forked from github-starred/komodo
* start 1.18.5 * prevent empty additional permission check (ie for new resources) * dev-2 * bump rust to 1.88 * tweaks * repo based stack commit happens from core repo cache rather than on server to simplify * clippy auto fix * clippy lints periphery * clippy fix komodo_client * dev-3 * emphasize ferret version pinning * bump svi with PR fix * dev-4 * webhook disabled early return * Fix missing alert types for whitelist * add "ScheduleRun" * fix status cache not cleaning on resource delete * dev-5 * forgot to pipe through poll in previous refactor * refetch given in ms * fix configure build extra args * reorder resource sync config * Implement ability to run actions at startup (#664) * Implement ability to run actions at startup * run post-startup actions after server is listening * startup use action query * fmt * Fix Google Login enabled message (#668) - it was showing "Github Login" instead of "Google Login" * Allow CIDR ranges in Allowed IPs (#666) * Allow CIDR ranges in Allowed IPs * Catch mixed IPv4/IPv6 mappings that are probably intended to match * forgiving vec * dev-6 * forgiving vec log. allowed ips docs * server stats UI: move current disk breakdown above charts * searchable container stats, toggle collaple container / disk sections * Add Clear repo cache method * fix execute usage docs * Komodo managed env-file should take precedence in all cases (ie come last in env file list) * tag include unused flag for future use * combine users page search * util backup / restore * refactor backup/restore duplication * cleanup restore * core image include util binary * dev-7 * back to LinesCodec * dev-8 * clean up * clean up logs * rename to komodo-util * dev-9 * enable_fance_toml * dev-10 enable fancy toml * add user agent to oidc requests (#701) Co-authored-by: eleith <online-github@eleith.com> * fmt * use database library * clippy lint * consolidate and standardize cli * dev-11 * dev-12 implement backup using cli * dev-13 logs * command variant fields need to be #[arg] * tweak cli * gen client * fix terminal reconnect issue * rename cli to `km` * tweaks for the cli logs * wait for enter on --yes empty println * fix --yes * dev-15 * bump deps * update croner to latest, use static parser * dev-16 * cli execute polls updates until complete before logging * remove repo cache mount * cli nice * /backup -> /backups * dev-17 config loading preserves CONFIG_PATHS precedence * update dockerfile default docker cli config keywords * dev-18 * support .kmignore * add ignores log * Implement automatic backup pruning, default 14 backups before prune * db copy / restore uses idempotent upsert * cli update variable - "km set var VAR value" * improve cli initial logs * time the executions * implement update for most resources * dev 20 * add update page * dev 21 support cli update link * dev-22 test the deploy * dev-23 use indexmap * install-cli.py * Frontend mobile fixes (#714) * Allow ResourcePageHeader items to wrap * Allow CardHeader items to wrap * Increase z-index of sticky TableHeader, fixes #690 * Remove fixed widths from ActionButton, let them flex more to fit more layouts * Make Section scroll overflow * Remove grid class from Tabs, seems to prevent them from overflowing at small sizes * deploy 1.18.5-dev-24 * auto version increment and deploy * cli: profiles support aliases and merge on top of Default (root) config * fix page set titles * rust 1.89 and improve config logs * skip serializing for proper merge * fix clippy lints re 1.89 * remove layouts overflow-x-scroll * deploy 1.18.5-dev-25 * 1.89 docker images not ready yet * km cfg -a (print all profiles) * include commit variables * skip serializing profiles when empty * skip serialize default db / log configs * km cfg --debug print mode * correct defaults for CLI and only can pass restore folder from cli arg * some more skip serialization * db restore / copy index optional * add runfile command aliases * remove second schedule updating loop, can causes some schedules to be missed * deploy 1.18.5-dev-26 * add log when target db indexing disabled * cli: user password reset, update user super admin * Add manual network