| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448 |
- // Copyright 2021 The Gitea Authors. All rights reserved.
- // SPDX-License-Identifier: MIT
-
- package asymkey
-
- import (
- "context"
- "fmt"
- "os"
- "strings"
-
- asymkey_model "code.gitea.io/gitea/models/asymkey"
- "code.gitea.io/gitea/models/auth"
- "code.gitea.io/gitea/models/db"
- git_model "code.gitea.io/gitea/models/git"
- issues_model "code.gitea.io/gitea/models/issues"
- repo_model "code.gitea.io/gitea/models/repo"
- user_model "code.gitea.io/gitea/models/user"
- "code.gitea.io/gitea/modules/git"
- "code.gitea.io/gitea/modules/git/gitcmd"
- "code.gitea.io/gitea/modules/gitrepo"
- "code.gitea.io/gitea/modules/log"
- "code.gitea.io/gitea/modules/process"
- "code.gitea.io/gitea/modules/setting"
- )
-
- type signingMode string
-
- const (
- never signingMode = "never"
- always signingMode = "always"
- pubkey signingMode = "pubkey"
- twofa signingMode = "twofa"
- parentSigned signingMode = "parentsigned"
- baseSigned signingMode = "basesigned"
- headSigned signingMode = "headsigned"
- commitsSigned signingMode = "commitssigned"
- approved signingMode = "approved"
- noKey signingMode = "nokey"
- )
-
- func signingModeFromStrings(modeStrings []string) []signingMode {
- returnable := make([]signingMode, 0, len(modeStrings))
- for _, mode := range modeStrings {
- signMode := signingMode(strings.ToLower(strings.TrimSpace(mode)))
- switch signMode {
- case never:
- return []signingMode{never}
- case always:
- return []signingMode{always}
- case pubkey:
- fallthrough
- case twofa:
- fallthrough
- case parentSigned:
- fallthrough
- case baseSigned:
- fallthrough
- case headSigned:
- fallthrough
- case approved:
- fallthrough
- case commitsSigned:
- returnable = append(returnable, signMode)
- }
- }
- if len(returnable) == 0 {
- return []signingMode{never}
- }
- return returnable
- }
-
- func userHasPubkeysGPG(ctx context.Context, userID int64) (bool, error) {
- return db.Exist[asymkey_model.GPGKey](ctx, asymkey_model.FindGPGKeyOptions{
- OwnerID: userID,
- IncludeSubKeys: true,
- }.ToConds())
- }
-
- func userHasPubkeysSSH(ctx context.Context, userID int64) (bool, error) {
- return db.Exist[asymkey_model.PublicKey](ctx, asymkey_model.FindPublicKeyOptions{
- OwnerID: userID,
- NotKeytype: asymkey_model.KeyTypePrincipal,
- }.ToConds())
- }
-
- // userHasPubkeys checks if a user has any public keys (GPG or SSH)
- func userHasPubkeys(ctx context.Context, userID int64) (bool, error) {
- has, err := userHasPubkeysGPG(ctx, userID)
- if has || err != nil {
- return has, err
- }
- return userHasPubkeysSSH(ctx, userID)
- }
-
- // ErrWontSign explains the first reason why a commit would not be signed
- // There may be other reasons - this is just the first reason found
- type ErrWontSign struct {
- Reason signingMode
- }
-
- func (e *ErrWontSign) Error() string {
- return fmt.Sprintf("wont sign: %s", e.Reason)
- }
-
- // IsErrWontSign checks if an error is a ErrWontSign
- func IsErrWontSign(err error) bool {
- _, ok := err.(*ErrWontSign)
- return ok
- }
-
- // SigningKey returns the KeyID and git Signature for the repo
- func SigningKey(ctx context.Context, repoPath string) (*git.SigningKey, *git.Signature) {
- if setting.Repository.Signing.SigningKey == "none" {
- return nil, nil
- }
-
