|
|
|
@ -0,0 +1,395 @@
|
|
|
|
|
package repo
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
|
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
|
|
|
|
"code.gitea.io/gitea/modules/context"
|
|
|
|
|
"code.gitea.io/gitea/modules/git"
|
|
|
|
|
"code.gitea.io/gitea/modules/setting"
|
|
|
|
|
gitea_api "code.gitea.io/gitea/modules/structs"
|
|
|
|
|
"code.gitea.io/gitea/modules/util"
|
|
|
|
|
"code.gitea.io/gitea/modules/web"
|
|
|
|
|
"fmt"
|
|
|
|
|
"github.com/unknwon/com"
|
|
|
|
|
"io/ioutil"
|
|
|
|
|
"net/http"
|
|
|
|
|
"os"
|
|
|
|
|
"path/filepath"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
const (
|
|
|
|
|
SIZE_LIMIT_SCRIPT_NAME = "size_limit"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
type UpdateRepoSizeLimit struct {
|
|
|
|
|
OwnerName string `json:"owner_name"`
|
|
|
|
|
RepoName string `json:"repo_name"`
|
|
|
|
|
LimitSize int `json:"limit_size"`
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func CreateRepoSizeLimitHook(ctx *context.APIContext) {
|
|
|
|
|
form := web.GetForm(ctx).(*gitea_api.RepositoryPayload)
|
|
|
|
|
limitMb := ctx.FormInt("limit_size")
|
|
|
|
|
if limitMb < 30 {
|
|
|
|
|
limitMb = 512
|
|
|
|
|
}
|
|
|
|
|
eventName := string(form.Action)
|
|
|
|
|
if eventName == "deleted" {
|
|
|
|
|
ctx.Status(http.StatusOK)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
getAssignmentRepo(ctx, form.Repository.ID)
|
|
|
|
|
hookDir := filepath.Join(ctx.Repo.Repository.RepoPath(), "hooks")
|
|
|
|
|
hookName := "pre-receive"
|
|
|
|
|
//results := make([]string, 0, 10)
|
|
|
|
|
sizeLimitTpls := []string{
|
|
|
|
|
fmt.Sprintf("#!/usr/bin/env %s\n\n\nset -o pipefail\n\nreadonly DEFAULT_FILE_MAXSIZE_MB=\"30\" \nreadonly CONFIG_NAME=\"hooks.maxfilesize\"\nreadonly NULLSHA=\"0000000000000000000000000000000000000000\"\nreadonly EXIT_SUCCESS=0\nreadonly EXIT_FAILURE=1\nreadonly DEFAULT_REPO_MAXSIZE_MB=\"1024\" \nreadonly CHECK_FLAG_ON=1\n\n\nPUSH_SIZE_CHECK_FLAG=1\nREPO_MAX_FILE_SIZE=1024\nREPO_MAX_SIZE=%d\nREPO_CURRENT_SIZE=$(du -sk \"${PWD}\" | cut -f1)\nsize_in_mb=$(($REPO_CURRENT_SIZE / 1024))\nstatus=\"$EXIT_SUCCESS\"\n\n# skip this hook entirely if shell check is not open\ncheck_flag=${PUSH_SIZE_CHECK_FLAG}\nif [[ $check_flag != $CHECK_FLAG_ON ]]; then\nexit $EXIT_SUCCESS\nfi\n\n\n#######################################\n# check the file max size limit\n#######################################\n\n# get maximum filesize (from repository-specific config)\nmaxsize_mb=\"${REPO_MAX_FILE_SIZE}\"\n\nif [[ \"$?\" != $EXIT_SUCCESS ]]; then\necho \"failed to get ${CONFIG_NAME} from config\"\nexit \"$EXIT_FAILURE\"\nfi\n\npush_size=\"0\"\n# read lines from stdin (format: \"<oldref> <newref> <refname>\\n\")\nwhile read oldref newref refname; do\n# skip branch deletions\nif [[ \"$newref\" == \"$NULLSHA\" ]]; then\n continue\nfi\n\n# find large objects\n# check all objects from $oldref (possible $NULLSHA) to $newref, but\n# skip all objects that have already been accepted (i.e. are referenced by\n# another branch or tag).\n\nnew_branch_flag=0\nif [[ \"$oldref\" == \"$NULLSHA\" ]]; then\n target=\"$newref\"\n new_branch_flag=1\n echo \"You are creating a new remote branch,openI will check all files in commit history to find oversize files\"\nelse\n target=\"${oldref}..${newref}\"\nfi\nmaxsize=`expr $maxsize_mb \\* 1048576` \n\n# find objects in this push_size\n# print like:\n# 08da8e2ab9ae4095bf94dd71ac913132b880b463 commit 214\n# 43e993b768ede5740e8c65de2ed6edec25053ea1 tree 185\n# 4476971d76569039df7569af1b8d03c288f6b193 blob 20167318 b0417e6593a1.zip\nfiles=\"$(git rev-list --objects \"$target\" | \\\n git cat-file $'--batch-check=%%(objectname) %%(objecttype) %%(objectsize) %%(rest)' | \\\n awk -F ' ' -v maxbytes=\"$maxsize\" 'BEGIN {totalIn=0} {if( $3 > maxbytes && $2 == \"blob\") { totalIn+=$3; print $4} else { totalIn+=$3}} END { printf (\"totalIn=\\t%%s\",totalIn)}' )\"\n \nif [[ \"$?