2018-09-29 16:33:54 +08:00
|
|
|
// Copyright 2018 The Gitea Authors. All rights reserved.
|
2014-04-11 02:20:58 +08:00
|
|
|
// Copyright 2014 The Gogs Authors. All rights reserved.
|
2022-11-28 02:20:29 +08:00
|
|
|
// SPDX-License-Identifier: MIT
|
2014-04-11 02:20:58 +08:00
|
|
|
|
2016-12-07 01:58:31 +08:00
|
|
|
package templates
|
2014-04-11 02:20:58 +08:00
|
|
|
|
|
|
|
import (
|
2017-03-02 08:25:44 +08:00
|
|
|
"bytes"
|
2022-01-20 07:26:57 +08:00
|
|
|
"context"
|
Scoped labels (#22585)
Add a new "exclusive" option per label. This makes it so that when the
label is named `scope/name`, no other label with the same `scope/`
prefix can be set on an issue.
The scope is determined by the last occurence of `/`, so for example
`scope/alpha/name` and `scope/beta/name` are considered to be in
different scopes and can coexist.
Exclusive scopes are not enforced by any database rules, however they
are enforced when editing labels at the models level, automatically
removing any existing labels in the same scope when either attaching a
new label or replacing all labels.
In menus use a circle instead of checkbox to indicate they function as
radio buttons per scope. Issue filtering by label ensures that only a
single scoped label is selected at a time. Clicking with alt key can be
used to remove a scoped label, both when editing individual issues and
batch editing.
Label rendering refactor for consistency and code simplification:
* Labels now consistently have the same shape, emojis and tooltips
everywhere. This includes the label list and label assignment menus.
* In label list, show description below label same as label menus.
* Don't use exactly black/white text colors to look a bit nicer.
* Simplify text color computation. There is no point computing luminance
in linear color space, as this is a perceptual problem and sRGB is
closer to perceptually linear.
* Increase height of label assignment menus to show more labels. Showing
only 3-4 labels at a time leads to a lot of scrolling.
* Render all labels with a new RenderLabel template helper function.
Label creation and editing in multiline modal menu:
* Change label creation to open a modal menu like label editing.
* Change menu layout to place name, description and colors on separate
lines.
* Don't color cancel button red in label editing modal menu.
* Align text to the left in model menu for better readability and
consistent with settings layout elsewhere.
Custom exclusive scoped label rendering:
* Display scoped label prefix and suffix with slightly darker and
lighter background color respectively, and a slanted edge between them
similar to the `/` symbol.
* In menus exclusive labels are grouped with a divider line.
---------
Co-authored-by: Yarden Shoham <hrsi88@gmail.com>
Co-authored-by: Lauris BH <lauris@nix.lv>
2023-02-19 03:17:39 +08:00
|
|
|
"encoding/hex"
|
2017-12-04 07:14:26 +08:00
|
|
|
"errors"
|
2014-04-11 02:20:58 +08:00
|
|
|
"fmt"
|
2018-02-27 15:09:18 +08:00
|
|
|
"html"
|
2014-04-11 02:20:58 +08:00
|
|
|
"html/template"
|
Scoped labels (#22585)
Add a new "exclusive" option per label. This makes it so that when the
label is named `scope/name`, no other label with the same `scope/`
prefix can be set on an issue.
The scope is determined by the last occurence of `/`, so for example
`scope/alpha/name` and `scope/beta/name` are considered to be in
different scopes and can coexist.
Exclusive scopes are not enforced by any database rules, however they
are enforced when editing labels at the models level, automatically
removing any existing labels in the same scope when either attaching a
new label or replacing all labels.
In menus use a circle instead of checkbox to indicate they function as
radio buttons per scope. Issue filtering by label ensures that only a
single scoped label is selected at a time. Clicking with alt key can be
used to remove a scoped label, both when editing individual issues and
batch editing.
Label rendering refactor for consistency and code simplification:
* Labels now consistently have the same shape, emojis and tooltips
everywhere. This includes the label list and label assignment menus.
* In label list, show description below label same as label menus.
* Don't use exactly black/white text colors to look a bit nicer.
* Simplify text color computation. There is no point computing luminance
in linear color space, as this is a perceptual problem and sRGB is
closer to perceptually linear.
* Increase height of label assignment menus to show more labels. Showing
only 3-4 labels at a time leads to a lot of scrolling.
* Render all labels with a new RenderLabel template helper function.
Label creation and editing in multiline modal menu:
* Change label creation to open a modal menu like label editing.
* Change menu layout to place name, description and colors on separate
lines.
* Don't color cancel button red in label editing modal menu.
* Align text to the left in model menu for better readability and
consistent with settings layout elsewhere.
Custom exclusive scoped label rendering:
* Display scoped label prefix and suffix with slightly darker and
lighter background color respectively, and a slanted edge between them
similar to the `/` symbol.
* In menus exclusive labels are grouped with a divider line.
---------
Co-authored-by: Yarden Shoham <hrsi88@gmail.com>
Co-authored-by: Lauris BH <lauris@nix.lv>
2023-02-19 03:17:39 +08:00
|
|
|
"math"
|
2016-08-12 07:16:36 +08:00
|
|
|
"mime"
|
2017-11-28 17:43:51 +08:00
|
|
|
"net/url"
|
2016-08-12 07:16:36 +08:00
|
|
|
"path/filepath"
|
2020-11-09 01:21:54 +08:00
|
|
|
"reflect"
|
2019-11-07 21:34:28 +08:00
|
|
|
"regexp"
|
2014-05-22 09:37:13 +08:00
|
|
|
"runtime"
|
2022-06-08 16:59:16 +08:00
|
|
|
"strconv"
|
2014-04-11 02:20:58 +08:00
|
|
|
"strings"
|
2019-11-07 21:34:28 +08:00
|
|
|
texttmpl "text/template"
|
2014-04-11 02:20:58 +08:00
|
|
|
"time"
|
2019-11-01 12:48:30 +08:00
|
|
|
"unicode"
|
2014-05-26 08:11:25 +08:00
|
|
|
|
2022-08-25 10:31:57 +08:00
|
|
|
activities_model "code.gitea.io/gitea/models/activities"
|
Avatar refactor, move avatar code from `models` to `models.avatars`, remove duplicated code (#17123)
Why this refactor
The goal is to move most files from `models` package to `models.xxx` package. Many models depend on avatar model, so just move this first.
And the existing logic is not clear, there are too many function like `AvatarLink`, `RelAvatarLink`, `SizedRelAvatarLink`, `SizedAvatarLink`, `MakeFinalAvatarURL`, `HashedAvatarLink`, etc. This refactor make everything clear:
* user.AvatarLink()
* user.AvatarLinkWithSize(size)
* avatars.GenerateEmailAvatarFastLink(email, size)
* avatars.GenerateEmailAvatarFinalLink(email, size)
And many duplicated code are deleted in route handler, the handler and the model share the same avatar logic now.
2021-10-06 07:25:46 +08:00
|
|
|
"code.gitea.io/gitea/models/avatars"
|
2022-06-13 17:37:59 +08:00
|
|
|
issues_model "code.gitea.io/gitea/models/issues"
|
2022-03-29 14:29:02 +08:00
|
|
|
"code.gitea.io/gitea/models/organization"
|
2021-12-10 09:27:50 +08:00
|
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
2022-10-17 07:29:26 +08:00
|
|
|
system_model "code.gitea.io/gitea/models/system"
|
2021-11-24 17:49:20 +08:00
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2016-11-11 00:24:48 +08:00
|
|
|
"code.gitea.io/gitea/modules/base"
|
2020-04-29 02:05:39 +08:00
|
|
|
"code.gitea.io/gitea/modules/emoji"
|
2021-06-15 01:20:43 +08:00
|
|
|
"code.gitea.io/gitea/modules/git"
|
2022-06-11 21:50:14 +08:00
|
|
|
giturl "code.gitea.io/gitea/modules/git/url"
|
2022-11-08 23:13:58 +08:00
|
|
|
gitea_html "code.gitea.io/gitea/modules/html"
|
2021-07-25 00:03:58 +08:00
|
|
|
"code.gitea.io/gitea/modules/json"
|
2016-11-11 00:24:48 +08:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
2017-09-17 01:17:57 +08:00
|
|
|
"code.gitea.io/gitea/modules/markup"
|
2022-03-30 16:42:47 +08:00
|
|
|
"code.gitea.io/gitea/modules/markup/markdown"
|
2020-01-10 17:34:21 +08:00
|
|
|
"code.gitea.io/gitea/modules/repository"
|
2016-11-11 00:24:48 +08:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
2020-07-12 17:10:56 +08:00
|
|
|
"code.gitea.io/gitea/modules/svg"
|
2019-08-15 22:46:21 +08:00
|
|
|
"code.gitea.io/gitea/modules/timeutil"
|
|
|
|
"code.gitea.io/gitea/modules/util"
|
2019-09-06 10:20:09 +08:00
|
|
|
"code.gitea.io/gitea/services/gitdiff"
|
2017-11-22 15:09:48 +08:00
|
|
|
|
2019-10-16 05:24:16 +08:00
|
|
|
"github.com/editorconfig/editorconfig-core-go/v2"
|
2014-04-11 02:20:58 +08:00
|
|
|
)
|
|
|
|
|
2019-11-07 21:34:28 +08:00
|
|
|
// Used from static.go && dynamic.go
|
|
|
|
var mailSubjectSplit = regexp.MustCompile(`(?m)^-{3,}[\s]*$`)
|
|
|
|
|
2016-11-25 14:23:48 +08:00
|
|
|
// NewFuncMap returns functions for injecting to templates
|
2016-03-07 05:40:04 +08:00
|
|
|
func NewFuncMap() []template.FuncMap {
|
|
|
|
return []template.FuncMap{map[string]interface{}{
|
|
|
|
"GoVer": func() string {
|
2022-05-11 05:55:54 +08:00
|
|
|
return util.ToTitleCase(runtime.Version())
|
2016-03-07 05:40:04 +08:00
|
|
|
},
|
|
|
|
"UseHTTPS": func() bool {
|
2016-11-27 18:14:25 +08:00
|
|
|
return strings.HasPrefix(setting.AppURL, "https")
|
2016-03-07 05:40:04 +08:00
|
|
|
},
|
|
|
|
"AppName": func() string {
|
|
|
|
return setting.AppName
|
|
|
|
},
|
|
|
|
"AppSubUrl": func() string {
|
2016-11-27 18:14:25 +08:00
|
|
|
return setting.AppSubURL
|
2016-03-07 05:40:04 +08:00
|
|
|
},
|
2021-05-08 22:27:25 +08:00
|
|
|
"AssetUrlPrefix": func() string {
|
2021-04-28 20:35:06 +08:00
|
|
|
return setting.StaticURLPrefix + "/assets"
|
2019-10-22 20:11:01 +08:00
|
|
|
},
|
2016-03-07 05:40:04 +08:00
|
|
|
"AppUrl": func() string {
|
2023-02-10 00:31:30 +08:00
|
|
|
// The usage of AppUrl should be avoided as much as possible,
|
|
|
|
// because the AppURL(ROOT_URL) may not match user's visiting site and the ROOT_URL in app.ini may be incorrect.
|
|
|
|
// And it's difficult for Gitea to guess absolute URL correctly with zero configuration,
|
|
|
|
// because Gitea doesn't know whether the scheme is HTTP or HTTPS unless the reverse proxy could tell Gitea.
|
2016-11-27 18:14:25 +08:00
|
|
|
return setting.AppURL
|
2016-03-07 05:40:04 +08:00
|
|
|
},
|
|
|
|
"AppVer": func() string {
|
|
|
|
return setting.AppVer
|
|
|
|
},
|
2017-02-28 08:40:02 +08:00
|
|
|
"AppBuiltWith": func() string {
|
2017-03-01 09:45:21 +08:00
|
|
|
return setting.AppBuiltWith
|
2017-02-28 08:40:02 +08:00
|
|
|
},
|
2016-03-07 05:40:04 +08:00
|
|
|
"AppDomain": func() string {
|
|
|
|
return setting.Domain
|
|
|
|
},
|
2022-08-23 20:58:04 +08:00
|
|
|
"AssetVersion": func() string {
|
|
|
|
return setting.AssetVersion
|
|
|
|
},
|
Add context cache as a request level cache (#22294)
To avoid duplicated load of the same data in an HTTP request, we can set
a context cache to do that. i.e. Some pages may load a user from a
database with the same id in different areas on the same page. But the
code is hidden in two different deep logic. How should we share the
user? As a result of this PR, now if both entry functions accept
`context.Context` as the first parameter and we just need to refactor
`GetUserByID` to reuse the user from the context cache. Then it will not
be loaded twice on an HTTP request.
