2016-03-13 16:37:44 -05:00
|
|
|
// Copyright 2016 The Gogs Authors. All rights reserved.
|
2019-03-18 21:29:43 -05:00
|
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
2022-11-27 13:20:29 -05:00
|
|
|
// SPDX-License-Identifier: MIT
|
2016-03-13 16:37:44 -05:00
|
|
|
|
|
|
|
package context
|
|
|
|
|
|
|
|
import (
|
2021-01-26 10:36:53 -05:00
|
|
|
"context"
|
2016-03-13 22:20:22 -05:00
|
|
|
"fmt"
|
2020-05-28 11:58:11 -05:00
|
|
|
"net/http"
|
2019-06-26 03:51:32 -05:00
|
|
|
"net/url"
|
2016-03-13 22:20:22 -05:00
|
|
|
"strings"
|
|
|
|
|
2022-01-02 08:12:35 -05:00
|
|
|
"code.gitea.io/gitea/models/auth"
|
2021-12-09 20:27:50 -05:00
|
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
2022-05-02 08:35:45 -05:00
|
|
|
"code.gitea.io/gitea/modules/cache"
|
2019-03-27 04:33:00 -05:00
|
|
|
"code.gitea.io/gitea/modules/git"
|
2022-07-23 01:38:03 -05:00
|
|
|
"code.gitea.io/gitea/modules/httpcache"
|
2016-11-10 11:24:48 -05:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
|
|
|
"code.gitea.io/gitea/modules/setting"
|
2021-01-30 03:55:53 -05:00
|
|
|
"code.gitea.io/gitea/modules/web/middleware"
|
2022-01-02 08:12:35 -05:00
|
|
|
auth_service "code.gitea.io/gitea/services/auth"
|
2016-03-13 16:37:44 -05:00
|
|
|
)
|
|
|
|
|
2021-01-29 10:35:30 -05:00
|
|
|
// APIContext is a specific context for API service
|
2016-03-13 16:37:44 -05:00
|
|
|
type APIContext struct {
|
|
|
|
*Context
|
2016-03-25 17:04:02 -05:00
|
|
|
Org *APIOrganization
|
2016-03-13 16:37:44 -05:00
|
|
|
}
|
|
|
|
|
2021-12-28 08:28:27 -05:00
|
|
|
// Currently, we have the following common fields in error response:
|
|
|
|
// * message: the message for end users (it shouldn't be used for error type detection)
|
|
|
|
// if we need to indicate some errors, we should introduce some new fields like ErrorCode or ErrorType
|
|
|
|
// * url: the swagger document URL
|
|
|
|
|
2017-05-02 08:35:59 -05:00
|
|
|
// APIError is error format response
|
|
|
|
// swagger:response error
|
|
|
|
type APIError struct {
|
|
|
|
Message string `json:"message"`
|
|
|
|
URL string `json:"url"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// APIValidationError is error format response related to input validation
|
|
|
|
// swagger:response validationError
|
|
|
|
type APIValidationError struct {
|
|
|
|
Message string `json:"message"`
|
|
|
|
URL string `json:"url"`
|
|
|
|
}
|
|
|
|
|
2019-12-20 12:07:12 -05:00
|
|
|
// APIInvalidTopicsError is error format response to invalid topics
|
|
|
|
// swagger:response invalidTopicsError
|
|
|
|
type APIInvalidTopicsError struct {
|
2021-12-28 08:28:27 -05:00
|
|
|
Message string `json:"message"`
|
|
|
|
InvalidTopics []string `json:"invalidTopics"`
|
2019-12-20 12:07:12 -05:00
|
|
|
}
|
|
|
|
|
2022-01-20 12:46:10 -05:00
|
|
|
// APIEmpty is an empty response
|
2017-05-02 08:35:59 -05:00
|
|
|
// swagger:response empty
|
|
|
|
type APIEmpty struct{}
|
|
|
|
|
2022-01-20 12:46:10 -05:00
|
|
|
// APIForbiddenError is a forbidden error response
|
2017-05-02 08:35:59 -05:00
|
|
|
// swagger:response forbidden
|
|
|
|
type APIForbiddenError struct {
|
|
|
|
APIError
|
|
|
|
}
|
|
|
|
|
2022-01-20 12:46:10 -05:00
|
|
|
// APINotFound is a not found empty response
|
2017-05-02 08:35:59 -05:00
|
|
|
// swagger:response notFound
|
|
|
|
type APINotFound struct{}
|
|
|
|
|
2022-01-20 12:46:10 -05:00
|
|
|
// APIConflict is a conflict empty response
|
2020-10-30 20:56:34 -05:00
|
|
|
// swagger:response conflict
|
|
|
|
type APIConflict struct{}
|
|
|
|
|
2022-01-20 12:46:10 -05:00
|
|
|
// APIRedirect is a redirect response
|
2017-08-21 06:13:47 -05:00
|
|
|
// swagger:response redirect
|
|
|
|
type APIRedirect struct{}
|
|
|
|
|
2022-01-20 12:46:10 -05:00
|
|
|
// APIString is a string response
|
2020-06-05 06:03:12 -05:00
|
|
|
// swagger:response string
|
|
|
|
type APIString string
|
|
|
|
|
2021-01-23 14:33:43 -05:00
|
|
|
// ServerError responds with error message, status is 500
|
|
|
|
func (ctx *APIContext) ServerError(title string, err error) {
|
|
|
|
ctx.Error(http.StatusInternalServerError, title, err)
|
|
|
|
}
|
|
|
|
|
2020-05-28 11:58:11 -05:00
|
|
|
// Error responds with an error message to client with given obj as the message.
