forked from tangled.org/core
this repo has no description
1package state 2 3import ( 4 "database/sql" 5 "encoding/json" 6 "errors" 7 "fmt" 8 "io" 9 "log" 10 "net/http" 11 "net/url" 12 "strconv" 13 "time" 14 15 "github.com/go-chi/chi/v5" 16 "tangled.sh/tangled.sh/core/api/tangled" 17 "tangled.sh/tangled.sh/core/appview/auth" 18 "tangled.sh/tangled.sh/core/appview/db" 19 "tangled.sh/tangled.sh/core/appview/pages" 20 "tangled.sh/tangled.sh/core/patchutil" 21 "tangled.sh/tangled.sh/core/types" 22 23 comatproto "github.com/bluesky-social/indigo/api/atproto" 24 "github.com/bluesky-social/indigo/atproto/syntax" 25 lexutil "github.com/bluesky-social/indigo/lex/util" 26) 27 28// htmx fragment 29func (s *State) PullActions(w http.ResponseWriter, r *http.Request) { 30 switch r.Method { 31 case http.MethodGet: 32 user := s.auth.GetUser(r) 33 f, err := fullyResolvedRepo(r) 34 if err != nil { 35 log.Println("failed to get repo and knot", err) 36 return 37 } 38 39 pull, ok := r.Context().Value("pull").(*db.Pull) 40 if !ok { 41 log.Println("failed to get pull") 42 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 43 return 44 } 45 46 roundNumberStr := chi.URLParam(r, "round") 47 roundNumber, err := strconv.Atoi(roundNumberStr) 48 if err != nil { 49 roundNumber = pull.LastRoundNumber() 50 } 51 if roundNumber >= len(pull.Submissions) { 52 http.Error(w, "bad round id", http.StatusBadRequest) 53 log.Println("failed to parse round id", err) 54 return 55 } 56 57 mergeCheckResponse := s.mergeCheck(f, pull) 58 resubmitResult := pages.Unknown 59 if user.Did == pull.OwnerDid { 60 resubmitResult = s.resubmitCheck(f, pull) 61 } 62 63 s.pages.PullActionsFragment(w, pages.PullActionsParams{ 64 LoggedInUser: user, 65 RepoInfo: f.RepoInfo(s, user), 66 Pull: pull, 67 RoundNumber: roundNumber, 68 MergeCheck: mergeCheckResponse, 69 ResubmitCheck: resubmitResult, 70 }) 71 return 72 } 73} 74 75func (s *State) RepoSinglePull(w http.ResponseWriter, r *http.Request) { 76 user := s.auth.GetUser(r) 77 f, err := fullyResolvedRepo(r) 78 if err != nil { 79 log.Println("failed to get repo and knot", err) 80 return 81 } 82 83 pull, ok := r.Context().Value("pull").(*db.Pull) 84 if !ok { 85 log.Println("failed to get pull") 86 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 87 return 88 } 89 90 totalIdents := 1 91 for _, submission := range pull.Submissions { 92 totalIdents += len(submission.Comments) 93 } 94 95 identsToResolve := make([]string, totalIdents) 96 97 // populate idents 98 identsToResolve[0] = pull.OwnerDid 99 idx := 1 100 for _, submission := range pull.Submissions { 101 for _, comment := range submission.Comments { 102 identsToResolve[idx] = comment.OwnerDid 103 idx += 1 104 } 105 } 106 107 resolvedIds := s.resolver.ResolveIdents(r.Context(), identsToResolve) 108 didHandleMap := make(map[string]string) 109 for _, identity := range resolvedIds { 110 if !identity.Handle.IsInvalidHandle() { 111 didHandleMap[identity.DID.String()] = fmt.Sprintf("@%s", identity.Handle.String()) 112 } else { 113 didHandleMap[identity.DID.String()] = identity.DID.String() 114 } 115 } 116 117 mergeCheckResponse := s.mergeCheck(f, pull) 118 resubmitResult := pages.Unknown 119 if user != nil && user.Did == pull.OwnerDid { 120 resubmitResult = s.resubmitCheck(f, pull) 121 } 122 123 var pullSourceRepo *db.Repo 124 if pull.PullSource != nil { 125 if pull.PullSource.RepoAt != nil { 126 pullSourceRepo, err = db.GetRepoByAtUri(s.db, pull.PullSource.RepoAt.String()) 127 if err != nil { 128 log.Printf("failed to get repo by at uri: %v", err) 129 return 130 } 131 } 132 } 133 134 s.pages.RepoSinglePull(w, pages.RepoSinglePullParams{ 135 LoggedInUser: user, 136 RepoInfo: f.RepoInfo(s, user), 137 DidHandleMap: didHandleMap, 138 Pull: pull, 139 PullSourceRepo: pullSourceRepo, 140 MergeCheck: mergeCheckResponse, 141 ResubmitCheck: resubmitResult, 142 }) 143} 144 145func (s *State) mergeCheck(f *FullyResolvedRepo, pull *db.Pull) types.MergeCheckResponse { 146 if pull.State == db.PullMerged { 147 return types.MergeCheckResponse{} 148 } 149 150 secret, err := db.GetRegistrationKey(s.db, f.Knot) 151 if err != nil { 152 log.Printf("failed to get registration key: %v", err) 153 return types.MergeCheckResponse{ 154 Error: "failed to check merge status: this knot is unregistered", 155 } 156 } 157 158 ksClient, err := NewSignedClient(f.Knot, secret, s.config.Dev) 159 if err != nil { 160 log.Printf("failed to setup signed client for %s; ignoring: %v", f.Knot, err) 161 return types.MergeCheckResponse{ 162 Error: "failed to check merge status", 163 } 164 } 165 166 resp, err := ksClient.MergeCheck([]byte(pull.LatestPatch()), f.OwnerDid(), f.RepoName, pull.TargetBranch) 167 if err != nil { 168 log.Println("failed to check for mergeability:", err) 169 return types.MergeCheckResponse{ 170 Error: "failed to check merge status", 171 } 172 } 173 switch resp.StatusCode { 174 case 404: 175 return types.MergeCheckResponse{ 176 Error: "failed to check merge status: this knot does not support PRs", 177 } 178 case 400: 179 return types.MergeCheckResponse{ 180 Error: "failed to check merge status: does this knot support PRs?", 181 } 182 } 183 184 respBody, err := io.ReadAll(resp.Body) 185 if err != nil { 186 log.Println("failed to read merge check response body") 187 return types.MergeCheckResponse{ 188 Error: "failed to check merge status: knot is not speaking the right language", 189 } 190 } 191 defer resp.Body.Close() 192 193 var mergeCheckResponse types.MergeCheckResponse 194 err = json.Unmarshal(respBody, &mergeCheckResponse) 195 if err != nil { 196 log.Println("failed to unmarshal merge check response", err) 197 return types.MergeCheckResponse{ 198 Error: "failed to check merge status: knot is not speaking the right language", 199 } 200 } 201 202 return mergeCheckResponse 203} 204 205func (s *State) resubmitCheck(f *FullyResolvedRepo, pull *db.Pull) pages.ResubmitResult { 206 if pull.State == db.PullMerged || pull.PullSource == nil { 207 return