mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-11-04 13:34:43 +01:00 
			
		
		
		
	`models` does far too much. In particular it handles all `UserSignin`. It shouldn't be responsible for calling LDAP, SMTP or PAM for signing in. Therefore we should move this code out of `models`. This code has to depend on `models` - therefore it belongs in `services`. There is a package in `services` called `auth` and clearly this functionality belongs in there. Plan: - [x] Change `auth.Auth` to `auth.Method` - as they represent methods of authentication. - [x] Move `models.UserSignIn` into `auth` - [x] Move `models.ExternalUserLogin` - [x] Move most of the `LoginVia*` methods to `auth` or subpackages - [x] Move Resynchronize functionality to `auth` - Involved some restructuring of `models/ssh_key.go` to reduce the size of this massive file and simplify its files. - [x] Move the rest of the LDAP functionality in to the ldap subpackage - [x] Re-factor the login sources to express an interfaces `auth.Source`? - I've done this through some smaller interfaces Authenticator and Synchronizable - which would allow us to extend things in future - [x] Now LDAP is out of models - need to think about modules/auth/ldap and I think all of that functionality might just be moveable - [x] Similarly a lot Oauth2 functionality need not be in models too and should be moved to services/auth/source/oauth2 - [x] modules/auth/oauth2/oauth2.go uses xorm... This is naughty - probably need to move this into models. - [x] models/oauth2.go - mostly should be in modules/auth/oauth2 or services/auth/source/oauth2 - [x] More simplifications of login_source.go may need to be done - Allow wiring in of notify registration - *this can now easily be done - but I think we should do it in another PR* - see #16178 - More refactors...? - OpenID should probably become an auth Method but I think that can be left for another PR - Methods should also probably be cleaned up - again another PR I think. - SSPI still needs more refactors.* Rename auth.Auth auth.Method * Restructure ssh_key.go - move functions from models/user.go that relate to ssh_key to ssh_key - split ssh_key.go to try create clearer function domains for allow for future refactors here. Signed-off-by: Andrew Thornton <art27@cantab.net>
		
			
				
	
	
		
			300 lines
		
	
	
		
			7.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			300 lines
		
	
	
