mirror of
https://github.com/woodpecker-ci/woodpecker.git
synced 2024-11-29 13:21:10 +00:00
Add global and organization secrets (#1027)
* Implement database changes and store methods for global and organization secrets * Add tests for new store methods * Add organization secret API and UI * Add global secrets API and UI * Add suggestions * Update warning style * Apply suggestions from code review Co-authored-by: Anbraten <anton@ju60.de> * Fix lint warning Co-authored-by: Anbraten <anton@ju60.de>
This commit is contained in:
parent
bed3ef104c
commit
1ac2c42652
35 changed files with 1777 additions and 130 deletions
2
.vscode/extensions.json
vendored
2
.vscode/extensions.json
vendored
|
@ -6,7 +6,7 @@
|
||||||
"dbaeumer.vscode-eslint",
|
"dbaeumer.vscode-eslint",
|
||||||
"esbenp.prettier-vscode",
|
"esbenp.prettier-vscode",
|
||||||
"voorjaar.windicss-intellisense",
|
"voorjaar.windicss-intellisense",
|
||||||
"johnsoncodehk.volar",
|
"Vue.volar",
|
||||||
"redhat.vscode-yaml",
|
"redhat.vscode-yaml",
|
||||||
"davidanson.vscode-markdownlint"
|
"davidanson.vscode-markdownlint"
|
||||||
],
|
],
|
||||||
|
|
4
go.mod
4
go.mod
|
@ -42,8 +42,8 @@ require (
|
||||||
google.golang.org/grpc v1.47.0
|
google.golang.org/grpc v1.47.0
|
||||||
google.golang.org/protobuf v1.28.0
|
google.golang.org/protobuf v1.28.0
|
||||||
gopkg.in/yaml.v3 v3.0.1
|
gopkg.in/yaml.v3 v3.0.1
|
||||||
xorm.io/builder v0.3.10
|
xorm.io/builder v0.3.12
|
||||||
xorm.io/xorm v1.3.0
|
xorm.io/xorm v1.3.1
|
||||||
)
|
)
|
||||||
|
|
||||||
require (
|
require (
|
||||||
|
|
10
go.sum
10
go.sum
|
@ -1199,8 +1199,8 @@ rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
|
||||||
rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
|
rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
|
||||||
sigs.k8s.io/yaml v1.1.0/go.mod h1:UJmg0vDUVViEyp3mgSv9WPwZCDxu4rQW1olrI1uml+o=
|
sigs.k8s.io/yaml v1.1.0/go.mod h1:UJmg0vDUVViEyp3mgSv9WPwZCDxu4rQW1olrI1uml+o=
|
||||||
sourcegraph.com/sourcegraph/appdash v0.0.0-20190731080439-ebfcffb1b5c0/go.mod h1:hI742Nqp5OhwiqlzhgfbWU4mW4yO10fP+LoT9WOswdU=
|
sourcegraph.com/sourcegraph/appdash v0.0.0-20190731080439-ebfcffb1b5c0/go.mod h1:hI742Nqp5OhwiqlzhgfbWU4mW4yO10fP+LoT9WOswdU=
|
||||||
xorm.io/builder v0.3.9/go.mod h1:aUW0S9eb9VCaPohFCH3j7czOx1PMW3i1HrSzbLYGBSE=
|
xorm.io/builder v0.3.11-0.20220531020008-1bd24a7dc978/go.mod h1:aUW0S9eb9VCaPohFCH3j7czOx1PMW3i1HrSzbLYGBSE=
|
||||||
xorm.io/builder v0.3.10 h1:Rvkncad3Lo9YIVqCbgIf6QnpR/HcW3IEr0AANNpuyMQ=
|
xorm.io/builder v0.3.12 h1:ASZYX7fQmy+o8UJdhlLHSW57JDOkM8DNhcAF5d0LiJM=
|
||||||
xorm.io/builder v0.3.10/go.mod h1:aUW0S9eb9VCaPohFCH3j7czOx1PMW3i1HrSzbLYGBSE=
|
xorm.io/builder v0.3.12/go.mod h1:aUW0S9eb9VCaPohFCH3j7czOx1PMW3i1HrSzbLYGBSE=
|
||||||
xorm.io/xorm v1.3.0 h1:UsVke0wyAk3tJcb0j15gLWv2DEshVUnySVyvcYDny8w=
|
xorm.io/xorm v1.3.1 h1:z5egKrDoOLqZFhMjcGF4FBHiTmE5/feQoHclfhNidfM=
|
||||||
xorm.io/xorm v1.3.0/go.mod h1:cEaWjDPqoIusTkmDAG+krCcPcTglqo8CDU8geX/yhko=
|
xorm.io/xorm v1.3.1/go.mod h1:9NbjqdnjX6eyjRRhh01GHm64r6N9shTb/8Ak3YRt8Nw=
|
||||||
|
|
123
server/api/global_secret.go
Normal file
123
server/api/global_secret.go
Normal file
|
@ -0,0 +1,123 @@
|
||||||
|
// Copyright 2022 Woodpecker Authors
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
package api
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/woodpecker-ci/woodpecker/server"
|
||||||
|
"github.com/woodpecker-ci/woodpecker/server/model"
|
||||||
|
|
||||||
|
"github.com/gin-gonic/gin"
|
||||||
|
)
|
||||||
|
|
||||||
|
// GetGlobalSecretList gets the global secret list from
|
||||||
|
// the database and writes to the response in json format.
|
||||||
|
func GetGlobalSecretList(c *gin.Context) {
|
||||||
|
list, err := server.Config.Services.Secrets.GlobalSecretList()
|
||||||
|
if err != nil {
|
||||||
|
c.String(http.StatusInternalServerError, "Error getting global secret list. %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
// copy the secret detail to remove the sensitive
|
||||||
|
// password and token fields.
|
||||||
|
for i, secret := range list {
|
||||||
|
list[i] = secret.Copy()
|
||||||
|
}
|
||||||
|
c.JSON(http.StatusOK, list)
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetGlobalSecret gets the named global secret from the database
|
||||||
|
// and writes to the response in json format.
|
||||||
|
func GetGlobalSecret(c *gin.Context) {
|
||||||
|
name := c.Param("secret")
|
||||||
|
secret, err := server.Config.Services.Secrets.GlobalSecretFind(name)
|
||||||
|
if err != nil {
|
||||||
|
c.String(404, "Error getting global secret %q. %s", name, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
c.JSON(200, secret.Copy())
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostGlobalSecret persists a global secret to the database.
|
||||||
|
func PostGlobalSecret(c *gin.Context) {
|
||||||
|
in := new(model.Secret)
|
||||||
|
if err := c.Bind(in); err != nil {
|
||||||
|
c.String(http.StatusBadRequest, "Error parsing global secret. %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
secret := &model.Secret{
|
||||||
|
Name: in.Name,
|
||||||
|
Value: in.Value,
|
||||||
|
Events: in.Events,
|
||||||
|
Images: in.Images,
|
||||||
|
}
|
||||||
|
if err := secret.Validate(); err != nil {
|
||||||
|
c.String(400, "Error inserting global secret. %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err := server.Config.Services.Secrets.GlobalSecretCreate(secret); err != nil {
|
||||||
|
c.String(500, "Error inserting global secret %q. %s", in.Name, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
c.JSON(200, secret.Copy())
|
||||||
|
}
|
||||||
|
|
||||||
|
// PatchGlobalSecret updates a global secret in the database.
|
||||||
|
func PatchGlobalSecret(c *gin.Context) {
|
||||||
|
name := c.Param("secret")
|
||||||
|
|
||||||
|
in := new(model.Secret)
|
||||||
|
err := c.Bind(in)
|
||||||
|
if err != nil {
|
||||||
|
c.String(http.StatusBadRequest, "Error parsing secret. %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
secret, err := server.Config.Services.Secrets.GlobalSecretFind(name)
|
||||||
|
if err != nil {
|
||||||
|
c.String(404, "Error getting global secret %q. %s", name, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if in.Value != "" {
|
||||||
|
secret.Value = in.Value
|
||||||
|
}
|
||||||
|
if in.Events != nil {
|
||||||
|
secret.Events = in.Events
|
||||||
|
}
|
||||||
|
if in.Images != nil {
|
||||||
|
secret.Images = in.Images
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := secret.Validate(); err != nil {
|
||||||
|
c.String(400, "Error updating global secret. %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err := server.Config.Services.Secrets.GlobalSecretUpdate(secret); err != nil {
|
||||||
|
c.String(500, "Error updating global secret %q. %s", in.Name, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
c.JSON(200, secret.Copy())
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteGlobalSecret deletes the named global secret from the database.
|
||||||
|
func DeleteGlobalSecret(c *gin.Context) {
|
||||||
|
name := c.Param("secret")
|
||||||
|
if err := server.Config.Services.Secrets.GlobalSecretDelete(name); err != nil {
|
||||||
|
c.String(500, "Error deleting global secret %q. %s", name, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
c.String(204, "")
|
||||||
|
}
|
47
server/api/org.go
Normal file
47
server/api/org.go
Normal file
|
@ -0,0 +1,47 @@
|
||||||
|
// Copyright 2022 Woodpecker Authors
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
package api
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/woodpecker-ci/woodpecker/server"
|
||||||
|
"github.com/woodpecker-ci/woodpecker/server/model"
|
||||||
|
"github.com/woodpecker-ci/woodpecker/server/router/middleware/session"
|
||||||
|
|
||||||
|
"github.com/gin-gonic/gin"
|
||||||
|
)
|
||||||
|
|
||||||
|
// GetOrgPermissions returns the permissions of the current user in the given organization.
|
||||||
|
func GetOrgPermissions(c *gin.Context) {
|
||||||
|
var (
|
||||||
|
err error
|
||||||
|
user = session.User(c)
|
||||||
|
owner = c.Param("owner")
|
||||||
|
)
|
||||||
|
|
||||||
|
if user == nil {
|
||||||
|
c.JSON(http.StatusOK, &model.OrgPerm{})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
perm, err := server.Config.Services.Membership.Get(c, user, owner)
|
||||||
|
if err != nil {
|
||||||
|
c.String(http.StatusInternalServerError, "Error getting membership for %q. %s", owner, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
c.JSON(http.StatusOK, perm)
|
||||||
|
}
|
136
server/api/org_secret.go
Normal file
136
server/api/org_secret.go
Normal file
|
@ -0,0 +1,136 @@
|
||||||
|
// Copyright 2022 Woodpecker Authors
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
package api
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/woodpecker-ci/woodpecker/server"
|
||||||
|
"github.com/woodpecker-ci/woodpecker/server/model"
|
||||||
|
|
||||||
|
"github.com/gin-gonic/gin"
|
||||||
|
)
|
||||||
|
|
||||||
|
// GetOrgSecret gets the named organization secret from the database
|
||||||
|
// and writes to the response in json format.
|
||||||
|
func GetOrgSecret(c *gin.Context) {
|
||||||
|
var (
|
||||||
|
owner = c.Param("owner")
|
||||||
|
name = c.Param("secret")
|
||||||
|
)
|
||||||
|
secret, err := server.Config.Services.Secrets.OrgSecretFind(owner, name)
|
||||||
|
if err != nil {
|
||||||
|
c.String(404, "Error getting org %q secret %q. %s", owner, name, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
c.JSON(200, secret.Copy())
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetOrgSecretList gest the organization secret list from
|
||||||
|
// the database and writes to the response in json format.
|
||||||
|
func GetOrgSecretList(c *gin.Context) {
|
||||||
|
owner := c.Param("owner")
|
||||||
|
list, err := server.Config.Services.Secrets.OrgSecretList(owner)
|
||||||
|
if err != nil {
|
||||||
|
c.String(http.StatusInternalServerError, "Error getting secret list for %q. %s", owner, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
// copy the secret detail to remove the sensitive
|
||||||
|
// password and token fields.
|
||||||
|
for i, secret := range list {
|
||||||
|
list[i] = secret.Copy()
|
||||||
|
}
|
||||||
|
c.JSON(http.StatusOK, list)
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostOrgSecret persists an organization secret to the database.
|
||||||
|
func PostOrgSecret(c *gin.Context) {
|
||||||
|
owner := c.Param("owner")
|
||||||
|
|
||||||
|
in := new(model.Secret)
|
||||||
|
if err := c.Bind(in); err != nil {
|
||||||
|
c.String(http.StatusBadRequest, "Error parsing org %q secret. %s", owner, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
secret := &model.Secret{
|
||||||
|
Owner: owner,
|
||||||
|
Name: in.Name,
|
||||||
|
Value: in.Value,
|
||||||
|
Events: in.Events,
|
||||||
|
Images: in.Images,
|
||||||
|
}
|
||||||
|
if err := secret.Validate(); err != nil {
|
||||||
|
c.String(400, "Error inserting org %q secret. %s", owner, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err := server.Config.Services.Secrets.OrgSecretCreate(owner, secret); err != nil {
|
||||||
|
c.String(500, "Error inserting org %q secret %q. %s", owner, in.Name, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
c.JSON(200, secret.Copy())
|
||||||
|
}
|
||||||
|
|
||||||
|
// PatchOrgSecret updates an organization secret in the database.
|
||||||
|
func PatchOrgSecret(c *gin.Context) {
|
||||||
|
var (
|
||||||
|
owner = c.Param("owner")
|
||||||
|
name = c.Param("secret")
|
||||||
|
)
|
||||||
|
|
||||||
|
in := new(model.Secret)
|
||||||
|
err := c.Bind(in)
|
||||||
|
if err != nil {
|
||||||
|
c.String(http.StatusBadRequest, "Error parsing secret. %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
secret, err := server.Config.Services.Secrets.OrgSecretFind(owner, name)
|
||||||
|
if err != nil {
|
||||||
|
c.String(404, "Error getting org %q secret %q. %s", owner, name, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if in.Value != "" {
|
||||||
|
secret.Value = in.Value
|
||||||
|
}
|
||||||
|
if in.Events != nil {
|
||||||
|
secret.Events = in.Events
|
||||||
|
}
|
||||||
|
if in.Images != nil {
|
||||||
|
secret.Images = in.Images
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := secret.Validate(); err != nil {
|
||||||
|
c.String(400, "Error updating org %q secret. %s", owner, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err := server.Config.Services.Secrets.OrgSecretUpdate(owner, secret); err != nil {
|
||||||
|
c.String(500, "Error updating org %q secret %q. %s", owner, in.Name, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
c.JSON(200, secret.Copy())
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteOrgSecret deletes the named organization secret from the database.