interface configuration for multi-NIC Docker environments (#719) * Add iproute2 to debian-debs * feat: Add manual network interface configuration for multi-NIC support Complete implementation of manual interface configuration: - Add internet_interface config option - Implement manual gateway routing - Add NET_ADMIN capability requirement - Clean up codebase changes * fix: Update internet interface handling for multi-NIC support * refactor: Enhance error messages and logging in networking module * refactor: Simplify interface argument handling and improve logging in network configuration and cleanup * refactor(network): simplify startup integration and improve error handling - Move config access and error handling into network::configure_internet_gateway() - Simplify startup.rs to single function call without parameters - Remove redundant check_network_privileges() function - Improve error handling by checking actual command output instead of pre-validation - Better separation of concerns between startup and network modules Addresses feedback from PR discussion: https://github.com/moghtech/komodo/pull/719#discussion_r2261542921 * fix(config): update default internet interface setting Addresses feedback from PR discussion: https://github.com/moghtech/komodo/pull/719#discussion_r2261552279 * fix(config): remove custom default for internet interface in CoreConfig * move mod.rs -> network.rs Addresses feedback from PR discussion: https://github.com/moghtech/komodo/pull/719#discussion_r2261558332 * add internet interface example * docs(build-images): document multi-platform builds with Docker Buildx (#721) * docs(build-images): add multi-platform buildx guide to builders.md * docs(build-images): add multi-platform buildx guide and clarify platform selection in Komodo UI Extra Args field * move to 1.19.0 * core support reading from multiple config files * config support yaml * deploy 1.19.0-dev-1 * deploy 1.19.0-dev-2 * add default komodo cli config * better config merge with base * no need to panic if empty config paths * improve km --help * prog on cli docs * tweak cli docs * tweak doc * split the runfile commands * update docsite deps * km ps initial * km ls * list resource apis * km con inspect * deploy 1.19.0-dev-3 * fix: need serde default * dev-4 fix container parsing issue * tweak * use include-based file finding for much faster discovery * just move to standard config dir .config/komodo/komodo.cli.* * update fe w/ new contianer info minimal serialization * add links to table names * deploy 1.19.0-dev-5 * links in tables * backend for Action arguments * deploy 1.19.0-dev-6 * deploy 1.19.0-dev-7 * deploy 1.19.0-dev-8 * no space at front of KeyValue default args * webhook branch / body optional * The incoming arguments * deploy 1.19.0-dev-9 * con -> cn * add config -> cf alias * .kmignore * .peripheryinclude * outdated * optional links, configurable table format * table_format -> table_borders * get types * include docsite in yarn install * update runnables command in docs * tweak * improve km ls only show important stuff * Add BackupCoreDatabase * deploy 1.19.0-dev-10 * backup command needs "--yes" * deploy 1.19.0-dev-11 * update rustc 1.89.0 * cli tweak * try chef * Fix chef (after dependencies) * try other compile command * fix * fix comment * cleanup stats page * ensure database backup procedure * UI allow configure Backup Core Database in Procedures * procedure description * deploy 1.19.0-dev-12 * deploy 1.19.0-dev-13 * GlobalAutoUpdate * deploy 1.19.0-dev-14 * default tags and global auto update procedure * deploy 1.19.0-dev-15 * trim the default procedure descriptions * deploy 1.19.0-dev-16 * in "system" theme, also poll for updates to the theme based on time. * Add next run to Action / Procedure column * km ls support filter by templates * fix procedure toml serialization when params = {} * deploy 1.19.0-dev-17 * KOMODO_INIT_ADMIN_USERNAME * KOMODO_FIRST_SERVER_NAME * add server.config.external_address for use with links * deploy 1.19.0-dev-18 * improve auto prune * fix system theme auto update * deploy 1.19.0-dev-19 * rename auth/CreateLocalUser -> SignUpLocalUser. Add write/CreateLocalUser for in-ui