254 lines
5.9 KiB
Go
254 lines
5.9 KiB
Go
package server
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
"github.com/gin-gonic/gin/binding"
|
|
|
|
"github.com/drone/drone/common"
|
|
"github.com/drone/drone/common/httputil"
|
|
"github.com/drone/drone/common/sshutil"
|
|
"github.com/drone/drone/remote"
|
|
)
|
|
|
|
// repoResp is a data structure used for sending
|
|
// repository data to the client, augmented with
|
|
// additional repository meta-data.
|
|
type repoResp struct {
|
|
*common.Repo
|
|
Perms *common.Perm `json:"permissions,omitempty"`
|
|
Watch *common.Subscriber `json:"subscription,omitempty"`
|
|
Keypair *common.Keypair `json:"keypair,omitempty"`
|
|
Params map[string]string `json:"params,omitempty"`
|
|
}
|
|
|
|
// repoReq is a data structure used for receiving
|
|
// repository data from the client to modify the
|
|
// attributes of an existing repository.
|
|
//
|
|
// note that attributes are pointers so that we can
|
|
// accept null values, effectively patching an existing
|
|
// repository object with only the supplied fields.
|
|
type repoReq struct {
|
|
Disabled *bool `json:"disabled"`
|
|
DisablePR *bool `json:"disable_prs"`
|
|
DisableTag *bool `json:"disable_tags"`
|
|
Trusted *bool `json:"privileged"`
|
|
Timeout *int64 `json:"timeout"`
|
|
|
|
// optional private parameters can only be
|
|
// supplied by the repository admin.
|
|
Params *map[string]string `json:"params"`
|
|
}
|
|
|
|
// GetRepo accepts a request to retrieve a commit
|
|
// from the datastore for the given repository, branch and
|
|
// commit hash.
|
|
//
|
|
// GET /api/repos/:owner/:name
|
|
//
|
|
func GetRepo(c *gin.Context) {
|
|
store := ToDatastore(c)
|
|
repo := ToRepo(c)
|
|
user := ToUser(c)
|
|
perm := ToPerm(c)
|
|
data := repoResp{repo, perm, nil, nil, nil}
|
|
// if the user is an administrator of the project
|
|
// we should display the private parameter data.
|
|
if perm.Admin {
|
|
data.Params, _ = store.RepoParams(repo.FullName)
|
|
}
|
|
// if the user is authenticated, we should display
|
|
// if she is watching the current repository.
|
|
if user == nil {
|
|
c.JSON(200, data)
|
|
return
|
|
}
|
|
|
|
// check to see if the user is subscribing to the repo
|
|
data.Watch = &common.Subscriber{}
|
|
data.Watch.Subscribed, _ = store.Subscribed(user.Login, repo.FullName)
|
|
data.Keypair, _ = store.RepoKeypair(repo.FullName)
|
|
|
|
c.JSON(200, data)
|
|
}
|
|
|
|
// PutRepo accapets a request to update the named repository
|
|
// in the datastore. It expects a JSON input and returns the
|
|
// updated repository in JSON format if successful.
|
|
//
|
|
// PUT /api/repos/:owner/:name
|
|
//
|
|
func PutRepo(c *gin.Context) {
|
|
store := ToDatastore(c)
|
|
perm := ToPerm(c)
|
|
user := ToUser(c)
|
|
repo := ToRepo(c)
|
|
|
|
in := &repoReq{}
|
|
if !c.BindWith(in, binding.JSON) {
|
|
return
|
|
}
|
|
|
|
if in.Params != nil {
|
|
err := store.SetRepoParams(repo.FullName, *in.Params)
|
|
if err != nil {
|
|
c.Fail(400, err)
|
|
return
|
|
}
|
|
}
|
|
if in.Disabled != nil {
|
|
repo.Disabled = *in.Disabled
|
|
}
|
|
if in.DisablePR != nil {
|
|
repo.DisablePR = *in.DisablePR
|
|
}
|
|
if in.DisableTag != nil {
|
|
repo.DisableTag = *in.DisableTag
|
|
}
|
|
if in.Trusted != nil && user.Admin {
|
|
repo.Trusted = *in.Trusted
|
|
}
|
|
if in.Timeout != nil && user.Admin {
|
|
repo.Timeout = *in.Timeout
|
|
}
|
|
|
|
err := store.SetRepo(repo)
|
|
if err != nil {
|
|
c.Fail(400, err)
|
|
return
|
|
}
|
|
|
|
data := repoResp{repo, perm, nil, nil, nil}
|
|
data.Params, _ = store.RepoParams(repo.FullName)
|
|
|
|
// check to see if the user is subscribing to the repo
|
|
data.Watch = &common.Subscriber{}
|
|
data.Watch.Subscribed, _ = store.Subscribed(user.Login, repo.FullName)
|
|
data.Keypair, _ = store.RepoKeypair(repo.FullName)
|
|
|
|
c.JSON(200, data)
|
|
}
|
|
|
|
// DeleteRepo accepts a request to delete the named
|
|
// repository.
