mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2024-12-12 11:38:00 -05:00
77fafbe578
## Overview Hi all, I'm a first-time contributor to Forgejo. I was looking for something interesting to contribute and the first thing that caught my attention was https://codeberg.org/forgejo/forgejo/issues/6043, a request for an enhancement to include "issue previews" when publishing links to social media platforms. As a bit of background, the way these platforms work is that they search for meta tags in the posted link's content, and if they find a meta `og:image` (along with other meta tags) they'll pull the image to include in the social media post. Forgejo currently provides an `og:image` tag but it just renders the repository or repository-owner's avatar. This PR will render `og:image` for an issue or PR into a link to `{...}/summary-card`, which is a dynamically generated image that contains a summary of the issue. ## Design Notes ### Rendering / Rasterization The tricky part of solving this problem is rendering an image that combines some text, some images, and some layout elements. To address this, I've created a `card` module which allows for a handful of operations: - Create a new rendered image (a "Card") - Add a margin to a card - Split the card, horizontally or vertically, into two pieces with a proportional layout (eg. 70%/30%, as desired), each of which are "Cards" that render into the same root image - Render text into a card, with line-wrapping and text-alignment capabilities - Render an image onto a card - Fetches an external image as safely as possible (for server-side fetch of Gravatar, etc.) The card module can be reused to create `og:image` summary cards for any object in the future, although obviously it's capabilities are limited. The current implementation is on issues/PRs. I considered a few alternative approaches before taking this approach, and here's why I rejected those options: - Provide the summary card as an SVG object which could be rendered much more easily with a template file -- however, support for SVG isn't defined as positive for OpenGraph, and a quick look through some existing implementations suggest that it is not widely supported, if at all - Rendering as HTML/CSS, or SVG, and then using an external tool to convert into a PNG (or other static) image -- this would be much nicer and easier to implement, but would require tying in some very heavy-weight dependencies - Rendering using a more sophisticated graphics library, eg. cairo -- also would be nicer and easier to implement, but again a heavy dependency for a small functionality As a result of the limited capabilities of the new card module, summary cards don't have icons on them (which would require SVG rasterization) or pretty status badges with colors and rounded rects. In the future if better drawing capabilities were added, the graphics could be improved, but it doesn't seem too important. ### External Avatars In order to rasterize a user's avatar onto the summary card, it might have to be retrieved by the server from the external source (eg. Gravatar). A `fetchExternalImage` routine attempts to do this in the safest way possible to protect the server from any possible security exposure from this; (a) verifying that the content-types are acceptable, (b) ensuring that the file-size and image-size are within the safe bounds that are used for custom avatars, (c) using a very-short timeout to avoid stalling the server if an external dependency is offline. ### Caching Summary cards are cached after rendered. This has the downside of causing updates to statuses, avatars, titles, etc. being stale on the summary card for the cache TTL. However, during testing I found that some social media engines like Mastodon will cause the summary card to be accessed a significant number of times after being referenced by a post, causing a mini-tornado of requests. The cache compensates for this to avoid server load in this situation. ### Scope I'm considering out-of-scope: - Summary cards on other objects (eg. repos, users) can be left for future implementation ## Checklist The [contributor guide](https://forgejo.org/docs/next/contributor/) contains information that will be helpful to first time contributors. There also are a few [conditions for merging Pull Requests in Forgejo repositories](https://codeberg.org/forgejo/governance/src/branch/main/PullRequestsAgreement.md). You are also welcome to join the [Forgejo development chatroom](https://matrix.to/#/#forgejo-development:matrix.org). ### Tests - I added test coverage for Go changes... - [x] in their respective `*_test.go` for unit tests. - [x] in the `tests/integration` directory if it involves interactions with a live Forgejo server. - ~~I added test coverage for JavaScript changes...~~ n/a, no JS changes - [x] ~~in `web_src/js/*.test.js` if it can be unit tested.~~ - [x] ~~in `tests/e2e/*.test.e2e.js` if it requires interactions with a live Forgejo server (see also the [developer guide for JavaScript testing](https://codeberg.org/forgejo/forgejo/src/branch/forgejo/tests/e2e/README.md#end-to-end-tests)).~~ - Manual testing - [x] Access & attach screenshots of both an issue and a pull-request's summary card; see below - [x] Ensure reasonable (non-crash) behavior of rendering text with glyphs outside the font -- correctly rendered as replacement unicode chars - [x] Using a public test instance, verify that og:image behavior looks good on platforms like Mastodon and BlueSky - [x] Bluesky: ✅ - [x] Mastodon: ✅ (Note that the summary card will be requested many times as the post is federated; either each server, or each client, will fetch it itself) - [x] OpenGraph test site (https://www.opengraph.xyz/): ✅ - [x] Discord: Looks OK ✅; needs "twitter:card" to be set to "summary_large_image" to display the large-scale image, but (a) that's probably annoying to use, (b) probably wrong because it doesn't match Twitter Card's spec for a "photographic image", and (c) don't want to encourage/continue use of vendor-specific tag - [x] Verify cases with user avatar missing (or autogen), and repo avatar missing (falls back to repo owner avatar) Pull request summary card: ![image](/attachments/b64283e3-9a3c-4f19-9d00-961662ffe86b) Issue summary card: ![image](/attachments/318ce589-02e0-493e-b10c-5b2cb2627db2) (images to the right are the custom repo avatar, w/ fallback to the repo owner avatar) ### Documentation - [ ] I created a pull request [to the documentation](https://codeberg.org/forgejo/docs) to explain to Forgejo users how to use this change. - [x] I did not document these changes and I do not expect someone else to do it. - OpenGraph capabilities are expected to work in the background without user awareness, and so there is no need for documentation to explain the capabilities for users. ### Release notes - [ ] I do not want this change to show in the release notes. - [x] I want the title to show in the release notes with a link to this pull request. - [ ] I want the content of the `release-notes/<pull request number>.md` to be be used for the release notes instead of the title. Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/6053 Reviewed-by: Gusted <gusted@noreply.codeberg.org> Co-authored-by: Mathieu Fenniak <mathieu@fenniak.net> Co-committed-by: Mathieu Fenniak <mathieu@fenniak.net>
1671 lines
68 KiB
Go
1671 lines
68 KiB
Go
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package web
|
|
|
|
import (
|
|
gocontext "context"
|
|
"net/http"
|
|
"strings"
|
|
|
|
auth_model "code.gitea.io/gitea/models/auth"
|
|
"code.gitea.io/gitea/models/db"
|
|
"code.gitea.io/gitea/models/perm"
|
|
quota_model "code.gitea.io/gitea/models/quota"
|
|
"code.gitea.io/gitea/models/unit"
|
|
"code.gitea.io/gitea/modules/log"
|
|
"code.gitea.io/gitea/modules/metrics"
|
|
"code.gitea.io/gitea/modules/public"
|
|
"code.gitea.io/gitea/modules/setting"
|
|
"code.gitea.io/gitea/modules/storage"
|
|
"code.gitea.io/gitea/modules/structs"
|
|
"code.gitea.io/gitea/modules/templates"
|
|
"code.gitea.io/gitea/modules/validation"
|
|
"code.gitea.io/gitea/modules/web"
|
|
"code.gitea.io/gitea/modules/web/middleware"
|
|
"code.gitea.io/gitea/modules/web/routing"
|
|
"code.gitea.io/gitea/routers/common"
|
|
"code.gitea.io/gitea/routers/web/admin"
|
|
"code.gitea.io/gitea/routers/web/auth"
|
|
"code.gitea.io/gitea/routers/web/devtest"
|
|
"code.gitea.io/gitea/routers/web/events"
|
|
"code.gitea.io/gitea/routers/web/explore"
|
|
"code.gitea.io/gitea/routers/web/feed"
|
|
"code.gitea.io/gitea/routers/web/healthcheck"
|
|
"code.gitea.io/gitea/routers/web/misc"
|
|
"code.gitea.io/gitea/routers/web/org"
|
|
org_setting "code.gitea.io/gitea/routers/web/org/setting"
|
|
"code.gitea.io/gitea/routers/web/repo"
|
|
"code.gitea.io/gitea/routers/web/repo/actions"
|
|
"code.gitea.io/gitea/routers/web/repo/badges"
|
|
repo_flags "code.gitea.io/gitea/routers/web/repo/flags"
|
|
repo_setting "code.gitea.io/gitea/routers/web/repo/setting"
|
|
"code.gitea.io/gitea/routers/web/shared/project"
|
|
"code.gitea.io/gitea/routers/web/user"
|
|
user_setting "code.gitea.io/gitea/routers/web/user/setting"
|
|
"code.gitea.io/gitea/routers/web/user/setting/security"
|
|
auth_service "code.gitea.io/gitea/services/auth"
|
|
"code.gitea.io/gitea/services/context"
|
|
"code.gitea.io/gitea/services/forms"
|
|
"code.gitea.io/gitea/services/lfs"
|
|
|
|
_ "code.gitea.io/gitea/modules/session" // to registers all internal adapters
|
|
|
|
"code.forgejo.org/go-chi/captcha"
|
|
chi_middleware "github.com/go-chi/chi/v5/middleware"
|
|
"github.com/go-chi/cors"
|
|
"github.com/klauspost/compress/gzhttp"
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
)
|
|
|
|
var GzipMinSize = gzhttp.DefaultMinSize
|
|
|
|
// optionsCorsHandler return a http handler which sets CORS options if enabled by config, it blocks non-CORS OPTIONS requests.
|
|
func optionsCorsHandler() func(next http.Handler) http.Handler {
|
|
var corsHandler func(next http.Handler) http.Handler
|
|
if setting.CORSConfig.Enabled {
|
|
corsHandler = cors.Handler(cors.Options{
|
|
AllowedOrigins: setting.CORSConfig.AllowDomain,
|
|
AllowedMethods: setting.CORSConfig.Methods,
|
|
AllowCredentials: setting.CORSConfig.AllowCredentials,
|
|
AllowedHeaders: setting.CORSConfig.Headers,
|
|
MaxAge: int(setting.CORSConfig.MaxAge.Seconds()),
|
|
})
|
|
}
|
|
|
|
return func(next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
if r.Method == http.MethodOptions {
|
|
if corsHandler != nil && r.Header.Get("Access-Control-Request-Method") != "" {
|
|
corsHandler(next).ServeHTTP(w, r)
|
|
} else {
|
|
// it should explicitly deny OPTIONS requests if CORS handler is not executed, to avoid the next GET/POST handler being incorrectly called by the OPTIONS request
|
|
w.WriteHeader(http.StatusMethodNotAllowed)
|
|
}
|
|
return
|
|
}
|
|
// for non-OPTIONS requests, call the CORS handler to add some related headers like "Vary"
|
|
if corsHandler != nil {
|
|
corsHandler(next).ServeHTTP(w, r)
|
|
} else {
|
|
next.ServeHTTP(w, r)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
// The OAuth2 plugin is expected to be executed first, as it must ignore the user id stored
|
|
// in the session (if there is a user id stored in session other plugins might return the user
|
|
// object for that id).
|
|
//
|
|
// The Session plugin is expected to be executed second, in order to skip authentication
|
|
// for users that have already signed in.
|
|
func buildAuthGroup() *auth_service.Group {
|
|
group := auth_service.NewGroup()
|
|
group.Add(&auth_service.OAuth2{}) // FIXME: this should be removed and only applied in download and oauth related routers
|
|
group.Add(&auth_service.Basic{}) // FIXME: this should be removed and only applied in download and git/lfs routers
|
|
|
|
if setting.Service.EnableReverseProxyAuth {
|
|
group.Add(&auth_service.ReverseProxy{}) // reverseproxy should before Session, otherwise the header will be ignored if user has login
|
|
}
|
|
group.Add(&auth_service.Session{})
|
|
|
|
if setting.IsWindows && auth_model.IsSSPIEnabled(db.DefaultContext) {
|
|
group.Add(&auth_service.SSPI{}) // it MUST be the last, see the comment of SSPI
|
|
}
|
|
|
|
return group
|
|
}
|
|
|
|
func webAuth(authMethod auth_service.Method) func(*context.Context) {
|
|
return func(ctx *context.Context) {
|
|
ar, err := common.AuthShared(ctx.Base, ctx.Session, authMethod)
|
|
if err != nil {
|
|
log.Error("Failed to verify user: %v", err)
|
|
ctx.Error(http.StatusUnauthorized, ctx.Locale.TrString("auth.unauthorized_credentials", "https://codeberg.org/forgejo/forgejo/issues/2809"))
|
|
return
|
|
}
|
|
ctx.Doer = ar.Doer
|
|
ctx.IsSigned = ar.Doer != nil
|
|
ctx.IsBasicAuth = ar.IsBasicAuth
|
|
if ctx.Doer == nil {
|
|
// ensure the session uid is deleted
|
|
_ = ctx.Session.Delete("uid")
|
|
}
|
|
|
|
ctx.Csrf.PrepareForSessionUser(ctx)
|
|
}
|
|
}
|
|
|
|
// verifyAuthWithOptions checks authentication according to options
|
|
func verifyAuthWithOptions(options *common.VerifyOptions) func(ctx *context.Context) {
|
|
return func(ctx *context.Context) {
|
|
// Check prohibit login users.
