A vibe coded tangled fork which supports pijul.
1package pulls
2
3import (
4 "bytes"
5 "compress/gzip"
6 "context"
7 "database/sql"
8 "encoding/json"
9 "errors"
10 "fmt"
11 "io"
12 "log"
13 "log/slog"
14 "net/http"
15 "slices"
16 "sort"
17 "strconv"
18 "strings"
19 "time"
20
21 "tangled.org/core/api/tangled"
22 "tangled.org/core/appview/config"
23 "tangled.org/core/appview/db"
24 pulls_indexer "tangled.org/core/appview/indexer/pulls"
25 "tangled.org/core/appview/mentions"
26 "tangled.org/core/appview/models"
27 "tangled.org/core/appview/notify"
28 "tangled.org/core/appview/oauth"
29 "tangled.org/core/appview/pages"
30 "tangled.org/core/appview/pages/markup/sanitizer"
31 "tangled.org/core/appview/pages/repoinfo"
32 "tangled.org/core/appview/pagination"
33 "tangled.org/core/appview/reporesolver"
34 "tangled.org/core/appview/xrpcclient"
35 "tangled.org/core/idresolver"
36 "tangled.org/core/orm"
37 "tangled.org/core/patchutil"
38 "tangled.org/core/rbac"
39 "tangled.org/core/tid"
40 "tangled.org/core/types"
41
42 comatproto "github.com/bluesky-social/indigo/api/atproto"
43 "github.com/bluesky-social/indigo/atproto/syntax"
44 lexutil "github.com/bluesky-social/indigo/lex/util"
45 indigoxrpc "github.com/bluesky-social/indigo/xrpc"
46 "github.com/go-chi/chi/v5"
47 "github.com/google/uuid"
48)
49
50type Pulls struct {
51 oauth *oauth.OAuth
52 repoResolver *reporesolver.RepoResolver
53 pages *pages.Pages
54 idResolver *idresolver.Resolver
55 mentionsResolver *mentions.Resolver
56 db *db.DB
57 config *config.Config
58 notifier notify.Notifier
59 enforcer *rbac.Enforcer
60 logger *slog.Logger
61 indexer *pulls_indexer.Indexer
62}
63
64func New(
65 oauth *oauth.OAuth,
66 repoResolver *reporesolver.RepoResolver,
67 pages *pages.Pages,
68 resolver *idresolver.Resolver,
69 mentionsResolver *mentions.Resolver,
70 db *db.DB,
71 config *config.Config,
72 notifier notify.Notifier,
73 enforcer *rbac.Enforcer,
74 indexer *pulls_indexer.Indexer,
75 logger *slog.Logger,
76) *Pulls {
77 return &Pulls{
78 oauth: oauth,
79 repoResolver: repoResolver,
80 pages: pages,
81 idResolver: resolver,
82 mentionsResolver: mentionsResolver,
83 db: db,
84 config: config,
85 notifier: notifier,
86 enforcer: enforcer,
87 logger: logger,
88 indexer: indexer,
89 }
90}
91
92// htmx fragment
93func (s *Pulls) PullActions(w http.ResponseWriter, r *http.Request) {
94 switch r.Method {
95 case http.MethodGet:
96 user := s.oauth.GetMultiAccountUser(r)
97 f, err := s.repoResolver.Resolve(r)
98 if err != nil {
99 log.Println("failed to get repo and knot", err)
100 return
101 }
102
103 pull, ok := r.Context().Value("pull").(*models.Pull)
104 if !ok {
105 log.Println("failed to get pull")
106 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.")
107 return
108 }
109
110 // can be nil if this pull is not stacked
111 stack, _ := r.Context().Value("stack").(models.Stack)
112
113 roundNumberStr := chi.URLParam(r, "round")
114 roundNumber, err := strconv.Atoi(roundNumberStr)
115 if err != nil {
116 roundNumber = pull.LastRoundNumber()
117 }
118 if roundNumber >= len(pull.Submissions) {
119 http.Error(w, "bad round id", http.StatusBadRequest)
120 log.Println("failed to parse round id", err)
121 return
122 }
123
124 mergeCheckResponse := s.mergeCheck(r, f, pull, stack)
125 branchDeleteStatus := s.branchDeleteStatus(r, f, pull)
126 resubmitResult := pages.Unknown
127 if user.Active.Did == pull.OwnerDid {
128 resubmitResult = s.resubmitCheck(r, f, pull, stack)
129 }
130
131 s.pages.PullActionsFragment(w, pages.PullActionsParams{
132 LoggedInUser: user,
133 RepoInfo: s.repoResolver.GetRepoInfo(r, user),
134 Pull: pull,
135 RoundNumber: roundNumber,
136 MergeCheck: mergeCheckResponse,
137 ResubmitCheck: resubmitResult,
138 BranchDeleteStatus: branchDeleteStatus,
139 Stack: stack,
140 })
141 return
142 }
143}
144
145func (s *Pulls) repoPullHelper(w http.ResponseWriter, r *http.Request, interdiff bool) {
146 user := s.oauth.GetMultiAccountUser(r)
147 f, err := s.repoResolver.Resolve(r)
148 if err != nil {
149 log.Println("failed to get repo and knot", err)
150 return
151 }
152
153 pull, ok := r.Context().Value("pull").(*models.Pull)
154 if !ok {
155 log.Println("failed to get pull")
156 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.")
157 return
158 }
159
160 backlinks, err := db.GetBacklinks(s.db, pull.AtUri())
161 if err != nil {
162 log.Println("failed to get pull backlinks", err)
163 s.pages.Notice(w, "pull-error", "Failed to get pull. Try again later.")
164 return
165 }
166
167 roundId := chi.URLParam(r, "round")
168 roundIdInt := pull.LastRoundNumber()
169 if r, err := strconv.Atoi(roundId); err == nil {
170 roundIdInt = r
171 }
172 if roundIdInt >= len(pull.Submissions) {
173 http.Error(w, "bad round id", http.StatusBadRequest)
174 log.Println("failed to parse round id", err)
175 return
176 }
177
178 var diffOpts types.DiffOpts
179 if d := r.URL.Query().Get("diff"); d == "split" {
180 diffOpts.Split = true
181 }
182
183 // can be nil if this pull is not stacked
184 stack, _ := r.Context().Value("stack").(models.Stack)
185 abandonedPulls, _ := r.Context().Value("abandonedPulls").([]*models.Pull)
186
187 mergeCheckResponse := s.mergeCheck(r, f, pull, stack)
188 branchDeleteStatus := s.branchDeleteStatus(r, f, pull)
189 resubmitResult := pages.Unknown
190 if user != nil && user.Active != nil && user.Active.Did == pull.OwnerDid {
191 resubmitResult = s.resubmitCheck(r, f, pull, stack)
192 }
193
194 m := make(map[string]models.Pipeline)
195
196 var shas []string
197 for _, s := range pull.Submissions {
198 shas = append(shas, s.SourceRev)
199 }
200 for _, p := range stack {
201 shas = append(shas, p.LatestSha())
202 }
203 for _, p := range abandonedPulls {
204 shas = append(shas, p.LatestSha())
205 }
206
207 ps, err := db.GetPipelineStatuses(
208 s.db,
209 len(shas),
210 orm.FilterEq("repo_owner", f.Did),
211 orm.FilterEq("repo_name", f.Name),
212 orm.FilterEq("knot", f.Knot),
213 orm.FilterIn("sha", shas),
214 )
215 if err != nil {
216 log.Printf("failed to fetch pipeline statuses: %s", err)
217 // non-fatal
218 }
219
220 for _, p := range ps {
221 m[p.Sha] = p
222 }
223
224 reactionMap, err := db.GetReactionMap(s.db, 20, pull.AtUri())
225 if err != nil {
226 log.Println("failed to get pull reactions")
227 }
228
229 userReactions := map[models.ReactionKind]bool{}
230 if user != nil {
231 userReactions = db.GetReactionStatusMap(s.db, user.Active.Did, pull.AtUri())
232 }
233
234 labelDefs, err := db.GetLabelDefinitions(
235 s.db,
236 orm.FilterIn("at_uri", f.Labels),
237 orm.FilterContains("scope", tangled.RepoPullNSID),
238 )
239 if err != nil {
240 log.Println("failed to fetch labels", err)
241 s.pages.Error503(w)
242 return
243 }
244
245 defs := make(map[string]*models.LabelDefinition)
246 for _, l := range labelDefs {
247 defs[l.AtUri().String()] = &l
248 }
249
250 patch := pull.Submissions[roundIdInt].CombinedPatch()
251 var diff types.DiffRenderer
252 diff = patchutil.AsNiceDiff(patch, pull.TargetBranch)
253
254 if interdiff {
255 currentPatch, err := patchutil.AsDiff(pull.Submissions[roundIdInt].CombinedPatch())
256 if err != nil {
257 log.Println("failed to interdiff; current patch malformed")
258 s.pages.Notice(w, fmt.Sprintf("interdiff-error-%d", roundIdInt), "Failed to calculate interdiff; current patch is invalid.")
259 return
260 }
261
262 previousPatch, err := patchutil.AsDiff(pull.Submissions[roundIdInt-1].CombinedPatch())
263 if err != nil {
264 log.Println("failed to interdiff; previous patch malformed")
265 s.pages.Notice(w, fmt.Sprintf("interdiff-error-%d", roundIdInt), "Failed to calculate interdiff; previous patch is invalid.")
266 return
267 }
268
269 diff = patchutil.Interdiff(previousPatch, currentPatch)
270 }
271
272 s.pages.RepoSinglePull(w, pages.RepoSinglePullParams{
273 LoggedInUser: user,
274 RepoInfo: s.repoResolver.GetRepoInfo(r, user),
275 Pull: pull,
276 Stack: stack,
277 AbandonedPulls: abandonedPulls,
278 Backlinks: backlinks,
279 BranchDeleteStatus: branchDeleteStatus,
280 MergeCheck: mergeCheckResponse,
281 ResubmitCheck: resubmitResult,
282 Pipelines: m,
283 Diff: diff,
284 DiffOpts: diffOpts,
285 ActiveRound: roundIdInt,
286 IsInterdiff: interdiff,
287
288 Reactions: reactionMap,
289 UserReacted: userReactions,
290
291 LabelDefs: defs,
292 })
293}
294
295func (s *Pulls) RepoSinglePull(w http.ResponseWriter, r *http.Request) {
296 pull, ok := r.Context().Value("pull").(*models.Pull)
297 if !ok {
298 log.Println("failed to get pull")
299 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.")
