2018-06-11 13:13:19 +00:00
package stacks
import (
2018-09-10 10:01:38 +00:00
"errors"
2018-06-18 10:07:56 +00:00
"log"
2018-06-11 13:13:19 +00:00
"net/http"
2019-10-07 03:12:21 +00:00
"github.com/docker/cli/cli/compose/loader"
2019-11-12 23:41:42 +00:00
"github.com/docker/cli/cli/compose/types"
2018-09-10 10:01:38 +00:00
httperror "github.com/portainer/libhttp/error"
"github.com/portainer/libhttp/request"
2019-11-12 23:41:42 +00:00
"github.com/portainer/libhttp/response"
2020-07-26 21:31:14 +00:00
portainer "github.com/portainer/portainer/api"
2020-07-07 21:57:52 +00:00
bolterrors "github.com/portainer/portainer/api/bolt/errors"
httperrors "github.com/portainer/portainer/api/http/errors"
2019-11-12 23:41:42 +00:00
"github.com/portainer/portainer/api/http/security"
2020-06-16 07:58:16 +00:00
"github.com/portainer/portainer/api/internal/authorization"
2018-06-11 13:13:19 +00:00
)
func ( handler * Handler ) cleanUp ( stack * portainer . Stack , doCleanUp * bool ) error {
if ! * doCleanUp {
return nil
}
2018-06-18 10:07:56 +00:00
err := handler . FileService . RemoveDirectory ( stack . ProjectPath )
if err != nil {
log . Printf ( "http error: Unable to cleanup stack creation (err=%s)\n" , err )
}
2018-06-11 13:13:19 +00:00
return nil
}
// POST request on /api/stacks?type=<type>&method=<method>&endpointId=<endpointId>
func ( handler * Handler ) stackCreate ( w http . ResponseWriter , r * http . Request ) * httperror . HandlerError {
stackType , err := request . RetrieveNumericQueryParameter ( r , "type" , false )
if err != nil {
return & httperror . HandlerError { http . StatusBadRequest , "Invalid query parameter: type" , err }
}
method , err := request . RetrieveQueryParameter ( r , "method" , false )
if err != nil {
return & httperror . HandlerError { http . StatusBadRequest , "Invalid query parameter: method" , err }
}
endpointID , err := request . RetrieveNumericQueryParameter ( r , "endpointId" , false )
if err != nil {
return & httperror . HandlerError { http . StatusBadRequest , "Invalid query parameter: endpointId" , err }
}
2020-07-27 07:11:32 +00:00
settings , err := handler . DataStore . Settings ( ) . Settings ( )
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to retrieve settings from the database" , err }
}
if ! settings . AllowStackManagementForRegularUsers {
securityContext , err := security . RetrieveRestrictedRequestContext ( r )
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to retrieve user info from request context" , err }
}
canCreate , err := handler . userCanCreateStack ( securityContext , portainer . EndpointID ( endpointID ) )
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to verify user authorizations to validate stack creation" , err }
}
if ! canCreate {
errMsg := "Stack creation is disabled for non-admin users"
return & httperror . HandlerError { http . StatusForbidden , errMsg , errors . New ( errMsg ) }
}
}
2020-05-20 05:23:15 +00:00
endpoint , err := handler . DataStore . Endpoint ( ) . Endpoint ( portainer . EndpointID ( endpointID ) )
2020-07-07 21:57:52 +00:00
if err == bolterrors . ErrObjectNotFound {
2018-06-11 13:13:19 +00:00
return & httperror . HandlerError { http . StatusNotFound , "Unable to find an endpoint with the specified identifier inside the database" , err }
} else if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to find an endpoint with the specified identifier inside the database" , err }
}
2019-05-24 06:04:58 +00:00
err = handler . requestBouncer . AuthorizedEndpointOperation ( r , endpoint , true )
2018-06-11 13:13:19 +00:00
if err != nil {
2019-05-24 06:04:58 +00:00
return & httperror . HandlerError { http . StatusForbidden , "Permission denied to access endpoint" , err }
2018-06-11 13:13:19 +00:00
}
2019-11-12 23:41:42 +00:00
tokenData , err := security . RetrieveTokenData ( r )
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to retrieve user details from authentication token" , err }
}
2018-06-11 13:13:19 +00:00
switch portainer . StackType ( stackType ) {
case portainer . DockerSwarmStack :
2019-11-12 23:41:42 +00:00
return handler . createSwarmStack ( w , r , method , endpoint , tokenData . ID )
2018-06-11 13:13:19 +00:00
case portainer . DockerComposeStack :
2019-11-12 23:41:42 +00:00
return handler . createComposeStack ( w , r , method , endpoint , tokenData . ID )
2020-07-05 23:21:03 +00:00
case portainer . KubernetesStack :
if tokenData . Role != portainer . AdministratorRole {
2020-07-07 21:57:52 +00:00
return & httperror . HandlerError { http . StatusForbidden , "Access denied" , httperrors . ErrUnauthorized }
2020-07-05 23:21:03 +00:00
}
return handler . createKubernetesStack ( w , r , endpoint )
2018-06-11 13:13:19 +00:00
}
2018-09-10 10:01:38 +00:00
return & httperror . HandlerError { http . StatusBadRequest , "Invalid value for query parameter: type. Value must be one of: 1 (Swarm stack) or 2 (Compose stack)" , errors . New ( request . ErrInvalidQueryParameter ) }
2018-06-11 13:13:19 +00:00
}
2019-11-12 23:41:42 +00:00
func ( handler * Handler ) createComposeStack ( w http . ResponseWriter , r * http . Request , method string , endpoint * portainer . Endpoint , userID portainer . UserID ) * httperror . HandlerError {
2018-06-11 13:13:19 +00:00
switch method {
case "string" :
2019-11-12 23:41:42 +00:00
return handler . createComposeStackFromFileContent ( w , r , endpoint , userID )
2018-06-11 13:13:19 +00:00
case "repository" :
2019-11-12 23:41:42 +00:00
return handler . createComposeStackFromGitRepository ( w , r , endpoint , userID )
2018-06-11 13:13:19 +00:00
case "file" :
2019-11-12 23:41:42 +00:00
return handler . createComposeStackFromFileUpload ( w , r , endpoint , userID )
2018-06-11 13:13:19 +00:00
}
2018-09-10 10:01:38 +00:00
return & httperror . HandlerError { http . StatusBadRequest , "Invalid value for query parameter: method. Value must be one of: string, repository or file" , errors . New ( request . ErrInvalidQueryParameter ) }
2018-06-11 13:13:19 +00:00
}
2019-11-12 23:41:42 +00:00
func ( handler * Handler ) createSwarmStack ( w http . ResponseWriter , r * http . Request , method string , endpoint * portainer . Endpoint , userID portainer . UserID ) * httperror . HandlerError {
2018-06-11 13:13:19 +00:00
switch method {
case "string" :
2019-11-12 23:41:42 +00:00
return handler . createSwarmStackFromFileContent ( w , r , endpoint , userID )
2018-06-11 13:13:19 +00:00
case "repository" :
2019-11-12 23:41:42 +00:00
return handler . createSwarmStackFromGitRepository ( w , r , endpoint , userID )
2018-06-11 13:13:19 +00:00
case "file" :
2019-11-12 23:41:42 +00:00
return handler . createSwarmStackFromFileUpload ( w , r , endpoint , userID )
2018-06-11 13:13:19 +00:00
}
2018-09-10 10:01:38 +00:00
return & httperror . HandlerError { http . StatusBadRequest , "Invalid value for query parameter: method. Value must be one of: string, repository or file" , errors . New ( request . ErrInvalidQueryParameter ) }
2018-06-11 13:13:19 +00:00
}
2019-10-07 03:12:21 +00:00
2020-07-22 18:38:45 +00:00
func ( handler * Handler ) isValidStackFile ( stackFileContent [ ] byte , settings * portainer . Settings ) error {
2019-10-07 03:12:21 +00:00
composeConfigYAML , err := loader . ParseYAML ( stackFileContent )
if err != nil {
2020-07-22 18:38:45 +00:00
return err
2019-10-07 03:12:21 +00:00
}
composeConfigFile := types . ConfigFile {
Config : composeConfigYAML ,
}
composeConfigDetails := types . ConfigDetails {
ConfigFiles : [ ] types . ConfigFile { composeConfigFile } ,
Environment : map [ string ] string { } ,
}
composeConfig , err := loader . Load ( composeConfigDetails , func ( options * loader . Options ) {
options . SkipValidation = true
options . SkipInterpolation = true
} )
if err != nil {
2020-07-22 18:38:45 +00:00
return err
2019-10-07 03:12:21 +00:00
}
for key := range composeConfig . Services {
service := composeConfig . Services [ key ]
2020-07-22 18:38:45 +00:00
if ! settings . AllowBindMountsForRegularUsers {
for _ , volume := range service . Volumes {
if volume . Type == "bind" {
return errors . New ( "bind-mount disabled for non administrator users" )
}
2019-10-07 03:12:21 +00:00
}
}
2020-07-22 18:38:45 +00:00
if ! settings . AllowPrivilegedModeForRegularUsers && service . Privileged == true {
return errors . New ( "privileged mode disabled for non administrator users" )
}
2020-07-24 23:14:46 +00:00
if ! settings . AllowHostNamespaceForRegularUsers && service . Pid == "host" {
return errors . New ( "pid host disabled for non administrator users" )
}
2020-07-26 21:31:14 +00:00
if ! settings . AllowDeviceMappingForRegularUsers && service . Devices != nil && len ( service . Devices ) > 0 {
return errors . New ( "device mapping disabled for non administrator users" )
}
2020-07-28 07:08:15 +00:00
if ! settings . AllowContainerCapabilitiesForRegularUsers && ( len ( service . CapAdd ) > 0 || len ( service . CapDrop ) > 0 ) {
return errors . New ( "container capabilities disabled for non administrator users" )
}
2019-10-07 03:12:21 +00:00
}
2020-07-22 18:38:45 +00:00
return nil
2019-10-07 03:12:21 +00:00
}
2019-11-12 23:41:42 +00:00
func ( handler * Handler ) decorateStackResponse ( w http . ResponseWriter , stack * portainer . Stack , userID portainer . UserID ) * httperror . HandlerError {
2020-06-16 07:58:16 +00:00
resourceControl := authorization . NewPrivateResourceControl ( stack . Name , portainer . StackResourceControl , userID )
2019-11-12 23:41:42 +00:00
2020-05-20 05:23:15 +00:00
err := handler . DataStore . ResourceControl ( ) . CreateResourceControl ( resourceControl )
2019-11-12 23:41:42 +00:00
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to persist resource control inside the database" , err }
}
stack . ResourceControl = resourceControl
return response . JSON ( w , stack )
}