|
|
if ctx.IsSigned {
|
|
if !ctx.Doer.IsActive && setting.Service.RegisterEmailConfirm {
|
|
ctx.Data["Title"] = ctx.Tr("auth.active_your_account")
|
|
ctx.HTML(http.StatusOK, "user/auth/activate")
|
|
return
|
|
}
|
|
if !ctx.Doer.IsActive || ctx.Doer.ProhibitLogin {
|
|
log.Info("Failed authentication attempt for %s from %s", ctx.Doer.Name, ctx.RemoteAddr())
|
|
ctx.Data["Title"] = ctx.Tr("auth.prohibit_login")
|
|
ctx.HTML(http.StatusOK, "user/auth/prohibit_login")
|
|
return
|
|
}
|
|
|
|
if ctx.Doer.MustChangePassword {
|
|
if ctx.Req.URL.Path != "/user/settings/change_password" {
|
|
if strings.HasPrefix(ctx.Req.UserAgent(), "git") {
|
|
ctx.Error(http.StatusUnauthorized, ctx.Locale.TrString("auth.must_change_password"))
|
|
return
|
|
}
|
|
ctx.Data["Title"] = ctx.Tr("auth.must_change_password")
|
|
ctx.Data["ChangePasscodeLink"] = setting.AppSubURL + "/user/change_password"
|
|
if ctx.Req.URL.Path != "/user/events" {
|
|
middleware.SetRedirectToCookie(ctx.Resp, setting.AppSubURL+ctx.Req.URL.RequestURI())
|
|
}
|
|
ctx.Redirect(setting.AppSubURL + "/user/settings/change_password")
|
|
return
|
|
}
|
|
} else if ctx.Req.URL.Path == "/user/settings/change_password" {
|
|
// make sure that the form cannot be accessed by users who don't need this
|
|
ctx.Redirect(setting.AppSubURL + "/")
|
|
return
|
|
}
|
|
}
|
|
|
|
// Redirect to dashboard (or alternate location) if user tries to visit any non-login page.
|
|
if options.SignOutRequired && ctx.IsSigned && ctx.Req.URL.RequestURI() != "/" {
|
|
ctx.RedirectToFirst(ctx.FormString("redirect_to"))
|
|
return
|
|
}
|
|
|
|
if !options.SignOutRequired && !options.DisableCSRF && ctx.Req.Method == "POST" {
|
|
ctx.Csrf.Validate(ctx)
|
|
if ctx.Written() {
|
|
return
|
|
}
|
|
}
|
|
|
|
if options.SignInRequired {
|
|
if !ctx.IsSigned {
|
|
if ctx.Req.URL.Path != "/user/events" {
|
|
middleware.SetRedirectToCookie(ctx.Resp, setting.AppSubURL+ctx.Req.URL.RequestURI())
|
|
}
|
|
ctx.Redirect(setting.AppSubURL + "/user/login")
|
|
return
|
|
} else if !ctx.Doer.IsActive && setting.Service.RegisterEmailConfirm {
|
|
ctx.Data["Title"] = ctx.Tr("auth.active_your_account")
|
|
ctx.HTML(http.StatusOK, "user/auth/activate")
|
|
return
|
|
}
|
|
}
|
|
|
|
// Redirect to log in page if auto-signin info is provided and has not signed in.
|
|
if !options.SignOutRequired && !ctx.IsSigned &&
|
|
ctx.GetSiteCookie(setting.CookieRememberName) != "" {
|
|
if ctx.Req.URL.Path != "/user/events" {
|
|
middleware.SetRedirectToCookie(ctx.Resp, setting.AppSubURL+ctx.Req.URL.RequestURI())
|
|
}
|
|
ctx.Redirect(setting.AppSubURL + "/user/login")
|
|
return
|
|
}
|
|
|
|
if options.AdminRequired {
|
|
if !ctx.Doer.IsAdmin {
|
|
ctx.Error(http.StatusForbidden)
|
|
return
|
|
}
|
|
ctx.Data["PageIsAdmin"] = true
|
|
}
|
|
}
|
|
}
|
|
|
|
func ctxDataSet(args ...any) func(ctx *context.Context) {
|
|
return func(ctx *context.Context) {
|
|
for i := 0; i < len(args); i += 2 {
|
|
ctx.Data[args[i].(string)] = args[i+1]
|
|
}
|
|
}
|
|
}
|
|
|
|
// Routes returns all web routes
|
|
func Routes() *web.Route {
|
|
routes := web.NewRoute()
|
|
|
|
routes.Head("/", misc.DummyOK) // for health check - doesn't need to be passed through gzip handler
|
|
routes.Methods("GET, HEAD, OPTIONS", "/assets/*", optionsCorsHandler(), public.FileHandlerFunc())
|
|
routes.Methods("GET, HEAD", "/avatars/*", storageHandler(setting.Avatar.Storage, "avatars", storage.Avatars))
|
|
routes.Methods("GET, HEAD", "/repo-avatars/*", storageHandler(setting.RepoAvatar.Storage, "repo-avatars", storage.RepoAvatars))
|
|
routes.Methods("GET, HEAD", "/apple-touch-icon.png", misc.StaticRedirect("/assets/img/apple-touch-icon.png"))
|
|
routes.Methods("GET, HEAD", "/apple-touch-icon-precomposed.png", misc.StaticRedirect("/assets/img/apple-touch-icon.png"))
|
|
routes.Methods("GET, HEAD", "/favicon.ico", misc.StaticRedirect("/assets/img/favicon.png"))
|
|
|
|
_ = templates.HTMLRenderer()
|
|
|
|
var mid []any
|
|
|
|
if setting.EnableGzip {
|
|
wrapper, err := gzhttp.NewWrapper(gzhttp.RandomJitter(32, 0, false), gzhttp.MinSize(GzipMinSize))
|
|
if err != nil {
|
|
log.Fatal("gzhttp.NewWrapper failed: %v", err)
|
|
}
|
|
mid = append(mid, wrapper)
|
|
}
|
|
|
|
if setting.Service.EnableCaptcha {
|
|
// The captcha http.Handler should only fire on /captcha/* so we can just mount this on that url
|
|
routes.Methods("GET,HEAD", "/captcha/*", append(mid, captcha.Server(captcha.StdWidth, captcha.StdHeight).ServeHTTP)...)
|
|
}
|
|
|
|
if setting.Metrics.Enabled {
|
|
prometheus.MustRegister(metrics.NewCollector())
|
|
routes.Get("/metrics", append(mid, Metrics)...)
|
|
}
|
|
|
|
routes.Methods("GET,HEAD", "/robots.txt", append(mid, misc.RobotsTxt)...)
|
|
routes.Get("/ssh_info", misc.SSHInfo)
|
|
routes.Get("/api/healthz", healthcheck.Check)
|
|
|
|
mid = append(mid, common.Sessioner(), context.Contexter())
|
|
|
|
// Get user from session if logged in.
|
|
mid = append(mid, webAuth(buildAuthGroup()))
|
|
|
|
// GetHead allows a HEAD request redirect to GET if HEAD method is not defined for that route
|
|
mid = append(mid, chi_middleware.GetHead)
|
|
|
|
if setting.API.EnableSwagger {
|
|
// Note: The route is here but no in API routes because it renders a web page
|
|
routes.Get("/api/swagger", append(mid, misc.Swagger)...) // Render V1 by default
|
|
routes.Get("/api/forgejo/swagger", append(mid, misc.SwaggerForgejo)...)
|
|
}
|
|
|
|
// TODO: These really seem like things that could be folded into Contexter or as helper functions
|
|
mid = append(mid, user.GetNotificationCount)
|
|
mid = append(mid, repo.GetActiveStopwatch)
|
|
mid = append(mid, goGet)
|
|
|
|
others := web.NewRoute()
|
|
others.Use(mid...)
|
|
registerRoutes(others)
|
|
routes.Mount("", others)
|
|
return routes
|
|
}
|
|
|
|
var ignSignInAndCsrf = verifyAuthWithOptions(&common.VerifyOptions{DisableCSRF: true})
|
|
|
|
// registerRoutes register routes
|
|
func registerRoutes(m *web.Route) {
|
|
reqSignIn := verifyAuthWithOptions(&common.VerifyOptions{SignInRequired: true})
|
|
reqSignOut := verifyAuthWithOptions(&common.VerifyOptions{SignOutRequired: true})
|
|
// TODO: rename them to "optSignIn", which means that the "sign-in" could be optional, depends on the VerifyOptions (RequireSignInView)
|
|
ignSignIn := verifyAuthWithOptions(&common.VerifyOptions{SignInRequired: setting.Service.RequireSignInView})
|
|
ignExploreSignIn := verifyAuthWithOptions(&common.VerifyOptions{SignInRequired: setting.Service.RequireSignInView || setting.Service.Explore.RequireSigninView})
|
|
|
|
validation.AddBindingRules()
|
|
|
|
linkAccountEnabled := func(ctx *context.Context) {
|
|
if !setting.Service.EnableOpenIDSignIn && !setting.Service.EnableOpenIDSignUp && !setting.OAuth2.Enabled {
|
|
ctx.Error(http.StatusForbidden)
|
|
return
|
|
}
|
|
}
|
|
|
|
openIDSignInEnabled := func(ctx *context.Context) {
|
|
if !setting.Service.EnableOpenIDSignIn {
|
|
ctx.Error(http.StatusForbidden)
|
|
return
|
|
}
|
|
}
|
|
|
|
openIDSignUpEnabled := func(ctx *context.Context) {
|
|
if !setting.Service.EnableOpenIDSignUp {
|
|
ctx.Error(http.StatusForbidden)
|
|
return
|
|
}
|
|
}
|
|
|
|
oauth2Enabled := func(ctx *context.Context) {
|
|
if !setting.OAuth2.Enabled {
|
|
ctx.Error(http.StatusForbidden)
|
|
return
|
|
}
|
|
}
|
|
|
|
reqMilestonesDashboardPageEnabled := func(ctx *context.Context) {
|
|
if !setting.Service.ShowMilestonesDashboardPage {
|
|
ctx.Error(http.StatusForbidden)
|
|
return
|
|
}
|
|
}
|
|
|
|
// webhooksEnabled requires webhooks to be enabled by admin.
|
|
webhooksEnabled := func(ctx *context.Context) {
|
|
if setting.DisableWebhooks {
|
|
ctx.Error(http.StatusForbidden)
|
|
return
|
|
}
|
|
}
|
|
|
|
lfsServerEnabled := func(ctx *context.Context) {
|
|
if !setting.LFS.StartServer {
|
|
ctx.Error(http.StatusNotFound)
|
|
return
|
|
}
|
|
}
|
|
|
|
federationEnabled := func(ctx *context.Context) {
|
|
if !setting.Federation.Enabled {
|
|
ctx.Error(http.StatusNotFound)
|
|
return
|
|
}
|
|
}
|
|
|
|
dlSourceEnabled := func(ctx *context.Context) {
|
|
if setting.Repository.DisableDownloadSourceArchives {
|
|
ctx.Error(http.StatusNotFound)
|
|
return
|
|
}
|
|
}
|
|
|
|
sitemapEnabled := func(ctx *context.Context) {
|
|
if !setting.Other.EnableSitemap {
|
|
ctx.Error(http.StatusNotFound)
|
|
return
|
|
}
|
|
}
|
|
|
|
packagesEnabled := func(ctx *context.Context) {
|
|
if !setting.Packages.Enabled {
|
|
ctx.Error(http.StatusForbidden)
|
|
return
|
|
}
|
|
}
|
|
|
|
feedEnabled := func(ctx *context.Context) {
|
|
if !setting.Other.EnableFeed {
|
|
ctx.Error(http.StatusNotFound)
|
|
return
|
|
}
|
|
}
|
|
|
|
reqUnitAccess := func(unitType unit.Type, accessMode perm.AccessMode, ignoreGlobal bool) func(ctx *context.Context) {
|
|
return func(ctx *context.Context) {
|
|
// only check global disabled units when ignoreGlobal is false
|
|
if !ignoreGlobal && unitType.UnitGlobalDisabled() {
|
|
ctx.NotFound(unitType.String(), nil)
|
|
return
|
|
}
|
|
|
|
if ctx.ContextUser == nil {
|
|
ctx.NotFound(unitType.String(), nil)
|
|
return
|
|
}
|
|
|
|
if ctx.ContextUser.IsOrganization() {
|
|
if ctx.Org.Organization.UnitPermission(ctx, ctx.Doer, unitType) < accessMode {
|
|
ctx.NotFound(unitType.String(), nil)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
addSettingsVariablesRoutes := func() {
|
|
m.Group("/variables", func() {
|
|
m.Get("", repo_setting.Variables)
|
|
m.Post("/new", web.Bind(forms.EditVariableForm{}), repo_setting.VariableCreate)
|
|
m.Post("/{variable_id}/edit", web.Bind(forms.EditVariableForm{}), repo_setting.VariableUpdate)
|
|
m.Post("/{variable_id}/delete", repo_setting.VariableDelete)
|
|
})
|
|
}
|
|
|
|
addSettingsSecretsRoutes := func() {
|
|
m.Group("/secrets", func() {
|
|
m.Get("", repo_setting.Secrets)
|
|
m.Post("", web.Bind(forms.AddSecretForm{}), repo_setting.SecretsPost)
|
|
m.Post("/delete", repo_setting.SecretsDelete)
|
|
})
|
|
}
|
|
|
|
addSettingsRunnersRoutes := func() {
|
|
m.Group("/runners", func() {
|
|
m.Get("", repo_setting.Runners)
|
|
m.Combo("/{runnerid}").Get(repo_setting.RunnersEdit).
