0
0
Fork 0
mirror of https://github.com/go-gitea/gitea synced 2024-12-29 03:14:34 +01:00
gitea/routers/repo/repo.go

421 lines
11 KiB
Go
Raw Normal View History

2014-02-20 03:45:43 +01:00
// Copyright 2014 The Gogs Authors. All rights reserved.
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
package repo
import (
"fmt"
2014-07-26 06:24:27 +02:00
"os"
2014-03-22 18:50:50 +01:00
"path"
"strings"
2014-03-22 18:50:50 +01:00
"code.gitea.io/gitea/models"
"code.gitea.io/gitea/modules/auth"
"code.gitea.io/gitea/modules/base"
"code.gitea.io/gitea/modules/context"
"code.gitea.io/gitea/modules/git"
"code.gitea.io/gitea/modules/log"
"code.gitea.io/gitea/modules/setting"
"code.gitea.io/gitea/modules/util"
"github.com/Unknwon/com"
2014-02-20 03:45:43 +01:00
)
2014-06-23 05:11:12 +02:00
const (
2016-11-24 08:04:31 +01:00
tplCreate base.TplName = "repo/create"
tplMigrate base.TplName = "repo/migrate"
2014-06-23 05:11:12 +02:00
)
// MustBeNotEmpty render when a repo is a empty git dir
func MustBeNotEmpty(ctx *context.Context) {
if ctx.Repo.Repository.IsEmpty {
ctx.NotFound("MustBeNotEmpty", nil)
}
}
// MustBeEditable check that repo can be edited
func MustBeEditable(ctx *context.Context) {
if !ctx.Repo.Repository.CanEnableEditor() || ctx.Repo.IsViewCommit {
ctx.NotFound("", nil)
return
}
}
// MustBeAbleToUpload check that repo can be uploaded to
func MustBeAbleToUpload(ctx *context.Context) {
if !setting.Repository.Upload.Enabled {
ctx.NotFound("", nil)
}
}
2016-03-11 17:56:52 +01:00
func checkContextUser(ctx *context.Context, uid int64) *models.User {
2016-07-23 19:08:22 +02:00
orgs, err := models.GetOwnedOrgsByUserIDDesc(ctx.User.ID, "updated_unix")
if err != nil {
ctx.ServerError("GetOwnedOrgsByUserIDDesc", err)
2015-08-28 12:33:09 +02:00
return nil
}
ctx.Data["Orgs"] = orgs
2015-08-28 12:33:09 +02:00
2015-07-19 11:11:16 +02:00
// Not equal means current user is an organization.
2016-07-23 19:08:22 +02:00
if uid == ctx.User.ID || uid == 0 {
2015-07-19 11:11:16 +02:00
return ctx.User
}
2015-08-08 16:43:14 +02:00
org, err := models.GetUserByID(uid)
2015-08-05 05:14:17 +02:00
if models.IsErrUserNotExist(err) {
2015-07-19 11:11:16 +02:00
return ctx.User
}
if err != nil {
ctx.ServerError("GetUserByID", fmt.Errorf("[%d]: %v", uid, err))
2015-07-19 11:11:16 +02:00
return nil
2015-08-28 12:33:09 +02:00
}
// Check ownership of organization.
if !org.IsOrganization() {
2015-07-19 11:11:16 +02:00
ctx.Error(403)
return nil
2014-11-06 05:30:04 +01:00
}
if !ctx.User.IsAdmin {
isOwner, err := org.IsOwnedBy(ctx.User.ID)
if err != nil {
ctx.ServerError("IsOwnedBy", err)
return nil
} else if !isOwner {
ctx.Error(403)
return nil
}
}
2015-07-19 11:11:16 +02:00
return org
2014-11-06 05:30:04 +01:00
}
func getRepoPrivate(ctx *context.Context) bool {
switch strings.ToLower(setting.Repository.DefaultPrivate) {
case setting.RepoCreatingLastUserVisibility:
return ctx.User.LastRepoVisibility
case setting.RepoCreatingPrivate:
return true
case setting.RepoCreatingPublic:
return false
default:
return ctx.User.LastRepoVisibility
}
}
2016-11-24 08:04:31 +01:00
// Create render creating repository page
2016-03-11 17:56:52 +01:00
func Create(ctx *context.Context) {
if !ctx.User.CanCreateRepo() {
2017-05-24 08:01:02 +02:00
ctx.RenderWithErr(ctx.Tr("repo.form.reach_limit_of_creation", ctx.User.MaxCreationLimit()), tplCreate, nil)
}
2014-07-26 06:24:27 +02:00
ctx.Data["Title"] = ctx.Tr("new_repo")
// Give default value for template to render.
ctx.Data["Gitignores"] = models.Gitignores
2014-03-19 18:14:56 +01:00
ctx.Data["Licenses"] = models.Licenses
ctx.Data["Readmes"] = models.Readmes
ctx.Data["readme"] = "Default"
ctx.Data["private"] = getRepoPrivate(ctx)
2015-10-25 09:26:26 +01:00
ctx.Data["IsForcedPrivate"] = setting.Repository.ForcePrivate
2014-06-25 09:55:59 +02:00
2015-07-19 11:11:16 +02:00
ctxUser := checkContextUser(ctx, ctx.QueryInt64("org"))
if ctx.Written() {
2014-11-06 05:30:04 +01:00
return
}
2014-06-28 21:43:25 +02:00
ctx.Data["ContextUser"] = ctxUser
2016-11-24 08:04:31 +01:00
ctx.HTML(200, tplCreate)
2014-04-11 00:09:57 +02:00
}
2016-03-11 17:56:52 +01:00
func handleCreateError(ctx *context.Context, owner *models.User, err error, name string, tpl base.TplName, form interface{}) {
2015-08-28 12:33:09 +02:00
switch {
2015-12-10 18:37:53 +01:00
case models.IsErrReachLimitOfRepo(err):
ctx.RenderWithErr(ctx.Tr("repo.form.reach_limit_of_creation", owner.MaxCreationLimit()), tpl, form)
2015-08-28 12:33:09 +02:00
case models.IsErrRepoAlreadyExist(err):
ctx.Data["Err_RepoName"] = true
ctx.RenderWithErr(ctx.Tr("form.repo_name_been_taken"), tpl, form)
case models.IsErrNameReserved(err):
ctx.Data["Err_RepoName"] = true
ctx.RenderWithErr(ctx.Tr("repo.form.name_reserved", err.(models.ErrNameReserved).Name), tpl, form)
case models.IsErrNamePatternNotAllowed(err):
ctx.Data["Err_RepoName"] = true
ctx.RenderWithErr(ctx.Tr("repo.form.name_pattern_not_allowed", err.(models.ErrNamePatternNotAllowed).Pattern), tpl, form)
default:
ctx.ServerError(name, err)
2015-08-28 12:33:09 +02:00
}
}
2016-11-24 08:04:31 +01:00
// CreatePost response for creating repository
2016-03-11 17:56:52 +01:00
func CreatePost(ctx *context.Context, form auth.CreateRepoForm) {
2014-07-26 06:24:27 +02:00
ctx.Data["Title"] = ctx.Tr("new_repo")
ctx.Data["Gitignores"] = models.Gitignores
2014-04-11 00:09:57 +02:00
ctx.Data["Licenses"] = models.Licenses
ctx.Data["Readmes"] = models.Readmes
2014-02-20 03:45:43 +01:00
2016-11-27 07:03:59 +01:00
ctxUser := checkContextUser(ctx, form.UID)
2015-07-19 11:11:16 +02:00
if ctx.Written() {
return
}
2014-07-26 06:24:27 +02:00
ctx.Data["ContextUser"] = ctxUser
2014-03-22 21:00:46 +01:00
if ctx.HasError() {
2016-11-24 08:04:31 +01:00
ctx.HTML(200, tplCreate)
2014-03-22 21:00:46 +01:00
return
}
repo, err := models.CreateRepository(ctx.User, ctxUser, models.CreateRepoOptions{
2015-08-28 12:33:09 +02:00
Name: form.RepoName,
Description: form.Description,
Gitignores: form.Gitignores,
License: form.License,
Readme: form.Readme,
2015-10-25 09:26:26 +01:00
IsPrivate: form.Private || setting.Repository.ForcePrivate,
2015-08-28 12:33:09 +02:00
AutoInit: form.AutoInit,
})
2014-03-17 16:56:50 +01:00
if err == nil {
log.Trace("Repository created [%d]: %s/%s", repo.ID, ctxUser.Name, repo.Name)
ctx.Redirect(setting.AppSubURL + "/" + ctxUser.Name + "/" + repo.Name)
2014-03-09 03:25:38 +01:00
return
2014-03-10 01:06:29 +01:00
}
2014-04-13 02:35:35 +02:00
if repo != nil {
if errDelete := models.DeleteRepository(ctx.User, ctxUser.ID, repo.ID); errDelete != nil {
Better logging (#6038) (#6095) * Panic don't fatal on create new logger Fixes #5854 Signed-off-by: Andrew Thornton <art27@cantab.net> * partial broken * Update the logging infrastrcture Signed-off-by: Andrew Thornton <art27@cantab.net> * Reset the skip levels for Fatal and Error Signed-off-by: Andrew Thornton <art27@cantab.net> * broken ncsa * More log.Error fixes Signed-off-by: Andrew Thornton <art27@cantab.net> * Remove nal * set log-levels to lowercase * Make console_test test all levels * switch to lowercased levels * OK now working * Fix vetting issues * Fix lint * Fix tests * change default logging to match current gitea * Improve log testing Signed-off-by: Andrew Thornton <art27@cantab.net> * reset error skip levels to 0 * Update documentation and access logger configuration * Redirect the router log back to gitea if redirect macaron log but also allow setting the log level - i.e. TRACE * Fix broken level caching * Refactor the router log * Add Router logger * Add colorizing options * Adjust router colors * Only create logger if they will be used * update app.ini.sample * rename Attribute ColorAttribute * Change from white to green for function * Set fatal/error levels * Restore initial trace logger * Fix Trace arguments in modules/auth/auth.go * Properly handle XORMLogger * Improve admin/config page * fix fmt * Add auto-compression of old logs * Update error log levels * Remove the unnecessary skip argument from Error, Fatal and Critical * Add stacktrace support * Fix tests * Remove x/sync from vendors? * Add stderr option to console logger * Use filepath.ToSlash to protect against Windows in tests * Remove prefixed underscores from names in colors.go * Remove not implemented database logger This was removed from Gogs on 4 Mar 2016 but left in the configuration since then. * Ensure that log paths are relative to ROOT_PATH * use path.Join * rename jsonConfig to logConfig * Rename "config" to "jsonConfig" to make it clearer * Requested changes * Requested changes: XormLogger * Try to color the windows terminal If successful default to colorizing the console logs * fixup * Colorize initially too * update vendor * Colorize logs on default and remove if this is not a colorizing logger * Fix documentation * fix test * Use go-isatty to detect if on windows we are on msys or cygwin * Fix spelling mistake * Add missing vendors * More changes * Rationalise the ANSI writer protection * Adjust colors on advice from @0x5c * Make Flags a comma separated list * Move to use the windows constant for ENABLE_VIRTUAL_TERMINAL_PROCESSING * Ensure matching is done on the non-colored message - to simpify EXPRESSION
2019-04-02 09:48:31 +02:00
log.Error("DeleteRepository: %v", errDelete)
2014-04-13 02:35:35 +02:00
}
}
2016-11-24 08:04:31 +01:00
handleCreateError(ctx, ctxUser, err, "CreatePost", tplCreate, &form)
2014-04-11 00:09:57 +02:00
}
2014-04-09 15:28:00 +02:00
2016-11-24 08:04:31 +01:00
// Migrate render migration of repository page
2016-03-11 17:56:52 +01:00
func Migrate(ctx *context.Context) {
2014-08-01 06:06:19 +02:00
ctx.Data["Title"] = ctx.Tr("new_migrate")
ctx.Data["private"] = getRepoPrivate(ctx)
2015-10-25 09:26:26 +01:00
ctx.Data["IsForcedPrivate"] = setting.Repository.ForcePrivate
ctx.Data["mirror"] = ctx.Query("mirror") == "1"
ctx.Data["LFSActive"] = setting.LFS.StartServer
2014-08-01 06:06:19 +02:00
2015-07-19 11:11:16 +02:00
ctxUser := checkContextUser(ctx, ctx.QueryInt64("org"))
if ctx.Written() {
2014-11-06 05:30:04 +01:00
return
2014-08-01 06:06:19 +02:00
}
ctx.Data["ContextUser"] = ctxUser
2014-07-26 06:24:27 +02:00
2016-11-24 08:04:31 +01:00
ctx.HTML(200, tplMigrate)
