Browse Source

Bug fix on organization

tags/v0.9.99
Unknwon 9 years ago
parent
commit
9baf2b38d0
12 changed files with 164 additions and 35 deletions
  1. 3
    4
      cmd/web.go
  2. 1
    1
      gogs.go
  3. 13
    0
      models/org.go
  4. 106
    18
      models/repo.go
  5. 8
    2
      modules/log/file.go
  6. 6
    2
      modules/log/log.go
  7. 3
    0
      modules/middleware/org.go
  8. 2
    0
      routers/install.go
  9. 3
    2
      routers/repo/repo.go
  10. 16
    3
      routers/repo/setting.go
  11. 1
    1
      templates/.VERSION
  12. 2
    2
      templates/home.tmpl

+ 3
- 4
cmd/web.go View File

r.Get("/create", org.Create) r.Get("/create", org.Create)
r.Post("/create", bindIgnErr(auth.CreateOrgForm{}), org.CreatePost) r.Post("/create", bindIgnErr(auth.CreateOrgForm{}), org.CreatePost)


m.Group("/:org", func(r *macaron.Router) {
r.Get("", org.Home)
}, middleware.OrgAssignment(true))

m.Group("/:org", func(r *macaron.Router) { m.Group("/:org", func(r *macaron.Router) {
r.Get("/dashboard", user.Dashboard) r.Get("/dashboard", user.Dashboard)
r.Get("/members", org.Members) r.Get("/members", org.Members)
r.Route("/invitations/new", "GET,POST", org.Invitation) r.Route("/invitations/new", "GET,POST", org.Invitation)
}, middleware.OrgAssignment(true, true, true)) }, middleware.OrgAssignment(true, true, true))
}, reqSignIn) }, reqSignIn)
m.Group("/org", func(r *macaron.Router) {
r.Get("/:org", org.Home)
}, middleware.OrgAssignment(true))


// Repository routers. // Repository routers.
m.Group("/repo", func(r *macaron.Router) { m.Group("/repo", func(r *macaron.Router) {

+ 1
- 1
gogs.go View File

"github.com/gogits/gogs/modules/setting" "github.com/gogits/gogs/modules/setting"
) )


const APP_VER = "0.4.7.0826 Alpha"
const APP_VER = "0.4.7.0827 Alpha"


func init() { func init() {
runtime.GOMAXPROCS(runtime.NumCPU()) runtime.GOMAXPROCS(runtime.NumCPU())

+ 13
- 0
models/org.go View File

if _, err = sess.Delete(access); err != nil { if _, err = sess.Delete(access); err != nil {
sess.Rollback() sess.Rollback()
return err return err
} else if err = WatchRepo(u.Id, repo.Id, false); err != nil {
sess.Rollback()
return err
} }
} }


return err return err
} }
} }
if err = WatchRepo(u.Id, repo.Id, true); err != nil {
sess.Rollback()
return err
}
} }
return sess.Commit() return sess.Commit()
} }
if _, err = sess.Delete(access); err != nil { if _, err = sess.Delete(access); err != nil {
sess.Rollback() sess.Rollback()
return fmt.Errorf("fail to delete access: %v", err) return fmt.Errorf("fail to delete access: %v", err)
} else if err = WatchRepo(u.Id, repo.Id, false); err != nil {
sess.Rollback()
return err
} }
} else if auth < t.Authorize { } else if auth < t.Authorize {
if err = addAccessWithAuthorize(sess, access, AuthorizeToAccessType(auth)); err != nil { if err = addAccessWithAuthorize(sess, access, AuthorizeToAccessType(auth)); err != nil {
if _, err = sess.Delete(access); err != nil { if _, err = sess.Delete(access); err != nil {
sess.Rollback() sess.Rollback()
return fmt.Errorf("fail to delete access: %v", err) return fmt.Errorf("fail to delete access: %v", err)
} else if err = WatchRepo(u.Id, repo.Id, false); err != nil {
sess.Rollback()
return err
} }
} else if auth < t.Authorize { } else if auth < t.Authorize {
// Downgrade authorize level. // Downgrade authorize level.

