mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2024-12-27 09:54:15 -05:00
8224f03a23
* Check permission for the appropriate unit type Fixes false positives for "User created Issues in Repository which they no longer have access to" errors * change log level to Debug Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
781 lines
21 KiB
Go
781 lines
21 KiB
Go
// Copyright 2014 The Gogs Authors. All rights reserved.
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
|
// Use of this source code is governed by a MIT-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package user
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/json"
|
|
"fmt"
|
|
"regexp"
|
|
"sort"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"code.gitea.io/gitea/models"
|
|
"code.gitea.io/gitea/modules/base"
|
|
"code.gitea.io/gitea/modules/context"
|
|
issue_indexer "code.gitea.io/gitea/modules/indexer/issues"
|
|
"code.gitea.io/gitea/modules/log"
|
|
"code.gitea.io/gitea/modules/markup/markdown"
|
|
"code.gitea.io/gitea/modules/setting"
|
|
"code.gitea.io/gitea/modules/util"
|
|
issue_service "code.gitea.io/gitea/services/issue"
|
|
pull_service "code.gitea.io/gitea/services/pull"
|
|
|
|
"github.com/keybase/go-crypto/openpgp"
|
|
"github.com/keybase/go-crypto/openpgp/armor"
|
|
"xorm.io/builder"
|
|
)
|
|
|
|
const (
|
|
tplDashboard base.TplName = "user/dashboard/dashboard"
|
|
tplIssues base.TplName = "user/dashboard/issues"
|
|
tplMilestones base.TplName = "user/dashboard/milestones"
|
|
tplProfile base.TplName = "user/profile"
|
|
)
|
|
|
|
// getDashboardContextUser finds out dashboard is viewing as which context user.
|
|
func getDashboardContextUser(ctx *context.Context) *models.User {
|
|
ctxUser := ctx.User
|
|
orgName := ctx.Params(":org")
|
|
if len(orgName) > 0 {
|
|
ctxUser = ctx.Org.Organization
|
|
ctx.Data["Teams"] = ctx.Org.Organization.Teams
|
|
}
|
|
ctx.Data["ContextUser"] = ctxUser
|
|
|
|
if err := ctx.User.GetOrganizations(&models.SearchOrganizationsOptions{All: true}); err != nil {
|
|
ctx.ServerError("GetOrganizations", err)
|
|
return nil
|
|
}
|
|
ctx.Data["Orgs"] = ctx.User.Orgs
|
|
|
|
return ctxUser
|
|
}
|
|
|
|
// retrieveFeeds loads feeds for the specified user
|
|
func retrieveFeeds(ctx *context.Context, options models.GetFeedsOptions) {
|
|
actions, err := models.GetFeeds(options)
|
|
if err != nil {
|
|
ctx.ServerError("GetFeeds", err)
|
|
return
|
|
}
|
|
|
|
userCache := map[int64]*models.User{options.RequestedUser.ID: options.RequestedUser}
|
|
if ctx.User != nil {
|
|
userCache[ctx.User.ID] = ctx.User
|
|
}
|
|
for _, act := range actions {
|
|
if act.ActUser != nil {
|
|
userCache[act.ActUserID] = act.ActUser
|
|
}
|
|
}
|
|
|
|
for _, act := range actions {
|
|
repoOwner, ok := userCache[act.Repo.OwnerID]
|
|
if !ok {
|
|
repoOwner, err = models.GetUserByID(act.Repo.OwnerID)
|
|
if err != nil {
|
|
if models.IsErrUserNotExist(err) {
|
|
continue
|
|
}
|
|
ctx.ServerError("GetUserByID", err)
|
|
return
|
|
}
|
|
userCache[repoOwner.ID] = repoOwner
|
|
}
|
|
act.Repo.Owner = repoOwner
|
|
}
|
|
ctx.Data["Feeds"] = actions
|
|
}
|
|
|
|
// Dashboard render the dashboard page
|
|
func Dashboard(ctx *context.Context) {
|
|
ctxUser := getDashboardContextUser(ctx)
|
|
if ctx.Written() {
|
|
return
|
|
}
|
|
|
|
ctx.Data["Title"] = ctxUser.DisplayName() + " - " + ctx.Tr("dashboard")
|
|
ctx.Data["PageIsDashboard"] = true
|
|
ctx.Data["PageIsNews"] = true
|
|
ctx.Data["SearchLimit"] = setting.UI.User.RepoPagingNum
|
|
|
|
// no heatmap access for admins; GetUserHeatmapDataByUser ignores the calling user
