mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-11-04 15:04:00 +01:00 
			
		
		
		
	Move request review functions to pull service package
This commit is contained in:
		
							parent
							
								
									0739595dcd
								
							
						
					
					
						commit
						e2dd7e8e08
					
				@ -9,7 +9,6 @@ import (
 | 
			
		||||
	"errors"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"io"
 | 
			
		||||
	"regexp"
 | 
			
		||||
	"strings"
 | 
			
		||||
 | 
			
		||||
	"code.gitea.io/gitea/models/db"
 | 
			
		||||
@ -822,149 +821,6 @@ func MergeBlockedByOutdatedBranch(protectBranch *git_model.ProtectedBranch, pr *
 | 
			
		||||
	return protectBranch.BlockOnOutdatedBranch && pr.CommitsBehind > 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// GetCodeOwnersFromContent returns the code owners configuration
 | 
			
		||||
// Return empty slice if files missing
 | 
			
		||||
// Return warning messages on parsing errors
 | 
			
		||||
// We're trying to do the best we can when parsing a file.
 | 
			
		||||
// Invalid lines are skipped. Non-existent users and teams too.
 | 
			
		||||
func GetCodeOwnersFromContent(ctx context.Context, data string) ([]*CodeOwnerRule, []string) {
 | 
			
		||||
	if len(data) == 0 {
 | 
			
		||||
		return nil, nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	rules := make([]*CodeOwnerRule, 0)
 | 
			
		||||
	lines := strings.Split(data, "\n")
 | 
			
		||||
	warnings := make([]string, 0)
 | 
			
		||||
 | 
			
		||||
	for i, line := range lines {
 | 
			
		||||
		tokens := TokenizeCodeOwnersLine(line)
 | 
			
		||||
		if len(tokens) == 0 {
 | 
			
		||||
			continue
 | 
			
		||||
		} else if len(tokens) < 2 {
 | 
			
		||||
			warnings = append(warnings, fmt.Sprintf("Line: %d: incorrect format", i+1))
 | 
			
		||||
			continue
 | 
			
		||||
		}
 | 
			
		||||
		rule, wr := ParseCodeOwnersLine(ctx, tokens)
 | 
			
		||||
		for _, w := range wr {
 | 
			
		||||
			warnings = append(warnings, fmt.Sprintf("Line: %d: %s", i+1, w))
 | 
			
		||||
		}
 | 
			
		||||
		if rule == nil {
 | 
			
		||||
			continue
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		rules = append(rules, rule)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return rules, warnings
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type CodeOwnerRule struct {
 | 
			
		||||
	Rule     *regexp.Regexp
 | 
			
		||||
	Negative bool
 | 
			
		||||
	Users    []*user_model.User
 | 
			
		||||
	Teams    []*org_model.Team
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func ParseCodeOwnersLine(ctx context.Context, tokens []string) (*CodeOwnerRule, []string) {
 | 
			
		||||
	var err error
 | 
			
		||||
	rule := &CodeOwnerRule{
 | 
			
		||||
		Users:    make([]*user_model.User, 0),
 | 
			
		||||
		Teams:    make([]*org_model.Team, 0),
 | 
			
		||||
		Negative: strings.HasPrefix(tokens[0], "!"),
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	warnings := make([]string, 0)
 | 
			
		||||
 | 
			
		||||
	rule.Rule, err = regexp.Compile(fmt.Sprintf("^%s$", strings.TrimPrefix(tokens[0], "!")))
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		warnings = append(warnings, fmt.Sprintf("incorrect codeowner regexp: %s", err))
 | 
			
		||||
		return nil, warnings
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for _, user := range tokens[1:] {
 | 
			
		||||
		user = strings.TrimPrefix(user, "@")
 | 
			
		||||
 | 
			
		||||
		// Only @org/team can contain slashes
 | 
			
		||||
		if strings.Contains(user, "/") {
 | 
			
		||||
			s := strings.Split(user, "/")
 | 
			
		||||
			if len(s) != 2 {
 | 
			
		||||
				warnings = append(warnings, "incorrect codeowner group: "+user)
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
			orgName := s[0]
 | 
			
		||||
			teamName := s[1]
 | 
			
		||||
 | 
			
		||||
			org, err := org_model.GetOrgByName(ctx, orgName)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				warnings = append(warnings, "incorrect codeowner organization: "+user)
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
			teams, err := org.LoadTeams(ctx)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				warnings = append(warnings, "incorrect codeowner team: "+user)
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			for _, team := range teams {
 | 
			
		||||
				if team.Name == teamName {
 | 
			
		||||
					rule.Teams = append(rule.Teams, team)
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		} else {
 | 
			
		||||
			u, err := user_model.GetUserByName(ctx, user)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				warnings = append(warnings, "incorrect codeowner user: "+user)
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
			rule.Users = append(rule.Users, u)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (len(rule.Users) == 0) && (len(rule.Teams) == 0) {
 | 
			
		||||
		warnings = append(warnings, "no users/groups matched")
 | 
			
		||||
		return nil, warnings
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return rule, warnings
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TokenizeCodeOwnersLine(line string) []string {
 | 
			
		||||
	if len(line) == 0 {
 | 
			
		||||
		return nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	line = strings.TrimSpace(line)
 | 
			
		||||
	line = strings.ReplaceAll(line, "\t", " ")
 | 
			
		||||
 | 
			
		||||
	tokens := make([]string, 0)
 | 
			
		||||
 | 
			
		||||
	escape := false
 | 
			
		||||
	token := ""
 | 
			
		||||
	for _, char := range line {
 | 
			
		||||
		if escape {
 | 
			
		||||
			token += string(char)
 | 
			
		||||
			escape = false
 | 
			
		||||
		} else if string(char) == "\\" {
 | 
			
		||||
			escape = true
 | 
			
		||||
		} else if string(char) == "#" {
 | 
			
		||||
			break
 | 
			
		||||
		} else if string(char) == " " {
 | 
			
		||||
			if len(token) > 0 {
 | 
			
		||||
				tokens = append(tokens, token)
 | 
			
		||||
				token = ""
 | 
			
		||||
			}
 | 
			
		||||
		} else {
 | 
			
		||||
			token += string(char)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if len(token) > 0 {
 | 
			
		||||
		tokens = append(tokens, token)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return tokens
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// InsertPullRequests inserted pull requests
 | 
			
		||||
func InsertPullRequests(ctx context.Context, prs ...*PullRequest) error {
 | 
			
		||||
	return db.WithTx(ctx, func(ctx context.Context) error {
 | 
			
		||||
 | 
			
		||||
@ -317,28 +317,6 @@ func TestDeleteOrphanedObjects(t *testing.T) {
 | 
			
		||||
	assert.Equal(t, countBefore, countAfter)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestParseCodeOwnersLine(t *testing.T) {
 | 
			
		||||
	type CodeOwnerTest struct {
 | 
			
		||||
		Line   string
 | 
			
		||||
		Tokens []string
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	given := []CodeOwnerTest{
 | 
			
		||||
		{Line: "", Tokens: nil},
 | 
			
		||||
		{Line: "# comment", Tokens: []string{}},
 | 
			
		||||
		{Line: "!.* @user1 @org1/team1", Tokens: []string{"!.*", "@user1", "@org1/team1"}},
 | 
			
		||||
		{Line: `.*\\.js @user2 #comment`, Tokens: []string{`.*\.js`, "@user2"}},
 | 
			
		||||
		{Line: `docs/(aws|google|azure)/[^/]*\\.(md|txt) @org3 @org2/team2`, Tokens: []string{`docs/(aws|google|azure)/[^/]*\.(md|txt)`, "@org3", "@org2/team2"}},
 | 
			
		||||
		{Line: `\#path @org3`, Tokens: []string{`#path`, "@org3"}},
 | 
			
		||||
		{Line: `path\ with\ spaces/ @org3`, Tokens: []string{`path with spaces/`, "@org3"}},
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for _, g := range given {
 | 
			
