mirror of https://github.com/portainer/portainer
fix(swagger) swagger annotations fixes and improvements EE-1205
parent
6a67e8142d
commit
e6d690e31e
|
@ -39,6 +39,7 @@ func (payload *authenticatePayload) Validate(r *http.Request) error {
|
||||||
|
|
||||||
// @id AuthenticateUser
|
// @id AuthenticateUser
|
||||||
// @summary Authenticate
|
// @summary Authenticate
|
||||||
|
// @description **Access policy**: public
|
||||||
// @description Use this environment(endpoint) to authenticate against Portainer using a username and password.
|
// @description Use this environment(endpoint) to authenticate against Portainer using a username and password.
|
||||||
// @tags auth
|
// @tags auth
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -44,6 +44,7 @@ func (handler *Handler) authenticateOAuth(code string, settings *portainer.OAuth
|
||||||
|
|
||||||
// @id ValidateOAuth
|
// @id ValidateOAuth
|
||||||
// @summary Authenticate with OAuth
|
// @summary Authenticate with OAuth
|
||||||
|
// @description **Access policy**: public
|
||||||
// @tags auth
|
// @tags auth
|
||||||
// @accept json
|
// @accept json
|
||||||
// @produce json
|
// @produce json
|
||||||
|
|
|
@ -10,6 +10,7 @@ import (
|
||||||
|
|
||||||
// @id Logout
|
// @id Logout
|
||||||
// @summary Logout
|
// @summary Logout
|
||||||
|
// @description **Access policy**: authenticated
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @tags auth
|
// @tags auth
|
||||||
// @success 204 "Success"
|
// @success 204 "Success"
|
||||||
|
|
|
@ -27,8 +27,9 @@ func (p *backupPayload) Validate(r *http.Request) error {
|
||||||
// @description **Access policy**: admin
|
// @description **Access policy**: admin
|
||||||
// @tags backup
|
// @tags backup
|
||||||
// @security jwt
|
// @security jwt
|
||||||
|
// @accept json
|
||||||
// @produce octet-stream
|
// @produce octet-stream
|
||||||
// @param Password body string false "Password to encrypt the backup with"
|
// @param body body backupPayload false "An object contains the password to encrypt the backup with"
|
||||||
// @success 200 "Success"
|
// @success 200 "Success"
|
||||||
// @failure 400 "Invalid request"
|
// @failure 400 "Invalid request"
|
||||||
// @failure 500 "Server error"
|
// @failure 500 "Server error"
|
||||||
|
|
|
@ -22,10 +22,9 @@ type restorePayload struct {
|
||||||
// @description Triggers a system restore using provided backup file
|
// @description Triggers a system restore using provided backup file
|
||||||
// @description **Access policy**: public
|
// @description **Access policy**: public
|
||||||
// @tags backup
|
// @tags backup
|
||||||
// @param FileContent body []byte true "Content of the backup"
|
// @accept json
|
||||||
// @param FileName body string true "File name"
|
// @param restorePayload body restorePayload true "Restore request payload"
|
||||||
// @param Password body string false "Password to decrypt the backup with"
|
// @success 200 "Success"
|
||||||
// @success 200 "Success"
|
|
||||||
// @failure 400 "Invalid request"
|
// @failure 400 "Invalid request"
|
||||||
// @failure 500 "Server error"
|
// @failure 500 "Server error"
|
||||||
// @router /restore [post]
|
// @router /restore [post]
|
||||||
|
|
|
@ -16,7 +16,7 @@ import (
|
||||||
// @id CustomTemplateDelete
|
// @id CustomTemplateDelete
|
||||||
// @summary Remove a template
|
// @summary Remove a template
|
||||||
// @description Remove a template.
|
// @description Remove a template.
|
||||||
// @description **Access policy**: authorized
|
// @description **Access policy**: authenticated
|
||||||
// @tags custom_templates
|
// @tags custom_templates
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @param id path int true "Template identifier"
|
// @param id path int true "Template identifier"
|
||||||
|
|
|
@ -18,7 +18,7 @@ type fileResponse struct {
|
||||||
// @id CustomTemplateFile
|
// @id CustomTemplateFile
|
||||||
// @summary Get Template stack file content.
|
// @summary Get Template stack file content.
|
||||||
// @description Retrieve the content of the Stack file for the specified custom template
|
// @description Retrieve the content of the Stack file for the specified custom template
|
||||||
// @description **Access policy**: authorized
|
// @description **Access policy**: authenticated
|
||||||
// @tags custom_templates
|
// @tags custom_templates
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @produce json
|
// @produce json
|
||||||
|
|
|
@ -19,7 +19,6 @@ import (
|
||||||
// @description **Access policy**: authenticated
|
// @description **Access policy**: authenticated
|
||||||
// @tags custom_templates
|
// @tags custom_templates
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param id path int true "Template identifier"
|
// @param id path int true "Template identifier"
|
||||||
// @success 200 {object} portainer.CustomTemplate "Success"
|
// @success 200 {object} portainer.CustomTemplate "Success"
|
||||||
|
|
|
@ -34,7 +34,7 @@ func (payload *edgeGroupCreatePayload) Validate(r *http.Request) error {
|
||||||
|
|
||||||
// @id EdgeGroupCreate
|
// @id EdgeGroupCreate
|
||||||
// @summary Create an EdgeGroup
|
// @summary Create an EdgeGroup
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_groups
|
// @tags edge_groups
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -13,11 +13,9 @@ import (
|
||||||
|
|
||||||
// @id EdgeGroupDelete
|
// @id EdgeGroupDelete
|
||||||
// @summary Deletes an EdgeGroup
|
// @summary Deletes an EdgeGroup
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_groups
|
// @tags edge_groups
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
|
||||||
// @param id path int true "EdgeGroup Id"
|
// @param id path int true "EdgeGroup Id"
|
||||||
// @success 204
|
// @success 204
|
||||||
// @failure 503 "Edge compute features are disabled"
|
// @failure 503 "Edge compute features are disabled"
|
||||||
|
|
|
@ -12,10 +12,9 @@ import (
|
||||||
|
|
||||||
// @id EdgeGroupInspect
|
// @id EdgeGroupInspect
|
||||||
// @summary Inspects an EdgeGroup
|
// @summary Inspects an EdgeGroup
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_groups
|
// @tags edge_groups
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param id path int true "EdgeGroup Id"
|
// @param id path int true "EdgeGroup Id"
|
||||||
// @success 200 {object} portainer.EdgeGroup
|
// @success 200 {object} portainer.EdgeGroup
|
||||||
|
|
|
@ -17,10 +17,9 @@ type decoratedEdgeGroup struct {
|
||||||
|
|
||||||
// @id EdgeGroupList
|
// @id EdgeGroupList
|
||||||
// @summary list EdgeGroups
|
// @summary list EdgeGroups
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_groups
|
// @tags edge_groups
