Use [chi](https://github.com/go-chi/chi) instead of the forked [macaron](https://gitea.com/macaron/macaron). Since macaron and chi have conflicts with session share, this big PR becomes a have-to thing. According my previous idea, we can replace macaron step by step but I'm wrong. :( Below is a list of big changes on this PR. - [x] Define `context.ResponseWriter` interface with an implementation `context.Response`. - [x] Use chi instead of macaron, and also a customize `Route` to wrap chi so that the router usage is similar as before. - [x] Create different routers for `web`, `api`, `internal` and `install` so that the codes will be more clear and no magic . - [x] Use https://github.com/unrolled/render instead of macaron's internal render - [x] Use https://github.com/NYTimes/gziphandler instead of https://gitea.com/macaron/gzip - [x] Use https://gitea.com/go-chi/session which is a modified version of https://gitea.com/macaron/session and removed `nodb` support since it will not be maintained. **BREAK** - [x] Use https://gitea.com/go-chi/captcha which is a modified version of https://gitea.com/macaron/captcha - [x] Use https://gitea.com/go-chi/cache which is a modified version of https://gitea.com/macaron/cache - [x] Use https://gitea.com/go-chi/binding which is a modified version of https://gitea.com/macaron/binding - [x] Use https://github.com/go-chi/cors instead of https://gitea.com/macaron/cors - [x] Dropped https://gitea.com/macaron/i18n and make a new one in `code.gitea.io/gitea/modules/translation` - [x] Move validation form structs from `code.gitea.io/gitea/modules/auth` to `code.gitea.io/gitea/modules/forms` to avoid dependency cycle. - [x] Removed macaron log service because it's not need any more. **BREAK** - [x] All form structs have to be get by `web.GetForm(ctx)` in the route function but not as a function parameter on routes definition. - [x] Move Git HTTP protocol implementation to use routers directly. - [x] Fix the problem that chi routes don't support trailing slash but macaron did. - [x] `/api/v1/swagger` now will be redirect to `/api/swagger` but not render directly so that `APIContext` will not create a html render. Notices: - Chi router don't support request with trailing slash - Integration test `TestUserHeatmap` maybe mysql version related. It's failed on my macOS(mysql 5.7.29 installed via brew) but succeed on CI. Co-authored-by: 6543 <6543@obermui.de>
		
			
				
	
	
		
			373 lines
		
	
	
	
		
			10 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			373 lines
		
	
	
	
		