|
|
// so everyone would get the same empty heatmap
|
|
if setting.Service.EnableUserHeatmap && !ctxUser.KeepActivityPrivate {
|
|
data, err := models.GetUserHeatmapDataByUserTeam(ctxUser, ctx.Org.Team, ctx.User)
|
|
if err != nil {
|
|
ctx.ServerError("GetUserHeatmapDataByUserTeam", err)
|
|
return
|
|
}
|
|
ctx.Data["HeatmapData"] = data
|
|
}
|
|
|
|
var err error
|
|
var mirrors []*models.Repository
|
|
if ctxUser.IsOrganization() {
|
|
var env models.AccessibleReposEnvironment
|
|
if ctx.Org.Team != nil {
|
|
env = ctxUser.AccessibleTeamReposEnv(ctx.Org.Team)
|
|
} else {
|
|
env, err = ctxUser.AccessibleReposEnv(ctx.User.ID)
|
|
if err != nil {
|
|
ctx.ServerError("AccessibleReposEnv", err)
|
|
return
|
|
}
|
|
}
|
|
mirrors, err = env.MirrorRepos()
|
|
if err != nil {
|
|
ctx.ServerError("env.MirrorRepos", err)
|
|
return
|
|
}
|
|
} else {
|
|
mirrors, err = ctxUser.GetMirrorRepositories()
|
|
if err != nil {
|
|
ctx.ServerError("GetMirrorRepositories", err)
|
|
return
|
|
}
|
|
}
|
|
ctx.Data["MaxShowRepoNum"] = setting.UI.User.RepoPagingNum
|
|
|
|
if err := models.MirrorRepositoryList(mirrors).LoadAttributes(); err != nil {
|
|
ctx.ServerError("MirrorRepositoryList.LoadAttributes", err)
|
|
return
|
|
}
|
|
ctx.Data["MirrorCount"] = len(mirrors)
|
|
ctx.Data["Mirrors"] = mirrors
|
|
|
|
retrieveFeeds(ctx, models.GetFeedsOptions{
|
|
RequestedUser: ctxUser,
|
|
RequestedTeam: ctx.Org.Team,
|
|
Actor: ctx.User,
|
|
IncludePrivate: true,
|
|
OnlyPerformedBy: false,
|
|
IncludeDeleted: false,
|
|
})
|
|
|
|
if ctx.Written() {
|
|
return
|
|
}
|
|
ctx.HTML(200, tplDashboard)
|
|
}
|
|
|
|
// Milestones render the user milestones page
|
|
func Milestones(ctx *context.Context) {
|
|
if models.UnitTypeIssues.UnitGlobalDisabled() && models.UnitTypePullRequests.UnitGlobalDisabled() {
|
|
log.Debug("Milestones overview page not available as both issues and pull requests are globally disabled")
|
|
ctx.Status(404)
|
|
return
|
|
}
|
|
|
|
ctx.Data["Title"] = ctx.Tr("milestones")
|
|
ctx.Data["PageIsMilestonesDashboard"] = true
|
|
|
|
ctxUser := getDashboardContextUser(ctx)
|
|
if ctx.Written() {
|
|
return
|
|
}
|
|
|
|
repoOpts := models.SearchRepoOptions{
|
|
Actor: ctxUser,
|
|
OwnerID: ctxUser.ID,
|
|
Private: true,
|
|
AllPublic: false, // Include also all public repositories of users and public organisations
|
|
AllLimited: false, // Include also all public repositories of limited organisations
|
|
HasMilestones: util.OptionalBoolTrue, // Just needs display repos has milestones
|
|
}
|
|
|
|
if ctxUser.IsOrganization() && ctx.Org.Team != nil {
|
|
repoOpts.TeamID = ctx.Org.Team.ID
|
|
}
|
|
|
|
var (
|
|
userRepoCond = models.SearchRepositoryCondition(&repoOpts) // all repo condition user could visit
|
|
repoCond = userRepoCond
|
|
repoIDs []int64
|
|
|
|
reposQuery = ctx.Query("repos")
|
|
isShowClosed = ctx.Query("state") == "closed"
|
|
sortType = ctx.Query("sort")
|
|
page = ctx.QueryInt("page")
|
|
)
|
|
|
|
if page <= 1 {
|
|
page = 1
|
|
}
|
|
|
|
if len(reposQuery) != 0 {
|
|
if issueReposQueryPattern.MatchString(reposQuery) {
|
|
// remove "[" and "]" from string
|
|
reposQuery = reposQuery[1 : len(reposQuery)-1]
|
|
//for each ID (delimiter ",") add to int to repoIDs
|
|
|
|
for _, rID := range strings.Split(reposQuery, ",") {
|
|
// Ensure nonempty string entries
|
|
if rID != "" && rID != "0" {
|
|
rIDint64, err := strconv.ParseInt(rID, 10, 64)
|
|
// If the repo id specified by query is not parseable or not accessible by user, just ignore it.
