mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-31 03:02:14 +01:00 
			
		
		
		
	The old code generates `structs.Repository.Permissions` with only `access.Permission.AccessMode`, however, it should check the units too, or the value could be incorrect. For example, `structs.Repository.Permissions.Push` could be false even the doer has write access to code unit. Should fix https://github.com/renovatebot/renovate/issues/14059#issuecomment-1047961128 (Not reported by it, I just found it when I was looking into this bug) --- Review tips: The major changes are - `modules/structs/repo.go` https://github.com/go-gitea/gitea/pull/25388/files#diff-870406f6857117f8b03611c43fca0ab9ed6d6e76a2d0069a7c1f17e8fa9092f7 - `services/convert/repository.go` https://github.com/go-gitea/gitea/pull/25388/files#diff-7736f6d2ae894c9edb7729a80ab89aa183b888a26a811a0c1fdebd18726a7101 And other changes are passive.
		
			
				
	
	
		
			157 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			157 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2016 The Gogs Authors. All rights reserved.
 | |
| // Copyright 2020 The Gitea Authors.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package repo
 | |
| 
 | |
| import (
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 
 | |
| 	"code.gitea.io/gitea/models/organization"
 | |
| 	"code.gitea.io/gitea/models/perm"
 | |
| 	access_model "code.gitea.io/gitea/models/perm/access"
 | |
| 	repo_model "code.gitea.io/gitea/models/repo"
 | |
| 	user_model "code.gitea.io/gitea/models/user"
 | |
| 	"code.gitea.io/gitea/modules/context"
 | |
| 	api "code.gitea.io/gitea/modules/structs"
 | |
| 	"code.gitea.io/gitea/modules/util"
 | |
| 	"code.gitea.io/gitea/modules/web"
 | |
| 	"code.gitea.io/gitea/routers/api/v1/utils"
 | |
| 	"code.gitea.io/gitea/services/convert"
 | |
| 	repo_service "code.gitea.io/gitea/services/repository"
 | |
| )
 | |
| 
 | |
| // ListForks list a repository's forks
 | |
| func ListForks(ctx *context.APIContext) {
 | |
| 	// swagger:operation GET /repos/{owner}/{repo}/forks repository listForks
 | |
| 	// ---
 | |
| 	// summary: List a repository's forks
 | |
| 	// produces:
 | |
| 	// - application/json
 | |
| 	// parameters:
 | |
| 	// - name: owner
 | |
| 	//   in: path
 | |
| 	//   description: owner of the repo
 | |
| 	//   type: string
 | |
| 	//   required: true
 | |
| 	// - name: repo
 | |
| 	//   in: path
 | |
| 	//   description: name of the repo
 | |
| 	//   type: string
 | |
| 	//   required: true
 | |
| 	// - name: page
 | |
| 	//   in: query
 | |
| 	//   description: page number of results to return (1-based)
 | |
| 	//   type: integer
 | |
| 	// - name: limit
 | |
| 	//   in: query
 | |
| 	//   description: page size of results
 | |
| 	//   type: integer
 | |
| 	// responses:
 | |
| 	//   "200":
 | |
| 	//     "$ref": "#/responses/RepositoryList"
 | |
| 
 | |
| 	forks, err := repo_model.GetForks(ctx.Repo.Repository, utils.GetListOptions(ctx))
 | |
| 	if err != nil {
 | |
| 		ctx.Error(http.StatusInternalServerError, "GetForks", err)
 | |
| 		return
 | |
| 	}
 | |
| 	apiForks := make([]*api.Repository, len(forks))
 | |
| 	for i, fork := range forks {
 | |
| 		permission, err := access_model.GetUserRepoPermission(ctx, fork, ctx.Doer)
 | |