			10 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2014 The Gogs Authors. All rights reserved.
 | |
| // Copyright 2020 The Gitea Authors. All rights reserved.
 | |
| // Use of this source code is governed by a MIT-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package repo
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"strings"
 | |
| 	"time"
 | |
| 
 | |
| 	"code.gitea.io/gitea/models"
 | |
| 	"code.gitea.io/gitea/modules/base"
 | |
| 	"code.gitea.io/gitea/modules/context"
 | |
| 	auth "code.gitea.io/gitea/modules/forms"
 | |
| 	"code.gitea.io/gitea/modules/log"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 	"code.gitea.io/gitea/modules/web"
 | |
| 	archiver_service "code.gitea.io/gitea/services/archiver"
 | |
| 	repo_service "code.gitea.io/gitea/services/repository"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	tplCreate       base.TplName = "repo/create"
 | |
| 	tplAlertDetails base.TplName = "base/alert_details"
 | |
| )
 | |
| 
 | |
| // MustBeNotEmpty render when a repo is a empty git dir
 | |
| func MustBeNotEmpty(ctx *context.Context) {
 | |
| 	if ctx.Repo.Repository.IsEmpty {
 | |
| 		ctx.NotFound("MustBeNotEmpty", nil)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // MustBeEditable check that repo can be edited
 | |
| func MustBeEditable(ctx *context.Context) {
 | |
| 	if !ctx.Repo.Repository.CanEnableEditor() || ctx.Repo.IsViewCommit {
 | |
| 		ctx.NotFound("", nil)
 | |
| 		return
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // MustBeAbleToUpload check that repo can be uploaded to
 | |
| func MustBeAbleToUpload(ctx *context.Context) {
 | |
| 	if !setting.Repository.Upload.Enabled {
 | |
| 		ctx.NotFound("", nil)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func checkContextUser(ctx *context.Context, uid int64) *models.User {
 | |
| 	orgs, err := models.GetOrgsCanCreateRepoByUserID(ctx.User.ID)
 | |
| 	if err != nil {
 | |
| 		ctx.ServerError("GetOrgsCanCreateRepoByUserID", err)
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	if !ctx.User.IsAdmin {
 | |
| 		orgsAvailable := []*models.User{}
 | |
| 		for i := 0; i < len(orgs); i++ {
 | |
| 			if orgs[i].CanCreateRepo() {
 | |
| 				orgsAvailable = append(orgsAvailable, orgs[i])
 | |
| 			}
 | |
| 		}
 | |
| 		ctx.Data["Orgs"] = orgsAvailable
 | |
| 	} else {
 | |
| 		ctx.Data["Orgs"] = orgs
 | |
| 	}
 | |
| 
 | |
| 	// Not equal means current user is an organization.
 | |
| 	if uid == ctx.User.ID || uid == 0 {
 | |
| 		return ctx.User
 | |
| 	}
 | |
| 
 | |
| 	org, err := models.GetUserByID(uid)
 | |
| 	if models.IsErrUserNotExist(err) {
 | |
| 		return ctx.User
 | |
| 	}
 | |
| 
 | |
| 	if err != nil {
 | |
| 		ctx.ServerError("GetUserByID", fmt.Errorf("[%d]: %v", uid, err))
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// Check ownership of organization.
 | |
| 	if !org.IsOrganization() {
 | |
| 		ctx.Error(403)
 | |
| 		return nil
 | |
| 	}
 | |
| 	if !ctx.User.IsAdmin {
 | |
| 		canCreate, err := org.CanCreateOrgRepo(ctx.User.ID)
 | |
| 		if err != nil {
 | |
| 			ctx.ServerError("CanCreateOrgRepo", err)
 | |
| 			return nil
 | |
| 		} else if !canCreate {
 | |
| 			ctx.Error(403)
 | |
| 			return nil
 | |
| 		}
 | |
| 	} else {
 | |
| 		ctx.Data["Orgs"] = orgs
 | |
| 	}
 | |
| 	return org
 | |
| }
 | |
| 
 | |
| func getRepoPrivate(ctx *context.Context) bool {
 | |
