Class: ResourceAccessTokens::CreateService
- Inherits:
-
BaseService
- Object
- BaseService
- ResourceAccessTokens::CreateService
- Includes:
- Gitlab::Utils::StrongMemoize
- Defined in:
- app/services/resource_access_tokens/create_service.rb
Constant Summary
Constants inherited from BaseService
BaseService::UnauthorizedError
Instance Attribute Summary
Attributes inherited from BaseService
#current_user, #params, #project
Instance Method Summary collapse
- #execute ⇒ Object
-
#initialize(current_user, resource, params = {}) ⇒ CreateService
constructor
A new instance of CreateService.
Methods included from BaseServiceUtility
#deny_visibility_level, #event_service, #log_error, #log_info, #notification_service, #system_hook_service, #todo_service, #visibility_level
Methods included from Gitlab::Allowable
Constructor Details
#initialize(current_user, resource, params = {}) ⇒ CreateService
Returns a new instance of CreateService.
7 8 9 10 11 12 |
# File 'app/services/resource_access_tokens/create_service.rb', line 7 def initialize(current_user, resource, params = {}) @resource_type = resource.class.name.downcase @resource = resource @current_user = current_user @params = params.dup end |
Instance Method Details
#execute ⇒ Object
14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 |
# File 'app/services/resource_access_tokens/create_service.rb', line 14 def execute return error("User does not have permission to create #{resource_type} access token") unless access_level = params[:access_level] || Gitlab::Access::MAINTAINER return error("Access level of the token contains permissions not held by the creating user") unless valid_access_level?(access_level) return error(s_('AccessTokens|Access token limit reached')) if reached_access_token_limit? return error(s_("expires_at is missing")) unless validate_expires_at_field(params) response = create_user return error(response.) if response.error? user = response.payload[:user] user.update!(external: true) if current_user.external? member = create_membership(resource, user, access_level) unless member.persisted? delete_failed_user(user) return error( "Could not provision #{Gitlab::Access.human_access(access_level.to_i).downcase} access to the access token. ERROR: #{member.errors..to_sentence}" ) end token_response = create_personal_access_token(user) if token_response.success? log_event(token_response.payload[:personal_access_token]) success(token_response.payload[:personal_access_token]) else delete_failed_user(user) error(token_response.) end end |