@backstage/integration
Advanced tools
Comparing version
# @backstage/integration | ||
## 0.3.0 | ||
### Minor Changes | ||
- ed6baab66: - Deprecating the `scaffolder.${provider}.token` auth duplication and favoring `integrations.${provider}` instead. If you receive deprecation warnings your config should change like the following: | ||
```yaml | ||
scaffolder: | ||
github: | ||
token: | ||
$env: GITHUB_TOKEN | ||
visibility: public | ||
``` | ||
To something that looks like this: | ||
```yaml | ||
integration: | ||
github: | ||
- host: github.com | ||
token: | ||
$env: GITHUB_TOKEN | ||
scaffolder: | ||
github: | ||
visibility: public | ||
``` | ||
You can also configure multiple different hosts under the `integration` config like the following: | ||
```yaml | ||
integration: | ||
github: | ||
- host: github.com | ||
token: | ||
$env: GITHUB_TOKEN | ||
- host: ghe.mycompany.com | ||
token: | ||
$env: GITHUB_ENTERPRISE_TOKEN | ||
``` | ||
This of course is the case for all the providers respectively. | ||
- Adding support for cross provider scaffolding, you can now create repositories in for example Bitbucket using a template residing in GitHub. | ||
- Fix GitLab scaffolding so that it returns a `catalogInfoUrl` which automatically imports the project into the catalog. | ||
- The `Store Path` field on the `scaffolder` frontend has now changed so that you require the full URL to the desired destination repository. | ||
`backstage/new-repository` would become `https://github.com/backstage/new-repository` if provider was GitHub for example. | ||
### Patch Changes | ||
- 0b135e7e0: Add support for GitHub Apps authentication for backend plugins. | ||
`GithubCredentialsProvider` requests and caches GitHub credentials based on a repository or organization url. | ||
The `GithubCredentialsProvider` class should be considered stateful since tokens will be cached internally. | ||
Consecutive calls to get credentials will return the same token, tokens older than 50 minutes will be considered expired and reissued. | ||
`GithubCredentialsProvider` will default to the configured access token if no GitHub Apps are configured. | ||
More information on how to create and configure a GitHub App to use with backstage can be found in the documentation. | ||
Usage: | ||
```javascript | ||
const credentialsProvider = new GithubCredentialsProvider(config); | ||
const { token, headers } = await credentialsProvider.getCredentials({ | ||
url: 'https://github.com/', | ||
}); | ||
``` | ||
Updates `GithubUrlReader` to use the `GithubCredentialsProvider`. | ||
- fa8ba330a: Fix GitLab API base URL and add it by default to the gitlab.com host | ||
## 0.2.0 | ||
@@ -4,0 +79,0 @@ |
100
config.d.ts
@@ -18,29 +18,115 @@ /* | ||
export interface Config { | ||
/** Configuration for integrations towards various external repository provider systems */ | ||
integrations?: { | ||
/** Integration configuration for Azure */ | ||
azure?: Array<{ | ||
/** @visibility frontend */ | ||
/** | ||
* The hostname of the given Azure instance | ||
* @visibility frontend | ||
*/ | ||
host: string; | ||
/** | ||
* Token used to authenticate requests. | ||
* @visibility secret | ||
*/ | ||
token?: string; | ||
}>; | ||
/** Integration configuration for Bitbucket */ | ||
bitbucket?: Array<{ | ||
/** @visibility frontend */ | ||
/** | ||
* The hostname of the given Bitbucket instance | ||
* @visibility frontend | ||
*/ | ||
host: string; | ||
/** @visibility frontend */ | ||
/** | ||
* Token used to authenticate requests. | ||
* @visibility secret | ||
*/ | ||
token?: string; | ||
/** | ||
