2018-06-11 13:13:19 +00:00
|
|
|
package endpoints
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net/http"
|
2019-10-07 02:42:01 +00:00
|
|
|
"reflect"
|
2018-06-11 13:13:19 +00:00
|
|
|
"strconv"
|
|
|
|
|
2018-09-10 10:01:38 +00:00
|
|
|
httperror "github.com/portainer/libhttp/error"
|
|
|
|
"github.com/portainer/libhttp/request"
|
|
|
|
"github.com/portainer/libhttp/response"
|
2019-03-21 01:20:14 +00:00
|
|
|
"github.com/portainer/portainer/api"
|
2020-07-07 21:57:52 +00:00
|
|
|
"github.com/portainer/portainer/api/bolt/errors"
|
2020-06-09 02:43:32 +00:00
|
|
|
"github.com/portainer/portainer/api/http/client"
|
2020-06-16 07:58:16 +00:00
|
|
|
"github.com/portainer/portainer/api/internal/edge"
|
|
|
|
"github.com/portainer/portainer/api/internal/tag"
|
2018-06-11 13:13:19 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type endpointUpdatePayload struct {
|
2020-06-09 02:43:32 +00:00
|
|
|
Name *string
|
|
|
|
URL *string
|
|
|
|
PublicURL *string
|
|
|
|
GroupID *int
|
|
|
|
TLS *bool
|
|
|
|
TLSSkipVerify *bool
|
|
|
|
TLSSkipClientVerify *bool
|
|
|
|
Status *int
|
|
|
|
AzureApplicationID *string
|
|
|
|
AzureTenantID *string
|
|
|
|
AzureAuthenticationKey *string
|
|
|
|
TagIDs []portainer.TagID
|
|
|
|
UserAccessPolicies portainer.UserAccessPolicies
|
|
|
|
TeamAccessPolicies portainer.TeamAccessPolicies
|
|
|
|
EdgeCheckinInterval *int
|
2020-07-05 23:21:03 +00:00
|
|
|
Kubernetes *portainer.KubernetesData
|
2018-06-11 13:13:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (payload *endpointUpdatePayload) Validate(r *http.Request) error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// PUT request on /api/endpoints/:id
|
|
|
|
func (handler *Handler) endpointUpdate(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
|
|
|
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusBadRequest, "Invalid endpoint identifier route variable", err}
|
|
|
|
}
|
|
|
|
|
|
|
|
var payload endpointUpdatePayload
|
|
|
|
err = request.DecodeAndValidateJSONPayload(r, &payload)
|
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusBadRequest, "Invalid request payload", err}
|
|
|
|
}
|
|
|
|
|
2020-05-20 05:23:15 +00:00
|
|
|
endpoint, err := handler.DataStore.Endpoint().Endpoint(portainer.EndpointID(endpointID))
|
2020-07-07 21:57:52 +00:00
|
|
|
if err == errors.ErrObjectNotFound {
|
2018-06-11 13:13:19 +00:00
|
|
|
return &httperror.HandlerError{http.StatusNotFound, "Unable to find an endpoint with the specified identifier inside the database", err}
|
|
|
|
} else if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to find an endpoint with the specified identifier inside the database", err}
|
|
|
|
}
|
|
|
|
|
2018-10-28 09:27:06 +00:00
|
|
|
if payload.Name != nil {
|
|
|
|
endpoint.Name = *payload.Name
|
2018-06-11 13:13:19 +00:00
|
|
|
}
|
|
|
|
|
2018-10-28 09:27:06 +00:00
|
|
|
if payload.URL != nil {
|
|
|
|
endpoint.URL = *payload.URL
|
2018-06-11 13:13:19 +00:00
|
|
|
}
|
|
|
|
|
2018-10-28 09:27:06 +00:00
|
|
|
if payload.PublicURL != nil {
|
|
|
|
endpoint.PublicURL = *payload.PublicURL
|
