aboutsummaryrefslogtreecommitdiff
path: root/pkg/context
diff options
context:
space:
mode:
Diffstat (limited to 'pkg/context')
-rw-r--r--pkg/context/api.go73
-rw-r--r--pkg/context/api_org.go14
-rw-r--r--pkg/context/auth.go94
-rw-r--r--pkg/context/context.go222
-rw-r--r--pkg/context/org.go150
-rw-r--r--pkg/context/repo.go486
6 files changed, 1039 insertions, 0 deletions
diff --git a/pkg/context/api.go b/pkg/context/api.go
new file mode 100644
index 00000000..a1c80bd1
--- /dev/null
+++ b/pkg/context/api.go
@@ -0,0 +1,73 @@
+// Copyright 2016 The Gogs Authors. All rights reserved.
+// Use of this source code is governed by a MIT-style
+// license that can be found in the LICENSE file.
+
+package context
+
+import (
+ "fmt"
+ "strings"
+
+ "github.com/Unknwon/paginater"
+ log "gopkg.in/clog.v1"
+ "gopkg.in/macaron.v1"
+
+ "github.com/gogits/gogs/pkg/base"
+ "github.com/gogits/gogs/pkg/setting"
+)
+
+type APIContext struct {
+ *Context
+ Org *APIOrganization
+}
+
+// Error responses error message to client with given message.
+// If status is 500, also it prints error to log.
+func (ctx *APIContext) Error(status int, title string, obj interface{}) {
+ var message string
+ if err, ok := obj.(error); ok {
+ message = err.Error()
+ } else {
+ message = obj.(string)
+ }
+
+ if status == 500 {
+ log.Error(3, "%s: %s", title, message)
+ }
+
+ ctx.JSON(status, map[string]string{
+ "message": message,
+ "url": base.DOC_URL,
+ })
+}
+
+// SetLinkHeader sets pagination link header by given totol number and page size.
+func (ctx *APIContext) SetLinkHeader(total, pageSize int) {
+ page := paginater.New(total, pageSize, ctx.QueryInt("page"), 0)
+ links := make([]string, 0, 4)
+ if page.HasNext() {
+ links = append(links, fmt.Sprintf("<%s%s?page=%d>; rel=\"next\"", setting.AppUrl, ctx.Req.URL.Path[1:], page.Next()))
+ }
+ if !page.IsLast() {
+ links = append(links, fmt.Sprintf("<%s%s?page=%d>; rel=\"last\"", setting.AppUrl, ctx.Req.URL.Path[1:], page.TotalPages()))
+ }
+ if !page.IsFirst() {
+ links = append(links, fmt.Sprintf("<%s%s?page=1>; rel=\"first\"", setting.AppUrl, ctx.Req.URL.Path[1:]))
+ }
+ if page.HasPrevious() {
+ links = append(links, fmt.Sprintf("<%s%s?page=%d>; rel=\"prev\"", setting.AppUrl, ctx.Req.URL.Path[1:], page.Previous()))
+ }
+
+ if len(links) > 0 {
+ ctx.Header().Set("Link", strings.Join(links, ","))
+ }
+}
+
+func APIContexter() macaron.Handler {
+ return func(c *Context) {
+ ctx := &APIContext{
+ Context: c,
+ }
+ c.Map(ctx)
+ }
+}
diff --git a/pkg/context/api_org.go b/pkg/context/api_org.go
new file mode 100644
index 00000000..ecf60a19
--- /dev/null
+++ b/pkg/context/api_org.go
@@ -0,0 +1,14 @@
+// Copyright 2016 The Gogs Authors. All rights reserved.
+// Use of this source code is governed by a MIT-style
+// license that can be found in the LICENSE file.
+
+package context
+
+import (
+ "github.com/gogits/gogs/models"
+)
+
+type APIOrganization struct {
+ Organization *models.User
+ Team *models.Team
+}
diff --git a/pkg/context/auth.go b/pkg/context/auth.go
new file mode 100644
index 00000000..642a320b
--- /dev/null
+++ b/pkg/context/auth.go
@@ -0,0 +1,94 @@
+// Copyright 2014 The Gogs Authors. All rights reserved.
+// Use of this source code is governed by a MIT-style
+// license that can be found in the LICENSE file.
+
+package context
+
+import (
+ "net/url"
+
+ "github.com/go-macaron/csrf"
+ "gopkg.in/macaron.v1"
+
+ "github.com/gogits/gogs/pkg/auth"
+ "github.com/gogits/gogs/pkg/setting"
+)
+
+type ToggleOptions struct {
+ SignInRequired bool
+ SignOutRequired bool
+ AdminRequired bool
+ DisableCSRF bool
+}
+
+func Toggle(options *ToggleOptions) macaron.Handler {
+ return func(ctx *Context) {
+ // Cannot view any page before installation.
+ if !setting.InstallLock {
+ ctx.Redirect(setting.AppSubUrl + "/install")
+ return
+ }
+
+ // Check prohibit login users.
+ if ctx.IsSigned && ctx.User.ProhibitLogin {
+ ctx.Data["Title"] = ctx.Tr("auth.prohibit_login")
+ ctx.HTML(200, "user/auth/prohibit_login")
+ return
+ }
+
+ // Check non-logged users landing page.
