Show More
@@ -0,0 +1,77 b'' | |||
|
1 | .. _deprecated-methods-ref: | |
|
2 | ||
|
3 | deprecated methods | |
|
4 | ================= | |
|
5 | ||
|
6 | changeset_comment | |
|
7 | ----------------- | |
|
8 | ||
|
9 | .. py:function:: changeset_comment(apiuser, repoid, revision, message, userid=<Optional:<OptionalAttr:apiuser>>, status=<Optional:None>) | |
|
10 | ||
|
11 | .. deprecated:: 3.4.0 | |
|
12 | ||
|
13 | Please use method `comment_commit` instead. | |
|
14 | ||
|
15 | ||
|
16 | Set a changeset comment, and optionally change the status of the | |
|
17 | changeset. | |
|
18 | ||
|
19 | This command can only be run using an |authtoken| with admin | |
|
20 | permissions on the |repo|. | |
|
21 | ||
|
22 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
23 | :type apiuser: AuthUser | |
|
24 | :param repoid: Set the repository name or repository ID. | |
|
25 | :type repoid: str or int | |
|
26 | :param revision: Specify the revision for which to set a comment. | |
|
27 | :type revision: str | |
|
28 | :param message: The comment text. | |
|
29 | :type message: str | |
|
30 | :param userid: Set the user name of the comment creator. | |
|
31 | :type userid: Optional(str or int) | |
|
32 | :param status: Set the comment status. The following are valid options: | |
|
33 | * not_reviewed | |
|
34 | * approved | |
|
35 | * rejected | |
|
36 | * under_review | |
|
37 | :type status: str | |
|
38 | ||
|
39 | Example error output: | |
|
40 | ||
|
41 | .. code-block:: json | |
|
42 | ||
|
43 | { | |
|
44 | "id" : <id_given_in_input>, | |
|
45 | "result" : { | |
|
46 | "msg": "Commented on commit `<revision>` for repository `<repoid>`", | |
|
47 | "status_change": null or <status>, | |
|
48 | "success": true | |
|
49 | }, | |
|
50 | "error" : null | |
|
51 | } | |
|
52 | ||
|
53 | ||
|
54 | get_locks | |
|
55 | --------- | |
|
56 | ||
|
57 | .. py:function:: get_locks(apiuser, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
58 | ||
|
59 | .. deprecated:: 4.0.0 | |
|
60 | ||
|
61 | Please use method `get_user_locks` instead. | |
|
62 | ||
|
63 | None | |
|
64 | ||
|
65 | ||
|
66 | show_ip | |
|
67 | ------- | |
|
68 | ||
|
69 | .. py:function:: show_ip(apiuser, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
70 | ||
|
71 | .. deprecated:: 4.0.0 | |
|
72 | ||
|
73 | Please use method `get_ip` instead. | |
|
74 | ||
|
75 | None | |
|
76 | ||
|
77 |
@@ -0,0 +1,121 b'' | |||
|
1 | .. _gist-methods-ref: | |
|
2 | ||
|
3 | gist methods | |
|
4 | ================= | |
|
5 | ||
|
6 | create_gist | |
|
7 | ----------- | |
|
8 | ||
|
9 | .. py:function:: create_gist(apiuser, files, gistid=<Optional:None>, owner=<Optional:<OptionalAttr:apiuser>>, gist_type=<Optional:u'public'>, lifetime=<Optional:-1>, acl_level=<Optional:u'acl_public'>, description=<Optional:''>) | |
|
10 | ||
|
11 | Creates a new Gist. | |
|
12 | ||
|
13 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
14 | :type apiuser: AuthUser | |
|
15 | :param files: files to be added to the gist. The data structure has | |
|
16 | to match the following example:: | |
|
17 | ||
|
18 | {'filename1': {'content':'...'}, 'filename2': {'content':'...'}} | |
|
19 | ||
|
20 | :type files: dict | |
|
21 | :param gistid: Set a custom id for the gist | |
|
22 | :type gistid: Optional(str) | |
|
23 | :param owner: Set the gist owner, defaults to api method caller | |
|
24 | :type owner: Optional(str or int) | |
|
25 | :param gist_type: type of gist ``public`` or ``private`` | |
|
26 | :type gist_type: Optional(str) | |
|
27 | :param lifetime: time in minutes of gist lifetime | |
|
28 | :type lifetime: Optional(int) | |
|
29 | :param acl_level: acl level for this gist, can be | |
|
30 | ``acl_public`` or ``acl_private`` If the value is set to | |
|
31 | ``acl_private`` only logged in users are able to access this gist. | |
|
32 | If not set it defaults to ``acl_public``. | |
|
33 | :type acl_level: Optional(str) | |
|
34 | :param description: gist description | |
|
35 | :type description: Optional(str) | |
|
36 | ||
|
37 | Example output: | |
|
38 | ||
|
39 | .. code-block:: bash | |
|
40 | ||
|
41 | id : <id_given_in_input> | |
|
42 | result : { | |
|
43 | "msg": "created new gist", | |
|
44 | "gist": {} | |
|
45 | } | |
|
46 | error : null | |
|
47 | ||
|
48 | Example error output: | |
|
49 | ||
|
50 | .. code-block:: bash | |
|
51 | ||
|
52 | id : <id_given_in_input> | |
|
53 | result : null | |
|
54 | error : { | |
|
55 | "failed to create gist" | |
|
56 | } | |
|
57 | ||
|
58 | ||
|
59 | delete_gist | |
|
60 | ----------- | |
|
61 | ||
|
62 | .. py:function:: delete_gist(apiuser, gistid) | |
|
63 | ||
|
64 | Deletes existing gist | |
|
65 | ||
|
66 | :param apiuser: filled automatically from apikey | |
|
67 | :type apiuser: AuthUser | |
|
68 | :param gistid: id of gist to delete | |
|
69 | :type gistid: str | |
|
70 | ||
|
71 | Example output: | |
|
72 | ||
|
73 | .. code-block:: bash | |
|
74 | ||
|
75 | id : <id_given_in_input> | |
|
76 | result : { | |
|
77 | "deleted gist ID: <gist_id>", | |
|
78 | "gist": null | |
|
79 | } | |
|
80 | error : null | |
|
81 | ||
|
82 | Example error output: | |
|
83 | ||
|
84 | .. code-block:: bash | |
|
85 | ||
|
86 | id : <id_given_in_input> | |
|
87 | result : null | |
|
88 | error : { | |
|
89 | "failed to delete gist ID:<gist_id>" | |
|
90 | } | |
|
91 | ||
|
92 | ||
|
93 | get_gist | |
|
94 | -------- | |
|
95 | ||
|
96 | .. py:function:: get_gist(apiuser, gistid, content=<Optional:False>) | |
|
97 | ||
|
98 | Get the specified gist, based on the gist ID. | |
|
99 | ||
|
100 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
101 | :type apiuser: AuthUser | |
|
102 | :param gistid: Set the id of the private or public gist | |
|
103 | :type gistid: str | |
|
104 | :param content: Return the gist content. Default is false. | |
|
105 | :type content: Optional(bool) | |
|
106 | ||
|
107 | ||
|
108 | get_gists | |
|
109 | --------- | |
|
110 | ||
|
111 | .. py:function:: get_gists(apiuser, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
112 | ||
|
113 | Get all gists for given user. If userid is empty returned gists | |
|
114 | are for user who called the api | |
|
115 | ||
|
116 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
117 | :type apiuser: AuthUser | |
|
118 | :param userid: user to get gists for | |
|
119 | :type userid: Optional(str or int) | |
|
120 | ||
|
121 |
@@ -0,0 +1,71 b'' | |||
|
1 | .. _license-methods-ref: | |
|
2 | ||
|
3 | license methods | |
|
4 | ================= | |
|
5 | ||
|
6 | get_license_info (EE only) | |
|
7 | ---------------- | |
|
8 | ||
|
9 | .. py:function:: get_license_info(apiuser) | |
|
10 | ||
|
11 | Returns the |RCE| license information. | |
|
12 | ||
|
13 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
14 | :type apiuser: AuthUser | |
|
15 | ||
|
16 | Example output: | |
|
17 | ||
|
18 | .. code-block:: bash | |
|
19 | ||
|
20 | id : <id_given_in_input> | |
|
21 | result : { | |
|
22 | 'rhodecode_version': <rhodecode version>, | |
|
23 | 'token': <license token>, | |
|
24 | 'issued_to': <license owner>, | |
|
25 | 'issued_on': <license issue date>, | |
|
26 | 'expires_on': <license expiration date>, | |
|
27 | 'type': <license type>, | |
|
28 | 'users_limit': <license users limit>, | |
|
29 | 'key': <license key> | |
|
30 | } | |
|
31 | error : null | |
|
32 | ||
|
33 | ||
|
34 | set_license_key (EE only) | |
|
35 | --------------- | |
|
36 | ||
|
37 | .. py:function:: set_license_key(apiuser, key) | |
|
38 | ||
|
39 | Sets the |RCE| license key. | |
|
40 | ||
|
41 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
42 | :type apiuser: AuthUser | |
|
43 | :param key: This is the license key to be set. | |
|
44 | :type key: str | |
|
45 | ||
|
46 | Example output: | |
|
47 | ||
|
48 | .. code-block:: bash | |
|
49 | ||
|
50 | id : <id_given_in_input> | |
|
51 | result: { | |
|
52 | "msg" : "updated license information", | |
|
53 | "key": <key> | |
|
54 | } | |
|
55 | error: null | |
|
56 | ||
|
57 | Example error output: | |
|
58 | ||
|
59 | .. code-block:: bash | |
|
60 | ||
|
61 | id : <id_given_in_input> | |
|
62 | result : null | |
|
63 | error : { | |
|
64 | "license key is not valid" | |
|
65 | or | |
|
66 | "trial licenses cannot be uploaded" | |
|
67 | or | |
|
68 | "error occurred while updating license" | |
|
69 | } | |
|
70 | ||
|
71 |
@@ -0,0 +1,344 b'' | |||
|
1 | .. _pull-request-methods-ref: | |
|
2 | ||
|
3 | pull_request methods | |
|
4 | ================= | |
|
5 | ||
|
6 | close_pull_request | |
|
7 | ------------------ | |
|
8 | ||
|
9 | .. py:function:: close_pull_request(apiuser, repoid, pullrequestid, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
10 | ||
|
11 | Close the pull request specified by `pullrequestid`. | |
|
12 | ||
|
13 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
14 | :type apiuser: AuthUser | |
|
15 | :param repoid: Repository name or repository ID to which the pull | |
|
16 | request belongs. | |
|
17 | :type repoid: str or int | |
|
18 | :param pullrequestid: ID of the pull request to be closed. | |
|
19 | :type pullrequestid: int | |
|
20 | :param userid: Close the pull request as this user. | |
|
21 | :type userid: Optional(str or int) | |
|
22 | ||
|
23 | Example output: | |
|
24 | ||
|
25 | .. code-block:: bash | |
|
26 | ||
|
27 | "id": <id_given_in_input>, | |
|
28 | "result": | |
|
29 | { | |
|
30 | "pull_request_id": "<int>", | |
|
31 | "closed": "<bool>" | |
|
32 | }, | |
|
33 | "error": null | |
|
34 | ||
|
35 | ||
|
36 | comment_pull_request | |
|
37 | -------------------- | |
|
38 | ||
|
39 | .. py:function:: comment_pull_request(apiuser, repoid, pullrequestid, message=<Optional:None>, status=<Optional:None>, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
40 | ||
|
41 | Comment on the pull request specified with the `pullrequestid`, | |
|
42 | in the |repo| specified by the `repoid`, and optionally change the | |
|
43 | review status. | |
|
44 | ||
|
45 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
46 | :type apiuser: AuthUser | |
|
47 | :param repoid: The repository name or repository ID. | |
|
48 | :type repoid: str or int | |
|
49 | :param pullrequestid: The pull request ID. | |
|
50 | :type pullrequestid: int | |
|
51 | :param message: The text content of the comment. | |
|
52 | :type message: str | |
|
53 | :param status: (**Optional**) Set the approval status of the pull | |
|
54 | request. Valid options are: | |
|
55 | * not_reviewed | |
|
56 | * approved | |
|
57 | * rejected | |
|
58 | * under_review | |
|
59 | :type status: str | |
|
60 | :param userid: Comment on the pull request as this user | |
|
61 | :type userid: Optional(str or int) | |
|
62 | ||
|
63 | Example output: | |
|
64 | ||
|
65 | .. code-block:: bash | |
|
66 | ||
|
67 | id : <id_given_in_input> | |
|
68 | result : | |
|
69 | { | |
|
70 | "pull_request_id": "<Integer>", | |
|
71 | "comment_id": "<Integer>" | |
|
72 | } | |
|
73 | error : null | |
|
74 | ||
|
75 | ||
|
76 | create_pull_request | |
|
77 | ------------------- | |
|
78 | ||
|
79 | .. py:function:: create_pull_request(apiuser, source_repo, target_repo, source_ref, target_ref, title, description=<Optional:''>, reviewers=<Optional:None>) | |
|
80 | ||
|
81 | Creates a new pull request. | |
|
82 | ||
|
83 | Accepts refs in the following formats: | |
|
84 | ||
|
85 | * branch:<branch_name>:<sha> | |
|
86 | * branch:<branch_name> | |
|
87 | * bookmark:<bookmark_name>:<sha> (Mercurial only) | |
|
88 | * bookmark:<bookmark_name> (Mercurial only) | |
|
89 | ||
|
90 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
91 | :type apiuser: AuthUser | |
|
92 | :param source_repo: Set the source repository name. | |
|
93 | :type source_repo: str | |
|
94 | :param target_repo: Set the target repository name. | |
|
95 | :type target_repo: str | |
|
96 | :param source_ref: Set the source ref name. | |
|
97 | :type source_ref: str | |
|
98 | :param target_ref: Set the target ref name. | |
|
99 | :type target_ref: str | |
|
100 | :param title: Set the pull request title. | |
|
101 | :type title: str | |
|
102 | :param description: Set the pull request description. | |
|
103 | :type description: Optional(str) | |
|
104 | :param reviewers: Set the new pull request reviewers list. | |
|
105 | :type reviewers: Optional(list) | |
|
106 | ||
|
107 | ||
|
108 | get_pull_request | |
|
109 | ---------------- | |
|
110 | ||
|
111 | .. py:function:: get_pull_request(apiuser, repoid, pullrequestid) | |
|
112 | ||
|
113 | Get a pull request based on the given ID. | |
|
114 | ||
|
115 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
116 | :type apiuser: AuthUser | |
|
117 | :param repoid: Repository name or repository ID from where the pull | |
|
118 | request was opened. | |
|
119 | :type repoid: str or int | |
|
120 | :param pullrequestid: ID of the requested pull request. | |
|
121 | :type pullrequestid: int | |
|
122 | ||
|
123 | Example output: | |
|
124 | ||
|
125 | .. code-block:: bash | |
|
126 | ||
|
127 | "id": <id_given_in_input>, | |
|
128 | "result": | |
|
129 | { | |
|
130 | "pull_request_id": "<pull_request_id>", | |
|
131 | "url": "<url>", | |
|
132 | "title": "<title>", | |
|
133 | "description": "<description>", | |
|
134 | "status" : "<status>", | |
|
135 | "created_on": "<date_time_created>", | |
|
136 | "updated_on": "<date_time_updated>", | |
|
137 | "commit_ids": [ | |
|
138 | ... | |
|
139 | "<commit_id>", | |
|
140 | "<commit_id>", | |
|
141 | ... | |
|
142 | ], | |
|
143 | "review_status": "<review_status>", | |
|
144 | "mergeable": { | |
|
145 | "status": "<bool>", | |
|
146 | "message": "<message>", | |
|
147 | }, | |
|
148 | "source": { | |
|
149 | "clone_url": "<clone_url>", | |
|
150 | "repository": "<repository_name>", | |
|
151 | "reference": | |
|
152 | { | |
|
153 | "name": "<name>", | |
|
154 | "type": "<type>", | |
|
155 | "commit_id": "<commit_id>", | |
|
156 | } | |
|
157 | }, | |
|
158 | "target": { | |
|
159 | "clone_url": "<clone_url>", | |
|
160 | "repository": "<repository_name>", | |
|
161 | "reference": | |
|
162 | { | |
|
163 | "name": "<name>", | |
|
164 | "type": "<type>", | |
|
165 | "commit_id": "<commit_id>", | |
|
166 | } | |
|
167 | }, | |
|
168 | "author": <user_obj>, | |
|
169 | "reviewers": [ | |
|
170 | ... | |
|
171 | { | |
|
172 | "user": "<user_obj>", | |
|
173 | "review_status": "<review_status>", | |
|
174 | } | |
|
175 | ... | |
|
176 | ] | |
|
177 | }, | |
|
178 | "error": null | |
|
179 | ||
|
180 | ||
|
181 | get_pull_requests | |
|
182 | ----------------- | |
|
183 | ||
|
184 | .. py:function:: get_pull_requests(apiuser, repoid, status=<Optional:'new'>) | |
|
185 | ||
|
186 | Get all pull requests from the repository specified in `repoid`. | |
|
187 | ||
|
188 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
189 | :type apiuser: AuthUser | |
|
190 | :param repoid: Repository name or repository ID. | |
|
191 | :type repoid: str or int | |
|
192 | :param status: Only return pull requests with the specified status. | |
|
193 | Valid options are. | |
|
194 | * ``new`` (default) | |
|
195 | * ``open`` | |
|
196 | * ``closed`` | |
|
197 | :type status: str | |
|
198 | ||
|
199 | Example output: | |
|
200 | ||
|
201 | .. code-block:: bash | |
|
202 | ||
|
203 | "id": <id_given_in_input>, | |
|
204 | "result": | |
|
205 | [ | |
|
206 | ... | |
|
207 | { | |
|
208 | "pull_request_id": "<pull_request_id>", | |
|
209 | "url": "<url>", | |
|
210 | "title" : "<title>", | |
|
211 | "description": "<description>", | |
|
212 | "status": "<status>", | |
|
213 | "created_on": "<date_time_created>", | |
|
214 | "updated_on": "<date_time_updated>", | |
|
215 | "commit_ids": [ | |
|
216 | ... | |
|
217 | "<commit_id>", | |
|
218 | "<commit_id>", | |
|
219 | ... | |
|
220 | ], | |
|
221 | "review_status": "<review_status>", | |
|
222 | "mergeable": { | |
|
223 | "status": "<bool>", | |
|
224 | "message: "<message>", | |
|
225 | }, | |
|
226 | "source": { | |
|
227 | "clone_url": "<clone_url>", | |
|
228 | "reference": | |
|
229 | { | |
|
230 | "name": "<name>", | |
|
231 | "type": "<type>", | |
|
232 | "commit_id": "<commit_id>", | |
|
233 | } | |
|
234 | }, | |
|
235 | "target": { | |
|
236 | "clone_url": "<clone_url>", | |
|
237 | "reference": | |
|
238 | { | |
|
239 | "name": "<name>", | |
|
240 | "type": "<type>", | |
|
241 | "commit_id": "<commit_id>", | |
|
242 | } | |
|
243 | }, | |
|
244 | "author": <user_obj>, | |
|
245 | "reviewers": [ | |
|
246 | ... | |
|
247 | { | |
|
248 | "user": "<user_obj>", | |
|
249 | "review_status": "<review_status>", | |
|
250 | } | |
|
251 | ... | |
|
252 | ] | |
|
253 | } | |
|
254 | ... | |
|
255 | ], | |
|
256 | "error": null | |
|
257 | ||
|
258 | ||
|
259 | merge_pull_request | |
|
260 | ------------------ | |
|
261 | ||
|
262 | .. py:function:: merge_pull_request(apiuser, repoid, pullrequestid, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
263 | ||
|
264 | Merge the pull request specified by `pullrequestid` into its target | |
|
265 | repository. | |
|
266 | ||
|
267 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
268 | :type apiuser: AuthUser | |
|
269 | :param repoid: The Repository name or repository ID of the | |
|
270 | target repository to which the |pr| is to be merged. | |
|
271 | :type repoid: str or int | |
|
272 | :param pullrequestid: ID of the pull request which shall be merged. | |
|
273 | :type pullrequestid: int | |
|
274 | :param userid: Merge the pull request as this user. | |
|
275 | :type userid: Optional(str or int) | |
|
276 | ||
|
277 | Example output: | |
|
278 | ||
|
279 | .. code-block:: bash | |
|
280 | ||
|
281 | "id": <id_given_in_input>, | |
|
282 | "result": | |
|
283 | { | |
|
284 | "executed": "<bool>", | |
|
285 | "failure_reason": "<int>", | |
|
286 | "merge_commit_id": "<merge_commit_id>", | |
|
287 | "possible": "<bool>" | |
|
288 | }, | |
|
289 | "error": null | |
|
290 | ||
|
291 | ||
|
292 | update_pull_request | |
|
293 | ------------------- | |
|
294 | ||
|
295 | .. py:function:: update_pull_request(apiuser, repoid, pullrequestid, title=<Optional:''>, description=<Optional:''>, reviewers=<Optional:None>, update_commits=<Optional:None>, close_pull_request=<Optional:None>) | |
|
296 | ||
|
297 | Updates a pull request. | |
|
298 | ||
|
299 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
300 | :type apiuser: AuthUser | |
|
301 | :param repoid: The repository name or repository ID. | |
|
302 | :type repoid: str or int | |
|
303 | :param pullrequestid: The pull request ID. | |
|
304 | :type pullrequestid: int | |
|
305 | :param title: Set the pull request title. | |
|
306 | :type title: str | |
|
307 | :param description: Update pull request description. | |
|
308 | :type description: Optional(str) | |
|
309 | :param reviewers: Update pull request reviewers list with new value. | |
|
310 | :type reviewers: Optional(list) | |
|
311 | :param update_commits: Trigger update of commits for this pull request | |
|
312 | :type: update_commits: Optional(bool) | |
|
313 | :param close_pull_request: Close this pull request with rejected state | |
|
314 | :type: close_pull_request: Optional(bool) | |
|
315 | ||
|
316 | Example output: | |
|
317 | ||
|
318 | .. code-block:: bash | |
|
319 | ||
|
320 | id : <id_given_in_input> | |
|
321 | result : | |
|
322 | { | |
|
323 | "msg": "Updated pull request `63`", | |
|
324 | "pull_request": <pull_request_object>, | |
|
325 | "updated_reviewers": { | |
|
326 | "added": [ | |
|
327 | "username" | |
|
328 | ], | |
|
329 | "removed": [] | |
|
330 | }, | |
|
331 | "updated_commits": { | |
|
332 | "added": [ | |
|
333 | "<sha1_hash>" | |
|
334 | ], | |
|
335 | "common": [ | |
|
336 | "<sha1_hash>", | |
|
337 | "<sha1_hash>", | |
|
338 | ], | |
|
339 | "removed": [] | |
|
340 | } | |
|
341 | } | |
|
342 | error : null | |
|
343 | ||
|
344 |
@@ -0,0 +1,350 b'' | |||
|
1 | .. _repo-group-methods-ref: | |
|
2 | ||
|
3 | repo_group methods | |
|
4 | ================= | |
|
5 | ||
|
6 | create_repo_group | |
|
7 | ----------------- | |
|
8 | ||
|
9 | .. py:function:: create_repo_group(apiuser, group_name, description=<Optional:''>, owner=<Optional:<OptionalAttr:apiuser>>, copy_permissions=<Optional:False>) | |
|
10 | ||
|
11 | Creates a repository group. | |
|
12 | ||
|
13 | * If the repository group name contains "/", all the required repository | |
|
14 | groups will be created. | |
|
15 | ||
|
16 | For example "foo/bar/baz" will create |repo| groups "foo" and "bar" | |
|
17 | (with "foo" as parent). It will also create the "baz" repository | |
|
18 | with "bar" as |repo| group. | |
|
19 | ||
|
20 | This command can only be run using an |authtoken| with admin | |
|
21 | permissions. | |
|
22 | ||
|
23 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
24 | :type apiuser: AuthUser | |
|
25 | :param group_name: Set the repository group name. | |
|
26 | :type group_name: str | |
|
27 | :param description: Set the |repo| group description. | |
|
28 | :type description: str | |
|
29 | :param owner: Set the |repo| group owner. | |
|
30 | :type owner: str | |
|
31 | :param copy_permissions: | |
|
32 | :type copy_permissions: | |
|
33 | ||
|
34 | Example output: | |
|
35 | ||
|
36 | .. code-block:: bash | |
|
37 | ||
|
38 | id : <id_given_in_input> | |
|
39 | result : { | |
|
40 | "msg": "Created new repo group `<repo_group_name>`" | |
|
41 | "repo_group": <repogroup_object> | |
|
42 | } | |
|
43 | error : null | |
|
44 | ||
|
45 | ||
|
46 | Example error output: | |
|
47 | ||
|
48 | .. code-block:: bash | |
|
49 | ||
|
50 | id : <id_given_in_input> | |
|
51 | result : null | |
|
52 | error : { | |
|
53 | failed to create repo group `<repogroupid>` | |
|
54 | } | |
|
55 | ||
|
56 | ||
|
57 | delete_repo_group | |
|
58 | ----------------- | |
|
59 | ||
|
60 | .. py:function:: delete_repo_group(apiuser, repogroupid) | |
|
61 | ||
|
62 | Deletes a |repo| group. | |
|
63 | ||
|
64 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
65 | :type apiuser: AuthUser | |
|
66 | :param repogroupid: Set the name or ID of repository group to be | |
|
67 | deleted. | |
|
68 | :type repogroupid: str or int | |
|
69 | ||
|
70 | Example output: | |
|
71 | ||
|
72 | .. code-block:: bash | |
|
73 | ||
|
74 | id : <id_given_in_input> | |
|
75 | result : { | |
|
76 | 'msg': 'deleted repo group ID:<repogroupid> <repogroupname> | |
|
77 | 'repo_group': null | |
|
78 | } | |
|
79 | error : null | |
|
80 | ||
|
81 | Example error output: | |
|
82 | ||
|
83 | .. code-block:: bash | |
|
84 | ||
|
85 | id : <id_given_in_input> | |
|
86 | result : null | |
|
87 | error : { | |
|
88 | "failed to delete repo group ID:<repogroupid> <repogroupname>" | |
|
89 | } | |
|
90 | ||
|
91 | ||
|
92 | get_repo_group | |
|
93 | -------------- | |
|
94 | ||
|
95 | .. py:function:: get_repo_group(apiuser, repogroupid) | |
|
96 | ||
|
97 | Return the specified |repo| group, along with permissions, | |
|
98 | and repositories inside the group | |
|
99 | ||
|
100 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
101 | :type apiuser: AuthUser | |
|
102 | :param repogroupid: Specify the name of ID of the repository group. | |
|
103 | :type repogroupid: str or int | |
|
104 | ||
|
105 | ||
|
106 | Example output: | |
|
107 | ||
|
108 | .. code-block:: bash | |
|
109 | ||
|
110 | { | |
|
111 | "error": null, | |
|
112 | "id": repo-group-id, | |
|
113 | "result": { | |
|
114 | "group_description": "repo group description", | |
|
115 | "group_id": 14, | |
|
116 | "group_name": "group name", | |
|
117 | "members": [ | |
|
118 | { | |
|
119 | "name": "super-admin-username", | |
|
120 | "origin": "super-admin", | |
|
121 | "permission": "group.admin", | |
|
122 | "type": "user" | |
|
123 | }, | |
|
124 | { | |
|
125 | "name": "owner-name", | |
|
126 | "origin": "owner", | |
|
127 | "permission": "group.admin", | |
|
128 | "type": "user" | |
|
129 | }, | |
|
130 | { | |
|
131 | "name": "user-group-name", | |
|
132 | "origin": "permission", | |
|
133 | "permission": "group.write", | |
|
134 | "type": "user_group" | |
|
135 | } | |
|
136 | ], | |
|
137 | "owner": "owner-name", | |
|
138 | "parent_group": null, | |
|
139 | "repositories": [ repo-list ] | |
|
140 | } | |
|
141 | } | |
|
142 | ||
|
143 | ||
|
144 | get_repo_groups | |
|
145 | --------------- | |
|
146 | ||
|
147 | .. py:function:: get_repo_groups(apiuser) | |
|
148 | ||
|
149 | Returns all repository groups. | |
|
150 | ||
|
151 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
152 | :type apiuser: AuthUser | |
|
153 | ||
|
154 | ||
|
155 | grant_user_group_permission_to_repo_group | |
|
156 | ----------------------------------------- | |
|
157 | ||
|
158 | .. py:function:: grant_user_group_permission_to_repo_group(apiuser, repogroupid, usergroupid, perm, apply_to_children=<Optional:'none'>) | |
|
159 | ||
|
160 | Grant permission for a user group on given repository group, or update | |
