mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-31 19:06:18 +01:00 
			
		
		
		
	* Some refactors related repository model * Move more methods out of repository * Move repository into models/repo * Fix test * Fix test * some improvements * Remove unnecessary function
		
			
				
	
	
		
			1410 lines
		
	
	
		
			42 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			1410 lines
		
	
	
		
			42 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2014 The Gogs Authors. All rights reserved.
 | |
| // Copyright 2017 The Gitea Authors. All rights reserved.
 | |
| // Use of this source code is governed by a MIT-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package models
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"path"
 | |
| 	"path/filepath"
 | |
| 	"sort"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 	"time"
 | |
| 	"unicode/utf8"
 | |
| 
 | |
| 	_ "image/jpeg" // Needed for jpeg support
 | |
| 
 | |
| 	admin_model "code.gitea.io/gitea/models/admin"
 | |
| 	"code.gitea.io/gitea/models/db"
 | |
| 	"code.gitea.io/gitea/models/perm"
 | |
| 	repo_model "code.gitea.io/gitea/models/repo"
 | |
| 	"code.gitea.io/gitea/models/unit"
 | |
| 	user_model "code.gitea.io/gitea/models/user"
 | |
| 	"code.gitea.io/gitea/models/webhook"
 | |
| 	"code.gitea.io/gitea/modules/lfs"
 | |
| 	"code.gitea.io/gitea/modules/log"
 | |
| 	"code.gitea.io/gitea/modules/options"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 	"code.gitea.io/gitea/modules/storage"
 | |
| 	api "code.gitea.io/gitea/modules/structs"
 | |
| 	"code.gitea.io/gitea/modules/util"
 | |
| 
 | |
| 	"xorm.io/builder"
 | |
| )
 | |
| 
 | |
| var (
 | |
| 	// Gitignores contains the gitiginore files
 | |
| 	Gitignores []string
 | |
| 
 | |
| 	// Licenses contains the license files
 | |
| 	Licenses []string
 | |
| 
 | |
| 	// Readmes contains the readme files
 | |
| 	Readmes []string
 | |
| 
 | |
| 	// LabelTemplates contains the label template files and the list of labels for each file
 | |
| 	LabelTemplates map[string]string
 | |
| 
 | |
| 	// ItemsPerPage maximum items per page in forks, watchers and stars of a repo
 | |
| 	ItemsPerPage = 40
 | |
| )
 | |
| 
 | |
| // loadRepoConfig loads the repository config
 | |
| func loadRepoConfig() {
 | |
| 	// Load .gitignore and license files and readme templates.
 | |
| 	types := []string{"gitignore", "license", "readme", "label"}
 | |
| 	typeFiles := make([][]string, 4)
 | |
| 	for i, t := range types {
 | |
| 		files, err := options.Dir(t)
 | |
| 		if err != nil {
 | |
| 			log.Fatal("Failed to get %s files: %v", t, err)
 | |
| 		}
 | |
| 		customPath := path.Join(setting.CustomPath, "options", t)
 | |
| 		isDir, err := util.IsDir(customPath)
 | |
| 		if err != nil {
 | |
| 			log.Fatal("Failed to get custom %s files: %v", t, err)
 | |
| 		}
 | |
| 		if isDir {
 | |
| 			customFiles, err := util.StatDir(customPath)
 | |
| 			if err != nil {
 | |
| 				log.Fatal("Failed to get custom %s files: %v", t, err)
 | |
| 			}
 | |
| 
 | |
| 			for _, f := range customFiles {
 | |
| 				if !util.IsStringInSlice(f, files, true) {
 | |
| 					files = append(files, f)
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 		typeFiles[i] = files
 | |
| 	}
 | |
| 
 | |
| 	Gitignores = typeFiles[0]
 | |
| 	Licenses = typeFiles[1]
 | |
| 	Readmes = typeFiles[2]
 | |
| 	LabelTemplatesFiles := typeFiles[3]
 | |
| 	sort.Strings(Gitignores)
 | |
| 	sort.Strings(Licenses)
 | |
| 	sort.Strings(Readmes)
 | |
| 	sort.Strings(LabelTemplatesFiles)
 | |
| 
 | |
| 	// Load label templates
 | |
| 	LabelTemplates = make(map[string]string)
 | |
| 	for _, templateFile := range LabelTemplatesFiles {
 | |
| 		labels, err := LoadLabelsFormatted(templateFile)
 | |
| 		if err != nil {
 | |
| 			log.Error("Failed to load labels: %v", err)
 | |
| 		}
 | |
| 		LabelTemplates[templateFile] = labels
 | |
| 	}
 | |
| 
 | |
| 	// Filter out invalid names and promote preferred licenses.
 | |
| 	sortedLicenses := make([]string, 0, len(Licenses))
 | |
| 	for _, name := range setting.Repository.PreferredLicenses {
 | |
| 		if util.IsStringInSlice(name, Licenses, true) {
 | |
| 			sortedLicenses = append(sortedLicenses, name)
 | |
| 		}
 | |
| 	}
 | |
| 	for _, name := range Licenses {
 | |
| 		if !util.IsStringInSlice(name, setting.Repository.PreferredLicenses, true) {
 | |
| 			sortedLicenses = append(sortedLicenses, name)
 | |
| 		}
 | |
| 	}
 | |
| 	Licenses = sortedLicenses
 | |
| }
 | |
| 
 | |
| // NewRepoContext creates a new repository context
 | |
| func NewRepoContext() {
 | |
| 	loadRepoConfig()
 | |
| 	unit.LoadUnitConfig()
 | |
| 
 | |
| 	admin_model.RemoveAllWithNotice(db.DefaultContext, "Clean up repository temporary data", filepath.Join(setting.AppDataPath, "tmp"))
 | |
| }
 | |
| 
 | |
| // CheckRepoUnitUser check whether user could visit the unit of this repository
 | |
| func CheckRepoUnitUser(repo *repo_model.Repository, user *user_model.User, unitType unit.Type) bool {
 | |
| 	return checkRepoUnitUser(db.DefaultContext, repo, user, unitType)
 | |
| }
 | |
| 
 | |
| func checkRepoUnitUser(ctx context.Context, repo *repo_model.Repository, user *user_model.User, unitType unit.Type) bool {
 | |
| 	if user.IsAdmin {
 | |
| 		return true
 | |
| 	}
 | |
| 	perm, err := getUserRepoPermission(ctx, repo, user)
 | |
| 	if err != nil {
 | |
| 		log.Error("getUserRepoPermission(): %v", err)
 | |
| 		return false
 | |
| 	}
 | |
| 
 | |
| 	return perm.CanRead(unitType)
 | |
| }
 | |
| 
 | |
| func getRepoAssignees(ctx context.Context, repo *repo_model.Repository) (_ []*user_model.User, err error) {
 | |
| 	if err = repo.GetOwner(ctx); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	e := db.GetEngine(ctx)
 | |
| 	accesses := make([]*Access, 0, 10)
 | |
| 	if err = e.
 | |
| 		Where("repo_id = ? AND mode >= ?", repo.ID, perm.AccessModeWrite).
 | |
| 		Find(&accesses); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	// Leave a seat for owner itself to append later, but if owner is an organization
 | |
| 	// and just waste 1 unit is cheaper than re-allocate memory once.
