mirror of https://github.com/gogs/gogs.git
784 lines
26 KiB
Go
784 lines
26 KiB
Go
// Copyright 2014 The Gogs Authors. All rights reserved.
|
|
// Use of this source code is governed by a MIT-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"fmt"
|
|
"io"
|
|
"net"
|
|
"net/http"
|
|
"net/http/fcgi"
|
|
"os"
|
|
"path/filepath"
|
|
"strings"
|
|
|
|
"github.com/go-macaron/binding"
|
|
"github.com/go-macaron/cache"
|
|
"github.com/go-macaron/captcha"
|
|
"github.com/go-macaron/csrf"
|
|
"github.com/go-macaron/gzip"
|
|
"github.com/go-macaron/i18n"
|
|
"github.com/go-macaron/session"
|
|
"github.com/go-macaron/toolbox"
|
|
"github.com/prometheus/client_golang/prometheus/promhttp"
|
|
"github.com/unknwon/com"
|
|
"github.com/urfave/cli"
|
|
"gopkg.in/macaron.v1"
|
|
log "unknwon.dev/clog/v2"
|
|
|
|
embedConf "gogs.io/gogs/conf"
|
|
"gogs.io/gogs/internal/app"
|
|
"gogs.io/gogs/internal/conf"
|
|
"gogs.io/gogs/internal/context"
|
|
"gogs.io/gogs/internal/database"
|
|
"gogs.io/gogs/internal/form"
|
|
"gogs.io/gogs/internal/osutil"
|
|
"gogs.io/gogs/internal/route"
|
|
"gogs.io/gogs/internal/route/admin"
|
|
apiv1 "gogs.io/gogs/internal/route/api/v1"
|
|
"gogs.io/gogs/internal/route/dev"
|
|
"gogs.io/gogs/internal/route/lfs"
|
|
"gogs.io/gogs/internal/route/org"
|
|
"gogs.io/gogs/internal/route/repo"
|
|
"gogs.io/gogs/internal/route/user"
|
|
"gogs.io/gogs/internal/template"
|
|
"gogs.io/gogs/public"
|
|
"gogs.io/gogs/templates"
|
|
)
|
|
|
|
var Web = cli.Command{
|
|
Name: "web",
|
|
Usage: "Start web server",
|
|
Description: `Gogs web server is the only thing you need to run,
|
|
and it takes care of all the other things for you`,
|
|
Action: runWeb,
|
|
Flags: []cli.Flag{
|
|
stringFlag("port, p", "3000", "Temporary port number to prevent conflict"),
|
|
stringFlag("config, c", "", "Custom configuration file path"),
|
|
},
|
|
}
|
|
|
|
// newMacaron initializes Macaron instance.
|
|
func newMacaron() *macaron.Macaron {
|
|
m := macaron.New()
|
|
if !conf.Server.DisableRouterLog {
|
|
m.Use(macaron.Logger())
|
|
}
|
|
m.Use(macaron.Recovery())
|
|
if conf.Server.EnableGzip {
|
|
m.Use(gzip.Gziper())
|
|
}
|
|
if conf.Server.Protocol == "fcgi" {
|
|
m.SetURLPrefix(conf.Server.Subpath)
|
|
}
|
|
|
|
// Register custom middleware first to make it possible to override files under "public".
|
|
m.Use(macaron.Static(
|
|
filepath.Join(conf.CustomDir(), "public"),
|
|
macaron.StaticOptions{
|
|
SkipLogging: conf.Server.DisableRouterLog,
|
|
},
|
|
))
|
|
var publicFs http.FileSystem
|
|
if !conf.Server.LoadAssetsFromDisk {
|
|
publicFs = http.FS(public.Files)
|
|
}
|
|
m.Use(macaron.Static(
|
|
filepath.Join(conf.WorkDir(), "public"),
|
|
macaron.StaticOptions{
|
|
ETag: true,
|
|
SkipLogging: conf.Server.DisableRouterLog,
|
|
FileSystem: publicFs,
|
|
},
|
|
))
|
|
|
|
m.Use(macaron.Static(
|
|
conf.Picture.AvatarUploadPath,
|
|
macaron.StaticOptions{
|
|
ETag: true,
|
|
Prefix: conf.UsersAvatarPathPrefix,
|
|
SkipLogging: conf.Server.DisableRouterLog,
|
|
},
|
|
))
|
|
m.Use(macaron.Static(
|
|
conf.Picture.RepositoryAvatarUploadPath,
|
|
macaron.StaticOptions{
|
|
ETag: true,
|
|
Prefix: database.REPO_AVATAR_URL_PREFIX,
|
|
SkipLogging: conf.Server.DisableRouterLog,
|
|
},
|
|
))
|
|
|
|
customDir := filepath.Join(conf.CustomDir(), "templates")
|
|
renderOpt := macaron.RenderOptions{
|
|
Directory: filepath.Join(conf.WorkDir(), "templates"),
|
|
