Платформа ЦРНП "Мирокод" для разработки проектов
https://git.mirocod.ru
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
503 lines
14 KiB
503 lines
14 KiB
// Copyright 2014 The Gogs Authors. All rights reserved. |
|
// Copyright 2020 The Gitea Authors. All rights reserved. |
|
// Use of this source code is governed by a MIT-style |
|
// license that can be found in the LICENSE file. |
|
|
|
package repo |
|
|
|
import ( |
|
"errors" |
|
"fmt" |
|
"net/http" |
|
"strings" |
|
"time" |
|
|
|
"code.gitea.io/gitea/models" |
|
"code.gitea.io/gitea/models/db" |
|
repo_model "code.gitea.io/gitea/models/repo" |
|
"code.gitea.io/gitea/models/unit" |
|
user_model "code.gitea.io/gitea/models/user" |
|
"code.gitea.io/gitea/modules/base" |
|
"code.gitea.io/gitea/modules/context" |
|
"code.gitea.io/gitea/modules/graceful" |
|
"code.gitea.io/gitea/modules/log" |
|
"code.gitea.io/gitea/modules/setting" |
|
"code.gitea.io/gitea/modules/storage" |
|
"code.gitea.io/gitea/modules/web" |
|
"code.gitea.io/gitea/services/forms" |
|
repo_service "code.gitea.io/gitea/services/repository" |
|
archiver_service "code.gitea.io/gitea/services/repository/archiver" |
|
) |
|
|
|
const ( |
|
tplCreate base.TplName = "repo/create" |
|
tplAlertDetails base.TplName = "base/alert_details" |
|
) |
|
|
|
// MustBeNotEmpty render when a repo is a empty git dir |
|
func MustBeNotEmpty(ctx *context.Context) { |
|
if ctx.Repo.Repository.IsEmpty { |
|
ctx.NotFound("MustBeNotEmpty", nil) |
|
} |
|
} |
|
|
|
// MustBeEditable check that repo can be edited |
|
func MustBeEditable(ctx *context.Context) { |
|
if !ctx.Repo.Repository.CanEnableEditor() || ctx.Repo.IsViewCommit { |
|
ctx.NotFound("", nil) |
|
return |
|
} |
|
} |
|
|
|
// MustBeAbleToUpload check that repo can be uploaded to |
|
func MustBeAbleToUpload(ctx *context.Context) { |
|
if !setting.Repository.Upload.Enabled { |
|
ctx.NotFound("", nil) |
|
} |
|
} |
|
|
|
func checkContextUser(ctx *context.Context, uid int64) *user_model.User { |
|
orgs, err := models.GetOrgsCanCreateRepoByUserID(ctx.User.ID) |
|
if err != nil { |
|
ctx.ServerError("GetOrgsCanCreateRepoByUserID", err) |
|
return nil |
|
} |
|
|
|
if !ctx.User.IsAdmin { |
|
orgsAvailable := []*models.Organization{} |
|
for i := 0; i < len(orgs); i++ { |
|
if orgs[i].CanCreateRepo() { |
|
orgsAvailable = append(orgsAvailable, orgs[i]) |
|
} |
|
} |
|
ctx.Data["Orgs"] = orgsAvailable |
|
} else { |
|
ctx.Data["Orgs"] = orgs |
|
} |
|
|
|
// Not equal means current user is an organization. |
|
if uid == ctx.User.ID || uid == 0 { |
|
return ctx.User |
|
} |
|
|
|
org, err := user_model.GetUserByID(uid) |
|
if user_model.IsErrUserNotExist(err) { |
|
return ctx.User |
|
} |
|
|
|
if err != nil { |
|
ctx.ServerError("GetUserByID", fmt.Errorf("[%d]: %v", uid, err)) |
|
return nil |
|
} |
|
|
|
// Check ownership of organization. |
|
if !org.IsOrganization() { |
|
ctx.Error(http.StatusForbidden) |
|
return nil |
|
} |
|
if !ctx.User.IsAdmin { |
|
canCreate, err := models.OrgFromUser(org).CanCreateOrgRepo(ctx.User.ID) |
|
if err != nil { |
|
ctx.ServerError("CanCreateOrgRepo", err) |
|
return nil |
|
} else if !canCreate { |
|
ctx.Error(http.StatusForbidden) |
|
return nil |
