gitea源码

gpg_key_verify.go 2.4KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
  1. // Copyright 2021 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package asymkey
  4. import (
  5. "context"
  6. "strconv"
  7. "time"
  8. "code.gitea.io/gitea/models/db"
  9. user_model "code.gitea.io/gitea/models/user"
  10. "code.gitea.io/gitea/modules/base"
  11. "code.gitea.io/gitea/modules/log"
  12. )
  13. // This file provides functions relating verifying gpg keys
  14. // VerifyGPGKey marks a GPG key as verified
  15. func VerifyGPGKey(ctx context.Context, ownerID int64, keyID, token, signature string) (string, error) {
  16. return db.WithTx2(ctx, func(ctx context.Context) (string, error) {
  17. key := new(GPGKey)
  18. has, err := db.GetEngine(ctx).Where("owner_id = ? AND key_id = ?", ownerID, keyID).Get(key)
  19. if err != nil {
  20. return "", err
  21. } else if !has {
  22. return "", ErrGPGKeyNotExist{}
  23. }
  24. if err := key.LoadSubKeys(ctx); err != nil {
  25. return "", err
  26. }
  27. sig, err := ExtractSignature(signature)
  28. if err != nil {
  29. return "", ErrGPGInvalidTokenSignature{
  30. ID: key.KeyID,
  31. Wrapped: err,
  32. }
  33. }
  34. signer, err := hashAndVerifyWithSubKeys(sig, token, key)
  35. if err != nil {
  36. return "", ErrGPGInvalidTokenSignature{
  37. ID: key.KeyID,
  38. Wrapped: err,
  39. }
  40. }
  41. if signer == nil {
  42. signer, err = hashAndVerifyWithSubKeys(sig, token+"\n", key)
  43. if err != nil {
  44. return "", ErrGPGInvalidTokenSignature{
  45. ID: key.KeyID,
  46. Wrapped: err,
  47. }
  48. }
  49. }
  50. if signer == nil {
  51. signer, err = hashAndVerifyWithSubKeys(sig, token+"\n\n", key)
  52. if err != nil {
  53. return "", ErrGPGInvalidTokenSignature{
  54. ID: key.KeyID,
  55. Wrapped: err,
  56. }
  57. }
  58. }
  59. if signer == nil {
  60. log.Debug("VerifyGPGKey failed: no signer")
  61. return "", ErrGPGInvalidTokenSignature{
  62. ID: key.KeyID,
  63. }
  64. }
  65. if signer.PrimaryKeyID != key.KeyID && signer.KeyID != key.KeyID {
  66. return "", ErrGPGKeyNotExist{}
  67. }
  68. key.Verified = true
  69. if _, err := db.GetEngine(ctx).ID(key.ID).SetExpr("verified", true).Update(new(GPGKey)); err != nil {
  70. return "", err
  71. }
  72. return key.KeyID, nil
  73. })
  74. }
  75. // VerificationToken returns token for the user that will be valid in minutes (time)
  76. func VerificationToken(user *user_model.User, minutes int) string {
  77. return base.EncodeSha256(
  78. time.Now().Truncate(1*time.Minute).Add(time.Duration(minutes)*time.Minute).Format(
  79. time.RFC1123Z) + ":" +
  80. user.CreatedUnix.Format(time.RFC1123Z) + ":" +
  81. user.Name + ":" +
  82. user.Email + ":" +
  83. strconv.FormatInt(user.ID, 10))
  84. }