AppendDirectories: []string{customDir},
|
|
Funcs: template.FuncMap(),
|
|
IndentJSON: macaron.Env != macaron.PROD,
|
|
}
|
|
if !conf.Server.LoadAssetsFromDisk {
|
|
renderOpt.TemplateFileSystem = templates.NewTemplateFileSystem("", customDir)
|
|
}
|
|
m.Use(macaron.Renderer(renderOpt))
|
|
|
|
localeNames, err := embedConf.FileNames("locale")
|
|
if err != nil {
|
|
log.Fatal("Failed to list locale files: %v", err)
|
|
}
|
|
localeFiles := make(map[string][]byte)
|
|
for _, name := range localeNames {
|
|
localeFiles[name], err = embedConf.Files.ReadFile("locale/" + name)
|
|
if err != nil {
|
|
log.Fatal("Failed to read locale file %q: %v", name, err)
|
|
}
|
|
}
|
|
m.Use(i18n.I18n(i18n.Options{
|
|
SubURL: conf.Server.Subpath,
|
|
Files: localeFiles,
|
|
CustomDirectory: filepath.Join(conf.CustomDir(), "conf", "locale"),
|
|
Langs: conf.I18n.Langs,
|
|
Names: conf.I18n.Names,
|
|
DefaultLang: "en-US",
|
|
Redirect: true,
|
|
}))
|
|
m.Use(cache.Cacher(cache.Options{
|
|
Adapter: conf.Cache.Adapter,
|
|
AdapterConfig: conf.Cache.Host,
|
|
Interval: conf.Cache.Interval,
|
|
}))
|
|
m.Use(captcha.Captchaer(captcha.Options{
|
|
SubURL: conf.Server.Subpath,
|
|
}))
|
|
m.Use(toolbox.Toolboxer(m, toolbox.Options{
|
|
HealthCheckFuncs: []*toolbox.HealthCheckFuncDesc{
|
|
{
|
|
Desc: "Database connection",
|
|
Func: database.Ping,
|
|
},
|
|
},
|
|
}))
|
|
return m
|
|
}
|
|
|
|
func runWeb(c *cli.Context) error {
|
|
err := route.GlobalInit(c.String("config"))
|
|
if err != nil {
|
|
log.Fatal("Failed to initialize application: %v", err)
|
|
}
|
|
|
|
m := newMacaron()
|
|
|
|
reqSignIn := context.Toggle(&context.ToggleOptions{SignInRequired: true})
|
|
ignSignIn := context.Toggle(&context.ToggleOptions{SignInRequired: conf.Auth.RequireSigninView})
|
|
reqSignOut := context.Toggle(&context.ToggleOptions{SignOutRequired: true})
|
|
|
|
bindIgnErr := binding.BindIgnErr
|
|
|
|
m.SetAutoHead(true)
|
|
|
|
m.Group("", func() {
|
|
m.Get("/", ignSignIn, route.Home)
|
|
m.Group("/explore", func() {
|
|
m.Get("", func(c *context.Context) {
|
|
c.Redirect(conf.Server.Subpath + "/explore/repos")
|
|
})
|
|
m.Get("/repos", route.ExploreRepos)
|
|
m.Get("/users", route.ExploreUsers)
|
|
m.Get("/organizations", route.ExploreOrganizations)
|
|
}, ignSignIn)
|
|
m.Combo("/install", route.InstallInit).Get(route.Install).
|
|
Post(bindIgnErr(form.Install{}), route.InstallPost)
|
|
m.Get("/^:type(issues|pulls)$", reqSignIn, user.Issues)
|
|
|
|
// ***** START: User *****
|
|
m.Group("/user", func() {
|
|
m.Group("/login", func() {
|
|
m.Combo("").Get(user.Login).
|
|
Post(bindIgnErr(form.SignIn{}), user.LoginPost)
|
|
m.Combo("/two_factor").Get(user.LoginTwoFactor).Post(user.LoginTwoFactorPost)
|
|
m.Combo("/two_factor_recovery_code").Get(user.LoginTwoFactorRecoveryCode).Post(user.LoginTwoFactorRecoveryCodePost)
|
|
})
|
|
|
|
m.Get("/sign_up", user.SignUp)
|
|
m.Post("/sign_up", bindIgnErr(form.Register{}), user.SignUpPost)
|
|
m.Get("/reset_password", user.ResetPasswd)
|
|
m.Post("/reset_password", user.ResetPasswdPost)
|
|
}, reqSignOut)
|
|
|
|
m.Group("/user/settings", func() {
|
|
m.Get("", user.Settings)
|
|
m.Post("", bindIgnErr(form.UpdateProfile{}), user.SettingsPost)
|
|
m.Combo("/avatar").Get(user.SettingsAvatar).
|
|
Post(binding.MultipartForm(form.Avatar{}), user.SettingsAvatarPost)
|
|
m.Post("/avatar/delete", user.SettingsDeleteAvatar)
|
|
m.Combo("/email").Get(user.SettingsEmails).
