mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2024-11-27 12:53:57 +01:00
Move serv hook functionality & drop GitLogger (#6993)
* Move hook functionality internally * Internalise serv logic * Remove old internal paths * finally remove the gitlogger * Disallow push on archived repositories * fix lint error * Update modules/private/key.go * Update routers/private/hook.go * Update routers/private/hook.go * Update routers/private/hook.go * Updated routers/private/serv.go * Fix LFS Locks over SSH * rev-list needs to be run by the hook process * fixup * Improve git test * Ensure that the lfs files are created with a different prefix * Reduce the replication in git_test.go * slight refactor * Remove unnecessary "/" * Restore ensureAnonymousClone * Restore ensureAnonymousClone * Run rev-list on server side * Try passing in the alternative directories instead * Mark test as skipped * Improve git test * Ensure that the lfs files are created with a different prefix * Reduce the replication in git_test.go * Remove unnecessary "/"
This commit is contained in:
parent
8a343dda39
commit
356854fc5f
25 changed files with 806 additions and 982 deletions
125
cmd/hook.go
125
cmd/hook.go
|
@ -8,15 +8,14 @@ import (
|
||||||
"bufio"
|
"bufio"
|
||||||
"bytes"
|
"bytes"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"code.gitea.io/gitea/models"
|
"code.gitea.io/gitea/models"
|
||||||
"code.gitea.io/gitea/modules/git"
|
"code.gitea.io/gitea/modules/git"
|
||||||
"code.gitea.io/gitea/modules/log"
|
|
||||||
"code.gitea.io/gitea/modules/private"
|
"code.gitea.io/gitea/modules/private"
|
||||||
"code.gitea.io/gitea/modules/util"
|
|
||||||
|
|
||||||
"github.com/urfave/cli"
|
"github.com/urfave/cli"
|
||||||
)
|
)
|
||||||
|
@ -62,12 +61,10 @@ func runHookPreReceive(c *cli.Context) error {
|
||||||
setup("hooks/pre-receive.log")
|
setup("hooks/pre-receive.log")
|
||||||
|
|
||||||
// the environment setted on serv command
|
// the environment setted on serv command
|
||||||
repoID, _ := strconv.ParseInt(os.Getenv(models.ProtectedBranchRepoID), 10, 64)
|
|
||||||
isWiki := (os.Getenv(models.EnvRepoIsWiki) == "true")
|
isWiki := (os.Getenv(models.EnvRepoIsWiki) == "true")
|
||||||
username := os.Getenv(models.EnvRepoUsername)
|
username := os.Getenv(models.EnvRepoUsername)
|
||||||
reponame := os.Getenv(models.EnvRepoName)
|
reponame := os.Getenv(models.EnvRepoName)
|
||||||
userIDStr := os.Getenv(models.EnvPusherID)
|
userID, _ := strconv.ParseInt(os.Getenv(models.EnvPusherID), 10, 64)
|
||||||
repoPath := models.RepoPath(username, reponame)
|
|
||||||
|
|
||||||
buf := bytes.NewBuffer(nil)
|
buf := bytes.NewBuffer(nil)
|
||||||
scanner := bufio.NewScanner(os.Stdin)
|
scanner := bufio.NewScanner(os.Stdin)
|
||||||
|
@ -91,35 +88,19 @@ func runHookPreReceive(c *cli.Context) error {
|
||||||
|
|
||||||
// If the ref is a branch, check if it's protected
|
// If the ref is a branch, check if it's protected
|
||||||
if strings.HasPrefix(refFullName, git.BranchPrefix) {
|
if strings.HasPrefix(refFullName, git.BranchPrefix) {
|
||||||
branchName := strings.TrimPrefix(refFullName, git.BranchPrefix)
|
statusCode, msg := private.HookPreReceive(username, reponame, private.HookOptions{
|
||||||
protectBranch, err := private.GetProtectedBranchBy(repoID, branchName)
|
OldCommitID: oldCommitID,
|
||||||
if err != nil {
|
NewCommitID: newCommitID,
|
||||||
fail("Internal error", fmt.Sprintf("retrieve protected branches information failed: %v", err))
|
RefFullName: refFullName,
|
||||||
}
|
UserID: userID,
|
||||||
|
GitAlternativeObjectDirectories: os.Getenv(private.GitAlternativeObjectDirectories),
|
||||||
if protectBranch != nil && protectBranch.IsProtected() {
|
GitObjectDirectory: os.Getenv(private.GitObjectDirectory),
|
||||||
// check and deletion
|
})
|
||||||
if newCommitID == git.EmptySHA {
|
switch statusCode {
|
||||||
fail(fmt.Sprintf("branch %s is protected from deletion", branchName), "")
|
case http.StatusInternalServerError:
|
||||||
}
|
fail("Internal Server Error", msg)
|
||||||
|
case http.StatusForbidden:
|
||||||
// detect force push
|
fail(msg, "")
|
||||||
if git.EmptySHA != oldCommitID {
|
|
||||||
output, err := git.NewCommand("rev-list", "--max-count=1", oldCommitID, "^"+newCommitID).RunInDir(repoPath)
|
|
||||||
if err != nil {
|
|
||||||
fail("Internal error", "Fail to detect force push: %v", err)
|
|
||||||
} else if len(output) > 0 {
|
|
||||||
fail(fmt.Sprintf("branch %s is protected from force push", branchName), "")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
userID, _ := strconv.ParseInt(userIDStr, 10, 64)
|
|
||||||
canPush, err := private.CanUserPush(protectBranch.ID, userID)
|
|
||||||
if err != nil {
|
|
||||||
fail("Internal error", "Fail to detect user can push: %v", err)
|
|
||||||
} else if !canPush {
|
|
||||||
fail(fmt.Sprintf("protected branch %s can not be pushed to", branchName), "")
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -145,7 +126,6 @@ func runHookPostReceive(c *cli.Context) error {
|
||||||
setup("hooks/post-receive.log")
|
setup("hooks/post-receive.log")
|
||||||
|
|
||||||
// the environment setted on serv command
|
// the environment setted on serv command
|
||||||
repoID, _ := strconv.ParseInt(os.Getenv(models.ProtectedBranchRepoID), 10, 64)
|
|
||||||
repoUser := os.Getenv(models.EnvRepoUsername)
|
repoUser := os.Getenv(models.EnvRepoUsername)
|
||||||
isWiki := (os.Getenv(models.EnvRepoIsWiki) == "true")
|
isWiki := (os.Getenv(models.EnvRepoIsWiki) == "true")
|
||||||
repoName := os.Getenv(models.EnvRepoName)
|
repoName := os.Getenv(models.EnvRepoName)
|
||||||
|
@ -172,64 +152,31 @@ func runHookPostReceive(c *cli.Context) error {
|
||||||
newCommitID := string(fields[1])
|
newCommitID := string(fields[1])
|
||||||
refFullName := string(fields[2])
|
refFullName := string(fields[2])
|
||||||
|
|
||||||
// Only trigger activity updates for changes to branches or
|
res, err := private.HookPostReceive(repoUser, repoName, private.HookOptions{
|
||||||
// tags. Updates to other refs (eg, refs/notes, refs/changes,
|
OldCommitID: oldCommitID,
|
||||||
// or other less-standard refs spaces are ignored since there
|
NewCommitID: newCommitID,
|
||||||
// may be a very large number of them).
|
RefFullName: refFullName,
|
||||||
if strings.HasPrefix(refFullName, git.BranchPrefix) || strings.HasPrefix(refFullName, git.TagPrefix) {
|
UserID: pusherID,
|
||||||
if err := private.PushUpdate(models.PushUpdateOptions{
|
UserName: pusherName,
|
||||||
RefFullName: refFullName,
|
})
|
||||||
OldCommitID: oldCommitID,
|
|
||||||
NewCommitID: newCommitID,
|
if res == nil {
|
||||||
PusherID: pusherID,
|
fail("Internal Server Error", err)
|
||||||
PusherName: pusherName,
|
|
||||||
RepoUserName: repoUser,
|
|
||||||
RepoName: repoName,
|
|
||||||
}); err != nil {
|
|
||||||
log.GitLogger.Error("Update: %v", err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if newCommitID != git.EmptySHA && strings.HasPrefix(refFullName, git.BranchPrefix) {
|
if res["message"] == false {
|
||||||
branch := strings.TrimPrefix(refFullName, git.BranchPrefix)
|
continue
|
||||||
repo, pullRequestAllowed, err := private.GetRepository(repoID)
|
|
||||||
if err != nil {
|
|
||||||
log.GitLogger.Error("get repo: %v", err)
|
|
||||||
break
|
|
||||||
}
|
|
||||||
if !pullRequestAllowed {
|
|
||||||
break
|
|
||||||
}
|
|
||||||
|
|
||||||
baseRepo := repo
|
|
||||||
if repo.IsFork {
|
|
||||||
baseRepo = repo.BaseRepo
|
|
||||||
}
|
|
||||||
|
|
||||||
if !repo.IsFork && branch == baseRepo.DefaultBranch {
|
|
||||||
break
|
|
||||||
}
|
|
||||||
|
|
||||||
pr, err := private.ActivePullRequest(baseRepo.ID, repo.ID, baseRepo.DefaultBranch, branch)
|
|
||||||
if err != nil {
|
|
||||||
log.GitLogger.Error("get active pr: %v", err)
|
|
||||||
break
|
|
||||||
}
|
|
||||||
|
|
||||||
fmt.Fprintln(os.Stderr, "")
|
|
||||||
if pr == nil {
|
|
||||||
if repo.IsFork {
|
|
||||||
branch = fmt.Sprintf("%s:%s", repo.OwnerName, branch)
|
|
||||||
}
|
|
||||||
fmt.Fprintf(os.Stderr, "Create a new pull request for '%s':\n", branch)
|
|
||||||
fmt.Fprintf(os.Stderr, " %s/compare/%s...%s\n", baseRepo.HTMLURL(), util.PathEscapeSegments(baseRepo.DefaultBranch), util.PathEscapeSegments(branch))
|
|
||||||
} else {
|
|
||||||
fmt.Fprint(os.Stderr, "Visit the existing pull request:\n")
|
|
||||||
fmt.Fprintf(os.Stderr, " %s/pulls/%d\n", baseRepo.HTMLURL(), pr.Index)
|
|
||||||
}
|
|
||||||
fmt.Fprintln(os.Stderr, "")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fmt.Fprintln(os.Stderr, "")
|
||||||
|
if res["create"] == true {
|
||||||
|
fmt.Fprintf(os.Stderr, "Create a new pull request for '%s':\n", res["branch"])
|
||||||
|
fmt.Fprintf(os.Stderr, " %s\n", res["url"])
|
||||||
|
} else {
|
||||||
|
fmt.Fprint(os.Stderr, "Visit the existing pull request:\n")
|
||||||
|
fmt.Fprintf(os.Stderr, " %s\n", res["url"])
|
||||||
|
}
|
||||||
|
fmt.Fprintln(os.Stderr, "")
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
|
|
177
cmd/serv.go
177
cmd/serv.go
|
@ -8,9 +8,11 @@ package cmd
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"net/url"
|
||||||
"os"
|
"os"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"path/filepath"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
@ -68,7 +70,6 @@ func setup(logPath string) {
|
||||||
log.DelLogger("console")
|
log.DelLogger("console")
|
||||||
setting.NewContext()
|
setting.NewContext()
|
||||||
checkLFSVersion()
|
checkLFSVersion()
|
||||||
log.NewGitLogger(filepath.Join(setting.LogRootPath, logPath))
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func parseCmd(cmd string) (string, string) {
|
func parseCmd(cmd string) (string, string) {
|
||||||
|
@ -95,15 +96,14 @@ func fail(userMessage, logMessage string, args ...interface{}) {
|
||||||
if !setting.ProdMode {
|
if !setting.ProdMode {
|
||||||
fmt.Fprintf(os.Stderr, logMessage+"\n", args...)
|
fmt.Fprintf(os.Stderr, logMessage+"\n", args...)
|
||||||
}
|
}
|
||||||
log.GitLogger.Fatal(logMessage, args...)
