mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-11-03 08:02:36 +09:00 
			
		
		
		
	The old code generates `structs.Repository.Permissions` with only `access.Permission.AccessMode`, however, it should check the units too, or the value could be incorrect. For example, `structs.Repository.Permissions.Push` could be false even the doer has write access to code unit. Should fix https://github.com/renovatebot/renovate/issues/14059#issuecomment-1047961128 (Not reported by it, I just found it when I was looking into this bug) --- Review tips: The major changes are - `modules/structs/repo.go` https://github.com/go-gitea/gitea/pull/25388/files#diff-870406f6857117f8b03611c43fca0ab9ed6d6e76a2d0069a7c1f17e8fa9092f7 - `services/convert/repository.go` https://github.com/go-gitea/gitea/pull/25388/files#diff-7736f6d2ae894c9edb7729a80ab89aa183b888a26a811a0c1fdebd18726a7101 And other changes are passive.
		
			
				
	
	
		
			157 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			157 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2016 The Gogs Authors. All rights reserved.
 | 
						|
// Copyright 2020 The Gitea Authors.
 | 
						|
// SPDX-License-Identifier: MIT
 | 
						|
 | 
						|
package repo
 | 
						|
 | 
						|
import (
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"net/http"
 | 
						|
 | 
						|
	"code.gitea.io/gitea/models/organization"
 | 
						|
	"code.gitea.io/gitea/models/perm"
 | 
						|
	access_model "code.gitea.io/gitea/models/perm/access"
 | 
						|
	repo_model "code.gitea.io/gitea/models/repo"
 | 
						|
	user_model "code.gitea.io/gitea/models/user"
 | 
						|
	"code.gitea.io/gitea/modules/context"
 | 
						|
	api "code.gitea.io/gitea/modules/structs"
 | 
						|
	"code.gitea.io/gitea/modules/util"
 | 
						|
	"code.gitea.io/gitea/modules/web"
 | 
						|
	"code.gitea.io/gitea/routers/api/v1/utils"
 | 
						|
	"code.gitea.io/gitea/services/convert"
 | 
						|
	repo_service "code.gitea.io/gitea/services/repository"
 | 
						|
)
 | 
						|
 | 
						|
// ListForks list a repository's forks
 | 
						|
func ListForks(ctx *context.APIContext) {
 | 
						|
	// swagger:operation GET /repos/{owner}/{repo}/forks repository listForks
 | 
						|
	// ---
 | 
						|
	// summary: List a repository's forks
 | 
						|
	// produces:
 | 
						|
	// - application/json
 | 
						|
	// parameters:
 | 
						|
	// - name: owner
 | 
						|
	//   in: path
 | 
						|
	//   description: owner of the repo
 | 
						|
	//   type: string
 | 
						|
	//   required: true
 | 
						|
	// - name: repo
 | 
						|
	//   in: path
 | 
						|
	//   description: name of the repo
 | 
						|
	//   type: string
 | 
						|
	//   required: true
 | 
						|
	// - name: page
 | 
						|
	//   in: query
 | 
						|
	//   description: page number of results to return (1-based)
 | 
						|
	//   type: integer
 | 
						|
	// - name: limit
 | 
						|
	//   in: query
 | 
						|
	//   description: page size of results
 | 
						|
	//   type: integer
 | 
						|
	// responses:
 | 
						|
	//   "200":
 | 
						|
	//     "$ref": "#/responses/RepositoryList"
 | 
						|
 | 
						|
	forks, err := repo_model.GetForks(ctx.Repo.Repository, utils.GetListOptions(ctx))
 | 
						|
	if err != nil {
 | 
						|
		ctx.Error(http.StatusInternalServerError, "GetForks", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	apiForks := make([]*api.Repository, len(forks))
 | 
						|
	for i, fork := range forks {
 | 
						|
		permission, err := access_model.GetUserRepoPermission(ctx, fork, ctx.Doer)
 | 
						|
		if err != nil {
 | 
						|
			ctx.Error(http.StatusInternalServerError, "GetUserRepoPermission", err)
 | 
						|
			return
 | 
						|
		}
 | 
						|
		apiForks[i] = convert.ToRepo(ctx, fork, permission)
 | 
						|
	}
 | 
						|
 | 
						|
	ctx.SetTotalCountHeader(int64(ctx.Repo.Repository.NumForks))
 | 
						|
	ctx.JSON(http.StatusOK, apiForks)
 | 
						|
}
 | 
						|
 | 
						|
// CreateFork create a fork of a repo
 | 
						|
func CreateFork(ctx *context.APIContext) {
 | 
						|
	// swagger:operation POST /repos/{owner}/{repo}/forks repository createFork
 | 
						|
	// ---
 | 
						|
	// summary: Fork a repository
 | 
						|
	// produces:
 | 
						|
	// - application/json
 | 
						|
	// parameters:
 | 
						|
	// - name: owner
 | 
						|
	//   in: path
 | 
						|
	//   description: owner of the repo to fork
 | 
						|
	//   type: string
 | 
						|
	//   required: true
 | 
						|
	// - name: repo
 | 
						|
	//   in: path
 | 
						|
	//   description: name of the repo to fork
 | 
						|
	//   type: string
 | 
						|
	//   required: true
 | 
						|
	// - name: body
 | 
						|
	//   in: body
 | 
						|
	//   schema:
 | 
						|
	//     "$ref": "#/definitions/CreateForkOption"
 | 
						|
	// responses:
 | 
						|
	//   "202":
 | 
						|
	//     "$ref": "#/responses/Repository"
 | 
						|
	//   "403":
 | 
						|
	//     "$ref": "#/responses/forbidden"
 | 
						|
	//   "409":
 | 
						|
	//     description: The repository with the same name already exists.
 | 
						|
	//   "422":
 | 
						|
	//     "$ref": "#/responses/validationError"
 | 
						|
 | 
						|
	form := web.GetForm(ctx).(*api.CreateForkOption)
 | 
						|
	repo := ctx.Repo.Repository
 | 
						|
	var forker *user_model.User // user/org that will own the fork
 | 
						|
	if form.Organization == nil {
 | 
						|
		forker = ctx.Doer
 | 
						|
	} else {
 | 
						|
		org, err := organization.GetOrgByName(ctx, *form.Organization)
 | 
						|
		if err != nil {
 | 
						|
			if organization.IsErrOrgNotExist(err) {
 | 
						|
				ctx.Error(http.StatusUnprocessableEntity, "", err)
 | 
						|
			} else {
 | 
						|
				ctx.Error(http.StatusInternalServerError, "GetOrgByName", err)
 | 
						|
			}
 | 
						|
			return
 | 
						|
		}
 | 
						|
		isMember, err := org.IsOrgMember(ctx.Doer.ID)
 | 
						|
		if err != nil {
 | 
						|
			ctx.Error(http.StatusInternalServerError, "IsOrgMember", err)
 | 
						|
			return
 | 
						|
		} else if !isMember {
 | 
						|
			ctx.Error(http.StatusForbidden, "isMemberNot", fmt.Sprintf("User is no Member of Organisation '%s'", org.Name))
 | 
						|
			return
 | 
						|
		}
 | 
						|
		forker = org.AsUser()
 | 
						|
	}
 | 
						|
 | 
						|
	var name string
 | 
						|
	if form.Name == nil {
 | 
						|
		name = repo.Name
 | 
						|
	} else {
 | 
						|
		name = *form.Name
 | 
						|
	}
 | 
						|
 | 
						|
	fork, err := repo_service.ForkRepository(ctx, ctx.Doer, forker, repo_service.ForkRepoOptions{
 | 
						|
		BaseRepo:    repo,
 | 
						|
		Name:        name,
 | 
						|
		Description: repo.Description,
 | 
						|
	})
 | 
						|
	if err != nil {
 | 
						|
		if errors.Is(err, util.ErrAlreadyExist) || repo_model.IsErrReachLimitOfRepo(err) {
 | 
						|
			ctx.Error(http.StatusConflict, "ForkRepository", err)
 | 
						|
		} else {
 | 
						|
			ctx.Error(http.StatusInternalServerError, "ForkRepository", err)
 | 
						|
		}
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	// TODO change back to 201
 | 
						|
	ctx.JSON(http.StatusAccepted, convert.ToRepo(ctx, fork, access_model.Permission{AccessMode: perm.AccessModeOwner}))
 | 
						|
}
 |