2014-04-16 12:37:07 +04:00
// Copyright 2014 The Gogs Authors. All rights reserved.
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
2014-04-10 22:20:58 +04:00
package repo
import (
2014-04-11 06:27:13 +04:00
"bytes"
2014-10-16 00:28:38 +04:00
"compress/gzip"
2014-04-10 22:20:58 +04:00
"fmt"
2014-06-28 10:55:33 +04:00
"io"
2014-04-10 22:20:58 +04:00
"io/ioutil"
"net/http"
"os"
"os/exec"
"path"
"regexp"
2014-11-17 22:53:41 +03:00
"runtime"
2014-04-10 22:20:58 +04:00
"strconv"
"strings"
"time"
2016-11-10 19:24:48 +03:00
"code.gitea.io/git"
2016-08-14 14:17:26 +03:00
2016-11-10 19:24:48 +03:00
"code.gitea.io/gitea/models"
"code.gitea.io/gitea/modules/base"
"code.gitea.io/gitea/modules/context"
"code.gitea.io/gitea/modules/log"
"code.gitea.io/gitea/modules/setting"
2014-04-10 22:20:58 +04:00
)
2016-11-24 10:04:31 +03:00
// HTTP implmentation git smart HTTP protocol
2016-03-11 19:56:52 +03:00
func HTTP ( ctx * context . Context ) {
2014-07-26 08:24:27 +04:00
username := ctx . Params ( ":username" )
2015-12-01 04:45:55 +03:00
reponame := strings . TrimSuffix ( ctx . Params ( ":reponame" ) , ".git" )
2014-04-10 22:20:58 +04:00
var isPull bool
service := ctx . Query ( "service" )
if service == "git-receive-pack" ||
strings . HasSuffix ( ctx . Req . URL . Path , "git-receive-pack" ) {
isPull = false
} else if service == "git-upload-pack" ||
strings . HasSuffix ( ctx . Req . URL . Path , "git-upload-pack" ) {
isPull = true
} else {
isPull = ( ctx . Req . Method == "GET" )
}
2015-12-01 04:45:55 +03:00
isWiki := false
if strings . HasSuffix ( reponame , ".wiki" ) {
isWiki = true
reponame = reponame [ : len ( reponame ) - 5 ]
}
2014-04-10 22:20:58 +04:00
repoUser , err := models . GetUserByName ( username )
if err != nil {
2015-08-05 06:14:17 +03:00
if models . IsErrUserNotExist ( err ) {
2016-06-01 14:19:01 +03:00
ctx . Handle ( http . StatusNotFound , "GetUserByName" , nil )
2014-05-31 01:57:38 +04:00
} else {
2016-06-01 14:19:01 +03:00
ctx . Handle ( http . StatusInternalServerError , "GetUserByName" , err )
2014-05-31 01:57:38 +04:00
}
2014-04-10 22:20:58 +04:00
return
}
2016-07-23 20:08:22 +03:00
repo , err := models . GetRepositoryByName ( repoUser . ID , reponame )
2014-04-10 22:20:58 +04:00
if err != nil {
2015-03-16 11:04:27 +03:00
if models . IsErrRepoNotExist ( err ) {
2016-06-01 14:19:01 +03:00
ctx . Handle ( http . StatusNotFound , "GetRepositoryByName" , nil )
2014-05-31 01:57:38 +04:00
} else {
2016-06-01 14:19:01 +03:00
ctx . Handle ( http . StatusInternalServerError , "GetRepositoryByName" , err )
2014-05-31 01:57:38 +04:00
}
2014-04-10 22:20:58 +04:00
return
}
2015-02-07 23:47:23 +03:00
// Only public pull don't need auth.
