2015-11-18 21:21:47 -05:00
// Copyright 2015 The Gogs Authors. All rights reserved.
2020-01-24 19:00:29 +00:00
// Copyright 2020 The Gitea Authors.
2022-11-27 13:20:29 -05:00
// SPDX-License-Identifier: MIT
2015-11-18 21:21:47 -05:00
2015-12-04 17:16:42 -05:00
package repo
2015-11-18 21:21:47 -05:00
import (
2022-12-03 10:48:26 +08:00
stdCtx "context"
2015-11-18 21:21:47 -05:00
"fmt"
2019-12-20 18:07:12 +01:00
"net/http"
2021-11-16 18:18:25 +00:00
"net/url"
2015-11-18 21:21:47 -05:00
2021-12-10 16:14:24 +08:00
asymkey_model "code.gitea.io/gitea/models/asymkey"
"code.gitea.io/gitea/models/db"
2021-11-28 19:58:28 +08:00
"code.gitea.io/gitea/models/perm"
2023-06-22 21:08:08 +08:00
access_model "code.gitea.io/gitea/models/perm/access"
2021-12-10 09:27:50 +08:00
repo_model "code.gitea.io/gitea/models/repo"
2016-11-10 17:24:48 +01:00
"code.gitea.io/gitea/modules/context"
"code.gitea.io/gitea/modules/setting"
2019-05-11 18:21:34 +08:00
api "code.gitea.io/gitea/modules/structs"
2021-01-26 23:36:53 +08:00
"code.gitea.io/gitea/modules/web"
2020-01-24 19:00:29 +00:00
"code.gitea.io/gitea/routers/api/v1/utils"
2021-12-10 16:14:24 +08:00
asymkey_service "code.gitea.io/gitea/services/asymkey"
2022-12-29 03:57:15 +01:00
"code.gitea.io/gitea/services/convert"
2015-11-18 21:21:47 -05:00
)
2018-11-01 03:40:49 +00:00
// appendPrivateInformation appends the owner and key type information to api.PublicKey
2022-12-03 10:48:26 +08:00
func appendPrivateInformation ( ctx stdCtx . Context , apiKey * api . DeployKey , key * asymkey_model . DeployKey , repository * repo_model . Repository ) ( * api . DeployKey , error ) {
2021-11-28 19:58:28 +08:00
apiKey . ReadOnly = key . Mode == perm . AccessModeRead
2018-11-01 03:40:49 +00:00
if repository . ID == key . RepoID {
2023-06-22 21:08:08 +08:00
apiKey . Repository = convert . ToRepo ( ctx , repository , access_model . Permission { AccessMode : key . Mode } )
2018-11-01 03:40:49 +00:00
} else {
2022-12-03 10:48:26 +08:00
repo , err := repo_model . GetRepositoryByID ( ctx , key . RepoID )
2018-11-01 03:40:49 +00:00
if err != nil {
return apiKey , err
}
2023-06-22 21:08:08 +08:00
apiKey . Repository = convert . ToRepo ( ctx , repo , access_model . Permission { AccessMode : key . Mode } )
2018-11-01 03:40:49 +00:00
}
return apiKey , nil
}
2021-11-16 18:18:25 +00:00
func composeDeployKeysAPILink ( owner , name string ) string {
return setting . AppURL + "api/v1/repos/" + url . PathEscape ( owner ) + "/" + url . PathEscape ( name ) + "/keys/"
2015-11-18 21:21:47 -05:00
}
2016-11-24 15:04:31 +08:00
// ListDeployKeys list all the deploy keys of a repository
2016-03-13 18:49:16 -04:00
func ListDeployKeys ( ctx * context . APIContext ) {
2017-11-12 23:02:25 -08:00
// swagger:operation GET /repos/{owner}/{repo}/keys repository repoListKeys
// ---
// summary: List a repository's keys
// produces:
// - application/json
// parameters:
// - name: owner
// in: path
// description: owner of the repo
// type: string
// required: true
// - name: repo
// in: path
// description: name of the repo
// type: string
// required: true
2018-11-01 03:40:49 +00:00
// - name: key_id
// in: query
// description: the key_id to search for
// type: integer
// - name: fingerprint
