2015-12-04 23:16:42 +01:00
|
|
|
// Copyright 2015 The Gogs Authors. All rights reserved.
|
2018-11-28 12:26:14 +01:00
|
|
|
// Copyright 2016 The Gitea Authors. All rights reserved.
|
2015-12-04 23:16:42 +01:00
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2017-05-02 15:35:59 +02:00
|
|
|
// Package v1 Gitea API.
|
|
|
|
//
|
2017-11-13 08:02:25 +01:00
|
|
|
// This documentation describes the Gitea API.
|
2017-05-02 15:35:59 +02:00
|
|
|
//
|
|
|
|
// Schemes: http, https
|
|
|
|
// BasePath: /api/v1
|
2021-03-12 05:43:04 +01:00
|
|
|
// Version: {{AppVer | JSEscape | Safe}}
|
2017-05-02 15:35:59 +02:00
|
|
|
// License: MIT http://opensource.org/licenses/MIT
|
|
|
|
//
|
|
|
|
// Consumes:
|
|
|
|
// - application/json
|
|
|
|
// - text/plain
|
|
|
|
//
|
|
|
|
// Produces:
|
|
|
|
// - application/json
|
|
|
|
// - text/html
|
|
|
|
//
|
2017-08-21 13:13:47 +02:00
|
|
|
// Security:
|
2018-06-13 01:23:00 +02:00
|
|
|
// - BasicAuth :
|
|
|
|
// - Token :
|
|
|
|
// - AccessToken :
|
|
|
|
// - AuthorizationHeaderToken :
|
2018-09-07 05:31:29 +02:00
|
|
|
// - SudoParam :
|
|
|
|
// - SudoHeader :
|
2020-08-02 14:01:12 +02:00
|
|
|
// - TOTPHeader :
|
2017-08-21 13:13:47 +02:00
|
|
|
//
|
|
|
|
// SecurityDefinitions:
|
|
|
|
// BasicAuth:
|
|
|
|
// type: basic
|
|
|
|
// Token:
|
|
|
|
// type: apiKey
|
|
|
|
// name: token
|
|
|
|
// in: query
|
|
|
|
// AccessToken:
|
|
|
|
// type: apiKey
|
|
|
|
// name: access_token
|
|
|
|
// in: query
|
|
|
|
// AuthorizationHeaderToken:
|
|
|
|
// type: apiKey
|
|
|
|
// name: Authorization
|
|
|
|
// in: header
|
2019-07-24 10:34:11 +02:00
|
|
|
// description: API tokens must be prepended with "token" followed by a space.
|
2018-09-07 05:31:29 +02:00
|
|
|
// SudoParam:
|
|
|
|
// type: apiKey
|
|
|
|
// name: sudo
|
|
|
|
// in: query
|
|
|
|
// description: Sudo API request as the user provided as the key. Admin privileges are required.
|
|
|
|
// SudoHeader:
|
|
|
|
// type: apiKey
|
|
|
|
// name: Sudo
|
|
|
|
// in: header
|
|
|
|
// description: Sudo API request as the user provided as the key. Admin privileges are required.
|
2020-08-02 14:01:12 +02:00
|
|
|
// TOTPHeader:
|
|
|
|
// type: apiKey
|
|
|
|
// name: X-GITEA-OTP
|
|
|
|
// in: header
|
|
|
|
// description: Must be used in combination with BasicAuth if two-factor authentication is enabled.
|
2017-08-21 13:13:47 +02:00
|
|
|
//
|
2017-05-02 15:35:59 +02:00
|
|
|
// swagger:meta
|
2015-12-04 23:16:42 +01:00
|
|
|
package v1
|
|
|
|
|
|
|
|
import (
|
2019-12-20 18:07:12 +01:00
|
|
|
"net/http"
|
2021-01-26 16:36:53 +01:00
|
|
|
"reflect"
|
2015-12-04 23:16:42 +01:00
|
|
|
"strings"
|
|
|
|
|
2016-11-10 17:24:48 +01:00
|
|
|
"code.gitea.io/gitea/models"
|
|
|
|
"code.gitea.io/gitea/modules/context"
|
2021-01-26 16:36:53 +01:00
|
|
|
auth "code.gitea.io/gitea/modules/forms"
|
2018-09-07 05:31:29 +02:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
2018-02-14 05:46:00 +01:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
2019-05-11 12:21:34 +02:00
|
|
|
api "code.gitea.io/gitea/modules/structs"
|
2021-01-26 16:36:53 +01:00
|
|
|
"code.gitea.io/gitea/modules/web"
|
2016-11-10 17:24:48 +01:00
|
|
|
"code.gitea.io/gitea/routers/api/v1/admin"
|
|
|
|
"code.gitea.io/gitea/routers/api/v1/misc"
|
2020-01-09 12:56:32 +01:00
|
|
|
"code.gitea.io/gitea/routers/api/v1/notify"
|
2016-11-10 17:24:48 +01:00
|
|
|
"code.gitea.io/gitea/routers/api/v1/org"
|
|
|
|
"code.gitea.io/gitea/routers/api/v1/repo"
|
2020-06-22 20:21:31 +02:00
|
|
|
"code.gitea.io/gitea/routers/api/v1/settings"
|
2017-11-13 08:02:25 +01:00
|
|
|
_ "code.gitea.io/gitea/routers/api/v1/swagger" // for swagger generation
|
2016-11-10 17:24:48 +01:00
|
|
|
"code.gitea.io/gitea/routers/api/v1/user"
|
2017-11-13 08:02:25 +01:00
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
"gitea.com/go-chi/binding"
|
|
|
|
"gitea.com/go-chi/session"
|
|
|
|
"github.com/go-chi/cors"
|
2015-12-04 23:16:42 +01:00
|
|
|
)
|
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
func sudo() func(ctx *context.APIContext) {
|
2018-09-07 05:31:29 +02:00
|
|
|
return func(ctx *context.APIContext) {
|
|
|
|
sudo := ctx.Query("sudo")
|
2018-10-20 23:25:14 +02:00
|
|
|
if len(sudo) == 0 {
|
2018-09-07 05:31:29 +02:00
|
|
|
sudo = ctx.Req.Header.Get("Sudo")
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(sudo) > 0 {
|
2019-01-28 15:13:59 +01:00
|
|
|
if ctx.IsSigned && ctx.User.IsAdmin {
|
2018-09-07 05:31:29 +02:00
|
|
|
user, err := models.GetUserByName(sudo)
|
|
|
|
if err != nil {
|
|
|
|
if models.IsErrUserNotExist(err) {
|
2019-03-19 03:29:43 +01:00
|
|
|
ctx.NotFound()
|
2018-09-07 05:31:29 +02:00
|
|
|
} else {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "GetUserByName", err)
|
2018-09-07 05:31:29 +02:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
log.Trace("Sudo from (%s) to: %s", ctx.User.Name, user.Name)
|
|
|
|
ctx.User = user
|
|
|
|
} else {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.JSON(http.StatusForbidden, map[string]string{
|
2018-09-07 05:31:29 +02:00
|
|
|
"message": "Only administrators allowed to sudo.",
|
|
|
|
})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
func repoAssignment() func(ctx *context.APIContext) {
|
2016-03-13 23:49:16 +01:00
|
|
|
return func(ctx *context.APIContext) {
|
2021-01-26 16:36:53 +01:00
|
|
|
userName := ctx.Params("username")
|
|
|
|
repoName := ctx.Params("reponame")
|
2015-12-04 23:16:42 +01:00
|
|
|
|
|
|
|
var (
|
|
|
|
owner *models.User
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
|
|
|
|
// Check if the user is the same as the repository owner.
|
|
|
|
if ctx.IsSigned && ctx.User.LowerName == strings.ToLower(userName) {
|
|
|
|
owner = ctx.User
|
|
|
|
} else {
|
|
|
|
owner, err = models.GetUserByName(userName)
|
|
|
|
if err != nil {
|
|
|
|
if models.IsErrUserNotExist(err) {
|
2021-01-24 16:23:05 +01:00
|
|
|
if redirectUserID, err := models.LookupUserRedirect(userName); err == nil {
|
|
|
|
context.RedirectToUser(ctx.Context, userName, redirectUserID)
|
|
|
|
} else if models.IsErrUserRedirectNotExist(err) {
|
|
|
|
ctx.NotFound("GetUserByName", err)
|
|
|
|
} else {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "LookupUserRedirect", err)
|
|
|
|
}
|
2015-12-04 23:16:42 +01:00
|
|
|
} else {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "GetUserByName", err)
|
2015-12-04 23:16:42 +01:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ctx.Repo.Owner = owner
|
|
|
|
|
|
|
|
// Get repository.
|
2016-07-23 19:08:22 +02:00
|
|
|
repo, err := models.GetRepositoryByName(owner.ID, repoName)
|
2015-12-04 23:16:42 +01:00
|
|
|
if err != nil {
|
|
|
|
if models.IsErrRepoNotExist(err) {
|
2017-02-05 15:35:03 +01:00
|
|
|
redirectRepoID, err := models.LookupRepoRedirect(owner.ID, repoName)
|
|
|
|
if err == nil {
|
|
|
|
context.RedirectToRepo(ctx.Context, redirectRepoID)
|
|
|
|
} else if models.IsErrRepoRedirectNotExist(err) {
|
2019-03-19 03:29:43 +01:00
|
|
|
ctx.NotFound()
|
2017-02-05 15:35:03 +01:00
|
|
|
} else {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "LookupRepoRedirect", err)
|
2017-02-05 15:35:03 +01:00
|
|
|
}
|
2015-12-04 23:16:42 +01:00
|
|
|
} else {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "GetRepositoryByName", err)
|
2015-12-04 23:16:42 +01:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
2019-04-25 20:59:10 +02:00
|
|
|
|
2017-02-02 13:33:56 +01:00
|
|
|
repo.Owner = owner
|
2018-11-28 12:26:14 +01:00
|
|
|
ctx.Repo.Repository = repo
|
2015-12-04 23:16:42 +01:00
|
|
|
|
2018-11-28 12:26:14 +01:00
|
|
|
ctx.Repo.Permission, err = models.GetUserRepoPermission(repo, ctx.User)
|
|
|
|
if err != nil {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "GetUserRepoPermission", err)
|
2018-11-28 12:26:14 +01:00
|
|
|
return
|
2015-12-04 23:16:42 +01:00
|
|
|
}
|
|
|
|
|
2016-03-14 04:20:22 +01:00
|
|
|
if !ctx.Repo.HasAccess() {
|
2019-03-19 03:29:43 +01:00
|
|
|
ctx.NotFound()
|
2015-12-04 23:16:42 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Contexter middleware already checks token for user sign in process.
