// Copyright 2019 Sorint.lab // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied // See the License for the specific language governing permissions and // limitations under the License. package gitea import ( "context" "crypto/tls" "encoding/base64" "encoding/json" "fmt" "net" "net/http" "path" "regexp" "strconv" "strings" "time" "agola.io/agola/internal/errors" gitsource "agola.io/agola/internal/gitsources" "code.gitea.io/sdk/gitea" "golang.org/x/oauth2" ) const ( // TODO(sgotti) The gitea client doesn't provide an easy way to detect http response codes... // https://gitea.com/gitea/go-sdk/issues/303 ClientNotFound = "404 Not Found" ) var ( // gitea corrently doesn't have any auth scope GiteaOauth2Scopes = []string{""} branchRefPrefix = "refs/heads/" tagRefPrefix = "refs/tags/" pullRequestRefRegex = regexp.MustCompile("refs/pull/(.*)/head") pullRequestRefFmt = "refs/pull/%s/head" ) type Opts struct { APIURL string Token string SkipVerify bool Oauth2ClientID string Oauth2Secret string } type Client struct { client *gitea.Client oauth2HTTPClient *http.Client APIURL string oauth2ClientID string oauth2Secret string } // fromCommitStatus converts a gitsource commit status to a gitea commit status func fromCommitStatus(status gitsource.CommitStatus) gitea.StatusState { switch status { case gitsource.CommitStatusPending: return gitea.StatusPending case gitsource.CommitStatusSuccess: return gitea.StatusSuccess case gitsource.CommitStatusError: return gitea.StatusError case gitsource.CommitStatusFailed: return gitea.StatusFailure default: panic(errors.Errorf("unknown commit status %q", status)) } } func parseRepoPath(repopath string) (string, string, error) { parts := strings.Split(repopath, "/") if len(parts) != 2 { return "", "", errors.Errorf("wrong gitea repo path: %q", repopath) } return parts[0], parts[1], nil } func New(opts Opts) (*Client, error) { // copied from net/http until it has a clone function: https://github.com/golang/go/issues/26013 transport := &http.Transport{ Proxy: http.ProxyFromEnvironment, DialContext: (&net.Dialer{ Timeout: 30 * time.Second, KeepAlive: 30 * time.Second, DualStack: true, }).DialContext, MaxIdleConns: 100, IdleConnTimeout: 90 * time.Second, TLSHandshakeTimeout: 10 * time.Second, ExpectContinueTimeout: 1 * time.Second, TLSClientConfig: &tls.Config{InsecureSkipVerify: opts.SkipVerify}, } httpClient := &http.Client{Transport: transport} client := gitea.NewClient(opts.APIURL, opts.Token) client.SetHTTPClient(httpClient) return &Client{ client: client, oauth2HTTPClient: httpClient, APIURL: opts.APIURL, oauth2ClientID: opts.Oauth2ClientID, oauth2Secret: opts.Oauth2Secret, }, nil } func (c *Client) oauth2Config(callbackURL string) *oauth2.Config { return &oauth2.Config{ ClientID: c.oauth2ClientID, ClientSecret: c.oauth2Secret, Scopes: GiteaOauth2Scopes, Endpoint: oauth2.Endpoint{ AuthURL: fmt.Sprintf("%s/login/oauth/authorize", c.APIURL), TokenURL: fmt.Sprintf("%s/login/oauth/access_token", c.APIURL), }, RedirectURL: callbackURL, } } func (c *Client) GetOauth2AuthorizationURL(callbackURL, state string) (string, error) { var config = c.oauth2Config(callbackURL) return config.AuthCodeURL(state), nil } func (c *Client) RequestOauth2Token(callbackURL, code string) (*oauth2.Token, error) { ctx := context.TODO() ctx = context.WithValue(ctx, oauth2.HTTPClient, c.oauth2HTTPClient) var config = c.oauth2Config(callbackURL) token, err := config.Exchange(ctx, code) if err != nil { return nil, errors.Wrapf(err, "cannot get oauth2 token") } return token, nil } func (c *Client) RefreshOauth2Token(refreshToken string) (*oauth2.Token, error) { ctx := context.TODO() ctx = context.WithValue(ctx, oauth2.HTTPClient, c.oauth2HTTPClient) var config = c.oauth2Config("") token := &oauth2.Token{RefreshToken: refreshToken} ts := config.TokenSource(ctx, token) ntoken, err := ts.Token() return ntoken, errors.WithStack(err) } func (c *Client) LoginPassword(username, password, tokenName string) (string, error) { // try to get agola access token if it already exists // use custom http call since gitea api client doesn't provide an easy way to // guess if the username/password login failed // https://gitea.com/gitea/go-sdk/issues/303 var accessToken string tokens := make([]*gitea.AccessToken, 0, 10) req, err := http.NewRequest("GET", c.APIURL+"/api/v1"+fmt.Sprintf("/users/%s/tokens", username), nil) if err != nil { return "", errors.WithStack(err) } req.Header.Set("Authorization", "Basic "+base64.StdEncoding.EncodeToString([]byte(username+":"+password))) resp, err := c.oauth2HTTPClient.Do(req) if err != nil { return "", errors.WithStack(err) } if resp.StatusCode == http.StatusUnauthorized { return "", errors.WithStack(gitsource.ErrUnauthorized) } if resp.StatusCode/100 != 2 { return "", errors.Errorf("gitea api status code %d", resp.StatusCode) } defer resp.Body.Close() dec := json.NewDecoder(resp.Body) if err := dec.Decode(&tokens); err != nil { return "", errors.WithStack(err) } for _, token := range tokens { if token.Name == tokenName { accessToken = token.Token break } } // create access token if accessToken == "" { c.client.SetBasicAuth(username, password) token, terr := c.client.CreateAccessToken( gitea.CreateAccessTokenOption{Name: tokenName}, ) if terr != nil { return "", errors.WithStack(terr) } accessToken = token.Token } return accessToken, nil } func (c *Client) GetUserInfo() (*gitsource.UserInfo, error) { user, err := c.client.GetMyUserInfo() if err != nil { return nil, errors.WithStack(err) } return &gitsource.UserInfo{ ID: strconv.FormatInt(user.ID, 10), LoginName: user.UserName, Email: user.Email, }, nil } func (c *Client) GetRepoInfo(repopath string) (*gitsource.RepoInfo, error) { owner, reponame, err := parseRepoPath(repopath) if err != nil { return nil, errors.WithStack(err) } rr, err := c.client.GetRepo(owner, reponame) if err != nil { return nil, errors.WithStack(err) } return fromGiteaRepo(rr), nil } func (c *Client) GetFile(repopath, commit, file string) ([]byte, error) { owner, reponame, err := parseRepoPath(repopath) if err != nil { return nil, errors.WithStack(err) } data, err := c.client.GetFile(owner, reponame, commit, file) return data, errors.WithStack(err) } func (c *Client) CreateDeployKey(repopath, title, pubKey string, readonly bool) error { owner, reponame, err := parseRepoPath(repopath) if err != nil { return errors.WithStack(err) } if _, err = c.client.CreateDeployKey(owner, reponame, gitea.CreateKeyOption{ Title: title, Key: pubKey, ReadOnly: readonly, }); err != nil { return errors.Wrapf(err, "error creating deploy key") } return nil } func (c *Client) UpdateDeployKey(repopath, title, pubKey string, readonly bool) error { owner, reponame, err := parseRepoPath(repopath) if err != nil { return errors.WithStack(err) } // NOTE(sgotti) gitea has a bug where if we delete and remove the same key with // the same value it is correctly readded and the admin must force a // authorized_keys regeneration on the server. To avoid this we update it only // when the public key value has changed keys, err := c.client.ListDeployKeys(owner, reponame, gitea.ListDeployKeysOptions{}) if err != nil { return errors.Wrapf(err, "error retrieving existing deploy keys") } for _, key := range keys { if key.Title == title { if key.Key == pubKey { return nil } if err := c.client.DeleteDeployKey(owner, reponame, key.ID); err != nil { return errors.Wrapf(err, "error removing existing deploy key") } } } if _, err := c.client.CreateDeployKey(owner, reponame, gitea.CreateKeyOption{ Title: title, Key: pubKey, ReadOnly: readonly, }); err != nil { return errors.Wrapf(err, "error creating deploy key") } return nil } func (c *Client) DeleteDeployKey(repopath, title string) error { owner, reponame, err := parseRepoPath(repopath) if err != nil { return errors.WithStack(err) } keys, err := c.client.ListDeployKeys(owner, reponame, gitea.ListDeployKeysOptions{}) if err != nil { return errors.Wrapf(err, "error retrieving existing deploy keys") } for _, key := range keys { if key.Title == title { if err := c.client.DeleteDeployKey(owner, reponame, key.ID); err != nil { return errors.Wrapf(err, "error removing existing deploy key") } } } return nil } func (c *Client) CreateRepoWebhook(repopath, url, secret string) error { owner, reponame, err := parseRepoPath(repopath) if err != nil { return errors.WithStack(err) } opts := gitea.CreateHookOption{ Type: "gitea", Config: map[string]string{ "url": url, "content_type": "json", "secret": secret, }, Events: []string{"push", "pull_request"}, Active: true, } if _, err = c.client.CreateRepoHook(owner, reponame, opts); err != nil { return errors.Wrapf(err, "error creating repository webhook") } return nil } func (c *Client) DeleteRepoWebhook(repopath, u string) error { owner, reponame, err := parseRepoPath(repopath) if