initialization. * deploy 1.19.0-dev-20 * UI can handle multiple active logins * deploy 1.19.0-dev-21 * fix * add logout function * fix oauth redirect * fix multi user exchange token function * default external address * just Add * style account switcher * backup and restore docs * rework docsite file / sidebar structure, start auto update docs * auto update docs * tweak * fix doc links * only pull / update running stacks / deployments images * deploy 1.19.0-dev-22 * deploy 1.19.0-dev-23 * fix #737 * community docs * add BackupCoreDatabase link to docs * update ferret v2 update guide using komodo-cli * fix data table headers overlapping topbar * don't alert when deploying * CommitSync returns Update * deploy 1.19.0-dev-24 * trim the decoded branch * action uses file contents deserializer * deploy 1.19.0-dev-25 * remove Toml from action args format * clarify External Address purpose * Fix podman compatibility in `get_container_stats` (#739) * Add podman compability for querying stats Podman and docker stats differ in results in significant ways but this filter change they will output the same stats * syntax fix * feat(dashboard): display CPU, memory, and disk usage on server cards (#729) * feat: mini-stats-card: Expose Server CPU , Memory, Disk Usage to Dashboard View * comment: resolved * Feat: fix overflow card , DRY stats-mini, add unreachable mini stats * lint: fix * deploy 1.19.0-dev-26 * 1.19.0 * linux, macos container install * cli main config --------- Co-authored-by: Brian Bradley <brian.bradley.p@gmail.com> Co-authored-by: Daniel <daniel.barabasa@gmail.com> Co-authored-by: eleith <eleith@users.noreply.github.com> Co-authored-by: eleith <online-github@eleith.com> Co-authored-by: Sam Edwards <sam@samedwards.ca> Co-authored-by: Marcel Pfennig <82059270+MP-Tool@users.noreply.github.com> Co-authored-by: itsmesid <693151+arevindh@users.noreply.github.com> Co-authored-by: mbecker20 <max@mogh.tech> Co-authored-by: Rhyn <Rhyn@users.noreply.github.com> Co-authored-by: Anh Nguyen <tuananh131001@gmail.com>
445 lines
12 KiB
Rust
445 lines
12 KiB
Rust
use std::str::FromStr;
|
|
|
|
use anyhow::{Context, anyhow};
|
|
use database::mungos::{
|
|
by_id::{find_one_by_id, update_one_by_id},
|
|
mongodb::{
|
|
bson::{Document, doc, oid::ObjectId, to_bson},
|
|
options::UpdateOptions,
|
|
},
|
|
};
|
|
use komodo_client::{
|
|
api::write::*,
|
|
entities::{
|
|
ResourceTarget, ResourceTargetVariant,
|
|
permission::{UserTarget, UserTargetVariant},
|
|
},
|
|
};
|
|
use resolver_api::Resolve;
|
|
|
|
use crate::{helpers::query::get_user, state::db_client};
|
|
|
|
use super::WriteArgs;
|
|
|
|
impl Resolve<WriteArgs> for UpdateUserAdmin {
|
|
#[instrument(name = "UpdateUserAdmin", skip(super_admin))]
|
|
async fn resolve(
|
|
self,
|
|
WriteArgs { user: super_admin }: &WriteArgs,
|
|
) -> serror::Result<UpdateUserAdminResponse> {
|
|
if !super_admin.super_admin {
|
|
return Err(
|
|
anyhow!("Only super admins can call this method.").into(),
|
|
);
|
|
}
|
|
let user = find_one_by_id(&db_client().users, &self.user_id)
|
|
.await
|
|
.context("failed to query mongo for user")?
|
|
.context("did not find user with given id")?;
|
|
|
|
if !user.enabled {
|
|
return Err(
|
|
anyhow!("User is disabled. Enable user first.").into(),
|
|
);
|
|
}
|
|
|
|
if user.super_admin {
|
|
return Err(anyhow!("Cannot update other super admins").into());
|
|
}
|
|
|
|
update_one_by_id(
|
|
&db_client().users,
|
|
&self.user_id,
|
|
doc! { "$set": { "admin": self.admin } },
|
|
None,
|
|
)
|
|
.await?;
|
|
|
|
Ok(UpdateUserAdminResponse {})
|
|
}
|
|
}
|
|
|
|
impl Resolve<WriteArgs> for UpdateUserBasePermissions {
|
|
#[instrument(name = "UpdateUserBasePermissions", skip(admin))]
|
|
async fn resolve(
|
|
self,
|
|
WriteArgs { user: admin }: &WriteArgs,
|
|
) -> serror::Result<UpdateUserBasePermissionsResponse> {
|
|
if !admin.admin {
|
|
return Err(anyhow!("this method is admin only").into());
|
|
}
|
|
|
|
let UpdateUserBasePermissions {
|
|
user_id,
|
|
enabled,
|
|
create_servers,
|
|
create_builds,
|
|
} = self;
|
|
|
|
let user = find_one_by_id(&db_client().users, &user_id)
|
|
.await
|
|
.context("failed to query mongo for user")?