+ if !ctx.IsSigned && ctx.Req.RequestURI == "/" && setting.LandingPageURL != setting.LANDING_PAGE_HOME {
+ ctx.Redirect(setting.AppSubUrl + string(setting.LandingPageURL))
+ return
+ }
+
+ // Redirect to dashboard if user tries to visit any non-login page.
+ if options.SignOutRequired && ctx.IsSigned && ctx.Req.RequestURI != "/" {
+ ctx.Redirect(setting.AppSubUrl + "/")
+ return
+ }
+
+ if !options.SignOutRequired && !options.DisableCSRF && ctx.Req.Method == "POST" && !auth.IsAPIPath(ctx.Req.URL.Path) {
+ csrf.Validate(ctx.Context, ctx.csrf)
+ if ctx.Written() {
+ return
+ }
+ }
+
+ if options.SignInRequired {
+ if !ctx.IsSigned {
+ // Restrict API calls with error message.
+ if auth.IsAPIPath(ctx.Req.URL.Path) {
+ ctx.JSON(403, map[string]string{
+ "message": "Only signed in user is allowed to call APIs.",
+ })
+ return
+ }
+
+ ctx.SetCookie("redirect_to", url.QueryEscape(setting.AppSubUrl+ctx.Req.RequestURI), 0, setting.AppSubUrl)
+ ctx.Redirect(setting.AppSubUrl + "/user/login")
+ return
+ } else if !ctx.User.IsActive && setting.Service.RegisterEmailConfirm {
+ ctx.Data["Title"] = ctx.Tr("auth.active_your_account")
+ ctx.HTML(200, "user/auth/activate")
+ return
+ }
+ }
+
+ // Redirect to log in page if auto-signin info is provided and has not signed in.
+ if !options.SignOutRequired && !ctx.IsSigned && !auth.IsAPIPath(ctx.Req.URL.Path) &&
+ len(ctx.GetCookie(setting.CookieUserName)) > 0 {
+ ctx.SetCookie("redirect_to", url.QueryEscape(setting.AppSubUrl+ctx.Req.RequestURI), 0, setting.AppSubUrl)
+ ctx.Redirect(setting.AppSubUrl + "/user/login")
+ return
+ }
+
+ if options.AdminRequired {
+ if !ctx.User.IsAdmin {
+ ctx.Error(403)
+ return
+ }
+ ctx.Data["PageIsAdmin"] = true
+ }
+ }
+}
diff --git a/pkg/context/context.go b/pkg/context/context.go
new file mode 100644
index 00000000..b3377833
--- /dev/null
+++ b/pkg/context/context.go
@@ -0,0 +1,222 @@
+// Copyright 2014 The Gogs Authors. All rights reserved.
+// Use of this source code is governed by a MIT-style
+// license that can be found in the LICENSE file.
+
+package context
+
+import (
+ "fmt"
+ "html/template"
+ "io"
+ "net/http"
+ "strings"
+ "time"
+
+ "github.com/go-macaron/cache"
+ "github.com/go-macaron/csrf"
+ "github.com/go-macaron/i18n"
+ "github.com/go-macaron/session"
+ log "gopkg.in/clog.v1"
+ "gopkg.in/macaron.v1"
+
+ "github.com/gogits/gogs/models"
+ "github.com/gogits/gogs/pkg/auth"
+ "github.com/gogits/gogs/pkg/base"
+ "github.com/gogits/gogs/pkg/form"
+ "github.com/gogits/gogs/pkg/setting"
+)
+
+// Context represents context of a request.
+type Context struct {
+ *macaron.Context
+ Cache cache.Cache
+ csrf csrf.CSRF
+ Flash *session.Flash
+ Session session.Store
+
+ User *models.User
+ IsSigned bool
+ IsBasicAuth bool
+
+ Repo *Repository
+ Org *Organization
+}
+
+func (ctx *Context) UserID() int64 {
+ if !ctx.IsSigned {
+ return 0
+ }
+ return ctx.User.ID
+}
+
+// HasError returns true if error occurs in form validation.
+func (ctx *Context) HasApiError() bool {
+ hasErr, ok := ctx.Data["HasError"]
+ if !ok {
+ return false
+ }
+ return hasErr.(bool)
+}
+
+func (ctx *Context) GetErrMsg() string {
+ return ctx.Data["ErrorMsg"].(string)
+}
+
+// HasError returns true if error occurs in form validation.
+func (ctx *Context) HasError() bool {
+ hasErr, ok := ctx.Data["HasError"]
+ if !ok {
+ return false
+ }
+ ctx.Flash.ErrorMsg = ctx.Data["ErrorMsg"].(string)
+ ctx.Data["Flash"] = ctx.Flash
+ return hasErr.(bool)
+}
+
+// HasValue returns true if value of given name exists.
+func (ctx *Context) HasValue(name string) bool {
+ _, ok := ctx.Data[name]
+ return ok
+}
+
+// HTML responses template with given status.
+func (ctx *Context) HTML(status int, name base.TplName) {
+ log.Trace("Template: %s", name)
+ ctx.Context.HTML(status, string(name))
+}
+
+// Success responses template with status http.StatusOK.
