mirror of https://github.com/portainer/portainer
108 lines
3.5 KiB
Go
108 lines
3.5 KiB
Go
package endpointgroups
|
|
|
|
import (
|
|
"errors"
|
|
"net/http"
|
|
|
|
"github.com/asaskevich/govalidator"
|
|
httperror "github.com/portainer/libhttp/error"
|
|
"github.com/portainer/libhttp/request"
|
|
"github.com/portainer/libhttp/response"
|
|
portainer "github.com/portainer/portainer/api"
|
|
)
|
|
|
|
type endpointGroupCreatePayload struct {
|
|
// Endpoint group name
|
|
Name string `validate:"required" example:"my-endpoint-group"`
|
|
// Endpoint group description
|
|
Description string `example:"description"`
|
|
// List of endpoint identifiers that will be part of this group
|
|
AssociatedEndpoints []portainer.EndpointID `example:"1,3"`
|
|
// List of tag identifiers to which this endpoint group is associated
|
|
TagIDs []portainer.TagID `example:"1,2"`
|
|
}
|
|
|
|
func (payload *endpointGroupCreatePayload) Validate(r *http.Request) error {
|
|
if govalidator.IsNull(payload.Name) {
|
|
return errors.New("Invalid endpoint group name")
|
|
}
|
|
if payload.TagIDs == nil {
|
|
payload.TagIDs = []portainer.TagID{}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// @summary Create an Endpoint Group
|
|
// @description Create a new endpoint group.
|
|
// @description **Access policy**: administrator
|
|
// @tags endpoint_groups
|
|
// @security jwt
|
|
// @accept json
|
|
// @produce json
|
|
// @param body body endpointGroupCreatePayload true "Endpoint Group details"
|
|
// @success 200 {object} portainer.EndpointGroup "Success"
|
|
// @failure 400 "Invalid request"
|
|
// @failure 500 "Server error"
|
|
// @router /endpoint_groups [post]
|
|
func (handler *Handler) endpointGroupCreate(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
|
var payload endpointGroupCreatePayload
|
|
err := request.DecodeAndValidateJSONPayload(r, &payload)
|
|
if err != nil {
|
|
return &httperror.HandlerError{http.StatusBadRequest, "Invalid request payload", err}
|
|
}
|
|
|
|
endpointGroup := &portainer.EndpointGroup{
|
|
Name: payload.Name,
|
|
Description: payload.Description,
|
|
UserAccessPolicies: portainer.UserAccessPolicies{},
|
|
TeamAccessPolicies: portainer.TeamAccessPolicies{},
|
|
TagIDs: payload.TagIDs,
|
|
}
|
|
|
|
err = handler.DataStore.EndpointGroup().CreateEndpointGroup(endpointGroup)
|
|
if err != nil {
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to persist the endpoint group inside the database", err}
|
|
}
|
|
|
|
endpoints, err := handler.DataStore.Endpoint().Endpoints()
|
|
if err != nil {
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to retrieve endpoints from the database", err}
|
|
}
|
|
|
|
for _, id := range payload.AssociatedEndpoints {
|
|
for _, endpoint := range endpoints {
|
|
if endpoint.ID == id {
|
|
endpoint.GroupID = endpointGroup.ID
|
|
|
|
err := handler.DataStore.Endpoint().UpdateEndpoint(endpoint.ID, &endpoint)
|
|
if err != nil {
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to update endpoint", err}
|
|
}
|
|
|
|
err = handler.updateEndpointRelations(&endpoint, endpointGroup)
|
|
if err != nil {
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to persist endpoint relations changes inside the database", err}
|
|
}
|
|
|
|
break
|
|
}
|
|
}
|
|
}
|
|
|
|
for _, tagID := range endpointGroup.TagIDs {
|
|
tag, err := handler.DataStore.Tag().Tag(tagID)
|
|
if err != nil {
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to retrieve tag from the database", err}
|
|
}
|
|
|
|
tag.EndpointGroups[endpointGroup.ID] = true
|
|
|
|
err = handler.DataStore.Tag().UpdateTag(tagID, tag)
|
|
if err != nil {
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to persist tag changes inside the database", err}
|
|
}
|
|
}
|
|
|
|
return response.JSON(w, endpointGroup)
|
|
}
|