Monorepo for Tangled
at b217e460e8c9c367afd7076c813e17b9974ac5ac 2442 lines 69 kB view raw
1package pulls 2 3import ( 4 "bytes" 5 "compress/gzip" 6 "context" 7 "database/sql" 8 "encoding/json" 9 "errors" 10 "fmt" 11 "io" 12 "log" 13 "log/slog" 14 "net/http" 15 "slices" 16 "sort" 17 "strconv" 18 "strings" 19 "time" 20 21 "tangled.org/core/api/tangled" 22 "tangled.org/core/appview/config" 23 "tangled.org/core/appview/db" 24 pulls_indexer "tangled.org/core/appview/indexer/pulls" 25 "tangled.org/core/appview/mentions" 26 "tangled.org/core/appview/models" 27 "tangled.org/core/appview/notify" 28 "tangled.org/core/appview/oauth" 29 "tangled.org/core/appview/pages" 30 "tangled.org/core/appview/pages/markup" 31 "tangled.org/core/appview/pages/repoinfo" 32 "tangled.org/core/appview/pagination" 33 "tangled.org/core/appview/reporesolver" 34 "tangled.org/core/appview/validator" 35 "tangled.org/core/appview/xrpcclient" 36 "tangled.org/core/idresolver" 37 "tangled.org/core/orm" 38 "tangled.org/core/patchutil" 39 "tangled.org/core/rbac" 40 "tangled.org/core/tid" 41 "tangled.org/core/types" 42 43 comatproto "github.com/bluesky-social/indigo/api/atproto" 44 "github.com/bluesky-social/indigo/atproto/syntax" 45 lexutil "github.com/bluesky-social/indigo/lex/util" 46 indigoxrpc "github.com/bluesky-social/indigo/xrpc" 47 "github.com/go-chi/chi/v5" 48 "github.com/google/uuid" 49) 50 51type Pulls struct { 52 oauth *oauth.OAuth 53 repoResolver *reporesolver.RepoResolver 54 pages *pages.Pages 55 idResolver *idresolver.Resolver 56 mentionsResolver *mentions.Resolver 57 db *db.DB 58 config *config.Config 59 notifier notify.Notifier 60 enforcer *rbac.Enforcer 61 logger *slog.Logger 62 validator *validator.Validator 63 indexer *pulls_indexer.Indexer 64} 65 66func New( 67 oauth *oauth.OAuth, 68 repoResolver *reporesolver.RepoResolver, 69 pages *pages.Pages, 70 resolver *idresolver.Resolver, 71 mentionsResolver *mentions.Resolver, 72 db *db.DB, 73 config *config.Config, 74 notifier notify.Notifier, 75 enforcer *rbac.Enforcer, 76 validator *validator.Validator, 77 indexer *pulls_indexer.Indexer, 78 logger *slog.Logger, 79) *Pulls { 80 return &Pulls{ 81 oauth: oauth, 82 repoResolver: repoResolver, 83 pages: pages, 84 idResolver: resolver, 85 mentionsResolver: mentionsResolver, 86 db: db, 87 config: config, 88 notifier: notifier, 89 enforcer: enforcer, 90 logger: logger, 91 validator: validator, 92 indexer: indexer, 93 } 94} 95 96// htmx fragment 97func (s *Pulls) PullActions(w http.ResponseWriter, r *http.Request) { 98 switch r.Method { 99 case http.MethodGet: 100 user := s.oauth.GetMultiAccountUser(r) 101 f, err := s.repoResolver.Resolve(r) 102 if err != nil { 103 log.Println("failed to get repo and knot", err) 104 return 105 } 106 107 pull, ok := r.Context().Value("pull").(*models.Pull) 108 if !ok { 109 log.Println("failed to get pull") 110 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 111 return 112 } 113 114 // can be nil if this pull is not stacked 115 stack, _ := r.Context().Value("stack").(models.Stack) 116 117 roundNumberStr := chi.URLParam(r, "round") 118 roundNumber, err := strconv.Atoi(roundNumberStr) 119 if err != nil { 120 roundNumber = pull.LastRoundNumber() 121 } 122 if roundNumber >= len(pull.Submissions) { 123 http.Error(w, "bad round id", http.StatusBadRequest) 124 log.Println("failed to parse round id", err) 125 return 126 } 127 128 mergeCheckResponse := s.mergeCheck(r, f, pull, stack) 129 branchDeleteStatus := s.branchDeleteStatus(r, f, pull) 130 resubmitResult := pages.Unknown 131 if user.Active.Did == pull.OwnerDid { 132 resubmitResult = s.resubmitCheck(r, f, pull, stack) 133 } 134 135 s.pages.PullActionsFragment(w, pages.PullActionsParams{ 136 LoggedInUser: user, 137 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 138 Pull: pull, 139 RoundNumber: roundNumber, 140 MergeCheck: mergeCheckResponse, 141 ResubmitCheck: resubmitResult, 142 BranchDeleteStatus: branchDeleteStatus, 143 Stack: stack, 144 }) 145 return 146 } 147} 148 149func (s *Pulls) repoPullHelper(w http.ResponseWriter, r *http.Request, interdiff bool) { 150 user := s.oauth.GetMultiAccountUser(r) 151 f, err := s.repoResolver.Resolve(r) 152 if err != nil { 153 log.Println("failed to get repo and knot", err) 154 return 155 } 156 157 pull, ok := r.Context().Value("pull").(*models.Pull) 158 if !ok { 159 log.Println("failed to get pull") 160 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 161 return 162 } 163 164 backlinks, err := db.GetBacklinks(s.db, pull.AtUri()) 165 if err != nil { 166 log.Println("failed to get pull backlinks", err) 167 s.pages.Notice(w, "pull-error", "Failed to get pull. Try again later.") 168 return 169 } 170 171 roundId := chi.URLParam(r, "round") 172 roundIdInt := pull.LastRoundNumber() 173 if r, err := strconv.Atoi(roundId); err == nil { 174 roundIdInt = r 175 } 176 if roundIdInt >= len(pull.Submissions) { 177 http.Error(w, "bad round id", http.StatusBadRequest) 178 log.Println("failed to parse round id", err) 179 return 180 } 181 182 var diffOpts types.DiffOpts 183 if d := r.URL.Query().Get("diff"); d == "split" { 184 diffOpts.Split = true 185 } 186 187 // can be nil if this pull is not stacked 188 stack, _ := r.Context().Value("stack").(models.Stack) 189 abandonedPulls, _ := r.Context().Value("abandonedPulls").([]*models.Pull) 190 191 mergeCheckResponse := s.mergeCheck(r, f, pull, stack) 192 branchDeleteStatus := s.branchDeleteStatus(r, f, pull) 193 resubmitResult := pages.Unknown 194 if user != nil && user.Active != nil && user.Active.Did == pull.OwnerDid { 195 resubmitResult = s.resubmitCheck(r, f, pull, stack) 196 } 197 198 m := make(map[string]models.Pipeline) 199 200 var shas []string 201 for _, s := range pull.Submissions { 202 shas = append(shas, s.SourceRev) 203 } 204 for _, p := range stack { 205 shas = append(shas, p.LatestSha()) 206 } 207 for _, p := range abandonedPulls { 208 shas = append(shas, p.LatestSha()) 209 } 210 211 ps, err := db.GetPipelineStatuses( 212 s.db, 213 len(shas), 214 orm.FilterEq("repo_owner", f.Did), 215 orm.FilterEq("repo_name", f.Name), 216 orm.FilterEq("knot", f.Knot), 217 orm.FilterIn("sha", shas), 218 ) 219 if err != nil { 220 log.Printf("failed to fetch pipeline statuses: %s", err) 221 // non-fatal 222 } 223 224 for _, p := range ps { 225 m[p.Sha] = p 226 } 227 228 reactionMap, err := db.GetReactionMap(s.db, 20, pull.AtUri()) 229 if err != nil { 230 log.Println("failed to get pull reactions") 231 } 232 233 userReactions := map[models.ReactionKind]bool{} 234 if user != nil { 235 userReactions = db.GetReactionStatusMap(s.db, user.Active.Did, pull.AtUri()) 236 } 237 238 labelDefs, err := db.GetLabelDefinitions( 239 s.db, 240 orm.FilterIn("at_uri", f.Labels), 241 orm.FilterContains("scope", tangled.RepoPullNSID), 242 ) 243 if err != nil { 244 log.Println("failed to fetch labels", err) 245 s.pages.Error503(w) 246 return 247 } 248 249 defs := make(map[string]*models.LabelDefinition) 250 for _, l := range labelDefs { 251 defs[l.AtUri().String()] = &l 252 } 253 254 patch := pull.Submissions[roundIdInt].CombinedPatch() 255 var diff types.DiffRenderer 256 diff = patchutil.AsNiceDiff(patch, pull.TargetBranch) 257 258 if interdiff { 259 currentPatch, err := patchutil.AsDiff(pull.Submissions[roundIdInt].CombinedPatch()) 260 if err != nil { 261 log.Println("failed to interdiff; current patch malformed") 262 s.pages.Notice(w, fmt.Sprintf("interdiff-error-%d", roundIdInt), "Failed to calculate interdiff; current patch is invalid.") 263 return 264 } 265 266 previousPatch, err := patchutil.AsDiff(pull.Submissions[roundIdInt-1].CombinedPatch()) 267 if err != nil { 268 log.Println("failed to interdiff; previous patch malformed") 269 s.pages.Notice(w, fmt.Sprintf("interdiff-error-%d", roundIdInt), "Failed to calculate interdiff; previous patch is invalid.") 270 return 271 } 272 273 diff = patchutil.Interdiff(previousPatch, currentPatch) 274 } 275 276 s.pages.RepoSinglePull(w, pages.RepoSinglePullParams{ 277 LoggedInUser: user, 278 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 279 Pull: pull, 280 Stack: stack, 281 AbandonedPulls: abandonedPulls, 282 Backlinks: backlinks, 283 BranchDeleteStatus: branchDeleteStatus, 284 MergeCheck: mergeCheckResponse, 285 ResubmitCheck: resubmitResult, 286 Pipelines: m, 287 Diff: diff, 288 DiffOpts: diffOpts, 289 ActiveRound: roundIdInt, 290 IsInterdiff: interdiff, 291 292 Reactions: reactionMap, 293 UserReacted: userReactions, 294 295 LabelDefs: defs, 296 }) 297} 298 299func (s *Pulls) RepoSinglePull(w http.ResponseWriter, r *http.Request) { 300 s.repoPullHelper(w, r, false) 301} 302 303func (s *Pulls) mergeCheck(r *http.Request, f *models.Repo, pull *models.Pull, stack models.Stack) types.MergeCheckResponse { 304 if pull.State == models.PullMerged { 305 return types.MergeCheckResponse{} 306 } 307 308 scheme := "https" 309 if s.config.Core.Dev { 310 scheme = "http" 311 } 312 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 313 314 xrpcc := indigoxrpc.Client{ 315 Host: host, 316 } 317 318 patch := pull.LatestPatch() 319 if pull.IsStacked() { 320 // combine patches of substack 321 subStack := stack.Below(pull) 322 // collect the portion of the stack that is mergeable 323 mergeable := subStack.Mergeable() 