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @success 200 {array} portainer.EdgeGroup{HasEdgeStack=bool} "EdgeGroups"
|
// @success 200 {array} portainer.EdgeGroup{HasEdgeStack=bool} "EdgeGroups"
|
||||||
// @failure 500
|
// @failure 500
|
||||||
|
|
|
@ -36,7 +36,7 @@ func (payload *edgeGroupUpdatePayload) Validate(r *http.Request) error {
|
||||||
|
|
||||||
// @id EgeGroupUpdate
|
// @id EgeGroupUpdate
|
||||||
// @summary Updates an EdgeGroup
|
// @summary Updates an EdgeGroup
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_groups
|
// @tags edge_groups
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -16,10 +16,9 @@ import (
|
||||||
|
|
||||||
// @id EdgeJobCreate
|
// @id EdgeJobCreate
|
||||||
// @summary Create an EdgeJob
|
// @summary Create an EdgeJob
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_jobs
|
// @tags edge_jobs
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param method query string true "Creation Method" Enums(file, string)
|
// @param method query string true "Creation Method" Enums(file, string)
|
||||||
// @param body_string body edgeJobCreateFromFileContentPayload true "EdgeGroup data when method is string"
|
// @param body_string body edgeJobCreateFromFileContentPayload true "EdgeGroup data when method is string"
|
||||||
|
|
|
@ -13,11 +13,9 @@ import (
|
||||||
|
|
||||||
// @id EdgeJobDelete
|
// @id EdgeJobDelete
|
||||||
// @summary Delete an EdgeJob
|
// @summary Delete an EdgeJob
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_jobs
|
// @tags edge_jobs
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
|
||||||
// @param id path string true "EdgeJob Id"
|
// @param id path string true "EdgeJob Id"
|
||||||
// @success 204
|
// @success 204
|
||||||
// @failure 500
|
// @failure 500
|
||||||
|
|
|
@ -16,10 +16,9 @@ type edgeJobFileResponse struct {
|
||||||
|
|
||||||
// @id EdgeJobFile
|
// @id EdgeJobFile
|
||||||
// @summary Fetch a file of an EdgeJob
|
// @summary Fetch a file of an EdgeJob
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_jobs
|
// @tags edge_jobs
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param id path string true "EdgeJob Id"
|
// @param id path string true "EdgeJob Id"
|
||||||
// @success 200 {object} edgeJobFileResponse
|
// @success 200 {object} edgeJobFileResponse
|
||||||
|
|
|
@ -17,10 +17,9 @@ type edgeJobInspectResponse struct {
|
||||||
|
|
||||||
// @id EdgeJobInspect
|
// @id EdgeJobInspect
|
||||||
// @summary Inspect an EdgeJob
|
// @summary Inspect an EdgeJob
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_jobs
|
// @tags edge_jobs
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param id path string true "EdgeJob Id"
|
// @param id path string true "EdgeJob Id"
|
||||||
// @success 200 {object} portainer.EdgeJob
|
// @success 200 {object} portainer.EdgeJob
|
||||||
|
|
|
@ -9,10 +9,9 @@ import (
|
||||||
|
|
||||||
// @id EdgeJobList
|
// @id EdgeJobList
|
||||||
// @summary Fetch EdgeJobs list
|
// @summary Fetch EdgeJobs list
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_jobs
|
// @tags edge_jobs
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @success 200 {array} portainer.EdgeJob
|
// @success 200 {array} portainer.EdgeJob
|
||||||
// @failure 500
|
// @failure 500
|
||||||
|
|
|
@ -13,10 +13,9 @@ import (
|
||||||
|
|
||||||
// @id EdgeJobTasksClear
|
// @id EdgeJobTasksClear
|
||||||
// @summary Clear the log for a specifc task on an EdgeJob
|
// @summary Clear the log for a specifc task on an EdgeJob
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_jobs
|
// @tags edge_jobs
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param id path string true "EdgeJob Id"
|
// @param id path string true "EdgeJob Id"
|
||||||
// @param taskID path string true "Task Id"
|
// @param taskID path string true "Task Id"
|
||||||
|
|
|
@ -12,10 +12,9 @@ import (
|
||||||
|
|
||||||
// @id EdgeJobTasksCollect
|
// @id EdgeJobTasksCollect
|
||||||
// @summary Collect the log for a specifc task on an EdgeJob
|
// @summary Collect the log for a specifc task on an EdgeJob
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_jobs
|
// @tags edge_jobs
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param id path string true "EdgeJob Id"
|
// @param id path string true "EdgeJob Id"
|
||||||
// @param taskID path string true "Task Id"
|
// @param taskID path string true "Task Id"
|
||||||
|
|
|
@ -15,10 +15,9 @@ type fileResponse struct {
|
||||||
|
|
||||||
// @id EdgeJobTaskLogsInspect
|
// @id EdgeJobTaskLogsInspect
|
||||||
// @summary Fetch the log for a specifc task on an EdgeJob
|
// @summary Fetch the log for a specifc task on an EdgeJob
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_jobs
|
// @tags edge_jobs
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param id path string true "EdgeJob Id"
|
// @param id path string true "EdgeJob Id"
|
||||||
// @param taskID path string true "Task Id"
|
// @param taskID path string true "Task Id"
|
||||||
|
|
|
@ -19,10 +19,9 @@ type taskContainer struct {
|
||||||
|
|
||||||
// @id EdgeJobTasksList
|
// @id EdgeJobTasksList
|
||||||
// @summary Fetch the list of tasks on an EdgeJob
|
// @summary Fetch the list of tasks on an EdgeJob
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_jobs
|
// @tags edge_jobs
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param id path string true "EdgeJob Id"
|
// @param id path string true "EdgeJob Id"
|
||||||
// @success 200 {array} taskContainer
|
// @success 200 {array} taskContainer
|
||||||
|
|
|
@ -30,7 +30,7 @@ func (payload *edgeJobUpdatePayload) Validate(r *http.Request) error {
|
||||||
|
|
||||||
// @id EdgeJobUpdate
|
// @id EdgeJobUpdate
|
||||||
// @summary Update an EdgeJob
|
// @summary Update an EdgeJob
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_jobs
|
// @tags edge_jobs
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -19,10 +19,9 @@ import (
|
||||||
|
|
||||||
// @id EdgeStackCreate
|
// @id EdgeStackCreate
|
||||||
// @summary Create an EdgeStack
|
// @summary Create an EdgeStack
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_stacks
|
// @tags edge_stacks
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param method query string true "Creation Method" Enums(file,string,repository)
|
// @param method query string true "Creation Method" Enums(file,string,repository)
|
||||||
// @param body_string body swarmStackFromFileContentPayload true "Required when using method=string"
|
// @param body_string body swarmStackFromFileContentPayload true "Required when using method=string"
|
||||||
|
|
|
@ -13,11 +13,9 @@ import (
|
||||||
|
|
||||||
// @id EdgeStackDelete
|
// @id EdgeStackDelete
|
||||||
// @summary Delete an EdgeStack
|
// @summary Delete an EdgeStack
