Mathias Meyer
477f39a000
Hide the /uptime endpoint in the docs.
2013-11-07 15:53:59 +01:00
Mathias Meyer
65a806261c
It's Travis CI.
2013-11-07 15:10:40 +01:00
Josh Kalderimis
f7450cdb6b
removed the branches endpoint
...
we already have branch info accessible via the repos endpoints, having this at the root level doesn't make sense.
2013-11-06 01:40:42 +01:00
Josh Kalderimis
4deddc5843
add deprecation notice
2013-11-06 01:22:54 +01:00
Josh Kalderimis
92dc3f55ec
add 'restart' to the build and job endpoints
2013-11-06 01:18:54 +01:00
Piotr Sarnacki
58f1284244
Merge pull request #85 from travis-ci/insufficient-oauth-redirect
...
Redirect to web client on insufficient oauth scopes
2013-11-05 05:31:25 -08:00
Josh Kalderimis
609a35ecc3
disabled for over a year, removed from api
2013-11-05 13:42:37 +01:00
Konstantin Haase
6f92f122b0
Merge pull request #90 from travis-ci/jk_remove_artifacts_endpoint
...
Remove deprecated artifacts endpoint
2013-11-05 04:23:04 -08:00
Konstantin Haase
419fe6fdf9
Merge pull request #88 from travis-ci/jk_remove_workers_endpoints
...
Remove old workers endpoints
2013-11-05 04:22:44 -08:00
Konstantin Haase
28c019c18d
Merge pull request #89 from travis-ci/jk_remove_events_endpoints
...
Remove the events endpoint
2013-11-05 00:27:52 -08:00
Henrik Hodne
5f3e53da28
Update API docs to use new styles
2013-11-04 21:06:38 -06:00
Josh Kalderimis
26edaf644f
remove deprecated artifacts endpoint
2013-11-05 01:05:21 +01:00
Josh Kalderimis
54060dbfc6
removed the events endpoint
...
it isn't used, and there are no tests, i think it's safe to remove
2013-11-05 00:18:14 +01:00
Josh Kalderimis
342df12b14
remove old workers endpoints
2013-11-04 19:24:17 +01:00
Konstantin Haase
44e1db3944
add API endpoints for listing and deleting caches
2013-11-04 10:23:22 +01:00
Piotr Sarnacki
87674f52bb
Redirect to web client on insufficient oauth scopes
2013-10-29 14:27:21 +01:00
Josh Kalderimis
542b1ffc80
Merge pull request #83 from travis-ci/hh-cancel-job-wrong-namespac
...
Move /jobs/:id/cancel to /jobs
2013-10-27 10:01:02 -07:00
Henrik Hodne
824f9cd21d
Move /jobs/:id/cancel to /jobs
2013-10-27 01:06:26 -05:00
Henrik Hodne
c64a006f1d
Handle race condition with creating users more nicely
2013-10-26 08:33:57 -05:00
Henrik Hodne
8f4dd0d2df
Respond with 422 if /auth/github does not get a token
...
Fix #77
2013-10-23 19:35:03 -05:00
Piotr Sarnacki
0cdfa8240c
Add source to cancel_build/job
2013-10-16 17:39:31 +02:00
Konstantin Haase
096d08c102
add /repos/:owner_name, fixes travis-ci/travis-ci#1496
2013-10-15 12:24:07 +02:00
Josh Kalderimis
8ccf48fa2a
remove the log PUT endpoint, no longer needed
2013-10-05 19:10:09 +02:00
Konstantin Haase
6f72b2cb6b
find_branch(es) expects parameter to be called repository_id
2013-10-03 17:25:40 +02:00
Konstantin Haase
93277035cd
add repo endpoints for fetching branches
2013-10-03 16:32:30 +02:00
Piotr Sarnacki
b484a19f27
Prefer follower also for /repos/id and repos list
2013-09-04 20:32:30 +02:00
Piotr Sarnacki
d133528893
Use follower for /builds and /jobs
2013-09-03 14:45:12 +02:00
Mathias Meyer
9d26844eaa
Add tests for /uptime.
2013-08-26 17:29:10 +02:00
Mathias Meyer
618241a458
Add an uptime endpoint for Pingdom.
...
Sends a simple database query to see if we can still connect
to the database. Should help us detect issues like yesterday's
EC2 issues earlier.
2013-08-26 15:30:07 +02:00
Mathias Meyer
d141256671
Revert my puny changes for now.
...
Will be fixed in travis-web.
2013-08-22 15:21:09 +02:00
Mathias Meyer
8bde2ddb10
blank
2013-08-22 15:05:45 +02:00
Mathias Meyer
7fb90f3975
end end
2013-08-22 15:02:39 +02:00
Mathias Meyer
c711002577
Only return empty builds hash when there are no ids present.
2013-08-22 14:59:19 +02:00
Mathias Meyer
3a90f08d3b
Disable the /builds endpoint for now.
