// Copyright 2014 The Gogs Authors. All rights reserved. // Use of this source code is governed by a MIT-style // license that can be found in the LICENSE file. package cmd import ( "bufio" "bytes" "crypto/tls" "fmt" "net/url" "os" "os/exec" "path/filepath" "strings" "github.com/unknwon/com" "github.com/urfave/cli" log "unknwon.dev/clog/v2" "github.com/gogs/git-module" "gogs.io/gogs/internal/conf" "gogs.io/gogs/internal/db" "gogs.io/gogs/internal/email" "gogs.io/gogs/internal/httplib" ) var ( Hook = cli.Command{ Name: "hook", Usage: "Delegate commands to corresponding Git hooks", Description: "All sub-commands should only be called by Git", Flags: []cli.Flag{ stringFlag("config, c", "", "Custom configuration file path"), }, Subcommands: []cli.Command{ subcmdHookPreReceive, subcmdHookUpadte, subcmdHookPostReceive, }, } subcmdHookPreReceive = cli.Command{ Name: "pre-receive", Usage: "Delegate pre-receive Git hook", Description: "This command should only be called by Git", Action: runHookPreReceive, } subcmdHookUpadte = cli.Command{ Name: "update", Usage: "Delegate update Git hook", Description: "This command should only be called by Git", Action: runHookUpdate, } subcmdHookPostReceive = cli.Command{ Name: "post-receive", Usage: "Delegate post-receive Git hook", Description: "This command should only be called by Git", Action: runHookPostReceive, } ) func runHookPreReceive(c *cli.Context) error { if len(os.Getenv("SSH_ORIGINAL_COMMAND")) == 0 { return nil } setup(c, "hooks/pre-receive.log", true) isWiki := strings.Contains(os.Getenv(db.ENV_REPO_CUSTOM_HOOKS_PATH), ".wiki.git/") buf := bytes.NewBuffer(nil) scanner := bufio.NewScanner(os.Stdin) for scanner.Scan() { buf.Write(scanner.Bytes()) buf.WriteByte('\n') if isWiki { continue } fields := bytes.Fields(scanner.Bytes()) if len(fields) != 3 { continue } oldCommitID := string(fields[0]) newCommitID := string(fields[1]) branchName := git.RefShortName(string(fields[2])) // Branch protection repoID := com.StrTo(os.Getenv(db.ENV_REPO_ID)).MustInt64() protectBranch, err := db.GetProtectBranchOfRepoByName(repoID, branchName) if err != nil { if db.IsErrBranchNotExist(err) { continue } fail("Internal error", "GetProtectBranchOfRepoByName [repo_id: %d, branch: %s]: %v", repoID, branchName, err) } if !protectBranch.Protected { continue } // Whitelist users can bypass require pull request check bypassRequirePullRequest := false // Check if user is in whitelist when enabled userID := com.StrTo(os.Getenv(db.ENV_AUTH_USER_ID)).MustInt64() if protectBranch.EnableWhitelist { if !db.IsUserInProtectBranchWhitelist(repoID, userID, branchName) { fail(fmt.Sprintf("Branch '%s' is protected and you are not in the push whitelist", branchName), "") } bypassRequirePullRequest = true } // Check if branch allows direct push if !bypassRequirePullRequest && protectBranch.RequirePullRequest { fail(fmt.Sprintf("Branch '%s' is protected and commits must be merged through pull request", branchName), "") } // check and deletion if newCommitID == git.EmptyID { fail(fmt.Sprintf("Branch '%s' is protected from deletion", branchName), "") } // Check force push output, err := git.NewCommand("rev-list", "--max-count=1", oldCommitID, "^"+newCommitID). RunInDir(db.RepoPath(os.Getenv(db.ENV_REPO_OWNER_NAME), os.Getenv(db.ENV_REPO_NAME))) if err != nil { fail("Internal error", "Failed to detect force push: %v", err) } else if len(output) > 0 { fail(fmt.Sprintf("Branch '%s' is protected from force push", branchName), "") } } customHooksPath := filepath.Join(os.Getenv(db.ENV_REPO_CUSTOM_HOOKS_PATH), "pre-receive") if !com.IsFile(customHooksPath) { return nil } var hookCmd *exec.Cmd if conf.IsWindowsRuntime() { hookCmd = exec.Command("bash.exe", "custom_hooks/pre-receive") } else { hookCmd = exec.Command(customHooksPath) } hookCmd.Dir = db.RepoPath(os.Getenv(db.ENV_REPO_OWNER_NAME), os.Getenv(db.ENV_REPO_NAME)) hookCmd.Stdout = os.Stdout hookCmd.Stdin = buf hookCmd.Stderr = os.Stderr if err := hookCmd.Run(); err != nil { fail("Internal error", "Failed to execute custom pre-receive hook: %v", err) } return nil } func runHookUpdate(c *cli.Context) error { if len(os.Getenv("SSH_ORIGINAL_COMMAND")) == 0 { return nil } setup(c, "hooks/update.log", false) args := c.Args() if len(args) != 3 { fail("Arguments received are not equal to three", "Arguments received are not equal to three") } else if len(args[0]) == 0 { fail("First argument 'refName' is empty", "First argument 'refName' is empty") } customHooksPath := filepath.Join(os.Getenv(db.ENV_REPO_CUSTOM_HOOKS_PATH), "update") if !com.IsFile(customHooksPath) { return nil } var hookCmd *exec.Cmd if conf.IsWindowsRuntime() { hookCmd = exec.Command("bash.exe", append([]string{"custom_hooks/update"}, args...)...) } else { hookCmd = exec.Command(customHooksPath, args...) } hookCmd.Dir = db.RepoPath(os.Getenv(db.ENV_REPO_OWNER_NAME), os.Getenv(db.ENV_REPO_NAME)) hookCmd.Stdout = os.Stdout hookCmd.Stdin = os.Stdin hookCmd.Stderr = os.Stderr if err := hookCmd.Run(); err != nil { fail("Internal error", "Failed to execute custom pre-receive hook: %v", err) } return nil } func runHookPostReceive(c *cli.Context) error { if len(os.Getenv("SSH_ORIGINAL_COMMAND")) == 0 { return nil } setup(c, "hooks/post-receive.log", true) // Post-receive hook does more than just gather Git information, // so we need to setup additional services for email notifications. email.NewContext() isWiki := strings.Contains(os.Getenv(db.ENV_REPO_CUSTOM_HOOKS_PATH), ".wiki.git/") buf := bytes.NewBuffer(nil) scanner := bufio.NewScanner(os.Stdin) for scanner.Scan() { buf.Write(scanner.Bytes()) buf.WriteByte('\n') // TODO: support news feeds for wiki if isWiki { continue } fields := bytes.Fields(scanner.Bytes()) if len(fields) != 3 { continue } options := db.PushUpdateOptions{ OldCommitID: string(fields[0]), NewCommitID: string(fields[1]), FullRefspec: string(fields[2]), PusherID: com.StrTo(os.Getenv(db.ENV_AUTH_USER_ID)).MustInt64(), PusherName: os.Getenv(db.ENV_AUTH_USER_NAME), RepoUserName: os.Getenv(db.ENV_REPO_OWNER_NAME), RepoName: os.Getenv(db.ENV_REPO_NAME), } if err := db.PushUpdate(options); err != nil { log.Error("PushUpdate: %v", err) } // Ask for running deliver hook and test pull request tasks q := make(url.Values) q.Add("branch", git.RefShortName(options.FullRefspec)) q.Add("secret", os.Getenv(db.ENV_REPO_OWNER_SALT_MD5)) q.Add("pusher", os.Getenv(db.ENV_AUTH_USER_ID)) reqURL := fmt.Sprintf("%s%s/%s/tasks/trigger?%s", conf.Server.LocalRootURL, options.RepoUserName, options.RepoName, q.Encode()) log.Trace("Trigger task: %s", reqURL) resp, err := httplib.Get(reqURL). SetTLSClientConfig(&tls.Config{ InsecureSkipVerify: true, }).Response() if err == nil { _ = resp.Body.Close() if resp.StatusCode/100 != 2 { log.Error("Failed to trigger task: unsuccessful response code %d", resp.StatusCode) } } else { log.Error("Failed to trigger task: %v", err) } } customHooksPath := filepath.Join(os.Getenv(db.ENV_REPO_CUSTOM_HOOKS_PATH), "post-receive") if !com.IsFile(customHooksPath) { return nil } var hookCmd *exec.Cmd if conf.IsWindowsRuntime() { hookCmd = exec.Command("bash.exe", "custom_hooks/post-receive") } else { hookCmd = exec.Command(customHooksPath) } hookCmd.Dir = db.RepoPath(os.Getenv(db.ENV_REPO_OWNER_NAME), os.Getenv(db.ENV_REPO_NAME)) hookCmd.Stdout = os.Stdout hookCmd.Stdin = buf hookCmd.Stderr = os.Stderr if err := hookCmd.Run(); err != nil { fail("Internal error", "Failed to execute custom post-receive hook: %v", err) } return nil }