|
|
if err == nil {
|
|
repoIDs = append(repoIDs, rIDint64)
|
|
}
|
|
}
|
|
}
|
|
if len(repoIDs) > 0 {
|
|
// Don't just let repoCond = builder.In("id", repoIDs) because user may has no permission on repoIDs
|
|
// But the original repoCond has a limitation
|
|
repoCond = repoCond.And(builder.In("id", repoIDs))
|
|
}
|
|
} else {
|
|
log.Warn("issueReposQueryPattern not match with query")
|
|
}
|
|
}
|
|
|
|
counts, err := models.CountMilestonesByRepoCond(userRepoCond, isShowClosed)
|
|
if err != nil {
|
|
ctx.ServerError("CountMilestonesByRepoIDs", err)
|
|
return
|
|
}
|
|
|
|
milestones, err := models.SearchMilestones(repoCond, page, isShowClosed, sortType)
|
|
if err != nil {
|
|
ctx.ServerError("GetMilestonesByRepoIDs", err)
|
|
return
|
|
}
|
|
|
|
showRepos, _, err := models.SearchRepositoryByCondition(&repoOpts, userRepoCond, false)
|
|
if err != nil {
|
|
ctx.ServerError("SearchRepositoryByCondition", err)
|
|
return
|
|
}
|
|
sort.Sort(showRepos)
|
|
|
|
for i := 0; i < len(milestones); {
|
|
for _, repo := range showRepos {
|
|
if milestones[i].RepoID == repo.ID {
|
|
milestones[i].Repo = repo
|
|
break
|
|
}
|
|
}
|
|
if milestones[i].Repo == nil {
|
|
log.Warn("Cannot find milestone %d 's repository %d", milestones[i].ID, milestones[i].RepoID)
|
|
milestones = append(milestones[:i], milestones[i+1:]...)
