* Add hide activity option This closes https://github.com/go-gitea/gitea/issues/7927 * Adjust for linter * Adjust for linter * Add tests * Remove info that admins can view the activity * Adjust new tests for linter * Rename v139.go to v140.go * Rename v140.go to v141.go * properly indent * gofmt Co-authored-by: Jonas Lochmann <git@inkompetenz.org> Co-authored-by: techknowlogick <techknowlogick@gitea.io>
		
			
				
	
	
		
			755 lines
		
	
	
	
		
			20 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			755 lines
		
	
	
	
		
			20 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2014 The Gogs Authors. All rights reserved.
 | |
| // Copyright 2019 The Gitea Authors. All rights reserved.
 | |
| // Use of this source code is governed by a MIT-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package user
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"encoding/json"
 | |
| 	"fmt"
 | |
| 	"regexp"
 | |
| 	"sort"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 
 | |
| 	"code.gitea.io/gitea/models"
 | |
| 	"code.gitea.io/gitea/modules/base"
 | |
| 	"code.gitea.io/gitea/modules/context"
 | |
| 	issue_indexer "code.gitea.io/gitea/modules/indexer/issues"
 | |
| 	"code.gitea.io/gitea/modules/log"
 | |
| 	"code.gitea.io/gitea/modules/markup/markdown"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 	"code.gitea.io/gitea/modules/util"
 | |
| 	issue_service "code.gitea.io/gitea/services/issue"
 | |
| 	pull_service "code.gitea.io/gitea/services/pull"
 | |
| 
 | |
| 	"github.com/keybase/go-crypto/openpgp"
 | |
| 	"github.com/keybase/go-crypto/openpgp/armor"
 | |
| 	"xorm.io/builder"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	tplDashboard  base.TplName = "user/dashboard/dashboard"
 | |
| 	tplIssues     base.TplName = "user/dashboard/issues"
 | |
| 	tplMilestones base.TplName = "user/dashboard/milestones"
 | |
| 	tplProfile    base.TplName = "user/profile"
 | |
| )
 | |
| 
 | |
| // getDashboardContextUser finds out dashboard is viewing as which context user.
 | |
| func getDashboardContextUser(ctx *context.Context) *models.User {
 | |
| 	ctxUser := ctx.User
 | |
| 	orgName := ctx.Params(":org")
 | |
| 	if len(orgName) > 0 {
 | |
| 		// Organization.
 | |
| 		org, err := models.GetUserByName(orgName)
 | |
| 		if err != nil {
 | |
| 			if models.IsErrUserNotExist(err) {
 | |
| 				ctx.NotFound("GetUserByName", err)
 | |
| 			} else {
 | |
| 				ctx.ServerError("GetUserByName", err)
 | |
| 			}
 | |
| 			return nil
 | |
| 		}
 | |
| 		ctxUser = org
 | |
| 	}
 | |
| 	ctx.Data["ContextUser"] = ctxUser
 | |
| 
 | |
| 	if err := ctx.User.GetOrganizations(&models.SearchOrganizationsOptions{All: true}); err != nil {
 | |
| 		ctx.ServerError("GetOrganizations", err)
 | |
| 		return nil
 | |
| 	}
 | |
| 	ctx.Data["Orgs"] = ctx.User.Orgs
 | |
| 
 | |
| 	return ctxUser
 | |
| }
 | |
| 
 | |
| // retrieveFeeds loads feeds for the specified user
 | |
| func retrieveFeeds(ctx *context.Context, options models.GetFeedsOptions) {
 | |
| 	actions, err := models.GetFeeds(options)
 | |
| 	if err != nil {
 | |
| 		ctx.ServerError("GetFeeds", err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	userCache := map[int64]*models.User{options.RequestedUser.ID: options.RequestedUser}
 | |
| 	if ctx.User != nil {
 | |