But of course, sometimes we would like to reload an object from the
database, that's why `RemoveContextData` is also exposed.
The core context cache is here. It defines a new context
```go
type cacheContext struct {
ctx context.Context
data map[any]map[any]any
lock sync.RWMutex
}
var cacheContextKey = struct{}{}
func WithCacheContext(ctx context.Context) context.Context {
return context.WithValue(ctx, cacheContextKey, &cacheContext{
ctx: ctx,
data: make(map[any]map[any]any),
})
}
```
Then you can use the below 4 methods to read/write/del the data within
the same context.
```go
func GetContextData(ctx context.Context, tp, key any) any
func SetContextData(ctx context.Context, tp, key, value any)
func RemoveContextData(ctx context.Context, tp, key any)
func GetWithContextCache[T any](ctx context.Context, cacheGroupKey string, cacheTargetID any, f func() (T, error)) (T, error)
```
Then let's take a look at how `system.GetString` implement it.
```go
func GetSetting(ctx context.Context, key string) (string, error) {
return cache.GetWithContextCache(ctx, contextCacheKey, key, func() (string, error) {
return cache.GetString(genSettingCacheKey(key), func() (string, error) {
res, err := GetSettingNoCache(ctx, key)
if err != nil {
return "", err
}
return res.SettingValue, nil
})
})
}
```
First, it will check if context data include the setting object with the
key. If not, it will query from the global cache which may be memory or
a Redis cache. If not, it will get the object from the database. In the
end, if the object gets from the global cache or database, it will be
set into the context cache.
An object stored in the context cache will only be destroyed after the
context disappeared.
2023-02-15 21:37:34 +08:00
|
|
|
"DisableGravatar": func(ctx context.Context) bool {
|
2023-02-25 05:46:11 +08:00
|
|
|
return system_model.GetSettingWithCacheBool(ctx, system_model.KeyPictureDisableGravatar)
|
2016-03-07 05:40:04 +08:00
|
|
|
},
|
2019-05-08 16:41:35 +08:00
|
|
|
"DefaultShowFullName": func() bool {
|
|
|
|
return setting.UI.DefaultShowFullName
|
|
|
|
},
|
2016-09-01 13:01:32 +08:00
|
|
|
"ShowFooterTemplateLoadTime": func() bool {
|
|
|
|
return setting.ShowFooterTemplateLoadTime
|
|
|
|
},
|
2016-03-07 05:40:04 +08:00
|
|
|
"LoadTimes": func(startTime time.Time) string {
|
|
|
|
return fmt.Sprint(time.Since(startTime).Nanoseconds()/1e6) + "ms"
|
|
|
|
},
|
2019-12-28 07:43:56 +08:00
|
|
|
"AllowedReactions": func() []string {
|
|
|
|
return setting.UI.Reactions
|
|
|
|
},
|
2021-06-29 22:28:38 +08:00
|
|
|
"CustomEmojis": func() map[string]string {
|
|
|
|
return setting.UI.CustomEmojisMap
|
|
|
|
},
|
2022-06-12 20:08:23 +08:00
|
|
|
"Safe": Safe,
|
|
|
|
"SafeJS": SafeJS,
|
|
|
|
"JSEscape": JSEscape,
|
|
|
|
"Str2html": Str2html,
|
|
|
|
"TimeSince": timeutil.TimeSince,
|
|
|
|
"TimeSinceUnix": timeutil.TimeSinceUnix,
|
|
|
|
"FileSize": base.FileSize,
|
|
|
|
"PrettyNumber": base.PrettyNumber,
|
|
|
|
"JsPrettyNumber": JsPrettyNumber,
|
|
|
|
"Subtract": base.Subtract,
|
|
|
|
"EntryIcon": base.EntryIcon,
|
|
|
|
"MigrationIcon": MigrationIcon,
|
2020-08-06 16:04:08 +08:00
|
|
|
"Add": func(a ...int) int {
|
|
|
|
sum := 0
|
|
|
|
for _, val := range a {
|
|
|
|
sum += val
|
|
|
|
}
|
|
|
|
return sum
|
|
|
|
},
|
|
|
|
"Mul": func(a ...int) int {
|
|
|
|
sum := 1
|
|
|
|
for _, val := range a {
|
|
|
|
sum *= val
|
|
|
|
}
|
|
|
|
return sum
|
2016-03-07 05:40:04 +08:00
|
|
|
},
|
|
|
|
"ActionIcon": ActionIcon,
|
|
|
|
"DateFmtLong": func(t time.Time) string {
|
|
|
|
return t.Format(time.RFC1123Z)
|
|
|
|
},
|
|
|
|
"DateFmtShort": func(t time.Time) string {
|
|
|
|
return t.Format("Jan 02, 2006")
|
|
|
|
},
|
2020-09-16 12:07:18 +08:00
|
|
|
"CountFmt": base.FormatNumberSI,
|
2016-03-07 05:40:04 +08:00
|
|
|
"SubStr": func(str string, start, length int) string {
|
|
|
|
if len(str) == 0 {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
end := start + length
|
|
|
|
if length == -1 {
|
|
|
|
end = len(str)
|
|
|
|
}
|
|
|
|
if len(str) < end {
|
|
|
|
return str
|
|
|
|
}
|
|
|
|
return str[start:end]
|
|
|
|
},
|
2021-11-17 02:18:25 +08:00
|
|
|
"EllipsisString": base.EllipsisString,
|
|
|
|
"DiffTypeToStr": DiffTypeToStr,
|
|
|
|
"DiffLineTypeToStr": DiffLineTypeToStr,
|
|
|
|
"ShortSha": base.ShortSha,
|
|
|
|
"ActionContent2Commits": ActionContent2Commits,
|
|
|
|
"PathEscape": url.PathEscape,
|
2019-09-10 17:03:30 +08:00
|
|
|
"PathEscapeSegments": util.PathEscapeSegments,
|
|
|
|
"URLJoin": util.URLJoin,
|
|
|
|
"RenderCommitMessage": RenderCommitMessage,
|
|
|
|
"RenderCommitMessageLink": RenderCommitMessageLink,
|
|
|
|
"RenderCommitMessageLinkSubject": RenderCommitMessageLinkSubject,
|
|
|
|
"RenderCommitBody": RenderCommitBody,
|
2022-10-16 02:24:41 +08:00
|
|
|
"RenderCodeBlock": RenderCodeBlock,
|
2020-12-03 18:50:47 +08:00
|
|
|
"RenderIssueTitle": RenderIssueTitle,
|
2020-04-29 02:05:39 +08:00
|
|
|
"RenderEmoji": RenderEmoji,
|
|
|
|
"RenderEmojiPlain": emoji.ReplaceAliases,
|
|
|
|
"ReactionToEmoji": ReactionToEmoji,
|
2019-09-10 17:03:30 +08:00
|
|
|
"RenderNote": RenderNote,
|
2023-02-24 21:17:03 +08:00
|
|
|
"RenderMarkdownToHtml": func(ctx context.Context, input string) template.HTML {
|
2022-03-30 16:42:47 +08:00
|
|
|
output, err := markdown.RenderString(&markup.RenderContext{
|
2023-02-24 21:17:03 +08:00
|
|
|
Ctx: ctx,
|
2022-03-30 16:42:47 +08:00
|
|
|
URLPrefix: setting.AppSubURL,
|
|
|
|
}, input)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("RenderString: %v", err)
|
|
|
|
}
|
|
|
|
return template.HTML(output)
|
|
|
|
},
|
|
|
|
"IsMultilineCommitMessage": IsMultilineCommitMessage,
|
2016-03-07 05:40:04 +08:00
|
|
|
"ThemeColorMetaTag": func() string {
|
2016-07-24 00:23:54 +08:00
|
|
|
return setting.UI.ThemeColorMetaTag
|
2016-03-07 05:40:04 +08:00
|
|
|
},
|
2017-04-01 09:03:01 +08:00
|
|
|
"MetaAuthor": func() string {
|
|
|
|
return setting.UI.Meta.Author
|
|
|
|
},
|
|
|
|
"MetaDescription": func() string {
|
|
|
|
return setting.UI.Meta.Description
|
|
|
|
},
|
|
|
|
"MetaKeywords": func() string {
|
|
|
|
return setting.UI.Meta.Keywords
|
|
|
|
},
|
2019-11-22 04:06:23 +08:00
|
|
|
"UseServiceWorker": func() bool {
|
|
|
|
return setting.UI.UseServiceWorker
|
|
|
|
},
|
2021-02-20 07:06:56 +08:00
|
|
|
"EnableTimetracking": func() bool {
|
|
|
|
return setting.Service.EnableTimetracking
|
|
|
|
},
|
2016-08-12 07:16:36 +08:00
|
|
|
"FilenameIsImage": func(filename string) bool {
|
|
|
|
mimeType := mime.TypeByExtension(filepath.Ext(filename))
|
|
|
|
return strings.HasPrefix(mimeType, "image/")
|
|
|
|
},
|
2020-07-03 01:33:13 +08:00
|
|
|
"TabSizeClass": func(ec interface{}, filename string) string {
|
|
|
|
var (
|
|
|
|
value *editorconfig.Editorconfig
|
|
|
|
ok bool
|
|
|
|
)
|
2016-08-12 08:07:09 +08:00
|
|
|
if ec != nil {
|
2020-07-03 01:33:13 +08:00
|
|
|
if value, ok = ec.(*editorconfig.Editorconfig); !ok || value == nil {
|
|
|
|
return "tab-size-8"
|
|
|
|
}
|
|
|
|
def, err := value.GetDefinitionForFilename(filename)
|
2019-10-16 05:24:16 +08:00
|
|
|
if err != nil {
|
|
|
|
log.Error("tab size class: getting definition for filename: %v", err)
|
|
|
|
return "tab-size-8"
|
|
|
|
}
|
2016-08-12 08:07:09 +08:00
|
|
|
if def.TabWidth > 0 {
|
|
|
|
return fmt.Sprintf("tab-size-%d", def.TabWidth)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return "tab-size-8"
|
|
|
|
},
|
2016-12-29 00:35:52 +08:00
|
|
|
"SubJumpablePath": func(str string) []string {
|
|
|
|
var path []string
|
|
|
|
index := strings.LastIndex(str, "/")
|
|
|
|
if index != -1 && index != len(str) {
|
2019-05-28 23:45:54 +08:00
|
|
|
path = append(path, str[0:index+1], str[index+1:])
|
2016-12-29 00:35:52 +08:00
|
|
|
} else {
|
|
|
|
path = append(path, str)
|
|
|
|
}
|
|
|
|
return path
|
|
|
|
},
|
2022-01-21 01:46:10 +08:00
|
|
|
"DiffStatsWidth": func(adds, dels int) string {
|
2020-11-16 07:50:06 +08:00
|
|
|
return fmt.Sprintf("%f", float64(adds)/(float64(adds)+float64(dels))*100)
|
|
|
|
},
|
2020-01-20 18:07:30 +08:00
|
|
|
"Json": func(in interface{}) string {
|
2021-07-25 00:03:58 +08:00
|
|
|
out, err := json.Marshal(in)
|
2020-01-20 18:07:30 +08:00
|
|
|
if err != nil {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
return string(out)
|
|
|
|
},
|
2017-03-02 08:25:44 +08:00
|
|
|
"JsonPrettyPrint": func(in string) string {
|
|
|
|
var out bytes.Buffer
|
|
|
|
err := json.Indent(&out, []byte(in), "", " ")
|
|
|
|
if err != nil {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
return out.String()
|
|
|
|
},
|
2017-09-12 17:25:42 +08:00
|
|
|
"DisableGitHooks": func() bool {
|
|
|
|
return setting.DisableGitHooks
|
|
|
|
},
|
2021-02-12 01:34:34 +08:00
|
|
|
"DisableWebhooks": func() bool {
|
|
|
|
return setting.DisableWebhooks
|
|
|
|
},
|
2018-08-24 13:00:22 +08:00
|
|
|
"DisableImportLocal": func() bool {
|
|
|
|
return !setting.ImportLocalPaths
|
|
|
|
},
|
2017-12-04 07:14:26 +08:00
|
|
|
"Dict": func(values ...interface{}) (map[string]interface{}, error) {
|
|
|
|
if len(values)%2 != 0 {
|
|
|
|
return nil, errors.New("invalid dict call")
|
|
|
|
}
|
|
|
|
dict := make(map[string]interface{}, len(values)/2)
|
|
|
|
for i := 0; i < len(values); i += 2 {
|
|
|
|
key, ok := values[i].(string)
|
|
|
|
if !ok {
|
|
|
|
return nil, errors.New("dict keys must be strings")
|
|
|
|
}
|
|
|
|
dict[key] = values[i+1]
|
|
|
|
}
|
|
|
|
return dict, nil
|
|
|
|
},
|
2018-04-29 13:58:47 +08:00
|
|
|
"Printf": fmt.Sprintf,
|
|
|
|
"Escape": Escape,
|
2022-02-16 00:50:10 +08:00
|
|
|
"Sec2Time": util.SecToTime,
|
2018-05-02 03:05:28 +08:00
|
|
|
"ParseDeadline": func(deadline string) []string {
|
|
|
|
return strings.Split(deadline, "|")
|
|
|
|
},
|
2018-07-06 05:25:04 +08:00
|
|
|
"DefaultTheme": func() string {
|
|
|
|
return setting.UI.DefaultTheme
|
|
|
|
},
|
2020-11-25 19:20:40 +08:00
|
|
|
// pass key-value pairs to a partial template which receives them as a dict
|
2018-08-06 12:43:22 +08:00
|
|
|
"dict": func(values ...interface{}) (map[string]interface{}, error) {
|
|
|
|
if len(values) == 0 {
|
|
|
|
return nil, errors.New("invalid dict call")
|
|
|
|
}
|
|
|
|
|
|
|
|
dict := make(map[string]interface{})
|
2020-11-25 19:20:40 +08:00
|
|
|
return util.MergeInto(dict, values...)