- if setting.Repository.Signing.SigningKey == "default" || setting.Repository.Signing.SigningKey == "" {
- // Can ignore the error here as it means that commit.gpgsign is not set
- value, _, _ := gitcmd.NewCommand("config", "--get", "commit.gpgsign").RunStdString(ctx, &gitcmd.RunOpts{Dir: repoPath})
- sign, valid := git.ParseBool(strings.TrimSpace(value))
- if !sign || !valid {
- return nil, nil
- }
-
- format, _, _ := gitcmd.NewCommand("config", "--default", git.SigningKeyFormatOpenPGP, "--get", "gpg.format").RunStdString(ctx, &gitcmd.RunOpts{Dir: repoPath})
- signingKey, _, _ := gitcmd.NewCommand("config", "--get", "user.signingkey").RunStdString(ctx, &gitcmd.RunOpts{Dir: repoPath})
- signingName, _, _ := gitcmd.NewCommand("config", "--get", "user.name").RunStdString(ctx, &gitcmd.RunOpts{Dir: repoPath})
- signingEmail, _, _ := gitcmd.NewCommand("config", "--get", "user.email").RunStdString(ctx, &gitcmd.RunOpts{Dir: repoPath})
-
- if strings.TrimSpace(signingKey) == "" {
- return nil, nil
- }
-
- return &git.SigningKey{
- KeyID: strings.TrimSpace(signingKey),
- Format: strings.TrimSpace(format),
- }, &git.Signature{
- Name: strings.TrimSpace(signingName),
- Email: strings.TrimSpace(signingEmail),
- }
- }
-
- if setting.Repository.Signing.SigningKey == "" {
- return nil, nil
- }
-
- return &git.SigningKey{
- KeyID: setting.Repository.Signing.SigningKey,
- Format: setting.Repository.Signing.SigningFormat,
- }, &git.Signature{
- Name: setting.Repository.Signing.SigningName,
- Email: setting.Repository.Signing.SigningEmail,
- }
- }
-
- // PublicSigningKey gets the public signing key within a provided repository directory
- func PublicSigningKey(ctx context.Context, repoPath string) (content, format string, err error) {
- signingKey, _ := SigningKey(ctx, repoPath)
- if signingKey == nil {
- return "", "", nil
- }
- if signingKey.Format == git.SigningKeyFormatSSH {
- content, err := os.ReadFile(signingKey.KeyID)
- if err != nil {
- log.Error("Unable to read SSH public key file in %s: %s, %v", repoPath, signingKey, err)
- return "", signingKey.Format, err
- }
- return string(content), signingKey.Format, nil
- }
-
- content, stderr, err := process.GetManager().ExecDir(ctx, -1, repoPath,
- "gpg --export -a", "gpg", "--export", "-a", signingKey.KeyID)
- if err != nil {
- log.Error("Unable to get default signing key in %s: %s, %s, %v", repoPath, signingKey, stderr, err)
- return "", signingKey.Format, err
- }
- return content, signingKey.Format, nil
- }
-
- // SignInitialCommit determines if we should sign the initial commit to this repository
- func SignInitialCommit(ctx context.Context, repoPath string, u *user_model.User) (bool, *git.SigningKey, *git.Signature, error) {
- rules := signingModeFromStrings(setting.Repository.Signing.InitialCommit)
- signingKey, sig := SigningKey(ctx, repoPath)
- if signingKey == nil {
- return false, nil, nil, &ErrWontSign{noKey}
- }
-
- Loop:
- for _, rule := range rules {
- switch rule {
- case never:
- return false, nil, nil, &ErrWontSign{never}
- case always:
- break Loop
- case pubkey:
- hasKeys, err := userHasPubkeys(ctx, u.ID)
- if err != nil {
- return false, nil, nil, err
- }
- if !hasKeys {
- return false, nil, nil, &ErrWontSign{pubkey}
- }
- case twofa:
- twofaModel, err := auth.GetTwoFactorByUID(ctx, u.ID)
- if err != nil && !auth.IsErrTwoFactorNotEnrolled(err) {
- return false, nil, nil, err
- }