|
||||||
|
func DeleteOrgSecret(c *gin.Context) {
|
||||||
|
var (
|
||||||
|
owner = c.Param("owner")
|
||||||
|
name = c.Param("secret")
|
||||||
|
)
|
||||||
|
if err := server.Config.Services.Secrets.OrgSecretDelete(owner, name); err != nil {
|
||||||
|
c.String(500, "Error deleting org %q secret %q. %s", owner, name, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
c.String(204, "")
|
||||||
|
}
|
|
@ -30,29 +30,47 @@ var (
|
||||||
|
|
||||||
// SecretService defines a service for managing secrets.
|
// SecretService defines a service for managing secrets.
|
||||||
type SecretService interface {
|
type SecretService interface {
|
||||||
|
SecretListBuild(*Repo, *Build) ([]*Secret, error)
|
||||||
|
// Repository secrets
|
||||||
SecretFind(*Repo, string) (*Secret, error)
|
SecretFind(*Repo, string) (*Secret, error)
|
||||||
SecretList(*Repo) ([]*Secret, error)
|
SecretList(*Repo) ([]*Secret, error)
|
||||||
SecretListBuild(*Repo, *Build) ([]*Secret, error)
|
|
||||||
SecretCreate(*Repo, *Secret) error
|
SecretCreate(*Repo, *Secret) error
|
||||||
SecretUpdate(*Repo, *Secret) error
|
SecretUpdate(*Repo, *Secret) error
|
||||||
SecretDelete(*Repo, string) error
|
SecretDelete(*Repo, string) error
|
||||||
|
// Organization secrets
|
||||||
|
OrgSecretFind(string, string) (*Secret, error)
|
||||||
|
OrgSecretList(string) ([]*Secret, error)
|
||||||
|
OrgSecretCreate(string, *Secret) error
|
||||||
|
OrgSecretUpdate(string, *Secret) error
|
||||||
|
OrgSecretDelete(string, string) error
|
||||||
|
// Global secrets
|
||||||
|
GlobalSecretFind(string) (*Secret, error)
|
||||||
|
GlobalSecretList() ([]*Secret, error)
|
||||||
|
GlobalSecretCreate(*Secret) error
|
||||||
|
GlobalSecretUpdate(*Secret) error
|
||||||
|
GlobalSecretDelete(string) error
|
||||||
}
|
}
|
||||||
|
|
||||||
// SecretStore persists secret information to storage.
|
// SecretStore persists secret information to storage.
|
||||||
type SecretStore interface {
|
type SecretStore interface {
|
||||||
SecretFind(*Repo, string) (*Secret, error)
|
SecretFind(*Repo, string) (*Secret, error)
|
||||||
SecretList(*Repo) ([]*Secret, error)
|
SecretList(*Repo, bool) ([]*Secret, error)
|
||||||
SecretCreate(*Secret) error
|
SecretCreate(*Secret) error
|
||||||
SecretUpdate(*Secret) error
|
SecretUpdate(*Secret) error
|
||||||
SecretDelete(*Secret) error
|
SecretDelete(*Secret) error
|
||||||
|
OrgSecretFind(string, string) (*Secret, error)
|
||||||
|
OrgSecretList(string) ([]*Secret, error)
|
||||||
|
GlobalSecretFind(string) (*Secret, error)
|
||||||
|
GlobalSecretList() ([]*Secret, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Secret represents a secret variable, such as a password or token.
|
// Secret represents a secret variable, such as a password or token.
|
||||||
// swagger:model registry
|
// swagger:model registry
|
||||||
type Secret struct {
|
type Secret struct {
|
||||||
ID int64 `json:"id" xorm:"pk autoincr 'secret_id'"`
|
ID int64 `json:"id" xorm:"pk autoincr 'secret_id'"`
|
||||||
RepoID int64 `json:"-" xorm:"UNIQUE(s) INDEX 'secret_repo_id'"`
|
Owner string `json:"-" xorm:"NOT NULL DEFAULT '' UNIQUE(s) INDEX 'secret_owner'"`
|
||||||
Name string `json:"name" xorm:"UNIQUE(s) INDEX 'secret_name'"`
|
RepoID int64 `json:"-" xorm:"NOT NULL DEFAULT 0 UNIQUE(s) INDEX 'secret_repo_id'"`
|
||||||
|
Name string `json:"name" xorm:"NOT NULL UNIQUE(s) INDEX 'secret_name'"`
|
||||||
Value string `json:"value,omitempty" xorm:"TEXT 'secret_value'"`
|
Value string `json:"value,omitempty" xorm:"TEXT 'secret_value'"`
|
||||||
Images []string `json:"image" xorm:"json 'secret_images'"`
|
Images []string `json:"image" xorm:"json 'secret_images'"`
|
||||||
Events []WebhookEvent `json:"event" xorm:"json 'secret_events'"`
|
Events []WebhookEvent `json:"event" xorm:"json 'secret_events'"`
|
||||||
|
@ -65,6 +83,16 @@ func (Secret) TableName() string {
|
||||||
return "secrets"
|
return "secrets"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Global secret.
|
||||||
|
func (s Secret) Global() bool {
|
||||||
|
return s.RepoID == 0 && s.Owner == ""
|
||||||
|
}
|
||||||
|
|
||||||
|
// Organization secret.
|
||||||
|
func (s Secret) Organization() bool {
|
||||||
|
return s.RepoID == 0 && s.Owner != ""
|
||||||
|
}
|
||||||
|
|
||||||
// Match returns true if an image and event match the restricted list.
|
// Match returns true if an image and event match the restricted list.
|
||||||
func (s *Secret) Match(event WebhookEvent) bool {
|
func (s *Secret) Match(event WebhookEvent) bool {
|
||||||
if len(s.Events) == 0 {
|
if len(s.Events) == 0 {
|
||||||
|
@ -119,6 +147,7 @@ func (s *Secret) Validate() error {
|
||||||
func (s *Secret) Copy() *Secret {
|
func (s *Secret) Copy() *Secret {
|
||||||
return &Secret{
|
return &Secret{
|
||||||
ID: s.ID,
|
ID: s.ID,
|
||||||
|
Owner: s.Owner,
|
||||||
RepoID: s.RepoID,
|
RepoID: s.RepoID,
|
||||||
Name: s.Name,
|
Name: s.Name,
|
||||||
Images: s.Images,
|
Images: s.Images,
|
||||||
|
|
|
@ -21,11 +21,39 @@ func (b *builtin) SecretFind(repo *model.Repo, name string) (*model.Secret, erro
|
||||||
}
|
}
|
||||||
|
|
||||||
func (b *builtin) SecretList(repo *model.Repo) ([]*model.Secret, error) {
|
func (b *builtin) SecretList(repo *model.Repo) ([]*model.Secret, error) {
|
||||||
return b.store.SecretList(repo)
|
return b.store.SecretList(repo, false)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (b *builtin) SecretListBuild(repo *model.Repo, build *model.Build) ([]*model.Secret, error) {
|
func (b *builtin) SecretListBuild(repo *model.Repo, build *model.Build) ([]*model.Secret, error) {
|
||||||
return b.store.SecretList(repo)
|
s, err := b.store.SecretList(repo, true)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Return only secrets with unique name
|
||||||
|
// Priority order in case of duplicate names are repository, user/organization, global
|
||||||
|
secrets := make([]*model.Secret, 0, len(s))
|
||||||
|
uniq := make(map[string]struct{})
|
||||||
|
for _, cond := range []struct {
|
||||||
|
Global bool
|
||||||
|
Organization bool
|
||||||
|
}{
|
||||||
|
{},
|
||||||
|
{Organization: true},
|
||||||
|
{Global: true},
|
||||||
|
} {
|
||||||
|
for _, secret := range s {
|
||||||
|
if secret.Global() == cond.Global && secret.Organization() == cond.Organization {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if _, ok := uniq[secret.Name]; ok {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
uniq[secret.Name] = struct{}{}
|
||||||
|
secrets = append(secrets, secret)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return secrets, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (b *builtin) SecretCreate(repo *model.Repo, in *model.Secret) error {
|
func (b *builtin) SecretCreate(repo *model.Repo, in *model.Secret) error {
|
||||||
|
@ -43,3 +71,51 @@ func (b *builtin) SecretDelete(repo *model.Repo, name string) error {
|
||||||
}
|
}
|
||||||
return b.store.SecretDelete(secret)
|
return b.store.SecretDelete(secret)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (b *builtin) OrgSecretFind(owner, name string) (*model.Secret, error) {
|
||||||
|
return b.store.OrgSecretFind(owner, name)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *builtin) OrgSecretList(owner string) ([]*model.Secret, error) {
|
||||||
|
return b.store.OrgSecretList(owner)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *builtin) OrgSecretCreate(owner string, in *model.Secret) error {
|
||||||
|
return b.store.SecretCreate(in)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *builtin) OrgSecretUpdate(owner string, in *model.Secret) error {
|
||||||
|
return b.store.SecretUpdate(in)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *builtin) OrgSecretDelete(owner, name string) error {
|
||||||
|
secret, err := b.store.OrgSecretFind(owner, name)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return b.store.SecretDelete(secret)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *builtin) GlobalSecretFind(owner string) (*model.Secret, error) {
|
||||||
|
return b.store.GlobalSecretFind(owner)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *builtin) GlobalSecretList() ([]*model.Secret, error) {
|
||||||
|
return b.store.GlobalSecretList()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *builtin) GlobalSecretCreate(in *model.Secret) error {
|
||||||
|
return b.store.SecretCreate(in)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *builtin) GlobalSecretUpdate(in *model.Secret) error {
|
||||||
|
return b.store.SecretUpdate(in)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *builtin) GlobalSecretDelete(name string) error {
|
||||||
|
secret, err := b.store.GlobalSecretFind(name)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return b.store.SecretDelete(secret)
|
||||||
|
}
|
||||||
|
|
|
@ -43,6 +43,21 @@ func apiRoutes(e *gin.Engine) {
|
||||||
users.DELETE("/:login", api.DeleteUser)
|
users.DELETE("/:login", api.DeleteUser)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
orgBase := e.Group("/api/orgs/:owner")
|
||||||
|
{
|
||||||
|
orgBase.GET("/permissions", api.GetOrgPermissions)
|
||||||
|
|
||||||
|
org := orgBase.Group("")
|
||||||
|
{
|
||||||
|
org.Use(session.MustOrgMember(true))
|
||||||
|
org.GET("/secrets", api.GetOrgSecretList)
|
||||||
|
org.POST("/secrets", api.PostOrgSecret)
|
||||||
|
org.GET("/secrets/:secret", api.GetOrgSecret)
|
||||||
|
org.PATCH("/secrets/:secret", api.PatchOrgSecret)
|
||||||
|
org.DELETE("/secrets/:secret", api.DeleteOrgSecret)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
repoBase := e.Group("/api/repos/:owner/:name")
|
repoBase := e.Group("/api/repos/:owner/:name")
|
||||||
{
|
{
|
||||||
repoBase.Use(session.SetRepo())
|
repoBase.Use(session.SetRepo())
|
||||||
|
@ -123,6 +138,16 @@ func apiRoutes(e *gin.Engine) {
|
||||||
queue.GET("/norunningbuilds", api.BlockTilQueueHasRunningItem)
|
queue.GET("/norunningbuilds", api.BlockTilQueueHasRunningItem)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
secrets := e.Group("/api/secrets")
|
||||||
|
{
|
||||||
|
secrets.Use(session.MustAdmin())
|
||||||
|
secrets.GET("", api.GetGlobalSecretList)
|
||||||
|
secrets.POST("", api.PostGlobalSecret)
|
||||||
|
secrets.GET("/:secret", api.GetGlobalSecret)
|
||||||
|
secrets.PATCH("/:secret", api.PatchGlobalSecret)
|
||||||
|
secrets.DELETE("/:secret", api.DeleteGlobalSecret)
|
||||||
|
}
|
||||||
|
|
||||||
debugger := e.Group("/api/debug")
|
debugger := e.Group("/api/debug")
|
||||||
{
|
{
|
||||||
debugger.Use(session.MustAdmin())
|
debugger.Use(session.MustAdmin())
|
||||||
|
|
46
server/store/datastore/migration/006_secrets_add_user.go
Normal file
46
server/store/datastore/migration/006_secrets_add_user.go
Normal file
|
@ -0,0 +1,46 @@
|
||||||
|
// Copyright 2022 Woodpecker Authors
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
package migration
|
||||||
|
|
||||||
|
import (
|
||||||
|
"xorm.io/xorm"
|
||||||
|
)
|
||||||
|
|
||||||
|
type SecretV006 struct {
|
||||||
|
Owner string `json:"-" xorm:"NOT NULL DEFAULT '' UNIQUE(s) INDEX 'secret_owner'"`
|
||||||
|
RepoID int64 `json:"-" xorm:"NOT NULL DEFAULT 0 UNIQUE(s) INDEX 'secret_repo_id'"`
|
||||||
|
Name string `json:"name" xorm:"NOT NULL UNIQUE(s) INDEX 'secret_name'"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// TableName return database table name for xorm
|
||||||
|
func (SecretV006) TableName() string {
|
||||||
|
return "secrets"
|
||||||
|
}
|
||||||
|
|
||||||
|
var alterTableSecretsAddUserCol = task{
|
||||||
|
name: "alter-table-add-secrets-user-id",
|
||||||
|
fn: func(sess *xorm.Session) error {
|
||||||
|
if err := sess.Sync2(new(SecretV006)); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := alterColumnDefault(sess, "secrets", "secret_repo_id", "0"); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := alterColumnNull(sess, "secrets", "secret_repo_id", false); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return alterColumnNull(sess, "secrets", "secret_name", false)
|
||||||
|
},
|
||||||
|
}
|
|
@ -212,6 +212,42 @@ func dropTableColumns(sess *xorm.Session, tableName string, columnNames ...strin
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func alterColumnDefault(sess *xorm.Session, table, column, defValue string) error {
|
||||||
|
dialect := sess.Engine().Dialect().URI().DBType
|
||||||
|
switch dialect {
|
||||||
|
case schemas.MYSQL:
|
||||||
|
_, err := sess.Exec(fmt.Sprintf("ALTER TABLE `%s` COLUMN `%s` SET DEFAULT %s;", table, column, defValue))
|
||||||
|
return err
|
||||||
|
case schemas.POSTGRES:
|
||||||
|
_, err := sess.Exec(fmt.Sprintf("ALTER TABLE `%s` ALTER COLUMN `%s` SET DEFAULT %s;", table, column, defValue))
|
||||||
|
return err
|
||||||
|
case schemas.SQLITE:
|
||||||
|
return nil
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("dialect '%s' not supported", dialect)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func alterColumnNull(sess *xorm.Session, table, column string, null bool) error {
|
||||||
|
val := "NULL"
|
||||||
|
if !null {
|
||||||
|
val = "NOT NULL"
|
||||||
|
}
|
||||||
|
dialect := sess.Engine().Dialect().URI().DBType
|
||||||
|
switch dialect {
|
||||||
|
case schemas.MYSQL:
|
||||||
|
_, err := sess.Exec(fmt.Sprintf("ALTER TABLE `%s` COLUMN `%s` SET %s;", table, column, val))
|
||||||
|
return err
|
||||||
|
case schemas.POSTGRES:
|
||||||
|
_, err := sess.Exec(fmt.Sprintf("ALTER TABLE `%s` ALTER COLUMN `%s` SET %s;", table, column, val))
