forked from
tangled.org/core
Monorepo for Tangled — https://tangled.org
1package knotserver
2
3import (
4 "compress/gzip"
5 "crypto/hmac"
6 "crypto/sha256"
7 "encoding/hex"
8 "encoding/json"
9 "errors"
10 "fmt"
11 "log"
12 "net/http"
13 "net/url"
14 "os"
15 "path/filepath"
16 "strconv"
17 "strings"
18
19 securejoin "github.com/cyphar/filepath-securejoin"
20 "github.com/gliderlabs/ssh"
21 "github.com/go-chi/chi/v5"
22 gogit "github.com/go-git/go-git/v5"
23 "github.com/go-git/go-git/v5/plumbing"
24 "github.com/go-git/go-git/v5/plumbing/object"
25 "tangled.sh/tangled.sh/core/knotserver/db"
26 "tangled.sh/tangled.sh/core/knotserver/git"
27 "tangled.sh/tangled.sh/core/patchutil"
28 "tangled.sh/tangled.sh/core/types"
29)
30
31func (h *Handle) Index(w http.ResponseWriter, r *http.Request) {
32 w.Write([]byte("This is a knot server. More info at https://tangled.sh"))
33}
34
35func (h *Handle) Capabilities(w http.ResponseWriter, r *http.Request) {
36 w.Header().Set("Content-Type", "application/json")
37
38 capabilities := map[string]any{
39 "pull_requests": map[string]any{
40 "format_patch": true,
41 "patch_submissions": true,
42 "branch_submissions": true,
43 "fork_submissions": true,
44 },
45 }
46
47 jsonData, err := json.Marshal(capabilities)
48 if err != nil {
49 http.Error(w, "Failed to serialize JSON", http.StatusInternalServerError)
50 return
51 }
52
53 w.Write(jsonData)
54}
55
56func (h *Handle) RepoIndex(w http.ResponseWriter, r *http.Request) {
57 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
58 l := h.l.With("path", path, "handler", "RepoIndex")
59 ref := chi.URLParam(r, "ref")
60 ref, _ = url.PathUnescape(ref)
61
62 gr, err := git.Open(path, ref)
63 if err != nil {
64 log.Println(err)
65 if errors.Is(err, plumbing.ErrReferenceNotFound) {
66 resp := types.RepoIndexResponse{
67 IsEmpty: true,
68 }
69 writeJSON(w, resp)
70 return
71 } else {
72 l.Error("opening repo", "error", err.Error())
73 notFound(w)
74 return
75 }
76 }
77
78 commits, err := gr.Commits()
79 total := len(commits)
80 if err != nil {
81 writeError(w, err.Error(), http.StatusInternalServerError)
82 l.Error("fetching commits", "error", err.Error())
83 return
84 }
85 if len(commits) > 10 {
86 commits = commits[:10]
87 }
88
89 branches, err := gr.Branches()
90 if err != nil {
91 l.Error("getting branches", "error", err.Error())
92 writeError(w, err.Error(), http.StatusInternalServerError)
93 return
94 }
95
96 tags, err := gr.Tags()
97 if err != nil {
98 // Non-fatal, we *should* have at least one branch to show.
99 l.Warn("getting tags", "error", err.Error())
100 }
101
102 rtags := []*types.TagReference{}
103 for _, tag := range tags {
104 tr := types.TagReference{
105 Tag: tag.TagObject(),
106 }
107
108 tr.Reference = types.Reference{
109 Name: tag.Name(),
110 Hash: tag.Hash().String(),
111 }
112
113 if tag.Message() != "" {
114 tr.Message = tag.Message()
115 }
116
117 rtags = append(rtags, &tr)
118 }
119
120 var readmeContent string
121 var readmeFile string
122 for _, readme := range h.c.Repo.Readme {
123 content, _ := gr.FileContent(readme)
124 if len(content) > 0 {
125 readmeContent = string(content)
126 readmeFile = readme
127 }
128 }
129
130 files, err := gr.FileTree("")
131 if err != nil {
132 writeError(w, err.Error(), http.StatusInternalServerError)
133 l.Error("file tree", "error", err.Error())
134 return
135 }
136
137 if ref == "" {
138 mainBranch, err := gr.FindMainBranch()
139 if err != nil {
140 writeError(w, err.Error(), http.StatusInternalServerError)
141 l.Error("finding main branch", "error", err.Error())
142 return
143 }
144 ref = mainBranch
145 }
146
147 resp := types.RepoIndexResponse{
148 IsEmpty: false,
149 Ref: ref,
150 Commits: commits,
151 Description: getDescription(path),
152 Readme: readmeContent,
153 ReadmeFileName: readmeFile,
154 Files: files,
155 Branches: branches,
156 Tags: rtags,
157 TotalCommits: total,
158 }
159
160 writeJSON(w, resp)
161 return
162}
163
164func (h *Handle) RepoTree(w http.ResponseWriter, r *http.Request) {
165 treePath := chi.URLParam(r, "*")
166 ref := chi.URLParam(r, "ref")
167 ref, _ = url.PathUnescape(ref)
168
169 l := h.l.With("handler", "RepoTree", "ref", ref, "treePath", treePath)
170
171 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
172 gr, err := git.Open(path, ref)
173 if err != nil {
174 notFound(w)
175 return
176 }
177
178 files, err := gr.FileTree(treePath)
179 if err != nil {
180 writeError(w, err.Error(), http.StatusInternalServerError)
181 l.Error("file tree", "error", err.Error())
182 return
183 }
184
185 resp := types.RepoTreeResponse{
186 Ref: ref,
187 Parent: treePath,
188 Description: getDescription(path),
189 DotDot: filepath.Dir(treePath),
190 Files: files,
191 }
192
193 writeJSON(w, resp)
194 return
195}
196
197func (h *Handle) BlobRaw(w http.ResponseWriter, r *http.Request) {
198 treePath := chi.URLParam(r, "*")
199 ref := chi.URLParam(r, "ref")
200 ref, _ = url.PathUnescape(ref)
201
202 l := h.l.With("handler", "BlobRaw", "ref", ref, "treePath", treePath)
203
204 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
205 gr, err := git.Open(path, ref)
206 if err != nil {
207 notFound(w)
208 return
209 }
210
211 contents, err := gr.RawContent(treePath)
212 if err != nil {
213 writeError(w, err.Error(), http.StatusBadRequest)
214 l.Error("file content", "error", err.Error())
215 return
216 }
217
218 mimeType := http.DetectContentType(contents)
219
220 // exception for svg
221 if strings.HasPrefix(mimeType, "text/xml") && filepath.Ext(treePath) == ".svg" {
222 mimeType = "image/svg+xml"
223 }
224
225 if !strings.HasPrefix(mimeType, "image/") && !strings.HasPrefix(mimeType, "video/") {
226 l.Error("attempted to serve non-image/video file", "mimetype", mimeType)
227 writeError(w, "only image and video files can be accessed directly", http.StatusForbidden)
228 return
229 }
230
231 w.Header().Set("Cache-Control", "public, max-age=86400") // cache for 24 hours
232 w.Header().Set("ETag", fmt.Sprintf("%x", sha256.Sum256(contents)))
233 w.Header().Set("Content-Type", mimeType)
234 w.Write(contents)
235}
236
237func (h *Handle) Blob(w http.ResponseWriter, r *http.Request) {
238 treePath := chi.URLParam(r, "*")
239 ref := chi.URLParam(r, "ref")
240 ref, _ = url.PathUnescape(ref)
241
242 l := h.l.With("handler", "Blob", "ref", ref, "treePath", treePath)
243
244 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
245 gr, err := git.Open(path, ref)
246 if err != nil {
247 notFound(w)
248 return
249 }
250
251 var isBinaryFile bool = false
252 contents, err := gr.FileContent(treePath)
253 if errors.Is(err, git.ErrBinaryFile) {
254 isBinaryFile = true
255 } else if errors.Is(err, object.ErrFileNotFound) {
256 notFound(w)
257 return
258 } else if err != nil {
259 writeError(w, err.Error(), http.StatusInternalServerError)
260 return
261 }
262
263 bytes := []byte(contents)
264 // safe := string(sanitize(bytes))
265 sizeHint := len(bytes)
266
267 resp := types.RepoBlobResponse{
268 Ref: ref,
269 Contents: string(bytes),
270 Path: treePath,
271 IsBinary: isBinaryFile,
272 SizeHint: uint64(sizeHint),
273 }
274
275 h.showFile(resp, w, l)
276}
277
278func (h *Handle) Archive(w http.ResponseWriter, r *http.Request) {
279 name := chi.URLParam(r, "name")
280 file := chi.URLParam(r, "file")
281
282 l := h.l.With("handler", "Archive", "name", name, "file", file)
283
284 // TODO: extend this to add more files compression (e.g.: xz)
285 if !strings.HasSuffix(file, ".tar.gz") {
286 notFound(w)
287 return
288 }
289
290 ref := strings.TrimSuffix(file, ".tar.gz")
291
292 // This allows the browser to use a proper name for the file when
293 // downloading
294 filename := fmt.Sprintf("%s-%s.tar.gz", name, ref)
295 setContentDisposition(w, filename)
296 setGZipMIME(w)
297
298 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
299 gr, err := git.Open(path, ref)
300 if err != nil {
301 notFound(w)
302 return
303 }
304
305 gw := gzip.NewWriter(w)
306 defer gw.Close()
307
308 prefix := fmt.Sprintf("%s-%s", name, ref)
309 err = gr.WriteTar(gw, prefix)
310 if err != nil {
311 // once we start writing to the body we can't report error anymore
312 // so we are only left with printing the error.
