mirror of https://github.com/gogits/gogs.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
707 lines
24 KiB
707 lines
24 KiB
// Copyright 2014 The Gogs Authors. All rights reserved. |
|
// Use of this source code is governed by a MIT-style |
|
// license that can be found in the LICENSE file. |
|
|
|
package cmd |
|
|
|
import ( |
|
"crypto/tls" |
|
"fmt" |
|
"io/ioutil" |
|
"net" |
|
"net/http" |
|
"net/http/fcgi" |
|
"os" |
|
"path" |
|
"strings" |
|
|
|
"github.com/go-macaron/binding" |
|
"github.com/go-macaron/cache" |
|
"github.com/go-macaron/captcha" |
|
"github.com/go-macaron/csrf" |
|
"github.com/go-macaron/gzip" |
|
"github.com/go-macaron/i18n" |
|
"github.com/go-macaron/session" |
|
"github.com/go-macaron/toolbox" |
|
"github.com/go-xorm/xorm" |
|
"github.com/mcuadros/go-version" |
|
"github.com/urfave/cli" |
|
log "gopkg.in/clog.v1" |
|
"gopkg.in/ini.v1" |
|
"gopkg.in/macaron.v1" |
|
|
|
"github.com/gogits/git-module" |
|
"github.com/gogits/go-gogs-client" |
|
|
|
"github.com/gogits/gogs/models" |
|
"github.com/gogits/gogs/modules/auth" |
|
"github.com/gogits/gogs/modules/bindata" |
|
"github.com/gogits/gogs/modules/context" |
|
"github.com/gogits/gogs/modules/mailer" |
|
"github.com/gogits/gogs/modules/setting" |
|
"github.com/gogits/gogs/modules/template" |
|
"github.com/gogits/gogs/routers" |
|
"github.com/gogits/gogs/routers/admin" |
|
apiv1 "github.com/gogits/gogs/routers/api/v1" |
|
"github.com/gogits/gogs/routers/dev" |
|
"github.com/gogits/gogs/routers/org" |
|
"github.com/gogits/gogs/routers/repo" |
|
"github.com/gogits/gogs/routers/user" |
|
) |
|
|
|
var CmdWeb = cli.Command{ |
|
Name: "web", |
|
Usage: "Start Gogs web server", |
|
Description: `Gogs web server is the only thing you need to run, |
|
and it takes care of all the other things for you`, |
|
Action: runWeb, |
|
Flags: []cli.Flag{ |
|
stringFlag("port, p", "3000", "Temporary port number to prevent conflict"), |
|
stringFlag("config, c", "custom/conf/app.ini", "Custom configuration file path"), |
|
}, |
|
} |
|
|
|
type VerChecker struct { |
|
ImportPath string |
|
Version func() string |
|
Expected string |
|
} |
|
|
|
// checkVersion checks if binary matches the version of templates files. |
|
func checkVersion() { |
|
// Templates. |
|
data, err := ioutil.ReadFile(setting.StaticRootPath + "/templates/.VERSION") |
|
if err != nil { |
|
log.Fatal(4, "Fail to read 'templates/.VERSION': %v", err) |
|
} |
|
tplVer := string(data) |
|
if tplVer != setting.AppVer { |
|
if version.Compare(tplVer, setting.AppVer, ">") { |
|
log.Fatal(4, "Binary version is lower than template file version, did you forget to recompile Gogs?") |
|
} else { |
|
log.Fatal(4, "Binary version is higher than template file version, did you forget to update template files?") |
|
} |
|
} |
|
|
|
// Check dependency version. |
|
// LEGACY [0.11]: no need to check version as we check in vendor into version control |
|
checkers := []VerChecker{ |
|
{"github.com/go-xorm/xorm", func() string { return xorm.Version }, "0.6.0"}, |
|
{"github.com/go-macaron/binding", binding.Version, "0.3.2"}, |
|
{"github.com/go-macaron/cache", cache.Version, "0.1.2"}, |
|
{"github.com/go-macaron/csrf", csrf.Version, "0.1.0"}, |
|
{"github.com/go-macaron/i18n", i18n.Version, "0.3.0"}, |
|
{"github.com/go-macaron/session", session.Version, "0.1.6"}, |
|
{"github.com/go-macaron/toolbox", toolbox.Version, "0.1.3"}, |
|
{"gopkg.in/ini.v1", ini.Version, "1.8.4"}, |
|
{"gopkg.in/macaron.v1", macaron.Version, "1.1.7"}, |
|
{"github.com/gogits/git-module", git.Version, "0.4.12"}, |
|
{"github.com/gogits/go-gogs-client", gogs.Version, "0.12.1"}, |
|
} |
|
for _, c := range checkers { |
|
if !version.Compare(c.Version(), c.Expected, ">=") { |
|
log.Fatal(4, `Dependency outdated! |
|
Package '%s' current version (%s) is below requirement (%s), |
|
please use following command to update this package and recompile Gogs: |
|
go get -u %[1]s`, c.ImportPath, c.Version(), c.Expected) |
|
} |
|
} |
|
} |
|
|
|
// newMacaron initializes Macaron instance. |
|
func newMacaron() *macaron.Macaron { |
|
m := macaron.New() |
|
if !setting.DisableRouterLog { |
|
m.Use(macaron.Logger()) |
|
} |
|
m.Use(macaron.Recovery()) |
|
if setting.EnableGzip { |
|
m.Use(gzip.Gziper()) |
|
} |
|
if setting.Protocol == setting.SCHEME_FCGI { |
|
m.SetURLPrefix(setting.AppSubUrl) |
|
} |
|
m.Use(macaron.Static( |
|
path.Join(setting.StaticRootPath, "public"), |
|
macaron.StaticOptions{ |
|
SkipLogging: setting.DisableRouterLog, |
|
}, |
|
)) |
|
m.Use(macaron.Static( |
|
setting.AvatarUploadPath, |
|
macaron.StaticOptions{ |
|
Prefix: "avatars", |
|
SkipLogging: setting.DisableRouterLog, |
|
}, |
|
)) |
|
|
|
funcMap := template.NewFuncMap() |
|
m.Use(macaron.Renderer(macaron.RenderOptions{ |
|
Directory: path.Join(setting.StaticRootPath, "templates"), |
|
AppendDirectories: []string{path.Join(setting.CustomPath, "templates")}, |
|
Funcs: funcMap, |
|
IndentJSON: macaron.Env != macaron.PROD, |
|
})) |
|
mailer.InitMailRender(path.Join(setting.StaticRootPath, "templates/mail"), |
|
path.Join(setting.CustomPath, "templates/mail"), funcMap) |
|
|
|
localeNames, err := bindata.AssetDir("conf/locale") |
|
if err != nil { |
|
log.Fatal(4, "Fail to list locale files: %v", err) |
|
} |
|
localFiles := make(map[string][]byte) |
|
for _, name := range localeNames { |
|
localFiles[name] = bindata.MustAsset("conf/locale/" + name) |
|
} |
|
m.Use(i18n.I18n(i18n.Options{ |
|
SubURL: setting.AppSubUrl, |
|
Files: localFiles, |
|
CustomDirectory: path.Join(setting.CustomPath, "conf/locale"), |
|
Langs: setting.Langs, |
|
Names: setting.Names, |
|
DefaultLang: "en-US", |
|
Redirect: true, |
|
})) |
|
m.Use(cache.Cacher(cache.Options{ |
|
Adapter: setting.CacheAdapter, |
|
AdapterConfig: setting.CacheConn, |
|
Interval: setting.CacheInterval, |
|
})) |
|
m.Use(captcha.Captchaer(captcha.Options{ |
|
SubURL: setting.AppSubUrl, |
|
})) |
|
m.Use(session.Sessioner(setting.SessionConfig)) |
|
m.Use(csrf.Csrfer(csrf.Options{ |
|
Secret: setting.SecretKey, |
|
Cookie: setting.CSRFCookieName, |
|
SetCookie: true, |
|
Header: "X-Csrf-Token", |
|
CookiePath: setting.AppSubUrl, |
|
})) |
|
m.Use(toolbox.Toolboxer(m, toolbox.Options{ |
|
HealthCheckFuncs: []*toolbox.HealthCheckFuncDesc{ |
|
&toolbox.HealthCheckFuncDesc{ |
|
Desc: "Database connection", |
|
Func: models.Ping, |
|
}, |
|
}, |
|
})) |
|
m.Use(context.Contexter()) |
|
return m |
|
} |
|
|
|
func runWeb(ctx *cli.Context) error { |
|
if ctx.IsSet("config") { |
|
setting.CustomConf = ctx.String("config") |
|
} |
|
routers.GlobalInit() |
|
checkVersion() |
|
|
|
m := newMacaron() |