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
log.GitLogger.Close()
|
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
func runServ(c *cli.Context) error {
|
func runServ(c *cli.Context) error {
|
||||||
|
// FIXME: This needs to internationalised
|
||||||
setup("serv.log")
|
setup("serv.log")
|
||||||
|
|
||||||
if setting.SSH.Disabled {
|
if setting.SSH.Disabled {
|
||||||
|
@ -116,9 +116,23 @@ func runServ(c *cli.Context) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
keys := strings.Split(c.Args()[0], "-")
|
||||||
|
if len(keys) != 2 || keys[0] != "key" {
|
||||||
|
fail("Key ID format error", "Invalid key argument: %s", c.Args()[0])
|
||||||
|
}
|
||||||
|
keyID := com.StrTo(keys[1]).MustInt64()
|
||||||
|
|
||||||
cmd := os.Getenv("SSH_ORIGINAL_COMMAND")
|
cmd := os.Getenv("SSH_ORIGINAL_COMMAND")
|
||||||
if len(cmd) == 0 {
|
if len(cmd) == 0 {
|
||||||
println("Hi there, You've successfully authenticated, but Gitea does not provide shell access.")
|
key, user, err := private.ServNoCommand(keyID)
|
||||||
|
if err != nil {
|
||||||
|
fail("Internal error", "Failed to check provided key: %v", err)
|
||||||
|
}
|
||||||
|
if key.Type == models.KeyTypeDeploy {
|
||||||
|
println("Hi there! You've successfully authenticated with the deploy key named " + key.Name + ", but Gitea does not provide shell access.")
|
||||||
|
} else {
|
||||||
|
println("Hi there: " + user.Name + "! You've successfully authenticated with the key named " + key.Name + ", but Gitea does not provide shell access.")
|
||||||
|
}
|
||||||
println("If this is unexpected, please log in with password and setup Gitea under another user.")
|
println("If this is unexpected, please log in with password and setup Gitea under another user.")
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
@ -152,41 +166,19 @@ func runServ(c *cli.Context) error {
|
||||||
fail("Error while trying to create PPROF_DATA_PATH", "Error while trying to create PPROF_DATA_PATH: %v", err)
|
fail("Error while trying to create PPROF_DATA_PATH", "Error while trying to create PPROF_DATA_PATH: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
stopCPUProfiler := pprof.DumpCPUProfileForUsername(setting.PprofDataPath, username)
|
stopCPUProfiler, err := pprof.DumpCPUProfileForUsername(setting.PprofDataPath, username)
|
||||||
|
if err != nil {
|
||||||
|
fail("Internal Server Error", "Unable to start CPU profile: %v", err)
|
||||||
|
}
|
||||||
defer func() {
|
defer func() {
|
||||||
stopCPUProfiler()
|
stopCPUProfiler()
|
||||||
pprof.DumpMemProfileForUsername(setting.PprofDataPath, username)
|
err := pprof.DumpMemProfileForUsername(setting.PprofDataPath, username)
|
||||||
|
if err != nil {
|
||||||
|
fail("Internal Server Error", "Unable to dump Mem Profile: %v", err)
|
||||||
|
}
|
||||||
}()
|
}()
|
||||||
}
|
}
|
||||||
|
|
||||||
var (
|
|
||||||
isWiki bool
|
|
||||||
unitType = models.UnitTypeCode
|
|
||||||
unitName = "code"
|
|
||||||
)
|
|
||||||
if strings.HasSuffix(reponame, ".wiki") {
|
|
||||||
isWiki = true
|
|
||||||
unitType = models.UnitTypeWiki
|
|
||||||
unitName = "wiki"
|
|
||||||
reponame = reponame[:len(reponame)-5]
|
|
||||||
}
|
|
||||||
|
|
||||||
os.Setenv(models.EnvRepoUsername, username)
|
|
||||||
if isWiki {
|
|
||||||
os.Setenv(models.EnvRepoIsWiki, "true")
|
|
||||||
} else {
|
|
||||||
os.Setenv(models.EnvRepoIsWiki, "false")
|
|
||||||
}
|
|
||||||
os.Setenv(models.EnvRepoName, reponame)
|
|
||||||
|
|
||||||
repo, err := private.GetRepositoryByOwnerAndName(username, reponame)
|
|
||||||
if err != nil {
|
|
||||||
if strings.Contains(err.Error(), "Failed to get repository: repository does not exist") {
|
|
||||||
fail(accessDenied, "Repository does not exist: %s/%s", username, reponame)
|
|
||||||
}
|
|
||||||
fail("Internal error", "Failed to get repository: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
requestedMode, has := allowedCommands[verb]
|
requestedMode, has := allowedCommands[verb]
|
||||||
if !has {
|
if !has {
|
||||||
fail("Unknown git command", "Unknown git command %s", verb)
|
fail("Unknown git command", "Unknown git command %s", verb)
|
||||||
|
@ -202,97 +194,36 @@ func runServ(c *cli.Context) error {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Prohibit push to mirror repositories.
|
results, err := private.ServCommand(keyID, username, reponame, requestedMode, verb, lfsVerb)
|
||||||
if requestedMode > models.AccessModeRead && repo.IsMirror {
|
if err != nil {
|
||||||
fail("mirror repository is read-only", "")
|
if private.IsErrServCommand(err) {
|
||||||
}
|
errServCommand := err.(private.ErrServCommand)
|
||||||
|
if errServCommand.StatusCode != http.StatusInternalServerError {
|
||||||
// Allow anonymous clone for public repositories.
|
fail("Unauthorized", errServCommand.Error())
|
||||||
var (
|
} else {
|
||||||
keyID int64
|
fail("Internal Server Error", errServCommand.Error())
|
||||||
user *models.User
|
}
|
||||||
)
|
}
|
||||||
if requestedMode == models.AccessModeWrite || repo.IsPrivate || setting.Service.RequireSignInView {
|
fail("Internal Server Error", err.Error())
|
||||||
keys := strings.Split(c.Args()[0], "-")
|
|
||||||
if len(keys) != 2 {
|
|
||||||
fail("Key ID format error", "Invalid key argument: %s", c.Args()[0])
|
|
||||||
}
|
|
||||||
|
|
||||||
key, err := private.GetPublicKeyByID(com.StrTo(keys[1]).MustInt64())
|
|
||||||
if err != nil {
|
|
||||||
fail("Invalid key ID", "Invalid key ID[%s]: %v", c.Args()[0], err)
|
|
||||||
}
|
|
||||||
keyID = key.ID
|
|
||||||
|
|
||||||
// Check deploy key or user key.
|
|
||||||
if key.Type == models.KeyTypeDeploy {
|
|
||||||
// Now we have to get the deploy key for this repo
|
|
||||||
deployKey, err := private.GetDeployKey(key.ID, repo.ID)
|
|
||||||
if err != nil {
|
|
||||||
fail("Key access denied", "Failed to access internal api: [key_id: %d, repo_id: %d]", key.ID, repo.ID)
|
|
||||||
}
|
|
||||||
|
|
||||||
if deployKey == nil {
|
|
||||||
fail("Key access denied", "Deploy key access denied: [key_id: %d, repo_id: %d]", key.ID, repo.ID)
|
|
||||||
}
|
|
||||||
|
|
||||||
if deployKey.Mode < requestedMode {
|
|
||||||
fail("Key permission denied", "Cannot push with read-only deployment key: %d to repo_id: %d", key.ID, repo.ID)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Update deploy key activity.
|
|
||||||
if err = private.UpdateDeployKeyUpdated(key.ID, repo.ID); err != nil {
|
|
||||||
fail("Internal error", "UpdateDeployKey: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// FIXME: Deploy keys aren't really the owner of the repo pushing changes
|
|
||||||
// however we don't have good way of representing deploy keys in hook.go
|
|
||||||
// so for now use the owner
|
|
||||||
os.Setenv(models.EnvPusherName, username)
|
|
||||||
os.Setenv(models.EnvPusherID, fmt.Sprintf("%d", repo.OwnerID))
|
|
||||||
} else {
|
|
||||||
user, err = private.GetUserByKeyID(key.ID)
|
|
||||||
if err != nil {
|
|
||||||
fail("internal error", "Failed to get user by key ID(%d): %v", keyID, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if !user.IsActive || user.ProhibitLogin {
|
|
||||||
fail("Your account is not active or has been disabled by Administrator",
|
|
||||||
"User %s is disabled and have no access to repository %s",
|
|
||||||
user.Name, repoPath)
|
|
||||||
}
|
|
||||||
|
|
||||||
mode, err := private.CheckUnitUser(user.ID, repo.ID, user.IsAdmin, unitType)
|
|
||||||
if err != nil {
|
|
||||||
fail("Internal error", "Failed to check access: %v", err)
|
|
||||||
} else if *mode < requestedMode {
|
|
||||||
clientMessage := accessDenied
|
|
||||||
if *mode >= models.AccessModeRead {
|
|
||||||
clientMessage = "You do not have sufficient authorization for this action"
|
|
||||||
}
|
|
||||||
fail(clientMessage,
|
|
||||||
"User %s does not have level %v access to repository %s's "+unitName,
|
|
||||||
user.Name, requestedMode, repoPath)
|
|
||||||
}
|
|
||||||
|
|
||||||
os.Setenv(models.EnvPusherName, user.Name)
|
|
||||||
os.Setenv(models.EnvPusherID, fmt.Sprintf("%d", user.ID))
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
os.Setenv(models.EnvRepoIsWiki, strconv.FormatBool(results.IsWiki))
|
||||||
|
os.Setenv(models.EnvRepoName, results.RepoName)
|
||||||
|
os.Setenv(models.EnvRepoUsername, results.OwnerName)
|
||||||
|
os.Setenv(models.EnvPusherName, username)
|
||||||
|
os.Setenv(models.EnvPusherID, strconv.FormatInt(results.UserID, 10))
|
||||||
|
os.Setenv(models.ProtectedBranchRepoID, strconv.FormatInt(results.RepoID, 10))
|
||||||
|
|
||||||
//LFS token authentication
|
//LFS token authentication
|
||||||
if verb == lfsAuthenticateVerb {
|
if verb == lfsAuthenticateVerb {
|
||||||
url := fmt.Sprintf("%s%s/%s.git/info/lfs", setting.AppURL, username, repo.Name)
|
url := fmt.Sprintf("%s%s/%s.git/info/lfs", setting.AppURL, url.PathEscape(results.OwnerName), url.PathEscape(results.RepoName))
|
||||||
|
|
||||||
now := time.Now()
|
now := time.Now()
|
||||||
claims := jwt.MapClaims{
|
claims := jwt.MapClaims{
|
||||||
"repo": repo.ID,
|
"repo": results.RepoID,
|
||||||
"op": lfsVerb,
|
"op": lfsVerb,
|
||||||
"exp": now.Add(setting.LFS.HTTPAuthExpiry).Unix(),
|
"exp": now.Add(setting.LFS.HTTPAuthExpiry).Unix(),
|
||||||
"nbf": now.Unix(),
|
"nbf": now.Unix(),
|
||||||
}
|
"user": results.UserID,
|
||||||
if user != nil {
|
|
||||||
claims["user"] = user.ID
|
|
||||||
}
|
}
|
||||||
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
||||||
|
|
||||||
|
@ -313,7 +244,6 @@ func runServ(c *cli.Context) error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fail("Internal error", "Failed to encode LFS json response: %v", err)
|
fail("Internal error", "Failed to encode LFS json response: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -329,13 +259,8 @@ func runServ(c *cli.Context) error {
|
||||||
} else {
|
} else {
|
||||||
gitcmd = exec.Command(verb, repoPath)
|
gitcmd = exec.Command(verb, repoPath)
|
||||||
}
|
}
|
||||||
if isWiki {
|
|
||||||
if err = private.InitWiki(repo.ID); err != nil {
|
|
||||||
fail("Internal error", "Failed to init wiki repo: %v", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
os.Setenv(models.ProtectedBranchRepoID, fmt.Sprintf("%d", repo.ID))
|
os.Setenv(models.ProtectedBranchRepoID, fmt.Sprintf("%d", results.RepoID))
|
||||||
|
|
||||||
gitcmd.Dir = setting.RepoRootPath
|
gitcmd.Dir = setting.RepoRootPath
|
||||||
gitcmd.Stdout = os.Stdout
|
gitcmd.Stdout = os.Stdout
|
||||||
|
@ -346,9 +271,9 @@ func runServ(c *cli.Context) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Update user key activity.