|
} |
|
} else { |
|
ctx.Data["Orgs"] = orgs |
|
} |
|
return org |
|
} |
|
|
|
func getRepoPrivate(ctx *context.Context) bool { |
|
switch strings.ToLower(setting.Repository.DefaultPrivate) { |
|
case setting.RepoCreatingLastUserVisibility: |
|
return ctx.User.LastRepoVisibility |
|
case setting.RepoCreatingPrivate: |
|
return true |
|
case setting.RepoCreatingPublic: |
|
return false |
|
default: |
|
return ctx.User.LastRepoVisibility |
|
} |
|
} |
|
|
|
// Create render creating repository page |
|
func Create(ctx *context.Context) { |
|
ctx.Data["Title"] = ctx.Tr("new_repo") |
|
|
|
// Give default value for template to render. |
|
ctx.Data["Gitignores"] = models.Gitignores |
|
ctx.Data["LabelTemplates"] = models.LabelTemplates |
|
ctx.Data["Licenses"] = models.Licenses |
|
ctx.Data["Readmes"] = models.Readmes |
|
ctx.Data["readme"] = "Default" |
|
ctx.Data["private"] = getRepoPrivate(ctx) |
|
ctx.Data["IsForcedPrivate"] = setting.Repository.ForcePrivate |
|
ctx.Data["default_branch"] = setting.Repository.DefaultBranch |
|
|
|
ctxUser := checkContextUser(ctx, ctx.FormInt64("org")) |
|
if ctx.Written() { |
|
return |
|
} |
|
ctx.Data["ContextUser"] = ctxUser |
|
|
|
ctx.Data["repo_template_name"] = ctx.Tr("repo.template_select") |
|
templateID := ctx.FormInt64("template_id") |
|
if templateID > 0 { |
|
templateRepo, err := repo_model.GetRepositoryByID(templateID) |
|
if err == nil && models.CheckRepoUnitUser(templateRepo, ctxUser, unit.TypeCode) { |
|
ctx.Data["repo_template"] = templateID |
|
ctx.Data["repo_template_name"] = templateRepo.Name |
|
} |
|
} |
|
|
|
ctx.Data["CanCreateRepo"] = ctx.User.CanCreateRepo() |
|
ctx.Data["MaxCreationLimit"] = ctx.User.MaxCreationLimit() |
|
|
|
ctx.HTML(http.StatusOK, tplCreate) |
|
} |
|
|
|
func handleCreateError(ctx *context.Context, owner *user_model.User, err error, name string, tpl base.TplName, form interface{}) { |
|
switch { |
|
case repo_model.IsErrReachLimitOfRepo(err): |
|
maxCreationLimit := owner.MaxCreationLimit() |
|
msg := ctx.TrN(maxCreationLimit, "repo.form.reach_limit_of_creation_1", "repo.form.reach_limit_of_creation_n", maxCreationLimit) |
|
ctx.RenderWithErr(msg, tpl, form) |
|
case repo_model.IsErrRepoAlreadyExist(err): |
|
ctx.Data["Err_RepoName"] = true |
|
ctx.RenderWithErr(ctx.Tr("form.repo_name_been_taken"), tpl, form) |
|
case repo_model.IsErrRepoFilesAlreadyExist(err): |
|
ctx.Data["Err_RepoName"] = true |
|
switch { |
|
case ctx.IsUserSiteAdmin() || (setting.Repository.AllowAdoptionOfUnadoptedRepositories && setting.Repository.AllowDeleteOfUnadoptedRepositories): |
|
ctx.RenderWithErr(ctx.Tr("form.repository_files_already_exist.adopt_or_delete"), tpl, form) |
|
case setting.Repository.AllowAdoptionOfUnadoptedRepositories: |
|
ctx.RenderWithErr(ctx.Tr("form.repository_files_already_exist.adopt"), tpl, form) |
|
case setting.Repository.AllowDeleteOfUnadoptedRepositories: |
|
ctx.RenderWithErr(ctx.Tr("form.repository_files_already_exist.delete"), tpl, form) |
|
default: |
|
ctx.RenderWithErr(ctx.Tr("form.repository_files_already_exist"), tpl, form) |
|
} |
|
case db.IsErrNameReserved(err): |
|
ctx.Data["Err_RepoName"] = true |
|
