// Copyright 2014 The Gogs Authors. All rights reserved.
// Copyright 2017 The Gitea Authors. All rights reserved.
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
package models
import (
"context"
"fmt"
"os"
"path"
"path/filepath"
"sort"
"strconv"
"strings"
"unicode/utf8"
_ "image/jpeg" // Needed for jpeg support
admin_model "code.gitea.io/gitea/models/admin"
asymkey_model "code.gitea.io/gitea/models/asymkey"
"code.gitea.io/gitea/models/db"
"code.gitea.io/gitea/models/perm"
repo_model "code.gitea.io/gitea/models/repo"
"code.gitea.io/gitea/models/unit"
user_model "code.gitea.io/gitea/models/user"
"code.gitea.io/gitea/models/webhook"
"code.gitea.io/gitea/modules/lfs"
"code.gitea.io/gitea/modules/log"
"code.gitea.io/gitea/modules/options"
"code.gitea.io/gitea/modules/setting"
"code.gitea.io/gitea/modules/storage"
api "code.gitea.io/gitea/modules/structs"
"code.gitea.io/gitea/modules/util"
"xorm.io/builder"
)
var (
// Gitignores contains the gitiginore files
Gitignores [ ] string
// Licenses contains the license files
Licenses [ ] string
// Readmes contains the readme files
Readmes [ ] string
// LabelTemplates contains the label template files and the list of labels for each file
LabelTemplates map [ string ] string
// ItemsPerPage maximum items per page in forks, watchers and stars of a repo
ItemsPerPage = 40
)
// loadRepoConfig loads the repository config
func loadRepoConfig ( ) {
// Load .gitignore and license files and readme templates.
types := [ ] string { "gitignore" , "license" , "readme" , "label" }
typeFiles := make ( [ ] [ ] string , 4 )
for i , t := range types {
files , err := options . Dir ( t )
if err != nil {
log . Fatal ( "Failed to get %s files: %v" , t , err )
}
customPath := path . Join ( setting . CustomPath , "options" , t )
isDir , err := util . IsDir ( customPath )
if err != nil {
log . Fatal ( "Failed to get custom %s files: %v" , t , err )
}
if isDir {
customFiles , err := util . StatDir ( customPath )
if err != nil {
log . Fatal ( "Failed to get custom %s files: %v" , t , err )
}
for _ , f := range customFiles {
if ! util . IsStringInSlice ( f , files , true ) {
files = append ( files , f )
}
}
}
typeFiles [ i ] = files
}
Gitignores = typeFiles [ 0 ]
Licenses = typeFiles [ 1 ]
Readmes = typeFiles [ 2 ]
LabelTemplatesFiles := typeFiles [ 3 ]
sort . Strings ( Gitignores )
sort . Strings ( Licenses )
sort . Strings ( Readmes )
sort . Strings ( LabelTemplatesFiles )
// Load label templates
LabelTemplates = make ( map [ string ] string )
for _ , templateFile := range LabelTemplatesFiles {
labels , err := LoadLabelsFormatted ( templateFile )
if err != nil {
log . Error ( "Failed to load labels: %v" , err )
}
LabelTemplates [ templateFile ] = labels
}
// Filter out invalid names and promote preferred licenses.
sortedLicenses := make ( [ ] string , 0 , len ( Licenses ) )
for _ , name := range setting . Repository . PreferredLicenses {
if util . IsStringInSlice ( name , Licenses , true ) {
sortedLicenses = append ( sortedLicenses , name )
}
}
for _ , name := range Licenses {
if ! util . IsStringInSlice ( name , setting . Repository . PreferredLicenses , true ) {
sortedLicenses = append ( sortedLicenses , name )
}
}
Licenses = sortedLicenses
}
// NewRepoContext creates a new repository context
func NewRepoContext ( ) {
loadRepoConfig ( )
unit . LoadUnitConfig ( )
admin_model . RemoveAllWithNotice ( db . DefaultContext , "Clean up repository temporary data" , filepath . Join ( setting . AppDataPath , "tmp" ) )
}
// CheckRepoUnitUser check whether user could visit the unit of this repository
func CheckRepoUnitUser ( repo * repo_model . Repository , user * user_model . User , unitType unit . Type ) bool {
return checkRepoUnitUser ( db . DefaultContext , repo , user , unitType )
}
func checkRepoUnitUser ( ctx context . Context , repo * repo_model . Repository , user * user_model . User , unitType unit . Type ) bool {
if user . IsAdmin {
return true
}
perm , err := getUserRepoPermission ( ctx , repo , user )
if err != nil {
log . Error ( "getUserRepoPermission(): %v" , err )
return false
}
return perm . CanRead ( unitType )
}
func getRepoAssignees ( ctx context . Context , repo * repo_model . Repository ) ( _ [ ] * user_model . User , err error ) {
if err = repo . GetOwner ( ctx ) ; err != nil {
return nil , err
}
e := db . GetEngine ( ctx )
userIDs := make ( [ ] int64 , 0 , 10 )
if err = e . Table ( "access" ) .
Where ( "repo_id = ? AND mode >= ?" , repo . ID , perm . AccessModeWrite ) .
Select ( "id" ) .
Find ( & userIDs ) ; err != nil {
return nil , err
}
additionalUserIDs := make ( [ ] int64 , 0 , 10 )
if err = e . Table ( "team_user" ) .
Join ( "INNER" , "team_repo" , "`team_repo`.team_id = `team_user`.team_id" ) .
Join ( "INNER" , "team_unit" , "`team_unit`.team_id = `team_user`.team_id" ) .
Where ( "`team_repo`.repo_id = ? AND `team_unit`.access_mode >= ?" , repo . ID , perm . AccessModeWrite ) .
Distinct ( "`team_user`.uid" ) .
Select ( "`team_user`.uid" ) .
Find ( & additionalUserIDs ) ; err != nil {
return nil , err
}
uidMap := map [ int64 ] bool { }
i := 0
for _ , uid := range userIDs {
if uidMap [ uid ] {
continue
}
uidMap [ uid ] = true
userIDs [ i ] = uid
i ++
}
userIDs = userIDs [ : i ]
userIDs = append ( userIDs , additionalUserIDs ... )
for _ , uid := range additionalUserIDs {
if uidMap [ uid ] {
continue
}
userIDs [ i ] = uid
i ++
}
userIDs = userIDs [ : i ]
// Leave a seat for owner itself to append later, but if owner is an organization
// and just waste 1 unit is cheaper than re-allocate memory once.
users := make ( [ ] * user_model . User , 0 , len ( userIDs ) + 1 )
if len ( userIDs ) > 0 {
if err = e . In ( "id" , userIDs ) . Find ( & users ) ; err != nil {
return nil , err
}
}
if ! repo . Owner . IsOrganization ( ) && ! uidMap [ repo . OwnerID ] {
users = append ( users , repo . Owner )
}
return users , nil
}
// GetRepoAssignees returns all users that have write access and can be assigned to issues
// of the repository,
func GetRepoAssignees ( repo * repo_model . Repository ) ( _ [ ] * user_model . User , err error ) {
return getRepoAssignees ( db . DefaultContext , repo )
}
func getReviewers ( ctx context . Context , repo * repo_model . Repository , doerID , posterID int64 ) ( [ ] * user_model . User , error ) {
// Get the owner of the repository - this often already pre-cached and if so saves complexity for the following queries
if err := repo . GetOwner ( ctx ) ; err != nil {
return nil , err
}
var users [ ] * user_model . User
e := db . GetEngine ( ctx )
if repo . IsPrivate || repo . Owner . Visibility == api . VisibleTypePrivate {
// This a private repository:
// Anyone who can read the repository is a requestable reviewer
if err := e .
SQL ( "SELECT * FROM `user` WHERE id in (SELECT user_id FROM `access` WHERE repo_id = ? AND mode >= ? AND user_id NOT IN ( ?, ?)) ORDER BY name" ,
repo . ID , perm . AccessModeRead ,
doerID , posterID ) .
Find ( & users ) ; err != nil {
return nil , err
}
return users , nil
}
// This is a "public" repository:
// Any user that has read access, is a watcher or organization member can be requested to review
if err := e .
SQL ( "SELECT * FROM `user` WHERE id IN ( " +
"SELECT user_id FROM `access` WHERE repo_id = ? AND mode >= ? " +
"UNION " +
"SELECT user_id FROM `watch` WHERE repo_id = ? AND mode IN (?, ?) " +
"UNION " +
"SELECT uid AS user_id FROM `org_user` WHERE org_id = ? " +
") AND id NOT IN (?, ?) ORDER BY name" ,
repo . ID , perm . AccessModeRead ,
repo . ID , repo_model . WatchModeNormal , repo_model . WatchModeAuto ,
repo . OwnerID ,
doerID , posterID ) .
Find ( & users ) ; err != nil {
return nil , err
}
return users , nil
}
// GetReviewers get all users can be requested to review:
// * for private repositories this returns all users that have read access or higher to the repository.
// * for public repositories this returns all users that have read access or higher to the repository,
// all repo watchers and all organization members.
// TODO: may be we should have a busy choice for users to block review request to them.
func GetReviewers ( repo * repo_model . Repository , doerID , posterID int64 ) ( [ ] * user_model . User , error ) {
return getReviewers ( db . DefaultContext , repo , doerID , posterID )
}
// GetReviewerTeams get all teams can be requested to review
func GetReviewerTeams ( repo * repo_model . Repository ) ( [ ] * Team , error ) {
if err := repo . GetOwner ( db . DefaultContext ) ; err != nil {
return nil , err
}
if ! repo . Owner . IsOrganization ( ) {
return nil , nil
}
teams , err := GetTeamsWithAccessToRepo ( repo . OwnerID , repo . ID , perm . AccessModeRead )
if err != nil {
return nil , err
}
return teams , err
}
func updateRepoSize ( e db . Engine , repo * repo_model . Repository ) error {
size , err := util . GetDirectorySize ( repo . RepoPath ( ) )
if err != nil {
return fmt . Errorf ( "updateSize: %v" , err )
}
lfsSize , err := e . Where ( "repository_id = ?" , repo . ID ) . SumInt ( new ( LFSMetaObject ) , "size" )
if err != nil {
return fmt . Errorf ( "updateSize: GetLFSMetaObjects: %v" , err )
}
repo . Size = size + lfsSize
_ , err = e . ID ( repo . ID ) . Cols ( "size" ) . NoAutoTime ( ) . Update ( repo )
return err
}
// UpdateRepoSize updates the repository size, calculating it using util.GetDirectorySize
func UpdateRepoSize ( ctx context . Context , repo * repo_model . Repository ) error {
return updateRepoSize ( db . GetEngine ( ctx ) , repo )
}
// CanUserForkRepo returns true if specified user can fork repository.
func CanUserForkRepo ( user * user_model . User , repo * repo_model . Repository ) ( bool , error ) {
if user == nil {
return false , nil
}
if repo . OwnerID != user . ID && ! repo_model . HasForkedRepo ( user . ID , repo . ID ) {
return true , nil
}
ownedOrgs , err := GetOrgsCanCreateRepoByUserID ( user . ID )
if err != nil {
return false , err
}
for _ , org := range ownedOrgs {
if repo . OwnerID != org . ID && ! repo_model . HasForkedRepo ( org . ID , repo . ID ) {
return true , nil
}
}
return false , nil
}
// FindUserOrgForks returns the forked repositories for one user from a repository
func FindUserOrgForks ( repoID , userID int64 ) ( [ ] * repo_model . Repository , error ) {
var cond builder . Cond = builder . And (
builder . Eq { "fork_id" : repoID } ,
builder . In ( "owner_id" ,
builder . Select ( "org_id" ) .
From ( "org_user" ) .
Where ( builder . Eq { "uid" : userID } ) ,
) ,
)
var repos [ ] * repo_model . Repository
return repos , db . GetEngine ( db . DefaultContext ) . Table ( "repository" ) . Where ( cond ) . Find ( & repos )
}
// GetForksByUserAndOrgs return forked repos of the user and owned orgs
func GetForksByUserAndOrgs ( user * user_model . User , repo * repo_model . Repository ) ( [ ] * repo_model . Repository , error ) {
var repoList [ ] * repo_model . Repository
if user == nil {
return repoList , nil
}
forkedRepo , err := repo_model . GetUserFork ( repo . ID , user . ID )
if err != nil {
return repoList , err
}
if forkedRepo != nil {
repoList = append ( repoList , forkedRepo )
}
orgForks , err := FindUserOrgForks ( repo . ID , user . ID )
if err != nil {
return nil , err
}
repoList = append ( repoList , orgForks ... )
return repoList , nil
}
// CanUserDelete returns true if user could delete the repository
func CanUserDelete ( repo * repo_model . Repository , user * user_model . User ) ( bool , error ) {
if user . IsAdmin || user . ID == repo . OwnerID {
return true , nil
}
if err := repo . GetOwner ( db . DefaultContext ) ; err != nil {
return false , err
}
if repo . Owner . IsOrganization ( ) {
isOwner , err := OrgFromUser ( repo . Owner ) . IsOwnedBy ( user . ID )
if err != nil {
return false , err
} else if isOwner {
return true , nil
}
}
return false , nil
}
// getUsersWithAccessMode returns users that have at least given access mode to the repository.
