2018-06-11 13:13:19 +00:00
package registries
import (
2020-07-07 21:57:52 +00:00
"errors"
2018-06-11 13:13:19 +00:00
"net/http"
2018-09-10 10:01:38 +00:00
httperror "github.com/portainer/libhttp/error"
"github.com/portainer/libhttp/request"
"github.com/portainer/libhttp/response"
2021-01-18 00:59:57 +00:00
portainer "github.com/portainer/portainer/api"
2020-07-07 21:57:52 +00:00
bolterrors "github.com/portainer/portainer/api/bolt/errors"
2018-06-11 13:13:19 +00:00
)
type registryUpdatePayload struct {
2021-02-23 03:21:39 +00:00
// Name that will be used to identify this registry
Name * string ` validate:"required" example:"my-registry" `
// URL or IP address of the Docker registry
URL * string ` validate:"required" example:"registry.mydomain.tld:2375" `
// Is authentication against this registry enabled
Authentication * bool ` example:"false" validate:"required" `
// Username used to authenticate against this registry. Required when Authentication is true
Username * string ` example:"registry_user" `
// Password used to authenticate against this registry. required when Authentication is true
Password * string ` example:"registry_password" `
2019-05-24 06:04:58 +00:00
UserAccessPolicies portainer . UserAccessPolicies
TeamAccessPolicies portainer . TeamAccessPolicies
2021-03-12 23:47:35 +00:00
Quay * portainer . QuayRegistryData
2018-06-11 13:13:19 +00:00
}
func ( payload * registryUpdatePayload ) Validate ( r * http . Request ) error {
return nil
}
2021-02-23 03:21:39 +00:00
// @id RegistryUpdate
// @summary Update a registry
// @description Update a registry
// @description **Access policy**: administrator
// @tags registries
// @security jwt
// @accept json
// @produce json
// @param id path int true "Registry identifier"
// @param body body registryUpdatePayload true "Registry details"
// @success 200 {object} portainer.Registry "Success"
// @failure 400 "Invalid request"
// @failure 404 "Registry not found"
// @failure 409 "Another registry with the same URL already exists"
// @failure 500 "Server error"
// @router /registries/{id} [put]
2018-06-11 13:13:19 +00:00
func ( handler * Handler ) registryUpdate ( w http . ResponseWriter , r * http . Request ) * httperror . HandlerError {
registryID , err := request . RetrieveNumericRouteVariableValue ( r , "id" )
if err != nil {
return & httperror . HandlerError { http . StatusBadRequest , "Invalid registry identifier route variable" , err }
}
var payload registryUpdatePayload
err = request . DecodeAndValidateJSONPayload ( r , & payload )
if err != nil {
return & httperror . HandlerError { http . StatusBadRequest , "Invalid request payload" , err }
}
2020-05-20 05:23:15 +00:00
registry , err := handler . DataStore . Registry ( ) . Registry ( portainer . RegistryID ( registryID ) )
2020-07-07 21:57:52 +00:00
if err == bolterrors . ErrObjectNotFound {
2018-06-11 13:13:19 +00:00
return & httperror . HandlerError { http . StatusNotFound , "Unable to find a registry with the specified identifier inside the database" , err }
} else if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to find a registry with the specified identifier inside the database" , err }
}
2019-09-09 22:55:27 +00:00
if payload . Name != nil {
registry . Name = * payload . Name
2018-06-11 13:13:19 +00:00
}
2019-09-09 22:55:27 +00:00
if payload . URL != nil {
2020-05-20 05:23:15 +00:00
registries , err := handler . DataStore . Registry ( ) . Registries ( )
2019-09-09 22:55:27 +00:00
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to retrieve registries from the database" , err }
}
for _ , r := range registries {
2020-06-04 06:50:02 +00:00
if r . ID != registry . ID && hasSameURL ( & r , registry ) {
2020-07-07 21:57:52 +00:00
return & httperror . HandlerError { http . StatusConflict , "Another registry with the same URL already exists" , errors . New ( "A registry is already defined for this URL" ) }
2019-09-09 22:55:27 +00:00
}
2018-06-11 13:13:19 +00:00
}
2019-09-09 22:55:27 +00:00
registry . URL = * payload . URL
2018-06-11 13:13:19 +00:00
}
2019-09-09 22:55:27 +00:00
if payload . Authentication != nil {
if * payload . Authentication {
registry . Authentication = true
if payload . Username != nil {
registry . Username = * payload . Username
}
2018-06-11 13:13:19 +00:00
2021-01-18 00:59:57 +00:00
if payload . Password != nil && * payload . Password != "" {
2019-09-09 22:55:27 +00:00
registry . Password = * payload . Password
}
} else {
registry . Authentication = false
registry . Username = ""
registry . Password = ""
}
2018-06-11 13:13:19 +00:00
}
2019-05-24 06:04:58 +00:00
if payload . UserAccessPolicies != nil {
registry . UserAccessPolicies = payload . UserAccessPolicies
}
if payload . TeamAccessPolicies != nil {
registry . TeamAccessPolicies = payload . TeamAccessPolicies
}
2021-03-12 23:47:35 +00:00
if payload . Quay != nil {
registry . Quay = * payload . Quay
}
2020-05-20 05:23:15 +00:00
err = handler . DataStore . Registry ( ) . UpdateRegistry ( registry . ID , registry )
2018-06-11 13:13:19 +00:00
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to persist registry changes inside the database" , err }
}
return response . JSON ( w , registry )
}
2020-06-04 06:50:02 +00:00
func hasSameURL ( r1 , r2 * portainer . Registry ) bool {
if r1 . Type != portainer . GitlabRegistry || r2 . Type != portainer . GitlabRegistry {
return r1 . URL == r2 . URL
}
return r1 . URL == r2 . URL && r1 . Gitlab . ProjectPath == r2 . Gitlab . ProjectPath
}