324 // combine each patch 325 patch = mergeable.CombinedPatch() 326 } 327 328 resp, xe := tangled.RepoMergeCheck( 329 r.Context(), 330 &xrpcc, 331 &tangled.RepoMergeCheck_Input{ 332 Did: f.Did, 333 Name: f.Name, 334 Branch: pull.TargetBranch, 335 Patch: patch, 336 }, 337 ) 338 if err := xrpcclient.HandleXrpcErr(xe); err != nil { 339 log.Println("failed to check for mergeability", "err", err) 340 return types.MergeCheckResponse{ 341 Error: fmt.Sprintf("failed to check merge status: %s", err.Error()), 342 } 343 } 344 345 // convert xrpc response to internal types 346 conflicts := make([]types.ConflictInfo, len(resp.Conflicts)) 347 for i, conflict := range resp.Conflicts { 348 conflicts[i] = types.ConflictInfo{ 349 Filename: conflict.Filename, 350 Reason: conflict.Reason, 351 } 352 } 353 354 result := types.MergeCheckResponse{ 355 IsConflicted: resp.Is_conflicted, 356 Conflicts: conflicts, 357 } 358 359 if resp.Message != nil { 360 result.Message = *resp.Message 361 } 362 363 if resp.Error != nil { 364 result.Error = *resp.Error 365 } 366 367 return result 368} 369 370func (s *Pulls) branchDeleteStatus(r *http.Request, repo *models.Repo, pull *models.Pull) *models.BranchDeleteStatus { 371 if pull.State != models.PullMerged { 372 return nil 373 } 374 375 user := s.oauth.GetMultiAccountUser(r) 376 if user == nil { 377 return nil 378 } 379 380 var branch string 381 // check if the branch exists 382 // NOTE: appview could cache branches/tags etc. for every repo by listening for gitRefUpdates 383 if pull.IsBranchBased() { 384 branch = pull.PullSource.Branch 385 } else if pull.IsForkBased() { 386 branch = pull.PullSource.Branch 387 repo = pull.PullSource.Repo 388 } else { 389 return nil 390 } 391 392 // deleted fork 393 if repo == nil { 394 return nil 395 } 396 397 // user can only delete branch if they are a collaborator in the repo that the branch belongs to 398 perms := s.enforcer.GetPermissionsInRepo(user.Active.Did, repo.Knot, repo.DidSlashRepo()) 399 if !slices.Contains(perms, "repo:push") { 400 return nil 401 } 402 403 scheme := "http" 404 if !s.config.Core.Dev { 405 scheme = "https" 406 } 407 host := fmt.Sprintf("%s://%s", scheme, repo.Knot) 408 xrpcc := &indigoxrpc.Client{ 409 Host: host, 410 } 411 412 resp, err := tangled.RepoBranch(r.Context(), xrpcc, branch, fmt.Sprintf("%s/%s", repo.Did, repo.Name)) 413 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 414 return nil 415 } 416 417 return &models.BranchDeleteStatus{ 418 Repo: repo, 419 Branch: resp.Name, 420 } 421} 422 423func (s *Pulls) resubmitCheck(r *http.Request, repo *models.Repo, pull *models.Pull, stack models.Stack) pages.ResubmitResult { 424 if pull.State == models.PullMerged || pull.State == models.PullDeleted || pull.PullSource == nil { 425 return pages.Unknown 426 } 427 428 var knot, ownerDid, repoName string 429 430 if pull.PullSource.RepoAt != nil { 431 // fork-based pulls 432 sourceRepo, err := db.GetRepoByAtUri(s.db, pull.PullSource.RepoAt.String()) 433 if err != nil { 434 log.Println("failed to get source repo", err) 435 return pages.Unknown 436 } 437 438 knot = sourceRepo.Knot 439 ownerDid = sourceRepo.Did 440 repoName = sourceRepo.Name 441 } else { 442 // pulls within the same repo 443 knot = repo.Knot 444 ownerDid = repo.Did 445 repoName = repo.Name 446 } 447 448 scheme := "http" 449 if !s.config.Core.Dev { 450 scheme = "https" 451 } 452 host := fmt.Sprintf("%s://%s", scheme, knot) 453 xrpcc := &indigoxrpc.Client{ 454 Host: host, 455 } 456 457 didSlashName := fmt.Sprintf("%s/%s", ownerDid, repoName) 458 branchResp, err := tangled.RepoBranch(r.Context(), xrpcc, pull.PullSource.Branch, didSlashName) 459 if err != nil { 460 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 461 log.Println("failed to call XRPC repo.branches", xrpcerr) 462 return pages.Unknown 463 } 464 log.Println("failed to reach knotserver", err) 465 return pages.Unknown 466 } 467 468 targetBranch := branchResp 469 470 latestSourceRev := pull.LatestSha() 471 472 if pull.IsStacked() && stack != nil { 473 top := stack[0] 474 latestSourceRev = top.LatestSha() 475 } 476 477 if latestSourceRev != targetBranch.Hash { 478 return pages.ShouldResubmit 479 } 480 481 return pages.ShouldNotResubmit 482} 483 484func (s *Pulls) RepoPullPatch(w http.ResponseWriter, r *http.Request) { 485 s.repoPullHelper(w, r, false) 486} 487 488func (s *Pulls) RepoPullInterdiff(w http.ResponseWriter, r *http.Request) { 489 s.repoPullHelper(w, r, true) 490} 491 492func (s *Pulls) RepoPullPatchRaw(w http.ResponseWriter, r *http.Request) { 493 pull, ok := r.Context().Value("pull").(*models.Pull) 494 if !ok { 495 log.Println("failed to get pull") 496 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 497 return 498 } 499 500 roundId := chi.URLParam(r, "round") 501 roundIdInt, err := strconv.Atoi(roundId) 502 if err != nil || roundIdInt >= len(pull.Submissions) { 503 http.Error(w, "bad round id", http.StatusBadRequest) 504 log.Println("failed to parse round id", err) 505 return 506 } 507 508 w.Header().Set("Content-Type", "text/plain; charset=utf-8") 509 w.Write([]byte(pull.Submissions[roundIdInt].Patch)) 510} 511 512func (s *Pulls) RepoPulls(w http.ResponseWriter, r *http.Request) { 513 l := s.logger.With("handler", "RepoPulls") 514 515 user := s.oauth.GetMultiAccountUser(r) 516 params := r.URL.Query() 517 518 state := models.PullOpen 519 switch params.Get("state") { 520 case "closed": 521 state = models.PullClosed 522 case "merged": 523 state = models.PullMerged 524 } 525 526 page := pagination.FromContext(r.Context()) 527 528 f, err := s.repoResolver.Resolve(r) 529 if err != nil { 530 log.Println("failed to get repo and knot", err) 531 return 532 } 533 534 var totalPulls int 535 switch state { 536 case models.PullOpen: 537 totalPulls = f.RepoStats.PullCount.Open 538 case models.PullMerged: 539 totalPulls = f.RepoStats.PullCount.Merged 540 case models.PullClosed: 541 totalPulls = f.RepoStats.PullCount.Closed 542 } 543 544 keyword := params.Get("q") 545 546 var pulls []*models.Pull 547 searchOpts := models.PullSearchOptions{ 548 Keyword: keyword, 549 RepoAt: f.RepoAt().String(), 550 State: state, 551 Page: page, 552 } 553 l.Debug("searching with", "searchOpts", searchOpts) 554 if keyword != "" { 555 res, err := s.indexer.Search(r.Context(), searchOpts) 556 if err != nil { 557 l.Error("failed to search for pulls", "err", err) 558 return 559 } 560 totalPulls = int(res.Total) 561 l.Debug("searched pulls with indexer", "count", len(res.Hits)) 562 563 pulls, err = db.GetPulls( 564 s.db, 565 orm.FilterIn("id", res.Hits), 566 ) 567 if err != nil { 568 log.Println("failed to get pulls", err) 569 s.pages.Notice(w, "pulls", "Failed to load pulls. Try again later.") 570 return 571 } 572 } else { 573 pulls, err = db.GetPullsPaginated( 574 s.db, 575 page, 576 orm.FilterEq("repo_at", f.RepoAt()), 577 orm.FilterEq("state", searchOpts.State), 578 ) 579 if err != nil { 580 log.Println("failed to get pulls", err) 581 s.pages.Notice(w, "pulls", "Failed to load pulls. Try again later.") 582 return 583 } 584 } 585 586 for _, p := range pulls { 587 var pullSourceRepo *models.Repo 588 if p.PullSource != nil { 589 if p.PullSource.RepoAt != nil { 590 pullSourceRepo, err = db.GetRepoByAtUri(s.db, p.PullSource.RepoAt.String()) 591 if err != nil { 592 log.Printf("failed to get repo by at uri: %v", err) 593 continue 594 } else { 595 p.PullSource.Repo = pullSourceRepo 596 } 597 } 598 } 599 } 600 601 // we want to group all stacked PRs into just one list 602 stacks := make(map[string]models.Stack) 603 var shas []string 604 n := 0 605 for _, p := range pulls { 606 // store the sha for later 607 shas = append(shas, p.LatestSha()) 608 // this PR is stacked 609 if p.StackId != "" { 610 // we have already seen this PR stack 611 if _, seen := stacks[p.StackId]; seen { 612 stacks[p.StackId] = append(stacks[p.StackId], p) 613 // skip this PR 614 } else { 615 stacks[p.StackId] = nil 616 pulls[n] = p 617 n++ 618 } 619 } else { 620 pulls[n] = p 621 n++ 622 } 623 } 624 pulls = pulls[:n] 625 626 ps, err := db.GetPipelineStatuses( 627 s.db, 628 len(shas), 629 orm.FilterEq("repo_owner", f.Did), 630 orm.FilterEq("repo_name", f.Name), 631 orm.FilterEq("knot", f.Knot), 632 orm.FilterIn("sha", shas), 633 ) 634 if err != nil { 635 log.Printf("failed to fetch pipeline statuses: %s", err) 636 // non-fatal 637 } 638 m := make(map[string]models.Pipeline) 639 for _, p := range ps { 640 m[p.Sha] = p 641 } 642 643 labelDefs, err := db.GetLabelDefinitions( 644 s.db, 645 orm.FilterIn("at_uri", f.Labels), 646 orm.FilterContains("scope", tangled.RepoPullNSID), 647 ) 648 if err != nil { 649 log.Println("failed to fetch labels", err) 650 s.pages.Error503(w) 651 return 652 } 653 654 defs := make(map[string]*models.LabelDefinition) 655 for _, l := range labelDefs { 656 defs[l.AtUri().String()] = &l 657 } 658 659 s.pages.RepoPulls(w, pages.RepoPullsParams{ 660 LoggedInUser: s.oauth.GetMultiAccountUser(r), 661 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 662 Pulls: pulls, 663 LabelDefs: defs, 664 FilteringBy: state, 665 FilterQuery: keyword, 666 Stacks: stacks, 667 Pipelines: m, 668 Page: page, 669 PullCount: totalPulls, 670 }) 671} 672 673func (s *Pulls) PullComment(w http.ResponseWriter, r *http.Request) { 674 user := s.oauth.GetMultiAccountUser(r) 675 f, err := s.repoResolver.Resolve(r) 676 if err != nil { 677 log.Println("failed to get repo and knot", err) 678 return 679 } 680 681 pull, ok := r.Context().Value("pull").