* The base url for the Bitbucket API, for example https://api.bitbucket.org/2.0 | ||
* @visibility frontend | ||
*/ | ||
apiBaseUrl?: string; | ||
/** | ||
* The username to use for authenticated requests. | ||
* @visibility secret | ||
*/ | ||
username?: string; | ||
/** | ||
* Bitbucket app password used to authenticate requests. | ||
* @visibility secret | ||
*/ | ||
appPassword?: string; | ||
}>; | ||
/** Integration configuration for GitHub */ | ||
github?: Array<{ | ||
/** @visibility frontend */ | ||
/** | ||
* The hostname of the given GitHub instance | ||
* @visibility frontend | ||
*/ | ||
host: string; | ||
/** @visibility frontend */ | ||
/** | ||
* Token used to authenticate requests. | ||
* @visibility secret | ||
*/ | ||
token?: string; | ||
/** | ||
* The base url for the GitHub API, for example https://api.github.com | ||
* @visibility frontend | ||
*/ | ||
apiBaseUrl?: string; | ||
/** @visibility frontend */ | ||
/** | ||
* The base url for GitHub raw resources, for example https://raw.githubusercontent.com | ||
* @visibility frontend | ||
*/ | ||
rawBaseUrl?: string; | ||
/** | ||
* GitHub Apps configuration | ||
* @visibility backend | ||
*/ | ||
apps?: Array<{ | ||
/** | ||
* The numeric GitHub App ID | ||
*/ | ||
appId: number; | ||
/** | ||
* The private key to use for auth against the app | ||
* @visibility secret | ||
*/ | ||
privateKey: string; | ||
/** | ||
* The secret used for webhooks | ||
* @visibility secret | ||
*/ | ||
webhookSecret: string; | ||
/** | ||
* The client ID to use | ||
*/ | ||
clientId: string; | ||
/** | ||
* The client secret to use | ||
* @visibility secret | ||
*/ | ||
clientSecret: string; | ||
}>; | ||
}>; | ||
/** Integration configuration for GitLab */ | ||
gitlab?: Array<{ | ||
/** @visibility frontend */ | ||
/** | ||
* The hostname of the given GitLab instance | ||
* @visibility frontend | ||
*/ | ||
host: string; | ||
/** | ||
* Token used to authenticate requests. | ||
* @visibility secret | ||
*/ | ||
token?: string; | ||
}>; | ||
}; | ||
} |
@@ -7,2 +7,5 @@ 'use strict'; | ||
var fetch = require('cross-fetch'); | ||
var authApp = require('@octokit/auth-app'); | ||
var rest = require('@octokit/rest'); | ||
var luxon = require('luxon'); | ||
@@ -101,2 +104,38 @@ function _interopDefaultLegacy (e) { return e && typeof e === 'object' && 'default' in e ? e : { 'default': e }; } | ||
} | ||
function getAzureCommitsUrl(url) { | ||
var _a; | ||
try { | ||
const parsedUrl = new URL(url); | ||
const [ | ||
empty, | ||
userOrOrg, | ||
project, | ||
srcKeyword, | ||
repoName | ||
] = parsedUrl.pathname.split("/"); | ||
const ref = (_a = parsedUrl.searchParams.get("version")) == null ? void 0 : _a.substr(2); | ||
if (!!empty || !userOrOrg || !project || srcKeyword !== "_git" || !repoName) { | ||
throw new Error("Wrong Azure Devops URL"); | ||
} | ||
parsedUrl.pathname = [ | ||
empty, | ||
userOrOrg, | ||
project, | ||
"_apis", | ||
"git", | ||
"repositories", | ||
repoName, | ||
"commits" | ||
].join("/"); | ||
const queryParams = []; | ||
if (ref) { | ||
queryParams.push(`searchCriteria.itemVersion.version=${ref}`); | ||
} | ||
parsedUrl.search = queryParams.join("&"); | ||
parsedUrl.protocol = "https"; | ||
return parsedUrl.toString(); | ||
} catch (e) { | ||
throw new Error(`Incorrect URL: ${url}, ${e}`); | ||
} | ||
} | ||
function getAzureRequestOptions(config2, additionalHeaders) { | ||
@@ -222,3 +261,3 @@ const headers = additionalHeaders ? {...additionalHeaders} : {}; | ||
function readGitHubIntegrationConfig(config2) { | ||
var _a; | ||
var _a, _b; | ||