\" != $EXIT_SUCCESS ]]; then\n echo \"failed to check for large files in ref ${refname}\"\n continue\nfi\n\nIFS=$'\\n'\n# rewrite IFS to seperate line in $files\nfor file in $files; do\n # if don't unset IFS,temp_array=(${file}) will get error answer\n \n if [[ ${file} == totalIn=* ]]; then\n\tIFS=$'\\t'\n\ttemp_array=(${file})\n\tpush_size=${temp_array[1]}\n\tcontinue\n fi\n\tunset IFS\n if [[ \"$status\" == $EXIT_SUCCESS ]]; then\n\t\techo -e \"Error: Your push was rejected because it contains files larger than $(numfmt --to=iec \"$maxsize_mb\") Mb\"\n\t\techo \"help document -- ...\"\n\t\techo \"oversize files:\"\n\t\tstatus=\"$EXIT_FAILURE\"\t\n fi\n echo -e \"\\033[31m- ${file}\\033[0m \"\ndone\n\nif [[ \"$status\" != $EXIT_SUCCESS ]]; then\n\texit \"$status\"\nfi\n\ndone\n\n#######################################\n# check the repo max size limit\n#######################################\nif [[ $push_size -eq \"0\" ]]; then\n\texit $EXIT_SUCCESS\nfi\n\n# if create new branch or tag,use count-objects -v to get pack size\nif [[ $new_branch_flag -eq 1 ]]; then\n size_kb=`git count-objects -v | grep 'size-pack' | sed 's/.*\\(size-pack:\\).//'`\n size_pack_kb=`git count-objects -v | grep 'size:' | sed 's/.*\\(size:\\).//'`\n\ttotal_kb=`expr $size_kb + $size_pack_kb`\n\tlet push_size=$total_kb*1024\nfi\n\nsizelimit_mb=\"${REPO_MAX_SIZE}\"\nlet sizelimit_b=$sizelimit_mb*1024*1024\n\n# repo size at here means the size of repo directory in server \nreposize_b=${REPO_CURRENT_SIZE}\n\nlet total=$REPO_CURRENT_SIZE*1024\n\nif [ $total -gt $sizelimit_b ]; then\n echo \"Error: Your push was rejected because the repository size is large than $sizelimit_mb Mb\"\n echo \"Error: 推送被拒绝,文件或目录大小大于 $sizelimit_mb Mb\"\n exit $EXIT_FAILURE\nfi\n\n\nexit $EXIT_SUCCESS", setting.ScriptType, limitMb),
|
|
|
|
|
fmt.Sprintf(""),
|
|
|
|
|
fmt.Sprintf(""),
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
oldHookPath := filepath.Join(hookDir, hookName+".d", SIZE_LIMIT_SCRIPT_NAME)
|
|
|
|
|
if !com.IsExist(oldHookPath) {
|
|
|
|
|
//if err := checkHookFile(generateHookScriptPath(hookDir, hookName, SIZE_LIMIT_SCRIPT_NAME), sizeLimitTpls[0], results); err != nil {
|
|
|
|
|
// ctx.Error(http.StatusInternalServerError, "CreateSizeLimitHook checkHookFile", err)
|
|
|
|
|
// ctx.NotFound()
|
|
|
|
|
// return
|
|
|
|
|
//}
|
|
|
|
|
|
|
|
|
|
if err := writeHookTpl(generateHookScriptPath(hookDir, hookName, SIZE_LIMIT_SCRIPT_NAME), sizeLimitTpls[0]); err != nil {
|
|
|
|
|
ctx.Error(http.StatusInternalServerError, "CreateSizeLimitHook checkHookFile", err)
|
|
|
|
|
ctx.NotFound()
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ctx.Status(http.StatusOK)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// 更新arm架构中事件失效问题
|
|
|
|
|
func UpdateHookArm(ctx *context.APIContext) {
|
|
|
|
|
form := web.GetForm(ctx).(*gitea_api.RepositoryPayload)
|
|
|
|
|
eventName := string(form.Action)
|
|
|
|
|
if eventName == "deleted" {
|
|
|
|
|
ctx.Status(http.StatusOK)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
getAssignmentRepo(ctx, form.Repository.ID)
|
|
|
|
|
if err := UpdateDelegateHooks(ctx.Repo.Repository.RepoPath()); err != nil {
|
|
|
|
|
fmt.Errorf("Unable to recreate delegate hooks for %-v. ERROR: %w", ctx.Repo, err)
|
|
|
|
|
ctx.Error(http.StatusInternalServerError, "", "Unable to recreate delegate hooks.")