|
161 | existing permissions if found. | |
|
162 | ||
|
163 | This command can only be run using an |authtoken| with admin | |
|
164 | permissions on the |repo| group. | |
|
165 | ||
|
166 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
167 | :type apiuser: AuthUser | |
|
168 | :param repogroupid: Set the name or id of repository group | |
|
169 | :type repogroupid: str or int | |
|
170 | :param usergroupid: id of usergroup | |
|
171 | :type usergroupid: str or int | |
|
172 | :param perm: (group.(none|read|write|admin)) | |
|
173 | :type perm: str | |
|
174 | :param apply_to_children: 'none', 'repos', 'groups', 'all' | |
|
175 | :type apply_to_children: str | |
|
176 | ||
|
177 | Example output: | |
|
178 | ||
|
179 | .. code-block:: bash | |
|
180 | ||
|
181 | id : <id_given_in_input> | |
|
182 | result : { | |
|
183 | "msg" : "Granted perm: `<perm>` (recursive:<apply_to_children>) for user group: `<usersgroupname>` in repo group: `<repo_group_name>`", | |
|
184 | "success": true | |
|
185 | ||
|
186 | } | |
|
187 | error : null | |
|
188 | ||
|
189 | Example error output: | |
|
190 | ||
|
191 | .. code-block:: bash | |
|
192 | ||
|
193 | id : <id_given_in_input> | |
|
194 | result : null | |
|
195 | error : { | |
|
196 | "failed to edit permission for user group: `<usergroup>` in repo group: `<repo_group_name>`" | |
|
197 | } | |
|
198 | ||
|
199 | ||
|
200 | grant_user_permission_to_repo_group | |
|
201 | ----------------------------------- | |
|
202 | ||
|
203 | .. py:function:: grant_user_permission_to_repo_group(apiuser, repogroupid, userid, perm, apply_to_children=<Optional:'none'>) | |
|
204 | ||
|
205 | Grant permission for a user on the given repository group, or update | |
|
206 | existing permissions if found. | |
|
207 | ||
|
208 | This command can only be run using an |authtoken| with admin | |
|
209 | permissions. | |
|
210 | ||
|
211 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
212 | :type apiuser: AuthUser | |
|
213 | :param repogroupid: Set the name or ID of repository group. | |
|
214 | :type repogroupid: str or int | |
|
215 | :param userid: Set the user name. | |
|
216 | :type userid: str | |
|
217 | :param perm: (group.(none|read|write|admin)) | |
|
218 | :type perm: str | |
|
219 | :param apply_to_children: 'none', 'repos', 'groups', 'all' | |
|
220 | :type apply_to_children: str | |
|
221 | ||
|
222 | Example output: | |
|
223 | ||
|
224 | .. code-block:: bash | |
|
225 | ||
|
226 | id : <id_given_in_input> | |
|
227 | result: { | |
|
228 | "msg" : "Granted perm: `<perm>` (recursive:<apply_to_children>) for user: `<username>` in repo group: `<repo_group_name>`", | |
|
229 | "success": true | |
|
230 | } | |
|
231 | error: null | |
|
232 | ||
|
233 | Example error output: | |
|
234 | ||
|
235 | .. code-block:: bash | |
|
236 | ||
|
237 | id : <id_given_in_input> | |
|
238 | result : null | |
|
239 | error : { | |
|
240 | "failed to edit permission for user: `<userid>` in repo group: `<repo_group_name>`" | |
|
241 | } | |
|
242 | ||
|
243 | ||
|
244 | revoke_user_group_permission_from_repo_group | |
|
245 | -------------------------------------------- | |
|
246 | ||
|
247 | .. py:function:: revoke_user_group_permission_from_repo_group(apiuser, repogroupid, usergroupid, apply_to_children=<Optional:'none'>) | |
|
248 | ||
|
249 | Revoke permission for user group on given repository. | |
|
250 | ||
|
251 | This command can only be run using an |authtoken| with admin | |
|
252 | permissions on the |repo| group. | |
|
253 | ||
|
254 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
255 | :type apiuser: AuthUser | |
|
256 | :param repogroupid: name or id of repository group | |
|
257 | :type repogroupid: str or int | |
|
258 | :param usergroupid: | |
|
259 | :param apply_to_children: 'none', 'repos', 'groups', 'all' | |
|
260 | :type apply_to_children: str | |
|
261 | ||
|
262 | Example output: | |
|
263 | ||
|
264 | .. code-block:: bash | |
|
265 | ||
|
266 | id : <id_given_in_input> | |
|
267 | result: { | |
|
268 | "msg" : "Revoked perm (recursive:<apply_to_children>) for user group: `<usersgroupname>` in repo group: `<repo_group_name>`", | |
|
269 | "success": true | |
|
270 | } | |
|
271 | error: null | |
|
272 | ||
|
273 | Example error output: | |
|
274 | ||
|
275 | .. code-block:: bash | |
|
276 | ||
|
277 | id : <id_given_in_input> | |
|
278 | result : null | |
|
279 | error : { | |
|
280 | "failed to edit permission for user group: `<usergroup>` in repo group: `<repo_group_name>`" | |
|
281 | } | |
|
282 | ||
|
283 | ||
|
284 | revoke_user_permission_from_repo_group | |
|
285 | -------------------------------------- | |
|
286 | ||
|
287 | .. py:function:: revoke_user_permission_from_repo_group(apiuser, repogroupid, userid, apply_to_children=<Optional:'none'>) | |
|
288 | ||
|
289 | Revoke permission for a user in a given repository group. | |
|
290 | ||
|
291 | This command can only be run using an |authtoken| with admin | |
|
292 | permissions on the |repo| group. | |
|
293 | ||
|
294 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
295 | :type apiuser: AuthUser | |
|
296 | :param repogroupid: Set the name or ID of the repository group. | |
|
297 | :type repogroupid: str or int | |
|
298 | :param userid: Set the user name to revoke. | |
|
299 | :type userid: str | |
|
300 | :param apply_to_children: 'none', 'repos', 'groups', 'all' | |
|
301 | :type apply_to_children: str | |
|
302 | ||
|
303 | Example output: | |
|
304 | ||
|
305 | .. code-block:: bash | |
|
306 | ||
|
307 | id : <id_given_in_input> | |
|
308 | result: { | |
|
309 | "msg" : "Revoked perm (recursive:<apply_to_children>) for user: `<username>` in repo group: `<repo_group_name>`", | |
|
310 | "success": true | |
|
311 | } | |
|
312 | error: null | |
|
313 | ||
|
314 | Example error output: | |
|
315 | ||
|
316 | .. code-block:: bash | |
|
317 | ||
|
318 | id : <id_given_in_input> | |
|
319 | result : null | |
|
320 | error : { | |
|
321 | "failed to edit permission for user: `<userid>` in repo group: `<repo_group_name>`" | |
|
322 | } | |
|
323 | ||
|
324 | ||
|
325 | update_repo_group | |
|
326 | ----------------- | |
|
327 | ||
|
328 | .. py:function:: update_repo_group(apiuser, repogroupid, group_name=<Optional:''>, description=<Optional:''>, owner=<Optional:<OptionalAttr:apiuser>>, parent=<Optional:None>, enable_locking=<Optional:False>) | |
|
329 | ||
|
330 | Updates repository group with the details given. | |
|
331 | ||
|
332 | This command can only be run using an |authtoken| with admin | |
|
333 | permissions. | |
|
334 | ||
|
335 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
336 | :type apiuser: AuthUser | |
|
337 | :param repogroupid: Set the ID of repository group. | |
|
338 | :type repogroupid: str or int | |
|
339 | :param group_name: Set the name of the |repo| group. | |
|
340 | :type group_name: str | |
|
341 | :param description: Set a description for the group. | |
|
342 | :type description: str | |
|
343 | :param owner: Set the |repo| group owner. | |
|
344 | :type owner: str | |
|
345 | :param parent: Set the |repo| group parent. | |
|
346 | :type parent: str or int | |
|
347 | :param enable_locking: Enable |repo| locking. The default is false. | |
|
348 | :type enable_locking: bool | |
|
349 | ||
|
350 |
This diff has been collapsed as it changes many lines, (967 lines changed) Show them Hide them | |||
@@ -0,0 +1,967 b'' | |||
|
1 | .. _repo-methods-ref: | |
|
2 | ||
|
3 | repo methods | |
|
4 | ================= | |
|
5 | ||
|
6 | add_field_to_repo | |
|
7 | ----------------- | |
|
8 | ||
|
9 | .. py:function:: add_field_to_repo(apiuser, repoid, key, label=<Optional:''>, description=<Optional:''>) | |
|
10 | ||
|
11 | Adds an extra field to a repository. | |
|
12 | ||
|
13 | This command can only be run using an |authtoken| with at least | |
|
14 | write permissions to the |repo|. | |
|
15 | ||
|
16 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
17 | :type apiuser: AuthUser | |
|
18 | :param repoid: Set the repository name or repository id. | |
|
19 | :type repoid: str or int | |
|
20 | :param key: Create a unique field key for this repository. | |
|
21 | :type key: str | |
|
22 | :param label: | |
|
23 | :type label: Optional(str) | |
|
24 | :param description: | |
|
25 | :type description: Optional(str) | |
|
26 | ||
|
27 | ||
|
28 | comment_commit | |
|
29 | -------------- | |
|
30 | ||
|
31 | .. py:function:: comment_commit(apiuser, repoid, commit_id, message, userid=<Optional:<OptionalAttr:apiuser>>, status=<Optional:None>) | |
|
32 | ||
|
33 | Set a commit comment, and optionally change the status of the commit. | |
|
34 | ||
|
35 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
36 | :type apiuser: AuthUser | |
|
37 | :param repoid: Set the repository name or repository ID. | |
|
38 | :type repoid: str or int | |
|
39 | :param commit_id: Specify the commit_id for which to set a comment. | |
|
40 | :type commit_id: str | |
|
41 | :param message: The comment text. | |
|
42 | :type message: str | |
|
43 | :param userid: Set the user name of the comment creator. | |
|
44 | :type userid: Optional(str or int) | |
|
45 | :param status: status, one of 'not_reviewed', 'approved', 'rejected', | |
|
46 | 'under_review' | |
|
47 | :type status: str | |
|
48 | ||
|
49 | Example error output: | |
|
50 | ||
|
51 | .. code-block:: json | |
|
52 | ||
|
53 | { | |
|
54 | "id" : <id_given_in_input>, | |
|
55 | "result" : { | |
|
56 | "msg": "Commented on commit `<commit_id>` for repository `<repoid>`", | |
|
57 | "status_change": null or <status>, | |
|
58 | "success": true | |
|
59 | }, | |
|
60 | "error" : null | |
|
61 | } | |
|
62 | ||
|
63 | ||
|
64 | create_repo | |
|
65 | ----------- | |
|
66 | ||
|
67 | .. py:function:: create_repo(apiuser, repo_name, repo_type, owner=<Optional:<OptionalAttr:apiuser>>, description=<Optional:''>, private=<Optional:False>, clone_uri=<Optional:None>, landing_rev=<Optional:'rev:tip'>, enable_statistics=<Optional:False>, enable_locking=<Optional:False>, enable_downloads=<Optional:False>, copy_permissions=<Optional:False>) | |
|
68 | ||
|
69 | Creates a repository. | |
|
70 | ||
|
71 | * If the repository name contains "/", all the required repository | |
|
72 | groups will be created. | |
|
73 | ||
|
74 | For example "foo/bar/baz" will create |repo| groups "foo" and "bar" | |
|
75 | (with "foo" as parent). It will also create the "baz" repository | |
|
76 | with "bar" as |repo| group. | |
|
77 | ||
|
78 | This command can only be run using an |authtoken| with at least | |
|
79 | write permissions to the |repo|. | |
|
80 | ||
|
81 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
82 | :type apiuser: AuthUser | |
|
83 | :param repo_name: Set the repository name. | |
|
84 | :type repo_name: str | |
|
85 | :param repo_type: Set the repository type; 'hg','git', or 'svn'. | |
|
86 | :type repo_type: str | |
|
87 | :param owner: user_id or username | |
|
88 | :type owner: Optional(str) | |
|
89 | :param description: Set the repository description. | |
|
90 | :type description: Optional(str) | |
|
91 | :param private: | |
|
92 | :type private: bool | |
|
93 | :param clone_uri: | |
|
94 | :type clone_uri: str | |
|
95 | :param landing_rev: <rev_type>:<rev> | |
|
96 | :type landing_rev: str | |
|
97 | :param enable_locking: | |
|
98 | :type enable_locking: bool | |
|
99 | :param enable_downloads: | |
|
100 | :type enable_downloads: bool | |
|
101 | :param enable_statistics: | |
|
102 | :type enable_statistics: bool | |
|
103 | :param copy_permissions: Copy permission from group in which the | |
|
104 | repository is being created. | |
|
105 | :type copy_permissions: bool | |
|
106 | ||
|
107 | ||
|
108 | Example output: | |
|
109 | ||
|
110 | .. code-block:: bash | |
|
111 | ||
|
112 | id : <id_given_in_input> | |
|
113 | result: { | |
|
114 | "msg": "Created new repository `<reponame>`", | |
|
115 | "success": true, | |
|
116 | "task": "<celery task id or None if done sync>" | |
|
117 | } | |
|
118 | error: null | |
|
119 | ||
|
120 | ||
|
121 | Example error output: | |
|
122 | ||
|
123 | .. code-block:: bash | |
|
124 | ||
|
125 | id : <id_given_in_input> | |
|
126 | result : null | |
|
127 | error : { | |
|
128 | 'failed to create repository `<repo_name>` | |
|
129 | } | |
|
130 | ||
|
131 | ||
|
132 | delete_repo | |
|
133 | ----------- | |
|
134 | ||
|
135 | .. py:function:: delete_repo(apiuser, repoid, forks=<Optional:''>) | |
|
136 | ||
|
137 | Deletes a repository. | |
|
138 | ||
|
139 | * When the `forks` parameter is set it's possible to detach or delete | |
|
140 | forks of deleted repository. | |
|
141 | ||
|
142 | This command can only be run using an |authtoken| with admin | |
|
143 | permissions on the |repo|. | |
|
144 | ||
|
145 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
146 | :type apiuser: AuthUser | |
|
147 | :param repoid: Set the repository name or repository ID. | |
|
148 | :type repoid: str or int | |
|
149 | :param forks: Set to `detach` or `delete` forks from the |repo|. | |
|
150 | :type forks: Optional(str) | |
|
151 | ||
|
152 | Example error output: | |
|
153 | ||
|
154 | .. code-block:: bash | |
|
155 | ||
|
156 | id : <id_given_in_input> | |
|
157 | result: { | |
|
158 | "msg": "Deleted repository `<reponame>`", | |
|
159 | "success": true | |
|
160 | } | |
|
161 | error: null | |
|
162 | ||
|
163 | ||
|
164 | fork_repo | |
|
165 | --------- | |
|
166 | ||
|
167 | .. py:function:: fork_repo(apiuser, repoid, fork_name, owner=<Optional:<OptionalAttr:apiuser>>, description=<Optional:''>, copy_permissions=<Optional:False>, private=<Optional:False>, landing_rev=<Optional:'rev:tip'>) | |
|
168 | ||
|
169 | Creates a fork of the specified |repo|. | |
|
170 | ||
|
171 | * If using |RCE| with Celery this will immediately return a success | |
|
172 | message, even though the fork will be created asynchronously. | |
|
173 | ||
|
174 | This command can only be run using an |authtoken| with fork | |
|
175 | permissions on the |repo|. | |
|
176 | ||
|
177 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
178 | :type apiuser: AuthUser | |
|
179 | :param repoid: Set repository name or repository ID. | |
|
180 | :type repoid: str or int | |
|
181 | :param fork_name: Set the fork name. | |
|
182 | :type fork_name: str | |
|
183 | :param owner: Set the fork owner. | |
|
184 | :type owner: str | |
|
185 | :param description: Set the fork descripton. | |
|
186 | :type description: str | |
|
187 | :param copy_permissions: Copy permissions from parent |repo|. The | |
|
188 | default is False. | |
|
189 | :type copy_permissions: bool | |
|
190 | :param private: Make the fork private. The default is False. | |
|
191 | :type private: bool | |
|
192 | :param landing_rev: Set the landing revision. The default is tip. | |
|
193 | ||
|
194 | Example output: | |
|
195 | ||
|
196 | .. code-block:: bash | |
|
197 | ||
|
198 | id : <id_for_response> | |
|
199 | api_key : "<api_key>" | |
|
200 | args: { | |
|
201 | "repoid" : "<reponame or repo_id>", | |
|
202 | "fork_name": "<forkname>", | |
|
203 | "owner": "<username or user_id = Optional(=apiuser)>", | |
|
204 | "description": "<description>", | |
|
205 | "copy_permissions": "<bool>", | |
|
206 | "private": "<bool>", | |
|
207 | "landing_rev": "<landing_rev>" | |
|
208 | } | |
|
209 | ||
|
210 | Example error output: | |
|
211 | ||
|
212 | .. code-block:: bash | |
|
213 | ||
|
214 | id : <id_given_in_input> | |
|
215 | result: { | |
|
216 | "msg": "Created fork of `<reponame>` as `<forkname>`", | |
|
217 | "success": true, | |
|
218 | "task": "<celery task id or None if done sync>" | |
|
219 | } | |
|
220 | error: null | |
|
221 | ||
|
222 | ||
|
223 | get_repo | |
|
224 | -------- | |
|
225 | ||
|
226 | .. py:function:: get_repo(apiuser, repoid, cache=<Optional:True>) | |
|
227 | ||
|
228 | Gets an existing repository by its name or repository_id. | |
|
229 | ||
|
230 | The members section so the output returns users groups or users | |
|
231 | associated with that repository. | |
|
232 | ||
|
233 | This command can only be run using an |authtoken| with admin rights, | |
|
234 | or users with at least read rights to the |repo|. | |
|
235 | ||
|
236 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
237 | :type apiuser: AuthUser | |
|
238 | :param repoid: The repository name or repository id. | |
|
239 | :type repoid: str or int | |
|
240 | :param cache: use the cached value for last changeset | |
|
241 | :type: cache: Optional(bool) | |
|
242 | ||
|
243 | Example output: | |
|
244 | ||
|
245 | .. code-block:: bash | |
|
246 | ||
|
247 | { | |
|
248 | "error": null, | |
|
249 | "id": <repo_id>, | |
|
250 | "result": { | |
|
251 | "clone_uri": null, | |
|
252 | "created_on": "timestamp", | |
|
253 | "description": "repo description", | |
|
254 | "enable_downloads": false, | |
|
255 | "enable_locking": false, | |
|
256 | "enable_statistics": false, | |
|
257 | "followers": [ | |
|
258 | { | |
|
259 | "active": true, | |
|
260 | "admin": false, | |
|
261 | "api_key": "****************************************", | |
|
262 | "api_keys": [ | |
|
263 | "****************************************" | |
|
264 | ], | |
|
265 | "email": "user@example.com", | |
|
266 | "emails": [ | |
|
267 | "user@example.com" | |
|
268 | ], | |
|
269 | "extern_name": "rhodecode", | |
|
270 | "extern_type": "rhodecode", | |
|
271 | "firstname": "username", | |
|
272 | "ip_addresses": [], | |
|
273 | "language": null, | |
|
274 | "last_login": "2015-09-16T17:16:35.854", | |
|
275 | "lastname": "surname", | |
|
276 | "user_id": <user_id>, | |
|
277 | "username": "name" | |
|
278 | } | |
|
279 | ], | |
|
280 | "fork_of": "parent-repo", | |
|
281 | "landing_rev": [ | |
|
282 | "rev", | |
|
283 | "tip" | |
|
284 | ], | |
|
285 | "last_changeset": { | |
|
286 | "author": "User <user@example.com>", | |
|
287 | "branch": "default", | |
|
288 | "date": "timestamp", | |
|
289 | "message": "last commit message", | |
|
290 | "parents": [ | |
|
291 | { | |
|
292 | "raw_id": "commit-id" | |
|
293 | } | |
|
294 | ], | |
|
295 | "raw_id": "commit-id", | |
|
296 | "revision": <revision number>, | |
|
297 | "short_id": "short id" | |
|
298 | }, | |
|
299 | "lock_reason": null, | |
|
300 | "locked_by": null, | |
|
301 | "locked_date": null, | |
|
302 | "members": [ | |
|
303 | { | |
|
304 | "name": "super-admin-name", | |
|
305 | "origin": "super-admin", | |
|
306 | "permission": "repository.admin", | |
|
307 | "type": "user" | |
|
308 | }, | |
|
309 | { | |
|
310 | "name": "owner-name", | |
|
311 | "origin": "owner", | |
|
312 | "permission": "repository.admin", | |
|
313 | "type": "user" | |
|
314 | }, | |
|
315 | { | |
|
316 | "name": "user-group-name", | |
|
317 | "origin": "permission", | |
|
318 | "permission": "repository.write", | |
|
319 | "type": "user_group" | |
|
320 | } | |
|
321 | ], | |
|
322 | "owner": "owner-name", | |
|
323 | "permissions": [ | |
|
324 | { | |
|
325 | "name": "super-admin-name", | |
|
326 | "origin": "super-admin", | |
|
327 | "permission": "repository.admin", | |
|
328 | "type": "user" | |
|
329 | }, | |
|
330 | { | |
|
331 | "name": "owner-name", | |
|
332 | "origin": "owner", | |
|
333 | "permission": "repository.admin", | |
|
334 | "type": "user" | |
|
335 | }, | |
|
336 | { | |
|
337 | "name": "user-group-name", | |
|
338 | "origin": "permission", | |
|
339 | "permission": "repository.write", | |
|
340 | "type": "user_group" | |
|
341 | } | |
|
342 | ], | |
|
343 | "private": true, | |
|
344 | "repo_id": 676, | |
|
345 | "repo_name": "user-group/repo-name", | |
|
346 | "repo_type": "hg" | |
|
347 | } | |
|
348 | } | |
|
349 | ||
|
350 | ||
|
351 | get_repo_changeset | |
|
352 | ------------------ | |
|
353 | ||
|
354 | .. py:function:: get_repo_changeset(apiuser, repoid, revision, details=<Optional:'basic'>) | |
|
355 | ||
|
356 | Returns information about a changeset. | |
|
357 | ||
|
358 | Additionally parameters define the amount of details returned by | |
|
359 | this function. | |
|
360 | ||
|
361 | This command can only be run using an |authtoken| with admin rights, | |
|
362 | or users with at least read rights to the |repo|. | |
|
363 | ||
|
364 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
365 | :type apiuser: AuthUser | |
|
366 | :param repoid: The repository name or repository id | |
|
367 | :type repoid: str or int | |
|
368 | :param revision: revision for which listing should be done | |
|
369 | :type revision: str | |
|
370 | :param details: details can be 'basic|extended|full' full gives diff | |
|
371 | info details like the diff itself, and number of changed files etc. | |
|
372 | :type details: Optional(str) | |
|
373 | ||
|
374 | ||
|
375 | get_repo_changesets | |
|
376 | ------------------- | |
|
377 | ||
|
378 | .. py:function:: get_repo_changesets(apiuser, repoid, start_rev, limit, details=<Optional:'basic'>) | |
|
379 | ||
|
380 | Returns a set of commits limited by the number starting | |
|
381 | from the `start_rev` option. | |
|
382 | ||
|
383 | Additional parameters define the amount of details returned by this | |
|
384 | function. | |
|
385 | ||
|
386 | This command can only be run using an |authtoken| with admin rights, | |
|
387 | or users with at least read rights to |repos|. | |
|
388 | ||
|
389 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
390 | :type apiuser: AuthUser | |
|
391 | :param repoid: The repository name or repository ID. | |
|
392 | :type repoid: str or int | |
|
393 | :param start_rev: The starting revision from where to get changesets. | |
|
394 | :type start_rev: str | |
|
395 | :param limit: Limit the number of commits to this amount | |
|
396 | :type limit: str or int | |
|
397 | :param details: Set the level of detail returned. Valid option are: | |
|
398 | ``basic``, ``extended`` and ``full``. | |
|
399 | :type details: Optional(str) | |
|
400 | ||
|
401 | .. note:: | |
|
402 | ||
|
403 | Setting the parameter `details` to the value ``full`` is extensive | |
|
404 | and returns details like the diff itself, and the number | |
|
405 | of changed files. | |
|
406 | ||
|
407 | ||
|
408 | get_repo_nodes | |
|
409 | -------------- | |
|
410 | ||
|
411 | .. py:function:: get_repo_nodes(apiuser, repoid, revision, root_path, ret_type=<Optional:'all'>, details=<Optional:'basic'>, max_file_bytes=<Optional:None>) | |
|
412 | ||
|
413 | Returns a list of nodes and children in a flat list for a given | |
|
414 | path at given revision. | |
|
415 | ||
|
416 | It's possible to specify ret_type to show only `files` or `dirs`. | |
|
417 | ||
|
418 | This command can only be run using an |authtoken| with admin rights, | |
|
419 | or users with at least read rights to |repos|. | |
|
420 | ||
|
421 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
422 | :type apiuser: AuthUser | |
|
423 | :param repoid: The repository name or repository ID. | |
|
424 | :type repoid: str or int | |
|
425 | :param revision: The revision for which listing should be done. | |
|
426 | :type revision: str | |
|
427 | :param root_path: The path from which to start displaying. | |
|
428 | :type root_path: str | |
|
429 | :param ret_type: Set the return type. Valid options are | |
|
430 | ``all`` (default), ``files`` and ``dirs``. | |
|
431 | :type ret_type: Optional(str) | |
|
432 | :param details: Returns extended information about nodes, such as | |
|
433 | md5, binary, and or content. The valid options are ``basic`` and | |
|
434 | ``full``. | |
|
435 | :type details: Optional(str) | |
|
436 | :param max_file_bytes: Only return file content under this file size bytes | |
|
437 | :type details: Optional(int) | |
|
438 | ||
|
439 | Example output: | |
|
440 | ||
|
441 | .. code-block:: bash | |
|
442 | ||
|
443 | id : <id_given_in_input> | |
|
444 | result: [ | |
|
445 | { | |
|
446 | "name" : "<name>" | |
|
447 | "type" : "<type>", | |
|
448 | "binary": "<true|false>" (only in extended mode) | |
|
449 | "md5" : "<md5 of file content>" (only in extended mode) | |
|
450 | }, | |
|
451 | ... | |
|
452 | ] | |
|
453 | error: null | |
|
454 | ||
|
455 | ||
|
456 | get_repo_refs | |
|
457 | ------------- | |
|
458 | ||
|
459 | .. py:function:: get_repo_refs(apiuser, repoid) | |
|
460 | ||
|
461 | Returns a dictionary of current references. It returns | |
|
462 | bookmarks, branches, closed_branches, and tags for given repository | |
|
463 | ||
|
464 | It's possible to specify ret_type to show only `files` or `dirs`. | |
|
465 | ||
|
466 | This command can only be run using an |authtoken| with admin rights, | |
|
467 | or users with at least read rights to |repos|. | |
|
468 | ||
|
469 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
470 | :type apiuser: AuthUser | |
|
471 | :param repoid: The repository name or repository ID. | |
|
472 | :type repoid: str or int | |
|
473 | ||
|
474 | Example output: | |
|
475 | ||
|
476 | .. code-block:: bash | |