|
|
|
reqSignIn := context.Toggle(&context.ToggleOptions{SignInRequired: true}) |
|
ignSignIn := context.Toggle(&context.ToggleOptions{SignInRequired: setting.Service.RequireSignInView}) |
|
ignSignInAndCsrf := context.Toggle(&context.ToggleOptions{DisableCSRF: true}) |
|
reqSignOut := context.Toggle(&context.ToggleOptions{SignOutRequired: true}) |
|
|
|
bindIgnErr := binding.BindIgnErr |
|
|
|
// FIXME: not all routes need go through same middlewares. |
|
// Especially some AJAX requests, we can reduce middleware number to improve performance. |
|
// Routers. |
|
m.Get("/", ignSignIn, routers.Home) |
|
m.Group("/explore", func() { |
|
m.Get("", func(ctx *context.Context) { |
|
ctx.Redirect(setting.AppSubUrl + "/explore/repos") |
|
}) |
|
m.Get("/repos", routers.ExploreRepos) |
|
m.Get("/users", routers.ExploreUsers) |
|
m.Get("/organizations", routers.ExploreOrganizations) |
|
}, ignSignIn) |
|
m.Combo("/install", routers.InstallInit).Get(routers.Install). |
|
Post(bindIgnErr(auth.InstallForm{}), routers.InstallPost) |
|
m.Get("/^:type(issues|pulls)$", reqSignIn, user.Issues) |
|
|
|
// ***** START: User ***** |
|
m.Group("/user", func() { |
|
m.Get("/login", user.SignIn) |
|
m.Post("/login", bindIgnErr(auth.SignInForm{}), user.SignInPost) |
|
m.Get("/sign_up", user.SignUp) |
|
m.Post("/sign_up", bindIgnErr(auth.RegisterForm{}), user.SignUpPost) |
|
m.Get("/reset_password", user.ResetPasswd) |
|
m.Post("/reset_password", user.ResetPasswdPost) |
|
}, reqSignOut) |
|
|
|
m.Group("/user/settings", func() { |
|
m.Get("", user.Settings) |
|
m.Post("", bindIgnErr(auth.UpdateProfileForm{}), user.SettingsPost) |
|
m.Combo("/avatar").Get(user.SettingsAvatar). |
|
Post(binding.MultipartForm(auth.AvatarForm{}), user.SettingsAvatarPost) |
|
m.Post("/avatar/delete", user.SettingsDeleteAvatar) |
|
m.Combo("/email").Get(user.SettingsEmails). |
|
Post(bindIgnErr(auth.AddEmailForm{}), user.SettingsEmailPost) |
|
m.Post("/email/delete", user.DeleteEmail) |
|
m.Get("/password", user.SettingsPassword) |
|
m.Post("/password", bindIgnErr(auth.ChangePasswordForm{}), user.SettingsPasswordPost) |
|
m.Combo("/ssh").Get(user.SettingsSSHKeys). |
|
Post(bindIgnErr(auth.AddSSHKeyForm{}), user.SettingsSSHKeysPost) |
|
m.Post("/ssh/delete", user.DeleteSSHKey) |
|
m.Combo("/applications").Get(user.SettingsApplications). |
|
Post(bindIgnErr(auth.NewAccessTokenForm{}), user.SettingsApplicationsPost) |
|
m.Post("/applications/delete", user.SettingsDeleteApplication) |
|
|
|
m.Group("/organizations", func() { |
|
m.Get("", user.SettingsOrganizations) |
|
m.Post("/leave", user.SettingsLeaveOrganization) |
|
}) |
|
|
|
m.Route("/delete", "GET,POST", user.SettingsDelete) |
|
}, reqSignIn, func(ctx *context.Context) { |
|
ctx.Data["PageIsUserSettings"] = true |
|
}) |
|
|
|
m.Group("/user", func() { |
|
// r.Get("/feeds", binding.Bind(auth.FeedsForm{}), user.Feeds) |
|
m.Any("/activate", user.Activate) |
|
m.Any("/activate_email", user.ActivateEmail) |
|
m.Get("/email2user", user.Email2User) |
|
m.Get("/forget_password", user.ForgotPasswd) |
|
m.Post("/forget_password", user.ForgotPasswdPost) |
|
m.Get("/logout", user.SignOut) |
|
}) |
|
// ***** END: User ***** |
|
|
|
adminReq := context.Toggle(&context.ToggleOptions{SignInRequired: true, AdminRequired: true}) |
|
|
|
// ***** START: Admin ***** |
|
m.Group("/admin", func() { |
|
m.Get("", adminReq, admin.Dashboard) |
|
m.Get("/config", admin.Config) |
|
m.Post("/config/test_mail", admin.SendTestMail) |
|
m.Get("/monitor", admin.Monitor) |
|
|
|
m.Group("/users", func() { |
|
m.Get("", admin.Users) |
|
m.Combo("/new").Get(admin.NewUser).Post(bindIgnErr(auth.AdminCrateUserForm{}), admin.NewUserPost) |
|
m.Combo("/:userid").Get(admin.EditUser).Post(bindIgnErr(auth.AdminEditUserForm{}), admin.EditUserPost) |
|
m.Post("/:userid/delete", admin.DeleteUser) |
|
}) |
|
|
|
m.Group("/orgs", func() { |
|
m.Get("", admin.Organizations) |
|
}) |
|
|
|
m.Group("/repos", func() { |
|
m.Get("", admin.Repos) |
|
m.Post("/delete", admin.DeleteRepo) |
|
}) |
|
|
|
m.Group("/auths", func() { |
|
m.Get("", admin.Authentications) |
|
m.Combo("/new").Get(admin.NewAuthSource).Post(bindIgnErr(auth.AuthenticationForm{}), admin.NewAuthSourcePost) |
|
m.Combo("/:authid").Get(admin.EditAuthSource). |
|
Post(bindIgnErr(auth.AuthenticationForm{}), admin.EditAuthSourcePost) |
|
m.Post("/:authid/delete", admin.DeleteAuthSource) |
|
}) |
|
|
|
m.Group("/notices", func() { |
|
m.Get("", admin.Notices) |
|
m.Post("/delete", admin.DeleteNotices) |
|
m.Get("/empty", admin.EmptyNotices) |
|
}) |
|
}, adminReq) |
|
// ***** END: Admin ***** |
|
|
|
m.Group("", func() { |
|
m.Group("/:username", func() { |
|
m.Get("", user.Profile) |
|
m.Get("/followers", user.Followers) |
|
m.Get("/following", user.Following) |
|
m.Get("/stars", user.Stars) |
|
}) |
|
|
|
m.Get("/attachments/:uuid", func(ctx *context.Context) { |
|
attach, err := models.GetAttachmentByUUID(ctx.Params(":uuid")) |
|
if err != nil { |
|
if models.IsErrAttachmentNotExist(err) { |
|
ctx.Error(404) |
|
} else { |
|
ctx.Handle(500, "GetAttachmentByUUID", err) |
|
} |
|
return |
|
} |
|
|
|
fr, err := os.Open(attach.LocalPath()) |
|
if err != nil { |
|
ctx.Handle(500, "Open", err) |
|
return |
|
} |
|
defer fr.Close() |
|
|
|
ctx.Header().Set("Cache-Control", "public,max-age=86400") |
|
ctx.Header().Set("Content-Disposition", fmt.Sprintf(`inline; filename="%s"`, attach.Name)) |
|
// Fix #312. Attachments with , in their name are not handled correctly by Google Chrome. |
|
// We must put the name in " manually. |
|
if err = repo.ServeData(ctx, "\""+attach.Name+"\"", fr); err != nil { |
|
ctx.Handle(500, "ServeData", err) |
|
return |
|
} |
|
}) |
|
m.Post("/issues/attachments", repo.UploadIssueAttachment) |
|
}, ignSignIn) |
|
|
|
m.Group("/:username", func() { |
|
m.Get("/action/:action", user.Action) |
|
}, reqSignIn) |
|
|
|
if macaron.Env == macaron.DEV { |
|
m.Get("/template/*", dev.TemplatePreview) |
|
} |
|
|
|
reqRepoAdmin := context.RequireRepoAdmin() |
|
reqRepoWriter := context.RequireRepoWriter() |
|
|
|
// ***** START: Organization ***** |
|
m.Group("/org", func() { |
|
m.Group("", func() { |
|
m.Get("/create", org.Create) |
|
m.Post("/create", bindIgnErr(auth.CreateOrgForm{}), org.CreatePost) |
|
}, func(ctx *context.Context) { |
|
if !ctx.User.CanCreateOrganization() { |
|
ctx.NotFound() |
|
} |
|
}) |
|
|
|
m.Group("/:org", func() { |
|
m.Get("/dashboard", user.Dashboard) |
|
m.Get("/^:type(issues|pulls)$", user.Issues) |
|
m.Get("/members", org.Members) |
|
m.Get("/members/action/:action", org.MembersAction) |
|
|
|
m.Get("/teams", org.Teams) |
