diff options
author | Unknwon <u@gogs.io> | 2019-10-24 01:51:46 -0700 |
---|---|---|
committer | GitHub <noreply@github.com> | 2019-10-24 01:51:46 -0700 |
commit | 01c8df01ec0608f1f25b2f1444adabb98fa5ee8a (patch) | |
tree | f8a7e5dd8d2a8c51e1ce2cabb9d33571a93314dd /routes/api/v1/repo/repo.go | |
parent | 613139e7bef81d3573e7988a47eb6765f3de347a (diff) |
internal: move packages under this directory (#5836)
* Rename pkg -> internal
* Rename routes -> route
* Move route -> internal/route
* Rename models -> db
* Move db -> internal/db
* Fix route2 -> route
* Move cmd -> internal/cmd
* Bump version
Diffstat (limited to 'routes/api/v1/repo/repo.go')
-rw-r--r-- | routes/api/v1/repo/repo.go | 407 |
1 files changed, 0 insertions, 407 deletions
diff --git a/routes/api/v1/repo/repo.go b/routes/api/v1/repo/repo.go deleted file mode 100644 index 67623ffa..00000000 --- a/routes/api/v1/repo/repo.go +++ /dev/null @@ -1,407 +0,0 @@ -// Copyright 2014 The Gogs Authors. All rights reserved. -// Use of this source code is governed by a MIT-style -// license that can be found in the LICENSE file. - -package repo - -import ( - "fmt" - "net/http" - "path" - - log "gopkg.in/clog.v1" - - api "github.com/gogs/go-gogs-client" - - "gogs.io/gogs/models" - "gogs.io/gogs/models/errors" - "gogs.io/gogs/pkg/context" - "gogs.io/gogs/pkg/form" - "gogs.io/gogs/pkg/setting" - "gogs.io/gogs/routes/api/v1/convert" -) - -func Search(c *context.APIContext) { - opts := &models.SearchRepoOptions{ - Keyword: path.Base(c.Query("q")), - OwnerID: c.QueryInt64("uid"), - PageSize: convert.ToCorrectPageSize(c.QueryInt("limit")), - Page: c.QueryInt("page"), - } - - // Check visibility. - if c.IsLogged && opts.OwnerID > 0 { - if c.User.ID == opts.OwnerID { - opts.Private = true - } else { - u, err := models.GetUserByID(opts.OwnerID) - if err != nil { - c.JSON(http.StatusInternalServerError, map[string]interface{}{ - "ok": false, - "error": err.Error(), - }) - return - } - if u.IsOrganization() && u.IsOwnedBy(c.User.ID) { - opts.Private = true - } - // FIXME: how about collaborators? - } - } - - repos, count, err := models.SearchRepositoryByName(opts) - if err != nil { - c.JSON(http.StatusInternalServerError, map[string]interface{}{ - "ok": false, - "error": err.Error(), - }) - return - } - - if err = models.RepositoryList(repos).LoadAttributes(); err != nil { - c.JSON(http.StatusInternalServerError, map[string]interface{}{ - "ok": false, - "error": err.Error(), - }) - return - } - - results := make([]*api.Repository, len(repos)) - for i := range repos { - results[i] = repos[i].APIFormat(nil) - } - - c.SetLinkHeader(int(count), opts.PageSize) - c.JSONSuccess(map[string]interface{}{ - "ok": true, - "data": results, - }) -} - -func listUserRepositories(c *context.APIContext, username string) { - user, err := models.GetUserByName(username) - if err != nil { - c.NotFoundOrServerError("GetUserByName", errors.IsUserNotExist, err) - return - } - - // Only list public repositories if user requests someone else's repository list, - // or an organization isn't a member of. - var ownRepos []*models.Repository - if user.IsOrganization() { - ownRepos, _, err = user.GetUserRepositories(c.User.ID, 1, user.NumRepos) - } else { - ownRepos, err = models.GetUserRepositories(&models.UserRepoOptions{ - UserID: user.ID, - Private: c.User.ID == user.ID, - Page: 1, - PageSize: user.NumRepos, - }) - } - if err != nil { - c.ServerError("GetUserRepositories", err) - return - } - - if err = models.RepositoryList(ownRepos).LoadAttributes(); err != nil { - c.ServerError("LoadAttributes(ownRepos)", err) - return - } - - // Early return for querying other user's repositories - if c.User.ID != user.ID { - repos := make([]*api.Repository, len(ownRepos)) - for i := range ownRepos { - repos[i] = ownRepos[i].APIFormat(&api.Permission{true, true, true}) - } - c.JSONSuccess(&repos) - return - } - - accessibleRepos, err := user.GetRepositoryAccesses() - if err != nil { - c.ServerError("GetRepositoryAccesses", err) - return - } - - numOwnRepos := len(ownRepos) - repos := make([]*api.Repository, numOwnRepos+len(accessibleRepos)) - for i := range ownRepos { - repos[i] = ownRepos[i].APIFormat(&api.Permission{true, true, true}) - } - - i := numOwnRepos - for repo, access := range accessibleRepos { - repos[i] = repo.APIFormat(&api.Permission{ - Admin: access >= models.ACCESS_MODE_ADMIN, - Push: access >= models.ACCESS_MODE_WRITE, - Pull: true, - }) - i++ - } - - c.JSONSuccess(&repos) -} - -func ListMyRepos(c *context.APIContext) { - listUserRepositories(c, c.User.Name) -} - -func ListUserRepositories(c *context.APIContext) { - listUserRepositories(c, c.Params(":username")) -} - -func ListOrgRepositories(c *context.APIContext) { - listUserRepositories(c, c.Params(":org")) -} - -func CreateUserRepo(c *context.APIContext, owner *models.User, opt api.CreateRepoOption) { - repo, err := models.CreateRepository(c.User, owner, models.CreateRepoOptions{ - Name: opt.Name, - Description: opt.Description, - Gitignores: opt.Gitignores, - License: opt.License, - Readme: opt.Readme, - IsPrivate: opt.Private, - AutoInit: opt.AutoInit, - }) - if err != nil { - if models.IsErrRepoAlreadyExist(err) || - models.IsErrNameReserved(err) || - models.IsErrNamePatternNotAllowed(err) { - c.Error(http.StatusUnprocessableEntity, "", err) - } else { - if repo != nil { - if err = models.DeleteRepository(c.User.ID, repo.ID); err != nil { - log.Error(2, "DeleteRepository: %v", err) - } - } - c.ServerError("CreateRepository", err) - } - return - } - - c.JSON(201, repo.APIFormat(&api.Permission{true, true, true})) -} - -func Create(c *context.APIContext, opt api.CreateRepoOption) { - // Shouldn't reach this condition, but just in case. - if c.User.IsOrganization() { - c.Error(http.StatusUnprocessableEntity, "", "not allowed creating repository for organization") - return - } - CreateUserRepo(c, c.User, opt) -} - -func CreateOrgRepo(c *context.APIContext, opt api.CreateRepoOption) { - org, err := models.GetOrgByName(c.Params(":org")) - if err != nil { - c.NotFoundOrServerError("GetOrgByName", errors.IsUserNotExist, err) - return - } - - if !org.IsOwnedBy(c.User.ID) { - c.Error(http.StatusForbidden, "", "given user is not owner of organization") - return - } - CreateUserRepo(c, org, opt) -} - -func Migrate(c *context.APIContext, f form.MigrateRepo) { - ctxUser := c.User - // Not equal means context user is an organization, - // or is another user/organization if current user is admin. - if f.Uid != ctxUser.ID { - org, err := models.GetUserByID(f.Uid) - if err != nil { - if errors.IsUserNotExist(err) { - c.Error(http.StatusUnprocessableEntity, "", err) - } else { - c.Error(http.StatusInternalServerError, "GetUserByID", err) - } - return - } else if !org.IsOrganization() && !c.User.IsAdmin { - c.Error(http.StatusForbidden, "", "given user is not an organization") - return - } - ctxUser = org - } - - if c.HasError() { - c.Error(http.StatusUnprocessableEntity, "", c.GetErrMsg()) - return - } - - if ctxUser.IsOrganization() && !c.User.IsAdmin { - // Check ownership of organization. - if !ctxUser.IsOwnedBy(c.User.ID) { - c.Error(http.StatusForbidden, "", "Given user is not owner of organization") - return - } - } - - remoteAddr, err := f.ParseRemoteAddr(c.User) - if err != nil { - if models.IsErrInvalidCloneAddr(err) { - addrErr := err.