+func (c *Context) Success(name base.TplName) {
+ c.HTML(http.StatusOK, name)
+}
+
+// RenderWithErr used for page has form validation but need to prompt error to users.
+func (ctx *Context) RenderWithErr(msg string, tpl base.TplName, f interface{}) {
+ if f != nil {
+ form.Assign(f, ctx.Data)
+ }
+ ctx.Flash.ErrorMsg = msg
+ ctx.Data["Flash"] = ctx.Flash
+ ctx.HTML(http.StatusOK, tpl)
+}
+
+// Handle handles and logs error by given status.
+func (ctx *Context) Handle(status int, title string, err error) {
+ switch status {
+ case http.StatusNotFound:
+ ctx.Data["Title"] = "Page Not Found"
+ case http.StatusInternalServerError:
+ ctx.Data["Title"] = "Internal Server Error"
+ log.Error(2, "%s: %v", title, err)
+ if !setting.ProdMode || (ctx.IsSigned && ctx.User.IsAdmin) {
+ ctx.Data["ErrorMsg"] = err
+ }
+ }
+ ctx.HTML(status, base.TplName(fmt.Sprintf("status/%d", status)))
+}
+
+// NotFound renders the 404 page.
+func (ctx *Context) NotFound() {
+ ctx.Handle(http.StatusNotFound, "", nil)
+}
+
+// ServerError renders the 500 page.
+func (c *Context) ServerError(title string, err error) {
+ c.Handle(http.StatusInternalServerError, title, err)
+}
+
+// NotFoundOrServerError use error check function to determine if the error
+// is about not found. It responses with 404 status code for not found error,
+// or error context description for logging purpose of 500 server error.
+func (c *Context) NotFoundOrServerError(title string, errck func(error) bool, err error) {
+ if errck(err) {
+ c.NotFound()
+ return
+ }
+ c.ServerError(title, err)
+}
+
+func (ctx *Context) HandleText(status int, title string) {
+ ctx.PlainText(status, []byte(title))
+}
+
+func (ctx *Context) ServeContent(name string, r io.ReadSeeker, params ...interface{}) {
+ modtime := time.Now()
+ for _, p := range params {
+ switch v := p.(type) {
+ case time.Time:
+ modtime = v
+ }
+ }
+ ctx.Resp.Header().Set("Content-Description", "File Transfer")
+ ctx.Resp.Header().Set("Content-Type", "application/octet-stream")
+ ctx.Resp.Header().Set("Content-Disposition", "attachment; filename="+name)
+ ctx.Resp.Header().Set("Content-Transfer-Encoding", "binary")
+ ctx.Resp.Header().Set("Expires", "0")
+ ctx.Resp.Header().Set("Cache-Control", "must-revalidate")
+ ctx.Resp.Header().Set("Pragma", "public")
+ http.ServeContent(ctx.Resp, ctx.Req.Request, name, modtime, r)
+}
+
+// Contexter initializes a classic context for a request.
+func Contexter() macaron.Handler {
+ return func(c *macaron.Context, l i18n.Locale, cache cache.Cache, sess session.Store, f *session.Flash, x csrf.CSRF) {
+ ctx := &Context{
+ Context: c,
+ Cache: cache,
+ csrf: x,
+ Flash: f,
+ Session: sess,
+ Repo: &Repository{
+ PullRequest: &PullRequest{},
+ },
+ Org: &Organization{},
+ }
+
+ if len(setting.HTTP.AccessControlAllowOrigin) > 0 {
+ ctx.Header().Set("Access-Control-Allow-Origin", setting.HTTP.AccessControlAllowOrigin)
+ ctx.Header().Set("'Access-Control-Allow-Credentials' ", "true")
+ ctx.Header().Set("Access-Control-Max-Age", "3600")
+ ctx.Header().Set("Access-Control-Allow-Headers", "Content-Type, Access-Control-Allow-Headers, Authorization, X-Requested-With")
+ }
+
+ // Compute current URL for real-time change language.
+ ctx.Data["Link"] = setting.AppSubUrl + strings.TrimSuffix(ctx.Req.URL.Path, "/")
+
+ ctx.Data["PageStartTime"] = time.Now()
+
+ // Get user from session if logined.
+ ctx.User, ctx.IsBasicAuth = auth.SignedInUser(ctx.Context, ctx.Session)
+
+ if ctx.User != nil {
+ ctx.IsSigned = true
+ ctx.Data["IsSigned"] = ctx.IsSigned
+ ctx.Data["SignedUser"] = ctx.User
+ ctx.Data["SignedUserID"] = ctx.User.ID
+ ctx.Data["SignedUserName"] = ctx.User.Name
+ ctx.Data["IsAdmin"] = ctx.User.IsAdmin
+ } else {
+ ctx.Data["SignedUserID"] = 0
+ ctx.Data["SignedUserName"] = ""
+ }
+
+ // If request sends files, parse them here otherwise the Query() can't be parsed and the CsrfToken will be invalid.