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_stacks
|
// @tags edge_stacks
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
|
||||||
// @param id path string true "EdgeStack Id"
|
// @param id path string true "EdgeStack Id"
|
||||||
// @success 204
|
// @success 204
|
||||||
// @failure 500
|
// @failure 500
|
||||||
|
|
|
@ -17,10 +17,9 @@ type stackFileResponse struct {
|
||||||
|
|
||||||
// @id EdgeStackFile
|
// @id EdgeStackFile
|
||||||
// @summary Fetches the stack file for an EdgeStack
|
// @summary Fetches the stack file for an EdgeStack
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_stacks
|
// @tags edge_stacks
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param id path string true "EdgeStack Id"
|
// @param id path string true "EdgeStack Id"
|
||||||
// @success 200 {object} stackFileResponse
|
// @success 200 {object} stackFileResponse
|
||||||
|
|
|
@ -12,10 +12,9 @@ import (
|
||||||
|
|
||||||
// @id EdgeStackInspect
|
// @id EdgeStackInspect
|
||||||
// @summary Inspect an EdgeStack
|
// @summary Inspect an EdgeStack
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_stacks
|
// @tags edge_stacks
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param id path string true "EdgeStack Id"
|
// @param id path string true "EdgeStack Id"
|
||||||
// @success 200 {object} portainer.EdgeStack
|
// @success 200 {object} portainer.EdgeStack
|
||||||
|
|
|
@ -9,10 +9,9 @@ import (
|
||||||
|
|
||||||
// @id EdgeStackList
|
// @id EdgeStackList
|
||||||
// @summary Fetches the list of EdgeStacks
|
// @summary Fetches the list of EdgeStacks
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_stacks
|
// @tags edge_stacks
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @success 200 {array} portainer.EdgeStack
|
// @success 200 {array} portainer.EdgeStack
|
||||||
// @failure 500
|
// @failure 500
|
||||||
|
|
|
@ -33,7 +33,7 @@ func (payload *updateEdgeStackPayload) Validate(r *http.Request) error {
|
||||||
|
|
||||||
// @id EdgeStackUpdate
|
// @id EdgeStackUpdate
|
||||||
// @summary Update an EdgeStack
|
// @summary Update an EdgeStack
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_stacks
|
// @tags edge_stacks
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -17,7 +17,7 @@ type templateFileFormat struct {
|
||||||
|
|
||||||
// @id EdgeTemplateList
|
// @id EdgeTemplateList
|
||||||
// @summary Fetches the list of Edge Templates
|
// @summary Fetches the list of Edge Templates
|
||||||
// @description
|
// @description **Access policy**: administrator
|
||||||
// @tags edge_templates
|
// @tags edge_templates
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -21,7 +21,7 @@ func (payload *logsPayload) Validate(r *http.Request) error {
|
||||||
|
|
||||||
// endpointEdgeJobsLogs
|
// endpointEdgeJobsLogs
|
||||||
// @summary Inspect an EdgeJob Log
|
// @summary Inspect an EdgeJob Log
|
||||||
// @description
|
// @description **Access policy**: public
|
||||||
// @tags edge, endpoints
|
// @tags edge, endpoints
|
||||||
// @accept json
|
// @accept json
|
||||||
// @produce json
|
// @produce json
|
||||||
|
|
|
@ -19,7 +19,7 @@ type configResponse struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
// @summary Inspect an Edge Stack for an Environment(Endpoint)
|
// @summary Inspect an Edge Stack for an Environment(Endpoint)
|
||||||
// @description
|
// @description **Access policy**: public
|
||||||
// @tags edge, endpoints, edge_stacks
|
// @tags edge, endpoints, edge_stacks
|
||||||
// @accept json
|
// @accept json
|
||||||
// @produce json
|
// @produce json
|
||||||
|
|
|
@ -17,8 +17,6 @@ import (
|
||||||
// @description **Access policy**: administrator
|
// @description **Access policy**: administrator
|
||||||
// @tags endpoint_groups
|
// @tags endpoint_groups
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
|
||||||
// @param id path int true "EndpointGroup identifier"
|
// @param id path int true "EndpointGroup identifier"
|
||||||
// @success 204 "Success"
|
// @success 204 "Success"
|
||||||
// @failure 400 "Invalid request"
|
// @failure 400 "Invalid request"
|
||||||
|
|
|
@ -27,7 +27,7 @@ import (
|
||||||
// @failure 400 "Invalid request"
|
// @failure 400 "Invalid request"
|
||||||
// @failure 404 "Environment(Endpoint) not found"
|
// @failure 404 "Environment(Endpoint) not found"
|
||||||
// @failure 500 "Server error"
|
// @failure 500 "Server error"
|
||||||
// @router /api/endpoints/{id}/association [put]
|
// @router /endpoints/{id}/association [put]
|
||||||
func (handler *Handler) endpointAssociationDelete(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
func (handler *Handler) endpointAssociationDelete(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -18,11 +18,27 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
type dockerhubStatusResponse struct {
|
type dockerhubStatusResponse struct {
|
||||||
|
// Remaiming images to pull
|
||||||
Remaining int `json:"remaining"`
|
Remaining int `json:"remaining"`
|
||||||
Limit int `json:"limit"`
|
// Daily limit
|
||||||
|
Limit int `json:"limit"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// GET request on /api/endpoints/{id}/dockerhub/{registryId}
|
// @id endpointDockerhubStatus
|
||||||
|
// @summary fetch docker pull limits
|
||||||
|
// @description get docker pull limits for a docker hub registry in the environment
|
||||||
|
// @description **Access policy**:
|
||||||
|
// @tags endpoints
|
||||||
|
// @security jwt
|
||||||
|
// @produce json
|
||||||
|
// @param id path int true "endpoint ID"
|
||||||
|
// @param registryId path int true "registry ID"
|
||||||
|
// @success 200 {object} dockerhubStatusResponse "Success"
|
||||||
|
// @failure 400 "Invalid request"
|
||||||
|
// @failure 403 "Permission denied"
|
||||||
|
// @failure 404 "registry or endpoint not found"
|
||||||
|
// @failure 500 "Server error"
|
||||||
|
// @router /endpoints/{id}/dockerhub/{registryId} [get]
|
||||||
func (handler *Handler) endpointDockerhubStatus(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
func (handler *Handler) endpointDockerhubStatus(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -29,6 +29,12 @@ func (payload *endpointExtensionAddPayload) Validate(r *http.Request) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// @id endpointExtensionAdd
|
||||||
|
// @tags endpoints
|
||||||
|
// @deprecated
|
||||||
|
// @param id path int true "Environment(Endpoint) identifier"
|
||||||
|
// @success 204 "Success"
|
||||||
|
// @router /endpoints/{id}/extensions [post]
|
||||||
func (handler *Handler) endpointExtensionAdd(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
func (handler *Handler) endpointExtensionAdd(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -12,6 +12,13 @@ import (
|
||||||
"github.com/portainer/portainer/api/bolt/errors"
|
"github.com/portainer/portainer/api/bolt/errors"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// @id endpointExtensionRemove
|
||||||
|
// @tags endpoints
|
||||||
|
// @deprecated
|
||||||
|
// @param id path int true "Environment(Endpoint) identifier"
|
||||||
|
// @param extensionType path string true "Extension Type"
|
||||||
|
// @success 204 "Success"
|
||||||
|
// @router /endpoints/{id}/extensions/{extensionType} [delete]
|
||||||
func (handler *Handler) endpointExtensionRemove(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
func (handler *Handler) endpointExtensionRemove(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -12,7 +12,20 @@ import (
|
||||||
"github.com/portainer/portainer/api/http/security"
|
"github.com/portainer/portainer/api/http/security"
|
||||||
)
|
)
|
||||||
|
|
||||||
// GET request on /endpoints/{id}/registries/{registryId}
|
// @id endpointRegistryInspect
|
||||||
|
// @summary get registry for environment
|
||||||
|
// @description **Access policy**: authenticated
|
||||||
|
// @tags endpoints
|
||||||
|
// @security jwt
|
||||||
|
// @produce json
|
||||||
|
// @param id path int true "identifier"
|
||||||
|
// @param registryId path int true "Registry identifier"
|
||||||
|
// @success 200 {object} portainer.Registry "Success"
|
||||||
|
// @failure 400 "Invalid request"
|
||||||
|
// @failure 403 "Permission denied"
|
||||||
|
// @failure 404 "Registry not found"
|
||||||
|
// @failure 500 "Server error"
|
||||||
|
// @router /endpoints/{id}/registries/{registryId} [get]
|
||||||
func (handler *Handler) endpointRegistryInspect(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
func (handler *Handler) endpointRegistryInspect(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -13,7 +13,18 @@ import (
|
||||||
"github.com/portainer/portainer/api/internal/endpointutils"
|
"github.com/portainer/portainer/api/internal/endpointutils"
|
||||||
)
|
)
|
||||||
|
|
||||||
// GET request on /endpoints/{id}/registries?namespace
|
// @id endpointRegistriesList
|
||||||
|
// @summary List Registries on environment
|
||||||
|
// @description List all registries based on the current user authorizations in current environment.
|
||||||
|
// @description **Access policy**: authenticated
|
||||||
|
// @tags endpoints
|
||||||
|
// @param namespace query string false "required if kubernetes environment, will show registries by namespace"
|
||||||
|
// @security jwt
|
||||||
|
// @produce json
|
||||||
|
// @param id path int true "Environment(Endpoint) identifier"
|
||||||
|
// @success 200 {array} portainer.Registry "Success"
|
||||||
|
// @failure 500 "Server error"
|
||||||
|
// @router /endpoints/{id}/registries [get]
|
||||||
func (handler *Handler) endpointRegistriesList(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
func (handler *Handler) endpointRegistriesList(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
securityContext, err := security.RetrieveRestrictedRequestContext(r)
|
securityContext, err := security.RetrieveRestrictedRequestContext(r)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -21,7 +21,22 @@ func (payload *registryAccessPayload) Validate(r *http.Request) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// PUT request on /endpoints/{id}/registries/{registryId}
|
// @id endpointRegistryAccess
|
||||||
|
// @summary update registry access for environment
|
||||||
|
// @description **Access policy**: authenticated
|
||||||
|
// @tags endpoints
|
||||||
|
// @security jwt
|
||||||
|
// @accept json
|
||||||
|
// @produce json
|
||||||
|
// @param id path int true "Environment(Endpoint) identifier"
|
||||||
|
// @param registryId path int true "Registry identifier"
|
||||||
|
// @param body body registryAccessPayload true "details"
|
||||||
|
// @success 204 "Success"
|
||||||
|
// @failure 400 "Invalid request"
|
||||||
|
// @failure 403 "Permission denied"
|
||||||
|
// @failure 404 "Endpoint not found"
|
||||||
|
// @failure 500 "Server error"
|
||||||
|
// @router /endpoints/{id}/registries/{registryId} [put]
|
||||||
func (handler *Handler) endpointRegistryAccess(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
func (handler *Handler) endpointRegistryAccess(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -36,9 +36,9 @@ func (payload *endpointSettingsUpdatePayload) Validate(r *http.Request) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
// @id EndpointSettingsUpdate
|
// @id EndpointSettingsUpdate
|
||||||
// @summary Update settings for an environments(endpoints)
|
// @summary Update settings for an environment(endpoint)
|
||||||
// @description Update settings for an environments(endpoints).
|
// @description Update settings for an environment(endpoint).
|
||||||
// @description **Access policy**: administrator
|
// @description **Access policy**: authenticated
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @tags endpoints
|
// @tags endpoints
|
||||||
// @accept json
|
// @accept json
|
||||||
|
@ -49,7 +49,7 @@ func (payload *endpointSettingsUpdatePayload) Validate(r *http.Request) error {
|
||||||
// @failure 400 "Invalid request"
|
// @failure 400 "Invalid request"
|
||||||
// @failure 404 "Environment(Endpoint) not found"
|
// @failure 404 "Environment(Endpoint) not found"
|
||||||
// @failure 500 "Server error"
|
// @failure 500 "Server error"
|
||||||
// @router /api/endpoints/{id}/settings [put]
|
// @router /endpoints/{id}/settings [put]
|
||||||
func (handler *Handler) endpointSettingsUpdate(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
func (handler *Handler) endpointSettingsUpdate(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -12,9 +12,9 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
// @id EndpointSnapshot
|
// @id EndpointSnapshot
|
||||||
// @summary Snapshots an environments(endpoints)
|
// @summary Snapshots an environment(endpoint)
|
||||||
// @description Snapshots an environments(endpoints)
|
// @description Snapshots an environment(endpoint)
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: administrator
|
||||||
// @tags endpoints
|
// @tags endpoints
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @param id path int true "Environment(Endpoint) identifier"
|
// @param id path int true "Environment(Endpoint) identifier"
|
||||||
|
|
|
@ -56,7 +56,7 @@ func (payload *endpointUpdatePayload) Validate(r *http.Request) error {
|
||||||
// @id EndpointUpdate
|
// @id EndpointUpdate
|
||||||
// @summary Update an environment(endpoint)
|
// @summary Update an environment(endpoint)
|
||||||
// @description Update an environment(endpoint).
|
// @description Update an environment(endpoint).
