mirror of
https://github.com/go-gitea/gitea
synced 2024-12-22 23:47:53 +01:00
a20ccec369
Backport #17243 There is an issue with #16508 where it appears that create repo requires that the repo does not exist. This causes #17241 where an error is reported because of this. This PR fixes this and also runs update-server-info for mirrors and generated repos. Fix #17241 Signed-off-by: Andrew Thornton <art27@cantab.net>
2178 lines
62 KiB
Go
2178 lines
62 KiB
Go
// Copyright 2014 The Gogs Authors. All rights reserved.
|
|
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
// Use of this source code is governed by a MIT-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package models
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"html/template"
|
|
"unicode/utf8"
|
|
|
|
// Needed for jpeg support
|
|
_ "image/jpeg"
|
|
"io/ioutil"
|
|
"net"
|
|
"net/url"
|
|
"os"
|
|
"path"
|
|
"path/filepath"
|
|
"sort"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"code.gitea.io/gitea/modules/lfs"
|
|
"code.gitea.io/gitea/modules/log"
|
|
"code.gitea.io/gitea/modules/markup"
|
|
"code.gitea.io/gitea/modules/options"
|
|
"code.gitea.io/gitea/modules/setting"
|
|
"code.gitea.io/gitea/modules/storage"
|
|
api "code.gitea.io/gitea/modules/structs"
|
|
"code.gitea.io/gitea/modules/timeutil"
|
|
"code.gitea.io/gitea/modules/util"
|
|
|
|
"xorm.io/builder"
|
|
)
|
|
|
|
var (
|
|
// ErrMirrorNotExist mirror does not exist error
|
|
ErrMirrorNotExist = errors.New("Mirror does not exist")
|
|
|
|
// ErrNameEmpty name is empty error
|
|
ErrNameEmpty = errors.New("Name is empty")
|
|
)
|
|
|
|
var (
|
|
// Gitignores contains the gitiginore files
|
|
Gitignores []string
|
|
|
|
// Licenses contains the license files
|
|
Licenses []string
|
|
|
|
// Readmes contains the readme files
|
|
Readmes []string
|
|
|
|
// LabelTemplates contains the label template files and the list of labels for each file
|
|
LabelTemplates map[string]string
|
|
|
|
// ItemsPerPage maximum items per page in forks, watchers and stars of a repo
|
|
ItemsPerPage = 40
|
|
)
|
|
|
|
// loadRepoConfig loads the repository config
|
|
func loadRepoConfig() {
|
|
// Load .gitignore and license files and readme templates.
|
|
types := []string{"gitignore", "license", "readme", "label"}
|
|
typeFiles := make([][]string, 4)
|
|
for i, t := range types {
|
|
files, err := options.Dir(t)
|
|
if err != nil {
|
|
log.Fatal("Failed to get %s files: %v", t, err)
|
|
}
|
|
customPath := path.Join(setting.CustomPath, "options", t)
|
|
isDir, err := util.IsDir(customPath)
|
|
if err != nil {
|
|
log.Fatal("Failed to get custom %s files: %v", t, err)
|
|
}
|
|
if isDir {
|
|
customFiles, err := util.StatDir(customPath)
|
|
if err != nil {
|
|
log.Fatal("Failed to get custom %s files: %v", t, err)
|
|
}
|
|
|
|
for _, f := range customFiles {
|
|
if !util.IsStringInSlice(f, files, true) {
|
|
files = append(files, f)
|
|
}
|
|
}
|
|
}
|
|
typeFiles[i] = files
|
|
}
|
|
|
|
Gitignores = typeFiles[0]
|
|
Licenses = typeFiles[1]
|
|
Readmes = typeFiles[2]
|
|
LabelTemplatesFiles := typeFiles[3]
|
|
sort.Strings(Gitignores)
|
|
sort.Strings(Licenses)
|
|
sort.Strings(Readmes)
|
|
sort.Strings(LabelTemplatesFiles)
|
|
|
|
// Load label templates
|
|
LabelTemplates = make(map[string]string)
|
|
for _, templateFile := range LabelTemplatesFiles {
|
|
labels, err := LoadLabelsFormatted(templateFile)
|
|
if err != nil {
|
|
log.Error("Failed to load labels: %v", err)
|
|
}
|
|
LabelTemplates[templateFile] = labels
|
|
}
|
|
|
|
// Filter out invalid names and promote preferred licenses.
|
|
sortedLicenses := make([]string, 0, len(Licenses))
|
|
for _, name := range setting.Repository.PreferredLicenses {
|
|
if util.IsStringInSlice(name, Licenses, true) {
|
|
sortedLicenses = append(sortedLicenses, name)
|
|
}
|
|
}
|
|
for _, name := range Licenses {
|
|
if !util.IsStringInSlice(name, setting.Repository.PreferredLicenses, true) {
|
|
sortedLicenses = append(sortedLicenses, name)
|
|
}
|
|
}
|
|
Licenses = sortedLicenses
|
|
}
|
|
|
|
// NewRepoContext creates a new repository context
|
|
func NewRepoContext() {
|
|
loadRepoConfig()
|
|
loadUnitConfig()
|
|
|
|
RemoveAllWithNotice("Clean up repository temporary data", filepath.Join(setting.AppDataPath, "tmp"))
|
|
}
|
|
|
|
// RepositoryStatus defines the status of repository
|
|
type RepositoryStatus int
|
|
|
|
// all kinds of RepositoryStatus
|
|
const (
|
|
RepositoryReady RepositoryStatus = iota // a normal repository
|
|
RepositoryBeingMigrated // repository is migrating
|
|
RepositoryPendingTransfer // repository pending in ownership transfer state
|
|
)
|
|
|
|
// TrustModelType defines the types of trust model for this repository
|
|
type TrustModelType int
|
|
|
|
// kinds of TrustModel
|
|
const (
|
|
DefaultTrustModel TrustModelType = iota // default trust model
|
|
CommitterTrustModel
|
|
CollaboratorTrustModel
|
|
CollaboratorCommitterTrustModel
|
|
)
|
|
|
|
// String converts a TrustModelType to a string
|
|
func (t TrustModelType) String() string {
|
|
switch t {
|
|
case DefaultTrustModel:
|
|
return "default"
|
|
case CommitterTrustModel:
|
|
return "committer"
|
|
case CollaboratorTrustModel:
|
|
return "collaborator"
|
|
case CollaboratorCommitterTrustModel:
|
|
return "collaboratorcommitter"
|
|
}
|
|
return "default"
|
|
}
|
|
|
|
// ToTrustModel converts a string to a TrustModelType
|
|
func ToTrustModel(model string) TrustModelType {
|
|
switch strings.ToLower(strings.TrimSpace(model)) {
|
|
case "default":
|
|
return DefaultTrustModel
|
|
case "collaborator":
|
|
return CollaboratorTrustModel
|
|
case "committer":
|
|
return CommitterTrustModel
|
|
case "collaboratorcommitter":
|
|
return CollaboratorCommitterTrustModel
|
|
}
|
|
return DefaultTrustModel
|
|
}
|
|
|
|
// Repository represents a git repository.
|
|
type Repository struct {
|
|
ID int64 `xorm:"pk autoincr"`
|
|
OwnerID int64 `xorm:"UNIQUE(s) index"`
|
|
OwnerName string
|
|
Owner *User `xorm:"-"`
|
|
LowerName string `xorm:"UNIQUE(s) INDEX NOT NULL"`
|
|
Name string `xorm:"INDEX NOT NULL"`
|
|
Description string `xorm:"TEXT"`
|
|
Website string `xorm:"VARCHAR(2048)"`
|
|
OriginalServiceType api.GitServiceType `xorm:"index"`
|
|
OriginalURL string `xorm:"VARCHAR(2048)"`
|
|
DefaultBranch string
|
|
|
|
NumWatches int
|
|
NumStars int
|
|
NumForks int
|
|
NumIssues int
|
|
NumClosedIssues int
|
|
NumOpenIssues int `xorm:"-"`
|
|
NumPulls int
|
|
NumClosedPulls int
|
|
NumOpenPulls int `xorm:"-"`
|
|
NumMilestones int `xorm:"NOT NULL DEFAULT 0"`
|
|
NumClosedMilestones int `xorm:"NOT NULL DEFAULT 0"`
|
|
NumOpenMilestones int `xorm:"-"`
|
|
NumProjects int `xorm:"NOT NULL DEFAULT 0"`
|
|
NumClosedProjects int `xorm:"NOT NULL DEFAULT 0"`
|
|
NumOpenProjects int `xorm:"-"`
|
|
|
|
IsPrivate bool `xorm:"INDEX"`
|
|
IsEmpty bool `xorm:"INDEX"`
|
|
IsArchived bool `xorm:"INDEX"`
|
|
IsMirror bool `xorm:"INDEX"`
|
|
*Mirror `xorm:"-"`
|
|
PushMirrors []*PushMirror `xorm:"-"`
|
|
Status RepositoryStatus `xorm:"NOT NULL DEFAULT 0"`
|
|
|
|
RenderingMetas map[string]string `xorm:"-"`
|
|
DocumentRenderingMetas map[string]string `xorm:"-"`
|
|
Units []*RepoUnit `xorm:"-"`
|
|
PrimaryLanguage *LanguageStat `xorm:"-"`
|
|
|
|
IsFork bool `xorm:"INDEX NOT NULL DEFAULT false"`
|
|
ForkID int64 `xorm:"INDEX"`
|
|
BaseRepo *Repository `xorm:"-"`
|
|
IsTemplate bool `xorm:"INDEX NOT NULL DEFAULT false"`
|
|
TemplateID int64 `xorm:"INDEX"`
|
|
TemplateRepo *Repository `xorm:"-"`
|
|
Size int64 `xorm:"NOT NULL DEFAULT 0"`
|
|
CodeIndexerStatus *RepoIndexerStatus `xorm:"-"`
|
|
StatsIndexerStatus *RepoIndexerStatus `xorm:"-"`
|
|
IsFsckEnabled bool `xorm:"NOT NULL DEFAULT true"`
|
|
CloseIssuesViaCommitInAnyBranch bool `xorm:"NOT NULL DEFAULT false"`
|
|
Topics []string `xorm:"TEXT JSON"`
|
|
|
|
TrustModel TrustModelType
|
|
|
|
// Avatar: ID(10-20)-md5(32) - must fit into 64 symbols
|
|
Avatar string `xorm:"VARCHAR(64)"`
|
|
|
|
CreatedUnix timeutil.TimeStamp `xorm:"INDEX created"`
|
|
UpdatedUnix timeutil.TimeStamp `xorm:"INDEX updated"`
|
|
}
|
|
|
|
// SanitizedOriginalURL returns a sanitized OriginalURL
|
|
func (repo *Repository) SanitizedOriginalURL() string {
|
|
if repo.OriginalURL == "" {
|
|
return ""
|
|
}
|
|
u, err := url.Parse(repo.OriginalURL)
|
|
if err != nil {
|
|
return ""
|
|
}
|
|
u.User = nil
|
|
return u.String()
|
|
}
|
|
|
|
// ColorFormat returns a colored string to represent this repo
|
|
func (repo *Repository) ColorFormat(s fmt.State) {
|
|
log.ColorFprintf(s, "%d:%s/%s",
|
|
log.NewColoredIDValue(repo.ID),
|
|
repo.OwnerName,
|
|
repo.Name)
|
|
}
|
|
|
|
// IsBeingMigrated indicates that repository is being migrated
|
|
func (repo *Repository) IsBeingMigrated() bool {
|
|
return repo.Status == RepositoryBeingMigrated
|
|
}
|
|
|
|
// IsBeingCreated indicates that repository is being migrated or forked
|
|
func (repo *Repository) IsBeingCreated() bool {
|
|
return repo.IsBeingMigrated()
|
|
}
|
|
|
|
// AfterLoad is invoked from XORM after setting the values of all fields of this object.
