123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407 |
- // Copyright 2014 The Gogs Authors. All rights reserved.
- // Use of this source code is governed by a MIT-style
- // license that can be found in the LICENSE file.
- package repo
- import (
- "fmt"
- "net/http"
- "path"
- log "gopkg.in/clog.v1"
- api "github.com/gogs/go-gogs-client"
- "github.com/gogs/gogs/models"
- "github.com/gogs/gogs/models/errors"
- "github.com/gogs/gogs/pkg/context"
- "github.com/gogs/gogs/pkg/form"
- "github.com/gogs/gogs/pkg/setting"
- "github.com/gogs/gogs/routes/api/v1/convert"
- )
- func Search(c *context.APIContext) {
- opts := &models.SearchRepoOptions{
- Keyword: path.Base(c.Query("q")),
- OwnerID: c.QueryInt64("uid"),
- PageSize: convert.ToCorrectPageSize(c.QueryInt("limit")),
- Page: c.QueryInt("page"),
- }
- // Check visibility.
- if c.IsLogged && opts.OwnerID > 0 {
- if c.User.ID == opts.OwnerID {
- opts.Private = true
- } else {
- u, err := models.GetUserByID(opts.OwnerID)
- if err != nil {
- c.JSON(http.StatusInternalServerError, map[string]interface{}{
- "ok": false,
- "error": err.Error(),
- })
- return
- }
- if u.IsOrganization() && u.IsOwnedBy(c.User.ID) {
- opts.Private = true
- }
- // FIXME: how about collaborators?
- }
- }
- repos, count, err := models.SearchRepositoryByName(opts)
- if err != nil {
- c.JSON(http.StatusInternalServerError, map[string]interface{}{
- "ok": false,
- "error": err.Error(),
- })
- return
- }
- if err = models.RepositoryList(repos).LoadAttributes(); err != nil {
- c.JSON(http.StatusInternalServerError, map[string]interface{}{
- "ok": false,
- "error": err.Error(),
- })
- return
- }
- results := make([]*api.Repository, len(repos))
- for i := range repos {
- results[i] = repos[i].APIFormat(nil)
- }
- c.SetLinkHeader(int(count), opts.PageSize)
- c.JSONSuccess(map[string]interface{}{
- "ok": true,
- "data": results,
- })
- }
- func listUserRepositories(c *context.APIContext, username string) {
- user, err := models.GetUserByName(username)
- if err != nil {
- c.NotFoundOrServerError("GetUserByName", errors.IsUserNotExist, err)
- return
- }
- // Only list public repositories if user requests someone else's repository list,
- // or an organization isn't a member of.
- var ownRepos []*models.Repository
- if user.IsOrganization() {
- ownRepos, _, err = user.GetUserRepositories(c.User.ID, 1, user.NumRepos)
- } else {
- ownRepos, err = models.GetUserRepositories(&models.UserRepoOptions{
- UserID: user.ID,
- Private: c.User.ID == user.ID,
- Page: 1,
- PageSize: user.NumRepos,
- })
- }
- if err != nil {
- c.ServerError("GetUserRepositories", err)
- return
- }
- if err = models.RepositoryList(ownRepos).LoadAttributes(); err != nil {
- c.ServerError("LoadAttributes(ownRepos)", err)
- return
- }
- // Early return for querying other user's repositories
- if c.User.ID != user.ID {
- repos := make([]*api.Repository, len(ownRepos))
- for i := range ownRepos {
- repos[i] = ownRepos[i].APIFormat(&api.Permission{true, true, true})
- }
- c.JSONSuccess(&repos)
- return
- }
- accessibleRepos, err := user.GetRepositoryAccesses()
- if err != nil {
- c.ServerError("GetRepositoryAccesses", err)
- return
- }
- numOwnRepos := len(ownRepos)
- repos := make([]*api.Repository, numOwnRepos+len(accessibleRepos))
- for i := range ownRepos {
- repos[i] = ownRepos[i].APIFormat(&api.Permission{true, true, true})
- }
- i := numOwnRepos
- for repo, access := range accessibleRepos {
- repos[i] = repo.APIFormat(&api.Permission{
- Admin: access >= models.ACCESS_MODE_ADMIN,
- Push: access >= models.ACCESS_MODE_WRITE,
- Pull: true,
- })
- i++
- }
- c.JSONSuccess(&repos)
- }
- func ListMyRepos(c *context.APIContext) {
- listUserRepositories(c, c.User.Name)
- }
- func ListUserRepositories(c *context.APIContext) {
- listUserRepositories(c, c.Params(":username"))
- }
- func ListOrgRepositories(c *context.APIContext) {
- listUserRepositories(c, c.Params(":org"))
- }
- func CreateUserRepo(c *context.APIContext, owner *models.User, opt api.CreateRepoOption) {
- repo, err := models.CreateRepository(c.User, owner, models.CreateRepoOptions{
- Name: opt.Name,
- Description: opt.Description,
- Gitignores: opt.Gitignores,
- License: opt.License,
- Readme: opt.Readme,
- IsPrivate: opt.Private,
- AutoInit: opt.AutoInit,
- })
- if err != nil {
- if models.IsErrRepoAlreadyExist(err) ||
- models.IsErrNameReserved(err) ||
- models.IsErrNamePatternNotAllowed(err) {
- c.Error(http.StatusUnprocessableEntity, "", err)
- } else {
- if repo != nil {
- if err = models.DeleteRepository(c.User.ID, repo.ID); err != nil {
- log.Error(2, "DeleteRepository: %v", err)
- }
- }
- c.ServerError("CreateRepository", err)
- }
- return
- }
- c.JSON(201, repo.APIFormat(&api.Permission{true, true, true}))
- }
- func Create(c *context.APIContext, opt api.CreateRepoOption) {
- // Shouldn't reach this condition, but just in case.
- if c.User.IsOrganization() {
- c.Error(http.StatusUnprocessableEntity, "", "not allowed creating repository for organization")
- return
- }
- CreateUserRepo(c, c.User, opt)
- }
- func CreateOrgRepo(c *context.APIContext, opt api.CreateRepoOption) {
- org, err := models.GetOrgByName(c.Params(":org"))
- if err != nil {
- c.NotFoundOrServerError("GetOrgByName", errors.IsUserNotExist, err)
- return
- }
- if !org.IsOwnedBy(c.User.ID) {
- c.Error(http.StatusForbidden, "", "given user is not owner of organization")
- return
- }
- CreateUserRepo(c, org, opt)
- }
- func Migrate(c *context.APIContext, f form.MigrateRepo) {
- ctxUser := c.User
- // Not equal means context user is an organization,
- // or is another user/organization if current user is admin.
- if f.Uid != ctxUser.ID {
- org, err := models.GetUserByID(f.Uid)
- if err != nil {
- if errors.IsUserNotExist(err) {
- c.Error(http.StatusUnprocessableEntity, "", err)
- } else {
- c.Error(http.StatusInternalServerError, "GetUserByID", err)
- }
- return
- } else if !org.IsOrganization() && !c.User.IsAdmin {
- c.Error(http.StatusForbidden, "", "given user is not an organization")
- return
- }
- ctxUser = org
- }
- if c.HasError() {
- c.Error(http.StatusUnprocessableEntity, "", c.GetErrMsg())
- return
- }
- if ctxUser.IsOrganization() && !c.User.IsAdmin {
- // Check ownership of organization.
