woodpecker/server/router/middleware/session/repo.go

215 lines
4.7 KiB
Go
Raw Normal View History

2018-02-19 22:24:10 +00:00
// Copyright 2018 Drone.IO Inc.
2018-03-21 13:02:17 +00:00
//
2018-02-19 22:24:10 +00:00
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
2018-03-21 13:02:17 +00:00
//
2018-02-19 22:24:10 +00:00
// http://www.apache.org/licenses/LICENSE-2.0
2018-03-21 13:02:17 +00:00
//
2018-02-19 22:24:10 +00:00
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
2015-09-30 01:21:17 +00:00
package session
import (
"errors"
2015-09-30 01:21:17 +00:00
"net/http"
"strconv"
"strings"
2017-07-14 19:58:38 +00:00
"time"
2015-09-30 01:21:17 +00:00
"github.com/gin-gonic/gin"
"github.com/rs/zerolog/log"
"go.woodpecker-ci.org/woodpecker/v2/server"
"go.woodpecker-ci.org/woodpecker/v2/server/model"
"go.woodpecker-ci.org/woodpecker/v2/server/store"
"go.woodpecker-ci.org/woodpecker/v2/server/store/types"
2015-09-30 01:21:17 +00:00
)
func Repo(c *gin.Context) *model.Repo {
v, ok := c.Get("repo")
if !ok {
return nil
2015-09-30 01:21:17 +00:00
}
r, ok := v.(*model.Repo)
if !ok {
return nil
}
r.Perm = Perm(c)
return r
2015-09-30 01:21:17 +00:00
}
func SetRepo() gin.HandlerFunc {
return func(c *gin.Context) {
var (
_store = store.FromContext(c)
fullName = strings.TrimLeft(c.Param("repo_full_name"), "/")
_repoID = c.Param("repo_id")
user = User(c)
2015-09-30 01:21:17 +00:00
)
var repo *model.Repo
var err error
if _repoID != "" {
var repoID int64
repoID, err = strconv.ParseInt(_repoID, 10, 64)
if err != nil {
c.AbortWithStatus(http.StatusBadRequest)
return
}
repo, err = _store.GetRepo(repoID)
} else {
repo, err = _store.GetRepoName(fullName)
}
if repo != nil && err == nil {
2015-09-30 01:21:17 +00:00
c.Set("repo", repo)
c.Next()
return
}
// debugging
log.Debug().Err(err).Msgf("cannot find repository %s", fullName)
2015-09-30 01:21:17 +00:00
if user == nil {
c.AbortWithStatus(http.StatusUnauthorized)
return
2015-09-30 01:21:17 +00:00
}
if errors.Is(err, types.RecordNotExist) {
c.AbortWithStatus(http.StatusNotFound)
return
}
_ = c.AbortWithError(http.StatusInternalServerError, err)
2015-09-30 01:21:17 +00:00
}
}
func Perm(c *gin.Context) *model.Perm {
v, ok := c.Get("perm")
if !ok {
return nil
}
u, ok := v.(*model.Perm)
if !ok {
return nil
}
return u
}
func SetPerm() gin.HandlerFunc {
return func(c *gin.Context) {
_store := store.FromContext(c)
2015-09-30 01:21:17 +00:00
user := User(c)
repo := Repo(c)
_forge, err := server.Config.Services.Manager.ForgeFromRepo(repo)
if err != nil {
log.Error().Err(err).Msg("Cannot get forge from repo")
c.AbortWithStatus(http.StatusInternalServerError)
return
}
2017-09-14 22:20:20 +00:00
perm := new(model.Perm)
2015-09-30 01:21:17 +00:00
if user != nil {
2015-09-30 01:21:17 +00:00
var err error
perm, err = _store.PermFind(user, repo)
2015-09-30 01:21:17 +00:00
if err != nil {
log.Error().Err(err).Msgf("error fetching permission for %s %s",
user.Login, repo.FullName)
2017-07-14 19:58:38 +00:00
}
if time.Unix(perm.Synced, 0).Add(time.Hour).Before(time.Now()) {
_repo, err := _forge.Repo(c, user, repo.ForgeRemoteID, repo.Owner, repo.Name)
2017-07-14 19:58:38 +00:00
if err == nil {
log.Debug().Msgf("synced user permission for %s %s", user.Login, repo.FullName)
perm = _repo.Perm
perm.Repo = repo
perm.RepoID = repo.ID
2017-07-14 19:58:38 +00:00
perm.UserID = user.ID
perm.Synced = time.Now().Unix()
if err := _store.PermUpsert(perm); err != nil {
_ = c.AbortWithError(http.StatusInternalServerError, err)
return
}
2017-07-14 19:58:38 +00:00
}
2015-09-30 01:21:17 +00:00
}
}
2017-09-14 22:20:20 +00:00
if perm == nil {
perm = new(model.Perm)
}
2017-09-08 00:43:33 +00:00
if user != nil && user.Admin {
perm.Pull = true
perm.Push = true
perm.Admin = true
}
if repo.Visibility == model.VisibilityPublic || (repo.Visibility == model.VisibilityInternal && user != nil) {
2016-02-05 19:13:34 +00:00
perm.Pull = true
}
2015-09-30 01:21:17 +00:00
if user != nil {
log.Debug().Msgf("%s granted %+v permission to %s",
2015-09-30 01:21:17 +00:00
user.Login, perm, repo.FullName)
} else {
log.Debug().Msgf("guest granted %+v to %s", perm, repo.FullName)
2015-09-30 01:21:17 +00:00
}
c.Set("perm", perm)
c.Next()
}
}
func MustPull(c *gin.Context) {
user := User(c)
perm := Perm(c)
if perm.Pull {
c.Next()
return
}
// debugging
if user != nil {
c.AbortWithStatus(http.StatusNotFound)
log.Debug().Msgf("user %s denied read access to %s",
user.Login, c.Request.URL.Path)
} else {
c.AbortWithStatus(http.StatusUnauthorized)
log.Debug().Msgf("guest denied read access to %s %s",
c.Request.Method,
c.Request.URL.Path,
)
}
2015-09-30 01:21:17 +00:00
}
func MustPush(c *gin.Context) {
user := User(c)
perm := Perm(c)
// if the user has push access, immediately proceed
// the middleware execution chain.
if perm.Push {
c.Next()
return
}
// debugging
if user != nil {
c.AbortWithStatus(http.StatusNotFound)
log.Debug().Msgf("user %s denied write access to %s",
2015-09-30 01:21:17 +00:00
user.Login, c.Request.URL.Path)
} else {
c.AbortWithStatus(http.StatusUnauthorized)
log.Debug().Msgf("guest denied write access to %s %s",
2015-09-30 01:21:17 +00:00
c.Request.Method,
c.Request.URL.Path,
)
}
}