313 l.Error("writing tar file", "error", err.Error())
314 return
315 }
316
317 err = gw.Flush()
318 if err != nil {
319 // once we start writing to the body we can't report error anymore
320 // so we are only left with printing the error.
321 l.Error("flushing?", "error", err.Error())
322 return
323 }
324}
325
326func (h *Handle) Log(w http.ResponseWriter, r *http.Request) {
327 ref := chi.URLParam(r, "ref")
328 ref, _ = url.PathUnescape(ref)
329
330 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
331
332 l := h.l.With("handler", "Log", "ref", ref, "path", path)
333
334 gr, err := git.Open(path, ref)
335 if err != nil {
336 notFound(w)
337 return
338 }
339
340 commits, err := gr.Commits()
341 if err != nil {
342 writeError(w, err.Error(), http.StatusInternalServerError)
343 l.Error("fetching commits", "error", err.Error())
344 return
345 }
346
347 // Get page parameters
348 page := 1
349 pageSize := 30
350
351 if pageParam := r.URL.Query().Get("page"); pageParam != "" {
352 if p, err := strconv.Atoi(pageParam); err == nil && p > 0 {
353 page = p
354 }
355 }
356
357 if pageSizeParam := r.URL.Query().Get("per_page"); pageSizeParam != "" {
358 if ps, err := strconv.Atoi(pageSizeParam); err == nil && ps > 0 {
359 pageSize = ps
360 }
361 }
362
363 // Calculate pagination
364 start := (page - 1) * pageSize
365 end := start + pageSize
366 total := len(commits)
367
368 if start >= total {
369 commits = []*object.Commit{}
370 } else {
371 if end > total {
372 end = total
373 }
374 commits = commits[start:end]
375 }
376
377 resp := types.RepoLogResponse{
378 Commits: commits,
379 Ref: ref,
380 Description: getDescription(path),
381 Log: true,
382 Total: total,
383 Page: page,
384 PerPage: pageSize,
385 }
386
387 writeJSON(w, resp)
388 return
389}
390
391func (h *Handle) Diff(w http.ResponseWriter, r *http.Request) {
392 ref := chi.URLParam(r, "ref")
393 ref, _ = url.PathUnescape(ref)
394
395 l := h.l.With("handler", "Diff", "ref", ref)
396
397 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
398 gr, err := git.Open(path, ref)
399 if err != nil {
400 notFound(w)
401 return
402 }
403
404 diff, err := gr.Diff()
405 if err != nil {
406 writeError(w, err.Error(), http.StatusInternalServerError)
407 l.Error("getting diff", "error", err.Error())
408 return
409 }
410
411 resp := types.RepoCommitResponse{
412 Ref: ref,
413 Diff: diff,
414 }
415
416 writeJSON(w, resp)
417 return
418}
419
420func (h *Handle) Tags(w http.ResponseWriter, r *http.Request) {
421 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
422 l := h.l.With("handler", "Refs")
423
424 gr, err := git.Open(path, "")
425 if err != nil {
426 notFound(w)
427 return
428 }
429
430 tags, err := gr.Tags()
431 if err != nil {
432 // Non-fatal, we *should* have at least one branch to show.
