710 lines
20 KiB
Go
710 lines
20 KiB
Go
// Copyright 2022 Woodpecker Authors
|
|
// Copyright 2018 Drone.IO Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package github
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"errors"
|
|
"fmt"
|
|
"net/http"
|
|
"net/url"
|
|
"regexp"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/google/go-github/v67/github"
|
|
"github.com/rs/zerolog/log"
|
|
"golang.org/x/oauth2"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v3/server"
|
|
"go.woodpecker-ci.org/woodpecker/v3/server/forge"
|
|
"go.woodpecker-ci.org/woodpecker/v3/server/forge/common"
|
|
forge_types "go.woodpecker-ci.org/woodpecker/v3/server/forge/types"
|
|
"go.woodpecker-ci.org/woodpecker/v3/server/model"
|
|
"go.woodpecker-ci.org/woodpecker/v3/server/store"
|
|
"go.woodpecker-ci.org/woodpecker/v3/shared/utils"
|
|
)
|
|
|
|
const (
|
|
defaultURL = "https://github.com" // Default GitHub URL
|
|
defaultAPI = "https://api.github.com/" // Default GitHub API URL
|
|
)
|
|
|
|
// Opts defines configuration options.
|
|
type Opts struct {
|
|
URL string // GitHub server url.
|
|
Client string // GitHub oauth client id.
|
|
Secret string // GitHub oauth client secret.
|
|
SkipVerify bool // Skip ssl verification.
|
|
MergeRef bool // Clone pull requests using the merge ref.
|
|
OnlyPublic bool // Only obtain OAuth tokens with access to public repos.
|
|
OAuthHost string // Public url for oauth if different from url.
|
|
}
|
|
|
|
// New returns a Forge implementation that integrates with a GitHub Cloud or
|
|
// GitHub Enterprise version control hosting provider.
|
|
func New(opts Opts) (forge.Forge, error) {
|
|
r := &client{
|
|
API: defaultAPI,
|
|
url: defaultURL,
|
|
Client: opts.Client,
|
|
Secret: opts.Secret,
|
|
oAuthHost: opts.OAuthHost,
|
|
SkipVerify: opts.SkipVerify,
|
|
MergeRef: opts.MergeRef,
|
|
OnlyPublic: opts.OnlyPublic,
|
|
}
|
|
if opts.URL != defaultURL {
|
|
r.url = strings.TrimSuffix(opts.URL, "/")
|
|
r.API = r.url + "/api/v3/"
|
|
}
|
|
|
|
return r, nil
|
|
}
|
|
|
|
type client struct {
|
|
url string
|
|
API string
|
|
Client string
|
|
Secret string
|
|
SkipVerify bool
|
|
MergeRef bool
|
|
OnlyPublic bool
|
|
oAuthHost string
|
|
}
|
|
|
|
// Name returns the string name of this driver.
|
|
func (c *client) Name() string {
|
|
return "github"
|
|
}
|
|
|
|
// URL returns the root url of a configured forge.
|
|
func (c *client) URL() string {
|
|
return c.url
|
|
}
|
|
|
|
// Login authenticates the session and returns the forge user details.
|
|
func (c *client) Login(ctx context.Context, req *forge_types.OAuthRequest) (*model.User, string, error) {
|
|
config := c.newConfig()
|
|
redirectURL := config.AuthCodeURL(req.State)
|
|
|
|
// check the OAuth code
|
|
if len(req.Code) == 0 {
|
|
// TODO(bradrydzewski) we really should be using a random value here and
|
|
// storing in a cookie for verification in the next stage of the workflow.
|
|
|
|
return nil, redirectURL, nil
|
|
}
|
|
|
|
token, err := config.Exchange(c.newContext(ctx), req.Code)
|
|
if err != nil {
|
|
return nil, redirectURL, err
|
|
}
|
|
|
|
client := c.newClientToken(ctx, token.AccessToken)
|
|
user, _, err := client.Users.Get(ctx, "")
|
|
if err != nil {
|
|
return nil, redirectURL, err
|
|
}
|
|
|
|
emails, _, err := client.Users.ListEmails(ctx, nil)
|
|
if err != nil {
|
|
return nil, redirectURL, err
|
|
}
|
|
email := matchingEmail(emails, c.API)
|
|
if email == nil {
|
|
return nil, redirectURL, fmt.Errorf("no verified Email address for GitHub account")
|
|
}
|
|
|
|
return &model.User{
|
|
Login: user.GetLogin(),
|
|
Email: email.GetEmail(),
|
|
AccessToken: token.AccessToken,
|
|
RefreshToken: token.RefreshToken,
|
|
Expiry: token.Expiry.UTC().Unix(),
|
|
Avatar: user.GetAvatarURL(),
|
|
ForgeRemoteID: model.ForgeRemoteID(fmt.Sprint(user.GetID())),
|
|
}, redirectURL, nil
|
|
}
|
|
|
|
// Auth returns the GitHub user login for the given access token.
|
|
func (c *client) Auth(ctx context.Context, token, _ string) (string, error) {
|
|
client := c.newClientToken(ctx, token)
|
|
user, _, err := client.Users.Get(ctx, "")
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return *user.Login, nil
|
|
}
|
|
|
|
// Refresh refreshes the Gitlab oauth2 access token. If the token is
|
|
// refreshed the user is updated and a true value is returned.
|
|
func (c *client) Refresh(ctx context.Context, user *model.User) (bool, error) {
|
|
// when using Github oAuth app no refresh token is provided
|
|
if user.RefreshToken == "" {
|
|
return false, nil
|
|
}
|
|
|
|
config := c.newConfig()
|
|
|
|
source := config.TokenSource(ctx, &oauth2.Token{
|
|
AccessToken: user.AccessToken,
|
|
RefreshToken: user.RefreshToken,
|
|
Expiry: time.Unix(user.Expiry, 0),
|
|
})
|
|
|
|
token, err := source.Token()
|
|
if err != nil || len(token.AccessToken) == 0 {
|
|
return false, err
|
|
}
|
|
|
|
user.AccessToken = token.AccessToken
|
|
user.RefreshToken = token.RefreshToken
|
|
user.Expiry = token.Expiry.UTC().Unix()
|
|
return true, nil
|
|
}
|
|
|
|
// Teams returns a list of all team membership for the GitHub account.
|
|
func (c *client) Teams(ctx context.Context, u *model.User) ([]*model.Team, error) {
|
|
client := c.newClientToken(ctx, u.AccessToken)
|
|
|
|
opts := new(github.ListOptions)
|
|
opts.Page = 1
|
|
|
|
var teams []*model.Team
|
|
for opts.Page > 0 {
|
|
list, resp, err := client.Organizations.List(ctx, "", opts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
teams = append(teams, convertTeamList(list)...)
|
|
opts.Page = resp.NextPage
|
|
}
|
|
return teams, nil
|
|
}
|
|
|
|
// Repo returns the GitHub repository.
|
|
func (c *client) Repo(ctx context.Context, u *model.User, id model.ForgeRemoteID, owner, name string) (*model.Repo, error) {
|
|
client := c.newClientToken(ctx, u.AccessToken)
|
|
|
|
if id.IsValid() {
|
|
intID, err := strconv.ParseInt(string(id), 10, 64)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
repo, _, err := client.Repositories.GetByID(ctx, intID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return convertRepo(repo), nil
|
|
}
|
|
|
|
repo, _, err := client.Repositories.Get(ctx, owner, name)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return convertRepo(repo), nil
|
|
}
|
|
|
|
// Repos returns a list of all repositories for GitHub account, including
|
|
// organization repositories.
|
|
func (c *client) Repos(ctx context.Context, u *model.User) ([]*model.Repo, error) {
|
|
client := c.newClientToken(ctx, u.AccessToken)
|
|
|
|
opts := new(github.RepositoryListByAuthenticatedUserOptions)
|
|
opts.PerPage = 100
|
|
opts.Page = 1
|
|
|
|
var repos []*model.Repo
|
|
for opts.Page > 0 {
|
|
list, resp, err := client.Repositories.ListByAuthenticatedUser(ctx, opts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
for _, repo := range list {
|
|
if repo.GetArchived() {
|
|
continue
|
|
}
|
|
repos = append(repos, convertRepo(repo))
|
|
}
|
|
opts.Page = resp.NextPage
|
|
}
|
|
return repos, nil
|
|
}
|
|
|
|
// File fetches the file from the GitHub repository and returns its contents.