- if twofaModel == nil {
- return false, nil, nil, &ErrWontSign{twofa}
- }
- }
- }
- return true, signingKey, sig, nil
- }
-
- // SignWikiCommit determines if we should sign the commits to this repository wiki
- func SignWikiCommit(ctx context.Context, repo *repo_model.Repository, u *user_model.User) (bool, *git.SigningKey, *git.Signature, error) {
- repoWikiPath := repo.WikiPath()
- rules := signingModeFromStrings(setting.Repository.Signing.Wiki)
- signingKey, sig := SigningKey(ctx, repoWikiPath)
- if signingKey == nil {
- return false, nil, nil, &ErrWontSign{noKey}
- }
-
- Loop:
- for _, rule := range rules {
- switch rule {
- case never:
- return false, nil, nil, &ErrWontSign{never}
- case always:
- break Loop
- case pubkey:
- hasKeys, err := userHasPubkeys(ctx, u.ID)
- if err != nil {
- return false, nil, nil, err
- }
- if !hasKeys {
- return false, nil, nil, &ErrWontSign{pubkey}
- }
- case twofa:
- twofaModel, err := auth.GetTwoFactorByUID(ctx, u.ID)
- if err != nil && !auth.IsErrTwoFactorNotEnrolled(err) {
- return false, nil, nil, err
- }
- if twofaModel == nil {
- return false, nil, nil, &ErrWontSign{twofa}
- }
- case parentSigned:
- gitRepo, err := gitrepo.OpenRepository(ctx, repo.WikiStorageRepo())
- if err != nil {
- return false, nil, nil, err
- }
- defer gitRepo.Close()
- commit, err := gitRepo.GetCommit("HEAD")
- if err != nil {
- return false, nil, nil, err
- }
- if commit.Signature == nil {
- return false, nil, nil, &ErrWontSign{parentSigned}
- }
- verification := ParseCommitWithSignature(ctx, commit)
- if !verification.Verified {
- return false, nil, nil, &ErrWontSign{parentSigned}
- }
- }
- }
- return true, signingKey, sig, nil
- }
-
- // SignCRUDAction determines if we should sign a CRUD commit to this repository
- func SignCRUDAction(ctx context.Context, repoPath string, u *user_model.User, tmpBasePath, parentCommit string) (bool, *git.SigningKey, *git.Signature, error) {
- rules := signingModeFromStrings(setting.Repository.Signing.CRUDActions)
- signingKey, sig := SigningKey(ctx, repoPath)
- if signingKey == nil {
- return false, nil, nil, &ErrWontSign{noKey}
- }
-
- Loop:
- for _, rule := range rules {
- switch rule {
- case never:
- return false, nil, nil, &ErrWontSign{never}
- case always:
- break Loop
- case pubkey:
- hasKeys, err := userHasPubkeys(ctx, u.ID)
- if err != nil {
- return false, nil, nil, err
- }
- if !hasKeys {
- return false, nil, nil, &ErrWontSign{pubkey}
- }
- case twofa:
- twofaModel, err := auth.GetTwoFactorByUID(ctx, u.ID)
- if err != nil && !auth.IsErrTwoFactorNotEnrolled(err) {
- return false, nil, nil, err
- }
- if twofaModel == nil {
- return false, nil, nil, &ErrWontSign{twofa}
- }
- case parentSigned:
- gitRepo, err := git.OpenRepository(ctx, tmpBasePath)
- if err != nil {
- return false, nil, nil, err
- }
- defer gitRepo.Close()
- isEmpty, err := gitRepo.IsEmpty()
- if err != nil {
- return false, nil, nil, err
- }
- if !isEmpty {
- commit, err := gitRepo.GetCommit(parentCommit)
- if err != nil {
- return false, nil, nil, err
- }
- if commit.Signature == nil {
- return false, nil, nil, &ErrWontSign{parentSigned}
- }
- verification := ParseCommitWithSignature(ctx, commit)
- if !verification.Verified {
- return false, nil, nil, &ErrWontSign{parentSigned}
- }
- }
- }
- }
- return true, signingKey, sig, nil
- }
-