|
|
continue
|
|
}
|
|
|
|
milestones[i].RenderedContent = string(markdown.Render([]byte(milestones[i].Content), milestones[i].Repo.Link(), milestones[i].Repo.ComposeMetas()))
|
|
if milestones[i].Repo.IsTimetrackerEnabled() {
|
|
err := milestones[i].LoadTotalTrackedTime()
|
|
if err != nil {
|
|
ctx.ServerError("LoadTotalTrackedTime", err)
|
|
return
|
|
}
|
|
}
|
|
i++
|
|
}
|
|
|
|
milestoneStats, err := models.GetMilestonesStatsByRepoCond(repoCond)
|
|
if err != nil {
|
|
ctx.ServerError("GetMilestoneStats", err)
|
|
return
|
|
}
|
|
|
|
var totalMilestoneStats *models.MilestonesStats
|
|
if len(repoIDs) == 0 {
|
|
totalMilestoneStats = milestoneStats
|
|
} else {
|
|
totalMilestoneStats, err = models.GetMilestonesStatsByRepoCond(userRepoCond)
|
|
if err != nil {
|
|
ctx.ServerError("GetMilestoneStats", err)
|
|
return
|
|
}
|
|
}
|
|
|
|
var pagerCount int
|
|
if isShowClosed {
|
|
ctx.Data["State"] = "closed"
|
|
ctx.Data["Total"] = totalMilestoneStats.ClosedCount
|
|
pagerCount = int(milestoneStats.ClosedCount)
|
|
} else {
|
|
ctx.Data["State"] = "open"
|
|
ctx.Data["Total"] = totalMilestoneStats.OpenCount
|
|
pagerCount = int(milestoneStats.OpenCount)
|
|
}
|
|
|
|
ctx.Data["Milestones"] = milestones
|
|
ctx.Data["Repos"] = showRepos
|
|
ctx.Data["Counts"] = counts
|
|
ctx.Data["MilestoneStats"] = milestoneStats
|
|
ctx.Data["SortType"] = sortType
|
|
if milestoneStats.Total() != totalMilestoneStats.Total() {
|
|
ctx.Data["RepoIDs"] = repoIDs
|
|
}
|
|
ctx.Data["IsShowClosed"] = isShowClosed
|
|
|
|
pager := context.NewPagination(pagerCount, setting.UI.IssuePagingNum, page, 5)
|
|
pager.AddParam(ctx, "repos", "RepoIDs")
|
|
pager.AddParam(ctx, "sort", "SortType")
|
|
pager.AddParam(ctx, "state", "State")
|
|
ctx.Data["Page"] = pager
|
|
|
|
ctx.HTML(200, tplMilestones)
|
|
}
|
|
|
|
// Regexp for repos query
|
|
var issueReposQueryPattern = regexp.MustCompile(`^\[\d+(,\d+)*,?\]$`)
|
|
|
|
// Issues render the user issues page
|
|
func Issues(ctx *context.Context) {
|
|
isPullList := ctx.Params(":type") == "pulls"
|
|
unitType := models.UnitTypeIssues
|
|
if isPullList {
|
|
if models.UnitTypePullRequests.UnitGlobalDisabled() {
|
|
log.Debug("Pull request overview page not available as it is globally disabled.")
|
|
ctx.Status(404)
|
|
return
|
|
}
|
|
|
|
ctx.Data["Title"] = ctx.Tr("pull_requests")
|
|
ctx.Data["PageIsPulls"] = true
|
|
unitType = models.UnitTypePullRequests
|
|
} else {
|
|
if models.UnitTypeIssues.UnitGlobalDisabled() {
|
|
log.Debug("Issues overview page not available as it is globally disabled.")
|
|
ctx.Status(404)
|
|
return
|
|
}
|
|
|
|
ctx.Data["Title"] = ctx.Tr("issues")
|
|
ctx.Data["PageIsIssues"] = true
|
|
}
|
|
|
|
ctxUser := getDashboardContextUser(ctx)
|
|
if ctx.Written() {
|
|
return
|
|
}
|
|
|
|
// Organization does not have view type and filter mode.
|
|
var (
|
|
viewType string
|
|
sortType = ctx.Query("sort")
|
|
filterMode = models.FilterModeAll
|
|
)
|
|
|
|
viewType = ctx.Query("type")
|
|
switch viewType {
|
|
case "assigned":
|
|
filterMode = models.FilterModeAssign
|
|
case "created_by":
|
|
filterMode = models.FilterModeCreate
|
|
case "mentioned":
|
|
filterMode = models.FilterModeMention
|
|
case "your_repositories": // filterMode already set to All
|
|
default:
|
|
viewType = "your_repositories"
|
|
}
|
|
|
|
page := ctx.QueryInt("page")
|
|
if page <= 1 {
|
|
page = 1
|
|
}
|
|
|
|
reposQuery := ctx.Query("repos")
|
|
var repoIDs []int64
|
|
if len(reposQuery) != 0 {
|
|
if issueReposQueryPattern.MatchString(reposQuery) {
|
|
// remove "[" and "]" from string
|
|
reposQuery = reposQuery[1 : len(reposQuery)-1]
|
|
//for each ID (delimiter ",") add to int to repoIDs
|
|
for _, rID := range strings.Split(reposQuery, ",") {
|
|
// Ensure nonempty string entries
|
|
if rID != "" && rID != "0" {
|
|
rIDint64, err := strconv.ParseInt(rID, 10, 64)
|
|
if err == nil {
|
|
repoIDs = append(repoIDs, rIDint64)
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
log.Warn("issueReposQueryPattern not match with query")
|
|
}
|
|
}
|
|
|
|
isShowClosed := ctx.Query("state") == "closed"
|
|
|
|
// Get repositories.
|
|
var err error
|
|
var userRepoIDs []int64
|
|
if ctxUser.IsOrganization() {
|
|
var env models.AccessibleReposEnvironment
|
|
if ctx.Org.Team != nil {
|
|
env = ctxUser.AccessibleTeamReposEnv(ctx.Org.Team)
|
|
} else {
|
|
env, err = ctxUser.AccessibleReposEnv(ctx.User.ID)
|
|
if err != nil {
|
|
ctx.ServerError("AccessibleReposEnv", err)
|
|
return
|
|
}
|
|
}
|
|
userRepoIDs, err = env.RepoIDs(1, ctxUser.NumRepos)
|
|
if err != nil {
|
|
ctx.ServerError("env.RepoIDs", err)
|
|
return
|
|
}
|
|
userRepoIDs, err = models.FilterOutRepoIdsWithoutUnitAccess(ctx.User, userRepoIDs, unitType)
|
|
if err != nil {
|
|
ctx.ServerError("FilterOutRepoIdsWithoutUnitAccess", err)
|
|
return
|
|
}
|
|
} else {
|
|
userRepoIDs, err = ctxUser.GetAccessRepoIDs(unitType)
|
|
if err != nil {
|
|
ctx.ServerError("ctxUser.GetAccessRepoIDs", err)
|
|
return
|
|
}
|
|
}
|
|
if len(userRepoIDs) == 0 {
|
|
userRepoIDs = []int64{-1}
|
|
}
|
|
|
|
opts := &models.IssuesOptions{
|
|
IsPull: util.OptionalBoolOf(isPullList),
|
|
SortType: sortType,
|
|
}
|
|
|
|
switch filterMode {
|
|
case models.FilterModeAll:
|
|
opts.RepoIDs = userRepoIDs
|
|
case models.FilterModeAssign:
|
|
opts.AssigneeID = ctx.User.ID
|
|
case models.FilterModeCreate:
|
|
opts.PosterID = ctx.User.ID
|
|
case models.FilterModeMention:
|
|
opts.MentionedID = ctx.User.ID
|
|
}
|
|
|
|
if ctxUser.IsOrganization() {
|
|
opts.RepoIDs = userRepoIDs
|
|
}
|
|
|
|
var forceEmpty bool
|
|
var issueIDsFromSearch []int64
|
|
var keyword = strings.Trim(ctx.Query("q"), " ")
|
|
|
|
if len(keyword) > 0 {
|
|
searchRepoIDs, err := models.GetRepoIDsForIssuesOptions(opts, ctxUser)
|
|
if err != nil {
|
|
ctx.ServerError("GetRepoIDsForIssuesOptions", err)
|
|
return
|
|
}
|
|
issueIDsFromSearch, err = issue_indexer.SearchIssuesByKeyword(searchRepoIDs, keyword)
|
|
if err != nil {
|
|
ctx.ServerError("SearchIssuesByKeyword", err)
|
|
return
|
|
}
|
|
if len(issueIDsFromSearch) > 0 {
|
|
opts.IssueIDs = issueIDsFromSearch
|
|
} else {
|
|
forceEmpty = true
|
|
}
|
|
}
|
|
|
|
ctx.Data["Keyword"] = keyword
|
|
|
|
opts.IsClosed = util.OptionalBoolOf(isShowClosed)
|
|
|
|
var counts map[int64]int64
|
|
if !forceEmpty {
|
|
counts, err = models.CountIssuesByRepo(opts)
|
|
if err != nil {
|
|
ctx.ServerError("CountIssuesByRepo", err)
|
|
return
|
|
}
|
|
}
|
|
|
|
opts.Page = page
|
|
opts.PageSize = setting.UI.IssuePagingNum
|
|
var labelIDs []int64
|
|
selectLabels := ctx.Query("labels")
|
|
if len(selectLabels) > 0 && selectLabels != "0" {
|
|
labelIDs, err = base.StringsToInt64s(strings.Split(selectLabels, ","))
|
|
if err != nil {
|
|
ctx.ServerError("StringsToInt64s", err)
|
|
return
|
|
}
|
|
}
|
|
opts.LabelIDs = labelIDs