}
2014-07-26 06:24:27 +02:00
2016-11-24 08:04:31 +01:00
// MigratePost response for migrating from external git repository
2016-03-11 17:56:52 +01:00
func MigratePost(ctx *context.Context, form auth.MigrateRepoForm) {
2014-08-01 06:06:19 +02:00
ctx.Data["Title"] = ctx.Tr("new_migrate")
2016-11-27 07:03:59 +01:00
ctxUser := checkContextUser(ctx, form.UID)
2015-07-19 11:11:16 +02:00
if ctx.Written() {
return
2014-08-01 06:06:19 +02:00
}
ctx.Data["ContextUser"] = ctxUser
2014-07-26 06:24:27 +02:00
if ctx.HasError() {
2016-11-24 08:04:31 +01:00
ctx.HTML(200, tplMigrate)
return
}
2014-07-26 06:24:27 +02:00
remoteAddr, err := form.ParseRemoteAddr(ctx.User)
if err != nil {
if models.IsErrInvalidCloneAddr(err) {
ctx.Data["Err_CloneAddr"] = true
addrErr := err.(models.ErrInvalidCloneAddr)
switch {
case addrErr.IsURLError:
2016-11-24 08:04:31 +01:00
ctx.RenderWithErr(ctx.Tr("form.url_error"), tplMigrate, &form)
case addrErr.IsPermissionDenied:
2016-11-24 08:04:31 +01:00
ctx.RenderWithErr(ctx.Tr("repo.migrate.permission_denied"), tplMigrate, &form)
case addrErr.IsInvalidPath:
2016-11-24 08:04:31 +01:00
ctx.RenderWithErr(ctx.Tr("repo.migrate.invalid_local_path"), tplMigrate, &form)
default:
ctx.ServerError("Unknown error", err)
}
} else {
ctx.ServerError("ParseRemoteAddr", err)
}
return
}
repo, err := models.MigrateRepository(ctx.User, ctxUser, models.MigrateRepoOptions{
2015-10-25 09:26:26 +01:00
Name: form.RepoName,
Description: form.Description,
IsPrivate: form.Private || setting.Repository.ForcePrivate,
IsMirror: form.Mirror,
RemoteAddr: remoteAddr,
})
if err == nil {
2015-12-09 02:06:12 +01:00
log.Trace("Repository migrated [%d]: %s/%s", repo.ID, ctxUser.Name, form.RepoName)
ctx.Redirect(setting.AppSubURL + "/" + ctxUser.Name + "/" + form.RepoName)
return
}
2014-07-26 06:24:27 +02:00
if models.IsErrRepoAlreadyExist(err) {
ctx.RenderWithErr(ctx.Tr("form.repo_name_been_taken"), tplMigrate, &form)
return
}
// remoteAddr may contain credentials, so we sanitize it
err = util.URLSanitizedError(err, remoteAddr)
if repo != nil {
if errDelete := models.DeleteRepository(ctx.User, ctxUser.ID, repo.ID); errDelete != nil {
Better logging (#6038) (#6095) * Panic don't fatal on create new logger Fixes #5854 Signed-off-by: Andrew Thornton <art27@cantab.net> * partial broken * Update the logging infrastrcture Signed-off-by: Andrew Thornton <art27@cantab.net> * Reset the skip levels for Fatal and Error Signed-off-by: Andrew Thornton <art27@cantab.net> * broken ncsa * More log.Error fixes Signed-off-by: Andrew Thornton <art27@cantab.net> * Remove nal * set log-levels to lowercase * Make console_test test all levels * switch to lowercased levels * OK now working * Fix vetting issues * Fix lint * Fix tests * change default logging to match current gitea * Improve log testing Signed-off-by: Andrew Thornton <art27@cantab.net> * reset error skip levels to 0 * Update documentation and access logger configuration * Redirect the router log back to gitea if redirect macaron log but also allow setting the log level - i.e. TRACE * Fix broken level caching * Refactor the router log * Add Router logger * Add colorizing options * Adjust router colors * Only create logger if they will be used * update app.ini.sample * rename Attribute ColorAttribute * Change from white to green for function * Set fatal/error levels * Restore initial