forked from github-starred/komodo
* start 1.19.4 * deploy 1.19.4-dev-1 * try smaller binaries with cargo strip * deploy 1.19.4-dev-2 * smaller binaries with cargo strip * Fix Submit Dialog Button Behavior with 500 Errors on Duplicate Names (#819) * Implement enhanced error handling and messaging for resource creation * Implement improved error handling for resource creation across alerter, build, and sync * Implement error handling improvements for resource copying and validation feedback * Adjust error handling for resource creation to distinguish validation errors from unexpected system errors * Refactor resource creation error handling by removing redundant match statements and simplifying the error propagation in multiple API modules. * fmt * bump indexmap * fix account selector showing empty when account no longer found * clean up theme logic, ensure monaco and others get up to date current theme * enforce disable_non_admin_create for tags. Clean up status code responses * update server cache concurrency controller * deploy 1.19.4-dev-3 * Allow signing in by pressing enter (#830) * Improve dialog overflow handling to prevent clipping of content (#828) * Add Email notification entry to community.md (#824) * Add clickable file path to show/hide file contents in StackInfo (#827) * add clickable file path to show/hide file contents in StackInfo Also added CopyButton due to the new functionality making the file path not selectable. * Move clicking interaction to CardHeader * Avoid sync edge cases of having toggle show function capturing showContents from outside Co-authored-by: Maxwell Becker <49575486+mbecker20@users.noreply.github.com> * Format previous change * Add `default_show_contents` to `handleToggleShow` --------- Co-authored-by: Maxwell Becker <49575486+mbecker20@users.noreply.github.com> * deploy 1.19.4-dev-4 * avoid stake info ShowHideButton double toggle * Allow multiple simultaneous Action runs for use with Args * deploy 1.19.4-dev-5 * feat: persist all table sorting states including unsorted (#832) - Always save sorting state to localStorage, even when empty/unsorted - Fixes issue where 'unsorted' state was not persisted across page reloads - Ensures consistent and predictable sorting behavior for all DataTable components * autofocus on login username field (#837) * Fix unnecessary auth queries flooding console on login page (#842) * Refactor authentication error handling to use serror::Result and status codes * Enable user query only when JWT is present * Enable query execution in useRead only if JWT is present * Revert backend auth changes - keep PR focused on frontend only * Fix unnecessary API queries to unreachable servers flooding console (#843) * Implement server availability checks in various components * Refactor server availability check to ensure only healthy servers are identified * cargo fmt * fmt * Auth error handling with status codes (#841) * Refactor authentication error handling to use serror::Result and status codes * Refactor error messages * Refactor authentication error handling to include status codes and improve error messages * clean up * clean * fmt * invalid user id also UNAUTHORIZED * deploy 1.19.4-dev-6 * deploy 1.19.4-dev-7 --------- Co-authored-by: Marcel Pfennig <82059270+MP-Tool@users.noreply.github.com> Co-authored-by: jack <45038833+jackra1n@users.noreply.github.com> Co-authored-by: Guten <ywzhaifei@gmail.com> Co-authored-by: Paulo Roberto Albuquerque <paulora2405@gmail.com> Co-authored-by: Lorenzo Farnararo <2814802+baldarn@users.noreply.github.com>
199 lines
4.6 KiB
Rust
199 lines
4.6 KiB
Rust
use anyhow::Context;
|
|
use formatting::format_serror;
|
|
use komodo_client::{
|
|
api::write::*,
|
|
entities::{
|
|
NoData, Operation,
|
|
permission::PermissionLevel,
|
|
server::Server,
|
|
to_docker_compatible_name,
|
|
update::{Update, UpdateStatus},
|
|
},
|
|
};
|
|
use periphery_client::api;
|
|
use resolver_api::Resolve;
|
|
|
|
use crate::{
|
|
helpers::{
|
|
periphery_client,
|
|
update::{add_update, make_update, update_update},
|
|
},
|
|
permission::get_check_permissions,
|
|
resource,
|
|
};
|
|
|
|
use super::WriteArgs;
|
|
|
|
impl Resolve<WriteArgs> for CreateServer {
|
|
#[instrument(name = "CreateServer", skip(user))]
|
|
async fn resolve(
|
|
self,
|
|
WriteArgs { user }: &WriteArgs,
|
|
) -> serror::Result<Server> {
|
|
resource::create::<Server>(&self.name, self.config, user).await
|
|
}
|
|
}
|
|
|
|
impl Resolve<WriteArgs> for CopyServer {
|
|
#[instrument(name = "CopyServer", skip(user))]
|
|
async fn resolve(
|
|
self,
|
|
WriteArgs { user }: &WriteArgs,
|
|
) -> serror::Result<Server> {
|
|
let Server { config, .. } = get_check_permissions::<Server>(
|
|
&self.id,
|
|
user,
|
|
PermissionLevel::Read.into(),
|
|
)
|
|
.await?;
|
|
|
|
resource::create::<Server>(&self.name, config.into(), user).await
|
|
}
|
|
}
|
|
|
|
impl Resolve<WriteArgs> for DeleteServer {
|
|
#[instrument(name = "DeleteServer", skip(args))]
|
|
async fn resolve(self, args: &WriteArgs) -> serror::Result<Server> {
|
|
Ok(resource::delete::<Server>(&self.id, args).await?)