 | |
| 	users := make([]*user_model.User, 0, len(accesses)+1)
 | |
| 	if len(accesses) > 0 {
 | |
| 		userIDs := make([]int64, len(accesses))
 | |
| 		for i := 0; i < len(accesses); i++ {
 | |
| 			userIDs[i] = accesses[i].UserID
 | |
| 		}
 | |
| 
 | |
| 		if err = e.In("id", userIDs).Find(&users); err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 	}
 | |
| 	if !repo.Owner.IsOrganization() {
 | |
| 		users = append(users, repo.Owner)
 | |
| 	}
 | |
| 
 | |
| 	return users, nil
 | |
| }
 | |
| 
 | |
| // GetRepoAssignees returns all users that have write access and can be assigned to issues
 | |
| // of the repository,
 | |
| func GetRepoAssignees(repo *repo_model.Repository) (_ []*user_model.User, err error) {
 | |
| 	return getRepoAssignees(db.DefaultContext, repo)
 | |
| }
 | |
| 
 | |
| func getReviewers(ctx context.Context, repo *repo_model.Repository, doerID, posterID int64) ([]*user_model.User, error) {
 | |
| 	// Get the owner of the repository - this often already pre-cached and if so saves complexity for the following queries
 | |
| 	if err := repo.GetOwner(ctx); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	var users []*user_model.User
 | |
| 	e := db.GetEngine(ctx)
 | |
| 
 | |
| 	if repo.IsPrivate || repo.Owner.Visibility == api.VisibleTypePrivate {
 | |
| 		// This a private repository:
 | |
| 		// Anyone who can read the repository is a requestable reviewer
 | |
| 		if err := e.
 | |
| 			SQL("SELECT * FROM `user` WHERE id in (SELECT user_id FROM `access` WHERE repo_id = ? AND mode >= ? AND user_id NOT IN ( ?, ?)) ORDER BY name",
 | |
| 				repo.ID, perm.AccessModeRead,
 | |
| 				doerID, posterID).
 | |
| 			Find(&users); err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 
 | |
| 		return users, nil
 | |
| 	}
 | |
| 
 | |
| 	// This is a "public" repository:
 | |
| 	// Any user that has read access, is a watcher or organization member can be requested to review
 | |
| 	if err := e.
 | |
| 		SQL("SELECT * FROM `user` WHERE id IN ( "+
 | |
| 			"SELECT user_id FROM `access` WHERE repo_id = ? AND mode >= ? "+
 | |
| 			"UNION "+
 | |
| 			"SELECT user_id FROM `watch` WHERE repo_id = ? AND mode IN (?, ?) "+
 | |
| 			"UNION "+
 | |
| 			"SELECT uid AS user_id FROM `org_user` WHERE org_id = ? "+
 | |
| 			") AND id NOT IN (?, ?) ORDER BY name",
 | |
| 			repo.ID, perm.AccessModeRead,
 | |
| 			repo.ID, RepoWatchModeNormal, RepoWatchModeAuto,
 | |
| 			repo.OwnerID,
 | |
| 			doerID, posterID).
 | |
| 		Find(&users); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	return users, nil
 | |
| }
 | |
| 
 | |
| // GetReviewers get all users can be requested to review:
 | |
| // * for private repositories this returns all users that have read access or higher to the repository.
 | |
| // * for public repositories this returns all users that have read access or higher to the repository,
 | |
| // all repo watchers and all organization members.
 | |
| // TODO: may be we should have a busy choice for users to block review request to them.
 | |
| func GetReviewers(repo *repo_model.Repository, doerID, posterID int64) ([]*user_model.User, error) {
 | |
| 	return getReviewers(db.DefaultContext, repo, doerID, posterID)
 | |
| }
 | |
| 
 | |
| // GetReviewerTeams get all teams can be requested to review
 | |
| func GetReviewerTeams(repo *repo_model.Repository) ([]*Team, error) {
 | |
| 	if err := repo.GetOwner(db.DefaultContext); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if !repo.Owner.IsOrganization() {
 | |
| 		return nil, nil
 | |
| 	}
 | |
| 
 | |
| 	teams, err := GetTeamsWithAccessToRepo(repo.OwnerID, repo.ID, perm.AccessModeRead)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	return teams, err
 | |
| }
 | |
| 
 | |
| func updateRepoSize(e db.Engine, repo *repo_model.Repository) error {
 | |
| 	size, err := util.GetDirectorySize(repo.RepoPath())
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("updateSize: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	lfsSize, err := e.Where("repository_id = ?", repo.ID).SumInt(new(LFSMetaObject), "size")
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("updateSize: GetLFSMetaObjects: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	repo.Size = size + lfsSize
 | |
| 	_, err = e.ID(repo.ID).Cols("size").NoAutoTime().Update(repo)
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // UpdateRepoSize updates the repository size, calculating it using util.GetDirectorySize
 | |
| func UpdateRepoSize(ctx context.Context, repo *repo_model.Repository) error {
 | |
| 	return updateRepoSize(db.GetEngine(ctx), repo)
 | |
| }
 | |
| 
 | |
| // CanUserForkRepo returns true if specified user can fork repository.
 | |
| func CanUserForkRepo(user *user_model.User, repo *repo_model.Repository) (bool, error) {
 | |
| 	if user == nil {
 | |
| 		return false, nil
 | |
| 	}
 | |
| 	if repo.OwnerID != user.ID && !HasForkedRepo(user.ID, repo.ID) {
 | |
| 		return true, nil
 | |
| 	}
 | |
| 	ownedOrgs, err := GetOrgsCanCreateRepoByUserID(user.ID)
 | |
| 	if err != nil {
 | |
| 		return false, err
 | |
| 	}
 | |
| 	for _, org := range ownedOrgs {
 | |
| 		if repo.OwnerID != org.ID && !HasForkedRepo(org.ID, repo.ID) {
 | |
| 			return true, nil
 | |
| 		}
 | |
| 	}
 | |
| 	return false, nil
 | |
| }
 | |
| 
 | |
| // CanUserDelete returns true if user could delete the repository
 | |
| func CanUserDelete(repo *repo_model.Repository, user *user_model.User) (bool, error) {
 | |
| 	if user.IsAdmin || user.ID == repo.OwnerID {
 | |
| 		return true, nil
 | |
| 	}
 | |
| 
 | |
| 	if err := repo.GetOwner(db.DefaultContext); err != nil {
 | |
| 		return false, err
 | |
| 	}
 | |
| 
 | |
| 	if repo.Owner.IsOrganization() {
 | |
| 		isOwner, err := OrgFromUser(repo.Owner).IsOwnedBy(user.ID)
 | |
| 		if err != nil {
 | |
| 			return false, err
 | |
| 		} else if isOwner {
 | |
| 			return true, nil
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return false, nil
 | |
| }
 | |
| 
 | |
| // GetRepoReaders returns all users that have explicit read access or higher to the repository.
 | |
| func GetRepoReaders(repo *repo_model.Repository) (_ []*user_model.User, err error) {
 | |
| 	return getUsersWithAccessMode(db.DefaultContext, repo, perm.AccessModeRead)
 | |
| }
 | |
| 
 | |
| // GetRepoWriters returns all users that have write access to the repository.
 | |
| func GetRepoWriters(repo *repo_model.Repository) (_ []*user_model.User, err error) {
 | |
| 	return getUsersWithAccessMode(db.DefaultContext, repo, perm.AccessModeWrite)
 | |
| }
 | |
| 
 | |
| // IsRepoReader returns true if user has explicit read access or higher to the repository.
 | |
| func IsRepoReader(repo *repo_model.Repository, userID int64) (bool, error) {
 | |
| 	if repo.OwnerID == userID {
 | |
| 		return true, nil
 | |
| 	}
 | |
| 	return db.GetEngine(db.DefaultContext).Where("repo_id = ? AND user_id = ? AND mode >= ?", repo.ID, userID, perm.AccessModeRead).Get(&Access{})
 | |
| }
 | |
| 
 | |
| // getUsersWithAccessMode returns users that have at least given access mode to the repository.