|
|
|
|
if len(repoIDs) > 0 {
|
|
opts.RepoIDs = repoIDs
|
|
}
|
|
|
|
var issues []*models.Issue
|
|
if !forceEmpty {
|
|
issues, err = models.Issues(opts)
|
|
if err != nil {
|
|
ctx.ServerError("Issues", err)
|
|
return
|
|
}
|
|
} else {
|
|
issues = []*models.Issue{}
|
|
}
|
|
|
|
approvalCounts, err := models.IssueList(issues).GetApprovalCounts()
|
|
if err != nil {
|
|
ctx.ServerError("ApprovalCounts", err)
|
|
return
|
|
}
|
|
|
|
showReposMap := make(map[int64]*models.Repository, len(counts))
|
|
for repoID := range counts {
|
|
if repoID > 0 {
|
|
if _, ok := showReposMap[repoID]; !ok {
|
|
repo, err := models.GetRepositoryByID(repoID)
|
|
if models.IsErrRepoNotExist(err) {
|
|
ctx.NotFound("GetRepositoryByID", err)
|
|
return
|
|
} else if err != nil {
|
|
ctx.ServerError("GetRepositoryByID", fmt.Errorf("[%d]%v", repoID, err))
|
|
return
|
|
}
|
|
showReposMap[repoID] = repo
|
|
}
|
|
repo := showReposMap[repoID]
|
|
|
|
// Check if user has access to given repository.
|
|
perm, err := models.GetUserRepoPermission(repo, ctxUser)
|
|
if err != nil {
|
|
ctx.ServerError("GetUserRepoPermission", fmt.Errorf("[%d]%v", repoID, err))
|
|
return
|
|
}
|
|
if !perm.CanRead(unitType) {
|
|
log.Debug("User created Issues in Repository which they no longer have access to: [%d]", repoID)
|
|
}
|
|
}
|
|
}
|
|
|
|
showRepos := models.RepositoryListOfMap(showReposMap)
|
|
sort.Sort(showRepos)
|
|
if err = showRepos.LoadAttributes(); err != nil {
|
|
ctx.ServerError("LoadAttributes", err)
|
|
return
|
|
}
|
|
|
|
var commitStatus = make(map[int64]*models.CommitStatus, len(issues))
|
|
for _, issue := range issues {
|
|
issue.Repo = showReposMap[issue.RepoID]
|
|
|
|
if isPullList {
|
|
var statuses, _ = pull_service.GetLastCommitStatus(issue.PullRequest)
|
|
commitStatus[issue.PullRequest.ID] = models.CalcCommitStatus(statuses)
|
|
}
|
|
}
|
|
|
|
userIssueStatsOpts := models.UserIssueStatsOptions{
|
|
UserID: ctx.User.ID,
|
|
UserRepoIDs: userRepoIDs,
|
|
FilterMode: filterMode,
|
|
IsPull: isPullList,
|
|
IsClosed: isShowClosed,
|
|
LabelIDs: opts.LabelIDs,
|
|
}
|
|
if len(repoIDs) > 0 {
|
|
userIssueStatsOpts.UserRepoIDs = repoIDs
|
|
}
|
|
if ctxUser.IsOrganization() {
|
|
userIssueStatsOpts.RepoIDs = userRepoIDs
|
|
}
|
|
userIssueStats, err := models.GetUserIssueStats(userIssueStatsOpts)
|
|
if err != nil {
|
|
ctx.ServerError("GetUserIssueStats User", err)
|
|
return
|
|
}
|
|
|
|
var shownIssueStats *models.IssueStats
|
|
if !forceEmpty {
|
|
statsOpts := models.UserIssueStatsOptions{
|
|
UserID: ctx.User.ID,
|
|
UserRepoIDs: userRepoIDs,
|
|
FilterMode: filterMode,
|
|
IsPull: isPullList,
|
|
IsClosed: isShowClosed,
|
|
IssueIDs: issueIDsFromSearch,