+ if ctx.Req.Method == "POST" && strings.Contains(ctx.Req.Header.Get("Content-Type"), "multipart/form-data") {
+ if err := ctx.Req.ParseMultipartForm(setting.AttachmentMaxSize << 20); err != nil && !strings.Contains(err.Error(), "EOF") { // 32MB max size
+ ctx.Handle(500, "ParseMultipartForm", err)
+ return
+ }
+ }
+
+ ctx.Data["CsrfToken"] = x.GetToken()
+ ctx.Data["CsrfTokenHtml"] = template.HTML(`<input type="hidden" name="_csrf" value="` + x.GetToken() + `">`)
+ log.Trace("Session ID: %s", sess.ID())
+ log.Trace("CSRF Token: %v", ctx.Data["CsrfToken"])
+
+ ctx.Data["ShowRegistrationButton"] = setting.Service.ShowRegistrationButton
+ ctx.Data["ShowFooterBranding"] = setting.ShowFooterBranding
+ ctx.Data["ShowFooterVersion"] = setting.ShowFooterVersion
+
+ c.Map(ctx)
+ }
+}
diff --git a/pkg/context/org.go b/pkg/context/org.go
new file mode 100644
index 00000000..55c2ed04
--- /dev/null
+++ b/pkg/context/org.go
@@ -0,0 +1,150 @@
+// Copyright 2014 The Gogs Authors. All rights reserved.
+// Use of this source code is governed by a MIT-style
+// license that can be found in the LICENSE file.
+
+package context
+
+import (
+ "strings"
+
+ "gopkg.in/macaron.v1"
+
+ "github.com/gogits/gogs/models"
+ "github.com/gogits/gogs/models/errors"
+ "github.com/gogits/gogs/pkg/setting"
+)
+
+type Organization struct {
+ IsOwner bool
+ IsMember bool
+ IsTeamMember bool // Is member of team.
+ IsTeamAdmin bool // In owner team or team that has admin permission level.
+ Organization *models.User
+ OrgLink string
+
+ Team *models.Team
+}
+
+func HandleOrgAssignment(ctx *Context, args ...bool) {
+ var (
+ requireMember bool
+ requireOwner bool
+ requireTeamMember bool
+ requireTeamAdmin bool
+ )
+ if len(args) >= 1 {
+ requireMember = args[0]
+ }
+ if len(args) >= 2 {
+ requireOwner = args[1]
+ }
+ if len(args) >= 3 {
+ requireTeamMember = args[2]
+ }
+ if len(args) >= 4 {
+ requireTeamAdmin = args[3]
+ }
+
+ orgName := ctx.Params(":org")
+
+ var err error
+ ctx.Org.Organization, err = models.GetUserByName(orgName)
+ if err != nil {
+ ctx.NotFoundOrServerError("GetUserByName", errors.IsUserNotExist, err)
+ return
+ }
+ org := ctx.Org.Organization
+ ctx.Data["Org"] = org
+
+ // Force redirection when username is actually a user.
+ if !org.IsOrganization() {
+ ctx.Redirect("/" + org.Name)
+ return
+ }
+
+ // Admin has super access.
+ if ctx.IsSigned && ctx.User.IsAdmin {
+ ctx.Org.IsOwner = true
+ ctx.Org.IsMember = true
+ ctx.Org.IsTeamMember = true
+ ctx.Org.IsTeamAdmin = true
+ } else if ctx.IsSigned {
+ ctx.Org.IsOwner = org.IsOwnedBy(ctx.User.ID)
+ if ctx.Org.IsOwner {
+ ctx.Org.IsMember = true
+ ctx.Org.IsTeamMember = true
+ ctx.Org.IsTeamAdmin = true
+ } else {
+ if org.IsOrgMember(ctx.User.ID) {
+ ctx.Org.IsMember = true
+ }
+ }
+ } else {
+ // Fake data.
+ ctx.Data["SignedUser"] = &models.User{}
+ }
+ if (requireMember && !ctx.Org.IsMember) ||
+ (requireOwner && !ctx.Org.IsOwner) {
+ ctx.Handle(404, "OrgAssignment", err)
+ return
+ }
+ ctx.Data["IsOrganizationOwner"] = ctx.Org.IsOwner
+ ctx.Data["IsOrganizationMember"] = ctx.Org.IsMember
+
+ ctx.Org.OrgLink = setting.AppSubUrl + "/org/" + org.Name
+ ctx.Data["OrgLink"] = ctx.Org.OrgLink
+
+ // Team.
+ if ctx.Org.IsMember {
+ if ctx.Org.IsOwner {
+ if err := org.GetTeams(); err != nil {
+ ctx.Handle(500, "GetTeams", err)
+ return
+ }
+ } else {
+ org.Teams, err = org.GetUserTeams(ctx.User.ID)
+ if err != nil {
+ ctx.Handle(500, "GetUserTeams", err)
+ return
+ }
+ }
+ }
+
+ teamName := ctx.Params(":team")
+ if len(teamName) > 0 {
+ teamExists := false
+ for _, team := range org.Teams {
+ if team.LowerName == strings.ToLower(teamName) {
+ teamExists = true
+ ctx.Org.Team = team
+ ctx.Org.IsTeamMember = true
+ ctx.Data["Team"] = ctx.Org.Team
+ break
+ }
+ }
+
+ if !teamExists {
+ ctx.Handle(404, "OrgAssignment", err)
+ return
+ }
+
+ ctx.Data["IsTeamMember"] = ctx.Org.IsTeamMember
+ if requireTeamMember && !ctx.Org.IsTeamMember {
+ ctx.Handle(404, "OrgAssignment", err)
+ return
+ }
+
+ ctx.Org.IsTeamAdmin = ctx.Org.Team.IsOwnerTeam() || ctx.Org.Team.Authorize >= models.ACCESS_MODE_ADMIN
+ ctx.Data["IsTeamAdmin"] = ctx.Org.IsTeamAdmin
+ if requireTeamAdmin && !ctx.Org.IsTeamAdmin {
+ ctx.Handle(404, "OrgAssignment", err)
+ return
+ }
+ }
+}
+
+func OrgAssignment(args ...bool) macaron.Handler {
+ return func(ctx *Context) {
+ HandleOrgAssignment(ctx, args...)
