You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757
  1. // Copyright 2015 The Gogs Authors. All rights reserved.
  2. // Copyright 2016 The Gitea Authors. All rights reserved.
  3. // Use of this source code is governed by a MIT-style
  4. // license that can be found in the LICENSE file.
  5. // Package v1 Gitea API.
  6. //
  7. // This documentation describes the Gitea API.
  8. //
  9. // Schemes: http, https
  10. // BasePath: /api/v1
  11. // Version: 1.1.1
  12. // License: MIT http://opensource.org/licenses/MIT
  13. //
  14. // Consumes:
  15. // - application/json
  16. // - text/plain
  17. //
  18. // Produces:
  19. // - application/json
  20. // - text/html
  21. //
  22. // Security:
  23. // - BasicAuth :
  24. // - Token :
  25. // - AccessToken :
  26. // - AuthorizationHeaderToken :
  27. // - SudoParam :
  28. // - SudoHeader :
  29. //
  30. // SecurityDefinitions:
  31. // BasicAuth:
  32. // type: basic
  33. // Token:
  34. // type: apiKey
  35. // name: token
  36. // in: query
  37. // AccessToken:
  38. // type: apiKey
  39. // name: access_token
  40. // in: query
  41. // AuthorizationHeaderToken:
  42. // type: apiKey
  43. // name: Authorization
  44. // in: header
  45. // SudoParam:
  46. // type: apiKey
  47. // name: sudo
  48. // in: query
  49. // description: Sudo API request as the user provided as the key. Admin privileges are required.
  50. // SudoHeader:
  51. // type: apiKey
  52. // name: Sudo
  53. // in: header
  54. // description: Sudo API request as the user provided as the key. Admin privileges are required.
  55. //
  56. // swagger:meta
  57. package v1
  58. import (
  59. "strings"
  60. "code.gitea.io/gitea/models"
  61. "code.gitea.io/gitea/modules/auth"
  62. "code.gitea.io/gitea/modules/context"
  63. "code.gitea.io/gitea/modules/log"
  64. "code.gitea.io/gitea/modules/setting"
  65. "code.gitea.io/gitea/routers/api/v1/admin"
  66. "code.gitea.io/gitea/routers/api/v1/misc"
  67. "code.gitea.io/gitea/routers/api/v1/org"
  68. "code.gitea.io/gitea/routers/api/v1/repo"
  69. _ "code.gitea.io/gitea/routers/api/v1/swagger" // for swagger generation
  70. "code.gitea.io/gitea/routers/api/v1/user"
  71. api "code.gitea.io/sdk/gitea"
  72. "github.com/go-macaron/binding"
  73. "gopkg.in/macaron.v1"
  74. )
  75. func sudo() macaron.Handler {
  76. return func(ctx *context.APIContext) {
  77. sudo := ctx.Query("sudo")
  78. if len(sudo) == 0 {
  79. sudo = ctx.Req.Header.Get("Sudo")
  80. }
  81. if len(sudo) > 0 {
  82. if ctx.IsSigned && ctx.User.IsAdmin {
  83. user, err := models.GetUserByName(sudo)
  84. if err != nil {
  85. if models.IsErrUserNotExist(err) {
  86. ctx.NotFound()
  87. } else {
  88. ctx.Error(500, "GetUserByName", err)
  89. }
  90. return
  91. }
  92. log.Trace("Sudo from (%s) to: %s", ctx.User.Name, user.Name)
  93. ctx.User = user
  94. } else {
  95. ctx.JSON(403, map[string]string{
  96. "message": "Only administrators allowed to sudo.",
  97. })
  98. return
  99. }
  100. }
  101. }
  102. }
  103. func repoAssignment() macaron.Handler {
  104. return func(ctx *context.APIContext) {
  105. userName := ctx.Params(":username")
  106. repoName := ctx.Params(":reponame")
  107. var (
  108. owner *models.User
  109. err error
  110. )
  111. // Check if the user is the same as the repository owner.
  112. if ctx.IsSigned && ctx.User.LowerName == strings.ToLower(userName) {
  113. owner = ctx.User
  114. } else {
  115. owner, err = models.GetUserByName(userName)
  116. if err != nil {
  117. if models.IsErrUserNotExist(err) {
  118. ctx.NotFound()
  119. } else {
  120. ctx.Error(500, "GetUserByName", err)
  121. }
  122. return
  123. }
  124. }
  125. ctx.Repo.Owner = owner
  126. // Get repository.