// in: query
// description: fingerprint of the key
// type: string
2020-01-24 19:00:29 +00:00
// - name: page
// in: query
// description: page number of results to return (1-based)
// type: integer
// - name: limit
// in: query
2020-06-09 06:57:38 +02:00
// description: page size of results
2020-01-24 19:00:29 +00:00
// type: integer
2017-11-12 23:02:25 -08:00
// responses:
// "200":
// "$ref": "#/responses/DeployKeyList"
2023-09-13 04:37:54 +02:00
// "404":
// "$ref": "#/responses/notFound"
2019-12-20 18:07:12 +01:00
2023-11-24 11:49:41 +08:00
opts := asymkey_model . ListDeployKeysOptions {
2021-08-12 14:43:08 +02:00
ListOptions : utils . GetListOptions ( ctx ) ,
RepoID : ctx . Repo . Repository . ID ,
KeyID : ctx . FormInt64 ( "key_id" ) ,
Fingerprint : ctx . FormString ( "fingerprint" ) ,
}
2018-11-01 03:40:49 +00:00
2023-11-24 11:49:41 +08:00
keys , count , err := db . FindAndCount [ asymkey_model . DeployKey ] ( ctx , opts )
2015-11-18 21:21:47 -05:00
if err != nil {
2021-08-12 14:43:08 +02:00
ctx . InternalServerError ( err )
2015-11-18 21:21:47 -05:00
return
}
2021-11-16 18:18:25 +00:00
apiLink := composeDeployKeysAPILink ( ctx . Repo . Owner . Name , ctx . Repo . Repository . Name )
2015-11-18 21:21:47 -05:00
apiKeys := make ( [ ] * api . DeployKey , len ( keys ) )
for i := range keys {
2023-10-11 06:24:07 +02:00
if err := keys [ i ] . GetContent ( ctx ) ; err != nil {
2019-12-20 18:07:12 +01:00
ctx . Error ( http . StatusInternalServerError , "GetContent" , err )
2015-11-18 21:21:47 -05:00
return
}
2016-03-13 23:20:22 -04:00
apiKeys [ i ] = convert . ToDeployKey ( apiLink , keys [ i ] )
2022-03-22 08:03:22 +01:00
if ctx . Doer . IsAdmin || ( ( ctx . Repo . Repository . ID == keys [ i ] . RepoID ) && ( ctx . Doer . ID == ctx . Repo . Owner . ID ) ) {
2022-12-03 10:48:26 +08:00
apiKeys [ i ] , _ = appendPrivateInformation ( ctx , apiKeys [ i ] , keys [ i ] , ctx . Repo . Repository )
2018-11-01 03:40:49 +00:00
}
2015-11-18 21:21:47 -05:00
}
2021-08-12 14:43:08 +02:00
ctx . SetTotalCountHeader ( count )
2019-12-20 18:07:12 +01:00
ctx . JSON ( http . StatusOK , & apiKeys )
2015-11-18 21:21:47 -05:00
}
2016-11-24 15:04:31 +08:00
// GetDeployKey get a deploy key by id
2016-03-13 18:49:16 -04:00
func GetDeployKey ( ctx * context . APIContext ) {
2017-11-12 23:02:25 -08:00
// swagger:operation GET /repos/{owner}/{repo}/keys/{id} repository repoGetKey
// ---
// summary: Get a repository's key by id
// produces:
// - application/json
// parameters:
// - name: owner
// in: path
// description: owner of the repo
// type: string
// required: true
// - name: repo
// in: path
// description: name of the repo
// type: string
// required: true
// - name: id
// in: path
// description: id of the key to get
// type: integer
2018-10-21 04:40:42 +01:00
// format: int64
2017-11-12 23:02:25 -08:00
// required: true
// responses:
// "200":
// "$ref": "#/responses/DeployKey"
2023-09-13 04:37:54 +02:00
// "404":
// "$ref": "#/responses/notFound"
2019-12-20 18:07:12 +01:00
2022-03-22 17:29:07 +08:00
key , err := asymkey_model . GetDeployKeyByID ( ctx , ctx . ParamsInt64 ( ":id" ) )
2015-11-18 21:21:47 -05:00
if err != nil {
2021-12-10 16:14:24 +08:00
if asymkey_model . IsErrDeployKeyNotExist ( err ) {
