mirror of
https://github.com/portainer/portainer.git
synced 2025-07-20 13:59:40 +02:00
* feat(endpoints): create an associated endpoints selector * feat(schedules): remove edge specific explanations * refactor(schedule): replace multi-endpoint-selector * refactor(schedule): move controller to single file * refactor(endpoints): remove multi-endpoint-selector * feat(edge): rename host jobs to edge jobs * feat(edge-jobs): remove edge warning * refactor(edge-jobs): move schedule pages to edge * refactor(edge-jobs): mv views to edgeJobs * refactor(edge-jobs): rename edge jobs * refactor(edge-jobs): move services to edge * refactor(edge-jobs): move tasks datatable * fix(edge-jobs): fix import * fix(edge-jobs): use right services * feat(settings): adjust host management description * feat(edge-jobs): introduce interfaces and types * feat(edge-jobs): implement bolt service * refactor(edge-jobs): replace schedule routes * refactor(edge-job): replace Schedule service * refactor(edge-jobs): remove job_script_exec * refactor(host): remove jobs table * feat(edge-jobs): replace schedule * feat(edge-jobs): load file on inspect * fix(edge-job): parse cron correctly * feat(edge-jobs): show tasks * feat(host): rename tooltip * refactor(host): remove old components * refactor(main): remove schedule types * refactor(snapshot): replace job service with snapshot service * refactor(jobs): remove jobs form and datatable * feat(edge-jobs): create db migration * fix(main): start snapshot service with correct interval * feat(settings): change host tooltip * feat(edge-jobs): load endpoints * fix(edge-job): disable form submit when form is invalid * refactor(edge-compute): use const * refactor(edge-jobs): use generic controller * refactor(edge-jobs): replace $scope with controllerAs * refactor(edge-jobs): replace routes with components * refactor(edge-jobs): replace functions with classes * refactor(edge-jobs): use async/await * refactor(edge-jobs): rename functions * feat(edge-jobs): introduce beta panel * feat(edge-jobs): allow single character names * fix(snapshot): run snapshot in coroutine * feat(edge-jobs): add logs status * feat(filesystem): add edge job logs methods * feat(edge-jobs): intoduce edge jobs tasks api * feat(edge-jobs): remove schedule task model * fix(fs): build edge job task file path * fix(edge-jobs): update task meta * fix(edge-jobs): return a list of endpoints * feat(edge-jobs): update logs from agent * feat(edge-jobs): collect logs * feat(edge-jobs): rename url * feat(edge-jobs): refresh to same tab * feat(edge-jobs): remove old info * refactor(edge-jobs): rename script path json * fix(edge-job): save file before adding job * feat(edge-job): show retrieving logs label * feat(edge-job): replace cron with 5 places * refactor(edge-jobs): replace tasks with results * feat(edge-jobs): add auto refresh until logs are collected * feat(edge-jobs): fix column size * feat(edge-job): display editor * feat(edge-job): add name validation * feat(edge-job): set default time for 1 hour from now * feat(edge-job): add validation for cron format * feat(edge-job): add a note about timezone * fix(edge-job): replace regex * fix(edge-job): check for every minute cron * style(edge-jobs): add reference for cron regex * refactor(edge-jobs): rename migration name * refactor(edge-job): rename edge job response * refactor(snapshot): rename snapshot endpoint method * refactor(edge-jobs): move tasks handler to edgejobs * feat(security): introduce a middleware for edge compute operations * feat(edge-job): use edge compute middleware * feat(edge-groups): filter http actions based on edge setting * fix(security): return from edge bouncer if failed * feat(edge-stacks): filter http actions based on edge setting * feat(edge-groups): show error when failed to load groups * refactor(db): remove edge-jobs migration * refactor(migrator): remove unused dependency Co-authored-by: Anthony Lapenna <lapenna.anthony@gmail.com>
144 lines
4.1 KiB
Go
144 lines
4.1 KiB
Go
package chisel
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"fmt"
|
|
"math/rand"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/portainer/libcrypto"
|
|
|
|
"github.com/dchest/uniuri"
|
|
portainer "github.com/portainer/portainer/api"
|
|
)
|
|
|
|
const (
|
|
minAvailablePort = 49152
|
|
maxAvailablePort = 65535
|
|
)
|
|
|
|
// getUnusedPort is used to generate an unused random port in the dynamic port range.
|
|
// Dynamic ports (also called private ports) are 49152 to 65535.
