forked from tangled.org/core
Monorepo for Tangled — https://tangled.org
1package pulls 2 3import ( 4 "database/sql" 5 "encoding/json" 6 "errors" 7 "fmt" 8 "log" 9 "log/slog" 10 "net/http" 11 "slices" 12 "sort" 13 "strconv" 14 "strings" 15 "time" 16 17 "tangled.org/core/api/tangled" 18 "tangled.org/core/appview/config" 19 "tangled.org/core/appview/db" 20 pulls_indexer "tangled.org/core/appview/indexer/pulls" 21 "tangled.org/core/appview/models" 22 "tangled.org/core/appview/notify" 23 "tangled.org/core/appview/oauth" 24 "tangled.org/core/appview/pages" 25 "tangled.org/core/appview/pages/markup" 26 "tangled.org/core/appview/reporesolver" 27 "tangled.org/core/appview/validator" 28 "tangled.org/core/appview/xrpcclient" 29 "tangled.org/core/idresolver" 30 "tangled.org/core/patchutil" 31 "tangled.org/core/rbac" 32 "tangled.org/core/tid" 33 "tangled.org/core/types" 34 35 comatproto "github.com/bluesky-social/indigo/api/atproto" 36 "github.com/bluesky-social/indigo/atproto/syntax" 37 lexutil "github.com/bluesky-social/indigo/lex/util" 38 indigoxrpc "github.com/bluesky-social/indigo/xrpc" 39 "github.com/go-chi/chi/v5" 40 "github.com/google/uuid" 41) 42 43type Pulls struct { 44 oauth *oauth.OAuth 45 repoResolver *reporesolver.RepoResolver 46 pages *pages.Pages 47 idResolver *idresolver.Resolver 48 db *db.DB 49 config *config.Config 50 notifier notify.Notifier 51 enforcer *rbac.Enforcer 52 logger *slog.Logger 53 validator *validator.Validator 54 indexer *pulls_indexer.Indexer 55} 56 57func New( 58 oauth *oauth.OAuth, 59 repoResolver *reporesolver.RepoResolver, 60 pages *pages.Pages, 61 resolver *idresolver.Resolver, 62 db *db.DB, 63 config *config.Config, 64 notifier notify.Notifier, 65 enforcer *rbac.Enforcer, 66 validator *validator.Validator, 67 indexer *pulls_indexer.Indexer, 68 logger *slog.Logger, 69) *Pulls { 70 return &Pulls{ 71 oauth: oauth, 72 repoResolver: repoResolver, 73 pages: pages, 74 idResolver: resolver, 75 db: db, 76 config: config, 77 notifier: notifier, 78 enforcer: enforcer, 79 logger: logger, 80 validator: validator, 81 indexer: indexer, 82 } 83} 84 85// htmx fragment 86func (s *Pulls) PullActions(w http.ResponseWriter, r *http.Request) { 87 switch r.Method { 88 case http.MethodGet: 89 user := s.oauth.GetUser(r) 90 f, err := s.repoResolver.Resolve(r) 91 if err != nil { 92 log.Println("failed to get repo and knot", err) 93 return 94 } 95 96 pull, ok := r.Context().Value("pull").(*models.Pull) 97 if !ok { 98 log.Println("failed to get pull") 99 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 100 return 101 } 102 103 // can be nil if this pull is not stacked 104 stack, _ := r.Context().Value("stack").(models.Stack) 105 106 roundNumberStr := chi.URLParam(r, "round") 107 roundNumber, err := strconv.Atoi(roundNumberStr) 108 if err != nil { 109 roundNumber = pull.LastRoundNumber() 110 } 111 if roundNumber >= len(pull.Submissions) { 112 http.Error(w, "bad round id", http.StatusBadRequest) 113 log.Println("failed to parse round id", err) 114 return 115 } 116 117 mergeCheckResponse := s.mergeCheck(r, f, pull, stack) 118 branchDeleteStatus := s.branchDeleteStatus(r, f, pull) 119 resubmitResult := pages.Unknown 120 if user.Did == pull.OwnerDid { 121 resubmitResult = s.resubmitCheck(r, f, pull, stack) 122 } 123 124 s.pages.PullActionsFragment(w, pages.PullActionsParams{ 125 LoggedInUser: user, 126 RepoInfo: f.RepoInfo(user), 127 Pull: pull, 128 RoundNumber: roundNumber, 129 MergeCheck: mergeCheckResponse, 130 ResubmitCheck: resubmitResult, 131 BranchDeleteStatus: branchDeleteStatus, 132 Stack: stack, 133 }) 134 return 135 } 136} 137 138func (s *Pulls) RepoSinglePull(w http.ResponseWriter, r *http.Request) { 139 user := s.oauth.GetUser(r) 140 f, err := s.repoResolver.Resolve(r) 141 if err != nil { 142 log.Println("failed to get repo and knot", err) 143 return 144 } 145 146 pull, ok := r.Context().Value("pull").(*models.Pull) 147 if !ok { 148 log.Println("failed to get pull") 149 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 150 return 151 } 152 153 // can be nil if this pull is not stacked 154 stack, _ := r.Context().Value("stack").(models.Stack) 155 abandonedPulls, _ := r.Context().Value("abandonedPulls").([]*models.Pull) 156 157 mergeCheckResponse := s.mergeCheck(r, f, pull, stack) 158 branchDeleteStatus := s.branchDeleteStatus(r, f, pull) 159 resubmitResult := pages.Unknown 160 if user != nil && user.Did == pull.OwnerDid { 161 resubmitResult = s.resubmitCheck(r, f, pull, stack) 162 } 163 164 repoInfo := f.RepoInfo(user) 165 166 m := make(map[string]models.Pipeline) 167 168 var shas []string 169 for _, s := range pull.Submissions { 170 shas = append(shas, s.SourceRev) 171 } 172 for _, p := range stack { 173 shas = append(shas, p.LatestSha()) 174 } 175 for _, p := range abandonedPulls { 176 shas = append(shas, p.LatestSha()) 177 } 178 179 ps, err := db.GetPipelineStatuses( 180 s.db, 181 db.FilterEq("repo_owner", repoInfo.OwnerDid), 182 db.FilterEq("repo_name", repoInfo.Name), 183 db.FilterEq("knot", repoInfo.Knot), 184 db.FilterIn("sha", shas), 185 ) 186 if err != nil { 187 log.Printf("failed to fetch pipeline statuses: %s", err) 188 // non-fatal 189 } 190 191 for _, p := range ps { 192 m[p.Sha] = p 193 } 194 195 reactionMap, err := db.GetReactionMap(s.db, 20, pull.AtUri()) 196 if err != nil { 197 log.Println("failed to get pull reactions") 198 s.pages.Notice(w, "pulls", "Failed to load pull. Try again later.") 199 } 200 201 userReactions := map[models.ReactionKind]bool{} 202 if user != nil { 203 userReactions = db.GetReactionStatusMap(s.db, user.Did, pull.AtUri()) 204 } 205 206 labelDefs, err := db.GetLabelDefinitions( 207 s.db, 208 db.FilterIn("at_uri", f.Repo.Labels), 209 db.FilterContains("scope", tangled.RepoPullNSID), 210 ) 211 if err != nil { 212 log.Println("failed to fetch labels", err) 213 s.pages.Error503(w) 214 return 215 } 216 217 defs := make(map[string]*models.LabelDefinition) 218 for _, l := range labelDefs { 219 defs[l.AtUri().String()] = &l 220 } 221 222 s.pages.RepoSinglePull(w, pages.RepoSinglePullParams{ 223 LoggedInUser: user, 224 RepoInfo: repoInfo, 225 Pull: pull, 226 Stack: stack, 227 AbandonedPulls: abandonedPulls, 228 BranchDeleteStatus: branchDeleteStatus, 229 MergeCheck: mergeCheckResponse, 230 ResubmitCheck: resubmitResult, 231 Pipelines: m, 232 233 OrderedReactionKinds: models.OrderedReactionKinds, 234 Reactions: reactionMap, 235 UserReacted: userReactions, 236 237 LabelDefs: defs, 238 }) 239} 240 241func (s *Pulls) mergeCheck(r *http.Request, f *reporesolver.ResolvedRepo, pull *models.Pull, stack models.Stack) types.MergeCheckResponse { 242 if pull.State == models.PullMerged { 243 return types.MergeCheckResponse{} 244 } 245 246 scheme := "https" 247 if s.config.Core.Dev { 248 scheme = "http" 249 } 250 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 251 252 xrpcc := indigoxrpc.Client{ 253 Host: host, 254 } 255 256 patch := pull.LatestPatch() 257 if pull.IsStacked() { 258 // combine patches of substack 259 subStack := stack.Below(pull) 260 // collect the portion of the stack that is mergeable 261 mergeable := subStack.Mergeable() 262 // combine each patch 263 patch = mergeable.CombinedPatch() 264 } 265 266 resp, xe := tangled.RepoMergeCheck( 267 r.Context(), 268 &xrpcc, 269 &tangled.RepoMergeCheck_Input{ 270 Did: f.OwnerDid(), 271 Name: f.Name, 272 Branch: pull.TargetBranch, 273 Patch: patch, 274 }, 275 ) 276 if err := xrpcclient.HandleXrpcErr(xe); err != nil { 277 log.Println("failed to check for mergeability", "err", err) 278 return types.MergeCheckResponse{ 279 Error: fmt.Sprintf("failed to check merge status: %s", err.Error()), 280 } 281 } 282 283 // convert xrpc response to internal types 284 conflicts := make([]types.ConflictInfo, len(resp.Conflicts)) 285 for i, conflict := range resp.Conflicts { 286 conflicts[i] = types.ConflictInfo{ 287 Filename: conflict.Filename, 288 Reason: conflict.Reason, 289 } 290 } 291 292 result := types.MergeCheckResponse{ 293 IsConflicted: resp.Is_conflicted, 294 Conflicts: conflicts, 295 } 296 297 if resp.Message != nil { 298 result.Message = *resp.Message 299 } 300 301 if resp.Error != nil { 302 result.Error = *resp.Error 303 } 304 305 return result 306} 307 308func (s *Pulls) branchDeleteStatus(r *http.Request, f *reporesolver.ResolvedRepo, pull *models.Pull) *models.BranchDeleteStatus { 309 if pull.State != models.PullMerged { 310 return nil 311 } 312 313 user := s.oauth.GetUser(r) 314 if user == nil { 315 return nil 316 } 317 318 var branch string 319 var repo *models.Repo 320 // check if the branch exists 321 // NOTE: appview could cache branches/tags etc. for every repo by listening for gitRefUpdates 322 if pull.IsBranchBased() { 323 branch = pull.PullSource.Branch 324 repo = &f.Repo 325 } else if pull.IsForkBased() { 326 branch = pull.PullSource.Branch 327 repo = pull.PullSource.Repo 328 } else { 329 return nil 330 } 331 332 // deleted fork 333 if repo == nil { 334 return nil 335 } 336 337 // user can only delete branch if they