You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

migrate.go 15KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508
  1. // Copyright 2019 The Gitea Authors. All rights reserved.
  2. // Copyright 2018 Jonas Franz. All rights reserved.
  3. // SPDX-License-Identifier: MIT
  4. package migrations
  5. import (
  6. "context"
  7. "fmt"
  8. "net"
  9. "net/url"
  10. "path/filepath"
  11. "strings"
  12. "code.gitea.io/gitea/models"
  13. repo_model "code.gitea.io/gitea/models/repo"
  14. system_model "code.gitea.io/gitea/models/system"
  15. user_model "code.gitea.io/gitea/models/user"
  16. "code.gitea.io/gitea/modules/hostmatcher"
  17. "code.gitea.io/gitea/modules/log"
  18. base "code.gitea.io/gitea/modules/migration"
  19. "code.gitea.io/gitea/modules/setting"
  20. "code.gitea.io/gitea/modules/util"
  21. )
  22. // MigrateOptions is equal to base.MigrateOptions
  23. type MigrateOptions = base.MigrateOptions
  24. var (
  25. factories []base.DownloaderFactory
  26. allowList *hostmatcher.HostMatchList
  27. blockList *hostmatcher.HostMatchList
  28. )
  29. // RegisterDownloaderFactory registers a downloader factory
  30. func RegisterDownloaderFactory(factory base.DownloaderFactory) {
  31. factories = append(factories, factory)
  32. }
  33. // IsMigrateURLAllowed checks if an URL is allowed to be migrated from
  34. func IsMigrateURLAllowed(remoteURL string, doer *user_model.User) error {
  35. // Remote address can be HTTP/HTTPS/Git URL or local path.
  36. u, err := url.Parse(remoteURL)
  37. if err != nil {
  38. return &models.ErrInvalidCloneAddr{IsURLError: true, Host: remoteURL}
  39. }
  40. if u.Scheme == "file" || u.Scheme == "" {
  41. if !doer.CanImportLocal() {
  42. return &models.ErrInvalidCloneAddr{Host: "<LOCAL_FILESYSTEM>", IsPermissionDenied: true, LocalPath: true}
  43. }
  44. isAbs := filepath.IsAbs(u.Host + u.Path)
  45. if !isAbs {
  46. return &models.ErrInvalidCloneAddr{Host: "<LOCAL_FILESYSTEM>", IsInvalidPath: true, LocalPath: true}
  47. }
  48. isDir, err := util.IsDir(u.Host + u.Path)
  49. if err != nil {
  50. log.Error("Unable to check if %s is a directory: %v", u.Host+u.Path, err)
  51. return err
  52. }
  53. if !isDir {
  54. return &models.ErrInvalidCloneAddr{Host: "<LOCAL_FILESYSTEM>", IsInvalidPath: true, LocalPath: true}
  55. }
  56. return nil
  57. }
  58. if u.Scheme == "git" && u.Port() != "" && (strings.Contains(remoteURL, "%0d") || strings.Contains(remoteURL, "%0a")) {
  59. return &models.ErrInvalidCloneAddr{Host: u.Host, IsURLError: true}
  60. }
  61. if u.Opaque != "" || u.Scheme != "" && u.Scheme != "http" && u.Scheme != "https" && u.Scheme != "git" {
  62. return &models.ErrInvalidCloneAddr{Host: u.Host, IsProtocolInvalid: true, IsPermissionDenied: true, IsURLError: true}
  63. }
  64. hostName, _, err := net.SplitHostPort(u.Host)
  65. if err != nil {
  66. // u.Host can be "host" or "host:port"
  67. err = nil //nolint
  68. hostName = u.Host
  69. }
  70. // some users only use proxy, there is no DNS resolver. it's safe to ignore the LookupIP error
  71. addrList, _ := net.LookupIP(hostName)
  72. return checkByAllowBlockList(hostName, addrList)
  73. }
  74. func checkByAllowBlockList(hostName string, addrList []net.IP) error {
  75. var ipAllowed bool
  76. var ipBlocked bool
  77. for _, addr := range addrList {
  78. ipAllowed = ipAllowed || allowList.MatchIPAddr(addr)
  79. ipBlocked = ipBlocked || blockList.MatchIPAddr(addr)
  80. }
  81. var blockedError error
  82. if blockList.MatchHostName(hostName) || ipBlocked {
  83. blockedError = &models.ErrInvalidCloneAddr{Host: hostName, IsPermissionDenied: true}
  84. }
  85. // if we have an allow-list, check the allow-list before return to get the more accurate error
  86. if !allowList.IsEmpty() {
  87. if !allowList.MatchHostName(hostName) && !ipAllowed {
  88. return &models.ErrInvalidCloneAddr{Host: hostName, IsPermissionDenied: true}
  89. }
  90. }
  91. // otherwise, we always follow the blocked list
  92. return blockedError
  93. }
  94. // MigrateRepository migrate repository according MigrateOptions
