2021-09-07 00:37:26 +00:00
|
|
|
package stacks
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2021-09-29 23:58:10 +00:00
|
|
|
"io/ioutil"
|
2021-09-07 00:37:26 +00:00
|
|
|
"net/http"
|
2021-09-29 23:58:10 +00:00
|
|
|
"os"
|
|
|
|
"path"
|
2021-09-07 00:37:26 +00:00
|
|
|
"strconv"
|
|
|
|
|
|
|
|
"github.com/asaskevich/govalidator"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
httperror "github.com/portainer/libhttp/error"
|
|
|
|
"github.com/portainer/libhttp/request"
|
|
|
|
portainer "github.com/portainer/portainer/api"
|
2021-09-29 23:58:10 +00:00
|
|
|
"github.com/portainer/portainer/api/filesystem"
|
2021-09-07 00:37:26 +00:00
|
|
|
gittypes "github.com/portainer/portainer/api/git/types"
|
2021-09-29 23:58:10 +00:00
|
|
|
"github.com/portainer/portainer/api/http/security"
|
2021-09-07 00:37:26 +00:00
|
|
|
k "github.com/portainer/portainer/api/kubernetes"
|
|
|
|
)
|
|
|
|
|
|
|
|
type kubernetesFileStackUpdatePayload struct {
|
|
|
|
StackFileContent string
|
|
|
|
}
|
|
|
|
|
|
|
|
type kubernetesGitStackUpdatePayload struct {
|
|
|
|
RepositoryReferenceName string
|
|
|
|
RepositoryAuthentication bool
|
|
|
|
RepositoryUsername string
|
|
|
|
RepositoryPassword string
|
2021-09-29 23:58:10 +00:00
|
|
|
AutoUpdate *portainer.StackAutoUpdate
|
2021-09-07 00:37:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (payload *kubernetesFileStackUpdatePayload) Validate(r *http.Request) error {
|
|
|
|
if govalidator.IsNull(payload.StackFileContent) {
|
|
|
|
return errors.New("Invalid stack file content")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (payload *kubernetesGitStackUpdatePayload) Validate(r *http.Request) error {
|
|
|
|
if govalidator.IsNull(payload.RepositoryReferenceName) {
|
|
|
|
payload.RepositoryReferenceName = defaultGitReferenceName
|
|
|
|
}
|
2021-09-29 23:58:10 +00:00
|
|
|
if err := validateStackAutoUpdate(payload.AutoUpdate); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-09-07 00:37:26 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (handler *Handler) updateKubernetesStack(r *http.Request, stack *portainer.Stack, endpoint *portainer.Endpoint) *httperror.HandlerError {
|
|
|
|
|
|
|
|
if stack.GitConfig != nil {
|
2021-09-29 23:58:10 +00:00
|
|
|
//stop the autoupdate job if there is any
|
|
|
|
if stack.AutoUpdate != nil {
|
|
|
|
stopAutoupdate(stack.ID, stack.AutoUpdate.JobID, *handler.Scheduler)
|
|
|
|
}
|
|
|
|
|
2021-09-07 00:37:26 +00:00
|
|
|
var payload kubernetesGitStackUpdatePayload
|
|
|
|
|
|
|
|
if err := request.DecodeAndValidateJSONPayload(r, &payload); err != nil {
|
|
|
|
return &httperror.HandlerError{StatusCode: http.StatusBadRequest, Message: "Invalid request payload", Err: err}
|
|
|
|
}
|
|
|
|
|
|
|
|
stack.GitConfig.ReferenceName = payload.RepositoryReferenceName
|
2021-09-29 23:58:10 +00:00
|
|
|
stack.AutoUpdate = payload.AutoUpdate
|
|
|
|
|
2021-09-07 00:37:26 +00:00
|
|
|
if payload.RepositoryAuthentication {
|
|
|
|
password := payload.RepositoryPassword
|
|
|
|
if password == "" && stack.GitConfig != nil && stack.GitConfig.Authentication != nil {
