 894d9b2836
			
		
	
	
	
	
	894d9b2836Since `modules/context` has to depend on `models` and many other packages, it should be moved from `modules/context` to `services/context` according to design principles. There is no logic code change on this PR, only move packages. - Move `code.gitea.io/gitea/modules/context` to `code.gitea.io/gitea/services/context` - Move `code.gitea.io/gitea/modules/contexttest` to `code.gitea.io/gitea/services/contexttest` because of depending on context - Move `code.gitea.io/gitea/modules/upload` to `code.gitea.io/gitea/services/context/upload` because of depending on context (cherry picked from commit 29f149bd9f517225a3c9f1ca3fb0a7b5325af696) Conflicts: routers/api/packages/alpine/alpine.go routers/api/v1/repo/issue_reaction.go routers/install/install.go routers/web/admin/config.go routers/web/passkey.go routers/web/repo/search.go routers/web/repo/setting/default_branch.go routers/web/user/home.go routers/web/user/profile.go tests/integration/editor_test.go tests/integration/integration_test.go tests/integration/mirror_push_test.go trivial context conflicts also modified all other occurrences in Forgejo specific files
		
			
				
	
	
		
			109 lines
		
	
	
	
		
			3.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			109 lines
		
	
	
	
		
			3.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2023 The Gitea Authors. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package setting
 | |
| 
 | |
| import (
 | |
| 	"net/http"
 | |
| 
 | |
| 	asymkey_model "code.gitea.io/gitea/models/asymkey"
 | |
| 	"code.gitea.io/gitea/models/db"
 | |
| 	"code.gitea.io/gitea/modules/log"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 	"code.gitea.io/gitea/modules/web"
 | |
| 	asymkey_service "code.gitea.io/gitea/services/asymkey"
 | |
| 	"code.gitea.io/gitea/services/context"
 | |
| 	"code.gitea.io/gitea/services/forms"
 | |
| )
 | |
| 
 | |
| // DeployKeys render the deploy keys list of a repository page
 | |
| func DeployKeys(ctx *context.Context) {
 | |
| 	ctx.Data["Title"] = ctx.Tr("repo.settings.deploy_keys") + " / " + ctx.Tr("secrets.secrets")
 | |
| 	ctx.Data["PageIsSettingsKeys"] = true
 | |
| 	ctx.Data["DisableSSH"] = setting.SSH.Disabled
 | |
| 
 | |
| 	keys, err := db.Find[asymkey_model.DeployKey](ctx, asymkey_model.ListDeployKeysOptions{RepoID: ctx.Repo.Repository.ID})
 | |
| 	if err != nil {
 | |
| 		ctx.ServerError("ListDeployKeys", err)
 | |
| 		return
 | |
| 	}
 | |
| 	ctx.Data["Deploykeys"] = keys
 | |
| 
 | |
| 	ctx.HTML(http.StatusOK, tplDeployKeys)
 | |
| }
 | |
| 
 | |
| // DeployKeysPost response for adding a deploy key of a repository
 | |
| func DeployKeysPost(ctx *context.Context) {
 | |
| 	form := web.GetForm(ctx).(*forms.AddKeyForm)
 | |
| 	ctx.Data["Title"] = ctx.Tr("repo.settings.deploy_keys")
 | |
| 	ctx.Data["PageIsSettingsKeys"] = true
 | |
| 	ctx.Data["DisableSSH"] = setting.SSH.Disabled
 | |
| 
 | |
| 	keys, err := db.Find[asymkey_model.DeployKey](ctx, asymkey_model.ListDeployKeysOptions{RepoID: ctx.Repo.Repository.ID})
 | |
| 	if err != nil {
 | |
| 		ctx.ServerError("ListDeployKeys", err)
 | |
| 		return
 | |
| 	}
 | |
| 	ctx.Data["Deploykeys"] = keys
 | |
| 
 | |
| 	if ctx.HasError() {
 | |
| 		ctx.HTML(http.StatusOK, tplDeployKeys)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	content, err := asymkey_model.CheckPublicKeyString(form.Content)
 | |
| 	if err != nil {
 | |
| 		if db.IsErrSSHDisabled(err) {
 | |
| 			ctx.Flash.Info(ctx.Tr("settings.ssh_disabled"))
 | |
| 		} else if asymkey_model.IsErrKeyUnableVerify(err) {
 | |
| 			ctx.Flash.Info(ctx.Tr("form.unable_verify_ssh_key"))
 | |
| 		} else if err == asymkey_model.ErrKeyIsPrivate {
 | |
| 			ctx.Data["HasError"] = true
 | |
| 			ctx.Data["Err_Content"] = true
 | |
| 			ctx.Flash.Error(ctx.Tr("form.must_use_public_key"))
 | |
| 		} else {
 | |
| 			ctx.Data["HasError"] = true
 | |
| 			ctx.Data["Err_Content"] = true
 | |
| 			ctx.Flash.Error(ctx.Tr("form.invalid_ssh_key", err.Error()))
 | |
| 		}
 | |
| 		ctx.Redirect(ctx.Repo.RepoLink + "/settings/keys")
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	key, err := asymkey_model.AddDeployKey(ctx, ctx.Repo.Repository.ID, form.Title, content, !form.IsWritable)
 | |
| 	if err != nil {
 | |
| 		ctx.Data["HasError"] = true
 | |
| 		switch {
 | |
| 		case asymkey_model.IsErrDeployKeyAlreadyExist(err):
 | |
| 			ctx.Data["Err_Content"] = true
 | |
| 			ctx.RenderWithErr(ctx.Tr("repo.settings.key_been_used"), tplDeployKeys, &form)
 | |
| 		case asymkey_model.IsErrKeyAlreadyExist(err):
 | |
| 			ctx.Data["Err_Content"] = true
 | |
| 			ctx.RenderWithErr(ctx.Tr("settings.ssh_key_been_used"), tplDeployKeys, &form)
 | |
| 		case asymkey_model.IsErrKeyNameAlreadyUsed(err):
 | |
| 			ctx.Data["Err_Title"] = true
 | |
| 			ctx.RenderWithErr(ctx.Tr("repo.settings.key_name_used"), tplDeployKeys, &form)
 | |
| 		case asymkey_model.IsErrDeployKeyNameAlreadyUsed(err):
 | |
| 			ctx.Data["Err_Title"] = true
 | |
| 			ctx.RenderWithErr(ctx.Tr("repo.settings.key_name_used"), tplDeployKeys, &form)
 | |
| 		default:
 | |
| 			ctx.ServerError("AddDeployKey", err)
 | |
| 		}
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	log.Trace("Deploy key added: %d", ctx.Repo.Repository.ID)
 | |
| 	ctx.Flash.Success(ctx.Tr("repo.settings.add_key_success", key.Name))
 | |
| 	ctx.Redirect(ctx.Repo.RepoLink + "/settings/keys")
 | |
| }
 | |
| 
 | |
| // DeleteDeployKey response for deleting a deploy key
 | |
| func DeleteDeployKey(ctx *context.Context) {
 | |
| 	if err := asymkey_service.DeleteDeployKey(ctx, ctx.Doer, ctx.FormInt64("id")); err != nil {
 | |
| 		ctx.Flash.Error("DeleteDeployKey: " + err.Error())
 | |
| 	} else {
 | |
| 		ctx.Flash.Success(ctx.Tr("repo.settings.deploy_key_deletion_success"))
 | |
| 	}
 | |
| 
 | |
| 	ctx.JSONRedirect(ctx.Repo.RepoLink + "/settings/keys")
 | |
| }
 |