|
|
LabelIDs: opts.LabelIDs,
|
|
}
|
|
if len(repoIDs) > 0 {
|
|
statsOpts.RepoIDs = repoIDs
|
|
} else if ctxUser.IsOrganization() {
|
|
statsOpts.RepoIDs = userRepoIDs
|
|
}
|
|
shownIssueStats, err = models.GetUserIssueStats(statsOpts)
|
|
if err != nil {
|
|
ctx.ServerError("GetUserIssueStats Shown", err)
|
|
return
|
|
}
|
|
} else {
|
|
shownIssueStats = &models.IssueStats{}
|
|
}
|
|
|
|
var allIssueStats *models.IssueStats
|
|
if !forceEmpty {
|
|
allIssueStatsOpts := models.UserIssueStatsOptions{
|
|
UserID: ctx.User.ID,
|
|
UserRepoIDs: userRepoIDs,
|
|
FilterMode: filterMode,
|
|
IsPull: isPullList,
|
|
IsClosed: isShowClosed,
|
|
IssueIDs: issueIDsFromSearch,
|
|
LabelIDs: opts.LabelIDs,
|
|
}
|
|
if ctxUser.IsOrganization() {
|
|
allIssueStatsOpts.RepoIDs = userRepoIDs
|
|
}
|
|
allIssueStats, err = models.GetUserIssueStats(allIssueStatsOpts)
|
|
if err != nil {
|
|
ctx.ServerError("GetUserIssueStats All", err)
|
|
return
|
|
}
|
|
} else {
|
|
allIssueStats = &models.IssueStats{}
|
|
}
|
|
|
|
var shownIssues int
|
|
var totalIssues int
|
|
if !isShowClosed {
|
|
shownIssues = int(shownIssueStats.OpenCount)
|
|
totalIssues = int(allIssueStats.OpenCount)
|
|
} else {
|
|
shownIssues = int(shownIssueStats.ClosedCount)
|
|
totalIssues = int(allIssueStats.ClosedCount)
|
|
}
|
|
|
|
ctx.Data["IssueRefEndNames"], ctx.Data["IssueRefURLs"] =
|
|
issue_service.GetRefEndNamesAndURLs(issues, ctx.Query("RepoLink"))
|
|
|
|
ctx.Data["Issues"] = issues
|
|
ctx.Data["ApprovalCounts"] = func(issueID int64, typ string) int64 {
|
|
counts, ok := approvalCounts[issueID]
|
|
if !ok || len(counts) == 0 {
|
|
return 0
|
|
}
|
|
reviewTyp := models.ReviewTypeApprove
|
|
if typ == "reject" {
|
|
reviewTyp = models.ReviewTypeReject
|
|
} else if typ == "waiting" {
|
|
reviewTyp = models.ReviewTypeRequest
|
|
}
|
|
for _, count := range counts {
|
|
if count.Type == reviewTyp {
|
|
return count.Count
|
|
}
|
|
}
|
|
return 0
|
|
}
|
|
ctx.Data["CommitStatus"] = commitStatus
|
|
ctx.Data["Repos"] = showRepos
|
|
ctx.Data["Counts"] = counts
|
|
ctx.Data["IssueStats"] = userIssueStats
|
|
ctx.Data["ShownIssueStats"] = shownIssueStats
|
|
ctx.Data["ViewType"] = viewType
|
|
ctx.Data["SortType"] = sortType
|
|
ctx.Data["RepoIDs"] = repoIDs
|
|
ctx.Data["IsShowClosed"] = isShowClosed
|
|
ctx.Data["TotalIssueCount"] = totalIssues
|
|
ctx.Data["SelectLabels"] = selectLabels
|
|
|
|
if isShowClosed {
|
|
ctx.Data["State"] = "closed"
|
|
} else {
|
|
ctx.Data["State"] = "open"
|
|
}
|
|
|
|
// Convert []int64 to string
|
|
reposParam, _ := json.Marshal(repoIDs)
|
|
|
|
ctx.Data["ReposParam"] = string(reposParam)
|
|
|
|
pager := context.NewPagination(shownIssues, setting.UI.IssuePagingNum, page, 5)
