diff --git a/models/user.go b/models/user.go
index 3dcd2eee9..42e688358 100755
--- a/models/user.go
+++ b/models/user.go
@@ -976,12 +976,12 @@ func CreateUser(u *User) (err error) {
result, err := blockchain.CreateBlockchainAccount()
if err != nil {
log.Error("createBlockchainAccount failed:", err.Error())
- return err
+ //return err
+ } else {
+ u.PublicKey = result.Payload["publickey"].(string)
+ u.PrivateKey = result.Payload["privatekey"].(string)
}
- u.PublicKey = result.Payload["publickey"].(string)
- u.PrivateKey = result.Payload["privatekey"].(string)
-
sess := x.NewSession()
defer sess.Close()
if err = sess.Begin(); err != nil {
diff --git a/models/user_mail.go b/models/user_mail.go
old mode 100644
new mode 100755
index af9602e71..7244ec378
--- a/models/user_mail.go
+++ b/models/user_mail.go
@@ -80,6 +80,18 @@ func GetEmailAddressByID(uid, id int64) (*EmailAddress, error) {
return email, nil
}
+// GetEmailAddressByIDAndEmail gets a user's email address by ID and email
+func GetEmailAddressByIDAndEmail(uid int64, emailAddr string) (*EmailAddress, error) {
+ // User ID is required for security reasons
+ email := &EmailAddress{UID: uid, Email: emailAddr}
+ if has, err := x.Get(email); err != nil {
+ return nil, err
+ } else if !has {
+ return nil, nil
+ }
+ return email, nil
+}
+
func isEmailActive(e Engine, email string, userID, emailID int64) (bool, error) {
if len(email) == 0 {
return true, nil
diff --git a/modules/convert/convert.go b/modules/convert/convert.go
old mode 100644
new mode 100755
index ec18b1305..fa2e8f2e7
--- a/modules/convert/convert.go
+++ b/modules/convert/convert.go
@@ -335,6 +335,7 @@ func ToUser(user *models.User, signed, authed bool) *api.User {
AvatarURL: user.AvatarLink(),
FullName: markup.Sanitize(user.FullName),
Created: user.CreatedUnix.AsTime(),
+ IsActive: user.IsActive,
}
// hide primary email if API caller is anonymous or user keep email private
if signed && (!user.KeepEmailPrivate || authed) {
diff --git a/modules/structs/user.go b/modules/structs/user.go
old mode 100644
new mode 100755
index bf52cc9ed..d6e7298cc
--- a/modules/structs/user.go
+++ b/modules/structs/user.go
@@ -26,6 +26,8 @@ type User struct {
Language string `json:"language"`
// Is the user an administrator
IsAdmin bool `json:"is_admin"`
+ // Is the user active
+ IsActive bool `json:"is_active"`
// swagger:strfmt date-time
LastLogin time.Time `json:"last_login,omitempty"`
// swagger:strfmt date-time
diff --git a/options/locale/locale_en-US.ini b/options/locale/locale_en-US.ini
index e809a33e8..b81dc9694 100644
--- a/options/locale/locale_en-US.ini
+++ b/options/locale/locale_en-US.ini
@@ -90,7 +90,7 @@ loading = Loading…
error404_index = Request forbidden by administrative rules
error500_index = Internal Server Error
error404 = The page you are trying to reach either does not exist or you are not authorized to view it.
-
+error500= Sorry, the site has encountered some problems, we are trying to fix the page, please try again later.
[error]
occurred = An error has occurred
report_message = An error has occurred
diff --git a/options/locale/locale_zh-CN.ini b/options/locale/locale_zh-CN.ini
index 9747bc7dc..5ac54f6c8 100755
--- a/options/locale/locale_zh-CN.ini
+++ b/options/locale/locale_zh-CN.ini
@@ -90,6 +90,7 @@ loading=正在加载...
error404_index = 您的访问受限!