 | |
| func getUsersWithAccessMode(ctx context.Context, repo *repo_model.Repository, mode perm.AccessMode) (_ []*user_model.User, err error) {
 | |
| 	if err = repo.GetOwner(ctx); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	e := db.GetEngine(ctx)
 | |
| 	accesses := make([]*Access, 0, 10)
 | |
| 	if err = e.Where("repo_id = ? AND mode >= ?", repo.ID, mode).Find(&accesses); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	// Leave a seat for owner itself to append later, but if owner is an organization
 | |
| 	// and just waste 1 unit is cheaper than re-allocate memory once.
 | |
| 	users := make([]*user_model.User, 0, len(accesses)+1)
 | |
| 	if len(accesses) > 0 {
 | |
| 		userIDs := make([]int64, len(accesses))
 | |
| 		for i := 0; i < len(accesses); i++ {
 | |
| 			userIDs[i] = accesses[i].UserID
 | |
| 		}
 | |
| 
 | |
| 		if err = e.In("id", userIDs).Find(&users); err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 	}
 | |
| 	if !repo.Owner.IsOrganization() {
 | |
| 		users = append(users, repo.Owner)
 | |
| 	}
 | |
| 
 | |
| 	return users, nil
 | |
| }
 | |
| 
 | |
| // SetRepoReadBy sets repo to be visited by given user.
 | |
| func SetRepoReadBy(repoID, userID int64) error {
 | |
| 	return setRepoNotificationStatusReadIfUnread(db.GetEngine(db.DefaultContext), userID, repoID)
 | |
| }
 | |
| 
 | |
| // CheckCreateRepository check if could created a repository
 | |
| func CheckCreateRepository(doer, u *user_model.User, name string, overwriteOrAdopt bool) error {
 | |
| 	if !doer.CanCreateRepo() {
 | |
| 		return ErrReachLimitOfRepo{u.MaxRepoCreation}
 | |
| 	}
 | |
| 
 | |
| 	if err := IsUsableRepoName(name); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	has, err := repo_model.IsRepositoryExist(u, name)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("IsRepositoryExist: %v", err)
 | |
| 	} else if has {
 | |
| 		return ErrRepoAlreadyExist{u.Name, name}
 | |
| 	}
 | |
| 
 | |
| 	repoPath := repo_model.RepoPath(u.Name, name)
 | |
| 	isExist, err := util.IsExist(repoPath)
 | |
| 	if err != nil {
 | |
| 		log.Error("Unable to check if %s exists. Error: %v", repoPath, err)
 | |
| 		return err
 | |
| 	}
 | |
| 	if !overwriteOrAdopt && isExist {
 | |
| 		return ErrRepoFilesAlreadyExist{u.Name, name}
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // CreateRepoOptions contains the create repository options
 | |
| type CreateRepoOptions struct {
 | |
| 	Name           string
 | |
| 	Description    string
 | |
| 	OriginalURL    string
 | |
| 	GitServiceType api.GitServiceType
 | |
| 	Gitignores     string
 | |
| 	IssueLabels    string
 | |
| 	License        string
 | |
| 	Readme         string
 | |
| 	DefaultBranch  string
 | |
| 	IsPrivate      bool
 | |
| 	IsMirror       bool
 | |
| 	IsTemplate     bool
 | |
| 	AutoInit       bool
 | |
| 	Status         repo_model.RepositoryStatus
 | |
| 	TrustModel     repo_model.TrustModelType
 | |
| 	MirrorInterval string
 | |
| }
 | |
| 
 | |
| // ForkRepoOptions contains the fork repository options
 | |
| type ForkRepoOptions struct {
 | |
| 	BaseRepo    *repo_model.Repository
 | |
| 	Name        string
 | |
| 	Description string
 | |
| }
 | |
| 
 | |
| // GetRepoInitFile returns repository init files
 | |
| func GetRepoInitFile(tp, name string) ([]byte, error) {
 | |
| 	cleanedName := strings.TrimLeft(path.Clean("/"+name), "/")
 | |
| 	relPath := path.Join("options", tp, cleanedName)
 | |
| 
 | |
| 	// Use custom file when available.
 | |
| 	customPath := path.Join(setting.CustomPath, relPath)
 | |
| 	isFile, err := util.IsFile(customPath)
 | |
| 	if err != nil {
 | |
| 		log.Error("Unable to check if %s is a file. Error: %v", customPath, err)
 | |
| 	}
 | |
| 	if isFile {
 | |
| 		return os.ReadFile(customPath)
 | |
| 	}
 | |
| 
 | |
| 	switch tp {
 | |
| 	case "readme":
 | |
| 		return options.Readme(cleanedName)
 | |
| 	case "gitignore":
 | |
| 		return options.Gitignore(cleanedName)
 | |
| 	case "license":
 | |
| 		return options.License(cleanedName)
 | |
| 	case "label":
 | |
| 		return options.Labels(cleanedName)
 | |
| 	default:
 | |
| 		return []byte{}, fmt.Errorf("Invalid init file type")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| var (
 | |
| 	reservedRepoNames    = []string{".", ".."}
 | |
| 	reservedRepoPatterns = []string{"*.git", "*.wiki", "*.rss", "*.atom"}
 | |
| )
 | |
| 
 | |
| // IsUsableRepoName returns true when repository is usable
 | |
| func IsUsableRepoName(name string) error {
 | |
| 	if db.AlphaDashDotPattern.MatchString(name) {
 | |
| 		// Note: usually this error is normally caught up earlier in the UI
 | |
| 		return db.ErrNameCharsNotAllowed{Name: name}
 | |
| 	}
 | |
| 	return db.IsUsableName(reservedRepoNames, reservedRepoPatterns, name)
 | |
| }
 | |
| 
 | |
| // CreateRepository creates a repository for the user/organization.
 | |
| func CreateRepository(ctx context.Context, doer, u *user_model.User, repo *repo_model.Repository, overwriteOrAdopt bool) (err error) {
 | |
| 	if err = IsUsableRepoName(repo.Name); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	has, err := repo_model.IsRepositoryExistCtx(ctx, u, repo.Name)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("IsRepositoryExist: %v", err)
 | |
| 	} else if has {
 | |
| 		return ErrRepoAlreadyExist{u.Name, repo.Name}
 | |
| 	}
 | |
| 
 | |
| 	repoPath := repo_model.RepoPath(u.Name, repo.Name)
 | |
| 	isExist, err := util.IsExist(repoPath)
 | |
| 	if err != nil {
 | |
| 		log.Error("Unable to check if %s exists. Error: %v", repoPath, err)
 | |
| 		return err
 | |
| 	}
 | |
| 	if !overwriteOrAdopt && isExist {
 | |
| 		log.Error("Files already exist in %s and we are not going to adopt or delete.", repoPath)
 | |
| 		return ErrRepoFilesAlreadyExist{
 | |
| 			Uname: u.Name,
 | |
| 			Name:  repo.Name,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if err = db.Insert(ctx, repo); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if err = deleteRepoRedirect(db.GetEngine(ctx), u.ID, repo.Name); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// insert units for repo
 | |
| 	units := make([]repo_model.RepoUnit, 0, len(unit.DefaultRepoUnits))
 | |
| 	for _, tp := range unit.DefaultRepoUnits {
 | |
| 		if tp == unit.TypeIssues {
 | |
| 			units = append(units, repo_model.RepoUnit{
 | |
| 				RepoID: repo.ID,
 | |
| 				Type:   tp,
 | |
| 				Config: &repo_model.IssuesConfig{
 | |
| 					EnableTimetracker:                setting.Service.DefaultEnableTimetracking,
 | |
| 					AllowOnlyContributorsToTrackTime: setting.Service.DefaultAllowOnlyContributorsToTrackTime,
 | |
| 					EnableDependencies:               setting.Service.DefaultEnableDependencies,
 | |
| 				},
 | |
| 			})
 | |
| 		} else if tp == unit.TypePullRequests {
 | |
| 			units = append(units, repo_model.RepoUnit{
 | |
| 				RepoID: repo.ID,
 | |
| 				Type:   tp,
 | |
| 				Config: &repo_model.PullRequestsConfig{AllowMerge: true, AllowRebase: true, AllowRebaseMerge: true, AllowSquash: true, DefaultMergeStyle: repo_model.MergeStyleMerge},
 | |
| 			})
 | |
| 		} else {
 | |
| 			units = append(units, repo_model.RepoUnit{
 | |
| 				RepoID: repo.ID,
 | |
| 				Type:   tp,
 | |
| 			})
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if err = db.Insert(ctx, units); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// Remember visibility preference.