(*models.Pull) 682 if !ok { 683 log.Println("failed to get pull") 684 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 685 return 686 } 687 688 roundNumberStr := chi.URLParam(r, "round") 689 roundNumber, err := strconv.Atoi(roundNumberStr) 690 if err != nil || roundNumber >= len(pull.Submissions) { 691 http.Error(w, "bad round id", http.StatusBadRequest) 692 log.Println("failed to parse round id", err) 693 return 694 } 695 696 switch r.Method { 697 case http.MethodGet: 698 s.pages.PullNewCommentFragment(w, pages.PullNewCommentParams{ 699 LoggedInUser: user, 700 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 701 Pull: pull, 702 RoundNumber: roundNumber, 703 }) 704 return 705 case http.MethodPost: 706 body := r.FormValue("body") 707 if body == "" { 708 s.pages.Notice(w, "pull", "Comment body is required") 709 return 710 } 711 712 mentions, references := s.mentionsResolver.Resolve(r.Context(), body) 713 714 // Start a transaction 715 tx, err := s.db.BeginTx(r.Context(), nil) 716 if err != nil { 717 log.Println("failed to start transaction", err) 718 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 719 return 720 } 721 defer tx.Rollback() 722 723 createdAt := time.Now().Format(time.RFC3339) 724 725 client, err := s.oauth.AuthorizedClient(r) 726 if err != nil { 727 log.Println("failed to get authorized client", err) 728 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 729 return 730 } 731 atResp, err := comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 732 Collection: tangled.RepoPullCommentNSID, 733 Repo: user.Active.Did, 734 Rkey: tid.TID(), 735 Record: &lexutil.LexiconTypeDecoder{ 736 Val: &tangled.RepoPullComment{ 737 Pull: pull.AtUri().String(), 738 Body: body, 739 CreatedAt: createdAt, 740 }, 741 }, 742 }) 743 if err != nil { 744 log.Println("failed to create pull comment", err) 745 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 746 return 747 } 748 749 comment := &models.PullComment{ 750 OwnerDid: user.Active.Did, 751 RepoAt: f.RepoAt().String(), 752 PullId: pull.PullId, 753 Body: body, 754 CommentAt: atResp.Uri, 755 SubmissionId: pull.Submissions[roundNumber].ID, 756 Mentions: mentions, 757 References: references, 758 } 759 760 // Create the pull comment in the database with the commentAt field 761 commentId, err := db.NewPullComment(tx, comment) 762 if err != nil { 763 log.Println("failed to create pull comment", err) 764 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 765 return 766 } 767 768 // Commit the transaction 769 if err = tx.Commit(); err != nil { 770 log.Println("failed to commit transaction", err) 771 s.pages.Notice(w, "pull-comment", "Failed to create comment.") 772 return 773 } 774 775 s.notifier.NewPullComment(r.Context(), comment, mentions) 776 777 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f) 778 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d#comment-%d", ownerSlashRepo, pull.PullId, commentId)) 779 return 780 } 781} 782 783func (s *Pulls) NewPull(w http.ResponseWriter, r *http.Request) { 784 user := s.oauth.GetMultiAccountUser(r) 785 f, err := s.repoResolver.Resolve(r) 786 if err != nil { 787 log.Println("failed to get repo and knot", err) 788 return 789 } 790 791 switch r.Method { 792 case http.MethodGet: 793 scheme := "http" 794 if !s.config.Core.Dev { 795 scheme = "https" 796 } 797 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 798 xrpcc := &indigoxrpc.Client{ 799 Host: host, 800 } 801 802 repo := fmt.Sprintf("%s/%s", f.Did, f.Name) 803 xrpcBytes, err := tangled.RepoBranches(r.Context(), xrpcc, "", 0, repo) 804 if err != nil { 805 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 806 log.Println("failed to call XRPC repo.branches", xrpcerr) 807 s.pages.Error503(w) 808 return 809 } 810 log.Println("failed to fetch branches", err) 811 return 812 } 813 814 var result types.RepoBranchesResponse 815 if err := json.Unmarshal(xrpcBytes, &result); err != nil { 816 log.Println("failed to decode XRPC response", err) 817 s.pages.Error503(w) 818 return 819 } 820 821 // can be one of "patch", "branch" or "fork" 822 strategy := r.URL.Query().Get("strategy") 823 // ignored if strategy is "patch" 824 sourceBranch := r.URL.Query().Get("sourceBranch") 825 targetBranch := r.URL.Query().Get("targetBranch") 826 827 s.pages.RepoNewPull(w, pages.RepoNewPullParams{ 828 LoggedInUser: user, 829 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 830 Branches: result.Branches, 831 Strategy: strategy, 832 SourceBranch: sourceBranch, 833 TargetBranch: targetBranch, 834 Title: r.URL.Query().Get("title"), 835 Body: r.URL.Query().Get("body"), 836 }) 837 838 case http.MethodPost: 839 title := r.FormValue("title") 840 body := r.FormValue("body") 841 targetBranch := r.FormValue("targetBranch") 842 fromFork := r.FormValue("fork") 843 sourceBranch := r.FormValue("sourceBranch") 844 patch := r.FormValue("patch") 845 846 if targetBranch == "" { 847 s.pages.Notice(w, "pull", "Target branch is required.") 848 return 849 } 850 851 // Determine PR type based on input parameters 852 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())} 853 isPushAllowed := roles.IsPushAllowed() 854 isBranchBased := isPushAllowed && sourceBranch != "" && fromFork == "" 855 isForkBased := fromFork != "" && sourceBranch != "" 856 isPatchBased := patch != "" && !isBranchBased && !isForkBased 857 isStacked := r.FormValue("isStacked") == "on" 858 859 if isPatchBased && !patchutil.IsFormatPatch(patch) { 860 if title == "" { 861 s.pages.Notice(w, "pull", "Title is required for git-diff patches.") 862 return 863 } 864 sanitizer := markup.NewSanitizer() 865 if st := strings.TrimSpace(sanitizer.SanitizeDescription(title)); (st) == "" { 866 s.pages.Notice(w, "pull", "Title is empty after HTML sanitization") 867 return 868 } 869 } 870 871 // Validate we have at least one valid PR creation method 872 if !isBranchBased && !isPatchBased && !isForkBased { 873 s.pages.Notice(w, "pull", "Neither source branch nor patch supplied.") 874 return 875 } 876 877 // Can't mix branch-based and patch-based approaches 878 if isBranchBased && patch != "" { 879 s.pages.Notice(w, "pull", "Cannot select both patch and source branch.") 880 return 881 } 882 883 // us, err := knotclient.NewUnsignedClient(f.Knot, s.config.Core.Dev) 884 // if err != nil { 885 // log.Printf("failed to create unsigned client to %s: %v", f.Knot, err) 886 // s.pages.Notice(w, "pull", "Failed to create a pull request. Try again later.") 887 // return 888 // } 889 890 // TODO: make capabilities an xrpc call 891 caps := struct { 892 PullRequests struct { 893 FormatPatch bool 894 BranchSubmissions bool 895 ForkSubmissions bool 896 PatchSubmissions bool 897 } 898 }{ 899 PullRequests: struct { 900 FormatPatch bool 901 BranchSubmissions bool 902 ForkSubmissions bool 903 PatchSubmissions bool 904 }{ 905 FormatPatch: true, 906 BranchSubmissions: true, 907 ForkSubmissions: true, 908 PatchSubmissions: true, 909 }, 910 } 911 912 // caps, err := us.Capabilities() 913 // if err != nil { 914 // log.Println("error fetching knot caps", f.Knot, err) 915 // s.pages.Notice(w, "pull", "Failed to create a pull request. Try again later.") 916 // return 917 // } 918 919 if !caps.PullRequests.FormatPatch { 920 s.pages.Notice(w, "pull", "This knot doesn't support format-patch. Unfortunately, there is no fallback for now.") 921 return 922 } 923 924 // Handle the PR creation based on the type 925 if isBranchBased { 926 if !caps.PullRequests.BranchSubmissions { 927 s.pages.Notice(w, "pull", "This knot doesn't support branch-based pull requests. Try another way?") 928 return 929 } 930 s.handleBranchBasedPull(w, r, f, user, title, body, targetBranch, sourceBranch, isStacked) 931 } else if isForkBased { 932 if !caps.PullRequests.ForkSubmissions { 933 s.pages.Notice(w, "pull", "This knot doesn't support fork-based pull requests. Try another way?") 934 return 935 } 936 s.handleForkBasedPull(w, r, f, user, fromFork, title, body, targetBranch, sourceBranch, isStacked) 937 } else if isPatchBased { 938 if !caps.PullRequests.PatchSubmissions { 939 s.pages.Notice(w, "pull", "This knot doesn't support patch-based pull requests. Send your patch over email.") 