2018-06-11 13:13:19 +00:00
|
|
|
}
|
|
|
|
|
2020-06-04 05:35:09 +00:00
|
|
|
if payload.EdgeCheckinInterval != nil {
|
|
|
|
endpoint.EdgeCheckinInterval = *payload.EdgeCheckinInterval
|
|
|
|
}
|
|
|
|
|
2020-05-14 02:14:28 +00:00
|
|
|
groupIDChanged := false
|
2018-10-28 09:27:06 +00:00
|
|
|
if payload.GroupID != nil {
|
2020-05-14 02:14:28 +00:00
|
|
|
groupID := portainer.EndpointGroupID(*payload.GroupID)
|
|
|
|
groupIDChanged = groupID != endpoint.GroupID
|
|
|
|
endpoint.GroupID = groupID
|
2018-06-11 13:13:19 +00:00
|
|
|
}
|
|
|
|
|
2020-05-14 02:14:28 +00:00
|
|
|
tagsChanged := false
|
2020-03-29 09:54:14 +00:00
|
|
|
if payload.TagIDs != nil {
|
2020-06-16 07:58:16 +00:00
|
|
|
payloadTagSet := tag.Set(payload.TagIDs)
|
|
|
|
endpointTagSet := tag.Set((endpoint.TagIDs))
|
|
|
|
union := tag.Union(payloadTagSet, endpointTagSet)
|
|
|
|
intersection := tag.Intersection(payloadTagSet, endpointTagSet)
|
2020-05-14 02:14:28 +00:00
|
|
|
tagsChanged = len(union) > len(intersection)
|
|
|
|
|
|
|
|
if tagsChanged {
|
2020-06-16 07:58:16 +00:00
|
|
|
removeTags := tag.Difference(endpointTagSet, payloadTagSet)
|
2020-05-14 02:14:28 +00:00
|
|
|
|
|
|
|
for tagID := range removeTags {
|
2020-05-20 05:23:15 +00:00
|
|
|
tag, err := handler.DataStore.Tag().Tag(tagID)
|
2020-05-14 02:14:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to find a tag inside the database", err}
|
|
|
|
}
|
|
|
|
|
|
|
|
delete(tag.Endpoints, endpoint.ID)
|
2020-05-20 05:23:15 +00:00
|
|
|
err = handler.DataStore.Tag().UpdateTag(tag.ID, tag)
|
2020-05-14 02:14:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to persist tag changes inside the database", err}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
endpoint.TagIDs = payload.TagIDs
|
|
|
|
for _, tagID := range payload.TagIDs {
|
2020-05-20 05:23:15 +00:00
|
|
|
tag, err := handler.DataStore.Tag().Tag(tagID)
|
2020-05-14 02:14:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to find a tag inside the database", err}
|
|
|
|
}
|
|
|
|
|
|
|
|
tag.Endpoints[endpoint.ID] = true
|
|
|
|
|
2020-05-20 05:23:15 +00:00
|
|
|
err = handler.DataStore.Tag().UpdateTag(tag.ID, tag)
|
2020-05-14 02:14:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to persist tag changes inside the database", err}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-06-15 07:18:25 +00:00
|
|
|
}
|
|
|
|
|
2020-07-05 23:21:03 +00:00
|
|
|
if payload.Kubernetes != nil {
|
|
|
|
endpoint.Kubernetes = *payload.Kubernetes
|
|
|
|
}
|
|
|
|
|
2019-09-09 22:58:26 +00:00
|
|
|
updateAuthorizations := false
|
2019-10-07 02:42:01 +00:00
|
|
|
if payload.UserAccessPolicies != nil && !reflect.DeepEqual(payload.UserAccessPolicies, endpoint.UserAccessPolicies) {
|
2019-05-24 06:04:58 +00:00
|
|
|
endpoint.UserAccessPolicies = payload.UserAccessPolicies
|
2019-09-09 22:58:26 +00:00
|
|
|
updateAuthorizations = true
|
2019-05-24 06:04:58 +00:00
|
|
|
}
|
|
|
|
|
2019-10-07 02:42:01 +00:00
|
|
|
if payload.TeamAccessPolicies != nil && !reflect.DeepEqual(payload.TeamAccessPolicies, endpoint.TeamAccessPolicies) {
|
2019-05-24 06:04:58 +00:00
|
|
|
endpoint.TeamAccessPolicies = payload.TeamAccessPolicies
|
2019-09-09 22:58:26 +00:00
|
|
|
updateAuthorizations = true
|
2019-05-24 06:04:58 +00:00
|
|
|
}
|
|
|
|
|
2018-10-28 09:27:06 +00:00
|
|
|
if payload.Status != nil {
|
|
|
|
switch *payload.Status {
|
|
|
|
case 1:
|
|
|
|
endpoint.Status = portainer.EndpointStatusUp
|
|
|
|
break
|
|
|
|
case 2:
|
|
|
|
endpoint.Status = portainer.EndpointStatusDown
|
|
|
|
break
|
|
|
|
default:
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-09 02:43:32 +00:00
|
|
|
if endpoint.Type == portainer.AzureEnvironment {
|
|
|
|
credentials := endpoint.AzureCredentials
|
|
|
|
if payload.AzureApplicationID != nil {
|
|
|
|
credentials.ApplicationID = *payload.AzureApplicationID
|
|
|
|
}
|
|
|
|
if payload.AzureTenantID != nil {
|
|
|
|
credentials.TenantID = *payload.AzureTenantID
|
|
|
|
}
|
|
|
|
if payload.AzureAuthenticationKey != nil {
|
|
|
|
credentials.AuthenticationKey = *payload.AzureAuthenticationKey
|
|
|
|
}
|
|
|
|
|
|
|
|
httpClient := client.NewHTTPClient()
|
|
|
|
_, authErr := httpClient.ExecuteAzureAuthenticationRequest(&credentials)
|
|
|
|
if authErr != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to authenticate against Azure", authErr}
|
|
|
|
}
|
|
|
|
endpoint.AzureCredentials = credentials
|
|
|
|
}
|
|
|
|
|
2018-10-28 09:27:06 +00:00
|
|
|
if payload.TLS != nil {
|
|
|
|
folder := strconv.Itoa(endpointID)
|
|
|
|
|
|
|
|
if *payload.TLS {
|
|
|
|
endpoint.TLSConfig.TLS = true
|
|
|
|
if payload.TLSSkipVerify != nil {
|
|
|
|
endpoint.TLSConfig.TLSSkipVerify = *payload.TLSSkipVerify
|
|
|
|
|
|
|
|
if !*payload.TLSSkipVerify {
|
|
|
|
caCertPath, _ := handler.FileService.GetPathForTLSFile(folder, portainer.TLSFileCA)
|
|
|
|
endpoint.TLSConfig.TLSCACertPath = caCertPath
|
|
|
|
} else {
|
|
|
|
endpoint.TLSConfig.TLSCACertPath = ""
|
|
|
|
handler.FileService.DeleteTLSFile(folder, portainer.TLSFileCA)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if payload.TLSSkipClientVerify != nil {
|
|
|
|
if !*payload.TLSSkipClientVerify {
|
|
|
|
certPath, _ := handler.FileService.GetPathForTLSFile(folder, portainer.TLSFileCert)
|
|
|
|
endpoint.TLSConfig.TLSCertPath = certPath
|
|
|
|
keyPath, _ := handler.FileService.GetPathForTLSFile(folder, portainer.TLSFileKey)
|
|
|
|
endpoint.TLSConfig.TLSKeyPath = keyPath
|
|
|
|
} else {
|
|
|
|
endpoint.TLSConfig.TLSCertPath = ""
|
|
|
|
handler.FileService.DeleteTLSFile(folder, portainer.TLSFileCert)
|
|
|
|
endpoint.TLSConfig.TLSKeyPath = ""
|
|
|
|
handler.FileService.DeleteTLSFile(folder, portainer.TLSFileKey)
|
|
|
|
}
|
|
|
|
}
|
2018-06-11 13:13:19 +00:00
|
|
|
|
|
|
|
} else {
|
2018-10-28 09:27:06 +00:00
|
|
|
endpoint.TLSConfig.TLS = false
|
|
|
|
endpoint.TLSConfig.TLSSkipVerify = false
|
|
|
|
endpoint.TLSConfig.TLSCACertPath = ""
|
2018-06-11 13:13:19 +00:00
|
|
|
endpoint.TLSConfig.TLSCertPath = ""
|
|
|
|
endpoint.TLSConfig.TLSKeyPath = ""
|
2018-10-28 09:27:06 +00:00
|
|
|
err = handler.FileService.DeleteTLSFiles(folder)
|
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to remove TLS files from disk", err}
