Nelze vybrat více než 25 témat Téma musí začínat písmenem nebo číslem, může obsahovat pomlčky („-“) a může být dlouhé až 35 znaků.

migrate.go 14KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483
  1. // Copyright 2019 The Gitea Authors. All rights reserved.
  2. // Copyright 2018 Jonas Franz. All rights reserved.
  3. // Use of this source code is governed by a MIT-style
  4. // license that can be found in the LICENSE file.
  5. package migrations
  6. import (
  7. "context"
  8. "fmt"
  9. "net"
  10. "net/url"
  11. "path/filepath"
  12. "strings"
  13. "code.gitea.io/gitea/models"
  14. admin_model "code.gitea.io/gitea/models/admin"
  15. repo_model "code.gitea.io/gitea/models/repo"
  16. user_model "code.gitea.io/gitea/models/user"
  17. "code.gitea.io/gitea/modules/hostmatcher"
  18. "code.gitea.io/gitea/modules/log"
  19. base "code.gitea.io/gitea/modules/migration"
  20. "code.gitea.io/gitea/modules/setting"
  21. "code.gitea.io/gitea/modules/util"
  22. )
  23. // MigrateOptions is equal to base.MigrateOptions
  24. type MigrateOptions = base.MigrateOptions
  25. var (
  26. factories []base.DownloaderFactory
  27. allowList *hostmatcher.HostMatchList
  28. blockList *hostmatcher.HostMatchList
  29. )
  30. // RegisterDownloaderFactory registers a downloader factory
  31. func RegisterDownloaderFactory(factory base.DownloaderFactory) {
  32. factories = append(factories, factory)
  33. }
  34. // IsMigrateURLAllowed checks if an URL is allowed to be migrated from
  35. func IsMigrateURLAllowed(remoteURL string, doer *user_model.User) error {
  36. // Remote address can be HTTP/HTTPS/Git URL or local path.
  37. u, err := url.Parse(remoteURL)
  38. if err != nil {
  39. return &models.ErrInvalidCloneAddr{IsURLError: true, Host: remoteURL}
  40. }
  41. if u.Scheme == "file" || u.Scheme == "" {
  42. if !doer.CanImportLocal() {
  43. return &models.ErrInvalidCloneAddr{Host: "<LOCAL_FILESYSTEM>", IsPermissionDenied: true, LocalPath: true}
  44. }
  45. isAbs := filepath.IsAbs(u.Host + u.Path)
  46. if !isAbs {
  47. return &models.ErrInvalidCloneAddr{Host: "<LOCAL_FILESYSTEM>", IsInvalidPath: true, LocalPath: true}
  48. }
  49. isDir, err := util.IsDir(u.Host + u.Path)
  50. if err != nil {
  51. log.Error("Unable to check if %s is a directory: %v", u.Host+u.Path, err)
  52. return err
  53. }
  54. if !isDir {
  55. return &models.ErrInvalidCloneAddr{Host: "<LOCAL_FILESYSTEM>", IsInvalidPath: true, LocalPath: true}
  56. }
  57. return nil
  58. }
  59. if u.Scheme == "git" && u.Port() != "" && (strings.Contains(remoteURL, "%0d") || strings.Contains(remoteURL, "%0a")) {
  60. return &models.ErrInvalidCloneAddr{Host: u.Host, IsURLError: true}
  61. }
  62. if u.Opaque != "" || u.Scheme != "" && u.Scheme != "http" && u.Scheme != "https" && u.Scheme != "git" {
  63. return &models.ErrInvalidCloneAddr{Host: u.Host, IsProtocolInvalid: true, IsPermissionDenied: true, IsURLError: true}
  64. }
  65. hostName, _, err := net.SplitHostPort(u.Host)
  66. if err != nil {
  67. // u.Host can be "host" or "host:port"
  68. err = nil //nolint
  69. hostName = u.Host
  70. }
  71. // some users only use proxy, there is no DNS resolver. it's safe to ignore the LookupIP error
  72. addrList, _ := net.LookupIP(hostName)
  73. return checkByAllowBlockList(hostName, addrList)
  74. }
  75. func checkByAllowBlockList(hostName string, addrList []net.IP) error {
  76. var ipAllowed bool
  77. var ipBlocked bool
  78. for _, addr := range addrList {
  79. ipAllowed = ipAllowed || allowList.MatchIPAddr(addr)
  80. ipBlocked = ipBlocked || blockList.MatchIPAddr(addr)
  81. }
  82. var blockedError error
  83. if blockList.MatchHostName(hostName) || ipBlocked {
  84. blockedError = &models.ErrInvalidCloneAddr{Host: hostName, IsPermissionDenied: true}
  85. }
