A vibe coded tangled fork which supports pijul.
at 65e8307afcba329cddb5b6128a1d5b382915a147 2574 lines 73 kB view raw
1package pulls 2 3import ( 4 "bytes" 5 "compress/gzip" 6 "context" 7 "database/sql" 8 "encoding/json" 9 "errors" 10 "fmt" 11 "io" 12 "log" 13 "log/slog" 14 "net/http" 15 "slices" 16 "sort" 17 "strconv" 18 "strings" 19 "time" 20 21 "tangled.org/core/api/tangled" 22 "tangled.org/core/appview/config" 23 "tangled.org/core/appview/db" 24 pulls_indexer "tangled.org/core/appview/indexer/pulls" 25 "tangled.org/core/appview/mentions" 26 "tangled.org/core/appview/models" 27 "tangled.org/core/appview/notify" 28 "tangled.org/core/appview/oauth" 29 "tangled.org/core/appview/pages" 30 "tangled.org/core/appview/pages/markup/sanitizer" 31 "tangled.org/core/appview/pages/repoinfo" 32 "tangled.org/core/appview/pagination" 33 "tangled.org/core/appview/reporesolver" 34 "tangled.org/core/appview/searchquery" 35 "tangled.org/core/appview/xrpcclient" 36 "tangled.org/core/idresolver" 37 "tangled.org/core/orm" 38 "tangled.org/core/patchutil" 39 "tangled.org/core/rbac" 40 "tangled.org/core/tid" 41 "tangled.org/core/types" 42 "tangled.org/core/xrpc" 43 44 comatproto "github.com/bluesky-social/indigo/api/atproto" 45 "github.com/bluesky-social/indigo/atproto/syntax" 46 lexutil "github.com/bluesky-social/indigo/lex/util" 47 indigoxrpc "github.com/bluesky-social/indigo/xrpc" 48 "github.com/go-chi/chi/v5" 49 "github.com/google/uuid" 50) 51 52const ApplicationGzip = "application/gzip" 53 54type Pulls struct { 55 oauth *oauth.OAuth 56 repoResolver *reporesolver.RepoResolver 57 pages *pages.Pages 58 idResolver *idresolver.Resolver 59 mentionsResolver *mentions.Resolver 60 db *db.DB 61 config *config.Config 62 notifier notify.Notifier 63 enforcer *rbac.Enforcer 64 logger *slog.Logger 65 indexer *pulls_indexer.Indexer 66} 67 68func New( 69 oauth *oauth.OAuth, 70 repoResolver *reporesolver.RepoResolver, 71 pages *pages.Pages, 72 resolver *idresolver.Resolver, 73 mentionsResolver *mentions.Resolver, 74 db *db.DB, 75 config *config.Config, 76 notifier notify.Notifier, 77 enforcer *rbac.Enforcer, 78 indexer *pulls_indexer.Indexer, 79 logger *slog.Logger, 80) *Pulls { 81 return &Pulls{ 82 oauth: oauth, 83 repoResolver: repoResolver, 84 pages: pages, 85 idResolver: resolver, 86 mentionsResolver: mentionsResolver, 87 db: db, 88 config: config, 89 notifier: notifier, 90 enforcer: enforcer, 91 logger: logger, 92 indexer: indexer, 93 } 94} 95 96// htmx fragment 97func (s *Pulls) PullActions(w http.ResponseWriter, r *http.Request) { 98 switch r.Method { 99 case http.MethodGet: 100 user := s.oauth.GetMultiAccountUser(r) 101 f, err := s.repoResolver.Resolve(r) 102 if err != nil { 103 log.Println("failed to get repo and knot", err) 104 return 105 } 106 107 pull, ok := r.Context().Value("pull").(*models.Pull) 108 if !ok { 109 log.Println("failed to get pull") 110 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 111 return 112 } 113 114 // can be nil if this pull is not stacked 115 stack, _ := r.Context().Value("stack").(models.Stack) 116 117 roundNumberStr := chi.URLParam(r, "round") 118 roundNumber, err := strconv.Atoi(roundNumberStr) 119 if err != nil { 120 roundNumber = pull.LastRoundNumber() 121 } 122 if roundNumber >= len(pull.Submissions) { 123 http.Error(w, "bad round id", http.StatusBadRequest) 124 log.Println("failed to parse round id", err) 125 return 126 } 127 128 mergeCheckResponse := s.mergeCheck(r, f, pull, stack) 129 branchDeleteStatus := s.branchDeleteStatus(r, f, pull) 130 resubmitResult := pages.Unknown 131 if user.Active.Did == pull.OwnerDid { 132 resubmitResult = s.resubmitCheck(r, f, pull, stack) 133 } 134 135 s.pages.PullActionsFragment(w, pages.PullActionsParams{ 136 LoggedInUser: user, 137 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 138 Pull: pull, 139 RoundNumber: roundNumber, 140 MergeCheck: mergeCheckResponse, 141 ResubmitCheck: resubmitResult, 142 BranchDeleteStatus: branchDeleteStatus, 143 Stack: stack, 144 }) 145 return 146 } 147} 148 149func (s *Pulls) repoPullHelper(w http.ResponseWriter, r *http.Request, interdiff bool) { 150 user := s.oauth.GetMultiAccountUser(r) 151 f, err := s.repoResolver.Resolve(r) 152 if err != nil { 153 log.Println("failed to get repo and knot", err) 154 return 155 } 156 157 pull, ok := r.Context().Value("pull").(*models.Pull) 158 if !ok { 159 log.Println("failed to get pull") 160 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 161 return 162 } 163 164 backlinks, err := db.GetBacklinks(s.db, pull.AtUri()) 165 if err != nil { 166 log.Println("failed to get pull backlinks", err) 167 s.pages.Notice(w, "pull-error", "Failed to get pull. Try again later.") 168 return 169 } 170 171 roundId := chi.URLParam(r, "round") 172 roundIdInt := pull.LastRoundNumber() 173 if r, err := strconv.Atoi(roundId); err == nil { 174 roundIdInt = r 175 } 176 if roundIdInt >= len(pull.Submissions) { 177 http.Error(w, "bad round id", http.StatusBadRequest) 178 log.Println("failed to parse round id", err) 179 return 180 } 181 182 var diffOpts types.DiffOpts 183 if d := r.URL.Query().Get("diff"); d == "split" { 184 diffOpts.Split = true 185 } 186 187 // can be nil if this pull is not stacked 188 stack, _ := r.Context().Value("stack").(models.Stack) 189 abandonedPulls, _ := r.Context().Value("abandonedPulls").([]*models.Pull) 190 191 mergeCheckResponse := s.mergeCheck(r, f, pull, stack) 192 branchDeleteStatus := s.branchDeleteStatus(r, f, pull) 193 resubmitResult := pages.Unknown 194 if user != nil && user.Active != nil && user.Active.Did == pull.OwnerDid { 195 resubmitResult = s.resubmitCheck(r, f, pull, stack) 196 } 197 198 m := make(map[string]models.Pipeline) 199 200 var shas []string 201 for _, s := range pull.Submissions { 202 shas = append(shas, s.SourceRev) 203 } 204 for _, p := range stack { 205 shas = append(shas, p.LatestSha()) 206 } 207 for _, p := range abandonedPulls { 208 shas = append(shas, p.LatestSha()) 209 } 210 211 ps, err := db.GetPipelineStatuses( 212 s.db, 213 len(shas), 214 orm.FilterEq("p.repo_owner", f.Did), 215 orm.FilterEq("p.repo_name", f.Name), 216 orm.FilterEq("p.knot", f.Knot), 217 orm.FilterIn("p.sha", shas), 218 ) 219 if err != nil { 220 log.Printf("failed to fetch pipeline statuses: %s", err) 221 // non-fatal 222 } 223 224 for _, p := range ps { 225 m[p.Sha] = p 226 } 227 228 reactionMap, err := db.GetReactionMap(s.db, 20, pull.AtUri()) 229 if err != nil { 230 log.Println("failed to get pull reactions") 231 } 232 233 userReactions := map[models.ReactionKind]bool{} 234 if user != nil { 235 userReactions = db.GetReactionStatusMap(s.db, user.Active.Did, pull.AtUri()) 236 } 237 238 labelDefs, err := db.GetLabelDefinitions( 239 s.db, 240 orm.FilterIn("at_uri", f.Labels), 241 orm.FilterContains("scope", tangled.RepoPullNSID), 242 ) 243 if err != nil { 244 log.Println("failed to fetch labels", err) 245 s.pages.Error503(w) 246 return 247 } 248 249 defs := make(map[string]*models.LabelDefinition) 250 for _, l := range labelDefs { 251 defs[l.AtUri().String()] = &l 252 } 253 254 patch := pull.Submissions[roundIdInt].CombinedPatch() 255 var diff types.DiffRenderer 256 diff = patchutil.AsNiceDiff(patch, pull.TargetBranch) 257 258 if interdiff { 259 currentPatch, err := patchutil.AsDiff(pull.Submissions[roundIdInt].CombinedPatch()) 260 if err != nil { 261 log.Println("failed to interdiff; current patch malformed") 262 s.pages.Notice(w, fmt.Sprintf("interdiff-error-%d", roundIdInt), "Failed to calculate interdiff; current patch is invalid.") 263 return 264 } 265 266 previousPatch, err := patchutil.AsDiff(pull.Submissions[roundIdInt-1].CombinedPatch()) 267 if err != nil { 268 log.Println("failed to interdiff; previous patch malformed") 269 s.pages.Notice(w, fmt.Sprintf("interdiff-error-%d", roundIdInt), "Failed to calculate interdiff; previous patch is invalid.") 270 return 271 } 272 273 diff = patchutil.Interdiff(previousPatch, currentPatch) 274 } 275 276 s.pages.RepoSinglePull(w, pages.RepoSinglePullParams{ 277 LoggedInUser: user, 278 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 279 Pull: pull, 280 Stack: stack, 281 AbandonedPulls: abandonedPulls, 282 Backlinks: backlinks, 283 BranchDeleteStatus: branchDeleteStatus, 284 MergeCheck: mergeCheckResponse, 285 ResubmitCheck: resubmitResult, 286 Pipelines: m, 287 Diff: diff, 288 DiffOpts: diffOpts, 289 ActiveRound: roundIdInt, 290 IsInterdiff: interdiff, 291 292 Reactions: reactionMap, 293 UserReacted: userReactions, 294 295 LabelDefs: defs, 296 }) 297} 298 299func (s *Pulls) RepoSinglePull(w http.ResponseWriter, r *http.Request) { 300 pull, ok := r.Context().Value("pull").