2018-06-11 15:13:19 +02:00
package stacks
import (
2018-09-10 12:01:38 +02:00
"errors"
2018-06-18 12:07:56 +02:00
"log"
2018-06-11 15:13:19 +02:00
"net/http"
2019-10-07 16:12:21 +13:00
"github.com/docker/cli/cli/compose/loader"
2019-11-13 12:41:42 +13:00
"github.com/docker/cli/cli/compose/types"
2018-09-10 12:01:38 +02:00
httperror "github.com/portainer/libhttp/error"
"github.com/portainer/libhttp/request"
2019-11-13 12:41:42 +13:00
"github.com/portainer/libhttp/response"
2020-07-27 00:31:14 +03:00
portainer "github.com/portainer/portainer/api"
2020-07-08 00:57:52 +03:00
bolterrors "github.com/portainer/portainer/api/bolt/errors"
httperrors "github.com/portainer/portainer/api/http/errors"
2019-11-13 12:41:42 +13:00
"github.com/portainer/portainer/api/http/security"
2020-06-16 10:58:16 +03:00
"github.com/portainer/portainer/api/internal/authorization"
2018-06-11 15:13:19 +02:00
)
func ( handler * Handler ) cleanUp ( stack * portainer . Stack , doCleanUp * bool ) error {
if ! * doCleanUp {
return nil
}
2018-06-18 12:07:56 +02:00
err := handler . FileService . RemoveDirectory ( stack . ProjectPath )
if err != nil {
log . Printf ( "http error: Unable to cleanup stack creation (err=%s)\n" , err )
}
2018-06-11 15:13:19 +02:00
return nil
}
// POST request on /api/stacks?type=<type>&method=<method>&endpointId=<endpointId>
func ( handler * Handler ) stackCreate ( w http . ResponseWriter , r * http . Request ) * httperror . HandlerError {
stackType , err := request . RetrieveNumericQueryParameter ( r , "type" , false )
if err != nil {
return & httperror . HandlerError { http . StatusBadRequest , "Invalid query parameter: type" , err }
}
method , err := request . RetrieveQueryParameter ( r , "method" , false )
if err != nil {
return & httperror . HandlerError { http . StatusBadRequest , "Invalid query parameter: method" , err }
}
endpointID , err := request . RetrieveNumericQueryParameter ( r , "endpointId" , false )
if err != nil {
return & httperror . HandlerError { http . StatusBadRequest , "Invalid query parameter: endpointId" , err }
}
2021-02-09 10:09:06 +02:00
endpoint , err := handler . DataStore . Endpoint ( ) . Endpoint ( portainer . EndpointID ( endpointID ) )
if err == bolterrors . ErrObjectNotFound {
return & httperror . HandlerError { http . StatusNotFound , "Unable to find an endpoint with the specified identifier inside the database" , err }
} else if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to find an endpoint with the specified identifier inside the database" , err }
2020-07-27 10:11:32 +03:00
}
2021-02-09 10:09:06 +02:00
if ! endpoint . SecuritySettings . AllowStackManagementForRegularUsers {
2020-07-27 10:11:32 +03:00
securityContext , err := security . RetrieveRestrictedRequestContext ( r )
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to retrieve user info from request context" , err }
}
canCreate , err := handler . userCanCreateStack ( securityContext , portainer . EndpointID ( endpointID ) )
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to verify user authorizations to validate stack creation" , err }
}
if ! canCreate {
errMsg := "Stack creation is disabled for non-admin users"
return & httperror . HandlerError { http . StatusForbidden , errMsg , errors . New ( errMsg ) }
}
}
2020-08-11 08:41:37 +03:00
err = handler . requestBouncer . AuthorizedEndpointOperation ( r , endpoint )
2018-06-11 15:13:19 +02:00
if err != nil {