error500_index = 抱歉!您指定的网页无法访问。
error404=您正尝试访问的页面 不存在 或 您尚未被授权 查看该页面。
+error500=抱歉,站点遇到一些问题,我们正尝试修复网页,请您稍后再试。
[error]
occurred=发生错误
diff --git a/package-lock.json b/package-lock.json
index 2c3c983e6..b0b0acad0 100644
--- a/package-lock.json
+++ b/package-lock.json
@@ -1841,6 +1841,14 @@
"async-done": "^1.2.2"
}
},
+ "async-validator": {
+ "version": "1.8.5",
+ "resolved": "https://registry.npmjs.org/async-validator/-/async-validator-1.8.5.tgz",
+ "integrity": "sha512-tXBM+1m056MAX0E8TL2iCjg8WvSyXu0Zc8LNtYqrVeyoL3+esHRZ4SieE9fKQyyU09uONjnMEjrNBMqT0mbvmA==",
+ "requires": {
+ "babel-runtime": "6.x"
+ }
+ },
"asynckit": {
"version": "0.4.0",
"resolved": "https://registry.npmjs.org/asynckit/-/asynckit-0.4.0.tgz",
@@ -1934,6 +1942,11 @@
}
}
},
+ "babel-helper-vue-jsx-merge-props": {
+ "version": "2.0.3",
+ "resolved": "https://registry.npmjs.org/babel-helper-vue-jsx-merge-props/-/babel-helper-vue-jsx-merge-props-2.0.3.tgz",
+ "integrity": "sha512-gsLiKK7Qrb7zYJNgiXKpXblxbV5ffSwR0f5whkPAaBAR4fhi6bwRZxX9wBlIc5M/v8CCkXUbXZL4N/nSE97cqg=="
+ },
"babel-loader": {
"version": "8.1.0",
"resolved": "https://registry.npmjs.org/babel-loader/-/babel-loader-8.1.0.tgz",
@@ -3882,6 +3895,26 @@
"resolved": "https://registry.npmjs.org/electron-to-chromium/-/electron-to-chromium-1.3.437.tgz",
"integrity": "sha512-PBQn2q68ErqMyBUABh9Gh8R6DunGky8aB5y3N5lPM7OVpldwyUbAK5AX9WcwE/5F6ceqvQ+iQLYkJYRysAs6Bg=="
},
+ "element-ui": {
+ "version": "2.15.5",
+ "resolved": "https://registry.npmjs.org/element-ui/-/element-ui-2.15.5.tgz",
+ "integrity": "sha512-B/YCdz2aRY2WnFXzbTRTHPKZHBD/2KV6u88EBnkaARC/Lyxnap+7vpvrcW5UNTyVwjItS5Fj1eQyRy6236lbXg==",
+ "requires": {
+ "async-validator": "~1.8.1",
+ "babel-helper-vue-jsx-merge-props": "^2.0.0",
+ "deepmerge": "^1.2.0",
+ "normalize-wheel": "^1.0.1",
+ "resize-observer-polyfill": "^1.5.0",
+ "throttle-debounce": "^1.0.1"
+ },
+ "dependencies": {
+ "deepmerge": {
+ "version": "1.5.2",
+ "resolved": "https://registry.npmjs.org/deepmerge/-/deepmerge-1.5.2.tgz",
+ "integrity": "sha512-95k0GDqvBjZavkuvzx/YqVLv/6YYa17fz6ILMSf7neqQITCPbnfEnQvEgMPNjH4kgobe7+WIL0yJEHku+H3qtQ=="
+ }
+ }
+ },
"elliptic": {
"version": "6.5.4",
"resolved": "https://registry.npmjs.org/elliptic/-/elliptic-6.5.4.tgz",
@@ -9186,6 +9219,11 @@
"resolved": "https://registry.npmjs.org/normalize-url/-/normalize-url-3.3.0.tgz",
"integrity": "sha512-U+JJi7duF1o+u2pynbp2zXDW2/PADgC30f0GsHZtRh+HOcXHnw137TrNlyxxRvWW5fjKd3bcLHPxofWuCjaeZg=="
},
+ "normalize-wheel": {
+ "version": "1.0.1",
+ "resolved": "https://registry.npmjs.org/normalize-wheel/-/normalize-wheel-1.0.1.tgz",
+ "integrity": "sha1-rsiGr/2wRQcNhWRH32Ls+GFG7EU="
+ },
"now-and-later": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/now-and-later/-/now-and-later-2.0.1.tgz",
@@ -11687,6 +11725,11 @@
"resolved": "https://registry.npmjs.org/reselect/-/reselect-4.0.0.tgz",
