2014-08-26 04:11:15 -06:00
// Copyright 2014 The Gogs Authors. All rights reserved.
2018-11-28 04:26:14 -07:00
// Copyright 2018 The Gitea Authors. All rights reserved.
2014-08-26 04:11:15 -06:00
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
2015-12-04 15:16:42 -07:00
package repo
2014-08-26 04:11:15 -06:00
import (
2017-08-16 19:31:34 -06:00
"fmt"
2017-10-26 15:16:13 -06:00
"net/http"
2017-02-10 21:00:01 -07:00
"strings"
2014-08-26 04:11:15 -06:00
2016-11-10 09:24:48 -07:00
"code.gitea.io/gitea/models"
"code.gitea.io/gitea/modules/auth"
"code.gitea.io/gitea/modules/context"
"code.gitea.io/gitea/modules/log"
2019-05-06 19:12:51 -06:00
"code.gitea.io/gitea/modules/migrations"
2016-11-10 09:24:48 -07:00
"code.gitea.io/gitea/modules/setting"
2017-10-26 15:16:13 -06:00
"code.gitea.io/gitea/modules/util"
2016-11-10 09:24:48 -07:00
"code.gitea.io/gitea/routers/api/v1/convert"
2018-03-29 07:32:40 -06:00
2019-05-11 04:21:34 -06:00
api "code.gitea.io/gitea/modules/structs"
2014-08-26 04:11:15 -06:00
)
2018-08-02 02:10:02 -06:00
var searchOrderByMap = map [ string ] map [ string ] models . SearchOrderBy {
"asc" : {
"alpha" : models . SearchOrderByAlphabetically ,
"created" : models . SearchOrderByOldest ,
"updated" : models . SearchOrderByLeastUpdated ,
"size" : models . SearchOrderBySize ,
"id" : models . SearchOrderByID ,
} ,
"desc" : {
"alpha" : models . SearchOrderByAlphabeticallyReverse ,
"created" : models . SearchOrderByNewest ,
"updated" : models . SearchOrderByRecentUpdated ,
"size" : models . SearchOrderBySizeReverse ,
"id" : models . SearchOrderByIDReverse ,
} ,
}
2016-11-24 00:04:31 -07:00
// Search repositories via options
2016-03-13 16:49:16 -06:00
func Search ( ctx * context . APIContext ) {
2017-11-13 00:02:25 -07:00
// swagger:operation GET /repos/search repository repoSearch
// ---
// summary: Search for repositories
// produces:
// - application/json
// parameters:
// - name: q
// in: query
// description: keyword
// type: string
// - name: uid
// in: query
2017-11-15 01:10:26 -07:00
// description: search only for repos that the user with the given id owns or contributes to
// type: integer
2018-10-20 21:40:42 -06:00
// format: int64
2019-05-15 09:24:39 -06:00
// - name: starredBy
// in: query
// description: search only for repos that the user with the given id has starred
// type: integer
// format: int64
// - name: private
// in: query
// description: include private repositories this user has access to (defaults to true)
// type: boolean
2017-11-15 01:10:26 -07:00
// - name: page
// in: query
// description: page number of results to return (1-based)
2017-11-13 00:02:25 -07:00
// type: integer
// - name: limit
// in: query
2017-11-15 01:10:26 -07:00
// description: page size of results, maximum page size is 50
2017-11-13 00:02:25 -07:00
// type: integer
// - name: mode
// in: query
// description: type of repository to search for. Supported values are
// "fork", "source", "mirror" and "collaborative"
// type: string
// - name: exclusive
// in: query
2017-11-15 01:10:26 -07:00
// description: if `uid` is given, search only for repos that the user owns
2017-11-13 00:02:25 -07:00
// type: boolean
2018-08-02 02:10:02 -06:00
// - name: sort
// in: query
// description: sort repos by attribute. Supported values are
// "alpha", "created", "updated", "size", and "id".
// Default is "alpha"
// type: string
// - name: order
// in: query
// description: sort order, either "asc" (ascending) or "desc" (descending).
// Default is "asc", ignored if "sort" is not specified.