trace logger * Fix Trace arguments in modules/auth/auth.go * Properly handle XORMLogger * Improve admin/config page * fix fmt * Add auto-compression of old logs * Update error log levels * Remove the unnecessary skip argument from Error, Fatal and Critical * Add stacktrace support * Fix tests * Remove x/sync from vendors? * Add stderr option to console logger * Use filepath.ToSlash to protect against Windows in tests * Remove prefixed underscores from names in colors.go * Remove not implemented database logger This was removed from Gogs on 4 Mar 2016 but left in the configuration since then. * Ensure that log paths are relative to ROOT_PATH * use path.Join * rename jsonConfig to logConfig * Rename "config" to "jsonConfig" to make it clearer * Requested changes * Requested changes: XormLogger * Try to color the windows terminal If successful default to colorizing the console logs * fixup * Colorize initially too * update vendor * Colorize logs on default and remove if this is not a colorizing logger * Fix documentation * fix test * Use go-isatty to detect if on windows we are on msys or cygwin * Fix spelling mistake * Add missing vendors * More changes * Rationalise the ANSI writer protection * Adjust colors on advice from @0x5c * Make Flags a comma separated list * Move to use the windows constant for ENABLE_VIRTUAL_TERMINAL_PROCESSING * Ensure matching is done on the non-colored message - to simpify EXPRESSION
2019-04-02 09:48:31 +02:00
log.Error("DeleteRepository: %v", errDelete)
}
}
2014-07-26 06:24:27 +02:00
2015-11-19 19:45:07 +01:00
if strings.Contains(err.Error(), "Authentication failed") ||
2015-09-06 14:54:08 +02:00
strings.Contains(err.Error(), "could not read Username") {
2014-08-01 06:06:19 +02:00
ctx.Data["Err_Auth"] = true
ctx.RenderWithErr(ctx.Tr("form.auth_failed", err.Error()), tplMigrate, &form)
return
2015-11-19 19:45:07 +01:00
} else if strings.Contains(err.Error(), "fatal:") {
ctx.Data["Err_CloneAddr"] = true
ctx.RenderWithErr(ctx.Tr("repo.migrate.failed", err.Error()), tplMigrate, &form)
2015-11-19 19:45:07 +01:00
return
}
2016-11-24 08:04:31 +01:00
handleCreateError(ctx, ctxUser, err, "MigratePost", tplMigrate, &form)
}
2014-07-26 06:24:27 +02:00
2016-11-24 08:04:31 +01:00
// Action response for actions to a repository
2016-03-11 17:56:52 +01:00
func Action(ctx *context.Context) {
2014-08-11 05:11:18 +02:00
var err error
switch ctx.Params(":action") {
case "watch":
2016-07-23 19:08:22 +02:00
err = models.WatchRepo(ctx.User.ID, ctx.Repo.Repository.ID, true)
2014-08-11 05:11:18 +02:00
case "unwatch":
2016-07-23 19:08:22 +02:00
err = models.WatchRepo(ctx.User.ID, ctx.Repo.Repository.ID, false)
2014-08-11 05:11:18 +02:00
case "star":
2016-07-23 19:08:22 +02:00
err = models.StarRepo(ctx.User.ID, ctx.Repo.Repository.ID, true)
2014-08-11 05:11:18 +02:00
case "unstar":
2016-07-23 19:08:22 +02:00
err = models.StarRepo(ctx.User.ID, ctx.Repo.Repository.ID, false)
case "desc": // FIXME: this is not used
if !ctx.Repo.IsOwner() {
2014-08-11 05:11:18 +02:00
ctx.Error(404)
return
}
ctx.Repo.Repository.Description = ctx.Query("desc")
ctx.Repo.Repository.Website = ctx.Query("site")
err = models.UpdateRepository(ctx.Repo.Repository, false)
2014-08-11 05:11:18 +02:00
}
if err != nil {
ctx.ServerError(fmt.Sprintf("Action (%s)", ctx.Params(":action")), err)
2014-08-11 05:11:18 +02:00
return