2014-04-16 12:45:02 +04:00
isPublicPull := ! repo . IsPrivate && isPull
2015-02-07 23:47:23 +03:00
var (
askAuth = ! isPublicPull || setting . Service . RequireSignInView
authUser * models . User
authUsername string
authPasswd string
)
2014-04-11 06:27:13 +04:00
2014-04-10 22:20:58 +04:00
// check access
if askAuth {
2016-12-29 00:33:59 +03:00
if setting . Service . EnableReverseProxyAuth {
authUsername = ctx . Req . Header . Get ( setting . ReverseProxyAuthUser )
if len ( authUsername ) == 0 {
ctx . HandleText ( 401 , "reverse proxy login error. authUsername empty" )
2015-01-08 17:16:38 +03:00
return
}
2016-12-29 00:33:59 +03:00
authUser , err = models . GetUserByName ( authUsername )
2015-02-07 23:47:23 +03:00
if err != nil {
2016-12-29 00:33:59 +03:00
ctx . HandleText ( 401 , "reverse proxy login error, got error while running GetUserByName" )
2015-02-07 23:47:23 +03:00
return
2015-01-08 17:16:38 +03:00
}
2016-12-30 10:26:05 +03:00
} else {
2016-12-29 00:33:59 +03:00
authHead := ctx . Req . Header . Get ( "Authorization" )
if len ( authHead ) == 0 {
ctx . Resp . Header ( ) . Set ( "WWW-Authenticate" , "Basic realm=\".\"" )
ctx . Error ( http . StatusUnauthorized )
return
2015-08-19 01:22:33 +03:00
}
2016-12-29 00:33:59 +03:00
auths := strings . Fields ( authHead )
// currently check basic auth
// TODO: support digit auth
// FIXME: middlewares/context.go did basic auth check already,
// maybe could use that one.
if len ( auths ) != 2 || auths [ 0 ] != "Basic" {
ctx . HandleText ( http . StatusUnauthorized , "no basic auth and digit auth" )
return
}
authUsername , authPasswd , err = base . BasicAuthDecode ( auths [ 1 ] )
2015-02-07 23:47:23 +03:00
if err != nil {
2016-12-29 00:33:59 +03:00
ctx . HandleText ( http . StatusUnauthorized , "no basic auth and digit auth" )
2015-01-08 17:16:38 +03:00
return
}
2014-04-10 22:20:58 +04:00
2016-12-29 00:33:59 +03:00
authUser , err = models . UserSignIn ( authUsername , authPasswd )
if err != nil {
if ! models . IsErrUserNotExist ( err ) {
ctx . Handle ( http . StatusInternalServerError , "UserSignIn error: %v" , err )
return
}
// Assume username now is a token.
token , err := models . GetAccessTokenBySHA ( authUsername )
if err != nil {
if models . IsErrAccessTokenNotExist ( err ) || models . IsErrAccessTokenEmpty ( err ) {
ctx . HandleText ( http . StatusUnauthorized , "invalid token" )
} else {
ctx . Handle ( http . StatusInternalServerError , "GetAccessTokenBySha" , err )
}
return
}
token . Updated = time . Now ( )
if err = models . UpdateAccessToken ( token ) ; err != nil {
ctx . Handle ( http . StatusInternalServerError , "UpdateAccessToken" , err )
}
authUser , err = models . GetUserByID ( token . UID )
if err != nil {
ctx . Handle ( http . StatusInternalServerError , "GetUserByID" , err )
return
}
2014-04-16 12:45:02 +04:00
}
2014-04-10 22:20:58 +04:00
2016-12-29 00:33:59 +03:00
if ! isPublicPull {
var tp = models . AccessModeWrite
if isPull {
tp = models . AccessModeRead
}
has , err := models . HasAccess ( authUser , repo , tp )
if err != nil {
ctx . Handle ( http . StatusInternalServerError , "HasAccess" , err )
return
} else if ! has {
if tp == models . AccessModeRead {
has , err = models . HasAccess ( authUser , repo , models . AccessModeWrite )
if err != nil {
ctx . Handle ( http . StatusInternalServerError , "HasAccess2" , err )
return
} else if ! has {
ctx . HandleText ( http . StatusForbidden , "User permission denied" )
return
}
} else {
2016-06-01 14:19:01 +03:00
ctx . HandleText ( http . StatusForbidden , "User permission denied" )
2014-04-16 12:45:02 +04:00
return
}
2014-04-10 22:20:58 +04:00
}
2015-02-16 13:00:06 +03:00
2016-12-29 00:33:59 +03:00
if ! isPull && repo . IsMirror {
ctx . HandleText ( http . StatusForbidden , "mirror repository is read-only" )
return
}
2015-02-16 13:00:06 +03:00
}
2014-04-10 22:20:58 +04:00
}
}
2015-03-12 08:15:01 +03:00
callback := func ( rpc string , input [ ] byte ) {
2015-12-01 04:45:55 +03:00
if rpc != "receive-pack" || isWiki {
return
}
2014-06-28 10:55:33 +04:00
2016-11-24 10:04:31 +03:00
var lastLine int64
2015-12-01 04:45:55 +03:00
for {
head := input [ lastLine : lastLine + 2 ]
if head [ 0 ] == '0' && head [ 1 ] == '0' {
size , err := strconv . ParseInt ( string ( input [ lastLine + 2 : lastLine + 4 ] ) , 16 , 32 )
if err != nil {
log . Error ( 4 , "%v" , err )
return
}
2014-06-28 10:55:33 +04:00
2015-12-01 04:45:55 +03:00
if size == 0 {
//fmt.Println(string(input[lastLine:]))
break
}
2015-07-25 16:32:04 +03:00
2015-12-01 04:45:55 +03:00
line := input [ lastLine : lastLine + size ]
idx := bytes . IndexRune ( line , '\000' )
if idx > - 1 {
line = line [ : idx ]
}
2016-06-01 14:19:01 +03:00
2015-12-01 04:45:55 +03:00
fields := strings . Fields ( string ( line ) )
if len ( fields ) >= 3 {
2016-11-24 10:04:31 +03:00
oldCommitID := fields [ 0 ] [ 4 : ]
newCommitID := fields [ 1 ]
2016-08-17 09:06:38 +03:00
refFullName := fields [ 2 ]
2015-12-01 04:45:55 +03:00
// FIXME: handle error.