+ }
+}
diff --git a/pkg/context/repo.go b/pkg/context/repo.go
new file mode 100644
index 00000000..00f0eaa1
--- /dev/null
+++ b/pkg/context/repo.go
@@ -0,0 +1,486 @@
+// Copyright 2014 The Gogs Authors. All rights reserved.
+// Use of this source code is governed by a MIT-style
+// license that can be found in the LICENSE file.
+
+package context
+
+import (
+ "fmt"
+ "io/ioutil"
+ "path"
+ "strings"
+
+ "github.com/Unknwon/com"
+ "gopkg.in/editorconfig/editorconfig-core-go.v1"
+ "gopkg.in/macaron.v1"
+
+ "github.com/gogits/git-module"
+
+ "github.com/gogits/gogs/models"
+ "github.com/gogits/gogs/models/errors"
+ "github.com/gogits/gogs/pkg/setting"
+)
+
+type PullRequest struct {
+ BaseRepo *models.Repository
+ Allowed bool
+ SameRepo bool
+ HeadInfo string // [<user>:]<branch>
+}
+
+type Repository struct {
+ AccessMode models.AccessMode
+ IsWatching bool
+ IsViewBranch bool
+ IsViewTag bool
+ IsViewCommit bool
+ Repository *models.Repository
+ Owner *models.User
+ Commit *git.Commit
+ Tag *git.Tag
+ GitRepo *git.Repository
+ BranchName string
+ TagName string
+ TreePath string
+ CommitID string
+ RepoLink string
+ CloneLink models.CloneLink
+ CommitsCount int64
+ Mirror *models.Mirror
+
+ PullRequest *PullRequest
+}
+
+// IsOwner returns true if current user is the owner of repository.
+func (r *Repository) IsOwner() bool {
+ return r.AccessMode >= models.ACCESS_MODE_OWNER
+}
+
+// IsAdmin returns true if current user has admin or higher access of repository.
+func (r *Repository) IsAdmin() bool {
+ return r.AccessMode >= models.ACCESS_MODE_ADMIN
+}
+
+// IsWriter returns true if current user has write or higher access of repository.
+func (r *Repository) IsWriter() bool {
+ return r.AccessMode >= models.ACCESS_MODE_WRITE
+}
+
+// HasAccess returns true if the current user has at least read access for this repository
+func (r *Repository) HasAccess() bool {
+ return r.AccessMode >= models.ACCESS_MODE_READ
+}
+
+// CanEnableEditor returns true if repository is editable and user has proper access level.
+func (r *Repository) CanEnableEditor() bool {
+ return r.Repository.CanEnableEditor() && r.IsViewBranch && r.IsWriter() && !r.Repository.IsBranchRequirePullRequest(r.BranchName)
+}
+
+// GetEditorconfig returns the .editorconfig definition if found in the
+// HEAD of the default repo branch.
+func (r *Repository) GetEditorconfig() (*editorconfig.Editorconfig, error) {
+ commit, err := r.GitRepo.GetBranchCommit(r.Repository.DefaultBranch)
+ if err != nil {
+ return nil, err
+ }
+ treeEntry, err := commit.GetTreeEntryByPath(".editorconfig")
+ if err != nil {
+ return nil, err
+ }
+ reader, err := treeEntry.Blob().Data()
+ if err != nil {
+ return nil, err
+ }
+ data, err := ioutil.ReadAll(reader)
+ if err != nil {
+ return nil, err
+ }
+ return editorconfig.ParseBytes(data)
+}
+
+// PullRequestURL returns URL for composing a pull request.
+// This function does not check if the repository can actually compose a pull request.
+func (r *Repository) PullRequestURL(baseBranch, headBranch string) string {
+ repoLink := r.RepoLink
+ if r.PullRequest.BaseRepo != nil {
+ repoLink = r.PullRequest.BaseRepo.Link()
+ }
+ return fmt.Sprintf("%s/compare/%s...%s:%s", repoLink, baseBranch, r.Owner.Name, headBranch)
+}
+
+// composeGoGetImport returns go-get-import meta content.
+func composeGoGetImport(owner, repo string) string {
+ return path.Join(setting.Domain, setting.AppSubUrl, owner, repo)
+}
+
+// earlyResponseForGoGetMeta responses appropriate go-get meta with status 200
+// if user does not have actual access to the requested repository,
+// or the owner or repository does not exist at all.