|
||||||
|
return err
|
||||||
|
case schemas.SQLITE:
|
||||||
|
return nil
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("dialect '%s' not supported", dialect)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
whitespaces = regexp.MustCompile(`\s+`)
|
whitespaces = regexp.MustCompile(`\s+`)
|
||||||
columnSeparator = regexp.MustCompile(`\s?,\s?`)
|
columnSeparator = regexp.MustCompile(`\s?,\s?`)
|
||||||
|
|
|
@ -34,6 +34,7 @@ var migrationTasks = []*task{
|
||||||
&alterTableReposDropCounter,
|
&alterTableReposDropCounter,
|
||||||
&dropSenders,
|
&dropSenders,
|
||||||
&alterTableLogUpdateColumnLogDataType,
|
&alterTableLogUpdateColumnLogDataType,
|
||||||
|
&alterTableSecretsAddUserCol,
|
||||||
}
|
}
|
||||||
|
|
||||||
var allBeans = []interface{}{
|
var allBeans = []interface{}{
|
||||||
|
|
|
@ -16,6 +16,8 @@ package datastore
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"github.com/woodpecker-ci/woodpecker/server/model"
|
"github.com/woodpecker-ci/woodpecker/server/model"
|
||||||
|
|
||||||
|
"xorm.io/builder"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (s storage) SecretFind(repo *model.Repo, name string) (*model.Secret, error) {
|
func (s storage) SecretFind(repo *model.Repo, name string) (*model.Secret, error) {
|
||||||
|
@ -26,9 +28,14 @@ func (s storage) SecretFind(repo *model.Repo, name string) (*model.Secret, error
|
||||||
return secret, wrapGet(s.engine.Get(secret))
|
return secret, wrapGet(s.engine.Get(secret))
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s storage) SecretList(repo *model.Repo) ([]*model.Secret, error) {
|
func (s storage) SecretList(repo *model.Repo, includeGlobalAndOrgSecrets bool) ([]*model.Secret, error) {
|
||||||
secrets := make([]*model.Secret, 0, perPage)
|
secrets := make([]*model.Secret, 0, perPage)
|
||||||
return secrets, s.engine.Where("secret_repo_id = ?", repo.ID).Find(&secrets)
|
var cond builder.Cond = builder.Eq{"secret_repo_id": repo.ID}
|
||||||
|
if includeGlobalAndOrgSecrets {
|
||||||
|
cond = cond.Or(builder.Eq{"secret_owner": repo.Owner}).
|
||||||
|
Or(builder.And(builder.Eq{"secret_owner": ""}, builder.Eq{"secret_repo_id": 0}))
|
||||||
|
}
|
||||||
|
return secrets, s.engine.Where(cond).Find(&secrets)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s storage) SecretCreate(secret *model.Secret) error {
|
func (s storage) SecretCreate(secret *model.Secret) error {
|
||||||
|
@ -46,3 +53,28 @@ func (s storage) SecretDelete(secret *model.Secret) error {
|
||||||
_, err := s.engine.ID(secret.ID).Delete(new(model.Secret))
|
_, err := s.engine.ID(secret.ID).Delete(new(model.Secret))
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (s storage) OrgSecretFind(owner, name string) (*model.Secret, error) {
|
||||||
|
secret := &model.Secret{
|
||||||
|
Owner: owner,
|
||||||
|
Name: name,
|
||||||
|
}
|
||||||
|
return secret, wrapGet(s.engine.Get(secret))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s storage) OrgSecretList(owner string) ([]*model.Secret, error) {
|
||||||
|
secrets := make([]*model.Secret, 0, perPage)
|
||||||
|
return secrets, s.engine.Where("secret_owner = ?", owner).Find(&secrets)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s storage) GlobalSecretFind(name string) (*model.Secret, error) {
|
||||||
|
secret := &model.Secret{
|
||||||
|
Name: name,
|
||||||
|
}
|
||||||
|
return secret, wrapGet(s.engine.Where(builder.And(builder.Eq{"secret_owner": ""}, builder.Eq{"secret_repo_id": 0})).Get(secret))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s storage) GlobalSecretList() ([]*model.Secret, error) {
|
||||||
|
secrets := make([]*model.Secret, 0, perPage)
|
||||||
|
return secrets, s.engine.Where(builder.And(builder.Eq{"secret_owner": ""}, builder.Eq{"secret_repo_id": 0})).Find(&secrets)
|
||||||
|
}
|
||||||
|
|
|
@ -70,22 +70,24 @@ func TestSecretList(t *testing.T) {
|
||||||
store, closer := newTestStore(t, new(model.Secret))
|
store, closer := newTestStore(t, new(model.Secret))
|
||||||
defer closer()
|
defer closer()
|
||||||
|
|
||||||
assert.NoError(t, store.SecretCreate(&model.Secret{
|
createTestSecrets(t, store)
|
||||||
RepoID: 1,
|
|
||||||
Name: "foo",
|
|
||||||
Value: "bar",
|
|
||||||
}))
|
|
||||||
assert.NoError(t, store.SecretCreate(&model.Secret{
|
|
||||||
RepoID: 1,
|
|
||||||
Name: "baz",
|
|
||||||
Value: "qux",
|
|
||||||
}))
|
|
||||||
|
|
||||||
list, err := store.SecretList(&model.Repo{ID: 1})
|
list, err := store.SecretList(&model.Repo{ID: 1, Owner: "org"}, false)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
assert.Len(t, list, 2)
|
assert.Len(t, list, 2)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestSecretBuildList(t *testing.T) {
|
||||||
|
store, closer := newTestStore(t, new(model.Secret))
|
||||||
|
defer closer()
|
||||||
|
|
||||||
|
createTestSecrets(t, store)
|
||||||
|
|
||||||
|
list, err := store.SecretList(&model.Repo{ID: 1, Owner: "org"}, true)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assert.Len(t, list, 4)
|
||||||
|
}
|
||||||
|
|
||||||
func TestSecretUpdate(t *testing.T) {
|
func TestSecretUpdate(t *testing.T) {
|
||||||
store, closer := newTestStore(t, new(model.Secret))
|
store, closer := newTestStore(t, new(model.Secret))
|
||||||
defer closer()
|
defer closer()
|
||||||
|
@ -162,3 +164,135 @@ func TestSecretIndexes(t *testing.T) {
|
||||||
t.Errorf("Unexpected error: duplicate name")
|
t.Errorf("Unexpected error: duplicate name")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func createTestSecrets(t *testing.T, store *storage) {
|
||||||
|
assert.NoError(t, store.SecretCreate(&model.Secret{
|
||||||
|
Owner: "org",
|
||||||
|
Name: "usr",
|
||||||
|
Value: "sec",
|
||||||
|
}))
|
||||||
|
assert.NoError(t, store.SecretCreate(&model.Secret{
|
||||||
|
RepoID: 1,
|
||||||
|
Name: "foo",
|
||||||
|
Value: "bar",
|
||||||
|
}))
|
||||||
|
assert.NoError(t, store.SecretCreate(&model.Secret{
|
||||||
|
RepoID: 1,
|
||||||
|
Name: "baz",
|
||||||
|
Value: "qux",
|
||||||
|
}))
|
||||||
|
assert.NoError(t, store.SecretCreate(&model.Secret{
|
||||||
|
Name: "global",
|
||||||
|
Value: "val",
|
||||||
|
}))
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestOrgSecretFind(t *testing.T) {
|
||||||
|
store, closer := newTestStore(t, new(model.Secret))
|
||||||
|
defer closer()
|
||||||
|
|
||||||
|
err := store.SecretCreate(&model.Secret{
|
||||||
|
Owner: "org",
|
||||||
|
Name: "password",
|
||||||
|
Value: "correct-horse-battery-staple",
|
||||||
|
Images: []string{"golang", "node"},
|
||||||
|
Events: []model.WebhookEvent{"push", "tag"},
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("Unexpected error: insert secret: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
secret, err := store.OrgSecretFind("org", "password")
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if got, want := secret.Owner, "org"; got != want {
|
||||||
|
t.Errorf("Want owner %s, got %s", want, got)
|
||||||
|
}
|
||||||
|
if got, want := secret.Name, "password"; got != want {
|
||||||
|
t.Errorf("Want secret name %s, got %s", want, got)
|
||||||
|
}
|
||||||
|
if got, want := secret.Value, "correct-horse-battery-staple"; got != want {
|
||||||
|
t.Errorf("Want secret value %s, got %s", want, got)
|
||||||
|
}
|
||||||
|
if got, want := secret.Events[0], model.EventPush; got != want {
|
||||||
|
t.Errorf("Want secret event %s, got %s", want, got)
|
||||||
|
}
|
||||||
|
if got, want := secret.Events[1], model.EventTag; got != want {
|
||||||
|
t.Errorf("Want secret event %s, got %s", want, got)
|
||||||
|
}
|
||||||
|
if got, want := secret.Images[0], "golang"; got != want {
|
||||||
|
t.Errorf("Want secret image %s, got %s", want, got)
|
||||||
|
}
|
||||||
|
if got, want := secret.Images[1], "node"; got != want {
|
||||||
|
t.Errorf("Want secret image %s, got %s", want, got)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestOrgSecretList(t *testing.T) {
|
||||||
|
store, closer := newTestStore(t, new(model.Secret))
|
||||||
|
defer closer()
|
||||||
|
|
||||||
|
createTestSecrets(t, store)
|
||||||
|
|
||||||
|
list, err := store.OrgSecretList("org")
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assert.Len(t, list, 1)
|
||||||
|
|
||||||
|
assert.True(t, list[0].Organization())
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestGlobalSecretFind(t *testing.T) {
|
||||||
|
store, closer := newTestStore(t, new(model.Secret))
|
||||||
|
defer closer()
|
||||||
|
|
||||||
|
err := store.SecretCreate(&model.Secret{
|
||||||
|
Name: "password",
|
||||||
|
Value: "correct-horse-battery-staple",
|
||||||
|
Images: []string{"golang", "node"},
|
||||||
|
Events: []model.WebhookEvent{"push", "tag"},
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("Unexpected error: insert secret: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
secret, err := store.GlobalSecretFind("password")
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if got, want := secret.Name, "password"; got != want {
|
||||||
|
t.Errorf("Want secret name %s, got %s", want, got)
|
||||||
|
}
|
||||||
|
if got, want := secret.Value, "correct-horse-battery-staple"; got != want {
|
||||||
|
t.Errorf("Want secret value %s, got %s", want, got)
|
||||||
|
}
|
||||||
|
if got, want := secret.Events[0], model.EventPush; got != want {
|
||||||
|
t.Errorf("Want secret event %s, got %s", want, got)
|
||||||
|
}
|
||||||
|
if got, want := secret.Events[1], model.EventTag; got != want {
|
||||||
|
t.Errorf("Want secret event %s, got %s", want, got)
|
||||||
|
}
|
||||||
|
if got, want := secret.Images[0], "golang"; got != want {
|
||||||
|
t.Errorf("Want secret image %s, got %s", want, got)
|
||||||
|
}
|
||||||
|
if got, want := secret.Images[1], "node"; got != want {
|
||||||
|
t.Errorf("Want secret image %s, got %s", want, got)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestGlobalSecretList(t *testing.T) {
|
||||||
|
store, closer := newTestStore(t, new(model.Secret))
|
||||||
|
defer closer()
|
||||||
|
|
||||||
|
createTestSecrets(t, store)
|
||||||
|
|
||||||
|
list, err := store.GlobalSecretList()
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assert.Len(t, list, 1)
|
||||||
|
|
||||||
|
assert.True(t, list[0].Global())
|
||||||
|
}
|
||||||
|
|
|
@ -106,10 +106,14 @@ type Store interface {
|
||||||
|
|
||||||
// Secrets
|
// Secrets
|
||||||
SecretFind(*model.Repo, string) (*model.Secret, error)
|
SecretFind(*model.Repo, string) (*model.Secret, error)
|
||||||
SecretList(*model.Repo) ([]*model.Secret, error)
|
SecretList(*model.Repo, bool) ([]*model.Secret, error)
|
||||||
SecretCreate(*model.Secret) error
|
SecretCreate(*model.Secret) error
|
||||||
SecretUpdate(*model.Secret) error
|
SecretUpdate(*model.Secret) error
|
||||||
SecretDelete(*model.Secret) error
|
SecretDelete(*model.Secret) error
|
||||||
|
OrgSecretFind(string, string) (*model.Secret, error)
|
||||||
|
OrgSecretList(string) ([]*model.Secret, error)
|
||||||
|
GlobalSecretFind(string) (*model.Secret, error)
|
||||||
|
GlobalSecretList() ([]*model.Secret, error)
|
||||||
|
|
||||||
// Registrys
|
// Registrys
|
||||||
RegistryFind(*model.Repo, string) (*model.Registry, error)
|
RegistryFind(*model.Repo, string) (*model.Registry, error)
|
||||||
|
|
|
@ -31,7 +31,7 @@
|
||||||
"branches": "Branches",
|
"branches": "Branches",
|
||||||
"add": "Add repository",
|
"add": "Add repository",
|
||||||
"user_none": "This organization / user does not have any projects yet.",
|
"user_none": "This organization / user does not have any projects yet.",
|
||||||
"not_allowed": "Not allowed to access this repository",
|
"not_allowed": "You are not allowed to access this repository",
|
||||||
|
|
||||||
"enable": {
|
"enable": {
|
||||||
"reload": "Reload repositories",
|
"reload": "Reload repositories",
|
||||||
|
@ -43,7 +43,7 @@
|
||||||
|
|
||||||
"settings": {
|
"settings": {
|
||||||
"settings": "Settings",
|
"settings": "Settings",
|
||||||
"not_allowed": "Not allowed to access this repository's settings",
|
"not_allowed": "You are not allowed to access this repository's settings",
|
||||||
|
|
||||||
"general": {
|
"general": {
|
||||||
"general": "General",
|
"general": "General",
|
||||||
|
@ -205,6 +205,67 @@
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
|
||||||
|
"org": {
|
||||||
|
"settings": {
|
||||||
|
"settings": "Settings",
|
||||||
|
"not_allowed": "You are not allowed to access this organization's settings",
|
||||||
|
|
||||||
|
"secrets": {
|
||||||
|
"secrets": "Secrets",
|
||||||
|
"desc": "Organization secrets can be passed to all organization's repository individual pipeline steps at runtime as environmental variables.",
|
||||||
|
"none": "There are no organization secrets yet.",
|
||||||
|
"add": "Add secret",
|
||||||
|
"save": "Save secret",
|
||||||
|
"show": "Show secrets",
|
||||||
|
"name": "Name",
|
||||||
|
"value": "Value",
|
||||||
|
"deleted": "Organization secret deleted",
|
||||||
|
"created": "Organization secret created",
|
||||||
|
"saved": "Organization secret saved",
|
||||||
|
|
||||||
|
"images": {
|
||||||
|
"images": "Available for following images",
|
||||||
|
"desc": "Comma separated list of images where this secret is available, leave empty to allow all images"
|
||||||
|
},
|
||||||
|
"events": {
|
||||||
|
"events": "Available at following events",
|
||||||
|
"pr_warning": "Please be careful with this option as a bad actor can submit a malicious pull request that exposes your secrets."
