Du kan inte välja fler än 25 ämnen Ämnen måste starta med en bokstav eller siffra, kan innehålla bindestreck ('-') och vara max 35 tecken långa.

keys.go 10KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Copyright 2018 The Gitea Authors. All rights reserved.
  3. // SPDX-License-Identifier: MIT
  4. package setting
  5. import (
  6. "net/http"
  7. asymkey_model "code.gitea.io/gitea/models/asymkey"
  8. "code.gitea.io/gitea/models/db"
  9. "code.gitea.io/gitea/modules/base"
  10. "code.gitea.io/gitea/modules/context"
  11. "code.gitea.io/gitea/modules/setting"
  12. "code.gitea.io/gitea/modules/web"
  13. asymkey_service "code.gitea.io/gitea/services/asymkey"
  14. "code.gitea.io/gitea/services/forms"
  15. )
  16. const (
  17. tplSettingsKeys base.TplName = "user/settings/keys"
  18. )
  19. // Keys render user's SSH/GPG public keys page
  20. func Keys(ctx *context.Context) {
  21. ctx.Data["Title"] = ctx.Tr("settings.ssh_gpg_keys")
  22. ctx.Data["PageIsSettingsKeys"] = true
  23. ctx.Data["DisableSSH"] = setting.SSH.Disabled
  24. ctx.Data["BuiltinSSH"] = setting.SSH.StartBuiltinServer
  25. ctx.Data["AllowPrincipals"] = setting.SSH.AuthorizedPrincipalsEnabled
  26. loadKeysData(ctx)
  27. ctx.HTML(http.StatusOK, tplSettingsKeys)
  28. }
  29. // KeysPost response for change user's SSH/GPG keys
  30. func KeysPost(ctx *context.Context) {
  31. form := web.GetForm(ctx).(*forms.AddKeyForm)
  32. ctx.Data["Title"] = ctx.Tr("settings")
  33. ctx.Data["PageIsSettingsKeys"] = true
  34. ctx.Data["DisableSSH"] = setting.SSH.Disabled
  35. ctx.Data["BuiltinSSH"] = setting.SSH.StartBuiltinServer
  36. ctx.Data["AllowPrincipals"] = setting.SSH.AuthorizedPrincipalsEnabled
  37. if ctx.HasError() {
  38. loadKeysData(ctx)
  39. ctx.HTML(http.StatusOK, tplSettingsKeys)
  40. return
  41. }
  42. switch form.Type {
  43. case "principal":
  44. content, err := asymkey_model.CheckPrincipalKeyString(ctx, ctx.Doer, form.Content)
  45. if err != nil {
  46. if db.IsErrSSHDisabled(err) {
  47. ctx.Flash.Info(ctx.Tr("settings.ssh_disabled"))
  48. } else {
  49. ctx.Flash.Error(ctx.Tr("form.invalid_ssh_principal", err.Error()))
  50. }
  51. ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
  52. return
  53. }
  54. if _, err = asymkey_model.AddPrincipalKey(ctx.Doer.ID, content, 0); err != nil {
  55. ctx.Data["HasPrincipalError"] = true
  56. switch {
  57. case asymkey_model.IsErrKeyAlreadyExist(err), asymkey_model.IsErrKeyNameAlreadyUsed(err):
  58. loadKeysData(ctx)
  59. ctx.Data["Err_Content"] = true
  60. ctx.RenderWithErr(ctx.Tr("settings.ssh_principal_been_used"), tplSettingsKeys, &form)
  61. default:
  62. ctx.ServerError("AddPrincipalKey", err)
  63. }
  64. return
  65. }
  66. ctx.Flash.Success(ctx.Tr("settings.add_principal_success", form.Content))
  67. ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
  68. case "gpg":
  69. token := asymkey_model.VerificationToken(ctx.Doer, 1)
  70. lastToken := asymkey_model.VerificationToken(ctx.Doer, 0)
  71. keys, err := asymkey_model.AddGPGKey(ctx, ctx.Doer.ID, form.Content, token, form.Signature)
  72. if err != nil && asymkey_model.IsErrGPGInvalidTokenSignature(err) {
  73. keys, err = asymkey_model.AddGPGKey(ctx, ctx.Doer.ID, form.Content, lastToken, form.Signature)
  74. }
  75. if err != nil {
  76. ctx.Data["HasGPGError"] = true
  77. switch {
  78. case asymkey_model.IsErrGPGKeyParsing(err):
  79. ctx.Flash.Error(ctx.Tr("form.invalid_gpg_key", err.Error()))
  80. ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
  81. case asymkey_model.IsErrGPGKeyIDAlreadyUsed(err):
  82. loadKeysData(ctx)
  83. ctx.Data["Err_Content"] = true
  84. ctx.RenderWithErr(ctx.Tr("settings.gpg_key_id_used"), tplSettingsKeys, &form)
  85. case asymkey_model.IsErrGPGInvalidTokenSignature(err):
  86. loadKeysData(ctx)
  87. ctx.Data["Err_Content"] = true
  88. ctx.Data["Err_Signature"] = true
  89. keyID := err.(asymkey_model.ErrGPGInvalidTokenSignature).ID
  90. ctx.Data["KeyID"] = keyID
  91. ctx.Data["PaddedKeyID"] = asymkey_model.PaddedKeyID(keyID)
  92. ctx.RenderWithErr(ctx.Tr("settings.gpg_invalid_token_signature"), tplSettingsKeys, &form)
  93. case asymkey_model.IsErrGPGNoEmailFound(err):
  94. loadKeysData(ctx)
  95. ctx.Data["Err_Content"] = true
  96. ctx.Data["Err_Signature"] = true
  97. keyID := err.(asymkey_model.ErrGPGNoEmailFound).ID
  98. ctx.Data["KeyID"] = keyID
  99. ctx.Data["PaddedKeyID"] = asymkey_model.PaddedKeyID(keyID)
  100. ctx.RenderWithErr(ctx.Tr("settings.gpg_no_key_email_found"), tplSettingsKeys, &form)
  101. default:
  102. ctx.ServerError("AddPublicKey", err)
  103. }
  104. return
  105. }
  106. keyIDs := ""
  107. for _, key := range keys {
  108. keyIDs += key.KeyID
  109. keyIDs += ", "
  110. }
  111. if len(keyIDs) > 0 {
  112. keyIDs = keyIDs[:len(keyIDs)-2]
  113. }
  114. ctx.Flash.Success(ctx.Tr("settings.add_gpg_key_success", keyIDs))
  115. ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
  116. case "verify_gpg":
  117. token := asymkey_model.VerificationToken(ctx.Doer, 1)
  118. lastToken := asymkey_model.VerificationToken(ctx.Doer, 0)
  119. keyID, err := asymkey_model.VerifyGPGKey(ctx.Doer.ID, form.KeyID, token, form.Signature)
  120. if err != nil && asymkey_model.IsErrGPGInvalidTokenSignature(err) {
  121. keyID, err = asymkey_model.VerifyGPGKey(ctx.Doer.ID, form.KeyID, lastToken, form.Signature)
  122. }
  123. if err != nil {
  124. ctx.Data["HasGPGVerifyError"] = true
  125. switch {
  126. case asymkey_model.IsErrGPGInvalidTokenSignature(err):
  127. loadKeysData(ctx)
  128. ctx.Data["VerifyingID"] = form.KeyID
  129. ctx.Data["Err_Signature"] = true
  130. keyID := err.(asymkey_model.ErrGPGInvalidTokenSignature).ID
  131. ctx.Data["KeyID"] = keyID
  132. ctx.Data["PaddedKeyID"] = asymkey_model.PaddedKeyID(keyID)
  133. ctx.RenderWithErr(ctx.Tr("settings.gpg_invalid_token_signature"), tplSettingsKeys, &form)
  134. default:
  135. ctx.ServerError("VerifyGPG", err)
  136. }
  137. }
  138. ctx.Flash.Success(ctx.Tr("settings.verify_gpg_key_success", keyID))
  139. ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
  140. case "ssh":
  141. content, err := asymkey_model.CheckPublicKeyString(form.Content)
  142. if err != nil {
  143. if db.IsErrSSHDisabled(err) {
  144. ctx.Flash.Info(ctx.Tr("settings.ssh_disabled"))
  145. } else if asymkey_model.IsErrKeyUnableVerify(err) {
  146. ctx.Flash.Info(ctx.Tr("form.unable_verify_ssh_key"))
  147. } else if err == asymkey_model.ErrKeyIsPrivate {
  148. ctx.Flash.Error(ctx.Tr("form.must_use_public_key"))
  149. } else {
  150. ctx.Flash.Error(ctx.Tr("form.invalid_ssh_key", err.Error()))
  151. }
  152. ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
  153. return
  154. }
  155. if _, err = asymkey_model.AddPublicKey(ctx.Doer.ID, form.Title, content, 0); err != nil {
  156. ctx.Data["HasSSHError"] = true
  157. switch {
  158. case asymkey_model.IsErrKeyAlreadyExist(err):
  159. loadKeysData(ctx)
  160. ctx.Data["Err_Content"] = true
  161. ctx.RenderWithErr(ctx.Tr("settings.ssh_key_been_used"), tplSettingsKeys, &form)
  162. case asymkey_model.IsErrKeyNameAlreadyUsed(err):
  163. loadKeysData(ctx)
  164. ctx.Data["Err_Title"] = true
  165. ctx.RenderWithErr(ctx.Tr("settings.ssh_key_name_used"), tplSettingsKeys, &form)
  166. case asymkey_model.IsErrKeyUnableVerify(err):
  167. ctx.Flash.Info(ctx.Tr("form.unable_verify_ssh_key"))
  168. ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
  169. default:
  170. ctx.ServerError("AddPublicKey", err)
  171. }
  172. return
  173. }
  174. ctx.Flash.Success(ctx.Tr("settings.add_key_success", form.Title))
  175. ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
  176. case "verify_ssh":
  177. token := asymkey_model.VerificationToken(ctx.Doer, 1)