// type: string
2017-11-13 00:02:25 -07:00
// responses:
// "200":
// "$ref": "#/responses/SearchResults"
// "422":
// "$ref": "#/responses/validationError"
2016-03-11 13:33:12 -07:00
opts := & models . SearchRepoOptions {
2017-10-26 15:16:13 -06:00
Keyword : strings . Trim ( ctx . Query ( "q" ) , " " ) ,
OwnerID : ctx . QueryInt64 ( "uid" ) ,
2017-11-15 01:10:26 -07:00
Page : ctx . QueryInt ( "page" ) ,
2017-10-26 15:16:13 -06:00
PageSize : convert . ToCorrectPageSize ( ctx . QueryInt ( "limit" ) ) ,
2018-09-12 20:33:48 -06:00
TopicOnly : ctx . QueryBool ( "topic" ) ,
2017-10-26 15:16:13 -06:00
Collaborate : util . OptionalBoolNone ,
2019-05-15 09:24:39 -06:00
Private : ctx . IsSigned && ( ctx . Query ( "private" ) == "" || ctx . QueryBool ( "private" ) ) ,
UserIsAdmin : ctx . IsUserSiteAdmin ( ) ,
UserID : ctx . Data [ "SignedUserID" ] . ( int64 ) ,
StarredByID : ctx . QueryInt64 ( "starredBy" ) ,
2017-10-26 15:16:13 -06:00
}
if ctx . QueryBool ( "exclusive" ) {
opts . Collaborate = util . OptionalBoolFalse
}
var mode = ctx . Query ( "mode" )
switch mode {
case "source" :
opts . Fork = util . OptionalBoolFalse
opts . Mirror = util . OptionalBoolFalse
case "fork" :
opts . Fork = util . OptionalBoolTrue
case "mirror" :
opts . Mirror = util . OptionalBoolTrue
case "collaborative" :
opts . Mirror = util . OptionalBoolFalse
opts . Collaborate = util . OptionalBoolTrue
case "" :
default :
ctx . Error ( http . StatusUnprocessableEntity , "" , fmt . Errorf ( "Invalid search mode: \"%s\"" , mode ) )
return
2014-08-26 04:11:15 -06:00
}
2018-08-02 02:10:02 -06:00
var sortMode = ctx . Query ( "sort" )
if len ( sortMode ) > 0 {
var sortOrder = ctx . Query ( "order" )
if len ( sortOrder ) == 0 {
sortOrder = "asc"
}
if searchModeMap , ok := searchOrderByMap [ sortOrder ] ; ok {
if orderBy , ok := searchModeMap [ sortMode ] ; ok {
opts . OrderBy = orderBy
} else {
ctx . Error ( http . StatusUnprocessableEntity , "" , fmt . Errorf ( "Invalid sort mode: \"%s\"" , sortMode ) )
return
}
} else {
ctx . Error ( http . StatusUnprocessableEntity , "" , fmt . Errorf ( "Invalid sort order: \"%s\"" , sortOrder ) )
return
}
}
2017-10-26 15:16:13 -06:00
var err error
2016-07-04 03:27:06 -06:00
repos , count , err := models . SearchRepositoryByName ( opts )
2014-08-26 04:11:15 -06:00
if err != nil {
2017-05-02 07:35:59 -06:00
ctx . JSON ( 500 , api . SearchError {
OK : false ,
Error : err . Error ( ) ,
2014-08-26 04:11:15 -06:00
} )
return
}
2014-11-14 15:11:30 -07:00
results := make ( [ ] * api . Repository , len ( repos ) )
2017-02-09 18:30:26 -07:00
for i , repo := range repos {
if err = repo . GetOwner ( ) ; err != nil {
2017-05-02 07:35:59 -06:00
ctx . JSON ( 500 , api . SearchError {
OK : false ,
Error : err . Error ( ) ,
2014-08-26 04:11:15 -06:00
} )
return
}
2018-11-28 04:26:14 -07:00
accessMode , err := models . AccessLevel ( ctx . User , repo )
2017-02-09 18:30:26 -07:00
if err != nil {
2017-05-02 07:35:59 -06:00
ctx . JSON ( 500 , api . SearchError {
OK : false ,
Error : err . Error ( ) ,
2017-02-09 18:30:26 -07:00
} )
2014-08-26 04:11:15 -06:00
}
2017-02-09 18:30:26 -07:00
results [ i ] = repo . APIFormat ( accessMode )
2014-08-26 04:11:15 -06:00
}
2016-07-04 03:27:06 -06:00
ctx . SetLinkHeader ( int ( count ) , setting . API . MaxResponseItems )
2017-08-16 19:31:34 -06:00
ctx . Header ( ) . Set ( "X-Total-Count" , fmt . Sprintf ( "%d" , count ) )
2017-05-02 07:35:59 -06:00
ctx . JSON ( 200 , api . SearchResults {
OK : true ,
Data : results ,
2014-08-26 04:11:15 -06:00
} )
}
2014-08-28 21:24:37 -06:00
2016-11-24 00:04:31 -07:00
// CreateUserRepo create a repository for a user
2016-03-13 16:49:16 -06:00
func CreateUserRepo ( ctx * context . APIContext , owner * models . User , opt api . CreateRepoOption ) {
2019-02-21 15:07:58 -07:00
if opt . AutoInit && opt . Readme == "" {
opt . Readme = "Default"
}
2017-09-03 02:20:24 -06:00
repo , err := models . CreateRepository ( ctx . User , owner , models . CreateRepoOptions {
2015-08-28 04:33:09 -06:00
Name : opt . Name ,
Description : opt . Description ,
2015-08-28 05:06:18 -06:00
Gitignores : opt . Gitignores ,
2015-08-28 04:33:09 -06:00
License : opt . License ,
2015-08-28 05:06:18 -06:00
Readme : opt . Readme ,
IsPrivate : opt . Private ,
AutoInit : opt . AutoInit ,
2015-08-28 04:33:09 -06:00
} )
2014-12-12 18:30:32 -07:00