 | |
| 	u.LastRepoVisibility = repo.IsPrivate
 | |
| 	if err = user_model.UpdateUserColsEngine(db.GetEngine(ctx), u, "last_repo_visibility"); err != nil {
 | |
| 		return fmt.Errorf("updateUser: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if _, err = db.GetEngine(ctx).Incr("num_repos").ID(u.ID).Update(new(user_model.User)); err != nil {
 | |
| 		return fmt.Errorf("increment user total_repos: %v", err)
 | |
| 	}
 | |
| 	u.NumRepos++
 | |
| 
 | |
| 	// Give access to all members in teams with access to all repositories.
 | |
| 	if u.IsOrganization() {
 | |
| 		teams, err := OrgFromUser(u).loadTeams(db.GetEngine(ctx))
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("loadTeams: %v", err)
 | |
| 		}
 | |
| 		for _, t := range teams {
 | |
| 			if t.IncludesAllRepositories {
 | |
| 				if err := t.addRepository(ctx, repo); err != nil {
 | |
| 					return fmt.Errorf("addRepository: %v", err)
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		if isAdmin, err := isUserRepoAdmin(db.GetEngine(ctx), repo, doer); err != nil {
 | |
| 			return fmt.Errorf("isUserRepoAdmin: %v", err)
 | |
| 		} else if !isAdmin {
 | |
| 			// Make creator repo admin if it wan't assigned automatically
 | |
| 			if err = addCollaborator(ctx, repo, doer); err != nil {
 | |
| 				return fmt.Errorf("AddCollaborator: %v", err)
 | |
| 			}
 | |
| 			if err = changeCollaborationAccessMode(db.GetEngine(ctx), repo, doer.ID, perm.AccessModeAdmin); err != nil {
 | |
| 				return fmt.Errorf("ChangeCollaborationAccessMode: %v", err)
 | |
| 			}
 | |
| 		}
 | |
| 	} else if err = recalculateAccesses(ctx, repo); err != nil {
 | |
| 		// Organization automatically called this in addRepository method.
 | |
| 		return fmt.Errorf("recalculateAccesses: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if setting.Service.AutoWatchNewRepos {
 | |
| 		if err = watchRepo(db.GetEngine(ctx), doer.ID, repo.ID, true); err != nil {
 | |
| 			return fmt.Errorf("watchRepo: %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if err = webhook.CopyDefaultWebhooksToRepo(ctx, repo.ID); err != nil {
 | |
| 		return fmt.Errorf("copyDefaultWebhooksToRepo: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // CheckDaemonExportOK creates/removes git-daemon-export-ok for git-daemon...
 | |
| func CheckDaemonExportOK(ctx context.Context, repo *repo_model.Repository) error {
 | |
| 	if err := repo.GetOwner(ctx); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// Create/Remove git-daemon-export-ok for git-daemon...
 | |
| 	daemonExportFile := path.Join(repo.RepoPath(), `git-daemon-export-ok`)
 | |
| 
 | |
| 	isExist, err := util.IsExist(daemonExportFile)
 | |
| 	if err != nil {
 | |
| 		log.Error("Unable to check if %s exists. Error: %v", daemonExportFile, err)
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	isPublic := !repo.IsPrivate && repo.Owner.Visibility == api.VisibleTypePublic
 | |
| 	if !isPublic && isExist {
 | |
| 		if err = util.Remove(daemonExportFile); err != nil {
 | |
| 			log.Error("Failed to remove %s: %v", daemonExportFile, err)
 | |
| 		}
 | |
| 	} else if isPublic && !isExist {
 | |
| 		if f, err := os.Create(daemonExportFile); err != nil {
 | |
| 			log.Error("Failed to create %s: %v", daemonExportFile, err)
 | |
| 		} else {
 | |
| 			f.Close()
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // IncrementRepoForkNum increment repository fork number
 | |
| func IncrementRepoForkNum(ctx context.Context, repoID int64) error {
 | |
| 	_, err := db.GetEngine(ctx).Exec("UPDATE `repository` SET num_forks=num_forks+1 WHERE id=?", repoID)
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // DecrementRepoForkNum decrement repository fork number
 | |
| func DecrementRepoForkNum(ctx context.Context, repoID int64) error {
 | |
| 	_, err := db.GetEngine(ctx).Exec("UPDATE `repository` SET num_forks=num_forks-1 WHERE id=?", repoID)
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // ChangeRepositoryName changes all corresponding setting from old repository name to new one.
 | |
| func ChangeRepositoryName(doer *user_model.User, repo *repo_model.Repository, newRepoName string) (err error) {
 | |
| 	oldRepoName := repo.Name
 | |
| 	newRepoName = strings.ToLower(newRepoName)
 | |
| 	if err = IsUsableRepoName(newRepoName); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if err := repo.GetOwner(db.DefaultContext); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	has, err := repo_model.IsRepositoryExist(repo.Owner, newRepoName)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("IsRepositoryExist: %v", err)
 | |
| 	} else if has {
 | |
| 		return ErrRepoAlreadyExist{repo.Owner.Name, newRepoName}
 | |
| 	}
 | |
| 
 | |
| 	newRepoPath := repo_model.RepoPath(repo.Owner.Name, newRepoName)
 | |
| 	if err = util.Rename(repo.RepoPath(), newRepoPath); err != nil {
 | |
| 		return fmt.Errorf("rename repository directory: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	wikiPath := repo.WikiPath()
 | |
| 	isExist, err := util.IsExist(wikiPath)
 | |
| 	if err != nil {
 | |
| 		log.Error("Unable to check if %s exists. Error: %v", wikiPath, err)
 | |
| 		return err
 | |
| 	}
 | |
| 	if isExist {
 | |
| 		if err = util.Rename(wikiPath, repo_model.WikiPath(repo.Owner.Name, newRepoName)); err != nil {
 | |
| 			return fmt.Errorf("rename repository wiki: %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	ctx, committer, err := db.TxContext()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	defer committer.Close()
 | |
| 
 | |
| 	if err := newRepoRedirect(db.GetEngine(ctx), repo.Owner.ID, repo.ID, oldRepoName, newRepoName); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	return committer.Commit()
 | |
| }
 | |
| 
 | |
| func getRepositoriesByForkID(e db.Engine, forkID int64) ([]*repo_model.Repository, error) {
 | |
| 	repos := make([]*repo_model.Repository, 0, 10)
 | |
| 	return repos, e.
 | |
| 		Where("fork_id=?", forkID).
 | |
| 		Find(&repos)
 | |
| }
 | |
| 
 | |
| // GetRepositoriesByForkID returns all repositories with given fork ID.
 | |
| func GetRepositoriesByForkID(forkID int64) ([]*repo_model.Repository, error) {
 | |
| 	return getRepositoriesByForkID(db.GetEngine(db.DefaultContext), forkID)
 | |
| }
 | |
| 
 | |
| func updateRepository(ctx context.Context, repo *repo_model.Repository, visibilityChanged bool) (err error) {
 | |
| 	repo.LowerName = strings.ToLower(repo.Name)
 | |
| 
 | |
| 	if utf8.RuneCountInString(repo.Description) > 255 {
 | |
| 		repo.Description = string([]rune(repo.Description)[:255])
 | |
| 	}
 | |
| 	if utf8.RuneCountInString(repo.Website) > 255 {
 | |
| 		repo.Website = string([]rune(repo.Website)[:255])
 | |
| 	}
 | |
| 
 | |
| 	e := db.GetEngine(ctx)
 | |
| 
 | |
| 	if _, err = e.ID(repo.ID).AllCols().Update(repo); err != nil {
 | |
| 		return fmt.Errorf("update: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if err = updateRepoSize(e, repo); err != nil {
 | |
| 		log.Error("Failed to update size for repository: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if visibilityChanged {
 | |
| 		if err = repo.GetOwner(ctx); err != nil {
 | |
| 			return fmt.Errorf("getOwner: %v", err)
 | |
| 		}
 | |
| 		if repo.Owner.IsOrganization() {
 | |
| 			// Organization repository need to recalculate access table when visibility is changed.
 | |
| 			if err = recalculateTeamAccesses(ctx, repo, 0); err != nil {
 | |
| 				return fmt.Errorf("recalculateTeamAccesses: %v", err)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		// If repo has become private, we need to set its actions to private.
 | |
| 		if repo.IsPrivate {
 | |
| 			_, err = e.Where("repo_id = ?", repo.ID).Cols("is_private").Update(&Action{
 | |
| 				IsPrivate: true,
 | |
| 			})
 | |
| 			if err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		// Create/Remove git-daemon-export-ok for git-daemon...
 | |
| 		if err := CheckDaemonExportOK(db.WithEngine(ctx, e), repo); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		forkRepos, err := getRepositoriesByForkID(e, repo.ID)
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("getRepositoriesByForkID: %v", err)
 | |
| 		}
 | |
| 		for i := range forkRepos {
 | |
| 			forkRepos[i].IsPrivate = repo.IsPrivate || repo.Owner.Visibility == api.VisibleTypePrivate
 | |
| 			if err = updateRepository(ctx, forkRepos[i], true); err != nil {
 | |
| 				return fmt.Errorf("updateRepository[%d]: %v", forkRepos[i].ID, err)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // UpdateRepositoryCtx updates a repository with db context
 | |
| func UpdateRepositoryCtx(ctx context.Context, repo *repo_model.Repository, visibilityChanged bool) error {
 | |
| 	return updateRepository(ctx, repo, visibilityChanged)
 | |
| }
 | |
| 
 | |
| // UpdateRepository updates a repository
 | |
| func UpdateRepository(repo *repo_model.Repository, visibilityChanged bool) (err error) {
 | |
| 	ctx, committer, err := db.TxContext()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	defer committer.Close()
 | |
| 
 | |
| 	if err = updateRepository(ctx, repo, visibilityChanged); err != nil {
 | |
| 		return fmt.Errorf("updateRepository: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	return committer.Commit()
 | |
| }
 | |
| 
 | |
| // UpdateRepositoryOwnerNames updates repository owner_names (this should only be used when the ownerName has changed case)
 | |
| func UpdateRepositoryOwnerNames(ownerID int64, ownerName string) error {
 | |
| 	if ownerID == 0 {
 | |
| 		return nil
 | |
| 	}
 | |
| 	ctx, committer, err := db.TxContext()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	defer committer.Close()
 | |
| 
 | |
| 	if _, err := db.GetEngine(ctx).Where("owner_id = ?", ownerID).Cols("owner_name").Update(&repo_model.Repository{
 | |
| 		OwnerName: ownerName,
 | |
| 	}); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	return committer.Commit()
 | |
| }
 | |
| 
 | |
| // UpdateRepositoryUpdatedTime updates a repository's updated time
 | |
| func UpdateRepositoryUpdatedTime(repoID int64, updateTime time.Time) error {
 | |
| 	_, err := db.GetEngine(db.DefaultContext).Exec("UPDATE repository SET updated_unix = ? WHERE id = ?", updateTime.Unix(), repoID)
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // UpdateRepositoryUnits updates a repository's units
 | |
| func UpdateRepositoryUnits(repo *repo_model.Repository, units []repo_model.RepoUnit, deleteUnitTypes []unit.Type) (err error) {
 | |
| 	ctx, committer, err := db.TxContext()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	defer committer.Close()
 | |
| 
 | |
| 	// Delete existing settings of units before adding again
 | |
| 	for _, u := range units {
 | |
| 		deleteUnitTypes = append(deleteUnitTypes, u.Type)
 | |
| 	}
 | |
| 
 | |
| 	if _, err = db.GetEngine(ctx).Where("repo_id = ?", repo.ID).In("type", deleteUnitTypes).Delete(new(repo_model.RepoUnit)); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if len(units) > 0 {
 | |
| 		if err = db.Insert(ctx, units); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return committer.Commit()
 | |
| }
 | |
| 
 | |
| // DeleteRepository deletes a repository for a user or organization.
 | |
| // make sure if you call this func to close open sessions (sqlite will otherwise get a deadlock)
 | |
| func DeleteRepository(doer *user_model.User, uid, repoID int64) error {
 | |
| 	ctx, committer, err := db.TxContext()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	defer committer.Close()
 | |
| 	sess := db.GetEngine(ctx)
 | |
| 
 | |
| 	// In case is a organization.
 | |
| 	org, err := user_model.GetUserByIDEngine(sess, uid)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	repo := &repo_model.Repository{OwnerID: uid}
 | |
| 	has, err := sess.ID(repoID).Get(repo)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	} else if !has {
 | |
| 		return repo_model.ErrRepoNotExist{
 | |
| 			ID:        repoID,
 | |
| 			UID:       uid,
 | |
| 			OwnerName: "",
 | |
| 			Name:      "",
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Delete Deploy Keys
 | |
| 	deployKeys, err := listDeployKeys(sess, &ListDeployKeysOptions{RepoID: repoID})
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("listDeployKeys: %v", err)
 | |
| 	}
 | |
| 	for _, dKey := range deployKeys {
 | |
| 		if err := deleteDeployKey(ctx, doer, dKey.ID); err != nil {
 | |
| 			return fmt.Errorf("deleteDeployKeys: %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if cnt, err := sess.ID(repoID).Delete(&repo_model.Repository{}); err != nil {
 | |
| 		return err
 | |
| 	} else if cnt != 1 {
 | |
| 		return repo_model.ErrRepoNotExist{
 | |
| 			ID:        repoID,
 | |
| 			UID:       uid,
 | |
| 			OwnerName: "",
 | |
| 			Name:      "",
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if org.IsOrganization() {
 | |
| 		teams, err := OrgFromUser(org).loadTeams(sess)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		for _, t := range teams {
 | |
| 			if !t.hasRepository(sess, repoID) {
 | |
| 				continue
 | |
| 			} else if err = t.removeRepository(ctx, repo, false); err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	attachments := make([]*repo_model.Attachment, 0, 20)
 | |
| 	if err = sess.Join("INNER", "`release`", "`release`.id = `attachment`.release_id").
 | |
| 		Where("`release`.repo_id = ?", repoID).
 | |
| 		Find(&attachments); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	releaseAttachments := make([]string, 0, len(attachments))
 | |
| 	for i := 0; i < len(attachments); i++ {
 | |
| 		releaseAttachments = append(releaseAttachments, attachments[i].RelativePath())
 | |
| 	}
 | |
| 
 | |
| 	if _, err := sess.Exec("UPDATE `user` SET num_stars=num_stars-1 WHERE id IN (SELECT `uid` FROM `star` WHERE repo_id = ?)", repo.ID); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if err := deleteBeans(sess,
 | |
| 		&Access{RepoID: repo.ID},
 | |
| 		&Action{RepoID: repo.ID},
 | |
| 		&Collaboration{RepoID: repoID},
 | |
| 		&Comment{RefRepoID: repoID},
 | |
| 		&CommitStatus{RepoID: repoID},
 | |
| 		&DeletedBranch{RepoID: repoID},
 | |
| 		&webhook.HookTask{RepoID: repoID},
 | |
| 		&LFSLock{RepoID: repoID},
 | |
| 		&repo_model.LanguageStat{RepoID: repoID},
 | |
| 		&Milestone{RepoID: repoID},
 | |
| 		&repo_model.Mirror{RepoID: repoID},
 | |
| 		&Notification{RepoID: repoID},
 | |
| 		&ProtectedBranch{RepoID: repoID},
 | |
| 		&ProtectedTag{RepoID: repoID},
 | |
| 		&PullRequest{BaseRepoID: repoID},
 | |
| 		&repo_model.PushMirror{RepoID: repoID},
 | |
| 		&Release{RepoID: repoID},
 | |
| 		&repo_model.RepoIndexerStatus{RepoID: repoID},
 | |
| 		&RepoRedirect{RedirectRepoID: repoID},
 | |
| 		&repo_model.RepoUnit{RepoID: repoID},
 | |
| 		&Star{RepoID: repoID},
 | |
| 		&Task{RepoID: repoID},
 | |
| 		&Watch{RepoID: repoID},
 | |
| 		&webhook.Webhook{RepoID: repoID},
 | |
| 	); err != nil {
 | |
| 		return fmt.Errorf("deleteBeans: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	// Delete Labels and related objects
 | |
| 	if err := deleteLabelsByRepoID(sess, repoID); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// Delete Issues and related objects
 | |
| 	var attachmentPaths []string
 | |
| 	if attachmentPaths, err = deleteIssuesByRepoID(sess, repoID); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// Delete issue index
 | |
| 	if err := db.DeleteResouceIndex(sess, "issue_index", repoID); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if repo.IsFork {
 | |
| 		if _, err := sess.Exec("UPDATE `repository` SET num_forks=num_forks-1 WHERE id=?", repo.ForkID); err != nil {
 | |
| 			return fmt.Errorf("decrease fork count: %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if _, err := sess.Exec("UPDATE `user` SET num_repos=num_repos-1 WHERE id=?", uid); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if len(repo.Topics) > 0 {
 | |
| 		if err := removeTopicsFromRepo(sess, repo.ID); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	projects, _, err := getProjects(sess, ProjectSearchOptions{
 | |
| 		RepoID: repoID,
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("get projects: %v", err)
 | |
| 	}
 | |
| 	for i := range projects {
 | |
| 		if err := deleteProjectByID(sess, projects[i].ID); err != nil {
 | |
| 			return fmt.Errorf("delete project [%d]: %v", projects[i].ID, err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Remove LFS objects
 | |
| 	var lfsObjects []*LFSMetaObject
 | |
| 	if err = sess.Where("repository_id=?", repoID).Find(&lfsObjects); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	var lfsPaths = make([]string, 0, len(lfsObjects))
 | |
| 	for _, v := range lfsObjects {
 | |
| 		count, err := sess.Count(&LFSMetaObject{Pointer: lfs.Pointer{Oid: v.Oid}})
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		if count > 1 {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		lfsPaths = append(lfsPaths, v.RelativePath())
 | |
| 	}
 | |
| 
 | |
| 	if _, err := sess.Delete(&LFSMetaObject{RepositoryID: repoID}); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// Remove archives
 | |
| 	var archives []*repo_model.RepoArchiver
 | |
| 	if err = sess.Where("repo_id=?", repoID).Find(&archives); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	var archivePaths = make([]string, 0, len(archives))
 | |
| 	for _, v := range archives {
 | |
| 		p, _ := v.RelativePath()
 | |
| 		archivePaths = append(archivePaths, p)
 | |
| 	}
 | |
| 
 | |
| 	if _, err := sess.Delete(&repo_model.RepoArchiver{RepoID: repoID}); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if repo.NumForks > 0 {
 | |
| 		if _, err = sess.Exec("UPDATE `repository` SET fork_id=0,is_fork=? WHERE fork_id=?", false, repo.ID); err != nil {
 | |
| 			log.Error("reset 'fork_id' and 'is_fork': %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Get all attachments with both issue_id and release_id are zero
 | |
| 	var newAttachments []*repo_model.Attachment
 | |
| 	if err := sess.Where(builder.Eq{
 | |
| 		"repo_id":    repo.ID,
 | |
| 		"issue_id":   0,
 | |
| 		"release_id": 0,
 | |
| 	}).Find(&newAttachments); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	var newAttachmentPaths = make([]string, 0, len(newAttachments))
 | |
| 	for _, attach := range newAttachments {
 | |
| 		newAttachmentPaths = append(newAttachmentPaths, attach.RelativePath())
 | |
| 	}
 | |
| 
 | |
| 	if _, err := sess.Where("repo_id=?", repo.ID).Delete(new(repo_model.Attachment)); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if err = committer.Commit(); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	committer.Close()
 | |
| 
 | |
| 	// We should always delete the files after the database transaction succeed. If
 | |
| 	// we delete the file but the database rollback, the repository will be broken.
 | |
| 
 | |
| 	// Remove repository files.
 | |
| 	repoPath := repo.RepoPath()
 | |
| 	admin_model.RemoveAllWithNotice(db.DefaultContext, "Delete repository files", repoPath)
 | |
| 
 | |
| 	// Remove wiki files
 | |
| 	if repo.HasWiki() {
 | |
| 		admin_model.RemoveAllWithNotice(db.DefaultContext, "Delete repository wiki", repo.WikiPath())
 | |
| 	}
 | |
| 
 | |
| 	// Remove archives
 | |
| 	for i := range archivePaths {
 | |
| 		admin_model.RemoveStorageWithNotice(db.DefaultContext, storage.RepoArchives, "Delete repo archive file", archivePaths[i])
 | |
| 	}
 | |
| 
 | |
| 	// Remove lfs objects
 | |
| 	for i := range lfsPaths {
 | |
| 		admin_model.RemoveStorageWithNotice(db.DefaultContext, storage.LFS, "Delete orphaned LFS file", lfsPaths[i])
 | |
| 	}
 | |
| 
 | |
| 	// Remove issue attachment files.
 | |
| 	for i := range attachmentPaths {
 | |
| 		admin_model.RemoveStorageWithNotice(db.DefaultContext, storage.Attachments, "Delete issue attachment", attachmentPaths[i])
 | |
| 	}
 | |
| 
 | |
| 	// Remove release attachment files.
 | |
| 	for i := range releaseAttachments {
 | |
| 		admin_model.RemoveStorageWithNotice(db.DefaultContext, storage.Attachments, "Delete release attachment", releaseAttachments[i])
 | |
| 	}
 | |
| 
 | |
| 	// Remove attachment with no issue_id and release_id.
