mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2024-11-27 18:01:21 +03:00
203 lines
4.5 KiB
Go
203 lines
4.5 KiB
Go
// Copyright 2014 The Gogs Authors. All rights reserved.
|
|
// Use of this source code is governed by a MIT-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package main
|
|
|
|
import (
|
|
//"container/list"
|
|
"fmt"
|
|
"os"
|
|
"os/exec"
|
|
"path"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/codegangsta/cli"
|
|
"github.com/gogits/gogs/modules/log"
|
|
|
|
//"github.com/gogits/git"
|
|
"github.com/gogits/gogs/models"
|
|
"github.com/gogits/gogs/modules/base"
|
|
)
|
|
|
|
var (
|
|
COMMANDS_READONLY = map[string]int{
|
|
"git-upload-pack": models.AU_WRITABLE,
|
|
"git upload-pack": models.AU_WRITABLE,
|
|
"git-upload-archive": models.AU_WRITABLE,
|
|
}
|
|
|
|
COMMANDS_WRITE = map[string]int{
|
|
"git-receive-pack": models.AU_READABLE,
|
|
"git receive-pack": models.AU_READABLE,
|
|
}
|
|
)
|
|
|
|
var CmdServ = cli.Command{
|
|
Name: "serv",
|
|
Usage: "This command just should be called by ssh shell",
|
|
Description: `
|
|
gogs serv provide access auth for repositories`,
|
|
Action: runServ,
|
|
Flags: []cli.Flag{},
|
|
}
|
|
|
|
func newLogger(execDir string) {
|
|
level := "0"
|
|
logPath := execDir + "/log/serv.log"
|
|
os.MkdirAll(path.Dir(logPath), os.ModePerm)
|
|
log.NewLogger(0, "file", fmt.Sprintf(`{"level":%s,"filename":"%s"}`, level, logPath))
|
|
log.Trace("start logging...")
|
|
}
|
|
|
|
func parseCmd(cmd string) (string, string) {
|
|
ss := strings.SplitN(cmd, " ", 2)
|
|
if len(ss) != 2 {
|
|
return "", ""
|
|
}
|
|
|
|
verb, args := ss[0], ss[1]
|
|
if verb == "git" {
|
|
ss = strings.SplitN(args, " ", 2)
|
|
args = ss[1]
|
|
verb = fmt.Sprintf("%s %s", verb, ss[0])
|
|
}
|
|
return verb, args
|
|
}
|
|
|
|
func In(b string, sl map[string]int) bool {
|
|
_, e := sl[b]
|
|
return e
|
|
}
|
|
|
|
func runServ(k *cli.Context) {
|
|
execDir, _ := base.ExecDir()
|
|
newLogger(execDir)
|
|
|
|
base.NewConfigContext()
|
|
models.LoadModelsConfig()
|
|
|
|
if models.UseSQLite3 {
|
|
os.Chdir(execDir)
|
|
}
|
|
|
|
models.SetEngine()
|
|
|
|
keys := strings.Split(os.Args[2], "-")
|
|
if len(keys) != 2 {
|
|
println("auth file format error")
|
|
log.Error("auth file format error")
|
|
return
|
|
}
|
|
|
|
keyId, err := strconv.ParseInt(keys[1], 10, 64)
|
|
if err != nil {
|
|
println("auth file format error")
|
|
log.Error("auth file format error", err)
|
|
return
|
|
}
|
|
user, err := models.GetUserByKeyId(keyId)
|
|
if err != nil {
|
|
println("You have no right to access")
|
|
log.Error("SSH visit error: %v", err)
|
|
return
|
|
}
|
|
|
|
cmd := os.Getenv("SSH_ORIGINAL_COMMAND")
|
|
if cmd == "" {
|
|
println("Hi", user.Name, "! You've successfully authenticated, but Gogs does not provide shell access.")
|
|
return
|
|
}
|
|
|
|
verb, args := parseCmd(cmd)
|
|
repoPath := strings.Trim(args, "'")
|
|
rr := strings.SplitN(repoPath, "/", 2)
|
|
if len(rr) != 2 {
|
|
println("Unavilable repository", args)
|
|
log.Error("Unavilable repository %v", args)
|
|
return
|
|
}
|
|
repoUserName := rr[0]
|
|
repoName := rr[1]
|
|
if strings.HasSuffix(repoName, ".git") {
|
|
repoName = repoName[:len(repoName)-4]
|
|
}
|
|
|
|
isWrite := In(verb, COMMANDS_WRITE)
|
|
isRead := In(verb, COMMANDS_READONLY)
|
|
|
|
repoUser, err := models.GetUserByName(repoUserName)
|
|
if err != nil {
|
|
fmt.Println("You have no right to access")
|
|
log.Error("Get user failed", err)
|
|
return
|
|
}
|
|
|
|
// access check
|
|
switch {
|
|
case isWrite:
|
|
has, err := models.HasAccess(user.LowerName, path.Join(repoUserName, repoName), models.AU_WRITABLE)
|
|
if err != nil {
|
|
println("Inernel error:", err)
|
|
log.Error(err.Error())
|
|
return
|
|
} else if !has {
|
|
println("You have no right to write this repository")
|
|
log.Error("User %s has no right to write repository %s", user.Name, repoPath)
|
|
return
|
|
}
|
|
case isRead:
|
|
repo, err := models.GetRepositoryByName(repoUser.Id, repoName)
|
|
if err != nil {
|
|
println("Get repository error:", err)
|
|
log.Error("Get repository error: " + err.Error())
|
|
return
|
|
}
|
|
|
|
if !repo.IsPrivate {
|
|
break
|
|
}
|
|
|
|
has, err := models.HasAccess(user.Name, repoPath, models.AU_READABLE)
|
|
if err != nil {
|
|
println("Inernel error")
|
|
log.Error(err.Error())
|
|
return
|
|
}
|
|
if !has {
|
|
has, err = models.HasAccess(user.Name, repoPath, models.AU_WRITABLE)
|
|
if err != nil {
|
|
println("Inernel error")
|
|
log.Error(err.Error())
|
|
return
|
|
}
|
|
}
|
|
if !has {
|
|
println("You have no right to access this repository")
|
|
log.Error("You have no right to access this repository")
|
|
return
|
|
}
|
|
default:
|
|
println("Unknown command")
|
|
log.Error("Unknown command")
|
|
return
|
|
}
|
|
|
|
// for update use
|
|
os.Setenv("userName", user.Name)
|
|
os.Setenv("userId", strconv.Itoa(int(user.Id)))
|
|
os.Setenv("repoName", repoName)
|
|
|
|
gitcmd := exec.Command(verb, repoPath)
|
|
gitcmd.Dir = base.RepoRootPath
|
|
gitcmd.Stdout = os.Stdout
|
|
gitcmd.Stdin = os.Stdin
|
|
gitcmd.Stderr = os.Stderr
|
|
|
|
if err = gitcmd.Run(); err != nil {
|
|
println("execute command error:", err.Error())
|
|
log.Error("execute command error: " + err.Error())
|
|
return
|
|
}
|
|
}
|