 0ea4da4ef6
			
		
	
	
		0ea4da4ef6
		
			
		
	
	
	
	
		
			
			Not sure whether this is the way you want to handle this problem but it's really darn irritating so here's a PR that handles it one way. Fixes: https://github.com/Homebrew/brew/pull/3086#issuecomment-324519156
		
			
				
	
	
		
			287 lines
		
	
	
		
			8.6 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
			
		
		
	
	
			287 lines
		
	
	
		
			8.6 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
| require "uri"
 | |
| require "tempfile"
 | |
| 
 | |
| module GitHub
 | |
|   module_function
 | |
| 
 | |
|   API_URL = "https://api.github.com".freeze
 | |
| 
 | |
|   CREATE_GIST_SCOPES = ["gist"].freeze
 | |
|   CREATE_ISSUE_SCOPES = ["public_repo"].freeze
 | |
|   ALL_SCOPES = (CREATE_GIST_SCOPES + CREATE_ISSUE_SCOPES).freeze
 | |
|   ALL_SCOPES_URL = Formatter.url("https://github.com/settings/tokens/new?scopes=#{ALL_SCOPES.join(",")}&description=Homebrew").freeze
 | |
| 
 | |
|   Error = Class.new(RuntimeError)
 | |
|   HTTPNotFoundError = Class.new(Error)
 | |
| 
 | |
|   class RateLimitExceededError < Error
 | |
|     def initialize(reset, error)
 | |
|       super <<-EOS.undent
 | |
|         GitHub API Error: #{error}
 | |
|         Try again in #{pretty_ratelimit_reset(reset)}, or create a personal access token:
 | |
|           #{ALL_SCOPES_URL}
 | |
|         and then set the token as: export HOMEBREW_GITHUB_API_TOKEN="your_new_token"
 | |
|       EOS
 | |
|     end
 | |
| 
 | |
|     def pretty_ratelimit_reset(reset)
 | |
|       pretty_duration(Time.at(reset) - Time.now)
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   class AuthenticationFailedError < Error
 | |
|     def initialize(error)
 | |
|       message = "GitHub #{error}\n"
 | |
|       if ENV["HOMEBREW_GITHUB_API_TOKEN"]
 | |
|         message << <<-EOS.undent
 | |
|           HOMEBREW_GITHUB_API_TOKEN may be invalid or expired; check:
 | |
|           #{Formatter.url("https://github.com/settings/tokens")}
 | |
|         EOS
 | |
|       else
 | |
|         message << <<-EOS.undent
 | |
|           The GitHub credentials in the macOS keychain may be invalid.
 | |
|           Clear them with:
 | |
|             printf "protocol=https\\nhost=github.com\\n" | git credential-osxkeychain erase
 | |
|           Or create a personal access token:
 | |
|             #{ALL_SCOPES_URL}
 | |
|           and then set the token as: export HOMEBREW_GITHUB_API_TOKEN="your_new_token"
 | |
|         EOS
 | |
|       end
 | |
|       super message
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   def api_credentials
 | |
|     @api_credentials ||= begin
 | |
|       if ENV["HOMEBREW_GITHUB_API_TOKEN"]
 | |
|         ENV["HOMEBREW_GITHUB_API_TOKEN"]
 | |
|       elsif ENV["HOMEBREW_GITHUB_API_USERNAME"] && ENV["HOMEBREW_GITHUB_API_PASSWORD"]
 | |
|         [ENV["HOMEBREW_GITHUB_API_PASSWORD"], ENV["HOMEBREW_GITHUB_API_USERNAME"]]
 | |
|       else
 | |
|         github_credentials = api_credentials_from_keychain
 | |
|         github_username = github_credentials[/username=(.+)/, 1]
 | |
|         github_password = github_credentials[/password=(.+)/, 1]
 | |
|         if github_username && github_password
 | |
|           [github_password, github_username]
 | |
|         else
 | |
|           []
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   def api_credentials_from_keychain
 | |
|     Utils.popen(["git", "credential-osxkeychain", "get"], "w+") do |pipe|
 | |
|       pipe.write "protocol=https\nhost=github.com\n"
 | |
|       pipe.close_write
 | |
|       pipe.read
 | |
|     end
 | |
|   rescue Errno::EPIPE
 | |
|     # The above invocation via `Utils.popen` can fail, causing the pipe to be
 | |
|     # prematurely closed (before we can write to it) and thus resulting in a
