From c062f18b0a37450eaac96d82a3eddf310998b0f4 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Sun, 2 Mar 2025 12:21:18 +0100 Subject: [PATCH 01/21] WIP ActionRunner Org + Repo Api --- modules/structs/repo_actions.go | 24 +++++++++++ routers/api/v1/api.go | 3 ++ routers/api/v1/org/action.go | 12 ++++++ routers/api/v1/repo/action.go | 12 ++++++ routers/api/v1/shared/runners.go | 69 ++++++++++++++++++++++++++++++++ services/actions/interface.go | 3 ++ services/convert/convert.go | 26 ++++++++++++ 7 files changed, 149 insertions(+) diff --git a/modules/structs/repo_actions.go b/modules/structs/repo_actions.go index 22409b4aff7fd..590abbcea97f6 100644 --- a/modules/structs/repo_actions.go +++ b/modules/structs/repo_actions.go @@ -133,3 +133,27 @@ type ActionWorkflowJob struct { // swagger:strfmt date-time CompletedAt time.Time `json:"completed_at,omitempty"` } + +// ActionRunnerLabel represents a Runner Label +type ActionRunnerLabel struct { + ID int64 `json:"id"` + Name string `json:"name"` + Type string `json:"type"` +} + +// ActionRunner represents a Runner +type ActionRunner struct { + ID int64 `json:"id"` + Name string `json:"name"` + OS string `json:"os"` + Status string `json:"status"` + Busy bool `json:"busy"` + Ephemeral bool `json:"ephemeral"` + Labels []*ActionRunnerLabel `json:"labels"` +} + +// ActionRunnersResponse returns Runners +type ActionRunnersResponse struct { + Entries []*ActionRunner `json:"runners"` + TotalCount int64 `json:"total_count"` +} diff --git a/routers/api/v1/api.go b/routers/api/v1/api.go index bc76b5285e5a2..808fc24406e9e 100644 --- a/routers/api/v1/api.go +++ b/routers/api/v1/api.go @@ -912,7 +912,10 @@ func Routes() *web.Router { }) m.Group("/runners", func() { + m.Get("", reqToken(), reqChecker, act.GetRunners) m.Get("/registration-token", reqToken(), reqChecker, act.GetRegistrationToken) + m.Get("/{runner_id}", reqToken(), reqChecker, act.GetRunner) + m.Delete("/{runner_id}", reqToken(), reqChecker, act.DeleteRunner) }) }) } diff --git a/routers/api/v1/org/action.go b/routers/api/v1/org/action.go index d9bdb3ab48c26..da58042c1fb0f 100644 --- a/routers/api/v1/org/action.go +++ b/routers/api/v1/org/action.go @@ -466,6 +466,18 @@ func (Action) UpdateVariable(ctx *context.APIContext) { ctx.Status(http.StatusNoContent) } +func (Action) GetRunners(ctx *context.APIContext) { + shared.GetRunners(ctx, ctx.Org.Organization.ID, 0) +} + +func (Action) GetRunner(ctx *context.APIContext) { + shared.GetRunner(ctx, ctx.Org.Organization.ID, 0, ctx.PathParamInt64("runner_id")) +} + +func (Action) DeleteRunner(ctx *context.APIContext) { + shared.DeleteRunner(ctx, ctx.Org.Organization.ID, 0, ctx.PathParamInt64("runner_id")) +} + var _ actions_service.API = new(Action) // Action implements actions_service.API diff --git a/routers/api/v1/repo/action.go b/routers/api/v1/repo/action.go index 6b4ce37fcf4a2..5afb495a4a775 100644 --- a/routers/api/v1/repo/action.go +++ b/routers/api/v1/repo/action.go @@ -526,6 +526,18 @@ func (Action) GetRegistrationToken(ctx *context.APIContext) { shared.GetRegistrationToken(ctx, 0, ctx.Repo.Repository.ID) } +func (Action) GetRunners(ctx *context.APIContext) { + shared.GetRunners(ctx, 0, ctx.Repo.Repository.ID) +} + +func (Action) GetRunner(ctx *context.APIContext) { + shared.GetRunner(ctx, 0, ctx.Repo.Repository.ID, ctx.PathParamInt64("runner_id")) +} + +func (Action) DeleteRunner(ctx *context.APIContext) { + shared.DeleteRunner(ctx, 0, ctx.Repo.Repository.ID, ctx.PathParamInt64("runner_id")) +} + var _ actions_service.API = new(Action) // Action implements actions_service.API diff --git a/routers/api/v1/shared/runners.go b/routers/api/v1/shared/runners.go index f31d9e5d0bdf0..7e7296a96f9ef 100644 --- a/routers/api/v1/shared/runners.go +++ b/routers/api/v1/shared/runners.go @@ -7,9 +7,14 @@ import ( "errors" "net/http" + runnerv1 "code.gitea.io/actions-proto-go/runner/v1" actions_model "code.gitea.io/gitea/models/actions" + "code.gitea.io/gitea/models/db" + api "code.gitea.io/gitea/modules/structs" "code.gitea.io/gitea/modules/util" + "code.gitea.io/gitea/routers/api/v1/utils" "code.gitea.io/gitea/services/context" + "code.gitea.io/gitea/services/convert" ) // RegistrationToken is response related to registration token @@ -30,3 +35,67 @@ func GetRegistrationToken(ctx *context.APIContext, ownerID, repoID int64) { ctx.JSON(http.StatusOK, RegistrationToken{Token: token.Token}) } + +func GetRunners(ctx *context.APIContext, ownerID, repoID int64) { + runners, total, err := db.FindAndCount[actions_model.ActionRunner](ctx, &actions_model.FindRunnerOptions{ + OwnerID: ownerID, + RepoID: repoID, + ListOptions: utils.GetListOptions(ctx), + }) + if err != nil { + ctx.APIErrorInternal(err) + return + } + + res := new(api.ActionRunnersResponse) + res.TotalCount = total + + res.Entries = make([]*api.ActionRunner, len(runners)) + for i, runner := range runners { + res.Entries[i] = convert.ToActionRunner(ctx, runner) + } + + ctx.JSON(http.StatusOK, &res) +} + +func GetRunner(ctx *context.APIContext, ownerID, repoID, runnerID int64) { + runner, exists, err := db.GetByID[actions_model.ActionRunner](ctx, runnerID) + if err != nil { + ctx.APIErrorInternal(err) + return + } + if !exists { + ctx.APIErrorNotFound("Runner does not exist") + return + } + if !runner.Editable(ownerID, repoID) { + ctx.APIErrorNotFound("No permission to get this runner") + return + } + ctx.JSON(http.StatusOK, convert.ToActionRunner(ctx, runner)) +} + +func DeleteRunner(ctx *context.APIContext, ownerID, repoID, runnerID int64) { + runner, exists, err := db.GetByID[actions_model.ActionRunner](ctx, runnerID) + if err != nil { + ctx.APIErrorInternal(err) + return + } + if !exists { + ctx.APIErrorNotFound("Runner does not exist") + return + } + if !runner.Editable(ownerID, repoID) { + ctx.APIErrorNotFound("No permission to delete this runner") + return + } + if runner.Status() == runnerv1.RunnerStatus_RUNNER_STATUS_ACTIVE { + ctx.APIError(http.StatusConflict, "Runner is active") + return + } + err = actions_model.DeleteRunner(ctx, runner.ID) + if err != nil { + ctx.APIErrorInternal(err) + } + ctx.Status(http.StatusNoContent) +} diff --git a/services/actions/interface.go b/services/actions/interface.go index d4fa782fec797..4a6e4455ff443 100644 --- a/services/actions/interface.go +++ b/services/actions/interface.go @@ -25,4 +25,7 @@ type API interface { UpdateVariable(*context.APIContext) // GetRegistrationToken get registration token GetRegistrationToken(*context.APIContext) + GetRunners(*context.APIContext) + GetRunner(*context.APIContext) + DeleteRunner(*context.APIContext) } diff --git a/services/convert/convert.go b/services/convert/convert.go index ac2680766c040..e9109763a8c5f 100644 --- a/services/convert/convert.go +++ b/services/convert/convert.go @@ -11,6 +11,7 @@ import ( "strings" "time" + runnerv1 "code.gitea.io/actions-proto-go/runner/v1" actions_model "code.gitea.io/gitea/models/actions" asymkey_model "code.gitea.io/gitea/models/asymkey" "code.gitea.io/gitea/models/auth" @@ -252,6 +253,31 @@ func ToActionArtifact(repo *repo_model.Repository, art *actions_model.ActionArti }, nil } +func ToActionRunner(ctx context.Context, runner *actions_model.ActionRunner) *api.ActionRunner { + status := runner.Status() + apiStatus := "offline" + if runner.IsOnline() { + apiStatus = "online" + } + labels := make([]*api.ActionRunnerLabel, len(runner.AgentLabels)) + for i, label := range runner.AgentLabels { + labels = append(labels, &api.ActionRunnerLabel{ + ID: int64(i), + Name: label, + Type: "custom", + }) + } + return &api.ActionRunner{ + ID: runner.ID, + Name: runner.Name, + OS: "Unknown", + Status: apiStatus, + Busy: status == runnerv1.RunnerStatus_RUNNER_STATUS_ACTIVE, + Ephemeral: runner.Ephemeral, + Labels: labels, + } +} + // ToVerification convert a git.Commit.Signature to an api.PayloadCommitVerification func ToVerification(ctx context.Context, c *git.Commit) *api.PayloadCommitVerification { verif := asymkey_service.ParseCommitWithSignature(ctx, c) From e2d9774866cc8699d077a9962a12865aa591d391 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Sun, 2 Mar 2025 12:41:25 +0100 Subject: [PATCH 02/21] fix null labels --- services/convert/convert.go | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/services/convert/convert.go b/services/convert/convert.go index e9109763a8c5f..31d27c96005c4 100644 --- a/services/convert/convert.go +++ b/services/convert/convert.go @@ -261,11 +261,11 @@ func ToActionRunner(ctx context.Context, runner *actions_model.ActionRunner) *ap } labels := make([]*api.ActionRunnerLabel, len(runner.AgentLabels)) for i, label := range runner.AgentLabels { - labels = append(labels, &api.ActionRunnerLabel{ + labels[i] = &api.ActionRunnerLabel{ ID: int64(i), Name: label, Type: "custom", - }) + } } return &api.ActionRunner{ ID: runner.ID, From f37caabdc469e0338dd6bdd74d2ff1ad85b0e825 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Sun, 2 Mar 2025 17:26:33 +0100 Subject: [PATCH 03/21] fix removed runner could still be retrieved via get --- routers/api/v1/shared/runners.go | 14 +++----------- 1 file changed, 3 insertions(+), 11 deletions(-) diff --git a/routers/api/v1/shared/runners.go b/routers/api/v1/shared/runners.go index 7e7296a96f9ef..1a1307ea42e49 100644 --- a/routers/api/v1/shared/runners.go +++ b/routers/api/v1/shared/runners.go @@ -59,13 +59,9 @@ func GetRunners(ctx *context.APIContext, ownerID, repoID int64) { } func GetRunner(ctx *context.APIContext, ownerID, repoID, runnerID int64) { - runner, exists, err := db.GetByID[actions_model.ActionRunner](ctx, runnerID) + runner, err := actions_model.GetRunnerByID(ctx, runnerID) if err != nil { - ctx.APIErrorInternal(err) - return - } - if !exists { - ctx.APIErrorNotFound("Runner does not exist") + ctx.APIErrorNotFound(err) return } if !runner.Editable(ownerID, repoID) { @@ -76,15 +72,11 @@ func GetRunner(ctx *context.APIContext, ownerID, repoID, runnerID int64) { } func DeleteRunner(ctx *context.APIContext, ownerID, repoID, runnerID int64) { - runner, exists, err := db.GetByID[actions_model.ActionRunner](ctx, runnerID) + runner, err := actions_model.GetRunnerByID(ctx, runnerID) if err != nil { ctx.APIErrorInternal(err) return } - if !exists { - ctx.APIErrorNotFound("Runner does not exist") - return - } if !runner.Editable(ownerID, repoID) { ctx.APIErrorNotFound("No permission to delete this runner") return From 0655965d70874d1fc74958875accdd98223c9f2e Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Wed, 12 Mar 2025 17:57:56 +0100 Subject: [PATCH 04/21] add swagger docu / fix build --- routers/api/v1/org/action.go | 67 +++++++++ routers/api/v1/repo/action.go | 82 +++++++++++ routers/api/v1/swagger/repo.go | 14 ++ services/convert/convert.go | 2 +- templates/swagger/v1_json.tmpl | 246 +++++++++++++++++++++++++++++++++ 5 files changed, 410 insertions(+), 1 deletion(-) diff --git a/routers/api/v1/org/action.go b/routers/api/v1/org/action.go index da58042c1fb0f..5ba96a579896f 100644 --- a/routers/api/v1/org/action.go +++ b/routers/api/v1/org/action.go @@ -466,15 +466,82 @@ func (Action) UpdateVariable(ctx *context.APIContext) { ctx.Status(http.StatusNoContent) } +// GetRunners get org-level runners func (Action) GetRunners(ctx *context.APIContext) { + // swagger:operation GET /orgs/{org}/actions/runners organization getRunners + // --- + // summary: Get org-level runners + // produces: + // - application/json + // parameters: + // - name: org + // in: path + // description: name of the organization + // type: string + // required: true + // responses: + // "200": + // "$ref": "#/definitions/RunnerList" + // "400": + // "$ref": "#/responses/error" + // "404": + // "$ref": "#/responses/notFound" shared.GetRunners(ctx, ctx.Org.Organization.ID, 0) } +// GetRunner get an org-level runner func (Action) GetRunner(ctx *context.APIContext) { + // swagger:operation GET /orgs/{org}/actions/runners/{runner_id} organization getRunner + // --- + // summary: Get an org-level runner + // produces: + // - application/json + // parameters: + // - name: org + // in: path + // description: name of the organization + // type: string + // required: true + // - name: runner_id + // in: path + // description: id of the runner + // type: string + // required: true + // responses: + // "200": + // "$ref": "#/definitions/Runner" + // "400": + // "$ref": "#/responses/error" + // "404": + // "$ref": "#/responses/notFound" shared.GetRunner(ctx, ctx.Org.Organization.ID, 0, ctx.PathParamInt64("runner_id")) } +// DeleteRunner delete an org-level runner func (Action) DeleteRunner(ctx *context.APIContext) { + // swagger:operation GET /orgs/{org}/actions/runners/{runner_id} organization deleteRunner + // --- + // summary: Delete an org-level runner + // produces: + // - application/json + // parameters: + // - name: org + // in: path + // description: name of the organization + // type: string + // required: true + // - name: runner_id + // in: path + // description: id of the runner + // type: string + // required: true + // responses: + // "204": + // description: runner has been deleted + // "400": + // "$ref": "#/responses/error" + // "404": + // "$ref": "#/responses/notFound" shared.DeleteRunner(ctx, ctx.Org.Organization.ID, 0, ctx.PathParamInt64("runner_id")) } diff --git a/routers/api/v1/repo/action.go b/routers/api/v1/repo/action.go index 5afb495a4a775..41ac021980157 100644 --- a/routers/api/v1/repo/action.go +++ b/routers/api/v1/repo/action.go @@ -526,15 +526,97 @@ func (Action) GetRegistrationToken(ctx *context.APIContext) { shared.GetRegistrationToken(ctx, 0, ctx.Repo.Repository.ID) } +// GetRunners get repo-level runners func (Action) GetRunners(ctx *context.APIContext) { + // swagger:operation GET /repos/{owner}/{repo}/actions/runners organization getRunners + // --- + // summary: Get repo-level runners + // produces: + // - application/json + // parameters: + // - name: owner + // in: path + // description: owner of the repo + // type: string + // required: true + // - name: repo + // in: path + // description: name of the repo + // type: string + // required: true + // responses: + // "200": + // "$ref": "#/definitions/RunnerList" + // "400": + // "$ref": "#/responses/error" + // "404": + // "$ref": "#/responses/notFound" shared.GetRunners(ctx, 0, ctx.Repo.Repository.ID) } +// GetRunner get an repo-level runner func (Action) GetRunner(ctx *context.APIContext) { + // swagger:operation GET /repos/{owner}/{repo}/actions/runners/{runner_id} organization getRunner + // --- + // summary: Get an repo-level runner + // produces: + // - application/json + // parameters: + // - name: owner + // in: path + // description: owner of the repo + // type: string + // required: true + // - name: repo + // in: path + // description: name of the repo + // type: string + // required: true + // - name: runner_id + // in: path + // description: id of the runner + // type: string + // required: true + // responses: + // "200": + // "$ref": "#/definitions/Runner" + // "400": + // "$ref": "#/responses/error" + // "404": + // "$ref": "#/responses/notFound" shared.GetRunner(ctx, 0, ctx.Repo.Repository.ID, ctx.PathParamInt64("runner_id")) } +// DeleteRunner delete an repo-level runner func (Action) DeleteRunner(ctx *context.APIContext) { + // swagger:operation GET /repos/{owner}/{repo}/actions/runners/{runner_id} organization deleteRunner + // --- + // summary: Delete an repo-level runner + // produces: + // - application/json + // parameters: + // - name: owner + // in: path + // description: owner of the repo + // type: string + // required: true + // - name: repo + // in: path + // description: name of the repo + // type: string + // required: true + // - name: runner_id + // in: path + // description: id of the runner + // type: string + // required: true + // responses: + // "204": + // description: runner has been deleted + // "400": + // "$ref": "#/responses/error" + // "404": + // "$ref": "#/responses/notFound" shared.DeleteRunner(ctx, 0, ctx.Repo.Repository.ID, ctx.PathParamInt64("runner_id")) } diff --git a/routers/api/v1/swagger/repo.go b/routers/api/v1/swagger/repo.go index 25f137f3bf84b..df0c8a805aaea 100644 --- a/routers/api/v1/swagger/repo.go +++ b/routers/api/v1/swagger/repo.go @@ -457,6 +457,20 @@ type swaggerRepoArtifact struct { Body api.ActionArtifact `json:"body"` } +// RunnerList +// swagger:response RunnerList +type swaggerRunnerList struct { + // in:body + Body api.ActionRunnersResponse `json:"body"` +} + +// Runner +// swagger:response Runner +type swaggerRunner struct { + // in:body + Body api.ActionRunner `json:"body"` +} + // swagger:response Compare type swaggerCompare struct { // in:body diff --git a/services/convert/convert.go b/services/convert/convert.go index 31d27c96005c4..c11ffdfe3533b 100644 --- a/services/convert/convert.go +++ b/services/convert/convert.go @@ -273,7 +273,7 @@ func ToActionRunner(ctx context.Context, runner *actions_model.ActionRunner) *ap OS: "Unknown", Status: apiStatus, Busy: status == runnerv1.RunnerStatus_RUNNER_STATUS_ACTIVE, - Ephemeral: runner.Ephemeral, + Ephemeral: false, // TODO runner.Ephemeral Labels: labels, } } diff --git a/templates/swagger/v1_json.tmpl b/templates/swagger/v1_json.tmpl index 48ed958ca2fa7..daa8ec9331e71 100644 --- a/templates/swagger/v1_json.tmpl +++ b/templates/swagger/v1_json.tmpl @@ -1697,6 +1697,38 @@ } } }, + "/orgs/{org}/actions/runners": { + "get": { + "produces": [ + "application/json" + ], + "tags": [ + "organization" + ], + "summary": "Get org-level runners", + "operationId": "getRunners", + "parameters": [ + { + "type": "string", + "description": "name of the organization", + "name": "org", + "in": "path", + "required": true + } + ], + "responses": { + "200": { + "$ref": "#/definitions/RunnerList" + }, + "400": { + "$ref": "#/responses/error" + }, + "404": { + "$ref": "#/responses/notFound" + } + } + } + }, "/orgs/{org}/actions/runners/registration-token": { "get": { "produces": [ @@ -1723,6 +1755,45 @@ } } }, + "/orgs/{org}/actions/runners/{runner_id}": { + "get": { + "produces": [ + "application/json" + ], + "tags": [ + "organization" + ], + "summary": "Delete an org-level runner", + "operationId": "deleteRunner", + "parameters": [ + { + "type": "string", + "description": "name of the organization", + "name": "org", + "in": "path", + "required": true + }, + { + "type": "string", + "description": "id of the runner", + "name": "runner_id", + "in": "path", + "required": true + } + ], + "responses": { + "204": { + "description": "runner has been deleted" + }, + "400": { + "$ref": "#/responses/error" + }, + "404": { + "$ref": "#/responses/notFound" + } + } + } + }, "/orgs/{org}/actions/secrets": { "get": { "produces": [ @@ -4187,6 +4258,45 @@ } } }, + "/repos/{owner}/{repo}/actions/runners": { + "get": { + "produces": [ + "application/json" + ], + "tags": [ + "organization" + ], + "summary": "Get repo-level runners", + "operationId": "getRunners", + "parameters": [ + { + "type": "string", + "description": "owner of the repo", + "name": "owner", + "in": "path", + "required": true + }, + { + "type": "string", + "description": "name of the repo", + "name": "repo", + "in": "path", + "required": true + } + ], + "responses": { + "200": { + "$ref": "#/definitions/RunnerList" + }, + "400": { + "$ref": "#/responses/error" + }, + "404": { + "$ref": "#/responses/notFound" + } + } + } + }, "/repos/{owner}/{repo}/actions/runners/registration-token": { "get": { "produces": [ @@ -4220,6 +4330,52 @@ } } }, + "/repos/{owner}/{repo}/actions/runners/{runner_id}": { + "get": { + "produces": [ + "application/json" + ], + "tags": [ + "organization" + ], + "summary": "Delete an repo-level runner", + "operationId": "deleteRunner", + "parameters": [ + { + "type": "string", + "description": "owner of the repo", + "name": "owner", + "in": "path", + "required": true + }, + { + "type": "string", + "description": "name of the repo", + "name": "repo", + "in": "path", + "required": true + }, + { + "type": "string", + "description": "id of the runner", + "name": "runner_id", + "in": "path", + "required": true + } + ], + "responses": { + "204": { + "description": "runner has been deleted" + }, + "400": { + "$ref": "#/responses/error" + }, + "404": { + "$ref": "#/responses/notFound" + } + } + } + }, "/repos/{owner}/{repo}/actions/runs/{run}/artifacts": { "get": { "produces": [ @@ -19233,6 +19389,84 @@ }, "x-go-package": "code.gitea.io/gitea/modules/structs" }, + "ActionRunner": { + "description": "ActionRunner represents a Runner", + "type": "object", + "properties": { + "busy": { + "type": "boolean", + "x-go-name": "Busy" + }, + "ephemeral": { + "type": "boolean", + "x-go-name": "Ephemeral" + }, + "id": { + "type": "integer", + "format": "int64", + "x-go-name": "ID" + }, + "labels": { + "type": "array", + "items": { + "$ref": "#/definitions/ActionRunnerLabel" + }, + "x-go-name": "Labels" + }, + "name": { + "type": "string", + "x-go-name": "Name" + }, + "os": { + "type": "string", + "x-go-name": "OS" + }, + "status": { + "type": "string", + "x-go-name": "Status" + } + }, + "x-go-package": "code.gitea.io/gitea/modules/structs" + }, + "ActionRunnerLabel": { + "description": "ActionRunnerLabel represents a Runner Label", + "type": "object", + "properties": { + "id": { + "type": "integer", + "format": "int64", + "x-go-name": "ID" + }, + "name": { + "type": "string", + "x-go-name": "Name" + }, + "type": { + "type": "string", + "x-go-name": "Type" + } + }, + "x-go-package": "code.gitea.io/gitea/modules/structs" + }, + "ActionRunnersResponse": { + "description": "ActionRunnersResponse returns Runners", + "type": "object", + "properties": { + "runners": { + "type": "array", + "items": { + "$ref": "#/definitions/ActionRunner" + }, + "x-go-name": "Entries" + }, + "total_count": { + "type": "integer", + "format": "int64", + "x-go-name": "TotalCount" + } + }, + "x-go-package": "code.gitea.io/gitea/modules/structs" + }, "ActionTask": { "description": "ActionTask represents a ActionTask", "type": "object", @@ -27229,6 +27463,18 @@ } } }, + "Runner": { + "description": "Runner", + "schema": { + "$ref": "#/definitions/ActionRunner" + } + }, + "RunnerList": { + "description": "RunnerList", + "schema": { + "$ref": "#/definitions/ActionRunnersResponse" + } + }, "SearchResults": { "description": "SearchResults", "schema": { From f1de208513b0cc7c97a522ab982d30141d0fb5f0 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Thu, 13 Mar 2025 21:15:46 +0100 Subject: [PATCH 05/21] add admin / user level + api add correct registration token endpoint --- options/locale/locale_en-US.ini | 1 + routers/api/v1/admin/runners.go | 78 ++++++ routers/api/v1/api.go | 13 +- routers/api/v1/org/action.go | 29 ++- routers/api/v1/repo/action.go | 33 ++- routers/api/v1/shared/runners.go | 12 +- routers/api/v1/user/runners.go | 78 ++++++ routers/web/shared/actions/runners.go | 17 ++ services/actions/interface.go | 7 +- templates/swagger/v1_json.tmpl | 338 ++++++++++++++++++++++++++ 10 files changed, 593 insertions(+), 13 deletions(-) diff --git a/options/locale/locale_en-US.ini b/options/locale/locale_en-US.ini index 2f13c1a19c645..4c9fd5c3aa0c9 100644 --- a/options/locale/locale_en-US.ini +++ b/options/locale/locale_en-US.ini @@ -3756,6 +3756,7 @@ runners.update_runner_failed = Failed to update runner runners.delete_runner = Delete this runner runners.delete_runner_success = Runner deleted successfully runners.delete_runner_failed = Failed to delete runner +runners.delete_runner_failed_runner_active = Failed to delete active runner runners.delete_runner_header = Confirm to delete this runner runners.delete_runner_notice = If a task is running on this runner, it will be terminated and mark as failed. It may break building workflow. runners.none = No runners available diff --git a/routers/api/v1/admin/runners.go b/routers/api/v1/admin/runners.go index 329242d9f6ee5..26b9e2c3805e0 100644 --- a/routers/api/v1/admin/runners.go +++ b/routers/api/v1/admin/runners.go @@ -24,3 +24,81 @@ func GetRegistrationToken(ctx *context.APIContext) { shared.GetRegistrationToken(ctx, 0, 0) } + +// CreateRegistrationToken returns the token to register global runners +func CreateRegistrationToken(ctx *context.APIContext) { + // swagger:operation POST /admin/actions/runners/registration-token admin adminCreateRunnerRegistrationToken + // --- + // summary: Get an global actions runner registration token + // produces: + // - application/json + // parameters: + // responses: + // "200": + // "$ref": "#/responses/RegistrationToken" + + shared.GetRegistrationToken(ctx, 0, 0) +} + +// ListRunners get global runners +func ListRunners(ctx *context.APIContext) { + // swagger:operation GET /admin/actions/runners admin getRunners + // --- + // summary: Get global runners + // produces: + // - application/json + // responses: + // "200": + // "$ref": "#/definitions/RunnerList" + // "400": + // "$ref": "#/responses/error" + // "404": + // "$ref": "#/responses/notFound" + shared.ListRunners(ctx, 0, 0) +} + +// GetRunner get an global runner +func GetRunner(ctx *context.APIContext) { + // swagger:operation GET /admin/actions/runners/{runner_id} admin getRunner + // --- + // summary: Get an global runner + // produces: + // - application/json + // parameters: + // - name: runner_id + // in: path + // description: id of the runner + // type: string + // required: true + // responses: + // "200": + // "$ref": "#/definitions/Runner" + // "400": + // "$ref": "#/responses/error" + // "404": + // "$ref": "#/responses/notFound" + shared.GetRunner(ctx, 0, 0, ctx.PathParamInt64("runner_id")) +} + +// DeleteRunner delete an global runner +func DeleteRunner(ctx *context.APIContext) { + // swagger:operation DELETE /admin/actions/runners/{runner_id} admin deleteRunner + // --- + // summary: Delete an global runner + // produces: + // - application/json + // parameters: + // - name: runner_id + // in: path + // description: id of the runner + // type: string + // required: true + // responses: + // "204": + // description: runner has been deleted + // "400": + // "$ref": "#/responses/error" + // "404": + // "$ref": "#/responses/notFound" + shared.DeleteRunner(ctx, 0, 0, ctx.PathParamInt64("runner_id")) +} diff --git a/routers/api/v1/api.go b/routers/api/v1/api.go index 808fc24406e9e..f520096f6d0ee 100644 --- a/routers/api/v1/api.go +++ b/routers/api/v1/api.go @@ -912,8 +912,9 @@ func Routes() *web.Router { }) m.Group("/runners", func() { - m.Get("", reqToken(), reqChecker, act.GetRunners) + m.Get("", reqToken(), reqChecker, act.ListRunners) m.Get("/registration-token", reqToken(), reqChecker, act.GetRegistrationToken) + m.Get("/registration-token", reqToken(), reqChecker, act.CreateRegistrationToken) m.Get("/{runner_id}", reqToken(), reqChecker, act.GetRunner) m.Delete("/{runner_id}", reqToken(), reqChecker, act.DeleteRunner) }) @@ -1046,7 +1047,11 @@ func Routes() *web.Router { }) m.Group("/runners", func() { + m.Get("", reqToken(), user.ListRunners) m.Get("/registration-token", reqToken(), user.GetRegistrationToken) + m.Post("/registration-token", reqToken(), user.CreateRegistrationToken) + m.Get("/{runner_id}", reqToken(), user.GetRunner) + m.Delete("/{runner_id}", reqToken(), user.DeleteRunner) }) }) @@ -1683,6 +1688,12 @@ func Routes() *web.Router { Patch(bind(api.EditHookOption{}), admin.EditHook). Delete(admin.DeleteHook) }) + m.Group("/actions/runners", func() { + m.Get("", admin.ListRunners) + m.Post("/registration-token", admin.CreateRegistrationToken) + m.Get("/{runner_id}", admin.GetRunner) + m.Delete("/{runner_id}", admin.DeleteRunner) + }) m.Group("/runners", func() { m.Get("/registration-token", admin.GetRegistrationToken) }) diff --git a/routers/api/v1/org/action.go b/routers/api/v1/org/action.go index 5ba96a579896f..6f33cad4dc916 100644 --- a/routers/api/v1/org/action.go +++ b/routers/api/v1/org/action.go @@ -189,6 +189,27 @@ func (Action) GetRegistrationToken(ctx *context.APIContext) { shared.GetRegistrationToken(ctx, ctx.Org.Organization.ID, 0) } +// https://docs.github.com/en/rest/actions/self-hosted-runners?apiVersion=2022-11-28#create-a-registration-token-for-an-organization +// CreateRegistrationToken returns the token to register org runners +func (Action) CreateRegistrationToken(ctx *context.APIContext) { + // swagger:operation POST /orgs/{org}/actions/runners/registration-token organization orgCreateRunnerRegistrationToken + // --- + // summary: Get an organization's actions runner registration token + // produces: + // - application/json + // parameters: + // - name: org + // in: path + // description: name of the organization + // type: string + // required: true + // responses: + // "200": + // "$ref": "#/responses/RegistrationToken" + + shared.GetRegistrationToken(ctx, ctx.Org.Organization.ID, 0) +} + // ListVariables list org-level variables func (Action) ListVariables(ctx *context.APIContext) { // swagger:operation GET /orgs/{org}/actions/variables organization getOrgVariablesList @@ -466,8 +487,8 @@ func (Action) UpdateVariable(ctx *context.APIContext) { ctx.Status(http.StatusNoContent) } -// GetRunners get org-level runners -func (Action) GetRunners(ctx *context.APIContext) { +// ListRunners get org-level runners +func (Action) ListRunners(ctx *context.APIContext) { // swagger:operation GET /orgs/{org}/actions/runners organization getRunners // --- // summary: Get org-level runners @@ -486,7 +507,7 @@ func (Action) GetRunners(ctx *context.APIContext) { // "$ref": "#/responses/error" // "404": // "$ref": "#/responses/notFound" - shared.GetRunners(ctx, ctx.Org.Organization.ID, 0) + shared.ListRunners(ctx, ctx.Org.Organization.ID, 0) } // GetRunner get an org-level runner @@ -519,7 +540,7 @@ func (Action) GetRunner(ctx *context.APIContext) { // DeleteRunner delete an org-level runner func (Action) DeleteRunner(ctx *context.APIContext) { - // swagger:operation GET /orgs/{org}/actions/runners/{runner_id} organization deleteRunner + // swagger:operation DELETE /orgs/{org}/actions/runners/{runner_id} organization deleteRunner // --- // summary: Delete an org-level runner // produces: diff --git a/routers/api/v1/repo/action.go b/routers/api/v1/repo/action.go index 41ac021980157..e9b1af6160e98 100644 --- a/routers/api/v1/repo/action.go +++ b/routers/api/v1/repo/action.go @@ -526,8 +526,33 @@ func (Action) GetRegistrationToken(ctx *context.APIContext) { shared.GetRegistrationToken(ctx, 0, ctx.Repo.Repository.ID) } -// GetRunners get repo-level runners -func (Action) GetRunners(ctx *context.APIContext) { +// CreateRegistrationToken returns the token to register repo runners +func (Action) CreateRegistrationToken(ctx *context.APIContext) { + // swagger:operation POST /repos/{owner}/{repo}/actions/runners/registration-token repository repoCreateRunnerRegistrationToken + // --- + // summary: Get a repository's actions runner registration token + // produces: + // - application/json + // parameters: + // - name: owner + // in: path + // description: owner of the repo + // type: string + // required: true + // - name: repo + // in: path + // description: name of the repo + // type: string + // required: true + // responses: + // "200": + // "$ref": "#/responses/RegistrationToken" + + shared.GetRegistrationToken(ctx, 0, ctx.Repo.Repository.ID) +} + +// ListRunners get repo-level runners +func (Action) ListRunners(ctx *context.APIContext) { // swagger:operation GET /repos/{owner}/{repo}/actions/runners organization getRunners // --- // summary: Get repo-level runners @@ -551,7 +576,7 @@ func (Action) GetRunners(ctx *context.APIContext) { // "$ref": "#/responses/error" // "404": // "$ref": "#/responses/notFound" - shared.GetRunners(ctx, 0, ctx.Repo.Repository.ID) + shared.ListRunners(ctx, 0, ctx.Repo.Repository.ID) } // GetRunner get an repo-level runner @@ -589,7 +614,7 @@ func (Action) GetRunner(ctx *context.APIContext) { // DeleteRunner delete an repo-level runner func (Action) DeleteRunner(ctx *context.APIContext) { - // swagger:operation GET /repos/{owner}/{repo}/actions/runners/{runner_id} organization deleteRunner + // swagger:operation DELETE /repos/{owner}/{repo}/actions/runners/{runner_id} organization deleteRunner // --- // summary: Delete an repo-level runner // produces: diff --git a/routers/api/v1/shared/runners.go b/routers/api/v1/shared/runners.go index 1a1307ea42e49..aff0eddcb7869 100644 --- a/routers/api/v1/shared/runners.go +++ b/routers/api/v1/shared/runners.go @@ -7,7 +7,6 @@ import ( "errors" "net/http" - runnerv1 "code.gitea.io/actions-proto-go/runner/v1" actions_model "code.gitea.io/gitea/models/actions" "code.gitea.io/gitea/models/db" api "code.gitea.io/gitea/modules/structs" @@ -15,6 +14,7 @@ import ( "code.gitea.io/gitea/routers/api/v1/utils" "code.gitea.io/gitea/services/context" "code.gitea.io/gitea/services/convert" + "xorm.io/builder" ) // RegistrationToken is response related to registration token @@ -36,7 +36,7 @@ func GetRegistrationToken(ctx *context.APIContext, ownerID, repoID int64) { ctx.JSON(http.StatusOK, RegistrationToken{Token: token.Token}) } -func GetRunners(ctx *context.APIContext, ownerID, repoID int64) { +func ListRunners(ctx *context.APIContext, ownerID, repoID int64) { runners, total, err := db.FindAndCount[actions_model.ActionRunner](ctx, &actions_model.FindRunnerOptions{ OwnerID: ownerID, RepoID: repoID, @@ -81,10 +81,16 @@ func DeleteRunner(ctx *context.APIContext, ownerID, repoID, runnerID int64) { ctx.APIErrorNotFound("No permission to delete this runner") return } - if runner.Status() == runnerv1.RunnerStatus_RUNNER_STATUS_ACTIVE { + exist, err := db.Exist[actions_model.ActionTask](ctx, builder.Eq{"`runner_id`": runner.ID}.And(builder.In("`status`", actions_model.StatusWaiting, actions_model.StatusRunning, actions_model.StatusBlocked))) + if err != nil { + ctx.APIErrorInternal(err) + return + } + if exist { ctx.APIError(http.StatusConflict, "Runner is active") return } + err = actions_model.DeleteRunner(ctx, runner.ID) if err != nil { ctx.APIErrorInternal(err) diff --git a/routers/api/v1/user/runners.go b/routers/api/v1/user/runners.go index 899218473ee31..a31210f0b0b6e 100644 --- a/routers/api/v1/user/runners.go +++ b/routers/api/v1/user/runners.go @@ -24,3 +24,81 @@ func GetRegistrationToken(ctx *context.APIContext) { shared.GetRegistrationToken(ctx, ctx.Doer.ID, 0) } + +// CreateRegistrationToken returns the token to register user runners +func CreateRegistrationToken(ctx *context.APIContext) { + // swagger:operation POST /user/actions/runners/registration-token user userCreateRunnerRegistrationToken + // --- + // summary: Get an user's actions runner registration token + // produces: + // - application/json + // parameters: + // responses: + // "200": + // "$ref": "#/responses/RegistrationToken" + + shared.GetRegistrationToken(ctx, ctx.Doer.ID, 0) +} + +// ListRunners get user-level runners +func ListRunners(ctx *context.APIContext) { + // swagger:operation GET /user/actions/runners user getRunners + // --- + // summary: Get user-level runners + // produces: + // - application/json + // responses: + // "200": + // "$ref": "#/definitions/RunnerList" + // "400": + // "$ref": "#/responses/error" + // "404": + // "$ref": "#/responses/notFound" + shared.ListRunners(ctx, ctx.Doer.ID, 0) +} + +// GetRunner get an user-level runner +func GetRunner(ctx *context.APIContext) { + // swagger:operation GET /user/actions/runners/{runner_id} user getRunner + // --- + // summary: Get an user-level runner + // produces: + // - application/json + // parameters: + // - name: runner_id + // in: path + // description: id of the runner + // type: string + // required: true + // responses: + // "200": + // "$ref": "#/definitions/Runner" + // "400": + // "$ref": "#/responses/error" + // "404": + // "$ref": "#/responses/notFound" + shared.GetRunner(ctx, ctx.Doer.ID, 0, ctx.PathParamInt64("runner_id")) +} + +// DeleteRunner delete an user-level runner +func DeleteRunner(ctx *context.APIContext) { + // swagger:operation DELETE /user/actions/runners/{runner_id} user deleteRunner + // --- + // summary: Delete an user-level runner + // produces: + // - application/json + // parameters: + // - name: runner_id + // in: path + // description: id of the runner + // type: string + // required: true + // responses: + // "204": + // description: runner has been deleted + // "400": + // "$ref": "#/responses/error" + // "404": + // "$ref": "#/responses/notFound" + shared.DeleteRunner(ctx, ctx.Doer.ID, 0, ctx.PathParamInt64("runner_id")) +} diff --git a/routers/web/shared/actions/runners.go b/routers/web/shared/actions/runners.go index 444bd960db58d..5aa550126a575 100644 --- a/routers/web/shared/actions/runners.go +++ b/routers/web/shared/actions/runners.go @@ -18,6 +18,7 @@ import ( shared_user "code.gitea.io/gitea/routers/web/shared/user" "code.gitea.io/gitea/services/context" "code.gitea.io/gitea/services/forms" + "xorm.io/builder" ) const ( @@ -313,6 +314,22 @@ func RunnerDeletePost(ctx *context.Context) { successRedirectTo := rCtx.RedirectLink failedRedirectTo := rCtx.RedirectLink + url.PathEscape(ctx.PathParam("runnerid")) + exist, err := db.Exist[actions_model.ActionTask](ctx, builder.Eq{"`runner_id`": runner.ID}.And(builder.In("`status`", actions_model.StatusWaiting, actions_model.StatusRunning, actions_model.StatusBlocked))) + if err != nil { + log.Warn("DeleteRunnerPost.Exist failed: %v, url: %s", err, ctx.Req.URL) + ctx.Flash.Warning(ctx.Tr("actions.runners.delete_runner_failed")) + + ctx.JSONRedirect(failedRedirectTo) + return + } + if exist { + log.Warn("DeleteRunnerPost.Exist failed: cannot delete active runner") + ctx.Flash.Warning(ctx.Tr("actions.runners.delete_runner_failed_runner_active")) + + ctx.JSONRedirect(failedRedirectTo) + return + } + if err := actions_model.DeleteRunner(ctx, runner.ID); err != nil { log.Warn("DeleteRunnerPost.UpdateRunner failed: %v, url: %s", err, ctx.Req.URL) ctx.Flash.Warning(ctx.Tr("actions.runners.delete_runner_failed")) diff --git a/services/actions/interface.go b/services/actions/interface.go index 4a6e4455ff443..b407f5c6c84bd 100644 --- a/services/actions/interface.go +++ b/services/actions/interface.go @@ -25,7 +25,12 @@ type API interface { UpdateVariable(*context.APIContext) // GetRegistrationToken get registration token GetRegistrationToken(*context.APIContext) - GetRunners(*context.APIContext) + // CreateRegistrationToken get registration token + CreateRegistrationToken(*context.APIContext) + // ListRunners list runners + ListRunners(*context.APIContext) + // GetRunner get a runner GetRunner(*context.APIContext) + // DeleteRunner delete runner DeleteRunner(*context.APIContext) } diff --git a/templates/swagger/v1_json.tmpl b/templates/swagger/v1_json.tmpl index daa8ec9331e71..8384f6f056c20 100644 --- a/templates/swagger/v1_json.tmpl +++ b/templates/swagger/v1_json.tmpl @@ -75,6 +75,108 @@ } } }, + "/admin/actions/runners": { + "get": { + "produces": [ + "application/json" + ], + "tags": [ + "admin" + ], + "summary": "Get global runners", + "operationId": "getRunners", + "responses": { + "200": { + "$ref": "#/definitions/RunnerList" + }, + "400": { + "$ref": "#/responses/error" + }, + "404": { + "$ref": "#/responses/notFound" + } + } + } + }, + "/admin/actions/runners/registration-token": { + "post": { + "produces": [ + "application/json" + ], + "tags": [ + "admin" + ], + "summary": "Get an global actions runner registration token", + "operationId": "adminCreateRunnerRegistrationToken", + "responses": { + "200": { + "$ref": "#/responses/RegistrationToken" + } + } + } + }, + "/admin/actions/runners/{runner_id}": { + "get": { + "produces": [ + "application/json" + ], + "tags": [ + "admin" + ], + "summary": "Get an global runner", + "operationId": "getRunner", + "parameters": [ + { + "type": "string", + "description": "id of the runner", + "name": "runner_id", + "in": "path", + "required": true + } + ], + "responses": { + "200": { + "$ref": "#/definitions/Runner" + }, + "400": { + "$ref": "#/responses/error" + }, + "404": { + "$ref": "#/responses/notFound" + } + } + }, + "delete": { + "produces": [ + "application/json" + ], + "tags": [ + "admin" + ], + "summary": "Delete an global runner", + "operationId": "deleteRunner", + "parameters": [ + { + "type": "string", + "description": "id of the runner", + "name": "runner_id", + "in": "path", + "required": true + } + ], + "responses": { + "204": { + "description": "runner has been deleted" + }, + "400": { + "$ref": "#/responses/error" + }, + "404": { + "$ref": "#/responses/notFound" + } + } + } + }, "/admin/cron": { "get": { "produces": [ @@ -1753,10 +1855,71 @@ "$ref": "#/responses/RegistrationToken" } } + }, + "post": { + "produces": [ + "application/json" + ], + "tags": [ + "organization" + ], + "summary": "Get an organization's actions runner registration token", + "operationId": "orgCreateRunnerRegistrationToken", + "parameters": [ + { + "type": "string", + "description": "name of the organization", + "name": "org", + "in": "path", + "required": true + } + ], + "responses": { + "200": { + "$ref": "#/responses/RegistrationToken" + } + } } }, "/orgs/{org}/actions/runners/{runner_id}": { "get": { + "produces": [ + "application/json" + ], + "tags": [ + "organization" + ], + "summary": "Get an org-level runner", + "operationId": "getRunner", + "parameters": [ + { + "type": "string", + "description": "name of the organization", + "name": "org", + "in": "path", + "required": true + }, + { + "type": "string", + "description": "id of the runner", + "name": "runner_id", + "in": "path", + "required": true + } + ], + "responses": { + "200": { + "$ref": "#/definitions/Runner" + }, + "400": { + "$ref": "#/responses/error" + }, + "404": { + "$ref": "#/responses/notFound" + } + } + }, + "delete": { "produces": [ "application/json" ], @@ -4328,10 +4491,85 @@ "$ref": "#/responses/RegistrationToken" } } + }, + "post": { + "produces": [ + "application/json" + ], + "tags": [ + "repository" + ], + "summary": "Get a repository's actions runner registration token", + "operationId": "repoCreateRunnerRegistrationToken", + "parameters": [ + { + "type": "string", + "description": "owner of the repo", + "name": "owner", + "in": "path", + "required": true + }, + { + "type": "string", + "description": "name of the repo", + "name": "repo", + "in": "path", + "required": true + } + ], + "responses": { + "200": { + "$ref": "#/responses/RegistrationToken" + } + } } }, "/repos/{owner}/{repo}/actions/runners/{runner_id}": { "get": { + "produces": [ + "application/json" + ], + "tags": [ + "organization" + ], + "summary": "Get an repo-level runner", + "operationId": "getRunner", + "parameters": [ + { + "type": "string", + "description": "owner of the repo", + "name": "owner", + "in": "path", + "required": true + }, + { + "type": "string", + "description": "name of the repo", + "name": "repo", + "in": "path", + "required": true + }, + { + "type": "string", + "description": "id of the runner", + "name": "runner_id", + "in": "path", + "required": true + } + ], + "responses": { + "200": { + "$ref": "#/definitions/Runner" + }, + "400": { + "$ref": "#/responses/error" + }, + "404": { + "$ref": "#/responses/notFound" + } + } + }, + "delete": { "produces": [ "application/json" ], @@ -16881,6 +17119,29 @@ } } }, + "/user/actions/runners": { + "get": { + "produces": [ + "application/json" + ], + "tags": [ + "user" + ], + "summary": "Get user-level runners", + "operationId": "getRunners", + "responses": { + "200": { + "$ref": "#/definitions/RunnerList" + }, + "400": { + "$ref": "#/responses/error" + }, + "404": { + "$ref": "#/responses/notFound" + } + } + } + }, "/user/actions/runners/registration-token": { "get": { "produces": [ @@ -16896,6 +17157,83 @@ "$ref": "#/responses/RegistrationToken" } } + }, + "post": { + "produces": [ + "application/json" + ], + "tags": [ + "user" + ], + "summary": "Get an user's actions runner registration token", + "operationId": "userCreateRunnerRegistrationToken", + "responses": { + "200": { + "$ref": "#/responses/RegistrationToken" + } + } + } + }, + "/user/actions/runners/{runner_id}": { + "get": { + "produces": [ + "application/json" + ], + "tags": [ + "user" + ], + "summary": "Get an user-level runner", + "operationId": "getRunner", + "parameters": [ + { + "type": "string", + "description": "id of the runner", + "name": "runner_id", + "in": "path", + "required": true + } + ], + "responses": { + "200": { + "$ref": "#/definitions/Runner" + }, + "400": { + "$ref": "#/responses/error" + }, + "404": { + "$ref": "#/responses/notFound" + } + } + }, + "delete": { + "produces": [ + "application/json" + ], + "tags": [ + "user" + ], + "summary": "Delete an user-level runner", + "operationId": "deleteRunner", + "parameters": [ + { + "type": "string", + "description": "id of the runner", + "name": "runner_id", + "in": "path", + "required": true + } + ], + "responses": { + "204": { + "description": "runner has been deleted" + }, + "400": { + "$ref": "#/responses/error" + }, + "404": { + "$ref": "#/responses/notFound" + } + } } }, "/user/actions/secrets/{secretname}": { From a3b42a919548f0bb645537b0cfdfd318f92efc87 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Thu, 13 Mar 2025 22:37:07 +0100 Subject: [PATCH 06/21] add tests --- models/actions/runner.go | 3 ++ models/fixtures/action_runner.yml | 18 +++++++ routers/web/shared/actions/runners.go | 2 + tests/integration/api_admin_test.go | 48 +++++++++++++++++ tests/integration/api_user_runner_test.go | 63 +++++++++++++++++++++++ 5 files changed, 134 insertions(+) create mode 100644 models/fixtures/action_runner.yml create mode 100644 tests/integration/api_user_runner_test.go diff --git a/models/actions/runner.go b/models/actions/runner.go index 97db0ca7eac2f..83b332dac0b3f 100644 --- a/models/actions/runner.go +++ b/models/actions/runner.go @@ -200,6 +200,9 @@ func (opts FindRunnerOptions) ToConds() builder.Cond { c = c.Or(builder.Eq{"repo_id": 0, "owner_id": 0}) } cond = cond.And(c) + } else if !opts.WithAvailable { + c := builder.NewCond().And(builder.Eq{"repo_id": 0, "owner_id": 0}) + cond = cond.And(c) } if opts.Filter != "" { diff --git a/models/fixtures/action_runner.yml b/models/fixtures/action_runner.yml new file mode 100644 index 0000000000000..6f8229249d69b --- /dev/null +++ b/models/fixtures/action_runner.yml @@ -0,0 +1,18 @@ +- + id: 34344 + name: runner_to_be_deleted + uuid: 3EF231BD-FBB7-4E4B-9602-E6F28363EF17 + version: "1.0.0" + owner_id: 0 + repo_id: 0 + description: "This runner is going to be deleted" + agent_labels: '["runner_to_be_deleted","linux"]' +- + id: 34346 + name: runner_to_be_deleted-user + uuid: 3EF231BD-FBB7-4E4B-9602-E6F28363EF18 + version: "1.0.0" + owner_id: 1 + repo_id: 0 + description: "This runner is going to be deleted" + agent_labels: '["runner_to_be_deleted","linux"]' diff --git a/routers/web/shared/actions/runners.go b/routers/web/shared/actions/runners.go index 5aa550126a575..e4f8101060d8d 100644 --- a/routers/web/shared/actions/runners.go +++ b/routers/web/shared/actions/runners.go @@ -129,6 +129,8 @@ func Runners(ctx *context.Context) { } else if rCtx.IsOrg || rCtx.IsUser { opts.OwnerID = rCtx.OwnerID opts.WithAvailable = true + } else { + opts.WithAvailable = true } runners, count, err := db.FindAndCount[actions_model.ActionRunner](ctx, opts) diff --git a/tests/integration/api_admin_test.go b/tests/integration/api_admin_test.go index b42f05fc55028..79c16344a03be 100644 --- a/tests/integration/api_admin_test.go +++ b/tests/integration/api_admin_test.go @@ -393,3 +393,51 @@ func TestAPIEditUser_NotAllowedEmailDomain(t *testing.T) { }).AddTokenAuth(token) MakeRequest(t, req, http.StatusOK) } + +func TestAPIRunnerAdminApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + adminUsername := "user1" + token := getUserToken(t, adminUsername, auth_model.AccessTokenScopeWriteAdmin) + req := NewRequest(t, "POST", "/api/v1/admin/actions/runners/registration-token").AddTokenAuth(token) + tokenResp := MakeRequest(t, req, http.StatusOK) + var registrationToken struct { + Token string `json:"token"` + } + DecodeJSON(t, tokenResp, ®istrationToken) + assert.NotEmpty(t, registrationToken.Token) + + req = NewRequest(t, "GET", "/api/v1/admin/actions/runners").AddTokenAuth(token) + runnerListResp := MakeRequest(t, req, http.StatusOK) + runnerList := api.ActionRunnersResponse{} + DecodeJSON(t, runnerListResp, &runnerList) + + assert.Len(t, runnerList.Entries, 1) + assert.Equal(t, "runner_to_be_deleted", runnerList.Entries[0].Name) + assert.Equal(t, int64(34344), runnerList.Entries[0].ID) + assert.Equal(t, false, runnerList.Entries[0].Ephemeral) + assert.Len(t, runnerList.Entries[0].Labels, 2) + assert.Equal(t, "runner_to_be_deleted", runnerList.Entries[0].Labels[0].Name) + assert.Equal(t, "linux", runnerList.Entries[0].Labels[1].Name) + + // Verify get the runner by id + req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/admin/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) + runnerResp := MakeRequest(t, req, http.StatusOK) + + runner := api.ActionRunner{} + DecodeJSON(t, runnerResp, &runner) + + assert.Equal(t, "runner_to_be_deleted", runner.Name) + assert.Equal(t, int64(34344), runner.ID) + assert.Equal(t, false, runner.Ephemeral) + assert.Len(t, runner.Labels, 2) + assert.Equal(t, "runner_to_be_deleted", runner.Labels[0].Name) + assert.Equal(t, "linux", runner.Labels[1].Name) + + // Verify delete the runner by id + req = NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/admin/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusNoContent) + + // Verify get the runner has been deleted + req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/admin/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusNotFound) +} diff --git a/tests/integration/api_user_runner_test.go b/tests/integration/api_user_runner_test.go new file mode 100644 index 0000000000000..0a5ee956b88f9 --- /dev/null +++ b/tests/integration/api_user_runner_test.go @@ -0,0 +1,63 @@ +// Copyright 2024 The Gitea Authors. All rights reserved. +// SPDX-License-Identifier: MIT + +package integration + +import ( + "fmt" + "net/http" + "testing" + + auth_model "code.gitea.io/gitea/models/auth" + api "code.gitea.io/gitea/modules/structs" + "code.gitea.io/gitea/tests" + "github.com/stretchr/testify/assert" +) + +func TestAPIRunnerUserApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user1" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeWriteUser) + req := NewRequest(t, "POST", "/api/v1/user/actions/runners/registration-token").AddTokenAuth(token) + tokenResp := MakeRequest(t, req, http.StatusOK) + var registrationToken struct { + Token string `json:"token"` + } + DecodeJSON(t, tokenResp, ®istrationToken) + assert.NotEmpty(t, registrationToken.Token) + + req = NewRequest(t, "GET", "/api/v1/user/actions/runners").AddTokenAuth(token) + runnerListResp := MakeRequest(t, req, http.StatusOK) + runnerList := api.ActionRunnersResponse{} + DecodeJSON(t, runnerListResp, &runnerList) + + assert.Len(t, runnerList.Entries, 1) + assert.Equal(t, "runner_to_be_deleted-user", runnerList.Entries[0].Name) + assert.Equal(t, int64(34346), runnerList.Entries[0].ID) + assert.Equal(t, false, runnerList.Entries[0].Ephemeral) + assert.Len(t, runnerList.Entries[0].Labels, 2) + assert.Equal(t, "runner_to_be_deleted", runnerList.Entries[0].Labels[0].Name) + assert.Equal(t, "linux", runnerList.Entries[0].Labels[1].Name) + + // Verify get the runner by id + req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/user/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) + runnerResp := MakeRequest(t, req, http.StatusOK) + + runner := api.ActionRunner{} + DecodeJSON(t, runnerResp, &runner) + + assert.Equal(t, "runner_to_be_deleted-user", runner.Name) + assert.Equal(t, int64(34346), runner.ID) + assert.Equal(t, false, runner.Ephemeral) + assert.Len(t, runner.Labels, 2) + assert.Equal(t, "runner_to_be_deleted", runner.Labels[0].Name) + assert.Equal(t, "linux", runner.Labels[1].Name) + + // Verify delete the runner by id + req = NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/user/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusNoContent) + + // Verify get the runner has been deleted + req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/user/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusNotFound) +} From 7a75b1cbbc34fe5f0bb63b15811cbdde951aab7f Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Thu, 13 Mar 2025 22:44:29 +0100 Subject: [PATCH 07/21] update date --- tests/integration/api_user_runner_test.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tests/integration/api_user_runner_test.go b/tests/integration/api_user_runner_test.go index 0a5ee956b88f9..46b1bdbafd6c7 100644 --- a/tests/integration/api_user_runner_test.go +++ b/tests/integration/api_user_runner_test.go @@ -1,4 +1,4 @@ -// Copyright 2024 The Gitea Authors. All rights reserved. +// Copyright 2025 The Gitea Authors. All rights reserved. // SPDX-License-Identifier: MIT package integration From 76c550510f910c813eb5a8dcafd82f73e92e1f56 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Thu, 13 Mar 2025 23:02:09 +0100 Subject: [PATCH 08/21] fix lint --- routers/api/v1/admin/runners.go | 10 ++--- routers/api/v1/org/action.go | 10 ++--- routers/api/v1/repo/action.go | 12 +++--- routers/api/v1/shared/runners.go | 1 + routers/api/v1/user/runners.go | 10 ++--- routers/web/shared/actions/runners.go | 1 + services/convert/convert.go | 3 +- templates/swagger/v1_json.tmpl | 48 +++++++++++------------ tests/integration/api_admin_test.go | 4 +- tests/integration/api_user_runner_test.go | 5 ++- 10 files changed, 54 insertions(+), 50 deletions(-) diff --git a/routers/api/v1/admin/runners.go b/routers/api/v1/admin/runners.go index 26b9e2c3805e0..798d35d2b6ded 100644 --- a/routers/api/v1/admin/runners.go +++ b/routers/api/v1/admin/runners.go @@ -42,14 +42,14 @@ func CreateRegistrationToken(ctx *context.APIContext) { // ListRunners get global runners func ListRunners(ctx *context.APIContext) { - // swagger:operation GET /admin/actions/runners admin getRunners + // swagger:operation GET /admin/actions/runners admin getAdminRunners // --- // summary: Get global runners // produces: // - application/json // responses: // "200": - // "$ref": "#/definitions/RunnerList" + // "$ref": "#/definitions/ActionRunnersResponse" // "400": // "$ref": "#/responses/error" // "404": @@ -59,7 +59,7 @@ func ListRunners(ctx *context.APIContext) { // GetRunner get an global runner func GetRunner(ctx *context.APIContext) { - // swagger:operation GET /admin/actions/runners/{runner_id} admin getRunner + // swagger:operation GET /admin/actions/runners/{runner_id} admin getAdminRunner // --- // summary: Get an global runner // produces: @@ -72,7 +72,7 @@ func GetRunner(ctx *context.APIContext) { // required: true // responses: // "200": - // "$ref": "#/definitions/Runner" + // "$ref": "#/definitions/ActionRunner" // "400": // "$ref": "#/responses/error" // "404": @@ -82,7 +82,7 @@ func GetRunner(ctx *context.APIContext) { // DeleteRunner delete an global runner func DeleteRunner(ctx *context.APIContext) { - // swagger:operation DELETE /admin/actions/runners/{runner_id} admin deleteRunner + // swagger:operation DELETE /admin/actions/runners/{runner_id} admin deleteAdminRunner // --- // summary: Delete an global runner // produces: diff --git a/routers/api/v1/org/action.go b/routers/api/v1/org/action.go index 6f33cad4dc916..c2c8258791f4e 100644 --- a/routers/api/v1/org/action.go +++ b/routers/api/v1/org/action.go @@ -489,7 +489,7 @@ func (Action) UpdateVariable(ctx *context.APIContext) { // ListRunners get org-level runners func (Action) ListRunners(ctx *context.APIContext) { - // swagger:operation GET /orgs/{org}/actions/runners organization getRunners + // swagger:operation GET /orgs/{org}/actions/runners organization getOrgRunners // --- // summary: Get org-level runners // produces: @@ -502,7 +502,7 @@ func (Action) ListRunners(ctx *context.APIContext) { // required: true // responses: // "200": - // "$ref": "#/definitions/RunnerList" + // "$ref": "#/definitions/ActionRunnersResponse" // "400": // "$ref": "#/responses/error" // "404": @@ -512,7 +512,7 @@ func (Action) ListRunners(ctx *context.APIContext) { // GetRunner get an org-level runner func (Action) GetRunner(ctx *context.APIContext) { - // swagger:operation GET /orgs/{org}/actions/runners/{runner_id} organization getRunner + // swagger:operation GET /orgs/{org}/actions/runners/{runner_id} organization getOrgRunner // --- // summary: Get an org-level runner // produces: @@ -530,7 +530,7 @@ func (Action) GetRunner(ctx *context.APIContext) { // required: true // responses: // "200": - // "$ref": "#/definitions/Runner" + // "$ref": "#/definitions/ActionRunner" // "400": // "$ref": "#/responses/error" // "404": @@ -540,7 +540,7 @@ func (Action) GetRunner(ctx *context.APIContext) { // DeleteRunner delete an org-level runner func (Action) DeleteRunner(ctx *context.APIContext) { - // swagger:operation DELETE /orgs/{org}/actions/runners/{runner_id} organization deleteRunner + // swagger:operation DELETE /orgs/{org}/actions/runners/{runner_id} organization deleteOrgRunner // --- // summary: Delete an org-level runner // produces: diff --git a/routers/api/v1/repo/action.go b/routers/api/v1/repo/action.go index e9b1af6160e98..db451ef409dc2 100644 --- a/routers/api/v1/repo/action.go +++ b/routers/api/v1/repo/action.go @@ -182,7 +182,7 @@ func (Action) DeleteSecret(ctx *context.APIContext) { // required: true // responses: // "204": - // description: delete one secret of the organization + // description: delete one secret of the repository // "400": // "$ref": "#/responses/error" // "404": @@ -553,7 +553,7 @@ func (Action) CreateRegistrationToken(ctx *context.APIContext) { // ListRunners get repo-level runners func (Action) ListRunners(ctx *context.APIContext) { - // swagger:operation GET /repos/{owner}/{repo}/actions/runners organization getRunners + // swagger:operation GET /repos/{owner}/{repo}/actions/runners repository getRepoRunners // --- // summary: Get repo-level runners // produces: @@ -571,7 +571,7 @@ func (Action) ListRunners(ctx *context.APIContext) { // required: true // responses: // "200": - // "$ref": "#/definitions/RunnerList" + // "$ref": "#/definitions/ActionRunnersResponse" // "400": // "$ref": "#/responses/error" // "404": @@ -581,7 +581,7 @@ func (Action) ListRunners(ctx *context.APIContext) { // GetRunner get an repo-level runner func (Action) GetRunner(ctx *context.APIContext) { - // swagger:operation GET /repos/{owner}/{repo}/actions/runners/{runner_id} organization getRunner + // swagger:operation GET /repos/{owner}/{repo}/actions/runners/{runner_id} repository getRepoRunner // --- // summary: Get an repo-level runner // produces: @@ -604,7 +604,7 @@ func (Action) GetRunner(ctx *context.APIContext) { // required: true // responses: // "200": - // "$ref": "#/definitions/Runner" + // "$ref": "#/definitions/ActionRunner" // "400": // "$ref": "#/responses/error" // "404": @@ -614,7 +614,7 @@ func (Action) GetRunner(ctx *context.APIContext) { // DeleteRunner delete an repo-level runner func (Action) DeleteRunner(ctx *context.APIContext) { - // swagger:operation DELETE /repos/{owner}/{repo}/actions/runners/{runner_id} organization deleteRunner + // swagger:operation DELETE /repos/{owner}/{repo}/actions/runners/{runner_id} repository deleteRepoRunner // --- // summary: Delete an repo-level runner // produces: diff --git a/routers/api/v1/shared/runners.go b/routers/api/v1/shared/runners.go index aff0eddcb7869..46b3c30b24152 100644 --- a/routers/api/v1/shared/runners.go +++ b/routers/api/v1/shared/runners.go @@ -14,6 +14,7 @@ import ( "code.gitea.io/gitea/routers/api/v1/utils" "code.gitea.io/gitea/services/context" "code.gitea.io/gitea/services/convert" + "xorm.io/builder" ) diff --git a/routers/api/v1/user/runners.go b/routers/api/v1/user/runners.go index a31210f0b0b6e..be3f63cc5e17f 100644 --- a/routers/api/v1/user/runners.go +++ b/routers/api/v1/user/runners.go @@ -42,14 +42,14 @@ func CreateRegistrationToken(ctx *context.APIContext) { // ListRunners get user-level runners func ListRunners(ctx *context.APIContext) { - // swagger:operation GET /user/actions/runners user getRunners + // swagger:operation GET /user/actions/runners user getUserRunners // --- // summary: Get user-level runners // produces: // - application/json // responses: // "200": - // "$ref": "#/definitions/RunnerList" + // "$ref": "#/definitions/ActionRunnersResponse" // "400": // "$ref": "#/responses/error" // "404": @@ -59,7 +59,7 @@ func ListRunners(ctx *context.APIContext) { // GetRunner get an user-level runner func GetRunner(ctx *context.APIContext) { - // swagger:operation GET /user/actions/runners/{runner_id} user getRunner + // swagger:operation GET /user/actions/runners/{runner_id} user getUserRunner // --- // summary: Get an user-level runner // produces: @@ -72,7 +72,7 @@ func GetRunner(ctx *context.APIContext) { // required: true // responses: // "200": - // "$ref": "#/definitions/Runner" + // "$ref": "#/definitions/ActionRunner" // "400": // "$ref": "#/responses/error" // "404": @@ -82,7 +82,7 @@ func GetRunner(ctx *context.APIContext) { // DeleteRunner delete an user-level runner func DeleteRunner(ctx *context.APIContext) { - // swagger:operation DELETE /user/actions/runners/{runner_id} user deleteRunner + // swagger:operation DELETE /user/actions/runners/{runner_id} user deleteUserRunner // --- // summary: Delete an user-level runner // produces: diff --git a/routers/web/shared/actions/runners.go b/routers/web/shared/actions/runners.go index e4f8101060d8d..3389929bbfe10 100644 --- a/routers/web/shared/actions/runners.go +++ b/routers/web/shared/actions/runners.go @@ -18,6 +18,7 @@ import ( shared_user "code.gitea.io/gitea/routers/web/shared/user" "code.gitea.io/gitea/services/context" "code.gitea.io/gitea/services/forms" + "xorm.io/builder" ) diff --git a/services/convert/convert.go b/services/convert/convert.go index c11ffdfe3533b..a520e33ae4a37 100644 --- a/services/convert/convert.go +++ b/services/convert/convert.go @@ -11,7 +11,6 @@ import ( "strings" "time" - runnerv1 "code.gitea.io/actions-proto-go/runner/v1" actions_model "code.gitea.io/gitea/models/actions" asymkey_model "code.gitea.io/gitea/models/asymkey" "code.gitea.io/gitea/models/auth" @@ -31,6 +30,8 @@ import ( "code.gitea.io/gitea/modules/util" asymkey_service "code.gitea.io/gitea/services/asymkey" "code.gitea.io/gitea/services/gitdiff" + + runnerv1 "code.gitea.io/actions-proto-go/runner/v1" ) // ToEmail convert models.EmailAddress to api.Email diff --git a/templates/swagger/v1_json.tmpl b/templates/swagger/v1_json.tmpl index 8384f6f056c20..96ad1a437446f 100644 --- a/templates/swagger/v1_json.tmpl +++ b/templates/swagger/v1_json.tmpl @@ -84,10 +84,10 @@ "admin" ], "summary": "Get global runners", - "operationId": "getRunners", + "operationId": "getAdminRunners", "responses": { "200": { - "$ref": "#/definitions/RunnerList" + "$ref": "#/definitions/ActionRunnersResponse" }, "400": { "$ref": "#/responses/error" @@ -124,7 +124,7 @@ "admin" ], "summary": "Get an global runner", - "operationId": "getRunner", + "operationId": "getAdminRunner", "parameters": [ { "type": "string", @@ -136,7 +136,7 @@ ], "responses": { "200": { - "$ref": "#/definitions/Runner" + "$ref": "#/definitions/ActionRunner" }, "400": { "$ref": "#/responses/error" @@ -154,7 +154,7 @@ "admin" ], "summary": "Delete an global runner", - "operationId": "deleteRunner", + "operationId": "deleteAdminRunner", "parameters": [ { "type": "string", @@ -1808,7 +1808,7 @@ "organization" ], "summary": "Get org-level runners", - "operationId": "getRunners", + "operationId": "getOrgRunners", "parameters": [ { "type": "string", @@ -1820,7 +1820,7 @@ ], "responses": { "200": { - "$ref": "#/definitions/RunnerList" + "$ref": "#/definitions/ActionRunnersResponse" }, "400": { "$ref": "#/responses/error" @@ -1890,7 +1890,7 @@ "organization" ], "summary": "Get an org-level runner", - "operationId": "getRunner", + "operationId": "getOrgRunner", "parameters": [ { "type": "string", @@ -1909,7 +1909,7 @@ ], "responses": { "200": { - "$ref": "#/definitions/Runner" + "$ref": "#/definitions/ActionRunner" }, "400": { "$ref": "#/responses/error" @@ -1927,7 +1927,7 @@ "organization" ], "summary": "Delete an org-level runner", - "operationId": "deleteRunner", + "operationId": "deleteOrgRunner", "parameters": [ { "type": "string", @@ -4427,10 +4427,10 @@ "application/json" ], "tags": [ - "organization" + "repository" ], "summary": "Get repo-level runners", - "operationId": "getRunners", + "operationId": "getRepoRunners", "parameters": [ { "type": "string", @@ -4449,7 +4449,7 @@ ], "responses": { "200": { - "$ref": "#/definitions/RunnerList" + "$ref": "#/definitions/ActionRunnersResponse" }, "400": { "$ref": "#/responses/error" @@ -4530,10 +4530,10 @@ "application/json" ], "tags": [ - "organization" + "repository" ], "summary": "Get an repo-level runner", - "operationId": "getRunner", + "operationId": "getRepoRunner", "parameters": [ { "type": "string", @@ -4559,7 +4559,7 @@ ], "responses": { "200": { - "$ref": "#/definitions/Runner" + "$ref": "#/definitions/ActionRunner" }, "400": { "$ref": "#/responses/error" @@ -4574,10 +4574,10 @@ "application/json" ], "tags": [ - "organization" + "repository" ], "summary": "Delete an repo-level runner", - "operationId": "deleteRunner", + "operationId": "deleteRepoRunner", "parameters": [ { "type": "string", @@ -4809,7 +4809,7 @@ ], "responses": { "204": { - "description": "delete one secret of the organization" + "description": "delete one secret of the repository" }, "400": { "$ref": "#/responses/error" @@ -17128,10 +17128,10 @@ "user" ], "summary": "Get user-level runners", - "operationId": "getRunners", + "operationId": "getUserRunners", "responses": { "200": { - "$ref": "#/definitions/RunnerList" + "$ref": "#/definitions/ActionRunnersResponse" }, "400": { "$ref": "#/responses/error" @@ -17183,7 +17183,7 @@ "user" ], "summary": "Get an user-level runner", - "operationId": "getRunner", + "operationId": "getUserRunner", "parameters": [ { "type": "string", @@ -17195,7 +17195,7 @@ ], "responses": { "200": { - "$ref": "#/definitions/Runner" + "$ref": "#/definitions/ActionRunner" }, "400": { "$ref": "#/responses/error" @@ -17213,7 +17213,7 @@ "user" ], "summary": "Delete an user-level runner", - "operationId": "deleteRunner", + "operationId": "deleteUserRunner", "parameters": [ { "type": "string", diff --git a/tests/integration/api_admin_test.go b/tests/integration/api_admin_test.go index 79c16344a03be..5fbbfbd3846bf 100644 --- a/tests/integration/api_admin_test.go +++ b/tests/integration/api_admin_test.go @@ -414,7 +414,7 @@ func TestAPIRunnerAdminApi(t *testing.T) { assert.Len(t, runnerList.Entries, 1) assert.Equal(t, "runner_to_be_deleted", runnerList.Entries[0].Name) assert.Equal(t, int64(34344), runnerList.Entries[0].ID) - assert.Equal(t, false, runnerList.Entries[0].Ephemeral) + assert.False(t, runnerList.Entries[0].Ephemeral) assert.Len(t, runnerList.Entries[0].Labels, 2) assert.Equal(t, "runner_to_be_deleted", runnerList.Entries[0].Labels[0].Name) assert.Equal(t, "linux", runnerList.Entries[0].Labels[1].Name) @@ -428,7 +428,7 @@ func TestAPIRunnerAdminApi(t *testing.T) { assert.Equal(t, "runner_to_be_deleted", runner.Name) assert.Equal(t, int64(34344), runner.ID) - assert.Equal(t, false, runner.Ephemeral) + assert.False(t, runner.Ephemeral) assert.Len(t, runner.Labels, 2) assert.Equal(t, "runner_to_be_deleted", runner.Labels[0].Name) assert.Equal(t, "linux", runner.Labels[1].Name) diff --git a/tests/integration/api_user_runner_test.go b/tests/integration/api_user_runner_test.go index 46b1bdbafd6c7..eed163b85208b 100644 --- a/tests/integration/api_user_runner_test.go +++ b/tests/integration/api_user_runner_test.go @@ -11,6 +11,7 @@ import ( auth_model "code.gitea.io/gitea/models/auth" api "code.gitea.io/gitea/modules/structs" "code.gitea.io/gitea/tests" + "github.com/stretchr/testify/assert" ) @@ -34,7 +35,7 @@ func TestAPIRunnerUserApi(t *testing.T) { assert.Len(t, runnerList.Entries, 1) assert.Equal(t, "runner_to_be_deleted-user", runnerList.Entries[0].Name) assert.Equal(t, int64(34346), runnerList.Entries[0].ID) - assert.Equal(t, false, runnerList.Entries[0].Ephemeral) + assert.False(t, runnerList.Entries[0].Ephemeral) assert.Len(t, runnerList.Entries[0].Labels, 2) assert.Equal(t, "runner_to_be_deleted", runnerList.Entries[0].Labels[0].Name) assert.Equal(t, "linux", runnerList.Entries[0].Labels[1].Name) @@ -48,7 +49,7 @@ func TestAPIRunnerUserApi(t *testing.T) { assert.Equal(t, "runner_to_be_deleted-user", runner.Name) assert.Equal(t, int64(34346), runner.ID) - assert.Equal(t, false, runner.Ephemeral) + assert.False(t, runner.Ephemeral) assert.Len(t, runner.Labels, 2) assert.Equal(t, "runner_to_be_deleted", runner.Labels[0].Name) assert.Equal(t, "linux", runner.Labels[1].Name) From 93d464b068076358df5a51818df32206c18a65a5 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Thu, 13 Mar 2025 23:13:17 +0100 Subject: [PATCH 09/21] fix definition bug --- routers/api/v1/api.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/routers/api/v1/api.go b/routers/api/v1/api.go index f520096f6d0ee..1f6e531d07e31 100644 --- a/routers/api/v1/api.go +++ b/routers/api/v1/api.go @@ -914,7 +914,7 @@ func Routes() *web.Router { m.Group("/runners", func() { m.Get("", reqToken(), reqChecker, act.ListRunners) m.Get("/registration-token", reqToken(), reqChecker, act.GetRegistrationToken) - m.Get("/registration-token", reqToken(), reqChecker, act.CreateRegistrationToken) + m.Post("/registration-token", reqToken(), reqChecker, act.CreateRegistrationToken) m.Get("/{runner_id}", reqToken(), reqChecker, act.GetRunner) m.Delete("/{runner_id}", reqToken(), reqChecker, act.DeleteRunner) }) From d6db24c3b78eca4a4ae6049b7a61b95361b02cf7 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Thu, 13 Mar 2025 23:24:44 +0100 Subject: [PATCH 10/21] add org test --- tests/integration/api_admin_test.go | 2 +- tests/integration/api_org_runner_test.go | 64 +++++++++++++++++++++++ tests/integration/api_user_runner_test.go | 2 +- 3 files changed, 66 insertions(+), 2 deletions(-) create mode 100644 tests/integration/api_org_runner_test.go diff --git a/tests/integration/api_admin_test.go b/tests/integration/api_admin_test.go index 5fbbfbd3846bf..94a583b70fb14 100644 --- a/tests/integration/api_admin_test.go +++ b/tests/integration/api_admin_test.go @@ -437,7 +437,7 @@ func TestAPIRunnerAdminApi(t *testing.T) { req = NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/admin/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) MakeRequest(t, req, http.StatusNoContent) - // Verify get the runner has been deleted + // Verify runner deletion req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/admin/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) MakeRequest(t, req, http.StatusNotFound) } diff --git a/tests/integration/api_org_runner_test.go b/tests/integration/api_org_runner_test.go new file mode 100644 index 0000000000000..5a4e9d3c53a4d --- /dev/null +++ b/tests/integration/api_org_runner_test.go @@ -0,0 +1,64 @@ +// Copyright 2025 The Gitea Authors. All rights reserved. +// SPDX-License-Identifier: MIT + +package integration + +import ( + "fmt" + "net/http" + "testing" + + auth_model "code.gitea.io/gitea/models/auth" + api "code.gitea.io/gitea/modules/structs" + "code.gitea.io/gitea/tests" + + "github.com/stretchr/testify/assert" +) + +func TestAPIRunnerOrgApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeWriteOrganization) + req := NewRequest(t, "POST", "/api/v1/orgs/org3/actions/runners/registration-token").AddTokenAuth(token) + tokenResp := MakeRequest(t, req, http.StatusOK) + var registrationToken struct { + Token string `json:"token"` + } + DecodeJSON(t, tokenResp, ®istrationToken) + assert.NotEmpty(t, registrationToken.Token) + + req = NewRequest(t, "GET", "/api/v1/orgs/org3/actions/runners").AddTokenAuth(token) + runnerListResp := MakeRequest(t, req, http.StatusOK) + runnerList := api.ActionRunnersResponse{} + DecodeJSON(t, runnerListResp, &runnerList) + + assert.Len(t, runnerList.Entries, 1) + assert.Equal(t, "runner_to_be_deleted-org", runnerList.Entries[0].Name) + assert.Equal(t, int64(34347), runnerList.Entries[0].ID) + assert.False(t, runnerList.Entries[0].Ephemeral) + assert.Len(t, runnerList.Entries[0].Labels, 2) + assert.Equal(t, "runner_to_be_deleted", runnerList.Entries[0].Labels[0].Name) + assert.Equal(t, "linux", runnerList.Entries[0].Labels[1].Name) + + // Verify get the runner by id + req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/orgs/org3/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) + runnerResp := MakeRequest(t, req, http.StatusOK) + + runner := api.ActionRunner{} + DecodeJSON(t, runnerResp, &runner) + + assert.Equal(t, "runner_to_be_deleted-org", runner.Name) + assert.Equal(t, int64(34347), runner.ID) + assert.False(t, runner.Ephemeral) + assert.Len(t, runner.Labels, 2) + assert.Equal(t, "runner_to_be_deleted", runner.Labels[0].Name) + assert.Equal(t, "linux", runner.Labels[1].Name) + + // Verify delete the runner by id + req = NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/orgs/org3/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusNoContent) + + // Verify runner deletion + req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/orgs/org3/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusNotFound) +} diff --git a/tests/integration/api_user_runner_test.go b/tests/integration/api_user_runner_test.go index eed163b85208b..1c9c446a42cff 100644 --- a/tests/integration/api_user_runner_test.go +++ b/tests/integration/api_user_runner_test.go @@ -58,7 +58,7 @@ func TestAPIRunnerUserApi(t *testing.T) { req = NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/user/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) MakeRequest(t, req, http.StatusNoContent) - // Verify get the runner has been deleted + // Verify runner deletion req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/user/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) MakeRequest(t, req, http.StatusNotFound) } From 6f8aaf69a7e72e268cd3d432dac7981bc7174a2b Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Fri, 14 Mar 2025 00:10:18 +0100 Subject: [PATCH 11/21] fix mssql failure add token_hash * add org tests --- models/fixtures/action_runner.yml | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/models/fixtures/action_runner.yml b/models/fixtures/action_runner.yml index 6f8229249d69b..94029be89c33d 100644 --- a/models/fixtures/action_runner.yml +++ b/models/fixtures/action_runner.yml @@ -2,6 +2,7 @@ id: 34344 name: runner_to_be_deleted uuid: 3EF231BD-FBB7-4E4B-9602-E6F28363EF17 + token_hash: 3EF231BD-FBB7-4E4B-9602-E6F28363EF17 version: "1.0.0" owner_id: 0 repo_id: 0 @@ -11,8 +12,19 @@ id: 34346 name: runner_to_be_deleted-user uuid: 3EF231BD-FBB7-4E4B-9602-E6F28363EF18 + token_hash: 3EF231BD-FBB7-4E4B-9602-E6F28363EF18 version: "1.0.0" owner_id: 1 repo_id: 0 description: "This runner is going to be deleted" agent_labels: '["runner_to_be_deleted","linux"]' +- + id: 34347 + name: runner_to_be_deleted-org + uuid: 3EF231BD-FBB7-4E4B-9602-E6F28363EF19 + token_hash: 3EF231BD-FBB7-4E4B-9602-E6F28363EF19 + version: "1.0.0" + owner_id: 3 + repo_id: 0 + description: "This runner is going to be deleted" + agent_labels: '["runner_to_be_deleted","linux"]' From 1394ed7d960f71695b600a6c2c30db0e086225fd Mon Sep 17 00:00:00 2001 From: ChristopherHX Date: Fri, 14 Mar 2025 18:29:43 +0100 Subject: [PATCH 12/21] Update models/actions/runner.go Co-authored-by: Lunny Xiao --- models/actions/runner.go | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/models/actions/runner.go b/models/actions/runner.go index 83b332dac0b3f..1b13a5ea3e1a3 100644 --- a/models/actions/runner.go +++ b/models/actions/runner.go @@ -201,8 +201,7 @@ func (opts FindRunnerOptions) ToConds() builder.Cond { } cond = cond.And(c) } else if !opts.WithAvailable { - c := builder.NewCond().And(builder.Eq{"repo_id": 0, "owner_id": 0}) - cond = cond.And(c) + cond = cond.And(builder.Eq{"repo_id": 0, "owner_id": 0}) } if opts.Filter != "" { From 82834ff66fa3c627112684eaac3fbc3b2287c462 Mon Sep 17 00:00:00 2001 From: ChristopherHX Date: Fri, 14 Mar 2025 20:34:43 +0100 Subject: [PATCH 13/21] expose ephemeral flag of runners --- services/convert/convert.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/services/convert/convert.go b/services/convert/convert.go index a520e33ae4a37..3d8a53faa64be 100644 --- a/services/convert/convert.go +++ b/services/convert/convert.go @@ -274,7 +274,7 @@ func ToActionRunner(ctx context.Context, runner *actions_model.ActionRunner) *ap OS: "Unknown", Status: apiStatus, Busy: status == runnerv1.RunnerStatus_RUNNER_STATUS_ACTIVE, - Ephemeral: false, // TODO runner.Ephemeral + Ephemeral: runner.Ephemeral, Labels: labels, } } From efd080eab3d828f1d7244bd1ec57683762b99968 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Fri, 14 Mar 2025 21:45:32 +0100 Subject: [PATCH 14/21] add permission org test --- tests/integration/api_org_runner_test.go | 58 ++++++++++++++++++++++++ 1 file changed, 58 insertions(+) diff --git a/tests/integration/api_org_runner_test.go b/tests/integration/api_org_runner_test.go index 5a4e9d3c53a4d..6c84c33a21002 100644 --- a/tests/integration/api_org_runner_test.go +++ b/tests/integration/api_org_runner_test.go @@ -62,3 +62,61 @@ func TestAPIRunnerOrgApi(t *testing.T) { req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/orgs/org3/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) MakeRequest(t, req, http.StatusNotFound) } + +func TestAPIRunnerDeleteReadScopeForbiddenOrgApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeReadOrganization) + + // Verify delete the runner by id is forbidden with read scope + req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/orgs/org3/actions/runners/%d", 34347)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusForbidden) +} + +func TestAPIRunnerGetOrgApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeReadOrganization) + // Verify get the runner by id with read scope + req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/orgs/org3/actions/runners/%d", 34347)).AddTokenAuth(token) + runnerResp := MakeRequest(t, req, http.StatusOK) + + runner := api.ActionRunner{} + DecodeJSON(t, runnerResp, &runner) + + assert.Equal(t, "runner_to_be_deleted-org", runner.Name) + assert.Equal(t, int64(34347), runner.ID) + assert.False(t, runner.Ephemeral) + assert.Len(t, runner.Labels, 2) + assert.Equal(t, "runner_to_be_deleted", runner.Labels[0].Name) + assert.Equal(t, "linux", runner.Labels[1].Name) +} + +func TestAPIRunnerGetRepoScopeForbiddenOrgApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeReadRepository) + // Verify get the runner by id with read scope + req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/orgs/org3/actions/runners/%d", 34347)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusForbidden) +} + +func TestAPIRunnerGetAdminRunnerNotFoundOrgApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeReadOrganization) + // Verify get a runner by id of different entity is not found + // runner.Editable(ownerID, repoID) false + req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/orgs/org3/actions/runners/%d", 34344)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusNotFound) +} + +func TestAPIRunnerDeleteAdminRunnerNotFoundOrgApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeWriteOrganization) + // Verify delete a runner by id of different entity is not found + // runner.Editable(ownerID, repoID) false + req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/orgs/org3/actions/runners/%d", 34344)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusNotFound) +} From b8b96d096d560f5ae90977f096b1a96087f86264 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Fri, 14 Mar 2025 21:48:13 +0100 Subject: [PATCH 15/21] add check runner conflict test --- tests/integration/api_org_runner_test.go | 35 ++++++++++++++++++++++++ 1 file changed, 35 insertions(+) diff --git a/tests/integration/api_org_runner_test.go b/tests/integration/api_org_runner_test.go index 6c84c33a21002..e1b7ccb5e6abb 100644 --- a/tests/integration/api_org_runner_test.go +++ b/tests/integration/api_org_runner_test.go @@ -9,9 +9,12 @@ import ( "testing" auth_model "code.gitea.io/gitea/models/auth" + "code.gitea.io/gitea/models/db" api "code.gitea.io/gitea/modules/structs" "code.gitea.io/gitea/tests" + actions_model "code.gitea.io/gitea/models/actions" + "github.com/stretchr/testify/assert" ) @@ -120,3 +123,35 @@ func TestAPIRunnerDeleteAdminRunnerNotFoundOrgApi(t *testing.T) { req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/orgs/org3/actions/runners/%d", 34344)).AddTokenAuth(token) MakeRequest(t, req, http.StatusNotFound) } + +func TestAPIRunnerDeleteConflictWhileJobIsRunningOrgApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeWriteOrganization) + + _, err := db.GetEngine(t.Context()).Insert(&actions_model.ActionTask{ + RunnerID: 34347, + Status: actions_model.StatusRunning, + }) + assert.NoError(t, err) + + // Verify delete the runner by id is blocked by active job + req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/orgs/org3/actions/runners/%d", 34347)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusConflict) +} + +func TestAPIRunnerDeleteNoConflictWhileJobIsDoneOrgApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeWriteOrganization) + + _, err := db.GetEngine(t.Context()).Insert(&actions_model.ActionTask{ + RunnerID: 34347, + Status: actions_model.StatusSuccess, + }) + assert.NoError(t, err) + + // Verify delete the runner by id is ok + req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/orgs/org3/actions/runners/%d", 34347)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusNoContent) +} From dfbdec1b94b4e768d72df57d55a9c5949b8c3a35 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Fri, 14 Mar 2025 21:56:41 +0100 Subject: [PATCH 16/21] Remove OS field, not needed for my usecase --- modules/structs/repo_actions.go | 1 - services/convert/convert.go | 1 - 2 files changed, 2 deletions(-) diff --git a/modules/structs/repo_actions.go b/modules/structs/repo_actions.go index 590abbcea97f6..75f8e188dda90 100644 --- a/modules/structs/repo_actions.go +++ b/modules/structs/repo_actions.go @@ -145,7 +145,6 @@ type ActionRunnerLabel struct { type ActionRunner struct { ID int64 `json:"id"` Name string `json:"name"` - OS string `json:"os"` Status string `json:"status"` Busy bool `json:"busy"` Ephemeral bool `json:"ephemeral"` diff --git a/services/convert/convert.go b/services/convert/convert.go index 3d8a53faa64be..9d2afdea308b9 100644 --- a/services/convert/convert.go +++ b/services/convert/convert.go @@ -271,7 +271,6 @@ func ToActionRunner(ctx context.Context, runner *actions_model.ActionRunner) *ap return &api.ActionRunner{ ID: runner.ID, Name: runner.Name, - OS: "Unknown", Status: apiStatus, Busy: status == runnerv1.RunnerStatus_RUNNER_STATUS_ACTIVE, Ephemeral: runner.Ephemeral, From f3873636acb28b9c017ea0691e1bd8e1d66a1bb7 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Fri, 14 Mar 2025 22:04:26 +0100 Subject: [PATCH 17/21] swagger remove OS field --- templates/swagger/v1_json.tmpl | 4 ---- 1 file changed, 4 deletions(-) diff --git a/templates/swagger/v1_json.tmpl b/templates/swagger/v1_json.tmpl index 96ad1a437446f..7935fb469fa16 100644 --- a/templates/swagger/v1_json.tmpl +++ b/templates/swagger/v1_json.tmpl @@ -19755,10 +19755,6 @@ "type": "string", "x-go-name": "Name" }, - "os": { - "type": "string", - "x-go-name": "OS" - }, "status": { "type": "string", "x-go-name": "Status" From ee066b696336b2204bc7f380d773b84bd9deeaa0 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Fri, 14 Mar 2025 22:10:22 +0100 Subject: [PATCH 18/21] format test --- tests/integration/api_org_runner_test.go | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/tests/integration/api_org_runner_test.go b/tests/integration/api_org_runner_test.go index e1b7ccb5e6abb..5011228fc4308 