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
"admin": {
|
||||||
|
"settings": {
|
||||||
|
"settings": "Settings",
|
||||||
|
"not_allowed": "You are not allowed to access server settings",
|
||||||
|
|
||||||
|
"secrets": {
|
||||||
|
"secrets": "Secrets",
|
||||||
|
"desc": "Global secrets can be passed to all repositories individual pipeline steps at runtime as environmental variables.",
|
||||||
|
"warning": "These secrets will be available for all server users.",
|
||||||
|
"none": "There are no global secrets yet.",
|
||||||
|
"add": "Add secret",
|
||||||
|
"save": "Save secret",
|
||||||
|
"show": "Show secrets",
|
||||||
|
"name": "Name",
|
||||||
|
"value": "Value",
|
||||||
|
"deleted": "Global secret deleted",
|
||||||
|
"created": "Global secret created",
|
||||||
|
"saved": "Global secret saved",
|
||||||
|
|
||||||
|
"images": {
|
||||||
|
"images": "Available for following images",
|
||||||
|
"desc": "Comma separated list of images where this secret is available, leave empty to allow all images"
|
||||||
|
},
|
||||||
|
"events": {
|
||||||
|
"events": "Available at following events",
|
||||||
|
"pr_warning": "Please be careful with this option as a bad actor can submit a malicious pull request that exposes your secrets."
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
"user": {
|
"user": {
|
||||||
"oauth_error": "Error while authenticating against OAuth provider",
|
"oauth_error": "Error while authenticating against OAuth provider",
|
||||||
"internal_error": "Some internal error occurred",
|
"internal_error": "Some internal error occurred",
|
||||||
|
|
|
@ -205,6 +205,67 @@
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
|
||||||
|
"org": {
|
||||||
|
"settings": {
|
||||||
|
"settings": "Iestatījumi",
|
||||||
|
"not_allowed": "Nav piekļuves šīs organizācijas iestatījumiem",
|
||||||
|
|
||||||
|
"secrets": {
|
||||||
|
"secrets": "Noslēpumi",
|
||||||
|
"desc": "Noslēpumus var padot visu organizācijas repozitoriju individuāliem konvejerdarba soļiem izpildes laikā kā vides mainīgos.",
|
||||||
|
"none": "Pagaidām nav neviena organizācijas noslēpuma.",
|
||||||
|
"add": "Pievienot noslēpumu",
|
||||||
|
"save": "Saglabāt noslēpumu",
|
||||||
|
"show": "Noslēpumu saraksts",
|
||||||
|
"name": "Nosaukums",
|
||||||
|
"value": "Vērtība",
|
||||||
|
"deleted": "Organizācijas noslēpums dzēsts",
|
||||||
|
"created": "Organizācijas noslēpums izveidots",
|
||||||
|
"saved": "Organizācijas noslēpums saglabāts",
|
||||||
|
|
||||||
|
"images": {
|
||||||
|
"images": "Pieejami šādiem attēliem",
|
||||||
|
"desc": "Ar komatiem atdalīts saraksts ar attēliem, kam šis noslēpums būs pieejams, atstājot tukšu, tas būs pieejams visiem attēliem."
|
||||||
|
},
|
||||||
|
"events": {
|
||||||
|
"events": "Pieejams šādiem notikumiem",
|
||||||
|
"pr_warning": "Uzmanieties, jo šādā veidā tas būs pieejams visiem cilvēkiem, kas var iesūtīt izmaiņu pieprasījumu!"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
"admin": {
|
||||||
|
"settings": {
|
||||||
|
"settings": "Iestatījumi",
|
||||||
|
"not_allowed": "Nav piekļuves servera iestatījumiem",
|
||||||
|
|
||||||
|
"secrets": {
|
||||||
|
"secrets": "Noslēpumi",
|
||||||
|
"desc": "Noslēpumus var padot visu repozitoriju individuāliem konvejerdarba soļiem izpildes laikā kā vides mainīgos.",
|
||||||
|
"warning": "Šie noslēpumi būs pieejami visiem servera lietotājiem.",
|
||||||
|
"none": "Pagaidām nav neviena globālā noslēpuma.",
|
||||||
|
"add": "Pievienot noslēpumu",
|
||||||
|
"save": "Saglabāt noslēpumu",
|
||||||
|
"show": "Noslēpumu saraksts",
|
||||||
|
"name": "Nosaukums",
|
||||||
|
"value": "Vērtība",
|
||||||
|
"deleted": "Globālais noslēpums dzēsts",
|
||||||
|
"created": "Globālais noslēpums izveidots",
|
||||||
|
"saved": "Globālais noslēpums saglabāts",
|
||||||
|
|
||||||
|
"images": {
|
||||||
|
"images": "Pieejami šādiem attēliem",
|
||||||
|
"desc": "Ar komatiem atdalīts saraksts ar attēliem, kam šis noslēpums būs pieejams, atstājot tukšu, tas būs pieejams visiem attēliem."
|
||||||
|
},
|
||||||
|
"events": {
|
||||||
|
"events": "Pieejams šādiem notikumiem",
|
||||||
|
"pr_warning": "Uzmanieties, jo šādā veidā tas būs pieejams visiem cilvēkiem, kas var iesūtīt izmaiņu pieprasījumu!"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
"user": {
|
"user": {
|
||||||
"oauth_error": "Neizdevās autorizēties, izmantojot, OAuth piegādātāju",
|
"oauth_error": "Neizdevās autorizēties, izmantojot, OAuth piegādātāju",
|
||||||
"internal_error": "Notikusi sistēmas iekšējā kļūda",
|
"internal_error": "Notikusi sistēmas iekšējā kļūda",
|
||||||
|
|
143
web/src/components/admin/settings/AdminSecretsTab.vue
Normal file
143
web/src/components/admin/settings/AdminSecretsTab.vue
Normal file
|
@ -0,0 +1,143 @@
|
||||||
|
<template>
|
||||||
|
<Panel>
|
||||||
|
<div class="flex flex-row border-b mb-4 pb-4 items-center dark:border-gray-600">
|
||||||
|
<div class="ml-2">
|
||||||
|
<h1 class="text-xl text-color">{{ $t('admin.settings.secrets.secrets') }}</h1>
|
||||||
|
<p class="text-sm text-color-alt">
|
||||||
|
{{ $t('admin.settings.secrets.desc') }}
|
||||||
|
<DocsLink url="docs/usage/secrets" />
|
||||||
|
</p>
|
||||||
|
<Warning :text="$t('admin.settings.secrets.warning')" />
|
||||||
|
</div>
|
||||||
|
<Button
|
||||||
|
v-if="selectedSecret"
|
||||||
|
class="ml-auto"
|
||||||
|
:text="$t('admin.settings.secrets.show')"
|
||||||
|
start-icon="back"
|
||||||
|
@click="selectedSecret = undefined"
|
||||||
|
/>
|
||||||
|
<Button
|
||||||
|
v-else
|
||||||
|
class="ml-auto"
|
||||||
|
:text="$t('admin.settings.secrets.add')"
|
||||||
|
start-icon="plus"
|
||||||
|
@click="showAddSecret"
|
||||||
|
/>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<SecretList
|
||||||
|
v-if="!selectedSecret"
|
||||||
|
v-model="secrets"
|
||||||
|
i18n-prefix="admin.settings.secrets."
|
||||||
|
:is-deleting="isDeleting"
|
||||||
|
@edit="editSecret"
|
||||||
|
@delete="deleteSecret"
|
||||||
|
/>
|
||||||
|
|
||||||
|
<SecretEdit
|
||||||
|
v-else
|
||||||
|
v-model="selectedSecret"
|
||||||
|
i18n-prefix="admin.settings.secrets."