|
// Update user key activity.
|
||||||
if keyID > 0 {
|
if results.KeyID > 0 {
|
||||||
if err = private.UpdatePublicKeyUpdated(keyID); err != nil {
|
if err = private.UpdatePublicKeyInRepo(results.KeyID, results.RepoID); err != nil {
|
||||||
fail("Internal error", "UpdatePublicKey: %v", err)
|
fail("Internal error", "UpdatePublicKeyInRepo: %v", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -27,7 +27,6 @@ log groups:
|
||||||
* The Router logger
|
* The Router logger
|
||||||
* The Access logger
|
* The Access logger
|
||||||
* The XORM logger
|
* The XORM logger
|
||||||
* A logger called the `GitLogger` which is used during hooks.
|
|
||||||
|
|
||||||
There is also the go log logger.
|
There is also the go log logger.
|
||||||
|
|
||||||
|
@ -180,21 +179,6 @@ which will not be inherited from the `[log]` or relevant
|
||||||
* `EXPRESSION` will default to `""`
|
* `EXPRESSION` will default to `""`
|
||||||
* `PREFIX` will default to `""`
|
* `PREFIX` will default to `""`
|
||||||
|
|
||||||
### The Hook and Serv "GitLoggers"
|
|
||||||
|
|
||||||
These are less well defined loggers. Essentially these should only be
|
|
||||||
used within Gitea's subsystems and cannot be configured at present.
|
|
||||||
|
|
||||||
They will write log files in:
|
|
||||||
|
|
||||||
* `%(ROOT_PATH)/hooks/pre-receive.log`
|
|
||||||
* `%(ROOT_PATH)/hooks/update.log`
|
|
||||||
* `%(ROOT_PATH)/hooks/post-receive.log`
|
|
||||||
* `%(ROOT_PATH)/serv.log`
|
|
||||||
* `%(ROOT_PATH)/http.log`
|
|
||||||
|
|
||||||
In the future these logs may be rationalised.
|
|
||||||
|
|
||||||
## Log outputs
|
## Log outputs
|
||||||
|
|
||||||
Gitea provides 4 possible log outputs:
|
Gitea provides 4 possible log outputs:
|
||||||
|
|
|
@ -1,44 +0,0 @@
|
||||||
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
||||||
// Use of this source code is governed by a MIT-style
|
|
||||||
// license that can be found in the LICENSE file.
|
|
||||||
|
|
||||||
package integrations
|
|
||||||
|
|
||||||
import (
|
|
||||||
"encoding/json"
|
|
||||||
"fmt"
|
|
||||||
"net/http"
|
|
||||||
"testing"
|
|
||||||
|
|
||||||
"code.gitea.io/gitea/models"
|
|
||||||
"code.gitea.io/gitea/modules/setting"
|
|
||||||
"code.gitea.io/gitea/modules/util"
|
|
||||||
|
|
||||||
"github.com/stretchr/testify/assert"
|
|
||||||
)
|
|
||||||
|
|
||||||
func assertProtectedBranch(t *testing.T, repoID int64, branchName string, isErr, canPush bool) {
|
|
||||||
reqURL := fmt.Sprintf("/api/internal/branch/%d/%s", repoID, util.PathEscapeSegments(branchName))
|
|
||||||
req := NewRequest(t, "GET", reqURL)
|
|
||||||
t.Log(reqURL)
|
|
||||||
req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", setting.InternalToken))
|
|
||||||
|
|
||||||
resp := MakeRequest(t, req, NoExpectedStatus)
|
|
||||||
if isErr {
|
|
||||||
assert.EqualValues(t, http.StatusInternalServerError, resp.Code)
|
|
||||||
} else {
|
|
||||||
assert.EqualValues(t, http.StatusOK, resp.Code)
|
|
||||||
var branch models.ProtectedBranch
|
|
||||||
t.Log(resp.Body.String())
|
|
||||||
assert.NoError(t, json.Unmarshal(resp.Body.Bytes(), &branch))
|
|
||||||
assert.Equal(t, canPush, !branch.IsProtected())
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestInternal_GetProtectedBranch(t *testing.T) {
|
|
||||||
prepareTestEnv(t)
|
|
||||||
|
|
||||||
assertProtectedBranch(t, 1, "master", false, true)
|
|
||||||
assertProtectedBranch(t, 1, "dev", false, true)
|
|
||||||
assertProtectedBranch(t, 1, "lunny/dev", false, true)
|
|
||||||
}
|
|
|
@ -27,7 +27,7 @@ func PushingEnvironment(doer *User, repo *Repository) []string {
|
||||||
"GIT_COMMITTER_NAME="+sig.Name,
|
"GIT_COMMITTER_NAME="+sig.Name,
|
||||||
"GIT_COMMITTER_EMAIL="+sig.Email,
|
"GIT_COMMITTER_EMAIL="+sig.Email,
|
||||||
EnvRepoName+"="+repo.Name,
|
EnvRepoName+"="+repo.Name,
|
||||||
EnvRepoUsername+"="+repo.OwnerName,
|
EnvRepoUsername+"="+repo.MustOwnerName(),
|
||||||
EnvRepoIsWiki+"="+isWiki,
|
EnvRepoIsWiki+"="+isWiki,
|
||||||
EnvPusherName+"="+doer.Name,
|
EnvPusherName+"="+doer.Name,
|
||||||
EnvPusherID+"="+fmt.Sprintf("%d", doer.ID),
|
EnvPusherID+"="+fmt.Sprintf("%d", doer.ID),
|
||||||
|
|
|
@ -5,9 +5,7 @@
|
||||||
package log
|
package log
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"os"
|
"os"
|
||||||
"path"
|
|
||||||
"runtime"
|
"runtime"
|
||||||
"strings"
|
"strings"
|
||||||
)
|
)
|
||||||
|
@ -17,9 +15,7 @@ var (
|
||||||
DEFAULT = "default"
|
DEFAULT = "default"
|
||||||
// NamedLoggers map of named loggers
|
// NamedLoggers map of named loggers
|
||||||
NamedLoggers = make(map[string]*Logger)
|
NamedLoggers = make(map[string]*Logger)
|
||||||
// GitLogger logger for git
|
prefix string
|
||||||
GitLogger *Logger
|
|
||||||
prefix string
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// NewLogger create a logger for the default logger
|
// NewLogger create a logger for the default logger
|
||||||
|
@ -72,19 +68,6 @@ func GetLogger(name string) *Logger {
|
||||||
return NamedLoggers[DEFAULT]
|
return NamedLoggers[DEFAULT]
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewGitLogger create a logger for git
|
|
||||||
// FIXME: use same log level as other loggers.
|
|
||||||
func NewGitLogger(logPath string) {
|
|
||||||
path := path.Dir(logPath)
|
|
||||||
|
|
||||||
if err := os.MkdirAll(path, os.ModePerm); err != nil {
|
|
||||||
Fatal("Failed to create dir %s: %v", path, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
GitLogger = newLogger("git", 0)
|
|
||||||
GitLogger.SetLogger("file", "file", fmt.Sprintf(`{"level":"TRACE","filename":"%s","rotate":true,"maxsize":%d,"daily":true,"maxdays":7,"compress":true,"compressionLevel":-1, "stacktraceLevel":"NONE"}`, logPath, 1<<28))
|
|
||||||
}
|
|
||||||
|
|
||||||
// GetLevel returns the minimum logger level
|
// GetLevel returns the minimum logger level
|
||||||
func GetLevel() Level {
|
func GetLevel() Level {
|
||||||
return NamedLoggers[DEFAULT].GetLevel()
|
return NamedLoggers[DEFAULT].GetLevel()
|
||||||
|
|
|
@ -9,34 +9,30 @@ import (
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"runtime"
|
"runtime"
|
||||||
"runtime/pprof"
|
"runtime/pprof"
|
||||||
|
|
||||||
"code.gitea.io/gitea/modules/log"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// DumpMemProfileForUsername dumps a memory profile at pprofDataPath as memprofile_<username>_<temporary id>
|
// DumpMemProfileForUsername dumps a memory profile at pprofDataPath as memprofile_<username>_<temporary id>
|
||||||
func DumpMemProfileForUsername(pprofDataPath, username string) {
|
func DumpMemProfileForUsername(pprofDataPath, username string) error {
|
||||||
f, err := ioutil.TempFile(pprofDataPath, fmt.Sprintf("memprofile_%s_", username))
|
f, err := ioutil.TempFile(pprofDataPath, fmt.Sprintf("memprofile_%s_", username))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.GitLogger.Fatal("Could not create memory profile: %v", err)
|
return err
|
||||||
}
|
}
|
||||||
defer f.Close()
|
defer f.Close()
|
||||||
runtime.GC() // get up-to-date statistics
|
runtime.GC() // get up-to-date statistics
|
||||||
if err := pprof.WriteHeapProfile(f); err != nil {
|
return pprof.WriteHeapProfile(f)
|
||||||
log.GitLogger.Fatal("Could not write memory profile: %v", err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// DumpCPUProfileForUsername dumps a CPU profile at pprofDataPath as cpuprofile_<username>_<temporary id>
|
// DumpCPUProfileForUsername dumps a CPU profile at pprofDataPath as cpuprofile_<username>_<temporary id>
|
||||||
// it returns the stop function which stops, writes and closes the CPU profile file
|
// it returns the stop function which stops, writes and closes the CPU profile file
|
||||||
func DumpCPUProfileForUsername(pprofDataPath, username string) func() {
|
func DumpCPUProfileForUsername(pprofDataPath, username string) (func(), error) {
|
||||||
f, err := ioutil.TempFile(pprofDataPath, fmt.Sprintf("cpuprofile_%s_", username))
|
f, err := ioutil.TempFile(pprofDataPath, fmt.Sprintf("cpuprofile_%s_", username))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.GitLogger.Fatal("Could not create cpu profile: %v", err)
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
pprof.StartCPUProfile(f)
|
pprof.StartCPUProfile(f)
|
||||||
return func() {
|
return func() {
|
||||||
pprof.StopCPUProfile()
|
pprof.StopCPUProfile()
|
||||||
f.Close()
|
f.Close()
|
||||||
}
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,67 +0,0 @@
|
||||||
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
||||||
// Use of this source code is governed by a MIT-style
|
|
||||||
// license that can be found in the LICENSE file.
|
|
||||||
|
|
||||||
package private
|
|
||||||
|
|
||||||
import (
|
|
||||||
"encoding/json"
|
|
||||||
"fmt"
|
|
||||||
|
|
||||||
"code.gitea.io/gitea/models"
|
|
||||||
"code.gitea.io/gitea/modules/log"
|
|
||||||
"code.gitea.io/gitea/modules/setting"
|
|
||||||
"code.gitea.io/gitea/modules/util"
|
|
||||||
)
|
|
||||||
|
|
||||||
// GetProtectedBranchBy get protected branch information
|
|
||||||
func GetProtectedBranchBy(repoID int64, branchName string) (*models.ProtectedBranch, error) {
|
|
||||||
// Ask for running deliver hook and test pull request tasks.
|
|
||||||
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/branch/%d/%s", repoID, util.PathEscapeSegments(branchName))
|
|
||||||
log.GitLogger.Trace("GetProtectedBranchBy: %s", reqURL)
|
|
||||||
|
|
||||||
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
var branch models.ProtectedBranch
|
|
||||||
if err := json.NewDecoder(resp.Body).Decode(&branch); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
// All 2XX status codes are accepted and others will return an error
|
|
||||||
if resp.StatusCode/100 != 2 {
|
|
||||||
return nil, fmt.Errorf("Failed to get protected branch: %s", decodeJSONError(resp).Err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return &branch, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// CanUserPush returns if user can push
|
|
||||||
func CanUserPush(protectedBranchID, userID int64) (bool, error) {
|
|
||||||
// Ask for running deliver hook and test pull request tasks.
|
|
||||||
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/protectedbranch/%d/%d", protectedBranchID, userID)
|
|
||||||
log.GitLogger.Trace("CanUserPush: %s", reqURL)
|
|
||||||
|
|
||||||
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
||||||
if err != nil {
|
|
||||||
return false, err
|
|
||||||
}
|
|
||||||
|
|
||||||
var canPush = make(map[string]interface{})
|
|
||||||
if err := json.NewDecoder(resp.Body).Decode(&canPush); err != nil {
|
|
||||||
return false, err
|
|
||||||
}
|
|
||||||
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
// All 2XX status codes are accepted and others will return an error
|
|
||||||
if resp.StatusCode/100 != 2 {
|
|
||||||
return false, fmt.Errorf("Failed to retrieve push user: %s", decodeJSONError(resp).Err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return canPush["can_push"].(bool), nil
|
|
||||||
}
|
|
84
modules/private/hook.go
Normal file
84
modules/private/hook.go
Normal file
|
@ -0,0 +1,84 @@
|
||||||
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a MIT-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package private
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"net/url"
|
||||||
|
|
||||||
|
"code.gitea.io/gitea/modules/setting"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Git environment variables
|
||||||
|
const (
|
||||||
|
GitAlternativeObjectDirectories = "GIT_ALTERNATE_OBJECT_DIRECTORIES"
|
||||||
|
GitObjectDirectory = "GIT_OBJECT_DIRECTORY"
|
||||||
|
GitQuarantinePath = "GIT_QUARANTINE_PATH"
|
||||||
|
)
|
||||||
|
|
||||||
|
// HookOptions represents the options for the Hook calls
|
||||||
|
type HookOptions struct {
|
||||||
|
OldCommitID string
|
||||||
|
NewCommitID string
|
||||||
|
RefFullName string
|
||||||
|
UserID int64
|
||||||
|
UserName string
|
||||||
|
GitObjectDirectory string
|
||||||
|
GitAlternativeObjectDirectories string
|
||||||
|
}
|
||||||
|
|
||||||
|
// HookPreReceive check whether the provided commits are allowed
|
||||||
|
func HookPreReceive(ownerName, repoName string, opts HookOptions) (int, string) {
|
||||||
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/hook/pre-receive/%s/%s?old=%s&new=%s&ref=%s&userID=%d&gitObjectDirectory=%s&gitAlternativeObjectDirectories=%s",
|
||||||
|
url.PathEscape(ownerName),
|
||||||
|
url.PathEscape(repoName),
|
||||||
|
url.QueryEscape(opts.OldCommitID),
|
||||||
|
url.QueryEscape(opts.NewCommitID),
|
||||||
|
url.QueryEscape(opts.RefFullName),
|
||||||
|
opts.UserID,
|
||||||
|
url.QueryEscape(opts.GitObjectDirectory),
|
||||||
|
url.QueryEscape(opts.GitAlternativeObjectDirectories),
|
||||||
|
)
|
||||||
|
|
||||||
|
resp, err := newInternalRequest(reqURL, "GET").Response()
|
||||||
|
if err != nil {
|
||||||
|
return http.StatusInternalServerError, fmt.Sprintf("Unable to contact gitea: %v", err.Error())
|
||||||
|
}
|
||||||
|
defer resp.Body.Close()
|
||||||
|
|
||||||
|
if resp.StatusCode != http.StatusOK {
|
||||||
|
return resp.StatusCode, decodeJSONError(resp).Err
|
||||||
|
}
|
||||||
|
|
||||||
|
return http.StatusOK, ""
|
||||||
|
}
|
||||||
|
|
||||||
|
// HookPostReceive updates services and users
|
||||||
|
func HookPostReceive(ownerName, repoName string, opts HookOptions) (map[string]interface{}, string) {
|
||||||
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/hook/post-receive/%s/%s?old=%s&new=%s&ref=%s&userID=%d&username=%s",
|
||||||
|
url.PathEscape(ownerName),
|
||||||
|
url.PathEscape(repoName),
|
||||||
|
url.QueryEscape(opts.OldCommitID),
|
||||||
|
url.QueryEscape(opts.NewCommitID),
|
||||||
|
url.QueryEscape(opts.RefFullName),
|
||||||
|
opts.UserID,
|
||||||
|
url.QueryEscape(opts.UserName))
|
||||||
|
|
||||||
|
resp, err := newInternalRequest(reqURL, "GET").Response()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Sprintf("Unable to contact gitea: %v", err.Error())
|
||||||
|
}
|
||||||
|
defer resp.Body.Close()
|
||||||
|
|
||||||
|
if resp.StatusCode != http.StatusOK {
|
||||||
|
return nil, decodeJSONError(resp).Err
|
||||||
|
}
|
||||||
|
res := map[string]interface{}{}
|
||||||
|
_ = json.NewDecoder(resp.Body).Decode(&res)
|
||||||
|
|
||||||
|
return res, ""
|
||||||
|
}
|
|
@ -10,11 +10,8 @@ import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
|
||||||
|
|
||||||
"code.gitea.io/gitea/models"
|
|
||||||
"code.gitea.io/gitea/modules/httplib"
|
"code.gitea.io/gitea/modules/httplib"
|
||||||
"code.gitea.io/gitea/modules/log"
|
|
||||||
"code.gitea.io/gitea/modules/setting"
|
"code.gitea.io/gitea/modules/setting"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -51,49 +48,3 @@ func newInternalRequest(url, method string) *httplib.Request {
|
||||||
}
|
}
|
||||||
return req
|
return req
|
||||||
}
|
}
|
||||||
|
|
||||||
// CheckUnitUser check whether user could visit the unit of this repository
|
|
||||||
func CheckUnitUser(userID, repoID int64, isAdmin bool, unitType models.UnitType) (*models.AccessMode, error) {
|
|
||||||
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/repositories/%d/user/%d/checkunituser?isAdmin=%t&unitType=%d", repoID, userID, isAdmin, unitType)
|
|
||||||
log.GitLogger.Trace("CheckUnitUser: %s", reqURL)
|
|
||||||
|
|
||||||
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
if resp.StatusCode != 200 {
|
|
||||||
return nil, fmt.Errorf("Failed to CheckUnitUser: %s", decodeJSONError(resp).Err)
|
|
||||||
}
|
|
||||||
|
|
||||||
var a models.AccessMode
|
|
||||||
if err := json.NewDecoder(resp.Body).Decode(&a); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return &a, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// GetRepositoryByOwnerAndName returns the repository by given ownername and reponame.
|
|
||||||
func GetRepositoryByOwnerAndName(ownerName, repoName string) (*models.Repository, error) {
|
|
||||||
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/repo/%s/%s", url.PathEscape(ownerName), url.PathEscape(repoName))
|
|
||||||
log.GitLogger.Trace("GetRepositoryByOwnerAndName: %s", reqURL)
|
|
||||||
|
|
||||||
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
if resp.StatusCode != 200 {
|
|
||||||
return nil, fmt.Errorf("Failed to get repository: %s", decodeJSONError(resp).Err)
|
|
||||||
}
|
|
||||||
|
|
||||||
var repo models.Repository
|
|
||||||
if err := json.NewDecoder(resp.Body).Decode(&repo); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return &repo, nil
|
|
||||||
}
|
|
||||||
|
|
|
@ -5,127 +5,15 @@
|
||||||
package private
|
package private
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
"code.gitea.io/gitea/models"
|
|
||||||
"code.gitea.io/gitea/modules/log"
|
|
||||||
"code.gitea.io/gitea/modules/setting"
|
"code.gitea.io/gitea/modules/setting"
|
||||||
)
|
)
|
||||||
|
|
||||||
// UpdateDeployKeyUpdated update deploy key updates
|
// UpdatePublicKeyInRepo update public key and if necessary deploy key updates
|
||||||
func UpdateDeployKeyUpdated(keyID int64, repoID int64) error {
|
func UpdatePublicKeyInRepo(keyID, repoID int64) error {
|
||||||
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/repositories/%d/keys/%d/update", repoID, keyID)
|
|
||||||
log.GitLogger.Trace("UpdateDeployKeyUpdated: %s", reqURL)
|
|
||||||
|
|
||||||
resp, err := newInternalRequest(reqURL, "POST").Response()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
// All 2XX status codes are accepted and others will return an error
|
|
||||||
if resp.StatusCode/100 != 2 {
|
|
||||||
return fmt.Errorf("Failed to update deploy key: %s", decodeJSONError(resp).Err)
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// GetDeployKey check if repo has deploy key
|
|
||||||
func GetDeployKey(keyID, repoID int64) (*models.DeployKey, error) {
|
|
||||||
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/repositories/%d/keys/%d", repoID, keyID)
|
|
||||||
log.GitLogger.Trace("GetDeployKey: %s", reqURL)
|
|
||||||
|
|
||||||
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
switch resp.StatusCode {
|
|
||||||
case 404:
|
|
||||||
return nil, nil
|
|
||||||
case 200:
|
|
||||||
var dKey models.DeployKey
|
|
||||||
if err := json.NewDecoder(resp.Body).Decode(&dKey); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return &dKey, nil
|
|
||||||
default:
|
|
||||||
return nil, fmt.Errorf("Failed to get deploy key: %s", decodeJSONError(resp).Err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// HasDeployKey check if repo has deploy key
|
|
||||||
func HasDeployKey(keyID, repoID int64) (bool, error) {
|
|
||||||
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/repositories/%d/has-keys/%d", repoID, keyID)
|
|
||||||
log.GitLogger.Trace("HasDeployKey: %s", reqURL)
|
|
||||||
|
|
||||||
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
||||||
if err != nil {
|
|
||||||
return false, err
|
|
||||||
}
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
if resp.StatusCode == 200 {
|
|
||||||
return true, nil
|
|
||||||
}
|
|
||||||
return false, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// GetPublicKeyByID get public ssh key by his ID
|
|
||||||
func GetPublicKeyByID(keyID int64) (*models.PublicKey, error) {
|
|
||||||
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/ssh/%d", keyID)
|
|
||||||
log.GitLogger.Trace("GetPublicKeyByID: %s", reqURL)
|
|
||||||
|
|
||||||
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
if resp.StatusCode != 200 {
|
|
||||||
return nil, fmt.Errorf("Failed to get repository: %s", decodeJSONError(resp).Err)
|
|
||||||
}
|
|
||||||
|
|
||||||
var pKey models.PublicKey
|
|
||||||
if err := json.NewDecoder(resp.Body).Decode(&pKey); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return &pKey, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// GetUserByKeyID get user attached to key
|
|
||||||
func GetUserByKeyID(keyID int64) (*models.User, error) {
|
|
||||||
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/ssh/%d/user", keyID)
|
|
||||||
log.GitLogger.Trace("GetUserByKeyID: %s", reqURL)
|
|
||||||
|
|
||||||
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
if resp.StatusCode != 200 {
|
|
||||||
return nil, fmt.Errorf("Failed to get user: %s", decodeJSONError(resp).Err)
|
|
||||||
}
|
|
||||||
|
|
||||||
var user models.User
|
|
||||||
if err := json.NewDecoder(resp.Body).Decode(&user); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return &user, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// UpdatePublicKeyUpdated update public key updates
|
|
||||||
func UpdatePublicKeyUpdated(keyID int64) error {
|
|
||||||
// Ask for running deliver hook and test pull request tasks.
|
// Ask for running deliver hook and test pull request tasks.
|
||||||
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/ssh/%d/update", keyID)
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/ssh/%d/update/%d", keyID, repoID)
|
||||||
log.GitLogger.Trace("UpdatePublicKeyUpdated: %s", reqURL)
|
|
||||||
|
|
||||||
resp, err := newInternalRequest(reqURL, "POST").Response()
|
resp, err := newInternalRequest(reqURL, "POST").Response()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
|
|
@ -1,40 +0,0 @@
|
||||||
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
||||||
// Use of this source code is governed by a MIT-style
|
|
||||||
// license that can be found in the LICENSE file.
|
|
||||||
|
|
||||||
package private
|
|
||||||
|
|
||||||
import (
|
|
||||||
"encoding/json"
|
|
||||||
"fmt"
|
|
||||||
|
|
||||||
"code.gitea.io/gitea/models"
|
|
||||||
"code.gitea.io/gitea/modules/log"
|
|
||||||
"code.gitea.io/gitea/modules/setting"
|
|
||||||
)
|
|
||||||
|
|
||||||
// PushUpdate update publick key updates
|
|
||||||
func PushUpdate(opt models.PushUpdateOptions) error {
|
|
||||||
// Ask for running deliver hook and test pull request tasks.
|
|
||||||
reqURL := setting.LocalURL + "api/internal/push/update"
|
|
||||||
log.GitLogger.Trace("PushUpdate: %s", reqURL)
|
|
||||||
|
|
||||||
body, err := json.Marshal(&opt)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
resp, err := newInternalRequest(reqURL, "POST").Body(body).Response()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
// All 2XX status codes are accepted and others will return an error
|
|
||||||
if resp.StatusCode/100 != 2 {
|
|
||||||
return fmt.Errorf("Failed to update public key: %s", decodeJSONError(resp).Err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
|
@ -1,68 +0,0 @@
|
||||||
// Copyright 2018 The Gitea Authors. All rights reserved.
|
|
||||||
// Use of this source code is governed by a MIT-style
|
|
||||||
// license that can be found in the LICENSE file.
|
|
||||||
|
|
||||||
package private
|
|
||||||
|
|
||||||
import (
|
|
||||||
"encoding/json"
|
|
||||||
"fmt"
|
|
||||||
"net/url"
|
|
||||||
|
|
||||||
"code.gitea.io/gitea/models"
|
|
||||||
"code.gitea.io/gitea/modules/log"
|
|
||||||
"code.gitea.io/gitea/modules/setting"
|
|
||||||
)
|
|
||||||
|
|
||||||
// GetRepository return the repository by its ID and a bool about if it's allowed to have PR
|
|
||||||
func GetRepository(repoID int64) (*models.Repository, bool, error) {
|
|
||||||
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/repository/%d", repoID)
|
|
||||||
log.GitLogger.Trace("GetRepository: %s", reqURL)
|
|
||||||
|
|
||||||
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
||||||
if err != nil {
|
|
||||||
return nil, false, err
|
|
||||||
}
|
|
||||||
|
|
||||||
var repoInfo struct {
|
|
||||||
Repository *models.Repository
|
|
||||||
AllowPullRequest bool
|
|
||||||
}
|
|
||||||
if err := json.NewDecoder(resp.Body).Decode(&repoInfo); err != nil {
|
|
||||||
return nil, false, err
|
|
||||||
}
|
|
||||||
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
// All 2XX status codes are accepted and others will return an error
|
|
||||||
if resp.StatusCode/100 != 2 {
|
|
||||||
return nil, false, fmt.Errorf("failed to retrieve repository: %s", decodeJSONError(resp).Err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return repoInfo.Repository, repoInfo.AllowPullRequest, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// ActivePullRequest returns an active pull request if it exists
|
|
||||||
func ActivePullRequest(baseRepoID int64, headRepoID int64, baseBranch, headBranch string) (*models.PullRequest, error) {
|
|
||||||
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/active-pull-request?baseRepoID=%d&headRepoID=%d&baseBranch=%s&headBranch=%s", baseRepoID, headRepoID, url.QueryEscape(baseBranch), url.QueryEscape(headBranch))
|
|
||||||
log.GitLogger.Trace("ActivePullRequest: %s", reqURL)
|
|
||||||
|
|
||||||
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
var pr *models.PullRequest
|
|
||||||
if err := json.NewDecoder(resp.Body).Decode(&pr); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
// All 2XX status codes are accepted and others will return an error
|
|
||||||
if resp.StatusCode/100 != 2 {
|
|
||||||
return nil, fmt.Errorf("failed to retrieve pull request: %s", decodeJSONError(resp).Err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return pr, nil
|
|
||||||
}
|
|
106
modules/private/serv.go
Normal file
106
modules/private/serv.go
Normal file
|
@ -0,0 +1,106 @@
|
||||||
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a MIT-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package private
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"net/url"
|
||||||
|
|
||||||
|
"code.gitea.io/gitea/models"
|
||||||
|
"code.gitea.io/gitea/modules/setting"
|
||||||
|
)
|
||||||
|
|
||||||
|
// KeyAndOwner is the response from ServNoCommand
|
||||||
|
type KeyAndOwner struct {
|
||||||
|
Key *models.PublicKey `json:"key"`
|
||||||
|
Owner *models.User `json:"user"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// ServNoCommand returns information about the provided key
|
||||||
|
func ServNoCommand(keyID int64) (*models.PublicKey, *models.User, error) {
|
||||||
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/serv/none/%d",
|
||||||
|
keyID)
|
||||||
|
resp, err := newInternalRequest(reqURL, "GET").Response()
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
defer resp.Body.Close()
|
||||||
|
if resp.StatusCode != http.StatusOK {
|
||||||
|
return nil, nil, fmt.Errorf("%s", decodeJSONError(resp).Err)
|
||||||
|
}
|
||||||
|
|
||||||
|
var keyAndOwner KeyAndOwner
|
||||||
|
if err := json.NewDecoder(resp.Body).Decode(&keyAndOwner); err != nil {
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
return keyAndOwner.Key, keyAndOwner.Owner, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// ServCommandResults are the results of a call to the private route serv
|
||||||
|
type ServCommandResults struct {
|
||||||
|
IsWiki bool
|
||||||
|
IsDeployKey bool
|
||||||
|
KeyID int64
|
||||||
|
KeyName string
|
||||||
|
UserName string
|
||||||
|
UserID int64
|
||||||
|
OwnerName string
|
||||||
|
RepoName string
|
||||||
|
RepoID int64
|
||||||
|
}
|
||||||
|
|
||||||
|
// ErrServCommand is an error returned from ServCommmand.
|
||||||
|
type ErrServCommand struct {
|
||||||
|
Results ServCommandResults
|
||||||
|
Type string
|
||||||
|
Err string
|
||||||
|
StatusCode int
|
||||||
|
}
|
||||||
|
|
||||||
|
func (err ErrServCommand) Error() string {
|
||||||
|
return err.Err
|
||||||
|
}
|
||||||
|
|
||||||
|
// IsErrServCommand checks if an error is a ErrServCommand.
|
||||||
|
func IsErrServCommand(err error) bool {
|
||||||
|
_, ok := err.(ErrServCommand)
|
||||||
|
return ok
|
||||||
|
}
|
||||||
|
|
||||||
|
// ServCommand preps for a serv call
|
||||||
|
func ServCommand(keyID int64, ownerName, repoName string, mode models.AccessMode, verbs ...string) (*ServCommandResults, error) {
|
||||||
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/serv/command/%d/%s/%s?mode=%d",
|
||||||
|
keyID,
|
||||||
|
url.PathEscape(ownerName),
|
||||||
|
url.PathEscape(repoName),
|
||||||
|
mode)
|
||||||
|
for _, verb := range verbs {
|
||||||
|
if verb != "" {
|
||||||
|
reqURL += fmt.Sprintf("&verb=%s", url.QueryEscape(verb))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resp, err := newInternalRequest(reqURL, "GET").Response()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
defer resp.Body.Close()
|
||||||
|
if resp.StatusCode != http.StatusOK {
|
||||||
|
var errServCommand ErrServCommand
|
||||||
|
if err := json.NewDecoder(resp.Body).Decode(&errServCommand); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
errServCommand.StatusCode = resp.StatusCode
|
||||||
|
return nil, errServCommand
|
||||||
|
}
|
||||||
|
var results ServCommandResults
|
||||||
|
if err := json.NewDecoder(resp.Body).Decode(&results); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &results, nil
|
||||||
|
|
||||||
|
}
|
|
@ -1,33 +0,0 @@
|
||||||
// Copyright 2018 The Gitea Authors. All rights reserved.
|
|
||||||
// Use of this source code is governed by a MIT-style
|
|
||||||
// license that can be found in the LICENSE file.
|
|
||||||
|
|
||||||
package private
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
|
|
||||||
"code.gitea.io/gitea/modules/log"
|
|
||||||
"code.gitea.io/gitea/modules/setting"
|
|
||||||
)
|
|
||||||
|
|
||||||
// InitWiki initwiki via repo id
|
|
||||||
func InitWiki(repoID int64) error {
|
|
||||||
// Ask for running deliver hook and test pull request tasks.
|
|
||||||
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/repositories/%d/wiki/init", repoID)
|
|
||||||
log.GitLogger.Trace("InitWiki: %s", reqURL)
|
|
||||||
|
|
||||||
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
// All 2XX status codes are accepted and others will return an error
|
|
||||||
if resp.StatusCode/100 != 2 {
|
|
||||||
return fmt.Errorf("Failed to init wiki: %s", decodeJSONError(resp).Err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
|
@ -5,7 +5,6 @@
|
||||||
package routers
|
package routers
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"path"
|
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
@ -99,7 +98,6 @@ func GlobalInit() {
|
||||||
models.InitSyncMirrors()
|
models.InitSyncMirrors()
|
||||||
models.InitDeliverHooks()
|
models.InitDeliverHooks()
|
||||||
models.InitTestPullRequests()
|
models.InitTestPullRequests()
|
||||||
log.NewGitLogger(path.Join(setting.LogRootPath, "http.log"))
|
|
||||||
}
|
}
|
||||||
if models.EnableSQLite3 {
|
if models.EnableSQLite3 {
|
||||||
log.Info("SQLite3 Supported")
|
log.Info("SQLite3 Supported")
|
||||||
|
|
|
@ -1,52 +0,0 @@
|
||||||
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
||||||
// Use of this source code is governed by a MIT-style
|
|
||||||
// license that can be found in the LICENSE file.
|
|
||||||
|
|
||||||
package private
|
|
||||||
|
|
||||||
import (
|
|
||||||
"code.gitea.io/gitea/models"
|
|
||||||
|
|
||||||
macaron "gopkg.in/macaron.v1"
|
|
||||||
)
|
|
||||||
|
|
||||||
// GetProtectedBranchBy get protected branch information
|
|
||||||
func GetProtectedBranchBy(ctx *macaron.Context) {
|
|
||||||
repoID := ctx.ParamsInt64(":id")
|
|
||||||
branchName := ctx.Params("*")
|
|
||||||
protectBranch, err := models.GetProtectedBranchBy(repoID, branchName)
|
|
||||||
if err != nil {
|
|
||||||
ctx.JSON(500, map[string]interface{}{
|
|
||||||
"err": err.Error(),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
} else if protectBranch != nil {
|
|
||||||
ctx.JSON(200, protectBranch)
|
|
||||||
} else {
|
|
||||||
ctx.JSON(200, &models.ProtectedBranch{
|
|
||||||
ID: 0,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// CanUserPush returns if user push
|
|
||||||
func CanUserPush(ctx *macaron.Context) {
|
|
||||||
pbID := ctx.ParamsInt64(":pbid")
|
|
||||||
userID := ctx.ParamsInt64(":userid")
|
|
||||||
|
|
||||||
protectBranch, err := models.GetProtectedBranchByID(pbID)
|
|
||||||
if err != nil {
|
|
||||||
ctx.JSON(500, map[string]interface{}{
|
|
||||||
"err": err.Error(),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
} else if protectBranch != nil {
|
|
||||||
ctx.JSON(200, map[string]interface{}{
|
|
||||||
"can_push": protectBranch.CanUserPush(userID),
|
|
||||||
})
|
|
||||||
} else {
|
|
||||||
ctx.JSON(200, map[string]interface{}{
|
|
||||||
"can_push": false,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
209
routers/private/hook.go
Normal file
209
routers/private/hook.go
Normal file
|
@ -0,0 +1,209 @@
|
||||||
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a MIT-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
// Package private includes all internal routes. The package name internal is ideal but Golang is not allowed, so we use private as package name instead.
|
||||||
|
package private
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"code.gitea.io/gitea/models"
|
||||||
|
"code.gitea.io/gitea/modules/git"
|
||||||
|
"code.gitea.io/gitea/modules/log"
|
||||||
|
"code.gitea.io/gitea/modules/private"
|
||||||
|
"code.gitea.io/gitea/modules/util"
|
||||||
|
|
||||||
|
macaron "gopkg.in/macaron.v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
// HookPreReceive checks whether a individual commit is acceptable
|
||||||
|
func HookPreReceive(ctx *macaron.Context) {
|
||||||
|
ownerName := ctx.Params(":owner")
|
||||||
|
repoName := ctx.Params(":repo")
|
||||||
|
oldCommitID := ctx.QueryTrim("old")
|
||||||
|
newCommitID := ctx.QueryTrim("new")
|
||||||
|
refFullName := ctx.QueryTrim("ref")
|
||||||
|
userID := ctx.QueryInt64("userID")
|
||||||
|
gitObjectDirectory := ctx.QueryTrim("gitObjectDirectory")
|
||||||
|
gitAlternativeObjectDirectories := ctx.QueryTrim("gitAlternativeObjectDirectories")
|
||||||
|
|
||||||
|
branchName := strings.TrimPrefix(refFullName, git.BranchPrefix)
|
||||||
|
repo, err := models.GetRepositoryByOwnerAndName(ownerName, repoName)
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Unable to get repository: %s/%s Error: %v", ownerName, repoName, err)
|
||||||
|
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
||||||
|
"err": err.Error(),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
repo.OwnerName = ownerName
|
||||||
|
protectBranch, err := models.GetProtectedBranchBy(repo.ID, branchName)
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Unable to get protected branch: %s in %-v Error: %v", branchName, repo, err)
|
||||||
|
ctx.JSON(500, map[string]interface{}{
|
||||||
|
"err": err.Error(),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if protectBranch != nil && protectBranch.IsProtected() {
|
||||||
|
// check and deletion
|
||||||
|
if newCommitID == git.EmptySHA {
|
||||||
|
log.Warn("Forbidden: Branch: %s in %-v is protected from deletion", branchName, repo)
|
||||||
|
ctx.JSON(http.StatusForbidden, map[string]interface{}{
|
||||||
|
"err": fmt.Sprintf("branch %s is protected from deletion", branchName),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// detect force push
|
||||||
|
if git.EmptySHA != oldCommitID {
|
||||||
|
env := append(os.Environ(),
|
||||||
|
private.GitAlternativeObjectDirectories+"="+gitAlternativeObjectDirectories,
|
||||||
|
private.GitObjectDirectory+"="+gitObjectDirectory,
|
||||||
|
private.GitQuarantinePath+"="+gitObjectDirectory,
|
||||||
|
)
|
||||||
|
|
||||||
|
output, err := git.NewCommand("rev-list", "--max-count=1", oldCommitID, "^"+newCommitID).RunInDirWithEnv(repo.RepoPath(), env)
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Unable to detect force push between: %s and %s in %-v Error: %v", oldCommitID, newCommitID, repo, err)
|
||||||
|
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
||||||
|
"err": fmt.Sprintf("Fail to detect force push: %v", err),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
} else if len(output) > 0 {
|
||||||
|
log.Warn("Forbidden: Branch: %s in %-v is protected from force push", branchName, repo)
|
||||||
|
ctx.JSON(http.StatusForbidden, map[string]interface{}{
|
||||||
|
"err": fmt.Sprintf("branch %s is protected from force push", branchName),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if !protectBranch.CanUserPush(userID) {
|
||||||
|
log.Warn("Forbidden: User %d cannot push to protected branch: %s in %-v", userID, branchName, repo)
|
||||||
|
ctx.JSON(http.StatusForbidden, map[string]interface{}{
|
||||||
|
"err": fmt.Sprintf("protected branch %s can not be pushed to", branchName),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
ctx.PlainText(http.StatusOK, []byte("ok"))
|
||||||
|
}
|
||||||
|
|
||||||
|
// HookPostReceive updates services and users
|
||||||
|
func HookPostReceive(ctx *macaron.Context) {
|
||||||
|
ownerName := ctx.Params(":owner")
|
||||||
|
repoName := ctx.Params(":repo")
|
||||||
|
oldCommitID := ctx.Query("old")
|
||||||
|
newCommitID := ctx.Query("new")
|
||||||
|
refFullName := ctx.Query("ref")
|
||||||
|
userID := ctx.QueryInt64("userID")
|
||||||
|
userName := ctx.Query("username")
|
||||||
|
|
||||||
|
branch := refFullName
|
||||||
|
if strings.HasPrefix(refFullName, git.BranchPrefix) {
|
||||||
|
branch = strings.TrimPrefix(refFullName, git.BranchPrefix)
|
||||||
|
} else if strings.HasPrefix(refFullName, git.TagPrefix) {
|
||||||
|
branch = strings.TrimPrefix(refFullName, git.TagPrefix)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Only trigger activity updates for changes to branches or
|
||||||
|
// tags. Updates to other refs (eg, refs/notes, refs/changes,
|
||||||
|
// or other less-standard refs spaces are ignored since there
|
||||||
|
// may be a very large number of them).
|
||||||
|
if strings.HasPrefix(refFullName, git.BranchPrefix) || strings.HasPrefix(refFullName, git.TagPrefix) {
|
||||||
|
if err := models.PushUpdate(branch, models.PushUpdateOptions{
|
||||||
|
RefFullName: refFullName,
|
||||||
|
OldCommitID: oldCommitID,
|
||||||
|
NewCommitID: newCommitID,
|
||||||
|
PusherID: userID,
|
||||||
|
PusherName: userName,
|
||||||
|
RepoUserName: ownerName,
|
||||||
|
RepoName: repoName,
|
||||||
|
}); err != nil {
|
||||||
|
log.Error("Failed to Update: %s/%s Branch: %s Error: %v", ownerName, repoName, branch, err)
|
||||||
|
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
||||||
|
"err": fmt.Sprintf("Failed to Update: %s/%s Branch: %s Error: %v", ownerName, repoName, branch, err),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if newCommitID != git.EmptySHA && strings.HasPrefix(refFullName, git.BranchPrefix) {
|
||||||
|
repo, err := models.GetRepositoryByOwnerAndName(ownerName, repoName)
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Failed to get repository: %s/%s Error: %v", ownerName, repoName, err)
|
||||||
|
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
||||||
|
"err": fmt.Sprintf("Failed to get repository: %s/%s Error: %v", ownerName, repoName, err),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
repo.OwnerName = ownerName
|
||||||
|
|
||||||
|
pullRequestAllowed := repo.AllowsPulls()
|
||||||
|
if !pullRequestAllowed {
|
||||||
|
ctx.JSON(http.StatusOK, map[string]interface{}{
|
||||||
|
"message": false,
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
baseRepo := repo
|
||||||
|
if repo.IsFork {
|
||||||
|
if err := repo.GetBaseRepo(); err != nil {
|
||||||
|
log.Error("Failed to get Base Repository of Forked repository: %-v Error: %v", repo, err)
|
||||||
|
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
||||||
|
"err": fmt.Sprintf("Failed to get Base Repository of Forked repository: %-v Error: %v", repo, err),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
baseRepo = repo.BaseRepo
|
||||||
|
}
|
||||||
|
|
||||||
|
if !repo.IsFork && branch == baseRepo.DefaultBranch {
|
||||||
|
ctx.JSON(http.StatusOK, map[string]interface{}{
|
||||||
|
"message": false,
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
pr, err := models.GetUnmergedPullRequest(repo.ID, baseRepo.ID, branch, baseRepo.DefaultBranch)
|
||||||
|
if err != nil && !models.IsErrPullRequestNotExist(err) {
|
||||||
|
log.Error("Failed to get active PR in: %-v Branch: %s to: %-v Branch: %s Error: %v", repo, branch, baseRepo, baseRepo.DefaultBranch, err)
|
||||||
|
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
||||||
|
"err": fmt.Sprintf(
|
||||||
|
"Failed to get active PR in: %-v Branch: %s to: %-v Branch: %s Error: %v", repo, branch, baseRepo, baseRepo.DefaultBranch, err),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if pr == nil {
|
||||||
|
if repo.IsFork {
|
||||||
|
branch = fmt.Sprintf("%s:%s", repo.OwnerName, branch)
|
||||||
|
}
|
||||||
|
ctx.JSON(http.StatusOK, map[string]interface{}{
|
||||||
|
"message": true,
|
||||||
|
"create": true,
|
||||||
|
"branch": branch,
|
||||||
|
"url": fmt.Sprintf("%s/compare/%s...%s", baseRepo.HTMLURL(), util.PathEscapeSegments(baseRepo.DefaultBranch), util.PathEscapeSegments(branch)),
|
||||||
|
})
|
||||||
|
} else {
|
||||||
|
ctx.JSON(http.StatusOK, map[string]interface{}{
|
||||||
|
"message": true,
|
||||||
|
"create": false,
|
||||||
|
"branch": branch,
|
||||||
|
"url": fmt.Sprintf("%s/pulls/%d", baseRepo.HTMLURL(), pr.Index),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
ctx.JSON(http.StatusOK, map[string]interface{}{
|
||||||
|
"message": false,
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
|
@ -76,19 +76,10 @@ func CheckUnitUser(ctx *macaron.Context) {
|
||||||
// These APIs will be invoked by internal commands for example `gitea serv` and etc.
|
// These APIs will be invoked by internal commands for example `gitea serv` and etc.
|
||||||
func RegisterRoutes(m *macaron.Macaron) {
|
func RegisterRoutes(m *macaron.Macaron) {
|
||||||
m.Group("/", func() {
|
m.Group("/", func() {
|
||||||
m.Get("/ssh/:id", GetPublicKeyByID)
|
m.Post("/ssh/:id/update/:repoid", UpdatePublicKeyInRepo)
|
||||||
m.Get("/ssh/:id/user", GetUserByKeyID)
|
m.Get("/hook/pre-receive/:owner/:repo", HookPreReceive)
|
||||||
m.Post("/ssh/:id/update", UpdatePublicKey)
|
m.Get("/hook/post-receive/:owner/:repo", HookPostReceive)
|
||||||
m.Post("/repositories/:repoid/keys/:keyid/update", UpdateDeployKey)
|
m.Get("/serv/none/:keyid", ServNoCommand)
|
||||||
m.Get("/repositories/:repoid/user/:userid/checkunituser", CheckUnitUser)
|
m.Get("/serv/command/:keyid/:owner/:repo", ServCommand)
|
||||||
m.Get("/repositories/:repoid/has-keys/:keyid", HasDeployKey)
|
|
||||||
m.Get("/repositories/:repoid/keys/:keyid", GetDeployKey)
|
|
||||||
m.Get("/repositories/:repoid/wiki/init", InitWiki)
|
|
||||||
m.Post("/push/update", PushUpdate)
|
|
||||||
m.Get("/protectedbranch/:pbid/:userid", CanUserPush)
|
|
||||||
m.Get("/repo/:owner/:repo", GetRepositoryByOwnerAndName)
|
|
||||||
m.Get("/branch/:id/*", GetProtectedBranchBy)
|
|
||||||
m.Get("/repository/:rid", GetRepository)
|
|
||||||
m.Get("/active-pull-request", GetActivePullRequest)
|
|
||||||
}, CheckInternalToken)
|
}, CheckInternalToken)
|
||||||
}
|
}
|
||||||
|
|
|
@ -12,12 +12,23 @@ import (
|
||||||
macaron "gopkg.in/macaron.v1"
|
macaron "gopkg.in/macaron.v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
// UpdateDeployKey update deploy key updates
|
// UpdatePublicKeyInRepo update public key and deploy key updates
|
||||||
func UpdateDeployKey(ctx *macaron.Context) {
|
func UpdatePublicKeyInRepo(ctx *macaron.Context) {
|
||||||
|
keyID := ctx.ParamsInt64(":id")
|
||||||
repoID := ctx.ParamsInt64(":repoid")
|
repoID := ctx.ParamsInt64(":repoid")
|
||||||
keyID := ctx.ParamsInt64(":keyid")
|
if err := models.UpdatePublicKeyUpdated(keyID); err != nil {
|
||||||
|
ctx.JSON(500, map[string]interface{}{
|
||||||
|
"err": err.Error(),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
deployKey, err := models.GetDeployKeyByRepo(keyID, repoID)
|
deployKey, err := models.GetDeployKeyByRepo(keyID, repoID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
if models.IsErrDeployKeyNotExist(err) {
|
||||||
|
ctx.PlainText(200, []byte("success"))
|
||||||
|
return
|
||||||
|
}
|
||||||
ctx.JSON(500, map[string]interface{}{
|
ctx.JSON(500, map[string]interface{}{
|
||||||
"err": err.Error(),
|
"err": err.Error(),
|
||||||
})
|
})
|
||||||
|
@ -30,73 +41,6 @@ func UpdateDeployKey(ctx *macaron.Context) {
|
||||||
})
|
})
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
ctx.PlainText(200, []byte("success"))
|
|
||||||
}
|
|
||||||
|
|
||||||
// UpdatePublicKey update publick key updates
|
|
||||||
func UpdatePublicKey(ctx *macaron.Context) {
|
|
||||||
keyID := ctx.ParamsInt64(":id")
|
|
||||||
if err := models.UpdatePublicKeyUpdated(keyID); err != nil {
|
|
||||||
ctx.JSON(500, map[string]interface{}{
|
|
||||||
"err": err.Error(),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
ctx.PlainText(200, []byte("success"))
|
ctx.PlainText(200, []byte("success"))
|
||||||
}
|
}
|
||||||
|
|
||||||
//GetPublicKeyByID chainload to models.GetPublicKeyByID
|
|
||||||
func GetPublicKeyByID(ctx *macaron.Context) {
|
|
||||||
keyID := ctx.ParamsInt64(":id")
|
|
||||||
key, err := models.GetPublicKeyByID(keyID)
|
|
||||||
if err != nil {
|
|
||||||
ctx.JSON(500, map[string]interface{}{
|
|
||||||
"err": err.Error(),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
ctx.JSON(200, key)
|
|
||||||
}
|
|
||||||
|
|
||||||
//GetUserByKeyID chainload to models.GetUserByKeyID
|
|
||||||
func GetUserByKeyID(ctx *macaron.Context) {
|
|
||||||
keyID := ctx.ParamsInt64(":id")
|
|
||||||
user, err := models.GetUserByKeyID(keyID)
|
|
||||||
if err != nil {
|
|
||||||
ctx.JSON(500, map[string]interface{}{
|
|
||||||
"err": err.Error(),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
ctx.JSON(200, user)
|
|
||||||
}
|
|
||||||
|
|
||||||
//GetDeployKey chainload to models.GetDeployKey
|
|
||||||
func GetDeployKey(ctx *macaron.Context) {
|
|
||||||
repoID := ctx.ParamsInt64(":repoid")
|
|
||||||
keyID := ctx.ParamsInt64(":keyid")
|
|
||||||
dKey, err := models.GetDeployKeyByRepo(keyID, repoID)
|
|
||||||
if err != nil {
|
|
||||||
if models.IsErrDeployKeyNotExist(err) {
|
|
||||||
ctx.JSON(404, []byte("not found"))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
ctx.JSON(500, map[string]interface{}{
|
|
||||||
"err": err.Error(),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
ctx.JSON(200, dKey)
|
|
||||||
}
|
|
||||||
|
|
||||||
//HasDeployKey chainload to models.HasDeployKey
|
|
||||||
func HasDeployKey(ctx *macaron.Context) {
|
|
||||||
repoID := ctx.ParamsInt64(":repoid")
|
|
||||||
keyID := ctx.ParamsInt64(":keyid")
|
|
||||||
if models.HasDeployKey(keyID, repoID) {
|
|
||||||
ctx.PlainText(200, []byte("success"))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
ctx.PlainText(404, []byte("not found"))
|
|
||||||
}
|
|
||||||
|
|
|
@ -1,47 +0,0 @@
|
||||||
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
||||||
// Use of this source code is governed by a MIT-style
|
|
||||||
// license that can be found in the LICENSE file.
|
|
||||||
|
|
||||||
package private
|
|
||||||
|
|
||||||
import (
|
|
||||||
"encoding/json"
|
|
||||||
"strings"
|
|
||||||
|
|
||||||
"code.gitea.io/gitea/models"
|
|
||||||
"code.gitea.io/gitea/modules/git"
|
|
||||||
"code.gitea.io/gitea/modules/log"
|
|
||||||
|
|
||||||
macaron "gopkg.in/macaron.v1"
|
|
||||||
)
|
|
||||||
|
|
||||||
// PushUpdate update public key updates
|
|
||||||
func PushUpdate(ctx *macaron.Context) {
|
|
||||||
var opt models.PushUpdateOptions
|
|
||||||
if err := json.NewDecoder(ctx.Req.Request.Body).Decode(&opt); err != nil {
|
|
||||||
ctx.JSON(500, map[string]interface{}{
|
|
||||||
"err": err.Error(),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
branch := strings.TrimPrefix(opt.RefFullName, git.BranchPrefix)
|
|
||||||
if len(branch) == 0 || opt.PusherID <= 0 {
|
|
||||||
ctx.Error(404)
|
|
||||||
log.Trace("PushUpdate: branch or secret is empty, or pusher ID is not valid")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
err := models.PushUpdate(branch, opt)
|
|
||||||
if err != nil {
|
|
||||||
if models.IsErrUserNotExist(err) {
|
|
||||||
ctx.Error(404)
|
|
||||||
} else {
|
|
||||||
ctx.JSON(500, map[string]interface{}{
|
|
||||||
"err": err.Error(),
|
|
||||||
})
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
|
||||||
ctx.Status(202)
|
|
||||||
}
|
|
|
@ -1,83 +0,0 @@
|
||||||
// Copyright 2018 The Gitea Authors. All rights reserved.
|
|
||||||
// Use of this source code is governed by a MIT-style
|
|
||||||
// license that can be found in the LICENSE file.
|
|
||||||
|
|
||||||
package private
|
|
||||||
|
|
||||||
import (
|
|
||||||
"net/http"
|
|
||||||
|
|
||||||
"code.gitea.io/gitea/models"
|
|
||||||
|
|
||||||
macaron "gopkg.in/macaron.v1"
|
|
||||||
)
|
|
||||||
|
|
||||||
// GetRepository return the default branch of a repository
|
|
||||||
func GetRepository(ctx *macaron.Context) {
|
|
||||||
repoID := ctx.ParamsInt64(":rid")
|
|
||||||
repository, err := models.GetRepositoryByID(repoID)
|
|
||||||
repository.MustOwnerName()
|
|
||||||
allowPulls := repository.AllowsPulls()
|
|
||||||
// put it back to nil because json unmarshal can't unmarshal it
|
|
||||||
repository.Units = nil
|
|
||||||
|
|
||||||
if err != nil {
|
|
||||||
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
|
||||||
"err": err.Error(),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
if repository.IsFork {
|
|
||||||
repository.GetBaseRepo()
|
|
||||||
if err != nil {
|
|
||||||
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
|
||||||
"err": err.Error(),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
repository.BaseRepo.MustOwnerName()
|
|
||||||
allowPulls = repository.BaseRepo.AllowsPulls()
|
|
||||||
// put it back to nil because json unmarshal can't unmarshal it
|
|
||||||
repository.BaseRepo.Units = nil
|
|
||||||
}
|
|
||||||
|
|
||||||
ctx.JSON(http.StatusOK, struct {
|
|
||||||
Repository *models.Repository
|
|
||||||
AllowPullRequest bool
|
|
||||||
}{
|
|
||||||
Repository: repository,
|
|
||||||
AllowPullRequest: allowPulls,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
// GetActivePullRequest return an active pull request when it exists or an empty object
|
|
||||||
func GetActivePullRequest(ctx *macaron.Context) {
|
|
||||||
baseRepoID := ctx.QueryInt64("baseRepoID")
|
|
||||||
headRepoID := ctx.QueryInt64("headRepoID")
|
|
||||||
baseBranch := ctx.QueryTrim("baseBranch")
|
|
||||||
if len(baseBranch) == 0 {
|
|
||||||
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
|
||||||
"err": "QueryTrim failed",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
headBranch := ctx.QueryTrim("headBranch")
|
|
||||||
if len(headBranch) == 0 {
|
|
||||||
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
|
||||||
"err": "QueryTrim failed",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
pr, err := models.GetUnmergedPullRequest(headRepoID, baseRepoID, headBranch, baseBranch)
|
|
||||||
if err != nil && !models.IsErrPullRequestNotExist(err) {
|
|
||||||
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
|
||||||
"err": err.Error(),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
ctx.JSON(http.StatusOK, pr)
|
|
||||||
}
|
|
286
routers/private/serv.go
Normal file
286
routers/private/serv.go
Normal file
|
@ -0,0 +1,286 @@
|
||||||
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a MIT-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
// Package private includes all internal routes. The package name internal is ideal but Golang is not allowed, so we use private as package name instead.
|
||||||
|
package private
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"code.gitea.io/gitea/models"
|
||||||
|
"code.gitea.io/gitea/modules/log"
|
||||||
|
"code.gitea.io/gitea/modules/private"
|
||||||
|
"code.gitea.io/gitea/modules/setting"
|
||||||
|
|
||||||
|
macaron "gopkg.in/macaron.v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ServNoCommand returns information about the provided keyid
|
||||||
|
func ServNoCommand(ctx *macaron.Context) {
|
||||||
|
keyID := ctx.ParamsInt64(":keyid")
|
||||||
|
if keyID <= 0 {
|
||||||
|
ctx.JSON(http.StatusBadRequest, map[string]interface{}{
|
||||||
|
"err": fmt.Sprintf("Bad key id: %d", keyID),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
results := private.KeyAndOwner{}
|
||||||
|
|
||||||
|
key, err := models.GetPublicKeyByID(keyID)
|
||||||
|
if err != nil {
|
||||||
|
if models.IsErrKeyNotExist(err) {
|
||||||
|
ctx.JSON(http.StatusUnauthorized, map[string]interface{}{
|
||||||
|
"err": fmt.Sprintf("Cannot find key: %d", keyID),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
log.Error("Unable to get public key: %d Error: %v", keyID, err)
|
||||||
|
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
||||||
|
"err": err.Error(),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
results.Key = key
|
||||||
|
|
||||||
|
if key.Type == models.KeyTypeUser {
|
||||||
|
user, err := models.GetUserByID(key.OwnerID)
|
||||||
|
if err != nil {
|
||||||
|
if models.IsErrUserNotExist(err) {
|
||||||
|
ctx.JSON(http.StatusUnauthorized, map[string]interface{}{
|
||||||
|
"err": fmt.Sprintf("Cannot find owner with id: %d for key: %d", key.OwnerID, keyID),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
log.Error("Unable to get owner with id: %d for public key: %d Error: %v", key.OwnerID, keyID, err)
|
||||||
|
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
||||||
|
"err": err.Error(),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
results.Owner = user
|
||||||
|
}
|
||||||
|
ctx.JSON(http.StatusOK, &results)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// ServCommand returns information about the provided keyid
|
||||||
|
func ServCommand(ctx *macaron.Context) {
|
||||||
|
// Although we provide the verbs we don't need them at present they're just for logging purposes
|
||||||
|
keyID := ctx.ParamsInt64(":keyid")
|
||||||
|
ownerName := ctx.Params(":owner")
|
||||||
|
repoName := ctx.Params(":repo")
|
||||||
|
mode := models.AccessMode(ctx.QueryInt("mode"))
|
||||||
|
|
||||||
|
// Set the basic parts of the results to return
|
||||||
|
results := private.ServCommandResults{
|
||||||
|
RepoName: repoName,
|
||||||
|
OwnerName: ownerName,
|
||||||
|
KeyID: keyID,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Now because we're not translating things properly let's just default some Engish strings here
|
||||||
|
modeString := "read"
|
||||||
|
if mode > models.AccessModeRead {
|
||||||
|
modeString = "write to"
|
||||||
|
}
|
||||||
|
|
||||||
|
// The default unit we're trying to look at is code
|
||||||
|
unitType := models.UnitTypeCode
|
||||||
|
|
||||||
|
// Unless we're a wiki...
|
||||||
|
if strings.HasSuffix(repoName, ".wiki") {
|
||||||
|
// in which case we need to look at the wiki
|
||||||
|
unitType = models.UnitTypeWiki
|
||||||
|
// And we'd better munge the reponame and tell downstream we're looking at a wiki
|
||||||
|
results.IsWiki = true
|
||||||
|
results.RepoName = repoName[:len(repoName)-5]
|
||||||
|
}
|
||||||
|
|
||||||
|
// Now get the Repository and set the results section
|
||||||
|
repo, err := models.GetRepositoryByOwnerAndName(results.OwnerName, results.RepoName)
|
||||||
|
if err != nil {
|
||||||
|
if models.IsErrRepoNotExist(err) {
|
||||||
|
ctx.JSON(http.StatusNotFound, map[string]interface{}{
|
||||||
|
"results": results,
|
||||||
|
"type": "ErrRepoNotExist",
|
||||||
|
"err": fmt.Sprintf("Cannot find repository %s/%s", results.OwnerName, results.RepoName),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
log.Error("Unable to get repository: %s/%s Error: %v", results.OwnerName, results.RepoName, err)
|
||||||
|
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
||||||
|
"results": results,
|
||||||
|
"type": "InternalServerError",
|
||||||
|
"err": fmt.Sprintf("Unable to get repository: %s/%s %v", results.OwnerName, results.RepoName, err),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
repo.OwnerName = ownerName
|
||||||
|
results.RepoID = repo.ID
|
||||||
|
|
||||||
|
// We can shortcut at this point if the repo is a mirror
|
||||||
|
if mode > models.AccessModeRead && repo.IsMirror {
|
||||||
|
ctx.JSON(http.StatusUnauthorized, map[string]interface{}{
|
||||||
|
"results": results,
|
||||||
|
"type": "ErrMirrorReadOnly",
|
||||||
|
"err": fmt.Sprintf("Mirror Repository %s/%s is read-only", results.OwnerName, results.RepoName),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get the Public Key represented by the keyID
|
||||||
|
key, err := models.GetPublicKeyByID(keyID)
|
||||||
|
if err != nil {
|
||||||
|
if models.IsErrKeyNotExist(err) {
|
||||||
|
ctx.JSON(http.StatusUnauthorized, map[string]interface{}{
|
||||||
|
"results": results,
|
||||||
|
"type": "ErrKeyNotExist",
|
||||||
|
"err": fmt.Sprintf("Cannot find key: %d", keyID),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
log.Error("Unable to get public key: %d Error: %v", keyID, err)
|
||||||
|
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
||||||
|
"results": results,
|
||||||
|
"type": "InternalServerError",
|
||||||
|
"err": fmt.Sprintf("Unable to get key: %d Error: %v", keyID, err),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
results.KeyName = key.Name
|
||||||
|
results.KeyID = key.ID
|
||||||
|
results.UserID = key.OwnerID
|
||||||
|
|
||||||
|
// Deploy Keys have ownerID set to 0 therefore we can't use the owner
|
||||||
|
// So now we need to check if the key is a deploy key
|
||||||
|
// We'll keep hold of the deploy key here for permissions checking
|
||||||
|
var deployKey *models.DeployKey
|
||||||
|
var user *models.User
|
||||||
|
if key.Type == models.KeyTypeDeploy {
|
||||||
|
results.IsDeployKey = true
|
||||||
|
|
||||||
|
var err error
|
||||||
|
deployKey, err = models.GetDeployKeyByRepo(key.ID, repo.ID)
|
||||||
|
if err != nil {
|
||||||
|
if models.IsErrDeployKeyNotExist(err) {
|
||||||
|
ctx.JSON(http.StatusUnauthorized, map[string]interface{}{
|
||||||
|
"results": results,
|
||||||
|
"type": "ErrDeployKeyNotExist",
|
||||||
|
"err": fmt.Sprintf("Public (Deploy) Key: %d:%s is not authorized to %s %s/%s.", key.ID, key.Name, modeString, results.OwnerName, results.RepoName),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
log.Error("Unable to get deploy for public (deploy) key: %d in %-v Error: %v", key.ID, repo, err)
|
||||||
|
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
||||||
|
"results": results,
|
||||||
|
"type": "InternalServerError",
|
||||||
|
"err": fmt.Sprintf("Unable to get Deploy Key for Public Key: %d:%s in %s/%s.", key.ID, key.Name, results.OwnerName, results.RepoName),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
results.KeyName = deployKey.Name
|
||||||
|
|
||||||
|
// FIXME: Deploy keys aren't really the owner of the repo pushing changes
|
||||||
|
// however we don't have good way of representing deploy keys in hook.go
|
||||||
|
// so for now use the owner of the repository
|
||||||
|
results.UserName = results.OwnerName
|
||||||
|
results.UserID = repo.OwnerID
|
||||||
|
} else {
|
||||||
|
// Get the user represented by the Key
|
||||||
|
var err error
|
||||||
|
user, err = models.GetUserByID(key.OwnerID)
|
||||||
|
if err != nil {
|
||||||
|
if models.IsErrUserNotExist(err) {
|
||||||
|
ctx.JSON(http.StatusUnauthorized, map[string]interface{}{
|
||||||
|
"results": results,
|
||||||
|
"type": "ErrUserNotExist",
|
||||||
|
"err": fmt.Sprintf("Public Key: %d:%s owner %d does not exist.", key.ID, key.Name, key.OwnerID),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
log.Error("Unable to get owner: %d for public key: %d:%s Error: %v", key.OwnerID, key.ID, key.Name, err)
|
||||||
|
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
||||||
|
"results": results,
|
||||||
|
"type": "InternalServerError",
|
||||||
|
"err": fmt.Sprintf("Unable to get Owner: %d for Deploy Key: %d:%s in %s/%s.", key.OwnerID, key.ID, key.Name, ownerName, repoName),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
results.UserName = user.Name
|
||||||
|
}
|
||||||
|
|
||||||
|
// Don't allow pushing if the repo is archived
|
||||||
|
if mode > models.AccessModeRead && repo.IsArchived {
|
||||||
|
ctx.JSON(http.StatusUnauthorized, map[string]interface{}{
|
||||||
|
"results": results,
|
||||||
|
"type": "ErrRepoIsArchived",
|
||||||
|
"err": fmt.Sprintf("Repo: %s/%s is archived.", results.OwnerName, results.RepoName),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Permissions checking:
|
||||||
|
if mode > models.AccessModeRead || repo.IsPrivate || setting.Service.RequireSignInView {
|
||||||
|
if key.Type == models.KeyTypeDeploy {
|
||||||
|
if deployKey.Mode < mode {
|
||||||
|
ctx.JSON(http.StatusUnauthorized, map[string]interface{}{
|
||||||
|
"results": results,
|
||||||
|
"type": "ErrUnauthorized",
|
||||||
|
"err": fmt.Sprintf("Deploy Key: %d:%s is not authorized to %s %s/%s.", key.ID, key.Name, modeString, results.OwnerName, results.RepoName),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
perm, err := models.GetUserRepoPermission(repo, user)
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Unable to get permissions for %-v with key %d in %-v Error: %v", user, key.ID, repo, err)
|
||||||
|
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
||||||
|
"results": results,
|
||||||
|
"type": "InternalServerError",
|
||||||
|
"err": fmt.Sprintf("Unable to get permissions for user %d:%s with key %d in %s/%s Error: %v", user.ID, user.Name, key.ID, results.OwnerName, results.RepoName, err),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
userMode := perm.UnitAccessMode(unitType)
|
||||||
|
|
||||||
|
if userMode < mode {
|
||||||
|
ctx.JSON(http.StatusUnauthorized, map[string]interface{}{
|
||||||
|
"results": results,
|
||||||
|
"type": "ErrUnauthorized",
|
||||||
|
"err": fmt.Sprintf("User: %d:%s with Key: %d:%s is not authorized to %s %s/%s.", user.ID, user.Name, key.ID, key.Name, modeString, ownerName, repoName),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Finally if we're trying to touch the wiki we should init it
|
||||||
|
if results.IsWiki {
|
||||||
|
if err = repo.InitWiki(); err != nil {
|
||||||
|
log.Error("Failed to initialize the wiki in %-v Error: %v", repo, err)
|
||||||
|
ctx.JSON(http.StatusInternalServerError, map[string]interface{}{
|
||||||
|
"results": results,
|
||||||
|
"type": "InternalServerError",
|
||||||
|
"err": fmt.Sprintf("Failed to initialize the wiki in %s/%s Error: %v", ownerName, repoName, err),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
log.Debug("Serv Results:\nIsWiki: %t\nIsDeployKey: %t\nKeyID: %d\tKeyName: %s\nUserName: %s\nUserID: %d\nOwnerName: %s\nRepoName: %s\nRepoID: %d",
|
||||||
|
results.IsWiki,
|
||||||
|
results.IsDeployKey,
|
||||||
|
results.KeyID,
|
||||||
|
results.KeyName,
|
||||||
|
results.UserName,
|
||||||
|
results.UserID,
|
||||||
|
results.OwnerName,
|
||||||
|
results.RepoName,
|
||||||
|
results.RepoID)
|
||||||
|
|
||||||
|
ctx.JSON(http.StatusOK, results)
|
||||||
|
// We will update the keys in a different call.
|
||||||
|
return
|
||||||
|
}
|
|
@ -1,34 +0,0 @@
|
||||||
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
||||||
// Use of this source code is governed by a MIT-style
|
|
||||||
// license that can be found in the LICENSE file.
|
|
||||||
|
|
||||||
package private
|
|
||||||
|
|
||||||
import (
|
|
||||||
"code.gitea.io/gitea/models"
|
|
||||||
|
|
||||||
macaron "gopkg.in/macaron.v1"
|
|
||||||
)
|
|
||||||
|
|
||||||
// InitWiki initilizes wiki via repo id
|
|
||||||
func InitWiki(ctx *macaron.Context) {
|
|
||||||
repoID := ctx.ParamsInt64("repoid")
|
|
||||||
|
|
||||||
repo, err := models.GetRepositoryByID(repoID)
|
|
||||||
if err != nil {
|
|
||||||
ctx.JSON(500, map[string]interface{}{
|
|
||||||
"err": err.Error(),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
err = repo.InitWiki()
|
|
||||||
if err != nil {
|
|
||||||
ctx.JSON(500, map[string]interface{}{
|
|
||||||
"err": err.Error(),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
ctx.Status(202)
|
|
||||||
}
|
|
|
@ -351,7 +351,7 @@ func gitCommand(dir string, args ...string) []byte {
|
||||||
cmd.Dir = dir
|
cmd.Dir = dir
|
||||||
out, err := cmd.Output()
|
out, err := cmd.Output()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.GitLogger.Error(fmt.Sprintf("%v - %s", err, out))
|
log.Error("%v - %s", err, out)
|
||||||
}
|
}
|
||||||
return out
|
return out
|
||||||
}
|
}
|
||||||
|
@ -409,7 +409,7 @@ func serviceRPC(h serviceHandler, service string) {
|
||||||
if h.r.Header.Get("Content-Encoding") == "gzip" {
|
if h.r.Header.Get("Content-Encoding") == "gzip" {
|
||||||
reqBody, err = gzip.NewReader(reqBody)
|
reqBody, err = gzip.NewReader(reqBody)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.GitLogger.Error("Fail to create gzip reader: %v", err)
|
log.Error("Fail to create gzip reader: %v", err)
|
||||||
h.w.WriteHeader(http.StatusInternalServerError)
|
h.w.WriteHeader(http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -428,7 +428,7 @@ func serviceRPC(h serviceHandler, service string) {
|
||||||
cmd.Stdin = reqBody
|
cmd.Stdin = reqBody
|
||||||
cmd.Stderr = &stderr
|
cmd.Stderr = &stderr
|
||||||
if err := cmd.Run(); err != nil {
|
if err := cmd.Run(); err != nil {
|
||||||
log.GitLogger.Error("Fail to serve RPC(%s): %v - %v", service, err, stderr)
|
log.Error("Fail to serve RPC(%s): %v - %v", service, err, stderr)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -541,7 +541,7 @@ func HTTPBackend(ctx *context.Context, cfg *serviceConfig) http.HandlerFunc {
|
||||||
file := strings.Replace(r.URL.Path, m[1]+"/", "", 1)
|
file := strings.Replace(r.URL.Path, m[1]+"/", "", 1)
|
||||||
dir, err := getGitRepoPath(m[1])
|
dir, err := getGitRepoPath(m[1])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.GitLogger.Error(err.Error())
|
log.Error(err.Error())
|
||||||
ctx.NotFound("HTTPBackend", err)
|
ctx.NotFound("HTTPBackend", err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue