mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-31 19:06:18 +01:00 
			
		
		
		
	Fix SSH auth lfs locks (#3152)
* Fix SSH auth LFS locks * Activate SSH/lock test * Remove debug * Follow @lunny recommendation for AfterLoad method
This commit is contained in:
		
				
					committed by
					
						 Lauris BH
						Lauris BH
					
				
			
			
				
	
			
			
			
						parent
						
							97fe773491
						
					
				
				
					commit
					9e842c8a72
				
			| @@ -259,12 +259,16 @@ func runServ(c *cli.Context) error { | |||||||
| 		url := fmt.Sprintf("%s%s/%s.git/info/lfs", setting.AppURL, username, repo.Name) | 		url := fmt.Sprintf("%s%s/%s.git/info/lfs", setting.AppURL, username, repo.Name) | ||||||
|  |  | ||||||
| 		now := time.Now() | 		now := time.Now() | ||||||
| 		token := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{ | 		claims := jwt.MapClaims{ | ||||||
| 			"repo": repo.ID, | 			"repo": repo.ID, | ||||||
| 			"op":   lfsVerb, | 			"op":   lfsVerb, | ||||||
| 			"exp":  now.Add(5 * time.Minute).Unix(), | 			"exp":  now.Add(5 * time.Minute).Unix(), | ||||||
| 			"nbf":  now.Unix(), | 			"nbf":  now.Unix(), | ||||||
| 		}) | 		} | ||||||
|  | 		if user != nil { | ||||||
|  | 			claims["user"] = user.ID | ||||||
|  | 		} | ||||||
|  | 		token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims) | ||||||
|  |  | ||||||
| 		// Sign and get the complete encoded token as a string using the secret | 		// Sign and get the complete encoded token as a string using the secret | ||||||
| 		tokenString, err := token.SignedString(setting.LFS.JWTSecretBytes) | 		tokenString, err := token.SignedString(setting.LFS.JWTSecretBytes) | ||||||
|   | |||||||
| @@ -41,10 +41,10 @@ func TestAPILFSLocksNotLogin(t *testing.T) { | |||||||
|  |  | ||||||
| 	req := NewRequestf(t, "GET", "/%s/%s.git/info/lfs/locks", user.Name, repo.Name) | 	req := NewRequestf(t, "GET", "/%s/%s.git/info/lfs/locks", user.Name, repo.Name) | ||||||
| 	req.Header.Set("Accept", "application/vnd.git-lfs+json") | 	req.Header.Set("Accept", "application/vnd.git-lfs+json") | ||||||
| 	resp := MakeRequest(t, req, http.StatusForbidden) | 	resp := MakeRequest(t, req, http.StatusUnauthorized) | ||||||
| 	var lfsLockError api.LFSLockError | 	var lfsLockError api.LFSLockError | ||||||
| 	DecodeJSON(t, resp, &lfsLockError) | 	DecodeJSON(t, resp, &lfsLockError) | ||||||
| 	assert.Equal(t, "You must have pull access to list locks : User undefined doesn't have rigth to list for lfs lock [rid: 1]", lfsLockError.Message) | 	assert.Equal(t, "Unauthorized", lfsLockError.Message) | ||||||
| } | } | ||||||
|  |  | ||||||
| func TestAPILFSLocksLogged(t *testing.T) { | func TestAPILFSLocksLogged(t *testing.T) { | ||||||
| @@ -68,8 +68,8 @@ func TestAPILFSLocksLogged(t *testing.T) { | |||||||
| 		{user: user2, repo: repo1, path: "path/test", httpResult: http.StatusConflict}, | 		{user: user2, repo: repo1, path: "path/test", httpResult: http.StatusConflict}, | ||||||
| 		{user: user2, repo: repo1, path: "Foo/BaR.zip", httpResult: http.StatusConflict}, | 		{user: user2, repo: repo1, path: "Foo/BaR.zip", httpResult: http.StatusConflict}, | ||||||
| 		{user: user2, repo: repo1, path: "Foo/Test/../subFOlder/../Relative/../BaR.zip", httpResult: http.StatusConflict}, | 		{user: user2, repo: repo1, path: "Foo/Test/../subFOlder/../Relative/../BaR.zip", httpResult: http.StatusConflict}, | ||||||
| 		{user: user4, repo: repo1, path: "FoO/BaR.zip", httpResult: http.StatusForbidden}, | 		{user: user4, repo: repo1, path: "FoO/BaR.zip", httpResult: http.StatusUnauthorized}, | ||||||
| 		{user: user4, repo: repo1, path: "path/test-user4", httpResult: http.StatusForbidden}, | 		{user: user4, repo: repo1, path: "path/test-user4", httpResult: http.StatusUnauthorized}, | ||||||
| 		{user: user2, repo: repo1, path: "patH/Test-user4", httpResult: http.StatusCreated, addTime: []int{0}}, | 		{user: user2, repo: repo1, path: "patH/Test-user4", httpResult: http.StatusCreated, addTime: []int{0}}, | ||||||
| 		{user: user2, repo: repo1, path: "some/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/path", httpResult: http.StatusCreated, addTime: []int{0}}, | 		{user: user2, repo: repo1, path: "some/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/path", httpResult: http.StatusCreated, addTime: []int{0}}, | ||||||
|  |  | ||||||
|   | |||||||
| @@ -214,11 +214,9 @@ func TestGit(t *testing.T) { | |||||||
| 						commitAndPush(t, bigSize, dstPath) | 						commitAndPush(t, bigSize, dstPath) | ||||||
| 					}) | 					}) | ||||||
| 				}) | 				}) | ||||||
| 				/* Failed without #3152. TODO activate with fix. |  | ||||||
| 				t.Run("Locks", func(t *testing.T) { | 				t.Run("Locks", func(t *testing.T) { | ||||||
| 					lockTest(t, u.String(), dstPath) | 					lockTest(t, u.String(), dstPath) | ||||||
| 				}) | 				}) | ||||||
| 				*/ |  | ||||||
| 			}) | 			}) | ||||||
| 		}) | 		}) | ||||||
| 	}) | 	}) | ||||||
|   | |||||||
| @@ -530,21 +530,24 @@ func (err ErrLFSLockNotExist) Error() string { | |||||||
| 	return fmt.Sprintf("lfs lock does not exist [id: %d, rid: %d, path: %s]", err.ID, err.RepoID, err.Path) | 	return fmt.Sprintf("lfs lock does not exist [id: %d, rid: %d, path: %s]", err.ID, err.RepoID, err.Path) | ||||||
| } | } | ||||||
|  |  | ||||||
| // ErrLFSLockUnauthorizedAction represents a "LFSLockUnauthorizedAction" kind of error. | // ErrLFSUnauthorizedAction represents a "LFSUnauthorizedAction" kind of error. | ||||||
| type ErrLFSLockUnauthorizedAction struct { | type ErrLFSUnauthorizedAction struct { | ||||||
| 	RepoID   int64 | 	RepoID   int64 | ||||||
| 	UserName string | 	UserName string | ||||||
| 	Action   string | 	Mode     AccessMode | ||||||
| } | } | ||||||
|  |  | ||||||
| // IsErrLFSLockUnauthorizedAction checks if an error is a ErrLFSLockUnauthorizedAction. | // IsErrLFSUnauthorizedAction checks if an error is a ErrLFSUnauthorizedAction. | ||||||
| func IsErrLFSLockUnauthorizedAction(err error) bool { | func IsErrLFSUnauthorizedAction(err error) bool { | ||||||
| 	_, ok := err.(ErrLFSLockUnauthorizedAction) | 	_, ok := err.(ErrLFSUnauthorizedAction) | ||||||
| 	return ok | 	return ok | ||||||
| } | } | ||||||
|  |  | ||||||
| func (err ErrLFSLockUnauthorizedAction) Error() string { | func (err ErrLFSUnauthorizedAction) Error() string { | ||||||
| 	return fmt.Sprintf("User %s doesn't have rigth to %s for lfs lock [rid: %d]", err.UserName, err.Action, err.RepoID) | 	if err.Mode == AccessModeWrite { | ||||||
|  | 		return fmt.Sprintf("User %s doesn't have write access for lfs lock [rid: %d]", err.UserName, err.RepoID) | ||||||
|  | 	} | ||||||
|  | 	return fmt.Sprintf("User %s doesn't have read access for lfs lock [rid: %d]", err.UserName, err.RepoID) | ||||||
| } | } | ||||||
|  |  | ||||||
| // ErrLFSLockAlreadyExist represents a "LFSLockAlreadyExist" kind of error. | // ErrLFSLockAlreadyExist represents a "LFSLockAlreadyExist" kind of error. | ||||||
|   | |||||||
| @@ -11,12 +11,15 @@ import ( | |||||||
| 	"strings" | 	"strings" | ||||||
| 	"time" | 	"time" | ||||||
|  |  | ||||||
|  | 	"code.gitea.io/gitea/modules/log" | ||||||
| 	api "code.gitea.io/sdk/gitea" | 	api "code.gitea.io/sdk/gitea" | ||||||
|  | 	"github.com/go-xorm/xorm" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| // LFSLock represents a git lfs lock of repository. | // LFSLock represents a git lfs lock of repository. | ||||||
| type LFSLock struct { | type LFSLock struct { | ||||||
| 	ID      int64       `xorm:"pk autoincr"` | 	ID      int64       `xorm:"pk autoincr"` | ||||||
|  | 	Repo    *Repository `xorm:"-"` | ||||||
| 	RepoID  int64       `xorm:"INDEX NOT NULL"` | 	RepoID  int64       `xorm:"INDEX NOT NULL"` | ||||||
| 	Owner   *User       `xorm:"-"` | 	Owner   *User       `xorm:"-"` | ||||||
| 	OwnerID int64       `xorm:"INDEX NOT NULL"` | 	OwnerID int64       `xorm:"INDEX NOT NULL"` | ||||||
| @@ -27,12 +30,21 @@ type LFSLock struct { | |||||||
| // BeforeInsert is invoked from XORM before inserting an object of this type. | // BeforeInsert is invoked from XORM before inserting an object of this type. | ||||||
| func (l *LFSLock) BeforeInsert() { | func (l *LFSLock) BeforeInsert() { | ||||||
| 	l.OwnerID = l.Owner.ID | 	l.OwnerID = l.Owner.ID | ||||||
|  | 	l.RepoID = l.Repo.ID | ||||||
| 	l.Path = cleanPath(l.Path) | 	l.Path = cleanPath(l.Path) | ||||||
| } | } | ||||||
|  |  | ||||||
| // AfterLoad is invoked from XORM after setting the values of all fields of this object. | // AfterLoad is invoked from XORM after setting the values of all fields of this object. | ||||||
| func (l *LFSLock) AfterLoad() { | func (l *LFSLock) AfterLoad(session *xorm.Session) { | ||||||
| 	l.Owner, _ = GetUserByID(l.OwnerID) | 	var err error | ||||||
|  | 	l.Owner, err = getUserByID(session, l.OwnerID) | ||||||
|  | 	if err != nil { | ||||||
|  | 		log.Error(2, "LFS lock AfterLoad failed OwnerId[%d] not found: %v", l.OwnerID, err) | ||||||
|  | 	} | ||||||
|  | 	l.Repo, err = getRepositoryByID(session, l.RepoID) | ||||||
|  | 	if err != nil { | ||||||
|  | 		log.Error(2, "LFS lock AfterLoad failed RepoId[%d] not found: %v", l.RepoID, err) | ||||||
|  | 	} | ||||||
| } | } | ||||||
|  |  | ||||||
| func cleanPath(p string) string { | func cleanPath(p string) string { | ||||||
| @@ -53,12 +65,12 @@ func (l *LFSLock) APIFormat() *api.LFSLock { | |||||||
|  |  | ||||||
| // CreateLFSLock creates a new lock. | // CreateLFSLock creates a new lock. | ||||||
| func CreateLFSLock(lock *LFSLock) (*LFSLock, error) { | func CreateLFSLock(lock *LFSLock) (*LFSLock, error) { | ||||||
| 	err := CheckLFSAccessForRepo(lock.Owner, lock.RepoID, "create") | 	err := CheckLFSAccessForRepo(lock.Owner, lock.Repo, AccessModeWrite) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return nil, err | 		return nil, err | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	l, err := GetLFSLock(lock.RepoID, lock.Path) | 	l, err := GetLFSLock(lock.Repo, lock.Path) | ||||||
| 	if err == nil { | 	if err == nil { | ||||||
| 		return l, ErrLFSLockAlreadyExist{lock.RepoID, lock.Path} | 		return l, ErrLFSLockAlreadyExist{lock.RepoID, lock.Path} | ||||||
| 	} | 	} | ||||||
| @@ -71,15 +83,15 @@ func CreateLFSLock(lock *LFSLock) (*LFSLock, error) { | |||||||
| } | } | ||||||
|  |  | ||||||
| // GetLFSLock returns release by given path. | // GetLFSLock returns release by given path. | ||||||
| func GetLFSLock(repoID int64, path string) (*LFSLock, error) { | func GetLFSLock(repo *Repository, path string) (*LFSLock, error) { | ||||||
| 	path = cleanPath(path) | 	path = cleanPath(path) | ||||||
| 	rel := &LFSLock{RepoID: repoID} | 	rel := &LFSLock{RepoID: repo.ID} | ||||||