|
2016-03-13 17:49:16 -05:00
|
|
|
// If status is 500, also it prints error to log.
|
|
|
|
func (ctx *APIContext) Error(status int, title string, obj interface{}) {
|
|
|
|
var message string
|
|
|
|
if err, ok := obj.(error); ok {
|
|
|
|
message = err.Error()
|
|
|
|
} else {
|
2020-05-28 11:58:11 -05:00
|
|
|
message = fmt.Sprintf("%s", obj)
|
2016-03-13 17:49:16 -05:00
|
|
|
}
|
|
|
|
|
2020-05-28 11:58:11 -05:00
|
|
|
if status == http.StatusInternalServerError {
|
|
|
|
log.ErrorWithSkip(1, "%s: %s", title, message)
|
2020-06-03 13:17:54 -05:00
|
|
|
|
2022-03-22 02:03:22 -05:00
|
|
|
if setting.IsProd && !(ctx.Doer != nil && ctx.Doer.IsAdmin) {
|
2020-06-03 13:17:54 -05:00
|
|
|
message = ""
|
|
|
|
}
|
2016-03-13 17:49:16 -05:00
|
|
|
}
|
|
|
|
|
2017-05-02 08:35:59 -05:00
|
|
|
ctx.JSON(status, APIError{
|
|
|
|
Message: message,
|
2019-06-12 16:07:24 -05:00
|
|
|
URL: setting.API.SwaggerURL,
|
2016-03-13 17:49:16 -05:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-05-28 11:58:11 -05:00
|
|
|
// InternalServerError responds with an error message to the client with the error as a message
|
|
|
|
// and the file and line of the caller.
|
|
|
|
func (ctx *APIContext) InternalServerError(err error) {
|
|
|
|
log.ErrorWithSkip(1, "InternalServerError: %v", err)
|
|
|
|
|
|
|
|
var message string
|
2022-03-22 02:03:22 -05:00
|
|
|
if !setting.IsProd || (ctx.Doer != nil && ctx.Doer.IsAdmin) {
|
2020-05-28 11:58:11 -05:00
|
|
|
message = err.Error()
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.JSON(http.StatusInternalServerError, APIError{
|
|
|
|
Message: message,
|
|
|
|
URL: setting.API.SwaggerURL,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2021-12-28 08:28:27 -05:00
|
|
|
type apiContextKeyType struct{}
|
|
|
|
|
|
|
|
var apiContextKey = apiContextKeyType{}
|
2021-01-26 10:36:53 -05:00
|
|
|
|
|
|
|
// WithAPIContext set up api context in request
|
|
|
|
func WithAPIContext(req *http.Request, ctx *APIContext) *http.Request {
|
|
|
|
return req.WithContext(context.WithValue(req.Context(), apiContextKey, ctx))
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetAPIContext returns a context for API routes
|
|
|
|
func GetAPIContext(req *http.Request) *APIContext {
|
|
|
|
return req.Context().Value(apiContextKey).(*APIContext)
|
|
|
|
}
|
|
|
|
|
2019-06-26 03:51:32 -05:00
|
|
|
func genAPILinks(curURL *url.URL, total, pageSize, curPage int) []string {
|
|
|
|
page := NewPagination(total, pageSize, curPage, 0)
|
2019-04-19 23:15:19 -05:00
|
|
|
paginater := page.Paginater
|
2016-03-13 22:20:22 -05:00
|
|
|
links := make([]string, 0, 4)
|
2019-06-26 03:51:32 -05:00
|
|
|
|
2019-04-19 23:15:19 -05:00
|
|
|
if paginater.HasNext() {
|
2019-06-26 03:51:32 -05:00
|
|
|
u := *curURL
|
|
|
|
queries := u.Query()
|
|
|
|
queries.Set("page", fmt.Sprintf("%d", paginater.Next()))
|
|
|
|
u.RawQuery = queries.Encode()
|
|
|
|
|
|
|
|
links = append(links, fmt.Sprintf("<%s%s>; rel=\"next\"", setting.AppURL, u.RequestURI()[1:]))
|
2016-03-13 22:20:22 -05:00
|
|
|
}
|
2019-04-19 23:15:19 -05:00
|
|
|
if !paginater.IsLast() {
|
2019-06-26 03:51:32 -05:00
|
|
|
u := *curURL
|
|