300 return
301 }
302
303 http.Redirect(w, r, r.URL.String()+fmt.Sprintf("/round/%d", pull.LastRoundNumber()), http.StatusFound)
304}
305
306func (s *Pulls) mergeCheck(r *http.Request, f *models.Repo, pull *models.Pull, stack models.Stack) types.MergeCheckResponse {
307 if pull.State == models.PullMerged {
308 return types.MergeCheckResponse{}
309 }
310
311 scheme := "https"
312 if s.config.Core.Dev {
313 scheme = "http"
314 }
315 host := fmt.Sprintf("%s://%s", scheme, f.Knot)
316
317 xrpcc := indigoxrpc.Client{
318 Host: host,
319 }
320
321 patch := pull.LatestPatch()
322 if pull.IsStacked() {
323 // combine patches of substack
324 subStack := stack.Below(pull)
325 // collect the portion of the stack that is mergeable
326 mergeable := subStack.Mergeable()
327 // combine each patch
328 patch = mergeable.CombinedPatch()
329 }
330
331 resp, xe := tangled.RepoMergeCheck(
332 r.Context(),
333 &xrpcc,
334 &tangled.RepoMergeCheck_Input{
335 Did: f.Did,
336 Name: f.Name,
337 Branch: pull.TargetBranch,
338 Patch: patch,
339 },
340 )
341 if err := xrpcclient.HandleXrpcErr(xe); err != nil {
342 log.Println("failed to check for mergeability", "err", err)
343 return types.MergeCheckResponse{
344 Error: fmt.Sprintf("failed to check merge status: %s", err.Error()),
345 }
346 }
347
348 // convert xrpc response to internal types
349 conflicts := make([]types.ConflictInfo, len(resp.Conflicts))
350 for i, conflict := range resp.Conflicts {
351 conflicts[i] = types.ConflictInfo{
352 Filename: conflict.Filename,
353 Reason: conflict.Reason,
354 }
355 }
356
357 result := types.MergeCheckResponse{
358 IsConflicted: resp.Is_conflicted,
359 Conflicts: conflicts,
360 }
361
362 if resp.Message != nil {
363 result.Message = *resp.Message
364 }
365
366 if resp.Error != nil {
367 result.Error = *resp.Error
368 }
369
370 return result
371}
372
373func (s *Pulls) branchDeleteStatus(r *http.Request, repo *models.Repo, pull *models.Pull) *models.BranchDeleteStatus {
374 if pull.State != models.PullMerged {
375 return nil
376 }
377
378 user := s.oauth.GetMultiAccountUser(r)
379 if user == nil {
380 return nil
381 }
382
383 var branch string
384 // check if the branch exists
385 // NOTE: appview could cache branches/tags etc. for every repo by listening for gitRefUpdates
386 if pull.IsBranchBased() {
387 branch = pull.PullSource.Branch
388 } else if pull.IsForkBased() {
389 branch = pull.PullSource.Branch
390 repo = pull.PullSource.Repo
391 } else {
392 return nil
393 }
394
395 // deleted fork
396 if repo == nil {
397 return nil
398 }
399
400 // user can only delete branch if they are a collaborator in the repo that the branch belongs to
401 perms := s.enforcer.GetPermissionsInRepo(user.Active.Did, repo.Knot, repo.DidSlashRepo())
402 if !slices.Contains(perms, "repo:push") {
403 return nil
404 }
405
406 scheme := "http"
407 if !s.config.Core.Dev {
408 scheme = "https"
409 }
410 host := fmt.Sprintf("%s://%s", scheme, repo.Knot)
411 xrpcc := &indigoxrpc.Client{
412 Host: host,
413 }
414
415 resp, err := tangled.RepoBranch(r.Context(), xrpcc, branch, fmt.Sprintf("%s/%s", repo.Did, repo.Name))
416 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil {
417 return nil
418 }
419
420 return &models.BranchDeleteStatus{
421 Repo: repo,
422 Branch: resp.Name,
423 }
424}
425
426func (s *Pulls) resubmitCheck(r *http.Request, repo *models.Repo, pull *models.Pull, stack models.Stack) pages.ResubmitResult {
427 if pull.State == models.PullMerged || pull.State == models.PullDeleted || pull.PullSource == nil {
428 return pages.Unknown
429 }
430
431 var knot, ownerDid, repoName string
432
433 if pull.PullSource.RepoAt != nil {
434 // fork-based pulls
435 sourceRepo, err := db.GetRepoByAtUri(s.db, pull.PullSource.RepoAt.String())
436 if err != nil {
437 log.Println("failed to get source repo", err)
438 return pages.Unknown
439 }
440
441 knot = sourceRepo.Knot
442 ownerDid = sourceRepo.Did
443 repoName = sourceRepo.Name
444 } else {
445 // pulls within the same repo
446 knot = repo.Knot
447 ownerDid = repo.Did
448 repoName = repo.Name
449 }
450
451 scheme := "http"
452 if !s.config.Core.Dev {
453 scheme = "https"
454 }
455 host := fmt.Sprintf("%s://%s", scheme, knot)
456 xrpcc := &indigoxrpc.Client{
457 Host: host,
458 }
459
460 didSlashName := fmt.Sprintf("%s/%s", ownerDid, repoName)
461 branchResp, err := tangled.RepoBranch(r.Context(), xrpcc, pull.PullSource.Branch, didSlashName)
462 if err != nil {
463 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil {
464 log.Println("failed to call XRPC repo.branches", xrpcerr)
465 return pages.Unknown
466 }
467 log.Println("failed to reach knotserver", err)
468 return pages.Unknown
469 }
470
471 targetBranch := branchResp
472
473 latestSourceRev := pull.LatestSha()
474
475 if pull.IsStacked() && stack != nil {
476 top := stack[0]
477 latestSourceRev = top.LatestSha()
478 }
479
480 if latestSourceRev != targetBranch.Hash {
481 return pages.ShouldResubmit
482 }
483
484 return pages.ShouldNotResubmit
485}
486
487func (s *Pulls) RepoPullPatch(w http.ResponseWriter, r *http.Request) {
488 s.repoPullHelper(w, r, false)
489}
490
491func (s *Pulls) RepoPullInterdiff(w http.ResponseWriter, r *http.Request) {
492 s.repoPullHelper(w, r, true)
493}
494
495func (s *Pulls) RepoPullPatchRaw(w http.ResponseWriter, r *http.Request) {
496 pull, ok := r.Context().Value("pull").(*models.Pull)
497 if !ok {
498 log.Println("failed to get pull")
499 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.")
500 return
501 }
502
503 roundId := chi.URLParam(r, "round")
504 roundIdInt, err := strconv.Atoi(roundId)
505 if err != nil || roundIdInt >= len(pull.Submissions) {
506 http.Error(w, "bad round id", http.StatusBadRequest)
507 log.Println("failed to parse round id", err)
508 return
509 }
510
511 w.Header().Set("Content-Type", "text/plain; charset=utf-8")
512 w.Write([]byte(pull.Submissions[roundIdInt].Patch))
513}
514
515func (s *Pulls) RepoPulls(w http.ResponseWriter, r *http.Request) {
516 l := s.logger.With("handler", "RepoPulls")
517
518 user := s.oauth.GetMultiAccountUser(r)
519 params := r.URL.Query()
520
521 state := models.PullOpen
522 switch params.Get("state") {
523 case "closed":
524 state = models.PullClosed
525 case "merged":
526 state = models.PullMerged
527 }
528
529 page := pagination.FromContext(r.Context())
530
531 f, err := s.repoResolver.Resolve(r)
532 if err != nil {
533 log.Println("failed to get repo and knot", err)
534 return
535 }
536
537 var totalPulls int
538 switch state {
539 case models.PullOpen:
540 totalPulls = f.RepoStats.PullCount.Open
541 case models.PullMerged:
542 totalPulls = f.RepoStats.PullCount.Merged
543 case models.PullClosed:
544 totalPulls = f.RepoStats.PullCount.Closed
545 }
546
547 keyword := params.Get("q")
548
549 var pulls []*models.Pull
550 searchOpts := models.PullSearchOptions{
551 Keyword: keyword,
552 RepoAt: f.RepoAt().String(),
553 State: state,
554 Page: page,
555 }
556 l.Debug("searching with", "searchOpts", searchOpts)
557 if keyword != "" {
558 res, err := s.indexer.Search(r.Context(), searchOpts)
559 if err != nil {
560 l.Error("failed to search for pulls", "err", err)
561 return
562 }
563 totalPulls = int(res.Total)
564 l.Debug("searched pulls with indexer", "count", len(res.Hits))
565
566 pulls, err = db.GetPulls(
567 s.db,
568 orm.FilterIn("id", res.Hits),
569 )
570 if err != nil {
571 log.Println("failed to get pulls", err)
572 s.pages.Notice(w, "pulls", "Failed to load pulls. Try again later.")
573 return
574 }
575 } else {
576 pulls, err = db.GetPullsPaginated(
577 s.db,
578 page,
579 orm.FilterEq("repo_at", f.RepoAt()),
580 orm.FilterEq("state", searchOpts.State),
581 )
582 if err != nil {
583 log.Println("failed to get pulls", err)
584 s.pages.Notice(w, "pulls", "Failed to load pulls. Try again later.")