are a collaborator in the repo that the branch belongs to 338 perms := s.enforcer.GetPermissionsInRepo(user.Did, repo.Knot, repo.DidSlashRepo()) 339 if !slices.Contains(perms, "repo:push") { 340 return nil 341 } 342 343 scheme := "http" 344 if !s.config.Core.Dev { 345 scheme = "https" 346 } 347 host := fmt.Sprintf("%s://%s", scheme, repo.Knot) 348 xrpcc := &indigoxrpc.Client{ 349 Host: host, 350 } 351 352 resp, err := tangled.RepoBranch(r.Context(), xrpcc, branch, fmt.Sprintf("%s/%s", repo.Did, repo.Name)) 353 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 354 return nil 355 } 356 357 return &models.BranchDeleteStatus{ 358 Repo: repo, 359 Branch: resp.Name, 360 } 361} 362 363func (s *Pulls) resubmitCheck(r *http.Request, f *reporesolver.ResolvedRepo, pull *models.Pull, stack models.Stack) pages.ResubmitResult { 364 if pull.State == models.PullMerged || pull.State == models.PullDeleted || pull.PullSource == nil { 365 return pages.Unknown 366 } 367 368 var knot, ownerDid, repoName string 369 370 if pull.PullSource.RepoAt != nil { 371 // fork-based pulls 372 sourceRepo, err := db.GetRepoByAtUri(s.db, pull.PullSource.RepoAt.String()) 373 if err != nil { 374 log.Println("failed to get source repo", err) 375 return pages.Unknown 376 } 377 378 knot = sourceRepo.Knot 379 ownerDid = sourceRepo.Did 380 repoName = sourceRepo.Name 381 } else { 382 // pulls within the same repo 383 knot = f.Knot 384 ownerDid = f.OwnerDid() 385 repoName = f.Name 386 } 387 388 scheme := "http" 389 if !s.config.Core.Dev { 390 scheme = "https" 391 } 392 host := fmt.Sprintf("%s://%s", scheme, knot) 393 xrpcc := &indigoxrpc.Client{ 394 Host: host, 395 } 396 397 repo := fmt.Sprintf("%s/%s", ownerDid, repoName) 398 branchResp, err := tangled.RepoBranch(r.Context(), xrpcc, pull.PullSource.Branch, repo) 399 if err != nil { 400 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 401 log.Println("failed to call XRPC repo.branches", xrpcerr) 402 return pages.Unknown 403 } 404 log.Println("failed to reach knotserver", err) 405 return pages.Unknown 406 } 407 408 targetBranch := branchResp 409 410 latestSourceRev := pull.LatestSha() 411 412 if pull.IsStacked() && stack != nil { 413 top := stack[0] 414 latestSourceRev = top.LatestSha() 415 } 416 417 if latestSourceRev != targetBranch.Hash { 418 return pages.ShouldResubmit 419 } 420 421 return pages.ShouldNotResubmit 422} 423 424func (s *Pulls) RepoPullPatch(w http.ResponseWriter, r *http.Request) { 425 user := s.oauth.GetUser(r) 426 f, err := s.repoResolver.Resolve(r) 427 if err != nil { 428 log.Println("failed to get repo and knot", err) 429 return 430 } 431 432 var diffOpts types.DiffOpts 433 if d := r.URL.Query().Get("diff"); d == "split" { 434 diffOpts.Split = true 435 } 436 437 pull, ok := r.Context().Value("pull").(*models.Pull) 438 if !ok { 439 log.Println("failed to get pull") 440 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 441 return 442 } 443 444 stack, _ := r.Context().Value("stack").(models.Stack) 445 446 roundId := chi.URLParam(r, "round") 447 roundIdInt, err := strconv.Atoi(roundId) 448 if err != nil || roundIdInt >= len(pull.Submissions) { 449 http.Error(w, "bad round id", http.StatusBadRequest) 450 log.Println("failed to parse round id", err) 451 return 452 } 453 454 patch := pull.Submissions[roundIdInt].CombinedPatch() 455 diff := patchutil.AsNiceDiff(patch, pull.TargetBranch) 456 457 s.pages.RepoPullPatchPage(w, pages.RepoPullPatchParams{ 458 LoggedInUser: user, 459 RepoInfo: f.RepoInfo(user), 460 Pull: pull, 461 Stack: stack, 462 Round: roundIdInt, 463 Submission: pull.Submissions[roundIdInt], 464 Diff: &diff, 465 DiffOpts: diffOpts, 466 }) 467 468} 469 470func (s *Pulls) RepoPullInterdiff(w http.ResponseWriter, r *http.Request) { 471 user := s.oauth.GetUser(r) 472 473 f, err := s.repoResolver.Resolve(r) 474 if err != nil { 475 log.Println("failed to get repo and knot", err) 476 return 477 } 478 479 var diffOpts types.DiffOpts 480 if d := r.URL.Query().Get("diff"); d == "split" { 481 diffOpts.Split = true 482 } 483 484 pull, ok := r.Context().Value("pull").(*models.Pull) 485 if !ok { 486 log.Println("failed to get pull") 487 s.pages.Notice(w, "pull-error", "Failed to get pull.") 488 return 489 } 490 491 roundId := chi.URLParam(r, "round") 492 roundIdInt, err := strconv.Atoi(roundId) 493 if err != nil || roundIdInt >= len(pull.Submissions) { 494 http.Error(w, "bad round id", http.StatusBadRequest) 495 log.Println("failed to parse round id", err) 496 return 497 } 498 499 if roundIdInt == 0 { 500 http.Error(w, "bad round id", http.StatusBadRequest) 501 log.Println("cannot interdiff initial submission") 502 return 503 } 504 505 currentPatch, err := patchutil.AsDiff(pull.Submissions[roundIdInt].CombinedPatch()) 506 if err != nil { 507 log.Println("failed to interdiff; current patch malformed") 508 s.pages.Notice(w, fmt.Sprintf("interdiff-error-%d", roundIdInt), "Failed to calculate interdiff; current patch is invalid.") 509 return 510 } 511 512 previousPatch, err := patchutil.AsDiff(pull.Submissions[roundIdInt-1].CombinedPatch()) 513 if err != nil { 514 log.Println("failed to interdiff; previous patch malformed") 515 s.pages.Notice(w, fmt.Sprintf("interdiff-error-%d", roundIdInt), "Failed to calculate interdiff; previous patch is invalid.") 516 return 517 } 518 519 interdiff := patchutil.Interdiff(previousPatch, currentPatch) 520 521 s.pages.RepoPullInterdiffPage(w, pages.RepoPullInterdiffParams{ 522 LoggedInUser: s.oauth.GetUser(r), 523 RepoInfo: f.RepoInfo(user), 524 Pull: pull, 525 Round: roundIdInt, 526 Interdiff: interdiff, 527 DiffOpts: diffOpts, 528 }) 529} 530 531func (s *Pulls) RepoPullPatchRaw(w http.ResponseWriter, r *http.Request) { 532 pull, ok := r.Context().Value("pull").(*models.Pull) 533 if !ok { 534 log.Println("failed to get pull") 535 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 536 return 537 } 538 539 roundId := chi.URLParam(r, "round") 540 roundIdInt, err := strconv.Atoi(roundId) 541 if err != nil || roundIdInt >= len(pull.Submissions) { 542 http.Error(w, "bad round id", http.StatusBadRequest) 543 log.Println("failed to parse round id", err) 544 return 545 } 546 547 w.Header().Set("Content-Type", "text/plain; charset=utf-8") 548 w.Write([]byte(pull.Submissions[roundIdInt].Patch)) 549} 550 551func (s *Pulls) RepoPulls(w http.ResponseWriter, r *http.Request) { 552 l := s.logger.With("handler", "RepoPulls") 553 554 user := s.oauth.GetUser(r) 555 params := r.URL.Query() 556 557 state := models.PullOpen 558 switch params.Get("state") { 559 case "closed": 560 state = models.PullClosed 561 case "merged": 562 state = models.PullMerged 563 } 564 565 f, err := s.repoResolver.Resolve(r) 566 if err != nil { 567 log.Println("failed to get repo and knot", err) 568 return 569 } 570 571 keyword := params.Get("q") 572 573 var ids []int64 574 searchOpts := models.PullSearchOptions{ 575 Keyword: keyword, 576 RepoAt: f.RepoAt().String(), 577 State: state, 578 // Page: page, 579 } 580 l.Debug("searching with", "searchOpts", searchOpts) 581 if keyword != "" { 582 res, err := s.indexer.Search(r.Context(), searchOpts) 583 if err != nil { 584 l.Error("failed to search for pulls", "err", err) 585 return 586 } 587 ids = res.Hits 588 l.Debug("searched pulls with indexer", "count", len(ids)) 589 } else { 590 ids, err = db.GetPullIDs(s.db, searchOpts) 591 if err != nil { 592 l.Error("failed to get all pull ids", "err", err) 593 return 594 } 595 l.Debug("indexed all pulls from the db", "count", len(ids)) 596 } 597 598 pulls, err := db.GetPulls( 599 s.db, 600 db.FilterIn("id", ids), 601 ) 602 if err != nil { 603 log.Println("failed to get pulls", err) 604 s.pages.Notice(w, "pulls", "Failed to load pulls. Try again later.") 605 return 606 } 607 608 for _, p := range pulls { 609 var pullSourceRepo *models.Repo 610 if p.PullSource != nil { 611 if p.PullSource.RepoAt != nil { 612 pullSourceRepo, err = db.GetRepoByAtUri(s.db, p.PullSource.RepoAt.String()) 613 if err != nil { 614 log.Printf("failed to get repo by at uri: %v", err) 615 continue 616 } else { 617 p.PullSource.Repo = pullSourceRepo 618 } 619 } 620 } 621 } 622 623 // we want to group all stacked PRs into just one list 624 stacks := make(map[string]models.Stack) 625 var shas []string 626 n := 0 627 for _, p := range pulls { 628 // store the sha for later 629 shas = append(shas, p.LatestSha()) 630 // this PR is stacked 631 if p.StackId != "" { 632 // we have already seen this PR stack 633 if _, seen := stacks[p.StackId]; seen { 634 stacks[p.StackId] = append(stacks[p.StackId], p) 635 // skip this PR 636 } else { 637 stacks[p.StackId] = nil 638 pulls[n] = p 639 n++ 640 } 641 } else { 642 pulls[n] = p 643 n++ 644 } 645 } 646 pulls = pulls[:n] 647 648 repoInfo := f.RepoInfo(user) 649 ps, err := db.GetPipelineStatuses( 650 s.db, 651 db.FilterEq("repo_owner", repoInfo.OwnerDid), 652 db.FilterEq("repo_name", repoInfo.Name), 653 db.FilterEq("knot", repoInfo.Knot), 654 db.FilterIn("sha", shas), 655 ) 656 if err != nil { 657 log.Printf("failed to fetch pipeline statuses: %s", err) 658 // non-fatal 659 } 660 m := make(map[string]models.Pipeline) 661 for _, p := range ps { 662 m[p.Sha] = p 663 } 664 665 labelDefs, err := db.GetLabelDefinitions( 666 s.db, 667 db.FilterIn("at_uri", f.Repo.Labels), 668 db.FilterContains("scope", tangled.RepoPullNSID), 669 ) 670 if err != nil { 671 log.Println("failed to fetch labels", err) 672 s.pages.Error503(w) 673 return 674 } 675 676 defs := make(map[string]*models.LabelDefinition) 677 for _, l := range labelDefs { 678 defs[l.AtUri().String()] = &l 679 } 680 681 s.pages.RepoPulls(w, pages.RepoPullsParams{ 682 LoggedInUser: s.oauth.GetUser(r), 683 RepoInfo: f.RepoInfo(user), 684 Pulls: pulls, 685 LabelDefs: defs, 686 FilteringBy: state, 687 FilterQuery: keyword, 688 Stacks: stacks, 689 Pipelines: m, 690 }) 691} 692 693func (s *Pulls) PullComment(w http.ResponseWriter, r *http.Request) { 694 user := s.oauth.GetUser(r) 695 f, err := s.repoResolver.Resolve(r) 696 if err != nil { 697 log.Println("failed to get repo and knot", err) 698 return 699 } 700 701 pull, ok := r.Context().Value("pull").