|
|
queries := u.Query()
|
|
|
|
queries.Set("page", fmt.Sprintf("%d", paginater.TotalPages()))
|
|
|
|
u.RawQuery = queries.Encode()
|
|
|
|
|
|
|
|
links = append(links, fmt.Sprintf("<%s%s>; rel=\"last\"", setting.AppURL, u.RequestURI()[1:]))
|
2016-03-13 22:20:22 -05:00
|
|
|
}
|
2019-04-19 23:15:19 -05:00
|
|
|
if !paginater.IsFirst() {
|
2019-06-26 03:51:32 -05:00
|
|
|
u := *curURL
|
|
|
|
queries := u.Query()
|
|
|
|
queries.Set("page", "1")
|
|
|
|
u.RawQuery = queries.Encode()
|
|
|
|
|
|
|
|
links = append(links, fmt.Sprintf("<%s%s>; rel=\"first\"", setting.AppURL, u.RequestURI()[1:]))
|
2016-03-13 22:20:22 -05:00
|
|
|
}
|
2019-04-19 23:15:19 -05:00
|
|
|
if paginater.HasPrevious() {
|
2019-06-26 03:51:32 -05:00
|
|
|
u := *curURL
|
|
|
|
queries := u.Query()
|
|
|
|
queries.Set("page", fmt.Sprintf("%d", paginater.Previous()))
|
|
|
|
u.RawQuery = queries.Encode()
|
|
|
|
|
|
|
|
links = append(links, fmt.Sprintf("<%s%s>; rel=\"prev\"", setting.AppURL, u.RequestURI()[1:]))
|
2016-03-13 22:20:22 -05:00
|
|
|
}
|
2019-06-26 03:51:32 -05:00
|
|
|
return links
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetLinkHeader sets pagination link header by given total number and page size.
|
|
|
|
func (ctx *APIContext) SetLinkHeader(total, pageSize int) {
|
2021-07-28 20:42:15 -05:00
|
|
|
links := genAPILinks(ctx.Req.URL, total, pageSize, ctx.FormInt("page"))
|
2016-03-13 22:20:22 -05:00
|
|
|
|
|
|
|
if len(links) > 0 {
|
2021-12-15 01:59:57 -05:00
|
|
|
ctx.RespHeader().Set("Link", strings.Join(links, ","))
|
2021-08-12 07:43:08 -05:00
|
|
|
ctx.AppendAccessControlExposeHeaders("Link")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-22 10:21:11 -05:00
|
|
|
// CheckForOTP validates OTP
|
2019-04-19 03:59:26 -05:00
|
|
|
func (ctx *APIContext) CheckForOTP() {
|
2021-09-17 06:43:47 -05:00
|
|
|
if skip, ok := ctx.Data["SkipLocalTwoFA"]; ok && skip.(bool) {
|
|
|
|
return // Skip 2FA
|
|
|
|
}
|
|
|
|
|
2019-04-19 03:59:26 -05:00
|
|
|
otpHeader := ctx.Req.Header.Get("X-Gitea-OTP")
|
2022-03-22 02:03:22 -05:00
|
|
|
twofa, err := auth.GetTwoFactorByUID(ctx.Context.Doer.ID)
|
2019-04-19 03:59:26 -05:00
|
|
|
if err != nil {
|
2022-01-02 08:12:35 -05:00
|
|
|
if auth.IsErrTwoFactorNotEnrolled(err) {
|
2019-04-19 03:59:26 -05:00
|
|
|
return // No 2FA enrollment for this user
|
|
|
|
}
|
2021-04-05 10:30:52 -05:00
|
|
|
ctx.Context.Error(http.StatusInternalServerError)
|
2019-04-19 03:59:26 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
ok, err := twofa.ValidateTOTP(otpHeader)
|
|
|
|
if err != nil {
|
2021-04-05 10:30:52 -05:00
|
|
|
ctx.Context.Error(http.StatusInternalServerError)
|
2019-04-19 03:59:26 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
if !ok {
|
2022-03-22 23:54:07 -05:00
|
|
|
ctx.Context.Error(http.StatusUnauthorized)
|
2019-04-19 03:59:26 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-02 08:12:35 -05:00
|
|
|
// APIAuth converts auth_service.Auth as a middleware
|
|
|
|
func APIAuth(authMethod auth_service.Method) func(*APIContext) {
|
2021-06-09 12:53:16 -05:00
|
|
|
return func(ctx *APIContext) {
|
|
|
|
// Get user from session if logged in.