|
|
|
|
},
|
|
|
|
/* like dict but merge key-value pairs into the first dict and return it */
|
|
|
|
"mergeinto": func(root map[string]interface{}, values ...interface{}) (map[string]interface{}, error) {
|
|
|
|
if len(values) == 0 {
|
|
|
|
return nil, errors.New("invalid mergeinto call")
|
|
|
|
}
|
2018-08-06 12:43:22 +08:00
|
|
|
|
2020-11-25 19:20:40 +08:00
|
|
|
dict := make(map[string]interface{})
|
|
|
|
for key, value := range root {
|
|
|
|
dict[key] = value
|
2018-08-06 12:43:22 +08:00
|
|
|
}
|
2020-11-25 19:20:40 +08:00
|
|
|
|
|
|
|
return util.MergeInto(dict, values...)
|
2018-08-06 12:43:22 +08:00
|
|
|
},
|
2019-05-06 00:25:25 +08:00
|
|
|
"percentage": func(n int, values ...int) float32 {
|
2022-01-21 01:46:10 +08:00
|
|
|
sum := 0
|
2019-05-06 00:25:25 +08:00
|
|
|
for i := 0; i < len(values); i++ {
|
|
|
|
sum += values[i]
|
|
|
|
}
|
|
|
|
return float32(n) * 100 / float32(sum)
|
|
|
|
},
|
2021-06-15 01:20:43 +08:00
|
|
|
"CommentMustAsDiff": gitdiff.CommentMustAsDiff,
|
|
|
|
"MirrorRemoteAddress": mirrorRemoteAddress,
|
2020-07-03 17:55:36 +08:00
|
|
|
"NotificationSettings": func() map[string]interface{} {
|
|
|
|
return map[string]interface{}{
|
2020-05-08 05:49:00 +08:00
|
|
|
"MinTimeout": int(setting.UI.Notification.MinTimeout / time.Millisecond),
|
|
|
|
"TimeoutStep": int(setting.UI.Notification.TimeoutStep / time.Millisecond),
|
|
|
|
"MaxTimeout": int(setting.UI.Notification.MaxTimeout / time.Millisecond),
|
|
|
|
"EventSourceUpdateTime": int(setting.UI.Notification.EventSourceUpdateTime / time.Millisecond),
|
2020-04-24 11:57:38 +08:00
|
|
|
}
|
|
|
|
},
|
2022-01-21 01:46:10 +08:00
|
|
|
"containGeneric": func(arr, v interface{}) bool {
|
2020-11-09 01:21:54 +08:00
|
|
|
arrV := reflect.ValueOf(arr)
|
|
|
|
if arrV.Kind() == reflect.String && reflect.ValueOf(v).Kind() == reflect.String {
|
|
|
|
return strings.Contains(arr.(string), v.(string))
|
|
|
|
}
|
|
|
|
|
|
|
|
if arrV.Kind() == reflect.Slice {
|
|
|
|
for i := 0; i < arrV.Len(); i++ {
|
|
|
|
iV := arrV.Index(i)
|
|
|
|
if !iV.CanInterface() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if iV.Interface() == v {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
},
|
2019-12-28 22:43:46 +08:00
|
|
|
"contain": func(s []int64, id int64) bool {
|
|
|
|
for i := 0; i < len(s); i++ {
|
|
|
|
if s[i] == id {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
},
|
2022-11-08 23:13:58 +08:00
|
|
|
"svg": svg.RenderHTML,
|
2020-12-09 13:11:15 +08:00
|
|
|
"avatar": Avatar,
|
|
|
|
"avatarHTML": AvatarHTML,
|
|
|
|
"avatarByAction": AvatarByAction,
|
|
|
|
"avatarByEmail": AvatarByEmail,
|
|
|
|
"repoAvatar": RepoAvatar,
|
2020-06-25 06:23:05 +08:00
|
|
|
"SortArrow": func(normSort, revSort, urlSort string, isDefault bool) template.HTML {
|
|
|
|
// if needed
|
|
|
|
if len(normSort) == 0 || len(urlSort) == 0 {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(urlSort) == 0 && isDefault {
|
|
|
|
// if sort is sorted as default add arrow tho this table header
|
|
|
|
if isDefault {
|
2022-11-08 23:13:58 +08:00
|
|
|
return svg.RenderHTML("octicon-triangle-down", 16)
|
2020-06-25 06:23:05 +08:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// if sort arg is in url test if it correlates with column header sort arguments
|
2021-10-13 02:11:35 +08:00
|
|
|
// the direction of the arrow should indicate the "current sort order", up means ASC(normal), down means DESC(rev)
|
2020-06-25 06:23:05 +08:00
|
|
|
if urlSort == normSort {
|
|
|
|
// the table is sorted with this header normal
|
2022-11-08 23:13:58 +08:00
|
|
|
return svg.RenderHTML("octicon-triangle-up", 16)
|
2020-06-25 06:23:05 +08:00
|
|
|
} else if urlSort == revSort {
|
|
|
|
// the table is sorted with this header reverse
|
2022-11-08 23:13:58 +08:00
|
|
|
return svg.RenderHTML("octicon-triangle-down", 16)
|
2020-06-25 06:23:05 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
// the table is NOT sorted with this header
|
|
|
|
return ""
|
2020-02-12 01:02:41 +08:00
|
|
|
},
|
Scoped labels (#22585)
Add a new "exclusive" option per label. This makes it so that when the
label is named `scope/name`, no other label with the same `scope/`
prefix can be set on an issue.
The scope is determined by the last occurence of `/`, so for example
`scope/alpha/name` and `scope/beta/name` are considered to be in
different scopes and can coexist.
Exclusive scopes are not enforced by any database rules, however they
are enforced when editing labels at the models level, automatically
removing any existing labels in the same scope when either attaching a
new label or replacing all labels.
In menus use a circle instead of checkbox to indicate they function as
radio buttons per scope. Issue filtering by label ensures that only a
single scoped label is selected at a time. Clicking with alt key can be
used to remove a scoped label, both when editing individual issues and
batch editing.
Label rendering refactor for consistency and code simplification:
* Labels now consistently have the same shape, emojis and tooltips
everywhere. This includes the label list and label assignment menus.
* In label list, show description below label same as label menus.
* Don't use exactly black/white text colors to look a bit nicer.
* Simplify text color computation. There is no point computing luminance
in linear color space, as this is a perceptual problem and sRGB is
closer to perceptually linear.
* Increase height of label assignment menus to show more labels. Showing
only 3-4 labels at a time leads to a lot of scrolling.
* Render all labels with a new RenderLabel template helper function.
Label creation and editing in multiline modal menu:
* Change label creation to open a modal menu like label editing.
* Change menu layout to place name, description and colors on separate
lines.
* Don't color cancel button red in label editing modal menu.
* Align text to the left in model menu for better readability and
consistent with settings layout elsewhere.
Custom exclusive scoped label rendering:
* Display scoped label prefix and suffix with slightly darker and
lighter background color respectively, and a slanted edge between them
similar to the `/` symbol.
* In menus exclusive labels are grouped with a divider line.
---------
Co-authored-by: Yarden Shoham <hrsi88@gmail.com>
Co-authored-by: Lauris BH <lauris@nix.lv>
2023-02-19 03:17:39 +08:00
|
|
|
"RenderLabel": func(label *issues_model.Label) template.HTML {
|
|
|
|
return template.HTML(RenderLabel(label))
|
|
|
|
},
|
2022-09-13 01:45:14 +08:00
|
|
|
"RenderLabels": func(labels []*issues_model.Label, repoLink string) template.HTML {
|
2022-09-16 20:44:00 +08:00
|
|
|
htmlCode := `<span class="labels-list">`
|
2020-10-26 05:49:48 +08:00
|
|
|
for _, label := range labels {
|
2021-02-10 10:50:44 +08:00
|
|
|
// Protect against nil value in labels - shouldn't happen but would cause a panic if so
|
|
|
|
if label == nil {
|
|
|
|
continue
|
|
|
|
}
|
Scoped labels (#22585)
Add a new "exclusive" option per label. This makes it so that when the
label is named `scope/name`, no other label with the same `scope/`
prefix can be set on an issue.
The scope is determined by the last occurence of `/`, so for example
`scope/alpha/name` and `scope/beta/name` are considered to be in
different scopes and can coexist.
Exclusive scopes are not enforced by any database rules, however they
are enforced when editing labels at the models level, automatically
removing any existing labels in the same scope when either attaching a
new label or replacing all labels.
In menus use a circle instead of checkbox to indicate they function as
radio buttons per scope. Issue filtering by label ensures that only a
single scoped label is selected at a time. Clicking with alt key can be
used to remove a scoped label, both when editing individual issues and
batch editing.
Label rendering refactor for consistency and code simplification:
* Labels now consistently have the same shape, emojis and tooltips
everywhere. This includes the label list and label assignment menus.
* In label list, show description below label same as label menus.
* Don't use exactly black/white text colors to look a bit nicer.
* Simplify text color computation. There is no point computing luminance
in linear color space, as this is a perceptual problem and sRGB is
closer to perceptually linear.
* Increase height of label assignment menus to show more labels. Showing
only 3-4 labels at a time leads to a lot of scrolling.
* Render all labels with a new RenderLabel template helper function.
Label creation and editing in multiline modal menu:
* Change label creation to open a modal menu like label editing.
* Change menu layout to place name, description and colors on separate
lines.
* Don't color cancel button red in label editing modal menu.
* Align text to the left in model menu for better readability and
consistent with settings layout elsewhere.
Custom exclusive scoped label rendering:
* Display scoped label prefix and suffix with slightly darker and
lighter background color respectively, and a slanted edge between them
similar to the `/` symbol.
* In menus exclusive labels are grouped with a divider line.
