Платформа ЦРНП "Мирокод" для разработки проектов
https://git.mirocod.ru
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
683 lines
19 KiB
683 lines
19 KiB
// Copyright 2014 The Gogs Authors. All rights reserved. |
|
// Copyright 2019 The Gitea Authors. All rights reserved. |
|
// Use of this source code is governed by a MIT-style |
|
// license that can be found in the LICENSE file. |
|
|
|
package repo |
|
|
|
import ( |
|
"bytes" |
|
"compress/gzip" |
|
gocontext "context" |
|
"fmt" |
|
"io/ioutil" |
|
"net/http" |
|
"os" |
|
"os/exec" |
|
"path" |
|
"regexp" |
|
"strconv" |
|
"strings" |
|
"sync" |
|
"time" |
|
|
|
"code.gitea.io/gitea/models" |
|
"code.gitea.io/gitea/modules/auth/sso" |
|
"code.gitea.io/gitea/modules/base" |
|
"code.gitea.io/gitea/modules/context" |
|
"code.gitea.io/gitea/modules/git" |
|
"code.gitea.io/gitea/modules/log" |
|
"code.gitea.io/gitea/modules/process" |
|
"code.gitea.io/gitea/modules/setting" |
|
"code.gitea.io/gitea/modules/structs" |
|
"code.gitea.io/gitea/modules/timeutil" |
|
"code.gitea.io/gitea/modules/util" |
|
repo_service "code.gitea.io/gitea/services/repository" |
|
) |
|
|
|
// httpBase implmentation git smart HTTP protocol |
|
func httpBase(ctx *context.Context) (h *serviceHandler) { |
|
if setting.Repository.DisableHTTPGit { |
|
ctx.Resp.WriteHeader(http.StatusForbidden) |
|
_, err := ctx.Resp.Write([]byte("Interacting with repositories by HTTP protocol is not allowed")) |
|
if err != nil { |
|
log.Error(err.Error()) |
|
} |
|
return |
|
} |
|
|
|
if len(setting.Repository.AccessControlAllowOrigin) > 0 { |
|
allowedOrigin := setting.Repository.AccessControlAllowOrigin |
|
// Set CORS headers for browser-based git clients |
|
ctx.Resp.Header().Set("Access-Control-Allow-Origin", allowedOrigin) |
|
ctx.Resp.Header().Set("Access-Control-Allow-Headers", "Content-Type, Authorization, User-Agent") |
|
|
|
// Handle preflight OPTIONS request |
|
if ctx.Req.Method == "OPTIONS" { |
|
if allowedOrigin == "*" { |
|
ctx.Status(http.StatusOK) |
|
} else if allowedOrigin == "null" { |
|
ctx.Status(http.StatusForbidden) |
|
} else { |
|
origin := ctx.Req.Header.Get("Origin") |
|
if len(origin) > 0 && origin == allowedOrigin { |
|
ctx.Status(http.StatusOK) |
|
} else { |
|
ctx.Status(http.StatusForbidden) |
|
} |
|
} |
|
return |
|
} |
|
} |
|
|
|
username := ctx.Params(":username") |
|
reponame := strings.TrimSuffix(ctx.Params(":reponame"), ".git") |
|
|
|
if ctx.Query("go-get") == "1" { |
|
context.EarlyResponseForGoGetMeta(ctx) |
|
return |
|
} |
|
|
|
var isPull, receivePack bool |
|
service := ctx.Query("service") |
|
if service == "git-receive-pack" || |
|
strings.HasSuffix(ctx.Req.URL.Path, "git-receive-pack") { |
|
isPull = false |
|
receivePack = true |
|
} else if service == "git-upload-pack" || |
|
strings.HasSuffix(ctx.Req.URL.Path, "git-upload-pack") { |
|
isPull = true |
|
} else if service == "git-upload-archive" || |
|
strings.HasSuffix(ctx.Req.URL.Path, "git-upload-archive") { |
|