2013-08-22 14:49:24 +02:00
Piotr Sarnacki
37ca20b61c
Measure cancel request on the beginning of the request
2013-08-21 11:57:00 +02:00
Piotr Sarnacki
526129b5be
Add more metriks (cancel build/job and restart build/job)
2013-08-21 11:38:29 +02:00
Piotr Sarnacki
f19de9d134
Implement jobs/:id/cancel and builds/:id/cancel endpoints
2013-08-08 14:25:20 +02:00
Konstantin Haase
1c149bcdb4
use client_domain in config
2013-08-03 14:36:42 +02:00
Piotr Sarnacki
207a6e3e04
Explicitly use self when using info in Authorization
2013-07-27 01:42:14 +02:00
Henrik Hodne
be2c538d9e
Rename metadata => annotations
2013-07-10 16:55:03 -07:00
Henrik Hodne
16a73d9e0b
Add PUT /jobs/:id/metadata endpoint
2013-07-09 18:41:47 -07:00
Henrik Hodne
b103a7ccb1
Add GET /jobs/:job_id/metadata endpoint
2013-07-09 18:15:32 -07:00
Piotr Sarnacki
3508f25bdf
Nullify logins and rename repos owner when updating/creating user
2013-07-10 01:38:10 +02:00
Piotr Sarnacki
b6a351c766
Convert params['ids'] to array
...
Services like find_builds can accept :ids as a param, but it needs to be
an array, string will be passed to find and converted into integer.
2013-07-09 15:18:31 +02:00
Henrik Hodne
277f0c2f72
Whitelist travis-lite for authentication
2013-06-04 21:57:09 +02:00
James Dennes
c5b73b1ecc
s/autorization/authorization/
2013-05-03 12:16:12 +02:00
Josh Kalderimis
23f3edc60c
move the db follower usage to a helper
2013-05-03 09:21:48 +02:00
Josh Kalderimis
fa6ea0692d
use a follower for one of the repos endpoint
2013-05-02 16:38:20 +02:00
Konstantin Haase
6b2a1a0da8
do not use client credentials for /auth/github
2013-04-24 16:47:52 +02:00
Henrik Hodne
6d0aad47ec
Update example payloads
2013-04-15 14:11:58 -05:00
Henrik Hodne
a18f211f6f
Merge pull request #25 from henrikhodne/add-responses-to-documentation
...
Add responses to documentation
2013-04-15 02:44:31 -07:00
Henrik Hodne
e38b40e00a
Update docs style to look more like the main docs site
2013-04-15 02:04:50 -05:00
Henrik Hodne
6f5f7d0073
Add responses to repository endpoints
2013-03-26 20:41:23 -05:00
Henrik Hodne
c1aaeeee32
Add a way to add responses to documentation
...
You can add a predefined JSON response by entering
"json(:resource_name)" in the docstring. This will then be replaced
with the resource with the same name, found in
lib/travis/api/app/endpoint/documentation/resources.rb.
2013-03-26 20:40:35 -05:00
Henrik Hodne
63155e65b6
Fix link to travis-web
...
Fix #55
2013-03-03 18:27:29 -06:00
Sven Fuchs
7e005aad1b
use travis-core/sf-log-models
2013-02-10 21:30:50 +01:00
Sven Fuchs
b8dfb1cd00
auth PUT to /artifacts/:id
2013-01-30 08:50:27 +01:00
Piotr Sarnacki
260c46181d
Add hack to allow handling redirect to logs on the client properly.
...
This hack is temporary and should be removed when we find better
solution.
TL;DR: we can't handle redirects to S3 using CORS, so in case we want to
get logs from S3 without additional requests to API, we need to return
status that will not be automatically redirected (in this case 204 seems
like the best answer).
Longer rationale:
Old logs are hosted on S3 now and in case log is not available in the
database, we would like to redirect to the archived log. Although S3
support CORS, our use case breaks on some browsers:
* when request is triggered to /jobs/:id/log and log is archived, api
returns 302 redirect, Location header points to the log on S3
* browser transparently redirects to given url, but it sets Origin to
null, for security reasons
* "Origin: null" is ok, because we allow every origin by setting
AllowedOrigin to "*"
* S3 returns "Access-Control-Allow-Origin: null" header, which breaks
some browsers (I confirmed it for webkit based browsers)
In order to fix this, S3 would need to return * in
Access-Control-Allow-Origin header or we would need to tell the browser
to not follow redirect. Both solutions are not achiveable.
Another option would be to return log information in job payload - we
could send log_url field which should be either log url on amazon or
null, but in such case we would need to query artifacts table in each
job request. This is something that should be avoided as archived logs
are not frequently requested - slowing down every request to get info
for it would be a waste.
2013-01-29 03:51:22 +01:00
Piotr Sarnacki
489a33cbf6
Try 307 redirect on /logs.txt
2013-01-28 19:05:07 +01:00
Piotr Sarnacki
a565522f41
Redirect to full amazon url
...
