| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548 |
- // Copyright 2019 The Gitea Authors. All rights reserved.
- // SPDX-License-Identifier: MIT
-
- package repository
-
- import (
- "context"
- "fmt"
- "os"
- "strings"
-
- "code.gitea.io/gitea/models/db"
- issues_model "code.gitea.io/gitea/models/issues"
- "code.gitea.io/gitea/models/organization"
- "code.gitea.io/gitea/models/perm"
- access_model "code.gitea.io/gitea/models/perm/access"
- project_model "code.gitea.io/gitea/models/project"
- repo_model "code.gitea.io/gitea/models/repo"
- user_model "code.gitea.io/gitea/models/user"
- "code.gitea.io/gitea/modules/gitrepo"
- "code.gitea.io/gitea/modules/globallock"
- "code.gitea.io/gitea/modules/log"
- "code.gitea.io/gitea/modules/setting"
- "code.gitea.io/gitea/modules/util"
- notify_service "code.gitea.io/gitea/services/notify"
- )
-
- type LimitReachedError struct{ Limit int }
-
- func (LimitReachedError) Error() string {
- return "Repository limit has been reached"
- }
-
- func IsRepositoryLimitReached(err error) bool {
- _, ok := err.(LimitReachedError)
- return ok
- }
-
- func getRepoWorkingLockKey(repoID int64) string {
- return fmt.Sprintf("repo_working_%d", repoID)
- }
-
- // AcceptTransferOwnership transfers all corresponding setting from old user to new one.
- func AcceptTransferOwnership(ctx context.Context, repo *repo_model.Repository, doer *user_model.User) error {
- releaser, err := globallock.Lock(ctx, getRepoWorkingLockKey(repo.ID))
- if err != nil {
- log.Error("lock.Lock(): %v", err)
- return fmt.Errorf("lock.Lock: %w", err)
- }
- defer releaser()
-
- repoTransfer, err := repo_model.GetPendingRepositoryTransfer(ctx, repo)
- if err != nil {
- return err
- }
-
- oldOwnerName := repo.OwnerName
-
- if err := db.WithTx(ctx, func(ctx context.Context) error {
- if err := repoTransfer.LoadAttributes(ctx); err != nil {
- return err
- }
-
- if !doer.CanCreateRepoIn(repoTransfer.Recipient) {
- limit := util.Iif(repoTransfer.Recipient.MaxRepoCreation >= 0, repoTransfer.Recipient.MaxRepoCreation, setting.Repository.MaxCreationLimit)
- return LimitReachedError{Limit: limit}
- }
-
- if !repoTransfer.CanUserAcceptOrRejectTransfer(ctx, doer) {
- return util.ErrPermissionDenied
- }
-
- if err := repo.LoadOwner(ctx); err != nil {
- return err
- }
- for _, team := range repoTransfer.Teams {
- if repoTransfer.Recipient.ID != team.OrgID {
- return fmt.Errorf("team %d does not belong to organization", team.ID)
- }
- }
-
- return transferOwnership(ctx, repoTransfer.Doer, repoTransfer.Recipient.Name, repo, repoTransfer.Teams)
- }); err != nil {
- return err
- }
- releaser()
-
- notify_service.TransferRepository(ctx, doer, repo, oldOwnerName)
-
- return nil
- }
-
- // transferOwnership transfers all corresponding repository items from old user to new one.
- func transferOwnership(ctx context.Context, doer *user_model.User, newOwnerName string, repo *repo_model.Repository, teams []*organization.Team) (err error) {
- repoRenamed := false
- wikiRenamed := false
- oldOwnerName := doer.Name
-
- defer func() {
- if !repoRenamed && !wikiRenamed {
- return
- }
-
- recoverErr := recover()
- if err == nil && recoverErr == nil {
- return
- }
-
- if repoRenamed {
- if err := util.Rename(repo_model.RepoPath(newOwnerName, repo.Name), repo_model.RepoPath(oldOwnerName, repo.Name)); err != nil {
- log.Critical("Unable to move repository %s/%s directory from %s back to correct place %s: %v", oldOwnerName, repo.Name,
- repo_model.RepoPath(newOwnerName, repo.Name), repo_model.RepoPath(oldOwnerName, repo.Name), err)
- }
- }
-
- if wikiRenamed {
- if err := util.Rename(repo_model.WikiPath(newOwnerName, repo.Name), repo_model.WikiPath(oldOwnerName, repo.Name)); err != nil {
- log.Critical("Unable to move wiki for repository %s/%s directory from %s back to correct place %s: %v", oldOwnerName, repo.Name,
- repo_model.WikiPath(newOwnerName, repo.Name), repo_model.WikiPath(oldOwnerName, repo.Name), err)
- }
- }
-
- if recoverErr != nil {
- log.Error("Panic within TransferOwnership: %v\n%s", recoverErr, log.Stack(2))
- panic(recoverErr)
- }
- }()
-
- ctx, committer, err := db.TxContext(ctx)
- if err != nil {
- return err
- }
- defer committer.Close()
-
- sess := db.GetEngine(ctx)
-
- newOwner, err := user_model.GetUserByName(ctx, newOwnerName)
- if err != nil {
- return fmt.Errorf("get new owner '%s': %w", newOwnerName, err)
- }
- newOwnerName = newOwner.Name // ensure capitalisation matches
-
- // Check if new owner has repository with same name.
- if has, err := repo_model.IsRepositoryModelOrDirExist(ctx, newOwner, repo.Name); err != nil {
- return fmt.Errorf("IsRepositoryExist: %w", err)
- } else if has {
- return repo_model.ErrRepoAlreadyExist{
- Uname: newOwnerName,
- Name: repo.Name,
- }
- }
-
- oldOwner := repo.Owner
- oldOwnerName = oldOwner.Name
-
- // Note: we have to set value here to make sure recalculate accesses is based on
- // new owner.
- repo.OwnerID = newOwner.ID
- repo.Owner = newOwner
- repo.OwnerName = newOwner.Name
-
- // Update repository.
- if err := repo_model.UpdateRepositoryColsNoAutoTime(ctx, repo, "owner_id", "owner_name"); err != nil {
- return fmt.Errorf("update owner: %w", err)
- }
-
- // Remove redundant collaborators.
- collaborators, _, err := repo_model.GetCollaborators(ctx, &repo_model.FindCollaborationOptions{RepoID: repo.ID})
- if err != nil {
- return fmt.Errorf("GetCollaborators: %w", err)
- }
-
- // Dummy object.
- collaboration := &repo_model.Collaboration{RepoID: repo.ID}
- for _, c := range collaborators {
- if c.IsGhost() {
- collaboration.ID = c.Collaboration.ID
- if _, err := sess.Delete(collaboration); err != nil {
- return fmt.Errorf("remove collaborator '%d': %w", c.ID, err)
- }
- collaboration.ID = 0
- }
-
- if c.ID != newOwner.ID {
- isMember, err := organization.IsOrganizationMember(ctx, newOwner.ID, c.ID)
- if err != nil {
- return fmt.Errorf("IsOrgMember: %w", err)
- } else if !isMember {
- continue
- }
- }
- collaboration.UserID = c.ID
- if _, err := sess.Delete(collaboration); err != nil {
- return fmt.Errorf("remove collaborator '%d': %w", c.ID, err)
- }
- collaboration.UserID = 0
- }
-
- if oldOwner.IsOrganization() {
- // Remove old team-repository relations.
- if err := organization.RemoveOrgRepo(ctx, oldOwner.ID, repo.ID); err != nil {
- return fmt.Errorf("removeOrgRepo: %w", err)
- }
-
- // Remove project's issues that belong to old organization's projects
- projects, err := project_model.GetAllProjectsIDsByOwnerIDAndType(ctx, oldOwner.ID, project_model.TypeOrganization)
- if err != nil {
- return fmt.Errorf("Unable to find old org projects: %w", err)
- }
- issues, err := issues_model.GetIssueIDsByRepoID(ctx, repo.ID)
- if err != nil {
- return fmt.Errorf("Unable to find repo's issues: %w", err)
- }
- err = project_model.DeleteAllProjectIssueByIssueIDsAndProjectIDs(ctx, issues, projects)
- if err != nil {
- return fmt.Errorf("Unable to delete project's issues: %w", err)
- }
- }
-
- if newOwner.IsOrganization() {
- teams, err := organization.FindOrgTeams(ctx, newOwner.ID)
- if err != nil {
- return fmt.Errorf("LoadTeams: %w", err)
- }
- for _, t := range teams {
- if t.IncludesAllRepositories {
- if err := addRepositoryToTeam(ctx, t, repo); err != nil {
- return fmt.Errorf("AddRepository: %w", err)
- }
- }
- }
- } else if err := access_model.RecalculateAccesses(ctx, repo); err != nil {
- // Organization called this in addRepository method.
- return fmt.Errorf("recalculateAccesses: %w", err)
- }
-
- // Update repository count.
- if _, err := sess.Exec("UPDATE `user` SET num_repos=num_repos+1 WHERE id=?", newOwner.ID); err != nil {
- return fmt.Errorf("increase new owner repository count: %w", err)
- } else if _, err := sess.Exec("UPDATE `user` SET num_repos=num_repos-1 WHERE id=?", oldOwner.ID); err != nil {
- return fmt.Errorf("decrease old owner repository count: %w", err)
- }
-
- if err := repo_model.WatchRepo(ctx, doer, repo, true); err != nil {
- return fmt.Errorf("watchRepo: %w", err)
- }
-
- if oldOwner.IsOrganization() {
- // Remove watch for organization.
- if err := repo_model.WatchRepo(ctx, oldOwner, repo, false); err != nil {
- return fmt.Errorf("watchRepo [false]: %w", err)
- }
-
- // Delete labels that belong to the old organization and comments that added these labels
- if _, err := sess.Exec(`DELETE FROM issue_label WHERE issue_label.id IN (
- SELECT il_too.id FROM (
- SELECT il_too_too.id
- FROM issue_label AS il_too_too
- INNER JOIN label ON il_too_too.label_id = label.id
- INNER JOIN issue on issue.id = il_too_too.issue_id
- WHERE
- issue.repo_id = ? AND ((label.org_id = 0 AND issue.repo_id != label.repo_id) OR (label.repo_id = 0 AND label.org_id != ?))
- ) AS il_too )`, repo.ID, newOwner.ID); err != nil {
- return fmt.Errorf("Unable to remove old org labels: %w", err)
- }
-
- if _, err := sess.Exec(`DELETE FROM comment WHERE comment.id IN (
- SELECT il_too.id FROM (
- SELECT com.id
- FROM comment AS com
- INNER JOIN label ON com.label_id = label.id
- INNER JOIN issue ON issue.id = com.issue_id
- WHERE
- com.type = ? AND issue.repo_id = ? AND ((label.org_id = 0 AND issue.repo_id != label.repo_id) OR (label.repo_id = 0 AND label.org_id != ?))
- ) AS il_too)`, issues_model.CommentTypeLabel, repo.ID, newOwner.ID); err != nil {
- return fmt.Errorf("Unable to remove old org label comments: %w", err)
- }
- }
-
- // Rename remote repository to new path and delete local copy.
- dir := user_model.UserPath(newOwner.Name)
- if err := os.MkdirAll(dir, os.ModePerm); err != nil {
- return fmt.Errorf("Failed to create dir %s: %w", dir, err)
- }
-
- if err := util.Rename(repo_model.RepoPath(oldOwner.Name, repo.Name), repo_model.RepoPath(newOwner.Name, repo.Name)); err != nil {
- return fmt.Errorf("rename repository directory: %w", err)
- }
- repoRenamed = true
-
- // Rename remote wiki repository to new path and delete local copy.
- wikiPath := repo_model.WikiPath(oldOwner.Name, repo.Name)
- if isExist, err := util.IsExist(wikiPath); err != nil {
- log.Error("Unable to check if %s exists. Error: %v", wikiPath, err)
- return err
- } else if isExist {
- if err := util.Rename(wikiPath, repo_model.WikiPath(newOwner.Name, repo.Name)); err != nil {
- return fmt.Errorf("rename repository wiki: %w", err)
- }
- wikiRenamed = true
- }
-
- if err := repo_model.DeleteRepositoryTransfer(ctx, repo.ID); err != nil {
- return fmt.Errorf("deleteRepositoryTransfer: %w", err)
- }
- repo.Status = repo_model.RepositoryReady
- if err := repo_model.UpdateRepositoryColsNoAutoTime(ctx, repo, "status"); err != nil {
- return err
- }
-
- // If there was previously a redirect at this location, remove it.