|
|
func (c *client) File(ctx context.Context, u *model.User, r *model.Repo, b *model.Pipeline, f string) ([]byte, error) {
|
|
client := c.newClientToken(ctx, u.AccessToken)
|
|
|
|
opts := new(github.RepositoryContentGetOptions)
|
|
opts.Ref = b.Commit
|
|
content, _, resp, err := client.Repositories.GetContents(ctx, r.Owner, r.Name, f, opts)
|
|
if resp != nil && resp.StatusCode == http.StatusNotFound {
|
|
return nil, errors.Join(err, &forge_types.ErrConfigNotFound{Configs: []string{f}})
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if content == nil {
|
|
return nil, fmt.Errorf("%s is a folder not a file use Dir(..)", f)
|
|
}
|
|
data, err := content.GetContent()
|
|
return []byte(data), err
|
|
}
|
|
|
|
func (c *client) Dir(ctx context.Context, u *model.User, r *model.Repo, b *model.Pipeline, f string) ([]*forge_types.FileMeta, error) {
|
|
client := c.newClientToken(ctx, u.AccessToken)
|
|
|
|
opts := new(github.RepositoryContentGetOptions)
|
|
opts.Ref = b.Commit
|
|
_, data, resp, err := client.Repositories.GetContents(ctx, r.Owner, r.Name, f, opts)
|
|
if resp != nil && resp.StatusCode == http.StatusNotFound {
|
|
return nil, errors.Join(err, &forge_types.ErrConfigNotFound{Configs: []string{f}})
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
fc := make(chan *forge_types.FileMeta)
|
|
errChan := make(chan error)
|
|
|
|
for _, file := range data {
|
|
go func(path string) {
|
|
content, err := c.File(ctx, u, r, b, path)
|
|
if err != nil {
|
|
if errors.Is(err, &forge_types.ErrConfigNotFound{}) {
|
|
err = fmt.Errorf("git tree reported existence of file but we got: %s", err.Error())
|
|
}
|
|
errChan <- err
|
|
} else {
|
|
fc <- &forge_types.FileMeta{
|
|
Name: path,
|
|
Data: content,
|
|
}
|
|
}
|
|
}(f + "/" + *file.Name)
|
|
}
|
|
|
|
var files []*forge_types.FileMeta
|
|
|
|
for i := 0; i < len(data); i++ {
|
|
select {
|
|
case err := <-errChan:
|
|
return nil, err
|
|
case fileMeta := <-fc:
|
|
files = append(files, fileMeta)
|
|
}
|
|
}
|
|
|
|
close(fc)
|
|
close(errChan)
|
|
|
|
return files, nil
|
|
}
|
|
|
|
func (c *client) PullRequests(ctx context.Context, u *model.User, r *model.Repo, p *model.ListOptions) ([]*model.PullRequest, error) {
|
|
token := common.UserToken(ctx, r, u)
|
|
client := c.newClientToken(ctx, token)
|
|
|
|
pullRequests, _, err := client.PullRequests.List(ctx, r.Owner, r.Name, &github.PullRequestListOptions{
|
|
ListOptions: github.ListOptions{Page: p.Page, PerPage: p.PerPage},
|
|
State: "open",
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
result := make([]*model.PullRequest, len(pullRequests))
|
|
for i := range pullRequests {
|
|
result[i] = &model.PullRequest{
|
|
Index: model.ForgeRemoteID(strconv.Itoa(pullRequests[i].GetNumber())),
|
|
Title: pullRequests[i].GetTitle(),
|
|
}
|
|
}
|
|
return result, err
|
|
}
|
|
|
|
// Netrc returns a netrc file capable of authenticating GitHub requests and
|
|
// cloning GitHub repositories. The netrc will use the global machine account
|
|
// when configured.
|
|
func (c *client) Netrc(u *model.User, r *model.Repo) (*model.Netrc, error) {
|
|
login := ""
|
|
token := ""
|
|
|
|
if u != nil {
|
|
login = u.AccessToken
|
|
token = "x-oauth-basic"
|
|
}
|
|
|
|
host, err := common.ExtractHostFromCloneURL(r.Clone)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &model.Netrc{
|
|
Login: login,
|
|
Password: token,
|
|
Machine: host,
|
|
}, nil
|
|
}
|
|
|
|
// Deactivate deactivates the repository be removing registered push hooks from
|
|
// the GitHub repository.