(*models.Pull) 301 if !ok { 302 log.Println("failed to get pull") 303 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 304 return 305 } 306 307 http.Redirect(w, r, r.URL.String()+fmt.Sprintf("/round/%d", pull.LastRoundNumber()), http.StatusFound) 308} 309 310func (s *Pulls) mergeCheck(r *http.Request, f *models.Repo, pull *models.Pull, stack models.Stack) types.MergeCheckResponse { 311 if pull.State == models.PullMerged { 312 return types.MergeCheckResponse{} 313 } 314 315 scheme := "https" 316 if s.config.Core.Dev { 317 scheme = "http" 318 } 319 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 320 321 xrpcc := indigoxrpc.Client{ 322 Host: host, 323 } 324 325 patch := pull.LatestPatch() 326 if pull.IsStacked() { 327 // combine patches of substack 328 subStack := stack.Below(pull) 329 // collect the portion of the stack that is mergeable 330 mergeable := subStack.Mergeable() 331 // combine each patch 332 patch = mergeable.CombinedPatch() 333 } 334 335 resp, xe := tangled.RepoMergeCheck( 336 r.Context(), 337 &xrpcc, 338 &tangled.RepoMergeCheck_Input{ 339 Did: f.Did, 340 Name: f.Name, 341 Branch: pull.TargetBranch, 342 Patch: patch, 343 }, 344 ) 345 if err := xrpcclient.HandleXrpcErr(xe); err != nil { 346 log.Println("failed to check for mergeability", "err", err) 347 return types.MergeCheckResponse{ 348 Error: fmt.Sprintf("failed to check merge status: %s", err.Error()), 349 } 350 } 351 352 // convert xrpc response to internal types 353 conflicts := make([]types.ConflictInfo, len(resp.Conflicts)) 354 for i, conflict := range resp.Conflicts { 355 conflicts[i] = types.ConflictInfo{ 356 Filename: conflict.Filename, 357 Reason: conflict.Reason, 358 } 359 } 360 361 result := types.MergeCheckResponse{ 362 IsConflicted: resp.Is_conflicted, 363 Conflicts: conflicts, 364 } 365 366 if resp.Message != nil { 367 result.Message = *resp.Message 368 } 369 370 if resp.Error != nil { 371 result.Error = *resp.Error 372 } 373 374 return result 375} 376 377func (s *Pulls) branchDeleteStatus(r *http.Request, repo *models.Repo, pull *models.Pull) *models.BranchDeleteStatus { 378 if pull.State != models.PullMerged { 379 return nil 380 } 381 382 user := s.oauth.GetMultiAccountUser(r) 383 if user == nil { 384 return nil 385 } 386 387 var branch string 388 // check if the branch exists 389 // NOTE: appview could cache branches/tags etc. for every repo by listening for gitRefUpdates 390 if pull.IsBranchBased() { 391 branch = pull.PullSource.Branch 392 } else if pull.IsForkBased() { 393 branch = pull.PullSource.Branch 394 repo = pull.PullSource.Repo 395 } else { 396 return nil 397 } 398 399 // deleted fork 400 if repo == nil { 401 return nil 402 } 403 404 // user can only delete branch if they are a collaborator in the repo that the branch belongs to 405 perms := s.enforcer.GetPermissionsInRepo(user.Active.Did, repo.Knot, repo.DidSlashRepo()) 406 if !slices.Contains(perms, "repo:push") { 407 return nil 408 } 409 410 scheme := "http" 411 if !s.config.Core.Dev { 412 scheme = "https" 413 } 414 host := fmt.Sprintf("%s://%s", scheme, repo.Knot) 415 xrpcc := &indigoxrpc.Client{ 416 Host: host, 417 } 418 419 resp, err := tangled.RepoBranch(r.Context(), xrpcc, branch, fmt.Sprintf("%s/%s", repo.Did, repo.Name)) 420 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 421 return nil 422 } 423 424 return &models.BranchDeleteStatus{ 425 Repo: repo, 426 Branch: resp.Name, 427 } 428} 429 430func (s *Pulls) resubmitCheck(r *http.Request, repo *models.Repo, pull *models.Pull, stack models.Stack) pages.ResubmitResult { 431 if pull.State == models.PullMerged || pull.State == models.PullDeleted || pull.PullSource == nil { 432 return pages.Unknown 433 } 434 435 var knot, ownerDid, repoName string 436 437 if pull.PullSource.RepoAt != nil { 438 // fork-based pulls 439 sourceRepo, err := db.GetRepoByAtUri(s.db, pull.PullSource.RepoAt.String()) 440 if err != nil { 441 log.Println("failed to get source repo", err) 442 return pages.Unknown 443 } 444 445 knot = sourceRepo.Knot 446 ownerDid = sourceRepo.Did 447 repoName = sourceRepo.Name 448 } else { 449 // pulls within the same repo 450 knot = repo.Knot 451 ownerDid = repo.Did 452 repoName = repo.Name 453 } 454 455 scheme := "http" 456 if !s.config.Core.Dev { 457 scheme = "https" 458 } 459 host := fmt.Sprintf("%s://%s", scheme, knot) 460 xrpcc := &indigoxrpc.Client{ 461 Host: host, 462 } 463 464 didSlashName := fmt.Sprintf("%s/%s", ownerDid, repoName) 465 branchResp, err := tangled.RepoBranch(r.Context(), xrpcc, pull.PullSource.Branch, didSlashName) 466 if err != nil { 467 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 468 log.Println("failed to call XRPC repo.branches", xrpcerr) 469 return pages.Unknown 470 } 471 log.Println("failed to reach knotserver", err) 472 return pages.Unknown 473 } 474 475 targetBranch := branchResp 476 477 latestSourceRev := pull.LatestSha() 478 479 if pull.IsStacked() && stack != nil { 480 top := stack[0] 481 latestSourceRev = top.LatestSha() 482 } 483 484 if latestSourceRev != targetBranch.Hash { 485 return pages.ShouldResubmit 486 } 487 488 return pages.ShouldNotResubmit 489} 490 491func (s *Pulls) RepoPullPatch(w http.ResponseWriter, r *http.Request) { 492 s.repoPullHelper(w, r, false) 493} 494 495func (s *Pulls) RepoPullInterdiff(w http.ResponseWriter, r *http.Request) { 496 s.repoPullHelper(w, r, true) 497} 498 499func (s *Pulls) RepoPullPatchRaw(w http.ResponseWriter, r *http.Request) { 500 pull, ok := r.Context().Value("pull").(*models.Pull) 501 if !ok { 502 log.Println("failed to get pull") 503 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 504 return 505 } 506 507 roundId := chi.URLParam(r, "round") 508 roundIdInt, err := strconv.Atoi(roundId) 509 if err != nil || roundIdInt >= len(pull.Submissions) { 510 http.Error(w, "bad round id", http.StatusBadRequest) 511 log.Println("failed to parse round id", err) 512 return 513 } 514 515 w.Header().Set("Content-Type", "text/plain; charset=utf-8") 516 w.Write([]byte(pull.Submissions[roundIdInt].Patch)) 517} 518 519func (s *Pulls) RepoPulls(w http.ResponseWriter, r *http.Request) { 520 l := s.logger.With("handler", "RepoPulls") 521 522 user := s.oauth.GetMultiAccountUser(r) 523 params := r.URL.Query() 524 page := pagination.FromContext(r.Context()) 525 526 f, err := s.repoResolver.Resolve(r) 527 if err != nil { 528 log.Println("failed to get repo and knot", err) 529 return 530 } 531 532 query := searchquery.Parse(params.Get("q")) 533 534 var state *models.PullState 535 if urlState := params.Get("state"); urlState != "" { 536 switch urlState { 537 case "open": 538 state = ptrPullState(models.PullOpen) 539 case "closed": 540 state = ptrPullState(models.PullClosed) 541 case "merged": 542 state = ptrPullState(models.PullMerged) 543 } 544 query.Set("state", urlState) 545 } else if queryState := query.Get("state"); queryState != nil { 546 switch *queryState { 547 case "open": 548 state = ptrPullState(models.PullOpen) 549 case "closed": 550 state = ptrPullState(models.PullClosed) 551 case "merged": 552 state = ptrPullState(models.PullMerged) 553 } 554 } else if _, hasQ := params["q"]; !hasQ { 555 state = ptrPullState(models.PullOpen) 556 query.Set("state", "open") 557 } 558 559 var authorDid string 560 if authorHandle := query.Get("author"); authorHandle != nil { 561 identity, err := s.idResolver.ResolveIdent(r.Context(), *authorHandle) 562 if err != nil { 563 l.Debug("failed to resolve author handle", "handle", *authorHandle, "err", err) 564 } else { 565 authorDid = identity.DID.String() 566 } 567 } 568 569 var negatedAuthorDid string 570 if negatedAuthors := query.GetAllNegated("author"); len(negatedAuthors) > 0 { 571 identity, err := s.idResolver.ResolveIdent(r.Context(), negatedAuthors[0]) 572 if err != nil { 573 l.Debug("failed to resolve negated author handle", "handle", negatedAuthors[0], "err", err) 574 } else { 575 negatedAuthorDid = identity.DID.String() 576 } 577 } 578 579 labels := query.GetAll("label") 580 negatedLabels := query.GetAllNegated("label") 581 582 var keywords, negatedKeywords []string 583 var phrases, negatedPhrases []string 584 for _, item := range query.Items() { 585 switch item.Kind { 586 case searchquery.KindKeyword: 587 if item.Negated { 588 negatedKeywords = append(negatedKeywords, item.Value) 589 } else { 590 keywords = append(keywords, item.Value) 591 } 592 case searchquery.KindQuoted: 593 if item.Negated { 594 negatedPhrases = append(negatedPhrases, item.Value) 595 } else { 596 phrases = append(phrases, item.Value) 597 } 598 } 599 } 600 601 searchOpts := models.PullSearchOptions{ 602 Keywords: keywords, 603 Phrases: phrases, 604 RepoAt: f.RepoAt().String(), 605 State: state, 606 AuthorDid: authorDid, 607 Labels: labels, 608 NegatedKeywords: negatedKeywords, 609 NegatedPhrases: negatedPhrases, 610 NegatedLabels: negatedLabels, 611 NegatedAuthorDid: negatedAuthorDid, 612 Page: page, 613 } 614 615 var totalPulls int 616 if state == nil { 617 totalPulls = f.RepoStats.PullCount.Open + f.RepoStats.PullCount.Merged + f.RepoStats.PullCount.Closed 618 } else { 619 switch *state { 620 case models.PullOpen: 621 totalPulls = f.RepoStats.PullCount.Open 622 case models.PullMerged: 623 totalPulls = f.RepoStats.PullCount.Merged 624 case models.PullClosed: 625 totalPulls = f.RepoStats.PullCount.Closed 626 } 627 } 628 629 repoInfo := s.repoResolver.GetRepoInfo(r, user) 630 631 var pulls []*models.Pull 632 633 if searchOpts.HasSearchFilters() { 634 res, err := s.indexer.Search(r.Context(), searchOpts) 635 if err != nil { 636 l.Error("failed to search for pulls", "err", err) 637 return 638 } 639 totalPulls = int(res.Total) 640 l.Debug("searched pulls with indexer", "count", len(res.Hits)) 641 642 // update tab counts to reflect filtered results 643 countOpts := searchOpts 644 countOpts.Page = pagination.Page{Limit: 1} 645 for _, ps := range []models.PullState{models.PullOpen, models.PullMerged, models.PullClosed} { 646 ps := ps 647 countOpts.State = &ps 648 countRes, err := s.indexer.Search(r.Context(), countOpts) 649 if err != nil { 650 continue 651 } 652 switch ps { 653 case models.PullOpen: 654 repoInfo.Stats.PullCount.Open = int(countRes.Total) 655 case models.PullMerged: 656 repoInfo.Stats.PullCount.Merged = int(countRes.Total) 657 case models.PullClosed: 658 repoInfo.Stats.PullCount.Closed = int(countRes.Total) 659 } 660 } 661 662 if len(res.Hits) > 0 { 663 pulls, err = db.GetPulls( 664 s.db, 665 orm.FilterIn("id", res.Hits), 666 ) 667 if err != nil { 668 l.Error("failed to get pulls", "err", err) 669 s.pages.Notice(w, "pulls", "Failed to load pulls. Try again later.") 