(*models.Pull) 702 if !ok { 703 log.Println("failed to get pull") 704 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 705 return 706 } 707 708 roundNumberStr := chi.URLParam(r, "round") 709 roundNumber, err := strconv.Atoi(roundNumberStr) 710 if err != nil || roundNumber >= len(pull.Submissions) { 711 http.Error(w, "bad round id", http.StatusBadRequest) 712 log.Println("failed to parse round id", err) 713 return 714 } 715 716 switch r.Method { 717 case http.MethodGet: 718 s.pages.PullNewCommentFragment(w, pages.PullNewCommentParams{ 719 LoggedInUser: user, 720 RepoInfo: f.RepoInfo(user), 721 Pull: pull, 722 RoundNumber: roundNumber, 723 }) 724 return 725 case http.MethodPost: 726 body := r.FormValue("body") 727 if body == "" { 728 s.pages.Notice(w, "pull", "Comment body is required") 729 return 730 } 731 732 // Start a transaction 733 tx, err := s.db.BeginTx(r.Context(), nil) 734 if err != nil { 735 log.Println("failed to start transaction", err) 736 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 737 return 738 } 739 defer tx.Rollback() 740 741 createdAt := time.Now().Format(time.RFC3339) 742 743 client, err := s.oauth.AuthorizedClient(r) 744 if err != nil { 745 log.Println("failed to get authorized client", err) 746 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 747 return 748 } 749 atResp, err := comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 750 Collection: tangled.RepoPullCommentNSID, 751 Repo: user.Did, 752 Rkey: tid.TID(), 753 Record: &lexutil.LexiconTypeDecoder{ 754 Val: &tangled.RepoPullComment{ 755 Pull: pull.AtUri().String(), 756 Body: body, 757 CreatedAt: createdAt, 758 }, 759 }, 760 }) 761 if err != nil { 762 log.Println("failed to create pull comment", err) 763 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 764 return 765 } 766 767 comment := &models.PullComment{ 768 OwnerDid: user.Did, 769 RepoAt: f.RepoAt().String(), 770 PullId: pull.PullId, 771 Body: body, 772 CommentAt: atResp.Uri, 773 SubmissionId: pull.Submissions[roundNumber].ID, 774 } 775 776 // Create the pull comment in the database with the commentAt field 777 commentId, err := db.NewPullComment(tx, comment) 778 if err != nil { 779 log.Println("failed to create pull comment", err) 780 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 781 return 782 } 783 784 // Commit the transaction 785 if err = tx.Commit(); err != nil { 786 log.Println("failed to commit transaction", err) 787 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 788 return 789 } 790 791 s.notifier.NewPullComment(r.Context(), comment) 792 793 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d#comment-%d", f.OwnerSlashRepo(), pull.PullId, commentId)) 794 return 795 } 796} 797 798func (s *Pulls) NewPull(w http.ResponseWriter, r *http.Request) { 799 user := s.oauth.GetUser(r) 800 f, err := s.repoResolver.Resolve(r) 801 if err != nil { 802 log.Println("failed to get repo and knot", err) 803 return 804 } 805 806 switch r.Method { 807 case http.MethodGet: 808 scheme := "http" 809 if !s.config.Core.Dev { 810 scheme = "https" 811 } 812 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 813 xrpcc := &indigoxrpc.Client{ 814 Host: host, 815 } 816 817 repo := fmt.Sprintf("%s/%s", f.OwnerDid(), f.Name) 818 xrpcBytes, err := tangled.RepoBranches(r.Context(), xrpcc, "", 0, repo) 819 if err != nil { 820 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 821 log.Println("failed to call XRPC repo.branches", xrpcerr) 822 s.pages.Error503(w) 823 return 824 } 825 log.Println("failed to fetch branches", err) 826 return 827 } 828 829 var result types.RepoBranchesResponse 830 if err := json.Unmarshal(xrpcBytes, &result); err != nil { 831 log.Println("failed to decode XRPC response", err) 832 s.pages.Error503(w) 833 return 834 } 835 836 // can be one of "patch", "branch" or "fork" 837 strategy := r.URL.Query().Get("strategy") 838 // ignored if strategy is "patch" 839 sourceBranch := r.URL.Query().Get("sourceBranch") 840 targetBranch := r.URL.Query().Get("targetBranch") 841 842 s.pages.RepoNewPull(w, pages.RepoNewPullParams{ 843 LoggedInUser: user, 844 RepoInfo: f.RepoInfo(user), 845 Branches: result.Branches, 846 Strategy: strategy, 847 SourceBranch: sourceBranch, 848 TargetBranch: targetBranch, 849 Title: r.URL.Query().Get("title"), 850 Body: r.URL.Query().Get("body"), 851 }) 852 853 case http.MethodPost: 854 title := r.FormValue("title") 855 body := r.FormValue("body") 856 targetBranch := r.FormValue("targetBranch") 857 fromFork := r.FormValue("fork") 858 sourceBranch := r.FormValue("sourceBranch") 859 patch := r.FormValue("patch") 860 861 if targetBranch == "" { 862 s.pages.Notice(w, "pull", "Target branch is required.") 863 return 864 } 865 866 // Determine PR type based on input parameters 867 isPushAllowed := f.RepoInfo(user).Roles.IsPushAllowed() 868 isBranchBased := isPushAllowed && sourceBranch != "" && fromFork == "" 869 isForkBased := fromFork != "" && sourceBranch != "" 870 isPatchBased := patch != "" && !isBranchBased && !isForkBased 871 isStacked := r.FormValue("isStacked") == "on" 872 873 if isPatchBased && !patchutil.IsFormatPatch(patch) { 874 if title == "" { 875 s.pages.Notice(w, "pull", "Title is required for git-diff patches.") 876 return 877 } 878 sanitizer := markup.NewSanitizer() 879 if st := strings.TrimSpace(sanitizer.SanitizeDescription(title)); (st) == "" { 880 s.pages.Notice(w, "pull", "Title is empty after HTML sanitization") 881 return 882 } 883 } 884 885 // Validate we have at least one valid PR creation method 886 if !isBranchBased && !isPatchBased && !isForkBased { 887 s.pages.Notice(w, "pull", "Neither source branch nor patch supplied.") 888 return 889 } 890 891 // Can't mix branch-based and patch-based approaches 892 if isBranchBased && patch != "" { 893 s.pages.Notice(w, "pull", "Cannot select both patch and source branch.") 894 return 895 } 896 897 // us, err := knotclient.NewUnsignedClient(f.Knot, s.config.Core.Dev) 898 // if err != nil { 899 // log.Printf("failed to create unsigned client to %s: %v", f.Knot, err) 900 // s.pages.Notice(w, "pull", "Failed to create a pull request. Try again later.") 901 // return 902 // } 903 904 // TODO: make capabilities an xrpc call 905 caps := struct { 906 PullRequests struct { 907 FormatPatch bool 908 BranchSubmissions bool 909 ForkSubmissions bool 910 PatchSubmissions bool 911 } 912 }{ 913 PullRequests: struct { 914 FormatPatch bool 915 BranchSubmissions bool 916 ForkSubmissions bool 917 PatchSubmissions bool 918 }{ 919 FormatPatch: true, 920 BranchSubmissions: true, 921 ForkSubmissions: true, 922 PatchSubmissions: true, 923 }, 924 } 925 926 // caps, err := us.Capabilities() 927 // if err != nil { 928 // log.Println("error fetching knot caps", f.Knot, err) 929 // s.pages.Notice(w, "pull", "Failed to create a pull request. Try again later.") 930 // return 931 // } 932 933 if !caps.PullRequests.FormatPatch { 934 s.pages.Notice(w, "pull", "This knot doesn't support format-patch. Unfortunately, there is no fallback for now.") 935 return 936 } 937 938 // Handle the PR creation based on the type 939 if isBranchBased { 940 if !caps.PullRequests.BranchSubmissions { 941 s.pages.Notice(w, "pull", "This knot doesn't support branch-based pull requests. Try another way?") 942 return 943 } 944 s.handleBranchBasedPull(w, r, f, user, title, body, targetBranch, sourceBranch, isStacked) 945 } else if isForkBased { 946 if !caps.PullRequests.ForkSubmissions { 947 s.pages.Notice(w, "pull", "This knot doesn't support fork-based pull requests. Try another way?") 948 return 949 } 950 s.handleForkBasedPull(w, r, f, user, fromFork, title, body, targetBranch, sourceBranch, isStacked) 951 } else if isPatchBased { 952 if !caps.PullRequests.PatchSubmissions { 953 s.pages.Notice(w, "pull", "This knot doesn't support patch-based pull requests. Send your patch over email.") 