|
|
//
|
|
// DEL /api/repos/:owner/:name
|
|
//
|
|
func DeleteRepo(c *gin.Context) {
|
|
ds := ToDatastore(c)
|
|
u := ToUser(c)
|
|
r := ToRepo(c)
|
|
|
|
link := fmt.Sprintf(
|
|
"%s/api/hook",
|
|
httputil.GetURL(c.Request),
|
|
)
|
|
|
|
remote := ToRemote(c)
|
|
err := remote.Deactivate(u, r, link)
|
|
if err != nil {
|
|
c.Fail(400, err)
|
|
}
|
|
|
|
err = ds.DelRepo(r)
|
|
if err != nil {
|
|
c.Fail(400, err)
|
|
}
|
|
c.Writer.WriteHeader(200)
|
|
}
|
|
|
|
// PostRepo accapets a request to activate the named repository
|
|
// in the datastore. It returns a 201 status created if successful
|
|
//
|
|
// POST /api/repos/:owner/:name
|
|
//
|
|
func PostRepo(c *gin.Context) {
|
|
user := ToUser(c)
|
|
store := ToDatastore(c)
|
|
owner := c.Params.ByName("owner")
|
|
name := c.Params.ByName("name")
|
|
|
|
link := fmt.Sprintf(
|
|
"%s/api/hook",
|
|
httputil.GetURL(c.Request),
|
|
)
|
|
|
|
// TODO(bradrydzewski) verify repo not exists
|
|
|
|
// get the repository and user permissions
|
|
// from the remote system.
|
|
remote := ToRemote(c)
|
|
r, err := remote.Repo(user, owner, name)
|
|
if err != nil {
|
|
c.Fail(400, err)
|
|
}
|
|
m, err := remote.Perm(user, owner, name)
|
|
if err != nil {
|
|
c.Fail(400, err)
|
|
return
|
|
}
|
|
if !m.Admin {
|
|
c.Fail(403, fmt.Errorf("must be repository admin"))
|
|
return
|
|
}
|
|
|
|
// set the repository owner to the
|
|
// currently authenticated user.
|
|
r.User = &common.Owner{Login: user.Login}
|
|
|
|
// generate an RSA key and add to the repo
|
|
key, err := sshutil.GeneratePrivateKey()
|
|
if err != nil {
|
|
c.Fail(400, err)
|
|
return
|
|
}
|
|
keypair := &common.Keypair{}
|
|
keypair.Public = sshutil.MarshalPublicKey(&key.PublicKey)
|
|
keypair.Private = sshutil.MarshalPrivateKey(key)
|
|
|
|
// activate the repository before we make any
|
|
// local changes to the database.
|
|
// err = remote.Activate(user, r, keypair, link)
|
|
// if err != nil {
|
|
// c.Fail(500, err)
|
|
// return
|
|
// }
|
|
println(link)
|
|
|
|
// persist the repository
|
|
err = store.SetRepoNotExists(user, r)
|
|
if err != nil {
|
|
c.Fail(500, err)
|
|
return
|
|
}
|
|
|
|
// persisty the repository key pair
|
|
err = store.SetRepoKeypair(r.FullName, keypair)
|
|
if err != nil {
|
|
c.Fail(500, err)
|
|
return
|
|
}
|
|
|
|
c.JSON(200, r)
|
|
}
|
|
|
|
// perms is a helper function that returns user permissions
|
|
// for a particular repository.
|
|
func perms(remote remote.Remote, u *common.User, r *common.Repo) *common.Perm {
|
|
switch {
|
|
case u == nil && r.Private:
|
|
return &common.Perm{}
|
|
case u == nil && r.Private == false:
|
|
return &common.Perm{Pull: true}
|
|
case u.Admin:
|
|
return &common.Perm{Pull: true, Push: true, Admin: true}
|
|
}
|
|
|
|
p, err := remote.Perm(u, r.Owner, r.Name)
|
|
if err != nil {
|
|
return &common.Perm{}
|
|
}
|
|
return p
|
|
}
|