-
-
Notifications
You must be signed in to change notification settings - Fork 5.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
rework long-term authentication #27455
Closed
Closed
Changes from 1 commit
Commits
Show all changes
5 commits
Select commit
Hold shift + click to select a range
54600af
rework long-term authentication
Gusted 3bd0635
add the missing migration file
earl-warren 87c70d9
Merge remote-tracking branch 'gitea-github/main' into wip-gitea-remem…
earl-warren a98e3c6
move over to v1.22
earl-warren 7357325
remove the Forgejo copyright header under protest
earl-warren File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,97 @@ | ||
// Copyright 2023 The Gitea Authors. All rights reserved. | ||
// Copyright 2023 The Forgejo Authors. All rights reserved. | ||
// SPDX-License-Identifier: MIT | ||
|
||
package auth | ||
|
||
import ( | ||
"context" | ||
"crypto/sha256" | ||
"encoding/hex" | ||
"fmt" | ||
"time" | ||
|
||
"code.gitea.io/gitea/models/db" | ||
"code.gitea.io/gitea/modules/timeutil" | ||
"code.gitea.io/gitea/modules/util" | ||
) | ||
|
||
// AuthorizationToken represents a authorization token to a user. | ||
type AuthorizationToken struct { | ||
ID int64 `xorm:"pk autoincr"` | ||
UID int64 `xorm:"INDEX"` | ||
LookupKey string `xorm:"INDEX UNIQUE"` | ||
HashedValidator string | ||
Expiry timeutil.TimeStamp | ||
} | ||
|
||
// TableName provides the real table name. | ||
func (AuthorizationToken) TableName() string { | ||
return "forgejo_auth_token" | ||
earl-warren marked this conversation as resolved.
Show resolved
Hide resolved
|
||
} | ||
|
||
func init() { | ||
db.RegisterModel(new(AuthorizationToken)) | ||
earl-warren marked this conversation as resolved.
Show resolved
Hide resolved
|
||
} | ||
|
||
// IsExpired returns if the authorization token is expired. | ||
func (authToken *AuthorizationToken) IsExpired() bool { | ||
return authToken.Expiry.AsLocalTime().Before(time.Now()) | ||
} | ||
|
||
// GenerateAuthToken generates a new authentication token for the given user. | ||
// It returns the lookup key and validator values that should be passed to the | ||
// user via a long-term cookie. | ||
func GenerateAuthToken(ctx context.Context, userID int64, expiry timeutil.TimeStamp) (lookupKey, validator string, err error) { | ||
// Request 64 random bytes. The first 32 bytes will be used for the lookupKey | ||
// and the other 32 bytes will be used for the validator. | ||
rBytes, err := util.CryptoRandomBytes(64) | ||
if err != nil { | ||
return "", "", err | ||
} | ||
hexEncoded := hex.EncodeToString(rBytes) | ||
validator, lookupKey = hexEncoded[64:], hexEncoded[:64] | ||
|
||
_, err = db.GetEngine(ctx).Insert(&AuthorizationToken{ | ||
UID: userID, | ||
Expiry: expiry, | ||
LookupKey: lookupKey, | ||
HashedValidator: HashValidator(rBytes[32:]), | ||
}) | ||
return lookupKey, validator, err | ||
} | ||
|
||
// FindAuthToken will find a authorization token via the lookup key. | ||
func FindAuthToken(ctx context.Context, lookupKey string) (*AuthorizationToken, error) { | ||
var authToken AuthorizationToken | ||
has, err := db.GetEngine(ctx).Where("lookup_key = ?", lookupKey).Get(&authToken) | ||
if err != nil { | ||
return nil, err | ||
} else if !has { | ||
return nil, fmt.Errorf("lookup key %q: %w", lookupKey, util.ErrNotExist) | ||
} | ||
return &authToken, nil | ||
} | ||
|
||
// DeleteAuthToken will delete the authorization token. | ||
func DeleteAuthToken(ctx context.Context, authToken *AuthorizationToken) error { | ||
_, err := db.DeleteByBean(ctx, authToken) | ||
return err | ||
} | ||
|
||
// DeleteAuthTokenByUser will delete all authorization tokens for the user. | ||
func DeleteAuthTokenByUser(ctx context.Context, userID int64) error { | ||
if userID == 0 { | ||
return nil | ||
} | ||
|
||
_, err := db.DeleteByBean(ctx, &AuthorizationToken{UID: userID}) | ||
return err | ||
} | ||
|
||
// HashValidator will return a hexified hashed version of the validator. | ||
func HashValidator(validator []byte) string { | ||
h := sha256.New() | ||
h.Write(validator) | ||
return hex.EncodeToString(h.Sum(nil)) | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is it a requirement to remove copyright notices to contribute code to Gitea?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That would require permission from the author(s) of the code.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This has been explained many times already to you, and you have been warned as well in the last pull request to follow contribution guidelines. If you'd like to adhere to the contribution guidelines we'd be happy to have any contribution, however as you've shown to willfully disregard them action may need to be taken.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
where, in the contributions guidelines, can I find the requirement to remove an existing copyright notice from a MIT licensed code?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We're not asking you to remove copyright, but instead asking for copyright assignment. If each of our contributors added to the headers of the file they touched then some files could have over 1000 listings, this is clearly untenable. We don't remove copyright, for example there is places where we used code from go and kept their headers because we took that code and adhered to the license, but as you are contributing the code that's where the difference is. If you don't have the rights to do so under DCO and contribution document then that prevents us from accepting code. This is following guidance from the Linux Foundation to ensure a codebase free of any conflict.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I was not aware Gitea required a copyright assignment. Could you please let me know where this is explained in the contributions guidelines?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For the past 7 years, Gitea has required the same policy on copyright headers; you've been told this in other PRs, and have modified your PRs to be accepted. Not adhering to it once or twice can be forgiven as an accident, however, continuing to do so, including after being warned, has to be treated as you not acting in good faith, especially in this PR for a security-related PR knowing it can't be merged as-is.
Thankfully we've been working on a PR for this as well, and we were going to send it over privately once ready, so we are able to resolve this issue via a different PR without code that is tainted by copyright issues.
As I've said before, we welcome all contributions as long as they adhere to the project standards, if you/Forgejo are refusing to do so that's unfortunate.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It has been documented 7 years ago: a90b252?short_path=eca12c0#diff-eca12c0a30e25b4b46522ebf89465a03ba72a03f540796c979137931d8f92055
And it has been updated to use SPDX format: https://github.com/go-gitea/gitea/blame/16a766cba10dcaf53cc413cee62a952031bef5bc/CONTRIBUTING.md#L430