pages.Unknown 208 } 209 210 var knot, ownerDid, repoName string 211 212 if pull.PullSource.RepoAt != nil { 213 // fork-based pulls 214 sourceRepo, err := db.GetRepoByAtUri(s.db, pull.PullSource.RepoAt.String()) 215 if err != nil { 216 log.Println("failed to get source repo", err) 217 return pages.Unknown 218 } 219 220 knot = sourceRepo.Knot 221 ownerDid = sourceRepo.Did 222 repoName = sourceRepo.Name 223 } else { 224 // pulls within the same repo 225 knot = f.Knot 226 ownerDid = f.OwnerDid() 227 repoName = f.RepoName 228 } 229 230 us, err := NewUnsignedClient(knot, s.config.Dev) 231 if err != nil { 232 log.Printf("failed to setup client for %s; ignoring: %v", knot, err) 233 return pages.Unknown 234 } 235 236 resp, err := us.Branch(ownerDid, repoName, pull.PullSource.Branch) 237 if err != nil { 238 log.Println("failed to reach knotserver", err) 239 return pages.Unknown 240 } 241 242 body, err := io.ReadAll(resp.Body) 243 if err != nil { 244 log.Printf("error reading response body: %v", err) 245 return pages.Unknown 246 } 247 defer resp.Body.Close() 248 249 var result types.RepoBranchResponse 250 if err := json.Unmarshal(body, &result); err != nil { 251 log.Println("failed to parse response:", err) 252 return pages.Unknown 253 } 254 255 latestSubmission := pull.Submissions[pull.LastRoundNumber()] 256 if latestSubmission.SourceRev != result.Branch.Hash { 257 fmt.Println(latestSubmission.SourceRev, result.Branch.Hash) 258 return pages.ShouldResubmit 259 } 260 261 return pages.ShouldNotResubmit 262} 263 264func (s *State) RepoPullPatch(w http.ResponseWriter, r *http.Request) { 265 user := s.auth.GetUser(r) 266 f, err := fullyResolvedRepo(r) 267 if err != nil { 268 log.Println("failed to get repo and knot", err) 269 return 270 } 271 272 pull, ok := r.Context().Value("pull").(*db.Pull) 273 if !ok { 274 log.Println("failed to get pull") 275 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 276 return 277 } 278 279 roundId := chi.URLParam(r, "round") 280 roundIdInt, err := strconv.Atoi(roundId) 281 if err != nil || roundIdInt >= len(pull.Submissions) { 282 http.Error(w, "bad round id", http.StatusBadRequest) 283 log.Println("failed to parse round id", err) 284 return 285 } 286 287 identsToResolve := []string{pull.OwnerDid} 288 resolvedIds := s.resolver.ResolveIdents(r.Context(), identsToResolve) 289 didHandleMap := make(map[string]string) 290 for _, identity := range resolvedIds { 291 if !identity.Handle.IsInvalidHandle() { 292 didHandleMap[identity.DID.String()] = fmt.Sprintf("@%s", identity.Handle.String()) 293 } else { 294 didHandleMap[identity.DID.String()] = identity.DID.String() 295 } 296 } 297 298 s.pages.RepoPullPatchPage(w, pages.RepoPullPatchParams{ 299 LoggedInUser: user, 300 DidHandleMap: didHandleMap, 301 RepoInfo: f.RepoInfo(s, user), 302 Pull: pull, 303 Round: roundIdInt, 304 Submission: pull.Submissions[roundIdInt], 305 Diff: pull.Submissions[roundIdInt].AsNiceDiff(pull.TargetBranch), 306 }) 307 308} 309 310func (s *State) RepoPullPatchRaw(w http.ResponseWriter, r *http.Request) { 311 pull, ok := r.Context().Value("pull").(*db.Pull) 312 if !ok { 313 log.Println("failed to get pull") 314 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 315 return 316 } 317 318 roundId := chi.URLParam(r, "round") 319 roundIdInt, err := strconv.Atoi(roundId) 320 if err != nil || roundIdInt >= len(pull.Submissions) { 321 http.Error(w, "bad round id", http.StatusBadRequest) 322 log.Println("failed to parse round id", err) 323 return 324 } 325 326 identsToResolve := []string{pull.OwnerDid} 327 resolvedIds := s.resolver.ResolveIdents(r.Context(), identsToResolve) 328 didHandleMap := make(map[string]string) 329 for _, identity := range resolvedIds { 330 if !identity.Handle.IsInvalidHandle() { 331 didHandleMap[identity.DID.String()] = fmt.Sprintf("@%s", identity.Handle.String()) 332 } else { 333 didHandleMap[identity.DID.String()] = identity.DID.String() 334 } 335 } 336 337 w.Header().Set("Content-Type", "text/plain") 338 w.Write([]byte(pull.Submissions[roundIdInt].Patch)) 339} 340 341func (s *State) RepoPulls(w http.ResponseWriter, r *http.Request) { 342 user := s.auth.GetUser(r) 343 params := r.URL.Query() 344 345 state := db.PullOpen 346 switch params.Get("state") { 347 case "closed": 348 state = db.PullClosed 349 case "merged": 350 state = db.PullMerged 351 } 352 353 f, err := fullyResolvedRepo(r) 354 if err != nil { 355 log.Println("failed to get repo and knot", err) 356 return 357 } 358 359 pulls, err := db.GetPulls(s.db, f.RepoAt, state) 360 if err != nil { 361 log.Println("failed to get pulls", err) 362 s.pages.Notice(w, "pulls", "Failed to load pulls. Try again later.") 363 return 364 } 365 366 for _, p := range pulls { 367 var pullSourceRepo *db.Repo 368 if p.PullSource != nil { 369 if p.PullSource.RepoAt != nil { 370 pullSourceRepo, err = db.GetRepoByAtUri(s.db, p.PullSource.RepoAt.String()) 371 if err != nil { 372 log.Printf("failed to get repo by at uri: %v", err) 373 continue 374 } else { 375 p.PullSource.Repo = pullSourceRepo 376 } 377 } 378 } 379 } 380 381 identsToResolve := make([]string, len(pulls)) 382 for i, pull := range pulls { 383 identsToResolve[i] = pull.OwnerDid 384 } 385 resolvedIds := s.resolver.ResolveIdents(r.Context(), identsToResolve) 386 didHandleMap := make(map[string]string) 387 for _, identity := range resolvedIds { 388 if !identity.Handle.IsInvalidHandle() { 389 didHandleMap[identity.DID.String()] = fmt.Sprintf("@%s", identity.Handle.String()) 390 } else { 391 didHandleMap[identity.DID.String()] = identity.DID.String() 392 } 393 } 394 395 s.pages.RepoPulls(w, pages.RepoPullsParams{ 396 LoggedInUser: s.auth.GetUser(r), 397 RepoInfo: f.RepoInfo(s, user), 398 Pulls: pulls, 399 DidHandleMap: didHandleMap, 400 FilteringBy: state, 401 }) 402 return 403} 404 405func (s *State) PullComment(w http.ResponseWriter, r *http.Request) { 406 user := s.auth.GetUser(r) 407 f, err := fullyResolvedRepo(r) 408 if err != nil { 409 log.Println("failed to get repo and knot", err) 410 return 411 } 412 413 pull, ok := r.Context().Value("pull").