2016-03-13 17:37:44 -04:00
|
|
|
// Copyright 2016 The Gogs Authors. All rights reserved.
|
2019-03-18 22:29:43 -04:00
|
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
2016-03-13 17:37:44 -04:00
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package context
|
|
|
|
|
|
|
|
import (
|
2021-01-26 10:36:53 -05:00
|
|
|
"context"
|
2016-03-13 23:20:22 -04:00
|
|
|
"fmt"
|
2021-01-26 10:36:53 -05:00
|
|
|
"html"
|
2020-05-28 12:58:11 -04:00
|
|
|
"net/http"
|
2019-06-26 04:51:32 -04:00
|
|
|
"net/url"
|
2016-03-13 23:20:22 -04:00
|
|
|
"strings"
|
|
|
|
|
2022-01-02 08:12:35 -05:00
|
|
|
"code.gitea.io/gitea/models/auth"
|
2021-12-09 20:27:50 -05:00
|
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
2019-03-27 05:33:00 -04:00
|
|
|
"code.gitea.io/gitea/modules/git"
|
2016-11-10 11:24:48 -05:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
|
|
|
"code.gitea.io/gitea/modules/setting"
|
2021-01-30 03:55:53 -05:00
|
|
|
"code.gitea.io/gitea/modules/web/middleware"
|
2022-01-02 08:12:35 -05:00
|
|
|
auth_service "code.gitea.io/gitea/services/auth"
|
2019-03-27 05:33:00 -04:00
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
"gitea.com/go-chi/session"
|
2016-03-13 17:37:44 -04:00
|
|
|
)
|
|
|
|
|
2021-01-29 10:35:30 -05:00
|
|
|
// APIContext is a specific context for API service
|
2016-03-13 17:37:44 -04:00
|
|
|
type APIContext struct {
|
|
|
|
*Context
|
2016-03-25 18:04:02 -04:00
|
|
|
Org *APIOrganization
|
2016-03-13 17:37:44 -04:00
|
|
|
}
|
|
|
|
|
2021-12-28 08:28:27 -05:00
|
|
|
// Currently, we have the following common fields in error response:
|
|
|
|
// * message: the message for end users (it shouldn't be used for error type detection)
|
|
|
|
// if we need to indicate some errors, we should introduce some new fields like ErrorCode or ErrorType
|
|
|
|
// * url: the swagger document URL
|
|
|
|
|
2017-05-02 09:35:59 -04:00
|
|
|
// APIError is error format response
|
|
|
|
// swagger:response error
|
|
|
|
type APIError struct {
|
|
|
|
Message string `json:"message"`
|
|
|
|
URL string `json:"url"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// APIValidationError is error format response related to input validation
|
|
|
|
// swagger:response validationError
|
|
|
|
type APIValidationError struct {
|
|
|
|
Message string `json:"message"`
|
|
|
|
URL string `json:"url"`
|
|
|
|
}
|
|
|
|
|
2019-12-20 12:07:12 -05:00
|
|
|
// APIInvalidTopicsError is error format response to invalid topics
|
|
|
|
// swagger:response invalidTopicsError
|
|
|
|
type APIInvalidTopicsError struct {
|
2021-12-28 08:28:27 -05:00
|
|
|
Message string `json:"message"`
|
|
|
|
InvalidTopics []string `json:"invalidTopics"`
|
2019-12-20 12:07:12 -05:00
|
|
|
}
|
|
|
|
|
2022-01-20 12:46:10 -05:00
|
|
|
// APIEmpty is an empty response
|
2017-05-02 09:35:59 -04:00
|
|
|
// swagger:response empty
|
|
|
|
type APIEmpty struct{}
|
|
|
|
|
2022-01-20 12:46:10 -05:00
|
|
|
// APIForbiddenError is a forbidden error response
|
2017-05-02 09:35:59 -04:00
|
|
|
// swagger:response forbidden
|
|
|
|
type APIForbiddenError struct {
|
|
|
|
APIError
|
|
|
|
}
|
|
|
|
|
2022-01-20 12:46:10 -05:00
|
|
|
// APINotFound is a not found empty response
|
2017-05-02 09:35:59 -04:00
|
|
|
// swagger:response notFound
|
|
|
|
type APINotFound struct{}
|
|
|
|
|
2022-01-20 12:46:10 -05:00
|
|
|
// APIConflict is a conflict empty response
|
2020-10-30 21:56:34 -04:00
|
|
|
// swagger:response conflict
|
|
|
|
type APIConflict struct{}
|
|
|
|
|
2022-01-20 12:46:10 -05:00
|
|
|
// APIRedirect is a redirect response
|
2017-08-21 07:13:47 -04:00
|
|
|
// swagger:response redirect
|
|
|
|
type APIRedirect struct{}
|
|
|
|
|
2022-01-20 12:46:10 -05:00
|
|
|
// APIString is a string response
|
2020-06-05 07:03:12 -04:00
|
|
|
// swagger:response string
|
|
|
|
type APIString string
|
|
|
|
|
2021-01-23 14:33:43 -05:00
|
|
|
// ServerError responds with error message, status is 500
|
|
|
|
func (ctx *APIContext) ServerError(title string, err error) {
|
|
|
|
ctx.Error(http.StatusInternalServerError, title, err)
|
|
|
|
}
|
|
|
|
|
2020-05-28 12:58:11 -04:00
|
|
|
// Error responds with an error message to client with given obj as the message.
|
2016-03-13 18:49:16 -04:00
|
|
|
// If status is 500, also it prints error to log.
|
|
|
|
func (ctx *APIContext) Error(status int, title string, obj interface{}) {
|
|
|
|
var message string
|
|
|
|
if err, ok := obj.(error); ok {
|
|
|
|
message = err.Error()
|
|
|
|
} else {
|
2020-05-28 12:58:11 -04:00
|
|
|
message = fmt.Sprintf("%s", obj)
|
2016-03-13 18:49:16 -04:00
|
|
|
}
|
|
|
|
|
2020-05-28 12:58:11 -04:00
|
|
|
if status == http.StatusInternalServerError {
|
|
|
|
log.ErrorWithSkip(1, "%s: %s", title, message)
|
2020-06-03 14:17:54 -04:00
|
|
|
|
2022-03-22 03:03:22 -04:00
|
|
|
if setting.IsProd && !(ctx.Doer != nil && ctx.Doer.IsAdmin) {
|
2020-06-03 14:17:54 -04:00
|
|
|
message = ""
|
|
|
|
}
|
2016-03-13 18:49:16 -04:00
|
|
|
}
|
|
|
|
|
2017-05-02 09:35:59 -04:00
|
|
|
ctx.JSON(status, APIError{
|
|
|
|
Message: message,
|
2019-06-12 17:07:24 -04:00
|
|
|
URL: setting.API.SwaggerURL,
|
2016-03-13 18:49:16 -04:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-05-28 12:58:11 -04:00
|
|
|
// InternalServerError responds with an error message to the client with the error as a message
|
|
|
|
// and the file and line of the caller.