  127. repo, err := models.GetRepositoryByName(owner.ID, repoName)
  128. if err != nil {
  129. if models.IsErrRepoNotExist(err) {
  130. redirectRepoID, err := models.LookupRepoRedirect(owner.ID, repoName)
  131. if err == nil {
  132. context.RedirectToRepo(ctx.Context, redirectRepoID)
  133. } else if models.IsErrRepoRedirectNotExist(err) {
  134. ctx.NotFound()
  135. } else {
  136. ctx.Error(500, "LookupRepoRedirect", err)
  137. }
  138. } else {
  139. ctx.Error(500, "GetRepositoryByName", err)
  140. }
  141. return
  142. }
  143. repo.Owner = owner
  144. ctx.Repo.Repository = repo
  145. ctx.Repo.Permission, err = models.GetUserRepoPermission(repo, ctx.User)
  146. if err != nil {
  147. ctx.Error(500, "GetUserRepoPermission", err)
  148. return
  149. }
  150. if !ctx.Repo.HasAccess() {
  151. ctx.NotFound()
  152. return
  153. }
  154. }
  155. }
  156. // Contexter middleware already checks token for user sign in process.
  157. func reqToken() macaron.Handler {
  158. return func(ctx *context.APIContext) {
  159. if true == ctx.Data["IsApiToken"] {
  160. return
  161. }
  162. if ctx.Context.IsBasicAuth {
  163. ctx.CheckForOTP()
  164. return
  165. }
  166. if ctx.IsSigned {
  167. ctx.RequireCSRF()
  168. return
  169. }
  170. ctx.Context.Error(401)
  171. }
  172. }
  173. func reqBasicAuth() macaron.Handler {
  174. return func(ctx *context.APIContext) {
  175. if !ctx.Context.IsBasicAuth {
  176. ctx.Context.Error(401)
  177. return
  178. }
  179. ctx.CheckForOTP()
  180. }
  181. }
  182. // reqSiteAdmin user should be the site admin
  183. func reqSiteAdmin() macaron.Handler {
  184. return func(ctx *context.Context) {
  185. if !ctx.IsUserSiteAdmin() {
  186. ctx.Error(403)
  187. return
  188. }
  189. }
  190. }
  191. // reqOwner user should be the owner of the repo or site admin.
  192. func reqOwner() macaron.Handler {
  193. return func(ctx *context.Context) {
  194. if !ctx.IsUserRepoOwner() && !ctx.IsUserSiteAdmin() {
  195. ctx.Error(403)
  196. return
  197. }
  198. }
  199. }
  200. // reqAdmin user should be an owner or a collaborator with admin write of a repository, or site admin
  201. func reqAdmin() macaron.Handler {
  202. return func(ctx *context.Context) {
  203. if !ctx.IsUserRepoAdmin() && !ctx.IsUserSiteAdmin() {
  204. ctx.Error(403)
  205. return
  206. }
  207. }
  208. }
  209. // reqRepoWriter user should have a permission to write to a repo, or be a site admin
  210. func reqRepoWriter(unitTypes ...models.UnitType) macaron.Handler {
  211. return func(ctx *context.Context) {
  212. if !ctx.IsUserRepoWriter(unitTypes) && !ctx.IsUserRepoAdmin() && !ctx.IsUserSiteAdmin() {
  213. ctx.Error(403)
  214. return
  215. }
  216. }
  217. }
  218. // reqRepoReader user should have specific read permission or be a repo admin or a site admin
  219. func reqRepoReader(unitType models.UnitType) macaron.Handler {
  220. return func(ctx *context.Context) {
  221. if !ctx.IsUserRepoReaderSpecific(unitType) && !ctx.IsUserRepoAdmin() && !ctx.IsUserSiteAdmin() {
  222. ctx.Error(403)
  223. return
  224. }
  225. }
  226. }
  227. // reqAnyRepoReader user should have any permission to read repository or permissions of site admin
  228. func reqAnyRepoReader() macaron.Handler {
  229. return func(ctx *context.Context) {
  230. if !ctx.IsUserRepoReaderAny() && !ctx.IsUserSiteAdmin() {
  231. ctx.Error(403)
  232. return
  233. }
  234. }
  235. }
  236. // reqOrgOwnership user should be an organization owner, or a site admin
  237. func reqOrgOwnership() macaron.Handler {
  238. return func(ctx *context.APIContext) {
  239. if ctx.Context.IsUserSiteAdmin() {
  240. return
  241. }
  242. var orgID int64
