mirror of https://github.com/portainer/portainer
286 lines
7.6 KiB
Go
286 lines
7.6 KiB
Go
package migrator
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
portainer "github.com/portainer/portainer/api"
|
|
"github.com/portainer/portainer/api/dataservices/errors"
|
|
"github.com/portainer/portainer/api/internal/endpointutils"
|
|
snapshotutils "github.com/portainer/portainer/api/internal/snapshot"
|
|
|
|
"github.com/docker/docker/api/types/volume"
|
|
"github.com/rs/zerolog/log"
|
|
)
|
|
|
|
func (m *Migrator) migrateDBVersionToDB32() error {
|
|
err := m.updateRegistriesToDB32()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = m.updateDockerhubToDB32()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := m.updateVolumeResourceControlToDB32(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := m.kubeconfigExpiryToDB32(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := m.helmRepositoryURLToDB32(); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Migrator) updateRegistriesToDB32() error {
|
|
log.Info().Msg("updating registries")
|
|
|
|
registries, err := m.registryService.Registries()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
endpoints, err := m.endpointService.Endpoints()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, registry := range registries {
|
|
|
|
registry.RegistryAccesses = portainer.RegistryAccesses{}
|
|
|
|
for _, endpoint := range endpoints {
|
|
|
|
filteredUserAccessPolicies := portainer.UserAccessPolicies{}
|
|
for userId, registryPolicy := range registry.UserAccessPolicies {
|
|
if _, found := endpoint.UserAccessPolicies[userId]; found {
|
|
filteredUserAccessPolicies[userId] = registryPolicy
|
|
}
|
|
}
|
|
|
|
filteredTeamAccessPolicies := portainer.TeamAccessPolicies{}
|
|
for teamId, registryPolicy := range registry.TeamAccessPolicies {
|
|
if _, found := endpoint.TeamAccessPolicies[teamId]; found {
|
|
filteredTeamAccessPolicies[teamId] = registryPolicy
|
|
}
|
|
}
|
|
|
|
registry.RegistryAccesses[endpoint.ID] = portainer.RegistryAccessPolicies{
|
|
UserAccessPolicies: filteredUserAccessPolicies,
|
|
TeamAccessPolicies: filteredTeamAccessPolicies,
|
|
Namespaces: []string{},
|
|
}
|
|
}
|
|
m.registryService.UpdateRegistry(registry.ID, ®istry)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *Migrator) updateDockerhubToDB32() error {
|
|
log.Info().Msg("updating dockerhub")
|
|
|
|
dockerhub, err := m.dockerhubService.DockerHub()
|
|
if err == errors.ErrObjectNotFound {
|
|
return nil
|
|
} else if err != nil {
|
|
return err
|
|
}
|
|
|
|
if !dockerhub.Authentication {
|
|
return nil
|
|
}
|
|
|
|
registry := &portainer.Registry{
|
|
Type: portainer.DockerHubRegistry,
|
|
Name: "Dockerhub (authenticated - migrated)",
|
|
URL: "docker.io",
|
|
Authentication: true,
|
|
Username: dockerhub.Username,
|
|
Password: dockerhub.Password,
|
|
RegistryAccesses: portainer.RegistryAccesses{},
|
|
}
|
|
|
|
// The following code will make this function idempotent.
|
|
// i.e. if run again, it will not change the data. It will ensure that
|
|
// we only have one migrated registry entry. Duplicates will be removed
|
|
// if they exist and which has been happening due to earlier migration bugs
|
|
migrated := false
|
|
registries, _ := m.registryService.Registries()
|
|
for _, r := range registries {
|
|
if r.Type == registry.Type &&
|
|
r.Name == registry.Name &&
|
|
r.URL == registry.URL &&
|
|
r.Authentication == registry.Authentication {
|
|
|
|
if !migrated {
|
|
// keep this one entry
|
|
migrated = true
|
|
} else {
|
|
// delete subsequent duplicates
|
|
m.registryService.DeleteRegistry(portainer.RegistryID(r.ID))
|
|
}
|
|
}
|
|
}
|
|
|
|
if migrated {
|
|
return nil
|
|
}
|
|
|
|
endpoints, err := m.endpointService.Endpoints()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, endpoint := range endpoints {
|
|
|
|
if endpoint.Type != portainer.KubernetesLocalEnvironment &&
|
|
endpoint.Type != portainer.AgentOnKubernetesEnvironment &&
|
|
endpoint.Type != portainer.EdgeAgentOnKubernetesEnvironment {
|
|
|
|
userAccessPolicies := portainer.UserAccessPolicies{}
|
|
for userId := range endpoint.UserAccessPolicies {
|
|
if _, found := endpoint.UserAccessPolicies[userId]; found {
|