func getUsersWithAccessMode ( ctx context . Context , repo * repo_model . Repository , mode perm . AccessMode ) ( _ [ ] * user_model . User , err error ) {
if err = repo . GetOwner ( ctx ) ; err != nil {
return nil , err
}
e := db . GetEngine ( ctx )
accesses := make ( [ ] * Access , 0 , 10 )
if err = e . Where ( "repo_id = ? AND mode >= ?" , repo . ID , mode ) . Find ( & accesses ) ; err != nil {
return nil , err
}
// Leave a seat for owner itself to append later, but if owner is an organization
// and just waste 1 unit is cheaper than re-allocate memory once.
users := make ( [ ] * user_model . User , 0 , len ( accesses ) + 1 )
if len ( accesses ) > 0 {
userIDs := make ( [ ] int64 , len ( accesses ) )
for i := 0 ; i < len ( accesses ) ; i ++ {
userIDs [ i ] = accesses [ i ] . UserID
}
if err = e . In ( "id" , userIDs ) . Find ( & users ) ; err != nil {
return nil , err
}
}
if ! repo . Owner . IsOrganization ( ) {
users = append ( users , repo . Owner )
}
return users , nil
}
// SetRepoReadBy sets repo to be visited by given user.
func SetRepoReadBy ( repoID , userID int64 ) error {
return setRepoNotificationStatusReadIfUnread ( db . GetEngine ( db . DefaultContext ) , userID , repoID )
}
// CreateRepoOptions contains the create repository options
type CreateRepoOptions struct {
Name string
Description string
OriginalURL string
GitServiceType api . GitServiceType
Gitignores string
IssueLabels string
License string
Readme string
DefaultBranch string
IsPrivate bool
IsMirror bool
IsTemplate bool
AutoInit bool
Status repo_model . RepositoryStatus
TrustModel repo_model . TrustModelType
MirrorInterval string
}
// GetRepoInitFile returns repository init files
func GetRepoInitFile ( tp , name string ) ( [ ] byte , error ) {
cleanedName := strings . TrimLeft ( path . Clean ( "/" + name ) , "/" )
relPath := path . Join ( "options" , tp , cleanedName )
// Use custom file when available.
customPath := path . Join ( setting . CustomPath , relPath )
isFile , err := util . IsFile ( customPath )
if err != nil {
log . Error ( "Unable to check if %s is a file. Error: %v" , customPath , err )
}
if isFile {
return os . ReadFile ( customPath )
}
switch tp {
case "readme" :
return options . Readme ( cleanedName )
case "gitignore" :
return options . Gitignore ( cleanedName )
case "license" :
return options . License ( cleanedName )
case "label" :
return options . Labels ( cleanedName )
default :
return [ ] byte { } , fmt . Errorf ( "Invalid init file type" )
}
}
// CreateRepository creates a repository for the user/organization.
func CreateRepository ( ctx context . Context , doer , u * user_model . User , repo * repo_model . Repository , overwriteOrAdopt bool ) ( err error ) {
if err = repo_model . IsUsableRepoName ( repo . Name ) ; err != nil {
return err
}
has , err := repo_model . IsRepositoryExistCtx ( ctx , u , repo . Name )
if err != nil {
return fmt . Errorf ( "IsRepositoryExist: %v" , err )
} else if has {
return repo_model . ErrRepoAlreadyExist {
Uname : u . Name ,
Name : repo . Name ,
}
}
repoPath := repo_model . RepoPath ( u . Name , repo . Name )
isExist , err := util . IsExist ( repoPath )
if err != nil {
log . Error ( "Unable to check if %s exists. Error: %v" , repoPath , err )
return err
}
if ! overwriteOrAdopt && isExist {
log . Error ( "Files already exist in %s and we are not going to adopt or delete." , repoPath )
return repo_model . ErrRepoFilesAlreadyExist {
Uname : u . Name ,
Name : repo . Name ,
}
}
if err = db . Insert ( ctx , repo ) ; err != nil {
return err
}
if err = repo_model . DeleteRedirect ( ctx , u . ID , repo . Name ) ; err != nil {
return err
}
// insert units for repo
units := make ( [ ] repo_model . RepoUnit , 0 , len ( unit . DefaultRepoUnits ) )
for _ , tp := range unit . DefaultRepoUnits {
if tp == unit . TypeIssues {
units = append ( units , repo_model . RepoUnit {
RepoID : repo . ID ,
Type : tp ,
Config : & repo_model . IssuesConfig {
EnableTimetracker : setting . Service . DefaultEnableTimetracking ,
AllowOnlyContributorsToTrackTime : setting . Service . DefaultAllowOnlyContributorsToTrackTime ,
EnableDependencies : setting . Service . DefaultEnableDependencies ,
} ,
} )
} else if tp == unit . TypePullRequests {
units = append ( units , repo_model . RepoUnit {
RepoID : repo . ID ,
Type : tp ,
Config : & repo_model . PullRequestsConfig { AllowMerge : true , AllowRebase : true , AllowRebaseMerge : true , AllowSquash : true , DefaultMergeStyle : repo_model . MergeStyleMerge } ,
} )
} else {
units = append ( units , repo_model . RepoUnit {
RepoID : repo . ID ,
Type : tp ,
} )
}
}
if err = db . Insert ( ctx , units ) ; err != nil {
return err
}
// Remember visibility preference.
u . LastRepoVisibility = repo . IsPrivate
if err = user_model . UpdateUserColsEngine ( db . GetEngine ( ctx ) , u , "last_repo_visibility" ) ; err != nil {
return fmt . Errorf ( "updateUser: %v" , err )
}
if _ , err = db . GetEngine ( ctx ) . Incr ( "num_repos" ) . ID ( u . ID ) . Update ( new ( user_model . User ) ) ; err != nil {
return fmt . Errorf ( "increment user total_repos: %v" , err )
}
u . NumRepos ++
// Give access to all members in teams with access to all repositories.