if err != nil {
2019-03-15 08:19:09 -06:00
if models . IsErrRepoAlreadyExist ( err ) {
ctx . Error ( 409 , "" , "The repository with the same name already exists." )
} else if models . IsErrNameReserved ( err ) ||
2015-03-26 15:11:47 -06:00
models . IsErrNamePatternNotAllowed ( err ) {
2016-03-13 16:49:16 -06:00
ctx . Error ( 422 , "" , err )
2014-12-12 18:30:32 -07:00
} else {
if repo != nil {
2017-09-03 02:20:24 -06:00
if err = models . DeleteRepository ( ctx . User , ctx . User . ID , repo . ID ) ; err != nil {
2019-04-02 01:48:31 -06:00
log . Error ( "DeleteRepository: %v" , err )
2014-12-12 18:30:32 -07:00
}
}
2016-03-13 16:49:16 -06:00
ctx . Error ( 500 , "CreateRepository" , err )
2014-12-12 18:30:32 -07:00
}
return
}
2016-12-05 16:48:51 -07:00
ctx . JSON ( 201 , repo . APIFormat ( models . AccessModeOwner ) )
2014-12-12 18:30:32 -07:00
}
2016-10-07 11:17:27 -06:00
// Create one repository of mine
2016-03-13 16:49:16 -06:00
func Create ( ctx * context . APIContext , opt api . CreateRepoOption ) {
2017-11-13 00:02:25 -07:00
// swagger:operation POST /user/repos repository user createCurrentUserRepo
// ---
// summary: Create a repository
// consumes:
// - application/json
// produces:
// - application/json
// parameters:
// - name: body
// in: body
// schema:
// "$ref": "#/definitions/CreateRepoOption"
// responses:
// "201":
// "$ref": "#/responses/Repository"
2019-05-30 09:09:05 -06:00
// "409":
// description: The repository with the same name already exists.
// "422":
// "$ref": "#/responses/validationError"
2014-12-12 18:30:32 -07:00
if ctx . User . IsOrganization ( ) {
2017-11-13 00:02:25 -07:00
// Shouldn't reach this condition, but just in case.
2016-03-13 16:49:16 -06:00
ctx . Error ( 422 , "" , "not allowed creating repository for organization" )
2014-12-12 18:30:32 -07:00
return
}
2015-12-17 20:57:41 -07:00
CreateUserRepo ( ctx , ctx . User , opt )
2014-12-12 18:30:32 -07:00
}
2016-11-24 00:04:31 -07:00
// CreateOrgRepo create one repository of the organization
2016-03-13 16:49:16 -06:00
func CreateOrgRepo ( ctx * context . APIContext , opt api . CreateRepoOption ) {
2017-11-13 00:02:25 -07:00
// swagger:operation POST /org/{org}/repos organization createOrgRepo
// ---
// summary: Create a repository in an organization
// consumes:
// - application/json
// produces:
// - application/json
// parameters:
// - name: org
// in: path
// description: name of organization
// type: string
// required: true
// - name: body
// in: body
// schema:
// "$ref": "#/definitions/CreateRepoOption"
// responses:
// "201":
// "$ref": "#/responses/Repository"
// "422":
// "$ref": "#/responses/validationError"
// "403":
// "$ref": "#/responses/forbidden"
2014-12-12 18:30:32 -07:00
org , err := models . GetOrgByName ( ctx . Params ( ":org" ) )
if err != nil {
2017-07-06 07:30:19 -06:00
if models . IsErrOrgNotExist ( err ) {
2016-03-13 16:49:16 -06:00
ctx . Error ( 422 , "" , err )
2014-12-12 18:30:32 -07:00
} else {
2016-03-13 16:49:16 -06:00
ctx . Error ( 500 , "GetOrgByName" , err )
2014-12-12 18:30:32 -07:00
}
return
}
2019-02-18 09:00:27 -07:00
if ! models . HasOrgVisible ( org , ctx . User ) {
ctx . NotFound ( "HasOrgVisible" , nil )
return
}
2018-07-04 17:51:02 -06:00
if ! ctx . User . IsAdmin {
isOwner , err := org . IsOwnedBy ( ctx . User . ID )
if err != nil {
ctx . ServerError ( "IsOwnedBy" , err )
return
} else if ! isOwner {
ctx . Error ( 403 , "" , "Given user is not owner of organization." )
return
}
2014-12-12 18:30:32 -07:00
}
2015-12-17 20:57:41 -07:00
CreateUserRepo ( ctx , org , opt )
2014-12-12 18:30:32 -07:00
}
2016-11-24 00:04:31 -07:00
// Migrate migrate remote git repository to gitea
2016-03-13 16:49:16 -06:00
func Migrate ( ctx * context . APIContext , form auth . MigrateRepoForm ) {
2017-11-13 00:02:25 -07:00
// swagger:operation POST /repos/migrate repository repoMigrate
// ---
// summary: Migrate a remote git repository
// consumes:
// - application/json
// produces:
// - application/json
// parameters:
// - name: body
// in: body
// schema:
// "$ref": "#/definitions/MigrateRepoForm"
// responses:
// "201":
// "$ref": "#/responses/Repository"
2015-09-03 04:17:33 -06:00
ctxUser := ctx . User
2015-11-24 22:55:37 -07:00
// Not equal means context user is an organization,
// or is another user/organization if current user is admin.