(*db.Pull) 414 if !ok { 415 log.Println("failed to get pull") 416 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 417 return 418 } 419 420 roundNumberStr := chi.URLParam(r, "round") 421 roundNumber, err := strconv.Atoi(roundNumberStr) 422 if err != nil || roundNumber >= len(pull.Submissions) { 423 http.Error(w, "bad round id", http.StatusBadRequest) 424 log.Println("failed to parse round id", err) 425 return 426 } 427 428 switch r.Method { 429 case http.MethodGet: 430 s.pages.PullNewCommentFragment(w, pages.PullNewCommentParams{ 431 LoggedInUser: user, 432 RepoInfo: f.RepoInfo(s, user), 433 Pull: pull, 434 RoundNumber: roundNumber, 435 }) 436 return 437 case http.MethodPost: 438 body := r.FormValue("body") 439 if body == "" { 440 s.pages.Notice(w, "pull", "Comment body is required") 441 return 442 } 443 444 // Start a transaction 445 tx, err := s.db.BeginTx(r.Context(), nil) 446 if err != nil { 447 log.Println("failed to start transaction", err) 448 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 449 return 450 } 451 defer tx.Rollback() 452 453 createdAt := time.Now().Format(time.RFC3339) 454 ownerDid := user.Did 455 456 pullAt, err := db.GetPullAt(s.db, f.RepoAt, pull.PullId) 457 if err != nil { 458 log.Println("failed to get pull at", err) 459 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 460 return 461 } 462 463 atUri := f.RepoAt.String() 464 client, _ := s.auth.AuthorizedClient(r) 465 atResp, err := comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 466 Collection: tangled.RepoPullCommentNSID, 467 Repo: user.Did, 468 Rkey: s.TID(), 469 Record: &lexutil.LexiconTypeDecoder{ 470 Val: &tangled.RepoPullComment{ 471 Repo: &atUri, 472 Pull: pullAt, 473 Owner: &ownerDid, 474 Body: &body, 475 CreatedAt: &createdAt, 476 }, 477 }, 478 }) 479 if err != nil { 480 log.Println("failed to create pull comment", err) 481 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 482 return 483 } 484 485 // Create the pull comment in the database with the commentAt field 486 commentId, err := db.NewPullComment(tx, &db.PullComment{ 487 OwnerDid: user.Did, 488 RepoAt: f.RepoAt.String(), 489 PullId: pull.PullId, 490 Body: body, 491 CommentAt: atResp.Uri, 492 SubmissionId: pull.Submissions[roundNumber].ID, 493 }) 494 if err != nil { 495 log.Println("failed to create pull comment", err) 496 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 497 return 498 } 499 500 // Commit the transaction 501 if err = tx.Commit(); err != nil { 502 log.Println("failed to commit transaction", err) 503 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 504 return 505 } 506 507 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d#comment-%d", f.OwnerSlashRepo(), pull.PullId, commentId)) 508 return 509 } 510} 511 512func (s *State) NewPull(w http.ResponseWriter, r *http.Request) { 513 user := s.auth.GetUser(r) 514 f, err := fullyResolvedRepo(r) 515 if err != nil { 516 log.Println("failed to get repo and knot", err) 517 return 518 } 519 520 switch r.Method { 521 case http.MethodGet: 522 us, err := NewUnsignedClient(f.Knot, s.config.Dev) 523 if err != nil { 524 log.Printf("failed to create unsigned client for %s", f.Knot) 525 s.pages.Error503(w) 526 return 527 } 528 529 resp, err := us.Branches(f.OwnerDid(), f.RepoName) 530 if err != nil { 531 log.Println("failed to reach knotserver", err) 532 return 533 } 534 535 body, err := io.ReadAll(resp.Body) 536 if err != nil { 537 log.Printf("Error reading response body: %v", err) 538 return 539 } 540 541 var result types.RepoBranchesResponse 542 err = json.Unmarshal(body, &result) 543 if err != nil { 544 log.Println("failed to parse response:", err) 545 return 546 } 547 548 s.pages.RepoNewPull(w, pages.RepoNewPullParams{ 549 LoggedInUser: user, 550 RepoInfo: f.RepoInfo(s, user), 551 Branches: result.Branches, 552 }) 553 case http.MethodPost: 554 title := r.FormValue("title") 555 body := r.FormValue("body") 556 targetBranch := r.FormValue("targetBranch") 557 fromFork := r.FormValue("fork") 558 sourceBranch := r.FormValue("sourceBranch") 559 patch := r.FormValue("patch") 560 561 if targetBranch == "" { 562 s.pages.Notice(w, "pull", "Target branch is required.") 563 return 564 } 565 566 // Determine PR type based on input parameters 567 isPushAllowed := f.RepoInfo(s, user).Roles.IsPushAllowed() 568 isBranchBased := isPushAllowed && sourceBranch != "" && fromFork == "" 569 isForkBased := fromFork != "" && sourceBranch != "" 570 isPatchBased := patch != "" && !isBranchBased && !isForkBased 571 572 if isPatchBased && !patchutil.IsFormatPatch(patch) { 573 if title == "" { 574 s.pages.Notice(w, "pull", "Title is required for git-diff patches.") 575 return 576 } 577 } 578 579 // Validate we have at least one valid PR creation method 580 if !isBranchBased && !isPatchBased && !isForkBased { 581 s.pages.Notice(w, "pull", "Neither source branch nor patch supplied.") 582 return 583 } 584 585 // Can't mix branch-based and patch-based approaches 586 if isBranchBased && patch != "" { 587 s.pages.Notice(w, "pull", "Cannot select both patch and source branch.") 588 return 589 } 590 591 us, err := NewUnsignedClient(f.Knot, s.config.Dev) 592 if err != nil { 593 log.Printf("failed to create unsigned client to %s: %v", f.Knot, err) 594 s.pages.Notice(w, "pull", "Failed to create a pull request. Try again later.") 595 return 596 } 597 598 caps, err := us.Capabilities() 599 if err != nil { 600 log.Println("error fetching knot caps", f.Knot, err) 601 s.pages.Notice(w, "pull", "Failed to create a pull request. Try again later.") 