mirror of
https://github.com/portainer/portainer.git
synced 2025-07-21 14:29:40 +02:00
* feat(stack): backport changes to CE EE-1189 * feat(stack): front end backport changes to CE EE-1199 (#5455) * feat(stack): front end backport changes to CE EE-1199 * fix k8s deploy logic * fixed web editor confirmation message typo. EE-1501 * fix(stack): fixed issue auth detail not remembered EE-1502 (#5459) * show status in buttons * removed onChangeRef function. * moved buttons in git form to its own component * removed unused variable. Co-authored-by: ArrisLee <arris_li@hotmail.com> * moved formvalue to kube app component * fix(stack): failed to pull and redeploy compose format k8s stack * fixed form value * fix(k8s): file content overridden when deployment failed with compose format EE-1548 * updated API response to get IsComposeFormat and show appropriate text. * feat(k8s): front end backport to CE * feat(kube): kube app auto update backend (#5547) * error message updates for different file type * not display creation source for external application * added confirmation modal to advanced app created by web editor * stop showing confirmation modal when updating application * disable rollback button when application type is not applicatiom form * only update file after deployment succeded * Revert "only update file after deployment succeded" This reverts commitb94bd2e96f
. * fix(k8s): file content overridden when deployment failed with compose format EE-1556 * added analytics-on directive to pull and redeploy button * fix(kube): don't valide resource control access for kube (#5568) * added missing question mark to k8s confirmation modal * fixed webhook format issue * added question marks to k8s app confirmation modal * added space in additional file list. * ignoring error on deletion * fix(k8s): Git authentication info not persisted * added RepositoryMechanismTypes constant * updated analytics functions * covert RepositoryMechanism to constant * fixed typo * removed unused function. * post tech review updates * fixed save settings n redeploy button * refact kub deploy logic * Revert "refact kub deploy logic" This reverts commitcbfdd58ece
. * feat(k8s): utilize user token for k8s auto update EE-1594 * feat(k8s): persist kub stack name EE-1630 * feat(k8s): support delete kub stack * fix(app): updated logic to delete stack for different kind apps. (#5648) * fix(app): updated logic to delete stack for different kind apps. * renamed variable * fix import * added StackName field. * fixed stack id not found issue. * fix(k8s): fixed qusetion mark alignment issue in PAT field. (#5611) * fix(k8s): fixed qusetion mark alignment issue in PAT field. * moved inline css to file. * fix(git-form: made auth input text full width * add ignore deleted arg * tech review updates * typo fix * fix(k8s): added console error when deleting k8s service. * fix(console): added no-console config * fix(deploy): added missing service. * fix: use stack editor as an owner when exists (#5678) * fix: tempalte/content based stacks edit/delete * fix(stack): remove stack when no app. (#5769) * fix(stack): remove stack when no app. * support compose format in delete Co-authored-by: ArrisLee <arris_li@hotmail.com> Co-authored-by: Hui <arris_li@hotmail.com> Co-authored-by: fhanportainer <79428273+fhanportainer@users.noreply.github.com> Co-authored-by: Felix Han <felix.han@portainer.io>
215 lines
7 KiB
Go
215 lines
7 KiB
Go
package stacks
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net/http"
|
|
"strings"
|
|
"sync"
|
|
|
|
"github.com/docker/docker/api/types"
|
|
"github.com/gorilla/mux"
|
|
"github.com/pkg/errors"
|
|
httperror "github.com/portainer/libhttp/error"
|
|
portainer "github.com/portainer/portainer/api"
|
|
bolterrors "github.com/portainer/portainer/api/bolt/errors"
|
|
"github.com/portainer/portainer/api/docker"
|
|
"github.com/portainer/portainer/api/http/security"
|
|
"github.com/portainer/portainer/api/internal/authorization"
|
|
"github.com/portainer/portainer/api/scheduler"
|
|
"github.com/portainer/portainer/api/stacks"
|
|
)
|
|
|
|
const defaultGitReferenceName = "refs/heads/master"
|
|
|
|
var (
|
|
errStackAlreadyExists = errors.New("A stack already exists with this name")
|
|
errWebhookIDAlreadyExists = errors.New("A webhook ID already exists")
|
|
errStackNotExternal = errors.New("Not an external stack")
|
|
)
|
|
|
|
// Handler is the HTTP handler used to handle stack operations.