|
|
|
|
}
|
2018-06-11 13:13:19 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-09 02:43:32 +00:00
|
|
|
if payload.URL != nil || payload.TLS != nil || endpoint.Type == portainer.AzureEnvironment {
|
2019-11-12 23:41:42 +00:00
|
|
|
_, err = handler.ProxyManager.CreateAndRegisterEndpointProxy(endpoint)
|
2018-10-28 09:27:06 +00:00
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to register HTTP proxy for the endpoint", err}
|
|
|
|
}
|
2018-06-11 13:13:19 +00:00
|
|
|
}
|
|
|
|
|
2020-05-20 05:23:15 +00:00
|
|
|
err = handler.DataStore.Endpoint().UpdateEndpoint(endpoint.ID, endpoint)
|
2018-06-11 13:13:19 +00:00
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to persist endpoint changes inside the database", err}
|
|
|
|
}
|
|
|
|
|
2019-09-09 22:58:26 +00:00
|
|
|
if updateAuthorizations {
|
2019-10-07 02:42:01 +00:00
|
|
|
err = handler.AuthorizationService.UpdateUsersAuthorizations()
|
2019-09-09 22:58:26 +00:00
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to update user authorizations", err}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-05 23:21:03 +00:00
|
|
|
if (endpoint.Type == portainer.EdgeAgentOnDockerEnvironment || endpoint.Type == portainer.EdgeAgentOnKubernetesEnvironment) && (groupIDChanged || tagsChanged) {
|
2020-05-20 05:23:15 +00:00
|
|
|
relation, err := handler.DataStore.EndpointRelation().EndpointRelation(endpoint.ID)
|
2020-05-14 02:14:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to find endpoint relation inside the database", err}
|
|
|
|
}
|
|
|
|
|
2020-05-20 05:23:15 +00:00
|
|
|
endpointGroup, err := handler.DataStore.EndpointGroup().EndpointGroup(endpoint.GroupID)
|
2020-05-14 02:14:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to find endpoint group inside the database", err}
|
|
|
|
}
|
|
|
|
|
2020-05-20 05:23:15 +00:00
|
|
|
edgeGroups, err := handler.DataStore.EdgeGroup().EdgeGroups()
|
2020-05-14 02:14:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to retrieve edge groups from the database", err}
|
|
|
|
}
|
|
|
|
|
2020-05-20 05:23:15 +00:00
|
|
|
edgeStacks, err := handler.DataStore.EdgeStack().EdgeStacks()
|
2020-05-14 02:14:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to retrieve edge stacks from the database", err}
|
|
|
|
}
|
|
|
|
|
|
|
|
edgeStackSet := map[portainer.EdgeStackID]bool{}
|
|
|
|
|
2020-06-16 07:58:16 +00:00
|
|
|
endpointEdgeStacks := edge.EndpointRelatedEdgeStacks(endpoint, endpointGroup, edgeGroups, edgeStacks)
|
2020-05-14 02:14:28 +00:00
|
|
|
for _, edgeStackID := range endpointEdgeStacks {
|
|
|
|
edgeStackSet[edgeStackID] = true
|
|
|
|
}
|
|
|
|
|
|
|
|
relation.EdgeStacks = edgeStackSet
|
|
|
|
|
2020-05-20 05:23:15 +00:00
|
|
|
err = handler.DataStore.EndpointRelation().UpdateEndpointRelation(endpoint.ID, relation)
|
2020-05-14 02:14:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to persist endpoint relation changes inside the database", err}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-11 13:13:19 +00:00
|
|
|
return response.JSON(w, endpoint)
|
|
|
|
}
|