585 return
586 }
587 }
588
589 for _, p := range pulls {
590 var pullSourceRepo *models.Repo
591 if p.PullSource != nil {
592 if p.PullSource.RepoAt != nil {
593 pullSourceRepo, err = db.GetRepoByAtUri(s.db, p.PullSource.RepoAt.String())
594 if err != nil {
595 log.Printf("failed to get repo by at uri: %v", err)
596 continue
597 } else {
598 p.PullSource.Repo = pullSourceRepo
599 }
600 }
601 }
602 }
603
604 // we want to group all stacked PRs into just one list
605 stacks := make(map[string]models.Stack)
606 var shas []string
607 n := 0
608 for _, p := range pulls {
609 // store the sha for later
610 shas = append(shas, p.LatestSha())
611 // this PR is stacked
612 if p.StackId != "" {
613 // we have already seen this PR stack
614 if _, seen := stacks[p.StackId]; seen {
615 stacks[p.StackId] = append(stacks[p.StackId], p)
616 // skip this PR
617 } else {
618 stacks[p.StackId] = nil
619 pulls[n] = p
620 n++
621 }
622 } else {
623 pulls[n] = p
624 n++
625 }
626 }
627 pulls = pulls[:n]
628
629 ps, err := db.GetPipelineStatuses(
630 s.db,
631 len(shas),
632 orm.FilterEq("repo_owner", f.Did),
633 orm.FilterEq("repo_name", f.Name),
634 orm.FilterEq("knot", f.Knot),
635 orm.FilterIn("sha", shas),
636 )
637 if err != nil {
638 log.Printf("failed to fetch pipeline statuses: %s", err)
639 // non-fatal
640 }
641 m := make(map[string]models.Pipeline)
642 for _, p := range ps {
643 m[p.Sha] = p
644 }
645
646 labelDefs, err := db.GetLabelDefinitions(
647 s.db,
648 orm.FilterIn("at_uri", f.Labels),
649 orm.FilterContains("scope", tangled.RepoPullNSID),
650 )
651 if err != nil {
652 log.Println("failed to fetch labels", err)
653 s.pages.Error503(w)
654 return
655 }
656
657 defs := make(map[string]*models.LabelDefinition)
658 for _, l := range labelDefs {
659 defs[l.AtUri().String()] = &l
660 }
661
662 s.pages.RepoPulls(w, pages.RepoPullsParams{
663 LoggedInUser: s.oauth.GetMultiAccountUser(r),
664 RepoInfo: s.repoResolver.GetRepoInfo(r, user),
665 Pulls: pulls,
666 LabelDefs: defs,
667 FilteringBy: state,
668 FilterQuery: keyword,
669 Stacks: stacks,
670 Pipelines: m,
671 Page: page,
672 PullCount: totalPulls,
673 })
674}
675
676func (s *Pulls) PullComment(w http.ResponseWriter, r *http.Request) {
677 user := s.oauth.GetMultiAccountUser(r)
678 f, err := s.repoResolver.Resolve(r)
679 if err != nil {
680 log.Println("failed to get repo and knot", err)
681 return
682 }
683
684 pull, ok := r.Context().Value("pull").(*models.Pull)
685 if !ok {
686 log.Println("failed to get pull")
687 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.")
688 return
689 }
690
691 roundNumberStr := chi.URLParam(r, "round")
692 roundNumber, err := strconv.Atoi(roundNumberStr)
693 if err != nil || roundNumber >= len(pull.Submissions) {
694 http.Error(w, "bad round id", http.StatusBadRequest)
695 log.Println("failed to parse round id", err)
696 return
697 }
698
699 switch r.Method {
700 case http.MethodGet:
701 s.pages.PullNewCommentFragment(w, pages.PullNewCommentParams{
702 LoggedInUser: user,
703 RepoInfo: s.repoResolver.GetRepoInfo(r, user),
704 Pull: pull,
705 RoundNumber: roundNumber,
706 })
707 return
708 case http.MethodPost:
709 body := r.FormValue("body")
710 if body == "" {
711 s.pages.Notice(w, "pull", "Comment body is required")
712 return
713 }
714
715 mentions, references := s.mentionsResolver.Resolve(r.Context(), body)
716
717 // Start a transaction
718 tx, err := s.db.BeginTx(r.Context(), nil)
719 if err != nil {
720 log.Println("failed to start transaction", err)
721 s.pages.Notice(w, "pull-comment", "Failed to create comment.")
722 return
723 }
724 defer tx.Rollback()
725
726 createdAt := time.Now().Format(time.RFC3339)
727
728 client, err := s.oauth.AuthorizedClient(r)
729 if err != nil {
730 log.Println("failed to get authorized client", err)
731 s.pages.Notice(w, "pull-comment", "Failed to create comment.")
732 return
733 }
734 atResp, err := comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{
735 Collection: tangled.RepoPullCommentNSID,
736 Repo: user.Active.Did,
737 Rkey: tid.TID(),
738 Record: &lexutil.LexiconTypeDecoder{
739 Val: &tangled.RepoPullComment{
740 Pull: pull.AtUri().String(),
741 Body: body,
742 CreatedAt: createdAt,
743 },
744 },
745 })
746 if err != nil {
747 log.Println("failed to create pull comment", err)
748 s.pages.Notice(w, "pull-comment", "Failed to create comment.")
749 return
750 }
751
752 comment := &models.PullComment{
753 OwnerDid: user.Active.Did,
754 RepoAt: f.RepoAt().String(),
755 PullId: pull.PullId,
756 Body: body,
757 CommentAt: atResp.Uri,
758 SubmissionId: pull.Submissions[roundNumber].ID,
759 Mentions: mentions,
760 References: references,
761 }
762
763 // Create the pull comment in the database with the commentAt field
764 commentId, err := db.NewPullComment(tx, comment)
765 if err != nil {
766 log.Println("failed to create pull comment", err)
767 s.pages.Notice(w, "pull-comment", "Failed to create comment.")
768 return
769 }
770
771 // Commit the transaction
772 if err = tx.Commit(); err != nil {
773 log.Println("failed to commit transaction", err)
774 s.pages.Notice(w, "pull-comment", "Failed to create comment.")
775 return
776 }
777
778 s.notifier.NewPullComment(r.Context(), comment, mentions)
779
780 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f)
781 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d#comment-%d", ownerSlashRepo, pull.PullId, commentId))
782 return
783 }
784}
785
786func (s *Pulls) NewPull(w http.ResponseWriter, r *http.Request) {
787 user := s.oauth.GetMultiAccountUser(r)
788 f, err := s.repoResolver.Resolve(r)
789 if err != nil {
790 log.Println("failed to get repo and knot", err)
791 return
792 }
793
794 switch r.Method {
795 case http.MethodGet:
796 scheme := "http"
797 if !s.config.Core.Dev {
798 scheme = "https"
799 }
800 host := fmt.Sprintf("%s://%s", scheme, f.Knot)
801 xrpcc := &indigoxrpc.Client{
802 Host: host,
803 }
804
805 repo := fmt.Sprintf("%s/%s", f.Did, f.Name)
806 xrpcBytes, err := tangled.RepoBranches(r.Context(), xrpcc, "", 0, repo)
807 if err != nil {
808 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil {
809 log.Println("failed to call XRPC repo.branches", xrpcerr)
810 s.pages.Error503(w)
811 return
812 }
813 log.Println("failed to fetch branches", err)
814 return
815 }
816
817 var result types.RepoBranchesResponse
818 if err := json.Unmarshal(xrpcBytes, &result); err != nil {
819 log.Println("failed to decode XRPC response", err)
820 s.pages.Error503(w)
821 return
822 }
823
824 // can be one of "patch", "branch" or "fork"
825 strategy := r.URL.Query().Get("strategy")
826 // ignored if strategy is "patch"
827 sourceBranch := r.URL.Query().Get("sourceBranch")
828 targetBranch := r.URL.Query().Get("targetBranch")
829
830 s.pages.RepoNewPull(w, pages.RepoNewPullParams{
831 LoggedInUser: user,
832 RepoInfo: s.repoResolver.GetRepoInfo(r, user),
833 Branches: result.Branches,
834 Strategy: strategy,
835 SourceBranch: sourceBranch,
836 TargetBranch: targetBranch,
837 Title: r.URL.Query().Get("title"),
838 Body: r.URL.Query().Get("body"),
839 })
840
841 case http.MethodPost:
842 title := r.FormValue("title")
843 body := r.FormValue("body")
844 targetBranch := r.FormValue("targetBranch")
845 fromFork := r.FormValue("fork")
846 sourceBranch := r.FormValue("sourceBranch")
847 patch := r.FormValue("patch")
848
849 if targetBranch == "" {
850 s.pages.Notice(w, "pull", "Target branch is required.")
851 return
852 }
853
854 // Determine PR type based on input parameters
855 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())}
856 isPushAllowed := roles.IsPushAllowed()
857 isBranchBased := isPushAllowed && sourceBranch != "" && fromFork == ""
858 isForkBased := fromFork != "" && sourceBranch != ""
859 isPatchBased := patch != "" && !isBranchBased && !isForkBased
860 isStacked := r.FormValue("isStacked") == "on"
861
862 if isPatchBased && !patchutil.IsFormatPatch(patch) {
863 if title == "" {
864 s.pages.Notice(w, "pull", "Title is required for git-diff patches.")
865 return
866 }
867 if st := strings.TrimSpace(sanitizer.SanitizeDescription(title)); (st) == "" {
868 s.pages.Notice(w, "pull", "Title is empty after HTML sanitization")
869 return
870 }
871 }
872
873 // Validate we have at least one valid PR creation method
874 if !isBranchBased && !isPatchBased && !isForkBased {
875 s.pages.Notice(w, "pull", "Neither source branch nor patch supplied.")
876 return
877 }
878
879 // Can't mix branch-based and patch-based approaches
880 if isBranchBased && patch != "" {
881 s.pages.Notice(w, "pull", "Cannot select both patch and source branch.")
882 return
883 }
884
885 // us, err := knotclient.NewUnsignedClient(f.Knot, s.config.Core.Dev)
886 // if err != nil {
887 // log.Printf("failed to create unsigned client to %s: %v", f.Knot, err)
888 // s.pages.Notice(w, "pull", "Failed to create a pull request. Try again later.")
889 // return
890 // }
891
892 // TODO: make capabilities an xrpc call
893 caps := struct {
894 PullRequests struct {
895 FormatPatch bool
896 BranchSubmissions bool
897 ForkSubmissions bool
898 PatchSubmissions bool
899 }
900 }{
901 PullRequests: struct {
902 FormatPatch bool
903 BranchSubmissions bool
904 ForkSubmissions bool
905 PatchSubmissions bool
906 }{
907 FormatPatch: true,
908 BranchSubmissions: true,
909 ForkSubmissions: true,
910 PatchSubmissions: true,
911 },
912 }
913
914 // caps, err := us.Capabilities()
915 // if err != nil {
916 // log.Println("error fetching knot caps", f.Knot, err)
917 // s.pages.Notice(w, "pull", "Failed to create a pull request. Try again later.")
918 // return
919 // }
920
921 if !caps.PullRequests.FormatPatch {
922 s.pages.Notice(w, "pull", "This knot doesn't support format-patch. Unfortunately, there is no fallback for now.")
923 return
924 }
925
926 // Handle the PR creation based on the type
927 if isBranchBased {
928 if !caps.PullRequests.BranchSubmissions {
929 s.pages.Notice(w, "pull", "This knot doesn't support branch-based pull requests. Try another way?")
930 return
931 }
932 s.handleBranchBasedPull(w, r, f, user, title, body, targetBranch, sourceBranch, isStacked)
933 } else if isForkBased {
934 if !caps.PullRequests.ForkSubmissions {
935 s.pages.Notice(w, "pull", "This knot doesn't support fork-based pull requests. Try another way?")
