gitlab-org--gitlab-foss/lib/api/internal.rb

219 lines
6.3 KiB
Ruby
Raw Normal View History

module API
# Internal access API
2013-02-04 10:53:43 -05:00
class Internal < Grape::API
before { authenticate_by_gitlab_shell_token! }
2014-10-15 11:26:15 -04:00
helpers ::API::Helpers::InternalHelpers
helpers ::Gitlab::Identifier
namespace 'internal' do
# Check if git command is allowed to project
#
2013-02-26 15:53:59 -05:00
# Params:
# key_id - ssh key id for Git over SSH
# user_id - user id for Git over HTTP
# protocol - Git access protocol being used, e.g. HTTP or SSH
2013-02-26 15:53:59 -05:00
# project - project path with namespace
# action - git action (git-upload-pack or git-receive-pack)
# changes - changes as "oldrev newrev ref", see Gitlab::ChangesList
post "/allowed" do
status 200
# Stores some Git-specific env thread-safely
env = parse_env
env = fix_git_env_repository_paths(env, repository_path) if project
Gitlab::Git::Env.set(env)
actor =
if params[:key_id]
Key.find_by(id: params[:key_id])
elsif params[:user_id]
User.find_by(id: params[:user_id])
end
protocol = params[:protocol]
actor.update_last_used_at if actor.is_a?(Key)
user =
if actor.is_a?(Key)
actor.user
else
actor
end
access_checker_klass = wiki? ? Gitlab::GitAccessWiki : Gitlab::GitAccess
access_checker = access_checker_klass
.new(actor, project, protocol, authentication_abilities: ssh_authentication_abilities, redirected_path: redirected_path)
begin
2017-05-23 14:34:58 -04:00
access_checker.check(params[:action], params[:changes])
rescue Gitlab::GitAccess::UnauthorizedError, Gitlab::GitAccess::NotFoundError => e
return { status: false, message: e.message }
end
log_user_activity(actor)
2017-06-05 13:39:32 -04:00
{
2017-05-23 14:34:58 -04:00
status: true,
gl_repository: gl_repository,
gl_username: user&.username,
repository_path: repository_path,
gitaly: gitaly_payload(params[:action])
2017-05-23 14:34:58 -04:00
}
end
post "/lfs_authenticate" do
status 200
key = Key.find(params[:key_id])
key.update_last_used_at
token_handler = Gitlab::LfsToken.new(key)
{
username: token_handler.actor_name,
lfs_token: token_handler.token,
repository_http_path: project.http_url_to_repo
}
end
get "/merge_request_urls" do
merge_request_urls
end
#
# Get a ssh key using the fingerprint
#
get "/authorized_keys" do
fingerprint = params.fetch(:fingerprint) do
Gitlab::InsecureKeyFingerprint.new(params.fetch(:key)).fingerprint
end
key = Key.find_by(fingerprint: fingerprint)
not_found!("Key") if key.nil?
present key, with: Entities::SSHKey
end
#
2017-06-20 10:53:28 -04:00
# Discover user by ssh key or user id
#
get "/discover" do
2017-06-20 10:53:28 -04:00
if params[:key_id]
key = Key.find(params[:key_id])
user = key.user
elsif params[:user_id]
user = User.find_by(id: params[:user_id])
end
2017-06-20 10:53:28 -04:00
present user, with: Entities::UserSafe
end
2013-02-05 08:55:49 -05:00
get "/check" do
{
api_version: API.version,
gitlab_version: Gitlab::VERSION,
gitlab_rev: Gitlab::REVISION,
redis: redis_ping
2013-02-05 08:55:49 -05:00
}
end
2015-02-07 10:41:30 -05:00
get "/broadcast_messages" do
if messages = BroadcastMessage.current
present messages, with: Entities::BroadcastMessage
else
[]
end
end
2015-02-07 10:41:30 -05:00
get "/broadcast_message" do
if message = BroadcastMessage.current&.last
2015-02-07 10:41:30 -05:00
present message, with: Entities::BroadcastMessage
2015-02-18 17:58:20 -05:00
else
{}
2015-02-07 10:41:30 -05:00
end
end
post '/two_factor_recovery_codes' do
status 200
key = Key.find_by(id: params[:key_id])
if key
key.update_last_used_at
else
return { 'success' => false, 'message' => 'Could not find the given key' }
end
if key.is_a?(DeployKey)
return { success: false, message: 'Deploy keys cannot be used to retrieve recovery codes' }
end
user = key.user
unless user
return { success: false, message: 'Could not find a user for the given key' }
end
unless user.two_factor_enabled?
return { success: false, message: 'Two-factor authentication is not enabled for this user' }
end
2017-06-23 11:11:31 -04:00
codes = nil
2017-09-27 05:48:33 -04:00
::Users::UpdateService.new(current_user, user: user).execute! do |user|
2017-06-23 11:11:31 -04:00
codes = user.generate_otp_backup_codes!
2017-06-22 05:27:37 -04:00
end
2017-06-23 11:11:31 -04:00
{ success: true, recovery_codes: codes }
end
post '/pre_receive' do
status 200
reference_counter_increased = Gitlab::ReferenceCounter.new(params[:gl_repository]).increase
{ reference_counter_increased: reference_counter_increased }
end
post "/notify_post_receive" do
status 200
# TODO: Re-enable when Gitaly is processing the post-receive notification
# return unless Gitlab::GitalyClient.enabled?
#
# begin
# repository = wiki? ? project.wiki.repository : project.repository
2017-07-18 03:59:36 -04:00
# Gitlab::GitalyClient::NotificationService.new(repository.raw_repository).post_receive
# rescue GRPC::Unavailable => e
# render_api_error!(e, 500)
# end
end
post '/post_receive' do
status 200
PostReceive.perform_async(params[:gl_repository], params[:identifier],
params[:changes])
broadcast_message = BroadcastMessage.current&.last&.message
reference_counter_decreased = Gitlab::ReferenceCounter.new(params[:gl_repository]).decrease
output = {
merge_request_urls: merge_request_urls,
broadcast_message: broadcast_message,
reference_counter_decreased: reference_counter_decreased
}
project = Gitlab::GlRepository.parse(params[:gl_repository]).first
user = identify(params[:identifier])
# A user is not guaranteed to be returned; an orphaned write deploy
# key could be used
if user
redirect_message = Gitlab::Checks::ProjectMoved.fetch_redirect_message(user.id, project.id)
output[:redirected_message] = redirect_message if redirect_message
end
output
end
2013-02-04 10:53:43 -05:00
end
end
end