You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

repo.go 13 kB

11 years ago
11 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
11 years ago
11 years ago
10 years ago
Better logging (#6038) (#6095) * Panic don't fatal on create new logger Fixes #5854 Signed-off-by: Andrew Thornton <art27@cantab.net> * partial broken * Update the logging infrastrcture Signed-off-by: Andrew Thornton <art27@cantab.net> * Reset the skip levels for Fatal and Error Signed-off-by: Andrew Thornton <art27@cantab.net> * broken ncsa * More log.Error fixes Signed-off-by: Andrew Thornton <art27@cantab.net> * Remove nal * set log-levels to lowercase * Make console_test test all levels * switch to lowercased levels * OK now working * Fix vetting issues * Fix lint * Fix tests * change default logging to match current gitea * Improve log testing Signed-off-by: Andrew Thornton <art27@cantab.net> * reset error skip levels to 0 * Update documentation and access logger configuration * Redirect the router log back to gitea if redirect macaron log but also allow setting the log level - i.e. TRACE * Fix broken level caching * Refactor the router log * Add Router logger * Add colorizing options * Adjust router colors * Only create logger if they will be used * update app.ini.sample * rename Attribute ColorAttribute * Change from white to green for function * Set fatal/error levels * Restore initial trace logger * Fix Trace arguments in modules/auth/auth.go * Properly handle XORMLogger * Improve admin/config page * fix fmt * Add auto-compression of old logs * Update error log levels * Remove the unnecessary skip argument from Error, Fatal and Critical * Add stacktrace support * Fix tests * Remove x/sync from vendors? * Add stderr option to console logger * Use filepath.ToSlash to protect against Windows in tests * Remove prefixed underscores from names in colors.go * Remove not implemented database logger This was removed from Gogs on 4 Mar 2016 but left in the configuration since then. * Ensure that log paths are relative to ROOT_PATH * use path.Join * rename jsonConfig to logConfig * Rename "config" to "jsonConfig" to make it clearer * Requested changes * Requested changes: XormLogger * Try to color the windows terminal If successful default to colorizing the console logs * fixup * Colorize initially too * update vendor * Colorize logs on default and remove if this is not a colorizing logger * Fix documentation * fix test * Use go-isatty to detect if on windows we are on msys or cygwin * Fix spelling mistake * Add missing vendors * More changes * Rationalise the ANSI writer protection * Adjust colors on advice from @0x5c * Make Flags a comma separated list * Move to use the windows constant for ENABLE_VIRTUAL_TERMINAL_PROCESSING * Ensure matching is done on the non-colored message - to simpify EXPRESSION
6 years ago
11 years ago
10 years ago
10 years ago
11 years ago
11 years ago
11 years ago
10 years ago
11 years ago
11 years ago
11 years ago
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package repo
  5. import (
  6. "fmt"
  7. "os"
  8. "path"
  9. "strings"
  10. "code.gitea.io/gitea/models"
  11. "code.gitea.io/gitea/modules/auth"
  12. "code.gitea.io/gitea/modules/base"
  13. "code.gitea.io/gitea/modules/context"
  14. "code.gitea.io/gitea/modules/git"
  15. "code.gitea.io/gitea/modules/log"
  16. "code.gitea.io/gitea/modules/migrations"
  17. "code.gitea.io/gitea/modules/setting"
  18. "code.gitea.io/gitea/modules/util"
  19. "github.com/Unknwon/com"
  20. )
  21. const (
  22. tplCreate base.TplName = "repo/create"
  23. tplMigrate base.TplName = "repo/migrate"
  24. )
  25. // MustBeNotEmpty render when a repo is a empty git dir
  26. func MustBeNotEmpty(ctx *context.Context) {
  27. if ctx.Repo.Repository.IsEmpty {
  28. ctx.NotFound("MustBeNotEmpty", nil)
  29. }
  30. }
  31. // MustBeEditable check that repo can be edited
  32. func MustBeEditable(ctx *context.Context) {
  33. if !ctx.Repo.Repository.CanEnableEditor() || ctx.Repo.IsViewCommit {
  34. ctx.NotFound("", nil)
  35. return
  36. }
  37. }
  38. // MustBeAbleToUpload check that repo can be uploaded to
  39. func MustBeAbleToUpload(ctx *context.Context) {
  40. if !setting.Repository.Upload.Enabled {
  41. ctx.NotFound("", nil)
  42. }
  43. }
  44. func checkContextUser(ctx *context.Context, uid int64) *models.User {
  45. orgs, err := models.GetOwnedOrgsByUserIDDesc(ctx.User.ID, "updated_unix")
  46. if err != nil {
  47. ctx.ServerError("GetOwnedOrgsByUserIDDesc", err)
  48. return nil
  49. }
  50. ctx.Data["Orgs"] = orgs
  51. // Not equal means current user is an organization.
