2017-05-04 14:42:02 +09:00
|
|
|
// Copyright 2017 The Gitea Authors. All rights reserved.
|
2022-11-28 03:20:29 +09:00
|
|
|
// SPDX-License-Identifier: MIT
|
2017-05-04 14:42:02 +09:00
|
|
|
|
2017-04-19 12:45:01 +09:00
|
|
|
package private
|
|
|
|
|
|
|
|
import (
|
2021-07-14 23:43:13 +09:00
|
|
|
"context"
|
2017-04-19 12:45:01 +09:00
|
|
|
"crypto/tls"
|
|
|
|
"fmt"
|
2017-08-04 00:32:13 +09:00
|
|
|
"net"
|
2017-04-19 12:45:01 +09:00
|
|
|
"net/http"
|
2022-10-11 17:57:37 +09:00
|
|
|
"os"
|
|
|
|
"strings"
|
2017-04-19 12:45:01 +09:00
|
|
|
|
|
|
|
"code.gitea.io/gitea/modules/httplib"
|
2021-07-25 01:03:58 +09:00
|
|
|
"code.gitea.io/gitea/modules/json"
|
2021-12-01 16:50:01 +09:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
2022-08-22 03:20:43 +09:00
|
|
|
"code.gitea.io/gitea/modules/proxyprotocol"
|
2017-04-19 12:45:01 +09:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
|
|
|
)
|
|
|
|
|
2022-10-11 17:57:37 +09:00
|
|
|
func newRequest(ctx context.Context, url, method, sourceIP string) *httplib.Request {
|
2021-12-01 16:50:01 +09:00
|
|
|
if setting.InternalToken == "" {
|
|
|
|
log.Fatal(`The INTERNAL_TOKEN setting is missing from the configuration file: %q.
|
|
|
|
Ensure you are running in the correct environment or set the correct configuration file with -c.`, setting.CustomConf)
|
|
|
|
}
|
2021-07-14 23:43:13 +09:00
|
|
|
return httplib.NewRequest(url, method).
|
|
|
|
SetContext(ctx).
|
2022-10-11 17:57:37 +09:00
|
|
|
Header("X-Real-IP", sourceIP).
|
2021-12-01 16:50:01 +09:00
|
|
|
Header("Authorization", fmt.Sprintf("Bearer %s", setting.InternalToken))
|
2017-04-19 12:45:01 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
// Response internal request response
|
|
|
|
type Response struct {
|
|
|
|
Err string `json:"err"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func decodeJSONError(resp *http.Response) *Response {
|
|
|
|
var res Response
|
|
|
|
err := json.NewDecoder(resp.Body).Decode(&res)
|
|
|
|
if err != nil {
|
|
|
|
res.Err = err.Error()
|
|
|
|
}
|
|
|
|
return &res
|
|
|
|
}
|
|
|
|
|
2022-10-11 17:57:37 +09:00
|
|
|
func getClientIP() string {
|
|
|
|
sshConnEnv := strings.TrimSpace(os.Getenv("SSH_CONNECTION"))
|
|
|
|
if len(sshConnEnv) == 0 {
|
|
|
|
return "127.0.0.1"
|
|
|
|
}
|
|
|
|
return strings.Fields(sshConnEnv)[0]
|
|
|
|
}
|
|
|
|
|
2021-07-14 23:43:13 +09:00
|
|
|
func newInternalRequest(ctx context.Context, url, method string) *httplib.Request {
|
2022-10-11 17:57:37 +09:00
|
|
|
req := newRequest(ctx, url, method, getClientIP()).SetTLSClientConfig(&tls.Config{
|
2017-08-04 00:32:13 +09:00
|
|
|
InsecureSkipVerify: true,
|
2019-01-24 09:47:54 +09:00
|
|
|
ServerName: setting.Domain,
|
2017-08-04 00:32:13 +09:00
|
|
|
})
|
2021-12-06 13:46:11 +09:00
|
|
|
if setting.Protocol == setting.HTTPUnix {
|
2017-08-04 00:32:13 +09:00
|
|
|
req.SetTransport(&http.Transport{
|
2021-07-14 23:43:13 +09:00
|
|
|
DialContext: func(ctx context.Context, _, _ string) (net.Conn, error) {
|
|
|
|
var d net.Dialer
|
2022-08-22 03:20:43 +09:00
|
|
|
conn, err := d.DialContext(ctx, "unix", setting.HTTPAddr)
|
|
|
|
if err != nil {
|
|
|
|
return conn, err
|
|
|
|
}
|
|
|
|
if setting.LocalUseProxyProtocol {
|
|
|
|
if err = proxyprotocol.WriteLocalHeader(conn); err != nil {
|
|
|
|
_ = conn.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return conn, err
|
|
|
|
},
|
|
|
|
})
|
|
|
|
} else if setting.LocalUseProxyProtocol {
|
|
|
|
req.SetTransport(&http.Transport{
|
|
|
|
DialContext: func(ctx context.Context, network, address string) (net.Conn, error) {
|
|
|
|
var d net.Dialer
|
|
|
|
conn, err := d.DialContext(ctx, network, address)
|
|
|
|
if err != nil {
|
|
|
|
return conn, err
|
|
|
|
}
|
|
|
|
if err = proxyprotocol.WriteLocalHeader(conn); err != nil {
|
|
|
|
_ = conn.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return conn, err
|
2021-07-14 23:43:13 +09:00
|
|
|
},
|
2017-08-04 00:32:13 +09:00
|
|
|
})
|
|
|
|
}
|
|
|
|
return req
|
|
|
|
}
|