if u . IsOrganization ( ) {
teams , err := OrgFromUser ( u ) . loadTeams ( db . GetEngine ( ctx ) )
if err != nil {
return fmt . Errorf ( "loadTeams: %v" , err )
}
for _ , t := range teams {
if t . IncludesAllRepositories {
if err := t . addRepository ( ctx , repo ) ; err != nil {
return fmt . Errorf ( "addRepository: %v" , err )
}
}
}
if isAdmin , err := isUserRepoAdmin ( db . GetEngine ( ctx ) , repo , doer ) ; err != nil {
return fmt . Errorf ( "isUserRepoAdmin: %v" , err )
} else if ! isAdmin {
// Make creator repo admin if it wasn't assigned automatically
if err = addCollaborator ( ctx , repo , doer ) ; err != nil {
return fmt . Errorf ( "AddCollaborator: %v" , err )
}
if err = changeCollaborationAccessMode ( db . GetEngine ( ctx ) , repo , doer . ID , perm . AccessModeAdmin ) ; err != nil {
return fmt . Errorf ( "ChangeCollaborationAccessMode: %v" , err )
}
}
} else if err = recalculateAccesses ( ctx , repo ) ; err != nil {
// Organization automatically called this in addRepository method.
return fmt . Errorf ( "recalculateAccesses: %v" , err )
}
if setting . Service . AutoWatchNewRepos {
if err = repo_model . WatchRepoCtx ( ctx , doer . ID , repo . ID , true ) ; err != nil {
return fmt . Errorf ( "watchRepo: %v" , err )
}
}
if err = webhook . CopyDefaultWebhooksToRepo ( ctx , repo . ID ) ; err != nil {
return fmt . Errorf ( "copyDefaultWebhooksToRepo: %v" , err )
}
return nil
}
// CheckDaemonExportOK creates/removes git-daemon-export-ok for git-daemon...
func CheckDaemonExportOK ( ctx context . Context , repo * repo_model . Repository ) error {
if err := repo . GetOwner ( ctx ) ; err != nil {
return err
}
// Create/Remove git-daemon-export-ok for git-daemon...
daemonExportFile := path . Join ( repo . RepoPath ( ) , ` git-daemon-export-ok ` )
isExist , err := util . IsExist ( daemonExportFile )
if err != nil {
log . Error ( "Unable to check if %s exists. Error: %v" , daemonExportFile , err )
return err
}
isPublic := ! repo . IsPrivate && repo . Owner . Visibility == api . VisibleTypePublic
if ! isPublic && isExist {
if err = util . Remove ( daemonExportFile ) ; err != nil {
log . Error ( "Failed to remove %s: %v" , daemonExportFile , err )
}
} else if isPublic && ! isExist {
if f , err := os . Create ( daemonExportFile ) ; err != nil {
log . Error ( "Failed to create %s: %v" , daemonExportFile , err )
} else {
f . Close ( )
}
}
return nil
}
// IncrementRepoForkNum increment repository fork number
func IncrementRepoForkNum ( ctx context . Context , repoID int64 ) error {
_ , err := db . GetEngine ( ctx ) . Exec ( "UPDATE `repository` SET num_forks=num_forks+1 WHERE id=?" , repoID )
return err
}
// DecrementRepoForkNum decrement repository fork number
func DecrementRepoForkNum ( ctx context . Context , repoID int64 ) error {
_ , err := db . GetEngine ( ctx ) . Exec ( "UPDATE `repository` SET num_forks=num_forks-1 WHERE id=?" , repoID )
return err
}
func updateRepository ( ctx context . Context , repo * repo_model . Repository , visibilityChanged bool ) ( err error ) {
repo . LowerName = strings . ToLower ( repo . Name )
if utf8 . RuneCountInString ( repo . Description ) > 255 {
repo . Description = string ( [ ] rune ( repo . Description ) [ : 255 ] )
}
if utf8 . RuneCountInString ( repo . Website ) > 255 {
repo . Website = string ( [ ] rune ( repo . Website ) [ : 255 ] )
}
e := db . GetEngine ( ctx )
if _ , err = e . ID ( repo . ID ) . AllCols ( ) . Update ( repo ) ; err != nil {
return fmt . Errorf ( "update: %v" , err )
}
if err = updateRepoSize ( e , repo ) ; err != nil {
log . Error ( "Failed to update size for repository: %v" , err )
}
if visibilityChanged {
if err = repo . GetOwner ( ctx ) ; err != nil {
return fmt . Errorf ( "getOwner: %v" , err )
}
if repo . Owner . IsOrganization ( ) {
// Organization repository need to recalculate access table when visibility is changed.
if err = recalculateTeamAccesses ( ctx , repo , 0 ) ; err != nil {
return fmt . Errorf ( "recalculateTeamAccesses: %v" , err )
}
}
// If repo has become private, we need to set its actions to private.
if repo . IsPrivate {
_ , err = e . Where ( "repo_id = ?" , repo . ID ) . Cols ( "is_private" ) . Update ( & Action {
IsPrivate : true ,
} )
if err != nil {
return err
}
}
// Create/Remove git-daemon-export-ok for git-daemon...
if err := CheckDaemonExportOK ( db . WithEngine ( ctx , e ) , repo ) ; err != nil {
return err
}
forkRepos , err := repo_model . GetRepositoriesByForkID ( ctx , repo . ID )
if err != nil {
return fmt . Errorf ( "getRepositoriesByForkID: %v" , err )
}
for i := range forkRepos {
forkRepos [ i ] . IsPrivate = repo . IsPrivate || repo . Owner . Visibility == api . VisibleTypePrivate
if err = updateRepository ( ctx , forkRepos [ i ] , true ) ; err != nil {
return fmt . Errorf ( "updateRepository[%d]: %v" , forkRepos [ i ] . ID , err )
}
}
}
return nil
}
// UpdateRepositoryCtx updates a repository with db context
func UpdateRepositoryCtx ( ctx context . Context , repo * repo_model . Repository , visibilityChanged bool ) error {
return updateRepository ( ctx , repo , visibilityChanged )
}
// UpdateRepository updates a repository
func UpdateRepository ( repo * repo_model . Repository , visibilityChanged bool ) ( err error ) {
ctx , committer , err := db . TxContext ( )
if err != nil {
return err
}
defer committer . Close ( )
if err = updateRepository ( ctx , repo , visibilityChanged ) ; err != nil {
return fmt . Errorf ( "updateRepository: %v" , err )
}
return committer . Commit ( )
}
// DeleteRepository deletes a repository for a user or organization.