 | |
|     # broken pipe error. The root cause is usually a missing or malfunctioning
 | |
|     # `git-credential-osxkeychain` helper.
 | |
|     ""
 | |
|   end
 | |
| 
 | |
|   def api_credentials_type
 | |
|     token, username = api_credentials
 | |
|     if token && !token.empty?
 | |
|       if username && !username.empty?
 | |
|         :keychain
 | |
|       else
 | |
|         :environment
 | |
|       end
 | |
|     else
 | |
|       :none
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   def api_credentials_error_message(response_headers, needed_scopes)
 | |
|     return if response_headers.empty?
 | |
| 
 | |
|     @api_credentials_error_message_printed ||= begin
 | |
|       unauthorized = (response_headers["http/1.1"] == "401 Unauthorized")
 | |
|       scopes = response_headers["x-accepted-oauth-scopes"].to_s.split(", ")
 | |
|       needed_human_scopes = needed_scopes.join(", ")
 | |
|       needed_human_scopes = "none" if needed_human_scopes.empty?
 | |
|       if !unauthorized && scopes.empty?
 | |
|         credentials_scopes = response_headers["x-oauth-scopes"]
 | |
| 
 | |
|         case GitHub.api_credentials_type
 | |
|         when :keychain
 | |
|           onoe <<-EOS.undent
 | |
|             Your macOS keychain GitHub credentials do not have sufficient scope!
 | |
|             Scopes they need: #{needed_human_scopes}
 | |
|             Scopes they have: #{credentials_scopes}
 | |
|             Create a personal access token: #{ALL_SCOPES_URL}
 | |
|             and then set HOMEBREW_GITHUB_API_TOKEN as the authentication method instead.
 | |
|           EOS
 | |
|         when :environment
 | |
|           onoe <<-EOS.undent
 | |
|             Your HOMEBREW_GITHUB_API_TOKEN does not have sufficient scope!
 | |
|             Scopes they need: #{needed_human_scopes}
 | |
|             Scopes it has: #{credentials_scopes}
 | |
|             Create a new personal access token: #{ALL_SCOPES_URL}
 | |
|             and then set the new HOMEBREW_GITHUB_API_TOKEN as the authentication method instead.
 | |
|           EOS
 | |
|         end
 | |
|       end
 | |
|       true
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   def open(url, data: nil, scopes: [].freeze)
 | |
|     # This is a no-op if the user is opting out of using the GitHub API.
 | |
|     return block_given? ? yield({}) : {} if ENV["HOMEBREW_NO_GITHUB_API"]
 | |
| 
 | |
|     args = %W[--header application/vnd.github.v3+json --write-out \n%{http_code}]
 | |
|     args += curl_args
 | |
| 
 | |
|     token, username = api_credentials
 | |
|     case api_credentials_type
 | |
|     when :keychain
 | |
|       args += %W[--user #{username}:#{token}]
 | |
|     when :environment
 | |
|       args += ["--header", "Authorization: token #{token}"]
 | |
|     end
 | |
| 
 | |
|     data_tmpfile = nil
 | |
|     if data
 | |
|       begin
 | |
|         data = JSON.generate data
 | |
|         data_tmpfile = Tempfile.new("github_api_post", HOMEBREW_TEMP)
 | |
|       rescue JSON::ParserError => e
 | |
|         raise Error, "Failed to parse JSON request:\n#{e.message}\n#{data}", e.backtrace
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     headers_tmpfile = Tempfile.new("github_api_headers", HOMEBREW_TEMP)
 | |
|     begin
 | |
|       if data
 | |
|         data_tmpfile.write data
 | |
|         data_tmpfile.close
 | |
|         args += ["--data", "@#{data_tmpfile.path}"]
 | |
|       end
 | |
| 
 | |
|       args += ["--dump-header", headers_tmpfile.path]
 | |
| 
 | |
|       output, errors, status = curl_output(url.to_s, "--location", *args)
 | |
|       output, _, http_code = output.rpartition("\n")
 | |
|       output, _, http_code = output.rpartition("\n") if http_code == "000"