|
477 | ||
|
478 | id : <id_given_in_input> | |
|
479 | result: [ | |
|
480 | TODO... | |
|
481 | ] | |
|
482 | error: null | |
|
483 | ||
|
484 | ||
|
485 | get_repo_settings | |
|
486 | ----------------- | |
|
487 | ||
|
488 | .. py:function:: get_repo_settings(apiuser, repoid, key=<Optional:None>) | |
|
489 | ||
|
490 | Returns all settings for a repository. If key is given it only returns the | |
|
491 | setting identified by the key or null. | |
|
492 | ||
|
493 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
494 | :type apiuser: AuthUser | |
|
495 | :param repoid: The repository name or repository id. | |
|
496 | :type repoid: str or int | |
|
497 | :param key: Key of the setting to return. | |
|
498 | :type: key: Optional(str) | |
|
499 | ||
|
500 | Example output: | |
|
501 | ||
|
502 | .. code-block:: bash | |
|
503 | ||
|
504 | { | |
|
505 | "error": null, | |
|
506 | "id": 237, | |
|
507 | "result": { | |
|
508 | "extensions_largefiles": true, | |
|
509 | "hooks_changegroup_push_logger": true, | |
|
510 | "hooks_changegroup_repo_size": false, | |
|
511 | "hooks_outgoing_pull_logger": true, | |
|
512 | "phases_publish": "True", | |
|
513 | "rhodecode_hg_use_rebase_for_merging": true, | |
|
514 | "rhodecode_pr_merge_enabled": true, | |
|
515 | "rhodecode_use_outdated_comments": true | |
|
516 | } | |
|
517 | } | |
|
518 | ||
|
519 | ||
|
520 | get_repos | |
|
521 | --------- | |
|
522 | ||
|
523 | .. py:function:: get_repos(apiuser) | |
|
524 | ||
|
525 | Lists all existing repositories. | |
|
526 | ||
|
527 | This command can only be run using an |authtoken| with admin rights, | |
|
528 | or users with at least read rights to |repos|. | |
|
529 | ||
|
530 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
531 | :type apiuser: AuthUser | |
|
532 | ||
|
533 | Example output: | |
|
534 | ||
|
535 | .. code-block:: bash | |
|
536 | ||
|
537 | id : <id_given_in_input> | |
|
538 | result: [ | |
|
539 | { | |
|
540 | "repo_id" : "<repo_id>", | |
|
541 | "repo_name" : "<reponame>" | |
|
542 | "repo_type" : "<repo_type>", | |
|
543 | "clone_uri" : "<clone_uri>", | |
|
544 | "private": : "<bool>", | |
|
545 | "created_on" : "<datetimecreated>", | |
|
546 | "description" : "<description>", | |
|
547 | "landing_rev": "<landing_rev>", | |
|
548 | "owner": "<repo_owner>", | |
|
549 | "fork_of": "<name_of_fork_parent>", | |
|
550 | "enable_downloads": "<bool>", | |
|
551 | "enable_locking": "<bool>", | |
|
552 | "enable_statistics": "<bool>", | |
|
553 | }, | |
|
554 | ... | |
|
555 | ] | |
|
556 | error: null | |
|
557 | ||
|
558 | ||
|
559 | grant_user_group_permission | |
|
560 | --------------------------- | |
|
561 | ||
|
562 | .. py:function:: grant_user_group_permission(apiuser, repoid, usergroupid, perm) | |
|
563 | ||
|
564 | Grant permission for a user group on the specified repository, | |
|
565 | or update existing permissions. | |
|
566 | ||
|
567 | This command can only be run using an |authtoken| with admin | |
|
568 | permissions on the |repo|. | |
|
569 | ||
|
570 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
571 | :type apiuser: AuthUser | |
|
572 | :param repoid: Set the repository name or repository ID. | |
|
573 | :type repoid: str or int | |
|
574 | :param usergroupid: Specify the ID of the user group. | |
|
575 | :type usergroupid: str or int | |
|
576 | :param perm: Set the user group permissions using the following | |
|
577 | format: (repository.(none|read|write|admin)) | |
|
578 | :type perm: str | |
|
579 | ||
|
580 | Example output: | |
|
581 | ||
|
582 | .. code-block:: bash | |
|
583 | ||
|
584 | id : <id_given_in_input> | |
|
585 | result : { | |
|
586 | "msg" : "Granted perm: `<perm>` for group: `<usersgroupname>` in repo: `<reponame>`", | |
|
587 | "success": true | |
|
588 | ||
|
589 | } | |
|
590 | error : null | |
|
591 | ||
|
592 | Example error output: | |
|
593 | ||
|
594 | .. code-block:: bash | |
|
595 | ||
|
596 | id : <id_given_in_input> | |
|
597 | result : null | |
|
598 | error : { | |
|
599 | "failed to edit permission for user group: `<usergroup>` in repo `<repo>`' | |
|
600 | } | |
|
601 | ||
|
602 | ||
|
603 | grant_user_permission | |
|
604 | --------------------- | |
|
605 | ||
|
606 | .. py:function:: grant_user_permission(apiuser, repoid, userid, perm) | |
|
607 | ||
|
608 | Grant permissions for the specified user on the given repository, | |
|
609 | or update existing permissions if found. | |
|
610 | ||
|
611 | This command can only be run using an |authtoken| with admin | |
|
612 | permissions on the |repo|. | |
|
613 | ||
|
614 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
615 | :type apiuser: AuthUser | |
|
616 | :param repoid: Set the repository name or repository ID. | |
|
617 | :type repoid: str or int | |
|
618 | :param userid: Set the user name. | |
|
619 | :type userid: str | |
|
620 | :param perm: Set the user permissions, using the following format | |
|
621 | ``(repository.(none|read|write|admin))`` | |
|
622 | :type perm: str | |
|
623 | ||
|
624 | Example output: | |
|
625 | ||
|
626 | .. code-block:: bash | |
|
627 | ||
|
628 | id : <id_given_in_input> | |
|
629 | result: { | |
|
630 | "msg" : "Granted perm: `<perm>` for user: `<username>` in repo: `<reponame>`", | |
|
631 | "success": true | |
|
632 | } | |
|
633 | error: null | |
|
634 | ||
|
635 | ||
|
636 | invalidate_cache | |
|
637 | ---------------- | |
|
638 | ||
|
639 | .. py:function:: invalidate_cache(apiuser, repoid, delete_keys=<Optional:False>) | |
|
640 | ||
|
641 | Invalidates the cache for the specified repository. | |
|
642 | ||
|
643 | This command can only be run using an |authtoken| with admin rights to | |
|
644 | the specified repository. | |
|
645 | ||
|
646 | This command takes the following options: | |
|
647 | ||
|
648 | :param apiuser: This is filled automatically from |authtoken|. | |
|
649 | :type apiuser: AuthUser | |
|
650 | :param repoid: Sets the repository name or repository ID. | |
|
651 | :type repoid: str or int | |
|
652 | :param delete_keys: This deletes the invalidated keys instead of | |
|
653 | just flagging them. | |
|
654 | :type delete_keys: Optional(``True`` | ``False``) | |
|
655 | ||
|
656 | Example output: | |
|
657 | ||
|
658 | .. code-block:: bash | |
|
659 | ||
|
660 | id : <id_given_in_input> | |
|
661 | result : { | |
|
662 | 'msg': Cache for repository `<repository name>` was invalidated, | |
|
663 | 'repository': <repository name> | |
|
664 | } | |
|
665 | error : null | |
|
666 | ||
|
667 | Example error output: | |
|
668 | ||
|
669 | .. code-block:: bash | |
|
670 | ||
|
671 | id : <id_given_in_input> | |
|
672 | result : null | |
|
673 | error : { | |
|
674 | 'Error occurred during cache invalidation action' | |
|
675 | } | |
|
676 | ||
|
677 | ||
|
678 | lock | |
|
679 | ---- | |
|
680 | ||
|
681 | .. py:function:: lock(apiuser, repoid, locked=<Optional:None>, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
682 | ||
|
683 | Sets the lock state of the specified |repo| by the given user. | |
|
684 | From more information, see :ref:`repo-locking`. | |
|
685 | ||
|
686 | * If the ``userid`` option is not set, the repository is locked to the | |
|
687 | user who called the method. | |
|
688 | * If the ``locked`` parameter is not set, the current lock state of the | |
|
689 | repository is displayed. | |
|
690 | ||
|
691 | This command can only be run using an |authtoken| with admin rights to | |
|
692 | the specified repository. | |
|
693 | ||
|
694 | This command takes the following options: | |
|
695 | ||
|
696 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
697 | :type apiuser: AuthUser | |
|
698 | :param repoid: Sets the repository name or repository ID. | |
|
699 | :type repoid: str or int | |
|
700 | :param locked: Sets the lock state. | |
|
701 | :type locked: Optional(``True`` | ``False``) | |
|
702 | :param userid: Set the repository lock to this user. | |
|
703 | :type userid: Optional(str or int) | |
|
704 | ||
|
705 | Example error output: | |
|
706 | ||
|
707 | .. code-block:: bash | |
|
708 | ||
|
709 | id : <id_given_in_input> | |
|
710 | result : { | |
|
711 | 'repo': '<reponame>', | |
|
712 | 'locked': <bool: lock state>, | |
|
713 | 'locked_since': <int: lock timestamp>, | |
|
714 | 'locked_by': <username of person who made the lock>, | |
|
715 | 'lock_reason': <str: reason for locking>, | |
|
716 | 'lock_state_changed': <bool: True if lock state has been changed in this request>, | |
|
717 | 'msg': 'Repo `<reponame>` locked by `<username>` on <timestamp>.' | |
|
718 | or | |
|
719 | 'msg': 'Repo `<repository name>` not locked.' | |
|
720 | or | |
|
721 | 'msg': 'User `<user name>` set lock state for repo `<repository name>` to `<new lock state>`' | |
|
722 | } | |
|
723 | error : null | |
|
724 | ||
|
725 | Example error output: | |
|
726 | ||
|
727 | .. code-block:: bash | |
|
728 | ||
|
729 | id : <id_given_in_input> | |
|
730 | result : null | |
|
731 | error : { | |
|
732 | 'Error occurred locking repository `<reponame>` | |
|
733 | } | |
|
734 | ||
|
735 | ||
|
736 | pull | |
|
737 | ---- | |
|
738 | ||
|
739 | .. py:function:: pull(apiuser, repoid) | |
|
740 | ||
|
741 | Triggers a pull on the given repository from a remote location. You | |
|
742 | can use this to keep remote repositories up-to-date. | |
|
743 | ||
|
744 | This command can only be run using an |authtoken| with admin | |
|
745 | rights to the specified repository. For more information, | |
|
746 | see :ref:`config-token-ref`. | |
|
747 | ||
|
748 | This command takes the following options: | |
|
749 | ||
|
750 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
751 | :type apiuser: AuthUser | |
|
752 | :param repoid: The repository name or repository ID. | |
|
753 | :type repoid: str or int | |
|
754 | ||
|
755 | Example output: | |
|
756 | ||
|
757 | .. code-block:: bash | |
|
758 | ||
|
759 | id : <id_given_in_input> | |
|
760 | result : { | |
|
761 | "msg": "Pulled from `<repository name>`" | |
|
762 | "repository": "<repository name>" | |
|
763 | } | |
|
764 | error : null | |
|
765 | ||
|
766 | Example error output: | |
|
767 | ||
|
768 | .. code-block:: bash | |
|
769 | ||
|
770 | id : <id_given_in_input> | |
|
771 | result : null | |
|
772 | error : { | |
|
773 | "Unable to pull changes from `<reponame>`" | |
|
774 | } | |
|
775 | ||
|
776 | ||
|
777 | remove_field_from_repo | |
|
778 | ---------------------- | |
|
779 | ||
|
780 | .. py:function:: remove_field_from_repo(apiuser, repoid, key) | |
|
781 | ||
|
782 | Removes an extra field from a repository. | |
|
783 | ||
|
784 | This command can only be run using an |authtoken| with at least | |
|
785 | write permissions to the |repo|. | |
|
786 | ||
|
787 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
788 | :type apiuser: AuthUser | |
|
789 | :param repoid: Set the repository name or repository ID. | |
|
790 | :type repoid: str or int | |
|
791 | :param key: Set the unique field key for this repository. | |
|
792 | :type key: str | |
|
793 | ||
|
794 | ||
|
795 | revoke_user_group_permission | |
|
796 | ---------------------------- | |
|
797 | ||
|
798 | .. py:function:: revoke_user_group_permission(apiuser, repoid, usergroupid) | |
|
799 | ||
|
800 | Revoke the permissions of a user group on a given repository. | |
|
801 | ||
|
802 | This command can only be run using an |authtoken| with admin | |
|
803 | permissions on the |repo|. | |
|
804 | ||
|
805 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
806 | :type apiuser: AuthUser | |
|
807 | :param repoid: Set the repository name or repository ID. | |
|
808 | :type repoid: str or int | |
|
809 | :param usergroupid: Specify the user group ID. | |
|
810 | :type usergroupid: str or int | |
|
811 | ||
|
812 | Example output: | |
|
813 | ||
|
814 | .. code-block:: bash | |
|
815 | ||
|
816 | id : <id_given_in_input> | |
|
817 | result: { | |
|
818 | "msg" : "Revoked perm for group: `<usersgroupname>` in repo: `<reponame>`", | |
|
819 | "success": true | |
|
820 | } | |
|
821 | error: null | |
|
822 | ||
|
823 | ||
|
824 | revoke_user_permission | |
|
825 | ---------------------- | |
|
826 | ||
|
827 | .. py:function:: revoke_user_permission(apiuser, repoid, userid) | |
|
828 | ||
|
829 | Revoke permission for a user on the specified repository. | |
|
830 | ||
|
831 | This command can only be run using an |authtoken| with admin | |
|
832 | permissions on the |repo|. | |
|
833 | ||
|
834 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
835 | :type apiuser: AuthUser | |
|
836 | :param repoid: Set the repository name or repository ID. | |
|
837 | :type repoid: str or int | |
|
838 | :param userid: Set the user name of revoked user. | |
|
839 | :type userid: str or int | |
|
840 | ||
|
841 | Example error output: | |
|
842 | ||
|
843 | .. code-block:: bash | |
|
844 | ||
|
845 | id : <id_given_in_input> | |
|
846 | result: { | |
|
847 | "msg" : "Revoked perm for user: `<username>` in repo: `<reponame>`", | |
|
848 | "success": true | |
|
849 | } | |
|
850 | error: null | |
|
851 | ||
|
852 | ||
|
853 | set_repo_settings | |
|
854 | ----------------- | |
|
855 | ||
|
856 | .. py:function:: set_repo_settings(apiuser, repoid, settings) | |
|
857 | ||
|
858 | Update repository settings. Returns true on success. | |
|
859 | ||
|
860 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
861 | :type apiuser: AuthUser | |
|
862 | :param repoid: The repository name or repository id. | |
|
863 | :type repoid: str or int | |
|
864 | :param settings: The new settings for the repository. | |
|
865 | :type: settings: dict | |
|
866 | ||
|
867 | Example output: | |
|
868 | ||
|
869 | .. code-block:: bash | |
|
870 | ||
|
871 | { | |
|
872 | "error": null, | |
|
873 | "id": 237, | |
|
874 | "result": true | |
|
875 | } | |
|
876 | ||
|
877 | ||
|
878 | strip | |
|
879 | ----- | |
|
880 | ||
|
881 | .. py:function:: strip(apiuser, repoid, revision, branch) | |
|
882 | ||
|
883 | Strips the given revision from the specified repository. | |
|
884 | ||
|
885 | * This will remove the revision and all of its decendants. | |
|
886 | ||
|
887 | This command can only be run using an |authtoken| with admin rights to | |
|
888 | the specified repository. | |
|
889 | ||
|
890 | This command takes the following options: | |
|
891 | ||
|
892 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
893 | :type apiuser: AuthUser | |
|
894 | :param repoid: The repository name or repository ID. | |
|
895 | :type repoid: str or int | |
|
896 | :param revision: The revision you wish to strip. | |
|
897 | :type revision: str | |
|
898 | :param branch: The branch from which to strip the revision. | |
|
899 | :type branch: str | |
|
900 | ||
|
901 | Example output: | |
|
902 | ||
|
903 | .. code-block:: bash | |
|
904 | ||
|
905 | id : <id_given_in_input> | |
|
906 | result : { | |
|
907 | "msg": "'Stripped commit <commit_hash> from repo `<repository name>`'" | |
|
908 | "repository": "<repository name>" | |
|
909 | } | |
|
910 | error : null | |
|
911 | ||
|
912 | Example error output: | |
|
913 | ||
|
914 | .. code-block:: bash | |
|
915 | ||
|
916 | id : <id_given_in_input> | |
|
917 | result : null | |
|
918 | error : { | |
|
919 | "Unable to strip commit <commit_hash> from repo `<repository name>`" | |
|
920 | } | |
|
921 | ||
|
922 | ||
|
923 | update_repo | |
|
924 | ----------- | |
|
925 | ||
|
926 | .. py:function:: update_repo(apiuser, repoid, name=<Optional:None>, owner=<Optional:<OptionalAttr:apiuser>>, group=<Optional:None>, fork_of=<Optional:None>, description=<Optional:''>, private=<Optional:False>, clone_uri=<Optional:None>, landing_rev=<Optional:'rev:tip'>, enable_statistics=<Optional:False>, enable_locking=<Optional:False>, enable_downloads=<Optional:False>, fields=<Optional:''>) | |
|
927 | ||
|
928 | Updates a repository with the given information. | |
|
929 | ||
|
930 | This command can only be run using an |authtoken| with at least | |
|
931 | write permissions to the |repo|. | |
|
932 | ||
|
933 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
934 | :type apiuser: AuthUser | |
|
935 | :param repoid: repository name or repository ID. | |
|
936 | :type repoid: str or int | |
|
937 | :param name: Update the |repo| name. | |
|
938 | :type name: str | |
|
939 | :param owner: Set the |repo| owner. | |
|
940 | :type owner: str | |
|
941 | :param group: Set the |repo| group the |repo| belongs to. | |
|
942 | :type group: str | |
|
943 | :param fork_of: Set the master |repo| name. | |
|
944 | :type fork_of: str | |
|
945 | :param description: Update the |repo| description. | |
|
946 | :type description: str | |
|
947 | :param private: Set the |repo| as private. (True | False) | |
|
948 | :type private: bool | |
|
949 | :param clone_uri: Update the |repo| clone URI. | |
|
950 | :type clone_uri: str | |
|
951 | :param landing_rev: Set the |repo| landing revision. Default is | |
|
952 | ``tip``. | |
|
953 | :type landing_rev: str | |
|
954 | :param enable_statistics: Enable statistics on the |repo|, | |
|
955 | (True | False). | |
|
956 | :type enable_statistics: bool | |
|
957 | :param enable_locking: Enable |repo| locking. | |
|
958 | :type enable_locking: bool | |
|
959 | :param enable_downloads: Enable downloads from the |repo|, | |
|
960 | (True | False). | |
|
961 | :type enable_downloads: bool | |
|
962 | :param fields: Add extra fields to the |repo|. Use the following | |
|
963 | example format: ``field_key=field_val,field_key2=fieldval2``. | |
|
964 | Escape ', ' with \, | |
|
965 | :type fields: str | |
|
966 | ||
|
967 |
@@ -0,0 +1,115 b'' | |||
|
1 | .. _server-methods-ref: | |
|
2 | ||
|
3 | server methods | |
|
4 | ================= | |
|
5 | ||
|
6 | get_ip | |
|
7 | ------ | |
|
8 | ||
|
9 | .. py:function:: get_ip(apiuser, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
10 | ||
|
11 | Displays the IP Address as seen from the |RCE| server. | |
|
12 | ||
|
13 | * This command displays the IP Address, as well as all the defined IP | |
|
14 | addresses for the specified user. If the ``userid`` is not set, the | |
|
15 | data returned is for the user calling the method. | |
|
16 | ||
|
17 | This command can only be run using an |authtoken| with admin rights to | |
|
18 | the specified repository. | |
|
19 | ||
|
20 | This command takes the following options: | |
|
21 | ||
|
22 | :param apiuser: This is filled automatically from |authtoken|. | |
|
23 | :type apiuser: AuthUser | |
|
24 | :param userid: Sets the userid for which associated IP Address data | |
|
25 | is returned. | |
|
26 | :type userid: Optional(str or int) | |
|
27 | ||
|
28 | Example output: | |
|
29 | ||
|
30 | .. code-block:: bash | |
|
31 | ||
|
32 | id : <id_given_in_input> | |
|
33 | result : { | |
|
34 | "server_ip_addr": "<ip_from_clien>", | |
|
35 | "user_ips": [ | |
|
36 | { | |
|
37 | "ip_addr": "<ip_with_mask>", | |
|
38 | "ip_range": ["<start_ip>", "<end_ip>"], | |
|
39 | }, | |
|
40 | ... | |
|
41 | ] | |
|
42 | } | |
|
43 | ||
|
44 | ||
|
45 | get_server_info | |
|
46 | --------------- | |
|
47 | ||
|
48 | .. py:function:: get_server_info(apiuser) | |
|
49 | ||
|
50 | Returns the |RCE| server information. | |
|
51 | ||
|
52 | This includes the running version of |RCE| and all installed | |
|
53 | packages. This command takes the following options: | |
|
54 | ||
|
55 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
56 | :type apiuser: AuthUser | |
|
57 | ||
|
58 | Example output: | |
|
59 | ||
|
60 | .. code-block:: bash | |
|
61 | ||
|
62 | id : <id_given_in_input> | |
|
63 | result : { | |
|
64 | 'modules': [<module name>,...] | |
|
65 | 'py_version': <python version>, | |
|
66 | 'platform': <platform type>, | |
|
67 | 'rhodecode_version': <rhodecode version> | |
|
68 | } | |
|
69 | error : null | |
|
70 | ||
|
71 | ||
|
72 | rescan_repos | |
|
73 | ------------ | |
|
74 | ||
|
75 | .. py:function:: rescan_repos(apiuser, remove_obsolete=<Optional:False>) | |
|
76 | ||
|
77 | Triggers a rescan of the specified repositories. | |
|
78 | ||
|
79 | * If the ``remove_obsolete`` option is set, it also deletes repositories | |
|
80 | that are found in the database but not on the file system, so called | |
|
81 | "clean zombies". | |
|
82 | ||
|
83 | This command can only be run using an |authtoken| with admin rights to | |
|
84 | the specified repository. | |
|
85 | ||
|
86 | This command takes the following options: | |
|
87 | ||
|
88 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
89 | :type apiuser: AuthUser | |
|
90 | :param remove_obsolete: Deletes repositories from the database that | |
|
91 | are not found on the filesystem. | |
|
92 | :type remove_obsolete: Optional(``True`` | ``False``) | |
|
93 | ||
|
94 | Example output: | |
|
95 | ||
|
96 | .. code-block:: bash | |
|
97 | ||
|
98 | id : <id_given_in_input> | |
|
99 | result : { | |
|
100 | 'added': [<added repository name>,...] | |
|
101 | 'removed': [<removed repository name>,...] | |
|
102 | } | |
|
103 | error : null | |
|
104 | ||
|
105 | Example error output: | |
|
106 | ||
|
107 | .. code-block:: bash | |
|
108 | ||
|
109 | id : <id_given_in_input> | |
|
110 | result : null | |
|
111 | error : { | |
|
112 | 'Error occurred during rescan repositories action' | |
|
113 | } | |
|
114 | ||
|
115 |
@@ -0,0 +1,406 b'' | |||
|
1 | .. _user-group-methods-ref: | |
|
2 | ||
|
3 | user_group methods | |
|
4 | ================= | |
|
5 | ||
|
6 | add_user_to_user_group | |
|
7 | ---------------------- | |
|
8 | ||
|
9 | .. py:function:: add_user_to_user_group(apiuser, usergroupid, userid) | |
|
10 | ||
|
11 | Adds a user to a `user group`. If the user already exists in the group | |
|
12 | this command will return false. | |
|
13 | ||
|
14 | This command can only be run using an |authtoken| with admin rights to | |
|
15 | the specified user group. | |
|
16 | ||
|
17 | This command takes the following options: | |
|
18 | ||
|
19 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
20 | :type apiuser: AuthUser | |
|
21 | :param usergroupid: Set the name of the `user group` to which a | |
|
22 | user will be added. | |
|
23 | :type usergroupid: int | |
|
24 | :param userid: Set the `user_id` of the user to add to the group. | |
|
25 | :type userid: int | |
|
26 | ||
|
27 | Example output: | |
|
28 | ||
|
29 | .. code-block:: bash | |
|
30 | ||
|
31 | id : <id_given_in_input> | |
|
32 | result : { | |
|
33 | "success": True|False # depends on if member is in group | |
|
34 | "msg": "added member `<username>` to user group `<groupname>` | | |
|
35 | User is already in that group" | |
|
36 | ||
|
37 | } | |
|
38 | error : null | |
|
39 | ||
|
40 | Example error output: | |
|
41 | ||
|
42 | .. code-block:: bash | |
|
43 | ||
|
44 | id : <id_given_in_input> | |
|
45 | result : null | |
|
46 | error : { | |
|
47 | "failed to add member to user group `<user_group_name>`" | |
|
48 | } | |
|
49 | ||
|
50 | ||
|
51 | create_user_group | |
|
52 | ----------------- | |
|
53 | ||
|
54 | .. py:function:: create_user_group(apiuser, group_name, description=<Optional:''>, owner=<Optional:<OptionalAttr:apiuser>>, active=<Optional:True>) | |
|
55 | ||
|
56 | Creates a new user group. | |
|
57 | ||
|
58 | This command can only be run using an |authtoken| with admin rights to | |
|
59 | the specified repository. | |
|
60 | ||
|
61 | This command takes the following options: | |
|
62 | ||
|
63 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
64 | :type apiuser: AuthUser | |
|
65 | :param group_name: Set the name of the new user group. | |
|
66 | :type group_name: str | |
|
67 | :param description: Give a description of the new user group. | |
|
68 | :type description: str | |
|
69 | :param owner: Set the owner of the new user group. | |
|
70 | If not set, the owner is the |authtoken| user. | |
|
71 | :type owner: Optional(str or int) | |
|
72 | :param active: Set this group as active. | |
|
73 | :type active: Optional(``True`` | ``False``) | |
|
74 | ||
|
75 | Example output: | |
|
76 | ||
|
77 | .. code-block:: bash | |
|
78 | ||
|
79 | id : <id_given_in_input> | |
|
80 | result: { | |
|
81 | "msg": "created new user group `<groupname>`", | |
|
82 | "user_group": <user_group_object> | |
|
83 | } | |
|
84 | error: null | |
|
85 | ||
|
86 | Example error output: | |
|
87 | ||
|
88 | .. code-block:: bash | |
|
89 | ||
|
90 | id : <id_given_in_input> | |
|
91 | result : null | |
|
92 | error : { | |
|
93 | "user group `<group name>` already exist" | |
|
94 | or | |
|
95 | "failed to create group `<group name>`" | |
|
96 | } | |
|
97 | ||
|
98 | ||
|
99 | delete_user_group | |
|
100 | ----------------- | |
|
101 | ||
|
102 | .. py:function:: delete_user_group(apiuser, usergroupid) | |
|
103 | ||
|
104 | Deletes the specified `user group`. | |
|
105 | ||
|
106 | This command can only be run using an |authtoken| with admin rights to | |
|
107 | the specified repository. | |