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
ctx.Status(http.StatusOK)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// 更新仓库限制大小
|
|
|
|
|
func UpdateRepoSizeLimitHook(ctx *context.APIContext) {
|
|
|
|
|
form := web.GetForm(ctx).(*UpdateRepoSizeLimit)
|
|
|
|
|
ownerName := string(form.OwnerName)
|
|
|
|
|
repoName := string(form.RepoName)
|
|
|
|
|
LimitSize := form.LimitSize
|
|
|
|
|
|
|
|
|
|
getAssignmentRepoByName(ctx, ownerName, repoName)
|
|
|
|
|
|
|
|
|
|
hookDir := filepath.Join(ctx.Repo.Repository.RepoPath(), "hooks")
|
|
|
|
|
hookName := "pre-receive"
|
|
|
|
|
//results := make([]string, 0, 10)
|
|
|
|
|
sizeLimitTpls := []string{
|
|
|
|
|
//fmt.Sprintf("#!/usr/bin/env %s\n\n\nset -o pipefail\n\nreadonly DEFAULT_FILE_MAXSIZE_MB=\"30\" \nreadonly CONFIG_NAME=\"hooks.maxfilesize\"\nreadonly NULLSHA=\"0000000000000000000000000000000000000000\"\nreadonly EXIT_SUCCESS=0\nreadonly EXIT_FAILURE=1\nreadonly DEFAULT_REPO_MAXSIZE_MB=\"1024\" \nreadonly CHECK_FLAG_ON=1\n\n\nstatus=\"$EXIT_SUCCESS\"\n\n# skip this hook entirely if shell check is not open\ncheck_flag=${PUSH_SIZE_CHECK_FLAG}\nif [[ $check_flag != $CHECK_FLAG_ON ]]; then\nexit $EXIT_SUCCESS\nfi\n\n\n#######################################\n# check the file max size limit\n#######################################\n\n# get maximum filesize (from repository-specific config)\nmaxsize_mb=\"${REPO_MAX_FILE_SIZE}\"\n\nif [[ \"$?\" != $EXIT_SUCCESS ]]; then\necho \"failed to get ${CONFIG_NAME} from config\"\nexit \"$EXIT_FAILURE\"\nfi\n\npush_size=\"0\"\n# read lines from stdin (format: \"<oldref> <newref> <refname>\\n\")\nwhile read oldref newref refname; do\n# skip branch deletions\nif [[ \"$newref\" == \"$NULLSHA\" ]]; then\n continue\nfi\n\n# find large objects\n# check all objects from $oldref (possible $NULLSHA) to $newref, but\n# skip all objects that have already been accepted (i.e. are referenced by\n# another branch or tag).\n\nnew_branch_flag=0\nif [[ \"$oldref\" == \"$NULLSHA\" ]]; then\n target=\"$newref\"\n new_branch_flag=1\n echo \"You are creating a new remote branch,openI will check all files in commit history to find oversize files\"\nelse\n target=\"${oldref}..${newref}\"\nfi\nmaxsize=`expr $maxsize_mb \\* 1048576` \n\n# find objects in this push_size\n# print like:\n# 08da8e2ab9ae4095bf94dd71ac913132b880b463 commit 214\n# 43e993b768ede5740e8c65de2ed6edec25053ea1 tree 185\n# 4476971d76569039df7569af1b8d03c288f6b193 blob 20167318 b0417e6593a1.zip\nfiles=\"$(git rev-list --objects \"$target\" | \\\n git cat-file $'--batch-check=%%(objectname) %%(objecttype) %%(objectsize) %%(rest)' | \\\n awk -F ' ' -v maxbytes=\"$maxsize\" 'BEGIN {totalIn=0} {if( $3 > maxbytes && $2 == \"blob\") { totalIn+=$3; print $4} else { totalIn+=$3}} END { printf (\"totalIn=\\t%%s\",totalIn)}' )\"\n \nif [[ \"$?\" != $EXIT_SUCCESS ]]; then\n echo \"failed to check for large files in ref ${refname}\"\n continue\nfi\n\nIFS=$'\\n'\n# rewrite IFS to seperate line in $files\nfor file in $files; do\n # if don't unset IFS,temp_array=(${file}) will get error answer\n \n if [[ ${file} == totalIn=* ]]; then\n\tIFS=$'\\t'\n\ttemp_array=(${file})\n\tpush_size=${temp_array[1]}\n\tcontinue\n fi\n\tunset IFS\n if [[ \"$status\" == $EXIT_SUCCESS ]]; then\n\t\techo -e \"Error: Your push was rejected because it contains files larger than $(numfmt --to=iec \"$maxsize_mb\") Mb\"\n\t\techo \"help document -- https://openi.pcl.ac.cn/zeizei/OpenI_Learning/src/branch/master/docs/git/repository_capacity_help.md\"\n\t\techo \"oversize files:\"\n\t\tstatus=\"$EXIT_FAILURE\"\t\n fi\n echo -e \"\\033[31m- ${file}\\033[0m \"\ndone\n\nif [[ \"$status\" != $EXIT_SUCCESS ]]; then\n\texit \"$status\"\nfi\n\ndone\n\n#######################################\n# check the repo max size limit\n#######################################\nif [[ $push_size -eq \"0\" ]]; then\n\texit $EXIT_SUCCESS\nfi\n\n# if create new branch or tag,use count-objects -v to get pack size\nif [[ $new_branch_flag -eq 1 ]]; then\n size_kb=`git count-objects -v | grep 'size-pack' | sed 's/.*\\(size-pack:\\).//'`\n size_pack_kb=`git count-objects -v | grep 'size:' | sed 's/.