gitea源码

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548
  1. // Copyright 2019 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package repository
  4. import (
  5. "context"
  6. "fmt"
  7. "os"
  8. "strings"
  9. "code.gitea.io/gitea/models/db"
  10. issues_model "code.gitea.io/gitea/models/issues"
  11. "code.gitea.io/gitea/models/organization"
  12. "code.gitea.io/gitea/models/perm"
  13. access_model "code.gitea.io/gitea/models/perm/access"
  14. project_model "code.gitea.io/gitea/models/project"
  15. repo_model "code.gitea.io/gitea/models/repo"
  16. user_model "code.gitea.io/gitea/models/user"
  17. "code.gitea.io/gitea/modules/gitrepo"
  18. "code.gitea.io/gitea/modules/globallock"
  19. "code.gitea.io/gitea/modules/log"
  20. "code.gitea.io/gitea/modules/setting"
  21. "code.gitea.io/gitea/modules/util"
  22. notify_service "code.gitea.io/gitea/services/notify"
  23. )
  24. type LimitReachedError struct{ Limit int }
  25. func (LimitReachedError) Error() string {
  26. return "Repository limit has been reached"
  27. }
  28. func IsRepositoryLimitReached(err error) bool {
  29. _, ok := err.(LimitReachedError)
  30. return ok
  31. }
  32. func getRepoWorkingLockKey(repoID int64) string {
  33. return fmt.Sprintf("repo_working_%d", repoID)
  34. }
  35. // AcceptTransferOwnership transfers all corresponding setting from old user to new one.
  36. func AcceptTransferOwnership(ctx context.Context, repo *repo_model.Repository, doer *user_model.User) error {
  37. releaser, err := globallock.Lock(ctx, getRepoWorkingLockKey(repo.ID))
  38. if err != nil {
  39. log.Error("lock.Lock(): %v", err)
  40. return fmt.Errorf("lock.Lock: %w", err)
  41. }
  42. defer releaser()
  43. repoTransfer, err := repo_model.GetPendingRepositoryTransfer(ctx, repo)
  44. if err != nil {
  45. return err
  46. }
  47. oldOwnerName := repo.OwnerName
  48. if err := db.WithTx(ctx, func(ctx context.Context) error {
  49. if err := repoTransfer.LoadAttributes(ctx); err != nil {
  50. return err
  51. }
  52. if !doer.CanCreateRepoIn(repoTransfer.Recipient) {
  53. limit := util.Iif(repoTransfer.Recipient.MaxRepoCreation >= 0, repoTransfer.Recipient.MaxRepoCreation, setting.Repository.MaxCreationLimit)
  54. return LimitReachedError{Limit: limit}
  55. }
  56. if !repoTransfer.CanUserAcceptOrRejectTransfer(ctx, doer) {
  57. return util.ErrPermissionDenied
  58. }
  59. if err := repo.LoadOwner(ctx); err != nil {
  60. return err
  61. }
  62. for _, team := range repoTransfer.Teams {
  63. if repoTransfer.Recipient.ID != team.OrgID {
  64. return fmt.Errorf("team %d does not belong to organization", team.ID)
  65. }
  66. }
  67. return transferOwnership(ctx, repoTransfer.Doer, repoTransfer.Recipient.Name, repo, repoTransfer.Teams)
  68. }); err != nil {
  69. return err
  70. }
  71. releaser()
  72. notify_service.TransferRepository(ctx, doer, repo, oldOwnerName)
  73. return nil
  74. }
  75. // transferOwnership transfers all corresponding repository items from old user to new one.