  243. if ctx.Org.Organization != nil {
  244. orgID = ctx.Org.Organization.ID
  245. } else if ctx.Org.Team != nil {
  246. orgID = ctx.Org.Team.OrgID
  247. } else {
  248. ctx.Error(500, "", "reqOrgOwnership: unprepared context")
  249. return
  250. }
  251. isOwner, err := models.IsOrganizationOwner(orgID, ctx.User.ID)
  252. if err != nil {
  253. ctx.Error(500, "IsOrganizationOwner", err)
  254. return
  255. } else if !isOwner {
  256. if ctx.Org.Organization != nil {
  257. ctx.Error(403, "", "Must be an organization owner")
  258. } else {
  259. ctx.NotFound()
  260. }
  261. return
  262. }
  263. }
  264. }
  265. // reqOrgMembership user should be an organization member, or a site admin
  266. func reqOrgMembership() macaron.Handler {
  267. return func(ctx *context.APIContext) {
  268. if ctx.Context.IsUserSiteAdmin() {
  269. return
  270. }
  271. var orgID int64
  272. if ctx.Org.Organization != nil {
  273. orgID = ctx.Org.Organization.ID
  274. } else if ctx.Org.Team != nil {
  275. orgID = ctx.Org.Team.OrgID
  276. } else {
  277. ctx.Error(500, "", "reqOrgMembership: unprepared context")
  278. return
  279. }
  280. if isMember, err := models.IsOrganizationMember(orgID, ctx.User.ID); err != nil {
  281. ctx.Error(500, "IsOrganizationMember", err)
  282. return
  283. } else if !isMember {
  284. if ctx.Org.Organization != nil {
  285. ctx.Error(403, "", "Must be an organization member")
  286. } else {
  287. ctx.NotFound()
  288. }
  289. return
  290. }
  291. }
  292. }
  293. func reqGitHook() macaron.Handler {
  294. return func(ctx *context.APIContext) {
  295. if !ctx.User.CanEditGitHook() {
  296. ctx.Error(403, "", "must be allowed to edit Git hooks")
  297. return
  298. }
  299. }
  300. }
  301. func orgAssignment(args ...bool) macaron.Handler {
  302. var (
  303. assignOrg bool
  304. assignTeam bool
  305. )
  306. if len(args) > 0 {
  307. assignOrg = args[0]
  308. }
  309. if len(args) > 1 {
  310. assignTeam = args[1]
  311. }
  312. return func(ctx *context.APIContext) {
  313. ctx.Org = new(context.APIOrganization)
  314. var err error
  315. if assignOrg {
  316. ctx.Org.Organization, err = models.GetOrgByName(ctx.Params(":orgname"))
  317. if err != nil {
  318. if models.IsErrOrgNotExist(err) {
  319. ctx.NotFound()
  320. } else {
  321. ctx.Error(500, "GetOrgByName", err)
  322. }
  323. return
  324. }
  325. }
  326. if assignTeam {
  327. ctx.Org.Team, err = models.GetTeamByID(ctx.ParamsInt64(":teamid"))
  328. if err != nil {
  329. if models.IsErrUserNotExist(err) {
  330. ctx.NotFound()
  331. } else {
  332. ctx.Error(500, "GetTeamById", err)
  333. }
  334. return
  335. }
  336. }
  337. }
  338. }
  339. func mustEnableIssues(ctx *context.APIContext) {
  340. if !ctx.Repo.CanRead(models.UnitTypeIssues) {
  341. ctx.NotFound()
  342. return
  343. }
  344. }
  345. func mustAllowPulls(ctx *context.APIContext) {
  346. if !(ctx.Repo.Repository.CanEnablePulls() && ctx.Repo.CanRead(models.UnitTypePullRequests)) {
  347. ctx.NotFound()
  348. return
  349. }
  350. }
  351. func mustEnableIssuesOrPulls(ctx *context.APIContext) {
  352. if !ctx.Repo.CanRead(models.UnitTypeIssues) &&
  353. !(ctx.Repo.Repository.CanEnablePulls() && ctx.Repo.CanRead(models.UnitTypePullRequests)) {
  354. ctx.NotFound()
  355. return
  356. }
  357. }
  358. func mustEnableUserHeatmap(ctx *context.APIContext) {
  359. if !setting.Service.EnableUserHeatmap {
  360. ctx.NotFound()
  361. return
  362. }
  363. }
  364. func mustNotBeArchived(ctx *context.APIContext) {
  365. if ctx.Repo.Repository.IsArchived {
  366. ctx.NotFound()
  367. return
  368. }
  369. }
  370. // RegisterRoutes registers all v1 APIs routes to web application.
