1
0
mirror of https://github.com/woodpecker-ci/woodpecker.git synced 2024-12-18 08:26:45 +02:00
woodpecker/server/remote/gitlab/gitlab.go

505 lines
14 KiB
Go
Raw Normal View History

2018-02-20 00:24:10 +02:00
// Copyright 2018 Drone.IO Inc.
2018-03-21 15:02:17 +02:00
//
2018-02-20 00:24:10 +02:00
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
2018-03-21 15:02:17 +02:00
//
2018-02-20 00:24:10 +02:00
// http://www.apache.org/licenses/LICENSE-2.0
2018-03-21 15:02:17 +02:00
//
2018-02-20 00:24:10 +02:00
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
2015-07-25 10:49:39 +02:00
package gitlab
import (
"context"
2015-07-25 10:49:39 +02:00
"crypto/tls"
"encoding/json"
2015-07-25 10:49:39 +02:00
"fmt"
"io/ioutil"
"net"
2015-07-25 10:49:39 +02:00
"net/http"
2015-07-27 01:52:18 +02:00
"net/url"
2015-07-25 10:49:39 +02:00
"strings"
"github.com/xanzy/go-gitlab"
"github.com/woodpecker-ci/woodpecker/server"
"github.com/woodpecker-ci/woodpecker/server/model"
"github.com/woodpecker-ci/woodpecker/server/remote"
"github.com/woodpecker-ci/woodpecker/shared/oauth2"
2015-07-25 10:49:39 +02:00
)
const (
defaultScope = "api"
perPage = 100
statusContext = "ci/drone"
)
// Opts defines configuration options.
type Opts struct {
URL string // Gitlab server url.
ClientID string // Oauth2 client id.
ClientSecret string // Oauth2 client secret.
Username string // Optional machine account username.
Password string // Optional machine account password.
PrivateMode bool // Gogs is running in private mode.
SkipVerify bool // Skip ssl verification.
}
// Gitlab implements "Remote" interface
type Gitlab struct {
URL string
ClientID string
ClientSecret string
Machine string
Username string
Password string
PrivateMode bool
SkipVerify bool
HideArchives bool
Search bool
}
// New returns a Remote implementation that integrates with Gitlab, an open
// source Git service. See https://gitlab.com
func New(opts Opts) (remote.Remote, error) {
u, err := url.Parse(opts.URL)
if err != nil {
return nil, err
}
host, _, err := net.SplitHostPort(u.Host)
if err == nil {
u.Host = host
}
return &Gitlab{
URL: opts.URL,
ClientID: opts.ClientID,
ClientSecret: opts.ClientSecret,
Machine: u.Host,
Username: opts.Username,
Password: opts.Password,
PrivateMode: opts.PrivateMode,
SkipVerify: opts.SkipVerify,
}, nil
}
2015-07-25 10:49:39 +02:00
2015-09-30 03:21:17 +02:00
// Login authenticates the session and returns the
// remote user details.
func (g *Gitlab) Login(ctx context.Context, res http.ResponseWriter, req *http.Request) (*model.User, error) {
2015-09-30 03:21:17 +02:00
var config = &oauth2.Config{
ClientId: g.ClientID,
ClientSecret: g.ClientSecret,
Scope: defaultScope,
2015-09-30 03:21:17 +02:00
AuthURL: fmt.Sprintf("%s/oauth/authorize", g.URL),
TokenURL: fmt.Sprintf("%s/oauth/token", g.URL),
RedirectURL: fmt.Sprintf("%s/authorize", server.Config.Server.Host),
2015-09-30 03:21:17 +02:00
}
// get the OAuth errors
if err := req.FormValue("error"); err != "" {
2016-12-19 18:22:11 +02:00
return nil, &remote.AuthError{
Err: err,
Description: req.FormValue("error_description"),
URI: req.FormValue("error_uri"),
}
}
2015-09-30 03:21:17 +02:00
// get the OAuth code
var code = req.FormValue("code")
if len(code) == 0 {
http.Redirect(res, req, config.AuthCodeURL("drone"), http.StatusSeeOther)
return nil, nil
2015-09-30 03:21:17 +02:00
}
var trans = &oauth2.Transport{Config: config, Transport: &http.Transport{
TLSClientConfig: &tls.Config{InsecureSkipVerify: g.SkipVerify},
Proxy: http.ProxyFromEnvironment,
}}
2015-09-30 03:21:17 +02:00
var token_, err = trans.Exchange(code)
2015-07-25 10:49:39 +02:00
if err != nil {
return nil, fmt.Errorf("Error exchanging token. %s", err)
2015-09-30 03:21:17 +02:00
}
client, err := newClient(g.URL, token_.AccessToken, g.SkipVerify)
if err != nil {