|
|
Post(web.Bind(forms.EditRunnerForm{}), repo_setting.RunnersEditPost)
|
|
m.Post("/{runnerid}/delete", repo_setting.RunnerDeletePost)
|
|
m.Get("/reset_registration_token", repo_setting.ResetRunnerRegistrationToken)
|
|
})
|
|
}
|
|
|
|
// FIXME: not all routes need go through same middleware.
|
|
// Especially some AJAX requests, we can reduce middleware number to improve performance.
|
|
|
|
m.Get("/", Home)
|
|
m.Get("/sitemap.xml", sitemapEnabled, ignExploreSignIn, HomeSitemap)
|
|
m.Group("/.well-known", func() {
|
|
m.Get("/openid-configuration", auth.OIDCWellKnown)
|
|
m.Group("", func() {
|
|
m.Get("/nodeinfo", NodeInfoLinks)
|
|
m.Get("/webfinger", WebfingerQuery)
|
|
}, federationEnabled)
|
|
m.Get("/change-password", func(ctx *context.Context) {
|
|
ctx.Redirect(setting.AppSubURL + "/user/settings/account")
|
|
})
|
|
m.Methods("GET, HEAD", "/*", public.FileHandlerFunc())
|
|
}, optionsCorsHandler())
|
|
|
|
m.Group("/explore", func() {
|
|
m.Get("", func(ctx *context.Context) {
|
|
ctx.Redirect(setting.AppSubURL + "/explore/repos")
|
|
})
|
|
m.Get("/repos", explore.Repos)
|
|
m.Get("/repos/sitemap-{idx}.xml", sitemapEnabled, explore.Repos)
|
|
m.Get("/users", explore.Users)
|
|
m.Get("/users/sitemap-{idx}.xml", sitemapEnabled, explore.Users)
|
|
m.Get("/organizations", explore.Organizations)
|
|
m.Get("/code", func(ctx *context.Context) {
|
|
if unit.TypeCode.UnitGlobalDisabled() {
|
|
ctx.NotFound(unit.TypeCode.String(), nil)
|
|
return
|
|
}
|
|
}, explore.Code)
|
|
m.Get("/topics/search", explore.TopicSearch)
|
|
}, ignExploreSignIn)
|
|
m.Group("/issues", func() {
|
|
m.Get("", user.Issues)
|
|
m.Get("/search", repo.SearchIssues)
|
|
}, reqSignIn)
|
|
|
|
m.Get("/pulls", reqSignIn, user.Pulls)
|
|
m.Get("/milestones", reqSignIn, reqMilestonesDashboardPageEnabled, user.Milestones)
|
|
|
|
// ***** START: User *****
|
|
// "user/login" doesn't need signOut, then logged-in users can still access this route for redirection purposes by "/user/login?redirec_to=..."
|
|
m.Get("/user/login", auth.SignIn)
|
|
m.Group("/user", func() {
|
|
m.Post("/login", web.Bind(forms.SignInForm{}), auth.SignInPost)
|
|
m.Group("", func() {
|
|
m.Combo("/login/openid").
|
|
Get(auth.SignInOpenID).
|
|
Post(web.Bind(forms.SignInOpenIDForm{}), auth.SignInOpenIDPost)
|
|
}, openIDSignInEnabled)
|
|
m.Group("/openid", func() {
|
|
m.Combo("/connect").
|
|
Get(auth.ConnectOpenID).
|
|
Post(web.Bind(forms.ConnectOpenIDForm{}), auth.ConnectOpenIDPost)
|
|
m.Group("/register", func() {
|
|
m.Combo("").
|
|
Get(auth.RegisterOpenID, openIDSignUpEnabled).
|
|
Post(web.Bind(forms.SignUpOpenIDForm{}), auth.RegisterOpenIDPost)
|
|
}, openIDSignUpEnabled)
|
|
}, openIDSignInEnabled)
|
|
m.Get("/sign_up", auth.SignUp)
|
|
m.Post("/sign_up", web.Bind(forms.RegisterForm{}), auth.SignUpPost)
|
|
m.Get("/link_account", linkAccountEnabled, auth.LinkAccount)
|
|
m.Post("/link_account_signin", linkAccountEnabled, web.Bind(forms.SignInForm{}), auth.LinkAccountPostSignIn)
|
|
m.Post("/link_account_signup", linkAccountEnabled, web.Bind(forms.RegisterForm{}), auth.LinkAccountPostRegister)
|
|
m.Group("/two_factor", func() {
|
|
m.Get("", auth.TwoFactor)
|
|
m.Post("", web.Bind(forms.TwoFactorAuthForm{}), auth.TwoFactorPost)
|
|
m.Get("/scratch", auth.TwoFactorScratch)
|
|
m.Post("/scratch", web.Bind(forms.TwoFactorScratchAuthForm{}), auth.TwoFactorScratchPost)
|
|
})
|
|
m.Group("/webauthn", func() {
|
|
m.Get("", auth.WebAuthn)
|
|
m.Get("/assertion", auth.WebAuthnLoginAssertion)
|
|
m.Post("/assertion", auth.WebAuthnLoginAssertionPost)
|
|
})
|
|
}, reqSignOut)
|
|
|
|
m.Any("/user/events", routing.MarkLongPolling, events.Events)
|
|
|
|
m.Group("/login/oauth", func() {
|
|
m.Group("", func() {
|
|
m.Get("/authorize", web.Bind(forms.AuthorizationForm{}), auth.AuthorizeOAuth)
|
|
m.Post("/grant", web.Bind(forms.GrantApplicationForm{}), auth.GrantApplicationOAuth)
|
|
// TODO manage redirection
|
|
m.Post("/authorize", web.Bind(forms.AuthorizationForm{}), auth.AuthorizeOAuth)
|
|
}, ignSignInAndCsrf, reqSignIn)
|
|
|
|
m.Methods("GET, POST, OPTIONS", "/userinfo", optionsCorsHandler(), ignSignInAndCsrf, auth.InfoOAuth)
|
|
m.Methods("POST, OPTIONS", "/access_token", optionsCorsHandler(), web.Bind(forms.AccessTokenForm{}), ignSignInAndCsrf, auth.AccessTokenOAuth)
|
|
m.Methods("GET, OPTIONS", "/keys", optionsCorsHandler(), ignSignInAndCsrf, auth.OIDCKeys)
|
|
m.Methods("POST, OPTIONS", "/introspect", optionsCorsHandler(), web.Bind(forms.IntrospectTokenForm{}), ignSignInAndCsrf, auth.IntrospectOAuth)
|
|
}, oauth2Enabled)
|
|
|
|
m.Group("/user/settings", func() {
|
|
m.Get("", user_setting.Profile)
|
|
m.Post("", web.Bind(forms.UpdateProfileForm{}), user_setting.ProfilePost)
|
|
m.Get("/change_password", auth.MustChangePassword)
|
|
m.Post("/change_password", web.Bind(forms.MustChangePasswordForm{}), auth.MustChangePasswordPost)
|
|
m.Post("/avatar", web.Bind(forms.AvatarForm{}), user_setting.AvatarPost)
|
|
m.Post("/avatar/delete", user_setting.DeleteAvatar)
|
|
m.Group("/account", func() {
|
|
m.Combo("").Get(user_setting.Account).Post(web.Bind(forms.ChangePasswordForm{}), user_setting.AccountPost)
|
|
m.Post("/email", web.Bind(forms.AddEmailForm{}), user_setting.EmailPost)
|
|
m.Post("/email/delete", user_setting.DeleteEmail)
|
|
m.Post("/delete", user_setting.DeleteAccount)
|
|
})
|
|
m.Group("/appearance", func() {
|
|
m.Get("", user_setting.Appearance)
|
|
m.Post("/language", web.Bind(forms.UpdateLanguageForm{}), user_setting.UpdateUserLang)
|
|
m.Post("/hints", web.Bind(forms.UpdateHintsForm{}), user_setting.UpdateUserHints)
|
|
m.Post("/hidden_comments", user_setting.UpdateUserHiddenComments)
|
|
m.Post("/theme", web.Bind(forms.UpdateThemeForm{}), user_setting.UpdateUIThemePost)
|
|
})
|
|
m.Group("/security", func() {
|
|
m.Get("", security.Security)
|
|
m.Group("/two_factor", func() {
|
|
m.Post("/regenerate_scratch", security.RegenerateScratchTwoFactor)
|
|
m.Post("/disable", security.DisableTwoFactor)
|
|
m.Get("/enroll", security.EnrollTwoFactor)
|
|
m.Post("/enroll", web.Bind(forms.TwoFactorAuthForm{}), security.EnrollTwoFactorPost)
|
|
})
|
|
m.Group("/webauthn", func() {
|
|
m.Post("/request_register", web.Bind(forms.WebauthnRegistrationForm{}), security.WebAuthnRegister)
|
|
m.Post("/register", security.WebauthnRegisterPost)
|
|
m.Post("/delete", web.Bind(forms.WebauthnDeleteForm{}), security.WebauthnDelete)
|
|
})
|
|
m.Group("/openid", func() {
|
|
m.Post("", web.Bind(forms.AddOpenIDForm{}), security.OpenIDPost)
|
|
m.Post("/delete", security.DeleteOpenID)
|
|
m.Post("/toggle_visibility", security.ToggleOpenIDVisibility)
|
|
}, openIDSignInEnabled)
|
|
m.Post("/account_link", linkAccountEnabled, security.DeleteAccountLink)
|
|
})
|
|
|
|
m.Group("/applications", func() {
|
|
// oauth2 applications
|
|
m.Group("/oauth2", func() {
|
|
m.Get("/{id}", user_setting.OAuth2ApplicationShow)
|
|
m.Post("/{id}", web.Bind(forms.EditOAuth2ApplicationForm{}), user_setting.OAuthApplicationsEdit)
|
|
m.Post("/{id}/regenerate_secret", user_setting.OAuthApplicationsRegenerateSecret)
|
|
m.Post("", web.Bind(forms.EditOAuth2ApplicationForm{}), user_setting.OAuthApplicationsPost)
|
|
m.Post("/{id}/delete", user_setting.DeleteOAuth2Application)
|
|
m.Post("/{id}/revoke/{grantId}", user_setting.RevokeOAuth2Grant)
|
|
}, oauth2Enabled)
|
|
|
|
// access token applications
|
|
m.Combo("").Get(user_setting.Applications).
|
|
Post(web.Bind(forms.NewAccessTokenForm{}), user_setting.ApplicationsPost)
|
|
m.Post("/delete", user_setting.DeleteApplication)
|
|
})
|
|
|
|
m.Combo("/keys").Get(user_setting.Keys).