ctx.RenderWithErr(ctx.Tr("repo.form.name_reserved", err.(db.ErrNameReserved).Name), tpl, form) |
|
case db.IsErrNamePatternNotAllowed(err): |
|
ctx.Data["Err_RepoName"] = true |
|
ctx.RenderWithErr(ctx.Tr("repo.form.name_pattern_not_allowed", err.(db.ErrNamePatternNotAllowed).Pattern), tpl, form) |
|
default: |
|
ctx.ServerError(name, err) |
|
} |
|
} |
|
|
|
// CreatePost response for creating repository |
|
func CreatePost(ctx *context.Context) { |
|
form := web.GetForm(ctx).(*forms.CreateRepoForm) |
|
ctx.Data["Title"] = ctx.Tr("new_repo") |
|
|
|
ctx.Data["Gitignores"] = models.Gitignores |
|
ctx.Data["LabelTemplates"] = models.LabelTemplates |
|
ctx.Data["Licenses"] = models.Licenses |
|
ctx.Data["Readmes"] = models.Readmes |
|
|
|
ctx.Data["CanCreateRepo"] = ctx.User.CanCreateRepo() |
|
ctx.Data["MaxCreationLimit"] = ctx.User.MaxCreationLimit() |
|
|
|
ctxUser := checkContextUser(ctx, form.UID) |
|
if ctx.Written() { |
|
return |
|
} |
|
ctx.Data["ContextUser"] = ctxUser |
|
|
|
if ctx.HasError() { |
|
ctx.HTML(http.StatusOK, tplCreate) |
|
return |
|
} |
|
|
|
var repo *repo_model.Repository |
|
var err error |
|
if form.RepoTemplate > 0 { |
|
opts := models.GenerateRepoOptions{ |
|
Name: form.RepoName, |
|
Description: form.Description, |
|
Private: form.Private, |
|
GitContent: form.GitContent, |
|
Topics: form.Topics, |
|
GitHooks: form.GitHooks, |
|
Webhooks: form.Webhooks, |
|
Avatar: form.Avatar, |
|
IssueLabels: form.Labels, |
|
} |
|
|
|
if !opts.IsValid() { |
|
ctx.RenderWithErr(ctx.Tr("repo.template.one_item"), tplCreate, form) |
|
return |
|
} |
|
|
|
templateRepo := getRepository(ctx, form.RepoTemplate) |
|
if ctx.Written() { |
|
return |
|
} |
|
|
|
if !templateRepo.IsTemplate { |
|
ctx.RenderWithErr(ctx.Tr("repo.template.invalid"), tplCreate, form) |
|
return |
|
} |
|
|
|
repo, err = repo_service.GenerateRepository(ctx.User, ctxUser, templateRepo, opts) |
|
if err == nil { |
|
log.Trace("Repository generated [%d]: %s/%s", repo.ID, ctxUser.Name, repo.Name) |
|
ctx.Redirect(repo.Link()) |
|
return |
|
} |
|
} else { |
|
repo, err = repo_service.CreateRepository(ctx.User, ctxUser, models.CreateRepoOptions{ |
|
Name: form.RepoName, |
|
Description: form.Description, |
|
Gitignores: form.Gitignores, |
|
IssueLabels: form.IssueLabels, |
|
License: form.License, |
|
Readme: form.Readme, |
|
IsPrivate: form.Private || setting.Repository.ForcePrivate, |
|
DefaultBranch: form.DefaultBranch, |
|
AutoInit: form.AutoInit, |
|
IsTemplate: form.Template, |
|
TrustModel: repo_model.ToTrustModel(form.TrustModel), |
|
}) |
|
if err == nil { |
|
log.Trace("Repository created [%d]: %s/%s", repo.ID, ctxUser.Name, repo.Name) |
|
ctx.Redirect(repo.Link()) |
|
return |
|
} |
|
} |
|
|
|
handleCreateError(ctx, ctxUser, err, "CreatePost", tplCreate, &form) |
|
} |
|
|
|
// Action response for actions to a repository |
|
func Action(ctx *context.Context) { |
|
var err error |
|
switch ctx.Params(":action") { |
|
case "watch": |
|
err = repo_model.WatchRepo(ctx.User.ID, ctx.Repo.Repository.ID, true) |
|
case "unwatch": |
|
err = repo_model.WatchRepo(ctx.User.ID, ctx.Repo.Repository.ID, false) |
|
case "star": |
|
err = repo_model.StarRepo(ctx.User.ID, ctx.Repo.Repository.ID, true) |
