mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2024-12-27 09:54:15 -05:00
5c092eb0ef
* First stab at a Gitlab migrations interface. * Modify JS to show migration for Gitlab * Properly strip out #gitlab tag from repo name * Working Gitlab migrations! Still need to figure out how to hide tokens/etc from showing up in opts.CloneAddr * Try #2 at trying to hide credentials. CloneAddr was being used as OriginalURL. Now passing OriginalURL through from the form and saving it. * Add go-gitlab dependency * Vendor go-gitlab * Use gitlab.BasicAuthClient Correct CloneURL. This should be functioning! Previous commits fixed "Migrated from" from including the migration credentials. * Replaced repoPath with repoID globally. RepoID is grabbed in NewGitlabDownloader * Logging touchup * Properly set private repo status. Properly set milestone deadline time. Consistently use Gitlab username for 'Name'. * Add go-gitlab vendor cache * Fix PR migrations: - Count of issues is kept to set a non-conflicting PR.ID - Bool is used to tell whether to fetch Issue or PR comments * Ensure merged PRs are closed and set with the proper time * Remove copyright and some commented code * Rip out '#gitlab' based self-hosted Gitlab support * Hide given credentials for migrated repos. CloneAddr was being saved as OriginalURL. Now passing OriginalURL through from the form and saving it in it's place * Use asset.URL directly, no point in parsing. Opened PRs should fall through to false. * Fix importing Milestones. Allow importing using Personal Tokens or anonymous access. * Fix Gitlab Milestone migration if DueDate isn't set * Empty Milestone due dates properly return nil, not zero time * Add GITLAB_READ_TOKEN to drone unit-test step * Add working gitlab_test.go. A Personal Access Token, given in env variable GITLAB_READ_TOKEN is required to run the test. * Fix linting issues * Add modified JS files * Remove pre-build JS files * Only merged PRs are marged as merged/closed * Test topics * Skip test if gitlab is inaccessible * Grab personal token from username, not password. Matches Github migration implementation * Add SetContext() to GitlabDownloader. * Checking Updated field in Issues. * Actually fetch Issue Updated time from Gitlab * Add Gitlab migration GetReviews() stub * Fix Patch and Clone URLs * check Updated too * fix mod * make vendor with go1.14 Co-authored-by: techknowlogick <techknowlogick@gitea.io> Co-authored-by: 6543 <6543@obermui.de> Co-authored-by: Lauris BH <lauris@nix.lv> Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
211 lines
7.3 KiB
Go
211 lines
7.3 KiB
Go
//
|
|
// Copyright 2019, Paul Shoemaker
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
//
|
|
|
|
package gitlab
|
|
|
|
import (
|
|
"fmt"
|
|
"time"
|
|
)
|
|
|
|
// GroupClustersService handles communication with the
|
|
// group clusters related methods of the GitLab API.
|
|
//
|
|
// GitLab API docs:
|
|
// https://docs.gitlab.com/ee/api/group_clusters.html
|
|
type GroupClustersService struct {
|
|
client *Client
|
|
}
|
|
|
|
// GroupCluster represents a GitLab Group Cluster.
|
|
//
|
|
// GitLab API docs: https://docs.gitlab.com/ee/api/group_clusters.html
|
|
type GroupCluster struct {
|
|
ID int `json:"id"`
|
|
Name string `json:"name"`
|
|
Domain string `json:"domain"`
|
|
CreatedAt *time.Time `json:"created_at"`
|
|
ProviderType string `json:"provider_type"`
|
|
PlatformType string `json:"platform_type"`
|
|
EnvironmentScope string `json:"environment_scope"`
|
|
ClusterType string `json:"cluster_type"`
|
|
User *User `json:"user"`
|
|
PlatformKubernetes *PlatformKubernetes `json:"platform_kubernetes"`
|
|
Group *Group `json:"group"`
|
|
}
|
|
|
|
func (v GroupCluster) String() string {
|
|
return Stringify(v)
|
|
}
|
|
|
|
// ListClusters gets a list of all clusters in a group.
|
|
//
|
|
// GitLab API docs:
|
|
// https://docs.gitlab.com/ee/api/group_clusters.html#list-group-clusters
|
|
func (s *GroupClustersService) ListClusters(pid interface{}, options ...OptionFunc) ([]*GroupCluster, *Response, error) {
|
|
group, err := parseID(pid)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
u := fmt.Sprintf("groups/%s/clusters", pathEscape(group))
|
|
|
|
req, err := s.client.NewRequest("GET", u, nil, options)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
var pcs []*GroupCluster
|
|
resp, err := s.client.Do(req, &pcs)
|
|
if err != nil {
|
|
return nil, resp, err
|
|
}
|
|
|
|
return pcs, resp, err
|
|
}
|
|
|
|
// GetCluster gets a cluster.
|
|
//
|
|
// GitLab API docs:
|
|
// https://docs.gitlab.com/ee/api/group_clusters.html#get-a-single-group-cluster
|
|
func (s *GroupClustersService) GetCluster(pid interface{}, cluster int, options ...OptionFunc) (*GroupCluster, *Response, error) {
|
|
group, err := parseID(pid)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
u := fmt.Sprintf("groups/%s/clusters/%d", pathEscape(group), cluster)
|
|
|
|
req, err := s.client.NewRequest("GET", u, nil, options)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
pc := new(GroupCluster)
|
|
resp, err := s.client.Do(req, &pc)
|
|
if err != nil {
|
|
return nil, resp, err
|
|
}
|
|
|
|
return pc, resp, err
|
|
}
|
|
|
|
// AddGroupClusterOptions represents the available AddCluster() options.
|
|
//
|
|
// GitLab API docs:
|
|
// https://docs.gitlab.com/ee/api/group_clusters.html#add-existing-cluster-to-group
|
|
type AddGroupClusterOptions struct {
|
|
Name *string `url:"name,omitempty" json:"name,omitempty"`
|
|
Domain *string `url:"domain,omitempty" json:"domain,omitempty"`
|
|
Enabled *bool `url:"enabled,omitempty" json:"enabled,omitempty"`
|
|
Managed *bool `url:"managed,omitempty" json:"managed,omitempty"`
|
|
EnvironmentScope *string `url:"environment_scope,omitempty" json:"environment_scope,omitempty"`
|
|
PlatformKubernetes *AddGroupPlatformKubernetesOptions `url:"platform_kubernetes_attributes,omitempty" json:"platform_kubernetes_attributes,omitempty"`
|
|
}
|
|
|
|
// AddGroupPlatformKubernetesOptions represents the available PlatformKubernetes options for adding.
|
|
type AddGroupPlatformKubernetesOptions struct {
|
|
APIURL *string `url:"api_url,omitempty" json:"api_url,omitempty"`
|
|
Token *string `url:"token,omitempty" json:"token,omitempty"`
|
|
CaCert *string `url:"ca_cert,omitempty" json:"ca_cert,omitempty"`
|
|
Namespace *string `url:"namespace,omitempty" json:"namespace,omitempty"`
|
|
AuthorizationType *string `url:"authorization_type,omitempty" json:"authorization_type,omitempty"`
|
|
}
|
|
|
|
// AddCluster adds an existing cluster to the group.
|
|
//
|
|
// GitLab API docs:
|
|
// https://docs.gitlab.com/ee/api/group_clusters.html#add-existing-cluster-to-group
|
|
func (s *GroupClustersService) AddCluster(pid interface{}, opt *AddGroupClusterOptions, options ...OptionFunc) (*GroupCluster, *Response, error) {
|
|
group, err := parseID(pid)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
u := fmt.Sprintf("groups/%s/clusters/user", pathEscape(group))
|
|
|
|
req, err := s.client.NewRequest("POST", u, opt, options)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
pc := new(GroupCluster)
|
|
resp, err := s.client.Do(req, pc)
|
|
if err != nil {
|
|
return nil, resp, err
|
|
}
|
|
|
|
return pc, resp, err
|
|
}
|
|
|
|
// EditGroupClusterOptions represents the available EditCluster() options.
|
|
//
|
|
// GitLab API docs:
|
|
// https://docs.gitlab.com/ee/api/group_clusters.html#edit-group-cluster
|
|
type EditGroupClusterOptions struct {
|
|
Name *string `url:"name,omitempty" json:"name,omitempty"`
|
|
Domain *string `url:"domain,omitempty" json:"domain,omitempty"`
|
|
EnvironmentScope *string `url:"environment_scope,omitempty" json:"environment_scope,omitempty"`
|
|
PlatformKubernetes *EditGroupPlatformKubernetesOptions `url:"platform_kubernetes_attributes,omitempty" json:"platform_kubernetes_attributes,omitempty"`
|
|
}
|
|
|
|
// EditGroupPlatformKubernetesOptions represents the available PlatformKubernetes options for editing.
|
|
type EditGroupPlatformKubernetesOptions struct {
|
|
APIURL *string `url:"api_url,omitempty" json:"api_url,omitempty"`
|
|
Token *string `url:"token,omitempty" json:"token,omitempty"`
|
|
CaCert *string `url:"ca_cert,omitempty" json:"ca_cert,omitempty"`
|
|
}
|
|
|
|
// EditCluster updates an existing group cluster.
|
|
//
|
|
// GitLab API docs:
|
|
// https://docs.gitlab.com/ee/api/group_clusters.html#edit-group-cluster
|
|
func (s *GroupClustersService) EditCluster(pid interface{}, cluster int, opt *EditGroupClusterOptions, options ...OptionFunc) (*GroupCluster, *Response, error) {
|
|
group, err := parseID(pid)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
u := fmt.Sprintf("groups/%s/clusters/%d", pathEscape(group), cluster)
|
|
|
|
req, err := s.client.NewRequest("PUT", u, opt, options)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
pc := new(GroupCluster)
|
|
resp, err := s.client.Do(req, pc)
|
|
if err != nil {
|
|
return nil, resp, err
|
|
}
|
|
|
|
return pc, resp, err
|
|
}
|
|
|
|
// DeleteCluster deletes an existing group cluster.
|
|
//
|
|
// GitLab API docs:
|
|
// https://docs.gitlab.com/ee/api/group_clusters.html#delete-group-cluster
|
|
func (s *GroupClustersService) DeleteCluster(pid interface{}, cluster int, options ...OptionFunc) (*Response, error) {
|
|
group, err := parseID(pid)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
u := fmt.Sprintf("groups/%s/clusters/%d", pathEscape(group), cluster)
|
|
|
|
req, err := s.client.NewRequest("DELETE", u, nil, options)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return s.client.Do(req, nil)
|
|
}
|