|
|
func (repo *Repository) AfterLoad() {
|
|
// FIXME: use models migration to solve all at once.
|
|
if len(repo.DefaultBranch) == 0 {
|
|
repo.DefaultBranch = setting.Repository.DefaultBranch
|
|
}
|
|
|
|
repo.NumOpenIssues = repo.NumIssues - repo.NumClosedIssues
|
|
repo.NumOpenPulls = repo.NumPulls - repo.NumClosedPulls
|
|
repo.NumOpenMilestones = repo.NumMilestones - repo.NumClosedMilestones
|
|
repo.NumOpenProjects = repo.NumProjects - repo.NumClosedProjects
|
|
}
|
|
|
|
// MustOwner always returns a valid *User object to avoid
|
|
// conceptually impossible error handling.
|
|
// It creates a fake object that contains error details
|
|
// when error occurs.
|
|
func (repo *Repository) MustOwner() *User {
|
|
return repo.mustOwner(x)
|
|
}
|
|
|
|
// FullName returns the repository full name
|
|
func (repo *Repository) FullName() string {
|
|
return repo.OwnerName + "/" + repo.Name
|
|
}
|
|
|
|
// HTMLURL returns the repository HTML URL
|
|
func (repo *Repository) HTMLURL() string {
|
|
return setting.AppURL + repo.FullName()
|
|
}
|
|
|
|
// CommitLink make link to by commit full ID
|
|
// note: won't check whether it's an right id
|
|
func (repo *Repository) CommitLink(commitID string) (result string) {
|
|
if commitID == "" || commitID == "0000000000000000000000000000000000000000" {
|
|
result = ""
|
|
} else {
|
|
result = repo.HTMLURL() + "/commit/" + commitID
|
|
}
|
|
return
|
|
}
|
|
|
|
// APIURL returns the repository API URL
|
|
func (repo *Repository) APIURL() string {
|
|
return setting.AppURL + "api/v1/repos/" + repo.FullName()
|
|
}
|
|
|
|
// GetCommitsCountCacheKey returns cache key used for commits count caching.
|
|
func (repo *Repository) GetCommitsCountCacheKey(contextName string, isRef bool) string {
|
|
var prefix string
|
|
if isRef {
|
|
prefix = "ref"
|
|
} else {
|
|
prefix = "commit"
|
|
}
|
|
return fmt.Sprintf("commits-count-%d-%s-%s", repo.ID, prefix, contextName)
|
|
}
|
|
|
|
func (repo *Repository) getUnits(e Engine) (err error) {
|
|
if repo.Units != nil {
|
|
return nil
|
|
}
|
|
|
|
repo.Units, err = getUnitsByRepoID(e, repo.ID)
|
|
log.Trace("repo.Units: %-+v", repo.Units)
|
|
return err
|
|
}
|
|
|
|
// CheckUnitUser check whether user could visit the unit of this repository
|
|
func (repo *Repository) CheckUnitUser(user *User, unitType UnitType) bool {
|
|
return repo.checkUnitUser(x, user, unitType)
|
|
}
|
|
|
|
func (repo *Repository) checkUnitUser(e Engine, user *User, unitType UnitType) bool {
|
|
if user.IsAdmin {
|
|
return true
|
|
}
|
|
perm, err := getUserRepoPermission(e, repo, user)
|
|
if err != nil {
|
|
log.Error("getUserRepoPermission(): %v", err)
|
|
return false
|
|
}
|
|
|
|
return perm.CanRead(unitType)
|
|
}
|
|
|
|
// UnitEnabled if this repository has the given unit enabled
|
|
func (repo *Repository) UnitEnabled(tp UnitType) bool {
|
|
if err := repo.getUnits(x); err != nil {
|
|
log.Warn("Error loading repository (ID: %d) units: %s", repo.ID, err.Error())
|
|
}
|
|
for _, unit := range repo.Units {
|
|
if unit.Type == tp {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// ErrUnitTypeNotExist represents a "UnitTypeNotExist" kind of error.
|
|
type ErrUnitTypeNotExist struct {
|
|
UT UnitType
|
|
}
|
|
|
|
// IsErrUnitTypeNotExist checks if an error is a ErrUnitNotExist.
|
|
func IsErrUnitTypeNotExist(err error) bool {
|
|
_, ok := err.(ErrUnitTypeNotExist)
|
|
return ok
|
|
}
|
|
|
|
func (err ErrUnitTypeNotExist) Error() string {
|
|
return fmt.Sprintf("Unit type does not exist: %s", err.UT.String())
|
|
}
|
|
|
|
// MustGetUnit always returns a RepoUnit object
|
|
func (repo *Repository) MustGetUnit(tp UnitType) *RepoUnit {
|
|
ru, err := repo.GetUnit(tp)
|
|
if err == nil {
|
|
return ru
|
|
}
|
|
|
|
if tp == UnitTypeExternalWiki {
|
|
return &RepoUnit{
|
|
Type: tp,
|
|
Config: new(ExternalWikiConfig),
|
|
}
|
|
} else if tp == UnitTypeExternalTracker {
|
|
return &RepoUnit{
|
|
Type: tp,
|
|
Config: new(ExternalTrackerConfig),
|
|
}
|
|
} else if tp == UnitTypePullRequests {
|
|
return &RepoUnit{
|
|
Type: tp,
|
|
Config: new(PullRequestsConfig),
|
|
}
|
|
} else if tp == UnitTypeIssues {
|
|
return &RepoUnit{
|
|
Type: tp,
|
|
Config: new(IssuesConfig),
|
|
}
|
|
}
|
|
return &RepoUnit{
|
|
Type: tp,
|
|
Config: new(UnitConfig),
|
|
}
|
|
}
|
|
|
|
// GetUnit returns a RepoUnit object
|
|
func (repo *Repository) GetUnit(tp UnitType) (*RepoUnit, error) {
|
|
return repo.getUnit(x, tp)
|
|
}
|
|
|
|
func (repo *Repository) getUnit(e Engine, tp UnitType) (*RepoUnit, error) {
|
|
if err := repo.getUnits(e); err != nil {
|
|
return nil, err
|
|
}
|
|
for _, unit := range repo.Units {
|
|
if unit.Type == tp {
|
|
return unit, nil
|
|
}
|
|
}
|
|
return nil, ErrUnitTypeNotExist{tp}
|
|
}
|
|
|
|
func (repo *Repository) getOwner(e Engine) (err error) {
|
|
if repo.Owner != nil {
|
|
return nil
|
|
}
|
|
|
|
repo.Owner, err = getUserByID(e, repo.OwnerID)
|
|
return err
|
|
}
|
|
|
|
// GetOwner returns the repository owner
|
|
func (repo *Repository) GetOwner() error {
|
|
return repo.getOwner(x)
|
|
}
|
|
|
|
func (repo *Repository) mustOwner(e Engine) *User {
|
|
if err := repo.getOwner(e); err != nil {
|
|
return &User{
|
|
Name: "error",
|
|
FullName: err.Error(),
|
|
}
|
|
}
|
|
|
|
return repo.Owner
|
|
}
|
|
|
|
// ComposeMetas composes a map of metas for properly rendering issue links and external issue trackers.
|
|
func (repo *Repository) ComposeMetas() map[string]string {
|
|
if len(repo.RenderingMetas) == 0 {
|
|
metas := map[string]string{
|
|
"user": repo.OwnerName,
|
|
"repo": repo.Name,
|
|
"repoPath": repo.RepoPath(),
|
|
"mode": "comment",
|
|
}
|
|
|
|
unit, err := repo.GetUnit(UnitTypeExternalTracker)
|
|
if err == nil {
|
|
metas["format"] = unit.ExternalTrackerConfig().ExternalTrackerFormat
|
|
switch unit.ExternalTrackerConfig().ExternalTrackerStyle {
|
|
case markup.IssueNameStyleAlphanumeric:
|
|
metas["style"] = markup.IssueNameStyleAlphanumeric
|
|
default:
|
|
metas["style"] = markup.IssueNameStyleNumeric
|
|
}
|
|
}
|
|
|
|
repo.MustOwner()
|
|
if repo.Owner.IsOrganization() {
|
|
teams := make([]string, 0, 5)
|
|
_ = x.Table("team_repo").
|
|
Join("INNER", "team", "team.id = team_repo.team_id").
|
|
Where("team_repo.repo_id = ?", repo.ID).
|
|
Select("team.lower_name").
|
|
OrderBy("team.lower_name").
|
|
Find(&teams)
|
|
metas["teams"] = "," + strings.Join(teams, ",") + ","
|
|
metas["org"] = strings.ToLower(repo.OwnerName)
|
|
}
|
|
|
|
repo.RenderingMetas = metas
|
|
}
|
|
return repo.RenderingMetas
|
|
}
|
|
|
|
// ComposeDocumentMetas composes a map of metas for properly rendering documents
|
|
func (repo *Repository) ComposeDocumentMetas() map[string]string {
|
|
if len(repo.DocumentRenderingMetas) == 0 {
|
|
metas := map[string]string{}
|
|
for k, v := range repo.ComposeMetas() {
|
|
metas[k] = v
|
|
}
|
|
metas["mode"] = "document"
|
|
repo.DocumentRenderingMetas = metas
|
|
}
|
|
return repo.DocumentRenderingMetas
|
|
}
|
|
|
|
// DeleteWiki removes the actual and local copy of repository wiki.
|
|
func (repo *Repository) DeleteWiki() error {
|
|
return repo.deleteWiki(x)
|
|
}
|
|
|
|
func (repo *Repository) deleteWiki(e Engine) error {
|
|
wikiPaths := []string{repo.WikiPath()}
|
|
for _, wikiPath := range wikiPaths {
|
|
removeAllWithNotice(e, "Delete repository wiki", wikiPath)
|
|
}
|
|
|
|
_, err := e.Where("repo_id = ?", repo.ID).And("type = ?", UnitTypeWiki).Delete(new(RepoUnit))
|
|
return err
|
|
}
|
|
|
|
func (repo *Repository) getAssignees(e Engine) (_ []*User, err error) {
|
|
if err = repo.getOwner(e); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
accesses := make([]*Access, 0, 10)
|
|
if err = e.