954 return 955 } 956 s.handlePatchBasedPull(w, r, f, user, title, body, targetBranch, patch, isStacked) 957 } 958 return 959 } 960} 961 962func (s *Pulls) handleBranchBasedPull( 963 w http.ResponseWriter, 964 r *http.Request, 965 f *reporesolver.ResolvedRepo, 966 user *oauth.User, 967 title, 968 body, 969 targetBranch, 970 sourceBranch string, 971 isStacked bool, 972) { 973 scheme := "http" 974 if !s.config.Core.Dev { 975 scheme = "https" 976 } 977 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 978 xrpcc := &indigoxrpc.Client{ 979 Host: host, 980 } 981 982 repo := fmt.Sprintf("%s/%s", f.OwnerDid(), f.Name) 983 xrpcBytes, err := tangled.RepoCompare(r.Context(), xrpcc, repo, targetBranch, sourceBranch) 984 if err != nil { 985 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 986 log.Println("failed to call XRPC repo.compare", xrpcerr) 987 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 988 return 989 } 990 log.Println("failed to compare", err) 991 s.pages.Notice(w, "pull", err.Error()) 992 return 993 } 994 995 var comparison types.RepoFormatPatchResponse 996 if err := json.Unmarshal(xrpcBytes, &comparison); err != nil { 997 log.Println("failed to decode XRPC compare response", err) 998 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 999 return 1000 } 1001 1002 sourceRev := comparison.Rev2 1003 patch := comparison.FormatPatchRaw 1004 combined := comparison.CombinedPatchRaw 1005 1006 if err := s.validator.ValidatePatch(&patch); err != nil { 1007 s.logger.Error("failed to validate patch", "err", err) 1008 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 1009 return 1010 } 1011 1012 pullSource := &models.PullSource{ 1013 Branch: sourceBranch, 1014 } 1015 recordPullSource := &tangled.RepoPull_Source{ 1016 Branch: sourceBranch, 1017 Sha: comparison.Rev2, 1018 } 1019 1020 s.createPullRequest(w, r, f, user, title, body, targetBranch, patch, combined, sourceRev, pullSource, recordPullSource, isStacked) 1021} 1022 1023func (s *Pulls) handlePatchBasedPull(w http.ResponseWriter, r *http.Request, f *reporesolver.ResolvedRepo, user *oauth.User, title, body, targetBranch, patch string, isStacked bool) { 1024 if err := s.validator.ValidatePatch(&patch); err != nil { 1025 s.logger.Error("patch validation failed", "err", err) 1026 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 1027 return 1028 } 1029 1030 s.createPullRequest(w, r, f, user, title, body, targetBranch, patch, "", "", nil, nil, isStacked) 1031} 1032 1033func (s *Pulls) handleForkBasedPull(w http.ResponseWriter, r *http.Request, f *reporesolver.ResolvedRepo, user *oauth.User, forkRepo string, title, body, targetBranch, sourceBranch string, isStacked bool) { 1034 repoString := strings.SplitN(forkRepo, "/", 2) 1035 forkOwnerDid := repoString[0] 1036 repoName := repoString[1] 1037 fork, err := db.GetForkByDid(s.db, forkOwnerDid, repoName) 1038 if errors.Is(err, sql.ErrNoRows) { 1039 s.pages.Notice(w, "pull", "No such fork.") 1040 return 1041 } else if err != nil { 1042 log.Println("failed to fetch fork:", err) 1043 s.pages.Notice(w, "pull", "Failed to fetch fork.") 1044 return 1045 } 1046 1047 client, err := s.oauth.ServiceClient( 1048 r, 1049 oauth.WithService(fork.Knot), 1050 oauth.WithLxm(tangled.RepoHiddenRefNSID), 1051 oauth.WithDev(s.config.Core.Dev), 1052 ) 1053 1054 resp, err := tangled.RepoHiddenRef( 1055 r.Context(), 1056 client, 1057 &tangled.RepoHiddenRef_Input{ 1058 ForkRef: sourceBranch, 1059 RemoteRef: targetBranch, 1060 Repo: fork.RepoAt().String(), 1061 }, 1062 ) 1063 if err := xrpcclient.HandleXrpcErr(err); err != nil { 1064 s.pages.Notice(w, "pull", err.Error()) 1065 return 1066 } 1067 1068 if !resp.Success { 1069 errorMsg := "Failed to create pull request" 1070 if resp.Error != nil { 1071 errorMsg = fmt.Sprintf("Failed to create pull request: %s", *resp.Error) 1072 } 1073 s.pages.Notice(w, "pull", errorMsg) 1074 return 1075 } 1076 1077 hiddenRef := fmt.Sprintf("hidden/%s/%s", sourceBranch, targetBranch) 1078 // We're now comparing the sourceBranch (on the fork) against the hiddenRef which is tracking 1079 // the targetBranch on the target repository. This code is a bit confusing, but here's an example: 1080 // hiddenRef: hidden/feature-1/main (on repo-fork) 1081 // targetBranch: main (on repo-1) 1082 // sourceBranch: feature-1 (on repo-fork) 1083 forkScheme := "http" 1084 if !s.config.Core.Dev { 1085 forkScheme = "https" 1086 } 1087 forkHost := fmt.Sprintf("%s://%s", forkScheme, fork.Knot) 1088 forkXrpcc := &indigoxrpc.Client{ 1089 Host: forkHost, 1090 } 1091 1092 forkRepoId := fmt.Sprintf("%s/%s", fork.Did, fork.Name) 1093 forkXrpcBytes, err := tangled.RepoCompare(r.Context(), forkXrpcc, forkRepoId, hiddenRef, sourceBranch) 1094 if err != nil { 1095 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1096 log.Println("failed to call XRPC repo.compare for fork", xrpcerr) 1097 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1098 return 1099 } 1100 log.Println("failed to compare across branches", err) 1101 s.pages.Notice(w, "pull", err.Error()) 1102 return 1103 } 1104 1105 var comparison types.RepoFormatPatchResponse 1106 if err := json.Unmarshal(forkXrpcBytes, &comparison); err != nil { 1107 log.Println("failed to decode XRPC compare response for fork", err) 1108 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1109 return 1110 } 1111 1112 sourceRev := comparison.Rev2 1113 patch := comparison.FormatPatchRaw 1114 combined := comparison.CombinedPatchRaw 1115 1116 if err := s.validator.ValidatePatch(&patch); err != nil { 1117 s.logger.Error("failed to validate patch", "err", err) 1118 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 1119 return 1120 } 1121 1122 forkAtUri := fork.RepoAt() 1123 forkAtUriStr := forkAtUri.String() 1124 1125 pullSource := &models.PullSource{ 1126 Branch: sourceBranch, 1127 RepoAt: &forkAtUri, 1128 } 1129 recordPullSource := &tangled.RepoPull_Source{ 1130 Branch: sourceBranch, 1131 Repo: &forkAtUriStr, 1132 Sha: sourceRev, 1133 } 1134 1135 s.createPullRequest(w, r, f, user, title, body, targetBranch, patch, combined, sourceRev, pullSource, recordPullSource, isStacked) 1136} 1137 1138func (s *Pulls) createPullRequest( 1139 w http.ResponseWriter, 1140 r *http.Request, 1141 f *reporesolver.ResolvedRepo, 1142 user *oauth.User, 1143 title, body, targetBranch string, 1144 patch string, 1145 combined string, 1146 sourceRev string, 1147 pullSource *models.PullSource, 1148 recordPullSource *tangled.RepoPull_Source, 1149 isStacked bool, 1150) { 1151 if isStacked { 1152 // creates a series of PRs, each linking to the previous, identified by jj's change-id 1153 s.createStackedPullRequest( 1154 w, 1155 r, 1156 f, 1157 user, 1158 targetBranch, 1159 patch, 1160 sourceRev, 1161 pullSource, 1162 ) 1163 return 1164 } 1165 1166 client, err := s.oauth.AuthorizedClient(r) 1167 if err != nil { 1168 log.Println("failed to get authorized client", err) 1169 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1170 return 1171 } 1172 1173 tx, err := s.db.BeginTx(r.Context(), nil) 1174 if err != nil { 1175 log.Println("failed to start tx") 1176 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1177 return 1178 } 1179 defer tx.Rollback() 1180 1181 // We've already checked earlier if it's diff-based and title is empty, 1182 // so if it's still empty now, it's intentionally skipped owing to format-patch. 1183 if title == "" || body == "" { 1184 formatPatches, err := patchutil.ExtractPatches(patch) 1185 if err != nil { 1186 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to extract patches: %v", err)) 1187 return 1188 } 1189 if len(formatPatches) == 0 { 1190 s.pages.Notice(w, "pull", "No patches found in the supplied format-patch.") 1191 return 1192 } 1193 1194 if title == "" { 1195 title = formatPatches[0].Title 1196 } 1197 if body == "" { 1198 body = formatPatches[0].Body 1199 } 1200 } 1201 1202 rkey := tid.TID() 1203 initialSubmission := models.PullSubmission{ 1204 Patch: patch, 1205 Combined: combined, 1206 SourceRev: sourceRev, 1207 } 1208 pull := &models.Pull{ 1209 Title: title, 1210 Body: body, 1211 TargetBranch: targetBranch, 1212 OwnerDid: user.Did, 1213 RepoAt: f.RepoAt(), 1214 Rkey: rkey, 1215 Submissions: []*models.PullSubmission{ 1216 &initialSubmission, 1217 }, 1218 PullSource: pullSource, 1219 } 1220 err = db.NewPull(tx, pull) 1221 if err != nil { 1222 log.Println("failed to create pull request", err) 1223 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1224 return 1225 } 1226 pullId, err := db.NextPullId(tx, f.RepoAt()) 1227 if err != nil { 1228 log.Println("failed to get pull id", err) 1229 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1230 return 1231 } 1232 1233 _, err = comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 1234 Collection: tangled.RepoPullNSID, 1235 Repo: user.Did, 1236 Rkey: rkey, 1237 Record: &lexutil.LexiconTypeDecoder{ 1238 Val: &tangled.RepoPull{ 1239 Title: title, 1240 Target: &tangled.RepoPull_Target{ 1241 Repo: string(f.RepoAt()), 1242 Branch: targetBranch, 1243 }, 1244 Patch: patch, 1245 Source: recordPullSource, 1246 CreatedAt: time.Now().Format(time.RFC3339), 1247 }, 1248 }, 1249 }) 1250 if err != nil { 1251 log.Println("failed to create pull request", err) 1252 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1253 return 1254 } 1255 1256 if err = tx.Commit(); err != nil { 1257 log.Println("failed to create pull request", err) 1258 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1259 return 1260 } 1261 1262 s.notifier.NewPull(r.Context(), pull) 1263 1264 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", f.OwnerSlashRepo(), pullId)) 1265} 1266 1267func (s *Pulls) createStackedPullRequest( 1268 w http.ResponseWriter, 1269 r *http.Request, 1270 f *reporesolver.ResolvedRepo, 1271 user *oauth.User, 1272 targetBranch string, 1273 patch string, 1274 sourceRev string, 1275 pullSource *models.PullSource, 1276) { 1277 // run some necessary checks for stacked-prs first 1278 1279 // must be branch or fork based 1280 if sourceRev == "" { 1281 log.Println("stacked PR from patch-based pull") 1282 s.pages.Notice(w, "pull", "Stacking is only supported on branch and fork based pull-requests.") 