		||||
		tokens := issues_model.TokenizeCodeOwnersLine(g.Line)
 | 
			
		||||
		assert.Equal(t, g.Tokens, tokens, "Codeowners tokenizer failed")
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestGetApprovers(t *testing.T) {
 | 
			
		||||
	assert.NoError(t, unittest.PrepareTestDatabase())
 | 
			
		||||
	pr := unittest.AssertExistsAndLoadBean(t, &issues_model.PullRequest{ID: 5})
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										168
									
								
								modules/repository/codeowner.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										168
									
								
								modules/repository/codeowner.go
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,168 @@
 | 
			
		||||
// Copyright 2025 The Gitea Authors. All rights reserved.
 | 
			
		||||
// SPDX-License-Identifier: MIT
 | 
			
		||||
 | 
			
		||||
package repository
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"regexp"
 | 
			
		||||
	"slices"
 | 
			
		||||
	"strings"
 | 
			
		||||
 | 
			
		||||
	org_model "code.gitea.io/gitea/models/organization"
 | 
			
		||||
	user_model "code.gitea.io/gitea/models/user"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
var codeOwnerFiles = []string{"CODEOWNERS", "docs/CODEOWNERS", ".gitea/CODEOWNERS"}
 | 
			
		||||
 | 
			
		||||
func IsCodeOwnerFile(f string) bool {
 | 
			
		||||
	return slices.Contains(codeOwnerFiles, f)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func GetCodeOwnerFiles() []string {
 | 
			
		||||
	return codeOwnerFiles
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// GetCodeOwnersFromContent returns the code owners configuration
 | 
			
		||||
// Return empty slice if files missing
 | 
			
		||||
// Return warning messages on parsing errors
 | 
			
		||||
// We're trying to do the best we can when parsing a file.
 | 
			
		||||
// Invalid lines are skipped. Non-existent users and teams too.
 | 
			
		||||
func GetCodeOwnersFromContent(ctx context.Context, data string) ([]*CodeOwnerRule, []string) {
 | 
			
		||||
	if len(data) == 0 {
 | 
			
		||||
		return nil, nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	rules := make([]*CodeOwnerRule, 0)
 | 
			
		||||
	lines := strings.Split(data, "\n")
 | 
			
		||||
	warnings := make([]string, 0)
 | 
			
		||||
 | 
			
		||||
	for i, line := range lines {
 | 
			
		||||
		tokens := TokenizeCodeOwnersLine(line)
 | 
			
		||||
		if len(tokens) == 0 {
 | 
			
		||||
			continue
 | 
			
		||||
		} else if len(tokens) < 2 {
 | 
			
		||||
			warnings = append(warnings, fmt.Sprintf("Line: %d: incorrect format", i+1))
 | 
			
		||||
			continue
 | 
			
		||||
		}
 | 
			
		||||
		rule, wr := ParseCodeOwnersLine(ctx, tokens)
 | 
			
		||||
		for _, w := range wr {
 | 
			
		||||
			warnings = append(warnings, fmt.Sprintf("Line: %d: %s", i+1, w))
 | 
			
		||||
		}
 | 
			
		||||
		if rule == nil {
 | 
			
		||||
			continue
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		rules = append(rules, rule)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return rules, warnings
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type CodeOwnerRule struct {
 | 
			
		||||
	Rule     *regexp.Regexp
 | 
			
		||||
	Negative bool
 | 
			
		||||
	Users    []*user_model.User
 | 
			
		||||
	Teams    []*org_model.Team
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func ParseCodeOwnersLine(ctx context.Context, tokens []string) (*CodeOwnerRule, []string) {
 | 
			
		||||
	var err error
 | 
			
		||||
	rule := &CodeOwnerRule{
 | 
			
		||||
		Users:    make([]*user_model.User, 0),
 | 
			
		||||
		Teams:    make([]*org_model.Team, 0),
 | 
			
		||||
		Negative: strings.HasPrefix(tokens[0], "!"),
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	warnings := make([]string, 0)
 | 
			
		||||
 | 
			
		||||
	rule.Rule, err = regexp.Compile(fmt.Sprintf("^%s$", strings.TrimPrefix(tokens[0], "!")))
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		warnings = append(warnings, fmt.Sprintf("incorrect codeowner regexp: %s", err))
 | 
			
		||||
		return nil, warnings
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for _, user := range tokens[1:] {
 | 
			
		||||
		user = strings.TrimPrefix(user, "@")
 | 
			
		||||
 | 
			
		||||
		// Only @org/team can contain slashes
 | 
			
		||||
		if strings.Contains(user, "/") {
 | 
			
		||||
			s := strings.Split(user, "/")
 | 
			
		||||
			if len(s) != 2 {
 | 
			
		||||
				warnings = append(warnings, "incorrect codeowner group: "+user)
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
			orgName := s[0]
 | 
			
		||||
			teamName := s[1]
 | 
			
		||||
 | 
			
		||||
			org, err := org_model.GetOrgByName(ctx, orgName)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				warnings = append(warnings, "incorrect codeowner organization: "+user)
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
			teams, err := org.LoadTeams(ctx)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				warnings = append(warnings, "incorrect codeowner team: "+user)
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			for _, team := range teams {
 | 
			
		||||
				if team.Name == teamName {
 | 
			
		||||
					rule.Teams = append(rule.Teams, team)
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		} else {
 | 
			
		||||
			u, err := user_model.GetUserByName(ctx, user)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				warnings = append(warnings, "incorrect codeowner user: "+user)
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
			rule.Users = append(rule.Users, u)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (len(rule.Users) == 0) && (len(rule.Teams) == 0) {
 | 
			
		||||
		warnings = append(warnings, "no users/groups matched")
 | 
			
		||||
		return nil, warnings
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return rule, warnings
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TokenizeCodeOwnersLine(line string) []string {
 | 
			
		||||
	if len(line) == 0 {
 | 
			
		||||
		return nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	line = strings.TrimSpace(line)
 | 
			
		||||
	line = strings.ReplaceAll(line, "\t", " ")
 | 
			
		||||
 | 
			
		||||
	tokens := make([]string, 0)
 | 
			
		||||
 | 
			
		||||
	escape := false
 | 
			
		||||
	token := ""
 | 
			
		||||
	for _, char := range line {
 | 
			
		||||
		if escape {
 | 
			
		||||
			token += string(char)
 | 
			
		||||
			escape = false
 | 
			
		||||
		} else if string(char) == "\\" {
 | 
			
		||||
			escape = true
 | 
			
		||||
		} else if string(char) == "#" {
 | 
			
		||||
			break
 | 
			
		||||
		} else if string(char) == " " {
 | 
			
		||||
			if len(token) > 0 {
 | 
			
		||||
				tokens = append(tokens, token)
 | 
			
		||||
				token = ""
 | 
			
		||||
			}
 | 
			
		||||
		} else {
 | 
			
		||||
			token += string(char)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if len(token) > 0 {
 | 
			
		||||
		tokens = append(tokens, token)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return tokens
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										32
									
								
								modules/repository/codeowner_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										32
									
								
								modules/repository/codeowner_test.go
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,32 @@
 | 
			
		||||
// Copyright 2025 The Gitea Authors. All rights reserved.
 | 
			
		||||
// SPDX-License-Identifier: MIT
 | 
			
		||||
 | 
			
		||||
package repository
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"testing"
 | 
			
		||||
 | 
			
		||||
	"github.com/stretchr/testify/assert"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func TestParseCodeOwnersLine(t *testing.T) {
 | 
			
		||||
	type CodeOwnerTest struct {
 | 
			
		||||
		Line   string
 | 
			
		||||
		Tokens []string
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	given := []CodeOwnerTest{
 | 
			
		||||
		{Line: "", Tokens: nil},
 | 
			
		||||
		{Line: "# comment", Tokens: []string{}},
 | 
			
		||||
		{Line: "!.* @user1 @org1/team1", Tokens: []string{"!.*", "@user1", "@org1/team1"}},
 | 
			
