81b29d6263
Backport #18680 Following the merging of #17811 teams can now have differing write and readonly permissions, however the assignee list will not include teams which have mixed perms. Further the org sidebar is no longer helpful as it can't describe these mixed permissions situations. Fix #18572 Signed-off-by: Andrew Thornton <art27@cantab.net>
1356 lines
41 KiB
Go
1356 lines
41 KiB
Go
// Copyright 2014 The Gogs Authors. All rights reserved.
|
|
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
// Use of this source code is governed by a MIT-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package models
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"os"
|
|
"path"
|
|
"path/filepath"
|
|
"sort"
|
|
"strconv"
|
|
"strings"
|
|
"unicode/utf8"
|
|
|
|
_ "image/jpeg" // Needed for jpeg support
|
|
|
|
admin_model "code.gitea.io/gitea/models/admin"
|
|
asymkey_model "code.gitea.io/gitea/models/asymkey"
|
|
"code.gitea.io/gitea/models/db"
|
|
"code.gitea.io/gitea/models/perm"
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
|
"code.gitea.io/gitea/models/unit"
|
|
user_model "code.gitea.io/gitea/models/user"
|
|
"code.gitea.io/gitea/models/webhook"
|
|
"code.gitea.io/gitea/modules/lfs"
|
|
"code.gitea.io/gitea/modules/log"
|
|
"code.gitea.io/gitea/modules/options"
|
|
"code.gitea.io/gitea/modules/setting"
|
|
"code.gitea.io/gitea/modules/storage"
|
|
api "code.gitea.io/gitea/modules/structs"
|
|
"code.gitea.io/gitea/modules/util"
|
|
|
|
"xorm.io/builder"
|
|
)
|
|
|
|
var (
|
|
// Gitignores contains the gitiginore files
|
|
Gitignores []string
|
|
|
|
// Licenses contains the license files
|
|
Licenses []string
|
|
|
|
// Readmes contains the readme files
|
|
Readmes []string
|
|
|
|
// LabelTemplates contains the label template files and the list of labels for each file
|
|
LabelTemplates map[string]string
|
|
|
|
// ItemsPerPage maximum items per page in forks, watchers and stars of a repo
|
|
ItemsPerPage = 40
|
|
)
|
|
|
|
// loadRepoConfig loads the repository config
|
|
func loadRepoConfig() {
|
|
// Load .gitignore and license files and readme templates.
|
|
types := []string{"gitignore", "license", "readme", "label"}
|
|
typeFiles := make([][]string, 4)
|
|
for i, t := range types {
|
|
files, err := options.Dir(t)
|
|
if err != nil {
|
|
log.Fatal("Failed to get %s files: %v", t, err)
|
|
}
|
|
customPath := path.Join(setting.CustomPath, "options", t)
|
|
isDir, err := util.IsDir(customPath)
|
|
if err != nil {
|
|
log.Fatal("Failed to get custom %s files: %v", t, err)
|
|
}
|
|
if isDir {
|
|
customFiles, err := util.StatDir(customPath)
|
|
if err != nil {
|
|
log.Fatal("Failed to get custom %s files: %v", t, err)
|
|
}
|
|
|
|
for _, f := range customFiles {
|
|
if !util.IsStringInSlice(f, files, true) {
|
|
files = append(files, f)
|
|
}
|
|
}
|
|
}
|
|
typeFiles[i] = files
|
|
}
|
|
|
|
Gitignores = typeFiles[0]
|
|
Licenses = typeFiles[1]
|
|
Readmes = typeFiles[2]
|
|
LabelTemplatesFiles := typeFiles[3]
|
|
sort.Strings(Gitignores)
|
|
sort.Strings(Licenses)
|
|
sort.Strings(Readmes)
|
|
sort.Strings(LabelTemplatesFiles)
|
|
|
|
// Load label templates
|
|
LabelTemplates = make(map[string]string)
|
|
for _, templateFile := range LabelTemplatesFiles {
|
|
labels, err := LoadLabelsFormatted(templateFile)
|
|
if err != nil {
|
|
log.Error("Failed to load labels: %v", err)
|
|
}
|
|
LabelTemplates[templateFile] = labels
|
|
}
|
|
|
|
// Filter out invalid names and promote preferred licenses.
|
|
sortedLicenses := make([]string, 0, len(Licenses))
|
|
for _, name := range setting.Repository.PreferredLicenses {
|
|
if util.IsStringInSlice(name, Licenses, true) {
|
|
sortedLicenses = append(sortedLicenses, name)
|
|
}
|
|
}
|
|
for _, name := range Licenses {
|
|
if !util.IsStringInSlice(name, setting.Repository.PreferredLicenses, true) {
|
|
sortedLicenses = append(sortedLicenses, name)
|
|
}
|
|
}
|
|
Licenses = sortedLicenses
|
|
}
|
|
|
|
// NewRepoContext creates a new repository context
|
|
func NewRepoContext() {
|
|
loadRepoConfig()
|
|
unit.LoadUnitConfig()
|
|
|
|
admin_model.RemoveAllWithNotice(db.DefaultContext, "Clean up repository temporary data", filepath.Join(setting.AppDataPath, "tmp"))
|
|
}
|
|
|
|
// CheckRepoUnitUser check whether user could visit the unit of this repository
|
|
func CheckRepoUnitUser(repo *repo_model.Repository, user *user_model.User, unitType unit.Type) bool {
|
|
return checkRepoUnitUser(db.DefaultContext, repo, user, unitType)
|
|
}
|
|
|
|
func checkRepoUnitUser(ctx context.Context, repo *repo_model.Repository, user *user_model.User, unitType unit.Type) bool {
|
|
if user.IsAdmin {
|
|
return true
|
|
}
|
|
perm, err := getUserRepoPermission(ctx, repo, user)
|
|
if err != nil {
|
|
log.Error("getUserRepoPermission(): %v", err)
|
|
return false
|
|
}
|
|
|
|
return perm.CanRead(unitType)
|
|
}
|
|
|
|
func getRepoAssignees(ctx context.Context, repo *repo_model.Repository) (_ []*user_model.User, err error) {
|
|
if err = repo.GetOwner(ctx); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
e := db.GetEngine(ctx)
|
|
userIDs := make([]int64, 0, 10)
|
|
if err = e.Table("access").
|
|
Where("repo_id = ? AND mode >= ?", repo.ID, perm.AccessModeWrite).
|
|
Select("id").
|
|
Find(&userIDs); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
additionalUserIDs := make([]int64, 0, 10)
|
|
if err = e.Table("team_user").
|
|
Join("INNER", "team_repo", "`team_repo`.team_id = `team_user`.team_id").
|
|
Join("INNER", "team_unit", "`team_unit`.team_id = `team_user`.team_id").
|
|
Where("`team_repo`.repo_id = ? AND `team_unit`.access_mode >= ?", repo.ID, perm.AccessModeWrite).
|
|
Distinct("`team_user`.uid").
|
|
Select("`team_user`.uid").
|
|
Find(&additionalUserIDs); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
uidMap := map[int64]bool{}
|
|
i := 0
|
|
for _, uid := range userIDs {
|
|
if uidMap[uid] {
|
|
continue
|
|
}
|
|
uidMap[uid] = true
|
|
userIDs[i] = uid
|
|
i++
|
|
}
|
|
userIDs = userIDs[:i]
|
|
userIDs = append(userIDs, additionalUserIDs...)