  95. func MigrateRepository(ctx context.Context, doer *user_model.User, ownerName string, opts base.MigrateOptions, messenger base.Messenger) (*repo_model.Repository, error) {
  96. err := IsMigrateURLAllowed(opts.CloneAddr, doer)
  97. if err != nil {
  98. return nil, err
  99. }
  100. if opts.LFS && len(opts.LFSEndpoint) > 0 {
  101. err := IsMigrateURLAllowed(opts.LFSEndpoint, doer)
  102. if err != nil {
  103. return nil, err
  104. }
  105. }
  106. downloader, err := newDownloader(ctx, ownerName, opts)
  107. if err != nil {
  108. return nil, err
  109. }
  110. uploader := NewGiteaLocalUploader(ctx, doer, ownerName, opts.RepoName)
  111. uploader.gitServiceType = opts.GitServiceType
  112. if err := migrateRepository(ctx, doer, downloader, uploader, opts, messenger); err != nil {
  113. if err1 := uploader.Rollback(); err1 != nil {
  114. log.Error("rollback failed: %v", err1)
  115. }
  116. if err2 := system_model.CreateRepositoryNotice(fmt.Sprintf("Migrate repository from %s failed: %v", opts.OriginalURL, err)); err2 != nil {
  117. log.Error("create respotiry notice failed: ", err2)
  118. }
  119. return nil, err
  120. }
  121. return uploader.repo, nil
  122. }
  123. func newDownloader(ctx context.Context, ownerName string, opts base.MigrateOptions) (base.Downloader, error) {
  124. var (
  125. downloader base.Downloader
  126. err error
  127. )
  128. for _, factory := range factories {
  129. if factory.GitServiceType() == opts.GitServiceType {
  130. downloader, err = factory.New(ctx, opts)
  131. if err != nil {
  132. return nil, err
  133. }
  134. break
  135. }
  136. }
  137. if downloader == nil {
  138. opts.Wiki = true
  139. opts.Milestones = false
  140. opts.Labels = false
  141. opts.Releases = false
  142. opts.Comments = false
  143. opts.Issues = false
  144. opts.PullRequests = false
  145. downloader = NewPlainGitDownloader(ownerName, opts.RepoName, opts.CloneAddr)
  146. log.Trace("Will migrate from git: %s", opts.OriginalURL)
  147. }
  148. if setting.Migrations.MaxAttempts > 1 {
  149. downloader = base.NewRetryDownloader(ctx, downloader, setting.Migrations.MaxAttempts, setting.Migrations.RetryBackoff)
  150. }
  151. return downloader, nil
  152. }
  153. // migrateRepository will download information and then upload it to Uploader, this is a simple
  154. // process for small repository. For a big repository, save all the data to disk
  155. // before upload is better
  156. func migrateRepository(ctx context.Context, doer *user_model.User, downloader base.Downloader, uploader base.Uploader, opts base.MigrateOptions, messenger base.Messenger) error {
  157. if messenger == nil {
  158. messenger = base.NilMessenger
  159. }
  160. repo, err := downloader.GetRepoInfo()
  161. if err != nil {
  162. if !base.IsErrNotSupported(err) {
  163. return err
  164. }
  165. log.Info("migrating repo infos is not supported, ignored")
  166. }
  167. repo.IsPrivate = opts.Private
  168. repo.IsMirror = opts.Mirror
  169. if opts.Description != "" {
  170. repo.Description = opts.Description
  171. }
  172. if repo.CloneURL, err = downloader.FormatCloneURL(opts, repo.CloneURL); err != nil {
  173. return err
  174. }
  175. // SECURITY: If the downloader is not a RepositoryRestorer then we need to recheck the CloneURL
  176. if _, ok := downloader.(*RepositoryRestorer); !ok {
  177. // Now the clone URL can be rewritten by the downloader so we must recheck
  178. if err := IsMigrateURLAllowed(repo.CloneURL, doer); err != nil {
  179. return err
  180. }
  181. // SECURITY: Ensure that we haven't been redirected from an external to a local filesystem
  182. // Now we know all of these must parse
  183. cloneAddrURL, _ := url.Parse(opts.CloneAddr)
  184. cloneURL, _ := url.Parse(repo.CloneURL)
  185. if cloneURL.Scheme == "file" || cloneURL.Scheme == "" {
  186. if cloneAddrURL.Scheme != "file" && cloneAddrURL.Scheme != "" {
  187. return fmt.Errorf("repo info has changed from external to local filesystem")
  188. }
  189. }
  190. // We don't actually need to check the OriginalURL as it isn't used anywhere