|
|
Where("repo_id = ? AND mode >= ?", repo.ID, AccessModeWrite).
|
|
Find(&accesses); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Leave a seat for owner itself to append later, but if owner is an organization
|
|
// and just waste 1 unit is cheaper than re-allocate memory once.
|
|
users := make([]*User, 0, len(accesses)+1)
|
|
if len(accesses) > 0 {
|
|
userIDs := make([]int64, len(accesses))
|
|
for i := 0; i < len(accesses); i++ {
|
|
userIDs[i] = accesses[i].UserID
|
|
}
|
|
|
|
if err = e.In("id", userIDs).Find(&users); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
if !repo.Owner.IsOrganization() {
|
|
users = append(users, repo.Owner)
|
|
}
|
|
|
|
return users, nil
|
|
}
|
|
|
|
// GetAssignees returns all users that have write access and can be assigned to issues
|
|
// of the repository,
|
|
func (repo *Repository) GetAssignees() (_ []*User, err error) {
|
|
return repo.getAssignees(x)
|
|
}
|
|
|
|
func (repo *Repository) getReviewers(e Engine, doerID, posterID int64) ([]*User, error) {
|
|
// Get the owner of the repository - this often already pre-cached and if so saves complexity for the following queries
|
|
if err := repo.getOwner(e); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var users []*User
|
|
|
|
if repo.IsPrivate || repo.Owner.Visibility == api.VisibleTypePrivate {
|
|
// This a private repository:
|
|
// Anyone who can read the repository is a requestable reviewer
|
|
if err := e.
|
|
SQL("SELECT * FROM `user` WHERE id in (SELECT user_id FROM `access` WHERE repo_id = ? AND mode >= ? AND user_id NOT IN ( ?, ?)) ORDER BY name",
|
|
repo.ID, AccessModeRead,
|
|
doerID, posterID).
|
|
Find(&users); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return users, nil
|
|
}
|
|
|
|
// This is a "public" repository:
|
|
// Any user that has read access, is a watcher or organization member can be requested to review
|
|
if err := e.
|
|
SQL("SELECT * FROM `user` WHERE id IN ( "+
|
|
"SELECT user_id FROM `access` WHERE repo_id = ? AND mode >= ? "+
|
|
"UNION "+
|
|
"SELECT user_id FROM `watch` WHERE repo_id = ? AND mode IN (?, ?) "+
|
|
"UNION "+
|
|
"SELECT uid AS user_id FROM `org_user` WHERE org_id = ? "+
|
|
") AND id NOT IN (?, ?) ORDER BY name",
|
|
repo.ID, AccessModeRead,
|
|
repo.ID, RepoWatchModeNormal, RepoWatchModeAuto,
|
|
repo.OwnerID,
|
|
doerID, posterID).
|
|
Find(&users); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return users, nil
|
|
}
|
|
|
|
// GetReviewers get all users can be requested to review:
|
|
// * for private repositories this returns all users that have read access or higher to the repository.
|
|
// * for public repositories this returns all users that have read access or higher to the repository,
|
|
// all repo watchers and all organization members.
|
|
// TODO: may be we should have a busy choice for users to block review request to them.
|
|
func (repo *Repository) GetReviewers(doerID, posterID int64) ([]*User, error) {
|
|
return repo.getReviewers(x, doerID, posterID)
|
|
}
|
|
|
|
// GetReviewerTeams get all teams can be requested to review
|
|
func (repo *Repository) GetReviewerTeams() ([]*Team, error) {
|
|
if err := repo.GetOwner(); err != nil {
|
|
return nil, err
|
|
}
|
|
if !repo.Owner.IsOrganization() {
|
|
return nil, nil
|
|
}
|
|
|
|
teams, err := GetTeamsWithAccessToRepo(repo.OwnerID, repo.ID, AccessModeRead)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return teams, err
|
|
}
|
|
|
|
// GetMilestoneByID returns the milestone belongs to repository by given ID.
|
|
func (repo *Repository) GetMilestoneByID(milestoneID int64) (*Milestone, error) {
|
|
return GetMilestoneByRepoID(repo.ID, milestoneID)
|
|
}
|
|
|
|
// IssueStats returns number of open and closed repository issues by given filter mode.
|
|
func (repo *Repository) IssueStats(uid int64, filterMode int, isPull bool) (int64, int64) {
|
|
return GetRepoIssueStats(repo.ID, uid, filterMode, isPull)
|
|
}
|
|
|
|
// GetMirror sets the repository mirror, returns an error upon failure
|
|
func (repo *Repository) GetMirror() (err error) {
|
|
repo.Mirror, err = GetMirrorByRepoID(repo.ID)
|
|
return err
|
|
}
|
|
|
|
// LoadPushMirrors populates the repository push mirrors.
|
|
func (repo *Repository) LoadPushMirrors() (err error) {
|
|
repo.PushMirrors, err = GetPushMirrorsByRepoID(repo.ID)
|
|
return err
|
|
}
|
|
|
|
// GetBaseRepo populates repo.BaseRepo for a fork repository and
|
|
// returns an error on failure (NOTE: no error is returned for
|
|
// non-fork repositories, and BaseRepo will be left untouched)
|
|
func (repo *Repository) GetBaseRepo() (err error) {
|
|
return repo.getBaseRepo(x)
|
|
}
|
|
|
|
func (repo *Repository) getBaseRepo(e Engine) (err error) {
|
|
if !repo.IsFork {
|
|
return nil
|
|
}
|
|
|
|
repo.BaseRepo, err = getRepositoryByID(e, repo.ForkID)
|
|
return err
|
|
}
|
|
|
|
// IsGenerated returns whether _this_ repository was generated from a template
|
|
func (repo *Repository) IsGenerated() bool {
|
|
return repo.TemplateID != 0
|
|
}
|
|
|
|
// GetTemplateRepo populates repo.TemplateRepo for a generated repository and
|
|
// returns an error on failure (NOTE: no error is returned for
|
|
// non-generated repositories, and TemplateRepo will be left untouched)
|
|
func (repo *Repository) GetTemplateRepo() (err error) {
|
|
return repo.getTemplateRepo(x)
|
|
}
|
|
|
|
func (repo *Repository) getTemplateRepo(e Engine) (err error) {
|
|
if !repo.IsGenerated() {
|
|
return nil
|
|
}
|
|
|
|
repo.TemplateRepo, err = getRepositoryByID(e, repo.TemplateID)
|
|
return err
|
|
}
|
|
|
|
// RepoPath returns the repository path
|
|
func (repo *Repository) RepoPath() string {
|
|
return RepoPath(repo.OwnerName, repo.Name)
|
|
}
|
|
|
|
// GitConfigPath returns the path to a repository's git config/ directory
|
|
func GitConfigPath(repoPath string) string {
|
|
return filepath.Join(repoPath, "config")
|
|
}
|
|
|
|
// GitConfigPath returns the repository git config path
|
|
func (repo *Repository) GitConfigPath() string {
|
|
return GitConfigPath(repo.RepoPath())
|
|
}
|
|
|
|
// RelLink returns the repository relative link
|
|
func (repo *Repository) RelLink() string {
|
|
return "/" + repo.FullName()
|
|
}
|
|
|
|
// Link returns the repository link
|
|
func (repo *Repository) Link() string {
|
|
return setting.AppSubURL + "/" + repo.FullName()
|
|
}
|
|
|
|
// ComposeCompareURL returns the repository comparison URL
|
|
func (repo *Repository) ComposeCompareURL(oldCommitID, newCommitID string) string {
|
|
return fmt.Sprintf("%s/compare/%s...%s", repo.FullName(), oldCommitID, newCommitID)
|
|
}
|
|
|
|
// UpdateDefaultBranch updates the default branch
|
|
func (repo *Repository) UpdateDefaultBranch() error {
|
|
_, err := x.ID(repo.ID).Cols("default_branch").Update(repo)
|
|
return err
|
|
}
|
|
|
|
// IsOwnedBy returns true when user owns this repository
|
|
func (repo *Repository) IsOwnedBy(userID int64) bool {
|
|
return repo.OwnerID == userID
|
|
}
|
|
|
|
func (repo *Repository) updateSize(e Engine) error {
|
|
size, err := util.GetDirectorySize(repo.RepoPath())
|
|
if err != nil {
|
|
return fmt.Errorf("updateSize: %v", err)
|
|
}
|
|
|
|
lfsSize, err := e.Where("repository_id = ?", repo.ID).SumInt(new(LFSMetaObject), "size")
|
|
if err != nil {
|
|
return fmt.Errorf("updateSize: GetLFSMetaObjects: %v", err)
|
|
}
|
|
|
|
repo.Size = size + lfsSize
|
|
_, err = e.ID(repo.ID).Cols("size").NoAutoTime().Update(repo)
|
|
return err
|
|
}
|
|
|
|
// UpdateSize updates the repository size, calculating it using util.GetDirectorySize
|
|
func (repo *Repository) UpdateSize(ctx DBContext) error {
|
|
return repo.updateSize(ctx.e)
|
|
}
|
|
|
|
// CanUserFork returns true if specified user can fork repository.
|
|
func (repo *Repository) CanUserFork(user *User) (bool, error) {
|
|
if user == nil {
|
|
return false, nil
|
|
}
|
|
if repo.OwnerID != user.ID && !user.HasForkedRepo(repo.ID) {
|
|
return true, nil
|
|
}
|
|
if err := user.GetOwnedOrganizations(); err != nil {
|
|
return false, err
|
|
}
|
|
for _, org := range user.OwnedOrgs {
|
|
if repo.OwnerID != org.ID && !org.HasForkedRepo(repo.ID) {
|
|
return true, nil
|
|
}
|
|
}
|
|
return false, nil
|
|
}
|
|
|
|
// CanUserDelete returns true if user could delete the repository
|
|
func (repo *Repository) CanUserDelete(user *User) (bool, error) {
|
|
if user.IsAdmin || user.ID == repo.OwnerID {
|
|
return true, nil
|
|
}
|
|
|
|
if err := repo.GetOwner(); err != nil {
|
|
return false, err
|
|
}
|
|
|
|
if repo.Owner.IsOrganization() {
|
|
isOwner, err := repo.Owner.IsOwnedBy(user.ID)
|
|
if err != nil {
|
|
return false, err
|
|
} else if isOwner {
|
|
return true, nil
|
|
}
|
|
}
|
|
|
|
return false, nil
|
|
}
|
|
|
|
// CanEnablePulls returns true if repository meets the requirements of accepting pulls.
|
|
func (repo *Repository) CanEnablePulls() bool {
|
|
return !repo.IsMirror && !repo.IsEmpty
|
|
}
|
|
|
|
// AllowsPulls returns true if repository meets the requirements of accepting pulls and has them enabled.