|
2021-01-26 16:36:53 +01:00
|
|
|
func reqToken() func(ctx *context.APIContext) {
|
2018-11-04 02:15:55 +01:00
|
|
|
return func(ctx *context.APIContext) {
|
|
|
|
if true == ctx.Data["IsApiToken"] {
|
|
|
|
return
|
|
|
|
}
|
2019-04-19 10:59:26 +02:00
|
|
|
if ctx.Context.IsBasicAuth {
|
|
|
|
ctx.CheckForOTP()
|
|
|
|
return
|
|
|
|
}
|
2018-11-04 02:15:55 +01:00
|
|
|
if ctx.IsSigned {
|
|
|
|
ctx.RequireCSRF()
|
2015-12-04 23:16:42 +01:00
|
|
|
return
|
|
|
|
}
|
2020-11-14 17:13:55 +01:00
|
|
|
ctx.Error(http.StatusUnauthorized, "reqToken", "token is required")
|
2015-12-04 23:16:42 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-11 14:40:54 +01:00
|
|
|
func reqExploreSignIn() func(ctx *context.APIContext) {
|
|
|
|
return func(ctx *context.APIContext) {
|
|
|
|
if setting.Service.Explore.RequireSigninView && !ctx.IsSigned {
|
|
|
|
ctx.Error(http.StatusUnauthorized, "reqExploreSignIn", "you must be signed in to search for users")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
func reqBasicAuth() func(ctx *context.APIContext) {
|
2019-04-19 10:59:26 +02:00
|
|
|
return func(ctx *context.APIContext) {
|
|
|
|
if !ctx.Context.IsBasicAuth {
|
2020-11-14 17:13:55 +01:00
|
|
|
ctx.Error(http.StatusUnauthorized, "reqBasicAuth", "basic auth required")
|
2015-12-04 23:16:42 +01:00
|
|
|
return
|
|
|
|
}
|
2019-04-19 10:59:26 +02:00
|
|
|
ctx.CheckForOTP()
|
2015-12-04 23:16:42 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-28 12:26:14 +01:00
|
|
|
// reqSiteAdmin user should be the site admin
|
2021-01-26 16:36:53 +01:00
|
|
|
func reqSiteAdmin() func(ctx *context.APIContext) {
|
2020-11-14 17:13:55 +01:00
|
|
|
return func(ctx *context.APIContext) {
|
2019-04-08 00:49:34 +02:00
|
|
|
if !ctx.IsUserSiteAdmin() {
|
2020-11-14 17:13:55 +01:00
|
|
|
ctx.Error(http.StatusForbidden, "reqSiteAdmin", "user should be the site admin")
|
2015-12-04 23:16:42 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-08 00:49:34 +02:00
|
|
|
// reqOwner user should be the owner of the repo or site admin.
|
2021-01-26 16:36:53 +01:00
|
|
|
func reqOwner() func(ctx *context.APIContext) {
|
2020-11-14 17:13:55 +01:00
|
|
|
return func(ctx *context.APIContext) {
|
2019-04-08 00:49:34 +02:00
|
|
|
if !ctx.IsUserRepoOwner() && !ctx.IsUserSiteAdmin() {
|
2020-11-14 17:13:55 +01:00
|
|
|
ctx.Error(http.StatusForbidden, "reqOwner", "user should be the owner of the repo")
|
2018-11-28 12:26:14 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-08 00:49:34 +02:00
|
|
|
// reqAdmin user should be an owner or a collaborator with admin write of a repository, or site admin
|
2021-01-26 16:36:53 +01:00
|
|
|
func reqAdmin() func(ctx *context.APIContext) {
|
2020-11-14 17:13:55 +01:00
|
|
|
return func(ctx *context.APIContext) {
|
2019-04-08 00:49:34 +02:00
|
|
|
if !ctx.IsUserRepoAdmin() && !ctx.IsUserSiteAdmin() {
|
2020-11-14 17:13:55 +01:00
|
|
|
ctx.Error(http.StatusForbidden, "reqAdmin", "user should be an owner or a collaborator with admin write of a repository")
|
2018-11-28 12:26:14 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-08 00:49:34 +02:00
|
|
|
// reqRepoWriter user should have a permission to write to a repo, or be a site admin
|
2021-01-26 16:36:53 +01:00
|
|
|
func reqRepoWriter(unitTypes ...models.UnitType) func(ctx *context.APIContext) {
|
2020-11-14 17:13:55 +01:00
|
|
|
return func(ctx *context.APIContext) {
|
2019-04-08 00:49:34 +02:00
|
|
|
if !ctx.IsUserRepoWriter(unitTypes) && !ctx.IsUserRepoAdmin() && !ctx.IsUserSiteAdmin() {
|
2020-11-14 17:13:55 +01:00
|
|
|
ctx.Error(http.StatusForbidden, "reqRepoWriter", "user should have a permission to write to a repo")
|
2018-11-28 12:26:14 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-08 00:49:34 +02:00
|
|
|
// reqRepoReader user should have specific read permission or be a repo admin or a site admin
|
2021-01-26 16:36:53 +01:00
|
|
|
func reqRepoReader(unitType models.UnitType) func(ctx *context.APIContext) {
|
2020-11-14 17:13:55 +01:00
|
|
|
return func(ctx *context.APIContext) {
|
2019-04-08 00:49:34 +02:00
|
|
|
if !ctx.IsUserRepoReaderSpecific(unitType) && !ctx.IsUserRepoAdmin() && !ctx.IsUserSiteAdmin() {
|
2020-11-14 17:13:55 +01:00
|
|
|
ctx.Error(http.StatusForbidden, "reqRepoReader", "user should have specific read permission or be a repo admin or a site admin")
|
2016-08-25 01:05:56 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-08 00:49:34 +02:00
|
|
|
// reqAnyRepoReader user should have any permission to read repository or permissions of site admin
|
2021-01-26 16:36:53 +01:00
|
|
|
func reqAnyRepoReader() func(ctx *context.APIContext) {
|
2020-11-14 17:13:55 +01:00
|
|
|
return func(ctx *context.APIContext) {
|
2019-04-08 00:49:34 +02:00
|
|
|
if !ctx.IsUserRepoReaderAny() && !ctx.IsUserSiteAdmin() {
|
2020-11-14 17:13:55 +01:00
|
|
|
ctx.Error(http.StatusForbidden, "reqAnyRepoReader", "user should have any permission to read repository or permissions of site admin")
|
2019-04-08 00:49:34 +02:00
|
|
|
return
|
2018-11-28 12:26:14 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-08 00:49:34 +02:00
|
|
|
// reqOrgOwnership user should be an organization owner, or a site admin
|
2021-01-26 16:36:53 +01:00
|
|
|
func reqOrgOwnership() func(ctx *context.APIContext) {
|
2017-01-14 03:14:48 +01:00
|
|
|
return func(ctx *context.APIContext) {
|
2019-04-08 00:49:34 +02:00
|
|
|
if ctx.Context.IsUserSiteAdmin() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-01-14 03:14:48 +01:00
|
|
|
var orgID int64
|
|
|
|
if ctx.Org.Organization != nil {
|
|
|
|
orgID = ctx.Org.Organization.ID
|
|
|
|
} else if ctx.Org.Team != nil {
|
|
|
|
orgID = ctx.Org.Team.OrgID
|
|
|
|
} else {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "", "reqOrgOwnership: unprepared context")
|
2017-01-14 03:14:48 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-04-08 00:49:34 +02:00
|
|
|
isOwner, err := models.IsOrganizationOwner(orgID, ctx.User.ID)
|
|
|
|
if err != nil {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "IsOrganizationOwner", err)
|
2017-12-21 08:43:26 +01:00
|
|
|
return
|
2019-04-08 00:49:34 +02:00
|
|
|
} else if !isOwner {
|
2017-01-26 12:54:04 +01:00
|
|
|
if ctx.Org.Organization != nil {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusForbidden, "", "Must be an organization owner")
|
2017-01-26 12:54:04 +01:00
|
|
|
} else {
|
2019-03-19 03:29:43 +01:00
|
|
|
ctx.NotFound()
|
2017-01-26 12:54:04 +01:00
|
|
|
}
|
2017-01-14 03:14:48 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-24 07:32:35 +02:00
|
|
|
// reqTeamMembership user should be an team member, or a site admin
|
2021-01-26 16:36:53 +01:00
|
|
|
func reqTeamMembership() func(ctx *context.APIContext) {
|
2019-04-24 07:32:35 +02:00
|
|
|
return func(ctx *context.APIContext) {
|
|
|
|
if ctx.Context.IsUserSiteAdmin() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ctx.Org.Team == nil {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "", "reqTeamMembership: unprepared context")
|
2019-04-24 07:32:35 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var orgID = ctx.Org.Team.OrgID
|
|
|
|
isOwner, err := models.IsOrganizationOwner(orgID, ctx.User.ID)
|
|
|
|
if err != nil {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "IsOrganizationOwner", err)
|
2019-04-24 07:32:35 +02:00
|
|
|
return
|
|
|
|
} else if isOwner {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if isTeamMember, err := models.IsTeamMember(orgID, ctx.Org.Team.ID, ctx.User.ID); err != nil {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "IsTeamMember", err)
|
2019-04-24 07:32:35 +02:00
|
|
|
return
|
|
|
|
} else if !isTeamMember {
|
|
|
|
isOrgMember, err := models.IsOrganizationMember(orgID, ctx.User.ID)
|
|
|
|
if err != nil {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "IsOrganizationMember", err)
|
2019-04-24 07:32:35 +02:00
|
|
|
} else if isOrgMember {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusForbidden, "", "Must be a team member")
|
2019-04-24 07:32:35 +02:00
|
|
|
} else {
|
|
|
|
ctx.NotFound()
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-08 00:49:34 +02:00
|
|
|
// reqOrgMembership user should be an organization member, or a site admin
|
2021-01-26 16:36:53 +01:00
|
|
|
func reqOrgMembership() func(ctx *context.APIContext) {
|
2017-01-14 03:14:48 +01:00
|
|
|
return func(ctx *context.APIContext) {
|
2019-04-08 00:49:34 +02:00
|
|
|
if ctx.Context.IsUserSiteAdmin() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-01-14 03:14:48 +01:00
|
|
|
var orgID int64
|
|
|
|
if ctx.Org.Organization != nil {
|
|
|
|
orgID = ctx.Org.Organization.ID
|
|
|
|
} else if ctx.Org.Team != nil {
|
|
|
|
orgID = ctx.Org.Team.OrgID
|
|
|
|
} else {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "", "reqOrgMembership: unprepared context")
|
2017-01-14 03:14:48 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-04-08 00:49:34 +02:00
|
|
|
if isMember, err := models.IsOrganizationMember(orgID, ctx.User.ID); err != nil {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "IsOrganizationMember", err)
|
2019-04-08 00:49:34 +02:00
|
|
|
return
|
|
|
|
} else if !isMember {
|
2017-01-26 12:54:04 +01:00
|
|
|
if ctx.Org.Organization != nil {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusForbidden, "", "Must be an organization member")
|
2017-01-26 12:54:04 +01:00
|
|
|
} else {
|
2019-03-19 03:29:43 +01:00
|
|
|
ctx.NotFound()
|
2017-01-26 12:54:04 +01:00
|
|
|
}
|
2017-01-14 03:14:48 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
func reqGitHook() func(ctx *context.APIContext) {
|
2019-04-17 07:31:08 +02:00
|
|
|
return func(ctx *context.APIContext) {
|
|
|
|
if !ctx.User.CanEditGitHook() {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusForbidden, "", "must be allowed to edit Git hooks")
|
2019-04-17 07:31:08 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-11 18:34:34 +01:00
|
|
|
// reqWebhooksEnabled requires webhooks to be enabled by admin.
