screwdriver-api 4.1.285 → 4.1.288
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +1 -1
- package/plugins/pipelines/create.js +1 -0
- package/plugins/pipelines/remove.js +7 -1
- package/plugins/pipelines/tokens/create.js +4 -0
- package/plugins/pipelines/tokens/refresh.js +4 -0
- package/plugins/pipelines/tokens/remove.js +5 -0
- package/plugins/pipelines/update.js +7 -0
- package/plugins/secrets/create.js +4 -0
- package/plugins/secrets/remove.js +7 -1
- package/plugins/secrets/update.js +5 -0
package/package.json
CHANGED
|
@@ -3,6 +3,7 @@
|
|
|
3
3
|
const boom = require('@hapi/boom');
|
|
4
4
|
const joi = require('joi');
|
|
5
5
|
const schema = require('screwdriver-data-schema');
|
|
6
|
+
const logger = require('screwdriver-logger');
|
|
6
7
|
const idSchema = schema.models.pipeline.base.extract('id');
|
|
7
8
|
|
|
8
9
|
module.exports = () => ({
|
|
@@ -67,7 +68,12 @@ module.exports = () => ({
|
|
|
67
68
|
throw boom.boomify(error, { statusCode: error.statusCode });
|
|
68
69
|
})
|
|
69
70
|
// user has good permissions, remove the pipeline
|
|
70
|
-
.then(() =>
|
|
71
|
+
.then(async () => {
|
|
72
|
+
logger.info(
|
|
73
|
+
`[Audit] user ${user.username}:${scmContext} deletes the pipeline pipelineId:${request.params.id}, scmUri:${pipeline.scmUri}.`
|
|
74
|
+
);
|
|
75
|
+
await pipeline.remove();
|
|
76
|
+
})
|
|
71
77
|
.then(() => h.response().code(204))
|
|
72
78
|
);
|
|
73
79
|
})
|
|
@@ -3,6 +3,7 @@
|
|
|
3
3
|
const boom = require('@hapi/boom');
|
|
4
4
|
const joi = require('joi');
|
|
5
5
|
const schema = require('screwdriver-data-schema');
|
|
6
|
+
const logger = require('screwdriver-logger');
|
|
6
7
|
const urlLib = require('url');
|
|
7
8
|
const pipelineIdSchema = schema.models.pipeline.base.extract('id');
|
|
8
9
|
const tokenCreateSchema = schema.models.token.create;
|
|
@@ -52,6 +53,9 @@ module.exports = () => ({
|
|
|
52
53
|
throw boom.conflict(`Token ${match.name} already exists`);
|
|
53
54
|
}
|
|
54
55
|
|
|
56
|
+
logger.info(
|
|
57
|
+
`[Audit] user ${username}:${scmContext} creates the token name:${request.payload.name} for pipelineId:${pipelineId}.`
|
|
58
|
+
);
|
|
55
59
|
const token = await tokenFactory.create({
|
|
56
60
|
name: request.payload.name,
|
|
57
61
|
description: request.payload.description,
|
|
@@ -3,6 +3,7 @@
|
|
|
3
3
|
const boom = require('@hapi/boom');
|
|
4
4
|
const joi = require('joi');
|
|
5
5
|
const schema = require('screwdriver-data-schema');
|
|
6
|
+
const logger = require('screwdriver-logger');
|
|
6
7
|
const tokenIdSchema = schema.models.token.base.extract('id');
|
|
7
8
|
const pipelineIdSchema = schema.models.pipeline.base.extract('id');
|
|
8
9
|
const { getUserPermissions, getScmUri } = require('../../helper');
|
|
@@ -52,6 +53,9 @@ module.exports = () => ({
|
|
|
52
53
|
throw boom.forbidden('Pipeline does not own token');
|
|
53
54
|
}
|
|
54
55
|
|
|
56
|
+
logger.info(
|
|
57
|
+
`[Audit] user ${username}:${scmContext} refreshes the token name:${token.name} for pipelineId:${pipelineId}.`
|
|
58
|
+
);
|
|
55
59
|
const refreshed = await token.refresh();
|
|
56
60
|
|
|
57
61
|
return h.response(refreshed.toJson()).code(200);
|
|
@@ -3,6 +3,7 @@
|
|
|
3
3
|
const boom = require('@hapi/boom');
|
|
4
4
|
const joi = require('joi');
|
|
5
5
|
const schema = require('screwdriver-data-schema');
|
|
6
|
+
const logger = require('screwdriver-logger');
|
|
6
7
|
const tokenIdSchema = schema.models.token.base.extract('id');
|
|
7
8
|
const pipelineIdSchema = schema.models.pipeline.base.extract('id');
|
|
8
9
|
const { getUserPermissions, getScmUri } = require('../../helper');
|
|
@@ -52,6 +53,10 @@ module.exports = () => ({
|
|
|
52
53
|
throw boom.forbidden('Pipeline does not own token');
|
|
53
54
|
}
|
|
54
55
|
|
|
56
|
+
logger.info(
|
|
57
|
+
`[Audit] user ${username}:${scmContext} deletes the token name:${token.name} for pipelineId:${pipeline.id}.`
|
|
58
|
+
);
|
|
59
|
+
|
|
55
60
|
return token.remove().then(() => h.response().code(204));
|
|
56
61
|
},
|
|
57
62
|
validate: {
|
|
@@ -3,6 +3,7 @@
|
|
|
3
3
|
const boom = require('@hapi/boom');
|
|
4
4
|
const joi = require('joi');
|
|
5
5
|
const schema = require('screwdriver-data-schema');
|
|
6
|
+
const logger = require('screwdriver-logger');
|
|
6
7
|
const idSchema = schema.models.pipeline.base.extract('id');
|
|
7
8
|
const { formatCheckoutUrl, sanitizeRootDir } = require('./helper');
|
|
8
9
|
const { getUserPermissions } = require('../helper');
|
|
@@ -138,6 +139,12 @@ module.exports = () => ({
|
|
|
138
139
|
oldPipeline.settings = { ...oldPipeline.settings, ...settings };
|
|
139
140
|
}
|
|
140
141
|
|
|
142
|
+
if (checkoutUrl || rootDir) {
|
|
143
|
+
logger.info(
|
|
144
|
+
`[Audit] user ${user.username}:${scmContext} updates the scmUri for pipelineID:${id} to ${oldPipeline.scmUri}.`
|
|
145
|
+
);
|
|
146
|
+
}
|
|
147
|
+
|
|
141
148
|
// update pipeline
|
|
142
149
|
const updatedPipeline = await oldPipeline.update();
|
|
143
150
|
|
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
|
|
3
3
|
const boom = require('@hapi/boom');
|
|
4
4
|
const schema = require('screwdriver-data-schema');
|
|
5
|
+
const logger = require('screwdriver-logger');
|
|
5
6
|
const urlLib = require('url');
|
|
6
7
|
const { getUserPermissions, getScmUri } = require('../helper');
|
|
7
8
|
|
|
@@ -56,6 +57,9 @@ module.exports = () => ({
|
|
|
56
57
|
throw boom.conflict(`Secret already exists with the ID: ${secret.id}`);
|
|
57
58
|
}
|
|
58
59
|
|
|
60
|
+
logger.info(
|
|
61
|
+
`[Audit] user ${user.username}:${scmContext} creates the secret key:${request.payload.name} for pipelineId:${request.payload.pipelineId}.`
|
|
62
|
+
);
|
|
59
63
|
const newSecret = await secretFactory.create(request.payload);
|
|
60
64
|
|
|
61
65
|
const location = urlLib.format({
|
|
@@ -3,6 +3,7 @@
|
|
|
3
3
|
const boom = require('@hapi/boom');
|
|
4
4
|
const joi = require('joi');
|
|
5
5
|
const schema = require('screwdriver-data-schema');
|
|
6
|
+
const logger = require('screwdriver-logger');
|
|
6
7
|
const idSchema = schema.models.secret.base.extract('id');
|
|
7
8
|
|
|
8
9
|
module.exports = () => ({
|
|
@@ -32,7 +33,12 @@ module.exports = () => ({
|
|
|
32
33
|
|
|
33
34
|
// Make sure that user has permission before deleting
|
|
34
35
|
return canAccess(credentials, secret, 'admin', request.server.app)
|
|
35
|
-
.then(() =>
|
|
36
|
+
.then(async () => {
|
|
37
|
+
logger.info(
|
|
38
|
+
`[Audit] user ${credentials.username}:${credentials.scmContext} deletes the secret key:${secret.name} from pipelineId:${secret.pipelineId}.`
|
|
39
|
+
);
|
|
40
|
+
await secret.remove();
|
|
41
|
+
})
|
|
36
42
|
.then(() => h.response().code(204));
|
|
37
43
|
})
|
|
38
44
|
.catch(err => {
|
|
@@ -3,6 +3,7 @@
|
|
|
3
3
|
const boom = require('@hapi/boom');
|
|
4
4
|
const joi = require('joi');
|
|
5
5
|
const schema = require('screwdriver-data-schema');
|
|
6
|
+
const logger = require('screwdriver-logger');
|
|
6
7
|
const idSchema = schema.models.secret.base.extract('id');
|
|
7
8
|
|
|
8
9
|
module.exports = () => ({
|
|
@@ -36,6 +37,10 @@ module.exports = () => ({
|
|
|
36
37
|
secret[key] = request.payload[key];
|
|
37
38
|
});
|
|
38
39
|
|
|
40
|
+
logger.info(
|
|
41
|
+
`[Audit] user ${credentials.username}:${credentials.scmContext} updates the secret key:${secret.name} for pipelineId:${secret.pipelineId}.`
|
|
42
|
+
);
|
|
43
|
+
|
|
39
44
|
return secret.update();
|
|
40
45
|
})
|
|
41
46
|
.then(() => {
|