isPull = true |
|
} else { |
|
isPull = ctx.Req.Method == "GET" |
|
} |
|
|
|
var accessMode models.AccessMode |
|
if isPull { |
|
accessMode = models.AccessModeRead |
|
} else { |
|
accessMode = models.AccessModeWrite |
|
} |
|
|
|
isWiki := false |
|
var unitType = models.UnitTypeCode |
|
var wikiRepoName string |
|
if strings.HasSuffix(reponame, ".wiki") { |
|
isWiki = true |
|
unitType = models.UnitTypeWiki |
|
wikiRepoName = reponame |
|
reponame = reponame[:len(reponame)-5] |
|
} |
|
|
|
owner, err := models.GetUserByName(username) |
|
if err != nil { |
|
if models.IsErrUserNotExist(err) { |
|
if redirectUserID, err := models.LookupUserRedirect(username); err == nil { |
|
context.RedirectToUser(ctx, username, redirectUserID) |
|
} else { |
|
ctx.NotFound("GetUserByName", err) |
|
} |
|
} else { |
|
ctx.ServerError("GetUserByName", err) |
|
} |
|
return |
|
} |
|
if !owner.IsOrganization() && !owner.IsActive { |
|
ctx.HandleText(http.StatusForbidden, "Repository cannot be accessed. You cannot push or open issues/pull-requests.") |
|
return |
|
} |
|
|
|
repoExist := true |
|
repo, err := models.GetRepositoryByName(owner.ID, reponame) |
|
if err != nil { |
|
if models.IsErrRepoNotExist(err) { |
|
if redirectRepoID, err := models.LookupRepoRedirect(owner.ID, reponame); err == nil { |
|
context.RedirectToRepo(ctx, redirectRepoID) |
|
return |
|
} |
|
repoExist = false |
|
} else { |
|
ctx.ServerError("GetRepositoryByName", err) |
|
return |
|
} |
|
} |
|
|
|
// Don't allow pushing if the repo is archived |
|
if repoExist && repo.IsArchived && !isPull { |
|
ctx.HandleText(http.StatusForbidden, "This repo is archived. You can view files and clone it, but cannot push or open issues/pull-requests.") |
|
return |
|
} |
|
|
|
// Only public pull don't need auth. |
|
isPublicPull := repoExist && !repo.IsPrivate && isPull |
|
var ( |
|
askAuth = !isPublicPull || setting.Service.RequireSignInView |
|
authUser *models.User |
|
authUsername string |
|
authPasswd string |
|
environ []string |
|
) |
|
|
|
// don't allow anonymous pulls if organization is not public |
|
if isPublicPull { |
|
if err := repo.GetOwner(); err != nil { |
|
ctx.ServerError("GetOwner", err) |
|
return |
|
} |
|
|
|
askAuth = askAuth || (repo.Owner.Visibility != structs.VisibleTypePublic) |
|
} |
|
|
|
// check access |
|
if askAuth { |
|
authUsername = ctx.Req.Header.Get(setting.ReverseProxyAuthUser) |
|
if setting.Service.EnableReverseProxyAuth && len(authUsername) > 0 { |
|
authUser, err = models.GetUserByName(authUsername) |
|
if err != nil { |
|
ctx.HandleText(401, "reverse proxy login error, got error while running GetUserByName") |
|
return |
|
} |
|
} else { |
|
authHead := ctx.Req.Header.Get("Authorization") |
|
if len(authHead) == 0 { |
|
ctx.Resp.Header().Set("WWW-Authenticate", "Basic realm=\".\"") |
|
ctx.Error(http.StatusUnauthorized) |
|
return |
|
} |
|
|
|
auths := strings.Fields(authHead) |
|
// currently check basic auth |
|
// TODO: support digit auth |
