mirror of
https://codeberg.org/forgejo/forgejo
synced 2024-11-29 21:26:10 +01:00
01c10a951b
1. A key can either be an ssh user key or a deploy key. It cannot be both. 2. If a key is a user key - it can only be associated with one user. 3. If a key is a deploy key - it can be used in multiple repositories and the permissions it has on those repositories can be different. 4. If a repository is deleted, its deploy keys must be deleted too. We currently don't enforce any of this and multiple repositories access with different permissions doesn't work at all. This PR enforces the following constraints: - [x] You should not be able to add the same user key as another user - [x] You should not be able to add a ssh user key which is being used as a deploy key - [x] You should not be able to add a ssh deploy key which is being used as a user key - [x] If you add an ssh deploy key to another repository you should be able to use it in different modes without losing the ability to use it in the other mode. - [x] If you delete a repository you must delete all its deploy keys. Fix #1357
142 lines
3.8 KiB
Go
142 lines
3.8 KiB
Go
// Copyright 2018 The Gitea Authors. All rights reserved.
|
|
// Use of this source code is governed by a MIT-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package private
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
|
|
"code.gitea.io/gitea/models"
|
|
"code.gitea.io/gitea/modules/log"
|
|
"code.gitea.io/gitea/modules/setting"
|
|
)
|
|
|
|
// UpdateDeployKeyUpdated update deploy key updates
|
|
func UpdateDeployKeyUpdated(keyID int64, repoID int64) error {
|
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/repositories/%d/keys/%d/update", repoID, keyID)
|
|
log.GitLogger.Trace("UpdateDeployKeyUpdated: %s", reqURL)
|
|
|
|
resp, err := newInternalRequest(reqURL, "POST").Response()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
// All 2XX status codes are accepted and others will return an error
|
|
if resp.StatusCode/100 != 2 {
|
|
return fmt.Errorf("Failed to update deploy key: %s", decodeJSONError(resp).Err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// GetDeployKey check if repo has deploy key
|
|
func GetDeployKey(keyID, repoID int64) (*models.DeployKey, error) {
|
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/repositories/%d/keys/%d", repoID, keyID)
|
|
log.GitLogger.Trace("GetDeployKey: %s", reqURL)
|
|
|
|
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
switch resp.StatusCode {
|
|
case 404:
|
|
return nil, nil
|
|
case 200:
|
|
var dKey models.DeployKey
|
|
if err := json.NewDecoder(resp.Body).Decode(&dKey); err != nil {
|
|
return nil, err
|
|
}
|
|
return &dKey, nil
|
|
default:
|
|
return nil, fmt.Errorf("Failed to get deploy key: %s", decodeJSONError(resp).Err)
|
|
}
|
|
}
|
|
|
|
// HasDeployKey check if repo has deploy key
|
|
func HasDeployKey(keyID, repoID int64) (bool, error) {
|
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/repositories/%d/has-keys/%d", repoID, keyID)
|
|
log.GitLogger.Trace("HasDeployKey: %s", reqURL)
|
|
|
|
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
if resp.StatusCode == 200 {
|
|
return true, nil
|
|
}
|
|
return false, nil
|
|
}
|
|
|
|
// GetPublicKeyByID get public ssh key by his ID
|
|
func GetPublicKeyByID(keyID int64) (*models.PublicKey, error) {
|
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/ssh/%d", keyID)
|
|
log.GitLogger.Trace("GetPublicKeyByID: %s", reqURL)
|
|
|
|
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
if resp.StatusCode != 200 {
|
|
return nil, fmt.Errorf("Failed to get repository: %s", decodeJSONError(resp).Err)
|
|
}
|
|
|
|
var pKey models.PublicKey
|
|
if err := json.NewDecoder(resp.Body).Decode(&pKey); err != nil {
|
|
return nil, err
|
|
}
|
|
return &pKey, nil
|
|
}
|
|
|
|
// GetUserByKeyID get user attached to key
|
|
func GetUserByKeyID(keyID int64) (*models.User, error) {
|
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/ssh/%d/user", keyID)
|
|
log.GitLogger.Trace("GetUserByKeyID: %s", reqURL)
|
|
|
|
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
if resp.StatusCode != 200 {
|
|
return nil, fmt.Errorf("Failed to get user: %s", decodeJSONError(resp).Err)
|
|
}
|
|
|
|
var user models.User
|
|
if err := json.NewDecoder(resp.Body).Decode(&user); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &user, nil
|
|
}
|
|
|
|
// UpdatePublicKeyUpdated update public key updates
|
|
func UpdatePublicKeyUpdated(keyID int64) error {
|
|
// Ask for running deliver hook and test pull request tasks.
|
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/ssh/%d/update", keyID)
|
|
log.GitLogger.Trace("UpdatePublicKeyUpdated: %s", reqURL)
|
|
|
|
resp, err := newInternalRequest(reqURL, "POST").Response()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
// All 2XX status codes are accepted and others will return an error
|
|
if resp.StatusCode/100 != 2 {
|
|
return fmt.Errorf("Failed to update public key: %s", decodeJSONError(resp).Err)
|
|
}
|
|
return nil
|
|
}
|