  371. // FIXME: custom form error response
  372. func RegisterRoutes(m *macaron.Macaron) {
  373. bind := binding.Bind
  374. if setting.API.EnableSwagger {
  375. m.Get("/swagger", misc.Swagger) //Render V1 by default
  376. }
  377. m.Group("/v1", func() {
  378. // Miscellaneous
  379. if setting.API.EnableSwagger {
  380. m.Get("/swagger", misc.Swagger)
  381. }
  382. m.Get("/version", misc.Version)
  383. m.Post("/markdown", bind(api.MarkdownOption{}), misc.Markdown)
  384. m.Post("/markdown/raw", misc.MarkdownRaw)
  385. // Users
  386. m.Group("/users", func() {
  387. m.Get("/search", user.Search)
  388. m.Group("/:username", func() {
  389. m.Get("", user.GetInfo)
  390. m.Get("/heatmap", mustEnableUserHeatmap, user.GetUserHeatmapData)
  391. m.Get("/repos", user.ListUserRepos)
  392. m.Group("/tokens", func() {
  393. m.Combo("").Get(user.ListAccessTokens).
  394. Post(bind(api.CreateAccessTokenOption{}), user.CreateAccessToken)
  395. m.Combo("/:id").Delete(user.DeleteAccessToken)
  396. }, reqBasicAuth())
  397. })
  398. })
  399. m.Group("/users", func() {
  400. m.Group("/:username", func() {
  401. m.Get("/keys", user.ListPublicKeys)
  402. m.Get("/gpg_keys", user.ListGPGKeys)
  403. m.Get("/followers", user.ListFollowers)
  404. m.Group("/following", func() {
  405. m.Get("", user.ListFollowing)
  406. m.Get("/:target", user.CheckFollowing)
  407. })
  408. m.Get("/starred", user.GetStarredRepos)
  409. m.Get("/subscriptions", user.GetWatchedRepos)
  410. })
  411. }, reqToken())
  412. m.Group("/user", func() {
  413. m.Get("", user.GetAuthenticatedUser)
  414. m.Combo("/emails").Get(user.ListEmails).
  415. Post(bind(api.CreateEmailOption{}), user.AddEmail).
  416. Delete(bind(api.DeleteEmailOption{}), user.DeleteEmail)
  417. m.Get("/followers", user.ListMyFollowers)
  418. m.Group("/following", func() {
  419. m.Get("", user.ListMyFollowing)
  420. m.Combo("/:username").Get(user.CheckMyFollowing).Put(user.Follow).Delete(user.Unfollow)
  421. })
  422. m.Group("/keys", func() {
  423. m.Combo("").Get(user.ListMyPublicKeys).
  424. Post(bind(api.CreateKeyOption{}), user.CreatePublicKey)
  425. m.Combo("/:id").Get(user.GetPublicKey).
  426. Delete(user.DeletePublicKey)
  427. })
  428. m.Group("/gpg_keys", func() {
  429. m.Combo("").Get(user.ListMyGPGKeys).
  430. Post(bind(api.CreateGPGKeyOption{}), user.CreateGPGKey)
  431. m.Combo("/:id").Get(user.GetGPGKey).
  432. Delete(user.DeleteGPGKey)
  433. })
  434. m.Combo("/repos").Get(user.ListMyRepos).
  435. Post(bind(api.CreateRepoOption{}), repo.Create)
  436. m.Group("/starred", func() {
  437. m.Get("", user.GetMyStarredRepos)
  438. m.Group("/:username/:reponame", func() {
  439. m.Get("", user.IsStarring)
  440. m.Put("", user.Star)
  441. m.Delete("", user.Unstar)
  442. }, repoAssignment())
  443. })
  444. m.Get("/times", repo.ListMyTrackedTimes)
  445. m.Get("/subscriptions", user.GetMyWatchedRepos)
  446. m.Get("/teams", org.ListUserTeams)
  447. }, reqToken())
  448. // Repositories
  449. m.Post("/org/:org/repos", reqToken(), bind(api.CreateRepoOption{}), repo.CreateOrgRepo)
  450. m.Group("/repos", func() {
  451. m.Get("/search", repo.Search)
  452. })
  453. m.Combo("/repositories/:id", reqToken()).Get(repo.GetByID)
  454. m.Group("/repos", func() {
  455. m.Post("/migrate", reqToken(), bind(auth.MigrateRepoForm{}), repo.Migrate)
  456. m.Group("/:username/:reponame", func() {
  457. m.Combo("").Get(reqAnyRepoReader(), repo.Get).
  458. Delete(reqToken(), reqOwner(), repo.Delete)
  459. m.Group("/hooks", func() {
  460. m.Combo("").Get(repo.ListHooks).
  461. Post(bind(api.CreateHookOption{}), repo.CreateHook)
  462. m.Group("/:id", func() {
  463. m.Combo("").Get(repo.GetHook).
  464. Patch(bind(api.EditHookOption{}), repo.EditHook).
  465. Delete(repo.DeleteHook)
  466. m.Post("/tests", context.RepoRef(), repo.TestHook)
  467. })
  468. m.Group("/git", func() {
  469. m.Combo("").Get(repo.ListGitHooks)
  470. m.Group("/:id", func() {
  471. m.Combo("").Get(repo.GetGitHook).
  472. Patch(bind(api.EditGitHookOption{}), repo.EditGitHook).
  473. Delete(repo.DeleteGitHook)
  474. })
  475. }, reqGitHook(), context.ReferencesGitRepo(true))
  476. }, reqToken(), reqAdmin())
  477. m.Group("/collaborators", func() {
  478. m.Get("", repo.ListCollaborators)
  479. m.Combo("/:collaborator").Get(repo.IsCollaborator).
  480. Put(bind(api.AddCollaboratorOption{}), repo.AddCollaborator).
  481. Delete(repo.DeleteCollaborator)
  482. }, reqToken(), reqAdmin())
  483. m.Get("/raw/*", context.RepoRefByType(context.RepoRefAny), reqRepoReader(models.UnitTypeCode), repo.GetRawFile)
  484. m.Get("/archive/*", reqRepoReader(models.UnitTypeCode), repo.GetArchive)
  485. m.Combo("/forks").Get(repo.ListForks).
  486. Post(reqToken(), reqRepoReader(models.UnitTypeCode), bind(api.CreateForkOption{}), repo.CreateFork)
  487. m.Group("/branches", func() {
  488. m.Get("", repo.ListBranches)
  489. m.Get("/*", context.RepoRefByType(context.RepoRefBranch), repo.GetBranch)
  490. }, reqRepoReader(models.UnitTypeCode))
  491. m.Group("/tags", func() {
  492. m.Get("", repo.ListTags)
  493. }, reqRepoReader(models.UnitTypeCode))
  494. m.Group("/keys", func() {
  495. m.Combo("").Get(repo.ListDeployKeys).
  496. Post(bind(api.CreateKeyOption{}), repo.CreateDeployKey)
  497. m.Combo("/:id").Get(repo.GetDeployKey).
  498. Delete(repo.DeleteDeploykey)
  499. }, reqToken(), reqAdmin())
  500. m.Group("/times", func() {
  501. m.Combo("").Get(repo.ListTrackedTimesByRepository)
  502. m.Combo("/:timetrackingusername").Get(repo.ListTrackedTimesByUser)
  503. }, mustEnableIssues)
  504. m.Group("/issues", func() {
  505. m.Combo("").Get(repo.ListIssues).