---------
Co-authored-by: Yarden Shoham <hrsi88@gmail.com>
Co-authored-by: Lauris BH <lauris@nix.lv>
2023-02-19 03:17:39 +08:00
|
|
|
htmlCode += fmt.Sprintf("<a href='%s/issues?labels=%d'>%s</a> ",
|
|
|
|
repoLink, label.ID, RenderLabel(label))
|
2020-10-26 05:49:48 +08:00
|
|
|
}
|
2022-09-16 20:44:00 +08:00
|
|
|
htmlCode += "</span>"
|
|
|
|
return template.HTML(htmlCode)
|
2020-10-26 05:49:48 +08:00
|
|
|
},
|
2021-07-24 12:21:51 +08:00
|
|
|
"MermaidMaxSourceCharacters": func() int {
|
|
|
|
return setting.MermaidMaxSourceCharacters
|
|
|
|
},
|
2021-12-14 16:37:11 +08:00
|
|
|
"Join": strings.Join,
|
2021-11-02 23:00:30 +08:00
|
|
|
"QueryEscape": url.QueryEscape,
|
2022-03-24 00:08:27 +08:00
|
|
|
"DotEscape": DotEscape,
|
2022-06-08 16:59:16 +08:00
|
|
|
"Iterate": func(arg interface{}) (items []uint64) {
|
|
|
|
count := uint64(0)
|
|
|
|
switch val := arg.(type) {
|
|
|
|
case uint64:
|
|
|
|
count = val
|
|
|
|
case *uint64:
|
|
|
|
count = *val
|
|
|
|
case int64:
|
|
|
|
if val < 0 {
|
|
|
|
val = 0
|
|
|
|
}
|
|
|
|
count = uint64(val)
|
|
|
|
case *int64:
|
|
|
|
if *val < 0 {
|
|
|
|
*val = 0
|
|
|
|
}
|
|
|
|
count = uint64(*val)
|
|
|
|
case int:
|
|
|
|
if val < 0 {
|
|
|
|
val = 0
|
|
|
|
}
|
|
|
|
count = uint64(val)
|
|
|
|
case *int:
|
|
|
|
if *val < 0 {
|
|
|
|
*val = 0
|
|
|
|
}
|
|
|
|
count = uint64(*val)
|
|
|
|
case uint:
|
|
|
|
count = uint64(val)
|
|
|
|
case *uint:
|
|
|
|
count = uint64(*val)
|
|
|
|
case int32:
|
|
|
|
if val < 0 {
|
|
|
|
val = 0
|
|
|
|
}
|
|
|
|
count = uint64(val)
|
|
|
|
case *int32:
|
|
|
|
if *val < 0 {
|
|
|
|
*val = 0
|
|
|
|
}
|
|
|
|
count = uint64(*val)
|
|
|
|
case uint32:
|
|
|
|
count = uint64(val)
|
|
|
|
case *uint32:
|
|
|
|
count = uint64(*val)
|
|
|
|
case string:
|
|
|
|
cnt, _ := strconv.ParseInt(val, 10, 64)
|
|
|
|
if cnt < 0 {
|
|
|
|
cnt = 0
|
|
|
|
}
|
|
|
|
count = uint64(cnt)
|
|
|
|
}
|
|
|
|
if count <= 0 {
|
|
|
|
return items
|
|
|
|
}
|
|
|
|
for i := uint64(0); i < count; i++ {
|
|
|
|
items = append(items, i)
|
|
|
|
}
|
|
|
|
return items
|
|
|
|
},
|
2022-08-20 22:47:04 +08:00
|
|
|
"HasPrefix": strings.HasPrefix,
|
2022-10-21 16:39:26 +08:00
|
|
|
"CompareLink": func(baseRepo, repo *repo_model.Repository, branchName string) string {
|
|
|
|
var curBranch string
|
|
|
|
if repo.ID != baseRepo.ID {
|
|
|
|
curBranch += fmt.Sprintf("%s/%s:", url.PathEscape(repo.OwnerName), url.PathEscape(repo.Name))
|
|
|
|
}
|
|
|
|
curBranch += util.PathEscapeSegments(branchName)
|
|
|
|
|
|
|
|
return fmt.Sprintf("%s/compare/%s...%s",
|
|
|
|
baseRepo.Link(),
|
|
|
|
util.PathEscapeSegments(baseRepo.DefaultBranch),
|
|
|
|
curBranch,
|
|
|
|
)
|
|
|
|
},
|
Implement actions (#21937)
Close #13539.
Co-authored by: @lunny @appleboy @fuxiaohei and others.
Related projects:
- https://gitea.com/gitea/actions-proto-def
- https://gitea.com/gitea/actions-proto-go
- https://gitea.com/gitea/act
- https://gitea.com/gitea/act_runner
### Summary
The target of this PR is to bring a basic implementation of "Actions",
an internal CI/CD system of Gitea. That means even though it has been
merged, the state of the feature is **EXPERIMENTAL**, and please note
that:
- It is disabled by default;
- It shouldn't be used in a production environment currently;
- It shouldn't be used in a public Gitea instance currently;
- Breaking changes may be made before it's stable.
**Please comment on #13539 if you have any different product design
ideas**, all decisions reached there will be adopted here. But in this
PR, we don't talk about **naming, feature-creep or alternatives**.
### ⚠️ Breaking
`gitea-actions` will become a reserved user name. If a user with the
name already exists in the database, it is recommended to rename it.
### Some important reviews
- What is `DEFAULT_ACTIONS_URL` in `app.ini` for?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1055954954
- Why the api for runners is not under the normal `/api/v1` prefix?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061173592
- Why DBFS?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1061301178
- Why ignore events triggered by `gitea-actions` bot?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1063254103
- Why there's no permission control for actions?
- https://github.com/go-gitea/gitea/pull/21937#discussion_r1090229868
### What it looks like
<details>
#### Manage runners
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205870657-c72f590e-2e08-4cd4-be7f-2e0abb299bbf.png">
#### List runs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872794-50fde990-2b45-48c1-a178-908e4ec5b627.png">
#### View logs
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205872501-9b7b9000-9542-4991-8f55-18ccdada77c3.png">
</details>
### How to try it
<details>
#### 1. Start Gitea
Clone this branch and [install from
source](https://docs.gitea.io/en-us/install-from-source).
Add additional configurations in `app.ini` to enable Actions:
```ini
[actions]
ENABLED = true
```
Start it.
If all is well, you'll see the management page of runners:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205877365-8e30a780-9b10-4154-b3e8-ee6c3cb35a59.png">
#### 2. Start runner
Clone the [act_runner](https://gitea.com/gitea/act_runner), and follow
the
[README](https://gitea.com/gitea/act_runner/src/branch/main/README.md)
to start it.
If all is well, you'll see a new runner has been added:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205878000-216f5937-e696-470d-b66c-8473987d91c3.png">
#### 3. Enable actions for a repo
Create a new repo or open an existing one, check the `Actions` checkbox
in settings and submit.
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879705-53e09208-73c0-4b3e-a123-2dcf9aba4b9c.png">
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205879383-23f3d08f-1a85-41dd-a8b3-54e2ee6453e8.png">
If all is well, you'll see a new tab "Actions":
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205881648-a8072d8c-5803-4d76-b8a8-9b2fb49516c1.png">
#### 4. Upload workflow files
Upload some workflow files to `.gitea/workflows/xxx.yaml`, you can
follow the [quickstart](https://docs.github.com/en/actions/quickstart)
of GitHub Actions. Yes, Gitea Actions is compatible with GitHub Actions
in most cases, you can use the same demo:
```yaml
name: GitHub Actions Demo
run-name: ${{ github.actor }} is testing out GitHub Actions 🚀
on: [push]
jobs:
Explore-GitHub-Actions:
runs-on: ubuntu-latest
steps:
- run: echo "🎉 The job was automatically triggered by a ${{ github.event_name }} event."
- run: echo "🐧 This job is now running on a ${{ runner.os }} server hosted by GitHub!"
- run: echo "🔎 The name of your branch is ${{ github.ref }} and your repository is ${{ github.repository }}."
- name: Check out repository code
uses: actions/checkout@v3
- run: echo "💡 The ${{ github.repository }} repository has been cloned to the runner."
- run: echo "🖥️ The workflow is now ready to test your code on the runner."
- name: List files in the repository
run: |
ls ${{ github.workspace }}
- run: echo "🍏 This job's status is ${{ job.status }}."
```
If all is well, you'll see a new run in `Actions` tab:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884473-79a874bc-171b-4aaf-acd5-0241a45c3b53.png">
#### 5. Check the logs of jobs
Click a run and you'll see the logs:
<img width="1792" alt="image"
src="https://user-images.githubusercontent.com/9418365/205884800-994b0374-67f7-48ff-be9a-4c53f3141547.png">
#### 6. Go on
You can try more examples in [the
documents](https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions)
of GitHub Actions, then you might find a lot of bugs.
Come on, PRs are welcome.
</details>
See also: [Feature Preview: Gitea
Actions](https://blog.gitea.io/2022/12/feature-preview-gitea-actions/)
---------
Co-authored-by: a1012112796 <1012112796@qq.com>
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: delvh <dev.lh@web.de>
Co-authored-by: ChristopherHX <christopher.homberger@web.de>
Co-authored-by: John Olheiser <john.olheiser@gmail.com>
2023-01-31 09:45:19 +08:00
|
|
|
"RefShortName": func(ref string) string {
|
|
|
|
return git.RefName(ref).ShortName()
|
|
|
|
},
|
2016-03-07 05:40:04 +08:00
|
|
|
}}
|
2015-11-14 11:45:33 +08:00
|
|
|
}
|
|
|
|
|
2019-11-07 21:34:28 +08:00
|
|
|
// NewTextFuncMap returns functions for injecting to text templates
|
|
|
|
// It's a subset of those used for HTML and other templates
|
|
|
|
func NewTextFuncMap() []texttmpl.FuncMap {
|
|
|
|
return []texttmpl.FuncMap{map[string]interface{}{
|
|
|
|
"GoVer": func() string {
|
2022-05-11 05:55:54 +08:00
|
|
|
return util.ToTitleCase(runtime.Version())
|
2019-11-07 21:34:28 +08:00
|
|
|
},
|
|
|
|
"AppName": func() string {
|
|
|
|
return setting.AppName
|
|
|
|
},
|
|
|
|
"AppSubUrl": func() string {
|
|
|
|
return setting.AppSubURL
|
|
|
|
},
|
|
|
|
"AppUrl": func() string {
|
|
|
|
return setting.AppURL
|
|
|
|
},
|
|
|
|
"AppVer": func() string {
|
|
|
|
return setting.AppVer
|
|
|
|
},
|
|
|
|
"AppBuiltWith": func() string {
|
|
|
|
return setting.AppBuiltWith
|
|
|
|
},
|
|
|
|
"AppDomain": func() string {
|
|
|
|
return setting.Domain
|
|
|
|
},
|
|
|
|
"TimeSince": timeutil.TimeSince,
|
|
|
|
"TimeSinceUnix": timeutil.TimeSinceUnix,
|
|
|
|
"DateFmtLong": func(t time.Time) string {
|
|
|
|
return t.Format(time.RFC1123Z)
|
|
|
|
},
|
|
|
|
"DateFmtShort": func(t time.Time) string {
|
|
|
|
return t.Format("Jan 02, 2006")
|
|
|
|
},
|
|
|
|
"SubStr": func(str string, start, length int) string {
|
|
|
|
if len(str) == 0 {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
end := start + length
|
|
|
|
if length == -1 {
|
|
|
|
end = len(str)
|
|
|
|
}
|
|
|
|
if len(str) < end {
|
|
|
|
return str
|
|
|
|
}
|
|
|
|
return str[start:end]
|
|
|
|
},
|
|
|
|
"EllipsisString": base.EllipsisString,
|
|
|
|
"URLJoin": util.URLJoin,
|
|
|
|
"Dict": func(values ...interface{}) (map[string]interface{}, error) {
|
|
|
|
if len(values)%2 != 0 {
|
|
|
|
return nil, errors.New("invalid dict call")
|
|
|
|
}
|
|
|
|
dict := make(map[string]interface{}, len(values)/2)
|
|
|
|
for i := 0; i < len(values); i += 2 {
|
|
|
|
key, ok := values[i].(string)
|
|
|
|
if !ok {
|
|
|
|
return nil, errors.New("dict keys must be strings")
|
|
|
|
}
|
|
|
|
dict[key] = values[i+1]
|
|
|
|
}
|
|
|
|
return dict, nil
|
|
|
|
},
|
|
|
|
"Printf": fmt.Sprintf,
|
|
|
|
"Escape": Escape,
|
2022-02-16 00:50:10 +08:00
|
|
|
"Sec2Time": util.SecToTime,
|
2019-11-07 21:34:28 +08:00
|
|
|
"ParseDeadline": func(deadline string) []string {
|
|
|
|
return strings.Split(deadline, "|")
|
|
|
|
},
|
|
|
|
"dict": func(values ...interface{}) (map[string]interface{}, error) {
|
|
|
|
if len(values) == 0 {
|
|
|
|
return nil, errors.New("invalid dict call")
|
|
|
|
}
|
|
|
|
|
|
|
|
dict := make(map[string]interface{})
|
|
|
|
|
|
|
|
for i := 0; i < len(values); i++ {
|
|
|
|
switch key := values[i].(type) {
|
|
|
|
case string:
|
|
|
|
i++
|
|
|
|
if i == len(values) {
|
|
|
|
return nil, errors.New("specify the key for non array values")
|
|
|
|
}
|
|
|
|
dict[key] = values[i]
|
|
|
|
case map[string]interface{}:
|
|
|
|
m := values[i].(map[string]interface{})
|
|
|
|
for i, v := range m {
|
|
|
|
dict[i] = v
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return nil, errors.New("dict values must be maps")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return dict, nil
|
|
|
|
},
|
|
|
|
"percentage": func(n int, values ...int) float32 {
|
2022-01-21 01:46:10 +08:00
|
|
|
sum := 0
|
2019-11-07 21:34:28 +08:00
|
|
|
for i := 0; i < len(values); i++ {
|
|
|
|
sum += values[i]
|
|
|
|
}
|
|
|
|
return float32(n) * 100 / float32(sum)
|
|
|
|
},
|
2020-08-06 16:04:08 +08:00
|
|
|
"Add": func(a ...int) int {
|
|
|
|
sum := 0
|
|
|
|
for _, val := range a {
|
|
|
|
sum += val
|
|
|
|
}
|
|
|
|
return sum
|
|
|
|
},
|
|
|
|
"Mul": func(a ...int) int {
|
|
|
|
sum := 1
|
|
|
|
for _, val := range a {
|
|
|
|
sum *= val
|
|
|
|
}
|
|
|
|
return sum
|
|
|
|
},
|
2021-11-02 14:26:13 +08:00
|
|
|
"QueryEscape": url.QueryEscape,
|
2019-11-07 21:34:28 +08:00
|
|
|
}}
|
|
|
|
}
|
|
|
|
|
2020-12-09 08:12:15 +08:00
|
|
|
// AvatarHTML creates the HTML for an avatar
|
2021-12-20 12:41:31 +08:00
|
|
|
func AvatarHTML(src string, size int, class, name string) template.HTML {
|
2020-12-04 02:46:11 +08:00
|
|
|
sizeStr := fmt.Sprintf(`%d`, size)
|
|
|
|
|
|
|
|
if name == "" {
|
|
|
|
name = "avatar"
|
2020-09-09 01:17:56 +08:00
|
|
|
}
|
|
|
|
|
2020-12-04 02:46:11 +08:00
|
|
|
return template.HTML(`<img class="` + class + `" src="` + src + `" title="` + html.EscapeString(name) + `" width="` + sizeStr + `" height="` + sizeStr + `"/>`)
|
|
|
|
}
|
|
|
|
|
2020-12-08 12:14:28 +08:00
|
|
|
// Avatar renders user avatars. args: user, size (int), class (string)
|
Add context cache as a request level cache (#22294)
To avoid duplicated load of the same data in an HTTP request, we can set
a context cache to do that. i.e. Some pages may load a user from a
database with the same id in different areas on the same page. But the
code is hidden in two different deep logic. How should we share the
user? As a result of this PR, now if both entry functions accept
`context.Context` as the first parameter and we just need to refactor
`GetUserByID` to reuse the user from the context cache. Then it will not
be loaded twice on an HTTP request.
But of course, sometimes we would like to reload an object from the
database, that's why `RemoveContextData` is also exposed.
The core context cache is here. It defines a new context
```go
type cacheContext struct {
ctx context.Context
data map[any]map[any]any
lock sync.RWMutex
}
var cacheContextKey = struct{}{}
func WithCacheContext(ctx context.Context) context.Context {
return context.WithValue(ctx, cacheContextKey, &cacheContext{
ctx: ctx,
data: make(map[any]map[any]any),
})
}
```
Then you can use the below 4 methods to read/write/del the data within
the same context.
```go
func GetContextData(ctx context.Context, tp, key any) any
func SetContextData(ctx context.Context, tp, key, value any)
func RemoveContextData(ctx context.Context, tp, key any)
func GetWithContextCache[T any](ctx context.Context, cacheGroupKey string, cacheTargetID any, f func() (T, error)) (T, error)
```
Then let's take a look at how `system.GetString` implement it.
```go
func GetSetting(ctx context.Context, key string) (string, error) {
return cache.GetWithContextCache(ctx, contextCacheKey, key, func() (string, error) {
return cache.GetString(genSettingCacheKey(key), func() (string, error) {
res, err := GetSettingNoCache(ctx, key)
if err != nil {
return "", err
}
return res.SettingValue, nil
})
})
}
```
First, it will check if context data include the setting object with the
key. If not, it will query from the global cache which may be memory or
a Redis cache. If not, it will get the object from the database. In the
end, if the object gets from the global cache or database, it will be
set into the context cache.
An object stored in the context cache will only be destroyed after the
context disappeared.
2023-02-15 21:37:34 +08:00
|
|
|
func Avatar(ctx context.Context, item interface{}, others ...interface{}) template.HTML {
|
2022-11-24 05:57:37 +08:00
|
|
|
size, class := gitea_html.ParseSizeAndClass(avatars.DefaultAvatarPixelSize, avatars.DefaultAvatarClass, others...)
|
2020-12-04 02:46:11 +08:00
|
|
|
|
2021-11-24 11:51:08 +08:00
|
|
|
switch t := item.(type) {
|
2021-11-24 17:49:20 +08:00
|
|
|
case *user_model.User:
|
Add context cache as a request level cache (#22294)
To avoid duplicated load of the same data in an HTTP request, we can set
a context cache to do that. i.e. Some pages may load a user from a
database with the same id in different areas on the same page. But the
code is hidden in two different deep logic. How should we share the
user? As a result of this PR, now if both entry functions accept
`context.Context` as the first parameter and we just need to refactor
`GetUserByID` to reuse the user from the context cache. Then it will not
be loaded twice on an HTTP request.
But of course, sometimes we would like to reload an object from the
database, that's why `RemoveContextData` is also exposed.
The core context cache is here. It defines a new context
```go
type cacheContext struct {
ctx context.Context
data map[any]map[any]any
lock sync.RWMutex
}
var cacheContextKey = struct{}{}
func WithCacheContext(ctx context.Context) context.Context {
return context.WithValue(ctx, cacheContextKey, &cacheContext{
ctx: ctx,
data: make(map[any]map[any]any),
})
}
```
Then you can use the below 4 methods to read/write/del the data within
the same context.
```go
func GetContextData(ctx context.Context, tp, key any) any
func SetContextData(ctx context.Context, tp, key, value any)
func RemoveContextData(ctx context.Context, tp, key any)
func GetWithContextCache[T any](ctx context.Context, cacheGroupKey string, cacheTargetID any, f func() (T, error)) (T, error)
```
Then let's take a look at how `system.GetString` implement it.
```go
func GetSetting(ctx context.Context, key string) (string, error) {
return cache.GetWithContextCache(ctx, contextCacheKey, key, func() (string, error) {
return cache.GetString(genSettingCacheKey(key), func() (string, error) {
res, err := GetSettingNoCache(ctx, key)
if err != nil {
return "", err
}
return res.SettingValue, nil
})
})
}
```
First, it will check if context data include the setting object with the
key. If not, it will query from the global cache which may be memory or
a Redis cache. If not, it will get the object from the database. In the
end, if the object gets from the global cache or database, it will be
set into the context cache.
An object stored in the context cache will only be destroyed after the
context disappeared.
2023-02-15 21:37:34 +08:00
|
|
|
src := t.AvatarLinkWithSize(ctx, size*setting.Avatar.RenderedSizeFactor)
|
2020-12-10 13:44:13 +08:00
|
|
|
if src != "" {
|
2021-11-24 11:51:08 +08:00
|
|
|
return AvatarHTML(src, size, class, t.DisplayName())
|
2020-12-10 13:44:13 +08:00
|
|
|
}
|
2022-05-11 18:09:36 +08:00
|
|
|
case *repo_model.Collaborator:
|
Add context cache as a request level cache (#22294)
To avoid duplicated load of the same data in an HTTP request, we can set
a context cache to do that. i.e. Some pages may load a user from a
database with the same id in different areas on the same page. But the
code is hidden in two different deep logic. How should we share the
user? As a result of this PR, now if both entry functions accept
`context.Context` as the first parameter and we just need to refactor
`GetUserByID` to reuse the user from the context cache. Then it will not
be loaded twice on an HTTP request.
But of course, sometimes we would like to reload an object from the
database, that's why `RemoveContextData` is also exposed.
The core context cache is here. It defines a new context
```go
type cacheContext struct {
ctx context.Context
data map[any]map[any]any
lock sync.RWMutex
}
var cacheContextKey = struct{}{}
func WithCacheContext(ctx context.Context) context.Context {
return context.WithValue(ctx, cacheContextKey, &cacheContext{
ctx: ctx,
data: make(map[any]map[any]any),
})
}
```
Then you can use the below 4 methods to read/write/del the data within
the same context.
```go
func GetContextData(ctx context.Context, tp, key any) any
func SetContextData(ctx context.Context, tp, key, value any)
func RemoveContextData(ctx context.Context, tp, key any)
func GetWithContextCache[T any](ctx context.Context, cacheGroupKey string, cacheTargetID any, f func() (T, error)) (T, error)
```
Then let's take a look at how `system.GetString` implement it.
```go
func GetSetting(ctx context.Context, key string) (string, error) {
return cache.GetWithContextCache(ctx, contextCacheKey, key, func() (string, error) {
return cache.GetString(genSettingCacheKey(key), func() (string, error) {
res, err := GetSettingNoCache(ctx, key)
if err != nil {
return "", err
}
return res.SettingValue, nil
})
})
}
```
First, it will check if context data include the setting object with the
key. If not, it will query from the global cache which may be memory or
a Redis cache. If not, it will get the object from the database. In the
end, if the object gets from the global cache or database, it will be
set into the context cache.
An object stored in the context cache will only be destroyed after the
context disappeared.
2023-02-15 21:37:34 +08:00
|
|
|
src := t.AvatarLinkWithSize(ctx, size*setting.Avatar.RenderedSizeFactor)
|
2021-11-24 11:51:08 +08:00
|
|
|
if src != "" {
|
|
|
|
return AvatarHTML(src, size, class, t.DisplayName())
|
|
|
|
}
|
2022-03-29 14:29:02 +08:00
|
|
|
case *organization.Organization:
|
Add context cache as a request level cache (#22294)
To avoid duplicated load of the same data in an HTTP request, we can set
a context cache to do that. i.e. Some pages may load a user from a
database with the same id in different areas on the same page. But the
code is hidden in two different deep logic. How should we share the
user? As a result of this PR, now if both entry functions accept
`context.Context` as the first parameter and we just need to refactor
`GetUserByID` to reuse the user from the context cache. Then it will not
be loaded twice on an HTTP request.
But of course, sometimes we would like to reload an object from the
database, that's why `RemoveContextData` is also exposed.
The core context cache is here. It defines a new context
```go
type cacheContext struct {
ctx context.Context
data map[any]map[any]any
lock sync.RWMutex
}
var cacheContextKey = struct{}{}
func WithCacheContext(ctx context.Context) context.Context {
return context.WithValue(ctx, cacheContextKey, &cacheContext{
ctx: ctx,
data: make(map[any]map[any]any),
})
}
```
Then you can use the below 4 methods to read/write/del the data within
the same context.
```go
func GetContextData(ctx context.Context, tp, key any) any
func SetContextData(ctx context.Context, tp, key, value any)
func RemoveContextData(ctx context.Context, tp, key any)
func GetWithContextCache[T any](ctx context.Context, cacheGroupKey string, cacheTargetID any, f func() (T, error)) (T, error)
```
Then let's take a look at how `system.GetString` implement it.
```go
func GetSetting(ctx context.Context, key string) (string, error) {
return cache.GetWithContextCache(ctx, contextCacheKey, key, func() (string, error) {
return cache.GetString(genSettingCacheKey(key), func() (string, error) {
res, err := GetSettingNoCache(ctx, key)
if err != nil {
return "", err
}
return res.SettingValue, nil
})
})
}
```
First, it will check if context data include the setting object with the
key. If not, it will query from the global cache which may be memory or
a Redis cache. If not, it will get the object from the database. In the
end, if the object gets from the global cache or database, it will be
set into the context cache.
An object stored in the context cache will only be destroyed after the
context disappeared.
2023-02-15 21:37:34 +08:00
|
|
|
src := t.AsUser().AvatarLinkWithSize(ctx, size*setting.Avatar.RenderedSizeFactor)
|
2020-12-10 13:44:13 +08:00
|
|
|
if src != "" {
|
2021-11-24 11:51:08 +08:00
|
|
|
return AvatarHTML(src, size, class, t.AsUser().DisplayName())
|
2020-12-10 13:44:13 +08:00
|
|
|
}
|
2020-12-04 02:46:11 +08:00
|
|
|
}
|
2021-11-24 11:51:08 +08:00
|
|
|
|
2020-12-08 12:14:28 +08:00
|
|
|
return template.HTML("")
|
|
|
|
}
|
|
|
|
|
2020-12-09 13:11:15 +08:00
|
|
|
// AvatarByAction renders user avatars from action. args: action, size (int), class (string)
|
Add context cache as a request level cache (#22294)
To avoid duplicated load of the same data in an HTTP request, we can set
a context cache to do that. i.e. Some pages may load a user from a
database with the same id in different areas on the same page. But the
code is hidden in two different deep logic. How should we share the
user? As a result of this PR, now if both entry functions accept
`context.Context` as the first parameter and we just need to refactor
`GetUserByID` to reuse the user from the context cache. Then it will not
be loaded twice on an HTTP request.
But of course, sometimes we would like to reload an object from the
database, that's why `RemoveContextData` is also exposed.