433 l.Warn("getting tags", "error", err.Error())
434 }
435
436 rtags := []*types.TagReference{}
437 for _, tag := range tags {
438 tr := types.TagReference{
439 Tag: tag.TagObject(),
440 }
441
442 tr.Reference = types.Reference{
443 Name: tag.Name(),
444 Hash: tag.Hash().String(),
445 }
446
447 if tag.Message() != "" {
448 tr.Message = tag.Message()
449 }
450
451 rtags = append(rtags, &tr)
452 }
453
454 resp := types.RepoTagsResponse{
455 Tags: rtags,
456 }
457
458 writeJSON(w, resp)
459 return
460}
461
462func (h *Handle) Branches(w http.ResponseWriter, r *http.Request) {
463 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
464 l := h.l.With("handler", "Branches")
465
466 gr, err := git.Open(path, "")
467 if err != nil {
468 notFound(w)
469 return
470 }
471
472 branches, err := gr.Branches()
473 if err != nil {
474 l.Error("getting branches", "error", err.Error())
475 writeError(w, err.Error(), http.StatusInternalServerError)
476 return
477 }
478
479 resp := types.RepoBranchesResponse{
480 Branches: branches,
481 }
482
483 writeJSON(w, resp)
484 return
485}
486
487func (h *Handle) Branch(w http.ResponseWriter, r *http.Request) {
488 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
489 branchName := chi.URLParam(r, "branch")
490 branchName, _ = url.PathUnescape(branchName)
491
492 l := h.l.With("handler", "Branch")
493
494 gr, err := git.PlainOpen(path)
495 if err != nil {
496 notFound(w)
497 return
498 }
499
500 ref, err := gr.Branch(branchName)
501 if err != nil {
502 l.Error("getting branch", "error", err.Error())
503 writeError(w, err.Error(), http.StatusInternalServerError)
504 return
505 }
506
507 commit, err := gr.Commit(ref.Hash())
508 if err != nil {
509 l.Error("getting commit object", "error", err.Error())
510 writeError(w, err.Error(), http.StatusInternalServerError)
511 return
512 }
513
514 defaultBranch, err := gr.FindMainBranch()
515 isDefault := false
516 if err != nil {
517 l.Error("getting default branch", "error", err.Error())
518 // do not quit though
519 } else if defaultBranch == branchName {
520 isDefault = true
521 }
522
523 resp := types.RepoBranchResponse{
524 Branch: types.Branch{
525 Reference: types.Reference{
526 Name: ref.Name().Short(),
527 Hash: ref.Hash().String(),
528 },
529 Commit: commit,
530 IsDefault: isDefault,
531 },
532 }
533
534 writeJSON(w, resp)
535 return
536}
537
538func (h *Handle) Keys(w http.ResponseWriter, r *http.Request) {
539 l := h.l.With("handler", "Keys")
540
541 switch r.Method {
542 case http.MethodGet:
543 keys, err := h.db.GetAllPublicKeys()
544 if err != nil {
545 writeError(w, err.Error(), http.StatusInternalServerError)
546 l.Error("getting public keys", "error", err.Error())
547 return
548 }
549
550 data := make([]map[string]any, 0)
551 for _, key := range keys {
552 j := key.JSON()
553 data = append(data, j)
554 }
555 writeJSON(w, data)
556 return
557
558 case http.MethodPut:
559 pk := db.PublicKey{}
560 if err := json.NewDecoder(r.Body).Decode(&pk); err != nil {
561 writeError(w, "invalid request body", http.StatusBadRequest)
562 return
563 }
564
565 _, _, _, _, err := ssh.ParseAuthorizedKey([]byte(pk.Key))
566 if err != nil {
567 writeError(w, "invalid pubkey", http.StatusBadRequest)
568 }
569
570 if err := h.db.AddPublicKey(pk); err != nil {
571 writeError(w, err.Error(), http.StatusInternalServerError)
572 l.Error("adding public key", "error", err.Error())
573 return
574 }
575
576 w.WriteHeader(http.StatusNoContent)
577 return
578 }
579}
580
581func (h *Handle) NewRepo(w http.ResponseWriter, r *http.Request) {
582 l := h.l.With("handler", "NewRepo")
583
584 data := struct {
585 Did string `json:"did"`
586 Name string `json:"name"`
587 DefaultBranch string `json:"default_branch,omitempty"`
588 }{}
589
590 if err := json.NewDecoder(r.Body).Decode(&data); err != nil {
591 writeError(w, "invalid request body", http.StatusBadRequest)
592 return
593 }
594
595 if data.DefaultBranch == "" {
596 data.DefaultBranch = h.c.Repo.MainBranch
597 }
598
599 did := data.Did
600 name := data.Name
601 defaultBranch := data.DefaultBranch
602
603 if err := validateRepoName(name); err != nil {
604 l.Error("creating repo", "error", err.Error())
605 writeError(w, err.Error(), http.StatusBadRequest)
606 return
607 }
608
609 relativeRepoPath := filepath.Join(did, name)
610 repoPath, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, relativeRepoPath)
611 err := git.InitBare(repoPath, defaultBranch)
612 if err != nil {
613 l.Error("initializing bare repo", "error", err.Error())
614 if errors.Is(err, gogit.ErrRepositoryAlreadyExists) {
615 writeError(w, "That repo already exists!", http.StatusConflict)
616 return
617 } else {
618 writeError(w, err.Error(), http.StatusInternalServerError)
619 return
620 }
621 }
622
623 // add perms for this user to access the repo
624 err = h.e.AddRepo(did, ThisServer, relativeRepoPath)
625 if err != nil {
626 l.Error("adding repo permissions", "error", err.Error())
627 writeError(w, err.Error(), http.StatusInternalServerError)
628 return
629 }
630
631 w.WriteHeader(http.StatusNoContent)
632}
633
634func (h *Handle) RepoFork(w http.ResponseWriter, r *http.Request) {
635 l := h.l.With("handler", "RepoFork")
636
637 data := struct {
638 Did string `json:"did"`
639 Source string `json:"source"`
640 Name string `json:"name,omitempty"`
641 }{}
642
643 if err := json.NewDecoder(r.Body).Decode(&data); err != nil {
644 writeError(w, "invalid request body", http.StatusBadRequest)
645 return
646 }
647
648 did := data.Did
649 source := data.Source
650
651 if did == "" || source == "" {
652 l.Error("invalid request body, empty did or name")
653 w.WriteHeader(http.StatusBadRequest)
654 return
655 }
656
657 var name string
658 if data.Name != "" {
659 name = data.Name
660 } else {
661 name = filepath.Base(source)
662 }
663
664 relativeRepoPath := filepath.Join(did, name)
665 repoPath, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, relativeRepoPath)
666
667 err := git.Fork(repoPath, source)
668 if err != nil {
669 l.Error("forking repo", "error", err.Error())
670 writeError(w, err.Error(), http.StatusInternalServerError)
671 return
672 }
673
674 // add perms for this user to access the repo
675 err = h.e.AddRepo(did, ThisServer, relativeRepoPath)
676 if err != nil {
677 l.Error("adding repo permissions", "error", err.Error())
678 writeError(w, err.Error(), http.StatusInternalServerError)
679 return
680 }
681
682 w.WriteHeader(http.StatusNoContent)
683}
684
685func (h *Handle) RemoveRepo(w http.ResponseWriter, r *http.Request) {
686 l := h.l.With("handler", "RemoveRepo")
687
688 data := struct {
689 Did string `json:"did"`
690 Name string `json:"name"`
691 }{}
692
693 if err := json.NewDecoder(r.Body).Decode(&data); err != nil {
694 writeError(w, "invalid request body", http.StatusBadRequest)
695 return
696 }
697
698 did := data.Did
699 name := data.Name
700
701 if did == "" || name == "" {
702 l.Error("invalid request body, empty did or name")
703 w.WriteHeader(http.StatusBadRequest)
704 return
705 }
706
707 relativeRepoPath := filepath.Join(did, name)
708 repoPath, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, relativeRepoPath)
709 err := os.RemoveAll(repoPath)
710 if err != nil {
711 l.Error("removing repo", "error", err.Error())
712 writeError(w, err.Error(), http.StatusInternalServerError)
713 return
714 }
715
716 w.WriteHeader(http.StatusNoContent)
717
718}
719func (h *Handle) Merge(w http.ResponseWriter, r *http.Request) {
720 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
721
722 data := types.MergeRequest{}
723
724 if err := json.NewDecoder(r.Body).Decode(&data); err != nil {
725 writeError(w, err.Error(), http.StatusBadRequest)
