2013-05-14 08:33:31 -04:00
|
|
|
module API
|
2013-02-05 05:47:50 -05:00
|
|
|
# Internal access API
|
2013-02-04 10:53:43 -05:00
|
|
|
class Internal < Grape::API
|
2015-02-03 00:22:57 -05:00
|
|
|
before { authenticate_by_gitlab_shell_token! }
|
2014-10-15 11:26:15 -04:00
|
|
|
|
2016-11-15 10:02:44 -05:00
|
|
|
helpers ::API::Helpers::InternalHelpers
|
|
|
|
|
2013-02-05 05:47:50 -05:00
|
|
|
namespace 'internal' do
|
2014-03-19 15:02:12 -04:00
|
|
|
# Check if git command is allowed to project
|
2013-02-05 05:47:50 -05:00
|
|
|
#
|
2013-02-26 15:53:59 -05:00
|
|
|
# Params:
|
2014-03-19 15:02:12 -04:00
|
|
|
# key_id - ssh key id for Git over SSH
|
|
|
|
# user_id - user id for Git over HTTP
|
2013-02-26 15:53:59 -05:00
|
|
|
# project - project path with namespace
|
|
|
|
# action - git action (git-upload-pack or git-receive-pack)
|
|
|
|
# ref - branch name
|
2014-01-28 16:36:50 -05:00
|
|
|
# forced_push - forced_push
|
2016-06-20 21:40:56 -04:00
|
|
|
# protocol - Git access protocol being used, e.g. HTTP or SSH
|
2014-09-03 02:06:16 -04:00
|
|
|
post "/allowed" do
|
2014-09-03 06:33:44 -04:00
|
|
|
status 200
|
2015-02-23 17:14:57 -05:00
|
|
|
|
2016-04-18 11:42:48 -04:00
|
|
|
actor =
|
2015-03-24 09:10:55 -04:00
|
|
|
if params[:key_id]
|
|
|
|
Key.find_by(id: params[:key_id])
|
|
|
|
elsif params[:user_id]
|
|
|
|
User.find_by(id: params[:user_id])
|
|
|
|
end
|
2015-02-23 17:14:57 -05:00
|
|
|
|
2016-06-20 21:40:56 -04:00
|
|
|
protocol = params[:protocol]
|
|
|
|
|
2015-05-10 17:07:35 -04:00
|
|
|
access =
|
2016-02-26 04:40:30 -05:00
|
|
|
if wiki?
|
2016-09-16 03:59:10 -04:00
|
|
|
Gitlab::GitAccessWiki.new(actor, project, protocol, authentication_abilities: ssh_authentication_abilities)
|
2015-05-10 17:07:35 -04:00
|
|
|
else
|
2016-09-16 03:59:10 -04:00
|
|
|
Gitlab::GitAccess.new(actor, project, protocol, authentication_abilities: ssh_authentication_abilities)
|
2015-05-10 17:07:35 -04:00
|
|
|
end
|
2013-02-07 02:56:13 -05:00
|
|
|
|
2016-06-22 17:04:51 -04:00
|
|
|
access_status = access.check(params[:action], params[:changes])
|
|
|
|
|
|
|
|
response = { status: access_status.status, message: access_status.message }
|
|
|
|
|
|
|
|
if access_status.status
|
|
|
|
# Return the repository full path so that gitlab-shell has it when
|
|
|
|
# handling ssh commands
|
2016-07-15 21:31:26 -04:00
|
|
|
response[:repository_path] =
|
|
|
|
if wiki?
|
|
|
|
project.wiki.repository.path_to_repo
|
|
|
|
else
|
|
|
|
project.repository.path_to_repo
|
|
|
|
end
|
2016-06-22 17:04:51 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
response
|
2013-02-05 05:47:50 -05:00
|
|
|
end
|
|
|
|
|
2016-09-19 10:34:32 -04:00
|
|
|
post "/lfs_authenticate" do
|
|
|
|
status 200
|
|
|
|
|
|
|
|
key = Key.find(params[:key_id])
|
|
|
|
token_handler = Gitlab::LfsToken.new(key)
|
|
|
|
|
|
|
|
{
|
|
|
|
username: token_handler.actor_name,
|
2016-09-28 12:02:31 -04:00
|
|
|
lfs_token: token_handler.token,
|
2016-09-19 10:34:32 -04:00
|
|
|
repository_http_path: project.http_url_to_repo
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
2016-07-28 00:04:57 -04:00
|
|
|
get "/merge_request_urls" do
|
|
|
|
::MergeRequests::GetUrlsService.new(project).execute(params[:changes])
|
|
|
|
end
|
|
|
|
|
2013-02-05 05:47:50 -05:00
|
|
|
#
|
|
|
|
# Discover user by ssh key
|
|
|
|
#
|
|
|
|
get "/discover" do
|
|
|
|
key = Key.find(params[:key_id])
|
2013-03-11 08:35:00 -04:00
|
|
|
present key.user, with: Entities::UserSafe
|
2013-02-05 05:47:50 -05:00
|
|
|
end
|
2013-02-05 08:55:49 -05:00
|
|
|
|
|
|
|
get "/check" do
|
|
|
|
{
|
2013-05-14 08:33:31 -04:00
|
|
|
api_version: API.version,
|
2013-02-16 07:42:22 -05:00
|
|
|
gitlab_version: Gitlab::VERSION,
|
|
|
|
gitlab_rev: Gitlab::REVISION,
|
2013-02-05 08:55:49 -05:00
|
|
|
}
|
|
|
|
end
|
2015-02-07 10:41:30 -05:00
|
|
|
|
|
|
|
get "/broadcast_message" do
|
|
|
|
if message = BroadcastMessage.current
|
|
|
|
present message, with: Entities::BroadcastMessage
|
2015-02-18 17:58:20 -05:00
|
|
|
else
|
|
|
|
{}
|
2015-02-07 10:41:30 -05:00
|
|
|
end
|
|
|
|
end
|
2016-07-26 17:48:51 -04:00
|
|
|
|
|
|
|
post '/two_factor_recovery_codes' do
|
|
|
|
status 200
|
|
|
|
|
2016-08-24 20:58:05 -04:00
|
|
|
key = Key.find_by(id: params[:key_id])
|
|
|
|
|
|
|
|
unless key
|
|
|
|
return { 'success' => false, 'message' => 'Could not find the given key' }
|
|
|
|
end
|
2016-07-26 17:48:51 -04:00
|
|
|
|
2016-08-24 20:58:05 -04:00
|
|
|
if key.is_a?(DeployKey)
|
2016-07-26 17:48:51 -04:00
|
|
|
return { success: false, message: 'Deploy keys cannot be used to retrieve recovery codes' }
|
|
|
|
end
|
|
|
|
|
2016-08-24 20:58:05 -04:00
|
|
|
user = key.user
|
|
|
|
|
|
|
|
unless user
|
2016-07-26 17:48:51 -04:00
|
|
|
return { success: false, message: 'Could not find a user for the given key' }
|
|
|
|
end
|
|
|
|
|
|
|
|
unless user.two_factor_enabled?
|
|
|
|
return { success: false, message: 'Two-factor authentication is not enabled for this user' }
|
|
|
|
end
|
|
|
|
|
|
|
|
codes = user.generate_otp_backup_codes!
|
|
|
|
user.save!
|
|
|
|
|
|
|
|
{ success: true, recovery_codes: codes }
|
|
|
|
end
|
2013-02-04 10:53:43 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|