|
|
func (repo *Repository) AllowsPulls() bool {
|
|
return repo.CanEnablePulls() && repo.UnitEnabled(UnitTypePullRequests)
|
|
}
|
|
|
|
// CanEnableEditor returns true if repository meets the requirements of web editor.
|
|
func (repo *Repository) CanEnableEditor() bool {
|
|
return !repo.IsMirror
|
|
}
|
|
|
|
// GetReaders returns all users that have explicit read access or higher to the repository.
|
|
func (repo *Repository) GetReaders() (_ []*User, err error) {
|
|
return repo.getUsersWithAccessMode(x, AccessModeRead)
|
|
}
|
|
|
|
// GetWriters returns all users that have write access to the repository.
|
|
func (repo *Repository) GetWriters() (_ []*User, err error) {
|
|
return repo.getUsersWithAccessMode(x, AccessModeWrite)
|
|
}
|
|
|
|
// IsReader returns true if user has explicit read access or higher to the repository.
|
|
func (repo *Repository) IsReader(userID int64) (bool, error) {
|
|
if repo.OwnerID == userID {
|
|
return true, nil
|
|
}
|
|
return x.Where("repo_id = ? AND user_id = ? AND mode >= ?", repo.ID, userID, AccessModeRead).Get(&Access{})
|
|
}
|
|
|
|
// getUsersWithAccessMode returns users that have at least given access mode to the repository.
|
|
func (repo *Repository) getUsersWithAccessMode(e Engine, mode AccessMode) (_ []*User, err error) {
|
|
if err = repo.getOwner(e); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
accesses := make([]*Access, 0, 10)
|
|
if err = e.Where("repo_id = ? AND mode >= ?", repo.ID, mode).Find(&accesses); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Leave a seat for owner itself to append later, but if owner is an organization
|
|
// and just waste 1 unit is cheaper than re-allocate memory once.
|
|
users := make([]*User, 0, len(accesses)+1)
|
|
if len(accesses) > 0 {
|
|
userIDs := make([]int64, len(accesses))
|
|
for i := 0; i < len(accesses); i++ {
|
|
userIDs[i] = accesses[i].UserID
|
|
}
|
|
|
|
if err = e.In("id", userIDs).Find(&users); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
if !repo.Owner.IsOrganization() {
|
|
users = append(users, repo.Owner)
|
|
}
|
|
|
|
return users, nil
|
|
}
|
|
|
|
// DescriptionHTML does special handles to description and return HTML string.
|
|
func (repo *Repository) DescriptionHTML() template.HTML {
|
|
desc, err := markup.RenderDescriptionHTML(&markup.RenderContext{
|
|
URLPrefix: repo.HTMLURL(),
|
|
Metas: repo.ComposeMetas(),
|
|
}, repo.Description)
|
|
if err != nil {
|
|
log.Error("Failed to render description for %s (ID: %d): %v", repo.Name, repo.ID, err)
|
|
return template.HTML(markup.Sanitize(repo.Description))
|
|
}
|
|
return template.HTML(markup.Sanitize(string(desc)))
|
|
}
|
|
|
|
// ReadBy sets repo to be visited by given user.
|
|
func (repo *Repository) ReadBy(userID int64) error {
|
|
return setRepoNotificationStatusReadIfUnread(x, userID, repo.ID)
|
|
}
|
|
|
|
func isRepositoryExist(e Engine, u *User, repoName string) (bool, error) {
|
|
has, err := e.Get(&Repository{
|
|
OwnerID: u.ID,
|
|
LowerName: strings.ToLower(repoName),
|
|
})
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
isDir, err := util.IsDir(RepoPath(u.Name, repoName))
|
|
return has && isDir, err
|
|
}
|
|
|
|
// IsRepositoryExist returns true if the repository with given name under user has already existed.
|
|
func IsRepositoryExist(u *User, repoName string) (bool, error) {
|
|
return isRepositoryExist(x, u, repoName)
|
|
}
|
|
|
|
// CloneLink represents different types of clone URLs of repository.
|
|
type CloneLink struct {
|
|
SSH string
|
|
HTTPS string
|
|
Git string
|
|
}
|
|
|
|
// ComposeHTTPSCloneURL returns HTTPS clone URL based on given owner and repository name.
|
|
func ComposeHTTPSCloneURL(owner, repo string) string {
|
|
return fmt.Sprintf("%s%s/%s.git", setting.AppURL, url.PathEscape(owner), url.PathEscape(repo))
|
|
}
|
|
|
|
func (repo *Repository) cloneLink(isWiki bool) *CloneLink {
|
|
repoName := repo.Name
|
|
if isWiki {
|
|
repoName += ".wiki"
|
|
}
|
|
|
|
sshUser := setting.RunUser
|
|
if setting.SSH.StartBuiltinServer {
|
|
sshUser = setting.SSH.BuiltinServerUser
|
|
}
|
|
|
|
cl := new(CloneLink)
|
|
|
|
// if we have a ipv6 literal we need to put brackets around it
|
|
// for the git cloning to work.
|
|
sshDomain := setting.SSH.Domain
|
|
ip := net.ParseIP(setting.SSH.Domain)
|
|
if ip != nil && ip.To4() == nil {
|
|
sshDomain = "[" + setting.SSH.Domain + "]"
|
|
}
|
|
|
|
if setting.SSH.Port != 22 {
|
|
cl.SSH = fmt.Sprintf("ssh://%s@%s/%s/%s.git", sshUser, net.JoinHostPort(setting.SSH.Domain, strconv.Itoa(setting.SSH.Port)), repo.OwnerName, repoName)
|
|
} else if setting.Repository.UseCompatSSHURI {
|
|
cl.SSH = fmt.Sprintf("ssh://%s@%s/%s/%s.git", sshUser, sshDomain, repo.OwnerName, repoName)
|
|
} else {
|
|
cl.SSH = fmt.Sprintf("%s@%s:%s/%s.git", sshUser, sshDomain, repo.OwnerName, repoName)
|
|
}
|
|
cl.HTTPS = ComposeHTTPSCloneURL(repo.OwnerName, repoName)
|
|
return cl
|
|
}
|
|
|
|
// CloneLink returns clone URLs of repository.
|
|
func (repo *Repository) CloneLink() (cl *CloneLink) {
|
|
return repo.cloneLink(false)
|
|
}
|
|
|
|
// CheckCreateRepository check if could created a repository
|
|
func CheckCreateRepository(doer, u *User, name string, overwriteOrAdopt bool) error {
|
|
if !doer.CanCreateRepo() {
|
|
return ErrReachLimitOfRepo{u.MaxRepoCreation}
|
|
}
|
|
|
|
if err := IsUsableRepoName(name); err != nil {
|
|
return err
|
|
}
|
|
|
|
has, err := isRepositoryExist(x, u, name)
|
|
if err != nil {
|
|
return fmt.Errorf("IsRepositoryExist: %v", err)
|
|
} else if has {
|
|
return ErrRepoAlreadyExist{u.Name, name}
|
|
}
|
|
|
|
isExist, err := util.IsExist(RepoPath(u.Name, name))
|
|
if err != nil {
|
|
log.Error("Unable to check if %s exists. Error: %v", RepoPath(u.Name, name), err)
|
|
return err
|
|
}
|
|
if !overwriteOrAdopt && isExist {
|
|
return ErrRepoFilesAlreadyExist{u.Name, name}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateRepoOptions contains the create repository options
|
|
type CreateRepoOptions struct {
|
|
Name string
|
|
Description string
|
|
OriginalURL string
|
|
GitServiceType api.GitServiceType
|
|
Gitignores string
|
|
IssueLabels string
|
|
License string
|
|
Readme string
|
|
DefaultBranch string
|
|
IsPrivate bool
|
|
IsMirror bool
|
|
IsTemplate bool
|
|
AutoInit bool
|
|
Status RepositoryStatus
|
|
TrustModel TrustModelType
|
|
MirrorInterval string
|
|
}
|
|
|
|
// GetRepoInitFile returns repository init files
|
|
func GetRepoInitFile(tp, name string) ([]byte, error) {
|
|
cleanedName := strings.TrimLeft(path.Clean("/"+name), "/")
|
|
relPath := path.Join("options", tp, cleanedName)
|
|
|
|
// Use custom file when available.
|
|
customPath := path.Join(setting.CustomPath, relPath)
|
|
isFile, err := util.IsFile(customPath)
|
|
if err != nil {
|
|
log.Error("Unable to check if %s is a file. Error: %v", customPath, err)
|
|
}
|
|
if isFile {
|
|
return ioutil.ReadFile(customPath)
|
|
}
|
|
|
|
switch tp {
|
|
case "readme":
|
|
return options.Readme(cleanedName)
|
|
case "gitignore":
|
|
return options.Gitignore(cleanedName)
|
|
case "license":
|
|
return options.License(cleanedName)
|
|
case "label":
|
|
return options.Labels(cleanedName)
|
|
default:
|
|
return []byte{}, fmt.Errorf("Invalid init file type")
|
|
}
|
|
}
|
|
|
|
var (
|
|
reservedRepoNames = []string{".", ".."}
|
|
reservedRepoPatterns = []string{"*.git", "*.wiki", "*.rss", "*.atom"}
|
|
)
|
|
|
|
// IsUsableRepoName returns true when repository is usable
|
|
func IsUsableRepoName(name string) error {
|
|
if alphaDashDotPattern.MatchString(name) {
|
|
// Note: usually this error is normally caught up earlier in the UI
|
|
return ErrNameCharsNotAllowed{Name: name}
|
|
}
|
|
return isUsableName(reservedRepoNames, reservedRepoPatterns, name)
|
|
}
|
|
|
|
// CreateRepository creates a repository for the user/organization.