 | |
| 	for i := range newAttachmentPaths {
 | |
| 		admin_model.RemoveStorageWithNotice(db.DefaultContext, storage.Attachments, "Delete issue attachment", attachmentPaths[i])
 | |
| 	}
 | |
| 
 | |
| 	if len(repo.Avatar) > 0 {
 | |
| 		if err := storage.RepoAvatars.Delete(repo.CustomAvatarRelativePath()); err != nil {
 | |
| 			return fmt.Errorf("Failed to remove %s: %v", repo.Avatar, err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| type repoChecker struct {
 | |
| 	querySQL, correctSQL string
 | |
| 	desc                 string
 | |
| }
 | |
| 
 | |
| func repoStatsCheck(ctx context.Context, checker *repoChecker) {
 | |
| 	results, err := db.GetEngine(db.DefaultContext).Query(checker.querySQL)
 | |
| 	if err != nil {
 | |
| 		log.Error("Select %s: %v", checker.desc, err)
 | |
| 		return
 | |
| 	}
 | |
| 	for _, result := range results {
 | |
| 		id, _ := strconv.ParseInt(string(result["id"]), 10, 64)
 | |
| 		select {
 | |
| 		case <-ctx.Done():
 | |
| 			log.Warn("CheckRepoStats: Cancelled before checking %s for Repo[%d]", checker.desc, id)
 | |
| 			return
 | |
| 		default:
 | |
| 		}
 | |
| 		log.Trace("Updating %s: %d", checker.desc, id)
 | |
| 		_, err = db.GetEngine(db.DefaultContext).Exec(checker.correctSQL, id, id)
 | |
| 		if err != nil {
 | |
| 			log.Error("Update %s[%d]: %v", checker.desc, id, err)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // CheckRepoStats checks the repository stats
 | |
| func CheckRepoStats(ctx context.Context) error {
 | |
| 	log.Trace("Doing: CheckRepoStats")
 | |
| 
 | |
| 	checkers := []*repoChecker{
 | |
| 		// Repository.NumWatches
 | |
| 		{
 | |
| 			"SELECT repo.id FROM `repository` repo WHERE repo.num_watches!=(SELECT COUNT(*) FROM `watch` WHERE repo_id=repo.id AND mode<>2)",
 | |
| 			"UPDATE `repository` SET num_watches=(SELECT COUNT(*) FROM `watch` WHERE repo_id=? AND mode<>2) WHERE id=?",
 | |
| 			"repository count 'num_watches'",
 | |
| 		},
 | |
| 		// Repository.NumStars
 | |
| 		{
 | |
| 			"SELECT repo.id FROM `repository` repo WHERE repo.num_stars!=(SELECT COUNT(*) FROM `star` WHERE repo_id=repo.id)",
 | |
| 			"UPDATE `repository` SET num_stars=(SELECT COUNT(*) FROM `star` WHERE repo_id=?) WHERE id=?",
 | |
| 			"repository count 'num_stars'",
 | |
| 		},
 | |
| 		// Label.NumIssues
 | |
| 		{
 | |
| 			"SELECT label.id FROM `label` WHERE label.num_issues!=(SELECT COUNT(*) FROM `issue_label` WHERE label_id=label.id)",
 | |
| 			"UPDATE `label` SET num_issues=(SELECT COUNT(*) FROM `issue_label` WHERE label_id=?) WHERE id=?",
 | |
| 			"label count 'num_issues'",
 | |
| 		},
 | |
| 		// User.NumRepos
 | |
| 		{
 | |
| 			"SELECT `user`.id FROM `user` WHERE `user`.num_repos!=(SELECT COUNT(*) FROM `repository` WHERE owner_id=`user`.id)",
 | |
| 			"UPDATE `user` SET num_repos=(SELECT COUNT(*) FROM `repository` WHERE owner_id=?) WHERE id=?",
 | |
| 			"user count 'num_repos'",
 | |
| 		},
 | |
| 		// Issue.NumComments
 | |
| 		{
 | |
| 			"SELECT `issue`.id FROM `issue` WHERE `issue`.num_comments!=(SELECT COUNT(*) FROM `comment` WHERE issue_id=`issue`.id AND type=0)",
 | |
| 			"UPDATE `issue` SET num_comments=(SELECT COUNT(*) FROM `comment` WHERE issue_id=? AND type=0) WHERE id=?",
 | |
| 			"issue count 'num_comments'",
 | |
| 		},
 | |
| 	}
 | |
| 	for _, checker := range checkers {
 | |
| 		select {
 | |
| 		case <-ctx.Done():
 | |
| 			log.Warn("CheckRepoStats: Cancelled before %s", checker.desc)
 | |
| 			return db.ErrCancelledf("before checking %s", checker.desc)
 | |
| 		default:
 | |
| 			repoStatsCheck(ctx, checker)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// ***** START: Repository.NumClosedIssues *****
 | |
| 	desc := "repository count 'num_closed_issues'"
 | |
| 	results, err := db.GetEngine(db.DefaultContext).Query("SELECT repo.id FROM `repository` repo WHERE repo.num_closed_issues!=(SELECT COUNT(*) FROM `issue` WHERE repo_id=repo.id AND is_closed=? AND is_pull=?)", true, false)
 | |
| 	if err != nil {
 | |
| 		log.Error("Select %s: %v", desc, err)
 | |
| 	} else {
 | |
| 		for _, result := range results {
 | |
| 			id, _ := strconv.ParseInt(string(result["id"]), 10, 64)
 | |
| 			select {
 | |
| 			case <-ctx.Done():
 | |
| 				log.Warn("CheckRepoStats: Cancelled during %s for repo ID %d", desc, id)
 | |
| 				return db.ErrCancelledf("during %s for repo ID %d", desc, id)
 | |
| 			default:
 | |
| 			}
 | |
| 			log.Trace("Updating %s: %d", desc, id)
 | |
| 			_, err = db.GetEngine(db.DefaultContext).Exec("UPDATE `repository` SET num_closed_issues=(SELECT COUNT(*) FROM `issue` WHERE repo_id=? AND is_closed=? AND is_pull=?) WHERE id=?", id, true, false, id)
 | |
| 			if err != nil {
 | |
| 				log.Error("Update %s[%d]: %v", desc, id, err)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	// ***** END: Repository.NumClosedIssues *****
 | |
| 
 | |
| 	// ***** START: Repository.NumClosedPulls *****
 | |
| 	desc = "repository count 'num_closed_pulls'"
 | |
| 	results, err = db.GetEngine(db.DefaultContext).Query("SELECT repo.id FROM `repository` repo WHERE repo.num_closed_pulls!=(SELECT COUNT(*) FROM `issue` WHERE repo_id=repo.id AND is_closed=? AND is_pull=?)", true, true)
 | |
| 	if err != nil {
 | |
| 		log.Error("Select %s: %v", desc, err)
 | |
| 	} else {
 | |
| 		for _, result := range results {
 | |
| 			id, _ := strconv.ParseInt(string(result["id"]), 10, 64)
 | |
| 			select {
 | |
| 			case <-ctx.Done():
 | |
| 				log.Warn("CheckRepoStats: Cancelled")
 | |
| 				return db.ErrCancelledf("during %s for repo ID %d", desc, id)
 | |
| 			default:
 | |
| 			}
 | |
| 			log.Trace("Updating %s: %d", desc, id)
 | |
| 			_, err = db.GetEngine(db.DefaultContext).Exec("UPDATE `repository` SET num_closed_pulls=(SELECT COUNT(*) FROM `issue` WHERE repo_id=? AND is_closed=? AND is_pull=?) WHERE id=?", id, true, true, id)
 | |
| 			if err != nil {
 | |
| 				log.Error("Update %s[%d]: %v", desc, id, err)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	// ***** END: Repository.NumClosedPulls *****
 | |
| 
 | |
| 	// FIXME: use checker when stop supporting old fork repo format.
