A vibe coded tangled fork which supports pijul.
at sl/uosmolqmqxvw 2577 lines 73 kB view raw
1package pulls 2 3import ( 4 "bytes" 5 "compress/gzip" 6 "context" 7 "database/sql" 8 "encoding/json" 9 "errors" 10 "fmt" 11 "io" 12 "log" 13 "log/slog" 14 "net/http" 15 "slices" 16 "sort" 17 "strconv" 18 "strings" 19 "time" 20 21 "tangled.org/core/api/tangled" 22 "tangled.org/core/appview/config" 23 "tangled.org/core/appview/db" 24 pulls_indexer "tangled.org/core/appview/indexer/pulls" 25 "tangled.org/core/appview/mentions" 26 "tangled.org/core/appview/models" 27 "tangled.org/core/appview/notify" 28 "tangled.org/core/appview/oauth" 29 "tangled.org/core/appview/pages" 30 "tangled.org/core/appview/pages/markup/sanitizer" 31 "tangled.org/core/appview/pages/repoinfo" 32 "tangled.org/core/appview/pagination" 33 "tangled.org/core/appview/reporesolver" 34 "tangled.org/core/appview/searchquery" 35 "tangled.org/core/appview/xrpcclient" 36 "tangled.org/core/idresolver" 37 "tangled.org/core/orm" 38 "tangled.org/core/patchutil" 39 "tangled.org/core/rbac" 40 "tangled.org/core/tid" 41 "tangled.org/core/types" 42 "tangled.org/core/xrpc" 43 44 comatproto "github.com/bluesky-social/indigo/api/atproto" 45 "github.com/bluesky-social/indigo/atproto/syntax" 46 lexutil "github.com/bluesky-social/indigo/lex/util" 47 indigoxrpc "github.com/bluesky-social/indigo/xrpc" 48 "github.com/go-chi/chi/v5" 49 "github.com/google/uuid" 50) 51 52const ApplicationGzip = "application/gzip" 53 54type Pulls struct { 55 oauth *oauth.OAuth 56 repoResolver *reporesolver.RepoResolver 57 pages *pages.Pages 58 idResolver *idresolver.Resolver 59 mentionsResolver *mentions.Resolver 60 db *db.DB 61 config *config.Config 62 notifier notify.Notifier 63 enforcer *rbac.Enforcer 64 logger *slog.Logger 65 indexer *pulls_indexer.Indexer 66} 67 68func New( 69 oauth *oauth.OAuth, 70 repoResolver *reporesolver.RepoResolver, 71 pages *pages.Pages, 72 resolver *idresolver.Resolver, 73 mentionsResolver *mentions.Resolver, 74 db *db.DB, 75 config *config.Config, 76 notifier notify.Notifier, 77 enforcer *rbac.Enforcer, 78 indexer *pulls_indexer.Indexer, 79 logger *slog.Logger, 80) *Pulls { 81 return &Pulls{ 82 oauth: oauth, 83 repoResolver: repoResolver, 84 pages: pages, 85 idResolver: resolver, 86 mentionsResolver: mentionsResolver, 87 db: db, 88 config: config, 89 notifier: notifier, 90 enforcer: enforcer, 91 logger: logger, 92 indexer: indexer, 93 } 94} 95 96// htmx fragment 97func (s *Pulls) PullActions(w http.ResponseWriter, r *http.Request) { 98 switch r.Method { 99 case http.MethodGet: 100 user := s.oauth.GetMultiAccountUser(r) 101 f, err := s.repoResolver.Resolve(r) 102 if err != nil { 103 log.Println("failed to get repo and knot", err) 104 return 105 } 106 107 pull, ok := r.Context().Value("pull").(*models.Pull) 108 if !ok { 109 log.Println("failed to get pull") 110 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 111 return 112 } 113 114 // can be nil if this pull is not stacked 115 stack, _ := r.Context().Value("stack").(models.Stack) 116 117 roundNumberStr := chi.URLParam(r, "round") 118 roundNumber, err := strconv.Atoi(roundNumberStr) 119 if err != nil { 120 roundNumber = pull.LastRoundNumber() 121 } 122 if roundNumber >= len(pull.Submissions) { 123 http.Error(w, "bad round id", http.StatusBadRequest) 124 log.Println("failed to parse round id", err) 125 return 126 } 127 128 mergeCheckResponse := s.mergeCheck(r, f, pull, stack) 129 branchDeleteStatus := s.branchDeleteStatus(r, f, pull) 130 resubmitResult := pages.Unknown 131 if user.Active.Did == pull.OwnerDid { 132 resubmitResult = s.resubmitCheck(r, f, pull, stack) 133 } 134 135 s.pages.PullActionsFragment(w, pages.PullActionsParams{ 136 LoggedInUser: user, 137 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 138 Pull: pull, 139 RoundNumber: roundNumber, 140 MergeCheck: mergeCheckResponse, 141 ResubmitCheck: resubmitResult, 142 BranchDeleteStatus: branchDeleteStatus, 143 Stack: stack, 144 }) 145 return 146 } 147} 148 149func (s *Pulls) repoPullHelper(w http.ResponseWriter, r *http.Request, interdiff bool) { 150 user := s.oauth.GetMultiAccountUser(r) 151 f, err := s.repoResolver.Resolve(r) 152 if err != nil { 153 log.Println("failed to get repo and knot", err) 154 return 155 } 156 157 pull, ok := r.Context().Value("pull").(*models.Pull) 158 if !ok { 159 log.Println("failed to get pull") 160 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 161 return 162 } 163 164 backlinks, err := db.GetBacklinks(s.db, pull.AtUri()) 165 if err != nil { 166 log.Println("failed to get pull backlinks", err) 167 s.pages.Notice(w, "pull-error", "Failed to get pull. Try again later.") 168 return 169 } 170 171 roundId := chi.URLParam(r, "round") 172 roundIdInt := pull.LastRoundNumber() 173 if r, err := strconv.Atoi(roundId); err == nil { 174 roundIdInt = r 175 } 176 if roundIdInt >= len(pull.Submissions) { 177 http.Error(w, "bad round id", http.StatusBadRequest) 178 log.Println("failed to parse round id", err) 179 return 180 } 181 182 var diffOpts types.DiffOpts 183 if d := r.URL.Query().Get("diff"); d == "split" { 184 diffOpts.Split = true 185 } 186 187 // can be nil if this pull is not stacked 188 stack, _ := r.Context().Value("stack").(models.Stack) 189 abandonedPulls, _ := r.Context().Value("abandonedPulls").([]*models.Pull) 190 191 mergeCheckResponse := s.mergeCheck(r, f, pull, stack) 192 branchDeleteStatus := s.branchDeleteStatus(r, f, pull) 193 resubmitResult := pages.Unknown 194 if user != nil && user.Active != nil && user.Active.Did == pull.OwnerDid { 195 resubmitResult = s.resubmitCheck(r, f, pull, stack) 196 } 197 198 m := make(map[string]models.Pipeline) 199 200 var shas []string 201 for _, s := range pull.Submissions { 202 shas = append(shas, s.SourceRev) 203 } 204 for _, p := range stack { 205 shas = append(shas, p.LatestSha()) 206 } 207 for _, p := range abandonedPulls { 208 shas = append(shas, p.LatestSha()) 209 } 210 211 ps, err := db.GetPipelineStatuses( 212 s.db, 213 len(shas), 214 orm.FilterEq("p.repo_owner", f.Did), 215 orm.FilterEq("p.repo_name", f.Name), 216 orm.FilterEq("p.knot", f.Knot), 217 orm.FilterIn("p.sha", shas), 218 ) 219 if err != nil { 220 log.Printf("failed to fetch pipeline statuses: %s", err) 221 // non-fatal 222 } 223 224 for _, p := range ps { 225 m[p.Sha] = p 226 } 227 228 reactionMap, err := db.GetReactionMap(s.db, 20, pull.AtUri()) 229 if err != nil { 230 s.logger.Error("failed to get pull reaction status", "err", err) 231 } 232 233 userReactions := map[models.ReactionKind]bool{} 234 if user != nil { 235 userReactions, err = db.GetReactionStatusMap(s.db, user.Active.Did, pull.AtUri()) 236 if err != nil { 237 s.logger.Error("failed to get pull reaction status", "err", err) 238 } 239 } 240 241 labelDefs, err := db.GetLabelDefinitions( 242 s.db, 243 orm.FilterIn("at_uri", f.Labels), 244 orm.FilterContains("scope", tangled.RepoPullNSID), 245 ) 246 if err != nil { 247 log.Println("failed to fetch labels", err) 248 s.pages.Error503(w) 249 return 250 } 251 252 defs := make(map[string]*models.LabelDefinition) 253 for _, l := range labelDefs { 254 defs[l.AtUri().String()] = &l 255 } 256 257 patch := pull.Submissions[roundIdInt].CombinedPatch() 258 var diff types.DiffRenderer 259 diff = patchutil.AsNiceDiff(patch, pull.TargetBranch) 260 261 if interdiff { 262 currentPatch, err := patchutil.AsDiff(pull.Submissions[roundIdInt].CombinedPatch()) 263 if err != nil { 264 log.Println("failed to interdiff; current patch malformed") 265 s.pages.Notice(w, fmt.Sprintf("interdiff-error-%d", roundIdInt), "Failed to calculate interdiff; current patch is invalid.") 266 return 267 } 268 269 previousPatch, err := patchutil.AsDiff(pull.Submissions[roundIdInt-1].CombinedPatch()) 270 if err != nil { 271 log.Println("failed to interdiff; previous patch malformed") 272 s.pages.Notice(w, fmt.Sprintf("interdiff-error-%d", roundIdInt), "Failed to calculate interdiff; previous patch is invalid.") 273 return 274 } 275 276 diff = patchutil.Interdiff(previousPatch, currentPatch) 277 } 278 279 s.pages.RepoSinglePull(w, pages.RepoSinglePullParams{ 280 LoggedInUser: user, 281 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 282 Pull: pull, 283 Stack: stack, 284 AbandonedPulls: abandonedPulls, 285 Backlinks: backlinks, 286 BranchDeleteStatus: branchDeleteStatus, 287 MergeCheck: mergeCheckResponse, 288 ResubmitCheck: resubmitResult, 289 Pipelines: m, 290 Diff: diff, 291 DiffOpts: diffOpts, 292 ActiveRound: roundIdInt, 293 IsInterdiff: interdiff, 294 295 Reactions: reactionMap, 296 UserReacted: userReactions, 297 298 LabelDefs: defs, 299 }) 300} 301 302func (s *Pulls) RepoSinglePull(w http.ResponseWriter, r *http.Request) { 303 pull, ok := r.Context().Value("pull").