|
|
|
|
func reqWebhooksEnabled() func(ctx *context.APIContext) {
|
|
|
|
return func(ctx *context.APIContext) {
|
|
|
|
if setting.DisableWebhooks {
|
|
|
|
ctx.Error(http.StatusForbidden, "", "webhooks disabled by administrator")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
func orgAssignment(args ...bool) func(ctx *context.APIContext) {
|
2016-03-25 23:04:02 +01:00
|
|
|
var (
|
2016-04-05 01:41:34 +02:00
|
|
|
assignOrg bool
|
2016-03-25 23:04:02 +01:00
|
|
|
assignTeam bool
|
|
|
|
)
|
|
|
|
if len(args) > 0 {
|
2016-04-05 01:41:34 +02:00
|
|
|
assignOrg = args[0]
|
|
|
|
}
|
|
|
|
if len(args) > 1 {
|
|
|
|
assignTeam = args[1]
|
2016-03-25 23:04:02 +01:00
|
|
|
}
|
|
|
|
return func(ctx *context.APIContext) {
|
2016-04-05 01:41:34 +02:00
|
|
|
ctx.Org = new(context.APIOrganization)
|
|
|
|
|
|
|
|
var err error
|
|
|
|
if assignOrg {
|
2020-05-12 00:04:08 +02:00
|
|
|
ctx.Org.Organization, err = models.GetOrgByName(ctx.Params(":org"))
|
2016-04-05 01:41:34 +02:00
|
|
|
if err != nil {
|
2017-07-06 15:30:19 +02:00
|
|
|
if models.IsErrOrgNotExist(err) {
|
2021-01-24 16:23:05 +01:00
|
|
|
redirectUserID, err := models.LookupUserRedirect(ctx.Params(":org"))
|
|
|
|
if err == nil {
|
|
|
|
context.RedirectToUser(ctx.Context, ctx.Params(":org"), redirectUserID)
|
|
|
|
} else if models.IsErrUserRedirectNotExist(err) {
|
|
|
|
ctx.NotFound("GetOrgByName", err)
|
|
|
|
} else {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "LookupUserRedirect", err)
|
|
|
|
}
|
2016-04-05 01:41:34 +02:00
|
|
|
} else {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "GetOrgByName", err)
|
2016-04-05 01:41:34 +02:00
|
|
|
}
|
|
|
|
return
|
2016-03-25 23:04:02 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if assignTeam {
|
|
|
|
ctx.Org.Team, err = models.GetTeamByID(ctx.ParamsInt64(":teamid"))
|
|
|
|
if err != nil {
|
2020-10-12 23:09:21 +02:00
|
|
|
if models.IsErrTeamNotExist(err) {
|
2019-03-19 03:29:43 +01:00
|
|
|
ctx.NotFound()
|
2016-03-25 23:04:02 +01:00
|
|
|
} else {
|
2019-12-20 18:07:12 +01:00
|
|
|
ctx.Error(http.StatusInternalServerError, "GetTeamById", err)
|
2016-03-25 23:04:02 +01:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-05 02:08:01 +02:00
|
|
|
func mustEnableIssues(ctx *context.APIContext) {
|
2018-11-28 12:26:14 +01:00
|
|
|
if !ctx.Repo.CanRead(models.UnitTypeIssues) {
|
2019-04-22 22:40:51 +02:00
|
|
|
if log.IsTrace() {
|
|
|
|
if ctx.IsSigned {
|
|
|
|
log.Trace("Permission Denied: User %-v cannot read %-v in Repo %-v\n"+
|
|
|
|
"User in Repo has Permissions: %-+v",
|
|
|
|
ctx.User,
|
|
|
|
models.UnitTypeIssues,
|
|
|
|
ctx.Repo.Repository,
|
|
|
|
ctx.Repo.Permission)
|
|
|
|
} else {
|
|
|
|
log.Trace("Permission Denied: Anonymous user cannot read %-v in Repo %-v\n"+
|
|
|
|
"Anonymous user in Repo has Permissions: %-+v",
|
|
|
|
models.UnitTypeIssues,
|
|
|
|
ctx.Repo.Repository,
|
|
|
|
ctx.Repo.Permission)
|
|
|
|
}
|
|
|
|
}
|
2019-03-19 03:29:43 +01:00
|
|
|
ctx.NotFound()
|
2016-08-05 01:32:02 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-19 03:29:43 +01:00
|
|
|
func mustAllowPulls(ctx *context.APIContext) {
|
2018-11-28 12:26:14 +01:00
|
|
|
if !(ctx.Repo.Repository.CanEnablePulls() && ctx.Repo.CanRead(models.UnitTypePullRequests)) {
|
2019-04-22 22:40:51 +02:00
|
|
|
if ctx.Repo.Repository.CanEnablePulls() && log.IsTrace() {
|
|
|
|
if ctx.IsSigned {
|
|
|
|
log.Trace("Permission Denied: User %-v cannot read %-v in Repo %-v\n"+
|
|
|
|
"User in Repo has Permissions: %-+v",
|
|
|
|
ctx.User,
|
|
|
|
models.UnitTypePullRequests,
|
|
|
|
ctx.Repo.Repository,
|
|
|
|
ctx.Repo.Permission)
|
|
|
|
} else {
|
|
|
|
log.Trace("Permission Denied: Anonymous user cannot read %-v in Repo %-v\n"+
|
|
|
|
"Anonymous user in Repo has Permissions: %-+v",
|
|
|
|
models.UnitTypePullRequests,
|
|
|
|
ctx.Repo.Repository,
|
|
|
|
ctx.Repo.Permission)
|
|
|
|
}
|
|
|
|
}
|
2019-03-19 03:29:43 +01:00
|
|
|
ctx.NotFound()
|
2016-12-02 12:10:39 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-19 03:29:43 +01:00
|
|
|
func mustEnableIssuesOrPulls(ctx *context.APIContext) {
|
2018-11-28 12:26:14 +01:00
|
|
|
if !ctx.Repo.CanRead(models.UnitTypeIssues) &&
|
|
|
|
!(ctx.Repo.Repository.CanEnablePulls() && ctx.Repo.CanRead(models.UnitTypePullRequests)) {
|
2019-04-22 22:40:51 +02:00
|
|
|
if ctx.Repo.Repository.CanEnablePulls() && log.IsTrace() {
|
|
|
|
if ctx.IsSigned {
|
|
|
|
log.Trace("Permission Denied: User %-v cannot read %-v and %-v in Repo %-v\n"+
|
|
|
|
"User in Repo has Permissions: %-+v",
|
|
|
|
ctx.User,
|
|
|
|
models.UnitTypeIssues,
|
|
|
|
models.UnitTypePullRequests,
|
|
|
|
ctx.Repo.Repository,
|
|
|
|
ctx.Repo.Permission)
|
|
|
|
} else {
|
|
|
|
log.Trace("Permission Denied: Anonymous user cannot read %-v and %-v in Repo %-v\n"+
|
|
|
|
"Anonymous user in Repo has Permissions: %-+v",
|
|
|
|
models.UnitTypeIssues,
|
|
|
|
models.UnitTypePullRequests,
|
|
|
|
ctx.Repo.Repository,
|
|
|
|
ctx.Repo.Permission)
|
|
|
|
}
|
|
|
|
}
|
2019-03-19 03:29:43 +01:00
|
|
|
ctx.NotFound()
|
2018-09-03 19:20:54 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-19 03:29:43 +01:00
|
|
|
func mustNotBeArchived(ctx *context.APIContext) {
|
2019-01-30 18:20:40 +01:00
|
|
|
if ctx.Repo.Repository.IsArchived {
|
2019-03-19 03:29:43 +01:00
|
|
|
ctx.NotFound()
|
2019-01-30 18:20:40 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
// bind binding an obj to a func(ctx *context.APIContext)
|
|
|
|
func bind(obj interface{}) http.HandlerFunc {
|
|
|
|
var tp = reflect.TypeOf(obj)
|
|
|
|
for tp.Kind() == reflect.Ptr {
|
|
|
|
tp = tp.Elem()
|
|
|
|
}
|
|
|
|
return web.Wrap(func(ctx *context.APIContext) {
|
|
|
|
var theObj = reflect.New(tp).Interface() // create a new form obj for every request but not use obj directly
|
|
|
|
errs := binding.Bind(ctx.Req, theObj)
|
|
|
|
if len(errs) > 0 {
|
2021-04-05 17:30:52 +02:00
|
|
|
ctx.Error(http.StatusUnprocessableEntity, "validationError", errs[0].Error())
|
2021-01-26 16:36:53 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
web.SetForm(ctx, theObj)
|
|
|
|
})
|
|
|
|
}
|
2015-12-04 23:16:42 +01:00
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
// Routes registers all v1 APIs routes to web application.
|
|
|
|
func Routes() *web.Route {
|
|
|
|
var m = web.NewRoute()
|
|
|
|
|
|
|
|
m.Use(session.Sessioner(session.Options{
|
|
|
|
Provider: setting.SessionConfig.Provider,
|
|
|
|
ProviderConfig: setting.SessionConfig.ProviderConfig,
|
|
|
|
CookieName: setting.SessionConfig.CookieName,
|
|
|
|
CookiePath: setting.SessionConfig.CookiePath,
|
|
|
|
Gclifetime: setting.SessionConfig.Gclifetime,
|
|
|
|
Maxlifetime: setting.SessionConfig.Maxlifetime,
|
|
|
|
Secure: setting.SessionConfig.Secure,
|
|
|
|
Domain: setting.SessionConfig.Domain,
|
|
|
|
}))
|
|
|
|
m.Use(securityHeaders())
|
|
|
|
if setting.CORSConfig.Enabled {
|
|
|
|
m.Use(cors.Handler(cors.Options{
|
|
|
|
//Scheme: setting.CORSConfig.Scheme, // FIXME: the cors middleware needs scheme option
|
|
|
|
AllowedOrigins: setting.CORSConfig.AllowDomain,
|
|
|
|
//setting.CORSConfig.AllowSubdomain // FIXME: the cors middleware needs allowSubdomain option
|
|
|
|
AllowedMethods: setting.CORSConfig.Methods,
|
|
|
|
AllowCredentials: setting.CORSConfig.AllowCredentials,
|
|
|
|
MaxAge: int(setting.CORSConfig.MaxAge.Seconds()),
|
|
|
|
}))
|
2018-02-14 05:46:00 +01:00
|
|
|
}
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Use(context.APIContexter())
|
2021-01-27 18:46:35 +01:00
|
|
|
|
|
|
|
if setting.EnableAccessLog {
|
|
|
|
m.Use(context.AccessLogger())
|
|
|
|
}
|
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Use(context.ToggleAPI(&context.ToggleOptions{
|
|
|
|
SignInRequired: setting.Service.RequireSignInView,
|
|
|
|
}))
|
2017-10-21 16:05:50 +02:00
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("", func() {
|
2015-12-04 23:16:42 +01:00
|
|
|
// Miscellaneous
|
2018-07-28 02:19:01 +02:00
|
|
|
if setting.API.EnableSwagger {
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Get("/swagger", func(ctx *context.APIContext) {
|
|
|
|
ctx.Redirect("/api/swagger")
|
|
|
|
})
|
2018-02-14 05:46:00 +01:00
|
|
|
}
|
2017-03-06 15:13:17 +01:00
|
|
|
m.Get("/version", misc.Version)
|
2019-10-16 15:42:42 +02:00
|
|
|
m.Get("/signing-key.gpg", misc.SigningKey)
|
2015-12-04 23:16:42 +01:00
|
|
|
m.Post("/markdown", bind(api.MarkdownOption{}), misc.Markdown)
|
|
|
|
m.Post("/markdown/raw", misc.MarkdownRaw)
|
2020-06-04 11:16:53 +02:00
|
|
|
m.Group("/settings", func() {
|
2020-06-22 20:21:31 +02:00
|
|
|
m.Get("/ui", settings.GetGeneralUISettings)
|
2020-09-04 20:10:15 +02:00
|
|
|
m.Get("/api", settings.GetGeneralAPISettings)
|
2020-09-05 09:43:06 +02:00
|
|
|
m.Get("/attachment", settings.GetGeneralAttachmentSettings)
|
2020-06-22 20:21:31 +02:00
|
|
|
m.Get("/repository", settings.GetGeneralRepoSettings)
|
2020-06-04 11:16:53 +02:00
|
|
|
})
|
2015-12-04 23:16:42 +01:00
|
|
|
|
2020-01-09 12:56:32 +01:00
|
|
|
// Notifications
|
|
|
|
m.Group("/notifications", func() {
|
|
|
|
m.Combo("").
|
|
|
|
Get(notify.ListNotifications).
|
|
|
|
Put(notify.ReadNotifications)
|
2020-01-14 16:37:19 +01:00
|
|
|
m.Get("/new", notify.NewAvailable)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/threads/{id}").
|
2020-01-09 12:56:32 +01:00
|
|
|
Get(notify.GetThread).
|
|
|
|
Patch(notify.ReadThread)
|
|
|
|
}, reqToken())
|
|
|
|
|
2015-12-04 23:16:42 +01:00
|
|
|
// Users
|
|
|
|
m.Group("/users", func() {
|
2021-03-11 14:40:54 +01:00
|
|
|
m.Get("/search", reqExploreSignIn(), user.Search)
|
2015-12-04 23:16:42 +01:00
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/{username}", func() {
|
2021-03-11 14:40:54 +01:00
|
|
|
m.Get("", reqExploreSignIn(), user.GetInfo)
|
2021-01-26 16:36:53 +01:00
|
|
|
|
|
|
|
if setting.Service.EnableUserHeatmap {
|
|
|
|
m.Get("/heatmap", user.GetUserHeatmapData)
|
|
|
|
}
|
2015-12-04 23:16:42 +01:00
|
|
|
|
2021-03-11 14:40:54 +01:00
|
|
|
m.Get("/repos", reqExploreSignIn(), user.ListUserRepos)
|
2015-12-04 23:16:42 +01:00
|
|
|
m.Group("/tokens", func() {
|
|
|
|
m.Combo("").Get(user.ListAccessTokens).
|
|
|
|
Post(bind(api.CreateAccessTokenOption{}), user.CreateAccessToken)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{id}").Delete(user.DeleteAccessToken)
|
2016-08-05 02:08:01 +02:00
|
|
|
}, reqBasicAuth())
|
2015-12-04 23:16:42 +01:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
m.Group("/users", func() {
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/{username}", func() {
|
2015-12-05 23:13:13 +01:00
|
|
|
m.Get("/keys", user.ListPublicKeys)
|
2017-03-16 02:27:35 +01:00
|
|
|
m.Get("/gpg_keys", user.ListGPGKeys)
|
2015-12-21 13:24:11 +01:00
|
|
|
|
|
|
|
m.Get("/followers", user.ListFollowers)
|
|
|
|
m.Group("/following", func() {
|
|
|
|
m.Get("", user.ListFollowing)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Get("/{target}", user.CheckFollowing)
|
2015-12-21 13:24:11 +01:00
|
|
|
})
|
2016-11-14 23:33:58 +01:00
|
|
|
|
|
|
|
m.Get("/starred", user.GetStarredRepos)
|
2016-12-24 02:53:11 +01:00
|
|
|
|
|
|
|
m.Get("/subscriptions", user.GetWatchedRepos)
|
2015-12-04 23:16:42 +01:00
|
|
|
})
|
2016-08-05 02:08:01 +02:00
|
|
|
}, reqToken())
|
2015-12-04 23:16:42 +01:00
|
|
|
|
|
|
|
m.Group("/user", func() {
|
2016-08-12 00:29:39 +02:00
|
|
|
m.Get("", user.GetAuthenticatedUser)
|
2015-12-21 13:24:11 +01:00
|
|
|
m.Combo("/emails").Get(user.ListEmails).
|
|
|
|
Post(bind(api.CreateEmailOption{}), user.AddEmail).
|
2017-11-13 08:02:25 +01:00
|
|
|
Delete(bind(api.DeleteEmailOption{}), user.DeleteEmail)
|
2015-12-21 13:24:11 +01:00
|
|
|
|
|
|
|
m.Get("/followers", user.ListMyFollowers)
|
|
|
|
m.Group("/following", func() {
|
|
|
|
m.Get("", user.ListMyFollowing)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{username}").Get(user.CheckMyFollowing).Put(user.Follow).Delete(user.Unfollow)
|
2015-12-21 13:24:11 +01:00
|
|
|
})
|
|
|
|
|
2015-12-04 23:16:42 +01:00
|
|
|
m.Group("/keys", func() {
|
|
|
|
m.Combo("").Get(user.ListMyPublicKeys).
|
|
|
|
Post(bind(api.CreateKeyOption{}), user.CreatePublicKey)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{id}").Get(user.GetPublicKey).
|
2015-12-04 23:16:42 +01:00
|
|
|
Delete(user.DeletePublicKey)
|
|
|
|
})
|
2020-02-29 07:19:32 +01:00
|
|
|
m.Group("/applications", func() {
|
|
|
|
m.Combo("/oauth2").
|
|
|
|
Get(user.ListOauth2Applications).
|
|
|
|
Post(bind(api.CreateOAuth2ApplicationOptions{}), user.CreateOauth2Application)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/oauth2/{id}").
|
2020-04-10 02:37:31 +02:00
|
|
|
Delete(user.DeleteOauth2Application).
|
|
|
|
Patch(bind(api.CreateOAuth2ApplicationOptions{}), user.UpdateOauth2Application).
|
|
|
|
Get(user.GetOauth2Application)
|
2020-02-29 07:19:32 +01:00
|
|
|
}, reqToken())
|
2016-11-14 23:33:58 +01:00
|
|
|
|
2017-03-16 02:27:35 +01:00
|
|
|
m.Group("/gpg_keys", func() {
|
|
|
|
m.Combo("").Get(user.ListMyGPGKeys).
|
|
|
|
Post(bind(api.CreateGPGKeyOption{}), user.CreateGPGKey)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{id}").Get(user.GetGPGKey).
|
2017-03-16 02:27:35 +01:00
|
|
|
Delete(user.DeleteGPGKey)
|
|
|
|
})
|
|
|
|
|
2017-02-24 22:39:49 +01:00
|
|
|
m.Combo("/repos").Get(user.ListMyRepos).
|
|
|
|
Post(bind(api.CreateRepoOption{}), repo.Create)
|
|
|
|
|
2016-11-14 23:33:58 +01:00
|
|
|
m.Group("/starred", func() {
|
|
|
|
m.Get("", user.GetMyStarredRepos)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/{username}/{reponame}", func() {
|
2016-11-14 23:33:58 +01:00
|
|
|
m.Get("", user.IsStarring)
|
|
|
|
m.Put("", user.Star)
|
|
|
|
m.Delete("", user.Unstar)
|
2016-12-29 14:17:32 +01:00
|
|
|
}, repoAssignment())
|
2016-11-14 23:33:58 +01:00
|
|
|
})
|
2017-09-12 08:48:13 +02:00
|
|
|
m.Get("/times", repo.ListMyTrackedTimes)
|
2016-12-24 02:53:11 +01:00
|
|
|
|
2019-12-12 05:23:05 +01:00
|
|
|
m.Get("/stopwatches", repo.GetStopwatches)
|
|
|
|
|
2016-12-24 02:53:11 +01:00
|
|
|
m.Get("/subscriptions", user.GetMyWatchedRepos)
|
2019-01-17 01:39:50 +01:00
|
|
|
|
|
|
|
m.Get("/teams", org.ListUserTeams)
|
2016-08-05 02:08:01 +02:00
|
|
|
}, reqToken())
|
2015-12-04 23:16:42 +01:00
|
|
|
|
|
|
|
// Repositories
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Post("/org/{org}/repos", reqToken(), bind(api.CreateRepoOption{}), repo.CreateOrgRepoDeprecated)
|
2020-01-09 17:40:01 +01:00
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/repositories/{id}", reqToken()).Get(repo.GetByID)
|
2015-12-04 23:16:42 +01:00
|
|
|
|
|
|
|
m.Group("/repos", func() {
|
|
|
|
m.Get("/search", repo.Search)
|
|
|
|
|
2020-01-09 17:40:01 +01:00
|
|
|
m.Get("/issues/search", repo.SearchIssues)
|
Allow cross-repository dependencies on issues (#7901)
* in progress changes for #7405, added ability to add cross-repo dependencies
* removed unused repolink var
* fixed query that was breaking ci tests; fixed check in issue dependency add so that the id of the issue and dependency is checked rather than the indexes
* reverted removal of string in local files becasue these are done via crowdin, not updated manually
* removed 'Select("issue.*")' from getBlockedByDependencies and getBlockingDependencies based on comments in PR review
* changed getBlockedByDependencies and getBlockingDependencies to use a more xorm-like query, also updated the sidebar as a result
* simplified the getBlockingDependencies and getBlockedByDependencies methods; changed the sidebar to show the dependencies in a different format where you can see the name of the repository
* made some changes to the issue view in the dependencies (issue name on top, repo full name on separate line). Change view of issue in the dependency search results (also showing the full repo name on separate line)
* replace call to FindUserAccessibleRepoIDs with SearchRepositoryByName. The former was hardcoded to use isPrivate = false on the repo search, but this code needed it to be true. The SearchRepositoryByName method is used more in the code including on the user's dashboard
* some more tweaks to the layout of the issues when showing dependencies and in the search box when you add new dependencies
* added Name to the RepositoryMeta struct
* updated swagger doc
* fixed total count for link header on SearchIssues
* fixed indentation
* fixed aligment of remove icon on dependencies in issue sidebar
* removed unnecessary nil check (unnecessary because issue.loadRepo is called prior to this block)
* reverting .css change, somehow missed or forgot that less is used
* updated less file and generated css; updated sidebar template with styles to line up delete and issue index
* added ordering to the blocked by/depends on queries
* fixed sorting in issue dependency search and the depends on/blocks views to show issues from the current repo first, then by created date descending; added a "all cross repository dependencies" setting to allow this feature to be turned off, if turned off, the issue dependency search will work the way it did before (restricted to the current repository)
* re-applied my swagger changes after merge
* fixed split string condition in issue search
* changed ALLOW_CROSS_REPOSITORY_DEPENDENCIES description to sound more global than just the issue dependency search; returning 400 in the cross repo issue search api method if not enabled; fixed bug where the issue count did not respect the state parameter
* when adding a dependency to an issue, added a check to make sure the issue and dependency are in the same repo if cross repo dependencies is not enabled
* updated sortIssuesSession call in PullRequests, another commit moved this method from pull.go to pull_list.go so I had to re-apply my change here
* fixed incorrect setting of user id parameter in search repos call
2019-10-31 06:06:10 +01:00
|
|
|
|
2020-09-11 00:29:19 +02:00
|
|
|
m.Post("/migrate", reqToken(), bind(api.MigrateRepoOptions{}), repo.Migrate)
|
2015-12-04 23:16:42 +01:00
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/{username}/{reponame}", func() {
|
2018-11-28 12:26:14 +01:00
|
|
|
m.Combo("").Get(reqAnyRepoReader(), repo.Get).