}
2015-07-23 22:50:05 +02:00
ctx.RedirectToFirst(ctx.Query("redirect_to"), ctx.Repo.RepoLink)
2014-08-11 05:11:18 +02:00
}
2014-07-26 06:24:27 +02:00
// RedirectDownload return a file based on the following infos:
func RedirectDownload(ctx *context.Context) {
var (
vTag = ctx.Params("vTag")
fileName = ctx.Params("fileName")
)
tagNames := []string{vTag}
curRepo := ctx.Repo.Repository
releases, err := models.GetReleasesByRepoIDAndNames(curRepo.ID, tagNames)
if err != nil {
if models.IsErrAttachmentNotExist(err) {
ctx.Error(404)
return
}
ctx.ServerError("RedirectDownload", err)
return
}
if len(releases) == 1 {
release := releases[0]
att, err := models.GetAttachmentByReleaseIDFileName(release.ID, fileName)
if err != nil {
ctx.Error(404)
return
}
if att != nil {
ctx.Redirect(setting.AppSubURL + "/attachments/" + att.UUID)
return
}
}
ctx.Error(404)
}
2016-11-24 08:04:31 +01:00
// Download download an archive of a repository
2016-03-11 17:56:52 +01:00
func Download(ctx *context.Context) {
2014-09-24 23:43:33 +02:00
var (
uri = ctx.Params("*")
refName string
ext string
archivePath string
2014-11-02 06:18:37 +01:00
archiveType git.ArchiveType
2014-09-24 23:43:33 +02:00
)
switch {
case strings.HasSuffix(uri, ".zip"):
ext = ".zip"
2014-07-26 06:24:27 +02:00
archivePath = path.Join(ctx.Repo.GitRepo.Path, "archives/zip")
2014-11-02 06:18:37 +01:00
archiveType = git.ZIP
2014-09-24 23:43:33 +02:00
case strings.HasSuffix(uri, ".tar.gz"):
ext = ".tar.gz"
2014-07-26 06:24:27 +02:00
archivePath = path.Join(ctx.Repo.GitRepo.Path, "archives/targz")
2014-11-02 06:18:37 +01:00
archiveType = git.TARGZ
2014-07-26 06:24:27 +02:00
default:
log.Trace("Unknown format: %s", uri)
2014-07-26 06:24:27 +02:00
ctx.Error(404)
2014-06-25 11:35:23 +02:00
return
}
2014-09-24 23:43:33 +02:00
refName = strings.TrimSuffix(uri, ext)
2014-06-25 11:35:23 +02:00
2014-07-26 06:24:27 +02:00
if !com.IsDir(archivePath) {
if err := os.MkdirAll(archivePath, os.ModePerm); err != nil {
ctx.ServerError("Download -> os.MkdirAll(archivePath)", err)
2014-06-25 11:35:23 +02:00
return
}
}
2014-09-24 23:43:33 +02:00
// Get corresponding commit.
var (
commit *git.Commit
err error
)
gitRepo := ctx.Repo.GitRepo
if gitRepo.IsBranchExist(refName) {
commit, err = gitRepo.GetBranchCommit(refName)
2014-09-24 23:43:33 +02:00
if err != nil {
ctx.ServerError("GetBranchCommit", err)
2014-09-24 23:43:33 +02:00
return
}
} else if gitRepo.IsTagExist(refName) {
commit, err = gitRepo.GetTagCommit(refName)
2014-09-24 23:43:33 +02:00
if err != nil {
ctx.ServerError("GetTagCommit", err)
2014-09-24 23:43:33 +02:00
return
}
2016-11-23 22:06:56 +01:00
} else if len(refName) >= 4 && len(refName) <= 40 {
2014-09-24 23:43:33 +02:00
commit, err = gitRepo.GetCommit(refName)
if err != nil {
ctx.NotFound("GetCommit", nil)
2014-09-24 23:43:33 +02:00
return
}
} else {
ctx.NotFound("Download", nil)
2014-09-24 23:43:33 +02:00
return
}
2015-11-04 04:49:06 +01:00
archivePath = path.Join(archivePath, base.ShortSha(commit.ID.String())+ext)
2014-07-26 06:24:27 +02:00
if !com.IsFile(archivePath) {
2014-11-02 06:18:37 +01:00
if err := commit.CreateArchive(archivePath, archiveType); err != nil {
ctx.ServerError("Download -> CreateArchive "+archivePath, err)
2014-03-22 18:50:50 +01:00
return
}
}
ctx.ServeFile(archivePath, ctx.Repo.Repository.Name+"-"+refName+ext)
2014-03-22 18:50:50 +01:00
}