+// This is particular a workaround for "go get" command which does not respect
+// .netrc file.
+func earlyResponseForGoGetMeta(ctx *Context) {
+ ctx.PlainText(200, []byte(com.Expand(`<meta name="go-import" content="{GoGetImport} git {CloneLink}">`,
+ map[string]string{
+ "GoGetImport": composeGoGetImport(ctx.Params(":username"), ctx.Params(":reponame")),
+ "CloneLink": models.ComposeHTTPSCloneURL(ctx.Params(":username"), ctx.Params(":reponame")),
+ })))
+}
+
+// [0]: issues, [1]: wiki
+func RepoAssignment(pages ...bool) macaron.Handler {
+ return func(ctx *Context) {
+ var (
+ owner *models.User
+ err error
+ isIssuesPage bool
+ isWikiPage bool
+ )
+
+ if len(pages) > 0 {
+ isIssuesPage = pages[0]
+ }
+ if len(pages) > 1 {
+ isWikiPage = pages[1]
+ }
+
+ ownerName := ctx.Params(":username")
+ repoName := strings.TrimSuffix(ctx.Params(":reponame"), ".git")
+ refName := ctx.Params(":branchname")
+ if len(refName) == 0 {
+ refName = ctx.Params(":path")
+ }
+
+ // Check if the user is the same as the repository owner
+ if ctx.IsSigned && ctx.User.LowerName == strings.ToLower(ownerName) {
+ owner = ctx.User
+ } else {
+ owner, err = models.GetUserByName(ownerName)
+ if err != nil {
+ if errors.IsUserNotExist(err) {
+ if ctx.Query("go-get") == "1" {
+ earlyResponseForGoGetMeta(ctx)
+ return
+ }
+ ctx.NotFound()
+ } else {
+ ctx.Handle(500, "GetUserByName", err)
+ }
+ return
+ }
+ }
+ ctx.Repo.Owner = owner
+ ctx.Data["Username"] = ctx.Repo.Owner.Name
+
+ // Get repository.
+ repo, err := models.GetRepositoryByName(owner.ID, repoName)
+ if err != nil {
+ if errors.IsRepoNotExist(err) {
+ if ctx.Query("go-get") == "1" {
+ earlyResponseForGoGetMeta(ctx)
+ return
+ }
+ ctx.NotFound()
+ } else {
+ ctx.Handle(500, "GetRepositoryByName", err)
+ }
+ return
+ }
+
+ ctx.Repo.Repository = repo
+ ctx.Data["RepoName"] = ctx.Repo.Repository.Name
+ ctx.Data["IsBareRepo"] = ctx.Repo.Repository.IsBare
+ ctx.Repo.RepoLink = repo.Link()
+ ctx.Data["RepoLink"] = ctx.Repo.RepoLink
+ ctx.Data["RepoRelPath"] = ctx.Repo.Owner.Name + "/" + ctx.Repo.Repository.Name
+
+ // Admin has super access.
+ if ctx.IsSigned && ctx.User.IsAdmin {
+ ctx.Repo.AccessMode = models.ACCESS_MODE_OWNER
+ } else {
+ mode, err := models.AccessLevel(ctx.UserID(), repo)
+ if err != nil {
+ ctx.Handle(500, "AccessLevel", err)
+ return
+ }
+ ctx.Repo.AccessMode = mode
+ }
+
+ // Check access
+ if ctx.Repo.AccessMode == models.ACCESS_MODE_NONE {
+ if ctx.Query("go-get") == "1" {
+ earlyResponseForGoGetMeta(ctx)
+ return
+ }
+
+ // Redirect to any accessible page if not yet on it
+ if repo.IsPartialPublic() &&
+ (!(isIssuesPage || isWikiPage) ||
+ (isIssuesPage && !repo.CanGuestViewIssues()) ||
+ (isWikiPage && !repo.CanGuestViewWiki())) {
+ switch {
+ case repo.CanGuestViewIssues():
+ ctx.Redirect(repo.Link() + "/issues")
+ case repo.CanGuestViewWiki():
+ ctx.Redirect(repo.Link() + "/wiki")
+ default:
+ ctx.NotFound()
+ }
+ return
+ }
+
+ // Response 404 if user is on completely private repository or possible accessible page but owner doesn't enabled
+ if !repo.IsPartialPublic() ||
+ (isIssuesPage && !repo.CanGuestViewIssues()) ||
+ (isWikiPage && !repo.CanGuestViewWiki()) {
+ ctx.NotFound()
+ return
+ }
+
+ ctx.Repo.Repository.EnableIssues = repo.CanGuestViewIssues()