+ 106
- 18
models/repo.go View File



repoPath := RepoPath(u.Name, name) repoPath := RepoPath(u.Name, name)


if u.IsOrganization() {
t, err := u.GetOwnerTeam()
if err != nil {
return nil, err
}
repo.NumWatches = t.NumMembers
} else {
repo.NumWatches = 1
}

repo.IsBare = false repo.IsBare = false
if mirror { if mirror {
if err = MirrorRepository(repo.Id, u.Name, repo.Name, repoPath, url); err != nil { if err = MirrorRepository(repo.Id, u.Name, repo.Name, repoPath, url); err != nil {
} }


if u.IsOrganization() { if u.IsOrganization() {
ous, err := GetOrgUsersByOrgId(u.Id)
t, err := u.GetOwnerTeam()
if err != nil { if err != nil {
log.Error(4, "GetOrgUsersByOrgId: %v", err)
log.Error(4, "GetOwnerTeam: %v", err)
} else { } else {
for _, ou := range ous {
if err = WatchRepo(ou.Uid, repo.Id, true); err != nil {
log.Error(4, "WatchRepo: %v", err)
if err = t.GetMembers(); err != nil {
log.Error(4, "GetMembers: %v", err)
} else {
for _, u := range t.Members {
if err = WatchRepo(u.Id, repo.Id, true); err != nil {
log.Error(4, "WatchRepo2: %v", err)
}
} }
} }
} }
}
if err = WatchRepo(u.Id, repo.Id, true); err != nil {
log.Error(4, "WatchRepo2: %v", err)
} else {
if err = WatchRepo(u.Id, repo.Id, true); err != nil {
log.Error(4, "WatchRepo3: %v", err)
}
} }


if err = NewRepoAction(u, repo); err != nil { if err = NewRepoAction(u, repo); err != nil {
} }


// Update user repository number. // Update user repository number.
rawSql := "UPDATE `user` SET num_repos = num_repos + 1 WHERE id = ?"
if _, err = sess.Exec(rawSql, newUser.Id); err != nil {
if _, err = sess.Exec("UPDATE `user` SET num_repos = num_repos + 1 WHERE id = ?", newUser.Id); err != nil {
sess.Rollback() sess.Rollback()
return err return err
} }


rawSql = "UPDATE `user` SET num_repos = num_repos - 1 WHERE id = ?"
if _, err = sess.Exec(rawSql, u.Id); err != nil {
if _, err = sess.Exec("UPDATE `user` SET num_repos = num_repos - 1 WHERE id = ?", u.Id); err != nil {
sess.Rollback() sess.Rollback()
return err return err
} }


// New owner is organization.
if newUser.IsOrganization() {
mode := WRITABLE
if repo.IsMirror {
mode = READABLE
}
access := &Access{
RepoName: path.Join(newUser.LowerName, repo.LowerName),
Mode: mode,
}

// Give access to all members in owner team.
t, err := newUser.GetOwnerTeam()
if err != nil {
sess.Rollback()
return err
}
if err = t.GetMembers(); err != nil {
sess.Rollback()
return err
}
for _, u := range t.Members {
access.Id = 0
access.UserName = u.LowerName
if _, err = sess.Insert(access); err != nil {
sess.Rollback()
return err
}
}

if _, err = sess.Exec(
"UPDATE `user` SET num_repos = num_repos + 1 WHERE id = ?", u.Id); err != nil {
sess.Rollback()
return err
}

// Update owner team info and count.
t.RepoIds += "$" + com.ToStr(repo.Id) + "|"
t.NumRepos++
if _, err = sess.Id(t.Id).AllCols().Update(t); err != nil {
sess.Rollback()
return err
}
}

// Change repository directory name. // Change repository directory name.
if err = os.Rename(RepoPath(u.Name, repo.Name), RepoPath(newUser.Name, repo.Name)); err != nil { if err = os.Rename(RepoPath(u.Name, repo.Name), RepoPath(newUser.Name, repo.Name)); err != nil {
sess.Rollback() sess.Rollback()
} }


// Add watch of new owner to repository. // Add watch of new owner to repository.
if !IsWatching(newUser.Id, repo.Id) {
if !newUser.IsOrganization() {
if err = WatchRepo(newUser.Id, repo.Id, true); err != nil { if err = WatchRepo(newUser.Id, repo.Id, true); err != nil {
return err
log.Error(4, "WatchRepo", err)
} }
} }
if err = WatchRepo(u.Id, repo.Id, false); err != nil {
log.Error(4, "WatchRepo2", err)
}


if err = TransferRepoAction(u, newUser, repo); err != nil { if err = TransferRepoAction(u, newUser, repo); err != nil {
return err return err
} }