return nil, err
}
login, _, err := client.Users.CurrentUser(gitlab.WithContext(ctx))
2015-09-30 03:21:17 +02:00
if err != nil {
return nil, err
2015-07-25 10:49:39 +02:00
}
2016-02-14 02:38:31 +02:00
user := &model.User{
Login: login.Username,
Email: login.Email,
Avatar: login.AvatarURL,
Token: token_.AccessToken,
Secret: token_.RefreshToken,
}
if !strings.HasPrefix(user.Avatar, "http") {
user.Avatar = g.URL + "/" + login.AvatarURL
}
2015-09-30 03:21:17 +02:00
return user, nil
2015-07-25 10:49:39 +02:00
}
// Auth authenticates the session and returns the remote user login for the given token
func (g *Gitlab) Auth(ctx context.Context, token, _ string) (string, error) {
client, err := newClient(g.URL, token, g.SkipVerify)
if err != nil {
return "", err
}
login, _, err := client.Users.CurrentUser(gitlab.WithContext(ctx))
2015-09-30 03:21:17 +02:00
if err != nil {
return "", err
}
return login.Username, nil
2015-07-25 10:49:39 +02:00
}
// Teams fetches a list of team memberships from the remote system.
func (g *Gitlab) Teams(ctx context.Context, user *model.User) ([]*model.Team, error) {
client, err := newClient(g.URL, user.Token, g.SkipVerify)
if err != nil {
return nil, err
}
teams := make([]*model.Team, 0, perPage)
for i := 1; true; i++ {
batch, _, err := client.Groups.ListGroups(&gitlab.ListGroupsOptions{
ListOptions: gitlab.ListOptions{Page: i, PerPage: perPage},
AllAvailable: gitlab.Bool(false),
MinAccessLevel: gitlab.AccessLevel(gitlab.DeveloperPermissions), // TODO: check what's best here
}, gitlab.WithContext(ctx))
if err != nil {
return nil, err
}
for i := range batch {
teams = append(teams, &model.Team{
Login: batch[i].Name,
Avatar: batch[i].AvatarURL,
},
)
}
if len(batch) < perPage {
break
}
}
return teams, nil
}
// getProject fetches the named repository from the remote system.
func (g *Gitlab) getProject(ctx context.Context, client *gitlab.Client, owner, name string) (*gitlab.Project, error) {
repo, _, err := client.Projects.GetProject(fmt.Sprintf("%s/%s", owner, name), nil, gitlab.WithContext(ctx))
if err != nil {
2015-07-28 08:38:15 +02:00
return nil, err
}
return repo, nil
}
// Repo fetches the named repository from the remote system.
func (g *Gitlab) Repo(ctx context.Context, user *model.User, owner, name string) (*model.Repo, error) {
client, err := newClient(g.URL, user.Token, g.SkipVerify)
if err != nil {
return nil, err
2015-07-25 10:49:39 +02:00
}
repo_, err := g.getProject(ctx, client, owner, name)
if err != nil {
return nil, err
2015-07-25 10:49:39 +02:00
}
2015-07-27 00:29:51 +02:00
return g.convertGitlabRepo(repo_)
2015-07-25 10:49:39 +02:00
}
2015-09-30 03:21:17 +02:00
// Repos fetches a list of repos from the remote system.
func (g *Gitlab) Repos(ctx context.Context, user *model.User) ([]*model.Repo, error) {
client, err := newClient(g.URL, user.Token, g.SkipVerify)
2015-09-30 03:21:17 +02:00
if err != nil {
return nil, err
2015-07-25 10:49:39 +02:00
}
repos := make([]*model.Repo, 0, perPage)
opts := &gitlab.ListProjectsOptions{
ListOptions: gitlab.ListOptions{PerPage: perPage},
MinAccessLevel: gitlab.AccessLevel(gitlab.DeveloperPermissions), // TODO: check what's best here
}
if g.HideArchives {
opts.Archived = gitlab.Bool(false)
}
2017-07-14 21:58:38 +02:00
for i := 1; true; i++ {
opts.Page = i
batch, _, err := client.Projects.ListProjects(opts, gitlab.WithContext(ctx))
if err != nil {
return nil, err
2016-02-01 00:55:59 +02:00
}
2015-09-30 03:21:17 +02:00
for i := range batch {
repo, err := g.convertGitlabRepo(batch[i])
if err != nil {
return nil, err
}
repos = append(repos, repo)
2017-07-14 21:58:38 +02:00
}
if len(batch) < perPage {
break
}
2015-09-30 03:21:17 +02:00
}
2016-02-01 00:55:59 +02:00
2015-09-30 03:21:17 +02:00
return repos, err
}
// Perm fetches the named repository from the remote system.
