class Import::GithubController < Import::BaseController before_action :verify_import_enabled before_action :provider_auth, only: [:status, :jobs, :create] rescue_from Octokit::Unauthorized, with: :provider_unauthorized def new if logged_in_with_provider? go_to_provider_for_permissions elsif session[access_token_key] redirect_to status_import_url end end def callback session[access_token_key] = client.get_token(params[:code]) redirect_to status_import_url end def personal_access_token session[access_token_key] = params[:personal_access_token] redirect_to status_import_url end def status @repos = client.repos @already_added_projects = current_user.created_projects.where(import_type: provider) already_added_projects_names = @already_added_projects.pluck(:import_source) @repos.reject! { |repo| already_added_projects_names.include? repo.full_name } end def jobs jobs = current_user.created_projects.where(import_type: provider).to_json(only: [:id, :import_status]) render json: jobs end def create @repo_id = params[:repo_id].to_i repo = client.repo(@repo_id) @project_name = params[:new_name].presence || repo.name namespace_path = params[:target_namespace].presence || current_user.namespace_path @target_namespace = find_or_create_namespace(namespace_path, current_user.namespace_path) if can?(current_user, :create_projects, @target_namespace) @project = Gitlab::GithubImport::ProjectCreator.new(repo, @project_name, @target_namespace, current_user, access_params, type: provider).execute else render 'unauthorized' end end private def client @client ||= Gitlab::GithubImport::Client.new(session[access_token_key], client_options) end def verify_import_enabled render_404 unless import_enabled? end def go_to_provider_for_permissions redirect_to client.authorize_url(callback_import_url) end def import_enabled? __send__("#{provider}_import_enabled?") end def new_import_url public_send("new_import_#{provider}_url") # rubocop:disable GitlabSecurity/PublicSend end def status_import_url public_send("status_import_#{provider}_url") # rubocop:disable GitlabSecurity/PublicSend end def callback_import_url public_send("callback_import_#{provider}_url") # rubocop:disable GitlabSecurity/PublicSend end def provider_unauthorized session[access_token_key] = nil redirect_to new_import_url, alert: "Access denied to your #{Gitlab::ImportSources.title(provider.to_s)} account." end def access_token_key :"#{provider}_access_token" end def access_params { github_access_token: session[access_token_key] } end # The following methods are overriden in subclasses def provider :github end def logged_in_with_provider? current_user.identities.exists?(provider: provider) end def provider_auth if session[access_token_key].blank? go_to_provider_for_permissions end end def client_options {} end end