mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-29 10:57:44 +09:00 
			
		
		
		
	Refactor: Move login out of models (#16199)
`models` does far too much. In particular it handles all `UserSignin`. It shouldn't be responsible for calling LDAP, SMTP or PAM for signing in. Therefore we should move this code out of `models`. This code has to depend on `models` - therefore it belongs in `services`. There is a package in `services` called `auth` and clearly this functionality belongs in there. Plan: - [x] Change `auth.Auth` to `auth.Method` - as they represent methods of authentication. - [x] Move `models.UserSignIn` into `auth` - [x] Move `models.ExternalUserLogin` - [x] Move most of the `LoginVia*` methods to `auth` or subpackages - [x] Move Resynchronize functionality to `auth` - Involved some restructuring of `models/ssh_key.go` to reduce the size of this massive file and simplify its files. - [x] Move the rest of the LDAP functionality in to the ldap subpackage - [x] Re-factor the login sources to express an interfaces `auth.Source`? - I've done this through some smaller interfaces Authenticator and Synchronizable - which would allow us to extend things in future - [x] Now LDAP is out of models - need to think about modules/auth/ldap and I think all of that functionality might just be moveable - [x] Similarly a lot Oauth2 functionality need not be in models too and should be moved to services/auth/source/oauth2 - [x] modules/auth/oauth2/oauth2.go uses xorm... This is naughty - probably need to move this into models. - [x] models/oauth2.go - mostly should be in modules/auth/oauth2 or services/auth/source/oauth2 - [x] More simplifications of login_source.go may need to be done - Allow wiring in of notify registration - *this can now easily be done - but I think we should do it in another PR* - see #16178 - More refactors...? - OpenID should probably become an auth Method but I think that can be left for another PR - Methods should also probably be cleaned up - again another PR I think. - SSPI still needs more refactors.* Rename auth.Auth auth.Method * Restructure ssh_key.go - move functions from models/user.go that relate to ssh_key to ssh_key - split ssh_key.go to try create clearer function domains for allow for future refactors here. Signed-off-by: Andrew Thornton <art27@cantab.net>
This commit is contained in:
		
							
								
								
									
										299
									
								
								models/ssh_key_deploy.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										299
									
								
								models/ssh_key_deploy.go
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,299 @@ | ||||
| // Copyright 2021 The Gitea Authors. All rights reserved. | ||||
| // Use of this source code is governed by a MIT-style | ||||
| // license that can be found in the LICENSE file. | ||||
|  | ||||
| package models | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"time" | ||||
|  | ||||
| 	"code.gitea.io/gitea/modules/timeutil" | ||||
| 	"xorm.io/builder" | ||||
| 	"xorm.io/xorm" | ||||
| ) | ||||
|  | ||||
| // ________                .__                 ____  __. | ||||
| // \______ \   ____ ______ |  |   ____ ___.__.|    |/ _|____ ___.__. | ||||
| //  |    |  \_/ __ \\____ \|  |  /  _ <   |  ||      <_/ __ <   |  | | ||||
| //  |    `   \  ___/|  |_> >  |_(  <_> )___  ||    |  \  ___/\___  | | ||||
| // /_______  /\___  >   __/|____/\____// ____||____|__ \___  > ____| | ||||
| //         \/     \/|__|               \/             \/   \/\/ | ||||
| // | ||||
| // This file contains functions specific to DeployKeys | ||||
|  | ||||
| // DeployKey represents deploy key information and its relation with repository. | ||||
| type DeployKey struct { | ||||
| 	ID          int64 `xorm:"pk autoincr"` | ||||
| 	KeyID       int64 `xorm:"UNIQUE(s) INDEX"` | ||||
| 	RepoID      int64 `xorm:"UNIQUE(s) INDEX"` | ||||
| 	Name        string | ||||
| 	Fingerprint string | ||||
| 	Content     string `xorm:"-"` | ||||
|  | ||||
| 	Mode AccessMode `xorm:"NOT NULL DEFAULT 1"` | ||||
|  | ||||
| 	CreatedUnix       timeutil.TimeStamp `xorm:"created"` | ||||
| 	UpdatedUnix       timeutil.TimeStamp `xorm:"updated"` | ||||
| 	HasRecentActivity bool               `xorm:"-"` | ||||
| 	HasUsed           bool               `xorm:"-"` | ||||
| } | ||||
|  | ||||
| // AfterLoad is invoked from XORM after setting the values of all fields of this object. | ||||
| func (key *DeployKey) AfterLoad() { | ||||
| 	key.HasUsed = key.UpdatedUnix > key.CreatedUnix | ||||
| 	key.HasRecentActivity = key.UpdatedUnix.AddDuration(7*24*time.Hour) > timeutil.TimeStampNow() | ||||
| } | ||||
|  | ||||
| // GetContent gets associated public key content. | ||||
| func (key *DeployKey) GetContent() error { | ||||
| 	pkey, err := GetPublicKeyByID(key.KeyID) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	key.Content = pkey.Content | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // IsReadOnly checks if the key can only be used for read operations | ||||
| func (key *DeployKey) IsReadOnly() bool { | ||||
| 	return key.Mode == AccessModeRead | ||||
| } | ||||
|  | ||||
| func checkDeployKey(e Engine, keyID, repoID int64, name string) error { | ||||
| 	// Note: We want error detail, not just true or false here. | ||||
| 	has, err := e. | ||||
| 		Where("key_id = ? AND repo_id = ?", keyID, repoID). | ||||
| 		Get(new(DeployKey)) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} else if has { | ||||
| 		return ErrDeployKeyAlreadyExist{keyID, repoID} | ||||
| 	} | ||||
|  | ||||
| 	has, err = e. | ||||
| 		Where("repo_id = ? AND name = ?", repoID, name). | ||||
| 		Get(new(DeployKey)) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} else if has { | ||||
| 		return ErrDeployKeyNameAlreadyUsed{repoID, name} | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // addDeployKey adds new key-repo relation. | ||||
| func addDeployKey(e *xorm.Session, keyID, repoID int64, name, fingerprint string, mode AccessMode) (*DeployKey, error) { | ||||
| 	if err := checkDeployKey(e, keyID, repoID, name); err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	key := &DeployKey{ | ||||
| 		KeyID:       keyID, | ||||
| 		RepoID:      repoID, | ||||
| 		Name:        name, | ||||
| 		Fingerprint: fingerprint, | ||||
| 		Mode:        mode, | ||||
| 	} | ||||
| 	_, err := e.Insert(key) | ||||
| 	return key, err | ||||
| } | ||||
|  | ||||
| // HasDeployKey returns true if public key is a deploy key of given repository. | ||||
| func HasDeployKey(keyID, repoID int64) bool { | ||||
| 	has, _ := x. | ||||
| 		Where("key_id = ? AND repo_id = ?", keyID, repoID). | ||||
| 		Get(new(DeployKey)) | ||||
| 	return has | ||||
| } | ||||
|  | ||||
| // AddDeployKey add new deploy key to database and authorized_keys file. | ||||
| func AddDeployKey(repoID int64, name, content string, readOnly bool) (*DeployKey, error) { | ||||
| 	fingerprint, err := calcFingerprint(content) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	accessMode := AccessModeRead | ||||
| 	if !readOnly { | ||||
| 		accessMode = AccessModeWrite | ||||
| 	} | ||||
|  | ||||
| 	sess := x.NewSession() | ||||
| 	defer sess.Close() | ||||
| 	if err = sess.Begin(); err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	pkey := &PublicKey{ | ||||
| 		Fingerprint: fingerprint, | ||||
| 	} | ||||
| 	has, err := sess.Get(pkey) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	if has { | ||||
| 		if pkey.Type != KeyTypeDeploy { | ||||
| 			return nil, ErrKeyAlreadyExist{0, fingerprint, ""} | ||||
| 		} | ||||
| 	} else { | ||||
| 		// First time use this deploy key. | ||||
| 		pkey.Mode = accessMode | ||||
| 		pkey.Type = KeyTypeDeploy | ||||
| 		pkey.Content = content | ||||
| 		pkey.Name = name | ||||
| 		if err = addKey(sess, pkey); err != nil { | ||||
