2021-07-24 06:16:34 -04:00
|
|
|
// Copyright 2021 The Gitea Authors. All rights reserved.
|
2022-11-27 13:20:29 -05:00
|
|
|
// SPDX-License-Identifier: MIT
|
2021-07-24 06:16:34 -04:00
|
|
|
|
2021-12-10 03:14:24 -05:00
|
|
|
package asymkey
|
2021-07-24 06:16:34 -04:00
|
|
|
|
|
|
|
import (
|
2023-09-14 13:09:32 -04:00
|
|
|
"context"
|
2021-07-24 06:16:34 -04:00
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
|
2021-09-19 07:49:59 -04:00
|
|
|
"code.gitea.io/gitea/models/db"
|
2021-11-28 06:58:28 -05:00
|
|
|
"code.gitea.io/gitea/models/perm"
|
2021-11-11 02:03:30 -05:00
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2021-07-24 06:16:34 -04:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
2022-12-31 06:49:37 -05:00
|
|
|
"code.gitea.io/gitea/modules/util"
|
2021-07-24 06:16:34 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// __________ .__ .__ .__
|
|
|
|
// \______ _______|__| ____ ____ |_____________ | | ______
|
|
|
|
// | ___\_ __ | |/ \_/ ___\| \____ \__ \ | | / ___/
|
|
|
|
// | | | | \| | | \ \___| | |_> / __ \| |__\___ \
|
|
|
|
// |____| |__| |__|___| /\___ |__| __(____ |____/____ >
|
|
|
|
// \/ \/ |__| \/ \/
|
|
|
|
//
|
|
|
|
// This file contains functions related to principals
|
|
|
|
|
|
|
|
// AddPrincipalKey adds new principal to database and authorized_principals file.
|
2022-01-02 08:12:35 -05:00
|
|
|
func AddPrincipalKey(ownerID int64, content string, authSourceID int64) (*PublicKey, error) {
|
2022-11-12 15:18:50 -05:00
|
|
|
ctx, committer, err := db.TxContext(db.DefaultContext)
|
2021-11-21 10:41:00 -05:00
|
|
|
if err != nil {
|
2021-07-24 06:16:34 -04:00
|
|
|
return nil, err
|
|
|
|
}
|
2021-11-21 10:41:00 -05:00
|
|
|
defer committer.Close()
|
2021-07-24 06:16:34 -04:00
|
|
|
|
|
|
|
// Principals cannot be duplicated.
|
2022-05-20 10:08:52 -04:00
|
|
|
has, err := db.GetEngine(ctx).
|
2021-07-24 06:16:34 -04:00
|
|
|
Where("content = ? AND type = ?", content, KeyTypePrincipal).
|
|
|
|
Get(new(PublicKey))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
} else if has {
|
|
|
|
return nil, ErrKeyAlreadyExist{0, "", content}
|
|
|
|
}
|
|
|
|
|
|
|
|
key := &PublicKey{
|
|
|
|
OwnerID: ownerID,
|
|
|
|
Name: content,
|
|
|
|
Content: content,
|
2021-11-28 06:58:28 -05:00
|
|
|
Mode: perm.AccessModeWrite,
|
2021-07-24 06:16:34 -04:00
|
|
|
Type: KeyTypePrincipal,
|
2022-01-02 08:12:35 -05:00
|
|
|
LoginSourceID: authSourceID,
|
2021-07-24 06:16:34 -04:00
|
|
|
}
|
2022-05-20 10:08:52 -04:00
|
|
|
if err = db.Insert(ctx, key); err != nil {
|
2022-10-24 15:29:17 -04:00
|
|
|
return nil, fmt.Errorf("addKey: %w", err)
|
2021-07-24 06:16:34 -04:00
|
|
|
}
|
|
|
|
|
2021-11-21 10:41:00 -05:00
|
|
|
if err = committer.Commit(); err != nil {
|
2021-07-24 06:16:34 -04:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2021-11-21 10:41:00 -05:00
|
|
|
committer.Close()
|
2021-07-24 06:16:34 -04:00
|
|
|
|
2022-05-20 10:08:52 -04:00
|
|
|
return key, RewriteAllPrincipalKeys(db.DefaultContext)
|
2021-07-24 06:16:34 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// CheckPrincipalKeyString strips spaces and returns an error if the given principal contains newlines
|
2023-09-14 13:09:32 -04:00
|
|
|
func CheckPrincipalKeyString(ctx context.Context, user *user_model.User, content string) (_ string, err error) {
|
2021-07-24 06:16:34 -04:00
|
|
|
if setting.SSH.Disabled {
|
2021-12-10 03:14:24 -05:00
|
|
|
return "", db.ErrSSHDisabled{}
|
2021-07-24 06:16:34 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
content = strings.TrimSpace(content)
|
|
|
|
if strings.ContainsAny(content, "\r\n") {
|
2022-12-31 06:49:37 -05:00
|
|
|
return "", util.NewInvalidArgumentErrorf("only a single line with a single principal please")
|
2021-07-24 06:16:34 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// check all the allowed principals, email, username or anything
|
|
|
|
// if any matches, return ok
|
|
|
|
for _, v := range setting.SSH.AuthorizedPrincipalsAllow {
|
|
|
|
switch v {
|
|
|
|
case "anything":
|
|
|
|
return content, nil
|
|
|
|
case "email":
|
2023-09-14 13:09:32 -04:00
|
|
|
emails, err := user_model.GetEmailAddresses(ctx, user.ID)
|
2021-07-24 06:16:34 -04:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
for _, email := range emails {
|
|
|
|
if !email.IsActivated {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if content == email.Email {
|
|
|
|
return content, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
case "username":
|
|
|
|
if content == user.Name {
|
|
|
|
return content, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return "", fmt.Errorf("didn't match allowed principals: %s", setting.SSH.AuthorizedPrincipalsAllow)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ListPrincipalKeys returns a list of principals belongs to given user.
|
2021-09-24 07:32:56 -04:00
|
|
|
func ListPrincipalKeys(uid int64, listOptions db.ListOptions) ([]*PublicKey, error) {
|
2021-09-23 11:45:36 -04:00
|
|
|
sess := db.GetEngine(db.DefaultContext).Where("owner_id = ? AND type = ?", uid, KeyTypePrincipal)
|
2021-07-24 06:16:34 -04:00
|
|
|
if listOptions.Page != 0 {
|
2021-09-24 07:32:56 -04:00
|
|
|
sess = db.SetSessionPagination(sess, &listOptions)
|
2021-07-24 06:16:34 -04:00
|
|
|
|
|
|
|
keys := make([]*PublicKey, 0, listOptions.PageSize)
|
|
|
|
return keys, sess.Find(&keys)
|
|
|
|
}
|
|
|
|
|
|
|
|
keys := make([]*PublicKey, 0, 5)
|
|
|
|
return keys, sess.Find(&keys)
|
|
|
|
}
|