2014-04-10 22:20:58 +04:00
// Copyright 2014 The Gogs Authors. All rights reserved.
2016-12-21 15:13:17 +03:00
// Copyright 2016 The Gitea Authors. All rights reserved.
2014-04-10 22:20:58 +04:00
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
2014-05-02 05:21:46 +04:00
package cmd
2014-04-10 22:20:58 +04:00
import (
2016-12-26 04:16:37 +03:00
"encoding/json"
2014-04-10 22:20:58 +04:00
"fmt"
"os"
"os/exec"
2014-06-29 18:31:46 +04:00
"path/filepath"
2014-04-10 22:20:58 +04:00
"strings"
2014-08-10 02:40:10 +04:00
"time"
2014-04-10 22:20:58 +04:00
2016-11-10 19:24:48 +03:00
"code.gitea.io/gitea/models"
"code.gitea.io/gitea/modules/log"
2018-08-07 21:49:18 +03:00
"code.gitea.io/gitea/modules/pprof"
2017-04-19 06:45:01 +03:00
"code.gitea.io/gitea/modules/private"
2016-11-10 19:24:48 +03:00
"code.gitea.io/gitea/modules/setting"
2017-12-14 02:45:31 +03:00
"code.gitea.io/gitea/modules/util"
2017-04-12 10:44:54 +03:00
2016-11-14 19:03:37 +03:00
"github.com/Unknwon/com"
2016-12-26 04:16:37 +03:00
"github.com/dgrijalva/jwt-go"
2016-11-10 01:18:22 +03:00
"github.com/urfave/cli"
2014-04-10 22:20:58 +04:00
)
2015-02-16 17:38:01 +03:00
const (
2016-12-26 04:16:37 +03:00
accessDenied = "Repository does not exist or you do not have access"
lfsAuthenticateVerb = "git-lfs-authenticate"
2015-02-16 17:38:01 +03:00
)
2016-11-04 14:42:18 +03:00
// CmdServ represents the available serv sub-command.
2014-04-10 22:20:58 +04:00
var CmdServ = cli . Command {
2014-05-05 08:55:17 +04:00
Name : "serv" ,
Usage : "This command should only be called by SSH shell" ,
Description : ` Serv provide access auth for repositories ` ,
Action : runServ ,
2015-02-05 13:12:37 +03:00
Flags : [ ] cli . Flag {
2016-11-10 01:18:22 +03:00
cli . StringFlag {
Name : "config, c" ,
Value : "custom/conf/app.ini" ,
Usage : "Custom configuration file path" ,
} ,
2018-08-07 21:49:18 +03:00
cli . BoolFlag {
Name : "enable-pprof" ,
} ,
2015-02-05 13:12:37 +03:00
} ,
2014-04-10 22:20:58 +04:00
}
2017-02-15 04:25:21 +03:00
func setup ( logPath string ) error {
2015-09-17 06:08:46 +03:00
setting . NewContext ( )
2014-06-29 18:31:46 +04:00
log . NewGitLogger ( filepath . Join ( setting . LogRootPath , logPath ) )
2015-09-17 06:08:46 +03:00
models . LoadConfigs ( )
2014-05-22 05:37:13 +04:00
2015-09-17 06:08:46 +03:00
if setting . UseSQLite3 || setting . UseTiDB {
2017-11-03 11:56:20 +03:00
workPath := setting . AppWorkPath
if err := os . Chdir ( workPath ) ; err != nil {
log . GitLogger . Fatal ( 4 , "Failed to change directory %s: %v" , workPath , err )
2016-12-01 02:56:15 +03:00
}
2014-05-22 05:37:13 +04:00
}
2017-02-20 11:11:13 +03:00
setting . NewXORMLogService ( true )
2017-02-15 04:25:21 +03:00
return models . SetEngine ( )
2014-05-22 05:37:13 +04:00
}
2014-04-10 22:20:58 +04:00
