You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

action.go 11 kB

11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
8 years ago
8 years ago
11 years ago
11 years ago
8 years ago
11 years ago
9 years ago
8 years ago
Better logging (#6038) (#6095) * Panic don't fatal on create new logger Fixes #5854 Signed-off-by: Andrew Thornton <art27@cantab.net> * partial broken * Update the logging infrastrcture Signed-off-by: Andrew Thornton <art27@cantab.net> * Reset the skip levels for Fatal and Error Signed-off-by: Andrew Thornton <art27@cantab.net> * broken ncsa * More log.Error fixes Signed-off-by: Andrew Thornton <art27@cantab.net> * Remove nal * set log-levels to lowercase * Make console_test test all levels * switch to lowercased levels * OK now working * Fix vetting issues * Fix lint * Fix tests * change default logging to match current gitea * Improve log testing Signed-off-by: Andrew Thornton <art27@cantab.net> * reset error skip levels to 0 * Update documentation and access logger configuration * Redirect the router log back to gitea if redirect macaron log but also allow setting the log level - i.e. TRACE * Fix broken level caching * Refactor the router log * Add Router logger * Add colorizing options * Adjust router colors * Only create logger if they will be used * update app.ini.sample * rename Attribute ColorAttribute * Change from white to green for function * Set fatal/error levels * Restore initial trace logger * Fix Trace arguments in modules/auth/auth.go * Properly handle XORMLogger * Improve admin/config page * fix fmt * Add auto-compression of old logs * Update error log levels * Remove the unnecessary skip argument from Error, Fatal and Critical * Add stacktrace support * Fix tests * Remove x/sync from vendors? * Add stderr option to console logger * Use filepath.ToSlash to protect against Windows in tests * Remove prefixed underscores from names in colors.go * Remove not implemented database logger This was removed from Gogs on 4 Mar 2016 but left in the configuration since then. * Ensure that log paths are relative to ROOT_PATH * use path.Join * rename jsonConfig to logConfig * Rename "config" to "jsonConfig" to make it clearer * Requested changes * Requested changes: XormLogger * Try to color the windows terminal If successful default to colorizing the console logs * fixup * Colorize initially too * update vendor * Colorize logs on default and remove if this is not a colorizing logger * Fix documentation * fix test * Use go-isatty to detect if on windows we are on msys or cygwin * Fix spelling mistake * Add missing vendors * More changes * Rationalise the ANSI writer protection * Adjust colors on advice from @0x5c * Make Flags a comma separated list * Move to use the windows constant for ENABLE_VIRTUAL_TERMINAL_PROCESSING * Ensure matching is done on the non-colored message - to simpify EXPRESSION
6 years ago
Better logging (#6038) (#6095) * Panic don't fatal on create new logger Fixes #5854 Signed-off-by: Andrew Thornton <art27@cantab.net> * partial broken * Update the logging infrastrcture Signed-off-by: Andrew Thornton <art27@cantab.net> * Reset the skip levels for Fatal and Error Signed-off-by: Andrew Thornton <art27@cantab.net> * broken ncsa * More log.Error fixes Signed-off-by: Andrew Thornton <art27@cantab.net> * Remove nal * set log-levels to lowercase * Make console_test test all levels * switch to lowercased levels * OK now working * Fix vetting issues * Fix lint * Fix tests * change default logging to match current gitea * Improve log testing Signed-off-by: Andrew Thornton <art27@cantab.net> * reset error skip levels to 0 * Update documentation and access logger configuration * Redirect the router log back to gitea if redirect macaron log but also allow setting the log level - i.e. TRACE * Fix broken level caching * Refactor the router log * Add Router logger * Add colorizing options * Adjust router colors * Only create logger if they will be used * update app.ini.sample * rename Attribute ColorAttribute * Change from white to green for function * Set fatal/error levels * Restore initial trace logger * Fix Trace arguments in modules/auth/auth.go * Properly handle XORMLogger * Improve admin/config page * fix fmt * Add auto-compression of old logs * Update error log levels * Remove the unnecessary skip argument from Error, Fatal and Critical * Add stacktrace support * Fix tests * Remove x/sync from vendors? * Add stderr option to console logger * Use filepath.ToSlash