Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Boxiang Sun
gitlab-ce
Commits
2b73aaa1
Commit
2b73aaa1
authored
Aug 14, 2016
by
Ali Ibrahim
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Allow to add deploy keys with write-access
parent
d1da2e81
Changes
7
Show whitespace changes
Inline
Side-by-side
Showing
7 changed files
with
68 additions
and
20 deletions
+68
-20
CHANGELOG
CHANGELOG
+1
-0
app/controllers/projects/deploy_keys_controller.rb
app/controllers/projects/deploy_keys_controller.rb
+1
-1
app/views/projects/deploy_keys/_form.html.haml
app/views/projects/deploy_keys/_form.html.haml
+9
-0
db/migrate/20160811172945_add_can_push_to_keys.rb
db/migrate/20160811172945_add_can_push_to_keys.rb
+27
-0
db/schema.rb
db/schema.rb
+11
-10
lib/gitlab/git_access.rb
lib/gitlab/git_access.rb
+12
-5
spec/lib/gitlab/git_access_spec.rb
spec/lib/gitlab/git_access_spec.rb
+7
-4
No files found.
CHANGELOG
View file @
2b73aaa1
...
...
@@ -126,6 +126,7 @@ v 8.10.6
- Restore "Largest repository" sort option on Admin > Projects page. !5797
- Fix privilege escalation via project export.
- Require administrator privileges to perform a project import.
- Allow to add deploy keys with write-access !5807 (Ali Ibrahim)
v 8.10.5
- Add a data migration to fix some missing timestamps in the members table. !5670
...
...
app/controllers/projects/deploy_keys_controller.rb
View file @
2b73aaa1
...
...
@@ -53,6 +53,6 @@ class Projects::DeployKeysController < Projects::ApplicationController
end
def
deploy_key_params
params
.
require
(
:deploy_key
).
permit
(
:key
,
:title
)
params
.
require
(
:deploy_key
).
permit
(
:key
,
:title
,
:can_push
)
end
end
app/views/projects/deploy_keys/_form.html.haml
View file @
2b73aaa1
...
...
@@ -10,4 +10,13 @@
%p
.light.append-bottom-0
Paste a machine public key here. Read more about how to generate it
=
link_to
"here"
,
help_page_path
(
"ssh/README"
)
.form-group
.checkbox
=
f
.
label
:can_push
do
=
f
.
check_box
:can_push
%strong
Allow write access
.form-group
%p
.light.append-bottom-0
Can this key be used to push to this repository? Deploy keys always have pull access
=
f
.
submit
"Add key"
,
class:
"btn-create btn"
db/migrate/20160811172945_add_can_push_to_keys.rb
0 → 100644
View file @
2b73aaa1
# See http://doc.gitlab.com/ce/development/migration_style_guide.html
# for more information on how to write migrations for GitLab.
class
AddCanPushToKeys
<
ActiveRecord
::
Migration
include
Gitlab
::
Database
::
MigrationHelpers
# Set this constant to true if this migration requires downtime.
DOWNTIME
=
false
# When a migration requires downtime you **must** uncomment the following
# constant and define a short and easy to understand explanation as to why the
# migration requires downtime.
# DOWNTIME_REASON = ''
# When using the methods "add_concurrent_index" or "add_column_with_default"
# you must disable the use of transactions as these methods can not run in an
# existing transaction. When using "add_concurrent_index" make sure that this
# method is the _only_ method called in the migration, any other changes
# should go in a separate migration. This ensures that upon failure _only_ the
# index creation fails and can be retried or reverted easily.
#
disable_ddl_transaction!
def
change
add_column_with_default
(
:keys
,
:can_push
,
:boolean
,
default:
false
,
allow_null:
false
)
end
end
db/schema.rb
View file @
2b73aaa1
...
...
@@ -11,7 +11,7 @@
#
# It's strongly recommended that you check this file into your version control system.
ActiveRecord
::
Schema
.
define
(
version:
2016081
0142633
)
do
ActiveRecord
::
Schema
.
define
(
version:
2016081
1172945
)
do
# These are extensions that must be enabled in order to support this database
enable_extension
"plpgsql"
...
...
@@ -484,6 +484,7 @@ ActiveRecord::Schema.define(version: 20160810142633) do
t
.
string
"type"
t
.
string
"fingerprint"
t
.
boolean
"public"
,
default:
false
,
null:
false
t
.
boolean
"can_push"
,
default:
false
,
null:
false
end
add_index
"keys"
,
[
"fingerprint"
],
name:
"index_keys_on_fingerprint"
,
unique:
true
,
using: :btree
...
...
@@ -589,12 +590,12 @@ ActiveRecord::Schema.define(version: 20160810142633) do
t
.
datetime
"locked_at"
t
.
integer
"updated_by_id"
t
.
string
"merge_error"
t
.
text
"merge_params"
t
.
boolean
"merge_when_build_succeeds"
,
default:
false
,
null:
false
t
.
integer
"merge_user_id"
t
.
string
"merge_commit_sha"
t
.
datetime
"deleted_at"
t
.
string
"in_progress_merge_commit_sha"
t
.
text
"merge_params"
end
add_index
"merge_requests"
,
[
"assignee_id"
],
name:
"index_merge_requests_on_assignee_id"
,
using: :btree
...
...
lib/gitlab/git_access.rb
View file @
2b73aaa1
...
...
@@ -50,10 +50,13 @@ module Gitlab
end
def
push_access_check
(
changes
)
unless
project
.
repository
.
exists?
return
build_status_object
(
false
,
"A repository for this project does not exist yet."
)
end
if
user
user_push_access_check
(
changes
)
elsif
deploy_key
build_status_object
(
false
,
"Deploy keys are not allowed to push code."
)
deploy_key_push_access_check
(
changes
)
else
raise
'Wrong actor'
end
...
...
@@ -72,10 +75,6 @@ module Gitlab
return
build_status_object
(
true
)
end
unless
project
.
repository
.
exists?
return
build_status_object
(
false
,
"A repository for this project does not exist yet."
)
end
changes_list
=
Gitlab
::
ChangesList
.
new
(
changes
)
# Iterate over all changes to find if user allowed all of them to be applied
...
...
@@ -90,6 +89,14 @@ module Gitlab
build_status_object
(
true
)
end
def
deploy_key_push_access_check
(
changes
)
if
actor
.
can_push?
build_status_object
(
true
)
else
build_status_object
(
false
,
"The deploy key does not have write access to the project."
)
end
end
def
change_access_check
(
change
)
Checks
::
ChangeAccess
.
new
(
change
,
user_access:
user_access
,
project:
project
).
exec
end
...
...
spec/lib/gitlab/git_access_spec.rb
View file @
2b73aaa1
...
...
@@ -284,19 +284,22 @@ describe Gitlab::GitAccess, lib: true do
end
describe
'deploy key permissions'
do
let
(
:key
)
{
create
(
:deploy_key
)
}
let
(
:actor
)
{
key
}
context
'push code'
do
subject
{
access
.
check
(
'git-receive-pack'
,
'_any'
)
}
context
'when project is authorized'
do
let
(
:key
)
{
create
(
:deploy_key
,
can_push:
true
)
}
let
(
:actor
)
{
key
}
before
{
key
.
projects
<<
project
}
it
{
expect
(
subject
).
not_
to
be_allowed
}
it
{
expect
(
subject
).
to
be_allowed
}
end
context
'when unauthorized'
do
let
(
:key
)
{
create
(
:deploy_key
,
can_push:
false
)
}
let
(
:actor
)
{
key
}
context
'to public project'
do
let
(
:project
)
{
create
(
:project
,
:public
)
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment