2017-04-25 03:24:51 -04:00
|
|
|
// Copyright 2017 The Gitea Authors. All rights reserved.
|
2022-11-27 13:20:29 -05:00
|
|
|
// SPDX-License-Identifier: MIT
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2021-06-08 19:33:54 -04:00
|
|
|
package web
|
2017-04-25 03:24:51 -04:00
|
|
|
|
|
|
|
import (
|
2022-02-05 13:26:12 -05:00
|
|
|
gocontext "context"
|
2021-01-26 10:36:53 -05:00
|
|
|
"net/http"
|
|
|
|
"os"
|
|
|
|
"path"
|
2023-04-07 06:08:36 -04:00
|
|
|
"strings"
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2022-03-30 04:42:47 -04:00
|
|
|
"code.gitea.io/gitea/models/perm"
|
2021-11-09 14:57:58 -05:00
|
|
|
"code.gitea.io/gitea/models/unit"
|
2022-07-25 11:39:42 -04:00
|
|
|
"code.gitea.io/gitea/modules/cache"
|
2017-04-25 03:24:51 -04:00
|
|
|
"code.gitea.io/gitea/modules/context"
|
2021-07-28 05:42:56 -04:00
|
|
|
"code.gitea.io/gitea/modules/git"
|
2021-01-26 10:36:53 -05:00
|
|
|
"code.gitea.io/gitea/modules/httpcache"
|
2017-04-25 03:24:51 -04:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
2021-01-26 10:36:53 -05:00
|
|
|
"code.gitea.io/gitea/modules/metrics"
|
|
|
|
"code.gitea.io/gitea/modules/public"
|
2017-04-25 03:24:51 -04:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
2021-01-26 10:36:53 -05:00
|
|
|
"code.gitea.io/gitea/modules/storage"
|
2022-04-07 14:59:56 -04:00
|
|
|
"code.gitea.io/gitea/modules/structs"
|
2022-08-28 05:43:25 -04:00
|
|
|
"code.gitea.io/gitea/modules/templates"
|
2017-04-25 03:24:51 -04:00
|
|
|
"code.gitea.io/gitea/modules/validation"
|
2021-01-26 10:36:53 -05:00
|
|
|
"code.gitea.io/gitea/modules/web"
|
2022-01-20 06:41:25 -05:00
|
|
|
"code.gitea.io/gitea/modules/web/routing"
|
2021-06-08 19:33:54 -04:00
|
|
|
"code.gitea.io/gitea/routers/web/admin"
|
2022-01-02 08:12:35 -05:00
|
|
|
"code.gitea.io/gitea/routers/web/auth"
|
2023-04-03 06:06:57 -04:00
|
|
|
"code.gitea.io/gitea/routers/web/devtest"
|
2021-06-08 19:33:54 -04:00
|
|
|
"code.gitea.io/gitea/routers/web/events"
|
|
|
|
"code.gitea.io/gitea/routers/web/explore"
|
2022-03-26 05:04:22 -04:00
|
|
|
"code.gitea.io/gitea/routers/web/feed"
|
2022-05-04 07:56:20 -04:00
|
|
|
"code.gitea.io/gitea/routers/web/healthcheck"
|
2022-04-08 00:22:10 -04:00
|
|
|
"code.gitea.io/gitea/routers/web/misc"
|
2021-06-08 19:33:54 -04:00
|
|
|
"code.gitea.io/gitea/routers/web/org"
|
|
|
|
"code.gitea.io/gitea/routers/web/repo"
|
Implement actions (#21937)
Close #13539.
Co-authored by: @lunny @appleboy @fuxiaohei and others.
Related projects:
- https://gitea.com/gitea/actions-proto-def
- https://gitea.com/gitea/actions-proto-go
- https://gitea.com/gitea/act
- https://gitea.com/gitea/act_runner
### Summary
The target of this PR is to bring a basic implementation of "Actions",
an internal CI/CD system of Gitea. That means even though it has been
merged, the state of the feature is **EXPERIMENTAL**, and please note
that:
- It is disabled by default;
- It shouldn't be used in a production environment currently;
- It shouldn't be used in a public Gitea instance currently;
- Breaking changes may be made before it's stable.
**Please comment on #13539 if you have any different product design
ideas**, all decisions reached there will be adopted here. But in this
PR, we don't talk about **naming, feature-creep or alternatives**.
### ⚠️ Breaking
`gitea-actions` will become a reserved user name. If a user with the
name already exists in the database, it is recommended to rename it.
### Some important reviews
- What is `DEFAULT_ACTIONS_URL` in `app.ini` for?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1055954954
- Why the api for runners is not under the normal `/api/v1` prefix?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061173592
- Why DBFS?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061301178
- Why ignore events triggered by `gitea-actions` bot?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1063254103
- Why there's no permission control for actions?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1090229868
### What it looks like
<details>
#### Manage runners
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205870657-c72f590e-2e08-4cd4-be7f-2e0abb299bbf.png">
#### List runs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872794-50fde990-2b45-48c1-a178-908e4ec5b627.png">
#### View logs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872501-9b7b9000-9542-4991-8f55-18ccdada77c3.png">
</details>
### How to try it
<details>
#### 1. Start Gitea
Clone this branch and [install from
source](https://docs.gitea.io/en-us/install-from-source).
Add additional configurations in `app.ini` to enable Actions:
```ini
[actions]
ENABLED = true
```
Start it.
If all is well, you'll see the management page of runners:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205877365-8e30a780-9b10-4154-b3e8-ee6c3cb35a59.png">
#### 2. Start runner
Clone the [act_runner](https://gitea.com/gitea/act_runner), and follow
the
[README](https://gitea.com/gitea/act_runner/src/branch/main/README.md)
to start it.
If all is well, you'll see a new runner has been added:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205878000-216f5937-e696-470d-b66c-8473987d91c3.png">
#### 3. Enable actions for a repo
Create a new repo or open an existing one, check the `Actions` checkbox
in settings and submit.
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879705-53e09208-73c0-4b3e-a123-2dcf9aba4b9c.png">
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879383-23f3d08f-1a85-41dd-a8b3-54e2ee6453e8.png">
If all is well, you'll see a new tab "Actions":
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205881648-a8072d8c-5803-4d76-b8a8-9b2fb49516c1.png">
#### 4. Upload workflow files
Upload some workflow files to `.gitea/workflows/xxx.yaml`, you can
follow the [quickstart](https://docs.github.com/en/actions/quickstart)
of GitHub Actions. Yes, Gitea Actions is compatible with GitHub Actions
in most cases, you can use the same demo:
```yaml
name: GitHub Actions Demo
run-name: ${{ github.actor }} is testing out GitHub Actions 🚀
on: [push]
jobs:
Explore-GitHub-Actions:
runs-on: ubuntu-latest
steps:
- run: echo "🎉 The job was automatically triggered by a ${{ github.event_name }} event."
- run: echo "🐧 This job is now running on a ${{ runner.os }} server hosted by GitHub!"
- run: echo "🔎 The name of your branch is ${{ github.ref }} and your repository is ${{ github.repository }}."
- name: Check out repository code
uses: actions/checkout@v3
- run: echo "💡 The ${{ github.repository }} repository has been cloned to the runner."
- run: echo "🖥️ The workflow is now ready to test your code on the runner."
- name: List files in the repository
run: |
ls ${{ github.workspace }}
- run: echo "🍏 This job's status is ${{ job.status }}."
```
If all is well, you'll see a new run in `Actions` tab:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884473-79a874bc-171b-4aaf-acd5-0241a45c3b53.png">
#### 5. Check the logs of jobs
Click a run and you'll see the logs:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884800-994b0374-67f7-48ff-be9a-4c53f3141547.png">
#### 6. Go on
You can try more examples in [the
documents](https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions)
of GitHub Actions, then you might find a lot of bugs.
Come on, PRs are welcome.
</details>
See also: [Feature Preview: Gitea
Actions](https://blog.gitea.io/2022/12/feature-preview-gitea-actions/)
---------
Co-authored-by: a1012112796 <1012112796@qq.com>
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: delvh <dev.lh@web.de>
Co-authored-by: ChristopherHX <christopher.homberger@web.de>
Co-authored-by: John Olheiser <john.olheiser@gmail.com>
2023-01-30 20:45:19 -05:00
|
|
|
"code.gitea.io/gitea/routers/web/repo/actions"
|
2021-06-08 19:33:54 -04:00
|
|
|
"code.gitea.io/gitea/routers/web/user"
|
2022-01-02 08:12:35 -05:00
|
|
|
user_setting "code.gitea.io/gitea/routers/web/user/setting"
|
|
|
|
"code.gitea.io/gitea/routers/web/user/setting/security"
|
|
|
|
auth_service "code.gitea.io/gitea/services/auth"
|
2022-03-26 05:04:22 -04:00
|
|
|
context_service "code.gitea.io/gitea/services/context"
|
2021-04-06 15:44:05 -04:00
|
|
|
"code.gitea.io/gitea/services/forms"
|
2021-04-08 18:25:57 -04:00
|
|
|
"code.gitea.io/gitea/services/lfs"
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2021-11-17 07:34:35 -05:00
|
|
|
_ "code.gitea.io/gitea/modules/session" // to registers all internal adapters
|
2019-07-16 21:04:37 -04:00
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
"gitea.com/go-chi/captcha"
|
2022-04-08 00:22:10 -04:00
|
|
|
"gitea.com/go-chi/session"
|
2021-01-26 10:36:53 -05:00
|
|
|
"github.com/NYTimes/gziphandler"
|
2021-12-02 15:58:08 -05:00
|
|
|
"github.com/go-chi/chi/v5/middleware"
|
2021-03-03 20:25:30 -05:00
|
|
|
"github.com/go-chi/cors"
|
2021-01-26 10:36:53 -05:00
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
2017-04-25 03:24:51 -04:00
|
|
|
)
|
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
const (
|
|
|
|
// GzipMinSize represents min size to compress for the body size of response
|
|
|
|
GzipMinSize = 1400
|
|
|
|
)
|
2020-11-13 07:51:07 -05:00
|
|
|
|
2021-06-08 19:33:54 -04:00
|
|
|
// CorsHandler return a http handler who set CORS options if enabled by config
|
|
|
|
func CorsHandler() func(next http.Handler) http.Handler {
|
2021-05-30 06:25:11 -04:00
|
|
|
if setting.CORSConfig.Enabled {
|
2021-06-08 19:33:54 -04:00
|
|
|
return cors.Handler(cors.Options{
|
2022-01-20 12:46:10 -05:00
|
|
|
// Scheme: setting.CORSConfig.Scheme, // FIXME: the cors middleware needs scheme option
|
2021-05-30 06:25:11 -04:00
|
|
|
AllowedOrigins: setting.CORSConfig.AllowDomain,
|
2022-01-20 12:46:10 -05:00
|
|
|
// setting.CORSConfig.AllowSubdomain // FIXME: the cors middleware needs allowSubdomain option
|
2021-05-30 06:25:11 -04:00
|
|
|
AllowedMethods: setting.CORSConfig.Methods,
|
|
|
|
AllowCredentials: setting.CORSConfig.AllowCredentials,
|
2022-11-11 01:39:27 -05:00
|
|
|
AllowedHeaders: setting.CORSConfig.Headers,
|
2021-05-30 06:25:11 -04:00
|
|
|
MaxAge: int(setting.CORSConfig.MaxAge.Seconds()),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2021-06-08 19:33:54 -04:00
|
|
|
return func(next http.Handler) http.Handler {
|
|
|
|
return next
|
|
|
|
}
|
2021-01-26 10:36:53 -05:00
|
|
|
}
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2022-03-28 00:46:28 -04:00
|
|
|
// The OAuth2 plugin is expected to be executed first, as it must ignore the user id stored
|
|
|
|
// in the session (if there is a user id stored in session other plugins might return the user
|
|
|
|
// object for that id).
|
|
|
|
//
|
|
|
|
// The Session plugin is expected to be executed second, in order to skip authentication
|
|
|
|
// for users that have already signed in.
|
|
|
|
func buildAuthGroup() *auth_service.Group {
|
|
|
|
group := auth_service.NewGroup(
|
Fix various typos (#20338)
* Fix various typos
Found via `codespell -q 3 -S ./options/locale,./options/license,./public/vendor -L actived,allways,attachements,ba,befores,commiter,pullrequest,pullrequests,readby,splitted,te,unknwon`
Co-authored-by: zeripath <art27@cantab.net>
2022-07-12 17:32:37 -04:00
|
|
|
&auth_service.OAuth2{}, // FIXME: this should be removed and only applied in download and oauth related routers
|
2022-03-28 00:46:28 -04:00
|
|
|
&auth_service.Basic{}, // FIXME: this should be removed and only applied in download and git/lfs routers
|
2022-04-08 00:22:10 -04:00
|
|
|
&auth_service.Session{},
|
2022-03-28 00:46:28 -04:00
|
|
|
)
|
|
|
|
if setting.Service.EnableReverseProxyAuth {
|
|
|
|
group.Add(&auth_service.ReverseProxy{})
|
|
|
|
}
|
|
|
|
specialAdd(group)
|
|
|
|
|
|
|
|
return group
|
|
|
|
}
|
|
|
|
|
2021-06-08 19:33:54 -04:00
|
|
|
// Routes returns all web routes
|
2022-08-28 05:43:25 -04:00
|
|
|
func Routes(ctx gocontext.Context) *web.Route {
|
2021-05-04 17:48:31 -04:00
|
|
|
routes := web.NewRoute()
|
2017-04-25 03:24:51 -04:00
|
|
|
|
Refactor web route (#24080)
The old code is unnecessarily complex, and has many misuses.
Old code "wraps" a lot, wrap wrap wrap, it's difficult to understand
which kind of handler is used.
The new code uses a general approach, we do not need to write all kinds
of handlers into the "wrapper", do not need to wrap them again and
again.
New code, there are only 2 concepts:
1. HandlerProvider: `func (h any) (handlerProvider func (next)
http.Handler)`, it can be used as middleware
2. Use HandlerProvider to get the final HandlerFunc, and use it for
`r.Get()`
And we can decouple the route package from context package (see the
TODO).
# FAQ
## Is `reflect` safe?
Yes, all handlers are checked during startup, see the `preCheckHandler`
comment. If any handler is wrong, developers could know it in the first
time.
## Does `reflect` affect performance?
No. https://github.com/go-gitea/gitea/pull/24080#discussion_r1164825901
1. This reflect code only runs for each web handler call, handler is far
more slower: 10ms-50ms
2. The reflect is pretty fast (comparing to other code): 0.000265ms
3. XORM has more reflect operations already
2023-04-20 14:49:06 -04:00
|
|
|
routes.Use(web.MiddlewareWithPrefix("/assets/", CorsHandler(), public.AssetsHandlerFunc("/assets/")))
|
2021-05-30 06:25:11 -04:00
|
|
|
|
2022-04-08 00:22:10 -04:00
|
|
|
sessioner := session.Sessioner(session.Options{
|
|
|
|
Provider: setting.SessionConfig.Provider,
|
|
|
|
ProviderConfig: setting.SessionConfig.ProviderConfig,
|
|
|
|
CookieName: setting.SessionConfig.CookieName,
|
|
|
|
CookiePath: setting.SessionConfig.CookiePath,
|
|
|
|
Gclifetime: setting.SessionConfig.Gclifetime,
|
|
|
|
Maxlifetime: setting.SessionConfig.Maxlifetime,
|
|
|
|
Secure: setting.SessionConfig.Secure,
|
|
|
|
SameSite: setting.SessionConfig.SameSite,
|
|
|
|
Domain: setting.SessionConfig.Domain,
|
|
|
|
})
|
2021-09-12 13:35:38 -04:00
|
|
|
routes.Use(sessioner)
|
2021-01-26 10:36:53 -05:00
|
|
|
|
2022-08-28 05:43:25 -04:00
|
|
|
ctx, _ = templates.HTMLRenderer(ctx)
|
|
|
|
|
|
|
|
routes.Use(Recovery(ctx))
|
2021-01-26 13:04:20 -05:00
|
|
|
|
2021-05-04 17:48:31 -04:00
|
|
|
// We use r.Route here over r.Use because this prevents requests that are not for avatars having to go through this additional handler
|
Refactor web route (#24080)
The old code is unnecessarily complex, and has many misuses.
Old code "wraps" a lot, wrap wrap wrap, it's difficult to understand
which kind of handler is used.
The new code uses a general approach, we do not need to write all kinds
of handlers into the "wrapper", do not need to wrap them again and
again.
New code, there are only 2 concepts:
1. HandlerProvider: `func (h any) (handlerProvider func (next)
http.Handler)`, it can be used as middleware
2. Use HandlerProvider to get the final HandlerFunc, and use it for
`r.Get()`
And we can decouple the route package from context package (see the
TODO).
# FAQ
## Is `reflect` safe?
Yes, all handlers are checked during startup, see the `preCheckHandler`
comment. If any handler is wrong, developers could know it in the first
time.
## Does `reflect` affect performance?
No. https://github.com/go-gitea/gitea/pull/24080#discussion_r1164825901
1. This reflect code only runs for each web handler call, handler is far
more slower: 10ms-50ms
2. The reflect is pretty fast (comparing to other code): 0.000265ms
3. XORM has more reflect operations already
2023-04-20 14:49:06 -04:00
|
|
|
routes.RouteMethods("/avatars/*", "GET, HEAD", storageHandler(setting.Avatar.Storage, "avatars", storage.Avatars))
|
|
|
|
routes.RouteMethods("/repo-avatars/*", "GET, HEAD", storageHandler(setting.RepoAvatar.Storage, "repo-avatars", storage.RepoAvatars))
|
2021-05-04 17:48:31 -04:00
|
|
|
|
2022-06-11 14:54:08 -04:00
|
|
|
// for health check - doesn't need to be passed through gzip handler
|
2021-05-04 17:48:31 -04:00
|
|
|
routes.Head("/", func(w http.ResponseWriter, req *http.Request) {
|
|
|
|
w.WriteHeader(http.StatusOK)
|
|
|
|
})
|
|
|
|
|
|
|
|
// this png is very likely to always be below the limit for gzip so it doesn't need to pass through gzip
|
|
|
|
routes.Get("/apple-touch-icon.png", func(w http.ResponseWriter, req *http.Request) {
|
2022-03-23 00:54:07 -04:00
|
|
|
http.Redirect(w, req, path.Join(setting.StaticURLPrefix, "/assets/img/apple-touch-icon.png"), http.StatusPermanentRedirect)
|
2021-05-04 17:48:31 -04:00
|
|
|
})
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2022-03-19 15:53:31 -04:00
|
|
|
// redirect default favicon to the path of the custom favicon with a default as a fallback
|
|
|
|
routes.Get("/favicon.ico", func(w http.ResponseWriter, req *http.Request) {
|
2022-06-20 06:02:49 -04:00
|
|
|
http.Redirect(w, req, path.Join(setting.StaticURLPrefix, "/assets/img/favicon.png"), http.StatusMovedPermanently)
|
2022-03-19 15:53:31 -04:00
|
|
|
})
|
|
|
|
|
2021-05-04 17:48:31 -04:00
|
|
|
common := []interface{}{}
|
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
if setting.EnableGzip {
|
|
|
|
h, err := gziphandler.GzipHandlerWithOpts(gziphandler.MinSize(GzipMinSize))
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal("GzipHandlerWithOpts failed: %v", err)
|
|
|
|
}
|
2021-05-04 17:48:31 -04:00
|
|
|
common = append(common, h)
|
2021-01-26 10:36:53 -05:00
|
|
|
}
|
|
|
|
|
2021-01-27 09:56:54 -05:00
|
|
|
if setting.Service.EnableCaptcha {
|
2021-05-04 17:48:31 -04:00
|
|
|
// The captcha http.Handler should only fire on /captcha/* so we can just mount this on that url
|
Refactor web route (#24080)
The old code is unnecessarily complex, and has many misuses.
Old code "wraps" a lot, wrap wrap wrap, it's difficult to understand
which kind of handler is used.
The new code uses a general approach, we do not need to write all kinds
of handlers into the "wrapper", do not need to wrap them again and
again.
New code, there are only 2 concepts:
1. HandlerProvider: `func (h any) (handlerProvider func (next)
http.Handler)`, it can be used as middleware
2. Use HandlerProvider to get the final HandlerFunc, and use it for
`r.Get()`
And we can decouple the route package from context package (see the
TODO).
# FAQ
## Is `reflect` safe?
Yes, all handlers are checked during startup, see the `preCheckHandler`
comment. If any handler is wrong, developers could know it in the first
time.
## Does `reflect` affect performance?
No. https://github.com/go-gitea/gitea/pull/24080#discussion_r1164825901
1. This reflect code only runs for each web handler call, handler is far
more slower: 10ms-50ms
2. The reflect is pretty fast (comparing to other code): 0.000265ms
3. XORM has more reflect operations already
2023-04-20 14:49:06 -04:00
|
|
|
routes.RouteMethods("/captcha/*", "GET,HEAD", append(common, captcha.Captchaer(context.GetImageCaptcha()))...)
|
2021-01-27 12:46:35 -05:00
|
|
|
}
|
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
if setting.HasRobotsTxt {
|
2021-05-04 17:48:31 -04:00
|
|
|
routes.Get("/robots.txt", append(common, func(w http.ResponseWriter, req *http.Request) {
|
2021-01-26 10:36:53 -05:00
|
|
|
filePath := path.Join(setting.CustomPath, "robots.txt")
|
|
|
|
fi, err := os.Stat(filePath)
|
|
|
|
if err == nil && httpcache.HandleTimeCache(req, w, fi) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
http.ServeFile(w, req, filePath)
|
2021-05-04 17:48:31 -04:00
|
|
|
})...)
|
2021-01-26 10:36:53 -05:00
|
|
|
}
|
|
|
|
|
2021-05-04 17:48:31 -04:00
|
|
|
// prometheus metrics endpoint - do not need to go through contexter
|
2021-01-26 10:36:53 -05:00
|
|
|
if setting.Metrics.Enabled {
|
|
|
|
c := metrics.NewCollector()
|
|
|
|
prometheus.MustRegister(c)
|
|
|
|
|
2021-06-08 19:33:54 -04:00
|
|
|
routes.Get("/metrics", append(common, Metrics)...)
|
2021-01-26 10:36:53 -05:00
|
|
|
}
|
|
|
|
|
2021-07-28 05:42:56 -04:00
|
|
|
routes.Get("/ssh_info", func(rw http.ResponseWriter, req *http.Request) {
|
|
|
|
if !git.SupportProcReceive {
|
2022-03-23 00:54:07 -04:00
|
|
|
rw.WriteHeader(http.StatusNotFound)
|
2021-07-28 05:42:56 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
rw.Header().Set("content-type", "text/json;charset=UTF-8")
|
|
|
|
_, err := rw.Write([]byte(`{"type":"gitea","version":1}`))
|
|
|
|
if err != nil {
|
|
|
|
log.Error("fail to write result: err: %v", err)
|
2022-03-23 00:54:07 -04:00
|
|
|
rw.WriteHeader(http.StatusInternalServerError)
|
2021-07-28 05:42:56 -04:00
|
|
|
return
|
|
|
|
}
|
2022-03-23 00:54:07 -04:00
|
|
|
rw.WriteHeader(http.StatusOK)
|
2021-07-28 05:42:56 -04:00
|
|
|
})
|
|
|
|
|
2022-05-04 07:56:20 -04:00
|
|
|
routes.Get("/api/healthz", healthcheck.Check)
|
|
|
|
|
2021-07-08 07:38:13 -04:00
|
|
|
// Removed: toolbox.Toolboxer middleware will provide debug information which seems unnecessary
|
2022-08-28 05:43:25 -04:00
|
|
|
common = append(common, context.Contexter(ctx))
|
2021-05-04 17:48:31 -04:00
|
|
|
|
2022-03-28 00:46:28 -04:00
|
|
|
group := buildAuthGroup()
|
2022-08-28 05:43:25 -04:00
|
|
|
if err := group.Init(ctx); err != nil {
|
2022-03-28 00:46:28 -04:00
|
|
|
log.Error("Could not initialize '%s' auth method, error: %s", group.Name(), err)
|
|
|
|
}
|
|
|
|
|
2021-06-09 13:53:16 -04:00
|
|
|
// Get user from session if logged in.
|
2023-02-08 01:44:42 -05:00
|
|
|
common = append(common, auth_service.Auth(group))
|
2021-06-09 13:53:16 -04:00
|
|
|
|
2021-05-04 17:48:31 -04:00
|
|
|
// GetHead allows a HEAD request redirect to GET if HEAD method is not defined for that route
|
|
|
|
common = append(common, middleware.GetHead)
|
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
if setting.API.EnableSwagger {
|
|
|
|
// Note: The route moved from apiroutes because it's in fact want to render a web page
|
2021-05-04 17:48:31 -04:00
|
|
|
routes.Get("/api/swagger", append(common, misc.Swagger)...) // Render V1 by default
|
2021-01-26 10:36:53 -05:00
|
|
|
}
|
|
|
|
|
2021-05-04 17:48:31 -04:00
|
|
|
// TODO: These really seem like things that could be folded into Contexter or as helper functions
|
|
|
|
common = append(common, user.GetNotificationCount)
|
|
|
|
common = append(common, repo.GetActiveStopwatch)
|
2021-05-09 17:50:06 -04:00
|
|
|
common = append(common, goGet)
|
2021-01-26 10:36:53 -05:00
|
|
|
|
2021-05-04 17:48:31 -04:00
|
|
|
others := web.NewRoute()
|
|
|
|
for _, middle := range common {
|
|
|
|
others.Use(middle)
|
|
|
|
}
|
|
|
|
|
|
|
|
RegisterRoutes(others)
|
|
|
|
routes.Mount("", others)
|
|
|
|
return routes
|
2020-10-19 17:03:08 -04:00
|
|
|
}
|
|
|
|
|
2021-01-29 10:35:30 -05:00
|
|
|
// RegisterRoutes register routes
|
2021-01-26 10:36:53 -05:00
|
|
|
func RegisterRoutes(m *web.Route) {
|
2017-04-25 03:24:51 -04:00
|
|
|
reqSignIn := context.Toggle(&context.ToggleOptions{SignInRequired: true})
|
|
|
|
ignSignIn := context.Toggle(&context.ToggleOptions{SignInRequired: setting.Service.RequireSignInView})
|
2021-03-11 08:40:54 -05:00
|
|
|
ignExploreSignIn := context.Toggle(&context.ToggleOptions{SignInRequired: setting.Service.RequireSignInView || setting.Service.Explore.RequireSigninView})
|
2017-04-25 03:24:51 -04:00
|
|
|
ignSignInAndCsrf := context.Toggle(&context.ToggleOptions{DisableCSRF: true})
|
|
|
|
reqSignOut := context.Toggle(&context.ToggleOptions{SignOutRequired: true})
|
|
|
|
validation.AddBindingRules()
|
|
|
|
|
2022-02-09 15:33:36 -05:00
|
|
|
linkAccountEnabled := func(ctx *context.Context) {
|
|
|
|
if !setting.Service.EnableOpenIDSignIn && !setting.Service.EnableOpenIDSignUp && !setting.OAuth2.Enable {
|
|
|
|
ctx.Error(http.StatusForbidden)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-08-19 11:34:49 -04:00
|
|
|
openIDSignInEnabled := func(ctx *context.Context) {
|
|
|
|
if !setting.Service.EnableOpenIDSignIn {
|
2021-04-05 11:30:52 -04:00
|
|
|
ctx.Error(http.StatusForbidden)
|
2017-08-19 11:34:49 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
openIDSignUpEnabled := func(ctx *context.Context) {
|
|
|
|
if !setting.Service.EnableOpenIDSignUp {
|
2021-04-05 11:30:52 -04:00
|
|
|
ctx.Error(http.StatusForbidden)
|
2017-08-19 11:34:49 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-15 09:20:08 -05:00
|
|
|
reqMilestonesDashboardPageEnabled := func(ctx *context.Context) {
|
|
|
|
if !setting.Service.ShowMilestonesDashboardPage {
|
2021-04-05 11:30:52 -04:00
|
|
|
ctx.Error(http.StatusForbidden)
|
2019-12-15 09:20:08 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-11 12:34:34 -05:00
|
|
|
// webhooksEnabled requires webhooks to be enabled by admin.
|
|
|
|
webhooksEnabled := func(ctx *context.Context) {
|
|
|
|
if setting.DisableWebhooks {
|
2021-04-05 11:30:52 -04:00
|
|
|
ctx.Error(http.StatusForbidden)
|
2021-02-11 12:34:34 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-05 19:59:27 -04:00
|
|
|
lfsServerEnabled := func(ctx *context.Context) {
|
|
|
|
if !setting.LFS.StartServer {
|
|
|
|
ctx.Error(http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-09 14:20:21 -04:00
|
|
|
federationEnabled := func(ctx *context.Context) {
|
|
|
|
if !setting.Federation.Enabled {
|
|
|
|
ctx.Error(http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-31 12:57:02 -04:00
|
|
|
dlSourceEnabled := func(ctx *context.Context) {
|
|
|
|
if setting.Repository.DisableDownloadSourceArchives {
|
|
|
|
ctx.Error(http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-10-28 11:17:38 -04:00
|
|
|
sitemapEnabled := func(ctx *context.Context) {
|
|
|
|
if !setting.EnableSitemap {
|
|
|
|
ctx.Error(http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-20 09:08:38 -05:00
|
|
|
packagesEnabled := func(ctx *context.Context) {
|
|
|
|
if !setting.Packages.Enabled {
|
|
|
|
ctx.Error(http.StatusForbidden)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-21 00:14:58 -05:00
|
|
|
feedEnabled := func(ctx *context.Context) {
|
|
|
|
if !setting.EnableFeed {
|
|
|
|
ctx.Error(http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-03-10 09:28:32 -05:00
|
|
|
addWebhookAddRoutes := func() {
|
|
|
|
m.Get("/{type}/new", repo.WebhooksNew)
|
|
|
|
m.Post("/gitea/new", web.Bind(forms.NewWebhookForm{}), repo.GiteaHooksNewPost)
|
|
|
|
m.Post("/gogs/new", web.Bind(forms.NewGogshookForm{}), repo.GogsHooksNewPost)
|
|
|
|
m.Post("/slack/new", web.Bind(forms.NewSlackHookForm{}), repo.SlackHooksNewPost)
|
|
|
|
m.Post("/discord/new", web.Bind(forms.NewDiscordHookForm{}), repo.DiscordHooksNewPost)
|
|
|
|
m.Post("/dingtalk/new", web.Bind(forms.NewDingtalkHookForm{}), repo.DingtalkHooksNewPost)
|
|
|
|
m.Post("/telegram/new", web.Bind(forms.NewTelegramHookForm{}), repo.TelegramHooksNewPost)
|
|
|
|
m.Post("/matrix/new", web.Bind(forms.NewMatrixHookForm{}), repo.MatrixHooksNewPost)
|
|
|
|
m.Post("/msteams/new", web.Bind(forms.NewMSTeamsHookForm{}), repo.MSTeamsHooksNewPost)
|
|
|
|
m.Post("/feishu/new", web.Bind(forms.NewFeishuHookForm{}), repo.FeishuHooksNewPost)
|
|
|
|
m.Post("/wechatwork/new", web.Bind(forms.NewWechatWorkHookForm{}), repo.WechatworkHooksNewPost)
|
|
|
|
m.Post("/packagist/new", web.Bind(forms.NewPackagistHookForm{}), repo.PackagistHooksNewPost)
|
|
|
|
}
|
|
|
|
|
|
|
|
addWebhookEditRoutes := func() {
|
|
|
|
m.Post("/gitea/{id}", web.Bind(forms.NewWebhookForm{}), repo.GiteaHooksEditPost)
|
|
|
|
m.Post("/gogs/{id}", web.Bind(forms.NewGogshookForm{}), repo.GogsHooksEditPost)
|
|
|
|
m.Post("/slack/{id}", web.Bind(forms.NewSlackHookForm{}), repo.SlackHooksEditPost)
|
|
|
|
m.Post("/discord/{id}", web.Bind(forms.NewDiscordHookForm{}), repo.DiscordHooksEditPost)
|
|
|
|
m.Post("/dingtalk/{id}", web.Bind(forms.NewDingtalkHookForm{}), repo.DingtalkHooksEditPost)
|
|
|
|
m.Post("/telegram/{id}", web.Bind(forms.NewTelegramHookForm{}), repo.TelegramHooksEditPost)
|
|
|
|
m.Post("/matrix/{id}", web.Bind(forms.NewMatrixHookForm{}), repo.MatrixHooksEditPost)
|
|
|
|
m.Post("/msteams/{id}", web.Bind(forms.NewMSTeamsHookForm{}), repo.MSTeamsHooksEditPost)
|
|
|
|
m.Post("/feishu/{id}", web.Bind(forms.NewFeishuHookForm{}), repo.FeishuHooksEditPost)
|
|
|
|
m.Post("/wechatwork/{id}", web.Bind(forms.NewWechatWorkHookForm{}), repo.WechatworkHooksEditPost)
|
|
|
|
m.Post("/packagist/{id}", web.Bind(forms.NewPackagistHookForm{}), repo.PackagistHooksEditPost)
|
|
|
|
}
|
|
|
|
|
2021-01-30 03:55:53 -05:00
|
|
|
// FIXME: not all routes need go through same middleware.
|
2017-04-25 03:24:51 -04:00
|
|
|
// Especially some AJAX requests, we can reduce middleware number to improve performance.
|
|
|
|
// Routers.
|
|
|
|
// for health check
|
2021-06-08 19:33:54 -04:00
|
|
|
m.Get("/", Home)
|
2022-10-28 11:17:38 -04:00
|
|
|
m.Get("/sitemap.xml", sitemapEnabled, ignExploreSignIn, HomeSitemap)
|
2021-11-26 09:55:11 -05:00
|
|
|
m.Group("/.well-known", func() {
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Get("/openid-configuration", auth.OIDCWellKnown)
|
2022-05-09 14:20:21 -04:00
|
|
|
m.Group("", func() {
|
2021-11-26 09:55:11 -05:00
|
|
|
m.Get("/nodeinfo", NodeInfoLinks)
|
2022-05-09 14:20:21 -04:00
|
|
|
m.Get("/webfinger", WebfingerQuery)
|
|
|
|
}, federationEnabled)
|
2021-11-26 09:55:11 -05:00
|
|
|
m.Get("/change-password", func(w http.ResponseWriter, req *http.Request) {
|
|
|
|
http.Redirect(w, req, "/user/settings/account", http.StatusTemporaryRedirect)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("/explore", func() {
|
|
|
|
m.Get("", func(ctx *context.Context) {
|
|
|
|
ctx.Redirect(setting.AppSubURL + "/explore/repos")
|
|
|
|
})
|
2021-06-08 19:33:54 -04:00
|
|
|
m.Get("/repos", explore.Repos)
|
2022-10-28 11:17:38 -04:00
|
|
|
m.Get("/repos/sitemap-{idx}.xml", sitemapEnabled, explore.Repos)
|
2021-06-08 19:33:54 -04:00
|
|
|
m.Get("/users", explore.Users)
|
2022-10-28 11:17:38 -04:00
|
|
|
m.Get("/users/sitemap-{idx}.xml", sitemapEnabled, explore.Users)
|
2021-06-08 19:33:54 -04:00
|
|
|
m.Get("/organizations", explore.Organizations)
|
|
|
|
m.Get("/code", explore.Code)
|
2022-04-07 14:59:56 -04:00
|
|
|
m.Get("/topics/search", explore.TopicSearch)
|
2021-03-11 08:40:54 -05:00
|
|
|
}, ignExploreSignIn)
|
2022-04-07 14:59:56 -04:00
|
|
|
m.Group("/issues", func() {
|
|
|
|
m.Get("", user.Issues)
|
|
|
|
m.Get("/search", repo.SearchIssues)
|
|
|
|
}, reqSignIn)
|
|
|
|
|
2021-01-12 23:19:17 -05:00
|
|
|
m.Get("/pulls", reqSignIn, user.Pulls)
|
2019-12-15 09:20:08 -05:00
|
|
|
m.Get("/milestones", reqSignIn, reqMilestonesDashboardPageEnabled, user.Milestones)
|
2017-04-25 03:24:51 -04:00
|
|
|
|
|
|
|
// ***** START: User *****
|
|
|
|
m.Group("/user", func() {
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Get("/login", auth.SignIn)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/login", web.Bind(forms.SignInForm{}), auth.SignInPost)
|
2017-08-19 11:34:49 -04:00
|
|
|
m.Group("", func() {
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Combo("/login/openid").
|
2022-01-02 08:12:35 -05:00
|
|
|
Get(auth.SignInOpenID).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.SignInOpenIDForm{}), auth.SignInOpenIDPost)
|
2017-08-19 11:34:49 -04:00
|
|
|
}, openIDSignInEnabled)
|
|
|
|
m.Group("/openid", func() {
|
|
|
|
m.Combo("/connect").
|
2022-01-02 08:12:35 -05:00
|
|
|
Get(auth.ConnectOpenID).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.ConnectOpenIDForm{}), auth.ConnectOpenIDPost)
|
2017-08-19 11:34:49 -04:00
|
|
|
m.Group("/register", func() {
|
|
|
|
m.Combo("").
|
2022-01-02 08:12:35 -05:00
|
|
|
Get(auth.RegisterOpenID, openIDSignUpEnabled).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.SignUpOpenIDForm{}), auth.RegisterOpenIDPost)
|
2017-08-19 11:34:49 -04:00
|
|
|
}, openIDSignUpEnabled)
|
|
|
|
}, openIDSignInEnabled)
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Get("/sign_up", auth.SignUp)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/sign_up", web.Bind(forms.RegisterForm{}), auth.SignUpPost)
|
2022-02-09 15:33:36 -05:00
|
|
|
m.Get("/link_account", linkAccountEnabled, auth.LinkAccount)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/link_account_signin", linkAccountEnabled, web.Bind(forms.SignInForm{}), auth.LinkAccountPostSignIn)
|
|
|
|
m.Post("/link_account_signup", linkAccountEnabled, web.Bind(forms.RegisterForm{}), auth.LinkAccountPostRegister)
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("/two_factor", func() {
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Get("", auth.TwoFactor)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("", web.Bind(forms.TwoFactorAuthForm{}), auth.TwoFactorPost)
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Get("/scratch", auth.TwoFactorScratch)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/scratch", web.Bind(forms.TwoFactorScratchAuthForm{}), auth.TwoFactorScratchPost)
|
2017-04-25 03:24:51 -04:00
|
|
|
})
|
2022-01-14 10:03:31 -05:00
|
|
|
m.Group("/webauthn", func() {
|
|
|
|
m.Get("", auth.WebAuthn)
|
|
|
|
m.Get("/assertion", auth.WebAuthnLoginAssertion)
|
|
|
|
m.Post("/assertion", auth.WebAuthnLoginAssertionPost)
|
2018-05-19 10:12:37 -04:00
|
|
|
})
|
2017-04-25 03:24:51 -04:00
|
|
|
}, reqSignOut)
|
|
|
|
|
2022-01-20 06:41:25 -05:00
|
|
|
m.Any("/user/events", routing.MarkLongPolling, events.Events)
|
2020-05-07 17:49:00 -04:00
|
|
|
|
2019-03-08 11:42:50 -05:00
|
|
|
m.Group("/login/oauth", func() {
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Get("/authorize", web.Bind(forms.AuthorizationForm{}), auth.AuthorizeOAuth)
|
|
|
|
m.Post("/grant", web.Bind(forms.GrantApplicationForm{}), auth.GrantApplicationOAuth)
|
2019-03-08 11:42:50 -05:00
|
|
|
// TODO manage redirection
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/authorize", web.Bind(forms.AuthorizationForm{}), auth.AuthorizeOAuth)
|
2019-03-08 11:42:50 -05:00
|
|
|
}, ignSignInAndCsrf, reqSignIn)
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Get("/login/oauth/userinfo", ignSignInAndCsrf, auth.InfoOAuth)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/login/oauth/access_token", CorsHandler(), web.Bind(forms.AccessTokenForm{}), ignSignInAndCsrf, auth.AccessTokenOAuth)
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Get("/login/oauth/keys", ignSignInAndCsrf, auth.OIDCKeys)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/login/oauth/introspect", CorsHandler(), web.Bind(forms.IntrospectTokenForm{}), ignSignInAndCsrf, auth.IntrospectOAuth)
|
2019-03-08 11:42:50 -05:00
|
|
|
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("/user/settings", func() {
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Get("", user_setting.Profile)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("", web.Bind(forms.UpdateProfileForm{}), user_setting.ProfilePost)
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Get("/change_password", auth.MustChangePassword)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/change_password", web.Bind(forms.MustChangePasswordForm{}), auth.MustChangePasswordPost)
|
|
|
|
m.Post("/avatar", web.Bind(forms.AvatarForm{}), user_setting.AvatarPost)
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Post("/avatar/delete", user_setting.DeleteAvatar)
|
2018-05-15 06:07:32 -04:00
|
|
|
m.Group("/account", func() {
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Combo("").Get(user_setting.Account).Post(web.Bind(forms.ChangePasswordForm{}), user_setting.AccountPost)
|
|
|
|
m.Post("/email", web.Bind(forms.AddEmailForm{}), user_setting.EmailPost)
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Post("/email/delete", user_setting.DeleteEmail)
|
|
|
|
m.Post("/delete", user_setting.DeleteAccount)
|
2021-10-27 11:40:08 -04:00
|
|
|
})
|
|
|
|
m.Group("/appearance", func() {
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Get("", user_setting.Appearance)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/language", web.Bind(forms.UpdateLanguageForm{}), user_setting.UpdateUserLang)
|
2022-01-21 12:59:26 -05:00
|
|
|
m.Post("/hidden_comments", user_setting.UpdateUserHiddenComments)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/theme", web.Bind(forms.UpdateThemeForm{}), user_setting.UpdateUIThemePost)
|
2018-05-15 06:07:32 -04:00
|
|
|
})
|
|
|
|
m.Group("/security", func() {
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Get("", security.Security)
|
2018-05-15 06:07:32 -04:00
|
|
|
m.Group("/two_factor", func() {
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Post("/regenerate_scratch", security.RegenerateScratchTwoFactor)
|
|
|
|
m.Post("/disable", security.DisableTwoFactor)
|
|
|
|
m.Get("/enroll", security.EnrollTwoFactor)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/enroll", web.Bind(forms.TwoFactorAuthForm{}), security.EnrollTwoFactorPost)
|
2018-05-15 06:07:32 -04:00
|
|
|
})
|
2022-01-14 10:03:31 -05:00
|
|
|
m.Group("/webauthn", func() {
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/request_register", web.Bind(forms.WebauthnRegistrationForm{}), security.WebAuthnRegister)
|
2022-01-14 10:03:31 -05:00
|
|
|
m.Post("/register", security.WebauthnRegisterPost)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/delete", web.Bind(forms.WebauthnDeleteForm{}), security.WebauthnDelete)
|
2018-05-19 10:12:37 -04:00
|
|
|
})
|
2018-05-15 06:07:32 -04:00
|
|
|
m.Group("/openid", func() {
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("", web.Bind(forms.AddOpenIDForm{}), security.OpenIDPost)
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Post("/delete", security.DeleteOpenID)
|
|
|
|
m.Post("/toggle_visibility", security.ToggleOpenIDVisibility)
|
2018-05-15 06:07:32 -04:00
|
|
|
}, openIDSignInEnabled)
|
2022-02-09 15:33:36 -05:00
|
|
|
m.Post("/account_link", linkAccountEnabled, security.DeleteAccountLink)
|
2018-05-15 06:07:32 -04:00
|
|
|
})
|
2019-03-08 11:42:50 -05:00
|
|
|
m.Group("/applications/oauth2", func() {
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Get("/{id}", user_setting.OAuth2ApplicationShow)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/{id}", web.Bind(forms.EditOAuth2ApplicationForm{}), user_setting.OAuthApplicationsEdit)
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Post("/{id}/regenerate_secret", user_setting.OAuthApplicationsRegenerateSecret)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("", web.Bind(forms.EditOAuth2ApplicationForm{}), user_setting.OAuthApplicationsPost)
|
2022-10-09 08:07:41 -04:00
|
|
|
m.Post("/{id}/delete", user_setting.DeleteOAuth2Application)
|
|
|
|
m.Post("/{id}/revoke/{grantId}", user_setting.RevokeOAuth2Grant)
|
2019-03-08 11:42:50 -05:00
|
|
|
})
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Combo("/applications").Get(user_setting.Applications).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.NewAccessTokenForm{}), user_setting.ApplicationsPost)
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Post("/applications/delete", user_setting.DeleteApplication)
|
|
|
|
m.Combo("/keys").Get(user_setting.Keys).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.AddKeyForm{}), user_setting.KeysPost)
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Post("/keys/delete", user_setting.DeleteKey)
|
2022-11-20 09:08:38 -05:00
|
|
|
m.Group("/packages", func() {
|
|
|
|
m.Get("", user_setting.Packages)
|
|
|
|
m.Group("/rules", func() {
|
|
|
|
m.Group("/add", func() {
|
|
|
|
m.Get("", user_setting.PackagesRuleAdd)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("", web.Bind(forms.PackageCleanupRuleForm{}), user_setting.PackagesRuleAddPost)
|
2022-11-20 09:08:38 -05:00
|
|
|
})
|
|
|
|
m.Group("/{id}", func() {
|
|
|
|
m.Get("", user_setting.PackagesRuleEdit)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("", web.Bind(forms.PackageCleanupRuleForm{}), user_setting.PackagesRuleEditPost)
|
2022-11-20 09:08:38 -05:00
|
|
|
m.Get("/preview", user_setting.PackagesRulePreview)
|
|
|
|
})
|
|
|
|
})
|
2023-02-05 05:12:31 -05:00
|
|
|
m.Group("/cargo", func() {
|
|
|
|
m.Post("/initialize", user_setting.InitializeCargoIndex)
|
|
|
|
m.Post("/rebuild", user_setting.RebuildCargoIndex)
|
|
|
|
})
|
2023-02-05 20:49:21 -05:00
|
|
|
m.Post("/chef/regenerate_keypair", user_setting.RegenerateChefKeyPair)
|
2022-11-20 09:08:38 -05:00
|
|
|
}, packagesEnabled)
|
2023-02-01 07:53:04 -05:00
|
|
|
m.Group("/secrets", func() {
|
|
|
|
m.Get("", user_setting.Secrets)
|
|
|
|
m.Post("", web.Bind(forms.AddSecretForm{}), user_setting.SecretsPost)
|
|
|
|
m.Post("/delete", user_setting.SecretsDelete)
|
|
|
|
})
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Get("/organization", user_setting.Organization)
|
|
|
|
m.Get("/repos", user_setting.Repos)
|
|
|
|
m.Post("/repos/unadopted", user_setting.AdoptOrDeleteRepository)
|
2023-03-10 09:28:32 -05:00
|
|
|
|
|
|
|
m.Group("/hooks", func() {
|
|
|
|
m.Get("", user_setting.Webhooks)
|
|
|
|
m.Post("/delete", user_setting.DeleteWebhook)
|
|
|
|
addWebhookAddRoutes()
|
|
|
|
m.Group("/{id}", func() {
|
|
|
|
m.Get("", repo.WebHooksEdit)
|
|
|
|
m.Post("/replay/{uuid}", repo.ReplayWebhook)
|
|
|
|
})
|
|
|
|
addWebhookEditRoutes()
|
|
|
|
}, webhooksEnabled, func(ctx *context.Context) {
|
|
|
|
ctx.Data["IsUserWebhook"] = true
|
|
|
|
})
|
2017-04-25 03:24:51 -04:00
|
|
|
}, reqSignIn, func(ctx *context.Context) {
|
|
|
|
ctx.Data["PageIsUserSettings"] = true
|
2019-01-09 12:22:57 -05:00
|
|
|
ctx.Data["AllThemes"] = setting.UI.Themes
|
2022-11-20 09:08:38 -05:00
|
|
|
ctx.Data["EnablePackages"] = setting.Packages.Enabled
|
2017-04-25 03:24:51 -04:00
|
|
|
})
|
|
|
|
|
|
|
|
m.Group("/user", func() {
|
|
|
|
// r.Get("/feeds", binding.Bind(auth.FeedsForm{}), user.Feeds)
|
2022-04-11 22:02:58 -04:00
|
|
|
m.Get("/activate", auth.Activate)
|
|
|
|
m.Post("/activate", auth.ActivatePost)
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Any("/activate_email", auth.ActivateEmail)
|
Avatar refactor, move avatar code from `models` to `models.avatars`, remove duplicated code (#17123)
Why this refactor
The goal is to move most files from `models` package to `models.xxx` package. Many models depend on avatar model, so just move this first.
And the existing logic is not clear, there are too many function like `AvatarLink`, `RelAvatarLink`, `SizedRelAvatarLink`, `SizedAvatarLink`, `MakeFinalAvatarURL`, `HashedAvatarLink`, etc. This refactor make everything clear:
* user.AvatarLink()
* user.AvatarLinkWithSize(size)
* avatars.GenerateEmailAvatarFastLink(email, size)
* avatars.GenerateEmailAvatarFinalLink(email, size)
And many duplicated code are deleted in route handler, the handler and the model share the same avatar logic now.
2021-10-05 19:25:46 -04:00
|
|
|
m.Get("/avatar/{username}/{size}", user.AvatarByUserName)
|
2022-01-02 08:12:35 -05:00
|
|
|
m.Get("/recover_account", auth.ResetPasswd)
|
|
|
|
m.Post("/recover_account", auth.ResetPasswdPost)
|
|
|
|
m.Get("/forgot_password", auth.ForgotPasswd)
|
|
|
|
m.Post("/forgot_password", auth.ForgotPasswdPost)
|
|
|
|
m.Post("/logout", auth.SignOut)
|
2022-04-11 22:02:58 -04:00
|
|
|
m.Get("/task/{task}", reqSignIn, user.TaskStatus)
|
|
|
|
m.Get("/stopwatches", reqSignIn, user.GetStopwatches)
|
|
|
|
m.Get("/search", ignExploreSignIn, user.Search)
|
2022-05-28 20:03:17 -04:00
|
|
|
m.Group("/oauth2", func() {
|
|
|
|
m.Get("/{provider}", auth.SignInOAuth)
|
|
|
|
m.Get("/{provider}/callback", auth.SignInOAuthCallback)
|
|
|
|
})
|
2017-04-25 03:24:51 -04:00
|
|
|
})
|
|
|
|
// ***** END: User *****
|
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/avatar/{hash}", user.AvatarByEmailHash)
|
2020-03-27 08:34:39 -04:00
|
|
|
|
2017-04-25 03:24:51 -04:00
|
|
|
adminReq := context.Toggle(&context.ToggleOptions{SignInRequired: true, AdminRequired: true})
|
|
|
|
|
|
|
|
// ***** START: Admin *****
|
|
|
|
m.Group("/admin", func() {
|
|
|
|
m.Get("", adminReq, admin.Dashboard)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("", adminReq, web.Bind(forms.AdminDashboardForm{}), admin.DashboardPost)
|
2022-10-16 19:29:26 -04:00
|
|
|
|
|
|
|
m.Group("/config", func() {
|
|
|
|
m.Get("", admin.Config)
|
|
|
|
m.Post("", admin.ChangeConfig)
|
|
|
|
m.Post("/test_mail", admin.SendTestMail)
|
|
|
|
})
|
|
|
|
|
2020-01-07 06:23:09 -05:00
|
|
|
m.Group("/monitor", func() {
|
|
|
|
m.Get("", admin.Monitor)
|
2022-03-31 13:01:43 -04:00
|
|
|
m.Get("/stacktrace", admin.GoroutineStacktrace)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Post("/cancel/{pid}", admin.MonitorCancel)
|
|
|
|
m.Group("/queue/{qid}", func() {
|
2020-01-07 06:23:09 -05:00
|
|
|
m.Get("", admin.Queue)
|
|
|
|
m.Post("/set", admin.SetQueueSettings)
|
|
|
|
m.Post("/add", admin.AddWorkers)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Post("/cancel/{pid}", admin.WorkerCancel)
|
2020-01-28 20:01:06 -05:00
|
|
|
m.Post("/flush", admin.Flush)
|
2022-01-22 16:22:14 -05:00
|
|
|
m.Post("/pause", admin.Pause)
|
|
|
|
m.Post("/resume", admin.Resume)
|
2020-01-07 06:23:09 -05:00
|
|
|
})
|
|
|
|
})
|
2017-04-25 03:24:51 -04:00
|
|
|
|
|
|
|
m.Group("/users", func() {
|
|
|
|
m.Get("", admin.Users)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Combo("/new").Get(admin.NewUser).Post(web.Bind(forms.AdminCreateUserForm{}), admin.NewUserPost)
|
|
|
|
m.Combo("/{userid}").Get(admin.EditUser).Post(web.Bind(forms.AdminEditUserForm{}), admin.EditUserPost)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Post("/{userid}/delete", admin.DeleteUser)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/{userid}/avatar", web.Bind(forms.AvatarForm{}), admin.AvatarPost)
|
2021-11-16 14:13:13 -05:00
|
|
|
m.Post("/{userid}/avatar/delete", admin.DeleteAvatar)
|
2017-04-25 03:24:51 -04:00
|
|
|
})
|
|
|
|
|
2020-03-02 13:25:36 -05:00
|
|
|
m.Group("/emails", func() {
|
|
|
|
m.Get("", admin.Emails)
|
|
|
|
m.Post("/activate", admin.ActivateEmail)
|
|
|
|
})
|
|
|
|
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("/orgs", func() {
|
|
|
|
m.Get("", admin.Organizations)
|
|
|
|
})
|
|
|
|
|
|
|
|
m.Group("/repos", func() {
|
|
|
|
m.Get("", admin.Repos)
|
2020-09-25 00:09:23 -04:00
|
|
|
m.Combo("/unadopted").Get(admin.UnadoptedRepos).Post(admin.AdoptOrDeleteRepository)
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Post("/delete", admin.DeleteRepo)
|
|
|
|
})
|
|
|
|
|
2022-11-20 09:08:38 -05:00
|
|
|
m.Group("/packages", func() {
|
|
|
|
m.Get("", admin.Packages)
|
|
|
|
m.Post("/delete", admin.DeletePackageVersion)
|
|
|
|
}, packagesEnabled)
|
2022-03-30 04:42:47 -04:00
|
|
|
|
2021-01-14 18:24:03 -05:00
|
|
|
m.Group("/hooks", func() {
|
2020-03-08 18:08:05 -04:00
|
|
|
m.Get("", admin.DefaultOrSystemWebhooks)
|
|
|
|
m.Post("/delete", admin.DeleteDefaultOrSystemWebhook)
|
2022-01-05 16:00:20 -05:00
|
|
|
m.Group("/{id}", func() {
|
|
|
|
m.Get("", repo.WebHooksEdit)
|
|
|
|
m.Post("/replay/{uuid}", repo.ReplayWebhook)
|
|
|
|
})
|
2023-03-10 09:28:32 -05:00
|
|
|
addWebhookEditRoutes()
|
2021-02-11 12:34:34 -05:00
|
|
|
}, webhooksEnabled)
|
2019-03-18 22:33:20 -04:00
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{configType:default-hooks|system-hooks}", func() {
|
2023-03-10 09:28:32 -05:00
|
|
|
addWebhookAddRoutes()
|
2021-01-14 18:24:03 -05:00
|
|
|
})
|
|
|
|
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("/auths", func() {
|
|
|
|
m.Get("", admin.Authentications)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Combo("/new").Get(admin.NewAuthSource).Post(web.Bind(forms.AuthenticationForm{}), admin.NewAuthSourcePost)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Combo("/{authid}").Get(admin.EditAuthSource).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.AuthenticationForm{}), admin.EditAuthSourcePost)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Post("/{authid}/delete", admin.DeleteAuthSource)
|
2017-04-25 03:24:51 -04:00
|
|
|
})
|
|
|
|
|
|
|
|
m.Group("/notices", func() {
|
|
|
|
m.Get("", admin.Notices)
|
|
|
|
m.Post("/delete", admin.DeleteNotices)
|
2020-02-26 11:25:54 -05:00
|
|
|
m.Post("/empty", admin.EmptyNotices)
|
2017-04-25 03:24:51 -04:00
|
|
|
})
|
2022-10-12 10:08:29 -04:00
|
|
|
|
|
|
|
m.Group("/applications", func() {
|
|
|
|
m.Get("", admin.Applications)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/oauth2", web.Bind(forms.EditOAuth2ApplicationForm{}), admin.ApplicationsPost)
|
2022-10-12 10:08:29 -04:00
|
|
|
m.Group("/oauth2/{id}", func() {
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Combo("").Get(admin.EditApplication).Post(web.Bind(forms.EditOAuth2ApplicationForm{}), admin.EditApplicationPost)
|
2022-10-12 10:08:29 -04:00
|
|
|
m.Post("/regenerate_secret", admin.ApplicationsRegenerateSecret)
|
|
|
|
m.Post("/delete", admin.DeleteApplication)
|
|
|
|
})
|
|
|
|
}, func(ctx *context.Context) {
|
|
|
|
if !setting.OAuth2.Enable {
|
|
|
|
ctx.Error(http.StatusForbidden)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
})
|
Implement actions (#21937)
Close #13539.
Co-authored by: @lunny @appleboy @fuxiaohei and others.
Related projects:
- https://gitea.com/gitea/actions-proto-def
- https://gitea.com/gitea/actions-proto-go
- https://gitea.com/gitea/act
- https://gitea.com/gitea/act_runner
### Summary
The target of this PR is to bring a basic implementation of "Actions",
an internal CI/CD system of Gitea. That means even though it has been
merged, the state of the feature is **EXPERIMENTAL**, and please note
that:
- It is disabled by default;
- It shouldn't be used in a production environment currently;
- It shouldn't be used in a public Gitea instance currently;
- Breaking changes may be made before it's stable.
**Please comment on #13539 if you have any different product design
ideas**, all decisions reached there will be adopted here. But in this
PR, we don't talk about **naming, feature-creep or alternatives**.
### ⚠️ Breaking
`gitea-actions` will become a reserved user name. If a user with the
name already exists in the database, it is recommended to rename it.
### Some important reviews
- What is `DEFAULT_ACTIONS_URL` in `app.ini` for?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1055954954
- Why the api for runners is not under the normal `/api/v1` prefix?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061173592
- Why DBFS?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061301178
- Why ignore events triggered by `gitea-actions` bot?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1063254103
- Why there's no permission control for actions?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1090229868
### What it looks like
<details>
#### Manage runners
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205870657-c72f590e-2e08-4cd4-be7f-2e0abb299bbf.png">
#### List runs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872794-50fde990-2b45-48c1-a178-908e4ec5b627.png">
#### View logs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872501-9b7b9000-9542-4991-8f55-18ccdada77c3.png">
</details>
### How to try it
<details>
#### 1. Start Gitea
Clone this branch and [install from
source](https://docs.gitea.io/en-us/install-from-source).
Add additional configurations in `app.ini` to enable Actions:
```ini
[actions]
ENABLED = true
```
Start it.
If all is well, you'll see the management page of runners:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205877365-8e30a780-9b10-4154-b3e8-ee6c3cb35a59.png">
#### 2. Start runner
Clone the [act_runner](https://gitea.com/gitea/act_runner), and follow
the
[README](https://gitea.com/gitea/act_runner/src/branch/main/README.md)
to start it.
If all is well, you'll see a new runner has been added:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205878000-216f5937-e696-470d-b66c-8473987d91c3.png">
#### 3. Enable actions for a repo
Create a new repo or open an existing one, check the `Actions` checkbox
in settings and submit.
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879705-53e09208-73c0-4b3e-a123-2dcf9aba4b9c.png">
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879383-23f3d08f-1a85-41dd-a8b3-54e2ee6453e8.png">
If all is well, you'll see a new tab "Actions":
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205881648-a8072d8c-5803-4d76-b8a8-9b2fb49516c1.png">
#### 4. Upload workflow files
Upload some workflow files to `.gitea/workflows/xxx.yaml`, you can
follow the [quickstart](https://docs.github.com/en/actions/quickstart)
of GitHub Actions. Yes, Gitea Actions is compatible with GitHub Actions
in most cases, you can use the same demo:
```yaml
name: GitHub Actions Demo
run-name: ${{ github.actor }} is testing out GitHub Actions 🚀
on: [push]
jobs:
Explore-GitHub-Actions:
runs-on: ubuntu-latest
steps:
- run: echo "🎉 The job was automatically triggered by a ${{ github.event_name }} event."
- run: echo "🐧 This job is now running on a ${{ runner.os }} server hosted by GitHub!"
- run: echo "🔎 The name of your branch is ${{ github.ref }} and your repository is ${{ github.repository }}."
- name: Check out repository code
uses: actions/checkout@v3
- run: echo "💡 The ${{ github.repository }} repository has been cloned to the runner."
- run: echo "🖥️ The workflow is now ready to test your code on the runner."
- name: List files in the repository
run: |
ls ${{ github.workspace }}
- run: echo "🍏 This job's status is ${{ job.status }}."
```
If all is well, you'll see a new run in `Actions` tab:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884473-79a874bc-171b-4aaf-acd5-0241a45c3b53.png">
#### 5. Check the logs of jobs
Click a run and you'll see the logs:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884800-994b0374-67f7-48ff-be9a-4c53f3141547.png">
#### 6. Go on
You can try more examples in [the
documents](https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions)
of GitHub Actions, then you might find a lot of bugs.
Come on, PRs are welcome.
</details>
See also: [Feature Preview: Gitea
Actions](https://blog.gitea.io/2022/12/feature-preview-gitea-actions/)
---------
Co-authored-by: a1012112796 <1012112796@qq.com>
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: delvh <dev.lh@web.de>
Co-authored-by: ChristopherHX <christopher.homberger@web.de>
Co-authored-by: John Olheiser <john.olheiser@gmail.com>
2023-01-30 20:45:19 -05:00
|
|
|
|
|
|
|
m.Group("/runners", func() {
|
|
|
|
m.Get("", admin.Runners)
|
|
|
|
m.Get("/reset_registration_token", admin.ResetRunnerRegistrationToken)
|
|
|
|
m.Combo("/{runnerid}").Get(admin.EditRunner).Post(web.Bind(forms.EditRunnerForm{}), admin.EditRunnerPost)
|
|
|
|
m.Post("/{runnerid}/delete", admin.DeleteRunnerPost)
|
|
|
|
}, actions.MustEnableActions)
|
2022-10-12 10:08:29 -04:00
|
|
|
}, func(ctx *context.Context) {
|
|
|
|
ctx.Data["EnableOAuth2"] = setting.OAuth2.Enable
|
2022-10-21 23:24:09 -04:00
|
|
|
ctx.Data["EnablePackages"] = setting.Packages.Enabled
|
2017-04-25 03:24:51 -04:00
|
|
|
}, adminReq)
|
|
|
|
// ***** END: Admin *****
|
|
|
|
|
|
|
|
m.Group("", func() {
|
2022-03-26 05:04:22 -04:00
|
|
|
m.Get("/favicon.ico", func(ctx *context.Context) {
|
2022-11-17 12:55:15 -05:00
|
|
|
ctx.SetServeHeaders(&context.ServeHeaderOptions{
|
|
|
|
Filename: "favicon.png",
|
|
|
|
})
|
|
|
|
http.ServeFile(ctx.Resp, ctx.Req, path.Join(setting.StaticRootPath, "public/img/favicon.png"))
|
2022-03-26 05:04:22 -04:00
|
|
|
})
|
2023-04-07 06:08:36 -04:00
|
|
|
m.Get("/{username}", func(ctx *context.Context) {
|
|
|
|
// WORKAROUND to support usernames with "." in it
|
|
|
|
// https://github.com/go-chi/chi/issues/781
|
|
|
|
username := ctx.Params("username")
|
|
|
|
reloadParam := func(suffix string) (success bool) {
|
|
|
|
ctx.SetParams("username", strings.TrimSuffix(username, suffix))
|
|
|
|
context_service.UserAssignmentWeb()(ctx)
|
|
|
|
return !ctx.Written()
|
|
|
|
}
|
|
|
|
switch {
|
|
|
|
case strings.HasSuffix(username, ".png"):
|
|
|
|
if reloadParam(".png") {
|
|
|
|
user.AvatarByUserName(ctx)
|
|
|
|
}
|
|
|
|
case strings.HasSuffix(username, ".keys"):
|
|
|
|
if reloadParam(".keys") {
|
|
|
|
user.ShowSSHKeys(ctx)
|
|
|
|
}
|
|
|
|
case strings.HasSuffix(username, ".gpg"):
|
|
|
|
if reloadParam(".gpg") {
|
|
|
|
user.ShowGPGKeys(ctx)
|
|
|
|
}
|
|
|
|
case strings.HasSuffix(username, ".rss"):
|
|
|
|
feedEnabled(ctx)
|
|
|
|
if !ctx.Written() && reloadParam(".rss") {
|
|
|
|
context_service.UserAssignmentWeb()(ctx)
|
|
|
|
feed.ShowUserFeedRSS(ctx)
|
|
|
|
}
|
|
|
|
case strings.HasSuffix(username, ".atom"):
|
|
|
|
feedEnabled(ctx)
|
|
|
|
if !ctx.Written() && reloadParam(".atom") {
|
|
|
|
feed.ShowUserFeedAtom(ctx)
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
context_service.UserAssignmentWeb()(ctx)
|
|
|
|
if !ctx.Written() {
|
|
|
|
ctx.Data["EnableFeed"] = setting.EnableFeed
|
|
|
|
user.Profile(ctx)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/attachments/{uuid}", repo.GetAttachment)
|
2017-04-25 03:24:51 -04:00
|
|
|
}, ignSignIn)
|
|
|
|
|
2022-03-26 05:04:22 -04:00
|
|
|
m.Post("/{username}", reqSignIn, context_service.UserAssignmentWeb(), user.Action)
|
2017-04-25 03:24:51 -04:00
|
|
|
|
|
|
|
reqRepoAdmin := context.RequireRepoAdmin()
|
2021-11-09 14:57:58 -05:00
|
|
|
reqRepoCodeWriter := context.RequireRepoWriter(unit.TypeCode)
|
2022-04-28 11:45:33 -04:00
|
|
|
canEnableEditor := context.CanEnableEditor()
|
2021-11-09 14:57:58 -05:00
|
|
|
reqRepoCodeReader := context.RequireRepoReader(unit.TypeCode)
|
|
|
|
reqRepoReleaseWriter := context.RequireRepoWriter(unit.TypeReleases)
|
|
|
|
reqRepoReleaseReader := context.RequireRepoReader(unit.TypeReleases)
|
|
|
|
reqRepoWikiWriter := context.RequireRepoWriter(unit.TypeWiki)
|
|
|
|
reqRepoIssueReader := context.RequireRepoReader(unit.TypeIssues)
|
|
|
|
reqRepoPullsReader := context.RequireRepoReader(unit.TypePullRequests)
|
|
|
|
reqRepoIssuesOrPullsWriter := context.RequireRepoWriterOr(unit.TypeIssues, unit.TypePullRequests)
|
|
|
|
reqRepoIssuesOrPullsReader := context.RequireRepoReaderOr(unit.TypeIssues, unit.TypePullRequests)
|
|
|
|
reqRepoProjectsReader := context.RequireRepoReader(unit.TypeProjects)
|
|
|
|
reqRepoProjectsWriter := context.RequireRepoWriter(unit.TypeProjects)
|
Implement actions (#21937)
Close #13539.
Co-authored by: @lunny @appleboy @fuxiaohei and others.
Related projects:
- https://gitea.com/gitea/actions-proto-def
- https://gitea.com/gitea/actions-proto-go
- https://gitea.com/gitea/act
- https://gitea.com/gitea/act_runner
### Summary
The target of this PR is to bring a basic implementation of "Actions",
an internal CI/CD system of Gitea. That means even though it has been
merged, the state of the feature is **EXPERIMENTAL**, and please note
that:
- It is disabled by default;
- It shouldn't be used in a production environment currently;
- It shouldn't be used in a public Gitea instance currently;
- Breaking changes may be made before it's stable.
**Please comment on #13539 if you have any different product design
ideas**, all decisions reached there will be adopted here. But in this
PR, we don't talk about **naming, feature-creep or alternatives**.
### ⚠️ Breaking
`gitea-actions` will become a reserved user name. If a user with the
name already exists in the database, it is recommended to rename it.
### Some important reviews
- What is `DEFAULT_ACTIONS_URL` in `app.ini` for?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1055954954
- Why the api for runners is not under the normal `/api/v1` prefix?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061173592
- Why DBFS?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061301178
- Why ignore events triggered by `gitea-actions` bot?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1063254103
- Why there's no permission control for actions?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1090229868
### What it looks like
<details>
#### Manage runners
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205870657-c72f590e-2e08-4cd4-be7f-2e0abb299bbf.png">
#### List runs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872794-50fde990-2b45-48c1-a178-908e4ec5b627.png">
#### View logs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872501-9b7b9000-9542-4991-8f55-18ccdada77c3.png">
</details>
### How to try it
<details>
#### 1. Start Gitea
Clone this branch and [install from
source](https://docs.gitea.io/en-us/install-from-source).
Add additional configurations in `app.ini` to enable Actions:
```ini
[actions]
ENABLED = true
```
Start it.
If all is well, you'll see the management page of runners:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205877365-8e30a780-9b10-4154-b3e8-ee6c3cb35a59.png">
#### 2. Start runner
Clone the [act_runner](https://gitea.com/gitea/act_runner), and follow
the
[README](https://gitea.com/gitea/act_runner/src/branch/main/README.md)
to start it.
If all is well, you'll see a new runner has been added:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205878000-216f5937-e696-470d-b66c-8473987d91c3.png">
#### 3. Enable actions for a repo
Create a new repo or open an existing one, check the `Actions` checkbox
in settings and submit.
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879705-53e09208-73c0-4b3e-a123-2dcf9aba4b9c.png">
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879383-23f3d08f-1a85-41dd-a8b3-54e2ee6453e8.png">
If all is well, you'll see a new tab "Actions":
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205881648-a8072d8c-5803-4d76-b8a8-9b2fb49516c1.png">
#### 4. Upload workflow files
Upload some workflow files to `.gitea/workflows/xxx.yaml`, you can
follow the [quickstart](https://docs.github.com/en/actions/quickstart)
of GitHub Actions. Yes, Gitea Actions is compatible with GitHub Actions
in most cases, you can use the same demo:
```yaml
name: GitHub Actions Demo
run-name: ${{ github.actor }} is testing out GitHub Actions 🚀
on: [push]
jobs:
Explore-GitHub-Actions:
runs-on: ubuntu-latest
steps:
- run: echo "🎉 The job was automatically triggered by a ${{ github.event_name }} event."
- run: echo "🐧 This job is now running on a ${{ runner.os }} server hosted by GitHub!"
- run: echo "🔎 The name of your branch is ${{ github.ref }} and your repository is ${{ github.repository }}."
- name: Check out repository code
uses: actions/checkout@v3
- run: echo "💡 The ${{ github.repository }} repository has been cloned to the runner."
- run: echo "🖥️ The workflow is now ready to test your code on the runner."
- name: List files in the repository
run: |
ls ${{ github.workspace }}
- run: echo "🍏 This job's status is ${{ job.status }}."
```
If all is well, you'll see a new run in `Actions` tab:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884473-79a874bc-171b-4aaf-acd5-0241a45c3b53.png">
#### 5. Check the logs of jobs
Click a run and you'll see the logs:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884800-994b0374-67f7-48ff-be9a-4c53f3141547.png">
#### 6. Go on
You can try more examples in [the
documents](https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions)
of GitHub Actions, then you might find a lot of bugs.
Come on, PRs are welcome.
</details>
See also: [Feature Preview: Gitea
Actions](https://blog.gitea.io/2022/12/feature-preview-gitea-actions/)
---------
Co-authored-by: a1012112796 <1012112796@qq.com>
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: delvh <dev.lh@web.de>
Co-authored-by: ChristopherHX <christopher.homberger@web.de>
Co-authored-by: John Olheiser <john.olheiser@gmail.com>
2023-01-30 20:45:19 -05:00
|
|
|
reqRepoActionsReader := context.RequireRepoReader(unit.TypeActions)
|
|
|
|
reqRepoActionsWriter := context.RequireRepoWriter(unit.TypeActions)
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2022-03-30 04:42:47 -04:00
|
|
|
reqPackageAccess := func(accessMode perm.AccessMode) func(ctx *context.Context) {
|
|
|
|
return func(ctx *context.Context) {
|
|
|
|
if ctx.Package.AccessMode < accessMode && !ctx.IsUserSiteAdmin() {
|
|
|
|
ctx.NotFound("", nil)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-03-10 10:18:20 -05:00
|
|
|
reqUnitAccess := func(unitType unit.Type, accessMode perm.AccessMode) func(ctx *context.Context) {
|
|
|
|
return func(ctx *context.Context) {
|
|
|
|
if ctx.ContextUser == nil {
|
|
|
|
ctx.NotFound(unitType.String(), nil)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ctx.ContextUser.IsOrganization() {
|
|
|
|
if ctx.Org.Organization.UnitPermission(ctx, ctx.Doer, unitType) < accessMode {
|
|
|
|
ctx.NotFound(unitType.String(), nil)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-25 03:24:51 -04:00
|
|
|
// ***** START: Organization *****
|
2022-07-15 10:21:54 -04:00
|
|
|
m.Group("/org", func() {
|
|
|
|
m.Group("/{org}", func() {
|
|
|
|
m.Get("/members", org.Members)
|
|
|
|
}, context.OrgAssignment())
|
|
|
|
}, ignSignIn)
|
|
|
|
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("/org", func() {
|
|
|
|
m.Group("", func() {
|
|
|
|
m.Get("/create", org.Create)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/create", web.Bind(forms.CreateOrgForm{}), org.CreatePost)
|
2017-04-25 03:24:51 -04:00
|
|
|
})
|
|
|
|
|
2022-10-19 08:40:28 -04:00
|
|
|
m.Group("/invite/{token}", func() {
|
|
|
|
m.Get("", org.TeamInvite)
|
|
|
|
m.Post("", org.TeamInvitePost)
|
|
|
|
})
|
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{org}", func() {
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Get("/dashboard", user.Dashboard)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/dashboard/{team}", user.Dashboard)
|
2021-01-12 23:19:17 -05:00
|
|
|
m.Get("/issues", user.Issues)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/issues/{team}", user.Issues)
|
2021-01-12 23:19:17 -05:00
|
|
|
m.Get("/pulls", user.Pulls)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/pulls/{team}", user.Pulls)
|
2019-12-15 09:20:08 -05:00
|
|
|
m.Get("/milestones", reqMilestonesDashboardPageEnabled, user.Milestones)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/milestones/{team}", reqMilestonesDashboardPageEnabled, user.Milestones)
|
|
|
|
m.Post("/members/action/{action}", org.MembersAction)
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Get("/teams", org.Teams)
|
2020-12-27 14:58:03 -05:00
|
|
|
}, context.OrgAssignment(true, false, true))
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{org}", func() {
|
|
|
|
m.Get("/teams/{team}", org.TeamMembers)
|
|
|
|
m.Get("/teams/{team}/repositories", org.TeamRepositories)
|
|
|
|
m.Post("/teams/{team}/action/{action}", org.TeamsAction)
|
|
|
|
m.Post("/teams/{team}/action/repo/{action}", org.TeamsRepoAction)
|
2017-04-25 03:24:51 -04:00
|
|
|
}, context.OrgAssignment(true, false, true))
|
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{org}", func() {
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Get("/teams/new", org.NewTeam)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/teams/new", web.Bind(forms.CreateTeamForm{}), org.NewTeamPost)
|
2022-04-07 14:59:56 -04:00
|
|
|
m.Get("/teams/-/search", org.SearchTeam)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/teams/{team}/edit", org.EditTeam)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/teams/{team}/edit", web.Bind(forms.CreateTeamForm{}), org.EditTeamPost)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Post("/teams/{team}/delete", org.DeleteTeam)
|
2017-04-25 03:24:51 -04:00
|
|
|
|
|
|
|
m.Group("/settings", func() {
|
|
|
|
m.Combo("").Get(org.Settings).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.UpdateOrgSettingForm{}), org.SettingsPost)
|
|
|
|
m.Post("/avatar", web.Bind(forms.AvatarForm{}), org.SettingsAvatar)
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Post("/avatar/delete", org.SettingsDeleteAvatar)
|
2022-10-09 08:07:41 -04:00
|
|
|
m.Group("/applications", func() {
|
|
|
|
m.Get("", org.Applications)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/oauth2", web.Bind(forms.EditOAuth2ApplicationForm{}), org.OAuthApplicationsPost)
|
2022-10-09 08:07:41 -04:00
|
|
|
m.Group("/oauth2/{id}", func() {
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Combo("").Get(org.OAuth2ApplicationShow).Post(web.Bind(forms.EditOAuth2ApplicationForm{}), org.OAuth2ApplicationEdit)
|
2022-10-09 08:07:41 -04:00
|
|
|
m.Post("/regenerate_secret", org.OAuthApplicationsRegenerateSecret)
|
|
|
|
m.Post("/delete", org.DeleteOAuth2Application)
|
|
|
|
})
|
|
|
|
}, func(ctx *context.Context) {
|
|
|
|
if !setting.OAuth2.Enable {
|
|
|
|
ctx.Error(http.StatusForbidden)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
})
|
2017-04-25 03:24:51 -04:00
|
|
|
|
|
|
|
m.Group("/hooks", func() {
|
|
|
|
m.Get("", org.Webhooks)
|
|
|
|
m.Post("/delete", org.DeleteWebhook)
|
2023-03-10 09:28:32 -05:00
|
|
|
addWebhookAddRoutes()
|
2022-01-05 16:00:20 -05:00
|
|
|
m.Group("/{id}", func() {
|
|
|
|
m.Get("", repo.WebHooksEdit)
|
|
|
|
m.Post("/replay/{uuid}", repo.ReplayWebhook)
|
|
|
|
})
|
2023-03-10 09:28:32 -05:00
|
|
|
addWebhookEditRoutes()
|
|
|
|
}, webhooksEnabled, func(ctx *context.Context) {
|
|
|
|
ctx.Data["IsOrganizationWebhook"] = true
|
|
|
|
})
|
2017-04-25 03:24:51 -04:00
|
|
|
|
Add Organization Wide Labels (#10814)
* Add organization wide labels
Implement organization wide labels similar to organization wide
webhooks. This lets you create individual labels for organizations that can be used
for all repos under that organization (so being able to reuse the same
label across multiple repos).
This makes it possible for small organizations with many repos to use
labels effectively.
Fixes #7406
* Add migration
* remove comments
* fix tests
* Update options/locale/locale_en-US.ini
Removed unused translation string
* show org labels in issue search label filter
* Use more clear var name
* rename migration after merge from master
* comment typo
* update migration again after rebase with master
* check for orgID <=0 per guillep2k review
* fmt
* Apply suggestions from code review
Co-Authored-By: guillep2k <18600385+guillep2k@users.noreply.github.com>
* remove unused code
* Make sure RepoID is 0 when searching orgID per code review
* more changes/code review requests
* More descriptive translation var per code review
* func description/delete comment when issue label deleted instead of hiding it
* remove comment
* only use issues in that repo when calculating number of open issues for org label on repo label page
* Add integration test for IssuesSearch API with labels
* remove unused function
* Update models/issue_label.go
Co-Authored-By: guillep2k <18600385+guillep2k@users.noreply.github.com>
* Use subquery in GetLabelIDsInReposByNames
* Fix tests to use correct orgID
* fix more tests
* IssuesSearch api now uses new BuildLabelNamesIssueIDsCondition. Add a few more tests as well
* update comment for clarity
* Revert previous code change now that we can use the new BuildLabelNamesIssueIDsCondition
* Don't sort repos by date in IssuesSearch API
After much debugging I've found a strange issue where in some cases MySQL will return a different result than other enigines if a query is sorted by a null collumn. For example with our integration test data where we don't set updated_unix in repository fixtures:
SELECT `id`, `owner_id`, `owner_name`, `lower_name`, `name`, `description`, `website`, `original_service_type`, `original_url`, `default_branch`, `num_watches`, `num_stars`, `num_forks`, `num_issues`, `num_closed_issues`, `num_pulls`, `num_closed_pulls`, `num_milestones`, `num_closed_milestones`, `is_private`, `is_empty`, `is_archived`, `is_mirror`, `status`, `is_fork`, `fork_id`, `is_template`, `template_id`, `size`, `is_fsck_enabled`, `close_issues_via_commit_in_any_branch`, `topics`, `avatar`, `created_unix`, `updated_unix` FROM `repository` ORDER BY updated_unix DESC LIMIT 15 OFFSET 45
Returns different results for MySQL than other engines. However, the similar query:
SELECT `id`, `owner_id`, `owner_name`, `lower_name`, `name`, `description`, `website`, `original_service_type`, `original_url`, `default_branch`, `num_watches`, `num_stars`, `num_forks`, `num_issues`, `num_closed_issues`, `num_pulls`, `num_closed_pulls`, `num_milestones`, `num_closed_milestones`, `is_private`, `is_empty`, `is_archived`, `is_mirror`, `status`, `is_fork`, `fork_id`, `is_template`, `template_id`, `size`, `is_fsck_enabled`, `close_issues_via_commit_in_any_branch`, `topics`, `avatar`, `created_unix`, `updated_unix` FROM `repository` ORDER BY updated_unix DESC LIMIT 15 OFFSET 30
Returns the same results.
This causes integration tests to fail on MySQL in certain cases but would never show up in a real installation. Since this API call always returns issues based on the optionally provided repo_priority_id or the issueID itself, there is no change to results by changing the repo sorting method used to get ids earlier in the function.
* linter is back!
* code review
* remove now unused option
* Fix newline at end of files
* more unused code
* update to master
* check for matching ids before query
* Update models/issue_label.go
Co-Authored-By: 6543 <6543@obermui.de>
* Update models/issue_label.go
* update comments
* Update routers/org/setting.go
Co-authored-by: Lauris BH <lauris@nix.lv>
Co-authored-by: guillep2k <18600385+guillep2k@users.noreply.github.com>
Co-authored-by: 6543 <6543@obermui.de>
2020-04-01 00:14:46 -04:00
|
|
|
m.Group("/labels", func() {
|
|
|
|
m.Get("", org.RetrieveLabels, org.Labels)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/new", web.Bind(forms.CreateLabelForm{}), org.NewLabel)
|
|
|
|
m.Post("/edit", web.Bind(forms.CreateLabelForm{}), org.UpdateLabel)
|
Add Organization Wide Labels (#10814)
* Add organization wide labels
Implement organization wide labels similar to organization wide
webhooks. This lets you create individual labels for organizations that can be used
for all repos under that organization (so being able to reuse the same
label across multiple repos).
This makes it possible for small organizations with many repos to use
labels effectively.
Fixes #7406
* Add migration
* remove comments
* fix tests
* Update options/locale/locale_en-US.ini
Removed unused translation string
* show org labels in issue search label filter
* Use more clear var name
* rename migration after merge from master
* comment typo
* update migration again after rebase with master
* check for orgID <=0 per guillep2k review
* fmt
* Apply suggestions from code review
Co-Authored-By: guillep2k <18600385+guillep2k@users.noreply.github.com>
* remove unused code
* Make sure RepoID is 0 when searching orgID per code review
* more changes/code review requests
* More descriptive translation var per code review
* func description/delete comment when issue label deleted instead of hiding it
* remove comment
* only use issues in that repo when calculating number of open issues for org label on repo label page
* Add integration test for IssuesSearch API with labels
* remove unused function
* Update models/issue_label.go
Co-Authored-By: guillep2k <18600385+guillep2k@users.noreply.github.com>
* Use subquery in GetLabelIDsInReposByNames
* Fix tests to use correct orgID
* fix more tests
* IssuesSearch api now uses new BuildLabelNamesIssueIDsCondition. Add a few more tests as well
* update comment for clarity
* Revert previous code change now that we can use the new BuildLabelNamesIssueIDsCondition
* Don't sort repos by date in IssuesSearch API
After much debugging I've found a strange issue where in some cases MySQL will return a different result than other enigines if a query is sorted by a null collumn. For example with our integration test data where we don't set updated_unix in repository fixtures:
SELECT `id`, `owner_id`, `owner_name`, `lower_name`, `name`, `description`, `website`, `original_service_type`, `original_url`, `default_branch`, `num_watches`, `num_stars`, `num_forks`, `num_issues`, `num_closed_issues`, `num_pulls`, `num_closed_pulls`, `num_milestones`, `num_closed_milestones`, `is_private`, `is_empty`, `is_archived`, `is_mirror`, `status`, `is_fork`, `fork_id`, `is_template`, `template_id`, `size`, `is_fsck_enabled`, `close_issues_via_commit_in_any_branch`, `topics`, `avatar`, `created_unix`, `updated_unix` FROM `repository` ORDER BY updated_unix DESC LIMIT 15 OFFSET 45
Returns different results for MySQL than other engines. However, the similar query:
SELECT `id`, `owner_id`, `owner_name`, `lower_name`, `name`, `description`, `website`, `original_service_type`, `original_url`, `default_branch`, `num_watches`, `num_stars`, `num_forks`, `num_issues`, `num_closed_issues`, `num_pulls`, `num_closed_pulls`, `num_milestones`, `num_closed_milestones`, `is_private`, `is_empty`, `is_archived`, `is_mirror`, `status`, `is_fork`, `fork_id`, `is_template`, `template_id`, `size`, `is_fsck_enabled`, `close_issues_via_commit_in_any_branch`, `topics`, `avatar`, `created_unix`, `updated_unix` FROM `repository` ORDER BY updated_unix DESC LIMIT 15 OFFSET 30
Returns the same results.
This causes integration tests to fail on MySQL in certain cases but would never show up in a real installation. Since this API call always returns issues based on the optionally provided repo_priority_id or the issueID itself, there is no change to results by changing the repo sorting method used to get ids earlier in the function.
* linter is back!
* code review
* remove now unused option
* Fix newline at end of files
* more unused code
* update to master
* check for matching ids before query
* Update models/issue_label.go
Co-Authored-By: 6543 <6543@obermui.de>
* Update models/issue_label.go
* update comments
* Update routers/org/setting.go
Co-authored-by: Lauris BH <lauris@nix.lv>
Co-authored-by: guillep2k <18600385+guillep2k@users.noreply.github.com>
Co-authored-by: 6543 <6543@obermui.de>
2020-04-01 00:14:46 -04:00
|
|
|
m.Post("/delete", org.DeleteLabel)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/initialize", web.Bind(forms.InitializeLabelsForm{}), org.InitializeLabels)
|
Add Organization Wide Labels (#10814)
* Add organization wide labels
Implement organization wide labels similar to organization wide
webhooks. This lets you create individual labels for organizations that can be used
for all repos under that organization (so being able to reuse the same
label across multiple repos).
This makes it possible for small organizations with many repos to use
labels effectively.
Fixes #7406
* Add migration
* remove comments
* fix tests
* Update options/locale/locale_en-US.ini
Removed unused translation string
* show org labels in issue search label filter
* Use more clear var name
* rename migration after merge from master
* comment typo
* update migration again after rebase with master
* check for orgID <=0 per guillep2k review
* fmt
* Apply suggestions from code review
Co-Authored-By: guillep2k <18600385+guillep2k@users.noreply.github.com>
* remove unused code
* Make sure RepoID is 0 when searching orgID per code review
* more changes/code review requests
* More descriptive translation var per code review
* func description/delete comment when issue label deleted instead of hiding it
* remove comment
* only use issues in that repo when calculating number of open issues for org label on repo label page
* Add integration test for IssuesSearch API with labels
* remove unused function
* Update models/issue_label.go
Co-Authored-By: guillep2k <18600385+guillep2k@users.noreply.github.com>
* Use subquery in GetLabelIDsInReposByNames
* Fix tests to use correct orgID
* fix more tests
* IssuesSearch api now uses new BuildLabelNamesIssueIDsCondition. Add a few more tests as well
* update comment for clarity
* Revert previous code change now that we can use the new BuildLabelNamesIssueIDsCondition
* Don't sort repos by date in IssuesSearch API
After much debugging I've found a strange issue where in some cases MySQL will return a different result than other enigines if a query is sorted by a null collumn. For example with our integration test data where we don't set updated_unix in repository fixtures:
SELECT `id`, `owner_id`, `owner_name`, `lower_name`, `name`, `description`, `website`, `original_service_type`, `original_url`, `default_branch`, `num_watches`, `num_stars`, `num_forks`, `num_issues`, `num_closed_issues`, `num_pulls`, `num_closed_pulls`, `num_milestones`, `num_closed_milestones`, `is_private`, `is_empty`, `is_archived`, `is_mirror`, `status`, `is_fork`, `fork_id`, `is_template`, `template_id`, `size`, `is_fsck_enabled`, `close_issues_via_commit_in_any_branch`, `topics`, `avatar`, `created_unix`, `updated_unix` FROM `repository` ORDER BY updated_unix DESC LIMIT 15 OFFSET 45
Returns different results for MySQL than other engines. However, the similar query:
SELECT `id`, `owner_id`, `owner_name`, `lower_name`, `name`, `description`, `website`, `original_service_type`, `original_url`, `default_branch`, `num_watches`, `num_stars`, `num_forks`, `num_issues`, `num_closed_issues`, `num_pulls`, `num_closed_pulls`, `num_milestones`, `num_closed_milestones`, `is_private`, `is_empty`, `is_archived`, `is_mirror`, `status`, `is_fork`, `fork_id`, `is_template`, `template_id`, `size`, `is_fsck_enabled`, `close_issues_via_commit_in_any_branch`, `topics`, `avatar`, `created_unix`, `updated_unix` FROM `repository` ORDER BY updated_unix DESC LIMIT 15 OFFSET 30
Returns the same results.
This causes integration tests to fail on MySQL in certain cases but would never show up in a real installation. Since this API call always returns issues based on the optionally provided repo_priority_id or the issueID itself, there is no change to results by changing the repo sorting method used to get ids earlier in the function.
* linter is back!
* code review
* remove now unused option
* Fix newline at end of files
* more unused code
* update to master
* check for matching ids before query
* Update models/issue_label.go
Co-Authored-By: 6543 <6543@obermui.de>
* Update models/issue_label.go
* update comments
* Update routers/org/setting.go
Co-authored-by: Lauris BH <lauris@nix.lv>
Co-authored-by: guillep2k <18600385+guillep2k@users.noreply.github.com>
Co-authored-by: 6543 <6543@obermui.de>
2020-04-01 00:14:46 -04:00
|
|
|
})
|
|
|
|
|
Implement actions (#21937)
Close #13539.
Co-authored by: @lunny @appleboy @fuxiaohei and others.
Related projects:
- https://gitea.com/gitea/actions-proto-def
- https://gitea.com/gitea/actions-proto-go
- https://gitea.com/gitea/act
- https://gitea.com/gitea/act_runner
### Summary
The target of this PR is to bring a basic implementation of "Actions",
an internal CI/CD system of Gitea. That means even though it has been
merged, the state of the feature is **EXPERIMENTAL**, and please note
that:
- It is disabled by default;
- It shouldn't be used in a production environment currently;
- It shouldn't be used in a public Gitea instance currently;
- Breaking changes may be made before it's stable.
