mirror of
				https://gitcode.com/gitea/gitea.git
				synced 2025-10-25 12:26:40 +08:00 
			
		
		
		
	 a6450494c3
			
		
	
	a6450494c3
	
	
	
		
			
			There was only one `IsRepositoryExist` function, it did: `has && isDir` However it's not right, and it would cause 500 error when creating a new repository if the dir exists. Then, it was changed to `has || isDir`, it is still incorrect, it affects the "adopt repo" logic. To make the logic clear: * IsRepositoryModelOrDirExist * IsRepositoryModelExist
		
			
				
	
	
		
			421 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			421 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2019 The Gitea Authors. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package repository
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"path"
 | |
| 	"path/filepath"
 | |
| 	"strings"
 | |
| 
 | |
| 	"code.gitea.io/gitea/models"
 | |
| 	activities_model "code.gitea.io/gitea/models/activities"
 | |
| 	"code.gitea.io/gitea/models/db"
 | |
| 	git_model "code.gitea.io/gitea/models/git"
 | |
| 	"code.gitea.io/gitea/models/organization"
 | |
| 	"code.gitea.io/gitea/models/perm"
 | |
| 	access_model "code.gitea.io/gitea/models/perm/access"
 | |
| 	repo_model "code.gitea.io/gitea/models/repo"
 | |
| 	"code.gitea.io/gitea/models/unit"
 | |
| 	user_model "code.gitea.io/gitea/models/user"
 | |
| 	"code.gitea.io/gitea/models/webhook"
 | |
| 	"code.gitea.io/gitea/modules/git"
 | |
| 	"code.gitea.io/gitea/modules/log"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 	api "code.gitea.io/gitea/modules/structs"
 | |
| 	"code.gitea.io/gitea/modules/util"
 | |
| )
 | |
| 
 | |
| // CreateRepositoryByExample creates a repository for the user/organization.
 | |
| func CreateRepositoryByExample(ctx context.Context, doer, u *user_model.User, repo *repo_model.Repository, overwriteOrAdopt, isFork bool) (err error) {
 | |
| 	if err = repo_model.IsUsableRepoName(repo.Name); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	has, err := repo_model.IsRepositoryModelExist(ctx, u, repo.Name)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("IsRepositoryExist: %w", err)
 | |
| 	} else if has {
 | |
| 		return repo_model.ErrRepoAlreadyExist{
 | |
| 			Uname: u.Name,
 | |
| 			Name:  repo.Name,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	repoPath := repo_model.RepoPath(u.Name, repo.Name)
 | |
| 	isExist, err := util.IsExist(repoPath)
 | |
| 	if err != nil {
 | |
| 		log.Error("Unable to check if %s exists. Error: %v", repoPath, err)
 | |
| 		return err
 | |
| 	}
 | |
| 	if !overwriteOrAdopt && isExist {
 | |
| 		log.Error("Files already exist in %s and we are not going to adopt or delete.", repoPath)
 | |
| 		return repo_model.ErrRepoFilesAlreadyExist{
 | |
| 			Uname: u.Name,
 | |
| 			Name:  repo.Name,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if err = db.Insert(ctx, repo); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if err = repo_model.DeleteRedirect(ctx, u.ID, repo.Name); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// insert units for repo
 | |
| 	defaultUnits := unit.DefaultRepoUnits
 | |
| 	if isFork {
 | |
| 		defaultUnits = unit.DefaultForkRepoUnits
 | |
| 	}
 | |
| 	units := make([]repo_model.RepoUnit, 0, len(defaultUnits))
 | |
| 	for _, tp := range defaultUnits {
 | |
| 		if tp == unit.TypeIssues {
 | |
| 			units = append(units, repo_model.RepoUnit{
 | |
| 				RepoID: repo.ID,
 | |
| 				Type:   tp,
 | |
| 				Config: &repo_model.IssuesConfig{
 | |
| 					EnableTimetracker:                setting.Service.DefaultEnableTimetracking,
 | |
| 					AllowOnlyContributorsToTrackTime: setting.Service.DefaultAllowOnlyContributorsToTrackTime,
 | |
| 					EnableDependencies:               setting.Service.DefaultEnableDependencies,
 | |
| 				},
 | |
| 			})
 | |
| 		} else if tp == unit.TypePullRequests {
 | |
| 			units = append(units, repo_model.RepoUnit{
 | |
| 				RepoID: repo.ID,
 | |
| 				Type:   tp,
 | |
| 				Config: &repo_model.PullRequestsConfig{AllowMerge: true, AllowRebase: true, AllowRebaseMerge: true, AllowSquash: true, DefaultMergeStyle: repo_model.MergeStyle(setting.Repository.PullRequest.DefaultMergeStyle), AllowRebaseUpdate: true},
 | |
| 			})
 | |
| 		} else {