"integrity": "sha512-qUgANli03jjAyGlnbYVAV5vvnOmJnODyABz51RdBN7M4WaVu8mecZWgyQNkG8Yqe3KRGRt0l4K4B3XVEULC4CA=="
},
+ "resize-observer-polyfill": {
+ "version": "1.5.1",
+ "resolved": "https://registry.npmjs.org/resize-observer-polyfill/-/resize-observer-polyfill-1.5.1.tgz",
+ "integrity": "sha512-LwZrotdHOo12nQuZlHEmtuXdqGoOD0OhaxopaNFxWzInpEgaLWoVuAMbTzixuosCx2nEG58ngzW3vxdWoxIgdg=="
+ },
"resolve": {
"version": "1.17.0",
"resolved": "https://registry.npmjs.org/resolve/-/resolve-1.17.0.tgz",
@@ -13526,6 +13569,11 @@
"resolved": "https://registry.npmjs.org/textextensions/-/textextensions-2.6.0.tgz",
"integrity": "sha512-49WtAWS+tcsy93dRt6P0P3AMD2m5PvXRhuEA0kaXos5ZLlujtYmpmFsB+QvWUSxE1ZsstmYXfQ7L40+EcQgpAQ=="
},
+ "throttle-debounce": {
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/throttle-debounce/-/throttle-debounce-1.1.0.tgz",
+ "integrity": "sha512-XH8UiPCQcWNuk2LYePibW/4qL97+ZQ1AN3FNXwZRBNPPowo/NRU5fAlDCSNBJIYCKbioZfuYtMhG4quqoJhVzg=="
+ },
"through": {
"version": "2.3.8",
"resolved": "https://registry.npmjs.org/through/-/through-2.3.8.tgz",
diff --git a/package.json b/package.json
index 4afc213e7..bda9843e8 100644
--- a/package.json
+++ b/package.json
@@ -19,6 +19,7 @@
"cssnano": "4.1.10",
"domino": "2.1.5",
"dropzone": "5.7.2",
+ "element-ui": "2.15.5",
"esdk-obs-browserjs": "3.20.7",
"esdk-obs-nodejs": "3.20.11",
"fast-glob": "3.2.2",
diff --git a/routers/repo/attachment.go b/routers/repo/attachment.go
index b59f4ffc7..fea7a3384 100755
--- a/routers/repo/attachment.go
+++ b/routers/repo/attachment.go
@@ -141,6 +141,35 @@ func DeleteAttachment(ctx *context.Context) {
})
}
+func DownloadUserIsOrgOrCollaboration(ctx *context.Context, attach *models.Attachment) bool {
+ dataset, err := models.GetDatasetByID(attach.DatasetID)
+ if err != nil {
+ log.Info("query dataset error")
+ } else {
+ repo, err := models.GetRepositoryByID(dataset.RepoID)
+ if err != nil {
+ log.Info("query repo error.")
+ } else {
+ repo.GetOwner()
+ if ctx.User != nil {
+
+ if repo.Owner.IsOrganization() {
+ if repo.Owner.IsUserPartOfOrg(ctx.User.ID) {
+ log.Info("org user may visit the attach.")
+ return true
+ }
+ }
+ isCollaborator, _ := repo.IsCollaborator(ctx.User.ID)
+ if isCollaborator {
+ log.Info("Collaborator user may visit the attach.")
+ return true
+ }
+ }
+ }
+ }
+ return false
+}
+
// GetAttachment serve attachements
func GetAttachment(ctx *context.Context) {
typeCloudBrain := ctx.QueryInt("type")
@@ -165,16 +194,29 @@ func GetAttachment(ctx *context.Context) {
ctx.ServerError("LinkedRepository", err)
return
}
+ dataSet, err := attach.LinkedDataSet()
+ if err != nil {
+ ctx.ServerError("LinkedDataSet", err)
+ return
+ }
+
+ if repository == nil && dataSet != nil {
+ repository, _ = models.GetRepositoryByID(dataSet.RepoID)
+ unitType = models.UnitTypeDatasets
+ }
if repository == nil { //If not linked
- if !(ctx.IsSigned && attach.UploaderID == ctx.User.ID) && attach.IsPrivate { //We block if not the uploader
