| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332 | // Copyright 2014 The Gogs Authors. All rights reserved.// Use of this source code is governed by a MIT-style// license that can be found in the LICENSE file.package repoimport (	"fmt"	"os"	"path"	"strings"	"github.com/Unknwon/com"	"github.com/gogits/git-shell"	"github.com/gogits/gogs/models"	"github.com/gogits/gogs/modules/auth"	"github.com/gogits/gogs/modules/base"	"github.com/gogits/gogs/modules/log"	"github.com/gogits/gogs/modules/middleware"	"github.com/gogits/gogs/modules/setting")const (	CREATE  base.TplName = "repo/create"	MIGRATE base.TplName = "repo/migrate")func checkContextUser(ctx *middleware.Context, uid int64) *models.User {	orgs, err := models.GetOwnedOrgsByUserIDDesc(ctx.User.Id, "updated")	if err != nil {		ctx.Handle(500, "GetOwnedOrgsByUserIDDesc", err)		return nil	}	ctx.Data["Orgs"] = orgs	// Not equal means current user is an organization.	if uid == ctx.User.Id || uid == 0 {		return ctx.User	}	org, err := models.GetUserByID(uid)	if models.IsErrUserNotExist(err) {		return ctx.User	}	if err != nil {		ctx.Handle(500, "GetUserByID", fmt.Errorf("[%d]: %v", uid, err))		return nil	}	// Check ownership of organization.	if !org.IsOrganization() || !org.IsOwnedBy(ctx.User.Id) {		ctx.Error(403)		return nil	}	return org}func Create(ctx *middleware.Context) {	ctx.Data["Title"] = ctx.Tr("new_repo")	// Give default value for template to render.	ctx.Data["Gitignores"] = models.Gitignores	ctx.Data["Licenses"] = models.Licenses	ctx.Data["Readmes"] = models.Readmes	ctx.Data["readme"] = "Default"	ctx.Data["private"] = ctx.User.LastRepoVisibility	ctx.Data["IsForcedPrivate"] = setting.Repository.ForcePrivate	ctxUser := checkContextUser(ctx, ctx.QueryInt64("org"))	if ctx.Written() {		return	}	ctx.Data["ContextUser"] = ctxUser	ctx.HTML(200, CREATE)}func handleCreateError(ctx *middleware.Context, owner *models.User, err error, name string, tpl base.TplName, form interface{}) {	switch {	case models.IsErrReachLimitOfRepo(err):		ctx.RenderWithErr(ctx.Tr("repo.form.reach_limit_of_creation", owner.RepoCreationNum()), tpl, form)	case models.IsErrRepoAlreadyExist(err):		ctx.Data["Err_RepoName"] = true		ctx.RenderWithErr(ctx.Tr("form.repo_name_been_taken"), tpl, form)	case models.IsErrNameReserved(err):		ctx.Data["Err_RepoName"] = true		ctx.RenderWithErr(ctx.Tr("repo.form.name_reserved", err.(models.ErrNameReserved).Name), tpl, form)	case models.IsErrNamePatternNotAllowed(err):		ctx.Data["Err_RepoName"] = true		ctx.RenderWithErr(ctx.Tr("repo.form.name_pattern_not_allowed", err.(models.ErrNamePatternNotAllowed).Pattern), tpl, form)	default:		ctx.Handle(500, name, err)	}}func CreatePost(ctx *middleware.Context, form auth.CreateRepoForm) {	ctx.Data["Title"] = ctx.Tr("new_repo")	ctx.Data["Gitignores"] = models.Gitignores	ctx.Data["Licenses"] = models.Licenses	ctx.Data["Readmes"] = models.Readmes	ctxUser := checkContextUser(ctx, form.Uid)	if ctx.Written() {		return	}	ctx.Data["ContextUser"] = ctxUser	if ctx.HasError() {		ctx.HTML(200, CREATE)		return	}	repo, err := models.CreateRepository(ctxUser, models.CreateRepoOptions{		Name:        form.RepoName,		Description: form.Description,		Gitignores:  form.Gitignores,		License:     form.License,		Readme:      form.Readme,		IsPrivate:   form.Private || setting.Repository.ForcePrivate,		AutoInit:    form.AutoInit,	})	if err == nil {		log.Trace("Repository created[%d]: %s/%s", repo.ID, ctxUser.Name, repo.Name)		ctx.Redirect(setting.AppSubUrl + "/" + ctxUser.Name + "/" + repo.Name)		return	}	if repo != nil {		if errDelete := models.DeleteRepository(ctxUser.Id, repo.ID); errDelete != nil {			log.Error(4, "DeleteRepository: %v", errDelete)		}	}	handleCreateError(ctx, ctxUser, err, "CreatePost", CREATE, &form)}func Migrate(ctx *middleware.Context) {	ctx.Data["Title"] = ctx.Tr("new_migrate")	ctx.Data["private"] = ctx.User.LastRepoVisibility	ctx.Data["IsForcedPrivate"] = setting.Repository.ForcePrivate	ctx.Data["mirror"] = ctx.Query("mirror") == "1"	ctxUser := checkContextUser(ctx, ctx.QueryInt64("org"))	if ctx.Written() {		return	}	ctx.Data["ContextUser"] = ctxUser	ctx.HTML(200, MIGRATE)}func MigratePost(ctx *middleware.Context, form auth.MigrateRepoForm) {	ctx.Data["Title"] = ctx.Tr("new_migrate")	ctxUser := checkContextUser(ctx, form.Uid)	if ctx.Written() {		return	}	ctx.Data["ContextUser"] = ctxUser	if ctx.HasError() {		ctx.HTML(200, MIGRATE)		return	}	remoteAddr, err := form.ParseRemoteAddr(ctx.User)	if err != nil {		if models.IsErrInvalidCloneAddr(err) {			ctx.Data["Err_CloneAddr"] = true			addrErr := err.