|
// FIXME: middlewares/context.go did basic auth check already, |
|
// maybe could use that one. |
|
if len(auths) != 2 || auths[0] != "Basic" { |
|
ctx.HandleText(http.StatusUnauthorized, "no basic auth and digit auth") |
|
return |
|
} |
|
authUsername, authPasswd, err = base.BasicAuthDecode(auths[1]) |
|
if err != nil { |
|
ctx.HandleText(http.StatusUnauthorized, "no basic auth and digit auth") |
|
return |
|
} |
|
|
|
// Check if username or password is a token |
|
isUsernameToken := len(authPasswd) == 0 || authPasswd == "x-oauth-basic" |
|
// Assume username is token |
|
authToken := authUsername |
|
if !isUsernameToken { |
|
// Assume password is token |
|
authToken = authPasswd |
|
} |
|
uid := sso.CheckOAuthAccessToken(authToken) |
|
if uid != 0 { |
|
ctx.Data["IsApiToken"] = true |
|
|
|
authUser, err = models.GetUserByID(uid) |
|
if err != nil { |
|
ctx.ServerError("GetUserByID", err) |
|
return |
|
} |
|
} |
|
// Assume password is a token. |
|
token, err := models.GetAccessTokenBySHA(authToken) |
|
if err == nil { |
|
authUser, err = models.GetUserByID(token.UID) |
|
if err != nil { |
|
ctx.ServerError("GetUserByID", err) |
|
return |
|
} |
|
|
|
token.UpdatedUnix = timeutil.TimeStampNow() |
|
if err = models.UpdateAccessToken(token); err != nil { |
|
ctx.ServerError("UpdateAccessToken", err) |
|
} |
|
} else if !models.IsErrAccessTokenNotExist(err) && !models.IsErrAccessTokenEmpty(err) { |
|
log.Error("GetAccessTokenBySha: %v", err) |
|
} |
|
|
|
if authUser == nil { |
|
// Check username and password |
|
authUser, err = models.UserSignIn(authUsername, authPasswd) |
|
if err != nil { |
|
if models.IsErrUserProhibitLogin(err) { |
|
ctx.HandleText(http.StatusForbidden, "User is not permitted to login") |
|
return |
|
} else if !models.IsErrUserNotExist(err) { |
|
ctx.ServerError("UserSignIn error: %v", err) |
|
return |
|
} |
|
} |
|
|
|
if authUser == nil { |
|
ctx.HandleText(http.StatusUnauthorized, fmt.Sprintf("invalid credentials from %s", ctx.RemoteAddr())) |
|
return |
|
} |
|
|
|
_, err = models.GetTwoFactorByUID(authUser.ID) |
|
if err == nil { |
|
// TODO: This response should be changed to "invalid credentials" for security reasons once the expectation behind it (creating an app token to authenticate) is properly documented |
|
ctx.HandleText(http.StatusUnauthorized, "Users with two-factor authentication enabled cannot perform HTTP/HTTPS operations via plain username and password. Please create and use a personal access token on the user settings page") |
|
return |
|
} else if !models.IsErrTwoFactorNotEnrolled(err) { |
|
ctx.ServerError("IsErrTwoFactorNotEnrolled", err) |
|
return |
|
} |
|
} |
|
} |
|
|
|
if !authUser.IsActive || authUser.ProhibitLogin { |
|
ctx.HandleText(http.StatusForbidden, "Your account is disabled.") |
|
return |
|
} |
|
|
|
if repoExist { |
|
perm, err := models.GetUserRepoPermission(repo, authUser) |
|
if err != nil { |
|
ctx.ServerError("GetUserRepoPermission", err) |
|
return |
