Платформа ЦРНП "Мирокод" для разработки проектов
https://git.mirocod.ru
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1212 lines
39 KiB
1212 lines
39 KiB
// Copyright 2014 The Gogs Authors. All rights reserved. |
|
// Copyright 2018 The Gitea Authors. All rights reserved. |
|
// Use of this source code is governed by a MIT-style |
|
// license that can be found in the LICENSE file. |
|
|
|
package repo |
|
|
|
import ( |
|
"errors" |
|
"fmt" |
|
"io" |
|
"net/http" |
|
"strconv" |
|
"strings" |
|
"time" |
|
|
|
"code.gitea.io/gitea/models" |
|
asymkey_model "code.gitea.io/gitea/models/asymkey" |
|
"code.gitea.io/gitea/models/db" |
|
"code.gitea.io/gitea/models/perm" |
|
repo_model "code.gitea.io/gitea/models/repo" |
|
unit_model "code.gitea.io/gitea/models/unit" |
|
user_model "code.gitea.io/gitea/models/user" |
|
"code.gitea.io/gitea/modules/base" |
|
"code.gitea.io/gitea/modules/context" |
|
"code.gitea.io/gitea/modules/git" |
|
"code.gitea.io/gitea/modules/indexer/code" |
|
"code.gitea.io/gitea/modules/indexer/stats" |
|
"code.gitea.io/gitea/modules/lfs" |
|
"code.gitea.io/gitea/modules/log" |
|
"code.gitea.io/gitea/modules/repository" |
|
"code.gitea.io/gitea/modules/setting" |
|
"code.gitea.io/gitea/modules/structs" |
|
"code.gitea.io/gitea/modules/typesniffer" |
|
"code.gitea.io/gitea/modules/util" |
|
"code.gitea.io/gitea/modules/validation" |
|
"code.gitea.io/gitea/modules/web" |
|
"code.gitea.io/gitea/routers/utils" |
|
asymkey_service "code.gitea.io/gitea/services/asymkey" |
|
"code.gitea.io/gitea/services/forms" |
|
"code.gitea.io/gitea/services/mailer" |
|
"code.gitea.io/gitea/services/migrations" |
|
mirror_service "code.gitea.io/gitea/services/mirror" |
|
repo_service "code.gitea.io/gitea/services/repository" |
|
wiki_service "code.gitea.io/gitea/services/wiki" |
|
) |
|
|
|
const ( |
|
tplSettingsOptions base.TplName = "repo/settings/options" |
|
tplCollaboration base.TplName = "repo/settings/collaboration" |
|
tplBranches base.TplName = "repo/settings/branches" |
|
tplTags base.TplName = "repo/settings/tags" |
|
tplGithooks base.TplName = "repo/settings/githooks" |
|
tplGithookEdit base.TplName = "repo/settings/githook_edit" |
|
tplDeployKeys base.TplName = "repo/settings/deploy_keys" |
|
tplProtectedBranch base.TplName = "repo/settings/protected_branch" |
|
) |
|
|
|
// Settings show a repository's settings page |
|
func Settings(ctx *context.Context) { |
|
ctx.Data["Title"] = ctx.Tr("repo.settings") |
|
ctx.Data["PageIsSettingsOptions"] = true |
|
ctx.Data["ForcePrivate"] = setting.Repository.ForcePrivate |
|
ctx.Data["MirrorsEnabled"] = setting.Mirror.Enabled |
|
ctx.Data["DisableNewPushMirrors"] = setting.Mirror.DisableNewPush |
|
ctx.Data["DefaultMirrorInterval"] = setting.Mirror.DefaultInterval |
|
|
|
signing, _ := asymkey_service.SigningKey(ctx.Repo.Repository.RepoPath()) |
|
ctx.Data["SigningKeyAvailable"] = len(signing) > 0 |
|
ctx.Data["SigningSettings"] = setting.Repository.Signing |
|
ctx.Data["CodeIndexerEnabled"] = setting.Indexer.RepoIndexerEnabled |
|
if ctx.User.IsAdmin { |
|
if setting.Indexer.RepoIndexerEnabled { |
|
status, err := repo_model.GetIndexerStatus(ctx.Repo.Repository, repo_model.RepoIndexerTypeCode) |
|
if err != nil { |
|
ctx.ServerError("repo.indexer_status", err) |
|
return |
|
} |
|
ctx.Data["CodeIndexerStatus"] = status |
|
} |
|
status, err := repo_model.GetIndexerStatus(ctx.Repo.Repository, repo_model.RepoIndexerTypeStats) |
|
if err != nil { |
|
ctx.ServerError("repo.indexer_status", err) |
|
return |
|
} |
|
ctx.Data["StatsIndexerStatus"] = status |
|
} |
|
pushMirrors, err := repo_model.GetPushMirrorsByRepoID(ctx.Repo.Repository.ID) |
|
if err != nil { |
|
ctx.ServerError("GetPushMirrorsByRepoID", err) |
|
return |
|
} |
|
ctx.Data["PushMirrors"] = pushMirrors |
|
|
|
ctx.HTML(http.StatusOK, tplSettingsOptions) |
|
} |
|
|
|
// SettingsPost response for changes of a repository |
|
func SettingsPost(ctx *context.Context) { |
|
form := web.GetForm(ctx).(*forms.RepoSettingForm) |
|
ctx.Data["Title"] = ctx.Tr("repo.settings") |
|
ctx.Data["PageIsSettingsOptions"] = true |
|
|
|
repo := ctx.Repo.Repository |
|
|
|
switch ctx.FormString("action") { |
|
case "update": |
|
if ctx.HasError() { |
|
ctx.HTML(http.StatusOK, tplSettingsOptions) |
|
return |
|
} |
|
|
|
newRepoName := form.RepoName |
|
// Check if repository name has been changed. |
|
if repo.LowerName != strings.ToLower(newRepoName) { |
|
// Close the GitRepo if open |
|
if ctx.Repo.GitRepo != nil { |
|
ctx.Repo.GitRepo.Close() |
|
ctx.Repo.GitRepo = nil |
|
} |
|
if err := repo_service.ChangeRepositoryName(ctx.User, repo, newRepoName); err != nil { |
|
ctx.Data["Err_RepoName"] = true |
|
switch { |
|
case repo_model.IsErrRepoAlreadyExist(err): |
|
ctx.RenderWithErr(ctx.Tr("form.repo_name_been_taken"), tplSettingsOptions, &form) |
|
case db.IsErrNameReserved(err): |
|
ctx.RenderWithErr(ctx.Tr("repo.form.name_reserved", err.(db.ErrNameReserved).Name), tplSettingsOptions, &form) |
|
case repo_model.IsErrRepoFilesAlreadyExist(err): |
|
ctx.Data["Err_RepoName"] = true |
|
switch { |
|
case ctx.IsUserSiteAdmin() || (setting.Repository.AllowAdoptionOfUnadoptedRepositories && setting.Repository.AllowDeleteOfUnadoptedRepositories): |
|