| 	switch strings.ToLower(setting.Repository.DefaultPrivate) {
 | |
| 	case setting.RepoCreatingLastUserVisibility:
 | |
| 		return ctx.User.LastRepoVisibility
 | |
| 	case setting.RepoCreatingPrivate:
 | |
| 		return true
 | |
| 	case setting.RepoCreatingPublic:
 | |
| 		return false
 | |
| 	default:
 | |
| 		return ctx.User.LastRepoVisibility
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // Create render creating repository page
 | |
| func Create(ctx *context.Context) {
 | |
| 	ctx.Data["Title"] = ctx.Tr("new_repo")
 | |
| 
 | |
| 	// Give default value for template to render.
 | |
| 	ctx.Data["Gitignores"] = models.Gitignores
 | |
| 	ctx.Data["LabelTemplates"] = models.LabelTemplates
 | |
| 	ctx.Data["Licenses"] = models.Licenses
 | |
| 	ctx.Data["Readmes"] = models.Readmes
 | |
| 	ctx.Data["readme"] = "Default"
 | |
| 	ctx.Data["private"] = getRepoPrivate(ctx)
 | |
| 	ctx.Data["IsForcedPrivate"] = setting.Repository.ForcePrivate
 | |
| 	ctx.Data["default_branch"] = setting.Repository.DefaultBranch
 | |
| 
 | |
| 	ctxUser := checkContextUser(ctx, ctx.QueryInt64("org"))
 | |
| 	if ctx.Written() {
 | |
| 		return
 | |
| 	}
 | |
| 	ctx.Data["ContextUser"] = ctxUser
 | |
| 
 | |
| 	ctx.Data["repo_template_name"] = ctx.Tr("repo.template_select")
 | |
| 	templateID := ctx.QueryInt64("template_id")
 | |
| 	if templateID > 0 {
 | |
| 		templateRepo, err := models.GetRepositoryByID(templateID)
 | |
| 		if err == nil && templateRepo.CheckUnitUser(ctxUser, models.UnitTypeCode) {
 | |
| 			ctx.Data["repo_template"] = templateID
 | |
| 			ctx.Data["repo_template_name"] = templateRepo.Name
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	ctx.Data["CanCreateRepo"] = ctx.User.CanCreateRepo()
 | |
| 	ctx.Data["MaxCreationLimit"] = ctx.User.MaxCreationLimit()
 | |
| 
 | |
| 	ctx.HTML(200, tplCreate)
 | |
| }
 | |
| 
 | |
| func handleCreateError(ctx *context.Context, owner *models.User, err error, name string, tpl base.TplName, form interface{}) {
 | |
| 	switch {
 | |
| 	case models.IsErrReachLimitOfRepo(err):
 | |
| 		ctx.RenderWithErr(ctx.Tr("repo.form.reach_limit_of_creation", owner.MaxCreationLimit()), tpl, form)
 | |
| 	case models.IsErrRepoAlreadyExist(err):
 | |
| 		ctx.Data["Err_RepoName"] = true
 | |
| 		ctx.RenderWithErr(ctx.Tr("form.repo_name_been_taken"), tpl, form)
 | |
| 	case models.IsErrRepoFilesAlreadyExist(err):
 | |
| 		ctx.Data["Err_RepoName"] = true
 | |
| 		switch {
 | |
| 		case ctx.IsUserSiteAdmin() || (setting.Repository.AllowAdoptionOfUnadoptedRepositories && setting.Repository.AllowDeleteOfUnadoptedRepositories):
 | |
| 			ctx.RenderWithErr(ctx.Tr("form.repository_files_already_exist.adopt_or_delete"), tpl, form)
 | |
| 		case setting.Repository.AllowAdoptionOfUnadoptedRepositories:
 | |
| 			ctx.RenderWithErr(ctx.Tr("form.repository_files_already_exist.adopt"), tpl, form)
 | |
| 		case setting.Repository.AllowDeleteOfUnadoptedRepositories:
 | |
| 			ctx.RenderWithErr(ctx.Tr("form.repository_files_already_exist.delete"), tpl, form)
 | |
| 		default:
 | |
| 			ctx.RenderWithErr(ctx.Tr("form.repository_files_already_exist"), tpl, form)
 | |
| 		}
 | |
| 	case models.IsErrNameReserved(err):
 | |
| 		ctx.Data["Err_RepoName"] = true
 | |
| 		ctx.RenderWithErr(ctx.Tr("repo.form.name_reserved", err.(models.ErrNameReserved).Name), tpl, form)
 | |
| 	case models.IsErrNamePatternNotAllowed(err):
 | |
| 		ctx.Data["Err_RepoName"] = true