|
|
Post(web.Bind(forms.AddKeyForm{}), user_setting.KeysPost)
|
|
m.Post("/keys/delete", user_setting.DeleteKey)
|
|
m.Group("/packages", func() {
|
|
m.Get("", user_setting.Packages)
|
|
m.Group("/rules", func() {
|
|
m.Group("/add", func() {
|
|
m.Get("", user_setting.PackagesRuleAdd)
|
|
m.Post("", web.Bind(forms.PackageCleanupRuleForm{}), user_setting.PackagesRuleAddPost)
|
|
})
|
|
m.Group("/{id}", func() {
|
|
m.Get("", user_setting.PackagesRuleEdit)
|
|
m.Post("", web.Bind(forms.PackageCleanupRuleForm{}), user_setting.PackagesRuleEditPost)
|
|
m.Get("/preview", user_setting.PackagesRulePreview)
|
|
})
|
|
})
|
|
m.Group("/cargo", func() {
|
|
m.Post("/initialize", user_setting.InitializeCargoIndex)
|
|
m.Post("/rebuild", user_setting.RebuildCargoIndex)
|
|
})
|
|
m.Post("/chef/regenerate_keypair", user_setting.RegenerateChefKeyPair)
|
|
}, packagesEnabled)
|
|
|
|
m.Group("/actions", func() {
|
|
m.Get("", user_setting.RedirectToDefaultSetting)
|
|
addSettingsRunnersRoutes()
|
|
addSettingsSecretsRoutes()
|
|
addSettingsVariablesRoutes()
|
|
}, actions.MustEnableActions)
|
|
|
|
m.Get("/organization", user_setting.Organization)
|
|
m.Get("/repos", user_setting.Repos)
|
|
m.Post("/repos/unadopted", user_setting.AdoptOrDeleteRepository)
|
|
|
|
m.Group("/hooks", func() {
|
|
m.Get("", user_setting.Webhooks)
|
|
m.Post("/delete", user_setting.DeleteWebhook)
|
|
m.Get("/{type}/new", repo_setting.WebhookNew)
|
|
m.Post("/{type}/new", repo_setting.WebhookCreate)
|
|
m.Group("/{id}", func() {
|
|
m.Get("", repo_setting.WebhookEdit)
|
|
m.Post("", repo_setting.WebhookUpdate)
|
|
m.Post("/replay/{uuid}", repo_setting.WebhookReplay)
|
|
})
|
|
}, webhooksEnabled)
|
|
|
|
m.Group("/blocked_users", func() {
|
|
m.Get("", user_setting.BlockedUsers)
|
|
m.Post("/unblock", user_setting.UnblockUser)
|
|
})
|
|
}, reqSignIn, ctxDataSet("PageIsUserSettings", true, "AllThemes", setting.UI.Themes, "EnablePackages", setting.Packages.Enabled))
|
|
|
|
m.Group("/user", func() {
|
|
m.Get("/activate", auth.Activate)
|
|
m.Post("/activate", auth.ActivatePost)
|
|
m.Any("/activate_email", auth.ActivateEmail)
|
|
m.Get("/avatar/{username}/{size}", user.AvatarByUserName)
|
|
m.Get("/recover_account", auth.ResetPasswd)
|
|
m.Post("/recover_account", auth.ResetPasswdPost)
|
|
m.Get("/forgot_password", auth.ForgotPasswd)
|
|
m.Post("/forgot_password", auth.ForgotPasswdPost)
|
|
m.Post("/logout", auth.SignOut)
|
|
m.Get("/task/{task}", reqSignIn, user.TaskStatus)
|
|
m.Get("/stopwatches", reqSignIn, user.GetStopwatches)
|
|
m.Get("/search_candidates", ignExploreSignIn, user.SearchCandidates)
|
|
m.Group("/oauth2", func() {
|
|
m.Get("/{provider}", auth.SignInOAuth)
|
|
m.Get("/{provider}/callback", auth.SignInOAuthCallback)
|
|
})
|
|
})
|
|
// ***** END: User *****
|
|
|
|
m.Get("/avatar/{hash}", user.AvatarByEmailHash)
|
|
|
|
adminReq := verifyAuthWithOptions(&common.VerifyOptions{SignInRequired: true, AdminRequired: true})
|
|
|
|
// ***** START: Admin *****
|
|
m.Group("/admin", func() {
|
|
m.Get("", admin.Dashboard)
|
|
m.Get("/system_status", admin.SystemStatus)
|
|
m.Post("", web.Bind(forms.AdminDashboardForm{}), admin.DashboardPost)
|
|
|
|
if setting.Database.Type.IsMySQL() {
|
|
m.Get("/self_check", admin.SelfCheck)
|
|
}
|
|
|
|
m.Group("/config", func() {
|
|
m.Get("", admin.Config)
|
|
m.Post("", admin.ChangeConfig)
|
|
m.Post("/test_mail", admin.SendTestMail)
|
|
m.Post("/test_cache", admin.TestCache)
|
|
m.Get("/settings", admin.ConfigSettings)
|
|
})
|
|
|
|
m.Group("/monitor", func() {
|
|
m.Get("/stats", admin.MonitorStats)
|
|
m.Get("/cron", admin.CronTasks)
|
|
m.Get("/stacktrace", admin.Stacktrace)
|
|
m.Post("/stacktrace/cancel/{pid}", admin.StacktraceCancel)
|
|
m.Get("/queue", admin.Queues)
|
|
m.Group("/queue/{qid}", func() {
|
|
m.Get("", admin.QueueManage)
|
|
m.Post("/set", admin.QueueSet)
|
|
m.Post("/remove-all-items", admin.QueueRemoveAllItems)
|
|
})
|
|
m.Get("/diagnosis", admin.MonitorDiagnosis)
|
|
})
|
|
|
|
m.Group("/users", func() {
|
|
m.Get("", admin.Users)
|
|
m.Combo("/new").Get(admin.NewUser).Post(web.Bind(forms.AdminCreateUserForm{}), admin.NewUserPost)
|
|
m.Get("/{userid}", admin.ViewUser)
|
|
m.Combo("/{userid}/edit").Get(admin.EditUser).Post(web.Bind(forms.AdminEditUserForm{}), admin.EditUserPost)
|
|
m.Post("/{userid}/delete", admin.DeleteUser)
|
|
m.Post("/{userid}/avatar", web.Bind(forms.AvatarForm{}), admin.AvatarPost)
|
|
m.Post("/{userid}/avatar/delete", admin.DeleteAvatar)
|
|
})
|
|
|
|
m.Group("/emails", func() {
|
|
m.Get("", admin.Emails)
|
|
m.Post("/activate", admin.ActivateEmail)
|
|
m.Post("/delete", admin.DeleteEmail)
|
|
})
|
|
|
|
m.Group("/orgs", func() {
|
|
m.Get("", admin.Organizations)
|
|
})
|
|
|
|
m.Group("/repos", func() {
|
|
m.Get("", admin.Repos)
|
|
m.Combo("/unadopted").Get(admin.UnadoptedRepos).Post(admin.AdoptOrDeleteRepository)
|
|
m.Post("/delete", admin.DeleteRepo)
|
|
})
|
|
|
|
m.Group("/packages", func() {
|
|
m.Get("", admin.Packages)
|
|
m.Post("/delete", admin.DeletePackageVersion)
|
|
m.Post("/cleanup", admin.CleanupExpiredData)
|
|
}, packagesEnabled)
|
|
|
|
m.Group("/hooks", func() {
|
|
m.Get("", admin.DefaultOrSystemWebhooks)
|
|
m.Post("/delete", admin.DeleteDefaultOrSystemWebhook)
|
|
m.Group("/{id}", func() {
|
|
m.Get("", repo_setting.WebhookEdit)
|
|
m.Post("", repo_setting.WebhookUpdate)
|
|
m.Post("/replay/{uuid}", repo_setting.WebhookReplay)
|
|
})
|
|
}, webhooksEnabled)
|
|
|
|
m.Group("/{configType:default-hooks|system-hooks}", func() {
|
|
m.Get("/{type}/new", repo_setting.WebhookNew)
|
|
m.Post("/{type}/new", repo_setting.WebhookCreate)
|
|
})
|
|
|
|
m.Group("/auths", func() {
|
|
m.Get("", admin.Authentications)
|
|
m.Combo("/new").Get(admin.NewAuthSource).Post(web.Bind(forms.AuthenticationForm{}), admin.NewAuthSourcePost)
|
|
m.Combo("/{authid}").Get(admin.EditAuthSource).
|
|
Post(web.Bind(forms.AuthenticationForm{}), admin.EditAuthSourcePost)
|
|
m.Post("/{authid}/delete", admin.DeleteAuthSource)
|
|
})
|
|
|
|
m.Group("/notices", func() {
|
|
m.Get("", admin.Notices)
|
|
m.Post("/delete", admin.DeleteNotices)
|
|
m.Post("/empty", admin.EmptyNotices)
|
|
})
|
|
|
|
m.Group("/applications", func() {
|
|
m.Get("", admin.Applications)
|
|
m.Post("/oauth2", web.Bind(forms.EditOAuth2ApplicationForm{}), admin.ApplicationsPost)
|
|
m.Group("/oauth2/{id}", func() {
|
|
m.Combo("").Get(admin.EditApplication).Post(web.Bind(forms.EditOAuth2ApplicationForm{}), admin.EditApplicationPost)
|
|
m.Post("/regenerate_secret", admin.ApplicationsRegenerateSecret)
|
|
m.Post("/delete", admin.DeleteApplication)
|
|
})
|
|
}, oauth2Enabled)
|
|
|
|
m.Group("/actions", func() {
|
|
m.Get("", admin.RedirectToDefaultSetting)
|
|
addSettingsRunnersRoutes()
|
|
addSettingsVariablesRoutes()
|
|
})
|
|
}, adminReq, ctxDataSet("EnableOAuth2", setting.OAuth2.Enabled, "EnablePackages", setting.Packages.Enabled))
|
|
// ***** END: Admin *****
|
|
|
|
m.Group("", func() {
|
|
m.Get("/{username}", user.UsernameSubRoute)
|
|
m.Methods("GET, OPTIONS", "/attachments/{uuid}", optionsCorsHandler(), repo.GetAttachment)
|
|
}, ignSignIn)
|
|
|
|
m.Post("/{username}", reqSignIn, context.UserAssignmentWeb(), user.Action)
|
|
|
|
reqRepoAdmin := context.RequireRepoAdmin()
|
|
reqRepoCodeWriter := context.RequireRepoWriter(unit.TypeCode)
|
|
canEnableEditor := context.CanEnableEditor()
|
|
reqRepoCodeReader := context.RequireRepoReader(unit.TypeCode)
|
|
reqRepoReleaseWriter := context.RequireRepoWriter(unit.TypeReleases)
|
|
reqRepoReleaseReader := context.RequireRepoReader(unit.TypeReleases)
|
|
reqRepoWikiWriter := context.RequireRepoWriter(unit.TypeWiki)
|
|
reqRepoIssueReader := context.RequireRepoReader(unit.TypeIssues)
|
|
reqRepoPullsReader := context.RequireRepoReader(unit.TypePullRequests)
|
|
reqRepoIssuesOrPullsWriter := context.RequireRepoWriterOr(unit.TypeIssues, unit.TypePullRequests)
|
|
reqRepoIssuesOrPullsReader := context.RequireRepoReaderOr(unit.TypeIssues, unit.TypePullRequests)
|
|
reqRepoProjectsReader := context.RequireRepoReader(unit.TypeProjects)
|
|
reqRepoProjectsWriter := context.RequireRepoWriter(unit.TypeProjects)
|
|
reqRepoActionsReader := context.RequireRepoReader(unit.TypeActions)
|
|
reqRepoActionsWriter := context.RequireRepoWriter(unit.TypeActions)
|
|
|
|
reqPackageAccess := func(accessMode perm.AccessMode) func(ctx *context.Context) {
|
|
return func(ctx *context.Context) {
|
|
if ctx.Package.AccessMode < accessMode && !ctx.IsUserSiteAdmin() {
|
|
ctx.NotFound("", nil)
|
|
}
|
|
}
|
|
}
|
|
|
|
individualPermsChecker := func(ctx *context.Context) {
|
|
// org permissions have been checked in context.OrgAssignment(), but individual permissions haven't been checked.
|
|
if ctx.ContextUser.IsIndividual() {
|
|
switch {
|
|
case ctx.ContextUser.Visibility == structs.VisibleTypePrivate:
|
|
if ctx.Doer == nil || (ctx.ContextUser.ID != ctx.Doer.ID && !ctx.Doer.IsAdmin) {
|
|
ctx.NotFound("Visit Project", nil)
|
|
return
|
|
}
|
|
case ctx.ContextUser.Visibility == structs.VisibleTypeLimited:
|
|
if ctx.Doer == nil {
|
|
ctx.NotFound("Visit Project", nil)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// ***** START: Organization *****
|
|
m.Group("/org", func() {
|
|
m.Group("/{org}", func() {
|
|
m.Get("/members", org.Members)
|
|
}, context.OrgAssignment())
|
|
}, ignSignIn)
|
|
|
|
m.Group("/org", func() {
|
|
m.Group("", func() {
|
|
m.Get("/create", org.Create)
|
|
m.Post("/create", web.Bind(forms.CreateOrgForm{}), org.CreatePost)
|
|
})
|
|
|
|
m.Group("/invite/{token}", func() {
|
|
m.Get("", org.TeamInvite)
|
|
m.Post("", org.TeamInvitePost)
|
|
})
|
|
|
|
m.Group("/{org}", func() {
|
|
m.Get("/dashboard", user.Dashboard)
|
|
m.Get("/dashboard/{team}", user.Dashboard)
|
|
m.Get("/issues", user.Issues)
|
|
m.Get("/issues/{team}", user.Issues)
|
|
m.Get("/pulls", user.Pulls)
|
|
m.Get("/pulls/{team}", user.Pulls)
|
|
m.Get("/milestones", reqMilestonesDashboardPageEnabled, user.Milestones)
|
|
m.Get("/milestones/{team}", reqMilestonesDashboardPageEnabled, user.Milestones)
|
|
m.Post("/members/action/{action}", org.MembersAction)
|
|
m.Get("/teams", org.Teams)
|
|
}, context.OrgAssignment(true, false, true))
|
|
|
|
m.Group("/{org}", func() {
|
|
m.Get("/teams/{team}", org.TeamMembers)
|
|
m.Get("/teams/{team}/repositories", org.TeamRepositories)
|
|
m.Post("/teams/{team}/action/{action}", org.TeamsAction)
|
|
m.Post("/teams/{team}/action/repo/{action}", org.TeamsRepoAction)
|
|
}, context.OrgAssignment(true, false, true))
|
|
|
|
// require admin permission
|
|
m.Group("/{org}", func() {
|
|
m.Get("/teams/-/search", org.SearchTeam)
|
|
}, context.OrgAssignment(true, false, false, true))
|
|
|
|
// require owner permission
|
|
m.Group("/{org}", func() {
|
|
m.Get("/teams/new", org.NewTeam)
|
|
m.Post("/teams/new", web.Bind(forms.CreateTeamForm{}), org.NewTeamPost)
|
|
m.Get("/teams/{team}/edit", org.EditTeam)
|
|
m.Post("/teams/{team}/edit", web.Bind(forms.CreateTeamForm{}), org.EditTeamPost)
|
|
m.Post("/teams/{team}/delete", org.DeleteTeam)
|
|
|
|
m.Group("/settings", func() {
|
|
m.Combo("").Get(org.Settings).
