mirror of
				https://github.com/go-gitea/gitea
				synced 2025-10-31 03:18:24 +00:00 
			
		
		
		
	* Second attempt at preventing zombies * Ensure that the pipes are closed in ssh.go * Ensure that a cancellable context is passed up in cmd/* http requests * Make cmd.fail return properly so defers are obeyed * Ensure that something is sent to stdout in case of blocks here Signed-off-by: Andrew Thornton <art27@cantab.net> * placate lint Signed-off-by: Andrew Thornton <art27@cantab.net> * placate lint 2 Signed-off-by: Andrew Thornton <art27@cantab.net> * placate lint 3 Signed-off-by: Andrew Thornton <art27@cantab.net> * fixup Signed-off-by: Andrew Thornton <art27@cantab.net> * Apply suggestions from code review Co-authored-by: 6543 <6543@obermui.de> Co-authored-by: Lauris BH <lauris@nix.lv>
		
			
				
	
	
		
			56 lines
		
	
	
		
			1.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			56 lines
		
	
	
		
			1.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2018 The Gitea Authors. All rights reserved.
 | |
| // Use of this source code is governed by a MIT-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package private
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"io/ioutil"
 | |
| 	"net/http"
 | |
| 
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| )
 | |
| 
 | |
| // UpdatePublicKeyInRepo update public key and if necessary deploy key updates
 | |
| func UpdatePublicKeyInRepo(ctx context.Context, keyID, repoID int64) error {
 | |
| 	// Ask for running deliver hook and test pull request tasks.
 | |
| 	reqURL := setting.LocalURL + fmt.Sprintf("api/internal/ssh/%d/update/%d", keyID, repoID)
 | |
| 	resp, err := newInternalRequest(ctx, reqURL, "POST").Response()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	defer resp.Body.Close()
 | |
| 
 | |
| 	// All 2XX status codes are accepted and others will return an error
 | |
| 	if resp.StatusCode/100 != 2 {
 | |
| 		return fmt.Errorf("Failed to update public key: %s", decodeJSONError(resp).Err)
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // AuthorizedPublicKeyByContent searches content as prefix (leak e-mail part)
 | |
| // and returns public key found.
 | |
| func AuthorizedPublicKeyByContent(ctx context.Context, content string) (string, error) {
 | |
| 	// Ask for running deliver hook and test pull request tasks.
 | |
| 	reqURL := setting.LocalURL + "api/internal/ssh/authorized_keys"
 | |
| 	req := newInternalRequest(ctx, reqURL, "POST")
 | |
| 	req.Param("content", content)
 | |
| 	resp, err := req.Response()
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 
 | |
| 	defer resp.Body.Close()
 | |
| 
 | |
| 	// All 2XX status codes are accepted and others will return an error
 | |
| 	if resp.StatusCode != http.StatusOK {
 | |
| 		return "", fmt.Errorf("Failed to update public key: %s", decodeJSONError(resp).Err)
 | |
| 	}
 | |
| 	bs, err := ioutil.ReadAll(resp.Body)
 | |
| 
 | |
| 	return string(bs), err
 | |
| }
 |