|
}, context.OrgAssignment(true)) |
|
|
|
m.Group("/:org", func() { |
|
m.Get("/teams/:team", org.TeamMembers) |
|
m.Get("/teams/:team/repositories", org.TeamRepositories) |
|
m.Route("/teams/:team/action/:action", "GET,POST", org.TeamsAction) |
|
m.Route("/teams/:team/action/repo/:action", "GET,POST", org.TeamsRepoAction) |
|
}, context.OrgAssignment(true, false, true)) |
|
|
|
m.Group("/:org", func() { |
|
m.Get("/teams/new", org.NewTeam) |
|
m.Post("/teams/new", bindIgnErr(auth.CreateTeamForm{}), org.NewTeamPost) |
|
m.Get("/teams/:team/edit", org.EditTeam) |
|
m.Post("/teams/:team/edit", bindIgnErr(auth.CreateTeamForm{}), org.EditTeamPost) |
|
m.Post("/teams/:team/delete", org.DeleteTeam) |
|
|
|
m.Group("/settings", func() { |
|
m.Combo("").Get(org.Settings). |
|
Post(bindIgnErr(auth.UpdateOrgSettingForm{}), org.SettingsPost) |
|
m.Post("/avatar", binding.MultipartForm(auth.AvatarForm{}), org.SettingsAvatar) |
|
m.Post("/avatar/delete", org.SettingsDeleteAvatar) |
|
|
|
m.Group("/hooks", func() { |
|
m.Get("", org.Webhooks) |
|
m.Post("/delete", org.DeleteWebhook) |
|
m.Get("/:type/new", repo.WebhooksNew) |
|
m.Post("/gogs/new", bindIgnErr(auth.NewWebhookForm{}), repo.WebHooksNewPost) |
|
m.Post("/slack/new", bindIgnErr(auth.NewSlackHookForm{}), repo.SlackHooksNewPost) |
|
m.Post("/discord/new", bindIgnErr(auth.NewDiscordHookForm{}), repo.DiscordHooksNewPost) |
|
m.Get("/:id", repo.WebHooksEdit) |
|
m.Post("/gogs/:id", bindIgnErr(auth.NewWebhookForm{}), repo.WebHooksEditPost) |
|
m.Post("/slack/:id", bindIgnErr(auth.NewSlackHookForm{}), repo.SlackHooksEditPost) |
|
m.Post("/discord/:id", bindIgnErr(auth.NewDiscordHookForm{}), repo.DiscordHooksEditPost) |
|
}) |
|
|
|
m.Route("/delete", "GET,POST", org.SettingsDelete) |
|
}) |
|
|
|
m.Route("/invitations/new", "GET,POST", org.Invitation) |
|
}, context.OrgAssignment(true, true)) |
|
}, reqSignIn) |
|
// ***** END: Organization ***** |
|
|
|
// ***** START: Repository ***** |
|
m.Group("/repo", func() { |
|
m.Get("/create", repo.Create) |
|
m.Post("/create", bindIgnErr(auth.CreateRepoForm{}), repo.CreatePost) |
|
m.Get("/migrate", repo.Migrate) |
|
m.Post("/migrate", bindIgnErr(auth.MigrateRepoForm{}), repo.MigratePost) |
|
m.Combo("/fork/:repoid").Get(repo.Fork). |
|
Post(bindIgnErr(auth.CreateRepoForm{}), repo.ForkPost) |
|
}, reqSignIn) |
|
|
|
m.Group("/:username/:reponame", func() { |
|
m.Group("/settings", func() { |
|
m.Combo("").Get(repo.Settings). |
|
Post(bindIgnErr(auth.RepoSettingForm{}), repo.SettingsPost) |
|
m.Group("/collaboration", func() { |
|
m.Combo("").Get(repo.SettingsCollaboration).Post(repo.SettingsCollaborationPost) |
|
m.Post("/access_mode", repo.ChangeCollaborationAccessMode) |
|
m.Post("/delete", repo.DeleteCollaboration) |
|
}) |
|
m.Group("/branches", func() { |
|
m.Get("", repo.SettingsBranches) |
|
m.Post("/default_branch", repo.UpdateDefaultBranch) |
|
m.Combo("/*").Get(repo.SettingsProtectedBranch). |
|
Post(bindIgnErr(auth.ProtectBranchForm{}), repo.SettingsProtectedBranchPost) |
|
}, func(ctx *context.Context) { |
|
if ctx.Repo.Repository.IsMirror { |
|
ctx.NotFound() |
|
return |
|
} |
|
}) |
|
|
|
m.Group("/hooks", func() { |
|
m.Get("", repo.Webhooks) |
|
m.Post("/delete", repo.DeleteWebhook) |
|
m.Get("/:type/new", repo.WebhooksNew) |
|
