gitea源码

migrate.go 14KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503
  1. // Copyright 2019 The Gitea Authors. All rights reserved.
  2. // Copyright 2018 Jonas Franz. All rights reserved.
  3. // SPDX-License-Identifier: MIT
  4. package migrations
  5. import (
  6. "context"
  7. "errors"
  8. "fmt"
  9. "net"
  10. "net/url"
  11. "path/filepath"
  12. "strings"
  13. repo_model "code.gitea.io/gitea/models/repo"
  14. system_model "code.gitea.io/gitea/models/system"
  15. user_model "code.gitea.io/gitea/models/user"
  16. "code.gitea.io/gitea/modules/git"
  17. "code.gitea.io/gitea/modules/hostmatcher"
  18. "code.gitea.io/gitea/modules/log"
  19. base "code.gitea.io/gitea/modules/migration"
  20. "code.gitea.io/gitea/modules/setting"
  21. "code.gitea.io/gitea/modules/util"
  22. )
  23. // MigrateOptions is equal to base.MigrateOptions
  24. type MigrateOptions = base.MigrateOptions
  25. var (
  26. factories []base.DownloaderFactory
  27. allowList *hostmatcher.HostMatchList
  28. blockList *hostmatcher.HostMatchList
  29. )
  30. // RegisterDownloaderFactory registers a downloader factory
  31. func RegisterDownloaderFactory(factory base.DownloaderFactory) {
  32. factories = append(factories, factory)
  33. }
  34. // IsMigrateURLAllowed checks if an URL is allowed to be migrated from
  35. func IsMigrateURLAllowed(remoteURL string, doer *user_model.User) error {
  36. // Remote address can be HTTP/HTTPS/Git URL or local path.
  37. u, err := url.Parse(remoteURL)
  38. if err != nil {
  39. return &git.ErrInvalidCloneAddr{IsURLError: true, Host: remoteURL}
  40. }
  41. if u.Scheme == "file" || u.Scheme == "" {
  42. if !doer.CanImportLocal() {
  43. return &git.ErrInvalidCloneAddr{Host: "<LOCAL_FILESYSTEM>", IsPermissionDenied: true, LocalPath: true}
  44. }
  45. isAbs := filepath.IsAbs(u.Host + u.Path)
  46. if !isAbs {
  47. return &git.ErrInvalidCloneAddr{Host: "<LOCAL_FILESYSTEM>", IsInvalidPath: true, LocalPath: true}
  48. }
  49. isDir, err := util.IsDir(u.Host + u.Path)
  50. if err != nil {
  51. log.Error("Unable to check if %s is a directory: %v", u.Host+u.Path, err)
  52. return err
  53. }
  54. if !isDir {
  55. return &git.ErrInvalidCloneAddr{Host: "<LOCAL_FILESYSTEM>", IsInvalidPath: true, LocalPath: true}
  56. }
  57. return nil
  58. }
  59. if u.Scheme == "git" && u.Port() != "" && (strings.Contains(remoteURL, "%0d") || strings.Contains(remoteURL, "%0a")) {
  60. return &git.ErrInvalidCloneAddr{Host: u.Host, IsURLError: true}
  61. }
  62. if u.Opaque != "" || u.Scheme != "" && u.Scheme != "http" && u.Scheme != "https" && u.Scheme != "git" {
  63. return &git.ErrInvalidCloneAddr{Host: u.Host, IsProtocolInvalid: true, IsPermissionDenied: true, IsURLError: true}
  64. }
  65. hostName, _, errIgnored := net.SplitHostPort(u.Host)
  66. if errIgnored != nil {
  67. hostName = u.Host // u.Host can be "host" or "host:port"
  68. }
  69. // some users only use proxy, there is no DNS resolver. it's safe to ignore the LookupIP error
  70. addrList, _ := net.LookupIP(hostName)
  71. return checkByAllowBlockList(hostName, addrList)
  72. }
  73. func checkByAllowBlockList(hostName string, addrList []net.IP) error {
  74. var ipAllowed bool
  75. var ipBlocked bool
  76. for _, addr := range addrList {
  77. ipAllowed = ipAllowed || allowList.MatchIPAddr(addr)
  78. ipBlocked = ipBlocked || blockList.MatchIPAddr(addr)
  79. }
  80. var blockedError error
  81. if blockList.MatchHostName(hostName) || ipBlocked {
  82. blockedError = &git.ErrInvalidCloneAddr{Host: hostName, IsPermissionDenied: true}
  83. }
  84. // if we have an allow-list, check the allow-list before return to get the more accurate error
  85. if !allowList.IsEmpty() {
  86. if !allowList.MatchHostName(hostName) && !ipAllowed {
  87. return &git.ErrInvalidCloneAddr{Host: hostName, IsPermissionDenied: true}
  88. }
  89. }
  90. // otherwise, we always follow the blocked list
  91. return blockedError
  92. }
  93. // MigrateRepository migrate repository according MigrateOptions
  94. func MigrateRepository(ctx context.Context, doer *user_model.User, ownerName string, opts base.MigrateOptions, messenger base.Messenger) (*repo_model.Repository, error) {
  95. err := IsMigrateURLAllowed(opts.CloneAddr, doer)
  96. if err != nil {
  97. return nil, err
  98. }
  99. if opts.LFS && len(opts.LFSEndpoint) > 0 {
  100. err := IsMigrateURLAllowed(opts.LFSEndpoint, doer)
  101. if err != nil {
  102. return nil, err
  103. }
  104. }
  105. downloader, err := newDownloader(ctx, ownerName, opts)
  106. if err != nil {
  107. return nil, err
  108. }
  109. uploader := NewGiteaLocalUploader(ctx, doer, ownerName, opts.RepoName)
  110. uploader.gitServiceType = opts.GitServiceType
  111. if err := migrateRepository(ctx, doer, downloader, uploader, opts, messenger); err != nil {
  112. if err1 := uploader.Rollback(); err1 != nil {
  113. log.Error("rollback failed: %v", err1)
  114. }
  115. if err2 := system_model.CreateRepositoryNotice(fmt.Sprintf("Migrate repository from %s failed: %v", opts.OriginalURL, err)); err2 != nil {
  116. log.Error("create respotiry notice failed: ", err2)
  117. }
  118. return nil, err
  119. }
  120. return uploader.repo, nil
  121. }
  122. func newDownloader(ctx context.Context, ownerName string, opts base.MigrateOptions) (base.Downloader, error) {
  123. var (
  124. downloader base.Downloader
  125. err error
  126. )
  127. for _, factory := range factories {
  128. if factory.GitServiceType() == opts.GitServiceType {
  129. downloader, err = factory.New(ctx, opts)
  130. if err != nil {
  131. return nil, err
  132. }
  133. break
  134. }
  135. }
  136. if downloader == nil {
  137. opts.Wiki = true
  138. opts.Milestones = false
  139. opts.Labels = false
  140. opts.Releases = false
  141. opts.Comments = false
  142. opts.Issues = false
  143. opts.PullRequests = false
  144. downloader = NewPlainGitDownloader(ownerName, opts.RepoName, opts.CloneAddr)
  145. log.Trace("Will migrate from git: %s", opts.OriginalURL)
  146. }
  147. if setting.Migrations.MaxAttempts > 1 {
  148. downloader = base.NewRetryDownloader(downloader, setting.Migrations.MaxAttempts, setting.Migrations.RetryBackoff)
  149. }
  150. return downloader, nil
  151. }
  152. // migrateRepository will download information and then upload it to Uploader, this is a simple
  153. // process for small repository. For a big repository, save all the data to disk
  154. // before upload is better
  155. func migrateRepository(ctx context.Context, doer *user_model.User, downloader base.Downloader, uploader base.Uploader, opts base.MigrateOptions, messenger base.Messenger) error {
  156. if messenger == nil {
  157. messenger = base.NilMessenger
  158. }
  159. repo, err := downloader.GetRepoInfo(ctx)
  160. if err != nil {
  161. if !base.IsErrNotSupported(err) {
  162. return err
  163. }
  164. log.Info("migrating repo infos is not supported, ignored")
  165. }
  166. repo.IsPrivate = opts.Private
  167. repo.IsMirror = opts.Mirror
  168. if opts.Description != "" {
  169. repo.Description = opts.Description
  170. }
  171. if repo.CloneURL, err = downloader.FormatCloneURL(opts, repo.CloneURL); err != nil {
  172. return err
  173. }
  174. // SECURITY: If the downloader is not a RepositoryRestorer then we need to recheck the CloneURL
  175. if _, ok := downloader.(*RepositoryRestorer); !ok {
  176. // Now the clone URL can be rewritten by the downloader so we must recheck
  177. if err := IsMigrateURLAllowed(repo.CloneURL, doer); err != nil {
  178. return err
  179. }
  180. // SECURITY: Ensure that we haven't been redirected from an external to a local filesystem
  181. // Now we know all of these must parse
  182. cloneAddrURL, _ := url.Parse(opts.CloneAddr)
  183. cloneURL, _ := url.Parse(repo.CloneURL)
  184. if cloneURL.Scheme == "file" || cloneURL.Scheme == "" {
  185. if cloneAddrURL.Scheme != "file" && cloneAddrURL.Scheme != "" {
  186. return errors.New("repo info has changed from external to local filesystem")
  187. }
  188. }
  189. // We don't actually need to check the OriginalURL as it isn't used anywhere
  190. }
  191. log.Trace("migrating git data from %s", repo.CloneURL)
  192. messenger("repo.migrate.migrating_git")
  193. if err = uploader.CreateRepo(ctx, repo, opts); err != nil {
  194. return err
  195. }
  196. defer uploader.Close()
  197. log.Trace("migrating topics")
  198. messenger("repo.migrate.migrating_topics")
  199. topics, err := downloader.GetTopics(ctx)
  200. if err != nil {
  201. if !base.IsErrNotSupported(err) {
  202. return err
  203. }
  204. log.Warn("migrating topics is not supported, ignored")
  205. }
  206. if len(topics) != 0 {
  207. if err = uploader.CreateTopics(ctx, topics...); err != nil {
  208. return err
  209. }
  210. }
  211. if opts.Milestones {
  212. log.Trace("migrating milestones")
  213. messenger("repo.migrate.migrating_milestones")
  214. milestones, err := downloader.GetMilestones(ctx)
  215. if err != nil {
  216. if !base.IsErrNotSupported(err) {
  217. return err
  218. }
  219. log.Warn("migrating milestones is not supported, ignored")
  220. }
  221. msBatchSize := uploader.MaxBatchInsertSize("milestone")
  222. for len(milestones) > 0 {
  223. if len(milestones) < msBatchSize {
  224. msBatchSize = len(milestones)
  225. }
  226. if err := uploader.CreateMilestones(ctx, milestones[:msBatchSize]...); err != nil {
  227. return err
  228. }
  229. milestones = milestones[msBatchSize:]
  230. }
  231. }
  232. if opts.Labels {
  233. log.Trace("migrating labels")
  234. messenger("repo.migrate.migrating_labels")
  235. labels, err := downloader.GetLabels(ctx)
  236. if err != nil {
  237. if !base.IsErrNotSupported(err) {
  238. return err
  239. }
  240. log.Warn("migrating labels is not supported, ignored")
  241. }
  242. lbBatchSize := uploader.MaxBatchInsertSize("label")
  243. for len(labels) > 0 {
  244. if len(labels) < lbBatchSize {
  245. lbBatchSize = len(labels)
  246. }
  247. if err := uploader.CreateLabels(ctx, labels[:lbBatchSize]...); err != nil {
  248. return err
  249. }
  250. labels = labels[lbBatchSize:]
  251. }
  252. }
  253. if opts.Releases {
  254. log.Trace("migrating releases")
  255. messenger("repo.migrate.migrating_releases")
  256. releases, err := downloader.GetReleases(ctx)
  257. if err != nil {