670 return 671 } 672 } 673 } else { 674 filters := []orm.Filter{ 675 orm.FilterEq("repo_at", f.RepoAt()), 676 } 677 if state != nil { 678 filters = append(filters, orm.FilterEq("state", *state)) 679 } 680 pulls, err = db.GetPullsPaginated( 681 s.db, 682 page, 683 filters..., 684 ) 685 if err != nil { 686 l.Error("failed to get pulls", "err", err) 687 s.pages.Notice(w, "pulls", "Failed to load pulls. Try again later.") 688 return 689 } 690 } 691 692 for _, p := range pulls { 693 var pullSourceRepo *models.Repo 694 if p.PullSource != nil { 695 if p.PullSource.RepoAt != nil { 696 pullSourceRepo, err = db.GetRepoByAtUri(s.db, p.PullSource.RepoAt.String()) 697 if err != nil { 698 log.Printf("failed to get repo by at uri: %v", err) 699 continue 700 } else { 701 p.PullSource.Repo = pullSourceRepo 702 } 703 } 704 } 705 } 706 707 // we want to group all stacked PRs into just one list 708 stacks := make(map[string]models.Stack) 709 var shas []string 710 n := 0 711 for _, p := range pulls { 712 // store the sha for later 713 shas = append(shas, p.LatestSha()) 714 // this PR is stacked 715 if p.StackId != "" { 716 // we have already seen this PR stack 717 if _, seen := stacks[p.StackId]; seen { 718 stacks[p.StackId] = append(stacks[p.StackId], p) 719 // skip this PR 720 } else { 721 stacks[p.StackId] = nil 722 pulls[n] = p 723 n++ 724 } 725 } else { 726 pulls[n] = p 727 n++ 728 } 729 } 730 pulls = pulls[:n] 731 732 ps, err := db.GetPipelineStatuses( 733 s.db, 734 len(shas), 735 orm.FilterEq("p.repo_owner", f.Did), 736 orm.FilterEq("p.repo_name", f.Name), 737 orm.FilterEq("p.knot", f.Knot), 738 orm.FilterIn("p.sha", shas), 739 ) 740 if err != nil { 741 log.Printf("failed to fetch pipeline statuses: %s", err) 742 // non-fatal 743 } 744 m := make(map[string]models.Pipeline) 745 for _, p := range ps { 746 m[p.Sha] = p 747 } 748 749 labelDefs, err := db.GetLabelDefinitions( 750 s.db, 751 orm.FilterIn("at_uri", f.Labels), 752 orm.FilterContains("scope", tangled.RepoPullNSID), 753 ) 754 if err != nil { 755 l.Error("failed to fetch labels", "err", err) 756 s.pages.Error503(w) 757 return 758 } 759 760 defs := make(map[string]*models.LabelDefinition) 761 for _, l := range labelDefs { 762 defs[l.AtUri().String()] = &l 763 } 764 765 filterState := "" 766 if state != nil { 767 filterState = state.String() 768 } 769 770 s.pages.RepoPulls(w, pages.RepoPullsParams{ 771 LoggedInUser: s.oauth.GetMultiAccountUser(r), 772 RepoInfo: repoInfo, 773 Pulls: pulls, 774 LabelDefs: defs, 775 FilterState: filterState, 776 FilterQuery: query.String(), 777 Stacks: stacks, 778 Pipelines: m, 779 Page: page, 780 PullCount: totalPulls, 781 }) 782} 783 784func (s *Pulls) PullComment(w http.ResponseWriter, r *http.Request) { 785 user := s.oauth.GetMultiAccountUser(r) 786 f, err := s.repoResolver.Resolve(r) 787 if err != nil { 788 log.Println("failed to get repo and knot", err) 789 return 790 } 791 792 pull, ok := r.Context().Value("pull").(*models.Pull) 793 if !ok { 794 log.Println("failed to get pull") 795 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 796 return 797 } 798 799 roundNumberStr := chi.URLParam(r, "round") 800 roundNumber, err := strconv.Atoi(roundNumberStr) 801 if err != nil || roundNumber >= len(pull.Submissions) { 802 http.Error(w, "bad round id", http.StatusBadRequest) 803 log.Println("failed to parse round id", err) 804 return 805 } 806 807 switch r.Method { 808 case http.MethodGet: 809 s.pages.PullNewCommentFragment(w, pages.PullNewCommentParams{ 810 LoggedInUser: user, 811 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 812 Pull: pull, 813 RoundNumber: roundNumber, 814 }) 815 return 816 case http.MethodPost: 817 body := r.FormValue("body") 818 if body == "" { 819 s.pages.Notice(w, "pull", "Comment body is required") 820 return 821 } 822 823 mentions, references := s.mentionsResolver.Resolve(r.Context(), body) 824 825 // Start a transaction 826 tx, err := s.db.BeginTx(r.Context(), nil) 827 if err != nil { 828 log.Println("failed to start transaction", err) 829 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 830 return 831 } 832 defer tx.Rollback() 833 834 createdAt := time.Now().Format(time.RFC3339) 835 836 client, err := s.oauth.AuthorizedClient(r) 837 if err != nil { 838 log.Println("failed to get authorized client", err) 839 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 840 return 841 } 842 atResp, err := comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 843 Collection: tangled.RepoPullCommentNSID, 844 Repo: user.Active.Did, 845 Rkey: tid.TID(), 846 Record: &lexutil.LexiconTypeDecoder{ 847 Val: &tangled.RepoPullComment{ 848 Pull: pull.AtUri().String(), 849 Body: body, 850 CreatedAt: createdAt, 851 }, 852 }, 853 }) 854 if err != nil { 855 log.Println("failed to create pull comment", err) 856 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 857 return 858 } 859 860 comment := &models.PullComment{ 861 OwnerDid: user.Active.Did, 862 RepoAt: f.RepoAt().String(), 863 PullId: pull.PullId, 864 Body: body, 865 CommentAt: atResp.Uri, 866 SubmissionId: pull.Submissions[roundNumber].ID, 867 Mentions: mentions, 868 References: references, 869 } 870 871 // Create the pull comment in the database with the commentAt field 872 commentId, err := db.NewPullComment(tx, comment) 873 if err != nil { 874 log.Println("failed to create pull comment", err) 875 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 876 return 877 } 878 879 // Commit the transaction 880 if err = tx.Commit(); err != nil { 881 log.Println("failed to commit transaction", err) 882 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 883 return 884 } 885 886 s.notifier.NewPullComment(r.Context(), comment, mentions) 887 888 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f) 889 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d#comment-%d", ownerSlashRepo, pull.PullId, commentId)) 890 return 891 } 892} 893 894func (s *Pulls) NewPull(w http.ResponseWriter, r *http.Request) { 895 user := s.oauth.GetMultiAccountUser(r) 896 f, err := s.repoResolver.Resolve(r) 897 if err != nil { 898 log.Println("failed to get repo and knot", err) 899 return 900 } 901 902 switch r.Method { 903 case http.MethodGet: 904 scheme := "http" 905 if !s.config.Core.Dev { 906 scheme = "https" 907 } 908 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 909 xrpcc := &indigoxrpc.Client{ 910 Host: host, 911 } 912 913 repo := fmt.Sprintf("%s/%s", f.Did, f.Name) 914 xrpcBytes, err := tangled.RepoBranches(r.Context(), xrpcc, "", 0, repo) 915 if err != nil { 916 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 917 log.Println("failed to call XRPC repo.branches", xrpcerr) 918 s.pages.Error503(w) 919 return 920 } 921 log.Println("failed to fetch branches", err) 922 return 923 } 924 925 var result types.RepoBranchesResponse 926 if err := json.Unmarshal(xrpcBytes, &result); err != nil { 927 log.Println("failed to decode XRPC response", err) 928 s.pages.Error503(w) 929 return 930 } 931 932 // can be one of "patch", "branch" or "fork" 933 strategy := r.URL.Query().Get("strategy") 934 // ignored if strategy is "patch" 935 sourceBranch := r.URL.Query().Get("sourceBranch") 936 targetBranch := r.URL.Query().Get("targetBranch") 937 938 s.pages.RepoNewPull(w, pages.RepoNewPullParams{ 939 LoggedInUser: user, 940 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 941 Branches: result.Branches, 942 Strategy: strategy, 943 SourceBranch: sourceBranch, 944 TargetBranch: targetBranch, 945 Title: r.URL.Query().Get("title"), 946 Body: r.URL.Query().Get("body"), 947 }) 948 949 case http.MethodPost: 950 title := r.FormValue("title") 951 body := r.FormValue("body") 952 targetBranch := r.FormValue("targetBranch") 953 fromFork := r.FormValue("fork") 954 sourceBranch := r.FormValue("sourceBranch") 955 patch := r.FormValue("patch") 956 957 if targetBranch == "" { 958 s.pages.Notice(w, "pull", "Target branch is required.") 959 return 960 } 961 962 // Determine PR type based on input parameters 963 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())} 964 isPushAllowed := roles.IsPushAllowed() 965 isBranchBased := isPushAllowed && sourceBranch != "" && fromFork == "" 966 isForkBased := fromFork != "" && sourceBranch != "" 967 isPatchBased := patch != "" && !isBranchBased && !isForkBased 968 isStacked := r.FormValue("isStacked") == "on" 969 970 if isPatchBased && !patchutil.IsFormatPatch(patch) { 971 if title == "" { 972 s.pages.Notice(w, "pull", "Title is required for git-diff patches.") 973 return 974 } 975 if st := strings.TrimSpace(sanitizer.SanitizeDescription(title)); (st) == "" { 976 s.pages.Notice(w, "pull", "Title is empty after HTML sanitization") 977 return 978 } 979 } 980 981 // Validate we have at least one valid PR creation method 982 if !isBranchBased && !isPatchBased && !isForkBased { 983 s.pages.Notice(w, "pull", "Neither source branch nor patch supplied.") 984 return 985 } 986 987 // Can't mix branch-based and patch-based approaches 988 if isBranchBased && patch != "" { 989 s.pages.Notice(w, "pull", "Cannot select both patch and source branch.") 990 return 991 } 992 993 // us, err := knotclient.NewUnsignedClient(f.Knot, s.config.Core.Dev) 994 // if err != nil { 995 // log.Printf("failed to create unsigned client to %s: %v", f.Knot, err) 996 // s.pages.Notice(w, "pull", "Failed to create a pull request. Try again later.") 997 // return 998 // } 999 1000 // TODO: make capabilities an xrpc call 1001 caps := struct { 1002 PullRequests struct { 1003 FormatPatch bool 1004 BranchSubmissions bool 1005 ForkSubmissions bool 1006 PatchSubmissions bool 1007 } 1008 }{ 1009 PullRequests: struct { 1010 FormatPatch bool 1011 BranchSubmissions bool 1012 ForkSubmissions bool 1013 PatchSubmissions bool 1014 }{ 1015 FormatPatch: true, 1016 BranchSubmissions: true, 1017 ForkSubmissions: true, 1018 PatchSubmissions: true, 1019 }, 1020 } 1021 1022 // caps, err := us.Capabilities() 1023 // if err != nil { 1024 // log.Println("error fetching knot caps", f.Knot, err) 1025 // s.pages.Notice(w, "pull", "Failed to create a pull request. Try again later.") 