361 lines
		
	
	
		
			8.6 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			361 lines
		
	
	
		
			8.6 KiB
		
	
	
	
		
			Go
		
	
	
	
| // Copyright 2014 The Gogs Authors. All rights reserved.
 | |
| // Use of this source code is governed by a MIT-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package repo
 | |
| 
 | |
| import (
 | |
| 	"strings"
 | |
| 
 | |
| 	api "code.gitea.io/sdk/gitea"
 | |
| 
 | |
| 	"code.gitea.io/gitea/models"
 | |
| 	"code.gitea.io/gitea/modules/auth"
 | |
| 	"code.gitea.io/gitea/modules/context"
 | |
| 	"code.gitea.io/gitea/modules/log"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 	"code.gitea.io/gitea/routers/api/v1/convert"
 | |
| )
 | |
| 
 | |
| // Search repositories via options
 | |
| func Search(ctx *context.APIContext) {
 | |
| 	// swagger:route GET /repos/search repoSearch
 | |
| 	//
 | |
| 	//     Produces:
 | |
| 	//     - application/json
 | |
| 	//
 | |
| 	//     Responses:
 | |
| 	//       200: SearchResults
 | |
| 	//       500: SearchError
 | |
| 
 | |
| 	opts := &models.SearchRepoOptions{
 | |
| 		Keyword:  strings.Trim(ctx.Query("q"), " "),
 | |
| 		OwnerID:  ctx.QueryInt64("uid"),
 | |
| 		PageSize: convert.ToCorrectPageSize(ctx.QueryInt("limit")),
 | |
| 	}
 | |
| 	if ctx.User != nil && ctx.User.ID == opts.OwnerID {
 | |
| 		opts.Searcher = ctx.User
 | |
| 	}
 | |
| 
 | |
| 	// Check visibility.
 | |
| 	if ctx.IsSigned && opts.OwnerID > 0 {
 | |
| 		if ctx.User.ID == opts.OwnerID {
 | |
| 			opts.Private = true
 | |
| 		} else {
 | |
| 			u, err := models.GetUserByID(opts.OwnerID)
 | |
| 			if err != nil {
 | |
| 				ctx.JSON(500, api.SearchError{
 | |
| 					OK:    false,
 | |
| 					Error: err.Error(),
 | |
| 				})
 | |
| 				return
 | |
| 			}
 | |
| 			if u.IsOrganization() && u.IsOwnedBy(ctx.User.ID) {
 | |
| 				opts.Private = true
 | |
| 			}
 | |
| 			// FIXME: how about collaborators?
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	repos, count, err := models.SearchRepositoryByName(opts)
 | |
| 	if err != nil {
 | |
| 		ctx.JSON(500, api.SearchError{
 | |
| 			OK:    false,
 | |
| 			Error: err.Error(),
 | |
| 		})
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	var userID int64
 | |
| 	if ctx.IsSigned {
 | |
| 		userID = ctx.User.ID
 | |
| 	}
 | |
| 
 | |
| 	results := make([]*api.Repository, len(repos))
 | |
| 	for i, repo := range repos {
 | |
| 		if err = repo.GetOwner(); err != nil {
 | |
| 			ctx.JSON(500, api.SearchError{
 | |
| 				OK:    false,
 | |
| 				Error: err.Error(),
 | |
| 			})
 | |
| 			return
 | |
| 		}
 | |
| 		accessMode, err := models.AccessLevel(userID, repo)
 | |
| 		if err != nil {
 | |
| 			ctx.JSON(500, api.SearchError{
 | |
| 				OK:    false,
 | |
| 				Error: err.Error(),
 | |
| 			})
 | |
| 		}
 | |
| 		results[i] = repo.APIFormat(accessMode)
 | |
| 	}
 | |
| 
 | |
| 	ctx.SetLinkHeader(int(count), setting.API.MaxResponseItems)
 | |
| 	ctx.JSON(200, api.SearchResults{
 | |
| 		OK:   true,
 | |
| 		Data: results,
 | |
| 	})
 | |
| }
 | |
| 
 | |
| // CreateUserRepo create a repository for a user
 | |
| func CreateUserRepo(ctx *context.APIContext, owner *models.User, opt api.CreateRepoOption) {
 | |
| 	repo, err := models.CreateRepository(owner, models.CreateRepoOptions{
 | |
| 		Name:        opt.Name,
 | |
| 		Description: opt.Description,
 | |
| 		Gitignores:  opt.Gitignores,
 | |
| 		License:     opt.License,
 | |
| 		Readme:      opt.Readme,
 | |
| 		IsPrivate:   opt.Private,
 | |
| 		AutoInit:    opt.AutoInit,
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		if models.IsErrRepoAlreadyExist(err) ||
 | |
| 			models.IsErrNameReserved(err) ||
 | |
| 			models.IsErrNamePatternNotAllowed(err) {
 | |
| 			ctx.Error(422, "", err)
 | |
| 		} else {
 | |
| 			if repo != nil {
 | |
| 				if err = models.DeleteRepository(ctx.User.ID, repo.ID); err != nil {