602 return 603 } 604 605 // Handle the PR creation based on the type 606 if isBranchBased { 607 if !caps.PullRequests.BranchSubmissions { 608 s.pages.Notice(w, "pull", "This knot doesn't support branch-based pull requests. Try another way?") 609 return 610 } 611 s.handleBranchBasedPull(w, r, f, user, title, body, targetBranch, sourceBranch) 612 } else if isForkBased { 613 if !caps.PullRequests.ForkSubmissions { 614 s.pages.Notice(w, "pull", "This knot doesn't support fork-based pull requests. Try another way?") 615 return 616 } 617 s.handleForkBasedPull(w, r, f, user, fromFork, title, body, targetBranch, sourceBranch) 618 } else if isPatchBased { 619 if !caps.PullRequests.PatchSubmissions { 620 s.pages.Notice(w, "pull", "This knot doesn't support patch-based pull requests. Send your patch over email.") 621 return 622 } 623 s.handlePatchBasedPull(w, r, f, user, title, body, targetBranch, patch) 624 } 625 return 626 } 627} 628 629func (s *State) handleBranchBasedPull(w http.ResponseWriter, r *http.Request, f *FullyResolvedRepo, user *auth.User, title, body, targetBranch, sourceBranch string) { 630 pullSource := &db.PullSource{ 631 Branch: sourceBranch, 632 } 633 recordPullSource := &tangled.RepoPull_Source{ 634 Branch: sourceBranch, 635 } 636 637 // Generate a patch using /compare 638 ksClient, err := NewUnsignedClient(f.Knot, s.config.Dev) 639 if err != nil { 640 log.Printf("failed to create signed client for %s: %s", f.Knot, err) 641 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 642 return 643 } 644 645 comparison, err := ksClient.Compare(f.OwnerDid(), f.RepoName, targetBranch, sourceBranch) 646 if err != nil { 647 log.Println("failed to compare", err) 648 s.pages.Notice(w, "pull", err.Error()) 649 return 650 } 651 652 sourceRev := comparison.Rev2 653 patch := comparison.Patch 654 655 if !patchutil.IsPatchValid(patch) { 656 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 657 return 658 } 659 660 s.createPullRequest(w, r, f, user, title, body, targetBranch, patch, sourceRev, pullSource, recordPullSource) 661} 662 663func (s *State) handlePatchBasedPull(w http.ResponseWriter, r *http.Request, f *FullyResolvedRepo, user *auth.User, title, body, targetBranch, patch string) { 664 if !patchutil.IsPatchValid(patch) { 665 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 666 return 667 } 668 669 s.createPullRequest(w, r, f, user, title, body, targetBranch, patch, "", nil, nil) 670} 671 672func (s *State) handleForkBasedPull(w http.ResponseWriter, r *http.Request, f *FullyResolvedRepo, user *auth.User, forkRepo string, title, body, targetBranch, sourceBranch string) { 673 fork, err := db.GetForkByDid(s.db, user.Did, forkRepo) 674 if errors.Is(err, sql.ErrNoRows) { 675 s.pages.Notice(w, "pull", "No such fork.") 676 return 677 } else if err != nil { 678 log.Println("failed to fetch fork:", err) 679 s.pages.Notice(w, "pull", "Failed to fetch fork.") 680 return 681 } 682 683 secret, err := db.GetRegistrationKey(s.db, fork.Knot) 684 if err != nil { 685 log.Println("failed to fetch registration key:", err) 686 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 687 return 688 } 689 690 sc, err := NewSignedClient(fork.Knot, secret, s.config.Dev) 691 if err != nil { 692 log.Println("failed to create signed client:", err) 693 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 694 return 695 } 696 697 us, err := NewUnsignedClient(fork.Knot, s.config.Dev) 698 if err != nil { 699 log.Println("failed to create unsigned client:", err) 700 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 701 return 702 } 703 704 resp, err := sc.NewHiddenRef(user.Did, fork.Name, sourceBranch, targetBranch) 705 if err != nil { 706 log.Println("failed to create hidden ref:", err, resp.StatusCode) 707 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 708 return 709 } 710 711 switch resp.StatusCode { 712 case 404: 713 case 400: 714 s.pages.Notice(w, "pull", "Branch based pull requests are not supported on this knot.") 715 return 716 } 717 718 hiddenRef := url.QueryEscape(fmt.Sprintf("hidden/%s/%s", sourceBranch, targetBranch)) 719 // We're now comparing the sourceBranch (on the fork) against the hiddenRef which is tracking 720 // the targetBranch on the target repository. This code is a bit confusing, but here's an example: 721 // hiddenRef: hidden/feature-1/main (on repo-fork) 722 // targetBranch: main (on repo-1) 723 // sourceBranch: feature-1 (on repo-fork) 724 comparison, err := us.Compare(user.Did, fork.Name, hiddenRef, sourceBranch) 725 if err != nil { 726 log.Println("failed to compare across branches", err) 727 s.pages.Notice(w, "pull", err.Error()) 728 return 729 } 730 731 sourceRev := comparison.Rev2 732 patch := comparison.Patch 733 734 if patchutil.IsPatchValid(patch) { 735 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 736 return 737 } 738 739 forkAtUri, err := syntax.ParseATURI(fork.AtUri) 740 if err != nil { 741 log.Println("failed to parse fork AT URI", err) 742 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 743 return 744 } 745 746 s.createPullRequest(w, r, f, user, title, body, targetBranch, patch, sourceRev, &db.PullSource{ 747 Branch: sourceBranch, 748 RepoAt: &forkAtUri, 749 }, &tangled.RepoPull_Source{Branch: sourceBranch, Repo: &fork.AtUri}) 750} 751 752func (s *State) createPullRequest( 753 w http.ResponseWriter, 754 r *http.Request, 755 f *FullyResolvedRepo, 756 user *auth.User, 757 title, body, targetBranch string, 758 patch string, 759 sourceRev string, 760 pullSource *db.PullSource, 761 recordPullSource *tangled.RepoPull_Source, 762) { 763 tx, err := s.db.BeginTx(r.Context(), nil) 764 if err != nil { 765 log.Println("failed to start tx") 766 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 767 return 768 } 769 defer tx.Rollback() 770 771 // We've already checked earlier if it's diff-based and title is empty, 772 // so if it's still empty now, it's intentionally skipped owing to format-patch. 773 if title == "" { 774 formatPatches, err := patchutil.ExtractPatches(patch) 775 if err != nil { 776 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to extract patches: %v", err)) 777 return 778 } 779 if len(formatPatches) == 0 { 780 s.pages.Notice(w, "pull", "No patches found in the supplied format-patch.") 