|
||||||
|
:is-saving="isSaving"
|
||||||
|
@save="createSecret"
|
||||||
|
/>
|
||||||
|
</Panel>
|
||||||
|
</template>
|
||||||
|
|
||||||
|
<script lang="ts">
|
||||||
|
import { cloneDeep } from 'lodash';
|
||||||
|
import { computed, defineComponent, onMounted, ref } from 'vue';
|
||||||
|
import { useI18n } from 'vue-i18n';
|
||||||
|
|
||||||
|
import Button from '~/components/atomic/Button.vue';
|
||||||
|
import DocsLink from '~/components/atomic/DocsLink.vue';
|
||||||
|
import Warning from '~/components/atomic/Warning.vue';
|
||||||
|
import Panel from '~/components/layout/Panel.vue';
|
||||||
|
import SecretEdit from '~/components/secrets/SecretEdit.vue';
|
||||||
|
import SecretList from '~/components/secrets/SecretList.vue';
|
||||||
|
import useApiClient from '~/compositions/useApiClient';
|
||||||
|
import { useAsyncAction } from '~/compositions/useAsyncAction';
|
||||||
|
import useNotifications from '~/compositions/useNotifications';
|
||||||
|
import { Secret, WebhookEvents } from '~/lib/api/types';
|
||||||
|
|
||||||
|
const emptySecret = {
|
||||||
|
name: '',
|
||||||
|
value: '',
|
||||||
|
image: [],
|
||||||
|
event: [WebhookEvents.Push],
|
||||||
|
};
|
||||||
|
|
||||||
|
export default defineComponent({
|
||||||
|
name: 'AdminSecretsTab',
|
||||||
|
|
||||||
|
components: {
|
||||||
|
Button,
|
||||||
|
Panel,
|
||||||
|
DocsLink,
|
||||||
|
SecretList,
|
||||||
|
SecretEdit,
|
||||||
|
Warning,
|
||||||
|
},
|
||||||
|
|
||||||
|
setup() {
|
||||||
|
const apiClient = useApiClient();
|
||||||
|
const notifications = useNotifications();
|
||||||
|
const i18n = useI18n();
|
||||||
|
|
||||||
|
const secrets = ref<Secret[]>([]);
|
||||||
|
const selectedSecret = ref<Partial<Secret>>();
|
||||||
|
const isEditingSecret = computed(() => !!selectedSecret.value?.id);
|
||||||
|
|
||||||
|
async function loadSecrets() {
|
||||||
|
secrets.value = await apiClient.getGlobalSecretList();
|
||||||
|
}
|
||||||
|
|
||||||
|
const { doSubmit: createSecret, isLoading: isSaving } = useAsyncAction(async () => {
|
||||||
|
if (!selectedSecret.value) {
|
||||||
|
throw new Error("Unexpected: Can't get secret");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isEditingSecret.value) {
|
||||||
|
await apiClient.updateGlobalSecret(selectedSecret.value);
|
||||||
|
} else {
|
||||||
|
await apiClient.createGlobalSecret(selectedSecret.value);
|
||||||
|
}
|
||||||
|
notifications.notify({
|
||||||
|
title: i18n.t(isEditingSecret.value ? 'admin.settings.secrets.saved' : 'admin.settings.secrets.created'),
|
||||||
|
type: 'success',
|
||||||
|
});
|
||||||
|
selectedSecret.value = undefined;
|
||||||
|
await loadSecrets();
|
||||||
|
});
|
||||||
|
|
||||||
|
const { doSubmit: deleteSecret, isLoading: isDeleting } = useAsyncAction(async (_secret: Secret) => {
|
||||||
|
await apiClient.deleteGlobalSecret(_secret.name);
|
||||||
|
notifications.notify({ title: i18n.t('admin.settings.secrets.deleted'), type: 'success' });
|
||||||
|
await loadSecrets();
|
||||||
|
});
|
||||||
|
|
||||||
|
function editSecret(secret: Secret) {
|
||||||
|
selectedSecret.value = cloneDeep(secret);
|
||||||
|
}
|
||||||
|
|
||||||
|
function showAddSecret() {
|
||||||
|
selectedSecret.value = cloneDeep(emptySecret);
|
||||||
|
}
|
||||||
|
|
||||||
|
onMounted(async () => {
|
||||||
|
await loadSecrets();
|
||||||
|
});
|
||||||
|
|
||||||
|
return {
|
||||||
|
selectedSecret,
|
||||||
|
secrets,
|
||||||
|
isDeleting,
|
||||||
|
isSaving,
|
||||||
|
showAddSecret,
|
||||||
|
createSecret,
|
||||||
|
editSecret,
|
||||||
|
deleteSecret,
|
||||||
|
};
|
||||||
|
},
|
||||||
|
});
|
||||||
|
</script>
|
22
web/src/components/atomic/Warning.vue
Normal file
22
web/src/components/atomic/Warning.vue
Normal file
|
@ -0,0 +1,22 @@
|
||||||
|
<template>
|
||||||
|
<div
|
||||||
|
class="text-sm text-gray-600 font-bold rounded-md border border-solid p-2 border-yellow-500 bg-yellow-200 dark:bg-yellow-600 dark:border-yellow-800 dark:text-light-100"
|
||||||
|
>
|
||||||
|
⚠ {{ text }}
|
||||||
|
</div>
|
||||||
|
</template>
|
||||||
|
|
||||||
|
<script lang="ts">
|
||||||
|
import { defineComponent } from 'vue';
|
||||||
|
|
||||||
|
export default defineComponent({
|
||||||
|
name: 'Warning',
|
||||||
|
|
||||||
|
props: {
|
||||||
|
text: {
|
||||||
|
type: String,
|
||||||
|
required: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
});
|
||||||
|
</script>
|
|
@ -26,6 +26,12 @@
|
||||||
class="!text-white !dark:text-gray-500"
|
class="!text-white !dark:text-gray-500"
|
||||||
@click="darkMode = !darkMode"
|
@click="darkMode = !darkMode"
|
||||||
/>
|
/>
|
||||||
|
<IconButton
|
||||||
|
v-if="user?.admin"
|
||||||
|
icon="settings"
|
||||||
|
class="!text-white !dark:text-gray-500"
|
||||||
|
:to="{ name: 'admin-settings' }"
|
||||||
|
/>
|
||||||
<router-link v-if="user" :to="{ name: 'user' }">
|
<router-link v-if="user" :to="{ name: 'user' }">
|
||||||
<img v-if="user && user.avatar_url" class="w-8" :src="`${user.avatar_url}`" />
|
<img v-if="user && user.avatar_url" class="w-8" :src="`${user.avatar_url}`" />
|
||||||
</router-link>
|
</router-link>
|
||||||
|
|
147
web/src/components/org/settings/OrgSecretsTab.vue
Normal file
147
web/src/components/org/settings/OrgSecretsTab.vue
Normal file
|
@ -0,0 +1,147 @@
|
||||||
|
<template>
|
||||||
|
<Panel>
|
||||||
|
<div class="flex flex-row border-b mb-4 pb-4 items-center dark:border-gray-600">
|
||||||
|
<div class="ml-2">
|
||||||
|
<h1 class="text-xl text-color">{{ $t('org.settings.secrets.secrets') }}</h1>
|
||||||
|
<p class="text-sm text-color-alt">
|
||||||
|
{{ $t('org.settings.secrets.desc') }}
|
||||||
|
<DocsLink url="docs/usage/secrets" />
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<Button
|
||||||
|
v-if="selectedSecret"
|
||||||
|
class="ml-auto"
|
||||||
|
:text="$t('org.settings.secrets.show')"
|
||||||
|
start-icon="back"
|
||||||
|
@click="selectedSecret = undefined"
|
||||||
|
/>
|
||||||
|
<Button v-else class="ml-auto" :text="$t('org.settings.secrets.add')" start-icon="plus" @click="showAddSecret" />
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<SecretList
|
||||||
|
v-if="!selectedSecret"
|
||||||
|
v-model="secrets"
|
||||||
|
i18n-prefix="org.settings.secrets."
|
||||||
|
:is-deleting="isDeleting"
|
||||||
|
@edit="editSecret"
|
||||||
|
@delete="deleteSecret"
|
||||||
|
/>
|
||||||
|
|
||||||
|
<SecretEdit
|
||||||
|
v-else
|
||||||
|
v-model="selectedSecret"
|
||||||
|
i18n-prefix="org.settings.secrets."
|
||||||
|
:is-saving="isSaving"
|
||||||
|
@save="createSecret"
|
||||||
|
/>
|
||||||
|
</Panel>
|
||||||
|
</template>
|
||||||
|
|
||||||
|
<script lang="ts">
|
||||||
|
import { cloneDeep } from 'lodash';
|
||||||
|
import { computed, defineComponent, inject, onMounted, Ref, ref } from 'vue';
|
||||||
|
import { useI18n } from 'vue-i18n';
|
||||||
|
|
||||||
|
import Button from '~/components/atomic/Button.vue';
|
||||||
|
import DocsLink from '~/components/atomic/DocsLink.vue';
|
||||||
|
import Panel from '~/components/layout/Panel.vue';
|
||||||
|
import SecretEdit from '~/components/secrets/SecretEdit.vue';
|
||||||
|
import SecretList from '~/components/secrets/SecretList.vue';
|
||||||
|
import useApiClient from '~/compositions/useApiClient';
|
||||||
|
import { useAsyncAction } from '~/compositions/useAsyncAction';
|
||||||
|
import useNotifications from '~/compositions/useNotifications';
|
||||||
|
import { Org, Secret, WebhookEvents } from '~/lib/api/types';
|
||||||
|
|
||||||
|
const emptySecret = {
|
||||||
|
name: '',
|
||||||
|
value: '',
|
||||||
|
image: [],
|
||||||
|
event: [WebhookEvents.Push],
|
||||||
|
};
|
||||||
|
|
||||||
|
export default defineComponent({
|
||||||
|
name: 'OrgSecretsTab',
|
||||||
|
|
||||||
|
components: {
|
||||||
|
Button,
|
||||||
|
Panel,
|
||||||
|
DocsLink,
|
||||||
|
SecretList,
|
||||||
|
SecretEdit,
|
||||||
|
},
|
||||||
|
|
||||||
|
setup() {
|
||||||
|
const apiClient = useApiClient();
|
||||||
|
const notifications = useNotifications();
|
||||||
|
const i18n = useI18n();
|
||||||
|
|
||||||
|
const org = inject<Ref<Org>>('org');
|
||||||
|
const secrets = ref<Secret[]>([]);
|
||||||
|
const selectedSecret = ref<Partial<Secret>>();
|
||||||
|
const isEditingSecret = computed(() => !!selectedSecret.value?.id);
|
||||||
|
|
||||||
|
async function loadSecrets() {
|
||||||
|
if (!org?.value) {
|
||||||
|
throw new Error("Unexpected: Can't load org");
|
||||||
|
}
|
||||||
|
|
||||||
|
secrets.value = await apiClient.getOrgSecretList(org.value.name);
|
||||||
|
}
|
||||||
|
|
||||||
|
const { doSubmit: createSecret, isLoading: isSaving } = useAsyncAction(async () => {
|
||||||
|
if (!org?.value) {
|
||||||
|
throw new Error("Unexpected: Can't load org");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!selectedSecret.value) {
|
||||||
|
throw new Error("Unexpected: Can't get secret");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isEditingSecret.value) {
|
||||||
|
await apiClient.updateOrgSecret(org.value.name, selectedSecret.value);
|
||||||
|
} else {
|
||||||
|
await apiClient.createOrgSecret(org.value.name, selectedSecret.value);
|
||||||
|
}
|
||||||
|
notifications.notify({
|
||||||
|
title: i18n.t(isEditingSecret.value ? 'org.settings.secrets.saved' : 'org.settings.secrets.created'),
|
||||||
|
type: 'success',
|
||||||
|
});
|
||||||
|
selectedSecret.value = undefined;
|
||||||
|
await loadSecrets();
|
||||||
|
});
|
||||||
|
|
||||||
|
const { doSubmit: deleteSecret, isLoading: isDeleting } = useAsyncAction(async (_secret: Secret) => {
|
||||||
|
if (!org?.value) {
|
||||||
|
throw new Error("Unexpected: Can't load org");
|
||||||
|
}
|
||||||
|
|
||||||
|
await apiClient.deleteOrgSecret(org.value.name, _secret.name);
|
||||||
|
notifications.notify({ title: i18n.t('org.settings.secrets.deleted'), type: 'success' });
|
||||||
|
await loadSecrets();
|
||||||
|
});
|
||||||
|
|
||||||
|
function editSecret(secret: Secret) {
|
||||||
|
selectedSecret.value = cloneDeep(secret);
|
||||||
|
}
|
||||||
|
|
||||||
|
function showAddSecret() {
|
||||||
|
selectedSecret.value = cloneDeep(emptySecret);
|
||||||
|
}
|
||||||
|
|
||||||
|
onMounted(async () => {
|
||||||
|
await loadSecrets();
|
||||||
|
});
|
||||||
|
|
||||||
|
return {
|
||||||
|
selectedSecret,
|
||||||
|
secrets,
|
||||||
|
isDeleting,
|
||||||
|
isSaving,
|
||||||
|
showAddSecret,
|
||||||
|
createSecret,
|
||||||
|
editSecret,
|
||||||
|
deleteSecret,
|
||||||
|
};
|
||||||
|
},
|
||||||
|
});
|
||||||
|
</script>
|
|
@ -18,64 +18,22 @@
|
||||||
<Button v-else class="ml-auto" :text="$t('repo.settings.secrets.add')" start-icon="plus" @click="showAddSecret" />
|
<Button v-else class="ml-auto" :text="$t('repo.settings.secrets.add')" start-icon="plus" @click="showAddSecret" />
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div v-if="!selectedSecret" class="space-y-4 text-color">
|
<SecretList
|
||||||
<ListItem v-for="secret in secrets" :key="secret.id" class="items-center">
|
v-if="!selectedSecret"
|
||||||
<span>{{ secret.name }}</span>
|
v-model="secrets"
|
||||||
<div class="ml-auto">
|
i18n-prefix="repo.settings.secrets."
|
||||||
<span
|
:is-deleting="isDeleting"
|
||||||
v-for="event in secret.event"
|
@edit="editSecret"
|
||||||
:key="event"
|
@delete="deleteSecret"
|
||||||
class="bg-gray-500 dark:bg-dark-700 dark:text-gray-400 text-white rounded-md mx-1 py-1 px-2 text-sm"
|
|
||||||
>{{ event }}</span
|
|
||||||
>
|
|
||||||
</div>
|
|
||||||
<IconButton icon="edit" class="ml-2 w-8 h-8" @click="selectedSecret = secret" />
|
|
||||||
<IconButton
|
|
||||||
icon="trash"
|
|
||||||
class="ml-2 w-8 h-8 hover:text-red-400 hover:dark:text-red-500"
|
|
||||||
:is-loading="isDeleting"
|
|
||||||
@click="deleteSecret(secret)"
|
|
||||||
/>
|
/>
|
||||||
</ListItem>
|
|
||||||
|
|
||||||
<div v-if="secrets?.length === 0" class="ml-2">{{ $t('repo.settings.secrets.none') }}</div>
|
<SecretEdit
|
||||||
</div>
|
v-else
|
||||||
|
v-model="selectedSecret"
|
||||||
<div v-else class="space-y-4">
|
i18n-prefix="repo.settings.secrets."
