return nil
}
+// checkKeyContent onlys checks if key content has been used as public key,
+// it is OK to use same key as deploy key for multiple repositories/users.
func checkKeyContent(content string) error {
- // Same key can only be added once.
- has, err := x.Where("content=?", content).Get(new(PublicKey))
+ has, err := x.Get(&PublicKey{
+ Content: content,
+ Type: KEY_TYPE_USER,
+ })
if err != nil {
return err
} else if has {
return err
}
-func deletePublicKey(e *xorm.Session, key *PublicKey) error {
+func deletePublicKey(e *xorm.Session, keyID int64) error {
sshOpLocker.Lock()
defer sshOpLocker.Unlock()
+ key := &PublicKey{ID: keyID}
has, err := e.Get(key)
if err != nil {
return err
return nil
}
- if _, err = e.Id(key.ID).Delete(key); err != nil {
+ if _, err = e.Id(key.ID).Delete(new(PublicKey)); err != nil {
return err
}
// DeletePublicKey deletes SSH key information both in database and authorized_keys file.
func DeletePublicKey(id int64) (err error) {
- key := &PublicKey{ID: id}
- has, err := x.Id(key.ID).Get(key)
+ has, err := x.Id(id).Get(new(PublicKey))
if err != nil {
return err
} else if !has {
return err
}
- if err = deletePublicKey(sess, key); err != nil {
+ if err = deletePublicKey(sess, id); err != nil {
return err
}
return err
}
- if _, err = sess.Id(key.ID).Delete(key); err != nil {
+ if _, err = sess.Id(key.ID).Delete(new(DeployKey)); err != nil {
return fmt.Errorf("delete deploy key[%d]: %v", key.ID, err)
}
if err != nil {
return err
} else if !has {
- if err = deletePublicKey(sess, &PublicKey{ID: key.KeyID}); err != nil {
+ if err = deletePublicKey(sess, key.KeyID); err != nil {
return err
}
}
return fmt.Errorf("get all public keys: %v", err)
}
for _, key := range keys {
- if err = deletePublicKey(sess, key); err != nil {
+ if err = deletePublicKey(sess, key.ID); err != nil {
return fmt.Errorf("deletePublicKey: %v", err)
}
}