2018-06-11 13:13:19 +00:00
package stacks
import (
2018-06-18 10:07:56 +00:00
"log"
2018-06-11 13:13:19 +00:00
"net/http"
2019-10-07 03:12:21 +00:00
"github.com/docker/cli/cli/compose/loader"
2019-11-12 23:41:42 +00:00
"github.com/docker/cli/cli/compose/types"
2021-08-17 01:12:07 +00:00
"github.com/pkg/errors"
2018-09-10 10:01:38 +00:00
httperror "github.com/portainer/libhttp/error"
"github.com/portainer/libhttp/request"
2019-11-12 23:41:42 +00:00
"github.com/portainer/libhttp/response"
2020-07-26 21:31:14 +00:00
portainer "github.com/portainer/portainer/api"
2020-07-07 21:57:52 +00:00
bolterrors "github.com/portainer/portainer/api/bolt/errors"
2019-11-12 23:41:42 +00:00
"github.com/portainer/portainer/api/http/security"
2020-06-16 07:58:16 +00:00
"github.com/portainer/portainer/api/internal/authorization"
2021-06-16 05:28:44 +00:00
"github.com/portainer/portainer/api/internal/endpointutils"
2021-02-23 20:18:05 +00:00
"github.com/portainer/portainer/api/internal/stackutils"
2018-06-11 13:13:19 +00:00
)
func ( handler * Handler ) cleanUp ( stack * portainer . Stack , doCleanUp * bool ) error {
if ! * doCleanUp {
return nil
}
2018-06-18 10:07:56 +00:00
err := handler . FileService . RemoveDirectory ( stack . ProjectPath )
if err != nil {
log . Printf ( "http error: Unable to cleanup stack creation (err=%s)\n" , err )
}
2018-06-11 13:13:19 +00:00
return nil
}
2021-02-23 03:21:39 +00:00
// @id StackCreate
// @summary Deploy a new stack
// @description Deploy a new stack into a Docker environment specified via the endpoint identifier.
// @description **Access policy**: restricted
// @tags stacks
// @security jwt
// @accept json, multipart/form-data
// @produce json
// @param type query int true "Stack deployment type. Possible values: 1 (Swarm stack) or 2 (Compose stack)." Enums(1,2)
// @param method query string true "Stack deployment method. Possible values: file, string or repository." Enums(string, file, repository)
// @param endpointId query int true "Identifier of the endpoint that will be used to deploy the stack"
// @param body_swarm_string body swarmStackFromFileContentPayload false "Required when using method=string and type=1"
// @param body_swarm_repository body swarmStackFromGitRepositoryPayload false "Required when using method=repository and type=1"
// @param body_compose_string body composeStackFromFileContentPayload false "Required when using method=string and type=2"
// @param body_compose_repository body composeStackFromGitRepositoryPayload false "Required when using method=repository and type=2"
// @param Name formData string false "Name of the stack. required when method is file"
// @param SwarmID formData string false "Swarm cluster identifier. Required when method equals file and type equals 1. required when method is file"
// @param Env formData string false "Environment variables passed during deployment, represented as a JSON array [{'name': 'name', 'value': 'value'}]. Optional, used when method equals file and type equals 1."
// @param file formData file false "Stack file. required when method is file"
// @success 200 {object} portainer.CustomTemplate
// @failure 400 "Invalid request"
// @failure 500 "Server error"
// @router /stacks [post]
2018-06-11 13:13:19 +00:00
func ( handler * Handler ) stackCreate ( w http . ResponseWriter , r * http . Request ) * httperror . HandlerError {
stackType , err := request . RetrieveNumericQueryParameter ( r , "type" , false )
if err != nil {
return & httperror . HandlerError { http . StatusBadRequest , "Invalid query parameter: type" , err }
}
method , err := request . RetrieveQueryParameter ( r , "method" , false )
if err != nil {
return & httperror . HandlerError { http . StatusBadRequest , "Invalid query parameter: method" , err }
}
endpointID , err := request . RetrieveNumericQueryParameter ( r , "endpointId" , false )
if err != nil {
return & httperror . HandlerError { http . StatusBadRequest , "Invalid query parameter: endpointId" , err }
}
2021-02-09 08:09:06 +00:00
endpoint , err := handler . DataStore . Endpoint ( ) . Endpoint ( portainer . EndpointID ( endpointID ) )
if err == bolterrors . ErrObjectNotFound {
return & httperror . HandlerError { http . StatusNotFound , "Unable to find an endpoint with the specified identifier inside the database" , err }
} else if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to find an endpoint with the specified identifier inside the database" , err }
2020-07-27 07:11:32 +00:00
}
2021-06-16 05:28:44 +00:00