|
|
.context("did not find user with given id")?;
|
|
if user.super_admin {
|
|
return Err(
|
|
anyhow!(
|
|
"Cannot use this method to update super admins permissions"
|
|
)
|
|
.into(),
|
|
);
|
|
}
|
|
if user.admin && !admin.super_admin {
|
|
return Err(anyhow!(
|
|
"Only super admins can use this method to update other admins permissions"
|
|
).into());
|
|
}
|
|
let mut update_doc = Document::new();
|
|
if let Some(enabled) = enabled {
|
|
update_doc.insert("enabled", enabled);
|
|
}
|
|
if let Some(create_servers) = create_servers {
|
|
update_doc.insert("create_server_permissions", create_servers);
|
|
}
|
|
if let Some(create_builds) = create_builds {
|
|
update_doc.insert("create_build_permissions", create_builds);
|
|
}
|
|
|
|
update_one_by_id(
|
|
&db_client().users,
|
|
&user_id,
|
|
database::mungos::update::Update::Set(update_doc),
|
|
None,
|
|
)
|
|
.await?;
|
|
|
|
Ok(UpdateUserBasePermissionsResponse {})
|
|
}
|
|
}
|
|
|
|
impl Resolve<WriteArgs> for UpdatePermissionOnResourceType {
|
|
#[instrument(name = "UpdatePermissionOnResourceType", skip(admin))]
|
|
async fn resolve(
|
|
self,
|
|
WriteArgs { user: admin }: &WriteArgs,
|
|
) -> serror::Result<UpdatePermissionOnResourceTypeResponse> {
|
|
if !admin.admin {
|
|
return Err(anyhow!("this method is admin only").into());
|
|
}
|
|
|
|
let Self {
|
|
user_target,
|
|
resource_type,
|
|
permission,
|
|
} = self;
|
|
|
|
// Some extra checks if user target is an actual User
|
|
if let UserTarget::User(user_id) = &user_target {
|
|
let user = get_user(user_id).await?;
|
|
if user.admin {
|
|
return Err(
|
|
anyhow!(
|
|
"cannot use this method to update other admins permissions"
|
|
)
|
|
.into(),
|
|
);
|
|
}
|
|
if !user.enabled {
|
|
return Err(anyhow!("user not enabled").into());
|
|
}
|
|
}
|
|
|
|
let (user_target_variant, user_target_id) =
|
|
extract_user_target_with_validation(&user_target).await?;
|
|
|
|
let id = ObjectId::from_str(&user_target_id)
|
|
.context("id is not ObjectId")?;
|
|
let filter = doc! { "_id": id };
|
|
let field = format!("all.{resource_type}");
|
|
let set =
|
|
to_bson(&permission).context("permission is not Bson")?;
|
|
let update = doc! { "$set": { &field: &set } };
|
|
|
|
match user_target_variant {
|
|
UserTargetVariant::User => {
|
|
db_client()
|
|
.users
|
|
.update_one(filter, update)
|
|
.await
|
|
.with_context(|| {
|
|
format!("failed to set {field}: {set} on db")
|
|
})?;
|
|
}
|
|
UserTargetVariant::UserGroup => {
|
|
db_client()
|
|
.user_groups
|
|
.update_one(filter, update)
|
|
.await
|
|
.with_context(|| {
|
|
format!("failed to set {field}: {set} on db")
|
|
})?;
|
|
}
|
|
}
|
|
|
|
Ok(UpdatePermissionOnResourceTypeResponse {})
|
|
}
|
|
}
|
|
|
|
impl Resolve<WriteArgs> for UpdatePermissionOnTarget {
|
|
#[instrument(name = "UpdatePermissionOnTarget", skip(admin))]
|
|
async fn resolve(
|
|
self,
|
|
WriteArgs { user: admin }: &WriteArgs,
|
|
) -> serror::Result<UpdatePermissionOnTargetResponse> {
|
|
if !admin.admin {
|
|
return Err(anyhow!("this method is admin only").into());
|
|
}
|
|
|
|
let UpdatePermissionOnTarget {
|
|
user_target,
|
|
resource_target,
|
|
permission,
|
|
} = self;
|
|
|
|
// Some extra checks relevant if user target is an actual User
|
|
if let UserTarget::User(user_id) = &user_target {
|
|
let user = get_user(user_id).await?;
|
|
if !user.enabled {
|
|
return Err(anyhow!("user not enabled").into());
|
|
}
|
|
if user.admin {
|
|
return Err(
|
|
anyhow!(
|
|
"cannot use this method to update other admins permissions"
|
|
)
|
|
.into(),
|
|
);
|
|
}
|
|
}
|
|
|
|
let (user_target_variant, user_target_id) =
|
|
extract_user_target_with_validation(&user_target).await?;
|
|
let (resource_variant, resource_id) =
|
|
extract_resource_target_with_validation(&resource_target)
|
|
.await?;
|
|
|
|
let (user_target_variant, resource_variant) =
|
|
(user_target_variant.as_ref(), resource_variant.as_ref());
|
|
|
|
let specific = to_bson(&permission.specific)
|
|
.context("permission.specific is not valid Bson")?;
|
|
|
|
db_client()
|
|
.permissions
|
|
.update_one(
|
|
doc! {
|
|
"user_target.type": user_target_variant,
|
|
"user_target.id": &user_target_id,
|
|
"resource_target.type": resource_variant,
|
|
"resource_target.id": &resource_id
|
|
},
|
|
doc! {
|
|
"$set": {
|
|
"user_target.type": user_target_variant,
|
|
"user_target.id": user_target_id,
|
|
"resource_target.type": resource_variant,
|
|
"resource_target.id": resource_id,
|
|
"level": permission.level.as_ref(),
|
|
"specific": specific
|
|
}
|
|
},
|
|
)
|
|
.with_options(UpdateOptions::builder().upsert(true).build())
|
|
.await?;
|
|
|
|
Ok(UpdatePermissionOnTargetResponse {})
|
|
}
|
|
}
|
|
|
|
/// checks if inner id is actually a `name`, and replaces it with id if so.
|
|
async fn extract_user_target_with_validation(
|
|
user_target: &UserTarget,
|
|
) -> serror::Result<(UserTargetVariant, String)> {
|
|
match user_target {
|
|
UserTarget::User(ident) => {
|
|
let filter = match ObjectId::from_str(ident) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "username": ident },
|
|
};
|
|
let id = db_client()
|
|
.users
|
|
.find_one(filter)
|
|
.await
|
|
.context("failed to query db for users")?
|
|
.context("no matching user found")?
|
|
.id;
|
|
Ok((UserTargetVariant::User, id))
|
|
}
|
|
UserTarget::UserGroup(ident) => {
|
|
let filter = match ObjectId::from_str(ident) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "name": ident },
|
|
};
|
|
let id = db_client()
|
|
.user_groups
|
|
.find_one(filter)
|
|
.await
|
|
.context("failed to query db for user_groups")?
|
|
.context("no matching user_group found")?
|
|
.id;
|
|
Ok((UserTargetVariant::UserGroup, id))
|
|
}
|
|
}
|
|
}
|
|
|
|
/// checks if inner id is actually a `name`, and replaces it with id if so.
|
|
async fn extract_resource_target_with_validation(
|
|
resource_target: &ResourceTarget,
|
|
) -> serror::Result<(ResourceTargetVariant, String)> {
|
|
match resource_target {
|
|
ResourceTarget::System(_) => {
|
|
let res = resource_target.extract_variant_id();
|
|
Ok((res.0, res.1.clone()))
|
|
}
|
|
ResourceTarget::Build(ident) => {
|
|
let filter = match ObjectId::from_str(ident) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "name": ident },
|
|
};
|
|
let id = db_client()
|
|
.builds
|
|
.find_one(filter)
|
|
.await
|
|
.context("failed to query db for builds")?