|
108 | ||
|
109 | This command takes the following options: | |
|
110 | ||
|
111 | :param apiuser: filled automatically from apikey | |
|
112 | :type apiuser: AuthUser | |
|
113 | :param usergroupid: | |
|
114 | :type usergroupid: int | |
|
115 | ||
|
116 | Example output: | |
|
117 | ||
|
118 | .. code-block:: bash | |
|
119 | ||
|
120 | id : <id_given_in_input> | |
|
121 | result : { | |
|
122 | "msg": "deleted user group ID:<user_group_id> <user_group_name>" | |
|
123 | } | |
|
124 | error : null | |
|
125 | ||
|
126 | Example error output: | |
|
127 | ||
|
128 | .. code-block:: bash | |
|
129 | ||
|
130 | id : <id_given_in_input> | |
|
131 | result : null | |
|
132 | error : { | |
|
133 | "failed to delete user group ID:<user_group_id> <user_group_name>" | |
|
134 | or | |
|
135 | "RepoGroup assigned to <repo_groups_list>" | |
|
136 | } | |
|
137 | ||
|
138 | ||
|
139 | get_user_group | |
|
140 | -------------- | |
|
141 | ||
|
142 | .. py:function:: get_user_group(apiuser, usergroupid) | |
|
143 | ||
|
144 | Returns the data of an existing user group. | |
|
145 | ||
|
146 | This command can only be run using an |authtoken| with admin rights to | |
|
147 | the specified repository. | |
|
148 | ||
|
149 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
150 | :type apiuser: AuthUser | |
|
151 | :param usergroupid: Set the user group from which to return data. | |
|
152 | :type usergroupid: str or int | |
|
153 | ||
|
154 | Example error output: | |
|
155 | ||
|
156 | .. code-block:: bash | |
|
157 | ||
|
158 | { | |
|
159 | "error": null, | |
|
160 | "id": <id>, | |
|
161 | "result": { | |
|
162 | "active": true, | |
|
163 | "group_description": "group description", | |
|
164 | "group_name": "group name", | |
|
165 | "members": [ | |
|
166 | { | |
|
167 | "name": "owner-name", | |
|
168 | "origin": "owner", | |
|
169 | "permission": "usergroup.admin", | |
|
170 | "type": "user" | |
|
171 | }, | |
|
172 | { | |
|
173 | { | |
|
174 | "name": "user name", | |
|
175 | "origin": "permission", | |
|
176 | "permission": "usergroup.admin", | |
|
177 | "type": "user" | |
|
178 | }, | |
|
179 | { | |
|
180 | "name": "user group name", | |
|
181 | "origin": "permission", | |
|
182 | "permission": "usergroup.write", | |
|
183 | "type": "user_group" | |
|
184 | } | |
|
185 | ], | |
|
186 | "owner": "owner name", | |
|
187 | "users": [], | |
|
188 | "users_group_id": 2 | |
|
189 | } | |
|
190 | } | |
|
191 | ||
|
192 | ||
|
193 | get_user_groups | |
|
194 | --------------- | |
|
195 | ||
|
196 | .. py:function:: get_user_groups(apiuser) | |
|
197 | ||
|
198 | Lists all the existing user groups within RhodeCode. | |
|
199 | ||
|
200 | This command can only be run using an |authtoken| with admin rights to | |
|
201 | the specified repository. | |
|
202 | ||
|
203 | This command takes the following options: | |
|
204 | ||
|
205 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
206 | :type apiuser: AuthUser | |
|
207 | ||
|
208 | Example error output: | |
|
209 | ||
|
210 | .. code-block:: bash | |
|
211 | ||
|
212 | id : <id_given_in_input> | |
|
213 | result : [<user_group_obj>,...] | |
|
214 | error : null | |
|
215 | ||
|
216 | ||
|
217 | grant_user_group_permission_to_user_group | |
|
218 | ----------------------------------------- | |
|
219 | ||
|
220 | .. py:function:: grant_user_group_permission_to_user_group(apiuser, usergroupid, sourceusergroupid, perm) | |
|
221 | ||
|
222 | Give one user group permissions to another user group. | |
|
223 | ||
|
224 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
225 | :type apiuser: AuthUser | |
|
226 | :param usergroupid: Set the user group on which to edit permissions. | |
|
227 | :type usergroupid: str or int | |
|
228 | :param sourceusergroupid: Set the source user group to which | |
|
229 | access/permissions will be granted. | |
|
230 | :type sourceusergroupid: str or int | |
|
231 | :param perm: (usergroup.(none|read|write|admin)) | |
|
232 | :type perm: str | |
|
233 | ||
|
234 | Example output: | |
|
235 | ||
|
236 | .. code-block:: bash | |
|
237 | ||
|
238 | id : <id_given_in_input> | |
|
239 | result : { | |
|
240 | "msg": "Granted perm: `<perm_name>` for user group: `<source_user_group_name>` in user group: `<user_group_name>`", | |
|
241 | "success": true | |
|
242 | } | |
|
243 | error : null | |
|
244 | ||
|
245 | ||
|
246 | grant_user_permission_to_user_group | |
|
247 | ----------------------------------- | |
|
248 | ||
|
249 | .. py:function:: grant_user_permission_to_user_group(apiuser, usergroupid, userid, perm) | |
|
250 | ||
|
251 | Set permissions for a user in a user group. | |
|
252 | ||
|
253 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
254 | :type apiuser: AuthUser | |
|
255 | :param usergroupid: Set the user group to edit permissions on. | |
|
256 | :type usergroupid: str or int | |
|
257 | :param userid: Set the user from whom you wish to set permissions. | |
|
258 | :type userid: str | |
|
259 | :param perm: (usergroup.(none|read|write|admin)) | |
|
260 | :type perm: str | |
|
261 | ||
|
262 | Example output: | |
|
263 | ||
|
264 | .. code-block:: bash | |
|
265 | ||
|
266 | id : <id_given_in_input> | |
|
267 | result : { | |
|
268 | "msg": "Granted perm: `<perm_name>` for user: `<username>` in user group: `<user_group_name>`", | |
|
269 | "success": true | |
|
270 | } | |
|
271 | error : null | |
|
272 | ||
|
273 | ||
|
274 | remove_user_from_user_group | |
|
275 | --------------------------- | |
|
276 | ||
|
277 | .. py:function:: remove_user_from_user_group(apiuser, usergroupid, userid) | |
|
278 | ||
|
279 | Removes a user from a user group. | |
|
280 | ||
|
281 | * If the specified user is not in the group, this command will return | |
|
282 | `false`. | |
|
283 | ||
|
284 | This command can only be run using an |authtoken| with admin rights to | |
|
285 | the specified user group. | |
|
286 | ||
|
287 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
288 | :type apiuser: AuthUser | |
|
289 | :param usergroupid: Sets the user group name. | |
|
290 | :type usergroupid: str or int | |
|
291 | :param userid: The user you wish to remove from |RCE|. | |
|
292 | :type userid: str or int | |
|
293 | ||
|
294 | Example output: | |
|
295 | ||
|
296 | .. code-block:: bash | |
|
297 | ||
|
298 | id : <id_given_in_input> | |
|
299 | result: { | |
|
300 | "success": True|False, # depends on if member is in group | |
|
301 | "msg": "removed member <username> from user group <groupname> | | |
|
302 | User wasn't in group" | |
|
303 | } | |
|
304 | error: null | |
|
305 | ||
|
306 | ||
|
307 | revoke_user_group_permission_from_user_group | |
|
308 | -------------------------------------------- | |
|
309 | ||
|
310 | .. py:function:: revoke_user_group_permission_from_user_group(apiuser, usergroupid, sourceusergroupid) | |
|
311 | ||
|
312 | Revoke the permissions that one user group has to another. | |
|
313 | ||
|
314 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
315 | :type apiuser: AuthUser | |
|
316 | :param usergroupid: Set the user group on which to edit permissions. | |
|
317 | :type usergroupid: str or int | |
|
318 | :param sourceusergroupid: Set the user group from which permissions | |
|
319 | are revoked. | |
|
320 | :type sourceusergroupid: str or int | |
|
321 | ||
|
322 | Example output: | |
|
323 | ||
|
324 | .. code-block:: bash | |
|
325 | ||
|
326 | id : <id_given_in_input> | |
|
327 | result : { | |
|
328 | "msg": "Revoked perm for user group: `<user_group_name>` in user group: `<target_user_group_name>`", | |
|
329 | "success": true | |
|
330 | } | |
|
331 | error : null | |
|
332 | ||
|
333 | ||
|
334 | revoke_user_permission_from_user_group | |
|
335 | -------------------------------------- | |
|
336 | ||
|
337 | .. py:function:: revoke_user_permission_from_user_group(apiuser, usergroupid, userid) | |
|
338 | ||
|
339 | Revoke a users permissions in a user group. | |
|
340 | ||
|
341 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
342 | :type apiuser: AuthUser | |
|
343 | :param usergroupid: Set the user group from which to revoke the user | |
|
344 | permissions. | |
|
345 | :type: usergroupid: str or int | |
|
346 | :param userid: Set the userid of the user whose permissions will be | |
|
347 | revoked. | |
|
348 | :type userid: str | |
|
349 | ||
|
350 | Example output: | |
|
351 | ||
|
352 | .. code-block:: bash | |
|
353 | ||
|
354 | id : <id_given_in_input> | |
|
355 | result : { | |
|
356 | "msg": "Revoked perm for user: `<username>` in user group: `<user_group_name>`", | |
|
357 | "success": true | |
|
358 | } | |
|
359 | error : null | |
|
360 | ||
|
361 | ||
|
362 | update_user_group | |
|
363 | ----------------- | |
|
364 | ||
|
365 | .. py:function:: update_user_group(apiuser, usergroupid, group_name=<Optional:''>, description=<Optional:''>, owner=<Optional:None>, active=<Optional:True>) | |
|
366 | ||
|
367 | Updates the specified `user group` with the details provided. | |
|
368 | ||
|
369 | This command can only be run using an |authtoken| with admin rights to | |
|
370 | the specified repository. | |
|
371 | ||
|
372 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
373 | :type apiuser: AuthUser | |
|
374 | :param usergroupid: Set the id of the `user group` to update. | |
|
375 | :type usergroupid: str or int | |
|
376 | :param group_name: Set the new name the `user group` | |
|
377 | :type group_name: str | |
|
378 | :param description: Give a description for the `user group` | |
|
379 | :type description: str | |
|
380 | :param owner: Set the owner of the `user group`. | |
|
381 | :type owner: Optional(str or int) | |
|
382 | :param active: Set the group as active. | |
|
383 | :type active: Optional(``True`` | ``False``) | |
|
384 | ||
|
385 | Example output: | |
|
386 | ||
|
387 | .. code-block:: bash | |
|
388 | ||
|
389 | id : <id_given_in_input> | |
|
390 | result : { | |
|
391 | "msg": 'updated user group ID:<user group id> <user group name>', | |
|
392 | "user_group": <user_group_object> | |
|
393 | } | |
|
394 | error : null | |
|
395 | ||
|
396 | Example error output: | |
|
397 | ||
|
398 | .. code-block:: bash | |
|
399 | ||
|
400 | id : <id_given_in_input> | |
|
401 | result : null | |
|
402 | error : { | |
|
403 | "failed to update user group `<user group name>`" | |
|
404 | } | |
|
405 | ||
|
406 |
@@ -0,0 +1,295 b'' | |||
|
1 | .. _user-methods-ref: | |
|
2 | ||
|
3 | user methods | |
|
4 | ================= | |
|
5 | ||
|
6 | create_user | |
|
7 | ----------- | |
|
8 | ||
|
9 | .. py:function:: create_user(apiuser, username, email, password=<Optional:''>, firstname=<Optional:''>, lastname=<Optional:''>, active=<Optional:True>, admin=<Optional:False>, extern_name=<Optional:'rhodecode'>, extern_type=<Optional:'rhodecode'>, force_password_change=<Optional:False>) | |
|
10 | ||
|
11 | Creates a new user and returns the new user object. | |
|
12 | ||
|
13 | This command can only be run using an |authtoken| with admin rights to | |
|
14 | the specified repository. | |
|
15 | ||
|
16 | This command takes the following options: | |
|
17 | ||
|
18 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
19 | :type apiuser: AuthUser | |
|
20 | :param username: Set the new username. | |
|
21 | :type username: str or int | |
|
22 | :param email: Set the user email address. | |
|
23 | :type email: str | |
|
24 | :param password: Set the new user password. | |
|
25 | :type password: Optional(str) | |
|
26 | :param firstname: Set the new user firstname. | |
|
27 | :type firstname: Optional(str) | |
|
28 | :param lastname: Set the new user surname. | |
|
29 | :type lastname: Optional(str) | |
|
30 | :param active: Set the user as active. | |
|
31 | :type active: Optional(``True`` | ``False``) | |
|
32 | :param admin: Give the new user admin rights. | |
|
33 | :type admin: Optional(``True`` | ``False``) | |
|
34 | :param extern_name: Set the authentication plugin name. | |
|
35 | Using LDAP this is filled with LDAP UID. | |
|
36 | :type extern_name: Optional(str) | |
|
37 | :param extern_type: Set the new user authentication plugin. | |
|
38 | :type extern_type: Optional(str) | |
|
39 | :param force_password_change: Force the new user to change password | |
|
40 | on next login. | |
|
41 | :type force_password_change: Optional(``True`` | ``False``) | |
|
42 | ||
|
43 | Example output: | |
|
44 | ||
|
45 | .. code-block:: bash | |
|
46 | ||
|
47 | id : <id_given_in_input> | |
|
48 | result: { | |
|
49 | "msg" : "created new user `<username>`", | |
|
50 | "user": <user_obj> | |
|
51 | } | |
|
52 | error: null | |
|
53 | ||
|
54 | Example error output: | |
|
55 | ||
|
56 | .. code-block:: bash | |
|
57 | ||
|
58 | id : <id_given_in_input> | |
|
59 | result : null | |
|
60 | error : { | |
|
61 | "user `<username>` already exist" | |
|
62 | or | |
|
63 | "email `<email>` already exist" | |
|
64 | or | |
|
65 | "failed to create user `<username>`" | |
|
66 | } | |
|
67 | ||
|
68 | ||
|
69 | delete_user | |
|
70 | ----------- | |
|
71 | ||
|
72 | .. py:function:: delete_user(apiuser, userid) | |
|
73 | ||
|
74 | Deletes the specified user from the |RCE| user database. | |
|
75 | ||
|
76 | This command can only be run using an |authtoken| with admin rights to | |
|
77 | the specified repository. | |
|
78 | ||
|
79 | .. important:: | |
|
80 | ||
|
81 | Ensure all open pull requests and open code review | |
|
82 | requests to this user are close. | |
|
83 | ||
|
84 | Also ensure all repositories, or repository groups owned by this | |
|
85 | user are reassigned before deletion. | |
|
86 | ||
|
87 | This command takes the following options: | |
|
88 | ||
|
89 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
90 | :type apiuser: AuthUser | |
|
91 | :param userid: Set the user to delete. | |
|
92 | :type userid: str or int | |
|
93 | ||
|
94 | Example output: | |
|
95 | ||
|
96 | .. code-block:: bash | |
|
97 | ||
|
98 | id : <id_given_in_input> | |
|
99 | result: { | |
|
100 | "msg" : "deleted user ID:<userid> <username>", | |
|
101 | "user": null | |
|
102 | } | |
|
103 | error: null | |
|
104 | ||
|
105 | Example error output: | |
|
106 | ||
|
107 | .. code-block:: bash | |
|
108 | ||
|
109 | id : <id_given_in_input> | |
|
110 | result : null | |
|
111 | error : { | |
|
112 | "failed to delete user ID:<userid> <username>" | |
|
113 | } | |
|
114 | ||
|
115 | ||
|
116 | get_user | |
|
117 | -------- | |
|
118 | ||
|
119 | .. py:function:: get_user(apiuser, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
120 | ||
|
121 | Returns the information associated with a username or userid. | |
|
122 | ||
|
123 | * If the ``userid`` is not set, this command returns the information | |
|
124 | for the ``userid`` calling the method. | |
|
125 | ||
|
126 | .. note:: | |
|
127 | ||
|
128 | Normal users may only run this command against their ``userid``. For | |
|
129 | full privileges you must run this command using an |authtoken| with | |
|
130 | admin rights. | |
|
131 | ||
|
132 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
133 | :type apiuser: AuthUser | |
|
134 | :param userid: Sets the userid for which data will be returned. | |
|
135 | :type userid: Optional(str or int) | |
|
136 | ||
|
137 | Example output: | |
|
138 | ||
|
139 | .. code-block:: bash | |
|
140 | ||
|
141 | { | |
|
142 | "error": null, | |
|
143 | "id": <id>, | |
|
144 | "result": { | |
|
145 | "active": true, | |
|
146 | "admin": false, | |
|
147 | "api_key": "api-key", | |
|
148 | "api_keys": [ list of keys ], | |
|
149 | "email": "user@example.com", | |
|
150 | "emails": [ | |
|
151 | "user@example.com" | |
|
152 | ], | |
|
153 | "extern_name": "rhodecode", | |
|
154 | "extern_type": "rhodecode", | |
|
155 | "firstname": "username", | |
|
156 | "ip_addresses": [], | |
|
157 | "language": null, | |
|
158 | "last_login": "Timestamp", | |
|
159 | "lastname": "surnae", | |
|
160 | "permissions": { | |
|
161 | "global": [ | |
|
162 | "hg.inherit_default_perms.true", | |
|
163 | "usergroup.read", | |
|
164 | "hg.repogroup.create.false", | |
|
165 | "hg.create.none", | |
|
166 | "hg.extern_activate.manual", | |
|
167 | "hg.create.write_on_repogroup.false", | |
|
168 | "hg.usergroup.create.false", | |
|
169 | "group.none", | |
|
170 | "repository.none", | |
|
171 | "hg.register.none", | |
|
172 | "hg.fork.repository" | |
|
173 | ], | |
|
174 | "repositories": { "username/example": "repository.write"}, | |
|
175 | "repositories_groups": { "user-group/repo": "group.none" }, | |
|
176 | "user_groups": { "user_group_name": "usergroup.read" } | |
|
177 | }, | |
|
178 | "user_id": 32, | |
|
179 | "username": "username" | |
|
180 | } | |
|
181 | } | |
|
182 | ||
|
183 | ||
|
184 | get_user_locks | |
|
185 | -------------- | |
|
186 | ||
|
187 | .. py:function:: get_user_locks(apiuser, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
188 | ||
|
189 | Displays all repositories locked by the specified user. | |
|
190 | ||
|
191 | * If this command is run by a non-admin user, it returns | |
|
192 | a list of |repos| locked by that user. | |
|
193 | ||
|
194 | This command takes the following options: | |
|
195 | ||
|
196 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
197 | :type apiuser: AuthUser | |
|
198 | :param userid: Sets the userid whose list of locked |repos| will be | |
|
199 | displayed. | |
|
200 | :type userid: Optional(str or int) | |
|
201 | ||
|
202 | Example output: | |
|
203 | ||
|
204 | .. code-block:: bash | |
|
205 | ||
|
206 | id : <id_given_in_input> | |
|
207 | result : { | |
|
208 | [repo_object, repo_object,...] | |
|
209 | } | |
|
210 | error : null | |
|
211 | ||
|
212 | ||
|
213 | get_users | |
|
214 | --------- | |
|
215 | ||
|
216 | .. py:function:: get_users(apiuser) | |
|
217 | ||
|
218 | Lists all users in the |RCE| user database. | |
|
219 | ||
|
220 | This command can only be run using an |authtoken| with admin rights to | |
|
221 | the specified repository. | |
|
222 | ||
|
223 | This command takes the following options: | |
|
224 | ||
|
225 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
226 | :type apiuser: AuthUser | |
|
227 | ||
|
228 | Example output: | |
|
229 | ||
|
230 | .. code-block:: bash | |
|
231 | ||
|
232 | id : <id_given_in_input> | |
|
233 | result: [<user_object>, ...] | |
|
234 | error: null | |
|
235 | ||
|
236 | ||
|
237 | update_user | |
|
238 | ----------- | |
|
239 | ||
|
240 | .. py:function:: update_user(apiuser, userid, username=<Optional:None>, email=<Optional:None>, password=<Optional:None>, firstname=<Optional:None>, lastname=<Optional:None>, active=<Optional:None>, admin=<Optional:None>, extern_type=<Optional:None>, extern_name=<Optional:None>) | |
|
241 | ||
|
242 | Updates the details for the specified user, if that user exists. | |
|
243 | ||
|
244 | This command can only be run using an |authtoken| with admin rights to | |
|
245 | the specified repository. | |
|
246 | ||
|
247 | This command takes the following options: | |
|
248 | ||
|
249 | :param apiuser: This is filled automatically from |authtoken|. | |
|
250 | :type apiuser: AuthUser | |
|
251 | :param userid: Set the ``userid`` to update. | |
|
252 | :type userid: str or int | |
|
253 | :param username: Set the new username. | |
|
254 | :type username: str or int | |
|
255 | :param email: Set the new email. | |
|
256 | :type email: str | |
|
257 | :param password: Set the new password. | |
|
258 | :type password: Optional(str) | |
|
259 | :param firstname: Set the new first name. | |
|
260 | :type firstname: Optional(str) | |
|
261 | :param lastname: Set the new surname. | |
|
262 | :type lastname: Optional(str) | |
|
263 | :param active: Set the new user as active. | |
|
264 | :type active: Optional(``True`` | ``False``) | |
|
265 | :param admin: Give the user admin rights. | |
|
266 | :type admin: Optional(``True`` | ``False``) | |
|
267 | :param extern_name: Set the authentication plugin user name. | |
|
268 | Using LDAP this is filled with LDAP UID. | |
|
269 | :type extern_name: Optional(str) | |
|
270 | :param extern_type: Set the authentication plugin type. | |
|
271 | :type extern_type: Optional(str) | |
|
272 | ||
|
273 | ||
|
274 | Example output: | |
|
275 | ||
|
276 | .. code-block:: bash | |
|
277 | ||
|
278 | id : <id_given_in_input> | |
|
279 | result: { | |
|
280 | "msg" : "updated user ID:<userid> <username>", | |
|
281 | "user": <user_object>, | |
|
282 | } | |
|
283 | error: null | |
|
284 | ||
|
285 | Example error output: | |
|
286 | ||
|
287 | .. code-block:: bash | |
|
288 | ||
|
289 | id : <id_given_in_input> | |
|
290 | result : null | |
|
291 | error : { | |
|
292 | "failed to update user `<username>`" | |
|
293 | } | |
|
294 | ||
|
295 |
This diff has been collapsed as it changes many lines, (2638 lines changed) Show them Hide them | |||
@@ -1,2825 +1,207 b'' | |||
|
1 | 1 | .. _api: |
|
2 | 2 | |
|
3 | 3 | API Documentation |
|
4 | 4 | ================= |
|
5 | 5 | |
|
6 | 6 | The |RCE| API uses a single scheme for calling all API methods. The API is |
|
7 | 7 | implemented with JSON protocol in both directions. To send API requests to |
|
8 | 8 | your instance of |RCE|, use the following URL format |
|
9 | 9 | ``<your_server>/_admin`` |
|
10 | 10 | |
|
11 | 11 | .. note:: |
|
12 | 12 | |
|
13 | 13 | To use the API, you should configure the :file:`~/.rhoderc` file with |
|
14 | 14 | access details per instance. For more information, see |
|
15 | 15 | :ref:`config-rhoderc`. |
|
16 | 16 | |
|
17 | 17 | |
|
18 | 18 | API ACCESS FOR WEB VIEWS |
|
19 | 19 | ------------------------ |
|
20 | 20 | |
|
21 | 21 | API access can also be turned on for each web view in |RCE| that is |
|
22 | 22 | decorated with a `@LoginRequired` decorator. To enable API access, change |
|
23 | 23 | the standard login decorator to `@LoginRequired(api_access=True)`. |
|
24 | 24 | |
|
25 | 25 | From |RCM| version 1.7.0 you can configure a white list |
|
26 | 26 | of views that have API access enabled by default. To enable these, |
|
27 | 27 | edit the |RCM| configuration ``.ini`` file. The default location is: |
|
28 | 28 | |
|
29 | 29 | * |RCM| Pre-2.2.7 :file:`root/rhodecode/data/production.ini` |
|
30 | 30 | * |RCM| 3.0 :file:`/home/{user}/.rccontrol/{instance-id}/rhodecode.ini` |
|
31 | 31 | |
|
32 | 32 | To configure the white list, edit this section of the file. In this |
|
33 | 33 | configuration example, API access is granted to the patch/diff raw file and |
|
34 | 34 | archive. |
|
35 | 35 | |
|
36 | 36 | .. code-block:: ini |
|
37 | 37 | |
|
38 | 38 | ## List of controllers (using glob syntax) that AUTH TOKENS could be used for access. |
|
39 | 39 | ## Adding ?auth_token = <token> to the url authenticates this request as if it |
|
40 | 40 | ## came from the the logged in user who own this authentication token. |
|
41 | 41 | ## |
|
42 | 42 | ## Syntax is <ControllerClass>:<function_pattern>. |
|
43 | 43 | ## The list should be "," separated and on a single line. |
|
44 | 44 | ## |
|
45 | 45 | api_access_controllers_whitelist = ChangesetController:changeset_patch,ChangesetController:changeset_raw,ilesController:raw,FilesController:archivefile, |
|
46 | 46 | |
|
47 | 47 | After this change, a |RCE| view can be accessed without login by adding a |
|
48 | 48 | GET parameter ``?auth_token=<auth_token>`` to a url. For example to |
|
49 | 49 | access the raw diff. |
|
50 | 50 | |
|
51 | 51 | .. code-block:: html |
|
52 | 52 | |
|
53 | 53 | http://<server>/<repo>/changeset-diff/<sha>?auth_token=<auth_token> |
|
54 | 54 | |
|
55 | 55 | By default this is only enabled on RSS/ATOM feed views. Exposing raw diffs is a |
|
56 | 56 | good way to integrate with 3rd party services like code review, or build farms |
|
57 | 57 | that could download archives. |
|
58 | 58 | |
|
59 | 59 | API ACCESS |
|
60 | 60 | ---------- |
|
61 | 61 | |
|
62 | 62 | All clients are required to send JSON-RPC spec JSON data. |
|
63 | 63 | |
|
64 | 64 | .. code-block:: bash |
|
65 | 65 | |
|
66 | 66 | { |
|
67 | 67 | "id:"<id>", |
|
68 | 68 | "auth_token":"<auth_token>", |
|
69 | 69 | "method":"<method_name>", |
|
70 | 70 | "args":{"<arg_key>":"<arg_val>"} |
|
71 | 71 | } |
|
72 | 72 | |
|
73 | 73 | Example call for auto pulling from remote repositories using curl: |
|
74 | 74 | |
|
75 | 75 | .. code-block:: bash |
|
76 | 76 | |
|
77 | 77 | curl https://server.com/_admin/api -X POST -H 'content-type:text/plain' --data-binary '{"id":1, |
|
78 | 78 | "auth_token":"xe7cdb2v278e4evbdf5vs04v832v0efvcbcve4a3","method":"pull", "args":{"repo":"CPython"}}' |
|
79 | 79 | |
|
80 | 80 | Provide those parameters: |
|
81 | 81 | - **id** A value of any type, which is used to match the response with the |
|
82 | 82 | request that it is replying to. |
|
83 | 83 | - **auth_token** for access and permission validation. |
|
84 | 84 | - **method** is name of method to call |
|
85 | 85 | - **args** is an ``key:value`` list of arguments to pass to method |