const host = (_a = config2.getOptionalString("host")) != null ? _a : GITHUB_HOST; | ||
@@ -228,2 +267,9 @@ let apiBaseUrl = config2.getOptionalString("apiBaseUrl"); | ||
const token = config2.getOptionalString("token"); | ||
const apps = (_b = config2.getOptionalConfigArray("apps")) == null ? void 0 : _b.map((c) => ({ | ||
appId: c.getNumber("appId"), | ||
clientId: c.getString("clientId"), | ||
clientSecret: c.getString("clientSecret"), | ||
webhookSecret: c.getString("webhookSecret"), | ||
privateKey: c.getString("privateKey") | ||
})); | ||
if (!isValidHost(host)) { | ||
@@ -242,3 +288,3 @@ throw new Error(`Invalid GitHub integration config, '${host}' is not a valid host`); | ||
} | ||
return {host, apiBaseUrl, rawBaseUrl, token}; | ||
return {host, apiBaseUrl, rawBaseUrl, token, apps}; | ||
} | ||
@@ -289,9 +335,145 @@ function readGitHubIntegrationConfigs(configs) { | ||
class Cache { | ||
constructor() { | ||
this.tokenCache = new Map(); | ||
this.isNotExpired = (date) => date.diff(luxon.DateTime.local(), "minutes").minutes > 50; | ||
} | ||
async getOrCreateToken(key, supplier) { | ||
const item = this.tokenCache.get(key); | ||
if (item && this.isNotExpired(item.expiresAt)) { | ||
return {accessToken: item.token}; | ||
} | ||
const result = await supplier(); | ||
this.tokenCache.set(key, result); | ||
return {accessToken: result.token}; | ||
} | ||
} | ||
const HEADERS = { | ||
Accept: "application/vnd.github.machine-man-preview+json" | ||
}; | ||
class GithubAppManager { | ||
constructor(config2, baseUrl) { | ||
this.cache = new Cache(); | ||
this.baseAuthConfig = { | ||
appId: config2.appId, | ||
privateKey: config2.privateKey | ||
}; | ||
this.appClient = new rest.Octokit({ | ||
baseUrl, | ||
headers: HEADERS, | ||
authStrategy: authApp.createAppAuth, | ||
auth: this.baseAuthConfig | ||
}); | ||
} | ||
async getInstallationCredentials(owner, repo) { | ||
const { | ||
installationId, | ||
suspended, | ||
repositorySelection | ||
} = await this.getInstallationData(owner); | ||
if (suspended) { | ||
throw new Error(`The GitHub application for ${[owner, repo].filter(Boolean).join("/")} is suspended`); | ||
} | ||
if (repositorySelection !== "all" && !repo) { | ||
throw new Error(`The Backstage GitHub application used in the ${owner} organization must be installed for the entire organization to be able to issue credentials without a specified repository.`); | ||
} | ||
const cacheKey = !repo ? owner : `${owner}/${repo}`; | ||
const repositories = repositorySelection !== "all" ? [repo] : void 0; | ||
return this.cache.getOrCreateToken(cacheKey, async () => { | ||
const result = await this.appClient.apps.createInstallationAccessToken({ | ||
installation_id: installationId, | ||
headers: HEADERS, | ||
repositories | ||
}); | ||
return { | ||
token: result.data.token, | ||
expiresAt: luxon.DateTime.fromISO(result.data.expires_at) | ||
}; | ||
}); | ||
} | ||
async getInstallationData(owner) { | ||
var _a, _b; | ||
try { | ||
this.installations = await this.appClient.apps.listInstallations({ | ||
headers: { | ||
"If-None-Match": (_a = this.installations) == null ? void 0 : _a.headers.etag, | ||
Accept: HEADERS.Accept | ||
} | ||
}); | ||
} catch (error) { | ||
if (error.status !== 304) { | ||
throw error; | ||
} | ||
} | ||
const installation = (_b = this.installations) == null ? void 0 : _b.data.find((inst) => { | ||
var _a2; | ||
return ((_a2 = inst.account) == null ? void 0 : _a2.login) === owner; | ||
}); | ||
if (installation) { | ||
return { | ||
installationId: installation.id, | ||
suspended: Boolean(installation.suspended_by), | ||