|
|
func (c *client) Deactivate(ctx context.Context, u *model.User, r *model.Repo, link string) error {
|
|
client := c.newClientToken(ctx, u.AccessToken)
|
|
hooks, _, err := client.Repositories.ListHooks(ctx, r.Owner, r.Name, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
match := matchingHooks(hooks, link)
|
|
if match == nil {
|
|
return nil
|
|
}
|
|
_, err = client.Repositories.DeleteHook(ctx, r.Owner, r.Name, *match.ID)
|
|
return err
|
|
}
|
|
|
|
// OrgMembership returns if user is member of organization and if user
|
|
// is admin/owner in this organization.
|
|
func (c *client) OrgMembership(ctx context.Context, u *model.User, owner string) (*model.OrgPerm, error) {
|
|
client := c.newClientToken(ctx, u.AccessToken)
|
|
org, _, err := client.Organizations.GetOrgMembership(ctx, u.Login, owner)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &model.OrgPerm{Member: org.GetState() == "active", Admin: org.GetRole() == "admin"}, nil
|
|
}
|
|
|
|
func (c *client) Org(ctx context.Context, u *model.User, owner string) (*model.Org, error) {
|
|
client := c.newClientToken(ctx, u.AccessToken)
|
|
|
|
user, _, err := client.Users.Get(ctx, owner)
|
|
log.Trace().Msgf("GitHub user for owner %s = %v", owner, user)
|
|
if user != nil && err == nil {
|
|
return &model.Org{
|
|
Name: user.GetLogin(),
|
|
IsUser: true,
|
|
}, nil
|
|
}
|
|
|
|
org, _, err := client.Organizations.Get(ctx, owner)
|
|
log.Trace().Msgf("GitHub organization for owner %s = %v", owner, org)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &model.Org{
|
|
Name: org.GetLogin(),
|
|
}, nil
|
|
}
|
|
|
|
// newContext returns the GitHub oauth2 context using an HTTPClient that
|
|
// disables TLS verification if disabled in the forge settings.
|
|
func (c *client) newContext(ctx context.Context) context.Context {
|
|
if !c.SkipVerify {
|
|
return ctx
|
|
}
|
|
return context.WithValue(ctx, oauth2.HTTPClient, &http.Client{
|
|
Transport: &http.Transport{
|
|
Proxy: http.ProxyFromEnvironment,
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
// newConfig returns the GitHub oauth2 config.
|
|
func (c *client) newConfig() *oauth2.Config {
|
|
scopes := []string{"user:email", "read:org"}
|
|
if c.OnlyPublic {
|
|
scopes = append(scopes, []string{"admin:repo_hook", "repo:status"}...)
|
|
} else {
|
|
scopes = append(scopes, "repo")
|
|
}
|
|
|
|
publicOAuthURL := c.oAuthHost
|
|
if publicOAuthURL == "" {
|
|
publicOAuthURL = c.url
|
|
}
|
|
|
|
return &oauth2.Config{
|
|
ClientID: c.Client,
|
|
ClientSecret: c.Secret,
|
|
Scopes: scopes,
|
|
Endpoint: oauth2.Endpoint{
|
|
AuthURL: fmt.Sprintf("%s/login/oauth/authorize", publicOAuthURL),
|
|
TokenURL: fmt.Sprintf("%s/login/oauth/access_token", c.url),
|
|
},
|
|
RedirectURL: fmt.Sprintf("%s/authorize", server.Config.Server.OAuthHost),
|
|
}
|
|
}
|
|
|
|
// newClientToken returns the GitHub oauth2 client.
|
|
func (c *client) newClientToken(ctx context.Context, token string) *github.Client {
|
|
ts := oauth2.StaticTokenSource(
|
|
&oauth2.Token{AccessToken: token},
|
|
)
|
|
tc := oauth2.NewClient(ctx, ts)
|
|
if c.SkipVerify {
|
|
tp, _ := tc.Transport.(*oauth2.Transport)
|
|
tp.Base = &http.Transport{
|
|
Proxy: http.ProxyFromEnvironment,
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
},
|
|
}
|
|
}
|
|
client := github.NewClient(tc)
|
|
client.BaseURL, _ = url.Parse(c.API)
|
|
return client
|
|
}
|
|
|
|
// matchingEmail returns matching user email.