  191. }
  192. log.Trace("migrating git data from %s", repo.CloneURL)
  193. messenger("repo.migrate.migrating_git")
  194. if err = uploader.CreateRepo(repo, opts); err != nil {
  195. return err
  196. }
  197. defer uploader.Close()
  198. log.Trace("migrating topics")
  199. messenger("repo.migrate.migrating_topics")
  200. topics, err := downloader.GetTopics()
  201. if err != nil {
  202. if !base.IsErrNotSupported(err) {
  203. return err
  204. }
  205. log.Warn("migrating topics is not supported, ignored")
  206. }
  207. if len(topics) != 0 {
  208. if err = uploader.CreateTopics(topics...); err != nil {
  209. return err
  210. }
  211. }
  212. if opts.Milestones {
  213. log.Trace("migrating milestones")
  214. messenger("repo.migrate.migrating_milestones")
  215. milestones, err := downloader.GetMilestones()
  216. if err != nil {
  217. if !base.IsErrNotSupported(err) {
  218. return err
  219. }
  220. log.Warn("migrating milestones is not supported, ignored")
  221. }
  222. msBatchSize := uploader.MaxBatchInsertSize("milestone")
  223. for len(milestones) > 0 {
  224. if len(milestones) < msBatchSize {
  225. msBatchSize = len(milestones)
  226. }
  227. if err := uploader.CreateMilestones(milestones...); err != nil {
  228. return err
  229. }
  230. milestones = milestones[msBatchSize:]
  231. }
  232. }
  233. if opts.Labels {
  234. log.Trace("migrating labels")
  235. messenger("repo.migrate.migrating_labels")
  236. labels, err := downloader.GetLabels()
  237. if err != nil {
  238. if !base.IsErrNotSupported(err) {
  239. return err
  240. }
  241. log.Warn("migrating labels is not supported, ignored")
  242. }
  243. lbBatchSize := uploader.MaxBatchInsertSize("label")
  244. for len(labels) > 0 {
  245. if len(labels) < lbBatchSize {
  246. lbBatchSize = len(labels)
  247. }
  248. if err := uploader.CreateLabels(labels[:lbBatchSize]...); err != nil {
  249. return err
  250. }
  251. labels = labels[lbBatchSize:]
  252. }
  253. }
  254. if opts.Releases {
  255. log.Trace("migrating releases")
  256. messenger("repo.migrate.migrating_releases")
  257. releases, err := downloader.GetReleases()
  258. if err != nil {
  259. if !base.IsErrNotSupported(err) {
  260. return err
  261. }
  262. log.Warn("migrating releases is not supported, ignored")
  263. }
  264. relBatchSize := uploader.MaxBatchInsertSize("release")
  265. for len(releases) > 0 {
  266. if len(releases) < relBatchSize {
  267. relBatchSize = len(releases)
  268. }
  269. if err = uploader.CreateReleases(releases[:relBatchSize]...); err != nil {
  270. return err
  271. }
  272. releases = releases[relBatchSize:]
  273. }
  274. // Once all releases (if any) are inserted, sync any remaining non-release tags
  275. if err = uploader.SyncTags(); err != nil {
  276. return err
  277. }
  278. }
  279. var (
  280. commentBatchSize = uploader.MaxBatchInsertSize("comment")
  281. reviewBatchSize = uploader.MaxBatchInsertSize("review")
  282. )
  283. supportAllComments := downloader.SupportGetRepoComments()
  284. if opts.Issues {
  285. log.Trace("migrating issues and comments")
  286. messenger("repo.migrate.migrating_issues")
  287. issueBatchSize := uploader.MaxBatchInsertSize("issue")
  288. for i := 1; ; i++ {
  289. issues, isEnd, err := downloader.GetIssues(i, issueBatchSize)
  290. if err != nil {
  291. if !base.IsErrNotSupported(err) {
  292. return err
  293. }
  294. log.Warn("migrating issues is not supported, ignored")
  295. break
  296. }
  297. if err := uploader.CreateIssues(issues...); err != nil {
  298. return err
  299. }
  300. if opts.Comments && !supportAllComments {
  301. allComments := make([]*base.Comment, 0, commentBatchSize)
  302. for _, issue := range issues {
  303. log.Trace("migrating issue %d's comments", issue.Number)
  304. comments, _, err := downloader.GetComments(issue)
  305. if err != nil {
  306. if !base.IsErrNotSupported(err) {
  307. return err
  308. }
  309. log.Warn("migrating comments is not supported, ignored")
  310. }
  311. allComments = append(allComments, comments...)