m.Post("/gogs/new", bindIgnErr(auth.NewWebhookForm{}), repo.WebHooksNewPost) |
|
m.Post("/slack/new", bindIgnErr(auth.NewSlackHookForm{}), repo.SlackHooksNewPost) |
|
m.Post("/discord/new", bindIgnErr(auth.NewDiscordHookForm{}), repo.DiscordHooksNewPost) |
|
m.Get("/:id", repo.WebHooksEdit) |
|
m.Post("/:id/test", repo.TestWebhook) |
|
m.Post("/gogs/:id", bindIgnErr(auth.NewWebhookForm{}), repo.WebHooksEditPost) |
|
m.Post("/slack/:id", bindIgnErr(auth.NewSlackHookForm{}), repo.SlackHooksEditPost) |
|
m.Post("/discord/:id", bindIgnErr(auth.NewDiscordHookForm{}), repo.DiscordHooksEditPost) |
|
|
|
m.Group("/git", func() { |
|
m.Get("", repo.SettingsGitHooks) |
|
m.Combo("/:name").Get(repo.SettingsGitHooksEdit). |
|
Post(repo.SettingsGitHooksEditPost) |
|
}, context.GitHookService()) |
|
}) |
|
|
|
m.Group("/keys", func() { |
|
m.Combo("").Get(repo.SettingsDeployKeys). |
|
Post(bindIgnErr(auth.AddSSHKeyForm{}), repo.SettingsDeployKeysPost) |
|
m.Post("/delete", repo.DeleteDeployKey) |
|
}) |
|
|
|
}, func(ctx *context.Context) { |
|
ctx.Data["PageIsSettings"] = true |
|
}) |
|
}, reqSignIn, context.RepoAssignment(), reqRepoAdmin, context.RepoRef()) |
|
|
|
m.Get("/:username/:reponame/action/:action", reqSignIn, context.RepoAssignment(), repo.Action) |
|
m.Group("/:username/:reponame", func() { |
|
// FIXME: should use different URLs but mostly same logic for comments of issue and pull reuqest. |
|
// So they can apply their own enable/disable logic on routers. |
|
m.Group("/issues", func() { |
|
m.Combo("/new", repo.MustEnableIssues).Get(context.RepoRef(), repo.NewIssue). |
|
Post(bindIgnErr(auth.CreateIssueForm{}), repo.NewIssuePost) |
|
|
|
m.Group("/:index", func() { |
|
m.Post("/label", repo.UpdateIssueLabel) |
|
m.Post("/milestone", repo.UpdateIssueMilestone) |
|
m.Post("/assignee", repo.UpdateIssueAssignee) |
|
}, reqRepoWriter) |
|
|
|
m.Group("/:index", func() { |
|
m.Post("/title", repo.UpdateIssueTitle) |
|
m.Post("/content", repo.UpdateIssueContent) |
|
m.Combo("/comments").Post(bindIgnErr(auth.CreateCommentForm{}), repo.NewComment) |
|
}) |
|
}) |
|
m.Group("/comments/:id", func() { |
|
m.Post("", repo.UpdateCommentContent) |
|
m.Post("/delete", repo.DeleteComment) |
|
}) |
|
m.Group("/labels", func() { |
|
m.Post("/new", bindIgnErr(auth.CreateLabelForm{}), repo.NewLabel) |
|
m.Post("/edit", bindIgnErr(auth.CreateLabelForm{}), repo.UpdateLabel) |
|
m.Post("/delete", repo.DeleteLabel) |
|
m.Post("/initialize", bindIgnErr(auth.InitializeLabelsForm{}), repo.InitializeLabels) |
|
}, reqRepoWriter, context.RepoRef()) |
|
m.Group("/milestones", func() { |
|
m.Combo("/new").Get(repo.NewMilestone). |
|
Post(bindIgnErr(auth.CreateMilestoneForm{}), repo.NewMilestonePost) |
|
m.Get("/:id/edit", repo.EditMilestone) |
|
m.Post("/:id/edit", bindIgnErr(auth.CreateMilestoneForm{}), repo.EditMilestonePost) |
|
m.Get("/:id/:action", repo.ChangeMilestonStatus) |
|
m.Post("/delete", repo.DeleteMilestone) |
|
}, reqRepoWriter, context.RepoRef()) |
|
|
|
m.Group("/releases", func() { |
|
m.Get("/new", repo.NewRelease) |
|
m.Post("/new", bindIgnErr(auth.NewReleaseForm{}), repo.NewReleasePost) |
|
m.Post("/delete", repo.DeleteRelease) |
|
m.Get("/edit/*", repo.EditRelease) |
|
m.Post("/edit/*", bindIgnErr(auth.EditReleaseForm{}), repo.EditReleasePost) |
|
}, reqRepoWriter, context.RepoRef()) |