|
||||||
// @description **Access policy**: administrator
|
// @description **Access policy**: authenticated
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @tags endpoints
|
// @tags endpoints
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -12,11 +12,9 @@ import (
|
||||||
// @id HelmDelete
|
// @id HelmDelete
|
||||||
// @summary Delete Helm Release
|
// @summary Delete Helm Release
|
||||||
// @description
|
// @description
|
||||||
// @description **Access policy**: authorized
|
// @description **Access policy**: authenticated
|
||||||
// @tags helm
|
// @tags helm
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
|
||||||
// @param id path int true "Environment(Endpoint) identifier"
|
// @param id path int true "Environment(Endpoint) identifier"
|
||||||
// @param release path string true "The name of the release/application to uninstall"
|
// @param release path string true "The name of the release/application to uninstall"
|
||||||
// @param namespace query string true "An optional namespace"
|
// @param namespace query string true "An optional namespace"
|
||||||
|
|
|
@ -36,7 +36,7 @@ var errChartNameInvalid = errors.New("invalid chart name. " +
|
||||||
// @id HelmInstall
|
// @id HelmInstall
|
||||||
// @summary Install Helm Chart
|
// @summary Install Helm Chart
|
||||||
// @description
|
// @description
|
||||||
// @description **Access policy**: authorized
|
// @description **Access policy**: authenticated
|
||||||
// @tags helm
|
// @tags helm
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -12,7 +12,7 @@ import (
|
||||||
// @id HelmList
|
// @id HelmList
|
||||||
// @summary List Helm Releases
|
// @summary List Helm Releases
|
||||||
// @description
|
// @description
|
||||||
// @description **Access policy**: authorized
|
// @description **Access policy**: authenticated
|
||||||
// @tags helm
|
// @tags helm
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -13,7 +13,7 @@ import (
|
||||||
// @id HelmRepoSearch
|
// @id HelmRepoSearch
|
||||||
// @summary Search Helm Charts
|
// @summary Search Helm Charts
|
||||||
// @description
|
// @description
|
||||||
// @description **Access policy**: authorized
|
// @description **Access policy**: authenticated
|
||||||
// @tags helm
|
// @tags helm
|
||||||
// @param repo query string true "Helm repository URL"
|
// @param repo query string true "Helm repository URL"
|
||||||
// @security jwt
|
// @security jwt
|
||||||
|
|
|
@ -15,8 +15,8 @@ import (
|
||||||
// @id HelmShow
|
// @id HelmShow
|
||||||
// @summary Show Helm Chart Information
|
// @summary Show Helm Chart Information
|
||||||
// @description
|
// @description
|
||||||
// @description **Access policy**: authorized
|
// @description **Access policy**: authenticated
|
||||||
// @tags helm_chart
|
// @tags helm
|
||||||
// @param repo query string true "Helm repository URL"
|
// @param repo query string true "Helm repository URL"
|
||||||
// @param chart query string true "Chart name"
|
// @param chart query string true "Chart name"
|
||||||
// @param command path string true "chart/values/readme"
|
// @param command path string true "chart/values/readme"
|
||||||
|
|
|
@ -17,7 +17,7 @@ import (
|
||||||
// @id GetKubernetesConfig
|
// @id GetKubernetesConfig
|
||||||
// @summary Generates kubeconfig file enabling client communication with k8s api server
|
// @summary Generates kubeconfig file enabling client communication with k8s api server
|
||||||
// @description Generates kubeconfig file enabling client communication with k8s api server
|
// @description Generates kubeconfig file enabling client communication with k8s api server
|
||||||
// @description **Access policy**: authorized
|
// @description **Access policy**: authenticated
|
||||||
// @tags kubernetes
|
// @tags kubernetes
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -13,7 +13,7 @@ import (
|
||||||
// @id getKubernetesNodesLimits
|
// @id getKubernetesNodesLimits
|
||||||
// @summary Get CPU and memory limits of all nodes within k8s cluster
|
// @summary Get CPU and memory limits of all nodes within k8s cluster
|
||||||
// @description Get CPU and memory limits of all nodes within k8s cluster
|
// @description Get CPU and memory limits of all nodes within k8s cluster
|
||||||
// @description **Access policy**: authorized
|
// @description **Access policy**: authenticated
|
||||||
// @tags kubernetes
|
// @tags kubernetes
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -26,7 +26,9 @@ type motdData struct {
|
||||||
Style string `json:"style"`
|
Style string `json:"style"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// @id MOTD
|
||||||
// @summary fetches the message of the day
|
// @summary fetches the message of the day
|
||||||
|
// @description **Access policy**: restricted
|
||||||
// @tags motd
|
// @tags motd
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @produce json
|
// @produce json
|
||||||
|
|
|
@ -81,7 +81,7 @@ func (payload *registryConfigurePayload) Validate(r *http.Request) error {
|
||||||
// @id RegistryConfigure
|
// @id RegistryConfigure
|
||||||
// @summary Configures a registry
|
// @summary Configures a registry
|
||||||
// @description Configures a registry.
|
// @description Configures a registry.
|
||||||
// @description **Access policy**: admin
|
// @description **Access policy**: restricted
|
||||||
// @tags registries
|
// @tags registries
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -62,7 +62,7 @@ func (payload *registryCreatePayload) Validate(_ *http.Request) error {
|
||||||
// @id RegistryCreate
|
// @id RegistryCreate
|
||||||
// @summary Create a new registry
|
// @summary Create a new registry
|
||||||
// @description Create a new registry.
|
// @description Create a new registry.
|
||||||
// @description **Access policy**: administrator
|
// @description **Access policy**: restricted
|
||||||
// @tags registries
|
// @tags registries
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -15,7 +15,7 @@ import (
|
||||||
// @id RegistryDelete
|
// @id RegistryDelete
|
||||||
// @summary Remove a registry
|
// @summary Remove a registry
|
||||||
// @description Remove a registry
|
// @description Remove a registry
|
||||||
// @description **Access policy**: administrator
|
// @description **Access policy**: restricted
|
||||||
// @tags registries
|
// @tags registries
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @param id path int true "Registry identifier"
|
// @param id path int true "Registry identifier"
|
||||||
|
|
|
@ -14,7 +14,7 @@ import (
|
||||||
// @id RegistryInspect
|
// @id RegistryInspect
|
||||||
// @summary Inspect a registry
|
// @summary Inspect a registry
|
||||||
// @description Retrieve details about a registry.
|
// @description Retrieve details about a registry.