  258. if !base.IsErrNotSupported(err) {
  259. return err
  260. }
  261. log.Warn("migrating releases is not supported, ignored")
  262. }
  263. relBatchSize := uploader.MaxBatchInsertSize("release")
  264. for len(releases) > 0 {
  265. if len(releases) < relBatchSize {
  266. relBatchSize = len(releases)
  267. }
  268. if err = uploader.CreateReleases(ctx, releases[:relBatchSize]...); err != nil {
  269. return err
  270. }
  271. releases = releases[relBatchSize:]
  272. }
  273. // Once all releases (if any) are inserted, sync any remaining non-release tags
  274. if err = uploader.SyncTags(ctx); err != nil {
  275. return err
  276. }
  277. }
  278. var (
  279. commentBatchSize = uploader.MaxBatchInsertSize("comment")
  280. reviewBatchSize = uploader.MaxBatchInsertSize("review")
  281. )
  282. supportAllComments := downloader.SupportGetRepoComments()
  283. if opts.Issues {
  284. log.Trace("migrating issues and comments")
  285. messenger("repo.migrate.migrating_issues")
  286. issueBatchSize := uploader.MaxBatchInsertSize("issue")
  287. for i := 1; ; i++ {
  288. issues, isEnd, err := downloader.GetIssues(ctx, i, issueBatchSize)
  289. if err != nil {
  290. if !base.IsErrNotSupported(err) {
  291. return err
  292. }
  293. log.Warn("migrating issues is not supported, ignored")
  294. break
  295. }
  296. if err := uploader.CreateIssues(ctx, issues...); err != nil {
  297. return err
  298. }
  299. if opts.Comments && !supportAllComments {
  300. allComments := make([]*base.Comment, 0, commentBatchSize)
  301. for _, issue := range issues {
  302. log.Trace("migrating issue %d's comments", issue.Number)
  303. comments, _, err := downloader.GetComments(ctx, issue)
  304. if err != nil {
  305. if !base.IsErrNotSupported(err) {
  306. return err
  307. }
  308. log.Warn("migrating comments is not supported, ignored")
  309. }
  310. allComments = append(allComments, comments...)
  311. if len(allComments) >= commentBatchSize {
  312. if err = uploader.CreateComments(ctx, allComments[:commentBatchSize]...); err != nil {
  313. return err
  314. }
  315. allComments = allComments[commentBatchSize:]
  316. }
  317. }
  318. if len(allComments) > 0 {
  319. if err = uploader.CreateComments(ctx, allComments...); err != nil {
  320. return err
  321. }
  322. }
  323. }
  324. if isEnd {
  325. break
  326. }
  327. }
  328. }
  329. if opts.PullRequests {
  330. log.Trace("migrating pull requests and comments")
  331. messenger("repo.migrate.migrating_pulls")
  332. prBatchSize := uploader.MaxBatchInsertSize("pullrequest")
  333. for i := 1; ; i++ {
  334. prs, isEnd, err := downloader.GetPullRequests(ctx, i, prBatchSize)
  335. if err != nil {
  336. if !base.IsErrNotSupported(err) {
  337. return err
  338. }
  339. log.Warn("migrating pull requests is not supported, ignored")
  340. break
  341. }
  342. if err := uploader.CreatePullRequests(ctx, prs...); err != nil {
  343. return err
  344. }
  345. if opts.Comments {
  346. if !supportAllComments {
  347. // plain comments
  348. allComments := make([]*base.Comment, 0, commentBatchSize)
  349. for _, pr := range prs {
  350. log.Trace("migrating pull request %d's comments", pr.Number)
  351. comments, _, err := downloader.GetComments(ctx, pr)
  352. if err != nil {
  353. if !base.IsErrNotSupported(err) {
  354. return err
  355. }
  356. log.Warn("migrating comments is not supported, ignored")
  357. }
  358. allComments = append(allComments, comments...)
