mirror of
https://github.com/portainer/portainer.git
synced 2025-07-19 13:29:41 +02:00
* use the Store interface IsErrObjectNotFound() to avoid revealing internal errors Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * what happens when you extract the datastore interfaces into their own package Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * Start renaming Storage methods Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * extract the boltdb specific code from the Portainer storage code (example, the others need the same) Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * more extract bolt.Tx from datastore code Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * minimise imports by putting moving the struct definition into the file that needs the Service imports Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * more extraction of boltdb.Tx Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * extract the use of bucket.SetSequence Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * almost done - just endpoint.Synchonise :/ Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * so, endpoint.Synchonize looks hard, but i can't find where we use it, so 'delete first refactoring' Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * fix test compile errors Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * test compile fixes after rebase Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * fix a mis-remembering I had wrt deserialisation - last time i used AnyData - jsoniter's bindTo looks interesting for the same reason Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * set us up to make the connection an interface Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * make the db connection a datastore interface, and separate out our datastore services from the bolt ones Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * rename methods to something less oltdb internals specific Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * these errors are not boltdb secific Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * start using the db-backend factory method too Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * export boltdb raw in case we can't export from the service layer Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * add a raw export from boltdb to yaml for broken db's, and an export services to yaml in backup Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * add the version info by hand for now Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * actually, the export from services can be fully typed - its the import that needs to do more work Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * redo raw export, and make import capable of using it Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * add DockerHub Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * migration from anything older than v1.21.0 has been broken for quite a while, deleting the un-tested code Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * fix go test ./... again Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * my goland wasn't setup to gofmt Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * move the two extremely dubious migration tests down into store, so they can use the test store code Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * the migrator is now free of boltdb Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * reverse goland overzealous replcement of internal with boltdb Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * more undo over-zealous goland internal->boltdb Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * yay, now bolt is only mentioned inside the api/database/ dir Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * and this might be the last of the boltdb references? Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * add todo Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * extract the store code into a separate module too Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * don't need the fileService in boltdb anymore Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * use IsErrObjectNotFound() Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * use a string to select what database backend we use Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * make isNew store an ephemeral bool that doesn't stay true after we've initialised it Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * move the import.json wip to a separate file so its more obvious - we'll be using it for testing, emergency fixups, and in the next part of the store work, when we improve migrations and data model lifecycles Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * undo vscode formatting html Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * fix app templates symbol (#6221) * feat(webhook) EE-2125 send registry auth haeder when update swarms service via webhook (#6220) * feat(webhook) EE-2125 add some helpers to registry utils * feat(webhook) EE-2125 persist registryID when creating a webhook * feat(webhook) EE-2125 send registry auth header when executing a webhook * feat(webhook) EE-2125 send registryID to backend when creating a service with webhook * feat(webhook) EE-2125 use the initial registry ID to create webhook on editing service screen * feat(webhook) EE-2125 update webhook when update registry * feat(webhook) EE-2125 add endpoint of update webhook * feat(webhook) EE-2125 