You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

migrate.go 13KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484
  1. // Copyright 2019 The Gitea Authors. All rights reserved.
  2. // Copyright 2018 Jonas Franz. All rights reserved.
  3. // Use of this source code is governed by a MIT-style
  4. // license that can be found in the LICENSE file.
  5. package migrations
  6. import (
  7. "context"
  8. "fmt"
  9. "net"
  10. "net/url"
  11. "path/filepath"
  12. "strings"
  13. "code.gitea.io/gitea/models"
  14. admin_model "code.gitea.io/gitea/models/admin"
  15. "code.gitea.io/gitea/modules/hostmatcher"
  16. "code.gitea.io/gitea/modules/log"
  17. base "code.gitea.io/gitea/modules/migration"
  18. "code.gitea.io/gitea/modules/setting"
  19. "code.gitea.io/gitea/modules/util"
  20. )
  21. // MigrateOptions is equal to base.MigrateOptions
  22. type MigrateOptions = base.MigrateOptions
  23. var (
  24. factories []base.DownloaderFactory
  25. allowList *hostmatcher.HostMatchList
  26. blockList *hostmatcher.HostMatchList
  27. )
  28. // RegisterDownloaderFactory registers a downloader factory
  29. func RegisterDownloaderFactory(factory base.DownloaderFactory) {
  30. factories = append(factories, factory)
  31. }
  32. // IsMigrateURLAllowed checks if an URL is allowed to be migrated from
  33. func IsMigrateURLAllowed(remoteURL string, doer *models.User) error {
  34. // Remote address can be HTTP/HTTPS/Git URL or local path.
  35. u, err := url.Parse(remoteURL)
  36. if err != nil {
  37. return &models.ErrInvalidCloneAddr{IsURLError: true}
  38. }
  39. if u.Scheme == "file" || u.Scheme == "" {
  40. if !doer.CanImportLocal() {
  41. return &models.ErrInvalidCloneAddr{Host: "<LOCAL_FILESYSTEM>", IsPermissionDenied: true, LocalPath: true}
  42. }
  43. isAbs := filepath.IsAbs(u.Host + u.Path)
  44. if !isAbs {
  45. return &models.ErrInvalidCloneAddr{Host: "<LOCAL_FILESYSTEM>", IsInvalidPath: true, LocalPath: true}
  46. }
  47. isDir, err := util.IsDir(u.Host + u.Path)
  48. if err != nil {
  49. log.Error("Unable to check if %s is a directory: %v", u.Host+u.Path, err)
  50. return err
  51. }
  52. if !isDir {
  53. return &models.ErrInvalidCloneAddr{Host: "<LOCAL_FILESYSTEM>", IsInvalidPath: true, LocalPath: true}
  54. }
  55. return nil
  56. }
  57. if u.Scheme == "git" && u.Port() != "" && (strings.Contains(remoteURL, "%0d") || strings.Contains(remoteURL, "%0a")) {
  58. return &models.ErrInvalidCloneAddr{Host: u.Host, IsURLError: true}
  59. }
  60. if u.Opaque != "" || u.Scheme != "" && u.Scheme != "http" && u.Scheme != "https" && u.Scheme != "git" {
  61. return &models.ErrInvalidCloneAddr{Host: u.Host, IsProtocolInvalid: true, IsPermissionDenied: true, IsURLError: true}
  62. }
  63. hostName, _, err := net.SplitHostPort(u.Host)
  64. if err != nil {
  65. // u.Host can be "host" or "host:port"
  66. err = nil //nolint
  67. hostName = u.Host
  68. }
  69. addrList, err := net.LookupIP(hostName)
  70. if err != nil {
  71. return &models.ErrInvalidCloneAddr{Host: u.Host, NotResolvedIP: true}
  72. }
  73. var ipAllowed bool
  74. var ipBlocked bool
  75. for _, addr := range addrList {
  76. ipAllowed = ipAllowed || allowList.MatchIPAddr(addr)
  77. ipBlocked = ipBlocked || blockList.MatchIPAddr(addr)
  78. }
  79. var blockedError error
  80. if blockList.MatchHostName(hostName) || ipBlocked {
  81. blockedError = &models.ErrInvalidCloneAddr{Host: u.Host, IsPermissionDenied: true}
  82. }
  83. // if we have an allow-list, check the allow-list first
  84. if !allowList.IsEmpty() {
  85. if !allowList.MatchHostName(hostName) && !ipAllowed {
  86. return &models.ErrInvalidCloneAddr{Host: u.Host, IsPermissionDenied: true}