|
refactor auth interface to return error when verify failure (#22119)
This PR changed the Auth interface signature from
`Verify(http *http.Request, w http.ResponseWriter, store DataStore, sess
SessionStore) *user_model.User`
to
`Verify(http *http.Request, w http.ResponseWriter, store DataStore, sess
SessionStore) (*user_model.User, error)`.
There is a new return argument `error` which means the verification
condition matched but verify process failed, we should stop the auth
process.
Before this PR, when return a `nil` user, we don't know the reason why
it returned `nil`. If the match condition is not satisfied or it
verified failure? For these two different results, we should have
different handler. If the match condition is not satisfied, we should
try next auth method and if there is no more auth method, it's an
anonymous user. If the condition matched but verify failed, the auth
process should be stop and return immediately.
This will fix #20563
Co-authored-by: KN4CK3R <admin@oldschoolhack.me>
Co-authored-by: Jason Song <i@wolfogre.com>
2022-12-28 00:53:28 -05:00
|
|
|
var err error
|
|
|
|
ctx.Doer, err = authMethod.Verify(ctx.Req, ctx.Resp, ctx, ctx.Session)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(http.StatusUnauthorized, "APIAuth", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-03-22 02:03:22 -05:00
|
|
|
if ctx.Doer != nil {
|
|
|
|
if ctx.Locale.Language() != ctx.Doer.Language {
|
2021-11-20 16:32:37 -05:00
|
|
|
ctx.Locale = middleware.Locale(ctx.Resp, ctx.Req)
|
|
|
|
}
|
2022-01-02 08:12:35 -05:00
|
|
|
ctx.IsBasicAuth = ctx.Data["AuthedMethod"].(string) == auth_service.BasicMethodName
|
2021-06-09 12:53:16 -05:00
|
|
|
ctx.IsSigned = true
|
|
|
|
ctx.Data["IsSigned"] = ctx.IsSigned
|
2022-03-22 02:03:22 -05:00
|
|
|
ctx.Data["SignedUser"] = ctx.Doer
|
|
|
|
ctx.Data["SignedUserID"] = ctx.Doer.ID
|
|
|
|
ctx.Data["SignedUserName"] = ctx.Doer.Name
|
|
|
|
ctx.Data["IsAdmin"] = ctx.Doer.IsAdmin
|
2021-06-09 12:53:16 -05:00
|
|
|
} else {
|
|
|
|
ctx.Data["SignedUserID"] = int64(0)
|
|
|
|
ctx.Data["SignedUserName"] = ""
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-29 10:35:30 -05:00
|
|
|
// APIContexter returns apicontext as middleware
|
2021-01-26 10:36:53 -05:00
|
|
|
func APIContexter() func(http.Handler) http.Handler {
|
|
|
|
return func(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
2022-01-20 12:46:10 -05:00
|
|
|
locale := middleware.Locale(w, req)
|
|
|
|
ctx := APIContext{
|
2021-01-26 10:36:53 -05:00
|
|
|
Context: &Context{
|
2022-04-07 23:22:10 -05:00
|
|
|
Resp: NewResponse(w),
|
|
|
|
Data: map[string]interface{}{},
|
|
|
|
Locale: locale,
|
2022-05-02 08:35:45 -05:00
|
|
|
Cache: cache.GetCache(),
|
2021-01-26 10:36:53 -05:00
|
|
|
Repo: &Repository{
|
|
|
|
PullRequest: &PullRequest{},
|
|
|
|
},
|
|
|
|
Org: &Organization{},
|
|
|
|
},
|
|
|
|
Org: &APIOrganization{},
|
|
|
|
}
|
2022-05-05 09:13:23 -05:00
|
|
|
defer ctx.Close()
|
2021-01-26 10:36:53 -05:00
|
|
|
|
|
|
|
ctx.Req = WithAPIContext(WithContext(req, ctx.Context), &ctx)
|
|
|
|
|
|
|
|
// If request sends files, parse them here otherwise the Query() can't be parsed and the CsrfToken will be invalid.
