// Copyright 2014 The Gogs Authors. All rights reserved. // Use of this source code is governed by a MIT-style // license that can be found in the LICENSE file. package cmd import ( "bufio" "bytes" "crypto/tls" "fmt" "os" "os/exec" "path" "path/filepath" "strings" "github.com/Unknwon/com" "github.com/urfave/cli" log "gopkg.in/clog.v1" "github.com/gogits/git-module" "github.com/gogits/gogs/models" "github.com/gogits/gogs/models/errors" "github.com/gogits/gogs/pkg/httplib" "github.com/gogits/gogs/pkg/mailer" "github.com/gogits/gogs/pkg/setting" "github.com/gogits/gogs/pkg/template" http "github.com/gogits/gogs/routes/repo" ) var ( Hook = cli.Command{ Name: "hook", Usage: "Delegate commands to corresponding Git hooks", Description: "All sub-commands should only be called by Git", Flags: []cli.Flag{ stringFlag("config, c", "custom/conf/app.ini", "Custom configuration file path"), }, Subcommands: []cli.Command{ subcmdHookPreReceive, subcmdHookUpadte, subcmdHookPostReceive, }, } subcmdHookPreReceive = cli.Command{ Name: "pre-receive", Usage: "Delegate pre-receive Git hook", Description: "This command should only be called by Git", Action: runHookPreReceive, } subcmdHookUpadte = cli.Command{ Name: "update", Usage: "Delegate update Git hook", Description: "This command should only be called by Git", Action: runHookUpdate, } subcmdHookPostReceive = cli.Command{ Name: "post-receive", Usage: "Delegate post-receive Git hook", Description: "This command should only be called by Git", Action: runHookPostReceive, } ) func runHookPreReceive(c *cli.Context) error { if len(os.Getenv("SSH_ORIGINAL_COMMAND")) == 0 { return nil } setup(c, "hooks/pre-receive.log", true) isWiki := strings.Contains(os.Getenv(http.ENV_REPO_CUSTOM_HOOKS_PATH), ".wiki.git/") buf := bytes.NewBuffer(nil) scanner := bufio.NewScanner(os.Stdin) for scanner.Scan() { buf.Write(scanner.Bytes()) buf.WriteByte('\n') if isWiki { continue } fields := bytes.Fields(scanner.Bytes()) if len(fields) != 3 { continue } oldCommitID := string(fields[0]) newCommitID := string(fields[1]) branchName := strings.TrimPrefix(string(fields[2]), git.BRANCH_PREFIX) // Branch protection repoID := com.StrTo(os.Getenv(http.ENV_REPO_ID)).MustInt64() protectBranch, err := models.GetProtectBranchOfRepoByName(repoID, branchName) if err != nil { if errors.IsErrBranchNotExist(err) { continue } fail("Internal error", "GetProtectBranchOfRepoByName [repo_id: %d, branch: %s]: %v", repoID, branchName, err) } if !protectBranch.Protected { continue } // Whitelist users can bypass require pull request check bypassRequirePullRequest := false // Check if user is in whitelist when enabled userID := com.StrTo(os.Getenv(http.ENV_AUTH_USER_ID)).MustInt64() if protectBranch.EnableWhitelist { if !models.IsUserInProtectBranchWhitelist(repoID, userID, branchName) { fail(fmt.Sprintf("Branch '%s' is protected and you are not in the push whitelist", branchName), "") } bypassRequirePullRequest = true } // Check if branch allows direct push if !bypassRequirePullRequest && protectBranch.RequirePullRequest { fail(fmt.Sprintf("Branch '%s' is protected and commits must be merged through pull request", branchName), "") } // check and deletion if newCommitID == git.EMPTY_SHA { fail(fmt.Sprintf("Branch '%s' is protected from deletion", branchName), "") } // Check force push output, err := git.NewCommand("rev-list", "--max-count=1", oldCommitID, "^"+newCommitID). RunInDir(models.RepoPath(os.Getenv(http.ENV_REPO_OWNER_NAME), os.Getenv(http.ENV_REPO_NAME))) if err != nil { fail("Internal error", "Fail to detect force push: %v", err) } else if len(output) > 0 { fail(fmt.Sprintf("Branch '%s' is protected from force push", branchName), "") } } customHooksPath := filepath.Join(os.Getenv(http.ENV_REPO_CUSTOM_HOOKS_PATH), "pre-receive") if !com.IsFile(customHooksPath) { return nil } var hookCmd *exec.Cmd if setting.IsWindows { hookCmd = exec.Command("bash.exe", "custom_hooks/pre-receive") } else { hookCmd = exec.Command(customHooksPath) } hookCmd.Dir = models.RepoPath(os.Getenv(http.ENV_REPO_OWNER_NAME), os.Getenv(http.ENV_REPO_NAME)) hookCmd.Stdout = os.Stdout hookCmd.Stdin = buf hookCmd.Stderr = os.Stderr if err := hookCmd.Run(); err != nil { fail("Internal error", "Fail to execute custom pre-receive hook: %v", err) } return nil } func runHookUpdate(c *cli.Context) error { if len(os.Getenv("SSH_ORIGINAL_COMMAND")) == 0 { return nil } setup(c, "hooks/update.log", false) args := c.Args() if len(args) != 3 { fail("Arguments received are not equal to three", "Arguments received are not equal to three") } else if len(args[0]) == 0 { fail("First argument 'refName' is empty", "First argument 'refName' is empty") } customHooksPath := filepath.Join(os.Getenv(http.ENV_REPO_CUSTOM_HOOKS_PATH), "update") if !com.IsFile(customHooksPath) { return nil } var hookCmd *exec.Cmd if setting.IsWindows { hookCmd = exec.Command("bash.exe", append([]string{"custom_hooks/update"}, args...)...) } else { hookCmd = exec.Command(customHooksPath, args...) } hookCmd.Dir = models.RepoPath(os.Getenv(http.ENV_REPO_OWNER_NAME), os.Getenv(http.ENV_REPO_NAME)) hookCmd.Stdout = os.Stdout hookCmd.Stdin = os.Stdin hookCmd.Stderr = os.Stderr if err := hookCmd.Run(); err != nil { fail("Internal error", "Fail to execute custom pre-receive hook: %v", err) } return nil } func runHookPostReceive(c *cli.Context) error { if len(os.Getenv("SSH_ORIGINAL_COMMAND")) == 0 { return nil } setup(c, "hooks/post-receive.log", true) // Post-receive hook does more than just gather Git information, // so we need to setup additional services for email notifications. setting.NewPostReceiveHookServices() mailer.NewContext() mailer.InitMailRender(path.Join(setting.StaticRootPath, "templates/mail"), path.Join(setting.CustomPath, "templates/mail"), template.NewFuncMap()) isWiki := strings.Contains(os.Getenv(http.ENV_REPO_CUSTOM_HOOKS_PATH), ".wiki.git/") buf := bytes.NewBuffer(nil) scanner := bufio.NewScanner(os.Stdin) for scanner.Scan() { buf.Write(scanner.Bytes()) buf.WriteByte('\n') // TODO: support news feeds for wiki if isWiki { continue } fields := bytes.Fields(scanner.Bytes()) if len(fields) != 3 { continue } options := models.PushUpdateOptions{ OldCommitID: string(fields[0]), NewCommitID: string(fields[1]), RefFullName: string(fields[2]), PusherID: com.StrTo(os.Getenv(http.ENV_AUTH_USER_ID)).MustInt64(), PusherName: os.Getenv(http.ENV_AUTH_USER_NAME), RepoUserName: os.Getenv(http.ENV_REPO_OWNER_NAME), RepoName: os.Getenv(http.ENV_REPO_NAME), } if err := models.PushUpdate(options); err != nil { log.Error(2, "PushUpdate: %v", err) } // Ask for running deliver hook and test pull request tasks reqURL := setting.LocalURL + options.RepoUserName + "/" + options.RepoName + "/tasks/trigger?branch=" + template.EscapePound(strings.TrimPrefix(options.RefFullName, git.BRANCH_PREFIX)) + "&secret=" + os.Getenv(http.ENV_REPO_OWNER_SALT_MD5) + "&pusher=" + os.Getenv(http.ENV_AUTH_USER_ID) log.Trace("Trigger task: %s", reqURL) resp, err := httplib.Head(reqURL).SetTLSClientConfig(&tls.Config{ InsecureSkipVerify: true, }).Response() if err == nil { resp.Body.Close() if resp.StatusCode/100 != 2 { log.Error(2, "Fail to trigger task: not 2xx response code") } } else { log.Error(2, "Fail to trigger task: %v", err) } } customHooksPath := filepath.Join(os.Getenv(http.ENV_REPO_CUSTOM_HOOKS_PATH), "post-receive") if !com.IsFile(customHooksPath) { return nil } var hookCmd *exec.Cmd if setting.IsWindows { hookCmd = exec.Command("bash.exe", "custom_hooks/post-receive") } else { hookCmd = exec.Command(customHooksPath) } hookCmd.Dir = models.RepoPath(os.Getenv(http.ENV_REPO_OWNER_NAME), os.Getenv(http.ENV_REPO_NAME)) hookCmd.Stdout = os.Stdout hookCmd.Stdin = buf hookCmd.Stderr = os.Stderr if err := hookCmd.Run(); err != nil { fail("Internal error", "Fail to execute custom post-receive hook: %v", err) } return nil }