|
} |
|
|
|
if !perm.CanAccess(accessMode, unitType) { |
|
ctx.HandleText(http.StatusForbidden, "User permission denied") |
|
return |
|
} |
|
|
|
if !isPull && repo.IsMirror { |
|
ctx.HandleText(http.StatusForbidden, "mirror repository is read-only") |
|
return |
|
} |
|
} |
|
|
|
environ = []string{ |
|
models.EnvRepoUsername + "=" + username, |
|
models.EnvRepoName + "=" + reponame, |
|
models.EnvPusherName + "=" + authUser.Name, |
|
models.EnvPusherID + fmt.Sprintf("=%d", authUser.ID), |
|
models.EnvIsDeployKey + "=false", |
|
models.EnvAppURL + "=" + setting.AppURL, |
|
} |
|
|
|
if !authUser.KeepEmailPrivate { |
|
environ = append(environ, models.EnvPusherEmail+"="+authUser.Email) |
|
} |
|
|
|
if isWiki { |
|
environ = append(environ, models.EnvRepoIsWiki+"=true") |
|
} else { |
|
environ = append(environ, models.EnvRepoIsWiki+"=false") |
|
} |
|
} |
|
|
|
if !repoExist { |
|
if !receivePack { |
|
ctx.HandleText(http.StatusNotFound, "Repository not found") |
|
return |
|
} |
|
|
|
if isWiki { // you cannot send wiki operation before create the repository |
|
ctx.HandleText(http.StatusNotFound, "Repository not found") |
|
return |
|
} |
|
|
|
if owner.IsOrganization() && !setting.Repository.EnablePushCreateOrg { |
|
ctx.HandleText(http.StatusForbidden, "Push to create is not enabled for organizations.") |
|
return |
|
} |
|
if !owner.IsOrganization() && !setting.Repository.EnablePushCreateUser { |
|
ctx.HandleText(http.StatusForbidden, "Push to create is not enabled for users.") |
|
return |
|
} |
|
|
|
// Return dummy payload if GET receive-pack |
|
if ctx.Req.Method == http.MethodGet { |
|
dummyInfoRefs(ctx) |
|
return |
|
} |
|
|
|
repo, err = repo_service.PushCreateRepo(authUser, owner, reponame) |
|
if err != nil { |
|
log.Error("pushCreateRepo: %v", err) |
|
ctx.Status(http.StatusNotFound) |
|
return |
|
} |
|
} |
|
|
|
if isWiki { |
|
// Ensure the wiki is enabled before we allow access to it |
|
if _, err := repo.GetUnit(models.UnitTypeWiki); err != nil { |
|
if models.IsErrUnitTypeNotExist(err) { |
|
ctx.HandleText(http.StatusForbidden, "repository wiki is disabled") |
|
return |
|
} |
|
log.Error("Failed to get the wiki unit in %-v Error: %v", repo, err) |
|
ctx.ServerError("GetUnit(UnitTypeWiki) for "+repo.FullName(), err) |
|
return |
|
} |
|
} |
|
|
|
environ = append(environ, models.EnvRepoID+fmt.Sprintf("=%d", repo.ID)) |
|
|
|
w := ctx.Resp |
|
r := ctx.Req |
|
cfg := &serviceConfig{ |
|
UploadPack: true, |
|
ReceivePack: true, |
|
Env: environ, |
|
} |
|
|
|
r.URL.Path = strings.ToLower(r.URL.Path) // blue: In case some repo name has upper case name |
|
|
|
dir := models.RepoPath(username, reponame) |
|
if isWiki { |
|
dir = models.RepoPath(username, wikiRepoName) |
|
} |
|
|
|
return &serviceHandler{cfg, w, r, dir, cfg.Env} |
|
} |
|
|
|
var ( |
|
infoRefsCache []byte |
|
infoRefsOnce sync.Once |
|
) |
|
|
|
func dummyInfoRefs(ctx *context.Context) { |
|
infoRefsOnce.Do(func() { |
|