|
userAccessPolicies[userId] = portainer.AccessPolicy{
|
|
RoleID: 0,
|
|
}
|
|
}
|
|
}
|
|
|
|
teamAccessPolicies := portainer.TeamAccessPolicies{}
|
|
for teamId := range endpoint.TeamAccessPolicies {
|
|
if _, found := endpoint.TeamAccessPolicies[teamId]; found {
|
|
teamAccessPolicies[teamId] = portainer.AccessPolicy{
|
|
RoleID: 0,
|
|
}
|
|
}
|
|
}
|
|
|
|
registry.RegistryAccesses[endpoint.ID] = portainer.RegistryAccessPolicies{
|
|
UserAccessPolicies: userAccessPolicies,
|
|
TeamAccessPolicies: teamAccessPolicies,
|
|
Namespaces: []string{},
|
|
}
|
|
}
|
|
}
|
|
|
|
return m.registryService.Create(registry)
|
|
}
|
|
|
|
func (m *Migrator) updateVolumeResourceControlToDB32() error {
|
|
log.Info().Msg("updating resource controls")
|
|
|
|
endpoints, err := m.endpointService.Endpoints()
|
|
if err != nil {
|
|
return fmt.Errorf("failed fetching environments: %w", err)
|
|
}
|
|
|
|
resourceControls, err := m.resourceControlService.ResourceControls()
|
|
if err != nil {
|
|
return fmt.Errorf("failed fetching resource controls: %w", err)
|
|
}
|
|
|
|
toUpdate := map[portainer.ResourceControlID]string{}
|
|
volumeResourceControls := map[string]*portainer.ResourceControl{}
|
|
|
|
for i := range resourceControls {
|
|
resourceControl := resourceControls[i]
|
|
if resourceControl.Type == portainer.VolumeResourceControl {
|
|
volumeResourceControls[resourceControl.ResourceID] = &resourceControl
|
|
}
|
|
}
|
|
|
|
for _, endpoint := range endpoints {
|
|
if !endpointutils.IsDockerEndpoint(&endpoint) {
|
|
continue
|
|
}
|
|
|
|
totalSnapshots := len(endpoint.Snapshots)
|
|
if totalSnapshots == 0 {
|
|
log.Debug().Msg("no snapshot found")
|
|
continue
|
|
}
|
|
|
|
snapshot := endpoint.Snapshots[totalSnapshots-1]
|
|
|
|
endpointDockerID, err := snapshotutils.FetchDockerID(snapshot)
|
|
if err != nil {
|
|
log.Warn().Err(err).Msg("failed fetching environment docker id")
|
|
continue
|
|
}
|
|
|
|
volumesData := snapshot.SnapshotRaw.Volumes
|
|
if volumesData.Volumes == nil {
|
|
log.Debug().Msg("no volume data found")
|
|
continue
|
|
}
|
|
|
|
findResourcesToUpdateForDB32(endpointDockerID, volumesData, toUpdate, volumeResourceControls)
|
|
|
|
}
|
|
|
|
for _, resourceControl := range volumeResourceControls {
|
|
if newResourceID, ok := toUpdate[resourceControl.ID]; ok {
|
|
resourceControl.ResourceID = newResourceID
|
|
|
|
err := m.resourceControlService.UpdateResourceControl(resourceControl.ID, resourceControl)
|
|
if err != nil {
|
|
return fmt.Errorf("failed updating resource control %d: %w", resourceControl.ID, err)
|
|
}
|
|
} else {
|
|
err := m.resourceControlService.DeleteResourceControl(resourceControl.ID)
|
|
if err != nil {
|
|
return fmt.Errorf("failed deleting resource control %d: %w", resourceControl.ID, err)
|
|
}
|
|
|
|
log.Debug().Str("resource_id", resourceControl.ResourceID).Msg("legacy resource control has been deleted")
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func findResourcesToUpdateForDB32(dockerID string, volumesData volume.VolumeListOKBody, toUpdate map[portainer.ResourceControlID]string, volumeResourceControls map[string]*portainer.ResourceControl) {
|
|
volumes := volumesData.Volumes
|
|
for _, volume := range volumes {
|
|
volumeName := volume.Name
|
|
createTime := volume.CreatedAt
|
|
|
|
oldResourceID := fmt.Sprintf("%s%s", volumeName, createTime)
|
|
resourceControl, ok := volumeResourceControls[oldResourceID]
|
|
|
|
if ok {
|
|
toUpdate[resourceControl.ID] = fmt.Sprintf("%s_%s", volumeName, dockerID)
|
|
}
|
|
}
|
|
}
|
|
|
|
func (m *Migrator) kubeconfigExpiryToDB32() error {
|
|
log.Info().Msg("updating kubeconfig expiry")
|
|
|
|
settings, err := m.settingsService.Settings()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
settings.KubeconfigExpiry = portainer.DefaultKubeconfigExpiry
|
|
return m.settingsService.UpdateSettings(settings)
|
|
}
|
|
|
|
func (m *Migrator) helmRepositoryURLToDB32() error {
|
|
log.Info().Msg("setting default helm repository URL")
|
|
|
|
settings, err := m.settingsService.Settings()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
settings.HelmRepositoryURL = portainer.DefaultHelmRepositoryURL
|
|
return m.settingsService.UpdateSettings(settings)
|
|
}
|