ctx.RenderWithErr(ctx.Tr("form.repository_files_already_exist.adopt_or_delete"), tplSettingsOptions, form) |
|
case setting.Repository.AllowAdoptionOfUnadoptedRepositories: |
|
ctx.RenderWithErr(ctx.Tr("form.repository_files_already_exist.adopt"), tplSettingsOptions, form) |
|
case setting.Repository.AllowDeleteOfUnadoptedRepositories: |
|
ctx.RenderWithErr(ctx.Tr("form.repository_files_already_exist.delete"), tplSettingsOptions, form) |
|
default: |
|
ctx.RenderWithErr(ctx.Tr("form.repository_files_already_exist"), tplSettingsOptions, form) |
|
} |
|
case db.IsErrNamePatternNotAllowed(err): |
|
ctx.RenderWithErr(ctx.Tr("repo.form.name_pattern_not_allowed", err.(db.ErrNamePatternNotAllowed).Pattern), tplSettingsOptions, &form) |
|
default: |
|
ctx.ServerError("ChangeRepositoryName", err) |
|
} |
|
return |
|
} |
|
|
|
log.Trace("Repository name changed: %s/%s -> %s", ctx.Repo.Owner.Name, repo.Name, newRepoName) |
|
} |
|
// In case it's just a case change. |
|
repo.Name = newRepoName |
|
repo.LowerName = strings.ToLower(newRepoName) |
|
repo.Description = form.Description |
|
repo.Website = form.Website |
|
repo.IsTemplate = form.Template |
|
|
|
// Visibility of forked repository is forced sync with base repository. |
|
if repo.IsFork { |
|
form.Private = repo.BaseRepo.IsPrivate || repo.BaseRepo.Owner.Visibility == structs.VisibleTypePrivate |
|
} |
|
|
|
visibilityChanged := repo.IsPrivate != form.Private |
|
// when ForcePrivate enabled, you could change public repo to private, but only admin users can change private to public |
|
if visibilityChanged && setting.Repository.ForcePrivate && !form.Private && !ctx.User.IsAdmin { |
|
ctx.RenderWithErr(ctx.Tr("form.repository_force_private"), tplSettingsOptions, form) |
|
return |
|
} |
|
|
|
repo.IsPrivate = form.Private |
|
if err := models.UpdateRepository(repo, visibilityChanged); err != nil { |
|
ctx.ServerError("UpdateRepository", err) |
|
return |
|
} |
|
log.Trace("Repository basic settings updated: %s/%s", ctx.Repo.Owner.Name, repo.Name) |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.update_settings_success")) |
|
ctx.Redirect(repo.Link() + "/settings") |
|
|
|
case "mirror": |
|
if !setting.Mirror.Enabled || !repo.IsMirror { |
|
ctx.NotFound("", nil) |
|
return |
|
} |
|
|
|
// This section doesn't require repo_name/RepoName to be set in the form, don't show it |
|
// as an error on the UI for this action |
|
ctx.Data["Err_RepoName"] = nil |
|
|
|
interval, err := time.ParseDuration(form.Interval) |
|
if err != nil || (interval != 0 && interval < setting.Mirror.MinInterval) { |
|
ctx.Data["Err_Interval"] = true |
|
ctx.RenderWithErr(ctx.Tr("repo.mirror_interval_invalid"), tplSettingsOptions, &form) |
|
} else { |
|
ctx.Repo.Mirror.EnablePrune = form.EnablePrune |
|
ctx.Repo.Mirror.Interval = interval |
|
ctx.Repo.Mirror.ScheduleNextUpdate() |
|
if err := repo_model.UpdateMirror(ctx.Repo.Mirror); err != nil { |
|
ctx.Data["Err_Interval"] = true |
|
ctx.RenderWithErr(ctx.Tr("repo.mirror_interval_invalid"), tplSettingsOptions, &form) |
|
return |
|
} |
|
} |
|
|
|
u, _ := git.GetRemoteAddress(ctx, ctx.Repo.Repository.RepoPath(), ctx.Repo.Mirror.GetRemoteName()) |
|
if u.User != nil && form.MirrorPassword == "" && form.MirrorUsername == u.User.Username() { |
|
form.MirrorPassword, _ = u.User.Password() |
|
} |
|
|
|
address, err := forms.ParseRemoteAddr(form.MirrorAddress, form.MirrorUsername, form.MirrorPassword) |
|
if err == nil { |
|
err = migrations.IsMigrateURLAllowed(address, ctx.User) |
|
} |
|
if err != nil { |
|
ctx.Data["Err_MirrorAddress"] = true |
|
handleSettingRemoteAddrError(ctx, err, form) |
|
return |
|
} |
|
|
|
if err := mirror_service.UpdateAddress(ctx.Repo.Mirror, address); err != nil { |
|
ctx.ServerError("UpdateAddress", err) |
|
return |
|
} |
|
|
|
form.LFS = form.LFS && setting.LFS.StartServer |
|
|
|
if len(form.LFSEndpoint) > 0 { |
|
ep := lfs.DetermineEndpoint("", form.LFSEndpoint) |
|
if ep == nil { |
|
ctx.Data["Err_LFSEndpoint"] = true |
|
ctx.RenderWithErr(ctx.Tr("repo.migrate.invalid_lfs_endpoint"), tplSettingsOptions, &form) |
|
return |
|
} |
|
err = migrations.IsMigrateURLAllowed(ep.String(), ctx.User) |
|
if err != nil { |
|
ctx.Data["Err_LFSEndpoint"] = true |
|
handleSettingRemoteAddrError(ctx, err, form) |
|
return |
|
} |
|
} |
|
|
|
ctx.Repo.Mirror.LFS = form.LFS |
|
ctx.Repo.Mirror.LFSEndpoint = form.LFSEndpoint |
|
if err := repo_model.UpdateMirror(ctx.Repo.Mirror); err != nil { |
|
ctx.ServerError("UpdateMirror", err) |
|
return |
|
} |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.update_settings_success")) |
|
ctx.Redirect(repo.Link() + "/settings") |
|
|
|
case "mirror-sync": |
|
if !setting.Mirror.Enabled || !repo.IsMirror { |
|
ctx.NotFound("", nil) |
|
return |
|
} |
|
|
|
mirror_service.StartToMirror(repo.ID) |
|
|
|
ctx.Flash.Info(ctx.Tr("repo.settings.mirror_sync_in_progress")) |
|
ctx.Redirect(repo.Link() + "/settings") |
|
|
|
case "push-mirror-sync": |
|
if !setting.Mirror.Enabled { |
|
ctx.NotFound("", nil) |
|
return |
|
} |
|
|
|
m, err := selectPushMirrorByForm(form, repo) |
|
if err != nil { |
|
ctx.NotFound("", nil) |
|
return |
|
} |
|
|
|
mirror_service.AddPushMirrorToQueue(m.ID) |
|
|
|
ctx.Flash.Info(ctx.Tr("repo.settings.mirror_sync_in_progress")) |
|