		||||
		{Line: `.*\\.js @user2 #comment`, Tokens: []string{`.*\.js`, "@user2"}},
 | 
			
		||||
		{Line: `docs/(aws|google|azure)/[^/]*\\.(md|txt) @org3 @org2/team2`, Tokens: []string{`docs/(aws|google|azure)/[^/]*\.(md|txt)`, "@org3", "@org2/team2"}},
 | 
			
		||||
		{Line: `\#path @org3`, Tokens: []string{`#path`, "@org3"}},
 | 
			
		||||
		{Line: `path\ with\ spaces/ @org3`, Tokens: []string{`path with spaces/`, "@org3"}},
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for _, g := range given {
 | 
			
		||||
		tokens := TokenizeCodeOwnersLine(g.Line)
 | 
			
		||||
		assert.Equal(t, g.Tokens, tokens, "Codeowners tokenizer failed")
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
@ -18,7 +18,6 @@ import (
 | 
			
		||||
	"code.gitea.io/gitea/routers/api/v1/utils"
 | 
			
		||||
	"code.gitea.io/gitea/services/context"
 | 
			
		||||
	"code.gitea.io/gitea/services/convert"
 | 
			
		||||
	issue_service "code.gitea.io/gitea/services/issue"
 | 
			
		||||
	pull_service "code.gitea.io/gitea/services/pull"
 | 
			
		||||
	repo_service "code.gitea.io/gitea/services/repository"
 | 
			
		||||
)
 | 
			
		||||
@ -324,7 +323,7 @@ func GetReviewers(ctx *context.APIContext) {
 | 
			
		||||
	//   "404":
 | 
			
		||||
	//     "$ref": "#/responses/notFound"
 | 
			
		||||
 | 
			
		||||
	canChooseReviewer := issue_service.CanDoerChangeReviewRequests(ctx, ctx.Doer, ctx.Repo.Repository, 0)
 | 
			
		||||
	canChooseReviewer := pull_service.CanDoerChangeReviewRequests(ctx, ctx.Doer, ctx.Repo.Repository, 0)
 | 
			
		||||
	if !canChooseReviewer {
 | 
			
		||||
		ctx.APIError(http.StatusForbidden, errors.New("doer has no permission to get reviewers"))
 | 
			
		||||
		return
 | 
			
		||||
 | 
			
		||||
@ -19,7 +19,6 @@ import (
 | 
			
		||||
	"code.gitea.io/gitea/routers/api/v1/utils"
 | 
			
		||||
	"code.gitea.io/gitea/services/context"
 | 
			
		||||
	"code.gitea.io/gitea/services/convert"
 | 
			
		||||
	issue_service "code.gitea.io/gitea/services/issue"
 | 
			
		||||
	pull_service "code.gitea.io/gitea/services/pull"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
@ -730,7 +729,7 @@ func apiReviewRequest(ctx *context.APIContext, opts api.PullReviewRequestOptions
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for _, reviewer := range reviewers {
 | 
			
		||||
		comment, err := issue_service.ReviewRequest(ctx, pr.Issue, ctx.Doer, &permDoer, reviewer, isAdd)
 | 
			
		||||
		comment, err := pull_service.ReviewRequest(ctx, pr.Issue, ctx.Doer, &permDoer, reviewer, isAdd)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			if issues_model.IsErrReviewRequestOnClosedPR(err) {
 | 
			
		||||
				ctx.APIError(http.StatusForbidden, err)
 | 
			
		||||
@ -755,7 +754,7 @@ func apiReviewRequest(ctx *context.APIContext, opts api.PullReviewRequestOptions
 | 
			
		||||
 | 
			
		||||
	if ctx.Repo.Repository.Owner.IsOrganization() && len(opts.TeamReviewers) > 0 {
 | 
			
		||||
		for _, teamReviewer := range teamReviewers {
 | 
			
		||||
			comment, err := issue_service.TeamReviewRequest(ctx, pr.Issue, ctx.Doer, teamReviewer, isAdd)
 | 
			
		||||
			comment, err := pull_service.TeamReviewRequest(ctx, pr.Issue, ctx.Doer, teamReviewer, isAdd)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				if issues_model.IsErrReviewRequestOnClosedPR(err) {
 | 
			
		||||
					ctx.APIError(http.StatusForbidden, err)
 | 
			
		||||
 | 
			
		||||
@ -18,7 +18,6 @@ import (
 | 
			
		||||
	"code.gitea.io/gitea/modules/optional"
 | 
			
		||||
	shared_user "code.gitea.io/gitea/routers/web/shared/user"
 | 
			
		||||
	"code.gitea.io/gitea/services/context"
 | 
			
		||||
	issue_service "code.gitea.io/gitea/services/issue"
 | 
			
		||||
	pull_service "code.gitea.io/gitea/services/pull"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
@ -194,7 +193,7 @@ func (d *IssuePageMetaData) retrieveReviewersData(ctx *context.Context) {
 | 
			
		||||
		if d.Issue == nil {
 | 
			
		||||
			data.CanChooseReviewer = true
 | 
			
		||||
		} else {
 | 
			
		||||
			data.CanChooseReviewer = issue_service.CanDoerChangeReviewRequests(ctx, ctx.Doer, repo, d.Issue.PosterID)
 | 
			
		||||
			data.CanChooseReviewer = pull_service.CanDoerChangeReviewRequests(ctx, ctx.Doer, repo, d.Issue.PosterID)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -20,7 +20,6 @@ import (
 | 
			
		||||
	"code.gitea.io/gitea/services/context"
 | 
			
		||||
	"code.gitea.io/gitea/services/context/upload"
 | 
			
		||||
	"code.gitea.io/gitea/services/forms"
 | 
			
		||||
	issue_service "code.gitea.io/gitea/services/issue"
 | 
			
		||||
	pull_service "code.gitea.io/gitea/services/pull"
 | 
			
		||||
	user_service "code.gitea.io/gitea/services/user"
 | 
			
		||||
)
 | 
			
		||||
@ -396,7 +395,7 @@ func UpdatePullReviewRequest(ctx *context.Context) {
 | 
			
		||||
				return
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			_, err = issue_service.TeamReviewRequest(ctx, issue, ctx.Doer, team, action == "attach")
 | 
			
		||||
			_, err = pull_service.TeamReviewRequest(ctx, issue, ctx.Doer, team, action == "attach")
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				if issues_model.IsErrNotValidReviewRequest(err) {
 | 
			
		||||
					log.Warn(
 | 
			
		||||
@ -428,7 +427,7 @@ func UpdatePullReviewRequest(ctx *context.Context) {
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		_, err = issue_service.ReviewRequest(ctx, issue, ctx.Doer, &ctx.Repo.Permission, reviewer, action == "attach")
 | 
			
		||||
		_, err = pull_service.ReviewRequest(ctx, issue, ctx.Doer, &ctx.Repo.Permission, reviewer, action == "attach")
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			if issues_model.IsErrNotValidReviewRequest(err) {
 | 
			
		||||
				log.Warn(
 | 
			
		||||
 | 
			
		||||
@ -12,7 +12,6 @@ import (
 | 
			
		||||
	"strings"
 | 
			
		||||
 | 
			
		||||
	git_model "code.gitea.io/gitea/models/git"
 | 
			
		||||
	issue_model "code.gitea.io/gitea/models/issues"
 | 
			
		||||
	"code.gitea.io/gitea/models/renderhelper"
 | 
			
		||||
	user_model "code.gitea.io/gitea/models/user"
 | 
			
		||||
	"code.gitea.io/gitea/modules/actions"
 | 
			
		||||
@ -22,6 +21,7 @@ import (
 | 
			
		||||
	"code.gitea.io/gitea/modules/highlight"
 | 
			
		||||
	"code.gitea.io/gitea/modules/log"
 | 
			
		||||
	"code.gitea.io/gitea/modules/markup"
 | 
			
		||||
	repo_module "code.gitea.io/gitea/modules/repository"
 | 
			
		||||
	"code.gitea.io/gitea/modules/setting"
 | 
			
		||||
	"code.gitea.io/gitea/modules/typesniffer"
 | 
			
		||||
	"code.gitea.io/gitea/modules/util"
 | 
			
		||||
@ -199,9 +199,9 @@ func prepareFileView(ctx *context.Context, entry *git.TreeEntry) {
 | 
			