| 			return nil, fmt.Errorf("addKey: %v", err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	key, err := addDeployKey(sess, pkey.ID, repoID, name, pkey.Fingerprint, accessMode) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	return key, sess.Commit() | ||||
| } | ||||
|  | ||||
| // GetDeployKeyByID returns deploy key by given ID. | ||||
| func GetDeployKeyByID(id int64) (*DeployKey, error) { | ||||
| 	return getDeployKeyByID(x, id) | ||||
| } | ||||
|  | ||||
| func getDeployKeyByID(e Engine, id int64) (*DeployKey, error) { | ||||
| 	key := new(DeployKey) | ||||
| 	has, err := e.ID(id).Get(key) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} else if !has { | ||||
| 		return nil, ErrDeployKeyNotExist{id, 0, 0} | ||||
| 	} | ||||
| 	return key, nil | ||||
| } | ||||
|  | ||||
| // GetDeployKeyByRepo returns deploy key by given public key ID and repository ID. | ||||
| func GetDeployKeyByRepo(keyID, repoID int64) (*DeployKey, error) { | ||||
| 	return getDeployKeyByRepo(x, keyID, repoID) | ||||
| } | ||||
|  | ||||
| func getDeployKeyByRepo(e Engine, keyID, repoID int64) (*DeployKey, error) { | ||||
| 	key := &DeployKey{ | ||||
| 		KeyID:  keyID, | ||||
| 		RepoID: repoID, | ||||
| 	} | ||||
| 	has, err := e.Get(key) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} else if !has { | ||||
| 		return nil, ErrDeployKeyNotExist{0, keyID, repoID} | ||||
| 	} | ||||
| 	return key, nil | ||||
| } | ||||
|  | ||||
| // UpdateDeployKeyCols updates deploy key information in the specified columns. | ||||
| func UpdateDeployKeyCols(key *DeployKey, cols ...string) error { | ||||
| 	_, err := x.ID(key.ID).Cols(cols...).Update(key) | ||||
| 	return err | ||||
| } | ||||
|  | ||||
| // UpdateDeployKey updates deploy key information. | ||||
| func UpdateDeployKey(key *DeployKey) error { | ||||
| 	_, err := x.ID(key.ID).AllCols().Update(key) | ||||
| 	return err | ||||
| } | ||||
|  | ||||
| // DeleteDeployKey deletes deploy key from its repository authorized_keys file if needed. | ||||
| func DeleteDeployKey(doer *User, id int64) error { | ||||
| 	sess := x.NewSession() | ||||
| 	defer sess.Close() | ||||
| 	if err := sess.Begin(); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	if err := deleteDeployKey(sess, doer, id); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	return sess.Commit() | ||||
| } | ||||
|  | ||||
| func deleteDeployKey(sess Engine, doer *User, id int64) error { | ||||
| 	key, err := getDeployKeyByID(sess, id) | ||||
| 	if err != nil { | ||||
| 		if IsErrDeployKeyNotExist(err) { | ||||
| 			return nil | ||||
| 		} | ||||
| 		return fmt.Errorf("GetDeployKeyByID: %v", err) | ||||
| 	} | ||||
|  | ||||
| 	// Check if user has access to delete this key. | ||||
| 	if !doer.IsAdmin { | ||||
| 		repo, err := getRepositoryByID(sess, key.RepoID) | ||||
| 		if err != nil { | ||||
| 			return fmt.Errorf("GetRepositoryByID: %v", err) | ||||
| 		} | ||||
| 		has, err := isUserRepoAdmin(sess, repo, doer) | ||||
| 		if err != nil { | ||||
| 			return fmt.Errorf("GetUserRepoPermission: %v", err) | ||||
| 		} else if !has { | ||||
| 			return ErrKeyAccessDenied{doer.ID, key.ID, "deploy"} | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if _, err = sess.ID(key.ID).Delete(new(DeployKey)); err != nil { | ||||
| 		return fmt.Errorf("delete deploy key [%d]: %v", key.ID, err) | ||||
| 	} | ||||
|  | ||||
| 	// Check if this is the last reference to same key content. | ||||
| 	has, err := sess. | ||||
| 		Where("key_id = ?", key.KeyID). | ||||
| 		Get(new(DeployKey)) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} else if !has { | ||||
| 		if err = deletePublicKeys(sess, key.KeyID); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		// after deleted the public keys, should rewrite the public keys file | ||||
| 		if err = rewriteAllPublicKeys(sess); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // ListDeployKeys returns all deploy keys by given repository ID. | ||||
| func ListDeployKeys(repoID int64, listOptions ListOptions) ([]*DeployKey, error) { | ||||
| 	return listDeployKeys(x, repoID, listOptions) | ||||
| } | ||||
|  | ||||
| func listDeployKeys(e Engine, repoID int64, listOptions ListOptions) ([]*DeployKey, error) { | ||||
| 	sess := e.Where("repo_id = ?", repoID) | ||||
| 	if listOptions.Page != 0 { | ||||
| 		sess = listOptions.setSessionPagination(sess) | ||||
|  | ||||
| 		keys := make([]*DeployKey, 0, listOptions.PageSize) | ||||
| 		return keys, sess.Find(&keys) | ||||
| 	} | ||||
|  | ||||
| 	keys := make([]*DeployKey, 0, 5) | ||||
| 	return keys, sess.Find(&keys) | ||||
| } | ||||
|  | ||||
| // SearchDeployKeys returns a list of deploy keys matching the provided arguments. | ||||
| func SearchDeployKeys(repoID, keyID int64, fingerprint string) ([]*DeployKey, error) { | ||||
| 	keys := make([]*DeployKey, 0, 5) | ||||
| 	cond := builder.NewCond() | ||||
| 	if repoID != 0 { | ||||
| 		cond = cond.And(builder.Eq{"repo_id": repoID}) | ||||
| 	} | ||||
| 	if keyID != 0 { | ||||
| 		cond = cond.And(builder.Eq{"key_id": keyID}) | ||||
| 	} | ||||
| 	if fingerprint != "" { | ||||
| 		cond = cond.And(builder.Eq{"fingerprint": fingerprint}) | ||||
| 	} | ||||
| 	return keys, x.Where(cond).Find(&keys) | ||||
| } | ||||
		Reference in New Issue
	
	Block a user