ctx.Redirect(repo.Link() + "/settings") |
|
|
|
case "push-mirror-remove": |
|
if !setting.Mirror.Enabled { |
|
ctx.NotFound("", nil) |
|
return |
|
} |
|
|
|
// This section doesn't require repo_name/RepoName to be set in the form, don't show it |
|
// as an error on the UI for this action |
|
ctx.Data["Err_RepoName"] = nil |
|
|
|
m, err := selectPushMirrorByForm(form, repo) |
|
if err != nil { |
|
ctx.NotFound("", nil) |
|
return |
|
} |
|
|
|
if err = mirror_service.RemovePushMirrorRemote(m); err != nil { |
|
ctx.ServerError("RemovePushMirrorRemote", err) |
|
return |
|
} |
|
|
|
if err = repo_model.DeletePushMirrorByID(m.ID); err != nil { |
|
ctx.ServerError("DeletePushMirrorByID", err) |
|
return |
|
} |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.update_settings_success")) |
|
ctx.Redirect(repo.Link() + "/settings") |
|
|
|
case "push-mirror-add": |
|
if setting.Mirror.DisableNewPush { |
|
ctx.NotFound("", nil) |
|
return |
|
} |
|
|
|
// This section doesn't require repo_name/RepoName to be set in the form, don't show it |
|
// as an error on the UI for this action |
|
ctx.Data["Err_RepoName"] = nil |
|
|
|
interval, err := time.ParseDuration(form.PushMirrorInterval) |
|
if err != nil || (interval != 0 && interval < setting.Mirror.MinInterval) { |
|
ctx.Data["Err_PushMirrorInterval"] = true |
|
ctx.RenderWithErr(ctx.Tr("repo.mirror_interval_invalid"), tplSettingsOptions, &form) |
|
return |
|
} |
|
|
|
address, err := forms.ParseRemoteAddr(form.PushMirrorAddress, form.PushMirrorUsername, form.PushMirrorPassword) |
|
if err == nil { |
|
err = migrations.IsMigrateURLAllowed(address, ctx.User) |
|
} |
|
if err != nil { |
|
ctx.Data["Err_PushMirrorAddress"] = true |
|
handleSettingRemoteAddrError(ctx, err, form) |
|
return |
|
} |
|
|
|
remoteSuffix, err := util.RandomString(10) |
|
if err != nil { |
|
ctx.ServerError("RandomString", err) |
|
return |
|
} |
|
|
|
m := &repo_model.PushMirror{ |
|
RepoID: repo.ID, |
|
Repo: repo, |
|
RemoteName: fmt.Sprintf("remote_mirror_%s", remoteSuffix), |
|
Interval: interval, |
|
} |
|
if err := repo_model.InsertPushMirror(m); err != nil { |
|
ctx.ServerError("InsertPushMirror", err) |
|
return |
|
} |
|
|
|
if err := mirror_service.AddPushMirrorRemote(m, address); err != nil { |
|
if err := repo_model.DeletePushMirrorByID(m.ID); err != nil { |
|
log.Error("DeletePushMirrorByID %v", err) |
|
} |
|
ctx.ServerError("AddPushMirrorRemote", err) |
|
return |
|
} |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.update_settings_success")) |
|
ctx.Redirect(repo.Link() + "/settings") |
|
|
|
case "advanced": |
|
var repoChanged bool |
|
var units []repo_model.RepoUnit |
|
var deleteUnitTypes []unit_model.Type |
|
|
|
// This section doesn't require repo_name/RepoName to be set in the form, don't show it |
|
// as an error on the UI for this action |
|
ctx.Data["Err_RepoName"] = nil |
|
|
|
if repo.CloseIssuesViaCommitInAnyBranch != form.EnableCloseIssuesViaCommitInAnyBranch { |
|
repo.CloseIssuesViaCommitInAnyBranch = form.EnableCloseIssuesViaCommitInAnyBranch |
|
repoChanged = true |
|
} |
|
|
|
if form.EnableWiki && form.EnableExternalWiki && !unit_model.TypeExternalWiki.UnitGlobalDisabled() { |
|
if !validation.IsValidExternalURL(form.ExternalWikiURL) { |
|
ctx.Flash.Error(ctx.Tr("repo.settings.external_wiki_url_error")) |
|
ctx.Redirect(repo.Link() + "/settings") |
|
return |
|
} |
|
|
|
units = append(units, repo_model.RepoUnit{ |
|
RepoID: repo.ID, |
|
Type: unit_model.TypeExternalWiki, |
|
Config: &repo_model.ExternalWikiConfig{ |
|
ExternalWikiURL: form.ExternalWikiURL, |
|
}, |
|
}) |
|
deleteUnitTypes = append(deleteUnitTypes, unit_model.TypeWiki) |
|
} else if form.EnableWiki && !form.EnableExternalWiki && !unit_model.TypeWiki.UnitGlobalDisabled() { |
|
units = append(units, repo_model.RepoUnit{ |
|
RepoID: repo.ID, |
|
Type: unit_model.TypeWiki, |
|
Config: new(repo_model.UnitConfig), |
|
}) |
|
deleteUnitTypes = append(deleteUnitTypes, unit_model.TypeExternalWiki) |
|
} else { |
|
if !unit_model.TypeExternalWiki.UnitGlobalDisabled() { |
|
deleteUnitTypes = append(deleteUnitTypes, unit_model.TypeExternalWiki) |
|
} |
|
if !unit_model.TypeWiki.UnitGlobalDisabled() { |
|
deleteUnitTypes = append(deleteUnitTypes, unit_model.TypeWiki) |
|
} |
|
} |
|
|
|
if form.EnableIssues && form.EnableExternalTracker && !unit_model.TypeExternalTracker.UnitGlobalDisabled() { |
|
if !validation.IsValidExternalURL(form.ExternalTrackerURL) { |
|
ctx.Flash.Error(ctx.Tr("repo.settings.external_tracker_url_error")) |
|
ctx.Redirect(repo.Link() + "/settings") |
|
return |
|
} |
|
if len(form.TrackerURLFormat) != 0 && !validation.IsValidExternalTrackerURLFormat(form.TrackerURLFormat) { |
|
ctx.Flash.Error(ctx.Tr("repo.settings.tracker_url_format_error")) |
|
ctx.Redirect(repo.Link() + "/settings") |
|
return |
|
} |
|
units = append(units, repo_model.RepoUnit{ |
|
RepoID: repo.ID, |
|
Type: unit_model.TypeExternalTracker, |
|
Config: &repo_model.ExternalTrackerConfig{ |
|
ExternalTrackerURL: form.ExternalTrackerURL, |
|
ExternalTrackerFormat: form.TrackerURLFormat, |
|
ExternalTrackerStyle: form.TrackerIssueStyle, |
|
}, |
|
}) |
|
deleteUnitTypes = append(deleteUnitTypes, unit_model.TypeIssues) |
|