		||||
		if workFlowErr != nil {
 | 
			
		||||
			ctx.Data["FileError"] = ctx.Locale.Tr("actions.runs.invalid_workflow_helper", workFlowErr.Error())
 | 
			
		||||
		}
 | 
			
		||||
	} else if issue_service.IsCodeOwnerFile(ctx.Repo.TreePath) {
 | 
			
		||||
	} else if repo_module.IsCodeOwnerFile(ctx.Repo.TreePath) {
 | 
			
		||||
		if data, err := blob.GetBlobContent(setting.UI.MaxDisplayFileSize); err == nil {
 | 
			
		||||
			_, warnings := issue_model.GetCodeOwnersFromContent(ctx, data)
 | 
			
		||||
			_, warnings := repo_module.GetCodeOwnersFromContent(ctx, data)
 | 
			
		||||
			if len(warnings) > 0 {
 | 
			
		||||
				ctx.Data["FileWarning"] = strings.Join(warnings, "\n")
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
@ -7,13 +7,7 @@ import (
 | 
			
		||||
	"context"
 | 
			
		||||
 | 
			
		||||
	issues_model "code.gitea.io/gitea/models/issues"
 | 
			
		||||
	"code.gitea.io/gitea/models/organization"
 | 
			
		||||
	"code.gitea.io/gitea/models/perm"
 | 
			
		||||
	access_model "code.gitea.io/gitea/models/perm/access"
 | 
			
		||||
	repo_model "code.gitea.io/gitea/models/repo"
 | 
			
		||||
	"code.gitea.io/gitea/models/unit"
 | 
			
		||||
	user_model "code.gitea.io/gitea/models/user"
 | 
			
		||||
	"code.gitea.io/gitea/modules/log"
 | 
			
		||||
	notify_service "code.gitea.io/gitea/services/notify"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
@ -61,268 +55,3 @@ func ToggleAssigneeWithNotify(ctx context.Context, issue *issues_model.Issue, do
 | 
			
		||||
 | 
			
		||||
	return removed, comment, err
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ReviewRequest add or remove a review request from a user for this PR, and make comment for it.
 | 
			
		||||
func ReviewRequest(ctx context.Context, issue *issues_model.Issue, doer *user_model.User, permDoer *access_model.Permission, reviewer *user_model.User, isAdd bool) (comment *issues_model.Comment, err error) {
 | 
			
		||||
	err = isValidReviewRequest(ctx, reviewer, doer, isAdd, issue, permDoer)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if isAdd {
 | 
			
		||||
		comment, err = issues_model.AddReviewRequest(ctx, issue, reviewer, doer)
 | 
			
		||||
	} else {
 | 
			
		||||
		comment, err = issues_model.RemoveReviewRequest(ctx, issue, reviewer, doer)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if comment != nil {
 | 
			
		||||
		notify_service.PullRequestReviewRequest(ctx, doer, issue, reviewer, isAdd, comment)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return comment, err
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// isValidReviewRequest Check permission for ReviewRequest
 | 
			
		||||
func isValidReviewRequest(ctx context.Context, reviewer, doer *user_model.User, isAdd bool, issue *issues_model.Issue, permDoer *access_model.Permission) error {
 | 
			
		||||
	if reviewer.IsOrganization() {
 | 
			
		||||
		return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
			Reason: "Organization can't be added as reviewer",
 | 
			
		||||
			UserID: doer.ID,
 | 
			
		||||
			RepoID: issue.Repo.ID,
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	if doer.IsOrganization() {
 | 
			
		||||
		return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
			Reason: "Organization can't be doer to add reviewer",
 | 
			
		||||
			UserID: doer.ID,
 | 
			
		||||
			RepoID: issue.Repo.ID,
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	permReviewer, err := access_model.GetUserRepoPermission(ctx, issue.Repo, reviewer)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if permDoer == nil {
 | 
			
		||||
		permDoer = new(access_model.Permission)
 | 
			
		||||
		*permDoer, err = access_model.GetUserRepoPermission(ctx, issue.Repo, doer)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	lastReview, err := issues_model.GetReviewByIssueIDAndUserID(ctx, issue.ID, reviewer.ID)
 | 
			
		||||
	if err != nil && !issues_model.IsErrReviewNotExist(err) {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	canDoerChangeReviewRequests := CanDoerChangeReviewRequests(ctx, doer, issue.Repo, issue.PosterID)
 | 
			
		||||
 | 
			
		||||
	if isAdd {
 | 
			
		||||
		if !permReviewer.CanAccessAny(perm.AccessModeRead, unit.TypePullRequests) {
 | 
			
		||||
			return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
				Reason: "Reviewer can't read",
 | 
			
		||||
				UserID: doer.ID,
 | 
			
		||||
				RepoID: issue.Repo.ID,
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if reviewer.ID == issue.PosterID && issue.OriginalAuthorID == 0 {
 | 
			
		||||
			return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
				Reason: "poster of pr can't be reviewer",
 | 
			
		||||
				UserID: doer.ID,
 | 
			
		||||
				RepoID: issue.Repo.ID,
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if canDoerChangeReviewRequests {
 | 
			
		||||
			return nil
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if doer.ID == issue.PosterID && issue.OriginalAuthorID == 0 && lastReview != nil && lastReview.Type != issues_model.ReviewTypeRequest {
 | 
			
		||||
			return nil
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
			Reason: "Doer can't choose reviewer",
 | 
			
		||||
			UserID: doer.ID,
 | 
			
		||||
			RepoID: issue.Repo.ID,
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if canDoerChangeReviewRequests {
 | 
			
		||||
		return nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if lastReview != nil && lastReview.Type == issues_model.ReviewTypeRequest && lastReview.ReviewerID == doer.ID {
 | 
			
		||||
		return nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
		Reason: "Doer can't remove reviewer",
 | 
			
		||||
		UserID: doer.ID,
 | 
			
		||||
		RepoID: issue.Repo.ID,
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// isValidTeamReviewRequest Check permission for ReviewRequest Team
 | 
			
		||||
func isValidTeamReviewRequest(ctx context.Context, reviewer *organization.Team, doer *user_model.User, isAdd bool, issue *issues_model.Issue) error {
 | 
			
		||||
	if doer.IsOrganization() {
 | 
			
		||||
		return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
			Reason: "Organization can't be doer to add reviewer",
 | 
			
		||||
			UserID: doer.ID,
 | 
			
		||||
			RepoID: issue.Repo.ID,
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	canDoerChangeReviewRequests := CanDoerChangeReviewRequests(ctx, doer, issue.Repo, issue.PosterID)
 | 
			
		||||
 | 
			
		||||
	if isAdd {
 | 
			
		||||
		if issue.Repo.IsPrivate {
 | 
			
		||||
			hasTeam := organization.HasTeamRepo(ctx, reviewer.OrgID, reviewer.ID, issue.RepoID)
 | 
			
		||||
 | 
			
		||||
			if !hasTeam {
 | 
			
		||||
				return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
					Reason: "Reviewing team can't read repo",
 | 
			
		||||
					UserID: doer.ID,
 | 
			
		||||
					RepoID: issue.Repo.ID,
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if canDoerChangeReviewRequests {
 | 
			
		||||
			return nil
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
			Reason: "Doer can't choose reviewer",
 | 
			
		||||
			UserID: doer.ID,
 | 
			
		||||
			RepoID: issue.Repo.ID,
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if canDoerChangeReviewRequests {
 | 
			
		||||
		return nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
		Reason: "Doer can't remove reviewer",
 | 
			
		||||
		UserID: doer.ID,
 | 
			
		||||
		RepoID: issue.Repo.ID,
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// TeamReviewRequest add or remove a review request from a team for this PR, and make comment for it.
 | 
			
		||||
func TeamReviewRequest(ctx context.Context, issue *issues_model.Issue, doer *user_model.User, reviewer *organization.Team, isAdd bool) (comment *issues_model.Comment, err error) {
 | 
			
		||||
	err = isValidTeamReviewRequest(ctx, reviewer, doer, isAdd, issue)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	if isAdd {
 | 
			
		||||
		comment, err = issues_model.AddTeamReviewRequest(ctx, issue, reviewer, doer)
 | 
			
		||||
	} else {
 | 
			
		||||
		comment, err = issues_model.RemoveTeamReviewRequest(ctx, issue, reviewer, doer)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if comment == nil || !isAdd {
 | 
			
		||||
		return nil, nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return comment, teamReviewRequestNotify(ctx, issue, doer, reviewer, isAdd, comment)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func ReviewRequestNotify(ctx context.Context, issue *issues_model.Issue, doer *user_model.User, reviewNotifiers []*ReviewRequestNotifier) {
 | 
			
		||||
	for _, reviewNotifier := range reviewNotifiers {
 | 
			
		||||
		if reviewNotifier.Reviewer != nil {
 | 
			
		||||
			notify_service.PullRequestReviewRequest(ctx, issue.Poster, issue, reviewNotifier.Reviewer, reviewNotifier.IsAdd, reviewNotifier.Comment)
 | 
			
		||||
		} else if reviewNotifier.ReviewTeam != nil {
 | 
			
		||||
			if err := teamReviewRequestNotify(ctx, issue, issue.Poster, reviewNotifier.ReviewTeam, reviewNotifier.IsAdd, reviewNotifier.Comment); err != nil {
 | 
			
		||||
				log.Error("teamReviewRequestNotify: %v", err)
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// teamReviewRequestNotify notify all user in this team
 | 
			
		||||
func teamReviewRequestNotify(ctx context.Context, issue *issues_model.Issue, doer *user_model.User, reviewer *organization.Team, isAdd bool, comment *issues_model.Comment) error {
 | 
			
		||||
	// notify all user in this team
 | 
			
		||||
	if err := comment.LoadIssue(ctx); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	members, err := organization.GetTeamMembers(ctx, &organization.SearchMembersOptions{
 | 
			
		||||
		TeamID: reviewer.ID,
 | 
			
		||||
	})
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for _, member := range members {
 | 
			
		||||
		if member.ID == comment.Issue.PosterID {
 | 
			
		||||
			continue
 | 
			
		||||
		}
 | 
			
		||||
		comment.AssigneeID = member.ID
 | 
			
		||||
		notify_service.PullRequestReviewRequest(ctx, doer, issue, member, isAdd, comment)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return err
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// CanDoerChangeReviewRequests returns if the doer can add/remove review requests of a PR
 | 
			
		||||
func CanDoerChangeReviewRequests(ctx context.Context, doer *user_model.User, repo *repo_model.Repository, posterID int64) bool {
 | 
			
		||||
	if repo.IsArchived {
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
	// The poster of the PR can change the reviewers
 | 
			
		||||
	if doer.ID == posterID {
 | 
			
		||||
		return true
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// The owner of the repo can change the reviewers
 | 
			
		||||
	if doer.ID == repo.OwnerID {
 | 
			
		||||
		return true
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Collaborators of the repo can change the reviewers
 | 
			
		||||
	isCollaborator, err := repo_model.IsCollaborator(ctx, repo.ID, doer.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		log.Error("IsCollaborator: %v", err)
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
	if isCollaborator {
 | 
			
		||||
		return true
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// If the repo's owner is an organization, members of teams with read permission on pull requests can change reviewers
 | 
			
		||||
	if repo.Owner.IsOrganization() {
 | 
			
		||||
		teams, err := organization.GetTeamsWithAccessToAnyRepoUnit(ctx, repo.OwnerID, repo.ID, perm.AccessModeRead, unit.TypePullRequests)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			log.Error("GetTeamsWithAccessToRepo: %v", err)
 | 
			
		||||
			return false
 | 
			
		||||
		}
 | 
			
		||||
		for _, team := range teams {
 | 
			
		||||
			if !team.UnitEnabled(ctx, unit.TypePullRequests) {
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
			isMember, err := organization.IsTeamMember(ctx, repo.OwnerID, team.ID, doer.ID)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				log.Error("IsTeamMember: %v", err)
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
			if isMember {
 | 
			
		||||
				return true
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return false
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -17,7 +17,6 @@ import (
 | 
			
		||||
	user_model "code.gitea.io/gitea/models/user"
 | 
			
		||||
	"code.gitea.io/gitea/modules/container"
 | 
			
		||||
	"code.gitea.io/gitea/modules/git"
 | 
			
		||||
	"code.gitea.io/gitea/modules/log"
 | 
			
		||||
	"code.gitea.io/gitea/modules/storage"
 | 
			
		||||
	notify_service "code.gitea.io/gitea/services/notify"
 | 
			
		||||
)
 | 
			
		||||
@ -90,21 +89,7 @@ func ChangeTitle(ctx context.Context, issue *issues_model.Issue, doer *user_mode
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var reviewNotifiers []*ReviewRequestNotifier
 | 
			
		||||
	if issue.IsPull && issues_model.HasWorkInProgressPrefix(oldTitle) && !issues_model.HasWorkInProgressPrefix(title) {
 | 
			
		||||
		if err := issue.LoadPullRequest(ctx); err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		var err error
 | 
			
		||||
		reviewNotifiers, err = PullRequestCodeOwnersReview(ctx, issue.PullRequest)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			log.Error("PullRequestCodeOwnersReview: %v", err)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	notify_service.IssueChangeTitle(ctx, doer, issue, oldTitle)
 | 
			
		||||
	ReviewRequestNotify(ctx, issue, issue.Poster, reviewNotifiers)
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -115,7 +115,12 @@ func NewPullRequest(ctx context.Context, opts *NewPullRequestOptions) error {
 | 
			
		||||
	}
 | 
			
		||||
	defer baseGitRepo.Close()
 | 
			
		||||
 | 
			
		||||
	var reviewNotifiers []*issue_service.ReviewRequestNotifier
 | 
			
		||||
	permDoer, err := access_model.GetUserRepoPermission(ctx, repo, issue.Poster)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var reviewNotifiers []*ReviewRequestNotifier
 | 
			
		||||
	if err := db.WithTx(ctx, func(ctx context.Context) error {
 | 
			
		||||
		if err := issues_model.NewPullRequest(ctx, repo, issue, labelIDs, uuids, pr); err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
@ -174,12 +179,48 @@ func NewPullRequest(ctx context.Context, opts *NewPullRequestOptions) error {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		// review request from CodeOwners
 | 
			
		||||
		if !pr.IsWorkInProgress(ctx) {
 | 
			
		||||
			reviewNotifiers, err = issue_service.PullRequestCodeOwnersReview(ctx, pr)
 | 
			
		||||
			reviewNotifiers, err = RequestCodeOwnersReview(ctx, pr)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				return err
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		for _, reviewer := range opts.Reviewers {
 | 
			
		||||
			err = IsValidReviewRequest(ctx, reviewer, issue.Poster, true, issue, &permDoer)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				return err
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			comment, err := issues_model.AddReviewRequest(ctx, issue, reviewer, issue.Poster)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				return err
 | 
			
		||||
			}
 | 
			
		||||
			reviewNotifiers = append(reviewNotifiers, &ReviewRequestNotifier{
 | 
			
		||||
				Comment:  comment,
 | 
			
		||||
				IsAdd:    true,
 | 
			
		||||
				Reviewer: reviewer,
 | 
			
		||||
			})
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		for _, teamReviewer := range opts.TeamReviewers {
 | 
			
		||||
			err = IsValidTeamReviewRequest(ctx, teamReviewer, issue.Poster, true, issue)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				return err
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			comment, err := issues_model.AddTeamReviewRequest(ctx, issue, teamReviewer, issue.Poster)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				return err
 | 
			
		||||
			}
 | 
			
		||||
			reviewNotifiers = append(reviewNotifiers, &ReviewRequestNotifier{
 | 
			
		||||
				Comment:    comment,
 | 
			
		||||
				IsAdd:      true,
 | 
			
		||||
				ReviewTeam: teamReviewer,
 | 
			
		||||
			})
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return nil
 | 
			
		||||
	}); err != nil {
 | 
			
		||||
		// cleanup: this will only remove the reference, the real commit will be clean up when next GC
 | 
			
		||||
@ -190,7 +231,7 @@ func NewPullRequest(ctx context.Context, opts *NewPullRequestOptions) error {
 | 
			
		||||
	}
 | 
			
		||||
	baseGitRepo.Close() // close immediately to avoid notifications will open the repository again
 | 
			
		||||
 | 
			
		||||
	issue_service.ReviewRequestNotify(ctx, issue, issue.Poster, reviewNotifiers)
 | 
			
		||||
	ReviewRequestNotify(ctx, issue, issue.Poster, reviewNotifiers)
 | 
			
		||||
 | 
			
		||||
	mentions, err := issues_model.FindAndUpdateIssueMentions(ctx, issue, issue.Poster, issue.Content)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
@ -210,17 +251,7 @@ func NewPullRequest(ctx context.Context, opts *NewPullRequestOptions) error {
 | 
			
		||||
		}
 | 
			
		||||
		notify_service.IssueChangeAssignee(ctx, issue.Poster, issue, assignee, false, assigneeCommentMap[assigneeID])
 | 
			
		||||
	}
 | 
			
		||||
	permDoer, err := access_model.GetUserRepoPermission(ctx, repo, issue.Poster)
 | 
			
		||||
	for _, reviewer := range opts.Reviewers {
 | 
			
		||||
		if _, err = issue_service.ReviewRequest(ctx, pr.Issue, issue.Poster, &permDoer, reviewer, true); err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	for _, teamReviewer := range opts.TeamReviewers {
 | 
			
		||||
		if _, err = issue_service.TeamReviewRequest(ctx, pr.Issue, issue.Poster, teamReviewer, true); err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -462,12 +493,12 @@ func AddTestPullRequestTask(opts TestPullRequestOptions) {
 | 
			
		||||
					}
 | 
			
		||||
 | 
			
		||||
					if !pr.IsWorkInProgress(ctx) {
 | 
			
		||||
						reviewNotifiers, err := issue_service.PullRequestCodeOwnersReview(ctx, pr)
 | 
			
		||||
						reviewNotifiers, err := RequestCodeOwnersReview(ctx, pr)
 | 
			
		||||
						if err != nil {
 | 
			
		||||
							log.Error("PullRequestCodeOwnersReview: %v", err)
 | 
			
		||||
							log.Error("RequestCodeOwnersReview: %v", err)
 | 
			
		||||
						}
 | 
			
		||||
						if len(reviewNotifiers) > 0 {
 | 
			
		||||
							issue_service.ReviewRequestNotify(ctx, pr.Issue, opts.Doer, reviewNotifiers)
 | 
			
		||||
							ReviewRequestNotify(ctx, pr.Issue, opts.Doer, reviewNotifiers)
 | 
			
		||||
						}
 | 
			
		||||
					}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -1,5 +1,4 @@
 | 
			
		||||
// Copyright 2019 The Gitea Authors.
 | 
			
		||||
// All rights reserved.
 | 
			
		||||
// Copyright 2019 The Gitea Authors. All rights reserved.
 | 
			
		||||
// SPDX-License-Identifier: MIT
 | 
			
		||||
 | 
			
		||||
package pull
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										316
									
								
								services/pull/review_request.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										316
									
								
								services/pull/review_request.go
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,316 @@
 | 
			
		||||
// Copyright 2025 The Gitea Authors. All rights reserved.
 | 
			
		||||
// SPDX-License-Identifier: MIT
 | 
			
		||||
 | 
			
		||||
package pull
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
 | 
			
		||||
	issues_model "code.gitea.io/gitea/models/issues"
 | 
			
		||||
	org_model "code.gitea.io/gitea/models/organization"
 | 
			
		||||
	"code.gitea.io/gitea/models/perm"
 | 
			
		||||
	access_model "code.gitea.io/gitea/models/perm/access"
 | 
			
		||||
	repo_model "code.gitea.io/gitea/models/repo"
 | 
			
		||||
	"code.gitea.io/gitea/models/unit"
 | 
			
		||||
	user_model "code.gitea.io/gitea/models/user"
 | 
			
		||||
	"code.gitea.io/gitea/modules/log"
 | 
			
		||||
	notify_service "code.gitea.io/gitea/services/notify"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// ReviewRequest add or remove a review request from a user for this PR, and make comment for it.
 | 
			
		||||
func ReviewRequest(ctx context.Context, issue *issues_model.Issue, doer *user_model.User, permDoer *access_model.Permission, reviewer *user_model.User, isAdd bool) (comment *issues_model.Comment, err error) {
 | 
			
		||||
	err = IsValidReviewRequest(ctx, reviewer, doer, isAdd, issue, permDoer)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if isAdd {
 | 
			
		||||
		comment, err = issues_model.AddReviewRequest(ctx, issue, reviewer, doer)
 | 
			
		||||
	} else {
 | 
			
		||||
		comment, err = issues_model.RemoveReviewRequest(ctx, issue, reviewer, doer)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if comment != nil {
 | 
			
		||||
		notify_service.PullRequestReviewRequest(ctx, doer, issue, reviewer, isAdd, comment)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return comment, err
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// IsValidReviewRequest Check permission for ReviewRequest
 | 
			
		||||
func IsValidReviewRequest(ctx context.Context, reviewer, doer *user_model.User, isAdd bool, issue *issues_model.Issue, permDoer *access_model.Permission) error {
 | 
			
		||||
	if reviewer.IsOrganization() {
 | 
			
		||||
		return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
			Reason: "Organization can't be added as reviewer",
 | 
			
		||||
			UserID: doer.ID,
 | 
			
		||||
			RepoID: issue.Repo.ID,
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	if doer.IsOrganization() {
 | 
			
		||||
		return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
			Reason: "Organization can't be doer to add reviewer",
 | 
			
		||||
			UserID: doer.ID,
 | 
			
		||||
			RepoID: issue.Repo.ID,
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	permReviewer, err := access_model.GetUserRepoPermission(ctx, issue.Repo, reviewer)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if permDoer == nil {
 | 
			
		||||
		permDoer = new(access_model.Permission)
 | 
			
		||||
		*permDoer, err = access_model.GetUserRepoPermission(ctx, issue.Repo, doer)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	lastReview, err := issues_model.GetReviewByIssueIDAndUserID(ctx, issue.ID, reviewer.ID)
 | 
			
		||||
	if err != nil && !issues_model.IsErrReviewNotExist(err) {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	canDoerChangeReviewRequests := CanDoerChangeReviewRequests(ctx, doer, issue.Repo, issue.PosterID)
 | 
			
		||||
 | 
			
		||||
	if isAdd {
 | 
			
		||||
		if !permReviewer.CanAccessAny(perm.AccessModeRead, unit.TypePullRequests) {
 | 
			
		||||
			return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
				Reason: "Reviewer can't read",
 | 
			
		||||
				UserID: doer.ID,
 | 
			
		||||
				RepoID: issue.Repo.ID,
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if reviewer.ID == issue.PosterID && issue.OriginalAuthorID == 0 {
 | 
			
		||||
			return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
				Reason: "poster of pr can't be reviewer",
 | 
			
		||||
				UserID: doer.ID,
 | 
			
		||||
				RepoID: issue.Repo.ID,
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if canDoerChangeReviewRequests {
 | 
			
		||||
			return nil
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if doer.ID == issue.PosterID && issue.OriginalAuthorID == 0 && lastReview != nil && lastReview.Type != issues_model.ReviewTypeRequest {
 | 
			
		||||
			return nil
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
			Reason: "Doer can't choose reviewer",
 | 
			
		||||
			UserID: doer.ID,
 | 
			
		||||
			RepoID: issue.Repo.ID,
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if canDoerChangeReviewRequests {
 | 
			
		||||
		return nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if lastReview != nil && lastReview.Type == issues_model.ReviewTypeRequest && lastReview.ReviewerID == doer.ID {
 | 
			
		||||
		return nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
		Reason: "Doer can't remove reviewer",
 | 
			
		||||
		UserID: doer.ID,
 | 
			
		||||
		RepoID: issue.Repo.ID,
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// IsValidTeamReviewRequest Check permission for ReviewRequest Team
 | 
			
		||||
func IsValidTeamReviewRequest(ctx context.Context, reviewer *org_model.Team, doer *user_model.User, isAdd bool, issue *issues_model.Issue) error {
 | 
			
		||||
	if doer.IsOrganization() {
 | 
			
		||||
		return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
			Reason: "Organization can't be doer to add reviewer",
 | 
			
		||||
			UserID: doer.ID,
 | 
			
		||||
			RepoID: issue.Repo.ID,
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	canDoerChangeReviewRequests := CanDoerChangeReviewRequests(ctx, doer, issue.Repo, issue.PosterID)
 | 
			
		||||
 | 
			
		||||
	if isAdd {
 | 
			
		||||
		if issue.Repo.IsPrivate {
 | 
			
		||||
			hasTeam := org_model.HasTeamRepo(ctx, reviewer.OrgID, reviewer.ID, issue.RepoID)
 | 
			
		||||
 | 
			
		||||
			if !hasTeam {
 | 
			
		||||
				return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
					Reason: "Reviewing team can't read repo",
 | 
			
		||||
					UserID: doer.ID,
 | 
			
		||||
					RepoID: issue.Repo.ID,
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if canDoerChangeReviewRequests {
 | 
			
		||||
			return nil
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
			Reason: "Doer can't choose reviewer",
 | 
			
		||||
			UserID: doer.ID,
 | 
			
		||||
			RepoID: issue.Repo.ID,
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if canDoerChangeReviewRequests {
 | 
			
		||||
		return nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return issues_model.ErrNotValidReviewRequest{
 | 
			
		||||
		Reason: "Doer can't remove reviewer",
 | 
			
		||||
		UserID: doer.ID,
 | 
			
		||||
		RepoID: issue.Repo.ID,
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// TeamReviewRequest add or remove a review request from a team for this PR, and make comment for it.
 | 
			
		||||
func TeamReviewRequest(ctx context.Context, issue *issues_model.Issue, doer *user_model.User, reviewer *org_model.Team, isAdd bool) (comment *issues_model.Comment, err error) {
 | 
			
		||||
	err = IsValidTeamReviewRequest(ctx, reviewer, doer, isAdd, issue)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	if isAdd {
 | 
			
		||||
		comment, err = issues_model.AddTeamReviewRequest(ctx, issue, reviewer, doer)
 | 
			
		||||
	} else {
 | 
			
		||||
		comment, err = issues_model.RemoveTeamReviewRequest(ctx, issue, reviewer, doer)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if comment == nil || !isAdd {
 | 
			
		||||
		return nil, nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return comment, teamReviewRequestNotify(ctx, issue, doer, reviewer, isAdd, comment)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func ReviewRequestNotify(ctx context.Context, issue *issues_model.Issue, doer *user_model.User, reviewNotifiers []*ReviewRequestNotifier) {
 | 
			
		||||
	for _, reviewNotifier := range reviewNotifiers {
 | 
			
		||||
		if reviewNotifier.Reviewer != nil {
 | 
			
		||||
			notify_service.PullRequestReviewRequest(ctx, issue.Poster, issue, reviewNotifier.Reviewer, reviewNotifier.IsAdd, reviewNotifier.Comment)
 | 
			
		||||
		} else if reviewNotifier.ReviewTeam != nil {
 | 
			
		||||
			if err := teamReviewRequestNotify(ctx, issue, issue.Poster, reviewNotifier.ReviewTeam, reviewNotifier.IsAdd, reviewNotifier.Comment); err != nil {
 | 
			
		||||
				log.Error("teamReviewRequestNotify: %v", err)
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// teamReviewRequestNotify notify all user in this team
 | 
			
		||||
func teamReviewRequestNotify(ctx context.Context, issue *issues_model.Issue, doer *user_model.User, reviewer *org_model.Team, isAdd bool, comment *issues_model.Comment) error {
 | 
			
		||||
	// notify all user in this team
 | 
			
		||||
	if err := comment.LoadIssue(ctx); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	members, err := org_model.GetTeamMembers(ctx, &org_model.SearchMembersOptions{
 | 
			
		||||
		TeamID: reviewer.ID,
 | 
			
		||||
	})
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for _, member := range members {
 | 
			
		||||
		if member.ID == comment.Issue.PosterID {
 | 
			
		||||
			continue
 | 
			
		||||
		}
 | 
			
		||||
		comment.AssigneeID = member.ID
 | 
			
		||||
		notify_service.PullRequestReviewRequest(ctx, doer, issue, member, isAdd, comment)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return err
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type ReviewRequestNotifier struct {
 | 
			
		||||
	Comment    *issues_model.Comment
 | 
			
		||||
	IsAdd      bool
 | 
			
		||||
	Reviewer   *user_model.User
 | 
			
		||||
	ReviewTeam *org_model.Team
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// CanDoerChangeReviewRequests returns if the doer can add/remove review requests of a PR
 | 
			
		||||
func CanDoerChangeReviewRequests(ctx context.Context, doer *user_model.User, repo *repo_model.Repository, posterID int64) bool {
 | 
			
		||||
	if repo.IsArchived {
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
	// The poster of the PR can change the reviewers
 | 
			
		||||
	if doer.ID == posterID {
 | 
			
		||||
		return true
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// The owner of the repo can change the reviewers
 | 
			
		||||
	if doer.ID == repo.OwnerID {
 | 
			
		||||
		return true
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Collaborators of the repo can change the reviewers
 | 
			
		||||
	isCollaborator, err := repo_model.IsCollaborator(ctx, repo.ID, doer.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		log.Error("IsCollaborator: %v", err)
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
	if isCollaborator {
 | 
			
		||||
		return true
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// If the repo's owner is an organization, members of teams with read permission on pull requests can change reviewers
 | 
			
		||||
	if repo.Owner.IsOrganization() {
 | 
			
		||||
		teams, err := org_model.GetTeamsWithAccessToAnyRepoUnit(ctx, repo.OwnerID, repo.ID, perm.AccessModeRead, unit.TypePullRequests)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			log.Error("GetTeamsWithAccessToRepo: %v", err)
 | 
			
		||||
			return false
 | 
			
		||||
		}
 | 
			
		||||
		for _, team := range teams {
 | 
			
		||||
			if !team.UnitEnabled(ctx, unit.TypePullRequests) {
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
			isMember, err := org_model.IsTeamMember(ctx, repo.OwnerID, team.ID, doer.ID)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				log.Error("IsTeamMember: %v", err)
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
			if isMember {
 | 
			
		||||
				return true
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return false
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func init() {
 | 
			
		||||
	notify_service.RegisterNotifier(&reviewRequestNotifer{})
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type reviewRequestNotifer struct {
 | 
			
		||||
	notify_service.NullNotifier
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (n *reviewRequestNotifer) IssueChangeTitle(ctx context.Context, doer *user_model.User, issue *issues_model.Issue, oldTitle string) {
 | 
			
		||||
	var reviewNotifiers []*ReviewRequestNotifier
 | 
			
		||||
	if issue.IsPull && issues_model.HasWorkInProgressPrefix(oldTitle) && !issues_model.HasWorkInProgressPrefix(issue.Title) {
 | 
			
		||||
		if err := issue.LoadPullRequest(ctx); err != nil {
 | 
			
		||||
			log.Error("IssueChangeTitle: LoadPullRequest: %v", err)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		var err error
 | 
			
		||||
		reviewNotifiers, err = RequestCodeOwnersReview(ctx, issue.PullRequest)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			log.Error("RequestCodeOwnersReview: %v", err)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ReviewRequestNotify(ctx, issue, issue.Poster, reviewNotifiers)
 | 
			
		||||
}
 | 
			
		||||
@ -1,12 +1,11 @@
 | 
			
		||||
// Copyright 2024 The Gitea Authors. All rights reserved.
 | 
			
		||||
// Copyright 2025 The Gitea Authors. All rights reserved.
 | 
			
		||||
// SPDX-License-Identifier: MIT
 | 
			
		||||
 | 
			
		||||
package issue
 | 
			
		||||
package pull
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"slices"
 | 
			
		||||
	"time"
 | 
			
		||||
 | 
			
		||||
	issues_model "code.gitea.io/gitea/models/issues"
 | 
			
		||||
@ -15,6 +14,7 @@ import (
 | 
			
		||||
	"code.gitea.io/gitea/modules/git"
 | 
			
		||||
	"code.gitea.io/gitea/modules/gitrepo"
 | 
			
		||||
	"code.gitea.io/gitea/modules/log"
 | 
			
		||||
	repo_module "code.gitea.io/gitea/modules/repository"
 | 
			
		||||
	"code.gitea.io/gitea/modules/setting"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
@ -34,20 +34,8 @@ func getMergeBase(repo *git.Repository, pr *issues_model.PullRequest, baseBranch
 | 
			
		||||
	return mergeBase, err
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type ReviewRequestNotifier struct {
 | 
			
		||||
	Comment    *issues_model.Comment
 | 
			
		||||
	IsAdd      bool
 | 
			
		||||
	Reviewer   *user_model.User
 | 
			
		||||
	ReviewTeam *org_model.Team
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var codeOwnerFiles = []string{"CODEOWNERS", "docs/CODEOWNERS", ".gitea/CODEOWNERS"}
 | 
			
		||||
 | 
			
		||||
func IsCodeOwnerFile(f string) bool {
 | 
			
		||||
	return slices.Contains(codeOwnerFiles, f)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func PullRequestCodeOwnersReview(ctx context.Context, pr *issues_model.PullRequest) ([]*ReviewRequestNotifier, error) {
 | 
			
		||||
// RequestCodeOwnersReview requests code owners review for a pull request and return notifiers
 | 
			
		||||
func RequestCodeOwnersReview(ctx context.Context, pr *issues_model.PullRequest) ([]*ReviewRequestNotifier, error) {
 | 
			
		||||
	if err := pr.LoadIssue(ctx); err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
@ -79,7 +67,7 @@ func PullRequestCodeOwnersReview(ctx context.Context, pr *issues_model.PullReque
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var data string
 | 
			
		||||
	for _, file := range codeOwnerFiles {
 | 
			
		||||
	for _, file := range repo_module.GetCodeOwnerFiles() {
 | 
			
		||||
		if blob, err := commit.GetBlobByPath(file); err == nil {
 | 
			
		||||
			data, err = blob.GetBlobContent(setting.UI.MaxDisplayFileSize)
 | 
			
		||||
			if err == nil {
 | 
			
		||||
@ -91,7 +79,7 @@ func PullRequestCodeOwnersReview(ctx context.Context, pr *issues_model.PullReque
 | 
			
		||||
		return nil, nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	rules, _ := issues_model.GetCodeOwnersFromContent(ctx, data)
 | 
			
		||||
	rules, _ := repo_module.GetCodeOwnersFromContent(ctx, data)
 | 
			
		||||
	if len(rules) == 0 {
 | 
			
		||||
		return nil, nil
 | 
			
		||||
	}
 | 
			
		||||
@ -665,12 +665,12 @@ jobs:
 | 
			
		||||
		checkCommitStatusAndInsertFakeStatus(t, repo, sha)
 | 
			
		||||
 | 
			
		||||
		// review_requested
 | 
			
		||||
		_, err = issue_service.ReviewRequest(db.DefaultContext, pullIssue, user2, nil, user4, true)
 | 
			
		||||
		_, err = pull_service.ReviewRequest(db.DefaultContext, pullIssue, user2, nil, user4, true)
 | 
			
		||||
		assert.NoError(t, err)
 | 
			
		||||
		checkCommitStatusAndInsertFakeStatus(t, repo, sha)
 | 
			
		||||
 | 
			
		||||
		// review_request_removed
 | 
			
		||||
		_, err = issue_service.ReviewRequest(db.DefaultContext, pullIssue, user2, nil, user4, false)
 | 
			
		||||
		_, err = pull_service.ReviewRequest(db.DefaultContext, pullIssue, user2, nil, user4, false)
 | 
			
		||||
		assert.NoError(t, err)
 | 
			
		||||
		checkCommitStatusAndInsertFakeStatus(t, repo, sha)
 | 
			
		||||
	})
 | 
			
		||||
 | 
			
		||||
@ -17,7 +17,7 @@ import (
 | 
			
		||||
	user_model "code.gitea.io/gitea/models/user"
 | 
			
		||||
	"code.gitea.io/gitea/modules/json"
 | 
			
		||||
	api "code.gitea.io/gitea/modules/structs"
 | 
			
		||||
	issue_service "code.gitea.io/gitea/services/issue"
 | 
			
		||||
	pull_service "code.gitea.io/gitea/services/pull"
 | 
			
		||||
	"code.gitea.io/gitea/tests"
 | 
			
		||||
 | 
			
		||||
	"github.com/stretchr/testify/assert"
 | 
			
		||||
@ -425,7 +425,7 @@ func TestAPIPullReviewStayDismissed(t *testing.T) {
 | 
			
		||||
	// user8 dismiss review
 | 
			
		||||
	permUser8, err := access_model.GetUserRepoPermission(db.DefaultContext, pullIssue.Repo, user8)
 | 
			
		||||
	assert.NoError(t, err)
 | 
			
		||||
	_, err = issue_service.ReviewRequest(db.DefaultContext, pullIssue, user8, &permUser8, user8, false)
 | 
			
		||||
	_, err = pull_service.ReviewRequest(db.DefaultContext, pullIssue, user8, &permUser8, user8, false)
 | 
			
		||||
	assert.NoError(t, err)
 | 
			
		||||
 | 
			
		||||
	reviewsCountCheck(t,
 | 
			
		||||
 | 
			
		||||
@ -19,6 +19,7 @@ import (
 | 
			
		||||
	"code.gitea.io/gitea/modules/git"
 | 
			
		||||
	"code.gitea.io/gitea/modules/test"
 | 
			
		||||
	issue_service "code.gitea.io/gitea/services/issue"
 | 
			
		||||
	pull_service "code.gitea.io/gitea/services/pull"
 | 
			
		||||
	repo_service "code.gitea.io/gitea/services/repository"
 | 
			
		||||
	files_service "code.gitea.io/gitea/services/repository/files"
 | 
			
		||||
	"code.gitea.io/gitea/tests"
 | 
			
		||||
@ -108,7 +109,7 @@ func TestPullView_CodeOwner(t *testing.T) {
 | 
			
		||||
			})
 | 
			
		||||
			assert.NoError(t, err)
 | 
			
		||||
 | 
			
		||||
			reviewNotifiers, err := issue_service.PullRequestCodeOwnersReview(db.DefaultContext, pr)
 | 
			
		||||
			reviewNotifiers, err := pull_service.RequestCodeOwnersReview(db.DefaultContext, pr)
 | 
			
		||||
			assert.NoError(t, err)
 | 
			
		||||
			assert.Len(t, reviewNotifiers, 1)
 | 
			
		||||
			assert.EqualValues(t, 8, reviewNotifiers[0].Reviewer.ID)
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user