**Please comment on #13539 if you have any different product design
ideas**, all decisions reached there will be adopted here. But in this
PR, we don't talk about **naming, feature-creep or alternatives**.
### ⚠️ Breaking
`gitea-actions` will become a reserved user name. If a user with the
name already exists in the database, it is recommended to rename it.
### Some important reviews
- What is `DEFAULT_ACTIONS_URL` in `app.ini` for?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1055954954
- Why the api for runners is not under the normal `/api/v1` prefix?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061173592
- Why DBFS?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061301178
- Why ignore events triggered by `gitea-actions` bot?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1063254103
- Why there's no permission control for actions?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1090229868
### What it looks like
<details>
#### Manage runners
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205870657-c72f590e-2e08-4cd4-be7f-2e0abb299bbf.png">
#### List runs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872794-50fde990-2b45-48c1-a178-908e4ec5b627.png">
#### View logs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872501-9b7b9000-9542-4991-8f55-18ccdada77c3.png">
</details>
### How to try it
<details>
#### 1. Start Gitea
Clone this branch and [install from
source](https://docs.gitea.io/en-us/install-from-source).
Add additional configurations in `app.ini` to enable Actions:
```ini
[actions]
ENABLED = true
```
Start it.
If all is well, you'll see the management page of runners:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205877365-8e30a780-9b10-4154-b3e8-ee6c3cb35a59.png">
#### 2. Start runner
Clone the [act_runner](https://gitea.com/gitea/act_runner), and follow
the
[README](https://gitea.com/gitea/act_runner/src/branch/main/README.md)
to start it.
If all is well, you'll see a new runner has been added:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205878000-216f5937-e696-470d-b66c-8473987d91c3.png">
#### 3. Enable actions for a repo
Create a new repo or open an existing one, check the `Actions` checkbox
in settings and submit.
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879705-53e09208-73c0-4b3e-a123-2dcf9aba4b9c.png">
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879383-23f3d08f-1a85-41dd-a8b3-54e2ee6453e8.png">
If all is well, you'll see a new tab "Actions":
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205881648-a8072d8c-5803-4d76-b8a8-9b2fb49516c1.png">
#### 4. Upload workflow files
Upload some workflow files to `.gitea/workflows/xxx.yaml`, you can
follow the [quickstart](https://docs.github.com/en/actions/quickstart)
of GitHub Actions. Yes, Gitea Actions is compatible with GitHub Actions
in most cases, you can use the same demo:
```yaml
name: GitHub Actions Demo
run-name: ${{ github.actor }} is testing out GitHub Actions 🚀
on: [push]
jobs:
Explore-GitHub-Actions:
runs-on: ubuntu-latest
steps:
- run: echo "🎉 The job was automatically triggered by a ${{ github.event_name }} event."
- run: echo "🐧 This job is now running on a ${{ runner.os }} server hosted by GitHub!"
- run: echo "🔎 The name of your branch is ${{ github.ref }} and your repository is ${{ github.repository }}."
- name: Check out repository code
uses: actions/checkout@v3
- run: echo "💡 The ${{ github.repository }} repository has been cloned to the runner."
- run: echo "🖥️ The workflow is now ready to test your code on the runner."
- name: List files in the repository
run: |
ls ${{ github.workspace }}
- run: echo "🍏 This job's status is ${{ job.status }}."
```
If all is well, you'll see a new run in `Actions` tab:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884473-79a874bc-171b-4aaf-acd5-0241a45c3b53.png">
#### 5. Check the logs of jobs
Click a run and you'll see the logs:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884800-994b0374-67f7-48ff-be9a-4c53f3141547.png">
#### 6. Go on
You can try more examples in [the
documents](https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions)
of GitHub Actions, then you might find a lot of bugs.
Come on, PRs are welcome.
</details>
See also: [Feature Preview: Gitea
Actions](https://blog.gitea.io/2022/12/feature-preview-gitea-actions/)
---------
Co-authored-by: a1012112796 <1012112796@qq.com>
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: delvh <dev.lh@web.de>
Co-authored-by: ChristopherHX <christopher.homberger@web.de>
Co-authored-by: John Olheiser <john.olheiser@gmail.com>
2023-01-30 20:45:19 -05:00
|
|
|
m.Group("/runners", func() {
|
|
|
|
m.Get("", org.Runners)
|
|
|
|
m.Combo("/{runnerid}").Get(org.RunnersEdit).
|
|
|
|
Post(web.Bind(forms.EditRunnerForm{}), org.RunnersEditPost)
|
|
|
|
m.Post("/{runnerid}/delete", org.RunnerDeletePost)
|
|
|
|
m.Get("/reset_registration_token", org.ResetRunnerRegistrationToken)
|
|
|
|
}, actions.MustEnableActions)
|
|
|
|
|
2022-12-20 04:07:13 -05:00
|
|
|
m.Group("/secrets", func() {
|
|
|
|
m.Get("", org.Secrets)
|
|
|
|
m.Post("", web.Bind(forms.AddSecretForm{}), org.SecretsPost)
|
|
|
|
m.Post("/delete", org.SecretsDelete)
|
|
|
|
})
|
|
|
|
|
Refactor web route (#24080)
The old code is unnecessarily complex, and has many misuses.
Old code "wraps" a lot, wrap wrap wrap, it's difficult to understand
which kind of handler is used.
The new code uses a general approach, we do not need to write all kinds
of handlers into the "wrapper", do not need to wrap them again and
again.
New code, there are only 2 concepts:
1. HandlerProvider: `func (h any) (handlerProvider func (next)
http.Handler)`, it can be used as middleware
2. Use HandlerProvider to get the final HandlerFunc, and use it for
`r.Get()`
And we can decouple the route package from context package (see the
TODO).
# FAQ
## Is `reflect` safe?
Yes, all handlers are checked during startup, see the `preCheckHandler`
comment. If any handler is wrong, developers could know it in the first
time.
## Does `reflect` affect performance?
No. https://github.com/go-gitea/gitea/pull/24080#discussion_r1164825901
1. This reflect code only runs for each web handler call, handler is far
more slower: 10ms-50ms
2. The reflect is pretty fast (comparing to other code): 0.000265ms
3. XORM has more reflect operations already
2023-04-20 14:49:06 -04:00
|
|
|
m.RouteMethods("/delete", "GET,POST", org.SettingsDelete)
|
2022-11-20 09:08:38 -05:00
|
|
|
|
|
|
|
m.Group("/packages", func() {
|
|
|
|
m.Get("", org.Packages)
|
|
|
|
m.Group("/rules", func() {
|
|
|
|
m.Group("/add", func() {
|
|
|
|
m.Get("", org.PackagesRuleAdd)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("", web.Bind(forms.PackageCleanupRuleForm{}), org.PackagesRuleAddPost)
|
2022-11-20 09:08:38 -05:00
|
|
|
})
|
|
|
|
m.Group("/{id}", func() {
|
|
|
|
m.Get("", org.PackagesRuleEdit)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("", web.Bind(forms.PackageCleanupRuleForm{}), org.PackagesRuleEditPost)
|
2022-11-20 09:08:38 -05:00
|
|
|
m.Get("/preview", org.PackagesRulePreview)
|
|
|
|
})
|
|
|
|
})
|
2023-02-05 05:12:31 -05:00
|
|
|
m.Group("/cargo", func() {
|
|
|
|
m.Post("/initialize", org.InitializeCargoIndex)
|
|
|
|
m.Post("/rebuild", org.RebuildCargoIndex)
|
|
|
|
})
|
2022-11-20 09:08:38 -05:00
|
|
|
}, packagesEnabled)
|
2022-10-09 08:07:41 -04:00
|
|
|
}, func(ctx *context.Context) {
|
|
|
|
ctx.Data["EnableOAuth2"] = setting.OAuth2.Enable
|
2022-11-20 09:08:38 -05:00
|
|
|
ctx.Data["EnablePackages"] = setting.Packages.Enabled
|
2017-04-25 03:24:51 -04:00
|
|
|
})
|
|
|
|
}, context.OrgAssignment(true, true))
|
|
|
|
}, reqSignIn)
|
|
|
|
// ***** END: Organization *****
|
|
|
|
|
|
|
|
// ***** START: Repository *****
|
|
|
|
m.Group("/repo", func() {
|
|
|
|
m.Get("/create", repo.Create)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/create", web.Bind(forms.CreateRepoForm{}), repo.CreatePost)
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Get("/migrate", repo.Migrate)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/migrate", web.Bind(forms.MigrateRepoForm{}), repo.MigratePost)
|
2017-09-18 10:52:20 -04:00
|
|
|
m.Group("/fork", func() {
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Combo("/{repoid}").Get(repo.Fork).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.CreateRepoForm{}), repo.ForkPost)
|
2018-11-28 06:26:14 -05:00
|
|
|
}, context.RepoIDAssignment(), context.UnitTypes(), reqRepoCodeReader)
|
2022-04-07 14:59:56 -04:00
|
|
|
m.Get("/search", repo.SearchRepo)
|
2017-04-25 03:24:51 -04:00
|
|
|
}, reqSignIn)
|
|
|
|
|
2022-03-30 04:42:47 -04:00
|
|
|
m.Group("/{username}/-", func() {
|
2022-03-31 13:31:53 -04:00
|
|
|
if setting.Packages.Enabled {
|
|
|
|
m.Group("/packages", func() {
|
|
|
|
m.Get("", user.ListPackages)
|
|
|
|
m.Group("/{type}/{name}", func() {
|
|
|
|
m.Get("", user.RedirectToLastVersion)
|
|
|
|
m.Get("/versions", user.ListPackageVersions)
|
|
|
|
m.Group("/{version}", func() {
|
|
|
|
m.Get("", user.ViewPackageVersion)
|
|
|
|
m.Get("/files/{fileid}", user.DownloadPackageFile)
|
|
|
|
m.Group("/settings", func() {
|
|
|
|
m.Get("", user.PackageSettings)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("", web.Bind(forms.PackageSettingForm{}), user.PackageSettingsPost)
|
2022-03-31 13:31:53 -04:00
|
|
|
}, reqPackageAccess(perm.AccessModeWrite))
|
|
|
|
})
|
2022-03-30 04:42:47 -04:00
|
|
|
})
|
2022-06-23 06:56:39 -04:00
|
|
|
}, ignSignIn, context.PackageAssignment(), reqPackageAccess(perm.AccessModeRead))
|
2022-03-31 13:31:53 -04:00
|
|
|
}
|
2023-01-20 06:42:33 -05:00
|
|
|
|
|
|
|
m.Group("/projects", func() {
|
2023-03-10 10:18:20 -05:00
|
|
|
m.Group("", func() {
|
|
|
|
m.Get("", org.Projects)
|
|
|
|
m.Get("/{id}", org.ViewProject)
|
|
|
|
}, reqUnitAccess(unit.TypeProjects, perm.AccessModeRead))
|
2023-01-20 06:42:33 -05:00
|
|
|
m.Group("", func() { //nolint:dupl
|
|
|
|
m.Get("/new", org.NewProject)
|
|
|
|
m.Post("/new", web.Bind(forms.CreateProjectForm{}), org.NewProjectPost)
|
|
|
|
m.Group("/{id}", func() {
|
|
|
|
m.Post("", web.Bind(forms.EditProjectBoardForm{}), org.AddBoardToProjectPost)
|
|
|
|
m.Post("/delete", org.DeleteProject)
|
|
|
|
|
|
|
|
m.Get("/edit", org.EditProject)
|
|
|
|
m.Post("/edit", web.Bind(forms.CreateProjectForm{}), org.EditProjectPost)
|
|
|
|
m.Post("/{action:open|close}", org.ChangeProjectStatus)
|
|
|
|
|
|
|
|
m.Group("/{boardID}", func() {
|
|
|
|
m.Put("", web.Bind(forms.EditProjectBoardForm{}), org.EditProjectBoard)
|
|
|
|
m.Delete("", org.DeleteProjectBoard)
|
|
|
|
m.Post("/default", org.SetDefaultProjectBoard)
|
2023-04-19 10:28:28 -04:00
|
|
|
m.Post("/unsetdefault", org.UnsetDefaultProjectBoard)
|
2023-01-20 06:42:33 -05:00
|
|
|
|
|
|
|
m.Post("/move", org.MoveIssues)
|
|
|
|
})
|
|
|
|
})
|
2023-03-10 10:18:20 -05:00
|
|
|
}, reqSignIn, reqUnitAccess(unit.TypeProjects, perm.AccessModeWrite), func(ctx *context.Context) {
|
|
|
|
if ctx.ContextUser.IsIndividual() && ctx.ContextUser.ID != ctx.Doer.ID {
|
2023-01-20 06:42:33 -05:00
|
|
|
ctx.NotFound("NewProject", nil)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}, repo.MustEnableProjects)
|
|
|
|
|
2023-03-10 10:18:20 -05:00
|
|
|
m.Group("", func() {
|
|
|
|
m.Get("/code", user.CodeSearch)
|
|
|
|
}, reqUnitAccess(unit.TypeCode, perm.AccessModeRead))
|
|
|
|
}, context_service.UserAssignmentWeb(), context.OrgAssignment())
|
2022-03-30 04:42:47 -04:00
|
|
|
|
2019-01-06 17:37:30 -05:00
|
|
|
// ***** Release Attachment Download without Signin
|
2021-04-09 20:26:08 -04:00
|
|
|
m.Get("/{username}/{reponame}/releases/download/{vTag}/{fileName}", ignSignIn, context.RepoAssignment, repo.MustBeNotEmpty, repo.RedirectDownload)
|
2019-01-06 17:37:30 -05:00
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{username}/{reponame}", func() {
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("/settings", func() {
|
2022-06-12 01:43:27 -04:00
|
|
|
m.Group("", func() {
|
|
|
|
m.Combo("").Get(repo.Settings).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.RepoSettingForm{}), repo.SettingsPost)
|
2022-06-12 01:43:27 -04:00
|
|
|
}, repo.SettingsCtxData)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/avatar", web.Bind(forms.AvatarForm{}), repo.SettingsAvatar)
|
2019-05-29 22:22:26 -04:00
|
|
|
m.Post("/avatar/delete", repo.SettingsDeleteAvatar)
|
|
|
|
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("/collaboration", func() {
|
|
|
|
m.Combo("").Get(repo.Collaboration).Post(repo.CollaborationPost)
|
|
|
|
m.Post("/access_mode", repo.ChangeCollaborationAccessMode)
|
|
|
|
m.Post("/delete", repo.DeleteCollaboration)
|
2019-09-23 16:08:03 -04:00
|
|
|
m.Group("/team", func() {
|
|
|
|
m.Post("", repo.AddTeamPost)
|
|
|
|
m.Post("/delete", repo.DeleteTeam)
|
|
|
|
})
|
2017-04-25 03:24:51 -04:00
|
|
|
})
|
2021-06-25 10:28:55 -04:00
|
|
|
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("/branches", func() {
|
2023-01-16 03:00:22 -05:00
|
|
|
m.Post("/", repo.SetDefaultBranchPost)
|
|
|
|
}, repo.MustBeNotEmpty)
|
|
|
|
|
|
|
|
m.Group("/branches", func() {
|
|
|
|
m.Get("/", repo.ProtectedBranchRules)
|
|
|
|
m.Combo("/edit").Get(repo.SettingsProtectedBranch).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.ProtectBranchForm{}), context.RepoMustNotBeArchived(), repo.SettingsProtectedBranchPost)
|
2023-01-16 03:00:22 -05:00
|
|
|
m.Post("/{id}/delete", repo.DeleteProtectedBranchRulePost)
|
2019-01-17 19:01:04 -05:00
|
|
|
}, repo.MustBeNotEmpty)
|
2023-01-16 03:00:22 -05:00
|
|
|
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/rename_branch", web.Bind(forms.RenameBranchForm{}), context.RepoMustNotBeArchived(), repo.RenameBranchPost)
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2021-06-25 10:28:55 -04:00
|
|
|
m.Group("/tags", func() {
|
|
|
|
m.Get("", repo.Tags)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("", web.Bind(forms.ProtectTagForm{}), context.RepoMustNotBeArchived(), repo.NewProtectedTagPost)
|
2021-06-25 10:28:55 -04:00
|
|
|
m.Post("/delete", context.RepoMustNotBeArchived(), repo.DeleteProtectedTagPost)
|
|
|
|
m.Get("/{id}", repo.EditProtectedTag)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/{id}", web.Bind(forms.ProtectTagForm{}), context.RepoMustNotBeArchived(), repo.EditProtectedTagPost)
|
2021-06-25 10:28:55 -04:00
|
|
|
})
|
|
|
|
|
2021-02-11 12:34:34 -05:00
|
|
|
m.Group("/hooks/git", func() {
|
|
|
|
m.Get("", repo.GitHooks)
|
|
|
|
m.Combo("/{name}").Get(repo.GitHooksEdit).
|
|
|
|
Post(repo.GitHooksEditPost)
|
|
|
|
}, context.GitHookService())
|
|
|
|
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("/hooks", func() {
|
|
|
|
m.Get("", repo.Webhooks)
|
|
|
|
m.Post("/delete", repo.DeleteWebhook)
|
2023-03-10 09:28:32 -05:00
|
|
|
addWebhookAddRoutes()
|
2022-01-05 16:00:20 -05:00
|
|
|
m.Group("/{id}", func() {
|
|
|
|
m.Get("", repo.WebHooksEdit)
|
|
|
|
m.Post("/test", repo.TestWebhook)
|
|
|
|
m.Post("/replay/{uuid}", repo.ReplayWebhook)
|
|
|
|
})
|
2023-03-10 09:28:32 -05:00
|
|
|
addWebhookEditRoutes()
|
|
|
|
}, webhooksEnabled, func(ctx *context.Context) {
|
|
|
|
ctx.Data["IsRepositoryWebhook"] = true
|
|
|
|
})
|
2017-04-25 03:24:51 -04:00
|
|
|
|
|
|
|
m.Group("/keys", func() {
|
|
|
|
m.Combo("").Get(repo.DeployKeys).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.AddKeyForm{}), repo.DeployKeysPost)
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Post("/delete", repo.DeleteDeployKey)
|
2023-02-01 07:53:04 -05:00
|
|
|
})
|
|
|
|
|
|
|
|
m.Group("/secrets", func() {
|
|
|
|
m.Get("", repo.Secrets)
|
|
|
|
m.Post("", web.Bind(forms.AddSecretForm{}), repo.SecretsPost)
|
|
|
|
m.Post("/delete", repo.DeleteSecret)
|
2017-04-25 03:24:51 -04:00
|
|
|
})
|
|
|
|
|
2019-10-28 14:31:55 -04:00
|
|
|
m.Group("/lfs", func() {
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/", repo.LFSFiles)
|
|
|
|
m.Get("/show/{oid}", repo.LFSFileGet)
|
|
|
|
m.Post("/delete/{oid}", repo.LFSDelete)
|
2019-10-28 14:31:55 -04:00
|
|
|
m.Get("/pointers", repo.LFSPointerFiles)
|
|
|
|
m.Post("/pointers/associate", repo.LFSAutoAssociate)
|
|
|
|
m.Get("/find", repo.LFSFileFind)
|
2019-12-12 08:18:07 -05:00
|
|
|
m.Group("/locks", func() {
|
|
|
|
m.Get("/", repo.LFSLocks)
|
|
|
|
m.Post("/", repo.LFSLockFile)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Post("/{lid}/unlock", repo.LFSUnlock)
|
2019-12-12 08:18:07 -05:00
|
|
|
})
|
2019-10-28 14:31:55 -04:00
|
|
|
})
|
Implement actions (#21937)
Close #13539.
Co-authored by: @lunny @appleboy @fuxiaohei and others.
Related projects:
- https://gitea.com/gitea/actions-proto-def
- https://gitea.com/gitea/actions-proto-go
- https://gitea.com/gitea/act
- https://gitea.com/gitea/act_runner
### Summary
The target of this PR is to bring a basic implementation of "Actions",
an internal CI/CD system of Gitea. That means even though it has been
merged, the state of the feature is **EXPERIMENTAL**, and please note
that:
- It is disabled by default;
- It shouldn't be used in a production environment currently;
- It shouldn't be used in a public Gitea instance currently;
- Breaking changes may be made before it's stable.
**Please comment on #13539 if you have any different product design
ideas**, all decisions reached there will be adopted here. But in this
PR, we don't talk about **naming, feature-creep or alternatives**.
### ⚠️ Breaking
`gitea-actions` will become a reserved user name. If a user with the
name already exists in the database, it is recommended to rename it.
### Some important reviews
- What is `DEFAULT_ACTIONS_URL` in `app.ini` for?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1055954954
- Why the api for runners is not under the normal `/api/v1` prefix?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061173592
- Why DBFS?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061301178
- Why ignore events triggered by `gitea-actions` bot?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1063254103
- Why there's no permission control for actions?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1090229868
### What it looks like
<details>
#### Manage runners
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205870657-c72f590e-2e08-4cd4-be7f-2e0abb299bbf.png">
#### List runs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872794-50fde990-2b45-48c1-a178-908e4ec5b627.png">
#### View logs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872501-9b7b9000-9542-4991-8f55-18ccdada77c3.png">
</details>
### How to try it
<details>
#### 1. Start Gitea
Clone this branch and [install from
source](https://docs.gitea.io/en-us/install-from-source).
Add additional configurations in `app.ini` to enable Actions:
```ini
[actions]
ENABLED = true
```
Start it.
If all is well, you'll see the management page of runners:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205877365-8e30a780-9b10-4154-b3e8-ee6c3cb35a59.png">
#### 2. Start runner
Clone the [act_runner](https://gitea.com/gitea/act_runner), and follow
the
[README](https://gitea.com/gitea/act_runner/src/branch/main/README.md)
to start it.
If all is well, you'll see a new runner has been added:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205878000-216f5937-e696-470d-b66c-8473987d91c3.png">
#### 3. Enable actions for a repo
Create a new repo or open an existing one, check the `Actions` checkbox
in settings and submit.
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879705-53e09208-73c0-4b3e-a123-2dcf9aba4b9c.png">
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879383-23f3d08f-1a85-41dd-a8b3-54e2ee6453e8.png">
If all is well, you'll see a new tab "Actions":
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205881648-a8072d8c-5803-4d76-b8a8-9b2fb49516c1.png">
#### 4. Upload workflow files
Upload some workflow files to `.gitea/workflows/xxx.yaml`, you can
follow the [quickstart](https://docs.github.com/en/actions/quickstart)
of GitHub Actions. Yes, Gitea Actions is compatible with GitHub Actions
in most cases, you can use the same demo:
```yaml
name: GitHub Actions Demo
run-name: ${{ github.actor }} is testing out GitHub Actions 🚀
on: [push]
jobs:
Explore-GitHub-Actions:
runs-on: ubuntu-latest
steps:
- run: echo "🎉 The job was automatically triggered by a ${{ github.event_name }} event."
