Monorepo for Tangled
at push-zpskmntwpyxz 102 lines 2.8 kB view raw
1package xrpc 2 3import ( 4 "encoding/json" 5 "fmt" 6 "net/http" 7 8 comatproto "github.com/bluesky-social/indigo/api/atproto" 9 "github.com/bluesky-social/indigo/atproto/syntax" 10 "github.com/bluesky-social/indigo/xrpc" 11 "tangled.org/core/api/tangled" 12 "tangled.org/core/knotserver/git" 13 "tangled.org/core/rbac" 14 xrpcerr "tangled.org/core/xrpc/errors" 15) 16 17func (x *Xrpc) HiddenRef(w http.ResponseWriter, r *http.Request) { 18 l := x.Logger.With("handler", "HiddenRef") 19 fail := func(e xrpcerr.XrpcError) { 20 l.Error("failed", "kind", e.Tag, "error", e.Message) 21 writeError(w, e, http.StatusBadRequest) 22 } 23 24 actorDid, ok := r.Context().Value(ActorDid).(syntax.DID) 25 if !ok { 26 fail(xrpcerr.MissingActorDidError) 27 return 28 } 29 30 var data tangled.RepoHiddenRef_Input 31 if err := json.NewDecoder(r.Body).Decode(&data); err != nil { 32 fail(xrpcerr.GenericError(err)) 33 return 34 } 35 36 forkRef := data.ForkRef 37 remoteRef := data.RemoteRef 38 repoAtUri := data.Repo 39 40 if forkRef == "" || remoteRef == "" || repoAtUri == "" { 41 fail(xrpcerr.GenericError(fmt.Errorf("forkRef, remoteRef, and repo are required"))) 42 return 43 } 44 45 repoAt, err := syntax.ParseATURI(repoAtUri) 46 if err != nil { 47 fail(xrpcerr.InvalidRepoError(repoAtUri)) 48 return 49 } 50 51 ident, err := x.Resolver.ResolveIdent(r.Context(), repoAt.Authority().String()) 52 if err != nil || ident.Handle.IsInvalidHandle() { 53 fail(xrpcerr.GenericError(fmt.Errorf("failed to resolve handle: %w", err))) 54 return 55 } 56 57 xrpcc := xrpc.Client{Host: ident.PDSEndpoint()} 58 resp, err := comatproto.RepoGetRecord(r.Context(), &xrpcc, "", tangled.RepoNSID, repoAt.Authority().String(), repoAt.RecordKey().String()) 59 if err != nil { 60 fail(xrpcerr.GenericError(err)) 61 return 62 } 63 64 repo := resp.Value.Val.(*tangled.Repo) 65 repoDid, err := x.Db.GetRepoDid(actorDid.String(), repo.Name) 66 if err != nil { 67 fail(xrpcerr.RepoNotFoundError) 68 return 69 } 70 repoPath, _, _, err := x.Db.ResolveRepoDIDOnDisk(x.Config.Repo.ScanPath, repoDid) 71 if err != nil { 72 fail(xrpcerr.RepoNotFoundError) 73 return 74 } 75 76 if ok, err := x.Enforcer.IsPushAllowed(actorDid.String(), rbac.ThisServer, repoDid); !ok || err != nil { 77 l.Error("insufficient permissions", "did", actorDid.String(), "repo", repoDid) 78 writeError(w, xrpcerr.AccessControlError(actorDid.String()), http.StatusUnauthorized) 79 return 80 } 81 82 gr, err := git.PlainOpen(repoPath) 83 if err != nil { 84 fail(xrpcerr.GenericError(fmt.Errorf("failed to open repository: %w", err))) 85 return 86 } 87 88 err = gr.TrackHiddenRemoteRef(forkRef, remoteRef) 89 if err != nil { 90 l.Error("error tracking hidden remote ref", "error", err.Error()) 91 writeError(w, xrpcerr.GitError(err), http.StatusInternalServerError) 92 return 93 } 94 95 response := tangled.RepoHiddenRef_Output{ 96 Success: true, 97 } 98 99 w.Header().Set("Content-Type", "application/json") 100 w.WriteHeader(http.StatusOK) 101 json.NewEncoder(w).Encode(response) 102}