if endpointutils . IsDockerEndpoint ( endpoint ) && ! endpoint . SecuritySettings . AllowStackManagementForRegularUsers {
2020-07-27 07:11:32 +00:00
securityContext , err := security . RetrieveRestrictedRequestContext ( r )
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to retrieve user info from request context" , err }
}
canCreate , err := handler . userCanCreateStack ( securityContext , portainer . EndpointID ( endpointID ) )
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to verify user authorizations to validate stack creation" , err }
}
if ! canCreate {
errMsg := "Stack creation is disabled for non-admin users"
return & httperror . HandlerError { http . StatusForbidden , errMsg , errors . New ( errMsg ) }
}
}
2020-08-11 05:41:37 +00:00
err = handler . requestBouncer . AuthorizedEndpointOperation ( r , endpoint )
2018-06-11 13:13:19 +00:00
if err != nil {
2019-05-24 06:04:58 +00:00
return & httperror . HandlerError { http . StatusForbidden , "Permission denied to access endpoint" , err }
2018-06-11 13:13:19 +00:00
}
2019-11-12 23:41:42 +00:00
tokenData , err := security . RetrieveTokenData ( r )
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to retrieve user details from authentication token" , err }
}
2018-06-11 13:13:19 +00:00
switch portainer . StackType ( stackType ) {
case portainer . DockerSwarmStack :
2019-11-12 23:41:42 +00:00
return handler . createSwarmStack ( w , r , method , endpoint , tokenData . ID )
2018-06-11 13:13:19 +00:00
case portainer . DockerComposeStack :
2019-11-12 23:41:42 +00:00
return handler . createComposeStack ( w , r , method , endpoint , tokenData . ID )
2020-07-05 23:21:03 +00:00
case portainer . KubernetesStack :
2021-06-16 21:47:32 +00:00
return handler . createKubernetesStack ( w , r , method , endpoint )
2018-06-11 13:13:19 +00:00
}
2018-09-10 10:01:38 +00:00
return & httperror . HandlerError { http . StatusBadRequest , "Invalid value for query parameter: type. Value must be one of: 1 (Swarm stack) or 2 (Compose stack)" , errors . New ( request . ErrInvalidQueryParameter ) }
2018-06-11 13:13:19 +00:00
}
2019-11-12 23:41:42 +00:00
func ( handler * Handler ) createComposeStack ( w http . ResponseWriter , r * http . Request , method string , endpoint * portainer . Endpoint , userID portainer . UserID ) * httperror . HandlerError {
2018-06-11 13:13:19 +00:00
switch method {
case "string" :
2019-11-12 23:41:42 +00:00
return handler . createComposeStackFromFileContent ( w , r , endpoint , userID )
2018-06-11 13:13:19 +00:00
case "repository" :
2019-11-12 23:41:42 +00:00
return handler . createComposeStackFromGitRepository ( w , r , endpoint , userID )
2018-06-11 13:13:19 +00:00
case "file" :
2019-11-12 23:41:42 +00:00
return handler . createComposeStackFromFileUpload ( w , r , endpoint , userID )
2018-06-11 13:13:19 +00:00
}
2021-08-17 01:12:07 +00:00
return & httperror . HandlerError { StatusCode : http . StatusBadRequest , Message : "Invalid value for query parameter: method. Value must be one of: string, repository or file" , Err : errors . New ( request . ErrInvalidQueryParameter ) }
2018-06-11 13:13:19 +00:00
}
2019-11-12 23:41:42 +00:00
func ( handler * Handler ) createSwarmStack ( w http . ResponseWriter , r * http . Request , method string , endpoint * portainer . Endpoint , userID portainer . UserID ) * httperror . HandlerError {
2018-06-11 13:13:19 +00:00
switch method {
case "string" :
2019-11-12 23:41:42 +00:00
return handler . createSwarmStackFromFileContent ( w , r , endpoint , userID )
2018-06-11 13:13:19 +00:00
case "repository" :
2019-11-12 23:41:42 +00:00
return handler . createSwarmStackFromGitRepository ( w , r , endpoint , userID )
2018-06-11 13:13:19 +00:00
case "file" :
2019-11-12 23:41:42 +00:00
return handler . createSwarmStackFromFileUpload ( w , r , endpoint , userID )
2018-06-11 13:13:19 +00:00
}
2021-08-17 01:12:07 +00:00
return & httperror . HandlerError { StatusCode : http . StatusBadRequest , Message : "Invalid value for query parameter: method. Value must be one of: string, repository or file" , Err : errors . New ( request . ErrInvalidQueryParameter ) }
2018-06-11 13:13:19 +00:00
}
2019-10-07 03:12:21 +00:00
2021-06-16 21:47:32 +00:00
func ( handler * Handler ) createKubernetesStack ( w http . ResponseWriter , r * http . Request , method string , endpoint * portainer . Endpoint ) * httperror . HandlerError {
switch method {
case "string" :
return handler . createKubernetesStackFromFileContent ( w , r , endpoint )
case "repository" :
return handler . createKubernetesStackFromGitRepository ( w , r , endpoint )
}
