Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
198 changes: 198 additions & 0 deletions docs/swagger.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -1973,6 +1973,202 @@ paths:
description: Duplicate Name
"500":
description: Internal Server Error
/microservices/{uuid}/config:
get:
tags:
- Microservices
summary: Gets a microservice config
operationId: getMicroserviceConfig
parameters:
- in: path
name: uuid
description: Microservice Uuid
required: true
schema:
type: string
security:
- authToken: []
responses:
"200":
description: Success
headers:
X-Timestamp:
description: FogController server timestamp
schema:
type: number
content:
application/json:
schema:
$ref: "#/components/schemas/microservicesConfig"
"401":
description: Not Authorized
"404":
description: Not Found
"500":
description: Internal Server Error
patch:
tags:
- Microservices
summary: Updates a microservice config
operationId: updateMicroserviceConfig
parameters:
- in: path
name: uuid
description: Microservice Uuid
required: true
schema:
type: string
security:
- authToken: []
requestBody:
content:
application/json:
schema:
$ref: "#/components/schemas/microservicesConfig"
description: information about microservice config
required: true
responses:
"204":
description: Updated
headers:
X-Timestamp:
description: FogController server timestamp
schema:
type: number
"400":
description: Bad Request
"401":
description: Not Authorized
"404":
description: Not Found
"500":
description: Internal Server Error
delete:
tags:
- Microservices
summary: Deletes a microservice config
operationId: deleteMicroserviceConfig
parameters:
- in: path
name: uuid
description: Microservice Uuid
required: true
schema:
type: string
security:
- authToken: []
responses:
"204":
description: Success
headers:
X-Timestamp:
description: FogController server timestamp
schema:
type: number
"401":
description: Not Authorized
"404":
description: Not Found
"500":
description: Internal Server Error
/microservices/system/{uuid}/config:
get:
tags:
- Microservices
summary: Gets a system microservice config
operationId: getSystemMicroserviceConfig
parameters:
- in: path
name: uuid
description: Microservice Uuid
required: true
schema:
type: string
security:
- authToken: []
responses:
"200":
description: Success
headers:
X-Timestamp:
description: FogController server timestamp
schema:
type: number
content:
application/json:
schema:
$ref: "#/components/schemas/microservicesConfig"
"401":
description: Not Authorized
"404":
description: Not Found
"500":
description: Internal Server Error
patch:
tags:
- Microservices
summary: Updates a system microservice config
operationId: updateSystemMicroserviceConfig
parameters:
- in: path
name: uuid
description: Microservice Uuid
required: true
schema:
type: string
security:
- authToken: []
requestBody:
content:
application/json:
schema:
$ref: "#/components/schemas/microservicesConfig"
description: information about microservice config
required: true
responses:
"204":
description: Updated
headers:
X-Timestamp:
description: FogController server timestamp
schema:
type: number
"400":
description: Bad Request
"401":
description: Not Authorized
"404":
description: Not Found
"500":
description: Internal Server Error
delete:
tags:
- Microservices
summary: Deletes a system microservice config
operationId: deleteSystemMicroserviceConfig
parameters:
- in: path
name: uuid
description: Microservice Uuid
required: true
schema:
type: string
security:
- authToken: []
responses:
"204":
description: Success
headers:
X-Timestamp:
description: FogController server timestamp
schema:
type: number
"401":
description: Not Authorized
"404":
description: Not Found
"500":
description: Internal Server Error
"/microservices/{uuid}/port-mapping":
post:
tags:
Expand Down Expand Up @@ -5897,6 +6093,8 @@ components:
portExternal:
type: string
example: 80
microservicesConfig:
type: string
RegistriesListResponse:
type: object
properties:
Expand Down
28 changes: 14 additions & 14 deletions package-lock.json

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

6 changes: 3 additions & 3 deletions package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@datasance/iofogcontroller",
"version": "3.5.0",
"version": "3.5.3",
"description": "ioFog Controller project for Datasance PoT @ datasance.com \\nCopyright (c) 2023 Datasance Teknoloji A.S.",
"main": "./src/main.js",
"author": "Emirhan Durmus",
Expand Down Expand Up @@ -55,7 +55,7 @@
"iofog-controller": "src/main.js"
},
"dependencies": {
"@datasance/ecn-viewer": "1.0.0",
"@datasance/ecn-viewer": "1.1.0",
"@kubernetes/client-node": "^0.22.3",
"@msgpack/msgpack": "^3.1.2",
"@opentelemetry/api": "^1.9.0",
Expand All @@ -64,7 +64,7 @@
"@opentelemetry/instrumentation-http": "^0.200.0",
"@opentelemetry/resources": "^1.8.0",
"@opentelemetry/sdk-node": "^0.200.0",
"axios": "1.8.4",
"axios": "1.11.0",
"bignumber.js": "^9.3.0",
"body-parser": "^1.20.3",
"child_process": "1.0.2",
Expand Down
38 changes: 38 additions & 0 deletions src/controllers/microservices-controller.js
Original file line number Diff line number Diff line change
Expand Up @@ -85,6 +85,38 @@ const updateSystemMicroserviceYAMLEndPoint = async function (req) {
return MicroservicesService.updateSystemMicroserviceEndPoint(microserviceUuid, microservice, false)
}

const updateMicroserviceConfigEndPoint = async function (req) {
const microserviceUuid = req.params.uuid
const config = req.body
return MicroservicesService.updateMicroserviceConfigEndPoint(microserviceUuid, config, false)
}

const getMicroserviceConfigEndPoint = async function (req) {
const microserviceUuid = req.params.uuid
return MicroservicesService.getMicroserviceConfigEndPoint(microserviceUuid, false)
}

const deleteMicroserviceConfigEndPoint = async function (req) {
const microserviceUuid = req.params.uuid
return MicroservicesService.deleteMicroserviceConfigEndPoint(microserviceUuid, false)
}

const updateSystemMicroserviceConfigEndPoint = async function (req) {
const microserviceUuid = req.params.uuid
const config = req.body
return MicroservicesService.updateSystemMicroserviceConfigEndPoint(microserviceUuid, config, false)
}

const getSystemMicroserviceConfigEndPoint = async function (req) {
const microserviceUuid = req.params.uuid
return MicroservicesService.getSystemMicroserviceConfigEndPoint(microserviceUuid, false)
}

const deleteSystemMicroserviceConfigEndPoint = async function (req) {
const microserviceUuid = req.params.uuid
return MicroservicesService.deleteSystemMicroserviceConfigEndPoint(microserviceUuid, false)
}

const deleteMicroserviceEndPoint = async function (req) {
const microserviceUuid = req.params.uuid
const microserviceData = req.body || {}
Expand Down Expand Up @@ -237,6 +269,12 @@ module.exports = {
createMicroserviceYAMLEndPoint: (createMicroserviceYAMLEndPoint),
updateMicroserviceYAMLEndPoint: (updateMicroserviceYAMLEndPoint),
updateSystemMicroserviceYAMLEndPoint: (updateSystemMicroserviceYAMLEndPoint),
updateMicroserviceConfigEndPoint: (updateMicroserviceConfigEndPoint),
getMicroserviceConfigEndPoint: (getMicroserviceConfigEndPoint),
updateSystemMicroserviceConfigEndPoint: (updateSystemMicroserviceConfigEndPoint),
getSystemMicroserviceConfigEndPoint: (getSystemMicroserviceConfigEndPoint),
deleteMicroserviceConfigEndPoint: (deleteMicroserviceConfigEndPoint),
deleteSystemMicroserviceConfigEndPoint: (deleteSystemMicroserviceConfigEndPoint),
createMicroserviceExecEndPoint: (createMicroserviceExecEndPoint),
deleteMicroserviceExecEndPoint: (deleteMicroserviceExecEndPoint),
createSystemMicroserviceExecEndPoint: (createSystemMicroserviceExecEndPoint),
Expand Down
2 changes: 1 addition & 1 deletion src/routes/config.js
Original file line number Diff line number Diff line change
Expand Up @@ -96,7 +96,7 @@ module.exports = [
]

// Add keycloak.protect() middleware to protect the route
await keycloak.protect(['SRE', 'Developer'])(req, res, async () => {
await keycloak.protect(['SRE'])(req, res, async () => {
const upsertConfigElementEndpoint = ResponseDecorator.handleErrors(ConfigController.upsertConfigElementEndpoint, successCode, errorCodes)
const responseObject = await upsertConfigElementEndpoint(req)
const user = req.kauth.grant.access_token.content.preferred_username
Expand Down
Loading
Loading