|
||||||
// @description **Access policy**: administrator
|
// @description **Access policy**: restricted
|
||||||
// @tags registries
|
// @tags registries
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @produce json
|
// @produce json
|
||||||
|
|
|
@ -37,7 +37,7 @@ func (payload *registryUpdatePayload) Validate(r *http.Request) error {
|
||||||
// @id RegistryUpdate
|
// @id RegistryUpdate
|
||||||
// @summary Update a registry
|
// @summary Update a registry
|
||||||
// @description Update a registry
|
// @description Update a registry
|
||||||
// @description **Access policy**: administrator
|
// @description **Access policy**: restricted
|
||||||
// @tags registries
|
// @tags registries
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -38,7 +38,7 @@ func (payload *resourceControlUpdatePayload) Validate(r *http.Request) error {
|
||||||
// @id ResourceControlUpdate
|
// @id ResourceControlUpdate
|
||||||
// @summary Update a resource control
|
// @summary Update a resource control
|
||||||
// @description Update a resource control
|
// @description Update a resource control
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: authenticated
|
||||||
// @tags resource_controls
|
// @tags resource_controls
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -14,7 +14,22 @@ import (
|
||||||
"github.com/portainer/portainer/api/internal/stackutils"
|
"github.com/portainer/portainer/api/internal/stackutils"
|
||||||
)
|
)
|
||||||
|
|
||||||
// PUT request on /api/stacks/:id/associate?endpointId=<endpointId>&swarmId=<swarmId>&orphanedRunning=<orphanedRunning>
|
// @id StackAssociate
|
||||||
|
// @summary Associate an orphaned stack to a new environment(endpoint)
|
||||||
|
// @description **Access policy**: administrator
|
||||||
|
// @tags stacks
|
||||||
|
// @security jwt
|
||||||
|
// @produce json
|
||||||
|
// @param id path int true "Stack identifier"
|
||||||
|
// @param endpointId query int true "Stacks created before version 1.18.0 might not have an associated environment(endpoint) identifier. Use this optional parameter to set the environment(endpoint) identifier used by the stack."
|
||||||
|
// @param swarmId query int true "Swarm identifier"
|
||||||
|
// @param orphanedRunning query boolean true "Indicates whether the stack is orphaned"
|
||||||
|
// @success 200 {object} portainer.Stack "Success"
|
||||||
|
// @failure 400 "Invalid request"
|
||||||
|
// @failure 403 "Permission denied"
|
||||||
|
// @failure 404 "Stack not found"
|
||||||
|
// @failure 500 "Server error"
|
||||||
|
// @router /stacks/{id}/associate [put]
|
||||||
func (handler *Handler) stackAssociate(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
func (handler *Handler) stackAssociate(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
stackID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
stackID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -33,7 +33,7 @@ func (handler *Handler) cleanUp(stack *portainer.Stack, doCleanUp *bool) error {
|
||||||
// @id StackCreate
|
// @id StackCreate
|
||||||
// @summary Deploy a new stack
|
// @summary Deploy a new stack
|
||||||
// @description Deploy a new stack into a Docker environment(endpoint) specified via the environment(endpoint) identifier.
|
// @description Deploy a new stack into a Docker environment(endpoint) specified via the environment(endpoint) identifier.
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: authenticated
|
||||||
// @tags stacks
|
// @tags stacks
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json,multipart/form-data
|
// @accept json,multipart/form-data
|
||||||
|
|
|
@ -24,7 +24,7 @@ type stackListOperationFilters struct {
|
||||||
// @description List all stacks based on the current user authorizations.
|
// @description List all stacks based on the current user authorizations.
|
||||||
// @description Will return all stacks if using an administrator account otherwise it
|
// @description Will return all stacks if using an administrator account otherwise it
|
||||||
// @description will only return the list of stacks the user have access to.
|
// @description will only return the list of stacks the user have access to.
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: authenticated
|
||||||
// @tags stacks
|
// @tags stacks
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @param filters query string false "Filters to process on the stack list. Encoded as JSON (a map[string]string). For example, {"SwarmID": "jpofkc0i9uo9wtx1zesuk649w"} will only return stacks that are part of the specified Swarm cluster. Available filters: EndpointID, SwarmID."
|
// @param filters query string false "Filters to process on the stack list. Encoded as JSON (a map[string]string). For example, {"SwarmID": "jpofkc0i9uo9wtx1zesuk649w"} will only return stacks that are part of the specified Swarm cluster. Available filters: EndpointID, SwarmID."
|
||||||
|
|
|
@ -34,7 +34,7 @@ func (payload *stackMigratePayload) Validate(r *http.Request) error {
|
||||||
// @id StackMigrate
|
// @id StackMigrate
|
||||||
// @summary Migrate a stack to another environment(endpoint)
|
// @summary Migrate a stack to another environment(endpoint)
|
||||||
// @description Migrate a stack from an environment(endpoint) to another environment(endpoint). It will re-create the stack inside the target environment(endpoint) before removing the original stack.
|
// @description Migrate a stack from an environment(endpoint) to another environment(endpoint). It will re-create the stack inside the target environment(endpoint) before removing the original stack.
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: authenticated
|
||||||
// @tags stacks
|
// @tags stacks
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @produce json
|
// @produce json
|
||||||
|
|
|
@ -20,7 +20,7 @@ import (
|
||||||
// @id StackStart
|
// @id StackStart
|
||||||
// @summary Starts a stopped Stack
|
// @summary Starts a stopped Stack
|
||||||
// @description Starts a stopped Stack.
|
// @description Starts a stopped Stack.
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: authenticated
|
||||||
// @tags stacks
|
// @tags stacks
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @param id path int true "Stack identifier"
|
// @param id path int true "Stack identifier"
|
||||||
|
|
|
@ -18,7 +18,7 @@ import (
|
||||||
// @id StackStop
|
// @id StackStop
|
||||||
// @summary Stops a stopped Stack
|
// @summary Stops a stopped Stack
|
||||||
// @description Stops a stopped Stack.
|
// @description Stops a stopped Stack.
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: authenticated
|
||||||
// @tags stacks
|
// @tags stacks
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @param id path int true "Stack identifier"
|
// @param id path int true "Stack identifier"
|
||||||
|
|
|
@ -51,7 +51,7 @@ func (payload *updateSwarmStackPayload) Validate(r *http.Request) error {
|
||||||
// @id StackUpdate
|
// @id StackUpdate
|
||||||
// @summary Update a stack
|
// @summary Update a stack
|
||||||
// @description Update a stack.
|
// @description Update a stack.