  87. }
  88. }
  89. // otherwise, we always follow the blocked list
  90. return blockedError
  91. }
  92. // MigrateRepository migrate repository according MigrateOptions
  93. func MigrateRepository(ctx context.Context, doer *models.User, ownerName string, opts base.MigrateOptions, messenger base.Messenger) (*models.Repository, error) {
  94. err := IsMigrateURLAllowed(opts.CloneAddr, doer)
  95. if err != nil {
  96. return nil, err
  97. }
  98. if opts.LFS && len(opts.LFSEndpoint) > 0 {
  99. err := IsMigrateURLAllowed(opts.LFSEndpoint, doer)
  100. if err != nil {
  101. return nil, err
  102. }
  103. }
  104. downloader, err := newDownloader(ctx, ownerName, opts)
  105. if err != nil {
  106. return nil, err
  107. }
  108. var uploader = NewGiteaLocalUploader(ctx, doer, ownerName, opts.RepoName)
  109. uploader.gitServiceType = opts.GitServiceType
  110. if err := migrateRepository(downloader, uploader, opts, messenger); err != nil {
  111. if err1 := uploader.Rollback(); err1 != nil {
  112. log.Error("rollback failed: %v", err1)
  113. }
  114. if err2 := admin_model.CreateRepositoryNotice(fmt.Sprintf("Migrate repository from %s failed: %v", opts.OriginalURL, err)); err2 != nil {
  115. log.Error("create respotiry notice failed: ", err2)
  116. }
  117. return nil, err
  118. }
  119. return uploader.repo, nil
  120. }
  121. func newDownloader(ctx context.Context, ownerName string, opts base.MigrateOptions) (base.Downloader, error) {
  122. var (
  123. downloader base.Downloader
  124. err error
  125. )
  126. for _, factory := range factories {
  127. if factory.GitServiceType() == opts.GitServiceType {
  128. downloader, err = factory.New(ctx, opts)
  129. if err != nil {
  130. return nil, err
  131. }
  132. break
  133. }
  134. }
  135. if downloader == nil {
  136. opts.Wiki = true
  137. opts.Milestones = false
  138. opts.Labels = false
  139. opts.Releases = false
  140. opts.Comments = false
  141. opts.Issues = false
  142. opts.PullRequests = false
  143. downloader = NewPlainGitDownloader(ownerName, opts.RepoName, opts.CloneAddr)
  144. log.Trace("Will migrate from git: %s", opts.OriginalURL)
  145. }
  146. if setting.Migrations.MaxAttempts > 1 {
  147. downloader = base.NewRetryDownloader(ctx, downloader, setting.Migrations.MaxAttempts, setting.Migrations.RetryBackoff)
  148. }
  149. return downloader, nil
  150. }
  151. // migrateRepository will download information and then upload it to Uploader, this is a simple
  152. // process for small repository. For a big repository, save all the data to disk
  153. // before upload is better
  154. func migrateRepository(downloader base.Downloader, uploader base.Uploader, opts base.MigrateOptions, messenger base.Messenger) error {
  155. if messenger == nil {
  156. messenger = base.NilMessenger
  157. }
  158. repo, err := downloader.GetRepoInfo()
  159. if err != nil {
  160. if !base.IsErrNotSupported(err) {
  161. return err
  162. }
  163. log.Info("migrating repo infos is not supported, ignored")
  164. }
  165. repo.IsPrivate = opts.Private
  166. repo.IsMirror = opts.Mirror
  167. if opts.Description != "" {
  168. repo.Description = opts.Description
  169. }
  170. if repo.CloneURL, err = downloader.FormatCloneURL(opts, repo.CloneURL); err != nil {
  171. return err
  172. }
  173. log.Trace("migrating git data from %s", repo.CloneURL)
  174. messenger("repo.migrate.migrating_git")
  175. if err = uploader.CreateRepo(repo, opts); err != nil {
  176. return err
  177. }
  178. defer uploader.Close()
  179. log.Trace("migrating topics")
  180. messenger("repo.migrate.migrating_topics")
  181. topics, err := downloader.GetTopics()
  182. if err != nil {
  183. if !base.IsErrNotSupported(err) {
  184. return err
  185. }
  186. log.Warn("migrating topics is not supported, ignored")
  187. }
  188. if len(topics) != 0 {
  189. if err = uploader.CreateTopics(topics...); err != nil {
  190. return err
  191. }
  192. }
  193. if opts.Milestones {
  194. log.Trace("migrating milestones")
  195. messenger("repo.migrate.migrating_milestones")
  196. milestones, err := downloader.GetMilestones()
  197. if err != nil {
  198. if !base.IsErrNotSupported(err) {
  199. return err
  200. }
  201. log.Warn("migrating milestones is not supported, ignored")
  202. }
  203. msBatchSize := uploader.MaxBatchInsertSize("milestone")
  204. for len(milestones) > 0 {
  205. if len(milestones) < msBatchSize {
  206. msBatchSize = len(milestones)
  207. }
  208. if err := uploader.CreateMilestones(milestones...); err != nil {
  209. return err
  210. }
  211. milestones = milestones[msBatchSize:]
  212. }
  213. }
  214. if opts.Labels {
  215. log.Trace("migrating labels")
  216. messenger("repo.migrate.migrating_labels")
  217. labels, err := downloader.GetLabels()
  218. if err != nil {
  219. if !base.IsErrNotSupported(err) {
  220. return err
  221. }
  222. log.Warn("migrating labels is not supported, ignored")
  223. }
  224. lbBatchSize := uploader.MaxBatchInsertSize("label")
  225. for len(labels) > 0 {
  226. if len(labels) < lbBatchSize {
  227. lbBatchSize = len(labels)
  228. }
  229. if err := uploader.CreateLabels(labels...); err != nil {
  230. return err
  231. }
  232. labels = labels[lbBatchSize:]
  233. }
  234. }
  235. if opts.Releases {
  236. log.Trace("migrating releases")
  237. messenger("repo.migrate.migrating_releases")
  238. releases, err := downloader.GetReleases()
  239. if err != nil {
  240. if !base.IsErrNotSupported(err) {
  241. return err
  242. }
  243. log.Warn("migrating releases is not supported, ignored")
  244. }
  245. relBatchSize := uploader.MaxBatchInsertSize("release")
  246. for len(releases) > 0 {
  247. if len(releases) < relBatchSize {
  248. relBatchSize = len(releases)
  249. }
  250. if err = uploader.CreateReleases(releases[:relBatchSize]...); err != nil {
  251. return err
  252. }
  253. releases = releases[relBatchSize:]
  254. }
  255. // Once all releases (if any) are inserted, sync any remaining non-release tags
  256. if err = uploader.SyncTags(); err != nil {
  257. return err
  258. }
  259. }
  260. var (
  261. commentBatchSize = uploader.MaxBatchInsertSize("comment")
  262. reviewBatchSize = uploader.MaxBatchInsertSize("review")
  263. )
  264. supportAllComments := downloader.SupportGetRepoComments()
  265. if opts.Issues {
  266. log.Trace("migrating issues and comments")
  267. messenger("repo.migrate.migrating_issues")
  268. var issueBatchSize = uploader.MaxBatchInsertSize("issue")
  269. for i := 1; ; i++ {
  270. issues, isEnd, err := downloader.GetIssues(i, issueBatchSize)
  271. if err != nil {
  272. if !base.IsErrNotSupported(err) {
  273. return err
  274. }
  275. log.Warn("migrating issues is not supported, ignored")
  276. break
  277. }
  278. if err := uploader.CreateIssues(issues...); err != nil {
  279. return err
  280. }
  281. if opts.Comments && !supportAllComments {
  282. var allComments = make([]*base.Comment, 0, commentBatchSize)
  283. for _, issue := range issues {
  284. log.Trace("migrating issue %d's comments", issue.Number)
  285. comments, _, err := downloader.GetComments(base.GetCommentOptions{
  286. Context: issue.Context,
  287. })
  288. if err != nil {
  289. if !base.IsErrNotSupported(err) {
  290. return err
  291. }
  292. log.Warn("migrating comments is not supported, ignored")
  293. }
  294. allComments = append(allComments, comments...)