tmpDir, err := ioutil.TempDir(os.TempDir(), "gitea-info-refs-cache") |
|
if err != nil { |
|
log.Error("Failed to create temp dir for git-receive-pack cache: %v", err) |
|
return |
|
} |
|
|
|
defer func() { |
|
if err := util.RemoveAll(tmpDir); err != nil { |
|
log.Error("RemoveAll: %v", err) |
|
} |
|
}() |
|
|
|
if err := git.InitRepository(tmpDir, true); err != nil { |
|
log.Error("Failed to init bare repo for git-receive-pack cache: %v", err) |
|
return |
|
} |
|
|
|
refs, err := git.NewCommand("receive-pack", "--stateless-rpc", "--advertise-refs", ".").RunInDirBytes(tmpDir) |
|
if err != nil { |
|
log.Error(fmt.Sprintf("%v - %s", err, string(refs))) |
|
} |
|
|
|
log.Debug("populating infoRefsCache: \n%s", string(refs)) |
|
infoRefsCache = refs |
|
}) |
|
|
|
ctx.Header().Set("Expires", "Fri, 01 Jan 1980 00:00:00 GMT") |
|
ctx.Header().Set("Pragma", "no-cache") |
|
ctx.Header().Set("Cache-Control", "no-cache, max-age=0, must-revalidate") |
|
ctx.Header().Set("Content-Type", "application/x-git-receive-pack-advertisement") |
|
_, _ = ctx.Write(packetWrite("# service=git-receive-pack\n")) |
|
_, _ = ctx.Write([]byte("0000")) |
|
_, _ = ctx.Write(infoRefsCache) |
|
} |
|
|
|
type serviceConfig struct { |
|
UploadPack bool |
|
ReceivePack bool |
|
Env []string |
|
} |
|
|
|
type serviceHandler struct { |
|
cfg *serviceConfig |
|
w http.ResponseWriter |
|
r *http.Request |
|
dir string |
|
environ []string |
|
} |
|
|
|
func (h *serviceHandler) setHeaderNoCache() { |
|
h.w.Header().Set("Expires", "Fri, 01 Jan 1980 00:00:00 GMT") |
|
h.w.Header().Set("Pragma", "no-cache") |
|
h.w.Header().Set("Cache-Control", "no-cache, max-age=0, must-revalidate") |
|
} |
|
|
|
func (h *serviceHandler) setHeaderCacheForever() { |
|
now := time.Now().Unix() |
|
expires := now + 31536000 |
|
h.w.Header().Set("Date", fmt.Sprintf("%d", now)) |
|
h.w.Header().Set("Expires", fmt.Sprintf("%d", expires)) |
|
h.w.Header().Set("Cache-Control", "public, max-age=31536000") |
|
} |
|
|
|
func (h *serviceHandler) sendFile(contentType, file string) { |
|
reqFile := path.Join(h.dir, file) |
|
|
|
fi, err := os.Stat(reqFile) |
|
if os.IsNotExist(err) { |
|
h.w.WriteHeader(http.StatusNotFound) |
|
return |
|
} |
|
|
|
h.w.Header().Set("Content-Type", contentType) |
|
h.w.Header().Set("Content-Length", fmt.Sprintf("%d", fi.Size())) |
|
h.w.Header().Set("Last-Modified", fi.ModTime().Format(http.TimeFormat)) |
|
http.ServeFile(h.w, h.r, reqFile) |
|
} |
|
|
|
// one or more key=value pairs separated by colons |
|
var safeGitProtocolHeader = regexp.MustCompile(`^[0-9a-zA-Z]+=[0-9a-zA-Z]+(:[0-9a-zA-Z]+=[0-9a-zA-Z]+)*$`) |
|
|
|
func getGitConfig(option, dir string) string { |
|
out, err := git.NewCommand("config", option).RunInDir(dir) |
|
if err != nil { |
|
log.Error("%v - %s", err, out) |
|
} |
|
return out[0 : len(out)-1] |
|
} |
|
|
|
func getConfigSetting(service, dir string) bool { |
|
service = strings.ReplaceAll(service, "-", "") |
|
setting := getGitConfig("http."+service, dir) |
|
|