|
|
func matchingEmail(emails []*github.UserEmail, rawURL string) *github.UserEmail {
|
|
for _, email := range emails {
|
|
if email.Email == nil || email.Primary == nil || email.Verified == nil {
|
|
continue
|
|
}
|
|
if *email.Primary && *email.Verified {
|
|
return email
|
|
}
|
|
}
|
|
// github enterprise does not support verified email addresses so instead
|
|
// we'll return the first email address in the list.
|
|
if len(emails) != 0 && rawURL != defaultAPI {
|
|
return emails[0]
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// matchingHooks returns matching hook.
|
|
func matchingHooks(hooks []*github.Hook, rawURL string) *github.Hook {
|
|
link, err := url.Parse(rawURL)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
for _, hook := range hooks {
|
|
if hook.ID == nil {
|
|
continue
|
|
}
|
|
hookURL, err := url.Parse(hook.Config.GetURL())
|
|
if err == nil && hookURL.Host == link.Host {
|
|
return hook
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
var reDeploy = regexp.MustCompile(`.+/deployments/(\d+)`)
|
|
|
|
// Status sends the commit status to the forge.
|
|
// An example would be the GitHub pull request status.
|
|
func (c *client) Status(ctx context.Context, user *model.User, repo *model.Repo, pipeline *model.Pipeline, workflow *model.Workflow) error {
|
|
client := c.newClientToken(ctx, user.AccessToken)
|
|
|
|
if pipeline.Event == model.EventDeploy {
|
|
// Get id from url. If not found, skip.
|
|
matches := reDeploy.FindStringSubmatch(pipeline.ForgeURL)
|
|
//nolint:mnd
|
|
if len(matches) != 2 {
|
|
return nil
|
|
}
|
|
id, _ := strconv.Atoi(matches[1])
|
|
|
|
_, _, err := client.Repositories.CreateDeploymentStatus(ctx, repo.Owner, repo.Name, int64(id), &github.DeploymentStatusRequest{
|
|
State: github.String(convertStatus(pipeline.Status)),
|
|
Description: github.String(common.GetPipelineStatusDescription(pipeline.Status)),
|
|
LogURL: github.String(common.GetPipelineStatusURL(repo, pipeline, nil)),
|
|
})
|
|
return err
|
|
}
|
|
|
|
_, _, err := client.Repositories.CreateStatus(ctx, repo.Owner, repo.Name, pipeline.Commit, &github.RepoStatus{
|
|
Context: github.String(common.GetPipelineStatusContext(repo, pipeline, workflow)),
|
|
State: github.String(convertStatus(workflow.State)),
|
|
Description: github.String(common.GetPipelineStatusDescription(workflow.State)),
|
|
TargetURL: github.String(common.GetPipelineStatusURL(repo, pipeline, workflow)),
|
|
})
|
|
return err
|
|
}
|
|
|
|
// Activate activates a repository by creating the post-commit hook and
|
|
// adding the SSH deploy key, if applicable.
|
|
func (c *client) Activate(ctx context.Context, u *model.User, r *model.Repo, link string) error {
|
|
if err := c.Deactivate(ctx, u, r, link); err != nil {
|
|
return err
|
|
}
|
|
client := c.newClientToken(ctx, u.AccessToken)
|
|
hook := &github.Hook{
|
|
Name: github.String("web"),
|
|
Events: []string{
|
|
"push",
|
|
"pull_request",
|
|
"deployment",
|
|
},
|
|
Config: &github.HookConfig{
|
|
URL: &link,
|
|
ContentType: github.String("form"),
|
|
},
|
|
}
|
|
_, _, err := client.Repositories.CreateHook(ctx, r.Owner, r.Name, hook)
|
|
return err
|
|
}
|
|
|
|
// Branches returns the names of all branches for the named repository.
|
|
func (c *client) Branches(ctx context.Context, u *model.User, r *model.Repo, p *model.ListOptions) ([]string, error) {
|
|
token := common.UserToken(ctx, r, u)
|
|
client := c.newClientToken(ctx, token)
|
|
|
|
githubBranches, _, err := client.Repositories.ListBranches(ctx, r.Owner, r.Name, &github.BranchListOptions{
|
|
ListOptions: github.ListOptions{Page: p.Page, PerPage: p.PerPage},
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
branches := make([]string, 0)
|
|
for _, branch := range githubBranches {
|
|
branches = append(branches, *branch.Name)
|
|
}
|
|
return branches, nil
|
|
}
|
|
|
|
// BranchHead returns the sha of the head (latest commit) of the specified branch.