|
|
|
// FIXME: Should use ctx.Repo.PullRequest to unify template, currently we have inconsistent URL |
|
// for PR in same repository. After select branch on the page, the URL contains redundant head user name. |
|
// e.g. /org1/test-repo/compare/master...org1:develop |
|
// which should be /org1/test-repo/compare/master...develop |
|
m.Combo("/compare/*", repo.MustAllowPulls).Get(repo.CompareAndPullRequest). |
|
Post(bindIgnErr(auth.CreateIssueForm{}), repo.CompareAndPullRequestPost) |
|
|
|
m.Group("", func() { |
|
m.Combo("/_edit/*").Get(repo.EditFile). |
|
Post(bindIgnErr(auth.EditRepoFileForm{}), repo.EditFilePost) |
|
m.Combo("/_new/*").Get(repo.NewFile). |
|
Post(bindIgnErr(auth.EditRepoFileForm{}), repo.NewFilePost) |
|
m.Post("/_preview/*", bindIgnErr(auth.EditPreviewDiffForm{}), repo.DiffPreviewPost) |
|
m.Combo("/_delete/*").Get(repo.DeleteFile). |
|
Post(bindIgnErr(auth.DeleteRepoFileForm{}), repo.DeleteFilePost) |
|
|
|
m.Group("", func() { |
|
m.Combo("/_upload/*").Get(repo.UploadFile). |
|
Post(bindIgnErr(auth.UploadRepoFileForm{}), repo.UploadFilePost) |
|
m.Post("/upload-file", repo.UploadFileToServer) |
|
m.Post("/upload-remove", bindIgnErr(auth.RemoveUploadFileForm{}), repo.RemoveUploadFileFromServer) |
|
}, func(ctx *context.Context) { |
|
if !setting.Repository.Upload.Enabled { |
|
ctx.NotFound() |
|
return |
|
} |
|
}) |
|
}, reqRepoWriter, context.RepoRef(), func(ctx *context.Context) { |
|
if !ctx.Repo.CanEnableEditor() { |
|
ctx.NotFound() |
|
return |
|
} |
|
}) |
|
}, reqSignIn, context.RepoAssignment(), repo.MustBeNotBare) |
|
|
|
m.Group("/:username/:reponame", func() { |
|
m.Group("", func() { |
|
m.Get("/releases", repo.Releases) |
|
m.Get("/^:type(issues|pulls)$", repo.RetrieveLabels, repo.Issues) |
|
m.Get("/^:type(issues|pulls)$/:index", repo.ViewIssue) |
|
m.Get("/labels/", repo.RetrieveLabels, repo.Labels) |
|
m.Get("/milestones", repo.Milestones) |
|
}, context.RepoRef()) |
|
|
|
// m.Get("/branches", repo.Branches) |
|
m.Post("/branches/delete/*", reqSignIn, reqRepoWriter, repo.DeleteBranchPost) |
|
|
|
m.Group("/wiki", func() { |
|
m.Get("/?:page", repo.Wiki) |
|
m.Get("/_pages", repo.WikiPages) |
|
|
|
m.Group("", func() { |
|
m.Combo("/_new").Get(repo.NewWiki). |
|
Post(bindIgnErr(auth.NewWikiForm{}), repo.NewWikiPost) |
|
m.Combo("/:page/_edit").Get(repo.EditWiki). |
|
Post(bindIgnErr(auth.NewWikiForm{}), repo.EditWikiPost) |
|
m.Post("/:page/delete", repo.DeleteWikiPagePost) |
|
}, reqSignIn, reqRepoWriter) |
|
}, repo.MustEnableWiki, context.RepoRef()) |
|
|
|
m.Get("/archive/*", repo.Download) |
|
|
|
m.Group("/pulls/:index", func() { |
|
m.Get("/commits", context.RepoRef(), repo.ViewPullCommits) |
|
m.Get("/files", context.RepoRef(), repo.ViewPullFiles) |
|
m.Post("/merge", reqRepoWriter, repo.MergePullRequest) |
|
}, repo.MustAllowPulls) |
|
|
|
m.Group("", func() { |
|
m.Get("/src/*", repo.Home) |
|
m.Get("/raw/*", repo.SingleDownload) |
|
m.Get("/commits/*", repo.RefCommits) |
|
m.Get("/commit/:sha([a-f0-9]{7,40})$", repo.Diff) |
|
m.Get("/forks", repo.Forks) |
|
}, context.RepoRef()) |
|
m.Get("/commit/:sha([a-f0-9]{7,40})\\.:ext(patch|diff)", repo.RawDiff) |
|
|
|
m.Get("/compare/:before([a-z0-9]{40})\\.\\.\\.:after([a-z0-9]{40})", context.RepoRef(), repo.CompareDiff) |
|