(*models.Pull) 304 if !ok { 305 log.Println("failed to get pull") 306 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 307 return 308 } 309 310 http.Redirect(w, r, r.URL.String()+fmt.Sprintf("/round/%d", pull.LastRoundNumber()), http.StatusFound) 311} 312 313func (s *Pulls) mergeCheck(r *http.Request, f *models.Repo, pull *models.Pull, stack models.Stack) types.MergeCheckResponse { 314 if pull.State == models.PullMerged { 315 return types.MergeCheckResponse{} 316 } 317 318 scheme := "https" 319 if s.config.Core.Dev { 320 scheme = "http" 321 } 322 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 323 324 xrpcc := indigoxrpc.Client{ 325 Host: host, 326 } 327 328 patch := pull.LatestPatch() 329 if pull.IsStacked() { 330 // combine patches of substack 331 subStack := stack.Below(pull) 332 // collect the portion of the stack that is mergeable 333 mergeable := subStack.Mergeable() 334 // combine each patch 335 patch = mergeable.CombinedPatch() 336 } 337 338 resp, xe := tangled.RepoMergeCheck( 339 r.Context(), 340 &xrpcc, 341 &tangled.RepoMergeCheck_Input{ 342 Did: f.Did, 343 Name: f.Name, 344 Branch: pull.TargetBranch, 345 Patch: patch, 346 }, 347 ) 348 if err := xrpcclient.HandleXrpcErr(xe); err != nil { 349 log.Println("failed to check for mergeability", "err", err) 350 return types.MergeCheckResponse{ 351 Error: fmt.Sprintf("failed to check merge status: %s", err.Error()), 352 } 353 } 354 355 // convert xrpc response to internal types 356 conflicts := make([]types.ConflictInfo, len(resp.Conflicts)) 357 for i, conflict := range resp.Conflicts { 358 conflicts[i] = types.ConflictInfo{ 359 Filename: conflict.Filename, 360 Reason: conflict.Reason, 361 } 362 } 363 364 result := types.MergeCheckResponse{ 365 IsConflicted: resp.Is_conflicted, 366 Conflicts: conflicts, 367 } 368 369 if resp.Message != nil { 370 result.Message = *resp.Message 371 } 372 373 if resp.Error != nil { 374 result.Error = *resp.Error 375 } 376 377 return result 378} 379 380func (s *Pulls) branchDeleteStatus(r *http.Request, repo *models.Repo, pull *models.Pull) *models.BranchDeleteStatus { 381 if pull.State != models.PullMerged { 382 return nil 383 } 384 385 user := s.oauth.GetMultiAccountUser(r) 386 if user == nil { 387 return nil 388 } 389 390 var branch string 391 // check if the branch exists 392 // NOTE: appview could cache branches/tags etc. for every repo by listening for gitRefUpdates 393 if pull.IsBranchBased() { 394 branch = pull.PullSource.Branch 395 } else if pull.IsForkBased() { 396 branch = pull.PullSource.Branch 397 repo = pull.PullSource.Repo 398 } else { 399 return nil 400 } 401 402 // deleted fork 403 if repo == nil { 404 return nil 405 } 406 407 // user can only delete branch if they are a collaborator in the repo that the branch belongs to 408 perms := s.enforcer.GetPermissionsInRepo(user.Active.Did, repo.Knot, repo.DidSlashRepo()) 409 if !slices.Contains(perms, "repo:push") { 410 return nil 411 } 412 413 scheme := "http" 414 if !s.config.Core.Dev { 415 scheme = "https" 416 } 417 host := fmt.Sprintf("%s://%s", scheme, repo.Knot) 418 xrpcc := &indigoxrpc.Client{ 419 Host: host, 420 } 421 422 resp, err := tangled.RepoBranch(r.Context(), xrpcc, branch, fmt.Sprintf("%s/%s", repo.Did, repo.Name)) 423 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 424 return nil 425 } 426 427 return &models.BranchDeleteStatus{ 428 Repo: repo, 429 Branch: resp.Name, 430 } 431} 432 433func (s *Pulls) resubmitCheck(r *http.Request, repo *models.Repo, pull *models.Pull, stack models.Stack) pages.ResubmitResult { 434 if pull.State == models.PullMerged || pull.State == models.PullDeleted || pull.PullSource == nil { 435 return pages.Unknown 436 } 437 438 var knot, ownerDid, repoName string 439 440 if pull.PullSource.RepoAt != nil { 441 // fork-based pulls 442 sourceRepo, err := db.GetRepoByAtUri(s.db, pull.PullSource.RepoAt.String()) 443 if err != nil { 444 log.Println("failed to get source repo", err) 445 return pages.Unknown 446 } 447 448 knot = sourceRepo.Knot 449 ownerDid = sourceRepo.Did 450 repoName = sourceRepo.Name 451 } else { 452 // pulls within the same repo 453 knot = repo.Knot 454 ownerDid = repo.Did 455 repoName = repo.Name 456 } 457 458 scheme := "http" 459 if !s.config.Core.Dev { 460 scheme = "https" 461 } 462 host := fmt.Sprintf("%s://%s", scheme, knot) 463 xrpcc := &indigoxrpc.Client{ 464 Host: host, 465 } 466 467 didSlashName := fmt.Sprintf("%s/%s", ownerDid, repoName) 468 branchResp, err := tangled.RepoBranch(r.Context(), xrpcc, pull.PullSource.Branch, didSlashName) 469 if err != nil { 470 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 471 log.Println("failed to call XRPC repo.branches", xrpcerr) 472 return pages.Unknown 473 } 474 log.Println("failed to reach knotserver", err) 475 return pages.Unknown 476 } 477 478 targetBranch := branchResp 479 480 latestSourceRev := pull.LatestSha() 481 482 if pull.IsStacked() && stack != nil { 483 top := stack[0] 484 latestSourceRev = top.LatestSha() 485 } 486 487 if latestSourceRev != targetBranch.Hash { 488 return pages.ShouldResubmit 489 } 490 491 return pages.ShouldNotResubmit 492} 493 494func (s *Pulls) RepoPullPatch(w http.ResponseWriter, r *http.Request) { 495 s.repoPullHelper(w, r, false) 496} 497 498func (s *Pulls) RepoPullInterdiff(w http.ResponseWriter, r *http.Request) { 499 s.repoPullHelper(w, r, true) 500} 501 502func (s *Pulls) RepoPullPatchRaw(w http.ResponseWriter, r *http.Request) { 503 pull, ok := r.Context().Value("pull").(*models.Pull) 504 if !ok { 505 log.Println("failed to get pull") 506 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 507 return 508 } 509 510 roundId := chi.URLParam(r, "round") 511 roundIdInt, err := strconv.Atoi(roundId) 512 if err != nil || roundIdInt >= len(pull.Submissions) { 513 http.Error(w, "bad round id", http.StatusBadRequest) 514 log.Println("failed to parse round id", err) 515 return 516 } 517 518 w.Header().Set("Content-Type", "text/plain; charset=utf-8") 519 w.Write([]byte(pull.Submissions[roundIdInt].Patch)) 520} 521 522func (s *Pulls) RepoPulls(w http.ResponseWriter, r *http.Request) { 523 l := s.logger.With("handler", "RepoPulls") 524 525 user := s.oauth.GetMultiAccountUser(r) 526 params := r.URL.Query() 527 page := pagination.FromContext(r.Context()) 528 529 f, err := s.repoResolver.Resolve(r) 530 if err != nil { 531 log.Println("failed to get repo and knot", err) 532 return 533 } 534 535 query := searchquery.Parse(params.Get("q")) 536 537 var state *models.PullState 538 if urlState := params.Get("state"); urlState != "" { 539 switch urlState { 540 case "open": 541 state = ptrPullState(models.PullOpen) 542 case "closed": 543 state = ptrPullState(models.PullClosed) 544 case "merged": 545 state = ptrPullState(models.PullMerged) 546 } 547 query.Set("state", urlState) 548 } else if queryState := query.Get("state"); queryState != nil { 549 switch *queryState { 550 case "open": 551 state = ptrPullState(models.PullOpen) 552 case "closed": 553 state = ptrPullState(models.PullClosed) 554 case "merged": 555 state = ptrPullState(models.PullMerged) 556 } 557 } else if _, hasQ := params["q"]; !hasQ { 558 state = ptrPullState(models.PullOpen) 559 query.Set("state", "open") 560 } 561 562 var authorDid string 563 if authorHandle := query.Get("author"); authorHandle != nil { 564 identity, err := s.idResolver.ResolveIdent(r.Context(), *authorHandle) 565 if err != nil { 566 l.Debug("failed to resolve author handle", "handle", *authorHandle, "err", err) 567 } else { 568 authorDid = identity.DID.String() 569 } 570 } 571 572 var negatedAuthorDid string 573 if negatedAuthors := query.GetAllNegated("author"); len(negatedAuthors) > 0 { 574 identity, err := s.idResolver.ResolveIdent(r.Context(), negatedAuthors[0]) 575 if err != nil { 576 l.Debug("failed to resolve negated author handle", "handle", negatedAuthors[0], "err", err) 577 } else { 578 negatedAuthorDid = identity.DID.String() 579 } 580 } 581 582 labels := query.GetAll("label") 583 negatedLabels := query.GetAllNegated("label") 584 585 var keywords, negatedKeywords []string 586 var phrases, negatedPhrases []string 587 for _, item := range query.Items() { 588 switch item.Kind { 589 case searchquery.KindKeyword: 590 if item.Negated { 591 negatedKeywords = append(negatedKeywords, item.Value) 592 } else { 593 keywords = append(keywords, item.Value) 594 } 595 case searchquery.KindQuoted: 596 if item.Negated { 597 negatedPhrases = append(negatedPhrases, item.Value) 598 } else { 599 phrases = append(phrases, item.Value) 600 } 601 } 602 } 603 604 searchOpts := models.PullSearchOptions{ 605 Keywords: keywords, 606 Phrases: phrases, 607 RepoAt: f.RepoAt().String(), 608 State: state, 609 AuthorDid: authorDid, 610 Labels: labels, 611 NegatedKeywords: negatedKeywords, 612 NegatedPhrases: negatedPhrases, 613 NegatedLabels: negatedLabels, 614 NegatedAuthorDid: negatedAuthorDid, 615 Page: page, 616 } 617 618 var totalPulls int 619 if state == nil { 620 totalPulls = f.RepoStats.PullCount.Open + f.RepoStats.PullCount.Merged + f.RepoStats.PullCount.Closed 621 } else { 622 switch *state { 623 case models.PullOpen: 624 totalPulls = f.RepoStats.PullCount.Open 625 case models.PullMerged: 626 totalPulls = f.RepoStats.PullCount.Merged 627 case models.PullClosed: 628 totalPulls = f.RepoStats.PullCount.Closed 629 } 630 } 631 632 repoInfo := s.repoResolver.GetRepoInfo(r, user) 633 634 var pulls []*models.Pull 635 636 if searchOpts.HasSearchFilters() { 637 res, err := s.indexer.Search(r.Context(), searchOpts) 638 if err != nil { 639 l.Error("failed to search for pulls", "err", err) 640 return 641 } 642 totalPulls = int(res.Total) 643 l.Debug("searched pulls with indexer", "count", len(res.Hits)) 644 645 // update tab counts to reflect filtered results 646 countOpts := searchOpts 647 countOpts.Page = pagination.Page{Limit: 1} 648 for _, ps := range []models.PullState{models.PullOpen, models.PullMerged, models.PullClosed} { 649 ps := ps 650 countOpts.State = &ps 651 countRes, err := s.indexer.Search(r.Context(), countOpts) 652 if err != nil { 653 continue 654 } 655 switch ps { 656 case models.PullOpen: 657 repoInfo.Stats.PullCount.Open = int(countRes.Total) 658 case models.PullMerged: 659 repoInfo.Stats.PullCount.Merged = int(countRes.Total) 660 case models.PullClosed: 661 repoInfo.Stats.PullCount.Closed = int(countRes.Total) 662 } 663 } 664 665 if len(res.Hits) > 0 { 666 pulls, err = db.GetPulls( 667 s.db, 668 orm.FilterIn("id", res.Hits), 669 ) 670 if err != nil { 671 l.Error("failed to get pulls", "err", err) 672 s.pages.Notice(w, "pulls", "Failed to load pulls. Try again later.") 