mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-11-03 08:02:36 +09:00 
			
		
		
		
	Fix #19513 This PR introduce a new db method `InTransaction(context.Context)`, and also builtin check on `db.TxContext` and `db.WithTx`. There is also a new method `db.AutoTx` has been introduced but could be used by other PRs. `WithTx` will always open a new transaction, if a transaction exist in context, return an error. `AutoTx` will try to open a new transaction if no transaction exist in context. That means it will always enter a transaction if there is no error. Co-authored-by: delvh <dev.lh@web.de> Co-authored-by: 6543 <6543@obermui.de>
		
			
				
	
	
		
			120 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			120 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2021 The Gitea Authors. All rights reserved.
 | 
						|
// Use of this source code is governed by a MIT-style
 | 
						|
// license that can be found in the LICENSE file.
 | 
						|
 | 
						|
package asymkey
 | 
						|
 | 
						|
import (
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"code.gitea.io/gitea/models/db"
 | 
						|
	"code.gitea.io/gitea/models/perm"
 | 
						|
	user_model "code.gitea.io/gitea/models/user"
 | 
						|
	"code.gitea.io/gitea/modules/setting"
 | 
						|
)
 | 
						|
 | 
						|
// __________       .__              .__             .__
 | 
						|
// \______   _______|__| ____   ____ |_____________  |  |   ______
 | 
						|
//  |     ___\_  __ |  |/    \_/ ___\|  \____ \__  \ |  |  /  ___/
 | 
						|
//  |    |    |  | \|  |   |  \  \___|  |  |_> / __ \|  |__\___ \
 | 
						|
//  |____|    |__|  |__|___|  /\___  |__|   __(____  |____/____  >
 | 
						|
//                          \/     \/   |__|       \/          \/
 | 
						|
//
 | 
						|
// This file contains functions related to principals
 | 
						|
 | 
						|
// AddPrincipalKey adds new principal to database and authorized_principals file.
 | 
						|
func AddPrincipalKey(ownerID int64, content string, authSourceID int64) (*PublicKey, error) {
 | 
						|
	ctx, committer, err := db.TxContext(db.DefaultContext)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	defer committer.Close()
 | 
						|
 | 
						|
	// Principals cannot be duplicated.
 | 
						|
	has, err := db.GetEngine(ctx).
 | 
						|
		Where("content = ? AND type = ?", content, KeyTypePrincipal).
 | 
						|
		Get(new(PublicKey))
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	} else if has {
 | 
						|
		return nil, ErrKeyAlreadyExist{0, "", content}
 | 
						|
	}
 | 
						|
 | 
						|
	key := &PublicKey{
 | 
						|
		OwnerID:       ownerID,
 | 
						|
		Name:          content,
 | 
						|
		Content:       content,
 | 
						|
		Mode:          perm.AccessModeWrite,
 | 
						|
		Type:          KeyTypePrincipal,
 | 
						|
		LoginSourceID: authSourceID,
 | 
						|
	}
 | 
						|
	if err = db.Insert(ctx, key); err != nil {
 | 
						|
		return nil, fmt.Errorf("addKey: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if err = committer.Commit(); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	committer.Close()
 | 
						|
 | 
						|
	return key, RewriteAllPrincipalKeys(db.DefaultContext)
 | 
						|
}
 | 
						|
 | 
						|
// CheckPrincipalKeyString strips spaces and returns an error if the given principal contains newlines
 | 
						|
func CheckPrincipalKeyString(user *user_model.User, content string) (_ string, err error) {
 | 
						|
	if setting.SSH.Disabled {
 | 
						|
		return "", db.ErrSSHDisabled{}
 | 
						|
	}
 | 
						|
 | 
						|
	content = strings.TrimSpace(content)
 | 
						|
	if strings.ContainsAny(content, "\r\n") {
 | 
						|
		return "", errors.New("only a single line with a single principal please")
 | 
						|
	}
 | 
						|
 | 
						|
	// check all the allowed principals, email, username or anything
 | 
						|
	// if any matches, return ok
 | 
						|
	for _, v := range setting.SSH.AuthorizedPrincipalsAllow {
 | 
						|
		switch v {
 | 
						|
		case "anything":
 | 
						|
			return content, nil
 | 
						|
		case "email":
 | 
						|
			emails, err := user_model.GetEmailAddresses(user.ID)
 | 
						|
			if err != nil {
 | 
						|
				return "", err
 | 
						|
			}
 | 
						|
			for _, email := range emails {
 | 
						|
				if !email.IsActivated {
 | 
						|
					continue
 | 
						|
				}
 | 
						|
				if content == email.Email {
 | 
						|
					return content, nil
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
		case "username":
 | 
						|
			if content == user.Name {
 | 
						|
				return content, nil
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return "", fmt.Errorf("didn't match allowed principals: %s", setting.SSH.AuthorizedPrincipalsAllow)
 | 
						|
}
 | 
						|
 | 
						|
// ListPrincipalKeys returns a list of principals belongs to given user.
 | 
						|
func ListPrincipalKeys(uid int64, listOptions db.ListOptions) ([]*PublicKey, error) {
 | 
						|
	sess := db.GetEngine(db.DefaultContext).Where("owner_id = ? AND type = ?", uid, KeyTypePrincipal)
 | 
						|
	if listOptions.Page != 0 {
 | 
						|
		sess = db.SetSessionPagination(sess, &listOptions)
 | 
						|
 | 
						|
		keys := make([]*PublicKey, 0, listOptions.PageSize)
 | 
						|
		return keys, sess.Find(&keys)
 | 
						|
	}
 | 
						|
 | 
						|
	keys := make([]*PublicKey, 0, 5)
 | 
						|
	return keys, sess.Find(&keys)
 | 
						|
}
 |