2019-02-12 13:07:31 +00:00
|
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
2022-11-27 18:20:29 +00:00
|
|
|
// SPDX-License-Identifier: MIT
|
2019-02-12 13:07:31 +00:00
|
|
|
|
2021-11-24 07:56:24 +00:00
|
|
|
package files
|
2019-02-12 13:07:31 +00:00
|
|
|
|
|
|
|
import (
|
2022-01-19 23:26:57 +00:00
|
|
|
"context"
|
2019-02-12 13:07:31 +00:00
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"path"
|
|
|
|
"strings"
|
|
|
|
|
2023-01-09 03:50:54 +00:00
|
|
|
"code.gitea.io/gitea/models/db"
|
2022-06-12 15:51:54 +00:00
|
|
|
git_model "code.gitea.io/gitea/models/git"
|
2021-12-10 01:27:50 +00:00
|
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
2021-11-24 09:49:20 +00:00
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2021-03-01 12:14:17 +00:00
|
|
|
"code.gitea.io/gitea/modules/git"
|
2019-02-12 13:07:31 +00:00
|
|
|
"code.gitea.io/gitea/modules/lfs"
|
|
|
|
"code.gitea.io/gitea/modules/setting"
|
|
|
|
)
|
|
|
|
|
|
|
|
// UploadRepoFileOptions contains the uploaded repository file options
|
|
|
|
type UploadRepoFileOptions struct {
|
|
|
|
LastCommitID string
|
|
|
|
OldBranch string
|
|
|
|
NewBranch string
|
|
|
|
TreePath string
|
|
|
|
Message string
|
|
|
|
Files []string // In UUID format.
|
2021-01-29 08:57:45 +00:00
|
|
|
Signoff bool
|
2019-02-12 13:07:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type uploadInfo struct {
|
2022-08-25 02:31:57 +00:00
|
|
|
upload *repo_model.Upload
|
2022-06-12 15:51:54 +00:00
|
|
|
lfsMetaObject *git_model.LFSMetaObject
|
2019-02-12 13:07:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func cleanUpAfterFailure(infos *[]uploadInfo, t *TemporaryUploadRepository, original error) error {
|
|
|
|
for _, info := range *infos {
|
|
|
|
if info.lfsMetaObject == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if !info.lfsMetaObject.Existing {
|
2023-01-09 03:50:54 +00:00
|
|
|
if _, err := git_model.RemoveLFSMetaObjectByOid(db.DefaultContext, t.repo.ID, info.lfsMetaObject.Oid); err != nil {
|
2022-10-24 19:29:17 +00:00
|
|
|
original = fmt.Errorf("%w, %v", original, err) // We wrap the original error - as this is the underlying error that required the fallback
|
2019-02-12 13:07:31 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return original
|
|
|
|
}
|
|
|
|
|
|
|
|
// UploadRepoFiles uploads files to the given repository
|
2022-01-19 23:26:57 +00:00
|
|
|
func UploadRepoFiles(ctx context.Context, repo *repo_model.Repository, doer *user_model.User, opts *UploadRepoFileOptions) error {
|
2019-02-12 13:07:31 +00:00
|
|
|
if len(opts.Files) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-08-25 02:31:57 +00:00
|
|
|
uploads, err := repo_model.GetUploadsByUUIDs(opts.Files)
|
2019-02-12 13:07:31 +00:00
|
|
|
if err != nil {
|
2022-10-24 19:29:17 +00:00
|
|
|
return fmt.Errorf("GetUploadsByUUIDs [uuids: %v]: %w", opts.Files, err)
|
2019-02-12 13:07:31 +00:00
|
|
|
}
|
|
|
|
|
2019-11-02 07:37:05 +00:00
|
|
|
names := make([]string, len(uploads))
|
|
|
|
infos := make([]uploadInfo, len(uploads))
|
|
|
|
for i, upload := range uploads {
|
|
|
|
// Check file is not lfs locked, will return nil if lock setting not enabled
|
|
|
|
filepath := path.Join(opts.TreePath, upload.Name)
|
2023-01-09 03:50:54 +00:00
|
|
|
lfsLock, err := git_model.GetTreePathLock(ctx, repo.ID, filepath)
|
2019-11-02 07:37:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if lfsLock != nil && lfsLock.OwnerID != doer.ID {
|
2022-12-03 02:48:26 +00:00
|
|
|
u, err := user_model.GetUserByID(ctx, lfsLock.OwnerID)
|
2021-11-24 09:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-06-12 15:51:54 +00:00
|
|
|
return git_model.ErrLFSFileLocked{RepoID: repo.ID, Path: filepath, UserName: u.Name}
|
2019-11-02 07:37:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
names[i] = upload.Name
|
|
|
|
infos[i] = uploadInfo{upload: upload}
|
|
|
|
}
|