2016-02-18 06:47:06 +03:00
if err = models . PushUpdate ( models . PushUpdateOptions {
2016-08-17 09:06:38 +03:00
RefFullName : refFullName ,
2016-11-24 10:04:31 +03:00
OldCommitID : oldCommitID ,
NewCommitID : newCommitID ,
2016-07-23 20:08:22 +03:00
PusherID : authUser . ID ,
2016-02-18 06:47:06 +03:00
PusherName : authUser . Name ,
RepoUserName : username ,
RepoName : reponame ,
} ) ; err == nil {
2016-12-22 12:30:52 +03:00
go models . AddTestPullRequestTask ( authUser , repo . ID , strings . TrimPrefix ( refFullName , git . BranchPrefix ) , true )
2014-06-28 10:55:33 +04:00
}
2015-12-01 04:45:55 +03:00
2014-04-11 06:27:13 +04:00
}
2015-12-01 04:45:55 +03:00
lastLine = lastLine + size
} else {
break
2014-04-11 06:27:13 +04:00
}
}
2014-06-28 10:55:33 +04:00
}
2016-06-01 14:19:01 +03:00
HTTPBackend ( ctx , & serviceConfig {
UploadPack : true ,
ReceivePack : true ,
OnSucceed : callback ,
2015-03-12 08:15:01 +03:00
} ) ( ctx . Resp , ctx . Req . Request )
2014-04-10 22:20:58 +04:00
2014-11-17 22:53:41 +03:00
runtime . GC ( )
2014-04-10 22:20:58 +04:00
}
2016-06-01 14:19:01 +03:00
type serviceConfig struct {
UploadPack bool
ReceivePack bool
OnSucceed func ( rpc string , input [ ] byte )
2014-04-10 22:20:58 +04:00
}
2016-06-01 14:19:01 +03:00
type serviceHandler struct {
cfg * serviceConfig
2014-04-10 22:20:58 +04:00
w http . ResponseWriter
r * http . Request
2016-06-01 14:19:01 +03:00
dir string
file string
}
func ( h * serviceHandler ) setHeaderNoCache ( ) {
h . w . Header ( ) . Set ( "Expires" , "Fri, 01 Jan 1980 00:00:00 GMT" )
h . w . Header ( ) . Set ( "Pragma" , "no-cache" )
h . w . Header ( ) . Set ( "Cache-Control" , "no-cache, max-age=0, must-revalidate" )
}
func ( h * serviceHandler ) setHeaderCacheForever ( ) {
now := time . Now ( ) . Unix ( )
expires := now + 31536000
h . w . Header ( ) . Set ( "Date" , fmt . Sprintf ( "%d" , now ) )
h . w . Header ( ) . Set ( "Expires" , fmt . Sprintf ( "%d" , expires ) )
h . w . Header ( ) . Set ( "Cache-Control" , "public, max-age=31536000" )
}
func ( h * serviceHandler ) sendFile ( contentType string ) {
reqFile := path . Join ( h . dir , h . file )
fi , err := os . Stat ( reqFile )
if os . IsNotExist ( err ) {
h . w . WriteHeader ( http . StatusNotFound )
return
}
h . w . Header ( ) . Set ( "Content-Type" , contentType )
h . w . Header ( ) . Set ( "Content-Length" , fmt . Sprintf ( "%d" , fi . Size ( ) ) )
h . w . Header ( ) . Set ( "Last-Modified" , fi . ModTime ( ) . Format ( http . TimeFormat ) )
http . ServeFile ( h . w , h . r , reqFile )
2014-04-10 22:20:58 +04:00
}
2015-03-12 08:15:01 +03:00
type route struct {
2016-06-01 14:19:01 +03:00
reg * regexp . Regexp
2015-03-12 08:15:01 +03:00
method string
2016-06-01 14:19:01 +03:00
handler func ( serviceHandler )
2015-03-12 08:15:01 +03:00
}
2014-04-10 22:20:58 +04:00
var routes = [ ] route {
{ regexp . MustCompile ( "(.*?)/git-upload-pack$" ) , "POST" , serviceUploadPack } ,
{ regexp . MustCompile ( "(.*?)/git-receive-pack$" ) , "POST" , serviceReceivePack } ,
{ regexp . MustCompile ( "(.*?)/info/refs$" ) , "GET" , getInfoRefs } ,
{ regexp . MustCompile ( "(.*?)/HEAD$" ) , "GET" , getTextFile } ,
{ regexp . MustCompile ( "(.*?)/objects/info/alternates$" ) , "GET" , getTextFile } ,
{ regexp . MustCompile ( "(.*?)/objects/info/http-alternates$" ) , "GET" , getTextFile } ,
{ regexp . MustCompile ( "(.*?)/objects/info/packs$" ) , "GET" , getInfoPacks } ,
{ regexp . MustCompile ( "(.*?)/objects/info/[^/]*$" ) , "GET" , getTextFile } ,
{ regexp . MustCompile ( "(.*?)/objects/[0-9a-f]{2}/[0-9a-f]{38}$" ) , "GET" , getLooseObject } ,
{ regexp . MustCompile ( "(.*?)/objects/pack/pack-[0-9a-f]{40}\\.pack$" ) , "GET" , getPackFile } ,
{ regexp . MustCompile ( "(.*?)/objects/pack/pack-[0-9a-f]{40}\\.idx$" ) , "GET" , getIdxFile } ,
}
2016-06-01 14:19:01 +03:00
// FIXME: use process module
func gitCommand ( dir string , args ... string ) [ ] byte {
cmd := exec . Command ( "git" , args ... )
cmd . Dir = dir
out , err := cmd . Output ( )
if err != nil {
log . GitLogger . Error ( 4 , fmt . Sprintf ( "%v - %s" , err , out ) )
2015-12-01 04:45:55 +03:00
}
2016-06-01 14:19:01 +03:00
return out
}
2015-12-01 04:45:55 +03:00
2016-06-01 14:19:01 +03:00
func getGitConfig ( option , dir string ) string {
out := string ( gitCommand ( dir , "config" , option ) )
return out [ 0 : len ( out ) - 1 ]
}
2015-12-01 04:45:55 +03:00
2016-06-01 14:19:01 +03:00
func getConfigSetting ( service , dir string ) bool {
service = strings . Replace ( service , "-" , "" , - 1 )
setting := getGitConfig ( "http." + service , dir )
if service == "uploadpack" {
return setting != "false"
2015-12-01 04:45:55 +03:00
}
2016-06-01 14:19:01 +03:00
return setting == "true"
2015-12-01 04:45:55 +03:00
}
2016-06-01 14:19:01 +03:00
func hasAccess ( service string , h serviceHandler , checkContentType bool ) bool {
if checkContentType {
if h . r . Header . Get ( "Content-Type" ) != fmt . Sprintf ( "application/x-git-%s-request" , service ) {
return false
2014-04-10 22:20:58 +04:00
}
}
2016-06-01 14:19:01 +03:00
if ! ( service == "upload-pack" || service == "receive-pack" ) {
return false
}
if service == "receive-pack" {
return h . cfg . ReceivePack
}
if service == "upload-pack" {
return h . cfg . UploadPack
}
2014-04-10 22:20:58 +04:00
2016-06-01 14:19:01 +03:00
return getConfigSetting ( service , h . dir )
2014-04-10 22:20:58 +04:00
}
2016-06-01 14:19:01 +03:00
func serviceRPC ( h serviceHandler , service string ) {
defer h . r . Body . Close ( )
2014-04-10 22:20:58 +04:00
2016-06-01 14:19:01 +03:00
if ! hasAccess ( service , h , true ) {
h . w . WriteHeader ( http . StatusUnauthorized )
2014-04-10 22:20:58 +04:00
return
}
2016-06-01 14:19:01 +03:00
h . w . Header ( ) . Set ( "Content-Type" , fmt . Sprintf ( "application/x-git-%s-result" , service ) )
2014-04-10 22:20:58 +04:00
2014-10-16 00:28:38 +04:00
var (
2016-06-01 14:19:01 +03:00
reqBody = h . r . Body
2014-10-16 00:28:38 +04:00
input [ ] byte
br io . Reader
err error
)
// Handle GZIP.
2016-06-01 14:19:01 +03:00
if h . r . Header . Get ( "Content-Encoding" ) == "gzip" {
2014-10-16 00:28:38 +04:00
reqBody , err = gzip . NewReader ( reqBody )
if err != nil {
log . GitLogger . Error ( 2 , "fail to create gzip reader: %v" , err )
2016-06-01 14:19:01 +03:00
h . w . WriteHeader ( http . StatusInternalServerError )
2014-10-16 00:28:38 +04:00
return
}
}
2016-06-01 14:19:01 +03:00
if h . cfg . OnSucceed != nil {
2014-10-16 00:28:38 +04:00
input , err = ioutil . ReadAll ( reqBody )
if err != nil {
log . GitLogger . Error ( 2 , "fail to read request body: %v" , err )
2016-06-01 14:19:01 +03:00
h . w . WriteHeader ( http . StatusInternalServerError )
2014-10-16 00:28:38 +04:00
return
}
2016-06-01 14:19:01 +03:00
2014-06-28 10:55:33 +04:00
br = bytes . NewReader ( input )
} else {
2014-10-16 00:28:38 +04:00
br = reqBody
2014-06-28 10:55:33 +04:00
}
2014-06-28 07:06:07 +04:00
2016-06-01 14:19:01 +03:00
cmd := exec . Command ( "git" , service , "--stateless-rpc" , h . dir )
cmd . Dir = h . dir
cmd . Stdout = h . w
2014-06-28 07:06:07 +04:00
cmd . Stdin = br
2014-10-16 00:28:38 +04:00
if err := cmd . Run ( ) ; err != nil {
2016-06-01 14:19:01 +03:00
log . GitLogger . Error ( 2 , "fail to serve RPC(%s): %v" , service , err )
h . w . WriteHeader ( http . StatusInternalServerError )
2014-04-10 22:20:58 +04:00
return
}
2016-06-01 14:19:01 +03:00
if h . cfg . OnSucceed != nil {
h . cfg . OnSucceed ( service , input )
2014-04-10 22:20:58 +04:00
}
}
2016-06-01 14:19:01 +03:00
func serviceUploadPack ( h serviceHandler ) {
serviceRPC ( h , "upload-pack" )
2014-04-10 22:20:58 +04:00
}
2016-06-01 14:19:01 +03:00
func serviceReceivePack ( h serviceHandler ) {
serviceRPC ( h , "receive-pack" )
2014-04-10 22:20:58 +04:00
}
func getServiceType ( r * http . Request ) string {
serviceType := r . FormValue ( "service" )
2016-06-01 14:19:01 +03:00
if ! strings . HasPrefix ( serviceType , "git-" ) {
2014-04-10 22:20:58 +04:00
return ""
}
return strings . Replace ( serviceType , "git-" , "" , 1 )
}
2016-06-01 14:19:01 +03:00
func updateServerInfo ( dir string ) [ ] byte {
return gitCommand ( dir , "update-server-info" )
2014-04-10 22:20:58 +04:00
}
2016-06-01 14:19:01 +03:00
func packetWrite ( str string ) [ ] byte {
s := strconv . FormatInt ( int64 ( len ( str ) + 4 ) , 16 )
if len ( s ) % 4 != 0 {
s = strings . Repeat ( "0" , 4 - len ( s ) % 4 ) + s
2014-04-10 22:20:58 +04:00
}
2016-06-01 14:19:01 +03:00
return [ ] byte ( s + str )
2014-04-10 22:20:58 +04:00
}
2016-06-01 14:19:01 +03:00
func getInfoRefs ( h serviceHandler ) {
h . setHeaderNoCache ( )
if hasAccess ( getServiceType ( h . r ) , h , false ) {
service := getServiceType ( h . r )
refs := gitCommand ( h . dir , service , "--stateless-rpc" , "--advertise-refs" , "." )
h . w . Header ( ) . Set ( "Content-Type" , fmt . Sprintf ( "application/x-git-%s-advertisement" , service ) )
h . w . WriteHeader ( http . StatusOK )
h . w . Write ( packetWrite ( "# service=git-" + service + "\n" ) )
h . w . Write ( [ ] byte ( "0000" ) )
h . w . Write ( refs )
} else {
updateServerInfo ( h . dir )
h . sendFile ( "text/plain; charset=utf-8" )
2014-04-10 22:20:58 +04:00
}
}
2016-06-01 14:19:01 +03:00
func getTextFile ( h serviceHandler ) {
h . setHeaderNoCache ( )
h . sendFile ( "text/plain" )
2014-04-10 22:20:58 +04:00
}
2016-06-01 14:19:01 +03:00
func getInfoPacks ( h serviceHandler ) {
h . setHeaderCacheForever ( )
h . sendFile ( "text/plain; charset=utf-8" )
2014-04-10 22:20:58 +04:00
}
2016-06-01 14:19:01 +03:00
func getLooseObject ( h serviceHandler ) {
h . setHeaderCacheForever ( )
h . sendFile ( "application/x-git-loose-object" )
2014-04-10 22:20:58 +04:00
}
2016-06-01 14:19:01 +03:00
func getPackFile ( h serviceHandler ) {
h . setHeaderCacheForever ( )
h . sendFile ( "application/x-git-packed-objects" )
}
2014-04-10 22:20:58 +04:00
2016-06-01 14:19:01 +03:00
func getIdxFile ( h serviceHandler ) {
h . setHeaderCacheForever ( )
h . sendFile ( "application/x-git-packed-objects-toc" )
2014-04-10 22:20:58 +04:00
}
2016-06-01 14:19:01 +03:00
func getGitRepoPath ( subdir string ) ( string , error ) {
if ! strings . HasSuffix ( subdir , ".git" ) {
subdir += ".git"
}
2014-04-10 22:20:58 +04:00
2016-06-01 14:19:01 +03:00
fpath := path . Join ( setting . RepoRootPath , subdir )
if _ , err := os . Stat ( fpath ) ; os . IsNotExist ( err ) {
return "" , err
2014-04-10 22:20:58 +04:00
}
2016-06-01 14:19:01 +03:00
return fpath , nil
2014-04-10 22:20:58 +04:00
}
2016-11-24 10:04:31 +03:00
// HTTPBackend middleware for git smart HTTP protocol
2016-06-01 14:19:01 +03:00
func HTTPBackend ( ctx * context . Context , cfg * serviceConfig ) http . HandlerFunc {
return func ( w http . ResponseWriter , r * http . Request ) {
for _ , route := range routes {
r . URL . Path = strings . ToLower ( r . URL . Path ) // blue: In case some repo name has upper case name
if m := route . reg . FindStringSubmatch ( r . URL . Path ) ; m != nil {
2016-10-04 19:58:14 +03:00
if setting . Repository . DisableHTTPGit {
2016-09-18 11:54:33 +03:00
w . WriteHeader ( http . StatusForbidden )
w . Write ( [ ] byte ( "Interacting with repositories by HTTP protocol is not allowed" ) )
return
}
2016-06-01 14:19:01 +03:00
if route . method != r . Method {
if r . Proto == "HTTP/1.1" {
w . WriteHeader ( http . StatusMethodNotAllowed )
w . Write ( [ ] byte ( "Method Not Allowed" ) )
} else {
w . WriteHeader ( http . StatusBadRequest )
w . Write ( [ ] byte ( "Bad Request" ) )
}
return
}
2014-04-10 22:20:58 +04:00
2016-06-01 14:19:01 +03:00
file := strings . Replace ( r . URL . Path , m [ 1 ] + "/" , "" , 1 )
dir , err := getGitRepoPath ( m [ 1 ] )
if err != nil {
log . GitLogger . Error ( 4 , err . Error ( ) )
ctx . Handle ( http . StatusNotFound , "HTTPBackend" , err )
return
}
2014-04-10 22:20:58 +04:00
2016-06-01 14:19:01 +03:00
route . handler ( serviceHandler { cfg , w , r , dir , file } )
return
}
}
ctx . Handle ( http . StatusNotFound , "HTTPBackend" , nil )
return
}
2014-04-10 22:20:58 +04:00
}