781 return 782 } 783 784 title = formatPatches[0].Title 785 body = formatPatches[0].Body 786 } 787 788 rkey := s.TID() 789 initialSubmission := db.PullSubmission{ 790 Patch: patch, 791 SourceRev: sourceRev, 792 } 793 err = db.NewPull(tx, &db.Pull{ 794 Title: title, 795 Body: body, 796 TargetBranch: targetBranch, 797 OwnerDid: user.Did, 798 RepoAt: f.RepoAt, 799 Rkey: rkey, 800 Submissions: []*db.PullSubmission{ 801 &initialSubmission, 802 }, 803 PullSource: pullSource, 804 }) 805 if err != nil { 806 log.Println("failed to create pull request", err) 807 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 808 return 809 } 810 client, _ := s.auth.AuthorizedClient(r) 811 pullId, err := db.NextPullId(s.db, f.RepoAt) 812 if err != nil { 813 log.Println("failed to get pull id", err) 814 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 815 return 816 } 817 818 atResp, err := comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 819 Collection: tangled.RepoPullNSID, 820 Repo: user.Did, 821 Rkey: rkey, 822 Record: &lexutil.LexiconTypeDecoder{ 823 Val: &tangled.RepoPull{ 824 Title: title, 825 PullId: int64(pullId), 826 TargetRepo: string(f.RepoAt), 827 TargetBranch: targetBranch, 828 Patch: patch, 829 Source: recordPullSource, 830 }, 831 }, 832 }) 833 834 err = db.SetPullAt(s.db, f.RepoAt, pullId, atResp.Uri) 835 if err != nil { 836 log.Println("failed to get pull id", err) 837 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 838 return 839 } 840 841 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", f.OwnerSlashRepo(), pullId)) 842} 843 844func (s *State) ValidatePatch(w http.ResponseWriter, r *http.Request) { 845 _, err := fullyResolvedRepo(r) 846 if err != nil { 847 log.Println("failed to get repo and knot", err) 848 return 849 } 850 851 patch := r.FormValue("patch") 852 if patch == "" { 853 s.pages.Notice(w, "patch-error", "Patch is required.") 854 return 855 } 856 857 if patch == "" || !patchutil.IsPatchValid(patch) { 858 s.pages.Notice(w, "patch-error", "Invalid patch format. Please provide a valid git diff or format-patch.") 859 return 860 } 861 862 if patchutil.IsFormatPatch(patch) { 863 s.pages.Notice(w, "patch-preview", "Format patch detected. Title and description are optional; if left out, they will be extracted from the first commit.") 864 } else { 865 s.pages.Notice(w, "patch-preview", "Regular diff detected. Please provide a title and description.") 866 } 867} 868 869func (s *State) PatchUploadFragment(w http.ResponseWriter, r *http.Request) { 870 user := s.auth.GetUser(r) 871 f, err := fullyResolvedRepo(r) 872 if err != nil { 873 log.Println("failed to get repo and knot", err) 874 return 875 } 876 877 s.pages.PullPatchUploadFragment(w, pages.PullPatchUploadParams{ 878 RepoInfo: f.RepoInfo(s, user), 879 }) 880} 881 882func (s *State) CompareBranchesFragment(w http.ResponseWriter, r *http.Request) { 883 user := s.auth.GetUser(r) 884 f, err := fullyResolvedRepo(r) 885 if err != nil { 886 log.Println("failed to get repo and knot", err) 887 return 888 } 889 890 us, err := NewUnsignedClient(f.Knot, s.config.Dev) 891 if err != nil { 892 log.Printf("failed to create unsigned client for %s", f.Knot) 893 s.pages.Error503(w) 894 return 895 } 896 897 resp, err := us.Branches(f.OwnerDid(), f.RepoName) 898 if err != nil { 899 log.Println("failed to reach knotserver", err) 900 return 901 } 902 903 body, err := io.ReadAll(resp.Body) 904 if err != nil { 905 log.Printf("Error reading response body: %v", err) 906 return 907 } 908 909 var result types.RepoBranchesResponse 910 err = json.Unmarshal(body, &result) 911 if err != nil { 912 log.Println("failed to parse response:", err) 913 return 914 } 915 916 s.pages.PullCompareBranchesFragment(w, pages.PullCompareBranchesParams{ 917 RepoInfo: f.RepoInfo(s, user), 918 Branches: result.Branches, 919 }) 920} 921 922func (s *State) CompareForksFragment(w http.ResponseWriter, r *http.Request) { 923 user := s.auth.GetUser(r) 924 f, err := fullyResolvedRepo(r) 925 if err != nil { 926 log.Println("failed to get repo and knot", err) 927 return 928 } 929 930 forks, err := db.GetForksByDid(s.db, user.Did) 931 if err != nil { 932 log.Println("failed to get forks", err) 933 return 934 } 935 936 s.pages.PullCompareForkFragment(w, pages.PullCompareForkParams{ 937 RepoInfo: f.RepoInfo(s, user), 938 Forks: forks, 939 }) 940} 941 942func (s *State) CompareForksBranchesFragment(w http.ResponseWriter, r *http.Request) { 943 user := s.auth.GetUser(r) 944 945 f, err := fullyResolvedRepo(r) 946 if err != nil { 947 log.Println("failed to get repo and knot", err) 948 return 949 } 950 951 forkVal := r.URL.Query().Get("fork") 952 953 // fork repo 954 repo, err := db.GetRepo(s.db, user.Did, forkVal) 955 if err != nil { 956 log.Println("failed to get repo", user.Did, forkVal) 957 return 958 } 959 960 sourceBranchesClient, err := NewUnsignedClient(repo.Knot, s.config.Dev) 961 if err != nil { 962 log.Printf("failed to create unsigned client for %s", repo.Knot) 963 s.pages.Error503(w) 964 return 965 } 966 967 sourceResp, err := sourceBranchesClient.Branches(user.Did, repo.Name) 968 if err != nil { 969 log.Println("failed to reach knotserver for source branches", err) 970 return 971 } 972 973 sourceBody, err := io.ReadAll(sourceResp.Body) 974 if err != nil { 975 log.Println("failed to read source response body", err) 976 return 977 } 978 defer sourceResp.Body.Close() 979 980 var sourceResult types.RepoBranchesResponse 981 err = json.Unmarshal(sourceBody, &sourceResult) 982 if err != nil { 983 log.Println("failed to parse source branches response:", err) 984 return 985 } 986 987 targetBranchesClient, err := NewUnsignedClient(f.Knot, s.config.Dev) 988 if err != nil { 989 log.Printf("failed to create unsigned client for target knot %s", f.Knot) 990 s.pages.Error503(w) 991 return 992 } 993 994 targetResp, err := targetBranchesClient.Branches(f.OwnerDid(), f.RepoName) 995 if err != nil { 996 log.Println("failed to reach knotserver for target branches", err) 997 return 998 } 999 1000 targetBody, err := io.ReadAll(targetResp.Body) 1001 if err != nil { 1002 log.Println("failed to read target response body", err) 1003 return 1004 } 1005 defer targetResp.Body.Close() 1006 1007 var targetResult types.RepoBranchesResponse 1008 err = json.Unmarshal(targetBody, &targetResult) 1009 if err != nil { 1010 log.Println("failed to parse target branches response:", err) 1011 return 1012 } 1013 1014 s.pages.PullCompareForkBranchesFragment(w, pages.PullCompareForkBranchesParams{ 1015 RepoInfo: f.RepoInfo(s, user), 1016 SourceBranches: sourceResult.Branches, 1017 TargetBranches: targetResult.Branches, 1018 }) 1019} 1020 1021func (s *State) ResubmitPull(w http.ResponseWriter, r *http.Request) { 1022 user := s.auth.GetUser(r) 1023 f, err := fullyResolvedRepo(r) 1024 if err != nil { 1025 log.Println("failed to get repo and knot", err) 1026 return 1027 } 1028 1029 pull, ok := r.Context().Value("pull").