  506. Post(reqToken(), mustNotBeArchived, bind(api.CreateIssueOption{}), repo.CreateIssue)
  507. m.Group("/comments", func() {
  508. m.Get("", repo.ListRepoIssueComments)
  509. m.Combo("/:id", reqToken()).
  510. Patch(mustNotBeArchived, bind(api.EditIssueCommentOption{}), repo.EditIssueComment).
  511. Delete(repo.DeleteIssueComment)
  512. })
  513. m.Group("/:index", func() {
  514. m.Combo("").Get(repo.GetIssue).
  515. Patch(reqToken(), bind(api.EditIssueOption{}), repo.EditIssue)
  516. m.Group("/comments", func() {
  517. m.Combo("").Get(repo.ListIssueComments).
  518. Post(reqToken(), mustNotBeArchived, bind(api.CreateIssueCommentOption{}), repo.CreateIssueComment)
  519. m.Combo("/:id", reqToken()).Patch(bind(api.EditIssueCommentOption{}), repo.EditIssueCommentDeprecated).
  520. Delete(repo.DeleteIssueCommentDeprecated)
  521. })
  522. m.Group("/labels", func() {
  523. m.Combo("").Get(repo.ListIssueLabels).
  524. Post(reqToken(), bind(api.IssueLabelsOption{}), repo.AddIssueLabels).
  525. Put(reqToken(), bind(api.IssueLabelsOption{}), repo.ReplaceIssueLabels).
  526. Delete(reqToken(), repo.ClearIssueLabels)
  527. m.Delete("/:id", reqToken(), repo.DeleteIssueLabel)
  528. })
  529. m.Group("/times", func() {
  530. m.Combo("").Get(repo.ListTrackedTimes).
  531. Post(reqToken(), bind(api.AddTimeOption{}), repo.AddTime)
  532. })
  533. m.Combo("/deadline").Post(reqToken(), bind(api.EditDeadlineOption{}), repo.UpdateIssueDeadline)
  534. m.Group("/stopwatch", func() {
  535. m.Post("/start", reqToken(), repo.StartIssueStopwatch)
  536. m.Post("/stop", reqToken(), repo.StopIssueStopwatch)
  537. })
  538. })
  539. }, mustEnableIssuesOrPulls)
  540. m.Group("/labels", func() {
  541. m.Combo("").Get(repo.ListLabels).
  542. Post(reqToken(), reqRepoWriter(models.UnitTypeIssues, models.UnitTypePullRequests), bind(api.CreateLabelOption{}), repo.CreateLabel)
  543. m.Combo("/:id").Get(repo.GetLabel).
  544. Patch(reqToken(), reqRepoWriter(models.UnitTypeIssues, models.UnitTypePullRequests), bind(api.EditLabelOption{}), repo.EditLabel).
  545. Delete(reqToken(), reqRepoWriter(models.UnitTypeIssues, models.UnitTypePullRequests), repo.DeleteLabel)
  546. })
  547. m.Post("/markdown", bind(api.MarkdownOption{}), misc.Markdown)
  548. m.Post("/markdown/raw", misc.MarkdownRaw)
  549. m.Group("/milestones", func() {
  550. m.Combo("").Get(repo.ListMilestones).
  551. Post(reqToken(), reqRepoWriter(models.UnitTypeIssues, models.UnitTypePullRequests), bind(api.CreateMilestoneOption{}), repo.CreateMilestone)
  552. m.Combo("/:id").Get(repo.GetMilestone).
  553. Patch(reqToken(), reqRepoWriter(models.UnitTypeIssues, models.UnitTypePullRequests), bind(api.EditMilestoneOption{}), repo.EditMilestone).
  554. Delete(reqToken(), reqRepoWriter(models.UnitTypeIssues, models.UnitTypePullRequests), repo.DeleteMilestone)
  555. })
  556. m.Get("/stargazers", repo.ListStargazers)
  557. m.Get("/subscribers", repo.ListSubscribers)
  558. m.Group("/subscription", func() {
  559. m.Get("", user.IsWatching)
  560. m.Put("", reqToken(), user.Watch)
  561. m.Delete("", reqToken(), user.Unwatch)
  562. })
  563. m.Group("/releases", func() {
  564. m.Combo("").Get(repo.ListReleases).