|
|
Post(bindIgnErr(form.AddEmail{}), user.SettingsEmailPost)
|
|
m.Post("/email/delete", user.DeleteEmail)
|
|
m.Get("/password", user.SettingsPassword)
|
|
m.Post("/password", bindIgnErr(form.ChangePassword{}), user.SettingsPasswordPost)
|
|
m.Combo("/ssh").Get(user.SettingsSSHKeys).
|
|
Post(bindIgnErr(form.AddSSHKey{}), user.SettingsSSHKeysPost)
|
|
m.Post("/ssh/delete", user.DeleteSSHKey)
|
|
m.Group("/security", func() {
|
|
m.Get("", user.SettingsSecurity)
|
|
m.Combo("/two_factor_enable").Get(user.SettingsTwoFactorEnable).
|
|
Post(user.SettingsTwoFactorEnablePost)
|
|
m.Combo("/two_factor_recovery_codes").Get(user.SettingsTwoFactorRecoveryCodes).
|
|
Post(user.SettingsTwoFactorRecoveryCodesPost)
|
|
m.Post("/two_factor_disable", user.SettingsTwoFactorDisable)
|
|
})
|
|
m.Group("/repositories", func() {
|
|
m.Get("", user.SettingsRepos)
|
|
m.Post("/leave", user.SettingsLeaveRepo)
|
|
})
|
|
m.Group("/organizations", func() {
|
|
m.Get("", user.SettingsOrganizations)
|
|
m.Post("/leave", user.SettingsLeaveOrganization)
|
|
})
|
|
|
|
settingsHandler := user.NewSettingsHandler(user.NewSettingsStore())
|
|
m.Combo("/applications").Get(settingsHandler.Applications()).
|
|
Post(bindIgnErr(form.NewAccessToken{}), settingsHandler.ApplicationsPost())
|
|
m.Post("/applications/delete", settingsHandler.DeleteApplication())
|
|
m.Route("/delete", "GET,POST", user.SettingsDelete)
|
|
}, reqSignIn, func(c *context.Context) {
|
|
c.Data["PageIsUserSettings"] = true
|
|
})
|
|
|
|
m.Group("/user", func() {
|
|
m.Any("/activate", user.Activate)
|
|
m.Any("/activate_email", user.ActivateEmail)
|
|
m.Get("/email2user", user.Email2User)
|
|
m.Get("/forget_password", user.ForgotPasswd)
|
|
m.Post("/forget_password", user.ForgotPasswdPost)
|
|
m.Post("/logout", user.SignOut)
|
|
})
|
|
// ***** END: User *****
|
|
|
|
reqAdmin := context.Toggle(&context.ToggleOptions{SignInRequired: true, AdminRequired: true})
|
|
|
|
// ***** START: Admin *****
|
|
m.Group("/admin", func() {
|
|
m.Combo("").Get(admin.Dashboard).Post(admin.Operation) // "/admin"
|
|
m.Get("/config", admin.Config)
|
|
m.Post("/config/test_mail", admin.SendTestMail)
|
|
m.Get("/monitor", admin.Monitor)
|
|
|
|
m.Group("/users", func() {
|
|
m.Get("", admin.Users)
|
|
m.Combo("/new").Get(admin.NewUser).Post(bindIgnErr(form.AdminCrateUser{}), admin.NewUserPost)
|
|
m.Combo("/:userid").Get(admin.EditUser).Post(bindIgnErr(form.AdminEditUser{}), admin.EditUserPost)
|
|
m.Post("/:userid/delete", admin.DeleteUser)
|
|
})
|
|
|
|
m.Group("/orgs", func() {
|
|
m.Get("", admin.Organizations)
|
|
})
|
|
|
|
m.Group("/repos", func() {
|
|
m.Get("", admin.Repos)
|
|
m.Post("/delete", admin.DeleteRepo)
|
|
})
|
|
|
|
m.Group("/auths", func() {
|
|
m.Get("", admin.Authentications)
|
|
m.Combo("/new").Get(admin.NewAuthSource).Post(bindIgnErr(form.Authentication{}), admin.NewAuthSourcePost)
|
|
m.Combo("/:authid").Get(admin.EditAuthSource).
