jojo/routers/api/packages
wejdross cf51d3c888 fix: enforce package quota against package owner, not uploader (#11442)
## What is broken

Quota on packages is not enforced when pushing to an organisation.

`enforcePackagesQuota()` calls `EvaluateForUser(ctx.Doer.ID, ...)` — it checks how much space the **uploader** personally owns, not the org being pushed to. Since packages accumulate under `package.owner_id = org_id`, the uploader always shows 0 bytes used and the check always passes.

This also means site admins bypass quota entirely when pushing to orgs (they get the service-layer admin bypass on top of the 0-byte measurement).

OCI/container routes (`/v2/...`) have the same problem but worse — `enforcePackagesQuota()` was not called on them at all.

## Fix

Check quota against `ctx.Package.Owner.ID` instead of `ctx.Doer.ID`. The package owner (the org or user being pushed to) is already available via `ctx.Package.Owner`, populated by `PackageAssignment()` before this middleware runs.

For individual user namespaces nothing changes — `ctx.Package.Owner` is the user themselves.

Also wired `enforcePackagesQuota()` into the missing OCI upload routes: `InitiateUploadBlob`, `UploadBlob`, `EndUploadBlob`, `UploadManifest` — both in the named `/{image}` group and the wildcard `/*` handler.

## Tested

Kind cluster, org `maw2` with 1 GiB quota, 2.6 GiB of container images already pushed:

- pushing a generic package to `maw2` as SA user → was 201, now 413
- pushing a generic package to `maw2` as `gitea_admin` → was 201, now 413
- initiating OCI blob upload to `maw2` as SA user → was 202, now 413
- pushing to own user namespace within quota → still 201

Co-authored-by: azhluwi <lukasz.widera@convotis.ch>
Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/11442
Reviewed-by: Andreas Ahlenstorf <aahlenst@noreply.codeberg.org>
Reviewed-by: Mathieu Fenniak <mfenniak@noreply.codeberg.org>
Co-authored-by: wejdross <wejdross@noreply.codeberg.org>
Co-committed-by: wejdross <wejdross@noreply.codeberg.org>
2026-03-09 17:14:50 +01:00
..
alpine fix: return bad request on malformed packages upload input (#10954) 2026-02-13 18:04:19 +01:00
alt fix: return bad request on malformed packages upload input (#10954) 2026-02-13 18:04:19 +01:00
arch fix: return bad request on malformed packages upload input (#10954) 2026-02-13 18:04:19 +01:00
cargo chore: branding import path (#7337) 2025-03-27 19:40:14 +00:00
chef chore(cleanup): replaces unnecessary calls to formatting functions by non-formatting equivalents (#7994) 2025-05-29 17:34:29 +02:00
composer chore: branding import path (#7337) 2025-03-27 19:40:14 +00:00
conan fix: return bad request on malformed packages upload input (#10954) 2026-02-13 18:04:19 +01:00
conda fix: return bad request on malformed packages upload input (#10954) 2026-02-13 18:04:19 +01:00
container fix: extend basic auth to /v2, always include WWW-Authenticate header (#11393) 2026-03-07 03:19:49 +01:00
cran fix: return bad request on malformed packages upload input (#10954) 2026-02-13 18:04:19 +01:00
debian feat: Add HEAD support for debian repo files (#11489) 2026-03-07 18:59:47 +01:00
generic fix: return bad request on malformed packages upload input (#10954) 2026-02-13 18:04:19 +01:00
goproxy fix: return bad request on malformed packages upload input (#10954) 2026-02-13 18:04:19 +01:00
helm fix: return bad request on malformed packages upload input (#10954) 2026-02-13 18:04:19 +01:00
helper feat: remove admin-level permissions from repo-specific & public-only access tokens (#11468) 2026-03-04 16:17:41 +01:00
maven fix: maven use groupId:artifactId for package name concatenation (#6352) 2025-06-01 09:02:29 +02:00
npm ci: add semgrep detection for API code ignoring repo-specific access tokens (#11476) 2026-03-03 17:55:35 +01:00
nuget fix: return bad request on malformed packages upload input (#10954) 2026-02-13 18:04:19 +01:00
pub chore: branding import path (#7337) 2025-03-27 19:40:14 +00:00
pypi chore: branding import path (#7337) 2025-03-27 19:40:14 +00:00
rpm fix: return bad request on malformed packages upload input (#10954) 2026-02-13 18:04:19 +01:00
rubygems fix: return bad request on malformed packages upload input (#10954) 2026-02-13 18:04:19 +01:00
swift Fix some trivial problems (#34237) 2025-04-22 10:20:23 +02:00
vagrant fix: return bad request on malformed packages upload input (#10954) 2026-02-13 18:04:19 +01:00
api.go fix: enforce package quota against package owner, not uploader (#11442) 2026-03-09 17:14:50 +01:00
README.md Add codespell support and fix a good number of typos with its help (#3270) 2024-05-09 13:49:37 +00:00

Gitea Package Registry

This document gives a brief overview how the package registry is organized in code.

Structure

The package registry code is divided into multiple modules to split the functionality and make code reuse possible.

Module Description
models/packages Common methods and models used by all registry types
models/packages/<type> Methods used by specific registry type. There should be no need to use type specific models.
modules/packages Common methods and types used by multiple registry types
modules/packages/<type> Registry type specific methods and types (e.g. metadata extraction of package files)
routers/api/packages Route definitions for all registry types
routers/api/packages/<type> Route implementation for a specific registry type
services/packages Helper methods used by registry types to handle common tasks like package creation and deletion in routers
services/packages/<type> Registry type specific methods used by routers and services

Models

Every package registry implementation uses the same underlying models:

Model Description
Package The root of a package providing values fixed for every version (e.g. the package name)
PackageVersion A version of a package containing metadata (e.g. the package description)
PackageFile A file of a package describing its content (e.g. file name)
PackageBlob The content of a file (may be shared by multiple files)
PackageProperty Additional properties attached to Package, PackageVersion or PackageFile (e.g. used if metadata is needed for routing)

The following diagram shows the relationship between the models:

Package <1---*> PackageVersion <1---*> PackageFile <*---1> PackageBlob

Adding a new package registry type

Before adding a new package registry type have a look at the existing implementation to get an impression of how it could work. Most registry types offer endpoints to retrieve the metadata, upload and download package files. The upload endpoint is often the heavy part because it must validate the uploaded blob, extract metadata and create the models. The methods to validate and extract the metadata should be added in the modules/packages/<type> package. If the upload is valid the methods in services/packages allow to store the upload and create the corresponding models. It depends if the registry type allows multiple files per package version which method should be called:

  • CreatePackageAndAddFile: error if package version already exists
  • CreatePackageOrAddFileToExisting: error if file already exists
  • AddFileToExistingPackage: error if package version does not exist or file already exists

services/packages also contains helper methods to download a file or to remove a package version. There are no helper methods for metadata endpoints because they are very type specific.