|
86 | 86 | |
|
87 | 87 | .. note:: |
|
88 | 88 | |
|
89 | 89 | To get your |authtoken|, from the |RCE| interface, |
|
90 | 90 | go to: |
|
91 | 91 | :menuselection:`username --> My account --> Auth tokens` |
|
92 | 92 | |
|
93 | 93 | For security reasons you should always create a dedicated |authtoken| for |
|
94 | 94 | API use only. |
|
95 | 95 | |
|
96 | 96 | |
|
97 | 97 | The |RCE| API will always return a JSON-RPC response: |
|
98 | 98 | |
|
99 | 99 | .. code-block:: bash |
|
100 | 100 | |
|
101 | 101 | { |
|
102 | 102 | "id": <id>, # matching id sent by request |
|
103 | 103 | "result": "<result>"|null, # JSON formatted result, null if any errors |
|
104 | 104 | "error": "null"|<error_message> # JSON formatted error (if any) |
|
105 | 105 | } |
|
106 | 106 | |
|
107 | 107 | All responses from API will be with `HTTP/1.0 200 OK` status code. |
|
108 | 108 | If there is an error when calling the API, the *error* key will contain a |
|
109 | 109 | failure description and the *result* will be `null`. |
|
110 | 110 | |
|
111 | 111 | API CLIENT |
|
112 | 112 | ---------- |
|
113 | 113 | |
|
114 | 114 | To install the |RCE| API, see :ref:`install-tools`. To configure the API per |
|
115 | 115 | instance, see the :ref:`rc-tools` section as you need to configure a |
|
116 | 116 | :file:`~/.rhoderc` file with your |authtokens|. |
|
117 | 117 | |
|
118 | 118 | Once you have set up your instance API access, use the following examples to |
|
119 | 119 | get started. |
|
120 | 120 | |
|
121 | 121 | .. code-block:: bash |
|
122 | 122 | |
|
123 | 123 | # Getting the 'rhodecode' repository |
|
124 | 124 | # from a RhodeCode Enterprise instance |
|
125 | 125 | rhodecode-api --instance-name=enterprise-1 get_repo repoid:rhodecode |
|
126 | 126 | |
|
127 | 127 | Calling method get_repo => http://127.0.0.1:5000 |
|
128 | 128 | Server response |
|
129 | 129 | { |
|
130 | 130 | <json data> |
|
131 | 131 | } |
|
132 | 132 | |
|
133 | 133 | # Creating a new mercurial repository called 'brand-new' |
|
134 | 134 | # with a description 'Repo-description' |
|
135 | 135 | rhodecode-api --instance-name=enterprise-1 create_repo repo_name:brand-new repo_type:hg description:Repo-description |
|
136 | 136 | { |
|
137 | 137 | "error": null, |
|
138 | 138 | "id": 1110, |
|
139 | 139 | "result": { |
|
140 | 140 | "msg": "Created new repository `brand-new`", |
|
141 | 141 | "success": true, |
|
142 | 142 | "task": null |
|
143 | 143 | } |
|
144 | 144 | } |
|
145 | 145 | |
|
146 | 146 | A broken example, what not to do. |
|
147 | 147 | |
|
148 | 148 | .. code-block:: bash |
|
149 | 149 | |
|
150 | 150 | # A call missing the required arguments |
|
151 | 151 | # and not specifying the instance |
|
152 | 152 | rhodecode-api get_repo |
|
153 | 153 | |
|
154 | 154 | Calling method get_repo => http://127.0.0.1:5000 |
|
155 | 155 | Server response |
|
156 | 156 | "Missing non optional `repoid` arg in JSON DATA" |
|
157 | 157 | |
|
158 | 158 | You can specify pure JSON using the ``--format`` parameter. |
|
159 | 159 | |
|
160 | 160 | .. code-block:: bash |
|
161 | 161 | |
|
162 | 162 | rhodecode-api --format=json get_repo repoid:rhodecode |
|
163 | 163 | |
|
164 | 164 | In such case only output that this function shows is pure JSON, we can use that |
|
165 | 165 | and pipe output to some json formatter. |
|
166 | 166 | |
|
167 | 167 | If output is in pure JSON format, you can pipe output to a JSON formatter. |
|
168 | 168 | |
|
169 | 169 | .. code-block:: bash |
|
170 | 170 | |
|
171 | 171 | rhodecode-api --instance-name=enterprise-1 --format=json get_repo repoid:rhodecode | python -m json.tool |
|
172 | 172 | |
|
173 | 173 | API METHODS |
|
174 | 174 | ----------- |
|
175 | 175 | |
|
176 | 176 | Each method by default required following arguments. |
|
177 | 177 | |
|
178 | 178 | .. code-block:: bash |
|
179 | 179 | |
|
180 | 180 | id : "<id_for_response>" |
|
181 | 181 | auth_token : "<auth_token>" |
|
182 | 182 | method : "<method name>" |
|
183 | 183 | args : {} |
|
184 | 184 | |
|
185 | 185 | Use each **param** from docs and put it in args, Optional parameters |
|
186 | 186 | are not required in args. |
|
187 | 187 | |
|
188 | 188 | .. code-block:: bash |
|
189 | 189 | |
|
190 | 190 | args: {"repoid": "rhodecode"} |
|
191 | 191 | |
|
192 | 192 | .. Note: From this point on things are generated by the script in |
|
193 | 193 | `scripts/fabfile.py`. To change things below, update the docstrings in the |
|
194 | 194 | ApiController. |
|
195 | 195 | |
|
196 | 196 | .. --- API DEFS MARKER --- |
|
197 | ||
|
198 | pull | |
|
199 | ---- | |
|
200 | ||
|
201 | .. py:function:: pull(apiuser, repoid) | |
|
202 | ||
|
203 | Triggers a pull on the given repository from a remote location. You | |
|
204 | can use this to keep remote repositories up-to-date. | |
|
205 | ||
|
206 | This command can only be run using an |authtoken| with admin | |
|
207 | rights to the specified repository. For more information, | |
|
208 | see :ref:`config-token-ref`. | |
|
209 | ||
|
210 | This command takes the following options: | |
|
211 | ||
|
212 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
213 | :type apiuser: AuthUser | |
|
214 | :param repoid: The repository name or repository ID. | |
|
215 | :type repoid: str or int | |
|
216 | ||
|
217 | Example output: | |
|
218 | ||
|
219 | .. code-block:: bash | |
|
220 | ||
|
221 | id : <id_given_in_input> | |
|
222 | result : { | |
|
223 | "msg": "Pulled from `<repository name>`" | |
|
224 | "repository": "<repository name>" | |
|
225 | } | |
|
226 | error : null | |
|
227 | ||
|
228 | Example error output: | |
|
229 | ||
|
230 | .. code-block:: bash | |
|
231 | ||
|
232 | id : <id_given_in_input> | |
|
233 | result : null | |
|
234 | error : { | |
|
235 | "Unable to pull changes from `<reponame>`" | |
|
236 | } | |
|
237 | ||
|
238 | ||
|
239 | strip | |
|
240 | ----- | |
|
241 | ||
|
242 | .. py:function:: strip(apiuser, repoid, revision, branch) | |
|
243 | ||
|
244 | Strips the given revision from the specified repository. | |
|
245 | ||
|
246 | * This will remove the revision and all of its decendants. | |
|
247 | ||
|
248 | This command can only be run using an |authtoken| with admin rights to | |
|
249 | the specified repository. | |
|
250 | ||
|
251 | This command takes the following options: | |
|
252 | ||
|
253 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
254 | :type apiuser: AuthUser | |
|
255 | :param repoid: The repository name or repository ID. | |
|
256 | :type repoid: str or int | |
|
257 | :param revision: The revision you wish to strip. | |
|
258 | :type revision: str | |
|
259 | :param branch: The branch from which to strip the revision. | |
|
260 | :type branch: str | |
|
261 | ||
|
262 | Example output: | |
|
263 | ||
|
264 | .. code-block:: bash | |
|
265 | ||
|
266 | id : <id_given_in_input> | |
|
267 | result : { | |
|
268 | "msg": "'Stripped commit <commit_hash> from repo `<repository name>`'" | |
|
269 | "repository": "<repository name>" | |
|
270 | } | |
|
271 | error : null | |
|
272 | ||
|
273 | Example error output: | |
|
274 | ||
|
275 | .. code-block:: bash | |
|
276 | ||
|
277 | id : <id_given_in_input> | |
|
278 | result : null | |
|
279 | error : { | |
|
280 | "Unable to strip commit <commit_hash> from repo `<repository name>`" | |
|
281 | } | |
|
282 | ||
|
283 | ||
|
284 | rescan_repos | |
|
285 | ------------ | |
|
286 | ||
|
287 | .. py:function:: rescan_repos(apiuser, remove_obsolete=<Optional:False>) | |
|
288 | ||
|
289 | Triggers a rescan of the specified repositories. | |
|
290 | ||
|
291 | * If the ``remove_obsolete`` option is set, it also deletes repositories | |
|
292 | that are found in the database but not on the file system, so called | |
|
293 | "clean zombies". | |
|
294 | ||
|
295 | This command can only be run using an |authtoken| with admin rights to | |
|
296 | the specified repository. | |
|
297 | ||
|
298 | This command takes the following options: | |
|
299 | ||
|
300 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
301 | :type apiuser: AuthUser | |
|
302 | :param remove_obsolete: Deletes repositories from the database that | |
|
303 | are not found on the filesystem. | |
|
304 | :type remove_obsolete: Optional(``True`` | ``False``) | |
|
305 | ||
|
306 | Example output: | |
|
307 | ||
|
308 | .. code-block:: bash | |
|
309 | ||
|
310 | id : <id_given_in_input> | |
|
311 | result : { | |
|
312 | 'added': [<added repository name>,...] | |
|
313 | 'removed': [<removed repository name>,...] | |
|
314 | } | |
|
315 | error : null | |
|
316 | ||
|
317 | Example error output: | |
|
318 | ||
|
319 | .. code-block:: bash | |
|
320 | ||
|
321 | id : <id_given_in_input> | |
|
322 | result : null | |
|
323 | error : { | |
|
324 | 'Error occurred during rescan repositories action' | |
|
325 | } | |
|
326 | ||
|
327 | ||
|
328 | invalidate_cache | |
|
329 | ---------------- | |
|
330 | ||
|
331 | .. py:function:: invalidate_cache(apiuser, repoid, delete_keys=<Optional:False>) | |
|
332 | ||
|
333 | Invalidates the cache for the specified repository. | |
|
334 | ||
|
335 | This command can only be run using an |authtoken| with admin rights to | |
|
336 | the specified repository. | |
|
337 | ||
|
338 | This command takes the following options: | |
|
339 | ||
|
340 | :param apiuser: This is filled automatically from |authtoken|. | |
|
341 | :type apiuser: AuthUser | |
|
342 | :param repoid: Sets the repository name or repository ID. | |
|
343 | :type repoid: str or int | |
|
344 | :param delete_keys: This deletes the invalidated keys instead of | |
|
345 | just flagging them. | |
|
346 | :type delete_keys: Optional(``True`` | ``False``) | |
|
347 | ||
|
348 | Example output: | |
|
349 | ||
|
350 | .. code-block:: bash | |
|
351 | ||
|
352 | id : <id_given_in_input> | |
|
353 | result : { | |
|
354 | 'msg': Cache for repository `<repository name>` was invalidated, | |
|
355 | 'repository': <repository name> | |
|
356 | } | |
|
357 | error : null | |
|
358 | ||
|
359 | Example error output: | |
|
360 | ||
|
361 | .. code-block:: bash | |
|
362 | ||
|
363 | id : <id_given_in_input> | |
|
364 | result : null | |
|
365 | error : { | |
|
366 | 'Error occurred during cache invalidation action' | |
|
367 | } | |
|
368 | ||
|
369 | ||
|
370 | lock | |
|
371 | ---- | |
|
372 | ||
|
373 | .. py:function:: lock(apiuser, repoid, locked=<Optional:None>, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
374 | ||
|
375 | Sets the lock state of the specified |repo| by the given user. | |
|
376 | From more information, see :ref:`repo-locking`. | |
|
377 | ||
|
378 | * If the ``userid`` option is not set, the repository is locked to the | |
|
379 | user who called the method. | |
|
380 | * If the ``locked`` parameter is not set, the current lock state of the | |
|
381 | repository is displayed. | |
|
382 | ||
|
383 | This command can only be run using an |authtoken| with admin rights to | |
|
384 | the specified repository. | |
|
385 | ||
|
386 | This command takes the following options: | |
|
387 | ||
|
388 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
389 | :type apiuser: AuthUser | |
|
390 | :param repoid: Sets the repository name or repository ID. | |
|
391 | :type repoid: str or int | |
|
392 | :param locked: Sets the lock state. | |
|
393 | :type locked: Optional(``True`` | ``False``) | |
|
394 | :param userid: Set the repository lock to this user. | |
|
395 | :type userid: Optional(str or int) | |
|
396 | ||
|
397 | Example error output: | |
|
398 | ||
|
399 | .. code-block:: bash | |
|
400 | ||
|
401 | id : <id_given_in_input> | |
|
402 | result : { | |
|
403 | 'repo': '<reponame>', | |
|
404 | 'locked': <bool: lock state>, | |
|
405 | 'locked_since': <int: lock timestamp>, | |
|
406 | 'locked_by': <username of person who made the lock>, | |
|
407 | 'lock_reason': <str: reason for locking>, | |
|
408 | 'lock_state_changed': <bool: True if lock state has been changed in this request>, | |
|
409 | 'msg': 'Repo `<reponame>` locked by `<username>` on <timestamp>.' | |
|
410 | or | |
|
411 | 'msg': 'Repo `<repository name>` not locked.' | |
|
412 | or | |
|
413 | 'msg': 'User `<user name>` set lock state for repo `<repository name>` to `<new lock state>`' | |
|
414 | } | |
|
415 | error : null | |
|
416 | ||
|
417 | Example error output: | |
|
418 | ||
|
419 | .. code-block:: bash | |
|
420 | ||
|
421 | id : <id_given_in_input> | |
|
422 | result : null | |
|
423 | error : { | |
|
424 | 'Error occurred locking repository `<reponame>` | |
|
425 | } | |
|
426 | ||
|
427 | ||
|
428 | get_locks | |
|
429 | --------- | |
|
430 | ||
|
431 | .. py:function:: get_locks(apiuser, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
432 | ||
|
433 | Displays all repositories locked by the specified user. | |
|
434 | ||
|
435 | * If this command is run by a non-admin user, it returns | |
|
436 | a list of |repos| locked by that user. | |
|
437 | ||
|
438 | This command takes the following options: | |
|
439 | ||
|
440 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
441 | :type apiuser: AuthUser | |
|
442 | :param userid: Sets the userid whose list of locked |repos| will be | |
|
443 | displayed. | |
|
444 | :type userid: Optional(str or int) | |
|
445 | ||
|
446 | Example output: | |
|
447 | ||
|
448 | .. code-block:: bash | |
|
449 | ||
|
450 | id : <id_given_in_input> | |
|
451 | result : { | |
|
452 | [repo_object, repo_object,...] | |
|
453 | } | |
|
454 | error : null | |
|
455 | ||
|
456 | ||
|
457 | get_ip | |
|
458 | ------ | |
|
459 | ||
|
460 | .. py:function:: get_ip(apiuser, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
461 | ||
|
462 | Displays the IP Address as seen from the |RCE| server. | |
|
463 | ||
|
464 | * This command displays the IP Address, as well as all the defined IP | |
|
465 | addresses for the specified user. If the ``userid`` is not set, the | |
|
466 | data returned is for the user calling the method. | |
|
467 | ||
|
468 | This command can only be run using an |authtoken| with admin rights to | |
|
469 | the specified repository. | |
|
470 | ||
|
471 | This command takes the following options: | |
|
472 | ||
|
473 | :param apiuser: This is filled automatically from |authtoken|. | |
|
474 | :type apiuser: AuthUser | |
|
475 | :param userid: Sets the userid for which associated IP Address data | |
|
476 | is returned. | |
|
477 | :type userid: Optional(str or int) | |
|
478 | ||
|
479 | Example output: | |
|
480 | ||
|
481 | .. code-block:: bash | |
|
482 | ||
|
483 | id : <id_given_in_input> | |
|
484 | result : { | |
|
485 | "server_ip_addr": "<ip_from_clien>", | |
|
486 | "user_ips": [ | |
|
487 | { | |
|
488 | "ip_addr": "<ip_with_mask>", | |
|
489 | "ip_range": ["<start_ip>", "<end_ip>"], | |
|
490 | }, | |
|
491 | ... | |
|
492 | ] | |
|
493 | } | |
|
494 | ||
|
495 | ||
|
496 | show_ip | |
|
497 | ------- | |
|
498 | ||
|
499 | .. py:function:: show_ip(apiuser, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
500 | ||
|
501 | Displays the IP Address as seen from the |RCE| server. | |
|
502 | ||
|
503 | * This command displays the IP Address, as well as all the defined IP | |
|
504 | addresses for the specified user. If the ``userid`` is not set, the | |
|
505 | data returned is for the user calling the method. | |
|
506 | ||
|
507 | This command can only be run using an |authtoken| with admin rights to | |
|
508 | the specified repository. | |
|
509 | ||
|
510 | This command takes the following options: | |
|
511 | ||
|
512 | :param apiuser: This is filled automatically from |authtoken|. | |
|
513 | :type apiuser: AuthUser | |
|
514 | :param userid: Sets the userid for which associated IP Address data | |
|
515 | is returned. | |
|
516 | :type userid: Optional(str or int) | |
|
517 | ||
|
518 | Example output: | |
|
519 | ||
|
520 | .. code-block:: bash | |
|
521 | ||
|
522 | id : <id_given_in_input> | |
|
523 | result : { | |
|
524 | "server_ip_addr": "<ip_from_clien>", | |
|
525 | "user_ips": [ | |
|
526 | { | |
|
527 | "ip_addr": "<ip_with_mask>", | |
|
528 | "ip_range": ["<start_ip>", "<end_ip>"], | |
|
529 | }, | |
|
530 | ... | |
|
531 | ] | |
|
532 | } | |
|
533 | ||
|
534 | ||
|
535 | get_license_info | |
|
536 | ---------------- | |
|
537 | ||
|
538 | .. py:function:: get_license_info(apiuser) | |
|
539 | ||
|
540 | Returns the |RCE| license information. | |
|
541 | ||
|
542 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
543 | :type apiuser: AuthUser | |
|
544 | ||
|
545 | Example output: | |
|
546 | ||
|
547 | .. code-block:: bash | |
|
548 | ||
|
549 | id : <id_given_in_input> | |
|
550 | result : { | |
|
551 | 'rhodecode_version': <rhodecode version>, | |
|
552 | 'token': <license token>, | |
|
553 | 'issued_to': <license owner>, | |
|
554 | 'issued_on': <license issue date>, | |
|
555 | 'expires_on': <license expiration date>, | |
|
556 | 'type': <license type>, | |
|
557 | 'users_limit': <license users limit>, | |
|
558 | 'key': <license key> | |
|
559 | } | |
|
560 | error : null | |
|
561 | ||
|
562 | ||
|
563 | set_license_key | |
|
564 | --------------- | |
|
565 | ||
|
566 | .. py:function:: set_license_key(apiuser, key) | |
|
567 | ||
|
568 | Sets the |RCE| license key. | |
|
569 | ||
|
570 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
571 | :type apiuser: AuthUser | |
|
572 | :param key: This is the license key to be set. | |
|
573 | :type key: str | |
|
574 | ||
|
575 | Example output: | |
|
576 | ||
|
577 | .. code-block:: bash | |
|
578 | ||
|
579 | id : <id_given_in_input> | |
|
580 | result: { | |
|
581 | "msg" : "updated license information", | |
|
582 | "key": <key> | |
|
583 | } | |
|
584 | error: null | |
|
585 | ||
|
586 | Example error output: | |
|
587 | ||
|
588 | .. code-block:: bash | |
|
589 | ||
|
590 | id : <id_given_in_input> | |
|
591 | result : null | |
|
592 | error : { | |
|
593 | "license key is not valid" | |
|
594 | or | |
|
595 | "trial licenses cannot be uploaded" | |
|
596 | or | |
|
597 | "error occurred while updating license" | |
|
598 | } | |
|
599 | ||
|
600 | ||
|
601 | get_server_info | |
|
602 | --------------- | |
|
603 | ||
|
604 | .. py:function:: get_server_info(apiuser) | |
|
605 | ||
|
606 | Returns the |RCE| server information. | |
|
607 | ||
|
608 | This includes the running version of |RCE| and all installed | |
|
609 | packages. This command takes the following options: | |
|
610 | ||
|
611 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
612 | :type apiuser: AuthUser | |
|
613 | ||
|
614 | Example output: | |
|
615 | ||
|
616 | .. code-block:: bash | |
|
617 | ||
|
618 | id : <id_given_in_input> | |
|
619 | result : { | |
|
620 | 'modules': [<module name>,...] | |
|
621 | 'py_version': <python version>, | |
|
622 | 'platform': <platform type>, | |
|
623 | 'rhodecode_version': <rhodecode version> | |
|
624 | } | |
|
625 | error : null | |
|
626 | ||
|
627 | ||
|
628 | get_user | |
|
629 | -------- | |
|
630 | ||
|
631 | .. py:function:: get_user(apiuser, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
632 | ||
|
633 | Returns the information associated with a username or userid. | |
|
634 | ||
|
635 | * If the ``userid`` is not set, this command returns the information | |
|
636 | for the ``userid`` calling the method. | |
|
637 | ||
|
638 | .. note:: | |
|
639 | ||
|
640 | Normal users may only run this command against their ``userid``. For | |
|
641 | full privileges you must run this command using an |authtoken| with | |
|
642 | admin rights. | |
|
643 | ||
|
644 | This command takes the following options: | |
|
645 | ||
|
646 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
647 | :type apiuser: AuthUser | |
|
648 | :param userid: Sets the userid for which data will be returned. | |
|
649 | :type userid: Optional(str or int) | |
|
650 | ||
|
651 | Example output: | |
|
652 | ||
|
653 | .. code-block:: bash | |
|
654 | ||
|
655 | { | |
|
656 | "error": null, | |
|
657 | "id": <id>, | |
|
658 | "result": { | |
|
659 | "active": true, | |
|
660 | "admin": false, | |
|
661 | "api_key": "api-key", | |
|
662 | "api_keys": [ list of keys ], | |
|
663 | "email": "user@example.com", | |
|
664 | "emails": [ | |
|
665 | "user@example.com" | |
|
666 | ], | |
|
667 | "extern_name": "rhodecode", | |
|
668 | "extern_type": "rhodecode", | |
|
669 | "firstname": "username", | |
|
670 | "ip_addresses": [], | |
|
671 | "language": null, | |
|
672 | "last_login": "Timestamp", | |
|
673 | "lastname": "surnae", | |
|
674 | "permissions": { | |
|
675 | "global": [ | |
|
676 | "hg.inherit_default_perms.true", | |
|
677 | "usergroup.read", | |
|
678 | "hg.repogroup.create.false", | |
|
679 | "hg.create.none", | |
|
680 | "hg.extern_activate.manual", | |
|
681 | "hg.create.write_on_repogroup.false", | |
|
682 | "hg.usergroup.create.false", | |
|
683 | "group.none", | |
|
684 | "repository.none", | |
|
685 | "hg.register.none", | |
|
686 | "hg.fork.repository" | |
|
687 | ], | |
|
688 | "repositories": { "username/example": "repository.write"}, | |
|
689 | "repositories_groups": { "user-group/repo": "group.none" }, | |
|
690 | "user_groups": { "user_group_name": "usergroup.read" } | |
|
691 | }, | |
|
692 | "user_id": 32, | |
|
693 | "username": "username" | |
|
694 | } | |
|
695 | } | |
|
696 | ||
|
697 | ||
|
698 | get_users | |
|
699 | --------- | |
|
700 | ||
|
701 | .. py:function:: get_users(apiuser) | |
|
702 | ||
|
703 | Lists all users in the |RCE| user database. | |
|
704 | ||
|
705 | This command can only be run using an |authtoken| with admin rights to | |
|
706 | the specified repository. | |
|
707 | ||
|
708 | This command takes the following options: | |
|
709 | ||
|
710 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
711 | :type apiuser: AuthUser | |
|
712 | ||
|
713 | Example output: | |
|
714 | ||
|
715 | .. code-block:: bash | |
|
716 | ||
|
717 | id : <id_given_in_input> | |
|
718 | result: [<user_object>, ...] | |
|
719 | error: null | |
|
720 | ||
|
721 | ||
|
722 | create_user | |
|
723 | ----------- | |
|
724 | ||
|
725 | .. py:function:: create_user(apiuser, username, email, password=<Optional:''>, firstname=<Optional:''>, lastname=<Optional:''>, active=<Optional:True>, admin=<Optional:False>, extern_name=<Optional:'rhodecode'>, extern_type=<Optional:'rhodecode'>, force_password_change=<Optional:False>) | |
|
726 | ||
|
727 | Creates a new user and returns the new user object. | |
|
728 | ||
|
729 | This command can only be run using an |authtoken| with admin rights to | |
|
730 | the specified repository. | |
|
731 | ||
|
732 | This command takes the following options: | |
|
733 | ||
|
734 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
735 | :type apiuser: AuthUser | |
|
736 | :param username: Set the new username. | |
|
737 | :type username: str or int | |
|
738 | :param email: Set the user email address. | |
|
739 | :type email: str | |
|
740 | :param password: Set the new user password. | |
|
741 | :type password: Optional(str) | |
|
742 | :param firstname: Set the new user firstname. | |
|
743 | :type firstname: Optional(str) | |
|
744 | :param lastname: Set the new user surname. | |
|
745 | :type lastname: Optional(str) | |
|
746 | :param active: Set the user as active. | |
|
747 | :type active: Optional(``True`` | ``False``) | |
|
748 | :param admin: Give the new user admin rights. | |
|
749 | :type admin: Optional(``True`` | ``False``) | |
|
750 | :param extern_name: Set the authentication plugin name. | |
|
751 | Using LDAP this is filled with LDAP UID. | |
|
752 | :type extern_name: Optional(str) | |
|
753 | :param extern_type: Set the new user authentication plugin. | |
|
754 | :type extern_type: Optional(str) | |
|
755 | :param force_password_change: Force the new user to change password | |
|
756 | on next login. | |
|
757 | :type force_password_change: Optional(``True`` | ``False``) | |
|
758 | ||
|
759 | Example output: | |
|
760 | ||
|
761 | .. code-block:: bash | |
|
762 | ||
|
763 | id : <id_given_in_input> | |
|
764 | result: { | |
|
765 | "msg" : "created new user `<username>`", | |
|
766 | "user": <user_obj> | |
|
767 | } | |
|
768 | error: null | |
|
769 | ||
|
770 | Example error output: | |
|
771 | ||
|
772 | .. code-block:: bash | |
|
773 | ||
|
774 | id : <id_given_in_input> | |
|
775 | result : null | |
|
776 | error : { | |
|
777 | "user `<username>` already exist" | |
|
778 | or | |
|
779 | "email `<email>` already exist" | |
|
780 | or | |
|
781 | "failed to create user `<username>`" | |
|
782 | } | |
|
783 | ||
|
784 | ||
|
785 | update_user | |
|
786 | ----------- | |
|
787 | ||
|
788 | .. py:function:: update_user(apiuser, userid, username=<Optional:None>, email=<Optional:None>, password=<Optional:None>, firstname=<Optional:None>, lastname=<Optional:None>, active=<Optional:None>, admin=<Optional:None>, extern_type=<Optional:None>, extern_name=<Optional:None>) | |
|
