0
Fork 0
mirror of https://codeberg.org/forgejo/forgejo.git synced 2024-12-27 09:54:15 -05:00
forgejo/modules/middleware/context.go

243 lines
6.1 KiB
Go
Raw Normal View History

// Copyright 2014 The Gogs Authors. All rights reserved.
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
package middleware
import (
2014-03-15 08:17:16 -05:00
"fmt"
2014-03-22 12:44:02 -05:00
"html/template"
2014-04-15 11:27:29 -05:00
"io"
"net/http"
2014-07-25 23:24:27 -05:00
"path"
2014-03-22 15:40:09 -05:00
"strings"
2014-03-19 08:57:55 -05:00
"time"
2014-07-25 23:24:27 -05:00
"github.com/Unknwon/macaron"
"github.com/macaron-contrib/i18n"
"github.com/macaron-contrib/session"
2014-03-21 08:06:47 -05:00
"github.com/gogits/gogs/models"
"github.com/gogits/gogs/modules/auth"
2014-03-21 08:31:47 -05:00
"github.com/gogits/gogs/modules/base"
2014-07-25 23:24:27 -05:00
"github.com/gogits/gogs/modules/git"
"github.com/gogits/gogs/modules/log"
2014-05-25 19:11:25 -05:00
"github.com/gogits/gogs/modules/setting"
)
2014-03-15 08:17:16 -05:00
// Context represents context of a request.
type Context struct {
2014-07-25 23:24:27 -05:00
*macaron.Context
i18n.Locale
Flash *session.Flash
Session session.Store
User *models.User
IsSigned bool
2014-03-15 11:03:23 -05:00
2014-03-22 12:44:02 -05:00
csrfToken string
2014-03-15 11:03:23 -05:00
Repo struct {
IsOwner bool
IsTrueOwner bool
IsWatching bool
IsBranch bool
IsTag bool
IsCommit bool
HasAccess bool
Repository *models.Repository
Owner *models.User
Commit *git.Commit
Tag *git.Tag
GitRepo *git.Repository
BranchName string
TagName string
CommitId string
RepoLink string
CloneLink struct {
2014-03-19 23:12:33 -05:00
SSH string
HTTPS string
Git string
}
2014-07-25 23:24:27 -05:00
CommitsCount int
Mirror *models.Mirror
2014-03-15 11:03:23 -05:00
}
}
2014-03-15 08:17:16 -05:00
// Query querys form parameter.
func (ctx *Context) Query(name string) string {
ctx.Req.ParseForm()
return ctx.Req.Form.Get(name)
}
// func (ctx *Context) Param(name string) string {
// return ctx.p[name]
// }
2014-05-05 12:08:01 -05:00
// HasError returns true if error occurs in form validation.
func (ctx *Context) HasApiError() bool {
hasErr, ok := ctx.Data["HasError"]
if !ok {
return false
}
return hasErr.(bool)
}
func (ctx *Context) GetErrMsg() string {
return ctx.Data["ErrorMsg"].(string)
}
2014-03-15 09:52:14 -05:00
// HasError returns true if error occurs in form validation.
func (ctx *Context) HasError() bool {
hasErr, ok := ctx.Data["HasError"]
if !ok {
return false
}
2014-04-13 17:12:07 -05:00
ctx.Flash.ErrorMsg = ctx.Data["ErrorMsg"].(string)
ctx.Data["Flash"] = ctx.Flash
2014-03-15 09:52:14 -05:00
return hasErr.(bool)
}
2014-03-20 06:50:26 -05:00
// HTML calls render.HTML underlying but reduce one argument.
2014-07-25 23:24:27 -05:00
func (ctx *Context) HTML(status int, name base.TplName) {
ctx.Render.HTML(status, string(name), ctx.Data)
2014-03-20 06:50:26 -05:00
}
2014-03-15 09:52:14 -05:00
// RenderWithErr used for page has form validation but need to prompt error to users.
2014-07-25 23:24:27 -05:00
func (ctx *Context) RenderWithErr(msg string, tpl base.TplName, form interface{}) {
2014-04-03 14:50:55 -05:00
if form != nil {
auth.AssignForm(form, ctx.Data)
}
2014-04-10 15:36:50 -05:00
ctx.Flash.ErrorMsg = msg
ctx.Data["Flash"] = ctx.Flash
2014-03-20 06:50:26 -05:00
ctx.HTML(200, tpl)
2014-03-15 09:52:14 -05:00
}
2014-03-15 08:17:16 -05:00
// Handle handles and logs error by given status.