| 		userCache[ctx.User.ID] = ctx.User
 | |
| 	}
 | |
| 	for _, act := range actions {
 | |
| 		if act.ActUser != nil {
 | |
| 			userCache[act.ActUserID] = act.ActUser
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	for _, act := range actions {
 | |
| 		repoOwner, ok := userCache[act.Repo.OwnerID]
 | |
| 		if !ok {
 | |
| 			repoOwner, err = models.GetUserByID(act.Repo.OwnerID)
 | |
| 			if err != nil {
 | |
| 				if models.IsErrUserNotExist(err) {
 | |
| 					continue
 | |
| 				}
 | |
| 				ctx.ServerError("GetUserByID", err)
 | |
| 				return
 | |
| 			}
 | |
| 			userCache[repoOwner.ID] = repoOwner
 | |
| 		}
 | |
| 		act.Repo.Owner = repoOwner
 | |
| 	}
 | |
| 	ctx.Data["Feeds"] = actions
 | |
| }
 | |
| 
 | |
| // Dashboard render the dashborad page
 | |
| func Dashboard(ctx *context.Context) {
 | |
| 	ctxUser := getDashboardContextUser(ctx)
 | |
| 	if ctx.Written() {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	ctx.Data["Title"] = ctxUser.DisplayName() + " - " + ctx.Tr("dashboard")
 | |
| 	ctx.Data["PageIsDashboard"] = true
 | |
| 	ctx.Data["PageIsNews"] = true
 | |
| 	ctx.Data["SearchLimit"] = setting.UI.User.RepoPagingNum
 | |
| 	// no heatmap access for admins; GetUserHeatmapDataByUser ignores the calling user
 | |
| 	// so everyone would get the same empty heatmap
 | |
| 	ctx.Data["EnableHeatmap"] = setting.Service.EnableUserHeatmap && !ctxUser.KeepActivityPrivate
 | |
| 	ctx.Data["HeatmapUser"] = ctxUser.Name
 | |
| 
 | |
| 	var err error
 | |
| 	var mirrors []*models.Repository
 | |
| 	if ctxUser.IsOrganization() {
 | |
| 		env, err := ctxUser.AccessibleReposEnv(ctx.User.ID)
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("AccessibleReposEnv", err)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		mirrors, err = env.MirrorRepos()
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("env.MirrorRepos", err)
 | |
| 			return
 | |
| 		}
 | |
| 	} else {
 | |
| 		mirrors, err = ctxUser.GetMirrorRepositories()
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("GetMirrorRepositories", err)
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 	ctx.Data["MaxShowRepoNum"] = setting.UI.User.RepoPagingNum
 | |
| 
 | |
| 	if err := models.MirrorRepositoryList(mirrors).LoadAttributes(); err != nil {
 | |
| 		ctx.ServerError("MirrorRepositoryList.LoadAttributes", err)
 | |
| 		return
 | |
| 	}
 | |
| 	ctx.Data["MirrorCount"] = len(mirrors)
 | |
| 	ctx.Data["Mirrors"] = mirrors
 | |
| 
 | |
| 	retrieveFeeds(ctx, models.GetFeedsOptions{
 | |
| 		RequestedUser:   ctxUser,
 | |
| 		Actor:           ctx.User,
 | |
| 		IncludePrivate:  true,
 | |
| 		OnlyPerformedBy: false,
 | |
| 		IncludeDeleted:  false,
 | |
| 	})
 | |
| 
 | |
| 	if ctx.Written() {
 | |
| 		return
 | |
| 	}
 | |
| 	ctx.HTML(200, tplDashboard)
 | |
| }
 | |
| 
 | |
| // Milestones render the user milestones page
 | |
| func Milestones(ctx *context.Context) {
 | |
| 	if models.UnitTypeIssues.UnitGlobalDisabled() && models.UnitTypePullRequests.UnitGlobalDisabled() {
 | |
| 		log.Debug("Milestones overview page not available as both issues and pull requests are globally disabled")
 | |
| 		ctx.Status(404)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	ctx.Data["Title"] = ctx.Tr("milestones")
 | |
| 	ctx.Data["PageIsMilestonesDashboard"] = true
