##// END OF EJS Templates
Remove license check code: GPL'd works like this should be unencumbered.
Remove license check code: GPL'd works like this should be unencumbered.

File last commit:

r4116:ffd45b18 rhodecode-2.2.5-gpl
r4138:31e119cb rhodecode-2.2.5-gpl
Show More
api.py
2615 lines | 94.9 KiB | text/x-python | PythonLexer
2012 copyrights
r1824 # -*- coding: utf-8 -*-
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
2012 copyrights
r1824 #
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # along with this program. If not, see <http://www.gnu.org/licenses/>.
"""
rhodecode.controllers.api
~~~~~~~~~~~~~~~~~~~~~~~~~
API controller for RhodeCode
:created_on: Aug 20, 2011
:author: marcink
:copyright: (c) 2013 RhodeCode GmbH.
:license: GPLv3, see LICENSE for more details.
"""
2012 copyrights
r1824
locking API returns objects instead of string messages....
r3808 import time
Extended API...
r1500 import traceback
import logging
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 from sqlalchemy import or_
Extended API...
r1500
Beginning of API implementation for rhodecode
r1445 from rhodecode.controllers.api import JSONRPCController, JSONRPCError
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 from rhodecode.lib.auth import (
PasswordGenerator, AuthUser, HasPermissionAllDecorator,
HasPermissionAnyDecorator, HasPermissionAnyApi, HasRepoPermissionAnyApi,
HasRepoGroupPermissionAnyApi, HasUserGroupPermissionAny)
API: Added option to rescann repositories via api call
r2697 from rhodecode.lib.utils import map_groups, repo2db_mapper
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 from rhodecode.lib.utils2 import (
str2bool, time_to_datetime, safe_int, Optional, OAttr)
another major refactoring with session management
r1734 from rhodecode.model.meta import Session
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 from rhodecode.model.repo_group import RepoGroupModel
from rhodecode.model.scm import ScmModel, UserGroupList
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584 from rhodecode.model.repo import RepoModel
Nicolas VINOT
Add API for repositories and groups (creation, permission)
r1586 from rhodecode.model.user import UserModel
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 from rhodecode.model.user_group import UserGroupModel
from rhodecode.model.gist import GistModel
from rhodecode.model.db import (
Repository, RhodeCodeSetting, UserIpMap, Permission, User, Gist,
RepoGroup)
get_locks API function draft
r3502 from rhodecode.lib.compat import json
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 from rhodecode.lib.exceptions import (
DefaultUserException, UserGroupsAssignedException)
another major refactoring with session management
r1734
Nicolas VINOT
Correct code style
r1593 log = logging.getLogger(__name__)
Extended API...
r1500
Beginning of API implementation for rhodecode
r1445
backported update_repo API method from rhodecode-pam
r3959 def store_update(updates, attr, name):
"""
Stores param in updates dict if it's not instance of Optional
allows easy updates of passed in params
"""
if not isinstance(attr, Optional):
updates[name] = attr
Refactored API...
r2526 def get_user_or_error(userid):
"""
Get user by id or name or return JsonRPCError if not found
:param userid:
"""
user = UserModel().get_user(userid)
if user is None:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 raise JSONRPCError("user `%s` does not exist" % (userid,))
Refactored API...
r2526 return user
def get_repo_or_error(repoid):
"""
Get repo by id or name or return JsonRPCError if not found
Updated boolean checks in API permissions calls
r3898 :param repoid:
Refactored API...
r2526 """
repo = RepoModel().get_repo(repoid)
if repo is None:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 raise JSONRPCError('repository `%s` does not exist' % (repoid,))
Refactored API...
r2526 return repo
backported update_repo API method from rhodecode-pam
r3959 def get_repo_group_or_error(repogroupid):
"""
Get repo group by id or name or return JsonRPCError if not found
:param repogroupid:
"""
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 repo_group = RepoGroupModel()._get_repo_group(repogroupid)
backported update_repo API method from rhodecode-pam
r3959 if repo_group is None:
raise JSONRPCError(
'repository group `%s` does not exist' % (repogroupid,))
return repo_group
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 def get_user_group_or_error(usergroupid):
Refactored API...
r2526 """
Mads Kiilerich
"Users groups" is grammatically incorrect English - rename to "user groups"...
r3410 Get user group by id or name or return JsonRPCError if not found
Refactored API...
r2526
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :param usergroupid:
Refactored API...
r2526 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 user_group = UserGroupModel().get_group(usergroupid)
if user_group is None:
raise JSONRPCError('user group `%s` does not exist' % (usergroupid,))
return user_group
Refactored API...
r2526
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 def get_perm_or_error(permid, prefix=None):
Refactored API...
r2526 """
Get permission by id or name or return JsonRPCError if not found
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :param permid:
Refactored API...
r2526 """
make the permission update function idempotent
r3730 perm = Permission.get_by_key(permid)
Refactored API...
r2526 if perm is None:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 raise JSONRPCError('permission `%s` does not exist' % (permid,))
if prefix:
if not perm.permission_name.startswith(prefix):
raise JSONRPCError('permission `%s` is invalid, '
'should start with %s' % (permid, prefix))
Refactored API...
r2526 return perm
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 def get_gist_or_error(gistid):
"""
Get gist by id or gist_access_id or return JsonRPCError if not found
:param gistid:
"""
gist = GistModel().get_gist(gistid)
if gist is None:
raise JSONRPCError('gist `%s` does not exist' % (gistid,))
return gist
Nicolas VINOT
Correct code style
r1593 class ApiController(JSONRPCController):
Beginning of API implementation for rhodecode
r1445 """
API Controller
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 Each method takes USER as first argument. This is then, based on given
API_KEY propagated as instance of user object who's making the call.
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 example function::
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 def func(apiuser,arg1, arg2,...):
pass
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Each function should also **raise** JSONRPCError for any
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 errors that happens.
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Beginning of API implementation for rhodecode
r1445 """
Nicolas VINOT
Correct code style
r1593 @HasPermissionAllDecorator('hg.admin')
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 def test(self, apiuser, args):
return args
@HasPermissionAllDecorator('hg.admin')
Refactored API...
r2526 def pull(self, apiuser, repoid):
Beginning of API implementation for rhodecode
r1445 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 Triggers a pull from remote location on given repo. Can be used to
automatically keep remote repos up to date. This command can be executed
only using api_key belonging to user with admin rights
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repoid: repository name or repository id
:type repoid: str or int
OUTPUT::
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 id : <id_given_in_input>
result : {
"msg": "Pulled from `<repository name>`"
"repository": "<repository name>"
}
error : null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"Unable to pull changes from `<reponame>`"
}
Beginning of API implementation for rhodecode
r1445 """
Refactored API...
r2526 repo = get_repo_or_error(repoid)
Nicolas VINOT
Implement all CRUD API operation for repo
r1587
Beginning of API implementation for rhodecode
r1445 try:
Refactored API...
r2526 ScmModel().pull_changes(repo.repo_name,
self.rhodecode_user.username)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 return dict(
msg='Pulled from `%s`' % repo.repo_name,
repository=repo.repo_name
)
Beginning of API implementation for rhodecode
r1445 except Exception:
Refactored API...
r2526 log.error(traceback.format_exc())
raise JSONRPCError(
'Unable to pull changes from `%s`' % repo.repo_name
)
Beginning of API implementation for rhodecode
r1445
Nicolas VINOT
Correct code style
r1593 @HasPermissionAllDecorator('hg.admin')
API: Added option to rescann repositories via api call
r2697 def rescan_repos(self, apiuser, remove_obsolete=Optional(False)):
"""
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 Triggers rescan repositories action. If remove_obsolete is set
API: Added option to rescann repositories via api call
r2697 than also delete repos that are in database but not in the filesystem.
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 aka "clean zombies". This command can be executed only using api_key
belonging to user with admin rights.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param remove_obsolete: deletes repositories from
database that are not found on the filesystem
:type remove_obsolete: Optional(bool)
OUTPUT::
API: Added option to rescann repositories via api call
r2697
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 id : <id_given_in_input>
result : {
'added': [<added repository name>,...]
'removed': [<removed repository name>,...]
}
error : null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
'Error occurred during rescan repositories action'
}
API: Added option to rescann repositories via api call
r2697 """
try:
rm_obsolete = Optional.extract(remove_obsolete)
added, removed = repo2db_mapper(ScmModel().repo_scan(),
remove_obsolete=rm_obsolete)
return {'added': added, 'removed': removed}
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError(
added API call for locking/unlocking repositories
r2737 'Error occurred during rescan repositories action'
)
API invalidate_cache function ref #733
r3235 def invalidate_cache(self, apiuser, repoid):
"""
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 Invalidate cache for repository.
This command can be executed only using api_key belonging to user with admin
rights or regular user that have write or admin or write access to repository.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repoid: repository name or repository id
:type repoid: str or int
OUTPUT::
API invalidate_cache function ref #733
r3235
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 id : <id_given_in_input>
result : {
'msg': Cache for repository `<repository name>` was invalidated,
'repository': <repository name>
}
error : null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
'Error occurred during cache invalidation action'
}
API invalidate_cache function ref #733
r3235 """
repo = get_repo_or_error(repoid)
Updated boolean checks in API permissions calls
r3898 if not HasPermissionAnyApi('hg.admin')(user=apiuser):
API invalidate_cache function ref #733
r3235 # check if we have admin permission for this repo !
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 if not HasRepoPermissionAnyApi('repository.admin',
'repository.write')(
user=apiuser, repo_name=repo.repo_name):
raise JSONRPCError('repository `%s` does not exist' % (repoid,))
API invalidate_cache function ref #733
r3235
try:
Mads Kiilerich
api: don't report invalidated cache_keys after invalidating a repo...
r3759 ScmModel().mark_for_invalidation(repo.repo_name)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 return dict(
msg='Cache for repository `%s` was invalidated' % (repoid,),
repository=repo.repo_name
)
API invalidate_cache function ref #733
r3235 except Exception:
log.error(traceback.format_exc())
raise JSONRPCError(
'Error occurred during cache invalidation action'
)
Updated boolean checks in API permissions calls
r3898 # permission check inside
calling lock function without lock attribute, will return lock state
r3457 def lock(self, apiuser, repoid, locked=Optional(None),
userid=Optional(OAttr('apiuser'))):
added API call for locking/unlocking repositories
r2737 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 Set locking state on given repository by given user. If userid param
is skipped, then it is set to id of user whos calling this method.