return & httperror . HandlerError { StatusCode : http . StatusBadRequest , Message : "Invalid value for query parameter: method. Value must be one of: string or repository" , Err : errors . New ( request . ErrInvalidQueryParameter ) }
}
2021-02-09 08:09:06 +00:00
func ( handler * Handler ) isValidStackFile ( stackFileContent [ ] byte , securitySettings * portainer . EndpointSecuritySettings ) error {
2019-10-07 03:12:21 +00:00
composeConfigYAML , err := loader . ParseYAML ( stackFileContent )
if err != nil {
2020-07-22 18:38:45 +00:00
return err
2019-10-07 03:12:21 +00:00
}
composeConfigFile := types . ConfigFile {
Config : composeConfigYAML ,
}
composeConfigDetails := types . ConfigDetails {
ConfigFiles : [ ] types . ConfigFile { composeConfigFile } ,
Environment : map [ string ] string { } ,
}
composeConfig , err := loader . Load ( composeConfigDetails , func ( options * loader . Options ) {
options . SkipValidation = true
options . SkipInterpolation = true
} )
if err != nil {
2020-07-22 18:38:45 +00:00
return err
2019-10-07 03:12:21 +00:00
}
for key := range composeConfig . Services {
service := composeConfig . Services [ key ]
2021-02-09 08:09:06 +00:00
if ! securitySettings . AllowBindMountsForRegularUsers {
2020-07-22 18:38:45 +00:00
for _ , volume := range service . Volumes {
if volume . Type == "bind" {
return errors . New ( "bind-mount disabled for non administrator users" )
}
2019-10-07 03:12:21 +00:00
}
}
2020-07-22 18:38:45 +00:00
2021-02-09 08:09:06 +00:00
if ! securitySettings . AllowPrivilegedModeForRegularUsers && service . Privileged == true {
2020-07-22 18:38:45 +00:00
return errors . New ( "privileged mode disabled for non administrator users" )
}
2020-07-24 23:14:46 +00:00
2021-02-09 08:09:06 +00:00
if ! securitySettings . AllowHostNamespaceForRegularUsers && service . Pid == "host" {
2020-07-24 23:14:46 +00:00
return errors . New ( "pid host disabled for non administrator users" )
}
2020-07-26 21:31:14 +00:00
2021-02-09 08:09:06 +00:00
if ! securitySettings . AllowDeviceMappingForRegularUsers && service . Devices != nil && len ( service . Devices ) > 0 {
2020-07-26 21:31:14 +00:00
return errors . New ( "device mapping disabled for non administrator users" )
}
2020-07-28 07:08:15 +00:00
2021-04-12 07:40:45 +00:00
if ! securitySettings . AllowSysctlSettingForRegularUsers && service . Sysctls != nil && len ( service . Sysctls ) > 0 {
return errors . New ( "sysctl setting disabled for non administrator users" )
}
2021-02-09 08:09:06 +00:00
if ! securitySettings . AllowContainerCapabilitiesForRegularUsers && ( len ( service . CapAdd ) > 0 || len ( service . CapDrop ) > 0 ) {
2020-07-28 07:08:15 +00:00
return errors . New ( "container capabilities disabled for non administrator users" )
}
2019-10-07 03:12:21 +00:00
}
2020-07-22 18:38:45 +00:00
return nil
2019-10-07 03:12:21 +00:00
}
2019-11-12 23:41:42 +00:00
func ( handler * Handler ) decorateStackResponse ( w http . ResponseWriter , stack * portainer . Stack , userID portainer . UserID ) * httperror . HandlerError {
2021-01-20 02:19:35 +00:00
var resourceControl * portainer . ResourceControl
2019-11-12 23:41:42 +00:00
2021-01-20 02:19:35 +00:00
isAdmin , err := handler . userIsAdmin ( userID )
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to load user information from the database" , err }
}
if isAdmin {
2021-02-23 20:18:05 +00:00
resourceControl = authorization . NewAdministratorsOnlyResourceControl ( stackutils . ResourceControlID ( stack . EndpointID , stack . Name ) , portainer . StackResourceControl )
2021-01-20 02:19:35 +00:00
} else {
2021-02-23 20:18:05 +00:00
resourceControl = authorization . NewPrivateResourceControl ( stackutils . ResourceControlID ( stack . EndpointID , stack . Name ) , portainer . StackResourceControl , userID )
2021-01-20 02:19:35 +00:00
}
err = handler . DataStore . ResourceControl ( ) . CreateResourceControl ( resourceControl )
2019-11-12 23:41:42 +00:00
if err != nil {
return & httperror . HandlerError { http . StatusInternalServerError , "Unable to persist resource control inside the database" , err }
}
stack . ResourceControl = resourceControl
2021-06-15 21:11:35 +00:00
2021-08-17 01:12:07 +00:00
if stack . GitConfig != nil && stack . GitConfig . Authentication != nil && stack . GitConfig . Authentication . Password != "" {
// sanitize password in the http response to minimise possible security leaks
stack . GitConfig . Authentication . Password = ""
2021-06-15 21:11:35 +00:00
}
2021-08-17 01:12:07 +00:00
return response . JSON ( w , stack )
2021-06-15 21:11:35 +00:00
}