2017-05-04 00:42:02 -05:00
|
|
|
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2017-04-18 22:45:01 -05:00
|
|
|
package private
|
|
|
|
|
|
|
|
import (
|
2021-07-14 09:43:13 -05:00
|
|
|
"context"
|
2017-04-18 22:45:01 -05:00
|
|
|
"crypto/tls"
|
|
|
|
"fmt"
|
2017-08-03 10:32:13 -05:00
|
|
|
"net"
|
2017-04-18 22:45:01 -05:00
|
|
|
"net/http"
|
2022-10-11 03:57:37 -05:00
|
|
|
"os"
|
|
|
|
"strings"
|
2017-04-18 22:45:01 -05:00
|
|
|
|
|
|
|
"code.gitea.io/gitea/modules/httplib"
|
2021-07-24 11:03:58 -05:00
|
|
|
"code.gitea.io/gitea/modules/json"
|
2021-12-01 01:50:01 -06:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
2022-08-21 13:20:43 -05:00
|
|
|
"code.gitea.io/gitea/modules/proxyprotocol"
|
2017-04-18 22:45:01 -05:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
|
|
|
)
|
|
|
|
|
2022-10-11 03:57:37 -05:00
|
|
|
func newRequest(ctx context.Context, url, method, sourceIP string) *httplib.Request {
|
2021-12-01 01:50:01 -06:00
|
|
|
if setting.InternalToken == "" {
|
|
|
|
log.Fatal(`The INTERNAL_TOKEN setting is missing from the configuration file: %q.
|
|
|
|
Ensure you are running in the correct environment or set the correct configuration file with -c.`, setting.CustomConf)
|
|
|
|
}
|
2021-07-14 09:43:13 -05:00
|
|
|
return httplib.NewRequest(url, method).
|
|
|
|
SetContext(ctx).
|
2022-10-11 03:57:37 -05:00
|
|
|
Header("X-Real-IP", sourceIP).
|
2021-12-01 01:50:01 -06:00
|
|
|
Header("Authorization", fmt.Sprintf("Bearer %s", setting.InternalToken))
|
2017-04-18 22:45:01 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Response internal request response
|
|
|
|
type Response struct {
|
|
|
|
Err string `json:"err"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func decodeJSONError(resp *http.Response) *Response {
|
|
|
|
var res Response
|
|
|
|
err := json.NewDecoder(resp.Body).Decode(&res)
|
|
|
|
if err != nil {
|
|
|
|
res.Err = err.Error()
|
|
|
|
}
|
|
|
|
return &res
|
|
|
|
}
|
|
|
|
|
2022-10-11 03:57:37 -05:00
|
|
|
func getClientIP() string {
|
|
|
|
sshConnEnv := strings.TrimSpace(os.Getenv("SSH_CONNECTION"))
|
|
|
|
if len(sshConnEnv) == 0 {
|
|
|
|
return "127.0.0.1"
|
|
|
|
}
|
|
|
|
return strings.Fields(sshConnEnv)[0]
|
|
|
|
}
|
|
|
|
|
2021-07-14 09:43:13 -05:00
|
|
|
func newInternalRequest(ctx context.Context, url, method string) *httplib.Request {
|
2022-10-11 03:57:37 -05:00
|
|
|
req := newRequest(ctx, url, method, getClientIP()).SetTLSClientConfig(&tls.Config{
|
2017-08-03 10:32:13 -05:00
|
|
|
InsecureSkipVerify: true,
|
2019-01-23 18:47:54 -06:00
|
|
|
ServerName: setting.Domain,
|
2017-08-03 10:32:13 -05:00
|
|
|
})
|
2021-12-05 22:46:11 -06:00
|
|
|
if setting.Protocol == setting.HTTPUnix {
|
2017-08-03 10:32:13 -05:00
|
|
|
req.SetTransport(&http.Transport{
|
2021-07-14 09:43:13 -05:00
|
|
|
DialContext: func(ctx context.Context, _, _ string) (net.Conn, error) {
|
|
|
|
var d net.Dialer
|
2022-08-21 13:20:43 -05:00
|
|
|
conn, err := d.DialContext(ctx, "unix", setting.HTTPAddr)
|
|
|
|
if err != nil {
|
|
|
|
return conn, err
|
|
|
|
}
|
|
|
|
if setting.LocalUseProxyProtocol {
|
|
|
|
if err = proxyprotocol.WriteLocalHeader(conn); err != nil {
|
|
|
|
_ = conn.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return conn, err
|
|
|
|
},
|
|
|
|
})
|
|
|
|
} else if setting.LocalUseProxyProtocol {
|
|
|
|
req.SetTransport(&http.Transport{
|
|
|
|
DialContext: func(ctx context.Context, network, address string) (net.Conn, error) {
|
|
|
|
var d net.Dialer
|
|
|
|
conn, err := d.DialContext(ctx, network, address)
|
|
|
|
if err != nil {
|
|
|
|
return conn, err
|
|
|
|
}
|
|
|
|
if err = proxyprotocol.WriteLocalHeader(conn); err != nil {
|
|
|
|
_ = conn.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return conn, err
|
2021-07-14 09:43:13 -05:00
|
|
|
},
|
2017-08-03 10:32:13 -05:00
|
|
|
})
|
|
|
|
}
|
|
|
|
return req
|
|
|
|
}
|