// Copyright 2023 Harness, Inc. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package repo import ( "context" "fmt" "github.com/harness/gitness/app/api/controller" "github.com/harness/gitness/app/api/usererror" "github.com/harness/gitness/app/auth" "github.com/harness/gitness/app/services/protection" "github.com/harness/gitness/git" "github.com/harness/gitness/types" "github.com/harness/gitness/types/enum" ) // DeleteBranch deletes a repo branch. func (c *Controller) DeleteBranch(ctx context.Context, session *auth.Session, repoRef string, branchName string, bypassRules, dryRunRules bool, ) (types.DeleteBranchOutput, []types.RuleViolations, error) { repo, err := c.getRepoCheckAccess(ctx, session, repoRef, enum.PermissionRepoPush) if err != nil { return types.DeleteBranchOutput{}, nil, err } // make sure user isn't deleting the default branch // ASSUMPTION: lower layer calls explicit branch api // and 'refs/heads/branch1' would fail if 'branch1' exists. // TODO: Add functional test to ensure the scenario is covered! if branchName == repo.DefaultBranch { return types.DeleteBranchOutput{}, nil, usererror.ErrDefaultBranchCantBeDeleted } rules, isRepoOwner, err := c.fetchRules(ctx, session, repo) if err != nil { return types.DeleteBranchOutput{}, nil, err } violations, err := rules.RefChangeVerify(ctx, protection.RefChangeVerifyInput{ Actor: &session.Principal, AllowBypass: bypassRules, IsRepoOwner: isRepoOwner, Repo: repo, RefAction: protection.RefActionDelete, RefType: protection.RefTypeBranch, RefNames: []string{branchName}, }) if err != nil { return types.DeleteBranchOutput{}, nil, fmt.Errorf("failed to verify protection rules: %w", err) } if dryRunRules { return types.DeleteBranchOutput{ DryRunRulesOutput: types.DryRunRulesOutput{ DryRunRules: true, RuleViolations: violations, }, }, nil, nil } if protection.IsCritical(violations) { return types.DeleteBranchOutput{}, violations, nil } writeParams, err := controller.CreateRPCInternalWriteParams(ctx, c.urlProvider, session, repo) if err != nil { return types.DeleteBranchOutput{}, nil, fmt.Errorf("failed to create RPC write params: %w", err) } err = c.git.DeleteBranch(ctx, &git.DeleteBranchParams{ WriteParams: writeParams, BranchName: branchName, }) if err != nil { return types.DeleteBranchOutput{}, nil, err } return types.DeleteBranchOutput{ DryRunRulesOutput: types.DryRunRulesOutput{ RuleViolations: violations, }}, nil, nil }