2016-11-26 23:03:59 -07:00
if form . UID != ctxUser . ID {
org , err := models . GetUserByID ( form . UID )
2014-08-29 03:31:53 -06:00
if err != nil {
2015-08-04 21:14:17 -06:00
if models . IsErrUserNotExist ( err ) {
2016-03-13 16:49:16 -06:00
ctx . Error ( 422 , "" , err )
2015-02-22 07:49:25 -07:00
} else {
2016-03-13 16:49:16 -06:00
ctx . Error ( 500 , "GetUserByID" , err )
2015-02-22 07:49:25 -07:00
}
2014-08-28 21:24:37 -06:00
return
}
ctxUser = org
}
if ctx . HasError ( ) {
2016-03-13 16:49:16 -06:00
ctx . Error ( 422 , "" , ctx . GetErrMsg ( ) )
2014-08-28 21:24:37 -06:00
return
}
2018-07-04 16:45:15 -06:00
if ! ctx . User . IsAdmin {
if ! ctxUser . IsOrganization ( ) && ctx . User . ID != ctxUser . ID {
ctx . Error ( 403 , "" , "Given user is not an organization." )
2014-08-28 21:24:37 -06:00
return
}
2018-07-04 16:45:15 -06:00
if ctxUser . IsOrganization ( ) {
// Check ownership of organization.
isOwner , err := ctxUser . IsOwnedBy ( ctx . User . ID )
if err != nil {
ctx . Error ( 500 , "IsOwnedBy" , err )
return
} else if ! isOwner {
ctx . Error ( 403 , "" , "Given user is not owner of organization." )
return
}
}
2014-08-28 21:24:37 -06:00
}
2015-11-03 16:40:52 -07:00
remoteAddr , err := form . ParseRemoteAddr ( ctx . User )
if err != nil {
if models . IsErrInvalidCloneAddr ( err ) {
addrErr := err . ( models . ErrInvalidCloneAddr )
switch {
case addrErr . IsURLError :
2016-03-13 16:49:16 -06:00
ctx . Error ( 422 , "" , err )
2015-11-03 16:40:52 -07:00
case addrErr . IsPermissionDenied :
2016-03-13 16:49:16 -06:00
ctx . Error ( 422 , "" , "You are not allowed to import local repositories." )
2015-11-03 16:40:52 -07:00
case addrErr . IsInvalidPath :
2016-03-13 16:49:16 -06:00
ctx . Error ( 422 , "" , "Invalid local path, it does not exist or not a directory." )
2015-11-03 16:40:52 -07:00
default :
2016-03-13 16:49:16 -06:00
ctx . Error ( 500 , "ParseRemoteAddr" , "Unknown error type (ErrInvalidCloneAddr): " + err . Error ( ) )
2015-11-03 16:40:52 -07:00
}
} else {
2016-03-13 16:49:16 -06:00
ctx . Error ( 500 , "ParseRemoteAddr" , err )
2015-02-22 07:49:25 -07:00
}
2014-08-28 21:24:37 -06:00
return
}
2019-05-06 19:12:51 -06:00
var opts = migrations . MigrateOptions {
RemoteURL : remoteAddr ,
Name : form . RepoName ,
Description : form . Description ,
Private : form . Private || setting . Repository . ForcePrivate ,
Mirror : form . Mirror ,
AuthUsername : form . AuthUsername ,
AuthPassword : form . AuthPassword ,
Wiki : form . Wiki ,
Issues : form . Issues ,
Milestones : form . Milestones ,
Labels : form . Labels ,
Comments : true ,
PullRequests : form . PullRequests ,
Releases : form . Releases ,
}
if opts . Mirror {
opts . Issues = false
opts . Milestones = false
opts . Labels = false
opts . Comments = false
opts . PullRequests = false
opts . Releases = false
}
2019-02-26 07:28:56 -07:00
2019-05-06 19:12:51 -06:00
repo , err := migrations . MigrateRepository ( ctx . User , ctxUser . Name , opts )
if err == nil {
log . Trace ( "Repository migrated: %s/%s" , ctxUser . Name , form . RepoName )
ctx . JSON ( 201 , repo . APIFormat ( models . AccessModeAdmin ) )
2015-02-22 07:49:25 -07:00
return
2014-08-28 21:24:37 -06:00
}
2019-05-06 19:12:51 -06:00
switch {
case models . IsErrRepoAlreadyExist ( err ) :
ctx . Error ( 409 , "" , "The repository with the same name already exists." )
case migrations . IsRateLimitError ( err ) :
ctx . Error ( 422 , "" , "Remote visit addressed rate limitation." )
case migrations . IsTwoFactorAuthError ( err ) :
