240 lines
4.8 KiB
Go
240 lines
4.8 KiB
Go
package session
|
|
|
|
import (
|
|
"net/http"
|
|
|
|
"github.com/drone/drone/model"
|
|
"github.com/drone/drone/router/middleware/context"
|
|
"github.com/drone/drone/shared/token"
|
|
|
|
log "github.com/Sirupsen/logrus"
|
|
"github.com/gin-gonic/gin"
|
|
)
|
|
|
|
func Repo(c *gin.Context) *model.Repo {
|
|
v, ok := c.Get("repo")
|
|
if !ok {
|
|
return nil
|
|
}
|
|
r, ok := v.(*model.Repo)
|
|
if !ok {
|
|
return nil
|
|
}
|
|
return r
|
|
}
|
|
|
|
func Repos(c *gin.Context) []*model.RepoLite {
|
|
v, ok := c.Get("repos")
|
|
if !ok {
|
|
return nil
|
|
}
|
|
r, ok := v.([]*model.RepoLite)
|
|
if !ok {
|
|
return nil
|
|
}
|
|
return r
|
|
}
|
|
|
|
func SetRepo() gin.HandlerFunc {
|
|
return func(c *gin.Context) {
|
|
var (
|
|
owner = c.Param("owner")
|
|
name = c.Param("name")
|
|
)
|
|
|
|
db := context.Database(c)
|
|
user := User(c)
|
|
repo, err := model.GetRepoName(db, owner, name)
|
|
if err == nil {
|
|
c.Set("repo", repo)
|
|
c.Next()
|
|
return
|
|
}
|
|
|
|
// if the user is not nil, check the remote system
|
|
// to see if the repository actually exists. If yes,
|
|
// we can prompt the user to add.
|
|
if user != nil {
|
|
remote := context.Remote(c)
|
|
repo, err = remote.Repo(user, owner, name)
|
|
if err != nil {
|
|
log.Errorf("Cannot get repository %s/%s for user %s. %s",
|
|
owner, user.Login, name, err)
|
|
}
|
|
}
|
|
|
|
data := gin.H{
|
|
"User": user,
|
|
"Repo": repo,
|
|
}
|
|
|
|
// if we found a repository, we should display a page
|
|
// to the user allowing them to activate.
|
|
if repo != nil && len(repo.FullName) != 0 {
|
|
// we should probably move this code to a
|
|
// separate route, but for now we need to
|
|
// add a CSRF token.
|
|
data["Csrf"], _ = token.New(
|
|
token.CsrfToken,
|
|
user.Login,
|
|
).Sign(user.Hash)
|
|
|
|
c.HTML(http.StatusNotFound, "repo_activate.html", data)
|
|
} else {
|
|
c.HTML(http.StatusNotFound, "404.html", data)
|
|
}
|
|
|
|
c.Abort()
|
|
}
|
|
}
|
|
|
|
func Perm(c *gin.Context) *model.Perm {
|
|
v, ok := c.Get("perm")
|
|
if !ok {
|
|
return nil
|
|
}
|
|
u, ok := v.(*model.Perm)
|
|
if !ok {
|
|
return nil
|
|
}
|
|
return u
|
|
}
|
|
|
|
func SetPerm() gin.HandlerFunc {
|
|
return func(c *gin.Context) {
|
|
user := User(c)
|
|
repo := Repo(c)
|
|
remote := context.Remote(c)
|
|
perm := &model.Perm{}
|
|
|
|
if user != nil {
|
|
// attempt to get the permissions from a local cache
|
|
// just to avoid excess API calls to GitHub
|
|
val, ok := c.Get("perm")
|
|
if ok {
|
|
c.Next()
|
|
|
|
log.Debugf("%s using cached %+v permission to %s",
|
|
user.Login, val, repo.FullName)
|
|
return
|
|
}
|
|
}
|
|
|
|
switch {
|
|
// if the user is not authenticated, and the
|
|
// repository is private, the user has NO permission
|
|
// to view the repository.
|
|
case user == nil && repo.IsPrivate == true:
|
|
perm.Pull = false
|
|
perm.Push = false
|
|
perm.Admin = false
|
|
|
|
// if the user is not authenticated, but the repository
|
|
// is public, the user has pull-rights only.
|
|
case user == nil && repo.IsPrivate == false:
|
|
perm.Pull = true
|
|
perm.Push = false
|
|
perm.Admin = false
|
|
|
|
case user.Admin:
|
|
perm.Pull = true
|
|
perm.Push = true
|
|
perm.Admin = true
|
|
|
|
// otherwise if the user is authenticated we should
|
|
// check the remote system to get the users permissiosn.
|
|
default:
|
|
var err error
|
|
perm, err = remote.Perm(user, repo.Owner, repo.Name)
|
|
if err != nil {
|
|
perm.Pull = false
|
|
perm.Push = false
|
|
perm.Admin = false
|
|
|
|
// debug
|
|
log.Errorf("Error fetching permission for %s %s",
|
|
user.Login, repo.FullName)
|
|
}
|
|
// if we couldn't fetch permissions, but the repository
|
|
// is public, we should grant the user pull access.
|
|
if err != nil && repo.IsPrivate == false {
|
|
perm.Pull = true
|
|
}
|
|
}
|
|
|
|
if user != nil {
|
|
log.Debugf("%s granted %+v permission to %s",
|
|
user.Login, perm, repo.FullName)
|
|
|
|
} else {
|
|
log.Debugf("Guest granted %+v to %s", perm, repo.FullName)
|
|
}
|
|
|
|
c.Set("perm", perm)
|
|
c.Next()
|
|
}
|
|
}
|
|
|
|
func MustPull(c *gin.Context) {
|
|
user := User(c)
|
|
repo := Repo(c)
|
|
perm := Perm(c)
|
|
|
|
if perm.Pull {
|
|
c.Next()
|
|
return
|
|
}
|
|
|
|
// if the user doesn't have pull permission to the
|
|
// repository we display a 404 error to avoid leaking
|
|
// repository information.
|
|
c.HTML(http.StatusNotFound, "404.html", gin.H{
|
|
"User": user,
|
|
"Repo": repo,
|
|
"Perm": perm,
|
|
})
|
|
|
|
c.Abort()
|
|
}
|
|
|
|
func MustPush(c *gin.Context) {
|
|
user := User(c)
|
|
repo := Repo(c)
|
|
perm := Perm(c)
|
|
|
|
// if the user has push access, immediately proceed
|
|
// the middleware execution chain.
|
|
if perm.Push {
|
|
c.Next()
|
|
return
|
|
}
|
|
|
|
data := gin.H{
|
|
"User": user,
|
|
"Repo": repo,
|
|
"Perm": perm,
|
|
}
|
|
|
|
// if the user has pull access we should tell them
|
|
// the operation is not authorized. Otherwise we should
|
|
// give a 404 to avoid leaking information.
|
|
if !perm.Pull {
|
|
c.HTML(http.StatusNotFound, "404.html", data)
|
|
} else {
|
|
c.HTML(http.StatusUnauthorized, "401.html", data)
|
|
}
|
|
|
|
// debugging
|
|
if user != nil {
|
|
log.Debugf("%s denied write access to %s",
|
|
user.Login, c.Request.URL.Path)
|
|
|
|
} else {
|
|
log.Debugf("Guest denied write access to %s %s",
|
|
c.Request.Method,
|
|
c.Request.URL.Path,
|
|
)
|
|
}
|
|
|
|
c.Abort()
|
|
}
|