mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-26 12:27:06 +00:00 
			
		
		
		
	Fix SSH auth lfs locks (#3152)
* Fix SSH auth LFS locks * Activate SSH/lock test * Remove debug * Follow @lunny recommendation for AfterLoad method
This commit is contained in:
		 Antoine GIRARD
					Antoine GIRARD
				
			
				
					committed by
					
						 Lauris BH
						Lauris BH
					
				
			
			
				
	
			
			
			 Lauris BH
						Lauris BH
					
				
			
						parent
						
							97fe773491
						
					
				
				
					commit
					9e842c8a72
				
			| @@ -473,7 +473,6 @@ func logRequest(r macaron.Request, status int) { | ||||
| // authenticate uses the authorization string to determine whether | ||||
| // or not to proceed. This server assumes an HTTP Basic auth format. | ||||
| func authenticate(ctx *context.Context, repository *models.Repository, authorization string, requireWrite bool) bool { | ||||
|  | ||||
| 	accessMode := models.AccessModeRead | ||||
| 	if requireWrite { | ||||
| 		accessMode = models.AccessModeWrite | ||||
| @@ -482,86 +481,92 @@ func authenticate(ctx *context.Context, repository *models.Repository, authoriza | ||||
| 	if !repository.IsPrivate && !requireWrite { | ||||
| 		return true | ||||
| 	} | ||||
|  | ||||
| 	if ctx.IsSigned { | ||||
| 		accessCheck, _ := models.HasAccess(ctx.User.ID, repository, accessMode) | ||||
| 		return accessCheck | ||||
| 	} | ||||
|  | ||||
| 	if authorization == "" { | ||||
| 	user, repo, opStr, err := parseToken(authorization) | ||||
| 	if err != nil { | ||||
| 		return false | ||||
| 	} | ||||
|  | ||||
| 	if authenticateToken(repository, authorization, requireWrite) { | ||||
| 	ctx.User = user | ||||
| 	if opStr == "basic" { | ||||
| 		accessCheck, _ := models.HasAccess(ctx.User.ID, repository, accessMode) | ||||
| 		return accessCheck | ||||
| 	} | ||||
| 	if repository.ID == repo.ID { | ||||
| 		if requireWrite && opStr != "upload" { | ||||
| 			return false | ||||
| 		} | ||||
| 		return true | ||||
| 	} | ||||
|  | ||||
| 	if !strings.HasPrefix(authorization, "Basic ") { | ||||
| 		return false | ||||
| 	} | ||||
|  | ||||
| 	c, err := base64.StdEncoding.DecodeString(strings.TrimPrefix(authorization, "Basic ")) | ||||
| 	if err != nil { | ||||
| 		return false | ||||
| 	} | ||||
| 	cs := string(c) | ||||
| 	i := strings.IndexByte(cs, ':') | ||||
| 	if i < 0 { | ||||
| 		return false | ||||
| 	} | ||||
| 	user, password := cs[:i], cs[i+1:] | ||||
|  | ||||
| 	userModel, err := models.GetUserByName(user) | ||||
| 	if err != nil { | ||||
| 		return false | ||||
| 	} | ||||
|  | ||||
| 	if !userModel.ValidatePassword(password) { | ||||
| 		return false | ||||
| 	} | ||||
|  | ||||
| 	accessCheck, _ := models.HasAccess(userModel.ID, repository, accessMode) | ||||
| 	return accessCheck | ||||
| 	return false | ||||
| } | ||||
|  | ||||
| func authenticateToken(repository *models.Repository, authorization string, requireWrite bool) bool { | ||||
| 	if !strings.HasPrefix(authorization, "Bearer ") { | ||||
| 		return false | ||||
| func parseToken(authorization string) (*models.User, *models.Repository, string, error) { | ||||
| 	if authorization == "" { | ||||
| 		return nil, nil, "unknown", fmt.Errorf("No token") | ||||
| 	} | ||||
|  | ||||
| 	token, err := jwt.Parse(authorization[7:], func(t *jwt.Token) (interface{}, error) { | ||||
| 		if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok { | ||||
| 			return nil, fmt.Errorf("unexpected signing method: %v", t.Header["alg"]) | ||||
| 	if strings.HasPrefix(authorization, "Bearer ") { | ||||
| 		token, err := jwt.Parse(authorization[7:], func(t *jwt.Token) (interface{}, error) { | ||||
| 			if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok { | ||||
| 				return nil, fmt.Errorf("unexpected signing method: %v", t.Header["alg"]) | ||||
| 			} | ||||
| 			return setting.LFS.JWTSecretBytes, nil | ||||
| 		}) | ||||
| 		if err != nil { | ||||
| 			return nil, nil, "unknown", err | ||||
| 		} | ||||
| 		return setting.LFS.JWTSecretBytes, nil | ||||
| 	}) | ||||
| 	if err != nil { | ||||
| 		return false | ||||
| 	} | ||||
| 	claims, claimsOk := token.Claims.(jwt.MapClaims) | ||||
| 	if !token.Valid || !claimsOk { | ||||
| 		return false | ||||
| 		claims, claimsOk := token.Claims.(jwt.MapClaims) | ||||
| 		if !token.Valid || !claimsOk { | ||||
| 			return nil, nil, "unknown", fmt.Errorf("Token claim invalid") | ||||
| 		} | ||||
| 		opStr, ok := claims["op"].(string) | ||||
| 		if !ok { | ||||
| 			return nil, nil, "unknown", fmt.Errorf("Token operation invalid") | ||||
| 		} | ||||
| 		repoID, ok := claims["repo"].(float64) | ||||
| 		if !ok { | ||||
| 			return nil, nil, opStr, fmt.Errorf("Token repository id invalid") | ||||
| 		} | ||||
| 		r, err := models.GetRepositoryByID(int64(repoID)) | ||||
| 		if err != nil { | ||||
| 			return nil, nil, opStr, err | ||||
| 		} | ||||
| 		userID, ok := claims["user"].(float64) | ||||
| 		if !ok { | ||||
| 			return nil, r, opStr, fmt.Errorf("Token user id invalid") | ||||
| 		} | ||||
| 		u, err := models.GetUserByID(int64(userID)) | ||||
| 		if err != nil { | ||||
| 			return nil, r, opStr, err | ||||
| 		} | ||||
| 		return u, r, opStr, nil | ||||
| 	} | ||||
|  | ||||
| 	opStr, ok := claims["op"].(string) | ||||
| 	if !ok { | ||||
| 		return false | ||||
| 	if strings.HasPrefix(authorization, "Basic ") { | ||||
| 		c, err := base64.StdEncoding.DecodeString(strings.TrimPrefix(authorization, "Basic ")) | ||||
| 		if err != nil { | ||||
| 			return nil, nil, "basic", err | ||||
| 		} | ||||
| 		cs := string(c) | ||||
| 		i := strings.IndexByte(cs, ':') | ||||
| 		if i < 0 { | ||||
| 			return nil, nil, "basic", fmt.Errorf("Basic auth invalid") | ||||
| 		} | ||||
| 		user, password := cs[:i], cs[i+1:] | ||||
| 		u, err := models.GetUserByName(user) | ||||
| 		if err != nil { | ||||
| 			return nil, nil, "basic", err | ||||
| 		} | ||||
| 		if !u.ValidatePassword(password) { | ||||
| 			return nil, nil, "basic", fmt.Errorf("Basic auth failed") | ||||
| 		} | ||||
| 		return u, nil, "basic", nil | ||||
| 	} | ||||
|  | ||||
| 	if requireWrite && opStr != "upload" { | ||||
| 		return false | ||||
| 	} | ||||
|  | ||||
| 	repoID, ok := claims["repo"].(float64) | ||||
| 	if !ok { | ||||
| 		return false | ||||
| 	} | ||||
|  | ||||
| 	if repository.ID != int64(repoID) { | ||||
| 		return false | ||||
| 	} | ||||
|  | ||||
| 	return true | ||||
| 	return nil, nil, "unknown", fmt.Errorf("Token not found") | ||||
| } | ||||
|  | ||||
| func requireAuth(ctx *context.Context) { | ||||
|   | ||||
		Reference in New Issue
	
	Block a user