simplegit.py
275 lines
| 10.6 KiB
| text/x-python
|
PythonLexer
r903 | # -*- coding: utf-8 -*- | |||
""" | ||||
rhodecode.lib.middleware.simplegit | ||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||||
SimpleGit middleware for handling git protocol request (push/clone etc.) | ||||
r1203 | It's implemented with basic auth function | |||
r903 | :created_on: Apr 28, 2010 | |||
:author: marcink | ||||
r1203 | :copyright: (C) 2009-2010 Marcin Kuzminski <marcin@python-works.com> | |||
r903 | :license: GPLv3, see COPYING for more details. | |||
""" | ||||
r1206 | # This program is free software: you can redistribute it and/or modify | |||
# it under the terms of the GNU General Public License as published by | ||||
# the Free Software Foundation, either version 3 of the License, or | ||||
# (at your option) any later version. | ||||
r1203 | # | |||
r620 | # This program is distributed in the hope that it will be useful, | |||
# but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||||
# GNU General Public License for more details. | ||||
r1203 | # | |||
r620 | # You should have received a copy of the GNU General Public License | |||
r1206 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |||
r635 | ||||
r903 | import os | |||
import logging | ||||
import traceback | ||||
r635 | ||||
r625 | from dulwich import server as dulserver | |||
r1275 | ||||
r625 | class SimpleGitUploadPackHandler(dulserver.UploadPackHandler): | |||
def handle(self): | ||||
write = lambda x: self.proto.write_sideband(1, x) | ||||
r1275 | graph_walker = dulserver.ProtocolGraphWalker(self, | |||
self.repo.object_store, | ||||
self.repo.get_peeled) | ||||
r625 | objects_iter = self.repo.fetch_objects( | |||
graph_walker.determine_wants, graph_walker, self.progress, | ||||
get_tagged=self.get_tagged) | ||||
# Do they want any objects? | ||||
if len(objects_iter) == 0: | ||||
return | ||||
self.progress("counting objects: %d, done.\n" % len(objects_iter)) | ||||
r1275 | dulserver.write_pack_data(dulserver.ProtocolFile(None, write), | |||
objects_iter, len(objects_iter)) | ||||
r625 | messages = [] | |||
messages.append('thank you for using rhodecode') | ||||
for msg in messages: | ||||
self.progress(msg + "\n") | ||||
# we are done | ||||
self.proto.write("0000") | ||||
dulserver.DEFAULT_HANDLERS = { | ||||
'git-upload-pack': SimpleGitUploadPackHandler, | ||||
'git-receive-pack': dulserver.ReceivePackHandler, | ||||
} | ||||
r620 | from dulwich.repo import Repo | |||
from dulwich.web import HTTPGitApplication | ||||
r903 | ||||
r620 | from paste.auth.basic import AuthBasicAuthenticator | |||
from paste.httpheaders import REMOTE_USER, AUTH_TYPE | ||||
r903 | ||||
r635 | from rhodecode.lib.auth import authfunc, HasPermissionAnyMiddleware | |||
r756 | from rhodecode.lib.utils import invalidate_cache, check_repo_fast | |||
r635 | from rhodecode.model.user import UserModel | |||
r903 | ||||
r620 | from webob.exc import HTTPNotFound, HTTPForbidden, HTTPInternalServerError | |||
log = logging.getLogger(__name__) | ||||
r1275 | ||||
r756 | def is_git(environ): | |||
r1203 | """Returns True if request's target is git server. | |||
r918 | ``HTTP_USER_AGENT`` would then have git client version given. | |||
r1203 | ||||
r756 | :param environ: | |||
""" | ||||
http_user_agent = environ.get('HTTP_USER_AGENT') | ||||
if http_user_agent and http_user_agent.startswith('git'): | ||||
return True | ||||
return False | ||||
r1275 | ||||
r620 | class SimpleGit(object): | |||
def __init__(self, application, config): | ||||
self.application = application | ||||
self.config = config | ||||
r1203 | #authenticate this git request using | |||
r620 | self.authenticate = AuthBasicAuthenticator('', authfunc) | |||
r655 | self.ipaddr = '0.0.0.0' | |||
r1293 | self.repo_name = None | |||
r655 | self.username = None | |||
self.action = None | ||||
r665 | ||||
r620 | def __call__(self, environ, start_response): | |||
if not is_git(environ): | ||||
return self.application(environ, start_response) | ||||
r665 | ||||
r655 | proxy_key = 'HTTP_X_REAL_IP' | |||
def_key = 'REMOTE_ADDR' | ||||
self.ipaddr = environ.get(proxy_key, environ.get(def_key, '0.0.0.0')) | ||||
r898 | # skip passing error to error controller | |||
environ['pylons.status_code_redirect'] = True | ||||
r665 | ||||
r918 | #====================================================================== | |||
# GET ACTION PULL or PUSH | ||||
#====================================================================== | ||||
self.action = self.__get_action(environ) | ||||
r620 | try: | |||
r918 | #================================================================== | |||
# GET REPOSITORY NAME | ||||
r1203 | #================================================================== | |||
r918 | self.repo_name = self.__get_repository(environ) | |||
r620 | except: | |||
return HTTPInternalServerError()(environ, start_response) | ||||
r918 | #====================================================================== | |||
# CHECK ANONYMOUS PERMISSION | ||||
#====================================================================== | ||||
r1283 | if self.action in ['pull', 'push']: | |||
r918 | anonymous_user = self.__get_user('default') | |||
self.username = anonymous_user.username | ||||