		
			7.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2021 The Gitea Authors. All rights reserved.
 | 
						|
// Use of this source code is governed by a MIT-style
 | 
						|
// license that can be found in the LICENSE file.
 | 
						|
 | 
						|
package models
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"code.gitea.io/gitea/modules/timeutil"
 | 
						|
	"xorm.io/builder"
 | 
						|
	"xorm.io/xorm"
 | 
						|
)
 | 
						|
 | 
						|
// ________                .__                 ____  __.
 | 
						|
// \______ \   ____ ______ |  |   ____ ___.__.|    |/ _|____ ___.__.
 | 
						|
//  |    |  \_/ __ \\____ \|  |  /  _ <   |  ||      <_/ __ <   |  |
 | 
						|
//  |    `   \  ___/|  |_> >  |_(  <_> )___  ||    |  \  ___/\___  |
 | 
						|
// /_______  /\___  >   __/|____/\____// ____||____|__ \___  > ____|
 | 
						|
//         \/     \/|__|               \/             \/   \/\/
 | 
						|
//
 | 
						|
// This file contains functions specific to DeployKeys
 | 
						|
 | 
						|
// DeployKey represents deploy key information and its relation with repository.
 | 
						|
type DeployKey struct {
 | 
						|
	ID          int64 `xorm:"pk autoincr"`
 | 
						|
	KeyID       int64 `xorm:"UNIQUE(s) INDEX"`
 | 
						|
	RepoID      int64 `xorm:"UNIQUE(s) INDEX"`
 | 
						|
	Name        string
 | 
						|
	Fingerprint string
 | 
						|
	Content     string `xorm:"-"`
 | 
						|
 | 
						|
	Mode AccessMode `xorm:"NOT NULL DEFAULT 1"`
 | 
						|
 | 
						|
	CreatedUnix       timeutil.TimeStamp `xorm:"created"`
 | 
						|
	UpdatedUnix       timeutil.TimeStamp `xorm:"updated"`
 | 
						|
	HasRecentActivity bool               `xorm:"-"`
 | 
						|
	HasUsed           bool               `xorm:"-"`
 | 
						|
}
 | 
						|
 | 
						|
// AfterLoad is invoked from XORM after setting the values of all fields of this object.
 | 
						|
func (key *DeployKey) AfterLoad() {
 | 
						|
	key.HasUsed = key.UpdatedUnix > key.CreatedUnix
 | 
						|
	key.HasRecentActivity = key.UpdatedUnix.AddDuration(7*24*time.Hour) > timeutil.TimeStampNow()
 | 
						|
}
 | 
						|
 | 
						|
// GetContent gets associated public key content.
 | 
						|
func (key *DeployKey) GetContent() error {
 | 
						|
	pkey, err := GetPublicKeyByID(key.KeyID)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	key.Content = pkey.Content
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// IsReadOnly checks if the key can only be used for read operations
 | 
						|
func (key *DeployKey) IsReadOnly() bool {
 | 
						|
	return key.Mode == AccessModeRead
 | 
						|
}
 | 
						|
 | 
						|
func checkDeployKey(e Engine, keyID, repoID int64, name string) error {
 | 
						|
	// Note: We want error detail, not just true or false here.
 | 
						|
	has, err := e.
 | 
						|
		Where("key_id = ? AND repo_id = ?", keyID, repoID).
 | 
						|
		Get(new(DeployKey))
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	} else if has {
 | 
						|
		return ErrDeployKeyAlreadyExist{keyID, repoID}
 | 
						|
	}
 | 
						|
 | 
						|
	has, err = e.
 | 
						|
		Where("repo_id = ? AND name = ?", repoID, name).
 | 
						|
		Get(new(DeployKey))
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	} else if has {
 | 
						|
		return ErrDeployKeyNameAlreadyUsed{repoID, name}
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// addDeployKey adds new key-repo relation.
 | 
						|
func addDeployKey(e *xorm.Session, keyID, repoID int64, name, fingerprint string, mode AccessMode) (*DeployKey, error) {
 | 
						|
	if err := checkDeployKey(e, keyID, repoID, name); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	key := &DeployKey{
 | 
						|
		KeyID:       keyID,
 | 
						|
		RepoID:      repoID,
 | 
						|
		Name:        name,
 | 
						|
		Fingerprint: fingerprint,
 | 
						|
		Mode:        mode,
 | 
						|
	}
 | 
						|
	_, err := e.Insert(key)
 | 
						|
	return key, err
 | 
						|
}
 | 
						|
 | 
						|
// HasDeployKey returns true if public key is a deploy key of given repository.
 | 
						|
func HasDeployKey(keyID, repoID int64) bool {
 | 
						|
	has, _ := x.
 | 
						|
		Where("key_id = ? AND repo_id = ?", keyID, repoID).
 | 
						|
		Get(new(DeployKey))
 | 
						|
	return has
 | 
						|
}
 | 
						|
 | 
						|
// AddDeployKey add new deploy key to database and authorized_keys file.
 | 
						|
func AddDeployKey(repoID int64, name, content string, readOnly bool) (*DeployKey, error) {
 | 
						|
	fingerprint, err := calcFingerprint(content)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	accessMode := AccessModeRead
 | 
						|
	if !readOnly {
 | 
						|
		accessMode = AccessModeWrite
 | 
						|
	}
 | 
						|
 | 
						|
	sess := x.NewSession()
 | 
						|
	defer sess.Close()
 | 
						|
	if err = sess.Begin(); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	pkey := &PublicKey{
 | 
						|
		Fingerprint: fingerprint,
 | 
						|
	}
 | 
						|
	has, err := sess.Get(pkey)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	if has {
 | 
						|
		if pkey.Type != KeyTypeDeploy {
 | 
						|
			return nil, ErrKeyAlreadyExist{0, fingerprint, ""}
 | 
						|
		}
 | 
						|
	} else {
 | 
						|
		// First time use this deploy key.
 | 
						|
		pkey.Mode = accessMode
 | 
						|
		pkey.Type = KeyTypeDeploy
 | 
						|
		pkey.Content = content
 | 
						|
		pkey.Name = name
 | 
						|
		if err = addKey(sess, pkey); err != nil {
 | 
						|