func (g *Gitlab) Perm(ctx context.Context, user *model.User, owner, name string) (*model.Perm, error) {
client, err := newClient(g.URL, user.Token, g.SkipVerify)
if err != nil {
2015-07-28 08:38:15 +02:00
return nil, err
}
repo, err := g.getProject(ctx, client, owner, name)
2015-07-25 10:49:39 +02:00
if err != nil {
return nil, err
}
2016-01-07 16:35:53 +02:00
2016-01-12 17:40:13 +02:00
// repo owner is granted full access
if repo.Owner != nil && repo.Owner.Username == user.Login {
2017-07-14 21:58:38 +02:00
return &model.Perm{Push: true, Pull: true, Admin: true}, nil
2016-01-07 16:35:53 +02:00
}
// return permission for current user
return &model.Perm{
Pull: isRead(repo),
Push: isWrite(repo),
Admin: isAdmin(repo),
}, nil
2015-07-25 10:49:39 +02:00
}
// File fetches a file from the remote repository and returns in string format.
func (g *Gitlab) File(ctx context.Context, user *model.User, repo *model.Repo, build *model.Build, fileName string) ([]byte, error) {
client, err := newClient(g.URL, user.Token, g.SkipVerify)
2017-03-18 13:25:53 +02:00
if err != nil {
return nil, err
}
repo_, err := g.getProject(ctx, client, repo.Owner, repo.Name)
2017-03-18 13:25:53 +02:00
if err != nil {
return nil, err
}
file, _, err := client.RepositoryFiles.GetRawFile(repo_.ID, fileName, &gitlab.GetRawFileOptions{Ref: &build.Commit}, gitlab.WithContext(ctx))
return file, err
2017-03-18 13:25:53 +02:00
}
// Dir fetches a folder from the remote repository
func (g *Gitlab) Dir(ctx context.Context, user *model.User, repo *model.Repo, build *model.Build, path string) ([]*remote.FileMeta, error) {
client, err := newClient(g.URL, user.Token, g.SkipVerify)
if err != nil {
return nil, err
}
files := make([]*remote.FileMeta, 0, perPage)
repo_, err := g.getProject(ctx, client, repo.Owner, repo.Name)
if err != nil {
return nil, err
}
opts := &gitlab.ListTreeOptions{
ListOptions: gitlab.ListOptions{PerPage: perPage},
Path: &path,
Ref: &build.Commit,
Recursive: gitlab.Bool(false),
}
for i := 1; true; i++ {
opts.Page = 1
batch, _, err := client.Repositories.ListTree(repo_.ID, opts, gitlab.WithContext(ctx))
if err != nil {
return nil, err
}
for i := range batch {
if batch[i].Type != "blob" { // no file
continue
}
data, err := g.File(ctx, user, repo, build, batch[i].Path)
if err != nil {
return nil, err
}
files = append(files, &remote.FileMeta{
Name: batch[i].Path,
Data: data,
})
}
if len(batch) < perPage {
break
}
}
return files, nil
2015-07-25 10:49:39 +02:00
}
// Status sends the commit status back to gitlab.
func (g *Gitlab) Status(ctx context.Context, user *model.User, repo *model.Repo, build *model.Build, link string, proc *model.Proc) error {
client, err := newClient(g.URL, user.Token, g.SkipVerify)
if err != nil {
return err
}
repo_, err := g.getProject(ctx, client, repo.Owner, repo.Name)
if err != nil {
return err
}
_, _, err = client.Commits.SetCommitStatus(repo_.ID, build.Commit, &gitlab.SetCommitStatusOptions{
Ref: gitlab.String(strings.ReplaceAll(build.Ref, "refs/heads/", "")),
State: getStatus(build.Status),
Description: gitlab.String(getDesc(build.Status)),
TargetURL: &link,
Name: nil,
Context: gitlab.String(statusContext),
}, gitlab.WithContext(ctx))
return err
}
// Netrc returns a netrc file capable of authenticating Gitlab requests and
// cloning Gitlab repositories. The netrc will use the global machine account
// when configured.