1283 return 1284 } 1285 1286 formatPatches, err := patchutil.ExtractPatches(patch) 1287 if err != nil { 1288 log.Println("failed to extract patches", err) 1289 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to extract patches: %v", err)) 1290 return 1291 } 1292 1293 // must have atleast 1 patch to begin with 1294 if len(formatPatches) == 0 { 1295 log.Println("empty patches") 1296 s.pages.Notice(w, "pull", "No patches found in the generated format-patch.") 1297 return 1298 } 1299 1300 // build a stack out of this patch 1301 stackId := uuid.New() 1302 stack, err := newStack(f, user, targetBranch, patch, pullSource, stackId.String()) 1303 if err != nil { 1304 log.Println("failed to create stack", err) 1305 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to create stack: %v", err)) 1306 return 1307 } 1308 1309 client, err := s.oauth.AuthorizedClient(r) 1310 if err != nil { 1311 log.Println("failed to get authorized client", err) 1312 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1313 return 1314 } 1315 1316 // apply all record creations at once 1317 var writes []*comatproto.RepoApplyWrites_Input_Writes_Elem 1318 for _, p := range stack { 1319 record := p.AsRecord() 1320 write := comatproto.RepoApplyWrites_Input_Writes_Elem{ 1321 RepoApplyWrites_Create: &comatproto.RepoApplyWrites_Create{ 1322 Collection: tangled.RepoPullNSID, 1323 Rkey: &p.Rkey, 1324 Value: &lexutil.LexiconTypeDecoder{ 1325 Val: &record, 1326 }, 1327 }, 1328 } 1329 writes = append(writes, &write) 1330 } 1331 _, err = comatproto.RepoApplyWrites(r.Context(), client, &comatproto.RepoApplyWrites_Input{ 1332 Repo: user.Did, 1333 Writes: writes, 1334 }) 1335 if err != nil { 1336 log.Println("failed to create stacked pull request", err) 1337 s.pages.Notice(w, "pull", "Failed to create stacked pull request. Try again later.") 1338 return 1339 } 1340 1341 // create all pulls at once 1342 tx, err := s.db.BeginTx(r.Context(), nil) 1343 if err != nil { 1344 log.Println("failed to start tx") 1345 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1346 return 1347 } 1348 defer tx.Rollback() 1349 1350 for _, p := range stack { 1351 err = db.NewPull(tx, p) 1352 if err != nil { 1353 log.Println("failed to create pull request", err) 1354 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1355 return 1356 } 1357 } 1358 1359 if err = tx.Commit(); err != nil { 1360 log.Println("failed to create pull request", err) 1361 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1362 return 1363 } 1364 1365 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls", f.OwnerSlashRepo())) 1366} 1367 1368func (s *Pulls) ValidatePatch(w http.ResponseWriter, r *http.Request) { 1369 _, err := s.repoResolver.Resolve(r) 1370 if err != nil { 1371 log.Println("failed to get repo and knot", err) 1372 return 1373 } 1374 1375 patch := r.FormValue("patch") 1376 if patch == "" { 1377 s.pages.Notice(w, "patch-error", "Patch is required.") 1378 return 1379 } 1380 1381 if err := s.validator.ValidatePatch(&patch); err != nil { 1382 s.logger.Error("faield to validate patch", "err", err) 1383 s.pages.Notice(w, "patch-error", "Invalid patch format. Please provide a valid git diff or format-patch.") 1384 return 1385 } 1386 1387 if patchutil.IsFormatPatch(patch) { 1388 s.pages.Notice(w, "patch-preview", "git-format-patch detected. Title and description are optional; if left out, they will be extracted from the first commit.") 1389 } else { 1390 s.pages.Notice(w, "patch-preview", "Regular git-diff detected. Please provide a title and description.") 1391 } 1392} 1393 1394func (s *Pulls) PatchUploadFragment(w http.ResponseWriter, r *http.Request) { 1395 user := s.oauth.GetUser(r) 1396 f, err := s.repoResolver.Resolve(r) 1397 if err != nil { 1398 log.Println("failed to get repo and knot", err) 1399 return 1400 } 1401 1402 s.pages.PullPatchUploadFragment(w, pages.PullPatchUploadParams{ 1403 RepoInfo: f.RepoInfo(user), 1404 }) 1405} 1406 1407func (s *Pulls) CompareBranchesFragment(w http.ResponseWriter, r *http.Request) { 1408 user := s.oauth.GetUser(r) 1409 f, err := s.repoResolver.Resolve(r) 1410 if err != nil { 1411 log.Println("failed to get repo and knot", err) 1412 return 1413 } 1414 1415 scheme := "http" 1416 if !s.config.Core.Dev { 1417 scheme = "https" 1418 } 1419 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 1420 xrpcc := &indigoxrpc.Client{ 1421 Host: host, 1422 } 1423 1424 repo := fmt.Sprintf("%s/%s", f.OwnerDid(), f.Name) 1425 xrpcBytes, err := tangled.RepoBranches(r.Context(), xrpcc, "", 0, repo) 1426 if err != nil { 1427 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1428 log.Println("failed to call XRPC repo.branches", xrpcerr) 1429 s.pages.Error503(w) 1430 return 1431 } 1432 log.Println("failed to fetch branches", err) 1433 return 1434 } 1435 1436 var result types.RepoBranchesResponse 1437 if err := json.Unmarshal(xrpcBytes, &result); err != nil { 1438 log.Println("failed to decode XRPC response", err) 1439 s.pages.Error503(w) 1440 return 1441 } 1442 1443 branches := result.Branches 1444 sort.Slice(branches, func(i int, j int) bool { 1445 return branches[i].Commit.Committer.When.After(branches[j].Commit.Committer.When) 1446 }) 1447 1448 withoutDefault := []types.Branch{} 1449 for _, b := range branches { 1450 if b.IsDefault { 1451 continue 1452 } 1453 withoutDefault = append(withoutDefault, b) 1454 } 1455 1456 s.pages.PullCompareBranchesFragment(w, pages.PullCompareBranchesParams{ 1457 RepoInfo: f.RepoInfo(user), 1458 Branches: withoutDefault, 1459 }) 1460} 1461 1462func (s *Pulls) CompareForksFragment(w http.ResponseWriter, r *http.Request) { 1463 user := s.oauth.GetUser(r) 1464 f, err := s.repoResolver.Resolve(r) 1465 if err != nil { 1466 log.Println("failed to get repo and knot", err) 1467 return 1468 } 1469 1470 forks, err := db.GetForksByDid(s.db, user.Did) 1471 if err != nil { 1472 log.Println("failed to get forks", err) 1473 return 1474 } 1475 1476 s.pages.PullCompareForkFragment(w, pages.PullCompareForkParams{ 1477 RepoInfo: f.RepoInfo(user), 1478 Forks: forks, 1479 Selected: r.URL.Query().Get("fork"), 1480 }) 1481} 1482 1483func (s *Pulls) CompareForksBranchesFragment(w http.ResponseWriter, r *http.Request) { 1484 user := s.oauth.GetUser(r) 1485 1486 f, err := s.repoResolver.Resolve(r) 1487 if err != nil { 1488 log.Println("failed to get repo and knot", err) 1489 return 1490 } 1491 1492 forkVal := r.URL.Query().Get("fork") 1493 repoString := strings.SplitN(forkVal, "/", 2) 1494 forkOwnerDid := repoString[0] 1495 forkName := repoString[1] 1496 // fork repo 1497 repo, err := db.GetRepo( 1498 s.db, 1499 db.FilterEq("did", forkOwnerDid), 1500 db.FilterEq("name", forkName), 1501 ) 1502 if err != nil { 1503 log.Println("failed to get repo", "did", forkOwnerDid, "name", forkName, "err", err) 1504 return 1505 } 1506 1507 sourceScheme := "http" 1508 if !s.config.Core.Dev { 1509 sourceScheme = "https" 1510 } 1511 sourceHost := fmt.Sprintf("%s://%s", sourceScheme, repo.Knot) 1512 sourceXrpcc := &indigoxrpc.Client{ 1513 Host: sourceHost, 1514 } 1515 1516 sourceRepo := fmt.Sprintf("%s/%s", forkOwnerDid, repo.Name) 1517 sourceXrpcBytes, err := tangled.RepoBranches(r.Context(), sourceXrpcc, "", 0, sourceRepo) 1518 if err != nil { 1519 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1520 log.Println("failed to call XRPC repo.branches for source", xrpcerr) 1521 s.pages.Error503(w) 1522 return 1523 } 1524 log.Println("failed to fetch source branches", err) 1525 return 1526 } 1527 1528 // Decode source branches 1529 var sourceBranches types.RepoBranchesResponse 1530 if err := json.Unmarshal(sourceXrpcBytes, &sourceBranches); err != nil { 1531 log.Println("failed to decode source branches XRPC response", err) 1532 s.pages.Error503(w) 1533 return 1534 } 1535 1536 targetScheme := "http" 1537 if !s.config.Core.Dev { 1538 targetScheme = "https" 1539 } 1540 targetHost := fmt.Sprintf("%s://%s", targetScheme, f.Knot) 1541 targetXrpcc := &indigoxrpc.Client{ 1542 Host: targetHost, 1543 } 1544 1545 targetRepo := fmt.Sprintf("%s/%s", f.OwnerDid(), f.Name) 1546 targetXrpcBytes, err := tangled.RepoBranches(r.Context(), targetXrpcc, "", 0, targetRepo) 1547 if err != nil { 1548 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1549 log.Println("failed to call XRPC repo.branches for target", xrpcerr) 1550 s.pages.Error503(w) 1551 return 1552 } 1553 log.Println("failed to fetch target branches", err) 1554 return 1555 } 1556 1557 // Decode target branches 1558 var targetBranches types.RepoBranchesResponse 1559 if err := json.Unmarshal(targetXrpcBytes, &targetBranches); err != nil { 1560 log.Println("failed to decode target branches XRPC response", err) 1561 s.pages.Error503(w) 1562 return 1563 } 1564 1565 sort.Slice(sourceBranches.Branches, func(i int, j int) bool { 1566 return sourceBranches.Branches[i].Commit.Committer.When.After(sourceBranches.Branches[j].Commit.Committer.When) 1567 }) 1568 1569 s.pages.PullCompareForkBranchesFragment(w, pages.PullCompareForkBranchesParams{ 1570 RepoInfo: f.RepoInfo(user), 1571 SourceBranches: sourceBranches.Branches, 1572 TargetBranches: targetBranches.Branches, 1573 }) 1574} 1575 1576func (s *Pulls) ResubmitPull(w http.ResponseWriter, r *http.Request) { 1577 user := s.oauth.GetUser(r) 1578 f, err := s.repoResolver.Resolve(r) 1579 if err != nil { 1580 log.Println("failed to get repo and knot", err) 1581 return 1582 } 1583 1584 pull, ok := r.Context().Value("pull").(*models.Pull) 1585 if !ok { 1586 log.Println("failed to get pull") 1587 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 1588 return 1589 } 1590 1591 switch r.Method { 1592 case http.MethodGet: 1593 s.pages.PullResubmitFragment(w, pages.PullResubmitParams{ 1594 RepoInfo: f.RepoInfo(user), 1595 Pull: pull, 1596 }) 1597 return 1598 case http.MethodPost: 1599 if pull.IsPatchBased() { 1600 s.resubmitPatch(w, r) 1601 return 1602 } else if pull.IsBranchBased() { 1603 s.resubmitBranch(w, r) 1604 return 1605 } else if pull.IsForkBased() { 1606 s.resubmitFork(w, r) 1607 return 1608 } 1609 } 1610} 1611 1612func (s *Pulls) resubmitPatch(w http.ResponseWriter, r *http.Request) { 1613 user := s.oauth.GetUser(r) 1614 1615 pull, ok := r.Context().Value("pull").(*models.Pull) 1616 if !ok { 1617 log.Println("failed to get pull") 1618 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 1619 return 1620 } 1621 1622 f, err := s.repoResolver.Resolve(r) 1623 if err != nil { 1624 log.Println("failed to get repo and knot", err) 1625 return 1626 } 1627 1628 if user.Did != pull.OwnerDid { 1629 log.Println("unauthorized user") 1630 w.WriteHeader(http.StatusUnauthorized) 1631 return 1632 } 1633 1634 patch := r.FormValue("patch") 1635 1636 s.resubmitPullHelper(w, r, f, user, pull, patch, "", "") 1637} 1638 1639func (s *Pulls) resubmitBranch(w http.ResponseWriter, r *http.Request) { 1640 user := s.oauth.GetUser(r) 1641 1642 pull, ok := r.Context().Value("pull").(*models.Pull) 1643 if !ok { 1644 log.Println("failed to get pull") 1645 s.pages.Notice(w, "resubmit-error", "Failed to edit patch. Try again later.") 1646 return 1647 } 1648 1649 f, err := s.repoResolver.Resolve(r) 1650 if err != nil { 1651 log.Println("failed to get repo and knot", err) 1652 return 1653 } 1654 1655 if user.Did != pull.OwnerDid { 1656 log.Println("unauthorized user") 1657 w.WriteHeader(http.StatusUnauthorized) 1658 return 1659 } 1660 1661 if !f.RepoInfo(user).Roles.IsPushAllowed() { 1662 log.Println("unauthorized user") 1663 w.WriteHeader(http.StatusUnauthorized) 1664 return 1665 } 1666 1667 scheme := "http" 1668 if !s.config.Core.Dev { 1669 scheme = "https" 1670 } 1671 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 1672 xrpcc := &indigoxrpc.Client{ 1673 Host: host, 1674 } 1675 1676 repo := fmt.Sprintf("%s/%s", f.OwnerDid(), f.Name) 1677 xrpcBytes, err := tangled.RepoCompare(r.Context(), xrpcc, repo, pull.TargetBranch, pull.PullSource.Branch) 1678 if err != nil { 1679 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1680 log.Println("failed to call XRPC repo.compare", xrpcerr) 1681 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1682 return 1683 } 1684 log.Printf("compare request failed: %s", err) 1685 s.pages.Notice(w, "resubmit-error", err.Error()) 1686 return 1687 } 1688 1689 var comparison types.RepoFormatPatchResponse 1690 if err := json.Unmarshal(xrpcBytes, &comparison); err != nil { 1691 log.Println("failed to decode XRPC compare response", err) 1692 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1693 return 1694 } 1695 1696 sourceRev := comparison.Rev2 1697 patch := comparison.FormatPatchRaw 1698 combined := comparison.CombinedPatchRaw 1699 1700 s.resubmitPullHelper(w, r, f, user, pull, patch, combined, sourceRev) 1701} 1702 1703func (s *Pulls) resubmitFork(w http.ResponseWriter, r *http.Request) { 1704 user := s.oauth.GetUser(r) 1705 1706 pull, ok := r.Context().Value("pull").(*models.Pull) 1707 if !ok { 1708 log.Println("failed to get pull") 1709 s.pages.Notice(w, "resubmit-error", "Failed to edit patch. Try again later.") 1710 return 1711 } 1712 1713 f, err := s.repoResolver.Resolve(r) 1714 if err != nil { 1715 log.Println("failed to get repo and knot", err) 1716 return 1717 } 1718 1719 if user.Did != pull.OwnerDid { 1720 log.Println("unauthorized user") 1721 w.WriteHeader(http.StatusUnauthorized) 1722 return 1723 } 1724 1725 forkRepo, err := db.GetRepoByAtUri(s.db, pull.PullSource.RepoAt.String()) 1726 if err != nil { 1727 log.Println("failed to get source repo", err) 1728 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1729 return 1730 } 1731 1732 // update the hidden tracking branch to latest 1733 client, err := s.oauth.ServiceClient( 1734 r, 1735 oauth.WithService(forkRepo.Knot), 1736 oauth.WithLxm(tangled.RepoHiddenRefNSID), 1737 oauth.WithDev(s.config.Core.Dev), 1738 ) 1739 if err != nil { 1740 log.Printf("failed to connect to knot server: %v", err) 1741 return 1742 } 1743 1744 resp, err := tangled.RepoHiddenRef( 1745 r.Context(), 1746 client, 1747 &tangled.RepoHiddenRef_Input{ 1748 ForkRef: pull.PullSource.Branch, 1749 RemoteRef: pull.TargetBranch, 1750 Repo: forkRepo.RepoAt().String(), 1751 }, 1752 ) 1753 if err := xrpcclient.HandleXrpcErr(err); err != nil { 1754 s.pages.Notice(w, "resubmit-error", err.Error()) 1755 return 1756 } 1757 if !resp.Success { 1758 log.Println("Failed to update tracking ref.", "err", resp.Error) 1759 s.pages.Notice(w, "resubmit-error", "Failed to update tracking ref.") 1760 return 1761 } 1762 1763 hiddenRef := fmt.Sprintf("hidden/%s/%s", pull.PullSource.Branch, pull.TargetBranch) 1764 // extract patch by performing compare 1765 forkScheme := "http" 1766 if !s.config.Core.Dev { 1767 forkScheme = "https" 1768 } 1769 forkHost := fmt.Sprintf("%s://%s", forkScheme, forkRepo.Knot) 1770 forkRepoId := fmt.Sprintf("%s/%s", forkRepo.Did, forkRepo.Name) 1771 forkXrpcBytes, err := tangled.RepoCompare(r.Context(), &indigoxrpc.Client{Host: forkHost}, forkRepoId, hiddenRef, pull.PullSource.Branch) 1772 if err != nil { 1773 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1774 log.Println("failed to call XRPC repo.compare for fork", xrpcerr) 1775 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1776 return 1777 } 1778 log.Printf("failed to compare branches: %s", err) 1779 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1780 return 1781 } 1782 1783 var forkComparison types.RepoFormatPatchResponse 1784 if err := json.Unmarshal(forkXrpcBytes, &forkComparison); err != nil { 1785 log.Println("failed to decode XRPC compare response for fork", err) 1786 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1787 return 1788 } 1789 1790 // Use the fork comparison we already made 1791 comparison := forkComparison 1792 1793 sourceRev := comparison.Rev2 1794 patch := comparison.FormatPatchRaw 1795 combined := comparison.CombinedPatchRaw 1796 1797 s.resubmitPullHelper(w, r, f, user, pull, patch, combined, sourceRev) 1798} 1799 1800func (s *Pulls) resubmitPullHelper( 1801 w http.ResponseWriter, 1802 r *http.Request, 1803 f *reporesolver.ResolvedRepo, 1804 user *oauth.User, 1805 pull *models.Pull, 1806 patch string, 1807 combined string, 1808 sourceRev string, 1809) { 1810 if pull.IsStacked() { 1811 log.Println("resubmitting stacked PR") 1812 s.resubmitStackedPullHelper(w, r, f, user, pull, patch, pull.StackId) 1813 return 1814 } 1815 1816 if err := s.validator.ValidatePatch(&patch); err != nil { 1817 s.pages.Notice(w, "resubmit-error", err.Error()) 1818 return 1819 } 1820 1821 if patch == pull.LatestPatch() { 1822 s.pages.Notice(w, "resubmit-error", "Patch is identical to previous submission.") 1823 return 1824 } 1825 1826 // validate sourceRev if branch/fork based 1827 if pull.IsBranchBased() || pull.IsForkBased() { 1828 if sourceRev == pull.LatestSha() { 1829 s.pages.Notice(w, "resubmit-error", "This branch has not changed since the last submission.") 