|
|
|
|
func (ctx *APIContext) InternalServerError(err error) {
|
|
|
|
log.ErrorWithSkip(1, "InternalServerError: %v", err)
|
|
|
|
|
|
|
|
var message string
|
2022-03-22 03:03:22 -04:00
|
|
|
if !setting.IsProd || (ctx.Doer != nil && ctx.Doer.IsAdmin) {
|
2020-05-28 12:58:11 -04:00
|
|
|
message = err.Error()
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.JSON(http.StatusInternalServerError, APIError{
|
|
|
|
Message: message,
|
|
|
|
URL: setting.API.SwaggerURL,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2021-12-28 08:28:27 -05:00
|
|
|
type apiContextKeyType struct{}
|
|
|
|
|
|
|
|
var apiContextKey = apiContextKeyType{}
|
2021-01-26 10:36:53 -05:00
|
|
|
|
|
|
|
// WithAPIContext set up api context in request
|
|
|
|
func WithAPIContext(req *http.Request, ctx *APIContext) *http.Request {
|
|
|
|
return req.WithContext(context.WithValue(req.Context(), apiContextKey, ctx))
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetAPIContext returns a context for API routes
|
|
|
|
func GetAPIContext(req *http.Request) *APIContext {
|
|
|
|
return req.Context().Value(apiContextKey).(*APIContext)
|
|
|
|
}
|
|
|
|
|
2019-06-26 04:51:32 -04:00
|
|
|
func genAPILinks(curURL *url.URL, total, pageSize, curPage int) []string {
|
|
|
|
page := NewPagination(total, pageSize, curPage, 0)
|
2019-04-20 00:15:19 -04:00
|
|
|
paginater := page.Paginater
|
2016-03-13 23:20:22 -04:00
|
|
|
links := make([]string, 0, 4)
|
2019-06-26 04:51:32 -04:00
|
|
|
|
2019-04-20 00:15:19 -04:00
|
|
|
if paginater.HasNext() {
|
2019-06-26 04:51:32 -04:00
|
|
|
u := *curURL
|
|
|
|
queries := u.Query()
|
|
|
|
queries.Set("page", fmt.Sprintf("%d", paginater.Next()))
|
|
|
|
u.RawQuery = queries.Encode()
|
|
|
|
|
|
|
|
links = append(links, fmt.Sprintf("<%s%s>; rel=\"next\"", setting.AppURL, u.RequestURI()[1:]))
|
2016-03-13 23:20:22 -04:00
|
|
|
}
|
2019-04-20 00:15:19 -04:00
|
|
|
if !paginater.IsLast() {
|
2019-06-26 04:51:32 -04:00
|
|
|
u := *curURL
|
|
|
|
queries := u.Query()
|
|
|
|
queries.Set("page", fmt.Sprintf("%d", paginater.TotalPages()))
|
|
|
|
u.RawQuery = queries.Encode()
|
|
|
|
|
|
|
|
links = append(links, fmt.Sprintf("<%s%s>; rel=\"last\"", setting.AppURL, u.RequestURI()[1:]))
|
2016-03-13 23:20:22 -04:00
|
|
|
}
|
2019-04-20 00:15:19 -04:00
|
|
|
if !paginater.IsFirst() {
|
2019-06-26 04:51:32 -04:00
|
|
|
u := *curURL
|
|
|
|
queries := u.Query()
|
|
|
|
queries.Set("page", "1")
|
|
|
|
u.RawQuery = queries.Encode()
|
|
|
|
|
|
|
|
links = append(links, fmt.Sprintf("<%s%s>; rel=\"first\"", setting.AppURL, u.RequestURI()[1:]))
|
2016-03-13 23:20:22 -04:00
|
|
|
}
|
2019-04-20 00:15:19 -04:00
|
|
|
if paginater.HasPrevious() {
|
2019-06-26 04:51:32 -04:00
|
|
|
u := *curURL
|
|
|
|
queries := u.Query()
|
|
|
|
queries.Set("page", fmt.Sprintf("%d", paginater.Previous()))
|
|
|
|
u.RawQuery = queries.Encode()
|
|
|
|
|
|
|
|
links = append(links, fmt.Sprintf("<%s%s>; rel=\"prev\"", setting.AppURL, u.RequestURI()[1:]))
|
2016-03-13 23:20:22 -04:00
|
|
|
}
|
2019-06-26 04:51:32 -04:00
|
|
|
return links
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetLinkHeader sets pagination link header by given total number and page size.