|
|
func CreateRepository(ctx DBContext, doer, u *User, repo *Repository, overwriteOrAdopt bool) (err error) {
|
|
if err = IsUsableRepoName(repo.Name); err != nil {
|
|
return err
|
|
}
|
|
|
|
has, err := isRepositoryExist(ctx.e, u, repo.Name)
|
|
if err != nil {
|
|
return fmt.Errorf("IsRepositoryExist: %v", err)
|
|
} else if has {
|
|
return ErrRepoAlreadyExist{u.Name, repo.Name}
|
|
}
|
|
|
|
repoPath := RepoPath(u.Name, repo.Name)
|
|
isExist, err := util.IsExist(repoPath)
|
|
if err != nil {
|
|
log.Error("Unable to check if %s exists. Error: %v", repoPath, err)
|
|
return err
|
|
}
|
|
if !overwriteOrAdopt && isExist {
|
|
log.Error("Files already exist in %s and we are not going to adopt or delete.", repoPath)
|
|
return ErrRepoFilesAlreadyExist{
|
|
Uname: u.Name,
|
|
Name: repo.Name,
|
|
}
|
|
}
|
|
|
|
if _, err = ctx.e.Insert(repo); err != nil {
|
|
return err
|
|
}
|
|
if err = deleteRepoRedirect(ctx.e, u.ID, repo.Name); err != nil {
|
|
return err
|
|
}
|
|
|
|
// insert units for repo
|
|
units := make([]RepoUnit, 0, len(DefaultRepoUnits))
|
|
for _, tp := range DefaultRepoUnits {
|
|
if tp == UnitTypeIssues {
|
|
units = append(units, RepoUnit{
|
|
RepoID: repo.ID,
|
|
Type: tp,
|
|
Config: &IssuesConfig{
|
|
EnableTimetracker: setting.Service.DefaultEnableTimetracking,
|
|
AllowOnlyContributorsToTrackTime: setting.Service.DefaultAllowOnlyContributorsToTrackTime,
|
|
EnableDependencies: setting.Service.DefaultEnableDependencies,
|
|
},
|
|
})
|
|
} else if tp == UnitTypePullRequests {
|
|
units = append(units, RepoUnit{
|
|
RepoID: repo.ID,
|
|
Type: tp,
|
|
Config: &PullRequestsConfig{AllowMerge: true, AllowRebase: true, AllowRebaseMerge: true, AllowSquash: true, DefaultMergeStyle: MergeStyleMerge},
|
|
})
|
|
} else {
|
|
units = append(units, RepoUnit{
|
|
RepoID: repo.ID,
|
|
Type: tp,
|
|
})
|
|
}
|
|
}
|
|
|
|
if _, err = ctx.e.Insert(&units); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Remember visibility preference.
|
|
u.LastRepoVisibility = repo.IsPrivate
|
|
if err = updateUserCols(ctx.e, u, "last_repo_visibility"); err != nil {
|
|
return fmt.Errorf("updateUser: %v", err)
|
|
}
|
|
|
|
if _, err = ctx.e.Incr("num_repos").ID(u.ID).Update(new(User)); err != nil {
|
|
return fmt.Errorf("increment user total_repos: %v", err)
|
|
}
|
|
u.NumRepos++
|
|
|
|
// Give access to all members in teams with access to all repositories.
|
|
if u.IsOrganization() {
|
|
if err := u.getTeams(ctx.e); err != nil {
|
|
return fmt.Errorf("GetTeams: %v", err)
|
|
}
|
|
for _, t := range u.Teams {
|
|
if t.IncludesAllRepositories {
|
|
if err := t.addRepository(ctx.e, repo); err != nil {
|
|
return fmt.Errorf("addRepository: %v", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
if isAdmin, err := isUserRepoAdmin(ctx.e, repo, doer); err != nil {
|
|
return fmt.Errorf("isUserRepoAdmin: %v", err)
|
|
} else if !isAdmin {
|
|
// Make creator repo admin if it wan't assigned automatically
|
|
if err = repo.addCollaborator(ctx.e, doer); err != nil {
|
|
return fmt.Errorf("AddCollaborator: %v", err)
|
|
}
|
|
if err = repo.changeCollaborationAccessMode(ctx.e, doer.ID, AccessModeAdmin); err != nil {
|
|
return fmt.Errorf("ChangeCollaborationAccessMode: %v", err)
|
|
}
|
|
}
|
|
} else if err = repo.recalculateAccesses(ctx.e); err != nil {
|
|
// Organization automatically called this in addRepository method.
|
|
return fmt.Errorf("recalculateAccesses: %v", err)
|
|
}
|
|
|
|
if setting.Service.AutoWatchNewRepos {
|
|
if err = watchRepo(ctx.e, doer.ID, repo.ID, true); err != nil {
|
|
return fmt.Errorf("watchRepo: %v", err)
|
|
}
|
|
}
|
|
|
|
if err = copyDefaultWebhooksToRepo(ctx.e, repo.ID); err != nil {
|
|
return fmt.Errorf("copyDefaultWebhooksToRepo: %v", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// CheckDaemonExportOK creates/removes git-daemon-export-ok for git-daemon...
|
|
func (repo *Repository) CheckDaemonExportOK() error {
|
|
return repo.checkDaemonExportOK(x)
|
|
}
|
|
|
|
// CheckDaemonExportOKCtx creates/removes git-daemon-export-ok for git-daemon...
|
|
func (repo *Repository) CheckDaemonExportOKCtx(ctx DBContext) error {
|
|
return repo.checkDaemonExportOK(ctx.e)
|
|
}
|
|
|
|
func (repo *Repository) checkDaemonExportOK(e Engine) error {
|
|
if err := repo.getOwner(e); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Create/Remove git-daemon-export-ok for git-daemon...
|
|
daemonExportFile := path.Join(repo.RepoPath(), `git-daemon-export-ok`)
|
|
|
|
isExist, err := util.IsExist(daemonExportFile)
|
|
if err != nil {
|
|
log.Error("Unable to check if %s exists. Error: %v", daemonExportFile, err)
|
|
return err
|
|
}
|
|
|
|
isPublic := !repo.IsPrivate && repo.Owner.Visibility == api.VisibleTypePublic
|
|
if !isPublic && isExist {
|
|
if err = util.Remove(daemonExportFile); err != nil {
|
|
log.Error("Failed to remove %s: %v", daemonExportFile, err)
|
|
}
|
|
} else if isPublic && !isExist {
|
|
if f, err := os.Create(daemonExportFile); err != nil {
|
|
log.Error("Failed to create %s: %v", daemonExportFile, err)
|
|
} else {
|
|
f.Close()
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func countRepositories(userID int64, private bool) int64 {
|
|
sess := x.Where("id > 0")
|
|
|
|
if userID > 0 {
|
|
sess.And("owner_id = ?", userID)
|
|
}
|
|
if !private {
|
|
sess.And("is_private=?", false)
|
|
}
|
|
|
|
count, err := sess.Count(new(Repository))
|
|
if err != nil {
|
|
log.Error("countRepositories: %v", err)
|
|
}
|
|
return count
|
|
}
|
|
|
|
// CountRepositories returns number of repositories.
|
|
// Argument private only takes effect when it is false,
|
|
// set it true to count all repositories.
|
|
func CountRepositories(private bool) int64 {
|
|
return countRepositories(-1, private)
|
|
}
|
|
|
|
// CountUserRepositories returns number of repositories user owns.
|
|
// Argument private only takes effect when it is false,
|
|
// set it true to count all repositories.
|
|
func CountUserRepositories(userID int64, private bool) int64 {
|
|
return countRepositories(userID, private)
|
|
}
|
|
|
|
// RepoPath returns repository path by given user and repository name.
|
|
func RepoPath(userName, repoName string) string {
|
|
return filepath.Join(UserPath(userName), strings.ToLower(repoName)+".git")
|
|
}
|
|
|
|
// IncrementRepoForkNum increment repository fork number
|
|
func IncrementRepoForkNum(ctx DBContext, repoID int64) error {
|
|
_, err := ctx.e.Exec("UPDATE `repository` SET num_forks=num_forks+1 WHERE id=?", repoID)
|
|
return err
|
|
}
|
|
|
|
// DecrementRepoForkNum decrement repository fork number
|
|
func DecrementRepoForkNum(ctx DBContext, repoID int64) error {
|
|
_, err := ctx.e.Exec("UPDATE `repository` SET num_forks=num_forks-1 WHERE id=?", repoID)
|
|
return err
|
|
}
|
|
|
|
// ChangeRepositoryName changes all corresponding setting from old repository name to new one.
|
|
func ChangeRepositoryName(doer *User, repo *Repository, newRepoName string) (err error) {
|
|
oldRepoName := repo.Name
|
|
newRepoName = strings.ToLower(newRepoName)
|
|
if err = IsUsableRepoName(newRepoName); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := repo.GetOwner(); err != nil {
|
|
return err
|
|
}
|
|
|
|
has, err := IsRepositoryExist(repo.Owner, newRepoName)
|
|
if err != nil {
|
|
return fmt.Errorf("IsRepositoryExist: %v", err)
|
|
} else if has {
|
|
return ErrRepoAlreadyExist{repo.Owner.Name, newRepoName}
|
|
}
|
|
|
|
newRepoPath := RepoPath(repo.Owner.Name, newRepoName)
|
|
if err = util.Rename(repo.RepoPath(), newRepoPath); err != nil {
|
|
return fmt.Errorf("rename repository directory: %v", err)
|
|
}
|
|
|
|
wikiPath := repo.WikiPath()
|
|
isExist, err := util.IsExist(wikiPath)
|
|
if err != nil {
|
|
log.Error("Unable to check if %s exists. Error: %v", wikiPath, err)
|
|
return err
|
|
}
|
|
if isExist {
|
|
if err = util.Rename(wikiPath, WikiPath(repo.Owner.Name, newRepoName)); err != nil {
|
|
return fmt.Errorf("rename repository wiki: %v", err)
|
|
}
|
|
}
|
|
|
|
sess := x.NewSession()
|
|
defer sess.Close()
|
|
if err = sess.Begin(); err != nil {
|
|
return fmt.Errorf("sess.Begin: %v", err)
|
|
}
|
|
|
|
if err := newRepoRedirect(sess, repo.Owner.ID, repo.ID, oldRepoName, newRepoName); err != nil {
|
|
return err
|
|
}
|
|
|
|
return sess.Commit()
|
|
}
|
|
|
|
func getRepositoriesByForkID(e Engine, forkID int64) ([]*Repository, error) {
|
|
repos := make([]*Repository, 0, 10)
|
|
return repos, e.
|
|
Where("fork_id=?", forkID).
|
|
Find(&repos)
|
|
}
|
|
|
|
// GetRepositoriesByForkID returns all repositories with given fork ID.
|
|
func GetRepositoriesByForkID(forkID int64) ([]*Repository, error) {
|
|
return getRepositoriesByForkID(x, forkID)
|
|
}
|
|
|
|
func updateRepository(e Engine, repo *Repository, visibilityChanged bool) (err error) {
|
|
repo.LowerName = strings.ToLower(repo.Name)
|
|
|
|
if utf8.RuneCountInString(repo.Description) > 255 {
|
|
repo.Description = string([]rune(repo.Description)[:255])
|
|
}
|
|
if utf8.RuneCountInString(repo.Website) > 255 {
|
|
repo.Website = string([]rune(repo.Website)[:255])
|
|
}
|
|
|
|
if _, err = e.ID(repo.ID).AllCols().Update(repo); err != nil {
|
|
return fmt.Errorf("update: %v", err)
|
|
}
|
|
|
|
if err = repo.updateSize(e); err != nil {
|
|
log.Error("Failed to update size for repository: %v", err)
|
|
}
|
|
|
|
if visibilityChanged {
|
|
if err = repo.getOwner(e); err != nil {
|
|
return fmt.Errorf("getOwner: %v", err)
|
|
}
|
|
if repo.Owner.IsOrganization() {
|
|
// Organization repository need to recalculate access table when visibility is changed.