1026 // return 1027 // } 1028 1029 if !caps.PullRequests.FormatPatch { 1030 s.pages.Notice(w, "pull", "This knot doesn't support format-patch. Unfortunately, there is no fallback for now.") 1031 return 1032 } 1033 1034 // Handle the PR creation based on the type 1035 if isBranchBased { 1036 if !caps.PullRequests.BranchSubmissions { 1037 s.pages.Notice(w, "pull", "This knot doesn't support branch-based pull requests. Try another way?") 1038 return 1039 } 1040 s.handleBranchBasedPull(w, r, f, user, title, body, targetBranch, sourceBranch, isStacked) 1041 } else if isForkBased { 1042 if !caps.PullRequests.ForkSubmissions { 1043 s.pages.Notice(w, "pull", "This knot doesn't support fork-based pull requests. Try another way?") 1044 return 1045 } 1046 s.handleForkBasedPull(w, r, f, user, fromFork, title, body, targetBranch, sourceBranch, isStacked) 1047 } else if isPatchBased { 1048 if !caps.PullRequests.PatchSubmissions { 1049 s.pages.Notice(w, "pull", "This knot doesn't support patch-based pull requests. Send your patch over email.") 1050 return 1051 } 1052 s.handlePatchBasedPull(w, r, f, user, title, body, targetBranch, patch, isStacked) 1053 } 1054 return 1055 } 1056} 1057 1058func (s *Pulls) handleBranchBasedPull( 1059 w http.ResponseWriter, 1060 r *http.Request, 1061 repo *models.Repo, 1062 user *oauth.MultiAccountUser, 1063 title, 1064 body, 1065 targetBranch, 1066 sourceBranch string, 1067 isStacked bool, 1068) { 1069 scheme := "http" 1070 if !s.config.Core.Dev { 1071 scheme = "https" 1072 } 1073 host := fmt.Sprintf("%s://%s", scheme, repo.Knot) 1074 xrpcc := &indigoxrpc.Client{ 1075 Host: host, 1076 } 1077 1078 didSlashRepo := fmt.Sprintf("%s/%s", repo.Did, repo.Name) 1079 xrpcBytes, err := tangled.RepoCompare(r.Context(), xrpcc, didSlashRepo, targetBranch, sourceBranch) 1080 if err != nil { 1081 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1082 log.Println("failed to call XRPC repo.compare", xrpcerr) 1083 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1084 return 1085 } 1086 log.Println("failed to compare", err) 1087 s.pages.Notice(w, "pull", err.Error()) 1088 return 1089 } 1090 1091 var comparison types.RepoFormatPatchResponse 1092 if err := json.Unmarshal(xrpcBytes, &comparison); err != nil { 1093 log.Println("failed to decode XRPC compare response", err) 1094 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1095 return 1096 } 1097 1098 sourceRev := comparison.Rev2 1099 patch := comparison.FormatPatchRaw 1100 combined := comparison.CombinedPatchRaw 1101 1102 if err := validatePatch(&patch); err != nil { 1103 s.logger.Error("failed to validate patch", "err", err) 1104 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 1105 return 1106 } 1107 1108 pullSource := &models.PullSource{ 1109 Branch: sourceBranch, 1110 } 1111 recordPullSource := &tangled.RepoPull_Source{ 1112 Branch: sourceBranch, 1113 Sha: comparison.Rev2, 1114 } 1115 1116 s.createPullRequest(w, r, repo, user, title, body, targetBranch, patch, combined, sourceRev, pullSource, recordPullSource, isStacked) 1117} 1118 1119func (s *Pulls) handlePatchBasedPull(w http.ResponseWriter, r *http.Request, repo *models.Repo, user *oauth.MultiAccountUser, title, body, targetBranch, patch string, isStacked bool) { 1120 if err := validatePatch(&patch); err != nil { 1121 s.logger.Error("patch validation failed", "err", err) 1122 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 1123 return 1124 } 1125 1126 s.createPullRequest(w, r, repo, user, title, body, targetBranch, patch, "", "", nil, nil, isStacked) 1127} 1128 1129func (s *Pulls) handleForkBasedPull(w http.ResponseWriter, r *http.Request, repo *models.Repo, user *oauth.MultiAccountUser, forkRepo string, title, body, targetBranch, sourceBranch string, isStacked bool) { 1130 repoString := strings.SplitN(forkRepo, "/", 2) 1131 forkOwnerDid := repoString[0] 1132 repoName := repoString[1] 1133 fork, err := db.GetForkByDid(s.db, forkOwnerDid, repoName) 1134 if errors.Is(err, sql.ErrNoRows) { 1135 s.pages.Notice(w, "pull", "No such fork.") 1136 return 1137 } else if err != nil { 1138 log.Println("failed to fetch fork:", err) 1139 s.pages.Notice(w, "pull", "Failed to fetch fork.") 1140 return 1141 } 1142 1143 client, err := s.oauth.ServiceClient( 1144 r, 1145 oauth.WithService(fork.Knot), 1146 oauth.WithLxm(tangled.RepoHiddenRefNSID), 1147 oauth.WithDev(s.config.Core.Dev), 1148 ) 1149 1150 resp, err := tangled.RepoHiddenRef( 1151 r.Context(), 1152 client, 1153 &tangled.RepoHiddenRef_Input{ 1154 ForkRef: sourceBranch, 1155 RemoteRef: targetBranch, 1156 Repo: fork.RepoAt().String(), 1157 }, 1158 ) 1159 if err := xrpcclient.HandleXrpcErr(err); err != nil { 1160 s.pages.Notice(w, "pull", err.Error()) 1161 return 1162 } 1163 1164 if !resp.Success { 1165 errorMsg := "Failed to create pull request" 1166 if resp.Error != nil { 1167 errorMsg = fmt.Sprintf("Failed to create pull request: %s", *resp.Error) 1168 } 1169 s.pages.Notice(w, "pull", errorMsg) 1170 return 1171 } 1172 1173 hiddenRef := fmt.Sprintf("hidden/%s/%s", sourceBranch, targetBranch) 1174 // We're now comparing the sourceBranch (on the fork) against the hiddenRef which is tracking 1175 // the targetBranch on the target repository. This code is a bit confusing, but here's an example: 1176 // hiddenRef: hidden/feature-1/main (on repo-fork) 1177 // targetBranch: main (on repo-1) 1178 // sourceBranch: feature-1 (on repo-fork) 1179 forkScheme := "http" 1180 if !s.config.Core.Dev { 1181 forkScheme = "https" 1182 } 1183 forkHost := fmt.Sprintf("%s://%s", forkScheme, fork.Knot) 1184 forkXrpcc := &indigoxrpc.Client{ 1185 Host: forkHost, 1186 } 1187 1188 forkRepoId := fmt.Sprintf("%s/%s", fork.Did, fork.Name) 1189 forkXrpcBytes, err := tangled.RepoCompare(r.Context(), forkXrpcc, forkRepoId, hiddenRef, sourceBranch) 1190 if err != nil { 1191 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1192 log.Println("failed to call XRPC repo.compare for fork", xrpcerr) 1193 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1194 return 1195 } 1196 log.Println("failed to compare across branches", err) 1197 s.pages.Notice(w, "pull", err.Error()) 1198 return 1199 } 1200 1201 var comparison types.RepoFormatPatchResponse 1202 if err := json.Unmarshal(forkXrpcBytes, &comparison); err != nil { 1203 log.Println("failed to decode XRPC compare response for fork", err) 1204 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1205 return 1206 } 1207 1208 sourceRev := comparison.Rev2 1209 patch := comparison.FormatPatchRaw 1210 combined := comparison.CombinedPatchRaw 1211 1212 if err := validatePatch(&patch); err != nil { 1213 s.logger.Error("failed to validate patch", "err", err) 1214 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 1215 return 1216 } 1217 1218 forkAtUri := fork.RepoAt() 1219 forkAtUriStr := forkAtUri.String() 1220 1221 pullSource := &models.PullSource{ 1222 Branch: sourceBranch, 1223 RepoAt: &forkAtUri, 1224 } 1225 recordPullSource := &tangled.RepoPull_Source{ 1226 Branch: sourceBranch, 1227 Repo: &forkAtUriStr, 1228 Sha: sourceRev, 1229 } 1230 1231 s.createPullRequest(w, r, repo, user, title, body, targetBranch, patch, combined, sourceRev, pullSource, recordPullSource, isStacked) 1232} 1233 1234func (s *Pulls) createPullRequest( 1235 w http.ResponseWriter, 1236 r *http.Request, 1237 repo *models.Repo, 1238 user *oauth.MultiAccountUser, 1239 title, body, targetBranch string, 1240 patch string, 1241 combined string, 1242 sourceRev string, 1243 pullSource *models.PullSource, 1244 recordPullSource *tangled.RepoPull_Source, 1245 isStacked bool, 1246) { 1247 if isStacked { 1248 // creates a series of PRs, each linking to the previous, identified by jj's change-id 1249 s.createStackedPullRequest( 1250 w, 1251 r, 1252 repo, 1253 user, 1254 targetBranch, 1255 patch, 1256 sourceRev, 1257 pullSource, 1258 ) 1259 return 1260 } 1261 1262 client, err := s.oauth.AuthorizedClient(r) 1263 if err != nil { 1264 log.Println("failed to get authorized client", err) 1265 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1266 return 1267 } 1268 1269 tx, err := s.db.BeginTx(r.Context(), nil) 1270 if err != nil { 1271 log.Println("failed to start tx") 1272 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1273 return 1274 } 1275 defer tx.Rollback() 1276 1277 // We've already checked earlier if it's diff-based and title is empty, 1278 // so if it's still empty now, it's intentionally skipped owing to format-patch. 1279 if title == "" || body == "" { 1280 formatPatches, err := patchutil.ExtractPatches(patch) 1281 if err != nil { 1282 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to extract patches: %v", err)) 1283 return 1284 } 1285 if len(formatPatches) == 0 { 1286 s.pages.Notice(w, "pull", "No patches found in the supplied format-patch.") 