673 return 674 } 675 } 676 } else { 677 filters := []orm.Filter{ 678 orm.FilterEq("repo_at", f.RepoAt()), 679 } 680 if state != nil { 681 filters = append(filters, orm.FilterEq("state", *state)) 682 } 683 pulls, err = db.GetPullsPaginated( 684 s.db, 685 page, 686 filters..., 687 ) 688 if err != nil { 689 l.Error("failed to get pulls", "err", err) 690 s.pages.Notice(w, "pulls", "Failed to load pulls. Try again later.") 691 return 692 } 693 } 694 695 for _, p := range pulls { 696 var pullSourceRepo *models.Repo 697 if p.PullSource != nil { 698 if p.PullSource.RepoAt != nil { 699 pullSourceRepo, err = db.GetRepoByAtUri(s.db, p.PullSource.RepoAt.String()) 700 if err != nil { 701 log.Printf("failed to get repo by at uri: %v", err) 702 continue 703 } else { 704 p.PullSource.Repo = pullSourceRepo 705 } 706 } 707 } 708 } 709 710 // we want to group all stacked PRs into just one list 711 stacks := make(map[string]models.Stack) 712 var shas []string 713 n := 0 714 for _, p := range pulls { 715 // store the sha for later 716 shas = append(shas, p.LatestSha()) 717 // this PR is stacked 718 if p.StackId != "" { 719 // we have already seen this PR stack 720 if _, seen := stacks[p.StackId]; seen { 721 stacks[p.StackId] = append(stacks[p.StackId], p) 722 // skip this PR 723 } else { 724 stacks[p.StackId] = nil 725 pulls[n] = p 726 n++ 727 } 728 } else { 729 pulls[n] = p 730 n++ 731 } 732 } 733 pulls = pulls[:n] 734 735 ps, err := db.GetPipelineStatuses( 736 s.db, 737 len(shas), 738 orm.FilterEq("p.repo_owner", f.Did), 739 orm.FilterEq("p.repo_name", f.Name), 740 orm.FilterEq("p.knot", f.Knot), 741 orm.FilterIn("p.sha", shas), 742 ) 743 if err != nil { 744 log.Printf("failed to fetch pipeline statuses: %s", err) 745 // non-fatal 746 } 747 m := make(map[string]models.Pipeline) 748 for _, p := range ps { 749 m[p.Sha] = p 750 } 751 752 labelDefs, err := db.GetLabelDefinitions( 753 s.db, 754 orm.FilterIn("at_uri", f.Labels), 755 orm.FilterContains("scope", tangled.RepoPullNSID), 756 ) 757 if err != nil { 758 l.Error("failed to fetch labels", "err", err) 759 s.pages.Error503(w) 760 return 761 } 762 763 defs := make(map[string]*models.LabelDefinition) 764 for _, l := range labelDefs { 765 defs[l.AtUri().String()] = &l 766 } 767 768 filterState := "" 769 if state != nil { 770 filterState = state.String() 771 } 772 773 s.pages.RepoPulls(w, pages.RepoPullsParams{ 774 LoggedInUser: s.oauth.GetMultiAccountUser(r), 775 RepoInfo: repoInfo, 776 Pulls: pulls, 777 LabelDefs: defs, 778 FilterState: filterState, 779 FilterQuery: query.String(), 780 Stacks: stacks, 781 Pipelines: m, 782 Page: page, 783 PullCount: totalPulls, 784 }) 785} 786 787func (s *Pulls) PullComment(w http.ResponseWriter, r *http.Request) { 788 user := s.oauth.GetMultiAccountUser(r) 789 f, err := s.repoResolver.Resolve(r) 790 if err != nil { 791 log.Println("failed to get repo and knot", err) 792 return 793 } 794 795 pull, ok := r.Context().Value("pull").(*models.Pull) 796 if !ok { 797 log.Println("failed to get pull") 798 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 799 return 800 } 801 802 roundNumberStr := chi.URLParam(r, "round") 803 roundNumber, err := strconv.Atoi(roundNumberStr) 804 if err != nil || roundNumber >= len(pull.Submissions) { 805 http.Error(w, "bad round id", http.StatusBadRequest) 806 log.Println("failed to parse round id", err) 807 return 808 } 809 810 switch r.Method { 811 case http.MethodGet: 812 s.pages.PullNewCommentFragment(w, pages.PullNewCommentParams{ 813 LoggedInUser: user, 814 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 815 Pull: pull, 816 RoundNumber: roundNumber, 817 }) 818 return 819 case http.MethodPost: 820 body := r.FormValue("body") 821 if body == "" { 822 s.pages.Notice(w, "pull", "Comment body is required") 823 return 824 } 825 826 mentions, references := s.mentionsResolver.Resolve(r.Context(), body) 827 828 // Start a transaction 829 tx, err := s.db.BeginTx(r.Context(), nil) 830 if err != nil { 831 log.Println("failed to start transaction", err) 832 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 833 return 834 } 835 defer tx.Rollback() 836 837 createdAt := time.Now().Format(time.RFC3339) 838 839 client, err := s.oauth.AuthorizedClient(r) 840 if err != nil { 841 log.Println("failed to get authorized client", err) 842 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 843 return 844 } 845 atResp, err := comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 846 Collection: tangled.RepoPullCommentNSID, 847 Repo: user.Active.Did, 848 Rkey: tid.TID(), 849 Record: &lexutil.LexiconTypeDecoder{ 850 Val: &tangled.RepoPullComment{ 851 Pull: pull.AtUri().String(), 852 Body: body, 853 CreatedAt: createdAt, 854 }, 855 }, 856 }) 857 if err != nil { 858 log.Println("failed to create pull comment", err) 859 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 860 return 861 } 862 863 comment := &models.PullComment{ 864 OwnerDid: user.Active.Did, 865 RepoAt: f.RepoAt().String(), 866 PullId: pull.PullId, 867 Body: body, 868 CommentAt: atResp.Uri, 869 SubmissionId: pull.Submissions[roundNumber].ID, 870 Mentions: mentions, 871 References: references, 872 } 873 874 // Create the pull comment in the database with the commentAt field 875 commentId, err := db.NewPullComment(tx, comment) 876 if err != nil { 877 log.Println("failed to create pull comment", err) 878 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 879 return 880 } 881 882 // Commit the transaction 883 if err = tx.Commit(); err != nil { 884 log.Println("failed to commit transaction", err) 885 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 886 return 887 } 888 889 s.notifier.NewPullComment(r.Context(), comment, mentions) 890 891 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f) 892 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d#comment-%d", ownerSlashRepo, pull.PullId, commentId)) 893 return 894 } 895} 896 897func (s *Pulls) NewPull(w http.ResponseWriter, r *http.Request) { 898 user := s.oauth.GetMultiAccountUser(r) 899 f, err := s.repoResolver.Resolve(r) 900 if err != nil { 901 log.Println("failed to get repo and knot", err) 902 return 903 } 904 905 switch r.Method { 906 case http.MethodGet: 907 scheme := "http" 908 if !s.config.Core.Dev { 909 scheme = "https" 910 } 911 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 912 xrpcc := &indigoxrpc.Client{ 913 Host: host, 914 } 915 916 repo := fmt.Sprintf("%s/%s", f.Did, f.Name) 917 xrpcBytes, err := tangled.RepoBranches(r.Context(), xrpcc, "", 0, repo) 918 if err != nil { 919 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 920 log.Println("failed to call XRPC repo.branches", xrpcerr) 921 s.pages.Error503(w) 922 return 923 } 924 log.Println("failed to fetch branches", err) 925 return 926 } 927 928 var result types.RepoBranchesResponse 929 if err := json.Unmarshal(xrpcBytes, &result); err != nil { 930 log.Println("failed to decode XRPC response", err) 931 s.pages.Error503(w) 932 return 933 } 934 935 // can be one of "patch", "branch" or "fork" 936 strategy := r.URL.Query().Get("strategy") 937 // ignored if strategy is "patch" 938 sourceBranch := r.URL.Query().Get("sourceBranch") 939 targetBranch := r.URL.Query().Get("targetBranch") 940 941 s.pages.RepoNewPull(w, pages.RepoNewPullParams{ 942 LoggedInUser: user, 943 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 944 Branches: result.Branches, 945 Strategy: strategy, 946 SourceBranch: sourceBranch, 947 TargetBranch: targetBranch, 948 Title: r.URL.Query().Get("title"), 949 Body: r.URL.Query().Get("body"), 950 }) 951 952 case http.MethodPost: 953 title := r.FormValue("title") 954 body := r.FormValue("body") 955 targetBranch := r.FormValue("targetBranch") 956 fromFork := r.FormValue("fork") 957 sourceBranch := r.FormValue("sourceBranch") 958 patch := r.FormValue("patch") 959 960 if targetBranch == "" { 961 s.pages.Notice(w, "pull", "Target branch is required.") 962 return 963 } 964 965 // Determine PR type based on input parameters 966 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())} 967 isPushAllowed := roles.IsPushAllowed() 968 isBranchBased := isPushAllowed && sourceBranch != "" && fromFork == "" 969 isForkBased := fromFork != "" && sourceBranch != "" 970 isPatchBased := patch != "" && !isBranchBased && !isForkBased 971 isStacked := r.FormValue("isStacked") == "on" 972 973 if isPatchBased && !patchutil.IsFormatPatch(patch) { 974 if title == "" { 975 s.pages.Notice(w, "pull", "Title is required for git-diff patches.") 976 return 977 } 978 if st := strings.TrimSpace(sanitizer.SanitizeDescription(title)); (st) == "" { 979 s.pages.Notice(w, "pull", "Title is empty after HTML sanitization") 980 return 981 } 982 } 983 984 // Validate we have at least one valid PR creation method 985 if !isBranchBased && !isPatchBased && !isForkBased { 986 s.pages.Notice(w, "pull", "Neither source branch nor patch supplied.") 987 return 988 } 989 990 // Can't mix branch-based and patch-based approaches 991 if isBranchBased && patch != "" { 992 s.pages.Notice(w, "pull", "Cannot select both patch and source branch.") 993 return 994 } 995 996 // us, err := knotclient.NewUnsignedClient(f.Knot, s.config.Core.Dev) 997 // if err != nil { 998 // log.Printf("failed to create unsigned client to %s: %v", f.Knot, err) 999 // s.pages.Notice(w, "pull", "Failed to create a pull request. Try again later.") 1000 // return 1001 // } 1002 1003 // TODO: make capabilities an xrpc call 1004 caps := struct { 1005 PullRequests struct { 1006 FormatPatch bool 1007 BranchSubmissions bool 1008 ForkSubmissions bool 1009 PatchSubmissions bool 1010 } 1011 }{ 1012 PullRequests: struct { 1013 FormatPatch bool 1014 BranchSubmissions bool 1015 ForkSubmissions bool 1016 PatchSubmissions bool 1017 }{ 1018 FormatPatch: true, 1019 BranchSubmissions: true, 1020 ForkSubmissions: true, 1021 PatchSubmissions: true, 1022 }, 1023 } 1024 1025 // caps, err := us.Capabilities() 1026 // if err != nil { 1027 // log.Println("error fetching knot caps", f.Knot, err) 1028 // s.pages.Notice(w, "pull", "Failed to create a pull request. Try again later.") 