  76. func transferOwnership(ctx context.Context, doer *user_model.User, newOwnerName string, repo *repo_model.Repository, teams []*organization.Team) (err error) {
  77. repoRenamed := false
  78. wikiRenamed := false
  79. oldOwnerName := doer.Name
  80. defer func() {
  81. if !repoRenamed && !wikiRenamed {
  82. return
  83. }
  84. recoverErr := recover()
  85. if err == nil && recoverErr == nil {
  86. return
  87. }
  88. if repoRenamed {
  89. if err := util.Rename(repo_model.RepoPath(newOwnerName, repo.Name), repo_model.RepoPath(oldOwnerName, repo.Name)); err != nil {
  90. log.Critical("Unable to move repository %s/%s directory from %s back to correct place %s: %v", oldOwnerName, repo.Name,
  91. repo_model.RepoPath(newOwnerName, repo.Name), repo_model.RepoPath(oldOwnerName, repo.Name), err)
  92. }
  93. }
  94. if wikiRenamed {
  95. if err := util.Rename(repo_model.WikiPath(newOwnerName, repo.Name), repo_model.WikiPath(oldOwnerName, repo.Name)); err != nil {
  96. log.Critical("Unable to move wiki for repository %s/%s directory from %s back to correct place %s: %v", oldOwnerName, repo.Name,
  97. repo_model.WikiPath(newOwnerName, repo.Name), repo_model.WikiPath(oldOwnerName, repo.Name), err)
  98. }
  99. }
  100. if recoverErr != nil {
  101. log.Error("Panic within TransferOwnership: %v\n%s", recoverErr, log.Stack(2))
  102. panic(recoverErr)
  103. }
  104. }()
  105. ctx, committer, err := db.TxContext(ctx)
  106. if err != nil {
  107. return err
  108. }
  109. defer committer.Close()
  110. sess := db.GetEngine(ctx)
  111. newOwner, err := user_model.GetUserByName(ctx, newOwnerName)
  112. if err != nil {
  113. return fmt.Errorf("get new owner '%s': %w", newOwnerName, err)
  114. }
  115. newOwnerName = newOwner.Name // ensure capitalisation matches
  116. // Check if new owner has repository with same name.
  117. if has, err := repo_model.IsRepositoryModelOrDirExist(ctx, newOwner, repo.Name); err != nil {
  118. return fmt.Errorf("IsRepositoryExist: %w", err)
  119. } else if has {
  120. return repo_model.ErrRepoAlreadyExist{
  121. Uname: newOwnerName,
  122. Name: repo.Name,
  123. }
  124. }
  125. oldOwner := repo.Owner
  126. oldOwnerName = oldOwner.Name
  127. // Note: we have to set value here to make sure recalculate accesses is based on
  128. // new owner.
  129. repo.OwnerID = newOwner.ID
  130. repo.Owner = newOwner
  131. repo.OwnerName = newOwner.Name
  132. // Update repository.
  133. if err := repo_model.UpdateRepositoryColsNoAutoTime(ctx, repo, "owner_id", "owner_name"); err != nil {
  134. return fmt.Errorf("update owner: %w", err)
  135. }
  136. // Remove redundant collaborators.
  137. collaborators, _, err := repo_model.GetCollaborators(ctx, &repo_model.FindCollaborationOptions{RepoID: repo.ID})
  138. if err != nil {
  139. return fmt.Errorf("GetCollaborators: %w", err)
  140. }
  141. // Dummy object.
  142. collaboration := &repo_model.Collaboration{RepoID: repo.ID}
  143. for _, c := range collaborators {
  144. if c.IsGhost() {
  145. collaboration.ID = c.Collaboration.ID
  146. if _, err := sess.Delete(collaboration); err != nil {
  147. return fmt.Errorf("remove collaborator '%d': %w", c.ID, err)
  148. }
  149. collaboration.ID = 0
  150. }
  151. if c.ID != newOwner.ID {
  152. isMember, err := organization.IsOrganizationMember(ctx, newOwner.ID, c.ID)
  153. if err != nil {
  154. return fmt.Errorf("IsOrgMember: %w", err)
  155. } else if !isMember {
  156. continue
  157. }
  158. }
  159. collaboration.UserID = c.ID
  160. if _, err := sess.Delete(collaboration); err != nil {
  161. return fmt.Errorf("remove collaborator '%d': %w", c.ID, err)
  162. }
  163. collaboration.UserID = 0
  164. }
  165. if oldOwner.IsOrganization() {
  166. // Remove old team-repository relations.
  167. if err := organization.RemoveOrgRepo(ctx, oldOwner.ID, repo.ID); err != nil {
  168. return fmt.Errorf("removeOrgRepo: %w", err)
  169. }
  170. // Remove project's issues that belong to old organization's projects
  171. projects, err := project_model.GetAllProjectsIDsByOwnerIDAndType(ctx, oldOwner.ID, project_model.TypeOrganization)
  172. if err != nil {
  173. return fmt.Errorf("Unable to find old org projects: %w", err)
  174. }
  175. issues, err := issues_model.GetIssueIDsByRepoID(ctx, repo.ID)
  176. if err != nil {
  177. return fmt.Errorf("Unable to find repo's issues: %w", err)
  178. }
  179. err = project_model.DeleteAllProjectIssueByIssueIDsAndProjectIDs(ctx, issues, projects)
  180. if err != nil {
  181. return fmt.Errorf("Unable to delete project's issues: %w", err)
  182. }
  183. }
  184. if newOwner.IsOrganization() {
  185. teams, err := organization.FindOrgTeams(ctx, newOwner.ID)
  186. if err != nil {
  187. return fmt.Errorf("LoadTeams: %w", err)
  188. }
  189. for _, t := range teams {
  190. if t.IncludesAllRepositories {
  191. if err := addRepositoryToTeam(ctx, t, repo); err != nil {
  192. return fmt.Errorf("AddRepository: %w", err)
  193. }
  194. }
  195. }
  196. } else if err := access_model.RecalculateAccesses(ctx, repo); err != nil {
  197. // Organization called this in addRepository method.
  198. return fmt.Errorf("recalculateAccesses: %w", err)
  199. }
  200. // Update repository count.
  201. if _, err := sess.Exec("UPDATE `user` SET num_repos=num_repos+1 WHERE id=?", newOwner.ID); err != nil {
  202. return fmt.Errorf("increase new owner repository count: %w", err)
  203. } else if _, err := sess.Exec("UPDATE `user` SET num_repos=num_repos-1 WHERE id=?", oldOwner.ID); err != nil {
  204. return fmt.Errorf("decrease old owner repository count: %w", err)
  205. }
  206. if err := repo_model.WatchRepo(ctx, doer, repo, true); err != nil {
  207. return fmt.Errorf("watchRepo: %w", err)
  208. }
  209. if oldOwner.IsOrganization() {
  210. // Remove watch for organization.
  211. if err := repo_model.WatchRepo(ctx, oldOwner, repo, false); err != nil {
  212. return fmt.Errorf("watchRepo [false]: %w", err)
  213. }
  214. // Delete labels that belong to the old organization and comments that added these labels
  215. if _, err := sess.Exec(`DELETE FROM issue_label WHERE issue_label.id IN (
  216. SELECT il_too.id FROM (
  217. SELECT il_too_too.id
  218. FROM issue_label AS il_too_too
  219. INNER JOIN label ON il_too_too.label_id = label.id
  220. INNER JOIN issue on issue.id = il_too_too.issue_id
  221. WHERE
  222. issue.repo_id = ? AND ((label.org_id = 0 AND issue.repo_id != label.repo_id) OR (label.repo_id = 0 AND label.org_id != ?))
  223. ) AS il_too )`, repo.ID, newOwner.ID); err != nil {
  224. return fmt.Errorf("Unable to remove old org labels: %w", err)
  225. }
  226. if _, err := sess.Exec(`DELETE FROM comment WHERE comment.id IN (
  227. SELECT il_too.id FROM (
  228. SELECT com.id
  229. FROM comment AS com
  230. INNER JOIN label ON com.label_id = label.id
  231. INNER JOIN issue ON issue.id = com.issue_id
  232. WHERE
  233. com.type = ? AND issue.repo_id = ? AND ((label.org_id = 0 AND issue.repo_id != label.repo_id) OR (label.repo_id = 0 AND label.org_id != ?))