1287 return 1288 } 1289 1290 if title == "" { 1291 title = formatPatches[0].Title 1292 } 1293 if body == "" { 1294 body = formatPatches[0].Body 1295 } 1296 } 1297 1298 mentions, references := s.mentionsResolver.Resolve(r.Context(), body) 1299 1300 rkey := tid.TID() 1301 initialSubmission := models.PullSubmission{ 1302 Patch: patch, 1303 Combined: combined, 1304 SourceRev: sourceRev, 1305 } 1306 pull := &models.Pull{ 1307 Title: title, 1308 Body: body, 1309 TargetBranch: targetBranch, 1310 OwnerDid: user.Active.Did, 1311 RepoAt: repo.RepoAt(), 1312 Rkey: rkey, 1313 Mentions: mentions, 1314 References: references, 1315 Submissions: []*models.PullSubmission{ 1316 &initialSubmission, 1317 }, 1318 PullSource: pullSource, 1319 } 1320 err = db.NewPull(tx, pull) 1321 if err != nil { 1322 log.Println("failed to create pull request", err) 1323 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1324 return 1325 } 1326 pullId, err := db.NextPullId(tx, repo.RepoAt()) 1327 if err != nil { 1328 log.Println("failed to get pull id", err) 1329 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1330 return 1331 } 1332 1333 blob, err := xrpc.RepoUploadBlob(r.Context(), client, gz(patch), ApplicationGzip) 1334 if err != nil { 1335 log.Println("failed to upload patch", err) 1336 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1337 return 1338 } 1339 1340 _, err = comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 1341 Collection: tangled.RepoPullNSID, 1342 Repo: user.Active.Did, 1343 Rkey: rkey, 1344 Record: &lexutil.LexiconTypeDecoder{ 1345 Val: &tangled.RepoPull{ 1346 Title: title, 1347 Target: &tangled.RepoPull_Target{ 1348 Repo: string(repo.RepoAt()), 1349 Branch: targetBranch, 1350 }, 1351 PatchBlob: blob.Blob, 1352 Source: recordPullSource, 1353 CreatedAt: time.Now().Format(time.RFC3339), 1354 }, 1355 }, 1356 }) 1357 if err != nil { 1358 log.Println("failed to create pull request", err) 1359 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1360 return 1361 } 1362 1363 if err = tx.Commit(); err != nil { 1364 log.Println("failed to create pull request", err) 1365 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1366 return 1367 } 1368 1369 s.notifier.NewPull(r.Context(), pull) 1370 1371 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo) 1372 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pullId)) 1373} 1374 1375func (s *Pulls) createStackedPullRequest( 1376 w http.ResponseWriter, 1377 r *http.Request, 1378 repo *models.Repo, 1379 user *oauth.MultiAccountUser, 1380 targetBranch string, 1381 patch string, 1382 sourceRev string, 1383 pullSource *models.PullSource, 1384) { 1385 // run some necessary checks for stacked-prs first 1386 1387 // must be branch or fork based 1388 if sourceRev == "" { 1389 log.Println("stacked PR from patch-based pull") 1390 s.pages.Notice(w, "pull", "Stacking is only supported on branch and fork based pull-requests.") 1391 return 1392 } 1393 1394 formatPatches, err := patchutil.ExtractPatches(patch) 1395 if err != nil { 1396 log.Println("failed to extract patches", err) 1397 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to extract patches: %v", err)) 1398 return 1399 } 1400 1401 // must have atleast 1 patch to begin with 1402 if len(formatPatches) == 0 { 1403 log.Println("empty patches") 1404 s.pages.Notice(w, "pull", "No patches found in the generated format-patch.") 1405 return 1406 } 1407 1408 // build a stack out of this patch 1409 stackId := uuid.New() 1410 stack, err := s.newStack(r.Context(), repo, user, targetBranch, patch, pullSource, stackId.String()) 1411 if err != nil { 1412 log.Println("failed to create stack", err) 1413 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to create stack: %v", err)) 1414 return 1415 } 1416 1417 client, err := s.oauth.AuthorizedClient(r) 1418 if err != nil { 1419 log.Println("failed to get authorized client", err) 1420 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1421 return 1422 } 1423 1424 // apply all record creations at once 1425 var writes []*comatproto.RepoApplyWrites_Input_Writes_Elem 1426 for _, p := range stack { 1427 blob, err := xrpc.RepoUploadBlob(r.Context(), client, gz(p.LatestPatch()), ApplicationGzip) 1428 if err != nil { 1429 log.Println("failed to upload patch blob", err) 1430 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1431 return 1432 } 1433 1434 record := p.AsRecord() 1435 record.PatchBlob = blob.Blob 1436 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 1437 RepoApplyWrites_Create: &comatproto.RepoApplyWrites_Create{ 1438 Collection: tangled.RepoPullNSID, 1439 Rkey: &p.Rkey, 1440 Value: &lexutil.LexiconTypeDecoder{ 1441 Val: &record, 1442 }, 1443 }, 1444 }) 1445 } 1446 _, err = comatproto.RepoApplyWrites(r.Context(), client, &comatproto.RepoApplyWrites_Input{ 1447 Repo: user.Active.Did, 1448 Writes: writes, 1449 }) 1450 if err != nil { 1451 log.Println("failed to create stacked pull request", err) 1452 s.pages.Notice(w, "pull", "Failed to create stacked pull request. Try again later.") 1453 return 1454 } 1455 1456 // create all pulls at once 1457 tx, err := s.db.BeginTx(r.Context(), nil) 1458 if err != nil { 1459 log.Println("failed to start tx") 1460 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1461 return 1462 } 1463 defer tx.Rollback() 1464 1465 for _, p := range stack { 1466 err = db.NewPull(tx, p) 1467 if err != nil { 1468 log.Println("failed to create pull request", err) 1469 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1470 return 1471 } 1472 1473 } 1474 1475 if err = tx.Commit(); err != nil { 1476 log.Println("failed to create pull request", err) 1477 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1478 return 1479 } 1480 1481 // notify about each pull 1482 // 1483 // this is performed after tx.Commit, because it could result in a locked DB otherwise 1484 for _, p := range stack { 1485 s.notifier.NewPull(r.Context(), p) 1486 } 1487 1488 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo) 1489 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls", ownerSlashRepo)) 1490} 1491 1492func (s *Pulls) ValidatePatch(w http.ResponseWriter, r *http.Request) { 1493 _, err := s.repoResolver.Resolve(r) 1494 if err != nil { 1495 log.Println("failed to get repo and knot", err) 1496 return 1497 } 1498 1499 patch := r.FormValue("patch") 1500 if patch == "" { 1501 s.pages.Notice(w, "patch-error", "Patch is required.") 1502 return 1503 } 1504 1505 if err := validatePatch(&patch); err != nil { 1506 s.logger.Error("faield to validate patch", "err", err) 1507 s.pages.Notice(w, "patch-error", "Invalid patch format. Please provide a valid git diff or format-patch.") 1508 return 1509 } 1510 1511 if patchutil.IsFormatPatch(patch) { 1512 s.pages.Notice(w, "patch-preview", "git-format-patch detected. Title and description are optional; if left out, they will be extracted from the first commit.") 1513 } else { 1514 s.pages.Notice(w, "patch-preview", "Regular git-diff detected. Please provide a title and description.") 1515 } 1516} 1517 1518func (s *Pulls) PatchUploadFragment(w http.ResponseWriter, r *http.Request) { 1519 user := s.oauth.GetMultiAccountUser(r) 1520 1521 s.pages.PullPatchUploadFragment(w, pages.PullPatchUploadParams{ 1522 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1523 }) 1524} 1525 1526func (s *Pulls) CompareBranchesFragment(w http.ResponseWriter, r *http.Request) { 1527 user := s.oauth.GetMultiAccountUser(r) 1528 f, err := s.repoResolver.Resolve(r) 1529 if err != nil { 1530 log.Println("failed to get repo and knot", err) 1531 return 1532 } 1533 1534 scheme := "http" 1535 if !s.config.Core.Dev { 1536 scheme = "https" 1537 } 1538 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 1539 xrpcc := &indigoxrpc.Client{ 1540 Host: host, 1541 } 1542 1543 repo := fmt.Sprintf("%s/%s", f.Did, f.Name) 1544 xrpcBytes, err := tangled.RepoBranches(r.Context(), xrpcc, "", 0, repo) 1545 if err != nil { 1546 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1547 log.Println("failed to call XRPC repo.branches", xrpcerr) 1548 s.pages.Error503(w) 1549 return 1550 } 1551 log.Println("failed to fetch branches", err) 1552 return 1553 } 1554 1555 var result types.RepoBranchesResponse 1556 if err := json.Unmarshal(xrpcBytes, &result); err != nil { 1557 log.Println("failed to decode XRPC response", err) 1558 s.pages.Error503(w) 1559 return 1560 } 1561 1562 branches := result.Branches 1563 sort.Slice(branches, func(i int, j int) bool { 1564 return branches[i].Commit.Committer.When.After(branches[j].Commit.Committer.When) 1565 }) 1566 1567 withoutDefault := []types.Branch{} 1568 for _, b := range branches { 1569 if b.IsDefault { 1570 continue 1571 } 1572 withoutDefault = append(withoutDefault, b) 1573 } 1574 1575 s.pages.PullCompareBranchesFragment(w, pages.PullCompareBranchesParams{ 1576 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1577 Branches: withoutDefault, 1578 }) 1579} 1580 1581func (s *Pulls) CompareForksFragment(w http.ResponseWriter, r *http.Request) { 1582 user := s.oauth.GetMultiAccountUser(r) 1583 1584 forks, err := db.GetForksByDid(s.db, user.Active.Did) 1585 if err != nil { 1586 log.Println("failed to get forks", err) 1587 return 1588 } 1589 1590 s.pages.PullCompareForkFragment(w, pages.PullCompareForkParams{ 1591 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1592 Forks: forks, 1593 Selected: r.URL.Query().Get("fork"), 1594 }) 1595} 1596 1597func (s *Pulls) CompareForksBranchesFragment(w http.ResponseWriter, r *http.Request) { 1598 user := s.oauth.GetMultiAccountUser(r) 1599 1600 f, err := s.repoResolver.Resolve(r) 1601 if err != nil { 1602 log.Println("failed to get repo and knot", err) 1603 return 1604 } 1605 1606 forkVal := r.URL.Query().Get("fork") 1607 repoString := strings.SplitN(forkVal, "/", 2) 1608 forkOwnerDid := repoString[0] 1609 forkName := repoString[1] 1610 // fork repo 1611 repo, err := db.GetRepo( 1612 s.db, 1613 orm.FilterEq("did", forkOwnerDid), 1614 orm.FilterEq("name", forkName), 1615 ) 1616 if err != nil { 1617 log.Println("failed to get repo", "did", forkOwnerDid, "name", forkName, "err", err) 1618 return 1619 } 1620 1621 sourceScheme := "http" 1622 if !s.config.Core.Dev { 1623 sourceScheme = "https" 1624 } 1625 sourceHost := fmt.Sprintf("%s://%s", sourceScheme, repo.Knot) 1626 sourceXrpcc := &indigoxrpc.Client{ 1627 Host: sourceHost, 1628 } 1629 1630 sourceRepo := fmt.Sprintf("%s/%s", forkOwnerDid, repo.Name) 1631 sourceXrpcBytes, err := tangled.RepoBranches(r.Context(), sourceXrpcc, "", 