|
||||||
<form @submit.prevent="createSecret">
|
:is-saving="isSaving"
|
||||||
<InputField :label="$t('repo.settings.secrets.name')">
|
@save="createSecret"
|
||||||
<TextField
|
|
||||||
v-model="selectedSecret.name"
|
|
||||||
:placeholder="$t('repo.settings.secrets.name')"
|
|
||||||
required
|
|
||||||
:disabled="isEditingSecret"
|
|
||||||
/>
|
/>
|
||||||
</InputField>
|
|
||||||
|
|
||||||
<InputField :label="$t('repo.settings.secrets.value')">
|
|
||||||
<TextField
|
|
||||||
v-model="selectedSecret.value"
|
|
||||||
:placeholder="$t('repo.settings.secrets.value')"
|
|
||||||
:lines="5"
|
|
||||||
required
|
|
||||||
/>
|
|
||||||
</InputField>
|
|
||||||
|
|
||||||
<InputField :label="$t('repo.settings.secrets.images.images')">
|
|
||||||
<TextField v-model="images" :placeholder="$t('repo.settings.secrets.images.desc')" />
|
|
||||||
</InputField>
|
|
||||||
|
|
||||||
<InputField :label="$t('repo.settings.secrets.events.events')">
|
|
||||||
<CheckboxesField v-model="selectedSecret.event" :options="secretEventsOptions" />
|
|
||||||
</InputField>
|
|
||||||
|
|
||||||
<Button
|
|
||||||
:is-loading="isSaving"
|
|
||||||
type="submit"
|
|
||||||
:text="isEditingSecret ? $t('repo.settings.secrets.save') : $t('repo.settings.secrets.add')"
|
|
||||||
/>
|
|
||||||
</form>
|
|
||||||
</div>
|
|
||||||
</Panel>
|
</Panel>
|
||||||
</template>
|
</template>
|
||||||
|
|
||||||
|
@ -86,13 +44,9 @@ import { useI18n } from 'vue-i18n';
|
||||||
|
|
||||||
import Button from '~/components/atomic/Button.vue';
|
import Button from '~/components/atomic/Button.vue';
|
||||||
import DocsLink from '~/components/atomic/DocsLink.vue';
|
import DocsLink from '~/components/atomic/DocsLink.vue';
|
||||||
import IconButton from '~/components/atomic/IconButton.vue';
|
|
||||||
import ListItem from '~/components/atomic/ListItem.vue';
|
|
||||||
import CheckboxesField from '~/components/form/CheckboxesField.vue';
|
|
||||||
import { CheckboxOption } from '~/components/form/form.types';
|
|
||||||
import InputField from '~/components/form/InputField.vue';
|
|
||||||
import TextField from '~/components/form/TextField.vue';
|
|
||||||
import Panel from '~/components/layout/Panel.vue';
|
import Panel from '~/components/layout/Panel.vue';
|
||||||
|
import SecretEdit from '~/components/secrets/SecretEdit.vue';
|
||||||
|
import SecretList from '~/components/secrets/SecretList.vue';
|
||||||
import useApiClient from '~/compositions/useApiClient';
|
import useApiClient from '~/compositions/useApiClient';
|
||||||
import { useAsyncAction } from '~/compositions/useAsyncAction';
|
import { useAsyncAction } from '~/compositions/useAsyncAction';
|
||||||
import useNotifications from '~/compositions/useNotifications';
|
import useNotifications from '~/compositions/useNotifications';
|
||||||
|
@ -111,12 +65,9 @@ export default defineComponent({
|
||||||
components: {
|
components: {
|
||||||
Button,
|
Button,
|
||||||
Panel,
|
Panel,
|
||||||
ListItem,
|
|
||||||
IconButton,
|
|
||||||
InputField,
|
|
||||||
TextField,
|
|
||||||
DocsLink,
|
DocsLink,
|
||||||
CheckboxesField,
|
SecretList,
|
||||||
|
SecretEdit,
|
||||||
},
|
},
|
||||||
|
|
||||||
setup() {
|
setup() {
|
||||||
|
@ -125,22 +76,9 @@ export default defineComponent({
|
||||||
const i18n = useI18n();
|
const i18n = useI18n();
|
||||||
|
|
||||||
const repo = inject<Ref<Repo>>('repo');
|
const repo = inject<Ref<Repo>>('repo');
|
||||||
const secrets = ref<Secret[]>();
|
const secrets = ref<Secret[]>([]);
|
||||||
const selectedSecret = ref<Partial<Secret>>();
|
const selectedSecret = ref<Partial<Secret>>();
|
||||||
const isEditingSecret = computed(() => !!selectedSecret.value?.id);
|
const isEditingSecret = computed(() => !!selectedSecret.value?.id);
|
||||||
const images = computed<string>({
|
|
||||||
get() {
|
|
||||||
return selectedSecret.value?.image?.join(',') || '';
|
|
||||||
},
|
|
||||||
set(value) {
|
|
||||||
if (selectedSecret.value) {
|
|
||||||
selectedSecret.value.image = value
|
|
||||||
.split(',')
|
|
||||||
.map((s) => s.trim())
|
|
||||||
.filter((s) => s !== '');
|
|
||||||
}
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
async function loadSecrets() {
|
async function loadSecrets() {
|
||||||
if (!repo?.value) {
|
if (!repo?.value) {
|
||||||
|
@ -182,6 +120,10 @@ export default defineComponent({
|
||||||
await loadSecrets();
|
await loadSecrets();
|
||||||
});
|
});
|
||||||
|
|
||||||
|
function editSecret(secret: Secret) {
|
||||||
|
selectedSecret.value = cloneDeep(secret);
|
||||||
|
}
|
||||||
|
|
||||||
function showAddSecret() {
|
function showAddSecret() {
|
||||||
selectedSecret.value = cloneDeep(emptySecret);
|
selectedSecret.value = cloneDeep(emptySecret);
|
||||||
}
|
}
|
||||||
|
@ -190,27 +132,14 @@ export default defineComponent({
|
||||||
await loadSecrets();
|
await loadSecrets();
|
||||||
});
|
});
|
||||||
|
|
||||||
const secretEventsOptions: CheckboxOption[] = [
|
|
||||||
{ value: WebhookEvents.Push, text: i18n.t('repo.build.event.push') },
|
|
||||||
{ value: WebhookEvents.Tag, text: i18n.t('repo.build.event.tag') },
|
|
||||||
{
|
|
||||||
value: WebhookEvents.PullRequest,
|
|
||||||
text: i18n.t('repo.build.event.pr'),
|
|
||||||
description: i18n.t('repo.settings.secrets.events.pr_warning'),
|
|
||||||
},
|
|
||||||
{ value: WebhookEvents.Deploy, text: i18n.t('repo.build.event.deploy') },
|
|
||||||
];
|
|
||||||
|
|
||||||
return {
|
return {
|
||||||
secretEventsOptions,
|
|
||||||
selectedSecret,
|
selectedSecret,
|
||||||
secrets,
|
secrets,
|
||||||
images,
|
|
||||||
isEditingSecret,
|
|
||||||
isSaving,
|
|
||||||
isDeleting,
|
isDeleting,
|
||||||
|
isSaving,
|
||||||
showAddSecret,
|
showAddSecret,
|
||||||
createSecret,
|
createSecret,
|
||||||
|
editSecret,
|
||||||
deleteSecret,
|
deleteSecret,
|
||||||
};
|
};
|
||||||
},
|
},
|
||||||
|
|
132
web/src/components/secrets/SecretEdit.vue
Normal file
132
web/src/components/secrets/SecretEdit.vue
Normal file
|
@ -0,0 +1,132 @@
|
||||||
|
<template>
|
||||||
|
<div v-if="innerValue" class="space-y-4">
|
||||||
|
<form @submit.prevent="save">
|
||||||
|
<InputField :label="$t(i18nPrefix + 'name')">
|
||||||
|
<TextField
|
||||||
|
v-model="innerValue.name"
|
||||||
|
:placeholder="$t(i18nPrefix + 'name')"
|
||||||
|
required
|
||||||
|
:disabled="isEditingSecret"
|
||||||
|
/>
|
||||||
|
</InputField>
|
||||||
|
|
||||||
|
<InputField :label="$t(i18nPrefix + 'value')">
|
||||||
|
<TextField v-model="innerValue.value" :placeholder="$t(i18nPrefix + 'value')" :lines="5" required />
|
||||||
|
</InputField>
|
||||||
|
|
||||||
|
<InputField :label="$t(i18nPrefix + 'images.images')">
|
||||||
|
<TextField v-model="images" :placeholder="$t(i18nPrefix + 'images.desc')" />
|
||||||
|
</InputField>
|
||||||
|
|
||||||
|
<InputField :label="$t(i18nPrefix + 'events.events')">
|
||||||
|
<CheckboxesField v-model="innerValue.event" :options="secretEventsOptions" />
|
||||||
|
</InputField>
|
||||||
|
|
||||||
|
<Button
|
||||||
|
:is-loading="isSaving"
|
||||||
|
type="submit"
|
||||||
|
:text="isEditingSecret ? $t(i18nPrefix + 'save') : $t(i18nPrefix + 'add')"
|
||||||
|
/>
|
||||||
|
</form>
|
||||||
|
</div>
|
||||||
|
</template>
|
||||||
|
|
||||||
|
<script lang="ts">
|
||||||
|
import { computed, defineComponent, PropType, toRef } from 'vue';
|
||||||
|
import { useI18n } from 'vue-i18n';
|
||||||
|
|
||||||
|
import Button from '~/components/atomic/Button.vue';
|
||||||
|
import CheckboxesField from '~/components/form/CheckboxesField.vue';
|
||||||
|
import { CheckboxOption } from '~/components/form/form.types';
|
||||||
|
import InputField from '~/components/form/InputField.vue';
|
||||||
|
import TextField from '~/components/form/TextField.vue';
|
||||||
|
import { Secret, WebhookEvents } from '~/lib/api/types';
|
||||||
|
|
||||||
|
export default defineComponent({
|
||||||
|
name: 'SecretEdit',
|
||||||
|
|
||||||
|
components: {
|
||||||
|
Button,
|
||||||
|
InputField,
|
||||||
|
TextField,
|
||||||
|
CheckboxesField,
|
||||||
|
},
|
||||||
|
|
||||||
|
props: {
|
||||||
|
// used by toRef
|
||||||
|
// eslint-disable-next-line vue/no-unused-properties
|
||||||
|
modelValue: {
|
||||||
|
type: Object as PropType<Partial<Secret>>,
|
||||||
|
default: undefined,
|
||||||
|
},
|
||||||
|
|
||||||
|
isSaving: {
|
||||||
|
type: Boolean,
|
||||||
|
},
|
||||||
|
|
||||||
|
i18nPrefix: {
|
||||||
|
type: String,
|
||||||
|
required: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
|
||||||
|
emits: {
|
||||||
|
// eslint-disable-next-line @typescript-eslint/no-unused-vars
|
||||||
|
'update:modelValue': (_value: Partial<Secret> | undefined): boolean => true,
|
||||||
|
// eslint-disable-next-line @typescript-eslint/no-unused-vars
|
||||||
|
save: (_value: Partial<Secret>): boolean => true,
|
||||||
|
},
|
||||||
|
|
||||||
|
setup: (props, ctx) => {
|
||||||
|
const i18n = useI18n();
|
||||||
|
|
||||||
|
const modelValue = toRef(props, 'modelValue');
|
||||||
|
const innerValue = computed({
|
||||||
|
get: () => modelValue.value,
|
||||||
|
set: (value) => {
|
||||||
|
ctx.emit('update:modelValue', value);
|
||||||
|
},
|
||||||
|
});
|
||||||
|
const images = computed<string>({
|
||||||
|
get() {
|
||||||
|
return innerValue.value?.image?.join(',') || '';
|
||||||
|
},
|
||||||
|
set(value) {
|
||||||
|
if (innerValue.value) {
|
||||||
|
innerValue.value.image = value
|
||||||
|
.split(',')
|
||||||
|
.map((s) => s.trim())
|
||||||
|
.filter((s) => s !== '');
|
||||||
|
}
|
||||||
|
},
|
||||||
|
});
|
||||||
|
const isEditingSecret = computed(() => !!innerValue.value?.id);
|
||||||
|
|
||||||
|
const secretEventsOptions: CheckboxOption[] = [
|
||||||
|
{ value: WebhookEvents.Push, text: i18n.t('repo.build.event.push') },
|
||||||
|
{ value: WebhookEvents.Tag, text: i18n.t('repo.build.event.tag') },
|
||||||
|
{
|
||||||
|
value: WebhookEvents.PullRequest,
|
||||||
|
text: i18n.t('repo.build.event.pr'),
|
||||||
|
description: i18n.t('repo.settings.secrets.events.pr_warning'),
|
||||||
|
},
|
||||||
|
{ value: WebhookEvents.Deploy, text: i18n.t('repo.build.event.deploy') },
|
||||||
|
];
|
||||||
|
|
||||||
|
function save() {
|
||||||
|
if (!innerValue.value) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
ctx.emit('save', innerValue.value);
|
||||||
|
}
|
||||||
|
|
||||||
|
return {
|
||||||
|
innerValue,
|
||||||
|
isEditingSecret,
|
||||||
|
secretEventsOptions,
|
||||||
|
images,
|
||||||
|
save,
|
||||||
|
};
|
||||||
|
},
|
||||||
|
});
|
||||||
|
</script>
|
82
web/src/components/secrets/SecretList.vue
Normal file
82
web/src/components/secrets/SecretList.vue
Normal file
|
@ -0,0 +1,82 @@
|
||||||
|
<template>
|
||||||
|
<div class="space-y-4 text-color">
|
||||||
|
<ListItem v-for="secret in secrets" :key="secret.id" class="items-center">
|
||||||
|
<span>{{ secret.name }}</span>
|
||||||
|
<div class="ml-auto">
|
||||||
|
<span
|
||||||
|
v-for="event in secret.event"
|
||||||
|
:key="event"
|
||||||
|
class="bg-gray-500 dark:bg-dark-700 dark:text-gray-400 text-white rounded-md mx-1 py-1 px-2 text-sm"
|
||||||
|
>
|
||||||
|
{{ event }}
|
||||||
|
</span>
|
||||||
|
</div>
|
||||||
|
<IconButton icon="edit" class="ml-2 w-8 h-8" @click="editSecret(secret)" />
|
||||||
|
<IconButton
|
||||||
|
icon="trash"
|
||||||
|
class="ml-2 w-8 h-8 hover:text-red-400 hover:dark:text-red-500"
|
||||||
|
:is-loading="isDeleting"
|
||||||
|
@click="deleteSecret(secret)"
|
||||||
|
/>
|
||||||
|
</ListItem>
|
||||||
|
|
||||||
|
<div v-if="secrets?.length === 0" class="ml-2">{{ $t(i18nPrefix + 'none') }}</div>
|
||||||
|
</div>
|
||||||
|
</template>
|
||||||
|
|
||||||
|
<script lang="ts">
