ed1d4fa477
and request them each session. Pass these tokens to the project import data. This prevents the need to encrypt these tokens and clear them in case they expire or get revoked. For example, if you deleted and re-created OAuth2 keys for Bitbucket, you would get an Error 500 with no way to recover: ``` Started GET "/import/bitbucket/status" for x.x.x.x at 2015-08-07 05:24:10 +0000 Processing by Import::BitbucketController#status as HTML Completed 500 Internal Server Error in 607ms (ActiveRecord: 2.3ms) NameError (uninitialized constant Import::BitbucketController::Unauthorized): app/controllers/import/bitbucket_controller.rb:77:in `rescue in go_to_bitbucket_for_permissions' app/controllers/import/bitbucket_controller.rb:74:in `go_to_bitbucket_for_permissions' app/controllers/import/bitbucket_controller.rb:86:in `bitbucket_unauthorized' ``` Closes #1871
69 lines
1.9 KiB
Ruby
69 lines
1.9 KiB
Ruby
class Import::GitlabController < Import::BaseController
|
|
before_action :verify_gitlab_import_enabled
|
|
before_action :gitlab_auth, except: :callback
|
|
|
|
rescue_from OAuth2::Error, with: :gitlab_unauthorized
|
|
|
|
def callback
|
|
session[:gitlab_access_token] = client.get_token(params[:code], callback_import_gitlab_url)
|
|
redirect_to status_import_gitlab_url
|
|
end
|
|
|
|
def status
|
|
@repos = client.projects
|
|
|
|
@already_added_projects = current_user.created_projects.where(import_type: "gitlab")
|
|
already_added_projects_names = @already_added_projects.pluck(:import_source)
|
|
|
|
@repos = @repos.to_a.reject{ |repo| already_added_projects_names.include? repo["path_with_namespace"] }
|
|
end
|
|
|
|
def jobs
|
|
jobs = current_user.created_projects.where(import_type: "gitlab").to_json(only: [:id, :import_status])
|
|
render json: jobs
|
|
end
|
|
|
|
def create
|
|
@repo_id = params[:repo_id].to_i
|
|
repo = client.project(@repo_id)
|
|
@project_name = repo["name"]
|
|
|
|
repo_owner = repo["namespace"]["path"]
|
|
repo_owner = current_user.username if repo_owner == client.user["username"]
|
|
@target_namespace = params[:new_namespace].presence || repo_owner
|
|
|
|
namespace = get_or_create_namespace || (render and return)
|
|
|
|
@project = Gitlab::GitlabImport::ProjectCreator.new(repo, namespace, current_user, access_params).execute
|
|
end
|
|
|
|
private
|
|
|
|
def client
|
|
@client ||= Gitlab::GitlabImport::Client.new(session[:gitlab_access_token])
|
|
end
|
|
|
|
def verify_gitlab_import_enabled
|
|
not_found! unless gitlab_import_enabled?
|
|
end
|
|
|
|
def gitlab_auth
|
|
if session[:gitlab_access_token].blank?
|
|
go_to_gitlab_for_permissions
|
|
end
|
|
end
|
|
|
|
def go_to_gitlab_for_permissions
|
|
redirect_to client.authorize_url(callback_import_gitlab_url)
|
|
end
|
|
|
|
def gitlab_unauthorized
|
|
go_to_gitlab_for_permissions
|
|
end
|
|
|
|
private
|
|
|
|
def access_params
|
|
{ gitlab_access_token: session[:gitlab_access_token] }
|
|
end
|
|
end
|