  295. if len(allComments) >= commentBatchSize {
  296. if err = uploader.CreateComments(allComments[:commentBatchSize]...); err != nil {
  297. return err
  298. }
  299. allComments = allComments[commentBatchSize:]
  300. }
  301. }
  302. if len(allComments) > 0 {
  303. if err = uploader.CreateComments(allComments...); err != nil {
  304. return err
  305. }
  306. }
  307. }
  308. if isEnd {
  309. break
  310. }
  311. }
  312. }
  313. if opts.PullRequests {
  314. log.Trace("migrating pull requests and comments")
  315. messenger("repo.migrate.migrating_pulls")
  316. var prBatchSize = uploader.MaxBatchInsertSize("pullrequest")
  317. for i := 1; ; i++ {
  318. prs, isEnd, err := downloader.GetPullRequests(i, prBatchSize)
  319. if err != nil {
  320. if !base.IsErrNotSupported(err) {
  321. return err
  322. }
  323. log.Warn("migrating pull requests is not supported, ignored")
  324. break
  325. }
  326. if err := uploader.CreatePullRequests(prs...); err != nil {
  327. return err
  328. }
  329. if opts.Comments {
  330. if !supportAllComments {
  331. // plain comments
  332. var allComments = make([]*base.Comment, 0, commentBatchSize)
  333. for _, pr := range prs {
  334. log.Trace("migrating pull request %d's comments", pr.Number)
  335. comments, _, err := downloader.GetComments(base.GetCommentOptions{
  336. Context: pr.Context,
  337. })
  338. if err != nil {
  339. if !base.IsErrNotSupported(err) {
  340. return err
  341. }
  342. log.Warn("migrating comments is not supported, ignored")
  343. }
  344. allComments = append(allComments, comments...)
  345. if len(allComments) >= commentBatchSize {
  346. if err = uploader.CreateComments(allComments[:commentBatchSize]...); err != nil {
  347. return err
  348. }
  349. allComments = allComments[commentBatchSize:]
  350. }
  351. }
  352. if len(allComments) > 0 {
  353. if err = uploader.CreateComments(allComments...); err != nil {
  354. return err
  355. }
  356. }
  357. }
  358. // migrate reviews
  359. var allReviews = make([]*base.Review, 0, reviewBatchSize)
  360. for _, pr := range prs {
  361. reviews, err := downloader.GetReviews(pr.Context)
  362. if err != nil {
  363. if !base.IsErrNotSupported(err) {
  364. return err
  365. }
  366. log.Warn("migrating reviews is not supported, ignored")
  367. break
  368. }
  369. allReviews = append(allReviews, reviews...)
  370. if len(allReviews) >= reviewBatchSize {
  371. if err = uploader.CreateReviews(allReviews[:reviewBatchSize]...); err != nil {
  372. return err
  373. }
  374. allReviews = allReviews[reviewBatchSize:]
  375. }
  376. }
  377. if len(allReviews) > 0 {
  378. if err = uploader.CreateReviews(allReviews...); err != nil {
  379. return err
  380. }
  381. }
  382. }
  383. if isEnd {
  384. break
  385. }
  386. }
  387. }
  388. if opts.Comments && supportAllComments {
  389. log.Trace("migrating comments")
  390. for i := 1; ; i++ {
  391. comments, isEnd, err := downloader.GetComments(base.GetCommentOptions{
  392. Page: i,
  393. PageSize: commentBatchSize,
  394. })
  395. if err != nil {
  396. return err
  397. }
  398. if err := uploader.CreateComments(comments...); err != nil {
  399. return err
  400. }
  401. if isEnd {
  402. break
  403. }
  404. }
  405. }
  406. return uploader.Finish()
  407. }
  408. // Init migrations service
  409. func Init() error {
  410. // TODO: maybe we can deprecate these legacy ALLOWED_DOMAINS/ALLOW_LOCALNETWORKS/BLOCKED_DOMAINS, use ALLOWED_HOST_LIST/BLOCKED_HOST_LIST instead
  411. blockList = hostmatcher.ParseSimpleMatchList("migrations.BLOCKED_DOMAINS", setting.Migrations.BlockedDomains)
  412. allowList = hostmatcher.ParseSimpleMatchList("migrations.ALLOWED_DOMAINS/ALLOW_LOCALNETWORKS", setting.Migrations.AllowedDomains)
  413. if allowList.IsEmpty() {
  414. // the default policy is that migration module can access external hosts
  415. allowList.AppendBuiltin(hostmatcher.MatchBuiltinExternal)
  416. }
  417. if setting.Migrations.AllowLocalNetworks {
  418. allowList.AppendBuiltin(hostmatcher.MatchBuiltinPrivate)
  419. allowList.AppendBuiltin(hostmatcher.MatchBuiltinLoopback)
  420. }
  421. return nil
  422. }