  52. if uid == ctx.User.ID || uid == 0 {
  53. return ctx.User
  54. }
  55. org, err := models.GetUserByID(uid)
  56. if models.IsErrUserNotExist(err) {
  57. return ctx.User
  58. }
  59. if err != nil {
  60. ctx.ServerError("GetUserByID", fmt.Errorf("[%d]: %v", uid, err))
  61. return nil
  62. }
  63. // Check ownership of organization.
  64. if !org.IsOrganization() {
  65. ctx.Error(403)
  66. return nil
  67. }
  68. if !ctx.User.IsAdmin {
  69. isOwner, err := org.IsOwnedBy(ctx.User.ID)
  70. if err != nil {
  71. ctx.ServerError("IsOwnedBy", err)
  72. return nil
  73. } else if !isOwner {
  74. ctx.Error(403)
  75. return nil
  76. }
  77. }
  78. return org
  79. }
  80. func getRepoPrivate(ctx *context.Context) bool {
  81. switch strings.ToLower(setting.Repository.DefaultPrivate) {
  82. case setting.RepoCreatingLastUserVisibility:
  83. return ctx.User.LastRepoVisibility
  84. case setting.RepoCreatingPrivate:
  85. return true
  86. case setting.RepoCreatingPublic:
  87. return false
  88. default:
  89. return ctx.User.LastRepoVisibility
  90. }
  91. }
  92. // Create render creating repository page
  93. func Create(ctx *context.Context) {
  94. if !ctx.User.CanCreateRepo() {
  95. ctx.RenderWithErr(ctx.Tr("repo.form.reach_limit_of_creation", ctx.User.MaxCreationLimit()), tplCreate, nil)
  96. }
  97. ctx.Data["Title"] = ctx.Tr("new_repo")
  98. // Give default value for template to render.
  99. ctx.Data["Gitignores"] = models.Gitignores
  100. ctx.Data["Licenses"] = models.Licenses
  101. ctx.Data["Readmes"] = models.Readmes
  102. ctx.Data["readme"] = "Default"
  103. ctx.Data["private"] = getRepoPrivate(ctx)
  104. ctx.Data["IsForcedPrivate"] = setting.Repository.ForcePrivate
  105. ctxUser := checkContextUser(ctx, ctx.QueryInt64("org"))
  106. if ctx.Written() {
  107. return
  108. }
  109. ctx.Data["ContextUser"] = ctxUser
  110. ctx.HTML(200, tplCreate)
  111. }
  112. func handleCreateError(ctx *context.Context, owner *models.User, err error, name string, tpl base.TplName, form interface{}) {
  113. switch {
  114. case migrations.IsRateLimitError(err):
  115. ctx.RenderWithErr(ctx.Tr("form.visit_rate_limit"), tpl, form)
  116. case models.IsErrReachLimitOfRepo(err):
  117. ctx.RenderWithErr(ctx.Tr("repo.form.reach_limit_of_creation", owner.MaxCreationLimit()), tpl, form)
  118. case models.IsErrRepoAlreadyExist(err):
  119. ctx.Data["Err_RepoName"] = true
  120. ctx.RenderWithErr(ctx.Tr("form.repo_name_been_taken"), tpl, form)
  121. case models.IsErrNameReserved(err):
  122. ctx.Data["Err_RepoName"] = true
  123. ctx.RenderWithErr(ctx.Tr("repo.form.name_reserved", err.(models.ErrNameReserved).Name), tpl, form)
  124. case models.IsErrNamePatternNotAllowed(err):
  125. ctx.Data["Err_RepoName"] = true
  126. ctx.RenderWithErr(ctx.Tr("repo.form.name_pattern_not_allowed", err.(models.ErrNamePatternNotAllowed).Pattern), tpl, form)
  127. default:
  128. ctx.ServerError(name, err)
  129. }
  130. }
  131. // CreatePost response for creating repository
  132. func CreatePost(ctx *context.Context, form auth.CreateRepoForm) {
  133. ctx.Data["Title"] = ctx.Tr("new_repo")
  134. ctx.Data["Gitignores"] = models.Gitignores
  135. ctx.Data["Licenses"] = models.Licenses
  136. ctx.Data["Readmes"] = models.Readmes
  137. ctxUser := checkContextUser(ctx, form.UID)