|
|
|
|
func (ctx *APIContext) SetLinkHeader(total, pageSize int) {
|
2021-07-28 21:42:15 -04:00
|
|
|
links := genAPILinks(ctx.Req.URL, total, pageSize, ctx.FormInt("page"))
|
2016-03-13 23:20:22 -04:00
|
|
|
|
|
|
|
if len(links) > 0 {
|
2021-12-15 01:59:57 -05:00
|
|
|
ctx.RespHeader().Set("Link", strings.Join(links, ","))
|
2021-08-12 08:43:08 -04:00
|
|
|
ctx.AppendAccessControlExposeHeaders("Link")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetTotalCountHeader set "X-Total-Count" header
|
|
|
|
func (ctx *APIContext) SetTotalCountHeader(total int64) {
|
2021-12-15 01:59:57 -05:00
|
|
|
ctx.RespHeader().Set("X-Total-Count", fmt.Sprint(total))
|
2021-08-12 08:43:08 -04:00
|
|
|
ctx.AppendAccessControlExposeHeaders("X-Total-Count")
|
|
|
|
}
|
|
|
|
|
|
|
|
// AppendAccessControlExposeHeaders append headers by name to "Access-Control-Expose-Headers" header
|
|
|
|
func (ctx *APIContext) AppendAccessControlExposeHeaders(names ...string) {
|
2021-12-15 01:59:57 -05:00
|
|
|
val := ctx.RespHeader().Get("Access-Control-Expose-Headers")
|
2021-08-12 08:43:08 -04:00
|
|
|
if len(val) != 0 {
|
2021-12-15 01:59:57 -05:00
|
|
|
ctx.RespHeader().Set("Access-Control-Expose-Headers", fmt.Sprintf("%s, %s", val, strings.Join(names, ", ")))
|
2021-08-12 08:43:08 -04:00
|
|
|
} else {
|
2021-12-15 01:59:57 -05:00
|
|
|
ctx.RespHeader().Set("Access-Control-Expose-Headers", strings.Join(names, ", "))
|
2016-03-13 23:20:22 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-03 21:15:55 -04:00
|
|
|
// RequireCSRF requires a validated a CSRF token
|
|
|
|
func (ctx *APIContext) RequireCSRF() {
|
|
|
|
headerToken := ctx.Req.Header.Get(ctx.csrf.GetHeaderName())
|
|
|
|
formValueToken := ctx.Req.FormValue(ctx.csrf.GetFormName())
|
|
|
|
if len(headerToken) > 0 || len(formValueToken) > 0 {
|
2021-01-26 10:36:53 -05:00
|
|
|
Validate(ctx.Context, ctx.csrf)
|
2018-11-03 21:15:55 -04:00
|
|
|
} else {
|
2020-11-23 02:56:04 -05:00
|
|
|
ctx.Context.Error(401, "Missing CSRF token.")
|
2018-11-03 21:15:55 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-22 11:21:11 -04:00
|
|
|
// CheckForOTP validates OTP
|
2019-04-19 04:59:26 -04:00
|
|
|
func (ctx *APIContext) CheckForOTP() {
|
2021-09-17 07:43:47 -04:00
|
|
|
if skip, ok := ctx.Data["SkipLocalTwoFA"]; ok && skip.(bool) {
|
|
|
|
return // Skip 2FA
|
|
|
|
}
|
|
|
|
|
2019-04-19 04:59:26 -04:00
|
|
|
otpHeader := ctx.Req.Header.Get("X-Gitea-OTP")
|
2022-03-22 03:03:22 -04:00
|
|
|
twofa, err := auth.GetTwoFactorByUID(ctx.Context.Doer.ID)
|
2019-04-19 04:59:26 -04:00
|
|
|
if err != nil {
|
2022-01-02 08:12:35 -05:00
|
|
|
if auth.IsErrTwoFactorNotEnrolled(err) {
|
2019-04-19 04:59:26 -04:00
|
|
|
return // No 2FA enrollment for this user
|
|
|
|
}
|
2021-04-05 11:30:52 -04:00
|
|
|
ctx.Context.Error(http.StatusInternalServerError)
|
2019-04-19 04:59:26 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
ok, err := twofa.ValidateTOTP(otpHeader)
|
|
|
|
if err != nil {
|
2021-04-05 11:30:52 -04:00
|
|
|
ctx.Context.Error(http.StatusInternalServerError)
|
2019-04-19 04:59:26 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
if !ok {
|
|
|
|
ctx.Context.Error(401)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-02 08:12:35 -05:00
|
|
|
// APIAuth converts auth_service.Auth as a middleware
|
|
|
|
func APIAuth(authMethod auth_service.Method) func(*APIContext) {
|
2021-06-09 13:53:16 -04:00
|
|
|
return func(ctx *APIContext) {
|
|
|
|
// Get user from session if logged in.