// DeleteRepository deletes a repository for a user or orgnaztion. // DeleteRepository deletes a repository for a user or orgnaztion.
func DeleteRepository(userId, repoId int64, userName string) error {
repo := &Repository{Id: repoId, OwnerId: userId}
func DeleteRepository(uid, repoId int64, userName string) error {
repo := &Repository{Id: repoId, OwnerId: uid}
has, err := x.Get(repo) has, err := x.Get(repo)
if err != nil { if err != nil {
return err return err
return ErrRepoNotExist return ErrRepoNotExist
} }


// In case is a organization.
org, err := GetUserById(uid)
if err != nil {
return err
}
if org.IsOrganization() {
if err = org.GetTeams(); err != nil {
return err
}
}

sess := x.NewSession() sess := x.NewSession()
defer sess.Close() defer sess.Close()
if err = sess.Begin(); err != nil { if err = sess.Begin(); err != nil {
sess.Rollback() sess.Rollback()
return err return err
} }

// Delete all access.
if _, err := sess.Delete(&Access{RepoName: strings.ToLower(path.Join(userName, repo.Name))}); err != nil { if _, err := sess.Delete(&Access{RepoName: strings.ToLower(path.Join(userName, repo.Name))}); err != nil {
sess.Rollback() sess.Rollback()
return err return err
} }
if org.IsOrganization() {
idStr := "$" + com.ToStr(repoId) + "|"
for _, t := range org.Teams {
if !strings.Contains(t.RepoIds, idStr) {
continue
}
t.NumRepos--
t.RepoIds = strings.Replace(t.RepoIds, idStr, "", 1)
if _, err = sess.Id(t.Id).AllCols().Update(t); err != nil {
sess.Rollback()
return err
}
}
}

if _, err := sess.Delete(&Action{RepoId: repo.Id}); err != nil { if _, err := sess.Delete(&Action{RepoId: repo.Id}); err != nil {
sess.Rollback() sess.Rollback()
return err return err
return err return err
} }


rawSql := "UPDATE `user` SET num_repos = num_repos - 1 WHERE id = ?"
if _, err = sess.Exec(rawSql, userId); err != nil {
if _, err = sess.Exec("UPDATE `user` SET num_repos = num_repos - 1 WHERE id = ?", uid); err != nil {
sess.Rollback() sess.Rollback()
return err return err
} }

+ 8
- 2
modules/log/file.go View File



func (w *FileLogWriter) deleteOldLog() { func (w *FileLogWriter) deleteOldLog() {
dir := filepath.Dir(w.Filename) dir := filepath.Dir(w.Filename)
filepath.Walk(dir, func(path string, info os.FileInfo, err error) error {
filepath.Walk(dir, func(path string, info os.FileInfo, err error) (returnErr error) {
defer func() {
if r := recover(); r != nil {
returnErr = fmt.Errorf("Unable to delete old log '%s', error: %+v", path, r)
}
}()

if !info.IsDir() && info.ModTime().Unix() < (time.Now().Unix()-60*60*24*w.Maxdays) { if !info.IsDir() && info.ModTime().Unix() < (time.Now().Unix()-60*60*24*w.Maxdays) {
if strings.HasPrefix(filepath.Base(path), filepath.Base(w.Filename)) { if strings.HasPrefix(filepath.Base(path), filepath.Base(w.Filename)) {
os.Remove(path) os.Remove(path)
} }
} }
return nil
return returnErr
}) })
} }



+ 6
- 2
modules/log/log.go View File

select { select {
case bm := <-l.msg: case bm := <-l.msg:
for _, l := range l.outputs { for _, l := range l.outputs {
l.WriteMsg(bm.msg, bm.skip, bm.level)
if err := l.WriteMsg(bm.msg, bm.skip, bm.level); err != nil {
fmt.Println("ERROR, unable to WriteMsg:", err)
}
} }
case <-l.quit: case <-l.quit:
return return
if len(l.msg) > 0 { if len(l.msg) > 0 {
bm := <-l.msg bm := <-l.msg
for _, l := range l.outputs { for _, l := range l.outputs {
l.WriteMsg(bm.msg, bm.skip, bm.level)
if err := l.WriteMsg(bm.msg, bm.skip, bm.level); err != nil {
fmt.Println("ERROR, unable to WriteMsg:", err)
}
} }
} else { } else {
break break

+ 3
- 0
modules/middleware/org.go View File

ctx.Org.IsMember = true ctx.Org.IsMember = true
} }
} }
} else {
// Fake data.
ctx.Data["SignedUser"] = &models.User{}
} }
if (requireMember && !ctx.Org.IsMember) || if (requireMember && !ctx.Org.IsMember) ||
(requireOwner && !ctx.Org.IsOwner) { (requireOwner && !ctx.Org.IsOwner) {