1830 return 1831 } 1832 } 1833 1834 tx, err := s.db.BeginTx(r.Context(), nil) 1835 if err != nil { 1836 log.Println("failed to start tx") 1837 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1838 return 1839 } 1840 defer tx.Rollback() 1841 1842 pullAt := pull.AtUri() 1843 newRoundNumber := len(pull.Submissions) 1844 newPatch := patch 1845 newSourceRev := sourceRev 1846 combinedPatch := combined 1847 err = db.ResubmitPull(tx, pullAt, newRoundNumber, newPatch, combinedPatch, newSourceRev) 1848 if err != nil { 1849 log.Println("failed to create pull request", err) 1850 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1851 return 1852 } 1853 client, err := s.oauth.AuthorizedClient(r) 1854 if err != nil { 1855 log.Println("failed to authorize client") 1856 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1857 return 1858 } 1859 1860 ex, err := comatproto.RepoGetRecord(r.Context(), client, "", tangled.RepoPullNSID, user.Did, pull.Rkey) 1861 if err != nil { 1862 // failed to get record 1863 s.pages.Notice(w, "resubmit-error", "Failed to update pull, no record found on PDS.") 1864 return 1865 } 1866 1867 var recordPullSource *tangled.RepoPull_Source 1868 if pull.IsBranchBased() { 1869 recordPullSource = &tangled.RepoPull_Source{ 1870 Branch: pull.PullSource.Branch, 1871 Sha: sourceRev, 1872 } 1873 } 1874 if pull.IsForkBased() { 1875 repoAt := pull.PullSource.RepoAt.String() 1876 recordPullSource = &tangled.RepoPull_Source{ 1877 Branch: pull.PullSource.Branch, 1878 Repo: &repoAt, 1879 Sha: sourceRev, 1880 } 1881 } 1882 1883 _, err = comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 1884 Collection: tangled.RepoPullNSID, 1885 Repo: user.Did, 1886 Rkey: pull.Rkey, 1887 SwapRecord: ex.Cid, 1888 Record: &lexutil.LexiconTypeDecoder{ 1889 Val: &tangled.RepoPull{ 1890 Title: pull.Title, 1891 Target: &tangled.RepoPull_Target{ 1892 Repo: string(f.RepoAt()), 1893 Branch: pull.TargetBranch, 1894 }, 1895 Patch: patch, // new patch 1896 Source: recordPullSource, 1897 CreatedAt: time.Now().Format(time.RFC3339), 1898 }, 1899 }, 1900 }) 1901 if err != nil { 1902 log.Println("failed to update record", err) 1903 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 1904 return 1905 } 1906 1907 if err = tx.Commit(); err != nil { 1908 log.Println("failed to commit transaction", err) 1909 s.pages.Notice(w, "resubmit-error", "Failed to resubmit pull.") 1910 return 1911 } 1912 1913 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", f.OwnerSlashRepo(), pull.PullId)) 1914} 1915 1916func (s *Pulls) resubmitStackedPullHelper( 1917 w http.ResponseWriter, 1918 r *http.Request, 1919 f *reporesolver.ResolvedRepo, 1920 user *oauth.User, 1921 pull *models.Pull, 1922 patch string, 1923 stackId string, 1924) { 1925 targetBranch := pull.TargetBranch 1926 1927 origStack, _ := r.Context().Value("stack").(models.Stack) 1928 newStack, err := newStack(f, user, targetBranch, patch, pull.PullSource, stackId) 1929 if err != nil { 1930 log.Println("failed to create resubmitted stack", err) 1931 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 1932 return 1933 } 1934 1935 // find the diff between the stacks, first, map them by changeId 1936 origById := make(map[string]*models.Pull) 1937 newById := make(map[string]*models.Pull) 1938 for _, p := range origStack { 1939 origById[p.ChangeId] = p 1940 } 1941 for _, p := range newStack { 1942 newById[p.ChangeId] = p 1943 } 1944 1945 // commits that got deleted: corresponding pull is closed 1946 // commits that got added: new pull is created 1947 // commits that got updated: corresponding pull is resubmitted & new round begins 1948 additions := make(map[string]*models.Pull) 1949 deletions := make(map[string]*models.Pull) 1950 updated := make(map[string]struct{}) 1951 1952 // pulls in orignal stack but not in new one 1953 for _, op := range origStack { 1954 if _, ok := newById[op.ChangeId]; !ok { 1955 deletions[op.ChangeId] = op 1956 } 1957 } 1958 1959 // pulls in new stack but not in original one 1960 for _, np := range newStack { 1961 if _, ok := origById[np.ChangeId]; !ok { 1962 additions[np.ChangeId] = np 1963 } 1964 } 1965 1966 // NOTE: this loop can be written in any of above blocks, 1967 // but is written separately in the interest of simpler code 1968 for _, np := range newStack { 1969 if op, ok := origById[np.ChangeId]; ok { 1970 // pull exists in both stacks 1971 updated[op.ChangeId] = struct{}{} 1972 } 1973 } 1974 1975 tx, err := s.db.Begin() 1976 if err != nil { 1977 log.Println("failed to start transaction", err) 1978 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 1979 return 1980 } 1981 defer tx.Rollback() 1982 1983 // pds updates to make 1984 var writes []*comatproto.RepoApplyWrites_Input_Writes_Elem 1985 1986 // deleted pulls are marked as deleted in the DB 1987 for _, p := range deletions { 1988 // do not do delete already merged PRs 1989 if p.State == models.PullMerged { 1990 continue 1991 } 1992 1993 err := db.DeletePull(tx, p.RepoAt, p.PullId) 1994 if err != nil { 1995 log.Println("failed to delete pull", err, p.PullId) 1996 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 1997 return 1998 } 1999 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 2000 RepoApplyWrites_Delete: &comatproto.RepoApplyWrites_Delete{ 2001 Collection: tangled.RepoPullNSID, 2002 Rkey: p.Rkey, 2003 }, 2004 }) 2005 } 2006 2007 // new pulls are created 2008 for _, p := range additions { 2009 err := db.NewPull(tx, p) 2010 if err != nil { 2011 log.Println("failed to create pull", err, p.PullId) 2012 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2013 return 2014 } 2015 2016 record := p.AsRecord() 2017 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 2018 RepoApplyWrites_Create: &comatproto.RepoApplyWrites_Create{ 2019 Collection: tangled.RepoPullNSID, 2020 Rkey: &p.Rkey, 2021 Value: &lexutil.LexiconTypeDecoder{ 2022 Val: &record, 2023 }, 2024 }, 2025 }) 2026 } 2027 2028 // updated pulls are, well, updated; to start a new round 2029 for id := range updated { 2030 op, _ := origById[id] 2031 np, _ := newById[id] 2032 2033 // do not update already merged PRs 2034 if op.State == models.PullMerged { 2035 continue 2036 } 2037 2038 // resubmit the new pull 2039 pullAt := op.AtUri() 2040 newRoundNumber := len(op.Submissions) 2041 newPatch := np.LatestPatch() 2042 combinedPatch := np.LatestSubmission().Combined 2043 newSourceRev := np.LatestSha() 2044 err := db.ResubmitPull(tx, pullAt, newRoundNumber, newPatch, combinedPatch, newSourceRev) 2045 if err != nil { 2046 log.Println("failed to update pull", err, op.PullId) 2047 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2048 return 2049 } 2050 2051 record := np.AsRecord() 2052 2053 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 2054 RepoApplyWrites_Update: &comatproto.RepoApplyWrites_Update{ 2055 Collection: tangled.RepoPullNSID, 2056 Rkey: op.Rkey, 2057 Value: &lexutil.LexiconTypeDecoder{ 2058 Val: &record, 2059 }, 2060 }, 2061 }) 2062 } 2063 2064 // update parent-change-id relations for the entire stack 2065 for _, p := range newStack { 2066 err := db.SetPullParentChangeId( 2067 tx, 2068 p.ParentChangeId, 2069 // these should be enough filters to be unique per-stack 2070 db.FilterEq("repo_at", p.RepoAt.String()), 2071 db.FilterEq("owner_did", p.OwnerDid), 2072 db.FilterEq("change_id", p.ChangeId), 2073 ) 2074 2075 if err != nil { 2076 log.Println("failed to update pull", err, p.PullId) 2077 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2078 return 2079 } 2080 } 2081 2082 err = tx.Commit() 2083 if err != nil { 2084 log.Println("failed to resubmit pull", err) 2085 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2086 return 2087 } 2088 2089 client, err := s.oauth.AuthorizedClient(r) 2090 if err != nil { 2091 log.Println("failed to authorize client") 2092 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 2093 return 2094 } 2095 2096 _, err = comatproto.RepoApplyWrites(r.Context(), client, &comatproto.RepoApplyWrites_Input{ 2097 Repo: user.Did, 2098 Writes: writes, 2099 }) 2100 if err != nil { 2101 log.Println("failed to create stacked pull request", err) 2102 s.pages.Notice(w, "pull", "Failed to create stacked pull request. Try again later.") 2103 return 2104 } 2105 2106 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", f.OwnerSlashRepo(), pull.PullId)) 2107} 2108 2109func (s *Pulls) MergePull(w http.ResponseWriter, r *http.Request) { 2110 user := s.oauth.GetUser(r) 2111 f, err := s.repoResolver.Resolve(r) 2112 if err != nil { 2113 log.Println("failed to resolve repo:", err) 2114 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2115 return 2116 } 2117 2118 pull, ok := r.Context().Value("pull").(*models.Pull) 2119 if !ok { 2120 log.Println("failed to get pull") 2121 s.pages.Notice(w, "pull-merge-error", "Failed to merge patch. Try again later.") 2122 return 2123 } 2124 2125 var pullsToMerge models.Stack 2126 pullsToMerge = append(pullsToMerge, pull) 2127 if pull.IsStacked() { 2128 stack, ok := r.Context().Value("stack").