|
2019-05-30 17:09:05 +02:00
|
|
|
Delete(reqToken(), reqOwner(), repo.Delete).
|
2021-01-26 16:36:53 +01:00
|
|
|
Patch(reqToken(), reqAdmin(), context.RepoRefForAPI, bind(api.EditRepoOption{}), repo.Edit)
|
2020-01-31 16:49:04 +01:00
|
|
|
m.Post("/transfer", reqOwner(), bind(api.TransferRepoOption{}), repo.Transfer)
|
2020-01-09 12:56:32 +01:00
|
|
|
m.Combo("/notifications").
|
|
|
|
Get(reqToken(), notify.ListRepoNotifications).
|
|
|
|
Put(reqToken(), notify.ReadRepoNotifications)
|
2021-02-11 18:34:34 +01:00
|
|
|
m.Group("/hooks/git", func() {
|
|
|
|
m.Combo("").Get(repo.ListGitHooks)
|
|
|
|
m.Group("/{id}", func() {
|
|
|
|
m.Combo("").Get(repo.GetGitHook).
|
|
|
|
Patch(bind(api.EditGitHookOption{}), repo.EditGitHook).
|
|
|
|
Delete(repo.DeleteGitHook)
|
|
|
|
})
|
|
|
|
}, reqToken(), reqAdmin(), reqGitHook(), context.ReferencesGitRepo(true))
|
2016-07-17 02:08:38 +02:00
|
|
|
m.Group("/hooks", func() {
|
|
|
|
m.Combo("").Get(repo.ListHooks).
|
|
|
|
Post(bind(api.CreateHookOption{}), repo.CreateHook)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/{id}", func() {
|
2018-04-29 08:21:33 +02:00
|
|
|
m.Combo("").Get(repo.GetHook).
|
|
|
|
Patch(bind(api.EditHookOption{}), repo.EditHook).
|
|
|
|
Delete(repo.DeleteHook)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Post("/tests", context.RepoRefForAPI, repo.TestHook)
|
2018-04-29 08:21:33 +02:00
|
|
|
})
|
2021-02-11 18:34:34 +01:00
|
|
|
}, reqToken(), reqAdmin(), reqWebhooksEnabled())
|
2016-12-26 08:37:01 +01:00
|
|
|
m.Group("/collaborators", func() {
|
2020-04-21 17:22:04 +02:00
|
|
|
m.Get("", reqAnyRepoReader(), repo.ListCollaborators)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{collaborator}").Get(reqAnyRepoReader(), repo.IsCollaborator).
|
2020-04-21 17:22:04 +02:00
|
|
|
Put(reqAdmin(), bind(api.AddCollaboratorOption{}), repo.AddCollaborator).
|
|
|
|
Delete(reqAdmin(), repo.DeleteCollaborator)
|
|
|
|
}, reqToken())
|
2021-02-01 22:57:12 +01:00
|
|
|
m.Group("/teams", func() {
|
|
|
|
m.Get("", reqAnyRepoReader(), repo.ListTeams)
|
|
|
|
m.Combo("/{team}").Get(reqAnyRepoReader(), repo.IsTeam).
|
|
|
|
Put(reqAdmin(), repo.AddTeam).
|
|
|
|
Delete(reqAdmin(), repo.DeleteTeam)
|
|
|
|
}, reqToken())
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Get("/raw/*", context.RepoRefForAPI, reqRepoReader(models.UnitTypeCode), repo.GetRawFile)
|
2018-11-28 12:26:14 +01:00
|
|
|
m.Get("/archive/*", reqRepoReader(models.UnitTypeCode), repo.GetArchive)
|
2016-12-31 02:15:45 +01:00
|
|
|
m.Combo("/forks").Get(repo.ListForks).
|
2018-11-28 12:26:14 +01:00
|
|
|
Post(reqToken(), reqRepoReader(models.UnitTypeCode), bind(api.CreateForkOption{}), repo.CreateFork)
|
2016-01-15 19:24:03 +01:00
|
|
|
m.Group("/branches", func() {
|
2016-03-11 17:56:52 +01:00
|
|
|
m.Get("", repo.ListBranches)
|
2020-11-14 17:13:55 +01:00
|
|
|
m.Get("/*", repo.GetBranch)
|
|
|
|
m.Delete("/*", context.ReferencesGitRepo(false), reqRepoWriter(models.UnitTypeCode), repo.DeleteBranch)
|
2020-05-29 20:16:20 +02:00
|
|
|
m.Post("", reqRepoWriter(models.UnitTypeCode), bind(api.CreateBranchRepoOption{}), repo.CreateBranch)
|
2018-11-28 12:26:14 +01:00
|
|
|
}, reqRepoReader(models.UnitTypeCode))
|
2020-02-13 00:19:35 +01:00
|
|
|
m.Group("/branch_protections", func() {
|
|
|
|
m.Get("", repo.ListBranchProtections)
|
|
|
|
m.Post("", bind(api.CreateBranchProtectionOption{}), repo.CreateBranchProtection)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/{name}", func() {
|
2020-02-13 00:19:35 +01:00
|
|
|
m.Get("", repo.GetBranchProtection)
|
|
|
|
m.Patch("", bind(api.EditBranchProtectionOption{}), repo.EditBranchProtection)
|
|
|
|
m.Delete("", repo.DeleteBranchProtection)
|
|
|
|
})
|
|
|
|
}, reqToken(), reqAdmin())
|
2019-02-07 13:00:52 +01:00
|
|
|
m.Group("/tags", func() {
|
|
|
|
m.Get("", repo.ListTags)
|
2021-02-07 19:32:18 +01:00
|
|
|
m.Delete("/{tag}", repo.DeleteTag)
|
2019-11-13 08:01:19 +01:00
|
|
|
}, reqRepoReader(models.UnitTypeCode), context.ReferencesGitRepo(true))
|
2015-12-04 23:16:42 +01:00
|
|
|
m.Group("/keys", func() {
|
|
|
|
m.Combo("").Get(repo.ListDeployKeys).
|
|
|
|
Post(bind(api.CreateKeyOption{}), repo.CreateDeployKey)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{id}").Get(repo.GetDeployKey).
|
2015-12-04 23:16:42 +01:00
|
|
|
Delete(repo.DeleteDeploykey)
|
2018-11-28 12:26:14 +01:00
|
|
|
}, reqToken(), reqAdmin())
|
2017-09-12 08:48:13 +02:00
|
|
|
m.Group("/times", func() {
|
|
|
|
m.Combo("").Get(repo.ListTrackedTimesByRepository)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{timetrackingusername}").Get(repo.ListTrackedTimesByUser)
|
2020-01-08 22:14:00 +01:00
|
|
|
}, mustEnableIssues, reqToken())
|
2016-03-14 04:20:22 +01:00
|
|
|
m.Group("/issues", func() {
|
2017-07-12 03:23:41 +02:00
|
|
|
m.Combo("").Get(repo.ListIssues).
|
2019-01-30 18:20:40 +01:00
|
|
|
Post(reqToken(), mustNotBeArchived, bind(api.CreateIssueOption{}), repo.CreateIssue)
|
2016-12-22 09:29:26 +01:00
|
|
|
m.Group("/comments", func() {
|
|
|
|
m.Get("", repo.ListRepoIssueComments)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/{id}", func() {
|
2020-01-08 08:00:59 +01:00
|
|
|
m.Combo("").
|
|
|
|
Get(repo.GetIssueComment).
|
|
|
|
Patch(mustNotBeArchived, reqToken(), bind(api.EditIssueCommentOption{}), repo.EditIssueComment).
|
|
|
|
Delete(reqToken(), repo.DeleteIssueComment)
|
2020-01-02 22:27:31 +01:00
|
|
|
m.Combo("/reactions").
|
2019-12-07 23:04:19 +01:00
|
|
|
Get(repo.GetIssueCommentReactions).
|
2021-01-16 12:23:02 +01:00
|
|
|
Post(reqToken(), bind(api.EditReactionOption{}), repo.PostIssueCommentReaction).
|
|
|
|
Delete(reqToken(), bind(api.EditReactionOption{}), repo.DeleteIssueCommentReaction)
|
2019-12-07 23:04:19 +01:00
|
|
|
})
|
2016-12-22 09:29:26 +01:00
|
|
|
})
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/{index}", func() {
|
2017-07-12 03:23:41 +02:00
|
|
|
m.Combo("").Get(repo.GetIssue).
|
|
|
|
Patch(reqToken(), bind(api.EditIssueOption{}), repo.EditIssue)
|
2016-08-26 20:23:21 +02:00
|
|
|
m.Group("/comments", func() {
|
2017-07-12 03:23:41 +02:00
|
|
|
m.Combo("").Get(repo.ListIssueComments).
|
2019-01-30 18:20:40 +01:00
|
|
|
Post(reqToken(), mustNotBeArchived, bind(api.CreateIssueCommentOption{}), repo.CreateIssueComment)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{id}", reqToken()).Patch(bind(api.EditIssueCommentOption{}), repo.EditIssueCommentDeprecated).