|
|
|
|
for _, uid := range additionalUserIDs {
|
|
if uidMap[uid] {
|
|
continue
|
|
}
|
|
userIDs[i] = uid
|
|
i++
|
|
}
|
|
userIDs = userIDs[:i]
|
|
|
|
// Leave a seat for owner itself to append later, but if owner is an organization
|
|
// and just waste 1 unit is cheaper than re-allocate memory once.
|
|
users := make([]*user_model.User, 0, len(userIDs)+1)
|
|
if len(userIDs) > 0 {
|
|
if err = e.In("id", userIDs).Find(&users); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
if !repo.Owner.IsOrganization() && !uidMap[repo.OwnerID] {
|
|
users = append(users, repo.Owner)
|
|
}
|
|
|
|
return users, nil
|
|
}
|
|
|
|
// GetRepoAssignees returns all users that have write access and can be assigned to issues
|
|
// of the repository,
|
|
func GetRepoAssignees(repo *repo_model.Repository) (_ []*user_model.User, err error) {
|
|
return getRepoAssignees(db.DefaultContext, repo)
|
|
}
|
|
|
|
func getReviewers(ctx context.Context, repo *repo_model.Repository, doerID, posterID int64) ([]*user_model.User, error) {
|
|
// Get the owner of the repository - this often already pre-cached and if so saves complexity for the following queries
|
|
if err := repo.GetOwner(ctx); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var users []*user_model.User
|
|
e := db.GetEngine(ctx)
|
|
|
|
if repo.IsPrivate || repo.Owner.Visibility == api.VisibleTypePrivate {
|
|
// This a private repository:
|
|
// Anyone who can read the repository is a requestable reviewer
|
|
if err := e.
|
|
SQL("SELECT * FROM `user` WHERE id in (SELECT user_id FROM `access` WHERE repo_id = ? AND mode >= ? AND user_id NOT IN ( ?, ?)) ORDER BY name",
|
|
repo.ID, perm.AccessModeRead,
|
|
doerID, posterID).
|
|
Find(&users); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return users, nil
|
|
}
|
|
|
|
// This is a "public" repository:
|
|
// Any user that has read access, is a watcher or organization member can be requested to review
|
|
if err := e.
|
|
SQL("SELECT * FROM `user` WHERE id IN ( "+
|
|
"SELECT user_id FROM `access` WHERE repo_id = ? AND mode >= ? "+
|
|
"UNION "+
|
|
"SELECT user_id FROM `watch` WHERE repo_id = ? AND mode IN (?, ?) "+
|
|
"UNION "+
|
|
"SELECT uid AS user_id FROM `org_user` WHERE org_id = ? "+
|
|
") AND id NOT IN (?, ?) ORDER BY name",
|
|
repo.ID, perm.AccessModeRead,
|
|
repo.ID, repo_model.WatchModeNormal, repo_model.WatchModeAuto,
|
|
repo.OwnerID,
|
|
doerID, posterID).
|
|
Find(&users); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return users, nil
|
|
}
|
|
|
|
// GetReviewers get all users can be requested to review:
|
|
// * for private repositories this returns all users that have read access or higher to the repository.
|
|
// * for public repositories this returns all users that have read access or higher to the repository,
|
|
// all repo watchers and all organization members.
|
|
// TODO: may be we should have a busy choice for users to block review request to them.
|
|
func GetReviewers(repo *repo_model.Repository, doerID, posterID int64) ([]*user_model.User, error) {
|
|
return getReviewers(db.DefaultContext, repo, doerID, posterID)
|
|
}
|
|
|
|
// GetReviewerTeams get all teams can be requested to review
|
|
func GetReviewerTeams(repo *repo_model.Repository) ([]*Team, error) {
|
|
if err := repo.GetOwner(db.DefaultContext); err != nil {
|
|
return nil, err
|
|
}
|
|
if !repo.Owner.IsOrganization() {
|
|
return nil, nil
|
|
}
|
|
|
|
teams, err := GetTeamsWithAccessToRepo(repo.OwnerID, repo.ID, perm.AccessModeRead)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return teams, err
|
|
}
|
|
|
|
func updateRepoSize(e db.Engine, repo *repo_model.Repository) error {
|
|
size, err := util.GetDirectorySize(repo.RepoPath())
|
|
if err != nil {
|
|
return fmt.Errorf("updateSize: %v", err)
|
|
}
|
|
|
|
lfsSize, err := e.Where("repository_id = ?", repo.ID).SumInt(new(LFSMetaObject), "size")
|
|
if err != nil {
|
|
return fmt.Errorf("updateSize: GetLFSMetaObjects: %v", err)
|
|
}
|
|
|
|
repo.Size = size + lfsSize
|
|
_, err = e.ID(repo.ID).Cols("size").NoAutoTime().Update(repo)
|
|
return err
|
|
}
|
|
|
|
// UpdateRepoSize updates the repository size, calculating it using util.GetDirectorySize
|
|
func UpdateRepoSize(ctx context.Context, repo *repo_model.Repository) error {
|
|
return updateRepoSize(db.GetEngine(ctx), repo)
|
|
}
|
|
|
|
// CanUserForkRepo returns true if specified user can fork repository.
|
|
func CanUserForkRepo(user *user_model.User, repo *repo_model.Repository) (bool, error) {
|
|
if user == nil {
|
|
return false, nil
|
|
}
|
|
if repo.OwnerID != user.ID && !repo_model.HasForkedRepo(user.ID, repo.ID) {
|
|
return true, nil
|
|
}
|
|
ownedOrgs, err := GetOrgsCanCreateRepoByUserID(user.ID)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
for _, org := range ownedOrgs {
|
|
if repo.OwnerID != org.ID && !repo_model.HasForkedRepo(org.ID, repo.ID) {
|
|
return true, nil
|
|
}
|
|
}
|
|
return false, nil
|
|
}
|
|
|
|
// FindUserOrgForks returns the forked repositories for one user from a repository
|
|
func FindUserOrgForks(repoID, userID int64) ([]*repo_model.Repository, error) {
|
|
var cond builder.Cond = builder.And(
|
|
builder.Eq{"fork_id": repoID},
|
|
builder.In("owner_id",
|
|
builder.Select("org_id").
|
|
From("org_user").
|
|
Where(builder.Eq{"uid": userID}),
|
|
),
|
|
)
|
|
|
|
var repos []*repo_model.Repository
|
|
return repos, db.GetEngine(db.DefaultContext).Table("repository").Where(cond).Find(&repos)
|
|
}
|
|
|
|
// GetForksByUserAndOrgs return forked repos of the user and owned orgs
|
|
func GetForksByUserAndOrgs(user *user_model.User, repo *repo_model.Repository) ([]*repo_model.Repository, error) {
|
|
var repoList []*repo_model.Repository
|
|
if user == nil {
|
|
return repoList, nil
|
|
}
|
|
forkedRepo, err := repo_model.GetUserFork(repo.ID, user.ID)
|
|
if err != nil {
|
|
return repoList, err
|
|
}
|
|
if forkedRepo != nil {
|
|
repoList = append(repoList, forkedRepo)
|
|
}
|
|
orgForks, err := FindUserOrgForks(repo.ID, user.ID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
repoList = append(repoList, orgForks...)