|
if service == "uploadpack" { |
|
return setting != "false" |
|
} |
|
|
|
return setting == "true" |
|
} |
|
|
|
func hasAccess(service string, h serviceHandler, checkContentType bool) bool { |
|
if checkContentType { |
|
if h.r.Header.Get("Content-Type") != fmt.Sprintf("application/x-git-%s-request", service) { |
|
return false |
|
} |
|
} |
|
|
|
if !(service == "upload-pack" || service == "receive-pack") { |
|
return false |
|
} |
|
if service == "receive-pack" { |
|
return h.cfg.ReceivePack |
|
} |
|
if service == "upload-pack" { |
|
return h.cfg.UploadPack |
|
} |
|
|
|
return getConfigSetting(service, h.dir) |
|
} |
|
|
|
func serviceRPC(h serviceHandler, service string) { |
|
defer func() { |
|
if err := h.r.Body.Close(); err != nil { |
|
log.Error("serviceRPC: Close: %v", err) |
|
} |
|
|
|
}() |
|
|
|
if !hasAccess(service, h, true) { |
|
h.w.WriteHeader(http.StatusUnauthorized) |
|
return |
|
} |
|
|
|
h.w.Header().Set("Content-Type", fmt.Sprintf("application/x-git-%s-result", service)) |
|
|
|
var err error |
|
var reqBody = h.r.Body |
|
|
|
// Handle GZIP. |
|
if h.r.Header.Get("Content-Encoding") == "gzip" { |
|
reqBody, err = gzip.NewReader(reqBody) |
|
if err != nil { |
|
log.Error("Fail to create gzip reader: %v", err) |
|
h.w.WriteHeader(http.StatusInternalServerError) |
|
return |
|
} |
|
} |
|
|
|
// set this for allow pre-receive and post-receive execute |
|
h.environ = append(h.environ, "SSH_ORIGINAL_COMMAND="+service) |
|
|
|
if protocol := h.r.Header.Get("Git-Protocol"); protocol != "" && safeGitProtocolHeader.MatchString(protocol) { |
|
h.environ = append(h.environ, "GIT_PROTOCOL="+protocol) |
|
} |
|
|
|
ctx, cancel := gocontext.WithCancel(git.DefaultContext) |
|
defer cancel() |
|
var stderr bytes.Buffer |
|
cmd := exec.CommandContext(ctx, git.GitExecutable, service, "--stateless-rpc", h.dir) |
|
cmd.Dir = h.dir |
|
cmd.Env = append(os.Environ(), h.environ...) |
|
cmd.Stdout = h.w |
|
cmd.Stdin = reqBody |
|
cmd.Stderr = &stderr |
|
|
|
pid := process.GetManager().Add(fmt.Sprintf("%s %s %s [repo_path: %s]", git.GitExecutable, service, "--stateless-rpc", h.dir), cancel) |
|
defer process.GetManager().Remove(pid) |
|
|
|
if err := cmd.Run(); err != nil { |
|
log.Error("Fail to serve RPC(%s) in %s: %v - %s", service, h.dir, err, stderr.String()) |
|
return |
|
} |
|
} |
|
|
|
// ServiceUploadPack implements Git Smart HTTP protocol |
|
func ServiceUploadPack(ctx *context.Context) { |
|
h := httpBase(ctx) |
|
if h != nil { |
|
serviceRPC(*h, "upload-pack") |
|
} |
|
} |
|
|
|
// ServiceReceivePack implements Git Smart HTTP protocol |
|
func ServiceReceivePack(ctx *context.Context) { |
|
h := httpBase(ctx) |
|
if h != nil { |
|
serviceRPC(*h, "receive-pack") |
|
} |
|
} |
|
|
|
func getServiceType(r *http.Request) string { |
|
serviceType := r.FormValue("service") |
|
if !strings.HasPrefix(serviceType, "git-") { |
|
return "" |
|
} |
|
return strings.Replace(serviceType, "git-", "", 1) |
|
} |
|
|
|
func updateServerInfo(dir string) []byte { |
|
out, err := git.NewCommand("update-server-info").RunInDirBytes(dir) |
|
if err != nil { |
|
log.Error(fmt.Sprintf("%v - %s", err, string(out))) |
|
} |
|
return out |
|
} |
|
|
|
func packetWrite(str string) []byte { |
|
s := strconv.FormatInt(int64(len(str)+4), 16) |
|
if len(s)%4 != 0 { |
|
s = strings.Repeat("0", 4-len(s)%4) + s |
|
} |
|
return []byte(s + str) |
|
} |
|
|
|
// GetInfoRefs implements Git dumb HTTP |
|
func GetInfoRefs(ctx *context.Context) { |
|
h := httpBase(ctx) |
|
if h == nil { |
|
return |
|
} |
|
h.setHeaderNoCache() |
|
if hasAccess(getServiceType(h.r), *h, false) { |
|
service := getServiceType(h.r) |
|
|
|
if protocol := h.r.Header.Get("Git-Protocol"); protocol != "" && safeGitProtocolHeader.MatchString(protocol) { |
|
h.environ = append(h.environ, "GIT_PROTOCOL="+protocol) |
|
} |
|
h.environ = append(os.Environ(), h.environ...) |
|
|
|
refs, err := git.NewCommand(service, "--stateless-rpc", "--advertise-refs", ".").RunInDirTimeoutEnv(h.environ, -1, h.dir) |
|
if err != nil { |
|
log.Error(fmt.Sprintf("%v - %s", err, string(refs))) |
|
} |
|
|
|
h.w.Header().Set("Content-Type", fmt.Sprintf("application/x-git-%s-advertisement", service)) |
|
h.w.WriteHeader(http.StatusOK) |
|
_, _ = h.w.Write(packetWrite("# service=git-" + service + "\n")) |
|
_, _ = h.w.Write([]byte("0000")) |
|
_, _ = h.w.Write(refs) |
|
} else { |
|
updateServerInfo(h.dir) |
|
h.sendFile("text/plain; charset=utf-8", "info/refs") |
|
} |
|
} |
|
|
|
// GetTextFile implements Git dumb HTTP |
|
func GetTextFile(p string) func(*context.Context) { |
|
return func(ctx *context.Context) { |
|
h := httpBase(ctx) |
|
if h != nil { |
|
h.setHeaderNoCache() |
|
file := ctx.Params("file") |
|
if file != "" { |
|
h.sendFile("text/plain", "objects/info/"+file) |
|
} else { |
|
h.sendFile("text/plain", p) |
|
} |
|
} |
|
} |
|
} |
|
|
|
// GetInfoPacks implements Git dumb HTTP |
|
func GetInfoPacks(ctx *context.Context) { |
|
h := httpBase(ctx) |
|
if h != nil { |
|
h.setHeaderCacheForever() |
|
h.sendFile("text/plain; charset=utf-8", "objects/info/packs") |
|
} |
|
} |
|
|
|
// GetLooseObject implements Git dumb HTTP |
|
func GetLooseObject(ctx *context.Context) { |
|
h := httpBase(ctx) |
|
if h != nil { |
|
h.setHeaderCacheForever() |
|
h.sendFile("application/x-git-loose-object", fmt.Sprintf("objects/%s/%s", |
|
ctx.Params("head"), ctx.Params("hash"))) |
|
} |
|
} |
|
|
|
// GetPackFile implements Git dumb HTTP |
|
func GetPackFile(ctx *context.Context) { |
|
h := httpBase(ctx) |
|
if h != nil { |
|
h.setHeaderCacheForever() |
|
h.sendFile("application/x-git-packed-objects", "objects/pack/pack-"+ctx.Params("file")+".pack") |
|
} |
|
} |
|
|
|
// GetIdxFile implements Git dumb HTTP |
|
func GetIdxFile(ctx *context.Context) { |
|
h := httpBase(ctx) |
|
if h != nil { |
|
h.setHeaderCacheForever() |
|
h.sendFile("application/x-git-packed-objects-toc", "objects/pack/pack-"+ctx.Params("file")+".idx") |
|
} |
|
}
|
|
|