|
2017-11-20 08:24:07 +01:00
|
|
|
Delete(repo.DeleteIssueCommentDeprecated)
|
2016-08-26 20:23:21 +02:00
|
|
|
})
|
2016-08-03 18:24:16 +02:00
|
|
|
m.Group("/labels", func() {
|
2016-08-03 20:51:22 +02:00
|
|
|
m.Combo("").Get(repo.ListIssueLabels).
|
2017-07-12 03:23:41 +02:00
|
|
|
Post(reqToken(), bind(api.IssueLabelsOption{}), repo.AddIssueLabels).
|
|
|
|
Put(reqToken(), bind(api.IssueLabelsOption{}), repo.ReplaceIssueLabels).
|
|
|
|
Delete(reqToken(), repo.ClearIssueLabels)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Delete("/{id}", reqToken(), repo.DeleteIssueLabel)
|
2016-08-03 18:24:16 +02:00
|
|
|
})
|
2017-09-12 08:48:13 +02:00
|
|
|
m.Group("/times", func() {
|
2020-01-08 22:14:00 +01:00
|
|
|
m.Combo("").
|
2019-12-27 21:30:58 +01:00
|
|
|
Get(repo.ListTrackedTimes).
|
|
|
|
Post(bind(api.AddTimeOption{}), repo.AddTime).
|
|
|
|
Delete(repo.ResetIssueTime)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Delete("/{id}", repo.DeleteTime)
|
2020-01-08 22:14:00 +01:00
|
|
|
}, reqToken())
|
2018-07-16 14:43:00 +02:00
|
|
|
m.Combo("/deadline").Post(reqToken(), bind(api.EditDeadlineOption{}), repo.UpdateIssueDeadline)
|
2019-02-07 03:57:25 +01:00
|
|
|
m.Group("/stopwatch", func() {
|
|
|
|
m.Post("/start", reqToken(), repo.StartIssueStopwatch)
|
|
|
|
m.Post("/stop", reqToken(), repo.StopIssueStopwatch)
|
2019-12-12 05:23:05 +01:00
|
|
|
m.Delete("/delete", reqToken(), repo.DeleteIssueStopwatch)
|
2019-02-07 03:57:25 +01:00
|
|
|
})
|
2019-11-02 16:27:49 +01:00
|
|
|
m.Group("/subscriptions", func() {
|
2019-11-20 15:50:54 +01:00
|
|
|
m.Get("", repo.GetIssueSubscribers)
|
2020-04-21 15:48:53 +02:00
|
|
|
m.Get("/check", reqToken(), repo.CheckIssueSubscription)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Put("/{user}", reqToken(), repo.AddIssueSubscription)
|
|
|
|
m.Delete("/{user}", reqToken(), repo.DelIssueSubscription)
|
2019-11-02 16:27:49 +01:00
|
|
|
})
|
2020-01-02 22:27:31 +01:00
|
|
|
m.Combo("/reactions").
|
2019-12-07 23:04:19 +01:00
|
|
|
Get(repo.GetIssueReactions).
|
2021-01-16 12:23:02 +01:00
|
|
|
Post(reqToken(), bind(api.EditReactionOption{}), repo.PostIssueReaction).
|
|
|
|
Delete(reqToken(), bind(api.EditReactionOption{}), repo.DeleteIssueReaction)
|
2016-08-03 18:24:16 +02:00
|
|
|
})
|
2018-09-03 19:20:54 +02:00
|
|
|
}, mustEnableIssuesOrPulls)
|
2016-08-03 18:24:16 +02:00
|
|
|
m.Group("/labels", func() {
|
|
|
|
m.Combo("").Get(repo.ListLabels).
|
2018-11-28 12:26:14 +01:00
|
|
|
Post(reqToken(), reqRepoWriter(models.UnitTypeIssues, models.UnitTypePullRequests), bind(api.CreateLabelOption{}), repo.CreateLabel)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{id}").Get(repo.GetLabel).
|
2018-11-28 12:26:14 +01:00
|
|
|
Patch(reqToken(), reqRepoWriter(models.UnitTypeIssues, models.UnitTypePullRequests), bind(api.EditLabelOption{}), repo.EditLabel).
|
|
|
|
Delete(reqToken(), reqRepoWriter(models.UnitTypeIssues, models.UnitTypePullRequests), repo.DeleteLabel)
|
2016-03-13 23:49:16 +01:00
|
|
|
})
|
2019-04-12 07:53:34 +02:00
|
|
|
m.Post("/markdown", bind(api.MarkdownOption{}), misc.Markdown)
|
|
|
|
m.Post("/markdown/raw", misc.MarkdownRaw)
|
2016-08-25 00:18:56 +02:00
|
|
|
m.Group("/milestones", func() {
|
|
|
|
m.Combo("").Get(repo.ListMilestones).
|
2018-11-28 12:26:14 +01:00
|
|
|
Post(reqToken(), reqRepoWriter(models.UnitTypeIssues, models.UnitTypePullRequests), bind(api.CreateMilestoneOption{}), repo.CreateMilestone)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{id}").Get(repo.GetMilestone).
|
2018-11-28 12:26:14 +01:00
|
|
|
Patch(reqToken(), reqRepoWriter(models.UnitTypeIssues, models.UnitTypePullRequests), bind(api.EditMilestoneOption{}), repo.EditMilestone).
|
|
|
|
Delete(reqToken(), reqRepoWriter(models.UnitTypeIssues, models.UnitTypePullRequests), repo.DeleteMilestone)
|
2016-08-25 00:18:56 +02:00
|
|
|
})
|
2017-01-06 08:05:09 +01:00
|
|
|
m.Get("/stargazers", repo.ListStargazers)
|
2017-01-07 04:13:02 +01:00
|
|
|
m.Get("/subscribers", repo.ListSubscribers)
|
2016-12-24 02:53:11 +01:00
|
|
|
m.Group("/subscription", func() {
|
|
|
|
m.Get("", user.IsWatching)
|
2017-07-12 03:23:41 +02:00
|
|
|
m.Put("", reqToken(), user.Watch)
|
|
|
|
m.Delete("", reqToken(), user.Unwatch)
|
2016-12-29 14:17:32 +01:00
|
|
|
})
|
2016-12-31 17:51:22 +01:00
|
|
|
m.Group("/releases", func() {
|
|
|
|
m.Combo("").Get(repo.ListReleases).
|
2019-04-17 07:31:08 +02:00
|
|
|
Post(reqToken(), reqRepoWriter(models.UnitTypeReleases), context.ReferencesGitRepo(false), bind(api.CreateReleaseOption{}), repo.CreateRelease)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/{id}", func() {
|
2018-03-06 02:22:16 +01:00
|
|
|
m.Combo("").Get(repo.GetRelease).
|
2019-04-17 07:31:08 +02:00
|
|
|
Patch(reqToken(), reqRepoWriter(models.UnitTypeReleases), context.ReferencesGitRepo(false), bind(api.EditReleaseOption{}), repo.EditRelease).
|
2018-11-28 12:26:14 +01:00
|
|
|
Delete(reqToken(), reqRepoWriter(models.UnitTypeReleases), repo.DeleteRelease)
|
2018-03-06 02:22:16 +01:00
|
|
|
m.Group("/assets", func() {
|
|
|
|
m.Combo("").Get(repo.ListReleaseAttachments).
|
2018-11-28 12:26:14 +01:00
|
|
|
Post(reqToken(), reqRepoWriter(models.UnitTypeReleases), repo.CreateReleaseAttachment)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{asset}").Get(repo.GetReleaseAttachment).
|
2018-11-28 12:26:14 +01:00
|
|
|
Patch(reqToken(), reqRepoWriter(models.UnitTypeReleases), bind(api.EditAttachmentOptions{}), repo.EditReleaseAttachment).
|
|
|
|
Delete(reqToken(), reqRepoWriter(models.UnitTypeReleases), repo.DeleteReleaseAttachment)
|
2018-03-06 02:22:16 +01:00
|
|
|
})
|
|
|
|
})
|
2020-09-25 21:11:43 +02:00
|
|
|
m.Group("/tags", func() {
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{tag}").
|
2021-02-07 19:32:18 +01:00
|
|
|
Get(repo.GetReleaseByTag).
|
|
|
|
Delete(reqToken(), reqRepoWriter(models.UnitTypeReleases), repo.DeleteReleaseByTag)
|
2020-09-25 21:11:43 +02:00
|
|
|
})
|
2018-11-28 12:26:14 +01:00
|
|
|
}, reqRepoReader(models.UnitTypeReleases))
|
|
|
|
m.Post("/mirror-sync", reqToken(), reqRepoWriter(models.UnitTypeCode), repo.MirrorSync)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Get("/editorconfig/{filename}", context.RepoRefForAPI, reqRepoReader(models.UnitTypeCode), repo.GetEditorconfig)
|
2016-12-02 12:10:39 +01:00
|
|
|
m.Group("/pulls", func() {
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("").Get(repo.ListPullRequests).
|
2019-01-30 18:20:40 +01:00
|
|
|
Post(reqToken(), mustNotBeArchived, bind(api.CreatePullRequestOption{}), repo.CreatePullRequest)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/{index}", func() {
|
2017-07-12 03:23:41 +02:00
|
|
|
m.Combo("").Get(repo.GetPullRequest).
|
2018-11-28 12:26:14 +01:00
|
|
|
Patch(reqToken(), reqRepoWriter(models.UnitTypePullRequests), bind(api.EditPullRequestOption{}), repo.EditPullRequest)
|
2020-06-05 13:03:12 +02:00
|
|
|
m.Get(".diff", repo.DownloadPullDiff)
|
|
|
|
m.Get(".patch", repo.DownloadPullPatch)
|
2020-08-04 22:55:22 +02:00
|
|
|
m.Post("/update", reqToken(), repo.UpdatePullRequest)
|
2017-07-12 03:23:41 +02:00
|
|
|
m.Combo("/merge").Get(repo.IsPullRequestMerged).
|
2020-04-08 13:26:50 +02:00
|
|
|
Post(reqToken(), mustNotBeArchived, bind(auth.MergePullRequestForm{}), repo.MergePullRequest)
|
2020-05-02 02:20:51 +02:00
|
|
|
m.Group("/reviews", func() {
|
|
|
|
m.Combo("").
|
|
|
|
Get(repo.ListPullReviews).
|
|
|
|
Post(reqToken(), bind(api.CreatePullReviewOptions{}), repo.CreatePullReview)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/{id}", func() {
|
2020-05-02 02:20:51 +02:00
|
|
|
m.Combo("").
|
|
|
|
Get(repo.GetPullReview).
|
|
|
|
Delete(reqToken(), repo.DeletePullReview).
|
|
|
|
Post(reqToken(), bind(api.SubmitPullReviewOptions{}), repo.SubmitPullReview)
|
|
|
|
m.Combo("/comments").