726 h.l.Error("git: failed to unmarshal json patch", "handler", "Merge", "error", err)
727 return
728 }
729
730 mo := &git.MergeOptions{
731 AuthorName: data.AuthorName,
732 AuthorEmail: data.AuthorEmail,
733 CommitBody: data.CommitBody,
734 CommitMessage: data.CommitMessage,
735 }
736
737 patch := data.Patch
738 branch := data.Branch
739 gr, err := git.Open(path, branch)
740 if err != nil {
741 notFound(w)
742 return
743 }
744
745 mo.FormatPatch = patchutil.IsFormatPatch(patch)
746
747 if err := gr.MergeWithOptions([]byte(patch), branch, mo); err != nil {
748 var mergeErr *git.ErrMerge
749 if errors.As(err, &mergeErr) {
750 conflicts := make([]types.ConflictInfo, len(mergeErr.Conflicts))
751 for i, conflict := range mergeErr.Conflicts {
752 conflicts[i] = types.ConflictInfo{
753 Filename: conflict.Filename,
754 Reason: conflict.Reason,
755 }
756 }
757 response := types.MergeCheckResponse{
758 IsConflicted: true,
759 Conflicts: conflicts,
760 Message: mergeErr.Message,
761 }
762 writeConflict(w, response)
763 h.l.Error("git: merge conflict", "handler", "Merge", "error", mergeErr)
764 } else {
765 writeError(w, err.Error(), http.StatusBadRequest)
766 h.l.Error("git: failed to merge", "handler", "Merge", "error", err.Error())
767 }
768 return
769 }
770
771 w.WriteHeader(http.StatusOK)
772}
773
774func (h *Handle) MergeCheck(w http.ResponseWriter, r *http.Request) {
775 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
776
777 var data struct {
778 Patch string `json:"patch"`
779 Branch string `json:"branch"`
780 }
781
782 if err := json.NewDecoder(r.Body).Decode(&data); err != nil {
783 writeError(w, err.Error(), http.StatusBadRequest)
784 h.l.Error("git: failed to unmarshal json patch", "handler", "MergeCheck", "error", err)
785 return
786 }
787
788 patch := data.Patch
789 branch := data.Branch
790 gr, err := git.Open(path, branch)
791 if err != nil {
792 notFound(w)
793 return
794 }
795
796 err = gr.MergeCheck([]byte(patch), branch)
797 if err == nil {
798 response := types.MergeCheckResponse{
799 IsConflicted: false,
800 }
801 writeJSON(w, response)
802 return
803 }
804
805 var mergeErr *git.ErrMerge
806 if errors.As(err, &mergeErr) {
807 conflicts := make([]types.ConflictInfo, len(mergeErr.Conflicts))
808 for i, conflict := range mergeErr.Conflicts {
809 conflicts[i] = types.ConflictInfo{
810 Filename: conflict.Filename,
811 Reason: conflict.Reason,
812 }
813 }
814 response := types.MergeCheckResponse{
815 IsConflicted: true,
816 Conflicts: conflicts,
817 Message: mergeErr.Message,
818 }
819 writeConflict(w, response)
820 h.l.Error("git: merge conflict", "handler", "MergeCheck", "error", mergeErr.Error())
821 return
822 }
823 writeError(w, err.Error(), http.StatusInternalServerError)
824 h.l.Error("git: failed to check merge", "handler", "MergeCheck", "error", err.Error())
825}
826
827func (h *Handle) Compare(w http.ResponseWriter, r *http.Request) {
828 rev1 := chi.URLParam(r, "rev1")
829 rev1, _ = url.PathUnescape(rev1)
830
831 rev2 := chi.URLParam(r, "rev2")
832 rev2, _ = url.PathUnescape(rev2)
833
834 l := h.l.With("handler", "Compare", "r1", rev1, "r2", rev2)
835
836 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
837 gr, err := git.PlainOpen(path)
838 if err != nil {
839 notFound(w)
840 return
841 }
842
843 commit1, err := gr.ResolveRevision(rev1)
844 if err != nil {
845 l.Error("error resolving revision 1", "msg", err.Error())
846 writeError(w, fmt.Sprintf("error resolving revision %s", rev1), http.StatusBadRequest)
847 return
848 }
849
850 commit2, err := gr.ResolveRevision(rev2)
851 if err != nil {
852 l.Error("error resolving revision 2", "msg", err.Error())
853 writeError(w, fmt.Sprintf("error resolving revision %s", rev2), http.StatusBadRequest)
854 return
855 }
856
857 mergeBase, err := gr.MergeBase(commit1, commit2)
858 if err != nil {
859 l.Error("failed to find merge-base", "msg", err.Error())