} else if form.EnableIssues && !form.EnableExternalTracker && !unit_model.TypeIssues.UnitGlobalDisabled() { |
|
units = append(units, repo_model.RepoUnit{ |
|
RepoID: repo.ID, |
|
Type: unit_model.TypeIssues, |
|
Config: &repo_model.IssuesConfig{ |
|
EnableTimetracker: form.EnableTimetracker, |
|
AllowOnlyContributorsToTrackTime: form.AllowOnlyContributorsToTrackTime, |
|
EnableDependencies: form.EnableIssueDependencies, |
|
EnableParents: form.EnableIssueParents, |
|
}, |
|
}) |
|
deleteUnitTypes = append(deleteUnitTypes, unit_model.TypeExternalTracker) |
|
} else { |
|
if !unit_model.TypeExternalTracker.UnitGlobalDisabled() { |
|
deleteUnitTypes = append(deleteUnitTypes, unit_model.TypeExternalTracker) |
|
} |
|
if !unit_model.TypeIssues.UnitGlobalDisabled() { |
|
deleteUnitTypes = append(deleteUnitTypes, unit_model.TypeIssues) |
|
} |
|
} |
|
|
|
if form.EnableProjects && !unit_model.TypeProjects.UnitGlobalDisabled() { |
|
units = append(units, repo_model.RepoUnit{ |
|
RepoID: repo.ID, |
|
Type: unit_model.TypeProjects, |
|
}) |
|
} else if !unit_model.TypeProjects.UnitGlobalDisabled() { |
|
deleteUnitTypes = append(deleteUnitTypes, unit_model.TypeProjects) |
|
} |
|
|
|
if form.EnablePulls && !unit_model.TypePullRequests.UnitGlobalDisabled() { |
|
units = append(units, repo_model.RepoUnit{ |
|
RepoID: repo.ID, |
|
Type: unit_model.TypePullRequests, |
|
Config: &repo_model.PullRequestsConfig{ |
|
IgnoreWhitespaceConflicts: form.PullsIgnoreWhitespace, |
|
AllowMerge: form.PullsAllowMerge, |
|
AllowRebase: form.PullsAllowRebase, |
|
AllowRebaseMerge: form.PullsAllowRebaseMerge, |
|
AllowSquash: form.PullsAllowSquash, |
|
AllowManualMerge: form.PullsAllowManualMerge, |
|
AutodetectManualMerge: form.EnableAutodetectManualMerge, |
|
DefaultDeleteBranchAfterMerge: form.DefaultDeleteBranchAfterMerge, |
|
DefaultMergeStyle: repo_model.MergeStyle(form.PullsDefaultMergeStyle), |
|
}, |
|
}) |
|
} else if !unit_model.TypePullRequests.UnitGlobalDisabled() { |
|
deleteUnitTypes = append(deleteUnitTypes, unit_model.TypePullRequests) |
|
} |
|
|
|
if err := repo_model.UpdateRepositoryUnits(repo, units, deleteUnitTypes); err != nil { |
|
ctx.ServerError("UpdateRepositoryUnits", err) |
|
return |
|
} |
|
if repoChanged { |
|
if err := models.UpdateRepository(repo, false); err != nil { |
|
ctx.ServerError("UpdateRepository", err) |
|
return |
|
} |
|
} |
|
log.Trace("Repository advanced settings updated: %s/%s", ctx.Repo.Owner.Name, repo.Name) |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.update_settings_success")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings") |
|
|
|
case "signing": |
|
changed := false |
|
trustModel := repo_model.ToTrustModel(form.TrustModel) |
|
if trustModel != repo.TrustModel { |
|
repo.TrustModel = trustModel |
|
changed = true |
|
} |
|
|
|
if changed { |
|
if err := models.UpdateRepository(repo, false); err != nil { |
|
ctx.ServerError("UpdateRepository", err) |
|
return |
|
} |
|
} |
|
log.Trace("Repository signing settings updated: %s/%s", ctx.Repo.Owner.Name, repo.Name) |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.update_settings_success")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings") |
|
|
|
case "admin": |
|
if !ctx.User.IsAdmin { |
|
ctx.Error(http.StatusForbidden) |
|
return |
|
} |
|
|
|
if repo.IsFsckEnabled != form.EnableHealthCheck { |
|
repo.IsFsckEnabled = form.EnableHealthCheck |
|
} |
|
|
|
if err := models.UpdateRepository(repo, false); err != nil { |
|
ctx.ServerError("UpdateRepository", err) |
|
return |
|
} |
|
|
|
log.Trace("Repository admin settings updated: %s/%s", ctx.Repo.Owner.Name, repo.Name) |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.update_settings_success")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings") |
|
|
|
case "admin_index": |
|
if !ctx.User.IsAdmin { |
|
ctx.Error(http.StatusForbidden) |
|
return |
|
} |
|
|
|
switch form.RequestReindexType { |
|
case "stats": |
|
if err := stats.UpdateRepoIndexer(ctx.Repo.Repository); err != nil { |
|
ctx.ServerError("UpdateStatsRepondexer", err) |
|
return |
|
} |
|
case "code": |
|
if !setting.Indexer.RepoIndexerEnabled { |
|
ctx.Error(http.StatusForbidden) |
|
return |
|
} |
|
code.UpdateRepoIndexer(ctx.Repo.Repository) |
|
default: |
|
ctx.NotFound("", nil) |
|
return |
|
} |
|
|
|
log.Trace("Repository reindex for %s requested: %s/%s", form.RequestReindexType, ctx.Repo.Owner.Name, repo.Name) |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.reindex_requested")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings") |
|
|
|
case "convert": |
|
if !ctx.Repo.IsOwner() { |
|
ctx.Error(http.StatusNotFound) |
|
return |
|
} |
|
if repo.Name != form.RepoName { |
|
ctx.RenderWithErr(ctx.Tr("form.enterred_invalid_repo_name"), tplSettingsOptions, nil) |
|
return |
|
} |
|
|
|
if !repo.IsMirror { |
|
ctx.Error(http.StatusNotFound) |
|
return |
|
} |
|
repo.IsMirror = false |
|
|
|
if _, err := repository.CleanUpMigrateInfo(repo); err != nil { |
|
ctx.ServerError("CleanUpMigrateInfo", err) |
|
return |
|
} else if err = repo_model.DeleteMirrorByRepoID(ctx.Repo.Repository.ID); err != nil { |
|
ctx.ServerError("DeleteMirrorByRepoID", err) |
|
return |
|
} |
|
log.Trace("Repository converted from mirror to regular: %s", repo.FullName()) |
|
ctx.Flash.Success(ctx.Tr("repo.settings.convert_succeed")) |
