mirror of https://github.com/portainer/portainer
64 lines
2.1 KiB
Go
64 lines
2.1 KiB
Go
package upload
|
|
|
|
import (
|
|
"net/http"
|
|
|
|
httperror "github.com/portainer/libhttp/error"
|
|
"github.com/portainer/libhttp/request"
|
|
"github.com/portainer/libhttp/response"
|
|
portainer "github.com/portainer/portainer/api"
|
|
"github.com/portainer/portainer/api/filesystem"
|
|
)
|
|
|
|
// @id UploadTLS
|
|
// @summary Upload TLS files
|
|
// @description Use this environment(endpoint) to upload TLS files.
|
|
// @description **Access policy**: administrator
|
|
// @tags upload
|
|
// @security ApiKeyAuth
|
|
// @security jwt
|
|
// @accept multipart/form-data
|
|
// @produce json
|
|
// @param certificate path string true "TLS file type. Valid values are 'ca', 'cert' or 'key'." Enums(ca,cert,key)
|
|
// @param folder formData string true "Folder where the TLS file will be stored. Will be created if not existing"
|
|
// @param file formData file true "The file to upload"
|
|
// @success 204 "Success"
|
|
// @failure 400 "Invalid request"
|
|
// @failure 500 "Server error"
|
|
// @router /upload/tls/{certificate} [post]
|
|
func (handler *Handler) uploadTLS(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
|
certificate, err := request.RetrieveRouteVariableValue(r, "certificate")
|
|
if err != nil {
|
|
return httperror.BadRequest("Invalid certificate route variable", err)
|
|
}
|
|
|
|
folder, err := request.RetrieveMultiPartFormValue(r, "folder", false)
|
|
if err != nil {
|
|
return httperror.BadRequest("Invalid query parameter: folder", err)
|
|
}
|
|
|
|
file, _, err := request.RetrieveMultiPartFormFile(r, "file")
|
|
if err != nil {
|
|
return httperror.BadRequest("Invalid certificate file. Ensure that the certificate file is uploaded correctly", err)
|
|
}
|
|
|
|
var fileType portainer.TLSFileType
|
|
switch certificate {
|
|
case "ca":
|
|
fileType = portainer.TLSFileCA
|
|
case "cert":
|
|
fileType = portainer.TLSFileCert
|
|
case "key":
|
|
fileType = portainer.TLSFileKey
|
|
default:
|
|
return httperror.BadRequest("Invalid certificate route value. Value must be one of: ca, cert or key", filesystem.ErrUndefinedTLSFileType)
|
|
}
|
|
|
|
_, err = handler.FileService.StoreTLSFileFromBytes(folder, fileType, file)
|
|
if err != nil {
|
|
return httperror.InternalServerError("Unable to persist certificate file on disk", err)
|
|
}
|
|
|
|
return response.Empty(w)
|
|
}
|