 | |
| 
 | |
| 	ctxUser := getDashboardContextUser(ctx)
 | |
| 	if ctx.Written() {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	var (
 | |
| 		repoOpts = models.SearchRepoOptions{
 | |
| 			Actor:         ctxUser,
 | |
| 			OwnerID:       ctxUser.ID,
 | |
| 			Private:       true,
 | |
| 			AllPublic:     false,                 // Include also all public repositories of users and public organisations
 | |
| 			AllLimited:    false,                 // Include also all public repositories of limited organisations
 | |
| 			HasMilestones: util.OptionalBoolTrue, // Just needs display repos has milestones
 | |
| 		}
 | |
| 
 | |
| 		userRepoCond = models.SearchRepositoryCondition(&repoOpts) // all repo condition user could visit
 | |
| 		repoCond     = userRepoCond
 | |
| 		repoIDs      []int64
 | |
| 
 | |
| 		reposQuery   = ctx.Query("repos")
 | |
| 		isShowClosed = ctx.Query("state") == "closed"
 | |
| 		sortType     = ctx.Query("sort")
 | |
| 		page         = ctx.QueryInt("page")
 | |
| 	)
 | |
| 
 | |
| 	if page <= 1 {
 | |
| 		page = 1
 | |
| 	}
 | |
| 
 | |
| 	if len(reposQuery) != 0 {
 | |
| 		if issueReposQueryPattern.MatchString(reposQuery) {
 | |
| 			// remove "[" and "]" from string
 | |
| 			reposQuery = reposQuery[1 : len(reposQuery)-1]
 | |
| 			//for each ID (delimiter ",") add to int to repoIDs
 | |
| 
 | |
| 			for _, rID := range strings.Split(reposQuery, ",") {
 | |
| 				// Ensure nonempty string entries
 | |
| 				if rID != "" && rID != "0" {
 | |
| 					rIDint64, err := strconv.ParseInt(rID, 10, 64)
 | |
| 					// If the repo id specified by query is not parseable or not accessible by user, just ignore it.
 | |
| 					if err == nil {
 | |
| 						repoIDs = append(repoIDs, rIDint64)
 | |
| 					}
 | |
| 				}
 | |
| 			}
 | |
| 			if len(repoIDs) > 0 {
 | |
| 				// Don't just let repoCond = builder.In("id", repoIDs) because user may has no permission on repoIDs
 | |
| 				// But the original repoCond has a limitation
 | |
| 				repoCond = repoCond.And(builder.In("id", repoIDs))
 | |
| 			}
 | |
| 		} else {
 | |
| 			log.Warn("issueReposQueryPattern not match with query")
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	counts, err := models.CountMilestonesByRepoCond(userRepoCond, isShowClosed)
 | |
| 	if err != nil {
 | |
| 		ctx.ServerError("CountMilestonesByRepoIDs", err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	milestones, err := models.SearchMilestones(repoCond, page, isShowClosed, sortType)
 | |
| 	if err != nil {
 | |
| 		ctx.ServerError("GetMilestonesByRepoIDs", err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	showRepos, _, err := models.SearchRepositoryByCondition(&repoOpts, userRepoCond, false)
 | |
| 	if err != nil {
 | |
| 		ctx.ServerError("SearchRepositoryByCondition", err)
 | |
| 		return
 | |
| 	}
 | |
| 	sort.Sort(showRepos)
 | |
| 
 | |
| 	for i := 0; i < len(milestones); {
 | |
| 		for _, repo := range showRepos {
 | |
| 			if milestones[i].RepoID == repo.ID {
 | |
| 				milestones[i].Repo = repo
 | |
| 				break
 | |
| 			}
 | |
| 		}
 | |
| 		if milestones[i].Repo == nil {
 | |
| 			log.Warn("Cannot find milestone %d 's repository %d", milestones[i].ID, milestones[i].RepoID)
 | |
| 			milestones = append(milestones[:i], milestones[i+1:]...)