*\\(size:\\).//'`\n\ttotal_kb=`expr $size_kb + $size_pack_kb`\n\tlet push_size=$total_kb*1024\nfi\n\nsizelimit_mb=\"${REPO_MAX_SIZE}\"\nlet sizelimit_b=$sizelimit_mb*1024*1024\n\n# repo size at here means the size of repo directory in server \nreposize_b=${REPO_CURRENT_SIZE}\n\ntotal=`expr $push_size + $reposize_b`\n\nif [ $total -gt $sizelimit_b ]; then\n echo \"Error: Your push was rejected because the repository size is large than $sizelimit_mb Mb\"\n echo \"see the help document--https://openi.pcl.ac.cn/zeizei/OpenI_Learning/src/branch/master/docs/git/repository_capacity_help.md\"\n exit $EXIT_FAILURE\nfi\n\n\nexit $EXIT_SUCCESS", setting.ScriptType, LimitSize),
|
|
|
|
|
fmt.Sprintf("#!/usr/bin/env %s\n\n\nset -o pipefail\n\nreadonly DEFAULT_FILE_MAXSIZE_MB=\"30\" \nreadonly CONFIG_NAME=\"hooks.maxfilesize\"\nreadonly NULLSHA=\"0000000000000000000000000000000000000000\"\nreadonly EXIT_SUCCESS=0\nreadonly EXIT_FAILURE=1\nreadonly DEFAULT_REPO_MAXSIZE_MB=\"1024\" \nreadonly CHECK_FLAG_ON=1\n\n\nPUSH_SIZE_CHECK_FLAG=1\nREPO_MAX_FILE_SIZE=1024\nREPO_MAX_SIZE=%d\nREPO_CURRENT_SIZE=$(du -sk \"${PWD}\" | cut -f1)\nsize_in_mb=$(($REPO_CURRENT_SIZE / 1024))\nstatus=\"$EXIT_SUCCESS\"\n\n# skip this hook entirely if shell check is not open\ncheck_flag=${PUSH_SIZE_CHECK_FLAG}\nif [[ $check_flag != $CHECK_FLAG_ON ]]; then\nexit $EXIT_SUCCESS\nfi\n\n\n#######################################\n# check the file max size limit\n#######################################\n\n# get maximum filesize (from repository-specific config)\nmaxsize_mb=\"${REPO_MAX_FILE_SIZE}\"\n\nif [[ \"$?\" != $EXIT_SUCCESS ]]; then\necho \"failed to get ${CONFIG_NAME} from config\"\nexit \"$EXIT_FAILURE\"\nfi\n\npush_size=\"0\"\n# read lines from stdin (format: \"<oldref> <newref> <refname>\\n\")\nwhile read oldref newref refname; do\n# skip branch deletions\nif [[ \"$newref\" == \"$NULLSHA\" ]]; then\n continue\nfi\n\n# find large objects\n# check all objects from $oldref (possible $NULLSHA) to $newref, but\n# skip all objects that have already been accepted (i.e. are referenced by\n# another branch or tag).\n\nnew_branch_flag=0\nif [[ \"$oldref\" == \"$NULLSHA\" ]]; then\n target=\"$newref\"\n new_branch_flag=1\n echo \"You are creating a new remote branch,openI will check all files in commit history to find oversize files\"\nelse\n target=\"${oldref}..${newref}\"\nfi\nmaxsize=`expr $maxsize_mb \\* 1048576` \n\n# find objects in this push_size\n# print like:\n# 08da8e2ab9ae4095bf94dd71ac913132b880b463 commit 214\n# 43e993b768ede5740e8c65de2ed6edec25053ea1 tree 185\n# 4476971d76569039df7569af1b8d03c288f6b193 blob 20167318 b0417e6593a1.zip\nfiles=\"$(git rev-list --objects \"$target\" | \\\n git cat-file $'--batch-check=%%(objectname) %%(objecttype) %%(objectsize) %%(rest)' | \\\n awk -F ' ' -v maxbytes=\"$maxsize\" 'BEGIN {totalIn=0} {if( $3 > maxbytes && $2 == \"blob\") { totalIn+=$3; print $4} else { totalIn+=$3}} END { printf (\"totalIn=\\t%%s\",totalIn)}' )\"\n \nif [[ \"$?\" != $EXIT_SUCCESS ]]; then\n echo \"failed to check for large files in ref ${refname}\"\n continue\nfi\n\nIFS=$'\\n'\n# rewrite IFS to seperate line in $files\nfor file in $files; do\n # if don't unset IFS,temp_array=(${file}) will get error answer\n \n if [[ ${file} == totalIn=* ]]; then\n\tIFS=$'\\t'\n\ttemp_array=(${file})\n\tpush_size=${temp_array[1]}\n\tcontinue\n fi\n\tunset IFS\n if [[ \"$status\" == $EXIT_SUCCESS ]]; then\n\t\techo -e \"Error: Your push was rejected because it contains files larger than $(numfmt --to=iec \"$maxsize_mb\") Mb\"\n\t\techo \"help document -- ...\"\n\t\techo \"oversize files:\"\n\t\tstatus=\"$EXIT_FAILURE\"\t\n fi\n echo -e \"\\033[31m- ${file}\\033[0m \"\ndone\n\nif [[ \"$status\" != $EXIT_SUCCESS ]]; then\n\texit \"$status\"\nfi\n\ndone\n\n#######################################\n# check the repo max size limit\n#######################################\nif [[ $push_size -eq \"0\" ]]; then\n\texit $EXIT_SUCCESS\nfi\n\n# if create new branch or tag,use count-objects -v to get pack size\nif [[ $new_branch_flag -eq 1 ]]; then\n size_kb=`git count-objects -v | grep 'size-pack' | sed 's/.