1029 // return 1030 // } 1031 1032 if !caps.PullRequests.FormatPatch { 1033 s.pages.Notice(w, "pull", "This knot doesn't support format-patch. Unfortunately, there is no fallback for now.") 1034 return 1035 } 1036 1037 // Handle the PR creation based on the type 1038 if isBranchBased { 1039 if !caps.PullRequests.BranchSubmissions { 1040 s.pages.Notice(w, "pull", "This knot doesn't support branch-based pull requests. Try another way?") 1041 return 1042 } 1043 s.handleBranchBasedPull(w, r, f, user, title, body, targetBranch, sourceBranch, isStacked) 1044 } else if isForkBased { 1045 if !caps.PullRequests.ForkSubmissions { 1046 s.pages.Notice(w, "pull", "This knot doesn't support fork-based pull requests. Try another way?") 1047 return 1048 } 1049 s.handleForkBasedPull(w, r, f, user, fromFork, title, body, targetBranch, sourceBranch, isStacked) 1050 } else if isPatchBased { 1051 if !caps.PullRequests.PatchSubmissions { 1052 s.pages.Notice(w, "pull", "This knot doesn't support patch-based pull requests. Send your patch over email.") 1053 return 1054 } 1055 s.handlePatchBasedPull(w, r, f, user, title, body, targetBranch, patch, isStacked) 1056 } 1057 return 1058 } 1059} 1060 1061func (s *Pulls) handleBranchBasedPull( 1062 w http.ResponseWriter, 1063 r *http.Request, 1064 repo *models.Repo, 1065 user *oauth.MultiAccountUser, 1066 title, 1067 body, 1068 targetBranch, 1069 sourceBranch string, 1070 isStacked bool, 1071) { 1072 scheme := "http" 1073 if !s.config.Core.Dev { 1074 scheme = "https" 1075 } 1076 host := fmt.Sprintf("%s://%s", scheme, repo.Knot) 1077 xrpcc := &indigoxrpc.Client{ 1078 Host: host, 1079 } 1080 1081 didSlashRepo := fmt.Sprintf("%s/%s", repo.Did, repo.Name) 1082 xrpcBytes, err := tangled.RepoCompare(r.Context(), xrpcc, didSlashRepo, targetBranch, sourceBranch) 1083 if err != nil { 1084 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1085 log.Println("failed to call XRPC repo.compare", xrpcerr) 1086 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1087 return 1088 } 1089 log.Println("failed to compare", err) 1090 s.pages.Notice(w, "pull", err.Error()) 1091 return 1092 } 1093 1094 var comparison types.RepoFormatPatchResponse 1095 if err := json.Unmarshal(xrpcBytes, &comparison); err != nil { 1096 log.Println("failed to decode XRPC compare response", err) 1097 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1098 return 1099 } 1100 1101 sourceRev := comparison.Rev2 1102 patch := comparison.FormatPatchRaw 1103 combined := comparison.CombinedPatchRaw 1104 1105 if err := validatePatch(&patch); err != nil { 1106 s.logger.Error("failed to validate patch", "err", err) 1107 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 1108 return 1109 } 1110 1111 pullSource := &models.PullSource{ 1112 Branch: sourceBranch, 1113 } 1114 recordPullSource := &tangled.RepoPull_Source{ 1115 Branch: sourceBranch, 1116 Sha: comparison.Rev2, 1117 } 1118 1119 s.createPullRequest(w, r, repo, user, title, body, targetBranch, patch, combined, sourceRev, pullSource, recordPullSource, isStacked) 1120} 1121 1122func (s *Pulls) handlePatchBasedPull(w http.ResponseWriter, r *http.Request, repo *models.Repo, user *oauth.MultiAccountUser, title, body, targetBranch, patch string, isStacked bool) { 1123 if err := validatePatch(&patch); err != nil { 1124 s.logger.Error("patch validation failed", "err", err) 1125 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 1126 return 1127 } 1128 1129 s.createPullRequest(w, r, repo, user, title, body, targetBranch, patch, "", "", nil, nil, isStacked) 1130} 1131 1132func (s *Pulls) handleForkBasedPull(w http.ResponseWriter, r *http.Request, repo *models.Repo, user *oauth.MultiAccountUser, forkRepo string, title, body, targetBranch, sourceBranch string, isStacked bool) { 1133 repoString := strings.SplitN(forkRepo, "/", 2) 1134 forkOwnerDid := repoString[0] 1135 repoName := repoString[1] 1136 fork, err := db.GetForkByDid(s.db, forkOwnerDid, repoName) 1137 if errors.Is(err, sql.ErrNoRows) { 1138 s.pages.Notice(w, "pull", "No such fork.") 1139 return 1140 } else if err != nil { 1141 log.Println("failed to fetch fork:", err) 1142 s.pages.Notice(w, "pull", "Failed to fetch fork.") 1143 return 1144 } 1145 1146 client, err := s.oauth.ServiceClient( 1147 r, 1148 oauth.WithService(fork.Knot), 1149 oauth.WithLxm(tangled.RepoHiddenRefNSID), 1150 oauth.WithDev(s.config.Core.Dev), 1151 ) 1152 1153 resp, err := tangled.RepoHiddenRef( 1154 r.Context(), 1155 client, 1156 &tangled.RepoHiddenRef_Input{ 1157 ForkRef: sourceBranch, 1158 RemoteRef: targetBranch, 1159 Repo: fork.RepoAt().String(), 1160 }, 1161 ) 1162 if err := xrpcclient.HandleXrpcErr(err); err != nil { 1163 s.pages.Notice(w, "pull", err.Error()) 1164 return 1165 } 1166 1167 if !resp.Success { 1168 errorMsg := "Failed to create pull request" 1169 if resp.Error != nil { 1170 errorMsg = fmt.Sprintf("Failed to create pull request: %s", *resp.Error) 1171 } 1172 s.pages.Notice(w, "pull", errorMsg) 1173 return 1174 } 1175 1176 hiddenRef := fmt.Sprintf("hidden/%s/%s", sourceBranch, targetBranch) 1177 // We're now comparing the sourceBranch (on the fork) against the hiddenRef which is tracking 1178 // the targetBranch on the target repository. This code is a bit confusing, but here's an example: 1179 // hiddenRef: hidden/feature-1/main (on repo-fork) 1180 // targetBranch: main (on repo-1) 1181 // sourceBranch: feature-1 (on repo-fork) 1182 forkScheme := "http" 1183 if !s.config.Core.Dev { 1184 forkScheme = "https" 1185 } 1186 forkHost := fmt.Sprintf("%s://%s", forkScheme, fork.Knot) 1187 forkXrpcc := &indigoxrpc.Client{ 1188 Host: forkHost, 1189 } 1190 1191 forkRepoId := fmt.Sprintf("%s/%s", fork.Did, fork.Name) 1192 forkXrpcBytes, err := tangled.RepoCompare(r.Context(), forkXrpcc, forkRepoId, hiddenRef, sourceBranch) 1193 if err != nil { 1194 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1195 log.Println("failed to call XRPC repo.compare for fork", xrpcerr) 1196 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1197 return 1198 } 1199 log.Println("failed to compare across branches", err) 1200 s.pages.Notice(w, "pull", err.Error()) 1201 return 1202 } 1203 1204 var comparison types.RepoFormatPatchResponse 1205 if err := json.Unmarshal(forkXrpcBytes, &comparison); err != nil { 1206 log.Println("failed to decode XRPC compare response for fork", err) 1207 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1208 return 1209 } 1210 1211 sourceRev := comparison.Rev2 1212 patch := comparison.FormatPatchRaw 1213 combined := comparison.CombinedPatchRaw 1214 1215 if err := validatePatch(&patch); err != nil { 1216 s.logger.Error("failed to validate patch", "err", err) 1217 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 1218 return 1219 } 1220 1221 forkAtUri := fork.RepoAt() 1222 forkAtUriStr := forkAtUri.String() 1223 1224 pullSource := &models.PullSource{ 1225 Branch: sourceBranch, 1226 RepoAt: &forkAtUri, 1227 } 1228 recordPullSource := &tangled.RepoPull_Source{ 1229 Branch: sourceBranch, 1230 Repo: &forkAtUriStr, 1231 Sha: sourceRev, 1232 } 1233 1234 s.createPullRequest(w, r, repo, user, title, body, targetBranch, patch, combined, sourceRev, pullSource, recordPullSource, isStacked) 1235} 1236 1237func (s *Pulls) createPullRequest( 1238 w http.ResponseWriter, 1239 r *http.Request, 1240 repo *models.Repo, 1241 user *oauth.MultiAccountUser, 1242 title, body, targetBranch string, 1243 patch string, 1244 combined string, 1245 sourceRev string, 1246 pullSource *models.PullSource, 1247 recordPullSource *tangled.RepoPull_Source, 1248 isStacked bool, 1249) { 1250 if isStacked { 1251 // creates a series of PRs, each linking to the previous, identified by jj's change-id 1252 s.createStackedPullRequest( 1253 w, 1254 r, 1255 repo, 1256 user, 1257 targetBranch, 1258 patch, 1259 sourceRev, 1260 pullSource, 1261 ) 1262 return 1263 } 1264 1265 client, err := s.oauth.AuthorizedClient(r) 1266 if err != nil { 1267 log.Println("failed to get authorized client", err) 1268 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1269 return 1270 } 1271 1272 tx, err := s.db.BeginTx(r.Context(), nil) 1273 if err != nil { 1274 log.Println("failed to start tx") 1275 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1276 return 1277 } 1278 defer tx.Rollback() 1279 1280 // We've already checked earlier if it's diff-based and title is empty, 1281 // so if it's still empty now, it's intentionally skipped owing to format-patch. 1282 if title == "" || body == "" { 1283 formatPatches, err := patchutil.ExtractPatches(patch) 1284 if err != nil { 1285 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to extract patches: %v", err)) 1286 return 1287 } 1288 if len(formatPatches) == 0 { 1289 s.pages.Notice(w, "pull", "No patches found in the supplied format-patch.") 