|
|
|
|
password = stack.GitConfig.Authentication.Password
|
|
|
|
}
|
|
|
|
stack.GitConfig.Authentication = &gittypes.GitAuthentication{
|
|
|
|
Username: payload.RepositoryUsername,
|
|
|
|
Password: password,
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
stack.GitConfig.Authentication = nil
|
|
|
|
}
|
2021-09-29 23:58:10 +00:00
|
|
|
|
|
|
|
if payload.AutoUpdate != nil && payload.AutoUpdate.Interval != "" {
|
|
|
|
jobID, e := startAutoupdate(stack.ID, stack.AutoUpdate.Interval, handler.Scheduler, handler.StackDeployer, handler.DataStore, handler.GitService)
|
|
|
|
if e != nil {
|
|
|
|
return e
|
|
|
|
}
|
|
|
|
stack.AutoUpdate.JobID = jobID
|
|
|
|
}
|
|
|
|
|
2021-09-07 00:37:26 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var payload kubernetesFileStackUpdatePayload
|
|
|
|
|
|
|
|
err := request.DecodeAndValidateJSONPayload(r, &payload)
|
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{StatusCode: http.StatusBadRequest, Message: "Invalid request payload", Err: err}
|
|
|
|
}
|
|
|
|
|
2021-09-29 23:58:10 +00:00
|
|
|
tokenData, err := security.RetrieveTokenData(r)
|
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{StatusCode: http.StatusBadRequest, Message: "Failed to retrieve user token data", Err: err}
|
|
|
|
}
|
|
|
|
|
|
|
|
tempFileDir, _ := ioutil.TempDir("", "kub_file_content")
|
|
|
|
defer os.RemoveAll(tempFileDir)
|
|
|
|
|
|
|
|
if err := filesystem.WriteToFile(path.Join(tempFileDir, stack.EntryPoint), []byte(payload.StackFileContent)); err != nil {
|
|
|
|
return &httperror.HandlerError{StatusCode: http.StatusInternalServerError, Message: "Failed to persist deployment file in a temp directory", Err: err}
|
|
|
|
}
|
|
|
|
|
|
|
|
//use temp dir as the stack project path for deployment
|
|
|
|
//so if the deployment failed, the original file won't be over-written
|
|
|
|
stack.ProjectPath = tempFileDir
|
|
|
|
|
|
|
|
_, err = handler.deployKubernetesStack(tokenData.ID, endpoint, stack, k.KubeAppLabels{
|
|
|
|
StackID: int(stack.ID),
|
|
|
|
StackName: stack.Name,
|
|
|
|
Owner: stack.CreatedBy,
|
|
|
|
Kind: "content",
|
2021-09-07 00:37:26 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{StatusCode: http.StatusInternalServerError, Message: "Unable to deploy Kubernetes stack via file content", Err: err}
|
|
|
|
}
|
|
|
|
|
|
|
|
stackFolder := strconv.Itoa(int(stack.ID))
|
2021-09-29 23:58:10 +00:00
|
|
|
projectPath, err := handler.FileService.StoreStackFileFromBytes(stackFolder, stack.EntryPoint, []byte(payload.StackFileContent))
|
2021-09-07 00:37:26 +00:00
|
|
|
if err != nil {
|
|
|
|
fileType := "Manifest"
|
|
|
|
if stack.IsComposeFormat {
|
|
|
|
fileType = "Compose"
|
|
|
|
}
|
|
|
|
errMsg := fmt.Sprintf("Unable to persist Kubernetes %s file on disk", fileType)
|
|
|
|
return &httperror.HandlerError{StatusCode: http.StatusInternalServerError, Message: errMsg, Err: err}
|
|
|
|
}
|
2021-09-29 23:58:10 +00:00
|
|
|
stack.ProjectPath = projectPath
|
2021-09-07 00:37:26 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|