60feff5cef
All the validation must be done inside the configstore since it's the source of truth. The gateway could also do some validation to avoid bad requests to the configstore when needed or when the logic resides outside the configstore (like project setup or user registration)
119 lines
3.5 KiB
Go
119 lines
3.5 KiB
Go
// Copyright 2019 Sorint.lab
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package common
|
|
|
|
import (
|
|
gitsource "github.com/sorintlab/agola/internal/gitsources"
|
|
"github.com/sorintlab/agola/internal/gitsources/gitea"
|
|
"github.com/sorintlab/agola/internal/gitsources/gitlab"
|
|
"github.com/sorintlab/agola/internal/services/types"
|
|
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
func newGitea(rs *types.RemoteSource, accessToken string) (*gitea.Client, error) {
|
|
return gitea.New(gitea.Opts{
|
|
URL: rs.APIURL,
|
|
SkipVerify: rs.SkipVerify,
|
|
Token: accessToken,
|
|
})
|
|
}
|
|
|
|
func newGitlab(rs *types.RemoteSource, accessToken string) (*gitlab.Client, error) {
|
|
return gitlab.New(gitlab.Opts{
|
|
URL: rs.APIURL,
|
|
SkipVerify: rs.SkipVerify,
|
|
Token: accessToken,
|
|
Oauth2ClientID: rs.Oauth2ClientID,
|
|
Oauth2Secret: rs.Oauth2ClientSecret,
|
|
})
|
|
}
|
|
|
|
func GetAccessToken(rs *types.RemoteSource, userAccessToken, oauth2AccessToken string) (string, error) {
|
|
switch rs.AuthType {
|
|
case types.RemoteSourceAuthTypePassword:
|
|
return userAccessToken, nil
|
|
case types.RemoteSourceAuthTypeOauth2:
|
|
return oauth2AccessToken, nil
|
|
default:
|
|
return "", errors.Errorf("invalid remote source auth type %q", rs.AuthType)
|
|
}
|
|
}
|
|
|
|
func GetGitSource(rs *types.RemoteSource, la *types.LinkedAccount) (gitsource.GitSource, error) {
|
|
var accessToken string
|
|
if la != nil {
|
|
var err error
|
|
accessToken, err = GetAccessToken(rs, la.UserAccessToken, la.Oauth2AccessToken)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
var gitSource gitsource.GitSource
|
|
var err error
|
|
switch rs.Type {
|
|
case types.RemoteSourceTypeGitea:
|
|
gitSource, err = newGitea(rs, accessToken)
|
|
case types.RemoteSourceTypeGitlab:
|
|
gitSource, err = newGitlab(rs, accessToken)
|
|
default:
|
|
return nil, errors.Errorf("remote source %s isn't a valid git source", rs.Name)
|
|
}
|
|
|
|
return gitSource, err
|
|
}
|
|
|
|
func GetUserSource(rs *types.RemoteSource, accessToken string) (gitsource.UserSource, error) {
|
|
var userSource gitsource.UserSource
|
|
var err error
|
|
switch rs.AuthType {
|
|
case types.RemoteSourceAuthTypeOauth2:
|
|
userSource, err = GetOauth2Source(rs, accessToken)
|
|
case types.RemoteSourceAuthTypePassword:
|
|
userSource, err = GetPasswordSource(rs, accessToken)
|
|
default:
|
|
return nil, errors.Errorf("unknown remote source auth type")
|
|
}
|
|
|
|
return userSource, err
|
|
}
|
|
|
|
func GetOauth2Source(rs *types.RemoteSource, accessToken string) (gitsource.Oauth2Source, error) {
|
|
var oauth2Source gitsource.Oauth2Source
|
|
var err error
|
|
switch rs.Type {
|
|
case types.RemoteSourceTypeGitlab:
|
|
oauth2Source, err = newGitlab(rs, accessToken)
|
|
default:
|
|
return nil, errors.Errorf("remote source %s isn't a valid oauth2 source", rs.Name)
|
|
}
|
|
|
|
return oauth2Source, err
|
|
}
|
|
|
|
func GetPasswordSource(rs *types.RemoteSource, accessToken string) (gitsource.PasswordSource, error) {
|
|
var passwordSource gitsource.PasswordSource
|
|
var err error
|
|
switch rs.Type {
|
|
case types.RemoteSourceTypeGitea:
|
|
passwordSource, err = newGitea(rs, accessToken)
|
|
default:
|
|
return nil, errors.Errorf("remote source %s isn't a valid oauth2 source", rs.Name)
|
|
}
|
|
|
|
return passwordSource, err
|
|
}
|