|
|
if err = repo.recalculateTeamAccesses(e, 0); err != nil {
|
|
return fmt.Errorf("recalculateTeamAccesses: %v", err)
|
|
}
|
|
}
|
|
|
|
// If repo has become private, we need to set its actions to private.
|
|
if repo.IsPrivate {
|
|
_, err = e.Where("repo_id = ?", repo.ID).Cols("is_private").Update(&Action{
|
|
IsPrivate: true,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// Create/Remove git-daemon-export-ok for git-daemon...
|
|
if err := repo.checkDaemonExportOK(e); err != nil {
|
|
return err
|
|
}
|
|
|
|
forkRepos, err := getRepositoriesByForkID(e, repo.ID)
|
|
if err != nil {
|
|
return fmt.Errorf("getRepositoriesByForkID: %v", err)
|
|
}
|
|
for i := range forkRepos {
|
|
forkRepos[i].IsPrivate = repo.IsPrivate || repo.Owner.Visibility == api.VisibleTypePrivate
|
|
if err = updateRepository(e, forkRepos[i], true); err != nil {
|
|
return fmt.Errorf("updateRepository[%d]: %v", forkRepos[i].ID, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// UpdateRepositoryCtx updates a repository with db context
|
|
func UpdateRepositoryCtx(ctx DBContext, repo *Repository, visibilityChanged bool) error {
|
|
return updateRepository(ctx.e, repo, visibilityChanged)
|
|
}
|
|
|
|
// UpdateRepository updates a repository
|
|
func UpdateRepository(repo *Repository, visibilityChanged bool) (err error) {
|
|
sess := x.NewSession()
|
|
defer sess.Close()
|
|
if err = sess.Begin(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err = updateRepository(sess, repo, visibilityChanged); err != nil {
|
|
return fmt.Errorf("updateRepository: %v", err)
|
|
}
|
|
|
|
return sess.Commit()
|
|
}
|
|
|
|
// UpdateRepositoryOwnerNames updates repository owner_names (this should only be used when the ownerName has changed case)
|
|
func UpdateRepositoryOwnerNames(ownerID int64, ownerName string) error {
|
|
if ownerID == 0 {
|
|
return nil
|
|
}
|
|
sess := x.NewSession()
|
|
defer sess.Close()
|
|
if err := sess.Begin(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if _, err := sess.Where("owner_id = ?", ownerID).Cols("owner_name").Update(&Repository{
|
|
OwnerName: ownerName,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
|
|
return sess.Commit()
|
|
}
|
|
|
|
// UpdateRepositoryUpdatedTime updates a repository's updated time
|
|
func UpdateRepositoryUpdatedTime(repoID int64, updateTime time.Time) error {
|
|
_, err := x.Exec("UPDATE repository SET updated_unix = ? WHERE id = ?", updateTime.Unix(), repoID)
|
|
return err
|
|
}
|
|
|
|
// UpdateRepositoryUnits updates a repository's units
|
|
func UpdateRepositoryUnits(repo *Repository, units []RepoUnit, deleteUnitTypes []UnitType) (err error) {
|
|
sess := x.NewSession()
|
|
defer sess.Close()
|
|
if err = sess.Begin(); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Delete existing settings of units before adding again
|
|
for _, u := range units {
|
|
deleteUnitTypes = append(deleteUnitTypes, u.Type)
|
|
}
|
|
|
|
if _, err = sess.Where("repo_id = ?", repo.ID).In("type", deleteUnitTypes).Delete(new(RepoUnit)); err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(units) > 0 {
|
|
if _, err = sess.Insert(units); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return sess.Commit()
|
|
}
|
|
|
|
// DeleteRepository deletes a repository for a user or organization.
|
|
// make sure if you call this func to close open sessions (sqlite will otherwise get a deadlock)
|
|
func DeleteRepository(doer *User, uid, repoID int64) error {
|
|
sess := x.NewSession()
|
|
defer sess.Close()
|
|
if err := sess.Begin(); err != nil {
|
|
return err
|
|
}
|
|
|
|
// In case is a organization.
|
|
org, err := getUserByID(sess, uid)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if org.IsOrganization() {
|
|
if err = org.getTeams(sess); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
repo := &Repository{OwnerID: uid}
|
|
has, err := sess.ID(repoID).Get(repo)
|
|
if err != nil {
|
|
return err
|
|
} else if !has {
|
|
return ErrRepoNotExist{repoID, uid, "", ""}
|
|
}
|
|
|
|
// Delete Deploy Keys
|
|
deployKeys, err := listDeployKeys(sess, repo.ID, ListOptions{})
|
|
if err != nil {
|
|
return fmt.Errorf("listDeployKeys: %v", err)
|
|
}
|
|
for _, dKey := range deployKeys {
|
|
if err := deleteDeployKey(sess, doer, dKey.ID); err != nil {
|
|
return fmt.Errorf("deleteDeployKeys: %v", err)
|
|
}
|
|
}
|
|
|
|
if cnt, err := sess.ID(repoID).Delete(&Repository{}); err != nil {
|
|
return err
|
|
} else if cnt != 1 {
|
|
return ErrRepoNotExist{repoID, uid, "", ""}
|
|
}
|
|
|
|
if org.IsOrganization() {
|
|
for _, t := range org.Teams {
|
|
if !t.hasRepository(sess, repoID) {
|
|
continue
|
|
} else if err = t.removeRepository(sess, repo, false); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
attachments := make([]*Attachment, 0, 20)
|
|
if err = sess.Join("INNER", "`release`", "`release`.id = `attachment`.release_id").
|
|
Where("`release`.repo_id = ?", repoID).
|
|
Find(&attachments); err != nil {
|
|
return err
|
|
}
|
|
releaseAttachments := make([]string, 0, len(attachments))
|
|
for i := 0; i < len(attachments); i++ {
|
|
releaseAttachments = append(releaseAttachments, attachments[i].RelativePath())
|
|
}
|
|
|
|
if _, err = sess.In("release_id", builder.Select("id").From("`release`").Where(builder.Eq{"`release`.repo_id": repoID})).
|
|
Delete(&Attachment{}); err != nil {
|
|
return err
|
|
}
|
|
|
|
if _, err := sess.Exec("UPDATE `user` SET num_stars=num_stars-1 WHERE id IN (SELECT `uid` FROM `star` WHERE repo_id = ?)", repo.ID); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := deleteBeans(sess,
|
|
&Access{RepoID: repo.ID},
|
|
&Action{RepoID: repo.ID},
|
|
&Collaboration{RepoID: repoID},
|
|
&Comment{RefRepoID: repoID},
|
|
&CommitStatus{RepoID: repoID},
|
|
&DeletedBranch{RepoID: repoID},
|
|
&HookTask{RepoID: repoID},
|
|
&LFSLock{RepoID: repoID},
|
|
&LanguageStat{RepoID: repoID},
|
|
&Milestone{RepoID: repoID},
|
|
&Mirror{RepoID: repoID},
|
|
&Notification{RepoID: repoID},
|
|
&ProtectedBranch{RepoID: repoID},
|
|
&ProtectedTag{RepoID: repoID},
|
|
&PullRequest{BaseRepoID: repoID},
|
|
&PushMirror{RepoID: repoID},
|
|
&Release{RepoID: repoID},
|
|
&RepoIndexerStatus{RepoID: repoID},
|
|
&RepoRedirect{RedirectRepoID: repoID},
|
|
&RepoUnit{RepoID: repoID},
|
|
&Star{RepoID: repoID},
|
|
&Task{RepoID: repoID},
|
|
&Watch{RepoID: repoID},
|
|
&Webhook{RepoID: repoID},
|
|
); err != nil {
|
|
return fmt.Errorf("deleteBeans: %v", err)
|
|
}
|
|
|
|
// Delete Labels and related objects
|
|
if err := deleteLabelsByRepoID(sess, repoID); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Delete Issues and related objects
|
|
var attachmentPaths []string
|
|
if attachmentPaths, err = deleteIssuesByRepoID(sess, repoID); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Delete issue index
|
|
if err := deleteResouceIndex(sess, "issue_index", repoID); err != nil {
|
|
return err
|
|
}
|
|
|
|
if repo.IsFork {
|
|
if _, err := sess.Exec("UPDATE `repository` SET num_forks=num_forks-1 WHERE id=?", repo.ForkID); err != nil {
|
|
return fmt.Errorf("decrease fork count: %v", err)
|
|
}
|
|
}
|
|
|
|
if _, err := sess.Exec("UPDATE `user` SET num_repos=num_repos-1 WHERE id=?", uid); err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(repo.Topics) > 0 {
|
|
if err := removeTopicsFromRepo(sess, repo.ID); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
projects, _, err := getProjects(sess, ProjectSearchOptions{
|
|
RepoID: repoID,
|
|
})
|
|
if err != nil {
|
|
return fmt.Errorf("get projects: %v", err)
|
|
}
|
|
for i := range projects {
|
|
if err := deleteProjectByID(sess, projects[i].ID); err != nil {
|
|
return fmt.Errorf("delete project [%d]: %v", projects[i].ID, err)
|
|
}
|
|
}
|
|
|
|
// FIXME: Remove repository files should be executed after transaction succeed.
|
|
repoPath := repo.RepoPath()
|
|
removeAllWithNotice(sess, "Delete repository files", repoPath)
|
|
|
|
err = repo.deleteWiki(sess)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Remove LFS objects
|
|
var lfsObjects []*LFSMetaObject
|
|
if err = sess.Where("repository_id=?", repoID).Find(&lfsObjects); err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, v := range lfsObjects {
|
|
count, err := sess.Count(&LFSMetaObject{Pointer: lfs.Pointer{Oid: v.Oid}})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if count > 1 {
|
|
continue
|
|
}
|
|
|
|
removeStorageWithNotice(sess, storage.LFS, "Delete orphaned LFS file", v.RelativePath())
|
|
}
|
|
|
|
if _, err := sess.Delete(&LFSMetaObject{RepositoryID: repoID}); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Remove archives
|
|
var archives []*RepoArchiver
|
|
if err = sess.Where("repo_id=?", repoID).Find(&archives); err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, v := range archives {
|
|
v.Repo = repo
|
|
p, _ := v.RelativePath()
|
|
removeStorageWithNotice(sess, storage.RepoArchives, "Delete repo archive file", p)
|
|
}
|
|
|
|
if _, err := sess.Delete(&RepoArchiver{RepoID: repoID}); err != nil {
|
|
return err
|
|
}
|
|
|
|
if repo.NumForks > 0 {
|
|
if _, err = sess.Exec("UPDATE `repository` SET fork_id=0,is_fork=? WHERE fork_id=?", false, repo.ID); err != nil {
|
|
log.Error("reset 'fork_id' and 'is_fork': %v", err)
|
|
}
|
|
}
|
|
|
|
if err = sess.Commit(); err != nil {
|
|
return err
|
|
}
|
|
|
|
sess.Close()
|
|
|
|
// We should always delete the files after the database transaction succeed. If
|
|
// we delete the file but the database rollback, the repository will be broken.