1290 return 1291 } 1292 1293 if title == "" { 1294 title = formatPatches[0].Title 1295 } 1296 if body == "" { 1297 body = formatPatches[0].Body 1298 } 1299 } 1300 1301 mentions, references := s.mentionsResolver.Resolve(r.Context(), body) 1302 1303 rkey := tid.TID() 1304 initialSubmission := models.PullSubmission{ 1305 Patch: patch, 1306 Combined: combined, 1307 SourceRev: sourceRev, 1308 } 1309 pull := &models.Pull{ 1310 Title: title, 1311 Body: body, 1312 TargetBranch: targetBranch, 1313 OwnerDid: user.Active.Did, 1314 RepoAt: repo.RepoAt(), 1315 Rkey: rkey, 1316 Mentions: mentions, 1317 References: references, 1318 Submissions: []*models.PullSubmission{ 1319 &initialSubmission, 1320 }, 1321 PullSource: pullSource, 1322 } 1323 err = db.NewPull(tx, pull) 1324 if err != nil { 1325 log.Println("failed to create pull request", err) 1326 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1327 return 1328 } 1329 pullId, err := db.NextPullId(tx, repo.RepoAt()) 1330 if err != nil { 1331 log.Println("failed to get pull id", err) 1332 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1333 return 1334 } 1335 1336 blob, err := xrpc.RepoUploadBlob(r.Context(), client, gz(patch), ApplicationGzip) 1337 if err != nil { 1338 log.Println("failed to upload patch", err) 1339 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1340 return 1341 } 1342 1343 _, err = comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 1344 Collection: tangled.RepoPullNSID, 1345 Repo: user.Active.Did, 1346 Rkey: rkey, 1347 Record: &lexutil.LexiconTypeDecoder{ 1348 Val: &tangled.RepoPull{ 1349 Title: title, 1350 Target: &tangled.RepoPull_Target{ 1351 Repo: string(repo.RepoAt()), 1352 Branch: targetBranch, 1353 }, 1354 PatchBlob: blob.Blob, 1355 Source: recordPullSource, 1356 CreatedAt: time.Now().Format(time.RFC3339), 1357 }, 1358 }, 1359 }) 1360 if err != nil { 1361 log.Println("failed to create pull request", err) 1362 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1363 return 1364 } 1365 1366 if err = tx.Commit(); err != nil { 1367 log.Println("failed to create pull request", err) 1368 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1369 return 1370 } 1371 1372 s.notifier.NewPull(r.Context(), pull) 1373 1374 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo) 1375 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pullId)) 1376} 1377 1378func (s *Pulls) createStackedPullRequest( 1379 w http.ResponseWriter, 1380 r *http.Request, 1381 repo *models.Repo, 1382 user *oauth.MultiAccountUser, 1383 targetBranch string, 1384 patch string, 1385 sourceRev string, 1386 pullSource *models.PullSource, 1387) { 1388 // run some necessary checks for stacked-prs first 1389 1390 // must be branch or fork based 1391 if sourceRev == "" { 1392 log.Println("stacked PR from patch-based pull") 1393 s.pages.Notice(w, "pull", "Stacking is only supported on branch and fork based pull-requests.") 1394 return 1395 } 1396 1397 formatPatches, err := patchutil.ExtractPatches(patch) 1398 if err != nil { 1399 log.Println("failed to extract patches", err) 1400 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to extract patches: %v", err)) 1401 return 1402 } 1403 1404 // must have atleast 1 patch to begin with 1405 if len(formatPatches) == 0 { 1406 log.Println("empty patches") 1407 s.pages.Notice(w, "pull", "No patches found in the generated format-patch.") 1408 return 1409 } 1410 1411 // build a stack out of this patch 1412 stackId := uuid.New() 1413 stack, err := s.newStack(r.Context(), repo, user, targetBranch, patch, pullSource, stackId.String()) 1414 if err != nil { 1415 log.Println("failed to create stack", err) 1416 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to create stack: %v", err)) 1417 return 1418 } 1419 1420 client, err := s.oauth.AuthorizedClient(r) 1421 if err != nil { 1422 log.Println("failed to get authorized client", err) 1423 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1424 return 1425 } 1426 1427 // apply all record creations at once 1428 var writes []*comatproto.RepoApplyWrites_Input_Writes_Elem 1429 for _, p := range stack { 1430 blob, err := xrpc.RepoUploadBlob(r.Context(), client, gz(p.LatestPatch()), ApplicationGzip) 1431 if err != nil { 1432 log.Println("failed to upload patch blob", err) 1433 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1434 return 1435 } 1436 1437 record := p.AsRecord() 1438 record.PatchBlob = blob.Blob 1439 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 1440 RepoApplyWrites_Create: &comatproto.RepoApplyWrites_Create{ 1441 Collection: tangled.RepoPullNSID, 1442 Rkey: &p.Rkey, 1443 Value: &lexutil.LexiconTypeDecoder{ 1444 Val: &record, 1445 }, 1446 }, 1447 }) 1448 } 1449 _, err = comatproto.RepoApplyWrites(r.Context(), client, &comatproto.RepoApplyWrites_Input{ 1450 Repo: user.Active.Did, 1451 Writes: writes, 1452 }) 1453 if err != nil { 1454 log.Println("failed to create stacked pull request", err) 1455 s.pages.Notice(w, "pull", "Failed to create stacked pull request. Try again later.") 1456 return 1457 } 1458 1459 // create all pulls at once 1460 tx, err := s.db.BeginTx(r.Context(), nil) 1461 if err != nil { 1462 log.Println("failed to start tx") 1463 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1464 return 1465 } 1466 defer tx.Rollback() 1467 1468 for _, p := range stack { 1469 err = db.NewPull(tx, p) 1470 if err != nil { 1471 log.Println("failed to create pull request", err) 1472 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1473 return 1474 } 1475 1476 } 1477 1478 if err = tx.Commit(); err != nil { 1479 log.Println("failed to create pull request", err) 1480 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1481 return 1482 } 1483 1484 // notify about each pull 1485 // 1486 // this is performed after tx.Commit, because it could result in a locked DB otherwise 1487 for _, p := range stack { 1488 s.notifier.NewPull(r.Context(), p) 1489 } 1490 1491 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo) 1492 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls", ownerSlashRepo)) 1493} 1494 1495func (s *Pulls) ValidatePatch(w http.ResponseWriter, r *http.Request) { 1496 _, err := s.repoResolver.Resolve(r) 1497 if err != nil { 1498 log.Println("failed to get repo and knot", err) 1499 return 1500 } 1501 1502 patch := r.FormValue("patch") 1503 if patch == "" { 1504 s.pages.Notice(w, "patch-error", "Patch is required.") 1505 return 1506 } 1507 1508 if err := validatePatch(&patch); err != nil { 1509 s.logger.Error("faield to validate patch", "err", err) 1510 s.pages.Notice(w, "patch-error", "Invalid patch format. Please provide a valid git diff or format-patch.") 1511 return 1512 } 1513 1514 if patchutil.IsFormatPatch(patch) { 1515 s.pages.Notice(w, "patch-preview", "git-format-patch detected. Title and description are optional; if left out, they will be extracted from the first commit.") 1516 } else { 1517 s.pages.Notice(w, "patch-preview", "Regular git-diff detected. Please provide a title and description.") 1518 } 1519} 1520 1521func (s *Pulls) PatchUploadFragment(w http.ResponseWriter, r *http.Request) { 1522 user := s.oauth.GetMultiAccountUser(r) 1523 1524 s.pages.PullPatchUploadFragment(w, pages.PullPatchUploadParams{ 1525 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1526 }) 1527} 1528 1529func (s *Pulls) CompareBranchesFragment(w http.ResponseWriter, r *http.Request) { 1530 user := s.oauth.GetMultiAccountUser(r) 1531 f, err := s.repoResolver.Resolve(r) 1532 if err != nil { 1533 log.Println("failed to get repo and knot", err) 1534 return 1535 } 1536 1537 scheme := "http" 1538 if !s.config.Core.Dev { 1539 scheme = "https" 1540 } 1541 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 1542 xrpcc := &indigoxrpc.Client{ 1543 Host: host, 1544 } 1545 1546 repo := fmt.Sprintf("%s/%s", f.Did, f.Name) 1547 xrpcBytes, err := tangled.RepoBranches(r.Context(), xrpcc, "", 0, repo) 1548 if err != nil { 1549 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1550 log.Println("failed to call XRPC repo.branches", xrpcerr) 1551 s.pages.Error503(w) 1552 return 1553 } 1554 log.Println("failed to fetch branches", err) 1555 return 1556 } 1557 1558 var result types.RepoBranchesResponse 1559 if err := json.Unmarshal(xrpcBytes, &result); err != nil { 1560 log.Println("failed to decode XRPC response", err) 1561 s.pages.Error503(w) 1562 return 1563 } 1564 1565 branches := result.Branches 1566 sort.Slice(branches, func(i int, j int) bool { 1567 return branches[i].Commit.Committer.When.After(branches[j].Commit.Committer.When) 1568 }) 1569 1570 withoutDefault := []types.Branch{} 1571 for _, b := range branches { 1572 if b.IsDefault { 1573 continue 1574 } 1575 withoutDefault = append(withoutDefault, b) 1576 } 1577 1578 s.pages.PullCompareBranchesFragment(w, pages.PullCompareBranchesParams{ 1579 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1580 Branches: withoutDefault, 1581 }) 1582} 1583 1584func (s *Pulls) CompareForksFragment(w http.ResponseWriter, r *http.Request) { 1585 user := s.oauth.GetMultiAccountUser(r) 1586 1587 forks, err := db.GetForksByDid(s.db, user.Active.Did) 1588 if err != nil { 1589 log.Println("failed to get forks", err) 1590 return 1591 } 1592 1593 s.pages.PullCompareForkFragment(w, pages.PullCompareForkParams{ 1594 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1595 Forks: forks, 1596 Selected: r.URL.Query().Get("fork"), 1597 }) 1598} 1599 1600func (s *Pulls) CompareForksBranchesFragment(w http.ResponseWriter, r *http.Request) { 1601 user := s.oauth.GetMultiAccountUser(r) 1602 1603 f, err := s.repoResolver.Resolve(r) 1604 if err != nil { 1605 log.Println("failed to get repo and knot", err) 1606 return 1607 } 1608 1609 forkVal := r.URL.Query().Get("fork") 1610 repoString := strings.SplitN(forkVal, "/", 2) 1611 forkOwnerDid := repoString[0] 1612 forkName := repoString[1] 1613 // fork repo 1614 repo, err := db.GetRepo( 1615 s.db, 1616 orm.FilterEq("did", forkOwnerDid), 1617 orm.FilterEq("name", forkName), 1618 ) 1619 if err != nil { 1620 log.Println("failed to get repo", "did", forkOwnerDid, "name", forkName, "err", err) 1621 return 1622 } 1623 1624 sourceScheme := "http" 1625 if !s.config.Core.Dev { 1626 sourceScheme = "https" 1627 } 1628 sourceHost := fmt.Sprintf("%s://%s", sourceScheme, repo.Knot) 1629 sourceXrpcc := &indigoxrpc.Client{ 1630 Host: sourceHost, 1631 } 1632 1633 sourceRepo := fmt.Sprintf("%s/%s", forkOwnerDid, repo.Name) 1634 sourceXrpcBytes, err := tangled.RepoBranches(r.Context(), sourceXrpcc, "", 0, sourceRepo) 1635 if err != nil { 1636 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1637 log.Println("failed to call XRPC repo.branches for source", xrpcerr) 1638 s.pages.Error503(w) 1639 return 1640 } 1641 log.Println("failed to fetch source branches", err) 1642 return 1643 } 1644 1645 // Decode source branches 1646 var sourceBranches types.RepoBranchesResponse 1647 if err := json.Unmarshal(sourceXrpcBytes, &sourceBranches); err != nil { 1648 log.Println("failed to decode source branches XRPC response", err) 1649 s.pages.Error503(w) 1650 return 1651 } 1652 1653 targetScheme := "http" 1654 if !s.config.Core.Dev { 1655 targetScheme = "https" 1656 } 1657 targetHost := fmt.Sprintf("%s://%s", targetScheme, f.Knot) 1658 targetXrpcc := &indigoxrpc.Client{ 1659 Host: targetHost, 1660 } 1661 1662 targetRepo := fmt.Sprintf("%s/%s", f.Did, f.Name) 1663 targetXrpcBytes, err := tangled.RepoBranches(r.Context(), targetXrpcc, "", 0, targetRepo) 1664 if err != nil { 1665 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1666 log.Println("failed to call XRPC repo.branches for target", xrpcerr) 1667 s.pages.Error503(w) 1668 return 1669 } 1670 log.Println("failed to fetch target branches", err) 1671 return 1672 } 1673 1674 // Decode target branches 1675 var targetBranches types.RepoBranchesResponse 1676 if err := json.Unmarshal(targetXrpcBytes, &targetBranches); err != nil { 1677 log.Println("failed to decode target branches XRPC response", err) 1678 s.pages.Error503(w) 1679 return 1680 } 1681 1682 sort.Slice(sourceBranches.Branches, func(i int, j int) bool { 1683 return sourceBranches.Branches[i].Commit.Committer.When.After(sourceBranches.Branches[j].Commit.Committer.When) 1684 }) 1685 1686 s.pages.PullCompareForkBranchesFragment(w, pages.PullCompareForkBranchesParams{ 1687 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1688 SourceBranches: sourceBranches.Branches, 1689 TargetBranches: targetBranches.Branches, 1690 }) 1691} 1692 1693func (s *Pulls) ResubmitPull(w http.ResponseWriter, r *http.Request) { 1694 user := s.oauth.GetMultiAccountUser(r) 1695 1696 pull, ok := r.Context().Value("pull").(*models.Pull) 1697 if !ok { 1698 log.Println("failed to get pull") 1699 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 1700 return 1701 } 1702 1703 switch r.Method { 1704 case http.MethodGet: 1705 s.pages.PullResubmitFragment(w, pages.PullResubmitParams{ 1706 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1707 Pull: pull, 1708 }) 1709 return 1710 case http.MethodPost: 1711 if pull.IsPatchBased() { 1712 s.resubmitPatch(w, r) 1713 return 1714 } else if pull.IsBranchBased() { 1715 s.resubmitBranch(w, r) 1716 return 1717 } else if pull.IsForkBased() { 1718 s.resubmitFork(w, r) 1719 return 1720 } 1721 } 1722} 1723 1724func (s *Pulls) resubmitPatch(w http.ResponseWriter, r *http.Request) { 1725 user := s.oauth.GetMultiAccountUser(r) 1726 1727 pull, ok := r.Context().Value("pull").(*models.Pull) 1728 if !ok { 1729 log.Println("failed to get pull") 1730 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 1731 return 1732 } 1733 1734 f, err := s.repoResolver.Resolve(r) 1735 if err != nil { 1736 log.Println("failed to get repo and knot", err) 1737 return 1738 } 1739 1740 if user.Active.Did != pull.OwnerDid { 1741 log.Println("unauthorized user") 1742 w.WriteHeader(http.StatusUnauthorized) 1743 return 1744 } 1745 1746 patch := r.FormValue("patch") 1747 1748 s.resubmitPullHelper(w, r, f, user, pull, patch, "", "") 1749} 1750 1751func (s *Pulls) resubmitBranch(w http.ResponseWriter, r *http.Request) { 1752 user := s.oauth.GetMultiAccountUser(r) 1753 1754 pull, ok := r.Context().Value("pull").(*models.Pull) 1755 if !ok { 1756 log.Println("failed to get pull") 1757 s.pages.Notice(w, "resubmit-error", "Failed to edit patch. Try again later.") 1758 return 1759 } 1760 1761 f, err := s.repoResolver.Resolve(r) 1762 if err != nil { 1763 log.Println("failed to get repo and knot", err) 1764 return 1765 } 1766 1767 if user.Active.Did != pull.OwnerDid { 1768 log.Println("unauthorized user") 1769 w.WriteHeader(http.StatusUnauthorized) 1770 return 1771 } 1772 1773 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())} 1774 if !roles.IsPushAllowed() { 1775 log.Println("unauthorized user") 1776 w.WriteHeader(http.StatusUnauthorized) 1777 return 1778 } 1779 1780 scheme := "http" 1781 if !s.config.Core.Dev { 1782 scheme = "https" 1783 } 1784 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 1785 xrpcc := &indigoxrpc.Client{ 1786 Host: host, 1787 } 1788 1789 repo := fmt.Sprintf("%s/%s", f.Did, f.Name) 1790 xrpcBytes, err := tangled.RepoCompare(r.Context(), xrpcc, repo, pull.TargetBranch, pull.PullSource.Branch) 1791 if err != nil { 1792 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1793 log.Println("failed to call XRPC repo.compare", xrpcerr) 1794 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1795 return 1796 } 1797 log.Printf("compare request failed: %s", err) 1798 s.pages.Notice(w, "resubmit-error", err.Error()) 1799 return 1800 } 1801 1802 var comparison types.RepoFormatPatchResponse 1803 if err := json.Unmarshal(xrpcBytes, &comparison); err != nil { 1804 log.Println("failed to decode XRPC compare response", err) 1805 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1806 return 1807 } 1808 1809 sourceRev := comparison.Rev2 1810 patch := comparison.FormatPatchRaw 1811 combined := comparison.CombinedPatchRaw 1812 1813 s.resubmitPullHelper(w, r, f, user, pull, patch, combined, sourceRev) 1814} 1815 1816func (s *Pulls) resubmitFork(w http.ResponseWriter, r *http.Request) { 1817 user := s.oauth.GetMultiAccountUser(r) 1818 1819 pull, ok := r.Context().Value("pull").(*models.Pull) 1820 if !ok { 1821 log.Println("failed to get pull") 1822 s.pages.Notice(w, "resubmit-error", "Failed to edit patch. Try again later.") 1823 return 1824 } 1825 1826 f, err := s.repoResolver.Resolve(r) 1827 if err != nil { 1828 log.Println("failed to get repo and knot", err) 1829 return 1830 } 1831 1832 if user.Active.Did != pull.OwnerDid { 1833 log.Println("unauthorized user") 1834 w.WriteHeader(http.StatusUnauthorized) 1835 return 1836 } 1837 1838 forkRepo, err := db.GetRepoByAtUri(s.db, pull.PullSource.RepoAt.String()) 1839 if err != nil { 1840 log.Println("failed to get source repo", err) 1841 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1842 return 1843 } 1844 1845 // update the hidden tracking branch to latest 1846 client, err := s.oauth.ServiceClient( 1847 r, 1848 oauth.WithService(forkRepo.Knot), 1849 oauth.WithLxm(tangled.RepoHiddenRefNSID), 1850 oauth.WithDev(s.config.Core.Dev), 1851 ) 1852 if err != nil { 1853 log.Printf("failed to connect to knot server: %v", err) 1854 return 1855 } 1856 1857 resp, err := tangled.RepoHiddenRef( 1858 r.Context(), 1859 client, 1860 &tangled.RepoHiddenRef_Input{ 1861 ForkRef: pull.PullSource.Branch, 1862 RemoteRef: pull.TargetBranch, 1863 Repo: forkRepo.RepoAt().String(), 1864 }, 1865 ) 1866 if err := xrpcclient.HandleXrpcErr(err); err != nil { 1867 s.pages.Notice(w, "resubmit-error", err.Error()) 1868 return 1869 } 1870 if !resp.Success { 1871 log.Println("Failed to update tracking ref.", "err", resp.Error) 1872 s.pages.Notice(w, "resubmit-error", "Failed to update tracking ref.") 1873 return 1874 } 1875 1876 hiddenRef := fmt.Sprintf("hidden/%s/%s", pull.PullSource.Branch, pull.TargetBranch) 1877 // extract patch by performing compare 1878 forkScheme := "http" 1879 if !s.config.Core.Dev { 1880 forkScheme = "https" 1881 } 1882 forkHost := fmt.Sprintf("%s://%s", forkScheme, forkRepo.Knot) 1883 forkRepoId := fmt.Sprintf("%s/%s", forkRepo.Did, forkRepo.Name) 1884 forkXrpcBytes, err := tangled.RepoCompare(r.Context(), &indigoxrpc.Client{Host: forkHost}, forkRepoId, hiddenRef, pull.PullSource.Branch) 1885 if err != nil { 1886 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1887 log.Println("failed to call XRPC repo.compare for fork", xrpcerr) 1888 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1889 return 1890 } 1891 log.Printf("failed to compare branches: %s", err) 1892 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1893 return 1894 } 1895 1896 var forkComparison types.RepoFormatPatchResponse 1897 if err := json.Unmarshal(forkXrpcBytes, &forkComparison); err != nil { 1898 log.Println("failed to decode XRPC compare response for fork", err) 1899 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1900 return 1901 } 1902 1903 // Use the fork comparison we already made 1904 comparison := forkComparison 1905 1906 sourceRev := comparison.Rev2 1907 patch := comparison.FormatPatchRaw 1908 combined := comparison.CombinedPatchRaw 1909 1910 s.resubmitPullHelper(w, r, f, user, pull, patch, combined, sourceRev) 1911} 1912 1913func (s *Pulls) resubmitPullHelper( 1914 w http.ResponseWriter, 1915 r *http.Request, 1916 repo *models.Repo, 1917 user *oauth.MultiAccountUser, 1918 pull *models.Pull, 1919 patch string, 1920 combined string, 1921 sourceRev string, 1922) { 1923 if pull.IsStacked() { 1924 log.Println("resubmitting stacked PR") 1925 s.resubmitStackedPullHelper(w, r, repo, user, pull, patch, pull.StackId) 1926 return 1927 } 1928 1929 if err := validatePatch(&patch); err != nil { 1930 s.pages.Notice(w, "resubmit-error", err.Error()) 1931 return 1932 } 1933 1934 if patch == pull.LatestPatch() { 1935 s.pages.Notice(w, "resubmit-error", "Patch is identical to previous submission.") 1936 return 1937 } 1938 1939 // validate sourceRev if branch/fork based 1940 if pull.IsBranchBased() || pull.IsForkBased() { 1941 if sourceRev == pull.LatestSha() { 1942 s.pages.Notice(w, "resubmit-error", "This branch has not changed since the last submission.") 