func parseCmd ( cmd string ) ( string , string ) {
ss := strings . SplitN ( cmd , " " , 2 )
if len ( ss ) != 2 {
return "" , ""
}
2015-02-16 17:38:01 +03:00
return ss [ 0 ] , strings . Replace ( ss [ 1 ] , "'/" , "'" , 1 )
2014-04-10 22:20:58 +04:00
}
2014-05-22 05:37:13 +04:00
var (
2015-11-24 06:32:07 +03:00
allowedCommands = map [ string ] models . AccessMode {
2016-11-07 19:20:37 +03:00
"git-upload-pack" : models . AccessModeRead ,
"git-upload-archive" : models . AccessModeRead ,
"git-receive-pack" : models . AccessModeWrite ,
2016-12-26 04:16:37 +03:00
lfsAuthenticateVerb : models . AccessModeNone ,
2014-05-22 05:37:13 +04:00
}
)
2015-08-06 17:48:11 +03:00
func fail ( userMessage , logMessage string , args ... interface { } ) {
2016-12-21 15:13:17 +03:00
fmt . Fprintln ( os . Stderr , "Gitea:" , userMessage )
2015-11-08 22:31:49 +03:00
if len ( logMessage ) > 0 {
2015-11-24 06:33:24 +03:00
if ! setting . ProdMode {
2015-11-30 18:00:52 +03:00
fmt . Fprintf ( os . Stderr , logMessage + "\n" , args ... )
2015-11-24 06:33:24 +03:00
}
2015-11-08 22:31:49 +03:00
log . GitLogger . Fatal ( 3 , logMessage , args ... )
return
}
log . GitLogger . Close ( )
os . Exit ( 1 )
2015-08-06 17:48:11 +03:00
}
2016-05-12 21:32:28 +03:00
func runServ ( c * cli . Context ) error {
2015-02-13 08:58:46 +03:00
if c . IsSet ( "config" ) {
setting . CustomConf = c . String ( "config" )
2015-02-05 13:12:37 +03:00
}
2016-02-22 05:55:59 +03:00
2017-02-15 04:25:21 +03:00
if err := setup ( "serv.log" ) ; err != nil {
fail ( "System init failed" , fmt . Sprintf ( "setup: %v" , err ) )
}
2014-04-10 22:20:58 +04:00
2016-02-28 04:48:39 +03:00
if setting . SSH . Disabled {
2016-12-21 15:13:17 +03:00
println ( "Gitea: SSH has been disabled" )
2016-05-12 21:32:28 +03:00
return nil
2016-02-22 05:55:59 +03:00
}
2015-02-13 08:58:46 +03:00
if len ( c . Args ( ) ) < 1 {
2017-04-12 10:44:54 +03:00
cli . ShowSubcommandHelp ( c )
return nil
2015-02-09 13:32:42 +03:00
}
2015-02-16 17:38:01 +03:00
2014-04-10 22:20:58 +04:00
cmd := os . Getenv ( "SSH_ORIGINAL_COMMAND" )
2015-08-05 06:14:17 +03:00
if len ( cmd ) == 0 {
2016-12-21 15:13:17 +03:00
println ( "Hi there, You've successfully authenticated, but Gitea does not provide shell access." )
println ( "If this is unexpected, please log in with password and setup Gitea under another user." )
2016-05-12 21:32:28 +03:00
return nil
2014-04-10 22:20:58 +04:00
}
verb , args := parseCmd ( cmd )
2016-12-26 04:16:37 +03:00
var lfsVerb string
if verb == lfsAuthenticateVerb {
if ! setting . LFS . StartServer {
fail ( "Unknown git command" , "LFS authentication request over SSH denied, LFS support is disabled" )
}
2017-03-22 13:43:28 +03:00
argsSplit := strings . Split ( args , " " )
if len ( argsSplit ) >= 2 {
2016-12-26 04:16:37 +03:00
args = strings . TrimSpace ( argsSplit [ 0 ] )