 | |
| 			units = append(units, repo_model.RepoUnit{
 | |
| 				RepoID: repo.ID,
 | |
| 				Type:   tp,
 | |
| 			})
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if err = db.Insert(ctx, units); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// Remember visibility preference.
 | |
| 	u.LastRepoVisibility = repo.IsPrivate
 | |
| 	if err = user_model.UpdateUserCols(ctx, u, "last_repo_visibility"); err != nil {
 | |
| 		return fmt.Errorf("UpdateUserCols: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	if err = user_model.IncrUserRepoNum(ctx, u.ID); err != nil {
 | |
| 		return fmt.Errorf("IncrUserRepoNum: %w", err)
 | |
| 	}
 | |
| 	u.NumRepos++
 | |
| 
 | |
| 	// Give access to all members in teams with access to all repositories.
 | |
| 	if u.IsOrganization() {
 | |
| 		teams, err := organization.FindOrgTeams(ctx, u.ID)
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("FindOrgTeams: %w", err)
 | |
| 		}
 | |
| 		for _, t := range teams {
 | |
| 			if t.IncludesAllRepositories {
 | |
| 				if err := models.AddRepository(ctx, t, repo); err != nil {
 | |
| 					return fmt.Errorf("AddRepository: %w", err)
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		if isAdmin, err := access_model.IsUserRepoAdmin(ctx, repo, doer); err != nil {
 | |
| 			return fmt.Errorf("IsUserRepoAdmin: %w", err)
 | |
| 		} else if !isAdmin {
 | |
| 			// Make creator repo admin if it wasn't assigned automatically
 | |
| 			if err = AddCollaborator(ctx, repo, doer); err != nil {
 | |
| 				return fmt.Errorf("AddCollaborator: %w", err)
 | |
| 			}
 | |
| 			if err = repo_model.ChangeCollaborationAccessMode(ctx, repo, doer.ID, perm.AccessModeAdmin); err != nil {
 | |
| 				return fmt.Errorf("ChangeCollaborationAccessModeCtx: %w", err)
 | |
| 			}
 | |
| 		}
 | |
| 	} else if err = access_model.RecalculateAccesses(ctx, repo); err != nil {
 | |
| 		// Organization automatically called this in AddRepository method.
 | |
| 		return fmt.Errorf("RecalculateAccesses: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	if setting.Service.AutoWatchNewRepos {
 | |
| 		if err = repo_model.WatchRepo(ctx, doer.ID, repo.ID, true); err != nil {
 | |
| 			return fmt.Errorf("WatchRepo: %w", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if err = webhook.CopyDefaultWebhooksToRepo(ctx, repo.ID); err != nil {
 | |
| 		return fmt.Errorf("CopyDefaultWebhooksToRepo: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // CreateRepoOptions contains the create repository options
 | |
| type CreateRepoOptions struct {
 | |
| 	Name           string
 | |
| 	Description    string
 | |
| 	OriginalURL    string
 | |
| 	GitServiceType api.GitServiceType
 | |
| 	Gitignores     string
 | |
| 	IssueLabels    string
 | |
| 	License        string
 | |
| 	Readme         string
 | |
| 	DefaultBranch  string
 | |
| 	IsPrivate      bool
 | |
| 	IsMirror       bool
 | |
| 	IsTemplate     bool
 | |
| 	AutoInit       bool
 | |
| 	Status         repo_model.RepositoryStatus
 | |
| 	TrustModel     repo_model.TrustModelType
 | |
| 	MirrorInterval string
 | |
| }
 | |
| 
 | |
| // CreateRepository creates a repository for the user/organization.
 | |
| func CreateRepository(doer, u *user_model.User, opts CreateRepoOptions) (*repo_model.Repository, error) {
 | |
| 	if !doer.IsAdmin && !u.CanCreateRepo() {
 | |
| 		return nil, repo_model.ErrReachLimitOfRepo{
 | |
| 			Limit: u.MaxRepoCreation,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if len(opts.DefaultBranch) == 0 {
 | |
| 		opts.DefaultBranch = setting.Repository.DefaultBranch
 | |
| 	}
 | |
| 
 | |
| 	// Check if label template exist
 | |
| 	if len(opts.IssueLabels) > 0 {
 | |
| 		if _, err := LoadTemplateLabelsByDisplayName(opts.IssueLabels); err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	repo := &repo_model.Repository{
 | |
| 		OwnerID:                         u.ID,
 | |
| 		Owner:                           u,
 | |
| 		OwnerName:                       u.Name,
 | |
| 		Name:                            opts.Name,
 | |
| 		LowerName:                       strings.ToLower(opts.Name),
 | |
| 		Description:                     opts.Description,
 | |
| 		OriginalURL:                     opts.OriginalURL,
 | |
| 		OriginalServiceType:             opts.GitServiceType,
 | |
| 		IsPrivate:                       opts.IsPrivate,
 | |
| 		IsFsckEnabled:                   !opts.IsMirror,
 | |
| 		IsTemplate:                      opts.IsTemplate,
 | |
| 		CloseIssuesViaCommitInAnyBranch: setting.Repository.DefaultCloseIssuesViaCommitsInAnyBranch,
 | |
| 		Status:                          opts.Status,
 | |
| 		IsEmpty:                         !opts.AutoInit,
 | |
| 		TrustModel:                      opts.TrustModel,
 | |
| 		IsMirror:                        opts.IsMirror,
 | |
| 		DefaultBranch:                   opts.DefaultBranch,
 | |
| 	}
 | |
| 
 | |
| 	var rollbackRepo *repo_model.Repository
 | |
| 
 | |
| 	if err := db.WithTx(db.DefaultContext, func(ctx context.Context) error {
 | |
| 		if err := CreateRepositoryByExample(ctx, doer, u, repo, false, false); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		// No need for init mirror.
 | |
| 		if opts.IsMirror {
 | |
| 			return nil
 | |
| 		}
 | |
| 
 | |
| 		repoPath := repo_model.RepoPath(u.Name, repo.Name)
 | |
| 		isExist, err := util.IsExist(repoPath)
 | |
| 		if err != nil {
 | |
| 			log.Error("Unable to check if %s exists. Error: %v", repoPath, err)
 | |
| 			return err
 | |
| 		}
 | |
| 		if isExist {
 | |
| 			// repo already exists - We have two or three options.
 | |
| 			// 1. We fail stating that the directory exists
 | |
| 			// 2. We create the db repository to go with this data and adopt the git repo
 | |
| 			// 3. We delete it and start afresh
 | |
| 			//
 | |
| 			// Previously Gitea would just delete and start afresh - this was naughty.
 | |
| 			// So we will now fail and delegate to other functionality to adopt or delete
 | |
| 			log.Error("Files already exist in %s and we are not going to adopt or delete.", repoPath)
 | |
| 			return repo_model.ErrRepoFilesAlreadyExist{
 | |
| 				Uname: u.Name,
 | |
| 				Name:  repo.Name,
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		if err = initRepository(ctx, repoPath, doer, repo, opts); err != nil {
 | |
| 			if err2 := util.RemoveAll(repoPath); err2 != nil {
 | |
| 				log.Error("initRepository: %v", err)
 | |
| 				return fmt.Errorf(
 | |
| 					"delete repo directory %s/%s failed(2): %v", u.Name, repo.Name, err2)
 | |
| 			}
 | |
| 			return fmt.Errorf("initRepository: %w", err)
 | |
| 		}
 | |
| 
 | |
| 		// Initialize Issue Labels if selected
 | |
| 		if len(opts.IssueLabels) > 0 {
 | |
| 			if err = InitializeLabels(ctx, repo.ID, opts.IssueLabels, false); err != nil {
 | |
| 				rollbackRepo = repo
 | |
| 				rollbackRepo.OwnerID = u.ID
 | |
| 				return fmt.Errorf("InitializeLabels: %w", err)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		if err := CheckDaemonExportOK(ctx, repo); err != nil {
 | |
| 			return fmt.Errorf("checkDaemonExportOK: %w", err)
 | |
| 		}
 | |
| 
 | |
| 		if stdout, _, err := git.NewCommand(ctx, "update-server-info").
 | |
| 			SetDescription(fmt.Sprintf("CreateRepository(git update-server-info): %s", repoPath)).
 | |
| 			RunStdString(&git.RunOpts{Dir: repoPath}); err != nil {
 | |
| 			log.Error("CreateRepository(git update-server-info) in %v: Stdout: %s\nError: %v", repo, stdout, err)
 | |
| 			rollbackRepo = repo
 | |
| 			rollbackRepo.OwnerID = u.ID
 | |
| 			return fmt.Errorf("CreateRepository(git update-server-info): %w", err)
 | |
| 		}
 | |
| 		return nil
 | |
| 	}); err != nil {
 | |
| 		if rollbackRepo != nil {
 | |
| 			if errDelete := models.DeleteRepository(doer, rollbackRepo.OwnerID, rollbackRepo.ID); errDelete != nil {
 | |
| 				log.Error("Rollback deleteRepository: %v", errDelete)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	return repo, nil
 | |
| }
 | |
| 
 | |
| const notRegularFileMode = os.ModeSymlink | os.ModeNamedPipe | os.ModeSocket | os.ModeDevice | os.ModeCharDevice | os.ModeIrregular
 | |
| 
 | |
| // getDirectorySize returns the disk consumption for a given path
 | |
| func getDirectorySize(path string) (int64, error) {
 | |
| 	var size int64
 | |
| 	err := filepath.WalkDir(path, func(_ string, info os.DirEntry, err error) error {
 | |
| 		if err != nil {
 | |
| 			if os.IsNotExist(err) { // ignore the error because the file maybe deleted during traversing.