|
|
return repoList, nil
|
|
}
|
|
|
|
// CanUserDelete returns true if user could delete the repository
|
|
func CanUserDelete(repo *repo_model.Repository, user *user_model.User) (bool, error) {
|
|
if user.IsAdmin || user.ID == repo.OwnerID {
|
|
return true, nil
|
|
}
|
|
|
|
if err := repo.GetOwner(db.DefaultContext); err != nil {
|
|
return false, err
|
|
}
|
|
|
|
if repo.Owner.IsOrganization() {
|
|
isOwner, err := OrgFromUser(repo.Owner).IsOwnedBy(user.ID)
|
|
if err != nil {
|
|
return false, err
|
|
} else if isOwner {
|
|
return true, nil
|
|
}
|
|
}
|
|
|
|
return false, nil
|
|
}
|
|
|
|
// getUsersWithAccessMode returns users that have at least given access mode to the repository.
|
|
func getUsersWithAccessMode(ctx context.Context, repo *repo_model.Repository, mode perm.AccessMode) (_ []*user_model.User, err error) {
|
|
if err = repo.GetOwner(ctx); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
e := db.GetEngine(ctx)
|
|
accesses := make([]*Access, 0, 10)
|
|
if err = e.Where("repo_id = ? AND mode >= ?", repo.ID, mode).Find(&accesses); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Leave a seat for owner itself to append later, but if owner is an organization
|
|
// and just waste 1 unit is cheaper than re-allocate memory once.
|
|
users := make([]*user_model.User, 0, len(accesses)+1)
|
|
if len(accesses) > 0 {
|
|
userIDs := make([]int64, len(accesses))
|
|
for i := 0; i < len(accesses); i++ {
|
|
userIDs[i] = accesses[i].UserID
|
|
}
|
|
|
|
if err = e.In("id", userIDs).Find(&users); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
if !repo.Owner.IsOrganization() {
|
|
users = append(users, repo.Owner)
|
|
}
|
|
|
|
return users, nil
|
|
}
|
|
|
|
// SetRepoReadBy sets repo to be visited by given user.
|
|
func SetRepoReadBy(repoID, userID int64) error {
|
|
return setRepoNotificationStatusReadIfUnread(db.GetEngine(db.DefaultContext), userID, repoID)
|
|
}
|
|
|
|
// CreateRepoOptions contains the create repository options
|
|
type CreateRepoOptions struct {
|
|
Name string
|
|
Description string
|
|
OriginalURL string
|
|
GitServiceType api.GitServiceType
|
|
Gitignores string
|
|
IssueLabels string
|
|
License string
|
|
Readme string
|
|
DefaultBranch string
|
|
IsPrivate bool
|
|
IsMirror bool
|
|
IsTemplate bool
|
|
AutoInit bool
|
|
Status repo_model.RepositoryStatus
|
|
TrustModel repo_model.TrustModelType
|
|
MirrorInterval string
|
|
}
|
|
|
|
// GetRepoInitFile returns repository init files
|
|
func GetRepoInitFile(tp, name string) ([]byte, error) {
|
|
cleanedName := strings.TrimLeft(path.Clean("/"+name), "/")
|
|
relPath := path.Join("options", tp, cleanedName)
|
|
|
|
// Use custom file when available.
|
|
customPath := path.Join(setting.CustomPath, relPath)
|
|
isFile, err := util.IsFile(customPath)
|
|
if err != nil {
|
|
log.Error("Unable to check if %s is a file. Error: %v", customPath, err)
|
|
}
|
|
if isFile {
|
|
return os.ReadFile(customPath)
|
|
}
|
|
|
|
switch tp {
|
|
case "readme":
|
|
return options.Readme(cleanedName)
|
|
case "gitignore":
|
|
return options.Gitignore(cleanedName)
|
|
case "license":
|
|
return options.License(cleanedName)
|
|
case "label":
|
|
return options.Labels(cleanedName)
|
|
default:
|
|
return []byte{}, fmt.Errorf("Invalid init file type")
|
|
}
|
|
}
|
|
|
|
// CreateRepository creates a repository for the user/organization.
|
|
func CreateRepository(ctx context.Context, doer, u *user_model.User, repo *repo_model.Repository, overwriteOrAdopt bool) (err error) {
|
|
if err = repo_model.IsUsableRepoName(repo.Name); err != nil {
|
|
return err
|
|
}
|
|
|
|
has, err := repo_model.IsRepositoryExistCtx(ctx, u, repo.Name)
|
|
if err != nil {
|
|
return fmt.Errorf("IsRepositoryExist: %v", err)
|
|
} else if has {
|
|
return repo_model.ErrRepoAlreadyExist{
|
|
Uname: u.Name,
|
|
Name: repo.Name,
|
|
}
|
|
}
|
|
|
|
repoPath := repo_model.RepoPath(u.Name, repo.Name)
|
|
isExist, err := util.IsExist(repoPath)
|
|
if err != nil {
|
|
log.Error("Unable to check if %s exists. Error: %v", repoPath, err)
|
|
return err
|
|
}
|
|
if !overwriteOrAdopt && isExist {
|
|
log.Error("Files already exist in %s and we are not going to adopt or delete.", repoPath)
|
|
return repo_model.ErrRepoFilesAlreadyExist{
|
|
Uname: u.Name,
|
|
Name: repo.Name,
|
|
}
|
|
}
|
|
|
|
if err = db.Insert(ctx, repo); err != nil {
|
|
return err
|
|
}
|
|
if err = repo_model.DeleteRedirect(ctx, u.ID, repo.Name); err != nil {
|
|
return err
|
|
}
|
|
|
|
// insert units for repo
|
|
units := make([]repo_model.RepoUnit, 0, len(unit.DefaultRepoUnits))
|
|
for _, tp := range unit.DefaultRepoUnits {
|
|
if tp == unit.TypeIssues {
|
|
units = append(units, repo_model.RepoUnit{
|
|
RepoID: repo.ID,
|
|
Type: tp,
|
|
Config: &repo_model.IssuesConfig{
|
|
EnableTimetracker: setting.Service.DefaultEnableTimetracking,
|
|
AllowOnlyContributorsToTrackTime: setting.Service.DefaultAllowOnlyContributorsToTrackTime,
|
|
EnableDependencies: setting.Service.DefaultEnableDependencies,
|
|
},
|
|
})
|
|
} else if tp == unit.TypePullRequests {
|
|
units = append(units, repo_model.RepoUnit{
|
|
RepoID: repo.ID,
|
|
Type: tp,
|
|
Config: &repo_model.PullRequestsConfig{AllowMerge: true, AllowRebase: true, AllowRebaseMerge: true, AllowSquash: true, DefaultMergeStyle: repo_model.MergeStyleMerge},
|
|
})
|
|
} else {
|
|
units = append(units, repo_model.RepoUnit{
|
|
RepoID: repo.ID,
|
|
Type: tp,
|
|
})
|
|
}
|
|
}
|
|
|
|
if err = db.Insert(ctx, units); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Remember visibility preference.