to protect against Windows in tests * Remove prefixed underscores from names in colors.go * Remove not implemented database logger This was removed from Gogs on 4 Mar 2016 but left in the configuration since then. * Ensure that log paths are relative to ROOT_PATH * use path.Join * rename jsonConfig to logConfig * Rename "config" to "jsonConfig" to make it clearer * Requested changes * Requested changes: XormLogger * Try to color the windows terminal If successful default to colorizing the console logs * fixup * Colorize initially too * update vendor * Colorize logs on default and remove if this is not a colorizing logger * Fix documentation * fix test * Use go-isatty to detect if on windows we are on msys or cygwin * Fix spelling mistake * Add missing vendors * More changes * Rationalise the ANSI writer protection * Adjust colors on advice from @0x5c * Make Flags a comma separated list * Move to use the windows constant for ENABLE_VIRTUAL_TERMINAL_PROCESSING * Ensure matching is done on the non-colored message - to simpify EXPRESSION
6 years ago
8 years ago
8 years ago
8 years ago
8 years ago
8 years ago
11 years ago
8 years ago
8 years ago
8 years ago
8 years ago
8 years ago
11 years ago
8 years ago
11 years ago
11 years ago
8 years ago
8 years ago
8 years ago
9 years ago
Better logging (#6038) (#6095) * Panic don't fatal on create new logger Fixes #5854 Signed-off-by: Andrew Thornton <art27@cantab.net> * partial broken * Update the logging infrastrcture Signed-off-by: Andrew Thornton <art27@cantab.net> * Reset the skip levels for Fatal and Error Signed-off-by: Andrew Thornton <art27@cantab.net> * broken ncsa * More log.Error fixes Signed-off-by: Andrew Thornton <art27@cantab.net> * Remove nal * set log-levels to lowercase * Make console_test test all levels * switch to lowercased levels * OK now working * Fix vetting issues * Fix lint * Fix tests * change default logging to match current gitea * Improve log testing Signed-off-by: Andrew Thornton <art27@cantab.net> * reset error skip levels to 0 * Update documentation and access logger configuration * Redirect the router log back to gitea if redirect macaron log but also allow setting the log level - i.e. TRACE * Fix broken level caching * Refactor the router log * Add Router logger * Add colorizing options * Adjust router colors * Only create logger if they will be used * update app.ini.sample * rename Attribute ColorAttribute * Change from white to green for function * Set fatal/error levels * Restore initial trace logger * Fix Trace arguments in modules/auth/auth.go * Properly handle XORMLogger * Improve admin/config page * fix fmt * Add auto-compression of old logs * Update error log levels * Remove the unnecessary skip argument from Error, Fatal and Critical * Add stacktrace support * Fix tests * Remove x/sync from vendors? * Add stderr option to console logger * Use filepath.ToSlash to protect against Windows in tests * Remove prefixed underscores from names in colors.go * Remove not implemented database logger This was removed from Gogs on 4 Mar 2016 but left in the configuration since then. * Ensure that log paths are relative to ROOT_PATH * use path.Join * rename jsonConfig to logConfig * Rename "config" to "jsonConfig" to make it clearer * Requested changes * Requested changes: XormLogger * Try to color the windows terminal If successful default to colorizing the console logs * fixup * Colorize initially too * update vendor * Colorize logs on default and remove if this is not a colorizing logger * Fix documentation * fix test * Use go-isatty to detect if on windows we are on msys or cygwin * Fix spelling mistake * Add missing vendors * More changes * Rationalise the ANSI writer protection * Adjust colors on advice from @0x5c * Make Flags a comma separated list * Move to use the windows constant for ENABLE_VIRTUAL_TERMINAL_PROCESSING * Ensure matching is done on the non-colored message - to simpify EXPRESSION
6 years ago
9 years ago
8 years ago