789 | ||
|
790 | Updates the details for the specified user, if that user exists. | |
|
791 | ||
|
792 | This command can only be run using an |authtoken| with admin rights to | |
|
793 | the specified repository. | |
|
794 | ||
|
795 | This command takes the following options: | |
|
796 | ||
|
797 | :param apiuser: This is filled automatically from |authtoken|. | |
|
798 | :type apiuser: AuthUser | |
|
799 | :param userid: Set the ``userid`` to update. | |
|
800 | :type userid: str or int | |
|
801 | :param username: Set the new username. | |
|
802 | :type username: str or int | |
|
803 | :param email: Set the new email. | |
|
804 | :type email: str | |
|
805 | :param password: Set the new password. | |
|
806 | :type password: Optional(str) | |
|
807 | :param firstname: Set the new first name. | |
|
808 | :type firstname: Optional(str) | |
|
809 | :param lastname: Set the new surname. | |
|
810 | :type lastname: Optional(str) | |
|
811 | :param active: Set the new user as active. | |
|
812 | :type active: Optional(``True`` | ``False``) | |
|
813 | :param admin: Give the user admin rights. | |
|
814 | :type admin: Optional(``True`` | ``False``) | |
|
815 | :param extern_name: Set the authentication plugin user name. | |
|
816 | Using LDAP this is filled with LDAP UID. | |
|
817 | :type extern_name: Optional(str) | |
|
818 | :param extern_type: Set the authentication plugin type. | |
|
819 | :type extern_type: Optional(str) | |
|
820 | ||
|
821 | ||
|
822 | Example output: | |
|
823 | ||
|
824 | .. code-block:: bash | |
|
825 | ||
|
826 | id : <id_given_in_input> | |
|
827 | result: { | |
|
828 | "msg" : "updated user ID:<userid> <username>", | |
|
829 | "user": <user_object>, | |
|
830 | } | |
|
831 | error: null | |
|
832 | ||
|
833 | Example error output: | |
|
834 | ||
|
835 | .. code-block:: bash | |
|
836 | ||
|
837 | id : <id_given_in_input> | |
|
838 | result : null | |
|
839 | error : { | |
|
840 | "failed to update user `<username>`" | |
|
841 | } | |
|
842 | ||
|
843 | ||
|
844 | delete_user | |
|
845 | ----------- | |
|
846 | ||
|
847 | .. py:function:: delete_user(apiuser, userid) | |
|
848 | ||
|
849 | Deletes the specified user from the |RCE| user database. | |
|
850 | ||
|
851 | This command can only be run using an |authtoken| with admin rights to | |
|
852 | the specified repository. | |
|
853 | ||
|
854 | .. important:: | |
|
855 | ||
|
856 | Ensure all open pull requests and open code review | |
|
857 | requests to this user are close. | |
|
858 | ||
|
859 | Also ensure all repositories, or repository groups owned by this | |
|
860 | user are reassigned before deletion. | |
|
861 | ||
|
862 | This command takes the following options: | |
|
863 | ||
|
864 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
865 | :type apiuser: AuthUser | |
|
866 | :param userid: Set the user to delete. | |
|
867 | :type userid: str or int | |
|
868 | ||
|
869 | Example output: | |
|
870 | ||
|
871 | .. code-block:: bash | |
|
872 | ||
|
873 | id : <id_given_in_input> | |
|
874 | result: { | |
|
875 | "msg" : "deleted user ID:<userid> <username>", | |
|
876 | "user": null | |
|
877 | } | |
|
878 | error: null | |
|
879 | ||
|
880 | Example error output: | |
|
881 | ||
|
882 | .. code-block:: bash | |
|
883 | ||
|
884 | id : <id_given_in_input> | |
|
885 | result : null | |
|
886 | error : { | |
|
887 | "failed to delete user ID:<userid> <username>" | |
|
888 | } | |
|
889 | ||
|
890 | ||
|
891 | get_user_group | |
|
892 | -------------- | |
|
893 | ||
|
894 | .. py:function:: get_user_group(apiuser, usergroupid) | |
|
895 | ||
|
896 | Returns the data of an existing user group. | |
|
897 | ||
|
898 | This command can only be run using an |authtoken| with admin rights to | |
|
899 | the specified repository. | |
|
900 | ||
|
901 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
902 | :type apiuser: AuthUser | |
|
903 | :param usergroupid: Set the user group from which to return data. | |
|
904 | :type usergroupid: str or int | |
|
905 | ||
|
906 | Example error output: | |
|
907 | ||
|
908 | .. code-block:: bash | |
|
909 | ||
|
910 | { | |
|
911 | "error": null, | |
|
912 | "id": <id>, | |
|
913 | "result": { | |
|
914 | "active": true, | |
|
915 | "group_description": "group description", | |
|
916 | "group_name": "group name", | |
|
917 | "members": [ | |
|
918 | { | |
|
919 | "name": "owner-name", | |
|
920 | "origin": "owner", | |
|
921 | "permission": "usergroup.admin", | |
|
922 | "type": "user" | |
|
923 | }, | |
|
924 | { | |
|
925 | { | |
|
926 | "name": "user name", | |
|
927 | "origin": "permission", | |
|
928 | "permission": "usergroup.admin", | |
|
929 | "type": "user" | |
|
930 | }, | |
|
931 | { | |
|
932 | "name": "user group name", | |
|
933 | "origin": "permission", | |
|
934 | "permission": "usergroup.write", | |
|
935 | "type": "user_group" | |
|
936 | } | |
|
937 | ], | |
|
938 | "owner": "owner name", | |
|
939 | "users": [], | |
|
940 | "users_group_id": 2 | |
|
941 | } | |
|
942 | } | |
|
943 | ||
|
944 | ||
|
945 | get_user_groups | |
|
946 | --------------- | |
|
947 | ||
|
948 | .. py:function:: get_user_groups(apiuser) | |
|
949 | ||
|
950 | Lists all the existing user groups within RhodeCode. | |
|
951 | ||
|
952 | This command can only be run using an |authtoken| with admin rights to | |
|
953 | the specified repository. | |
|
954 | ||
|
955 | This command takes the following options: | |
|
956 | ||
|
957 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
958 | :type apiuser: AuthUser | |
|
959 | ||
|
960 | Example error output: | |
|
961 | ||
|
962 | .. code-block:: bash | |
|
963 | ||
|
964 | id : <id_given_in_input> | |
|
965 | result : [<user_group_obj>,...] | |
|
966 | error : null | |
|
967 | ||
|
968 | ||
|
969 | create_user_group | |
|
970 | ----------------- | |
|
971 | ||
|
972 | .. py:function:: create_user_group(apiuser, group_name, description=<Optional:''>, owner=<Optional:<OptionalAttr:apiuser>>, active=<Optional:True>) | |
|
973 | ||
|
974 | Creates a new user group. | |
|
975 | ||
|
976 | This command can only be run using an |authtoken| with admin rights to | |
|
977 | the specified repository. | |
|
978 | ||
|
979 | This command takes the following options: | |
|
980 | ||
|
981 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
982 | :type apiuser: AuthUser | |
|
983 | :param group_name: Set the name of the new user group. | |
|
984 | :type group_name: str | |
|
985 | :param description: Give a description of the new user group. | |
|
986 | :type description: str | |
|
987 | :param owner: Set the owner of the new user group. | |
|
988 | If not set, the owner is the |authtoken| user. | |
|
989 | :type owner: Optional(str or int) | |
|
990 | :param active: Set this group as active. | |
|
991 | :type active: Optional(``True`` | ``False``) | |
|
992 | ||
|
993 | Example output: | |
|
994 | ||
|
995 | .. code-block:: bash | |
|
996 | ||
|
997 | id : <id_given_in_input> | |
|
998 | result: { | |
|
999 | "msg": "created new user group `<groupname>`", | |
|
1000 | "user_group": <user_group_object> | |
|
1001 | } | |
|
1002 | error: null | |
|
1003 | ||
|
1004 | Example error output: | |
|
1005 | ||
|
1006 | .. code-block:: bash | |
|
1007 | ||
|
1008 | id : <id_given_in_input> | |
|
1009 | result : null | |
|
1010 | error : { | |
|
1011 | "user group `<group name>` already exist" | |
|
1012 | or | |
|
1013 | "failed to create group `<group name>`" | |
|
1014 | } | |
|
1015 | ||
|
1016 | ||
|
1017 | update_user_group | |
|
1018 | ----------------- | |
|
1019 | ||
|
1020 | .. py:function:: update_user_group(apiuser, usergroupid, group_name=<Optional:''>, description=<Optional:''>, owner=<Optional:None>, active=<Optional:True>) | |
|
1021 | ||
|
1022 | Updates the specified `user group` with the details provided. | |
|
1023 | ||
|
1024 | This command can only be run using an |authtoken| with admin rights to | |
|
1025 | the specified repository. | |
|
1026 | ||
|
1027 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1028 | :type apiuser: AuthUser | |
|
1029 | :param usergroupid: Set the id of the `user group` to update. | |
|
1030 | :type usergroupid: str or int | |
|
1031 | :param group_name: Set the new name the `user group` | |
|
1032 | :type group_name: str | |
|
1033 | :param description: Give a description for the `user group` | |
|
1034 | :type description: str | |
|
1035 | :param owner: Set the owner of the `user group`. | |
|
1036 | :type owner: Optional(str or int) | |
|
1037 | :param active: Set the group as active. | |
|
1038 | :type active: Optional(``True`` | ``False``) | |
|
1039 | ||
|
1040 | Example output: | |
|
1041 | ||
|
1042 | .. code-block:: bash | |
|
1043 | ||
|
1044 | id : <id_given_in_input> | |
|
1045 | result : { | |
|
1046 | "msg": 'updated user group ID:<user group id> <user group name>', | |
|
1047 | "user_group": <user_group_object> | |
|
1048 | } | |
|
1049 | error : null | |
|
1050 | ||
|
1051 | Example error output: | |
|
1052 | ||
|
1053 | .. code-block:: bash | |
|
1054 | ||
|
1055 | id : <id_given_in_input> | |
|
1056 | result : null | |
|
1057 | error : { | |
|
1058 | "failed to update user group `<user group name>`" | |
|
1059 | } | |
|
1060 | ||
|
1061 | ||
|
1062 | delete_user_group | |
|
1063 | ----------------- | |
|
1064 | ||
|
1065 | .. py:function:: delete_user_group(apiuser, usergroupid) | |
|
1066 | ||
|
1067 | Deletes the specified `user group`. | |
|
1068 | ||
|
1069 | This command can only be run using an |authtoken| with admin rights to | |
|
1070 | the specified repository. | |
|
1071 | ||
|
1072 | This command takes the following options: | |
|
1073 | ||
|
1074 | :param apiuser: filled automatically from apikey | |
|
1075 | :type apiuser: AuthUser | |
|
1076 | :param usergroupid: | |
|
1077 | :type usergroupid: int | |
|
1078 | ||
|
1079 | Example output: | |
|
1080 | ||
|
1081 | .. code-block:: bash | |
|
1082 | ||
|
1083 | id : <id_given_in_input> | |
|
1084 | result : { | |
|
1085 | "msg": "deleted user group ID:<user_group_id> <user_group_name>" | |
|
1086 | } | |
|
1087 | error : null | |
|
1088 | ||
|
1089 | Example error output: | |
|
1090 | ||
|
1091 | .. code-block:: bash | |
|
1092 | ||
|
1093 | id : <id_given_in_input> | |
|
1094 | result : null | |
|
1095 | error : { | |
|
1096 | "failed to delete user group ID:<user_group_id> <user_group_name>" | |
|
1097 | or | |
|
1098 | "RepoGroup assigned to <repo_groups_list>" | |
|
1099 | } | |
|
1100 | ||
|
1101 | ||
|
1102 | add_user_to_user_group | |
|
1103 | ---------------------- | |
|
1104 | ||
|
1105 | .. py:function:: add_user_to_user_group(apiuser, usergroupid, userid) | |
|
1106 | ||
|
1107 | Adds a user to a `user group`. If the user already exists in the group | |
|
1108 | this command will return false. | |
|
1109 | ||
|
1110 | This command can only be run using an |authtoken| with admin rights to | |
|
1111 | the specified user group. | |
|
1112 | ||
|
1113 | This command takes the following options: | |
|
1114 | ||
|
1115 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1116 | :type apiuser: AuthUser | |
|
1117 | :param usergroupid: Set the name of the `user group` to which a | |
|
1118 | user will be added. | |
|
1119 | :type usergroupid: int | |
|
1120 | :param userid: Set the `user_id` of the user to add to the group. | |
|
1121 | :type userid: int | |
|
1122 | ||
|
1123 | Example output: | |
|
1124 | ||
|
1125 | .. code-block:: bash | |
|
1126 | ||
|
1127 | id : <id_given_in_input> | |
|
1128 | result : { | |
|
1129 | "success": True|False # depends on if member is in group | |
|
1130 | "msg": "added member `<username>` to user group `<groupname>` | | |
|
1131 | User is already in that group" | |
|
1132 | ||
|
1133 | } | |
|
1134 | error : null | |
|
1135 | ||
|
1136 | Example error output: | |
|
1137 | ||
|
1138 | .. code-block:: bash | |
|
1139 | ||
|
1140 | id : <id_given_in_input> | |
|
1141 | result : null | |
|
1142 | error : { | |
|
1143 | "failed to add member to user group `<user_group_name>`" | |
|
1144 | } | |
|
1145 | ||
|
1146 | ||
|
1147 | remove_user_from_user_group | |
|
1148 | --------------------------- | |
|
1149 | ||
|
1150 | .. py:function:: remove_user_from_user_group(apiuser, usergroupid, userid) | |
|
1151 | ||
|
1152 | Removes a user from a user group. | |
|
1153 | ||
|
1154 | * If the specified user is not in the group, this command will return | |
|
1155 | `false`. | |
|
1156 | ||
|
1157 | This command can only be run using an |authtoken| with admin rights to | |
|
1158 | the specified user group. | |
|
1159 | ||
|
1160 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1161 | :type apiuser: AuthUser | |
|
1162 | :param usergroupid: Sets the user group name. | |
|
1163 | :type usergroupid: str or int | |
|
1164 | :param userid: The user you wish to remove from |RCE|. | |
|
1165 | :type userid: str or int | |
|
1166 | ||
|
1167 | Example output: | |
|
1168 | ||
|
1169 | .. code-block:: bash | |
|
1170 | ||
|
1171 | id : <id_given_in_input> | |
|
1172 | result: { | |
|
1173 | "success": True|False, # depends on if member is in group | |
|
1174 | "msg": "removed member <username> from user group <groupname> | | |
|
1175 | User wasn't in group" | |
|
1176 | } | |
|
1177 | error: null | |
|
1178 | ||
|
1179 | ||
|
1180 | grant_user_permission_to_user_group | |
|
1181 | ----------------------------------- | |
|
1182 | ||
|
1183 | .. py:function:: grant_user_permission_to_user_group(apiuser, usergroupid, userid, perm) | |
|
1184 | ||
|
1185 | Set permissions for a user in a user group. | |
|
1186 | ||
|
1187 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1188 | :type apiuser: AuthUser | |
|
1189 | :param usergroupid: Set the user group to edit permissions on. | |
|
1190 | :type usergroupid: str or int | |
|
1191 | :param userid: Set the user from whom you wish to set permissions. | |
|
1192 | :type userid: str | |
|
1193 | :param perm: (usergroup.(none|read|write|admin)) | |
|
1194 | :type perm: str | |
|
1195 | ||
|
1196 | Example output: | |
|
1197 | ||
|
1198 | .. code-block:: bash | |
|
1199 | ||
|
1200 | id : <id_given_in_input> | |
|
1201 | result : { | |
|
1202 | "msg": "Granted perm: `<perm_name>` for user: `<username>` in user group: `<user_group_name>`", | |
|
1203 | "success": true | |
|
1204 | } | |
|
1205 | error : null | |
|
1206 | ||
|
1207 | ||
|
1208 | revoke_user_permission_from_user_group | |
|
1209 | -------------------------------------- | |
|
1210 | ||
|
1211 | .. py:function:: revoke_user_permission_from_user_group(apiuser, usergroupid, userid) | |
|
1212 | ||
|
1213 | Revoke a users permissions in a user group. | |
|
1214 | ||
|
1215 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1216 | :type apiuser: AuthUser | |
|
1217 | :param usergroupid: Set the user group from which to revoke the user | |
|
1218 | permissions. | |
|
1219 | :type: usergroupid: str or int | |
|
1220 | :param userid: Set the userid of the user whose permissions will be | |
|
1221 | revoked. | |
|
1222 | :type userid: str | |
|
1223 | ||
|
1224 | Example output: | |
|
1225 | ||
|
1226 | .. code-block:: bash | |
|
1227 | ||
|
1228 | id : <id_given_in_input> | |
|
1229 | result : { | |
|
1230 | "msg": "Revoked perm for user: `<username>` in user group: `<user_group_name>`", | |
|
1231 | "success": true | |
|
1232 | } | |
|
1233 | error : null | |
|
1234 | ||
|
1235 | ||
|
1236 | grant_user_group_permission_to_user_group | |
|
1237 | ----------------------------------------- | |
|
1238 | ||
|
1239 | .. py:function:: grant_user_group_permission_to_user_group(apiuser, usergroupid, sourceusergroupid, perm) | |
|
1240 | ||
|
1241 | Give one user group permissions to another user group. | |
|
1242 | ||
|
1243 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1244 | :type apiuser: AuthUser | |
|
1245 | :param usergroupid: Set the user group on which to edit permissions. | |
|
1246 | :type usergroupid: str or int | |
|
1247 | :param sourceusergroupid: Set the source user group to which | |
|
1248 | access/permissions will be granted. | |
|
1249 | :type sourceusergroupid: str or int | |
|
1250 | :param perm: (usergroup.(none|read|write|admin)) | |
|
1251 | :type perm: str | |
|
1252 | ||
|
1253 | Example output: | |
|
1254 | ||
|
1255 | .. code-block:: bash | |
|
1256 | ||
|
1257 | id : <id_given_in_input> | |
|
1258 | result : { | |
|
1259 | "msg": "Granted perm: `<perm_name>` for user group: `<source_user_group_name>` in user group: `<user_group_name>`", | |
|
1260 | "success": true | |
|
1261 | } | |
|
1262 | error : null | |
|
1263 | ||
|
1264 | ||
|
1265 | revoke_user_group_permission_from_user_group | |
|
1266 | -------------------------------------------- | |
|
1267 | ||
|
1268 | .. py:function:: revoke_user_group_permission_from_user_group(apiuser, usergroupid, sourceusergroupid) | |
|
1269 | ||
|
1270 | Revoke the permissions that one user group has to another. | |
|
1271 | ||
|
1272 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1273 | :type apiuser: AuthUser | |
|
1274 | :param usergroupid: Set the user group on which to edit permissions. | |
|
1275 | :type usergroupid: str or int | |
|
1276 | :param sourceusergroupid: Set the user group from which permissions | |
|
1277 | are revoked. | |
|
1278 | :type sourceusergroupid: str or int | |
|
1279 | ||
|
1280 | Example output: | |
|
1281 | ||
|
1282 | .. code-block:: bash | |
|
1283 | ||
|
1284 | id : <id_given_in_input> | |
|
1285 | result : { | |
|
1286 | "msg": "Revoked perm for user group: `<user_group_name>` in user group: `<target_user_group_name>`", | |
|
1287 | "success": true | |
|
1288 | } | |
|
1289 | error : null | |
|
1290 | ||
|
1291 | ||
|
1292 | get_pull_request | |
|
1293 | ---------------- | |
|
1294 | ||
|
1295 | .. py:function:: get_pull_request(apiuser, repoid, pullrequestid) | |
|
1296 | ||
|
1297 | Get a pull request based on the given ID. | |
|
1298 | ||
|
1299 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1300 | :type apiuser: AuthUser | |
|
1301 | :param repoid: Repository name or repository ID from where the pull | |
|
1302 | request was opened. | |
|
1303 | :type repoid: str or int | |
|
1304 | :param pullrequestid: ID of the requested pull request. | |
|
1305 | :type pullrequestid: int | |
|
1306 | ||
|
1307 | Example output: | |
|
1308 | ||
|
1309 | .. code-block:: bash | |
|
1310 | ||
|
1311 | "id": <id_given_in_input>, | |
|
1312 | "result": | |
|
1313 | { | |
|
1314 | "pull_request_id": "<pull_request_id>", | |
|
1315 | "url": "<url>", | |
|
1316 | "title": "<title>", | |
|
1317 | "description": "<description>", | |
|
1318 | "status" : "<status>", | |
|
1319 | "created_on": "<date_time_created>", | |
|
1320 | "updated_on": "<date_time_updated>", | |
|
1321 | "commit_ids": [ | |
|
1322 | ... | |
|
1323 | "<commit_id>", | |
|
1324 | "<commit_id>", | |
|
1325 | ... | |
|
1326 | ], | |
|
1327 | "review_status": "<review_status>", | |
|
1328 | "mergeable": { | |
|
1329 | "status": "<bool>", | |
|
1330 | "message": "<message>", | |
|
1331 | }, | |
|
1332 | "source": { | |
|
1333 | "clone_url": "<clone_url>", | |
|
1334 | "repository": "<repository_name>", | |
|
1335 | "reference": | |
|
1336 | { | |
|
1337 | "name": "<name>", | |
|
1338 | "type": "<type>", | |
|
1339 | "commit_id": "<commit_id>", | |
|
1340 | } | |
|
1341 | }, | |
|
1342 | "target": { | |
|
1343 | "clone_url": "<clone_url>", | |
|
1344 | "repository": "<repository_name>", | |
|
1345 | "reference": | |
|
1346 | { | |
|
1347 | "name": "<name>", | |
|
1348 | "type": "<type>", | |
|
1349 | "commit_id": "<commit_id>", | |
|
1350 | } | |
|
1351 | }, | |
|
1352 | "author": <user_obj>, | |
|
1353 | "reviewers": [ | |
|
1354 | ... | |
|
1355 | { | |
|
1356 | "user": "<user_obj>", | |
|
1357 | "review_status": "<review_status>", | |
|
1358 | } | |
|
1359 | ... | |
|
1360 | ] | |
|
1361 | }, | |
|
1362 | "error": null | |
|
1363 | ||
|
1364 | ||
|
1365 | get_pull_requests | |
|
1366 | ----------------- | |
|
1367 | ||
|
1368 | .. py:function:: get_pull_requests(apiuser, repoid, status=<Optional:'new'>) | |
|
1369 | ||
|
1370 | Get all pull requests from the repository specified in `repoid`. | |
|
1371 | ||
|
1372 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1373 | :type apiuser: AuthUser | |
|
1374 | :param repoid: Repository name or repository ID. | |
|
1375 | :type repoid: str or int | |
|
1376 | :param status: Only return pull requests with the specified status. | |
|
1377 | Valid options are. | |
|
1378 | * ``new`` (default) | |
|
1379 | * ``open`` | |
|
1380 | * ``closed`` | |
|
1381 | :type status: str | |
|
1382 | ||
|
1383 | Example output: | |
|
1384 | ||
|
1385 | .. code-block:: bash | |
|
1386 | ||
|
1387 | "id": <id_given_in_input>, | |
|
1388 | "result": | |
|
1389 | [ | |
|
1390 | ... | |
|
1391 | { | |
|
1392 | "pull_request_id": "<pull_request_id>", | |
|
1393 | "url": "<url>", | |
|
1394 | "title" : "<title>", | |
|
1395 | "description": "<description>", | |
|
1396 | "status": "<status>", | |
|
1397 | "created_on": "<date_time_created>", | |
|
1398 | "updated_on": "<date_time_updated>", | |
|
1399 | "commit_ids": [ | |
|
1400 | ... | |
|
1401 | "<commit_id>", | |
|
1402 | "<commit_id>", | |
|
1403 | ... | |
|
1404 | ], | |
|
1405 | "review_status": "<review_status>", | |
|
1406 | "mergeable": { | |
|
1407 | "status": "<bool>", | |
|
1408 | "message: "<message>", | |
|
1409 | }, | |
|
1410 | "source": { | |
|
1411 | "clone_url": "<clone_url>", | |
|
1412 | "reference": | |
|
1413 | { | |
|
1414 | "name": "<name>", | |
|
1415 | "type": "<type>", | |
|
1416 | "commit_id": "<commit_id>", | |
|
1417 | } | |
|
1418 | }, | |
|
1419 | "target": { | |
|
1420 | "clone_url": "<clone_url>", | |
|
1421 | "reference": | |
|
1422 | { | |
|
1423 | "name": "<name>", | |
|
1424 | "type": "<type>", | |
|
1425 | "commit_id": "<commit_id>", | |
|
1426 | } | |
|
1427 | }, | |
|
1428 | "author": <user_obj>, | |
|
1429 | "reviewers": [ | |
|
1430 | ... | |
|
1431 | { | |
|
1432 | "user": "<user_obj>", | |
|
1433 | "review_status": "<review_status>", | |
|
1434 | } | |
|
1435 | ... | |
|
1436 | ] | |
|
1437 | } | |
|
1438 | ... | |
|
1439 | ], | |
|
1440 | "error": null | |
|
1441 | ||
|
1442 | ||
|
1443 | merge_pull_request | |
|
1444 | ------------------ | |
|
1445 | ||
|
1446 | .. py:function:: merge_pull_request(apiuser, repoid, pullrequestid, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
1447 | ||
|
1448 | Merge the pull request specified by `pullrequestid` into its target | |
|
1449 | repository. | |
|
1450 | ||
|
1451 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1452 | :type apiuser: AuthUser | |
|
1453 | :param repoid: The Repository name or repository ID of the | |
|
1454 | target repository to which the |pr| is to be merged. | |
|
1455 | :type repoid: str or int | |
|
1456 | :param pullrequestid: ID of the pull request which shall be merged. | |
|
1457 | :type pullrequestid: int | |
|
1458 | :param userid: Merge the pull request as this user. | |
|
1459 | :type userid: Optional(str or int) | |
|
1460 | ||
|
1461 | Example output: | |
|
1462 | ||
|
1463 | .. code-block:: bash | |
|
1464 | ||
|
1465 | "id": <id_given_in_input>, | |
|
1466 | "result": | |
|
1467 | { | |
|
1468 | "executed": "<bool>", | |
|
1469 | "failure_reason": "<int>", | |
|
1470 | "merge_commit_id": "<merge_commit_id>", | |
|
1471 | "possible": "<bool>" | |
|
1472 | }, | |
|
1473 | "error": null | |
|
1474 | ||
|
1475 | ||
|
1476 | close_pull_request | |
|
1477 | ------------------ | |
|
1478 | ||
|
1479 | .. py:function:: close_pull_request(apiuser, repoid, pullrequestid, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
1480 | ||
|
1481 | Close the pull request specified by `pullrequestid`. | |
|
1482 | ||
|
1483 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1484 | :type apiuser: AuthUser | |
|
1485 | :param repoid: Repository name or repository ID to which the pull | |
|
1486 | request belongs. | |
|
1487 | :type repoid: str or int | |
|
1488 | :param pullrequestid: ID of the pull request to be closed. | |
|
1489 | :type pullrequestid: int | |
|
1490 | :param userid: Close the pull request as this user. | |
|
1491 | :type userid: Optional(str or int) | |
|
1492 | ||
|
1493 | Example output: | |
|
1494 | ||
|
1495 | .. code-block:: bash | |
|
1496 | ||
|
1497 | "id": <id_given_in_input>, | |
|
1498 | "result": | |
|
1499 | { | |
|
1500 | "pull_request_id": "<int>", | |
|
1501 | "closed": "<bool>" | |
|
1502 | }, | |
|
1503 | "error": null | |
|
1504 | ||
|
1505 | ||
|
1506 | comment_pull_request | |
|
1507 | -------------------- | |
|
1508 | ||
|
1509 | .. py:function:: comment_pull_request(apiuser, repoid, pullrequestid, message=<Optional:None>, status=<Optional:None>, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
197 | .. toctree:: | |
|
1510 | 198 | |
|
1511 | Comment on the pull request specified with the `pullrequestid`, | |
|
