// Copyright 2023 The Gitea Authors. All rights reserved. // SPDX-License-Identifier: MIT package repo import ( "errors" "net/http" api "code.gitea.io/gitea/modules/structs" "code.gitea.io/gitea/modules/util" "code.gitea.io/gitea/modules/web" "code.gitea.io/gitea/services/context" secret_service "code.gitea.io/gitea/services/secrets" ) // create or update one secret of the repository func CreateOrUpdateSecret(ctx *context.APIContext) { // swagger:operation PUT /repos/{owner}/{repo}/actions/secrets/{secretname} repository updateRepoSecret // --- // summary: Create or Update a secret value in a repository // consumes: // - application/json // produces: // - application/json // parameters: // - name: owner // in: path // description: owner of the repository // type: string // required: true // - name: repo // in: path // description: name of the repository // type: string // required: true // - name: secretname // in: path // description: name of the secret // type: string // required: true // - name: body // in: body // schema: // "$ref": "#/definitions/CreateOrUpdateSecretOption" // responses: // "201": // description: response when creating a secret // "204": // description: response when updating a secret // "400": // "$ref": "#/responses/error" // "404": // "$ref": "#/responses/notFound" owner := ctx.Repo.Owner repo := ctx.Repo.Repository opt := web.GetForm(ctx).(*api.CreateOrUpdateSecretOption) _, created, err := secret_service.CreateOrUpdateSecret(ctx, owner.ID, repo.ID, ctx.Params("secretname"), opt.Data) if err != nil { if errors.Is(err, util.ErrInvalidArgument) { ctx.Error(http.StatusBadRequest, "CreateOrUpdateSecret", err) } else if errors.Is(err, util.ErrNotExist) { ctx.Error(http.StatusNotFound, "CreateOrUpdateSecret", err) } else { ctx.Error(http.StatusInternalServerError, "CreateOrUpdateSecret", err) } return } if created { ctx.Status(http.StatusCreated) } else { ctx.Status(http.StatusNoContent) } } // DeleteSecret delete one secret of the repository func DeleteSecret(ctx *context.APIContext) { // swagger:operation DELETE /repos/{owner}/{repo}/actions/secrets/{secretname} repository deleteRepoSecret // --- // summary: Delete a secret in a repository // consumes: // - application/json // produces: // - application/json // parameters: // - name: owner // in: path // description: owner of the repository // type: string // required: true // - name: repo // in: path // description: name of the repository // type: string // required: true // - name: secretname // in: path // description: name of the secret // type: string // required: true // responses: // "204": // description: delete one secret of the organization // "400": // "$ref": "#/responses/error" // "404": // "$ref": "#/responses/notFound" owner := ctx.Repo.Owner repo := ctx.Repo.Repository err := secret_service.DeleteSecretByName(ctx, owner.ID, repo.ID, ctx.Params("secretname")) if err != nil { if errors.Is(err, util.ErrInvalidArgument) { ctx.Error(http.StatusBadRequest, "DeleteSecret", err) } else if errors.Is(err, util.ErrNotExist) { ctx.Error(http.StatusNotFound, "DeleteSecret", err) } else { ctx.Error(http.StatusInternalServerError, "DeleteSecret", err) } return } ctx.Status(http.StatusNoContent) }