(*db.Pull) 1030 if !ok { 1031 log.Println("failed to get pull") 1032 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 1033 return 1034 } 1035 1036 switch r.Method { 1037 case http.MethodGet: 1038 s.pages.PullResubmitFragment(w, pages.PullResubmitParams{ 1039 RepoInfo: f.RepoInfo(s, user), 1040 Pull: pull, 1041 }) 1042 return 1043 case http.MethodPost: 1044 if pull.IsPatchBased() { 1045 s.resubmitPatch(w, r) 1046 return 1047 } else if pull.IsBranchBased() { 1048 s.resubmitBranch(w, r) 1049 return 1050 } else if pull.IsForkBased() { 1051 s.resubmitFork(w, r) 1052 return 1053 } 1054 } 1055} 1056 1057func (s *State) resubmitPatch(w http.ResponseWriter, r *http.Request) { 1058 user := s.auth.GetUser(r) 1059 1060 pull, ok := r.Context().Value("pull").(*db.Pull) 1061 if !ok { 1062 log.Println("failed to get pull") 1063 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 1064 return 1065 } 1066 1067 f, err := fullyResolvedRepo(r) 1068 if err != nil { 1069 log.Println("failed to get repo and knot", err) 1070 return 1071 } 1072 1073 if user.Did != pull.OwnerDid { 1074 log.Println("unauthorized user") 1075 w.WriteHeader(http.StatusUnauthorized) 1076 return 1077 } 1078 1079 patch := r.FormValue("patch") 1080 1081 if err = validateResubmittedPatch(pull, patch); err != nil { 1082 s.pages.Notice(w, "resubmit-error", err.Error()) 1083 } 1084 1085 tx, err := s.db.BeginTx(r.Context(), nil) 1086 if err != nil { 1087 log.Println("failed to start tx") 1088 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1089 return 1090 } 1091 defer tx.Rollback() 1092 1093 err = db.ResubmitPull(tx, pull, patch, "") 1094 if err != nil { 1095 log.Println("failed to resubmit pull request", err) 1096 s.pages.Notice(w, "resubmit-error", "Failed to resubmit pull request. Try again later.") 1097 return 1098 } 1099 client, _ := s.auth.AuthorizedClient(r) 1100 1101 ex, err := comatproto.RepoGetRecord(r.Context(), client, "", tangled.RepoPullNSID, user.Did, pull.Rkey) 1102 if err != nil { 1103 // failed to get record 1104 s.pages.Notice(w, "resubmit-error", "Failed to update pull, no record found on PDS.") 1105 return 1106 } 1107 1108 _, err = comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 1109 Collection: tangled.RepoPullNSID, 1110 Repo: user.Did, 1111 Rkey: pull.Rkey, 1112 SwapRecord: ex.Cid, 1113 Record: &lexutil.LexiconTypeDecoder{ 1114 Val: &tangled.RepoPull{ 1115 Title: pull.Title, 1116 PullId: int64(pull.PullId), 1117 TargetRepo: string(f.RepoAt), 1118 TargetBranch: pull.TargetBranch, 1119 Patch: patch, // new patch 1120 }, 1121 }, 1122 }) 1123 if err != nil { 1124 log.Println("failed to update record", err) 1125 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 1126 return 1127 } 1128 1129 if err = tx.Commit(); err != nil { 1130 log.Println("failed to commit transaction", err) 1131 s.pages.Notice(w, "resubmit-error", "Failed to resubmit pull.") 1132 return 1133 } 1134 1135 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", f.OwnerSlashRepo(), pull.PullId)) 1136 return 1137} 1138 1139func (s *State) resubmitBranch(w http.ResponseWriter, r *http.Request) { 1140 user := s.auth.GetUser(r) 1141 1142 pull, ok := r.Context().Value("pull").(*db.Pull) 1143 if !ok { 1144 log.Println("failed to get pull") 1145 s.pages.Notice(w, "resubmit-error", "Failed to edit patch. Try again later.") 1146 return 1147 } 1148 1149 f, err := fullyResolvedRepo(r) 1150 if err != nil { 1151 log.Println("failed to get repo and knot", err) 1152 return 1153 } 1154 1155 if user.Did != pull.OwnerDid { 1156 log.Println("unauthorized user") 1157 w.WriteHeader(http.StatusUnauthorized) 1158 return 1159 } 1160 1161 if !f.RepoInfo(s, user).Roles.IsPushAllowed() { 1162 log.Println("unauthorized user") 1163 w.WriteHeader(http.StatusUnauthorized) 1164 return 1165 } 1166 1167 ksClient, err := NewUnsignedClient(f.Knot, s.config.Dev) 1168 if err != nil { 1169 log.Printf("failed to create client for %s: %s", f.Knot, err) 1170 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1171 return 1172 } 1173 1174 comparison, err := ksClient.Compare(f.OwnerDid(), f.RepoName, pull.TargetBranch, pull.PullSource.Branch) 1175 if err != nil { 1176 log.Printf("compare request failed: %s", err) 1177 s.pages.Notice(w, "resubmit-error", err.Error()) 1178 return 1179 } 1180 1181 sourceRev := comparison.Rev2 1182 patch := comparison.Patch 1183 1184 if err = validateResubmittedPatch(pull, patch); err != nil { 1185 s.pages.Notice(w, "resubmit-error", err.Error()) 1186 return 1187 } 1188 1189 if sourceRev == pull.Submissions[pull.LastRoundNumber()].SourceRev { 1190 s.pages.Notice(w, "resubmit-error", "This branch has not changed since the last submission.") 1191 return 1192 } 1193 1194 tx, err := s.db.BeginTx(r.Context(), nil) 1195 if err != nil { 1196 log.Println("failed to start tx") 1197 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1198 return 1199 } 1200 defer tx.Rollback() 1201 1202 err = db.ResubmitPull(tx, pull, patch, sourceRev) 1203 if err != nil { 1204 log.Println("failed to create pull request", err) 1205 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1206 return 1207 } 1208 client, _ := s.auth.AuthorizedClient(r) 1209 1210 ex, err := comatproto.RepoGetRecord(r.Context(), client, "", tangled.RepoPullNSID, user.Did, pull.Rkey) 1211 if err != nil { 1212 // failed to get record 1213 s.pages.Notice(w, "resubmit-error", "Failed to update pull, no record found on PDS.") 1214 return 1215 } 1216 1217 recordPullSource := &tangled.RepoPull_Source{ 1218 Branch: pull.PullSource.Branch, 1219 } 1220 _, err = comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 1221 Collection: tangled.RepoPullNSID, 1222 Repo: user.Did, 1223 Rkey: pull.Rkey, 1224 SwapRecord: ex.Cid, 1225 Record: &lexutil.LexiconTypeDecoder{ 1226 Val: &tangled.RepoPull{ 1227 Title: pull.Title, 1228 PullId: int64(pull.PullId), 1229 TargetRepo: string(f.RepoAt), 1230 TargetBranch: pull.TargetBranch, 1231 Patch: patch, // new patch 1232 Source: recordPullSource, 1233 }, 1234 }, 1235 }) 1236 if err != nil { 1237 log.Println("failed to update record", err) 1238 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 1239 return 1240 } 1241 1242 if err = tx.Commit(); err != nil { 1243 log.Println("failed to commit transaction", err) 1244 s.pages.Notice(w, "resubmit-error", "Failed to resubmit pull.") 1245 return 1246 } 1247 1248 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", f.OwnerSlashRepo(), pull.PullId)) 1249 return 1250} 1251 1252func (s *State) resubmitFork(w http.ResponseWriter, r *http.Request) { 1253 user := s.auth.GetUser(r) 1254 1255 pull, ok := r.Context().Value("pull").(*db.Pull) 1256 if !ok { 1257 log.Println("failed to get pull") 1258 s.pages.Notice(w, "resubmit-error", "Failed to edit patch. Try again later.") 1259 return 1260 } 1261 1262 f, err := fullyResolvedRepo(r) 1263 if err != nil { 1264 log.Println("failed to get repo and knot", err) 1265 return 1266 } 1267 1268 if user.Did != pull.OwnerDid { 1269 log.Println("unauthorized user") 1270 w.WriteHeader(http.StatusUnauthorized) 1271 return 1272 } 1273 1274 forkRepo, err := db.GetRepoByAtUri(s.db, pull.PullSource.RepoAt.String()) 1275 if err != nil { 1276 log.Println("failed to get source repo", err) 1277 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1278 return 1279 } 1280 1281 // extract patch by performing compare 1282 ksClient, err := NewUnsignedClient(forkRepo.Knot, s.config.Dev) 1283 if err != nil { 1284 log.Printf("failed to create client for %s: %s", forkRepo.Knot, err) 1285 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1286 return 1287 } 1288 1289 secret, err := db.GetRegistrationKey(s.db, forkRepo.Knot) 1290 if err != nil { 1291 log.Printf("failed to get registration key for %s: %s", forkRepo.Knot, err) 1292 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1293 return 1294 } 1295 1296 // update the hidden tracking branch to latest 1297 signedClient, err := NewSignedClient(forkRepo.Knot, secret, s.config.Dev) 1298 if err != nil { 1299 log.Printf("failed to create signed client for %s: %s", forkRepo.Knot, err) 1300 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1301 return 1302 } 1303 1304 resp, err := signedClient.NewHiddenRef(forkRepo.Did, forkRepo.Name, pull.PullSource.Branch, pull.TargetBranch) 1305 if err != nil || resp.StatusCode != http.StatusNoContent { 1306 log.Printf("failed to update tracking branch: %s", err) 1307 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1308 return 1309 } 1310 1311 hiddenRef := url.QueryEscape(fmt.Sprintf("hidden/%s/%s", pull.PullSource.Branch, pull.TargetBranch)) 1312 comparison, err := ksClient.Compare(forkRepo.Did, forkRepo.Name, hiddenRef, pull.PullSource.Branch) 1313 if err != nil { 1314 log.Printf("failed to compare branches: %s", err) 1315 s.pages.Notice(w, "resubmit-error", err.Error()) 1316 return 1317 } 1318 1319 sourceRev := comparison.Rev2 1320 patch := comparison.Patch 1321 1322 if err = validateResubmittedPatch(pull, patch); err != nil { 1323 s.pages.Notice(w, "resubmit-error", err.Error()) 1324 } 1325 1326 if sourceRev == pull.Submissions[pull.LastRoundNumber()].SourceRev { 1327 s.pages.Notice(w, "resubmit-error", "This branch has not changed since the last submission.") 1328 return 1329 } 1330 1331 tx, err := s.db.BeginTx(r.Context(), nil) 1332 if err != nil { 1333 log.Println("failed to start tx") 1334 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1335 return 1336 } 1337 defer tx.Rollback() 1338 1339 err = db.ResubmitPull(tx, pull, patch, sourceRev) 1340 if err != nil { 1341 log.Println("failed to create pull request", err) 1342 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1343 return 1344 } 1345 client, _ := s.auth.AuthorizedClient(r) 1346 1347 ex, err := comatproto.RepoGetRecord(r.Context(), client, "", tangled.RepoPullNSID, user.Did, pull.Rkey) 1348 if err != nil { 1349 // failed to get record 1350 s.pages.Notice(w, "resubmit-error", "Failed to update pull, no record found on PDS.") 1351 return 1352 } 1353 1354 repoAt := pull.PullSource.RepoAt.String() 1355 recordPullSource := &tangled.RepoPull_Source{ 1356 Branch: pull.PullSource.Branch, 1357 Repo: &repoAt, 1358 } 1359 _, err = comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 1360 Collection: tangled.RepoPullNSID, 1361 Repo: user.Did, 1362 Rkey: pull.Rkey, 1363 SwapRecord: ex.Cid, 1364 Record: &lexutil.LexiconTypeDecoder{ 1365 Val: &tangled.RepoPull{ 1366 Title: pull.Title, 1367 PullId: int64(pull.PullId), 1368 TargetRepo: string(f.RepoAt), 1369 TargetBranch: pull.TargetBranch, 1370 Patch: patch, // new patch 1371 Source: recordPullSource, 1372 }, 1373 }, 1374 }) 1375 if err != nil { 1376 log.Println("failed to update record", err) 1377 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 1378 return 1379 } 1380 1381 if err = tx.Commit(); err != nil { 1382 log.Println("failed to commit transaction", err) 1383 s.pages.Notice(w, "resubmit-error", "Failed to resubmit pull.") 1384 return 1385 } 1386 1387 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", f.OwnerSlashRepo(), pull.PullId)) 1388 return 1389} 1390 1391// validate a resubmission against a pull request 1392func validateResubmittedPatch(pull *db.Pull, patch string) error { 1393 if patch == "" { 1394 return fmt.Errorf("Patch is empty.") 