 5842a55b31
			
		
	
	
	
	
	5842a55b31* Move login related structs and functions to models/login * Fix test * Fix lint * Fix lint * Fix lint of windows * Fix lint * Fix test * Fix test * Only load necessary fixtures when preparing unit tests envs * Fix lint * Fix test * Fix test * Fix error log * Fix error log * Fix error log * remove unnecessary change * fix error log * merge main branch
		
			
				
	
	
		
			286 lines
		
	
	
	
		
			8.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			286 lines
		
	
	
	
		
			8.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2017 The Gitea Authors. All rights reserved.
 | |
| // Use of this source code is governed by a MIT-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package user
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 
 | |
| 	"code.gitea.io/gitea/models"
 | |
| 	"code.gitea.io/gitea/models/db"
 | |
| 	"code.gitea.io/gitea/modules/context"
 | |
| 	"code.gitea.io/gitea/modules/convert"
 | |
| 	api "code.gitea.io/gitea/modules/structs"
 | |
| 	"code.gitea.io/gitea/modules/web"
 | |
| 	"code.gitea.io/gitea/routers/api/v1/utils"
 | |
| )
 | |
| 
 | |
| func listGPGKeys(ctx *context.APIContext, uid int64, listOptions db.ListOptions) {
 | |
| 	keys, err := models.ListGPGKeys(uid, listOptions)
 | |
| 	if err != nil {
 | |
| 		ctx.Error(http.StatusInternalServerError, "ListGPGKeys", err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	apiKeys := make([]*api.GPGKey, len(keys))
 | |
| 	for i := range keys {
 | |
| 		apiKeys[i] = convert.ToGPGKey(keys[i])
 | |
| 	}
 | |
| 
 | |
| 	total, err := models.CountUserGPGKeys(uid)
 | |
| 	if err != nil {
 | |
| 		ctx.InternalServerError(err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	ctx.SetTotalCountHeader(total)
 | |
| 	ctx.JSON(http.StatusOK, &apiKeys)
 | |
| }
 | |
| 
 | |
| //ListGPGKeys get the GPG key list of a user
 | |
| func ListGPGKeys(ctx *context.APIContext) {
 | |
| 	// swagger:operation GET /users/{username}/gpg_keys user userListGPGKeys
 | |
| 	// ---
 | |
| 	// summary: List the given user's GPG keys
 | |
| 	// produces:
 | |
| 	// - application/json
 | |
| 	// parameters:
 | |
| 	// - name: username
 | |
| 	//   in: path
 | |
| 	//   description: username of user
 | |
| 	//   type: string
 | |
| 	//   required: true
 | |
| 	// - name: page
 | |
| 	//   in: query
 | |
| 	//   description: page number of results to return (1-based)
 | |
| 	//   type: integer
 | |
| 	// - name: limit
 | |
| 	//   in: query
 | |
| 	//   description: page size of results
 | |
| 	//   type: integer
 | |
| 	// responses:
 | |
| 	//   "200":
 | |
| 	//     "$ref": "#/responses/GPGKeyList"
 | |
| 
 | |
| 	user := GetUserByParams(ctx)
 | |
| 	if ctx.Written() {
 | |
| 		return
 | |
| 	}
 | |
| 	listGPGKeys(ctx, user.ID, utils.GetListOptions(ctx))
 | |
| }
 | |
| 
 | |
| //ListMyGPGKeys get the GPG key list of the authenticated user
 | |
| func ListMyGPGKeys(ctx *context.APIContext) {
 | |
| 	// swagger:operation GET /user/gpg_keys user userCurrentListGPGKeys
 | |
| 	// ---
 | |
| 	// summary: List the authenticated user's GPG keys
 | |
| 	// parameters:
 | |
| 	// - name: page
 | |
| 	//   in: query
 | |
| 	//   description: page number of results to return (1-based)
 | |
| 	//   type: integer
 | |
| 	// - name: limit
 | |
| 	//   in: query
 | |
| 	//   description: page size of results
 | |
| 	//   type: integer
 | |
| 	// produces:
 | |
| 	// - application/json
 | |
| 	// responses:
 | |
| 	//   "200":
 | |
| 	//     "$ref": "#/responses/GPGKeyList"
 | |
| 
 | |
| 	listGPGKeys(ctx, ctx.User.ID, utils.GetListOptions(ctx))
 | |
| }
 | |
| 
 | |
| //GetGPGKey get the GPG key based on a id
 | |
| func GetGPGKey(ctx *context.APIContext) {