ctx . Error ( 422 , "" , "Remote visit required two factors authentication." )
case models . IsErrReachLimitOfRepo ( err ) :
ctx . Error ( 422 , "" , fmt . Sprintf ( "You have already reached your limit of %d repositories." , ctxUser . MaxCreationLimit ( ) ) )
case models . IsErrNameReserved ( err ) :
ctx . Error ( 422 , "" , fmt . Sprintf ( "The username '%s' is reserved." , err . ( models . ErrNameReserved ) . Name ) )
case models . IsErrNamePatternNotAllowed ( err ) :
ctx . Error ( 422 , "" , fmt . Sprintf ( "The pattern '%s' is not allowed in a username." , err . ( models . ErrNamePatternNotAllowed ) . Pattern ) )
default :
err = util . URLSanitizedError ( err , remoteAddr )
if strings . Contains ( err . Error ( ) , "Authentication failed" ) ||
strings . Contains ( err . Error ( ) , "Bad credentials" ) ||
strings . Contains ( err . Error ( ) , "could not read Username" ) {
ctx . Error ( 422 , "" , fmt . Sprintf ( "Authentication failed: %v." , err ) )
} else if strings . Contains ( err . Error ( ) , "fatal:" ) {
ctx . Error ( 422 , "" , fmt . Sprintf ( "Migration failed: %v." , err ) )
} else {
ctx . Error ( 500 , "MigrateRepository" , err )
}
}
2014-08-28 21:24:37 -06:00
}
2015-10-04 09:09:16 -06:00
2016-10-07 11:17:27 -06:00
// Get one repository
2016-03-13 16:49:16 -06:00
func Get ( ctx * context . APIContext ) {
2017-11-13 00:02:25 -07:00
// swagger:operation GET /repos/{owner}/{repo} repository repoGet
// ---
// summary: Get a repository
// produces:
// - application/json
// parameters:
// - name: owner
// in: path
// description: owner of the repo
// type: string
// required: true
// - name: repo
// in: path
// description: name of the repo
// type: string
// required: true
// responses:
// "200":
// "$ref": "#/responses/Repository"
2017-07-11 19:23:41 -06:00
ctx . JSON ( 200 , ctx . Repo . Repository . APIFormat ( ctx . Repo . AccessMode ) )
2015-10-22 15:46:07 -06:00
}
2016-10-03 04:35:42 -06:00
// GetByID returns a single Repository
func GetByID ( ctx * context . APIContext ) {
2017-11-13 00:02:25 -07:00
// swagger:operation GET /repositories/{id} repository repoGetByID
// ---
// summary: Get a repository by id
// produces:
// - application/json
// parameters:
// - name: id
// in: path
// description: id of the repo to get
// type: integer
2018-10-20 21:40:42 -06:00
// format: int64
2017-11-13 00:02:25 -07:00
// required: true
// responses:
// "200":
// "$ref": "#/responses/Repository"
2016-10-03 04:35:42 -06:00
repo , err := models . GetRepositoryByID ( ctx . ParamsInt64 ( ":id" ) )
if err != nil {
if models . IsErrRepoNotExist ( err ) {
2019-03-18 20:29:43 -06:00
ctx . NotFound ( )
2016-10-03 04:35:42 -06:00
} else {
ctx . Error ( 500 , "GetRepositoryByID" , err )
}
return
}
2018-11-28 04:26:14 -07:00
perm , err := models . GetUserRepoPermission ( repo , ctx . User )
2016-12-05 16:48:51 -07:00
if err != nil {
2017-07-29 19:13:33 -06:00
ctx . Error ( 500 , "AccessLevel" , err )
return
2018-11-28 04:26:14 -07:00
} else if ! perm . HasAccess ( ) {
2019-03-18 20:29:43 -06:00
ctx . NotFound ( )
2016-12-05 16:48:51 -07:00
return
}
2018-11-28 04:26:14 -07:00
ctx . JSON ( 200 , repo . APIFormat ( perm . AccessMode ) )
2016-10-03 04:35:42 -06:00
}
2019-05-30 09:09:05 -06:00
// Edit edit repository properties
func Edit ( ctx * context . APIContext , opts api . EditRepoOption ) {
// swagger:operation PATCH /repos/{owner}/{repo} repository repoEdit
// ---
// summary: Edit a repository's properties. Only fields that are set will be changed.