936 return
937 }
938 s.handleForkBasedPull(w, r, f, user, fromFork, title, body, targetBranch, sourceBranch, isStacked)
939 } else if isPatchBased {
940 if !caps.PullRequests.PatchSubmissions {
941 s.pages.Notice(w, "pull", "This knot doesn't support patch-based pull requests. Send your patch over email.")
942 return
943 }
944 s.handlePatchBasedPull(w, r, f, user, title, body, targetBranch, patch, isStacked)
945 }
946 return
947 }
948}
949
950func (s *Pulls) handleBranchBasedPull(
951 w http.ResponseWriter,
952 r *http.Request,
953 repo *models.Repo,
954 user *oauth.MultiAccountUser,
955 title,
956 body,
957 targetBranch,
958 sourceBranch string,
959 isStacked bool,
960) {
961 scheme := "http"
962 if !s.config.Core.Dev {
963 scheme = "https"
964 }
965 host := fmt.Sprintf("%s://%s", scheme, repo.Knot)
966 xrpcc := &indigoxrpc.Client{
967 Host: host,
968 }
969
970 didSlashRepo := fmt.Sprintf("%s/%s", repo.Did, repo.Name)
971 xrpcBytes, err := tangled.RepoCompare(r.Context(), xrpcc, didSlashRepo, targetBranch, sourceBranch)
972 if err != nil {
973 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil {
974 log.Println("failed to call XRPC repo.compare", xrpcerr)
975 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
976 return
977 }
978 log.Println("failed to compare", err)
979 s.pages.Notice(w, "pull", err.Error())
980 return
981 }
982
983 var comparison types.RepoFormatPatchResponse
984 if err := json.Unmarshal(xrpcBytes, &comparison); err != nil {
985 log.Println("failed to decode XRPC compare response", err)
986 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
987 return
988 }
989
990 sourceRev := comparison.Rev2
991 patch := comparison.FormatPatchRaw
992 combined := comparison.CombinedPatchRaw
993
994 if err := validatePatch(&patch); err != nil {
995 s.logger.Error("failed to validate patch", "err", err)
996 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.")
997 return
998 }
999
1000 pullSource := &models.PullSource{
1001 Branch: sourceBranch,
1002 }
1003 recordPullSource := &tangled.RepoPull_Source{
1004 Branch: sourceBranch,
1005 Sha: comparison.Rev2,
1006 }
1007
1008 s.createPullRequest(w, r, repo, user, title, body, targetBranch, patch, combined, sourceRev, pullSource, recordPullSource, isStacked)
1009}
1010
1011func (s *Pulls) handlePatchBasedPull(w http.ResponseWriter, r *http.Request, repo *models.Repo, user *oauth.MultiAccountUser, title, body, targetBranch, patch string, isStacked bool) {
1012 if err := validatePatch(&patch); err != nil {
1013 s.logger.Error("patch validation failed", "err", err)
1014 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.")
1015 return
1016 }
1017
1018 s.createPullRequest(w, r, repo, user, title, body, targetBranch, patch, "", "", nil, nil, isStacked)
1019}
1020
1021func (s *Pulls) handleForkBasedPull(w http.ResponseWriter, r *http.Request, repo *models.Repo, user *oauth.MultiAccountUser, forkRepo string, title, body, targetBranch, sourceBranch string, isStacked bool) {
1022 repoString := strings.SplitN(forkRepo, "/", 2)
1023 forkOwnerDid := repoString[0]
1024 repoName := repoString[1]
1025 fork, err := db.GetForkByDid(s.db, forkOwnerDid, repoName)
1026 if errors.Is(err, sql.ErrNoRows) {
1027 s.pages.Notice(w, "pull", "No such fork.")
1028 return
1029 } else if err != nil {
1030 log.Println("failed to fetch fork:", err)
1031 s.pages.Notice(w, "pull", "Failed to fetch fork.")
1032 return
1033 }
1034
1035 client, err := s.oauth.ServiceClient(
1036 r,
1037 oauth.WithService(fork.Knot),
1038 oauth.WithLxm(tangled.RepoHiddenRefNSID),
1039 oauth.WithDev(s.config.Core.Dev),
1040 )
1041
1042 resp, err := tangled.RepoHiddenRef(
1043 r.Context(),
1044 client,
1045 &tangled.RepoHiddenRef_Input{
1046 ForkRef: sourceBranch,
1047 RemoteRef: targetBranch,
1048 Repo: fork.RepoAt().String(),
1049 },
1050 )
1051 if err := xrpcclient.HandleXrpcErr(err); err != nil {
1052 s.pages.Notice(w, "pull", err.Error())
1053 return
1054 }
1055
1056 if !resp.Success {
1057 errorMsg := "Failed to create pull request"
1058 if resp.Error != nil {
1059 errorMsg = fmt.Sprintf("Failed to create pull request: %s", *resp.Error)
1060 }
1061 s.pages.Notice(w, "pull", errorMsg)
1062 return
1063 }
1064
1065 hiddenRef := fmt.Sprintf("hidden/%s/%s", sourceBranch, targetBranch)
1066 // We're now comparing the sourceBranch (on the fork) against the hiddenRef which is tracking
1067 // the targetBranch on the target repository. This code is a bit confusing, but here's an example:
1068 // hiddenRef: hidden/feature-1/main (on repo-fork)
1069 // targetBranch: main (on repo-1)
1070 // sourceBranch: feature-1 (on repo-fork)
1071 forkScheme := "http"
1072 if !s.config.Core.Dev {
1073 forkScheme = "https"
1074 }
1075 forkHost := fmt.Sprintf("%s://%s", forkScheme, fork.Knot)
1076 forkXrpcc := &indigoxrpc.Client{
1077 Host: forkHost,
1078 }
1079
1080 forkRepoId := fmt.Sprintf("%s/%s", fork.Did, fork.Name)
1081 forkXrpcBytes, err := tangled.RepoCompare(r.Context(), forkXrpcc, forkRepoId, hiddenRef, sourceBranch)
1082 if err != nil {
1083 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil {
1084 log.Println("failed to call XRPC repo.compare for fork", xrpcerr)
1085 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
1086 return
1087 }
1088 log.Println("failed to compare across branches", err)
1089 s.pages.Notice(w, "pull", err.Error())
1090 return
1091 }
1092
1093 var comparison types.RepoFormatPatchResponse
1094 if err := json.Unmarshal(forkXrpcBytes, &comparison); err != nil {
1095 log.Println("failed to decode XRPC compare response for fork", err)
1096 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
1097 return
1098 }
1099
1100 sourceRev := comparison.Rev2
1101 patch := comparison.FormatPatchRaw
1102 combined := comparison.CombinedPatchRaw
1103
1104 if err := validatePatch(&patch); err != nil {
1105 s.logger.Error("failed to validate patch", "err", err)
1106 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.")
1107 return
1108 }
1109
1110 forkAtUri := fork.RepoAt()
1111 forkAtUriStr := forkAtUri.String()
1112
1113 pullSource := &models.PullSource{
1114 Branch: sourceBranch,
1115 RepoAt: &forkAtUri,
1116 }
1117 recordPullSource := &tangled.RepoPull_Source{
1118 Branch: sourceBranch,
1119 Repo: &forkAtUriStr,
1120 Sha: sourceRev,
1121 }
1122
1123 s.createPullRequest(w, r, repo, user, title, body, targetBranch, patch, combined, sourceRev, pullSource, recordPullSource, isStacked)
1124}
1125
1126func (s *Pulls) createPullRequest(
1127 w http.ResponseWriter,
1128 r *http.Request,
1129 repo *models.Repo,
1130 user *oauth.MultiAccountUser,
1131 title, body, targetBranch string,
1132 patch string,
1133 combined string,
1134 sourceRev string,
1135 pullSource *models.PullSource,
1136 recordPullSource *tangled.RepoPull_Source,
1137 isStacked bool,
1138) {
1139 if isStacked {
1140 // creates a series of PRs, each linking to the previous, identified by jj's change-id
1141 s.createStackedPullRequest(
1142 w,
1143 r,
1144 repo,
1145 user,
1146 targetBranch,
1147 patch,
1148 sourceRev,
1149 pullSource,
1150 )
1151 return
1152 }
1153
1154 client, err := s.oauth.AuthorizedClient(r)
1155 if err != nil {
1156 log.Println("failed to get authorized client", err)
1157 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
1158 return
1159 }
1160
1161 tx, err := s.db.BeginTx(r.Context(), nil)
1162 if err != nil {
1163 log.Println("failed to start tx")
1164 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
1165 return
1166 }
1167 defer tx.Rollback()
1168
1169 // We've already checked earlier if it's diff-based and title is empty,
1170 // so if it's still empty now, it's intentionally skipped owing to format-patch.
1171 if title == "" || body == "" {
1172 formatPatches, err := patchutil.ExtractPatches(patch)
1173 if err != nil {
1174 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to extract patches: %v", err))
1175 return
1176 }
1177 if len(formatPatches) == 0 {
1178 s.pages.Notice(w, "pull", "No patches found in the supplied format-patch.")
1179 return
1180 }
1181
1182 if title == "" {
1183 title = formatPatches[0].Title
1184 }
1185 if body == "" {
1186 body = formatPatches[0].Body
1187 }
1188 }
1189
1190 mentions, references := s.mentionsResolver.Resolve(r.Context(), body)
1191
1192 rkey := tid.TID()
1193 initialSubmission := models.PullSubmission{
1194 Patch: patch,
1195 Combined: combined,
1196 SourceRev: sourceRev,
1197 }
1198 pull := &models.Pull{
1199 Title: title,
1200 Body: body,
1201 TargetBranch: targetBranch,
1202 OwnerDid: user.Active.Did,
1203 RepoAt: repo.RepoAt(),
1204 Rkey: rkey,
1205 Mentions: mentions,
1206 References: references,
1207 Submissions: []*models.PullSubmission{
1208 &initialSubmission,
1209 },
1210 PullSource: pullSource,
1211 }
1212 err = db.NewPull(tx, pull)
1213 if err != nil {
1214 log.Println("failed to create pull request", err)
1215 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
1216 return
1217 }
1218 pullId, err := db.NextPullId(tx, repo.RepoAt())
1219 if err != nil {
1220 log.Println("failed to get pull id", err)
1221 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
1222 return
1223 }
1224
1225 blob, err := comatproto.RepoUploadBlob(r.Context(), client, gz(patch))
1226 if err != nil {
1227 log.Println("failed to upload patch", err)
1228 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
1229 return
1230 }
1231
1232 _, err = comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{
1233 Collection: tangled.RepoPullNSID,
1234 Repo: user.Active.Did,
1235 Rkey: rkey,
1236 Record: &lexutil.LexiconTypeDecoder{
1237 Val: &tangled.RepoPull{
1238 Title: title,
1239 Target: &tangled.RepoPull_Target{
1240 Repo: string(repo.RepoAt()),
1241 Branch: targetBranch,
1242 },
1243 PatchBlob: blob.Blob,
1244 Source: recordPullSource,
1245 CreatedAt: time.Now().Format(time.RFC3339),
1246 },
1247 },
1248 })
1249 if err != nil {
1250 log.Println("failed to create pull request", err)
1251 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
1252 return
1253 }
1254
1255 if err = tx.Commit(); err != nil {
1256 log.Println("failed to create pull request", err)
1257 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
1258 return
1259 }
1260
1261 s.notifier.NewPull(r.Context(), pull)
1262
1263 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo)
1264 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pullId))
1265}
1266
1267func (s *Pulls) createStackedPullRequest(
1268 w http.ResponseWriter,
1269 r *http.Request,
1270 repo *models.Repo,
1271 user *oauth.MultiAccountUser,
1272 targetBranch string,
1273 patch string,
1274 sourceRev string,
1275 pullSource *models.PullSource,
1276) {
1277 // run some necessary checks for stacked-prs first
1278
1279 // must be branch or fork based
1280 if sourceRev == "" {
1281 log.Println("stacked PR from patch-based pull")
1282 s.pages.Notice(w, "pull", "Stacking is only supported on branch and fork based pull-requests.")