  565. Post(reqToken(), reqRepoWriter(models.UnitTypeReleases), context.ReferencesGitRepo(false), bind(api.CreateReleaseOption{}), repo.CreateRelease)
  566. m.Group("/:id", func() {
  567. m.Combo("").Get(repo.GetRelease).
  568. Patch(reqToken(), reqRepoWriter(models.UnitTypeReleases), context.ReferencesGitRepo(false), bind(api.EditReleaseOption{}), repo.EditRelease).
  569. Delete(reqToken(), reqRepoWriter(models.UnitTypeReleases), repo.DeleteRelease)
  570. m.Group("/assets", func() {
  571. m.Combo("").Get(repo.ListReleaseAttachments).
  572. Post(reqToken(), reqRepoWriter(models.UnitTypeReleases), repo.CreateReleaseAttachment)
  573. m.Combo("/:asset").Get(repo.GetReleaseAttachment).
  574. Patch(reqToken(), reqRepoWriter(models.UnitTypeReleases), bind(api.EditAttachmentOptions{}), repo.EditReleaseAttachment).
  575. Delete(reqToken(), reqRepoWriter(models.UnitTypeReleases), repo.DeleteReleaseAttachment)
  576. })
  577. })
  578. }, reqRepoReader(models.UnitTypeReleases))
  579. m.Post("/mirror-sync", reqToken(), reqRepoWriter(models.UnitTypeCode), repo.MirrorSync)
  580. m.Get("/editorconfig/:filename", context.RepoRef(), reqRepoReader(models.UnitTypeCode), repo.GetEditorconfig)
  581. m.Group("/pulls", func() {
  582. m.Combo("").Get(bind(api.ListPullRequestsOptions{}), repo.ListPullRequests).
  583. Post(reqToken(), mustNotBeArchived, bind(api.CreatePullRequestOption{}), repo.CreatePullRequest)
  584. m.Group("/:index", func() {
  585. m.Combo("").Get(repo.GetPullRequest).
  586. Patch(reqToken(), reqRepoWriter(models.UnitTypePullRequests), bind(api.EditPullRequestOption{}), repo.EditPullRequest)
  587. m.Combo("/merge").Get(repo.IsPullRequestMerged).
  588. Post(reqToken(), mustNotBeArchived, reqRepoWriter(models.UnitTypePullRequests), bind(auth.MergePullRequestForm{}), repo.MergePullRequest)
  589. })
  590. }, mustAllowPulls, reqRepoReader(models.UnitTypeCode), context.ReferencesGitRepo(false))
  591. m.Group("/statuses", func() {
  592. m.Combo("/:sha").Get(repo.GetCommitStatuses).
  593. Post(reqToken(), bind(api.CreateStatusOption{}), repo.NewCommitStatus)
  594. }, reqRepoReader(models.UnitTypeCode))
  595. m.Group("/commits/:ref", func() {
  596. m.Get("/status", repo.GetCombinedCommitStatusByRef)
  597. m.Get("/statuses", repo.GetCommitStatusesByRef)
  598. }, reqRepoReader(models.UnitTypeCode))
  599. m.Group("/git", func() {
  600. m.Group("/commits", func() {
  601. m.Get("/:sha", repo.GetSingleCommit)
  602. })
  603. m.Get("/refs", repo.GetGitAllRefs)
  604. m.Get("/refs/*", repo.GetGitRefs)
  605. m.Get("/trees/:sha", context.RepoRef(), repo.GetTree)
  606. m.Get("/blobs/:sha", context.RepoRef(), repo.GetBlob)
  607. }, reqRepoReader(models.UnitTypeCode))
  608. m.Group("/contents", func() {
  609. m.Get("/*", repo.GetFileContents)
  610. m.Group("/*", func() {
  611. m.Post("", bind(api.CreateFileOptions{}), repo.CreateFile)
  612. m.Put("", bind(api.UpdateFileOptions{}), repo.UpdateFile)
  613. m.Delete("", bind(api.DeleteFileOptions{}), repo.DeleteFile)
  614. }, reqRepoWriter(models.UnitTypeCode), reqToken())
  615. }, reqRepoReader(models.UnitTypeCode))
  616. }, repoAssignment())
  617. })
  618. // Organizations
  619. m.Get("/user/orgs", reqToken(), org.ListMyOrgs)
  620. m.Get("/users/:username/orgs", org.ListUserOrgs)
  621. m.Post("/orgs", reqToken(), bind(api.CreateOrgOption{}), org.Create)
  622. m.Group("/orgs/:orgname", func() {
  623. m.Get("/repos", user.ListOrgRepos)
  624. m.Combo("").Get(org.Get).