// produces:
// - application/json
// parameters:
// - name: owner
// in: path
// description: owner of the repo to edit
// type: string
// required: true
// - name: repo
// in: path
// description: name of the repo to edit
// type: string
// required: true
// required: true
// - name: body
// in: body
// description: "Properties of a repo that you can edit"
// schema:
// "$ref": "#/definitions/EditRepoOption"
// responses:
// "200":
// "$ref": "#/responses/Repository"
// "403":
// "$ref": "#/responses/forbidden"
// "422":
// "$ref": "#/responses/validationError"
if err := updateBasicProperties ( ctx , opts ) ; err != nil {
return
}
if err := updateRepoUnits ( ctx , opts ) ; err != nil {
return
}
if opts . Archived != nil {
if err := updateRepoArchivedState ( ctx , opts ) ; err != nil {
return
}
}
ctx . JSON ( http . StatusOK , ctx . Repo . Repository . APIFormat ( ctx . Repo . AccessMode ) )
}
// updateBasicProperties updates the basic properties of a repo: Name, Description, Website and Visibility
func updateBasicProperties ( ctx * context . APIContext , opts api . EditRepoOption ) error {
owner := ctx . Repo . Owner
repo := ctx . Repo . Repository
oldRepoName := repo . Name
newRepoName := repo . Name
if opts . Name != nil {
newRepoName = * opts . Name
}
// Check if repository name has been changed and not just a case change
if repo . LowerName != strings . ToLower ( newRepoName ) {
if err := models . ChangeRepositoryName ( ctx . Repo . Owner , repo . Name , newRepoName ) ; err != nil {
switch {
case models . IsErrRepoAlreadyExist ( err ) :
ctx . Error ( http . StatusUnprocessableEntity , fmt . Sprintf ( "repo name is already taken [name: %s]" , newRepoName ) , err )
case models . IsErrNameReserved ( err ) :
ctx . Error ( http . StatusUnprocessableEntity , fmt . Sprintf ( "repo name is reserved [name: %s]" , newRepoName ) , err )
case models . IsErrNamePatternNotAllowed ( err ) :
ctx . Error ( http . StatusUnprocessableEntity , fmt . Sprintf ( "repo name's pattern is not allowed [name: %s, pattern: %s]" , newRepoName , err . ( models . ErrNamePatternNotAllowed ) . Pattern ) , err )
default :
ctx . Error ( http . StatusUnprocessableEntity , "ChangeRepositoryName" , err )
}
return err
}
err := models . NewRepoRedirect ( ctx . Repo . Owner . ID , repo . ID , repo . Name , newRepoName )
if err != nil {
ctx . Error ( http . StatusUnprocessableEntity , "NewRepoRedirect" , err )
return err
}
if err := models . RenameRepoAction ( ctx . User , oldRepoName , repo ) ; err != nil {
log . Error ( "RenameRepoAction: %v" , err )
ctx . Error ( http . StatusInternalServerError , "RenameRepoActions" , err )
return err
}
log . Trace ( "Repository name changed: %s/%s -> %s" , ctx . Repo . Owner . Name , repo . Name , newRepoName )
}
// Update the name in the repo object for the response
repo . Name = newRepoName
repo . LowerName = strings . ToLower ( newRepoName )
if opts . Description != nil {
repo . Description = * opts . Description
}
if opts . Website != nil {
repo . Website = * opts . Website
}
visibilityChanged := false
if opts . Private != nil {
// Visibility of forked repository is forced sync with base repository.
if repo . IsFork {
* opts . Private = repo . BaseRepo . IsPrivate
}
visibilityChanged = repo . IsPrivate != * opts . Private
// when ForcePrivate enabled, you could change public repo to private, but only admin users can change private to public
if visibilityChanged && setting . Repository . ForcePrivate && ! * opts . Private && ! ctx . User . IsAdmin {
err := fmt . Errorf ( "cannot change private repository to public" )
ctx . Error ( http . StatusUnprocessableEntity , "Force Private enabled" , err )
return err
}
repo . IsPrivate = * opts . Private
}
if err := models . UpdateRepository ( repo , visibilityChanged ) ; err != nil {
ctx . Error ( http . StatusInternalServerError , "UpdateRepository" , err )
return err
}
log . Trace ( "Repository basic settings updated: %s/%s" , owner . Name , repo . Name )
return nil
}
// updateRepoUnits updates repo units: Issue settings, Wiki settings, PR settings
func updateRepoUnits ( ctx * context . APIContext , opts api . EditRepoOption ) error {
owner := ctx . Repo . Owner
repo := ctx . Repo . Repository
var units [ ] models . RepoUnit
for _ , tp := range models . MustRepoUnits {
units = append ( units , models . RepoUnit {
RepoID : repo . ID ,
Type : tp ,
Config : new ( models . UnitConfig ) ,
} )
}
2019-08-11 03:45:45 -06:00
if opts . HasIssues == nil {
// If HasIssues setting not touched, rewrite existing repo unit
if unit , err := repo . GetUnit ( models . UnitTypeIssues ) ; err == nil {
units = append ( units , * unit )
} else if unit , err := repo . GetUnit ( models . UnitTypeExternalTracker ) ; err == nil {
units = append ( units , * unit )
}
} else if * opts . HasIssues {
// We don't currently allow setting individual issue settings through the API,
// only can enable/disable issues, so when enabling issues,
// we either get the existing config which means it was already enabled,
// or create a new config since it doesn't exist.