 | |
| 					log.Error(4, "DeleteRepository: %v", err)
 | |
| 				}
 | |
| 			}
 | |
| 			ctx.Error(500, "CreateRepository", err)
 | |
| 		}
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	ctx.JSON(201, repo.APIFormat(models.AccessModeOwner))
 | |
| }
 | |
| 
 | |
| // Create one repository of mine
 | |
| // see https://github.com/gogits/go-gogs-client/wiki/Repositories#create
 | |
| func Create(ctx *context.APIContext, opt api.CreateRepoOption) {
 | |
| 	// Shouldn't reach this condition, but just in case.
 | |
| 	if ctx.User.IsOrganization() {
 | |
| 		ctx.Error(422, "", "not allowed creating repository for organization")
 | |
| 		return
 | |
| 	}
 | |
| 	CreateUserRepo(ctx, ctx.User, opt)
 | |
| }
 | |
| 
 | |
| // CreateOrgRepo create one repository of the organization
 | |
| func CreateOrgRepo(ctx *context.APIContext, opt api.CreateRepoOption) {
 | |
| 	// swagger:route POST /org/{org}/repos createOrgRepo
 | |
| 	//
 | |
| 	//     Consumes:
 | |
| 	//     - application/json
 | |
| 	//
 | |
| 	//     Produces:
 | |
| 	//     - application/json
 | |
| 	//
 | |
| 	//     Responses:
 | |
| 	//       201: Repository
 | |
| 	//       422: validationError
 | |
| 	//       403: forbidden
 | |
| 	//       500: error
 | |
| 
 | |
| 	org, err := models.GetOrgByName(ctx.Params(":org"))
 | |
| 	if err != nil {
 | |
| 		if models.IsErrUserNotExist(err) {
 | |
| 			ctx.Error(422, "", err)
 | |
| 		} else {
 | |
| 			ctx.Error(500, "GetOrgByName", err)
 | |
| 		}
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	if !org.IsOwnedBy(ctx.User.ID) {
 | |
| 		ctx.Error(403, "", "Given user is not owner of organization.")
 | |
| 		return
 | |
| 	}
 | |
| 	CreateUserRepo(ctx, org, opt)
 | |
| }
 | |
| 
 | |
| // Migrate migrate remote git repository to gitea
 | |
| func Migrate(ctx *context.APIContext, form auth.MigrateRepoForm) {
 | |
| 	// swagger:route POST /repos/migrate
 | |
| 	//
 | |
| 	//     Consumes:
 | |
| 	//     - application/json
 | |
| 	//
 | |
| 	//     Produces:
 | |
| 	//     - application/json
 | |
| 	//
 | |
| 	//     Responses:
 | |
| 	//       201: Repository
 | |
| 	//       422: validationError
 | |
| 	//       500: error
 | |
| 
 | |
| 	ctxUser := ctx.User
 | |
| 	// Not equal means context user is an organization,
 | |
| 	// or is another user/organization if current user is admin.
 | |
| 	if form.UID != ctxUser.ID {
 | |
| 		org, err := models.GetUserByID(form.UID)
 | |
| 		if err != nil {
 | |
| 			if models.IsErrUserNotExist(err) {
 | |
| 				ctx.Error(422, "", err)
 | |
| 			} else {
 | |
| 				ctx.Error(500, "GetUserByID", err)
 | |
| 			}
 | |
| 			return
 | |
| 		}
 | |
| 		ctxUser = org
 | |
| 	}
 | |
| 
 | |
| 	if ctx.HasError() {
 | |
| 		ctx.Error(422, "", ctx.GetErrMsg())
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	if ctxUser.IsOrganization() && !ctx.User.IsAdmin {
 | |
| 		// Check ownership of organization.
 | |
| 		if !ctxUser.IsOwnedBy(ctx.User.ID) {
 | |
| 			ctx.Error(403, "", "Given user is not owner of organization.")
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	remoteAddr, err := form.ParseRemoteAddr(ctx.User)
 | |
| 	if err != nil {
 | |
| 		if models.IsErrInvalidCloneAddr(err) {
 | |
| 			addrErr := err.(models.ErrInvalidCloneAddr)
 | |
| 			switch {
 | |
| 			case addrErr.IsURLError:
 | |
| 				ctx.Error(422, "", err)
 | |
| 			case addrErr.IsPermissionDenied:
 | |
| 				ctx.Error(422, "", "You are not allowed to import local repositories.")
 | |
| 			case addrErr.IsInvalidPath:
 | |
| 				ctx.Error(422, "", "Invalid local path, it does not exist or not a directory.")
 | |
| 			default:
 | |
| 				ctx.Error(500, "ParseRemoteAddr", "Unknown error type (ErrInvalidCloneAddr): "+err.Error())
 | |
| 			}
 | |
| 		} else {
 | |
| 			ctx.Error(500, "ParseRemoteAddr", err)
 | |
| 		}
