2023-02-01 18:23:04 +05:30
|
|
|
// Copyright 2022 The Gitea Authors. All rights reserved.
|
|
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
|
|
|
|
package secrets
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net/http"
|
2023-05-16 12:19:40 +05:30
|
|
|
"strings"
|
2023-02-01 18:23:04 +05:30
|
|
|
|
|
|
|
"code.gitea.io/gitea/models/db"
|
|
|
|
secret_model "code.gitea.io/gitea/models/secret"
|
|
|
|
"code.gitea.io/gitea/modules/context"
|
|
|
|
"code.gitea.io/gitea/modules/log"
|
|
|
|
"code.gitea.io/gitea/modules/web"
|
|
|
|
"code.gitea.io/gitea/services/forms"
|
|
|
|
)
|
|
|
|
|
|
|
|
func SetSecretsContext(ctx *context.Context, ownerID, repoID int64) {
|
|
|
|
secrets, err := secret_model.FindSecrets(ctx, secret_model.FindSecretsOptions{OwnerID: ownerID, RepoID: repoID})
|
|
|
|
if err != nil {
|
|
|
|
ctx.ServerError("FindSecrets", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Data["Secrets"] = secrets
|
|
|
|
}
|
|
|
|
|
|
|
|
func PerformSecretsPost(ctx *context.Context, ownerID, repoID int64, redirectURL string) {
|
|
|
|
form := web.GetForm(ctx).(*forms.AddSecretForm)
|
|
|
|
|
2023-05-16 12:19:40 +05:30
|
|
|
content := form.Content
|
|
|
|
// Since the content is from a form which is a textarea, the line endings are \r\n.
|
|
|
|
// It's a standard behavior of HTML.
|
|
|
|
// But we want to store them as \n like what GitHub does.
|
|
|
|
// And users are unlikely to really need to keep the \r.
|
|
|
|
// Other than this, we should respect the original content, even leading or trailing spaces.
|
|
|
|
content = strings.ReplaceAll(content, "\r\n", "\n")
|
|
|
|
|
|
|
|
s, err := secret_model.InsertEncryptedSecret(ctx, ownerID, repoID, form.Title, content)
|
2023-02-01 18:23:04 +05:30
|
|
|
if err != nil {
|
|
|
|
log.Error("InsertEncryptedSecret: %v", err)
|
|
|
|
ctx.Flash.Error(ctx.Tr("secrets.creation.failed"))
|
|
|
|
} else {
|
|
|
|
ctx.Flash.Success(ctx.Tr("secrets.creation.success", s.Name))
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Redirect(redirectURL)
|
|
|
|
}
|
|
|
|
|
2023-04-23 19:05:14 +05:30
|
|
|
func PerformSecretsDelete(ctx *context.Context, ownerID, repoID int64, redirectURL string) {
|
2023-02-01 18:23:04 +05:30
|
|
|
id := ctx.FormInt64("id")
|
|
|
|
|
2023-04-23 19:05:14 +05:30
|
|
|
if _, err := db.DeleteByBean(ctx, &secret_model.Secret{ID: id, OwnerID: ownerID, RepoID: repoID}); err != nil {
|
2023-02-01 18:23:04 +05:30
|
|
|
log.Error("Delete secret %d failed: %v", id, err)
|
|
|
|
ctx.Flash.Error(ctx.Tr("secrets.deletion.failed"))
|
|
|
|
} else {
|
|
|
|
ctx.Flash.Success(ctx.Tr("secrets.deletion.success"))
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.JSON(http.StatusOK, map[string]interface{}{
|
|
|
|
"redirect": redirectURL,
|
|
|
|
})
|
|
|
|
}
|