unit , err := repo . GetUnit ( models . UnitTypeIssues )
var config * models . IssuesConfig
if err != nil {
// Unit type doesn't exist so we make a new config file with default values
config = & models . IssuesConfig {
EnableTimetracker : true ,
AllowOnlyContributorsToTrackTime : true ,
EnableDependencies : true ,
2019-05-30 09:09:05 -06:00
}
2019-08-11 03:45:45 -06:00
} else {
config = unit . IssuesConfig ( )
2019-05-30 09:09:05 -06:00
}
2019-08-11 03:45:45 -06:00
units = append ( units , models . RepoUnit {
RepoID : repo . ID ,
Type : models . UnitTypeIssues ,
Config : config ,
} )
2019-05-30 09:09:05 -06:00
}
2019-08-11 03:45:45 -06:00
if opts . HasWiki == nil {
// If HasWiki setting not touched, rewrite existing repo unit
if unit , err := repo . GetUnit ( models . UnitTypeWiki ) ; err == nil {
units = append ( units , * unit )
} else if unit , err := repo . GetUnit ( models . UnitTypeExternalWiki ) ; err == nil {
units = append ( units , * unit )
2019-05-30 09:09:05 -06:00
}
2019-08-11 03:45:45 -06:00
} else if * opts . HasWiki {
// We don't currently allow setting individual wiki settings through the API,
// only can enable/disable the wiki, so when enabling the wiki,
// we either get the existing config which means it was already enabled,
// or create a new config since it doesn't exist.
config := & models . UnitConfig { }
units = append ( units , models . RepoUnit {
RepoID : repo . ID ,
Type : models . UnitTypeWiki ,
Config : config ,
} )
2019-05-30 09:09:05 -06:00
}
2019-08-11 03:45:45 -06:00
if opts . HasPullRequests == nil {
// If HasPullRequest setting not touched, rewrite existing repo unit
if unit , err := repo . GetUnit ( models . UnitTypePullRequests ) ; err == nil {
units = append ( units , * unit )
}
} else if * opts . HasPullRequests {
// We do allow setting individual PR settings through the API, so
// we get the config settings and then set them
// if those settings were provided in the opts.
unit , err := repo . GetUnit ( models . UnitTypePullRequests )
var config * models . PullRequestsConfig
if err != nil {
// Unit type doesn't exist so we make a new config file with default values
config = & models . PullRequestsConfig {
IgnoreWhitespaceConflicts : false ,
AllowMerge : true ,
AllowRebase : true ,
AllowRebaseMerge : true ,
AllowSquash : true ,
2019-05-30 09:09:05 -06:00
}
2019-08-11 03:45:45 -06:00
} else {
config = unit . PullRequestsConfig ( )
}
2019-05-30 09:09:05 -06:00
2019-08-11 03:45:45 -06:00
if opts . IgnoreWhitespaceConflicts != nil {
config . IgnoreWhitespaceConflicts = * opts . IgnoreWhitespaceConflicts
}
if opts . AllowMerge != nil {
config . AllowMerge = * opts . AllowMerge
}
if opts . AllowRebase != nil {
config . AllowRebase = * opts . AllowRebase
}
if opts . AllowRebaseMerge != nil {
config . AllowRebaseMerge = * opts . AllowRebaseMerge
}
if opts . AllowSquash != nil {
config . AllowSquash = * opts . AllowSquash
2019-05-30 09:09:05 -06:00
}
2019-08-11 03:45:45 -06:00
units = append ( units , models . RepoUnit {
RepoID : repo . ID ,
Type : models . UnitTypePullRequests ,
Config : config ,
} )
2019-05-30 09:09:05 -06:00
}
if err := models . UpdateRepositoryUnits ( repo , units ) ; err != nil {
ctx . Error ( http . StatusInternalServerError , "UpdateRepositoryUnits" , err )
return err
}
log . Trace ( "Repository advanced settings updated: %s/%s" , owner . Name , repo . Name )
return nil
}
// updateRepoArchivedState updates repo's archive state
func updateRepoArchivedState ( ctx * context . APIContext , opts api . EditRepoOption ) error {
repo := ctx . Repo . Repository
// archive / un-archive
if opts . Archived != nil {
if repo . IsMirror {
err := fmt . Errorf ( "repo is a mirror, cannot archive/un-archive" )
ctx . Error ( http . StatusUnprocessableEntity , err . Error ( ) , err )
return err
}
if * opts . Archived {
if err := repo . SetArchiveRepoState ( * opts . Archived ) ; err != nil {
log . Error ( "Tried to archive a repo: %s" , err )
