Платформа ЦРНП "Мирокод" для разработки проектов
https://git.mirocod.ru
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
286 lines
8.5 KiB
286 lines
8.5 KiB
// Copyright 2017 The Gitea Authors. All rights reserved. |
|
// Use of this source code is governed by a MIT-style |
|
// license that can be found in the LICENSE file. |
|
|
|
package user |
|
|
|
import ( |
|
"fmt" |
|
"net/http" |
|
|
|
asymkey_model "code.gitea.io/gitea/models/asymkey" |
|
"code.gitea.io/gitea/models/db" |
|
"code.gitea.io/gitea/modules/context" |
|
"code.gitea.io/gitea/modules/convert" |
|
api "code.gitea.io/gitea/modules/structs" |
|
"code.gitea.io/gitea/modules/web" |
|
"code.gitea.io/gitea/routers/api/v1/utils" |
|
) |
|
|
|
func listGPGKeys(ctx *context.APIContext, uid int64, listOptions db.ListOptions) { |
|
keys, err := asymkey_model.ListGPGKeys(db.DefaultContext, uid, listOptions) |
|
if err != nil { |
|
ctx.Error(http.StatusInternalServerError, "ListGPGKeys", err) |
|
return |
|
} |
|
|
|
apiKeys := make([]*api.GPGKey, len(keys)) |
|
for i := range keys { |
|
apiKeys[i] = convert.ToGPGKey(keys[i]) |
|
} |
|
|
|
total, err := asymkey_model.CountUserGPGKeys(uid) |
|
if err != nil { |
|
ctx.InternalServerError(err) |
|
return |
|
} |
|
|
|
ctx.SetTotalCountHeader(total) |
|
ctx.JSON(http.StatusOK, &apiKeys) |
|
} |
|
|
|
//ListGPGKeys get the GPG key list of a user |
|
func ListGPGKeys(ctx *context.APIContext) { |
|
// swagger:operation GET /users/{username}/gpg_keys user userListGPGKeys |
|
// --- |
|
// summary: List the given user's GPG keys |
|
// produces: |
|
// - application/json |
|
// parameters: |
|
// - name: username |
|
// in: path |
|
// description: username of user |
|
// type: string |
|
// required: true |
|
// - name: page |
|
// in: query |
|
// description: page number of results to return (1-based) |
|
// type: integer |
|
// - name: limit |
|
// in: query |
|
// description: page size of results |
|
// type: integer |
|
// responses: |
|
// "200": |
|
// "$ref": "#/responses/GPGKeyList" |
|
|
|
user := GetUserByParams(ctx) |
|
if ctx.Written() { |
|
return |
|
} |
|
listGPGKeys(ctx, user.ID, utils.GetListOptions(ctx)) |
|
} |
|
|
|
//ListMyGPGKeys get the GPG key list of the authenticated user |
|
func ListMyGPGKeys(ctx *context.APIContext) { |
|
// swagger:operation GET /user/gpg_keys user userCurrentListGPGKeys |
|
// --- |
|
// summary: List the authenticated user's GPG keys |
|
// parameters: |
|
// - name: page |
|
// in: query |
|
// description: page number of results to return (1-based) |
|
// type: integer |
|
// - name: limit |
|
// in: query |
|
// description: page size of results |
|
// type: integer |
|
// produces: |
|
// - application/json |
|
// responses: |
|
// "200": |
|
// "$ref": "#/responses/GPGKeyList" |
|
|
|
listGPGKeys(ctx, ctx.User.ID, utils.GetListOptions(ctx)) |
|
} |
|
|
|
//GetGPGKey get the GPG key based on a id |
|
func GetGPGKey(ctx *context.APIContext) { |
|
// swagger:operation GET /user/gpg_keys/{id} user userCurrentGetGPGKey |
|
// --- |
|
// summary: Get a GPG key |
|
// produces: |
|
// - application/json |
|
// parameters: |
|
// - name: id |
|
// in: path |
|
// description: id of key to get |
|
// type: integer |
|
// format: int64 |
|
// required: true |
|
// responses: |
|
// "200": |
|
// "$ref": "#/responses/GPGKey" |
|
// "404": |
|
// "$ref": "#/responses/notFound" |
|
|
|
key, err := asymkey_model.GetGPGKeyByID(ctx.ParamsInt64(":id")) |
|
if err != nil { |
|
if asymkey_model.IsErrGPGKeyNotExist(err) { |
|
ctx.NotFound() |
|
} else { |
|
ctx.Error(http.StatusInternalServerError, "GetGPGKeyByID", err) |
|
} |
|
return |
|
} |
|
ctx.JSON(http.StatusOK, convert.ToGPGKey(key)) |
|
} |
|
|
|
// CreateUserGPGKey creates new GPG key to given user by ID. |
|
func CreateUserGPGKey(ctx *context.APIContext, form api.CreateGPGKeyOption, uid int64) { |
|
token := asymkey_model.VerificationToken(ctx.User, 1) |
|
lastToken := asymkey_model.VerificationToken(ctx.User, 0) |
|
|
|
keys, err := asymkey_model.AddGPGKey(uid, form.ArmoredKey, token, form.Signature) |
|
if err != nil && asymkey_model.IsErrGPGInvalidTokenSignature(err) { |
|
keys, err = asymkey_model.AddGPGKey(uid, form.ArmoredKey, lastToken, form.Signature) |
|
} |
|
if err != nil { |
|
HandleAddGPGKeyError(ctx, err, token) |
|
return |
|
} |
|
ctx.JSON(http.StatusCreated, convert.ToGPGKey(keys[0])) |
|
} |
|
|
|
// GetVerificationToken returns the current token to be signed for this user |
|
func GetVerificationToken(ctx *context.APIContext) { |
|
// swagger:operation GET /user/gpg_key_token user getVerificationToken |
|
// --- |
|
// summary: Get a Token to verify |
|
// produces: |
|
// - text/plain |
|
// parameters: |
|
// responses: |
|
// "200": |
|
// "$ref": "#/responses/string" |
|
// "404": |
|
// "$ref": "#/responses/notFound" |
|
|
|
token := asymkey_model.VerificationToken(ctx.User, 1) |
|
ctx.PlainText(http.StatusOK, token) |
|
} |
|
|
|
// VerifyUserGPGKey creates new GPG key to given user by ID. |
|
func VerifyUserGPGKey(ctx *context.APIContext) { |
|
// swagger:operation POST /user/gpg_key_verify user userVerifyGPGKey |
|
// --- |
|
// summary: Verify a GPG key |
|
// consumes: |
|
// - application/json |
|
// produces: |
|
// - application/json |
|
// responses: |
|
// "201": |
|
// "$ref": "#/responses/GPGKey" |
|
// "404": |
|
// "$ref": "#/responses/notFound" |
|
// "422": |
|
// "$ref": "#/responses/validationError" |
|
|
|
form := web.GetForm(ctx).(*api.VerifyGPGKeyOption) |
|
token := asymkey_model.VerificationToken(ctx.User, 1) |
|
lastToken := asymkey_model.VerificationToken(ctx.User, 0) |
|
|
|
_, err := asymkey_model.VerifyGPGKey(ctx.User.ID, form.KeyID, token, form.Signature) |
|
if err != nil && asymkey_model.IsErrGPGInvalidTokenSignature(err) { |
|
_, err = asymkey_model.VerifyGPGKey(ctx.User.ID, form.KeyID, lastToken, form.Signature) |
|
} |
|
|
|
if err != nil { |
|
if asymkey_model.IsErrGPGInvalidTokenSignature(err) { |
|
ctx.Error(http.StatusUnprocessableEntity, "GPGInvalidSignature", fmt.Sprintf("The provided GPG key, signature and token do not match or token is out of date. Provide a valid signature for the token: %s", token)) |
|
return |
|
} |
|
ctx.Error(http.StatusInternalServerError, "VerifyUserGPGKey", err) |
|
} |
|
|
|
key, err := asymkey_model.GetGPGKeysByKeyID(form.KeyID) |
|
if err != nil { |
|
if asymkey_model.IsErrGPGKeyNotExist(err) { |
|
ctx.NotFound() |
|
} else { |
|
ctx.Error(http.StatusInternalServerError, "GetGPGKeysByKeyID", err) |
|
} |
|
return |
|
} |
|
ctx.JSON(http.StatusOK, convert.ToGPGKey(key[0])) |
|
} |
|
|
|
// swagger:parameters userCurrentPostGPGKey |
|
type swaggerUserCurrentPostGPGKey struct { |
|
// in:body |
|
Form api.CreateGPGKeyOption |
|
} |
|
|
|
//CreateGPGKey create a GPG key belonging to the authenticated user |
|
func CreateGPGKey(ctx *context.APIContext) { |
|
// swagger:operation POST /user/gpg_keys user userCurrentPostGPGKey |
|
// --- |
|
// summary: Create a GPG key |
|
// consumes: |
|
// - application/json |
|
// produces: |
|
// - application/json |
|
// responses: |
|
// "201": |
|
// "$ref": "#/responses/GPGKey" |
|
// "404": |
|
// "$ref": "#/responses/notFound" |
|
// "422": |
|
// "$ref": "#/responses/validationError" |
|
|
|
form := web.GetForm(ctx).(*api.CreateGPGKeyOption) |
|
CreateUserGPGKey(ctx, *form, ctx.User.ID) |
|
} |
|
|
|
//DeleteGPGKey remove a GPG key belonging to the authenticated user |
|
func DeleteGPGKey(ctx *context.APIContext) { |
|
// swagger:operation DELETE /user/gpg_keys/{id} user userCurrentDeleteGPGKey |
|
// --- |
|
// summary: Remove a GPG key |
|
// produces: |
|
// - application/json |
|
// parameters: |
|
// - name: id |
|
// in: path |
|
// description: id of key to delete |
|
// type: integer |
|
// format: int64 |
|
// required: true |
|
// responses: |
|
// "204": |
|
// "$ref": "#/responses/empty" |
|
// "403": |
|
// "$ref": "#/responses/forbidden" |
|
// "404": |
|
// "$ref": "#/responses/notFound" |
|
|
|
if err := asymkey_model.DeleteGPGKey(ctx.User, ctx.ParamsInt64(":id")); err != nil { |
|
if asymkey_model.IsErrGPGKeyAccessDenied(err) { |
|
ctx.Error(http.StatusForbidden, "", "You do not have access to this key") |
|
} else { |
|
ctx.Error(http.StatusInternalServerError, "DeleteGPGKey", err) |
|
} |
|
return |
|
} |
|
|
|
ctx.Status(http.StatusNoContent) |
|
} |
|
|
|
// HandleAddGPGKeyError handle add GPGKey error |
|
func HandleAddGPGKeyError(ctx *context.APIContext, err error, token string) { |
|
switch { |
|
case asymkey_model.IsErrGPGKeyAccessDenied(err): |
|
ctx.Error(http.StatusUnprocessableEntity, "GPGKeyAccessDenied", "You do not have access to this GPG key") |
|
case asymkey_model.IsErrGPGKeyIDAlreadyUsed(err): |
|
ctx.Error(http.StatusUnprocessableEntity, "GPGKeyIDAlreadyUsed", "A key with the same id already exists") |
|
case asymkey_model.IsErrGPGKeyParsing(err): |
|
ctx.Error(http.StatusUnprocessableEntity, "GPGKeyParsing", err) |
|
case asymkey_model.IsErrGPGNoEmailFound(err): |
|
ctx.Error(http.StatusNotFound, "GPGNoEmailFound", fmt.Sprintf("None of the emails attached to the GPG key could be found. It may still be added if you provide a valid signature for the token: %s", token)) |
|
case asymkey_model.IsErrGPGInvalidTokenSignature(err): |
|
ctx.Error(http.StatusUnprocessableEntity, "GPGInvalidSignature", fmt.Sprintf("The provided GPG key, signature and token do not match or token is out of date. Provide a valid signature for the token: %s", token)) |
|
default: |
|
ctx.Error(http.StatusInternalServerError, "AddGPGKey", err) |
|
} |
|
}
|
|
|