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		milestones[i].RenderedContent = string(markdown.Render([]byte(milestones[i].Content), milestones[i].Repo.Link(), milestones[i].Repo.ComposeMetas()))
 | |
| 		if milestones[i].Repo.IsTimetrackerEnabled() {
 | |
| 			err := milestones[i].LoadTotalTrackedTime()
 | |
| 			if err != nil {
 | |
| 				ctx.ServerError("LoadTotalTrackedTime", err)
 | |
| 				return
 | |
| 			}
 | |
| 		}
 | |
| 		i++
 | |
| 	}
 | |
| 
 | |
| 	milestoneStats, err := models.GetMilestonesStatsByRepoCond(repoCond)
 | |
| 	if err != nil {
 | |
| 		ctx.ServerError("GetMilestoneStats", err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	var totalMilestoneStats *models.MilestonesStats
 | |
| 	if len(repoIDs) == 0 {
 | |
| 		totalMilestoneStats = milestoneStats
 | |
| 	} else {
 | |
| 		totalMilestoneStats, err = models.GetMilestonesStatsByRepoCond(userRepoCond)
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("GetMilestoneStats", err)
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	var pagerCount int
 | |
| 	if isShowClosed {
 | |
| 		ctx.Data["State"] = "closed"
 | |
| 		ctx.Data["Total"] = totalMilestoneStats.ClosedCount
 | |
| 		pagerCount = int(milestoneStats.ClosedCount)
 | |
| 	} else {
 | |
| 		ctx.Data["State"] = "open"
 | |
| 		ctx.Data["Total"] = totalMilestoneStats.OpenCount
 | |
| 		pagerCount = int(milestoneStats.OpenCount)
 | |
| 	}
 | |
| 
 | |
| 	ctx.Data["Milestones"] = milestones
 | |
| 	ctx.Data["Repos"] = showRepos
 | |
| 	ctx.Data["Counts"] = counts
 | |
| 	ctx.Data["MilestoneStats"] = milestoneStats
 | |
| 	ctx.Data["SortType"] = sortType
 | |
| 	if milestoneStats.Total() != totalMilestoneStats.Total() {
 | |
| 		ctx.Data["RepoIDs"] = repoIDs
 | |
| 	}
 | |
| 	ctx.Data["IsShowClosed"] = isShowClosed
 | |
| 
 | |
| 	pager := context.NewPagination(pagerCount, setting.UI.IssuePagingNum, page, 5)
 | |
| 	pager.AddParam(ctx, "repos", "RepoIDs")
 | |
| 	pager.AddParam(ctx, "sort", "SortType")
 | |
| 	pager.AddParam(ctx, "state", "State")
 | |
| 	ctx.Data["Page"] = pager
 | |
| 
 | |
| 	ctx.HTML(200, tplMilestones)
 | |
| }
 | |
| 
 | |
| // Regexp for repos query
 | |
| var issueReposQueryPattern = regexp.MustCompile(`^\[\d+(,\d+)*,?\]$`)
 | |
| 
 | |
| // Issues render the user issues page
 | |
| func Issues(ctx *context.Context) {
 | |
| 	isPullList := ctx.Params(":type") == "pulls"
 | |
| 	unitType := models.UnitTypeIssues
 | |
| 	if isPullList {
 | |
| 		if models.UnitTypePullRequests.UnitGlobalDisabled() {
 | |
| 			log.Debug("Pull request overview page not available as it is globally disabled.")
 | |
| 			ctx.Status(404)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		ctx.Data["Title"] = ctx.Tr("pull_requests")
 | |
| 		ctx.Data["PageIsPulls"] = true
 | |
| 		unitType = models.UnitTypePullRequests
 | |
| 	} else {
 | |
| 		if models.UnitTypeIssues.UnitGlobalDisabled() {
 | |
| 			log.Debug("Issues overview page not available as it is globally disabled.")
 | |
| 			ctx.Status(404)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		ctx.Data["Title"] = ctx.Tr("issues")
 | |
| 		ctx.Data["PageIsIssues"] = true
 | |
| 	}
 | |
| 
 | |
| 	ctxUser := getDashboardContextUser(ctx)
 | |
| 	if ctx.Written() {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	// Organization does not have view type and filter mode.