|
|
u.LastRepoVisibility = repo.IsPrivate
|
|
if err = user_model.UpdateUserColsEngine(db.GetEngine(ctx), u, "last_repo_visibility"); err != nil {
|
|
return fmt.Errorf("updateUser: %v", err)
|
|
}
|
|
|
|
if _, err = db.GetEngine(ctx).Incr("num_repos").ID(u.ID).Update(new(user_model.User)); err != nil {
|
|
return fmt.Errorf("increment user total_repos: %v", err)
|
|
}
|
|
u.NumRepos++
|
|
|
|
// Give access to all members in teams with access to all repositories.
|
|
if u.IsOrganization() {
|
|
teams, err := OrgFromUser(u).loadTeams(db.GetEngine(ctx))
|
|
if err != nil {
|
|
return fmt.Errorf("loadTeams: %v", err)
|
|
}
|
|
for _, t := range teams {
|
|
if t.IncludesAllRepositories {
|
|
if err := t.addRepository(ctx, repo); err != nil {
|
|
return fmt.Errorf("addRepository: %v", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
if isAdmin, err := isUserRepoAdmin(db.GetEngine(ctx), repo, doer); err != nil {
|
|
return fmt.Errorf("isUserRepoAdmin: %v", err)
|
|
} else if !isAdmin {
|
|
// Make creator repo admin if it wasn't assigned automatically
|
|
if err = addCollaborator(ctx, repo, doer); err != nil {
|
|
return fmt.Errorf("AddCollaborator: %v", err)
|
|
}
|
|
if err = changeCollaborationAccessMode(db.GetEngine(ctx), repo, doer.ID, perm.AccessModeAdmin); err != nil {
|
|
return fmt.Errorf("ChangeCollaborationAccessMode: %v", err)
|
|
}
|
|
}
|
|
} else if err = recalculateAccesses(ctx, repo); err != nil {
|
|
// Organization automatically called this in addRepository method.
|
|
return fmt.Errorf("recalculateAccesses: %v", err)
|
|
}
|
|
|
|
if setting.Service.AutoWatchNewRepos {
|
|
if err = repo_model.WatchRepoCtx(ctx, doer.ID, repo.ID, true); err != nil {
|
|
return fmt.Errorf("watchRepo: %v", err)
|
|
}
|
|
}
|
|
|
|
if err = webhook.CopyDefaultWebhooksToRepo(ctx, repo.ID); err != nil {
|
|
return fmt.Errorf("copyDefaultWebhooksToRepo: %v", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// CheckDaemonExportOK creates/removes git-daemon-export-ok for git-daemon...
|
|
func CheckDaemonExportOK(ctx context.Context, repo *repo_model.Repository) error {
|
|
if err := repo.GetOwner(ctx); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Create/Remove git-daemon-export-ok for git-daemon...
|
|
daemonExportFile := path.Join(repo.RepoPath(), `git-daemon-export-ok`)
|
|
|
|
isExist, err := util.IsExist(daemonExportFile)
|
|
if err != nil {
|
|
log.Error("Unable to check if %s exists. Error: %v", daemonExportFile, err)
|
|
return err
|
|
}
|
|
|
|
isPublic := !repo.IsPrivate && repo.Owner.Visibility == api.VisibleTypePublic
|
|
if !isPublic && isExist {
|
|
if err = util.Remove(daemonExportFile); err != nil {
|
|
log.Error("Failed to remove %s: %v", daemonExportFile, err)
|
|
}
|
|
} else if isPublic && !isExist {
|
|
if f, err := os.Create(daemonExportFile); err != nil {
|
|
log.Error("Failed to create %s: %v", daemonExportFile, err)
|
|
} else {
|
|
f.Close()
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// IncrementRepoForkNum increment repository fork number
|
|
func IncrementRepoForkNum(ctx context.Context, repoID int64) error {
|
|
_, err := db.GetEngine(ctx).Exec("UPDATE `repository` SET num_forks=num_forks+1 WHERE id=?", repoID)
|
|
return err
|
|
}
|
|
|
|
// DecrementRepoForkNum decrement repository fork number
|
|
func DecrementRepoForkNum(ctx context.Context, repoID int64) error {
|
|
_, err := db.GetEngine(ctx).Exec("UPDATE `repository` SET num_forks=num_forks-1 WHERE id=?", repoID)
|
|
return err
|
|
}
|
|
|
|
func updateRepository(ctx context.Context, repo *repo_model.Repository, visibilityChanged bool) (err error) {
|
|
repo.LowerName = strings.ToLower(repo.Name)
|
|
|
|
if utf8.RuneCountInString(repo.Description) > 255 {
|
|
repo.Description = string([]rune(repo.Description)[:255])
|
|
}
|
|
if utf8.RuneCountInString(repo.Website) > 255 {
|
|
repo.Website = string([]rune(repo.Website)[:255])
|
|
}
|
|
|
|
e := db.GetEngine(ctx)
|
|
|
|
if _, err = e.ID(repo.ID).AllCols().Update(repo); err != nil {
|
|
return fmt.Errorf("update: %v", err)
|
|
}
|
|
|
|
if err = updateRepoSize(e, repo); err != nil {
|
|
log.Error("Failed to update size for repository: %v", err)
|
|
}
|
|
|
|
if visibilityChanged {
|
|
if err = repo.GetOwner(ctx); err != nil {
|
|
return fmt.Errorf("getOwner: %v", err)
|
|
}
|
|
if repo.Owner.IsOrganization() {
|
|
// Organization repository need to recalculate access table when visibility is changed.
|
|
if err = recalculateTeamAccesses(ctx, repo, 0); err != nil {
|
|
return fmt.Errorf("recalculateTeamAccesses: %v", err)
|
|
}
|
|
}
|
|
|
|
// If repo has become private, we need to set its actions to private.
|
|
if repo.IsPrivate {
|
|
_, err = e.Where("repo_id = ?", repo.ID).Cols("is_private").Update(&Action{
|
|
IsPrivate: true,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// Create/Remove git-daemon-export-ok for git-daemon...
|
|
if err := CheckDaemonExportOK(db.WithEngine(ctx, e), repo); err != nil {
|
|
return err
|
|
}
|
|
|
|
forkRepos, err := repo_model.GetRepositoriesByForkID(ctx, repo.ID)
|
|
if err != nil {
|
|
return fmt.Errorf("getRepositoriesByForkID: %v", err)
|
|
}
|
|
for i := range forkRepos {
|
|
forkRepos[i].IsPrivate = repo.IsPrivate || repo.Owner.Visibility == api.VisibleTypePrivate
|
|
if err = updateRepository(ctx, forkRepos[i], true); err != nil {
|
|
return fmt.Errorf("updateRepository[%d]: %v", forkRepos[i].ID, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// UpdateRepositoryCtx updates a repository with db context
|
|
func UpdateRepositoryCtx(ctx context.Context, repo *repo_model.Repository, visibilityChanged bool) error {
|
|
return updateRepository(ctx, repo, visibilityChanged)
|
|
}
|
|
|
|
// UpdateRepository updates a repository
|
|
func UpdateRepository(repo *repo_model.Repository, visibilityChanged bool) (err error) {
|
|
ctx, committer, err := db.TxContext()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer committer.Close()
|
|
|
|
if err = updateRepository(ctx, repo, visibilityChanged); err != nil {
|
|
return fmt.Errorf("updateRepository: %v", err)
|
|
}
|
|
|
|
return committer.Commit()
|
|
}
|
|
|
|
// DeleteRepository deletes a repository for a user or organization.