860 writeError(w, "failed to calculate diff", http.StatusBadRequest)
861 return
862 }
863
864 rawPatch, formatPatch, err := gr.FormatPatch(mergeBase, commit2)
865 if err != nil {
866 l.Error("error comparing revisions", "msg", err.Error())
867 writeError(w, "error comparing revisions", http.StatusBadRequest)
868 return
869 }
870
871 writeJSON(w, types.RepoFormatPatchResponse{
872 Rev1: commit1.Hash.String(),
873 Rev2: commit2.Hash.String(),
874 FormatPatch: formatPatch,
875 Patch: rawPatch,
876 })
877 return
878}
879
880func (h *Handle) NewHiddenRef(w http.ResponseWriter, r *http.Request) {
881 l := h.l.With("handler", "NewHiddenRef")
882
883 forkRef := chi.URLParam(r, "forkRef")
884 forkRef, _ = url.PathUnescape(forkRef)
885
886 remoteRef := chi.URLParam(r, "remoteRef")
887 remoteRef, _ = url.PathUnescape(remoteRef)
888
889 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
890 gr, err := git.PlainOpen(path)
891 if err != nil {
892 notFound(w)
893 return
894 }
895
896 err = gr.TrackHiddenRemoteRef(forkRef, remoteRef)
897 if err != nil {
898 l.Error("error tracking hidden remote ref", "msg", err.Error())
899 writeError(w, "error tracking hidden remote ref", http.StatusBadRequest)
900 return
901 }
902
903 w.WriteHeader(http.StatusNoContent)
904 return
905}
906
907func (h *Handle) AddMember(w http.ResponseWriter, r *http.Request) {
908 l := h.l.With("handler", "AddMember")
909
910 data := struct {
911 Did string `json:"did"`
912 }{}
913
914 if err := json.NewDecoder(r.Body).Decode(&data); err != nil {
915 writeError(w, "invalid request body", http.StatusBadRequest)
916 return
917 }
918
919 did := data.Did
920
921 if err := h.db.AddDid(did); err != nil {
922 l.Error("adding did", "error", err.Error())
923 writeError(w, err.Error(), http.StatusInternalServerError)
924 return
925 }
926 h.jc.AddDid(did)
927
928 if err := h.e.AddMember(ThisServer, did); err != nil {
929 l.Error("adding member", "error", err.Error())
930 writeError(w, err.Error(), http.StatusInternalServerError)
931 return
932 }
933
934 if err := h.fetchAndAddKeys(r.Context(), did); err != nil {
935 l.Error("fetching and adding keys", "error", err.Error())
936 writeError(w, err.Error(), http.StatusInternalServerError)
937 return
938 }
939
940 w.WriteHeader(http.StatusNoContent)
941}
942
943func (h *Handle) AddRepoCollaborator(w http.ResponseWriter, r *http.Request) {
944 l := h.l.With("handler", "AddRepoCollaborator")
945
946 data := struct {
947 Did string `json:"did"`
948 }{}
949
950 ownerDid := chi.URLParam(r, "did")
951 repo := chi.URLParam(r, "name")
952
953 if err := json.NewDecoder(r.Body).Decode(&data); err != nil {
954 writeError(w, "invalid request body", http.StatusBadRequest)
955 return
956 }
957
958 if err := h.db.AddDid(data.Did); err != nil {
959 l.Error("adding did", "error", err.Error())
960 writeError(w, err.Error(), http.StatusInternalServerError)
961 return
962 }
963 h.jc.AddDid(data.Did)
964
965 repoName, _ := securejoin.SecureJoin(ownerDid, repo)
966 if err := h.e.AddCollaborator(data.Did, ThisServer, repoName); err != nil {
967 l.Error("adding repo collaborator", "error", err.Error())
968 writeError(w, err.Error(), http.StatusInternalServerError)
969 return
970 }
971
972 if err := h.fetchAndAddKeys(r.Context(), data.Did); err != nil {
973 l.Error("fetching and adding keys", "error", err.Error())
974 writeError(w, err.Error(), http.StatusInternalServerError)
975 return
976 }
977
978 w.WriteHeader(http.StatusNoContent)
979}
980
981func (h *Handle) DefaultBranch(w http.ResponseWriter, r *http.Request) {
982 l := h.l.With("handler", "DefaultBranch")
983 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
984
985 gr, err := git.Open(path, "")
986 if err != nil {
987 notFound(w)
988 return
989 }
990
991 branch, err := gr.FindMainBranch()
992 if err != nil {
993 writeError(w, err.Error(), http.StatusInternalServerError)