 | |
|       headers = headers_tmpfile.read
 | |
|     ensure
 | |
|       if data_tmpfile
 | |
|         data_tmpfile.close
 | |
|         data_tmpfile.unlink
 | |
|       end
 | |
|       headers_tmpfile.close
 | |
|       headers_tmpfile.unlink
 | |
|     end
 | |
| 
 | |
|     begin
 | |
|       if !http_code.start_with?("2") && !status.success?
 | |
|         raise_api_error(output, errors, http_code, headers, scopes)
 | |
|       end
 | |
|       json = JSON.parse output
 | |
|       if block_given?
 | |
|         yield json
 | |
|       else
 | |
|         json
 | |
|       end
 | |
|     rescue JSON::ParserError => e
 | |
|       raise Error, "Failed to parse JSON response\n#{e.message}", e.backtrace
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   def raise_api_error(output, errors, http_code, headers, scopes)
 | |
|     meta = {}
 | |
|     headers.lines.each do |l|
 | |
|       key, _, value = l.delete(":").partition(" ")
 | |
|       key = key.downcase.strip
 | |
|       next if key.empty?
 | |
|       meta[key] = value.strip
 | |
|     end
 | |
| 
 | |
|     if meta.fetch("x-ratelimit-remaining", 1).to_i <= 0
 | |
|       reset = meta.fetch("x-ratelimit-reset").to_i
 | |
|       error = JSON.parse(output)["message"]
 | |
|       raise RateLimitExceededError.new(reset, error)
 | |
|     end
 | |
| 
 | |
|     GitHub.api_credentials_error_message(meta, scopes)
 | |
| 
 | |
|     case http_code
 | |
|     when "401", "403"
 | |
|       raise AuthenticationFailedError, output
 | |
|     when "404"
 | |
|       raise HTTPNotFoundError, output
 | |
|     else
 | |
|       error = begin
 | |
|         JSON.parse(output)["message"]
 | |
|       rescue
 | |
|         nil
 | |
|       end
 | |
|       error ||= "curl failed! #{errors}"
 | |
|       raise Error, error
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   def search_issues(query, **qualifiers)
 | |
|     search("issues", query, **qualifiers)
 | |
|   end
 | |
| 
 | |
|   def repository(user, repo)
 | |
|     open(url_to("repos", user, repo))
 | |
|   end
 | |
| 
 | |
|   def search_code(**qualifiers)
 | |
|     search("code", **qualifiers)
 | |
|   end
 | |
| 
 | |
|   def issues_for_formula(name, options = {})
 | |
|     tap = options[:tap] || CoreTap.instance
 | |
|     search_issues(name, state: "open", repo: "#{tap.user}/homebrew-#{tap.repo}")
 | |
|   end
 | |
| 
 | |
|   def print_pull_requests_matching(query)
 | |
|     open_or_closed_prs = search_issues(query, type: "pr", user: "Homebrew")
 | |
| 
 | |
|     open_prs = open_or_closed_prs.select { |i| i["state"] == "open" }
 | |
|     prs = if !open_prs.empty?
 | |
|       puts "Open pull requests:"
 | |
|       open_prs
 | |
|     else
 | |
|       puts "Closed pull requests:" unless open_or_closed_prs.empty?
 | |
|       open_or_closed_prs
 | |
|     end
 | |
| 
 | |
|     prs.each { |i| puts "#{i["title"]} (#{i["html_url"]})" }
 | |
|   end
 | |
| 
 | |
|   def private_repo?(full_name)
 | |
|     uri = url_to "repos", full_name
 | |
|     open(uri) { |json| json["private"] }
 | |
|   end
 | |
| 
 | |
|   def query_string(*main_params, **qualifiers)
 | |
|     params = main_params
 | |
| 
 | |
|     params += qualifiers.flat_map do |key, value|
 | |
|       Array(value).map { |v| "#{key}:#{v}" }
 | |
|     end
 | |
| 
 | |
|     "q=#{URI.encode_www_form_component(params.join(" "))}&per_page=100"
 | |
|   end
 | |
| 
 | |
|   def url_to(*subroutes)
 | |
|     URI.parse([API_URL, *subroutes].join("/"))
 | |
|   end
 | |
| 
 | |
|   def search(entity, *queries, **qualifiers)
 | |
|     uri = url_to "search", entity
 | |
|     uri.query = query_string(*queries, **qualifiers)
 | |
|     open(uri) { |json| json.fetch("items", []) }
 | |
|   end
 | |
| end
 |