  625. Patch(reqToken(), reqOrgOwnership(), bind(api.EditOrgOption{}), org.Edit).
  626. Delete(reqToken(), reqOrgOwnership(), org.Delete)
  627. m.Group("/members", func() {
  628. m.Get("", org.ListMembers)
  629. m.Combo("/:username").Get(org.IsMember).
  630. Delete(reqToken(), reqOrgOwnership(), org.DeleteMember)
  631. })
  632. m.Group("/public_members", func() {
  633. m.Get("", org.ListPublicMembers)
  634. m.Combo("/:username").Get(org.IsPublicMember).
  635. Put(reqToken(), reqOrgMembership(), org.PublicizeMember).
  636. Delete(reqToken(), reqOrgMembership(), org.ConcealMember)
  637. })
  638. m.Combo("/teams", reqToken(), reqOrgMembership()).Get(org.ListTeams).
  639. Post(bind(api.CreateTeamOption{}), org.CreateTeam)
  640. m.Group("/hooks", func() {
  641. m.Combo("").Get(org.ListHooks).
  642. Post(bind(api.CreateHookOption{}), org.CreateHook)
  643. m.Combo("/:id").Get(org.GetHook).
  644. Patch(reqOrgOwnership(), bind(api.EditHookOption{}), org.EditHook).
  645. Delete(reqOrgOwnership(), org.DeleteHook)
  646. }, reqToken(), reqOrgMembership())
  647. }, orgAssignment(true))
  648. m.Group("/teams/:teamid", func() {
  649. m.Combo("").Get(org.GetTeam).
  650. Patch(reqOrgOwnership(), bind(api.EditTeamOption{}), org.EditTeam).
  651. Delete(reqOrgOwnership(), org.DeleteTeam)
  652. m.Group("/members", func() {
  653. m.Get("", org.GetTeamMembers)
  654. m.Combo("/:username").
  655. Get(org.GetTeamMember).
  656. Put(reqOrgOwnership(), org.AddTeamMember).
  657. Delete(reqOrgOwnership(), org.RemoveTeamMember)
  658. })
  659. m.Group("/repos", func() {
  660. m.Get("", org.GetTeamRepos)
  661. m.Combo("/:orgname/:reponame").
  662. Put(org.AddTeamRepository).
  663. Delete(org.RemoveTeamRepository)
  664. })
  665. }, orgAssignment(false, true), reqToken(), reqOrgMembership())
  666. m.Any("/*", func(ctx *context.APIContext) {
  667. ctx.NotFound()
  668. })
  669. m.Group("/admin", func() {
  670. m.Get("/orgs", admin.GetAllOrgs)
  671. m.Group("/users", func() {
  672. m.Get("", admin.GetAllUsers)
  673. m.Post("", bind(api.CreateUserOption{}), admin.CreateUser)
  674. m.Group("/:username", func() {
  675. m.Combo("").Patch(bind(api.EditUserOption{}), admin.EditUser).
  676. Delete(admin.DeleteUser)
  677. m.Group("/keys", func() {
  678. m.Post("", bind(api.CreateKeyOption{}), admin.CreatePublicKey)
  679. m.Delete("/:id", admin.DeleteUserPublicKey)
  680. })
  681. m.Get("/orgs", org.ListUserOrgs)
  682. m.Post("/orgs", bind(api.CreateOrgOption{}), admin.CreateOrg)
  683. m.Post("/repos", bind(api.CreateRepoOption{}), admin.CreateRepo)
  684. })
  685. })
  686. }, reqToken(), reqSiteAdmin())
  687. m.Group("/topics", func() {
  688. m.Get("/search", repo.TopicSearch)
  689. })
  690. }, context.APIContexter(), sudo())
  691. }