// Copyright 2014 The Gogs Authors. All rights reserved. // Use of this source code is governed by a MIT-style // license that can be found in the LICENSE file. package repo import ( "fmt" "net/http" "path" log "gopkg.in/clog.v1" api "github.com/gogs/go-gogs-client" "github.com/gogs/gogs/models" "github.com/gogs/gogs/models/errors" "github.com/gogs/gogs/pkg/context" "github.com/gogs/gogs/pkg/form" "github.com/gogs/gogs/pkg/setting" "github.com/gogs/gogs/routes/api/v1/convert" ) func Search(c *context.APIContext) { opts := &models.SearchRepoOptions{ Keyword: path.Base(c.Query("q")), OwnerID: c.QueryInt64("uid"), PageSize: convert.ToCorrectPageSize(c.QueryInt("limit")), Page: c.QueryInt("page"), } // Check visibility. if c.IsLogged && opts.OwnerID > 0 { if c.User.ID == opts.OwnerID { opts.Private = true } else { u, err := models.GetUserByID(opts.OwnerID) if err != nil { c.JSON(http.StatusInternalServerError, map[string]interface{}{ "ok": false, "error": err.Error(), }) return } if u.IsOrganization() && u.IsOwnedBy(c.User.ID) { opts.Private = true } // FIXME: how about collaborators? } } repos, count, err := models.SearchRepositoryByName(opts) if err != nil { c.JSON(http.StatusInternalServerError, map[string]interface{}{ "ok": false, "error": err.Error(), }) return } if err = models.RepositoryList(repos).LoadAttributes(); err != nil { c.JSON(http.StatusInternalServerError, map[string]interface{}{ "ok": false, "error": err.Error(), }) return } results := make([]*api.Repository, len(repos)) for i := range repos { results[i] = repos[i].APIFormat(nil) } c.SetLinkHeader(int(count), opts.PageSize) c.JSONSuccess(map[string]interface{}{ "ok": true, "data": results, }) } func listUserRepositories(c *context.APIContext, username string) { user, err := models.GetUserByName(username) if err != nil { c.NotFoundOrServerError("GetUserByName", errors.IsUserNotExist, err) return } // Only list public repositories if user requests someone else's repository list, // or an organization isn't a member of. var ownRepos []*models.Repository if user.IsOrganization() { ownRepos, _, err = user.GetUserRepositories(c.User.ID, 1, user.NumRepos) } else { ownRepos, err = models.GetUserRepositories(&models.UserRepoOptions{ UserID: user.ID, Private: c.User.ID == user.ID, Page: 1, PageSize: user.NumRepos, }) } if err != nil { c.ServerError("GetUserRepositories", err) return } if err = models.RepositoryList(ownRepos).LoadAttributes(); err != nil { c.ServerError("LoadAttributes(ownRepos)", err) return } // Early return for querying other user's repositories if c.User.ID != user.ID { repos := make([]*api.Repository, len(ownRepos)) for i := range ownRepos { repos[i] = ownRepos[i].APIFormat(&api.Permission{true, true, true}) } c.JSONSuccess(&repos) return } accessibleRepos, err := user.GetRepositoryAccesses() if err != nil { c.ServerError("GetRepositoryAccesses", err) return } numOwnRepos := len(ownRepos) repos := make([]*api.Repository, numOwnRepos+len(accessibleRepos)) for i := range ownRepos { repos[i] = ownRepos[i].APIFormat(&api.Permission{true, true, true}) } i := numOwnRepos for repo, access := range accessibleRepos { repos[i] = repo.APIFormat(&api.Permission{ Admin: access >= models.ACCESS_MODE_ADMIN, Push: access >= models.ACCESS_MODE_WRITE, Pull: true, }) i++ } c.JSONSuccess(&repos) } func ListMyRepos(c *context.APIContext) { listUserRepositories(c, c.User.Name) } func ListUserRepositories(c *context.APIContext) { listUserRepositories(c, c.Params(":username")) } func ListOrgRepositories(c *context.APIContext) { listUserRepositories(c, c.Params(":org")) } func CreateUserRepo(c *context.APIContext, owner *models.User, opt api.CreateRepoOption) { repo, err := models.CreateRepository(c.User, owner, models.CreateRepoOptions{ Name: opt.Name, Description: opt.Description, Gitignores: opt.Gitignores, License: opt.License, Readme: opt.Readme, IsPrivate: opt.Private, AutoInit: opt.AutoInit, }) if err != nil { if models.IsErrRepoAlreadyExist(err) || models.IsErrNameReserved(err) || models.IsErrNamePatternNotAllowed(err) { c.Error(http.StatusUnprocessableEntity, "", err) } else { if repo != nil { if err = models.DeleteRepository(c.User.ID, repo.ID); err != nil { log.Error(2, "DeleteRepository: %v", err) } } c.ServerError("CreateRepository", err) } return } c.JSON(201, repo.APIFormat(&api.Permission{true, true, true})) } func Create(c *context.APIContext, opt api.CreateRepoOption) { // Shouldn't reach this condition, but just in case. if c.User.IsOrganization() { c.Error(http.StatusUnprocessableEntity, "", "not allowed creating repository for organization") return } CreateUserRepo(c, c.User, opt) } func CreateOrgRepo(c *context.APIContext, opt api.CreateRepoOption) { org, err := models.GetOrgByName(c.Params(":org")) if err != nil { c.NotFoundOrServerError("GetOrgByName", errors.IsUserNotExist, err) return } if !org.IsOwnedBy(c.User.ID) { c.Error(http.StatusForbidden, "", "given