|
|
|
|
2022-01-19 23:26:57 +00:00
|
|
|
t, err := NewTemporaryUploadRepository(ctx, repo)
|
2019-02-12 13:07:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-06-12 19:41:28 +00:00
|
|
|
defer t.Close()
|
2019-02-12 13:07:31 +00:00
|
|
|
if err := t.Clone(opts.OldBranch); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := t.SetDefaultIndex(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-10-12 00:13:27 +00:00
|
|
|
var filename2attribute2info map[string]map[string]string
|
|
|
|
if setting.LFS.StartServer {
|
2021-03-01 12:14:17 +00:00
|
|
|
filename2attribute2info, err = t.gitRepo.CheckAttribute(git.CheckAttributeOpts{
|
Refactor git command package to improve security and maintainability (#22678)
This PR follows #21535 (and replace #22592)
## Review without space diff
https://github.com/go-gitea/gitea/pull/22678/files?diff=split&w=1
## Purpose of this PR
1. Make git module command completely safe (risky user inputs won't be
passed as argument option anymore)
2. Avoid low-level mistakes like
https://github.com/go-gitea/gitea/pull/22098#discussion_r1045234918
3. Remove deprecated and dirty `CmdArgCheck` function, hide the `CmdArg`
type
4. Simplify code when using git command
## The main idea of this PR
* Move the `git.CmdArg` to the `internal` package, then no other package
except `git` could use it. Then developers could never do
`AddArguments(git.CmdArg(userInput))` any more.
* Introduce `git.ToTrustedCmdArgs`, it's for user-provided and already
trusted arguments. It's only used in a few cases, for example: use git
arguments from config file, help unit test with some arguments.
* Introduce `AddOptionValues` and `AddOptionFormat`, they make code more
clear and simple:
* Before: `AddArguments("-m").AddDynamicArguments(message)`
* After: `AddOptionValues("-m", message)`
* -
* Before: `AddArguments(git.CmdArg(fmt.Sprintf("--author='%s <%s>'",
sig.Name, sig.Email)))`
* After: `AddOptionFormat("--author='%s <%s>'", sig.Name, sig.Email)`
## FAQ
### Why these changes were not done in #21535 ?
#21535 is mainly a search&replace, it did its best to not change too
much logic.
Making the framework better needs a lot of changes, so this separate PR
is needed as the second step.
### The naming of `AddOptionXxx`
According to git's manual, the `--xxx` part is called `option`.
### How can it guarantee that `internal.CmdArg` won't be not misused?
Go's specification guarantees that. Trying to access other package's
internal package causes compilation error.
And, `golangci-lint` also denies the git/internal package. Only the
`git/command.go` can use it carefully.
### There is still a `ToTrustedCmdArgs`, will it still allow developers
to make mistakes and pass untrusted arguments?
Generally speaking, no. Because when using `ToTrustedCmdArgs`, the code
will be very complex (see the changes for examples). Then developers and
reviewers can know that something might be unreasonable.
### Why there was a `CmdArgCheck` and why it's removed?
At the moment of #21535, to reduce unnecessary changes, `CmdArgCheck`
was introduced as a hacky patch. Now, almost all code could be written
as `cmd := NewCommand(); cmd.AddXxx(...)`, then there is no need for
`CmdArgCheck` anymore.
### Why many codes for `signArg == ""` is deleted?
Because in the old code, `signArg` could never be empty string, it's
either `-S[key-id]` or `--no-gpg-sign`. So the `signArg == ""` is just
dead code.
---------
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
2023-02-04 02:30:43 +00:00
|
|
|
Attributes: []string{"filter"},
|
2021-03-01 12:14:17 +00:00
|
|
|
Filenames: names,
|
2022-01-18 07:44:30 +00:00
|
|
|
CachedOnly: true,
|
2021-03-01 12:14:17 +00:00
|
|
|
})
|
2019-10-12 00:13:27 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-02-12 13:07:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Copy uploaded files into repository.
|
2021-03-20 16:30:29 +00:00
|
|
|
for i := range infos {
|
|
|
|
if err := copyUploadedLFSFileIntoRepository(&infos[i], filename2attribute2info, t, opts.TreePath); err != nil {
|
2019-02-12 13:07:31 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now write the tree
|
|
|
|
treeHash, err := t.WriteTree()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-04-17 16:06:35 +00:00
|
|
|
// make author and committer the doer
|
|
|
|
author := doer
|
|
|
|
committer := doer
|
|
|
|
|
2019-02-12 13:07:31 +00:00
|
|
|
// Now commit the tree
|
2022-03-28 19:48:41 +00:00
|
|
|
commitHash, err := t.CommitTree(opts.LastCommitID, author, committer, treeHash, opts.Message, opts.Signoff)
|
2019-02-12 13:07:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now deal with LFS objects
|
2021-03-20 16:30:29 +00:00
|
|
|
for i := range infos {
|
|
|
|
if infos[i].lfsMetaObject == nil {
|
2019-02-12 13:07:31 +00:00
|
|
|
continue
|
|
|
|
}
|
2023-01-09 03:50:54 +00:00
|
|
|
infos[i].lfsMetaObject, err = git_model.NewLFSMetaObject(ctx, infos[i].lfsMetaObject)
|
2019-02-12 13:07:31 +00:00
|
|
|
if err != nil {
|
|
|
|
// OK Now we need to cleanup
|
|
|
|
return cleanUpAfterFailure(&infos, t, err)
|
|
|
|
}
|
|
|
|
// Don't move the files yet - we need to ensure that
|
|
|
|
// everything can be inserted first
|
|
|
|
}
|
|
|
|
|
|
|
|
// OK now we can insert the data into the store - there's no way to clean up the store
|
|
|
|
// once it's in there, it's in there.
|
2021-04-08 22:25:57 +00:00
|
|
|
contentStore := lfs.NewContentStore()
|
2021-03-19 22:49:29 +00:00
|
|
|
for _, info := range infos {
|
|
|
|
if err := uploadToLFSContentStore(info, contentStore); err != nil {
|
2020-09-08 15:45:10 +00:00
|
|
|
return cleanUpAfterFailure(&infos, t, err)
|
|
|
|
}
|
2019-02-12 13:07:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Then push this tree to NewBranch
|
|
|
|
if err := t.Push(doer, commitHash, opts.NewBranch); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-08-25 02:31:57 +00:00
|
|
|
return repo_model.DeleteUploads(uploads...)
|
2019-02-12 13:07:31 +00:00
|
|
|
}
|
2021-03-19 22:49:29 +00:00
|
|
|
|
2021-03-20 16:30:29 +00:00
|
|
|
func copyUploadedLFSFileIntoRepository(info *uploadInfo, filename2attribute2info map[string]map[string]string, t *TemporaryUploadRepository, treePath string) error {
|
|
|
|
file, err := os.Open(info.upload.LocalPath())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer file.Close()
|
|
|
|
|
|
|
|
var objectHash string
|
|
|
|
if setting.LFS.StartServer && filename2attribute2info[info.upload.Name] != nil && filename2attribute2info[info.upload.Name]["filter"] == "lfs" {
|
|
|
|
// Handle LFS
|
|
|
|
// FIXME: Inefficient! this should probably happen in models.Upload
|
2021-04-08 22:25:57 +00:00
|
|
|
pointer, err := lfs.GeneratePointer(file)
|
2021-03-20 16:30:29 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-06-12 15:51:54 +00:00
|
|
|
info.lfsMetaObject = &git_model.LFSMetaObject{Pointer: pointer, RepositoryID: t.repo.ID}
|
2021-03-20 16:30:29 +00:00
|
|
|
|
2021-04-08 22:25:57 +00:00
|
|
|
if objectHash, err = t.HashObject(strings.NewReader(pointer.StringContent())); err != nil {
|
2021-03-20 16:30:29 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else if objectHash, err = t.HashObject(file); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add the object to the index
|
|
|
|
return t.AddObjectToIndex("100644", objectHash, path.Join(treePath, info.upload.Name))
|
|
|
|
}
|
|
|
|
|
2021-03-19 22:49:29 +00:00
|
|
|
func uploadToLFSContentStore(info uploadInfo, contentStore *lfs.ContentStore) error {
|
|
|
|
if info.lfsMetaObject == nil {
|
|
|
|
return nil
|
|
|
|
}
|
2021-04-08 22:25:57 +00:00
|
|
|
exist, err := contentStore.Exists(info.lfsMetaObject.Pointer)
|
2021-03-19 22:49:29 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if !exist {
|
|
|
|
file, err := os.Open(info.upload.LocalPath())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
defer file.Close()
|
|
|
|
// FIXME: Put regenerates the hash and copies the file over.
|
|
|
|
// I guess this strictly ensures the soundness of the store but this is inefficient.
|
2021-04-08 22:25:57 +00:00
|
|
|
if err := contentStore.Put(info.lfsMetaObject.Pointer, file); err != nil {
|
2021-03-19 22:49:29 +00:00
|
|
|
// OK Now we need to cleanup
|
|
|
|
// Can't clean up the store, once uploaded there they're there.
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|