 | |
| 		ctx.RenderWithErr(ctx.Tr("repo.form.name_pattern_not_allowed", err.(models.ErrNamePatternNotAllowed).Pattern), tpl, form)
 | |
| 	default:
 | |
| 		ctx.ServerError(name, err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // CreatePost response for creating repository
 | |
| func CreatePost(ctx *context.Context) {
 | |
| 	form := web.GetForm(ctx).(*auth.CreateRepoForm)
 | |
| 	ctx.Data["Title"] = ctx.Tr("new_repo")
 | |
| 
 | |
| 	ctx.Data["Gitignores"] = models.Gitignores
 | |
| 	ctx.Data["LabelTemplates"] = models.LabelTemplates
 | |
| 	ctx.Data["Licenses"] = models.Licenses
 | |
| 	ctx.Data["Readmes"] = models.Readmes
 | |
| 
 | |
| 	ctxUser := checkContextUser(ctx, form.UID)
 | |
| 	if ctx.Written() {
 | |
| 		return
 | |
| 	}
 | |
| 	ctx.Data["ContextUser"] = ctxUser
 | |
| 
 | |
| 	if ctx.HasError() {
 | |
| 		ctx.HTML(200, tplCreate)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	var repo *models.Repository
 | |
| 	var err error
 | |
| 	if form.RepoTemplate > 0 {
 | |
| 		opts := models.GenerateRepoOptions{
 | |
| 			Name:        form.RepoName,
 | |
| 			Description: form.Description,
 | |
| 			Private:     form.Private,
 | |
| 			GitContent:  form.GitContent,
 | |
| 			Topics:      form.Topics,
 | |
| 			GitHooks:    form.GitHooks,
 | |
| 			Webhooks:    form.Webhooks,
 | |
| 			Avatar:      form.Avatar,
 | |
| 			IssueLabels: form.Labels,
 | |
| 		}
 | |
| 
 | |
| 		if !opts.IsValid() {
 | |
| 			ctx.RenderWithErr(ctx.Tr("repo.template.one_item"), tplCreate, form)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		templateRepo := getRepository(ctx, form.RepoTemplate)
 | |
| 		if ctx.Written() {
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		if !templateRepo.IsTemplate {
 | |
| 			ctx.RenderWithErr(ctx.Tr("repo.template.invalid"), tplCreate, form)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		repo, err = repo_service.GenerateRepository(ctx.User, ctxUser, templateRepo, opts)
 | |
| 		if err == nil {
 | |
| 			log.Trace("Repository generated [%d]: %s/%s", repo.ID, ctxUser.Name, repo.Name)
 | |
| 			ctx.Redirect(setting.AppSubURL + "/" + ctxUser.Name + "/" + repo.Name)
 | |
| 			return
 | |
| 		}
 | |
| 	} else {
 | |
| 		repo, err = repo_service.CreateRepository(ctx.User, ctxUser, models.CreateRepoOptions{
 | |
| 			Name:          form.RepoName,
 | |
| 			Description:   form.Description,
 | |
| 			Gitignores:    form.Gitignores,
 | |
| 			IssueLabels:   form.IssueLabels,
 | |
| 			License:       form.License,
 | |
| 			Readme:        form.Readme,
 | |
| 			IsPrivate:     form.Private || setting.Repository.ForcePrivate,
 | |
| 			DefaultBranch: form.DefaultBranch,
 | |
| 			AutoInit:      form.AutoInit,
 | |
| 			IsTemplate:    form.Template,
 | |
| 			TrustModel:    models.ToTrustModel(form.TrustModel),
 | |
| 		})
 | |
| 		if err == nil {
 | |
| 			log.Trace("Repository created [%d]: %s/%s", repo.ID, ctxUser.Name, repo.Name)
 | |
| 			ctx.Redirect(setting.AppSubURL + "/" + ctxUser.Name + "/" + repo.Name)
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	handleCreateError(ctx, ctxUser, err, "CreatePost", tplCreate, &form)
 | |
| }
 | |
| 
 | |
| // Action response for actions to a repository
 | |
| func Action(ctx *context.Context) {
 | |
| 	var err error
 | |
| 	switch ctx.Params(":action") {
 | |
| 	case "watch":
 | |
| 		err = models.WatchRepo(ctx.User.ID, ctx.Repo.Repository.ID, true)
