Documentation ¶
Overview ¶
Package server handles the web server and executing commands that come in via webhooks.
Index ¶
- Constants
- type Config
- type DefaultGithubRequestValidator
- type DefaultGitlabRequestParserValidator
- type EventsController
- func (e *EventsController) HandleBitbucketCloudCommentEvent(w http.ResponseWriter, body []byte, reqID string)
- func (e *EventsController) HandleBitbucketServerCommentEvent(w http.ResponseWriter, body []byte, reqID string)
- func (e *EventsController) HandleGithubCommentEvent(w http.ResponseWriter, event *github.IssueCommentEvent, githubReqID string)
- func (e *EventsController) HandleGithubPullRequestEvent(w http.ResponseWriter, pullEvent *github.PullRequestEvent, githubReqID string)
- func (e *EventsController) HandleGitlabCommentEvent(w http.ResponseWriter, event gitlab.MergeCommentEvent)
- func (e *EventsController) HandleGitlabMergeRequestEvent(w http.ResponseWriter, event gitlab.MergeEvent)
- func (e *EventsController) Post(w http.ResponseWriter, r *http.Request)
- type GithubRequestValidator
- type GitlabRequestParserValidator
- type IndexData
- type LockDetailData
- type LockIndexData
- type LocksController
- type RequestLogger
- type Router
- type Server
- type TemplateWriter
- type UserConfig
- type WebhookConfig
Constants ¶
const ( // LockViewRouteName is the named route in mux.Router for the lock view. // The route can be retrieved by this name, ex: // mux.Router.Get(LockViewRouteName) LockViewRouteName = "lock-detail" // LockViewRouteIDQueryParam is the query parameter needed to construct the lock view // route. ex: // mux.Router.Get(LockViewRouteName).URL(LockViewRouteIDQueryParam, "my id") LockViewRouteIDQueryParam = "id" )
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type DefaultGithubRequestValidator ¶ added in v0.2.0
type DefaultGithubRequestValidator struct{}
DefaultGithubRequestValidator handles checking if GitHub requests are signed properly by the secret.
type DefaultGitlabRequestParserValidator ¶ added in v0.4.0
type DefaultGitlabRequestParserValidator struct{}
DefaultGitlabRequestParserValidator parses and validates GitLab requests.
func (*DefaultGitlabRequestParserValidator) ParseAndValidate ¶ added in v0.4.0
func (d *DefaultGitlabRequestParserValidator) ParseAndValidate(r *http.Request, secret []byte) (interface{}, error)
ParseAndValidate returns the JSON payload of the request. See GitlabRequestParserValidator.ParseAndValidate().
type EventsController ¶ added in v0.1.3
type EventsController struct { CommandRunner events.CommandRunner PullCleaner events.PullCleaner Logger *logging.SimpleLogger Parser events.EventParsing CommentParser events.CommentParsing // GithubWebhookSecret is the secret added to this webhook via the GitHub // UI that identifies this call as coming from GitHub. If empty, no // request validation is done. GithubWebhookSecret []byte GithubRequestValidator GithubRequestValidator GitlabRequestParserValidator GitlabRequestParserValidator // GitlabWebhookSecret is the secret added to this webhook via the GitLab // UI that identifies this call as coming from GitLab. If empty, no // request validation is done. GitlabWebhookSecret []byte RepoWhitelistChecker *events.RepoWhitelistChecker // SupportedVCSHosts is which VCS hosts Atlantis was configured upon // startup to support. SupportedVCSHosts []models.VCSHostType VCSClient vcs.ClientProxy TestingMode bool // BitbucketWebhookSecret is the secret added to this webhook via the Bitbucket // UI that identifies this call as coming from Bitbucket. If empty, no // request validation is done. BitbucketWebhookSecret []byte }
EventsController handles all webhook requests which signify 'events' in the VCS host, ex. GitHub.
func (*EventsController) HandleBitbucketCloudCommentEvent ¶ added in v0.4.4
func (e *EventsController) HandleBitbucketCloudCommentEvent(w http.ResponseWriter, body []byte, reqID string)
HandleBitbucketCloudCommentEvent handles comment events from Bitbucket.
func (*EventsController) HandleBitbucketServerCommentEvent ¶ added in v0.4.4
func (e *EventsController) HandleBitbucketServerCommentEvent(w http.ResponseWriter, body []byte, reqID string)
HandleBitbucketServerCommentEvent handles comment events from Bitbucket.
func (*EventsController) HandleGithubCommentEvent ¶ added in v0.2.0
func (e *EventsController) HandleGithubCommentEvent(w http.ResponseWriter, event *github.IssueCommentEvent, githubReqID string)
HandleGithubCommentEvent handles comment events from GitHub where Atlantis commands can come from. It's exported to make testing easier.