(models.Stack) 2129 if !ok { 2130 log.Println("failed to get stack") 2131 s.pages.Notice(w, "pull-merge-error", "Failed to merge patch. Try again later.") 2132 return 2133 } 2134 2135 // combine patches of substack 2136 subStack := stack.StrictlyBelow(pull) 2137 // collect the portion of the stack that is mergeable 2138 mergeable := subStack.Mergeable() 2139 // add to total patch 2140 pullsToMerge = append(pullsToMerge, mergeable...) 2141 } 2142 2143 patch := pullsToMerge.CombinedPatch() 2144 2145 ident, err := s.idResolver.ResolveIdent(r.Context(), pull.OwnerDid) 2146 if err != nil { 2147 log.Printf("resolving identity: %s", err) 2148 w.WriteHeader(http.StatusNotFound) 2149 return 2150 } 2151 2152 email, err := db.GetPrimaryEmail(s.db, pull.OwnerDid) 2153 if err != nil { 2154 log.Printf("failed to get primary email: %s", err) 2155 } 2156 2157 authorName := ident.Handle.String() 2158 mergeInput := &tangled.RepoMerge_Input{ 2159 Did: f.OwnerDid(), 2160 Name: f.Name, 2161 Branch: pull.TargetBranch, 2162 Patch: patch, 2163 CommitMessage: &pull.Title, 2164 AuthorName: &authorName, 2165 } 2166 2167 if pull.Body != "" { 2168 mergeInput.CommitBody = &pull.Body 2169 } 2170 2171 if email.Address != "" { 2172 mergeInput.AuthorEmail = &email.Address 2173 } 2174 2175 client, err := s.oauth.ServiceClient( 2176 r, 2177 oauth.WithService(f.Knot), 2178 oauth.WithLxm(tangled.RepoMergeNSID), 2179 oauth.WithDev(s.config.Core.Dev), 2180 ) 2181 if err != nil { 2182 log.Printf("failed to connect to knot server: %v", err) 2183 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2184 return 2185 } 2186 2187 err = tangled.RepoMerge(r.Context(), client, mergeInput) 2188 if err := xrpcclient.HandleXrpcErr(err); err != nil { 2189 s.pages.Notice(w, "pull-merge-error", err.Error()) 2190 return 2191 } 2192 2193 tx, err := s.db.Begin() 2194 if err != nil { 2195 log.Println("failed to start transcation", err) 2196 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2197 return 2198 } 2199 defer tx.Rollback() 2200 2201 for _, p := range pullsToMerge { 2202 err := db.MergePull(tx, f.RepoAt(), p.PullId) 2203 if err != nil { 2204 log.Printf("failed to update pull request status in database: %s", err) 2205 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2206 return 2207 } 2208 p.State = models.PullMerged 2209 } 2210 2211 err = tx.Commit() 2212 if err != nil { 2213 // TODO: this is unsound, we should also revert the merge from the knotserver here 2214 log.Printf("failed to update pull request status in database: %s", err) 2215 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2216 return 2217 } 2218 2219 // notify about the pull merge 2220 for _, p := range pullsToMerge { 2221 s.notifier.NewPullState(r.Context(), syntax.DID(user.Did), p) 2222 } 2223 2224 s.pages.HxLocation(w, fmt.Sprintf("/@%s/%s/pulls/%d", f.OwnerHandle(), f.Name, pull.PullId)) 2225} 2226 2227func (s *Pulls) ClosePull(w http.ResponseWriter, r *http.Request) { 2228 user := s.oauth.GetUser(r) 2229 2230 f, err := s.repoResolver.Resolve(r) 2231 if err != nil { 2232 log.Println("malformed middleware") 2233 return 2234 } 2235 2236 pull, ok := r.Context().Value("pull").(*models.Pull) 2237 if !ok { 2238 log.Println("failed to get pull") 2239 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 2240 return 2241 } 2242 2243 // auth filter: only owner or collaborators can close 2244 roles := f.RolesInRepo(user) 2245 isOwner := roles.IsOwner() 2246 isCollaborator := roles.IsCollaborator() 2247 isPullAuthor := user.Did == pull.OwnerDid 2248 isCloseAllowed := isOwner || isCollaborator || isPullAuthor 2249 if !isCloseAllowed { 2250 log.Println("failed to close pull") 2251 s.pages.Notice(w, "pull-close", "You are unauthorized to close this pull.") 2252 return 2253 } 2254 2255 // Start a transaction 2256 tx, err := s.db.BeginTx(r.Context(), nil) 2257 if err != nil { 2258 log.Println("failed to start transaction", err) 2259 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2260 return 2261 } 2262 defer tx.Rollback() 2263 2264 var pullsToClose []*models.Pull 2265 pullsToClose = append(pullsToClose, pull) 2266 2267 // if this PR is stacked, then we want to close all PRs below this one on the stack 2268 if pull.IsStacked() { 2269 stack := r.Context().Value("stack").(models.Stack) 2270 subStack := stack.StrictlyBelow(pull) 2271 pullsToClose = append(pullsToClose, subStack...) 2272 } 2273 2274 for _, p := range pullsToClose { 2275 // Close the pull in the database 2276 err = db.ClosePull(tx, f.RepoAt(), p.PullId) 2277 if err != nil { 2278 log.Println("failed to close pull", err) 2279 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2280 return 2281 } 2282 p.State = models.PullClosed 2283 } 2284 2285 // Commit the transaction 2286 if err = tx.Commit(); err != nil { 2287 log.Println("failed to commit transaction", err) 2288 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2289 return 2290 } 2291 2292 for _, p := range pullsToClose { 2293 s.notifier.NewPullState(r.Context(), syntax.DID(user.Did), p) 2294 } 2295 2296 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", f.OwnerSlashRepo(), pull.PullId)) 2297} 2298 2299func (s *Pulls) ReopenPull(w http.ResponseWriter, r *http.Request) { 2300 user := s.oauth.GetUser(r) 2301 2302 f, err := s.repoResolver.Resolve(r) 2303 if err != nil { 2304 log.Println("failed to resolve repo", err) 2305 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 2306 return 2307 } 2308 2309 pull, ok := r.Context().Value("pull").(*models.Pull) 2310 if !ok { 2311 log.Println("failed to get pull") 2312 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 2313 return 2314 } 2315 2316 // auth filter: only owner or collaborators can close 2317 roles := f.RolesInRepo(user) 2318 isOwner := roles.IsOwner() 2319 isCollaborator := roles.IsCollaborator() 2320 isPullAuthor := user.Did == pull.OwnerDid 2321 isCloseAllowed := isOwner || isCollaborator || isPullAuthor 2322 if !isCloseAllowed { 2323 log.Println("failed to close pull") 2324 s.pages.Notice(w, "pull-close", "You are unauthorized to close this pull.") 2325 return 2326 } 2327 2328 // Start a transaction 2329 tx, err := s.db.BeginTx(r.Context(), nil) 2330 if err != nil { 2331 log.Println("failed to start transaction", err) 2332 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 2333 return 2334 } 2335 defer tx.Rollback() 2336 2337 var pullsToReopen []*models.Pull 2338 pullsToReopen = append(pullsToReopen, pull) 2339 2340 // if this PR is stacked, then we want to reopen all PRs above this one on the stack 2341 if pull.IsStacked() { 2342 stack := r.Context().Value("stack").(models.Stack) 2343 subStack := stack.StrictlyAbove(pull) 2344 pullsToReopen = append(pullsToReopen, subStack...) 2345 } 2346 2347 for _, p := range pullsToReopen { 2348 // Close the pull in the database 2349 err = db.ReopenPull(tx, f.RepoAt(), p.PullId) 2350 if err != nil { 2351 log.Println("failed to close pull", err) 2352 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2353 return 2354 } 2355 p.State = models.PullOpen 2356 } 2357 2358 // Commit the transaction 2359 if err = tx.Commit(); err != nil { 2360 log.Println("failed to commit transaction", err) 2361 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 2362 return 2363 } 2364 2365 for _, p := range pullsToReopen { 2366 s.notifier.NewPullState(r.Context(), syntax.DID(user.Did), p) 2367 } 2368 2369 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", f.OwnerSlashRepo(), pull.PullId)) 2370} 2371 2372func newStack(f *reporesolver.ResolvedRepo, user *oauth.User, targetBranch, patch string, pullSource *models.PullSource, stackId string) (models.Stack, error) { 2373 formatPatches, err := patchutil.ExtractPatches(patch) 2374 if err != nil { 2375 return nil, fmt.Errorf("Failed to extract patches: %v", err) 2376 } 2377 2378 // must have atleast 1 patch to begin with 2379 if len(formatPatches) == 0 { 2380 return nil, fmt.Errorf("No patches found in the generated format-patch.") 2381 } 2382 2383 // the stack is identified by a UUID 2384 var stack models.Stack 2385 parentChangeId := "" 2386 for _, fp := range formatPatches { 2387 // all patches must have a jj change-id 2388 changeId, err := fp.ChangeId() 2389 if err != nil { 2390 return nil, fmt.Errorf("Stacking is only supported if all patches contain a change-id commit header.") 2391 } 2392 2393 title := fp.Title 2394 body := fp.Body 2395 rkey := tid.TID() 2396 2397 initialSubmission := models.PullSubmission{ 2398 Patch: fp.Raw, 2399 SourceRev: fp.SHA, 2400 Combined: fp.Raw, 2401 } 2402 pull := models.Pull{ 2403 Title: title, 2404 Body: body, 2405 TargetBranch: targetBranch, 2406 OwnerDid: user.Did, 2407 RepoAt: f.RepoAt(), 2408 Rkey: rkey, 2409 Submissions: []*models.PullSubmission{ 2410 &initialSubmission, 2411 }, 2412 PullSource: pullSource, 2413 Created: time.Now(), 2414 2415 StackId: stackId, 2416 ChangeId: changeId, 2417 ParentChangeId: parentChangeId, 2418 } 2419 2420 stack = append(stack, &pull) 2421 2422 parentChangeId = changeId 2423 } 2424 2425 return stack, nil 2426}