1512 | in the |repo| specified by the `repoid`, and optionally change the | |
|
1513 | review status. | |
|
1514 | ||
|
1515 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1516 | :type apiuser: AuthUser | |
|
1517 | :param repoid: The repository name or repository ID. | |
|
1518 | :type repoid: str or int | |
|
1519 | :param pullrequestid: The pull request ID. | |
|
1520 | :type pullrequestid: int | |
|
1521 | :param message: The text content of the comment. | |
|
1522 | :type message: str | |
|
1523 | :param status: (**Optional**) Set the approval status of the pull | |
|
1524 | request. Valid options are: | |
|
1525 | * not_reviewed | |
|
1526 | * approved | |
|
1527 | * rejected | |
|
1528 | * under_review | |
|
1529 | :type status: str | |
|
1530 | :param userid: Comment on the pull request as this user | |
|
1531 | :type userid: Optional(str or int) | |
|
1532 | ||
|
1533 | Example output: | |
|
1534 | ||
|
1535 | .. code-block:: bash | |
|
1536 | ||
|
1537 | id : <id_given_in_input> | |
|
1538 | result : | |
|
1539 | { | |
|
1540 | "pull_request_id": "<Integer>", | |
|
1541 | "comment_id": "<Integer>" | |
|
1542 | } | |
|
1543 | error : null | |
|
1544 | ||
|
1545 | ||
|
1546 | create_pull_request | |
|
1547 | ------------------- | |
|
1548 | ||
|
1549 | .. py:function:: create_pull_request(apiuser, source_repo, target_repo, source_ref, target_ref, title, description=<Optional:''>, reviewers=<Optional:None>) | |
|
1550 | ||
|
1551 | Creates a new pull request. | |
|
1552 | ||
|
1553 | Accepts refs in the following formats: | |
|
1554 | ||
|
1555 | * branch:<branch_name>:<sha> | |
|
1556 | * branch:<branch_name> | |
|
1557 | * bookmark:<bookmark_name>:<sha> (Mercurial only) | |
|
1558 | * bookmark:<bookmark_name> (Mercurial only) | |
|
1559 | ||
|
1560 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1561 | :type apiuser: AuthUser | |
|
1562 | :param source_repo: Set the source repository name. | |
|
1563 | :type source_repo: str | |
|
1564 | :param target_repo: Set the target repository name. | |
|
1565 | :type target_repo: str | |
|
1566 | :param source_ref: Set the source ref name. | |
|
1567 | :type source_ref: str | |
|
1568 | :param target_ref: Set the target ref name. | |
|
1569 | :type target_ref: str | |
|
1570 | :param title: Set the pull request title. | |
|
1571 | :type title: str | |
|
1572 | :param description: Set the pull request description. | |
|
1573 | :type description: Optional(str) | |
|
1574 | :param reviewers: Set the new pull request reviewers list. | |
|
1575 | :type reviewers: Optional(list) | |
|
1576 | ||
|
1577 | ||
|
1578 | update_pull_request | |
|
1579 | ------------------- | |
|
1580 | ||
|
1581 | .. py:function:: update_pull_request(apiuser, repoid, pullrequestid, title=<Optional:''>, description=<Optional:''>, reviewers=<Optional:None>, update_commits=<Optional:None>, close_pull_request=<Optional:None>) | |
|
1582 | ||
|
1583 | Updates a pull request. | |
|
1584 | ||
|
1585 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1586 | :type apiuser: AuthUser | |
|
1587 | :param repoid: The repository name or repository ID. | |
|
1588 | :type repoid: str or int | |
|
1589 | :param pullrequestid: The pull request ID. | |
|
1590 | :type pullrequestid: int | |
|
1591 | :param title: Set the pull request title. | |
|
1592 | :type title: str | |
|
1593 | :param description: Update pull request description. | |
|
1594 | :type description: Optional(str) | |
|
1595 | :param reviewers: Update pull request reviewers list with new value. | |
|
1596 | :type reviewers: Optional(list) | |
|
1597 | :param update_commits: Trigger update of commits for this pull request | |
|
1598 | :type: update_commits: Optional(bool) | |
|
1599 | :param close_pull_request: Close this pull request with rejected state | |
|
1600 | :type: close_pull_request: Optional(bool) | |
|
1601 | ||
|
1602 | Example output: | |
|
1603 | ||
|
1604 | .. code-block:: bash | |
|
1605 | ||
|
1606 | id : <id_given_in_input> | |
|
1607 | result : | |
|
1608 | { | |
|
1609 | "msg": "Updated pull request `63`", | |
|
1610 | "pull_request": <pull_request_object>, | |
|
1611 | "updated_reviewers": { | |
|
1612 | "added": [ | |
|
1613 | "username" | |
|
1614 | ], | |
|
1615 | "removed": [] | |
|
1616 | }, | |
|
1617 | "updated_commits": { | |
|
1618 | "added": [ | |
|
1619 | "<sha1_hash>" | |
|
1620 | ], | |
|
1621 | "common": [ | |
|
1622 | "<sha1_hash>", | |
|
1623 | "<sha1_hash>", | |
|
1624 | ], | |
|
1625 | "removed": [] | |
|
1626 | } | |
|
1627 | } | |
|
1628 | error : null | |
|
1629 | ||
|
1630 | ||
|
1631 | get_repo | |
|
1632 | -------- | |
|
1633 | ||
|
1634 | .. py:function:: get_repo(apiuser, repoid, cache=<Optional:True>) | |
|
1635 | ||
|
1636 | Gets an existing repository by its name or repository_id. | |
|
1637 | ||
|
1638 | The members section so the output returns users groups or users | |
|
1639 | associated with that repository. | |
|
1640 | ||
|
1641 | This command can only be run using an |authtoken| with admin rights, | |
|
1642 | or users with at least read rights to the |repo|. | |
|
1643 | ||
|
1644 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1645 | :type apiuser: AuthUser | |
|
1646 | :param repoid: The repository name or repository id. | |
|
1647 | :type repoid: str or int | |
|
1648 | :param cache: use the cached value for last changeset | |
|
1649 | :type: cache: Optional(bool) | |
|
1650 | ||
|
1651 | Example output: | |
|
1652 | ||
|
1653 | .. code-block:: bash | |
|
1654 | ||
|
1655 | { | |
|
1656 | "error": null, | |
|
1657 | "id": <repo_id>, | |
|
1658 | "result": { | |
|
1659 | "clone_uri": null, | |
|
1660 | "created_on": "timestamp", | |
|
1661 | "description": "repo description", | |
|
1662 | "enable_downloads": false, | |
|
1663 | "enable_locking": false, | |
|
1664 | "enable_statistics": false, | |
|
1665 | "followers": [ | |
|
1666 | { | |
|
1667 | "active": true, | |
|
1668 | "admin": false, | |
|
1669 | "api_key": "****************************************", | |
|
1670 | "api_keys": [ | |
|
1671 | "****************************************" | |
|
1672 | ], | |
|
1673 | "email": "user@example.com", | |
|
1674 | "emails": [ | |
|
1675 | "user@example.com" | |
|
1676 | ], | |
|
1677 | "extern_name": "rhodecode", | |
|
1678 | "extern_type": "rhodecode", | |
|
1679 | "firstname": "username", | |
|
1680 | "ip_addresses": [], | |
|
1681 | "language": null, | |
|
1682 | "last_login": "2015-09-16T17:16:35.854", | |
|
1683 | "lastname": "surname", | |
|
1684 | "user_id": <user_id>, | |
|
1685 | "username": "name" | |
|
1686 | } | |
|
1687 | ], | |
|
1688 | "fork_of": "parent-repo", | |
|
1689 | "landing_rev": [ | |
|
1690 | "rev", | |
|
1691 | "tip" | |
|
1692 | ], | |
|
1693 | "last_changeset": { | |
|
1694 | "author": "User <user@example.com>", | |
|
1695 | "branch": "default", | |
|
1696 | "date": "timestamp", | |
|
1697 | "message": "last commit message", | |
|
1698 | "parents": [ | |
|
1699 | { | |
|
1700 | "raw_id": "commit-id" | |
|
1701 | } | |
|
1702 | ], | |
|
1703 | "raw_id": "commit-id", | |
|
1704 | "revision": <revision number>, | |
|
1705 | "short_id": "short id" | |
|
1706 | }, | |
|
1707 | "lock_reason": null, | |
|
1708 | "locked_by": null, | |
|
1709 | "locked_date": null, | |
|
1710 | "members": [ | |
|
1711 | { | |
|
1712 | "name": "super-admin-name", | |
|
1713 | "origin": "super-admin", | |
|
1714 | "permission": "repository.admin", | |
|
1715 | "type": "user" | |
|
1716 | }, | |
|
1717 | { | |
|
1718 | "name": "owner-name", | |
|
1719 | "origin": "owner", | |
|
1720 | "permission": "repository.admin", | |
|
1721 | "type": "user" | |
|
1722 | }, | |
|
1723 | { | |
|
1724 | "name": "user-group-name", | |
|
1725 | "origin": "permission", | |
|
1726 | "permission": "repository.write", | |
|
1727 | "type": "user_group" | |
|
1728 | } | |
|
1729 | ], | |
|
1730 | "owner": "owner-name", | |
|
1731 | "permissions": [ | |
|
1732 | { | |
|
1733 | "name": "super-admin-name", | |
|
1734 | "origin": "super-admin", | |
|
1735 | "permission": "repository.admin", | |
|
1736 | "type": "user" | |
|
1737 | }, | |
|
1738 | { | |
|
1739 | "name": "owner-name", | |
|
1740 | "origin": "owner", | |
|
1741 | "permission": "repository.admin", | |
|
1742 | "type": "user" | |
|
1743 | }, | |
|
1744 | { | |
|
1745 | "name": "user-group-name", | |
|
1746 | "origin": "permission", | |
|
1747 | "permission": "repository.write", | |
|
1748 | "type": "user_group" | |
|
1749 | } | |
|
1750 | ], | |
|
1751 | "private": true, | |
|
1752 | "repo_id": 676, | |
|
1753 | "repo_name": "user-group/repo-name", | |
|
1754 | "repo_type": "hg" | |
|
1755 | } | |
|
1756 | } | |
|
1757 | ||
|
1758 | ||
|
1759 | get_repos | |
|
1760 | --------- | |
|
1761 | ||
|
1762 | .. py:function:: get_repos(apiuser) | |
|
1763 | ||
|
1764 | Lists all existing repositories. | |
|
1765 | ||
|
1766 | This command can only be run using an |authtoken| with admin rights, | |
|
1767 | or users with at least read rights to |repos|. | |
|
1768 | ||
|
1769 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1770 | :type apiuser: AuthUser | |
|
1771 | ||
|
1772 | Example output: | |
|
1773 | ||
|
1774 | .. code-block:: bash | |
|
1775 | ||
|
1776 | id : <id_given_in_input> | |
|
1777 | result: [ | |
|
1778 | { | |
|
1779 | "repo_id" : "<repo_id>", | |
|
1780 | "repo_name" : "<reponame>" | |
|
1781 | "repo_type" : "<repo_type>", | |
|
1782 | "clone_uri" : "<clone_uri>", | |
|
1783 | "private": : "<bool>", | |
|
1784 | "created_on" : "<datetimecreated>", | |
|
1785 | "description" : "<description>", | |
|
1786 | "landing_rev": "<landing_rev>", | |
|
1787 | "owner": "<repo_owner>", | |
|
1788 | "fork_of": "<name_of_fork_parent>", | |
|
1789 | "enable_downloads": "<bool>", | |
|
1790 | "enable_locking": "<bool>", | |
|
1791 | "enable_statistics": "<bool>", | |
|
1792 | }, | |
|
1793 | ... | |
|
1794 | ] | |
|
1795 | error: null | |
|
1796 | ||
|
1797 | ||
|
1798 | get_repo_changeset | |
|
1799 | ------------------ | |
|
1800 | ||
|
1801 | .. py:function:: get_repo_changeset(apiuser, repoid, revision, details=<Optional:'basic'>) | |
|
1802 | ||
|
1803 | Returns information about a changeset. | |
|
1804 | ||
|
1805 | Additionally parameters define the amount of details returned by | |
|
1806 | this function. | |
|
1807 | ||
|
1808 | This command can only be run using an |authtoken| with admin rights, | |
|
1809 | or users with at least read rights to the |repo|. | |
|
1810 | ||
|
1811 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1812 | :type apiuser: AuthUser | |
|
1813 | :param repoid: The repository name or repository id | |
|
1814 | :type repoid: str or int | |
|
1815 | :param revision: revision for which listing should be done | |
|
1816 | :type revision: str | |
|
1817 | :param details: details can be 'basic|extended|full' full gives diff | |
|
1818 | info details like the diff itself, and number of changed files etc. | |
|
1819 | :type details: Optional(str) | |
|
1820 | ||
|
1821 | ||
|
1822 | get_repo_changesets | |
|
1823 | ------------------- | |
|
1824 | ||
|
1825 | .. py:function:: get_repo_changesets(apiuser, repoid, start_rev, limit, details=<Optional:'basic'>) | |
|
1826 | ||
|
1827 | Returns a set of changesets limited by the number of commits starting | |
|
1828 | from the `start_rev` option. | |
|
1829 | ||
|
1830 | Additional parameters define the amount of details returned by this | |
|
1831 | function. | |
|
1832 | ||
|
1833 | This command can only be run using an |authtoken| with admin rights, | |
|
1834 | or users with at least read rights to |repos|. | |
|
1835 | ||
|
1836 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1837 | :type apiuser: AuthUser | |
|
1838 | :param repoid: The repository name or repository ID. | |
|
1839 | :type repoid: str or int | |
|
1840 | :param start_rev: The starting revision from where to get changesets. | |
|
1841 | :type start_rev: str | |
|
1842 | :param limit: Limit the number of changesets to this amount | |
|
1843 | :type limit: str or int | |
|
1844 | :param details: Set the level of detail returned. Valid option are: | |
|
1845 | ``basic``, ``extended`` and ``full``. | |
|
1846 | :type details: Optional(str) | |
|
1847 | ||
|
1848 | .. note:: | |
|
1849 | ||
|
1850 | Setting the parameter `details` to the value ``full`` is extensive | |
|
1851 | and returns details like the diff itself, and the number | |
|
1852 | of changed files. | |
|
1853 | ||
|
1854 | ||
|
1855 | get_repo_nodes | |
|
1856 | -------------- | |
|
1857 | ||
|
1858 | .. py:function:: get_repo_nodes(apiuser, repoid, revision, root_path, ret_type=<Optional:'all'>, details=<Optional:'basic'>) | |
|
1859 | ||
|
1860 | Returns a list of nodes and children in a flat list for a given | |
|
1861 | path at given revision. | |
|
1862 | ||
|
1863 | It's possible to specify ret_type to show only `files` or `dirs`. | |
|
1864 | ||
|
1865 | This command can only be run using an |authtoken| with admin rights, | |
|
1866 | or users with at least read rights to |repos|. | |
|
1867 | ||
|
1868 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1869 | :type apiuser: AuthUser | |
|
1870 | :param repoid: The repository name or repository ID. | |
|
1871 | :type repoid: str or int | |
|
1872 | :param revision: The revision for which listing should be done. | |
|
1873 | :type revision: str | |
|
1874 | :param root_path: The path from which to start displaying. | |
|
1875 | :type root_path: str | |
|
1876 | :param ret_type: Set the return type. Valid options are | |
|
1877 | ``all`` (default), ``files`` and ``dirs``. | |
|
1878 | :type ret_type: Optional(str) | |
|
1879 | :param details: Returns extended information about nodes, such as | |
|
1880 | md5, binary, and or content. The valid options are ``basic`` and | |
|
1881 | ``full``. | |
|
1882 | :type details: Optional(str) | |
|
1883 | :param max_file_bytes: Only return file content under this file size bytes | |
|
1884 | :type details: Optional(int) | |
|
1885 | ||
|
1886 | Example output: | |
|
1887 | ||
|
1888 | .. code-block:: bash | |
|
1889 | ||
|
1890 | id : <id_given_in_input> | |
|
1891 | result: [ | |
|
1892 | { | |
|
1893 | "name" : "<name>" | |
|
1894 | "type" : "<type>", | |
|
1895 | "binary": "<true|false>" (only in extended mode) | |
|
1896 | "md5" : "<md5 of file content>" (only in extended mode) | |
|
1897 | }, | |
|
1898 | ... | |
|
1899 | ] | |
|
1900 | error: null | |
|
1901 | ||
|
1902 | ||
|
1903 | create_repo | |
|
1904 | ----------- | |
|
1905 | ||
|
1906 | .. py:function:: create_repo(apiuser, repo_name, repo_type, owner=<Optional:<OptionalAttr:apiuser>>, description=<Optional:''>, private=<Optional:False>, clone_uri=<Optional:None>, landing_rev=<Optional:'rev:tip'>, enable_statistics=<Optional:False>, enable_locking=<Optional:False>, enable_downloads=<Optional:False>, copy_permissions=<Optional:False>) | |
|
1907 | ||
|
1908 | Creates a repository. | |
|
1909 | ||
|
1910 | * If the repository name contains "/", all the required repository | |
|
1911 | groups will be created. | |
|
1912 | ||
|
1913 | For example "foo/bar/baz" will create |repo| groups "foo" and "bar" | |
|
1914 | (with "foo" as parent). It will also create the "baz" repository | |
|
1915 | with "bar" as |repo| group. | |
|
1916 | ||
|
1917 | This command can only be run using an |authtoken| with at least | |
|
1918 | write permissions to the |repo|. | |
|
1919 | ||
|
1920 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1921 | :type apiuser: AuthUser | |
|
1922 | :param repo_name: Set the repository name. | |
|
1923 | :type repo_name: str | |
|
1924 | :param repo_type: Set the repository type; 'hg','git', or 'svn'. | |
|
1925 | :type repo_type: str | |
|
1926 | :param owner: user_id or username | |
|
1927 | :type owner: Optional(str) | |
|
1928 | :param description: Set the repository description. | |
|
1929 | :type description: Optional(str) | |
|
1930 | :param private: | |
|
1931 | :type private: bool | |
|
1932 | :param clone_uri: | |
|
1933 | :type clone_uri: str | |
|
1934 | :param landing_rev: <rev_type>:<rev> | |
|
1935 | :type landing_rev: str | |
|
1936 | :param enable_locking: | |
|
1937 | :type enable_locking: bool | |
|
1938 | :param enable_downloads: | |
|
1939 | :type enable_downloads: bool | |
|
1940 | :param enable_statistics: | |
|
1941 | :type enable_statistics: bool | |
|
1942 | :param copy_permissions: Copy permission from group in which the | |
|
1943 | repository is being created. | |
|
1944 | :type copy_permissions: bool | |
|
1945 | ||
|
1946 | ||
|
1947 | Example output: | |
|
1948 | ||
|
1949 | .. code-block:: bash | |
|
1950 | ||
|
1951 | id : <id_given_in_input> | |
|
1952 | result: { | |
|
1953 | "msg": "Created new repository `<reponame>`", | |
|
1954 | "success": true, | |
|
1955 | "task": "<celery task id or None if done sync>" | |
|
1956 | } | |
|
1957 | error: null | |
|
1958 | ||
|
1959 | ||
|
1960 | Example error output: | |
|
1961 | ||
|
1962 | .. code-block:: bash | |
|
1963 | ||
|
1964 | id : <id_given_in_input> | |
|
1965 | result : null | |
|
1966 | error : { | |
|
1967 | 'failed to create repository `<repo_name>` | |
|
1968 | } | |
|
1969 | ||
|
1970 | ||
|
1971 | add_field_to_repo | |
|
1972 | ----------------- | |
|
1973 | ||
|
1974 | .. py:function:: add_field_to_repo(apiuser, repoid, key, label=<Optional:''>, description=<Optional:''>) | |
|
1975 | ||
|
1976 | Adds an extra field to a repository. | |
|
1977 | ||
|
1978 | This command can only be run using an |authtoken| with at least | |
|
1979 | write permissions to the |repo|. | |
|
1980 | ||
|
1981 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
1982 | :type apiuser: AuthUser | |
|
1983 | :param repoid: Set the repository name or repository id. | |
|
1984 | :type repoid: str or int | |
|
1985 | :param key: Create a unique field key for this repository. | |
|
1986 | :type key: str | |
|
1987 | :param label: | |
|
1988 | :type label: Optional(str) | |
|
1989 | :param description: | |
|
1990 | :type description: Optional(str) | |
|
1991 | ||
|
1992 | ||
|
1993 | remove_field_from_repo | |
|
1994 | ---------------------- | |
|
1995 | ||
|
1996 | .. py:function:: remove_field_from_repo(apiuser, repoid, key) | |
|
1997 | ||
|
1998 | Removes an extra field from a repository. | |
|
1999 | ||
|
2000 | This command can only be run using an |authtoken| with at least | |
|
2001 | write permissions to the |repo|. | |
|
2002 | ||
|
2003 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2004 | :type apiuser: AuthUser | |
|
2005 | :param repoid: Set the repository name or repository ID. | |
|
2006 | :type repoid: str or int | |
|
2007 | :param key: Set the unique field key for this repository. | |
|
2008 | :type key: str | |
|
2009 | ||
|
2010 | ||
|
2011 | update_repo | |
|
2012 | ----------- | |
|
2013 | ||
|
2014 | .. py:function:: update_repo(apiuser, repoid, name=<Optional:None>, owner=<Optional:<OptionalAttr:apiuser>>, group=<Optional:None>, fork_of=<Optional:None>, description=<Optional:''>, private=<Optional:False>, clone_uri=<Optional:None>, landing_rev=<Optional:'rev:tip'>, enable_statistics=<Optional:False>, enable_locking=<Optional:False>, enable_downloads=<Optional:False>, fields=<Optional:''>) | |
|
2015 | ||
|
2016 | Updates a repository with the given information. | |
|
2017 | ||
|
2018 | This command can only be run using an |authtoken| with at least | |
|
2019 | write permissions to the |repo|. | |
|
2020 | ||
|
2021 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2022 | :type apiuser: AuthUser | |
|
2023 | :param repoid: repository name or repository ID. | |
|
2024 | :type repoid: str or int | |
|
2025 | :param name: Update the |repo| name. | |
|
2026 | :type name: str | |
|
2027 | :param owner: Set the |repo| owner. | |
|
2028 | :type owner: str | |
|
2029 | :param group: Set the |repo| group the |repo| belongs to. | |
|
2030 | :type group: str | |
|
2031 | :param fork_of: Set the master |repo| name. | |
|
2032 | :type fork_of: str | |
|
2033 | :param description: Update the |repo| description. | |
|
2034 | :type description: str | |
|
2035 | :param private: Set the |repo| as private. (True | False) | |
|
2036 | :type private: bool | |
|
2037 | :param clone_uri: Update the |repo| clone URI. | |
|
2038 | :type clone_uri: str | |
|
2039 | :param landing_rev: Set the |repo| landing revision. Default is | |
|
2040 | ``tip``. | |
|
2041 | :type landing_rev: str | |
|
2042 | :param enable_statistics: Enable statistics on the |repo|, | |
|
2043 | (True | False). | |
|
2044 | :type enable_statistics: bool | |
|
2045 | :param enable_locking: Enable |repo| locking. | |
|
2046 | :type enable_locking: bool | |
|
2047 | :param enable_downloads: Enable downloads from the |repo|, | |
|
2048 | (True | False). | |
|
2049 | :type enable_downloads: bool | |
|
2050 | :param fields: Add extra fields to the |repo|. Use the following | |
|
2051 | example format: ``field_key=field_val,field_key2=fieldval2``. | |
|
2052 | Escape ', ' with \, | |
|
2053 | :type fields: str | |
|
2054 | ||
|
2055 | ||
|
2056 | fork_repo | |
|
2057 | --------- | |
|
2058 | ||
|
2059 | .. py:function:: fork_repo(apiuser, repoid, fork_name, owner=<Optional:<OptionalAttr:apiuser>>, description=<Optional:''>, copy_permissions=<Optional:False>, private=<Optional:False>, landing_rev=<Optional:'rev:tip'>) | |
|
2060 | ||
|
2061 | Creates a fork of the specified |repo|. | |
|
2062 | ||
|
2063 | * If using |RCE| with Celery this will immediately return a success | |
|
2064 | message, even though the fork will be created asynchronously. | |
|
2065 | ||
|
2066 | This command can only be run using an |authtoken| with fork | |
|
2067 | permissions on the |repo|. | |
|
2068 | ||
|
2069 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2070 | :type apiuser: AuthUser | |
|
2071 | :param repoid: Set repository name or repository ID. | |
|
2072 | :type repoid: str or int | |
|
2073 | :param fork_name: Set the fork name. | |
|
2074 | :type fork_name: str | |
|
2075 | :param owner: Set the fork owner. | |
|
2076 | :type owner: str | |
|
2077 | :param description: Set the fork descripton. | |
|
2078 | :type description: str | |
|
2079 | :param copy_permissions: Copy permissions from parent |repo|. The | |
|
2080 | default is False. | |
|
2081 | :type copy_permissions: bool | |
|
2082 | :param private: Make the fork private. The default is False. | |
|
2083 | :type private: bool | |
|
2084 | :param landing_rev: Set the landing revision. The default is tip. | |
|
2085 | ||
|
2086 | Example output: | |
|
2087 | ||
|
2088 | .. code-block:: bash | |
|
2089 | ||
|
2090 | id : <id_for_response> | |
|
2091 | api_key : "<api_key>" | |
|
2092 | args: { | |
|
2093 | "repoid" : "<reponame or repo_id>", | |
|
2094 | "fork_name": "<forkname>", | |
|
2095 | "owner": "<username or user_id = Optional(=apiuser)>", | |
|
2096 | "description": "<description>", | |
|
2097 | "copy_permissions": "<bool>", | |
|
2098 | "private": "<bool>", | |
|
2099 | "landing_rev": "<landing_rev>" | |
|
2100 | } | |
|
2101 | ||
|
2102 | Example error output: | |
|
2103 | ||
|
2104 | .. code-block:: bash | |
|
2105 | ||
|
2106 | id : <id_given_in_input> | |
|
2107 | result: { | |
|
2108 | "msg": "Created fork of `<reponame>` as `<forkname>`", | |
|
2109 | "success": true, | |
|
2110 | "task": "<celery task id or None if done sync>" | |
|
2111 | } | |
|
2112 | error: null | |
|
2113 | ||
|
2114 | ||
|
2115 | delete_repo | |
|
2116 | ----------- | |
|
2117 | ||
|
2118 | .. py:function:: delete_repo(apiuser, repoid, forks=<Optional:''>) | |
|
2119 | ||
|
2120 | Deletes a repository. | |
|
2121 | ||
|
2122 | * When the `forks` parameter is set it's possible to detach or delete | |
|
2123 | forks of deleted repository. | |
|
2124 | ||
|
2125 | This command can only be run using an |authtoken| with admin | |
|
2126 | permissions on the |repo|. | |
|
2127 | ||
|
2128 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2129 | :type apiuser: AuthUser | |
|
2130 | :param repoid: Set the repository name or repository ID. | |
|
2131 | :type repoid: str or int | |
|
2132 | :param forks: Set to `detach` or `delete` forks from the |repo|. | |
|
2133 | :type forks: Optional(str) | |
|
2134 | ||
|
2135 | Example error output: | |
|
2136 | ||
|
2137 | .. code-block:: bash | |
|
2138 | ||
|
2139 | id : <id_given_in_input> | |
|
2140 | result: { | |
|
2141 | "msg": "Deleted repository `<reponame>`", | |
|
2142 | "success": true | |
|
2143 | } | |
|
2144 | error: null | |
|
2145 | ||
|
2146 | ||
|
2147 | comment_commit | |
|
2148 | -------------- | |
|
2149 | ||
|
2150 | .. py:function:: comment_commit(apiuser, repoid, commit_id, message, userid=<Optional:<OptionalAttr:apiuser>>, status=<Optional:None>) | |
|
2151 | ||
|
2152 | Set a commit comment, and optionally change the status of the commit. | |
|
2153 | This command can be executed only using api_key belonging to user | |
