2014-03-17 22:03:58 +04:00
// Copyright 2014 The Gogs Authors. All rights reserved.
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
2014-02-19 13:50:53 +04:00
package main
import (
2014-03-26 09:21:09 +04:00
//"container/list"
2014-02-19 13:50:53 +04:00
"fmt"
"os"
"os/exec"
2014-03-25 16:56:01 +04:00
"path"
2014-02-19 13:50:53 +04:00
"strconv"
"strings"
"github.com/codegangsta/cli"
2014-03-23 12:51:43 +04:00
"github.com/gogits/gogs/modules/log"
2014-03-21 00:04:56 +04:00
2014-03-26 09:21:09 +04:00
//"github.com/gogits/git"
2014-02-19 13:50:53 +04:00
"github.com/gogits/gogs/models"
2014-03-21 00:04:56 +04:00
"github.com/gogits/gogs/modules/base"
2014-02-19 13:50:53 +04:00
)
var (
COMMANDS_READONLY = map [ string ] int {
2014-02-25 10:01:52 +04:00
"git-upload-pack" : models . AU_WRITABLE ,
"git upload-pack" : models . AU_WRITABLE ,
"git-upload-archive" : models . AU_WRITABLE ,
2014-02-19 13:50:53 +04:00
}
COMMANDS_WRITE = map [ string ] int {
"git-receive-pack" : models . AU_READABLE ,
"git receive-pack" : models . AU_READABLE ,
}
)
var CmdServ = cli . Command {
Name : "serv" ,
2014-02-25 10:01:52 +04:00
Usage : "This command just should be called by ssh shell" ,
2014-02-19 13:50:53 +04:00
Description : `
2014-02-25 10:01:52 +04:00
gogs serv provide access auth for repositories ` ,
2014-02-19 13:50:53 +04:00
Action : runServ ,
2014-03-12 08:19:45 +04:00
Flags : [ ] cli . Flag { } ,
2014-02-19 13:50:53 +04:00
}
2014-03-25 16:53:11 +04:00
func newLogger ( execDir string ) {
2014-03-25 14:14:13 +04:00
level := "0"
2014-03-25 16:56:01 +04:00
logPath := execDir + "/log/serv.log"
os . MkdirAll ( path . Dir ( logPath ) , os . ModePerm )
2014-03-31 15:57:51 +04:00
log . NewLogger ( 0 , "file" , fmt . Sprintf ( ` { "level":%s,"filename":"%s"} ` , level , logPath ) )
2014-03-25 15:30:18 +04:00
log . Trace ( "start logging..." )
2014-03-24 18:26:05 +04:00
}
2014-03-23 12:31:13 +04:00
func parseCmd ( cmd string ) ( string , string ) {
ss := strings . SplitN ( cmd , " " , 2 )
if len ( ss ) != 2 {
return "" , ""
}
verb , args := ss [ 0 ] , ss [ 1 ]
if verb == "git" {
ss = strings . SplitN ( args , " " , 2 )
args = ss [ 1 ]
verb = fmt . Sprintf ( "%s %s" , verb , ss [ 0 ] )
}
return verb , args
}
2014-02-19 13:50:53 +04:00
func In ( b string , sl map [ string ] int ) bool {
_ , e := sl [ b ]
return e
}
2014-03-23 12:31:13 +04:00
func runServ ( k * cli . Context ) {
2014-03-25 16:53:11 +04:00
execDir , _ := base . ExecDir ( )
newLogger ( execDir )
2014-03-25 15:38:48 +04:00
2014-03-21 11:36:26 +04:00
base . NewConfigContext ( )
models . LoadModelsConfig ( )
2014-03-31 00:01:50 +04:00
if models . UseSQLite3 {
os . Chdir ( execDir )
}
2014-03-28 15:26:22 +04:00
models . SetEngine ( )
2014-03-21 11:36:26 +04:00
2014-02-19 13:50:53 +04:00
keys := strings . Split ( os . Args [ 2 ] , "-" )
if len ( keys ) != 2 {
2014-03-31 00:01:50 +04:00
println ( "auth file format error" )
2014-03-25 15:30:18 +04:00
log . Error ( "auth file format error" )
2014-02-19 13:50:53 +04:00
return
}
keyId , err := strconv . ParseInt ( keys [ 1 ] , 10 , 64 )
if err != nil {
2014-03-31 00:01:50 +04:00
println ( "auth file format error" )
2014-03-30 06:18:36 +04:00
log . Error ( "auth file format error" , err )
2014-02-19 13:50:53 +04:00
return
}
user , err := models . GetUserByKeyId ( keyId )
if err != nil {
2014-03-31 00:01:50 +04:00
println ( "You have no right to access" )
log . Error ( "SSH visit error: %v" , err )
2014-02-19 13:50:53 +04:00
return
}
cmd := os . Getenv ( "SSH_ORIGINAL_COMMAND" )
if cmd == "" {
2014-03-16 10:28:24 +04:00
println ( "Hi" , user . Name , "! You've successfully authenticated, but Gogs does not provide shell access." )
2014-02-19 13:50:53 +04:00
return
}
verb , args := parseCmd ( cmd )
