diff options
Diffstat (limited to 'git_hooks_handle.go')
-rw-r--r-- | git_hooks_handle.go | 348 |
1 files changed, 173 insertions, 175 deletions
diff --git a/git_hooks_handle.go b/git_hooks_handle.go index e23b7ce..0bf7b88 100644 --- a/git_hooks_handle.go +++ b/git_hooks_handle.go @@ -24,22 +24,22 @@ import ( ) var ( - err_get_fd = errors.New("unable to get file descriptor") - err_get_ucred = errors.New("failed getsockopt") + errGetFD = errors.New("unable to get file descriptor") + errGetUcred = errors.New("failed getsockopt") ) -// hooks_handle_connection handles a connection from hookc via the +// hooksHandler handles a connection from hookc via the // unix socket. -func hooks_handle_connection(conn net.Conn) { +func hooksHandler(conn net.Conn) { var ctx context.Context var cancel context.CancelFunc var ucred *syscall.Ucred var err error var cookie []byte - var pack_to_hook pack_to_hook_t - var ssh_stderr io.Writer + var packPass packPass + var sshStderr io.Writer var ok bool - var hook_return_value byte + var hookRet byte defer conn.Close() ctx, cancel = context.WithCancel(context.Background()) @@ -47,18 +47,18 @@ func hooks_handle_connection(conn net.Conn) { // There aren't reasonable cases where someone would run this as // another user. - if ucred, err = get_ucred(conn); err != nil { + if ucred, err = getUcred(conn); err != nil { if _, err = conn.Write([]byte{1}); err != nil { return } - wf_error(conn, "\nUnable to get peer credentials: %v", err) + writeRedError(conn, "\nUnable to get peer credentials: %v", err) return } if ucred.Uid != uint32(os.Getuid()) { if _, err = conn.Write([]byte{1}); err != nil { return } - wf_error(conn, "\nUID mismatch") + writeRedError(conn, "\nUID mismatch") return } @@ -67,27 +67,27 @@ func hooks_handle_connection(conn net.Conn) { if _, err = conn.Write([]byte{1}); err != nil { return } - wf_error(conn, "\nFailed to read cookie: %v", err) + writeRedError(conn, "\nFailed to read cookie: %v", err) return } - pack_to_hook, ok = pack_to_hook_by_cookie.Load(string(cookie)) + packPass, ok = packPasses.Load(string(cookie)) if !ok { if _, err = conn.Write([]byte{1}); err != nil { return } - wf_error(conn, "\nInvalid handler cookie") + writeRedError(conn, "\nInvalid handler cookie") return } - ssh_stderr = pack_to_hook.session.Stderr() + sshStderr = packPass.session.Stderr() - _, _ = ssh_stderr.Write([]byte{'\n'}) + _, _ = sshStderr.Write([]byte{'\n'}) - hook_return_value = func() byte { + hookRet = func() byte { var argc64 uint64 if err = binary.Read(conn, binary.NativeEndian, &argc64); err != nil { - wf_error(ssh_stderr, "Failed to read argc: %v", err) + writeRedError(sshStderr, "Failed to read argc: %v", err) return 1 } var args []string @@ -97,7 +97,7 @@ func hooks_handle_connection(conn net.Conn) { b := make([]byte, 1) n, err := conn.Read(b) if err != nil || n != 1 { - wf_error(ssh_stderr, "Failed to read arg: %v", err) + writeRedError(sshStderr, "Failed to read arg: %v", err) return 1 } if b[0] == 0 { @@ -108,215 +108,213 @@ func hooks_handle_connection(conn net.Conn) { args = append(args, arg.String()) } - git_env := make(map[string]string) + gitEnv := make(map[string]string) for { - var env_line bytes.Buffer + var envLine bytes.Buffer for { b := make([]byte, 1) n, err := conn.Read(b) if err != nil || n != 1 { - wf_error(ssh_stderr, "Failed to read environment variable: %v", err) + writeRedError(sshStderr, "Failed to read environment variable: %v", err) return 1 } if b[0] == 0 { break } - env_line.WriteByte(b[0]) + envLine.WriteByte(b[0]) } - if env_line.Len() == 0 { + if envLine.Len() == 0 { break } - kv := env_line.String() + kv := envLine.String() parts := strings.SplitN(kv, "=", 2) if len(parts) < 2 { - wf_error(ssh_stderr, "Invalid environment variable line: %v", kv) + writeRedError(sshStderr, "Invalid environment variable line: %v", kv) return 1 } - git_env[parts[0]] = parts[1] + gitEnv[parts[0]] = parts[1] } var stdin bytes.Buffer if _, err = io.Copy(&stdin, conn); err != nil { - wf_error(conn, "Failed to read to the stdin buffer: %v", err) + writeRedError(conn, "Failed to read to the stdin buffer: %v", err) } switch filepath.Base(args[0]) { case "pre-receive": - if pack_to_hook.direct_access { + if packPass.directAccess { return 0 - } else { - all_ok := true - for { - var line, old_oid, rest, new_oid, ref_name string - var found bool - var old_hash, new_hash plumbing.Hash - var old_commit, new_commit *object.Commit - var git_push_option_count int - - git_push_option_count, err = strconv.Atoi(git_env["GIT_PUSH_OPTION_COUNT"]) - if err != nil { - wf_error(ssh_stderr, "Failed to parse GIT_PUSH_OPTION_COUNT: %v", err) + } + allOK := true + for { + var line, oldOID, rest, newIOID, refName string + var found bool + var oldHash, newHash plumbing.Hash + var oldCommit, newCommit *object.Commit + var pushOptCount int + + pushOptCount, err = strconv.Atoi(gitEnv["GIT_PUSH_OPTION_COUNT"]) + if err != nil { + writeRedError(sshStderr, "Failed to parse GIT_PUSH_OPTION_COUNT: %v", err) + return 1 + } + + // TODO: Allow existing users (even if they are already federated or registered) to add a federated user ID... though perhaps this should be in the normal SSH interface instead of the git push interface? + // Also it'd be nice to be able to combine users or whatever + if packPass.contribReq == "federated" && packPass.userType != "federated" && packPass.userType != "registered" { + if pushOptCount == 0 { + writeRedError(sshStderr, "This repo requires contributors to be either federated or registered users. You must supply your federated user ID as a push option. For example, git push -o fedid=sr.ht:runxiyu") return 1 } - - // TODO: Allow existing users (even if they are already federated or registered) to add a federated user ID... though perhaps this should be in the normal SSH interface instead of the git push interface? - // Also it'd be nice to be able to combine users or whatever - if pack_to_hook.contrib_requirements == "federated" && pack_to_hook.user_type != "federated" && pack_to_hook.user_type != "registered" { - if git_push_option_count == 0 { - wf_error(ssh_stderr, "This repo requires contributors to be either federated or registered users. You must supply your federated user ID as a push option. For example, git push -o fedid=sr.ht:runxiyu") + for i := 0; i < pushOptCount; i++ { + pushOpt, ok := gitEnv[fmt.Sprintf("GIT_PUSH_OPTION_%d", i)] + if !ok { + writeRedError(sshStderr, "Failed to get push option %d", i) return 1 } - for i := 0; i < git_push_option_count; i++ { - push_option, ok := git_env[fmt.Sprintf("GIT_PUSH_OPTION_%d", i)] - if !ok { - wf_error(ssh_stderr, "Failed to get push option %d", i) + if strings.HasPrefix(pushOpt, "fedid=") { + fedUserID := strings.TrimPrefix(pushOpt, "fedid=") + service, username, found := strings.Cut(fedUserID, ":") + if !found { + writeRedError(sshStderr, "Invalid federated user identifier %#v does not contain a colon", fedUserID) return 1 } - if strings.HasPrefix(push_option, "fedid=") { - federated_user_identifier := strings.TrimPrefix(push_option, "fedid=") - service, username, found := strings.Cut(federated_user_identifier, ":") - if !found { - wf_error(ssh_stderr, "Invalid federated user identifier %#v does not contain a colon", federated_user_identifier) - return 1 - } - - ok, err := check_and_update_federated_user_status(ctx, pack_to_hook.user_id, service, username, pack_to_hook.pubkey) - if err != nil { - wf_error(ssh_stderr, "Failed to verify federated user identifier %#v: %v", federated_user_identifier, err) - return 1 - } - if !ok { - wf_error(ssh_stderr, "Failed to verify federated user identifier %#v: you don't seem to be on the list", federated_user_identifier) - return 1 - } - - break + + ok, err := fedauth(ctx, packPass.userID, service, username, packPass.pubkey) + if err != nil { + writeRedError(sshStderr, "Failed to verify federated user identifier %#v: %v", fedUserID, err) + return 1 } - if i == git_push_option_count-1 { - wf_error(ssh_stderr, "This repo requires contributors to be either federated or registered users. You must supply your federated user ID as a push option. For example, git push -o fedid=sr.ht:runxiyu") + if !ok { + writeRedError(sshStderr, "Failed to verify federated user identifier %#v: you don't seem to be on the list", fedUserID) return 1 } - } - } - - line, err = stdin.ReadString('\n') - if errors.Is(err, io.EOF) { - break - } else if err != nil { - wf_error(ssh_stderr, "Failed to read pre-receive line: %v", err) - return 1 - } - line = line[:len(line)-1] - old_oid, rest, found = strings.Cut(line, " ") - if !found { - wf_error(ssh_stderr, "Invalid pre-receive line: %v", line) - return 1 + break + } + if i == pushOptCount-1 { + writeRedError(sshStderr, "This repo requires contributors to be either federated or registered users. You must supply your federated user ID as a push option. For example, git push -o fedid=sr.ht:runxiyu") + return 1 + } } + } - new_oid, ref_name, found = strings.Cut(rest, " ") - if !found { - wf_error(ssh_stderr, "Invalid pre-receive line: %v", line) - return 1 - } + line, err = stdin.ReadString('\n') + if errors.Is(err, io.EOF) { + break + } else if err != nil { + writeRedError(sshStderr, "Failed to read pre-receive line: %v", err) + return 1 + } + line = line[:len(line)-1] - if strings.HasPrefix(ref_name, "refs/heads/contrib/") { - if all_zero_num_string(old_oid) { // New branch - fmt.Fprintln(ssh_stderr, ansiec.Blue+"POK"+ansiec.Reset, ref_name) - var new_mr_id int + oldOID, rest, found = strings.Cut(line, " ") + if !found { + writeRedError(sshStderr, "Invalid pre-receive line: %v", line) + return 1 + } - err = database.QueryRow(ctx, - "INSERT INTO merge_requests (repo_id, creator, source_ref, status) VALUES ($1, $2, $3, 'open') RETURNING id", - pack_to_hook.repo_id, pack_to_hook.user_id, strings.TrimPrefix(ref_name, "refs/heads/"), - ).Scan(&new_mr_id) - if err != nil { - wf_error(ssh_stderr, "Error creating merge request: %v", err) - return 1 - } - fmt.Fprintln(ssh_stderr, ansiec.Blue+"Created merge request at", generate_http_remote_url(pack_to_hook.group_path, pack_to_hook.repo_name)+"/contrib/"+strconv.FormatUint(uint64(new_mr_id), 10)+"/"+ansiec.Reset) - } else { // Existing contrib branch - var existing_merge_request_user_id int - var is_ancestor bool - - err = database.QueryRow(ctx, - "SELECT COALESCE(creator, 0) FROM merge_requests WHERE source_ref = $1 AND repo_id = $2", - strings.TrimPrefix(ref_name, "refs/heads/"), pack_to_hook.repo_id, - ).Scan(&existing_merge_request_user_id) - if err != nil { - if errors.Is(err, pgx.ErrNoRows) { - wf_error(ssh_stderr, "No existing merge request for existing contrib branch: %v", err) - } else { - wf_error(ssh_stderr, "Error querying for existing merge request: %v", err) - } - return 1 - } - if existing_merge_request_user_id == 0 { - all_ok = false - fmt.Fprintln(ssh_stderr, ansiec.Red+"NAK"+ansiec.Reset, ref_name, "(branch belongs to unowned MR)") - continue - } + newIOID, refName, found = strings.Cut(rest, " ") + if !found { + writeRedError(sshStderr, "Invalid pre-receive line: %v", line) + return 1 + } - if existing_merge_request_user_id != pack_to_hook.user_id { - all_ok = false - fmt.Fprintln(ssh_stderr, ansiec.Red+"NAK"+ansiec.Reset, ref_name, "(branch belongs another user's MR)") - continue + if strings.HasPrefix(refName, "refs/heads/contrib/") { + if allZero(oldOID) { // New branch + fmt.Fprintln(sshStderr, ansiec.Blue+"POK"+ansiec.Reset, refName) + var newMRID int + + err = database.QueryRow(ctx, + "INSERT INTO merge_requests (repo_id, creator, source_ref, status) VALUES ($1, $2, $3, 'open') RETURNING id", + packPass.repoID, packPass.userID, strings.TrimPrefix(refName, "refs/heads/"), + ).Scan(&newMRID) + if err != nil { + writeRedError(sshStderr, "Error creating merge request: %v", err) + return 1 + } + fmt.Fprintln(sshStderr, ansiec.Blue+"Created merge request at", genHTTPRemoteURL(packPass.groupPath, packPass.repoName)+"/contrib/"+strconv.FormatUint(uint64(newMRID), 10)+"/"+ansiec.Reset) + } else { // Existing contrib branch + var existingMRUser int + var isAncestor bool + + err = database.QueryRow(ctx, + "SELECT COALESCE(creator, 0) FROM merge_requests WHERE source_ref = $1 AND repo_id = $2", + strings.TrimPrefix(refName, "refs/heads/"), packPass.repoID, + ).Scan(&existingMRUser) + if err != nil { + if errors.Is(err, pgx.ErrNoRows) { + writeRedError(sshStderr, "No existing merge request for existing contrib branch: %v", err) + } else { + writeRedError(sshStderr, "Error querying for existing merge request: %v", err) } + return 1 + } + if existingMRUser == 0 { + allOK = false + fmt.Fprintln(sshStderr, ansiec.Red+"NAK"+ansiec.Reset, refName, "(branch belongs to unowned MR)") + continue + } - old_hash = plumbing.NewHash(old_oid) + if existingMRUser != packPass.userID { + allOK = false + fmt.Fprintln(sshStderr, ansiec.Red+"NAK"+ansiec.Reset, refName, "(branch belongs another user's MR)") + continue + } - if old_commit, err = pack_to_hook.repo.CommitObject(old_hash); err != nil { - wf_error(ssh_stderr, "Daemon failed to get old commit: %v", err) - return 1 - } + oldHash = plumbing.NewHash(oldOID) - // Potential BUG: I'm not sure if new_commit is guaranteed to be - // detectable as they haven't been merged into the main repo's - // objects yet. But it seems to work, and I don't think there's - // any reason for this to only work intermitently. - new_hash = plumbing.NewHash(new_oid) - if new_commit, err = pack_to_hook.repo.CommitObject(new_hash); err != nil { - wf_error(ssh_stderr, "Daemon failed to get new commit: %v", err) - return 1 - } + if oldCommit, err = packPass.repo.CommitObject(oldHash); err != nil { + writeRedError(sshStderr, "Daemon failed to get old commit: %v", err) + return 1 + } - if is_ancestor, err = old_commit.IsAncestor(new_commit); err != nil { - wf_error(ssh_stderr, "Daemon failed to check if old commit is ancestor: %v", err) - return 1 - } + // Potential BUG: I'm not sure if new_commit is guaranteed to be + // detectable as they haven't been merged into the main repo's + // objects yet. But it seems to work, and I don't think there's + // any reason for this to only work intermitently. + newHash = plumbing.NewHash(newIOID) + if newCommit, err = packPass.repo.CommitObject(newHash); err != nil { + writeRedError(sshStderr, "Daemon failed to get new commit: %v", err) + return 1 + } - if !is_ancestor { - // TODO: Create MR snapshot ref instead - all_ok = false - fmt.Fprintln(ssh_stderr, ansiec.Red+"NAK"+ansiec.Reset, ref_name, "(force pushes are not supported yet)") - continue - } + if isAncestor, err = oldCommit.IsAncestor(newCommit); err != nil { + writeRedError(sshStderr, "Daemon failed to check if old commit is ancestor: %v", err) + return 1 + } - fmt.Fprintln(ssh_stderr, ansiec.Blue+"POK"+ansiec.Reset, ref_name) + if !isAncestor { + // TODO: Create MR snapshot ref instead + allOK = false + fmt.Fprintln(sshStderr, ansiec.Red+"NAK"+ansiec.Reset, refName, "(force pushes are not supported yet)") + continue } - } else { // Non-contrib branch - all_ok = false - fmt.Fprintln(ssh_stderr, ansiec.Red+"NAK"+ansiec.Reset, ref_name, "(you cannot push to branches outside of contrib/*)") + + fmt.Fprintln(sshStderr, ansiec.Blue+"POK"+ansiec.Reset, refName) } + } else { // Non-contrib branch + allOK = false + fmt.Fprintln(sshStderr, ansiec.Red+"NAK"+ansiec.Reset, refName, "(you cannot push to branches outside of contrib/*)") } + } - fmt.Fprintln(ssh_stderr) - if all_ok { - fmt.Fprintln(ssh_stderr, "Overall "+ansiec.Green+"ACK"+ansiec.Reset+" (all checks passed)") - return 0 - } else { - fmt.Fprintln(ssh_stderr, "Overall "+ansiec.Red+"NAK"+ansiec.Reset+" (one or more branches failed checks)") - return 1 - } + fmt.Fprintln(sshStderr) + if allOK { + fmt.Fprintln(sshStderr, "Overall "+ansiec.Green+"ACK"+ansiec.Reset+" (all checks passed)") + return 0 } + fmt.Fprintln(sshStderr, "Overall "+ansiec.Red+"NAK"+ansiec.Reset+" (one or more branches failed checks)") + return 1 default: - fmt.Fprintln(ssh_stderr, ansiec.Red+"Invalid hook:", args[0]+ansiec.Reset) + fmt.Fprintln(sshStderr, ansiec.Red+"Invalid hook:", args[0]+ansiec.Reset) return 1 } }() - fmt.Fprintln(ssh_stderr) + fmt.Fprintln(sshStderr) - _, _ = conn.Write([]byte{hook_return_value}) + _, _ = conn.Write([]byte{hookRet}) } func serveGitHooks(listener net.Listener) error { @@ -325,26 +323,26 @@ func serveGitHooks(listener net.Listener) error { if err != nil { return err } - go hooks_handle_connection(conn) + go hooksHandler(conn) } } -func get_ucred(conn net.Conn) (ucred *syscall.Ucred, err error) { - var unix_conn *net.UnixConn = conn.(*net.UnixConn) +func getUcred(conn net.Conn) (ucred *syscall.Ucred, err error) { + var unixConn = conn.(*net.UnixConn) var fd *os.File - if fd, err = unix_conn.File(); err != nil { - return nil, err_get_fd + if fd, err = unixConn.File(); err != nil { + return nil, errGetFD } defer fd.Close() if ucred, err = syscall.GetsockoptUcred(int(fd.Fd()), syscall.SOL_SOCKET, syscall.SO_PEERCRED); err != nil { - return nil, err_get_ucred + return nil, errGetUcred } return ucred, nil } -func all_zero_num_string(s string) bool { +func allZero(s string) bool { for _, r := range s { if r != '0' { return false |