 | |
| 	case "unwatch":
 | |
| 		err = models.WatchRepo(ctx.User.ID, ctx.Repo.Repository.ID, false)
 | |
| 	case "star":
 | |
| 		err = models.StarRepo(ctx.User.ID, ctx.Repo.Repository.ID, true)
 | |
| 	case "unstar":
 | |
| 		err = models.StarRepo(ctx.User.ID, ctx.Repo.Repository.ID, false)
 | |
| 	case "desc": // FIXME: this is not used
 | |
| 		if !ctx.Repo.IsOwner() {
 | |
| 			ctx.Error(404)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		ctx.Repo.Repository.Description = ctx.Query("desc")
 | |
| 		ctx.Repo.Repository.Website = ctx.Query("site")
 | |
| 		err = models.UpdateRepository(ctx.Repo.Repository, false)
 | |
| 	}
 | |
| 
 | |
| 	if err != nil {
 | |
| 		ctx.ServerError(fmt.Sprintf("Action (%s)", ctx.Params(":action")), err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	ctx.RedirectToFirst(ctx.Query("redirect_to"), ctx.Repo.RepoLink)
 | |
| }
 | |
| 
 | |
| // RedirectDownload return a file based on the following infos:
 | |
| func RedirectDownload(ctx *context.Context) {
 | |
| 	var (
 | |
| 		vTag     = ctx.Params("vTag")
 | |
| 		fileName = ctx.Params("fileName")
 | |
| 	)
 | |
| 	tagNames := []string{vTag}
 | |
| 	curRepo := ctx.Repo.Repository
 | |
| 	releases, err := models.GetReleasesByRepoIDAndNames(models.DefaultDBContext(), curRepo.ID, tagNames)
 | |
| 	if err != nil {
 | |
| 		if models.IsErrAttachmentNotExist(err) {
 | |
| 			ctx.Error(404)
 | |
| 			return
 | |
| 		}
 | |
| 		ctx.ServerError("RedirectDownload", err)
 | |
| 		return
 | |
| 	}
 | |
| 	if len(releases) == 1 {
 | |
| 		release := releases[0]
 | |
| 		att, err := models.GetAttachmentByReleaseIDFileName(release.ID, fileName)
 | |
| 		if err != nil {
 | |
| 			ctx.Error(404)
 | |
| 			return
 | |
| 		}
 | |
| 		if att != nil {
 | |
| 			ctx.Redirect(att.DownloadURL())
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 	ctx.Error(404)
 | |
| }
 | |
| 
 | |
| // Download an archive of a repository
 | |
| func Download(ctx *context.Context) {
 | |
| 	uri := ctx.Params("*")
 | |
| 	aReq := archiver_service.DeriveRequestFrom(ctx, uri)
 | |
| 
 | |
| 	if aReq == nil {
 | |
| 		ctx.Error(404)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	downloadName := ctx.Repo.Repository.Name + "-" + aReq.GetArchiveName()
 | |
| 	complete := aReq.IsComplete()
 | |
| 	if !complete {
 | |
| 		aReq = archiver_service.ArchiveRepository(aReq)
 | |
| 		complete = aReq.WaitForCompletion(ctx)
 | |
| 	}
 | |
| 
 | |
| 	if complete {
 | |
| 		ctx.ServeFile(aReq.GetArchivePath(), downloadName)
 | |
| 	} else {
 | |
| 		ctx.Error(404)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // InitiateDownload will enqueue an archival request, as needed.  It may submit
 | |
| // a request that's already in-progress, but the archiver service will just
 | |
| // kind of drop it on the floor if this is the case.
 | |
| func InitiateDownload(ctx *context.Context) {
 | |
| 	uri := ctx.Params("*")
 | |
| 	aReq := archiver_service.DeriveRequestFrom(ctx, uri)
 | |
| 
 | |
| 	if aReq == nil {
 | |
| 		ctx.Error(404)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	complete := aReq.IsComplete()
 | |
| 	if !complete {
 | |
| 		aReq = archiver_service.ArchiveRepository(aReq)
 | |
| 		complete, _ = aReq.TimedWaitForCompletion(ctx, 2*time.Second)
 | |
| 	}
 | |
| 
 | |
| 	ctx.JSON(200, map[string]interface{}{
 | |
| 		"complete": complete,
 | |
| 	})
 | |
| }
 |