forked from vieter-v/vieter
First part of RESTful API (not correct yet) [CI SKIP]
parent
09d0a40aae
commit
a4a71a2797
135
src/server/git.v
135
src/server/git.v
|
@ -3,16 +3,44 @@ module server
|
||||||
import web
|
import web
|
||||||
import os
|
import os
|
||||||
import json
|
import json
|
||||||
|
import rand
|
||||||
const repos_file = 'repos.json'
|
|
||||||
|
|
||||||
pub struct GitRepo {
|
pub struct GitRepo {
|
||||||
pub:
|
pub mut:
|
||||||
url string [required]
|
// URL of the Git repository
|
||||||
branch string [required]
|
url string
|
||||||
|
// Branch of the Git repository to use
|
||||||
|
branch string
|
||||||
|
// On which architectures the package is allowed to be built. In reality,
|
||||||
|
// this controls which builders will periodically build the image.
|
||||||
|
arch []string
|
||||||
}
|
}
|
||||||
|
|
||||||
fn read_repos(path string) ?[]GitRepo {
|
fn (mut r GitRepo) patch_from_params(params &map[string]string) ? {
|
||||||
|
$for field in GitRepo.fields {
|
||||||
|
if field.name in params {
|
||||||
|
$if field.typ is string {
|
||||||
|
r.$(field.name) = params[field.name]
|
||||||
|
// This specific type check is needed for the compiler to ensure
|
||||||
|
// our types are correct
|
||||||
|
} $else $if field.typ is []string {
|
||||||
|
r.$(field.name) = params[field.name].split(',')
|
||||||
|
}
|
||||||
|
}else{
|
||||||
|
return error('Missing parameter: ${field.name}.')
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn repo_from_params(params &map[string]string) ?GitRepo {
|
||||||
|
mut repo := GitRepo{}
|
||||||
|
|
||||||
|
repo.patch_from_params(params) ?
|
||||||
|
|
||||||
|
return repo
|
||||||
|
}
|
||||||
|
|
||||||
|
fn read_repos(path string) ?map[string]GitRepo {
|
||||||
if !os.exists(path) {
|
if !os.exists(path) {
|
||||||
mut f := os.create(path) ?
|
mut f := os.create(path) ?
|
||||||
|
|
||||||
|
@ -20,17 +48,17 @@ fn read_repos(path string) ?[]GitRepo {
|
||||||
f.close()
|
f.close()
|
||||||
}
|
}
|
||||||
|
|
||||||
f.write_string('[]') ?
|
f.write_string('{}') ?
|
||||||
|
|
||||||
return []
|
return {}
|
||||||
}
|
}
|
||||||
|
|
||||||
content := os.read_file(path) ?
|
content := os.read_file(path) ?
|
||||||
res := json.decode([]GitRepo, content) ?
|
res := json.decode(map[string]GitRepo, content) ?
|
||||||
return res
|
return res
|
||||||
}
|
}
|
||||||
|
|
||||||
fn write_repos(path string, repos []GitRepo) ? {
|
fn write_repos(path string, repos &map[string]GitRepo) ? {
|
||||||
mut f := os.create(path) ?
|
mut f := os.create(path) ?
|
||||||
|
|
||||||
defer {
|
defer {
|
||||||
|
@ -58,20 +86,40 @@ fn (mut app App) get_repos() web.Result {
|
||||||
return app.json(repos)
|
return app.json(repos)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
['/api/repos/:id'; get]
|
||||||
|
fn (mut app App) get_single_repo(id string) web.Result {
|
||||||
|
if !app.is_authorized() {
|
||||||
|
return app.text('Unauthorized.')
|
||||||
|
}
|
||||||
|
|
||||||
|
repos := rlock app.git_mutex {
|
||||||
|
read_repos(app.conf.repos_file) or {
|
||||||
|
app.lerror('Failed to read repos file.')
|
||||||
|
|
||||||
|
return app.server_error(500)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if id !in repos {
|
||||||
|
return app.not_found()
|
||||||
|
}
|
||||||
|
|
||||||
|
repo := repos[id]
|
||||||
|
|
||||||
|
return app.json(repo)
|
||||||
|
}
|
||||||
|
|
||||||
['/api/repos'; post]
|
['/api/repos'; post]
|
||||||
fn (mut app App) post_repo() web.Result {
|
fn (mut app App) post_repo() web.Result {
|
||||||
if !app.is_authorized() {
|
if !app.is_authorized() {
|
||||||
return app.text('Unauthorized.')
|
return app.text('Unauthorized.')
