gitlab-org--gitlab-foss/lib/api/internal.rb

81 lines
2.0 KiB
Ruby
Raw Normal View History

module API
# Internal access API
2013-02-04 15:53:43 +00:00
class Internal < Grape::API
before { authenticate_by_gitlab_shell_token! }
2014-10-15 15:26:15 +00:00
namespace 'internal' do
# Check if git command is allowed to project
#
2013-02-26 20:53:59 +00:00
# Params:
# key_id - ssh key id for Git over SSH
# user_id - user id for Git over HTTP
2013-02-26 20:53:59 +00:00
# project - project path with namespace
# action - git action (git-upload-pack or git-receive-pack)
# ref - branch name
# forced_push - forced_push
2013-02-26 20:53:59 +00:00
#
2016-02-24 14:54:36 +00:00
helpers do
def wiki
@wiki ||= params[:project].end_with?('.wiki') &&
!Project.find_with_namespace(params[:project])
end
end
post "/allowed" do
status 200
actor =
if params[:key_id]
Key.find_by(id: params[:key_id])
elsif params[:user_id]
User.find_by(id: params[:user_id])
end
project_path = params[:project]
# Check for *.wiki repositories.
# Strip out the .wiki from the pathname before finding the
# project. This applies the correct project permissions to
# the wiki repository as well.
project_path.chomp!('.wiki') if wiki
project = Project.find_with_namespace(project_path)
2015-05-10 21:07:35 +00:00
access =
if wiki
Gitlab::GitAccessWiki.new(actor, project)
else
Gitlab::GitAccess.new(actor, project)
end
2015-05-10 21:07:35 +00:00
access.check(params[:action], params[:changes])
end
#
# Discover user by ssh key
#
get "/discover" do
key = Key.find(params[:key_id])
present key.user, with: Entities::UserSafe
end
2013-02-05 13:55:49 +00:00
get "/check" do
{
api_version: API.version,
gitlab_version: Gitlab::VERSION,
gitlab_rev: Gitlab::REVISION,
2013-02-05 13:55:49 +00:00
}
end
2015-02-07 15:41:30 +00:00
get "/broadcast_message" do
if message = BroadcastMessage.current
present message, with: Entities::BroadcastMessage
2015-02-18 22:58:20 +00:00
else
{}
2015-02-07 15:41:30 +00:00
end
end
2013-02-04 15:53:43 +00:00
end
end
end