  234. ) AS il_too)`, issues_model.CommentTypeLabel, repo.ID, newOwner.ID); err != nil {
  235. return fmt.Errorf("Unable to remove old org label comments: %w", err)
  236. }
  237. }
  238. // Rename remote repository to new path and delete local copy.
  239. dir := user_model.UserPath(newOwner.Name)
  240. if err := os.MkdirAll(dir, os.ModePerm); err != nil {
  241. return fmt.Errorf("Failed to create dir %s: %w", dir, err)
  242. }
  243. if err := util.Rename(repo_model.RepoPath(oldOwner.Name, repo.Name), repo_model.RepoPath(newOwner.Name, repo.Name)); err != nil {
  244. return fmt.Errorf("rename repository directory: %w", err)
  245. }
  246. repoRenamed = true
  247. // Rename remote wiki repository to new path and delete local copy.
  248. wikiPath := repo_model.WikiPath(oldOwner.Name, repo.Name)
  249. if isExist, err := util.IsExist(wikiPath); err != nil {
  250. log.Error("Unable to check if %s exists. Error: %v", wikiPath, err)
  251. return err
  252. } else if isExist {
  253. if err := util.Rename(wikiPath, repo_model.WikiPath(newOwner.Name, repo.Name)); err != nil {
  254. return fmt.Errorf("rename repository wiki: %w", err)
  255. }
  256. wikiRenamed = true
  257. }
  258. if err := repo_model.DeleteRepositoryTransfer(ctx, repo.ID); err != nil {
  259. return fmt.Errorf("deleteRepositoryTransfer: %w", err)
  260. }
  261. repo.Status = repo_model.RepositoryReady
  262. if err := repo_model.UpdateRepositoryColsNoAutoTime(ctx, repo, "status"); err != nil {
  263. return err
  264. }
  265. // If there was previously a redirect at this location, remove it.
  266. if err := repo_model.DeleteRedirect(ctx, newOwner.ID, repo.Name); err != nil {
  267. return fmt.Errorf("delete repo redirect: %w", err)
  268. }
  269. if err := repo_model.NewRedirect(ctx, oldOwner.ID, repo.ID, repo.Name, repo.Name); err != nil {
  270. return fmt.Errorf("repo_model.NewRedirect: %w", err)
  271. }
  272. newRepo, err := repo_model.GetRepositoryByID(ctx, repo.ID)
  273. if err != nil {
  274. return err
  275. }
  276. for _, team := range teams {
  277. if err := addRepositoryToTeam(ctx, team, newRepo); err != nil {
  278. return err
  279. }
  280. }
  281. return committer.Commit()
  282. }
  283. // changeRepositoryName changes all corresponding setting from old repository name to new one.
  284. func changeRepositoryName(ctx context.Context, repo *repo_model.Repository, newRepoName string) (err error) {
  285. oldRepoName := repo.Name
  286. newRepoName = strings.ToLower(newRepoName)
  287. if err = repo_model.IsUsableRepoName(newRepoName); err != nil {
  288. return err
  289. }
  290. if err := repo.LoadOwner(ctx); err != nil {
  291. return err
  292. }
  293. has, err := repo_model.IsRepositoryModelOrDirExist(ctx, repo.Owner, newRepoName)
  294. if err != nil {
  295. return fmt.Errorf("IsRepositoryExist: %w", err)
  296. } else if has {
  297. return repo_model.ErrRepoAlreadyExist{
  298. Uname: repo.OwnerName,
  299. Name: newRepoName,
  300. }
  301. }
  302. if err = gitrepo.RenameRepository(ctx, repo,
  303. repo_model.StorageRepo(repo_model.RelativePath(repo.OwnerName, newRepoName))); err != nil {
  304. return fmt.Errorf("rename repository directory: %w", err)
  305. }
  306. if HasWiki(ctx, repo) {
  307. if err = gitrepo.RenameRepository(ctx, repo.WikiStorageRepo(), repo_model.StorageRepo(
  308. repo_model.RelativeWikiPath(repo.OwnerName, newRepoName))); err != nil {
  309. return fmt.Errorf("rename repository wiki: %w", err)
  310. }
  311. }
  312. return db.WithTx(ctx, func(ctx context.Context) error {
  313. return repo_model.NewRedirect(ctx, repo.Owner.ID, repo.ID, oldRepoName, newRepoName)
  314. })
  315. }
  316. // ChangeRepositoryName changes all corresponding setting from old repository name to new one.