|
2022-03-22 03:03:22 -04:00
|
|
|
ctx.Doer = authMethod.Verify(ctx.Req, ctx.Resp, ctx, ctx.Session)
|
|
|
|
if ctx.Doer != nil {
|
|
|
|
if ctx.Locale.Language() != ctx.Doer.Language {
|
2021-11-20 16:32:37 -05:00
|
|
|
ctx.Locale = middleware.Locale(ctx.Resp, ctx.Req)
|
|
|
|
}
|
2022-01-02 08:12:35 -05:00
|
|
|
ctx.IsBasicAuth = ctx.Data["AuthedMethod"].(string) == auth_service.BasicMethodName
|
2021-06-09 13:53:16 -04:00
|
|
|
ctx.IsSigned = true
|
|
|
|
ctx.Data["IsSigned"] = ctx.IsSigned
|
2022-03-22 03:03:22 -04:00
|
|
|
ctx.Data["SignedUser"] = ctx.Doer
|
|
|
|
ctx.Data["SignedUserID"] = ctx.Doer.ID
|
|
|
|
ctx.Data["SignedUserName"] = ctx.Doer.Name
|
|
|
|
ctx.Data["IsAdmin"] = ctx.Doer.IsAdmin
|
2021-06-09 13:53:16 -04:00
|
|
|
} else {
|
|
|
|
ctx.Data["SignedUserID"] = int64(0)
|
|
|
|
ctx.Data["SignedUserName"] = ""
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-29 10:35:30 -05:00
|
|
|
// APIContexter returns apicontext as middleware
|
2021-01-26 10:36:53 -05:00
|
|
|
func APIContexter() func(http.Handler) http.Handler {
|
2022-01-20 12:46:10 -05:00
|
|
|
csrfOpts := getCsrfOpts()
|
2021-01-26 10:36:53 -05:00
|
|
|
|
|
|
|
return func(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
2022-01-20 12:46:10 -05:00
|
|
|
locale := middleware.Locale(w, req)
|
|
|
|
ctx := APIContext{
|
2021-01-26 10:36:53 -05:00
|
|
|
Context: &Context{
|
|
|
|
Resp: NewResponse(w),
|
|
|
|
Data: map[string]interface{}{},
|
|
|
|
Locale: locale,
|
|
|
|
Session: session.GetSession(req),
|
|
|
|
Repo: &Repository{
|
|
|
|
PullRequest: &PullRequest{},
|
|
|
|
},
|
|
|
|
Org: &Organization{},
|
|
|
|
},
|
|
|
|
Org: &APIOrganization{},
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Req = WithAPIContext(WithContext(req, ctx.Context), &ctx)
|
|
|
|
ctx.csrf = Csrfer(csrfOpts, ctx.Context)
|
|
|
|
|
|
|
|
// If request sends files, parse them here otherwise the Query() can't be parsed and the CsrfToken will be invalid.