0, sourceRepo) 1632 if err != nil { 1633 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1634 log.Println("failed to call XRPC repo.branches for source", xrpcerr) 1635 s.pages.Error503(w) 1636 return 1637 } 1638 log.Println("failed to fetch source branches", err) 1639 return 1640 } 1641 1642 // Decode source branches 1643 var sourceBranches types.RepoBranchesResponse 1644 if err := json.Unmarshal(sourceXrpcBytes, &sourceBranches); err != nil { 1645 log.Println("failed to decode source branches XRPC response", err) 1646 s.pages.Error503(w) 1647 return 1648 } 1649 1650 targetScheme := "http" 1651 if !s.config.Core.Dev { 1652 targetScheme = "https" 1653 } 1654 targetHost := fmt.Sprintf("%s://%s", targetScheme, f.Knot) 1655 targetXrpcc := &indigoxrpc.Client{ 1656 Host: targetHost, 1657 } 1658 1659 targetRepo := fmt.Sprintf("%s/%s", f.Did, f.Name) 1660 targetXrpcBytes, err := tangled.RepoBranches(r.Context(), targetXrpcc, "", 0, targetRepo) 1661 if err != nil { 1662 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1663 log.Println("failed to call XRPC repo.branches for target", xrpcerr) 1664 s.pages.Error503(w) 1665 return 1666 } 1667 log.Println("failed to fetch target branches", err) 1668 return 1669 } 1670 1671 // Decode target branches 1672 var targetBranches types.RepoBranchesResponse 1673 if err := json.Unmarshal(targetXrpcBytes, &targetBranches); err != nil { 1674 log.Println("failed to decode target branches XRPC response", err) 1675 s.pages.Error503(w) 1676 return 1677 } 1678 1679 sort.Slice(sourceBranches.Branches, func(i int, j int) bool { 1680 return sourceBranches.Branches[i].Commit.Committer.When.After(sourceBranches.Branches[j].Commit.Committer.When) 1681 }) 1682 1683 s.pages.PullCompareForkBranchesFragment(w, pages.PullCompareForkBranchesParams{ 1684 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1685 SourceBranches: sourceBranches.Branches, 1686 TargetBranches: targetBranches.Branches, 1687 }) 1688} 1689 1690func (s *Pulls) ResubmitPull(w http.ResponseWriter, r *http.Request) { 1691 user := s.oauth.GetMultiAccountUser(r) 1692 1693 pull, ok := r.Context().Value("pull").(*models.Pull) 1694 if !ok { 1695 log.Println("failed to get pull") 1696 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 1697 return 1698 } 1699 1700 switch r.Method { 1701 case http.MethodGet: 1702 s.pages.PullResubmitFragment(w, pages.PullResubmitParams{ 1703 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1704 Pull: pull, 1705 }) 1706 return 1707 case http.MethodPost: 1708 if pull.IsPatchBased() { 1709 s.resubmitPatch(w, r) 1710 return 1711 } else if pull.IsBranchBased() { 1712 s.resubmitBranch(w, r) 1713 return 1714 } else if pull.IsForkBased() { 1715 s.resubmitFork(w, r) 1716 return 1717 } 1718 } 1719} 1720 1721func (s *Pulls) resubmitPatch(w http.ResponseWriter, r *http.Request) { 1722 user := s.oauth.GetMultiAccountUser(r) 1723 1724 pull, ok := r.Context().Value("pull").(*models.Pull) 1725 if !ok { 1726 log.Println("failed to get pull") 1727 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 1728 return 1729 } 1730 1731 f, err := s.repoResolver.Resolve(r) 1732 if err != nil { 1733 log.Println("failed to get repo and knot", err) 1734 return 1735 } 1736 1737 if user.Active.Did != pull.OwnerDid { 1738 log.Println("unauthorized user") 1739 w.WriteHeader(http.StatusUnauthorized) 1740 return 1741 } 1742 1743 patch := r.FormValue("patch") 1744 1745 s.resubmitPullHelper(w, r, f, user, pull, patch, "", "") 1746} 1747 1748func (s *Pulls) resubmitBranch(w http.ResponseWriter, r *http.Request) { 1749 user := s.oauth.GetMultiAccountUser(r) 1750 1751 pull, ok := r.Context().Value("pull").(*models.Pull) 1752 if !ok { 1753 log.Println("failed to get pull") 1754 s.pages.Notice(w, "resubmit-error", "Failed to edit patch. Try again later.") 1755 return 1756 } 1757 1758 f, err := s.repoResolver.Resolve(r) 1759 if err != nil { 1760 log.Println("failed to get repo and knot", err) 1761 return 1762 } 1763 1764 if user.Active.Did != pull.OwnerDid { 1765 log.Println("unauthorized user") 1766 w.WriteHeader(http.StatusUnauthorized) 1767 return 1768 } 1769 1770 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())} 1771 if !roles.IsPushAllowed() { 1772 log.Println("unauthorized user") 1773 w.WriteHeader(http.StatusUnauthorized) 1774 return 1775 } 1776 1777 scheme := "http" 1778 if !s.config.Core.Dev { 1779 scheme = "https" 1780 } 1781 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 1782 xrpcc := &indigoxrpc.Client{ 1783 Host: host, 1784 } 1785 1786 repo := fmt.Sprintf("%s/%s", f.Did, f.Name) 1787 xrpcBytes, err := tangled.RepoCompare(r.Context(), xrpcc, repo, pull.TargetBranch, pull.PullSource.Branch) 1788 if err != nil { 1789 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1790 log.Println("failed to call XRPC repo.compare", xrpcerr) 1791 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1792 return 1793 } 1794 log.Printf("compare request failed: %s", err) 1795 s.pages.Notice(w, "resubmit-error", err.Error()) 1796 return 1797 } 1798 1799 var comparison types.RepoFormatPatchResponse 1800 if err := json.Unmarshal(xrpcBytes, &comparison); err != nil { 1801 log.Println("failed to decode XRPC compare response", err) 1802 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1803 return 1804 } 1805 1806 sourceRev := comparison.Rev2 1807 patch := comparison.FormatPatchRaw 1808 combined := comparison.CombinedPatchRaw 1809 1810 s.resubmitPullHelper(w, r, f, user, pull, patch, combined, sourceRev) 1811} 1812 1813func (s *Pulls) resubmitFork(w http.ResponseWriter, r *http.Request) { 1814 user := s.oauth.GetMultiAccountUser(r) 1815 1816 pull, ok := r.Context().Value("pull").(*models.Pull) 1817 if !ok { 1818 log.Println("failed to get pull") 1819 s.pages.Notice(w, "resubmit-error", "Failed to edit patch. Try again later.") 1820 return 1821 } 1822 1823 f, err := s.repoResolver.Resolve(r) 1824 if err != nil { 1825 log.Println("failed to get repo and knot", err) 1826 return 1827 } 1828 1829 if user.Active.Did != pull.OwnerDid { 1830 log.Println("unauthorized user") 1831 w.WriteHeader(http.StatusUnauthorized) 1832 return 1833 } 1834 1835 forkRepo, err := db.GetRepoByAtUri(s.db, pull.PullSource.RepoAt.String()) 1836 if err != nil { 1837 log.Println("failed to get source repo", err) 1838 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1839 return 1840 } 1841 1842 // update the hidden tracking branch to latest 1843 client, err := s.oauth.ServiceClient( 1844 r, 1845 oauth.WithService(forkRepo.Knot), 1846 oauth.WithLxm(tangled.RepoHiddenRefNSID), 1847 oauth.WithDev(s.config.Core.Dev), 1848 ) 1849 if err != nil { 1850 log.Printf("failed to connect to knot server: %v", err) 1851 return 1852 } 1853 1854 resp, err := tangled.RepoHiddenRef( 1855 r.Context(), 1856 client, 1857 &tangled.RepoHiddenRef_Input{ 1858 ForkRef: pull.PullSource.Branch, 1859 RemoteRef: pull.TargetBranch, 1860 Repo: forkRepo.RepoAt().String(), 1861 }, 1862 ) 1863 if err := xrpcclient.HandleXrpcErr(err); err != nil { 1864 s.pages.Notice(w, "resubmit-error", err.Error()) 1865 return 1866 } 1867 if !resp.Success { 1868 log.Println("Failed to update tracking ref.", "err", resp.Error) 1869 s.pages.Notice(w, "resubmit-error", "Failed to update tracking ref.") 1870 return 1871 } 1872 1873 hiddenRef := fmt.Sprintf("hidden/%s/%s", pull.PullSource.Branch, pull.TargetBranch) 1874 // extract patch by performing compare 1875 forkScheme := "http" 1876 if !s.config.Core.Dev { 1877 forkScheme = "https" 1878 } 1879 forkHost := fmt.Sprintf("%s://%s", forkScheme, forkRepo.Knot) 1880 forkRepoId := fmt.Sprintf("%s/%s", forkRepo.Did, forkRepo.Name) 1881 forkXrpcBytes, err := tangled.RepoCompare(r.Context(), &indigoxrpc.Client{Host: forkHost}, forkRepoId, hiddenRef, pull.PullSource.Branch) 1882 if err != nil { 1883 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1884 log.Println("failed to call XRPC repo.compare for fork", xrpcerr) 1885 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1886 return 1887 } 1888 log.Printf("failed to compare branches: %s", err) 1889 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1890 return 1891 } 1892 1893 var forkComparison types.RepoFormatPatchResponse 1894 if err := json.Unmarshal(forkXrpcBytes, &forkComparison); err != nil { 1895 log.Println("failed to decode XRPC compare response for fork", err) 1896 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1897 return 1898 } 1899 1900 // Use the fork comparison we already made 1901 comparison := forkComparison 1902 1903 sourceRev := comparison.Rev2 1904 patch := comparison.FormatPatchRaw 1905 combined := comparison.CombinedPatchRaw 1906 1907 s.resubmitPullHelper(w, r, f, user, pull, patch, combined, sourceRev) 1908} 1909 1910func (s *Pulls) resubmitPullHelper( 1911 w http.ResponseWriter, 1912 r *http.Request, 1913 repo *models.Repo, 1914 user *oauth.MultiAccountUser, 1915 pull *models.Pull, 1916 patch string, 1917 combined string, 1918 sourceRev string, 1919) { 1920 if pull.IsStacked() { 1921 log.Println("resubmitting stacked PR") 1922 s.resubmitStackedPullHelper(w, r, repo, user, pull, patch, pull.StackId) 1923 return 1924 } 1925 1926 if err := validatePatch(&patch); err != nil { 1927 s.pages.Notice(w, "resubmit-error", err.Error()) 1928 return 1929 } 1930 1931 if patch == pull.LatestPatch() { 1932 s.pages.Notice(w, "resubmit-error", "Patch is identical to previous submission.") 1933 return 1934 } 1935 1936 // validate sourceRev if branch/fork based 1937 if pull.IsBranchBased() || pull.IsForkBased() { 1938 if sourceRev == pull.LatestSha() { 1939 s.pages.Notice(w, "resubmit-error", "This branch has not changed since the last submission.") 