142 lines
3.2 KiB
V
142 lines
3.2 KiB
V
module server
|
|
|
|
import web
|
|
import git
|
|
import net.http
|
|
import rand
|
|
import response { new_data_response, new_response }
|
|
|
|
const repos_file = 'repos.json'
|
|
|
|
['/api/repos'; get]
|
|
fn (mut app App) get_repos() web.Result {
|
|
if !app.is_authorized() {
|
|
return app.json(http.Status.unauthorized, new_response('Unauthorized.'))
|
|
}
|
|
|
|
repos := rlock app.git_mutex {
|
|
git.read_repos(app.conf.repos_file) or {
|
|
app.lerror('Failed to read repos file: $err.msg')
|
|
|
|
return app.status(http.Status.internal_server_error)
|
|
}
|
|
}
|
|
|
|
return app.json(http.Status.ok, new_data_response(repos))
|
|
}
|
|
|
|
['/api/repos/:id'; get]
|
|
fn (mut app App) get_single_repo(id string) web.Result {
|
|
if !app.is_authorized() {
|
|
return app.json(http.Status.unauthorized, new_response('Unauthorized.'))
|
|
}
|
|
|
|
repos := rlock app.git_mutex {
|
|
git.read_repos(app.conf.repos_file) or {
|
|
app.lerror('Failed to read repos file.')
|
|
|
|
return app.status(http.Status.internal_server_error)
|
|
}
|
|
}
|
|
|
|
if id !in repos {
|
|
return app.not_found()
|
|
}
|
|
|
|
repo := repos[id]
|
|
|
|
return app.json(http.Status.ok, new_data_response(repo))
|
|
}
|
|
|
|
['/api/repos'; post]
|
|
fn (mut app App) post_repo() web.Result {
|
|
if !app.is_authorized() {
|
|
return app.json(http.Status.unauthorized, new_response('Unauthorized.'))
|
|
}
|
|
|
|
new_repo := git.repo_from_params(app.query) or {
|
|
return app.json(http.Status.bad_request, new_response(err.msg))
|
|
}
|
|
|
|
id := rand.uuid_v4()
|
|
|
|
mut repos := rlock app.git_mutex {
|
|
git.read_repos(app.conf.repos_file) or {
|
|
app.lerror('Failed to read repos file.')
|
|
|
|
return app.status(http.Status.internal_server_error)
|
|
}
|
|
}
|
|
|
|
// We need to check for duplicates
|
|
for _, repo in repos {
|
|
if repo == new_repo {
|
|
return app.json(http.Status.bad_request, new_response('Duplicate repository.'))
|
|
}
|
|
}
|
|
|
|
repos[id] = new_repo
|
|
|
|
lock app.git_mutex {
|
|
git.write_repos(app.conf.repos_file, &repos) or {
|
|
return app.status(http.Status.internal_server_error)
|
|
}
|
|
}
|
|
|
|
return app.json(http.Status.ok, new_response('Repo added successfully.'))
|
|
}
|
|
|
|
['/api/repos/:id'; delete]
|
|
fn (mut app App) delete_repo(id string) web.Result {
|
|
if !app.is_authorized() {
|
|
return app.json(http.Status.unauthorized, new_response('Unauthorized.'))
|
|
}
|
|
|
|
mut repos := rlock app.git_mutex {
|
|
git.read_repos(app.conf.repos_file) or {
|
|
app.lerror('Failed to read repos file.')
|
|
|
|
return app.status(http.Status.internal_server_error)
|
|
}
|
|
}
|
|
|
|
if id !in repos {
|
|
return app.not_found()
|
|
}
|
|
|
|
repos.delete(id)
|
|
|
|
lock app.git_mutex {
|
|
git.write_repos(app.conf.repos_file, &repos) or { return app.server_error(500) }
|
|
}
|
|
|
|
return app.json(http.Status.ok, new_response('Repo removed successfully.'))
|
|
}
|
|
|
|
['/api/repos/:id'; patch]
|
|
fn (mut app App) patch_repo(id string) web.Result {
|
|
if !app.is_authorized() {
|
|
return app.json(http.Status.unauthorized, new_response('Unauthorized.'))
|
|
}
|
|
|
|
mut repos := rlock app.git_mutex {
|
|
git.read_repos(app.conf.repos_file) or {
|
|
app.lerror('Failed to read repos file.')
|
|
|
|
return app.status(http.Status.internal_server_error)
|
|
}
|
|
}
|
|
|
|
if id !in repos {
|
|
return app.not_found()
|
|
}
|
|
|
|
repos[id].patch_from_params(app.query)
|
|
|
|
lock app.git_mutex {
|
|
git.write_repos(app.conf.repos_file, &repos) or { return app.server_error(500) }
|
|
}
|
|
|
|
return app.json(http.Status.ok, new_response('Repo updated successfully.'))
|
|
}
|