(models.ErrInvalidCloneAddr)			switch {			case addrErr.IsURLError:				ctx.RenderWithErr(ctx.Tr("form.url_error"), MIGRATE, &form)			case addrErr.IsPermissionDenied:				ctx.RenderWithErr(ctx.Tr("repo.migrate.permission_denied"), MIGRATE, &form)			case addrErr.IsInvalidPath:				ctx.RenderWithErr(ctx.Tr("repo.migrate.invalid_local_path"), MIGRATE, &form)			default:				ctx.Handle(500, "Unknown error", err)			}		} else {			ctx.Handle(500, "ParseRemoteAddr", err)		}		return	}	repo, err := models.MigrateRepository(ctxUser, models.MigrateRepoOptions{		Name:        form.RepoName,		Description: form.Description,		IsPrivate:   form.Private || setting.Repository.ForcePrivate,		IsMirror:    form.Mirror,		RemoteAddr:  remoteAddr,	})	if err == nil {		log.Trace("Repository migrated [%d]: %s/%s", repo.ID, ctxUser.Name, form.RepoName)		ctx.Redirect(setting.AppSubUrl + "/" + ctxUser.Name + "/" + form.RepoName)		return	}	if repo != nil {		if errDelete := models.DeleteRepository(ctxUser.Id, repo.ID); errDelete != nil {			log.Error(4, "DeleteRepository: %v", errDelete)		}	}	if strings.Contains(err.Error(), "Authentication failed") ||		strings.Contains(err.Error(), "could not read Username") {		ctx.Data["Err_Auth"] = true		ctx.RenderWithErr(ctx.Tr("form.auth_failed", models.HandleCloneUserCredentials(err.Error(), true)), MIGRATE, &form)		return	} else if strings.Contains(err.Error(), "fatal:") {		ctx.Data["Err_CloneAddr"] = true		ctx.RenderWithErr(ctx.Tr("repo.migrate.failed", models.HandleCloneUserCredentials(err.Error(), true)), MIGRATE, &form)		return	}	handleCreateError(ctx, ctxUser, err, "MigratePost", MIGRATE, &form)}func Action(ctx *middleware.Context) {	var err error	switch ctx.Params(":action") {	case "watch":		err = models.WatchRepo(ctx.User.Id, ctx.Repo.Repository.ID, true)	case "unwatch":		err = models.WatchRepo(ctx.User.Id, ctx.Repo.Repository.ID, false)	case "star":		err = models.StarRepo(ctx.User.Id, ctx.Repo.Repository.ID, true)	case "unstar":		err = models.StarRepo(ctx.User.Id, ctx.Repo.Repository.ID, false)	case "desc":		if !ctx.Repo.IsOwner() {			ctx.Error(404)			return		}		ctx.Repo.Repository.Description = ctx.Query("desc")		ctx.Repo.Repository.Website = ctx.Query("site")		err = models.UpdateRepository(ctx.Repo.Repository, false)	}	if err != nil {		log.Error(4, "Action(%s): %v", ctx.Params(":action"), err)		ctx.JSON(200, map[string]interface{}{			"ok":  false,			"err": err.Error(),		})		return	}	redirectTo := ctx.Query("redirect_to")	if len(redirectTo) == 0 {		redirectTo = ctx.Repo.RepoLink	}	ctx.Redirect(redirectTo)}func Download(ctx *middleware.Context) {	var (		uri         = ctx.Params("*")		refName     string		ext         string		archivePath string		archiveType git.ArchiveType	)	switch {	case strings.HasSuffix(uri, ".zip"):		ext = ".zip"		archivePath = path.Join(ctx.Repo.GitRepo.Path, "archives/zip")		archiveType = git.ZIP	case strings.HasSuffix(uri, ".tar.gz"):		ext = ".tar.gz"		archivePath = path.Join(ctx.Repo.GitRepo.Path, "archives/targz")		archiveType = git.TARGZ	default:		log.Trace("Unknown format: %s", uri)		ctx.Error(404)		return	}	refName = strings.TrimSuffix(uri, ext)	if !com.IsDir(archivePath) {		if err := os.MkdirAll(archivePath, os.ModePerm); err != nil {			ctx.Handle(500, "Download -> os.MkdirAll(archivePath)", err)			return		}	}	// Get corresponding commit.	var (		commit *git.Commit		err    error	)	gitRepo := ctx.Repo.GitRepo	if gitRepo.IsBranchExist(refName) {		commit, err = gitRepo.GetBranchCommit(refName)		if err != nil {			ctx.Handle(500, "GetBranchCommit", err)			return		}	} else if gitRepo.IsTagExist(refName) {		commit, err = gitRepo.GetTagCommit(refName)		if err != nil {			ctx.Handle(500, "GetTagCommit", err)			return		}	} else if len(refName) == 40 {		commit, err = gitRepo.GetCommit(refName)		if err != nil {			ctx.Handle(404, "GetCommit", nil)			return		}	} else {		ctx.Handle(404, "Download", nil)		return	}	archivePath = path.Join(archivePath, base.ShortSha(commit.ID.String())+ext)	if !com.IsFile(archivePath) {		if err := commit.CreateArchive(archivePath, archiveType); err != nil {			ctx.Handle(500, "Download -> CreateArchive "+archivePath, err)			return		}	}	ctx.ServeFile(archivePath, ctx.Repo.Repository.Name+"-"+base.ShortSha(commit.ID.String())+ext)}
 |