1943 return 1944 } 1945 } 1946 1947 tx, err := s.db.BeginTx(r.Context(), nil) 1948 if err != nil { 1949 log.Println("failed to start tx") 1950 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1951 return 1952 } 1953 defer tx.Rollback() 1954 1955 pullAt := pull.AtUri() 1956 newRoundNumber := len(pull.Submissions) 1957 newPatch := patch 1958 newSourceRev := sourceRev 1959 combinedPatch := combined 1960 err = db.ResubmitPull(tx, pullAt, newRoundNumber, newPatch, combinedPatch, newSourceRev) 1961 if err != nil { 1962 log.Println("failed to create pull request", err) 1963 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1964 return 1965 } 1966 client, err := s.oauth.AuthorizedClient(r) 1967 if err != nil { 1968 log.Println("failed to authorize client") 1969 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1970 return 1971 } 1972 1973 ex, err := comatproto.RepoGetRecord(r.Context(), client, "", tangled.RepoPullNSID, user.Active.Did, pull.Rkey) 1974 if err != nil { 1975 // failed to get record 1976 s.pages.Notice(w, "resubmit-error", "Failed to update pull, no record found on PDS.") 1977 return 1978 } 1979 1980 blob, err := xrpc.RepoUploadBlob(r.Context(), client, gz(patch), ApplicationGzip) 1981 if err != nil { 1982 log.Println("failed to upload patch blob", err) 1983 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 1984 return 1985 } 1986 record := pull.AsRecord() 1987 record.PatchBlob = blob.Blob 1988 record.CreatedAt = time.Now().Format(time.RFC3339) 1989 1990 if record.Source != nil { 1991 record.Source.Sha = newSourceRev 1992 } 1993 1994 _, err = comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 1995 Collection: tangled.RepoPullNSID, 1996 Repo: user.Active.Did, 1997 Rkey: pull.Rkey, 1998 SwapRecord: ex.Cid, 1999 Record: &lexutil.LexiconTypeDecoder{ 2000 Val: &record, 2001 }, 2002 }) 2003 if err != nil { 2004 log.Println("failed to update record", err) 2005 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 2006 return 2007 } 2008 2009 if err = tx.Commit(); err != nil { 2010 log.Println("failed to commit transaction", err) 2011 s.pages.Notice(w, "resubmit-error", "Failed to resubmit pull.") 2012 return 2013 } 2014 2015 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo) 2016 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 2017} 2018 2019func (s *Pulls) resubmitStackedPullHelper( 2020 w http.ResponseWriter, 2021 r *http.Request, 2022 repo *models.Repo, 2023 user *oauth.MultiAccountUser, 2024 pull *models.Pull, 2025 patch string, 2026 stackId string, 2027) { 2028 targetBranch := pull.TargetBranch 2029 2030 origStack, _ := r.Context().Value("stack").(models.Stack) 2031 newStack, err := s.newStack(r.Context(), repo, user, targetBranch, patch, pull.PullSource, stackId) 2032 if err != nil { 2033 log.Println("failed to create resubmitted stack", err) 2034 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2035 return 2036 } 2037 2038 // find the diff between the stacks, first, map them by changeId 2039 origById := make(map[string]*models.Pull) 2040 newById := make(map[string]*models.Pull) 2041 for _, p := range origStack { 2042 origById[p.ChangeId] = p 2043 } 2044 for _, p := range newStack { 2045 newById[p.ChangeId] = p 2046 } 2047 2048 // commits that got deleted: corresponding pull is closed 2049 // commits that got added: new pull is created 2050 // commits that got updated: corresponding pull is resubmitted & new round begins 2051 additions := make(map[string]*models.Pull) 2052 deletions := make(map[string]*models.Pull) 2053 updated := make(map[string]struct{}) 2054 2055 // pulls in orignal stack but not in new one 2056 for _, op := range origStack { 2057 if _, ok := newById[op.ChangeId]; !ok { 2058 deletions[op.ChangeId] = op 2059 } 2060 } 2061 2062 // pulls in new stack but not in original one 2063 for _, np := range newStack { 2064 if _, ok := origById[np.ChangeId]; !ok { 2065 additions[np.ChangeId] = np 2066 } 2067 } 2068 2069 // NOTE: this loop can be written in any of above blocks, 2070 // but is written separately in the interest of simpler code 2071 for _, np := range newStack { 2072 if op, ok := origById[np.ChangeId]; ok { 2073 // pull exists in both stacks 2074 updated[op.ChangeId] = struct{}{} 2075 } 2076 } 2077 2078 tx, err := s.db.Begin() 2079 if err != nil { 2080 log.Println("failed to start transaction", err) 2081 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2082 return 2083 } 2084 defer tx.Rollback() 2085 2086 client, err := s.oauth.AuthorizedClient(r) 2087 if err != nil { 2088 log.Println("failed to authorize client") 2089 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 2090 return 2091 } 2092 2093 // pds updates to make 2094 var writes []*comatproto.RepoApplyWrites_Input_Writes_Elem 2095 2096 // deleted pulls are marked as deleted in the DB 2097 for _, p := range deletions { 2098 // do not do delete already merged PRs 2099 if p.State == models.PullMerged { 2100 continue 2101 } 2102 2103 err := db.DeletePull(tx, p.RepoAt, p.PullId) 2104 if err != nil { 2105 log.Println("failed to delete pull", err, p.PullId) 2106 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2107 return 2108 } 2109 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 2110 RepoApplyWrites_Delete: &comatproto.RepoApplyWrites_Delete{ 2111 Collection: tangled.RepoPullNSID, 2112 Rkey: p.Rkey, 2113 }, 2114 }) 2115 } 2116 2117 // new pulls are created 2118 for _, p := range additions { 2119 err := db.NewPull(tx, p) 2120 if err != nil { 2121 log.Println("failed to create pull", err, p.PullId) 2122 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2123 return 2124 } 2125 2126 blob, err := xrpc.RepoUploadBlob(r.Context(), client, gz(patch), ApplicationGzip) 2127 if err != nil { 2128 log.Println("failed to upload patch blob", err) 2129 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 2130 return 2131 } 2132 record := p.AsRecord() 2133 record.PatchBlob = blob.Blob 2134 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 2135 RepoApplyWrites_Create: &comatproto.RepoApplyWrites_Create{ 2136 Collection: tangled.RepoPullNSID, 2137 Rkey: &p.Rkey, 2138 Value: &lexutil.LexiconTypeDecoder{ 2139 Val: &record, 2140 }, 2141 }, 2142 }) 2143 } 2144 2145 // updated pulls are, well, updated; to start a new round 2146 for id := range updated { 2147 op, _ := origById[id] 2148 np, _ := newById[id] 2149 2150 // do not update already merged PRs 2151 if op.State == models.PullMerged { 2152 continue 2153 } 2154 2155 // resubmit the new pull 2156 pullAt := op.AtUri() 2157 newRoundNumber := len(op.Submissions) 2158 newPatch := np.LatestPatch() 2159 combinedPatch := np.LatestSubmission().Combined 2160 newSourceRev := np.LatestSha() 2161 err := db.ResubmitPull(tx, pullAt, newRoundNumber, newPatch, combinedPatch, newSourceRev) 2162 if err != nil { 2163 log.Println("failed to update pull", err, op.PullId) 2164 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2165 return 2166 } 2167 2168 blob, err := xrpc.RepoUploadBlob(r.Context(), client, gz(patch), ApplicationGzip) 2169 if err != nil { 2170 log.Println("failed to upload patch blob", err) 2171 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 2172 return 2173 } 2174 record := np.AsRecord() 2175 record.PatchBlob = blob.Blob 2176 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 2177 RepoApplyWrites_Update: &comatproto.RepoApplyWrites_Update{ 2178 Collection: tangled.RepoPullNSID, 2179 Rkey: op.Rkey, 2180 Value: &lexutil.LexiconTypeDecoder{ 2181 Val: &record, 2182 }, 2183 }, 2184 }) 2185 } 2186 2187 // update parent-change-id relations for the entire stack 2188 for _, p := range newStack { 2189 err := db.SetPullParentChangeId( 2190 tx, 2191 p.ParentChangeId, 2192 // these should be enough filters to be unique per-stack 2193 orm.FilterEq("repo_at", p.RepoAt.String()), 2194 orm.FilterEq("owner_did", p.OwnerDid), 2195 orm.FilterEq("change_id", p.ChangeId), 2196 ) 2197 2198 if err != nil { 2199 log.Println("failed to update pull", err, p.PullId) 2200 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2201 return 2202 } 2203 } 2204 2205 err = tx.Commit() 2206 if err != nil { 2207 log.Println("failed to resubmit pull", err) 2208 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2209 return 2210 } 2211 2212 _, err = comatproto.RepoApplyWrites(r.Context(), client, &comatproto.RepoApplyWrites_Input{ 2213 Repo: user.Active.Did, 2214 Writes: writes, 2215 }) 2216 if err != nil { 2217 log.Println("failed to create stacked pull request", err) 2218 s.pages.Notice(w, "pull", "Failed to create stacked pull request. Try again later.") 2219 return 2220 } 2221 2222 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo) 2223 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 2224} 2225 2226func (s *Pulls) MergePull(w http.ResponseWriter, r *http.Request) { 2227 user := s.oauth.GetMultiAccountUser(r) 2228 f, err := s.repoResolver.Resolve(r) 2229 if err != nil { 2230 log.Println("failed to resolve repo:", err) 2231 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2232 return 2233 } 2234 2235 pull, ok := r.Context().Value("pull").(*models.Pull) 2236 if !ok { 2237 log.Println("failed to get pull") 2238 s.pages.Notice(w, "pull-merge-error", "Failed to merge patch. Try again later.") 2239 return 2240 } 2241 2242 var pullsToMerge models.Stack 2243 pullsToMerge = append(pullsToMerge, pull) 2244 if pull.IsStacked() { 2245 stack, ok := r.Context().Value("stack").(models.Stack) 2246 if !ok { 2247 log.Println("failed to get stack") 2248 s.pages.Notice(w, "pull-merge-error", "Failed to merge patch. Try again later.") 2249 return 2250 } 2251 2252 // combine patches of substack 2253 subStack := stack.StrictlyBelow(pull) 2254 // collect the portion of the stack that is mergeable 2255 mergeable := subStack.Mergeable() 2256 // add to total patch 2257 pullsToMerge = append(pullsToMerge, mergeable...) 2258 } 2259 2260 patch := pullsToMerge.CombinedPatch() 2261 2262 ident, err := s.idResolver.ResolveIdent(r.Context(), pull.OwnerDid) 2263 if err != nil { 2264 log.Printf("resolving identity: %s", err) 2265 w.WriteHeader(http.StatusNotFound) 2266 return 2267 } 2268 2269 email, err := db.GetPrimaryEmail(s.db, pull.OwnerDid) 2270 if err != nil { 2271 log.Printf("failed to get primary email: %s", err) 2272 } 2273 2274 authorName := ident.Handle.String() 2275 mergeInput := &tangled.RepoMerge_Input{ 2276 Did: f.Did, 2277 Name: f.Name, 2278 Branch: pull.TargetBranch, 2279 Patch: patch, 2280 CommitMessage: &pull.Title, 2281 AuthorName: &authorName, 2282 } 2283 2284 if pull.Body != "" { 2285 mergeInput.CommitBody = &pull.Body 2286 } 2287 2288 if email.Address != "" { 2289 mergeInput.AuthorEmail = &email.Address 2290 } 2291 2292 client, err := s.oauth.ServiceClient( 2293 r, 2294 oauth.WithService(f.Knot), 2295 oauth.WithLxm(tangled.RepoMergeNSID), 2296 oauth.WithDev(s.config.Core.Dev), 2297 ) 2298 if err != nil { 2299 log.Printf("failed to connect to knot server: %v", err) 2300 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2301 return 2302 } 2303 2304 err = tangled.RepoMerge(r.Context(), client, mergeInput) 2305 if err := xrpcclient.HandleXrpcErr(err); err != nil { 2306 s.pages.Notice(w, "pull-merge-error", err.Error()) 2307 return 2308 } 2309 2310 tx, err := s.db.Begin() 2311 if err != nil { 2312 log.Println("failed to start transcation", err) 2313 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2314 return 2315 } 2316 defer tx.Rollback() 2317 2318 for _, p := range pullsToMerge { 2319 err := db.MergePull(tx, f.RepoAt(), p.PullId) 2320 if err != nil { 2321 log.Printf("failed to update pull request status in database: %s", err) 2322 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2323 return 2324 } 2325 p.State = models.PullMerged 2326 } 2327 2328 err = tx.Commit() 2329 if err != nil { 2330 // TODO: this is unsound, we should also revert the merge from the knotserver here 2331 log.Printf("failed to update pull request status in database: %s", err) 2332 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2333 return 2334 } 2335 2336 // notify about the pull merge 2337 for _, p := range pullsToMerge { 2338 s.notifier.NewPullState(r.Context(), syntax.DID(user.Active.Did), p) 2339 } 2340 2341 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f) 2342 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 2343} 2344 2345func (s *Pulls) ClosePull(w http.ResponseWriter, r *http.Request) { 2346 user := s.oauth.GetMultiAccountUser(r) 2347 2348 f, err := s.repoResolver.Resolve(r) 2349 if err != nil { 2350 log.Println("malformed middleware") 2351 return 2352 } 2353 2354 pull, ok := r.Context().Value("pull").(*models.Pull) 2355 if !ok { 2356 log.Println("failed to get pull") 2357 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 2358 return 2359 } 2360 2361 // auth filter: only owner or collaborators can close 2362 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())} 2363 isOwner := roles.IsOwner() 2364 isCollaborator := roles.IsCollaborator() 2365 isPullAuthor := user.Active.Did == pull.OwnerDid 2366 isCloseAllowed := isOwner || isCollaborator || isPullAuthor 2367 if !isCloseAllowed { 2368 log.Println("failed to close pull") 2369 s.pages.Notice(w, "pull-close", "You are unauthorized to close this pull.") 2370 return 2371 } 2372 2373 // Start a transaction 2374 tx, err := s.db.BeginTx(r.Context(), nil) 2375 if err != nil { 2376 log.Println("failed to start transaction", err) 2377 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2378 return 2379 } 2380 defer tx.Rollback() 2381 2382 var pullsToClose []*models.Pull 2383 pullsToClose = append(pullsToClose, pull) 2384 2385 // if this PR is stacked, then we want to close all PRs below this one on the stack 2386 if pull.IsStacked() { 2387 stack := r.Context().Value("stack").(models.Stack) 2388 subStack := stack.StrictlyBelow(pull) 2389 pullsToClose = append(pullsToClose, subStack...) 2390 } 2391 2392 for _, p := range pullsToClose { 2393 // Close the pull in the database 2394 err = db.ClosePull(tx, f.RepoAt(), p.PullId) 2395 if err != nil { 2396 log.Println("failed to close pull", err) 2397 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2398 return 2399 } 2400 p.State = models.PullClosed 2401 } 2402 2403 // Commit the transaction 2404 if err = tx.Commit(); err != nil { 2405 log.Println("failed to commit transaction", err) 2406 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2407 return 2408 } 2409 2410 for _, p := range pullsToClose { 2411 s.notifier.NewPullState(r.Context(), syntax.DID(user.Active.Did), p) 2412 } 2413 2414 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f) 2415 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 2416} 2417 2418func (s *Pulls) ReopenPull(w http.ResponseWriter, r *http.Request) { 2419 user := s.oauth.GetMultiAccountUser(r) 2420 2421 f, err := s.repoResolver.Resolve(r) 2422 if err != nil { 2423 log.Println("failed to resolve repo", err) 2424 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 2425 return 2426 } 2427 2428 pull, ok := r.Context().Value("pull").(*models.Pull) 2429 if !ok { 2430 log.Println("failed to get pull") 2431 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 2432 return 2433 } 2434 2435 // auth filter: only owner or collaborators can close 2436 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())} 2437 isOwner := roles.IsOwner() 2438 isCollaborator := roles.IsCollaborator() 2439 isPullAuthor := user.Active.Did == pull.OwnerDid 2440 isCloseAllowed := isOwner || isCollaborator || isPullAuthor 2441 if !isCloseAllowed { 2442 log.Println("failed to close pull") 2443 s.pages.Notice(w, "pull-close", "You are unauthorized to close this pull.") 2444 return 2445 } 2446 2447 // Start a transaction 2448 tx, err := s.db.BeginTx(r.Context(), nil) 2449 if err != nil { 2450 log.Println("failed to start transaction", err) 2451 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 2452 return 2453 } 2454 defer tx.Rollback() 2455 2456 var pullsToReopen []*models.Pull 2457 pullsToReopen = append(pullsToReopen, pull) 2458 2459 // if this PR is stacked, then we want to reopen all PRs above this one on the stack 2460 if pull.IsStacked() { 2461 stack := r.Context().Value("stack").(models.Stack) 2462 subStack := stack.StrictlyAbove(pull) 2463 pullsToReopen = append(pullsToReopen, subStack...) 2464 } 2465 2466 for _, p := range pullsToReopen { 2467 // Close the pull in the database 2468 err = db.ReopenPull(tx, f.RepoAt(), p.PullId) 2469 if err != nil { 2470 log.Println("failed to close pull", err) 2471 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2472 return 2473 } 2474 p.State = models.PullOpen 2475 } 2476 2477 // Commit the transaction 2478 if err = tx.Commit(); err != nil { 2479 log.Println("failed to commit transaction", err) 2480 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 2481 return 2482 } 2483 2484 for _, p := range pullsToReopen { 2485 s.notifier.NewPullState(r.Context(), syntax.DID(user.Active.Did), p) 2486 } 2487 2488 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f) 2489 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 2490} 2491 2492func (s *Pulls) newStack(ctx context.Context, repo *models.Repo, user *oauth.MultiAccountUser, targetBranch, patch string, pullSource *models.PullSource, stackId string) (models.Stack, error) { 2493 formatPatches, err := patchutil.ExtractPatches(patch) 2494 if err != nil { 2495 return nil, fmt.Errorf("Failed to extract patches: %v", err) 2496 } 2497 2498 // must have atleast 1 patch to begin with 2499 if len(formatPatches) == 0 { 2500 return nil, fmt.Errorf("No patches found in the generated format-patch.") 2501 } 2502 2503 // the stack is identified by a UUID 2504 var stack models.Stack 2505 parentChangeId := "" 2506 for _, fp := range formatPatches { 2507 // all patches must have a jj change-id 2508 changeId, err := fp.ChangeId() 2509 if err != nil { 2510 return nil, fmt.Errorf("Stacking is only supported if all patches contain a change-id commit header.") 2511 } 2512 2513 title := fp.Title 2514 body := fp.Body 2515 rkey := tid.TID() 2516 2517 mentions, references := s.mentionsResolver.Resolve(ctx, body) 2518 2519 initialSubmission := models.PullSubmission{ 2520 Patch: fp.Raw, 2521 SourceRev: fp.SHA, 2522 Combined: fp.Raw, 2523 } 2524 pull := models.Pull{ 2525 Title: title, 2526 Body: body, 2527 TargetBranch: targetBranch, 2528 OwnerDid: user.Active.Did, 2529 RepoAt: repo.RepoAt(), 2530 Rkey: rkey, 2531 Mentions: mentions, 2532 References: references, 2533 Submissions: []*models.PullSubmission{ 2534 &initialSubmission, 2535 }, 2536 PullSource: pullSource, 2537 Created: time.Now(), 2538 2539 StackId: stackId, 2540 ChangeId: changeId, 2541 ParentChangeId: parentChangeId, 2542 } 2543 2544 stack = append(stack, &pull) 2545 2546 parentChangeId = changeId 2547 } 2548 2549 return stack, nil 2550} 2551 2552func gz(s string) io.Reader { 2553 var b bytes.Buffer 2554 w := gzip.NewWriter(&b) 2555 w.Write([]byte(s)) 2556 w.Close() 2557 return &b 2558} 2559 2560func ptrPullState(s models.PullState) *models.PullState { return &s } 2561 2562func validatePatch(patch *string) error { 2563 if patch == nil || *patch == "" { 2564 return fmt.Errorf("patch is empty") 2565 } 2566 2567 // add newline if not present to diff style patches 2568 if !patchutil.IsFormatPatch(*patch) && !strings.HasSuffix(*patch, "\n") { 2569 *patch = *patch + "\n" 2570 } 2571 2572 if err := patchutil.IsPatchValid(*patch); err != nil { 2573 return err 2574 } 2575 2576 return nil 2577}