| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339 | // Copyright 2014 The Gogs Authors. All rights reserved.// Use of this source code is governed by a MIT-style// license that can be found in the LICENSE file.package repoimport (	"net/http"	"os"	"path"	"path/filepath"	"strings"	"github.com/unknwon/com"	log "unknwon.dev/clog/v2"	"github.com/gogs/git-module"	"gogs.io/gogs/internal/conf"	"gogs.io/gogs/internal/context"	"gogs.io/gogs/internal/db"	"gogs.io/gogs/internal/form"	"gogs.io/gogs/internal/tool")const (	CREATE  = "repo/create"	MIGRATE = "repo/migrate")func MustBeNotBare(c *context.Context) {	if c.Repo.Repository.IsBare {		c.NotFound()	}}func checkContextUser(c *context.Context, uid int64) *db.User {	orgs, err := db.GetOwnedOrgsByUserIDDesc(c.User.ID, "updated_unix")	if err != nil {		c.Error(err, "get owned organization by user ID")		return nil	}	c.Data["Orgs"] = orgs	// Not equal means current user is an organization.	if uid == c.User.ID || uid == 0 {		return c.User	}	org, err := db.GetUserByID(uid)	if db.IsErrUserNotExist(err) {		return c.User	}	if err != nil {		c.Error(err, "get user by ID")		return nil	}	// Check ownership of organization.	if !org.IsOrganization() || !(c.User.IsAdmin || org.IsOwnedBy(c.User.ID)) {		c.Status(http.StatusForbidden)		return nil	}	return org}func Create(c *context.Context) {	c.Title("new_repo")	c.RequireAutosize()	// Give default value for template to render.	c.Data["Gitignores"] = db.Gitignores	c.Data["Licenses"] = db.Licenses	c.Data["Readmes"] = db.Readmes	c.Data["readme"] = "Default"	c.Data["private"] = c.User.LastRepoVisibility	c.Data["IsForcedPrivate"] = conf.Repository.ForcePrivate	ctxUser := checkContextUser(c, c.QueryInt64("org"))	if c.Written() {		return	}	c.Data["ContextUser"] = ctxUser	c.Success(CREATE)}func handleCreateError(c *context.Context, owner *db.User, err error, name, tpl string, form interface{}) {	switch {	case db.IsErrReachLimitOfRepo(err):		c.RenderWithErr(c.Tr("repo.form.reach_limit_of_creation", owner.RepoCreationNum()), tpl, form)	case db.IsErrRepoAlreadyExist(err):		c.Data["Err_RepoName"] = true		c.RenderWithErr(c.Tr("form.repo_name_been_taken"), tpl, form)	case db.IsErrNameNotAllowed(err):		c.Data["Err_RepoName"] = true		c.RenderWithErr(c.Tr("repo.form.name_not_allowed", err.(db.ErrNameNotAllowed).Value()), tpl, form)	default:		c.Error(err, name)	}}func CreatePost(c *context.Context, f form.CreateRepo) {	c.Data["Title"] = c.Tr("new_repo")	c.Data["Gitignores"] = db.Gitignores	c.Data["Licenses"] = db.Licenses	c.Data["Readmes"] = db.Readmes	ctxUser := checkContextUser(c, f.UserID)	if c.Written() {		return	}	c.Data["ContextUser"] = ctxUser	if c.HasError() {		c.Success(CREATE)		return	}	repo, err := db.CreateRepository(c.User, ctxUser, db.CreateRepoOptions{		Name:        f.RepoName,		Description: f.Description,		Gitignores:  f.Gitignores,		License:     f.License,		Readme:      f.Readme,		IsPrivate:   f.Private || conf.Repository.ForcePrivate,		AutoInit:    f.AutoInit,	})	if err == nil {		log.Trace("Repository created [%d]: %s/%s", repo.ID, ctxUser.Name, repo.Name)		c.Redirect(conf.Server.Subpath + "/" + ctxUser.Name + "/" + repo.Name)		return	}	if repo != nil {		if errDelete := db.DeleteRepository(ctxUser.ID, repo.ID); errDelete != nil {			log.Error("DeleteRepository: %v", errDelete)		}	}	handleCreateError(c, ctxUser, err, "CreatePost", CREATE, &f)}func Migrate(c *context.Context) {	c.Data["Title"] = c.Tr("new_migrate")	c.Data["private"] = c.User.LastRepoVisibility	c.Data["IsForcedPrivate"] = conf.Repository.ForcePrivate	c.Data["mirror"] = c.Query("mirror") == "1"	ctxUser := checkContextUser(c, c.QueryInt64("org"))	if c.Written() {		return	}	c.Data["ContextUser"] = ctxUser	c.Success(MIGRATE)}func MigratePost(c *context.Context, f form.MigrateRepo) {	c.Data["Title"] = c.Tr("new_migrate")	ctxUser := checkContextUser(c, f.Uid)	if c.Written() {		return	}	c.Data["ContextUser"] = ctxUser	if c.HasError() {		c.Success(MIGRATE)		return	}	remoteAddr, err := f.ParseRemoteAddr(c.User)	if err != nil {		if db.IsErrInvalidCloneAddr(err) {			c.Data["Err_CloneAddr"] = true			addrErr := err.