mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-11-04 06:24:11 +01:00 
			
		
		
		
	* Add sso.Group, context.Auth, context.APIAuth to allow auth special routes * Remove unnecessary check * Rename sso -> auth * remove unused method of Auth interface
		
			
				
	
	
		
			398 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			398 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2016 The Gogs Authors. All rights reserved.
 | 
						|
// Copyright 2019 The Gitea Authors. All rights reserved.
 | 
						|
// Use of this source code is governed by a MIT-style
 | 
						|
// license that can be found in the LICENSE file.
 | 
						|
 | 
						|
package context
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"fmt"
 | 
						|
	"html"
 | 
						|
	"net/http"
 | 
						|
	"net/url"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"code.gitea.io/gitea/models"
 | 
						|
	"code.gitea.io/gitea/modules/git"
 | 
						|
	"code.gitea.io/gitea/modules/log"
 | 
						|
	"code.gitea.io/gitea/modules/setting"
 | 
						|
	"code.gitea.io/gitea/modules/web/middleware"
 | 
						|
	"code.gitea.io/gitea/services/auth"
 | 
						|
 | 
						|
	"gitea.com/go-chi/session"
 | 
						|
)
 | 
						|
 | 
						|
// APIContext is a specific context for API service
 | 
						|
type APIContext struct {
 | 
						|
	*Context
 | 
						|
	Org *APIOrganization
 | 
						|
}
 | 
						|
 | 
						|
// APIError is error format response
 | 
						|
// swagger:response error
 | 
						|
type APIError struct {
 | 
						|
	Message string `json:"message"`
 | 
						|
	URL     string `json:"url"`
 | 
						|
}
 | 
						|
 | 
						|
// APIValidationError is error format response related to input validation
 | 
						|
// swagger:response validationError
 | 
						|
type APIValidationError struct {
 | 
						|
	Message string `json:"message"`
 | 
						|
	URL     string `json:"url"`
 | 
						|
}
 | 
						|
 | 
						|
// APIInvalidTopicsError is error format response to invalid topics
 | 
						|
// swagger:response invalidTopicsError
 | 
						|
type APIInvalidTopicsError struct {
 | 
						|
	Topics  []string `json:"invalidTopics"`
 | 
						|
	Message string   `json:"message"`
 | 
						|
}
 | 
						|
 | 
						|
//APIEmpty is an empty response
 | 
						|
// swagger:response empty
 | 
						|
type APIEmpty struct{}
 | 
						|
 | 
						|
//APIForbiddenError is a forbidden error response
 | 
						|
// swagger:response forbidden
 | 
						|
type APIForbiddenError struct {
 | 
						|
	APIError
 | 
						|
}
 | 
						|
 | 
						|
//APINotFound is a not found empty response
 | 
						|
// swagger:response notFound
 | 
						|
type APINotFound struct{}
 | 
						|
 | 
						|
//APIConflict is a conflict empty response
 | 
						|
// swagger:response conflict
 | 
						|
type APIConflict struct{}
 | 
						|
 | 
						|
//APIRedirect is a redirect response
 | 
						|
// swagger:response redirect
 | 
						|
type APIRedirect struct{}
 | 
						|
 | 
						|
//APIString is a string response
 | 
						|
// swagger:response string
 | 
						|
type APIString string
 | 
						|
 | 
						|
// ServerError responds with error message, status is 500
 | 
						|
func (ctx *APIContext) ServerError(title string, err error) {
 | 
						|
	ctx.Error(http.StatusInternalServerError, title, err)
 | 
						|
}
 | 
						|
 | 
						|
// Error responds with an error message to client with given obj as the message.
 | 
						|
// If status is 500, also it prints error to log.
 | 
						|
func (ctx *APIContext) Error(status int, title string, obj interface{}) {
 | 
						|
	var message string
 | 
						|
	if err, ok := obj.(error); ok {
 | 
						|
		message = err.Error()
 | 
						|
	} else {
 | 
						|
		message = fmt.Sprintf("%s", obj)
 | 
						|
	}
 | 
						|
 | 
						|
	if status == http.StatusInternalServerError {
 | 
						|
		log.ErrorWithSkip(1, "%s: %s", title, message)
 | 
						|
 | 
						|
		if setting.IsProd() && !(ctx.User != nil && ctx.User.IsAdmin) {
 | 
						|
			message = ""
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	ctx.JSON(status, APIError{
 | 
						|
		Message: message,
 | 
						|
		URL:     setting.API.SwaggerURL,
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
// InternalServerError responds with an error message to the client with the error as a message
 | 
						|
// and the file and line of the caller.