  312. if len(allComments) >= commentBatchSize {
  313. if err = uploader.CreateComments(allComments[:commentBatchSize]...); err != nil {
  314. return err
  315. }
  316. allComments = allComments[commentBatchSize:]
  317. }
  318. }
  319. if len(allComments) > 0 {
  320. if err = uploader.CreateComments(allComments...); err != nil {
  321. return err
  322. }
  323. }
  324. }
  325. if isEnd {
  326. break
  327. }
  328. }
  329. }
  330. if opts.PullRequests {
  331. log.Trace("migrating pull requests and comments")
  332. messenger("repo.migrate.migrating_pulls")
  333. prBatchSize := uploader.MaxBatchInsertSize("pullrequest")
  334. for i := 1; ; i++ {
  335. prs, isEnd, err := downloader.GetPullRequests(i, prBatchSize)
  336. if err != nil {
  337. if !base.IsErrNotSupported(err) {
  338. return err
  339. }
  340. log.Warn("migrating pull requests is not supported, ignored")
  341. break
  342. }
  343. if err := uploader.CreatePullRequests(prs...); err != nil {
  344. return err
  345. }
  346. if opts.Comments {
  347. if !supportAllComments {
  348. // plain comments
  349. allComments := make([]*base.Comment, 0, commentBatchSize)
  350. for _, pr := range prs {
  351. log.Trace("migrating pull request %d's comments", pr.Number)
  352. comments, _, err := downloader.GetComments(pr)
  353. if err != nil {
  354. if !base.IsErrNotSupported(err) {
  355. return err
  356. }
  357. log.Warn("migrating comments is not supported, ignored")
  358. }
  359. allComments = append(allComments, comments...)
  360. if len(allComments) >= commentBatchSize {
  361. if err = uploader.CreateComments(allComments[:commentBatchSize]...); err != nil {
  362. return err
  363. }
  364. allComments = allComments[commentBatchSize:]
  365. }
  366. }
  367. if len(allComments) > 0 {
  368. if err = uploader.CreateComments(allComments...); err != nil {
  369. return err
  370. }
  371. }
  372. }
  373. // migrate reviews
  374. allReviews := make([]*base.Review, 0, reviewBatchSize)
  375. for _, pr := range prs {
  376. reviews, err := downloader.GetReviews(pr)
  377. if err != nil {
  378. if !base.IsErrNotSupported(err) {
  379. return err
  380. }
  381. log.Warn("migrating reviews is not supported, ignored")
  382. break
  383. }
  384. allReviews = append(allReviews, reviews...)
  385. if len(allReviews) >= reviewBatchSize {
  386. if err = uploader.CreateReviews(allReviews[:reviewBatchSize]...); err != nil {
  387. return err
  388. }
  389. allReviews = allReviews[reviewBatchSize:]
  390. }
  391. }
  392. if len(allReviews) > 0 {
  393. if err = uploader.CreateReviews(allReviews...); err != nil {
  394. return err
  395. }
  396. }
  397. }
  398. if isEnd {
  399. break
  400. }
  401. }
  402. }
  403. if opts.Comments && supportAllComments {
  404. log.Trace("migrating comments")
  405. for i := 1; ; i++ {
  406. comments, isEnd, err := downloader.GetAllComments(i, commentBatchSize)
  407. if err != nil {
  408. return err
  409. }
  410. if err := uploader.CreateComments(comments...); err != nil {
  411. return err
  412. }
  413. if isEnd {
  414. break
  415. }
  416. }
  417. }
  418. return uploader.Finish()
  419. }
  420. // Init migrations service
  421. func Init() error {
  422. // TODO: maybe we can deprecate these legacy ALLOWED_DOMAINS/ALLOW_LOCALNETWORKS/BLOCKED_DOMAINS, use ALLOWED_HOST_LIST/BLOCKED_HOST_LIST instead
  423. blockList = hostmatcher.ParseSimpleMatchList("migrations.BLOCKED_DOMAINS", setting.Migrations.BlockedDomains)
  424. allowList = hostmatcher.ParseSimpleMatchList("migrations.ALLOWED_DOMAINS/ALLOW_LOCALNETWORKS", setting.Migrations.AllowedDomains)
  425. if allowList.IsEmpty() {
  426. // the default policy is that migration module can access external hosts
  427. allowList.AppendBuiltin(hostmatcher.MatchBuiltinExternal)
  428. }
  429. if setting.Migrations.AllowLocalNetworks {
  430. allowList.AppendBuiltin(hostmatcher.MatchBuiltinPrivate)
  431. allowList.AppendBuiltin(hostmatcher.MatchBuiltinLoopback)
  432. }
  433. // TODO: at the moment, if ALLOW_LOCALNETWORKS=false, ALLOWED_DOMAINS=domain.com, and domain.com has IP 127.0.0.1, then it's still allowed.
  434. // if we want to block such case, the private&loopback should be added to the blockList when ALLOW_LOCALNETWORKS=false
  435. if setting.Proxy.Enabled && setting.Proxy.ProxyURLFixed != nil {
  436. allowList.AppendPattern(setting.Proxy.ProxyURLFixed.Host)
  437. }
  438. return nil
  439. }