940 return 941 } 942 s.handlePatchBasedPull(w, r, f, user, title, body, targetBranch, patch, isStacked) 943 } 944 return 945 } 946} 947 948func (s *Pulls) handleBranchBasedPull( 949 w http.ResponseWriter, 950 r *http.Request, 951 repo *models.Repo, 952 user *oauth.MultiAccountUser, 953 title, 954 body, 955 targetBranch, 956 sourceBranch string, 957 isStacked bool, 958) { 959 scheme := "http" 960 if !s.config.Core.Dev { 961 scheme = "https" 962 } 963 host := fmt.Sprintf("%s://%s", scheme, repo.Knot) 964 xrpcc := &indigoxrpc.Client{ 965 Host: host, 966 } 967 968 didSlashRepo := fmt.Sprintf("%s/%s", repo.Did, repo.Name) 969 xrpcBytes, err := tangled.RepoCompare(r.Context(), xrpcc, didSlashRepo, targetBranch, sourceBranch) 970 if err != nil { 971 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 972 log.Println("failed to call XRPC repo.compare", xrpcerr) 973 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 974 return 975 } 976 log.Println("failed to compare", err) 977 s.pages.Notice(w, "pull", err.Error()) 978 return 979 } 980 981 var comparison types.RepoFormatPatchResponse 982 if err := json.Unmarshal(xrpcBytes, &comparison); err != nil { 983 log.Println("failed to decode XRPC compare response", err) 984 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 985 return 986 } 987 988 sourceRev := comparison.Rev2 989 patch := comparison.FormatPatchRaw 990 combined := comparison.CombinedPatchRaw 991 992 if err := s.validator.ValidatePatch(&patch); err != nil { 993 s.logger.Error("failed to validate patch", "err", err) 994 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 995 return 996 } 997 998 pullSource := &models.PullSource{ 999 Branch: sourceBranch, 1000 } 1001 recordPullSource := &tangled.RepoPull_Source{ 1002 Branch: sourceBranch, 1003 Sha: comparison.Rev2, 1004 } 1005 1006 s.createPullRequest(w, r, repo, user, title, body, targetBranch, patch, combined, sourceRev, pullSource, recordPullSource, isStacked) 1007} 1008 1009func (s *Pulls) handlePatchBasedPull(w http.ResponseWriter, r *http.Request, repo *models.Repo, user *oauth.MultiAccountUser, title, body, targetBranch, patch string, isStacked bool) { 1010 if err := s.validator.ValidatePatch(&patch); err != nil { 1011 s.logger.Error("patch validation failed", "err", err) 1012 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 1013 return 1014 } 1015 1016 s.createPullRequest(w, r, repo, user, title, body, targetBranch, patch, "", "", nil, nil, isStacked) 1017} 1018 1019func (s *Pulls) handleForkBasedPull(w http.ResponseWriter, r *http.Request, repo *models.Repo, user *oauth.MultiAccountUser, forkRepo string, title, body, targetBranch, sourceBranch string, isStacked bool) { 1020 repoString := strings.SplitN(forkRepo, "/", 2) 1021 forkOwnerDid := repoString[0] 1022 repoName := repoString[1] 1023 fork, err := db.GetForkByDid(s.db, forkOwnerDid, repoName) 1024 if errors.Is(err, sql.ErrNoRows) { 1025 s.pages.Notice(w, "pull", "No such fork.") 1026 return 1027 } else if err != nil { 1028 log.Println("failed to fetch fork:", err) 1029 s.pages.Notice(w, "pull", "Failed to fetch fork.") 1030 return 1031 } 1032 1033 client, err := s.oauth.ServiceClient( 1034 r, 1035 oauth.WithService(fork.Knot), 1036 oauth.WithLxm(tangled.RepoHiddenRefNSID), 1037 oauth.WithDev(s.config.Core.Dev), 1038 ) 1039 1040 resp, err := tangled.RepoHiddenRef( 1041 r.Context(), 1042 client, 1043 &tangled.RepoHiddenRef_Input{ 1044 ForkRef: sourceBranch, 1045 RemoteRef: targetBranch, 1046 Repo: fork.RepoAt().String(), 1047 }, 1048 ) 1049 if err := xrpcclient.HandleXrpcErr(err); err != nil { 1050 s.pages.Notice(w, "pull", err.Error()) 1051 return 1052 } 1053 1054 if !resp.Success { 1055 errorMsg := "Failed to create pull request" 1056 if resp.Error != nil { 1057 errorMsg = fmt.Sprintf("Failed to create pull request: %s", *resp.Error) 1058 } 1059 s.pages.Notice(w, "pull", errorMsg) 1060 return 1061 } 1062 1063 hiddenRef := fmt.Sprintf("hidden/%s/%s", sourceBranch, targetBranch) 1064 // We're now comparing the sourceBranch (on the fork) against the hiddenRef which is tracking 1065 // the targetBranch on the target repository. This code is a bit confusing, but here's an example: 1066 // hiddenRef: hidden/feature-1/main (on repo-fork) 1067 // targetBranch: main (on repo-1) 1068 // sourceBranch: feature-1 (on repo-fork) 1069 forkScheme := "http" 1070 if !s.config.Core.Dev { 1071 forkScheme = "https" 1072 } 1073 forkHost := fmt.Sprintf("%s://%s", forkScheme, fork.Knot) 1074 forkXrpcc := &indigoxrpc.Client{ 1075 Host: forkHost, 1076 } 1077 1078 forkRepoId := fmt.Sprintf("%s/%s", fork.Did, fork.Name) 1079 forkXrpcBytes, err := tangled.RepoCompare(r.Context(), forkXrpcc, forkRepoId, hiddenRef, sourceBranch) 1080 if err != nil { 1081 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1082 log.Println("failed to call XRPC repo.compare for fork", xrpcerr) 1083 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1084 return 1085 } 1086 log.Println("failed to compare across branches", err) 1087 s.pages.Notice(w, "pull", err.Error()) 1088 return 1089 } 1090 1091 var comparison types.RepoFormatPatchResponse 1092 if err := json.Unmarshal(forkXrpcBytes, &comparison); err != nil { 1093 log.Println("failed to decode XRPC compare response for fork", err) 1094 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1095 return 1096 } 1097 1098 sourceRev := comparison.Rev2 1099 patch := comparison.FormatPatchRaw 1100 combined := comparison.CombinedPatchRaw 1101 1102 if err := s.validator.ValidatePatch(&patch); err != nil { 1103 s.logger.Error("failed to validate patch", "err", err) 1104 s.pages.Notice(w, "pull", "Invalid patch format. Please provide a valid diff.") 1105 return 1106 } 1107 1108 forkAtUri := fork.RepoAt() 1109 forkAtUriStr := forkAtUri.String() 1110 1111 pullSource := &models.PullSource{ 1112 Branch: sourceBranch, 1113 RepoAt: &forkAtUri, 1114 } 1115 recordPullSource := &tangled.RepoPull_Source{ 1116 Branch: sourceBranch, 1117 Repo: &forkAtUriStr, 1118 Sha: sourceRev, 1119 } 1120 1121 s.createPullRequest(w, r, repo, user, title, body, targetBranch, patch, combined, sourceRev, pullSource, recordPullSource, isStacked) 1122} 1123 1124func (s *Pulls) createPullRequest( 1125 w http.ResponseWriter, 1126 r *http.Request, 1127 repo *models.Repo, 1128 user *oauth.MultiAccountUser, 1129 title, body, targetBranch string, 1130 patch string, 1131 combined string, 1132 sourceRev string, 1133 pullSource *models.PullSource, 1134 recordPullSource *tangled.RepoPull_Source, 1135 isStacked bool, 1136) { 1137 if isStacked { 1138 // creates a series of PRs, each linking to the previous, identified by jj's change-id 1139 s.createStackedPullRequest( 1140 w, 1141 r, 1142 repo, 1143 user, 1144 targetBranch, 1145 patch, 1146 sourceRev, 1147 pullSource, 1148 ) 1149 return 1150 } 1151 1152 client, err := s.oauth.AuthorizedClient(r) 1153 if err != nil { 1154 log.Println("failed to get authorized client", err) 1155 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1156 return 1157 } 1158 1159 tx, err := s.db.BeginTx(r.Context(), nil) 1160 if err != nil { 1161 log.Println("failed to start tx") 1162 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1163 return 1164 } 1165 defer tx.Rollback() 1166 1167 // We've already checked earlier if it's diff-based and title is empty, 1168 // so if it's still empty now, it's intentionally skipped owing to format-patch. 1169 if title == "" || body == "" { 1170 formatPatches, err := patchutil.ExtractPatches(patch) 1171 if err != nil { 1172 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to extract patches: %v", err)) 1173 return 1174 } 1175 if len(formatPatches) == 0 { 1176 s.pages.Notice(w, "pull", "No patches found in the supplied format-patch.") 1177 return 1178 } 1179 1180 if title == "" { 1181 title = formatPatches[0].Title 1182 } 1183 if body == "" { 1184 body = formatPatches[0].Body 1185 } 1186 } 1187 1188 mentions, references := s.mentionsResolver.Resolve(r.Context(), body) 1189 1190 rkey := tid.TID() 1191 initialSubmission := models.PullSubmission{ 1192 Patch: patch, 1193 Combined: combined, 1194 SourceRev: sourceRev, 1195 } 1196 pull := &models.Pull{ 1197 Title: title, 1198 Body: body, 1199 TargetBranch: targetBranch, 1200 OwnerDid: user.Active.Did, 1201 RepoAt: repo.RepoAt(), 1202 Rkey: rkey, 1203 Mentions: mentions, 1204 References: references, 1205 Submissions: []*models.PullSubmission{ 1206 &initialSubmission, 1207 }, 1208 PullSource: pullSource, 1209 } 1210 err = db.NewPull(tx, pull) 1211 if err != nil { 1212 log.Println("failed to create pull request", err) 1213 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1214 return 1215 } 1216 pullId, err := db.NextPullId(tx, repo.RepoAt()) 1217 if err != nil { 1218 log.Println("failed to get pull id", err) 1219 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1220 return 1221 } 1222 1223 blob, err := comatproto.RepoUploadBlob(r.Context(), client, gz(patch)) 1224 if err != nil { 1225 log.Println("failed to upload patch", err) 1226 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1227 return 1228 } 1229 1230 _, err = comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 1231 Collection: tangled.RepoPullNSID, 1232 Repo: user.Active.Did, 1233 Rkey: rkey, 1234 Record: &lexutil.LexiconTypeDecoder{ 1235 Val: &tangled.RepoPull{ 1236 Title: title, 1237 Target: &tangled.RepoPull_Target{ 1238 Repo: string(repo.RepoAt()), 1239 Branch: targetBranch, 1240 }, 1241 PatchBlob: blob.Blob, 1242 Source: recordPullSource, 1243 CreatedAt: time.Now().Format(time.RFC3339), 1244 }, 1245 }, 1246 }) 1247 if err != nil { 1248 log.Println("failed to create pull request", err) 1249 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1250 return 1251 } 1252 1253 if err = tx.Commit(); err != nil { 1254 log.Println("failed to create pull request", err) 1255 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1256 return 1257 } 1258 1259 s.notifier.NewPull(r.Context(), pull) 1260 1261 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo) 1262 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pullId)) 1263} 1264 1265func (s *Pulls) createStackedPullRequest( 1266 w http.ResponseWriter, 1267 r *http.Request, 1268 repo *models.Repo, 1269 user *oauth.MultiAccountUser, 1270 targetBranch string, 1271 patch string, 1272 sourceRev string, 1273 pullSource *models.PullSource, 1274) { 1275 // run some necessary checks for stacked-prs first 1276 1277 // must be branch or fork based 1278 if sourceRev == "" { 1279 log.Println("stacked PR from patch-based pull") 1280 s.pages.Notice(w, "pull", "Stacking is only supported on branch and fork based pull-requests.") 