2023-08-15 20:32:43 +08:00
|
|
|
// Copyright 2023 The Gitea Authors. All rights reserved.
|
|
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
|
|
|
|
package org
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net/http"
|
|
|
|
|
2023-08-22 11:20:34 +08:00
|
|
|
secret_model "code.gitea.io/gitea/models/secret"
|
2023-08-15 20:32:43 +08:00
|
|
|
"code.gitea.io/gitea/modules/context"
|
|
|
|
api "code.gitea.io/gitea/modules/structs"
|
2023-08-22 11:20:34 +08:00
|
|
|
"code.gitea.io/gitea/modules/web"
|
2023-08-15 20:32:43 +08:00
|
|
|
"code.gitea.io/gitea/routers/api/v1/utils"
|
2023-08-22 11:20:34 +08:00
|
|
|
"code.gitea.io/gitea/routers/web/shared/actions"
|
|
|
|
"code.gitea.io/gitea/services/convert"
|
2023-08-15 20:32:43 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
// ListActionsSecrets list an organization's actions secrets
|
|
|
|
func ListActionsSecrets(ctx *context.APIContext) {
|
|
|
|
// swagger:operation GET /orgs/{org}/actions/secrets organization orgListActionsSecrets
|
|
|
|
// ---
|
|
|
|
// summary: List an organization's actions secrets
|
|
|
|
// produces:
|
|
|
|
// - application/json
|
|
|
|
// parameters:
|
|
|
|
// - name: org
|
|
|
|
// in: path
|
|
|
|
// description: name of the organization
|
|
|
|
// type: string
|
|
|
|
// required: true
|
|
|
|
// - name: page
|
|
|
|
// in: query
|
|
|
|
// description: page number of results to return (1-based)
|
|
|
|
// type: integer
|
|
|
|
// - name: limit
|
|
|
|
// in: query
|
|
|
|
// description: page size of results
|
|
|
|
// type: integer
|
|
|
|
// responses:
|
|
|
|
// "200":
|
|
|
|
// "$ref": "#/responses/SecretList"
|
|
|
|
|
|
|
|
listActionsSecrets(ctx)
|
|
|
|
}
|
|
|
|
|
|
|
|
// listActionsSecrets list an organization's actions secrets
|
|
|
|
func listActionsSecrets(ctx *context.APIContext) {
|
2023-08-22 11:20:34 +08:00
|
|
|
opts := &secret_model.FindSecretsOptions{
|
2023-08-15 20:32:43 +08:00
|
|
|
OwnerID: ctx.Org.Organization.ID,
|
|
|
|
ListOptions: utils.GetListOptions(ctx),
|
|
|
|
}
|
|
|
|
|
2023-08-22 11:20:34 +08:00
|
|
|
count, err := secret_model.CountSecrets(ctx, opts)
|
2023-08-15 20:32:43 +08:00
|
|
|
if err != nil {
|
|
|
|
ctx.InternalServerError(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-08-22 11:20:34 +08:00
|
|
|
secrets, err := secret_model.FindSecrets(ctx, *opts)
|
2023-08-15 20:32:43 +08:00
|
|
|
if err != nil {
|
|
|
|
ctx.InternalServerError(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
apiSecrets := make([]*api.Secret, len(secrets))
|
|
|
|
for k, v := range secrets {
|
|
|
|
apiSecrets[k] = &api.Secret{
|
|
|
|
Name: v.Name,
|
|
|
|
Created: v.CreatedUnix.AsTime(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.SetTotalCountHeader(count)
|
|
|
|
ctx.JSON(http.StatusOK, apiSecrets)
|
|
|
|
}
|
2023-08-22 11:20:34 +08:00
|
|
|
|
|
|
|
// CreateOrgSecret create one secret of the organization
|
|
|
|
func CreateOrgSecret(ctx *context.APIContext) {
|
|
|
|
// swagger:operation POST /orgs/{org}/actions/secrets organization createOrgSecret
|
|
|
|
// ---
|
|
|
|
// summary: Create a secret in an organization
|
|
|
|
// consumes:
|
|
|
|
// - application/json
|
|
|
|
// produces:
|
|
|
|
// - application/json
|
|
|
|
// parameters:
|
|
|
|
// - name: org
|
|
|
|
// in: path
|
|
|
|
// description: name of organization
|
|
|
|
// type: string
|
|
|
|
// required: true
|
|
|
|
// - name: body
|
|
|
|
// in: body
|
|
|
|
// schema:
|
|
|
|
// "$ref": "#/definitions/CreateSecretOption"
|
|
|
|
// responses:
|
|
|
|
// "201":
|
|
|
|