2014-03-30 06:18:36 +04:00
repoPath := strings . Trim ( args , "'" )
rr := strings . SplitN ( repoPath , "/" , 2 )
2014-02-19 13:50:53 +04:00
if len ( rr ) != 2 {
2014-02-20 10:53:56 +04:00
println ( "Unavilable repository" , args )
2014-03-25 15:30:18 +04:00
log . Error ( "Unavilable repository %v" , args )
2014-02-19 13:50:53 +04:00
return
}
2014-03-30 06:18:36 +04:00
repoUserName := rr [ 0 ]
2014-02-19 13:50:53 +04:00
repoName := rr [ 1 ]
if strings . HasSuffix ( repoName , ".git" ) {
repoName = repoName [ : len ( repoName ) - 4 ]
}
2014-03-16 08:18:34 +04:00
2014-03-25 13:11:13 +04:00
isWrite := In ( verb , COMMANDS_WRITE )
isRead := In ( verb , COMMANDS_READONLY )
2014-03-30 06:18:36 +04:00
repoUser , err := models . GetUserByName ( repoUserName )
2014-03-16 08:18:34 +04:00
if err != nil {
2014-03-30 06:18:36 +04:00
fmt . Println ( "You have no right to access" )
log . Error ( "Get user failed" , err )
return
}
2014-03-16 08:18:34 +04:00
2014-03-25 13:11:13 +04:00
// access check
2014-02-19 13:50:53 +04:00
switch {
case isWrite :
2014-03-31 00:01:50 +04:00
has , err := models . HasAccess ( user . LowerName , path . Join ( repoUserName , repoName ) , models . AU_WRITABLE )
2014-02-19 13:50:53 +04:00
if err != nil {
2014-02-25 10:01:52 +04:00
println ( "Inernel error:" , err )
2014-03-25 13:52:03 +04:00
log . Error ( err . Error ( ) )
2014-02-19 13:50:53 +04:00
return
2014-03-31 00:01:50 +04:00
} else if ! has {
2014-02-25 11:28:04 +04:00
println ( "You have no right to write this repository" )
2014-03-30 06:18:36 +04:00
log . Error ( "User %s has no right to write repository %s" , user . Name , repoPath )
2014-02-19 13:50:53 +04:00
return
}
case isRead :
2014-03-30 06:18:36 +04:00
repo , err := models . GetRepositoryByName ( repoUser . Id , repoName )
if err != nil {
println ( "Get repository error:" , err )
log . Error ( "Get repository error: " + err . Error ( ) )
return
}
if ! repo . IsPrivate {
break
}
has , err := models . HasAccess ( user . Name , repoPath , models . AU_READABLE )
2014-02-19 13:50:53 +04:00
if err != nil {
2014-02-25 10:01:52 +04:00
println ( "Inernel error" )
2014-03-25 13:52:03 +04:00
log . Error ( err . Error ( ) )
2014-02-19 13:50:53 +04:00
return
}
if ! has {
2014-03-30 06:18:36 +04:00
has , err = models . HasAccess ( user . Name , repoPath , models . AU_WRITABLE )
2014-02-19 13:50:53 +04:00
if err != nil {
2014-02-25 10:01:52 +04:00
println ( "Inernel error" )
2014-03-25 13:52:03 +04:00
log . Error ( err . Error ( ) )
2014-02-19 13:50:53 +04:00
return
}
}
if ! has {
2014-02-20 10:53:56 +04:00
println ( "You have no right to access this repository" )
2014-03-25 15:30:18 +04:00
log . Error ( "You have no right to access this repository" )
2014-02-19 13:50:53 +04:00
return
}
default :
2014-02-20 10:53:56 +04:00
println ( "Unknown command" )
2014-03-25 15:30:18 +04:00
log . Error ( "Unknown command" )
2014-02-19 13:50:53 +04:00
return
}
2014-03-26 09:31:27 +04:00
// for update use
2014-03-26 09:21:09 +04:00
os . Setenv ( "userName" , user . Name )
os . Setenv ( "userId" , strconv . Itoa ( int ( user . Id ) ) )
os . Setenv ( "repoName" , repoName )
2014-03-23 12:31:13 +04:00
2014-03-30 06:18:36 +04:00
gitcmd := exec . Command ( verb , repoPath )
2014-03-21 00:04:56 +04:00
gitcmd . Dir = base . RepoRootPath
2014-03-26 09:21:09 +04:00
gitcmd . Stdout = os . Stdout
2014-03-23 13:10:09 +04:00
gitcmd . Stdin = os . Stdin
2014-02-19 13:50:53 +04:00
gitcmd . Stderr = os . Stderr
2014-03-18 01:00:35 +04:00
if err = gitcmd . Run ( ) ; err != nil {
2014-02-25 10:01:52 +04:00
println ( "execute command error:" , err . Error ( ) )
2014-03-25 15:30:18 +04:00
log . Error ( "execute command error: " + err . Error ( ) )
2014-03-25 13:11:13 +04:00
return
2014-02-19 13:50:53 +04:00
}
}