|
||||||
|
import { defineComponent, PropType, toRef } from 'vue';
|
||||||
|
|
||||||
|
import IconButton from '~/components/atomic/IconButton.vue';
|
||||||
|
import ListItem from '~/components/atomic/ListItem.vue';
|
||||||
|
import { Secret } from '~/lib/api/types';
|
||||||
|
|
||||||
|
export default defineComponent({
|
||||||
|
name: 'SecretList',
|
||||||
|
|
||||||
|
components: {
|
||||||
|
ListItem,
|
||||||
|
IconButton,
|
||||||
|
},
|
||||||
|
|
||||||
|
props: {
|
||||||
|
// used by toRef
|
||||||
|
// eslint-disable-next-line vue/no-unused-properties
|
||||||
|
modelValue: {
|
||||||
|
type: Array as PropType<Secret[]>,
|
||||||
|
required: true,
|
||||||
|
},
|
||||||
|
|
||||||
|
isDeleting: {
|
||||||
|
type: Boolean,
|
||||||
|
required: true,
|
||||||
|
},
|
||||||
|
|
||||||
|
i18nPrefix: {
|
||||||
|
type: String,
|
||||||
|
required: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
|
||||||
|
emits: {
|
||||||
|
// eslint-disable-next-line @typescript-eslint/no-unused-vars
|
||||||
|
edit: (secret: Secret): boolean => true,
|
||||||
|
// eslint-disable-next-line @typescript-eslint/no-unused-vars
|
||||||
|
delete: (secret: Secret): boolean => true,
|
||||||
|
},
|
||||||
|
|
||||||
|
setup(props, ctx) {
|
||||||
|
const secrets = toRef(props, 'modelValue');
|
||||||
|
|
||||||
|
function editSecret(secret: Secret) {
|
||||||
|
ctx.emit('edit', secret);
|
||||||
|
}
|
||||||
|
|
||||||
|
function deleteSecret(secret: Secret) {
|
||||||
|
ctx.emit('delete', secret);
|
||||||
|
}
|
||||||
|
|
||||||
|
return { secrets, editSecret, deleteSecret };
|
||||||
|
},
|
||||||
|
});
|
||||||
|
</script>
|
|
@ -5,6 +5,7 @@ import {
|
||||||
BuildFeed,
|
BuildFeed,
|
||||||
BuildLog,
|
BuildLog,
|
||||||
BuildProc,
|
BuildProc,
|
||||||
|
OrgPermissions,
|
||||||
Registry,
|
Registry,
|
||||||
Repo,
|
Repo,
|
||||||
RepoPermissions,
|
RepoPermissions,
|
||||||
|
@ -135,6 +136,42 @@ export default class WoodpeckerClient extends ApiClient {
|
||||||
return this._delete(`/api/repos/${owner}/${repo}/registry/${registryAddress}`);
|
return this._delete(`/api/repos/${owner}/${repo}/registry/${registryAddress}`);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
getOrgPermissions(owner: string): Promise<OrgPermissions> {
|
||||||
|
return this._get(`/api/orgs/${owner}/permissions`) as Promise<OrgPermissions>;
|
||||||
|
}
|
||||||
|
|
||||||
|
getOrgSecretList(owner: string): Promise<Secret[]> {
|
||||||
|
return this._get(`/api/orgs/${owner}/secrets`) as Promise<Secret[]>;
|
||||||
|
}
|
||||||
|
|
||||||
|
createOrgSecret(owner: string, secret: Partial<Secret>): Promise<unknown> {
|
||||||
|
return this._post(`/api/orgs/${owner}/secrets`, secret);
|
||||||
|
}
|
||||||
|
|
||||||
|
updateOrgSecret(owner: string, secret: Partial<Secret>): Promise<unknown> {
|
||||||
|
return this._patch(`/api/orgs/${owner}/secrets/${secret.name}`, secret);
|
||||||
|
}
|
||||||
|
|
||||||
|
deleteOrgSecret(owner: string, secretName: string): Promise<unknown> {
|
||||||
|
return this._delete(`/api/orgs/${owner}/secrets/${secretName}`);
|
||||||
|
}
|
||||||
|
|
||||||
|
getGlobalSecretList(): Promise<Secret[]> {
|
||||||
|
return this._get(`/api/secrets`) as Promise<Secret[]>;
|
||||||
|
}
|
||||||
|
|
||||||
|
createGlobalSecret(secret: Partial<Secret>): Promise<unknown> {
|
||||||
|
return this._post(`/api/secrets`, secret);
|
||||||
|
}
|
||||||
|
|
||||||
|
updateGlobalSecret(secret: Partial<Secret>): Promise<unknown> {
|
||||||
|
return this._patch(`/api/secrets/${secret.name}`, secret);
|
||||||
|
}
|
||||||
|
|
||||||
|
deleteGlobalSecret(secretName: string): Promise<unknown> {
|
||||||
|
return this._delete(`/api/secrets/${secretName}`);
|
||||||
|
}
|
||||||
|
|
||||||
getSelf(): Promise<unknown> {
|
getSelf(): Promise<unknown> {
|
||||||
return this._get('/api/user');
|
return this._get('/api/user');
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
export * from './build';
|
export * from './build';
|
||||||
export * from './buildConfig';
|
export * from './buildConfig';
|
||||||
|
export * from './org';
|
||||||
export * from './registry';
|
export * from './registry';
|
||||||
export * from './repo';
|
export * from './repo';
|
||||||
export * from './secret';
|
export * from './secret';
|
||||||
|
|
10
web/src/lib/api/types/org.ts
Normal file
10
web/src/lib/api/types/org.ts
Normal file
|
@ -0,0 +1,10 @@
|
||||||
|
// A version control organization.
|
||||||
|
export type Org = {
|
||||||
|
// The name of the organization.
|
||||||
|
name: string;
|
||||||
|
};
|
||||||
|
|
||||||
|
export type OrgPermissions = {
|
||||||
|
member: boolean;
|
||||||
|
admin: boolean;
|
||||||
|
};
|
|
@ -28,6 +28,25 @@ const routes: RouteRecordRaw[] = [
|
||||||
component: (): Component => import('~/views/ReposOwner.vue'),
|
component: (): Component => import('~/views/ReposOwner.vue'),
|
||||||
props: true,
|
props: true,
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
path: '/org/:repoOwner',
|
||||||
|
component: (): Component => import('~/views/org/OrgWrapper.vue'),
|
||||||
|
props: true,
|
||||||
|
children: [
|
||||||
|
{
|
||||||
|
path: '',
|
||||||
|
name: 'org',
|
||||||
|
redirect: (route) => ({ name: 'repos-owner', params: route.params }),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
path: 'settings',
|
||||||
|
name: 'org-settings',
|
||||||
|
component: (): Component => import('~/views/org/OrgSettings.vue'),
|
||||||
|
meta: { authentication: 'required' },
|
||||||
|
props: true,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
},
|
||||||
{
|
{
|
||||||
path: '/:repoOwner/:repoName',
|
path: '/:repoOwner/:repoName',
|
||||||
name: 'repo-wrapper',
|
name: 'repo-wrapper',
|
||||||
|
@ -99,6 +118,13 @@ const routes: RouteRecordRaw[] = [
|
||||||
meta: { authentication: 'required' },
|
meta: { authentication: 'required' },
|
||||||
props: true,
|
props: true,
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
path: '/admin/settings',
|
||||||
|
name: 'admin-settings',
|
||||||
|
component: (): Component => import('~/views/admin/AdminSettings.vue'),
|
||||||
|
meta: { authentication: 'required' },
|
||||||
|
props: true,
|
||||||
|
},
|
||||||
{
|
{
|
||||||
path: '/user',
|
path: '/user',
|
||||||
name: 'user',
|
name: 'user',
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
<div class="flex flex-row flex-wrap md:grid md:grid-cols-3 border-b pb-4 mb-4 dark:border-dark-200">
|
<div class="flex flex-row flex-wrap md:grid md:grid-cols-3 border-b pb-4 mb-4 dark:border-dark-200">
|
||||||
<h1 class="text-xl text-color">{{ repoOwner }}</h1>
|
<h1 class="text-xl text-color">{{ repoOwner }}</h1>
|
||||||
<TextField v-model="search" class="w-auto md:ml-auto md:mr-auto" :placeholder="$t('search')" />
|
<TextField v-model="search" class="w-auto md:ml-auto md:mr-auto" :placeholder="$t('search')" />
|
||||||
|
<IconButton v-if="orgPermissions.admin" icon="settings" :to="{ name: 'org-settings' }" class="ml-auto" />
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="space-y-4">
|
<div class="space-y-4">
|
||||||
|
@ -24,10 +25,13 @@
|
||||||
<script lang="ts">
|
<script lang="ts">
|
||||||
import { computed, defineComponent, onMounted, ref } from 'vue';
|
import { computed, defineComponent, onMounted, ref } from 'vue';
|
||||||
|
|
||||||
|
import IconButton from '~/components/atomic/IconButton.vue';
|
||||||
import ListItem from '~/components/atomic/ListItem.vue';
|
import ListItem from '~/components/atomic/ListItem.vue';
|
||||||
import TextField from '~/components/form/TextField.vue';
|
import TextField from '~/components/form/TextField.vue';
|
||||||
import FluidContainer from '~/components/layout/FluidContainer.vue';
|
import FluidContainer from '~/components/layout/FluidContainer.vue';
|
||||||
|
import useApiClient from '~/compositions/useApiClient';
|
||||||
import { useRepoSearch } from '~/compositions/useRepoSearch';
|
import { useRepoSearch } from '~/compositions/useRepoSearch';
|
||||||
|
import { OrgPermissions } from '~/lib/api/types';
|
||||||
import RepoStore from '~/store/repos';
|
import RepoStore from '~/store/repos';
|
||||||
|
|
||||||
export default defineComponent({
|
export default defineComponent({
|
||||||
|
@ -37,6 +41,7 @@ export default defineComponent({
|
||||||
FluidContainer,
|
FluidContainer,
|
||||||
ListItem,
|
ListItem,
|
||||||
TextField,
|
TextField,
|
||||||
|
IconButton,
|
||||||
},
|
},
|
||||||
|
|
||||||
props: {
|
props: {
|
||||||
|
@ -47,18 +52,21 @@ export default defineComponent({
|
||||||
},
|
},
|
||||||
|
|
||||||
setup(props) {
|
setup(props) {
|
||||||
|
const apiClient = useApiClient();
|
||||||
const repoStore = RepoStore();
|
const repoStore = RepoStore();
|
||||||
// TODO: filter server side
|
// TODO: filter server side
|
||||||
const repos = computed(() => Object.values(repoStore.repos).filter((v) => v.owner === props.repoOwner));
|
const repos = computed(() => Object.values(repoStore.repos).filter((v) => v.owner === props.repoOwner));
|
||||||
const search = ref('');
|
const search = ref('');
|
||||||
|
const orgPermissions = ref<OrgPermissions>({ member: false, admin: false });
|
||||||
|
|
||||||
const { searchedRepos } = useRepoSearch(repos, search);
|
const { searchedRepos } = useRepoSearch(repos, search);
|
||||||
|
|
||||||
onMounted(async () => {
|
onMounted(async () => {
|
||||||
await repoStore.loadRepos();
|
await repoStore.loadRepos();
|
||||||
|
orgPermissions.value = await apiClient.getOrgPermissions(props.repoOwner);
|
||||||
});
|
});
|
||||||
|
|
||||||
return { searchedRepos, search };
|
return { searchedRepos, search, orgPermissions };
|
||||||
},
|
},
|
||||||
});
|
});
|
||||||
</script>
|
</script>
|
||||||
|
|
59
web/src/views/admin/AdminSettings.vue
Normal file
59
web/src/views/admin/AdminSettings.vue
Normal file
|
@ -0,0 +1,59 @@
|
||||||
|
<template>
|
||||||
|
<FluidContainer>
|
||||||
|
<div class="flex border-b items-center pb-4 mb-4 dark:border-gray-600">
|
||||||
|
<IconButton icon="back" @click="goBack" />
|
||||||
|
<h1 class="text-xl ml-2 text-color">{{ $t('admin.settings.settings') }}</h1>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<Tabs>
|
||||||
|
<Tab id="secrets" :title="$t('admin.settings.secrets.secrets')">
|
||||||
|
<AdminSecretsTab />
|
||||||
|
</Tab>
|
||||||
|
</Tabs>
|
||||||
|
</FluidContainer>
|
||||||
|
</template>
|
||||||
|
|
||||||
|
<script lang="ts">
|
||||||
|
import { defineComponent, onMounted } from 'vue';
|
||||||
|
import { useI18n } from 'vue-i18n';
|
||||||
|
import { useRouter } from 'vue-router';
|
||||||
|
|
||||||
|
import AdminSecretsTab from '~/components/admin/settings/AdminSecretsTab.vue';
|
||||||
|
import IconButton from '~/components/atomic/IconButton.vue';
|
||||||
|
import FluidContainer from '~/components/layout/FluidContainer.vue';
|
||||||
|
import Tab from '~/components/tabs/Tab.vue';
|
||||||
|
import Tabs from '~/components/tabs/Tabs.vue';
|
||||||
|
import useAuthentication from '~/compositions/useAuthentication';
|
||||||
|
import useNotifications from '~/compositions/useNotifications';
|
||||||
|
import { useRouteBackOrDefault } from '~/compositions/useRouteBackOrDefault';
|
||||||
|
|
||||||
|
export default defineComponent({
|
||||||
|
name: 'AdminSettings',
|
||||||
|
|
||||||
|
components: {
|
||||||
|
FluidContainer,
|
||||||
|
IconButton,
|
||||||
|
Tabs,
|
||||||
|
Tab,
|
||||||
|
AdminSecretsTab,
|
||||||
|
},
|
||||||
|
|
||||||
|
setup() {
|
||||||
|
const notifications = useNotifications();
|
||||||
|
const router = useRouter();
|
||||||
|
const i18n = useI18n();
|
||||||
|
const { user } = useAuthentication();
|
||||||
|
|
||||||
|
onMounted(async () => {