|
||||||
}
|
}
|
||||||
|
|
||||||
if !('url' in app.query && 'branch' in app.query) {
|
new_repo := repo_from_params(&app.query) or {
|
||||||
return app.server_error(400)
|
return app.server_error(400)
|
||||||
}
|
}
|
||||||
|
|
||||||
new_repo := GitRepo{
|
id := rand.uuid_v4()
|
||||||
url: app.query['url']
|
|
||||||
branch: app.query['branch']
|
|
||||||
}
|
|
||||||
|
|
||||||
mut repos := rlock app.git_mutex {
|
mut repos := rlock app.git_mutex {
|
||||||
read_repos(app.conf.repos_file) or {
|
read_repos(app.conf.repos_file) or {
|
||||||
|
@ -82,36 +130,27 @@ fn (mut app App) post_repo() web.Result {
|
||||||
}
|
}
|
||||||
|
|
||||||
// We need to check for duplicates
|
// We need to check for duplicates
|
||||||
for r in repos {
|
for _, repo in repos {
|
||||||
if r == new_repo {
|
if repo == new_repo {
|
||||||
return app.text('Duplicate repository.')
|
return app.text('Duplicate repository.')
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
repos << new_repo
|
repos[id] = new_repo
|
||||||
|
|
||||||
lock app.git_mutex {
|
lock app.git_mutex {
|
||||||
write_repos(app.conf.repos_file, repos) or { return app.server_error(500) }
|
write_repos(app.conf.repos_file, &repos) or { return app.server_error(500) }
|
||||||
}
|
}
|
||||||
|
|
||||||
return app.ok('Repo added successfully.')
|
return app.ok('Repo added successfully.')
|
||||||
}
|
}
|
||||||
|
|
||||||
['/api/repos'; delete]
|
['/api/repos/:id'; delete]
|
||||||
fn (mut app App) delete_repo() web.Result {
|
fn (mut app App) delete_repo(id string) web.Result {
|
||||||
if !app.is_authorized() {
|
if !app.is_authorized() {
|
||||||
return app.text('Unauthorized.')
|
return app.text('Unauthorized.')
|
||||||
}
|
}
|
||||||
|
|
||||||
if !('url' in app.query && 'branch' in app.query) {
|
|
||||||
return app.server_error(400)
|
|
||||||
}
|
|
||||||
|
|
||||||
repo_to_remove := GitRepo{
|
|
||||||
url: app.query['url']
|
|
||||||
branch: app.query['branch']
|
|
||||||
}
|
|
||||||
|
|
||||||
mut repos := rlock app.git_mutex {
|
mut repos := rlock app.git_mutex {
|
||||||
read_repos(app.conf.repos_file) or {
|
read_repos(app.conf.repos_file) or {
|
||||||
app.lerror('Failed to read repos file.')
|
app.lerror('Failed to read repos file.')
|
||||||
|
@ -119,11 +158,43 @@ fn (mut app App) delete_repo() web.Result {
|
||||||
return app.server_error(500)
|
return app.server_error(500)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
filtered := repos.filter(it != repo_to_remove)
|
|
||||||
|
if id !in repos {
|
||||||
|
return app.not_found()
|
||||||
|
}
|
||||||
|
|
||||||
|
repos.delete(id)
|
||||||
|
|
||||||
lock app.git_mutex {
|
lock app.git_mutex {
|
||||||
write_repos(app.conf.repos_file, filtered) or { return app.server_error(500) }
|
write_repos(app.conf.repos_file, &repos) or { return app.server_error(500) }
|
||||||
}
|
}
|
||||||
|
|
||||||
return app.ok('Repo removed successfully.')
|
return app.ok('Repo removed successfully.')
|
||||||
}
|
}
|
||||||
|
|
||||||
|
['/api/repos/:id'; patch]
|
||||||
|
fn (mut app App) patch_repo(id string) web.Result {
|
||||||
|
if !app.is_authorized() {
|
||||||
|
return app.text('Unauthorized.')
|
||||||
|
}
|
||||||
|
|
||||||
|
mut repos := rlock app.git_mutex {
|
||||||
|
read_repos(app.conf.repos_file) or {
|
||||||
|
app.lerror('Failed to read repos file.')
|
||||||
|
|
||||||
|
return app.server_error(500)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if id !in repos {
|
||||||
|
return app.not_found()
|
||||||
|
}
|
||||||
|
|
||||||
|
repos[id].patch_from_params(&app.query)
|
||||||
|
|
||||||
|
lock app.git_mutex {
|
||||||
|
write_repos(app.conf.repos_file, &repos) or { return app.server_error(500) }
|
||||||
|
}
|
||||||
|
|
||||||
|
return app.ok('Repo updated successfully.')
|
||||||
|
}
|
||||||
|
|
Loading…
Reference in New Issue