err != nil { return errors.WithStack(err) } hooks, err := c.client.ListRepoHooks(owner, reponame, gitea.ListHooksOptions{}) if err != nil { return errors.Wrapf(err, "error retrieving repository webhooks") } // match the full url so we can have multiple webhooks for different agola // projects for _, hook := range hooks { if hook.Config["url"] == u { if err := c.client.DeleteRepoHook(owner, reponame, hook.ID); err != nil { return errors.Wrapf(err, "error deleting existing repository webhook") } } } return nil } func (c *Client) CreateCommitStatus(repopath, commitSHA string, status gitsource.CommitStatus, targetURL, description, context string) error { owner, reponame, err := parseRepoPath(repopath) if err != nil { return errors.WithStack(err) } _, err = c.client.CreateStatus(owner, reponame, commitSHA, gitea.CreateStatusOption{ State: fromCommitStatus(status), TargetURL: targetURL, Description: description, Context: context, }) return errors.WithStack(err) } func (c *Client) ListUserRepos() ([]*gitsource.RepoInfo, error) { page := 1 repos := []*gitsource.RepoInfo{} for { remoteRepos, err := c.client.ListMyRepos( gitea.ListReposOptions{ ListOptions: gitea.ListOptions{ Page: page, PageSize: 50, // Gitea SDK limit per page. }, }, ) if err != nil { return []*gitsource.RepoInfo{}, errors.WithStack(err) } for _, repo := range remoteRepos { if !repo.Permissions.Admin { continue } repos = append(repos, fromGiteaRepo(repo)) } // Check if no more repos are available if len(remoteRepos) == 0 { break } else { page = page + 1 } } return repos, nil } func fromGiteaRepo(rr *gitea.Repository) *gitsource.RepoInfo { return &gitsource.RepoInfo{ ID: strconv.FormatInt(rr.ID, 10), Path: path.Join(rr.Owner.UserName, rr.Name), HTMLURL: rr.HTMLURL, SSHCloneURL: rr.SSHURL, HTTPCloneURL: rr.CloneURL, } } func (c *Client) GetRef(repopath, ref string) (*gitsource.Ref, error) { owner, reponame, err := parseRepoPath(repopath) if err != nil { return nil, errors.WithStack(err) } remoteRefs, err := c.client.GetRepoRefs(owner, reponame, ref) if err != nil { return nil, errors.WithStack(err) } if len(remoteRefs) == 0 { return nil, errors.Errorf("no ref %q for repository %q", ref, repopath) } if len(remoteRefs) != 1 { return nil, errors.Errorf("no exact match found for ref %q for repository %q", ref, repopath) } return fromGiteaRef(remoteRefs[0]) } func fromGiteaRef(remoteRef *gitea.Reference) (*gitsource.Ref, error) { t := remoteRef.Object.Type switch t { case "commit": default: return nil, errors.Errorf("unsupported object type: %s", t) } return &gitsource.Ref{ Ref: remoteRef.Ref, CommitSHA: remoteRef.Object.SHA, }, nil } func (c *Client) RefType(ref string) (gitsource.RefType, string, error) { switch { case strings.HasPrefix(ref, branchRefPrefix): return gitsource.RefTypeBranch, strings.TrimPrefix(ref, branchRefPrefix), nil case strings.HasPrefix(ref, tagRefPrefix): return gitsource.RefTypeTag, strings.TrimPrefix(ref, tagRefPrefix), nil case pullRequestRefRegex.MatchString(ref): m := pullRequestRefRegex.FindStringSubmatch(ref) return gitsource.RefTypePullRequest, m[1], nil default: return -1, "", errors.Errorf("unsupported ref: %s", ref) } } func (c *Client) GetCommit(repopath, commitSHA string) (*gitsource.Commit, error) { owner, reponame, err := parseRepoPath(repopath) if err != nil { return nil, errors.WithStack(err) } commit, err := c.client.GetSingleCommit(owner, reponame, commitSHA) if err != nil { return nil, errors.WithStack(err) } return &gitsource.Commit{ SHA: commit.SHA, Message: commit.RepoCommit.Message, }, nil } func (c *Client) BranchRef(branch string) string { return branchRefPrefix + branch } func (c *Client) TagRef(tag string) string { return tagRefPrefix + tag } func (c *Client) PullRequestRef(prID string) string { return fmt.Sprintf(pullRequestRefFmt, prID) } func (c *Client) CommitLink(repoInfo *gitsource.RepoInfo, commitSHA string) string { return fmt.Sprintf("%s/commit/%s", repoInfo.HTMLURL, commitSHA) } func (c *Client) BranchLink(repoInfo *gitsource.RepoInfo, branch string) string { return fmt.Sprintf("%s/src/branch/%s", repoInfo.HTMLURL, branch) } func (c *Client) TagLink(repoInfo *gitsource.RepoInfo, tag string) string { return fmt.Sprintf("%s/src/tag/%s", repoInfo.HTMLURL, tag) } func (c *Client) PullRequestLink(repoInfo *gitsource.RepoInfo, prID string) string { return fmt.Sprintf("%s/pulls/%s", repoInfo.HTMLURL, prID) }