+ //if !(ctx.IsSigned && attach.UploaderID == ctx.User.ID) && attach.IsPrivate { //We block if not the uploader
+ //log.Info("ctx.IsSigned =" + fmt.Sprintf("%v", ctx.IsSigned))
+ if !(ctx.IsSigned && attach.UploaderID == ctx.User.ID) && attach.IsPrivate && !DownloadUserIsOrgOrCollaboration(ctx, attach) { //We block if not the uploader
ctx.Error(http.StatusNotFound)
return
}
+
} else { //If we have the repository we check access
- perm, err := models.GetUserRepoPermission(repository, ctx.User)
- if err != nil {
- ctx.Error(http.StatusInternalServerError, "GetUserRepoPermission", err.Error())
+ perm, errPermission := models.GetUserRepoPermission(repository, ctx.User)
+ if errPermission != nil {
+ ctx.Error(http.StatusInternalServerError, "GetUserRepoPermission", errPermission.Error())
return
}
if !perm.CanRead(unitType) {
@@ -183,12 +225,6 @@ func GetAttachment(ctx *context.Context) {
}
}
- dataSet, err := attach.LinkedDataSet()
- if err != nil {
- ctx.ServerError("LinkedDataSet", err)
- return
- }
-
if dataSet != nil {
isPermit, err := models.GetUserDataSetPermission(dataSet, ctx.User)
if err != nil {
@@ -205,7 +241,7 @@ func GetAttachment(ctx *context.Context) {
if setting.Attachment.StoreType == storage.MinioStorageType {
url := ""
if typeCloudBrain == models.TypeCloudBrainOne {
- url, err = storage.Attachments.PresignedGetURL(setting.Attachment.Minio.BasePath + attach.RelativePath(), attach.Name)
+ url, err = storage.Attachments.PresignedGetURL(setting.Attachment.Minio.BasePath+attach.RelativePath(), attach.Name)
if err != nil {
ctx.ServerError("PresignedGetURL", err)
return
diff --git a/routers/repo/dataset.go b/routers/repo/dataset.go
index 3be36fbe4..b2da4b8d8 100755
--- a/routers/repo/dataset.go
+++ b/routers/repo/dataset.go
@@ -1,15 +1,13 @@
package repo
import (
- "sort"
-
- "code.gitea.io/gitea/modules/setting"
-
"code.gitea.io/gitea/models"
"code.gitea.io/gitea/modules/auth"
"code.gitea.io/gitea/modules/base"
"code.gitea.io/gitea/modules/context"
"code.gitea.io/gitea/modules/log"
+ "code.gitea.io/gitea/modules/setting"
+ "sort"
)
const (
@@ -24,19 +22,42 @@ func MustEnableDataset(ctx *context.Context) {
}
}
-func filterPrivateAttachments(ctx *context.Context, list []*models.Attachment) []*models.Attachment {
+func newFilterPrivateAttachments(ctx *context.Context, list []*models.Attachment, repo *models.Repository) []*models.Attachment {
+
if ctx.Repo.CanWrite(models.UnitTypeDatasets) {
+ log.Info("can write.")
return list
} else {
+ if repo.Owner == nil {
+ repo.GetOwner()
+ }
+ permission := false
+ if repo.Owner.IsOrganization() && ctx.User != nil {
+ if repo.Owner.IsUserPartOfOrg(ctx.User.ID) {
+ log.Info("user is member of org.")
+ permission = true
+ }
+ }
+ if !permission && ctx.User != nil {
+ isCollaborator, _ := repo.IsCollaborator(ctx.User.ID)
+ if isCollaborator {
+ log.Info("Collaborator user may visit the attach.")