			return nil, fmt.Errorf("addKey: %v", err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	key, err := addDeployKey(sess, pkey.ID, repoID, name, pkey.Fingerprint, accessMode)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	return key, sess.Commit()
 | 
						|
}
 | 
						|
 | 
						|
// GetDeployKeyByID returns deploy key by given ID.
 | 
						|
func GetDeployKeyByID(id int64) (*DeployKey, error) {
 | 
						|
	return getDeployKeyByID(x, id)
 | 
						|
}
 | 
						|
 | 
						|
func getDeployKeyByID(e Engine, id int64) (*DeployKey, error) {
 | 
						|
	key := new(DeployKey)
 | 
						|
	has, err := e.ID(id).Get(key)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	} else if !has {
 | 
						|
		return nil, ErrDeployKeyNotExist{id, 0, 0}
 | 
						|
	}
 | 
						|
	return key, nil
 | 
						|
}
 | 
						|
 | 
						|
// GetDeployKeyByRepo returns deploy key by given public key ID and repository ID.
 | 
						|
func GetDeployKeyByRepo(keyID, repoID int64) (*DeployKey, error) {
 | 
						|
	return getDeployKeyByRepo(x, keyID, repoID)
 | 
						|
}
 | 
						|
 | 
						|
func getDeployKeyByRepo(e Engine, keyID, repoID int64) (*DeployKey, error) {
 | 
						|
	key := &DeployKey{
 | 
						|
		KeyID:  keyID,
 | 
						|
		RepoID: repoID,
 | 
						|
	}
 | 
						|
	has, err := e.Get(key)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	} else if !has {
 | 
						|
		return nil, ErrDeployKeyNotExist{0, keyID, repoID}
 | 
						|
	}
 | 
						|
	return key, nil
 | 
						|
}
 | 
						|
 | 
						|
// UpdateDeployKeyCols updates deploy key information in the specified columns.
 | 
						|
func UpdateDeployKeyCols(key *DeployKey, cols ...string) error {
 | 
						|
	_, err := x.ID(key.ID).Cols(cols...).Update(key)
 | 
						|
	return err
 | 
						|
}
 | 
						|
 | 
						|
// UpdateDeployKey updates deploy key information.
 | 
						|
func UpdateDeployKey(key *DeployKey) error {
 | 
						|
	_, err := x.ID(key.ID).AllCols().Update(key)
 | 
						|
	return err
 | 
						|
}
 | 
						|
 | 
						|
// DeleteDeployKey deletes deploy key from its repository authorized_keys file if needed.
 | 
						|
func DeleteDeployKey(doer *User, id int64) error {
 | 
						|
	sess := x.NewSession()
 | 
						|
	defer sess.Close()
 | 
						|
	if err := sess.Begin(); err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	if err := deleteDeployKey(sess, doer, id); err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	return sess.Commit()
 | 
						|
}
 | 
						|
 | 
						|
func deleteDeployKey(sess Engine, doer *User, id int64) error {
 | 
						|
	key, err := getDeployKeyByID(sess, id)
 | 
						|
	if err != nil {
 | 
						|
		if IsErrDeployKeyNotExist(err) {
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
		return fmt.Errorf("GetDeployKeyByID: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Check if user has access to delete this key.
 | 
						|
	if !doer.IsAdmin {
 | 
						|
		repo, err := getRepositoryByID(sess, key.RepoID)
 | 
						|
		if err != nil {
 | 
						|
			return fmt.Errorf("GetRepositoryByID: %v", err)
 | 
						|
		}
 | 
						|
		has, err := isUserRepoAdmin(sess, repo, doer)
 | 
						|
		if err != nil {
 | 
						|
			return fmt.Errorf("GetUserRepoPermission: %v", err)
 | 
						|
		} else if !has {
 | 
						|
			return ErrKeyAccessDenied{doer.ID, key.ID, "deploy"}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if _, err = sess.ID(key.ID).Delete(new(DeployKey)); err != nil {
 | 
						|
		return fmt.Errorf("delete deploy key [%d]: %v", key.ID, err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Check if this is the last reference to same key content.
 | 
						|
	has, err := sess.
 | 
						|
		Where("key_id = ?", key.KeyID).
 | 
						|
		Get(new(DeployKey))
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	} else if !has {
 | 
						|
		if err = deletePublicKeys(sess, key.KeyID); err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
 | 
						|
		// after deleted the public keys, should rewrite the public keys file
 | 
						|
		if err = rewriteAllPublicKeys(sess); err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// ListDeployKeys returns all deploy keys by given repository ID.
 | 
						|
func ListDeployKeys(repoID int64, listOptions ListOptions) ([]*DeployKey, error) {
 | 
						|
	return listDeployKeys(x, repoID, listOptions)
 | 
						|
}
 | 
						|
 | 
						|
func listDeployKeys(e Engine, repoID int64, listOptions ListOptions) ([]*DeployKey, error) {
 | 
						|
	sess := e.Where("repo_id = ?", repoID)
 | 
						|
	if listOptions.Page != 0 {
 | 
						|
		sess = listOptions.setSessionPagination(sess)
 | 
						|
 | 
						|
		keys := make([]*DeployKey, 0, listOptions.PageSize)
 | 
						|
		return keys, sess.Find(&keys)
 | 
						|
	}
 | 
						|
 | 
						|
	keys := make([]*DeployKey, 0, 5)
 | 
						|
	return keys, sess.Find(&keys)
 | 
						|
}
 | 
						|
 | 
						|
// SearchDeployKeys returns a list of deploy keys matching the provided arguments.
 | 
						|
func SearchDeployKeys(repoID, keyID int64, fingerprint string) ([]*DeployKey, error) {
 | 
						|
	keys := make([]*DeployKey, 0, 5)
 | 
						|
	cond := builder.NewCond()
 | 
						|
	if repoID != 0 {
 | 
						|
		cond = cond.And(builder.Eq{"repo_id": repoID})
 | 
						|
	}
 | 
						|
	if keyID != 0 {
 | 
						|
		cond = cond.And(builder.Eq{"key_id": keyID})
 | 
						|
	}
 | 
						|
	if fingerprint != "" {
 | 
						|
		cond = cond.And(builder.Eq{"fingerprint": fingerprint})
 | 
						|
	}
 | 
						|
	return keys, x.Where(cond).Find(&keys)
 | 
						|
}
 |