lfsVerb = strings . TrimSpace ( argsSplit [ 1 ] )
}
}
2015-11-09 19:39:03 +03:00
repoPath := strings . ToLower ( strings . Trim ( args , "'" ) )
2014-04-10 22:20:58 +04:00
rr := strings . SplitN ( repoPath , "/" , 2 )
if len ( rr ) != 2 {
2015-06-18 14:01:05 +03:00
fail ( "Invalid repository path" , "Invalid repository path: %v" , args )
2014-04-10 22:20:58 +04:00
}
2017-02-25 17:54:40 +03:00
2015-12-01 04:45:55 +03:00
username := strings . ToLower ( rr [ 0 ] )
reponame := strings . ToLower ( strings . TrimSuffix ( rr [ 1 ] , ".git" ) )
2018-08-07 21:49:18 +03:00
if setting . EnablePprof || c . Bool ( "enable-pprof" ) {
if err := os . MkdirAll ( setting . PprofDataPath , os . ModePerm ) ; err != nil {
fail ( "Error while trying to create PPROF_DATA_PATH" , "Error while trying to create PPROF_DATA_PATH: %v" , err )
}
stopCPUProfiler := pprof . DumpCPUProfileForUsername ( setting . PprofDataPath , username )
defer func ( ) {
stopCPUProfiler ( )
pprof . DumpMemProfileForUsername ( setting . PprofDataPath , username )
} ( )
}
2015-12-01 04:45:55 +03:00
isWiki := false
2017-05-18 17:54:24 +03:00
unitType := models . UnitTypeCode
2015-12-01 04:45:55 +03:00
if strings . HasSuffix ( reponame , ".wiki" ) {
isWiki = true
2017-05-18 17:54:24 +03:00
unitType = models . UnitTypeWiki
2015-12-01 04:45:55 +03:00
reponame = reponame [ : len ( reponame ) - 5 ]
}
2014-04-10 22:20:58 +04:00
2017-02-25 17:54:40 +03:00
os . Setenv ( models . EnvRepoUsername , username )
if isWiki {
os . Setenv ( models . EnvRepoIsWiki , "true" )
} else {
os . Setenv ( models . EnvRepoIsWiki , "false" )
}
os . Setenv ( models . EnvRepoName , reponame )
2017-12-02 10:34:39 +03:00
repo , err := models . GetRepositoryByOwnerAndName ( username , reponame )
2015-02-05 16:29:08 +03:00
if err != nil {
2015-03-16 11:04:27 +03:00
if models . IsErrRepoNotExist ( err ) {
2017-12-02 10:34:39 +03:00
fail ( accessDenied , "Repository does not exist: %s/%s" , username , reponame )
2015-02-05 16:29:08 +03:00
}
2015-06-18 14:01:05 +03:00
fail ( "Internal error" , "Failed to get repository: %v" , err )
2015-02-05 16:29:08 +03:00
}
2015-11-24 06:32:07 +03:00
requestedMode , has := allowedCommands [ verb ]
2015-02-16 17:38:01 +03:00
if ! has {
fail ( "Unknown git command" , "Unknown git command %s" , verb )
}
2014-04-10 22:20:58 +04:00
2016-12-26 04:16:37 +03:00
if verb == lfsAuthenticateVerb {
if lfsVerb == "upload" {
requestedMode = models . AccessModeWrite
2017-03-22 13:43:28 +03:00
} else if lfsVerb == "download" {
2016-12-26 04:16:37 +03:00
requestedMode = models . AccessModeRead
2017-03-22 13:43:28 +03:00
} else {
2017-06-05 10:49:46 +03:00
fail ( "Unknown LFS verb" , "Unknown lfs verb %s" , lfsVerb )
2016-12-26 04:16:37 +03:00
}
}
2015-11-08 22:31:49 +03:00
// Prohibit push to mirror repositories.
2016-11-07 19:20:37 +03:00
if requestedMode > models . AccessModeRead && repo . IsMirror {
2015-11-08 22:31:49 +03:00
fail ( "mirror repository is read-only" , "" )
}
2015-08-05 06:14:17 +03:00
// Allow anonymous clone for public repositories.
var (
keyID int64
user * models . User
)
2016-11-07 19:20:37 +03:00
if requestedMode == models . AccessModeWrite || repo . IsPrivate {
2015-08-05 06:14:17 +03:00
keys := strings . Split ( c . Args ( ) [ 0 ] , "-" )
if len ( keys ) != 2 {
2015-11-09 00:59:56 +03:00
fail ( "Key ID format error" , "Invalid key argument: %s" , c . Args ( ) [ 0 ] )
2015-08-05 06:14:17 +03:00
}
2015-08-06 17:48:11 +03:00
key , err := models . GetPublicKeyByID ( com . StrTo ( keys [ 1 ] ) . MustInt64 ( ) )
2015-08-05 06:14:17 +03:00
if err != nil {
2015-11-09 00:59:56 +03:00
fail ( "Invalid key ID" , "Invalid key ID[%s]: %v" , c . Args ( ) [ 0 ] , err )
2015-08-05 06:14:17 +03:00
}
2015-08-06 17:48:11 +03:00
keyID = key . ID
2015-08-05 06:14:17 +03:00
2015-08-06 17:48:11 +03:00
// Check deploy key or user key.
2016-11-07 19:53:22 +03:00
if key . Type == models . KeyTypeDeploy {
2015-08-06 17:48:11 +03:00
if key . Mode < requestedMode {
fail ( "Key permission denied" , "Cannot push with deployment key: %d" , key . ID )
}
// Check if this deploy key belongs to current repository.
2015-08-08 17:43:14 +03:00
if ! models . HasDeployKey ( key . ID , repo . ID ) {
2015-12-31 05:29:30 +03:00
fail ( "Key access denied" , "Deploy key access denied: [key_id: %d, repo_id: %d]" , key . ID , repo . ID )
2015-08-06 17:48:11 +03:00
}
2015-08-05 06:14:17 +03:00
2015-08-06 17:48:11 +03:00
// Update deploy key activity.
2015-08-08 17:43:14 +03:00
deployKey , err := models . GetDeployKeyByRepo ( key . ID , repo . ID )
2015-08-06 17:48:11 +03:00
if err != nil {
fail ( "Internal error" , "GetDeployKey: %v" , err )
}
2017-12-14 02:45:31 +03:00
deployKey . UpdatedUnix = util . TimeStampNow ( )
if err = models . UpdateDeployKeyCols ( deployKey , "updated_unix" ) ; err != nil {
2015-08-06 17:48:11 +03:00
fail ( "Internal error" , "UpdateDeployKey: %v" , err )
}
} else {
2015-11-05 05:57:10 +03:00
user , err = models . GetUserByKeyID ( key . ID )
2015-08-06 17:48:11 +03:00
if err != nil {
fail ( "internal error" , "Failed to get user by key ID(%d): %v" , keyID , err )
}
2018-05-02 16:22:56 +03:00
if ! user . IsActive || user . ProhibitLogin {
fail ( "Your account is not active or has been disabled by Administrator" ,
"User %s is disabled and have no access to repository %s" ,
user . Name , repoPath )
}
2017-03-15 03:51:46 +03:00
mode , err := models . AccessLevel ( user . ID , repo )
2015-08-06 17:48:11 +03:00
if err != nil {
2017-01-29 23:13:57 +03:00
fail ( "Internal error" , "Failed to check access: %v" , err )
2015-08-06 17:48:11 +03:00
} else if mode < requestedMode {
2016-11-04 14:42:18 +03:00
clientMessage := accessDenied
2016-11-07 19:20:37 +03:00
if mode >= models . AccessModeRead {
2015-08-06 17:48:11 +03:00
clientMessage = "You do not have sufficient authorization for this action"
}
fail ( clientMessage ,
"User %s does not have level %v access to repository %s" ,
user . Name , requestedMode , repoPath )
2015-08-05 06:14:17 +03:00
}
2016-12-06 23:58:34 +03:00