 | |
| 	// swagger:operation GET /user/gpg_keys/{id} user userCurrentGetGPGKey
 | |
| 	// ---
 | |
| 	// summary: Get a GPG key
 | |
| 	// produces:
 | |
| 	// - application/json
 | |
| 	// parameters:
 | |
| 	// - name: id
 | |
| 	//   in: path
 | |
| 	//   description: id of key to get
 | |
| 	//   type: integer
 | |
| 	//   format: int64
 | |
| 	//   required: true
 | |
| 	// responses:
 | |
| 	//   "200":
 | |
| 	//     "$ref": "#/responses/GPGKey"
 | |
| 	//   "404":
 | |
| 	//     "$ref": "#/responses/notFound"
 | |
| 
 | |
| 	key, err := models.GetGPGKeyByID(ctx.ParamsInt64(":id"))
 | |
| 	if err != nil {
 | |
| 		if models.IsErrGPGKeyNotExist(err) {
 | |
| 			ctx.NotFound()
 | |
| 		} else {
 | |
| 			ctx.Error(http.StatusInternalServerError, "GetGPGKeyByID", err)
 | |
| 		}
 | |
| 		return
 | |
| 	}
 | |
| 	ctx.JSON(http.StatusOK, convert.ToGPGKey(key))
 | |
| }
 | |
| 
 | |
| // CreateUserGPGKey creates new GPG key to given user by ID.
 | |
| func CreateUserGPGKey(ctx *context.APIContext, form api.CreateGPGKeyOption, uid int64) {
 | |
| 	token := models.VerificationToken(ctx.User, 1)
 | |
| 	lastToken := models.VerificationToken(ctx.User, 0)
 | |
| 
 | |
| 	keys, err := models.AddGPGKey(uid, form.ArmoredKey, token, form.Signature)
 | |
| 	if err != nil && models.IsErrGPGInvalidTokenSignature(err) {
 | |
| 		keys, err = models.AddGPGKey(uid, form.ArmoredKey, lastToken, form.Signature)
 | |
| 	}
 | |
| 	if err != nil {
 | |
| 		HandleAddGPGKeyError(ctx, err, token)
 | |
| 		return
 | |
| 	}
 | |
| 	ctx.JSON(http.StatusCreated, convert.ToGPGKey(keys[0]))
 | |
| }
 | |
| 
 | |
| // GetVerificationToken returns the current token to be signed for this user
 | |
| func GetVerificationToken(ctx *context.APIContext) {
 | |
| 	// swagger:operation GET /user/gpg_key_token user getVerificationToken
 | |
| 	// ---
 | |
| 	// summary: Get a Token to verify
 | |
| 	// produces:
 | |
| 	// - text/plain
 | |
| 	// parameters:
 | |
| 	// responses:
 | |
| 	//   "200":
 | |
| 	//     "$ref": "#/responses/string"
 | |
| 	//   "404":
 | |
| 	//     "$ref": "#/responses/notFound"
 | |
| 
 | |
| 	token := models.VerificationToken(ctx.User, 1)
 | |
| 	ctx.PlainText(http.StatusOK, []byte(token))
 | |
| }
 | |
| 
 | |
| // VerifyUserGPGKey creates new GPG key to given user by ID.
 | |
| func VerifyUserGPGKey(ctx *context.APIContext) {
 | |
| 	// swagger:operation POST /user/gpg_key_verify user userVerifyGPGKey
 | |
| 	// ---
 | |
| 	// summary: Verify a GPG key
 | |
| 	// consumes:
 | |
| 	// - application/json
 | |
| 	// produces:
 | |
| 	// - application/json
 | |
| 	// responses:
 | |
| 	//   "201":
 | |
| 	//     "$ref": "#/responses/GPGKey"
 | |
| 	//   "404":
 | |
| 	//     "$ref": "#/responses/notFound"
 | |
| 	//   "422":
 | |
| 	//     "$ref": "#/responses/validationError"
 | |
| 
 | |
| 	form := web.GetForm(ctx).(*api.VerifyGPGKeyOption)
 | |
| 	token := models.VerificationToken(ctx.User, 1)
 | |
| 	lastToken := models.VerificationToken(ctx.User, 0)
 | |
| 
 | |
| 	_, err := models.VerifyGPGKey(ctx.User.ID, form.KeyID, token, form.Signature)
 | |
| 	if err != nil && models.IsErrGPGInvalidTokenSignature(err) {
 | |
| 		_, err = models.VerifyGPGKey(ctx.User.ID, form.KeyID, lastToken, form.Signature)
 | |
| 	}
 | |
| 
 | |
| 	if err != nil {
 | |
| 		if models.IsErrGPGInvalidTokenSignature(err) {
 | |
| 			ctx.Error(http.StatusUnprocessableEntity, "GPGInvalidSignature", fmt.Sprintf("The provided GPG key, signature and token do not match or token is out of date. Provide a valid signature for the token: %s", token))
 | |
| 			return
 | |
| 		}
 | |
| 		ctx.Error(http.StatusInternalServerError, "VerifyUserGPGKey", err)