+ permission = true
+ }
+ }
+
var publicList []*models.Attachment
for _, attach := range list {
if !attach.IsPrivate {
publicList = append(publicList, attach)
+ } else {
+ if permission {
+ publicList = append(publicList, attach)
+ }
}
}
return publicList
}
-
}
func DatasetIndex(ctx *context.Context) {
@@ -60,7 +81,7 @@ func DatasetIndex(ctx *context.Context) {
ctx.ServerError("GetDatasetAttachments", err)
return
}
- attachments := filterPrivateAttachments(ctx, dataset.Attachments)
+ attachments := newFilterPrivateAttachments(ctx, dataset.Attachments, repo)
ctx.Data["SortType"] = ctx.Query("sort")
switch ctx.Query("sort") {
diff --git a/routers/repo/view.go b/routers/repo/view.go
index 76593ecc7..945f6b0e0 100644
--- a/routers/repo/view.go
+++ b/routers/repo/view.go
@@ -569,10 +569,19 @@ func safeURL(address string) string {
}
type ContributorInfo struct {
- UserInfo *models.User
- Email string // for contributor who is not a registered user
+ UserInfo *models.User // nil for contributor who is not a registered user
+ Email string
+ CommitCnt int
}
+func getContributorInfo(contributorInfos []*ContributorInfo, email string) *ContributorInfo{
+ for _, c := range contributorInfos {
+ if strings.Compare(c.Email,email) == 0 {
+ return c
+ }
+ }
+ return nil
+}
// Home render repository home page
func Home(ctx *context.Context) {
if len(ctx.Repo.Units) > 0 {
@@ -581,15 +590,31 @@ func Home(ctx *context.Context) {
if err == nil && contributors != nil {
var contributorInfos []*ContributorInfo
for _, c := range contributors {
+ // get user info from committer email
user, err := models.GetUserByEmail(c.Email)
if err == nil {
- contributorInfos = append(contributorInfos, &ContributorInfo{
- user, c.Email,
- })
+ // committer is system user, get info through user's primary email
+ existedContributorInfo := getContributorInfo(contributorInfos,user.Email)
+ if existedContributorInfo != nil {
+ // existed: same primary email, different committer name
+ existedContributorInfo.CommitCnt += c.CommitCnt
+ }else{
+ // new committer info
+ contributorInfos = append(contributorInfos, &ContributorInfo{
+ user, user.Email,c.CommitCnt,
+ })
+ }
} else {
- contributorInfos = append(contributorInfos, &ContributorInfo{
- nil, c.Email,
- })
+ // committer is not system user
+ existedContributorInfo := getContributorInfo(contributorInfos,c.Email)
+ if existedContributorInfo != nil {
+ // existed: same primary email, different committer name
+ existedContributorInfo.CommitCnt += c.CommitCnt
+ }else{
+ contributorInfos = append(contributorInfos, &ContributorInfo{
+ nil, c.Email,c.CommitCnt,
+ })
+ }
}
}
ctx.Data["ContributorInfo"] = contributorInfos
diff --git a/routers/routes/routes.go b/routers/routes/routes.go
index 100ff009f..b3565878e 100755
--- a/routers/routes/routes.go
+++ b/routers/routes/routes.go
@@ -1129,7 +1129,7 @@ func RegisterRoutes(m *macaron.Macaron) {
//secure api,
m.Group("/secure", func() {
- m.Post("/user", binding.Bind(structs.CreateUserOption{}), secure.CreateUser)
+ m.Post("/user", binding.BindIgnErr(structs.CreateUserOption{}), secure.CreateUser)
}, reqBasicAuth)
m.Group("/api/internal", func() {
diff --git a/routers/secure/user.go b/routers/secure/user.go
index 8c06b0dab..8567dc9e6 100755
--- a/routers/secure/user.go
+++ b/routers/secure/user.go
@@ -7,6 +7,7 @@ package secure
import (
"net/http"
+ "strings"
"code.gitea.io/gitea/models"
"code.gitea.io/gitea/modules/context"
@@ -75,11 +76,19 @@ func CreateUser(ctx *context.Context, form api.CreateUserOption) {
u.MustChangePassword = *form.MustChangePassword
}
+ if strings.Contains(form.Email, " ") {
+ log.Error("CreateUser failed: email(%s) contains blank space", form.Email, ctx.Data["MsgID"])
+ ctx.JSON(http.StatusBadRequest, map[string]string{
+ "error_msg": "Email contains blank space",
+ })
+ return
+ }
+
parseLoginSource(ctx, u, form.SourceID, form.LoginName)
if ctx.Written() {
return
}
- if !password.IsComplexEnough(form.Password) {
+ if !password.IsComplexEnough(form.Password) || len(form.Password) < setting.MinPasswordLength {
log.Error("CreateUser failed: PasswordComplexity", ctx.Data["MsgID"])
ctx.JSON(http.StatusBadRequest, map[string]string{
"error_msg": "PasswordComplexity",
@@ -104,6 +113,29 @@ func CreateUser(ctx *context.Context, form api.CreateUserOption) {
}
return
}
+
+ err := models.AddEmailAddress(&models.EmailAddress{
+ UID: u.ID,
+ Email: form.Email,
+ IsActivated: !setting.Service.RegisterEmailConfirm,
+ })
+
+ if err != nil {
+ log.Error("AddEmailAddress failed:%v", err.Error(), ctx.Data["MsgID"])
+ ctx.JSON(http.StatusInternalServerError, map[string]string{
+ "error_msg": err.Error(),
+ })
+ return
+ }
+
+ // Send confirmation email
+ if setting.Service.RegisterEmailConfirm{
+ mailer.SendActivateAccountMail(ctx.Locale, u)
+ if err := ctx.Cache.Put("MailResendLimit_"+u.LowerName, u.LowerName, 180); err != nil {
+ log.Error("Set cache(MailResendLimit) fail: %v", err)
+ }
+ }
+
log.Trace("Account created (%s): %s", ctx.User.Name, u.Name, ctx.Data["MsgID"])
// Send email notification.
