Files
SCM-Manager/scm-webapp/src/main/java/sonia/scm/plugin/PluginInstaller.java

94 lines
3.2 KiB
Java
Raw Normal View History

2019-08-20 14:43:48 +02:00
package sonia.scm.plugin;
import com.google.common.hash.HashCode;
2019-08-20 14:43:48 +02:00
import com.google.common.hash.Hashing;
import com.google.common.hash.HashingInputStream;
2019-08-20 14:43:48 +02:00
import sonia.scm.SCMContextProvider;
import sonia.scm.net.ahc.AdvancedHttpClient;
import javax.inject.Inject;
import java.io.IOException;
import java.io.InputStream;
import java.nio.file.Files;
import java.nio.file.Path;
import java.nio.file.Paths;
2019-08-20 14:43:48 +02:00
import java.util.Optional;
@SuppressWarnings("UnstableApiUsage") // guava hash is marked as unstable
2019-08-20 14:43:48 +02:00
class PluginInstaller {
private final SCMContextProvider context;
private final AdvancedHttpClient client;
2020-01-24 12:01:21 +01:00
private final SmpDescriptorExtractor smpDescriptorExtractor;
2019-08-20 14:43:48 +02:00
@Inject
2020-01-24 12:01:21 +01:00
public PluginInstaller(SCMContextProvider context, AdvancedHttpClient client, SmpDescriptorExtractor smpDescriptorExtractor) {
2019-08-20 14:43:48 +02:00
this.context = context;
this.client = client;
2020-01-24 12:01:21 +01:00
this.smpDescriptorExtractor = smpDescriptorExtractor;
2019-08-20 14:43:48 +02:00
}
@SuppressWarnings("squid:S4790") // hashing should be safe
public PendingPluginInstallation install(AvailablePlugin plugin) {
2019-08-21 07:56:52 +02:00
Path file = null;
try (HashingInputStream input = new HashingInputStream(Hashing.sha256(), download(plugin))) {
2019-08-21 07:56:52 +02:00
file = createFile(plugin);
Files.copy(input, file);
2019-08-20 14:43:48 +02:00
2019-08-21 07:56:52 +02:00
verifyChecksum(plugin, input.hash(), file);
2020-01-23 17:05:55 +01:00
verifyConditions(plugin, file);
2019-08-21 12:49:15 +02:00
return new PendingPluginInstallation(plugin.install(), file);
2019-08-20 14:43:48 +02:00
} catch (IOException ex) {
2019-08-21 07:56:52 +02:00
cleanup(file);
throw new PluginDownloadException("failed to download plugin", ex);
2019-08-20 14:43:48 +02:00
}
}
2019-08-21 07:56:52 +02:00
private void cleanup(Path file) {
try {
if (file != null) {
Files.deleteIfExists(file);
}
} catch (IOException e) {
throw new PluginInstallException("failed to cleanup, after broken installation");
}
}
private void verifyChecksum(AvailablePlugin plugin, HashCode hash, Path file) {
2019-08-20 14:43:48 +02:00
Optional<String> checksum = plugin.getDescriptor().getChecksum();
if (checksum.isPresent()) {
String calculatedChecksum = hash.toString();
2019-08-20 14:43:48 +02:00
if (!checksum.get().equalsIgnoreCase(calculatedChecksum)) {
2019-08-21 07:56:52 +02:00
cleanup(file);
2019-08-20 14:43:48 +02:00
throw new PluginChecksumMismatchException(
String.format("downloaded plugin checksum %s does not match expected %s", calculatedChecksum, checksum.get())
);
}
}
}
2020-01-23 17:05:55 +01:00
private void verifyConditions(AvailablePlugin plugin, Path file) throws IOException {
2020-01-24 12:01:21 +01:00
InstalledPluginDescriptor pluginDescriptor = smpDescriptorExtractor.extractPluginDescriptor(file);
2020-01-23 17:05:55 +01:00
if (!pluginDescriptor.getCondition().isSupported()) {
cleanup(file);
throw new PluginConditionFailedException(
pluginDescriptor.getCondition(),
String.format(
"could not load plugin %s, the plugin condition does not match",
plugin.getDescriptor().getInformation().getName()
)
);
}
}
2019-08-20 14:43:48 +02:00
private InputStream download(AvailablePlugin plugin) throws IOException {
return client.get(plugin.getDescriptor().getUrl()).request().contentAsStream();
}
private Path createFile(AvailablePlugin plugin) throws IOException {
Path directory = context.resolve(Paths.get("plugins"));
Files.createDirectories(directory);
return directory.resolve(plugin.getDescriptor().getInformation().getName() + ".smp");
2019-08-20 14:43:48 +02:00
}
}