-
Notifications
You must be signed in to change notification settings - Fork 72
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rework the Bitbucket Server getUser request #790
Conversation
e0c2a7e
to
5abbdb1
Compare
I believe we need a switcher to return to the previous behaviour in case of emergency |
...src/main/java/org/eclipse/che/api/factory/server/bitbucket/HttpBitbucketServerApiClient.java
Show resolved
Hide resolved
try { | ||
// Try to get the username from the response header. | ||
if (response.headers().firstValue(USERNAME_HEADER).isPresent()) { | ||
return response.headers().firstValue(USERNAME_HEADER).get(); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
are we sure that the header is going to be there ?
Retrieve version information and other application properties. No authentication is required to call this resource.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I could not find any direct documentation about it, but the only more or less official source I could find, is a discussion in the Atlassian community forum: https://community.developer.atlassian.com/t/obtain-authorised-users-username-from-api/24422.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So yes, there is no official documentation about the X-AUSERNAME
header except the forum discussion, but on the other hand there is no other way to get the username of the authenticated user.
Could you please elaborate more on what kind of switcher do you mean? Do you mean to keep the previous request for the older versions? |
/retest |
@vinokurig: The following test failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
I would like to keep the old behaviour and have a env variable to switch to the old behaviour. |
I don't think that it is a good idea because in that case customers with the new Bitbucket Server version will still have problems. Sooner or later we would need to switch to the new behaviour anyway. @ibuziuk WDYT? |
@vinokurig if we switch to the new behaviour we must be sure that the new flow works with both old and new versions of the BitBucket server |
} | ||
// We use the application-properties request to obtain the authenticated username from the | ||
// response headers. The request does not fail if no authentication is passed, see: | ||
// https://developer.atlassian.com/server/bitbucket/rest/v906/api-group-system-maintenance/#api-api-latest-application-properties-get |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This method requires username. We do use this method when we have the username retrieved by the application-properties
request.
I have tested the functionality with Bitbucket Server |
Verified on Eclipse Che with
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: artaleks9, ibuziuk, vinokurig The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Build 3.21 :: server_3.x/399: Console, Changes, Git Data |
Since Bitbucket Server version 8.19.14, the /plugins/servlet/applinks/whoami request does not return username, if PAT is used. Change the getUser() request to /rest/api/1.0/application-properties instead and extract the username from the response headers.
Build 3.21 :: sync-to-downstream_3.x/9076: Console, Changes, Git Data |
Build 3.21 :: push-latest-container-to-quay_3.x/5133: Console, Changes, Git Data |
Build 3.21 :: get-sources-rhpkg-container-build_3.x/9198: server : 3.x :: Build 67197091 : quay.io/devspaces/server-rhel9:3.21-5 |
Build 3.21 :: update-digests_3.x/8920: Console, Changes, Git Data |
Build 3.21 :: server_3.x/399: Upstream sync done; /DS_CI/sync-to-downstream_3.x/9076 triggered |
Build 3.21 :: operator-bundle_3.x/4694: Console, Changes, Git Data |
Build 3.21 :: sync-to-downstream_3.x/9077: Console, Changes, Git Data |
Since Bitbucket Server version 8.19.14, the /plugins/servlet/applinks/whoami request does not return username, if PAT is used. Change the getUser() request to /rest/api/1.0/application-properties instead and extract the username from the response headers.
Build 3.21 :: get-sources-rhpkg-container-build_3.x/9199: devspaces-operator-bundle : 3.x :: Failed in 67197485 : BREW:BUILD/STATUS:UNKNOWN |
Since Bitbucket Server version 8.19.14, the /plugins/servlet/applinks/whoami request does not return username, if PAT is used. Change the getUser() request to /rest/api/1.0/application-properties instead and extract the username from the response headers.
What does this PR do?
Since Bitbucket Server version 8.19.14, the
/plugins/servlet/applinks/whoami
request does not return username, if PAT is used. Change thegetUser()
request to /rest/api/1.0/application-properties instead and extract the username from the response headers.Example of an authorized response:
Example of unauthorized response:
Screenshot/screencast of this PR
What issues does this PR fix or reference?
https://issues.redhat.com/browse/CRW-8246
How to test this PR?
quay.io/eclipse/che-server:pr-790
Bitbucket Server
as provider, fill in the provider endpoint and the token values.See: token is added successfully.
PR Checklist
As the author of this Pull Request I made sure that:
What issues does this PR fix or reference
andHow to test this PR
completedRelease Notes
Reviewers
Reviewers, please comment how you tested the PR when approving it.