(db.ErrInvalidCloneAddr)			switch {			case addrErr.IsURLError:				c.RenderWithErr(c.Tr("form.url_error"), MIGRATE, &f)			case addrErr.IsPermissionDenied:				c.RenderWithErr(c.Tr("repo.migrate.permission_denied"), MIGRATE, &f)			case addrErr.IsInvalidPath:				c.RenderWithErr(c.Tr("repo.migrate.invalid_local_path"), MIGRATE, &f)			default:				c.Error(err, "unexpected error")			}		} else {			c.Error(err, "parse remote address")		}		return	}	repo, err := db.MigrateRepository(c.User, ctxUser, db.MigrateRepoOptions{		Name:        f.RepoName,		Description: f.Description,		IsPrivate:   f.Private || conf.Repository.ForcePrivate,		IsMirror:    f.Mirror,		RemoteAddr:  remoteAddr,	})	if err == nil {		log.Trace("Repository migrated [%d]: %s/%s", repo.ID, ctxUser.Name, f.RepoName)		c.Redirect(conf.Server.Subpath + "/" + ctxUser.Name + "/" + f.RepoName)		return	}	if repo != nil {		if errDelete := db.DeleteRepository(ctxUser.ID, repo.ID); errDelete != nil {			log.Error("DeleteRepository: %v", errDelete)		}	}	if strings.Contains(err.Error(), "Authentication failed") ||		strings.Contains(err.Error(), "could not read Username") {		c.Data["Err_Auth"] = true		c.RenderWithErr(c.Tr("form.auth_failed", db.HandleMirrorCredentials(err.Error(), true)), MIGRATE, &f)		return	} else if strings.Contains(err.Error(), "fatal:") {		c.Data["Err_CloneAddr"] = true		c.RenderWithErr(c.Tr("repo.migrate.failed", db.HandleMirrorCredentials(err.Error(), true)), MIGRATE, &f)		return	}	handleCreateError(c, ctxUser, err, "MigratePost", MIGRATE, &f)}func Action(c *context.Context) {	var err error	switch c.Params(":action") {	case "watch":		err = db.WatchRepo(c.User.ID, c.Repo.Repository.ID, true)	case "unwatch":		if userID := c.QueryInt64("user_id"); userID != 0 {			if c.User.IsAdmin {				err = db.WatchRepo(userID, c.Repo.Repository.ID, false)			}		} else {			err = db.WatchRepo(c.User.ID, c.Repo.Repository.ID, false)		}	case "star":		err = db.StarRepo(c.User.ID, c.Repo.Repository.ID, true)	case "unstar":		err = db.StarRepo(c.User.ID, c.Repo.Repository.ID, false)	case "desc": // FIXME: this is not used		if !c.Repo.IsOwner() {			c.NotFound()			return		}		c.Repo.Repository.Description = c.Query("desc")		c.Repo.Repository.Website = c.Query("site")		err = db.UpdateRepository(c.Repo.Repository, false)	}	if err != nil {		c.Errorf(err, "action %q", c.Params(":action"))		return	}	redirectTo := c.Query("redirect_to")	if !tool.IsSameSiteURLPath(redirectTo) {		redirectTo = c.Repo.RepoLink	}	c.Redirect(redirectTo)}func Download(c *context.Context) {	var (		uri           = c.Params("*")		refName       string		ext           string		archivePath   string		archiveFormat git.ArchiveFormat	)	switch {	case strings.HasSuffix(uri, ".zip"):		ext = ".zip"		archivePath = filepath.Join(c.Repo.GitRepo.Path(), "archives", "zip")		archiveFormat = git.ArchiveZip	case strings.HasSuffix(uri, ".tar.gz"):		ext = ".tar.gz"		archivePath = filepath.Join(c.Repo.GitRepo.Path(), "archives", "targz")		archiveFormat = git.ArchiveTarGz	default:		log.Trace("Unknown format: %s", uri)		c.NotFound()		return	}	refName = strings.TrimSuffix(uri, ext)	if !com.IsDir(archivePath) {		if err := os.MkdirAll(archivePath, os.ModePerm); err != nil {			c.Error(err, "create archive directory")			return		}	}	// Get corresponding commit.	var (		commit *git.Commit		err    error	)	gitRepo := c.Repo.GitRepo	if gitRepo.HasBranch(refName) {		commit, err = gitRepo.BranchCommit(refName)		if err != nil {			c.Error(err, "get branch commit")			return		}	} else if gitRepo.HasTag(refName) {		commit, err = gitRepo.TagCommit(refName)		if err != nil {			c.Error(err, "get tag commit")			return		}	} else if len(refName) >= 7 && len(refName) <= 40 {		commit, err = gitRepo.CatFileCommit(refName)		if err != nil {			c.NotFound()			return		}	} else {		c.NotFound()		return	}	archivePath = path.Join(archivePath, tool.ShortSHA1(commit.ID.String())+ext)	if !com.IsFile(archivePath) {		if err := commit.CreateArchive(archiveFormat, archivePath); err != nil {			c.Error(err, "creates archive")			return		}	}	c.ServeFile(archivePath, c.Repo.Repository.Name+"-"+refName+ext)}
 |