| 	has, err := x.Where("lower(path) = ?", strings.ToLower(path)).Get(rel) | 	has, err := x.Where("lower(path) = ?", strings.ToLower(path)).Get(rel) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return nil, err | 		return nil, err | ||||||
| 	} | 	} | ||||||
| 	if !has { | 	if !has { | ||||||
| 		return nil, ErrLFSLockNotExist{0, repoID, path} | 		return nil, ErrLFSLockNotExist{0, repo.ID, path} | ||||||
| 	} | 	} | ||||||
| 	return rel, nil | 	return rel, nil | ||||||
| } | } | ||||||
| @@ -109,7 +121,7 @@ func DeleteLFSLockByID(id int64, u *User, force bool) (*LFSLock, error) { | |||||||
| 		return nil, err | 		return nil, err | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	err = CheckLFSAccessForRepo(u, lock.RepoID, "delete") | 	err = CheckLFSAccessForRepo(u, lock.Repo, AccessModeWrite) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return nil, err | 		return nil, err | ||||||
| 	} | 	} | ||||||
| @@ -123,24 +135,15 @@ func DeleteLFSLockByID(id int64, u *User, force bool) (*LFSLock, error) { | |||||||
| } | } | ||||||
|  |  | ||||||
| //CheckLFSAccessForRepo check needed access mode base on action | //CheckLFSAccessForRepo check needed access mode base on action | ||||||
| func CheckLFSAccessForRepo(u *User, repoID int64, action string) error { | func CheckLFSAccessForRepo(u *User, repo *Repository, mode AccessMode) error { | ||||||
| 	if u == nil { | 	if u == nil { | ||||||
| 		return ErrLFSLockUnauthorizedAction{repoID, "undefined", action} | 		return ErrLFSUnauthorizedAction{repo.ID, "undefined", mode} | ||||||
| 	} |  | ||||||
| 	mode := AccessModeRead |  | ||||||
| 	if action == "create" || action == "delete" || action == "verify" { |  | ||||||
| 		mode = AccessModeWrite |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	repo, err := GetRepositoryByID(repoID) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return err |  | ||||||
| 	} | 	} | ||||||
| 	has, err := HasAccess(u.ID, repo, mode) | 	has, err := HasAccess(u.ID, repo, mode) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return err | 		return err | ||||||
| 	} else if !has { | 	} else if !has { | ||||||
| 		return ErrLFSLockUnauthorizedAction{repo.ID, u.DisplayName(), action} | 		return ErrLFSUnauthorizedAction{repo.ID, u.DisplayName(), mode} | ||||||
| 	} | 	} | ||||||
| 	return nil | 	return nil | ||||||
| } | } | ||||||
|   | |||||||
| @@ -13,24 +13,35 @@ import ( | |||||||
| 	"code.gitea.io/gitea/modules/context" | 	"code.gitea.io/gitea/modules/context" | ||||||
| 	"code.gitea.io/gitea/modules/setting" | 	"code.gitea.io/gitea/modules/setting" | ||||||
| 	api "code.gitea.io/sdk/gitea" | 	api "code.gitea.io/sdk/gitea" | ||||||
|  |  | ||||||
| 	"gopkg.in/macaron.v1" |  | ||||||
| ) | ) | ||||||
|  |  | ||||||
| func checkRequest(req macaron.Request, post bool) int { | //checkIsValidRequest check if it a valid request in case of bad request it write the response to ctx. | ||||||
|  | func checkIsValidRequest(ctx *context.Context, post bool) bool { | ||||||
| 	if !setting.LFS.StartServer { | 	if !setting.LFS.StartServer { | ||||||
| 		return 404 | 		writeStatus(ctx, 404) | ||||||
|  | 		return false | ||||||
| 	} | 	} | ||||||
| 	if !MetaMatcher(req) { | 	if !MetaMatcher(ctx.Req) { | ||||||
| 		return 400 | 		writeStatus(ctx, 400) | ||||||
|  | 		return false | ||||||
|  | 	} | ||||||
|  | 	if !ctx.IsSigned { | ||||||
|  | 		user, _, _, err := parseToken(ctx.Req.Header.Get("Authorization")) | ||||||
|  | 		if err != nil { | ||||||
|  | 			ctx.Resp.Header().Set("WWW-Authenticate", "Basic realm=gitea-lfs") | ||||||
|  | 			writeStatus(ctx, 401) | ||||||
|  | 			return false | ||||||
|  | 		} | ||||||
|  | 		ctx.User = user | ||||||
| 	} | 	} | ||||||
| 	if post { | 	if post { | ||||||
| 		mediaParts := strings.Split(req.Header.Get("Content-Type"), ";") | 		mediaParts := strings.Split(ctx.Req.Header.Get("Content-Type"), ";") | ||||||
| 		if mediaParts[0] != metaMediaType { | 		if mediaParts[0] != metaMediaType { | ||||||
| 			return 400 | 			writeStatus(ctx, 400) | ||||||
|  | 			return false | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 	return 200 | 	return true | ||||||
| } | } | ||||||
|  |  | ||||||
| func handleLockListOut(ctx *context.Context, lock *models.LFSLock, err error) { | func handleLockListOut(ctx *context.Context, lock *models.LFSLock, err error) { | ||||||
| @@ -59,17 +70,16 @@ func handleLockListOut(ctx *context.Context, lock *models.LFSLock, err error) { | |||||||
|  |  | ||||||
| // GetListLockHandler list locks | // GetListLockHandler list locks | ||||||
| func GetListLockHandler(ctx *context.Context) { | func GetListLockHandler(ctx *context.Context) { | ||||||
| 	status := checkRequest(ctx.Req, false) | 	if !checkIsValidRequest(ctx, false) { | ||||||
| 	if status != 200 { |  | ||||||
| 		writeStatus(ctx, status) |  | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
| 	ctx.Resp.Header().Set("Content-Type", metaMediaType) | 	ctx.Resp.Header().Set("Content-Type", metaMediaType) | ||||||
|  |  | ||||||
| 	err := models.CheckLFSAccessForRepo(ctx.User, ctx.Repo.Repository.ID, "list") | 	err := models.CheckLFSAccessForRepo(ctx.User, ctx.Repo.Repository, models.AccessModeRead) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		if models.IsErrLFSLockUnauthorizedAction(err) { | 		if models.IsErrLFSUnauthorizedAction(err) { | ||||||
| 			ctx.JSON(403, api.LFSLockError{ | 			ctx.Resp.Header().Set("WWW-Authenticate", "Basic realm=gitea-lfs") | ||||||
|  | 			ctx.JSON(401, api.LFSLockError{ | ||||||
| 				Message: "You must have pull access to list locks : " + err.Error(), | 				Message: "You must have pull access to list locks : " + err.Error(), | ||||||
| 			}) | 			}) | ||||||
| 			return | 			return | ||||||
| @@ -96,7 +106,7 @@ func GetListLockHandler(ctx *context.Context) { | |||||||
|  |  | ||||||
| 	path := ctx.Query("path") | 	path := ctx.Query("path") | ||||||
| 	if path != "" { //Case where we request a specific id | 	if path != "" { //Case where we request a specific id | ||||||
| 		lock, err := models.GetLFSLock(ctx.Repo.Repository.ID, path) | 		lock, err := models.GetLFSLock(ctx.Repo.Repository, path) | ||||||
| 		handleLockListOut(ctx, lock, err) | 		handleLockListOut(ctx, lock, err) | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
| @@ -120,9 +130,7 @@ func GetListLockHandler(ctx *context.Context) { | |||||||
|  |  | ||||||
| // PostLockHandler create lock | // PostLockHandler create lock | ||||||
| func PostLockHandler(ctx *context.Context) { | func PostLockHandler(ctx *context.Context) { | ||||||
| 	status := checkRequest(ctx.Req, true) | 	if !checkIsValidRequest(ctx, false) { | ||||||
| 	if status != 200 { |  | ||||||
| 		writeStatus(ctx, status) |  | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
| 	ctx.Resp.Header().Set("Content-Type", metaMediaType) | 	ctx.Resp.Header().Set("Content-Type", metaMediaType) | ||||||
| @@ -136,7 +144,7 @@ func PostLockHandler(ctx *context.Context) { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	lock, err := models.CreateLFSLock(&models.LFSLock{ | 	lock, err := models.CreateLFSLock(&models.LFSLock{ | ||||||
| 		RepoID: ctx.Repo.Repository.ID, | 		Repo:  ctx.Repo.Repository, | ||||||
| 		Path:  req.Path, | 		Path:  req.Path, | ||||||
| 		Owner: ctx.User, | 		Owner: ctx.User, | ||||||
| 	}) | 	}) | ||||||
| @@ -148,8 +156,9 @@ func PostLockHandler(ctx *context.Context) { | |||||||
| 			}) | 			}) | ||||||
| 			return | 			return | ||||||
| 		} | 		} | ||||||
| 		if models.IsErrLFSLockUnauthorizedAction(err) { | 		if models.IsErrLFSUnauthorizedAction(err) { | ||||||
| 			ctx.JSON(403, api.LFSLockError{ | 			ctx.Resp.Header().Set("WWW-Authenticate", "Basic realm=gitea-lfs") | ||||||
|  | 			ctx.JSON(401, api.LFSLockError{ | ||||||
| 				Message: "You must have push access to create locks : " + err.Error(), | 				Message: "You must have push access to create locks : " + err.Error(), | ||||||
| 			}) | 			}) | ||||||
| 			return | 			return | ||||||
| @@ -164,18 +173,16 @@ func PostLockHandler(ctx *context.Context) { | |||||||
|  |  | ||||||
| // VerifyLockHandler list locks for verification | // VerifyLockHandler list locks for verification | ||||||
| func VerifyLockHandler(ctx *context.Context) { | func VerifyLockHandler(ctx *context.Context) { | ||||||
| 	status := checkRequest(ctx.Req, true) | 	if !checkIsValidRequest(ctx, false) { | ||||||
| 	if status != 200 { |  | ||||||
| 		writeStatus(ctx, status) |  | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	ctx.Resp.Header().Set("Content-Type", metaMediaType) | 	ctx.Resp.Header().Set("Content-Type", metaMediaType) | ||||||
|  |  | ||||||
| 	err := models.CheckLFSAccessForRepo(ctx.User, ctx.Repo.Repository.ID, "verify") | 	err := models.CheckLFSAccessForRepo(ctx.User, ctx.Repo.Repository, models.AccessModeWrite) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		if models.IsErrLFSLockUnauthorizedAction(err) { | 		if models.IsErrLFSUnauthorizedAction(err) { | ||||||
| 			ctx.JSON(403, api.LFSLockError{ | 			ctx.Resp.Header().Set("WWW-Authenticate", "Basic realm=gitea-lfs") | ||||||
|  | 			ctx.JSON(401, api.LFSLockError{ | ||||||
| 				Message: "You must have push access to verify locks : " + err.Error(), | 				Message: "You must have push access to verify locks : " + err.Error(), | ||||||
| 			}) | 			}) | ||||||
| 			return | 			return | ||||||
| @@ -211,9 +218,7 @@ func VerifyLockHandler(ctx *context.Context) { | |||||||
|  |  | ||||||
| // UnLockHandler delete locks | // UnLockHandler delete locks | ||||||
| func UnLockHandler(ctx *context.Context) { | func UnLockHandler(ctx *context.Context) { | ||||||
| 	status := checkRequest(ctx.Req, true) | 	if !checkIsValidRequest(ctx, false) { | ||||||
| 	if status != 200 { |  | ||||||
| 		writeStatus(ctx, status) |  | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
| 	ctx.Resp.Header().Set("Content-Type", metaMediaType) | 	ctx.Resp.Header().Set("Content-Type", metaMediaType) | ||||||
| @@ -228,8 +233,9 @@ func UnLockHandler(ctx *context.Context) { | |||||||
|  |  | ||||||
| 	lock, err := models.DeleteLFSLockByID(ctx.ParamsInt64("lid"), ctx.User, req.Force) | 	lock, err := models.DeleteLFSLockByID(ctx.ParamsInt64("lid"), ctx.User, req.Force) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		if models.IsErrLFSLockUnauthorizedAction(err) { | 		if models.IsErrLFSUnauthorizedAction(err) { | ||||||
| 			ctx.JSON(403, api.LFSLockError{ | 			ctx.Resp.Header().Set("WWW-Authenticate", "Basic realm=gitea-lfs") | ||||||
|  | 			ctx.JSON(401, api.LFSLockError{ | ||||||
| 				Message: "You must have push access to delete locks : " + err.Error(), | 				Message: "You must have push access to delete locks : " + err.Error(), | ||||||
| 			}) | 			}) | ||||||
| 			return | 			return | ||||||
|   | |||||||
| @@ -473,7 +473,6 @@ func logRequest(r macaron.Request, status int) { | |||||||
| // authenticate uses the authorization string to determine whether | // authenticate uses the authorization string to determine whether | ||||||
| // or not to proceed. This server assumes an HTTP Basic auth format. | // or not to proceed. This server assumes an HTTP Basic auth format. | ||||||
| func authenticate(ctx *context.Context, repository *models.Repository, authorization string, requireWrite bool) bool { | func authenticate(ctx *context.Context, repository *models.Repository, authorization string, requireWrite bool) bool { | ||||||
|  |  | ||||||
| 	accessMode := models.AccessModeRead | 	accessMode := models.AccessModeRead | ||||||
| 	if requireWrite { | 	if requireWrite { | ||||||
| 		accessMode = models.AccessModeWrite | 		accessMode = models.AccessModeWrite | ||||||
| @@ -482,53 +481,34 @@ func authenticate(ctx *context.Context, repository *models.Repository, authoriza | |||||||
| 	if !repository.IsPrivate && !requireWrite { | 	if !repository.IsPrivate && !requireWrite { | ||||||
| 		return true | 		return true | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if ctx.IsSigned { | 	if ctx.IsSigned { | ||||||
| 		accessCheck, _ := models.HasAccess(ctx.User.ID, repository, accessMode) | 		accessCheck, _ := models.HasAccess(ctx.User.ID, repository, accessMode) | ||||||
| 		return accessCheck | 		return accessCheck | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if authorization == "" { | 	user, repo, opStr, err := parseToken(authorization) | ||||||
| 		return false |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	if authenticateToken(repository, authorization, requireWrite) { |  | ||||||
| 		return true |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	if !strings.HasPrefix(authorization, "Basic ") { |  | ||||||
| 		return false |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	c, err := base64.StdEncoding.DecodeString(strings.TrimPrefix(authorization, "Basic ")) |  | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return false | 		return false | ||||||
| 	} | 	} | ||||||
| 	cs := string(c) | 	ctx.User = user | ||||||
| 	i := strings.IndexByte(cs, ':') | 	if opStr == "basic" { | ||||||
| 	if i < 0 { | 		accessCheck, _ := models.HasAccess(ctx.User.ID, repository, accessMode) | ||||||
| 		return false |  | ||||||
| 	} |  | ||||||
| 	user, password := cs[:i], cs[i+1:] |  | ||||||
|  |  | ||||||
| 	userModel, err := models.GetUserByName(user) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return false |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	if !userModel.ValidatePassword(password) { |  | ||||||
| 		return false |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	accessCheck, _ := models.HasAccess(userModel.ID, repository, accessMode) |  | ||||||
| 		return accessCheck | 		return accessCheck | ||||||
| 	} | 	} | ||||||
|  | 	if repository.ID == repo.ID { | ||||||
| func authenticateToken(repository *models.Repository, authorization string, requireWrite bool) bool { | 		if requireWrite && opStr != "upload" { | ||||||
| 	if !strings.HasPrefix(authorization, "Bearer ") { | 			return false | ||||||
|  | 		} | ||||||
|  | 		return true | ||||||
|  | 	} | ||||||
| 	return false | 	return false | ||||||
| } | } | ||||||
|  |  | ||||||
|  | func parseToken(authorization string) (*models.User, *models.Repository, string, error) { | ||||||
|  | 	if authorization == "" { | ||||||
|  | 		return nil, nil, "unknown", fmt.Errorf("No token") | ||||||
|  | 	} | ||||||
|  | 	if strings.HasPrefix(authorization, "Bearer ") { | ||||||
| 		token, err := jwt.Parse(authorization[7:], func(t *jwt.Token) (interface{}, error) { | 		token, err := jwt.Parse(authorization[7:], func(t *jwt.Token) (interface{}, error) { | ||||||
| 			if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok { | 			if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok { | ||||||
| 				return nil, fmt.Errorf("unexpected signing method: %v", t.Header["alg"]) | 				return nil, fmt.Errorf("unexpected signing method: %v", t.Header["alg"]) | ||||||
| @@ -536,32 +516,57 @@ func authenticateToken(repository *models.Repository, authorization string, requ | |||||||
| 			return setting.LFS.JWTSecretBytes, nil | 			return setting.LFS.JWTSecretBytes, nil | ||||||
| 		}) | 		}) | ||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 		return false | 			return nil, nil, "unknown", err | ||||||
| 		} | 		} | ||||||
| 		claims, claimsOk := token.Claims.(jwt.MapClaims) | 		claims, claimsOk := token.Claims.(jwt.MapClaims) | ||||||
| 		if !token.Valid || !claimsOk { | 		if !token.Valid || !claimsOk { | ||||||
| 		return false | 			return nil, nil, "unknown", fmt.Errorf("Token claim invalid") | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		opStr, ok := claims["op"].(string) | 		opStr, ok := claims["op"].(string) | ||||||
| 		if !ok { | 		if !ok { | ||||||
| 		return false | 			return nil, nil, "unknown", fmt.Errorf("Token operation invalid") | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 	if requireWrite && opStr != "upload" { |  | ||||||
| 		return false |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 		repoID, ok := claims["repo"].(float64) | 		repoID, ok := claims["repo"].(float64) | ||||||
| 		if !ok { | 		if !ok { | ||||||
| 		return false | 			return nil, nil, opStr, fmt.Errorf("Token repository id invalid") | ||||||
|  | 		} | ||||||
|  | 		r, err := models.GetRepositoryByID(int64(repoID)) | ||||||
|  | 		if err != nil { | ||||||
|  | 			return nil, nil, opStr, err | ||||||
|  | 		} | ||||||
|  | 		userID, ok := claims["user"].(float64) | ||||||
|  | 		if !ok { | ||||||
|  | 			return nil, r, opStr, fmt.Errorf("Token user id invalid") | ||||||
|  | 		} | ||||||
|  | 		u, err := models.GetUserByID(int64(userID)) | ||||||
|  | 		if err != nil { | ||||||
|  | 			return nil, r, opStr, err | ||||||
|  | 		} | ||||||
|  | 		return u, r, opStr, nil | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if repository.ID != int64(repoID) { | 	if strings.HasPrefix(authorization, "Basic ") { | ||||||
| 		return false | 		c, err := base64.StdEncoding.DecodeString(strings.TrimPrefix(authorization, "Basic ")) | ||||||
|  | 		if err != nil { | ||||||
|  | 			return nil, nil, "basic", err | ||||||
|  | 		} | ||||||
|  | 		cs := string(c) | ||||||
|  | 		i := strings.IndexByte(cs, ':') | ||||||
|  | 		if i < 0 { | ||||||
|  | 			return nil, nil, "basic", fmt.Errorf("Basic auth invalid") | ||||||
|  | 		} | ||||||
|  | 		user, password := cs[:i], cs[i+1:] | ||||||
|  | 		u, err := models.GetUserByName(user) | ||||||
|  | 		if err != nil { | ||||||
|  | 			return nil, nil, "basic", err | ||||||
|  | 		} | ||||||
|  | 		if !u.ValidatePassword(password) { | ||||||
|  | 			return nil, nil, "basic", fmt.Errorf("Basic auth failed") | ||||||
|  | 		} | ||||||
|  | 		return u, nil, "basic", nil | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	return true | 	return nil, nil, "unknown", fmt.Errorf("Token not found") | ||||||
| } | } | ||||||
|  |  | ||||||
| func requireAuth(ctx *context.Context) { | func requireAuth(ctx *context.Context) { | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user