|
|
pager.AddParam(ctx, "q", "Keyword")
|
|
pager.AddParam(ctx, "type", "ViewType")
|
|
pager.AddParam(ctx, "repos", "ReposParam")
|
|
pager.AddParam(ctx, "sort", "SortType")
|
|
pager.AddParam(ctx, "state", "State")
|
|
pager.AddParam(ctx, "labels", "SelectLabels")
|
|
pager.AddParam(ctx, "milestone", "MilestoneID")
|
|
pager.AddParam(ctx, "assignee", "AssigneeID")
|
|
ctx.Data["Page"] = pager
|
|
|
|
ctx.HTML(200, tplIssues)
|
|
}
|
|
|
|
// ShowSSHKeys output all the ssh keys of user by uid
|
|
func ShowSSHKeys(ctx *context.Context, uid int64) {
|
|
keys, err := models.ListPublicKeys(uid, models.ListOptions{})
|
|
if err != nil {
|
|
ctx.ServerError("ListPublicKeys", err)
|
|
return
|
|
}
|
|
|
|
var buf bytes.Buffer
|
|
for i := range keys {
|
|
buf.WriteString(keys[i].OmitEmail())
|
|
buf.WriteString("\n")
|
|
}
|
|
ctx.PlainText(200, buf.Bytes())
|
|
}
|
|
|
|
// ShowGPGKeys output all the public GPG keys of user by uid
|
|
func ShowGPGKeys(ctx *context.Context, uid int64) {
|
|
keys, err := models.ListGPGKeys(uid, models.ListOptions{})
|
|
if err != nil {
|
|
ctx.ServerError("ListGPGKeys", err)
|
|
return
|
|
}
|
|
entities := make([]*openpgp.Entity, 0)
|
|
failedEntitiesID := make([]string, 0)
|
|
for _, k := range keys {
|
|
e, err := models.GPGKeyToEntity(k)
|
|
if err != nil {
|
|
if models.IsErrGPGKeyImportNotExist(err) {
|
|
failedEntitiesID = append(failedEntitiesID, k.KeyID)
|
|
continue //Skip previous import without backup of imported armored key
|
|
}
|
|
ctx.ServerError("ShowGPGKeys", err)
|
|
return
|
|
}
|
|
entities = append(entities, e)
|
|
}
|
|
var buf bytes.Buffer
|
|
|
|
headers := make(map[string]string)
|
|
if len(failedEntitiesID) > 0 { //If some key need re-import to be exported
|
|
headers["Note"] = fmt.Sprintf("The keys with the following IDs couldn't be exported and need to be reuploaded %s", strings.Join(failedEntitiesID, ", "))
|
|
}
|
|
writer, _ := armor.Encode(&buf, "PGP PUBLIC KEY BLOCK", headers)
|
|
for _, e := range entities {
|
|
err = e.Serialize(writer) //TODO find why key are exported with a different cipherTypeByte as original (should not be blocking but strange)
|
|
if err != nil {
|
|
ctx.ServerError("ShowGPGKeys", err)
|
|
return
|
|
}
|
|
}
|
|
writer.Close()
|
|
ctx.PlainText(200, buf.Bytes())
|
|
}
|
|
|
|
// Email2User show user page via email
|
|
func Email2User(ctx *context.Context) {
|
|
u, err := models.GetUserByEmail(ctx.Query("email"))
|
|
if err != nil {
|
|
if models.IsErrUserNotExist(err) {
|
|
ctx.NotFound("GetUserByEmail", err)
|
|
} else {
|
|
ctx.ServerError("GetUserByEmail", err)
|
|
}
|
|
return
|
|
}
|
|
ctx.Redirect(setting.AppSubURL + "/user/" + u.Name)
|
|
}
|