  178. lastToken := asymkey_model.VerificationToken(ctx.Doer, 0)
  179. fingerprint, err := asymkey_model.VerifySSHKey(ctx.Doer.ID, form.Fingerprint, token, form.Signature)
  180. if err != nil && asymkey_model.IsErrSSHInvalidTokenSignature(err) {
  181. fingerprint, err = asymkey_model.VerifySSHKey(ctx.Doer.ID, form.Fingerprint, lastToken, form.Signature)
  182. }
  183. if err != nil {
  184. ctx.Data["HasSSHVerifyError"] = true
  185. switch {
  186. case asymkey_model.IsErrSSHInvalidTokenSignature(err):
  187. loadKeysData(ctx)
  188. ctx.Data["Err_Signature"] = true
  189. ctx.Data["Fingerprint"] = err.(asymkey_model.ErrSSHInvalidTokenSignature).Fingerprint
  190. ctx.RenderWithErr(ctx.Tr("settings.ssh_invalid_token_signature"), tplSettingsKeys, &form)
  191. default:
  192. ctx.ServerError("VerifySSH", err)
  193. }
  194. }
  195. ctx.Flash.Success(ctx.Tr("settings.verify_ssh_key_success", fingerprint))
  196. ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
  197. default:
  198. ctx.Flash.Warning("Function not implemented")
  199. ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
  200. }
  201. }
  202. // DeleteKey response for delete user's SSH/GPG key
  203. func DeleteKey(ctx *context.Context) {
  204. switch ctx.FormString("type") {
  205. case "gpg":
  206. if err := asymkey_model.DeleteGPGKey(ctx, ctx.Doer, ctx.FormInt64("id")); err != nil {
  207. ctx.Flash.Error("DeleteGPGKey: " + err.Error())
  208. } else {
  209. ctx.Flash.Success(ctx.Tr("settings.gpg_key_deletion_success"))
  210. }
  211. case "ssh":
  212. keyID := ctx.FormInt64("id")
  213. external, err := asymkey_model.PublicKeyIsExternallyManaged(keyID)
  214. if err != nil {
  215. ctx.ServerError("sshKeysExternalManaged", err)
  216. return
  217. }
  218. if external {
  219. ctx.Flash.Error(ctx.Tr("settings.ssh_externally_managed"))
  220. ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
  221. return
  222. }
  223. if err := asymkey_service.DeletePublicKey(ctx, ctx.Doer, keyID); err != nil {
  224. ctx.Flash.Error("DeletePublicKey: " + err.Error())
  225. } else {
  226. ctx.Flash.Success(ctx.Tr("settings.ssh_key_deletion_success"))
  227. }
  228. case "principal":
  229. if err := asymkey_service.DeletePublicKey(ctx, ctx.Doer, ctx.FormInt64("id")); err != nil {
  230. ctx.Flash.Error("DeletePublicKey: " + err.Error())
  231. } else {
  232. ctx.Flash.Success(ctx.Tr("settings.ssh_principal_deletion_success"))
  233. }
  234. default:
  235. ctx.Flash.Warning("Function not implemented")
  236. ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
  237. }
  238. ctx.JSONRedirect(setting.AppSubURL + "/user/settings/keys")
  239. }
  240. func loadKeysData(ctx *context.Context) {
  241. keys, err := asymkey_model.ListPublicKeys(ctx.Doer.ID, db.ListOptions{})
  242. if err != nil {
  243. ctx.ServerError("ListPublicKeys", err)
  244. return
  245. }
  246. ctx.Data["Keys"] = keys
  247. externalKeys, err := asymkey_model.PublicKeysAreExternallyManaged(keys)
  248. if err != nil {
  249. ctx.ServerError("ListPublicKeys", err)
  250. return
  251. }
  252. ctx.Data["ExternalKeys"] = externalKeys
  253. gpgkeys, err := asymkey_model.ListGPGKeys(ctx, ctx.Doer.ID, db.ListOptions{})
  254. if err != nil {
  255. ctx.ServerError("ListGPGKeys", err)
  256. return
  257. }
  258. ctx.Data["GPGKeys"] = gpgkeys
  259. tokenToSign := asymkey_model.VerificationToken(ctx.Doer, 1)
  260. // generate a new aes cipher using the csrfToken
  261. ctx.Data["TokenToSign"] = tokenToSign
  262. principals, err := asymkey_model.ListPrincipalKeys(ctx.Doer.ID, db.ListOptions{})
  263. if err != nil {
  264. ctx.ServerError("ListPrincipalKeys", err)
  265. return
  266. }
  267. ctx.Data["Principals"] = principals
  268. ctx.Data["VerifyingID"] = ctx.FormString("verify_gpg")
  269. ctx.Data["VerifyingFingerprint"] = ctx.FormString("verify_ssh")
  270. }