- run: echo "🐧 This job is now running on a ${{ runner.os }} server hosted by GitHub!"
- run: echo "🔎 The name of your branch is ${{ github.ref }} and your repository is ${{ github.repository }}."
- name: Check out repository code
uses: actions/checkout@v3
- run: echo "💡 The ${{ github.repository }} repository has been cloned to the runner."
- run: echo "🖥️ The workflow is now ready to test your code on the runner."
- name: List files in the repository
run: |
ls ${{ github.workspace }}
- run: echo "🍏 This job's status is ${{ job.status }}."
```
If all is well, you'll see a new run in `Actions` tab:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884473-79a874bc-171b-4aaf-acd5-0241a45c3b53.png">
#### 5. Check the logs of jobs
Click a run and you'll see the logs:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884800-994b0374-67f7-48ff-be9a-4c53f3141547.png">
#### 6. Go on
You can try more examples in [the
documents](https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions)
of GitHub Actions, then you might find a lot of bugs.
Come on, PRs are welcome.
</details>
See also: [Feature Preview: Gitea
Actions](https://blog.gitea.io/2022/12/feature-preview-gitea-actions/)
---------
Co-authored-by: a1012112796 <1012112796@qq.com>
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: delvh <dev.lh@web.de>
Co-authored-by: ChristopherHX <christopher.homberger@web.de>
Co-authored-by: John Olheiser <john.olheiser@gmail.com>
2023-01-30 20:45:19 -05:00
|
|
|
|
|
|
|
m.Group("/runners", func() {
|
|
|
|
m.Get("", repo.Runners)
|
|
|
|
m.Combo("/{runnerid}").Get(repo.RunnersEdit).
|
|
|
|
Post(web.Bind(forms.EditRunnerForm{}), repo.RunnersEditPost)
|
|
|
|
m.Post("/{runnerid}/delete", repo.RunnerDeletePost)
|
|
|
|
m.Get("/reset_registration_token", repo.ResetRunnerRegistrationToken)
|
|
|
|
}, actions.MustEnableActions)
|
2017-04-25 03:24:51 -04:00
|
|
|
}, func(ctx *context.Context) {
|
|
|
|
ctx.Data["PageIsSettings"] = true
|
2019-10-28 14:31:55 -04:00
|
|
|
ctx.Data["LFSStartServer"] = setting.LFS.StartServer
|
2017-07-16 22:04:43 -04:00
|
|
|
})
|
2021-04-09 20:26:08 -04:00
|
|
|
}, reqSignIn, context.RepoAssignment, context.UnitTypes(), reqRepoAdmin, context.RepoRef())
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2021-04-09 20:26:08 -04:00
|
|
|
m.Post("/{username}/{reponame}/action/{action}", reqSignIn, context.RepoAssignment, context.UnitTypes(), repo.Action)
|
2017-05-18 10:54:24 -04:00
|
|
|
|
2020-05-03 05:07:04 -04:00
|
|
|
// Grouping for those endpoints not requiring authentication
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{username}/{reponame}", func() {
|
2020-05-03 05:07:04 -04:00
|
|
|
m.Group("/milestone", func() {
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/{id}", repo.MilestoneIssuesAndPulls)
|
2020-05-03 05:07:04 -04:00
|
|
|
}, reqRepoIssuesOrPullsReader, context.RepoRef())
|
2022-06-09 07:15:08 -04:00
|
|
|
m.Get("/find/*", repo.FindFiles)
|
|
|
|
m.Group("/tree-list", func() {
|
|
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.TreeList)
|
|
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.TreeList)
|
|
|
|
m.Get("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.TreeList)
|
|
|
|
})
|
2021-12-17 17:20:27 -05:00
|
|
|
m.Get("/compare", repo.MustBeNotEmpty, reqRepoCodeReader, repo.SetEditorconfigIfExists, ignSignIn, repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.CompareDiff)
|
2020-05-04 18:44:30 -04:00
|
|
|
m.Combo("/compare/*", repo.MustBeNotEmpty, reqRepoCodeReader, repo.SetEditorconfigIfExists).
|
2021-02-12 23:35:43 -05:00
|
|
|
Get(ignSignIn, repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.CompareDiff).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(reqSignIn, context.RepoMustNotBeArchived(), reqRepoPullsReader, repo.MustAllowPulls, web.Bind(forms.CreateIssueForm{}), repo.SetWhitespaceBehavior, repo.CompareAndPullRequestPost)
|
2022-06-04 16:10:54 -04:00
|
|
|
m.Group("/{type:issues|pulls}", func() {
|
|
|
|
m.Group("/{index}", func() {
|
|
|
|
m.Get("/info", repo.GetIssueInfo)
|
|
|
|
})
|
|
|
|
})
|
2021-04-09 20:26:08 -04:00
|
|
|
}, context.RepoAssignment, context.UnitTypes())
|
2020-05-03 05:07:04 -04:00
|
|
|
|
|
|
|
// Grouping for those endpoints that do require authentication
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{username}/{reponame}", func() {
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("/issues", func() {
|
2020-09-11 10:48:39 -04:00
|
|
|
m.Group("/new", func() {
|
|
|
|
m.Combo("").Get(context.RepoRef(), repo.NewIssue).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.CreateIssueForm{}), repo.NewIssuePost)
|
2020-09-11 10:48:39 -04:00
|
|
|
m.Get("/choose", context.RepoRef(), repo.NewIssueChooseTemplate)
|
|
|
|
})
|
2022-04-07 14:59:56 -04:00
|
|
|
m.Get("/search", repo.ListIssues)
|
2019-01-23 13:58:38 -05:00
|
|
|
}, context.RepoMustNotBeArchived(), reqRepoIssueReader)
|
2021-02-18 09:47:23 -05:00
|
|
|
// FIXME: should use different URLs but mostly same logic for comments of issue and pull request.
|
2017-10-16 03:55:43 -04:00
|
|
|
// So they can apply their own enable/disable logic on routers.
|
2021-12-16 14:01:14 -05:00
|
|
|
m.Group("/{type:issues|pulls}", func() {
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{index}", func() {
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Post("/title", repo.UpdateIssueTitle)
|
|
|
|
m.Post("/content", repo.UpdateIssueContent)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/deadline", web.Bind(structs.EditDeadlineOption{}), repo.UpdateIssueDeadline)
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Post("/watch", repo.IssueWatch)
|
2020-09-08 12:29:51 -04:00
|
|
|
m.Post("/ref", repo.UpdateIssueRef)
|
2022-05-07 14:28:10 -04:00
|
|
|
m.Post("/viewed-files", repo.UpdateViewedFiles)
|
2018-07-17 17:23:58 -04:00
|
|
|
m.Group("/dependency", func() {
|
|
|
|
m.Post("/add", repo.AddDependency)
|
|
|
|
m.Post("/delete", repo.RemoveDependency)
|
|
|
|
})
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Combo("/comments").Post(repo.MustAllowUserComment, web.Bind(forms.CreateCommentForm{}), repo.NewComment)
|
2017-09-12 02:48:13 -04:00
|
|
|
m.Group("/times", func() {
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/add", web.Bind(forms.AddTimeManuallyForm{}), repo.AddTimeManually)
|
2021-02-19 05:52:11 -05:00
|
|
|
m.Post("/{timeid}/delete", repo.DeleteTime)
|
2017-09-12 02:48:13 -04:00
|
|
|
m.Group("/stopwatch", func() {
|
|
|
|
m.Post("/toggle", repo.IssueStopwatch)
|
|
|
|
m.Post("/cancel", repo.CancelStopwatch)
|
|
|
|
})
|
|
|
|
})
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/reactions/{action}", web.Bind(forms.ReactionForm{}), repo.ChangeIssueReaction)
|
2022-12-12 10:02:51 -05:00
|
|
|
m.Post("/lock", reqRepoIssuesOrPullsWriter, web.Bind(forms.IssueLockForm{}), repo.LockIssue)
|
|
|
|
m.Post("/unlock", reqRepoIssuesOrPullsWriter, repo.UnlockIssue)
|
2022-03-08 19:38:11 -05:00
|
|
|
m.Post("/delete", reqRepoAdmin, repo.DeleteIssue)
|
2019-01-23 13:58:38 -05:00
|
|
|
}, context.RepoMustNotBeArchived())
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{index}", func() {
|
2020-10-05 01:49:33 -04:00
|
|
|
m.Get("/attachments", repo.GetIssueAttachments)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/attachments/{uuid}", repo.GetAttachment)
|
2020-10-05 01:49:33 -04:00
|
|
|
})
|
2021-10-10 18:40:03 -04:00
|
|
|
m.Group("/{index}", func() {
|
|
|
|
m.Post("/content-history/soft-delete", repo.SoftDeleteContentHistory)
|
|
|
|
})
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2018-11-28 06:26:14 -05:00
|
|
|
m.Post("/labels", reqRepoIssuesOrPullsWriter, repo.UpdateIssueLabel)
|
|
|
|
m.Post("/milestone", reqRepoIssuesOrPullsWriter, repo.UpdateIssueMilestone)
|
2022-06-30 11:55:08 -04:00
|
|
|
m.Post("/projects", reqRepoIssuesOrPullsWriter, reqRepoProjectsReader, repo.UpdateIssueProject)
|
2018-11-28 06:26:14 -05:00
|
|
|
m.Post("/assignee", reqRepoIssuesOrPullsWriter, repo.UpdateIssueAssignee)
|
2020-04-06 12:33:34 -04:00
|
|
|
m.Post("/request_review", reqRepoIssuesOrPullsReader, repo.UpdatePullReviewRequest)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/dismiss_review", reqRepoAdmin, web.Bind(forms.DismissReviewForm{}), repo.DismissReview)
|
2018-11-28 06:26:14 -05:00
|
|
|
m.Post("/status", reqRepoIssuesOrPullsWriter, repo.UpdateIssueStatus)
|
2020-04-18 09:50:25 -04:00
|
|
|
m.Post("/resolve_conversation", reqRepoIssuesOrPullsReader, repo.UpdateResolveConversation)
|
2020-10-05 01:49:33 -04:00
|
|
|
m.Post("/attachments", repo.UploadIssueAttachment)
|
|
|
|
m.Post("/attachments/remove", repo.DeleteAttachment)
|
2019-01-23 13:58:38 -05:00
|
|
|
}, context.RepoMustNotBeArchived())
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/comments/{id}", func() {
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Post("", repo.UpdateCommentContent)
|
|
|
|
m.Post("/delete", repo.DeleteComment)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/reactions/{action}", web.Bind(forms.ReactionForm{}), repo.ChangeCommentReaction)
|
2019-01-23 13:58:38 -05:00
|
|
|
}, context.RepoMustNotBeArchived())
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/comments/{id}", func() {
|
2020-10-05 01:49:33 -04:00
|
|
|
m.Get("/attachments", repo.GetCommentAttachments)
|
|
|
|
})
|
2023-03-24 02:12:23 -04:00
|
|
|
m.Post("/markup", web.Bind(structs.MarkupOption{}), misc.Markup)
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("/labels", func() {
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/new", web.Bind(forms.CreateLabelForm{}), repo.NewLabel)
|
|
|
|
m.Post("/edit", web.Bind(forms.CreateLabelForm{}), repo.UpdateLabel)
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Post("/delete", repo.DeleteLabel)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/initialize", web.Bind(forms.InitializeLabelsForm{}), repo.InitializeLabels)
|
2019-01-23 13:58:38 -05:00
|
|
|
}, context.RepoMustNotBeArchived(), reqRepoIssuesOrPullsWriter, context.RepoRef())
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("/milestones", func() {
|
|
|
|
m.Combo("/new").Get(repo.NewMilestone).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.CreateMilestoneForm{}), repo.NewMilestonePost)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/{id}/edit", repo.EditMilestone)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/{id}/edit", web.Bind(forms.CreateMilestoneForm{}), repo.EditMilestonePost)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Post("/{id}/{action}", repo.ChangeMilestoneStatus)
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Post("/delete", repo.DeleteMilestone)
|
2019-01-23 13:58:38 -05:00
|
|
|
}, context.RepoMustNotBeArchived(), reqRepoIssuesOrPullsWriter, context.RepoRef())
|
2019-12-16 01:20:25 -05:00
|
|
|
m.Group("/pull", func() {
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Post("/{index}/target_branch", repo.UpdatePullRequestTarget)
|
2019-12-16 01:20:25 -05:00
|
|
|
}, context.RepoMustNotBeArchived())
|
2017-04-25 03:24:51 -04:00
|
|
|
|
|
|
|
m.Group("", func() {
|
|
|
|
m.Group("", func() {
|
2017-10-29 22:04:25 -04:00
|
|
|
m.Combo("/_edit/*").Get(repo.EditFile).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.EditRepoFileForm{}), repo.EditFilePost)
|
2017-10-29 22:04:25 -04:00
|
|
|
m.Combo("/_new/*").Get(repo.NewFile).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.EditRepoFileForm{}), repo.NewFilePost)
|
|
|
|
m.Post("/_preview/*", web.Bind(forms.EditPreviewDiffForm{}), repo.DiffPreviewPost)
|
2017-10-29 22:04:25 -04:00
|
|
|
m.Combo("/_delete/*").Get(repo.DeleteFile).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.DeleteRepoFileForm{}), repo.DeleteFilePost)
|
2017-10-29 22:04:25 -04:00
|
|
|
m.Combo("/_upload/*", repo.MustBeAbleToUpload).
|
|
|
|
Get(repo.UploadFile).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.UploadRepoFileForm{}), repo.UploadFilePost)
|
2022-02-09 15:28:55 -05:00
|
|
|
m.Combo("/_diffpatch/*").Get(repo.NewDiffPatch).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.EditRepoFileForm{}), repo.NewDiffPatchPost)
|
2022-02-09 15:28:55 -05:00
|
|
|
m.Combo("/_cherrypick/{sha:([a-f0-9]{7,40})}/*").Get(repo.CherryPick).
|
2022-12-12 03:09:26 -05:00
|
|
|
Post(web.Bind(forms.CherryPickForm{}), repo.CherryPickPost)
|
2022-04-28 11:45:33 -04:00
|
|
|
}, repo.MustBeEditable)
|
2017-10-29 22:04:25 -04:00
|
|
|
m.Group("", func() {
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Post("/upload-file", repo.UploadFileToServer)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/upload-remove", web.Bind(forms.RemoveUploadFileForm{}), repo.RemoveUploadFileFromServer)
|
2022-04-28 11:45:33 -04:00
|
|
|
}, repo.MustBeEditable, repo.MustBeAbleToUpload)
|
2023-04-19 09:40:42 -04:00
|
|
|
}, context.RepoRef(), canEnableEditor, context.RepoMustNotBeArchived())
|
2017-10-15 15:59:24 -04:00
|
|
|
|
|
|
|
m.Group("/branches", func() {
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/_new", func() {
|
2017-10-29 22:04:25 -04:00
|
|
|
m.Post("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.CreateBranch)
|
|
|
|
m.Post("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.CreateBranch)
|
|
|
|
m.Post("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.CreateBranch)
|
2022-12-12 03:09:26 -05:00
|
|
|
}, web.Bind(forms.NewBranchForm{}))
|
2017-10-25 20:49:16 -04:00
|
|
|
m.Post("/delete", repo.DeleteBranchPost)
|
|
|
|
m.Post("/restore", repo.RestoreBranchPost)
|
2019-01-23 13:58:38 -05:00
|
|
|
}, context.RepoMustNotBeArchived(), reqRepoCodeWriter, repo.MustBeNotEmpty)
|
2021-04-09 20:26:08 -04:00
|
|
|
}, reqSignIn, context.RepoAssignment, context.UnitTypes())
|
2017-05-18 10:54:24 -04:00
|
|
|
|
|
|
|
// Releases
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{username}/{reponame}", func() {
|
2022-12-21 16:06:26 -05:00
|
|
|
m.Group("/tags", func() {
|
|
|
|
m.Get("", repo.TagsList)
|
|
|
|
m.Get(".rss", feedEnabled, repo.TagsListFeedRSS)
|
|
|
|
m.Get(".atom", feedEnabled, repo.TagsListFeedAtom)
|
|
|
|
}, func(ctx *context.Context) {
|
|
|
|
ctx.Data["EnableFeed"] = setting.EnableFeed
|
|
|
|
}, repo.MustBeNotEmpty, reqRepoCodeReader, context.RepoRefByType(context.RepoRefTag, true))
|
2017-05-18 10:54:24 -04:00
|
|
|
m.Group("/releases", func() {
|
2020-04-18 10:47:15 -04:00
|
|
|
m.Get("/", repo.Releases)
|
2020-09-17 14:24:23 -04:00
|
|
|
m.Get("/tag/*", repo.SingleRelease)
|
2020-04-18 10:47:15 -04:00
|
|
|
m.Get("/latest", repo.LatestRelease)
|
2022-12-21 16:06:26 -05:00
|
|
|
m.Get(".rss", feedEnabled, repo.ReleasesFeedRSS)
|
|
|
|
m.Get(".atom", feedEnabled, repo.ReleasesFeedAtom)
|
|
|
|
}, func(ctx *context.Context) {
|
|
|
|
ctx.Data["EnableFeed"] = setting.EnableFeed
|
2021-05-05 23:12:50 -04:00
|
|
|
}, repo.MustBeNotEmpty, reqRepoReleaseReader, context.RepoRefByType(context.RepoRefTag, true))
|
|
|
|
m.Get("/releases/attachments/{uuid}", repo.GetAttachment, repo.MustBeNotEmpty, reqRepoReleaseReader)
|
2017-06-17 23:38:24 -04:00
|
|
|
m.Group("/releases", func() {
|
2017-05-18 10:54:24 -04:00
|
|
|
m.Get("/new", repo.NewRelease)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/new", web.Bind(forms.NewReleaseForm{}), repo.NewReleasePost)
|
2017-05-18 10:54:24 -04:00
|
|
|
m.Post("/delete", repo.DeleteRelease)
|
2020-10-05 01:49:33 -04:00
|
|
|
m.Post("/attachments", repo.UploadReleaseAttachment)
|
|
|
|
m.Post("/attachments/remove", repo.DeleteAttachment)
|
2019-01-23 13:58:38 -05:00
|
|
|
}, reqSignIn, repo.MustBeNotEmpty, context.RepoMustNotBeArchived(), reqRepoReleaseWriter, context.RepoRef())
|
2020-11-02 18:10:22 -05:00
|
|
|
m.Post("/tags/delete", repo.DeleteTag, reqSignIn,
|
|
|
|
repo.MustBeNotEmpty, context.RepoMustNotBeArchived(), reqRepoCodeWriter, context.RepoRef())
|
2017-05-18 10:54:24 -04:00
|
|
|
m.Group("/releases", func() {
|
|
|
|
m.Get("/edit/*", repo.EditRelease)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/edit/*", web.Bind(forms.EditReleaseForm{}), repo.EditReleasePost)
|
2019-01-23 13:58:38 -05:00
|
|
|
}, reqSignIn, repo.MustBeNotEmpty, context.RepoMustNotBeArchived(), reqRepoReleaseWriter, func(ctx *context.Context) {
|
2017-05-18 10:54:24 -04:00
|
|
|
var err error
|
|
|
|
ctx.Repo.Commit, err = ctx.Repo.GitRepo.GetBranchCommit(ctx.Repo.Repository.DefaultBranch)
|
|
|
|
if err != nil {
|
2018-01-10 16:34:17 -05:00
|
|
|
ctx.ServerError("GetBranchCommit", err)
|
2017-05-18 10:54:24 -04:00
|
|
|
return
|
|
|
|
}
|
2017-10-25 21:37:33 -04:00
|
|
|
ctx.Repo.CommitsCount, err = ctx.Repo.GetCommitsCount()
|
2017-05-18 10:54:24 -04:00
|
|
|
if err != nil {
|
2018-01-10 16:34:17 -05:00
|
|
|
ctx.ServerError("GetCommitsCount", err)
|
2017-05-18 10:54:24 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx.Data["CommitsCount"] = ctx.Repo.CommitsCount
|
2022-07-25 11:39:42 -04:00
|
|
|
ctx.Repo.GitRepo.LastCommitCache = git.NewLastCommitCache(ctx.Repo.CommitsCount, ctx.Repo.Repository.FullName(), ctx.Repo.GitRepo, cache.GetCache())
|
2017-05-18 10:54:24 -04:00
|
|
|
})
|
2021-04-09 20:26:08 -04:00
|
|
|
}, ignSignIn, context.RepoAssignment, context.UnitTypes(), reqRepoReleaseReader)
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2021-07-23 14:08:04 -04:00
|
|
|
// to maintain compatibility with old attachments
|
|
|
|
m.Group("/{username}/{reponame}", func() {
|
|
|
|
m.Get("/attachments/{uuid}", repo.GetAttachment)
|
|
|
|
}, ignSignIn, context.RepoAssignment, context.UnitTypes())
|
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{username}/{reponame}", func() {
|
2018-06-21 05:09:46 -04:00
|
|
|
m.Post("/topics", repo.TopicsPost)
|
2021-04-09 20:26:08 -04:00
|
|
|
}, context.RepoAssignment, context.RepoMustNotBeArchived(), reqRepoAdmin)
|
2018-04-10 22:51:44 -04:00
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{username}/{reponame}", func() {
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("", func() {
|
2023-04-06 20:11:02 -04:00
|
|
|
m.Group("/{type:issues|pulls}", func() {
|
|
|
|
m.Get("", repo.Issues)
|
|
|
|
m.Get("/posters", repo.IssuePosters)
|
|
|
|
})
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/{type:issues|pulls}/{index}", repo.ViewIssue)
|
2021-10-10 18:40:03 -04:00
|
|
|
m.Group("/{type:issues|pulls}/{index}/content-history", func() {
|
|
|
|
m.Get("/overview", repo.GetContentHistoryOverview)
|
|
|
|
m.Get("/list", repo.GetContentHistoryList)
|
|
|
|
m.Get("/detail", repo.GetContentHistoryDetail)
|
|
|
|
})
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/labels", reqRepoIssuesOrPullsReader, repo.RetrieveLabels, repo.Labels)
|
2018-11-28 06:26:14 -05:00
|
|
|
m.Get("/milestones", reqRepoIssuesOrPullsReader, repo.Milestones)
|
2017-06-03 01:56:36 -04:00
|
|
|
}, context.RepoRef())
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2022-03-31 13:31:53 -04:00
|
|
|
if setting.Packages.Enabled {
|
|
|
|
m.Get("/packages", repo.Packages)
|
|
|
|
}
|
2022-03-30 04:42:47 -04:00
|
|
|
|
2020-08-16 23:07:38 -04:00
|
|
|
m.Group("/projects", func() {
|
|
|
|
m.Get("", repo.Projects)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/{id}", repo.ViewProject)
|
2023-01-20 06:42:33 -05:00
|
|
|
m.Group("", func() { //nolint:dupl
|
2020-08-22 02:58:59 -04:00
|
|
|
m.Get("/new", repo.NewProject)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/new", web.Bind(forms.CreateProjectForm{}), repo.NewProjectPost)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{id}", func() {
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("", web.Bind(forms.EditProjectBoardForm{}), repo.AddBoardToProjectPost)
|
2020-08-22 02:58:59 -04:00
|
|
|
m.Post("/delete", repo.DeleteProject)
|
|
|
|
|
|
|
|
m.Get("/edit", repo.EditProject)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/edit", web.Bind(forms.CreateProjectForm{}), repo.EditProjectPost)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Post("/{action:open|close}", repo.ChangeProjectStatus)
|
2020-08-22 02:58:59 -04:00
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{boardID}", func() {
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Put("", web.Bind(forms.EditProjectBoardForm{}), repo.EditProjectBoard)
|
2020-08-22 02:58:59 -04:00
|
|
|
m.Delete("", repo.DeleteProjectBoard)
|
2021-01-15 15:29:32 -05:00
|
|
|
m.Post("/default", repo.SetDefaultProjectBoard)
|
2023-04-19 10:28:28 -04:00
|
|
|
m.Post("/unsetdefault", repo.UnSetDefaultProjectBoard)
|
2020-08-22 02:58:59 -04:00
|
|
|
|
2021-12-08 01:57:18 -05:00
|
|
|
m.Post("/move", repo.MoveIssues)
|
2020-08-22 02:58:59 -04:00
|
|
|
})
|
2020-08-16 23:07:38 -04:00
|
|
|
})
|
2020-08-22 02:58:59 -04:00
|
|
|
}, reqRepoProjectsWriter, context.RepoMustNotBeArchived())
|
2020-08-16 23:07:38 -04:00
|
|
|
}, reqRepoProjectsReader, repo.MustEnableProjects)
|
|
|
|
|
Implement actions (#21937)
Close #13539.
Co-authored by: @lunny @appleboy @fuxiaohei and others.
Related projects:
- https://gitea.com/gitea/actions-proto-def
- https://gitea.com/gitea/actions-proto-go
- https://gitea.com/gitea/act
- https://gitea.com/gitea/act_runner
### Summary
The target of this PR is to bring a basic implementation of "Actions",
an internal CI/CD system of Gitea. That means even though it has been
merged, the state of the feature is **EXPERIMENTAL**, and please note
that:
- It is disabled by default;
- It shouldn't be used in a production environment currently;
- It shouldn't be used in a public Gitea instance currently;
- Breaking changes may be made before it's stable.
**Please comment on #13539 if you have any different product design
ideas**, all decisions reached there will be adopted here. But in this
PR, we don't talk about **naming, feature-creep or alternatives**.
### ⚠️ Breaking
`gitea-actions` will become a reserved user name. If a user with the
name already exists in the database, it is recommended to rename it.
### Some important reviews
- What is `DEFAULT_ACTIONS_URL` in `app.ini` for?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1055954954
- Why the api for runners is not under the normal `/api/v1` prefix?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061173592
- Why DBFS?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061301178
- Why ignore events triggered by `gitea-actions` bot?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1063254103
- Why there's no permission control for actions?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1090229868
### What it looks like
<details>
#### Manage runners
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205870657-c72f590e-2e08-4cd4-be7f-2e0abb299bbf.png">
#### List runs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872794-50fde990-2b45-48c1-a178-908e4ec5b627.png">
#### View logs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872501-9b7b9000-9542-4991-8f55-18ccdada77c3.png">
</details>
### How to try it
<details>
#### 1. Start Gitea
Clone this branch and [install from
source](https://docs.gitea.io/en-us/install-from-source).
Add additional configurations in `app.ini` to enable Actions:
```ini
[actions]
ENABLED = true
```
Start it.
If all is well, you'll see the management page of runners:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205877365-8e30a780-9b10-4154-b3e8-ee6c3cb35a59.png">
#### 2. Start runner
Clone the [act_runner](https://gitea.com/gitea/act_runner), and follow
the
[README](https://gitea.com/gitea/act_runner/src/branch/main/README.md)
to start it.
If all is well, you'll see a new runner has been added:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205878000-216f5937-e696-470d-b66c-8473987d91c3.png">
#### 3. Enable actions for a repo
Create a new repo or open an existing one, check the `Actions` checkbox
in settings and submit.
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879705-53e09208-73c0-4b3e-a123-2dcf9aba4b9c.png">
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879383-23f3d08f-1a85-41dd-a8b3-54e2ee6453e8.png">
If all is well, you'll see a new tab "Actions":
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205881648-a8072d8c-5803-4d76-b8a8-9b2fb49516c1.png">
#### 4. Upload workflow files
Upload some workflow files to `.gitea/workflows/xxx.yaml`, you can
follow the [quickstart](https://docs.github.com/en/actions/quickstart)
of GitHub Actions. Yes, Gitea Actions is compatible with GitHub Actions
in most cases, you can use the same demo:
```yaml
name: GitHub Actions Demo
run-name: ${{ github.actor }} is testing out GitHub Actions 🚀
on: [push]
jobs:
Explore-GitHub-Actions:
runs-on: ubuntu-latest
steps:
- run: echo "🎉 The job was automatically triggered by a ${{ github.event_name }} event."
- run: echo "🐧 This job is now running on a ${{ runner.os }} server hosted by GitHub!"
- run: echo "🔎 The name of your branch is ${{ github.ref }} and your repository is ${{ github.repository }}."
- name: Check out repository code
uses: actions/checkout@v3
- run: echo "💡 The ${{ github.repository }} repository has been cloned to the runner."
- run: echo "🖥️ The workflow is now ready to test your code on the runner."
- name: List files in the repository
run: |
ls ${{ github.workspace }}
- run: echo "🍏 This job's status is ${{ job.status }}."
```
If all is well, you'll see a new run in `Actions` tab:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884473-79a874bc-171b-4aaf-acd5-0241a45c3b53.png">
#### 5. Check the logs of jobs
Click a run and you'll see the logs:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884800-994b0374-67f7-48ff-be9a-4c53f3141547.png">
#### 6. Go on
You can try more examples in [the
documents](https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions)
of GitHub Actions, then you might find a lot of bugs.
Come on, PRs are welcome.
</details>
See also: [Feature Preview: Gitea
Actions](https://blog.gitea.io/2022/12/feature-preview-gitea-actions/)
---------
Co-authored-by: a1012112796 <1012112796@qq.com>
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: delvh <dev.lh@web.de>
Co-authored-by: ChristopherHX <christopher.homberger@web.de>
Co-authored-by: John Olheiser <john.olheiser@gmail.com>
2023-01-30 20:45:19 -05:00
|
|
|
m.Group("/actions", func() {
|
|
|
|
m.Get("", actions.List)
|
|
|
|
|
|
|
|
m.Group("/runs/{run}", func() {
|
|
|
|
m.Combo("").
|
|
|
|
Get(actions.View).
|
|
|
|
Post(web.Bind(actions.ViewRequest{}), actions.ViewPost)
|
|
|
|
m.Group("/jobs/{job}", func() {
|
|
|
|
m.Combo("").
|
|
|
|
Get(actions.View).
|
|
|
|
Post(web.Bind(actions.ViewRequest{}), actions.ViewPost)
|
|
|
|
m.Post("/rerun", reqRepoActionsWriter, actions.Rerun)
|
|
|
|
})
|
|
|
|
m.Post("/cancel", reqRepoActionsWriter, actions.Cancel)
|
2023-02-24 02:58:49 -05:00
|
|
|
m.Post("/approve", reqRepoActionsWriter, actions.Approve)
|
Implement actions (#21937)
Close #13539.
Co-authored by: @lunny @appleboy @fuxiaohei and others.
Related projects:
- https://gitea.com/gitea/actions-proto-def
- https://gitea.com/gitea/actions-proto-go
- https://gitea.com/gitea/act
- https://gitea.com/gitea/act_runner
### Summary
The target of this PR is to bring a basic implementation of "Actions",
an internal CI/CD system of Gitea. That means even though it has been
merged, the state of the feature is **EXPERIMENTAL**, and please note
that:
- It is disabled by default;
- It shouldn't be used in a production environment currently;
- It shouldn't be used in a public Gitea instance currently;
- Breaking changes may be made before it's stable.
**Please comment on #13539 if you have any different product design
ideas**, all decisions reached there will be adopted here. But in this
PR, we don't talk about **naming, feature-creep or alternatives**.
### ⚠️ Breaking
`gitea-actions` will become a reserved user name. If a user with the
name already exists in the database, it is recommended to rename it.
### Some important reviews
- What is `DEFAULT_ACTIONS_URL` in `app.ini` for?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1055954954
- Why the api for runners is not under the normal `/api/v1` prefix?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061173592
- Why DBFS?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061301178
- Why ignore events triggered by `gitea-actions` bot?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1063254103
- Why there's no permission control for actions?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1090229868
### What it looks like
<details>
#### Manage runners
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205870657-c72f590e-2e08-4cd4-be7f-2e0abb299bbf.png">
#### List runs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872794-50fde990-2b45-48c1-a178-908e4ec5b627.png">
#### View logs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872501-9b7b9000-9542-4991-8f55-18ccdada77c3.png">
</details>
### How to try it
<details>
#### 1. Start Gitea
Clone this branch and [install from
source](https://docs.gitea.io/en-us/install-from-source).
Add additional configurations in `app.ini` to enable Actions:
```ini
[actions]
ENABLED = true
```
Start it.
If all is well, you'll see the management page of runners:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205877365-8e30a780-9b10-4154-b3e8-ee6c3cb35a59.png">
#### 2. Start runner
Clone the [act_runner](https://gitea.com/gitea/act_runner), and follow
the
[README](https://gitea.com/gitea/act_runner/src/branch/main/README.md)
to start it.
If all is well, you'll see a new runner has been added:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205878000-216f5937-e696-470d-b66c-8473987d91c3.png">
#### 3. Enable actions for a repo
Create a new repo or open an existing one, check the `Actions` checkbox
in settings and submit.
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879705-53e09208-73c0-4b3e-a123-2dcf9aba4b9c.png">
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879383-23f3d08f-1a85-41dd-a8b3-54e2ee6453e8.png">
If all is well, you'll see a new tab "Actions":
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205881648-a8072d8c-5803-4d76-b8a8-9b2fb49516c1.png">
#### 4. Upload workflow files
Upload some workflow files to `.gitea/workflows/xxx.yaml`, you can
follow the [quickstart](https://docs.github.com/en/actions/quickstart)
of GitHub Actions. Yes, Gitea Actions is compatible with GitHub Actions
in most cases, you can use the same demo:
```yaml
name: GitHub Actions Demo
run-name: ${{ github.actor }} is testing out GitHub Actions 🚀
on: [push]
jobs:
Explore-GitHub-Actions:
runs-on: ubuntu-latest
steps:
- run: echo "🎉 The job was automatically triggered by a ${{ github.event_name }} event."
- run: echo "🐧 This job is now running on a ${{ runner.os }} server hosted by GitHub!"
- run: echo "🔎 The name of your branch is ${{ github.ref }} and your repository is ${{ github.repository }}."
- name: Check out repository code
uses: actions/checkout@v3
- run: echo "💡 The ${{ github.repository }} repository has been cloned to the runner."
- run: echo "🖥️ The workflow is now ready to test your code on the runner."
- name: List files in the repository
run: |
ls ${{ github.workspace }}
- run: echo "🍏 This job's status is ${{ job.status }}."
```
If all is well, you'll see a new run in `Actions` tab:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884473-79a874bc-171b-4aaf-acd5-0241a45c3b53.png">
#### 5. Check the logs of jobs
Click a run and you'll see the logs:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884800-994b0374-67f7-48ff-be9a-4c53f3141547.png">
#### 6. Go on
You can try more examples in [the
documents](https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions)
of GitHub Actions, then you might find a lot of bugs.
Come on, PRs are welcome.
</details>
See also: [Feature Preview: Gitea
Actions](https://blog.gitea.io/2022/12/feature-preview-gitea-actions/)
---------
Co-authored-by: a1012112796 <1012112796@qq.com>
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: delvh <dev.lh@web.de>
Co-authored-by: ChristopherHX <christopher.homberger@web.de>
Co-authored-by: John Olheiser <john.olheiser@gmail.com>
2023-01-30 20:45:19 -05:00
|
|
|
})
|
|
|
|
}, reqRepoActionsReader, actions.MustEnableActions)
|
|
|
|
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("/wiki", func() {
|
2021-11-16 13:18:25 -05:00
|
|
|
m.Combo("/").
|
|
|
|
Get(repo.Wiki).
|
|
|
|
Post(context.RepoMustNotBeArchived(),
|
|
|
|
reqSignIn,
|
|
|
|
reqRepoWikiWriter,
|
2022-12-12 03:09:26 -05:00
|
|
|
web.Bind(forms.NewWikiForm{}),
|
2021-11-16 13:18:25 -05:00
|
|
|
repo.WikiPost)
|
|
|
|
m.Combo("/*").
|
|
|
|
Get(repo.Wiki).
|
|
|
|
Post(context.RepoMustNotBeArchived(),
|
|
|
|
reqSignIn,
|
|
|
|
reqRepoWikiWriter,
|
2022-12-12 03:09:26 -05:00
|
|
|
web.Bind(forms.NewWikiForm{}),
|
2021-11-16 13:18:25 -05:00
|
|
|
repo.WikiPost)
|
2021-02-12 23:35:43 -05:00
|
|
|
m.Get("/commit/{sha:[a-f0-9]{7,40}}", repo.SetEditorconfigIfExists, repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.Diff)
|
2021-08-30 22:22:54 -04:00
|
|
|
m.Get("/commit/{sha:[a-f0-9]{7,40}}.{ext:patch|diff}", repo.RawDiff)
|
2021-11-16 13:18:25 -05:00
|
|
|
}, repo.MustEnableWiki, func(ctx *context.Context) {
|
2020-05-16 12:38:40 -04:00
|
|
|
ctx.Data["PageIsWiki"] = true
|
2022-03-28 23:21:30 -04:00
|
|
|
ctx.Data["CloneButtonOriginLink"] = ctx.Repo.Repository.WikiCloneLink()
|
2020-05-16 12:38:40 -04:00
|
|
|
})
|
2017-04-25 03:24:51 -04:00
|
|
|
|
|
|
|
m.Group("/wiki", func() {
|
|
|
|
m.Get("/raw/*", repo.WikiRaw)
|
2017-09-30 00:04:16 -04:00
|
|
|
}, repo.MustEnableWiki)
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2017-10-14 19:17:39 -04:00
|
|
|
m.Group("/activity", func() {
|
|
|
|
m.Get("", repo.Activity)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/{period}", repo.Activity)
|
2021-11-09 14:57:58 -05:00
|
|
|
}, context.RepoRef(), repo.MustBeNotEmpty, context.RequireRepoReaderOr(unit.TypePullRequests, unit.TypeIssues, unit.TypeReleases))
|
2017-10-14 19:17:39 -04:00
|
|
|
|
2019-05-04 08:39:03 -04:00
|
|
|
m.Group("/activity_author_data", func() {
|
|
|
|
m.Get("", repo.ActivityAuthors)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/{period}", repo.ActivityAuthors)
|
2021-11-09 14:57:58 -05:00
|
|
|
}, context.RepoRef(), repo.MustBeNotEmpty, context.RequireRepoReaderOr(unit.TypeCode))
|
2019-05-04 08:39:03 -04:00
|
|
|
|
[RFC] Make archival asynchronous (#11296)
* Make archival asynchronous
The prime benefit being sought here is for large archives to not
clog up the rendering process and cause unsightly proxy timeouts.
As a secondary benefit, archive-in-progress is moved out of the
way into a /tmp file so that new archival requests for the same
commit will not get fulfilled based on an archive that isn't yet
finished.
This asynchronous system is fairly primitive; request comes in, we'll
spawn off a new goroutine to handle it, then we'll mark it as done.
Status requests will see if the file exists in the final location,
and report the archival as done when it exists.
Fixes #11265
* Archive links: drop initial delay to three-quarters of a second
Some, or perhaps even most, archives will not take all that long to archive.
The archive process starts as soon as the download button is initially
clicked, so in theory they could be done quite quickly. Drop the initial
delay down to three-quarters of a second to make it more responsive in the
common case of the archive being quickly created.
* archiver: restructure a little bit to facilitate testing
This introduces two sync.Cond pointers to the archiver package. If they're
non-nil when we go to process a request, we'll wait until signalled (at all)
to proceed. The tests will then create the sync.Cond so that it can signal
at-will and sanity-check the state of the queue at different phases.
The author believes that nil-checking these two sync.Cond pointers on every
archive processing will introduce minimal overhead with no impact on
maintainability.
* gofmt nit: no space around binary + operator
* services: archiver: appease golangci-lint, lock queueMutex
Locking/unlocking the queueMutex is allowed, but not required, for
Cond.Signal() and Cond.Broadcast(). The magic at play here is just a little
too much for golangci-lint, as we take the address of queueMutex and this is
mostly used in archiver.go; the variable still gets flagged as unused.
* archiver: tests: fix several timing nits
Once we've signaled a cond var, it may take some small amount of time for
the goroutines released to hit the spot we're wanting them to be at. Give
them an appropriate amount of time.
* archiver: tests: no underscore in var name, ungh
* archiver: tests: Test* is run in a separate context than TestMain
We must setup the mutex/cond variables at the beginning of any test that's
going to use it, or else these will be nil when the test is actually ran.
* archiver: tests: hopefully final tweak
Things got shuffled around such that we carefully build up and release
requests from the queue, so we can validate the state of the queue at each
step. Fix some assertions that no longer hold true as fallout.
* repo: Download: restore some semblance of previous behavior
When archival was made async, the GET endpoint was only useful if a previous
POST had initiated the download. This commit restores the previous behavior,
to an extent; we'll now submit the archive request there and return a
"202 Accepted" to indicate that it's processing if we didn't manage to
complete the request within ~2 seconds of submission.
This lets a client directly GET the archive, and gives them some indication
that they may attempt to GET it again at a later time.
* archiver: tests: simplify a bit further
We don't need to risk failure and use time.ParseDuration to get 2 *
time.Second.
else if isn't really necessary if the conditions are simple enough and lead
to the same result.
* archiver: tests: resolve potential source of flakiness
Increase all timeouts to 10 seconds; these aren't hard-coded sleeps, so
there's no guarantee we'll actually take that long. If we need longer to
not have a false-positive, then so be it.
While here, various assert.{Not,}Equal arguments are flipped around so that
the wording in error output reflects reality, where the expected argument is
second and actual third.
* archiver: setup infrastructure for notifying consumers of completion
This API will *not* allow consumers to subscribe to specific requests being
completed, just *any* request being completed. The caller is responsible for
determining if their request is satisfied and waiting again if needed.
* repo: archive: make GET endpoint synchronous again
If the request isn't complete, this endpoint will now submit the request and
wait for completion using the new API. This may still be susceptible to
timeouts for larger repos, but other endpoints now exist that the web
interface will use to negotiate its way through larger archive processes.
* archiver: tests: amend test to include WaitForCompletion()
This is a trivial one, so go ahead and include it.
* archiver: tests: fix test by calling NewContext()
The mutex is otherwise uninitialized, so we need to ensure that we're
actually initializing it if we plan to test it.
* archiver: tests: integrate new WaitForCompletion a little better
We can use this to wait for archives to come in, rather than spinning and
hoping with a timeout.
* archiver: tests: combine numQueued declaration with next-instruction assignment
* routers: repo: reap unused archiving flag from DownloadStatus()
This had some planned usage before, indicating whether this request
initiated the archival process or not. After several rounds of refactoring,
this use was deemed not necessary for much of anything and got boiled down
to !complete in all cases.
* services: archiver: restructure to use a channel
We now offer two forms of waiting for a request:
- WaitForCompletion: wait for completion with no timeout
- TimedWaitForCompletion: wait for completion with timeout
In both cases, we wait for the given request's cchan to close; in the latter
case, we do so with the caller-provided timeout. This completely removes the
need for busy-wait loops in Download/InitiateDownload, as it's fairly clean
to wait on a channel with timeout.
* services: archiver: use defer to unlock now that we can
This previously carried the lock into the goroutine, but an intermediate
step just added the request to archiveInProgress outside of the new
goroutine and removed the need for the goroutine to start out with it.
* Revert "archiver: tests: combine numQueued declaration with next-instruction assignment"
This reverts commit bcc52140238e16680f2e05e448e9be51372afdf5.
Revert "archiver: tests: integrate new WaitForCompletion a little better"
This reverts commit 9fc8bedb5667d24d3a3c7843dc28a229efffb1e6.
Revert "archiver: tests: fix test by calling NewContext()"
This reverts commit 709c35685eaaf261ebbb7d3420e3376a4ee8e7f2.
Revert "archiver: tests: amend test to include WaitForCompletion()"
This reverts commit 75261f56bc05d1fa8ff7e81dcbc0ccd93fdc9d50.
* archiver: tests: first attempt at WaitForCompletion() tests
* archiver: tests: slight improvement, less busy-loop
Just wait for the requests to complete in order, instead of busy-waiting
with a timeout. This is slightly less fragile.
While here, reverse the arguments of a nearby assert.Equal() so that
expected/actual are correct in any test output.
* archiver: address lint nits
* services: archiver: only close the channel once
* services: archiver: use a struct{} for the wait channel
This makes it obvious that the channel is only being used as a signal,
rather than anything useful being piped through it.
* archiver: tests: fix expectations
Move the close of the channel into doArchive() itself; notably, before these
goroutines move on to waiting on the Release cond.
The tests are adjusted to reflect that we can't WaitForCompletion() after
they've already completed, as WaitForCompletion() doesn't indicate that
they've been released from the queue yet.
* archiver: tests: set cchan to nil for comparison
* archiver: move ctx.Error's back into the route handlers
We shouldn't be setting this in a service, we should just be validating the
request that we were handed.
* services: archiver: use regex to match a hash
This makes sure we don't try and use refName as a hash when it's clearly not
one, e.g. heads/pull/foo.
* routers: repo: remove the weird /archive/status endpoint
We don't need to do this anymore, we can just continue POSTing to the
archive/* endpoint until we're told the download's complete. This avoids a
potential naming conflict, where a ref could start with "status/"
* archiver: tests: bump reasonable timeout to 15s
* archiver: tests: actually release timedReq
* archiver: tests: run through inFlight instead of manually checking
While we're here, add a test for manually re-processing an archive that's
already been complete. Re-open the channel and mark it incomplete, so that
doArchive can just mark it complete again.
* initArchiveLinks: prevent default behavior from clicking
* archiver: alias gitea's context, golang context import pending
* archiver: simplify logic, just reconstruct slices
While the previous logic was perhaps slightly more efficient, the
new variant's readability is much improved.
* archiver: don't block shutdown on waiting for archive
The technique established launches a goroutine to do the wait,
which will close a wait channel upon termination. For the timeout
case, we also send back a value indicating whether the timeout was
hit or not.
The timeouts are expected to be relatively small, but still a multi-
second delay to shutdown due to this could be unfortunate.
* archiver: simplify shutdown logic
We can just grab the shutdown channel from the graceful manager instead of
constructing a channel to halt the caller and/or pass a result back.
* Style issues
* Fix mis-merge
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: Lauris BH <lauris@nix.lv>
2020-11-07 15:27:28 -05:00
|
|
|
m.Group("/archive", func() {
|
2021-06-23 17:12:38 -04:00
|
|
|
m.Get("/*", repo.Download)
|
[RFC] Make archival asynchronous (#11296)
* Make archival asynchronous
The prime benefit being sought here is for large archives to not
clog up the rendering process and cause unsightly proxy timeouts.
As a secondary benefit, archive-in-progress is moved out of the
way into a /tmp file so that new archival requests for the same
commit will not get fulfilled based on an archive that isn't yet
finished.
This asynchronous system is fairly primitive; request comes in, we'll
spawn off a new goroutine to handle it, then we'll mark it as done.
Status requests will see if the file exists in the final location,
and report the archival as done when it exists.
Fixes #11265
* Archive links: drop initial delay to three-quarters of a second
Some, or perhaps even most, archives will not take all that long to archive.
The archive process starts as soon as the download button is initially
clicked, so in theory they could be done quite quickly. Drop the initial
delay down to three-quarters of a second to make it more responsive in the
common case of the archive being quickly created.
* archiver: restructure a little bit to facilitate testing
This introduces two sync.Cond pointers to the archiver package. If they're
non-nil when we go to process a request, we'll wait until signalled (at all)
to proceed. The tests will then create the sync.Cond so that it can signal
at-will and sanity-check the state of the queue at different phases.
The author believes that nil-checking these two sync.Cond pointers on every
archive processing will introduce minimal overhead with no impact on
maintainability.
* gofmt nit: no space around binary + operator
* services: archiver: appease golangci-lint, lock queueMutex
Locking/unlocking the queueMutex is allowed, but not required, for
Cond.Signal() and Cond.Broadcast(). The magic at play here is just a little
too much for golangci-lint, as we take the address of queueMutex and this is
mostly used in archiver.go; the variable still gets flagged as unused.
* archiver: tests: fix several timing nits
Once we've signaled a cond var, it may take some small amount of time for
the goroutines released to hit the spot we're wanting them to be at. Give
them an appropriate amount of time.
* archiver: tests: no underscore in var name, ungh
* archiver: tests: Test* is run in a separate context than TestMain
We must setup the mutex/cond variables at the beginning of any test that's
going to use it, or else these will be nil when the test is actually ran.
* archiver: tests: hopefully final tweak
Things got shuffled around such that we carefully build up and release
requests from the queue, so we can validate the state of the queue at each
step. Fix some assertions that no longer hold true as fallout.
* repo: Download: restore some semblance of previous behavior
When archival was made async, the GET endpoint was only useful if a previous
POST had initiated the download. This commit restores the previous behavior,
to an extent; we'll now submit the archive request there and return a
"202 Accepted" to indicate that it's processing if we didn't manage to
complete the request within ~2 seconds of submission.
This lets a client directly GET the archive, and gives them some indication
that they may attempt to GET it again at a later time.
* archiver: tests: simplify a bit further
We don't need to risk failure and use time.ParseDuration to get 2 *
time.Second.
else if isn't really necessary if the conditions are simple enough and lead
to the same result.
* archiver: tests: resolve potential source of flakiness
Increase all timeouts to 10 seconds; these aren't hard-coded sleeps, so
there's no guarantee we'll actually take that long. If we need longer to
not have a false-positive, then so be it.
While here, various assert.{Not,}Equal arguments are flipped around so that
the wording in error output reflects reality, where the expected argument is
second and actual third.
* archiver: setup infrastructure for notifying consumers of completion
This API will *not* allow consumers to subscribe to specific requests being
completed, just *any* request being completed. The caller is responsible for
determining if their request is satisfied and waiting again if needed.
* repo: archive: make GET endpoint synchronous again
If the request isn't complete, this endpoint will now submit the request and
wait for completion using the new API. This may still be susceptible to
timeouts for larger repos, but other endpoints now exist that the web
interface will use to negotiate its way through larger archive processes.
* archiver: tests: amend test to include WaitForCompletion()
This is a trivial one, so go ahead and include it.
* archiver: tests: fix test by calling NewContext()
The mutex is otherwise uninitialized, so we need to ensure that we're
actually initializing it if we plan to test it.
* archiver: tests: integrate new WaitForCompletion a little better
We can use this to wait for archives to come in, rather than spinning and
hoping with a timeout.
* archiver: tests: combine numQueued declaration with next-instruction assignment
* routers: repo: reap unused archiving flag from DownloadStatus()
This had some planned usage before, indicating whether this request
initiated the archival process or not. After several rounds of refactoring,
this use was deemed not necessary for much of anything and got boiled down
to !complete in all cases.
* services: archiver: restructure to use a channel
We now offer two forms of waiting for a request:
- WaitForCompletion: wait for completion with no timeout
- TimedWaitForCompletion: wait for completion with timeout
In both cases, we wait for the given request's cchan to close; in the latter
case, we do so with the caller-provided timeout. This completely removes the
need for busy-wait loops in Download/InitiateDownload, as it's fairly clean
to wait on a channel with timeout.
* services: archiver: use defer to unlock now that we can
This previously carried the lock into the goroutine, but an intermediate
step just added the request to archiveInProgress outside of the new
goroutine and removed the need for the goroutine to start out with it.
* Revert "archiver: tests: combine numQueued declaration with next-instruction assignment"
This reverts commit bcc52140238e16680f2e05e448e9be51372afdf5.
Revert "archiver: tests: integrate new WaitForCompletion a little better"
This reverts commit 9fc8bedb5667d24d3a3c7843dc28a229efffb1e6.
Revert "archiver: tests: fix test by calling NewContext()"
This reverts commit 709c35685eaaf261ebbb7d3420e3376a4ee8e7f2.
Revert "archiver: tests: amend test to include WaitForCompletion()"
This reverts commit 75261f56bc05d1fa8ff7e81dcbc0ccd93fdc9d50.
* archiver: tests: first attempt at WaitForCompletion() tests
* archiver: tests: slight improvement, less busy-loop
Just wait for the requests to complete in order, instead of busy-waiting
with a timeout. This is slightly less fragile.
While here, reverse the arguments of a nearby assert.Equal() so that
expected/actual are correct in any test output.
* archiver: address lint nits
* services: archiver: only close the channel once
* services: archiver: use a struct{} for the wait channel
This makes it obvious that the channel is only being used as a signal,
rather than anything useful being piped through it.
* archiver: tests: fix expectations
Move the close of the channel into doArchive() itself; notably, before these
goroutines move on to waiting on the Release cond.
The tests are adjusted to reflect that we can't WaitForCompletion() after
they've already completed, as WaitForCompletion() doesn't indicate that
they've been released from the queue yet.
* archiver: tests: set cchan to nil for comparison
* archiver: move ctx.Error's back into the route handlers
We shouldn't be setting this in a service, we should just be validating the
request that we were handed.
* services: archiver: use regex to match a hash
This makes sure we don't try and use refName as a hash when it's clearly not
one, e.g. heads/pull/foo.
* routers: repo: remove the weird /archive/status endpoint
We don't need to do this anymore, we can just continue POSTing to the
archive/* endpoint until we're told the download's complete. This avoids a
potential naming conflict, where a ref could start with "status/"
* archiver: tests: bump reasonable timeout to 15s
* archiver: tests: actually release timedReq
* archiver: tests: run through inFlight instead of manually checking
While we're here, add a test for manually re-processing an archive that's
already been complete. Re-open the channel and mark it incomplete, so that
doArchive can just mark it complete again.
* initArchiveLinks: prevent default behavior from clicking
* archiver: alias gitea's context, golang context import pending
* archiver: simplify logic, just reconstruct slices
While the previous logic was perhaps slightly more efficient, the
new variant's readability is much improved.
* archiver: don't block shutdown on waiting for archive
The technique established launches a goroutine to do the wait,
which will close a wait channel upon termination. For the timeout
case, we also send back a value indicating whether the timeout was
hit or not.
The timeouts are expected to be relatively small, but still a multi-
second delay to shutdown due to this could be unfortunate.
* archiver: simplify shutdown logic
We can just grab the shutdown channel from the graceful manager instead of
constructing a channel to halt the caller and/or pass a result back.
* Style issues
* Fix mis-merge
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: Lauris BH <lauris@nix.lv>
2020-11-07 15:27:28 -05:00
|
|
|
m.Post("/*", repo.InitiateDownload)
|
2022-07-31 12:57:02 -04:00
|
|
|
}, repo.MustBeNotEmpty, dlSourceEnabled, reqRepoCodeReader)
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2017-10-25 20:49:16 -04:00
|
|
|
m.Group("/branches", func() {
|
|
|
|
m.Get("", repo.Branches)
|
2019-01-17 19:01:04 -05:00
|
|
|
}, repo.MustBeNotEmpty, context.RepoRef(), reqRepoCodeReader)
|
2017-10-25 20:49:16 -04:00
|
|
|
|
2019-11-14 21:52:59 -05:00
|
|
|
m.Group("/blob_excerpt", func() {
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/{sha}", repo.SetEditorconfigIfExists, repo.SetDiffViewStyle, repo.ExcerptBlob)
|
2022-02-05 13:26:12 -05:00
|
|
|
}, func(ctx *context.Context) (cancel gocontext.CancelFunc) {
|
|
|
|
if ctx.FormBool("wiki") {
|
|
|
|
ctx.Data["PageIsWiki"] = true
|
|
|
|
repo.MustEnableWiki(ctx)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
reqRepoCodeReader(ctx)
|
|
|
|
if ctx.Written() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
cancel = context.RepoRef()(ctx)
|
|
|
|
if ctx.Written() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
repo.MustBeNotEmpty(ctx)
|
2022-06-20 06:02:49 -04:00
|
|
|
return cancel
|
2022-02-05 13:26:12 -05:00
|
|
|
})
|
2019-11-14 21:52:59 -05:00
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/pulls/{index}", func() {
|
2018-01-05 05:56:52 -05:00
|
|
|
m.Get(".diff", repo.DownloadPullDiff)
|
2018-01-07 08:10:20 -05:00
|
|
|
m.Get(".patch", repo.DownloadPullPatch)
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Get("/commits", context.RepoRef(), repo.ViewPullCommits)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/merge", context.RepoMustNotBeArchived(), web.Bind(forms.MergePullRequestForm{}), repo.MergePullRequest)
|
2022-06-11 10:44:20 -04:00
|
|
|
m.Post("/cancel_auto_merge", context.RepoMustNotBeArchived(), repo.CancelAutoMergePullRequest)
|
2020-01-17 01:03:40 -05:00
|
|
|
m.Post("/update", repo.UpdatePullRequest)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/set_allow_maintainer_edit", web.Bind(forms.UpdateAllowEditsForm{}), repo.SetAllowEdits)
|
2019-01-23 13:58:38 -05:00
|
|
|
m.Post("/cleanup", context.RepoMustNotBeArchived(), context.RepoRef(), repo.CleanUpPullRequest)
|
2018-08-06 00:43:22 -04:00
|
|
|
m.Group("/files", func() {
|
2018-08-14 13:49:33 -04:00
|
|
|
m.Get("", context.RepoRef(), repo.SetEditorconfigIfExists, repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.ViewPullFiles)
|
2018-08-06 00:43:22 -04:00
|
|
|
m.Group("/reviews", func() {
|
2021-01-08 16:49:55 -05:00
|
|
|
m.Get("/new_comment", repo.RenderNewCodeCommentForm)
|
2022-12-12 03:09:26 -05:00
|
|
|
m.Post("/comments", web.Bind(forms.CodeCommentForm{}), repo.CreateCodeComment)
|
|
|
|
m.Post("/submit", web.Bind(forms.SubmitReviewForm{}), repo.SubmitReview)
|
2019-01-23 13:58:38 -05:00
|
|
|
}, context.RepoMustNotBeArchived())
|
2018-08-06 00:43:22 -04:00
|
|
|
})
|
2017-09-30 00:04:16 -04:00
|
|
|
}, repo.MustAllowPulls)
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2019-02-12 10:09:43 -05:00
|
|
|
m.Group("/media", func() {
|
|
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.SingleDownloadOrLFS)
|
|
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.SingleDownloadOrLFS)
|
|
|
|
m.Get("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.SingleDownloadOrLFS)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/blob/{sha}", context.RepoRefByType(context.RepoRefBlob), repo.DownloadByIDOrLFS)
|
2019-02-12 10:09:43 -05:00
|
|
|
// "/*" route is deprecated, and kept for backward compatibility
|
|
|
|
m.Get("/*", context.RepoRefByType(context.RepoRefLegacy), repo.SingleDownloadOrLFS)
|
|
|
|
}, repo.MustBeNotEmpty, reqRepoCodeReader)
|
|
|
|
|
2017-10-29 22:04:25 -04:00
|
|
|
m.Group("/raw", func() {
|
|
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.SingleDownload)
|
|
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.SingleDownload)
|
|
|
|
m.Get("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.SingleDownload)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/blob/{sha}", context.RepoRefByType(context.RepoRefBlob), repo.DownloadByID)
|
2017-10-29 22:04:25 -04:00
|
|
|
// "/*" route is deprecated, and kept for backward compatibility
|
|
|
|
m.Get("/*", context.RepoRefByType(context.RepoRefLegacy), repo.SingleDownload)
|
2019-01-17 19:01:04 -05:00
|
|
|
}, repo.MustBeNotEmpty, reqRepoCodeReader)
|
2017-10-29 22:04:25 -04:00
|
|
|
|
2022-06-15 23:33:23 -04:00
|
|
|
m.Group("/render", func() {
|
|
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.RenderFile)
|
|
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.RenderFile)
|
|
|
|
m.Get("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.RenderFile)
|
|
|
|
m.Get("/blob/{sha}", context.RepoRefByType(context.RepoRefBlob), repo.RenderFile)
|
|
|
|
}, repo.MustBeNotEmpty, reqRepoCodeReader)
|
|
|
|
|
2017-10-29 22:04:25 -04:00
|
|
|
m.Group("/commits", func() {
|
|
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.RefCommits)
|
|
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.RefCommits)
|
|
|
|
m.Get("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.RefCommits)
|
|
|
|
// "/*" route is deprecated, and kept for backward compatibility
|
|
|
|
m.Get("/*", context.RepoRefByType(context.RepoRefLegacy), repo.RefCommits)
|
2019-01-17 19:01:04 -05:00
|
|
|
}, repo.MustBeNotEmpty, reqRepoCodeReader)
|
2017-10-29 22:04:25 -04:00
|
|
|
|
2019-04-19 22:47:00 -04:00
|
|
|
m.Group("/blame", func() {
|
|
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.RefBlame)
|
|
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.RefBlame)
|
|
|
|
m.Get("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.RefBlame)
|
|
|
|
}, repo.MustBeNotEmpty, reqRepoCodeReader)
|
|
|
|
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Group("", func() {
|
|
|
|
m.Get("/graph", repo.Graph)
|
2021-02-12 23:35:43 -05:00
|
|
|
m.Get("/commit/{sha:([a-f0-9]{7,40})$}", repo.SetEditorconfigIfExists, repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.Diff)
|
2022-02-09 15:28:55 -05:00
|
|
|
m.Get("/cherry-pick/{sha:([a-f0-9]{7,40})$}", repo.SetEditorconfigIfExists, repo.CherryPick)
|
2019-01-17 19:01:04 -05:00
|
|
|
}, repo.MustBeNotEmpty, context.RepoRef(), reqRepoCodeReader)
|
2017-07-27 05:23:38 -04:00
|
|
|
|
2017-10-29 22:04:25 -04:00
|
|
|
m.Group("/src", func() {
|
|
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.Home)
|
|
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.Home)
|
|
|
|
m.Get("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.Home)
|
|
|
|
// "/*" route is deprecated, and kept for backward compatibility
|
|
|
|
m.Get("/*", context.RepoRefByType(context.RepoRefLegacy), repo.Home)
|
|
|
|
}, repo.SetEditorconfigIfExists)
|
|
|
|
|
2017-07-27 05:23:38 -04:00
|
|
|
m.Group("", func() {
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Get("/forks", repo.Forks)
|
2018-11-28 06:26:14 -05:00
|
|
|
}, context.RepoRef(), reqRepoCodeReader)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Get("/commit/{sha:([a-f0-9]{7,40})}.{ext:patch|diff}",
|
2019-01-17 19:01:04 -05:00
|
|
|
repo.MustBeNotEmpty, reqRepoCodeReader, repo.RawDiff)
|
2021-04-09 20:26:08 -04:00
|
|
|
}, ignSignIn, context.RepoAssignment, context.UnitTypes())
|
2021-10-08 09:08:22 -04:00
|
|
|
|
|
|
|
m.Post("/{username}/{reponame}/lastcommit/*", ignSignInAndCsrf, context.RepoAssignment, context.UnitTypes(), context.RepoRefByType(context.RepoRefCommit), reqRepoCodeReader, repo.LastCommit)
|
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{username}/{reponame}", func() {
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Get("/stars", repo.Stars)
|
|
|
|
m.Get("/watchers", repo.Watchers)
|
2018-11-28 06:26:14 -05:00
|
|
|
m.Get("/search", reqRepoCodeReader, repo.Search)
|
2021-04-09 20:26:08 -04:00
|
|
|
}, ignSignIn, context.RepoAssignment, context.RepoRef(), context.UnitTypes())
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{username}", func() {
|
|
|
|
m.Group("/{reponame}", func() {
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Get("", repo.SetEditorconfigIfExists, repo.Home)
|
2021-05-09 17:50:06 -04:00
|
|
|
}, ignSignIn, context.RepoAssignment, context.RepoRef(), context.UnitTypes())
|
2017-04-25 03:24:51 -04:00
|
|
|
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Group("/{reponame}", func() {
|
|
|
|
m.Group("/info/lfs", func() {
|
2021-06-05 19:59:27 -04:00
|
|
|
m.Post("/objects/batch", lfs.CheckAcceptMediaType, lfs.BatchHandler)
|
|
|
|
m.Put("/objects/{oid}/{size}", lfs.UploadHandler)
|
|
|
|
m.Get("/objects/{oid}/{filename}", lfs.DownloadHandler)
|
|
|
|
m.Get("/objects/{oid}", lfs.DownloadHandler)
|
|
|
|
m.Post("/verify", lfs.CheckAcceptMediaType, lfs.VerifyHandler)
|
2017-11-28 15:58:37 -05:00
|
|
|
m.Group("/locks", func() {
|
|
|
|
m.Get("/", lfs.GetListLockHandler)
|
|
|
|
m.Post("/", lfs.PostLockHandler)
|
|
|
|
m.Post("/verify", lfs.VerifyLockHandler)
|
2021-01-26 10:36:53 -05:00
|
|
|
m.Post("/{lid}/unlock", lfs.UnLockHandler)
|
2021-06-05 19:59:27 -04:00
|
|
|
}, lfs.CheckAcceptMediaType)
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Any("/*", func(ctx *context.Context) {
|
2018-01-10 16:34:17 -05:00
|
|
|
ctx.NotFound("", nil)
|
2017-04-25 03:24:51 -04:00
|
|
|
})
|
2021-06-05 19:59:27 -04:00
|
|
|
}, ignSignInAndCsrf, lfsServerEnabled)
|
2021-01-26 10:36:53 -05:00
|
|
|
|
|
|
|
m.Group("", func() {
|
2021-07-20 23:32:35 -04:00
|
|
|
m.PostOptions("/git-upload-pack", repo.ServiceUploadPack)
|
|
|
|
m.PostOptions("/git-receive-pack", repo.ServiceReceivePack)
|
|
|
|
m.GetOptions("/info/refs", repo.GetInfoRefs)
|
|
|
|
m.GetOptions("/HEAD", repo.GetTextFile("HEAD"))
|
|
|
|
m.GetOptions("/objects/info/alternates", repo.GetTextFile("objects/info/alternates"))
|
|
|
|
m.GetOptions("/objects/info/http-alternates", repo.GetTextFile("objects/info/http-alternates"))
|
|
|
|
m.GetOptions("/objects/info/packs", repo.GetInfoPacks)
|
|
|
|
m.GetOptions("/objects/info/{file:[^/]*}", repo.GetTextFile(""))
|
|
|
|
m.GetOptions("/objects/{head:[0-9a-f]{2}}/{hash:[0-9a-f]{38}}", repo.GetLooseObject)
|
|
|
|
m.GetOptions("/objects/pack/pack-{file:[0-9a-f]{40}}.pack", repo.GetPackFile)
|
|
|
|
m.GetOptions("/objects/pack/pack-{file:[0-9a-f]{40}}.idx", repo.GetIdxFile)
|
2022-03-26 05:04:22 -04:00
|
|
|
}, ignSignInAndCsrf, context_service.UserAssignmentWeb())
|
2017-04-25 03:24:51 -04:00
|
|
|
})
|
|
|
|
})
|
|
|
|
// ***** END: Repository *****
|
|
|
|
|
|
|
|
m.Group("/notifications", func() {
|
|
|
|
m.Get("", user.Notifications)
|
2022-09-29 15:09:14 -04:00
|
|
|
m.Get("/subscriptions", user.NotificationSubscriptions)
|
|
|
|
m.Get("/watching", user.NotificationWatching)
|
2017-04-25 03:24:51 -04:00
|
|
|
m.Post("/status", user.NotificationStatusPost)
|
2017-12-07 00:52:57 -05:00
|
|
|
m.Post("/purge", user.NotificationPurgePost)
|
2022-04-07 14:59:56 -04:00
|
|
|
m.Get("/new", user.NewAvailable)
|
2017-04-25 03:24:51 -04:00
|
|
|
}, reqSignIn)
|
|
|
|
|
2018-07-27 20:19:01 -04:00
|
|
|
if setting.API.EnableSwagger {
|
2021-06-08 19:33:54 -04:00
|
|
|
m.Get("/swagger.v1.json", SwaggerV1Json)
|
2019-08-26 07:33:06 -04:00
|
|
|
}
|
2023-04-03 06:06:57 -04:00
|
|
|
|
|
|
|
if !setting.IsProd {
|
|
|
|
m.Any("/devtest", devtest.List)
|
|
|
|
m.Any("/devtest/{sub}", devtest.Tmpl)
|
|
|
|
}
|
|
|
|
|
2021-12-22 05:39:28 -05:00
|
|
|
m.NotFound(func(w http.ResponseWriter, req *http.Request) {
|
|
|
|
ctx := context.GetContext(req)
|
|
|
|
ctx.NotFound("", nil)
|
|
|
|
})
|
2017-04-25 03:24:51 -04:00
|
|
|
}
|