|
|
Post(bindIgnErr(form.Authentication{}), admin.EditAuthSourcePost)
|
|
m.Post("/:authid/delete", admin.DeleteAuthSource)
|
|
})
|
|
|
|
m.Group("/notices", func() {
|
|
m.Get("", admin.Notices)
|
|
m.Post("/delete", admin.DeleteNotices)
|
|
m.Get("/empty", admin.EmptyNotices)
|
|
})
|
|
}, reqAdmin)
|
|
// ***** END: Admin *****
|
|
|
|
m.Group("", func() {
|
|
m.Group("/:username", func() {
|
|
m.Get("", user.Profile)
|
|
m.Get("/followers", user.Followers)
|
|
m.Get("/following", user.Following)
|
|
m.Get("/stars", user.Stars)
|
|
}, context.InjectParamsUser())
|
|
|
|
m.Get("/attachments/:uuid", func(c *context.Context) {
|
|
attach, err := database.GetAttachmentByUUID(c.Params(":uuid"))
|
|
if err != nil {
|
|
c.NotFoundOrError(err, "get attachment by UUID")
|
|
return
|
|
} else if !com.IsFile(attach.LocalPath()) {
|
|
c.NotFound()
|
|
return
|
|
}
|
|
|
|
fr, err := os.Open(attach.LocalPath())
|
|
if err != nil {
|
|
c.Error(err, "open attachment file")
|
|
return
|
|
}
|
|
defer fr.Close()
|
|
|
|
c.Header().Set("Content-Security-Policy", "default-src 'none'; style-src 'unsafe-inline'; sandbox")
|
|
c.Header().Set("Cache-Control", "public,max-age=86400")
|
|
c.Header().Set("Content-Disposition", fmt.Sprintf(`inline; filename="%s"`, attach.Name))
|
|
|
|
if _, err = io.Copy(c.Resp, fr); err != nil {
|
|
c.Error(err, "copy from file to response")
|
|
return
|
|
}
|
|
})
|
|
m.Post("/issues/attachments", repo.UploadIssueAttachment)
|
|
m.Post("/releases/attachments", repo.UploadReleaseAttachment)
|
|
}, ignSignIn)
|
|
|
|
m.Group("/:username", func() {
|
|
m.Post("/action/:action", user.Action)
|
|
}, reqSignIn, context.InjectParamsUser())
|
|
|
|
if macaron.Env == macaron.DEV {
|
|
m.Get("/template/*", dev.TemplatePreview)
|
|
}
|
|
|
|
reqRepoAdmin := context.RequireRepoAdmin()
|
|
reqRepoWriter := context.RequireRepoWriter()
|
|
|
|
webhookRoutes := func() {
|
|
m.Group("", func() {
|
|
m.Get("", repo.Webhooks)
|
|
m.Post("/delete", repo.DeleteWebhook)
|
|
m.Get("/:type/new", repo.WebhooksNew)
|
|
m.Post("/gogs/new", bindIgnErr(form.NewWebhook{}), repo.WebhooksNewPost)
|
|
m.Post("/slack/new", bindIgnErr(form.NewSlackHook{}), repo.WebhooksSlackNewPost)
|
|
m.Post("/discord/new", bindIgnErr(form.NewDiscordHook{}), repo.WebhooksDiscordNewPost)
|
|
m.Post("/dingtalk/new", bindIgnErr(form.NewDingtalkHook{}), repo.WebhooksDingtalkNewPost)
|
|
m.Get("/:id", repo.WebhooksEdit)
|
|
m.Post("/gogs/:id", bindIgnErr(form.NewWebhook{}), repo.WebhooksEditPost)
|
|
m.Post("/slack/:id", bindIgnErr(form.NewSlackHook{}), repo.WebhooksSlackEditPost)
|
|
m.Post("/discord/:id", bindIgnErr(form.NewDiscordHook{}), repo.WebhooksDiscordEditPost)
|
|
m.Post("/dingtalk/:id", bindIgnErr(form.NewDingtalkHook{}), repo.WebhooksDingtalkEditPost)
|
|
}, repo.InjectOrgRepoContext())
|
|
}
|
|
|
|
// ***** START: Organization *****
|
|
m.Group("/org", func() {
|
|
m.Group("", func() {
|
|
m.Get("/create", org.Create)
|
|
m.Post("/create", bindIgnErr(form.CreateOrg{}), org.CreatePost)
|
|
}, func(c *context.Context) {
|
|
if !c.User.CanCreateOrganization() {
|
|
c.NotFound()
|
|
}
|
|
})
|
|
|
|
m.Group("/:org", func() {
|
|
m.Get("/dashboard", user.Dashboard)
|
|
m.Get("/^:type(issues|pulls)$", user.Issues)
|
|
m.Get("/members", org.Members)
|
|
m.Get("/members/action/:action", org.MembersAction)
|
|
|
|
m.Get("/teams", org.Teams)
|
|
}, context.OrgAssignment(true))
|
|
|
|
m.Group("/:org", func() {
|
|
m.Get("/teams/:team", org.TeamMembers)
|
|
m.Get("/teams/:team/repositories", org.TeamRepositories)
|
|
m.Route("/teams/:team/action/:action", "GET,POST", org.TeamsAction)
|
|
m.Route("/teams/:team/action/repo/:action", "GET,POST", org.TeamsRepoAction)
|
|
}, context.OrgAssignment(true, false, true))
|
|
|
|
m.Group("/:org", func() {
|
|
m.Get("/teams/new", org.NewTeam)
|
|
m.Post("/teams/new", bindIgnErr(form.CreateTeam{}), org.NewTeamPost)
|
|
m.Get("/teams/:team/edit", org.EditTeam)
|
|
m.Post("/teams/:team/edit", bindIgnErr(form.CreateTeam{}), org.EditTeamPost)
|
|
m.Post("/teams/:team/delete", org.DeleteTeam)
|
|
|
|
m.Group("/settings", func() {
|
|
m.Combo("").Get(org.Settings).
|
|
Post(bindIgnErr(form.UpdateOrgSetting{}), org.SettingsPost)
|
|
m.Post("/avatar", binding.MultipartForm(form.Avatar{}), org.SettingsAvatar)
|
|
m.Post("/avatar/delete", org.SettingsDeleteAvatar)
|
|
m.Group("/hooks", webhookRoutes)
|
|
m.Route("/delete", "GET,POST", org.SettingsDelete)
|
|
})
|
|
|
|
m.Route("/invitations/new", "GET,POST", org.Invitation)
|
|
}, context.OrgAssignment(true, true))
|
|
}, reqSignIn)
|
|
// ***** END: Organization *****
|
|
|
|
// ***** START: Repository *****
|
|
m.Group("/repo", func() {
|
|
m.Get("/create", repo.Create)
|
|
m.Post("/create", bindIgnErr(form.CreateRepo{}), repo.CreatePost)
|
|
m.Get("/migrate", repo.Migrate)
|
|
m.Post("/migrate", bindIgnErr(form.MigrateRepo{}), repo.MigratePost)
|
|
m.Combo("/fork/:repoid").Get(repo.Fork).
|
|
Post(bindIgnErr(form.CreateRepo{}), repo.ForkPost)
|
|
}, reqSignIn)
|
|
|
|
m.Group("/:username/:reponame", func() {
|
|
m.Group("/settings", func() {
|
|
m.Combo("").Get(repo.Settings).
|
|
Post(bindIgnErr(form.RepoSetting{}), repo.SettingsPost)
|
|
m.Combo("/avatar").Get(repo.SettingsAvatar).
|
|
Post(binding.MultipartForm(form.Avatar{}), repo.SettingsAvatarPost)
|
|
m.Post("/avatar/delete", repo.SettingsDeleteAvatar)
|
|
m.Group("/collaboration", func() {
|
|
m.Combo("").Get(repo.SettingsCollaboration).Post(repo.SettingsCollaborationPost)
|
|
m.Post("/access_mode", repo.ChangeCollaborationAccessMode)
|
|
m.Post("/delete", repo.DeleteCollaboration)
|
|
})
|
|
m.Group("/branches", func() {
|
|
m.Get("", repo.SettingsBranches)
|
|
m.Post("/default_branch", repo.UpdateDefaultBranch)
|
|
m.Combo("/*").Get(repo.SettingsProtectedBranch).
|
|
Post(bindIgnErr(form.ProtectBranch{}), repo.SettingsProtectedBranchPost)
|
|
}, func(c *context.Context) {
|
|
if c.Repo.Repository.IsMirror {
|
|
c.NotFound()
|
|
return
|
|
}
|
|
})
|
|
|
|
m.Group("/hooks", func() {
|
|
webhookRoutes()
|
|
|
|
m.Group("/:id", func() {
|
|
m.Post("/test", repo.TestWebhook)
|
|
m.Post("/redelivery", repo.RedeliveryWebhook)
|
|
})
|
|
|
|
m.Group("/git", func() {
|
|
m.Get("", repo.SettingsGitHooks)
|
|
m.Combo("/:name").Get(repo.SettingsGitHooksEdit).
|
|
Post(repo.SettingsGitHooksEditPost)
|
|
}, context.GitHookService())
|
|
})
|
|
|
|
m.Group("/keys", func() {
|
|
m.Combo("").Get(repo.SettingsDeployKeys).
|
|
Post(bindIgnErr(form.AddSSHKey{}), repo.SettingsDeployKeysPost)
|
|
m.Post("/delete", repo.DeleteDeployKey)
|
|
})
|
|
}, func(c *context.Context) {
|
|
c.Data["PageIsSettings"] = true
|
|
})
|
|
}, reqSignIn, context.RepoAssignment(), reqRepoAdmin, context.RepoRef())
|
|
|
|
m.Post("/:username/:reponame/action/:action", reqSignIn, context.RepoAssignment(), repo.Action)
|
|
m.Group("/:username/:reponame", func() {
|
|
m.Get("/issues", repo.RetrieveLabels, repo.Issues)
|
|
m.Get("/issues/:index", repo.ViewIssue)
|
|
m.Get("/labels/", repo.RetrieveLabels, repo.Labels)
|
|
m.Get("/milestones", repo.Milestones)
|
|
}, ignSignIn, context.RepoAssignment(true))
|
|
m.Group("/:username/:reponame", func() {
|
|
// FIXME: should use different URLs but mostly same logic for comments of issue and pull reuqest.
|
|
// So they can apply their own enable/disable logic on routers.
|
|
m.Group("/issues", func() {
|
|
m.Combo("/new", repo.MustEnableIssues).Get(context.RepoRef(), repo.NewIssue).