If locked param is skipped then function shows current lock state of
given repo. This command can be executed only using api_key belonging
to user with admin rights or regular user that have admin or write
access to repository.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repoid: repository name or repository id
:type repoid: str or int
:param locked: lock state to be set
:type locked: Optional(bool)
:param userid: set lock as user
:type userid: Optional(str or int)
OUTPUT::
added API call for locking/unlocking repositories
r2737
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 id : <id_given_in_input>
result : {
'repo': '<reponame>',
'locked': <bool: lock state>,
'locked_since': <int: lock timestamp>,
'locked_by': <username of person who made the lock>,
'lock_state_changed': <bool: True if lock state has been changed in this request>,
'msg': 'Repo `<reponame>` locked by `<username>` on <timestamp>.'
or
'msg': 'Repo `<repository name>` not locked.'
or
'msg': 'User `<user name>` set lock state for repo `<repository name>` to `<new lock state>`'
}
error : null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
'Error occurred locking repository `<reponame>`
}
added API call for locking/unlocking repositories
r2737 """
repo = get_repo_or_error(repoid)
Implemented API calls for non-admin users for locking/unlocking repositories
r3161 if HasPermissionAnyApi('hg.admin')(user=apiuser):
pass
elif HasRepoPermissionAnyApi('repository.admin',
'repository.write')(user=apiuser,
repo_name=repo.repo_name):
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # make sure normal user does not pass someone else userid,
# he is not allowed to do that
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163 if not isinstance(userid, Optional) and userid != apiuser.user_id:
Implemented API calls for non-admin users for locking/unlocking repositories
r3161 raise JSONRPCError(
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163 'userid is not the same as your user'
Implemented API calls for non-admin users for locking/unlocking repositories
r3161 )
else:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 raise JSONRPCError('repository `%s` does not exist' % (repoid,))
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163
Implemented API calls for non-admin users for locking/unlocking repositories
r3161 if isinstance(userid, Optional):
userid = apiuser.user_id
calling lock function without lock attribute, will return lock state
r3457
added API call for locking/unlocking repositories
r2737 user = get_user_or_error(userid)
calling lock function without lock attribute, will return lock state
r3457
if isinstance(locked, Optional):
lockobj = Repository.getlock(repo)
if lockobj[0] is None:
locking API returns objects instead of string messages....
r3808 _d = {
'repo': repo.repo_name,
'locked': False,
'locked_since': None,
'locked_by': None,
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 'lock_state_changed': False,
locking API returns objects instead of string messages....
r3808 'msg': 'Repo `%s` not locked.' % repo.repo_name
}
return _d
added API call for locking/unlocking repositories
r2737 else:
calling lock function without lock attribute, will return lock state
r3457 userid, time_ = lockobj
locking API returns objects instead of string messages....
r3808 lock_user = get_user_or_error(userid)
_d = {
'repo': repo.repo_name,
'locked': True,
'locked_since': time_,
'locked_by': lock_user.username,
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 'lock_state_changed': False,
'msg': ('Repo `%s` locked by `%s` on `%s`.'
% (repo.repo_name, lock_user.username,
locking API returns objects instead of string messages....
r3808 json.dumps(time_to_datetime(time_))))
}
return _d
added API call for locking/unlocking repositories
r2737
locking API returns objects instead of string messages....
r3808 # force locked state through a flag
calling lock function without lock attribute, will return lock state
r3457 else:
locked = str2bool(locked)
try:
if locked:
locking API returns objects instead of string messages....
r3808 lock_time = time.time()
Repository.lock(repo, user.user_id, lock_time)
calling lock function without lock attribute, will return lock state
r3457 else:
locking API returns objects instead of string messages....
r3808 lock_time = None
calling lock function without lock attribute, will return lock state
r3457 Repository.unlock(repo)
locking API returns objects instead of string messages....
r3808 _d = {
'repo': repo.repo_name,
'locked': locked,
'locked_since': lock_time,
'locked_by': user.username,
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 'lock_state_changed': True,
locking API returns objects instead of string messages....
r3808 'msg': ('User `%s` set lock state for repo `%s` to `%s`'
% (user.username, repo.repo_name, locked))
}
return _d
calling lock function without lock attribute, will return lock state
r3457 except Exception:
log.error(traceback.format_exc())
raise JSONRPCError(
'Error occurred locking repository `%s`' % repo.repo_name
)
API: Added option to rescann repositories via api call
r2697
get_locks API function draft
r3502 def get_locks(self, apiuser, userid=Optional(OAttr('apiuser'))):
"""
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 Get all repositories with locks for given userid, if
get_locks API function draft
r3502 this command is runned by non-admin account userid is set to user
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 who is calling this method, thus returning locks for himself.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param userid: User to get locks for
:type userid: Optional(str or int)
get_locks API function draft
r3502
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 OUTPUT::
id : <id_given_in_input>
result : {
[repo_object, repo_object,...]
}
error : null
get_locks API function draft
r3502 """
Updated boolean checks in API permissions calls
r3898
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # make sure normal user does not pass someone else userid,
# he is not allowed to do that
get_locks API function draft
r3502 if not isinstance(userid, Optional) and userid != apiuser.user_id:
raise JSONRPCError(
'userid is not the same as your user'
)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116
get_locks API function draft
r3502 ret = []
if isinstance(userid, Optional):
user = None
else:
user = get_user_or_error(userid)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # show all locks
get_locks API function draft
r3502 for r in Repository.getAll():
userid, time_ = r.locked
if time_:
_api_data = r.get_api_data()
# if we use userfilter just show the locks for this user
if user:
if safe_int(userid) == user.user_id:
ret.append(_api_data)
else:
ret.append(_api_data)
return ret
API: Added option to rescann repositories via api call
r2697 @HasPermissionAllDecorator('hg.admin')
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 def get_ip(self, apiuser, userid=Optional(OAttr('apiuser'))):
added API method for checking IP
r3126 """
Shows IP address as seen from RhodeCode server, together with all
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 defined IP addresses for given user. If userid is not passed data is
returned for user who's calling this function.
This command can be executed only using api_key belonging to user with
admin rights.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param userid: username to show ips for
:type userid: Optional(str or int)
OUTPUT::
added API method for checking IP
r3126
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 id : <id_given_in_input>
result : {
"server_ip_addr": "<ip_from_clien>",
"user_ips": [
{
"ip_addr": "<ip_with_mask>",
"ip_range": ["<start_ip>", "<end_ip>"],
},
...
]
}
added API method for checking IP
r3126 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 if isinstance(userid, Optional):
userid = apiuser.user_id
added API method for checking IP
r3126 user = get_user_or_error(userid)
ips = UserIpMap.query().filter(UserIpMap.user == user).all()
return dict(
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 server_ip_addr=self.ip_addr,
added API method for checking IP
r3126 user_ips=ips
)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # alias for old
show_ip = get_ip
@HasPermissionAllDecorator('hg.admin')
def get_server_info(self, apiuser):
"""
return server info, including RhodeCode version and installed packages
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
OUTPUT::
id : <id_given_in_input>
result : {
'modules': [<module name>,...]
'py_version': <python version>,
'platform': <platform type>,
'rhodecode_version': <rhodecode version>
}
error : null
"""
return RhodeCodeSetting.get_server_info()
API method get_user can be executed by non-admin users ref #539
r3162 def get_user(self, apiuser, userid=Optional(OAttr('apiuser'))):
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 """
Get's an user by username or user_id, Returns empty result if user is
not found. If userid param is skipped it is set to id of user who is
calling this method. This command can be executed only using api_key
belonging to user with admin rights, or regular users that cannot
specify different userid than theirs
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param userid: user to get data for
:type userid: Optional(str or int)
OUTPUT::
Nicolas VINOT
Implement all CRUD API operation for repo
r1587
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 id : <id_given_in_input>
result: None if user does not exist or
{
"user_id" : "<user_id>",
"api_key" : "<api_key>",
"api_keys": "[<list of all api keys including additional ones>]"
"username" : "<username>",
"firstname": "<firstname>",
"lastname" : "<lastname>",
"email" : "<email>",
"emails": "[<list of all emails including additional ones>]",
"ip_addresses": "[<ip_addresse_for_user>,...]",
"active" : "<bool: user active>",
"admin" :  "<bool: user is admin>",
"extern_name" : "<extern_name>",
"extern_type" : "<extern type>
"last_login": "<last_login>",
"permissions": {
"global": ["hg.create.repository",
"repository.read",
"hg.register.manual_activate"],
"repositories": {"repo1": "repository.none"},
"repositories_groups": {"Group1": "group.read"}
},
}
error: null
Nicolas VINOT
Implement all CRUD API operation for repo
r1587 """
Updated boolean checks in API permissions calls
r3898 if not HasPermissionAnyApi('hg.admin')(user=apiuser):
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # make sure normal user does not pass someone else userid,
# he is not allowed to do that
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163 if not isinstance(userid, Optional) and userid != apiuser.user_id:
API method get_user can be executed by non-admin users ref #539
r3162 raise JSONRPCError(
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163 'userid is not the same as your user'
API method get_user can be executed by non-admin users ref #539
r3162 )
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163
if isinstance(userid, Optional):
API method get_user can be executed by non-admin users ref #539
r3162 userid = apiuser.user_id
Beginning of API implementation for rhodecode
r1445
Refactored API...
r2526 user = get_user_or_error(userid)
data = user.get_api_data()
data['permissions'] = AuthUser(user_id=user.user_id).permissions
return data
implements #329...
r1793
@HasPermissionAllDecorator('hg.admin')
def get_users(self, apiuser):
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 """
Lists all existing users. This command can be executed only using api_key
belonging to user with admin rights.
implements #329...
r1793
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :param apiuser: filled automatically from apikey
:type apiuser: AuthUser
OUTPUT::
id : <id_given_in_input>
result: [<user_object>, ...]
error: null
implements #329...
r1793 """
result = []
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 users_list = User.query().order_by(User.username) \
.filter(User.username != User.DEFAULT_USER) \
.all()
hide listing of default user...
r3799 for user in users_list:
Refactored API...
r2526 result.append(user.get_api_data())
Nicolas VINOT
Add API for repositories and groups (creation, permission)
r1586 return result
Nicolas VINOT
Correct code style
r1593 @HasPermissionAllDecorator('hg.admin')
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 def create_user(self, apiuser, username, email, password=Optional(''),
firstname=Optional(''), lastname=Optional(''),
Refactored API...
r2526 active=Optional(True), admin=Optional(False),
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 extern_name=Optional('rhodecode'),
extern_type=Optional('rhodecode')):
Extended API...
r1500 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 Creates new user. Returns new user object. This command can
be executed only using api_key belonging to user with admin rights.