1281 return 1282 } 1283 1284 formatPatches, err := patchutil.ExtractPatches(patch) 1285 if err != nil { 1286 log.Println("failed to extract patches", err) 1287 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to extract patches: %v", err)) 1288 return 1289 } 1290 1291 // must have atleast 1 patch to begin with 1292 if len(formatPatches) == 0 { 1293 log.Println("empty patches") 1294 s.pages.Notice(w, "pull", "No patches found in the generated format-patch.") 1295 return 1296 } 1297 1298 // build a stack out of this patch 1299 stackId := uuid.New() 1300 stack, err := s.newStack(r.Context(), repo, user, targetBranch, patch, pullSource, stackId.String()) 1301 if err != nil { 1302 log.Println("failed to create stack", err) 1303 s.pages.Notice(w, "pull", fmt.Sprintf("Failed to create stack: %v", err)) 1304 return 1305 } 1306 1307 client, err := s.oauth.AuthorizedClient(r) 1308 if err != nil { 1309 log.Println("failed to get authorized client", err) 1310 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1311 return 1312 } 1313 1314 // apply all record creations at once 1315 var writes []*comatproto.RepoApplyWrites_Input_Writes_Elem 1316 for _, p := range stack { 1317 blob, err := comatproto.RepoUploadBlob(r.Context(), client, gz(p.LatestPatch())) 1318 if err != nil { 1319 log.Println("failed to upload patch blob", err) 1320 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1321 return 1322 } 1323 1324 record := p.AsRecord() 1325 record.PatchBlob = blob.Blob 1326 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 1327 RepoApplyWrites_Create: &comatproto.RepoApplyWrites_Create{ 1328 Collection: tangled.RepoPullNSID, 1329 Rkey: &p.Rkey, 1330 Value: &lexutil.LexiconTypeDecoder{ 1331 Val: &record, 1332 }, 1333 }, 1334 }) 1335 } 1336 _, err = comatproto.RepoApplyWrites(r.Context(), client, &comatproto.RepoApplyWrites_Input{ 1337 Repo: user.Active.Did, 1338 Writes: writes, 1339 }) 1340 if err != nil { 1341 log.Println("failed to create stacked pull request", err) 1342 s.pages.Notice(w, "pull", "Failed to create stacked pull request. Try again later.") 1343 return 1344 } 1345 1346 // create all pulls at once 1347 tx, err := s.db.BeginTx(r.Context(), nil) 1348 if err != nil { 1349 log.Println("failed to start tx") 1350 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1351 return 1352 } 1353 defer tx.Rollback() 1354 1355 for _, p := range stack { 1356 err = db.NewPull(tx, p) 1357 if err != nil { 1358 log.Println("failed to create pull request", err) 1359 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1360 return 1361 } 1362 1363 } 1364 1365 if err = tx.Commit(); err != nil { 1366 log.Println("failed to create pull request", err) 1367 s.pages.Notice(w, "pull", "Failed to create pull request. Try again later.") 1368 return 1369 } 1370 1371 // notify about each pull 1372 // 1373 // this is performed after tx.Commit, because it could result in a locked DB otherwise 1374 for _, p := range stack { 1375 s.notifier.NewPull(r.Context(), p) 1376 } 1377 1378 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo) 1379 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls", ownerSlashRepo)) 1380} 1381 1382func (s *Pulls) ValidatePatch(w http.ResponseWriter, r *http.Request) { 1383 _, err := s.repoResolver.Resolve(r) 1384 if err != nil { 1385 log.Println("failed to get repo and knot", err) 1386 return 1387 } 1388 1389 patch := r.FormValue("patch") 1390 if patch == "" { 1391 s.pages.Notice(w, "patch-error", "Patch is required.") 1392 return 1393 } 1394 1395 if err := s.validator.ValidatePatch(&patch); err != nil { 1396 s.logger.Error("faield to validate patch", "err", err) 1397 s.pages.Notice(w, "patch-error", "Invalid patch format. Please provide a valid git diff or format-patch.") 1398 return 1399 } 1400 1401 if patchutil.IsFormatPatch(patch) { 1402 s.pages.Notice(w, "patch-preview", "git-format-patch detected. Title and description are optional; if left out, they will be extracted from the first commit.") 1403 } else { 1404 s.pages.Notice(w, "patch-preview", "Regular git-diff detected. Please provide a title and description.") 1405 } 1406} 1407 1408func (s *Pulls) PatchUploadFragment(w http.ResponseWriter, r *http.Request) { 1409 user := s.oauth.GetMultiAccountUser(r) 1410 1411 s.pages.PullPatchUploadFragment(w, pages.PullPatchUploadParams{ 1412 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1413 }) 1414} 1415 1416func (s *Pulls) CompareBranchesFragment(w http.ResponseWriter, r *http.Request) { 1417 user := s.oauth.GetMultiAccountUser(r) 1418 f, err := s.repoResolver.Resolve(r) 1419 if err != nil { 1420 log.Println("failed to get repo and knot", err) 1421 return 1422 } 1423 1424 scheme := "http" 1425 if !s.config.Core.Dev { 1426 scheme = "https" 1427 } 1428 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 1429 xrpcc := &indigoxrpc.Client{ 1430 Host: host, 1431 } 1432 1433 repo := fmt.Sprintf("%s/%s", f.Did, f.Name) 1434 xrpcBytes, err := tangled.RepoBranches(r.Context(), xrpcc, "", 0, repo) 1435 if err != nil { 1436 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1437 log.Println("failed to call XRPC repo.branches", xrpcerr) 1438 s.pages.Error503(w) 1439 return 1440 } 1441 log.Println("failed to fetch branches", err) 1442 return 1443 } 1444 1445 var result types.RepoBranchesResponse 1446 if err := json.Unmarshal(xrpcBytes, &result); err != nil { 1447 log.Println("failed to decode XRPC response", err) 1448 s.pages.Error503(w) 1449 return 1450 } 1451 1452 branches := result.Branches 1453 sort.Slice(branches, func(i int, j int) bool { 1454 return branches[i].Commit.Committer.When.After(branches[j].Commit.Committer.When) 1455 }) 1456 1457 withoutDefault := []types.Branch{} 1458 for _, b := range branches { 1459 if b.IsDefault { 1460 continue 1461 } 1462 withoutDefault = append(withoutDefault, b) 1463 } 1464 1465 s.pages.PullCompareBranchesFragment(w, pages.PullCompareBranchesParams{ 1466 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1467 Branches: withoutDefault, 1468 }) 1469} 1470 1471func (s *Pulls) CompareForksFragment(w http.ResponseWriter, r *http.Request) { 1472 user := s.oauth.GetMultiAccountUser(r) 1473 1474 forks, err := db.GetForksByDid(s.db, user.Active.Did) 1475 if err != nil { 1476 log.Println("failed to get forks", err) 1477 return 1478 } 1479 1480 s.pages.PullCompareForkFragment(w, pages.PullCompareForkParams{ 1481 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1482 Forks: forks, 1483 Selected: r.URL.Query().Get("fork"), 1484 }) 1485} 1486 1487func (s *Pulls) CompareForksBranchesFragment(w http.ResponseWriter, r *http.Request) { 1488 user := s.oauth.GetMultiAccountUser(r) 1489 1490 f, err := s.repoResolver.Resolve(r) 1491 if err != nil { 1492 log.Println("failed to get repo and knot", err) 1493 return 1494 } 1495 1496 forkVal := r.URL.Query().Get("fork") 1497 repoString := strings.SplitN(forkVal, "/", 2) 1498 forkOwnerDid := repoString[0] 1499 forkName := repoString[1] 1500 // fork repo 1501 repo, err := db.GetRepo( 1502 s.db, 1503 orm.FilterEq("did", forkOwnerDid), 1504 orm.FilterEq("name", forkName), 1505 ) 1506 if err != nil { 1507 log.Println("failed to get repo", "did", forkOwnerDid, "name", forkName, "err", err) 1508 return 1509 } 1510 1511 sourceScheme := "http" 1512 if !s.config.Core.Dev { 1513 sourceScheme = "https" 1514 } 1515 sourceHost := fmt.Sprintf("%s://%s", sourceScheme, repo.Knot) 1516 sourceXrpcc := &indigoxrpc.Client{ 1517 Host: sourceHost, 1518 } 1519 1520 sourceRepo := fmt.Sprintf("%s/%s", forkOwnerDid, repo.Name) 1521 sourceXrpcBytes, err := tangled.RepoBranches(r.Context(), sourceXrpcc, "", 0, sourceRepo) 1522 if err != nil { 1523 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1524 log.Println("failed to call XRPC repo.branches for source", xrpcerr) 1525 s.pages.Error503(w) 1526 return 1527 } 1528 log.Println("failed to fetch source branches", err) 1529 return 1530 } 1531 1532 // Decode source branches 1533 var sourceBranches types.RepoBranchesResponse 1534 if err := json.Unmarshal(sourceXrpcBytes, &sourceBranches); err != nil { 1535 log.Println("failed to decode source branches XRPC response", err) 1536 s.pages.Error503(w) 1537 return 1538 } 1539 1540 targetScheme := "http" 1541 if !s.config.Core.Dev { 1542 targetScheme = "https" 1543 } 1544 targetHost := fmt.Sprintf("%s://%s", targetScheme, f.Knot) 1545 targetXrpcc := &indigoxrpc.Client{ 1546 Host: targetHost, 1547 } 1548 1549 targetRepo := fmt.Sprintf("%s/%s", f.Did, f.Name) 1550 targetXrpcBytes, err := tangled.RepoBranches(r.Context(), targetXrpcc, "", 0, targetRepo) 1551 if err != nil { 1552 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1553 log.Println("failed to call XRPC repo.branches for target", xrpcerr) 1554 s.pages.Error503(w) 1555 return 1556 } 1557 log.Println("failed to fetch target branches", err) 1558 return 1559 } 1560 1561 // Decode target branches 1562 var targetBranches types.RepoBranchesResponse 1563 if err := json.Unmarshal(targetXrpcBytes, &targetBranches); err != nil { 1564 log.Println("failed to decode target branches XRPC response", err) 1565 s.pages.Error503(w) 1566 return 1567 } 1568 1569 sort.Slice(sourceBranches.Branches, func(i int, j int) bool { 1570 return sourceBranches.Branches[i].Commit.Committer.When.After(sourceBranches.Branches[j].Commit.Committer.When) 1571 }) 1572 1573 s.pages.PullCompareForkBranchesFragment(w, pages.PullCompareForkBranchesParams{ 1574 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1575 SourceBranches: sourceBranches.Branches, 1576 TargetBranches: targetBranches.Branches, 1577 }) 1578} 1579 1580func (s *Pulls) ResubmitPull(w http.ResponseWriter, r *http.Request) { 1581 user := s.oauth.GetMultiAccountUser(r) 1582 1583 pull, ok := r.Context().Value("pull").