  359. if len(allComments) >= commentBatchSize {
  360. if err = uploader.CreateComments(ctx, allComments[:commentBatchSize]...); err != nil {
  361. return err
  362. }
  363. allComments = allComments[commentBatchSize:]
  364. }
  365. }
  366. if len(allComments) > 0 {
  367. if err = uploader.CreateComments(ctx, allComments...); err != nil {
  368. return err
  369. }
  370. }
  371. }
  372. // migrate reviews
  373. allReviews := make([]*base.Review, 0, reviewBatchSize)
  374. for _, pr := range prs {
  375. reviews, err := downloader.GetReviews(ctx, pr)
  376. if err != nil {
  377. if !base.IsErrNotSupported(err) {
  378. return err
  379. }
  380. log.Warn("migrating reviews is not supported, ignored")
  381. break
  382. }
  383. allReviews = append(allReviews, reviews...)
  384. if len(allReviews) >= reviewBatchSize {
  385. if err = uploader.CreateReviews(ctx, allReviews[:reviewBatchSize]...); err != nil {
  386. return err
  387. }
  388. allReviews = allReviews[reviewBatchSize:]
  389. }
  390. }
  391. if len(allReviews) > 0 {
  392. if err = uploader.CreateReviews(ctx, allReviews...); err != nil {
  393. return err
  394. }
  395. }
  396. }
  397. if isEnd {
  398. break
  399. }
  400. }
  401. }
  402. if opts.Comments && supportAllComments {
  403. log.Trace("migrating comments")
  404. for i := 1; ; i++ {
  405. comments, isEnd, err := downloader.GetAllComments(ctx, i, commentBatchSize)
  406. if err != nil {
  407. return err
  408. }
  409. if err := uploader.CreateComments(ctx, comments...); err != nil {
  410. return err
  411. }
  412. if isEnd {
  413. break
  414. }
  415. }
  416. }
  417. return uploader.Finish(ctx)
  418. }
  419. // Init migrations service
  420. func Init() error {
  421. // TODO: maybe we can deprecate these legacy ALLOWED_DOMAINS/ALLOW_LOCALNETWORKS/BLOCKED_DOMAINS, use ALLOWED_HOST_LIST/BLOCKED_HOST_LIST instead
  422. blockList = hostmatcher.ParseSimpleMatchList("migrations.BLOCKED_DOMAINS", setting.Migrations.BlockedDomains)
  423. allowList = hostmatcher.ParseSimpleMatchList("migrations.ALLOWED_DOMAINS/ALLOW_LOCALNETWORKS", setting.Migrations.AllowedDomains)
  424. if allowList.IsEmpty() {
  425. // the default policy is that migration module can access external hosts
  426. allowList.AppendBuiltin(hostmatcher.MatchBuiltinExternal)
  427. }
  428. if setting.Migrations.AllowLocalNetworks {
  429. allowList.AppendBuiltin(hostmatcher.MatchBuiltinPrivate)
  430. allowList.AppendBuiltin(hostmatcher.MatchBuiltinLoopback)
  431. }
  432. // TODO: at the moment, if ALLOW_LOCALNETWORKS=false, ALLOWED_DOMAINS=domain.com, and domain.com has IP 127.0.0.1, then it's still allowed.
  433. // if we want to block such case, the private&loopback should be added to the blockList when ALLOW_LOCALNETWORKS=false
  434. return nil
  435. }