|
|
Post(web.Bind(forms.UpdateOrgSettingForm{}), org.SettingsPost)
|
|
m.Post("/avatar", web.Bind(forms.AvatarForm{}), org.SettingsAvatar)
|
|
m.Post("/avatar/delete", org.SettingsDeleteAvatar)
|
|
m.Group("/applications", func() {
|
|
m.Get("", org.Applications)
|
|
m.Post("/oauth2", web.Bind(forms.EditOAuth2ApplicationForm{}), org.OAuthApplicationsPost)
|
|
m.Group("/oauth2/{id}", func() {
|
|
m.Combo("").Get(org.OAuth2ApplicationShow).Post(web.Bind(forms.EditOAuth2ApplicationForm{}), org.OAuth2ApplicationEdit)
|
|
m.Post("/regenerate_secret", org.OAuthApplicationsRegenerateSecret)
|
|
m.Post("/delete", org.DeleteOAuth2Application)
|
|
})
|
|
}, oauth2Enabled)
|
|
|
|
m.Group("/hooks", func() {
|
|
m.Get("", org.Webhooks)
|
|
m.Post("/delete", org.DeleteWebhook)
|
|
m.Get("/{type}/new", repo_setting.WebhookNew)
|
|
m.Post("/{type}/new", repo_setting.WebhookCreate)
|
|
m.Group("/{id}", func() {
|
|
m.Get("", repo_setting.WebhookEdit)
|
|
m.Post("", repo_setting.WebhookUpdate)
|
|
m.Post("/replay/{uuid}", repo_setting.WebhookReplay)
|
|
})
|
|
}, webhooksEnabled)
|
|
|
|
m.Group("/labels", func() {
|
|
m.Get("", org.RetrieveLabels, org.Labels)
|
|
m.Post("/new", web.Bind(forms.CreateLabelForm{}), org.NewLabel)
|
|
m.Post("/edit", web.Bind(forms.CreateLabelForm{}), org.UpdateLabel)
|
|
m.Post("/delete", org.DeleteLabel)
|
|
m.Post("/initialize", web.Bind(forms.InitializeLabelsForm{}), org.InitializeLabels)
|
|
})
|
|
|
|
m.Group("/actions", func() {
|
|
m.Get("", org_setting.RedirectToDefaultSetting)
|
|
addSettingsRunnersRoutes()
|
|
addSettingsSecretsRoutes()
|
|
addSettingsVariablesRoutes()
|
|
}, actions.MustEnableActions)
|
|
|
|
m.Methods("GET,POST", "/delete", org.SettingsDelete)
|
|
|
|
m.Group("/blocked_users", func() {
|
|
m.Get("", org_setting.BlockedUsers)
|
|
m.Post("/block", org_setting.BlockedUsersBlock)
|
|
m.Post("/unblock", org_setting.BlockedUsersUnblock)
|
|
})
|
|
|
|
m.Group("/packages", func() {
|
|
m.Get("", org.Packages)
|
|
m.Group("/rules", func() {
|
|
m.Group("/add", func() {
|
|
m.Get("", org.PackagesRuleAdd)
|
|
m.Post("", web.Bind(forms.PackageCleanupRuleForm{}), org.PackagesRuleAddPost)
|
|
})
|
|
m.Group("/{id}", func() {
|
|
m.Get("", org.PackagesRuleEdit)
|
|
m.Post("", web.Bind(forms.PackageCleanupRuleForm{}), org.PackagesRuleEditPost)
|
|
m.Get("/preview", org.PackagesRulePreview)
|
|
})
|
|
})
|
|
m.Group("/cargo", func() {
|
|
m.Post("/initialize", org.InitializeCargoIndex)
|
|
m.Post("/rebuild", org.RebuildCargoIndex)
|
|
})
|
|
}, packagesEnabled)
|
|
}, ctxDataSet("EnableOAuth2", setting.OAuth2.Enabled, "EnablePackages", setting.Packages.Enabled, "PageIsOrgSettings", true))
|
|
}, context.OrgAssignment(true, true))
|
|
}, reqSignIn)
|
|
// ***** END: Organization *****
|
|
|
|
// ***** START: Repository *****
|
|
m.Group("/repo", func() {
|
|
m.Get("/create", repo.Create)
|
|
m.Post("/create", web.Bind(forms.CreateRepoForm{}), repo.CreatePost)
|
|
m.Get("/migrate", repo.Migrate)
|
|
m.Post("/migrate", web.Bind(forms.MigrateRepoForm{}), repo.MigratePost)
|
|
if !setting.Repository.DisableForks {
|
|
m.Get("/fork/{repoid}", context.RepoIDAssignment(), context.UnitTypes(), reqRepoCodeReader, repo.ForkByID)
|
|
}
|
|
m.Get("/search", repo.SearchRepo)
|
|
}, reqSignIn)
|
|
|
|
m.Group("/{username}/-", func() {
|
|
if setting.Packages.Enabled {
|
|
m.Group("/packages", func() {
|
|
m.Get("", user.ListPackages)
|
|
m.Group("/{type}/{name}", func() {
|
|
m.Get("", user.RedirectToLastVersion)
|
|
m.Get("/versions", user.ListPackageVersions)
|
|
m.Group("/{version}", func() {
|
|
m.Get("", user.ViewPackageVersion)
|
|
m.Get("/files/{fileid}", user.DownloadPackageFile)
|
|
m.Group("/settings", func() {
|
|
m.Get("", user.PackageSettings)
|
|
m.Post("", web.Bind(forms.PackageSettingForm{}), user.PackageSettingsPost)
|
|
}, reqPackageAccess(perm.AccessModeWrite))
|
|
})
|
|
})
|
|
}, context.PackageAssignment(), reqPackageAccess(perm.AccessModeRead))
|
|
}
|
|
|
|
m.Group("/projects", func() {
|
|
m.Group("", func() {
|
|
m.Get("", org.Projects)
|
|
m.Get("/{id}", org.ViewProject)
|
|
}, reqUnitAccess(unit.TypeProjects, perm.AccessModeRead, true))
|
|
m.Group("", func() { //nolint:dupl
|
|
m.Get("/new", org.RenderNewProject)
|
|
m.Post("/new", web.Bind(forms.CreateProjectForm{}), org.NewProjectPost)
|
|
m.Group("/{id}", func() {
|
|
m.Post("", web.Bind(forms.EditProjectColumnForm{}), org.AddColumnToProjectPost)
|
|
m.Post("/move", project.MoveColumns)
|
|
m.Post("/delete", org.DeleteProject)
|
|
|
|
m.Get("/edit", org.RenderEditProject)
|
|
m.Post("/edit", web.Bind(forms.CreateProjectForm{}), org.EditProjectPost)
|
|
m.Post("/{action:open|close}", org.ChangeProjectStatus)
|
|
|
|
m.Group("/{columnID}", func() {
|
|
m.Put("", web.Bind(forms.EditProjectColumnForm{}), org.EditProjectColumn)
|
|
m.Delete("", org.DeleteProjectColumn)
|
|
m.Post("/default", org.SetDefaultProjectColumn)
|
|
|
|
m.Post("/move", org.MoveIssues)
|
|
})
|
|
})
|
|
}, reqSignIn, reqUnitAccess(unit.TypeProjects, perm.AccessModeWrite, true), func(ctx *context.Context) {
|
|
if ctx.ContextUser.IsIndividual() && ctx.ContextUser.ID != ctx.Doer.ID {
|
|
ctx.NotFound("NewProject", nil)
|
|
return
|
|
}
|
|
})
|
|
}, reqUnitAccess(unit.TypeProjects, perm.AccessModeRead, true), individualPermsChecker)
|
|
|
|
m.Group("", func() {
|
|
m.Get("/code", user.CodeSearch)
|
|
}, reqUnitAccess(unit.TypeCode, perm.AccessModeRead, false), individualPermsChecker)
|
|
}, ignSignIn, context.UserAssignmentWeb(), context.OrgAssignment()) // for "/{username}/-" (packages, projects, code)
|
|
|
|
m.Group("/{username}/{reponame}", func() {
|
|
m.Group("/settings", func() {
|
|
m.Group("", func() {
|
|
m.Combo("").Get(repo_setting.Settings).
|
|
Post(web.Bind(forms.RepoSettingForm{}), repo_setting.SettingsPost)
|
|
}, repo_setting.SettingsCtxData)
|
|
m.Combo("/units").Get(repo_setting.Units).
|
|
Post(web.Bind(forms.RepoUnitSettingForm{}), repo_setting.UnitsPost)
|
|
m.Post("/avatar", web.Bind(forms.AvatarForm{}), repo_setting.SettingsAvatar)
|
|
m.Post("/avatar/delete", repo_setting.SettingsDeleteAvatar)
|
|
|
|
m.Group("/collaboration", func() {
|
|
m.Combo("").Get(repo_setting.Collaboration).Post(repo_setting.CollaborationPost)
|
|
m.Post("/access_mode", repo_setting.ChangeCollaborationAccessMode)
|
|
m.Post("/delete", repo_setting.DeleteCollaboration)
|
|
m.Group("/team", func() {
|
|
m.Post("", repo_setting.AddTeamPost)
|
|
m.Post("/delete", repo_setting.DeleteTeam)
|
|
})
|
|
})
|
|
|
|
m.Group("/branches", func() {
|
|
m.Post("/", repo_setting.SetDefaultBranchPost)
|
|
}, repo.MustBeNotEmpty)
|
|
|
|
m.Group("/branches", func() {
|
|
m.Get("/", repo_setting.ProtectedBranchRules)
|
|
m.Combo("/edit").Get(repo_setting.SettingsProtectedBranch).
|
|
Post(web.Bind(forms.ProtectBranchForm{}), context.RepoMustNotBeArchived(), repo_setting.SettingsProtectedBranchPost)
|
|
m.Post("/{id}/delete", repo_setting.DeleteProtectedBranchRulePost)
|
|
}, repo.MustBeNotEmpty)
|
|
|
|
m.Post("/rename_branch", web.Bind(forms.RenameBranchForm{}), context.RepoMustNotBeArchived(), repo_setting.RenameBranchPost)
|
|
|
|
m.Group("/tags", func() {
|
|
m.Get("", repo_setting.ProtectedTags)
|
|
m.Post("", web.Bind(forms.ProtectTagForm{}), context.RepoMustNotBeArchived(), repo_setting.NewProtectedTagPost)
|
|
m.Post("/delete", context.RepoMustNotBeArchived(), repo_setting.DeleteProtectedTagPost)
|
|
m.Get("/{id}", repo_setting.EditProtectedTag)
|
|
m.Post("/{id}", web.Bind(forms.ProtectTagForm{}), context.RepoMustNotBeArchived(), repo_setting.EditProtectedTagPost)
|
|
})
|
|
|
|
m.Group("/hooks/git", func() {
|
|
m.Get("", repo_setting.GitHooks)
|
|
m.Combo("/{name}").Get(repo_setting.GitHooksEdit).
|
|
Post(repo_setting.GitHooksEditPost)
|
|
}, context.GitHookService())
|
|
|
|
m.Group("/hooks", func() {
|
|
m.Get("", repo_setting.WebhookList)
|
|
m.Post("/delete", repo_setting.WebhookDelete)
|
|
m.Get("/{type}/new", repo_setting.WebhookNew)
|
|
m.Post("/{type}/new", repo_setting.WebhookCreate)
|
|
m.Group("/{id}", func() {
|
|
m.Get("", repo_setting.WebhookEdit)
|
|
m.Post("", repo_setting.WebhookUpdate)
|
|
m.Post("/test", repo_setting.WebhookTest)
|
|
m.Post("/replay/{uuid}", repo_setting.WebhookReplay)
|
|
})
|
|
}, webhooksEnabled)
|
|
|
|
m.Group("/keys", func() {
|
|
m.Combo("").Get(repo_setting.DeployKeys).