|
|
|
|
// Remove issue attachment files.
|
|
for i := range attachmentPaths {
|
|
RemoveStorageWithNotice(storage.Attachments, "Delete issue attachment", attachmentPaths[i])
|
|
}
|
|
|
|
// Remove release attachment files.
|
|
for i := range releaseAttachments {
|
|
RemoveStorageWithNotice(storage.Attachments, "Delete release attachment", releaseAttachments[i])
|
|
}
|
|
|
|
if len(repo.Avatar) > 0 {
|
|
if err := storage.RepoAvatars.Delete(repo.CustomAvatarRelativePath()); err != nil {
|
|
return fmt.Errorf("Failed to remove %s: %v", repo.Avatar, err)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// GetRepositoryByOwnerAndName returns the repository by given ownername and reponame.
|
|
func GetRepositoryByOwnerAndName(ownerName, repoName string) (*Repository, error) {
|
|
return getRepositoryByOwnerAndName(x, ownerName, repoName)
|
|
}
|
|
|
|
func getRepositoryByOwnerAndName(e Engine, ownerName, repoName string) (*Repository, error) {
|
|
var repo Repository
|
|
has, err := e.Table("repository").Select("repository.*").
|
|
Join("INNER", "`user`", "`user`.id = repository.owner_id").
|
|
Where("repository.lower_name = ?", strings.ToLower(repoName)).
|
|
And("`user`.lower_name = ?", strings.ToLower(ownerName)).
|
|
Get(&repo)
|
|
if err != nil {
|
|
return nil, err
|
|
} else if !has {
|
|
return nil, ErrRepoNotExist{0, 0, ownerName, repoName}
|
|
}
|
|
return &repo, nil
|
|
}
|
|
|
|
// GetRepositoryByName returns the repository by given name under user if exists.
|
|
func GetRepositoryByName(ownerID int64, name string) (*Repository, error) {
|
|
repo := &Repository{
|
|
OwnerID: ownerID,
|
|
LowerName: strings.ToLower(name),
|
|
}
|
|
has, err := x.Get(repo)
|
|
if err != nil {
|
|
return nil, err
|
|
} else if !has {
|
|
return nil, ErrRepoNotExist{0, ownerID, "", name}
|
|
}
|
|
return repo, err
|
|
}
|
|
|
|
func getRepositoryByID(e Engine, id int64) (*Repository, error) {
|
|
repo := new(Repository)
|
|
has, err := e.ID(id).Get(repo)
|
|
if err != nil {
|
|
return nil, err
|
|
} else if !has {
|
|
return nil, ErrRepoNotExist{id, 0, "", ""}
|
|
}
|
|
return repo, nil
|
|
}
|
|
|
|
// GetRepositoryByID returns the repository by given id if exists.
|
|
func GetRepositoryByID(id int64) (*Repository, error) {
|
|
return getRepositoryByID(x, id)
|
|
}
|
|
|
|
// GetRepositoryByIDCtx returns the repository by given id if exists.
|
|
func GetRepositoryByIDCtx(ctx DBContext, id int64) (*Repository, error) {
|
|
return getRepositoryByID(ctx.e, id)
|
|
}
|
|
|
|
// GetRepositoriesMapByIDs returns the repositories by given id slice.
|
|
func GetRepositoriesMapByIDs(ids []int64) (map[int64]*Repository, error) {
|
|
repos := make(map[int64]*Repository, len(ids))
|
|
return repos, x.In("id", ids).Find(&repos)
|
|
}
|
|
|
|
// GetUserRepositories returns a list of repositories of given user.
|
|
func GetUserRepositories(opts *SearchRepoOptions) ([]*Repository, int64, error) {
|
|
if len(opts.OrderBy) == 0 {
|
|
opts.OrderBy = "updated_unix DESC"
|
|
}
|
|
|
|
cond := builder.NewCond()
|
|
cond = cond.And(builder.Eq{"owner_id": opts.Actor.ID})
|
|
if !opts.Private {
|
|
cond = cond.And(builder.Eq{"is_private": false})
|
|
}
|
|
|
|
if opts.LowerNames != nil && len(opts.LowerNames) > 0 {
|
|
cond = cond.And(builder.In("lower_name", opts.LowerNames))
|
|
}
|
|
|
|
sess := x.NewSession()
|
|
defer sess.Close()
|
|
|
|
count, err := sess.Where(cond).Count(new(Repository))
|
|
if err != nil {
|
|
return nil, 0, fmt.Errorf("Count: %v", err)
|
|
}
|
|
|
|
sess.Where(cond).OrderBy(opts.OrderBy.String())
|
|
repos := make([]*Repository, 0, opts.PageSize)
|
|
return repos, count, opts.setSessionPagination(sess).Find(&repos)
|
|
}
|
|
|
|
// GetUserMirrorRepositories returns a list of mirror repositories of given user.
|
|
func GetUserMirrorRepositories(userID int64) ([]*Repository, error) {
|
|
repos := make([]*Repository, 0, 10)
|
|
return repos, x.
|
|
Where("owner_id = ?", userID).
|
|
And("is_mirror = ?", true).
|
|
Find(&repos)
|
|
}
|
|
|
|
func getRepositoryCount(e Engine, u *User) (int64, error) {
|
|
return e.Count(&Repository{OwnerID: u.ID})
|
|
}
|
|
|
|
func getPublicRepositoryCount(e Engine, u *User) (int64, error) {
|
|
return e.Where("is_private = ?", false).Count(&Repository{OwnerID: u.ID})
|
|
}
|
|
|
|
func getPrivateRepositoryCount(e Engine, u *User) (int64, error) {
|
|
return e.Where("is_private = ?", true).Count(&Repository{OwnerID: u.ID})
|
|
}
|
|
|
|
// GetRepositoryCount returns the total number of repositories of user.
|
|
func GetRepositoryCount(u *User) (int64, error) {
|
|
return getRepositoryCount(x, u)
|
|
}
|
|
|
|
// GetPublicRepositoryCount returns the total number of public repositories of user.
|
|
func GetPublicRepositoryCount(u *User) (int64, error) {
|
|
return getPublicRepositoryCount(x, u)
|
|
}
|
|
|
|
// GetPrivateRepositoryCount returns the total number of private repositories of user.
|
|
func GetPrivateRepositoryCount(u *User) (int64, error) {
|
|
return getPrivateRepositoryCount(x, u)
|
|
}
|
|
|
|
// DeleteOldRepositoryArchives deletes old repository archives.
|
|
func DeleteOldRepositoryArchives(ctx context.Context, olderThan time.Duration) error {
|
|
log.Trace("Doing: ArchiveCleanup")
|
|
|
|
for {
|
|
var archivers []RepoArchiver
|
|
err := x.Where("created_unix < ?", time.Now().Add(-olderThan).Unix()).
|
|
Asc("created_unix").
|
|
Limit(100).
|
|
Find(&archivers)
|
|
if err != nil {
|
|
log.Trace("Error: ArchiveClean: %v", err)
|
|
return err
|
|
}
|
|
|
|
for _, archiver := range archivers {
|
|
if err := deleteOldRepoArchiver(ctx, &archiver); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if len(archivers) < 100 {
|
|
break
|
|
}
|
|
}
|
|
|
|
log.Trace("Finished: ArchiveCleanup")
|
|
return nil
|
|
}
|
|
|
|
var delRepoArchiver = new(RepoArchiver)
|
|
|
|
func deleteOldRepoArchiver(ctx context.Context, archiver *RepoArchiver) error {
|
|
p, err := archiver.RelativePath()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
_, err = x.ID(archiver.ID).Delete(delRepoArchiver)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if err := storage.RepoArchives.Delete(p); err != nil {
|
|
log.Error("delete repo archive file failed: %v", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
type repoChecker struct {
|
|
querySQL, correctSQL string
|
|
desc string
|
|
}
|
|
|
|
func repoStatsCheck(ctx context.Context, checker *repoChecker) {
|
|
results, err := x.Query(checker.querySQL)
|
|
if err != nil {
|
|
log.Error("Select %s: %v", checker.desc, err)
|
|
return
|
|
}
|
|
for _, result := range results {
|
|
id, _ := strconv.ParseInt(string(result["id"]), 10, 64)
|
|
select {
|
|
case <-ctx.Done():
|
|
log.Warn("CheckRepoStats: Cancelled before checking %s for Repo[%d]", checker.desc, id)
|
|
return
|
|
default:
|
|
}
|
|
log.Trace("Updating %s: %d", checker.desc, id)
|
|
_, err = x.Exec(checker.correctSQL, id, id)
|
|
if err != nil {
|
|
log.Error("Update %s[%d]: %v", checker.desc, id, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
// CheckRepoStats checks the repository stats
|
|
func CheckRepoStats(ctx context.Context) error {
|
|
log.Trace("Doing: CheckRepoStats")
|
|
|
|
checkers := []*repoChecker{
|
|
// Repository.NumWatches
|
|
{
|
|
"SELECT repo.id FROM `repository` repo WHERE repo.num_watches!=(SELECT COUNT(*) FROM `watch` WHERE repo_id=repo.id AND mode<>2)",
|
|
"UPDATE `repository` SET num_watches=(SELECT COUNT(*) FROM `watch` WHERE repo_id=? AND mode<>2) WHERE id=?",
|
|
"repository count 'num_watches'",
|
|
},
|
|
// Repository.NumStars
|
|
{
|
|
"SELECT repo.id FROM `repository` repo WHERE repo.num_stars!=(SELECT COUNT(*) FROM `star` WHERE repo_id=repo.id)",
|
|
"UPDATE `repository` SET num_stars=(SELECT COUNT(*) FROM `star` WHERE repo_id=?) WHERE id=?",
|
|
"repository count 'num_stars'",
|
|
},
|
|
// Label.NumIssues
|
|
{
|
|
"SELECT label.id FROM `label` WHERE label.num_issues!=(SELECT COUNT(*) FROM `issue_label` WHERE label_id=label.id)",
|
|
"UPDATE `label` SET num_issues=(SELECT COUNT(*) FROM `issue_label` WHERE label_id=?) WHERE id=?",
|
|
"label count 'num_issues'",
|
|
},
|
|
// User.NumRepos
|
|
{
|
|
"SELECT `user`.id FROM `user` WHERE `user`.num_repos!=(SELECT COUNT(*) FROM `repository` WHERE owner_id=`user`.id)",
|
|
"UPDATE `user` SET num_repos=(SELECT COUNT(*) FROM `repository` WHERE owner_id=?) WHERE id=?",
|
|
"user count 'num_repos'",
|
|
},
|
|
// Issue.NumComments
|
|
{
|
|
"SELECT `issue`.id FROM `issue` WHERE `issue`.num_comments!=(SELECT COUNT(*) FROM `comment` WHERE issue_id=`issue`.id AND type=0)",
|
|
"UPDATE `issue` SET num_comments=(SELECT COUNT(*) FROM `comment` WHERE issue_id=? AND type=0) WHERE id=?",
|
|
"issue count 'num_comments'",
|
|
},
|
|
}
|
|
for _, checker := range checkers {
|
|
select {
|
|
case <-ctx.Done():
|
|
log.Warn("CheckRepoStats: Cancelled before %s", checker.desc)
|
|
return ErrCancelledf("before checking %s", checker.desc)
|
|
default:
|
|
repoStatsCheck(ctx, checker)
|
|
}
|
|
}
|
|
|
|
// ***** START: Repository.NumClosedIssues *****
|
|
desc := "repository count 'num_closed_issues'"
|
|
results, err := x.Query("SELECT repo.id FROM `repository` repo WHERE repo.num_closed_issues!=(SELECT COUNT(*) FROM `issue` WHERE repo_id=repo.id AND is_closed=? AND is_pull=?)", true, false)
|
|
if err != nil {
|
|
log.Error("Select %s: %v", desc, err)
|
|
} else {
|
|
for _, result := range results {
|
|
id, _ := strconv.ParseInt(string(result["id"]), 10, 64)
|
|
select {
|
|
case <-ctx.Done():
|
|
log.Warn("CheckRepoStats: Cancelled during %s for repo ID %d", desc, id)
|
|
return ErrCancelledf("during %s for repo ID %d", desc, id)
|
|
default:
|
|
}
|
|
log.Trace("Updating %s: %d", desc, id)
|
|
_, err = x.Exec("UPDATE `repository` SET num_closed_issues=(SELECT COUNT(*) FROM `issue` WHERE repo_id=? AND is_closed=? AND is_pull=?) WHERE id=?", id, true, false, id)
|
|
if err != nil {
|
|
log.Error("Update %s[%d]: %v", desc, id, err)
|
|
}
|
|
}
|
|
}
|
|
// ***** END: Repository.NumClosedIssues *****
|
|
|
|
// ***** START: Repository.NumClosedPulls *****
|
|
desc = "repository count 'num_closed_pulls'"
|
|
results, err = x.Query("SELECT repo.id FROM `repository` repo WHERE repo.num_closed_pulls!=(SELECT COUNT(*) FROM `issue` WHERE repo_id=repo.id AND is_closed=? AND is_pull=?)", true, true)
|
|
if err != nil {
|
|
log.Error("Select %s: %v", desc, err)
|
|
} else {
|
|
for _, result := range results {
|
|
id, _ := strconv.ParseInt(string(result["id"]), 10, 64)
|
|
select {
|
|
case <-ctx.Done():
|
|
log.Warn("CheckRepoStats: Cancelled")
|
|
return ErrCancelledf("during %s for repo ID %d", desc, id)
|
|
default:
|
|
}
|
|
log.Trace("Updating %s: %d", desc, id)
|
|
_, err = x.Exec("UPDATE `repository` SET num_closed_pulls=(SELECT COUNT(*) FROM `issue` WHERE repo_id=? AND is_closed=? AND is_pull=?) WHERE id=?", id, true, true, id)
|
|
if err != nil {
|
|
log.Error("Update %s[%d]: %v", desc, id, err)
|
|
}
|
|
}
|
|
}
|
|
// ***** END: Repository.NumClosedPulls *****
|
|
|
|
// FIXME: use checker when stop supporting old fork repo format.
