })
  440. })
  441. }, reqPackageAccess(perm.AccessModeRead))
  442. r.Group("/pypi", func() {
  443. r.Post("/", reqPackageAccess(perm.AccessModeWrite), pypi.UploadPackageFile)
  444. r.Get("/files/{id}/{version}/{filename}", pypi.DownloadPackageFile)
  445. r.Get("/simple/{id}", pypi.PackageMetadata)
  446. }, reqPackageAccess(perm.AccessModeRead))
  447. r.Methods("HEAD,GET", "/rpm.repo", reqPackageAccess(perm.AccessModeRead), rpm.GetRepositoryConfig)
  448. r.PathGroup("/rpm/*", func(g *web.RouterPathGroup) {
  449. g.MatchPath("HEAD,GET", "/repository.key", rpm.GetRepositoryKey)
  450. g.MatchPath("HEAD,GET", "/<group:*>.repo", rpm.GetRepositoryConfig)
  451. g.MatchPath("HEAD", "/<group:*>/repodata/<filename>", rpm.CheckRepositoryFileExistence)
  452. g.MatchPath("GET", "/<group:*>/repodata/<filename>", rpm.GetRepositoryFile)
  453. g.MatchPath("PUT", "/<group:*>/upload", reqPackageAccess(perm.AccessModeWrite), rpm.UploadPackageFile)
  454. // this URL pattern is only used internally in the RPM index, it is generated by us, the filename part is not really used (can be anything)
  455. g.MatchPath("HEAD,GET", "/<group:*>/package/<name>/<version>/<architecture>", rpm.DownloadPackageFile)
  456. g.MatchPath("HEAD,GET", "/<group:*>/package/<name>/<version>/<architecture>/<filename>", rpm.DownloadPackageFile)
  457. g.MatchPath("DELETE", "/<group:*>/package/<name>/<version>/<architecture>", reqPackageAccess(perm.AccessModeWrite), rpm.DeletePackageFile)
  458. }, reqPackageAccess(perm.AccessModeRead))
  459. r.Group("/rubygems", func() {
  460. r.Get("/specs.4.8.gz", rubygems.EnumeratePackages)
  461. r.Get("/latest_specs.4.8.gz", rubygems.EnumeratePackagesLatest)
  462. r.Get("/prerelease_specs.4.8.gz", rubygems.EnumeratePackagesPreRelease)
  463. r.Get("/quick/Marshal.4.8/{filename}", rubygems.ServePackageSpecification)
  464. r.Get("/gems/{filename}", rubygems.DownloadPackageFile)
  465. r.Get("/info/{packagename}", rubygems.GetPackageInfo)
  466. r.Get("/versions", rubygems.GetAllPackagesVersions)
  467. r.Group("/api/v1/gems", func() {
  468. r.Post("/", rubygems.UploadPackageFile)
  469. r.Delete("/yank", rubygems.DeletePackage)
  470. }, reqPackageAccess(perm.AccessModeWrite))
  471. }, reqPackageAccess(perm.AccessModeRead))
  472. r.Group("/swift", func() {
  473. r.Group("", func() { // Needs to be unauthenticated.
  474. r.Post("", swift.CheckAuthenticate)
  475. r.Post("/login", swift.CheckAuthenticate)
  476. })
  477. r.Group("", func() {
  478. r.Group("/{scope}/{name}", func() {
  479. r.Group("", func() {
  480. r.Get("", swift.EnumeratePackageVersions)
  481. r.Get(".json", swift.EnumeratePackageVersions)
  482. }, swift.CheckAcceptMediaType(swift.AcceptJSON))
  483. r.PathGroup("/*", func(g *web.RouterPathGroup) {
  484. g.MatchPath("GET", "/<version>.json", swift.CheckAcceptMediaType(swift.AcceptJSON), swift.PackageVersionMetadata)
  485. g.MatchPath("GET", "/<version>.zip", swift.CheckAcceptMediaType(swift.AcceptZip), swift.DownloadPackageFile)
  486. g.MatchPath("GET", "/<version>/Package.swift", swift.CheckAcceptMediaType(swift.AcceptSwift), swift.DownloadManifest)
  487. g.MatchPath("GET", "/<version>", swift.CheckAcceptMediaType(swift.AcceptJSON), swift.PackageVersionMetadata)
  488. g.MatchPath("PUT", "/<version>", reqPackageAccess(perm.AccessModeWrite), swift.CheckAcceptMediaType(swift.AcceptJSON), swift.UploadPackageFile)
  489. })
  490. })
  491. r.Get("/identifiers", swift.CheckAcceptMediaType(swift.AcceptJSON), swift.LookupPackageIdentifiers)
  492. }, reqPackageAccess(perm.AccessModeRead))
  493. })
  494. r.Group("/vagrant", func() {
  495. r.Group("/authenticate", func() {
  496. r.Get("", vagrant.CheckAuthenticate)
  497. })
  498. r.Group("/{name}", func() {
  499. r.Head("", vagrant.CheckBoxAvailable)
  500. r.Get("", vagrant.EnumeratePackageVersions)
  501. r.Group("/{version}/{provider}", func() {
  502. r.Get("", vagrant.DownloadPackageFile)
  503. r.Put("", reqPackageAccess(perm.AccessModeWrite), vagrant.UploadPackageFile)
  504. })
  505. })
  506. }, reqPackageAccess(perm.AccessModeRead))
  507. }, context.UserAssignmentWeb(), context.PackageAssignment())
  508. return r
  509. }
  510. // ContainerRoutes provides endpoints that implement the OCI API to serve containers
  511. // These have to be mounted on `/v2/...` to comply with the OCI spec:
  512. // https://github.com/opencontainers/distribution-spec/blob/main/spec.md
  513. func ContainerRoutes() *web.Router {
  514. r := web.NewRouter()
  515. r.Use(context.PackageContexter())
  516. verifyAuth(r, []auth.Method{
  517. &auth.Basic{},
  518. &container.Auth{},
  519. })
  520. // TODO: Content Discovery / References (not implemented yet)
  521. r.Get("", container.ReqContainerAccess, container.DetermineSupport)
  522. r.Group("/token", func() {
  523. r.Get("", container.Authenticate)
  524. r.Post("", container.AuthenticateNotImplemented)
  525. })
  526. r.Get("/_catalog", container.ReqContainerAccess, container.GetRepositoryList)
  527. r.Group("/{username}", func() {
  528. r.PathGroup("/*", func(g *web.RouterPathGroup) {
  529. g.MatchPath("POST", "/<image:*>/blobs/uploads", reqPackageAccess(perm.AccessModeWrite), container.VerifyImageName, container.PostBlobsUploads)
  530. g.MatchPath("GET", "/<image:*>/tags/list", container.VerifyImageName, container.GetTagsList)
  531. patternBlobsUploadsUUID := g.PatternRegexp(`/<image:*>/blobs/uploads/<uuid:[-.=\w]+>`, reqPackageAccess(perm.AccessModeWrite), container.VerifyImageName)
  532. g.MatchPattern("GET", patternBlobsUploadsUUID, container.GetBlobsUpload)
  533. g.MatchPattern("PATCH", patternBlobsUploadsUUID, container.PatchBlobsUpload)
  534. g.MatchPattern("PUT", patternBlobsUploadsUUID, container.PutBlobsUpload)
  535. g.MatchPattern("DELETE", patternBlobsUploadsUUID, container.DeleteBlobsUpload)
  536. g.MatchPath("HEAD", `/<image:*>/blobs/<digest>`, container.VerifyImageName, container.HeadBlob)
  537. g.MatchPath("GET", `/<image:*>/blobs/<digest>`, container.VerifyImageName, container.GetBlob)
  538. g.MatchPath("DELETE", `/<image:*>/blobs/<digest>`, container.VerifyImageName, reqPackageAccess(perm.AccessModeWrite), container.DeleteBlob)
  539. g.MatchPath("HEAD", `/<image:*>/manifests/<reference>`, container.VerifyImageName, container.HeadManifest)
  540. g.MatchPath("GET", `/<image:*>/manifests/<reference>`, container.VerifyImageName, container.GetManifest)
  541. g.MatchPath("PUT", `/<image:*>/manifests/<reference>`, container.VerifyImageName, reqPackageAccess(perm.AccessModeWrite), container.PutManifest)
  542. g.MatchPath("DELETE", `/<image:*>/manifests/<reference>`, container.VerifyImageName, reqPackageAccess(perm.AccessModeWrite), container.DeleteManifest)
  543. })
  544. }, container.ReqContainerAccess, context.UserAssignmentWeb(), context.PackageAssignment(), reqPackageAccess(perm.AccessModeRead))
  545. return r
  546. }