2017-05-19 03:59:26 +03:00
if ! repo . CheckUnitUser ( user . ID , user . IsAdmin , unitType ) {
2017-05-18 17:54:24 +03:00
fail ( "You do not have allowed for this action" ,
"User %s does not have allowed access to repository %s 's code" ,
user . Name , repoPath )
}
2017-02-25 17:54:40 +03:00
os . Setenv ( models . EnvPusherName , user . Name )
os . Setenv ( models . EnvPusherID , fmt . Sprintf ( "%d" , user . ID ) )
2014-04-10 22:20:58 +04:00
}
}
2016-12-26 04:16:37 +03:00
//LFS token authentication
if verb == lfsAuthenticateVerb {
2017-12-02 10:34:39 +03:00
url := fmt . Sprintf ( "%s%s/%s.git/info/lfs" , setting . AppURL , username , repo . Name )
2016-12-26 04:16:37 +03:00
now := time . Now ( )
2018-01-27 19:48:15 +03:00
claims := jwt . MapClaims {
2016-12-26 04:16:37 +03:00
"repo" : repo . ID ,
"op" : lfsVerb ,
2018-05-29 11:07:16 +03:00
"exp" : now . Add ( setting . LFS . HTTPAuthExpiry ) . Unix ( ) ,
2016-12-26 04:16:37 +03:00
"nbf" : now . Unix ( ) ,
2018-01-27 19:48:15 +03:00
}
if user != nil {
claims [ "user" ] = user . ID
}
token := jwt . NewWithClaims ( jwt . SigningMethodHS256 , claims )
2016-12-26 04:16:37 +03:00
// Sign and get the complete encoded token as a string using the secret
tokenString , err := token . SignedString ( setting . LFS . JWTSecretBytes )
if err != nil {
fail ( "Internal error" , "Failed to sign JWT token: %v" , err )
}
tokenAuthentication := & models . LFSTokenResponse {
Header : make ( map [ string ] string ) ,
Href : url ,
}
tokenAuthentication . Header [ "Authorization" ] = fmt . Sprintf ( "Bearer %s" , tokenString )
enc := json . NewEncoder ( os . Stdout )
err = enc . Encode ( tokenAuthentication )
if err != nil {
fail ( "Internal error" , "Failed to encode LFS json response: %v" , err )
}
return nil
}
2015-11-24 06:32:07 +03:00
// Special handle for Windows.
if setting . IsWindows {
verb = strings . Replace ( verb , "-" , " " , 1 )
}
2014-10-01 15:40:48 +04:00
var gitcmd * exec . Cmd
verbs := strings . Split ( verb , " " )
if len ( verbs ) == 2 {
gitcmd = exec . Command ( verbs [ 0 ] , verbs [ 1 ] , repoPath )
} else {
gitcmd = exec . Command ( verb , repoPath )
}
2017-02-21 18:02:10 +03:00
2017-03-17 07:59:42 +03:00
if isWiki {
if err = repo . InitWiki ( ) ; err != nil {
fail ( "Internal error" , "Failed to init wiki repo: %v" , err )
}
}
2017-02-21 18:02:10 +03:00
os . Setenv ( models . ProtectedBranchRepoID , fmt . Sprintf ( "%d" , repo . ID ) )
2014-05-26 04:11:25 +04:00
gitcmd . Dir = setting . RepoRootPath
2014-04-10 22:20:58 +04:00
gitcmd . Stdout = os . Stdout
gitcmd . Stdin = os . Stdin
gitcmd . Stderr = os . Stderr
2014-07-26 08:24:27 +04:00
if err = gitcmd . Run ( ) ; err != nil {
2015-06-18 14:01:05 +03:00
fail ( "Internal error" , "Failed to execute git command: %v" , err )
2014-04-10 22:20:58 +04:00
}
2014-06-28 19:56:41 +04:00
2015-08-06 17:48:11 +03:00
// Update user key activity.
2015-08-05 06:14:17 +03:00
if keyID > 0 {
2017-04-19 06:45:01 +03:00
if err = private . UpdatePublicKeyUpdated ( keyID ) ; err != nil {
2015-08-05 06:14:17 +03:00
fail ( "Internal error" , "UpdatePublicKey: %v" , err )
}
2014-08-10 02:40:10 +04:00
}
2016-05-12 21:32:28 +03:00
return nil
2014-04-10 22:20:58 +04:00
}