agola/internal/services/gateway/action/remotesource.go

194 lines
5.9 KiB
Go
Raw Normal View History

// Copyright 2019 Sorint.lab
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied
// See the License for the specific language governing permissions and
// limitations under the License.
package action
import (
"context"
"agola.io/agola/internal/errors"
"agola.io/agola/internal/services/gateway/common"
2019-07-01 09:40:20 +00:00
"agola.io/agola/internal/util"
cstypes "agola.io/agola/services/configstore/types"
)
func (h *ActionHandler) GetRemoteSource(ctx context.Context, rsRef string) (*cstypes.RemoteSource, error) {
rs, _, err := h.configstoreClient.GetRemoteSource(ctx, rsRef)
if err != nil {
return nil, errors.WithStack(err)
}
return rs, nil
}
type GetRemoteSourcesRequest struct {
Start string
Limit int
Asc bool
}
func (h *ActionHandler) GetRemoteSources(ctx context.Context, req *GetRemoteSourcesRequest) ([]*cstypes.RemoteSource, error) {
remoteSources, _, err := h.configstoreClient.GetRemoteSources(ctx, req.Start, req.Limit, req.Asc)
if err != nil {
return nil, errors.WithStack(err)
}
return remoteSources, nil
}
type CreateRemoteSourceRequest struct {
Name string
APIURL string
SkipVerify bool
Type string
AuthType string
Oauth2ClientID string
Oauth2ClientSecret string
SSHHostKey string
SkipSSHHostKeyCheck bool
RegistrationEnabled *bool
LoginEnabled *bool
}
func (h *ActionHandler) CreateRemoteSource(ctx context.Context, req *CreateRemoteSourceRequest) (*cstypes.RemoteSource, error) {
if !common.IsUserAdmin(ctx) {
2019-05-03 21:19:23 +00:00
return nil, errors.Errorf("user not admin")
}
if !util.ValidateName(req.Name) {
return nil, util.NewAPIError(util.ErrBadRequest, errors.Errorf("invalid remotesource name %q", req.Name))
}
if req.Name == "" {
return nil, util.NewAPIError(util.ErrBadRequest, errors.Errorf("remotesource name required"))
}
if req.APIURL == "" {
return nil, util.NewAPIError(util.ErrBadRequest, errors.Errorf("remotesource api url required"))
}
if req.Type == "" {
return nil, util.NewAPIError(util.ErrBadRequest, errors.Errorf("remotesource type required"))
}
if req.AuthType == "" {
return nil, util.NewAPIError(util.ErrBadRequest, errors.Errorf("remotesource auth type required"))
}
// validate if the remote source type supports the required auth type
if !cstypes.SourceSupportsAuthType(cstypes.RemoteSourceType(req.Type), cstypes.RemoteSourceAuthType(req.AuthType)) {
return nil, util.NewAPIError(util.ErrBadRequest, errors.Errorf("remotesource type %q doesn't support auth type %q", req.Type, req.AuthType))
}
if req.AuthType == string(cstypes.RemoteSourceAuthTypeOauth2) {
if req.Oauth2ClientID == "" {
return nil, util.NewAPIError(util.ErrBadRequest, errors.Errorf("remotesource oauth2 clientid required"))
}
if req.Oauth2ClientSecret == "" {
return nil, util.NewAPIError(util.ErrBadRequest, errors.Errorf("remotesource oauth2 client secret required"))
}
}
rs := &cstypes.RemoteSource{
Name: req.Name,
Type: cstypes.RemoteSourceType(req.Type),
AuthType: cstypes.RemoteSourceAuthType(req.AuthType),
APIURL: req.APIURL,
SkipVerify: req.SkipVerify,
Oauth2ClientID: req.Oauth2ClientID,
Oauth2ClientSecret: req.Oauth2ClientSecret,
SSHHostKey: req.SSHHostKey,
SkipSSHHostKeyCheck: req.SkipSSHHostKeyCheck,
RegistrationEnabled: req.RegistrationEnabled,
LoginEnabled: req.LoginEnabled,
}
h.log.Info().Msgf("creating remotesource")
rs, _, err := h.configstoreClient.CreateRemoteSource(ctx, rs)
if err != nil {
return nil, errors.Wrapf(err, "failed to create remotesource")
}
h.log.Info().Msgf("remotesource %s created, ID: %s", rs.Name, rs.ID)
return rs, nil
}
2019-05-23 08:29:03 +00:00
type UpdateRemoteSourceRequest struct {
RemoteSourceRef string
Name *string
APIURL *string
SkipVerify *bool
Oauth2ClientID *string
Oauth2ClientSecret *string
SSHHostKey *string
SkipSSHHostKeyCheck *bool
RegistrationEnabled *bool
LoginEnabled *bool
2019-05-23 08:29:03 +00:00
}
func (h *ActionHandler) UpdateRemoteSource(ctx context.Context, req *UpdateRemoteSourceRequest) (*cstypes.RemoteSource, error) {
if !common.IsUserAdmin(ctx) {
2019-05-23 08:29:03 +00:00
return nil, errors.Errorf("user not admin")
}
rs, _, err := h.configstoreClient.GetRemoteSource(ctx, req.RemoteSourceRef)
2019-05-23 08:29:03 +00:00
if err != nil {
return nil, errors.WithStack(err)
2019-05-23 08:29:03 +00:00
}
if req.Name != nil {
rs.Name = *req.Name
}
if req.APIURL != nil {
rs.APIURL = *req.APIURL
}
if req.SkipVerify != nil {
rs.SkipVerify = *req.SkipVerify
}
if req.Oauth2ClientID != nil {
rs.Oauth2ClientID = *req.Oauth2ClientID
}
if req.Oauth2ClientSecret != nil {
rs.Oauth2ClientSecret = *req.Oauth2ClientSecret
}
if req.SSHHostKey != nil {
rs.SSHHostKey = *req.SSHHostKey
}
if req.SkipSSHHostKeyCheck != nil {
rs.SkipSSHHostKeyCheck = *req.SkipSSHHostKeyCheck
}
if req.RegistrationEnabled != nil {
rs.RegistrationEnabled = req.RegistrationEnabled
}
if req.LoginEnabled != nil {
rs.LoginEnabled = req.LoginEnabled
}
2019-05-23 08:29:03 +00:00
h.log.Info().Msgf("updating remotesource")
rs, _, err = h.configstoreClient.UpdateRemoteSource(ctx, req.RemoteSourceRef, rs)
2019-05-23 08:29:03 +00:00
if err != nil {
return nil, errors.Wrapf(err, "failed to update remotesource")
2019-05-23 08:29:03 +00:00
}
h.log.Info().Msgf("remotesource %s updated", rs.Name)
2019-05-23 08:29:03 +00:00
return rs, nil
}
func (h *ActionHandler) DeleteRemoteSource(ctx context.Context, rsRef string) error {
if !common.IsUserAdmin(ctx) {
2019-05-03 21:19:23 +00:00
return errors.Errorf("user not admin")
}
if _, err := h.configstoreClient.DeleteRemoteSource(ctx, rsRef); err != nil {
return errors.Wrapf(err, "failed to delete remote source")
}
return nil
}