summaryrefslogtreecommitdiff
path: root/app/controllers/projects/settings/access_tokens_controller.rb
blob: cbd6716fdf747aec3a3c9ce83ed9117aa720adb7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
# frozen_string_literal: true

module Projects
  module Settings
    class AccessTokensController < Projects::ApplicationController
      include ProjectsHelper

      before_action :check_feature_availability

      feature_category :authentication_and_authorization

      def index
        @project_access_token = PersonalAccessToken.new
        set_index_vars
      end

      def create
        token_response = ResourceAccessTokens::CreateService.new(current_user, @project, create_params).execute

        if token_response.success?
          @project_access_token = token_response.payload[:access_token]
          PersonalAccessToken.redis_store!(key_identity, @project_access_token.token)

          redirect_to namespace_project_settings_access_tokens_path, notice: _("Your new project access token has been created.")
        else
          render :index
        end
      end

      def revoke
        @project_access_token = finder.find(params[:id])
        revoked_response = ResourceAccessTokens::RevokeService.new(current_user, @project, @project_access_token).execute

        if revoked_response.success?
          flash[:notice] = _("Revoked project access token %{project_access_token_name}!") % { project_access_token_name: @project_access_token.name }
        else
          flash[:alert] = _("Could not revoke project access token %{project_access_token_name}.") % { project_access_token_name: @project_access_token.name }
        end

        redirect_to namespace_project_settings_access_tokens_path
      end

      private

      def check_feature_availability
        render_404 unless project_access_token_available?(@project)
      end

      def create_params
        params.require(:project_access_token).permit(:name, :expires_at, scopes: [])
      end

      def set_index_vars
        @scopes = Gitlab::Auth.resource_bot_scopes
        @active_project_access_tokens = finder(state: 'active').execute
        @inactive_project_access_tokens = finder(state: 'inactive', sort: 'expires_at_asc').execute
        @new_project_access_token = PersonalAccessToken.redis_getdel(key_identity)
      end

      def finder(options = {})
        PersonalAccessTokensFinder.new({ user: bot_users, impersonation: false }.merge(options))
      end

      def bot_users
        @project.bots
      end

      def key_identity
        "#{current_user.id}:#{@project.id}"
      end
    end
  end
end