aboutsummaryrefslogtreecommitdiff
path: root/ssh_handle_receive_pack.go
blob: 30825ad3688f232155301401a12bcf56a0d0eadc (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
package main

import (
	"errors"

	glider_ssh "github.com/gliderlabs/ssh"
	"github.com/go-git/go-billy/v5/osfs"
	"github.com/go-git/go-git/v5/plumbing/protocol/packp"
	"github.com/go-git/go-git/v5/plumbing/transport"
	transport_server "github.com/go-git/go-git/v5/plumbing/transport/server"
)

var err_unauthorized_push = errors.New("You are not authorized to push to this repository")

func ssh_handle_receive_pack(session glider_ssh.Session, pubkey string, repo_identifier string) (err error) {
	repo_path, access, err := get_repo_path_perms_from_ssh_path_pubkey(session.Context(), repo_identifier, pubkey)
	if err != nil {
		return err
	}
	if !access {
		return err_unauthorized_push
	}
	endpoint, err := transport.NewEndpoint("/")
	if err != nil {
		return err
	}
	billy_fs := osfs.New(repo_path)
	fs_loader := transport_server.NewFilesystemLoader(billy_fs)
	transport := transport_server.NewServer(fs_loader)
	receive_pack_session, err := transport.NewReceivePackSession(endpoint, nil)
	if err != nil {
		return err
	}
	advertised_references, err := receive_pack_session.AdvertisedReferencesContext(session.Context())
	if err != nil {
		return err
	}
	err = advertised_references.Encode(session)
	if err != nil {
		return err
	}
	reference_update_request := packp.NewReferenceUpdateRequest()
	err = reference_update_request.Decode(session)
	if err != nil {
		return err
	}
	report_status, err := receive_pack_session.ReceivePack(session.Context(), reference_update_request)
	if err != nil {
		return err
	}
	err = report_status.Encode(session)
	if err != nil {
		return err
	}
	return nil
}