// Copyright 2015 The Gogs Authors. All rights reserved. // Use of this source code is governed by a MIT-style // license that can be found in the LICENSE file. package user import ( "net/http" "code.gitea.io/gitea/models" "code.gitea.io/gitea/modules/context" "code.gitea.io/gitea/modules/convert" "code.gitea.io/gitea/modules/setting" api "code.gitea.io/gitea/modules/structs" "code.gitea.io/gitea/routers/api/v1/repo" "code.gitea.io/gitea/routers/api/v1/utils" ) // appendPrivateInformation appends the owner and key type information to api.PublicKey func appendPrivateInformation(apiKey *api.PublicKey, key *models.PublicKey, defaultUser *models.User) (*api.PublicKey, error) { if key.Type == models.KeyTypeDeploy { apiKey.KeyType = "deploy" } else if key.Type == models.KeyTypeUser { apiKey.KeyType = "user" if defaultUser.ID == key.OwnerID { apiKey.Owner = convert.ToUser(defaultUser, true, true) } else { user, err := models.GetUserByID(key.OwnerID) if err != nil { return apiKey, err } apiKey.Owner = convert.ToUser(user, true, true) } } else { apiKey.KeyType = "unknown" } apiKey.ReadOnly = key.Mode == models.AccessModeRead return apiKey, nil } func composePublicKeysAPILink() string { return setting.AppURL + "api/v1/user/keys/" } func listPublicKeys(ctx *context.APIContext, user *models.User) { var keys []*models.PublicKey var err error fingerprint := ctx.Query("fingerprint") username := ctx.Params("username") if fingerprint != "" { // Querying not just listing if username != "" { // Restrict to provided uid keys, err = models.SearchPublicKey(user.ID, fingerprint) } else { // Unrestricted keys, err = models.SearchPublicKey(0, fingerprint) } } else { // Use ListPublicKeys keys, err = models.ListPublicKeys(user.ID, utils.GetListOptions(ctx)) } if err != nil { ctx.Error(http.StatusInternalServerError, "ListPublicKeys", err) return } apiLink := composePublicKeysAPILink() apiKeys := make([]*api.PublicKey, len(keys)) for i := range keys { apiKeys[i] = convert.ToPublicKey(apiLink, keys[i]) if ctx.User.IsAdmin || ctx.User.ID == keys[i].OwnerID { apiKeys[i], _ = appendPrivateInformation(apiKeys[i], keys[i], user) } } ctx.JSON(http.StatusOK, &apiKeys) } // ListMyPublicKeys list all of the authenticated user's public keys func ListMyPublicKeys(ctx *context.APIContext) { // swagger:operation GET /user/keys user userCurrentListKeys // --- // summary: List the authenticated user's public keys // parameters: // - name: fingerprint // in: query // description: fingerprint of the key // type: string // - name: page // in: query // description: page number of results to return (1-based) // type: integer // - name: limit // in: query // description: page size of results // type: integer // produces: // - application/json // responses: // "200": // "$ref": "#/responses/PublicKeyList" listPublicKeys(ctx, ctx.User) } // ListPublicKeys list the given user's public keys func ListPublicKeys(ctx *context.APIContext) { // swagger:operation GET /users/{username}/keys user userListKeys // --- // summary: List the given user's public keys // produces: // - application/json // parameters: // - name: username // in: path // description: username of user // type: string // required: true // - name: fingerprint // in: query // description: fingerprint of the key // type: string // - name: page // in: query // description: page number of results to return (1-based) // type: integer // - name: limit // in: query // description: page size of results // type: integer // responses: // "200": // "$ref": "#/responses/PublicKeyList" user := GetUserByParams(ctx) if ctx.Written() { return } listPublicKeys(ctx, user) } // GetPublicKey get a public key func GetPublicKey(ctx *context.APIContext) { // swagger:operation GET /user/keys/{id} user userCurrentGetKey // --- // summary: Get a public key // produces: // - application/json // parameters: // - name: id // in: path // description: id of key to get // type: integer // format: int64 // required: true // responses: // "200": // "$ref": "#/responses/PublicKey" // "404": // "$ref": "#/responses/notFound" key, err := models.GetPublicKeyByID(ctx.ParamsInt64(":id")) if err != nil { if models.IsErrKeyNotExist(err) { ctx.NotFound() } else { ctx.Error(http.StatusInternalServerError, "GetPublicKeyByID", err) } return } apiLink := composePublicKeysAPILink() apiKey := convert.ToPublicKey(apiLink, key) if ctx.User.IsAdmin || ctx.User.ID == key.OwnerID { apiKey, _ = appendPrivateInformation(apiKey, key, ctx.User) } ctx.JSON(http.StatusOK, apiKey) } // CreateUserPublicKey creates new public key to given user by ID. func CreateUserPublicKey(ctx *context.APIContext, form api.CreateKeyOption, uid int64) { content, err := models.CheckPublicKeyString(form.Key) if err != nil { repo.HandleCheckKeyStringError(ctx, err) return } key, err := models.AddPublicKey(uid, form.Title, content, 0) if err != nil { repo.HandleAddKeyError(ctx, err) return } apiLink := composePublicKeysAPILink() apiKey := convert.ToPublicKey(apiLink, key) if ctx.User.IsAdmin || ctx.User.ID == key.OwnerID { apiKey, _ = appendPrivateInformation(apiKey, key, ctx.User) } ctx.JSON(http.StatusCreated, apiKey) } // CreatePublicKey create one public key for me func CreatePublicKey(ctx *context.APIContext, form api.CreateKeyOption) { // swagger:operation POST /user/keys user userCurrentPostKey // --- // summary: Create a public key // consumes: // - application/json // produces: // - application/json // parameters: // - name: body // in: body // schema: // "$ref": "#/definitions/CreateKeyOption" // responses: // "201": // "$ref": "#/responses/PublicKey" // "422": // "$ref": "#/responses/validationError" CreateUserPublicKey(ctx, form, ctx.User.ID) } // DeletePublicKey delete one public key func DeletePublicKey(ctx *context.APIContext) { // swagger:operation DELETE /user/keys/{id} user userCurrentDeleteKey // --- // summary: Delete a public key // produces: // - application/json // parameters: // - name: id // in: path // description: id of key to delete // type: integer // format: int64 // required: true // responses: // "204": // "$ref": "#/responses/empty" // "403": // "$ref": "#/responses/forbidden" // "404": // "$ref": "#/responses/notFound" id := ctx.ParamsInt64(":id") externallyManaged, err := models.PublicKeyIsExternallyManaged(id) if err != nil { ctx.Error(http.StatusInternalServerError, "PublicKeyIsExternallyManaged", err) } if externallyManaged { ctx.Error(http.StatusForbidden, "", "SSH Key is externally managed for this user") } if err := models.DeletePublicKey(ctx.User, id); err != nil { if models.IsErrKeyNotExist(err) { ctx.NotFound() } else if models.IsErrKeyAccessDenied(err) { ctx.Error(http.StatusForbidden, "", "You do not have access to this key") } else { ctx.Error(http.StatusInternalServerError, "DeletePublicKey", err) } return } ctx.Status(http.StatusNoContent) }