- if !ctxUser.IsOwnedBy(c.User.ID) {
- c.Error(http.StatusForbidden, "", "Given user is not owner of organization")
- return
- }
- }
- remoteAddr, err := f.ParseRemoteAddr(c.User)
- if err != nil {
- if models.IsErrInvalidCloneAddr(err) {
- addrErr := err.(models.ErrInvalidCloneAddr)
- switch {
- case addrErr.IsURLError:
- c.Error(http.StatusUnprocessableEntity, "", err)
- case addrErr.IsPermissionDenied:
- c.Error(http.StatusUnprocessableEntity, "", "you are not allowed to import local repositories")
- case addrErr.IsInvalidPath:
- c.Error(http.StatusUnprocessableEntity, "", "invalid local path, it does not exist or not a directory")
- default:
- c.ServerError("ParseRemoteAddr", fmt.Errorf("unknown error type (ErrInvalidCloneAddr): %v", err))
- }
- } else {
- c.ServerError("ParseRemoteAddr", err)
- }
- return
- }
- repo, err := models.MigrateRepository(c.User, ctxUser, models.MigrateRepoOptions{
- Name: f.RepoName,
- Description: f.Description,
- IsPrivate: f.Private || setting.Repository.ForcePrivate,
- IsMirror: f.Mirror,
- RemoteAddr: remoteAddr,
- })
- if err != nil {
- if repo != nil {
- if errDelete := models.DeleteRepository(ctxUser.ID, repo.ID); errDelete != nil {
- log.Error(2, "DeleteRepository: %v", errDelete)
- }
- }
- if errors.IsReachLimitOfRepo(err) {
- c.Error(http.StatusUnprocessableEntity, "", err)
- } else {
- c.ServerError("MigrateRepository", errors.New(models.HandleMirrorCredentials(err.Error(), true)))
- }
- return
- }
- log.Trace("Repository migrated: %s/%s", ctxUser.Name, f.RepoName)
- c.JSON(201, repo.APIFormat(&api.Permission{true, true, true}))
- }
- // FIXME: inject in the handler chain
- func parseOwnerAndRepo(c *context.APIContext) (*models.User, *models.Repository) {
- owner, err := models.GetUserByName(c.Params(":username"))
- if err != nil {
- if errors.IsUserNotExist(err) {
- c.Error(http.StatusUnprocessableEntity, "", err)
- } else {
- c.ServerError("GetUserByName", err)
- }
- return nil, nil
- }
- repo, err := models.GetRepositoryByName(owner.ID, c.Params(":reponame"))
- if err != nil {
- c.NotFoundOrServerError("GetRepositoryByName", errors.IsRepoNotExist, err)
- return nil, nil
- }
- return owner, repo
- }
- func Get(c *context.APIContext) {
- _, repo := parseOwnerAndRepo(c)
- if c.Written() {
- return
- }
- c.JSONSuccess(repo.APIFormat(&api.Permission{
- Admin: c.Repo.IsAdmin(),
- Push: c.Repo.IsWriter(),
- Pull: true,
- }))
- }
- func Delete(c *context.APIContext) {
- owner, repo := parseOwnerAndRepo(c)
- if c.Written() {
- return
- }
- if owner.IsOrganization() && !owner.IsOwnedBy(c.User.ID) {
- c.Error(http.StatusForbidden, "", "given user is not owner of organization")
- return
- }
- if err := models.DeleteRepository(owner.ID, repo.ID); err != nil {
- c.ServerError("DeleteRepository", err)
- return
- }
- log.Trace("Repository deleted: %s/%s", owner.Name, repo.Name)
- c.NoContent()
- }
- func ListForks(c *context.APIContext) {
- forks, err := c.Repo.Repository.GetForks()
- if err != nil {
- c.ServerError("GetForks", err)
- return
- }
- apiForks := make([]*api.Repository, len(forks))
- for i := range forks {
- if err := forks[i].GetOwner(); err != nil {
- c.ServerError("GetOwner", err)
- return
- }
- apiForks[i] = forks[i].APIFormat(&api.Permission{
- Admin: c.User.IsAdminOfRepo(forks[i]),
- Push: c.User.IsWriterOfRepo(forks[i]),
- Pull: true,
- })
- }
- c.JSONSuccess(&apiForks)
- }
- func IssueTracker(c *context.APIContext, form api.EditIssueTrackerOption) {
- _, repo := parseOwnerAndRepo(c)
- if c.Written() {
- return
- }
- if form.EnableIssues != nil {
- repo.EnableIssues = *form.EnableIssues
- }
- if form.EnableExternalTracker != nil {
- repo.EnableExternalTracker = *form.EnableExternalTracker
- }
- if form.ExternalTrackerURL != nil {
- repo.ExternalTrackerURL = *form.ExternalTrackerURL
- }
- if form.TrackerURLFormat != nil {
- repo.ExternalTrackerFormat = *form.TrackerURLFormat
- }
- if form.TrackerIssueStyle != nil {
- repo.ExternalTrackerStyle = *form.TrackerIssueStyle
- }
- if err := models.UpdateRepository(repo, false); err != nil {
- c.ServerError("UpdateRepository", err)
- return
- }
- c.NoContent()
- }
- func MirrorSync(c *context.APIContext) {
- _, repo := parseOwnerAndRepo(c)
- if c.Written() {
- return
- } else if !repo.IsMirror {
- c.NotFound()
- return
- }
- go models.MirrorQueue.Add(repo.ID)
- c.Status(http.StatusAccepted)
- }
|