- if err := repo_model.DeleteRedirect(ctx, newOwner.ID, repo.Name); err != nil {
- return fmt.Errorf("delete repo redirect: %w", err)
- }
-
- if err := repo_model.NewRedirect(ctx, oldOwner.ID, repo.ID, repo.Name, repo.Name); err != nil {
- return fmt.Errorf("repo_model.NewRedirect: %w", err)
- }
-
- newRepo, err := repo_model.GetRepositoryByID(ctx, repo.ID)
- if err != nil {
- return err
- }
-
- for _, team := range teams {
- if err := addRepositoryToTeam(ctx, team, newRepo); err != nil {
- return err
- }
- }
-
- return committer.Commit()
- }
-
- // changeRepositoryName changes all corresponding setting from old repository name to new one.
- func changeRepositoryName(ctx context.Context, repo *repo_model.Repository, newRepoName string) (err error) {
- oldRepoName := repo.Name
- newRepoName = strings.ToLower(newRepoName)
- if err = repo_model.IsUsableRepoName(newRepoName); err != nil {
- return err
- }
-
- if err := repo.LoadOwner(ctx); err != nil {
- return err
- }
-
- has, err := repo_model.IsRepositoryModelOrDirExist(ctx, repo.Owner, newRepoName)
- if err != nil {
- return fmt.Errorf("IsRepositoryExist: %w", err)
- } else if has {
- return repo_model.ErrRepoAlreadyExist{
- Uname: repo.OwnerName,
- Name: newRepoName,
- }
- }
-
- if err = gitrepo.RenameRepository(ctx, repo,
- repo_model.StorageRepo(repo_model.RelativePath(repo.OwnerName, newRepoName))); err != nil {
- return fmt.Errorf("rename repository directory: %w", err)
- }
-
- if HasWiki(ctx, repo) {
- if err = gitrepo.RenameRepository(ctx, repo.WikiStorageRepo(), repo_model.StorageRepo(
- repo_model.RelativeWikiPath(repo.OwnerName, newRepoName))); err != nil {
- return fmt.Errorf("rename repository wiki: %w", err)
- }
- }
-
- return db.WithTx(ctx, func(ctx context.Context) error {
- return repo_model.NewRedirect(ctx, repo.Owner.ID, repo.ID, oldRepoName, newRepoName)
- })
- }
-
- // ChangeRepositoryName changes all corresponding setting from old repository name to new one.
- func ChangeRepositoryName(ctx context.Context, doer *user_model.User, repo *repo_model.Repository, newRepoName string) error {
- log.Trace("ChangeRepositoryName: %s/%s -> %s", doer.Name, repo.Name, newRepoName)
-
- oldRepoName := repo.Name
-
- // Change repository directory name. We must lock the local copy of the
- // repo so that we can automatically rename the repo path and updates the
- // local copy's origin accordingly.
-
- releaser, err := globallock.Lock(ctx, getRepoWorkingLockKey(repo.ID))
- if err != nil {
- log.Error("lock.Lock(): %v", err)
- return fmt.Errorf("lock.Lock: %w", err)
- }
- defer releaser()
-
- if err := changeRepositoryName(ctx, repo, newRepoName); err != nil {
- return err
- }
- releaser()
-
- repo.Name = newRepoName
- notify_service.RenameRepository(ctx, doer, repo, oldRepoName)
-
- return nil
- }
-
- // StartRepositoryTransfer transfer a repo from one owner to a new one.
- // it make repository into pending transfer state, if doer can not create repo for new owner.
- func StartRepositoryTransfer(ctx context.Context, doer, newOwner *user_model.User, repo *repo_model.Repository, teams []*organization.Team) error {
- releaser, err := globallock.Lock(ctx, getRepoWorkingLockKey(repo.ID))
- if err != nil {
- return fmt.Errorf("lock.Lock: %w", err)
- }
- defer releaser()
-
- if err := repo_model.TestRepositoryReadyForTransfer(repo.Status); err != nil {
- return err
- }
-
- if !doer.CanForkRepoIn(newOwner) {
- limit := util.Iif(newOwner.MaxRepoCreation >= 0, newOwner.MaxRepoCreation, setting.Repository.MaxCreationLimit)
- return LimitReachedError{Limit: limit}
- }
-
- var isDirectTransfer bool
- oldOwnerName := repo.OwnerName
-
- if err := db.WithTx(ctx, func(ctx context.Context) error {
- // Admin is always allowed to transfer || user transfer repo back to his account,
- // then it will transfer directly without acceptance.