}, ignSignIn, context.RepoAssignment(), repo.MustBeNotBare) |
|
m.Group("/:username/:reponame", func() { |
|
m.Get("/stars", repo.Stars) |
|
m.Get("/watchers", repo.Watchers) |
|
}, ignSignIn, context.RepoAssignment(), context.RepoRef()) |
|
|
|
m.Group("/:username", func() { |
|
m.Group("", func() { |
|
m.Get("/:reponame", repo.Home) |
|
}, ignSignIn, context.RepoAssignment(true), context.RepoRef()) |
|
|
|
m.Group("/:reponame", func() { |
|
m.Head("/tasks/trigger", repo.TriggerTask) |
|
}) |
|
// Use the regexp to match the repository name validation |
|
m.Group("/:reponame([\\d\\w-_\\.]+\\.git$)", func() { |
|
m.Get("", ignSignIn, context.RepoAssignment(true), context.RepoRef(), repo.Home) |
|
m.Route("/*", "GET,POST", ignSignInAndCsrf, repo.HTTPContexter(), repo.HTTP) |
|
}) |
|
}) |
|
// ***** END: Repository ***** |
|
|
|
m.Group("/api", func() { |
|
apiv1.RegisterRoutes(m) |
|
}, ignSignIn) |
|
|
|
// robots.txt |
|
m.Get("/robots.txt", func(ctx *context.Context) { |
|
if setting.HasRobotsTxt { |
|
ctx.ServeFileContent(path.Join(setting.CustomPath, "robots.txt")) |
|
} else { |
|
ctx.Error(404) |
|
} |
|
}) |
|
|
|
// Not found handler. |
|
m.NotFound(routers.NotFound) |
|
|
|
// Flag for port number in case first time run conflict. |
|
if ctx.IsSet("port") { |
|
setting.AppUrl = strings.Replace(setting.AppUrl, setting.HTTPPort, ctx.String("port"), 1) |
|
setting.HTTPPort = ctx.String("port") |
|
} |
|
|
|
var listenAddr string |
|
if setting.Protocol == setting.SCHEME_UNIX_SOCKET { |
|
listenAddr = fmt.Sprintf("%s", setting.HTTPAddr) |
|
} else { |
|
listenAddr = fmt.Sprintf("%s:%s", setting.HTTPAddr, setting.HTTPPort) |
|
} |
|
log.Info("Listen: %v://%s%s", setting.Protocol, listenAddr, setting.AppSubUrl) |
|
|
|
var err error |
|
switch setting.Protocol { |
|
case setting.SCHEME_HTTP: |
|
err = http.ListenAndServe(listenAddr, m) |
|
case setting.SCHEME_HTTPS: |
|
server := &http.Server{Addr: listenAddr, TLSConfig: &tls.Config{ |
|
MinVersion: tls.VersionTLS10, |
|
CurvePreferences: []tls.CurveID{tls.CurveP521, tls.CurveP384, tls.CurveP256}, |
|
PreferServerCipherSuites: true, |
|
CipherSuites: []uint16{ |
|
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, |
|
tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, // Required for HTTP/2 support. |
|
tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, |
|
tls.TLS_RSA_WITH_AES_256_CBC_SHA, |
|
}, |
|
}, Handler: m} |
|
err = server.ListenAndServeTLS(setting.CertFile, setting.KeyFile) |
|
case setting.SCHEME_FCGI: |
|
err = fcgi.Serve(nil, m) |
|
case setting.SCHEME_UNIX_SOCKET: |
|
os.Remove(listenAddr) |
|
|
|
var listener *net.UnixListener |
|
listener, err = net.ListenUnix("unix", &net.UnixAddr{listenAddr, "unix"}) |
|
if err != nil { |
|
break // Handle error after switch |
|
} |
|
|
|
// FIXME: add proper implementation of signal capture on all protocols |
|
// execute this on SIGTERM or SIGINT: listener.Close() |
|
if err = os.Chmod(listenAddr, os.FileMode(setting.UnixSocketPermission)); err != nil { |
|
log.Fatal(4, "Failed to set permission of unix socket: %v", err) |
|
} |
|
err = http.Serve(listener, m) |
|
default: |
|
log.Fatal(4, "Invalid protocol: %s", setting.Protocol) |
|
} |
|
|
|
if err != nil { |
|
log.Fatal(4, "Fail to start server: %v", err) |
|
} |
|
|
|
return nil |
|
}
|
|
|