Better logging (#6038) (#6095) * Panic don't fatal on create new logger Fixes #5854 Signed-off-by: Andrew Thornton <art27@cantab.net> * partial broken * Update the logging infrastrcture Signed-off-by: Andrew Thornton <art27@cantab.net> * Reset the skip levels for Fatal and Error Signed-off-by: Andrew Thornton <art27@cantab.net> * broken ncsa * More log.Error fixes Signed-off-by: Andrew Thornton <art27@cantab.net> * Remove nal * set log-levels to lowercase * Make console_test test all levels * switch to lowercased levels * OK now working * Fix vetting issues * Fix lint * Fix tests * change default logging to match current gitea * Improve log testing Signed-off-by: Andrew Thornton <art27@cantab.net> * reset error skip levels to 0 * Update documentation and access logger configuration * Redirect the router log back to gitea if redirect macaron log but also allow setting the log level - i.e. TRACE * Fix broken level caching * Refactor the router log * Add Router logger * Add colorizing options * Adjust router colors * Only create logger if they will be used * update app.ini.sample * rename Attribute ColorAttribute * Change from white to green for function * Set fatal/error levels * Restore initial trace logger * Fix Trace arguments in modules/auth/auth.go * Properly handle XORMLogger * Improve admin/config page * fix fmt * Add auto-compression of old logs * Update error log levels * Remove the unnecessary skip argument from Error, Fatal and Critical * Add stacktrace support * Fix tests * Remove x/sync from vendors? * Add stderr option to console logger * Use filepath.ToSlash to protect against Windows in tests * Remove prefixed underscores from names in colors.go * Remove not implemented database logger This was removed from Gogs on 4 Mar 2016 but left in the configuration since then. * Ensure that log paths are relative to ROOT_PATH * use path.Join * rename jsonConfig to logConfig * Rename "config" to "jsonConfig" to make it clearer * Requested changes * Requested changes: XormLogger * Try to color the windows terminal If successful default to colorizing the console logs * fixup * Colorize initially too * update vendor * Colorize logs on default and remove if this is not a colorizing logger * Fix documentation * fix test * Use go-isatty to detect if on windows we are on msys or cygwin * Fix spelling mistake * Add missing vendors * More changes * Rationalise the ANSI writer protection * Adjust colors on advice from @0x5c * Make Flags a comma separated list * Move to use the windows constant for ENABLE_VIRTUAL_TERMINAL_PROCESSING * Ensure matching is done on the non-colored message - to simpify EXPRESSION
6 years ago
Restricted users (#6274) * Restricted users (#4334): initial implementation * Add User.IsRestricted & UI to edit it * Pass user object instead of user id to places where IsRestricted flag matters * Restricted users: maintain access rows for all referenced repos (incl public) * Take logged in user & IsRestricted flag into account in org/repo listings, searches and accesses * Add basic repo access tests for restricted users Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Mention restricted users in the faq Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Revert unnecessary change `.isUserPartOfOrg` -> `.IsUserPartOfOrg` Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Remove unnecessary `org.IsOrganization()` call Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Revert to an `int64` keyed `accessMap` * Add type `userAccess` * Add convenience func updateUserAccess() * Turn accessMap into a `map[int64]userAccess` Signed-off-by: Manush Dodunekov <manush@stendahls.se> * or even better: `map[int64]*userAccess` * updateUserAccess(): use tighter syntax as suggested by lafriks * even tighter * Avoid extra loop * Don't disclose limited orgs to unauthenticated users * Don't assume block only applies to orgs * Use an array of `VisibleType` for filtering * fix yet another thinko * Ok - no need for u * Revert "Ok - no need for u" This reverts commit 5c3e886aabd5acd997a3b35687d322439732c200. Co-authored-by: Antoine GIRARD <sapk@users.noreply.github.com> Co-authored-by: Lauris BH <lauris@nix.lv>
5 years ago
Restricted users (#6274) * Restricted users (#4334): initial implementation * Add User.IsRestricted & UI to edit it * Pass user object instead of user id to places where IsRestricted flag matters * Restricted users: maintain access rows for all referenced repos (incl public) * Take logged in user & IsRestricted flag into account in org/repo listings, searches and accesses * Add basic repo access tests for restricted users Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Mention restricted users in the faq Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Revert unnecessary change `.isUserPartOfOrg` -> `.IsUserPartOfOrg` Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Remove unnecessary `org.IsOrganization()` call Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Revert to an `int64` keyed `accessMap` * Add type `userAccess` * Add convenience func updateUserAccess() * Turn accessMap into a `map[int64]userAccess` Signed-off-by: Manush Dodunekov <manush@stendahls.se> * or even better: `map[int64]*userAccess` * updateUserAccess(): use tighter syntax as suggested by lafriks * even tighter * Avoid extra loop * Don't disclose limited orgs to unauthenticated users * Don't assume block only applies to orgs * Use an array of `VisibleType` for filtering * fix yet another thinko * Ok - no need for u * Revert "Ok - no need for u" This reverts commit 5c3e886aabd5acd997a3b35687d322439732c200. Co-authored-by: Antoine GIRARD <sapk@users.noreply.github.com> Co-authored-by: Lauris BH <lauris@nix.lv>
5 years ago
Restricted users (#6274) * Restricted users (#4334): initial implementation * Add User.IsRestricted & UI to edit it * Pass user object instead of user id to places where IsRestricted flag matters * Restricted users: maintain access rows for all referenced repos (incl public) * Take logged in user & IsRestricted flag into account in org/repo listings, searches and accesses * Add basic repo access tests for restricted users Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Mention restricted users in the faq Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Revert unnecessary change `.isUserPartOfOrg` -> `.IsUserPartOfOrg` Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Remove unnecessary `org.IsOrganization()` call Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Revert to an `int64` keyed `accessMap` * Add type `userAccess` * Add convenience func updateUserAccess() * Turn accessMap into a `map[int64]userAccess` Signed-off-by: Manush Dodunekov <manush@stendahls.se> * or even better: `map[int64]*userAccess` * updateUserAccess(): use tighter syntax as suggested by lafriks * even tighter * Avoid extra loop * Don't disclose limited orgs to unauthenticated users * Don't assume block only applies to orgs * Use an array of `VisibleType` for filtering * fix yet another thinko * Ok - no need for u * Revert "Ok - no need for u" This reverts commit 5c3e886aabd5acd997a3b35687d322439732c200. Co-authored-by: Antoine GIRARD <sapk@users.noreply.github.com> Co-authored-by: Lauris BH <lauris@nix.lv>
5 years ago
Restricted users (#6274) * Restricted users (#4334): initial implementation * Add User.IsRestricted & UI to edit it * Pass user object instead of user id to places where IsRestricted flag matters * Restricted users: maintain access rows for all referenced repos (incl public) * Take logged in user & IsRestricted flag into account in org/repo listings, searches and accesses * Add basic repo access tests for restricted users Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Mention restricted users in the faq Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Revert unnecessary change `.isUserPartOfOrg` -> `.IsUserPartOfOrg` Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Remove unnecessary `org.IsOrganization()` call Signed-off-by: Manush Dodunekov <manush@stendahls.se> * Revert to an `int64` keyed `accessMap` * Add type `userAccess` * Add convenience func updateUserAccess() * Turn accessMap into a `map[int64]userAccess` Signed-off-by: Manush Dodunekov <manush@stendahls.se> * or even better: `map[int64]*userAccess` * updateUserAccess(): use tighter syntax as suggested by lafriks * even tighter * Avoid extra loop * Don't disclose limited orgs to unauthenticated users * Don't assume block only applies to orgs * Use an array of `VisibleType` for filtering * fix yet another thinko * Ok - no need for u * Revert "Ok - no need for u" This reverts commit 5c3e886aabd5acd997a3b35687d322439732c200. Co-authored-by: Antoine GIRARD <sapk@users.noreply.github.com> Co-authored-by: Lauris BH <lauris@nix.lv>
5 years ago
11 years ago
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Copyright 2019 The Gitea Authors. All rights reserved.
  3. // Use of this source code is governed by a MIT-style
  4. // license that can be found in the LICENSE file.
  5. package models
  6. import (
  7. "fmt"
  8. "path"
  9. "strconv"
  10. "strings"
  11. "time"
  12. "code.gitea.io/gitea/modules/base"
  13. "code.gitea.io/gitea/modules/git"
  14. "code.gitea.io/gitea/modules/log"
  15. "code.gitea.io/gitea/modules/setting"
  16. "code.gitea.io/gitea/modules/timeutil"
  17. "xorm.io/builder"
  18. )
  19. // ActionType represents the type of an action.
  20. type ActionType int
  21. // Possible action types.