|
|
// ***** START: Repository.NumForks *****
|
|
results, err = x.Query("SELECT repo.id FROM `repository` repo WHERE repo.num_forks!=(SELECT COUNT(*) FROM `repository` WHERE fork_id=repo.id)")
|
|
if err != nil {
|
|
log.Error("Select repository count 'num_forks': %v", err)
|
|
} else {
|
|
for _, result := range results {
|
|
id, _ := strconv.ParseInt(string(result["id"]), 10, 64)
|
|
select {
|
|
case <-ctx.Done():
|
|
log.Warn("CheckRepoStats: Cancelled")
|
|
return ErrCancelledf("during %s for repo ID %d", desc, id)
|
|
default:
|
|
}
|
|
log.Trace("Updating repository count 'num_forks': %d", id)
|
|
|
|
repo, err := GetRepositoryByID(id)
|
|
if err != nil {
|
|
log.Error("GetRepositoryByID[%d]: %v", id, err)
|
|
continue
|
|
}
|
|
|
|
rawResult, err := x.Query("SELECT COUNT(*) FROM `repository` WHERE fork_id=?", repo.ID)
|
|
if err != nil {
|
|
log.Error("Select count of forks[%d]: %v", repo.ID, err)
|
|
continue
|
|
}
|
|
repo.NumForks = int(parseCountResult(rawResult))
|
|
|
|
if err = UpdateRepository(repo, false); err != nil {
|
|
log.Error("UpdateRepository[%d]: %v", id, err)
|
|
continue
|
|
}
|
|
}
|
|
}
|
|
// ***** END: Repository.NumForks *****
|
|
return nil
|
|
}
|
|
|
|
// SetArchiveRepoState sets if a repo is archived
|
|
func (repo *Repository) SetArchiveRepoState(isArchived bool) (err error) {
|
|
repo.IsArchived = isArchived
|
|
_, err = x.Where("id = ?", repo.ID).Cols("is_archived").NoAutoTime().Update(repo)
|
|
return
|
|
}
|
|
|
|
// ___________ __
|
|
// \_ _____/__________| | __
|
|
// | __)/ _ \_ __ \ |/ /
|
|
// | \( <_> ) | \/ <
|
|
// \___ / \____/|__| |__|_ \
|
|
// \/ \/
|
|
|
|
// HasForkedRepo checks if given user has already forked a repository with given ID.
|
|
func HasForkedRepo(ownerID, repoID int64) (*Repository, bool) {
|
|
repo := new(Repository)
|
|
has, _ := x.
|
|
Where("owner_id=? AND fork_id=?", ownerID, repoID).
|
|
Get(repo)
|
|
return repo, has
|
|
}
|
|
|
|
// CopyLFS copies LFS data from one repo to another
|
|
func CopyLFS(ctx DBContext, newRepo, oldRepo *Repository) error {
|
|
var lfsObjects []*LFSMetaObject
|
|
if err := ctx.e.Where("repository_id=?", oldRepo.ID).Find(&lfsObjects); err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, v := range lfsObjects {
|
|
v.ID = 0
|
|
v.RepositoryID = newRepo.ID
|
|
if _, err := ctx.e.Insert(v); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// GetForks returns all the forks of the repository
|
|
func (repo *Repository) GetForks(listOptions ListOptions) ([]*Repository, error) {
|
|
if listOptions.Page == 0 {
|
|
forks := make([]*Repository, 0, repo.NumForks)
|
|
return forks, x.Find(&forks, &Repository{ForkID: repo.ID})
|
|
}
|
|
|
|
sess := listOptions.getPaginatedSession()
|
|
forks := make([]*Repository, 0, listOptions.PageSize)
|
|
return forks, sess.Find(&forks, &Repository{ForkID: repo.ID})
|
|
}
|
|
|
|
// GetUserFork return user forked repository from this repository, if not forked return nil
|
|
func (repo *Repository) GetUserFork(userID int64) (*Repository, error) {
|
|
var forkedRepo Repository
|
|
has, err := x.Where("fork_id = ?", repo.ID).And("owner_id = ?", userID).Get(&forkedRepo)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if !has {
|
|
return nil, nil
|
|
}
|
|
return &forkedRepo, nil
|
|
}
|
|
|
|
// GetOriginalURLHostname returns the hostname of a URL or the URL
|
|
func (repo *Repository) GetOriginalURLHostname() string {
|
|
u, err := url.Parse(repo.OriginalURL)
|
|
if err != nil {
|
|
return repo.OriginalURL
|
|
}
|
|
|
|
return u.Host
|
|
}
|
|
|
|
// GetTreePathLock returns LSF lock for the treePath
|
|
func (repo *Repository) GetTreePathLock(treePath string) (*LFSLock, error) {
|
|
if setting.LFS.StartServer {
|
|
locks, err := GetLFSLockByRepoID(repo.ID, 0, 0)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
for _, lock := range locks {
|
|
if lock.Path == treePath {
|
|
return lock, nil
|
|
}
|
|
}
|
|
}
|
|
return nil, nil
|
|
}
|
|
|
|
func updateRepositoryCols(e Engine, repo *Repository, cols ...string) error {
|
|
_, err := e.ID(repo.ID).Cols(cols...).Update(repo)
|
|
return err
|
|
}
|
|
|
|
// UpdateRepositoryCols updates repository's columns
|
|
func UpdateRepositoryCols(repo *Repository, cols ...string) error {
|
|
return updateRepositoryCols(x, repo, cols...)
|
|
}
|
|
|
|
// GetTrustModel will get the TrustModel for the repo or the default trust model
|
|
func (repo *Repository) GetTrustModel() TrustModelType {
|
|
trustModel := repo.TrustModel
|
|
if trustModel == DefaultTrustModel {
|
|
trustModel = ToTrustModel(setting.Repository.Signing.DefaultTrustModel)
|
|
if trustModel == DefaultTrustModel {
|
|
return CollaboratorTrustModel
|
|
}
|
|
}
|
|
return trustModel
|
|
}
|
|
|
|
// DoctorUserStarNum recalculate Stars number for all user
|
|
func DoctorUserStarNum() (err error) {
|
|
const batchSize = 100
|
|
sess := x.NewSession()
|
|
defer sess.Close()
|
|
|
|
for start := 0; ; start += batchSize {
|
|
users := make([]User, 0, batchSize)
|
|
if err = sess.Limit(batchSize, start).Where("type = ?", 0).Cols("id").Find(&users); err != nil {
|
|
return
|
|
}
|
|
if len(users) == 0 {
|
|
break
|
|
}
|
|
|
|
if err = sess.Begin(); err != nil {
|
|
return
|
|
}
|
|
|
|
for _, user := range users {
|
|
if _, err = sess.Exec("UPDATE `user` SET num_stars=(SELECT COUNT(*) FROM `star` WHERE uid=?) WHERE id=?", user.ID, user.ID); err != nil {
|
|
return
|
|
}
|
|
}
|
|
|
|
if err = sess.Commit(); err != nil {
|
|
return
|
|
}
|
|
}
|
|
|
|
log.Debug("recalculate Stars number for all user finished")
|
|
|
|
return
|
|
}
|
|
|
|
// IterateRepository iterate repositories
|
|
func IterateRepository(f func(repo *Repository) error) error {
|
|
var start int
|
|
batchSize := setting.Database.IterateBufferSize
|
|
for {
|
|
repos := make([]*Repository, 0, batchSize)
|
|
if err := x.Limit(batchSize, start).Find(&repos); err != nil {
|
|
return err
|
|
}
|
|
if len(repos) == 0 {
|
|
return nil
|
|
}
|
|
start += len(repos)
|
|
|
|
for _, repo := range repos {
|
|
if err := f(repo); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
}
|