1283 return
1284 }
1285
1286 formatPatches, err := patchutil.ExtractPatches(patch)
1287 if err != nil {
1288 log.Println("failed to extract patches", err)
1289 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to extract patches: %v", err))
1290 return
1291 }
1292
1293 // must have atleast 1 patch to begin with
1294 if len(formatPatches) == 0 {
1295 log.Println("empty patches")
1296 s.pages.Notice(w, "pull", "No patches found in the generated format-patch.")
1297 return
1298 }
1299
1300 // build a stack out of this patch
1301 stackId := uuid.New()
1302 stack, err := s.newStack(r.Context(), repo, user, targetBranch, patch, pullSource, stackId.String())
1303 if err != nil {
1304 log.Println("failed to create stack", err)
1305 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to create stack: %v", err))
1306 return
1307 }
1308
1309 client, err := s.oauth.AuthorizedClient(r)
1310 if err != nil {
1311 log.Println("failed to get authorized client", err)
1312 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
1313 return
1314 }
1315
1316 // apply all record creations at once
1317 var writes []*comatproto.RepoApplyWrites_Input_Writes_Elem
1318 for _, p := range stack {
1319 blob, err := comatproto.RepoUploadBlob(r.Context(), client, gz(p.LatestPatch()))
1320 if err != nil {
1321 log.Println("failed to upload patch blob", err)
1322 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
1323 return
1324 }
1325
1326 record := p.AsRecord()
1327 record.PatchBlob = blob.Blob
1328 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{
1329 RepoApplyWrites_Create: &comatproto.RepoApplyWrites_Create{
1330 Collection: tangled.RepoPullNSID,
1331 Rkey: &p.Rkey,
1332 Value: &lexutil.LexiconTypeDecoder{
1333 Val: &record,
1334 },
1335 },
1336 })
1337 }
1338 _, err = comatproto.RepoApplyWrites(r.Context(), client, &comatproto.RepoApplyWrites_Input{
1339 Repo: user.Active.Did,
1340 Writes: writes,
1341 })
1342 if err != nil {
1343 log.Println("failed to create stacked pull request", err)
1344 s.pages.Notice(w, "pull", "Failed to create stacked pull request. Try again later.")
1345 return
1346 }
1347
1348 // create all pulls at once
1349 tx, err := s.db.BeginTx(r.Context(), nil)
1350 if err != nil {
1351 log.Println("failed to start tx")
1352 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
1353 return
1354 }
1355 defer tx.Rollback()
1356
1357 for _, p := range stack {
1358 err = db.NewPull(tx, p)
1359 if err != nil {
1360 log.Println("failed to create pull request", err)
1361 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
1362 return
1363 }
1364
1365 }
1366
1367 if err = tx.Commit(); err != nil {
1368 log.Println("failed to create pull request", err)
1369 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.")
1370 return
1371 }
1372
1373 // notify about each pull
1374 //
1375 // this is performed after tx.Commit, because it could result in a locked DB otherwise
1376 for _, p := range stack {
1377 s.notifier.NewPull(r.Context(), p)
1378 }
1379
1380 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo)
1381 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls", ownerSlashRepo))
1382}
1383
1384func (s *Pulls) ValidatePatch(w http.ResponseWriter, r *http.Request) {
1385 _, err := s.repoResolver.Resolve(r)
1386 if err != nil {
1387 log.Println("failed to get repo and knot", err)
1388 return
1389 }
1390
1391 patch := r.FormValue("patch")
1392 if patch == "" {
1393 s.pages.Notice(w, "patch-error", "Patch is required.")
1394 return
1395 }
1396
1397 if err := validatePatch(&patch); err != nil {
1398 s.logger.Error("faield to validate patch", "err", err)
1399 s.pages.Notice(w, "patch-error", "Invalid patch format. Please provide a valid git diff or format-patch.")
1400 return
1401 }
1402
1403 if patchutil.IsFormatPatch(patch) {
1404 s.pages.Notice(w, "patch-preview", "git-format-patch detected. Title and description are optional; if left out, they will be extracted from the first commit.")
1405 } else {
1406 s.pages.Notice(w, "patch-preview", "Regular git-diff detected. Please provide a title and description.")
1407 }
1408}
1409
1410func (s *Pulls) PatchUploadFragment(w http.ResponseWriter, r *http.Request) {
1411 user := s.oauth.GetMultiAccountUser(r)
1412
1413 s.pages.PullPatchUploadFragment(w, pages.PullPatchUploadParams{
1414 RepoInfo: s.repoResolver.GetRepoInfo(r, user),
1415 })
1416}
1417
1418func (s *Pulls) CompareBranchesFragment(w http.ResponseWriter, r *http.Request) {
1419 user := s.oauth.GetMultiAccountUser(r)
1420 f, err := s.repoResolver.Resolve(r)
1421 if err != nil {
1422 log.Println("failed to get repo and knot", err)
1423 return
1424 }
1425
1426 scheme := "http"
1427 if !s.config.Core.Dev {
1428 scheme = "https"
1429 }
1430 host := fmt.Sprintf("%s://%s", scheme, f.Knot)
1431 xrpcc := &indigoxrpc.Client{
1432 Host: host,
1433 }
1434
1435 repo := fmt.Sprintf("%s/%s", f.Did, f.Name)
1436 xrpcBytes, err := tangled.RepoBranches(r.Context(), xrpcc, "", 0, repo)
1437 if err != nil {
1438 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil {
1439 log.Println("failed to call XRPC repo.branches", xrpcerr)
1440 s.pages.Error503(w)
1441 return
1442 }
1443 log.Println("failed to fetch branches", err)
1444 return
1445 }
1446
1447 var result types.RepoBranchesResponse
1448 if err := json.Unmarshal(xrpcBytes, &result); err != nil {
1449 log.Println("failed to decode XRPC response", err)
1450 s.pages.Error503(w)
1451 return
1452 }
1453
1454 branches := result.Branches
1455 sort.Slice(branches, func(i int, j int) bool {
1456 return branches[i].Commit.Committer.When.After(branches[j].Commit.Committer.When)
1457 })
1458
1459 withoutDefault := []types.Branch{}
1460 for _, b := range branches {
1461 if b.IsDefault {
1462 continue
1463 }
1464 withoutDefault = append(withoutDefault, b)
1465 }
1466
1467 s.pages.PullCompareBranchesFragment(w, pages.PullCompareBranchesParams{
1468 RepoInfo: s.repoResolver.GetRepoInfo(r, user),
1469 Branches: withoutDefault,
1470 })
1471}
1472
1473func (s *Pulls) CompareForksFragment(w http.ResponseWriter, r *http.Request) {
1474 user := s.oauth.GetMultiAccountUser(r)
1475
1476 forks, err := db.GetForksByDid(s.db, user.Active.Did)
1477 if err != nil {
1478 log.Println("failed to get forks", err)
1479 return
1480 }
1481
1482 s.pages.PullCompareForkFragment(w, pages.PullCompareForkParams{
1483 RepoInfo: s.repoResolver.GetRepoInfo(r, user),
1484 Forks: forks,
1485 Selected: r.URL.Query().Get("fork"),
1486 })
1487}
1488
1489func (s *Pulls) CompareForksBranchesFragment(w http.ResponseWriter, r *http.Request) {
1490 user := s.oauth.GetMultiAccountUser(r)
1491
1492 f, err := s.repoResolver.Resolve(r)
1493 if err != nil {
1494 log.Println("failed to get repo and knot", err)
1495 return
1496 }
1497
1498 forkVal := r.URL.Query().Get("fork")
1499 repoString := strings.SplitN(forkVal, "/", 2)
1500 forkOwnerDid := repoString[0]
1501 forkName := repoString[1]
1502 // fork repo
1503 repo, err := db.GetRepo(
1504 s.db,
1505 orm.FilterEq("did", forkOwnerDid),
1506 orm.FilterEq("name", forkName),
1507 )
1508 if err != nil {
1509 log.Println("failed to get repo", "did", forkOwnerDid, "name", forkName, "err", err)
1510 return
1511 }
1512
1513 sourceScheme := "http"
1514 if !s.config.Core.Dev {
1515 sourceScheme = "https"
1516 }
1517 sourceHost := fmt.Sprintf("%s://%s", sourceScheme, repo.Knot)
1518 sourceXrpcc := &indigoxrpc.Client{
1519 Host: sourceHost,
1520 }
1521
1522 sourceRepo := fmt.Sprintf("%s/%s", forkOwnerDid, repo.Name)
1523 sourceXrpcBytes, err := tangled.RepoBranches(r.Context(), sourceXrpcc, "", 0, sourceRepo)
1524 if err != nil {
1525 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil {
1526 log.Println("failed to call XRPC repo.branches for source", xrpcerr)
1527 s.pages.Error503(w)
1528 return
1529 }
1530 log.Println("failed to fetch source branches", err)
1531 return
1532 }
1533
1534 // Decode source branches
1535 var sourceBranches types.RepoBranchesResponse
1536 if err := json.Unmarshal(sourceXrpcBytes, &sourceBranches); err != nil {
1537 log.Println("failed to decode source branches XRPC response", err)
1538 s.pages.Error503(w)
1539 return
1540 }
1541
1542 targetScheme := "http"
1543 if !s.config.Core.Dev {
1544 targetScheme = "https"
1545 }
1546 targetHost := fmt.Sprintf("%s://%s", targetScheme, f.Knot)
1547 targetXrpcc := &indigoxrpc.Client{
1548 Host: targetHost,
1549 }
1550
1551 targetRepo := fmt.Sprintf("%s/%s", f.Did, f.Name)
1552 targetXrpcBytes, err := tangled.RepoBranches(r.Context(), targetXrpcc, "", 0, targetRepo)
1553 if err != nil {
1554 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil {
1555 log.Println("failed to call XRPC repo.branches for target", xrpcerr)
1556 s.pages.Error503(w)
1557 return
1558 }
1559 log.Println("failed to fetch target branches", err)
1560 return
1561 }
1562
1563 // Decode target branches
1564 var targetBranches types.RepoBranchesResponse
1565 if err := json.Unmarshal(targetXrpcBytes, &targetBranches); err != nil {
1566 log.Println("failed to decode target branches XRPC response", err)
1567 s.pages.Error503(w)
1568 return
1569 }
1570
1571 sort.Slice(sourceBranches.Branches, func(i int, j int) bool {
1572 return sourceBranches.Branches[i].Commit.Committer.When.After(sourceBranches.Branches[j].Commit.Committer.When)
1573 })
1574
1575 s.pages.PullCompareForkBranchesFragment(w, pages.PullCompareForkBranchesParams{
1576 RepoInfo: s.repoResolver.GetRepoInfo(r, user),
1577 SourceBranches: sourceBranches.Branches,
1578 TargetBranches: targetBranches.Branches,
1579 })
1580}
1581
1582func (s *Pulls) ResubmitPull(w http.ResponseWriter, r *http.Request) {
1583 user := s.oauth.GetMultiAccountUser(r)
1584
1585 pull, ok := r.Context().Value("pull").(*models.Pull)
1586 if !ok {
1587 log.Println("failed to get pull")
1588 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.")