  138. if ctx.Written() {
  139. return
  140. }
  141. ctx.Data["ContextUser"] = ctxUser
  142. if ctx.HasError() {
  143. ctx.HTML(200, tplCreate)
  144. return
  145. }
  146. repo, err := models.CreateRepository(ctx.User, ctxUser, models.CreateRepoOptions{
  147. Name: form.RepoName,
  148. Description: form.Description,
  149. Gitignores: form.Gitignores,
  150. License: form.License,
  151. Readme: form.Readme,
  152. IsPrivate: form.Private || setting.Repository.ForcePrivate,
  153. AutoInit: form.AutoInit,
  154. })
  155. if err == nil {
  156. log.Trace("Repository created [%d]: %s/%s", repo.ID, ctxUser.Name, repo.Name)
  157. ctx.Redirect(setting.AppSubURL + "/" + ctxUser.Name + "/" + repo.Name)
  158. return
  159. }
  160. if repo != nil {
  161. if errDelete := models.DeleteRepository(ctx.User, ctxUser.ID, repo.ID); errDelete != nil {
  162. log.Error("DeleteRepository: %v", errDelete)
  163. }
  164. }
  165. handleCreateError(ctx, ctxUser, err, "CreatePost", tplCreate, &form)
  166. }
  167. // Migrate render migration of repository page
  168. func Migrate(ctx *context.Context) {
  169. ctx.Data["Title"] = ctx.Tr("new_migrate")
  170. ctx.Data["private"] = getRepoPrivate(ctx)
  171. ctx.Data["IsForcedPrivate"] = setting.Repository.ForcePrivate
  172. ctx.Data["mirror"] = ctx.Query("mirror") == "1"
  173. ctx.Data["wiki"] = ctx.Query("wiki") == "1"
  174. ctx.Data["milestones"] = ctx.Query("milestones") == "1"
  175. ctx.Data["labels"] = ctx.Query("labels") == "1"
  176. ctx.Data["issues"] = ctx.Query("issues") == "1"
  177. ctx.Data["pull_requests"] = ctx.Query("pull_requests") == "1"
  178. ctx.Data["releases"] = ctx.Query("releases") == "1"
  179. ctx.Data["LFSActive"] = setting.LFS.StartServer
  180. ctxUser := checkContextUser(ctx, ctx.QueryInt64("org"))
  181. if ctx.Written() {
  182. return
  183. }
  184. ctx.Data["ContextUser"] = ctxUser
  185. ctx.HTML(200, tplMigrate)
  186. }
  187. // MigratePost response for migrating from external git repository
  188. func MigratePost(ctx *context.Context, form auth.MigrateRepoForm) {
  189. ctx.Data["Title"] = ctx.Tr("new_migrate")
  190. ctxUser := checkContextUser(ctx, form.UID)
  191. if ctx.Written() {
  192. return
  193. }
  194. ctx.Data["ContextUser"] = ctxUser
  195. if ctx.HasError() {
  196. ctx.HTML(200, tplMigrate)
  197. return
  198. }
  199. remoteAddr, err := form.ParseRemoteAddr(ctx.User)
  200. if err != nil {
  201. if models.IsErrInvalidCloneAddr(err) {
  202. ctx.Data["Err_CloneAddr"] = true
  203. addrErr := err.(models.ErrInvalidCloneAddr)
  204. switch {
  205. case addrErr.IsURLError:
  206. ctx.RenderWithErr(ctx.Tr("form.url_error"), tplMigrate, &form)
  207. case addrErr.IsPermissionDenied:
  208. ctx.RenderWithErr(ctx.Tr("repo.migrate.permission_denied"), tplMigrate, &form)
  209. case addrErr.IsInvalidPath:
  210. ctx.RenderWithErr(ctx.Tr("repo.migrate.invalid_local_path"), tplMigrate, &form)
  211. default:
  212. ctx.ServerError("Unknown error", err)
  213. }
  214. } else {
  215. ctx.ServerError("ParseRemoteAddr", err)
  216. }
  217. return
  218. }
  219. var opts = migrations.MigrateOptions{
  220. RemoteURL: remoteAddr,
  221. Name: form.RepoName,
  222. Description: form.Description,
  223. Private: form.Private || setting.Repository.ForcePrivate,
  224. Mirror: form.Mirror,
  225. AuthUsername: form.AuthUsername,
  226. AuthPassword: form.AuthPassword,
  227. Wiki: form.Wiki,
  228. Issues: form.Issues,
  229. Milestones: form.Milestones,
  230. Labels: form.Labels,
  231. Comments: true,
  232. PullRequests: form.PullRequests,
  233. Releases: form.Releases,
  234. }
  235. if opts.Mirror {
  236. opts.Issues = false
  237. opts.Milestones = false
  238. opts.Labels = false
  239. opts.Comments = false
  240. opts.PullRequests = false
  241. opts.Releases = false
  242. }
  243. repo, err := migrations.MigrateRepository(ctx.User, ctxUser.Name, opts)
  244. if err == nil {
  245. log.Trace("Repository migrated [%d]: %s/%s successfully", repo.ID, ctxUser.Name, form.RepoName)
  246. ctx.Redirect(setting.AppSubURL + "/" + ctxUser.Name + "/" + form.RepoName)
  247. return
  248. }
  249. switch {
  250. case models.IsErrReachLimitOfRepo(err):
  251. ctx.RenderWithErr(ctx.Tr("repo.form.reach_limit_of_creation", ctxUser.MaxCreationLimit()), tplMigrate, &form)
  252. case models.IsErrNameReserved(err):
  253. ctx.Data["Err_RepoName"] = true
  254. ctx.RenderWithErr(ctx.Tr("repo.form.name_reserved", err.(models.ErrNameReserved).Name), tplMigrate, &form)
  255. case models.IsErrRepoAlreadyExist(err):
  256. ctx.Data["Err_RepoName"] = true
  257. ctx.RenderWithErr(ctx.Tr("form.repo_name_been_taken"), tplMigrate, &form)
  258. case models.IsErrNamePatternNotAllowed(err):
  259. ctx.Data["Err_RepoName"] = true
  260. ctx.RenderWithErr(ctx.Tr("repo.form.name_pattern_not_allowed", err.(models.ErrNamePatternNotAllowed).Pattern), tplMigrate, &form)
  261. case migrations.IsRateLimitError(err):
  262. ctx.RenderWithErr(ctx.Tr("form.visit_rate_limit"), tplMigrate, &form)
  263. case migrations.IsTwoFactorAuthError(err):
  264. ctx.Data["Err_Auth"] = true
  265. ctx.RenderWithErr(ctx.Tr("form.2fa_auth_required"), tplMigrate, &form)
  266. default:
  267. // remoteAddr may contain credentials, so we sanitize it
  268. err = util.URLSanitizedError(err, remoteAddr)
  269. if strings.Contains(err.Error(), "Authentication failed") ||
  270. strings.Contains(err.Error(), "Bad credentials") ||
  271. strings.Contains(err.Error(), "could not read Username") {
  272. ctx.Data["Err_Auth"] = true
  273. ctx.RenderWithErr(ctx.Tr("form.auth_failed", err.Error()), tplMigrate, &form)
  274. } else if strings.Contains(err.Error(), "fatal:") {
  275. ctx.Data["Err_CloneAddr"] = true
  276. ctx.RenderWithErr(ctx.Tr("repo.migrate.failed", err.Error()), tplMigrate, &form)
  277. } else {
  278. ctx.ServerError("MigratePost", err)
  279. }
  280. }
  281. }
  282. // Action response for actions to a repository
  283. func Action(ctx *context.Context) {
  284. var err error
  285. switch ctx.Params(":action") {
  286. case "watch":
  287. err = models.WatchRepo(ctx.User.ID, ctx.Repo.Repository.ID, true)
  288. case "unwatch":
  289. err = models.WatchRepo(ctx.User.ID, ctx.Repo.Repository.ID, false)
  290. case "star":
  291. err = models.StarRepo(ctx.User.ID, ctx.Repo.Repository.ID, true)
  292. case "unstar":
  293. err = models.StarRepo(ctx.User.ID, ctx.Repo.Repository.ID, false)
  294. case "desc": // FIXME: this is not used
  295. if !ctx.Repo.IsOwner() {
  296. ctx.Error(404)
  297. return
  298. }
  299. ctx.Repo.Repository.Description = ctx.Query("desc")
  300. ctx.Repo.Repository.Website = ctx.Query("site")
  301. err = models.UpdateRepository(ctx.Repo.Repository, false)
  302. }
  303. if err != nil {
  304. ctx.ServerError(fmt.Sprintf("Action (%s)", ctx.Params(":action")), err)
  305. return
  306. }
  307. ctx.RedirectToFirst(ctx.Query("redirect_to"), ctx.Repo.RepoLink)
  308. }
  309. // RedirectDownload return a file based on the following infos:
  310. func RedirectDownload(ctx *context.Context) {
  311. var (
  312. vTag = ctx.Params("vTag")
  313. fileName = ctx.Params("fileName")
  314. )
  315. tagNames := []string{vTag}
  316. curRepo := ctx.Repo.Repository
  317. releases, err := models.GetReleasesByRepoIDAndNames(curRepo.ID, tagNames)
  318. if err != nil {
  319. if models.IsErrAttachmentNotExist(err) {
  320. ctx.Error(404)
  321. return
  322. }
  323. ctx.ServerError("RedirectDownload", err)
  324. return
  325. }
  326. if len(releases) == 1 {
  327. release := releases[0]
  328. att, err := models.GetAttachmentByReleaseIDFileName(release.ID, fileName)
  329. if err != nil {
  330. ctx.Error(404)
  331. return
  332. }
  333. if att != nil {
  334. ctx.Redirect(setting.AppSubURL + "/attachments/" + att.UUID)
  335. return
  336. }
  337. }
  338. ctx.Error(404)
  339. }
  340. // Download download an archive of a repository
  341. func Download(ctx *context.Context) {
  342. var (
  343. uri = ctx.Params("*")
  344. refName string
  345. ext string
  346. archivePath string
  347. archiveType git.ArchiveType
  348. )
  349. switch {
  350. case strings.HasSuffix(uri, ".zip"):
  351. ext = ".zip"
  352. archivePath = path.Join(ctx.Repo.GitRepo.Path, "archives/zip")
  353. archiveType = git.ZIP
  354. case strings.HasSuffix(uri, ".tar.gz"):
  355. ext = ".tar.gz"
  356. archivePath = path.Join(ctx.Repo.GitRepo.Path, "archives/targz")
  357. archiveType = git.TARGZ
  358. default:
  359. log.Trace("Unknown format: %s", uri)
  360. ctx.Error(404)
  361. return
  362. }
  363. refName = strings.TrimSuffix(uri, ext)
  364. if !com.IsDir(archivePath) {
  365. if err := os.MkdirAll(archivePath, os.ModePerm); err != nil {
  366. ctx.ServerError("Download -> os.MkdirAll(archivePath)", err)
  367. return
  368. }
  369. }
  370. // Get corresponding commit.
  371. var (
  372. commit *git.Commit
  373. err error
  374. )
  375. gitRepo := ctx.Repo.GitRepo
  376. if gitRepo.IsBranchExist(refName) {
  377. commit, err = gitRepo.GetBranchCommit(refName)
  378. if err != nil {
  379. ctx.ServerError("GetBranchCommit", err)
  380. return
  381. }
  382. } else if gitRepo.IsTagExist(refName) {
  383. commit, err = gitRepo.GetTagCommit(refName)
  384. if err != nil {
  385. ctx.ServerError("GetTagCommit", err)
  386. return
  387. }
  388. } else if len(refName) >= 4 && len(refName) <= 40 {
  389. commit, err = gitRepo.GetCommit(refName)
  390. if err != nil {
  391. ctx.NotFound("GetCommit", nil)
  392. return
  393. }
  394. } else {
  395. ctx.NotFound("Download", nil)
  396. return
  397. }
  398. archivePath = path.Join(archivePath, base.ShortSha(commit.ID.String())+ext)
  399. if !com.IsFile(archivePath) {
  400. if err := commit.CreateArchive(archivePath, archiveType); err != nil {
  401. ctx.ServerError("Download -> CreateArchive "+archivePath, err)
  402. return
  403. }
  404. }
  405. ctx.ServeFile(archivePath, ctx.Repo.Repository.Name+"-"+refName+ext)
  406. }