- // SignMerge determines if we should sign a PR merge commit to the base repository
- func SignMerge(ctx context.Context, pr *issues_model.PullRequest, u *user_model.User, tmpBasePath, baseCommit, headCommit string) (bool, *git.SigningKey, *git.Signature, error) {
- if err := pr.LoadBaseRepo(ctx); err != nil {
- log.Error("Unable to get Base Repo for pull request")
- return false, nil, nil, err
- }
- repo := pr.BaseRepo
-
- signingKey, signer := SigningKey(ctx, repo.RepoPath())
- if signingKey == nil {
- return false, nil, nil, &ErrWontSign{noKey}
- }
- rules := signingModeFromStrings(setting.Repository.Signing.Merges)
-
- var gitRepo *git.Repository
- var err error
-
- Loop:
- for _, rule := range rules {
- switch rule {
- case never:
- return false, nil, nil, &ErrWontSign{never}
- case always:
- break Loop
- case pubkey:
- hasKeys, err := userHasPubkeys(ctx, u.ID)
- if err != nil {
- return false, nil, nil, err
- }
- if !hasKeys {
- return false, nil, nil, &ErrWontSign{pubkey}
- }
- case twofa:
- twofaModel, err := auth.GetTwoFactorByUID(ctx, u.ID)
- if err != nil && !auth.IsErrTwoFactorNotEnrolled(err) {
- return false, nil, nil, err
- }
- if twofaModel == nil {
- return false, nil, nil, &ErrWontSign{twofa}
- }
- case approved:
- protectedBranch, err := git_model.GetFirstMatchProtectedBranchRule(ctx, repo.ID, pr.BaseBranch)
- if err != nil {
- return false, nil, nil, err
- }
- if protectedBranch == nil {
- return false, nil, nil, &ErrWontSign{approved}
- }
- if issues_model.GetGrantedApprovalsCount(ctx, protectedBranch, pr) < 1 {
- return false, nil, nil, &ErrWontSign{approved}
- }
- case baseSigned:
- if gitRepo == nil {
- gitRepo, err = git.OpenRepository(ctx, tmpBasePath)
- if err != nil {
- return false, nil, nil, err
- }
- defer gitRepo.Close()
- }
- commit, err := gitRepo.GetCommit(baseCommit)
- if err != nil {
- return false, nil, nil, err
- }
- verification := ParseCommitWithSignature(ctx, commit)
- if !verification.Verified {
- return false, nil, nil, &ErrWontSign{baseSigned}
- }
- case headSigned:
- if gitRepo == nil {
- gitRepo, err = git.OpenRepository(ctx, tmpBasePath)
- if err != nil {
- return false, nil, nil, err
- }
- defer gitRepo.Close()
- }
- commit, err := gitRepo.GetCommit(headCommit)
- if err != nil {
- return false, nil, nil, err
- }
- verification := ParseCommitWithSignature(ctx, commit)
- if !verification.Verified {
- return false, nil, nil, &ErrWontSign{headSigned}
- }
- case commitsSigned:
- if gitRepo == nil {
- gitRepo, err = git.OpenRepository(ctx, tmpBasePath)
- if err != nil {
- return false, nil, nil, err
- }
- defer gitRepo.Close()
- }
- commit, err := gitRepo.GetCommit(headCommit)
- if err != nil {
- return false, nil, nil, err
- }
- verification := ParseCommitWithSignature(ctx, commit)
- if !verification.Verified {
- return false, nil, nil, &ErrWontSign{commitsSigned}
- }
- // need to work out merge-base
- mergeBaseCommit, _, err := gitRepo.GetMergeBase("", baseCommit, headCommit)
- if err != nil {
- return false, nil, nil, err
- }
- commitList, err := commit.CommitsBeforeUntil(mergeBaseCommit)
- if err != nil {
- return false, nil, nil, err
- }
- for _, commit := range commitList {
- verification := ParseCommitWithSignature(ctx, commit)
- if !verification.Verified {
- return false, nil, nil, &ErrWontSign{commitsSigned}
- }
- }
- }
- }
- return true, signingKey, signer, nil
- }
|