994 l.Error("getting default branch", "error", err.Error())
995 return
996 }
997
998 writeJSON(w, types.RepoDefaultBranchResponse{
999 Branch: branch,
1000 })
1001}
1002
1003func (h *Handle) SetDefaultBranch(w http.ResponseWriter, r *http.Request) {
1004 l := h.l.With("handler", "SetDefaultBranch")
1005 path, _ := securejoin.SecureJoin(h.c.Repo.ScanPath, didPath(r))
1006
1007 data := struct {
1008 Branch string `json:"branch"`
1009 }{}
1010
1011 if err := json.NewDecoder(r.Body).Decode(&data); err != nil {
1012 writeError(w, err.Error(), http.StatusBadRequest)
1013 return
1014 }
1015
1016 gr, err := git.Open(path, "")
1017 if err != nil {
1018 notFound(w)
1019 return
1020 }
1021
1022 err = gr.SetDefaultBranch(data.Branch)
1023 if err != nil {
1024 writeError(w, err.Error(), http.StatusInternalServerError)
1025 l.Error("setting default branch", "error", err.Error())
1026 return
1027 }
1028
1029 w.WriteHeader(http.StatusNoContent)
1030}
1031
1032func (h *Handle) Init(w http.ResponseWriter, r *http.Request) {
1033 l := h.l.With("handler", "Init")
1034
1035 if h.knotInitialized {
1036 writeError(w, "knot already initialized", http.StatusConflict)
1037 return
1038 }
1039
1040 data := struct {
1041 Did string `json:"did"`
1042 }{}
1043
1044 if err := json.NewDecoder(r.Body).Decode(&data); err != nil {
1045 l.Error("failed to decode request body", "error", err.Error())
1046 writeError(w, "invalid request body", http.StatusBadRequest)
1047 return
1048 }
1049
1050 if data.Did == "" {
1051 l.Error("empty DID in request", "did", data.Did)
1052 writeError(w, "did is empty", http.StatusBadRequest)
1053 return
1054 }
1055
1056 if err := h.db.AddDid(data.Did); err != nil {
1057 l.Error("failed to add DID", "error", err.Error())
1058 writeError(w, err.Error(), http.StatusInternalServerError)
1059 return
1060 }
1061 h.jc.AddDid(data.Did)
1062
1063 if err := h.e.AddOwner(ThisServer, data.Did); err != nil {
1064 l.Error("adding owner", "error", err.Error())
1065 writeError(w, err.Error(), http.StatusInternalServerError)
1066 return
1067 }
1068
1069 if err := h.fetchAndAddKeys(r.Context(), data.Did); err != nil {
1070 l.Error("fetching and adding keys", "error", err.Error())
1071 writeError(w, err.Error(), http.StatusInternalServerError)
1072 return
1073 }
1074
1075 close(h.init)
1076
1077 mac := hmac.New(sha256.New, []byte(h.c.Server.Secret))
1078 mac.Write([]byte("ok"))
1079 w.Header().Add("X-Signature", hex.EncodeToString(mac.Sum(nil)))
1080
1081 w.WriteHeader(http.StatusNoContent)
1082}
1083
1084func (h *Handle) Health(w http.ResponseWriter, r *http.Request) {
1085 w.Write([]byte("ok"))
1086}
1087
1088func validateRepoName(name string) error {
1089 // check for path traversal attempts
1090 if name == "." || name == ".." ||
1091 strings.Contains(name, "/") || strings.Contains(name, "\\") {
1092 return fmt.Errorf("Repository name contains invalid path characters")
1093 }
1094
1095 // check for sequences that could be used for traversal when normalized
1096 if strings.Contains(name, "./") || strings.Contains(name, "../") ||
1097 strings.HasPrefix(name, ".") || strings.HasSuffix(name, ".") {
1098 return fmt.Errorf("Repository name contains invalid path sequence")
1099 }
1100
1101 // then continue with character validation
1102 for _, char := range name {
1103 if !((char >= 'a' && char <= 'z') ||
1104 (char >= 'A' && char <= 'Z') ||
1105 (char >= '0' && char <= '9') ||
1106 char == '-' || char == '_' || char == '.') {
1107 return fmt.Errorf("Repository name can only contain alphanumeric characters, periods, hyphens, and underscores")
1108 }
1109 }
1110
1111 // additional check to prevent multiple sequential dots
1112 if strings.Contains(name, "..") {
1113 return fmt.Errorf("Repository name cannot contain sequential dots")
1114 }
1115
1116 // if all checks pass
1117 return nil
1118}