*\\(size-pack:\\).//'`\n size_pack_kb=`git count-objects -v | grep 'size:' | sed 's/.*\\(size:\\).//'`\n\ttotal_kb=`expr $size_kb + $size_pack_kb`\n\tlet push_size=$total_kb*1024\nfi\n\nsizelimit_mb=\"${REPO_MAX_SIZE}\"\nlet sizelimit_b=$sizelimit_mb*1024*1024\n\n# repo size at here means the size of repo directory in server \nreposize_b=${REPO_CURRENT_SIZE}\n\nlet total=$REPO_CURRENT_SIZE*1024\n\nif [ $total -gt $sizelimit_b ]; then\n echo \"Error: Your push was rejected because the repository size is large than $sizelimit_mb Mb\"\n echo \"Error: 推送被拒绝,文件或目录大小大于 $sizelimit_mb Mb\"\n exit $EXIT_FAILURE\nfi\n\n\nexit $EXIT_SUCCESS", setting.ScriptType, LimitSize),
|
|
|
|
|
|
|
|
|
|
fmt.Sprintf(""),
|
|
|
|
|
fmt.Sprintf(""),
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
oldHookPath := filepath.Join(hookDir, hookName+".d", SIZE_LIMIT_SCRIPT_NAME)
|
|
|
|
|
if !com.IsExist(oldHookPath) {
|
|
|
|
|
//if err := checkHookFile(generateHookScriptPath(hookDir, hookName, SIZE_LIMIT_SCRIPT_NAME), sizeLimitTpls[0], results); err != nil {
|
|
|
|
|
// ctx.Error(http.StatusInternalServerError, "CreateSizeLimitHook checkHookFile", err)
|
|
|
|
|
// ctx.NotFound()
|
|
|
|
|
// return
|
|
|
|
|
//}
|
|
|
|
|
|
|
|
|
|
if err := writeHookTpl(generateHookScriptPath(hookDir, hookName, SIZE_LIMIT_SCRIPT_NAME), sizeLimitTpls[0]); err != nil {
|
|
|
|
|
ctx.Error(http.StatusInternalServerError, "CreateSizeLimitHook checkHookFile", err)
|
|
|
|
|
ctx.NotFound()
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ctx.Status(http.StatusOK)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func resetRepoSizeLimitHook(ctx *context.APIContext) {
|
|
|
|
|
form := web.GetForm(ctx).(*gitea_api.RepositoryPayload)
|
|
|
|
|
eventName := string(form.Action)
|
|
|
|
|
if eventName == "deleted" {
|
|
|
|
|
ctx.Status(http.StatusOK)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
getAssignmentRepo(ctx, form.Repository.ID)
|
|
|
|
|
hookDir := filepath.Join(ctx.Repo.Repository.RepoPath(), "hooks")
|
|
|
|
|
hookName := "pre-receive"
|
|
|
|
|
//results := make([]string, 0, 10)
|
|
|
|
|
sizeLimitTpls := []string{
|
|
|
|
|
fmt.Sprintf("#!/usr/bin/env %s\n\n\nset -o pipefail\n\nreadonly DEFAULT_FILE_MAXSIZE_MB=\"30\" \nreadonly CONFIG_NAME=\"hooks.maxfilesize\"\nreadonly NULLSHA=\"0000000000000000000000000000000000000000\"\nreadonly EXIT_SUCCESS=0\nreadonly EXIT_FAILURE=1\nreadonly DEFAULT_REPO_MAXSIZE_MB=\"1024\" \nreadonly CHECK_FLAG_ON=1\n\n\nstatus=\"$EXIT_SUCCESS\"\n\n# skip this hook entirely if shell check is not open\ncheck_flag=${PUSH_SIZE_CHECK_FLAG}\nif [[ $check_flag != $CHECK_FLAG_ON ]]; then\nexit $EXIT_SUCCESS\nfi\n\n\n#######################################\n# check the file max size limit\n#######################################\n\n# get maximum filesize (from repository-specific config)\nmaxsize_mb=\"${REPO_MAX_FILE_SIZE}\"\n\nif [[ \"$?\" != $EXIT_SUCCESS ]]; then\necho \"failed to get ${CONFIG_NAME} from config\"\nexit \"$EXIT_FAILURE\"\nfi\n\npush_size=\"0\"\n# read lines from stdin (format: \"<oldref> <newref> <refname>\\n\")\nwhile read oldref newref refname; do\n# skip branch deletions\nif [[ \"$newref\" == \"$NULLSHA\" ]]; then\n continue\nfi\n\n# find large objects\n# check all objects from $oldref (possible $NULLSHA) to $newref, but\n# skip all objects that have already been accepted (i.e. are referenced by\n# another branch or tag).\n\nnew_branch_flag=0\nif [[ \"$oldref\" == \"$NULLSHA\" ]]; then\n target=\"$newref\"\n new_branch_flag=1\n echo \"You are creating a new remote branch,openI will check all files in commit history to find oversize files\"\nelse\n target=\"${oldref}..${newref}\"\nfi\nmaxsize=`expr $maxsize_mb \\* 1048576` \n\n# find objects in this push_size\n# print like:\n# 08da8e2ab9ae4095bf94dd71ac913132b880b463 commit 214\n# 43e993b768ede5740e8c65de2ed6edec25053ea1 tree 185\n# 4476971d76569039df7569af1b8d03c288f6b193 blob 20167318 b0417e6593a1.zip\nfiles=\"$(git rev-list --objects \"$target\" | \\\n git cat-file $'--batch-check=%%(objectname) %%(objecttype) %%(objectsize) %%(rest)' | \\\n awk -F ' ' -v maxbytes=\"$maxsize\" 'BEGIN {totalIn=0} {if( $3 > maxbytes && $2 == \"blob\") { totalIn+=$3; print $4} else { totalIn+=$3}} END { printf (\"totalIn=\\t%%s\",totalIn)}' )\"\n \nif [[ \"$?