|
|
.context("no matching build found")?
|
|
.id;
|
|
Ok((ResourceTargetVariant::Build, id))
|
|
}
|
|
ResourceTarget::Builder(ident) => {
|
|
let filter = match ObjectId::from_str(ident) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "name": ident },
|
|
};
|
|
let id = db_client()
|
|
.builders
|
|
.find_one(filter)
|
|
.await
|
|
.context("failed to query db for builders")?
|
|
.context("no matching builder found")?
|
|
.id;
|
|
Ok((ResourceTargetVariant::Builder, id))
|
|
}
|
|
ResourceTarget::Deployment(ident) => {
|
|
let filter = match ObjectId::from_str(ident) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "name": ident },
|
|
};
|
|
let id = db_client()
|
|
.deployments
|
|
.find_one(filter)
|
|
.await
|
|
.context("failed to query db for deployments")?
|
|
.context("no matching deployment found")?
|
|
.id;
|
|
Ok((ResourceTargetVariant::Deployment, id))
|
|
}
|
|
ResourceTarget::Server(ident) => {
|
|
let filter = match ObjectId::from_str(ident) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "name": ident },
|
|
};
|
|
let id = db_client()
|
|
.servers
|
|
.find_one(filter)
|
|
.await
|
|
.context("failed to query db for servers")?
|
|
.context("no matching server found")?
|
|
.id;
|
|
Ok((ResourceTargetVariant::Server, id))
|
|
}
|
|
ResourceTarget::Repo(ident) => {
|
|
let filter = match ObjectId::from_str(ident) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "name": ident },
|
|
};
|
|
let id = db_client()
|
|
.repos
|
|
.find_one(filter)
|
|
.await
|
|
.context("failed to query db for repos")?
|
|
.context("no matching repo found")?
|
|
.id;
|
|
Ok((ResourceTargetVariant::Repo, id))
|
|
}
|
|
ResourceTarget::Alerter(ident) => {
|
|
let filter = match ObjectId::from_str(ident) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "name": ident },
|
|
};
|
|
let id = db_client()
|
|
.alerters
|
|
.find_one(filter)
|
|
.await
|
|
.context("failed to query db for alerters")?
|
|
.context("no matching alerter found")?
|
|
.id;
|
|
Ok((ResourceTargetVariant::Alerter, id))
|
|
}
|
|
ResourceTarget::Procedure(ident) => {
|
|
let filter = match ObjectId::from_str(ident) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "name": ident },
|
|
};
|
|
let id = db_client()
|
|
.procedures
|
|
.find_one(filter)
|
|
.await
|
|
.context("failed to query db for procedures")?
|
|
.context("no matching procedure found")?
|
|
.id;
|
|
Ok((ResourceTargetVariant::Procedure, id))
|
|
}
|
|
ResourceTarget::Action(ident) => {
|
|
let filter = match ObjectId::from_str(ident) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "name": ident },
|
|
};
|
|
let id = db_client()
|
|
.actions
|
|
.find_one(filter)
|
|
.await
|
|
.context("failed to query db for actions")?
|
|
.context("no matching action found")?
|
|
.id;
|
|
Ok((ResourceTargetVariant::Action, id))
|
|
}
|
|
ResourceTarget::ResourceSync(ident) => {
|
|
let filter = match ObjectId::from_str(ident) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "name": ident },
|
|
};
|
|
let id = db_client()
|
|
.resource_syncs
|
|
.find_one(filter)
|
|
.await
|
|
.context("failed to query db for resource syncs")?
|
|
.context("no matching resource sync found")?
|
|
.id;
|
|
Ok((ResourceTargetVariant::ResourceSync, id))
|
|
}
|
|
ResourceTarget::Stack(ident) => {
|
|
let filter = match ObjectId::from_str(ident) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "name": ident },
|
|
};
|
|
let id = db_client()
|
|
.stacks
|
|
.find_one(filter)
|
|
.await
|
|
.context("failed to query db for stacks")?
|
|
.context("no matching stack found")?
|
|
.id;
|
|
Ok((ResourceTargetVariant::Stack, id))
|
|
}
|
|
}
|
|
}
|