 | |
| 	}
 | |
| 
 | |
| 	key, err := models.GetGPGKeysByKeyID(form.KeyID)
 | |
| 	if err != nil {
 | |
| 		if models.IsErrGPGKeyNotExist(err) {
 | |
| 			ctx.NotFound()
 | |
| 		} else {
 | |
| 			ctx.Error(http.StatusInternalServerError, "GetGPGKeysByKeyID", err)
 | |
| 		}
 | |
| 		return
 | |
| 	}
 | |
| 	ctx.JSON(http.StatusOK, convert.ToGPGKey(key[0]))
 | |
| }
 | |
| 
 | |
| // swagger:parameters userCurrentPostGPGKey
 | |
| type swaggerUserCurrentPostGPGKey struct {
 | |
| 	// in:body
 | |
| 	Form api.CreateGPGKeyOption
 | |
| }
 | |
| 
 | |
| //CreateGPGKey create a GPG key belonging to the authenticated user
 | |
| func CreateGPGKey(ctx *context.APIContext) {
 | |
| 	// swagger:operation POST /user/gpg_keys user userCurrentPostGPGKey
 | |
| 	// ---
 | |
| 	// summary: Create a GPG key
 | |
| 	// consumes:
 | |
| 	// - application/json
 | |
| 	// produces:
 | |
| 	// - application/json
 | |
| 	// responses:
 | |
| 	//   "201":
 | |
| 	//     "$ref": "#/responses/GPGKey"
 | |
| 	//   "404":
 | |
| 	//     "$ref": "#/responses/notFound"
 | |
| 	//   "422":
 | |
| 	//     "$ref": "#/responses/validationError"
 | |
| 
 | |
| 	form := web.GetForm(ctx).(*api.CreateGPGKeyOption)
 | |
| 	CreateUserGPGKey(ctx, *form, ctx.User.ID)
 | |
| }
 | |
| 
 | |
| //DeleteGPGKey remove a GPG key belonging to the authenticated user
 | |
| func DeleteGPGKey(ctx *context.APIContext) {
 | |
| 	// swagger:operation DELETE /user/gpg_keys/{id} user userCurrentDeleteGPGKey
 | |
| 	// ---
 | |
| 	// summary: Remove a GPG key
 | |
| 	// produces:
 | |
| 	// - application/json
 | |
| 	// parameters:
 | |
| 	// - name: id
 | |
| 	//   in: path
 | |
| 	//   description: id of key to delete
 | |
| 	//   type: integer
 | |
| 	//   format: int64
 | |
| 	//   required: true
 | |
| 	// responses:
 | |
| 	//   "204":
 | |
| 	//     "$ref": "#/responses/empty"
 | |
| 	//   "403":
 | |
| 	//     "$ref": "#/responses/forbidden"
 | |
| 	//   "404":
 | |
| 	//     "$ref": "#/responses/notFound"
 | |
| 
 | |
| 	if err := models.DeleteGPGKey(ctx.User, ctx.ParamsInt64(":id")); err != nil {
 | |
| 		if models.IsErrGPGKeyAccessDenied(err) {
 | |
| 			ctx.Error(http.StatusForbidden, "", "You do not have access to this key")
 | |
| 		} else {
 | |
| 			ctx.Error(http.StatusInternalServerError, "DeleteGPGKey", err)
 | |
| 		}
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	ctx.Status(http.StatusNoContent)
 | |
| }
 | |
| 
 | |
| // HandleAddGPGKeyError handle add GPGKey error
 | |
| func HandleAddGPGKeyError(ctx *context.APIContext, err error, token string) {
 | |
| 	switch {
 | |
| 	case models.IsErrGPGKeyAccessDenied(err):
 | |
| 		ctx.Error(http.StatusUnprocessableEntity, "GPGKeyAccessDenied", "You do not have access to this GPG key")
 | |
| 	case models.IsErrGPGKeyIDAlreadyUsed(err):
 | |
| 		ctx.Error(http.StatusUnprocessableEntity, "GPGKeyIDAlreadyUsed", "A key with the same id already exists")
 | |
| 	case models.IsErrGPGKeyParsing(err):
 | |
| 		ctx.Error(http.StatusUnprocessableEntity, "GPGKeyParsing", err)
 | |
| 	case models.IsErrGPGNoEmailFound(err):
 | |
| 		ctx.Error(http.StatusNotFound, "GPGNoEmailFound", fmt.Sprintf("None of the emails attached to the GPG key could be found. It may still be added if you provide a valid signature for the token: %s", token))
 | |
| 	case models.IsErrGPGInvalidTokenSignature(err):
 | |
| 		ctx.Error(http.StatusUnprocessableEntity, "GPGInvalidSignature", fmt.Sprintf("The provided GPG key, signature and token do not match or token is out of date. Provide a valid signature for the token: %s", token))
 | |
| 	default:
 | |
| 		ctx.Error(http.StatusInternalServerError, "AddGPGKey", err)
 | |
| 	}
 | |
| }
 |