|
ctx.Redirect(repo.Link()) |
|
|
|
case "convert_fork": |
|
if !ctx.Repo.IsOwner() { |
|
ctx.Error(http.StatusNotFound) |
|
return |
|
} |
|
if err := repo.GetOwner(db.DefaultContext); err != nil { |
|
ctx.ServerError("Convert Fork", err) |
|
return |
|
} |
|
if repo.Name != form.RepoName { |
|
ctx.RenderWithErr(ctx.Tr("form.enterred_invalid_repo_name"), tplSettingsOptions, nil) |
|
return |
|
} |
|
|
|
if !repo.IsFork { |
|
ctx.Error(http.StatusNotFound) |
|
return |
|
} |
|
|
|
if !ctx.Repo.Owner.CanCreateRepo() { |
|
maxCreationLimit := ctx.Repo.Owner.MaxCreationLimit() |
|
msg := ctx.TrN(maxCreationLimit, "repo.form.reach_limit_of_creation_1", "repo.form.reach_limit_of_creation_n", maxCreationLimit) |
|
ctx.Flash.Error(msg) |
|
ctx.Redirect(repo.Link() + "/settings") |
|
return |
|
} |
|
|
|
if err := repo_service.ConvertForkToNormalRepository(repo); err != nil { |
|
log.Error("Unable to convert repository %-v from fork. Error: %v", repo, err) |
|
ctx.ServerError("Convert Fork", err) |
|
return |
|
} |
|
|
|
log.Trace("Repository converted from fork to regular: %s", repo.FullName()) |
|
ctx.Flash.Success(ctx.Tr("repo.settings.convert_fork_succeed")) |
|
ctx.Redirect(repo.Link()) |
|
|
|
case "transfer": |
|
if !ctx.Repo.IsOwner() { |
|
ctx.Error(http.StatusNotFound) |
|
return |
|
} |
|
if repo.Name != form.RepoName { |
|
ctx.RenderWithErr(ctx.Tr("form.enterred_invalid_repo_name"), tplSettingsOptions, nil) |
|
return |
|
} |
|
|
|
newOwner, err := user_model.GetUserByName(ctx.FormString("new_owner_name")) |
|
if err != nil { |
|
if user_model.IsErrUserNotExist(err) { |
|
ctx.RenderWithErr(ctx.Tr("form.enterred_invalid_owner_name"), tplSettingsOptions, nil) |
|
return |
|
} |
|
ctx.ServerError("IsUserExist", err) |
|
return |
|
} |
|
|
|
if newOwner.Type == user_model.UserTypeOrganization { |
|
if !ctx.User.IsAdmin && newOwner.Visibility == structs.VisibleTypePrivate && !models.OrgFromUser(newOwner).HasMemberWithUserID(ctx.User.ID) { |
|
// The user shouldn't know about this organization |
|
ctx.RenderWithErr(ctx.Tr("form.enterred_invalid_owner_name"), tplSettingsOptions, nil) |
|
return |
|
} |
|
} |
|
|
|
// Close the GitRepo if open |
|
if ctx.Repo.GitRepo != nil { |
|
ctx.Repo.GitRepo.Close() |
|
ctx.Repo.GitRepo = nil |
|
} |
|
|
|
if err := repo_service.StartRepositoryTransfer(ctx.User, newOwner, repo, nil); err != nil { |
|
if repo_model.IsErrRepoAlreadyExist(err) { |
|
ctx.RenderWithErr(ctx.Tr("repo.settings.new_owner_has_same_repo"), tplSettingsOptions, nil) |
|
} else if models.IsErrRepoTransferInProgress(err) { |
|
ctx.RenderWithErr(ctx.Tr("repo.settings.transfer_in_progress"), tplSettingsOptions, nil) |
|
} else { |
|
ctx.ServerError("TransferOwnership", err) |
|
} |
|
|
|
return |
|
} |
|
|
|
log.Trace("Repository transfer process was started: %s/%s -> %s", ctx.Repo.Owner.Name, repo.Name, newOwner) |
|
ctx.Flash.Success(ctx.Tr("repo.settings.transfer_started", newOwner.DisplayName())) |
|
ctx.Redirect(repo.Link() + "/settings") |
|
|
|
case "cancel_transfer": |
|
if !ctx.Repo.IsOwner() { |
|
ctx.Error(http.StatusNotFound) |
|
return |
|
} |
|
|
|
repoTransfer, err := models.GetPendingRepositoryTransfer(ctx.Repo.Repository) |
|
if err != nil { |
|
if models.IsErrNoPendingTransfer(err) { |
|
ctx.Flash.Error("repo.settings.transfer_abort_invalid") |
|
ctx.Redirect(repo.Link() + "/settings") |
|
} else { |
|
ctx.ServerError("GetPendingRepositoryTransfer", err) |
|
} |
|
|
|
return |
|
} |
|
|
|
if err := repoTransfer.LoadAttributes(); err != nil { |
|
ctx.ServerError("LoadRecipient", err) |
|
return |
|
} |
|
|
|
if err := models.CancelRepositoryTransfer(ctx.Repo.Repository); err != nil { |
|
ctx.ServerError("CancelRepositoryTransfer", err) |
|
return |
|
} |
|
|
|
log.Trace("Repository transfer process was cancelled: %s/%s ", ctx.Repo.Owner.Name, repo.Name) |
|
ctx.Flash.Success(ctx.Tr("repo.settings.transfer_abort_success", repoTransfer.Recipient.Name)) |
|
ctx.Redirect(repo.Link() + "/settings") |
|
|
|
case "delete": |
|
if !ctx.Repo.IsOwner() { |
|
ctx.Error(http.StatusNotFound) |
|
return |
|
} |
|
if repo.Name != form.RepoName { |
|
ctx.RenderWithErr(ctx.Tr("form.enterred_invalid_repo_name"), tplSettingsOptions, nil) |
|
return |
|
} |
|
|
|
// Close the gitrepository before doing this. |
|
if ctx.Repo.GitRepo != nil { |
|
ctx.Repo.GitRepo.Close() |
|
} |
|
|
|
if err := repo_service.DeleteRepository(ctx.User, ctx.Repo.Repository, true); err != nil { |
|
ctx.ServerError("DeleteRepository", err) |
|
return |
|
} |
|
log.Trace("Repository deleted: %s/%s", ctx.Repo.Owner.Name, repo.Name) |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.deletion_success")) |
|
ctx.Redirect(ctx.Repo.Owner.DashboardLink()) |
|
|
|
case "delete-wiki": |
|
if !ctx.Repo.IsOwner() { |
|
ctx.Error(http.StatusNotFound) |
|
return |
|
} |
|
if repo.Name != form.RepoName { |
|
ctx.RenderWithErr(ctx.Tr("form.enterred_invalid_repo_name"), tplSettingsOptions, nil) |
|
return |
|
} |
|
|
|
err := wiki_service.DeleteWiki(repo) |
|
if err != nil { |
|
log.Error("Delete Wiki: %v", err.Error()) |
|
} |
|
log.Trace("Repository wiki deleted: %s/%s", ctx.Repo.Owner.Name, repo.Name) |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.wiki_deletion_success")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings") |
|
|
|
case "archive": |
|
if !ctx.Repo.IsOwner() { |
|
ctx.Error(http.StatusForbidden) |
|
return |
|
} |
|
|
|
if repo.IsMirror { |
|
ctx.Flash.Error(ctx.Tr("repo.settings.archive.error_ismirror")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings") |
|
return |
|
} |
|
|
|
if err := repo_model.SetArchiveRepoState(repo, true); err != nil { |
|
log.Error("Tried to archive a repo: %s", err) |
|
ctx.Flash.Error(ctx.Tr("repo.settings.archive.error")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings") |
|
return |
|
} |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.archive.success")) |
|
|
|
log.Trace("Repository was archived: %s/%s", ctx.Repo.Owner.Name, repo.Name) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings") |
|
|
|
case "unarchive": |
|
if !ctx.Repo.IsOwner() { |
|
ctx.Error(http.StatusForbidden) |
|
return |
|
} |
|
|
|
if err := repo_model.SetArchiveRepoState(repo, false); err != nil { |
|
log.Error("Tried to unarchive a repo: %s", err) |
|
ctx.Flash.Error(ctx.Tr("repo.settings.unarchive.error")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings") |
|
return |
|
} |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.unarchive.success")) |
|
|
|
log.Trace("Repository was un-archived: %s/%s", ctx.Repo.Owner.Name, repo.Name) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings") |
|
|
|
default: |
|
ctx.NotFound("", nil) |
|
} |
|
} |
|
|
|
func handleSettingRemoteAddrError(ctx *context.Context, err error, form *forms.RepoSettingForm) { |
|
if models.IsErrInvalidCloneAddr(err) { |
|
addrErr := err.(*models.ErrInvalidCloneAddr) |
|
switch { |
|
case addrErr.IsProtocolInvalid: |
|
ctx.RenderWithErr(ctx.Tr("repo.mirror_address_protocol_invalid"), tplSettingsOptions, form) |
|
case addrErr.IsURLError: |
|
ctx.RenderWithErr(ctx.Tr("form.url_error"), tplSettingsOptions, form) |
|
case addrErr.IsPermissionDenied: |
|
if addrErr.LocalPath { |
|
ctx.RenderWithErr(ctx.Tr("repo.migrate.permission_denied"), tplSettingsOptions, form) |
|
} else { |
|
ctx.RenderWithErr(ctx.Tr("repo.migrate.permission_denied_blocked"), tplSettingsOptions, form) |
|
} |
|
case addrErr.IsInvalidPath: |
|
ctx.RenderWithErr(ctx.Tr("repo.migrate.invalid_local_path"), tplSettingsOptions, form) |
|
default: |
|
ctx.ServerError("Unknown error", err) |
|
} |
|
return |
|
} |
|
ctx.RenderWithErr(ctx.Tr("repo.mirror_address_url_invalid"), tplSettingsOptions, form) |
|
} |
|
|
|
// Collaboration render a repository's collaboration page |
|
func Collaboration(ctx *context.Context) { |
|
ctx.Data["Title"] = ctx.Tr("repo.settings") |
|
ctx.Data["PageIsSettingsCollaboration"] = true |
|
|
|
users, err := models.GetCollaborators(ctx.Repo.Repository.ID, db.ListOptions{}) |
|
if err != nil { |
|
ctx.ServerError("GetCollaborators", err) |
|
return |
|
} |
|
ctx.Data["Collaborators"] = users |
|
|
|
teams, err := models.GetRepoTeams(ctx.Repo.Repository) |
|
if err != nil { |
|
ctx.ServerError("GetRepoTeams", err) |
|
return |
|
} |
|
ctx.Data["Teams"] = teams |
|
ctx.Data["Repo"] = ctx.Repo.Repository |
|
ctx.Data["OrgID"] = ctx.Repo.Repository.OwnerID |
|
ctx.Data["OrgName"] = ctx.Repo.Repository.OwnerName |
|
ctx.Data["Org"] = ctx.Repo.Repository.Owner |
|
ctx.Data["Units"] = unit_model.Units |
|
|
|
ctx.HTML(http.StatusOK, tplCollaboration) |
|
} |
|
|
|
// CollaborationPost response for actions for a collaboration of a repository |
|
func CollaborationPost(ctx *context.Context) { |
|
name := utils.RemoveUsernameParameterSuffix(strings.ToLower(ctx.FormString("collaborator"))) |
|
if len(name) == 0 || ctx.Repo.Owner.LowerName == name { |
|
ctx.Redirect(setting.AppSubURL + ctx.Req.URL.EscapedPath()) |
|
return |
|
} |
|
|
|
u, err := user_model.GetUserByName(name) |
|
if err != nil { |
|
if user_model.IsErrUserNotExist(err) { |
|
ctx.Flash.Error(ctx.Tr("form.user_not_exist")) |
|
ctx.Redirect(setting.AppSubURL + ctx.Req.URL.EscapedPath()) |
|
} else { |
|
ctx.ServerError("GetUserByName", err) |
|
} |
|
return |
|
} |
|
|
|
if !u.IsActive { |
|
ctx.Flash.Error(ctx.Tr("repo.settings.add_collaborator_inactive_user")) |
|
ctx.Redirect(setting.AppSubURL + ctx.Req.URL.EscapedPath()) |
|
return |
|
} |
|
|
|
// Organization is not allowed to be added as a collaborator. |
|
if u.IsOrganization() { |
|
ctx.Flash.Error(ctx.Tr("repo.settings.org_not_allowed_to_be_collaborator")) |
|
ctx.Redirect(setting.AppSubURL + ctx.Req.URL.EscapedPath()) |
|
return |
|
} |
|
|
|
if got, err := models.IsCollaborator(ctx.Repo.Repository.ID, u.ID); err == nil && got { |
|
ctx.Flash.Error(ctx.Tr("repo.settings.add_collaborator_duplicate")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings/collaboration") |
|
return |
|
} |
|
|
|
if err = models.AddCollaborator(ctx.Repo.Repository, u); err != nil { |
|
ctx.ServerError("AddCollaborator", err) |
|
return |
|
} |
|
|
|
if setting.Service.EnableNotifyMail { |
|
mailer.SendCollaboratorMail(u, ctx.User, ctx.Repo.Repository) |
|
} |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.add_collaborator_success")) |
|
ctx.Redirect(setting.AppSubURL + ctx.Req.URL.EscapedPath()) |
|
} |
|
|
|
// ChangeCollaborationAccessMode response for changing access of a collaboration |
|
func ChangeCollaborationAccessMode(ctx *context.Context) { |
|
if err := models.ChangeCollaborationAccessMode( |
|
ctx.Repo.Repository, |
|
ctx.FormInt64("uid"), |
|
perm.AccessMode(ctx.FormInt("mode"))); err != nil { |
|
log.Error("ChangeCollaborationAccessMode: %v", err) |
|
} |
|
} |
|
|
|
// DeleteCollaboration delete a collaboration for a repository |
|
func DeleteCollaboration(ctx *context.Context) { |
|
if err := models.DeleteCollaboration(ctx.Repo.Repository, ctx.FormInt64("id")); err != nil { |
|
ctx.Flash.Error("DeleteCollaboration: " + err.Error()) |
|
} else { |
|
ctx.Flash.Success(ctx.Tr("repo.settings.remove_collaborator_success")) |
|
} |
|
|
|
ctx.JSON(http.StatusOK, map[string]interface{}{ |
|
"redirect": ctx.Repo.RepoLink + "/settings/collaboration", |
|
}) |
|
} |
|
|
|
// AddTeamPost response for adding a team to a repository |
|
func AddTeamPost(ctx *context.Context) { |
|
if !ctx.Repo.Owner.RepoAdminChangeTeamAccess && !ctx.Repo.IsOwner() { |
|
ctx.Flash.Error(ctx.Tr("repo.settings.change_team_access_not_allowed")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings/collaboration") |
|
return |
|
} |
|
|
|
name := utils.RemoveUsernameParameterSuffix(strings.ToLower(ctx.FormString("team"))) |
|
if len(name) == 0 { |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings/collaboration") |
|
return |
|
} |
|
|
|
team, err := models.OrgFromUser(ctx.Repo.Owner).GetTeam(name) |
|
if err != nil { |
|
if models.IsErrTeamNotExist(err) { |
|
ctx.Flash.Error(ctx.Tr("form.team_not_exist")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings/collaboration") |
|
} else { |
|
ctx.ServerError("GetTeam", err) |
|
} |
|
return |
|
} |
|
|
|
if team.OrgID != ctx.Repo.Repository.OwnerID { |
|
ctx.Flash.Error(ctx.Tr("repo.settings.team_not_in_organization")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings/collaboration") |
|
return |
|
} |
|
|
|
if models.HasTeamRepo(ctx.Repo.Repository.OwnerID, team.ID, ctx.Repo.Repository.ID) { |
|
ctx.Flash.Error(ctx.Tr("repo.settings.add_team_duplicate")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings/collaboration") |
|
return |
|
} |
|
|
|
if err = team.AddRepository(ctx.Repo.Repository); err != nil { |
|
ctx.ServerError("team.AddRepository", err) |
|
return |
|
} |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.add_team_success")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings/collaboration") |
|
} |
|
|
|
// DeleteTeam response for deleting a team from a repository |
|
func DeleteTeam(ctx *context.Context) { |
|
if !ctx.Repo.Owner.RepoAdminChangeTeamAccess && !ctx.Repo.IsOwner() { |
|
ctx.Flash.Error(ctx.Tr("repo.settings.change_team_access_not_allowed")) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings/collaboration") |
|
return |
|
} |
|
|
|
team, err := models.GetTeamByID(ctx.FormInt64("id")) |
|
if err != nil { |
|
ctx.ServerError("GetTeamByID", err) |
|
return |
|
} |
|
|
|
if err = team.RemoveRepository(ctx.Repo.Repository.ID); err != nil { |
|
ctx.ServerError("team.RemoveRepositorys", err) |
|
return |
|
} |
|
|
|
ctx.Flash.Success(ctx.Tr("repo.settings.remove_team_success")) |
|
ctx.JSON(http.StatusOK, map[string]interface{}{ |
|
"redirect": ctx.Repo.RepoLink + "/settings/collaboration", |
|
}) |
|
} |
|
|
|
// GitHooks hooks of a repository |
|
func GitHooks(ctx *context.Context) { |
|
ctx.Data["Title"] = ctx.Tr("repo.settings.githooks") |
|
ctx.Data["PageIsSettingsGitHooks"] = true |
|
|
|
hooks, err := ctx.Repo.GitRepo.Hooks() |
|
if err != nil { |
|
ctx.ServerError("Hooks", err) |
|
return |
|
} |
|
ctx.Data["Hooks"] = hooks |
|
|
|
ctx.HTML(http.StatusOK, tplGithooks) |
|
} |
|
|
|
// GitHooksEdit render for editing a hook of repository page |
|
func GitHooksEdit(ctx *context.Context) { |
|
ctx.Data["Title"] = ctx.Tr("repo.settings.githooks") |
|
ctx.Data["PageIsSettingsGitHooks"] = true |
|
|
|
name := ctx.Params(":name") |
|
hook, err := ctx.Repo.GitRepo.GetHook(name) |
|
if err != nil { |
|
if err == git.ErrNotValidHook { |
|
ctx.NotFound("GetHook", err) |
|
} else { |
|
ctx.ServerError("GetHook", err) |
|
} |
|
return |
|
} |
|
ctx.Data["Hook"] = hook |
|
ctx.HTML(http.StatusOK, tplGithookEdit) |
|
} |
|
|
|
// GitHooksEditPost response for editing a git hook of a repository |
|
func GitHooksEditPost(ctx *context.Context) { |
|
name := ctx.Params(":name") |
|
hook, err := ctx.Repo.GitRepo.GetHook(name) |
|
if err != nil { |
|
if err == git.ErrNotValidHook { |
|
ctx.NotFound("GetHook", err) |
|
} else { |
|
ctx.ServerError("GetHook", err) |
|
} |
|
return |
|
} |
|
hook.Content = ctx.FormString("content") |
|
if err = hook.Update(); err != nil { |
|
ctx.ServerError("hook.Update", err) |
|
return |
|
} |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings/hooks/git") |
|
} |
|
|
|
// DeployKeys render the deploy keys list of a repository page |
|
func DeployKeys(ctx *context.Context) { |
|
ctx.Data["Title"] = ctx.Tr("repo.settings.deploy_keys") |
|
ctx.Data["PageIsSettingsKeys"] = true |
|
ctx.Data["DisableSSH"] = setting.SSH.Disabled |
|
|
|
keys, err := asymkey_model.ListDeployKeys(db.DefaultContext, &asymkey_model.ListDeployKeysOptions{RepoID: ctx.Repo.Repository.ID}) |
|
if err != nil { |
|
ctx.ServerError("ListDeployKeys", err) |
|
return |
|
} |
|
ctx.Data["Deploykeys"] = keys |
|
|
|
ctx.HTML(http.StatusOK, tplDeployKeys) |
|
} |
|
|
|
// DeployKeysPost response for adding a deploy key of a repository |
|
func DeployKeysPost(ctx *context.Context) { |
|
form := web.GetForm(ctx).(*forms.AddKeyForm) |
|
ctx.Data["Title"] = ctx.Tr("repo.settings.deploy_keys") |
|
ctx.Data["PageIsSettingsKeys"] = true |
|
|
|
keys, err := asymkey_model.ListDeployKeys(db.DefaultContext, &asymkey_model.ListDeployKeysOptions{RepoID: ctx.Repo.Repository.ID}) |
|
if err != nil { |
|
ctx.ServerError("ListDeployKeys", err) |
|
return |
|
} |
|
ctx.Data["Deploykeys"] = keys |
|
|
|
if ctx.HasError() { |
|
ctx.HTML(http.StatusOK, tplDeployKeys) |
|
return |
|
} |
|
|
|
content, err := asymkey_model.CheckPublicKeyString(form.Content) |
|
if err != nil { |
|
if db.IsErrSSHDisabled(err) { |
|
ctx.Flash.Info(ctx.Tr("settings.ssh_disabled")) |
|
} else if asymkey_model.IsErrKeyUnableVerify(err) { |
|
ctx.Flash.Info(ctx.Tr("form.unable_verify_ssh_key")) |
|
} else { |
|
ctx.Data["HasError"] = true |
|
ctx.Data["Err_Content"] = true |
|
ctx.Flash.Error(ctx.Tr("form.invalid_ssh_key", err.Error())) |
|
} |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings/keys") |
|
return |
|
} |
|
|
|
key, err := asymkey_model.AddDeployKey(ctx.Repo.Repository.ID, form.Title, content, !form.IsWritable) |
|
if err != nil { |
|
ctx.Data["HasError"] = true |
|
switch { |
|
case asymkey_model.IsErrDeployKeyAlreadyExist(err): |
|
ctx.Data["Err_Content"] = true |
|
ctx.RenderWithErr(ctx.Tr("repo.settings.key_been_used"), tplDeployKeys, &form) |
|
case asymkey_model.IsErrKeyAlreadyExist(err): |
|
ctx.Data["Err_Content"] = true |
|
ctx.RenderWithErr(ctx.Tr("settings.ssh_key_been_used"), tplDeployKeys, &form) |
|
case asymkey_model.IsErrKeyNameAlreadyUsed(err): |
|
ctx.Data["Err_Title"] = true |
|
ctx.RenderWithErr(ctx.Tr("repo.settings.key_name_used"), tplDeployKeys, &form) |
|
case asymkey_model.IsErrDeployKeyNameAlreadyUsed(err): |
|
ctx.Data["Err_Title"] = true |
|
ctx.RenderWithErr(ctx.Tr("repo.settings.key_name_used"), tplDeployKeys, &form) |
|
default: |
|
ctx.ServerError("AddDeployKey", err) |
|
} |
|
return |
|
} |
|
|
|
log.Trace("Deploy key added: %d", ctx.Repo.Repository.ID) |
|
ctx.Flash.Success(ctx.Tr("repo.settings.add_key_success", key.Name)) |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings/keys") |
|
} |
|
|
|
// DeleteDeployKey response for deleting a deploy key |
|
func DeleteDeployKey(ctx *context.Context) { |
|
if err := asymkey_service.DeleteDeployKey(ctx.User, ctx.FormInt64("id")); err != nil { |
|
ctx.Flash.Error("DeleteDeployKey: " + err.Error()) |
|
} else { |
|
ctx.Flash.Success(ctx.Tr("repo.settings.deploy_key_deletion_success")) |
|
} |
|
|
|
ctx.JSON(http.StatusOK, map[string]interface{}{ |
|
"redirect": ctx.Repo.RepoLink + "/settings/keys", |
|
}) |
|
} |
|
|
|
// UpdateAvatarSetting update repo's avatar |
|
func UpdateAvatarSetting(ctx *context.Context, form forms.AvatarForm) error { |
|
ctxRepo := ctx.Repo.Repository |
|
|
|
if form.Avatar == nil { |
|
// No avatar is uploaded and we not removing it here. |
|
// No random avatar generated here. |
|
// Just exit, no action. |
|
if ctxRepo.CustomAvatarRelativePath() == "" { |
|
log.Trace("No avatar was uploaded for repo: %d. Default icon will appear instead.", ctxRepo.ID) |
|
} |
|
return nil |
|
} |
|
|
|
r, err := form.Avatar.Open() |
|
if err != nil { |
|
return fmt.Errorf("Avatar.Open: %v", err) |
|
} |
|
defer r.Close() |
|
|
|
if form.Avatar.Size > setting.Avatar.MaxFileSize { |
|
return errors.New(ctx.Tr("settings.uploaded_avatar_is_too_big")) |
|
} |
|
|
|
data, err := io.ReadAll(r) |
|
if err != nil { |
|
return fmt.Errorf("io.ReadAll: %v", err) |
|
} |
|
st := typesniffer.DetectContentType(data) |
|
if !(st.IsImage() && !st.IsSvgImage()) { |
|
return errors.New(ctx.Tr("settings.uploaded_avatar_not_a_image")) |
|
} |
|
if err = repo_service.UploadAvatar(ctxRepo, data); err != nil { |
|
return fmt.Errorf("UploadAvatar: %v", err) |
|
} |
|
return nil |
|
} |
|
|
|
// SettingsAvatar save new POSTed repository avatar |
|
func SettingsAvatar(ctx *context.Context) { |
|
form := web.GetForm(ctx).(*forms.AvatarForm) |
|
form.Source = forms.AvatarLocal |
|
if err := UpdateAvatarSetting(ctx, *form); err != nil { |
|
ctx.Flash.Error(err.Error()) |
|
} else { |
|
ctx.Flash.Success(ctx.Tr("repo.settings.update_avatar_success")) |
|
} |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings") |
|
} |
|
|
|
// SettingsDeleteAvatar delete repository avatar |
|
func SettingsDeleteAvatar(ctx *context.Context) { |
|
if err := repo_service.DeleteAvatar(ctx.Repo.Repository); err != nil { |
|
ctx.Flash.Error(fmt.Sprintf("DeleteAvatar: %v", err)) |
|
} |
|
ctx.Redirect(ctx.Repo.RepoLink + "/settings") |
|
} |
|
|
|
func selectPushMirrorByForm(form *forms.RepoSettingForm, repo *repo_model.Repository) (*repo_model.PushMirror, error) { |
|
id, err := strconv.ParseInt(form.PushMirrorID, 10, 64) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
pushMirrors, err := repo_model.GetPushMirrorsByRepoID(repo.ID) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
for _, m := range pushMirrors { |
|
if m.ID == id { |
|
return m, nil |
|
} |
|
} |
|
|
|
return nil, fmt.Errorf("PushMirror[%v] not associated to repository %v", id, repo) |
|
}
|
|
|