2024-02-11 19:42:33 +02:00
|
|
|
// Copyright 2022 Woodpecker Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package secret
|
|
|
|
|
|
|
|
import (
|
2024-12-22 11:44:34 +02:00
|
|
|
"go.woodpecker-ci.org/woodpecker/v3/server/model"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v3/server/store"
|
2024-02-11 19:42:33 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
type db struct {
|
2024-02-25 11:37:10 +02:00
|
|
|
store store.Store
|
2024-02-11 19:42:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewDB returns a new local secret service.
|
2024-02-25 11:37:10 +02:00
|
|
|
func NewDB(store store.Store) Service {
|
2024-02-11 19:42:33 +02:00
|
|
|
return &db{store: store}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) SecretFind(repo *model.Repo, name string) (*model.Secret, error) {
|
|
|
|
return d.store.SecretFind(repo, name)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) SecretList(repo *model.Repo, p *model.ListOptions) ([]*model.Secret, error) {
|
|
|
|
return d.store.SecretList(repo, false, p)
|
|
|
|
}
|
|
|
|
|
2024-07-03 15:33:11 +02:00
|
|
|
func (d *db) SecretListPipeline(repo *model.Repo, _ *model.Pipeline) ([]*model.Secret, error) {
|
|
|
|
s, err := d.store.SecretList(repo, true, &model.ListOptions{All: true})
|
2024-02-11 19:42:33 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return only secrets with unique name
|
|
|
|
// Priority order in case of duplicate names are repository, user/organization, global
|
|
|
|
secrets := make([]*model.Secret, 0, len(s))
|
|
|
|
uniq := make(map[string]struct{})
|
|
|
|
for _, condition := range []struct {
|
|
|
|
IsRepository bool
|
|
|
|
IsOrganization bool
|
|
|
|
IsGlobal bool
|
|
|
|
}{
|
|
|
|
{IsRepository: true},
|
|
|
|
{IsOrganization: true},
|
|
|
|
{IsGlobal: true},
|
|
|
|
} {
|
|
|
|
for _, secret := range s {
|
|
|
|
if secret.IsRepository() != condition.IsRepository || secret.IsOrganization() != condition.IsOrganization || secret.IsGlobal() != condition.IsGlobal {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if _, ok := uniq[secret.Name]; ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
uniq[secret.Name] = struct{}{}
|
|
|
|
secrets = append(secrets, secret)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return secrets, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) SecretCreate(_ *model.Repo, in *model.Secret) error {
|
|
|
|
return d.store.SecretCreate(in)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) SecretUpdate(_ *model.Repo, in *model.Secret) error {
|
|
|
|
return d.store.SecretUpdate(in)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) SecretDelete(repo *model.Repo, name string) error {
|
|
|
|
secret, err := d.store.SecretFind(repo, name)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return d.store.SecretDelete(secret)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) OrgSecretFind(owner int64, name string) (*model.Secret, error) {
|
|
|
|
return d.store.OrgSecretFind(owner, name)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) OrgSecretList(owner int64, p *model.ListOptions) ([]*model.Secret, error) {
|
|
|
|
return d.store.OrgSecretList(owner, p)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) OrgSecretCreate(_ int64, in *model.Secret) error {
|
|
|
|
return d.store.SecretCreate(in)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) OrgSecretUpdate(_ int64, in *model.Secret) error {
|
|
|
|
return d.store.SecretUpdate(in)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) OrgSecretDelete(owner int64, name string) error {
|
|
|
|
secret, err := d.store.OrgSecretFind(owner, name)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return d.store.SecretDelete(secret)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) GlobalSecretFind(owner string) (*model.Secret, error) {
|
|
|
|
return d.store.GlobalSecretFind(owner)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) GlobalSecretList(p *model.ListOptions) ([]*model.Secret, error) {
|
|
|
|
return d.store.GlobalSecretList(p)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) GlobalSecretCreate(in *model.Secret) error {
|
|
|
|
return d.store.SecretCreate(in)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) GlobalSecretUpdate(in *model.Secret) error {
|
|
|
|
return d.store.SecretUpdate(in)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *db) GlobalSecretDelete(name string) error {
|
|
|
|
secret, err := d.store.GlobalSecretFind(name)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return d.store.SecretDelete(secret)
|
|
|
|
}
|