+ 2
- 0
routers/install.go View File



setting.Cfg.SetValue("", "RUN_MODE", "prod") setting.Cfg.SetValue("", "RUN_MODE", "prod")


setting.Cfg.SetValue("log", "MODE", "file")

setting.Cfg.SetValue("security", "INSTALL_LOCK", "true") setting.Cfg.SetValue("security", "INSTALL_LOCK", "true")


os.MkdirAll("custom/conf", os.ModePerm) os.MkdirAll("custom/conf", os.ModePerm)

+ 3
- 2
routers/repo/repo.go View File

ctx.Data["Title"] = ctx.Tr("new_migrate") ctx.Data["Title"] = ctx.Tr("new_migrate")


ctxUser := ctx.User ctxUser := ctx.User
if orgId := com.StrTo(ctx.Query("org")).MustInt64(); orgId > 0 {
org, err := models.GetUserById(orgId)
// Not equal means current user is an organization.
if form.Uid != ctx.User.Id {
org, err := models.GetUserById(form.Uid)
if err != nil && err != models.ErrUserNotExist { if err != nil && err != models.ErrUserNotExist {
ctx.Handle(500, "GetUserById", err) ctx.Handle(500, "GetUserById", err)
return return

+ 16
- 3
routers/repo/setting.go View File

if ctx.Repo.Repository.Name != form.RepoName { if ctx.Repo.Repository.Name != form.RepoName {
ctx.RenderWithErr(ctx.Tr("form.enterred_invalid_repo_name"), SETTINGS_OPTIONS, nil) ctx.RenderWithErr(ctx.Tr("form.enterred_invalid_repo_name"), SETTINGS_OPTIONS, nil)
return return
} else if !ctx.Repo.Owner.ValidtePassword(ctx.Query("password")) {
ctx.RenderWithErr(ctx.Tr("form.enterred_invalid_password"), SETTINGS_OPTIONS, nil)
return
}

if ctx.Repo.Owner.IsOrganization() {
if !ctx.Repo.Owner.IsOrgOwner(ctx.User.Id) {
ctx.Error(404)
return
}
if !ctx.User.ValidtePassword(ctx.Query("password")) {
ctx.RenderWithErr(ctx.Tr("form.enterred_invalid_password"), SETTINGS_OPTIONS, nil)
return
}
} else {
if !ctx.Repo.Owner.ValidtePassword(ctx.Query("password")) {
ctx.RenderWithErr(ctx.Tr("form.enterred_invalid_password"), SETTINGS_OPTIONS, nil)
return
}
} }


if err := models.DeleteRepository(ctx.Repo.Owner.Id, ctx.Repo.Repository.Id, ctx.Repo.Owner.Name); err != nil { if err := models.DeleteRepository(ctx.Repo.Owner.Id, ctx.Repo.Repository.Id, ctx.Repo.Owner.Name); err != nil {

+ 1
- 1
templates/.VERSION View File

0.4.7.0826 Alpha
0.4.7.0827 Alpha

+ 2
- 2
templates/home.tmpl View File

<h2>{{.i18n.Tr "app_desc"}}</h2> <h2>{{.i18n.Tr "app_desc"}}</h2>
<form id="promo-form" action="/user/login" method="post"> <form id="promo-form" action="/user/login" method="post">
{{.CsrfTokenHtml}} {{.CsrfTokenHtml}}
<input class="ipt ipt-large" id="username" name="uname" type="text" placeholder="{{.i18n.Tr " home.uname_holder "}}"/>
<input class="ipt ipt-large" name="password" type="password" placeholder="{{.i18n.Tr " home.password_holder "}}"/>
<input class="ipt ipt-large" id="username" name="uname" type="text" placeholder="{{.i18n.Tr "home.uname_holder"}}"/>
<input class="ipt ipt-large" name="password" type="password" placeholder="{{.i18n.Tr "home.password_holder"}}"/>
<input name="from" type="hidden" value="home"> <input name="from" type="hidden" value="home">
<button class="btn btn-black btn-large">{{.i18n.Tr "sign_in"}}</button> <button class="btn btn-black btn-large">{{.i18n.Tr "sign_in"}}</button>
<button class="btn btn-green btn-large" id="register-button">{{.i18n.Tr "register"}}</button> <button class="btn btn-green btn-large" id="register-button">{{.i18n.Tr "register"}}</button>

Loading…
Cancel
Save