 | |
| 	// ***** START: Repository.NumForks *****
 | |
| 	results, err = db.GetEngine(db.DefaultContext).Query("SELECT repo.id FROM `repository` repo WHERE repo.num_forks!=(SELECT COUNT(*) FROM `repository` WHERE fork_id=repo.id)")
 | |
| 	if err != nil {
 | |
| 		log.Error("Select repository count 'num_forks': %v", err)
 | |
| 	} else {
 | |
| 		for _, result := range results {
 | |
| 			id, _ := strconv.ParseInt(string(result["id"]), 10, 64)
 | |
| 			select {
 | |
| 			case <-ctx.Done():
 | |
| 				log.Warn("CheckRepoStats: Cancelled")
 | |
| 				return db.ErrCancelledf("during %s for repo ID %d", desc, id)
 | |
| 			default:
 | |
| 			}
 | |
| 			log.Trace("Updating repository count 'num_forks': %d", id)
 | |
| 
 | |
| 			repo, err := repo_model.GetRepositoryByID(id)
 | |
| 			if err != nil {
 | |
| 				log.Error("repo_model.GetRepositoryByID[%d]: %v", id, err)
 | |
| 				continue
 | |
| 			}
 | |
| 
 | |
| 			rawResult, err := db.GetEngine(db.DefaultContext).Query("SELECT COUNT(*) FROM `repository` WHERE fork_id=?", repo.ID)
 | |
| 			if err != nil {
 | |
| 				log.Error("Select count of forks[%d]: %v", repo.ID, err)
 | |
| 				continue
 | |
| 			}
 | |
| 			repo.NumForks = int(parseCountResult(rawResult))
 | |
| 
 | |
| 			if err = UpdateRepository(repo, false); err != nil {
 | |
| 				log.Error("UpdateRepository[%d]: %v", id, err)
 | |
| 				continue
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	// ***** END: Repository.NumForks *****
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // SetArchiveRepoState sets if a repo is archived
 | |
| func SetArchiveRepoState(repo *repo_model.Repository, isArchived bool) (err error) {
 | |
| 	repo.IsArchived = isArchived
 | |
| 	_, err = db.GetEngine(db.DefaultContext).Where("id = ?", repo.ID).Cols("is_archived").NoAutoTime().Update(repo)
 | |
| 	return
 | |
| }
 | |
| 
 | |
| // ___________           __
 | |
| // \_   _____/__________|  | __
 | |
| //  |    __)/  _ \_  __ \  |/ /
 | |
| //  |     \(  <_> )  | \/    <
 | |
| //  \___  / \____/|__|  |__|_ \
 | |
| //      \/                   \/
 | |
| 
 | |
| // GetForkedRepo checks if given user has already forked a repository with given ID.
 | |
| func GetForkedRepo(ownerID, repoID int64) *repo_model.Repository {
 | |
| 	repo := new(repo_model.Repository)
 | |
| 	has, _ := db.GetEngine(db.DefaultContext).
 | |
| 		Where("owner_id=? AND fork_id=?", ownerID, repoID).
 | |
| 		Get(repo)
 | |
| 	if has {
 | |
| 		return repo
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // HasForkedRepo checks if given user has already forked a repository with given ID.
 | |
| func HasForkedRepo(ownerID, repoID int64) bool {
 | |
| 	has, _ := db.GetEngine(db.DefaultContext).
 | |
| 		Table("repository").
 | |
| 		Where("owner_id=? AND fork_id=?", ownerID, repoID).
 | |
| 		Exist()
 | |
| 	return has
 | |
| }
 | |
| 
 | |
| // GetForks returns all the forks of the repository
 | |
| func GetForks(repo *repo_model.Repository, listOptions db.ListOptions) ([]*repo_model.Repository, error) {
 | |
| 	if listOptions.Page == 0 {
 | |
| 		forks := make([]*repo_model.Repository, 0, repo.NumForks)
 | |
| 		return forks, db.GetEngine(db.DefaultContext).Find(&forks, &repo_model.Repository{ForkID: repo.ID})
 | |
| 	}
 | |
| 
 | |
| 	sess := db.GetPaginatedSession(&listOptions)
 | |
| 	forks := make([]*repo_model.Repository, 0, listOptions.PageSize)
 | |
| 	return forks, sess.Find(&forks, &repo_model.Repository{ForkID: repo.ID})
 | |
| }
 | |
| 
 | |
| // GetUserFork return user forked repository from this repository, if not forked return nil
 | |
| func GetUserFork(repoID, userID int64) (*repo_model.Repository, error) {
 | |
| 	var forkedRepo repo_model.Repository
 | |
| 	has, err := db.GetEngine(db.DefaultContext).Where("fork_id = ?", repoID).And("owner_id = ?", userID).Get(&forkedRepo)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if !has {
 | |
| 		return nil, nil
 | |
| 	}
 | |
| 	return &forkedRepo, nil
 | |
| }
 | |
| 
 | |
| func updateRepositoryCols(e db.Engine, repo *repo_model.Repository, cols ...string) error {
 | |
| 	_, err := e.ID(repo.ID).Cols(cols...).Update(repo)
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // UpdateRepositoryCols updates repository's columns
 | |
| func UpdateRepositoryCols(repo *repo_model.Repository, cols ...string) error {
 | |
| 	return updateRepositoryCols(db.GetEngine(db.DefaultContext), repo, cols...)
 | |
| }
 | |
| 
 | |
| func updateUserStarNumbers(users []user_model.User) error {
 | |
| 	ctx, committer, err := db.TxContext()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	defer committer.Close()
 | |
| 
 | |
| 	for _, user := range users {
 | |
| 		if _, err = db.Exec(ctx, "UPDATE `user` SET num_stars=(SELECT COUNT(*) FROM `star` WHERE uid=?) WHERE id=?", user.ID, user.ID); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return committer.Commit()
 | |
| }
 | |
| 
 | |
| // DoctorUserStarNum recalculate Stars number for all user
 | |
| func DoctorUserStarNum() (err error) {
 | |
| 	const batchSize = 100
 | |
| 
 | |
| 	for start := 0; ; start += batchSize {
 | |
| 		users := make([]user_model.User, 0, batchSize)
 | |
| 		if err = db.GetEngine(db.DefaultContext).Limit(batchSize, start).Where("type = ?", 0).Cols("id").Find(&users); err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 		if len(users) == 0 {
 | |
| 			break
 | |
| 		}
 | |
| 
 | |
| 		if err = updateUserStarNumbers(users); err != nil {
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	log.Debug("recalculate Stars number for all user finished")
 | |
| 
 | |
| 	return
 | |
| }
 | |
| 
 | |
| // IterateRepository iterate repositories
 | |
| func IterateRepository(f func(repo *repo_model.Repository) error) error {
 | |
| 	var start int
 | |
| 	batchSize := setting.Database.IterateBufferSize
 | |
| 	for {
 | |
| 		repos := make([]*repo_model.Repository, 0, batchSize)
 | |
| 		if err := db.GetEngine(db.DefaultContext).Limit(batchSize, start).Find(&repos); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		if len(repos) == 0 {
 | |
| 			return nil
 | |
| 		}
 | |
| 		start += len(repos)
 | |
| 
 | |
| 		for _, repo := range repos {
 | |
| 			if err := f(repo); err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // LinkedRepository returns the linked repo if any
 | |
| func LinkedRepository(a *repo_model.Attachment) (*repo_model.Repository, unit.Type, error) {
 | |
| 	if a.IssueID != 0 {
 | |
| 		iss, err := GetIssueByID(a.IssueID)
 | |
| 		if err != nil {
 | |
| 			return nil, unit.TypeIssues, err
 | |
| 		}
 | |
| 		repo, err := repo_model.GetRepositoryByID(iss.RepoID)
 | |
| 		unitType := unit.TypeIssues
 | |
| 		if iss.IsPull {
 | |
| 			unitType = unit.TypePullRequests
 | |
| 		}
 | |
| 		return repo, unitType, err
 | |
| 	} else if a.ReleaseID != 0 {
 | |
| 		rel, err := GetReleaseByID(a.ReleaseID)
 | |
| 		if err != nil {
 | |
| 			return nil, unit.TypeReleases, err
 | |
| 		}
 | |
| 		repo, err := repo_model.GetRepositoryByID(rel.RepoID)
 | |
| 		return repo, unit.TypeReleases, err
 | |
| 	}
 | |
| 	return nil, -1, nil
 | |
| }
 |