|
|
type Handler struct {
|
|
stackCreationMutex *sync.Mutex
|
|
stackDeletionMutex *sync.Mutex
|
|
requestBouncer *security.RequestBouncer
|
|
*mux.Router
|
|
DataStore portainer.DataStore
|
|
DockerClientFactory *docker.ClientFactory
|
|
FileService portainer.FileService
|
|
GitService portainer.GitService
|
|
SwarmStackManager portainer.SwarmStackManager
|
|
ComposeStackManager portainer.ComposeStackManager
|
|
KubernetesDeployer portainer.KubernetesDeployer
|
|
Scheduler *scheduler.Scheduler
|
|
StackDeployer stacks.StackDeployer
|
|
}
|
|
|
|
// NewHandler creates a handler to manage stack operations.
|
|
func NewHandler(bouncer *security.RequestBouncer) *Handler {
|
|
h := &Handler{
|
|
Router: mux.NewRouter(),
|
|
stackCreationMutex: &sync.Mutex{},
|
|
stackDeletionMutex: &sync.Mutex{},
|
|
requestBouncer: bouncer,
|
|
}
|
|
h.Handle("/stacks",
|
|
bouncer.AuthenticatedAccess(httperror.LoggerHandler(h.stackCreate))).Methods(http.MethodPost)
|
|
h.Handle("/stacks",
|
|
bouncer.AuthenticatedAccess(httperror.LoggerHandler(h.stackList))).Methods(http.MethodGet)
|
|
h.Handle("/stacks/{id}",
|
|
bouncer.AuthenticatedAccess(httperror.LoggerHandler(h.stackInspect))).Methods(http.MethodGet)
|
|
h.Handle("/stacks/{id}",
|
|
bouncer.AuthenticatedAccess(httperror.LoggerHandler(h.stackDelete))).Methods(http.MethodDelete)
|
|
h.Handle("/stacks/{id}/associate",
|
|
bouncer.AdminAccess(httperror.LoggerHandler(h.stackAssociate))).Methods(http.MethodPut)
|
|
h.Handle("/stacks/{id}",
|
|
bouncer.AuthenticatedAccess(httperror.LoggerHandler(h.stackUpdate))).Methods(http.MethodPut)
|
|
h.Handle("/stacks/{id}/git",
|
|
bouncer.AuthenticatedAccess(httperror.LoggerHandler(h.stackUpdateGit))).Methods(http.MethodPost)
|
|
h.Handle("/stacks/{id}/git/redeploy",
|
|
bouncer.AuthenticatedAccess(httperror.LoggerHandler(h.stackGitRedeploy))).Methods(http.MethodPut)
|
|
h.Handle("/stacks/{id}/file",
|
|
bouncer.AuthenticatedAccess(httperror.LoggerHandler(h.stackFile))).Methods(http.MethodGet)
|
|
h.Handle("/stacks/{id}/migrate",
|
|
bouncer.AuthenticatedAccess(httperror.LoggerHandler(h.stackMigrate))).Methods(http.MethodPost)
|
|
h.Handle("/stacks/{id}/start",
|
|
bouncer.AuthenticatedAccess(httperror.LoggerHandler(h.stackStart))).Methods(http.MethodPost)
|
|
h.Handle("/stacks/{id}/stop",
|
|
bouncer.AuthenticatedAccess(httperror.LoggerHandler(h.stackStop))).Methods(http.MethodPost)
|
|
h.Handle("/stacks/webhooks/{webhookID}",
|
|
httperror.LoggerHandler(h.webhookInvoke)).Methods(http.MethodPost)
|
|
|
|
return h
|
|
}
|
|
|
|
func (handler *Handler) userCanAccessStack(securityContext *security.RestrictedRequestContext, endpointID portainer.EndpointID, resourceControl *portainer.ResourceControl) (bool, error) {
|
|
user, err := handler.DataStore.User().User(securityContext.UserID)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
userTeamIDs := make([]portainer.TeamID, 0)
|
|
for _, membership := range securityContext.UserMemberships {
|
|
userTeamIDs = append(userTeamIDs, membership.TeamID)
|
|
}
|
|
|
|
if resourceControl != nil && authorization.UserCanAccessResource(securityContext.UserID, userTeamIDs, resourceControl) {
|
|
return true, nil
|
|
}
|
|
|
|
return handler.userIsAdminOrEndpointAdmin(user, endpointID)
|
|
}
|
|
|
|
func (handler *Handler) userIsAdmin(userID portainer.UserID) (bool, error) {
|
|