ctx . Error ( http . StatusInternalServerError , "ArchiveRepoState" , err )
return err
}
log . Trace ( "Repository was archived: %s/%s" , ctx . Repo . Owner . Name , repo . Name )
} else {
if err := repo . SetArchiveRepoState ( * opts . Archived ) ; err != nil {
log . Error ( "Tried to un-archive a repo: %s" , err )
ctx . Error ( http . StatusInternalServerError , "ArchiveRepoState" , err )
return err
}
log . Trace ( "Repository was un-archived: %s/%s" , ctx . Repo . Owner . Name , repo . Name )
}
}
return nil
}
2016-10-07 11:17:27 -06:00
// Delete one repository
2016-03-13 16:49:16 -06:00
func Delete ( ctx * context . APIContext ) {
2017-11-13 00:02:25 -07:00
// swagger:operation DELETE /repos/{owner}/{repo} repository repoDelete
// ---
// summary: Delete a repository
// produces:
// - application/json
// parameters:
// - name: owner
// in: path
// description: owner of the repo to delete
// type: string
// required: true
// - name: repo
// in: path
// description: name of the repo to delete
// type: string
// required: true
// responses:
// "204":
// "$ref": "#/responses/empty"
// "403":
// "$ref": "#/responses/forbidden"
2016-11-14 15:33:58 -07:00
owner := ctx . Repo . Owner
repo := ctx . Repo . Repository
2015-10-04 09:09:16 -06:00
2018-12-02 09:08:33 -07:00
if owner . IsOrganization ( ) && ! ctx . User . IsAdmin {
2017-12-21 00:43:26 -07:00
isOwner , err := owner . IsOwnedBy ( ctx . User . ID )
if err != nil {
ctx . Error ( 500 , "IsOwnedBy" , err )
return
} else if ! isOwner {
ctx . Error ( 403 , "" , "Given user is not owner of organization." )
return
}
2015-10-04 09:09:16 -06:00
}
2017-09-03 02:20:24 -06:00
if err := models . DeleteRepository ( ctx . User , owner . ID , repo . ID ) ; err != nil {
2016-03-13 16:49:16 -06:00
ctx . Error ( 500 , "DeleteRepository" , err )
2015-10-04 09:09:16 -06:00
return
}
2015-10-22 15:46:07 -06:00
log . Trace ( "Repository deleted: %s/%s" , owner . Name , repo . Name )
2015-10-04 09:09:16 -06:00
ctx . Status ( 204 )
}
2017-04-19 05:09:49 -06:00
// MirrorSync adds a mirrored repository to the sync queue
func MirrorSync ( ctx * context . APIContext ) {
2017-11-13 00:02:25 -07:00
// swagger:operation POST /repos/{owner}/{repo}/mirror-sync repository repoMirrorSync
// ---
// summary: Sync a mirrored repository
// produces:
// - application/json
// parameters:
// - name: owner
// in: path
// description: owner of the repo to sync
// type: string
// required: true
// - name: repo
// in: path
// description: name of the repo to sync
// type: string
// required: true
// responses:
// "200":
// "$ref": "#/responses/empty"
2017-04-19 05:09:49 -06:00
repo := ctx . Repo . Repository
2018-11-28 04:26:14 -07:00
if ! ctx . Repo . CanWrite ( models . UnitTypeCode ) {
2017-04-19 05:09:49 -06:00
ctx . Error ( 403 , "MirrorSync" , "Must have write access" )
}
go models . MirrorQueue . Add ( repo . ID )
ctx . Status ( 200 )
}
2018-04-10 20:51:44 -06:00
// TopicSearch search for creating topic
func TopicSearch ( ctx * context . Context ) {
// swagger:operation GET /topics/search repository topicSearch
// ---
// summary: search topics via keyword
// produces:
2018-06-12 08:59:22 -06:00
// - application/json
2018-04-10 20:51:44 -06:00
// parameters:
2018-06-12 08:59:22 -06:00
// - name: q
// in: query
// description: keywords to search
// required: true
// type: string
2018-04-10 20:51:44 -06:00
// responses:
// "200":
// "$ref": "#/responses/Repository"
if ctx . User == nil {
ctx . JSON ( 403 , map [ string ] interface { } {
"message" : "Only owners could change the topics." ,
} )
return
}
kw := ctx . Query ( "q" )
topics , err := models . FindTopics ( & models . FindTopicOptions {
Keyword : kw ,
Limit : 10 ,
} )
if err != nil {
2019-04-02 01:48:31 -06:00
log . Error ( "SearchTopics failed: %v" , err )
2018-04-10 20:51:44 -06:00
ctx . JSON ( 500 , map [ string ] interface { } {
"message" : "Search topics failed." ,
} )
return
}
ctx . JSON ( 200 , map [ string ] interface { } {
"topics" : topics ,
} )
}