  22. const (
  23. ActionCreateRepo ActionType = iota + 1 // 1
  24. ActionRenameRepo // 2
  25. ActionStarRepo // 3
  26. ActionWatchRepo // 4
  27. ActionCommitRepo // 5
  28. ActionCreateIssue // 6
  29. ActionCreatePullRequest // 7
  30. ActionTransferRepo // 8
  31. ActionPushTag // 9
  32. ActionCommentIssue // 10
  33. ActionMergePullRequest // 11
  34. ActionCloseIssue // 12
  35. ActionReopenIssue // 13
  36. ActionClosePullRequest // 14
  37. ActionReopenPullRequest // 15
  38. ActionDeleteTag // 16
  39. ActionDeleteBranch // 17
  40. ActionMirrorSyncPush // 18
  41. ActionMirrorSyncCreate // 19
  42. ActionMirrorSyncDelete // 20
  43. ActionApprovePullRequest // 21
  44. ActionRejectPullRequest // 22
  45. ActionCommentPull // 23
  46. ActionPublishRelease // 24
  47. )
  48. // Action represents user operation type and other information to
  49. // repository. It implemented interface base.Actioner so that can be
  50. // used in template render.
  51. type Action struct {
  52. ID int64 `xorm:"pk autoincr"`
  53. UserID int64 `xorm:"INDEX"` // Receiver user id.
  54. OpType ActionType
  55. ActUserID int64 `xorm:"INDEX"` // Action user id.
  56. ActUser *User `xorm:"-"`
  57. RepoID int64 `xorm:"INDEX"`
  58. Repo *Repository `xorm:"-"`
  59. CommentID int64 `xorm:"INDEX"`
  60. Comment *Comment `xorm:"-"`
  61. IsDeleted bool `xorm:"INDEX NOT NULL DEFAULT false"`
  62. RefName string
  63. IsPrivate bool `xorm:"INDEX NOT NULL DEFAULT false"`
  64. Content string `xorm:"TEXT"`
  65. CreatedUnix timeutil.TimeStamp `xorm:"INDEX created"`
  66. }
  67. // GetOpType gets the ActionType of this action.
  68. func (a *Action) GetOpType() ActionType {
  69. return a.OpType
  70. }
  71. // LoadActUser loads a.ActUser
  72. func (a *Action) LoadActUser() {
  73. if a.ActUser != nil {
  74. return
  75. }
  76. var err error
  77. a.ActUser, err = GetUserByID(a.ActUserID)
  78. if err == nil {
  79. return
  80. } else if IsErrUserNotExist(err) {
  81. a.ActUser = NewGhostUser()
  82. } else {
  83. log.Error("GetUserByID(%d): %v", a.ActUserID, err)
  84. }
  85. }
  86. func (a *Action) loadRepo() {
  87. if a.Repo != nil {
  88. return
  89. }
  90. var err error
  91. a.Repo, err = GetRepositoryByID(a.RepoID)
  92. if err != nil {
  93. log.Error("GetRepositoryByID(%d): %v", a.RepoID, err)
  94. }
  95. }
  96. // GetActFullName gets the action's user full name.
  97. func (a *Action) GetActFullName() string {
  98. a.LoadActUser()
  99. return a.ActUser.FullName
  100. }
  101. // GetActUserName gets the action's user name.
  102. func (a *Action) GetActUserName() string {
  103. a.LoadActUser()
  104. return a.ActUser.Name
  105. }
  106. // ShortActUserName gets the action's user name trimmed to max 20
  107. // chars.
  108. func (a *Action) ShortActUserName() string {
  109. return base.EllipsisString(a.GetActUserName(), 20)
  110. }
  111. // GetDisplayName gets the action's display name based on DEFAULT_SHOW_FULL_NAME, or falls back to the username if it is blank.
  112. func (a *Action) GetDisplayName() string {
  113. if setting.UI.DefaultShowFullName {
  114. trimmedFullName := strings.TrimSpace(a.GetActFullName())
  115. if len(trimmedFullName) > 0 {
  116. return trimmedFullName
  117. }
  118. }
  119. return a.ShortActUserName()
  120. }
  121. // GetDisplayNameTitle gets the action's display name used for the title (tooltip) based on DEFAULT_SHOW_FULL_NAME
  122. func (a *Action) GetDisplayNameTitle() string {
  123. if setting.UI.DefaultShowFullName {
  124. return a.ShortActUserName()
  125. }
  126. return a.GetActFullName()
  127. }
  128. // GetRepoUserName returns the name of the action repository owner.
  129. func (a *Action) GetRepoUserName() string {
  130. a.loadRepo()
  131. return a.Repo.OwnerName
  132. }
  133. // ShortRepoUserName returns the name of the action repository owner
  134. // trimmed to max 20 chars.