2019-05-24 18:04:58 +12:00
return & httperror . HandlerError { http . StatusForbidden , "Permission denied to access endpoint" , err }
2018-06-11 15:13:19 +02:00
}
2019-11-13 12:41:42 +13:00
tokenData , err := security . RetrieveTokenData ( r )
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to retrieve user details from authentication token" , err }
}
2018-06-11 15:13:19 +02:00
switch portainer . StackType ( stackType ) {
case portainer . DockerSwarmStack :
2019-11-13 12:41:42 +13:00
return handler . createSwarmStack ( w , r , method , endpoint , tokenData . ID )
2018-06-11 15:13:19 +02:00
case portainer . DockerComposeStack :
2019-11-13 12:41:42 +13:00
return handler . createComposeStack ( w , r , method , endpoint , tokenData . ID )
2020-07-06 11:21:03 +12:00
case portainer . KubernetesStack :
if tokenData . Role != portainer . AdministratorRole {
2020-07-08 00:57:52 +03:00
return & httperror . HandlerError { http . StatusForbidden , "Access denied" , httperrors . ErrUnauthorized }
2020-07-06 11:21:03 +12:00
}
return handler . createKubernetesStack ( w , r , endpoint )
2018-06-11 15:13:19 +02:00
}
2018-09-10 12:01:38 +02:00
return & httperror . HandlerError { http . StatusBadRequest , "Invalid value for query parameter: type. Value must be one of: 1 (Swarm stack) or 2 (Compose stack)" , errors . New ( request . ErrInvalidQueryParameter ) }
2018-06-11 15:13:19 +02:00
}
2019-11-13 12:41:42 +13:00
func ( handler * Handler ) createComposeStack ( w http . ResponseWriter , r * http . Request , method string , endpoint * portainer . Endpoint , userID portainer . UserID ) * httperror . HandlerError {
2018-06-11 15:13:19 +02:00
switch method {
case "string" :
2019-11-13 12:41:42 +13:00
return handler . createComposeStackFromFileContent ( w , r , endpoint , userID )
2018-06-11 15:13:19 +02:00
case "repository" :
2019-11-13 12:41:42 +13:00
return handler . createComposeStackFromGitRepository ( w , r , endpoint , userID )
2018-06-11 15:13:19 +02:00
case "file" :
2019-11-13 12:41:42 +13:00
return handler . createComposeStackFromFileUpload ( w , r , endpoint , userID )
2018-06-11 15:13:19 +02:00
}
2018-09-10 12:01:38 +02:00
return & httperror . HandlerError { http . StatusBadRequest , "Invalid value for query parameter: method. Value must be one of: string, repository or file" , errors . New ( request . ErrInvalidQueryParameter ) }
2018-06-11 15:13:19 +02:00
}
2019-11-13 12:41:42 +13:00
func ( handler * Handler ) createSwarmStack ( w http . ResponseWriter , r * http . Request , method string , endpoint * portainer . Endpoint , userID portainer . UserID ) * httperror . HandlerError {
2018-06-11 15:13:19 +02:00
switch method {
case "string" :
2019-11-13 12:41:42 +13:00
return handler . createSwarmStackFromFileContent ( w , r , endpoint , userID )
2018-06-11 15:13:19 +02:00
case "repository" :
2019-11-13 12:41:42 +13:00
return handler . createSwarmStackFromGitRepository ( w , r , endpoint , userID )
2018-06-11 15:13:19 +02:00
case "file" :
2019-11-13 12:41:42 +13:00
return handler . createSwarmStackFromFileUpload ( w , r , endpoint , userID )
2018-06-11 15:13:19 +02:00
}
2018-09-10 12:01:38 +02:00
return & httperror . HandlerError { http . StatusBadRequest , "Invalid value for query parameter: method. Value must be one of: string, repository or file" , errors . New ( request . ErrInvalidQueryParameter ) }
2018-06-11 15:13:19 +02:00
}
2019-10-07 16:12:21 +13:00
2021-02-09 10:09:06 +02:00
func ( handler * Handler ) isValidStackFile ( stackFileContent [ ] byte , securitySettings * portainer . EndpointSecuritySettings ) error {
2019-10-07 16:12:21 +13:00
composeConfigYAML , err := loader . ParseYAML ( stackFileContent )
if err != nil {
2020-07-22 21:38:45 +03:00
return err
2019-10-07 16:12:21 +13:00
}
composeConfigFile := types . ConfigFile {
Config : composeConfigYAML ,
}
composeConfigDetails := types . ConfigDetails {
ConfigFiles : [ ] types . ConfigFile { composeConfigFile } ,
Environment : map [ string ] string { } ,
}
composeConfig , err := loader . Load ( composeConfigDetails , func ( options * loader . Options ) {
options . SkipValidation = true
options . SkipInterpolation = true
} )
if err != nil {
2020-07-22 21:38:45 +03:00
return err
2019-10-07 16:12:21 +13:00
}
for key := range composeConfig . Services {
service := composeConfig . Services [ key ]
2021-02-09 10:09:06 +02:00
if ! securitySettings . AllowBindMountsForRegularUsers {
2020-07-22 21:38:45 +03:00
for _ , volume := range service . Volumes {
if volume . Type == "bind" {
return errors . New ( "bind-mount disabled for non administrator users" )
}
2019-10-07 16:12:21 +13:00
}
}
2020-07-22 21:38:45 +03:00
2021-02-09 10:09:06 +02:00
if ! securitySettings . AllowPrivilegedModeForRegularUsers && service . Privileged == true {
2020-07-22 21:38:45 +03:00
return errors . New ( "privileged mode disabled for non administrator users" )
}
2020-07-25 02:14:46 +03:00
2021-02-09 10:09:06 +02:00
if ! securitySettings . AllowHostNamespaceForRegularUsers && service . Pid == "host" {
2020-07-25 02:14:46 +03:00
return errors . New ( "pid host disabled for non administrator users" )
}
2020-07-27 00:31:14 +03:00
2021-02-09 10:09:06 +02:00
if ! securitySettings . AllowDeviceMappingForRegularUsers && service . Devices != nil && len ( service . Devices ) > 0 {
2020-07-27 00:31:14 +03:00
return errors . New ( "device mapping disabled for non administrator users" )
}
2020-07-28 10:08:15 +03:00
2021-02-09 10:09:06 +02:00
if ! securitySettings . AllowContainerCapabilitiesForRegularUsers && ( len ( service . CapAdd ) > 0 || len ( service . CapDrop ) > 0 ) {
2020-07-28 10:08:15 +03:00
return errors . New ( "container capabilities disabled for non administrator users" )
}
2019-10-07 16:12:21 +13:00
}
2020-07-22 21:38:45 +03:00
return nil
2019-10-07 16:12:21 +13:00
}
2019-11-13 12:41:42 +13:00
func ( handler * Handler ) decorateStackResponse ( w http . ResponseWriter , stack * portainer . Stack , userID portainer . UserID ) * httperror . HandlerError {
2021-01-20 15:19:35 +13:00
var resourceControl * portainer . ResourceControl
2019-11-13 12:41:42 +13:00
2021-01-20 15:19:35 +13:00
isAdmin , err := handler . userIsAdmin ( userID )
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to load user information from the database" , err }
}
if isAdmin {
resourceControl = authorization . NewAdministratorsOnlyResourceControl ( stack . Name , portainer . StackResourceControl )
} else {
resourceControl = authorization . NewPrivateResourceControl ( stack . Name , portainer . StackResourceControl , userID )
}
err = handler . DataStore . ResourceControl ( ) . CreateResourceControl ( resourceControl )
2019-11-13 12:41:42 +13:00
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to persist resource control inside the database" , err }
}
stack . ResourceControl = resourceControl
return response . JSON ( w , stack )
}