repositorySelection: installation.repository_selection | ||
}; | ||
} | ||
const notFoundError = new Error(`No app installation found for ${owner} in ${this.baseAuthConfig.appId}`); | ||
notFoundError.name = "NotFoundError"; | ||
throw notFoundError; | ||
} | ||
} | ||
class GithubAppCredentialsMux { | ||
constructor(config2) { | ||
var _a, _b; | ||
this.apps = (_b = (_a = config2.apps) == null ? void 0 : _a.map((ac) => new GithubAppManager(ac, config2.apiBaseUrl))) != null ? _b : []; | ||
} | ||
async getAppToken(owner, repo) { | ||
if (this.apps.length === 0) { | ||
return void 0; | ||
} | ||
const results = await Promise.all(this.apps.map((app) => app.getInstallationCredentials(owner, repo).then((credentials) => ({credentials, error: void 0}), (error) => ({credentials: void 0, error})))); | ||
const result = results.find((result2) => result2.credentials); | ||
if (result) { | ||
return result.credentials.accessToken; | ||
} | ||
const errors = results.map((r) => r.error); | ||
const notNotFoundError = errors.find((err) => err.name !== "NotFoundError"); | ||
if (notNotFoundError) { | ||
throw notNotFoundError; | ||
} | ||
return void 0; | ||
} | ||
} | ||
class GithubCredentialsProvider { | ||
constructor(githubAppCredentialsMux, token) { | ||
this.githubAppCredentialsMux = githubAppCredentialsMux; | ||
this.token = token; | ||
} | ||
static create(config2) { | ||
return new GithubCredentialsProvider(new GithubAppCredentialsMux(config2), config2.token); | ||
} | ||
async getCredentials(opts) { | ||
const parsed = parseGitUrl__default['default'](opts.url); | ||
const owner = parsed.owner || parsed.name; | ||
const repo = parsed.owner ? parsed.name : void 0; | ||
let token = await this.githubAppCredentialsMux.getAppToken(owner, repo); | ||
if (!token) { | ||
token = this.token; | ||
} | ||
return { | ||
headers: token ? { | ||
Authorization: `Bearer ${token}` | ||
} : void 0, | ||
token | ||
}; | ||
} | ||
} | ||
const GITLAB_HOST = "gitlab.com"; | ||
const GITLAB_API_BASE_URL = "gitlab.com/api/v4"; | ||
const GITLAB_API_BASE_URL = "https://gitlab.com/api/v4"; | ||
function readGitLabIntegrationConfig(config2) { | ||
var _a; | ||
var _a, _b; | ||
const host = (_a = config2.getOptionalString("host")) != null ? _a : GITLAB_HOST; | ||
let apiBaseUrl = config2.getOptionalString("apiBaseUrl"); | ||
const token = config2.getOptionalString("token"); | ||
const baseUrl = (_b = config2.getOptionalString("baseUrl")) != null ? _b : `https://${host}`; | ||
if (!isValidHost(host)) { | ||
@@ -305,3 +487,3 @@ throw new Error(`Invalid GitLab integration config, '${host}' is not a valid host`); | ||
} | ||
return {host, token, apiBaseUrl}; | ||
return {host, token, apiBaseUrl, baseUrl}; | ||
} | ||
@@ -311,3 +493,3 @@ function readGitLabIntegrationConfigs(configs) { | ||
if (!result.some((c) => c.host === GITLAB_HOST)) { | ||
result.push({host: GITLAB_HOST}); | ||
result.push({host: GITLAB_HOST, apiBaseUrl: GITLAB_API_BASE_URL}); | ||
} | ||
@@ -507,3 +689,5 @@ return result; | ||
exports.GithubCredentialsProvider = GithubCredentialsProvider; | ||
exports.ScmIntegrations = ScmIntegrations; | ||
exports.getAzureCommitsUrl = getAzureCommitsUrl; | ||
exports.getAzureDownloadUrl = getAzureDownloadUrl; | ||
@@ -510,0 +694,0 @@ exports.getAzureFileFetchUrl = getAzureFileFetchUrl; |
@@ -53,2 +53,8 @@ import { Config } from '@backstage/config'; | ||
/** | ||
* Given a URL, return the API URL to fetch commits on the branch. | ||
* | ||
* @param url A URL pointing to a repository or a sub-path | ||
*/ | ||
declare function getAzureCommitsUrl(url: string): string; | ||