 | 
						|
func (ctx *APIContext) InternalServerError(err error) {
 | 
						|
	log.ErrorWithSkip(1, "InternalServerError: %v", err)
 | 
						|
 | 
						|
	var message string
 | 
						|
	if !setting.IsProd() || (ctx.User != nil && ctx.User.IsAdmin) {
 | 
						|
		message = err.Error()
 | 
						|
	}
 | 
						|
 | 
						|
	ctx.JSON(http.StatusInternalServerError, APIError{
 | 
						|
		Message: message,
 | 
						|
		URL:     setting.API.SwaggerURL,
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
var (
 | 
						|
	apiContextKey interface{} = "default_api_context"
 | 
						|
)
 | 
						|
 | 
						|
// WithAPIContext set up api context in request
 | 
						|
func WithAPIContext(req *http.Request, ctx *APIContext) *http.Request {
 | 
						|
	return req.WithContext(context.WithValue(req.Context(), apiContextKey, ctx))
 | 
						|
}
 | 
						|
 | 
						|
// GetAPIContext returns a context for API routes
 | 
						|
func GetAPIContext(req *http.Request) *APIContext {
 | 
						|
	return req.Context().Value(apiContextKey).(*APIContext)
 | 
						|
}
 | 
						|
 | 
						|
func genAPILinks(curURL *url.URL, total, pageSize, curPage int) []string {
 | 
						|
	page := NewPagination(total, pageSize, curPage, 0)
 | 
						|
	paginater := page.Paginater
 | 
						|
	links := make([]string, 0, 4)
 | 
						|
 | 
						|
	if paginater.HasNext() {
 | 
						|
		u := *curURL
 | 
						|
		queries := u.Query()
 | 
						|
		queries.Set("page", fmt.Sprintf("%d", paginater.Next()))
 | 
						|
		u.RawQuery = queries.Encode()
 | 
						|
 | 
						|
		links = append(links, fmt.Sprintf("<%s%s>; rel=\"next\"", setting.AppURL, u.RequestURI()[1:]))
 | 
						|
	}
 | 
						|
	if !paginater.IsLast() {
 | 
						|
		u := *curURL
 | 
						|
		queries := u.Query()
 | 
						|
		queries.Set("page", fmt.Sprintf("%d", paginater.TotalPages()))
 | 
						|
		u.RawQuery = queries.Encode()
 | 
						|
 | 
						|
		links = append(links, fmt.Sprintf("<%s%s>; rel=\"last\"", setting.AppURL, u.RequestURI()[1:]))
 | 
						|
	}
 | 
						|
	if !paginater.IsFirst() {
 | 
						|
		u := *curURL
 | 
						|
		queries := u.Query()
 | 
						|
		queries.Set("page", "1")
 | 
						|
		u.RawQuery = queries.Encode()
 | 
						|
 | 
						|
		links = append(links, fmt.Sprintf("<%s%s>; rel=\"first\"", setting.AppURL, u.RequestURI()[1:]))
 | 
						|
	}
 | 
						|
	if paginater.HasPrevious() {
 | 
						|
		u := *curURL
 | 
						|
		queries := u.Query()
 | 
						|
		queries.Set("page", fmt.Sprintf("%d", paginater.Previous()))
 | 
						|
		u.RawQuery = queries.Encode()
 | 
						|
 | 
						|
		links = append(links, fmt.Sprintf("<%s%s>; rel=\"prev\"", setting.AppURL, u.RequestURI()[1:]))
 | 
						|
	}
 | 
						|
	return links
 | 
						|
}
 | 
						|
 | 
						|
// SetLinkHeader sets pagination link header by given total number and page size.
 | 
						|
func (ctx *APIContext) SetLinkHeader(total, pageSize int) {
 | 
						|
	links := genAPILinks(ctx.Req.URL, total, pageSize, ctx.QueryInt("page"))
 | 
						|
 | 
						|
	if len(links) > 0 {
 | 
						|
		ctx.Header().Set("Link", strings.Join(links, ","))
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// RequireCSRF requires a validated a CSRF token
 | 
						|
func (ctx *APIContext) RequireCSRF() {
 | 
						|
	headerToken := ctx.Req.Header.Get(ctx.csrf.GetHeaderName())
 | 
						|
	formValueToken := ctx.Req.FormValue(ctx.csrf.GetFormName())
 | 
						|
	if len(headerToken) > 0 || len(formValueToken) > 0 {
 | 
						|
		Validate(ctx.Context, ctx.csrf)
 | 
						|
	} else {
 | 
						|
		ctx.Context.Error(401, "Missing CSRF token.")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// CheckForOTP validates OTP
 | 
						|
func (ctx *APIContext) CheckForOTP() {
 | 
						|
	otpHeader := ctx.Req.Header.Get("X-Gitea-OTP")
 | 
						|
	twofa, err := models.GetTwoFactorByUID(ctx.Context.User.ID)
 | 
						|
	if err != nil {
 | 
						|
		if models.IsErrTwoFactorNotEnrolled(err) {
 | 
						|
			return // No 2FA enrollment for this user
 | 
						|
		}
 | 
						|
		ctx.Context.Error(http.StatusInternalServerError)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	ok, err := twofa.ValidateTOTP(otpHeader)
 | 
						|
	if err != nil {
 | 
						|
		ctx.Context.Error(http.StatusInternalServerError)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	if !ok {
 | 
						|
		ctx.Context.Error(401)
 | 
						|
		return
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// APIAuth converts auth.Auth as a middleware
 | 
						|
func APIAuth(authMethod auth.Auth) func(*APIContext) {
 | 
						|
	return func(ctx *APIContext) {
 | 
						|
		// Get user from session if logged in.