user, err := handler.DataStore.User().User(userID)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
isAdmin := user.Role == portainer.AdministratorRole
|
|
|
|
return isAdmin, nil
|
|
}
|
|
|
|
func (handler *Handler) userIsAdminOrEndpointAdmin(user *portainer.User, endpointID portainer.EndpointID) (bool, error) {
|
|
isAdmin := user.Role == portainer.AdministratorRole
|
|
|
|
return isAdmin, nil
|
|
}
|
|
|
|
func (handler *Handler) userCanCreateStack(securityContext *security.RestrictedRequestContext, endpointID portainer.EndpointID) (bool, error) {
|
|
user, err := handler.DataStore.User().User(securityContext.UserID)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
return handler.userIsAdminOrEndpointAdmin(user, endpointID)
|
|
}
|
|
|
|
func (handler *Handler) checkUniqueStackName(endpoint *portainer.Endpoint, name string, stackID portainer.StackID) (bool, error) {
|
|
stacks, err := handler.DataStore.Stack().Stacks()
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
for _, stack := range stacks {
|
|
if strings.EqualFold(stack.Name, name) && (stackID == 0 || stackID != stack.ID) && stack.EndpointID == endpoint.ID {
|
|
return false, nil
|
|
}
|
|
}
|
|
|
|
return true, nil
|
|
}
|
|
|
|
func (handler *Handler) checkUniqueStackNameInDocker(endpoint *portainer.Endpoint, name string, stackID portainer.StackID, swarmMode bool) (bool, error) {
|
|
isUniqueStackName, err := handler.checkUniqueStackName(endpoint, name, stackID)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
dockerClient, err := handler.DockerClientFactory.CreateClient(endpoint, "")
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
defer dockerClient.Close()
|
|
if swarmMode {
|
|
services, err := dockerClient.ServiceList(context.Background(), types.ServiceListOptions{})
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
for _, service := range services {
|
|
serviceNS, ok := service.Spec.Labels["com.docker.stack.namespace"]
|
|
if ok && serviceNS == name {
|
|
return false, nil
|
|
}
|
|
}
|
|
}
|
|
|
|
containers, err := dockerClient.ContainerList(context.Background(), types.ContainerListOptions{All: true})
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
for _, container := range containers {
|
|
containerNS, ok := container.Labels["com.docker.compose.project"]
|
|
|
|
if ok && containerNS == name {
|
|
return false, nil
|
|
}
|
|
}
|
|
|
|
return isUniqueStackName, nil
|
|
}
|
|
|
|
func (handler *Handler) checkUniqueWebhookID(webhookID string) (bool, error) {
|
|
_, err := handler.DataStore.Stack().StackByWebhookID(webhookID)
|
|
if err == bolterrors.ErrObjectNotFound {
|
|
return true, nil
|
|
}
|
|
return false, err
|
|
}
|
|
|
|
func (handler *Handler) clone(projectPath, repositoryURL, refName string, auth bool, username, password string) error {
|
|
if !auth {
|
|
username = ""
|
|
password = ""
|
|
}
|
|
|
|
err := handler.GitService.CloneRepository(projectPath, repositoryURL, refName, username, password)
|
|
if err != nil {
|
|
return fmt.Errorf("unable to clone git repository: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (handler *Handler) latestCommitID(repositoryURL, refName string, auth bool, username, password string) (string, error) {
|
|
if !auth {
|
|
username = ""
|
|
password = ""
|
|
}
|
|
|
|
return handler.GitService.LatestCommitID(repositoryURL, refName, username, password)
|
|
}
|