1589 return
1590 }
1591
1592 switch r.Method {
1593 case http.MethodGet:
1594 s.pages.PullResubmitFragment(w, pages.PullResubmitParams{
1595 RepoInfo: s.repoResolver.GetRepoInfo(r, user),
1596 Pull: pull,
1597 })
1598 return
1599 case http.MethodPost:
1600 if pull.IsPatchBased() {
1601 s.resubmitPatch(w, r)
1602 return
1603 } else if pull.IsBranchBased() {
1604 s.resubmitBranch(w, r)
1605 return
1606 } else if pull.IsForkBased() {
1607 s.resubmitFork(w, r)
1608 return
1609 }
1610 }
1611}
1612
1613func (s *Pulls) resubmitPatch(w http.ResponseWriter, r *http.Request) {
1614 user := s.oauth.GetMultiAccountUser(r)
1615
1616 pull, ok := r.Context().Value("pull").(*models.Pull)
1617 if !ok {
1618 log.Println("failed to get pull")
1619 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.")
1620 return
1621 }
1622
1623 f, err := s.repoResolver.Resolve(r)
1624 if err != nil {
1625 log.Println("failed to get repo and knot", err)
1626 return
1627 }
1628
1629 if user.Active.Did != pull.OwnerDid {
1630 log.Println("unauthorized user")
1631 w.WriteHeader(http.StatusUnauthorized)
1632 return
1633 }
1634
1635 patch := r.FormValue("patch")
1636
1637 s.resubmitPullHelper(w, r, f, user, pull, patch, "", "")
1638}
1639
1640func (s *Pulls) resubmitBranch(w http.ResponseWriter, r *http.Request) {
1641 user := s.oauth.GetMultiAccountUser(r)
1642
1643 pull, ok := r.Context().Value("pull").(*models.Pull)
1644 if !ok {
1645 log.Println("failed to get pull")
1646 s.pages.Notice(w, "resubmit-error", "Failed to edit patch. Try again later.")
1647 return
1648 }
1649
1650 f, err := s.repoResolver.Resolve(r)
1651 if err != nil {
1652 log.Println("failed to get repo and knot", err)
1653 return
1654 }
1655
1656 if user.Active.Did != pull.OwnerDid {
1657 log.Println("unauthorized user")
1658 w.WriteHeader(http.StatusUnauthorized)
1659 return
1660 }
1661
1662 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())}
1663 if !roles.IsPushAllowed() {
1664 log.Println("unauthorized user")
1665 w.WriteHeader(http.StatusUnauthorized)
1666 return
1667 }
1668
1669 scheme := "http"
1670 if !s.config.Core.Dev {
1671 scheme = "https"
1672 }
1673 host := fmt.Sprintf("%s://%s", scheme, f.Knot)
1674 xrpcc := &indigoxrpc.Client{
1675 Host: host,
1676 }
1677
1678 repo := fmt.Sprintf("%s/%s", f.Did, f.Name)
1679 xrpcBytes, err := tangled.RepoCompare(r.Context(), xrpcc, repo, pull.TargetBranch, pull.PullSource.Branch)
1680 if err != nil {
1681 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil {
1682 log.Println("failed to call XRPC repo.compare", xrpcerr)
1683 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.")
1684 return
1685 }
1686 log.Printf("compare request failed: %s", err)
1687 s.pages.Notice(w, "resubmit-error", err.Error())
1688 return
1689 }
1690
1691 var comparison types.RepoFormatPatchResponse
1692 if err := json.Unmarshal(xrpcBytes, &comparison); err != nil {
1693 log.Println("failed to decode XRPC compare response", err)
1694 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.")
1695 return
1696 }
1697
1698 sourceRev := comparison.Rev2
1699 patch := comparison.FormatPatchRaw
1700 combined := comparison.CombinedPatchRaw
1701
1702 s.resubmitPullHelper(w, r, f, user, pull, patch, combined, sourceRev)
1703}
1704
1705func (s *Pulls) resubmitFork(w http.ResponseWriter, r *http.Request) {
1706 user := s.oauth.GetMultiAccountUser(r)
1707
1708 pull, ok := r.Context().Value("pull").(*models.Pull)
1709 if !ok {
1710 log.Println("failed to get pull")
1711 s.pages.Notice(w, "resubmit-error", "Failed to edit patch. Try again later.")
1712 return
1713 }
1714
1715 f, err := s.repoResolver.Resolve(r)
1716 if err != nil {
1717 log.Println("failed to get repo and knot", err)
1718 return
1719 }
1720
1721 if user.Active.Did != pull.OwnerDid {
1722 log.Println("unauthorized user")
1723 w.WriteHeader(http.StatusUnauthorized)
1724 return
1725 }
1726
1727 forkRepo, err := db.GetRepoByAtUri(s.db, pull.PullSource.RepoAt.String())
1728 if err != nil {
1729 log.Println("failed to get source repo", err)
1730 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.")
1731 return
1732 }
1733
1734 // update the hidden tracking branch to latest
1735 client, err := s.oauth.ServiceClient(
1736 r,
1737 oauth.WithService(forkRepo.Knot),
1738 oauth.WithLxm(tangled.RepoHiddenRefNSID),
1739 oauth.WithDev(s.config.Core.Dev),
1740 )
1741 if err != nil {
1742 log.Printf("failed to connect to knot server: %v", err)
1743 return
1744 }
1745
1746 resp, err := tangled.RepoHiddenRef(
1747 r.Context(),
1748 client,
1749 &tangled.RepoHiddenRef_Input{
1750 ForkRef: pull.PullSource.Branch,
1751 RemoteRef: pull.TargetBranch,
1752 Repo: forkRepo.RepoAt().String(),
1753 },
1754 )
1755 if err := xrpcclient.HandleXrpcErr(err); err != nil {
1756 s.pages.Notice(w, "resubmit-error", err.Error())
1757 return
1758 }
1759 if !resp.Success {
1760 log.Println("Failed to update tracking ref.", "err", resp.Error)
1761 s.pages.Notice(w, "resubmit-error", "Failed to update tracking ref.")
1762 return
1763 }
1764
1765 hiddenRef := fmt.Sprintf("hidden/%s/%s", pull.PullSource.Branch, pull.TargetBranch)
1766 // extract patch by performing compare
1767 forkScheme := "http"
1768 if !s.config.Core.Dev {
1769 forkScheme = "https"
1770 }
1771 forkHost := fmt.Sprintf("%s://%s", forkScheme, forkRepo.Knot)
1772 forkRepoId := fmt.Sprintf("%s/%s", forkRepo.Did, forkRepo.Name)
1773 forkXrpcBytes, err := tangled.RepoCompare(r.Context(), &indigoxrpc.Client{Host: forkHost}, forkRepoId, hiddenRef, pull.PullSource.Branch)
1774 if err != nil {
1775 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil {
1776 log.Println("failed to call XRPC repo.compare for fork", xrpcerr)
1777 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.")
1778 return
1779 }
1780 log.Printf("failed to compare branches: %s", err)
1781 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.")
1782 return
1783 }
1784
1785 var forkComparison types.RepoFormatPatchResponse
1786 if err := json.Unmarshal(forkXrpcBytes, &forkComparison); err != nil {
1787 log.Println("failed to decode XRPC compare response for fork", err)
1788 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.")
1789 return
1790 }
1791
1792 // Use the fork comparison we already made
1793 comparison := forkComparison
1794
1795 sourceRev := comparison.Rev2
1796 patch := comparison.FormatPatchRaw
1797 combined := comparison.CombinedPatchRaw
1798
1799 s.resubmitPullHelper(w, r, f, user, pull, patch, combined, sourceRev)
1800}
1801
1802func (s *Pulls) resubmitPullHelper(
1803 w http.ResponseWriter,
1804 r *http.Request,
1805 repo *models.Repo,
1806 user *oauth.MultiAccountUser,
1807 pull *models.Pull,
1808 patch string,
1809 combined string,
1810 sourceRev string,
1811) {
1812 if pull.IsStacked() {
1813 log.Println("resubmitting stacked PR")
1814 s.resubmitStackedPullHelper(w, r, repo, user, pull, patch, pull.StackId)
1815 return
1816 }
1817
1818 if err := validatePatch(&patch); err != nil {
1819 s.pages.Notice(w, "resubmit-error", err.Error())
1820 return
1821 }
1822
1823 if patch == pull.LatestPatch() {
1824 s.pages.Notice(w, "resubmit-error", "Patch is identical to previous submission.")