|
|
Post(web.Bind(forms.AddKeyForm{}), repo_setting.DeployKeysPost)
|
|
m.Post("/delete", repo_setting.DeleteDeployKey)
|
|
})
|
|
|
|
m.Group("/lfs", func() {
|
|
m.Get("/", repo_setting.LFSFiles)
|
|
m.Get("/show/{oid}", repo_setting.LFSFileGet)
|
|
m.Post("/delete/{oid}", repo_setting.LFSDelete)
|
|
m.Get("/pointers", repo_setting.LFSPointerFiles)
|
|
m.Post("/pointers/associate", repo_setting.LFSAutoAssociate)
|
|
m.Get("/find", repo_setting.LFSFileFind)
|
|
m.Group("/locks", func() {
|
|
m.Get("/", repo_setting.LFSLocks)
|
|
m.Post("/", repo_setting.LFSLockFile)
|
|
m.Post("/{lid}/unlock", repo_setting.LFSUnlock)
|
|
})
|
|
})
|
|
m.Group("/actions", func() {
|
|
m.Get("", repo_setting.RedirectToDefaultSetting)
|
|
addSettingsRunnersRoutes()
|
|
addSettingsSecretsRoutes()
|
|
addSettingsVariablesRoutes()
|
|
}, actions.MustEnableActions)
|
|
// the follow handler must be under "settings", otherwise this incomplete repo can't be accessed
|
|
m.Group("/migrate", func() {
|
|
m.Post("/retry", repo.MigrateRetryPost)
|
|
m.Post("/cancel", repo.MigrateCancelPost)
|
|
})
|
|
}, ctxDataSet("PageIsRepoSettings", true, "LFSStartServer", setting.LFS.StartServer))
|
|
}, reqSignIn, context.RepoAssignment, context.UnitTypes(), reqRepoAdmin, context.RepoRef())
|
|
|
|
m.Group("/{username}/{reponame}/action", func() {
|
|
m.Post("/watch", repo.ActionWatch(true))
|
|
m.Post("/unwatch", repo.ActionWatch(false))
|
|
m.Post("/accept_transfer", repo.ActionTransfer(true))
|
|
m.Post("/reject_transfer", repo.ActionTransfer(false))
|
|
if !setting.Repository.DisableStars {
|
|
m.Post("/star", repo.ActionStar(true))
|
|
m.Post("/unstar", repo.ActionStar(false))
|
|
}
|
|
}, reqSignIn, context.RepoAssignment, context.UnitTypes())
|
|
|
|
// Grouping for those endpoints not requiring authentication (but should respect ignSignIn)
|
|
m.Group("/{username}/{reponame}", func() {
|
|
m.Group("/milestone", func() {
|
|
m.Get("/{id}", repo.MilestoneIssuesAndPulls)
|
|
}, reqRepoIssuesOrPullsReader, context.RepoRef())
|
|
m.Get("/find/*", repo.FindFiles)
|
|
m.Group("/tree-list", func() {
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.TreeList)
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.TreeList)
|
|
m.Get("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.TreeList)
|
|
})
|
|
m.Get("/compare", repo.MustBeNotEmpty, reqRepoCodeReader, repo.SetEditorconfigIfExists, ignSignIn, repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.CompareDiff)
|
|
m.Combo("/compare/*", repo.MustBeNotEmpty, reqRepoCodeReader, repo.SetEditorconfigIfExists).
|
|
Get(repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.CompareDiff).
|
|
Post(reqSignIn, context.RepoMustNotBeArchived(), reqRepoPullsReader, repo.MustAllowPulls, web.Bind(forms.CreateIssueForm{}), repo.SetWhitespaceBehavior, repo.CompareAndPullRequestPost)
|
|
m.Group("/{type:issues|pulls}", func() {
|
|
m.Group("/{index}", func() {
|
|
m.Get("/info", repo.GetIssueInfo)
|
|
m.Get("/summary-card", repo.GetSummaryCard)
|
|
})
|
|
})
|
|
}, ignSignIn, context.RepoAssignment, context.UnitTypes()) // for "/{username}/{reponame}" which doesn't require authentication
|
|
|
|
// Grouping for those endpoints that do require authentication
|
|
m.Group("/{username}/{reponame}", func() {
|
|
if !setting.Repository.DisableForks {
|
|
m.Combo("/fork", reqRepoCodeReader).Get(repo.Fork).
|
|
Post(web.Bind(forms.CreateRepoForm{}), repo.ForkPost)
|
|
}
|
|
m.Group("/issues", func() {
|
|
m.Group("/new", func() {
|
|
m.Combo("").Get(context.RepoRef(), repo.NewIssue).
|
|
Post(web.Bind(forms.CreateIssueForm{}), repo.NewIssuePost)
|
|
m.Get("/choose", context.RepoRef(), repo.NewIssueChooseTemplate)
|
|
})
|
|
m.Get("/search", repo.ListIssues)
|
|
}, context.RepoMustNotBeArchived(), reqRepoIssueReader)
|
|
// FIXME: should use different URLs but mostly same logic for comments of issue and pull request.
|
|
// So they can apply their own enable/disable logic on routers.
|
|
m.Group("/{type:issues|pulls}", func() {
|
|
m.Group("/{index}", func() {
|
|
m.Post("/title", repo.UpdateIssueTitle)
|
|
m.Post("/content", repo.UpdateIssueContent)
|
|
m.Post("/deadline", web.Bind(structs.EditDeadlineOption{}), repo.UpdateIssueDeadline)
|
|
m.Post("/watch", repo.IssueWatch)
|
|
m.Post("/ref", repo.UpdateIssueRef)
|
|
m.Post("/pin", reqRepoAdmin, repo.IssuePinOrUnpin)
|
|
m.Post("/viewed-files", repo.UpdateViewedFiles)
|
|
m.Group("/dependency", func() {
|
|
m.Post("/add", repo.AddDependency)
|
|
m.Post("/delete", repo.RemoveDependency)
|
|
})
|
|
m.Combo("/comments").Post(repo.MustAllowUserComment, web.Bind(forms.CreateCommentForm{}), repo.NewComment)
|
|
m.Group("/times", func() {
|
|
m.Post("/add", web.Bind(forms.AddTimeManuallyForm{}), repo.AddTimeManually)
|
|
m.Post("/{timeid}/delete", repo.DeleteTime)
|
|
m.Group("/stopwatch", func() {
|
|
m.Post("/toggle", repo.IssueStopwatch)
|
|
m.Post("/cancel", repo.CancelStopwatch)
|
|
})
|
|
})
|
|
m.Post("/reactions/{action}", web.Bind(forms.ReactionForm{}), repo.ChangeIssueReaction)
|
|
m.Post("/lock", reqRepoIssuesOrPullsWriter, web.Bind(forms.IssueLockForm{}), repo.LockIssue)
|
|
m.Post("/unlock", reqRepoIssuesOrPullsWriter, repo.UnlockIssue)
|
|
m.Post("/delete", reqRepoAdmin, repo.DeleteIssue)
|
|
}, context.RepoMustNotBeArchived())
|
|
m.Group("/{index}", func() {
|
|
m.Get("/attachments", repo.GetIssueAttachments)
|
|
m.Get("/attachments/{uuid}", repo.GetAttachment)
|
|
})
|
|
m.Group("/{index}", func() {
|
|
m.Post("/content-history/soft-delete", repo.SoftDeleteContentHistory)
|
|
})
|
|
|
|
m.Post("/labels", reqRepoIssuesOrPullsWriter, repo.UpdateIssueLabel)
|
|
m.Post("/milestone", reqRepoIssuesOrPullsWriter, repo.UpdateIssueMilestone)
|
|
m.Post("/projects", reqRepoIssuesOrPullsWriter, reqRepoProjectsReader, repo.UpdateIssueProject)
|
|
m.Post("/assignee", reqRepoIssuesOrPullsWriter, repo.UpdateIssueAssignee)
|
|
m.Post("/request_review", reqRepoIssuesOrPullsReader, repo.UpdatePullReviewRequest)
|
|
m.Post("/dismiss_review", reqRepoAdmin, web.Bind(forms.DismissReviewForm{}), repo.DismissReview)
|
|
m.Post("/status", reqRepoIssuesOrPullsWriter, repo.UpdateIssueStatus)
|
|
m.Post("/delete", reqRepoAdmin, repo.BatchDeleteIssues)
|
|
m.Post("/resolve_conversation", reqRepoIssuesOrPullsReader, repo.SetShowOutdatedComments, repo.UpdateResolveConversation)
|
|
m.Post("/attachments", context.EnforceQuotaWeb(quota_model.LimitSubjectSizeAssetsAttachmentsIssues, context.QuotaTargetRepo), repo.UploadIssueAttachment)
|
|
m.Post("/attachments/remove", repo.DeleteAttachment)
|
|
m.Delete("/unpin/{index}", reqRepoAdmin, repo.IssueUnpin)
|
|
m.Post("/move_pin", reqRepoAdmin, repo.IssuePinMove)
|
|
}, context.RepoMustNotBeArchived())
|
|
m.Group("/comments/{id}", func() {
|
|
m.Post("", repo.UpdateCommentContent)
|
|
m.Post("/delete", repo.DeleteComment)
|
|
m.Post("/reactions/{action}", web.Bind(forms.ReactionForm{}), repo.ChangeCommentReaction)
|
|
}, context.RepoMustNotBeArchived())
|
|
m.Group("/comments/{id}", func() {
|
|
m.Get("/attachments", repo.GetCommentAttachments)
|
|
})
|
|
m.Post("/markup", web.Bind(structs.MarkupOption{}), misc.Markup)
|
|
m.Group("/labels", func() {
|
|
m.Post("/new", web.Bind(forms.CreateLabelForm{}), repo.NewLabel)
|
|
m.Post("/edit", web.Bind(forms.CreateLabelForm{}), repo.UpdateLabel)
|
|
m.Post("/delete", repo.DeleteLabel)
|
|
m.Post("/initialize", web.Bind(forms.InitializeLabelsForm{}), repo.InitializeLabels)
|
|
}, context.RepoMustNotBeArchived(), reqRepoIssuesOrPullsWriter, context.RepoRef())
|
|
m.Group("/milestones", func() {
|
|
m.Combo("/new").Get(repo.NewMilestone).
|
|
Post(web.Bind(forms.CreateMilestoneForm{}), repo.NewMilestonePost)
|
|
m.Get("/{id}/edit", repo.EditMilestone)
|
|
m.Post("/{id}/edit", web.Bind(forms.CreateMilestoneForm{}), repo.EditMilestonePost)
|
|
m.Post("/{id}/{action}", repo.ChangeMilestoneStatus)
|
|
m.Post("/delete", repo.DeleteMilestone)
|
|
}, context.RepoMustNotBeArchived(), reqRepoIssuesOrPullsWriter, context.RepoRef())
|
|
m.Group("/pull", func() {
|
|
m.Post("/{index}/target_branch", repo.UpdatePullRequestTarget)
|
|
}, context.RepoMustNotBeArchived())
|
|
|
|
m.Group("", func() {
|
|
m.Group("", func() {
|
|
m.Combo("/_edit/*").Get(repo.EditFile).
|
|
Post(web.Bind(forms.EditRepoFileForm{}), repo.EditFilePost)
|
|
m.Combo("/_new/*").Get(repo.NewFile).
|
|
Post(web.Bind(forms.EditRepoFileForm{}), repo.NewFilePost)
|
|
m.Post("/_preview/*", web.Bind(forms.EditPreviewDiffForm{}), repo.DiffPreviewPost)
|
|
m.Combo("/_delete/*").Get(repo.DeleteFile).
|
|
Post(web.Bind(forms.DeleteRepoFileForm{}), repo.DeleteFilePost)
|
|
m.Combo("/_upload/*", repo.MustBeAbleToUpload).
|
|
Get(repo.UploadFile).
|
|
Post(web.Bind(forms.UploadRepoFileForm{}), repo.UploadFilePost)
|
|
m.Combo("/_diffpatch/*").Get(repo.NewDiffPatch).
|
|
Post(web.Bind(forms.EditRepoFileForm{}), repo.NewDiffPatchPost)
|
|
m.Combo("/_cherrypick/{sha:([a-f0-9]{4,64})}/*").Get(repo.CherryPick).
|
|
Post(web.Bind(forms.CherryPickForm{}), repo.CherryPickPost)
|
|
}, repo.MustBeEditable, repo.CommonEditorData, context.EnforceQuotaWeb(quota_model.LimitSubjectSizeReposAll, context.QuotaTargetRepo))
|
|
m.Group("", func() {
|
|
m.Post("/upload-file", context.EnforceQuotaWeb(quota_model.LimitSubjectSizeReposAll, context.QuotaTargetRepo), repo.UploadFileToServer)
|
|
m.Post("/upload-remove", web.Bind(forms.RemoveUploadFileForm{}), repo.RemoveUploadFileFromServer)
|
|
}, repo.MustBeEditable, repo.MustBeAbleToUpload)
|
|
}, context.RepoRef(), canEnableEditor, context.RepoMustNotBeArchived())
|
|
|
|
m.Group("/branches", func() {
|
|
m.Group("/_new", func() {
|
|
m.Post("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.CreateBranch)
|
|
m.Post("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.CreateBranch)
|
|
m.Post("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.CreateBranch)
|
|
}, web.Bind(forms.NewBranchForm{}), context.EnforceQuotaWeb(quota_model.LimitSubjectSizeReposAll, context.QuotaTargetRepo))
|
|
m.Post("/delete", repo.DeleteBranchPost)
|
|
m.Post("/restore", repo.RestoreBranchPost)
|
|
}, context.RepoMustNotBeArchived(), reqRepoCodeWriter, repo.MustBeNotEmpty)
|
|
}, reqSignIn, context.RepoAssignment, context.UnitTypes())
|
|
|
|
// Tags
|
|
m.Group("/{username}/{reponame}", func() {
|
|
m.Group("/tags", func() {
|
|
m.Get("", repo.TagsList)
|
|
m.Get("/list", repo.GetTagList)
|
|
m.Get(".rss", feedEnabled, repo.TagsListFeedRSS)
|
|
m.Get(".atom", feedEnabled, repo.TagsListFeedAtom)
|
|
}, ctxDataSet("EnableFeed", setting.Other.EnableFeed),
|
|
repo.MustBeNotEmpty, reqRepoCodeReader, context.RepoRefByType(context.RepoRefTag, true))
|
|
m.Post("/tags/delete", repo.DeleteTag, reqSignIn,
|
|
repo.MustBeNotEmpty, context.RepoMustNotBeArchived(), reqRepoCodeWriter, context.RepoRef())
|
|
}, ignSignIn, context.RepoAssignment, context.UnitTypes())
|
|
|
|
// Releases
|
|
m.Group("/{username}/{reponame}", func() {
|
|
m.Group("/releases", func() {
|
|
m.Get("/", repo.Releases)
|
|
m.Get("/tag/*", repo.SingleRelease)
|
|
m.Get("/latest", repo.LatestRelease)
|
|
m.Get(".rss", feedEnabled, repo.ReleasesFeedRSS)
|
|
m.Get(".atom", feedEnabled, repo.ReleasesFeedAtom)
|
|
}, ctxDataSet("EnableFeed", setting.Other.EnableFeed),
|
|
repo.MustBeNotEmpty, context.RepoRefByType(context.RepoRefTag, true))
|
|
m.Get("/releases/attachments/{uuid}", repo.MustBeNotEmpty, repo.GetAttachment)
|
|
m.Get("/releases/download/{vTag}/{fileName}", repo.MustBeNotEmpty, repo.RedirectDownload)
|
|
m.Group("/releases", func() {
|
|
m.Combo("/new", context.EnforceQuotaWeb(quota_model.LimitSubjectSizeReposAll, context.QuotaTargetRepo)).
|
|
Get(repo.NewRelease).
|
|
Post(web.Bind(forms.NewReleaseForm{}), repo.NewReleasePost)
|
|
m.Post("/delete", repo.DeleteRelease)
|
|
m.Post("/attachments", context.EnforceQuotaWeb(quota_model.LimitSubjectSizeAssetsAttachmentsReleases, context.QuotaTargetRepo), repo.UploadReleaseAttachment)
|
|
m.Post("/attachments/remove", repo.DeleteAttachment)
|
|
}, reqSignIn, repo.MustBeNotEmpty, context.RepoMustNotBeArchived(), reqRepoReleaseWriter, context.RepoRef())
|
|
m.Group("/releases", func() {
|
|
m.Get("/edit/*", repo.EditRelease)
|
|
m.Post("/edit/*", web.Bind(forms.EditReleaseForm{}), repo.EditReleasePost)
|
|
}, reqSignIn, repo.MustBeNotEmpty, context.RepoMustNotBeArchived(), reqRepoReleaseWriter, repo.CommitInfoCache, context.EnforceQuotaWeb(quota_model.LimitSubjectSizeReposAll, context.QuotaTargetRepo))
|
|
}, ignSignIn, context.RepoAssignment, context.UnitTypes(), reqRepoReleaseReader)
|
|
|
|
// to maintain compatibility with old attachments
|
|
m.Group("/{username}/{reponame}", func() {
|
|
m.Get("/attachments/{uuid}", repo.GetAttachment)
|
|
}, ignSignIn, context.RepoAssignment, context.UnitTypes())
|
|
|
|
m.Group("/{username}/{reponame}", func() {
|
|
m.Post("/topics", repo.TopicsPost)
|
|
}, context.RepoAssignment, context.RepoMustNotBeArchived(), reqRepoAdmin)
|
|
|
|
m.Group("/{username}/{reponame}", func() {
|
|
m.Group("", func() {
|
|
m.Get("/issues/posters", repo.IssuePosters) // it can't use {type:issues|pulls} because other routes like "/pulls/{index}" has higher priority
|
|
m.Get("/{type:issues|pulls}", repo.Issues)
|
|
m.Get("/{type:issues|pulls}/{index}", repo.ViewIssue)
|
|
m.Group("/{type:issues|pulls}/{index}/content-history", func() {
|
|
m.Get("/overview", repo.GetContentHistoryOverview)
|
|
m.Get("/list", repo.GetContentHistoryList)
|
|
m.Get("/detail", repo.GetContentHistoryDetail)
|
|
})
|
|
m.Get("/labels", reqRepoIssuesOrPullsReader, repo.RetrieveLabels, repo.Labels)
|
|
m.Get("/milestones", reqRepoIssuesOrPullsReader, repo.Milestones)
|
|
}, context.RepoRef())
|
|
|
|
if setting.Packages.Enabled {
|
|
m.Get("/packages", repo.Packages)
|
|
}
|
|
|
|
if setting.Badges.Enabled {
|
|
m.Group("/badges", func() {
|
|
m.Get("/workflows/{workflow_name}/badge.svg", badges.GetWorkflowBadge)
|
|
m.Group("/issues", func() {
|
|
m.Get(".svg", badges.GetTotalIssuesBadge)
|
|
m.Get("/open.svg", badges.GetOpenIssuesBadge)
|
|
m.Get("/closed.svg", badges.GetClosedIssuesBadge)
|
|
})
|
|
m.Group("/pulls", func() {
|
|
m.Get(".svg", badges.GetTotalPullsBadge)
|
|
m.Get("/open.svg", badges.GetOpenPullsBadge)
|
|
m.Get("/closed.svg", badges.GetClosedPullsBadge)
|
|
})
|
|
if !setting.Repository.DisableStars {
|
|
m.Get("/stars.svg", badges.GetStarsBadge)
|
|
}
|
|
m.Get("/release.svg", badges.GetLatestReleaseBadge)
|
|
})
|
|
}
|
|
|
|
m.Group("/projects", func() {
|
|
m.Get("", repo.Projects)
|
|
m.Get("/{id}", repo.ViewProject)
|
|
m.Group("", func() { //nolint:dupl
|
|
m.Get("/new", repo.RenderNewProject)
|
|
m.Post("/new", web.Bind(forms.CreateProjectForm{}), repo.NewProjectPost)
|
|
m.Group("/{id}", func() {
|
|
m.Post("", web.Bind(forms.EditProjectColumnForm{}), repo.AddColumnToProjectPost)
|
|
m.Post("/move", project.MoveColumns)
|
|
m.Post("/delete", repo.DeleteProject)
|
|
|
|
m.Get("/edit", repo.RenderEditProject)
|
|
m.Post("/edit", web.Bind(forms.CreateProjectForm{}), repo.EditProjectPost)
|
|
m.Post("/{action:open|close}", repo.ChangeProjectStatus)
|
|
|
|
m.Group("/{columnID}", func() {
|
|
m.Put("", web.Bind(forms.EditProjectColumnForm{}), repo.EditProjectColumn)
|
|
m.Delete("", repo.DeleteProjectColumn)
|
|
m.Post("/default", repo.SetDefaultProjectColumn)
|
|
|
|
m.Post("/move", repo.MoveIssues)
|
|
})
|
|
})
|
|
}, reqRepoProjectsWriter, context.RepoMustNotBeArchived())
|
|
}, reqRepoProjectsReader, repo.MustEnableProjects)
|
|
|
|
m.Group("/actions", func() {
|
|
m.Get("", actions.List)
|
|
m.Post("/disable", reqRepoAdmin, actions.DisableWorkflowFile)
|
|
m.Post("/enable", reqRepoAdmin, actions.EnableWorkflowFile)
|
|
m.Post("/manual", reqRepoAdmin, actions.ManualRunWorkflow)
|
|
|
|
m.Group("/runs", func() {
|
|
m.Get("/latest", actions.ViewLatest)
|
|
m.Group("/{run}", func() {
|
|
m.Combo("").
|
|
Get(actions.View).
|
|
Post(web.Bind(actions.ViewRequest{}), actions.ViewPost)
|
|
m.Group("/jobs/{job}", func() {
|
|
m.Combo("").
|
|
Get(actions.View).
|
|
Post(web.Bind(actions.ViewRequest{}), actions.ViewPost)
|
|
m.Post("/rerun", reqRepoActionsWriter, actions.Rerun)
|
|
m.Get("/logs", actions.Logs)
|
|
})
|
|
m.Post("/cancel", reqRepoActionsWriter, actions.Cancel)
|
|
m.Post("/approve", reqRepoActionsWriter, actions.Approve)
|
|
m.Get("/artifacts", actions.ArtifactsView)
|
|
m.Get("/artifacts/{artifact_name}", actions.ArtifactsDownloadView)
|
|
m.Delete("/artifacts/{artifact_name}", reqRepoActionsWriter, actions.ArtifactsDeleteView)
|
|
m.Post("/rerun", reqRepoActionsWriter, actions.Rerun)
|
|
})
|
|
})
|
|
|
|
m.Group("/workflows/{workflow_name}", func() {
|
|
m.Get("/badge.svg", badges.GetWorkflowBadge)
|
|
m.Get("/runs/latest", actions.ViewLatestWorkflowRun)
|
|
})
|
|
}, reqRepoActionsReader, actions.MustEnableActions)
|
|
|
|
m.Group("/wiki", func() {
|
|
m.Combo("/").
|
|
Get(repo.Wiki).
|
|
Post(context.RepoMustNotBeArchived(), reqSignIn, reqRepoWikiWriter, web.Bind(forms.NewWikiForm{}), context.EnforceQuotaWeb(quota_model.LimitSubjectSizeWiki, context.QuotaTargetRepo), repo.WikiPost)
|
|
m.Combo("/*").
|
|
Get(repo.Wiki).
|
|
Post(context.RepoMustNotBeArchived(), reqSignIn, reqRepoWikiWriter, web.Bind(forms.NewWikiForm{}), context.EnforceQuotaWeb(quota_model.LimitSubjectSizeWiki, context.QuotaTargetRepo), repo.WikiPost)
|
|
m.Get("/commit/{sha:[a-f0-9]{4,64}}", repo.SetEditorconfigIfExists, repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.Diff)
|
|
m.Get("/commit/{sha:[a-f0-9]{4,64}}.{ext:patch|diff}", repo.RawDiff)
|
|
}, repo.MustEnableWiki, func(ctx *context.Context) {
|
|
ctx.Data["PageIsWiki"] = true
|
|
ctx.Data["CloneButtonOriginLink"] = ctx.Repo.Repository.WikiCloneLink()
|
|
})
|
|
|
|
m.Group("/wiki", func() {
|
|
m.Get("/search", repo.WikiSearchContent)
|
|
m.Get("/raw/*", repo.WikiRaw)
|
|
}, repo.MustEnableWiki)
|
|
|
|
m.Group("/activity", func() {
|
|
m.Get("", repo.Activity)
|
|
m.Get("/{period}", repo.Activity)
|
|
m.Group("/contributors", func() {
|
|
m.Get("", repo.Contributors)
|
|
m.Get("/data", repo.ContributorsData)
|
|
}, repo.MustBeNotEmpty, context.RequireRepoReaderOr(unit.TypeCode))
|
|
m.Group("/code-frequency", func() {
|
|
m.Get("", repo.CodeFrequency)
|
|
m.Get("/data", repo.CodeFrequencyData)
|
|
}, repo.MustBeNotEmpty, context.RequireRepoReaderOr(unit.TypeCode))
|
|
m.Group("/recent-commits", func() {
|
|
m.Get("", repo.RecentCommits)
|
|
m.Get("/data", repo.RecentCommitsData)
|
|
}, repo.MustBeNotEmpty, context.RequireRepoReaderOr(unit.TypeCode))
|
|
}, context.RepoRef(), context.RequireRepoReaderOr(unit.TypeCode, unit.TypePullRequests, unit.TypeIssues, unit.TypeReleases))
|
|
|
|
m.Group("/activity_author_data", func() {
|
|
m.Get("", repo.ActivityAuthors)
|
|
m.Get("/{period}", repo.ActivityAuthors)
|
|
}, context.RepoRef(), repo.MustBeNotEmpty, context.RequireRepoReaderOr(unit.TypeCode))
|
|
|
|
m.Group("/archive", func() {
|
|
m.Get("/*", repo.Download)
|
|
m.Post("/*", repo.InitiateDownload)
|
|
}, repo.MustBeNotEmpty, dlSourceEnabled, reqRepoCodeReader)
|
|
|
|
m.Group("/branches", func() {
|
|
m.Get("/list", repo.GetBranchesList)
|
|
m.Get("", repo.Branches)
|
|
}, repo.MustBeNotEmpty, context.RepoRef(), reqRepoCodeReader)
|
|
|
|
m.Group("/blob_excerpt", func() {
|
|
m.Get("/{sha}", repo.SetEditorconfigIfExists, repo.SetDiffViewStyle, repo.ExcerptBlob)
|
|
}, func(ctx *context.Context) gocontext.CancelFunc {
|
|
if ctx.FormBool("wiki") {
|
|
ctx.Data["PageIsWiki"] = true
|
|
repo.MustEnableWiki(ctx)
|
|
return nil
|
|
}
|
|
|
|
reqRepoCodeReader(ctx)
|
|
if ctx.Written() {
|
|
return nil
|
|
}
|
|
cancel := context.RepoRef()(ctx)
|
|
if ctx.Written() {
|
|
return cancel
|
|
}
|
|
|
|
repo.MustBeNotEmpty(ctx)
|
|
return cancel
|
|
})
|
|
|
|
m.Get("/pulls/posters", repo.PullPosters)
|
|
m.Group("/pulls/{index}", func() {
|
|
m.Get("", repo.SetWhitespaceBehavior, repo.GetPullDiffStats, repo.ViewIssue)
|
|
m.Get(".diff", repo.DownloadPullDiff)
|
|
m.Get(".patch", repo.DownloadPullPatch)
|
|
m.Group("/commits", func() {
|
|
m.Get("", context.RepoRef(), repo.SetWhitespaceBehavior, repo.GetPullDiffStats, repo.ViewPullCommits)
|
|
m.Get("/list", context.RepoRef(), repo.GetPullCommits)
|
|
m.Get("/{sha:[a-f0-9]{4,40}}", context.RepoRef(), repo.SetEditorconfigIfExists, repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.SetShowOutdatedComments, repo.ViewPullFilesForSingleCommit)
|
|
})
|
|
m.Post("/merge", context.RepoMustNotBeArchived(), web.Bind(forms.MergePullRequestForm{}), context.EnforceQuotaWeb(quota_model.LimitSubjectSizeGitAll, context.QuotaTargetRepo), repo.MergePullRequest)
|
|
m.Post("/cancel_auto_merge", context.RepoMustNotBeArchived(), repo.CancelAutoMergePullRequest)
|
|
m.Post("/update", repo.UpdatePullRequest)
|
|
m.Post("/set_allow_maintainer_edit", web.Bind(forms.UpdateAllowEditsForm{}), repo.SetAllowEdits)
|
|
m.Post("/cleanup", context.RepoMustNotBeArchived(), context.RepoRef(), repo.CleanUpPullRequest)
|
|
m.Group("/files", func() {
|
|
m.Get("", context.RepoRef(), repo.SetEditorconfigIfExists, repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.SetShowOutdatedComments, repo.ViewPullFilesForAllCommitsOfPr)
|
|
m.Get("/{sha:[a-f0-9]{4,40}}", context.RepoRef(), repo.SetEditorconfigIfExists, repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.SetShowOutdatedComments, repo.ViewPullFilesStartingFromCommit)
|
|
m.Get("/{shaFrom:[a-f0-9]{4,40}}..{shaTo:[a-f0-9]{4,40}}", context.RepoRef(), repo.SetEditorconfigIfExists, repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.SetShowOutdatedComments, repo.ViewPullFilesForRange)
|
|
m.Group("/reviews", func() {
|
|
m.Get("/new_comment", repo.RenderNewCodeCommentForm)
|
|
m.Post("/comments", web.Bind(forms.CodeCommentForm{}), repo.SetShowOutdatedComments, repo.CreateCodeComment)
|
|
m.Post("/submit", web.Bind(forms.SubmitReviewForm{}), repo.SubmitReview)
|
|
}, context.RepoMustNotBeArchived())
|
|
})
|
|
}, repo.MustAllowPulls)
|
|
|
|
m.Group("/media", func() {
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.SingleDownloadOrLFS)
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.SingleDownloadOrLFS)
|
|
m.Get("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.SingleDownloadOrLFS)
|
|
m.Get("/blob/{sha}", context.RepoRefByType(context.RepoRefBlob), repo.DownloadByIDOrLFS)
|
|
// "/*" route is deprecated, and kept for backward compatibility
|
|
m.Get("/*", context.RepoRefByType(context.RepoRefLegacy), repo.SingleDownloadOrLFS)
|
|
}, repo.MustBeNotEmpty, reqRepoCodeReader)
|
|
|
|
m.Group("/raw", func() {
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.SingleDownload)
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.SingleDownload)
|
|
m.Get("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.SingleDownload)
|
|
m.Get("/blob/{sha}", context.RepoRefByType(context.RepoRefBlob), repo.DownloadByID)
|
|
// "/*" route is deprecated, and kept for backward compatibility
|
|
m.Get("/*", context.RepoRefByType(context.RepoRefLegacy), repo.SingleDownload)
|
|
}, repo.MustBeNotEmpty, reqRepoCodeReader)
|
|
|
|
m.Group("/render", func() {
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.RenderFile)
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.RenderFile)
|
|
m.Get("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.RenderFile)
|
|
m.Get("/blob/{sha}", context.RepoRefByType(context.RepoRefBlob), repo.RenderFile)
|
|
}, repo.MustBeNotEmpty, reqRepoCodeReader)
|
|
|
|
m.Group("/commits", func() {
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.RefCommits)
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.RefCommits)
|
|
m.Get("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.RefCommits)
|
|
// "/*" route is deprecated, and kept for backward compatibility
|
|
m.Get("/*", context.RepoRefByType(context.RepoRefLegacy), repo.RefCommits)
|
|
}, repo.MustBeNotEmpty, reqRepoCodeReader)
|
|
|
|
m.Group("/blame", func() {
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.RefBlame)
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.RefBlame)
|
|
m.Get("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.RefBlame)
|
|
}, repo.MustBeNotEmpty, reqRepoCodeReader)
|
|
|
|
m.Group("", func() {
|
|
m.Get("/graph", repo.Graph)
|
|
m.Get("/commit/{sha:([a-f0-9]{4,64})$}", repo.SetEditorconfigIfExists, repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.Diff)
|
|
m.Get("/commit/{sha:([a-f0-9]{4,64})$}/load-branches-and-tags", repo.LoadBranchesAndTags)
|
|
m.Group("/commit/{sha:([a-f0-9]{4,64})$}/notes", func() {
|
|
m.Post("", web.Bind(forms.CommitNotesForm{}), repo.SetCommitNotes)
|
|
m.Post("/remove", repo.RemoveCommitNotes)
|
|
}, reqSignIn, reqRepoCodeWriter)
|
|
m.Get("/cherry-pick/{sha:([a-f0-9]{4,64})$}", repo.SetEditorconfigIfExists, repo.CherryPick)
|
|
}, repo.MustBeNotEmpty, context.RepoRef(), reqRepoCodeReader)
|
|
|
|
m.Group("", func() {
|
|
m.Get("/rss/branch/*", feed.RenderBranchFeed("rss"))
|
|
m.Get("/atom/branch/*", feed.RenderBranchFeed("atom"))
|
|
}, repo.MustBeNotEmpty, context.RepoRefByType(context.RepoRefBranch), reqRepoCodeReader, feedEnabled)
|
|
|
|
m.Group("/src", func() {
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.Home)
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.Home)
|
|
m.Get("/commit/*", context.RepoRefByType(context.RepoRefCommit), repo.Home)
|
|
// "/*" route is deprecated, and kept for backward compatibility
|
|
m.Get("/*", context.RepoRefByType(context.RepoRefLegacy), repo.Home)
|
|
}, repo.SetEditorconfigIfExists)
|
|
|
|
if !setting.Repository.DisableForks {
|
|
m.Group("", func() {
|
|
m.Get("/forks", repo.Forks)
|
|
}, context.RepoRef(), reqRepoCodeReader)
|
|
}
|
|
m.Get("/commit/{sha:([a-f0-9]{4,64})}.{ext:patch|diff}", repo.MustBeNotEmpty, reqRepoCodeReader, repo.RawDiff)
|
|
}, ignSignIn, context.RepoAssignment, context.UnitTypes())
|
|
|
|
m.Post("/{username}/{reponame}/lastcommit/*", ignSignInAndCsrf, context.RepoAssignment, context.UnitTypes(), context.RepoRefByType(context.RepoRefCommit), reqRepoCodeReader, repo.LastCommit)
|
|
|
|
m.Group("/{username}/{reponame}", func() {
|
|
if !setting.Repository.DisableStars {
|
|
m.Get("/stars", context.RepoRef(), repo.Stars)
|
|
}
|
|
m.Get("/watchers", context.RepoRef(), repo.Watchers)
|
|
m.Group("/search", func() {
|
|
m.Get("", context.RepoRef(), repo.Search)
|
|
if !setting.Indexer.RepoIndexerEnabled {
|
|
m.Get("/branch/*", context.RepoRefByType(context.RepoRefBranch), repo.Search)
|
|
m.Get("/tag/*", context.RepoRefByType(context.RepoRefTag), repo.Search)
|
|
}
|
|
}, reqRepoCodeReader)
|
|
}, ignSignIn, context.RepoAssignment, context.UnitTypes())
|
|
|
|
m.Group("/{username}", func() {
|
|
m.Group("/{reponame}", func() {
|
|
m.Get("", repo.SetEditorconfigIfExists, repo.Home)
|
|
}, ignSignIn, context.RepoAssignment, context.RepoRef(), context.UnitTypes())
|
|
|
|
m.Group("/{reponame}", func() {
|
|
m.Group("/info/lfs", func() {
|
|
m.Post("/objects/batch", lfs.CheckAcceptMediaType, lfs.BatchHandler)
|
|
m.Put("/objects/{oid}/{size}", lfs.UploadHandler)
|
|
m.Get("/objects/{oid}/{filename}", lfs.DownloadHandler)
|
|
m.Get("/objects/{oid}", lfs.DownloadHandler)
|
|
m.Post("/verify", lfs.CheckAcceptMediaType, lfs.VerifyHandler)
|
|
m.Group("/locks", func() {
|
|
m.Get("/", lfs.GetListLockHandler)
|
|
m.Post("/", lfs.PostLockHandler)
|
|
m.Post("/verify", lfs.VerifyLockHandler)
|
|
m.Post("/{lid}/unlock", lfs.UnLockHandler)
|
|
}, lfs.CheckAcceptMediaType)
|
|
m.Any("/*", func(ctx *context.Context) {
|
|
ctx.NotFound("", nil)
|
|
})
|
|
}, ignSignInAndCsrf, lfsServerEnabled)
|
|
|
|
gitHTTPRouters(m)
|
|
})
|
|
})
|
|
|
|
if setting.Repository.EnableFlags {
|
|
m.Group("/{username}/{reponame}/flags", func() {
|
|
m.Get("", repo_flags.Manage)
|
|
m.Post("", repo_flags.ManagePost)
|
|
}, adminReq, context.RepoAssignment, context.UnitTypes())
|
|
}
|
|
// ***** END: Repository *****
|
|
|
|
m.Group("/notifications", func() {
|
|
m.Get("", user.Notifications)
|
|
m.Get("/subscriptions", user.NotificationSubscriptions)
|
|
m.Get("/watching", user.NotificationWatching)
|
|
m.Post("/status", user.NotificationStatusPost)
|
|
m.Post("/purge", user.NotificationPurgePost)
|
|
m.Get("/new", user.NewAvailable)
|
|
}, reqSignIn)
|
|
|
|
if setting.API.EnableSwagger {
|
|
m.Get("/swagger.v1.json", SwaggerV1Json)
|
|
}
|
|
|
|
if !setting.IsProd {
|
|
m.Any("/devtest", devtest.List)
|
|
m.Any("/devtest/fetch-action-test", devtest.FetchActionTest)
|
|
m.Any("/devtest/{sub}", devtest.Tmpl)
|
|
}
|
|
|
|
m.NotFound(func(w http.ResponseWriter, req *http.Request) {
|
|
ctx := context.GetWebContext(req)
|
|
ctx.NotFound("", nil)
|
|
})
|
|
}
|