gitlab-org--gitlab-foss/lib/api/protected_branches.rb

103 lines
3.9 KiB
Ruby
Raw Normal View History

# frozen_string_literal: true
2017-08-02 06:16:17 -04:00
module API
class ProtectedBranches < Grape::API::Instance
2017-08-02 06:16:17 -04:00
include PaginationParams
BRANCH_ENDPOINT_REQUIREMENTS = API::NAMESPACE_OR_PROJECT_REQUIREMENTS.merge(name: API::NO_SLASH_URL_PART_REGEX)
2017-08-02 06:16:17 -04:00
before { authorize_admin_project }
helpers Helpers::ProtectedBranchesHelpers
2017-08-02 06:16:17 -04:00
params do
requires :id, type: String, desc: 'The ID of a project'
end
resource :projects, requirements: API::NAMESPACE_OR_PROJECT_REQUIREMENTS do
2017-08-02 06:16:17 -04:00
desc "Get a project's protected branches" do
success Entities::ProtectedBranch
end
params do
use :pagination
optional :search, type: String, desc: 'Search for a protected branch by name'
2017-08-02 06:16:17 -04:00
end
# rubocop: disable CodeReuse/ActiveRecord
2017-08-02 06:16:17 -04:00
get ':id/protected_branches' do
protected_branches =
ProtectedBranchesFinder
.new(user_project, params)
.execute
.preload(:push_access_levels, :merge_access_levels)
2017-08-02 06:16:17 -04:00
present paginate(protected_branches), with: Entities::ProtectedBranch, project: user_project
end
# rubocop: enable CodeReuse/ActiveRecord
2017-08-02 06:16:17 -04:00
desc 'Get a single protected branch' do
success Entities::ProtectedBranch
end
params do
requires :name, type: String, desc: 'The name of the branch or wildcard'
end
# rubocop: disable CodeReuse/ActiveRecord
2017-08-02 06:16:17 -04:00
get ':id/protected_branches/:name', requirements: BRANCH_ENDPOINT_REQUIREMENTS do
protected_branch = user_project.protected_branches.find_by!(name: params[:name])
present protected_branch, with: Entities::ProtectedBranch, project: user_project
end
# rubocop: enable CodeReuse/ActiveRecord
2017-08-02 06:16:17 -04:00
desc 'Protect a single branch' do
2017-08-02 06:16:17 -04:00
success Entities::ProtectedBranch
end
params do
requires :name, type: String, desc: 'The name of the protected branch'
optional :push_access_level, type: Integer,
values: ProtectedBranch::PushAccessLevel.allowed_access_levels,
2018-05-24 04:59:24 -04:00
desc: 'Access levels allowed to push (defaults: `40`, maintainer access level)'
optional :merge_access_level, type: Integer,
values: ProtectedBranch::MergeAccessLevel.allowed_access_levels,
2018-05-24 04:59:24 -04:00
desc: 'Access levels allowed to merge (defaults: `40`, maintainer access level)'
use :optional_params_ee
2017-08-02 06:16:17 -04:00
end
# rubocop: disable CodeReuse/ActiveRecord
2017-08-02 06:16:17 -04:00
post ':id/protected_branches' do
protected_branch = user_project.protected_branches.find_by(name: params[:name])
2017-08-02 06:16:17 -04:00
if protected_branch
conflict!("Protected branch '#{params[:name]}' already exists")
end
declared_params = declared_params(include_missing: false)
api_service = ::ProtectedBranches::ApiService.new(user_project, current_user, declared_params)
protected_branch = api_service.create
2017-08-02 06:16:17 -04:00
if protected_branch.persisted?
present protected_branch, with: Entities::ProtectedBranch, project: user_project
else
render_api_error!(protected_branch.errors.full_messages, 422)
end
end
# rubocop: enable CodeReuse/ActiveRecord
2017-08-02 06:16:17 -04:00
desc 'Unprotect a single branch'
params do
requires :name, type: String, desc: 'The name of the protected branch'
end
# rubocop: disable CodeReuse/ActiveRecord
2017-08-02 06:16:17 -04:00
delete ':id/protected_branches/:name', requirements: BRANCH_ENDPOINT_REQUIREMENTS do
protected_branch = user_project.protected_branches.find_by!(name: params[:name])
destroy_conditionally!(protected_branch) do
destroy_service = ::ProtectedBranches::DestroyService.new(user_project, current_user)
destroy_service.execute(protected_branch)
end
2017-08-02 06:16:17 -04:00
end
# rubocop: enable CodeReuse/ActiveRecord
2017-08-02 06:16:17 -04:00
end
end
end
API::ProtectedBranches.prepend_if_ee('EE::API::ProtectedBranches')