1940 return 1941 } 1942 } 1943 1944 tx, err := s.db.BeginTx(r.Context(), nil) 1945 if err != nil { 1946 log.Println("failed to start tx") 1947 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1948 return 1949 } 1950 defer tx.Rollback() 1951 1952 pullAt := pull.AtUri() 1953 newRoundNumber := len(pull.Submissions) 1954 newPatch := patch 1955 newSourceRev := sourceRev 1956 combinedPatch := combined 1957 err = db.ResubmitPull(tx, pullAt, newRoundNumber, newPatch, combinedPatch, newSourceRev) 1958 if err != nil { 1959 log.Println("failed to create pull request", err) 1960 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1961 return 1962 } 1963 client, err := s.oauth.AuthorizedClient(r) 1964 if err != nil { 1965 log.Println("failed to authorize client") 1966 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1967 return 1968 } 1969 1970 ex, err := comatproto.RepoGetRecord(r.Context(), client, "", tangled.RepoPullNSID, user.Active.Did, pull.Rkey) 1971 if err != nil { 1972 // failed to get record 1973 s.pages.Notice(w, "resubmit-error", "Failed to update pull, no record found on PDS.") 1974 return 1975 } 1976 1977 blob, err := xrpc.RepoUploadBlob(r.Context(), client, gz(patch), ApplicationGzip) 1978 if err != nil { 1979 log.Println("failed to upload patch blob", err) 1980 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 1981 return 1982 } 1983 record := pull.AsRecord() 1984 record.PatchBlob = blob.Blob 1985 record.CreatedAt = time.Now().Format(time.RFC3339) 1986 1987 if record.Source != nil { 1988 record.Source.Sha = newSourceRev 1989 } 1990 1991 _, err = comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 1992 Collection: tangled.RepoPullNSID, 1993 Repo: user.Active.Did, 1994 Rkey: pull.Rkey, 1995 SwapRecord: ex.Cid, 1996 Record: &lexutil.LexiconTypeDecoder{ 1997 Val: &record, 1998 }, 1999 }) 2000 if err != nil { 2001 log.Println("failed to update record", err) 2002 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 2003 return 2004 } 2005 2006 if err = tx.Commit(); err != nil { 2007 log.Println("failed to commit transaction", err) 2008 s.pages.Notice(w, "resubmit-error", "Failed to resubmit pull.") 2009 return 2010 } 2011 2012 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo) 2013 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 2014} 2015 2016func (s *Pulls) resubmitStackedPullHelper( 2017 w http.ResponseWriter, 2018 r *http.Request, 2019 repo *models.Repo, 2020 user *oauth.MultiAccountUser, 2021 pull *models.Pull, 2022 patch string, 2023 stackId string, 2024) { 2025 targetBranch := pull.TargetBranch 2026 2027 origStack, _ := r.Context().Value("stack").(models.Stack) 2028 newStack, err := s.newStack(r.Context(), repo, user, targetBranch, patch, pull.PullSource, stackId) 2029 if err != nil { 2030 log.Println("failed to create resubmitted stack", err) 2031 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2032 return 2033 } 2034 2035 // find the diff between the stacks, first, map them by changeId 2036 origById := make(map[string]*models.Pull) 2037 newById := make(map[string]*models.Pull) 2038 for _, p := range origStack { 2039 origById[p.ChangeId] = p 2040 } 2041 for _, p := range newStack { 2042 newById[p.ChangeId] = p 2043 } 2044 2045 // commits that got deleted: corresponding pull is closed 2046 // commits that got added: new pull is created 2047 // commits that got updated: corresponding pull is resubmitted & new round begins 2048 additions := make(map[string]*models.Pull) 2049 deletions := make(map[string]*models.Pull) 2050 updated := make(map[string]struct{}) 2051 2052 // pulls in orignal stack but not in new one 2053 for _, op := range origStack { 2054 if _, ok := newById[op.ChangeId]; !ok { 2055 deletions[op.ChangeId] = op 2056 } 2057 } 2058 2059 // pulls in new stack but not in original one 2060 for _, np := range newStack { 2061 if _, ok := origById[np.ChangeId]; !ok { 2062 additions[np.ChangeId] = np 2063 } 2064 } 2065 2066 // NOTE: this loop can be written in any of above blocks, 2067 // but is written separately in the interest of simpler code 2068 for _, np := range newStack { 2069 if op, ok := origById[np.ChangeId]; ok { 2070 // pull exists in both stacks 2071 updated[op.ChangeId] = struct{}{} 2072 } 2073 } 2074 2075 tx, err := s.db.Begin() 2076 if err != nil { 2077 log.Println("failed to start transaction", err) 2078 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2079 return 2080 } 2081 defer tx.Rollback() 2082 2083 client, err := s.oauth.AuthorizedClient(r) 2084 if err != nil { 2085 log.Println("failed to authorize client") 2086 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 2087 return 2088 } 2089 2090 // pds updates to make 2091 var writes []*comatproto.RepoApplyWrites_Input_Writes_Elem 2092 2093 // deleted pulls are marked as deleted in the DB 2094 for _, p := range deletions { 2095 // do not do delete already merged PRs 2096 if p.State == models.PullMerged { 2097 continue 2098 } 2099 2100 err := db.DeletePull(tx, p.RepoAt, p.PullId) 2101 if err != nil { 2102 log.Println("failed to delete pull", err, p.PullId) 2103 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2104 return 2105 } 2106 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 2107 RepoApplyWrites_Delete: &comatproto.RepoApplyWrites_Delete{ 2108 Collection: tangled.RepoPullNSID, 2109 Rkey: p.Rkey, 2110 }, 2111 }) 2112 } 2113 2114 // new pulls are created 2115 for _, p := range additions { 2116 err := db.NewPull(tx, p) 2117 if err != nil { 2118 log.Println("failed to create pull", err, p.PullId) 2119 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2120 return 2121 } 2122 2123 blob, err := xrpc.RepoUploadBlob(r.Context(), client, gz(patch), ApplicationGzip) 2124 if err != nil { 2125 log.Println("failed to upload patch blob", err) 2126 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 2127 return 2128 } 2129 record := p.AsRecord() 2130 record.PatchBlob = blob.Blob 2131 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 2132 RepoApplyWrites_Create: &comatproto.RepoApplyWrites_Create{ 2133 Collection: tangled.RepoPullNSID, 2134 Rkey: &p.Rkey, 2135 Value: &lexutil.LexiconTypeDecoder{ 2136 Val: &record, 2137 }, 2138 }, 2139 }) 2140 } 2141 2142 // updated pulls are, well, updated; to start a new round 2143 for id := range updated { 2144 op, _ := origById[id] 2145 np, _ := newById[id] 2146 2147 // do not update already merged PRs 2148 if op.State == models.PullMerged { 2149 continue 2150 } 2151 2152 // resubmit the new pull 2153 pullAt := op.AtUri() 2154 newRoundNumber := len(op.Submissions) 2155 newPatch := np.LatestPatch() 2156 combinedPatch := np.LatestSubmission().Combined 2157 newSourceRev := np.LatestSha() 2158 err := db.ResubmitPull(tx, pullAt, newRoundNumber, newPatch, combinedPatch, newSourceRev) 2159 if err != nil { 2160 log.Println("failed to update pull", err, op.PullId) 2161 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2162 return 2163 } 2164 2165 blob, err := xrpc.RepoUploadBlob(r.Context(), client, gz(patch), ApplicationGzip) 2166 if err != nil { 2167 log.Println("failed to upload patch blob", err) 2168 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 2169 return 2170 } 2171 record := np.AsRecord() 2172 record.PatchBlob = blob.Blob 2173 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 2174 RepoApplyWrites_Update: &comatproto.RepoApplyWrites_Update{ 2175 Collection: tangled.RepoPullNSID, 2176 Rkey: op.Rkey, 2177 Value: &lexutil.LexiconTypeDecoder{ 2178 Val: &record, 2179 }, 2180 }, 2181 }) 2182 } 2183 2184 // update parent-change-id relations for the entire stack 2185 for _, p := range newStack { 2186 err := db.SetPullParentChangeId( 2187 tx, 2188 p.ParentChangeId, 2189 // these should be enough filters to be unique per-stack 2190 orm.FilterEq("repo_at", p.RepoAt.String()), 2191 orm.FilterEq("owner_did", p.OwnerDid), 2192 orm.FilterEq("change_id", p.ChangeId), 2193 ) 2194 2195 if err != nil { 2196 log.Println("failed to update pull", err, p.PullId) 2197 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2198 return 2199 } 2200 } 2201 2202 err = tx.Commit() 2203 if err != nil { 2204 log.Println("failed to resubmit pull", err) 2205 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2206 return 2207 } 2208 2209 _, err = comatproto.RepoApplyWrites(r.Context(), client, &comatproto.RepoApplyWrites_Input{ 2210 Repo: user.Active.Did, 2211 Writes: writes, 2212 }) 2213 if err != nil { 2214 log.Println("failed to create stacked pull request", err) 2215 s.pages.Notice(w, "pull", "Failed to create stacked pull request. Try again later.") 2216 return 2217 } 2218 2219 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo) 2220 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 2221} 2222 2223func (s *Pulls) MergePull(w http.ResponseWriter, r *http.Request) { 2224 user := s.oauth.GetMultiAccountUser(r) 2225 f, err := s.repoResolver.Resolve(r) 2226 if err != nil { 2227 log.Println("failed to resolve repo:", err) 2228 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2229 return 2230 } 2231 2232 pull, ok := r.Context().Value("pull").(*models.Pull) 2233 if !ok { 2234 log.Println("failed to get pull") 2235 s.pages.Notice(w, "pull-merge-error", "Failed to merge patch. Try again later.") 2236 return 2237 } 2238 2239 var pullsToMerge models.Stack 2240 pullsToMerge = append(pullsToMerge, pull) 2241 if pull.IsStacked() { 2242 stack, ok := r.Context().Value("stack").(models.Stack) 2243 if !ok { 2244 log.Println("failed to get stack") 2245 s.pages.Notice(w, "pull-merge-error", "Failed to merge patch. Try again later.") 2246 return 2247 } 2248 2249 // combine patches of substack 2250 subStack := stack.StrictlyBelow(pull) 2251 // collect the portion of the stack that is mergeable 2252 mergeable := subStack.Mergeable() 2253 // add to total patch 2254 pullsToMerge = append(pullsToMerge, mergeable...) 