/** | ||
* Gets the request options necessary to make requests to a given provider. | ||
@@ -179,4 +185,37 @@ * | ||
token?: string; | ||
/** | ||
* The GitHub Apps configuration to use for requests to this provider. | ||
* | ||
* If no apps are specified, token or anonymous is used. | ||
*/ | ||
apps?: GithubAppConfig[]; | ||
}; | ||
/** | ||
* The configuration parameters for authenticating a GitHub Application. | ||
* A Github Apps configuration can be generated using the `backstage-cli create-github-app` command. | ||
*/ | ||
declare type GithubAppConfig = { | ||
/** | ||
* Unique app identifier, found at https://github.com/organizations/$org/settings/apps/$AppName | ||
*/ | ||
appId: number; | ||
/** | ||
* The private key is used by the GitHub App integration to authenticate the app. | ||
* A private key can be generated from the app at https://github.com/organizations/$org/settings/apps/$AppName | ||
*/ | ||
privateKey: string; | ||
/** | ||
* Webhook secret can be configured at https://github.com/organizations/$org/settings/apps/$AppName | ||
*/ | ||
webhookSecret: string; | ||
/** | ||
* Found at https://github.com/organizations/$org/settings/apps/$AppName | ||
*/ | ||
clientId: string; | ||
/** | ||
* Client secrets can be generated at https://github.com/organizations/$org/settings/apps/$AppName | ||
*/ | ||
clientSecret: string; | ||
}; | ||
/** | ||
* Reads a single GitHub integration config. | ||
@@ -215,2 +254,27 @@ * | ||
declare type GithubCredentials = { | ||
headers?: { | ||
[name: string]: string; | ||
}; | ||
token?: string; | ||
}; | ||
declare class GithubCredentialsProvider { | ||
private readonly githubAppCredentialsMux; | ||
private readonly token?; | ||
static create(config: GitHubIntegrationConfig): GithubCredentialsProvider; | ||
private constructor(); | ||
/** | ||
* Returns GithubCredentials for requested url. | ||
* Consecutive calls to this method with the same url will return cached credentials. | ||
* The shortest lifetime for a token returned is 10 minutes. | ||
* @param opts containing the organization or repository url | ||
* @returns {Promise} of @type {GithubCredentials}. | ||
* @example | ||
* const { token, headers } = await getCredentials({url: 'github.com/backstage/foobar'}) | ||
*/ | ||
getCredentials(opts: { | ||
url: string; | ||
}): Promise<GithubCredentials>; | ||
} | ||
/** | ||
@@ -240,2 +304,9 @@ * The configuration parameters for a single GitLab integration. | ||
token?: string; | ||
/** | ||
* The baseUrl of this provider, e.g "https://gitlab.com", | ||
* which is passed into the gitlab client. | ||
* | ||
* If no baseUrl is provided, it will default to https://${host} | ||
*/ | ||
baseUrl?: string; | ||
}; | ||
@@ -381,2 +452,2 @@ /** | ||
export { AzureIntegrationConfig, BitbucketIntegrationConfig, GitHubIntegrationConfig, GitLabIntegrationConfig, ScmIntegration, ScmIntegrationRegistry, ScmIntegrations, getAzureDownloadUrl, getAzureFileFetchUrl, getAzureRequestOptions, getBitbucketDefaultBranch, getBitbucketDownloadUrl, getBitbucketFileFetchUrl, getBitbucketRequestOptions, getGitHubFileFetchUrl, getGitHubRequestOptions, getGitLabFileFetchUrl, getGitLabRequestOptions, readAzureIntegrationConfig, readAzureIntegrationConfigs, readBitbucketIntegrationConfig, readBitbucketIntegrationConfigs, readGitHubIntegrationConfig, readGitHubIntegrationConfigs, readGitLabIntegrationConfig, readGitLabIntegrationConfigs }; | ||