  86. // if we have an allow-list, check the allow-list before return to get the more accurate error
  87. if !allowList.IsEmpty() {
  88. if !allowList.MatchHostName(hostName) && !ipAllowed {
  89. return &models.ErrInvalidCloneAddr{Host: hostName, IsPermissionDenied: true}
  90. }
  91. }
  92. // otherwise, we always follow the blocked list
  93. return blockedError
  94. }
  95. // MigrateRepository migrate repository according MigrateOptions
  96. func MigrateRepository(ctx context.Context, doer *user_model.User, ownerName string, opts base.MigrateOptions, messenger base.Messenger) (*repo_model.Repository, error) {
  97. err := IsMigrateURLAllowed(opts.CloneAddr, doer)
  98. if err != nil {
  99. return nil, err
  100. }
  101. if opts.LFS && len(opts.LFSEndpoint) > 0 {
  102. err := IsMigrateURLAllowed(opts.LFSEndpoint, doer)
  103. if err != nil {
  104. return nil, err
  105. }
  106. }
  107. downloader, err := newDownloader(ctx, ownerName, opts)
  108. if err != nil {
  109. return nil, err
  110. }
  111. uploader := NewGiteaLocalUploader(ctx, doer, ownerName, opts.RepoName)
  112. uploader.gitServiceType = opts.GitServiceType
  113. if err := migrateRepository(downloader, uploader, opts, messenger); err != nil {
  114. if err1 := uploader.Rollback(); err1 != nil {
  115. log.Error("rollback failed: %v", err1)
  116. }
  117. if err2 := admin_model.CreateRepositoryNotice(fmt.Sprintf("Migrate repository from %s failed: %v", opts.OriginalURL, err)); err2 != nil {
  118. log.Error("create respotiry notice failed: ", err2)
  119. }
  120. return nil, err
  121. }
  122. return uploader.repo, nil
  123. }
  124. func newDownloader(ctx context.Context, ownerName string, opts base.MigrateOptions) (base.Downloader, error) {
  125. var (
  126. downloader base.Downloader
  127. err error
  128. )
  129. for _, factory := range factories {
  130. if factory.GitServiceType() == opts.GitServiceType {
  131. downloader, err = factory.New(ctx, opts)
  132. if err != nil {
  133. return nil, err
  134. }
  135. break
  136. }
  137. }
  138. if downloader == nil {
  139. opts.Wiki = true
  140. opts.Milestones = false
  141. opts.Labels = false
  142. opts.Releases = false
  143. opts.Comments = false
  144. opts.Issues = false
  145. opts.PullRequests = false
  146. downloader = NewPlainGitDownloader(ownerName, opts.RepoName, opts.CloneAddr)
  147. log.Trace("Will migrate from git: %s", opts.OriginalURL)
  148. }
  149. if setting.Migrations.MaxAttempts > 1 {
  150. downloader = base.NewRetryDownloader(ctx, downloader, setting.Migrations.MaxAttempts, setting.Migrations.RetryBackoff)
  151. }
  152. return downloader, nil
  153. }
  154. // migrateRepository will download information and then upload it to Uploader, this is a simple
  155. // process for small repository. For a big repository, save all the data to disk
  156. // before upload is better
  157. func migrateRepository(downloader base.Downloader, uploader base.Uploader, opts base.MigrateOptions, messenger base.Messenger) error {
  158. if messenger == nil {
  159. messenger = base.NilMessenger
  160. }
  161. repo, err := downloader.GetRepoInfo()
  162. if err != nil {
  163. if !base.IsErrNotSupported(err) {
  164. return err
  165. }
  166. log.Info("migrating repo infos is not supported, ignored")
  167. }
  168. repo.IsPrivate = opts.Private
  169. repo.IsMirror = opts.Mirror
  170. if opts.Description != "" {
  171. repo.Description = opts.Description
  172. }
  173. if repo.CloneURL, err = downloader.FormatCloneURL(opts, repo.CloneURL); err != nil {
  174. return err
  175. }
  176. log.Trace("migrating git data from %s", repo.CloneURL)
  177. messenger("repo.migrate.migrating_git")
  178. if err = uploader.CreateRepo(repo, opts); err != nil {
  179. return err
  180. }
  181. defer uploader.Close()