  135. func (a *Action) ShortRepoUserName() string {
  136. return base.EllipsisString(a.GetRepoUserName(), 20)
  137. }
  138. // GetRepoName returns the name of the action repository.
  139. func (a *Action) GetRepoName() string {
  140. a.loadRepo()
  141. return a.Repo.Name
  142. }
  143. // ShortRepoName returns the name of the action repository
  144. // trimmed to max 33 chars.
  145. func (a *Action) ShortRepoName() string {
  146. return base.EllipsisString(a.GetRepoName(), 33)
  147. }
  148. // GetRepoPath returns the virtual path to the action repository.
  149. func (a *Action) GetRepoPath() string {
  150. return path.Join(a.GetRepoUserName(), a.GetRepoName())
  151. }
  152. // ShortRepoPath returns the virtual path to the action repository
  153. // trimmed to max 20 + 1 + 33 chars.
  154. func (a *Action) ShortRepoPath() string {
  155. return path.Join(a.ShortRepoUserName(), a.ShortRepoName())
  156. }
  157. // GetRepoLink returns relative link to action repository.
  158. func (a *Action) GetRepoLink() string {
  159. if len(setting.AppSubURL) > 0 {
  160. return path.Join(setting.AppSubURL, a.GetRepoPath())
  161. }
  162. return "/" + a.GetRepoPath()
  163. }
  164. // GetRepositoryFromMatch returns a *Repository from a username and repo strings
  165. func GetRepositoryFromMatch(ownerName string, repoName string) (*Repository, error) {
  166. var err error
  167. refRepo, err := GetRepositoryByOwnerAndName(ownerName, repoName)
  168. if err != nil {
  169. if IsErrRepoNotExist(err) {
  170. log.Warn("Repository referenced in commit but does not exist: %v", err)
  171. return nil, err
  172. }
  173. log.Error("GetRepositoryByOwnerAndName: %v", err)
  174. return nil, err
  175. }
  176. return refRepo, nil
  177. }
  178. // GetCommentLink returns link to action comment.
  179. func (a *Action) GetCommentLink() string {
  180. return a.getCommentLink(x)
  181. }
  182. func (a *Action) getCommentLink(e Engine) string {
  183. if a == nil {
  184. return "#"
  185. }
  186. if a.Comment == nil && a.CommentID != 0 {
  187. a.Comment, _ = getCommentByID(e, a.CommentID)
  188. }
  189. if a.Comment != nil {
  190. return a.Comment.HTMLURL()
  191. }
  192. if len(a.GetIssueInfos()) == 0 {
  193. return "#"
  194. }
  195. //Return link to issue
  196. issueIDString := a.GetIssueInfos()[0]
  197. issueID, err := strconv.ParseInt(issueIDString, 10, 64)
  198. if err != nil {
  199. return "#"
  200. }
  201. issue, err := getIssueByID(e, issueID)
  202. if err != nil {
  203. return "#"
  204. }
  205. if err = issue.loadRepo(e); err != nil {
  206. return "#"
  207. }
  208. return issue.HTMLURL()
  209. }
  210. // GetBranch returns the action's repository branch.
  211. func (a *Action) GetBranch() string {
  212. return strings.TrimPrefix(a.RefName, git.BranchPrefix)
  213. }
  214. // GetTag returns the action's repository tag.
  215. func (a *Action) GetTag() string {
  216. return strings.TrimPrefix(a.RefName, git.TagPrefix)
  217. }
  218. // GetContent returns the action's content.
  219. func (a *Action) GetContent() string {
  220. return a.Content
  221. }
  222. // GetCreate returns the action creation time.
  223. func (a *Action) GetCreate() time.Time {
  224. return a.CreatedUnix.AsTime()
  225. }
  226. // GetIssueInfos returns a list of issues associated with
  227. // the action.
  228. func (a *Action) GetIssueInfos() []string {
  229. return strings.SplitN(a.Content, "|", 2)
  230. }
  231. // GetIssueTitle returns the title of first issue associated
  232. // with the action.
  233. func (a *Action) GetIssueTitle() string {
  234. index, _ := strconv.ParseInt(a.GetIssueInfos()[0], 10, 64)
  235. issue, err := GetIssueByIndex(a.RepoID, index)
  236. if err != nil {
  237. log.Error("GetIssueByIndex: %v", err)
  238. return "500 when get issue"
  239. }
  240. return issue.Title
  241. }
  242. // GetIssueContent returns the content of first issue associated with
  243. // this action.