|
|
|
|
if ctx.Req.Method == "POST" && strings.Contains(ctx.Req.Header.Get("Content-Type"), "multipart/form-data") {
|
|
|
|
if err := ctx.Req.ParseMultipartForm(setting.Attachment.MaxSize << 20); err != nil && !strings.Contains(err.Error(), "EOF") { // 32MB max size
|
|
|
|
ctx.InternalServerError(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-23 01:38:03 -05:00
|
|
|
httpcache.AddCacheControlToHeader(ctx.Resp.Header(), 0, "no-transform")
|
2021-08-06 15:47:10 -05:00
|
|
|
ctx.Resp.Header().Set(`X-Frame-Options`, setting.CORSConfig.XFrameOptions)
|
2021-01-26 10:36:53 -05:00
|
|
|
|
2022-01-19 18:26:57 -05:00
|
|
|
ctx.Data["Context"] = &ctx
|
2021-01-26 10:36:53 -05:00
|
|
|
|
|
|
|
next.ServeHTTP(ctx.Resp, ctx.Req)
|
2021-08-04 12:26:30 -05:00
|
|
|
|
|
|
|
// Handle adding signedUserName to the context for the AccessLogger
|
|
|
|
usernameInterface := ctx.Data["SignedUserName"]
|
|
|
|
identityPtrInterface := ctx.Req.Context().Value(signedUserNameStringPointerKey)
|
|
|
|
if usernameInterface != nil && identityPtrInterface != nil {
|
|
|
|
username := usernameInterface.(string)
|
|
|
|
identityPtr := identityPtrInterface.(*string)
|
|
|
|
if identityPtr != nil && username != "" {
|
|
|
|
*identityPtr = username
|
|
|
|
}
|
|
|
|
}
|
2021-01-26 10:36:53 -05:00
|
|
|
})
|
2016-03-13 16:37:44 -05:00
|
|
|
}
|
|
|
|
}
|
2016-11-14 17:33:58 -05:00
|
|
|
|
2019-03-18 21:29:43 -05:00
|
|
|
// NotFound handles 404s for APIContext
|
|
|
|
// String will replace message, errors will be added to a slice
|
|
|
|
func (ctx *APIContext) NotFound(objs ...interface{}) {
|
2022-01-20 12:46:10 -05:00
|
|
|
message := ctx.Tr("error.not_found")
|
2019-03-18 21:29:43 -05:00
|
|
|
var errors []string
|
|
|
|
for _, obj := range objs {
|
2020-05-05 13:52:13 -05:00
|
|
|
// Ignore nil
|
|
|
|
if obj == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-03-18 21:29:43 -05:00
|
|
|
if err, ok := obj.(error); ok {
|
|
|
|
errors = append(errors, err.Error())
|
|
|
|
} else {
|
|
|
|
message = obj.(string)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-05 10:30:52 -05:00
|
|
|
ctx.JSON(http.StatusNotFound, map[string]interface{}{
|
2021-12-28 08:28:27 -05:00
|
|
|
"message": message,
|
|
|
|
"url": setting.API.SwaggerURL,
|
|
|
|
"errors": errors,
|
2019-03-18 21:29:43 -05:00
|
|
|
})
|
|
|
|
}
|
2020-11-14 11:13:55 -05:00
|
|
|
|
2022-04-21 10:17:57 -05:00
|
|
|
// ReferencesGitRepo injects the GitRepo into the Context
|
|
|
|
// you can optional skip the IsEmpty check
|
|
|
|
func ReferencesGitRepo(allowEmpty ...bool) func(ctx *APIContext) (cancel context.CancelFunc) {
|
|
|
|
return func(ctx *APIContext) (cancel context.CancelFunc) {
|
2020-11-14 11:13:55 -05:00
|
|
|
// Empty repository does not have reference information.