1395 } 1396 1397 if patch == pull.LatestPatch() { 1398 return fmt.Errorf("Patch is identical to previous submission.") 1399 } 1400 1401 if !patchutil.IsPatchValid(patch) { 1402 return fmt.Errorf("Invalid patch format. Please provide a valid diff.") 1403 } 1404 1405 return nil 1406} 1407 1408func (s *State) MergePull(w http.ResponseWriter, r *http.Request) { 1409 f, err := fullyResolvedRepo(r) 1410 if err != nil { 1411 log.Println("failed to resolve repo:", err) 1412 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 1413 return 1414 } 1415 1416 pull, ok := r.Context().Value("pull").(*db.Pull) 1417 if !ok { 1418 log.Println("failed to get pull") 1419 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 1420 return 1421 } 1422 1423 secret, err := db.GetRegistrationKey(s.db, f.Knot) 1424 if err != nil { 1425 log.Printf("no registration key found for domain %s: %s\n", f.Knot, err) 1426 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 1427 return 1428 } 1429 1430 ident, err := s.resolver.ResolveIdent(r.Context(), pull.OwnerDid) 1431 if err != nil { 1432 log.Printf("resolving identity: %s", err) 1433 w.WriteHeader(http.StatusNotFound) 1434 return 1435 } 1436 1437 email, err := db.GetPrimaryEmail(s.db, pull.OwnerDid) 1438 if err != nil { 1439 log.Printf("failed to get primary email: %s", err) 1440 } 1441 1442 ksClient, err := NewSignedClient(f.Knot, secret, s.config.Dev) 1443 if err != nil { 1444 log.Printf("failed to create signed client for %s: %s", f.Knot, err) 1445 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 1446 return 1447 } 1448 1449 // Merge the pull request 1450 resp, err := ksClient.Merge([]byte(pull.LatestPatch()), f.OwnerDid(), f.RepoName, pull.TargetBranch, pull.Title, pull.Body, ident.Handle.String(), email.Address) 1451 if err != nil { 1452 log.Printf("failed to merge pull request: %s", err) 1453 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 1454 return 1455 } 1456 1457 if resp.StatusCode == http.StatusOK { 1458 err := db.MergePull(s.db, f.RepoAt, pull.PullId) 1459 if err != nil { 1460 log.Printf("failed to update pull request status in database: %s", err) 1461 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 1462 return 1463 } 1464 s.pages.HxLocation(w, fmt.Sprintf("/@%s/%s/pulls/%d", f.OwnerHandle(), f.RepoName, pull.PullId)) 1465 } else { 1466 log.Printf("knotserver returned non-OK status code for merge: %d", resp.StatusCode) 1467 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 1468 } 1469} 1470 1471func (s *State) ClosePull(w http.ResponseWriter, r *http.Request) { 1472 user := s.auth.GetUser(r) 1473 1474 f, err := fullyResolvedRepo(r) 1475 if err != nil { 1476 log.Println("malformed middleware") 1477 return 1478 } 1479 1480 pull, ok := r.Context().Value("pull").(*db.Pull) 1481 if !ok { 1482 log.Println("failed to get pull") 1483 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 1484 return 1485 } 1486 1487 // auth filter: only owner or collaborators can close 1488 roles := RolesInRepo(s, user, f) 1489 isCollaborator := roles.IsCollaborator() 1490 isPullAuthor := user.Did == pull.OwnerDid 1491 isCloseAllowed := isCollaborator || isPullAuthor 1492 if !isCloseAllowed { 1493 log.Println("failed to close pull") 1494 s.pages.Notice(w, "pull-close", "You are unauthorized to close this pull.") 1495 return 1496 } 1497 1498 // Start a transaction 1499 tx, err := s.db.BeginTx(r.Context(), nil) 1500 if err != nil { 1501 log.Println("failed to start transaction", err) 1502 s.pages.Notice(w, "pull-close", "Failed to close pull.") 1503 return 1504 } 1505 1506 // Close the pull in the database 1507 err = db.ClosePull(tx, f.RepoAt, pull.PullId) 1508 if err != nil { 1509 log.Println("failed to close pull", err) 1510 s.pages.Notice(w, "pull-close", "Failed to close pull.") 1511 return 1512 } 1513 1514 // Commit the transaction 1515 if err = tx.Commit(); err != nil { 1516 log.Println("failed to commit transaction", err) 1517 s.pages.Notice(w, "pull-close", "Failed to close pull.") 1518 return 1519 } 1520 1521 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", f.OwnerSlashRepo(), pull.PullId)) 1522 return 1523} 1524 1525func (s *State) ReopenPull(w http.ResponseWriter, r *http.Request) { 1526 user := s.auth.GetUser(r) 1527 1528 f, err := fullyResolvedRepo(r) 1529 if err != nil { 1530 log.Println("failed to resolve repo", err) 1531 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 1532 return 1533 } 1534 1535 pull, ok := r.Context().Value("pull").(*db.Pull) 1536 if !ok { 1537 log.Println("failed to get pull") 1538 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 1539 return 1540 } 1541 1542 // auth filter: only owner or collaborators can close 1543 roles := RolesInRepo(s, user, f) 1544 isCollaborator := roles.IsCollaborator() 1545 isPullAuthor := user.Did == pull.OwnerDid 1546 isCloseAllowed := isCollaborator || isPullAuthor 1547 if !isCloseAllowed { 1548 log.Println("failed to close pull") 1549 s.pages.Notice(w, "pull-close", "You are unauthorized to close this pull.") 1550 return 1551 } 1552 1553 // Start a transaction 1554 tx, err := s.db.BeginTx(r.Context(), nil) 1555 if err != nil { 1556 log.Println("failed to start transaction", err) 1557 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 1558 return 1559 } 1560 1561 // Reopen the pull in the database 1562 err = db.ReopenPull(tx, f.RepoAt, pull.PullId) 1563 if err != nil { 1564 log.Println("failed to reopen pull", err) 1565 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 1566 return 1567 } 1568 1569 // Commit the transaction 1570 if err = tx.Commit(); err != nil { 1571 log.Println("failed to commit transaction", err) 1572 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 1573 return 1574 } 1575 1576 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", f.OwnerSlashRepo(), pull.PullId)) 1577 return 1578}