  244. func (a *Action) GetIssueContent() string {
  245. index, _ := strconv.ParseInt(a.GetIssueInfos()[0], 10, 64)
  246. issue, err := GetIssueByIndex(a.RepoID, index)
  247. if err != nil {
  248. log.Error("GetIssueByIndex: %v", err)
  249. return "500 when get issue"
  250. }
  251. return issue.Content
  252. }
  253. // GetFeedsOptions options for retrieving feeds
  254. type GetFeedsOptions struct {
  255. RequestedUser *User // the user we want activity for
  256. RequestedTeam *Team // the team we want activity for
  257. Actor *User // the user viewing the activity
  258. IncludePrivate bool // include private actions
  259. OnlyPerformedBy bool // only actions performed by requested user
  260. IncludeDeleted bool // include deleted actions
  261. }
  262. // GetFeeds returns actions according to the provided options
  263. func GetFeeds(opts GetFeedsOptions) ([]*Action, error) {
  264. if !activityReadable(opts.RequestedUser, opts.Actor) {
  265. return make([]*Action, 0), nil
  266. }
  267. cond, err := activityQueryCondition(opts)
  268. if err != nil {
  269. return nil, err
  270. }
  271. actions := make([]*Action, 0, setting.UI.FeedPagingNum)
  272. if err := x.Limit(setting.UI.FeedPagingNum).Desc("id").Where(cond).Find(&actions); err != nil {
  273. return nil, fmt.Errorf("Find: %v", err)
  274. }
  275. if err := ActionList(actions).LoadAttributes(); err != nil {
  276. return nil, fmt.Errorf("LoadAttributes: %v", err)
  277. }
  278. return actions, nil
  279. }
  280. func activityReadable(user *User, doer *User) bool {
  281. var doerID int64
  282. if doer != nil {
  283. doerID = doer.ID
  284. }
  285. if doer == nil || !doer.IsAdmin {
  286. if user.KeepActivityPrivate && doerID != user.ID {
  287. return false
  288. }
  289. }
  290. return true
  291. }
  292. func activityQueryCondition(opts GetFeedsOptions) (builder.Cond, error) {
  293. cond := builder.NewCond()
  294. var repoIDs []int64
  295. var actorID int64
  296. if opts.Actor != nil {
  297. actorID = opts.Actor.ID
  298. }
  299. // check readable repositories by doer/actor
  300. if opts.Actor == nil || !opts.Actor.IsAdmin {
  301. if opts.RequestedUser.IsOrganization() {
  302. env, err := opts.RequestedUser.AccessibleReposEnv(actorID)
  303. if err != nil {
  304. return nil, fmt.Errorf("AccessibleReposEnv: %v", err)
  305. }
  306. if repoIDs, err = env.RepoIDs(1, opts.RequestedUser.NumRepos); err != nil {
  307. return nil, fmt.Errorf("GetUserRepositories: %v", err)
  308. }
  309. cond = cond.And(builder.In("repo_id", repoIDs))
  310. } else {
  311. cond = cond.And(builder.In("repo_id", AccessibleRepoIDsQuery(opts.Actor)))
  312. }
  313. }
  314. if opts.RequestedTeam != nil {
  315. env := opts.RequestedUser.AccessibleTeamReposEnv(opts.RequestedTeam)
  316. teamRepoIDs, err := env.RepoIDs(1, opts.RequestedUser.NumRepos)
  317. if err != nil {
  318. return nil, fmt.Errorf("GetTeamRepositories: %v", err)
  319. }
  320. cond = cond.And(builder.In("repo_id", teamRepoIDs))
  321. }
  322. cond = cond.And(builder.Eq{"user_id": opts.RequestedUser.ID})
  323. if opts.OnlyPerformedBy {
  324. cond = cond.And(builder.Eq{"act_user_id": opts.RequestedUser.ID})
  325. }
  326. if !opts.IncludePrivate {
  327. cond = cond.And(builder.Eq{"is_private": false})
  328. }
  329. if !opts.IncludeDeleted {
  330. cond = cond.And(builder.Eq{"is_deleted": false})
  331. }
  332. return cond, nil
  333. }