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: authenticated
|
||||||
// @tags stacks
|
// @tags stacks
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -40,7 +40,7 @@ func (payload *stackGitUpdatePayload) Validate(r *http.Request) error {
|
||||||
// @id StackUpdateGit
|
// @id StackUpdateGit
|
||||||
// @summary Update a stack's Git configs
|
// @summary Update a stack's Git configs
|
||||||
// @description Update the Git settings in a stack, e.g., RepositoryReferenceName and AutoUpdate
|
// @description Update the Git settings in a stack, e.g., RepositoryReferenceName and AutoUpdate
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: authenticated
|
||||||
// @tags stacks
|
// @tags stacks
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -38,7 +38,7 @@ func (payload *stackGitRedployPayload) Validate(r *http.Request) error {
|
||||||
// @id StackGitRedeploy
|
// @id StackGitRedeploy
|
||||||
// @summary Redeploy a stack
|
// @summary Redeploy a stack
|
||||||
// @description Pull and redeploy a stack via Git
|
// @description Pull and redeploy a stack via Git
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: authenticated
|
||||||
// @tags stacks
|
// @tags stacks
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -15,6 +15,16 @@ import (
|
||||||
"github.com/portainer/libhttp/request"
|
"github.com/portainer/libhttp/request"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// @id WebhookInvoke
|
||||||
|
// @summary Webhook for triggering stack updates from git
|
||||||
|
// @description **Access policy**: public
|
||||||
|
// @tags stacks
|
||||||
|
// @param webhookID path string true "Stack identifier"
|
||||||
|
// @success 200 "Success"
|
||||||
|
// @failure 400 "Invalid request"
|
||||||
|
// @failure 409 "Conflict"
|
||||||
|
// @failure 500 "Server error"
|
||||||
|
// @router /stacks/webhooks/{webhookID} [post]
|
||||||
func (handler *Handler) webhookInvoke(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
func (handler *Handler) webhookInvoke(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
webhookID, err := retrieveUUIDRouteVariableValue(r, "webhookID")
|
webhookID, err := retrieveUUIDRouteVariableValue(r, "webhookID")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -29,6 +29,7 @@ func (payload *tagCreatePayload) Validate(r *http.Request) error {
|
||||||
// @description **Access policy**: administrator
|
// @description **Access policy**: administrator
|
||||||
// @tags tags
|
// @tags tags
|
||||||
// @security jwt
|
// @security jwt
|
||||||
|
// @accept json
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param body body tagCreatePayload true "Tag details"
|
// @param body body tagCreatePayload true "Tag details"
|
||||||
// @success 200 {object} portainer.Tag "Success"
|
// @success 200 {object} portainer.Tag "Success"
|
||||||
|
|
|
@ -17,8 +17,6 @@ import (
|
||||||
// @description **Access policy**: administrator
|
// @description **Access policy**: administrator
|
||||||
// @tags tags
|
// @tags tags
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
|
||||||
// @param id path int true "Tag identifier"
|
// @param id path int true "Tag identifier"
|
||||||
// @success 204 "Success"
|
// @success 204 "Success"
|
||||||
// @failure 400 "Invalid request"
|
// @failure 400 "Invalid request"
|
||||||
|
|
|
@ -10,7 +10,7 @@ import (
|
||||||
// @id TagList
|
// @id TagList
|
||||||
// @summary List tags
|
// @summary List tags
|
||||||
// @description List tags.
|
// @description List tags.
|
||||||
// @description **Access policy**: administrator
|
// @description **Access policy**: authenticated
|
||||||
// @tags tags
|
// @tags tags
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @produce json
|
// @produce json
|
||||||
|
|
|
@ -37,7 +37,7 @@ func (payload *teamMembershipCreatePayload) Validate(r *http.Request) error {
|
||||||
// @id TeamMembershipCreate
|
// @id TeamMembershipCreate
|
||||||
// @summary Create a new team membership
|
// @summary Create a new team membership
|
||||||
// @description Create a new team memberships. Access is only available to administrators leaders of the associated team.
|
// @description Create a new team memberships. Access is only available to administrators leaders of the associated team.
|
||||||
// @description **Access policy**: admin
|
// @description **Access policy**: administrator
|
||||||
// @tags team_memberships
|
// @tags team_memberships
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -15,7 +15,7 @@ import (
|
||||||
// @id TeamMembershipDelete
|
// @id TeamMembershipDelete
|
||||||
// @summary Remove a team membership
|
// @summary Remove a team membership
|
||||||
// @description Remove a team membership. Access is only available to administrators leaders of the associated team.
|
// @description Remove a team membership. Access is only available to administrators leaders of the associated team.
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: administrator
|
||||||
// @tags team_memberships
|
// @tags team_memberships
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @param id path int true "TeamMembership identifier"
|
// @param id path int true "TeamMembership identifier"
|
||||||
|
|
|
@ -12,7 +12,7 @@ import (
|
||||||
// @id TeamMembershipList
|
// @id TeamMembershipList
|
||||||
// @summary List team memberships
|
// @summary List team memberships
|
||||||
// @description List team memberships. Access is only available to administrators and team leaders.
|
// @description List team memberships. Access is only available to administrators and team leaders.
|
||||||
// @description **Access policy**: admin
|
// @description **Access policy**: administrator
|
||||||
// @tags team_memberships
|
// @tags team_memberships
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @produce json
|
// @produce json
|
||||||
|
|
|
@ -38,7 +38,7 @@ func (payload *teamMembershipUpdatePayload) Validate(r *http.Request) error {
|
||||||
// @id TeamMembershipUpdate
|
// @id TeamMembershipUpdate
|
||||||
// @summary Update a team membership
|
// @summary Update a team membership
|
||||||
// @description Update a team membership. Access is only available to administrators leaders of the associated team.
|
// @description Update a team membership. Access is only available to administrators leaders of the associated team.
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: administrator
|
||||||
// @tags team_memberships
|
// @tags team_memberships
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -15,7 +15,7 @@ import (
|
||||||
// @id TeamInspect
|
// @id TeamInspect
|
||||||
// @summary Inspect a team
|
// @summary Inspect a team
|
||||||
// @description Retrieve details about a team. Access is only available for administrator and leaders of that team.
|
// @description Retrieve details about a team. Access is only available for administrator and leaders of that team.
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: administrator
|
||||||
// @tags teams
|
// @tags teams
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @produce json
|
// @produce json
|
||||||
|
|
|
@ -23,7 +23,7 @@ func (payload *teamUpdatePayload) Validate(r *http.Request) error {
|
||||||
// @summary Update a team
|
// @summary Update a team
|
||||||
// @description Update a team.
|
// @description Update a team.
|
||||||
// @description **Access policy**: administrator
|
// @description **Access policy**: administrator
|
||||||
// @tags
|
// @tags teams
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
// @produce json
|
// @produce json
|
||||||
|
|
|
@ -39,7 +39,7 @@ func (payload *filePayload) Validate(r *http.Request) error {
|
||||||
// @id TemplateFile
|
// @id TemplateFile
|
||||||
// @summary Get a template's file
|
// @summary Get a template's file
|
||||||
// @description Get a template's file
|
// @description Get a template's file
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: authenticated
|
||||||
// @tags templates
|
// @tags templates
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -17,7 +17,7 @@ type listResponse struct {
|
||||||
// @id TemplateList
|
// @id TemplateList
|
||||||
// @summary List available templates
|
// @summary List available templates
|
||||||
// @description List available templates.
|
// @description List available templates.
|
||||||
// @description **Access policy**: restricted
|
// @description **Access policy**: authenticated
|
||||||
// @tags templates
|
// @tags templates
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @produce json
|
// @produce json
|
||||||
|
|
|
@ -32,7 +32,7 @@ func (payload *adminInitPayload) Validate(r *http.Request) error {
|
||||||
// @summary Initialize administrator account
|
// @summary Initialize administrator account
|
||||||
// @description Initialize the 'admin' user account.
|
// @description Initialize the 'admin' user account.
|
||||||
// @description **Access policy**: public
|
// @description **Access policy**: public
|
||||||
// @tags
|
// @tags users
|
||||||
// @accept json
|
// @accept json
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param body body adminInitPayload true "User details"
|
// @param body body adminInitPayload true "User details"
|
||||||
|
|
|
@ -18,7 +18,6 @@ import (
|
||||||
// @description **Access policy**: administrator
|
// @description **Access policy**: administrator
|
||||||
// @tags users
|
// @tags users
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @accept json
|
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param id path int true "User identifier"
|
// @param id path int true "User identifier"
|
||||||
// @success 204 "Success"
|
// @success 204 "Success"
|
||||||
|
|
|
@ -16,7 +16,7 @@ import (
|
||||||
// @summary Inspect a user
|
// @summary Inspect a user
|
||||||
// @description Retrieve details about a user.
|
// @description Retrieve details about a user.
|
||||||
// @description User passwords are filtered out, and should never be accessible.
|
// @description User passwords are filtered out, and should never be accessible.
|
||||||
// @description **Access policy**: administrator
|
// @description **Access policy**: authenticated
|
||||||
// @tags users
|
// @tags users
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @produce json
|
// @produce json
|
||||||
|
|
|
@ -14,7 +14,7 @@ import (
|
||||||
// @id UserMembershipsInspect
|
// @id UserMembershipsInspect
|
||||||
// @summary Inspect a user memberships
|
// @summary Inspect a user memberships
|
||||||
// @description Inspect a user memberships.
|
// @description Inspect a user memberships.
|
||||||
// @description **Access policy**: authenticated
|
// @description **Access policy**: restricted
|
||||||
// @tags users
|
// @tags users
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @produce json
|
// @produce json
|
||||||
|
|
|
@ -33,7 +33,7 @@ func (payload *webhookCreatePayload) Validate(r *http.Request) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
// @summary Create a webhook
|
// @summary Create a webhook
|
||||||
// @description
|
// @description **Access policy**: authenticated
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @tags webhooks
|
// @tags webhooks
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -10,11 +10,9 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
// @summary Delete a webhook
|
// @summary Delete a webhook
|
||||||
// @description
|
// @description **Access policy**: authenticated
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @tags webhooks
|
// @tags webhooks
|
||||||
// @accept json
|
|
||||||
// @produce json
|
|
||||||
// @param id path int true "Webhook id"
|
// @param id path int true "Webhook id"
|
||||||
// @success 202 "Webhook deleted"
|
// @success 202 "Webhook deleted"
|
||||||
// @failure 400
|
// @failure 400
|
||||||
|
|
|
@ -16,9 +16,8 @@ import (
|
||||||
|
|
||||||
// @summary Execute a webhook
|
// @summary Execute a webhook
|
||||||
// @description Acts on a passed in token UUID to restart the docker service
|
// @description Acts on a passed in token UUID to restart the docker service
|
||||||
|
// @description **Access policy**: public
|
||||||
// @tags webhooks
|
// @tags webhooks
|
||||||
// @accept json
|
|
||||||
// @produce json
|
|
||||||
// @param token path string true "Webhook token"
|
// @param token path string true "Webhook token"
|
||||||
// @success 202 "Webhook executed"
|
// @success 202 "Webhook executed"
|
||||||
// @failure 400
|
// @failure 400
|
||||||
|
|
|
@ -15,7 +15,7 @@ type webhookListOperationFilters struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
// @summary List webhooks
|
// @summary List webhooks
|
||||||
// @description
|
// @description **Access policy**: authenticated
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @tags webhooks
|
// @tags webhooks
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -18,7 +18,7 @@ import (
|
||||||
// @description If the nodeName query parameter is present, the request will be proxied to the underlying agent environment(endpoint).
|
// @description If the nodeName query parameter is present, the request will be proxied to the underlying agent environment(endpoint).
|
||||||
// @description If the nodeName query parameter is not specified, the request will be upgraded to the websocket protocol and
|
// @description If the nodeName query parameter is not specified, the request will be upgraded to the websocket protocol and
|
||||||
// @description an AttachStart operation HTTP request will be created and hijacked.
|
// @description an AttachStart operation HTTP request will be created and hijacked.
|
||||||
// @description Authentication and access is controlled via the mandatory token query parameter.
|
// @description **Access policy**: authenticated
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @tags websocket
|
// @tags websocket
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -26,7 +26,7 @@ type execStartOperationPayload struct {
|
||||||
// @description If the nodeName query parameter is present, the request will be proxied to the underlying agent environment(endpoint).
|
// @description If the nodeName query parameter is present, the request will be proxied to the underlying agent environment(endpoint).
|
||||||
// @description If the nodeName query parameter is not specified, the request will be upgraded to the websocket protocol and
|
// @description If the nodeName query parameter is not specified, the request will be upgraded to the websocket protocol and
|
||||||
// @description an ExecStart operation HTTP request will be created and hijacked.
|
// @description an ExecStart operation HTTP request will be created and hijacked.
|
||||||
// @description Authentication and access is controlled via the mandatory token query parameter.
|
// @**Access policy**: authenticated
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @tags websocket
|
// @tags websocket
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -19,7 +19,7 @@ import (
|
||||||
|
|
||||||
// @summary Execute a websocket on pod
|
// @summary Execute a websocket on pod
|
||||||
// @description The request will be upgraded to the websocket protocol.
|
// @description The request will be upgraded to the websocket protocol.
|
||||||
// @description Authentication and access is controlled via the mandatory token query parameter.
|
// @description **Access policy**: authenticated
|
||||||
// @security jwt
|
// @security jwt
|
||||||
// @tags websocket
|
// @tags websocket
|
||||||
// @accept json
|
// @accept json
|
||||||
|
|
|
@ -19,11 +19,10 @@ import (
|
||||||
// @produce json
|
// @produce json
|
||||||
// @param endpointId query int true "environment(endpoint) ID of the environment(endpoint) where the resource is located"
|
// @param endpointId query int true "environment(endpoint) ID of the environment(endpoint) where the resource is located"
|
||||||
// @param token query string true "JWT token used for authentication against this environment(endpoint)"
|
// @param token query string true "JWT token used for authentication against this environment(endpoint)"
|
||||||
// @success 200
|
// @success 200 "Success"
|
||||||
// @failure 400
|
// @failure 400 "Invalid request"
|
||||||
// @failure 403
|
// @failure 403 "Permission denied"
|
||||||
// @failure 404
|
// @failure 500 "Server error"
|
||||||
// @failure 500
|
|
||||||
// @router /websocket/kubernetes-shell [get]
|
// @router /websocket/kubernetes-shell [get]
|
||||||
func (handler *Handler) websocketShellPodExec(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
func (handler *Handler) websocketShellPodExec(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
endpointID, err := request.RetrieveNumericQueryParameter(r, "endpointId", false)
|
endpointID, err := request.RetrieveNumericQueryParameter(r, "endpointId", false)
|
||||||
|
|
Loading…
Reference in New Issue