- if doer.IsAdmin || doer.ID == newOwner.ID {
- isDirectTransfer = true
- return transferOwnership(ctx, doer, newOwner.Name, repo, teams)
- }
-
- if user_model.IsUserBlockedBy(ctx, doer, newOwner.ID) {
- return user_model.ErrBlockedUser
- }
-
- // If new owner is an org and user can create repos he can transfer directly too
- if newOwner.IsOrganization() {
- allowed, err := organization.CanCreateOrgRepo(ctx, newOwner.ID, doer.ID)
- if err != nil {
- return err
- }
- if allowed {
- isDirectTransfer = true
- return transferOwnership(ctx, doer, newOwner.Name, repo, teams)
- }
- }
-
- // In case the new owner would not have sufficient access to the repo, give access rights for read
- hasAccess, err := access_model.HasAnyUnitAccess(ctx, newOwner.ID, repo)
- if err != nil {
- return err
- }
- if !hasAccess {
- if err := AddOrUpdateCollaborator(ctx, repo, newOwner, perm.AccessModeRead); err != nil {
- return err
- }
- }
-
- // Make repo as pending for transfer
- repo.Status = repo_model.RepositoryPendingTransfer
- return repo_model.CreatePendingRepositoryTransfer(ctx, doer, newOwner, repo.ID, teams)
- }); err != nil {
- return err
- }
-
- if isDirectTransfer {
- notify_service.TransferRepository(ctx, doer, repo, oldOwnerName)
- } else {
- // notify users who are able to accept / reject transfer
- notify_service.RepoPendingTransfer(ctx, doer, newOwner, repo)
- }
-
- return nil
- }
-
- // RejectRepositoryTransfer marks the repository as ready and remove pending transfer entry,
- // thus cancel the transfer process.
- // The accepter can reject the transfer.
- func RejectRepositoryTransfer(ctx context.Context, repo *repo_model.Repository, doer *user_model.User) error {
- return db.WithTx(ctx, func(ctx context.Context) error {
- repoTransfer, err := repo_model.GetPendingRepositoryTransfer(ctx, repo)
- if err != nil {
- return err
- }
-
- if err := repoTransfer.LoadAttributes(ctx); err != nil {
- return err
- }
-
- if !repoTransfer.CanUserAcceptOrRejectTransfer(ctx, doer) {
- return util.ErrPermissionDenied
- }
-
- repo.Status = repo_model.RepositoryReady
- if err := repo_model.UpdateRepositoryColsNoAutoTime(ctx, repo, "status"); err != nil {
- return err
- }
-
- return repo_model.DeleteRepositoryTransfer(ctx, repo.ID)
- })
- }
-
- func canUserCancelTransfer(ctx context.Context, r *repo_model.RepoTransfer, u *user_model.User) bool {
- if u.IsAdmin || u.ID == r.DoerID {
- return true
- }
-
- if err := r.LoadAttributes(ctx); err != nil {
- log.Error("LoadAttributes: %v", err)
- return false
- }
-
- if err := r.Repo.LoadOwner(ctx); err != nil {
- log.Error("LoadOwner: %v", err)
- return false
- }
-
- if !r.Repo.Owner.IsOrganization() {
- return r.Repo.OwnerID == u.ID
- }
-
- perm, err := access_model.GetUserRepoPermission(ctx, r.Repo, u)
- if err != nil {
- log.Error("GetUserRepoPermission: %v", err)
- return false
- }
- return perm.IsOwner()
- }
-
- // CancelRepositoryTransfer cancels the repository transfer process. The sender or
- // the users who have admin permission of the original repository can cancel the transfer
- func CancelRepositoryTransfer(ctx context.Context, repoTransfer *repo_model.RepoTransfer, doer *user_model.User) error {
- return db.WithTx(ctx, func(ctx context.Context) error {
- if err := repoTransfer.LoadAttributes(ctx); err != nil {
- return err
- }
-
- if !canUserCancelTransfer(ctx, repoTransfer, doer) {
- return util.ErrPermissionDenied
- }
-
- repoTransfer.Repo.Status = repo_model.RepositoryReady
- if err := repo_model.UpdateRepositoryColsNoAutoTime(ctx, repoTransfer.Repo, "status"); err != nil {
- return err
- }
-
- return repo_model.DeleteRepositoryTransfer(ctx, repoTransfer.RepoID)
- })
- }
|