(*models.Pull) 1584 if !ok { 1585 log.Println("failed to get pull") 1586 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 1587 return 1588 } 1589 1590 switch r.Method { 1591 case http.MethodGet: 1592 s.pages.PullResubmitFragment(w, pages.PullResubmitParams{ 1593 RepoInfo: s.repoResolver.GetRepoInfo(r, user), 1594 Pull: pull, 1595 }) 1596 return 1597 case http.MethodPost: 1598 if pull.IsPatchBased() { 1599 s.resubmitPatch(w, r) 1600 return 1601 } else if pull.IsBranchBased() { 1602 s.resubmitBranch(w, r) 1603 return 1604 } else if pull.IsForkBased() { 1605 s.resubmitFork(w, r) 1606 return 1607 } 1608 } 1609} 1610 1611func (s *Pulls) resubmitPatch(w http.ResponseWriter, r *http.Request) { 1612 user := s.oauth.GetMultiAccountUser(r) 1613 1614 pull, ok := r.Context().Value("pull").(*models.Pull) 1615 if !ok { 1616 log.Println("failed to get pull") 1617 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 1618 return 1619 } 1620 1621 f, err := s.repoResolver.Resolve(r) 1622 if err != nil { 1623 log.Println("failed to get repo and knot", err) 1624 return 1625 } 1626 1627 if user.Active.Did != pull.OwnerDid { 1628 log.Println("unauthorized user") 1629 w.WriteHeader(http.StatusUnauthorized) 1630 return 1631 } 1632 1633 patch := r.FormValue("patch") 1634 1635 s.resubmitPullHelper(w, r, f, user, pull, patch, "", "") 1636} 1637 1638func (s *Pulls) resubmitBranch(w http.ResponseWriter, r *http.Request) { 1639 user := s.oauth.GetMultiAccountUser(r) 1640 1641 pull, ok := r.Context().Value("pull").(*models.Pull) 1642 if !ok { 1643 log.Println("failed to get pull") 1644 s.pages.Notice(w, "resubmit-error", "Failed to edit patch. Try again later.") 1645 return 1646 } 1647 1648 f, err := s.repoResolver.Resolve(r) 1649 if err != nil { 1650 log.Println("failed to get repo and knot", err) 1651 return 1652 } 1653 1654 if user.Active.Did != pull.OwnerDid { 1655 log.Println("unauthorized user") 1656 w.WriteHeader(http.StatusUnauthorized) 1657 return 1658 } 1659 1660 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())} 1661 if !roles.IsPushAllowed() { 1662 log.Println("unauthorized user") 1663 w.WriteHeader(http.StatusUnauthorized) 1664 return 1665 } 1666 1667 scheme := "http" 1668 if !s.config.Core.Dev { 1669 scheme = "https" 1670 } 1671 host := fmt.Sprintf("%s://%s", scheme, f.Knot) 1672 xrpcc := &indigoxrpc.Client{ 1673 Host: host, 1674 } 1675 1676 repo := fmt.Sprintf("%s/%s", f.Did, f.Name) 1677 xrpcBytes, err := tangled.RepoCompare(r.Context(), xrpcc, repo, pull.TargetBranch, pull.PullSource.Branch) 1678 if err != nil { 1679 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1680 log.Println("failed to call XRPC repo.compare", xrpcerr) 1681 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1682 return 1683 } 1684 log.Printf("compare request failed: %s", err) 1685 s.pages.Notice(w, "resubmit-error", err.Error()) 1686 return 1687 } 1688 1689 var comparison types.RepoFormatPatchResponse 1690 if err := json.Unmarshal(xrpcBytes, &comparison); err != nil { 1691 log.Println("failed to decode XRPC compare response", err) 1692 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1693 return 1694 } 1695 1696 sourceRev := comparison.Rev2 1697 patch := comparison.FormatPatchRaw 1698 combined := comparison.CombinedPatchRaw 1699 1700 s.resubmitPullHelper(w, r, f, user, pull, patch, combined, sourceRev) 1701} 1702 1703func (s *Pulls) resubmitFork(w http.ResponseWriter, r *http.Request) { 1704 user := s.oauth.GetMultiAccountUser(r) 1705 1706 pull, ok := r.Context().Value("pull").(*models.Pull) 1707 if !ok { 1708 log.Println("failed to get pull") 1709 s.pages.Notice(w, "resubmit-error", "Failed to edit patch. Try again later.") 1710 return 1711 } 1712 1713 f, err := s.repoResolver.Resolve(r) 1714 if err != nil { 1715 log.Println("failed to get repo and knot", err) 1716 return 1717 } 1718 1719 if user.Active.Did != pull.OwnerDid { 1720 log.Println("unauthorized user") 1721 w.WriteHeader(http.StatusUnauthorized) 1722 return 1723 } 1724 1725 forkRepo, err := db.GetRepoByAtUri(s.db, pull.PullSource.RepoAt.String()) 1726 if err != nil { 1727 log.Println("failed to get source repo", err) 1728 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1729 return 1730 } 1731 1732 // update the hidden tracking branch to latest 1733 client, err := s.oauth.ServiceClient( 1734 r, 1735 oauth.WithService(forkRepo.Knot), 1736 oauth.WithLxm(tangled.RepoHiddenRefNSID), 1737 oauth.WithDev(s.config.Core.Dev), 1738 ) 1739 if err != nil { 1740 log.Printf("failed to connect to knot server: %v", err) 1741 return 1742 } 1743 1744 resp, err := tangled.RepoHiddenRef( 1745 r.Context(), 1746 client, 1747 &tangled.RepoHiddenRef_Input{ 1748 ForkRef: pull.PullSource.Branch, 1749 RemoteRef: pull.TargetBranch, 1750 Repo: forkRepo.RepoAt().String(), 1751 }, 1752 ) 1753 if err := xrpcclient.HandleXrpcErr(err); err != nil { 1754 s.pages.Notice(w, "resubmit-error", err.Error()) 1755 return 1756 } 1757 if !resp.Success { 1758 log.Println("Failed to update tracking ref.", "err", resp.Error) 1759 s.pages.Notice(w, "resubmit-error", "Failed to update tracking ref.") 1760 return 1761 } 1762 1763 hiddenRef := fmt.Sprintf("hidden/%s/%s", pull.PullSource.Branch, pull.TargetBranch) 1764 // extract patch by performing compare 1765 forkScheme := "http" 1766 if !s.config.Core.Dev { 1767 forkScheme = "https" 1768 } 1769 forkHost := fmt.Sprintf("%s://%s", forkScheme, forkRepo.Knot) 1770 forkRepoId := fmt.Sprintf("%s/%s", forkRepo.Did, forkRepo.Name) 1771 forkXrpcBytes, err := tangled.RepoCompare(r.Context(), &indigoxrpc.Client{Host: forkHost}, forkRepoId, hiddenRef, pull.PullSource.Branch) 1772 if err != nil { 1773 if xrpcerr := xrpcclient.HandleXrpcErr(err); xrpcerr != nil { 1774 log.Println("failed to call XRPC repo.compare for fork", xrpcerr) 1775 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1776 return 1777 } 1778 log.Printf("failed to compare branches: %s", err) 1779 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1780 return 1781 } 1782 1783 var forkComparison types.RepoFormatPatchResponse 1784 if err := json.Unmarshal(forkXrpcBytes, &forkComparison); err != nil { 1785 log.Println("failed to decode XRPC compare response for fork", err) 1786 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1787 return 1788 } 1789 1790 // Use the fork comparison we already made 1791 comparison := forkComparison 1792 1793 sourceRev := comparison.Rev2 1794 patch := comparison.FormatPatchRaw 1795 combined := comparison.CombinedPatchRaw 1796 1797 s.resubmitPullHelper(w, r, f, user, pull, patch, combined, sourceRev) 1798} 1799 1800func (s *Pulls) resubmitPullHelper( 1801 w http.ResponseWriter, 1802 r *http.Request, 1803 repo *models.Repo, 1804 user *oauth.MultiAccountUser, 1805 pull *models.Pull, 1806 patch string, 1807 combined string, 1808 sourceRev string, 1809) { 1810 if pull.IsStacked() { 1811 log.Println("resubmitting stacked PR") 1812 s.resubmitStackedPullHelper(w, r, repo, user, pull, patch, pull.StackId) 1813 return 1814 } 1815 1816 if err := s.validator.ValidatePatch(&patch); err != nil { 1817 s.pages.Notice(w, "resubmit-error", err.Error()) 1818 return 1819 } 1820 1821 if patch == pull.LatestPatch() { 1822 s.pages.Notice(w, "resubmit-error", "Patch is identical to previous submission.") 1823 return 1824 } 1825 1826 // validate sourceRev if branch/fork based 1827 if pull.IsBranchBased() || pull.IsForkBased() { 1828 if sourceRev == pull.LatestSha() { 1829 s.pages.Notice(w, "resubmit-error", "This branch has not changed since the last submission.") 