1825 return
1826 }
1827
1828 // validate sourceRev if branch/fork based
1829 if pull.IsBranchBased() || pull.IsForkBased() {
1830 if sourceRev == pull.LatestSha() {
1831 s.pages.Notice(w, "resubmit-error", "This branch has not changed since the last submission.")
1832 return
1833 }
1834 }
1835
1836 tx, err := s.db.BeginTx(r.Context(), nil)
1837 if err != nil {
1838 log.Println("failed to start tx")
1839 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.")
1840 return
1841 }
1842 defer tx.Rollback()
1843
1844 pullAt := pull.AtUri()
1845 newRoundNumber := len(pull.Submissions)
1846 newPatch := patch
1847 newSourceRev := sourceRev
1848 combinedPatch := combined
1849 err = db.ResubmitPull(tx, pullAt, newRoundNumber, newPatch, combinedPatch, newSourceRev)
1850 if err != nil {
1851 log.Println("failed to create pull request", err)
1852 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.")
1853 return
1854 }
1855 client, err := s.oauth.AuthorizedClient(r)
1856 if err != nil {
1857 log.Println("failed to authorize client")
1858 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.")
1859 return
1860 }
1861
1862 ex, err := comatproto.RepoGetRecord(r.Context(), client, "", tangled.RepoPullNSID, user.Active.Did, pull.Rkey)
1863 if err != nil {
1864 // failed to get record
1865 s.pages.Notice(w, "resubmit-error", "Failed to update pull, no record found on PDS.")
1866 return
1867 }
1868
1869 blob, err := comatproto.RepoUploadBlob(r.Context(), client, gz(patch))
1870 if err != nil {
1871 log.Println("failed to upload patch blob", err)
1872 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.")
1873 return
1874 }
1875 record := pull.AsRecord()
1876 record.PatchBlob = blob.Blob
1877 record.CreatedAt = time.Now().Format(time.RFC3339)
1878 record.Source.Sha = newSourceRev
1879
1880 _, err = comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{
1881 Collection: tangled.RepoPullNSID,
1882 Repo: user.Active.Did,
1883 Rkey: pull.Rkey,
1884 SwapRecord: ex.Cid,
1885 Record: &lexutil.LexiconTypeDecoder{
1886 Val: &record,
1887 },
1888 })
1889 if err != nil {
1890 log.Println("failed to update record", err)
1891 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.")
1892 return
1893 }
1894
1895 if err = tx.Commit(); err != nil {
1896 log.Println("failed to commit transaction", err)
1897 s.pages.Notice(w, "resubmit-error", "Failed to resubmit pull.")
1898 return
1899 }
1900
1901 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo)
1902 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId))
1903}
1904
1905func (s *Pulls) resubmitStackedPullHelper(
1906 w http.ResponseWriter,
1907 r *http.Request,
1908 repo *models.Repo,
1909 user *oauth.MultiAccountUser,
1910 pull *models.Pull,
1911 patch string,
1912 stackId string,
1913) {
1914 targetBranch := pull.TargetBranch
1915
1916 origStack, _ := r.Context().Value("stack").(models.Stack)
1917 newStack, err := s.newStack(r.Context(), repo, user, targetBranch, patch, pull.PullSource, stackId)
1918 if err != nil {
1919 log.Println("failed to create resubmitted stack", err)
1920 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.")
1921 return
1922 }
1923
1924 // find the diff between the stacks, first, map them by changeId
1925 origById := make(map[string]*models.Pull)
1926 newById := make(map[string]*models.Pull)
1927 for _, p := range origStack {
1928 origById[p.ChangeId] = p
1929 }
1930 for _, p := range newStack {
1931 newById[p.ChangeId] = p
1932 }
1933
1934 // commits that got deleted: corresponding pull is closed
1935 // commits that got added: new pull is created
1936 // commits that got updated: corresponding pull is resubmitted & new round begins
1937 additions := make(map[string]*models.Pull)
1938 deletions := make(map[string]*models.Pull)
1939 updated := make(map[string]struct{})
1940
1941 // pulls in orignal stack but not in new one
1942 for _, op := range origStack {
1943 if _, ok := newById[op.ChangeId]; !ok {
1944 deletions[op.ChangeId] = op
1945 }
1946 }
1947
1948 // pulls in new stack but not in original one
1949 for _, np := range newStack {
1950 if _, ok := origById[np.ChangeId]; !ok {
1951 additions[np.ChangeId] = np
1952 }
1953 }
1954
1955 // NOTE: this loop can be written in any of above blocks,
1956 // but is written separately in the interest of simpler code
1957 for _, np := range newStack {
1958 if op, ok := origById[np.ChangeId]; ok {
1959 // pull exists in both stacks
1960 updated[op.ChangeId] = struct{}{}
1961 }
1962 }
1963
1964 tx, err := s.db.Begin()
1965 if err != nil {
1966 log.Println("failed to start transaction", err)
1967 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.")
1968 return
1969 }
1970 defer tx.Rollback()
1971
1972 client, err := s.oauth.AuthorizedClient(r)
1973 if err != nil {
1974 log.Println("failed to authorize client")
1975 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.")
1976 return
1977 }
1978
1979 // pds updates to make
1980 var writes []*comatproto.RepoApplyWrites_Input_Writes_Elem
1981
1982 // deleted pulls are marked as deleted in the DB
1983 for _, p := range deletions {
1984 // do not do delete already merged PRs
1985 if p.State == models.PullMerged {
1986 continue
1987 }
1988
1989 err := db.DeletePull(tx, p.RepoAt, p.PullId)
1990 if err != nil {
1991 log.Println("failed to delete pull", err, p.PullId)
1992 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.")
1993 return
1994 }
1995 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{
1996 RepoApplyWrites_Delete: &comatproto.RepoApplyWrites_Delete{
1997 Collection: tangled.RepoPullNSID,
1998 Rkey: p.Rkey,
1999 },
2000 })
2001 }
2002
2003 // new pulls are created
2004 for _, p := range additions {
2005 err := db.NewPull(tx, p)
2006 if err != nil {
2007 log.Println("failed to create pull", err, p.PullId)
2008 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.")
2009 return
2010 }
2011
2012 blob, err := comatproto.RepoUploadBlob(r.Context(), client, gz(patch))
2013 if err != nil {
2014 log.Println("failed to upload patch blob", err)
2015 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.")
2016 return
2017 }
2018 record := p.AsRecord()
2019 record.PatchBlob = blob.Blob
2020 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{
2021 RepoApplyWrites_Create: &comatproto.RepoApplyWrites_Create{
2022 Collection: tangled.RepoPullNSID,
2023 Rkey: &p.Rkey,
2024 Value: &lexutil.LexiconTypeDecoder{
2025 Val: &record,
2026 },
2027 },
2028 })
2029 }
2030
2031 // updated pulls are, well, updated; to start a new round
2032 for id := range updated {
2033 op, _ := origById[id]
2034 np, _ := newById[id]
2035
2036 // do not update already merged PRs
2037 if op.State == models.PullMerged {
2038 continue
2039 }
2040
2041 // resubmit the new pull
2042 pullAt := op.AtUri()
2043 newRoundNumber := len(op.Submissions)
2044 newPatch := np.LatestPatch()
2045 combinedPatch := np.LatestSubmission().Combined
2046 newSourceRev := np.LatestSha()
2047 err := db.ResubmitPull(tx, pullAt, newRoundNumber, newPatch, combinedPatch, newSourceRev)
2048 if err != nil {
2049 log.Println("failed to update pull", err, op.PullId)
2050 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.")
2051 return
2052 }
2053
2054 blob, err := comatproto.RepoUploadBlob(r.Context(), client, gz(patch))
2055 if err != nil {
2056 log.Println("failed to upload patch blob", err)
2057 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.")
2058 return
2059 }
2060 record := np.AsRecord()
2061 record.PatchBlob = blob.Blob
2062 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{
2063 RepoApplyWrites_Update: &comatproto.RepoApplyWrites_Update{
2064 Collection: tangled.RepoPullNSID,
2065 Rkey: op.Rkey,
2066 Value: &lexutil.LexiconTypeDecoder{
2067 Val: &record,
2068 },
2069 },
2070 })
2071 }
2072
2073 // update parent-change-id relations for the entire stack
2074 for _, p := range newStack {
2075 err := db.SetPullParentChangeId(
2076 tx,
2077 p.ParentChangeId,
2078 // these should be enough filters to be unique per-stack
2079 orm.FilterEq("repo_at", p.RepoAt.String()),
2080 orm.FilterEq("owner_did", p.OwnerDid),
2081 orm.FilterEq("change_id", p.ChangeId),
2082 )
2083
2084 if err != nil {
2085 log.Println("failed to update pull", err, p.PullId)
2086 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.")
2087 return
2088 }
2089 }
2090
2091 err = tx.Commit()
2092 if err != nil {
2093 log.Println("failed to resubmit pull", err)
2094 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.")
2095 return
2096 }
2097
2098 _, err = comatproto.RepoApplyWrites(r.Context(), client, &comatproto.RepoApplyWrites_Input{
2099 Repo: user.Active.Did,
2100 Writes: writes,
2101 })
2102 if err != nil {
2103 log.Println("failed to create stacked pull request", err)
2104 s.pages.Notice(w, "pull", "Failed to create stacked pull request. Try again later.")
2105 return
2106 }
2107
2108 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo)
2109 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId))
2110}
2111
2112func (s *Pulls) MergePull(w http.ResponseWriter, r *http.Request) {
2113 user := s.oauth.GetMultiAccountUser(r)
2114 f, err := s.repoResolver.Resolve(r)
2115 if err != nil {
2116 log.Println("failed to resolve repo:", err)
2117 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.")
2118 return
2119 }
2120
2121 pull, ok := r.Context().Value("pull").(*models.Pull)
2122 if !ok {
2123 log.Println("failed to get pull")
2124 s.pages.Notice(w, "pull-merge-error", "Failed to merge patch. Try again later.")
2125 return
2126 }
2127
2128 var pullsToMerge models.Stack
2129 pullsToMerge = append(pullsToMerge, pull)
2130 if pull.IsStacked() {
2131 stack, ok := r.Context().Value("stack").(models.Stack)
2132 if !ok {
2133 log.Println("failed to get stack")
2134 s.pages.Notice(w, "pull-merge-error", "Failed to merge patch. Try again later.")
2135 return
2136 }
2137
2138 // combine patches of substack
2139 subStack := stack.StrictlyBelow(pull)
2140 // collect the portion of the stack that is mergeable
2141 mergeable := subStack.Mergeable()
2142 // add to total patch
2143 pullsToMerge = append(pullsToMerge, mergeable...)