 | 
						|
		ctx.User = authMethod.Verify(ctx.Req, ctx.Resp, ctx, ctx.Session)
 | 
						|
		if ctx.User != nil {
 | 
						|
			ctx.IsBasicAuth = ctx.Data["AuthedMethod"].(string) == new(auth.Basic).Name()
 | 
						|
			ctx.IsSigned = true
 | 
						|
			ctx.Data["IsSigned"] = ctx.IsSigned
 | 
						|
			ctx.Data["SignedUser"] = ctx.User
 | 
						|
			ctx.Data["SignedUserID"] = ctx.User.ID
 | 
						|
			ctx.Data["SignedUserName"] = ctx.User.Name
 | 
						|
			ctx.Data["IsAdmin"] = ctx.User.IsAdmin
 | 
						|
		} else {
 | 
						|
			ctx.Data["SignedUserID"] = int64(0)
 | 
						|
			ctx.Data["SignedUserName"] = ""
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// APIContexter returns apicontext as middleware
 | 
						|
func APIContexter() func(http.Handler) http.Handler {
 | 
						|
	var csrfOpts = getCsrfOpts()
 | 
						|
 | 
						|
	return func(next http.Handler) http.Handler {
 | 
						|
 | 
						|
		return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
 | 
						|
			var locale = middleware.Locale(w, req)
 | 
						|
			var ctx = APIContext{
 | 
						|
				Context: &Context{
 | 
						|
					Resp:    NewResponse(w),
 | 
						|
					Data:    map[string]interface{}{},
 | 
						|
					Locale:  locale,
 | 
						|
					Session: session.GetSession(req),
 | 
						|
					Repo: &Repository{
 | 
						|
						PullRequest: &PullRequest{},
 | 
						|
					},
 | 
						|
					Org: &Organization{},
 | 
						|
				},
 | 
						|
				Org: &APIOrganization{},
 | 
						|
			}
 | 
						|
 | 
						|
			ctx.Req = WithAPIContext(WithContext(req, ctx.Context), &ctx)
 | 
						|
			ctx.csrf = Csrfer(csrfOpts, ctx.Context)
 | 
						|
 | 
						|
			// If request sends files, parse them here otherwise the Query() can't be parsed and the CsrfToken will be invalid.
 | 
						|
			if ctx.Req.Method == "POST" && strings.Contains(ctx.Req.Header.Get("Content-Type"), "multipart/form-data") {
 | 
						|
				if err := ctx.Req.ParseMultipartForm(setting.Attachment.MaxSize << 20); err != nil && !strings.Contains(err.Error(), "EOF") { // 32MB max size
 | 
						|
					ctx.InternalServerError(err)
 | 
						|
					return
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
			ctx.Resp.Header().Set(`X-Frame-Options`, `SAMEORIGIN`)
 | 
						|
 | 
						|
			ctx.Data["CsrfToken"] = html.EscapeString(ctx.csrf.GetToken())
 | 
						|
 | 
						|
			next.ServeHTTP(ctx.Resp, ctx.Req)
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// ReferencesGitRepo injects the GitRepo into the Context
 | 
						|
func ReferencesGitRepo(allowEmpty bool) func(http.Handler) http.Handler {
 | 
						|
	return func(next http.Handler) http.Handler {
 | 
						|
		return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
 | 
						|
			ctx := GetAPIContext(req)
 | 
						|
			// Empty repository does not have reference information.
 | 
						|
			if !allowEmpty && ctx.Repo.Repository.IsEmpty {
 | 
						|
				return
 | 
						|
			}
 | 
						|
 | 
						|
			// For API calls.
 | 
						|
			if ctx.Repo.GitRepo == nil {
 | 
						|
				repoPath := models.RepoPath(ctx.Repo.Owner.Name, ctx.Repo.Repository.Name)
 | 
						|
				gitRepo, err := git.OpenRepository(repoPath)
 | 
						|
				if err != nil {
 | 
						|
					ctx.Error(http.StatusInternalServerError, "RepoRef Invalid repo "+repoPath, err)
 | 
						|
					return
 | 
						|
				}
 | 
						|
				ctx.Repo.GitRepo = gitRepo
 | 
						|
				// We opened it, we should close it
 | 
						|
				defer func() {
 | 
						|
					// If it's been set to nil then assume someone else has closed it.
 | 
						|
					if ctx.Repo.GitRepo != nil {
 | 
						|
						ctx.Repo.GitRepo.Close()
 | 
						|
					}
 | 
						|
				}()
 | 
						|
			}
 | 
						|
 | 
						|
			next.ServeHTTP(w, req)
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// NotFound handles 404s for APIContext
 | 
						|
// String will replace message, errors will be added to a slice
 | 
						|
func (ctx *APIContext) NotFound(objs ...interface{}) {
 | 
						|
	var message = "Not Found"
 | 
						|
	var errors []string
 | 
						|
	for _, obj := range objs {
 | 
						|
		// Ignore nil
 | 
						|
		if obj == nil {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		if err, ok := obj.(error); ok {
 | 
						|
			errors = append(errors, err.Error())
 | 
						|
		} else {
 | 
						|
			message = obj.(string)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	ctx.JSON(http.StatusNotFound, map[string]interface{}{
 | 
						|
		"message":           message,
 | 
						|
		"documentation_url": setting.API.SwaggerURL,
 | 
						|
		"errors":            errors,
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
// RepoRefForAPI handles repository reference names when the ref name is not explicitly given
 | 
						|
func RepoRefForAPI(next http.Handler) http.Handler {
 | 
						|
	return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
 | 
						|
		ctx := GetAPIContext(req)
 | 
						|
		// Empty repository does not have reference information.
 | 
						|
		if ctx.Repo.Repository.IsEmpty {
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		var err error
 | 
						|
 | 
						|
		if ctx.Repo.GitRepo == nil {
 | 
						|
			repoPath := models.RepoPath(ctx.Repo.Owner.Name, ctx.Repo.Repository.Name)
 | 
						|
			ctx.Repo.GitRepo, err = git.OpenRepository(repoPath)
 | 
						|
			if err != nil {
 | 
						|
				ctx.InternalServerError(err)
 | 
						|
				return
 | 
						|
			}
 | 
						|
			// We opened it, we should close it
 | 
						|
			defer func() {
 | 
						|
				// If it's been set to nil then assume someone else has closed it.
 | 
						|
				if ctx.Repo.GitRepo != nil {
 | 
						|
					ctx.Repo.GitRepo.Close()
 | 
						|
				}
 | 
						|
			}()
 | 
						|
		}
 | 
						|
 | 
						|
		refName := getRefName(ctx.Context, RepoRefAny)
 | 
						|
 | 
						|
		if ctx.Repo.GitRepo.IsBranchExist(refName) {
 | 
						|
			ctx.Repo.Commit, err = ctx.Repo.GitRepo.GetBranchCommit(refName)
 | 
						|
			if err != nil {
 | 
						|
				ctx.InternalServerError(err)
 | 
						|
				return
 | 
						|
			}
 | 
						|
			ctx.Repo.CommitID = ctx.Repo.Commit.ID.String()
 | 
						|
		} else if ctx.Repo.GitRepo.IsTagExist(refName) {
 | 
						|
			ctx.Repo.Commit, err = ctx.Repo.GitRepo.GetTagCommit(refName)
 | 
						|
			if err != nil {
 | 
						|
				ctx.InternalServerError(err)
 | 
						|
				return
 | 
						|
			}
 | 
						|
			ctx.Repo.CommitID = ctx.Repo.Commit.ID.String()
 | 
						|
		} else if len(refName) == 40 {
 | 
						|
			ctx.Repo.CommitID = refName
 | 
						|
			ctx.Repo.Commit, err = ctx.Repo.GitRepo.GetCommit(refName)
 | 
						|
			if err != nil {
 | 
						|
				ctx.NotFound("GetCommit", err)
 | 
						|
				return
 | 
						|
			}
 | 
						|
		} else {
 | 
						|
			ctx.NotFound(fmt.Errorf("not exist: '%s'", ctx.Params("*")))
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		next.ServeHTTP(w, req)
 | 
						|
	})
 | 
						|
}
 |