2021-07-24 18:16:34 +08:00
|
|
|
// Copyright 2021 The Gitea Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2021-12-10 16:14:24 +08:00
|
|
|
package asymkey
|
2021-07-24 18:16:34 +08:00
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
|
2021-09-19 19:49:59 +08:00
|
|
|
"code.gitea.io/gitea/models/db"
|
2021-11-28 19:58:28 +08:00
|
|
|
"code.gitea.io/gitea/models/perm"
|
2021-11-11 15:03:30 +08:00
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2021-07-24 18:16:34 +08:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
|
|
|
)
|
|
|
|
|
|
|
|
// __________ .__ .__ .__
|
|
|
|
// \______ _______|__| ____ ____ |_____________ | | ______
|
|
|
|
// | ___\_ __ | |/ \_/ ___\| \____ \__ \ | | / ___/
|
|
|
|
// | | | | \| | | \ \___| | |_> / __ \| |__\___ \
|
|
|
|
// |____| |__| |__|___| /\___ |__| __(____ |____/____ >
|
|
|
|
// \/ \/ |__| \/ \/
|
|
|
|
//
|
|
|
|
// This file contains functions related to principals
|
|
|
|
|
|
|
|
// AddPrincipalKey adds new principal to database and authorized_principals file.
|
2022-01-02 21:12:35 +08:00
|
|
|
func AddPrincipalKey(ownerID int64, content string, authSourceID int64) (*PublicKey, error) {
|
2022-11-13 04:18:50 +08:00
|
|
|
ctx, committer, err := db.TxContext(db.DefaultContext)
|
2021-11-21 23:41:00 +08:00
|
|
|
if err != nil {
|
2021-07-24 18:16:34 +08:00
|
|
|
return nil, err
|
|
|
|
}
|
2021-11-21 23:41:00 +08:00
|
|
|
defer committer.Close()
|
2021-07-24 18:16:34 +08:00
|
|
|
|
|
|
|
// Principals cannot be duplicated.
|
2022-05-20 22:08:52 +08:00
|
|
|
has, err := db.GetEngine(ctx).
|
2021-07-24 18:16:34 +08:00
|
|
|
Where("content = ? AND type = ?", content, KeyTypePrincipal).
|
|
|
|
Get(new(PublicKey))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
} else if has {
|
|
|
|
return nil, ErrKeyAlreadyExist{0, "", content}
|
|
|
|
}
|
|
|
|
|
|
|
|
key := &PublicKey{
|
|
|
|
OwnerID: ownerID,
|
|
|
|
Name: content,
|
|
|
|
Content: content,
|
2021-11-28 19:58:28 +08:00
|
|
|
Mode: perm.AccessModeWrite,
|
2021-07-24 18:16:34 +08:00
|
|
|
Type: KeyTypePrincipal,
|
2022-01-02 21:12:35 +08:00
|
|
|
LoginSourceID: authSourceID,
|
2021-07-24 18:16:34 +08:00
|
|
|
}
|
2022-05-20 22:08:52 +08:00
|
|
|
if err = db.Insert(ctx, key); err != nil {
|
2022-10-25 03:29:17 +08:00
|
|
|
return nil, fmt.Errorf("addKey: %w", err)
|
2021-07-24 18:16:34 +08:00
|
|
|
}
|
|
|
|
|
2021-11-21 23:41:00 +08:00
|
|
|
if err = committer.Commit(); err != nil {
|
2021-07-24 18:16:34 +08:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2021-11-21 23:41:00 +08:00
|
|
|
committer.Close()
|
2021-07-24 18:16:34 +08:00
|
|
|
|
2022-05-20 22:08:52 +08:00
|
|
|
return key, RewriteAllPrincipalKeys(db.DefaultContext)
|
2021-07-24 18:16:34 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// CheckPrincipalKeyString strips spaces and returns an error if the given principal contains newlines
|
2021-11-24 17:49:20 +08:00
|
|
|
func CheckPrincipalKeyString(user *user_model.User, content string) (_ string, err error) {
|
2021-07-24 18:16:34 +08:00
|
|
|
if setting.SSH.Disabled {
|
2021-12-10 16:14:24 +08:00
|
|
|
return "", db.ErrSSHDisabled{}
|
2021-07-24 18:16:34 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
content = strings.TrimSpace(content)
|
|
|
|
if strings.ContainsAny(content, "\r\n") {
|
|
|
|
return "", errors.New("only a single line with a single principal please")
|
|
|
|
}
|
|
|
|
|
|
|
|
// check all the allowed principals, email, username or anything
|
|
|
|
// if any matches, return ok
|
|
|
|
for _, v := range setting.SSH.AuthorizedPrincipalsAllow {
|
|
|
|
switch v {
|
|
|
|
case "anything":
|
|
|
|
return content, nil
|
|
|
|
case "email":
|
2021-11-11 15:03:30 +08:00
|
|
|
emails, err := user_model.GetEmailAddresses(user.ID)
|
2021-07-24 18:16:34 +08:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
for _, email := range emails {
|
|
|
|
if !email.IsActivated {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if content == email.Email {
|
|
|
|
return content, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
case "username":
|
|
|
|
if content == user.Name {
|
|
|
|
return content, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return "", fmt.Errorf("didn't match allowed principals: %s", setting.SSH.AuthorizedPrincipalsAllow)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ListPrincipalKeys returns a list of principals belongs to given user.
|
2021-09-24 19:32:56 +08:00
|
|
|
func ListPrincipalKeys(uid int64, listOptions db.ListOptions) ([]*PublicKey, error) {
|
2021-09-23 23:45:36 +08:00
|
|
|
sess := db.GetEngine(db.DefaultContext).Where("owner_id = ? AND type = ?", uid, KeyTypePrincipal)
|
2021-07-24 18:16:34 +08:00
|
|
|
if listOptions.Page != 0 {
|
2021-09-24 19:32:56 +08:00
|
|
|
sess = db.SetSessionPagination(sess, &listOptions)
|
2021-07-24 18:16:34 +08:00
|
|
|
|
|
|
|
keys := make([]*PublicKey, 0, listOptions.PageSize)
|
|
|
|
return keys, sess.Find(&keys)
|
|
|
|
}
|
|
|
|
|
|
|
|
keys := make([]*PublicKey, 0, 5)
|
|
|
|
return keys, sess.Find(&keys)
|
|
|
|
}
|