// Copyright 2025 Cloudbase Solutions SRL // // Licensed under the Apache License, Version 2.0 (the "License"); you may // not use this file except in compliance with the License. You may obtain // a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, WITHOUT // WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the // License for the specific language governing permissions and limitations // under the License. package runner import ( "context" "fmt" runnerErrors "github.com/cloudbase/garm-provider-common/errors" "github.com/cloudbase/garm/auth" "github.com/cloudbase/garm/params" ) func (r *Runner) ListGiteaCredentials(ctx context.Context) ([]params.ForgeCredentials, error) { if !auth.IsAdmin(ctx) { return nil, runnerErrors.ErrUnauthorized } // Get the credentials from the store. The cache is always updated after the database successfully // commits the transaction that created/updated the credentials. // If we create a set of credentials then immediately after we call ListGiteaCredentials, // there is a posibillity that not all creds will be in the cache. creds, err := r.store.ListGiteaCredentials(ctx) if err != nil { return nil, fmt.Errorf("error fetching gitea credentials: %w", err) } return creds, nil } func (r *Runner) CreateGiteaCredentials(ctx context.Context, param params.CreateGiteaCredentialsParams) (params.ForgeCredentials, error) { if !auth.IsAdmin(ctx) { return params.ForgeCredentials{}, runnerErrors.ErrUnauthorized } if err := param.Validate(); err != nil { return params.ForgeCredentials{}, fmt.Errorf("error failed to validate gitea credentials params: %w", err) } creds, err := r.store.CreateGiteaCredentials(ctx, param) if err != nil { return params.ForgeCredentials{}, fmt.Errorf("error failed to create gitea credentials: %w", err) } return creds, nil } func (r *Runner) GetGiteaCredentials(ctx context.Context, id uint) (params.ForgeCredentials, error) { if !auth.IsAdmin(ctx) { return params.ForgeCredentials{}, runnerErrors.ErrUnauthorized } creds, err := r.store.GetGiteaCredentials(ctx, id, true) if err != nil { return params.ForgeCredentials{}, fmt.Errorf("error failed to get gitea credentials: %w", err) } return creds, nil } func (r *Runner) DeleteGiteaCredentials(ctx context.Context, id uint) error { if !auth.IsAdmin(ctx) { return runnerErrors.ErrUnauthorized } if err := r.store.DeleteGiteaCredentials(ctx, id); err != nil { return fmt.Errorf("error failed to delete gitea credentials: %w", err) } return nil } func (r *Runner) UpdateGiteaCredentials(ctx context.Context, id uint, param params.UpdateGiteaCredentialsParams) (params.ForgeCredentials, error) { if !auth.IsAdmin(ctx) { return params.ForgeCredentials{}, runnerErrors.ErrUnauthorized } if err := param.Validate(); err != nil { return params.ForgeCredentials{}, fmt.Errorf("error failed to validate gitea credentials params: %w", err) } newCreds, err := r.store.UpdateGiteaCredentials(ctx, id, param) if err != nil { return params.ForgeCredentials{}, fmt.Errorf("error failed to update gitea credentials: %w", err) } return newCreds, nil }