| 		if err != nil {
 | |
| 			ctx.Error(http.StatusInternalServerError, "GetUserRepoPermission", err)
 | |
| 			return
 | |
| 		}
 | |
| 		apiForks[i] = convert.ToRepo(ctx, fork, permission)
 | |
| 	}
 | |
| 
 | |
| 	ctx.SetTotalCountHeader(int64(ctx.Repo.Repository.NumForks))
 | |
| 	ctx.JSON(http.StatusOK, apiForks)
 | |
| }
 | |
| 
 | |
| // CreateFork create a fork of a repo
 | |
| func CreateFork(ctx *context.APIContext) {
 | |
| 	// swagger:operation POST /repos/{owner}/{repo}/forks repository createFork
 | |
| 	// ---
 | |
| 	// summary: Fork a repository
 | |
| 	// produces:
 | |
| 	// - application/json
 | |
| 	// parameters:
 | |
| 	// - name: owner
 | |
| 	//   in: path
 | |
| 	//   description: owner of the repo to fork
 | |
| 	//   type: string
 | |
| 	//   required: true
 | |
| 	// - name: repo
 | |
| 	//   in: path
 | |
| 	//   description: name of the repo to fork
 | |
| 	//   type: string
 | |
| 	//   required: true
 | |
| 	// - name: body
 | |
| 	//   in: body
 | |
| 	//   schema:
 | |
| 	//     "$ref": "#/definitions/CreateForkOption"
 | |
| 	// responses:
 | |
| 	//   "202":
 | |
| 	//     "$ref": "#/responses/Repository"
 | |
| 	//   "403":
 | |
| 	//     "$ref": "#/responses/forbidden"
 | |
| 	//   "409":
 | |
| 	//     description: The repository with the same name already exists.
 | |
| 	//   "422":
 | |
| 	//     "$ref": "#/responses/validationError"
 | |
| 
 | |
| 	form := web.GetForm(ctx).(*api.CreateForkOption)
 | |
| 	repo := ctx.Repo.Repository
 | |
| 	var forker *user_model.User // user/org that will own the fork
 | |
| 	if form.Organization == nil {
 | |
| 		forker = ctx.Doer
 | |
| 	} else {
 | |
| 		org, err := organization.GetOrgByName(ctx, *form.Organization)
 | |
| 		if err != nil {
 | |
| 			if organization.IsErrOrgNotExist(err) {
 | |
| 				ctx.Error(http.StatusUnprocessableEntity, "", err)
 | |
| 			} else {
 | |
| 				ctx.Error(http.StatusInternalServerError, "GetOrgByName", err)
 | |
| 			}
 | |
| 			return
 | |
| 		}
 | |
| 		isMember, err := org.IsOrgMember(ctx.Doer.ID)
 | |
| 		if err != nil {
 | |
| 			ctx.Error(http.StatusInternalServerError, "IsOrgMember", err)
 | |
| 			return
 | |
| 		} else if !isMember {
 | |
| 			ctx.Error(http.StatusForbidden, "isMemberNot", fmt.Sprintf("User is no Member of Organisation '%s'", org.Name))
 | |
| 			return
 | |
| 		}
 | |
| 		forker = org.AsUser()
 | |
| 	}
 | |
| 
 | |
| 	var name string
 | |
| 	if form.Name == nil {
 | |
| 		name = repo.Name
 | |
| 	} else {
 | |
| 		name = *form.Name
 | |
| 	}
 | |
| 
 | |
| 	fork, err := repo_service.ForkRepository(ctx, ctx.Doer, forker, repo_service.ForkRepoOptions{
 | |
| 		BaseRepo:    repo,
 | |
| 		Name:        name,
 | |
| 		Description: repo.Description,
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		if errors.Is(err, util.ErrAlreadyExist) || repo_model.IsErrReachLimitOfRepo(err) {
 | |
| 			ctx.Error(http.StatusConflict, "ForkRepository", err)
 | |
| 		} else {
 | |
| 			ctx.Error(http.StatusInternalServerError, "ForkRepository", err)
 | |
| 		}
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	// TODO change back to 201
 | |
| 	ctx.JSON(http.StatusAccepted, convert.ToRepo(ctx, fork, access_model.Permission{AccessMode: perm.AccessModeOwner}))
 | |
| }
 |