+ ctx.Repo.Repository.EnableWiki = repo.CanGuestViewWiki()
+ }
+
+ if repo.IsMirror {
+ ctx.Repo.Mirror, err = models.GetMirrorByRepoID(repo.ID)
+ if err != nil {
+ ctx.Handle(500, "GetMirror", err)
+ return
+ }
+ ctx.Data["MirrorEnablePrune"] = ctx.Repo.Mirror.EnablePrune
+ ctx.Data["MirrorInterval"] = ctx.Repo.Mirror.Interval
+ ctx.Data["Mirror"] = ctx.Repo.Mirror
+ }
+
+ gitRepo, err := git.OpenRepository(models.RepoPath(ownerName, repoName))
+ if err != nil {
+ ctx.Handle(500, "RepoAssignment Invalid repo "+models.RepoPath(ownerName, repoName), err)
+ return
+ }
+ ctx.Repo.GitRepo = gitRepo
+
+ tags, err := ctx.Repo.GitRepo.GetTags()
+ if err != nil {
+ ctx.Handle(500, fmt.Sprintf("GetTags '%s'", ctx.Repo.Repository.RepoPath()), err)
+ return
+ }
+ ctx.Data["Tags"] = tags
+ ctx.Repo.Repository.NumTags = len(tags)
+
+ ctx.Data["Title"] = owner.Name + "/" + repo.Name
+ ctx.Data["Repository"] = repo
+ ctx.Data["Owner"] = ctx.Repo.Repository.Owner
+ ctx.Data["IsRepositoryOwner"] = ctx.Repo.IsOwner()
+ ctx.Data["IsRepositoryAdmin"] = ctx.Repo.IsAdmin()
+ ctx.Data["IsRepositoryWriter"] = ctx.Repo.IsWriter()
+
+ ctx.Data["DisableSSH"] = setting.SSH.Disabled
+ ctx.Data["DisableHTTP"] = setting.Repository.DisableHTTPGit
+ ctx.Data["CloneLink"] = repo.CloneLink()
+ ctx.Data["WikiCloneLink"] = repo.WikiCloneLink()
+
+ if ctx.IsSigned {
+ ctx.Data["IsWatchingRepo"] = models.IsWatching(ctx.User.ID, repo.ID)
+ ctx.Data["IsStaringRepo"] = models.IsStaring(ctx.User.ID, repo.ID)
+ }
+
+ // repo is bare and display enable
+ if ctx.Repo.Repository.IsBare {
+ return
+ }
+
+ ctx.Data["TagName"] = ctx.Repo.TagName
+ brs, err := ctx.Repo.GitRepo.GetBranches()
+ if err != nil {
+ ctx.Handle(500, "GetBranches", err)
+ return
+ }
+ ctx.Data["Branches"] = brs
+ ctx.Data["BrancheCount"] = len(brs)
+
+ // If not branch selected, try default one.
+ // If default branch doesn't exists, fall back to some other branch.
+ if len(ctx.Repo.BranchName) == 0 {
+ if len(ctx.Repo.Repository.DefaultBranch) > 0 && gitRepo.IsBranchExist(ctx.Repo.Repository.DefaultBranch) {
+ ctx.Repo.BranchName = ctx.Repo.Repository.DefaultBranch
+ } else if len(brs) > 0 {
+ ctx.Repo.BranchName = brs[0]
+ }
+ }
+ ctx.Data["BranchName"] = ctx.Repo.BranchName
+ ctx.Data["CommitID"] = ctx.Repo.CommitID
+
+ if ctx.Query("go-get") == "1" {
+ ctx.Data["GoGetImport"] = composeGoGetImport(owner.Name, repo.Name)
+ prefix := setting.AppUrl + path.Join(owner.Name, repo.Name, "src", ctx.Repo.BranchName)
+ ctx.Data["GoDocDirectory"] = prefix + "{/dir}"
+ ctx.Data["GoDocFile"] = prefix + "{/dir}/{file}#L{line}"
+ }
+
+ ctx.Data["IsGuest"] = !ctx.Repo.HasAccess()
+ }
+}
+
+// RepoRef handles repository reference name including those contain `/`.
+func RepoRef() macaron.Handler {
+ return func(ctx *Context) {
+ // Empty repository does not have reference information.
+ if ctx.Repo.Repository.IsBare {
+ return
+ }
+
+ var (
+ refName string
+ err error
+ )
+
+ // For API calls.
+ if ctx.Repo.GitRepo == nil {
+ repoPath := models.RepoPath(ctx.Repo.Owner.Name, ctx.Repo.Repository.Name)
+ ctx.Repo.GitRepo, err = git.OpenRepository(repoPath)
+ if err != nil {
+ ctx.Handle(500, "RepoRef Invalid repo "+repoPath, err)
+ return
+ }
+ }
+
+ // Get default branch.
