debian-mirror-gitlab/lib/api/internal.rb

157 lines
4.2 KiB
Ruby
Raw Normal View History

2014-09-02 18:07:02 +05:30
module API
# Internal access API
class Internal < Grape::API
2015-04-26 12:48:37 +05:30
before { authenticate_by_gitlab_shell_token! }
2014-09-02 18:07:02 +05:30
namespace 'internal' do
# Check if git command is allowed to project
#
# Params:
# key_id - ssh key id for Git over SSH
# user_id - user id for Git over HTTP
# project - project path with namespace
# action - git action (git-upload-pack or git-receive-pack)
# ref - branch name
# forced_push - forced_push
2016-08-24 12:49:21 +05:30
# protocol - Git access protocol being used, e.g. HTTP or SSH
2014-09-02 18:07:02 +05:30
#
2016-06-02 11:05:42 +05:30
helpers do
def wiki?
@wiki ||= params[:project].end_with?('.wiki') &&
!Project.find_with_namespace(params[:project])
end
2016-08-24 12:49:21 +05:30
def project
@project ||= begin
project_path = params[:project]
# Check for *.wiki repositories.
# Strip out the .wiki from the pathname before finding the
# project. This applies the correct project permissions to
# the wiki repository as well.
project_path.chomp!('.wiki') if wiki?
Project.find_with_namespace(project_path)
end
end
2016-09-29 09:46:39 +05:30
def ssh_authentication_abilities
[
:read_project,
:download_code,
:push_code
]
end
2016-06-02 11:05:42 +05:30
end
2015-04-26 12:48:37 +05:30
post "/allowed" do
status 200
2016-06-02 11:05:42 +05:30
actor =
2015-04-26 12:48:37 +05:30
if params[:key_id]
Key.find_by(id: params[:key_id])
elsif params[:user_id]
User.find_by(id: params[:user_id])
end
2016-08-24 12:49:21 +05:30
protocol = params[:protocol]
2015-04-26 12:48:37 +05:30
2015-09-11 14:41:01 +05:30
access =
2016-06-02 11:05:42 +05:30
if wiki?
2016-09-29 09:46:39 +05:30
Gitlab::GitAccessWiki.new(actor, project, protocol, authentication_abilities: ssh_authentication_abilities)
2015-09-11 14:41:01 +05:30
else
2016-09-29 09:46:39 +05:30
Gitlab::GitAccess.new(actor, project, protocol, authentication_abilities: ssh_authentication_abilities)
2015-09-11 14:41:01 +05:30
end
2015-04-26 12:48:37 +05:30
2016-08-24 12:49:21 +05:30
access_status = access.check(params[:action], params[:changes])
response = { status: access_status.status, message: access_status.message }
if access_status.status
# Return the repository full path so that gitlab-shell has it when
# handling ssh commands
response[:repository_path] =
if wiki?
project.wiki.repository.path_to_repo
else
project.repository.path_to_repo
end
end
response
2014-09-02 18:07:02 +05:30
end
2016-09-29 09:46:39 +05:30
post "/lfs_authenticate" do
status 200
key = Key.find(params[:key_id])
token_handler = Gitlab::LfsToken.new(key)
{
username: token_handler.actor_name,
2016-10-01 15:18:49 +05:30
lfs_token: token_handler.token,
2016-09-29 09:46:39 +05:30
repository_http_path: project.http_url_to_repo
}
end
2016-09-13 17:45:13 +05:30
get "/merge_request_urls" do
::MergeRequests::GetUrlsService.new(project).execute(params[:changes])
end
2014-09-02 18:07:02 +05:30
#
# Discover user by ssh key
#
get "/discover" do
key = Key.find(params[:key_id])
present key.user, with: Entities::UserSafe
end
get "/check" do
{
api_version: API.version,
gitlab_version: Gitlab::VERSION,
gitlab_rev: Gitlab::REVISION,
}
end
2015-04-26 12:48:37 +05:30
get "/broadcast_message" do
if message = BroadcastMessage.current
present message, with: Entities::BroadcastMessage
else
{}
end
end
2016-09-29 09:46:39 +05:30
post '/two_factor_recovery_codes' do
status 200
key = Key.find_by(id: params[:key_id])
unless key
return { 'success' => false, 'message' => 'Could not find the given key' }
end
if key.is_a?(DeployKey)
return { success: false, message: 'Deploy keys cannot be used to retrieve recovery codes' }
end
user = key.user
unless user
return { success: false, message: 'Could not find a user for the given key' }
end
unless user.two_factor_enabled?
return { success: false, message: 'Two-factor authentication is not enabled for this user' }
end
codes = user.generate_otp_backup_codes!
user.save!
{ success: true, recovery_codes: codes }
end
2014-09-02 18:07:02 +05:30
end
end
end