export { AzureIntegrationConfig, BitbucketIntegrationConfig, GitHubIntegrationConfig, GitLabIntegrationConfig, GithubCredentialsProvider, ScmIntegration, ScmIntegrationRegistry, ScmIntegrations, getAzureCommitsUrl, getAzureDownloadUrl, getAzureFileFetchUrl, getAzureRequestOptions, getBitbucketDefaultBranch, getBitbucketDownloadUrl, getBitbucketFileFetchUrl, getBitbucketRequestOptions, getGitHubFileFetchUrl, getGitHubRequestOptions, getGitLabFileFetchUrl, getGitLabRequestOptions, readAzureIntegrationConfig, readAzureIntegrationConfigs, readBitbucketIntegrationConfig, readBitbucketIntegrationConfigs, readGitHubIntegrationConfig, readGitHubIntegrationConfigs, readGitLabIntegrationConfig, readGitLabIntegrationConfigs }; |
import parseGitUrl from 'git-url-parse'; | ||
import fetch from 'cross-fetch'; | ||
import { createAppAuth } from '@octokit/auth-app'; | ||
import { Octokit } from '@octokit/rest'; | ||
import { DateTime } from 'luxon'; | ||
@@ -91,2 +94,38 @@ function isValidHost(url) { | ||
} | ||
function getAzureCommitsUrl(url) { | ||
var _a; | ||
try { | ||
const parsedUrl = new URL(url); | ||
const [ | ||
empty, | ||
userOrOrg, | ||
project, | ||
srcKeyword, | ||
repoName | ||
] = parsedUrl.pathname.split("/"); | ||
const ref = (_a = parsedUrl.searchParams.get("version")) == null ? void 0 : _a.substr(2); | ||
if (!!empty || !userOrOrg || !project || srcKeyword !== "_git" || !repoName) { | ||
throw new Error("Wrong Azure Devops URL"); | ||
} | ||
parsedUrl.pathname = [ | ||
empty, | ||
userOrOrg, | ||
project, | ||
"_apis", | ||
"git", | ||
"repositories", | ||
repoName, | ||
"commits" | ||
].join("/"); | ||
const queryParams = []; | ||
if (ref) { | ||
queryParams.push(`searchCriteria.itemVersion.version=${ref}`); | ||
} | ||
parsedUrl.search = queryParams.join("&"); | ||
parsedUrl.protocol = "https"; | ||
return parsedUrl.toString(); | ||
} catch (e) { | ||
throw new Error(`Incorrect URL: ${url}, ${e}`); | ||
} | ||
} | ||
function getAzureRequestOptions(config2, additionalHeaders) { | ||
@@ -212,3 +251,3 @@ const headers = additionalHeaders ? {...additionalHeaders} : {}; | ||
function readGitHubIntegrationConfig(config2) { | ||
var _a; | ||
var _a, _b; | ||
const host = (_a = config2.getOptionalString("host")) != null ? _a : GITHUB_HOST; | ||
@@ -218,2 +257,9 @@ let apiBaseUrl = config2.getOptionalString("apiBaseUrl"); | ||
const token = config2.getOptionalString("token"); | ||
const apps = (_b = config2.getOptionalConfigArray("apps")) == null ? void 0 : _b.map((c) => ({ | ||
appId: c.getNumber("appId"), | ||
clientId: c.getString("clientId"), | ||
clientSecret: c.getString("clientSecret"), | ||
webhookSecret: c.getString("webhookSecret"), | ||
privateKey: c.getString("privateKey") | ||
})); | ||
if (!isValidHost(host)) { | ||
@@ -232,3 +278,3 @@ throw new Error(`Invalid GitHub integration config, '${host}' is not a valid host`); | ||
} | ||
return {host, apiBaseUrl, rawBaseUrl, token}; | ||
return {host, apiBaseUrl, rawBaseUrl, token, apps}; | ||
} | ||
@@ -279,9 +325,145 @@ function readGitHubIntegrationConfigs(configs) { | ||
class Cache { | ||
constructor() { | ||
this.tokenCache = new Map(); | ||
this.isNotExpired = (date) => date.diff(DateTime.local(), "minutes").minutes > 50; | ||
} | ||
async getOrCreateToken(key, supplier) { | ||
const item = this.tokenCache.get(key); | ||
if (item && this.isNotExpired(item.expiresAt)) { | ||
return {accessToken: item.token}; | ||
} | ||
const result = await supplier(); | ||
this.tokenCache.set(key, result); | ||
return {accessToken: result.token}; | ||
} | ||
} | ||
const HEADERS = { | ||
Accept: "application/vnd.github.machine-man-preview+json" | ||
}; | ||
class GithubAppManager { | ||
constructor(config2, baseUrl) { | ||
this.cache = new Cache(); | ||