|
|
// make sure if you call this func to close open sessions (sqlite will otherwise get a deadlock)
|
|
func DeleteRepository(doer *user_model.User, uid, repoID int64) error {
|
|
ctx, committer, err := db.TxContext()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer committer.Close()
|
|
sess := db.GetEngine(ctx)
|
|
|
|
// In case is a organization.
|
|
org, err := user_model.GetUserByIDEngine(sess, uid)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
repo := &repo_model.Repository{OwnerID: uid}
|
|
has, err := sess.ID(repoID).Get(repo)
|
|
if err != nil {
|
|
return err
|
|
} else if !has {
|
|
return repo_model.ErrRepoNotExist{
|
|
ID: repoID,
|
|
UID: uid,
|
|
OwnerName: "",
|
|
Name: "",
|
|
}
|
|
}
|
|
|
|
// Delete Deploy Keys
|
|
deployKeys, err := asymkey_model.ListDeployKeys(ctx, &asymkey_model.ListDeployKeysOptions{RepoID: repoID})
|
|
if err != nil {
|
|
return fmt.Errorf("listDeployKeys: %v", err)
|
|
}
|
|
var needRewriteKeysFile = len(deployKeys) > 0
|
|
for _, dKey := range deployKeys {
|
|
if err := DeleteDeployKey(ctx, doer, dKey.ID); err != nil {
|
|
return fmt.Errorf("deleteDeployKeys: %v", err)
|
|
}
|
|
}
|
|
|
|
if cnt, err := sess.ID(repoID).Delete(&repo_model.Repository{}); err != nil {
|
|
return err
|
|
} else if cnt != 1 {
|
|
return repo_model.ErrRepoNotExist{
|
|
ID: repoID,
|
|
UID: uid,
|
|
OwnerName: "",
|
|
Name: "",
|
|
}
|
|
}
|
|
|
|
if org.IsOrganization() {
|
|
teams, err := OrgFromUser(org).loadTeams(sess)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, t := range teams {
|
|
if !t.hasRepository(sess, repoID) {
|
|
continue
|
|
} else if err = t.removeRepository(ctx, repo, false); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
attachments := make([]*repo_model.Attachment, 0, 20)
|
|
if err = sess.Join("INNER", "`release`", "`release`.id = `attachment`.release_id").
|
|
Where("`release`.repo_id = ?", repoID).
|
|
Find(&attachments); err != nil {
|
|
return err
|
|
}
|
|
releaseAttachments := make([]string, 0, len(attachments))
|
|
for i := 0; i < len(attachments); i++ {
|
|
releaseAttachments = append(releaseAttachments, attachments[i].RelativePath())
|
|
}
|
|
|
|
if _, err := sess.Exec("UPDATE `user` SET num_stars=num_stars-1 WHERE id IN (SELECT `uid` FROM `star` WHERE repo_id = ?)", repo.ID); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := deleteBeans(sess,
|
|
&Access{RepoID: repo.ID},
|
|
&Action{RepoID: repo.ID},
|
|
&Collaboration{RepoID: repoID},
|
|
&Comment{RefRepoID: repoID},
|
|
&CommitStatus{RepoID: repoID},
|
|
&DeletedBranch{RepoID: repoID},
|
|
&webhook.HookTask{RepoID: repoID},
|
|
&LFSLock{RepoID: repoID},
|
|
&repo_model.LanguageStat{RepoID: repoID},
|
|
&Milestone{RepoID: repoID},
|
|
&repo_model.Mirror{RepoID: repoID},
|
|
&Notification{RepoID: repoID},
|
|
&ProtectedBranch{RepoID: repoID},
|
|
&ProtectedTag{RepoID: repoID},
|
|
&PullRequest{BaseRepoID: repoID},
|
|
&repo_model.PushMirror{RepoID: repoID},
|
|
&Release{RepoID: repoID},
|
|
&repo_model.RepoIndexerStatus{RepoID: repoID},
|
|
&repo_model.Redirect{RedirectRepoID: repoID},
|
|
&repo_model.RepoUnit{RepoID: repoID},
|
|
&repo_model.Star{RepoID: repoID},
|
|
&Task{RepoID: repoID},
|
|
&repo_model.Watch{RepoID: repoID},
|
|
&webhook.Webhook{RepoID: repoID},
|
|
); err != nil {
|
|
return fmt.Errorf("deleteBeans: %v", err)
|
|
}
|
|
|
|
// Delete Labels and related objects
|
|
if err := deleteLabelsByRepoID(sess, repoID); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Delete Issues and related objects
|
|
var attachmentPaths []string
|
|
if attachmentPaths, err = deleteIssuesByRepoID(sess, repoID); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Delete issue index
|
|
if err := db.DeleteResouceIndex(sess, "issue_index", repoID); err != nil {
|
|
return err
|
|
}
|
|
|
|
if repo.IsFork {
|
|
if _, err := sess.Exec("UPDATE `repository` SET num_forks=num_forks-1 WHERE id=?", repo.ForkID); err != nil {
|
|
return fmt.Errorf("decrease fork count: %v", err)
|
|
}
|
|
}
|
|
|
|
if _, err := sess.Exec("UPDATE `user` SET num_repos=num_repos-1 WHERE id=?", uid); err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(repo.Topics) > 0 {
|
|
if err := repo_model.RemoveTopicsFromRepo(ctx, repo.ID); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
projects, _, err := getProjects(sess, ProjectSearchOptions{
|
|
RepoID: repoID,
|
|
})
|
|
if err != nil {
|
|
return fmt.Errorf("get projects: %v", err)
|
|
}
|
|
for i := range projects {
|
|
if err := deleteProjectByID(sess, projects[i].ID); err != nil {
|
|
return fmt.Errorf("delete project [%d]: %v", projects[i].ID, err)
|
|
}
|
|
}
|
|
|
|
// Remove LFS objects
|
|
var lfsObjects []*LFSMetaObject
|
|
if err = sess.Where("repository_id=?", repoID).Find(&lfsObjects); err != nil {
|
|
return err
|
|
}
|
|
|
|
var lfsPaths = make([]string, 0, len(lfsObjects))
|
|
for _, v := range lfsObjects {
|
|
count, err := sess.Count(&LFSMetaObject{Pointer: lfs.Pointer{Oid: v.Oid}})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if count > 1 {
|
|
continue
|
|
}
|
|
|
|
lfsPaths = append(lfsPaths, v.RelativePath())
|
|
}
|
|
|
|
if _, err := sess.Delete(&LFSMetaObject{RepositoryID: repoID}); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Remove archives
|
|
var archives []*repo_model.RepoArchiver
|
|
if err = sess.Where("repo_id=?", repoID).Find(&archives); err != nil {
|
|
return err
|
|
}
|
|
|
|
var archivePaths = make([]string, 0, len(archives))
|
|
for _, v := range archives {
|
|
p, _ := v.RelativePath()
|
|
archivePaths = append(archivePaths, p)
|
|
}
|
|
|
|
if _, err := sess.Delete(&repo_model.RepoArchiver{RepoID: repoID}); err != nil {
|
|
return err
|
|
}
|
|
|
|
if repo.NumForks > 0 {
|
|
if _, err = sess.Exec("UPDATE `repository` SET fork_id=0,is_fork=? WHERE fork_id=?", false, repo.ID); err != nil {
|
|
log.Error("reset 'fork_id' and 'is_fork': %v", err)
|
|
}
|
|
}
|
|
|
|
// Get all attachments with both issue_id and release_id are zero
|
|
var newAttachments []*repo_model.Attachment
|
|
if err := sess.Where(builder.Eq{
|
|
"repo_id": repo.ID,
|
|
"issue_id": 0,
|
|
"release_id": 0,
|
|
}).Find(&newAttachments); err != nil {
|
|
return err
|
|
}
|
|
|
|
var newAttachmentPaths = make([]string, 0, len(newAttachments))
|
|
for _, attach := range newAttachments {
|
|
newAttachmentPaths = append(newAttachmentPaths, attach.RelativePath())
|
|
}
|
|
|
|
if _, err := sess.Where("repo_id=?", repo.ID).Delete(new(repo_model.Attachment)); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err = committer.Commit(); err != nil {
|
|
return err
|
|
}
|
|
|
|
committer.Close()
|
|
|
|
if needRewriteKeysFile {
|
|
if err := asymkey_model.RewriteAllPublicKeys(); err != nil {
|
|
log.Error("RewriteAllPublicKeys failed: %v", err)
|
|
}
|
|
}
|
|
|
|
// We should always delete the files after the database transaction succeed. If
|
|
// we delete the file but the database rollback, the repository will be broken.