|
2022-04-21 10:17:57 -05:00
|
|
|
if ctx.Repo.Repository.IsEmpty && !(len(allowEmpty) != 0 && allowEmpty[0]) {
|
2020-11-14 11:13:55 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-04-21 10:17:57 -05:00
|
|
|
// For API calls.
|
2020-11-14 11:13:55 -05:00
|
|
|
if ctx.Repo.GitRepo == nil {
|
2021-12-09 20:27:50 -05:00
|
|
|
repoPath := repo_model.RepoPath(ctx.Repo.Owner.Name, ctx.Repo.Repository.Name)
|
2022-04-21 10:17:57 -05:00
|
|
|
gitRepo, err := git.OpenRepository(ctx, repoPath)
|
2020-11-14 11:13:55 -05:00
|
|
|
if err != nil {
|
2022-04-21 10:17:57 -05:00
|
|
|
ctx.Error(http.StatusInternalServerError, "RepoRef Invalid repo "+repoPath, err)
|
2020-11-14 11:13:55 -05:00
|
|
|
return
|
|
|
|
}
|
2022-04-21 10:17:57 -05:00
|
|
|
ctx.Repo.GitRepo = gitRepo
|
2020-11-14 11:13:55 -05:00
|
|
|
// We opened it, we should close it
|
2022-04-21 10:17:57 -05:00
|
|
|
return func() {
|
2020-11-14 11:13:55 -05:00
|
|
|
// If it's been set to nil then assume someone else has closed it.
|
|
|
|
if ctx.Repo.GitRepo != nil {
|
|
|
|
ctx.Repo.GitRepo.Close()
|
|
|
|
}
|
2022-04-21 10:17:57 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-20 05:02:49 -05:00
|
|
|
return cancel
|
2022-04-21 10:17:57 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// RepoRefForAPI handles repository reference names when the ref name is not explicitly given
|
|
|
|
func RepoRefForAPI(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
|
|
|
ctx := GetAPIContext(req)
|
|
|
|
|
|
|
|
if ctx.Repo.GitRepo == nil {
|
|
|
|
ctx.InternalServerError(fmt.Errorf("no open git repo"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if ref := ctx.FormTrim("ref"); len(ref) > 0 {
|
|
|
|
commit, err := ctx.Repo.GitRepo.GetCommit(ref)
|
|
|
|
if err != nil {
|
|
|
|
if git.IsErrNotExist(err) {
|
|
|
|
ctx.NotFound()
|
|
|
|
} else {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "GetBlobByPath", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx.Repo.Commit = commit
|
2022-04-26 12:15:45 -05:00
|
|
|
ctx.Repo.TreePath = ctx.Params("*")
|
2022-04-21 10:17:57 -05:00
|
|
|
return
|
2020-11-14 11:13:55 -05:00
|
|
|
}
|
|
|
|
|
2022-04-21 10:17:57 -05:00
|
|
|
var err error
|
2020-11-14 11:13:55 -05:00
|
|
|
refName := getRefName(ctx.Context, RepoRefAny)
|
|
|
|
|
|
|
|
if ctx.Repo.GitRepo.IsBranchExist(refName) {
|
|
|
|
ctx.Repo.Commit, err = ctx.Repo.GitRepo.GetBranchCommit(refName)
|
|
|
|
if err != nil {
|
|
|
|
ctx.InternalServerError(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx.Repo.CommitID = ctx.Repo.Commit.ID.String()
|
|
|
|
} else if ctx.Repo.GitRepo.IsTagExist(refName) {
|
|
|
|
ctx.Repo.Commit, err = ctx.Repo.GitRepo.GetTagCommit(refName)
|
|
|
|
if err != nil {
|
|
|
|
ctx.InternalServerError(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx.Repo.CommitID = ctx.Repo.Commit.ID.String()
|
2022-12-27 08:12:49 -05:00
|
|
|
} else if len(refName) == git.SHAFullLength {
|
2020-11-14 11:13:55 -05:00
|
|
|
ctx.Repo.CommitID = refName
|
|
|
|
ctx.Repo.Commit, err = ctx.Repo.GitRepo.GetCommit(refName)
|
|
|
|
if err != nil {
|
|
|
|
ctx.NotFound("GetCommit", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ctx.NotFound(fmt.Errorf("not exist: '%s'", ctx.Params("*")))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
next.ServeHTTP(w, req)
|
|
|
|
})
|
2020-11-14 11:13:55 -05:00
|
|
|
}
|