func (ctx *Context) Handle(status int, title string, err error) {
2014-05-01 17:53:41 -05:00
if err != nil {
2014-07-25 23:24:27 -05:00
log.Error(4, "%s: %v", title, err)
if macaron.Env != macaron.PROD {
2014-05-01 17:53:41 -05:00
ctx.Data["ErrorMsg"] = err
}
2014-03-19 03:48:45 -05:00
}
2014-05-01 17:53:41 -05:00
switch status {
case 404:
ctx.Data["Title"] = "Page Not Found"
case 500:
ctx.Data["Title"] = "Internal Server Error"
}
ctx.HTML(status, base.TplName(fmt.Sprintf("status/%d", status)))
}
2014-03-22 12:44:02 -05:00
func (ctx *Context) CsrfToken() string {
if len(ctx.csrfToken) > 0 {
return ctx.csrfToken
}
token := ctx.GetCookie("_csrf")
if len(token) == 0 {
token = base.GetRandomString(30)
ctx.SetCookie("_csrf", token)
}
ctx.csrfToken = token
return token
}
func (ctx *Context) CsrfTokenValid() bool {
token := ctx.Query("_csrf")
if token == "" {
token = ctx.Req.Header.Get("X-Csrf-Token")
}
if token == "" {
return false
} else if ctx.csrfToken != token {
return false
}
return true
}
2014-04-15 11:27:29 -05:00
func (ctx *Context) ServeFile(file string, names ...string) {
var name string
if len(names) > 0 {
name = names[0]
} else {
2014-07-25 23:24:27 -05:00
name = path.Base(file)
2014-04-15 11:27:29 -05:00
}
2014-07-25 23:24:27 -05:00
ctx.Resp.Header().Set("Content-Description", "File Transfer")
ctx.Resp.Header().Set("Content-Type", "application/octet-stream")
ctx.Resp.Header().Set("Content-Disposition", "attachment; filename="+name)
ctx.Resp.Header().Set("Content-Transfer-Encoding", "binary")
ctx.Resp.Header().Set("Expires", "0")
ctx.Resp.Header().Set("Cache-Control", "must-revalidate")
ctx.Resp.Header().Set("Pragma", "public")
http.ServeFile(ctx.Resp, ctx.Req, file)
2014-04-15 11:27:29 -05:00
}
func (ctx *Context) ServeContent(name string, r io.ReadSeeker, params ...interface{}) {
modtime := time.Now()
for _, p := range params {
switch v := p.(type) {
case time.Time:
modtime = v
}
}
2014-07-25 23:24:27 -05:00
ctx.Resp.Header().Set("Content-Description", "File Transfer")
ctx.Resp.Header().Set("Content-Type", "application/octet-stream")
ctx.Resp.Header().Set("Content-Disposition", "attachment; filename="+name)
ctx.Resp.Header().Set("Content-Transfer-Encoding", "binary")
ctx.Resp.Header().Set("Expires", "0")
ctx.Resp.Header().Set("Cache-Control", "must-revalidate")
ctx.Resp.Header().Set("Pragma", "public")
http.ServeContent(ctx.Resp, ctx.Req, name, modtime, r)
2014-04-10 13:37:43 -05:00
}
2014-07-25 23:24:27 -05:00
// Contexter initializes a classic context for a request.
func Contexter() macaron.Handler {
return func(c *macaron.Context, l i18n.Locale, sess session.Store, f *session.Flash) {
ctx := &Context{
2014-07-25 23:24:27 -05:00
Context: c,
Locale: l,
Flash: f,
Session: sess,
}
2014-07-25 23:24:27 -05:00
// Cache: setting.Cache,
2014-04-10 13:37:43 -05:00
2014-07-25 23:24:27 -05:00
// Compute current URL for real-time change language.
link := ctx.Req.RequestURI
i := strings.Index(link, "?")
if i > -1 {
link = link[:i]
2014-04-10 13:37:43 -05:00
}
2014-07-25 23:24:27 -05:00
ctx.Data["Link"] = link
2014-04-10 13:37:43 -05:00
2014-07-25 23:24:27 -05:00
ctx.Data["PageStartTime"] = time.Now()
2014-03-22 07:49:53 -05:00
// Get user from session if logined.
2014-07-25 23:24:27 -05:00
ctx.User = auth.SignedInUser(ctx.Req.Header, ctx.Session)
if ctx.User != nil {
ctx.IsSigned = true
ctx.Data["IsSigned"] = ctx.IsSigned
ctx.Data["SignedUser"] = ctx.User
ctx.Data["SignedUserId"] = ctx.User.Id
ctx.Data["SignedUserName"] = ctx.User.Name
2014-03-20 07:02:14 -05:00
ctx.Data["IsAdmin"] = ctx.User.IsAdmin
2014-03-15 07:50:17 -05:00
}
2014-07-24 08:19:59 -05:00
// If request sends files, parse them here otherwise the Query() can't be parsed and the CsrfToken will be invalid.
2014-07-25 23:24:27 -05:00
if ctx.Req.Method == "POST" && strings.Contains(ctx.Req.Header.Get("Content-Type"), "multipart/form-data") {
if err := ctx.Req.ParseMultipartForm(setting.AttachmentMaxSize << 20); err != nil && !strings.Contains(err.Error(), "EOF") { // 32MB max size
ctx.Handle(500, "ParseMultipartForm", err)
2014-07-24 08:19:59 -05:00
return
}
}
2014-03-22 12:44:02 -05:00
// get or create csrf token
ctx.Data["CsrfToken"] = ctx.CsrfToken()
ctx.Data["CsrfTokenHtml"] = template.HTML(`<input type="hidden" name="_csrf" value="` + ctx.csrfToken + `">`)
2014-03-19 08:57:55 -05:00
c.Map(ctx)
}
}