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	repo, err := models.MigrateRepository(ctxUser, models.MigrateRepoOptions{
 | |
| 		Name:        form.RepoName,
 | |
| 		Description: form.Description,
 | |
| 		IsPrivate:   form.Private || setting.Repository.ForcePrivate,
 | |
| 		IsMirror:    form.Mirror,
 | |
| 		RemoteAddr:  remoteAddr,
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		if repo != nil {
 | |
| 			if errDelete := models.DeleteRepository(ctxUser.ID, repo.ID); errDelete != nil {
 | |
| 				log.Error(4, "DeleteRepository: %v", errDelete)
 | |
| 			}
 | |
| 		}
 | |
| 		ctx.Error(500, "MigrateRepository", models.HandleCloneUserCredentials(err.Error(), true))
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	log.Trace("Repository migrated: %s/%s", ctxUser.Name, form.RepoName)
 | |
| 	ctx.JSON(201, repo.APIFormat(models.AccessModeAdmin))
 | |
| }
 | |
| 
 | |
| // Get one repository
 | |
| func Get(ctx *context.APIContext) {
 | |
| 	// swagger:route GET /repos/{username}/{reponame}
 | |
| 	//
 | |
| 	//     Produces:
 | |
| 	//     - application/json
 | |
| 	//
 | |
| 	//     Responses:
 | |
| 	//       200: Repository
 | |
| 	//       500: error
 | |
| 
 | |
| 	repo := ctx.Repo.Repository
 | |
| 	access, err := models.AccessLevel(ctx.User.ID, repo)
 | |
| 	if err != nil {
 | |
| 		ctx.Error(500, "GetRepository", err)
 | |
| 		return
 | |
| 	}
 | |
| 	ctx.JSON(200, repo.APIFormat(access))
 | |
| }
 | |
| 
 | |
| // GetByID returns a single Repository
 | |
| func GetByID(ctx *context.APIContext) {
 | |
| 	// swagger:route GET /repositories/{id}
 | |
| 	//
 | |
| 	//     Produces:
 | |
| 	//     - application/json
 | |
| 	//
 | |
| 	//     Responses:
 | |
| 	//       200: Repository
 | |
| 	//       500: error
 | |
| 
 | |
| 	repo, err := models.GetRepositoryByID(ctx.ParamsInt64(":id"))
 | |
| 	if err != nil {
 | |
| 		if models.IsErrRepoNotExist(err) {
 | |
| 			ctx.Status(404)
 | |
| 		} else {
 | |
| 			ctx.Error(500, "GetRepositoryByID", err)
 | |
| 		}
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	access, err := models.AccessLevel(ctx.User.ID, repo)
 | |
| 	if err != nil {
 | |
| 		ctx.Error(500, "GetRepositoryByID", err)
 | |
| 		return
 | |
| 	}
 | |
| 	ctx.JSON(200, repo.APIFormat(access))
 | |
| }
 | |
| 
 | |
| // Delete one repository
 | |
| func Delete(ctx *context.APIContext) {
 | |
| 	// swagger:route DELETE /repos/{username}/{reponame}
 | |
| 	//
 | |
| 	//     Produces:
 | |
| 	//     - application/json
 | |
| 	//
 | |
| 	//     Responses:
 | |
| 	//       204: empty
 | |
| 	//       403: forbidden
 | |
| 	//       500: error
 | |
| 
 | |
| 	if !ctx.Repo.IsAdmin() {
 | |
| 		ctx.Error(403, "", "Must have admin rights")
 | |
| 		return
 | |
| 	}
 | |
| 	owner := ctx.Repo.Owner
 | |
| 	repo := ctx.Repo.Repository
 | |
| 
 | |
| 	if owner.IsOrganization() && !owner.IsOwnedBy(ctx.User.ID) {
 | |
| 		ctx.Error(403, "", "Given user is not owner of organization.")
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	if err := models.DeleteRepository(owner.ID, repo.ID); err != nil {
 | |
| 		ctx.Error(500, "DeleteRepository", err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	log.Trace("Repository deleted: %s/%s", owner.Name, repo.Name)
 | |
| 	ctx.Status(204)
 | |
| }
 | |
| 
 | |
| // MirrorSync adds a mirrored repository to the sync queue
 | |
| func MirrorSync(ctx *context.APIContext) {
 | |
| 	// swagger:route POST /repos/{username}/{reponame}/mirror-sync repoMirrorSync
 | |
| 	//
 | |
| 	//     Produces:
 | |
| 	//     - application/json
 | |
| 	//
 | |
| 	//     Responses:
 | |
| 	//       200: empty
 | |
| 	//       403: forbidden
 | |
| 
 | |
| 	repo := ctx.Repo.Repository
 | |
| 
 | |
| 	if !ctx.Repo.IsWriter() {
 | |
| 		ctx.Error(403, "MirrorSync", "Must have write access")
 | |
| 	}
 | |
| 
 | |
| 	go models.MirrorQueue.Add(repo.ID)
 | |
| 	ctx.Status(200)
 | |
| }
 |