// "$ref": "#/responses/Secret"
|
|
|
|
// "400":
|
|
|
|
// "$ref": "#/responses/error"
|
|
|
|
// "404":
|
|
|
|
// "$ref": "#/responses/notFound"
|
|
|
|
// "403":
|
|
|
|
// "$ref": "#/responses/forbidden"
|
|
|
|
opt := web.GetForm(ctx).(*api.CreateSecretOption)
|
2023-08-24 10:07:00 +08:00
|
|
|
if err := actions.NameRegexMatch(opt.Name); err != nil {
|
|
|
|
ctx.Error(http.StatusBadRequest, "CreateOrgSecret", err)
|
|
|
|
return
|
|
|
|
}
|
2023-08-22 11:20:34 +08:00
|
|
|
s, err := secret_model.InsertEncryptedSecret(
|
|
|
|
ctx, ctx.Org.Organization.ID, 0, opt.Name, actions.ReserveLineBreakForTextarea(opt.Data),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "InsertEncryptedSecret", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.JSON(http.StatusCreated, convert.ToSecret(s))
|
|
|
|
}
|
2023-08-24 10:07:00 +08:00
|
|
|
|
|
|
|
// UpdateOrgSecret update one secret of the organization
|
|
|
|
func UpdateOrgSecret(ctx *context.APIContext) {
|
|
|
|
// swagger:operation PUT /orgs/{org}/actions/secrets/{secretname} organization updateOrgSecret
|
|
|
|
// ---
|
|
|
|
// summary: Update a secret value in an organization
|
|
|
|
// consumes:
|
|
|
|
// - application/json
|
|
|
|
// produces:
|
|
|
|
// - application/json
|
|
|
|
// parameters:
|
|
|
|
// - name: org
|
|
|
|
// in: path
|
|
|
|
// description: name of organization
|
|
|
|
// type: string
|
|
|
|
// required: true
|
|
|
|
// - name: secretname
|
|
|
|
// in: path
|
|
|
|
// description: name of the secret
|
|
|
|
// type: string
|
|
|
|
// required: true
|
|
|
|
// - name: body
|
|
|
|
// in: body
|
|
|
|
// schema:
|
|
|
|
// "$ref": "#/definitions/UpdateSecretOption"
|
|
|
|
// responses:
|
|
|
|
// "204":
|
|
|
|
// description: update one secret of the organization
|
|
|
|
// "403":
|
|
|
|
// "$ref": "#/responses/forbidden"
|
|
|
|
secretName := ctx.Params(":secretname")
|
|
|
|
opt := web.GetForm(ctx).(*api.UpdateSecretOption)
|
|
|
|
err := secret_model.UpdateSecret(
|
|
|
|
ctx, ctx.Org.Organization.ID, 0, secretName, opt.Data,
|
|
|
|
)
|
|
|
|
if secret_model.IsErrSecretNotFound(err) {
|
|
|
|
ctx.NotFound(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "UpdateSecret", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Status(http.StatusNoContent)
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeleteOrgSecret delete one secret of the organization
|
|
|
|
func DeleteOrgSecret(ctx *context.APIContext) {
|
|
|
|
// swagger:operation DELETE /orgs/{org}/actions/secrets/{secretname} organization deleteOrgSecret
|
|
|
|
// ---
|
|
|
|
// summary: Delete a secret in an organization
|
|
|
|
// consumes:
|
|
|
|
// - application/json
|
|
|
|
// produces:
|
|
|
|
// - application/json
|
|
|
|
// parameters:
|
|
|
|
// - name: org
|
|
|
|
// in: path
|
|
|
|
// description: name of organization
|
|
|
|
// type: string
|
|
|
|
// required: true
|
|
|
|
// - name: secretname
|
|
|
|
// in: path
|
|
|
|
// description: name of the secret
|
|
|
|
// type: string
|
|
|
|
// required: true
|
|
|
|
// responses:
|
|
|
|
// "204":
|
|
|
|
// description: delete one secret of the organization
|
|
|
|
// "403":
|
|
|
|
// "$ref": "#/responses/forbidden"
|
|
|
|
secretName := ctx.Params(":secretname")
|
|
|
|
err := secret_model.DeleteSecret(
|
|
|
|
ctx, ctx.Org.Organization.ID, 0, secretName,
|
|
|
|
)
|
|
|
|
if secret_model.IsErrSecretNotFound(err) {
|
|
|
|
ctx.NotFound(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "DeleteSecret", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Status(http.StatusNoContent)
|
|
|
|
}
|