| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385 | // Copyright 2014 The Gogs Authors. All rights reserved.// Use of this source code is governed by a MIT-style// license that can be found in the LICENSE file.package middlewareimport (	"crypto/hmac"	"crypto/sha1"	"encoding/base64"	"fmt"	"html/template"	"io"	"net/http"	"net/url"	"path/filepath"	"strconv"	"strings"	"time"	"github.com/go-martini/martini"	"github.com/gogits/cache"	"github.com/gogits/git"	"github.com/gogits/session"	"github.com/gogits/gogs/models"	"github.com/gogits/gogs/modules/auth"	"github.com/gogits/gogs/modules/base"	"github.com/gogits/gogs/modules/log"	"github.com/gogits/gogs/modules/setting")// Context represents context of a request.type Context struct {	*Render	c        martini.Context	p        martini.Params	Req      *http.Request	Res      http.ResponseWriter	Flash    *Flash	Session  session.SessionStore	Cache    cache.Cache	User     *models.User	IsSigned bool	csrfToken string	Repo struct {		IsOwner     bool		IsTrueOwner bool		IsWatching  bool		IsBranch    bool		IsTag       bool		IsCommit    bool		HasAccess   bool		Repository  *models.Repository		Owner       *models.User		Commit      *git.Commit		Tag         *git.Tag		GitRepo     *git.Repository		BranchName  string		TagName     string		CommitId    string		RepoLink    string		CloneLink   struct {			SSH   string			HTTPS string			Git   string		}		Mirror *models.Mirror	}}// Query querys form parameter.func (ctx *Context) Query(name string) string {	ctx.Req.ParseForm()	return ctx.Req.Form.Get(name)}// func (ctx *Context) Param(name string) string {// 	return ctx.p[name]// }// HasError returns true if error occurs in form validation.func (ctx *Context) HasApiError() bool {	hasErr, ok := ctx.Data["HasError"]	if !ok {		return false	}	return hasErr.(bool)}func (ctx *Context) GetErrMsg() string {	return ctx.Data["ErrorMsg"].(string)}// HasError returns true if error occurs in form validation.func (ctx *Context) HasError() bool {	hasErr, ok := ctx.Data["HasError"]	if !ok {		return false	}	ctx.Flash.ErrorMsg = ctx.Data["ErrorMsg"].(string)	ctx.Data["Flash"] = ctx.Flash	return hasErr.(bool)}// HTML calls render.HTML underlying but reduce one argument.func (ctx *Context) HTML(status int, name base.TplName, htmlOpt ...HTMLOptions) {	ctx.Render.HTML(status, string(name), ctx.Data, htmlOpt...)}// RenderWithErr used for page has form validation but need to prompt error to users.func (ctx *Context) RenderWithErr(msg string, tpl base.TplName, form auth.Form) {	if form != nil {		auth.AssignForm(form, ctx.Data)	}	ctx.Flash.ErrorMsg = msg	ctx.Data["Flash"] = ctx.Flash	ctx.HTML(200, tpl)}// Handle handles and logs error by given status.func (ctx *Context) Handle(status int, title string, err error) {	if err != nil {		log.Error("%s: %v", title, err)		if martini.Dev != martini.Prod {			ctx.Data["ErrorMsg"] = err		}	}	switch status {	case 404:		ctx.Data["Title"] = "Page Not Found"	case 500:		ctx.Data["Title"] = "Internal Server Error"	}	ctx.HTML(status, base.TplName(fmt.Sprintf("status/%d", status)))}func (ctx *Context) Debug(msg string, args ...interface{}) {	log.Debug(msg, args...)}func (ctx *Context) GetCookie(name string) string {	cookie, err := ctx.Req.Cookie(name)	if err != nil {		return ""	}	return cookie.Value}func (ctx *Context) SetCookie(name string, value string, others ...interface{}) {	cookie := http.Cookie{}	cookie.Name = name	cookie.Value = value	if len(others) > 0 {		switch v := others[0].(type) {		case int:			cookie.MaxAge = v		case int64:			cookie.MaxAge = int(v)		case int32:			cookie.MaxAge = int(v)		}	}	// default "/"	if len(others) > 1 {		if v, ok := others[1].(string); ok && len(v) > 0 {			cookie.Path = v		}	} else {		cookie.Path = "/"	}	// default empty	if len(others) > 2 {		if v, ok := others[2].(string); ok && len(v) > 0 {			cookie.Domain = v		}	}	// default empty	if len(others) > 3 {		switch v := others[3].(type) {		case bool:			cookie.Secure = v		default:			if others[3] != nil {				cookie.Secure = true			}		}	}	// default false. for session cookie default true	if len(others) > 4 {		if v, ok := others[4].(bool); ok && v {			cookie.HttpOnly = true		}	}	ctx.Res.Header().Add("Set-Cookie", cookie.String())}// Get secure cookie from request by a given key.func (ctx *Context) GetSecureCookie(Secret, key string) (string, bool) {	val := ctx.GetCookie(key)	if val == "" {		return "", false	}	parts := strings.SplitN(val, "|", 3)	if len(parts) != 3 {		return "", false	}	vs := parts[0]	timestamp := parts[1]	sig := parts[2]	h := hmac.New(sha1.New, []byte(Secret))	fmt.Fprintf(h, "%s%s", vs, timestamp)	if fmt.Sprintf("%02x", h.Sum(nil)) != sig {		return "", false	}	res, _ := base64.URLEncoding.DecodeString(vs)	return string(res), true}// Set Secure cookie for response.func (ctx *Context) SetSecureCookie(Secret, name, value string, others ...interface{}) {	vs := base64.URLEncoding.EncodeToString([]byte(value))	timestamp := strconv.FormatInt(time.Now().UnixNano(), 10)	h := hmac.New(sha1.New, []byte(Secret))	fmt.Fprintf(h, "%s%s", vs, timestamp)	sig := fmt.Sprintf("%02x", h.Sum(nil))	cookie := strings.Join([]string{vs, timestamp, sig}, "|")	ctx.SetCookie(name, cookie, others...)}func (ctx *Context) CsrfToken() string {	if len(ctx.csrfToken) > 0 {		return ctx.csrfToken	}	token := ctx.GetCookie("_csrf")	if len(token) == 0 {		token = base.GetRandomString(30)		ctx.SetCookie("_csrf", token)	}	ctx.csrfToken = token	return token}func (ctx *Context) CsrfTokenValid() bool {	token := ctx.Query("_csrf")	if token == "" {		token = ctx.Req.Header.Get("X-Csrf-Token")	}	if token == "" {		return false	} else if ctx.csrfToken != token {		return false	}	return true}func (ctx *Context) ServeFile(file string, names ...string) {	var name string	if len(names) > 0 {		name = names[0]	} else {		name = filepath.Base(file)	}	ctx.Res.Header().Set("Content-Description", "File Transfer")	ctx.Res.Header().Set("Content-Type", "application/octet-stream")	ctx.Res.Header().Set("Content-Disposition", "attachment; filename="+name)	ctx.Res.Header().Set("Content-Transfer-Encoding", "binary")	ctx.Res.Header().Set("Expires", "0")	ctx.Res.Header().Set("Cache-Control", "must-revalidate")	ctx.Res.Header().Set("Pragma", "public")	http.ServeFile(ctx.Res, ctx.Req, file)}func (ctx *Context) ServeContent(name string, r io.ReadSeeker, params ...interface{}) {	modtime := time.Now()	for _, p := range params {		switch v := p.(type) {		case time.Time:			modtime = v		}	}	ctx.Res.Header().Set("Content-Description", "File Transfer")	ctx.Res.Header().Set("Content-Type", "application/octet-stream")	ctx.Res.Header().Set("Content-Disposition", "attachment; filename="+name)	ctx.Res.Header().Set("Content-Transfer-Encoding", "binary")	ctx.Res.Header().Set("Expires", "0")	ctx.Res.Header().Set("Cache-Control", "must-revalidate")	ctx.Res.Header().Set("Pragma", "public")	http.ServeContent(ctx.Res, ctx.Req, name, modtime, r)}type Flash struct {	url.Values	ErrorMsg, SuccessMsg string}func (f *Flash) Error(msg string) {	f.Set("error", msg)	f.ErrorMsg = msg}func (f *Flash) Success(msg string) {	f.Set("success", msg)	f.SuccessMsg = msg}// InitContext initializes a classic context for a request.func InitContext() martini.Handler {	return func(res http.ResponseWriter, r *http.Request, c martini.Context, rd *Render) {		ctx := &Context{			c: c,			// p:      p,			Req:    r,			Res:    res,			Cache:  setting.Cache,			Render: rd,		}		ctx.Data["PageStartTime"] = time.Now()		// start session		ctx.Session = setting.SessionManager.SessionStart(res, r)		// Get flash.		values, err := url.ParseQuery(ctx.GetCookie("gogs_flash"))		if err != nil {			log.Error("InitContext.ParseQuery(flash): %v", err)		} else if len(values) > 0 {			ctx.Flash = &Flash{Values: values}			ctx.Flash.ErrorMsg = ctx.Flash.Get("error")			ctx.Flash.SuccessMsg = ctx.Flash.Get("success")			ctx.Data["Flash"] = ctx.Flash			ctx.SetCookie("gogs_flash", "", -1)		}		ctx.Flash = &Flash{Values: url.Values{}}		rw := res.(martini.ResponseWriter)		rw.Before(func(martini.ResponseWriter) {			ctx.Session.SessionRelease(res)			if flash := ctx.Flash.Encode(); len(flash) > 0 {				ctx.SetCookie("gogs_flash", ctx.Flash.Encode(), 0)			}		})		// Get user from session if logined.		user := auth.SignedInUser(ctx.req.Header, ctx.Session)		ctx.User = user		ctx.IsSigned = user != nil		ctx.Data["IsSigned"] = ctx.IsSigned		if user != nil {			ctx.Data["SignedUser"] = user			ctx.Data["SignedUserId"] = user.Id			ctx.Data["SignedUserName"] = user.Name			ctx.Data["IsAdmin"] = ctx.User.IsAdmin		}		// get or create csrf token		ctx.Data["CsrfToken"] = ctx.CsrfToken()		ctx.Data["CsrfTokenHtml"] = template.HTML(`<input type="hidden" name="_csrf" value="` + ctx.csrfToken + `">`)		c.Map(ctx)		c.Next()	}}
 |