2017-05-04 13:42:02 +08:00
|
|
|
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package private
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
|
|
|
|
"code.gitea.io/gitea/models"
|
|
|
|
"code.gitea.io/gitea/modules/log"
|
|
|
|
"code.gitea.io/gitea/modules/setting"
|
2019-03-18 22:00:23 +08:00
|
|
|
"code.gitea.io/gitea/modules/util"
|
2017-05-04 13:42:02 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
// GetProtectedBranchBy get protected branch information
|
|
|
|
func GetProtectedBranchBy(repoID int64, branchName string) (*models.ProtectedBranch, error) {
|
|
|
|
// Ask for running deliver hook and test pull request tasks.
|
2019-03-18 22:00:23 +08:00
|
|
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/branch/%d/%s", repoID, util.PathEscapeSegments(branchName))
|
2017-05-04 13:42:02 +08:00
|
|
|
log.GitLogger.Trace("GetProtectedBranchBy: %s", reqURL)
|
|
|
|
|
2017-08-03 23:32:13 +08:00
|
|
|
resp, err := newInternalRequest(reqURL, "GET").Response()
|
2017-05-04 13:42:02 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
var branch models.ProtectedBranch
|
|
|
|
if err := json.NewDecoder(resp.Body).Decode(&branch); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
// All 2XX status codes are accepted and others will return an error
|
|
|
|
if resp.StatusCode/100 != 2 {
|
2018-10-30 14:20:13 +08:00
|
|
|
return nil, fmt.Errorf("Failed to get protected branch: %s", decodeJSONError(resp).Err)
|
2017-05-04 13:42:02 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return &branch, nil
|
|
|
|
}
|
2017-09-14 16:16:22 +08:00
|
|
|
|
|
|
|
// CanUserPush returns if user can push
|
|
|
|
func CanUserPush(protectedBranchID, userID int64) (bool, error) {
|
|
|
|
// Ask for running deliver hook and test pull request tasks.
|
|
|
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/protectedbranch/%d/%d", protectedBranchID, userID)
|
|
|
|
log.GitLogger.Trace("CanUserPush: %s", reqURL)
|
|
|
|
|
|
|
|
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
|
|
|
|
var canPush = make(map[string]interface{})
|
|
|
|
if err := json.NewDecoder(resp.Body).Decode(&canPush); err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
// All 2XX status codes are accepted and others will return an error
|
|
|
|
if resp.StatusCode/100 != 2 {
|
|
|
|
return false, fmt.Errorf("Failed to retrieve push user: %s", decodeJSONError(resp).Err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return canPush["can_push"].(bool), nil
|
|
|
|
}
|