 | |
| 	var (
 | |
| 		viewType   string
 | |
| 		sortType   = ctx.Query("sort")
 | |
| 		filterMode = models.FilterModeAll
 | |
| 	)
 | |
| 
 | |
| 	if ctxUser.IsOrganization() {
 | |
| 		viewType = "your_repositories"
 | |
| 	} else {
 | |
| 		viewType = ctx.Query("type")
 | |
| 		switch viewType {
 | |
| 		case "assigned":
 | |
| 			filterMode = models.FilterModeAssign
 | |
| 		case "created_by":
 | |
| 			filterMode = models.FilterModeCreate
 | |
| 		case "mentioned":
 | |
| 			filterMode = models.FilterModeMention
 | |
| 		case "your_repositories": // filterMode already set to All
 | |
| 		default:
 | |
| 			viewType = "your_repositories"
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	page := ctx.QueryInt("page")
 | |
| 	if page <= 1 {
 | |
| 		page = 1
 | |
| 	}
 | |
| 
 | |
| 	reposQuery := ctx.Query("repos")
 | |
| 	var repoIDs []int64
 | |
| 	if len(reposQuery) != 0 {
 | |
| 		if issueReposQueryPattern.MatchString(reposQuery) {
 | |
| 			// remove "[" and "]" from string
 | |
| 			reposQuery = reposQuery[1 : len(reposQuery)-1]
 | |
| 			//for each ID (delimiter ",") add to int to repoIDs
 | |
| 			for _, rID := range strings.Split(reposQuery, ",") {
 | |
| 				// Ensure nonempty string entries
 | |
| 				if rID != "" && rID != "0" {
 | |
| 					rIDint64, err := strconv.ParseInt(rID, 10, 64)
 | |
| 					if err == nil {
 | |
| 						repoIDs = append(repoIDs, rIDint64)
 | |
| 					}
 | |
| 				}
 | |
| 			}
 | |
| 		} else {
 | |
| 			log.Warn("issueReposQueryPattern not match with query")
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	isShowClosed := ctx.Query("state") == "closed"
 | |
| 
 | |
| 	// Get repositories.
 | |
| 	var err error
 | |
| 	var userRepoIDs []int64
 | |
| 	if ctxUser.IsOrganization() {
 | |
| 		env, err := ctxUser.AccessibleReposEnv(ctx.User.ID)
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("AccessibleReposEnv", err)
 | |
| 			return
 | |
| 		}
 | |
| 		userRepoIDs, err = env.RepoIDs(1, ctxUser.NumRepos)
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("env.RepoIDs", err)
 | |
| 			return
 | |
| 		}
 | |
| 		userRepoIDs, err = models.FilterOutRepoIdsWithoutUnitAccess(ctx.User, userRepoIDs, unitType)
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("FilterOutRepoIdsWithoutUnitAccess", err)
 | |
| 			return
 | |
| 		}
 | |
| 	} else {
 | |
| 		userRepoIDs, err = ctxUser.GetAccessRepoIDs(unitType)
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("ctxUser.GetAccessRepoIDs", err)
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 	if len(userRepoIDs) == 0 {
 | |
| 		userRepoIDs = []int64{-1}
 | |
| 	}
 | |
| 
 | |
| 	opts := &models.IssuesOptions{
 | |
| 		IsPull:   util.OptionalBoolOf(isPullList),
 | |
| 		SortType: sortType,
 | |
| 	}
 | |
| 
 | |
| 	switch filterMode {
 | |
| 	case models.FilterModeAll:
 | |
| 		opts.RepoIDs = userRepoIDs
 | |
| 	case models.FilterModeAssign:
 | |
| 		opts.AssigneeID = ctxUser.ID
 | |
| 	case models.FilterModeCreate:
 | |
| 		opts.PosterID = ctxUser.ID
 | |
| 	case models.FilterModeMention:
 | |
| 		opts.MentionedID = ctxUser.ID
 | |
| 	}
 | |
| 
 | |
| 	var forceEmpty bool
 | |
| 	var issueIDsFromSearch []int64
 | |
| 	var keyword = strings.Trim(ctx.Query("q"), " ")
 | |
| 
 | |
| 	if len(keyword) > 0 {
 | |
| 		searchRepoIDs, err := models.GetRepoIDsForIssuesOptions(opts, ctxUser)
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("GetRepoIDsForIssuesOptions", err)
 | |
| 			return
 | |
| 		}
 | |
| 		issueIDsFromSearch, err = issue_indexer.SearchIssuesByKeyword(searchRepoIDs, keyword)
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("SearchIssuesByKeyword", err)
 | |
| 			return
 | |
| 		}
 | |
| 		if len(issueIDsFromSearch) > 0 {
 | |
| 			opts.IssueIDs = issueIDsFromSearch
 | |
| 		} else {
 | |
| 			forceEmpty = true
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	ctx.Data["Keyword"] = keyword
 | |
| 
 | |
| 	opts.IsClosed = util.OptionalBoolOf(isShowClosed)
 | |
| 
 | |
| 	var counts map[int64]int64
 | |
| 	if !forceEmpty {
 | |
| 		counts, err = models.CountIssuesByRepo(opts)
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("CountIssuesByRepo", err)
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	opts.Page = page
 | |
| 	opts.PageSize = setting.UI.IssuePagingNum
 | |
| 	var labelIDs []int64
 | |
| 	selectLabels := ctx.Query("labels")
 | |
| 	if len(selectLabels) > 0 && selectLabels != "0" {
 | |
| 		labelIDs, err = base.StringsToInt64s(strings.Split(selectLabels, ","))
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("StringsToInt64s", err)
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 	opts.LabelIDs = labelIDs
 | |
| 
 | |
| 	if len(repoIDs) > 0 {
 | |
| 		opts.RepoIDs = repoIDs
 | |
| 	}
 | |
| 
 | |
| 	var issues []*models.Issue
 | |
| 	if !forceEmpty {
 | |
| 		issues, err = models.Issues(opts)
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("Issues", err)
 | |
| 			return
 | |
| 		}
 | |
| 	} else {
 | |
| 		issues = []*models.Issue{}
 | |
| 	}
 | |
| 
 | |
| 	approvalCounts, err := models.IssueList(issues).GetApprovalCounts()
 | |
| 	if err != nil {
 | |
| 		ctx.ServerError("ApprovalCounts", err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	showReposMap := make(map[int64]*models.Repository, len(counts))
 | |
| 	for repoID := range counts {
 | |
| 		if repoID > 0 {
 | |
| 			if _, ok := showReposMap[repoID]; !ok {
 | |
| 				repo, err := models.GetRepositoryByID(repoID)
 | |
| 				if models.IsErrRepoNotExist(err) {
 | |
| 					ctx.NotFound("GetRepositoryByID", err)
 | |
| 					return
 | |
| 				} else if err != nil {
 | |
| 					ctx.ServerError("GetRepositoryByID", fmt.Errorf("[%d]%v", repoID, err))
 | |
| 					return
 | |
| 				}
 | |
| 				showReposMap[repoID] = repo
 | |
| 			}
 | |
| 			repo := showReposMap[repoID]
 | |
| 
 | |
| 			// Check if user has access to given repository.
 | |
| 			perm, err := models.GetUserRepoPermission(repo, ctxUser)
 | |
| 			if err != nil {
 | |
| 				ctx.ServerError("GetUserRepoPermission", fmt.Errorf("[%d]%v", repoID, err))
 | |
| 				return
 | |
| 			}
 | |
| 			if !perm.CanRead(models.UnitTypeIssues) {
 | |
| 				log.Error("User created Issues in Repository which they no longer have access to: [%d]", repoID)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	showRepos := models.RepositoryListOfMap(showReposMap)
 | |
| 	sort.Sort(showRepos)
 | |
| 	if err = showRepos.LoadAttributes(); err != nil {
 | |
| 		ctx.ServerError("LoadAttributes", err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	var commitStatus = make(map[int64]*models.CommitStatus, len(issues))
 | |
| 	for _, issue := range issues {
 | |
| 		issue.Repo = showReposMap[issue.RepoID]
 | |
| 
 | |
| 		if isPullList {
 | |
| 			commitStatus[issue.PullRequest.ID], _ = pull_service.GetLastCommitStatus(issue.PullRequest)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	userIssueStatsOpts := models.UserIssueStatsOptions{
