mirror of
https://github.com/go-gitea/gitea.git
synced 2025-06-25 06:13:58 +02:00
When viewing a file that the user can't edit because they can't write to the branch, the new, upload, patch, edit and delete functionality is no longer disabled. If no user fork of the repository exists, there is now a page to create one. It will automatically create a fork with a single branch matching the one being viewed, and a unique repository name will be automatically picked. When a fork exists, but it's archived, a mirror or the user can't write code to it, there will instead be a message explaining the situation. If the usable fork exists, a message will appear at the top of the edit page explaining that the changes will be applied to a branch in the fork. The base repository branch will be pushed to a new branch to the fork, and then the edits will be applied on top. The suggestion to fork happens when accessing /_edit/, so that for example online documentation can have an "edit this page" link to the base repository that does the right thing. Also includes changes to properly report errors when trying to commit to a new branch that is protected, and when trying to commit to an existing branch when choosing the new branch option. Resolves #9017, #20882 --------- Co-authored-by: Brecht Van Lommel <brecht@blender.org> Co-authored-by: wxiaoguang <wxiaoguang@gmail.com>
125 lines
4.3 KiB
Go
125 lines
4.3 KiB
Go
// Copyright 2019 The Gitea Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package upload
|
|
|
|
import (
|
|
"mime"
|
|
"net/http"
|
|
"net/url"
|
|
"path"
|
|
"regexp"
|
|
"strings"
|
|
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
|
"code.gitea.io/gitea/modules/log"
|
|
"code.gitea.io/gitea/modules/reqctx"
|
|
"code.gitea.io/gitea/modules/setting"
|
|
"code.gitea.io/gitea/services/context"
|
|
)
|
|
|
|
// ErrFileTypeForbidden not allowed file type error
|
|
type ErrFileTypeForbidden struct {
|
|
Type string
|
|
}
|
|
|
|
// IsErrFileTypeForbidden checks if an error is a ErrFileTypeForbidden.
|
|
func IsErrFileTypeForbidden(err error) bool {
|
|
_, ok := err.(ErrFileTypeForbidden)
|
|
return ok
|
|
}
|
|
|
|
func (err ErrFileTypeForbidden) Error() string {
|
|
return "This file cannot be uploaded or modified due to a forbidden file extension or type."
|
|
}
|
|
|
|
var wildcardTypeRe = regexp.MustCompile(`^[a-z]+/\*$`)
|
|
|
|
// Verify validates whether a file is allowed to be uploaded. If buf is empty, it will just check if the file
|
|
// has an allowed file extension.
|
|
func Verify(buf []byte, fileName, allowedTypesStr string) error {
|
|
allowedTypesStr = strings.ReplaceAll(allowedTypesStr, "|", ",") // compat for old config format
|
|
|
|
allowedTypes := []string{}
|
|
for entry := range strings.SplitSeq(allowedTypesStr, ",") {
|
|
entry = strings.ToLower(strings.TrimSpace(entry))
|
|
if entry != "" {
|
|
allowedTypes = append(allowedTypes, entry)
|
|
}
|
|
}
|
|
|
|
if len(allowedTypes) == 0 {
|
|
return nil // everything is allowed
|
|
}
|
|
|
|
fullMimeType := http.DetectContentType(buf)
|
|
mimeType, _, err := mime.ParseMediaType(fullMimeType)
|
|
if err != nil {
|
|
log.Warn("Detected attachment type could not be parsed %s", fullMimeType)
|
|
return ErrFileTypeForbidden{Type: fullMimeType}
|
|
}
|
|
extension := strings.ToLower(path.Ext(fileName))
|
|
isBufEmpty := len(buf) <= 1
|
|
|
|
// https://developer.mozilla.org/en-US/docs/Web/HTML/Element/input/file#Unique_file_type_specifiers
|
|
for _, allowEntry := range allowedTypes {
|
|
if allowEntry == "*/*" {
|
|
return nil // everything allowed
|
|
}
|
|
if strings.HasPrefix(allowEntry, ".") && allowEntry == extension {
|
|
return nil // extension is allowed
|
|
}
|
|
if isBufEmpty {
|
|
continue // skip mime type checks if buffer is empty
|
|
}
|
|
if mimeType == allowEntry {
|
|
return nil // mime type is allowed
|
|
}
|
|
if wildcardTypeRe.MatchString(allowEntry) && strings.HasPrefix(mimeType, allowEntry[:len(allowEntry)-1]) {
|
|
return nil // wildcard match, e.g. image/*
|
|
}
|
|
}
|
|
|
|
if !isBufEmpty {
|
|
log.Info("Attachment with type %s blocked from upload", fullMimeType)
|
|
}
|
|
|
|
return ErrFileTypeForbidden{Type: fullMimeType}
|
|
}
|
|
|
|
// AddUploadContext renders template values for dropzone
|
|
func AddUploadContext(ctx *context.Context, uploadType string) {
|
|
switch uploadType {
|
|
case "release":
|
|
ctx.Data["UploadUrl"] = ctx.Repo.RepoLink + "/releases/attachments"
|
|
ctx.Data["UploadRemoveUrl"] = ctx.Repo.RepoLink + "/releases/attachments/remove"
|
|
ctx.Data["UploadLinkUrl"] = ctx.Repo.RepoLink + "/releases/attachments"
|
|
ctx.Data["UploadAccepts"] = strings.ReplaceAll(setting.Repository.Release.AllowedTypes, "|", ",")
|
|
ctx.Data["UploadMaxFiles"] = setting.Attachment.MaxFiles
|
|
ctx.Data["UploadMaxSize"] = setting.Attachment.MaxSize
|
|
case "comment":
|
|
ctx.Data["UploadUrl"] = ctx.Repo.RepoLink + "/issues/attachments"
|
|
ctx.Data["UploadRemoveUrl"] = ctx.Repo.RepoLink + "/issues/attachments/remove"
|
|
if len(ctx.PathParam("index")) > 0 {
|
|
ctx.Data["UploadLinkUrl"] = ctx.Repo.RepoLink + "/issues/" + url.PathEscape(ctx.PathParam("index")) + "/attachments"
|
|
} else {
|
|
ctx.Data["UploadLinkUrl"] = ctx.Repo.RepoLink + "/issues/attachments"
|
|
}
|
|
ctx.Data["UploadAccepts"] = strings.ReplaceAll(setting.Attachment.AllowedTypes, "|", ",")
|
|
ctx.Data["UploadMaxFiles"] = setting.Attachment.MaxFiles
|
|
ctx.Data["UploadMaxSize"] = setting.Attachment.MaxSize
|
|
default:
|
|
setting.PanicInDevOrTesting("Invalid upload type: %s", uploadType)
|
|
}
|
|
}
|
|
|
|
func AddUploadContextForRepo(ctx reqctx.RequestContext, repo *repo_model.Repository) {
|
|
ctxData, repoLink := ctx.GetData(), repo.Link()
|
|
ctxData["UploadUrl"] = repoLink + "/upload-file"
|
|
ctxData["UploadRemoveUrl"] = repoLink + "/upload-remove"
|
|
ctxData["UploadLinkUrl"] = repoLink + "/upload-file"
|
|
ctxData["UploadAccepts"] = strings.ReplaceAll(setting.Repository.Upload.AllowedTypes, "|", ",")
|
|
ctxData["UploadMaxFiles"] = setting.Repository.Upload.MaxFiles
|
|
ctxData["UploadMaxSize"] = setting.Repository.Upload.FileMaxSize
|
|
}
|