gitea/routers/api/packages/arch/arch.go

249 lines
6.4 KiB
Go
Raw Normal View History

2023-06-20 20:08:48 +00:00
// Copyright 2023 The Gitea Authors. All rights reserved.
// SPDX-License-Identifier: MIT
package arch
import (
"bytes"
2023-06-20 20:08:48 +00:00
"encoding/hex"
"io"
"net/http"
"strings"
"time"
2023-06-20 20:08:48 +00:00
"code.gitea.io/gitea/modules/context"
arch_module "code.gitea.io/gitea/modules/packages/arch"
"code.gitea.io/gitea/modules/setting"
"code.gitea.io/gitea/routers/api/packages/helper"
arch_service "code.gitea.io/gitea/services/packages/arch"
2023-06-20 20:08:48 +00:00
)
// Push new package to arch package registry.
func Push(ctx *context.Context) {
var (
owner = ctx.Params("username")
filename = ctx.Req.Header.Get("filename")
email = ctx.Req.Header.Get("email")
distro = ctx.Req.Header.Get("distro")
sendtime = ctx.Req.Header.Get("time")
pkgsign = ctx.Req.Header.Get("pkgsign")
metasign = ctx.Req.Header.Get("metasign")
)
2023-06-20 20:08:48 +00:00
// Decoding package signature.
sigdata, err := hex.DecodeString(pkgsign)
2023-06-20 20:08:48 +00:00
if err != nil {
apiError(ctx, http.StatusBadRequest, err)
return
}
// Read package to memory for signature validation.
2023-06-20 20:08:48 +00:00
pkgdata, err := io.ReadAll(ctx.Req.Body)
if err != nil {
apiError(ctx, http.StatusInternalServerError, err)
return
}
defer ctx.Req.Body.Close()
// Get user and organization owning arch package.
user, org, err := arch_service.IdentifyOwner(ctx, owner, email)
2023-06-20 20:08:48 +00:00
if err != nil {
apiError(ctx, http.StatusUnauthorized, err)
2023-06-20 20:08:48 +00:00
return
}
// Decoding time when message was created.
t, err := time.Parse(time.RFC3339, sendtime)
if err != nil {
apiError(ctx, http.StatusBadRequest, err)
return
}
if time.Since(t) > time.Hour {
apiError(ctx, http.StatusUnauthorized, "outdated message")
return
}
// Decoding signature related to metadata.
msigdata, err := hex.DecodeString(metasign)
if err != nil {
apiError(ctx, http.StatusBadRequest, err)
return
}
// Parse metadata contained in arch package archive.
md, err := arch_module.EjectMetadata(filename, distro, setting.Domain, pkgdata)
if err != nil {
apiError(ctx, http.StatusBadRequest, err)
return
}
// Validating metadata signature, to ensure that operation push operation
// is initiated by original package owner.
sendmetadata := []byte(owner + md.Name + sendtime)
err = arch_service.ValidateSignature(ctx, sendmetadata, msigdata, user)
if err != nil {
apiError(ctx, http.StatusUnauthorized, err)
return
}
// Validate package signature with any of user's GnuPG keys.
err = arch_service.ValidateSignature(ctx, pkgdata, sigdata, user)
2023-06-20 20:08:48 +00:00
if err != nil {
apiError(ctx, http.StatusUnauthorized, err)
2023-06-20 20:08:48 +00:00
return
}
// Save file related to arch package.
pkgid, err := arch_service.SaveFile(ctx, &arch_service.SaveFileParams{
Organization: org,
User: user,
Metadata: md,
Filename: filename,
Data: pkgdata,
Distro: distro,
})
2023-06-20 20:08:48 +00:00
if err != nil {
apiError(ctx, http.StatusInternalServerError, err)
2023-06-20 20:08:48 +00:00
return
}
// Save file related to arch package signature.