2144 }
2145
2146 patch := pullsToMerge.CombinedPatch()
2147
2148 ident, err := s.idResolver.ResolveIdent(r.Context(), pull.OwnerDid)
2149 if err != nil {
2150 log.Printf("resolving identity: %s", err)
2151 w.WriteHeader(http.StatusNotFound)
2152 return
2153 }
2154
2155 email, err := db.GetPrimaryEmail(s.db, pull.OwnerDid)
2156 if err != nil {
2157 log.Printf("failed to get primary email: %s", err)
2158 }
2159
2160 authorName := ident.Handle.String()
2161 mergeInput := &tangled.RepoMerge_Input{
2162 Did: f.Did,
2163 Name: f.Name,
2164 Branch: pull.TargetBranch,
2165 Patch: patch,
2166 CommitMessage: &pull.Title,
2167 AuthorName: &authorName,
2168 }
2169
2170 if pull.Body != "" {
2171 mergeInput.CommitBody = &pull.Body
2172 }
2173
2174 if email.Address != "" {
2175 mergeInput.AuthorEmail = &email.Address
2176 }
2177
2178 client, err := s.oauth.ServiceClient(
2179 r,
2180 oauth.WithService(f.Knot),
2181 oauth.WithLxm(tangled.RepoMergeNSID),
2182 oauth.WithDev(s.config.Core.Dev),
2183 )
2184 if err != nil {
2185 log.Printf("failed to connect to knot server: %v", err)
2186 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.")
2187 return
2188 }
2189
2190 err = tangled.RepoMerge(r.Context(), client, mergeInput)
2191 if err := xrpcclient.HandleXrpcErr(err); err != nil {
2192 s.pages.Notice(w, "pull-merge-error", err.Error())
2193 return
2194 }
2195
2196 tx, err := s.db.Begin()
2197 if err != nil {
2198 log.Println("failed to start transcation", err)
2199 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.")
2200 return
2201 }
2202 defer tx.Rollback()
2203
2204 for _, p := range pullsToMerge {
2205 err := db.MergePull(tx, f.RepoAt(), p.PullId)
2206 if err != nil {
2207 log.Printf("failed to update pull request status in database: %s", err)
2208 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.")
2209 return
2210 }
2211 p.State = models.PullMerged
2212 }
2213
2214 err = tx.Commit()
2215 if err != nil {
2216 // TODO: this is unsound, we should also revert the merge from the knotserver here
2217 log.Printf("failed to update pull request status in database: %s", err)
2218 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.")
2219 return
2220 }
2221
2222 // notify about the pull merge
2223 for _, p := range pullsToMerge {
2224 s.notifier.NewPullState(r.Context(), syntax.DID(user.Active.Did), p)
2225 }
2226
2227 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f)
2228 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId))
2229}
2230
2231func (s *Pulls) ClosePull(w http.ResponseWriter, r *http.Request) {
2232 user := s.oauth.GetMultiAccountUser(r)
2233
2234 f, err := s.repoResolver.Resolve(r)
2235 if err != nil {
2236 log.Println("malformed middleware")
2237 return
2238 }
2239
2240 pull, ok := r.Context().Value("pull").(*models.Pull)
2241 if !ok {
2242 log.Println("failed to get pull")
2243 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.")
2244 return
2245 }
2246
2247 // auth filter: only owner or collaborators can close
2248 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())}
2249 isOwner := roles.IsOwner()
2250 isCollaborator := roles.IsCollaborator()
2251 isPullAuthor := user.Active.Did == pull.OwnerDid
2252 isCloseAllowed := isOwner || isCollaborator || isPullAuthor
2253 if !isCloseAllowed {
2254 log.Println("failed to close pull")
2255 s.pages.Notice(w, "pull-close", "You are unauthorized to close this pull.")
2256 return
2257 }
2258
2259 // Start a transaction
2260 tx, err := s.db.BeginTx(r.Context(), nil)
2261 if err != nil {
2262 log.Println("failed to start transaction", err)
2263 s.pages.Notice(w, "pull-close", "Failed to close pull.")
2264 return
2265 }
2266 defer tx.Rollback()
2267
2268 var pullsToClose []*models.Pull
2269 pullsToClose = append(pullsToClose, pull)
2270
2271 // if this PR is stacked, then we want to close all PRs below this one on the stack
2272 if pull.IsStacked() {
2273 stack := r.Context().Value("stack").(models.Stack)
2274 subStack := stack.StrictlyBelow(pull)
2275 pullsToClose = append(pullsToClose, subStack...)
2276 }
2277
2278 for _, p := range pullsToClose {
2279 // Close the pull in the database
2280 err = db.ClosePull(tx, f.RepoAt(), p.PullId)
2281 if err != nil {
2282 log.Println("failed to close pull", err)
2283 s.pages.Notice(w, "pull-close", "Failed to close pull.")
2284 return
2285 }
2286 p.State = models.PullClosed
2287 }
2288
2289 // Commit the transaction
2290 if err = tx.Commit(); err != nil {
2291 log.Println("failed to commit transaction", err)
2292 s.pages.Notice(w, "pull-close", "Failed to close pull.")
2293 return
2294 }
2295
2296 for _, p := range pullsToClose {
2297 s.notifier.NewPullState(r.Context(), syntax.DID(user.Active.Did), p)
2298 }
2299
2300 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f)
2301 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId))
2302}
2303
2304func (s *Pulls) ReopenPull(w http.ResponseWriter, r *http.Request) {
2305 user := s.oauth.GetMultiAccountUser(r)
2306
2307 f, err := s.repoResolver.Resolve(r)
2308 if err != nil {
2309 log.Println("failed to resolve repo", err)
2310 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.")
2311 return
2312 }
2313
2314 pull, ok := r.Context().Value("pull").(*models.Pull)
2315 if !ok {
2316 log.Println("failed to get pull")
2317 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.")
2318 return
2319 }
2320
2321 // auth filter: only owner or collaborators can close
2322 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())}
2323 isOwner := roles.IsOwner()
2324 isCollaborator := roles.IsCollaborator()
2325 isPullAuthor := user.Active.Did == pull.OwnerDid
2326 isCloseAllowed := isOwner || isCollaborator || isPullAuthor
2327 if !isCloseAllowed {
2328 log.Println("failed to close pull")
2329 s.pages.Notice(w, "pull-close", "You are unauthorized to close this pull.")
2330 return
2331 }
2332
2333 // Start a transaction
2334 tx, err := s.db.BeginTx(r.Context(), nil)
2335 if err != nil {
2336 log.Println("failed to start transaction", err)
2337 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.")
2338 return
2339 }
2340 defer tx.Rollback()
2341
2342 var pullsToReopen []*models.Pull
2343 pullsToReopen = append(pullsToReopen, pull)
2344
2345 // if this PR is stacked, then we want to reopen all PRs above this one on the stack
2346 if pull.IsStacked() {
2347 stack := r.Context().Value("stack").(models.Stack)
2348 subStack := stack.StrictlyAbove(pull)
2349 pullsToReopen = append(pullsToReopen, subStack...)
2350 }
2351
2352 for _, p := range pullsToReopen {
2353 // Close the pull in the database
2354 err = db.ReopenPull(tx, f.RepoAt(), p.PullId)
2355 if err != nil {
2356 log.Println("failed to close pull", err)
2357 s.pages.Notice(w, "pull-close", "Failed to close pull.")
2358 return
2359 }
2360 p.State = models.PullOpen
2361 }
2362
2363 // Commit the transaction
2364 if err = tx.Commit(); err != nil {
2365 log.Println("failed to commit transaction", err)
2366 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.")
2367 return
2368 }
2369
2370 for _, p := range pullsToReopen {
2371 s.notifier.NewPullState(r.Context(), syntax.DID(user.Active.Did), p)
2372 }
2373
2374 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f)
2375 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId))
2376}
2377
2378func (s *Pulls) newStack(ctx context.Context, repo *models.Repo, user *oauth.MultiAccountUser, targetBranch, patch string, pullSource *models.PullSource, stackId string) (models.Stack, error) {
2379 formatPatches, err := patchutil.ExtractPatches(patch)
2380 if err != nil {
2381 return nil, fmt.Errorf("Failed to extract patches: %v", err)
2382 }
2383
2384 // must have atleast 1 patch to begin with
2385 if len(formatPatches) == 0 {
2386 return nil, fmt.Errorf("No patches found in the generated format-patch.")
2387 }
2388
2389 // the stack is identified by a UUID
2390 var stack models.Stack
2391 parentChangeId := ""
2392 for _, fp := range formatPatches {
2393 // all patches must have a jj change-id
2394 changeId, err := fp.ChangeId()
2395 if err != nil {
2396 return nil, fmt.Errorf("Stacking is only supported if all patches contain a change-id commit header.")
2397 }
2398
2399 title := fp.Title
2400 body := fp.Body
2401 rkey := tid.TID()
2402
2403 mentions, references := s.mentionsResolver.Resolve(ctx, body)
2404
2405 initialSubmission := models.PullSubmission{
2406 Patch: fp.Raw,
2407 SourceRev: fp.SHA,
2408 Combined: fp.Raw,
2409 }
2410 pull := models.Pull{
2411 Title: title,
2412 Body: body,
2413 TargetBranch: targetBranch,
2414 OwnerDid: user.Active.Did,
2415 RepoAt: repo.RepoAt(),
2416 Rkey: rkey,
2417 Mentions: mentions,
2418 References: references,
2419 Submissions: []*models.PullSubmission{
2420 &initialSubmission,
2421 },
2422 PullSource: pullSource,
2423 Created: time.Now(),
2424
2425 StackId: stackId,
2426 ChangeId: changeId,
2427 ParentChangeId: parentChangeId,
2428 }
2429
2430 stack = append(stack, &pull)
2431
2432 parentChangeId = changeId
2433 }
2434
2435 return stack, nil
2436}
2437
2438func gz(s string) io.Reader {
2439 var b bytes.Buffer
2440 w := gzip.NewWriter(&b)
2441 w.Write([]byte(s))
2442 w.Close()
2443 return &b
2444}
2445
2446func validatePatch(patch *string) error {
2447 if patch == nil || *patch == "" {
2448 return fmt.Errorf("patch is empty")
2449 }
2450
2451 // add newline if not present to diff style patches
2452 if !patchutil.IsFormatPatch(*patch) && !strings.HasSuffix(*patch, "\n") {
2453 *patch = *patch + "\n"
2454 }
2455
2456 if err := patchutil.IsPatchValid(*patch); err != nil {
2457 return err
2458 }
2459
2460 return nil
2461}