2015-09-30 03:21:17 +02:00
func (g *Gitlab) Netrc(u *model.User, r *model.Repo) (*model.Netrc, error) {
if g.Password != "" {
return &model.Netrc{
Login: g.Username,
Password: g.Password,
Machine: g.Machine,
}, nil
}
return &model.Netrc{
Login: "oauth2",
Password: u.Token,
Machine: g.Machine,
}, nil
2015-07-25 10:49:39 +02:00
}
// Activate activates a repository by adding a Post-commit hook and
// a Public Deploy key, if applicable.
func (g *Gitlab) Activate(ctx context.Context, user *model.User, repo *model.Repo, link string) error {
client, err := newClient(g.URL, user.Token, g.SkipVerify)
if err != nil {
2015-07-28 08:38:15 +02:00
return err
}
2015-08-22 05:32:22 +02:00
uri, err := url.Parse(link)
2015-07-25 10:49:39 +02:00
if err != nil {
return err
}
token := uri.Query().Get("access_token")
webUrl := fmt.Sprintf("%s://%s", uri.Scheme, uri.Host)
2015-07-25 10:49:39 +02:00
repo_, err := g.getProject(ctx, client, repo.Owner, repo.Name)
if err != nil {
return err
}
// TODO: "WoodpeckerCIService"
_, err = client.Services.SetDroneCIService(repo_.ID, &gitlab.SetDroneCIServiceOptions{
Token: &token,
DroneURL: &webUrl,
EnableSSLVerification: gitlab.Bool(!g.SkipVerify),
}, gitlab.WithContext(ctx))
return err
2015-07-25 10:49:39 +02:00
}
// Deactivate removes a repository by removing all the post-commit hooks
// which are equal to link and removing the SSH deploy key.
func (g *Gitlab) Deactivate(ctx context.Context, user *model.User, repo *model.Repo, link string) error {
client, err := newClient(g.URL, user.Token, g.SkipVerify)
if err != nil {
2015-07-28 08:38:15 +02:00
return err
}
2015-07-25 10:49:39 +02:00
repo_, err := g.getProject(ctx, client, repo.Owner, repo.Name)
if err != nil {
return err
}
// TODO: "WoodpeckerCIService"
_, err = client.Services.DeleteDroneCIService(repo_.ID, gitlab.WithContext(ctx))
return err
2015-07-25 10:49:39 +02:00
}
// Branches returns the names of all branches for the named repository.
func (g *Gitlab) Branches(ctx context.Context, user *model.User, repo *model.Repo) ([]string, error) {
client, err := newClient(g.URL, user.Token, g.SkipVerify)
if err != nil {
return nil, err
}
repo_, err := g.getProject(ctx, client, repo.Owner, repo.Name)
if err != nil {
return nil, err
}
gitlabBranches, _, err := client.Branches.ListBranches(repo_.ID, &gitlab.ListBranchesOptions{}, gitlab.WithContext(ctx))
if err != nil {
return nil, err
}
branches := make([]string, 0)
for _, branch := range gitlabBranches {
branches = append(branches, branch.Name)
}
return branches, nil
}
// Hook parses the post-commit hook from the Request body
2015-07-25 10:49:39 +02:00
// and returns the required data in a standard format.
2015-09-30 03:21:17 +02:00
func (g *Gitlab) Hook(req *http.Request) (*model.Repo, *model.Build, error) {
2015-07-26 01:22:16 +02:00
defer req.Body.Close()
payload, err := ioutil.ReadAll(req.Body)
2015-07-26 01:22:16 +02:00
if err != nil {
2015-09-30 03:21:17 +02:00
return nil, nil, err
2015-07-26 01:22:16 +02:00
}
eventType := gitlab.WebhookEventType(req)
// TODO: Fix Upstream: We get `Service Hook` - which the library do not understand
if eventType == "Service Hook" {
e := struct {
ObjectKind string `json:"object_kind"`
}{}
if err := json.Unmarshal(payload, &e); err != nil {
return nil, nil, err
}
switch e.ObjectKind {
case "push":
eventType = gitlab.EventTypePush
case "tag_push":
eventType = gitlab.EventTypeTagPush
case "merge_request":
eventType = gitlab.EventTypeMergeRequest
2016-02-01 01:49:52 +02:00
}
2015-07-25 10:49:39 +02:00
}
parsed, err := gitlab.ParseWebhook(eventType, payload)
if err != nil {
return nil, nil, err
2015-12-12 19:09:59 +02:00
}
switch event := parsed.(type) {
case *gitlab.MergeEvent:
return convertMergeRequestHock(event, req)
case *gitlab.PushEvent:
return convertPushHock(event)
case *gitlab.TagEvent:
return convertTagHock(event)
2015-12-12 19:09:59 +02:00
default:
return nil, nil, nil
2015-12-12 19:09:59 +02:00
}
}