|
|
|
|
if ctx.Req.Method == "POST" && strings.Contains(ctx.Req.Header.Get("Content-Type"), "multipart/form-data") {
|
|
|
|
if err := ctx.Req.ParseMultipartForm(setting.Attachment.MaxSize << 20); err != nil && !strings.Contains(err.Error(), "EOF") { // 32MB max size
|
|
|
|
ctx.InternalServerError(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-08-06 16:47:10 -04:00
|
|
|
ctx.Resp.Header().Set(`X-Frame-Options`, setting.CORSConfig.XFrameOptions)
|
2021-01-26 10:36:53 -05:00
|
|
|
|
|
|
|
ctx.Data["CsrfToken"] = html.EscapeString(ctx.csrf.GetToken())
|
2022-01-19 18:26:57 -05:00
|
|
|
ctx.Data["Context"] = &ctx
|
2021-01-26 10:36:53 -05:00
|
|
|
|
|
|
|
next.ServeHTTP(ctx.Resp, ctx.Req)
|
2021-08-04 13:26:30 -04:00
|
|
|
|
|
|
|
// Handle adding signedUserName to the context for the AccessLogger
|
|
|
|
usernameInterface := ctx.Data["SignedUserName"]
|
|
|
|
identityPtrInterface := ctx.Req.Context().Value(signedUserNameStringPointerKey)
|
|
|
|
if usernameInterface != nil && identityPtrInterface != nil {
|
|
|
|
username := usernameInterface.(string)
|
|
|
|
identityPtr := identityPtrInterface.(*string)
|
|
|
|
if identityPtr != nil && username != "" {
|
|
|
|
*identityPtr = username
|
|
|
|
}
|
|
|
|
}
|
2021-01-26 10:36:53 -05:00
|
|
|
})
|
2016-03-13 17:37:44 -04:00
|
|
|
}
|
|
|
|
}
|
2016-11-14 17:33:58 -05:00
|
|
|
|
2016-12-02 06:10:39 -05:00
|
|
|
// ReferencesGitRepo injects the GitRepo into the Context
|
2022-01-19 18:26:57 -05:00
|
|
|
func ReferencesGitRepo(allowEmpty bool) func(ctx *APIContext) (cancel context.CancelFunc) {
|
|
|
|
return func(ctx *APIContext) (cancel context.CancelFunc) {
|
|
|
|
// Empty repository does not have reference information.
|
|
|
|
if !allowEmpty && ctx.Repo.Repository.IsEmpty {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// For API calls.
|
|
|
|
if ctx.Repo.GitRepo == nil {
|
|
|
|
repoPath := repo_model.RepoPath(ctx.Repo.Owner.Name, ctx.Repo.Repository.Name)
|
|
|
|
gitRepo, err := git.OpenRepositoryCtx(ctx, repoPath)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "RepoRef Invalid repo "+repoPath, err)
|
2016-12-02 06:10:39 -05:00
|
|
|
return
|
|
|
|
}
|
2022-01-19 18:26:57 -05:00
|
|
|
ctx.Repo.GitRepo = gitRepo
|
|
|
|
// We opened it, we should close it
|
|
|
|
return func() {
|
|
|
|
// If it's been set to nil then assume someone else has closed it.
|
|
|
|
if ctx.Repo.GitRepo != nil {
|
|
|
|
ctx.Repo.GitRepo.Close()
|
2019-11-13 02:01:19 -05:00
|
|
|
}
|
2021-01-26 10:36:53 -05:00
|
|
|
}
|
2022-01-19 18:26:57 -05:00
|
|
|
}
|
2019-11-13 02:01:19 -05:00
|
|
|
|
2022-01-19 18:26:57 -05:00
|
|
|
return
|
2016-12-02 06:10:39 -05:00
|
|
|
}
|
|
|
|
}
|
2019-03-18 22:29:43 -04:00
|
|
|
|
|
|
|
// NotFound handles 404s for APIContext
|
|
|
|
// String will replace message, errors will be added to a slice
|
|
|
|
func (ctx *APIContext) NotFound(objs ...interface{}) {
|
2022-01-20 12:46:10 -05:00
|
|
|
message := ctx.Tr("error.not_found")
|
2019-03-18 22:29:43 -04:00
|
|
|
var errors []string
|
|
|
|
for _, obj := range objs {
|
2020-05-05 14:52:13 -04:00
|
|
|
// Ignore nil
|
|
|
|
if obj == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-03-18 22:29:43 -04:00
|
|
|
if err, ok := obj.(error); ok {
|
|
|
|
errors = append(errors, err.Error())
|
|
|
|
} else {
|
|
|
|
message = obj.(string)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-05 11:30:52 -04:00
|
|
|
ctx.JSON(http.StatusNotFound, map[string]interface{}{
|
2021-12-28 08:28:27 -05:00
|
|
|
"message": message,
|
|
|
|
"url": setting.API.SwaggerURL,
|
|
|
|
"errors": errors,
|
2019-03-18 22:29:43 -04:00
|
|
|
})
|
|
|
|
}
|
2020-11-14 11:13:55 -05:00
|
|
|
|
|
|
|
// RepoRefForAPI handles repository reference names when the ref name is not explicitly given
|
2021-01-26 10:36:53 -05:00
|
|
|
func RepoRefForAPI(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
|
|
|
ctx := GetAPIContext(req)
|
2020-11-14 11:13:55 -05:00
|
|
|
// Empty repository does not have reference information.
|
|
|
|
if ctx.Repo.Repository.IsEmpty {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
|
|
|
|
|
|
|
if ctx.Repo.GitRepo == nil {
|
2021-12-09 20:27:50 -05:00
|
|
|
repoPath := repo_model.RepoPath(ctx.Repo.Owner.Name, ctx.Repo.Repository.Name)
|
2022-01-19 18:26:57 -05:00
|
|
|
ctx.Repo.GitRepo, err = git.OpenRepositoryCtx(ctx, repoPath)
|
2020-11-14 11:13:55 -05:00
|
|
|
if err != nil {
|
|
|
|
ctx.InternalServerError(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// We opened it, we should close it
|
|
|
|
defer func() {
|
|
|
|
// If it's been set to nil then assume someone else has closed it.
|
|
|
|
if ctx.Repo.GitRepo != nil {
|
|
|
|
ctx.Repo.GitRepo.Close()
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
refName := getRefName(ctx.Context, RepoRefAny)
|
|
|
|
|
|
|
|
if ctx.Repo.GitRepo.IsBranchExist(refName) {
|
|
|
|
ctx.Repo.Commit, err = ctx.Repo.GitRepo.GetBranchCommit(refName)
|
|
|
|
if err != nil {
|
|
|
|
ctx.InternalServerError(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx.Repo.CommitID = ctx.Repo.Commit.ID.String()
|
|
|
|
} else if ctx.Repo.GitRepo.IsTagExist(refName) {
|
|
|
|
ctx.Repo.Commit, err = ctx.Repo.GitRepo.GetTagCommit(refName)
|
|
|
|
if err != nil {
|
|
|
|
ctx.InternalServerError(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx.Repo.CommitID = ctx.Repo.Commit.ID.String()
|
|
|
|
} else if len(refName) == 40 {
|
|
|
|
ctx.Repo.CommitID = refName
|
|
|
|
ctx.Repo.Commit, err = ctx.Repo.GitRepo.GetCommit(refName)
|
|
|
|
if err != nil {
|
|
|
|
ctx.NotFound("GetCommit", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ctx.NotFound(fmt.Errorf("not exist: '%s'", ctx.Params("*")))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
next.ServeHTTP(w, req)
|
|
|
|
})
|
2020-11-14 11:13:55 -05:00
|
|
|
}
|