(models.ErrInvalidCloneAddr) - switch { - case addrErr.IsURLError: - c.Error(http.StatusUnprocessableEntity, "", err) - case addrErr.IsPermissionDenied: - c.Error(http.StatusUnprocessableEntity, "", "you are not allowed to import local repositories") - case addrErr.IsInvalidPath: - c.Error(http.StatusUnprocessableEntity, "", "invalid local path, it does not exist or not a directory") - default: - c.ServerError("ParseRemoteAddr", fmt.Errorf("unknown error type (ErrInvalidCloneAddr): %v", err)) - } - } else { - c.ServerError("ParseRemoteAddr", err) - } - return - } - - repo, err := models.MigrateRepository(c.User, ctxUser, models.MigrateRepoOptions{ - Name: f.RepoName, - Description: f.Description, - IsPrivate: f.Private || setting.Repository.ForcePrivate, - IsMirror: f.Mirror, - RemoteAddr: remoteAddr, - }) - if err != nil { - if repo != nil { - if errDelete := models.DeleteRepository(ctxUser.ID, repo.ID); errDelete != nil { - log.Error(2, "DeleteRepository: %v", errDelete) - } - } - - if errors.IsReachLimitOfRepo(err) { - c.Error(http.StatusUnprocessableEntity, "", err) - } else { - c.ServerError("MigrateRepository", errors.New(models.HandleMirrorCredentials(err.Error(), true))) - } - return - } - - log.Trace("Repository migrated: %s/%s", ctxUser.Name, f.RepoName) - c.JSON(201, repo.APIFormat(&api.Permission{true, true, true})) -} - -// FIXME: inject in the handler chain -func parseOwnerAndRepo(c *context.APIContext) (*models.User, *models.Repository) { - owner, err := models.GetUserByName(c.Params(":username")) - if err != nil { - if errors.IsUserNotExist(err) { - c.Error(http.StatusUnprocessableEntity, "", err) - } else { - c.ServerError("GetUserByName", err) - } - return nil, nil - } - - repo, err := models.GetRepositoryByName(owner.ID, c.Params(":reponame")) - if err != nil { - c.NotFoundOrServerError("GetRepositoryByName", errors.IsRepoNotExist, err) - return nil, nil - } - - return owner, repo -} - -func Get(c *context.APIContext) { - _, repo := parseOwnerAndRepo(c) - if c.Written() { - return - } - - c.JSONSuccess(repo.APIFormat(&api.Permission{ - Admin: c.Repo.IsAdmin(), - Push: c.Repo.IsWriter(), - Pull: true, - })) -} - -func Delete(c *context.APIContext) { - owner, repo := parseOwnerAndRepo(c) - if c.Written() { - return - } - - if owner.IsOrganization() && !owner.IsOwnedBy(c.User.ID) { - c.Error(http.StatusForbidden, "", "given user is not owner of organization") - return - } - - if err := models.DeleteRepository(owner.ID, repo.ID); err != nil { - c.ServerError("DeleteRepository", err) - return - } - - log.Trace("Repository deleted: %s/%s", owner.Name, repo.Name) - c.NoContent() -} - -func ListForks(c *context.APIContext) { - forks, err := c.Repo.Repository.GetForks() - if err != nil { - c.ServerError("GetForks", err) - return - } - - apiForks := make([]*api.Repository, len(forks)) - for i := range forks { - if err := forks[i].GetOwner(); err != nil { - c.ServerError("GetOwner", err) - return - } - apiForks[i] = forks[i].APIFormat(&api.Permission{ - Admin: c.User.IsAdminOfRepo(forks[i]), - Push: c.User.IsWriterOfRepo(forks[i]), - Pull: true, - }) - } - - c.JSONSuccess(&apiForks) -} - -func IssueTracker(c *context.APIContext, form api.EditIssueTrackerOption) { - _, repo := parseOwnerAndRepo(c) - if c.Written() { - return - } - - if form.EnableIssues != nil { - repo.EnableIssues = *form.EnableIssues - } - if form.EnableExternalTracker != nil { - repo.EnableExternalTracker = *form.EnableExternalTracker - } - if form.ExternalTrackerURL != nil { - repo.ExternalTrackerURL = *form.ExternalTrackerURL - } - if form.TrackerURLFormat != nil { - repo.ExternalTrackerFormat = *form.TrackerURLFormat - } - if form.TrackerIssueStyle != nil { - repo.ExternalTrackerStyle = *form.TrackerIssueStyle - } - - if err := models.UpdateRepository(repo, false); err != nil { - c.ServerError("UpdateRepository", err) - return - } - - c.NoContent() -} - -func MirrorSync(c *context.APIContext) { - _, repo := parseOwnerAndRepo(c) - if c.Written() { - return - } else if !repo.IsMirror { - c.NotFound() - return - } - - go models.MirrorQueue.Add(repo.ID) - c.Status(http.StatusAccepted) -} |