r1275 | anonymous_perm = self.__check_permission(self.action, | |||
anonymous_user, | ||||
self.repo_name) | ||||
r918 | ||||
if anonymous_perm is not True or anonymous_user.active is False: | ||||
if anonymous_perm is not True: | ||||
r1275 | log.debug('Not enough credentials to access this ' | |||
'repository as anonymous user') | ||||
r918 | if anonymous_user.active is False: | |||
log.debug('Anonymous access is disabled, running ' | ||||
'authentication') | ||||
#============================================================== | ||||
r1203 | # DEFAULT PERM FAILED OR ANONYMOUS ACCESS IS DISABLED SO WE | |||
r918 | # NEED TO AUTHENTICATE AND ASK FOR AUTH USER PERMISSIONS | |||
#============================================================== | ||||
r620 | ||||
r918 | if not REMOTE_USER(environ): | |||
r1293 | self.authenticate.realm = self.config['rhodecode_realm'].\ | |||
encode('utf8', 'replace') | ||||
r918 | result = self.authenticate(environ) | |||
if isinstance(result, str): | ||||
AUTH_TYPE.update(environ, 'basic') | ||||
REMOTE_USER.update(environ, result) | ||||
else: | ||||
return result.wsgi_application(environ, start_response) | ||||
#============================================================== | ||||
# CHECK PERMISSIONS FOR THIS REQUEST USING GIVEN USERNAME FROM | ||||
# BASIC AUTH | ||||
#============================================================== | ||||
r620 | ||||
r1283 | if self.action in ['pull', 'push']: | |||
r989 | username = REMOTE_USER(environ) | |||
r918 | try: | |||
user = self.__get_user(username) | ||||
self.username = user.username | ||||
except: | ||||
log.error(traceback.format_exc()) | ||||
r1275 | return HTTPInternalServerError()(environ, | |||
start_response) | ||||
r918 | ||||
#check permissions for this repository | ||||
r1275 | perm = self.__check_permission(self.action, user, | |||
self.repo_name) | ||||
r918 | if perm is not True: | |||
return HTTPForbidden()(environ, start_response) | ||||
r620 | ||||
r1275 | self.extras = {'ip': self.ipaddr, | |||
'username': self.username, | ||||
'action': self.action, | ||||
'repository': self.repo_name} | ||||
r620 | ||||
#=================================================================== | ||||
# GIT REQUEST HANDLING | ||||
#=================================================================== | ||||
self.basepath = self.config['base_path'] | ||||
self.repo_path = os.path.join(self.basepath, self.repo_name) | ||||
#quick check if that dir exists... | ||||
if check_repo_fast(self.repo_name, self.basepath): | ||||
return HTTPNotFound()(environ, start_response) | ||||
try: | ||||
app = self.__make_app() | ||||
r643 | except: | |||
r620 | log.error(traceback.format_exc()) | |||
return HTTPInternalServerError()(environ, start_response) | ||||
#invalidate cache on push | ||||
r655 | if self.action == 'push': | |||
r620 | self.__invalidate_cache(self.repo_name) | |||
r1283 | ||||
return app(environ, start_response) | ||||
r620 | ||||
def __make_app(self): | ||||
r1275 | _d = {'/' + self.repo_name: Repo(self.repo_path)} | |||
backend = dulserver.DictBackend(_d) | ||||
r620 | gitserve = HTTPGitApplication(backend) | |||
return gitserve | ||||
r918 | def __check_permission(self, action, user, repo_name): | |||
"""Checks permissions using action (push/pull) user and repository | ||||
name | ||||
r1203 | ||||
r918 | :param action: push or pull action | |||
:param user: user instance | ||||
:param repo_name: repository name | ||||
""" | ||||
if action == 'push': | ||||
if not HasPermissionAnyMiddleware('repository.write', | ||||
r1275 | 'repository.admin')(user, | |||
repo_name): | ||||
r918 | return False | |||
else: | ||||
#any other action need at least read permission | ||||
if not HasPermissionAnyMiddleware('repository.read', | ||||
'repository.write', | ||||
r1275 | 'repository.admin')(user, | |||
repo_name): | ||||
r918 | return False | |||
return True | ||||
def __get_repository(self, environ): | ||||
"""Get's repository name out of PATH_INFO header | ||||
r1203 | ||||
r918 | :param environ: environ where PATH_INFO is stored | |||
""" | ||||
try: | ||||
repo_name = '/'.join(environ['PATH_INFO'].split('/')[1:]) | ||||
if repo_name.endswith('/'): | ||||
repo_name = repo_name.rstrip('/') | ||||
except: | ||||
log.error(traceback.format_exc()) | ||||
raise | ||||
repo_name = repo_name.split('/')[0] | ||||
return repo_name | ||||
r620 | def __get_user(self, username): | |||
r635 | return UserModel().get_by_username(username, cache=True) | |||
r620 | ||||
def __get_action(self, environ): | ||||
r903 | """Maps git request commands into a pull or push command. | |||
r1203 | ||||
r620 | :param environ: | |||
""" | ||||
service = environ['QUERY_STRING'].split('=') | ||||
if len(service) > 1: | ||||
service_cmd = service[1] | ||||
r625 | mapping = {'git-receive-pack': 'push', | |||
'git-upload-pack': 'pull', | ||||
r620 | } | |||
r1275 | return mapping.get(service_cmd, | |||
service_cmd if service_cmd else 'other') | ||||
r625 | else: | |||
return 'other' | ||||
r620 | ||||
def __invalidate_cache(self, repo_name): | ||||
"""we know that some change was made to repositories and we should | ||||
invalidate the cache to see the changes right away but only for | ||||
push requests""" | ||||
r665 | invalidate_cache('get_repo_cached_%s' % repo_name) | |||