1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
|
package personalaccesstoken
import (
"context"
"errors"
"fmt"
"strconv"
"strings"
"time"
"gitlab.com/gitlab-org/gitlab-shell/internal/command/commandargs"
"gitlab.com/gitlab-org/gitlab-shell/internal/command/readwriter"
"gitlab.com/gitlab-org/gitlab-shell/internal/config"
"gitlab.com/gitlab-org/gitlab-shell/internal/gitlabnet/personalaccesstoken"
)
const (
usageText = "Usage: personal_access_token <name> <scope1[,scope2,...]> [ttl_days]"
expiresDateFormat = "2006-01-02"
)
type Command struct {
Config *config.Config
Args *commandargs.Shell
ReadWriter *readwriter.ReadWriter
TokenArgs *tokenArgs
}
type tokenArgs struct {
Name string
Scopes []string
ExpiresDate string // Calculated, a TTL is passed from command-line.
}
func (c *Command) Execute(ctx context.Context) error {
err := c.parseTokenArgs()
if err != nil {
return err
}
response, err := c.getPersonalAccessToken(ctx)
if err != nil {
return err
}
fmt.Fprint(c.ReadWriter.Out, "Token: "+response.Token+"\n")
fmt.Fprint(c.ReadWriter.Out, "Scopes: "+strings.Join(response.Scopes, ",")+"\n")
if response.ExpiresAt == "" {
fmt.Fprint(c.ReadWriter.Out, "Expires: never\n")
} else {
fmt.Fprint(c.ReadWriter.Out, "Expires: "+response.ExpiresAt+"\n")
}
return nil
}
func (c *Command) parseTokenArgs() error {
if len(c.Args.SshArgs) < 3 || len(c.Args.SshArgs) > 4 {
return errors.New(usageText)
}
c.TokenArgs = &tokenArgs{
Name: c.Args.SshArgs[1],
Scopes: strings.Split(c.Args.SshArgs[2], ","),
}
if len(c.Args.SshArgs) < 4 {
return nil
}
rawTTL := c.Args.SshArgs[3]
TTL, err := strconv.Atoi(rawTTL)
if err != nil || TTL < 0 {
return fmt.Errorf("Invalid value for days_ttl: '%s'", rawTTL)
}
c.TokenArgs.ExpiresDate = time.Now().AddDate(0, 0, TTL+1).Format(expiresDateFormat)
return nil
}
func (c *Command) getPersonalAccessToken(ctx context.Context) (*personalaccesstoken.Response, error) {
client, err := personalaccesstoken.NewClient(c.Config)
if err != nil {
return nil, err
}
return client.GetPersonalAccessToken(ctx, c.Args, c.TokenArgs.Name, &c.TokenArgs.Scopes, c.TokenArgs.ExpiresDate)
}
|