|
|
|
|
// Remove repository files.
|
|
repoPath := repo.RepoPath()
|
|
admin_model.RemoveAllWithNotice(db.DefaultContext, "Delete repository files", repoPath)
|
|
|
|
// Remove wiki files
|
|
if repo.HasWiki() {
|
|
admin_model.RemoveAllWithNotice(db.DefaultContext, "Delete repository wiki", repo.WikiPath())
|
|
}
|
|
|
|
// Remove archives
|
|
for i := range archivePaths {
|
|
admin_model.RemoveStorageWithNotice(db.DefaultContext, storage.RepoArchives, "Delete repo archive file", archivePaths[i])
|
|
}
|
|
|
|
// Remove lfs objects
|
|
for i := range lfsPaths {
|
|
admin_model.RemoveStorageWithNotice(db.DefaultContext, storage.LFS, "Delete orphaned LFS file", lfsPaths[i])
|
|
}
|
|
|
|
// Remove issue attachment files.
|
|
for i := range attachmentPaths {
|
|
admin_model.RemoveStorageWithNotice(db.DefaultContext, storage.Attachments, "Delete issue attachment", attachmentPaths[i])
|
|
}
|
|
|
|
// Remove release attachment files.
|
|
for i := range releaseAttachments {
|
|
admin_model.RemoveStorageWithNotice(db.DefaultContext, storage.Attachments, "Delete release attachment", releaseAttachments[i])
|
|
}
|
|
|
|
// Remove attachment with no issue_id and release_id.
|
|
for i := range newAttachmentPaths {
|
|
admin_model.RemoveStorageWithNotice(db.DefaultContext, storage.Attachments, "Delete issue attachment", attachmentPaths[i])
|
|
}
|
|
|
|
if len(repo.Avatar) > 0 {
|
|
if err := storage.RepoAvatars.Delete(repo.CustomAvatarRelativePath()); err != nil {
|
|
return fmt.Errorf("Failed to remove %s: %v", repo.Avatar, err)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
type repoChecker struct {
|
|
querySQL func(ctx context.Context) ([]map[string][]byte, error)
|
|
correctSQL func(ctx context.Context, id int64) error
|
|
desc string
|
|
}
|
|
|
|
func repoStatsCheck(ctx context.Context, checker *repoChecker) {
|
|
results, err := checker.querySQL(ctx)
|
|
if err != nil {
|
|
log.Error("Select %s: %v", checker.desc, err)
|
|
return
|
|
}
|
|
for _, result := range results {
|
|
id, _ := strconv.ParseInt(string(result["id"]), 10, 64)
|
|
select {
|
|
case <-ctx.Done():
|
|
log.Warn("CheckRepoStats: Cancelled before checking %s for with id=%d", checker.desc, id)
|
|
return
|
|
default:
|
|
}
|
|
log.Trace("Updating %s: %d", checker.desc, id)
|
|
err = checker.correctSQL(ctx, id)
|
|
if err != nil {
|
|
log.Error("Update %s[%d]: %v", checker.desc, id, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func StatsCorrectSQL(ctx context.Context, sql string, id int64) error {
|
|
_, err := db.GetEngine(ctx).Exec(sql, id, id)
|
|
return err
|
|
}
|
|
|
|
func repoStatsCorrectNumWatches(ctx context.Context, id int64) error {
|
|
return StatsCorrectSQL(ctx, "UPDATE `repository` SET num_watches=(SELECT COUNT(*) FROM `watch` WHERE repo_id=? AND mode<>2) WHERE id=?", id)
|
|
}
|
|
|
|
func repoStatsCorrectNumStars(ctx context.Context, id int64) error {
|
|
return StatsCorrectSQL(ctx, "UPDATE `repository` SET num_stars=(SELECT COUNT(*) FROM `star` WHERE repo_id=?) WHERE id=?", id)
|
|
}
|
|
|
|
func labelStatsCorrectNumIssues(ctx context.Context, id int64) error {
|
|
return StatsCorrectSQL(ctx, "UPDATE `label` SET num_issues=(SELECT COUNT(*) FROM `issue_label` WHERE label_id=?) WHERE id=?", id)
|
|
}
|
|
|
|
func labelStatsCorrectNumIssuesRepo(ctx context.Context, id int64) error {
|
|
_, err := db.GetEngine(ctx).Exec("UPDATE `label` SET num_issues=(SELECT COUNT(*) FROM `issue_label` WHERE label_id=id) WHERE repo_id=?", id)
|
|
return err
|
|
}
|
|
|
|
func labelStatsCorrectNumClosedIssues(ctx context.Context, id int64) error {
|
|
_, err := db.GetEngine(ctx).Exec("UPDATE `label` SET num_closed_issues=(SELECT COUNT(*) FROM `issue_label`,`issue` WHERE `issue_label`.label_id=`label`.id AND `issue_label`.issue_id=`issue`.id AND `issue`.is_closed=?) WHERE `label`.id=?", true, id)
|
|
return err
|
|
}
|
|
|
|
func labelStatsCorrectNumClosedIssuesRepo(ctx context.Context, id int64) error {
|
|
_, err := db.GetEngine(ctx).Exec("UPDATE `label` SET num_closed_issues=(SELECT COUNT(*) FROM `issue_label`,`issue` WHERE `issue_label`.label_id=`label`.id AND `issue_label`.issue_id=`issue`.id AND `issue`.is_closed=?) WHERE `label`.repo_id=?", true, id)
|
|
return err
|
|
}
|
|
|
|
var milestoneStatsQueryNumIssues = "SELECT `milestone`.id FROM `milestone` WHERE `milestone`.num_closed_issues!=(SELECT COUNT(*) FROM `issue` WHERE `issue`.milestone_id=`milestone`.id AND `issue`.is_closed=?) OR `milestone`.num_issues!=(SELECT COUNT(*) FROM `issue` WHERE `issue`.milestone_id=`milestone`.id)"
|
|
|
|
func milestoneStatsCorrectNumIssues(ctx context.Context, id int64) error {
|
|
return updateMilestoneCounters(ctx, id)
|
|
}
|
|
|
|
func milestoneStatsCorrectNumIssuesRepo(ctx context.Context, id int64) error {
|
|
e := db.GetEngine(ctx)
|
|
results, err := e.Query(milestoneStatsQueryNumIssues+" AND `milestone`.repo_id = ?", true, id)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, result := range results {