1830 return 1831 } 1832 } 1833 1834 tx, err := s.db.BeginTx(r.Context(), nil) 1835 if err != nil { 1836 log.Println("failed to start tx") 1837 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1838 return 1839 } 1840 defer tx.Rollback() 1841 1842 pullAt := pull.AtUri() 1843 newRoundNumber := len(pull.Submissions) 1844 newPatch := patch 1845 newSourceRev := sourceRev 1846 combinedPatch := combined 1847 err = db.ResubmitPull(tx, pullAt, newRoundNumber, newPatch, combinedPatch, newSourceRev) 1848 if err != nil { 1849 log.Println("failed to create pull request", err) 1850 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1851 return 1852 } 1853 client, err := s.oauth.AuthorizedClient(r) 1854 if err != nil { 1855 log.Println("failed to authorize client") 1856 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1857 return 1858 } 1859 1860 ex, err := comatproto.RepoGetRecord(r.Context(), client, "", tangled.RepoPullNSID, user.Active.Did, pull.Rkey) 1861 if err != nil { 1862 // failed to get record 1863 s.pages.Notice(w, "resubmit-error", "Failed to update pull, no record found on PDS.") 1864 return 1865 } 1866 1867 blob, err := comatproto.RepoUploadBlob(r.Context(), client, gz(patch)) 1868 if err != nil { 1869 log.Println("failed to upload patch blob", err) 1870 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 1871 return 1872 } 1873 record := pull.AsRecord() 1874 record.PatchBlob = blob.Blob 1875 record.CreatedAt = time.Now().Format(time.RFC3339) 1876 record.Source.Sha = newSourceRev 1877 1878 _, err = comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 1879 Collection: tangled.RepoPullNSID, 1880 Repo: user.Active.Did, 1881 Rkey: pull.Rkey, 1882 SwapRecord: ex.Cid, 1883 Record: &lexutil.LexiconTypeDecoder{ 1884 Val: &record, 1885 }, 1886 }) 1887 if err != nil { 1888 log.Println("failed to update record", err) 1889 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 1890 return 1891 } 1892 1893 if err = tx.Commit(); err != nil { 1894 log.Println("failed to commit transaction", err) 1895 s.pages.Notice(w, "resubmit-error", "Failed to resubmit pull.") 1896 return 1897 } 1898 1899 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo) 1900 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 1901} 1902 1903func (s *Pulls) resubmitStackedPullHelper( 1904 w http.ResponseWriter, 1905 r *http.Request, 1906 repo *models.Repo, 1907 user *oauth.MultiAccountUser, 1908 pull *models.Pull, 1909 patch string, 1910 stackId string, 1911) { 1912 targetBranch := pull.TargetBranch 1913 1914 origStack, _ := r.Context().Value("stack").(models.Stack) 1915 newStack, err := s.newStack(r.Context(), repo, user, targetBranch, patch, pull.PullSource, stackId) 1916 if err != nil { 1917 log.Println("failed to create resubmitted stack", err) 1918 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 1919 return 1920 } 1921 1922 // find the diff between the stacks, first, map them by changeId 1923 origById := make(map[string]*models.Pull) 1924 newById := make(map[string]*models.Pull) 1925 for _, p := range origStack { 1926 origById[p.ChangeId] = p 1927 } 1928 for _, p := range newStack { 1929 newById[p.ChangeId] = p 1930 } 1931 1932 // commits that got deleted: corresponding pull is closed 1933 // commits that got added: new pull is created 1934 // commits that got updated: corresponding pull is resubmitted & new round begins 1935 additions := make(map[string]*models.Pull) 1936 deletions := make(map[string]*models.Pull) 1937 updated := make(map[string]struct{}) 1938 1939 // pulls in orignal stack but not in new one 1940 for _, op := range origStack { 1941 if _, ok := newById[op.ChangeId]; !ok { 1942 deletions[op.ChangeId] = op 1943 } 1944 } 1945 1946 // pulls in new stack but not in original one 1947 for _, np := range newStack { 1948 if _, ok := origById[np.ChangeId]; !ok { 1949 additions[np.ChangeId] = np 1950 } 1951 } 1952 1953 // NOTE: this loop can be written in any of above blocks, 1954 // but is written separately in the interest of simpler code 1955 for _, np := range newStack { 1956 if op, ok := origById[np.ChangeId]; ok { 1957 // pull exists in both stacks 1958 updated[op.ChangeId] = struct{}{} 1959 } 1960 } 1961 1962 tx, err := s.db.Begin() 1963 if err != nil { 1964 log.Println("failed to start transaction", err) 1965 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 1966 return 1967 } 1968 defer tx.Rollback() 1969 1970 client, err := s.oauth.AuthorizedClient(r) 1971 if err != nil { 1972 log.Println("failed to authorize client") 1973 s.pages.Notice(w, "resubmit-error", "Failed to create pull request. Try again later.") 1974 return 1975 } 1976 1977 // pds updates to make 1978 var writes []*comatproto.RepoApplyWrites_Input_Writes_Elem 1979 1980 // deleted pulls are marked as deleted in the DB 1981 for _, p := range deletions { 1982 // do not do delete already merged PRs 1983 if p.State == models.PullMerged { 1984 continue 1985 } 1986 1987 err := db.DeletePull(tx, p.RepoAt, p.PullId) 1988 if err != nil { 1989 log.Println("failed to delete pull", err, p.PullId) 1990 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 1991 return 1992 } 1993 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 1994 RepoApplyWrites_Delete: &comatproto.RepoApplyWrites_Delete{ 1995 Collection: tangled.RepoPullNSID, 1996 Rkey: p.Rkey, 1997 }, 1998 }) 1999 } 2000 2001 // new pulls are created 2002 for _, p := range additions { 2003 err := db.NewPull(tx, p) 2004 if err != nil { 2005 log.Println("failed to create pull", err, p.PullId) 2006 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2007 return 2008 } 2009 2010 blob, err := comatproto.RepoUploadBlob(r.Context(), client, gz(patch)) 2011 if err != nil { 2012 log.Println("failed to upload patch blob", err) 2013 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 2014 return 2015 } 2016 record := p.AsRecord() 2017 record.PatchBlob = blob.Blob 2018 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 2019 RepoApplyWrites_Create: &comatproto.RepoApplyWrites_Create{ 2020 Collection: tangled.RepoPullNSID, 2021 Rkey: &p.Rkey, 2022 Value: &lexutil.LexiconTypeDecoder{ 2023 Val: &record, 2024 }, 2025 }, 2026 }) 2027 } 2028 2029 // updated pulls are, well, updated; to start a new round 2030 for id := range updated { 2031 op, _ := origById[id] 2032 np, _ := newById[id] 2033 2034 // do not update already merged PRs 2035 if op.State == models.PullMerged { 2036 continue 2037 } 2038 2039 // resubmit the new pull 2040 pullAt := op.AtUri() 2041 newRoundNumber := len(op.Submissions) 2042 newPatch := np.LatestPatch() 2043 combinedPatch := np.LatestSubmission().Combined 2044 newSourceRev := np.LatestSha() 2045 err := db.ResubmitPull(tx, pullAt, newRoundNumber, newPatch, combinedPatch, newSourceRev) 2046 if err != nil { 2047 log.Println("failed to update pull", err, op.PullId) 2048 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2049 return 2050 } 2051 2052 blob, err := comatproto.RepoUploadBlob(r.Context(), client, gz(patch)) 2053 if err != nil { 2054 log.Println("failed to upload patch blob", err) 2055 s.pages.Notice(w, "resubmit-error", "Failed to update pull request on the PDS. Try again later.") 2056 return 2057 } 2058 record := np.AsRecord() 2059 record.PatchBlob = blob.Blob 2060 writes = append(writes, &comatproto.RepoApplyWrites_Input_Writes_Elem{ 2061 RepoApplyWrites_Update: &comatproto.RepoApplyWrites_Update{ 2062 Collection: tangled.RepoPullNSID, 2063 Rkey: op.Rkey, 2064 Value: &lexutil.LexiconTypeDecoder{ 2065 Val: &record, 2066 }, 2067 }, 2068 }) 2069 } 2070 2071 // update parent-change-id relations for the entire stack 2072 for _, p := range newStack { 2073 err := db.SetPullParentChangeId( 2074 tx, 2075 p.ParentChangeId, 2076 // these should be enough filters to be unique per-stack 2077 orm.FilterEq("repo_at", p.RepoAt.String()), 2078 orm.FilterEq("owner_did", p.OwnerDid), 2079 orm.FilterEq("change_id", p.ChangeId), 2080 ) 2081 2082 if err != nil { 2083 log.Println("failed to update pull", err, p.PullId) 2084 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2085 return 2086 } 2087 } 2088 2089 err = tx.Commit() 2090 if err != nil { 2091 log.Println("failed to resubmit pull", err) 2092 s.pages.Notice(w, "pull-resubmit-error", "Failed to resubmit pull request. Try again later.") 2093 return 2094 } 2095 2096 _, err = comatproto.RepoApplyWrites(r.Context(), client, &comatproto.RepoApplyWrites_Input{ 2097 Repo: user.Active.Did, 2098 Writes: writes, 2099 }) 2100 if err != nil { 2101 log.Println("failed to create stacked pull request", err) 2102 s.pages.Notice(w, "pull", "Failed to create stacked pull request. Try again later.") 2103 return 2104 } 2105 2106 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, repo) 2107 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 2108} 2109 2110func (s *Pulls) MergePull(w http.ResponseWriter, r *http.Request) { 2111 user := s.oauth.GetMultiAccountUser(r) 2112 f, err := s.repoResolver.Resolve(r) 2113 if err != nil { 2114 log.Println("failed to resolve repo:", err) 2115 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2116 return 2117 } 2118 2119 pull, ok := r.Context().Value("pull").(*models.Pull) 2120 if !ok { 2121 log.Println("failed to get pull") 2122 s.pages.Notice(w, "pull-merge-error", "Failed to merge patch. Try again later.") 2123 return 2124 } 2125 2126 var pullsToMerge models.Stack 2127 pullsToMerge = append(pullsToMerge, pull) 2128 if pull.IsStacked() { 2129 stack, ok := r.Context().Value("stack").(models.Stack) 2130 if !ok { 2131 log.Println("failed to get stack") 2132 s.pages.Notice(w, "pull-merge-error", "Failed to merge patch. Try again later.") 2133 return 2134 } 2135 2136 // combine patches of substack 2137 subStack := stack.StrictlyBelow(pull) 2138 // collect the portion of the stack that is mergeable 2139 mergeable := subStack.Mergeable() 2140 // add to total patch 2141 pullsToMerge = append(pullsToMerge, mergeable...) 