2019-03-18 21:29:43 -05:00
ctx . NotFound ( )
2015-11-18 21:21:47 -05:00
} else {
2019-12-20 18:07:12 +01:00
ctx . Error ( http . StatusInternalServerError , "GetDeployKeyByID" , err )
2015-11-18 21:21:47 -05:00
}
return
}
2023-11-26 01:21:21 +08:00
// this check make it more consistent
if key . RepoID != ctx . Repo . Repository . ID {
ctx . NotFound ( )
return
}
2023-10-11 06:24:07 +02:00
if err = key . GetContent ( ctx ) ; err != nil {
2019-12-20 18:07:12 +01:00
ctx . Error ( http . StatusInternalServerError , "GetContent" , err )
2015-11-18 21:21:47 -05:00
return
}
2021-11-16 18:18:25 +00:00
apiLink := composeDeployKeysAPILink ( ctx . Repo . Owner . Name , ctx . Repo . Repository . Name )
2018-11-01 03:40:49 +00:00
apiKey := convert . ToDeployKey ( apiLink , key )
2022-03-22 08:03:22 +01:00
if ctx . Doer . IsAdmin || ( ( ctx . Repo . Repository . ID == key . RepoID ) && ( ctx . Doer . ID == ctx . Repo . Owner . ID ) ) {
2022-12-03 10:48:26 +08:00
apiKey , _ = appendPrivateInformation ( ctx , apiKey , key , ctx . Repo . Repository )
2018-11-01 03:40:49 +00:00
}
2019-12-20 18:07:12 +01:00
ctx . JSON ( http . StatusOK , apiKey )
2015-11-18 21:21:47 -05:00
}
2016-11-24 15:04:31 +08:00
// HandleCheckKeyStringError handle check key error
2016-03-13 18:49:16 -04:00
func HandleCheckKeyStringError ( ctx * context . APIContext , err error ) {
2021-12-10 16:14:24 +08:00
if db . IsErrSSHDisabled ( err ) {
2019-12-20 18:07:12 +01:00
ctx . Error ( http . StatusUnprocessableEntity , "" , "SSH is disabled" )
2021-12-10 16:14:24 +08:00
} else if asymkey_model . IsErrKeyUnableVerify ( err ) {
2019-12-20 18:07:12 +01:00
ctx . Error ( http . StatusUnprocessableEntity , "" , "Unable to verify key content" )
2015-12-03 00:24:37 -05:00
} else {
2022-10-24 21:29:17 +02:00
ctx . Error ( http . StatusUnprocessableEntity , "" , fmt . Errorf ( "Invalid key content: %w" , err ) )
2015-12-03 00:24:37 -05:00
}
}
2016-11-24 15:04:31 +08:00
// HandleAddKeyError handle add key error
2016-03-13 18:49:16 -04:00
func HandleAddKeyError ( ctx * context . APIContext , err error ) {
2015-12-03 00:24:37 -05:00
switch {
2021-12-10 16:14:24 +08:00
case asymkey_model . IsErrDeployKeyAlreadyExist ( err ) :
2019-12-20 18:07:12 +01:00
ctx . Error ( http . StatusUnprocessableEntity , "" , "This key has already been added to this repository" )
2021-12-10 16:14:24 +08:00
case asymkey_model . IsErrKeyAlreadyExist ( err ) :
2019-12-20 18:07:12 +01:00
ctx . Error ( http . StatusUnprocessableEntity , "" , "Key content has been used as non-deploy key" )
2021-12-10 16:14:24 +08:00
case asymkey_model . IsErrKeyNameAlreadyUsed ( err ) :
2019-12-20 18:07:12 +01:00
ctx . Error ( http . StatusUnprocessableEntity , "" , "Key title has been used" )
2021-12-10 16:14:24 +08:00
case asymkey_model . IsErrDeployKeyNameAlreadyUsed ( err ) :
2020-10-12 21:44:56 +08:00
ctx . Error ( http . StatusUnprocessableEntity , "" , "A key with the same name already exists" )
2015-12-03 00:24:37 -05:00
default :
2019-12-20 18:07:12 +01:00
ctx . Error ( http . StatusInternalServerError , "AddKey" , err )
2015-12-03 00:24:37 -05:00
}
}
2016-11-24 15:04:31 +08:00
// CreateDeployKey create deploy key for a repository
2021-01-26 23:36:53 +08:00
func CreateDeployKey ( ctx * context . APIContext ) {
2017-11-12 23:02:25 -08:00
// swagger:operation POST /repos/{owner}/{repo}/keys repository repoCreateKey
// ---
// summary: Add a key to a repository
// consumes:
// - application/json
// produces:
// - application/json
// parameters:
// - name: owner
// in: path
// description: owner of the repo
// type: string
// required: true
// - name: repo
// in: path
// description: name of the repo
// type: string
// required: true
// - name: body
// in: body
// schema:
// "$ref": "#/definitions/CreateKeyOption"
// responses:
// "201":
// "$ref": "#/responses/DeployKey"
2023-09-13 04:37:54 +02:00
// "404":
// "$ref": "#/responses/notFound"
2019-12-20 18:07:12 +01:00
// "422":
// "$ref": "#/responses/validationError"
2021-01-26 23:36:53 +08:00
form := web . GetForm ( ctx ) . ( * api . CreateKeyOption )
2021-12-10 16:14:24 +08:00
content , err := asymkey_model . CheckPublicKeyString ( form . Key )
2015-11-18 21:21:47 -05:00
if err != nil {
2015-12-04 17:16:42 -05:00
HandleCheckKeyStringError ( ctx , err )
2015-11-18 21:21:47 -05:00
return
}
2023-10-14 10:37:24 +02:00
key , err := asymkey_model . AddDeployKey ( ctx , ctx . Repo . Repository . ID , form . Title , content , form . ReadOnly )
2015-11-18 21:21:47 -05:00
if err != nil {
2015-12-04 17:16:42 -05:00
HandleAddKeyError ( ctx , err )
2015-11-18 21:21:47 -05:00
return
}
key . Content = content
2021-11-16 18:18:25 +00:00
apiLink := composeDeployKeysAPILink ( ctx . Repo . Owner . Name , ctx . Repo . Repository . Name )
2019-12-20 18:07:12 +01:00
ctx . JSON ( http . StatusCreated , convert . ToDeployKey ( apiLink , key ) )
2015-11-18 21:21:47 -05:00
}
2016-11-24 15:04:31 +08:00
// DeleteDeploykey delete deploy key for a repository
2016-03-13 18:49:16 -04:00
func DeleteDeploykey ( ctx * context . APIContext ) {
2017-11-12 23:02:25 -08:00
// swagger:operation DELETE /repos/{owner}/{repo}/keys/{id} repository repoDeleteKey
// ---
// summary: Delete a key from a repository
// parameters:
// - name: owner
// in: path
// description: owner of the repo
// type: string
// required: true
// - name: repo
// in: path
// description: name of the repo
// type: string
// required: true
// - name: id
// in: path
// description: id of the key to delete
// type: integer
2018-10-21 04:40:42 +01:00
// format: int64
2017-11-12 23:02:25 -08:00
// required: true
// responses:
// "204":
// "$ref": "#/responses/empty"
2019-12-20 18:07:12 +01:00
// "403":
// "$ref": "#/responses/forbidden"
2023-09-13 04:37:54 +02:00
// "404":
// "$ref": "#/responses/notFound"
2019-12-20 18:07:12 +01:00
2023-09-25 15:17:37 +02:00
if err := asymkey_service . DeleteDeployKey ( ctx , ctx . Doer , ctx . ParamsInt64 ( ":id" ) ) ; err != nil {
2021-12-10 16:14:24 +08:00
if asymkey_model . IsErrKeyAccessDenied ( err ) {
2019-12-20 18:07:12 +01:00
ctx . Error ( http . StatusForbidden , "" , "You do not have access to this key" )
2015-12-03 00:24:37 -05:00
} else {
2019-12-20 18:07:12 +01:00
ctx . Error ( http . StatusInternalServerError , "DeleteDeployKey" , err )
2015-12-03 00:24:37 -05:00
}
2015-11-18 21:21:47 -05:00
return
}
2019-12-20 18:07:12 +01:00
ctx . Status ( http . StatusNoContent )
2015-11-18 21:21:47 -05:00
}