 | |
| 				return nil
 | |
| 			}
 | |
| 			return err
 | |
| 		}
 | |
| 		if info.IsDir() {
 | |
| 			return nil
 | |
| 		}
 | |
| 		f, err := info.Info()
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		if (f.Mode() & notRegularFileMode) == 0 {
 | |
| 			size += f.Size()
 | |
| 		}
 | |
| 		return err
 | |
| 	})
 | |
| 	return size, err
 | |
| }
 | |
| 
 | |
| // UpdateRepoSize updates the repository size, calculating it using getDirectorySize
 | |
| func UpdateRepoSize(ctx context.Context, repo *repo_model.Repository) error {
 | |
| 	size, err := getDirectorySize(repo.RepoPath())
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("updateSize: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	lfsSize, err := git_model.GetRepoLFSSize(ctx, repo.ID)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("updateSize: GetLFSMetaObjects: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	return repo_model.UpdateRepoSize(ctx, repo.ID, size+lfsSize)
 | |
| }
 | |
| 
 | |
| // CheckDaemonExportOK creates/removes git-daemon-export-ok for git-daemon...
 | |
| func CheckDaemonExportOK(ctx context.Context, repo *repo_model.Repository) error {
 | |
| 	if err := repo.LoadOwner(ctx); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// Create/Remove git-daemon-export-ok for git-daemon...
 | |
| 	daemonExportFile := path.Join(repo.RepoPath(), `git-daemon-export-ok`)
 | |
| 
 | |
| 	isExist, err := util.IsExist(daemonExportFile)
 | |
| 	if err != nil {
 | |
| 		log.Error("Unable to check if %s exists. Error: %v", daemonExportFile, err)
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	isPublic := !repo.IsPrivate && repo.Owner.Visibility == api.VisibleTypePublic
 | |
| 	if !isPublic && isExist {
 | |
| 		if err = util.Remove(daemonExportFile); err != nil {
 | |
| 			log.Error("Failed to remove %s: %v", daemonExportFile, err)
 | |
| 		}
 | |
| 	} else if isPublic && !isExist {
 | |
| 		if f, err := os.Create(daemonExportFile); err != nil {
 | |
| 			log.Error("Failed to create %s: %v", daemonExportFile, err)
 | |
| 		} else {
 | |
| 			f.Close()
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // UpdateRepository updates a repository with db context
 | |
| func UpdateRepository(ctx context.Context, repo *repo_model.Repository, visibilityChanged bool) (err error) {
 | |
| 	repo.LowerName = strings.ToLower(repo.Name)
 | |
| 
 | |
| 	e := db.GetEngine(ctx)
 | |
| 
 | |
| 	if _, err = e.ID(repo.ID).AllCols().Update(repo); err != nil {
 | |
| 		return fmt.Errorf("update: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	if err = UpdateRepoSize(ctx, repo); err != nil {
 | |
| 		log.Error("Failed to update size for repository: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if visibilityChanged {
 | |
| 		if err = repo.LoadOwner(ctx); err != nil {
 | |
| 			return fmt.Errorf("LoadOwner: %w", err)
 | |
| 		}
 | |
| 		if repo.Owner.IsOrganization() {
 | |
| 			// Organization repository need to recalculate access table when visibility is changed.
 | |
| 			if err = access_model.RecalculateTeamAccesses(ctx, repo, 0); err != nil {
 | |
| 				return fmt.Errorf("recalculateTeamAccesses: %w", err)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		// If repo has become private, we need to set its actions to private.
 | |
| 		if repo.IsPrivate {
 | |
| 			_, err = e.Where("repo_id = ?", repo.ID).Cols("is_private").Update(&activities_model.Action{
 | |
| 				IsPrivate: true,
 | |
| 			})
 | |
| 			if err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		// Create/Remove git-daemon-export-ok for git-daemon...
 | |
| 		if err := CheckDaemonExportOK(ctx, repo); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		forkRepos, err := repo_model.GetRepositoriesByForkID(ctx, repo.ID)
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("getRepositoriesByForkID: %w", err)
 | |
| 		}
 | |
| 		for i := range forkRepos {
 | |
| 			forkRepos[i].IsPrivate = repo.IsPrivate || repo.Owner.Visibility == api.VisibleTypePrivate
 | |
| 			if err = UpdateRepository(ctx, forkRepos[i], true); err != nil {
 | |
| 				return fmt.Errorf("updateRepository[%d]: %w", forkRepos[i].ID, err)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 |