2142 } 2143 2144 patch := pullsToMerge.CombinedPatch() 2145 2146 ident, err := s.idResolver.ResolveIdent(r.Context(), pull.OwnerDid) 2147 if err != nil { 2148 log.Printf("resolving identity: %s", err) 2149 w.WriteHeader(http.StatusNotFound) 2150 return 2151 } 2152 2153 email, err := db.GetPrimaryEmail(s.db, pull.OwnerDid) 2154 if err != nil { 2155 log.Printf("failed to get primary email: %s", err) 2156 } 2157 2158 authorName := ident.Handle.String() 2159 mergeInput := &tangled.RepoMerge_Input{ 2160 Did: f.Did, 2161 Name: f.Name, 2162 Branch: pull.TargetBranch, 2163 Patch: patch, 2164 CommitMessage: &pull.Title, 2165 AuthorName: &authorName, 2166 } 2167 2168 if pull.Body != "" { 2169 mergeInput.CommitBody = &pull.Body 2170 } 2171 2172 if email.Address != "" { 2173 mergeInput.AuthorEmail = &email.Address 2174 } 2175 2176 client, err := s.oauth.ServiceClient( 2177 r, 2178 oauth.WithService(f.Knot), 2179 oauth.WithLxm(tangled.RepoMergeNSID), 2180 oauth.WithDev(s.config.Core.Dev), 2181 ) 2182 if err != nil { 2183 log.Printf("failed to connect to knot server: %v", err) 2184 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2185 return 2186 } 2187 2188 err = tangled.RepoMerge(r.Context(), client, mergeInput) 2189 if err := xrpcclient.HandleXrpcErr(err); err != nil { 2190 s.pages.Notice(w, "pull-merge-error", err.Error()) 2191 return 2192 } 2193 2194 tx, err := s.db.Begin() 2195 if err != nil { 2196 log.Println("failed to start transcation", err) 2197 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2198 return 2199 } 2200 defer tx.Rollback() 2201 2202 for _, p := range pullsToMerge { 2203 err := db.MergePull(tx, f.RepoAt(), p.PullId) 2204 if err != nil { 2205 log.Printf("failed to update pull request status in database: %s", err) 2206 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2207 return 2208 } 2209 p.State = models.PullMerged 2210 } 2211 2212 err = tx.Commit() 2213 if err != nil { 2214 // TODO: this is unsound, we should also revert the merge from the knotserver here 2215 log.Printf("failed to update pull request status in database: %s", err) 2216 s.pages.Notice(w, "pull-merge-error", "Failed to merge pull request. Try again later.") 2217 return 2218 } 2219 2220 // notify about the pull merge 2221 for _, p := range pullsToMerge { 2222 s.notifier.NewPullState(r.Context(), syntax.DID(user.Active.Did), p) 2223 } 2224 2225 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f) 2226 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 2227} 2228 2229func (s *Pulls) ClosePull(w http.ResponseWriter, r *http.Request) { 2230 user := s.oauth.GetMultiAccountUser(r) 2231 2232 f, err := s.repoResolver.Resolve(r) 2233 if err != nil { 2234 log.Println("malformed middleware") 2235 return 2236 } 2237 2238 pull, ok := r.Context().Value("pull").(*models.Pull) 2239 if !ok { 2240 log.Println("failed to get pull") 2241 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 2242 return 2243 } 2244 2245 // auth filter: only owner or collaborators can close 2246 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())} 2247 isOwner := roles.IsOwner() 2248 isCollaborator := roles.IsCollaborator() 2249 isPullAuthor := user.Active.Did == pull.OwnerDid 2250 isCloseAllowed := isOwner || isCollaborator || isPullAuthor 2251 if !isCloseAllowed { 2252 log.Println("failed to close pull") 2253 s.pages.Notice(w, "pull-close", "You are unauthorized to close this pull.") 2254 return 2255 } 2256 2257 // Start a transaction 2258 tx, err := s.db.BeginTx(r.Context(), nil) 2259 if err != nil { 2260 log.Println("failed to start transaction", err) 2261 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2262 return 2263 } 2264 defer tx.Rollback() 2265 2266 var pullsToClose []*models.Pull 2267 pullsToClose = append(pullsToClose, pull) 2268 2269 // if this PR is stacked, then we want to close all PRs below this one on the stack 2270 if pull.IsStacked() { 2271 stack := r.Context().Value("stack").(models.Stack) 2272 subStack := stack.StrictlyBelow(pull) 2273 pullsToClose = append(pullsToClose, subStack...) 2274 } 2275 2276 for _, p := range pullsToClose { 2277 // Close the pull in the database 2278 err = db.ClosePull(tx, f.RepoAt(), p.PullId) 2279 if err != nil { 2280 log.Println("failed to close pull", err) 2281 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2282 return 2283 } 2284 p.State = models.PullClosed 2285 } 2286 2287 // Commit the transaction 2288 if err = tx.Commit(); err != nil { 2289 log.Println("failed to commit transaction", err) 2290 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2291 return 2292 } 2293 2294 for _, p := range pullsToClose { 2295 s.notifier.NewPullState(r.Context(), syntax.DID(user.Active.Did), p) 2296 } 2297 2298 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f) 2299 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 2300} 2301 2302func (s *Pulls) ReopenPull(w http.ResponseWriter, r *http.Request) { 2303 user := s.oauth.GetMultiAccountUser(r) 2304 2305 f, err := s.repoResolver.Resolve(r) 2306 if err != nil { 2307 log.Println("failed to resolve repo", err) 2308 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 2309 return 2310 } 2311 2312 pull, ok := r.Context().Value("pull").(*models.Pull) 2313 if !ok { 2314 log.Println("failed to get pull") 2315 s.pages.Notice(w, "pull-error", "Failed to edit patch. Try again later.") 2316 return 2317 } 2318 2319 // auth filter: only owner or collaborators can close 2320 roles := repoinfo.RolesInRepo{Roles: s.enforcer.GetPermissionsInRepo(user.Active.Did, f.Knot, f.DidSlashRepo())} 2321 isOwner := roles.IsOwner() 2322 isCollaborator := roles.IsCollaborator() 2323 isPullAuthor := user.Active.Did == pull.OwnerDid 2324 isCloseAllowed := isOwner || isCollaborator || isPullAuthor 2325 if !isCloseAllowed { 2326 log.Println("failed to close pull") 2327 s.pages.Notice(w, "pull-close", "You are unauthorized to close this pull.") 2328 return 2329 } 2330 2331 // Start a transaction 2332 tx, err := s.db.BeginTx(r.Context(), nil) 2333 if err != nil { 2334 log.Println("failed to start transaction", err) 2335 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 2336 return 2337 } 2338 defer tx.Rollback() 2339 2340 var pullsToReopen []*models.Pull 2341 pullsToReopen = append(pullsToReopen, pull) 2342 2343 // if this PR is stacked, then we want to reopen all PRs above this one on the stack 2344 if pull.IsStacked() { 2345 stack := r.Context().Value("stack").(models.Stack) 2346 subStack := stack.StrictlyAbove(pull) 2347 pullsToReopen = append(pullsToReopen, subStack...) 2348 } 2349 2350 for _, p := range pullsToReopen { 2351 // Close the pull in the database 2352 err = db.ReopenPull(tx, f.RepoAt(), p.PullId) 2353 if err != nil { 2354 log.Println("failed to close pull", err) 2355 s.pages.Notice(w, "pull-close", "Failed to close pull.") 2356 return 2357 } 2358 p.State = models.PullOpen 2359 } 2360 2361 // Commit the transaction 2362 if err = tx.Commit(); err != nil { 2363 log.Println("failed to commit transaction", err) 2364 s.pages.Notice(w, "pull-reopen", "Failed to reopen pull.") 2365 return 2366 } 2367 2368 for _, p := range pullsToReopen { 2369 s.notifier.NewPullState(r.Context(), syntax.DID(user.Active.Did), p) 2370 } 2371 2372 ownerSlashRepo := reporesolver.GetBaseRepoPath(r, f) 2373 s.pages.HxLocation(w, fmt.Sprintf("/%s/pulls/%d", ownerSlashRepo, pull.PullId)) 2374} 2375 2376func (s *Pulls) newStack(ctx context.Context, repo *models.Repo, user *oauth.MultiAccountUser, targetBranch, patch string, pullSource *models.PullSource, stackId string) (models.Stack, error) { 2377 formatPatches, err := patchutil.ExtractPatches(patch) 2378 if err != nil { 2379 return nil, fmt.Errorf("Failed to extract patches: %v", err) 2380 } 2381 2382 // must have atleast 1 patch to begin with 2383 if len(formatPatches) == 0 { 2384 return nil, fmt.Errorf("No patches found in the generated format-patch.") 2385 } 2386 2387 // the stack is identified by a UUID 2388 var stack models.Stack 2389 parentChangeId := "" 2390 for _, fp := range formatPatches { 2391 // all patches must have a jj change-id 2392 changeId, err := fp.ChangeId() 2393 if err != nil { 2394 return nil, fmt.Errorf("Stacking is only supported if all patches contain a change-id commit header.") 2395 } 2396 2397 title := fp.Title 2398 body := fp.Body 2399 rkey := tid.TID() 2400 2401 mentions, references := s.mentionsResolver.Resolve(ctx, body) 2402 2403 initialSubmission := models.PullSubmission{ 2404 Patch: fp.Raw, 2405 SourceRev: fp.SHA, 2406 Combined: fp.Raw, 2407 } 2408 pull := models.Pull{ 2409 Title: title, 2410 Body: body, 2411 TargetBranch: targetBranch, 2412 OwnerDid: user.Active.Did, 2413 RepoAt: repo.RepoAt(), 2414 Rkey: rkey, 2415 Mentions: mentions, 2416 References: references, 2417 Submissions: []*models.PullSubmission{ 2418 &initialSubmission, 2419 }, 2420 PullSource: pullSource, 2421 Created: time.Now(), 2422 2423 StackId: stackId, 2424 ChangeId: changeId, 2425 ParentChangeId: parentChangeId, 2426 } 2427 2428 stack = append(stack, &pull) 2429 2430 parentChangeId = changeId 2431 } 2432 2433 return stack, nil 2434} 2435 2436func gz(s string) io.Reader { 2437 var b bytes.Buffer 2438 w := gzip.NewWriter(&b) 2439 w.Write([]byte(s)) 2440 w.Close() 2441 return &b 2442}