The core context cache is here. It defines a new context
```go
type cacheContext struct {
ctx context.Context
data map[any]map[any]any
lock sync.RWMutex
}
var cacheContextKey = struct{}{}
func WithCacheContext(ctx context.Context) context.Context {
return context.WithValue(ctx, cacheContextKey, &cacheContext{
ctx: ctx,
data: make(map[any]map[any]any),
})
}
```
Then you can use the below 4 methods to read/write/del the data within
the same context.
```go
func GetContextData(ctx context.Context, tp, key any) any
func SetContextData(ctx context.Context, tp, key, value any)
func RemoveContextData(ctx context.Context, tp, key any)
func GetWithContextCache[T any](ctx context.Context, cacheGroupKey string, cacheTargetID any, f func() (T, error)) (T, error)
```
Then let's take a look at how `system.GetString` implement it.
```go
func GetSetting(ctx context.Context, key string) (string, error) {
return cache.GetWithContextCache(ctx, contextCacheKey, key, func() (string, error) {
return cache.GetString(genSettingCacheKey(key), func() (string, error) {
res, err := GetSettingNoCache(ctx, key)
if err != nil {
return "", err
}
return res.SettingValue, nil
})
})
}
```
First, it will check if context data include the setting object with the
key. If not, it will query from the global cache which may be memory or
a Redis cache. If not, it will get the object from the database. In the
end, if the object gets from the global cache or database, it will be
set into the context cache.
An object stored in the context cache will only be destroyed after the
context disappeared.
2023-02-15 21:37:34 +08:00
|
|
|
func AvatarByAction(ctx context.Context, action *activities_model.Action, others ...interface{}) template.HTML {
|
|
|
|
action.LoadActUser(ctx)
|
|
|
|
return Avatar(ctx, action.ActUser, others...)
|
2020-12-09 13:11:15 +08:00
|
|
|
}
|
|
|
|
|
2020-12-08 12:14:28 +08:00
|
|
|
// RepoAvatar renders repo avatars. args: repo, size(int), class (string)
|
2021-12-10 09:27:50 +08:00
|
|
|
func RepoAvatar(repo *repo_model.Repository, others ...interface{}) template.HTML {
|
2022-11-24 05:57:37 +08:00
|
|
|
size, class := gitea_html.ParseSizeAndClass(avatars.DefaultAvatarPixelSize, avatars.DefaultAvatarClass, others...)
|
2020-12-04 02:46:11 +08:00
|
|
|
|
2020-12-08 12:14:28 +08:00
|
|
|
src := repo.RelAvatarLink()
|
|
|
|
if src != "" {
|
2020-12-09 08:12:15 +08:00
|
|
|
return AvatarHTML(src, size, class, repo.FullName())
|
2020-12-08 12:14:28 +08:00
|
|
|
}
|
2020-12-04 02:46:11 +08:00
|
|
|
return template.HTML("")
|
|
|
|
}
|
|
|
|
|
|
|
|
// AvatarByEmail renders avatars by email address. args: email, name, size (int), class (string)
|
Add context cache as a request level cache (#22294)
To avoid duplicated load of the same data in an HTTP request, we can set
a context cache to do that. i.e. Some pages may load a user from a
database with the same id in different areas on the same page. But the
code is hidden in two different deep logic. How should we share the
user? As a result of this PR, now if both entry functions accept
`context.Context` as the first parameter and we just need to refactor
`GetUserByID` to reuse the user from the context cache. Then it will not
be loaded twice on an HTTP request.
But of course, sometimes we would like to reload an object from the
database, that's why `RemoveContextData` is also exposed.
The core context cache is here. It defines a new context
```go
type cacheContext struct {
ctx context.Context
data map[any]map[any]any
lock sync.RWMutex
}
var cacheContextKey = struct{}{}
func WithCacheContext(ctx context.Context) context.Context {
return context.WithValue(ctx, cacheContextKey, &cacheContext{
ctx: ctx,
data: make(map[any]map[any]any),
})
}
```
Then you can use the below 4 methods to read/write/del the data within
the same context.
```go
func GetContextData(ctx context.Context, tp, key any) any
func SetContextData(ctx context.Context, tp, key, value any)
func RemoveContextData(ctx context.Context, tp, key any)
func GetWithContextCache[T any](ctx context.Context, cacheGroupKey string, cacheTargetID any, f func() (T, error)) (T, error)
```
Then let's take a look at how `system.GetString` implement it.
```go
func GetSetting(ctx context.Context, key string) (string, error) {
return cache.GetWithContextCache(ctx, contextCacheKey, key, func() (string, error) {
return cache.GetString(genSettingCacheKey(key), func() (string, error) {
res, err := GetSettingNoCache(ctx, key)
if err != nil {
return "", err
}
return res.SettingValue, nil
})
})
}
```
First, it will check if context data include the setting object with the
key. If not, it will query from the global cache which may be memory or
a Redis cache. If not, it will get the object from the database. In the
end, if the object gets from the global cache or database, it will be
set into the context cache.
An object stored in the context cache will only be destroyed after the
context disappeared.
2023-02-15 21:37:34 +08:00
|
|
|
func AvatarByEmail(ctx context.Context, email, name string, others ...interface{}) template.HTML {
|
2022-11-24 05:57:37 +08:00
|
|
|
size, class := gitea_html.ParseSizeAndClass(avatars.DefaultAvatarPixelSize, avatars.DefaultAvatarClass, others...)
|
Add context cache as a request level cache (#22294)
To avoid duplicated load of the same data in an HTTP request, we can set
a context cache to do that. i.e. Some pages may load a user from a
database with the same id in different areas on the same page. But the
code is hidden in two different deep logic. How should we share the
user? As a result of this PR, now if both entry functions accept
`context.Context` as the first parameter and we just need to refactor
`GetUserByID` to reuse the user from the context cache. Then it will not
be loaded twice on an HTTP request.
But of course, sometimes we would like to reload an object from the
database, that's why `RemoveContextData` is also exposed.
The core context cache is here. It defines a new context
```go
type cacheContext struct {
ctx context.Context
data map[any]map[any]any
lock sync.RWMutex
}
var cacheContextKey = struct{}{}
func WithCacheContext(ctx context.Context) context.Context {
return context.WithValue(ctx, cacheContextKey, &cacheContext{
ctx: ctx,
data: make(map[any]map[any]any),
})
}
```
Then you can use the below 4 methods to read/write/del the data within
the same context.
```go
func GetContextData(ctx context.Context, tp, key any) any
func SetContextData(ctx context.Context, tp, key, value any)
func RemoveContextData(ctx context.Context, tp, key any)
func GetWithContextCache[T any](ctx context.Context, cacheGroupKey string, cacheTargetID any, f func() (T, error)) (T, error)
```
Then let's take a look at how `system.GetString` implement it.
```go
func GetSetting(ctx context.Context, key string) (string, error) {
return cache.GetWithContextCache(ctx, contextCacheKey, key, func() (string, error) {
return cache.GetString(genSettingCacheKey(key), func() (string, error) {
res, err := GetSettingNoCache(ctx, key)
if err != nil {
return "", err
}
return res.SettingValue, nil
})
})
}
```
First, it will check if context data include the setting object with the
key. If not, it will query from the global cache which may be memory or
a Redis cache. If not, it will get the object from the database. In the
end, if the object gets from the global cache or database, it will be
set into the context cache.
An object stored in the context cache will only be destroyed after the
context disappeared.
2023-02-15 21:37:34 +08:00
|
|
|
src := avatars.GenerateEmailAvatarFastLink(ctx, email, size*setting.Avatar.RenderedSizeFactor)
|
2020-12-04 02:46:11 +08:00
|
|
|
|
|
|
|
if src != "" {
|
2020-12-09 08:12:15 +08:00
|
|
|
return AvatarHTML(src, size, class, name)
|
2020-12-04 02:46:11 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return template.HTML("")
|
|
|
|
}
|
|
|
|
|
2016-11-25 14:23:48 +08:00
|
|
|
// Safe render raw as HTML
|
2015-08-08 17:10:34 +08:00
|
|
|
func Safe(raw string) template.HTML {
|
|
|
|
return template.HTML(raw)
|
|
|
|
}
|
|
|
|
|
2017-08-23 22:58:05 +08:00
|
|
|
// SafeJS renders raw as JS
|
|
|
|
func SafeJS(raw string) template.JS {
|
|
|
|
return template.JS(raw)
|
|
|
|
}
|
|
|
|
|
2016-11-25 14:23:48 +08:00
|
|
|
// Str2html render Markdown text to HTML
|
2014-04-11 02:20:58 +08:00
|
|
|
func Str2html(raw string) template.HTML {
|
2017-09-17 01:17:57 +08:00
|
|
|
return template.HTML(markup.Sanitize(raw))
|
2014-04-11 02:20:58 +08:00
|
|
|
}
|
|
|
|
|
2018-02-11 21:42:28 +08:00
|
|
|
// Escape escapes a HTML string
|
|
|
|
func Escape(raw string) string {
|
|
|
|
return html.EscapeString(raw)
|
|
|
|
}
|
|
|
|
|
2021-03-12 12:43:04 +08:00
|
|
|
// JSEscape escapes a JS string
|
|
|
|
func JSEscape(raw string) string {
|
|
|
|
return template.JSEscapeString(raw)
|
|
|
|
}
|
|
|
|
|
2022-03-23 20:34:20 +08:00
|
|
|
// DotEscape wraps a dots in names with ZWJ [U+200D] in order to prevent autolinkers from detecting these as urls
|
|
|
|
func DotEscape(raw string) string {
|
|
|
|
return strings.ReplaceAll(raw, ".", "\u200d.\u200d")
|
|
|
|
}
|
|
|
|
|
2015-01-31 07:05:20 +08:00
|
|
|
// RenderCommitMessage renders commit message with XSS-safe and special links.
|
2022-01-20 07:26:57 +08:00
|
|
|
func RenderCommitMessage(ctx context.Context, msg, urlPrefix string, metas map[string]string) template.HTML {
|
|
|
|
return RenderCommitMessageLink(ctx, msg, urlPrefix, "", metas)
|
2017-11-13 09:35:55 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// RenderCommitMessageLink renders commit message as a XXS-safe link to the provided
|
|
|
|
// default url, handling for special links.
|
2022-01-20 07:26:57 +08:00
|
|
|
func RenderCommitMessageLink(ctx context.Context, msg, urlPrefix, urlDefault string, metas map[string]string) template.HTML {
|
2015-09-19 09:57:06 +08:00
|
|
|
cleanMsg := template.HTMLEscapeString(msg)
|
2018-02-27 15:09:18 +08:00
|
|
|
// we can safely assume that it will not return any error, since there
|
|
|
|
// shouldn't be any special HTML.
|
2021-04-20 06:25:08 +08:00
|
|
|
fullMessage, err := markup.RenderCommitMessage(&markup.RenderContext{
|
2022-01-20 07:26:57 +08:00
|
|
|
Ctx: ctx,
|
2021-04-20 06:25:08 +08:00
|
|
|
URLPrefix: urlPrefix,
|
|
|
|
DefaultLink: urlDefault,
|
|
|
|
Metas: metas,
|
|
|
|
}, cleanMsg)
|
2018-02-27 15:09:18 +08:00
|
|
|
if err != nil {
|
2019-04-02 15:48:31 +08:00
|
|
|
log.Error("RenderCommitMessage: %v", err)
|
2018-02-27 15:09:18 +08:00
|
|
|
return ""
|
|
|
|
}
|
2022-06-20 18:02:49 +08:00
|
|
|
msgLines := strings.Split(strings.TrimSpace(fullMessage), "\n")
|
2017-11-13 09:35:55 +08:00
|
|
|
if len(msgLines) == 0 {
|
2015-12-07 07:18:12 +08:00
|
|
|
return template.HTML("")
|
2015-09-19 09:57:06 +08:00
|
|
|
}
|
2017-11-13 09:35:55 +08:00
|
|
|
return template.HTML(msgLines[0])
|
2015-01-31 07:05:20 +08:00
|
|
|
}
|
|
|
|
|
2019-09-10 17:03:30 +08:00
|
|
|
// RenderCommitMessageLinkSubject renders commit message as a XXS-safe link to
|
|
|
|
// the provided default url, handling for special links without email to links.
|
2022-01-20 07:26:57 +08:00
|
|
|
func RenderCommitMessageLinkSubject(ctx context.Context, msg, urlPrefix, urlDefault string, metas map[string]string) template.HTML {
|
2019-11-01 12:48:30 +08:00
|
|
|
msgLine := strings.TrimLeftFunc(msg, unicode.IsSpace)
|
|
|
|
lineEnd := strings.IndexByte(msgLine, '\n')
|
|
|
|
if lineEnd > 0 {
|
|
|
|
msgLine = msgLine[:lineEnd]
|
|
|
|
}
|
|
|
|
msgLine = strings.TrimRightFunc(msgLine, unicode.IsSpace)
|
|
|
|
if len(msgLine) == 0 {
|
|
|
|
return template.HTML("")
|
|
|
|
}
|
|
|
|
|
2019-09-10 17:03:30 +08:00
|
|
|
// we can safely assume that it will not return any error, since there
|
|
|
|
// shouldn't be any special HTML.
|
2021-04-20 06:25:08 +08:00
|
|
|
renderedMessage, err := markup.RenderCommitMessageSubject(&markup.RenderContext{
|
2022-01-20 07:26:57 +08:00
|
|
|
Ctx: ctx,
|
2021-04-20 06:25:08 +08:00
|
|
|
URLPrefix: urlPrefix,
|
|
|
|
DefaultLink: urlDefault,
|
|
|
|
Metas: metas,
|
|
|
|
}, template.HTMLEscapeString(msgLine))
|
2019-09-10 17:03:30 +08:00
|
|
|
if err != nil {
|
|
|
|
log.Error("RenderCommitMessageSubject: %v", err)
|
|
|
|
return template.HTML("")
|
|
|
|
}
|
2019-11-01 12:48:30 +08:00
|
|
|
return template.HTML(renderedMessage)
|
2019-09-10 17:03:30 +08:00
|
|
|
}
|
|
|
|
|
2017-11-30 13:08:40 +08:00
|
|
|
// RenderCommitBody extracts the body of a commit message without its title.
|
2022-01-20 07:26:57 +08:00
|
|
|
func RenderCommitBody(ctx context.Context, msg, urlPrefix string, metas map[string]string) template.HTML {
|
2019-11-01 12:48:30 +08:00
|
|
|
msgLine := strings.TrimRightFunc(msg, unicode.IsSpace)
|
|
|
|
lineEnd := strings.IndexByte(msgLine, '\n')
|
|
|
|
if lineEnd > 0 {
|
|
|
|
msgLine = msgLine[lineEnd+1:]
|
|
|
|
} else {
|
|
|
|
return template.HTML("")
|
|
|
|
}
|
|
|
|
msgLine = strings.TrimLeftFunc(msgLine, unicode.IsSpace)
|
|
|
|
if len(msgLine) == 0 {
|
|
|
|
return template.HTML("")
|
|
|
|
}
|
|
|
|
|
2021-04-20 06:25:08 +08:00
|
|
|
renderedMessage, err := markup.RenderCommitMessage(&markup.RenderContext{
|
2022-01-20 07:26:57 +08:00
|
|
|
Ctx: ctx,
|
2021-04-20 06:25:08 +08:00
|
|
|
URLPrefix: urlPrefix,
|
|
|
|
Metas: metas,
|
|
|
|
}, template.HTMLEscapeString(msgLine))
|
2018-02-27 15:09:18 +08:00
|
|
|
if err != nil {
|
2019-04-02 15:48:31 +08:00
|
|
|
log.Error("RenderCommitMessage: %v", err)
|
2018-02-27 15:09:18 +08:00
|
|
|
return ""
|
|
|
|
}
|
2019-11-01 12:48:30 +08:00
|
|
|
return template.HTML(renderedMessage)
|
2017-11-30 13:08:40 +08:00
|
|
|
}
|
|
|
|
|
2022-10-16 02:24:41 +08:00
|
|
|
// Match text that is between back ticks.
|
|
|
|
var codeMatcher = regexp.MustCompile("`([^`]+)`")
|
|
|
|
|
|
|
|
// RenderCodeBlock renders "`…`" as highlighted "<code>" block.
|
|
|
|
// Intended for issue and PR titles, these containers should have styles for "<code>" elements
|
|
|
|
func RenderCodeBlock(htmlEscapedTextToRender template.HTML) template.HTML {
|
|
|
|
htmlWithCodeTags := codeMatcher.ReplaceAllString(string(htmlEscapedTextToRender), "<code>$1</code>") // replace with HTML <code> tags
|
|
|
|
return template.HTML(htmlWithCodeTags)
|
|
|
|
}
|
|
|
|
|
2020-12-03 18:50:47 +08:00
|
|
|
// RenderIssueTitle renders issue/pull title with defined post processors
|
2022-01-20 07:26:57 +08:00
|
|
|
func RenderIssueTitle(ctx context.Context, text, urlPrefix string, metas map[string]string) template.HTML {
|
2021-04-20 06:25:08 +08:00
|
|
|
renderedText, err := markup.RenderIssueTitle(&markup.RenderContext{
|
2022-01-20 07:26:57 +08:00
|
|
|
Ctx: ctx,
|
2021-04-20 06:25:08 +08:00
|
|
|
URLPrefix: urlPrefix,
|
|
|
|
Metas: metas,
|
|
|
|
}, template.HTMLEscapeString(text))
|
2020-12-03 18:50:47 +08:00
|
|
|
if err != nil {
|
|
|
|
log.Error("RenderIssueTitle: %v", err)
|
|
|
|
return template.HTML("")
|
|
|
|
}
|
|
|
|
return template.HTML(renderedText)
|
|
|
|
}
|
|
|
|
|
Scoped labels (#22585)
Add a new "exclusive" option per label. This makes it so that when the
label is named `scope/name`, no other label with the same `scope/`
prefix can be set on an issue.
The scope is determined by the last occurence of `/`, so for example
`scope/alpha/name` and `scope/beta/name` are considered to be in
different scopes and can coexist.
Exclusive scopes are not enforced by any database rules, however they
are enforced when editing labels at the models level, automatically
removing any existing labels in the same scope when either attaching a
new label or replacing all labels.
In menus use a circle instead of checkbox to indicate they function as
radio buttons per scope. Issue filtering by label ensures that only a
single scoped label is selected at a time. Clicking with alt key can be
used to remove a scoped label, both when editing individual issues and
batch editing.
Label rendering refactor for consistency and code simplification:
* Labels now consistently have the same shape, emojis and tooltips
everywhere. This includes the label list and label assignment menus.
* In label list, show description below label same as label menus.
* Don't use exactly black/white text colors to look a bit nicer.
* Simplify text color computation. There is no point computing luminance
in linear color space, as this is a perceptual problem and sRGB is
closer to perceptually linear.
* Increase height of label assignment menus to show more labels. Showing
only 3-4 labels at a time leads to a lot of scrolling.
* Render all labels with a new RenderLabel template helper function.
Label creation and editing in multiline modal menu:
* Change label creation to open a modal menu like label editing.
* Change menu layout to place name, description and colors on separate
lines.
* Don't color cancel button red in label editing modal menu.
* Align text to the left in model menu for better readability and
consistent with settings layout elsewhere.
Custom exclusive scoped label rendering:
* Display scoped label prefix and suffix with slightly darker and
lighter background color respectively, and a slanted edge between them
similar to the `/` symbol.
* In menus exclusive labels are grouped with a divider line.
---------
Co-authored-by: Yarden Shoham <hrsi88@gmail.com>
Co-authored-by: Lauris BH <lauris@nix.lv>
2023-02-19 03:17:39 +08:00
|
|
|
// RenderLabel renders a label
|
|
|
|
func RenderLabel(label *issues_model.Label) string {
|
|
|
|
labelScope := label.ExclusiveScope()
|
|
|
|
|
|
|
|
textColor := "#111"
|
|
|
|
if label.UseLightTextColor() {
|
|
|
|
textColor = "#eee"
|
|
|
|
}
|
|
|
|
|
|
|
|
description := emoji.ReplaceAliases(template.HTMLEscapeString(label.Description))
|
|
|
|
|
|
|
|
if labelScope == "" {
|
|
|
|
// Regular label
|
|
|
|
return fmt.Sprintf("<div class='ui label' style='color: %s !important; background-color: %s !important' title='%s'>%s</div>",
|
|
|
|
textColor, label.Color, description, RenderEmoji(label.Name))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Scoped label
|
|
|
|
scopeText := RenderEmoji(labelScope)
|
|
|
|
itemText := RenderEmoji(label.Name[len(labelScope)+1:])
|
|
|
|
|
|
|
|
itemColor := label.Color
|
|
|
|
scopeColor := label.Color
|
|
|
|
if r, g, b, err := label.ColorRGB(); err == nil {
|
|
|
|
// Make scope and item background colors slightly darker and lighter respectively.
|
|
|
|
// More contrast needed with higher luminance, empirically tweaked.
|
|
|
|
luminance := (0.299*r + 0.587*g + 0.114*b) / 255
|
|
|
|
contrast := 0.01 + luminance*0.06
|
|
|
|
// Ensure we add the same amount of contrast also near 0 and 1.
|
|
|
|
darken := contrast + math.Max(luminance+contrast-1.0, 0.0)
|
|
|
|
lighten := contrast + math.Max(contrast-luminance, 0.0)
|
|
|
|
// Compute factor to keep RGB values proportional.
|
|
|
|
darkenFactor := math.Max(luminance-darken, 0.0) / math.Max(luminance, 1.0/255.0)
|
|
|
|
lightenFactor := math.Min(luminance+lighten, 1.0) / math.Max(luminance, 1.0/255.0)
|
|
|
|
|
|
|
|
scopeBytes := []byte{
|
|
|
|
uint8(math.Min(math.Round(r*darkenFactor), 255)),
|
|
|
|
uint8(math.Min(math.Round(g*darkenFactor), 255)),
|
|
|
|
uint8(math.Min(math.Round(b*darkenFactor), 255)),
|
|
|
|
}
|
|
|
|
itemBytes := []byte{
|
|
|
|
uint8(math.Min(math.Round(r*lightenFactor), 255)),
|
|
|
|
uint8(math.Min(math.Round(g*lightenFactor), 255)),
|
|
|
|
uint8(math.Min(math.Round(b*lightenFactor), 255)),
|
|
|
|
}
|
|
|
|
|
|
|
|
itemColor = "#" + hex.EncodeToString(itemBytes)
|
|
|
|
scopeColor = "#" + hex.EncodeToString(scopeBytes)
|
|
|
|
}
|
|
|
|
|
|
|
|
return fmt.Sprintf("<span class='ui label scope-parent' title='%s'>"+
|
|
|
|
"<div class='ui label scope-left' style='color: %s !important; background-color: %s !important'>%s</div>"+
|
|
|
|
"<div class='ui label scope-middle' style='background: linear-gradient(-80deg, %s 48%%, %s 52%% 0%%);'> </div>"+
|
|
|
|
"<div class='ui label scope-right' style='color: %s !important; background-color: %s !important''>%s</div>"+
|
|
|
|
"</span>",
|
|
|
|
description,
|
|
|
|
textColor, scopeColor, scopeText,
|
|
|
|
itemColor, scopeColor,
|
|
|
|
textColor, itemColor, itemText)
|
|
|
|
}
|
|
|
|
|
2020-04-29 02:05:39 +08:00
|
|
|
// RenderEmoji renders html text with emoji post processors
|
|
|
|
func RenderEmoji(text string) template.HTML {
|
2021-04-20 06:25:08 +08:00
|
|
|
renderedText, err := markup.RenderEmoji(template.HTMLEscapeString(text))
|
2020-04-29 02:05:39 +08:00
|
|
|
if err != nil {
|
|
|
|
log.Error("RenderEmoji: %v", err)
|
|
|
|
return template.HTML("")
|
|
|
|
}
|
|
|
|
return template.HTML(renderedText)
|
|
|
|
}
|
|
|
|
|
2022-01-21 01:46:10 +08:00
|
|
|
// ReactionToEmoji renders emoji for use in reactions
|
2020-04-29 02:05:39 +08:00
|
|
|
func ReactionToEmoji(reaction string) template.HTML {
|
|
|
|
val := emoji.FromCode(reaction)
|
|
|
|
if val != nil {
|
|
|
|
return template.HTML(val.Emoji)
|
|
|
|
}
|
|
|
|
val = emoji.FromAlias(reaction)
|
|
|
|
if val != nil {
|
|
|
|
return template.HTML(val.Emoji)
|
|
|
|
}
|
2021-11-17 02:18:25 +08:00
|
|
|
return template.HTML(fmt.Sprintf(`<img alt=":%s:" src="%s/assets/img/emoji/%s.png"></img>`, reaction, setting.StaticURLPrefix, url.PathEscape(reaction)))
|
2020-04-29 02:05:39 +08:00
|
|
|
}
|
|
|
|
|
2019-05-24 15:52:05 +08:00
|
|
|
// RenderNote renders the contents of a git-notes file as a commit message.
|
2022-01-20 07:26:57 +08:00
|
|
|
func RenderNote(ctx context.Context, msg, urlPrefix string, metas map[string]string) template.HTML {
|
2019-05-24 15:52:05 +08:00
|
|
|
cleanMsg := template.HTMLEscapeString(msg)
|
2021-04-20 06:25:08 +08:00
|
|
|
fullMessage, err := markup.RenderCommitMessage(&markup.RenderContext{
|
2022-01-20 07:26:57 +08:00
|
|
|
Ctx: ctx,
|
2021-04-20 06:25:08 +08:00
|
|
|
URLPrefix: urlPrefix,
|
|
|
|
Metas: metas,
|
|
|
|
}, cleanMsg)
|
2019-05-24 15:52:05 +08:00
|
|
|
if err != nil {
|
|
|
|
log.Error("RenderNote: %v", err)
|
|
|
|
return ""
|
|
|
|
}
|
2022-06-20 18:02:49 +08:00
|
|
|
return template.HTML(fullMessage)
|
2019-05-24 15:52:05 +08:00
|
|
|
}
|
|
|
|
|
2017-11-30 13:08:40 +08:00
|
|
|
// IsMultilineCommitMessage checks to see if a commit message contains multiple lines.
|
|
|
|
func IsMultilineCommitMessage(msg string) bool {
|
2018-06-15 22:07:48 +08:00
|
|
|
return strings.Count(strings.TrimSpace(msg), "\n") >= 1
|
2017-11-30 13:08:40 +08:00
|
|
|
}
|
|
|
|
|
2016-11-25 14:23:48 +08:00
|
|
|
// Actioner describes an action
|
2014-04-11 02:20:58 +08:00
|
|
|
type Actioner interface {
|
2022-08-25 10:31:57 +08:00
|
|
|
GetOpType() activities_model.ActionType
|
2014-04-11 02:20:58 +08:00
|
|
|
GetActUserName() string
|
2014-05-09 14:42:50 +08:00
|
|
|
GetRepoUserName() string
|
2014-04-11 02:20:58 +08:00
|
|
|
GetRepoName() string
|
2015-09-01 21:29:52 +08:00
|
|
|
GetRepoPath() string
|
|
|
|
GetRepoLink() string
|
2014-04-11 02:20:58 +08:00
|
|
|
GetBranch() string
|
|
|
|
GetContent() string
|
2015-09-01 21:29:52 +08:00
|
|
|
GetCreate() time.Time
|
|
|
|
GetIssueInfos() []string
|
2014-04-11 02:20:58 +08:00
|
|
|
}
|
|
|
|
|
2017-09-20 09:22:42 +08:00
|
|
|
// ActionIcon accepts an action operation type and returns an icon class name.
|
2022-08-25 10:31:57 +08:00
|
|
|
func ActionIcon(opType activities_model.ActionType) string {
|
2014-04-11 02:20:58 +08:00
|
|
|
switch opType {
|
2022-08-25 10:31:57 +08:00
|
|
|
case activities_model.ActionCreateRepo, activities_model.ActionTransferRepo, activities_model.ActionRenameRepo:
|
2014-07-26 12:24:27 +08:00
|
|
|
return "repo"
|
2022-08-25 10:31:57 +08:00
|
|
|
case activities_model.ActionCommitRepo, activities_model.ActionPushTag, activities_model.ActionDeleteTag, activities_model.ActionDeleteBranch:
|
2014-07-26 12:24:27 +08:00
|
|
|
return "git-commit"
|
2022-08-25 10:31:57 +08:00
|
|
|
case activities_model.ActionCreateIssue:
|
2014-07-26 12:24:27 +08:00
|
|
|
return "issue-opened"
|
2022-08-25 10:31:57 +08:00
|
|
|
case activities_model.ActionCreatePullRequest:
|
2015-11-17 00:39:48 +08:00
|
|
|
return "git-pull-request"
|
2022-08-25 10:31:57 +08:00
|
|
|
case activities_model.ActionCommentIssue, activities_model.ActionCommentPull:
|
2016-07-16 12:45:13 +08:00
|
|
|
return "comment-discussion"
|
2022-11-03 23:49:00 +08:00
|
|
|
case activities_model.ActionMergePullRequest, activities_model.ActionAutoMergePullRequest:
|
2015-11-17 00:39:48 +08:00
|
|
|
return "git-merge"
|
2022-08-25 10:31:57 +08:00
|
|
|
case activities_model.ActionCloseIssue, activities_model.ActionClosePullRequest:
|
2016-02-23 01:40:00 +08:00
|
|
|
return "issue-closed"
|
2022-08-25 10:31:57 +08:00
|
|
|
case activities_model.ActionReopenIssue, activities_model.ActionReopenPullRequest:
|
2016-03-06 01:58:51 +08:00
|
|
|
return "issue-reopened"
|
2022-08-25 10:31:57 +08:00
|
|
|
case activities_model.ActionMirrorSyncPush, activities_model.ActionMirrorSyncCreate, activities_model.ActionMirrorSyncDelete:
|
2020-12-11 07:06:45 +08:00
|
|
|
return "mirror"
|
2022-08-25 10:31:57 +08:00
|
|
|
case activities_model.ActionApprovePullRequest:
|
2020-04-24 12:58:14 +08:00
|
|
|
return "check"
|
2022-08-25 10:31:57 +08:00
|
|
|
case activities_model.ActionRejectPullRequest:
|
2020-07-17 23:15:12 +08:00
|
|
|
return "diff"
|
2022-08-25 10:31:57 +08:00
|
|
|
case activities_model.ActionPublishRelease:
|
2020-07-30 03:20:54 +08:00
|
|
|
return "tag"
|
2022-08-25 10:31:57 +08:00
|
|
|
case activities_model.ActionPullReviewDismissed:
|
2021-02-12 01:32:25 +08:00
|
|
|
return "x"
|
2014-04-11 02:20:58 +08:00
|
|
|
default:
|
2020-04-24 12:58:14 +08:00
|
|
|
return "question"
|
2014-04-11 02:20:58 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-25 14:23:48 +08:00
|
|
|
// ActionContent2Commits converts action content to push commits
|
2020-01-10 17:34:21 +08:00
|
|
|
func ActionContent2Commits(act Actioner) *repository.PushCommits {
|
|
|
|
push := repository.NewPushCommits()
|
2021-03-02 05:08:10 +08:00
|
|
|
|
2021-03-06 12:09:49 +08:00
|
|
|
if act == nil || act.GetContent() == "" {
|
|
|
|
return push
|
|
|
|
}
|
|
|
|
|
2015-11-14 06:10:25 +08:00
|
|
|
if err := json.Unmarshal([]byte(act.GetContent()), push); err != nil {
|
2019-04-02 15:48:31 +08:00
|
|
|
log.Error("json.Unmarshal:\n%s\nERROR: %v", act.GetContent(), err)
|
2014-07-26 12:24:27 +08:00
|
|
|
}
|
2021-08-26 07:04:58 +08:00
|
|
|
|
|
|
|
if push.Len == 0 {
|
|
|
|
push.Len = len(push.Commits)
|
|
|
|
}
|
|
|
|
|
2014-07-26 12:24:27 +08:00
|
|
|
return push
|
|
|
|
}
|
|
|
|
|
2016-11-25 14:23:48 +08:00
|
|
|
// DiffTypeToStr returns diff type name
|
2014-04-11 02:20:58 +08:00
|
|
|
func DiffTypeToStr(diffType int) string {
|
|
|
|
diffTypes := map[int]string{
|
2020-09-09 21:08:40 +08:00
|
|
|
1: "add", 2: "modify", 3: "del", 4: "rename", 5: "copy",
|
2014-04-11 02:20:58 +08:00
|
|
|
}
|
|
|
|
return diffTypes[diffType]
|
|
|
|
}
|
|
|
|
|
2016-11-25 14:23:48 +08:00
|
|
|
// DiffLineTypeToStr returns diff line type name
|
2014-04-11 02:20:58 +08:00
|
|
|
func DiffLineTypeToStr(diffType int) string {
|
|
|
|
switch diffType {
|
|
|
|
case 2:
|
|
|
|
return "add"
|
|
|
|
case 3:
|
|
|
|
return "del"
|
|
|
|
case 4:
|
|
|
|
return "tag"
|
|
|
|
}
|
|
|
|
return "same"
|
|
|
|
}
|
2017-10-15 07:17:39 +08:00
|
|
|
|
2021-09-19 00:22:51 +08:00
|
|
|
// MigrationIcon returns a SVG name matching the service an issue/comment was migrated from
|
2019-07-08 10:14:12 +08:00
|
|
|
func MigrationIcon(hostname string) string {
|
|
|
|
switch hostname {
|
|
|
|
case "github.com":
|
2021-09-19 00:22:51 +08:00
|
|
|
return "octicon-mark-github"
|
2019-07-08 10:14:12 +08:00
|
|
|
default:
|
2021-09-19 00:22:51 +08:00
|
|
|
return "gitea-git"
|
2019-07-08 10:14:12 +08:00
|
|
|
}
|
|
|
|
}
|
2019-11-07 21:34:28 +08:00
|
|
|
|
|
|
|
func buildSubjectBodyTemplate(stpl *texttmpl.Template, btpl *template.Template, name string, content []byte) {
|
|
|
|
// Split template into subject and body
|
|
|
|
var subjectContent []byte
|
|
|
|
bodyContent := content
|
|
|
|
loc := mailSubjectSplit.FindIndex(content)
|
|
|
|
if loc != nil {
|
|
|
|
subjectContent = content[0:loc[0]]
|
|
|
|
bodyContent = content[loc[1]:]
|
|
|
|
}
|
|
|
|
if _, err := stpl.New(name).
|
|
|
|
Parse(string(subjectContent)); err != nil {
|
|
|
|
log.Warn("Failed to parse template [%s/subject]: %v", name, err)
|
|
|
|
}
|
|
|
|
if _, err := btpl.New(name).
|
|
|
|
Parse(string(bodyContent)); err != nil {
|
|
|
|
log.Warn("Failed to parse template [%s/body]: %v", name, err)
|
|
|
|
}
|
|
|
|
}
|
2021-06-15 01:20:43 +08:00
|
|
|
|
|
|
|
type remoteAddress struct {
|
|
|
|
Address string
|
|
|
|
Username string
|
|
|
|
Password string
|
|
|
|
}
|
|
|
|
|
2022-08-15 11:12:01 +08:00
|
|
|
func mirrorRemoteAddress(ctx context.Context, m *repo_model.Repository, remoteName string, ignoreOriginalURL bool) remoteAddress {
|
2021-06-15 01:20:43 +08:00
|
|
|
a := remoteAddress{}
|
2022-06-11 21:50:14 +08:00
|
|
|
|
|
|
|
remoteURL := m.OriginalURL
|
2022-08-15 11:12:01 +08:00
|
|
|
if ignoreOriginalURL || remoteURL == "" {
|
2022-06-11 21:50:14 +08:00
|
|
|
var err error
|
|
|
|
remoteURL, err = git.GetRemoteAddress(ctx, m.RepoPath(), remoteName)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("GetRemoteURL %v", err)
|
|
|
|
return a
|
|
|
|
}
|
|
|
|
}
|
2021-06-15 01:20:43 +08:00
|
|
|
|
2022-06-11 21:50:14 +08:00
|
|
|
u, err := giturl.Parse(remoteURL)
|
2021-06-15 01:20:43 +08:00
|
|
|
if err != nil {
|
2022-06-11 21:50:14 +08:00
|
|
|
log.Error("giturl.Parse %v", err)
|
2021-06-15 01:20:43 +08:00
|
|
|
return a
|
|
|
|
}
|
|
|
|
|
2022-06-11 21:50:14 +08:00
|
|
|
if u.Scheme != "ssh" && u.Scheme != "file" {
|
|
|
|
if u.User != nil {
|
|
|
|
a.Username = u.User.Username()
|
|
|
|
a.Password, _ = u.User.Password()
|
|
|
|
}
|
|
|
|
u.User = nil
|
2021-06-15 01:20:43 +08:00
|
|
|
}
|
|
|
|
a.Address = u.String()
|
|
|
|
|
|
|
|
return a
|
|
|
|
}
|
2022-06-12 20:08:23 +08:00
|
|
|
|
|
|
|
// JsPrettyNumber renders a number using english decimal separators, e.g. 1,200 and subsequent
|
|
|
|
// JS will replace the number with locale-specific separators, based on the user's selected language
|
|
|
|
func JsPrettyNumber(i interface{}) template.HTML {
|
|
|
|
num := util.NumberIntoInt64(i)
|
|
|
|
|
|
|
|
return template.HTML(`<span class="js-pretty-number" data-value="` + strconv.FormatInt(num, 10) + `">` + base.PrettyNumber(num) + `</span>`)
|
|
|
|
}
|