mirror of
				https://gitee.com/gitea/gitea
				synced 2025-11-04 16:40:24 +08:00 
			
		
		
		
	Fix SSH auth lfs locks (#3152)
* Fix SSH auth LFS locks * Activate SSH/lock test * Remove debug * Follow @lunny recommendation for AfterLoad method
This commit is contained in:
		
				
					committed by
					
						
						Lauris BH
					
				
			
			
				
	
			
			
			
						parent
						
							97fe773491
						
					
				
				
					commit
					9e842c8a72
				
			@@ -473,7 +473,6 @@ func logRequest(r macaron.Request, status int) {
 | 
			
		||||
// authenticate uses the authorization string to determine whether
 | 
			
		||||
// or not to proceed. This server assumes an HTTP Basic auth format.
 | 
			
		||||
func authenticate(ctx *context.Context, repository *models.Repository, authorization string, requireWrite bool) bool {
 | 
			
		||||
 | 
			
		||||
	accessMode := models.AccessModeRead
 | 
			
		||||
	if requireWrite {
 | 
			
		||||
		accessMode = models.AccessModeWrite
 | 
			
		||||
@@ -482,86 +481,92 @@ func authenticate(ctx *context.Context, repository *models.Repository, authoriza
 | 
			
		||||
	if !repository.IsPrivate && !requireWrite {
 | 
			
		||||
		return true
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if ctx.IsSigned {
 | 
			
		||||
		accessCheck, _ := models.HasAccess(ctx.User.ID, repository, accessMode)
 | 
			
		||||
		return accessCheck
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if authorization == "" {
 | 
			
		||||
	user, repo, opStr, err := parseToken(authorization)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if authenticateToken(repository, authorization, requireWrite) {
 | 
			
		||||
	ctx.User = user
 | 
			
		||||
	if opStr == "basic" {
 | 
			
		||||
		accessCheck, _ := models.HasAccess(ctx.User.ID, repository, accessMode)
 | 
			
		||||
		return accessCheck
 | 
			
		||||
	}
 | 
			
		||||
	if repository.ID == repo.ID {
 | 
			
		||||
		if requireWrite && opStr != "upload" {
 | 
			
		||||
			return false
 | 
			
		||||
		}
 | 
			
		||||
		return true
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if !strings.HasPrefix(authorization, "Basic ") {
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	c, err := base64.StdEncoding.DecodeString(strings.TrimPrefix(authorization, "Basic "))
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
	cs := string(c)
 | 
			
		||||
	i := strings.IndexByte(cs, ':')
 | 
			
		||||
	if i < 0 {
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
	user, password := cs[:i], cs[i+1:]
 | 
			
		||||
 | 
			
		||||
	userModel, err := models.GetUserByName(user)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if !userModel.ValidatePassword(password) {
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	accessCheck, _ := models.HasAccess(userModel.ID, repository, accessMode)
 | 
			
		||||
	return accessCheck
 | 
			
		||||
	return false
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func authenticateToken(repository *models.Repository, authorization string, requireWrite bool) bool {
 | 
			
		||||
	if !strings.HasPrefix(authorization, "Bearer ") {
 | 
			
		||||
		return false
 | 
			
		||||
func parseToken(authorization string) (*models.User, *models.Repository, string, error) {
 | 
			
		||||
	if authorization == "" {
 | 
			
		||||
		return nil, nil, "unknown", fmt.Errorf("No token")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	token, err := jwt.Parse(authorization[7:], func(t *jwt.Token) (interface{}, error) {
 | 
			
		||||
		if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok {
 | 
			
		||||
			return nil, fmt.Errorf("unexpected signing method: %v", t.Header["alg"])
 | 
			
		||||
	if strings.HasPrefix(authorization, "Bearer ") {
 | 
			
		||||
		token, err := jwt.Parse(authorization[7:], func(t *jwt.Token) (interface{}, error) {
 | 
			
		||||
			if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok {
 | 
			
		||||
				return nil, fmt.Errorf("unexpected signing method: %v", t.Header["alg"])
 | 
			
		||||
			}
 | 
			
		||||
			return setting.LFS.JWTSecretBytes, nil
 | 
			
		||||
		})
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return nil, nil, "unknown", err
 | 
			
		||||
		}
 | 
			
		||||
		return setting.LFS.JWTSecretBytes, nil
 | 
			
		||||
	})
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
	claims, claimsOk := token.Claims.(jwt.MapClaims)
 | 
			
		||||
	if !token.Valid || !claimsOk {
 | 
			
		||||
		return false
 | 
			
		||||
		claims, claimsOk := token.Claims.(jwt.MapClaims)
 | 
			
		||||
		if !token.Valid || !claimsOk {
 | 
			
		||||
			return nil, nil, "unknown", fmt.Errorf("Token claim invalid")
 | 
			
		||||
		}
 | 
			
		||||
		opStr, ok := claims["op"].(string)
 | 
			
		||||
		if !ok {
 | 
			
		||||
			return nil, nil, "unknown", fmt.Errorf("Token operation invalid")
 | 
			
		||||
		}
 | 
			
		||||
		repoID, ok := claims["repo"].(float64)
 | 
			
		||||
		if !ok {
 | 
			
		||||
			return nil, nil, opStr, fmt.Errorf("Token repository id invalid")
 | 
			
		||||
		}
 | 
			
		||||
		r, err := models.GetRepositoryByID(int64(repoID))
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return nil, nil, opStr, err
 | 
			
		||||
		}
 | 
			
		||||
		userID, ok := claims["user"].(float64)
 | 
			
		||||
		if !ok {
 | 
			
		||||
			return nil, r, opStr, fmt.Errorf("Token user id invalid")
 | 
			
		||||
		}
 | 
			
		||||
		u, err := models.GetUserByID(int64(userID))
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return nil, r, opStr, err
 | 
			
		||||
		}
 | 
			
		||||
		return u, r, opStr, nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	opStr, ok := claims["op"].(string)
 | 
			
		||||
	if !ok {
 | 
			
		||||
		return false
 | 
			
		||||
	if strings.HasPrefix(authorization, "Basic ") {
 | 
			
		||||
		c, err := base64.StdEncoding.DecodeString(strings.TrimPrefix(authorization, "Basic "))
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return nil, nil, "basic", err
 | 
			
		||||
		}
 | 
			
		||||
		cs := string(c)
 | 
			
		||||
		i := strings.IndexByte(cs, ':')
 | 
			
		||||
		if i < 0 {
 | 
			
		||||
			return nil, nil, "basic", fmt.Errorf("Basic auth invalid")
 | 
			
		||||
		}
 | 
			
		||||
		user, password := cs[:i], cs[i+1:]
 | 
			
		||||
		u, err := models.GetUserByName(user)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return nil, nil, "basic", err
 | 
			
		||||
		}
 | 
			
		||||
		if !u.ValidatePassword(password) {
 | 
			
		||||
			return nil, nil, "basic", fmt.Errorf("Basic auth failed")
 | 
			
		||||
		}
 | 
			
		||||
		return u, nil, "basic", nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if requireWrite && opStr != "upload" {
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	repoID, ok := claims["repo"].(float64)
 | 
			
		||||
	if !ok {
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if repository.ID != int64(repoID) {
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return true
 | 
			
		||||
	return nil, nil, "unknown", fmt.Errorf("Token not found")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func requireAuth(ctx *context.Context) {
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user