_, err = arch_service.SaveFile(ctx, &arch_service.SaveFileParams{
Organization: org,
User: user,
Metadata: md,
Data: sigdata,
Filename: filename + ".sig",
Distro: distro,
})
2023-06-20 20:08:48 +00:00
if err != nil {
apiError(ctx, http.StatusInternalServerError, err)
2023-06-20 20:08:48 +00:00
return
}
// Add existing architectures and distros to current metadata.
err = arch_service.UpdateMetadata(ctx, &arch_service.UpdateMetadataParameters{
User: user,
Md: md,
})
if err != nil {
apiError(ctx, http.StatusUnauthorized, err)
return
}
// Automatically connect repository for provided package if name matched.
err = arch_service.RepositoryAutoconnect(ctx, owner, md.Name, pkgid)
2023-06-20 20:08:48 +00:00
if err != nil {
apiError(ctx, http.StatusInternalServerError, err)
return
}
ctx.Status(http.StatusOK)
}
// Get file from arch package registry.
func Get(ctx *context.Context) {
var (
file = ctx.Params("file")
owner = ctx.Params("username")
distro = ctx.Params("distro")
arch = ctx.Params("arch")
)
2023-06-20 20:08:48 +00:00
// Packages are stored in different way from pacman databases, and loaded
// with LoadPackageFile function.
if strings.HasSuffix(file, "tar.zst") || strings.HasSuffix(file, "zst.sig") {
pkgdata, err := arch_service.LoadFile(ctx, distro, file)
2023-06-20 20:08:48 +00:00
if err != nil {
apiError(ctx, http.StatusNotFound, err)
2023-06-20 20:08:48 +00:00
return
}
ctx.ServeContent(bytes.NewReader(pkgdata), &context.ServeHeaderOptions{
Filename: file,
CacheDuration: time.Minute * 5,
})
2023-06-20 20:08:48 +00:00
return
}
// Pacman databases is not stored in gitea's storage, it is created for
// incoming request and cached.
if strings.HasSuffix(file, ".db.tar.gz") || strings.HasSuffix(file, ".db") {
db, err := arch_service.CreatePacmanDb(ctx, owner, arch, distro)
if err != nil {
apiError(ctx, http.StatusInternalServerError, err)
return
}
ctx.ServeContent(bytes.NewReader(db), &context.ServeHeaderOptions{
Filename: file,
CacheDuration: time.Minute * 5,
})
return
2023-06-20 20:08:48 +00:00
}
ctx.Resp.WriteHeader(http.StatusNotFound)
2023-06-20 20:08:48 +00:00
}
2023-06-25 14:45:16 +00:00
// Remove specific package version, related files and pacman database entry.
func Remove(ctx *context.Context) {
var (
owner = ctx.Params("username")
email = ctx.Req.Header.Get("email")
target = ctx.Req.Header.Get("target")
stime = ctx.Req.Header.Get("time")
version = ctx.Req.Header.Get("version")
)
// Parse sent time and check if it is within last minute.
t, err := time.Parse(time.RFC3339, stime)
if err != nil {
apiError(ctx, http.StatusBadRequest, err)
return
}
if time.Since(t) > time.Minute {
apiError(ctx, http.StatusUnauthorized, "outdated message")
return
}
// Get user owning the package.
user, org, err := arch_service.IdentifyOwner(ctx, owner, email)
if err != nil {
apiError(ctx, http.StatusUnauthorized, err)
return
}
// Read signature data from request body.
sigdata, err := io.ReadAll(ctx.Req.Body)
if err != nil {
apiError(ctx, http.StatusInternalServerError, err)
return
}
defer ctx.Req.Body.Close()
// Validate package signature with any of user's GnuPG keys.
mesdata := []byte(owner + target + stime)
err = arch_service.ValidateSignature(ctx, mesdata, sigdata, user)
if err != nil {
apiError(ctx, http.StatusUnauthorized, err)
return
}
// Remove package files and pacman database entry.
err = arch_service.RemovePackage(ctx, org.AsUser(), target, version)
if err != nil {
apiError(ctx, http.StatusInternalServerError, err)
return
}
ctx.Resp.WriteHeader(http.StatusOK)
}
2023-06-20 20:08:48 +00:00
func apiError(ctx *context.Context, status int, obj interface{}) {
helper.LogAndProcessError(ctx, status, obj, func(message string) {
ctx.PlainText(status, message)
})
}