diff --git a/routers/user/auth.go b/routers/user/auth.go
index dc5c5536b..13e338565 100755
--- a/routers/user/auth.go
+++ b/routers/user/auth.go
@@ -1165,7 +1165,19 @@ func SignUpPost(ctx *context.Context, cpt *captcha.Captcha, form auth.RegisterFo
}
return
}
- log.Trace("Account created: %s", u.Name)
+ log.Trace("Account created: %s", u.Name, ctx.Data["MsgID"])
+
+ err := models.AddEmailAddress(&models.EmailAddress{
+ UID: u.ID,
+ Email: form.Email,
+ IsActivated: !setting.Service.RegisterEmailConfirm,
+ })
+
+ if err != nil {
+ log.Error("AddEmailAddress failed:%v", err.Error(), ctx.Data["MsgID"])
+ ctx.ServerError("AddEmailAddress", err)
+ return
+ }
// Auto-set admin for the only user.
if models.CountUsers() == 1 {
@@ -1254,6 +1266,15 @@ func Activate(ctx *context.Context) {
log.Error("Error storing session: %v", err)
}
+ email, err := models.GetEmailAddressByIDAndEmail(user.ID, user.Email)
+ if err != nil || email == nil{
+ log.Error("GetEmailAddressByIDAndEmail failed", ctx.Data["MsgID"])
+ } else {
+ if err := email.Activate(); err != nil {
+ log.Error("Activate failed: %v", err, ctx.Data["MsgID"])
+ }
+ }
+
ctx.Flash.Success(ctx.Tr("auth.account_activated"))
ctx.Redirect(setting.AppSubURL + "/")
return
diff --git a/routers/user/setting/profile.go b/routers/user/setting/profile.go
old mode 100644
new mode 100755
index d6f25f913..a385f2cac
--- a/routers/user/setting/profile.go
+++ b/routers/user/setting/profile.go
@@ -96,6 +96,18 @@ func ProfilePost(ctx *context.Context, form auth.UpdateProfileForm) {
ctx.User.Location = form.Location
ctx.User.Language = form.Language
ctx.User.Description = form.Description
+ isUsed, err := models.IsEmailUsed(form.Email)
+ if err != nil {
+ ctx.ServerError("IsEmailUsed", err)
+ return
+ }
+
+ if isUsed {
+ ctx.Flash.Error(ctx.Tr("form.email_been_used"))
+ ctx.Redirect(setting.AppSubURL + "/user/settings")
+ return
+ }
+
if err := models.UpdateUserSetting(ctx.User); err != nil {
if _, ok := err.(models.ErrEmailAlreadyUsed); ok {
ctx.Flash.Error(ctx.Tr("form.email_been_used"))
diff --git a/templates/home.tmpl b/templates/home.tmpl
index 35790cbba..97a2a7fc9 100755
--- a/templates/home.tmpl
+++ b/templates/home.tmpl
@@ -127,7 +127,7 @@
- {{if .Repository.DescriptionHTML}} - {{.Repository.DescriptionHTML}} - {{else}} - {{.i18n.Tr "repo.no_desc"}} - {{end}} - {{.Repository.Website}} + {{if .Repository.DescriptionHTML}} + {{.Repository.DescriptionHTML}} + {{else}} + {{.i18n.Tr "repo.no_desc"}} + {{end}} +
++ + {{.Repository.Website}} +
+ + {{end}} +{{range .Topics}}{{.Name}}{{end}} {{if and .Permission.IsAdmin (not .Repository.IsArchived)}}{{.i18n.Tr "repo.topic.manage_topics"}}{{end}}
- +{{range .LanguageStats}} {{.Language}} {{end}}
+ + + {{if .LICENSE}}- {{if .LICENSE}} - {{.LICENSE}} - {{end}} + {{.LICENSE}}
+ + {{end}} @@ -193,17 +253,15 @@{{.i18n.Tr "error404" | Safe}}
+{{.i18n.Tr "error500" | Safe}}