2255 } 2256 2257 patch := pullsToMerge.CombinedPatch() 2258 2259 ident, err := s.idResolver.ResolveIdent(r.Context(), pull.OwnerDid) 2260 if err != nil { 2261 log.Printf("resolving identity: %s", err) 2262 w.WriteHeader(http.StatusNotFound) 2263 return 2264 } 2265 2266 email, err := db.GetPrimaryEmail(s.db, pull.OwnerDid) 2267 if err != nil { 2268 log.Printf("failed to get primary email: %s", err) 2269 } 2270 2271 authorName := ident.Handle.String() 2272 mergeInput := &tangled.RepoMerge_Input{ 2273 Did: f.Did, 2274 Name: f.Name, 2275 Branch: pull.TargetBranch, 2276 Patch: patch, 2277 CommitMessage: &pull.Title, 2278 AuthorName: &authorName, 2279 } 2280 2281 if pull.Body != "" { 2282 mergeInput.CommitBody = &pull.Body 2283 } 2284 2285 if email.Address != "" { 2286 mergeInput.AuthorEmail = &email.Address 2287 } 2288 2289 client, err := s.oauth.ServiceClient( 2290 r, 2291 oauth.WithService(f.Knot), 2292 oauth.WithLxm(tangled.RepoMergeNSID), 2293 oauth.WithDev(s.config.Core.Dev), 2294 ) 2295 if err != nil { 2296 log.Printf("failed to connect to knot server: %v", err) 2297 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2298 return 2299 } 2300 2301 err = tangled.RepoMerge(r.Context(), client, mergeInput) 2302 if err := xrpcclient.HandleXrpcErr(err); err != nil { 2303 s.pages.Notice(w, "pull-merge-error", err.Error()) 2304 return 2305 } 2306 2307 tx, err := s.db.Begin() 2308 if err != nil { 2309 log.Println("failed to start transcation", err) 2310 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2311 return 2312 } 2313 defer tx.Rollback() 2314 2315 for _, p := range pullsToMerge { 2316 err := db.MergePull(tx, f.RepoAt(), p.PullId) 2317 if err != nil { 2318 log.Printf("failed to update pull request status in database: %s", err) 2319 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2320 return 2321 } 2322 p.State = models.PullMerged 2323 } 2324 2325 err = tx.Commit() 2326 if err != nil { 2327 // TODO: this is unsound, we should also revert the merge from the knotserver here 2328 log.Printf("failed to update pull request status in database: %s", err) 2329 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2330 return 2331 } 2332 2333 // notify about the pull merge 2334 for _, p := range pullsToMerge { 2335 s.notifier.NewPullState(r.Context(), syntax.DID(user.Active.Did), p) 2336 } 2337 2338 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f) 2339 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 2340} 2341 2342func (s *Pulls) ClosePull(w http.ResponseWriter, r *http.Request) { 2343 user := s.oauth.GetMultiAccountUser(r) 2344 2345 f, err := s.repoResolver.Resolve(r) 2346 if err != nil { 2347 log.Println("malformed middleware") 2348 return 2349 } 2350 2351 pull, ok := r.Context().Value("pull").(*models.Pull) 2352 if !ok { 2353 log.Println("failed to get pull") 2354 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 2355 return 2356 } 2357 2358 // auth filter: only owner or collaborators can close 2359 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())} 2360 isOwner := roles.IsOwner() 2361 isCollaborator := roles.IsCollaborator() 2362 isPullAuthor := user.Active.Did == pull.OwnerDid 2363 isCloseAllowed := isOwner || isCollaborator || isPullAuthor 2364 if !isCloseAllowed { 2365 log.Println("failed to close pull") 2366 s.pages.Notice(w, "pull-close", "You are unauthorized to close this pull.") 2367 return 2368 } 2369 2370 // Start a transaction 2371 tx, err := s.db.BeginTx(r.Context(), nil) 2372 if err != nil { 2373 log.Println("failed to start transaction", err) 2374 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2375 return 2376 } 2377 defer tx.Rollback() 2378 2379 var pullsToClose []*models.Pull 2380 pullsToClose = append(pullsToClose, pull) 2381 2382 // if this PR is stacked, then we want to close all PRs below this one on the stack 2383 if pull.IsStacked() { 2384 stack := r.Context().Value("stack").(models.Stack) 2385 subStack := stack.StrictlyBelow(pull) 2386 pullsToClose = append(pullsToClose, subStack...) 2387 } 2388 2389 for _, p := range pullsToClose { 2390 // Close the pull in the database 2391 err = db.ClosePull(tx, f.RepoAt(), p.PullId) 2392 if err != nil { 2393 log.Println("failed to close pull", err) 2394 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2395 return 2396 } 2397 p.State = models.PullClosed 2398 } 2399 2400 // Commit the transaction 2401 if err = tx.Commit(); err != nil { 2402 log.Println("failed to commit transaction", err) 2403 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2404 return 2405 } 2406 2407 for _, p := range pullsToClose { 2408 s.notifier.NewPullState(r.Context(), syntax.DID(user.Active.Did), p) 2409 } 2410 2411 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f) 2412 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 2413} 2414 2415func (s *Pulls) ReopenPull(w http.ResponseWriter, r *http.Request) { 2416 user := s.oauth.GetMultiAccountUser(r) 2417 2418 f, err := s.repoResolver.Resolve(r) 2419 if err != nil { 2420 log.Println("failed to resolve repo", err) 2421 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 2422 return 2423 } 2424 2425 pull, ok := r.Context().Value("pull").(*models.Pull) 2426 if !ok { 2427 log.Println("failed to get pull") 2428 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 2429 return 2430 } 2431 2432 // auth filter: only owner or collaborators can close 2433 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())} 2434 isOwner := roles.IsOwner() 2435 isCollaborator := roles.IsCollaborator() 2436 isPullAuthor := user.Active.Did == pull.OwnerDid 2437 isCloseAllowed := isOwner || isCollaborator || isPullAuthor 2438 if !isCloseAllowed { 2439 log.Println("failed to close pull") 2440 s.pages.Notice(w, "pull-close", "You are unauthorized to close this pull.") 2441 return 2442 } 2443 2444 // Start a transaction 2445 tx, err := s.db.BeginTx(r.Context(), nil) 2446 if err != nil { 2447 log.Println("failed to start transaction", err) 2448 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 2449 return 2450 } 2451 defer tx.Rollback() 2452 2453 var pullsToReopen []*models.Pull 2454 pullsToReopen = append(pullsToReopen, pull) 2455 2456 // if this PR is stacked, then we want to reopen all PRs above this one on the stack 2457 if pull.IsStacked() { 2458 stack := r.Context().Value("stack").(models.Stack) 2459 subStack := stack.StrictlyAbove(pull) 2460 pullsToReopen = append(pullsToReopen, subStack...) 2461 } 2462 2463 for _, p := range pullsToReopen { 2464 // Close the pull in the database 2465 err = db.ReopenPull(tx, f.RepoAt(), p.PullId) 2466 if err != nil { 2467 log.Println("failed to close pull", err) 2468 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2469 return 2470 } 2471 p.State = models.PullOpen 2472 } 2473 2474 // Commit the transaction 2475 if err = tx.Commit(); err != nil { 2476 log.Println("failed to commit transaction", err) 2477 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 2478 return 2479 } 2480 2481 for _, p := range pullsToReopen { 2482 s.notifier.NewPullState(r.Context(), syntax.DID(user.Active.Did), p) 2483 } 2484 2485 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f) 2486 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 2487} 2488 2489func (s *Pulls) newStack(ctx context.Context, repo *models.Repo, user *oauth.MultiAccountUser, targetBranch, patch string, pullSource *models.PullSource, stackId string) (models.Stack, error) { 2490 formatPatches, err := patchutil.ExtractPatches(patch) 2491 if err != nil { 2492 return nil, fmt.Errorf("Failed to extract patches: %v", err) 2493 } 2494 2495 // must have atleast 1 patch to begin with 2496 if len(formatPatches) == 0 { 2497 return nil, fmt.Errorf("No patches found in the generated format-patch.") 2498 } 2499 2500 // the stack is identified by a UUID 2501 var stack models.Stack 2502 parentChangeId := "" 2503 for _, fp := range formatPatches { 2504 // all patches must have a jj change-id 2505 changeId, err := fp.ChangeId() 2506 if err != nil { 2507 return nil, fmt.Errorf("Stacking is only supported if all patches contain a change-id commit header.") 2508 } 2509 2510 title := fp.Title 2511 body := fp.Body 2512 rkey := tid.TID() 2513 2514 mentions, references := s.mentionsResolver.Resolve(ctx, body) 2515 2516 initialSubmission := models.PullSubmission{ 2517 Patch: fp.Raw, 2518 SourceRev: fp.SHA, 2519 Combined: fp.Raw, 2520 } 2521 pull := models.Pull{ 2522 Title: title, 2523 Body: body, 2524 TargetBranch: targetBranch, 2525 OwnerDid: user.Active.Did, 2526 RepoAt: repo.RepoAt(), 2527 Rkey: rkey, 2528 Mentions: mentions, 2529 References: references, 2530 Submissions: []*models.PullSubmission{ 2531 &initialSubmission, 2532 }, 2533 PullSource: pullSource, 2534 Created: time.Now(), 2535 2536 StackId: stackId, 2537 ChangeId: changeId, 2538 ParentChangeId: parentChangeId, 2539 } 2540 2541 stack = append(stack, &pull) 2542 2543 parentChangeId = changeId 2544 } 2545 2546 return stack, nil 2547} 2548 2549func gz(s string) io.Reader { 2550 var b bytes.Buffer 2551 w := gzip.NewWriter(&b) 2552 w.Write([]byte(s)) 2553 w.Close() 2554 return &b 2555} 2556 2557func ptrPullState(s models.PullState) *models.PullState { return &s } 2558 2559func validatePatch(patch *string) error { 2560 if patch == nil || *patch == "" { 2561 return fmt.Errorf("patch is empty") 2562 } 2563 2564 // add newline if not present to diff style patches 2565 if !patchutil.IsFormatPatch(*patch) && !strings.HasSuffix(*patch, "\n") { 2566 *patch = *patch + "\n" 2567 } 2568 2569 if err := patchutil.IsPatchValid(*patch); err != nil { 2570 return err 2571 } 2572 2573 return nil 2574}