|
|
id, _ := strconv.ParseInt(string(result["id"]), 10, 64)
|
|
err = milestoneStatsCorrectNumIssues(ctx, id)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func userStatsCorrectNumRepos(ctx context.Context, id int64) error {
|
|
return StatsCorrectSQL(ctx, "UPDATE `user` SET num_repos=(SELECT COUNT(*) FROM `repository` WHERE owner_id=?) WHERE id=?", id)
|
|
}
|
|
|
|
func repoStatsCorrectIssueNumComments(ctx context.Context, id int64) error {
|
|
return StatsCorrectSQL(ctx, "UPDATE `issue` SET num_comments=(SELECT COUNT(*) FROM `comment` WHERE issue_id=? AND type=0) WHERE id=?", id)
|
|
}
|
|
|
|
func repoStatsCorrectNumIssues(ctx context.Context, id int64) error {
|
|
return repoStatsCorrectNum(ctx, id, false, "num_issues")
|
|
}
|
|
|
|
func repoStatsCorrectNumPulls(ctx context.Context, id int64) error {
|
|
return repoStatsCorrectNum(ctx, id, true, "num_pulls")
|
|
}
|
|
|
|
func repoStatsCorrectNum(ctx context.Context, id int64, isPull bool, field string) error {
|
|
_, err := db.GetEngine(ctx).Exec("UPDATE `repository` SET "+field+"=(SELECT COUNT(*) FROM `issue` WHERE repo_id=? AND is_pull=?) WHERE id=?", id, isPull, id)
|
|
return err
|
|
}
|
|
|
|
func repoStatsCorrectNumClosedIssues(ctx context.Context, id int64) error {
|
|
return repoStatsCorrectNumClosed(ctx, id, false, "num_closed_issues")
|
|
}
|
|
|
|
func repoStatsCorrectNumClosedPulls(ctx context.Context, id int64) error {
|
|
return repoStatsCorrectNumClosed(ctx, id, true, "num_closed_pulls")
|
|
}
|
|
|
|
func repoStatsCorrectNumClosed(ctx context.Context, id int64, isPull bool, field string) error {
|
|
_, err := db.GetEngine(ctx).Exec("UPDATE `repository` SET "+field+"=(SELECT COUNT(*) FROM `issue` WHERE repo_id=? AND is_closed=? AND is_pull=?) WHERE id=?", id, true, isPull, id)
|
|
return err
|
|
}
|
|
|
|
func statsQuery(args ...interface{}) func(context.Context) ([]map[string][]byte, error) {
|
|
return func(ctx context.Context) ([]map[string][]byte, error) {
|
|
return db.GetEngine(ctx).Query(args...)
|
|
}
|
|
}
|
|
|
|
// CheckRepoStats checks the repository stats
|
|
func CheckRepoStats(ctx context.Context) error {
|
|
log.Trace("Doing: CheckRepoStats")
|
|
|
|
checkers := []*repoChecker{
|
|
// Repository.NumWatches
|
|
{
|
|
statsQuery("SELECT repo.id FROM `repository` repo WHERE repo.num_watches!=(SELECT COUNT(*) FROM `watch` WHERE repo_id=repo.id AND mode<>2)"),
|
|
repoStatsCorrectNumWatches,
|
|
"repository count 'num_watches'",
|
|
},
|
|
// Repository.NumStars
|
|
{
|
|
statsQuery("SELECT repo.id FROM `repository` repo WHERE repo.num_stars!=(SELECT COUNT(*) FROM `star` WHERE repo_id=repo.id)"),
|
|
repoStatsCorrectNumStars,
|
|
"repository count 'num_stars'",
|
|
},
|
|
// Repository.NumClosedIssues
|
|
{
|
|
statsQuery("SELECT repo.id FROM `repository` repo WHERE repo.num_closed_issues!=(SELECT COUNT(*) FROM `issue` WHERE repo_id=repo.id AND is_closed=? AND is_pull=?)", true, false),
|
|
repoStatsCorrectNumClosedIssues,
|
|
"repository count 'num_closed_issues'",
|
|
},
|
|
// Repository.NumClosedPulls
|
|
{
|
|
statsQuery("SELECT repo.id FROM `repository` repo WHERE repo.num_closed_issues!=(SELECT COUNT(*) FROM `issue` WHERE repo_id=repo.id AND is_closed=? AND is_pull=?)", true, true),
|
|
repoStatsCorrectNumClosedPulls,
|
|
"repository count 'num_closed_pulls'",
|
|
},
|
|
// Label.NumIssues
|
|
{
|
|
statsQuery("SELECT label.id FROM `label` WHERE label.num_issues!=(SELECT COUNT(*) FROM `issue_label` WHERE label_id=label.id)"),
|
|
labelStatsCorrectNumIssues,
|
|
"label count 'num_issues'",
|
|
},
|
|
// Label.NumClosedIssues
|
|
{
|
|
statsQuery("SELECT `label`.id FROM `label` WHERE `label`.num_closed_issues!=(SELECT COUNT(*) FROM `issue_label`,`issue` WHERE `issue_label`.label_id=`label`.id AND `issue_label`.issue_id=`issue`.id AND `issue`.is_closed=?)", true),
|
|
labelStatsCorrectNumClosedIssues,
|
|
"label count 'num_closed_issues'",
|
|
},
|
|
// Milestone.Num{,Closed}Issues
|
|
{
|
|
statsQuery(milestoneStatsQueryNumIssues, true),
|
|
milestoneStatsCorrectNumIssues,
|
|
"milestone count 'num_closed_issues' and 'num_issues'",
|
|
},
|
|
// User.NumRepos
|
|
{
|
|
statsQuery("SELECT `user`.id FROM `user` WHERE `user`.num_repos!=(SELECT COUNT(*) FROM `repository` WHERE owner_id=`user`.id)"),
|
|
userStatsCorrectNumRepos,
|
|
"user count 'num_repos'",
|
|
},
|
|
// Issue.NumComments
|
|
{
|
|
statsQuery("SELECT `issue`.id FROM `issue` WHERE `issue`.num_comments!=(SELECT COUNT(*) FROM `comment` WHERE issue_id=`issue`.id AND type=0)"),
|
|
repoStatsCorrectIssueNumComments,
|
|
"issue count 'num_comments'",
|
|
},
|
|
}
|
|
for _, checker := range checkers {
|
|
select {
|
|
case <-ctx.Done():
|
|
log.Warn("CheckRepoStats: Cancelled before %s", checker.desc)
|
|
return db.ErrCancelledf("before checking %s", checker.desc)
|
|
default:
|
|
repoStatsCheck(ctx, checker)
|
|
}
|
|
}
|
|
|
|
// FIXME: use checker when stop supporting old fork repo format.