user is not owner of organization") return } CreateUserRepo(c, org, opt) } func Migrate(c *context.APIContext, f form.MigrateRepo) { ctxUser := c.User // Not equal means context user is an organization, // or is another user/organization if current user is admin. if f.Uid != ctxUser.ID { org, err := models.GetUserByID(f.Uid) if err != nil { if errors.IsUserNotExist(err) { c.Error(http.StatusUnprocessableEntity, "", err) } else { c.Error(http.StatusInternalServerError, "GetUserByID", err) } return } else if !org.IsOrganization() && !c.User.IsAdmin { c.Error(http.StatusForbidden, "", "given user is not an organization") return } ctxUser = org } if c.HasError() { c.Error(http.StatusUnprocessableEntity, "", c.GetErrMsg()) return } if ctxUser.IsOrganization() && !c.User.IsAdmin { // Check ownership of organization. if !ctxUser.IsOwnedBy(c.User.ID) { c.Error(http.StatusForbidden, "", "Given user is not owner of organization") return } } remoteAddr, err := f.ParseRemoteAddr(c.User) if err != nil { if models.IsErrInvalidCloneAddr(err) { addrErr := err.(models.ErrInvalidCloneAddr) switch { case addrErr.IsURLError: c.Error(http.StatusUnprocessableEntity, "", err) case addrErr.IsPermissionDenied: c.Error(http.StatusUnprocessableEntity, "", "you are not allowed to import local repositories") case addrErr.IsInvalidPath: c.Error(http.StatusUnprocessableEntity, "", "invalid local path, it does not exist or not a directory") default: c.ServerError("ParseRemoteAddr", fmt.Errorf("unknown error type (ErrInvalidCloneAddr): %v", err)) } } else { c.ServerError("ParseRemoteAddr", err) } return } repo, err := models.MigrateRepository(c.User, ctxUser, models.MigrateRepoOptions{ Name: f.RepoName, Description: f.Description, IsPrivate: f.Private || setting.Repository.ForcePrivate, IsMirror: f.Mirror, RemoteAddr: remoteAddr, }) if err != nil { if repo != nil { if errDelete := models.DeleteRepository(ctxUser.ID, repo.ID); errDelete != nil { log.Error(2, "DeleteRepository: %v", errDelete) } } if errors.IsReachLimitOfRepo(err) { c.Error(http.StatusUnprocessableEntity, "", err) } else { c.ServerError("MigrateRepository", errors.New(models.HandleMirrorCredentials(err.Error(), true))) } return } log.Trace("Repository migrated: %s/%s", ctxUser.Name, f.RepoName) c.JSON(201, repo.APIFormat(&api.Permission{true, true, true})) } // FIXME: inject in the handler chain func parseOwnerAndRepo(c *context.APIContext) (*models.User, *models.Repository) { owner, err := models.GetUserByName(c.Params(":username")) if err != nil { if errors.IsUserNotExist(err) { c.Error(http.StatusUnprocessableEntity, "", err) } else { c.ServerError("GetUserByName", err) } return nil, nil } repo, err := models.GetRepositoryByName(owner.ID, c.Params(":reponame")) if err != nil { c.NotFoundOrServerError("GetRepositoryByName", errors.IsRepoNotExist, err) return nil, nil } return owner, repo } func Get(c *context.APIContext) { _, repo := parseOwnerAndRepo(c) if c.Written() { return } c.JSONSuccess(repo.APIFormat(&api.Permission{ Admin: c.Repo.IsAdmin(), Push: c.Repo.IsWriter(), Pull: true, })) } func Delete(c *context.APIContext) { owner, repo := parseOwnerAndRepo(c) if c.Written() { return } if owner.IsOrganization() && !owner.IsOwnedBy(c.User.ID) { c.Error(http.StatusForbidden, "", "given user is not owner of organization") return } if err := models.DeleteRepository(owner.ID, repo.ID); err != nil { c.ServerError("DeleteRepository", err) return } log.Trace("Repository deleted: %s/%s", owner.Name, repo.Name) c.NoContent() } func ListForks(c *context.APIContext) { forks, err := c.Repo.Repository.GetForks() if err != nil { c.ServerError("GetForks", err) return } apiForks := make([]*api.Repository, len(forks)) for i := range forks { if err := forks[i].GetOwner(); err != nil { c.ServerError("GetOwner", err) return } apiForks[i] = forks[i].APIFormat(&api.Permission{ Admin: c.User.IsAdminOfRepo(forks[i]), Push: c.User.IsWriterOfRepo(forks[i]), Pull: true, }) } c.JSONSuccess(&apiForks) } func IssueTracker(c *context.APIContext, form api.EditIssueTrackerOption) { _, repo := parseOwnerAndRepo(c) if c.Written() { return } if form.EnableIssues != nil { repo.EnableIssues = *form.EnableIssues } if form.EnableExternalTracker != nil { repo.EnableExternalTracker = *form.EnableExternalTracker } if form.ExternalTrackerURL != nil { repo.ExternalTrackerURL = *form.ExternalTrackerURL } if form.TrackerURLFormat != nil { repo.ExternalTrackerFormat = *form.TrackerURLFormat } if form.TrackerIssueStyle != nil { repo.ExternalTrackerStyle = *form.TrackerIssueStyle } if err := models.UpdateRepository(repo, false); err != nil { c.ServerError("UpdateRepository", err) return } c.NoContent() } func MirrorSync(c *context.APIContext) { _, repo := parseOwnerAndRepo(c) if c.Written() { return } else if !repo.IsMirror { c.NotFound() return } go models.MirrorQueue.Add(repo.ID) c.Status(http.StatusAccepted) }