\" != $EXIT_SUCCESS ]]; then\n echo \"failed to check for large files in ref ${refname}\"\n continue\nfi\n\nIFS=$'\\n'\n# rewrite IFS to seperate line in $files\nfor file in $files; do\n # if don't unset IFS,temp_array=(${file}) will get error answer\n \n if [[ ${file} == totalIn=* ]]; then\n\tIFS=$'\\t'\n\ttemp_array=(${file})\n\tpush_size=${temp_array[1]}\n\tcontinue\n fi\n\tunset IFS\n if [[ \"$status\" == $EXIT_SUCCESS ]]; then\n\t\techo -e \"Error: Your push was rejected because it contains files larger than $(numfmt --to=iec \"$maxsize_mb\") Mb\"\n\t\techo \"help document -- https://openi.pcl.ac.cn/zeizei/OpenI_Learning/src/branch/master/docs/git/repository_capacity_help.md\"\n\t\techo \"oversize files:\"\n\t\tstatus=\"$EXIT_FAILURE\"\t\n fi\n echo -e \"\\033[31m- ${file}\\033[0m \"\ndone\n\nif [[ \"$status\" != $EXIT_SUCCESS ]]; then\n\texit \"$status\"\nfi\n\ndone\n\n#######################################\n# check the repo max size limit\n#######################################\nif [[ $push_size -eq \"0\" ]]; then\n\texit $EXIT_SUCCESS\nfi\n\n# if create new branch or tag,use count-objects -v to get pack size\nif [[ $new_branch_flag -eq 1 ]]; then\n size_kb=`git count-objects -v | grep 'size-pack' | sed 's/.*\\(size-pack:\\).//'`\n size_pack_kb=`git count-objects -v | grep 'size:' | sed 's/.*\\(size:\\).//'`\n\ttotal_kb=`expr $size_kb + $size_pack_kb`\n\tlet push_size=$total_kb*1024\nfi\n\nsizelimit_mb=\"${REPO_MAX_SIZE}\"\nlet sizelimit_b=$sizelimit_mb*1024*1024\n\n# repo size at here means the size of repo directory in server \nreposize_b=${REPO_CURRENT_SIZE}\n\ntotal=`expr $push_size + $reposize_b`\n\nif [ $total -gt $sizelimit_b ]; then\n echo \"Error: Your push was rejected because the repository size is large than $sizelimit_mb Mb\"\n echo \"see the help document--https://openi.pcl.ac.cn/zeizei/OpenI_Learning/src/branch/master/docs/git/repository_capacity_help.md\"\n exit $EXIT_FAILURE\nfi\n\n\nexit $EXIT_SUCCESS", setting.ScriptType),
|
|
|
|
|
fmt.Sprintf(""),
|
|
|
|
|
fmt.Sprintf(""),
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
oldHookPath := filepath.Join(hookDir, hookName+".d", SIZE_LIMIT_SCRIPT_NAME)
|
|
|
|
|
if !com.IsExist(oldHookPath) {
|
|
|
|
|
//if err := checkHookFile(generateHookScriptPath(hookDir, hookName, SIZE_LIMIT_SCRIPT_NAME), sizeLimitTpls[0], results); err != nil {
|
|
|
|
|
// ctx.Error(http.StatusInternalServerError, "CreateSizeLimitHook checkHookFile", err)
|
|
|
|
|
// ctx.NotFound()
|
|
|
|
|
// return
|
|
|
|
|
//}
|
|
|
|
|
|
|
|
|
|
if err := writeHookTpl(generateHookScriptPath(hookDir, hookName, SIZE_LIMIT_SCRIPT_NAME), sizeLimitTpls[0]); err != nil {
|
|
|
|
|
ctx.Error(http.StatusInternalServerError, "CreateSizeLimitHook checkHookFile", err)
|
|
|
|
|
ctx.NotFound()
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ctx.Status(http.StatusOK)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func getAssignmentRepo(ctx *context.APIContext, id int64) {
|
|
|
|
|
// Get repository.
|
|
|
|
|
repo, err := repo_model.GetRepositoryByID(ctx, id)
|
|
|
|
|
if err != nil {
|
|
|
|
|
if repo_model.IsErrRepoNotExist(err) {
|
|
|
|
|
redirectRepoID, err := repo_model.LookupRedirect(repo.OwnerID, repo.Name)
|
|
|
|
|
if err == nil {
|
|
|
|
|
context.RedirectToRepo(ctx.Base, redirectRepoID)
|
|
|
|
|
} else if repo_model.IsErrRedirectNotExist(err) {
|
|
|
|
|
ctx.NotFound(ctx.Tr("repo.RepoNotFound", repo.OwnerID))
|
|
|
|
|
} else {
|
|
|
|
|
ctx.Error(http.StatusInternalServerError, "LookupRepoRedirect", err)
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
ctx.Error(http.StatusInternalServerError, "GetRepositoryByID", err)
|
|
|
|
|
}
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
ctx.Repo.Repository = repo
|
|
|
|
|
|
|
|
|
|
if !ctx.Repo.HasAccess() {
|
|
|
|
|
ctx.NotFound()
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func getAssignmentRepoByName(ctx *context.APIContext, ownerName string, repoName string) {
|
|
|
|
|
// Get repository.
