Monorepo for Tangled
1package xrpc
2
3import (
4 "encoding/json"
5 "fmt"
6 "net/http"
7
8 comatproto "github.com/bluesky-social/indigo/api/atproto"
9 "github.com/bluesky-social/indigo/atproto/syntax"
10 "github.com/bluesky-social/indigo/xrpc"
11 "tangled.org/core/api/tangled"
12 "tangled.org/core/knotserver/git"
13 "tangled.org/core/rbac"
14 xrpcerr "tangled.org/core/xrpc/errors"
15)
16
17func (x *Xrpc) HiddenRef(w http.ResponseWriter, r *http.Request) {
18 l := x.Logger.With("handler", "HiddenRef")
19 fail := func(e xrpcerr.XrpcError) {
20 l.Error("failed", "kind", e.Tag, "error", e.Message)
21 writeError(w, e, http.StatusBadRequest)
22 }
23
24 actorDid, ok := r.Context().Value(ActorDid).(syntax.DID)
25 if !ok {
26 fail(xrpcerr.MissingActorDidError)
27 return
28 }
29
30 var data tangled.RepoHiddenRef_Input
31 if err := json.NewDecoder(r.Body).Decode(&data); err != nil {
32 fail(xrpcerr.GenericError(err))
33 return
34 }
35
36 forkRef := data.ForkRef
37 remoteRef := data.RemoteRef
38 repoAtUri := data.Repo
39
40 if forkRef == "" || remoteRef == "" || repoAtUri == "" {
41 fail(xrpcerr.GenericError(fmt.Errorf("forkRef, remoteRef, and repo are required")))
42 return
43 }
44
45 repoAt, err := syntax.ParseATURI(repoAtUri)
46 if err != nil {
47 fail(xrpcerr.InvalidRepoError(repoAtUri))
48 return
49 }
50
51 ident, err := x.Resolver.ResolveIdent(r.Context(), repoAt.Authority().String())
52 if err != nil || ident.Handle.IsInvalidHandle() {
53 fail(xrpcerr.GenericError(fmt.Errorf("failed to resolve handle: %w", err)))
54 return
55 }
56
57 xrpcc := xrpc.Client{Host: ident.PDSEndpoint()}
58 resp, err := comatproto.RepoGetRecord(r.Context(), &xrpcc, "", tangled.RepoNSID, repoAt.Authority().String(), repoAt.RecordKey().String())
59 if err != nil {
60 fail(xrpcerr.GenericError(err))
61 return
62 }
63
64 repo := resp.Value.Val.(*tangled.Repo)
65 repoDid, err := x.Db.GetRepoDid(actorDid.String(), repo.Name)
66 if err != nil {
67 fail(xrpcerr.RepoNotFoundError)
68 return
69 }
70 repoPath, _, _, err := x.Db.ResolveRepoDIDOnDisk(x.Config.Repo.ScanPath, repoDid)
71 if err != nil {
72 fail(xrpcerr.RepoNotFoundError)
73 return
74 }
75
76 if ok, err := x.Enforcer.IsPushAllowed(actorDid.String(), rbac.ThisServer, repoDid); !ok || err != nil {
77 l.Error("insufficient permissions", "did", actorDid.String(), "repo", repoDid)
78 writeError(w, xrpcerr.AccessControlError(actorDid.String()), http.StatusUnauthorized)
79 return
80 }
81
82 gr, err := git.PlainOpen(repoPath)
83 if err != nil {
84 fail(xrpcerr.GenericError(fmt.Errorf("failed to open repository: %w", err)))
85 return
86 }
87
88 err = gr.TrackHiddenRemoteRef(forkRef, remoteRef)
89 if err != nil {
90 l.Error("error tracking hidden remote ref", "error", err.Error())
91 writeError(w, xrpcerr.GitError(err), http.StatusInternalServerError)
92 return
93 }
94
95 response := tangled.RepoHiddenRef_Output{
96 Success: true,
97 }
98
99 w.Header().Set("Content-Type", "application/json")
100 w.WriteHeader(http.StatusOK)
101 json.NewEncoder(w).Encode(response)
102}