|
|
|
|
Get(repo.GetPullReviewComments)
|
2021-02-11 18:32:25 +01:00
|
|
|
m.Post("/dismissals", reqToken(), bind(api.DismissPullReviewOptions{}), repo.DismissPullReview)
|
|
|
|
m.Post("/undismissals", reqToken(), repo.UnDismissPullReview)
|
2020-05-02 02:20:51 +02:00
|
|
|
})
|
|
|
|
})
|
2020-10-20 20:18:25 +02:00
|
|
|
m.Combo("/requested_reviewers").
|
|
|
|
Delete(reqToken(), bind(api.PullReviewRequestOptions{}), repo.DeleteReviewRequests).
|
|
|
|
Post(reqToken(), bind(api.PullReviewRequestOptions{}), repo.CreateReviewRequests)
|
2016-12-02 12:10:39 +01:00
|
|
|
})
|
2019-04-17 07:31:08 +02:00
|
|
|
}, mustAllowPulls, reqRepoReader(models.UnitTypeCode), context.ReferencesGitRepo(false))
|
2017-04-21 13:32:31 +02:00
|
|
|
m.Group("/statuses", func() {
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{sha}").Get(repo.GetCommitStatuses).
|
2018-11-28 12:26:14 +01:00
|
|
|
Post(reqToken(), bind(api.CreateStatusOption{}), repo.NewCommitStatus)
|
|
|
|
}, reqRepoReader(models.UnitTypeCode))
|
2019-08-26 16:09:10 +02:00
|
|
|
m.Group("/commits", func() {
|
|
|
|
m.Get("", repo.GetAllCommits)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/{ref}", func() {
|
2019-08-26 16:09:10 +02:00
|
|
|
m.Get("/status", repo.GetCombinedCommitStatusByRef)
|
|
|
|
m.Get("/statuses", repo.GetCommitStatusesByRef)
|
|
|
|
})
|
2018-11-28 12:26:14 +01:00
|
|
|
}, reqRepoReader(models.UnitTypeCode))
|
2018-11-27 22:52:20 +01:00
|
|
|
m.Group("/git", func() {
|
2019-02-03 04:35:17 +01:00
|
|
|
m.Group("/commits", func() {
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Get("/{sha}", repo.GetSingleCommit)
|
2019-02-03 04:35:17 +01:00
|
|
|
})
|
2018-11-27 22:52:20 +01:00
|
|
|
m.Get("/refs", repo.GetGitAllRefs)
|
|
|
|
m.Get("/refs/*", repo.GetGitRefs)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Get("/trees/{sha}", context.RepoRefForAPI, repo.GetTree)
|
|
|
|
m.Get("/blobs/{sha}", context.RepoRefForAPI, repo.GetBlob)
|
|
|
|
m.Get("/tags/{sha}", context.RepoRefForAPI, repo.GetTag)
|
2019-04-17 18:06:35 +02:00
|
|
|
}, reqRepoReader(models.UnitTypeCode))
|
|
|
|
m.Group("/contents", func() {
|
2019-06-29 22:51:10 +02:00
|
|
|
m.Get("", repo.GetContentsList)
|
|
|
|
m.Get("/*", repo.GetContents)
|
2019-04-17 18:06:35 +02:00
|
|
|
m.Group("/*", func() {
|
|
|
|
m.Post("", bind(api.CreateFileOptions{}), repo.CreateFile)
|
|
|
|
m.Put("", bind(api.UpdateFileOptions{}), repo.UpdateFile)
|
|
|
|
m.Delete("", bind(api.DeleteFileOptions{}), repo.DeleteFile)
|
|
|
|
}, reqRepoWriter(models.UnitTypeCode), reqToken())
|
2018-11-28 12:26:14 +01:00
|
|
|
}, reqRepoReader(models.UnitTypeCode))
|
2019-10-16 15:42:42 +02:00
|
|
|
m.Get("/signing-key.gpg", misc.SigningKey)
|
2019-09-03 17:46:24 +02:00
|
|
|
m.Group("/topics", func() {
|
|
|
|
m.Combo("").Get(repo.ListTopics).
|
|
|
|
Put(reqToken(), reqAdmin(), bind(api.RepoTopicOptions{}), repo.UpdateTopics)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/{topic}", func() {
|
2019-09-03 17:46:24 +02:00
|
|
|
m.Combo("").Put(reqToken(), repo.AddTopic).
|
|
|
|
Delete(reqToken(), repo.DeleteTopic)
|
|
|
|
}, reqAdmin())
|
|
|
|
}, reqAnyRepoReader())
|
2020-09-11 16:48:39 +02:00
|
|
|
m.Get("/issue_templates", context.ReferencesGitRepo(false), repo.GetIssueTemplates)
|
2020-06-07 13:48:41 +02:00
|
|
|
m.Get("/languages", reqRepoReader(models.UnitTypeCode), repo.GetLanguages)
|
2016-08-05 02:08:01 +02:00
|
|
|
}, repoAssignment())
|
2017-07-12 03:23:41 +02:00
|
|
|
})
|
2015-12-04 23:16:42 +01:00
|
|
|
|
2015-12-17 08:28:47 +01:00
|
|
|
// Organizations
|
2016-08-05 02:08:01 +02:00
|
|
|
m.Get("/user/orgs", reqToken(), org.ListMyOrgs)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Get("/users/{username}/orgs", org.ListUserOrgs)
|
2018-11-20 18:31:30 +01:00
|
|
|
m.Post("/orgs", reqToken(), bind(api.CreateOrgOption{}), org.Create)
|
2020-01-12 16:43:44 +01:00
|
|
|
m.Get("/orgs", org.GetAll)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/orgs/{org}", func() {
|
2017-01-26 12:54:04 +01:00
|
|
|
m.Combo("").Get(org.Get).
|
2018-12-27 16:36:58 +01:00
|
|
|
Patch(reqToken(), reqOrgOwnership(), bind(api.EditOrgOption{}), org.Edit).
|
|
|
|
Delete(reqToken(), reqOrgOwnership(), org.Delete)
|
2020-01-09 17:40:01 +01:00
|
|
|
m.Combo("/repos").Get(user.ListOrgRepos).
|
|
|
|
Post(reqToken(), bind(api.CreateRepoOption{}), repo.CreateOrgRepo)
|
2017-01-20 03:31:46 +01:00
|
|
|
m.Group("/members", func() {
|
|
|
|
m.Get("", org.ListMembers)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{username}").Get(org.IsMember).
|
2017-06-07 18:20:32 +02:00
|
|
|
Delete(reqToken(), reqOrgOwnership(), org.DeleteMember)
|
2017-01-20 03:31:46 +01:00
|
|
|
})
|
|
|
|
m.Group("/public_members", func() {
|
|
|
|
m.Get("", org.ListPublicMembers)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{username}").Get(org.IsPublicMember).
|
2017-06-07 18:20:32 +02:00
|
|
|
Put(reqToken(), reqOrgMembership(), org.PublicizeMember).
|
|
|
|
Delete(reqToken(), reqOrgMembership(), org.ConcealMember)
|
2017-01-20 03:31:46 +01:00
|
|
|
})
|
2019-10-01 07:32:28 +02:00
|
|
|
m.Group("/teams", func() {
|
|
|
|
m.Combo("", reqToken()).Get(org.ListTeams).
|
|
|
|
Post(reqOrgOwnership(), bind(api.CreateTeamOption{}), org.CreateTeam)
|
|
|
|
m.Get("/search", org.SearchTeam)
|
|
|
|
}, reqOrgMembership())
|
Add Organization Wide Labels (#10814)
* Add organization wide labels
Implement organization wide labels similar to organization wide
webhooks. This lets you create individual labels for organizations that can be used
for all repos under that organization (so being able to reuse the same
label across multiple repos).
This makes it possible for small organizations with many repos to use
labels effectively.
Fixes #7406
* Add migration
* remove comments
* fix tests
* Update options/locale/locale_en-US.ini
Removed unused translation string
* show org labels in issue search label filter
* Use more clear var name
* rename migration after merge from master
* comment typo
* update migration again after rebase with master
* check for orgID <=0 per guillep2k review
* fmt
* Apply suggestions from code review
Co-Authored-By: guillep2k <18600385+guillep2k@users.noreply.github.com>
* remove unused code
* Make sure RepoID is 0 when searching orgID per code review
* more changes/code review requests
* More descriptive translation var per code review
* func description/delete comment when issue label deleted instead of hiding it
* remove comment
* only use issues in that repo when calculating number of open issues for org label on repo label page
* Add integration test for IssuesSearch API with labels
* remove unused function
* Update models/issue_label.go
Co-Authored-By: guillep2k <18600385+guillep2k@users.noreply.github.com>
* Use subquery in GetLabelIDsInReposByNames
* Fix tests to use correct orgID
* fix more tests
* IssuesSearch api now uses new BuildLabelNamesIssueIDsCondition. Add a few more tests as well
* update comment for clarity
* Revert previous code change now that we can use the new BuildLabelNamesIssueIDsCondition
* Don't sort repos by date in IssuesSearch API
After much debugging I've found a strange issue where in some cases MySQL will return a different result than other enigines if a query is sorted by a null collumn. For example with our integration test data where we don't set updated_unix in repository fixtures:
SELECT `id`, `owner_id`, `owner_name`, `lower_name`, `name`, `description`, `website`, `original_service_type`, `original_url`, `default_branch`, `num_watches`, `num_stars`, `num_forks`, `num_issues`, `num_closed_issues`, `num_pulls`, `num_closed_pulls`, `num_milestones`, `num_closed_milestones`, `is_private`, `is_empty`, `is_archived`, `is_mirror`, `status`, `is_fork`, `fork_id`, `is_template`, `template_id`, `size`, `is_fsck_enabled`, `close_issues_via_commit_in_any_branch`, `topics`, `avatar`, `created_unix`, `updated_unix` FROM `repository` ORDER BY updated_unix DESC LIMIT 15 OFFSET 45
Returns different results for MySQL than other engines. However, the similar query:
SELECT `id`, `owner_id`, `owner_name`, `lower_name`, `name`, `description`, `website`, `original_service_type`, `original_url`, `default_branch`, `num_watches`, `num_stars`, `num_forks`, `num_issues`, `num_closed_issues`, `num_pulls`, `num_closed_pulls`, `num_milestones`, `num_closed_milestones`, `is_private`, `is_empty`, `is_archived`, `is_mirror`, `status`, `is_fork`, `fork_id`, `is_template`, `template_id`, `size`, `is_fsck_enabled`, `close_issues_via_commit_in_any_branch`, `topics`, `avatar`, `created_unix`, `updated_unix` FROM `repository` ORDER BY updated_unix DESC LIMIT 15 OFFSET 30
Returns the same results.
This causes integration tests to fail on MySQL in certain cases but would never show up in a real installation. Since this API call always returns issues based on the optionally provided repo_priority_id or the issueID itself, there is no change to results by changing the repo sorting method used to get ids earlier in the function.
* linter is back!