  182. log.Trace("migrating topics")
  183. messenger("repo.migrate.migrating_topics")
  184. topics, err := downloader.GetTopics()
  185. if err != nil {
  186. if !base.IsErrNotSupported(err) {
  187. return err
  188. }
  189. log.Warn("migrating topics is not supported, ignored")
  190. }
  191. if len(topics) != 0 {
  192. if err = uploader.CreateTopics(topics...); err != nil {
  193. return err
  194. }
  195. }
  196. if opts.Milestones {
  197. log.Trace("migrating milestones")
  198. messenger("repo.migrate.migrating_milestones")
  199. milestones, err := downloader.GetMilestones()
  200. if err != nil {
  201. if !base.IsErrNotSupported(err) {
  202. return err
  203. }
  204. log.Warn("migrating milestones is not supported, ignored")
  205. }
  206. msBatchSize := uploader.MaxBatchInsertSize("milestone")
  207. for len(milestones) > 0 {
  208. if len(milestones) < msBatchSize {
  209. msBatchSize = len(milestones)
  210. }
  211. if err := uploader.CreateMilestones(milestones...); err != nil {
  212. return err
  213. }
  214. milestones = milestones[msBatchSize:]
  215. }
  216. }
  217. if opts.Labels {
  218. log.Trace("migrating labels")
  219. messenger("repo.migrate.migrating_labels")
  220. labels, err := downloader.GetLabels()
  221. if err != nil {
  222. if !base.IsErrNotSupported(err) {
  223. return err
  224. }
  225. log.Warn("migrating labels is not supported, ignored")
  226. }
  227. lbBatchSize := uploader.MaxBatchInsertSize("label")
  228. for len(labels) > 0 {
  229. if len(labels) < lbBatchSize {
  230. lbBatchSize = len(labels)
  231. }
  232. if err := uploader.CreateLabels(labels...); err != nil {
  233. return err
  234. }
  235. labels = labels[lbBatchSize:]
  236. }
  237. }
  238. if opts.Releases {
  239. log.Trace("migrating releases")
  240. messenger("repo.migrate.migrating_releases")
  241. releases, err := downloader.GetReleases()
  242. if err != nil {
  243. if !base.IsErrNotSupported(err) {
  244. return err
  245. }
  246. log.Warn("migrating releases is not supported, ignored")
  247. }
  248. relBatchSize := uploader.MaxBatchInsertSize("release")
  249. for len(releases) > 0 {
  250. if len(releases) < relBatchSize {
  251. relBatchSize = len(releases)
  252. }
  253. if err = uploader.CreateReleases(releases[:relBatchSize]...); err != nil {
  254. return err
  255. }
  256. releases = releases[relBatchSize:]
  257. }
  258. // Once all releases (if any) are inserted, sync any remaining non-release tags
  259. if err = uploader.SyncTags(); err != nil {
  260. return err
  261. }
  262. }
  263. var (
  264. commentBatchSize = uploader.MaxBatchInsertSize("comment")
  265. reviewBatchSize = uploader.MaxBatchInsertSize("review")
  266. )
  267. supportAllComments := downloader.SupportGetRepoComments()
  268. if opts.Issues {
  269. log.Trace("migrating issues and comments")
  270. messenger("repo.migrate.migrating_issues")
  271. issueBatchSize := uploader.MaxBatchInsertSize("issue")
  272. for i := 1; ; i++ {
  273. issues, isEnd, err := downloader.GetIssues(i, issueBatchSize)
  274. if err != nil {
  275. if !base.IsErrNotSupported(err) {
  276. return err
  277. }
  278. log.Warn("migrating issues is not supported, ignored")
  279. break
  280. }
  281. if err := uploader.CreateIssues(issues...); err != nil {
  282. return err
  283. }
  284. if opts.Comments && !supportAllComments {
  285. allComments := make([]*base.Comment, 0, commentBatchSize)
  286. for _, issue := range issues {
  287. log.Trace("migrating issue %d's comments", issue.Number)
  288. comments, _, err := downloader.GetComments(issue)
  289. if err != nil {
  290. if !base.IsErrNotSupported(err) {
  291. return err
  292. }
  293. log.Warn("migrating comments is not supported, ignored")
  294. }
  295. allComments = append(allComments, comments...)