code cleanup * feat(webhook) EE-2125 fix a typo * feat(webhook) EE-2125 fix circle import issue with unit test Co-authored-by: Simon Meng <simon.meng@portainer.io> * fix(kubeconfig): show kubeconfig download button for non admin users [EE-2123] (#6204) Co-authored-by: Simon Meng <simon.meng@portainer.io> * fix data-cy for k8s cluster menu (#6226) LGTM * feat(stack): make stack created from app template editable EE-1941 (#6104) feat(stack): make stack from app template editable * fix(container):disable Duplicate/Edit button when the container is portainer (#6223) * fix/ee-1909/show-pull-image-error (#6195) Co-authored-by: sunportainer <ericsun@SG1.local> * feat(cy): add data-cy to helm install button (#6241) * feat(cy): add data-cy to add registry button (#6242) * refactor(app): convert root folder files to es6 (#4159) * refactor(app): duplicate constants as es6 exports (#4158) * fix(docker): provide workaround to save network name variable (#6080) * fix/EE-1862/unable-to-stop-or-remove-stack workaround for var without default value in yaml file * fix/EE-1862/unable-to-stop-or-remove-stack check yaml file * fixed func and var names * wrapper error and used bool for stringset * UT case for createNetworkEnvFile * UT case for %s=%s * powerful StringSet * wrapper error for extract network name * wrapper all the return err * store more env * put to env file * make default value None * feat: gzip static resources (#6258) * fix(ssl)//handle --sslcert and --sslkey ee-2106 (#6203) * fix/ee-2106/handle-sslcert-sslkey Co-authored-by: sunportainer <ericsun@SG1.local> * fix(server):support disable https only ee-2068 (#6232) * fix/ee-2068/disable-forcely-https * feat(store): implement store tests EE-2112 (#6224) * add store tests * add some more tests * Update missing helm user repo methods * remove redundant comments * add webhook export * update webhooks * use the Store interface IsErrObjectNotFound() to avoid revealing internal errors Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * what happens when you extract the datastore interfaces into their own package Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * Start renaming Storage methods Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * extract the boltdb specific code from the Portainer storage code (example, the others need the same) Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * more extract bolt.Tx from datastore code Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * minimise imports by putting moving the struct definition into the file that needs the Service imports Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * more extraction of boltdb.Tx Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * extract the use of bucket.SetSequence Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * almost done - just endpoint.Synchonise :/ Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * so, endpoint.Synchonize looks hard, but i can't find where we use it, so 'delete first refactoring' Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * fix test compile errors Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * test compile fixes after rebase Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * fix a mis-remembering I had wrt deserialisation - last time i used AnyData - jsoniter's bindTo looks interesting for the same reason Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * set us up to make the connection an interface Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * make the db connection a datastore interface, and separate out our datastore services from the bolt ones Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * rename methods to something less oltdb internals specific Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * these errors are not boltdb secific Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * start using the db-backend factory method too Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * export boltdb raw in case we can't export from the service layer Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * add a raw export from boltdb to yaml for broken db's, and an export services to yaml in backup Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * add the version info by hand for now Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * actually, the export from services can be fully typed - its the import that needs to do more work Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * redo raw export, and make import capable of using it Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * add DockerHub Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * migration from anything older than v1.21.0 has been broken for quite a while, deleting the un-tested code Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * fix go test ./... again Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * my goland wasn't setup to gofmt Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * move the two extremely dubious migration tests down into store, so they can use the test store code Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * the migrator is now free of boltdb Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * reverse goland overzealous replcement of internal with boltdb Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * more undo over-zealous goland internal->boltdb Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * yay, now bolt is only mentioned inside the api/database/ dir Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * and this might be the last of the boltdb references? Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * add todo Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * extract the store code into a separate module too Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * don't need the fileService in boltdb anymore Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * use IsErrObjectNotFound() Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * use a string to select what database backend we use Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * make isNew store an ephemeral bool that doesn't stay true after we've initialised it Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * move the import.json wip to a separate file so its more obvious - we'll be using it for testing, emergency fixups, and in the next part of the store work, when we improve migrations and data model lifecycles Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * undo vscode formatting html Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io> * Update missing helm user repo methods * feat(store): implement store tests EE-2112 (#6224) * add store tests * add some more tests * remove redundant comments * add webhook export * update webhooks * fix build issues after rebasing * move migratorparams * remove unneeded integer type conversions * disable the db import/export for now Co-authored-by: Richard Wei <54336863+WaysonWei@users.noreply.github.com> Co-authored-by: cong meng <mcpacino@gmail.com> Co-authored-by: Simon Meng <simon.meng@portainer.io> Co-authored-by: Marcelo Rydel <marcelorydel26@gmail.com> Co-authored-by: Hao Zhang <hao.zhang@portainer.io> Co-authored-by: sunportainer <93502624+sunportainer@users.noreply.github.com> Co-authored-by: sunportainer <ericsun@SG1.local> Co-authored-by: wheresolivia <78844659+wheresolivia@users.noreply.github.com> Co-authored-by: Chaim Lev-Ari <chiptus@users.noreply.github.com> Co-authored-by: Chao Geng <93526589+chaogeng77977@users.noreply.github.com> Co-authored-by: Dmitry Salakhov <to@dimasalakhov.com> Co-authored-by: Matt Hook <hookenz@gmail.com>
282 lines
7.9 KiB
Go
282 lines
7.9 KiB
Go
package migrator
|
|
|
|
import (
|
|
"fmt"
|
|
"github.com/portainer/portainer/api/dataservices/errors"
|
|
"log"
|
|
|
|
portainer "github.com/portainer/portainer/api"
|
|
"github.com/portainer/portainer/api/internal/endpointutils"
|
|
snapshotutils "github.com/portainer/portainer/api/internal/snapshot"
|
|
)
|
|
|
|
func (m *Migrator) migrateDBVersionToDB32() error {
|
|
migrateLog.Info("Updating registries")
|
|
err := m.updateRegistriesToDB32()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
migrateLog.Info("Updating dockerhub")
|
|
err = m.updateDockerhubToDB32()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
migrateLog.Info("Updating resource controls")
|
|
if err := m.updateVolumeResourceControlToDB32(); err != nil {
|
|
return err
|
|
}
|
|
|
|
migrateLog.Info("Updating kubeconfig expiry")
|
|
if err := m.kubeconfigExpiryToDB32(); err != nil {
|
|
return err
|
|
}
|
|
|
|
migrateLog.Info("Setting default helm repository url")
|
|
if err := m.helmRepositoryURLToDB32(); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Migrator) updateRegistriesToDB32() error {
|
|
registries, err := m.registryService.Registries()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
endpoints, err := m.endpointService.Endpoints()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, registry := range registries {
|
|
|
|
registry.RegistryAccesses = portainer.RegistryAccesses{}
|
|
|
|
for _, endpoint := range endpoints {
|
|
|
|
filteredUserAccessPolicies := portainer.UserAccessPolicies{}
|
|
for userId, registryPolicy := range registry.UserAccessPolicies {
|
|
if _, found := endpoint.UserAccessPolicies[userId]; found {
|
|
filteredUserAccessPolicies[userId] = registryPolicy
|
|
}
|
|
}
|
|
|
|
filteredTeamAccessPolicies := portainer.TeamAccessPolicies{}
|
|
for teamId, registryPolicy := range registry.TeamAccessPolicies {
|
|
if _, found := endpoint.TeamAccessPolicies[teamId]; found {
|
|
filteredTeamAccessPolicies[teamId] = registryPolicy
|
|
}
|
|
}
|
|
|
|
registry.RegistryAccesses[endpoint.ID] = portainer.RegistryAccessPolicies{
|
|
UserAccessPolicies: filteredUserAccessPolicies,
|
|
TeamAccessPolicies: filteredTeamAccessPolicies,
|
|
Namespaces: []string{},
|
|
}
|
|
}
|
|
m.registryService.UpdateRegistry(registry.ID, ®istry)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *Migrator) updateDockerhubToDB32() error {
|
|
dockerhub, err := m.dockerhubService.DockerHub()
|
|
if err == errors.ErrObjectNotFound {
|
|
return nil
|
|
} else if err != nil {
|
|
return err
|
|
}
|
|
|
|
if !dockerhub.Authentication {
|
|
return nil
|
|
}
|
|
|
|
registry := &portainer.Registry{
|
|
Type: portainer.DockerHubRegistry,
|
|
Name: "Dockerhub (authenticated - migrated)",
|
|
URL: "docker.io",
|
|
Authentication: true,
|
|
Username: dockerhub.Username,
|
|
Password: dockerhub.Password,
|
|
RegistryAccesses: portainer.RegistryAccesses{},
|
|
}
|
|
|
|
// The following code will make this function idempotent.
|
|
// i.e. if run again, it will not change the data. It will ensure that
|
|
// we only have one migrated registry entry. Duplicates will be removed
|
|
// if they exist and which has been happening due to earlier migration bugs