 | |
| 		UserID:      ctxUser.ID,
 | |
| 		UserRepoIDs: userRepoIDs,
 | |
| 		FilterMode:  filterMode,
 | |
| 		IsPull:      isPullList,
 | |
| 		IsClosed:    isShowClosed,
 | |
| 	}
 | |
| 	if len(repoIDs) > 0 {
 | |
| 		userIssueStatsOpts.UserRepoIDs = repoIDs
 | |
| 	}
 | |
| 	userIssueStats, err := models.GetUserIssueStats(userIssueStatsOpts)
 | |
| 	if err != nil {
 | |
| 		ctx.ServerError("GetUserIssueStats User", err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	var shownIssueStats *models.IssueStats
 | |
| 	if !forceEmpty {
 | |
| 		statsOpts := models.UserIssueStatsOptions{
 | |
| 			UserID:      ctxUser.ID,
 | |
| 			UserRepoIDs: userRepoIDs,
 | |
| 			FilterMode:  filterMode,
 | |
| 			IsPull:      isPullList,
 | |
| 			IsClosed:    isShowClosed,
 | |
| 			IssueIDs:    issueIDsFromSearch,
 | |
| 		}
 | |
| 		if len(repoIDs) > 0 {
 | |
| 			statsOpts.RepoIDs = repoIDs
 | |
| 		}
 | |
| 		shownIssueStats, err = models.GetUserIssueStats(statsOpts)
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("GetUserIssueStats Shown", err)
 | |
| 			return
 | |
| 		}
 | |
| 	} else {
 | |
| 		shownIssueStats = &models.IssueStats{}
 | |
| 	}
 | |
| 
 | |
| 	var allIssueStats *models.IssueStats
 | |
| 	if !forceEmpty {
 | |
| 		allIssueStats, err = models.GetUserIssueStats(models.UserIssueStatsOptions{
 | |
| 			UserID:      ctxUser.ID,
 | |
| 			UserRepoIDs: userRepoIDs,
 | |
| 			FilterMode:  filterMode,
 | |
| 			IsPull:      isPullList,
 | |
| 			IsClosed:    isShowClosed,
 | |
| 			IssueIDs:    issueIDsFromSearch,
 | |
| 		})
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("GetUserIssueStats All", err)
 | |
| 			return
 | |
| 		}
 | |
| 	} else {
 | |
| 		allIssueStats = &models.IssueStats{}
 | |
| 	}
 | |
| 
 | |
| 	var shownIssues int
 | |
| 	var totalIssues int
 | |
| 	if !isShowClosed {
 | |
| 		shownIssues = int(shownIssueStats.OpenCount)
 | |
| 		totalIssues = int(allIssueStats.OpenCount)
 | |
| 	} else {
 | |
| 		shownIssues = int(shownIssueStats.ClosedCount)
 | |
| 		totalIssues = int(allIssueStats.ClosedCount)
 | |
| 	}
 | |
| 
 | |
| 	ctx.Data["IssueRefEndNames"], ctx.Data["IssueRefURLs"] =
 | |
| 		issue_service.GetRefEndNamesAndURLs(issues, ctx.Query("RepoLink"))
 | |
| 
 | |
| 	ctx.Data["Issues"] = issues
 | |
| 	ctx.Data["ApprovalCounts"] = func(issueID int64, typ string) int64 {
 | |
| 		counts, ok := approvalCounts[issueID]
 | |
| 		if !ok || len(counts) == 0 {
 | |
| 			return 0
 | |
| 		}
 | |
| 		reviewTyp := models.ReviewTypeApprove
 | |
| 		if typ == "reject" {
 | |
| 			reviewTyp = models.ReviewTypeReject
 | |
| 		} else if typ == "waiting" {
 | |
| 			reviewTyp = models.ReviewTypeRequest
 | |
| 		}
 | |
| 		for _, count := range counts {
 | |
| 			if count.Type == reviewTyp {
 | |
| 				return count.Count
 | |
| 			}
 | |
| 		}
 | |
| 		return 0
 | |
| 	}
 | |
| 	ctx.Data["CommitStatus"] = commitStatus
 | |
| 	ctx.Data["Repos"] = showRepos
 | |
| 	ctx.Data["Counts"] = counts
 | |
| 	ctx.Data["IssueStats"] = userIssueStats
 | |
| 	ctx.Data["ShownIssueStats"] = shownIssueStats
 | |
| 	ctx.Data["ViewType"] = viewType
 | |
| 	ctx.Data["SortType"] = sortType
 | |
| 	ctx.Data["RepoIDs"] = repoIDs
 | |
| 	ctx.Data["IsShowClosed"] = isShowClosed
 | |
| 	ctx.Data["TotalIssueCount"] = totalIssues
 | |
| 
 | |
| 	if isShowClosed {