|
|
|
|
|
owner, err := user_model.GetUserByName(ctx, ownerName)
|
|
|
|
|
repo, err := repo_model.GetRepositoryByName(owner.ID, repoName)
|
|
|
|
|
if err != nil {
|
|
|
|
|
if repo_model.IsErrRepoNotExist(err) {
|
|
|
|
|
redirectRepoID, err := repo_model.LookupRedirect(repo.OwnerID, repo.Name)
|
|
|
|
|
if err == nil {
|
|
|
|
|
context.RedirectToRepo(ctx.Base, redirectRepoID)
|
|
|
|
|
} else if repo_model.IsErrRedirectNotExist(err) {
|
|
|
|
|
ctx.NotFound(ctx.Tr("repo.RepoNotFound", repo.OwnerID))
|
|
|
|
|
} else {
|
|
|
|
|
ctx.Error(http.StatusInternalServerError, "LookupRepoRedirect", err)
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
ctx.Error(http.StatusInternalServerError, "GetRepositoryByID", err)
|
|
|
|
|
}
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
ctx.Repo.Repository = repo
|
|
|
|
|
|
|
|
|
|
if !ctx.Repo.HasAccess() {
|
|
|
|
|
ctx.NotFound()
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// UpdateDelegateHooks creates all the hooks scripts for the repo
|
|
|
|
|
func UpdateDelegateHooks(repoPath string) (err error) {
|
|
|
|
|
hookNames, hookTpls, giteaHookTpls := getHookTemplates()
|
|
|
|
|
hookDir := filepath.Join(repoPath, "hooks")
|
|
|
|
|
|
|
|
|
|
for i, hookName := range hookNames {
|
|
|
|
|
oldHookPath := filepath.Join(hookDir, hookName)
|
|
|
|
|
newHookPath := filepath.Join(hookDir, hookName+".d", "gitea")
|
|
|
|
|
|
|
|
|
|
if err := os.MkdirAll(filepath.Join(hookDir, hookName+".d"), os.ModePerm); err != nil {
|
|
|
|
|
return fmt.Errorf("create hooks dir '%s': %w", filepath.Join(hookDir, hookName+".d"), err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// WARNING: This will override all old server-side hooks
|
|
|
|
|
if err = util.Remove(oldHookPath); err != nil && !os.IsNotExist(err) {
|
|
|
|
|
return fmt.Errorf("unable to pre-remove old hook file '%s' prior to rewriting: %w ", oldHookPath, err)
|
|
|
|
|
}
|
|
|
|
|
if err = os.WriteFile(oldHookPath, []byte(hookTpls[i]), 0o777); err != nil {
|
|
|
|
|
return fmt.Errorf("write old hook file '%s': %w", oldHookPath, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if err = ensureExecutable(oldHookPath); err != nil {
|
|
|
|
|
return fmt.Errorf("Unable to set %s executable. Error %w", oldHookPath, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if err = util.Remove(newHookPath); err != nil && !os.IsNotExist(err) {
|
|
|
|
|
return fmt.Errorf("unable to pre-remove new hook file '%s' prior to rewriting: %w", newHookPath, err)
|
|
|
|
|
}
|
|
|
|
|
if err = os.WriteFile(newHookPath, []byte(giteaHookTpls[i]), 0o777); err != nil {
|
|
|
|
|
return fmt.Errorf("write new hook file '%s': %w", newHookPath, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if err = ensureExecutable(newHookPath); err != nil {
|
|
|
|
|
return fmt.Errorf("Unable to set %s executable. Error %w", oldHookPath, err)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func getHookTemplates() (hookNames, hookTpls, giteaHookTpls []string) {
|
|
|
|
|
hookNames = []string{"pre-receive", "update", "post-receive"}
|
|
|
|
|
hookTpls = []string{
|
|
|
|
|
// for pre-receive
|
|
|
|
|
fmt.Sprintf(`#!/usr/bin/env %s
|
|
|
|
|
# AUTO GENERATED BY GITEA, DO NOT MODIFY
|
|
|
|
|
data=$(cat)
|
|
|
|
|
exitcodes=""
|
|
|
|
|
hookname=$(basename $0)
|
|
|
|
|
GIT_DIR=${GIT_DIR:-$(dirname $0)/..}
|
|
|
|
|
|
|
|
|
|
for hook in ${GIT_DIR}/hooks/${hookname}.d/*; do
|
|
|
|
|
test -x "${hook}" && test -f "${hook}"
|
|
|
|
|
echo "${data}" | "${hook}"
|
|
|
|
|
exitcodes="${exitcodes} $?"
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
for i in ${exitcodes}; do
|
|
|
|
|
[ ${i} -eq 0 ] || exit ${i}
|
|
|
|
|
done
|
|
|
|
|
`, setting.ScriptType),
|
|
|
|
|
|
|
|
|
|
// for update
|
|
|
|
|
fmt.Sprintf(`#!/usr/bin/env %s
|
|
|
|
|
# AUTO GENERATED BY GITEA, DO NOT MODIFY
|
|
|
|
|
exitcodes=""
|
|
|
|
|
hookname=$(basename $0)
|
|
|
|
|
GIT_DIR=${GIT_DIR:-$(dirname $0/..)}
|
|
|
|
|
|
|
|
|
|
for hook in ${GIT_DIR}/hooks/${hookname}.d/*; do
|
|
|
|
|
test -x "${hook}" && test -f "${hook}"
|
|
|
|
|
"${hook}" $1 $2 $3
|
|
|
|
|
exitcodes="${exitcodes} $?"
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
for i in ${exitcodes}; do
|
|
|
|
|
[ ${i} -eq 0 ] || exit ${i}
|
|
|
|
|
done
|
|
|
|
|
`, setting.ScriptType),
|
|
|
|
|
|
|
|
|
|
// for post-receive
|
|
|
|
|
fmt.Sprintf(`#!/usr/bin/env %s
|
|
|
|
|
# AUTO GENERATED BY GITEA, DO NOT MODIFY
|
|
|
|
|
data=$(cat)
|
|
|
|
|
exitcodes=""
|
|
|
|
|
hookname=$(basename $0)
|
|
|
|
|
GIT_DIR=${GIT_DIR:-$(dirname $0)/..}
|
|
|
|
|
|
|
|
|
|
for hook in ${GIT_DIR}/hooks/${hookname}.d/*; do
|
|
|
|
|
test -x "${hook}" && test -f "${hook}"
|
|
|
|
|
echo "${data}" | "${hook}"
|
|
|
|
|
exitcodes="${exitcodes} $?"
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
for i in ${exitcodes}; do
|
|
|
|
|
[ ${i} -eq 0 ] || exit ${i}
|
|
|
|
|
done
|
|
|
|
|
`, setting.ScriptType),
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
giteaHookTpls = []string{
|
|
|
|
|
// for pre-receive
|
|
|
|
|
fmt.Sprintf(`#!/usr/bin/env %s
|
|
|
|
|
# AUTO GENERATED BY GITEA, DO NOT MODIFY
|
|
|
|
|
%s hook --config=%s pre-receive
|
|
|
|
|
`, setting.ScriptType, util.ShellEscape(setting.AppPath), util.ShellEscape(setting.CustomConf)),
|
|
|
|
|
|
|
|
|
|
// for update
|
|
|
|
|
fmt.Sprintf(`#!/usr/bin/env %s
|
|
|
|
|
# AUTO GENERATED BY GITEA, DO NOT MODIFY
|
|
|
|
|
%s hook --config=%s update $1 $2 $3
|
|
|
|
|
`, setting.ScriptType, util.ShellEscape(setting.AppPath), util.ShellEscape(setting.CustomConf)),
|
|
|
|
|
|
|
|
|
|
// for post-receive
|
|
|
|
|
fmt.Sprintf(`#!/usr/bin/env %s
|
|
|
|
|
# AUTO GENERATED BY GITEA, DO NOT MODIFY
|
|
|
|
|
%s hook --config=%s post-receive
|
|
|
|
|
`, setting.ScriptType, util.ShellEscape(setting.AppPath), util.ShellEscape(setting.CustomConf)),
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if git.SupportProcReceive {
|
|
|
|
|
hookNames = append(hookNames, "proc-receive")
|
|
|
|
|
hookTpls = append(hookTpls,
|
|
|
|
|
fmt.Sprintf(`#!/usr/bin/env %s
|
|
|
|
|
# AUTO GENERATED BY GITEA, DO NOT MODIFY
|
|
|
|
|
%s hook --config=%s proc-receive
|
|
|
|
|
`, setting.ScriptType, util.ShellEscape(setting.AppPath), util.ShellEscape(setting.CustomConf)))
|
|
|
|
|
giteaHookTpls = append(giteaHookTpls, "")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return hookNames, hookTpls, giteaHookTpls
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func generateHookScriptPath(hookDir, hookName, fileName string) string {
|
|
|
|
|
return filepath.Join(hookDir, hookName+".d", fileName)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func checkHookFile(filePath, tpl string, results []string) error {
|
|
|
|
|
if tpl == "" {
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
contents, err := ioutil.ReadFile(filePath)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
if string(contents) != tpl {
|
|
|
|
|
results = append(results, fmt.Sprintf("old hook file %s is out of date", filePath))
|
|
|
|
|
}
|
|
|
|
|
if !checkExecutable(filePath) {
|
|
|
|
|
results = append(results, fmt.Sprintf("old hook file %s is not executable", filePath))
|
|
|
|
|
}
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func writeHookTpl(hookPath, content string) error {
|
|
|
|
|
if content == "" {
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
if err := ioutil.WriteFile(hookPath, []byte(content), 0777); err != nil {
|
|
|
|
|
return fmt.Errorf("write new hook file '%s': %v", hookPath, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if err := ensureExecutable(hookPath); err != nil {
|
|
|
|
|
return fmt.Errorf("Unable to set %s executable. Error %v", hookPath, err)
|
|
|
|
|
}
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func checkExecutable(filename string) bool {
|
|
|
|
|
fileInfo, err := os.Stat(filename)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return false
|
|
|
|
|
}
|
|
|
|
|
return (fileInfo.Mode() & 0100) > 0
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func ensureExecutable(filename string) error {
|
|
|
|
|
fileInfo, err := os.Stat(filename)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
if (fileInfo.Mode() & 0100) > 0 {
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
mode := fileInfo.Mode() | 0100
|
|
|
|
|
return os.Chmod(filename, mode)
|
|
|
|
|
}
|