func (*EventsController) HandleGithubPullRequestEvent ¶ added in v0.2.0
func (e *EventsController) HandleGithubPullRequestEvent(w http.ResponseWriter, pullEvent *github.PullRequestEvent, githubReqID string)
HandleGithubPullRequestEvent will delete any locks associated with the pull request if the event is a pull request closed event. It's exported to make testing easier.
func (*EventsController) HandleGitlabCommentEvent ¶ added in v0.2.0
func (e *EventsController) HandleGitlabCommentEvent(w http.ResponseWriter, event gitlab.MergeCommentEvent)
HandleGitlabCommentEvent handles comment events from GitLab where Atlantis commands can come from. It's exported to make testing easier.
func (*EventsController) HandleGitlabMergeRequestEvent ¶ added in v0.2.0
func (e *EventsController) HandleGitlabMergeRequestEvent(w http.ResponseWriter, event gitlab.MergeEvent)
HandleGitlabMergeRequestEvent will delete any locks associated with the pull request if the event is a merge request closed event. It's exported to make testing easier.
func (*EventsController) Post ¶ added in v0.1.3
func (e *EventsController) Post(w http.ResponseWriter, r *http.Request)
Post handles POST webhook requests.
type GithubRequestValidator ¶ added in v0.2.0
type GithubRequestValidator interface { // Validate returns the JSON payload of the request. // If secret is not empty, it checks that the request was signed // by secret and returns an error if it was not. // If secret is empty, it does not check if the request was signed. Validate(r *http.Request, secret []byte) ([]byte, error) }
GithubRequestValidator handles checking if GitHub requests are signed properly by the secret.
type GitlabRequestParserValidator ¶ added in v0.4.0
type GitlabRequestParserValidator interface { // ParseAndValidate validates that the request has a token header matching secret. // If the secret does not match it returns an error. // If secret is empty it does not check the token header. // It then parses the request as a GitLab object depending on the header // provided by GitLab identifying the webhook type. If the webhook type // is not recognized it will return nil but will not return an error. // Usage: // event, err := GitlabRequestParserValidator.ParseAndValidate(r, secret) // if err != nil { // return // } // switch event := event.(type) { // case gitlab.MergeCommentEvent: // // handle // case gitlab.MergeEvent: // // handle // default: // // unsupported event // } ParseAndValidate(r *http.Request, secret []byte) (interface{}, error) }
GitlabRequestParserValidator parses and validates GitLab requests.
type IndexData ¶ added in v0.3.3
type IndexData struct { Locks []LockIndexData AtlantisVersion string }
IndexData holds the data for rendering the index page
type LockDetailData ¶ added in v0.1.3
type LockDetailData struct { UnlockURL string LockKeyEncoded string LockKey string RepoOwner string RepoName string PullRequestLink string LockedBy string Workspace string Time time.Time AtlantisVersion string }
LockDetailData holds the fields needed to display the lock detail view.
type LockIndexData ¶ added in v0.1.3
LockIndexData holds the fields needed to display the index view for locks.
type LocksController ¶ added in v0.3.10
type LocksController struct { AtlantisVersion string Locker locking.Locker Logger *logging.SimpleLogger VCSClient vcs.ClientProxy LockDetailTemplate TemplateWriter WorkingDir events.WorkingDir WorkingDirLocker events.WorkingDirLocker }
LocksController handles all requests relating to Atlantis locks.
func (*LocksController) DeleteLock ¶ added in v0.3.10
func (l *LocksController) DeleteLock(w http.ResponseWriter, r *http.Request)
DeleteLock handles deleting the lock at id and commenting back on the pull request that the lock has been deleted.
func (*LocksController) GetLock ¶ added in v0.3.10
func (l *LocksController) GetLock(w http.ResponseWriter, r *http.Request)
GetLock is the GET /locks/{id} route. It renders the lock detail view.
type RequestLogger ¶
type RequestLogger struct {
// contains filtered or unexported fields
}
RequestLogger logs requests and their response codes.
func NewRequestLogger ¶
func NewRequestLogger(logger *logging.SimpleLogger) *RequestLogger
NewRequestLogger creates a RequestLogger.
func (*RequestLogger) ServeHTTP ¶
func (l *RequestLogger) ServeHTTP(rw http.ResponseWriter, r *http.Request, next http.HandlerFunc)
ServeHTTP implements the middleware function. It logs a request at INFO level unless it's a request to /static/*.
type Router ¶ added in v0.4.0
type Router struct { // Underlying is the router that the routes have been constructed on. Underlying *mux.Router // LockViewRouteName is the named route for the lock view that can be Get'd // from the Underlying router. LockViewRouteName string // LockViewRouteIDQueryParam is the query parameter needed to construct the // lock view: underlying.Get(LockViewRouteName).URL(LockViewRouteIDQueryParam, "my id"). LockViewRouteIDQueryParam string // AtlantisURL is the fully qualified URL (scheme included) that Atlantis is // being served at, ex: https://example.com. AtlantisURL string }
Router can be used to retrieve Atlantis URLs. It acts as an intermediary between the underlying router and the rest of Atlantis that might need to construct URLs to different resources.
func (*Router) GenerateLockURL ¶ added in v0.4.0
GenerateLockURL returns a fully qualified URL to view the lock at lockID.
type Server ¶
type Server struct { AtlantisVersion string Router *mux.Router Port int CommandRunner *events.DefaultCommandRunner Logger *logging.SimpleLogger Locker locking.Locker EventsController *EventsController LocksController *LocksController IndexTemplate TemplateWriter LockDetailTemplate TemplateWriter SSLCertFile string SSLKeyFile string }
Server runs the Atlantis web server.
func NewServer ¶
func NewServer(userConfig UserConfig, config Config) (*Server, error)
NewServer returns a new server. If there are issues starting the server or its dependencies an error will be returned. This is like the main() function for the server CLI command because it injects all the dependencies.
func (*Server) Healthz ¶ added in v0.4.1
func (s *Server) Healthz(w http.ResponseWriter, _ *http.Request)
Healthz returns the health check response. It always returns a 200 currently.
type TemplateWriter ¶ added in v0.1.3
type TemplateWriter interface { // Execute applies a parsed template to the specified data object, // writing the output to wr. Execute(wr io.Writer, data interface{}) error }
TemplateWriter is an interface over html/template that's used to enable mocking.
type UserConfig ¶ added in v0.3.3
type UserConfig struct { AllowForkPRs bool `mapstructure:"allow-fork-prs"` AllowRepoConfig bool `mapstructure:"allow-repo-config"` AtlantisURL string `mapstructure:"atlantis-url"` BitbucketBaseURL string `mapstructure:"bitbucket-base-url"` BitbucketToken string `mapstructure:"bitbucket-token"` BitbucketUser string `mapstructure:"bitbucket-user"` BitbucketWebhookSecret string `mapstructure:"bitbucket-webhook-secret"` DataDir string `mapstructure:"data-dir"` GithubHostname string `mapstructure:"gh-hostname"` GithubToken string `mapstructure:"gh-token"` GithubUser string `mapstructure:"gh-user"` GithubWebhookSecret string `mapstructure:"gh-webhook-secret"` GitlabHostname string `mapstructure:"gitlab-hostname"` GitlabToken string `mapstructure:"gitlab-token"` GitlabUser string `mapstructure:"gitlab-user"` GitlabWebhookSecret string `mapstructure:"gitlab-webhook-secret"` LogLevel string `mapstructure:"log-level"` Port int `mapstructure:"port"` RepoWhitelist string `mapstructure:"repo-whitelist"` // RequireApproval is whether to require pull request approval before // allowing terraform apply's to be run. RequireApproval bool `mapstructure:"require-approval"` SlackToken string `mapstructure:"slack-token"` SSLCertFile string `mapstructure:"ssl-cert-file"` SSLKeyFile string `mapstructure:"ssl-key-file"` Webhooks []WebhookConfig `mapstructure:"webhooks"` }
UserConfig holds config values passed in by the user. The mapstructure tags correspond to flags in cmd/server.go and are used when the config is parsed from a YAML file.
type WebhookConfig ¶ added in v0.2.0
type WebhookConfig struct { // Event is the type of event we should send this webhook for, ex. apply. Event string `mapstructure:"event"` // WorkspaceRegex is a regex that is used to match against the workspace // that is being modified for this event. If the regex matches, we'll // send the webhook, ex. "production.*". WorkspaceRegex string `mapstructure:"workspace-regex"` // Kind is the type of webhook we should send, ex. slack. Kind string `mapstructure:"kind"` // Channel is the channel to send this webhook to. It only applies to // slack webhooks. Should be without '#'. Channel string `mapstructure:"channel"` }
WebhookConfig is nested within UserConfig. It's used to configure webhooks.
Source Files ¶
Directories ¶
Path | Synopsis |
---|---|
runtime
Package runtime holds code for actually running commands vs.
|
Package runtime holds code for actually running commands vs. |
vcs/bitbucketcloud
Package bitbucketcloud holds code for Bitbucket Cloud aka (bitbucket.org).
|
Package bitbucketcloud holds code for Bitbucket Cloud aka (bitbucket.org). |
yaml/raw
Package raw contains the golang representations of the YAML elements supported in atlantis.yaml.
|
Package raw contains the golang representations of the YAML elements supported in atlantis.yaml. |
yaml/valid
Package valid contains the structs representing the atlantis.yaml config after it's been parsed and validated.
|
Package valid contains the structs representing the atlantis.yaml config after it's been parsed and validated. |