// make sure if you call this func to close open sessions (sqlite will otherwise get a deadlock)
func DeleteRepository ( doer * user_model . User , uid , repoID int64 ) error {
ctx , committer , err := db . TxContext ( )
if err != nil {
return err
}
defer committer . Close ( )
sess := db . GetEngine ( ctx )
// In case is a organization.
org , err := user_model . GetUserByIDEngine ( sess , uid )
if err != nil {
return err
}
repo := & repo_model . Repository { OwnerID : uid }
has , err := sess . ID ( repoID ) . Get ( repo )
if err != nil {
return err
} else if ! has {
return repo_model . ErrRepoNotExist {
ID : repoID ,
UID : uid ,
OwnerName : "" ,
Name : "" ,
}
}
// Delete Deploy Keys
deployKeys , err := asymkey_model . ListDeployKeys ( ctx , & asymkey_model . ListDeployKeysOptions { RepoID : repoID } )
if err != nil {
return fmt . Errorf ( "listDeployKeys: %v" , err )
}
needRewriteKeysFile := len ( deployKeys ) > 0
for _ , dKey := range deployKeys {
if err := DeleteDeployKey ( ctx , doer , dKey . ID ) ; err != nil {
return fmt . Errorf ( "deleteDeployKeys: %v" , err )
}
}
if cnt , err := sess . ID ( repoID ) . Delete ( & repo_model . Repository { } ) ; err != nil {
return err
} else if cnt != 1 {
return repo_model . ErrRepoNotExist {
ID : repoID ,
UID : uid ,
OwnerName : "" ,
Name : "" ,
}
}
if org . IsOrganization ( ) {
teams , err := OrgFromUser ( org ) . loadTeams ( sess )
if err != nil {
return err
}
for _ , t := range teams {
if ! t . hasRepository ( sess , repoID ) {
continue
} else if err = t . removeRepository ( ctx , repo , false ) ; err != nil {
return err
}
}
}
attachments := make ( [ ] * repo_model . Attachment , 0 , 20 )
if err = sess . Join ( "INNER" , "`release`" , "`release`.id = `attachment`.release_id" ) .
Where ( "`release`.repo_id = ?" , repoID ) .
Find ( & attachments ) ; err != nil {
return err
}
releaseAttachments := make ( [ ] string , 0 , len ( attachments ) )
for i := 0 ; i < len ( attachments ) ; i ++ {
releaseAttachments = append ( releaseAttachments , attachments [ i ] . RelativePath ( ) )
}
if _ , err := sess . Exec ( "UPDATE `user` SET num_stars=num_stars-1 WHERE id IN (SELECT `uid` FROM `star` WHERE repo_id = ?)" , repo . ID ) ; err != nil {
return err
}
if err := db . DeleteBeans ( ctx ,
& Access { RepoID : repo . ID } ,
& Action { RepoID : repo . ID } ,
& Collaboration { RepoID : repoID } ,
& Comment { RefRepoID : repoID } ,
& CommitStatus { RepoID : repoID } ,
& DeletedBranch { RepoID : repoID } ,
& webhook . HookTask { RepoID : repoID } ,
& LFSLock { RepoID : repoID } ,
& repo_model . LanguageStat { RepoID : repoID } ,
& Milestone { RepoID : repoID } ,
& repo_model . Mirror { RepoID : repoID } ,
& Notification { RepoID : repoID } ,
& ProtectedBranch { RepoID : repoID } ,
& ProtectedTag { RepoID : repoID } ,
& PullRequest { BaseRepoID : repoID } ,
& repo_model . PushMirror { RepoID : repoID } ,
& Release { RepoID : repoID } ,
& repo_model . RepoIndexerStatus { RepoID : repoID } ,
& repo_model . Redirect { RedirectRepoID : repoID } ,
& repo_model . RepoUnit { RepoID : repoID } ,
& repo_model . Star { RepoID : repoID } ,
& Task { RepoID : repoID } ,
& repo_model . Watch { RepoID : repoID } ,
& webhook . Webhook { RepoID : repoID } ,
) ; err != nil {
return fmt . Errorf ( "deleteBeans: %v" , err )
}
// Delete Labels and related objects
if err := deleteLabelsByRepoID ( sess , repoID ) ; err != nil {
return err
}
// Delete Issues and related objects
var attachmentPaths [ ] string
if attachmentPaths , err = deleteIssuesByRepoID ( sess , repoID ) ; err != nil {
return err
}
// Delete issue index
if err := db . DeleteResouceIndex ( sess , "issue_index" , repoID ) ; err != nil {
return err
}
if repo . IsFork {
if _ , err := sess . Exec ( "UPDATE `repository` SET num_forks=num_forks-1 WHERE id=?" , repo . ForkID ) ; err != nil {
return fmt . Errorf ( "decrease fork count: %v" , err )
}
}
if _ , err := sess . Exec ( "UPDATE `user` SET num_repos=num_repos-1 WHERE id=?" , uid ) ; err != nil {
return err
}
if len ( repo . Topics ) > 0 {
if err := repo_model . RemoveTopicsFromRepo ( ctx , repo . ID ) ; err != nil {
return err
}
}
projects , _ , err := getProjects ( sess , ProjectSearchOptions {
RepoID : repoID ,
} )
if err != nil {
return fmt . Errorf ( "get projects: %v" , err )
}
for i := range projects {
if err := deleteProjectByID ( sess , projects [ i ] . ID ) ; err != nil {
return fmt . Errorf ( "delete project [%d]: %v" , projects [ i ] . ID , err )
}
}
// Remove LFS objects
var lfsObjects [ ] * LFSMetaObject
if err = sess . Where ( "repository_id=?" , repoID ) . Find ( & lfsObjects ) ; err != nil {
return err
}
lfsPaths := make ( [ ] string , 0 , len ( lfsObjects ) )
for _ , v := range lfsObjects {
count , err := sess . Count ( & LFSMetaObject { Pointer : lfs . Pointer { Oid : v . Oid } } )
if err != nil {
return err
}
if count > 1 {
continue
}
lfsPaths = append ( lfsPaths , v . RelativePath ( ) )
}
if _ , err := sess . Delete ( & LFSMetaObject { RepositoryID : repoID } ) ; err != nil {
return err
}
// Remove archives
var archives [ ] * repo_model . RepoArchiver
if err = sess . Where ( "repo_id=?" , repoID ) . Find ( & archives ) ; err != nil {
return err
}
archivePaths := make ( [ ] string , 0 , len ( archives ) )
for _ , v := range archives {
p , _ := v . RelativePath ( )
archivePaths = append ( archivePaths , p )
}
if _ , err := sess . Delete ( & repo_model . RepoArchiver { RepoID : repoID } ) ; err != nil {
return err
}
if repo . NumForks > 0 {
if _ , err = sess . Exec ( "UPDATE `repository` SET fork_id=0,is_fork=? WHERE fork_id=?" , false , repo . ID ) ; err != nil {
log . Error ( "reset 'fork_id' and 'is_fork': %v" , err )
}
}
// Get all attachments with both issue_id and release_id are zero
var newAttachments [ ] * repo_model . Attachment
if err := sess . Where ( builder . Eq {
"repo_id" : repo . ID ,
"issue_id" : 0 ,
"release_id" : 0 ,
} ) . Find ( & newAttachments ) ; err != nil {
return err
}
newAttachmentPaths := make ( [ ] string , 0 , len ( newAttachments ) )
for _ , attach := range newAttachments {
newAttachmentPaths = append ( newAttachmentPaths , attach . RelativePath ( ) )
}
if _ , err := sess . Where ( "repo_id=?" , repo . ID ) . Delete ( new ( repo_model . Attachment ) ) ; err != nil {
return err
}
if err = committer . Commit ( ) ; err != nil {
return err
}
committer . Close ( )
if needRewriteKeysFile {
if err := asymkey_model . RewriteAllPublicKeys ( ) ; err != nil {
log . Error ( "RewriteAllPublicKeys failed: %v" , err )
}
}
// We should always delete the files after the database transaction succeed. If
// we delete the file but the database rollback, the repository will be broken.
// Remove repository files.
repoPath := repo . RepoPath ( )
admin_model . RemoveAllWithNotice ( db . DefaultContext , "Delete repository files" , repoPath )
// Remove wiki files
if repo . HasWiki ( ) {
admin_model . RemoveAllWithNotice ( db . DefaultContext , "Delete repository wiki" , repo . WikiPath ( ) )
}
// Remove archives
for i := range archivePaths {
admin_model . RemoveStorageWithNotice ( db . DefaultContext , storage . RepoArchives , "Delete repo archive file" , archivePaths [ i ] )
}
// Remove lfs objects
for i := range lfsPaths {
admin_model . RemoveStorageWithNotice ( db . DefaultContext , storage . LFS , "Delete orphaned LFS file" , lfsPaths [ i ] )
}
// Remove issue attachment files.
for i := range attachmentPaths {
admin_model . RemoveStorageWithNotice ( db . DefaultContext , storage . Attachments , "Delete issue attachment" , attachmentPaths [ i ] )
}
// Remove release attachment files.
for i := range releaseAttachments {
admin_model . RemoveStorageWithNotice ( db . DefaultContext , storage . Attachments , "Delete release attachment" , releaseAttachments [ i ] )
}
// Remove attachment with no issue_id and release_id.
for i := range newAttachmentPaths {
admin_model . RemoveStorageWithNotice ( db . DefaultContext , storage . Attachments , "Delete issue attachment" , attachmentPaths [ i ] )
}
if len ( repo . Avatar ) > 0 {
if err := storage . RepoAvatars . Delete ( repo . CustomAvatarRelativePath ( ) ) ; err != nil {
return fmt . Errorf ( "Failed to remove %s: %v" , repo . Avatar , err )
}
}
return nil
}
type repoChecker struct {
querySQL func ( ctx context . Context ) ( [ ] map [ string ] [ ] byte , error )
correctSQL func ( ctx context . Context , id int64 ) error
desc string
}
func repoStatsCheck ( ctx context . Context , checker * repoChecker ) {
results , err := checker . querySQL ( ctx )
if err != nil {
log . Error ( "Select %s: %v" , checker . desc , err )
return
}
for _ , result := range results {
id , _ := strconv . ParseInt ( string ( result [ "id" ] ) , 10 , 64 )
select {
case <- ctx . Done ( ) :
log . Warn ( "CheckRepoStats: Cancelled before checking %s for with id=%d" , checker . desc , id )
return
default :
}
log . Trace ( "Updating %s: %d" , checker . desc , id )
err = checker . correctSQL ( ctx , id )
if err != nil {
log . Error ( "Update %s[%d]: %v" , checker . desc , id , err )
}
}
}
func StatsCorrectSQL ( ctx context . Context , sql string , id int64 ) error {
_ , err := db . GetEngine ( ctx ) . Exec ( sql , id , id )
return err
}
func repoStatsCorrectNumWatches ( ctx context . Context , id int64 ) error {
return StatsCorrectSQL ( ctx , "UPDATE `repository` SET num_watches=(SELECT COUNT(*) FROM `watch` WHERE repo_id=? AND mode<>2) WHERE id=?" , id )
}
func repoStatsCorrectNumStars ( ctx context . Context , id int64 ) error {
return StatsCorrectSQL ( ctx , "UPDATE `repository` SET num_stars=(SELECT COUNT(*) FROM `star` WHERE repo_id=?) WHERE id=?" , id )
}
func labelStatsCorrectNumIssues ( ctx context . Context , id int64 ) error {
return StatsCorrectSQL ( ctx , "UPDATE `label` SET num_issues=(SELECT COUNT(*) FROM `issue_label` WHERE label_id=?) WHERE id=?" , id )
}
func labelStatsCorrectNumIssuesRepo ( ctx context . Context , id int64 ) error {
_ , err := db . GetEngine ( ctx ) . Exec ( "UPDATE `label` SET num_issues=(SELECT COUNT(*) FROM `issue_label` WHERE label_id=id) WHERE repo_id=?" , id )
return err
}
func labelStatsCorrectNumClosedIssues ( ctx context . Context , id int64 ) error {
_ , err := db . GetEngine ( ctx ) . Exec ( "UPDATE `label` SET num_closed_issues=(SELECT COUNT(*) FROM `issue_label`,`issue` WHERE `issue_label`.label_id=`label`.id AND `issue_label`.issue_id=`issue`.id AND `issue`.is_closed=?) WHERE `label`.id=?" , true , id )
return err
}
func labelStatsCorrectNumClosedIssuesRepo ( ctx context . Context , id int64 ) error {
_ , err := db . GetEngine ( ctx ) . Exec ( "UPDATE `label` SET num_closed_issues=(SELECT COUNT(*) FROM `issue_label`,`issue` WHERE `issue_label`.label_id=`label`.id AND `issue_label`.issue_id=`issue`.id AND `issue`.is_closed=?) WHERE `label`.repo_id=?" , true , id )
return err
}
var milestoneStatsQueryNumIssues = "SELECT `milestone`.id FROM `milestone` WHERE `milestone`.num_closed_issues!=(SELECT COUNT(*) FROM `issue` WHERE `issue`.milestone_id=`milestone`.id AND `issue`.is_closed=?) OR `milestone`.num_issues!=(SELECT COUNT(*) FROM `issue` WHERE `issue`.milestone_id=`milestone`.id)"
func milestoneStatsCorrectNumIssues ( ctx context . Context , id int64 ) error {
return updateMilestoneCounters ( ctx , id )
}
func milestoneStatsCorrectNumIssuesRepo ( ctx context . Context , id int64 ) error {
e := db . GetEngine ( ctx )
results , err := e . Query ( milestoneStatsQueryNumIssues + " AND `milestone`.repo_id = ?" , true , id )
if err != nil {
return err
}
for _ , result := range results {
id , _ := strconv . ParseInt ( string ( result [ "id" ] ) , 10 , 64 )
err = milestoneStatsCorrectNumIssues ( ctx , id )
if err != nil {
return err
}
}
return nil
}
func userStatsCorrectNumRepos ( ctx context . Context , id int64 ) error {
return StatsCorrectSQL ( ctx , "UPDATE `user` SET num_repos=(SELECT COUNT(*) FROM `repository` WHERE owner_id=?) WHERE id=?" , id )
}
func repoStatsCorrectIssueNumComments ( ctx context . Context , id int64 ) error {
return StatsCorrectSQL ( ctx , "UPDATE `issue` SET num_comments=(SELECT COUNT(*) FROM `comment` WHERE issue_id=? AND type=0) WHERE id=?" , id )
}
func repoStatsCorrectNumIssues ( ctx context . Context , id int64 ) error {
return repoStatsCorrectNum ( ctx , id , false , "num_issues" )
}
func repoStatsCorrectNumPulls ( ctx context . Context , id int64 ) error {
return repoStatsCorrectNum ( ctx , id , true , "num_pulls" )
}
func repoStatsCorrectNum ( ctx context . Context , id int64 , isPull bool , field string ) error {
_ , err := db . GetEngine ( ctx ) . Exec ( "UPDATE `repository` SET " + field + "=(SELECT COUNT(*) FROM `issue` WHERE repo_id=? AND is_pull=?) WHERE id=?" , id , isPull , id )
return err
}
func repoStatsCorrectNumClosedIssues ( ctx context . Context , id int64 ) error {
return repoStatsCorrectNumClosed ( ctx , id , false , "num_closed_issues" )
}
func repoStatsCorrectNumClosedPulls ( ctx context . Context , id int64 ) error {
return repoStatsCorrectNumClosed ( ctx , id , true , "num_closed_pulls" )
}
func repoStatsCorrectNumClosed ( ctx context . Context , id int64 , isPull bool , field string ) error {
_ , err := db . GetEngine ( ctx ) . Exec ( "UPDATE `repository` SET " + field + "=(SELECT COUNT(*) FROM `issue` WHERE repo_id=? AND is_closed=? AND is_pull=?) WHERE id=?" , id , true , isPull , id )
return err
}
func statsQuery ( args ... interface { } ) func ( context . Context ) ( [ ] map [ string ] [ ] byte , error ) {
return func ( ctx context . Context ) ( [ ] map [ string ] [ ] byte , error ) {
return db . GetEngine ( ctx ) . Query ( args ... )
}
}
// CheckRepoStats checks the repository stats
func CheckRepoStats ( ctx context . Context ) error {
log . Trace ( "Doing: CheckRepoStats" )
checkers := [ ] * repoChecker {
// Repository.NumWatches
{
statsQuery ( "SELECT repo.id FROM `repository` repo WHERE repo.num_watches!=(SELECT COUNT(*) FROM `watch` WHERE repo_id=repo.id AND mode<>2)" ) ,
repoStatsCorrectNumWatches ,
"repository count 'num_watches'" ,
} ,
// Repository.NumStars
{
statsQuery ( "SELECT repo.id FROM `repository` repo WHERE repo.num_stars!=(SELECT COUNT(*) FROM `star` WHERE repo_id=repo.id)" ) ,
repoStatsCorrectNumStars ,
"repository count 'num_stars'" ,
} ,
// Repository.NumClosedIssues
{
statsQuery ( "SELECT repo.id FROM `repository` repo WHERE repo.num_closed_issues!=(SELECT COUNT(*) FROM `issue` WHERE repo_id=repo.id AND is_closed=? AND is_pull=?)" , true , false ) ,
repoStatsCorrectNumClosedIssues ,
"repository count 'num_closed_issues'" ,
} ,
// Repository.NumClosedPulls
{
statsQuery ( "SELECT repo.id FROM `repository` repo WHERE repo.num_closed_issues!=(SELECT COUNT(*) FROM `issue` WHERE repo_id=repo.id AND is_closed=? AND is_pull=?)" , true , true ) ,
repoStatsCorrectNumClosedPulls ,
"repository count 'num_closed_pulls'" ,
} ,
// Label.NumIssues
{
statsQuery ( "SELECT label.id FROM `label` WHERE label.num_issues!=(SELECT COUNT(*) FROM `issue_label` WHERE label_id=label.id)" ) ,
labelStatsCorrectNumIssues ,
"label count 'num_issues'" ,
} ,
// Label.NumClosedIssues
{
statsQuery ( "SELECT `label`.id FROM `label` WHERE `label`.num_closed_issues!=(SELECT COUNT(*) FROM `issue_label`,`issue` WHERE `issue_label`.label_id=`label`.id AND `issue_label`.issue_id=`issue`.id AND `issue`.is_closed=?)" , true ) ,
labelStatsCorrectNumClosedIssues ,
"label count 'num_closed_issues'" ,
} ,
// Milestone.Num{,Closed}Issues
{
statsQuery ( milestoneStatsQueryNumIssues , true ) ,
milestoneStatsCorrectNumIssues ,
"milestone count 'num_closed_issues' and 'num_issues'" ,
} ,
// User.NumRepos
{
statsQuery ( "SELECT `user`.id FROM `user` WHERE `user`.num_repos!=(SELECT COUNT(*) FROM `repository` WHERE owner_id=`user`.id)" ) ,
userStatsCorrectNumRepos ,
"user count 'num_repos'" ,
} ,
// Issue.NumComments
{
statsQuery ( "SELECT `issue`.id FROM `issue` WHERE `issue`.num_comments!=(SELECT COUNT(*) FROM `comment` WHERE issue_id=`issue`.id AND type=0)" ) ,
repoStatsCorrectIssueNumComments ,
"issue count 'num_comments'" ,
} ,
}
for _ , checker := range checkers {
select {
case <- ctx . Done ( ) :
log . Warn ( "CheckRepoStats: Cancelled before %s" , checker . desc )
return db . ErrCancelledf ( "before checking %s" , checker . desc )
default :
repoStatsCheck ( ctx , checker )
}
}
// FIXME: use checker when stop supporting old fork repo format.
// ***** START: Repository.NumForks *****
e := db . GetEngine ( ctx )
results , err := e . Query ( "SELECT repo.id FROM `repository` repo WHERE repo.num_forks!=(SELECT COUNT(*) FROM `repository` WHERE fork_id=repo.id)" )
if err != nil {
log . Error ( "Select repository count 'num_forks': %v" , err )
} else {
for _ , result := range results {
id , _ := strconv . ParseInt ( string ( result [ "id" ] ) , 10 , 64 )
select {
case <- ctx . Done ( ) :
log . Warn ( "CheckRepoStats: Cancelled" )
return db . ErrCancelledf ( "during repository count 'num_fork' for repo ID %d" , id )
default :
}
log . Trace ( "Updating repository count 'num_forks': %d" , id )
repo , err := repo_model . GetRepositoryByID ( id )
if err != nil {
log . Error ( "repo_model.GetRepositoryByID[%d]: %v" , id , err )
continue
}
rawResult , err := db . GetEngine ( db . DefaultContext ) . Query ( "SELECT COUNT(*) FROM `repository` WHERE fork_id=?" , repo . ID )
if err != nil {
log . Error ( "Select count of forks[%d]: %v" , repo . ID , err )
continue
}
repo . NumForks = int ( parseCountResult ( rawResult ) )
if err = UpdateRepository ( repo , false ) ; err != nil {
log . Error ( "UpdateRepository[%d]: %v" , id , err )
continue
}
}
}
// ***** END: Repository.NumForks *****
return nil
}
func UpdateRepoStats ( ctx context . Context , id int64 ) error {
var err error
for _ , f := range [ ] func ( ctx context . Context , id int64 ) error {
repoStatsCorrectNumWatches ,
repoStatsCorrectNumStars ,
repoStatsCorrectNumIssues ,
repoStatsCorrectNumPulls ,
repoStatsCorrectNumClosedIssues ,
repoStatsCorrectNumClosedPulls ,
labelStatsCorrectNumIssuesRepo ,
labelStatsCorrectNumClosedIssuesRepo ,
milestoneStatsCorrectNumIssuesRepo ,
} {
err = f ( ctx , id )
if err != nil {
return err
}
}
return nil
}
func updateUserStarNumbers ( users [ ] user_model . User ) error {
ctx , committer , err := db . TxContext ( )
if err != nil {
return err
}
defer committer . Close ( )
for _ , user := range users {
if _ , err = db . Exec ( ctx , "UPDATE `user` SET num_stars=(SELECT COUNT(*) FROM `star` WHERE uid=?) WHERE id=?" , user . ID , user . ID ) ; err != nil {
return err
}
}
return committer . Commit ( )
}
// DoctorUserStarNum recalculate Stars number for all user
func DoctorUserStarNum ( ) ( err error ) {
const batchSize = 100
for start := 0 ; ; start += batchSize {
users := make ( [ ] user_model . User , 0 , batchSize )
if err = db . GetEngine ( db . DefaultContext ) . Limit ( batchSize , start ) . Where ( "type = ?" , 0 ) . Cols ( "id" ) . Find ( & users ) ; err != nil {
return
}
if len ( users ) == 0 {
break
}
if err = updateUserStarNumbers ( users ) ; err != nil {
return
}
}
log . Debug ( "recalculate Stars number for all user finished" )
return
}
// LinkedRepository returns the linked repo if any
func LinkedRepository ( a * repo_model . Attachment ) ( * repo_model . Repository , unit . Type , error ) {
if a . IssueID != 0 {
iss , err := GetIssueByID ( a . IssueID )
if err != nil {
return nil , unit . TypeIssues , err
}
repo , err := repo_model . GetRepositoryByID ( iss . RepoID )
unitType := unit . TypeIssues
if iss . IsPull {
unitType = unit . TypePullRequests
}
return repo , unitType , err
} else if a . ReleaseID != 0 {
rel , err := GetReleaseByID ( a . ReleaseID )
if err != nil {
return nil , unit . TypeReleases , err
}
repo , err := repo_model . GetRepositoryByID ( rel . RepoID )
return repo , unit . TypeReleases , err
}
return nil , - 1 , nil
}
// DeleteDeployKey delete deploy keys
func DeleteDeployKey ( ctx context . Context , doer * user_model . User , id int64 ) error {
key , err := asymkey_model . GetDeployKeyByID ( ctx , id )
if err != nil {
if asymkey_model . IsErrDeployKeyNotExist ( err ) {
return nil
}
return fmt . Errorf ( "GetDeployKeyByID: %v" , err )
}
sess := db . GetEngine ( ctx )
// Check if user has access to delete this key.
if ! doer . IsAdmin {
repo , err := repo_model . GetRepositoryByIDCtx ( ctx , key . RepoID )
if err != nil {
return fmt . Errorf ( "GetRepositoryByID: %v" , err )
}
has , err := isUserRepoAdmin ( sess , repo , doer )
if err != nil {
return fmt . Errorf ( "GetUserRepoPermission: %v" , err )
} else if ! has {
return asymkey_model . ErrKeyAccessDenied {
UserID : doer . ID ,
KeyID : key . ID ,
Note : "deploy" ,
}
}
}
if _ , err = sess . ID ( key . ID ) . Delete ( new ( asymkey_model . DeployKey ) ) ; err != nil {
return fmt . Errorf ( "delete deploy key [%d]: %v" , key . ID , err )
}
// Check if this is the last reference to same key content.
has , err := sess .
Where ( "key_id = ?" , key . KeyID ) .
Get ( new ( asymkey_model . DeployKey ) )
if err != nil {
return err
} else if ! has {
if err = asymkey_model . DeletePublicKeys ( ctx , key . KeyID ) ; err != nil {
return err
}
}
return nil
}