|
|
func (c *client) BranchHead(ctx context.Context, u *model.User, r *model.Repo, branch string) (*model.Commit, error) {
|
|
token := common.UserToken(ctx, r, u)
|
|
b, _, err := c.newClientToken(ctx, token).Repositories.GetBranch(ctx, r.Owner, r.Name, branch, 1)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &model.Commit{
|
|
SHA: b.GetCommit().GetSHA(),
|
|
ForgeURL: b.GetCommit().GetHTMLURL(),
|
|
}, nil
|
|
}
|
|
|
|
// Hook parses the post-commit hook from the Request body
|
|
// and returns the required data in a standard format.
|
|
func (c *client) Hook(ctx context.Context, r *http.Request) (*model.Repo, *model.Pipeline, error) {
|
|
pull, repo, pipeline, err := parseHook(r, c.MergeRef)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
if pipeline != nil && pipeline.Event == model.EventRelease && pipeline.Commit == "" {
|
|
tagName := strings.Split(pipeline.Ref, "/")[2]
|
|
sha, err := c.getTagCommitSHA(ctx, repo, tagName)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
pipeline.Commit = sha
|
|
}
|
|
|
|
if pull != nil && len(pipeline.ChangedFiles) == 0 {
|
|
pipeline, err = c.loadChangedFilesFromPullRequest(ctx, pull, repo, pipeline)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
}
|
|
|
|
return repo, pipeline, nil
|
|
}
|
|
|
|
func (c *client) loadChangedFilesFromPullRequest(ctx context.Context, pull *github.PullRequest, tmpRepo *model.Repo, pipeline *model.Pipeline) (*model.Pipeline, error) {
|
|
_store, ok := store.TryFromContext(ctx)
|
|
if !ok {
|
|
log.Error().Msg("could not get store from context")
|
|
return pipeline, nil
|
|
}
|
|
|
|
repo, err := _store.GetRepoNameFallback(tmpRepo.ForgeRemoteID, tmpRepo.FullName)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
user, err := _store.GetUser(repo.UserID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
pipeline.ChangedFiles, err = utils.Paginate(func(page int) ([]string, error) {
|
|
opts := &github.ListOptions{Page: page}
|
|
fileList := make([]string, 0, 16)
|
|
for opts.Page > 0 {
|
|
files, resp, err := c.newClientToken(ctx, user.AccessToken).PullRequests.ListFiles(ctx, repo.Owner, repo.Name, pull.GetNumber(), opts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
for _, file := range files {
|
|
fileList = append(fileList, file.GetFilename(), file.GetPreviousFilename())
|
|
}
|
|
|
|
opts.Page = resp.NextPage
|
|
}
|
|
return utils.DeduplicateStrings(fileList), nil
|
|
}, -1)
|
|
|
|
return pipeline, err
|
|
}
|
|
|
|
func (c *client) getTagCommitSHA(ctx context.Context, repo *model.Repo, tagName string) (string, error) {
|
|
_store, ok := store.TryFromContext(ctx)
|
|
if !ok {
|
|
log.Error().Msg("could not get store from context")
|
|
return "", nil
|
|
}
|
|
|
|
repo, err := _store.GetRepoNameFallback(repo.ForgeRemoteID, repo.FullName)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
user, err := _store.GetUser(repo.UserID)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
gh := c.newClientToken(ctx, user.AccessToken)
|
|
|
|
page := 1
|
|
var tag *github.RepositoryTag
|
|
for {
|
|
tags, _, err := gh.Repositories.ListTags(ctx, repo.Owner, repo.Name, &github.ListOptions{Page: page})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
for _, t := range tags {
|
|
if t.GetName() == tagName {
|
|
tag = t
|
|
break
|
|
}
|
|
}
|
|
if tag != nil {
|
|
break
|
|
}
|
|
}
|
|
if tag == nil {
|
|
return "", fmt.Errorf("could not find tag %s", tagName)
|
|
}
|
|
return tag.GetCommit().GetSHA(), nil
|
|
}
|