|
|
func (service *Service) getUnusedPort() int {
|
|
port := randomInt(minAvailablePort, maxAvailablePort)
|
|
|
|
for item := range service.tunnelDetailsMap.IterBuffered() {
|
|
tunnel := item.Val.(*portainer.TunnelDetails)
|
|
if tunnel.Port == port {
|
|
return service.getUnusedPort()
|
|
}
|
|
}
|
|
|
|
return port
|
|
}
|
|
|
|
func randomInt(min, max int) int {
|
|
return min + rand.Intn(max-min)
|
|
}
|
|
|
|
// GetTunnelDetails returns information about the tunnel associated to an endpoint.
|
|
func (service *Service) GetTunnelDetails(endpointID portainer.EndpointID) *portainer.TunnelDetails {
|
|
key := strconv.Itoa(int(endpointID))
|
|
|
|
if item, ok := service.tunnelDetailsMap.Get(key); ok {
|
|
tunnelDetails := item.(*portainer.TunnelDetails)
|
|
return tunnelDetails
|
|
}
|
|
|
|
jobs := make([]portainer.EdgeJob, 0)
|
|
return &portainer.TunnelDetails{
|
|
Status: portainer.EdgeAgentIdle,
|
|
Port: 0,
|
|
Jobs: jobs,
|
|
Credentials: "",
|
|
}
|
|
}
|
|
|
|
// SetTunnelStatusToActive update the status of the tunnel associated to the specified endpoint.
|
|
// It sets the status to ACTIVE.
|
|
func (service *Service) SetTunnelStatusToActive(endpointID portainer.EndpointID) {
|
|
tunnel := service.GetTunnelDetails(endpointID)
|
|
tunnel.Status = portainer.EdgeAgentActive
|
|
tunnel.Credentials = ""
|
|
tunnel.LastActivity = time.Now()
|
|
|
|
key := strconv.Itoa(int(endpointID))
|
|
service.tunnelDetailsMap.Set(key, tunnel)
|
|
}
|
|
|
|
// SetTunnelStatusToIdle update the status of the tunnel associated to the specified endpoint.
|
|
// It sets the status to IDLE.
|
|
// It removes any existing credentials associated to the tunnel.
|
|
func (service *Service) SetTunnelStatusToIdle(endpointID portainer.EndpointID) {
|
|
tunnel := service.GetTunnelDetails(endpointID)
|
|
|
|
tunnel.Status = portainer.EdgeAgentIdle
|
|
tunnel.Port = 0
|
|
tunnel.LastActivity = time.Now()
|
|
|
|
credentials := tunnel.Credentials
|
|
if credentials != "" {
|
|
tunnel.Credentials = ""
|
|
service.chiselServer.DeleteUser(strings.Split(credentials, ":")[0])
|
|
}
|
|
|
|
key := strconv.Itoa(int(endpointID))
|
|
service.tunnelDetailsMap.Set(key, tunnel)
|
|
}
|
|
|
|
// SetTunnelStatusToRequired update the status of the tunnel associated to the specified endpoint.
|
|
// It sets the status to REQUIRED.
|
|
// If no port is currently associated to the tunnel, it will associate a random unused port to the tunnel
|
|
// and generate temporary credentials that can be used to establish a reverse tunnel on that port.
|
|
// Credentials are encrypted using the Edge ID associated to the endpoint.
|
|
func (service *Service) SetTunnelStatusToRequired(endpointID portainer.EndpointID) error {
|
|
tunnel := service.GetTunnelDetails(endpointID)
|
|
|
|
if tunnel.Port == 0 {
|
|
endpoint, err := service.dataStore.Endpoint().Endpoint(endpointID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
tunnel.Status = portainer.EdgeAgentManagementRequired
|
|
tunnel.Port = service.getUnusedPort()
|
|
tunnel.LastActivity = time.Now()
|
|
|
|
username, password := generateRandomCredentials()
|
|
authorizedRemote := fmt.Sprintf("^R:0.0.0.0:%d$", tunnel.Port)
|
|
err = service.chiselServer.AddUser(username, password, authorizedRemote)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
credentials, err := encryptCredentials(username, password, endpoint.EdgeID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
tunnel.Credentials = credentials
|
|
|
|
key := strconv.Itoa(int(endpointID))
|
|
service.tunnelDetailsMap.Set(key, tunnel)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func generateRandomCredentials() (string, string) {
|
|
username := uniuri.NewLen(8)
|
|
password := uniuri.NewLen(8)
|
|
return username, password
|
|
}
|
|
|
|
func encryptCredentials(username, password, key string) (string, error) {
|
|
credentials := fmt.Sprintf("%s:%s", username, password)
|
|
|
|
encryptedCredentials, err := libcrypto.Encrypt([]byte(credentials), []byte(key))
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return base64.RawStdEncoding.EncodeToString(encryptedCredentials), nil
|
|
}
|