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param username: new username
:type username: str or int
:param email: email
:type email: str
:param password: password
:type password: Optional(str)
:param firstname: firstname
:type firstname: Optional(str)
:param lastname: lastname
:type lastname: Optional(str)
:param active: active
:type active: Optional(bool)
:param admin: admin
:type admin: Optional(bool)
:param extern_name: name of extern
:type extern_name: Optional(str)
:param extern_type: extern_type
:type extern_type: Optional(str)
OUTPUT::
id : <id_given_in_input>
result: {
"msg" : "created new user `<username>`",
"user": <user_obj>
}
error: null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"user `<username>` already exist"
or
"email `<email>` already exist"
or
"failed to create user `<username>`"
}
Extended API...
r1500 """
Nicolas VINOT
[API] Create groups needed when creating repo
r1589
Refactored API...
r2526 if UserModel().get_by_username(username):
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 raise JSONRPCError("user `%s` already exist" % (username,))
Refactored API...
r2526
if UserModel().get_by_email(email, case_insensitive=True):
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 raise JSONRPCError("email `%s` already exist" % (email,))
API: allowed password field to be null when used with ldap_dn ref #362...
r2008
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 if Optional.extract(extern_name):
# generate temporary password if user is external
API: allowed password field to be null when used with ldap_dn ref #362...
r2008 password = PasswordGenerator().gen_password(length=8)
Extended API...
r1500 try:
API, added delete_user method....
r2365 user = UserModel().create_or_update(
Refactored API...
r2526 username=Optional.extract(username),
password=Optional.extract(password),
email=Optional.extract(email),
firstname=Optional.extract(firstname),
lastname=Optional.extract(lastname),
active=Optional.extract(active),
admin=Optional.extract(admin),
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 extern_type=Optional.extract(extern_type),
extern_name=Optional.extract(extern_name)
api review...
r1843 )
Refactored API...
r2526 Session().commit()
api review...
r1843 return dict(
Refactored API...
r2526 msg='created new user `%s`' % username,
user=user.get_api_data()
api review...
r1843 )
Extended API...
r1500 except Exception:
Nicolas VINOT
Correct code style
r1593 log.error(traceback.format_exc())
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 raise JSONRPCError('failed to create user `%s`' % (username,))
Nicolas VINOT
Implement all CRUD API operation for repo
r1587
Nicolas VINOT
Correct code style
r1593 @HasPermissionAllDecorator('hg.admin')
Refactored API...
r2526 def update_user(self, apiuser, userid, username=Optional(None),
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 email=Optional(None),password=Optional(None),
firstname=Optional(None), lastname=Optional(None),
active=Optional(None), admin=Optional(None),
extern_type=Optional(None), extern_name=Optional(None),):
API added explicit method for updating user account
r2002 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 updates given user if such user exists. This command can
be executed only using api_key belonging to user with admin rights.
API added explicit method for updating user account
r2002
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param userid: userid to update
:type userid: str or int
:param username: new username
:type username: str or int
:param email: email
:type email: str
:param password: password
:type password: Optional(str)
:param firstname: firstname
:type firstname: Optional(str)
:param lastname: lastname
:type lastname: Optional(str)
:param active: active
:type active: Optional(bool)
:param admin: admin
:type admin: Optional(bool)
:param extern_name:
:type extern_name: Optional(str)
:param extern_type:
:type extern_type: Optional(str)
OUTPUT::
id : <id_given_in_input>
result: {
"msg" : "updated user ID:<userid> <username>",
"user": <user_object>,
}
error: null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"failed to update user `<username>`"
}
API added explicit method for updating user account
r2002 """
Refactored API...
r2526
user = get_user_or_error(userid)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # only non optional arguments will be stored in updates
fixed api issue with changing username during update_user
r2657 updates = {}
API added explicit method for updating user account
r2002 try:
Refactored API...
r2526
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 store_update(updates, username, 'username')
store_update(updates, password, 'password')
store_update(updates, email, 'email')
store_update(updates, firstname, 'name')
store_update(updates, lastname, 'lastname')
store_update(updates, active, 'active')
store_update(updates, admin, 'admin')
store_update(updates, extern_name, 'extern_name')
store_update(updates, extern_type, 'extern_type')
fixed api issue with changing username during update_user
r2657
user = UserModel().update_user(user, **updates)
Refactored API...
r2526 Session().commit()
API added explicit method for updating user account
r2002 return dict(
API: update_user returns new updated user data
r2507 msg='updated user ID:%s %s' % (user.user_id, user.username),
Refactored API...
r2526 user=user.get_api_data()
API added explicit method for updating user account
r2002 )
hide listing of default user...
r3799 except DefaultUserException:
log.error(traceback.format_exc())
raise JSONRPCError('editing default user is forbidden')
API added explicit method for updating user account
r2002 except Exception:
log.error(traceback.format_exc())
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 raise JSONRPCError('failed to update user `%s`' % (userid,))
API, added delete_user method....
r2365
@HasPermissionAllDecorator('hg.admin')
def delete_user(self, apiuser, userid):
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 """
deletes givenuser if such user exists. This command can
be executed only using api_key belonging to user with admin rights.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param userid: user to delete
:type userid: str or int
OUTPUT::
API, added delete_user method....
r2365
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 id : <id_given_in_input>
result: {
"msg" : "deleted user ID:<userid> <username>",
"user": null
}
error: null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"failed to delete user ID:<userid> <username>"
}
API, added delete_user method....
r2365 """
Refactored API...
r2526 user = get_user_or_error(userid)
API, added delete_user method....
r2365
try:
UserModel().delete(userid)
Refactored API...
r2526 Session().commit()
API, added delete_user method....
r2365 return dict(
Refactored API...
r2526 msg='deleted user ID:%s %s' % (user.user_id, user.username),
user=None
API, added delete_user method....
r2365 )
except Exception:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116
API, added delete_user method....
r2365 log.error(traceback.format_exc())
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 raise JSONRPCError('failed to delete user ID:%s %s'
% (user.user_id, user.username))
API added explicit method for updating user account
r2002
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # permission check inside
def get_user_group(self, apiuser, usergroupid):
"""
Gets an existing user group. This command can be executed only using api_key
belonging to user with admin rights or user who has at least
read access to user group.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param usergroupid: id of user_group to edit
:type usergroupid: str or int
OUTPUT::
Nicolas VINOT
Implement all CRUD API operation for repo
r1587
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 id : <id_given_in_input>
result : None if group not exist
{
"users_group_id" : "<id>",
"group_name" : "<groupname>",
"active": "<bool>",
"members" : [<user_obj>,...]
}
error : null
Nicolas VINOT
Implement all CRUD API operation for repo
r1587
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 """
user_group = get_user_group_or_error(usergroupid)
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
# check if we have at least read permission for this user group !
_perms = ('usergroup.read', 'usergroup.write', 'usergroup.admin',)
if not HasUserGroupPermissionAny(*_perms)(
user=apiuser, user_group_name=user_group.users_group_name):
raise JSONRPCError('user group `%s` does not exist' % (usergroupid,))
Beginning of API implementation for rhodecode
r1445
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 data = user_group.get_api_data()
Refactored API...
r2526 return data
Nicolas VINOT
Implement all CRUD API operation for repo
r1587
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # permission check inside
def get_user_groups(self, apiuser):
"""
Lists all existing user groups. This command can be executed only using
api_key belonging to user with admin rights or user who has at least
read access to user group.
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :param apiuser: filled automatically from apikey
:type apiuser: AuthUser
OUTPUT::
id : <id_given_in_input>
result : [<user_group_obj>,...]
error : null
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584 """
Nicolas VINOT
Add API for repositories and groups (creation, permission)
r1586
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584 result = []
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 _perms = ('usergroup.read', 'usergroup.write', 'usergroup.admin',)
extras = {'user': apiuser}
for user_group in UserGroupList(UserGroupModel().get_all(),
perm_set=_perms, extra_kwargs=extras):
result.append(user_group.get_api_data())
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584 return result
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 @HasPermissionAnyDecorator('hg.admin', 'hg.usergroup.create.true')
def create_user_group(self, apiuser, group_name, description=Optional(''),
owner=Optional(OAttr('apiuser')), active=Optional(True)):
Extended API...
r1500 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 Creates new user group. This command can be executed only using api_key
belonging to user with admin rights or an user who has create user group
permission
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param group_name: name of new user group
:type group_name: str
:param description: group description
:type description: str
:param owner: owner of group. If not passed apiuser is the owner
:type owner: Optional(str or int)
:param active: group is active
:type active: Optional(bool)
OUTPUT::
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 id : <id_given_in_input>
result: {
"msg": "created new user group `<groupname>`",
"user_group": <user_group_object>
}
error: null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"user group `<group name>` already exist"
or
"failed to create group `<group name>`"
}
Extended API...
r1500 """
Nicolas VINOT
Add API for repositories and groups (creation, permission)
r1586
Mads Kiilerich
further cleanup of UsersGroup...
r3417 if UserGroupModel().get_by_name(group_name):
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 raise JSONRPCError("user group `%s` already exist" % (group_name,))
Nicolas VINOT
[API] Create groups needed when creating repo
r1589
Extended API...
r1500 try:
- Manage User’s Groups: create, delete, rename, add/remove users inside....
r3714 if isinstance(owner, Optional):
owner = apiuser.user_id
owner = get_user_or_error(owner)
Refactored API...
r2526 active = Optional.extract(active)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 description = Optional.extract(description)
ug = UserGroupModel().create(name=group_name, description=description,
owner=owner, active=active)
Refactored API...
r2526 Session().commit()
return dict(
Mads Kiilerich
"Users groups" is grammatically incorrect English - rename to "user groups"...
r3410 msg='created new user group `%s`' % group_name,
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 user_group=ug.get_api_data()
)
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError('failed to create group `%s`' % (group_name,))
# permission check inside
def update_user_group(self, apiuser, usergroupid, group_name=Optional(''),
description=Optional(''), owner=Optional(None),
active=Optional(True)):
"""
Updates given usergroup. This command can be executed only using api_key
belonging to user with admin rights or an admin of given user group
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param usergroupid: id of user group to update
:type usergroupid: str or int
:param group_name: name of new user group
:type group_name: str
:param description: group description
:type description: str
:param owner: owner of group.