|
|
// ***** START: Repository.NumForks *****
|
|
e := db.GetEngine(ctx)
|
|
results, err := e.Query("SELECT repo.id FROM `repository` repo WHERE repo.num_forks!=(SELECT COUNT(*) FROM `repository` WHERE fork_id=repo.id)")
|
|
if err != nil {
|
|
log.Error("Select repository count 'num_forks': %v", err)
|
|
} else {
|
|
for _, result := range results {
|
|
id, _ := strconv.ParseInt(string(result["id"]), 10, 64)
|
|
select {
|
|
case <-ctx.Done():
|
|
log.Warn("CheckRepoStats: Cancelled")
|
|
return db.ErrCancelledf("during repository count 'num_fork' for repo ID %d", id)
|
|
default:
|
|
}
|
|
log.Trace("Updating repository count 'num_forks': %d", id)
|
|
|
|
repo, err := repo_model.GetRepositoryByID(id)
|
|
if err != nil {
|
|
log.Error("repo_model.GetRepositoryByID[%d]: %v", id, err)
|
|
continue
|
|
}
|
|
|
|
rawResult, err := db.GetEngine(db.DefaultContext).Query("SELECT COUNT(*) FROM `repository` WHERE fork_id=?", repo.ID)
|
|
if err != nil {
|
|
log.Error("Select count of forks[%d]: %v", repo.ID, err)
|
|
continue
|
|
}
|
|
repo.NumForks = int(parseCountResult(rawResult))
|
|
|
|
if err = UpdateRepository(repo, false); err != nil {
|
|
log.Error("UpdateRepository[%d]: %v", id, err)
|
|
continue
|
|
}
|
|
}
|
|
}
|
|
// ***** END: Repository.NumForks *****
|
|
return nil
|
|
}
|
|
|
|
func UpdateRepoStats(ctx context.Context, id int64) error {
|
|
var err error
|
|
|
|
for _, f := range []func(ctx context.Context, id int64) error{
|
|
repoStatsCorrectNumWatches,
|
|
repoStatsCorrectNumStars,
|
|
repoStatsCorrectNumIssues,
|
|
repoStatsCorrectNumPulls,
|
|
repoStatsCorrectNumClosedIssues,
|
|
repoStatsCorrectNumClosedPulls,
|
|
labelStatsCorrectNumIssuesRepo,
|
|
labelStatsCorrectNumClosedIssuesRepo,
|
|
milestoneStatsCorrectNumIssuesRepo,
|
|
} {
|
|
err = f(ctx, id)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func updateUserStarNumbers(users []user_model.User) error {
|
|
ctx, committer, err := db.TxContext()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer committer.Close()
|
|
|
|
for _, user := range users {
|
|
if _, err = db.Exec(ctx, "UPDATE `user` SET num_stars=(SELECT COUNT(*) FROM `star` WHERE uid=?) WHERE id=?", user.ID, user.ID); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return committer.Commit()
|
|
}
|
|
|
|
// DoctorUserStarNum recalculate Stars number for all user
|
|
func DoctorUserStarNum() (err error) {
|
|
const batchSize = 100
|
|
|
|
for start := 0; ; start += batchSize {
|
|
users := make([]user_model.User, 0, batchSize)
|
|
if err = db.GetEngine(db.DefaultContext).Limit(batchSize, start).Where("type = ?", 0).Cols("id").Find(&users); err != nil {
|
|
return
|
|
}
|
|
if len(users) == 0 {
|
|
break
|
|
}
|
|
|
|
if err = updateUserStarNumbers(users); err != nil {
|
|
return
|
|
}
|
|
}
|
|
|
|
log.Debug("recalculate Stars number for all user finished")
|
|
|
|
return
|
|
}
|
|
|
|
// LinkedRepository returns the linked repo if any
|
|
func LinkedRepository(a *repo_model.Attachment) (*repo_model.Repository, unit.Type, error) {
|
|
if a.IssueID != 0 {
|
|
iss, err := GetIssueByID(a.IssueID)
|
|
if err != nil {
|
|
return nil, unit.TypeIssues, err
|
|
}
|
|
repo, err := repo_model.GetRepositoryByID(iss.RepoID)
|
|
unitType := unit.TypeIssues
|
|
if iss.IsPull {
|
|
unitType = unit.TypePullRequests
|
|
}
|
|
return repo, unitType, err
|
|
} else if a.ReleaseID != 0 {
|
|
rel, err := GetReleaseByID(a.ReleaseID)
|
|
if err != nil {
|
|
return nil, unit.TypeReleases, err
|
|
}
|
|
repo, err := repo_model.GetRepositoryByID(rel.RepoID)
|
|
return repo, unit.TypeReleases, err
|
|
}
|
|
return nil, -1, nil
|
|
}
|
|
|
|
// DeleteDeployKey delete deploy keys
|
|
func DeleteDeployKey(ctx context.Context, doer *user_model.User, id int64) error {
|
|
key, err := asymkey_model.GetDeployKeyByID(ctx, id)
|
|
if err != nil {
|
|
if asymkey_model.IsErrDeployKeyNotExist(err) {
|
|
return nil
|
|
}
|
|
return fmt.Errorf("GetDeployKeyByID: %v", err)
|
|
}
|
|
|
|
sess := db.GetEngine(ctx)
|
|
|
|
// Check if user has access to delete this key.
|
|
if !doer.IsAdmin {
|
|
repo, err := repo_model.GetRepositoryByIDCtx(ctx, key.RepoID)
|
|
if err != nil {
|
|
return fmt.Errorf("GetRepositoryByID: %v", err)
|
|
}
|
|
has, err := isUserRepoAdmin(sess, repo, doer)
|
|
if err != nil {
|
|
return fmt.Errorf("GetUserRepoPermission: %v", err)
|
|
} else if !has {
|
|
return asymkey_model.ErrKeyAccessDenied{
|
|
UserID: doer.ID,
|
|
KeyID: key.ID,
|
|
Note: "deploy",
|
|
}
|
|
}
|
|
}
|
|
|
|
if _, err = sess.ID(key.ID).Delete(new(asymkey_model.DeployKey)); err != nil {
|
|
return fmt.Errorf("delete deploy key [%d]: %v", key.ID, err)
|
|
}
|
|
|
|
// Check if this is the last reference to same key content.
|
|
has, err := sess.
|
|
Where("key_id = ?", key.KeyID).
|
|
Get(new(asymkey_model.DeployKey))
|
|
if err != nil {
|
|
return err
|
|
} else if !has {
|
|
if err = asymkey_model.DeletePublicKeys(ctx, key.KeyID); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|