Amazon can't work properly with SSL and CNAME for subdomains. For now we
can use full amazon url.
2013-01-28 03:43:28 +01:00
Piotr Sarnacki
31371686c9
Redirect to archive logs
2013-01-28 03:04:36 +01:00
Sven Fuchs
b81644acba
comment out put to /artifacts/:id for now
2013-01-26 20:44:04 +01:00
Sven Fuchs
4ea95494de
allow put to /artifacts/:id
2013-01-26 20:44:04 +01:00
Sven Fuchs
d441336573
expose logs on /job/:id/log.txt
2013-01-26 20:43:54 +01:00
Piotr Sarnacki
f2d768080f
Return last builds on each branch for /builds?branches=true
...
This is a hack to fix travis-ci/travis-web#123 easier. A proper solution
would be to refactor how /branches work.
2013-01-26 01:12:47 +01:00
Sven Fuchs
ee11e571b7
pass the api payload type for workers because we now do not return AR scopes any more
2013-01-23 02:44:30 +01:00
Konstantin Haase
1dd3324350
add /users/:id
2013-01-21 12:16:51 +01:00
Sven Fuchs
92a3d17ebf
use travis-core/sf-restart-event
2013-01-17 19:06:34 +01:00
Konstantin Haase
cc2a1cd50e
do not require user scope for /auth/github
2013-01-11 17:48:30 +01:00
Konstantin Haase
3d6defe3b1
do not store token from /auth/github
2013-01-11 16:49:08 +01:00
Konstantin Haase
ada6ee0f2c
fix scope check
2013-01-11 16:20:53 +01:00
Konstantin Haase
e7be49dcb1
fix the payload
2012-12-17 20:22:51 +01:00
Konstantin Haase
f878eee987
fix logging
2012-12-17 20:06:45 +01:00
Konstantin Haase
b3b5476076
first think, then commit
2012-12-17 19:26:58 +01:00
Konstantin Haase
9a1988d586
fix template
2012-12-17 19:22:33 +01:00
Konstantin Haase
f5fdcc41c6
fix token logic
2012-12-17 15:35:35 +01:00
Konstantin Haase
8c8f031259
have travis token added to user payload on the server
2012-12-17 15:13:38 +01:00
Sven Fuchs
c44445d8e2
use the api serializer to serialize a user record
2012-12-17 01:40:16 +01:00
Konstantin Haase
b005047d95
rename token parameter to github_token for /auth/github
2012-12-12 18:30:55 +01:00
Konstantin Haase
44d6c02591
actually check if github sent a token
2012-12-10 15:49:37 +01:00
Konstantin Haase
3d8c9ed914
use localStorage after handshake
2012-12-10 14:03:31 +01:00
Piotr Sarnacki
88363423f4
Fix whitelist auth check for localhost
2012-12-09 23:46:18 +01:00
Konstantin Haase
83e42adc65
that did not work
2012-12-06 16:55:58 +01:00
Konstantin Haase
2250d1ba5c
only send user payload
2012-12-06 16:51:33 +01:00
Konstantin Haase
981a32f877
fix setTimeout
2012-12-06 16:24:37 +01:00
Konstantin Haase
24ea1ca7c0
cheap escape
2012-12-06 16:05:36 +01:00
Konstantin Haase
7b4fe5dab3
no inspect
2012-12-06 15:52:49 +01:00
Konstantin Haase
af1aeb8147
set action and method
2012-12-06 15:40:29 +01:00
Konstantin Haase
afad81f927
Addressable::URI.parse might return nil
2012-12-06 15:34:13 +01:00
Konstantin Haase
ee1f9d899d
set content type
2012-12-06 15:24:46 +01:00
Konstantin Haase
cd9d84783d
fix regex
2012-12-06 15:20:23 +01:00
Konstantin Haase
3b84b83699
post data for targets we know
2012-12-06 15:08:27 +01:00
Konstantin Haase
ac318df762
Merge branch 'master' into rkh-better-login
2012-12-06 14:47:15 +01:00
Konstantin Haase
497eebab94
simplify popup check
2012-12-05 15:10:28 +01:00
Konstantin Haase
811aa47098
rewrite post message login
2012-12-05 14:09:56 +01:00
Konstantin Haase
d3ed96f165
trigger redirect
2012-12-04 14:39:50 +01:00
Piotr Sarnacki
440dacece3
Add endpoints for key regeneration
...
Enpoints are:
POST /repos/:id/key
and
POST /repos/:owner/:name/key
Both versions will replace current ssl key for given repo with the new
one.
2012-12-03 02:54:01 +01:00
Konstantin Haase
a62948b047
make /key public again
2012-12-02 20:39:54 +01:00
Konstantin Haase
5d515f3b8a
enforce v2 for /key
2012-12-02 20:21:19 +01:00
Konstantin Haase
0d7db43c7a
set scope
2012-12-02 19:47:24 +01:00