:type owner: Optional(str or int)
:param active: group is active
:type active: Optional(bool)
OUTPUT::
id : <id_given_in_input>
result : {
"msg": 'updated user group ID:<user group id> <user group name>',
"user_group": <user_group_object>
}
error : null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"failed to update user group `<user group name>`"
}
"""
user_group = get_user_group_or_error(usergroupid)
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
# check if we have admin permission for this user group !
_perms = ('usergroup.admin',)
if not HasUserGroupPermissionAny(*_perms)(
user=apiuser, user_group_name=user_group.users_group_name):
raise JSONRPCError('user group `%s` does not exist' % (usergroupid,))
if not isinstance(owner, Optional):
owner = get_user_or_error(owner)
updates = {}
store_update(updates, group_name, 'users_group_name')
store_update(updates, description, 'user_group_description')
store_update(updates, owner, 'user')
store_update(updates, active, 'users_group_active')
try:
UserGroupModel().update(user_group, updates)
Session().commit()
return dict(
msg='updated user group ID:%s %s' % (user_group.users_group_id,
user_group.users_group_name),
user_group=user_group.get_api_data()
Refactored API...
r2526 )
Extended API...
r1500 except Exception:
Nicolas VINOT
Correct code style
r1593 log.error(traceback.format_exc())
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 raise JSONRPCError('failed to update user group `%s`' % (usergroupid,))
# permission check inside
def delete_user_group(self, apiuser, usergroupid):
"""
Delete given user group by user group id or name.
This command can be executed only using api_key
belonging to user with admin rights or an admin of given user group
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param usergroupid:
:type usergroupid: int
OUTPUT::
id : <id_given_in_input>
result : {
"msg": "deleted user group ID:<user_group_id> <user_group_name>"
}
error : null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"failed to delete user group ID:<user_group_id> <user_group_name>"
or
"RepoGroup assigned to <repo_groups_list>"
}
"""
user_group = get_user_group_or_error(usergroupid)
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
# check if we have admin permission for this user group !
_perms = ('usergroup.admin',)
if not HasUserGroupPermissionAny(*_perms)(
user=apiuser, user_group_name=user_group.users_group_name):
raise JSONRPCError('user group `%s` does not exist' % (usergroupid,))
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 try:
UserGroupModel().delete(user_group)
Session().commit()
return dict(
msg='deleted user group ID:%s %s' %
(user_group.users_group_id, user_group.users_group_name),
user_group=None
)
except UserGroupsAssignedException, e:
log.error(traceback.format_exc())
raise JSONRPCError(str(e))
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError('failed to delete user group ID:%s %s' %
(user_group.users_group_id,
user_group.users_group_name)
)
# permission check inside
def add_user_to_user_group(self, apiuser, usergroupid, userid):
"""
Adds a user to a user group. If user exists in that group success will be
`false`. This command can be executed only using api_key
belonging to user with admin rights or an admin of given user group
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param usergroupid:
:type usergroupid: int
Refactored API...
r2526 :param userid:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :type userid: int
OUTPUT::
id : <id_given_in_input>
result : {
"success": True|False # depends on if member is in group
"msg": "added member `<username>` to user group `<groupname>` |
User is already in that group"
}
error : null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"failed to add member to user group `<user_group_name>`"
}
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584 """
Refactored API...
r2526 user = get_user_or_error(userid)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 user_group = get_user_group_or_error(usergroupid)
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
# check if we have admin permission for this user group !
_perms = ('usergroup.admin',)
if not HasUserGroupPermissionAny(*_perms)(
user=apiuser, user_group_name=user_group.users_group_name):
raise JSONRPCError('user group `%s` does not exist' % (usergroupid,))
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Nicolas VINOT
Add API for repositories and groups (creation, permission)
r1586 try:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 ugm = UserGroupModel().add_user_to_group(user_group, user)
API changes...
r1989 success = True if ugm != True else False
Mads Kiilerich
"Users groups" is grammatically incorrect English - rename to "user groups"...
r3410 msg = 'added member `%s` to user group `%s`' % (
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 user.username, user_group.users_group_name
)
API changes...
r1989 msg = msg if success else 'User is already in that group'
Refactored API...
r2526 Session().commit()
API changes...
r1989
return dict(
success=success,
msg=msg
)
Nicolas VINOT
Implement all CRUD API operation for repo
r1587 except Exception:
Nicolas VINOT
Correct code style
r1593 log.error(traceback.format_exc())
Refactored API...
r2526 raise JSONRPCError(
Mads Kiilerich
"Users groups" is grammatically incorrect English - rename to "user groups"...
r3410 'failed to add member to user group `%s`' % (
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 user_group.users_group_name,
Refactored API...
r2526 )
)
API changes...
r1989
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # permission check inside
def remove_user_from_user_group(self, apiuser, usergroupid, userid):
API changes...
r1989 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 Removes a user from a user group. If user is not in given group success will
be `false`. This command can be executed only
using api_key belonging to user with admin rights or an admin of given user group
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param usergroupid:
:param userid:
API changes...
r1989
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 OUTPUT::
id : <id_given_in_input>
result: {
"success": True|False, # depends on if member is in group
"msg": "removed member <username> from user group <groupname> |
User wasn't in group"
}
error: null
API changes...
r1989 """
Refactored API...
r2526 user = get_user_or_error(userid)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 user_group = get_user_group_or_error(usergroupid)
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
# check if we have admin permission for this user group !
_perms = ('usergroup.admin',)
if not HasUserGroupPermissionAny(*_perms)(
user=apiuser, user_group_name=user_group.users_group_name):
raise JSONRPCError('user group `%s` does not exist' % (usergroupid,))
API changes...
r1989
try:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 success = UserGroupModel().remove_user_from_group(user_group, user)
Mads Kiilerich
"Users groups" is grammatically incorrect English - rename to "user groups"...
r3410 msg = 'removed member `%s` from user group `%s`' % (
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 user.username, user_group.users_group_name
)
API changes...
r1989 msg = msg if success else "User wasn't in group"
Refactored API...
r2526 Session().commit()
API changes...
r1989 return dict(success=success, msg=msg)
except Exception:
log.error(traceback.format_exc())
Refactored API...
r2526 raise JSONRPCError(
Mads Kiilerich
"Users groups" is grammatically incorrect English - rename to "user groups"...
r3410 'failed to remove member from user group `%s`' % (
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 user_group.users_group_name,
)
Refactored API...
r2526 )
Nicolas VINOT
Implement all CRUD API operation for repo
r1587
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # permission check inside
API get_user and get_repo methods can fetch by id or names
r2010 def get_repo(self, apiuser, repoid):
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 """
Gets an existing repository by it's name or repository_id. Members will return
either users_group or user associated to that repository. This command can be
executed only using api_key belonging to user with admin
rights or regular user that have at least read access to repository.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repoid: repository name or repository id
:type repoid: str or int
OUTPUT::
Nicolas VINOT
Implement all CRUD API operation for repo
r1587
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 id : <id_given_in_input>
result : {
{
"repo_id" : "<repo_id>",
"repo_name" : "<reponame>"
"repo_type" : "<repo_type>",
"clone_uri" : "<clone_uri>",
"enable_downloads": "<bool>",
"enable_locking": "<bool>",
"enable_statistics": "<bool>",
"private": "<bool>",
"created_on" : "<date_time_created>",
"description" : "<description>",
"landing_rev": "<landing_rev>",
"last_changeset": {
"author": "<full_author>",
"date": "<date_time_of_commit>",
"message": "<commit_message>",
"raw_id": "<raw_id>",
"revision": "<numeric_revision>",
"short_id": "<short_id>"
}
"owner": "<repo_owner>",
"fork_of": "<name_of_fork_parent>",
"members" : [
{
"name": "<username>",
"type" : "user",
"permission" : "repository.(read|write|admin)"
},
…
{
"name": "<usergroup name>",
"type" : "user_group",
"permission" : "usergroup.(read|write|admin)"
},
…
]
"followers": [<user_obj>, ...]
]
}
}
error : null
Nicolas VINOT
Implement all CRUD API operation for repo
r1587 """
Refactored API...
r2526 repo = get_repo_or_error(repoid)
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Updated boolean checks in API permissions calls
r3898 if not HasPermissionAnyApi('hg.admin')(user=apiuser):
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163 # check if we have admin permission for this repo !
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 perms = ('repository.admin', 'repository.write', 'repository.read')
if not HasRepoPermissionAnyApi(*perms)(user=apiuser, repo_name=repo.repo_name):
raise JSONRPCError('repository `%s` does not exist' % (repoid,))
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163
Nicolas VINOT
Implement all CRUD API operation for repo
r1587 members = []
aparkar
Added repository followers to the get_repo api function result.
r3195 followers = []
Nicolas VINOT
Implement all CRUD API operation for repo
r1587 for user in repo.repo_to_perm:
perm = user.permission.permission_name
user = user.user
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 user_data = {
'name': user.username,
'type': "user",
'permission': perm
}
Refactored API...
r2526 members.append(user_data)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 for user_group in repo.users_group_to_perm:
perm = user_group.permission.permission_name
user_group = user_group.users_group
user_group_data = {
'name': user_group.users_group_name,
'type': "user_group",
'permission': perm
}
members.append(user_group_data)
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
aparkar
Added repository followers to the get_repo api function result.
r3195 for user in repo.followers:
followers.append(user.user.get_api_data())
Refactored API...
r2526 data = repo.get_api_data()
data['members'] = members
aparkar
Added repository followers to the get_repo api function result.
r3195 data['followers'] = followers
Refactored API...
r2526 return data
Nicolas VINOT
Implement all CRUD API operation for repo
r1587
Updated boolean checks in API permissions calls
r3898 # permission check inside
Nicolas VINOT
Correct code style
r1593 def get_repos(self, apiuser):
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 """
Lists all existing repositories. This command can be executed only using
api_key belonging to user with admin rights or regular user that have
admin, write or read access to repository.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
OUTPUT::
Nicolas VINOT
Add API for repositories and groups (creation, permission)
r1586
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 id : <id_given_in_input>
result: [
{
"repo_id" : "<repo_id>",
"repo_name" : "<reponame>"
"repo_type" : "<repo_type>",
"clone_uri" : "<clone_uri>",
"private": : "<bool>",
"created_on" : "<datetimecreated>",
"description" : "<description>",
"landing_rev": "<landing_rev>",
"owner": "<repo_owner>",
"fork_of": "<name_of_fork_parent>",
"enable_downloads": "<bool>",
"enable_locking": "<bool>",
"enable_statistics": "<bool>",
},
…
]
error: null
Nicolas VINOT
Add API for repositories and groups (creation, permission)
r1586 """
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163 result = []
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 if not HasPermissionAnyApi('hg.admin')(user=apiuser):
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163 repos = RepoModel().get_all_user_repos(user=apiuser)
else:
repos = RepoModel().get_all()
Nicolas VINOT
Implement all CRUD API operation for repo
r1587
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163 for repo in repos:
Refactored API...
r2526 result.append(repo.get_api_data())
Nicolas VINOT
Add API for repositories and groups (creation, permission)
r1586 return result
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # permission check inside
Refactored API...
r2526 def get_repo_nodes(self, apiuser, repoid, revision, root_path,
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 ret_type=Optional('all')):
implements #330 api method for listing nodes at particular revision...
r1810 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 returns a list of nodes and it's children in a flat list for a given path
at given revision. It's possible to specify ret_type to show only `files` or
`dirs`. This command can be executed only using api_key belonging to
user with admin rights or regular user that have at least read access to repository.
implements #330 api method for listing nodes at particular revision...
r1810
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repoid: repository name or repository id
:type repoid: str or int
implements #330 api method for listing nodes at particular revision...
r1810 :param revision: revision for which listing should be done
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :type revision: str
implements #330 api method for listing nodes at particular revision...
r1810 :param root_path: path from which start displaying
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :type root_path: str
implements #330 api method for listing nodes at particular revision...
r1810 :param ret_type: return type 'all|files|dirs' nodes
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :type ret_type: Optional(str)
OUTPUT::
id : <id_given_in_input>
result: [
{
"name" : "<name>"
"type" : "<type>",
},
…
]
error: null
implements #330 api method for listing nodes at particular revision...
r1810 """
Refactored API...
r2526 repo = get_repo_or_error(repoid)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
# check if we have admin permission for this repo !
perms = ('repository.admin', 'repository.write', 'repository.read')
if not HasRepoPermissionAnyApi(*perms)(user=apiuser, repo_name=repo.repo_name):
raise JSONRPCError('repository `%s` does not exist' % (repoid,))
ret_type = Optional.extract(ret_type)
_map = {}
implements #330 api method for listing nodes at particular revision...
r1810 try:
Refactored API...
r2526 _d, _f = ScmModel().get_nodes(repo, revision, root_path,
implements #330 api method for listing nodes at particular revision...
r1810 flat=False)
_map = {
'all': _d + _f,
'files': _f,
'dirs': _d,
}
return _map[ret_type]
except KeyError:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 raise JSONRPCError('ret_type must be one of %s'
% (','.join(_map.keys())))
Refactored API...
r2526 except Exception:
log.error(traceback.format_exc())
raise JSONRPCError(
'failed to get repo: `%s` nodes' % repo.repo_name
)
implements #330 api method for listing nodes at particular revision...
r1810
Nicolas VINOT
Correct code style
r1593 @HasPermissionAnyDecorator('hg.admin', 'hg.create.repository')
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163 def create_repo(self, apiuser, repo_name, owner=Optional(OAttr('apiuser')),
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 repo_type=Optional('hg'), description=Optional(''),
private=Optional(False), clone_uri=Optional(None),
landing_rev=Optional('rev:tip'),
Default parameters are now also used for creating repos using API calls, and initial repo scanner...
r3115 enable_statistics=Optional(False),
enable_locking=Optional(False),
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 enable_downloads=Optional(False),
copy_permissions=Optional(False)):
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 Creates a repository. If repository name contains "/", all needed repository
groups will be created. For example "foo/bar/baz" will create groups
"foo", "bar" (with "foo" as parent), and create "baz" repository with
"bar" as group. This command can be executed only using api_key
belonging to user with admin rights or regular user that have create
repository permission. Regular users cannot specify owner parameter
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repo_name: repository name
:type repo_name: str
:param owner: user_id or username
:type owner: Optional(str)
:param repo_type: 'hg' or 'git'
:type repo_type: Optional(str)
:param description: repository description
:type description: Optional(str)
implements #329...
r1793 :param private:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :type private: bool
added clone_uri to API method for creating users
r2006 :param clone_uri:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :type clone_uri: str
:param landing_rev: <rev_type>:<rev>
:type landing_rev: str
:param enable_locking:
:type enable_locking: bool
:param enable_downloads:
:type enable_downloads: bool
:param enable_statistics:
:type enable_statistics: bool
:param copy_permissions: Copy permission from group that repository is
beeing created.
:type copy_permissions: bool
OUTPUT::
id : <id_given_in_input>
result: {
"msg": "Created new repository `<reponame>`",
"success": true,
"task": "<celery task id or None if done sync>"
}
error: null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
'failed to create repository `<repo_name>`
}
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 if not HasPermissionAnyApi('hg.admin')(user=apiuser):
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163 if not isinstance(owner, Optional):
#forbid setting owner for non-admins
raise JSONRPCError(
'Only RhodeCode admin can specify `owner` param'
)
if isinstance(owner, Optional):
owner = apiuser.user_id
Refactored API...
r2526 owner = get_user_or_error(owner)
if RepoModel().get_by_repo_name(repo_name):
raise JSONRPCError("repo `%s` already exist" % repo_name)
Default parameters are now also used for creating repos using API calls, and initial repo scanner...
r3115 defs = RhodeCodeSetting.get_default_repo_settings(strip_prefix=True)
if isinstance(private, Optional):
private = defs.get('repo_private') or Optional.extract(private)
if isinstance(repo_type, Optional):
repo_type = defs.get('repo_type')
if isinstance(enable_statistics, Optional):
enable_statistics = defs.get('repo_enable_statistics')
if isinstance(enable_locking, Optional):
enable_locking = defs.get('repo_enable_locking')
if isinstance(enable_downloads, Optional):
enable_downloads = defs.get('repo_enable_downloads')
Refactored API...
r2526 clone_uri = Optional.extract(clone_uri)
description = Optional.extract(description)
landing_rev = Optional.extract(landing_rev)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 copy_permissions = Optional.extract(copy_permissions)
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Nicolas VINOT
Add API for repositories and groups (creation, permission)
r1586 try:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 repo_name_cleaned = repo_name.split('/')[-1]
Refactored API...
r2526 # create structure of groups and return the last group
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 repo_group = map_groups(repo_name)
data = dict(
repo_name=repo_name_cleaned,
repo_name_full=repo_name,
Refactored API...
r2526 repo_type=repo_type,
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 repo_description=description,
Refactored API...
r2526 owner=owner,
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 repo_private=private,
Refactored API...
r2526 clone_uri=clone_uri,
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 repo_group=repo_group,
repo_landing_rev=landing_rev,
Default parameters are now also used for creating repos using API calls, and initial repo scanner...
r3115 enable_statistics=enable_statistics,
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 enable_locking=enable_locking,
Default parameters are now also used for creating repos using API calls, and initial repo scanner...
r3115 enable_downloads=enable_downloads,
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 repo_copy_permissions=copy_permissions,
implements #329...
r1793 )
Refactored API...
r2526
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 task = RepoModel().create(form_data=data, cur_user=owner)
from celery.result import BaseAsyncResult
task_id = None
if isinstance(task, BaseAsyncResult):
task_id = task.task_id
# no commit, it's done in RepoModel, or async via celery
api review...
r1843 return dict(
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 msg="Created new repository `%s`" % (repo_name,),
success=True, # cannot return the repo data here since fork
# cann be done async
task=task_id
api review...
r1843 )
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584 except Exception:
Nicolas VINOT
Correct code style
r1593 log.error(traceback.format_exc())
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 raise JSONRPCError(
'failed to create repository `%s`' % (repo_name,))
Refactored API...
r2526
backported update_repo API method from rhodecode-pam
r3959 # permission check inside
def update_repo(self, apiuser, repoid, name=Optional(None),
owner=Optional(OAttr('apiuser')),
group=Optional(None),
description=Optional(''), private=Optional(False),
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 clone_uri=Optional(None), landing_rev=Optional('rev:tip'),
backported update_repo API method from rhodecode-pam
r3959 enable_statistics=Optional(False),
enable_locking=Optional(False),
enable_downloads=Optional(False)):
"""
Updates repo
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repoid: repository name or repository id
:type repoid: str or int
:param name:
:param owner:
:param group:
:param description:
:param private:
:param clone_uri:
:param landing_rev:
:param enable_statistics:
:param enable_locking:
:param enable_downloads:
"""
repo = get_repo_or_error(repoid)
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
# check if we have admin permission for this repo !
if not HasRepoPermissionAnyApi('repository.admin')(user=apiuser,
repo_name=repo.repo_name):
raise JSONRPCError('repository `%s` does not exist' % (repoid,))
updates = {
# update function requires this.
'repo_name': repo.repo_name
}
repo_group = group
if not isinstance(repo_group, Optional):
repo_group = get_repo_group_or_error(repo_group)
repo_group = repo_group.group_id
try:
store_update(updates, name, 'repo_name')
store_update(updates, repo_group, 'repo_group')
store_update(updates, owner, 'user')
store_update(updates, description, 'repo_description')
store_update(updates, private, 'repo_private')
store_update(updates, clone_uri, 'clone_uri')
store_update(updates, landing_rev, 'repo_landing_rev')
store_update(updates, enable_statistics, 'repo_enable_statistics')
store_update(updates, enable_locking, 'repo_enable_locking')
store_update(updates, enable_downloads, 'repo_enable_downloads')
RepoModel().update(repo, **updates)
Session().commit()
return dict(
msg='updated repo ID:%s %s' % (repo.repo_id, repo.repo_name),
repository=repo.get_api_data()
)
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError('failed to update repo `%s`' % repoid)
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163 @HasPermissionAnyDecorator('hg.admin', 'hg.fork.repository')
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 def fork_repo(self, apiuser, repoid, fork_name,
owner=Optional(OAttr('apiuser')),
Implemented #354 added forking option to API
r2653 description=Optional(''), copy_permissions=Optional(False),
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 private=Optional(False), landing_rev=Optional('rev:tip')):
"""
Creates a fork of given repo. In case of using celery this will
immidiatelly return success message, while fork is going to be created
asynchronous. This command can be executed only using api_key belonging to
user with admin rights or regular user that have fork permission, and at least
read access to forking repository. Regular users cannot specify owner parameter.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repoid: repository name or repository id
:type repoid: str or int
:param fork_name:
:param owner:
:param description:
:param copy_permissions:
:param private:
:param landing_rev:
INPUT::
id : <id_for_response>
api_key : "<api_key>"
args: {
"repoid" : "<reponame or repo_id>",
"fork_name": "<forkname>",
"owner": "<username or user_id = Optional(=apiuser)>",
"description": "<description>",
"copy_permissions": "<bool>",
"private": "<bool>",
"landing_rev": "<landing_rev>"
}
OUTPUT::
id : <id_given_in_input>
result: {
"msg": "Created fork of `<reponame>` as `<forkname>`",
"success": true,
"task": "<celery task id or None if done sync>"
}
error: null
"""
Implemented #354 added forking option to API
r2653 repo = get_repo_or_error(repoid)
repo_name = repo.repo_name
_repo = RepoModel().get_by_repo_name(fork_name)
if _repo:
type_ = 'fork' if _repo.fork else 'repo'
raise JSONRPCError("%s `%s` already exist" % (type_, fork_name))
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163 if HasPermissionAnyApi('hg.admin')(user=apiuser):
pass
elif HasRepoPermissionAnyApi('repository.admin',
'repository.write',
'repository.read')(user=apiuser,
repo_name=repo.repo_name):
if not isinstance(owner, Optional):
#forbid setting owner for non-admins
raise JSONRPCError(
'Only RhodeCode admin can specify `owner` param'
)
else:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 raise JSONRPCError('repository `%s` does not exist' % (repoid,))
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163
if isinstance(owner, Optional):
owner = apiuser.user_id
owner = get_user_or_error(owner)
Implemented #354 added forking option to API
r2653 try:
# create structure of groups and return the last group
group = map_groups(fork_name)
form_data = dict(
repo_name=fork_name,
repo_name_full=fork_name,
repo_group=group,
repo_type=repo.repo_type,
description=Optional.extract(description),
private=Optional.extract(private),
copy_permissions=Optional.extract(copy_permissions),
landing_rev=Optional.extract(landing_rev),
update_after_clone=False,
fork_parent_id=repo.repo_id,
)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 task = RepoModel().create_fork(form_data, cur_user=owner)
# no commit, it's done in RepoModel, or async via celery
from celery.result import BaseAsyncResult
task_id = None
if isinstance(task, BaseAsyncResult):
task_id = task.task_id
Implemented #354 added forking option to API
r2653 return dict(
msg='Created fork of `%s` as `%s`' % (repo.repo_name,
fork_name),
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 success=True, # cannot return the repo data here since fork
# cann be done async
task=task_id
Implemented #354 added forking option to API
r2653 )
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError(
'failed to fork repository `%s` as `%s`' % (repo_name,
fork_name)
)
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # permission check inside
def delete_repo(self, apiuser, repoid, forks=Optional('')):
implements #361 API method for deleting repositories
r2003 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 Deletes a repository. This command can be executed only using api_key belonging
to user with admin rights or regular user that have admin access to repository.
When `forks` param is set it's possible to detach or delete forks of deleting
repository
implements #361 API method for deleting repositories
r2003
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repoid: repository name or repository id
:type repoid: str or int
:param forks: `detach` or `delete`, what do do with attached forks for repo
:type forks: Optional(str)
OUTPUT::
id : <id_given_in_input>
result: {
"msg": "Deleted repository `<reponame>`",
"success": true
}
error: null
implements #361 API method for deleting repositories
r2003 """
Refactored API...
r2526 repo = get_repo_or_error(repoid)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 if not HasPermissionAnyApi('hg.admin')(user=apiuser):
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163 # check if we have admin permission for this repo !
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 if not HasRepoPermissionAnyApi('repository.admin')(user=apiuser,
repo_name=repo.repo_name):
raise JSONRPCError('repository `%s` does not exist' % (repoid,))
API methods create_repo, fork_repo, delete_repo, get_repo, get_repos...
r3163
implements #361 API method for deleting repositories
r2003 try:
recursive forks detach...
r3641 handle_forks = Optional.extract(forks)
_forks_msg = ''
_forks = [f for f in repo.forks]
if handle_forks == 'detach':
Remove translation calls in API
r3884 _forks_msg = ' ' + 'Detached %s forks' % len(_forks)
recursive forks detach...
r3641 elif handle_forks == 'delete':
Remove translation calls in API
r3884 _forks_msg = ' ' + 'Deleted %s forks' % len(_forks)
recursive forks detach...
r3641 elif _forks:
raise JSONRPCError(
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 'Cannot delete `%s` it still contains attached forks' %
(repo.repo_name,)
recursive forks detach...
r3641 )
RepoModel().delete(repo, forks=forks)
Refactored API...
r2526 Session().commit()
implements #361 API method for deleting repositories
r2003 return dict(
recursive forks detach...
r3641 msg='Deleted repository `%s`%s' % (repo.repo_name, _forks_msg),
Refactored API...
r2526 success=True
implements #361 API method for deleting repositories
r2003 )
except Exception:
log.error(traceback.format_exc())
Refactored API...
r2526 raise JSONRPCError(
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 'failed to delete repository `%s`' % (repo.repo_name,)
Refactored API...
r2526 )
implements #361 API method for deleting repositories
r2003
Implemented API calls for non-admin users for locking/unlocking repositories
r3161 @HasPermissionAllDecorator('hg.admin')
Refactored API...
r2526 def grant_user_permission(self, apiuser, repoid, userid, perm):
Nicolas VINOT
Add API for repositories and groups (creation, permission)
r1586 """
#227 Initial version of repository groups permissions system...
r1982 Grant permission for user on given repository, or update existing one
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 if found. This command can be executed only using api_key belonging to user
with admin rights.
Nicolas VINOT
Improve API with user/group/repo CRUD methods
r1584
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repoid: repository name or repository id
:type repoid: str or int
Refactored API...
r2526 :param userid:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 :param perm: (repository.(none|read|write|admin))
:type perm: str
OUTPUT::
id : <id_given_in_input>
result: {
"msg" : "Granted perm: `<perm>` for user: `<username>` in repo: `<reponame>`",
"success": true
}
error: null
Nicolas VINOT
Add API for repositories and groups (creation, permission)
r1586 """
Refactored API...
r2526 repo = get_repo_or_error(repoid)
user = get_user_or_error(userid)
perm = get_perm_or_error(perm)
Nicolas VINOT
Add API for repositories and groups (creation, permission)
r1586
try:
#227 Initial version of repository groups permissions system...
r1982 RepoModel().grant_user_permission(repo=repo, user=user, perm=perm)
Refactored API...
r2526 Session().commit()
implements #329...
r1793 return dict(
Refactored API...
r2526 msg='Granted perm: `%s` for user: `%s` in repo: `%s`' % (
perm.permission_name, user.username, repo.repo_name
),
success=True
implements #329...
r1793 )
Nicolas VINOT
Add API for repositories and groups (creation, permission)
r1586 except Exception:
Nicolas VINOT
Correct code style
r1593 log.error(traceback.format_exc())
implements #329...
r1793 raise JSONRPCError(
Refactored API...
r2526 'failed to edit permission for user: `%s` in repo: `%s`' % (
userid, repoid
implements #329...
r1793 )
)
Implemented API calls for non-admin users for locking/unlocking repositories
r3161 @HasPermissionAllDecorator('hg.admin')
Refactored API...
r2526 def revoke_user_permission(self, apiuser, repoid, userid):
#227 Initial version of repository groups permissions system...
r1982 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 Revoke permission for user on given repository. This command can be executed
only using api_key belonging to user with admin rights.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repoid: repository name or repository id
:type repoid: str or int
:param userid:
#227 Initial version of repository groups permissions system...
r1982
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 OUTPUT::
id : <id_given_in_input>
result: {
"msg" : "Revoked perm for user: `<username>` in repo: `<reponame>`",
"success": true
}
error: null
implements #329...
r1793 """
#227 Initial version of repository groups permissions system...
r1982
Refactored API...
r2526 repo = get_repo_or_error(repoid)
user = get_user_or_error(userid)
#227 Initial version of repository groups permissions system...
r1982 try:
Refactored API...
r2526 RepoModel().revoke_user_permission(repo=repo, user=user)
Session().commit()
#227 Initial version of repository groups permissions system...
r1982 return dict(
Refactored API...
r2526 msg='Revoked perm for user: `%s` in repo: `%s`' % (
user.username, repo.repo_name
),
success=True
#227 Initial version of repository groups permissions system...
r1982 )
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError(
Refactored API...
r2526 'failed to edit permission for user: `%s` in repo: `%s`' % (
userid, repoid
#227 Initial version of repository groups permissions system...
r1982 )
)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # permission check inside
def grant_user_group_permission(self, apiuser, repoid, usergroupid, perm):
#227 Initial version of repository groups permissions system...
r1982 """
Mads Kiilerich
"Users groups" is grammatically incorrect English - rename to "user groups"...
r3410 Grant permission for user group on given repository, or update
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 existing one if found. This command can be executed only using
api_key belonging to user with admin rights.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repoid: repository name or repository id
:type repoid: str or int
:param usergroupid: id of usergroup
:type usergroupid: str or int
:param perm: (repository.(none|read|write|admin))
:type perm: str
OUTPUT::
#227 Initial version of repository groups permissions system...
r1982
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 id : <id_given_in_input>
result : {
"msg" : "Granted perm: `<perm>` for group: `<usersgroupname>` in repo: `<reponame>`",
"success": true
}
error : null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"failed to edit permission for user group: `<usergroup>` in repo `<repo>`'
}
implements #329...
r1793 """
Refactored API...
r2526 repo = get_repo_or_error(repoid)
perm = get_perm_or_error(perm)
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 user_group = get_user_group_or_error(usergroupid)
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
# check if we have admin permission for this repo !
_perms = ('repository.admin',)
if not HasRepoPermissionAnyApi(*_perms)(
user=apiuser, repo_name=repo.repo_name):
raise JSONRPCError('repository `%s` does not exist' % (repoid,))
# check if we have at least read permission for this user group !
_perms = ('usergroup.read', 'usergroup.write', 'usergroup.admin',)
if not HasUserGroupPermissionAny(*_perms)(
user=apiuser, user_group_name=user_group.users_group_name):
raise JSONRPCError('user group `%s` does not exist' % (usergroupid,))
implements #329...
r1793
try:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 RepoModel().grant_user_group_permission(
repo=repo, group_name=user_group, perm=perm)
#227 Initial version of repository groups permissions system...
r1982
Refactored API...
r2526 Session().commit()
implements #329...
r1793 return dict(
Mads Kiilerich
"Users groups" is grammatically incorrect English - rename to "user groups"...
r3410 msg='Granted perm: `%s` for user group: `%s` in '
Refactored API...
r2526 'repo: `%s`' % (
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 perm.permission_name, user_group.users_group_name,
repo.repo_name
),
success=True
)
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError(
'failed to edit permission for user group: `%s` in '
'repo: `%s`' % (
usergroupid, repo.repo_name
)
)
# permission check inside
def revoke_user_group_permission(self, apiuser, repoid, usergroupid):
"""
Revoke permission for user group on given repository. This command can be
executed only using api_key belonging to user with admin rights.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repoid: repository name or repository id
:type repoid: str or int
:param usergroupid:
OUTPUT::
id : <id_given_in_input>
result: {
"msg" : "Revoked perm for group: `<usersgroupname>` in repo: `<reponame>`",
"success": true
}
error: null
"""
repo = get_repo_or_error(repoid)
user_group = get_user_group_or_error(usergroupid)
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
# check if we have admin permission for this repo !
_perms = ('repository.admin',)
if not HasRepoPermissionAnyApi(*_perms)(
user=apiuser, repo_name=repo.repo_name):
raise JSONRPCError('repository `%s` does not exist' % (repoid,))
# check if we have at least read permission for this user group !
_perms = ('usergroup.read', 'usergroup.write', 'usergroup.admin',)
if not HasUserGroupPermissionAny(*_perms)(
user=apiuser, user_group_name=user_group.users_group_name):
raise JSONRPCError('user group `%s` does not exist' % (usergroupid,))
try:
RepoModel().revoke_user_group_permission(
repo=repo, group_name=user_group)
Session().commit()
return dict(
msg='Revoked perm for user group: `%s` in repo: `%s`' % (
user_group.users_group_name, repo.repo_name
Refactored API...
r2526 ),
success=True
)
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError(
Mads Kiilerich
"Users groups" is grammatically incorrect English - rename to "user groups"...
r3410 'failed to edit permission for user group: `%s` in '
Refactored API...
r2526 'repo: `%s`' % (
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 user_group.users_group_name, repo.repo_name
implements #329...
r1793 )
)
Refactored API...
r2526
Implemented API calls for non-admin users for locking/unlocking repositories
r3161 @HasPermissionAllDecorator('hg.admin')
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 def get_repo_group(self, apiuser, repogroupid):
"""
Returns given repo group together with permissions, and repositories
inside the group
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repogroupid: id/name of repository group
:type repogroupid: str or int
"""
repo_group = get_repo_group_or_error(repogroupid)
members = []
for user in repo_group.repo_group_to_perm:
perm = user.permission.permission_name
user = user.user
user_data = {
'name': user.username,
'type': "user",
'permission': perm
}
members.append(user_data)
for user_group in repo_group.users_group_to_perm:
perm = user_group.permission.permission_name
user_group = user_group.users_group
user_group_data = {
'name': user_group.users_group_name,
'type': "user_group",
'permission': perm
}
members.append(user_group_data)
data = repo_group.get_api_data()
data["members"] = members
return data
@HasPermissionAllDecorator('hg.admin')
def get_repo_groups(self, apiuser):
Refactored API...
r2526 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 Returns all repository groups
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
"""
result = []
for repo_group in RepoGroupModel().get_all():
result.append(repo_group.get_api_data())
return result
@HasPermissionAllDecorator('hg.admin')
def create_repo_group(self, apiuser, group_name, description=Optional(''),
owner=Optional(OAttr('apiuser')),
parent=Optional(None),
copy_permissions=Optional(False)):
"""
Creates a repository group. This command can be executed only using
api_key belonging to user with admin rights.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param group_name:
:type group_name:
:param description:
:type description:
:param owner:
:type owner:
:param parent:
:type parent:
:param copy_permissions:
:type copy_permissions:
OUTPUT::
id : <id_given_in_input>
result : {
"msg": "created new repo group `<repo_group_name>`"
"repo_group": <repogroup_object>
}
error : null
ERROR OUTPUT::
Refactored API...
r2526
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 id : <id_given_in_input>
result : null
error : {
failed to create repo group `<repogroupid>`
}
Refactored API...
r2526 """
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 if RepoGroup.get_by_group_name(group_name):
raise JSONRPCError("repo group `%s` already exist" % (group_name,))
if isinstance(owner, Optional):
owner = apiuser.user_id
group_description = Optional.extract(description)
parent_group = Optional.extract(parent)
if not isinstance(parent, Optional):
parent_group = get_repo_group_or_error(parent_group)
copy_permissions = Optional.extract(copy_permissions)
try:
repo_group = RepoGroupModel().create(
group_name=group_name,
group_description=group_description,
owner=owner,
parent=parent_group,
copy_permissions=copy_permissions
)
Session().commit()
return dict(
msg='created new repo group `%s`' % group_name,
repo_group=repo_group.get_api_data()
)
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError('failed to create repo group `%s`' % (group_name,))
@HasPermissionAllDecorator('hg.admin')
def update_repo_group(self, apiuser, repogroupid, group_name=Optional(''),
description=Optional(''),
owner=Optional(OAttr('apiuser')),
parent=Optional(None), enable_locking=Optional(False)):
repo_group = get_repo_group_or_error(repogroupid)
updates = {}
try:
store_update(updates, group_name, 'group_name')
store_update(updates, description, 'group_description')
store_update(updates, owner, 'owner')
store_update(updates, parent, 'parent_group')
store_update(updates, enable_locking, 'enable_locking')
repo_group = RepoGroupModel().update(repo_group, updates)
Session().commit()
return dict(
msg='updated repository group ID:%s %s' % (repo_group.group_id,
repo_group.group_name),
repo_group=repo_group.get_api_data()
)
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError('failed to update repository group `%s`'
% (repogroupid,))
@HasPermissionAllDecorator('hg.admin')
def delete_repo_group(self, apiuser, repogroupid):
"""
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repogroupid: name or id of repository group
:type repogroupid: str or int
OUTPUT::
id : <id_given_in_input>
result : {
'msg': 'deleted repo group ID:<repogroupid> <repogroupname>
'repo_group': null
}
error : null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"failed to delete repo group ID:<repogroupid> <repogroupname>"
}
"""
repo_group = get_repo_group_or_error(repogroupid)
Refactored API...
r2526
try:
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 RepoGroupModel().delete(repo_group)
Refactored API...
r2526 Session().commit()
return dict(
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 msg='deleted repo group ID:%s %s' %
(repo_group.group_id, repo_group.group_name),
repo_group=None
)
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError('failed to delete repo group ID:%s %s' %
(repo_group.group_id, repo_group.group_name)
)
# permission check inside
def grant_user_permission_to_repo_group(self, apiuser, repogroupid, userid,
perm, apply_to_children=Optional('none')):
"""
Grant permission for user on given repository group, or update existing
one if found. This command can be executed only using api_key belonging
to user with admin rights, or user who has admin right to given repository
group.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repogroupid: name or id of repository group
:type repogroupid: str or int
:param userid:
:param perm: (group.(none|read|write|admin))
:type perm: str
:param apply_to_children: 'none', 'repos', 'groups', 'all'
:type apply_to_children: str
OUTPUT::
id : <id_given_in_input>
result: {
"msg" : "Granted perm: `<perm>` (recursive:<apply_to_children>) for user: `<username>` in repo group: `<repo_group_name>`",
"success": true
}
error: null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"failed to edit permission for user: `<userid>` in repo group: `<repo_group_name>`"
}
"""
repo_group = get_repo_group_or_error(repogroupid)
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
# check if we have admin permission for this repo group !
if not HasRepoGroupPermissionAnyApi('group.admin')(user=apiuser,
group_name=repo_group.group_name):
raise JSONRPCError('repository group `%s` does not exist' % (repogroupid,))
user = get_user_or_error(userid)
perm = get_perm_or_error(perm, prefix='group.')
apply_to_children = Optional.extract(apply_to_children)
try:
RepoGroupModel().add_permission(repo_group=repo_group,
obj=user,
obj_type="user",
perm=perm,
recursive=apply_to_children)
Session().commit()
return dict(
msg='Granted perm: `%s` (recursive:%s) for user: `%s` in repo group: `%s`' % (
perm.permission_name, apply_to_children, user.username, repo_group.name
Refactored API...
r2526 ),
success=True
)
implements #329...
r1793 except Exception:
log.error(traceback.format_exc())
raise JSONRPCError(
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 'failed to edit permission for user: `%s` in repo group: `%s`' % (
userid, repo_group.name))
# permission check inside
def revoke_user_permission_from_repo_group(self, apiuser, repogroupid, userid,
apply_to_children=Optional('none')):
"""
Revoke permission for user on given repository group. This command can
be executed only using api_key belonging to user with admin rights, or
user who has admin right to given repository group.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repogroupid: name or id of repository group
:type repogroupid: str or int
:param userid:
:type userid:
:param apply_to_children: 'none', 'repos', 'groups', 'all'
:type apply_to_children: str
OUTPUT::
id : <id_given_in_input>
result: {
"msg" : "Revoked perm (recursive:<apply_to_children>) for user: `<username>` in repo group: `<repo_group_name>`",
"success": true
}
error: null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"failed to edit permission for user: `<userid>` in repo group: `<repo_group_name>`"
}
"""
repo_group = get_repo_group_or_error(repogroupid)
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
# check if we have admin permission for this repo group !
if not HasRepoGroupPermissionAnyApi('group.admin')(user=apiuser,
group_name=repo_group.group_name):
raise JSONRPCError('repository group `%s` does not exist' % (repogroupid,))
user = get_user_or_error(userid)
apply_to_children = Optional.extract(apply_to_children)
try:
RepoGroupModel().delete_permission(repo_group=repo_group,
obj=user,
obj_type="user",
recursive=apply_to_children)
Session().commit()
return dict(
msg='Revoked perm (recursive:%s) for user: `%s` in repo group: `%s`' % (
apply_to_children, user.username, repo_group.name
),
success=True
)
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError(
'failed to edit permission for user: `%s` in repo group: `%s`' % (
userid, repo_group.name))
# permission check inside
def grant_user_group_permission_to_repo_group(
self, apiuser, repogroupid, usergroupid, perm,
apply_to_children=Optional('none'),):
"""
Grant permission for user group on given repository group, or update
existing one if found. This command can be executed only using
api_key belonging to user with admin rights, or user who has admin
right to given repository group.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repogroupid: name or id of repository group
:type repogroupid: str or int
:param usergroupid: id of usergroup
:type usergroupid: str or int
:param perm: (group.(none|read|write|admin))
:type perm: str
:param apply_to_children: 'none', 'repos', 'groups', 'all'
:type apply_to_children: str
OUTPUT::
id : <id_given_in_input>
result : {
"msg" : "Granted perm: `<perm>` (recursive:<apply_to_children>) for user group: `<usersgroupname>` in repo group: `<repo_group_name>`",
"success": true
}
error : null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"failed to edit permission for user group: `<usergroup>` in repo group: `<repo_group_name>`"
}
"""
repo_group = get_repo_group_or_error(repogroupid)
perm = get_perm_or_error(perm, prefix='group.')
user_group = get_user_group_or_error(usergroupid)
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
# check if we have admin permission for this repo group !
_perms = ('group.admin',)
if not HasRepoGroupPermissionAnyApi(*_perms)(
user=apiuser, group_name=repo_group.group_name):
raise JSONRPCError(
'repository group `%s` does not exist' % (repogroupid,))
# check if we have at least read permission for this user group !
_perms = ('usergroup.read', 'usergroup.write', 'usergroup.admin',)
if not HasUserGroupPermissionAny(*_perms)(
user=apiuser, user_group_name=user_group.users_group_name):
raise JSONRPCError(
'user group `%s` does not exist' % (usergroupid,))
apply_to_children = Optional.extract(apply_to_children)
try:
RepoGroupModel().add_permission(repo_group=repo_group,
obj=user_group,
obj_type="user_group",
perm=perm,
recursive=apply_to_children)
Session().commit()
return dict(
msg='Granted perm: `%s` (recursive:%s) for user group: `%s` in repo group: `%s`' % (
perm.permission_name, apply_to_children,
user_group.users_group_name, repo_group.name
),
success=True
)
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError(
Mads Kiilerich
"Users groups" is grammatically incorrect English - rename to "user groups"...
r3410 'failed to edit permission for user group: `%s` in '
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 'repo group: `%s`' % (
usergroupid, repo_group.name
implements #329...
r1793 )
)
Implemented simple gist functionality ref #530....
r3840
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 # permission check inside
def revoke_user_group_permission_from_repo_group(
self, apiuser, repogroupid, usergroupid,
apply_to_children=Optional('none')):
"""
Revoke permission for user group on given repository. This command can be
executed only using api_key belonging to user with admin rights, or
user who has admin right to given repository group.
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param repogroupid: name or id of repository group
:type repogroupid: str or int
:param usergroupid:
:param apply_to_children: 'none', 'repos', 'groups', 'all'
:type apply_to_children: str
OUTPUT::
id : <id_given_in_input>
result: {
"msg" : "Revoked perm (recursive:<apply_to_children>) for user group: `<usersgroupname>` in repo group: `<repo_group_name>`",
"success": true
}
error: null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"failed to edit permission for user group: `<usergroup>` in repo group: `<repo_group_name>`"
}
"""
repo_group = get_repo_group_or_error(repogroupid)
user_group = get_user_group_or_error(usergroupid)
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
# check if we have admin permission for this repo group !
_perms = ('group.admin',)
if not HasRepoGroupPermissionAnyApi(*_perms)(
user=apiuser, group_name=repo_group.group_name):
raise JSONRPCError(
'repository group `%s` does not exist' % (repogroupid,))
# check if we have at least read permission for this user group !
_perms = ('usergroup.read', 'usergroup.write', 'usergroup.admin',)
if not HasUserGroupPermissionAny(*_perms)(
user=apiuser, user_group_name=user_group.users_group_name):
raise JSONRPCError(
'user group `%s` does not exist' % (usergroupid,))
apply_to_children = Optional.extract(apply_to_children)
try:
RepoGroupModel().delete_permission(repo_group=repo_group,
obj=user_group,
obj_type="user_group",
recursive=apply_to_children)
Session().commit()
return dict(
msg='Revoked perm (recursive:%s) for user group: `%s` in repo group: `%s`' % (
apply_to_children, user_group.users_group_name, repo_group.name
),
success=True
)
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError(
'failed to edit permission for user group: `%s` in repo group: `%s`' % (
user_group.users_group_name, repo_group.name
)
)
def get_gist(self, apiuser, gistid):
"""
Get given gist by id
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param gistid: id of private or public gist
:type gistid: str
"""
gist = get_gist_or_error(gistid)
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
if gist.gist_owner != apiuser.user_id:
raise JSONRPCError('gist `%s` does not exist' % (gistid,))
return gist.get_api_data()
def get_gists(self, apiuser, userid=Optional(OAttr('apiuser'))):
"""
Get all gists for given user. If userid is empty returned gists
are for user who called the api
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param userid: user to get gists for
:type userid: Optional(str or int)
"""
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
# make sure normal user does not pass someone else userid,
# he is not allowed to do that
if not isinstance(userid, Optional) and userid != apiuser.user_id:
raise JSONRPCError(
'userid is not the same as your user'
)
if isinstance(userid, Optional):
user_id = apiuser.user_id
else:
user_id = get_user_or_error(userid).user_id
gists = []
_gists = Gist().query()\
.filter(or_(Gist.gist_expires == -1, Gist.gist_expires >= time.time()))\
.filter(Gist.gist_owner == user_id)\
.order_by(Gist.created_on.desc())
for gist in _gists:
gists.append(gist.get_api_data())
return gists
Implemented simple gist functionality ref #530....
r3840 def create_gist(self, apiuser, files, owner=Optional(OAttr('apiuser')),
sync gist api and cli with rhodecode-pam....
r3958 gist_type=Optional(Gist.GIST_PUBLIC), lifetime=Optional(-1),
description=Optional('')):
Implemented simple gist functionality ref #530....
r3840
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116 """
Creates new Gist
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param files: files to be added to gist
{'filename': {'content':'...', 'lexer': null},
'filename2': {'content':'...', 'lexer': null}}
:type files: dict
:param owner: gist owner, defaults to api method caller
:type owner: Optional(str or int)
:param gist_type: type of gist 'public' or 'private'
:type gist_type: Optional(str)
:param lifetime: time in minutes of gist lifetime
:type lifetime: Optional(int)
:param description: gist description
:type description: Optional(str)
OUTPUT::
id : <id_given_in_input>
result : {
"msg": "created new gist",
"gist": {}
}
error : null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"failed to create gist"
}
"""
Implemented simple gist functionality ref #530....
r3840 try:
if isinstance(owner, Optional):
owner = apiuser.user_id
owner = get_user_or_error(owner)
sync gist api and cli with rhodecode-pam....
r3958 description = Optional.extract(description)
Implemented simple gist functionality ref #530....
r3840 gist_type = Optional.extract(gist_type)
sync gist api and cli with rhodecode-pam....
r3958 lifetime = Optional.extract(lifetime)
Implemented simple gist functionality ref #530....
r3840
gist = GistModel().create(description=description,
owner=owner,
gist_mapping=files,
gist_type=gist_type,
sync gist api and cli with rhodecode-pam....
r3958 lifetime=lifetime)
Implemented simple gist functionality ref #530....
r3840 Session().commit()
return dict(
msg='created new gist',
sync gist api and cli with rhodecode-pam....
r3958 gist=gist.get_api_data()
Implemented simple gist functionality ref #530....
r3840 )
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError('failed to create gist')
Bradley M. Kuhn
Imported some of the GPLv3'd changes from RhodeCode v2.2.5....
r4116
# def update_gist(self, apiuser, gistid, files, owner=Optional(OAttr('apiuser')),
# gist_type=Optional(Gist.GIST_PUBLIC),
# gist_lifetime=Optional(-1), gist_description=Optional('')):
# gist = get_gist_or_error(gistid)
# updates = {}
# permission check inside
def delete_gist(self, apiuser, gistid):
"""
Deletes existing gist
:param apiuser: filled automatically from apikey
:type apiuser: AuthUser
:param gistid: id of gist to delete
:type gistid: str
OUTPUT::
id : <id_given_in_input>
result : {
"deleted gist ID: <gist_id>",
"gist": null
}
error : null
ERROR OUTPUT::
id : <id_given_in_input>
result : null
error : {
"failed to delete gist ID:<gist_id>"
}
"""
gist = get_gist_or_error(gistid)
if not HasPermissionAnyApi('hg.admin')(user=apiuser):
if gist.gist_owner != apiuser.user_id:
raise JSONRPCError('gist `%s` does not exist' % (gistid,))
try:
GistModel().delete(gist)
Session().commit()
return dict(
msg='deleted gist ID:%s' % (gist.gist_access_id,),
gist=None
)
except Exception:
log.error(traceback.format_exc())
raise JSONRPCError('failed to delete gist ID:%s'
% (gist.gist_access_id,))