* code review
* remove now unused option
* Fix newline at end of files
* more unused code
* update to master
* check for matching ids before query
* Update models/issue_label.go
Co-Authored-By: 6543 <6543@obermui.de>
* Update models/issue_label.go
* update comments
* Update routers/org/setting.go
Co-authored-by: Lauris BH <lauris@nix.lv>
Co-authored-by: guillep2k <18600385+guillep2k@users.noreply.github.com>
Co-authored-by: 6543 <6543@obermui.de>
2020-04-01 06:14:46 +02:00
|
|
|
m.Group("/labels", func() {
|
|
|
|
m.Get("", org.ListLabels)
|
|
|
|
m.Post("", reqToken(), reqOrgOwnership(), bind(api.CreateLabelOption{}), org.CreateLabel)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{id}").Get(org.GetLabel).
|
Add Organization Wide Labels (#10814)
* Add organization wide labels
Implement organization wide labels similar to organization wide
webhooks. This lets you create individual labels for organizations that can be used
for all repos under that organization (so being able to reuse the same
label across multiple repos).
This makes it possible for small organizations with many repos to use
labels effectively.
Fixes #7406
* Add migration
* remove comments
* fix tests
* Update options/locale/locale_en-US.ini
Removed unused translation string
* show org labels in issue search label filter
* Use more clear var name
* rename migration after merge from master
* comment typo
* update migration again after rebase with master
* check for orgID <=0 per guillep2k review
* fmt
* Apply suggestions from code review
Co-Authored-By: guillep2k <18600385+guillep2k@users.noreply.github.com>
* remove unused code
* Make sure RepoID is 0 when searching orgID per code review
* more changes/code review requests
* More descriptive translation var per code review
* func description/delete comment when issue label deleted instead of hiding it
* remove comment
* only use issues in that repo when calculating number of open issues for org label on repo label page
* Add integration test for IssuesSearch API with labels
* remove unused function
* Update models/issue_label.go
Co-Authored-By: guillep2k <18600385+guillep2k@users.noreply.github.com>
* Use subquery in GetLabelIDsInReposByNames
* Fix tests to use correct orgID
* fix more tests
* IssuesSearch api now uses new BuildLabelNamesIssueIDsCondition. Add a few more tests as well
* update comment for clarity
* Revert previous code change now that we can use the new BuildLabelNamesIssueIDsCondition
* Don't sort repos by date in IssuesSearch API
After much debugging I've found a strange issue where in some cases MySQL will return a different result than other enigines if a query is sorted by a null collumn. For example with our integration test data where we don't set updated_unix in repository fixtures:
SELECT `id`, `owner_id`, `owner_name`, `lower_name`, `name`, `description`, `website`, `original_service_type`, `original_url`, `default_branch`, `num_watches`, `num_stars`, `num_forks`, `num_issues`, `num_closed_issues`, `num_pulls`, `num_closed_pulls`, `num_milestones`, `num_closed_milestones`, `is_private`, `is_empty`, `is_archived`, `is_mirror`, `status`, `is_fork`, `fork_id`, `is_template`, `template_id`, `size`, `is_fsck_enabled`, `close_issues_via_commit_in_any_branch`, `topics`, `avatar`, `created_unix`, `updated_unix` FROM `repository` ORDER BY updated_unix DESC LIMIT 15 OFFSET 45
Returns different results for MySQL than other engines. However, the similar query:
SELECT `id`, `owner_id`, `owner_name`, `lower_name`, `name`, `description`, `website`, `original_service_type`, `original_url`, `default_branch`, `num_watches`, `num_stars`, `num_forks`, `num_issues`, `num_closed_issues`, `num_pulls`, `num_closed_pulls`, `num_milestones`, `num_closed_milestones`, `is_private`, `is_empty`, `is_archived`, `is_mirror`, `status`, `is_fork`, `fork_id`, `is_template`, `template_id`, `size`, `is_fsck_enabled`, `close_issues_via_commit_in_any_branch`, `topics`, `avatar`, `created_unix`, `updated_unix` FROM `repository` ORDER BY updated_unix DESC LIMIT 15 OFFSET 30
Returns the same results.
This causes integration tests to fail on MySQL in certain cases but would never show up in a real installation. Since this API call always returns issues based on the optionally provided repo_priority_id or the issueID itself, there is no change to results by changing the repo sorting method used to get ids earlier in the function.
* linter is back!
* code review
* remove now unused option
* Fix newline at end of files
* more unused code
* update to master
* check for matching ids before query
* Update models/issue_label.go
Co-Authored-By: 6543 <6543@obermui.de>
* Update models/issue_label.go
* update comments
* Update routers/org/setting.go
Co-authored-by: Lauris BH <lauris@nix.lv>
Co-authored-by: guillep2k <18600385+guillep2k@users.noreply.github.com>
Co-authored-by: 6543 <6543@obermui.de>
2020-04-01 06:14:46 +02:00
|
|
|
Patch(reqToken(), reqOrgOwnership(), bind(api.EditLabelOption{}), org.EditLabel).
|
|
|
|
Delete(reqToken(), reqOrgOwnership(), org.DeleteLabel)
|
|
|
|
})
|
2016-12-07 05:36:28 +01:00
|
|
|
m.Group("/hooks", func() {
|
|
|
|
m.Combo("").Get(org.ListHooks).
|
|
|
|
Post(bind(api.CreateHookOption{}), org.CreateHook)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{id}").Get(org.GetHook).
|
2019-07-03 07:31:29 +02:00
|
|
|
Patch(bind(api.EditHookOption{}), org.EditHook).
|
|
|
|
Delete(org.DeleteHook)
|
2021-02-11 18:34:34 +01:00
|
|
|
}, reqToken(), reqOrgOwnership(), reqWebhooksEnabled())
|
2016-08-05 02:08:01 +02:00
|
|
|
}, orgAssignment(true))
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/teams/{teamid}", func() {
|
2017-01-20 06:16:10 +01:00
|
|
|
m.Combo("").Get(org.GetTeam).
|
2017-01-26 12:54:04 +01:00
|
|
|
Patch(reqOrgOwnership(), bind(api.EditTeamOption{}), org.EditTeam).
|
|
|
|
Delete(reqOrgOwnership(), org.DeleteTeam)
|
2017-01-20 06:16:10 +01:00
|
|
|
m.Group("/members", func() {
|
|
|
|
m.Get("", org.GetTeamMembers)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{username}").
|
2019-01-17 01:39:50 +01:00
|
|
|
Get(org.GetTeamMember).
|
2017-01-26 12:54:04 +01:00
|
|
|
Put(reqOrgOwnership(), org.AddTeamMember).
|
|
|
|
Delete(reqOrgOwnership(), org.RemoveTeamMember)
|
2017-01-20 06:16:10 +01:00
|
|
|
})
|
|
|
|
m.Group("/repos", func() {
|
|
|
|
m.Get("", org.GetTeamRepos)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Combo("/{org}/{reponame}").
|
2017-01-26 12:54:04 +01:00
|
|
|
Put(org.AddTeamRepository).
|
|
|
|
Delete(org.RemoveTeamRepository)
|
2017-01-20 06:16:10 +01:00
|
|
|
})
|
2019-04-24 07:32:35 +02:00
|
|
|
}, orgAssignment(false, true), reqToken(), reqTeamMembership())
|
2015-12-17 08:28:47 +01:00
|
|
|
|
2015-12-05 23:13:13 +01:00
|
|
|
m.Group("/admin", func() {
|
2020-08-24 17:48:15 +02:00
|
|
|
m.Group("/cron", func() {
|
|
|
|
m.Get("", admin.ListCronTasks)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Post("/{task}", admin.PostCronTask)
|
2020-08-24 17:48:15 +02:00
|
|
|
})
|
2019-01-23 23:30:19 +01:00
|
|
|
m.Get("/orgs", admin.GetAllOrgs)
|
2015-12-05 23:13:13 +01:00
|
|
|
m.Group("/users", func() {
|
2019-01-23 23:30:19 +01:00
|
|
|
m.Get("", admin.GetAllUsers)
|
2015-12-05 23:13:13 +01:00
|
|
|
m.Post("", bind(api.CreateUserOption{}), admin.CreateUser)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Group("/{username}", func() {
|
2015-12-05 23:13:13 +01:00
|
|
|
m.Combo("").Patch(bind(api.EditUserOption{}), admin.EditUser).
|
|
|
|
Delete(admin.DeleteUser)
|
2017-12-06 11:27:10 +01:00
|
|
|
m.Group("/keys", func() {
|
|
|
|
m.Post("", bind(api.CreateKeyOption{}), admin.CreatePublicKey)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Delete("/{id}", admin.DeleteUserPublicKey)
|
2017-12-06 11:27:10 +01:00
|
|
|
})
|
2019-01-23 23:30:19 +01:00
|
|
|
m.Get("/orgs", org.ListUserOrgs)
|
2015-12-17 08:28:47 +01:00
|
|
|
m.Post("/orgs", bind(api.CreateOrgOption{}), admin.CreateOrg)
|
2015-12-18 04:57:41 +01:00
|
|
|
m.Post("/repos", bind(api.CreateRepoOption{}), admin.CreateRepo)
|
2015-12-05 23:13:13 +01:00
|
|
|
})
|
|
|
|
})
|
2020-09-25 06:09:23 +02:00
|
|
|
m.Group("/unadopted", func() {
|
|
|
|
m.Get("", admin.ListUnadoptedRepositories)
|
2021-01-26 16:36:53 +01:00
|
|
|
m.Post("/{username}/{reponame}", admin.AdoptRepository)
|
|
|
|
m.Delete("/{username}/{reponame}", admin.DeleteUnadoptedRepository)
|
2020-09-25 06:09:23 +02:00
|
|
|
})
|
2018-11-28 12:26:14 +01:00
|
|
|
}, reqToken(), reqSiteAdmin())
|
2018-04-11 04:51:44 +02:00
|
|
|
|
|
|
|
m.Group("/topics", func() {
|
|
|
|
m.Get("/search", repo.TopicSearch)
|
|
|
|
})
|
2021-01-26 16:36:53 +01:00
|
|
|
}, sudo())
|
|
|
|
|
|
|
|
return m
|
2019-05-13 17:38:53 +02:00
|
|
|
}
|
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
func securityHeaders() func(http.Handler) http.Handler {
|
|
|
|
return func(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(resp http.ResponseWriter, req *http.Request) {
|
2019-05-13 17:38:53 +02:00
|
|
|
// CORB: https://www.chromium.org/Home/chromium-security/corb-for-developers
|
|
|
|
// http://stackoverflow.com/a/3146618/244009
|
2021-01-26 16:36:53 +01:00
|
|
|
resp.Header().Set("x-content-type-options", "nosniff")
|
|
|
|
next.ServeHTTP(resp, req)
|
2019-05-13 17:38:53 +02:00
|
|
|
})
|
|
|
|
}
|
2015-12-04 23:16:42 +01:00
|
|
|
}
|