@@ -33,12 +33,12 @@ var _ transfer.Backend = &GiteaBackend{}
33
33
34
34
// GiteaBackend is an adapter between git-lfs-transfer library and Gitea's internal LFS API
35
35
type GiteaBackend struct {
36
- ctx context.Context
37
- server * url.URL
38
- op string
39
- token string
40
- itoken string
41
- logger transfer.Logger
36
+ ctx context.Context
37
+ server * url.URL
38
+ op string
39
+ authToken string
40
+ internalAuth string
41
+ logger transfer.Logger
42
42
}
43
43
44
44
func New (ctx context.Context , repo , op , token string , logger transfer.Logger ) (transfer.Backend , error ) {
@@ -48,7 +48,7 @@ func New(ctx context.Context, repo, op, token string, logger transfer.Logger) (t
48
48
return nil , err
49
49
}
50
50
server = server .JoinPath ("api/internal/repo" , repo , "info/lfs" )
51
- return & GiteaBackend {ctx : ctx , server : server , op : op , token : token , itoken : fmt .Sprintf ("Bearer %s" , setting .InternalToken ), logger : logger }, nil
51
+ return & GiteaBackend {ctx : ctx , server : server , op : op , authToken : token , internalAuth : fmt .Sprintf ("Bearer %s" , setting .InternalToken ), logger : logger }, nil
52
52
}
53
53
54
54
// Batch implements transfer.Backend
@@ -73,10 +73,10 @@ func (g *GiteaBackend) Batch(_ string, pointers []transfer.BatchItem, args trans
73
73
}
74
74
url := g .server .JoinPath ("objects/batch" ).String ()
75
75
headers := map [string ]string {
76
- headerAuthorisation : g . itoken ,
77
- headerAuthX : g . token ,
78
- headerAccept : mimeGitLFS ,
79
- headerContentType : mimeGitLFS ,
76
+ headerAuthorization : g . authToken ,
77
+ headerGiteaInternalAuth : g . internalAuth ,
78
+ headerAccept : mimeGitLFS ,
79
+ headerContentType : mimeGitLFS ,
80
80
}
81
81
req := newInternalRequest (g .ctx , url , http .MethodPost , headers , bodyBytes )
82
82
resp , err := req .Response ()
@@ -119,7 +119,7 @@ func (g *GiteaBackend) Batch(_ string, pointers []transfer.BatchItem, args trans
119
119
}
120
120
idMapStr := base64 .StdEncoding .EncodeToString (idMapBytes )
121
121
item .Args [argID ] = idMapStr
122
- if authHeader , ok := action .Header [headerAuthorisation ]; ok {
122
+ if authHeader , ok := action .Header [headerAuthorization ]; ok {
123
123
authHeaderB64 := base64 .StdEncoding .EncodeToString ([]byte (authHeader ))
124
124
item .Args [argToken ] = authHeaderB64
125
125
}
@@ -142,7 +142,7 @@ func (g *GiteaBackend) Batch(_ string, pointers []transfer.BatchItem, args trans
142
142
}
143
143
idMapStr := base64 .StdEncoding .EncodeToString (idMapBytes )
144
144
item .Args [argID ] = idMapStr
145
- if authHeader , ok := action .Header [headerAuthorisation ]; ok {
145
+ if authHeader , ok := action .Header [headerAuthorization ]; ok {
146
146
authHeaderB64 := base64 .StdEncoding .EncodeToString ([]byte (authHeader ))
147
147
item .Args [argToken ] = authHeaderB64
148
148
}
@@ -183,9 +183,9 @@ func (g *GiteaBackend) Download(oid string, args transfer.Args) (io.ReadCloser,
183
183
}
184
184
url := action .Href
185
185
headers := map [string ]string {
186
- headerAuthorisation : g . itoken ,
187
- headerAuthX : g . token ,
188
- headerAccept : mimeOctetStream ,
186
+ headerAuthorization : g . authToken ,
187
+ headerGiteaInternalAuth : g . internalAuth ,
188
+ headerAccept : mimeOctetStream ,
189
189
}
190
190
req := newInternalRequest (g .ctx , url , http .MethodGet , headers , nil )
191
191
resp , err := req .Response ()
@@ -229,10 +229,10 @@ func (g *GiteaBackend) Upload(oid string, size int64, r io.Reader, args transfer
229
229
}
230
230
url := action .Href
231
231
headers := map [string ]string {
232
- headerAuthorisation : g . itoken ,
233
- headerAuthX : g . token ,
234
- headerContentType : mimeOctetStream ,
235
- headerContentLength : strconv .FormatInt (size , 10 ),
232
+ headerAuthorization : g . authToken ,
233
+ headerGiteaInternalAuth : g . internalAuth ,
234
+ headerContentType : mimeOctetStream ,
235
+ headerContentLength : strconv .FormatInt (size , 10 ),
236
236
}
237
237
reqBytes , err := io .ReadAll (r )
238
238
if err != nil {
@@ -279,10 +279,10 @@ func (g *GiteaBackend) Verify(oid string, size int64, args transfer.Args) (trans
279
279
}
280
280
url := action .Href
281
281
headers := map [string ]string {
282
- headerAuthorisation : g . itoken ,
283
- headerAuthX : g . token ,
284
- headerAccept : mimeGitLFS ,
285
- headerContentType : mimeGitLFS ,
282
+ headerAuthorization : g . authToken ,
283
+ headerGiteaInternalAuth : g . internalAuth ,
284
+ headerAccept : mimeGitLFS ,
285
+ headerContentType : mimeGitLFS ,
286
286
}
287
287
req := newInternalRequest (g .ctx , url , http .MethodPost , headers , bodyBytes )
288
288
resp , err := req .Response ()
0 commit comments