|
|
migrated := false
|
|
registries, _ := m.registryService.Registries()
|
|
for _, r := range registries {
|
|
if r.Type == registry.Type &&
|
|
r.Name == registry.Name &&
|
|
r.URL == registry.URL &&
|
|
r.Authentication == registry.Authentication {
|
|
|
|
if !migrated {
|
|
// keep this one entry
|
|
migrated = true
|
|
} else {
|
|
// delete subsequent duplicates
|
|
m.registryService.DeleteRegistry(portainer.RegistryID(r.ID))
|
|
}
|
|
}
|
|
}
|
|
|
|
if migrated {
|
|
return nil
|
|
}
|
|
|
|
endpoints, err := m.endpointService.Endpoints()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, endpoint := range endpoints {
|
|
|
|
if endpoint.Type != portainer.KubernetesLocalEnvironment &&
|
|
endpoint.Type != portainer.AgentOnKubernetesEnvironment &&
|
|
endpoint.Type != portainer.EdgeAgentOnKubernetesEnvironment {
|
|
|
|
userAccessPolicies := portainer.UserAccessPolicies{}
|
|
for userId := range endpoint.UserAccessPolicies {
|
|
if _, found := endpoint.UserAccessPolicies[userId]; found {
|
|
userAccessPolicies[userId] = portainer.AccessPolicy{
|
|
RoleID: 0,
|
|
}
|
|
}
|
|
}
|
|
|
|
teamAccessPolicies := portainer.TeamAccessPolicies{}
|
|
for teamId := range endpoint.TeamAccessPolicies {
|
|
if _, found := endpoint.TeamAccessPolicies[teamId]; found {
|
|
teamAccessPolicies[teamId] = portainer.AccessPolicy{
|
|
RoleID: 0,
|
|
}
|
|
}
|
|
}
|
|
|
|
registry.RegistryAccesses[endpoint.ID] = portainer.RegistryAccessPolicies{
|
|
UserAccessPolicies: userAccessPolicies,
|
|
TeamAccessPolicies: teamAccessPolicies,
|
|
Namespaces: []string{},
|
|
}
|
|
}
|
|
}
|
|
|
|
return m.registryService.Create(registry)
|
|
}
|
|
|
|
func (m *Migrator) updateVolumeResourceControlToDB32() error {
|
|
endpoints, err := m.endpointService.Endpoints()
|
|
if err != nil {
|
|
return fmt.Errorf("failed fetching environments: %w", err)
|
|
}
|
|
|
|
resourceControls, err := m.resourceControlService.ResourceControls()
|
|
if err != nil {
|
|
return fmt.Errorf("failed fetching resource controls: %w", err)
|
|
}
|
|
|
|
toUpdate := map[portainer.ResourceControlID]string{}
|
|
volumeResourceControls := map[string]*portainer.ResourceControl{}
|
|
|
|
for i := range resourceControls {
|
|
resourceControl := resourceControls[i]
|
|
if resourceControl.Type == portainer.VolumeResourceControl {
|
|
volumeResourceControls[resourceControl.ResourceID] = &resourceControl
|
|
}
|
|
}
|
|
|
|
for _, endpoint := range endpoints {
|
|
if !endpointutils.IsDockerEndpoint(&endpoint) {
|
|
continue
|
|
}
|
|
|
|
totalSnapshots := len(endpoint.Snapshots)
|
|
if totalSnapshots == 0 {
|
|
log.Println("[DEBUG] [volume migration] [message: no snapshot found]")
|
|
continue
|
|
}
|
|
|
|
snapshot := endpoint.Snapshots[totalSnapshots-1]
|
|
|
|
endpointDockerID, err := snapshotutils.FetchDockerID(snapshot)
|
|
if err != nil {
|
|
log.Printf("[WARN] [database,migrator,v31] [message: failed fetching environment docker id] [err: %s]", err)
|
|
continue
|
|
}
|
|
|
|
if volumesData, done := snapshot.SnapshotRaw.Volumes.(map[string]interface{}); done {
|
|
if volumesData["Volumes"] == nil {
|
|
log.Println("[DEBUG] [volume migration] [message: no volume data found]")
|
|
continue
|
|
}
|
|
|
|
findResourcesToUpdateForDB32(endpointDockerID, volumesData, toUpdate, volumeResourceControls)
|
|
}
|
|
}
|
|
|
|
for _, resourceControl := range volumeResourceControls {
|
|
if newResourceID, ok := toUpdate[resourceControl.ID]; ok {
|
|
resourceControl.ResourceID = newResourceID
|
|
err := m.resourceControlService.UpdateResourceControl(resourceControl.ID, resourceControl)
|
|
if err != nil {
|
|
return fmt.Errorf("failed updating resource control %d: %w", resourceControl.ID, err)
|
|
}
|
|
|
|
} else {
|
|
err := m.resourceControlService.DeleteResourceControl(resourceControl.ID)
|
|
if err != nil {
|
|
return fmt.Errorf("failed deleting resource control %d: %w", resourceControl.ID, err)
|
|
}
|
|
log.Printf("[DEBUG] [volume migration] [message: legacy resource control(%s) has been deleted]", resourceControl.ResourceID)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func findResourcesToUpdateForDB32(dockerID string, volumesData map[string]interface{}, toUpdate map[portainer.ResourceControlID]string, volumeResourceControls map[string]*portainer.ResourceControl) {
|
|
volumes := volumesData["Volumes"].([]interface{})
|
|
for _, volumeMeta := range volumes {
|
|
volume := volumeMeta.(map[string]interface{})
|
|
volumeName, nameExist := volume["Name"].(string)
|
|
if !nameExist {
|
|
continue
|
|
}
|
|
createTime, createTimeExist := volume["CreatedAt"].(string)
|
|
if !createTimeExist {
|
|
continue
|
|
}
|
|
|
|
oldResourceID := fmt.Sprintf("%s%s", volumeName, createTime)
|
|
resourceControl, ok := volumeResourceControls[oldResourceID]
|
|
|
|
if ok {
|
|
toUpdate[resourceControl.ID] = fmt.Sprintf("%s_%s", volumeName, dockerID)
|
|
}
|
|
}
|
|
}
|
|
|
|
func (m *Migrator) kubeconfigExpiryToDB32() error {
|
|
settings, err := m.settingsService.Settings()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
settings.KubeconfigExpiry = portainer.DefaultKubeconfigExpiry
|
|
return m.settingsService.UpdateSettings(settings)
|
|
}
|
|
|
|
func (m *Migrator) helmRepositoryURLToDB32() error {
|
|
settings, err := m.settingsService.Settings()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
settings.HelmRepositoryURL = portainer.DefaultHelmRepositoryURL
|
|
return m.settingsService.UpdateSettings(settings)
|
|
}
|