this.baseAuthConfig = { | ||
appId: config2.appId, | ||
privateKey: config2.privateKey | ||
}; | ||
this.appClient = new Octokit({ | ||
baseUrl, | ||
headers: HEADERS, | ||
authStrategy: createAppAuth, | ||
auth: this.baseAuthConfig | ||
}); | ||
} | ||
async getInstallationCredentials(owner, repo) { | ||
const { | ||
installationId, | ||
suspended, | ||
repositorySelection | ||
} = await this.getInstallationData(owner); | ||
if (suspended) { | ||
throw new Error(`The GitHub application for ${[owner, repo].filter(Boolean).join("/")} is suspended`); | ||
} | ||
if (repositorySelection !== "all" && !repo) { | ||
throw new Error(`The Backstage GitHub application used in the ${owner} organization must be installed for the entire organization to be able to issue credentials without a specified repository.`); | ||
} | ||
const cacheKey = !repo ? owner : `${owner}/${repo}`; | ||
const repositories = repositorySelection !== "all" ? [repo] : void 0; | ||
return this.cache.getOrCreateToken(cacheKey, async () => { | ||
const result = await this.appClient.apps.createInstallationAccessToken({ | ||
installation_id: installationId, | ||
headers: HEADERS, | ||
repositories | ||
}); | ||
return { | ||
token: result.data.token, | ||
expiresAt: DateTime.fromISO(result.data.expires_at) | ||
}; | ||
}); | ||
} | ||
async getInstallationData(owner) { | ||
var _a, _b; | ||
try { | ||
this.installations = await this.appClient.apps.listInstallations({ | ||
headers: { | ||
"If-None-Match": (_a = this.installations) == null ? void 0 : _a.headers.etag, | ||
Accept: HEADERS.Accept | ||
} | ||
}); | ||
} catch (error) { | ||
if (error.status !== 304) { | ||
throw error; | ||
} | ||
} | ||
const installation = (_b = this.installations) == null ? void 0 : _b.data.find((inst) => { | ||
var _a2; | ||
return ((_a2 = inst.account) == null ? void 0 : _a2.login) === owner; | ||
}); | ||
if (installation) { | ||
return { | ||
installationId: installation.id, | ||
suspended: Boolean(installation.suspended_by), | ||
repositorySelection: installation.repository_selection | ||
}; | ||
} | ||
const notFoundError = new Error(`No app installation found for ${owner} in ${this.baseAuthConfig.appId}`); | ||
notFoundError.name = "NotFoundError"; | ||
throw notFoundError; | ||
} | ||
} | ||
class GithubAppCredentialsMux { | ||
constructor(config2) { | ||
var _a, _b; | ||
this.apps = (_b = (_a = config2.apps) == null ? void 0 : _a.map((ac) => new GithubAppManager(ac, config2.apiBaseUrl))) != null ? _b : []; | ||
} | ||
async getAppToken(owner, repo) { | ||
if (this.apps.length === 0) { | ||
return void 0; | ||
} | ||
const results = await Promise.all(this.apps.map((app) => app.getInstallationCredentials(owner, repo).then((credentials) => ({credentials, error: void 0}), (error) => ({credentials: void 0, error})))); | ||
const result = results.find((result2) => result2.credentials); | ||
if (result) { | ||
return result.credentials.accessToken; | ||
} | ||
const errors = results.map((r) => r.error); | ||
const notNotFoundError = errors.find((err) => err.name !== "NotFoundError"); | ||
if (notNotFoundError) { | ||
throw notNotFoundError; | ||
} | ||
return void 0; | ||
} | ||
} | ||
class GithubCredentialsProvider { | ||
constructor(githubAppCredentialsMux, token) { | ||
this.githubAppCredentialsMux = githubAppCredentialsMux; | ||
this.token = token; | ||
} | ||
static create(config2) { | ||
return new GithubCredentialsProvider(new GithubAppCredentialsMux(config2), config2.token); | ||
} | ||
async getCredentials(opts) { | ||
const parsed = parseGitUrl(opts.url); | ||
const owner = parsed.owner || parsed.name; | ||
const repo = parsed.owner ? parsed.name : void 0; | ||
let token = await this.githubAppCredentialsMux.getAppToken(owner, repo); | ||
if (!token) { | ||
token = this.token; | ||
} | ||
return { | ||
headers: token ? { | ||
Authorization: `Bearer ${token}` | ||
} : void 0, | ||
token | ||
}; | ||
} | ||
} | ||
const GITLAB_HOST = "gitlab.com"; | ||
const GITLAB_API_BASE_URL = "gitlab.com/api/v4"; | ||
const GITLAB_API_BASE_URL = "https://gitlab.com/api/v4"; | ||
function readGitLabIntegrationConfig(config2) { | ||
var _a; | ||
var _a, _b; | ||
const host = (_a = config2.getOptionalString("host")) != null ? _a : GITLAB_HOST; | ||
let apiBaseUrl = config2.getOptionalString("apiBaseUrl"); | ||
const token = config2.getOptionalString("token"); | ||
const baseUrl = (_b = config2.getOptionalString("baseUrl")) != null ? _b : `https://${host}`; | ||
if (!isValidHost(host)) { | ||
@@ -295,3 +477,3 @@ throw new Error(`Invalid GitLab integration config, '${host}' is not a valid host`); | ||
} | ||
return {host, token, apiBaseUrl}; | ||
return {host, token, apiBaseUrl, baseUrl}; | ||
} | ||
@@ -301,3 +483,3 @@ function readGitLabIntegrationConfigs(configs) { | ||
if (!result.some((c) => c.host === GITLAB_HOST)) { | ||
result.push({host: GITLAB_HOST}); | ||
result.push({host: GITLAB_HOST, apiBaseUrl: GITLAB_API_BASE_URL}); | ||
} | ||
@@ -497,3 +679,3 @@ return result; | ||
export { ScmIntegrations, getAzureDownloadUrl, getAzureFileFetchUrl, getAzureRequestOptions, getBitbucketDefaultBranch, getBitbucketDownloadUrl, getBitbucketFileFetchUrl, getBitbucketRequestOptions, getGitHubFileFetchUrl, getGitHubRequestOptions, getGitLabFileFetchUrl, getGitLabRequestOptions, readAzureIntegrationConfig, readAzureIntegrationConfigs, readBitbucketIntegrationConfig, readBitbucketIntegrationConfigs, readGitHubIntegrationConfig, readGitHubIntegrationConfigs, readGitLabIntegrationConfig, readGitLabIntegrationConfigs }; | ||
export { GithubCredentialsProvider, ScmIntegrations, getAzureCommitsUrl, getAzureDownloadUrl, getAzureFileFetchUrl, getAzureRequestOptions, getBitbucketDefaultBranch, getBitbucketDownloadUrl, getBitbucketFileFetchUrl, getBitbucketRequestOptions, getGitHubFileFetchUrl, getGitHubRequestOptions, getGitLabFileFetchUrl, getGitLabRequestOptions, readAzureIntegrationConfig, readAzureIntegrationConfigs, readBitbucketIntegrationConfig, readBitbucketIntegrationConfigs, readGitHubIntegrationConfig, readGitHubIntegrationConfigs, readGitLabIntegrationConfig, readGitLabIntegrationConfigs }; | ||
//# sourceMappingURL=index.esm.js.map |
{ | ||
"name": "@backstage/integration", | ||
"version": "0.2.0", | ||
"version": "0.3.0", | ||
"main": "dist/index.cjs.js", | ||
@@ -33,9 +33,13 @@ "types": "dist/index.d.ts", | ||
"@backstage/config": "^0.1.2", | ||
"@octokit/auth-app": "^2.10.5", | ||
"@octokit/rest": "^18.0.12", | ||
"cross-fetch": "^3.0.6", | ||
"git-url-parse": "^11.4.3" | ||
"git-url-parse": "^11.4.3", | ||
"luxon": "^1.25.0" | ||
}, | ||
"devDependencies": { | ||
"@backstage/cli": "^0.4.6", | ||
"@backstage/cli": "^0.4.7", | ||
"@backstage/test-utils": "^0.1.5", | ||
"@types/jest": "^26.0.7", | ||
"@types/luxon": "^1.25.0", | ||
"msw": "^0.21.2" | ||
@@ -48,4 +52,4 @@ }, | ||
"configSchema": "config.d.ts", | ||
"gitHead": "78a04ec03473ae52e3bff84d61e75c6aaaeee261", | ||
"gitHead": "52df679661a17c595a1288a1550b6e9f2dca5de6", | ||
"module": "dist/index.esm.js" | ||
} |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
202888
30.72%1902
37.53%6
100%5
25%+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added