mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-10-31 14:31:02 +00:00 
			
		
		
		
	* Move access and repo permission to models/perm/access * fix test * fix git test * Move functions sequence * Some improvements per @KN4CK3R and @delvh * Move issues related code to models/issues * Move some issues related sub package * Merge * Fix test * Fix test * Fix test * Fix test * Rename some files
		
			
				
	
	
		
			390 lines
		
	
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			390 lines
		
	
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2021 The Gitea Authors. All rights reserved.
 | |
| // Use of this source code is governed by a MIT-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package asymkey
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"strings"
 | |
| 
 | |
| 	asymkey_model "code.gitea.io/gitea/models/asymkey"
 | |
| 	"code.gitea.io/gitea/models/auth"
 | |
| 	"code.gitea.io/gitea/models/db"
 | |
| 	git_model "code.gitea.io/gitea/models/git"
 | |
| 	issues_model "code.gitea.io/gitea/models/issues"
 | |
| 	user_model "code.gitea.io/gitea/models/user"
 | |
| 	"code.gitea.io/gitea/modules/git"
 | |
| 	"code.gitea.io/gitea/modules/log"
 | |
| 	"code.gitea.io/gitea/modules/process"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| )
 | |
| 
 | |
| type signingMode string
 | |
| 
 | |
| const (
 | |
| 	never         signingMode = "never"
 | |
| 	always        signingMode = "always"
 | |
| 	pubkey        signingMode = "pubkey"
 | |
| 	twofa         signingMode = "twofa"
 | |
| 	parentSigned  signingMode = "parentsigned"
 | |
| 	baseSigned    signingMode = "basesigned"
 | |
| 	headSigned    signingMode = "headsigned"
 | |
| 	commitsSigned signingMode = "commitssigned"
 | |
| 	approved      signingMode = "approved"
 | |
| 	noKey         signingMode = "nokey"
 | |
| )
 | |
| 
 | |
| func signingModeFromStrings(modeStrings []string) []signingMode {
 | |
| 	returnable := make([]signingMode, 0, len(modeStrings))
 | |
| 	for _, mode := range modeStrings {
 | |
| 		signMode := signingMode(strings.ToLower(strings.TrimSpace(mode)))
 | |
| 		switch signMode {
 | |
| 		case never:
 | |
| 			return []signingMode{never}
 | |
| 		case always:
 | |
| 			return []signingMode{always}
 | |
| 		case pubkey:
 | |
| 			fallthrough
 | |
| 		case twofa:
 | |
| 			fallthrough
 | |
| 		case parentSigned:
 | |
| 			fallthrough
 | |
| 		case baseSigned:
 | |
| 			fallthrough
 | |
| 		case headSigned:
 | |
| 			fallthrough
 | |
| 		case approved:
 | |
| 			fallthrough
 | |
| 		case commitsSigned:
 | |
| 			returnable = append(returnable, signMode)
 | |
| 		}
 | |
| 	}
 | |
| 	if len(returnable) == 0 {
 | |
| 		return []signingMode{never}
 | |
| 	}
 | |
| 	return returnable
 | |
| }
 | |
| 
 | |
| // ErrWontSign explains the first reason why a commit would not be signed
 | |
| // There may be other reasons - this is just the first reason found
 | |
| type ErrWontSign struct {
 | |
| 	Reason signingMode
 | |
| }
 | |
| 
 | |
| func (e *ErrWontSign) Error() string {
 | |
| 	return fmt.Sprintf("wont sign: %s", e.Reason)
 | |
| }
 | |
| 
 | |
| // IsErrWontSign checks if an error is a ErrWontSign
 | |
| func IsErrWontSign(err error) bool {
 | |
| 	_, ok := err.(*ErrWontSign)
 | |
| 	return ok
 | |
| }
 | |
| 
 | |
| // SigningKey returns the KeyID and git Signature for the repo
 | |
| func SigningKey(ctx context.Context, repoPath string) (string, *git.Signature) {
 | |
| 	if setting.Repository.Signing.SigningKey == "none" {
 | |
| 		return "", nil
 | |
| 	}
 | |
| 
 | |
| 	if setting.Repository.Signing.SigningKey == "default" || setting.Repository.Signing.SigningKey == "" {
 | |
| 		// Can ignore the error here as it means that commit.gpgsign is not set
 | |
| 		value, _, _ := git.NewCommand(ctx, "config", "--get", "commit.gpgsign").RunStdString(&git.RunOpts{Dir: repoPath})
 | |
| 		sign, valid := git.ParseBool(strings.TrimSpace(value))
 | |
| 		if !sign || !valid {
 | |
| 			return "", nil
 | |
| 		}
 | |
| 
 | |
| 		signingKey, _, _ := git.NewCommand(ctx, "config", "--get", "user.signingkey").RunStdString(&git.RunOpts{Dir: repoPath})
 | |
| 		signingName, _, _ := git.NewCommand(ctx, "config", "--get", "user.name").RunStdString(&git.RunOpts{Dir: repoPath})
 | |
| 		signingEmail, _, _ := git.NewCommand(ctx, "config", "--get", "user.email").RunStdString(&git.RunOpts{Dir: repoPath})
 | |
| 		return strings.TrimSpace(signingKey), &git.Signature{
 | |
| 			Name:  strings.TrimSpace(signingName),
 | |
| 			Email: strings.TrimSpace(signingEmail),
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return setting.Repository.Signing.SigningKey, &git.Signature{
 | |
| 		Name:  setting.Repository.Signing.SigningName,
 | |
| 		Email: setting.Repository.Signing.SigningEmail,
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // PublicSigningKey gets the public signing key within a provided repository directory
 | |
| func PublicSigningKey(ctx context.Context, repoPath string) (string, error) {
 | |
| 	signingKey, _ := SigningKey(ctx, repoPath)
 | |
| 	if signingKey == "" {
 | |
| 		return "", nil
 | |
| 	}
 | |
| 
 | |
| 	content, stderr, err := process.GetManager().ExecDir(ctx, -1, repoPath,
 | |
| 		"gpg --export -a", "gpg", "--export", "-a", signingKey)
 | |
| 	if err != nil {
 | |
| 		log.Error("Unable to get default signing key in %s: %s, %s, %v", repoPath, signingKey, stderr, err)
 | |
| 		return "", err
 | |
| 	}
 | |
| 	return content, nil
 | |
| }
 | |
| 
 | |
| // SignInitialCommit determines if we should sign the initial commit to this repository
 | |
| func SignInitialCommit(ctx context.Context, repoPath string, u *user_model.User) (bool, string, *git.Signature, error) {
 | |
| 	rules := signingModeFromStrings(setting.Repository.Signing.InitialCommit)
 | |
| 	signingKey, sig := SigningKey(ctx, repoPath)
 | |
| 	if signingKey == "" {
 | |
| 		return false, "", nil, &ErrWontSign{noKey}
 | |
| 	}
 | |
| 
 | |
| Loop:
 | |
| 	for _, rule := range rules {
 | |
| 		switch rule {
 | |
| 		case never:
 | |
| 			return false, "", nil, &ErrWontSign{never}
 | |
| 		case always:
 | |
| 			break Loop
 | |
| 		case pubkey:
 | |
| 			keys, err := asymkey_model.ListGPGKeys(ctx, u.ID, db.ListOptions{})
 | |
| 			if err != nil {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			if len(keys) == 0 {
 | |
| 				return false, "", nil, &ErrWontSign{pubkey}
 | |
| 			}
 | |
| 		case twofa:
 | |
| 			twofaModel, err := auth.GetTwoFactorByUID(u.ID)
 | |
| 			if err != nil && !auth.IsErrTwoFactorNotEnrolled(err) {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			if twofaModel == nil {
 | |
| 				return false, "", nil, &ErrWontSign{twofa}
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	return true, signingKey, sig, nil
 | |
| }
 | |
| 
 | |
| // SignWikiCommit determines if we should sign the commits to this repository wiki
 | |
| func SignWikiCommit(ctx context.Context, repoWikiPath string, u *user_model.User) (bool, string, *git.Signature, error) {
 | |
| 	rules := signingModeFromStrings(setting.Repository.Signing.Wiki)
 | |
| 	signingKey, sig := SigningKey(ctx, repoWikiPath)
 | |
| 	if signingKey == "" {
 | |
| 		return false, "", nil, &ErrWontSign{noKey}
 | |
| 	}
 | |
| 
 | |
| Loop:
 | |
| 	for _, rule := range rules {
 | |
| 		switch rule {
 | |
| 		case never:
 | |
| 			return false, "", nil, &ErrWontSign{never}
 | |
| 		case always:
 | |
| 			break Loop
 | |
| 		case pubkey:
 | |
| 			keys, err := asymkey_model.ListGPGKeys(ctx, u.ID, db.ListOptions{})
 | |
| 			if err != nil {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			if len(keys) == 0 {
 | |
| 				return false, "", nil, &ErrWontSign{pubkey}
 | |
| 			}
 | |
| 		case twofa:
 | |
| 			twofaModel, err := auth.GetTwoFactorByUID(u.ID)
 | |
| 			if err != nil && !auth.IsErrTwoFactorNotEnrolled(err) {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			if twofaModel == nil {
 | |
| 				return false, "", nil, &ErrWontSign{twofa}
 | |
| 			}
 | |
| 		case parentSigned:
 | |
| 			gitRepo, err := git.OpenRepository(ctx, repoWikiPath)
 | |
| 			if err != nil {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			defer gitRepo.Close()
 | |
| 			commit, err := gitRepo.GetCommit("HEAD")
 | |
| 			if err != nil {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			if commit.Signature == nil {
 | |
| 				return false, "", nil, &ErrWontSign{parentSigned}
 | |
| 			}
 | |
| 			verification := asymkey_model.ParseCommitWithSignature(commit)
 | |
| 			if !verification.Verified {
 | |
| 				return false, "", nil, &ErrWontSign{parentSigned}
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	return true, signingKey, sig, nil
 | |
| }
 | |
| 
 | |
| // SignCRUDAction determines if we should sign a CRUD commit to this repository
 | |
| func SignCRUDAction(ctx context.Context, repoPath string, u *user_model.User, tmpBasePath, parentCommit string) (bool, string, *git.Signature, error) {
 | |
| 	rules := signingModeFromStrings(setting.Repository.Signing.CRUDActions)
 | |
| 	signingKey, sig := SigningKey(ctx, repoPath)
 | |
| 	if signingKey == "" {
 | |
| 		return false, "", nil, &ErrWontSign{noKey}
 | |
| 	}
 | |
| 
 | |
| Loop:
 | |
| 	for _, rule := range rules {
 | |
| 		switch rule {
 | |
| 		case never:
 | |
| 			return false, "", nil, &ErrWontSign{never}
 | |
| 		case always:
 | |
| 			break Loop
 | |
| 		case pubkey:
 | |
| 			keys, err := asymkey_model.ListGPGKeys(ctx, u.ID, db.ListOptions{})
 | |
| 			if err != nil {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			if len(keys) == 0 {
 | |
| 				return false, "", nil, &ErrWontSign{pubkey}
 | |
| 			}
 | |
| 		case twofa:
 | |
| 			twofaModel, err := auth.GetTwoFactorByUID(u.ID)
 | |
| 			if err != nil && !auth.IsErrTwoFactorNotEnrolled(err) {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			if twofaModel == nil {
 | |
| 				return false, "", nil, &ErrWontSign{twofa}
 | |
| 			}
 | |
| 		case parentSigned:
 | |
| 			gitRepo, err := git.OpenRepository(ctx, tmpBasePath)
 | |
| 			if err != nil {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			defer gitRepo.Close()
 | |
| 			commit, err := gitRepo.GetCommit(parentCommit)
 | |
| 			if err != nil {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			if commit.Signature == nil {
 | |
| 				return false, "", nil, &ErrWontSign{parentSigned}
 | |
| 			}
 | |
| 			verification := asymkey_model.ParseCommitWithSignature(commit)
 | |
| 			if !verification.Verified {
 | |
| 				return false, "", nil, &ErrWontSign{parentSigned}
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	return true, signingKey, sig, nil
 | |
| }
 | |
| 
 | |
| // SignMerge determines if we should sign a PR merge commit to the base repository
 | |
| func SignMerge(ctx context.Context, pr *issues_model.PullRequest, u *user_model.User, tmpBasePath, baseCommit, headCommit string) (bool, string, *git.Signature, error) {
 | |
| 	if err := pr.LoadBaseRepoCtx(ctx); err != nil {
 | |
| 		log.Error("Unable to get Base Repo for pull request")
 | |
| 		return false, "", nil, err
 | |
| 	}
 | |
| 	repo := pr.BaseRepo
 | |
| 
 | |
| 	signingKey, signer := SigningKey(ctx, repo.RepoPath())
 | |
| 	if signingKey == "" {
 | |
| 		return false, "", nil, &ErrWontSign{noKey}
 | |
| 	}
 | |
| 	rules := signingModeFromStrings(setting.Repository.Signing.Merges)
 | |
| 
 | |
| 	var gitRepo *git.Repository
 | |
| 	var err error
 | |
| 
 | |
| Loop:
 | |
| 	for _, rule := range rules {
 | |
| 		switch rule {
 | |
| 		case never:
 | |
| 			return false, "", nil, &ErrWontSign{never}
 | |
| 		case always:
 | |
| 			break Loop
 | |
| 		case pubkey:
 | |
| 			keys, err := asymkey_model.ListGPGKeys(ctx, u.ID, db.ListOptions{})
 | |
| 			if err != nil {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			if len(keys) == 0 {
 | |
| 				return false, "", nil, &ErrWontSign{pubkey}
 | |
| 			}
 | |
| 		case twofa:
 | |
| 			twofaModel, err := auth.GetTwoFactorByUID(u.ID)
 | |
| 			if err != nil && !auth.IsErrTwoFactorNotEnrolled(err) {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			if twofaModel == nil {
 | |
| 				return false, "", nil, &ErrWontSign{twofa}
 | |
| 			}
 | |
| 		case approved:
 | |
| 			protectedBranch, err := git_model.GetProtectedBranchBy(ctx, repo.ID, pr.BaseBranch)
 | |
| 			if err != nil {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			if protectedBranch == nil {
 | |
| 				return false, "", nil, &ErrWontSign{approved}
 | |
| 			}
 | |
| 			if issues_model.GetGrantedApprovalsCount(ctx, protectedBranch, pr) < 1 {
 | |
| 				return false, "", nil, &ErrWontSign{approved}
 | |
| 			}
 | |
| 		case baseSigned:
 | |
| 			if gitRepo == nil {
 | |
| 				gitRepo, err = git.OpenRepository(ctx, tmpBasePath)
 | |
| 				if err != nil {
 | |
| 					return false, "", nil, err
 | |
| 				}
 | |
| 				defer gitRepo.Close()
 | |
| 			}
 | |
| 			commit, err := gitRepo.GetCommit(baseCommit)
 | |
| 			if err != nil {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			verification := asymkey_model.ParseCommitWithSignature(commit)
 | |
| 			if !verification.Verified {
 | |
| 				return false, "", nil, &ErrWontSign{baseSigned}
 | |
| 			}
 | |
| 		case headSigned:
 | |
| 			if gitRepo == nil {
 | |
| 				gitRepo, err = git.OpenRepository(ctx, tmpBasePath)
 | |
| 				if err != nil {
 | |
| 					return false, "", nil, err
 | |
| 				}
 | |
| 				defer gitRepo.Close()
 | |
| 			}
 | |
| 			commit, err := gitRepo.GetCommit(headCommit)
 | |
| 			if err != nil {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			verification := asymkey_model.ParseCommitWithSignature(commit)
 | |
| 			if !verification.Verified {
 | |
| 				return false, "", nil, &ErrWontSign{headSigned}
 | |
| 			}
 | |
| 		case commitsSigned:
 | |
| 			if gitRepo == nil {
 | |
| 				gitRepo, err = git.OpenRepository(ctx, tmpBasePath)
 | |
| 				if err != nil {
 | |
| 					return false, "", nil, err
 | |
| 				}
 | |
| 				defer gitRepo.Close()
 | |
| 			}
 | |
| 			commit, err := gitRepo.GetCommit(headCommit)
 | |
| 			if err != nil {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			verification := asymkey_model.ParseCommitWithSignature(commit)
 | |
| 			if !verification.Verified {
 | |
| 				return false, "", nil, &ErrWontSign{commitsSigned}
 | |
| 			}
 | |
| 			// need to work out merge-base
 | |
| 			mergeBaseCommit, _, err := gitRepo.GetMergeBase("", baseCommit, headCommit)
 | |
| 			if err != nil {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			commitList, err := commit.CommitsBeforeUntil(mergeBaseCommit)
 | |
| 			if err != nil {
 | |
| 				return false, "", nil, err
 | |
| 			}
 | |
| 			for _, commit := range commitList {
 | |
| 				verification := asymkey_model.ParseCommitWithSignature(commit)
 | |
| 				if !verification.Verified {
 | |
| 					return false, "", nil, &ErrWontSign{commitsSigned}
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	return true, signingKey, signer, nil
 | |
| }
 |