|
case "unstar": |
|
err = repo_model.StarRepo(ctx.User.ID, ctx.Repo.Repository.ID, false) |
|
case "accept_transfer": |
|
err = acceptOrRejectRepoTransfer(ctx, true) |
|
case "reject_transfer": |
|
err = acceptOrRejectRepoTransfer(ctx, false) |
|
case "desc": // FIXME: this is not used |
|
if !ctx.Repo.IsOwner() { |
|
ctx.Error(http.StatusNotFound) |
|
return |
|
} |
|
|
|
ctx.Repo.Repository.Description = ctx.FormString("desc") |
|
ctx.Repo.Repository.Website = ctx.FormString("site") |
|
err = models.UpdateRepository(ctx.Repo.Repository, false) |
|
} |
|
|
|
if err != nil { |
|
ctx.ServerError(fmt.Sprintf("Action (%s)", ctx.Params(":action")), err) |
|
return |
|
} |
|
|
|
ctx.RedirectToFirst(ctx.FormString("redirect_to"), ctx.Repo.RepoLink) |
|
} |
|
|
|
func acceptOrRejectRepoTransfer(ctx *context.Context, accept bool) error { |
|
repoTransfer, err := models.GetPendingRepositoryTransfer(ctx.Repo.Repository) |
|
if err != nil { |
|
return err |
|
} |
|
|
|
if err := repoTransfer.LoadAttributes(); err != nil { |
|
return err |
|
} |
|
|
|
if !repoTransfer.CanUserAcceptTransfer(ctx.User) { |
|
return errors.New("user does not have enough permissions") |
|
} |
|
|
|
if accept { |
|
if ctx.Repo.GitRepo != nil { |
|
ctx.Repo.GitRepo.Close() |
|
ctx.Repo.GitRepo = nil |
|
} |
|
|
|
if err := repo_service.TransferOwnership(repoTransfer.Doer, repoTransfer.Recipient, ctx.Repo.Repository, repoTransfer.Teams); err != nil { |
|
return err |
|
} |
|
ctx.Flash.Success(ctx.Tr("repo.settings.transfer.success")) |
|
} else { |
|
if err := models.CancelRepositoryTransfer(ctx.Repo.Repository); err != nil { |
|
return err |
|
} |
|
ctx.Flash.Success(ctx.Tr("repo.settings.transfer.rejected")) |
|
} |
|
|
|
ctx.Redirect(ctx.Repo.Repository.HTMLURL()) |
|
return nil |
|
} |
|
|
|
// RedirectDownload return a file based on the following infos: |
|
func RedirectDownload(ctx *context.Context) { |
|
var ( |
|
vTag = ctx.Params("vTag") |
|
fileName = ctx.Params("fileName") |
|
) |
|
tagNames := []string{vTag} |
|
curRepo := ctx.Repo.Repository |
|
releases, err := models.GetReleasesByRepoIDAndNames(db.DefaultContext, curRepo.ID, tagNames) |
|
if err != nil { |
|
if repo_model.IsErrAttachmentNotExist(err) { |
|
ctx.Error(http.StatusNotFound) |
|
return |
|
} |
|
ctx.ServerError("RedirectDownload", err) |
|
return |
|
} |
|
if len(releases) == 1 { |
|
release := releases[0] |
|
att, err := repo_model.GetAttachmentByReleaseIDFileName(release.ID, fileName) |
|
if err != nil { |
|
ctx.Error(http.StatusNotFound) |
|
return |
|
} |
|
if att != nil { |
|
ctx.Redirect(att.DownloadURL()) |
|
return |
|
} |
|
} |
|
ctx.Error(http.StatusNotFound) |
|
} |
|
|
|
// Download an archive of a repository |
|
func Download(ctx *context.Context) { |
|
uri := ctx.Params("*") |
|
aReq, err := archiver_service.NewRequest(ctx.Repo.Repository.ID, ctx.Repo.GitRepo, uri) |
|
if err != nil { |
|
if errors.Is(err, archiver_service.ErrUnknownArchiveFormat{}) { |
|
ctx.Error(http.StatusBadRequest, err.Error()) |
|
} else { |
|
ctx.ServerError("archiver_service.NewRequest", err) |
|
} |
|
return |
|
} |
|
if aReq == nil { |
|
ctx.Error(http.StatusNotFound) |
|
return |
|
} |
|
|
|
archiver, err := repo_model.GetRepoArchiver(db.DefaultContext, aReq.RepoID, aReq.Type, aReq.CommitID) |
|
if err != nil { |
|
ctx.ServerError("models.GetRepoArchiver", err) |
|
return |
|
} |
|
if archiver != nil && archiver.Status == repo_model.ArchiverReady { |
|
download(ctx, aReq.GetArchiveName(), archiver) |
|
return |
|
} |
|
|
|
if err := archiver_service.StartArchive(aReq); err != nil { |
|
ctx.ServerError("archiver_service.StartArchive", err) |
|
return |
|
} |
|
|
|
var times int |
|
var t = time.NewTicker(time.Second * 1) |
|
defer t.Stop() |
|
|
|
for { |
|
select { |
|
case <-graceful.GetManager().HammerContext().Done(): |
|
log.Warn("exit archive download because system stop") |
|
return |
|
case <-t.C: |
|
if times > 20 { |
|
ctx.ServerError("wait download timeout", nil) |
|
return |
|
} |
|
times++ |
|
archiver, err = repo_model.GetRepoArchiver(db.DefaultContext, aReq.RepoID, aReq.Type, aReq.CommitID) |
|
if err != nil { |
|
ctx.ServerError("archiver_service.StartArchive", err) |
|
return |
|
} |
|
if archiver != nil && archiver.Status == repo_model.ArchiverReady { |
|
download(ctx, aReq.GetArchiveName(), archiver) |
|
return |
|
} |
|
} |
|
} |
|
} |
|
|
|
func download(ctx *context.Context, archiveName string, archiver *repo_model.RepoArchiver) { |
|
downloadName := ctx.Repo.Repository.Name + "-" + archiveName |
|
|
|
rPath, err := archiver.RelativePath() |
|
if err != nil { |
|
ctx.ServerError("archiver.RelativePath", err) |
|
return |
|
} |
|
|
|
if setting.RepoArchive.ServeDirect { |
|
//If we have a signed url (S3, object storage), redirect to this directly. |
|
u, err := storage.RepoArchives.URL(rPath, downloadName) |
|
if u != nil && err == nil { |
|
ctx.Redirect(u.String()) |
|
return |
|
} |
|
} |
|
|
|
//If we have matched and access to release or issue |
|
fr, err := storage.RepoArchives.Open(rPath) |
|
if err != nil { |
|
ctx.ServerError("Open", err) |
|
return |
|
} |
|
defer fr.Close() |
|
ctx.ServeStream(fr, downloadName) |
|
} |
|
|
|
// InitiateDownload will enqueue an archival request, as needed. It may submit |
|
// a request that's already in-progress, but the archiver service will just |
|
// kind of drop it on the floor if this is the case. |
|
func InitiateDownload(ctx *context.Context) { |
|
uri := ctx.Params("*") |
|
aReq, err := archiver_service.NewRequest(ctx.Repo.Repository.ID, ctx.Repo.GitRepo, uri) |
|
if err != nil { |
|
ctx.ServerError("archiver_service.NewRequest", err) |
|
return |
|
} |
|
if aReq == nil { |
|
ctx.Error(http.StatusNotFound) |
|
return |
|
} |
|
|
|
archiver, err := repo_model.GetRepoArchiver(db.DefaultContext, aReq.RepoID, aReq.Type, aReq.CommitID) |
|
if err != nil { |
|
ctx.ServerError("archiver_service.StartArchive", err) |
|
return |
|
} |
|
if archiver == nil || archiver.Status != repo_model.ArchiverReady { |
|
if err := archiver_service.StartArchive(aReq); err != nil { |
|
ctx.ServerError("archiver_service.StartArchive", err) |
|
return |
|
} |
|
} |
|
|
|
var completed bool |
|
if archiver != nil && archiver.Status == repo_model.ArchiverReady { |
|
completed = true |
|
} |
|
|
|
ctx.JSON(http.StatusOK, map[string]interface{}{ |
|
"complete": completed, |
|
}) |
|
}
|
|
|