  296. if len(allComments) >= commentBatchSize {
  297. if err = uploader.CreateComments(allComments[:commentBatchSize]...); err != nil {
  298. return err
  299. }
  300. allComments = allComments[commentBatchSize:]
  301. }
  302. }
  303. if len(allComments) > 0 {
  304. if err = uploader.CreateComments(allComments...); err != nil {
  305. return err
  306. }
  307. }
  308. }
  309. if isEnd {
  310. break
  311. }
  312. }
  313. }
  314. if opts.PullRequests {
  315. log.Trace("migrating pull requests and comments")
  316. messenger("repo.migrate.migrating_pulls")
  317. prBatchSize := uploader.MaxBatchInsertSize("pullrequest")
  318. for i := 1; ; i++ {
  319. prs, isEnd, err := downloader.GetPullRequests(i, prBatchSize)
  320. if err != nil {
  321. if !base.IsErrNotSupported(err) {
  322. return err
  323. }
  324. log.Warn("migrating pull requests is not supported, ignored")
  325. break
  326. }
  327. if err := uploader.CreatePullRequests(prs...); err != nil {
  328. return err
  329. }
  330. if opts.Comments {
  331. if !supportAllComments {
  332. // plain comments
  333. allComments := make([]*base.Comment, 0, commentBatchSize)
  334. for _, pr := range prs {
  335. log.Trace("migrating pull request %d's comments", pr.Number)
  336. comments, _, err := downloader.GetComments(pr)
  337. if err != nil {
  338. if !base.IsErrNotSupported(err) {
  339. return err
  340. }
  341. log.Warn("migrating comments is not supported, ignored")
  342. }
  343. allComments = append(allComments, comments...)
  344. if len(allComments) >= commentBatchSize {
  345. if err = uploader.CreateComments(allComments[:commentBatchSize]...); err != nil {
  346. return err
  347. }
  348. allComments = allComments[commentBatchSize:]
  349. }
  350. }
  351. if len(allComments) > 0 {
  352. if err = uploader.CreateComments(allComments...); err != nil {
  353. return err
  354. }
  355. }
  356. }
  357. // migrate reviews
  358. allReviews := make([]*base.Review, 0, reviewBatchSize)
  359. for _, pr := range prs {
  360. reviews, err := downloader.GetReviews(pr)
  361. if err != nil {
  362. if !base.IsErrNotSupported(err) {
  363. return err
  364. }
  365. log.Warn("migrating reviews is not supported, ignored")
  366. break
  367. }
  368. allReviews = append(allReviews, reviews...)
  369. if len(allReviews) >= reviewBatchSize {
  370. if err = uploader.CreateReviews(allReviews[:reviewBatchSize]...); err != nil {
  371. return err
  372. }
  373. allReviews = allReviews[reviewBatchSize:]
  374. }
  375. }
  376. if len(allReviews) > 0 {
  377. if err = uploader.CreateReviews(allReviews...); err != nil {
  378. return err
  379. }
  380. }
  381. }
  382. if isEnd {
  383. break
  384. }
  385. }
  386. }
  387. if opts.Comments && supportAllComments {
  388. log.Trace("migrating comments")
  389. for i := 1; ; i++ {
  390. comments, isEnd, err := downloader.GetAllComments(i, commentBatchSize)
  391. if err != nil {
  392. return err
  393. }
  394. if err := uploader.CreateComments(comments...); err != nil {
  395. return err
  396. }
  397. if isEnd {
  398. break
  399. }
  400. }
  401. }
  402. return uploader.Finish()
  403. }
  404. // Init migrations service
  405. func Init() error {
  406. // TODO: maybe we can deprecate these legacy ALLOWED_DOMAINS/ALLOW_LOCALNETWORKS/BLOCKED_DOMAINS, use ALLOWED_HOST_LIST/BLOCKED_HOST_LIST instead
  407. blockList = hostmatcher.ParseSimpleMatchList("migrations.BLOCKED_DOMAINS", setting.Migrations.BlockedDomains)
  408. allowList = hostmatcher.ParseSimpleMatchList("migrations.ALLOWED_DOMAINS/ALLOW_LOCALNETWORKS", setting.Migrations.AllowedDomains)
  409. if allowList.IsEmpty() {
  410. // the default policy is that migration module can access external hosts
  411. allowList.AppendBuiltin(hostmatcher.MatchBuiltinExternal)
  412. }
  413. if setting.Migrations.AllowLocalNetworks {
  414. allowList.AppendBuiltin(hostmatcher.MatchBuiltinPrivate)
  415. allowList.AppendBuiltin(hostmatcher.MatchBuiltinLoopback)
  416. }
  417. // TODO: at the moment, if ALLOW_LOCALNETWORKS=false, ALLOWED_DOMAINS=domain.com, and domain.com has IP 127.0.0.1, then it's still allowed.
  418. // if we want to block such case, the private&loopback should be added to the blockList when ALLOW_LOCALNETWORKS=false
  419. return nil
  420. }