mirror of
				https://github.com/go-gitea/gitea
				synced 2025-11-04 05:18:25 +00:00 
			
		
		
		
	* Second attempt at preventing zombies * Ensure that the pipes are closed in ssh.go * Ensure that a cancellable context is passed up in cmd/* http requests * Make cmd.fail return properly so defers are obeyed * Ensure that something is sent to stdout in case of blocks here Signed-off-by: Andrew Thornton <art27@cantab.net> * placate lint Signed-off-by: Andrew Thornton <art27@cantab.net> * placate lint 2 Signed-off-by: Andrew Thornton <art27@cantab.net> * placate lint 3 Signed-off-by: Andrew Thornton <art27@cantab.net> * fixup Signed-off-by: Andrew Thornton <art27@cantab.net> * Apply suggestions from code review Co-authored-by: 6543 <6543@obermui.de> Co-authored-by: Lauris BH <lauris@nix.lv>
		
			
				
	
	
		
			56 lines
		
	
	
		
			1.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			56 lines
		
	
	
		
			1.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2018 The Gitea Authors. All rights reserved.
 | 
						|
// Use of this source code is governed by a MIT-style
 | 
						|
// license that can be found in the LICENSE file.
 | 
						|
 | 
						|
package private
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"fmt"
 | 
						|
	"io/ioutil"
 | 
						|
	"net/http"
 | 
						|
 | 
						|
	"code.gitea.io/gitea/modules/setting"
 | 
						|
)
 | 
						|
 | 
						|
// UpdatePublicKeyInRepo update public key and if necessary deploy key updates
 | 
						|
func UpdatePublicKeyInRepo(ctx context.Context, keyID, repoID int64) error {
 | 
						|
	// Ask for running deliver hook and test pull request tasks.
 | 
						|
	reqURL := setting.LocalURL + fmt.Sprintf("api/internal/ssh/%d/update/%d", keyID, repoID)
 | 
						|
	resp, err := newInternalRequest(ctx, reqURL, "POST").Response()
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	defer resp.Body.Close()
 | 
						|
 | 
						|
	// All 2XX status codes are accepted and others will return an error
 | 
						|
	if resp.StatusCode/100 != 2 {
 | 
						|
		return fmt.Errorf("Failed to update public key: %s", decodeJSONError(resp).Err)
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// AuthorizedPublicKeyByContent searches content as prefix (leak e-mail part)
 | 
						|
// and returns public key found.
 | 
						|
func AuthorizedPublicKeyByContent(ctx context.Context, content string) (string, error) {
 | 
						|
	// Ask for running deliver hook and test pull request tasks.
 | 
						|
	reqURL := setting.LocalURL + "api/internal/ssh/authorized_keys"
 | 
						|
	req := newInternalRequest(ctx, reqURL, "POST")
 | 
						|
	req.Param("content", content)
 | 
						|
	resp, err := req.Response()
 | 
						|
	if err != nil {
 | 
						|
		return "", err
 | 
						|
	}
 | 
						|
 | 
						|
	defer resp.Body.Close()
 | 
						|
 | 
						|
	// All 2XX status codes are accepted and others will return an error
 | 
						|
	if resp.StatusCode != http.StatusOK {
 | 
						|
		return "", fmt.Errorf("Failed to update public key: %s", decodeJSONError(resp).Err)
 | 
						|
	}
 | 
						|
	bs, err := ioutil.ReadAll(resp.Body)
 | 
						|
 | 
						|
	return string(bs), err
 | 
						|
}
 |