2014-11-18 16:06:47 +00:00
|
|
|
// Copyright 2014 The Gogs Authors. All rights reserved.
|
2019-04-19 07:53:46 +01:00
|
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
2014-11-18 16:06:47 +00:00
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2015-08-26 14:34:27 +01:00
|
|
|
package gitea
|
2014-11-18 16:06:47 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
2021-03-21 20:20:32 +00:00
|
|
|
"net/url"
|
2020-09-10 13:34:32 +01:00
|
|
|
"reflect"
|
2014-11-18 16:06:47 +00:00
|
|
|
)
|
|
|
|
|
2023-04-19 16:57:54 +01:00
|
|
|
// AccessTokenScope represents the scope for an access token.
|
|
|
|
type AccessTokenScope string
|
|
|
|
|
|
|
|
const (
|
|
|
|
AccessTokenScopeAll AccessTokenScope = "all"
|
|
|
|
|
|
|
|
AccessTokenScopeRepo AccessTokenScope = "repo"
|
|
|
|
AccessTokenScopeRepoStatus AccessTokenScope = "repo:status"
|
|
|
|
AccessTokenScopePublicRepo AccessTokenScope = "public_repo"
|
|
|
|
|
|
|
|
AccessTokenScopeAdminOrg AccessTokenScope = "admin:org"
|
|
|
|
AccessTokenScopeWriteOrg AccessTokenScope = "write:org"
|
|
|
|
AccessTokenScopeReadOrg AccessTokenScope = "read:org"
|
|
|
|
|
|
|
|
AccessTokenScopeAdminPublicKey AccessTokenScope = "admin:public_key"
|
|
|
|
AccessTokenScopeWritePublicKey AccessTokenScope = "write:public_key"
|
|
|
|
AccessTokenScopeReadPublicKey AccessTokenScope = "read:public_key"
|
|
|
|
|
|
|
|
AccessTokenScopeAdminRepoHook AccessTokenScope = "admin:repo_hook"
|
|
|
|
AccessTokenScopeWriteRepoHook AccessTokenScope = "write:repo_hook"
|
|
|
|
AccessTokenScopeReadRepoHook AccessTokenScope = "read:repo_hook"
|
|
|
|
|
|
|
|
AccessTokenScopeAdminOrgHook AccessTokenScope = "admin:org_hook"
|
|
|
|
|
|
|
|
AccessTokenScopeAdminUserHook AccessTokenScope = "admin:user_hook"
|
|
|
|
|
|
|
|
AccessTokenScopeNotification AccessTokenScope = "notification"
|
|
|
|
|
|
|
|
AccessTokenScopeUser AccessTokenScope = "user"
|
|
|
|
AccessTokenScopeReadUser AccessTokenScope = "read:user"
|
|
|
|
AccessTokenScopeUserEmail AccessTokenScope = "user:email"
|
|
|
|
AccessTokenScopeUserFollow AccessTokenScope = "user:follow"
|
|
|
|
|
|
|
|
AccessTokenScopeDeleteRepo AccessTokenScope = "delete_repo"
|
|
|
|
|
|
|
|
AccessTokenScopePackage AccessTokenScope = "package"
|
|
|
|
AccessTokenScopeWritePackage AccessTokenScope = "write:package"
|
|
|
|
AccessTokenScopeReadPackage AccessTokenScope = "read:package"
|
|
|
|
AccessTokenScopeDeletePackage AccessTokenScope = "delete:package"
|
|
|
|
|
|
|
|
AccessTokenScopeAdminGPGKey AccessTokenScope = "admin:gpg_key"
|
|
|
|
AccessTokenScopeWriteGPGKey AccessTokenScope = "write:gpg_key"
|
|
|
|
AccessTokenScopeReadGPGKey AccessTokenScope = "read:gpg_key"
|
|
|
|
|
|
|
|
AccessTokenScopeAdminApplication AccessTokenScope = "admin:application"
|
|
|
|
AccessTokenScopeWriteApplication AccessTokenScope = "write:application"
|
|
|
|
AccessTokenScopeReadApplication AccessTokenScope = "read:application"
|
|
|
|
|
|
|
|
AccessTokenScopeSudo AccessTokenScope = "sudo"
|
|
|
|
)
|
|
|
|
|
2019-10-13 02:34:01 +01:00
|
|
|
// AccessToken represents an API access token.
|
|
|
|
type AccessToken struct {
|
2023-04-19 16:57:54 +01:00
|
|
|
ID int64 `json:"id"`
|
|
|
|
Name string `json:"name"`
|
|
|
|
Token string `json:"sha1"`
|
|
|
|
TokenLastEight string `json:"token_last_eight"`
|
|
|
|
Scopes []AccessTokenScope `json:"scopes"`
|
2019-10-13 02:34:01 +01:00
|
|
|
}
|
2017-04-30 16:33:16 +01:00
|
|
|
|
2020-02-05 07:59:55 +00:00
|
|
|
// ListAccessTokensOptions options for listing a users's access tokens
|
|
|
|
type ListAccessTokensOptions struct {
|
|
|
|
ListOptions
|
|
|
|
}
|
|
|
|
|
|
|
|
// ListAccessTokens lists all the access tokens of user
|
2020-09-14 03:37:09 +01:00
|
|
|
func (c *Client) ListAccessTokens(opts ListAccessTokensOptions) ([]*AccessToken, *Response, error) {
|
2021-03-04 20:19:55 +00:00
|
|
|
c.mutex.RLock()
|
|
|
|
username := c.username
|
|
|
|
c.mutex.RUnlock()
|
|
|
|
if len(username) == 0 {
|
2020-09-14 03:37:09 +01:00
|
|
|
return nil, nil, fmt.Errorf("\"username\" not set: only BasicAuth allowed")
|
2020-05-19 23:16:37 +01:00
|
|
|
}
|
2020-02-05 07:59:55 +00:00
|
|
|
opts.setDefaults()
|
|
|
|
tokens := make([]*AccessToken, 0, opts.PageSize)
|
2021-03-21 20:20:32 +00:00
|
|
|
resp, err := c.getParsedResponse("GET", fmt.Sprintf("/users/%s/tokens?%s", url.PathEscape(username), opts.getURLQuery().Encode()), jsonHeader, nil, &tokens)
|
2020-09-14 03:37:09 +01:00
|
|
|
return tokens, resp, err
|
2014-11-18 16:06:47 +00:00
|
|
|
}
|
|
|
|
|
2019-10-13 02:34:01 +01:00
|
|
|
// CreateAccessTokenOption options when create access token
|
|
|
|
type CreateAccessTokenOption struct {
|
2023-04-19 16:57:54 +01:00
|
|
|
Name string `json:"name"`
|
|
|
|
Scopes []AccessTokenScope `json:"scopes"`
|
2019-10-13 02:34:01 +01:00
|
|
|
}
|
|
|
|
|
2016-11-10 09:44:00 +00:00
|
|
|
// CreateAccessToken create one access token with options
|
2020-09-14 03:37:09 +01:00
|
|
|
func (c *Client) CreateAccessToken(opt CreateAccessTokenOption) (*AccessToken, *Response, error) {
|
2021-03-04 20:19:55 +00:00
|
|
|
c.mutex.RLock()
|
|
|
|
username := c.username
|
|
|
|
c.mutex.RUnlock()
|
|
|
|
if len(username) == 0 {
|
2020-09-14 03:37:09 +01:00
|
|
|
return nil, nil, fmt.Errorf("\"username\" not set: only BasicAuth allowed")
|
2020-05-19 23:16:37 +01:00
|
|
|
}
|
2014-11-18 16:06:47 +00:00
|
|
|
body, err := json.Marshal(&opt)
|
|
|
|
if err != nil {
|
2020-09-14 03:37:09 +01:00
|
|
|
return nil, nil, err
|
2014-11-18 16:06:47 +00:00
|
|
|
}
|
|
|
|
t := new(AccessToken)
|
2021-03-21 20:20:32 +00:00
|
|
|
resp, err := c.getParsedResponse("POST", fmt.Sprintf("/users/%s/tokens", url.PathEscape(username)), jsonHeader, bytes.NewReader(body), t)
|
2020-09-14 03:37:09 +01:00
|
|
|
return t, resp, err
|
2014-11-18 16:06:47 +00:00
|
|
|
}
|
2018-06-20 10:04:31 +01:00
|
|
|
|
2020-09-10 13:34:32 +01:00
|
|
|
// DeleteAccessToken delete token, identified by ID and if not available by name
|
2020-09-14 03:37:09 +01:00
|
|
|
func (c *Client) DeleteAccessToken(value interface{}) (*Response, error) {
|
2021-03-04 20:19:55 +00:00
|
|
|
c.mutex.RLock()
|
|
|
|
username := c.username
|
|
|
|
c.mutex.RUnlock()
|
|
|
|
if len(username) == 0 {
|
2020-09-14 03:37:09 +01:00
|
|
|
return nil, fmt.Errorf("\"username\" not set: only BasicAuth allowed")
|
2020-05-19 23:16:37 +01:00
|
|
|
}
|
2020-09-10 13:34:32 +01:00
|
|
|
|
2022-04-28 16:33:21 +01:00
|
|
|
token := ""
|
2020-09-10 13:34:32 +01:00
|
|
|
|
|
|
|
switch reflect.ValueOf(value).Kind() {
|
|
|
|
case reflect.Int64:
|
|
|
|
token = fmt.Sprintf("%d", value.(int64))
|
|
|
|
case reflect.String:
|
2022-01-04 16:31:31 +00:00
|
|
|
if err := c.checkServerVersionGreaterThanOrEqual(version1_13_0); err != nil {
|
2020-09-14 03:37:09 +01:00
|
|
|
return nil, err
|
2020-09-10 13:34:32 +01:00
|
|
|
}
|
|
|
|
token = value.(string)
|
|
|
|
default:
|
2020-09-14 03:37:09 +01:00
|
|
|
return nil, fmt.Errorf("only string and int64 supported")
|
2020-09-10 13:34:32 +01:00
|
|
|
}
|
|
|
|
|
2021-03-21 20:20:32 +00:00
|
|
|
_, resp, err := c.getResponse("DELETE", fmt.Sprintf("/users/%s/tokens/%s", url.PathEscape(username), url.PathEscape(token)), jsonHeader, nil)
|
2020-09-14 03:37:09 +01:00
|
|
|
return resp, err
|
2018-06-20 10:04:31 +01:00
|
|
|
}
|