100644 --- a/tests/integration/api_org_runner_test.go +++ b/tests/integration/api_org_runner_test.go @@ -8,13 +8,12 @@ import ( "net/http" "testing" + actions_model "code.gitea.io/gitea/models/actions" auth_model "code.gitea.io/gitea/models/auth" "code.gitea.io/gitea/models/db" api "code.gitea.io/gitea/modules/structs" "code.gitea.io/gitea/tests" - actions_model "code.gitea.io/gitea/models/actions" - "github.com/stretchr/testify/assert" ) From cb8f30bdb1712160a2b2200f29b41e1068f20cb8 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Sun, 16 Mar 2025 12:28:17 +0100 Subject: [PATCH 19/21] remove active runner deletion blocker * translation text would be defect due to this change --- options/locale/locale_en-US.ini | 1 - routers/api/v1/shared/runners.go | 11 ----------- routers/web/shared/actions/runners.go | 18 ------------------ tests/integration/api_org_runner_test.go | 16 ---------------- 4 files changed, 46 deletions(-) diff --git a/options/locale/locale_en-US.ini b/options/locale/locale_en-US.ini index a3a576d3599d8..f1ce4b244f831 100644 --- a/options/locale/locale_en-US.ini +++ b/options/locale/locale_en-US.ini @@ -3761,7 +3761,6 @@ runners.update_runner_failed = Failed to update runner runners.delete_runner = Delete this runner runners.delete_runner_success = Runner deleted successfully runners.delete_runner_failed = Failed to delete runner -runners.delete_runner_failed_runner_active = Failed to delete active runner runners.delete_runner_header = Confirm to delete this runner runners.delete_runner_notice = If a task is running on this runner, it will be terminated and mark as failed. It may break building workflow. runners.none = No runners available diff --git a/routers/api/v1/shared/runners.go b/routers/api/v1/shared/runners.go index 46b3c30b24152..1e30c4621d791 100644 --- a/routers/api/v1/shared/runners.go +++ b/routers/api/v1/shared/runners.go @@ -14,8 +14,6 @@ import ( "code.gitea.io/gitea/routers/api/v1/utils" "code.gitea.io/gitea/services/context" "code.gitea.io/gitea/services/convert" - - "xorm.io/builder" ) // RegistrationToken is response related to registration token @@ -82,15 +80,6 @@ func DeleteRunner(ctx *context.APIContext, ownerID, repoID, runnerID int64) { ctx.APIErrorNotFound("No permission to delete this runner") return } - exist, err := db.Exist[actions_model.ActionTask](ctx, builder.Eq{"`runner_id`": runner.ID}.And(builder.In("`status`", actions_model.StatusWaiting, actions_model.StatusRunning, actions_model.StatusBlocked))) - if err != nil { - ctx.APIErrorInternal(err) - return - } - if exist { - ctx.APIError(http.StatusConflict, "Runner is active") - return - } err = actions_model.DeleteRunner(ctx, runner.ID) if err != nil { diff --git a/routers/web/shared/actions/runners.go b/routers/web/shared/actions/runners.go index 3389929bbfe10..bb1125f0e8036 100644 --- a/routers/web/shared/actions/runners.go +++ b/routers/web/shared/actions/runners.go @@ -18,8 +18,6 @@ import ( shared_user "code.gitea.io/gitea/routers/web/shared/user" "code.gitea.io/gitea/services/context" "code.gitea.io/gitea/services/forms" - - "xorm.io/builder" ) const ( @@ -317,22 +315,6 @@ func RunnerDeletePost(ctx *context.Context) { successRedirectTo := rCtx.RedirectLink failedRedirectTo := rCtx.RedirectLink + url.PathEscape(ctx.PathParam("runnerid")) - exist, err := db.Exist[actions_model.ActionTask](ctx, builder.Eq{"`runner_id`": runner.ID}.And(builder.In("`status`", actions_model.StatusWaiting, actions_model.StatusRunning, actions_model.StatusBlocked))) - if err != nil { - log.Warn("DeleteRunnerPost.Exist failed: %v, url: %s", err, ctx.Req.URL) - ctx.Flash.Warning(ctx.Tr("actions.runners.delete_runner_failed")) - - ctx.JSONRedirect(failedRedirectTo) - return - } - if exist { - log.Warn("DeleteRunnerPost.Exist failed: cannot delete active runner") - ctx.Flash.Warning(ctx.Tr("actions.runners.delete_runner_failed_runner_active")) - - ctx.JSONRedirect(failedRedirectTo) - return - } - if err := actions_model.DeleteRunner(ctx, runner.ID); err != nil { log.Warn("DeleteRunnerPost.UpdateRunner failed: %v, url: %s", err, ctx.Req.URL) ctx.Flash.Warning(ctx.Tr("actions.runners.delete_runner_failed")) diff --git a/tests/integration/api_org_runner_test.go b/tests/integration/api_org_runner_test.go index 5011228fc4308..abaaeab049fd9 100644 --- a/tests/integration/api_org_runner_test.go +++ b/tests/integration/api_org_runner_test.go @@ -123,22 +123,6 @@ func TestAPIRunnerDeleteAdminRunnerNotFoundOrgApi(t *testing.T) { MakeRequest(t, req, http.StatusNotFound) } -func TestAPIRunnerDeleteConflictWhileJobIsRunningOrgApi(t *testing.T) { - defer tests.PrepareTestEnv(t)() - userUsername := "user2" - token := getUserToken(t, userUsername, auth_model.AccessTokenScopeWriteOrganization) - - _, err := db.GetEngine(t.Context()).Insert(&actions_model.ActionTask{ - RunnerID: 34347, - Status: actions_model.StatusRunning, - }) - assert.NoError(t, err) - - // Verify delete the runner by id is blocked by active job - req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/orgs/org3/actions/runners/%d", 34347)).AddTokenAuth(token) - MakeRequest(t, req, http.StatusConflict) -} - func TestAPIRunnerDeleteNoConflictWhileJobIsDoneOrgApi(t *testing.T) { defer tests.PrepareTestEnv(t)() userUsername := "user2" From 1eed2ec2d5d8d2fe234da305f07156ef12751a87 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Mon, 17 Mar 2025 17:38:11 +0100 Subject: [PATCH 20/21] Repo level tests --- tests/integration/api_repo_runner_test.go | 140 ++++++++++++++++++++++ 1 file changed, 140 insertions(+) create mode 100644 tests/integration/api_repo_runner_test.go diff --git a/tests/integration/api_repo_runner_test.go b/tests/integration/api_repo_runner_test.go new file mode 100644 index 0000000000000..a599757ab9291 --- /dev/null +++ b/tests/integration/api_repo_runner_test.go @@ -0,0 +1,140 @@ +// Copyright 2025 The Gitea Authors. All rights reserved. +// SPDX-License-Identifier: MIT + +package integration + +import ( + "fmt" + "net/http" + "testing" + + actions_model "code.gitea.io/gitea/models/actions" + auth_model "code.gitea.io/gitea/models/auth" + "code.gitea.io/gitea/models/db" + api "code.gitea.io/gitea/modules/structs" + "code.gitea.io/gitea/tests" + + "github.com/stretchr/testify/assert" +) + +func TestAPIRunnerRepoApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeWriteRepository) + req := NewRequest(t, "POST", "/api/v1/repos/user2/repo1/actions/runners/registration-token").AddTokenAuth(token) + tokenResp := MakeRequest(t, req, http.StatusOK) + var registrationToken struct { + Token string `json:"token"` + } + DecodeJSON(t, tokenResp, ®istrationToken) + assert.NotEmpty(t, registrationToken.Token) + + req = NewRequest(t, "GET", "/api/v1/repos/user2/repo1/actions/runners").AddTokenAuth(token) + runnerListResp := MakeRequest(t, req, http.StatusOK) + runnerList := api.ActionRunnersResponse{} + DecodeJSON(t, runnerListResp, &runnerList) + + assert.Len(t, runnerList.Entries, 1) + assert.Equal(t, "runner_to_be_deleted-repo1", runnerList.Entries[0].Name) + assert.Equal(t, int64(34348), runnerList.Entries[0].ID) + assert.False(t, runnerList.Entries[0].Ephemeral) + assert.Len(t, runnerList.Entries[0].Labels, 2) + assert.Equal(t, "runner_to_be_deleted", runnerList.Entries[0].Labels[0].Name) + assert.Equal(t, "linux", runnerList.Entries[0].Labels[1].Name) + + // Verify get the runner by id + req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/repos/user2/repo1/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) + runnerResp := MakeRequest(t, req, http.StatusOK) + + runner := api.ActionRunner{} + DecodeJSON(t, runnerResp, &runner) + + assert.Equal(t, "runner_to_be_deleted-repo1", runner.Name) + assert.Equal(t, int64(34348), runner.ID) + assert.False(t, runner.Ephemeral) + assert.Len(t, runner.Labels, 2) + assert.Equal(t, "runner_to_be_deleted", runner.Labels[0].Name) + assert.Equal(t, "linux", runner.Labels[1].Name) + + // Verify delete the runner by id + req = NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/repos/user2/repo1/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusNoContent) + + // Verify runner deletion + req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/repos/user2/repo1/actions/runners/%d", runnerList.Entries[0].ID)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusNotFound) +} + +func TestAPIRunnerDeleteReadScopeForbiddenRepoApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeReadRepository) + + // Verify delete the runner by id is forbidden with read scope + req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/repos/user2/repo1/actions/runners/%d", 34348)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusForbidden) +} + +func TestAPIRunnerGetRepoApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeReadRepository) + // Verify get the runner by id with read scope + req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/repos/user2/repo1/actions/runners/%d", 34348)).AddTokenAuth(token) + runnerResp := MakeRequest(t, req, http.StatusOK) + + runner := api.ActionRunner{} + DecodeJSON(t, runnerResp, &runner) + + assert.Equal(t, "runner_to_be_deleted-repo1", runner.Name) + assert.Equal(t, int64(34348), runner.ID) + assert.False(t, runner.Ephemeral) + assert.Len(t, runner.Labels, 2) + assert.Equal(t, "runner_to_be_deleted", runner.Labels[0].Name) + assert.Equal(t, "linux", runner.Labels[1].Name) +} + +func TestAPIRunnerGetOrganizationScopeForbiddenRepoApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeReadOrganization) + // Verify get the runner by id with read scope + req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/repos/user2/repo1/actions/runners/%d", 34348)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusForbidden) +} + +func TestAPIRunnerGetAdminRunnerNotFoundRepoApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeReadRepository) + // Verify get a runner by id of different entity is not found + // runner.Editable(ownerID, repoID) false + req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/repos/user2/repo1/actions/runners/%d", 34344)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusNotFound) +} + +func TestAPIRunnerDeleteAdminRunnerNotFoundRepoApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeWriteRepository) + // Verify delete a runner by id of different entity is not found + // runner.Editable(ownerID, repoID) false + req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/repos/user2/repo1/actions/runners/%d", 34344)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusNotFound) +} + +func TestAPIRunnerDeleteNoConflictWhileJobIsDoneRepoApi(t *testing.T) { + defer tests.PrepareTestEnv(t)() + userUsername := "user2" + token := getUserToken(t, userUsername, auth_model.AccessTokenScopeWriteRepository) + + _, err := db.GetEngine(t.Context()).Insert(&actions_model.ActionTask{ + RunnerID: 34348, + Status: actions_model.StatusSuccess, + }) + assert.NoError(t, err) + + // Verify delete the runner by id is ok + req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/repos/user2/repo1/actions/runners/%d", 34348)).AddTokenAuth(token) + MakeRequest(t, req, http.StatusNoContent) +} From 307b8e19499af14d1e0a2e2d3ec8d149652591b3 Mon Sep 17 00:00:00 2001 From: Christopher Homberger Date: Mon, 17 Mar 2025 17:50:59 +0100 Subject: [PATCH 21/21] add missing fixture --- models/fixtures/action_runner.yml | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/models/fixtures/action_runner.yml b/models/fixtures/action_runner.yml index 94029be89c33d..789ea656caaea 100644 --- a/models/fixtures/action_runner.yml +++ b/models/fixtures/action_runner.yml @@ -28,3 +28,13 @@ repo_id: 0 description: "This runner is going to be deleted" agent_labels: '["runner_to_be_deleted","linux"]' +- + id: 34348 + name: runner_to_be_deleted-repo1 + uuid: 3EF231BD-FBB7-4E4B-9602-E6F28363EF20 + token_hash: 3EF231BD-FBB7-4E4B-9602-E6F28363EF20 + version: "1.0.0" + owner_id: 0 + repo_id: 1 + description: "This runner is going to be deleted" + agent_labels: '["runner_to_be_deleted","linux"]'