|
2154 | with admin rights, or repository administrator. | |
|
2155 | ||
|
2156 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2157 | :type apiuser: AuthUser | |
|
2158 | :param repoid: Set the repository name or repository ID. | |
|
2159 | :type repoid: str or int | |
|
2160 | :param commit_id: Specify the commit_id for which to set a comment. | |
|
2161 | :type commit_id: str | |
|
2162 | :param message: The comment text. | |
|
2163 | :type message: str | |
|
2164 | :param userid: Set the user name of the comment creator. | |
|
2165 | :type userid: Optional(str or int) | |
|
2166 | :param status: status, one of 'not_reviewed', 'approved', 'rejected', | |
|
2167 | 'under_review' | |
|
2168 | :type status: str | |
|
2169 | ||
|
2170 | Example error output: | |
|
2171 | ||
|
2172 | .. code-block:: json | |
|
2173 | ||
|
2174 | { | |
|
2175 | "id" : <id_given_in_input>, | |
|
2176 | "result" : { | |
|
2177 | "msg": "Commented on commit `<commit_id>` for repository `<repoid>`", | |
|
2178 | "status_change": null or <status>, | |
|
2179 | "success": true | |
|
2180 | }, | |
|
2181 | "error" : null | |
|
2182 | } | |
|
2183 | ||
|
2184 | ||
|
2185 | changeset_comment | |
|
2186 | ----------------- | |
|
2187 | ||
|
2188 | .. py:function:: changeset_comment(apiuser, repoid, revision, message, userid=<Optional:<OptionalAttr:apiuser>>, status=<Optional:None>) | |
|
2189 | ||
|
2190 | .. deprecated:: 3.4.0 | |
|
2191 | ||
|
2192 | Please use method `comment_commit` instead. | |
|
2193 | ||
|
2194 | ||
|
2195 | Set a changeset comment, and optionally change the status of the | |
|
2196 | changeset. | |
|
2197 | ||
|
2198 | This command can only be run using an |authtoken| with admin | |
|
2199 | permissions on the |repo|. | |
|
2200 | ||
|
2201 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2202 | :type apiuser: AuthUser | |
|
2203 | :param repoid: Set the repository name or repository ID. | |
|
2204 | :type repoid: str or int | |
|
2205 | :param revision: Specify the revision for which to set a comment. | |
|
2206 | :type revision: str | |
|
2207 | :param message: The comment text. | |
|
2208 | :type message: str | |
|
2209 | :param userid: Set the user name of the comment creator. | |
|
2210 | :type userid: Optional(str or int) | |
|
2211 | :param status: Set the comment status. The following are valid options: | |
|
2212 | * not_reviewed | |
|
2213 | * approved | |
|
2214 | * rejected | |
|
2215 | * under_review | |
|
2216 | :type status: str | |
|
2217 | ||
|
2218 | Example error output: | |
|
2219 | ||
|
2220 | .. code-block:: json | |
|
2221 | ||
|
2222 | { | |
|
2223 | "id" : <id_given_in_input>, | |
|
2224 | "result" : { | |
|
2225 | "msg": "Commented on commit `<revision>` for repository `<repoid>`", | |
|
2226 | "status_change": null or <status>, | |
|
2227 | "success": true | |
|
2228 | }, | |
|
2229 | "error" : null | |
|
2230 | } | |
|
2231 | ||
|
2232 | ||
|
2233 | grant_user_permission | |
|
2234 | --------------------- | |
|
2235 | ||
|
2236 | .. py:function:: grant_user_permission(apiuser, repoid, userid, perm) | |
|
2237 | ||
|
2238 | Grant permissions for the specified user on the given repository, | |
|
2239 | or update existing permissions if found. | |
|
2240 | ||
|
2241 | This command can only be run using an |authtoken| with admin | |
|
2242 | permissions on the |repo|. | |
|
2243 | ||
|
2244 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2245 | :type apiuser: AuthUser | |
|
2246 | :param repoid: Set the repository name or repository ID. | |
|
2247 | :type repoid: str or int | |
|
2248 | :param userid: Set the user name. | |
|
2249 | :type userid: str | |
|
2250 | :param perm: Set the user permissions, using the following format | |
|
2251 | ``(repository.(none|read|write|admin))`` | |
|
2252 | :type perm: str | |
|
2253 | ||
|
2254 | Example output: | |
|
2255 | ||
|
2256 | .. code-block:: bash | |
|
2257 | ||
|
2258 | id : <id_given_in_input> | |
|
2259 | result: { | |
|
2260 | "msg" : "Granted perm: `<perm>` for user: `<username>` in repo: `<reponame>`", | |
|
2261 | "success": true | |
|
2262 | } | |
|
2263 | error: null | |
|
2264 | ||
|
2265 | ||
|
2266 | revoke_user_permission | |
|
2267 | ---------------------- | |
|
2268 | ||
|
2269 | .. py:function:: revoke_user_permission(apiuser, repoid, userid) | |
|
2270 | ||
|
2271 | Revoke permission for a user on the specified repository. | |
|
2272 | ||
|
2273 | This command can only be run using an |authtoken| with admin | |
|
2274 | permissions on the |repo|. | |
|
2275 | ||
|
2276 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2277 | :type apiuser: AuthUser | |
|
2278 | :param repoid: Set the repository name or repository ID. | |
|
2279 | :type repoid: str or int | |
|
2280 | :param userid: Set the user name of revoked user. | |
|
2281 | :type userid: str or int | |
|
2282 | ||
|
2283 | Example error output: | |
|
2284 | ||
|
2285 | .. code-block:: bash | |
|
2286 | ||
|
2287 | id : <id_given_in_input> | |
|
2288 | result: { | |
|
2289 | "msg" : "Revoked perm for user: `<username>` in repo: `<reponame>`", | |
|
2290 | "success": true | |
|
2291 | } | |
|
2292 | error: null | |
|
2293 | ||
|
2294 | ||
|
2295 | grant_user_group_permission | |
|
2296 | --------------------------- | |
|
2297 | ||
|
2298 | .. py:function:: grant_user_group_permission(apiuser, repoid, usergroupid, perm) | |
|
2299 | ||
|
2300 | Grant permission for a user group on the specified repository, | |
|
2301 | or update existing permissions. | |
|
2302 | ||
|
2303 | This command can only be run using an |authtoken| with admin | |
|
2304 | permissions on the |repo|. | |
|
2305 | ||
|
2306 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2307 | :type apiuser: AuthUser | |
|
2308 | :param repoid: Set the repository name or repository ID. | |
|
2309 | :type repoid: str or int | |
|
2310 | :param usergroupid: Specify the ID of the user group. | |
|
2311 | :type usergroupid: str or int | |
|
2312 | :param perm: Set the user group permissions using the following | |
|
2313 | format: (repository.(none|read|write|admin)) | |
|
2314 | :type perm: str | |
|
2315 | ||
|
2316 | Example output: | |
|
2317 | ||
|
2318 | .. code-block:: bash | |
|
2319 | ||
|
2320 | id : <id_given_in_input> | |
|
2321 | result : { | |
|
2322 | "msg" : "Granted perm: `<perm>` for group: `<usersgroupname>` in repo: `<reponame>`", | |
|
2323 | "success": true | |
|
2324 | ||
|
2325 | } | |
|
2326 | error : null | |
|
2327 | ||
|
2328 | Example error output: | |
|
2329 | ||
|
2330 | .. code-block:: bash | |
|
2331 | ||
|
2332 | id : <id_given_in_input> | |
|
2333 | result : null | |
|
2334 | error : { | |
|
2335 | "failed to edit permission for user group: `<usergroup>` in repo `<repo>`' | |
|
2336 | } | |
|
2337 | ||
|
2338 | ||
|
2339 | revoke_user_group_permission | |
|
2340 | ---------------------------- | |
|
2341 | ||
|
2342 | .. py:function:: revoke_user_group_permission(apiuser, repoid, usergroupid) | |
|
2343 | ||
|
2344 | Revoke the permissions of a user group on a given repository. | |
|
2345 | ||
|
2346 | This command can only be run using an |authtoken| with admin | |
|
2347 | permissions on the |repo|. | |
|
2348 | ||
|
2349 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2350 | :type apiuser: AuthUser | |
|
2351 | :param repoid: Set the repository name or repository ID. | |
|
2352 | :type repoid: str or int | |
|
2353 | :param usergroupid: Specify the user group ID. | |
|
2354 | :type usergroupid: str or int | |
|
2355 | ||
|
2356 | Example output: | |
|
2357 | ||
|
2358 | .. code-block:: bash | |
|
2359 | ||
|
2360 | id : <id_given_in_input> | |
|
2361 | result: { | |
|
2362 | "msg" : "Revoked perm for group: `<usersgroupname>` in repo: `<reponame>`", | |
|
2363 | "success": true | |
|
2364 | } | |
|
2365 | error: null | |
|
2366 | ||
|
2367 | ||
|
2368 | get_repo_group | |
|
2369 | -------------- | |
|
2370 | ||
|
2371 | .. py:function:: get_repo_group(apiuser, repogroupid) | |
|
2372 | ||
|
2373 | Return the specified |repo| group, along with permissions, | |
|
2374 | and repositories inside the group | |
|
2375 | ||
|
2376 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2377 | :type apiuser: AuthUser | |
|
2378 | :param repogroupid: Specify the name of ID of the repository group. | |
|
2379 | :type repogroupid: str or int | |
|
2380 | ||
|
2381 | ||
|
2382 | Example output: | |
|
2383 | ||
|
2384 | .. code-block:: bash | |
|
2385 | ||
|
2386 | { | |
|
2387 | "error": null, | |
|
2388 | "id": repo-group-id, | |
|
2389 | "result": { | |
|
2390 | "group_description": "repo group description", | |
|
2391 | "group_id": 14, | |
|
2392 | "group_name": "group name", | |
|
2393 | "members": [ | |
|
2394 | { | |
|
2395 | "name": "super-admin-username", | |
|
2396 | "origin": "super-admin", | |
|
2397 | "permission": "group.admin", | |
|
2398 | "type": "user" | |
|
2399 | }, | |
|
2400 | { | |
|
2401 | "name": "owner-name", | |
|
2402 | "origin": "owner", | |
|
2403 | "permission": "group.admin", | |
|
2404 | "type": "user" | |
|
2405 | }, | |
|
2406 | { | |
|
2407 | "name": "user-group-name", | |
|
2408 | "origin": "permission", | |
|
2409 | "permission": "group.write", | |
|
2410 | "type": "user_group" | |
|
2411 | } | |
|
2412 | ], | |
|
2413 | "owner": "owner-name", | |
|
2414 | "parent_group": null, | |
|
2415 | "repositories": [ repo-list ] | |
|
2416 | } | |
|
2417 | } | |
|
2418 | ||
|
2419 | ||
|
2420 | get_repo_groups | |
|
2421 | --------------- | |
|
2422 | ||
|
2423 | .. py:function:: get_repo_groups(apiuser) | |
|
2424 | ||
|
2425 | Returns all repository groups. | |
|
2426 | ||
|
2427 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2428 | :type apiuser: AuthUser | |
|
2429 | ||
|
2430 | ||
|
2431 | create_repo_group | |
|
2432 | ----------------- | |
|
2433 | ||
|
2434 | .. py:function:: create_repo_group(apiuser, group_name, description=<Optional:''>, owner=<Optional:<OptionalAttr:apiuser>>, copy_permissions=<Optional:False>) | |
|
2435 | ||
|
2436 | Creates a repository group. | |
|
2437 | ||
|
2438 | * If the repository group name contains "/", all the required repository | |
|
2439 | groups will be created. | |
|
2440 | ||
|
2441 | For example "foo/bar/baz" will create |repo| groups "foo" and "bar" | |
|
2442 | (with "foo" as parent). It will also create the "baz" repository | |
|
2443 | with "bar" as |repo| group. | |
|
2444 | ||
|
2445 | This command can only be run using an |authtoken| with admin | |
|
2446 | permissions. | |
|
2447 | ||
|
2448 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2449 | :type apiuser: AuthUser | |
|
2450 | :param group_name: Set the repository group name. | |
|
2451 | :type group_name: str | |
|
2452 | :param description: Set the |repo| group description. | |
|
2453 | :type description: str | |
|
2454 | :param owner: Set the |repo| group owner. | |
|
2455 | :type owner: str | |
|
2456 | :param copy_permissions: | |
|
2457 | :type copy_permissions: | |
|
2458 | ||
|
2459 | Example output: | |
|
2460 | ||
|
2461 | .. code-block:: bash | |
|
2462 | ||
|
2463 | id : <id_given_in_input> | |
|
2464 | result : { | |
|
2465 | "msg": "Created new repo group `<repo_group_name>`" | |
|
2466 | "repo_group": <repogroup_object> | |
|
2467 | } | |
|
2468 | error : null | |
|
2469 | ||
|
2470 | ||
|
2471 | Example error output: | |
|
2472 | ||
|
2473 | .. code-block:: bash | |
|
2474 | ||
|
2475 | id : <id_given_in_input> | |
|
2476 | result : null | |
|
2477 | error : { | |
|
2478 | failed to create repo group `<repogroupid>` | |
|
2479 | } | |
|
2480 | ||
|
2481 | ||
|
2482 | update_repo_group | |
|
2483 | ----------------- | |
|
2484 | ||
|
2485 | .. py:function:: update_repo_group(apiuser, repogroupid, group_name=<Optional:''>, description=<Optional:''>, owner=<Optional:<OptionalAttr:apiuser>>, parent=<Optional:None>, enable_locking=<Optional:False>) | |
|
2486 | ||
|
2487 | Updates repository group with the details given. | |
|
2488 | ||
|
2489 | This command can only be run using an |authtoken| with admin | |
|
2490 | permissions. | |
|
2491 | ||
|
2492 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2493 | :type apiuser: AuthUser | |
|
2494 | :param repogroupid: Set the ID of repository group. | |
|
2495 | :type repogroupid: str or int | |
|
2496 | :param group_name: Set the name of the |repo| group. | |
|
2497 | :type group_name: str | |
|
2498 | :param description: Set a description for the group. | |
|
2499 | :type description: str | |
|
2500 | :param owner: Set the |repo| group owner. | |
|
2501 | :type owner: str | |
|
2502 | :param parent: Set the |repo| group parent. | |
|
2503 | :type parent: str or int | |
|
2504 | :param enable_locking: Enable |repo| locking. The default is false. | |
|
2505 | :type enable_locking: bool | |
|
2506 | ||
|
2507 | ||
|
2508 | delete_repo_group | |
|
2509 | ----------------- | |
|
2510 | ||
|
2511 | .. py:function:: delete_repo_group(apiuser, repogroupid) | |
|
2512 | ||
|
2513 | Deletes a |repo| group. | |
|
2514 | ||
|
2515 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2516 | :type apiuser: AuthUser | |
|
2517 | :param repogroupid: Set the name or ID of repository group to be | |
|
2518 | deleted. | |
|
2519 | :type repogroupid: str or int | |
|
2520 | ||
|
2521 | Example output: | |
|
2522 | ||
|
2523 | .. code-block:: bash | |
|
2524 | ||
|
2525 | id : <id_given_in_input> | |
|
2526 | result : { | |
|
2527 | 'msg': 'deleted repo group ID:<repogroupid> <repogroupname> | |
|
2528 | 'repo_group': null | |
|
2529 | } | |
|
2530 | error : null | |
|
2531 | ||
|
2532 | Example error output: | |
|
2533 | ||
|
2534 | .. code-block:: bash | |
|
2535 | ||
|
2536 | id : <id_given_in_input> | |
|
2537 | result : null | |
|
2538 | error : { | |
|
2539 | "failed to delete repo group ID:<repogroupid> <repogroupname>" | |
|
2540 | } | |
|
2541 | ||
|
2542 | ||
|
2543 | grant_user_permission_to_repo_group | |
|
2544 | ----------------------------------- | |
|
2545 | ||
|
2546 | .. py:function:: grant_user_permission_to_repo_group(apiuser, repogroupid, userid, perm, apply_to_children=<Optional:'none'>) | |
|
2547 | ||
|
2548 | Grant permission for a user on the given repository group, or update | |
|
2549 | existing permissions if found. | |
|
2550 | ||
|
2551 | This command can only be run using an |authtoken| with admin | |
|
2552 | permissions. | |
|
2553 | ||
|
2554 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2555 | :type apiuser: AuthUser | |
|
2556 | :param repogroupid: Set the name or ID of repository group. | |
|
2557 | :type repogroupid: str or int | |
|
2558 | :param userid: Set the user name. | |
|
2559 | :type userid: str | |
|
2560 | :param perm: (group.(none|read|write|admin)) | |
|
2561 | :type perm: str | |
|
2562 | :param apply_to_children: 'none', 'repos', 'groups', 'all' | |
|
2563 | :type apply_to_children: str | |
|
2564 | ||
|
2565 | Example output: | |
|
2566 | ||
|
2567 | .. code-block:: bash | |
|
2568 | ||
|
2569 | id : <id_given_in_input> | |
|
2570 | result: { | |
|
2571 | "msg" : "Granted perm: `<perm>` (recursive:<apply_to_children>) for user: `<username>` in repo group: `<repo_group_name>`", | |
|
2572 | "success": true | |
|
2573 | } | |
|
2574 | error: null | |
|
2575 | ||
|
2576 | Example error output: | |
|
2577 | ||
|
2578 | .. code-block:: bash | |
|
2579 | ||
|
2580 | id : <id_given_in_input> | |
|
2581 | result : null | |
|
2582 | error : { | |
|
2583 | "failed to edit permission for user: `<userid>` in repo group: `<repo_group_name>`" | |
|
2584 | } | |
|
2585 | ||
|
2586 | ||
|
2587 | revoke_user_permission_from_repo_group | |
|
2588 | -------------------------------------- | |
|
2589 | ||
|
2590 | .. py:function:: revoke_user_permission_from_repo_group(apiuser, repogroupid, userid, apply_to_children=<Optional:'none'>) | |
|
2591 | ||
|
2592 | Revoke permission for a user in a given repository group. | |
|
2593 | ||
|
2594 | This command can only be run using an |authtoken| with admin | |
|
2595 | permissions on the |repo| group. | |
|
2596 | ||
|
2597 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2598 | :type apiuser: AuthUser | |
|
2599 | :param repogroupid: Set the name or ID of the repository group. | |
|
2600 | :type repogroupid: str or int | |
|
2601 | :param userid: Set the user name to revoke. | |
|
2602 | :type userid: str | |
|
2603 | :param apply_to_children: 'none', 'repos', 'groups', 'all' | |
|
2604 | :type apply_to_children: str | |
|
2605 | ||
|
2606 | Example output: | |
|
2607 | ||
|
2608 | .. code-block:: bash | |
|
2609 | ||
|
2610 | id : <id_given_in_input> | |
|
2611 | result: { | |
|
2612 | "msg" : "Revoked perm (recursive:<apply_to_children>) for user: `<username>` in repo group: `<repo_group_name>`", | |
|
2613 | "success": true | |
|
2614 | } | |
|
2615 | error: null | |
|
2616 | ||
|
2617 | Example error output: | |
|
2618 | ||
|
2619 | .. code-block:: bash | |
|
2620 | ||
|
2621 | id : <id_given_in_input> | |
|
2622 | result : null | |
|
2623 | error : { | |
|
2624 | "failed to edit permission for user: `<userid>` in repo group: `<repo_group_name>`" | |
|
2625 | } | |
|
2626 | ||
|
2627 | ||
|
2628 | grant_user_group_permission_to_repo_group | |
|
2629 | ----------------------------------------- | |
|
2630 | ||
|
2631 | .. py:function:: grant_user_group_permission_to_repo_group(apiuser, repogroupid, usergroupid, perm, apply_to_children=<Optional:'none'>) | |
|
2632 | ||
|
2633 | Grant permission for a user group on given repository group, or update | |
|
2634 | existing permissions if found. | |
|
2635 | ||
|
2636 | This command can only be run using an |authtoken| with admin | |
|
2637 | permissions on the |repo| group. | |
|
2638 | ||
|
2639 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2640 | :type apiuser: AuthUser | |
|
2641 | :param repogroupid: Set the name or id of repository group | |
|
2642 | :type repogroupid: str or int | |
|
2643 | :param usergroupid: id of usergroup | |
|
2644 | :type usergroupid: str or int | |
|
2645 | :param perm: (group.(none|read|write|admin)) | |
|
2646 | :type perm: str | |
|
2647 | :param apply_to_children: 'none', 'repos', 'groups', 'all' | |
|
2648 | :type apply_to_children: str | |
|
2649 | ||
|
2650 | Example output: | |
|
2651 | ||
|
2652 | .. code-block:: bash | |
|
2653 | ||
|
2654 | id : <id_given_in_input> | |
|
2655 | result : { | |
|
2656 | "msg" : "Granted perm: `<perm>` (recursive:<apply_to_children>) for user group: `<usersgroupname>` in repo group: `<repo_group_name>`", | |
|
2657 | "success": true | |
|
2658 | ||
|
2659 | } | |
|
2660 | error : null | |
|
2661 | ||
|
2662 | Example error output: | |
|
2663 | ||
|
2664 | .. code-block:: bash | |
|
2665 | ||
|
2666 | id : <id_given_in_input> | |
|
2667 | result : null | |
|
2668 | error : { | |
|
2669 | "failed to edit permission for user group: `<usergroup>` in repo group: `<repo_group_name>`" | |
|
2670 | } | |
|
2671 | ||
|
2672 | ||
|
2673 | revoke_user_group_permission_from_repo_group | |
|
2674 | -------------------------------------------- | |
|
2675 | ||
|
2676 | .. py:function:: revoke_user_group_permission_from_repo_group(apiuser, repogroupid, usergroupid, apply_to_children=<Optional:'none'>) | |
|
2677 | ||
|
2678 | Revoke permission for user group on given repository. | |
|
2679 | ||
|
2680 | This command can only be run using an |authtoken| with admin | |
|
2681 | permissions on the |repo| group. | |
|
2682 | ||
|
2683 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2684 | :type apiuser: AuthUser | |
|
2685 | :param repogroupid: name or id of repository group | |
|
2686 | :type repogroupid: str or int | |
|
2687 | :param usergroupid: | |
|
2688 | :param apply_to_children: 'none', 'repos', 'groups', 'all' | |
|
2689 | :type apply_to_children: str | |
|
2690 | ||
|
2691 | Example output: | |
|
2692 | ||
|
2693 | .. code-block:: bash | |
|
2694 | ||
|
2695 | id : <id_given_in_input> | |
|
2696 | result: { | |
|
2697 | "msg" : "Revoked perm (recursive:<apply_to_children>) for user group: `<usersgroupname>` in repo group: `<repo_group_name>`", | |
|
2698 | "success": true | |
|
2699 | } | |
|
2700 | error: null | |
|
2701 | ||
|
2702 | Example error output: | |
|
2703 | ||
|
2704 | .. code-block:: bash | |
|
2705 | ||
|
2706 | id : <id_given_in_input> | |
|
2707 | result : null | |
|
2708 | error : { | |
|
2709 | "failed to edit permission for user group: `<usergroup>` in repo group: `<repo_group_name>`" | |
|
2710 | } | |
|
2711 | ||
|
2712 | ||
|
2713 | get_gist | |
|
2714 | -------- | |
|
2715 | ||
|
2716 | .. py:function:: get_gist(apiuser, gistid, content=<Optional:False>) | |
|
2717 | ||
|
2718 | Get the specified gist, based on the gist ID. | |
|
2719 | ||
|
2720 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2721 | :type apiuser: AuthUser | |
|
2722 | :param gistid: Set the id of the private or public gist | |
|
2723 | :type gistid: str | |
|
2724 | :param content: Return the gist content. Default is false. | |
|
2725 | :type content: Optional(bool) | |
|
2726 | ||
|
2727 | ||
|
2728 | get_gists | |
|
2729 | --------- | |
|
2730 | ||
|
2731 | .. py:function:: get_gists(apiuser, userid=<Optional:<OptionalAttr:apiuser>>) | |
|
2732 | ||
|
2733 | Get all gists for given user. If userid is empty returned gists | |
|
2734 | are for user who called the api | |
|
2735 | ||
|
2736 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2737 | :type apiuser: AuthUser | |
|
2738 | :param userid: user to get gists for | |
|
2739 | :type userid: Optional(str or int) | |
|
2740 | ||
|
2741 | ||
|
2742 | create_gist | |
|
2743 | ----------- | |
|
2744 | ||
|
2745 | .. py:function:: create_gist(apiuser, files, owner=<Optional:<OptionalAttr:apiuser>>, gist_type=<Optional:u'public'>, lifetime=<Optional:-1>, acl_level=<Optional:u'acl_public'>, description=<Optional:''>) | |
|
2746 | ||
|
2747 | Creates a new Gist. | |
|
2748 | ||
|
2749 | :param apiuser: This is filled automatically from the |authtoken|. | |
|
2750 | :type apiuser: AuthUser | |
|
2751 | :param files: files to be added to the gist. The data structure has | |
|
2752 | to match the following example:: | |
|
2753 | ||
|
2754 | {'filename': {'content':'...', 'lexer': null}, | |
|
2755 | 'filename2': {'content':'...', 'lexer': null}} | |
|
2756 | ||
|
2757 | :type files: dict | |
|
2758 | :param owner: Set the gist owner, defaults to api method caller | |
|
2759 | :type owner: Optional(str or int) | |
|
2760 | :param gist_type: type of gist ``public`` or ``private`` | |
|
2761 | :type gist_type: Optional(str) | |
|
2762 | :param lifetime: time in minutes of gist lifetime | |
|
2763 | :type lifetime: Optional(int) | |
|
2764 | :param acl_level: acl level for this gist, can be | |
|
2765 | ``acl_public`` or ``acl_private`` If the value is set to | |
|
2766 | ``acl_private`` only logged in users are able to access this gist. | |
|
2767 | If not set it defaults to ``acl_public``. | |
|
2768 | :type acl_level: Optional(str) | |
|
2769 | :param description: gist description | |
|
2770 | :type description: Optional(str) | |
|
2771 | ||
|
2772 | Example output: | |
|
2773 | ||
|
2774 | .. code-block:: bash | |
|
2775 | ||
|
2776 | id : <id_given_in_input> | |
|
2777 | result : { | |
|
2778 | "msg": "created new gist", | |
|
2779 | "gist": {} | |
|
2780 | } | |
|
2781 | error : null | |
|
2782 | ||
|
2783 | Example error output: | |
|
2784 | ||
|
2785 | .. code-block:: bash | |
|
2786 | ||
|
2787 | id : <id_given_in_input> | |
|
2788 | result : null | |
|
2789 | error : { | |
|
2790 | "failed to create gist" | |
|
2791 | } | |
|
2792 | ||
|
2793 | ||
|
2794 | delete_gist | |
|
2795 | ----------- | |
|
2796 | ||
|
2797 | .. py:function:: delete_gist(apiuser, gistid) | |
|
2798 | ||
|
2799 | Deletes existing gist | |
|
2800 | ||
|
2801 | :param apiuser: filled automatically from apikey | |
|
2802 | :type apiuser: AuthUser | |
|
2803 | :param gistid: id of gist to delete | |
|
2804 | :type gistid: str | |
|
2805 | ||
|
2806 | Example output: | |
|
2807 | ||
|
2808 | .. code-block:: bash | |
|
2809 | ||
|
2810 | id : <id_given_in_input> | |
|
2811 | result : { | |
|
2812 | "deleted gist ID: <gist_id>", | |
|
2813 | "gist": null | |
|
2814 | } | |
|
2815 | error : null | |
|
2816 | ||
|
2817 | Example error output: | |
|
2818 | ||
|
2819 | .. code-block:: bash | |
|
2820 | ||
|
2821 | id : <id_given_in_input> | |
|
2822 | result : null | |
|
2823 | error : { | |
|
2824 | "failed to delete gist ID:<gist_id>" | |
|
2825 | } | |
|
199 | methods/license-methods | |
|
200 | methods/deprecated-methods | |
|
201 | methods/gist-methods | |
|
202 | methods/pull-request-methods | |
|
203 | methods/repo-methods | |
|
204 | methods/repo-group-methods | |
|
205 | methods/server-methods | |
|
206 | methods/user-methods | |
|
207 | methods/user-group-methods |
General Comments 0
You need to be logged in to leave comments.
Login now