mirror of https://github.com/portainer/portainer
138 lines
4.7 KiB
Go
138 lines
4.7 KiB
Go
|
package registries
|
||
|
|
||
|
import (
|
||
|
"net/http"
|
||
|
"strconv"
|
||
|
|
||
|
httperror "github.com/portainer/libhttp/error"
|
||
|
"github.com/portainer/libhttp/request"
|
||
|
"github.com/portainer/libhttp/response"
|
||
|
"github.com/portainer/portainer"
|
||
|
)
|
||
|
|
||
|
type registryConfigurePayload struct {
|
||
|
Authentication bool
|
||
|
Username string
|
||
|
Password string
|
||
|
TLS bool
|
||
|
TLSSkipVerify bool
|
||
|
TLSCertFile []byte
|
||
|
TLSKeyFile []byte
|
||
|
TLSCACertFile []byte
|
||
|
}
|
||
|
|
||
|
func (payload *registryConfigurePayload) Validate(r *http.Request) error {
|
||
|
useAuthentication, _ := request.RetrieveBooleanMultiPartFormValue(r, "Authentication", true)
|
||
|
payload.Authentication = useAuthentication
|
||
|
|
||
|
if useAuthentication {
|
||
|
username, err := request.RetrieveMultiPartFormValue(r, "Username", false)
|
||
|
if err != nil {
|
||
|
return portainer.Error("Invalid username")
|
||
|
}
|
||
|
payload.Username = username
|
||
|
|
||
|
password, _ := request.RetrieveMultiPartFormValue(r, "Password", true)
|
||
|
payload.Password = password
|
||
|
}
|
||
|
|
||
|
useTLS, _ := request.RetrieveBooleanMultiPartFormValue(r, "TLS", true)
|
||
|
payload.TLS = useTLS
|
||
|
|
||
|
skipTLSVerify, _ := request.RetrieveBooleanMultiPartFormValue(r, "TLSSkipVerify", true)
|
||
|
payload.TLSSkipVerify = skipTLSVerify
|
||
|
|
||
|
if useTLS && !skipTLSVerify {
|
||
|
cert, _, err := request.RetrieveMultiPartFormFile(r, "TLSCertFile")
|
||
|
if err != nil {
|
||
|
return portainer.Error("Invalid certificate file. Ensure that the file is uploaded correctly")
|
||
|
}
|
||
|
payload.TLSCertFile = cert
|
||
|
|
||
|
key, _, err := request.RetrieveMultiPartFormFile(r, "TLSKeyFile")
|
||
|
if err != nil {
|
||
|
return portainer.Error("Invalid key file. Ensure that the file is uploaded correctly")
|
||
|
}
|
||
|
payload.TLSKeyFile = key
|
||
|
|
||
|
ca, _, err := request.RetrieveMultiPartFormFile(r, "TLSCACertFile")
|
||
|
if err != nil {
|
||
|
return portainer.Error("Invalid CA certificate file. Ensure that the file is uploaded correctly")
|
||
|
}
|
||
|
payload.TLSCACertFile = ca
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
// POST request on /api/registries/:id/configure
|
||
|
func (handler *Handler) registryConfigure(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||
|
registryID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
||
|
if err != nil {
|
||
|
return &httperror.HandlerError{http.StatusBadRequest, "Invalid registry identifier route variable", err}
|
||
|
}
|
||
|
|
||
|
payload := ®istryConfigurePayload{}
|
||
|
err = payload.Validate(r)
|
||
|
if err != nil {
|
||
|
return &httperror.HandlerError{http.StatusBadRequest, "Invalid request payload", err}
|
||
|
}
|
||
|
|
||
|
registry, err := handler.RegistryService.Registry(portainer.RegistryID(registryID))
|
||
|
if err == portainer.ErrObjectNotFound {
|
||
|
return &httperror.HandlerError{http.StatusNotFound, "Unable to find a registry with the specified identifier inside the database", err}
|
||
|
} else if err != nil {
|
||
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to find a registry with the specified identifier inside the database", err}
|
||
|
}
|
||
|
|
||
|
registry.ManagementConfiguration = &portainer.RegistryManagementConfiguration{
|
||
|
Type: registry.Type,
|
||
|
}
|
||
|
|
||
|
if payload.Authentication {
|
||
|
registry.ManagementConfiguration.Authentication = true
|
||
|
registry.ManagementConfiguration.Username = payload.Username
|
||
|
if payload.Username == registry.Username && payload.Password == "" {
|
||
|
registry.ManagementConfiguration.Password = registry.Password
|
||
|
} else {
|
||
|
registry.ManagementConfiguration.Password = payload.Password
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if payload.TLS {
|
||
|
registry.ManagementConfiguration.TLSConfig = portainer.TLSConfiguration{
|
||
|
TLS: true,
|
||
|
TLSSkipVerify: payload.TLSSkipVerify,
|
||
|
}
|
||
|
|
||
|
if !payload.TLSSkipVerify {
|
||
|
folder := strconv.Itoa(int(registry.ID))
|
||
|
|
||
|
certPath, err := handler.FileService.StoreRegistryManagementFileFromBytes(folder, "cert.pem", payload.TLSCertFile)
|
||
|
if err != nil {
|
||
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to persist TLS certificate file on disk", err}
|
||
|
}
|
||
|
registry.ManagementConfiguration.TLSConfig.TLSCertPath = certPath
|
||
|
|
||
|
keyPath, err := handler.FileService.StoreRegistryManagementFileFromBytes(folder, "key.pem", payload.TLSKeyFile)
|
||
|
if err != nil {
|
||
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to persist TLS key file on disk", err}
|
||
|
}
|
||
|
registry.ManagementConfiguration.TLSConfig.TLSKeyPath = keyPath
|
||
|
|
||
|
cacertPath, err := handler.FileService.StoreRegistryManagementFileFromBytes(folder, "ca.pem", payload.TLSCACertFile)
|
||
|
if err != nil {
|
||
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to persist TLS CA certificate file on disk", err}
|
||
|
}
|
||
|
registry.ManagementConfiguration.TLSConfig.TLSCACertPath = cacertPath
|
||
|
}
|
||
|
}
|
||
|
|
||
|
err = handler.RegistryService.UpdateRegistry(registry.ID, registry)
|
||
|
if err != nil {
|
||
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to persist registry changes inside the database", err}
|
||
|
}
|
||
|
|
||
|
return response.Empty(w)
|
||
|
}
|