  317. func ChangeRepositoryName(ctx context.Context, doer *user_model.User, repo *repo_model.Repository, newRepoName string) error {
  318. log.Trace("ChangeRepositoryName: %s/%s -> %s", doer.Name, repo.Name, newRepoName)
  319. oldRepoName := repo.Name
  320. // Change repository directory name. We must lock the local copy of the
  321. // repo so that we can automatically rename the repo path and updates the
  322. // local copy's origin accordingly.
  323. releaser, err := globallock.Lock(ctx, getRepoWorkingLockKey(repo.ID))
  324. if err != nil {
  325. log.Error("lock.Lock(): %v", err)
  326. return fmt.Errorf("lock.Lock: %w", err)
  327. }
  328. defer releaser()
  329. if err := changeRepositoryName(ctx, repo, newRepoName); err != nil {
  330. return err
  331. }
  332. releaser()
  333. repo.Name = newRepoName
  334. notify_service.RenameRepository(ctx, doer, repo, oldRepoName)
  335. return nil
  336. }
  337. // StartRepositoryTransfer transfer a repo from one owner to a new one.
  338. // it make repository into pending transfer state, if doer can not create repo for new owner.
  339. func StartRepositoryTransfer(ctx context.Context, doer, newOwner *user_model.User, repo *repo_model.Repository, teams []*organization.Team) error {
  340. releaser, err := globallock.Lock(ctx, getRepoWorkingLockKey(repo.ID))
  341. if err != nil {
  342. return fmt.Errorf("lock.Lock: %w", err)
  343. }
  344. defer releaser()
  345. if err := repo_model.TestRepositoryReadyForTransfer(repo.Status); err != nil {
  346. return err
  347. }
  348. if !doer.CanForkRepoIn(newOwner) {
  349. limit := util.Iif(newOwner.MaxRepoCreation >= 0, newOwner.MaxRepoCreation, setting.Repository.MaxCreationLimit)
  350. return LimitReachedError{Limit: limit}
  351. }
  352. var isDirectTransfer bool
  353. oldOwnerName := repo.OwnerName
  354. if err := db.WithTx(ctx, func(ctx context.Context) error {
  355. // Admin is always allowed to transfer || user transfer repo back to his account,
  356. // then it will transfer directly without acceptance.
  357. if doer.IsAdmin || doer.ID == newOwner.ID {
  358. isDirectTransfer = true
  359. return transferOwnership(ctx, doer, newOwner.Name, repo, teams)
  360. }
  361. if user_model.IsUserBlockedBy(ctx, doer, newOwner.ID) {
  362. return user_model.ErrBlockedUser
  363. }
  364. // If new owner is an org and user can create repos he can transfer directly too
  365. if newOwner.IsOrganization() {
  366. allowed, err := organization.CanCreateOrgRepo(ctx, newOwner.ID, doer.ID)
  367. if err != nil {
  368. return err
  369. }
  370. if allowed {
  371. isDirectTransfer = true
  372. return transferOwnership(ctx, doer, newOwner.Name, repo, teams)
  373. }
  374. }
  375. // In case the new owner would not have sufficient access to the repo, give access rights for read
  376. hasAccess, err := access_model.HasAnyUnitAccess(ctx, newOwner.ID, repo)
  377. if err != nil {
  378. return err
  379. }
  380. if !hasAccess {
  381. if err := AddOrUpdateCollaborator(ctx, repo, newOwner, perm.AccessModeRead); err != nil {
  382. return err
  383. }
  384. }
  385. // Make repo as pending for transfer
  386. repo.Status = repo_model.RepositoryPendingTransfer
  387. return repo_model.CreatePendingRepositoryTransfer(ctx, doer, newOwner, repo.ID, teams)
  388. }); err != nil {
  389. return err
  390. }
  391. if isDirectTransfer {
  392. notify_service.TransferRepository(ctx, doer, repo, oldOwnerName)
  393. } else {
  394. // notify users who are able to accept / reject transfer
  395. notify_service.RepoPendingTransfer(ctx, doer, newOwner, repo)
  396. }
  397. return nil
  398. }
  399. // RejectRepositoryTransfer marks the repository as ready and remove pending transfer entry,
  400. // thus cancel the transfer process.
  401. // The accepter can reject the transfer.
  402. func RejectRepositoryTransfer(ctx context.Context, repo *repo_model.Repository, doer *user_model.User) error {
  403. return db.WithTx(ctx, func(ctx context.Context) error {
  404. repoTransfer, err := repo_model.GetPendingRepositoryTransfer(ctx, repo)
  405. if err != nil {
  406. return err
  407. }
  408. if err := repoTransfer.LoadAttributes(ctx); err != nil {
  409. return err
  410. }
  411. if !repoTransfer.CanUserAcceptOrRejectTransfer(ctx, doer) {
  412. return util.ErrPermissionDenied
  413. }
  414. repo.Status = repo_model.RepositoryReady
  415. if err := repo_model.UpdateRepositoryColsNoAutoTime(ctx, repo, "status"); err != nil {
  416. return err
  417. }
  418. return repo_model.DeleteRepositoryTransfer(ctx, repo.ID)
  419. })
  420. }
  421. func canUserCancelTransfer(ctx context.Context, r *repo_model.RepoTransfer, u *user_model.User) bool {
  422. if u.IsAdmin || u.ID == r.DoerID {
  423. return true
  424. }
  425. if err := r.LoadAttributes(ctx); err != nil {
  426. log.Error("LoadAttributes: %v", err)
  427. return false
  428. }
  429. if err := r.Repo.LoadOwner(ctx); err != nil {
  430. log.Error("LoadOwner: %v", err)
  431. return false
  432. }
  433. if !r.Repo.Owner.IsOrganization() {
  434. return r.Repo.OwnerID == u.ID
  435. }
  436. perm, err := access_model.GetUserRepoPermission(ctx, r.Repo, u)
  437. if err != nil {
  438. log.Error("GetUserRepoPermission: %v", err)
  439. return false
  440. }
  441. return perm.IsOwner()
  442. }
  443. // CancelRepositoryTransfer cancels the repository transfer process. The sender or
  444. // the users who have admin permission of the original repository can cancel the transfer
  445. func CancelRepositoryTransfer(ctx context.Context, repoTransfer *repo_model.RepoTransfer, doer *user_model.User) error {
  446. return db.WithTx(ctx, func(ctx context.Context) error {
  447. if err := repoTransfer.LoadAttributes(ctx); err != nil {
  448. return err
  449. }
  450. if !canUserCancelTransfer(ctx, repoTransfer, doer) {
  451. return util.ErrPermissionDenied
  452. }
  453. repoTransfer.Repo.Status = repo_model.RepositoryReady
  454. if err := repo_model.UpdateRepositoryColsNoAutoTime(ctx, repoTransfer.Repo, "status"); err != nil {
  455. return err
  456. }
  457. return repo_model.DeleteRepositoryTransfer(ctx, repoTransfer.RepoID)
  458. })
  459. }