You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

131 lines
4.0 KiB

Git LFS support v2 (#122) * Import github.com/git-lfs/lfs-test-server as lfs module base Imported commit is 3968aac269a77b73924649b9412ae03f7ccd3198 Removed: Dockerfile CONTRIBUTING.md mgmt* script/ vendor/ kvlogger.go .dockerignore .gitignore README.md * Remove config, add JWT support from github.com/mgit-at/lfs-test-server Imported commit f0cdcc5a01599c5a955dc1bbf683bb4acecdba83 * Add LFS settings * Add LFS meta object model * Add LFS routes and initialization * Import github.com/dgrijalva/jwt-go into vendor/ * Adapt LFS module: handlers, routing, meta store * Move LFS routes to /user/repo/info/lfs/* * Add request header checks to LFS BatchHandler / PostHandler * Implement LFS basic authentication * Rework JWT secret generation / load * Implement LFS SSH token authentication with JWT Specification: https://github.com/github/git-lfs/tree/master/docs/api * Integrate LFS settings into install process * Remove LFS objects when repository is deleted Only removes objects from content store when deleted repo is the only referencing repository * Make LFS module stateless Fixes bug where LFS would not work after installation without restarting Gitea * Change 500 'Internal Server Error' to 400 'Bad Request' * Change sql query to xorm call * Remove unneeded type from LFS module * Change internal imports to code.gitea.io/gitea/ * Add Gitea authors copyright * Change basic auth realm to "gitea-lfs" * Add unique indexes to LFS model * Use xorm count function in LFS check on repository delete * Return io.ReadCloser from content store and close after usage * Add LFS info to runWeb() * Export LFS content store base path * LFS file download from UI * Work around git-lfs client issue with unauthenticated requests Returning a dummy Authorization header for unauthenticated requests lets git-lfs client skip asking for auth credentials See: https://github.com/github/git-lfs/issues/1088 * Fix unauthenticated UI downloads from public repositories * Authentication check order, Finish LFS file view logic * Ignore LFS hooks if installed for current OS user Fixes Gitea UI actions for repositories tracking LFS files. Checks for minimum needed git version by parsing the semantic version string. * Hide LFS metafile diff from commit view, marking as binary * Show LFS notice if file in commit view is tracked * Add notbefore/nbf JWT claim * Correct lint suggestions - comments for structs and functions - Add comments to LFS model - Function comment for GetRandomBytesAsBase64 - LFS server function comments and lint variable suggestion * Move secret generation code out of conditional Ensures no LFS code may run with an empty secret * Do not hand out JWT tokens if LFS server support is disabled
8 years ago
  1. package jwt
  2. import (
  3. "bytes"
  4. "encoding/json"
  5. "fmt"
  6. "strings"
  7. )
  8. type Parser struct {
  9. ValidMethods []string // If populated, only these methods will be considered valid
  10. UseJSONNumber bool // Use JSON Number format in JSON decoder
  11. SkipClaimsValidation bool // Skip claims validation during token parsing
  12. }
  13. // Parse, validate, and return a token.
  14. // keyFunc will receive the parsed token and should return the key for validating.
  15. // If everything is kosher, err will be nil
  16. func (p *Parser) Parse(tokenString string, keyFunc Keyfunc) (*Token, error) {
  17. return p.ParseWithClaims(tokenString, MapClaims{}, keyFunc)
  18. }
  19. func (p *Parser) ParseWithClaims(tokenString string, claims Claims, keyFunc Keyfunc) (*Token, error) {
  20. parts := strings.Split(tokenString, ".")
  21. if len(parts) != 3 {
  22. return nil, NewValidationError("token contains an invalid number of segments", ValidationErrorMalformed)
  23. }
  24. var err error
  25. token := &Token{Raw: tokenString}
  26. // parse Header
  27. var headerBytes []byte
  28. if headerBytes, err = DecodeSegment(parts[0]); err != nil {
  29. if strings.HasPrefix(strings.ToLower(tokenString), "bearer ") {
  30. return token, NewValidationError("tokenstring should not contain 'bearer '", ValidationErrorMalformed)
  31. }
  32. return token, &ValidationError{Inner: err, Errors: ValidationErrorMalformed}
  33. }
  34. if err = json.Unmarshal(headerBytes, &token.Header); err != nil {
  35. return token, &ValidationError{Inner: err, Errors: ValidationErrorMalformed}
  36. }
  37. // parse Claims
  38. var claimBytes []byte
  39. token.Claims = claims
  40. if claimBytes, err = DecodeSegment(parts[1]); err != nil {
  41. return token, &ValidationError{Inner: err, Errors: ValidationErrorMalformed}
  42. }
  43. dec := json.NewDecoder(bytes.NewBuffer(claimBytes))
  44. if p.UseJSONNumber {
  45. dec.UseNumber()
  46. }
  47. // JSON Decode. Special case for map type to avoid weird pointer behavior
  48. if c, ok := token.Claims.(MapClaims); ok {
  49. err = dec.Decode(&c)
  50. } else {
  51. err = dec.Decode(&claims)
  52. }
  53. // Handle decode error
  54. if err != nil {
  55. return token, &ValidationError{Inner: err, Errors: ValidationErrorMalformed}
  56. }
  57. // Lookup signature method
  58. if method, ok := token.Header["alg"].(string); ok {
  59. if token.Method = GetSigningMethod(method); token.Method == nil {
  60. return token, NewValidationError("signing method (alg) is unavailable.", ValidationErrorUnverifiable)
  61. }
  62. } else {
  63. return token, NewValidationError("signing method (alg) is unspecified.", ValidationErrorUnverifiable)
  64. }
  65. // Verify signing method is in the required set
  66. if p.ValidMethods != nil {
  67. var signingMethodValid = false
  68. var alg = token.Method.Alg()
  69. for _, m := range p.ValidMethods {
  70. if m == alg {
  71. signingMethodValid = true
  72. break
  73. }
  74. }
  75. if !signingMethodValid {
  76. // signing method is not in the listed set
  77. return token, NewValidationError(fmt.Sprintf("signing method %v is invalid", alg), ValidationErrorSignatureInvalid)
  78. }
  79. }
  80. // Lookup key
  81. var key interface{}
  82. if keyFunc == nil {
  83. // keyFunc was not provided. short circuiting validation
  84. return token, NewValidationError("no Keyfunc was provided.", ValidationErrorUnverifiable)
  85. }
  86. if key, err = keyFunc(token); err != nil {
  87. // keyFunc returned an error
  88. return token, &ValidationError{Inner: err, Errors: ValidationErrorUnverifiable}
  89. }
  90. vErr := &ValidationError{}
  91. // Validate Claims
  92. if !p.SkipClaimsValidation {
  93. if err := token.Claims.Valid(); err != nil {
  94. // If the Claims Valid returned an error, check if it is a validation error,
  95. // If it was another error type, create a ValidationError with a generic ClaimsInvalid flag set
  96. if e, ok := err.(*ValidationError); !ok {
  97. vErr = &ValidationError{Inner: err, Errors: ValidationErrorClaimsInvalid}
  98. } else {
  99. vErr = e
  100. }
  101. }
  102. }
  103. // Perform validation
  104. token.Signature = parts[2]
  105. if err = token.Method.Verify(strings.Join(parts[0:2], "."), token.Signature, key); err != nil {
  106. vErr.Inner = err
  107. vErr.Errors |= ValidationErrorSignatureInvalid
  108. }
  109. if vErr.valid() {
  110. token.Valid = true
  111. return token, nil
  112. }
  113. return token, vErr
  114. }