+ if len(ctx.Params("*")) == 0 {
+ refName = ctx.Repo.Repository.DefaultBranch
+ if !ctx.Repo.GitRepo.IsBranchExist(refName) {
+ brs, err := ctx.Repo.GitRepo.GetBranches()
+ if err != nil {
+ ctx.Handle(500, "GetBranches", err)
+ return
+ }
+ refName = brs[0]
+ }
+ ctx.Repo.Commit, err = ctx.Repo.GitRepo.GetBranchCommit(refName)
+ if err != nil {
+ ctx.Handle(500, "GetBranchCommit", err)
+ return
+ }
+ ctx.Repo.CommitID = ctx.Repo.Commit.ID.String()
+ ctx.Repo.IsViewBranch = true
+
+ } else {
+ hasMatched := false
+ parts := strings.Split(ctx.Params("*"), "/")
+ for i, part := range parts {
+ refName = strings.TrimPrefix(refName+"/"+part, "/")
+
+ if ctx.Repo.GitRepo.IsBranchExist(refName) ||
+ ctx.Repo.GitRepo.IsTagExist(refName) {
+ if i < len(parts)-1 {
+ ctx.Repo.TreePath = strings.Join(parts[i+1:], "/")
+ }
+ hasMatched = true
+ break
+ }
+ }
+ if !hasMatched && len(parts[0]) == 40 {
+ refName = parts[0]
+ ctx.Repo.TreePath = strings.Join(parts[1:], "/")
+ }
+
+ if ctx.Repo.GitRepo.IsBranchExist(refName) {
+ ctx.Repo.IsViewBranch = true
+
+ ctx.Repo.Commit, err = ctx.Repo.GitRepo.GetBranchCommit(refName)
+ if err != nil {
+ ctx.Handle(500, "GetBranchCommit", err)
+ return
+ }
+ ctx.Repo.CommitID = ctx.Repo.Commit.ID.String()
+
+ } else if ctx.Repo.GitRepo.IsTagExist(refName) {
+ ctx.Repo.IsViewTag = true
+ ctx.Repo.Commit, err = ctx.Repo.GitRepo.GetTagCommit(refName)
+ if err != nil {
+ ctx.Handle(500, "GetTagCommit", err)
+ return
+ }
+ ctx.Repo.CommitID = ctx.Repo.Commit.ID.String()
+ } else if len(refName) == 40 {
+ ctx.Repo.IsViewCommit = true
+ ctx.Repo.CommitID = refName
+
+ ctx.Repo.Commit, err = ctx.Repo.GitRepo.GetCommit(refName)
+ if err != nil {
+ ctx.NotFound()
+ return
+ }
+ } else {
+ ctx.Handle(404, "RepoRef invalid repo", fmt.Errorf("branch or tag not exist: %s", refName))
+ return
+ }
+ }
+
+ ctx.Repo.BranchName = refName
+ ctx.Data["BranchName"] = ctx.Repo.BranchName
+ ctx.Data["CommitID"] = ctx.Repo.CommitID
+ ctx.Data["TreePath"] = ctx.Repo.TreePath
+ ctx.Data["IsViewBranch"] = ctx.Repo.IsViewBranch
+ ctx.Data["IsViewTag"] = ctx.Repo.IsViewTag
+ ctx.Data["IsViewCommit"] = ctx.Repo.IsViewCommit
+
+ // People who have push access or have fored repository can propose a new pull request.
+ if ctx.Repo.IsWriter() || (ctx.IsSigned && ctx.User.HasForkedRepo(ctx.Repo.Repository.ID)) {
+ // Pull request is allowed if this is a fork repository
+ // and base repository accepts pull requests.
+ if ctx.Repo.Repository.BaseRepo != nil {
+ if ctx.Repo.Repository.BaseRepo.AllowsPulls() {
+ ctx.Repo.PullRequest.Allowed = true
+ // In-repository pull requests has higher priority than cross-repository if user is viewing
+ // base repository and 1) has write access to it 2) has forked it.
+ if ctx.Repo.IsWriter() {
+ ctx.Data["BaseRepo"] = ctx.Repo.Repository.BaseRepo
+ ctx.Repo.PullRequest.BaseRepo = ctx.Repo.Repository.BaseRepo
+ ctx.Repo.PullRequest.HeadInfo = ctx.Repo.Owner.Name + ":" + ctx.Repo.BranchName
+ } else {
+ ctx.Data["BaseRepo"] = ctx.Repo.Repository
+ ctx.Repo.PullRequest.BaseRepo = ctx.Repo.Repository
+ ctx.Repo.PullRequest.HeadInfo = ctx.User.Name + ":" + ctx.Repo.BranchName
+ }
+ }
+ } else {
+ // Or, this is repository accepts pull requests between branches.
+ if ctx.Repo.Repository.AllowsPulls() {
+ ctx.Data["BaseRepo"] = ctx.Repo.Repository
+ ctx.Repo.PullRequest.BaseRepo = ctx.Repo.Repository
+ ctx.Repo.PullRequest.Allowed = true
+ ctx.Repo.PullRequest.SameRepo = true
+ ctx.Repo.PullRequest.HeadInfo = ctx.Repo.BranchName
+ }
+ }
+ }
+ ctx.Data["PullRequestCtx"] = ctx.Repo.PullRequest
+ }
+}
+
+func RequireRepoAdmin() macaron.Handler {
+ return func(ctx *Context) {
+ if !ctx.IsSigned || (!ctx.Repo.IsAdmin() && !ctx.User.IsAdmin) {
+ ctx.NotFound()
+ return
+ }
+ }
+}
+
+func RequireRepoWriter() macaron.Handler {
+ return func(ctx *Context) {
+ if !ctx.IsSigned || (!ctx.Repo.IsWriter() && !ctx.User.IsAdmin) {
+ ctx.NotFound()
+ return
+ }
+ }
+}
+
+// GitHookService checks if repository Git hooks service has been enabled.
+func GitHookService() macaron.Handler {
+ return func(ctx *Context) {
+ if !ctx.User.CanEditGitHook() {
+ ctx.NotFound()
+ return
+ }
+ }
+}