 | |
| 		ctx.Data["State"] = "closed"
 | |
| 	} else {
 | |
| 		ctx.Data["State"] = "open"
 | |
| 	}
 | |
| 
 | |
| 	// Convert []int64 to string
 | |
| 	reposParam, _ := json.Marshal(repoIDs)
 | |
| 
 | |
| 	ctx.Data["ReposParam"] = string(reposParam)
 | |
| 
 | |
| 	pager := context.NewPagination(shownIssues, setting.UI.IssuePagingNum, page, 5)
 | |
| 	pager.AddParam(ctx, "q", "Keyword")
 | |
| 	pager.AddParam(ctx, "type", "ViewType")
 | |
| 	pager.AddParam(ctx, "repos", "ReposParam")
 | |
| 	pager.AddParam(ctx, "sort", "SortType")
 | |
| 	pager.AddParam(ctx, "state", "State")
 | |
| 	pager.AddParam(ctx, "labels", "SelectLabels")
 | |
| 	pager.AddParam(ctx, "milestone", "MilestoneID")
 | |
| 	pager.AddParam(ctx, "assignee", "AssigneeID")
 | |
| 	ctx.Data["Page"] = pager
 | |
| 
 | |
| 	ctx.HTML(200, tplIssues)
 | |
| }
 | |
| 
 | |
| // ShowSSHKeys output all the ssh keys of user by uid
 | |
| func ShowSSHKeys(ctx *context.Context, uid int64) {
 | |
| 	keys, err := models.ListPublicKeys(uid, models.ListOptions{})
 | |
| 	if err != nil {
 | |
| 		ctx.ServerError("ListPublicKeys", err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	var buf bytes.Buffer
 | |
| 	for i := range keys {
 | |
| 		buf.WriteString(keys[i].OmitEmail())
 | |
| 		buf.WriteString("\n")
 | |
| 	}
 | |
| 	ctx.PlainText(200, buf.Bytes())
 | |
| }
 | |
| 
 | |
| // ShowGPGKeys output all the public GPG keys of user by uid
 | |
| func ShowGPGKeys(ctx *context.Context, uid int64) {
 | |
| 	keys, err := models.ListGPGKeys(uid, models.ListOptions{})
 | |
| 	if err != nil {
 | |
| 		ctx.ServerError("ListGPGKeys", err)
 | |
| 		return
 | |
| 	}
 | |
| 	entities := make([]*openpgp.Entity, 0)
 | |
| 	failedEntitiesID := make([]string, 0)
 | |
| 	for _, k := range keys {
 | |
| 		e, err := models.GPGKeyToEntity(k)
 | |
| 		if err != nil {
 | |
| 			if models.IsErrGPGKeyImportNotExist(err) {
 | |
| 				failedEntitiesID = append(failedEntitiesID, k.KeyID)
 | |
| 				continue //Skip previous import without backup of imported armored key
 | |
| 			}
 | |
| 			ctx.ServerError("ShowGPGKeys", err)
 | |
| 			return
 | |
| 		}
 | |
| 		entities = append(entities, e)
 | |
| 	}
 | |
| 	var buf bytes.Buffer
 | |
| 
 | |
| 	headers := make(map[string]string)
 | |
| 	if len(failedEntitiesID) > 0 { //If some key need re-import to be exported
 | |
| 		headers["Note"] = fmt.Sprintf("The keys with the following IDs couldn't be exported and need to be reuploaded %s", strings.Join(failedEntitiesID, ", "))
 | |
| 	}
 | |
| 	writer, _ := armor.Encode(&buf, "PGP PUBLIC KEY BLOCK", headers)
 | |
| 	for _, e := range entities {
 | |
| 		err = e.Serialize(writer) //TODO find why key are exported with a different cipherTypeByte as original (should not be blocking but strange)
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("ShowGPGKeys", err)
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 	writer.Close()
 | |
| 	ctx.PlainText(200, buf.Bytes())
 | |
| }
 | |
| 
 | |
| // Email2User show user page via email
 | |
| func Email2User(ctx *context.Context) {
 | |
| 	u, err := models.GetUserByEmail(ctx.Query("email"))
 | |
| 	if err != nil {
 | |
| 		if models.IsErrUserNotExist(err) {
 | |
| 			ctx.NotFound("GetUserByEmail", err)
 | |
| 		} else {
 | |
| 			ctx.ServerError("GetUserByEmail", err)
 | |
| 		}
 | |
| 		return
 | |
| 	}
 | |
| 	ctx.Redirect(setting.AppSubURL + "/user/" + u.Name)
 | |
| }
 |