|
|
Post(bindIgnErr(form.NewIssue{}), repo.NewIssuePost)
|
|
|
|
m.Group("/:index", func() {
|
|
m.Post("/title", repo.UpdateIssueTitle)
|
|
m.Post("/content", repo.UpdateIssueContent)
|
|
m.Combo("/comments").Post(bindIgnErr(form.CreateComment{}), repo.NewComment)
|
|
})
|
|
})
|
|
m.Group("/comments/:id", func() {
|
|
m.Post("", repo.UpdateCommentContent)
|
|
m.Post("/delete", repo.DeleteComment)
|
|
})
|
|
}, reqSignIn, context.RepoAssignment(true))
|
|
m.Group("/:username/:reponame", func() {
|
|
m.Group("/wiki", func() {
|
|
m.Get("/?:page", repo.Wiki)
|
|
m.Get("/_pages", repo.WikiPages)
|
|
}, repo.MustEnableWiki, context.RepoRef())
|
|
}, ignSignIn, context.RepoAssignment(false, true))
|
|
|
|
m.Group("/:username/:reponame", func() {
|
|
// FIXME: should use different URLs but mostly same logic for comments of issue and pull reuqest.
|
|
// So they can apply their own enable/disable logic on routers.
|
|
m.Group("/issues", func() {
|
|
m.Group("/:index", func() {
|
|
m.Post("/label", repo.UpdateIssueLabel)
|
|
m.Post("/milestone", repo.UpdateIssueMilestone)
|
|
m.Post("/assignee", repo.UpdateIssueAssignee)
|
|
}, reqRepoWriter)
|
|
})
|
|
m.Group("/labels", func() {
|
|
m.Post("/new", bindIgnErr(form.CreateLabel{}), repo.NewLabel)
|
|
m.Post("/edit", bindIgnErr(form.CreateLabel{}), repo.UpdateLabel)
|
|
m.Post("/delete", repo.DeleteLabel)
|
|
m.Post("/initialize", bindIgnErr(form.InitializeLabels{}), repo.InitializeLabels)
|
|
}, reqRepoWriter, context.RepoRef())
|
|
m.Group("/milestones", func() {
|
|
m.Combo("/new").Get(repo.NewMilestone).
|
|
Post(bindIgnErr(form.CreateMilestone{}), repo.NewMilestonePost)
|
|
m.Get("/:id/edit", repo.EditMilestone)
|
|
m.Post("/:id/edit", bindIgnErr(form.CreateMilestone{}), repo.EditMilestonePost)
|
|
m.Get("/:id/:action", repo.ChangeMilestonStatus)
|
|
m.Post("/delete", repo.DeleteMilestone)
|
|
}, reqRepoWriter, context.RepoRef())
|
|
|
|
m.Group("/releases", func() {
|
|
m.Get("/new", repo.NewRelease)
|
|
m.Post("/new", bindIgnErr(form.NewRelease{}), repo.NewReleasePost)
|
|
m.Post("/delete", repo.DeleteRelease)
|
|
m.Get("/edit/*", repo.EditRelease)
|
|
m.Post("/edit/*", bindIgnErr(form.EditRelease{}), repo.EditReleasePost)
|
|
}, repo.MustBeNotBare, reqRepoWriter, func(c *context.Context) {
|
|
c.Data["PageIsViewFiles"] = true
|
|
})
|
|
|
|
// FIXME: Should use c.Repo.PullRequest to unify template, currently we have inconsistent URL
|
|
// for PR in same repository. After select branch on the page, the URL contains redundant head user name.
|
|
// e.g. /org1/test-repo/compare/master...org1:develop
|
|
// which should be /org1/test-repo/compare/master...develop
|
|
m.Combo("/compare/*", repo.MustAllowPulls).Get(repo.CompareAndPullRequest).
|
|
Post(bindIgnErr(form.NewIssue{}), repo.CompareAndPullRequestPost)
|
|
|
|
m.Group("", func() {
|
|
m.Combo("/_edit/*").Get(repo.EditFile).
|
|
Post(bindIgnErr(form.EditRepoFile{}), repo.EditFilePost)
|
|
m.Combo("/_new/*").Get(repo.NewFile).
|
|
Post(bindIgnErr(form.EditRepoFile{}), repo.NewFilePost)
|
|
m.Post("/_preview/*", bindIgnErr(form.EditPreviewDiff{}), repo.DiffPreviewPost)
|
|
m.Combo("/_delete/*").Get(repo.DeleteFile).
|
|
Post(bindIgnErr(form.DeleteRepoFile{}), repo.DeleteFilePost)
|
|
|
|
m.Group("", func() {
|
|
m.Combo("/_upload/*").Get(repo.UploadFile).
|
|
Post(bindIgnErr(form.UploadRepoFile{}), repo.UploadFilePost)
|
|
m.Post("/upload-file", repo.UploadFileToServer)
|
|
m.Post("/upload-remove", bindIgnErr(form.RemoveUploadFile{}), repo.RemoveUploadFileFromServer)
|
|
}, func(c *context.Context) {
|
|
if !conf.Repository.Upload.Enabled {
|
|
c.NotFound()
|
|
return
|
|
}
|
|
})
|
|
}, repo.MustBeNotBare, reqRepoWriter, context.RepoRef(), func(c *context.Context) {
|
|
if !c.Repo.CanEnableEditor() {
|
|
c.NotFound()
|
|
return
|
|
}
|
|
|
|
c.Data["PageIsViewFiles"] = true
|
|
})
|
|
}, reqSignIn, context.RepoAssignment())
|
|
|
|
m.Group("/:username/:reponame", func() {
|
|
m.Group("", func() {
|
|
m.Get("/releases", repo.MustBeNotBare, repo.Releases)
|
|
m.Get("/pulls", repo.RetrieveLabels, repo.Pulls)
|
|
m.Get("/pulls/:index", repo.ViewPull)
|
|
}, context.RepoRef())
|
|
|
|
m.Group("/branches", func() {
|
|
m.Get("", repo.Branches)
|
|
m.Get("/all", repo.AllBranches)
|
|
m.Post("/delete/*", reqSignIn, reqRepoWriter, repo.DeleteBranchPost)
|
|
}, repo.MustBeNotBare, func(c *context.Context) {
|
|
c.Data["PageIsViewFiles"] = true
|
|
})
|
|
|
|
m.Group("/wiki", func() {
|
|
m.Group("", func() {
|
|
m.Combo("/_new").Get(repo.NewWiki).
|
|
Post(bindIgnErr(form.NewWiki{}), repo.NewWikiPost)
|
|
m.Combo("/:page/_edit").Get(repo.EditWiki).
|
|
Post(bindIgnErr(form.NewWiki{}), repo.EditWikiPost)
|
|
m.Post("/:page/delete", repo.DeleteWikiPagePost)
|
|
}, reqSignIn, reqRepoWriter)
|
|
}, repo.MustEnableWiki, context.RepoRef())
|
|
|
|
m.Get("/archive/*", repo.MustBeNotBare, repo.Download)
|
|
|
|
m.Group("/pulls/:index", func() {
|
|
m.Get("/commits", context.RepoRef(), repo.ViewPullCommits)
|
|
m.Get("/files", context.RepoRef(), repo.ViewPullFiles)
|
|
m.Post("/merge", reqRepoWriter, repo.MergePullRequest)
|
|
}, repo.MustAllowPulls)
|
|
|
|
m.Group("", func() {
|
|
m.Get("/src/*", repo.Home)
|
|
m.Get("/raw/*", repo.SingleDownload)
|
|
m.Get("/commits/*", repo.RefCommits)
|
|
m.Get("/commit/:sha([a-f0-9]{7,40})$", repo.Diff)
|
|
m.Get("/forks", repo.Forks)
|
|
}, repo.MustBeNotBare, context.RepoRef())
|
|
m.Get("/commit/:sha([a-f0-9]{7,40})\\.:ext(patch|diff)", repo.MustBeNotBare, repo.RawDiff)
|
|
|
|
m.Get("/compare/:before([a-z0-9]{40})\\.\\.\\.:after([a-z0-9]{40})", repo.MustBeNotBare, context.RepoRef(), repo.CompareDiff)
|
|
}, ignSignIn, context.RepoAssignment())
|
|
m.Group("/:username/:reponame", func() {
|
|
m.Get("", repo.Home)
|
|
m.Get("/stars", repo.Stars)
|
|
m.Get("/watchers", repo.Watchers)
|
|
}, context.ServeGoGet(), ignSignIn, context.RepoAssignment(), context.RepoRef())
|
|
// ***** END: Repository *****
|
|
|
|
// **********************
|
|
// ----- API routes -----
|
|
// **********************
|
|
|
|
// TODO: Without session and CSRF
|
|
m.Group("/api", func() {
|
|
apiv1.RegisterRoutes(m)
|
|
}, ignSignIn)
|
|
},
|
|
session.Sessioner(session.Options{
|
|
Provider: conf.Session.Provider,
|
|
ProviderConfig: conf.Session.ProviderConfig,
|
|
CookieName: conf.Session.CookieName,
|
|
CookiePath: conf.Server.Subpath,
|
|
Gclifetime: conf.Session.GCInterval,
|
|
Maxlifetime: conf.Session.MaxLifeTime,
|
|
Secure: conf.Session.CookieSecure,
|
|
}),
|
|
csrf.Csrfer(csrf.Options{
|
|
Secret: conf.Security.SecretKey,
|
|
Header: "X-CSRF-Token",
|
|
Cookie: conf.Session.CSRFCookieName,
|
|
CookieDomain: conf.Server.URL.Hostname(),
|
|
CookiePath: conf.Server.Subpath,
|
|
CookieHttpOnly: true,
|
|
SetCookie: true,
|
|
Secure: conf.Server.URL.Scheme == "https",
|
|
}),
|
|
context.Contexter(context.NewStore()),
|
|
)
|
|
|
|
// ***************************
|
|
// ----- HTTP Git routes -----
|
|
// ***************************
|
|
|
|
m.Group("/:username/:reponame", func() {
|
|
m.Get("/tasks/trigger", repo.TriggerTask)
|
|
|
|
m.Group("/info/lfs", func() {
|
|
lfs.RegisterRoutes(m.Router)
|
|
})
|
|
|
|
m.Route("/*", "GET,POST,OPTIONS", context.ServeGoGet(), repo.HTTPContexter(repo.NewStore()), repo.HTTP)
|
|
})
|
|
|
|
// ***************************
|
|
// ----- Internal routes -----
|
|
// ***************************
|
|
|
|
m.Group("/-", func() {
|
|
m.Get("/metrics", app.MetricsFilter(), promhttp.Handler()) // "/-/metrics"
|
|
|
|
m.Group("/api", func() {
|
|
m.Post("/sanitize_ipynb", app.SanitizeIpynb()) // "/-/api/sanitize_ipynb"
|
|
})
|
|
})
|
|
|
|
// **********************
|
|
// ----- robots.txt -----
|
|
// **********************
|
|
|
|
m.Get("/robots.txt", func(w http.ResponseWriter, r *http.Request) {
|
|
if conf.HasRobotsTxt {
|
|
http.ServeFile(w, r, filepath.Join(conf.CustomDir(), "robots.txt"))
|
|
} else {
|
|
w.WriteHeader(http.StatusNotFound)
|
|
}
|
|
})
|
|
|
|
m.NotFound(route.NotFound)
|
|
|
|
// Flag for port number in case first time run conflict.
|
|
if c.IsSet("port") {
|
|
conf.Server.URL.Host = strings.Replace(conf.Server.URL.Host, ":"+conf.Server.URL.Port(), ":"+c.String("port"), 1)
|
|
conf.Server.ExternalURL = conf.Server.URL.String()
|
|
conf.Server.HTTPPort = c.String("port")
|
|
}
|
|
|
|
var listenAddr string
|
|
if conf.Server.Protocol == "unix" {
|
|
listenAddr = conf.Server.HTTPAddr
|
|
} else {
|
|
listenAddr = fmt.Sprintf("%s:%s", conf.Server.HTTPAddr, conf.Server.HTTPPort)
|
|
}
|
|
log.Info("Available on %s", conf.Server.ExternalURL)
|
|
|
|
switch conf.Server.Protocol {
|
|
case "http":
|
|
err = http.ListenAndServe(listenAddr, m)
|
|
|
|
case "https":
|
|
tlsMinVersion := tls.VersionTLS12
|
|
switch conf.Server.TLSMinVersion {
|
|
case "TLS13":
|
|
tlsMinVersion = tls.VersionTLS13
|
|
case "TLS12":
|
|
tlsMinVersion = tls.VersionTLS12
|
|
case "TLS11":
|
|
tlsMinVersion = tls.VersionTLS11
|
|
case "TLS10":
|
|
tlsMinVersion = tls.VersionTLS10
|
|
}
|
|
server := &http.Server{
|
|
Addr: listenAddr,
|
|
TLSConfig: &tls.Config{
|
|
MinVersion: uint16(tlsMinVersion),
|
|
CurvePreferences: []tls.CurveID{tls.X25519, tls.CurveP256, tls.CurveP384, tls.CurveP521},
|
|
PreferServerCipherSuites: true,
|
|
CipherSuites: []uint16{
|
|
tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
|
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
|
tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
|
tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
|
tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
|
tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
|
},
|
|
}, Handler: m,
|
|
}
|
|
err = server.ListenAndServeTLS(conf.Server.CertFile, conf.Server.KeyFile)
|
|
|
|
case "fcgi":
|
|
err = fcgi.Serve(nil, m)
|
|
|
|
case "unix":
|
|
if osutil.IsExist(listenAddr) {
|
|
err = os.Remove(listenAddr)
|
|
if err != nil {
|
|
log.Fatal("Failed to remove existing Unix domain socket: %v", err)
|
|
}
|
|
}
|
|
|
|
var listener *net.UnixListener
|
|
listener, err = net.ListenUnix("unix", &net.UnixAddr{Name: listenAddr, Net: "unix"})
|
|
if err != nil {
|
|
log.Fatal("Failed to listen on Unix networks: %v", err)
|
|
}
|
|
|
|
// FIXME: add proper implementation of signal capture on all protocols
|
|
// execute this on SIGTERM or SIGINT: listener.Close()
|
|
if err = os.Chmod(listenAddr, conf.Server.UnixSocketMode); err != nil {
|
|
log.Fatal("Failed to change permission of Unix domain socket: %v", err)
|
|
}
|
|
err = http.Serve(listener, m)
|
|
|
|
default:
|
|
log.Fatal("Unexpected server protocol: %s", conf.Server.Protocol)
|
|
}
|
|
|
|
if err != nil {
|
|
log.Fatal("Failed to start server: %v", err)
|
|
}
|
|
|
|
return nil
|
|
}
|