|
|
}
|
|
}
|
|
|
|
impl Resolve<WriteArgs> for UpdateServer {
|
|
#[instrument(name = "UpdateServer", skip(user))]
|
|
async fn resolve(
|
|
self,
|
|
WriteArgs { user }: &WriteArgs,
|
|
) -> serror::Result<Server> {
|
|
Ok(resource::update::<Server>(&self.id, self.config, user).await?)
|
|
}
|
|
}
|
|
|
|
impl Resolve<WriteArgs> for RenameServer {
|
|
#[instrument(name = "RenameServer", skip(user))]
|
|
async fn resolve(
|
|
self,
|
|
WriteArgs { user }: &WriteArgs,
|
|
) -> serror::Result<Update> {
|
|
Ok(resource::rename::<Server>(&self.id, &self.name, user).await?)
|
|
}
|
|
}
|
|
|
|
impl Resolve<WriteArgs> for CreateNetwork {
|
|
#[instrument(name = "CreateNetwork", skip(user))]
|
|
async fn resolve(
|
|
self,
|
|
WriteArgs { user }: &WriteArgs,
|
|
) -> serror::Result<Update> {
|
|
let server = get_check_permissions::<Server>(
|
|
&self.server,
|
|
user,
|
|
PermissionLevel::Write.into(),
|
|
)
|
|
.await?;
|
|
|
|
let periphery = periphery_client(&server)?;
|
|
|
|
let mut update =
|
|
make_update(&server, Operation::CreateNetwork, user);
|
|
update.status = UpdateStatus::InProgress;
|
|
update.id = add_update(update.clone()).await?;
|
|
|
|
match periphery
|
|
.request(api::network::CreateNetwork {
|
|
name: to_docker_compatible_name(&self.name),
|
|
driver: None,
|
|
})
|
|
.await
|
|
{
|
|
Ok(log) => update.logs.push(log),
|
|
Err(e) => update.push_error_log(
|
|
"create network",
|
|
format_serror(&e.context("failed to create network").into()),
|
|
),
|
|
};
|
|
|
|
update.finalize();
|
|
update_update(update.clone()).await?;
|
|
|
|
Ok(update)
|
|
}
|
|
}
|
|
|
|
impl Resolve<WriteArgs> for CreateTerminal {
|
|
#[instrument(name = "CreateTerminal", skip(user))]
|
|
async fn resolve(
|
|
self,
|
|
WriteArgs { user }: &WriteArgs,
|
|
) -> serror::Result<NoData> {
|
|
let server = get_check_permissions::<Server>(
|
|
&self.server,
|
|
user,
|
|
PermissionLevel::Write.terminal(),
|
|
)
|
|
.await?;
|
|
|
|
let periphery = periphery_client(&server)?;
|
|
|
|
periphery
|
|
.request(api::terminal::CreateTerminal {
|
|
name: self.name,
|
|
command: self.command,
|
|
recreate: self.recreate,
|
|
})
|
|
.await
|
|
.context("Failed to create terminal on periphery")?;
|
|
|
|
Ok(NoData {})
|
|
}
|
|
}
|
|
|
|
impl Resolve<WriteArgs> for DeleteTerminal {
|
|
#[instrument(name = "DeleteTerminal", skip(user))]
|
|
async fn resolve(
|
|
self,
|
|
WriteArgs { user }: &WriteArgs,
|
|
) -> serror::Result<NoData> {
|
|
let server = get_check_permissions::<Server>(
|
|
&self.server,
|
|
user,
|
|
PermissionLevel::Write.terminal(),
|
|
)
|
|
.await?;
|
|
|
|
let periphery = periphery_client(&server)?;
|
|
|
|
periphery
|
|
.request(api::terminal::DeleteTerminal {
|
|
terminal: self.terminal,
|
|
})
|
|
.await
|
|
.context("Failed to delete terminal on periphery")?;
|
|
|
|
Ok(NoData {})
|
|
}
|
|
}
|
|
|
|
impl Resolve<WriteArgs> for DeleteAllTerminals {
|
|
#[instrument(name = "DeleteAllTerminals", skip(user))]
|
|
async fn resolve(
|
|
self,
|
|
WriteArgs { user }: &WriteArgs,
|
|
) -> serror::Result<NoData> {
|
|
let server = get_check_permissions::<Server>(
|
|
&self.server,
|
|
user,
|
|
PermissionLevel::Write.terminal(),
|
|
)
|
|
.await?;
|
|
|
|
let periphery = periphery_client(&server)?;
|
|
|
|
periphery
|
|
.request(api::terminal::DeleteAllTerminals {})
|
|
.await
|
|
.context("Failed to delete all terminals on periphery")?;
|
|
|
|
Ok(NoData {})
|
|
}
|
|
}
|