|
||||||
|
if (!user?.admin) {
|
||||||
|
notifications.notify({ type: 'error', title: i18n.t('admin.settings.not_allowed') });
|
||||||
|
await router.replace({ name: 'home' });
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
return {
|
||||||
|
goBack: useRouteBackOrDefault({ name: 'home' }),
|
||||||
|
};
|
||||||
|
},
|
||||||
|
});
|
||||||
|
</script>
|
63
web/src/views/org/OrgSettings.vue
Normal file
63
web/src/views/org/OrgSettings.vue
Normal file
|
@ -0,0 +1,63 @@
|
||||||
|
<template>
|
||||||
|
<FluidContainer>
|
||||||
|
<div class="flex border-b items-center pb-4 mb-4 dark:border-gray-600">
|
||||||
|
<IconButton icon="back" @click="goBack" />
|
||||||
|
<h1 class="text-xl ml-2 text-color">{{ $t('org.settings.settings') }}</h1>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<Tabs>
|
||||||
|
<Tab id="secrets" :title="$t('org.settings.secrets.secrets')">
|
||||||
|
<OrgSecretsTab />
|
||||||
|
</Tab>
|
||||||
|
</Tabs>
|
||||||
|
</FluidContainer>
|
||||||
|
</template>
|
||||||
|
|
||||||
|
<script lang="ts">
|
||||||
|
import { defineComponent, inject, onMounted, Ref } from 'vue';
|
||||||
|
import { useI18n } from 'vue-i18n';
|
||||||
|
import { useRouter } from 'vue-router';
|
||||||
|
|
||||||
|
import IconButton from '~/components/atomic/IconButton.vue';
|
||||||
|
import FluidContainer from '~/components/layout/FluidContainer.vue';
|
||||||
|
import OrgSecretsTab from '~/components/org/settings/OrgSecretsTab.vue';
|
||||||
|
import Tab from '~/components/tabs/Tab.vue';
|
||||||
|
import Tabs from '~/components/tabs/Tabs.vue';
|
||||||
|
import useNotifications from '~/compositions/useNotifications';
|
||||||
|
import { useRouteBackOrDefault } from '~/compositions/useRouteBackOrDefault';
|
||||||
|
import { OrgPermissions } from '~/lib/api/types';
|
||||||
|
|
||||||
|
export default defineComponent({
|
||||||
|
name: 'OrgSettings',
|
||||||
|
|
||||||
|
components: {
|
||||||
|
FluidContainer,
|
||||||
|
IconButton,
|
||||||
|
Tabs,
|
||||||
|
Tab,
|
||||||
|
OrgSecretsTab,
|
||||||
|
},
|
||||||
|
|
||||||
|
setup() {
|
||||||
|
const notifications = useNotifications();
|
||||||
|
const router = useRouter();
|
||||||
|
const i18n = useI18n();
|
||||||
|
|
||||||
|
const orgPermissions = inject<Ref<OrgPermissions>>('org-permissions');
|
||||||
|
if (!orgPermissions) {
|
||||||
|
throw new Error('Unexpected: "orgPermissions" should be provided at this place');
|
||||||
|
}
|
||||||
|
|
||||||
|
onMounted(async () => {
|
||||||
|
if (!orgPermissions.value.admin) {
|
||||||
|
notifications.notify({ type: 'error', title: i18n.t('org.settings.not_allowed') });
|
||||||
|
await router.replace({ name: 'home' });
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
return {
|
||||||
|
goBack: useRouteBackOrDefault({ name: 'repos-owner' }),
|
||||||
|
};
|
||||||
|
},
|
||||||
|
});
|
||||||
|
</script>
|
61
web/src/views/org/OrgWrapper.vue
Normal file
61
web/src/views/org/OrgWrapper.vue
Normal file
|
@ -0,0 +1,61 @@
|
||||||
|
<template>
|
||||||
|
<FluidContainer v-if="org && orgPermissions && $route.meta.orgHeader">
|
||||||
|
<div class="flex flex-wrap border-b items-center pb-4 mb-4 dark:border-gray-600 justify-center">
|
||||||
|
<h1 class="text-xl text-color w-full md:w-auto text-center mb-4 md:mb-0">
|
||||||
|
{{ org.name }}
|
||||||
|
</h1>
|
||||||
|
<IconButton v-if="orgPermissions.admin" class="ml-2" :to="{ name: 'repo-settings' }" icon="settings" />
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<router-view />
|
||||||
|
</FluidContainer>
|
||||||
|
<router-view v-else-if="org && orgPermissions" />
|
||||||
|
</template>
|
||||||
|
|
||||||
|
<script lang="ts">
|
||||||
|
import { computed, defineComponent, onMounted, provide, ref, toRef, watch } from 'vue';
|
||||||
|
|
||||||
|
import IconButton from '~/components/atomic/IconButton.vue';
|
||||||
|
import FluidContainer from '~/components/layout/FluidContainer.vue';
|
||||||
|
import useApiClient from '~/compositions/useApiClient';
|
||||||
|
import { Org, OrgPermissions } from '~/lib/api/types';
|
||||||
|
|
||||||
|
export default defineComponent({
|
||||||
|
name: 'OrgWrapper',
|
||||||
|
|
||||||
|
components: { FluidContainer, IconButton },
|
||||||
|
|
||||||
|
props: {
|
||||||
|
// used by toRef
|
||||||
|
// eslint-disable-next-line vue/no-unused-properties
|
||||||
|
repoOwner: {
|
||||||
|
type: String,
|
||||||
|
required: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
|
||||||
|
setup(props) {
|
||||||
|
const repoOwner = toRef(props, 'repoOwner');
|
||||||
|
const apiClient = useApiClient();
|
||||||
|
const org = computed<Org>(() => ({ name: repoOwner.value }));
|
||||||
|
|
||||||
|
const orgPermissions = ref<OrgPermissions>();
|
||||||
|
provide('org', org);
|
||||||
|
provide('org-permissions', orgPermissions);
|
||||||
|
|
||||||
|
async function load() {
|
||||||
|
orgPermissions.value = await apiClient.getOrgPermissions(repoOwner.value);
|
||||||
|
}
|
||||||
|
|
||||||
|
onMounted(() => {
|
||||||
|
load();
|
||||||
|
});
|
||||||
|
|
||||||
|
watch([repoOwner], () => {
|
||||||
|
load();
|
||||||
|
});
|
||||||
|
|
||||||
|
return { org, orgPermissions };
|
||||||
|
},
|
||||||
|
});
|
||||||
|
</script>
|
|
@ -30,6 +30,10 @@ const (
|
||||||
pathRepoSecret = "%s/api/repos/%s/%s/secrets/%s"
|
pathRepoSecret = "%s/api/repos/%s/%s/secrets/%s"
|
||||||
pathRepoRegistries = "%s/api/repos/%s/%s/registry"
|
pathRepoRegistries = "%s/api/repos/%s/%s/registry"
|
||||||
pathRepoRegistry = "%s/api/repos/%s/%s/registry/%s"
|
pathRepoRegistry = "%s/api/repos/%s/%s/registry/%s"
|
||||||
|
pathOrgSecrets = "%s/api/orgs/%s/secrets"
|
||||||
|
pathOrgSecret = "%s/api/orgs/%s/secrets/%s"
|
||||||
|
pathGlobalSecrets = "%s/api/secrets"
|
||||||
|
pathGlobalSecret = "%s/api/secrets/%s"
|
||||||
pathUsers = "%s/api/users"
|
pathUsers = "%s/api/users"
|
||||||
pathUser = "%s/api/users/%s"
|
pathUser = "%s/api/users/%s"
|
||||||
pathBuildQueue = "%s/api/builds"
|
pathBuildQueue = "%s/api/builds"
|
||||||
|
@ -360,6 +364,82 @@ func (c *client) SecretDelete(owner, name, secret string) error {
|
||||||
return c.delete(uri)
|
return c.delete(uri)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// OrgSecret returns an organization secret by name.
|
||||||
|
func (c *client) OrgSecret(owner, secret string) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathOrgSecret, c.addr, owner, secret)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// OrgSecretList returns a list of all organization secrets.
|
||||||
|
func (c *client) OrgSecretList(owner string) ([]*Secret, error) {
|
||||||
|
var out []*Secret
|
||||||
|
uri := fmt.Sprintf(pathOrgSecrets, c.addr, owner)
|
||||||
|
err := c.get(uri, &out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// OrgSecretCreate creates an organization secret.
|
||||||
|
func (c *client) OrgSecretCreate(owner string, in *Secret) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathOrgSecrets, c.addr, owner)
|
||||||
|
err := c.post(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// OrgSecretUpdate updates an organization secret.
|
||||||
|
func (c *client) OrgSecretUpdate(owner string, in *Secret) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathOrgSecret, c.addr, owner, in.Name)
|
||||||
|
err := c.patch(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// OrgSecretDelete deletes an organization secret.
|
||||||
|
func (c *client) OrgSecretDelete(owner, secret string) error {
|
||||||
|
uri := fmt.Sprintf(pathOrgSecret, c.addr, owner, secret)
|
||||||
|
return c.delete(uri)
|
||||||
|
}
|
||||||
|
|
||||||
|
// GlobalOrgSecret returns an global secret by name.
|
||||||
|
func (c *client) GlobalSecret(secret string) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathGlobalSecret, c.addr, secret)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// GlobalSecretList returns a list of all global secrets.
|
||||||
|
func (c *client) GlobalSecretList() ([]*Secret, error) {
|
||||||
|
var out []*Secret
|
||||||
|
uri := fmt.Sprintf(pathGlobalSecrets, c.addr)
|
||||||
|
err := c.get(uri, &out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// GlobalSecretCreate creates a global secret.
|
||||||
|
func (c *client) GlobalSecretCreate(in *Secret) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathGlobalSecrets, c.addr)
|
||||||
|
err := c.post(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// GlobalSecretUpdate updates a global secret.
|
||||||
|
func (c *client) GlobalSecretUpdate(in *Secret) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathGlobalSecret, c.addr, in.Name)
|
||||||
|
err := c.patch(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// GlobalSecretDelete deletes a global secret.
|
||||||
|
func (c *client) GlobalSecretDelete(secret string) error {
|
||||||
|
uri := fmt.Sprintf(pathGlobalSecret, c.addr, secret)
|
||||||
|
return c.delete(uri)
|
||||||
|
}
|
||||||
|
|
||||||
// QueueInfo returns queue info
|
// QueueInfo returns queue info
|
||||||
func (c *client) QueueInfo() (*Info, error) {
|
func (c *client) QueueInfo() (*Info, error) {
|
||||||
out := new(Info)
|
out := new(Info)
|
||||||
|
|
|
@ -119,15 +119,45 @@ type Client interface {
|
||||||
// SecretList returns a list of all repository secrets.
|
// SecretList returns a list of all repository secrets.
|
||||||
SecretList(owner, name string) ([]*Secret, error)
|
SecretList(owner, name string) ([]*Secret, error)
|
||||||
|
|
||||||
// SecretCreate creates a registry.
|
// SecretCreate creates a secret.
|
||||||
SecretCreate(owner, name string, secret *Secret) (*Secret, error)
|
SecretCreate(owner, name string, secret *Secret) (*Secret, error)
|
||||||
|
|
||||||
// SecretUpdate updates a registry.
|
// SecretUpdate updates a secret.
|
||||||
SecretUpdate(owner, name string, secret *Secret) (*Secret, error)
|
SecretUpdate(owner, name string, secret *Secret) (*Secret, error)
|
||||||
|
|
||||||
// SecretDelete deletes a secret.
|
// SecretDelete deletes a secret.
|
||||||
SecretDelete(owner, name, secret string) error
|
SecretDelete(owner, name, secret string) error
|
||||||
|
|
||||||
|
// OrgSecret returns an organization secret by name.
|
||||||
|
OrgSecret(owner, secret string) (*Secret, error)
|
||||||
|
|
||||||
|
// OrgSecretList returns a list of all organization secrets.
|
||||||
|
OrgSecretList(owner string) ([]*Secret, error)
|
||||||
|
|
||||||
|
// OrgSecretCreate creates an organization secret.
|
||||||
|
OrgSecretCreate(owner string, secret *Secret) (*Secret, error)
|
||||||
|
|
||||||
|
// OrgSecretUpdate updates an organization secret.
|
||||||
|
OrgSecretUpdate(owner string, secret *Secret) (*Secret, error)
|
||||||
|
|
||||||
|
// OrgSecretDelete deletes an organization secret.
|
||||||
|
OrgSecretDelete(owner, secret string) error
|
||||||
|
|
||||||
|
// GlobalSecret returns an global secret by name.
|
||||||
|
GlobalSecret(secret string) (*Secret, error)
|
||||||
|
|
||||||
|
// GlobalSecretList returns a list of all global secrets.
|
||||||
|
GlobalSecretList() ([]*Secret, error)
|
||||||
|
|
||||||
|
// GlobalSecretCreate creates a global secret.
|
||||||
|
GlobalSecretCreate(secret *Secret) (*Secret, error)
|
||||||
|
|
||||||
|
// GlobalSecretUpdate updates a global secret.
|
||||||
|
GlobalSecretUpdate(secret *Secret) (*Secret, error)
|
||||||
|
|
||||||
|
// GlobalSecretDelete deletes a global secret.
|
||||||
|
GlobalSecretDelete(secret string) error
|
||||||
|
|
||||||
// QueueInfo returns the queue state.
|
// QueueInfo returns the queue state.
|
||||||
QueueInfo() (*Info, error)
|
QueueInfo() (*Info, error)
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue