mirror of
https://github.com/portainer/portainer.git
synced 2025-07-19 13:29:41 +02:00
* feat(stack): backport changes to CE EE-1189 * feat(stack): front end backport changes to CE EE-1199 (#5455) * feat(stack): front end backport changes to CE EE-1199 * fix k8s deploy logic * fixed web editor confirmation message typo. EE-1501 * fix(stack): fixed issue auth detail not remembered EE-1502 (#5459) * show status in buttons * removed onChangeRef function. * moved buttons in git form to its own component * removed unused variable. Co-authored-by: ArrisLee <arris_li@hotmail.com> * moved formvalue to kube app component * fix(stack): failed to pull and redeploy compose format k8s stack * fixed form value * fix(k8s): file content overridden when deployment failed with compose format EE-1548 * updated API response to get IsComposeFormat and show appropriate text. * feat(k8s): front end backport to CE * feat(kube): kube app auto update backend (#5547) * error message updates for different file type * not display creation source for external application * added confirmation modal to advanced app created by web editor * stop showing confirmation modal when updating application * disable rollback button when application type is not applicatiom form * only update file after deployment succeded * Revert "only update file after deployment succeded" This reverts commitb94bd2e96f
. * fix(k8s): file content overridden when deployment failed with compose format EE-1556 * added analytics-on directive to pull and redeploy button * fix(kube): don't valide resource control access for kube (#5568) * added missing question mark to k8s confirmation modal * fixed webhook format issue * added question marks to k8s app confirmation modal * added space in additional file list. * ignoring error on deletion * fix(k8s): Git authentication info not persisted * added RepositoryMechanismTypes constant * updated analytics functions * covert RepositoryMechanism to constant * fixed typo * removed unused function. * post tech review updates * fixed save settings n redeploy button * refact kub deploy logic * Revert "refact kub deploy logic" This reverts commitcbfdd58ece
. * feat(k8s): utilize user token for k8s auto update EE-1594 * feat(k8s): persist kub stack name EE-1630 * feat(k8s): support delete kub stack * fix(app): updated logic to delete stack for different kind apps. (#5648) * fix(app): updated logic to delete stack for different kind apps. * renamed variable * fix import * added StackName field. * fixed stack id not found issue. * fix(k8s): fixed qusetion mark alignment issue in PAT field. (#5611) * fix(k8s): fixed qusetion mark alignment issue in PAT field. * moved inline css to file. * fix(git-form: made auth input text full width * add ignore deleted arg * tech review updates * typo fix * fix(k8s): added console error when deleting k8s service. * fix(console): added no-console config * fix(deploy): added missing service. * fix: use stack editor as an owner when exists (#5678) * fix: tempalte/content based stacks edit/delete * fix(stack): remove stack when no app. (#5769) * fix(stack): remove stack when no app. * support compose format in delete Co-authored-by: ArrisLee <arris_li@hotmail.com> Co-authored-by: Hui <arris_li@hotmail.com> Co-authored-by: fhanportainer <79428273+fhanportainer@users.noreply.github.com> Co-authored-by: Felix Han <felix.han@portainer.io>
165 lines
5.5 KiB
Go
165 lines
5.5 KiB
Go
package exec
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
"os/exec"
|
|
"path"
|
|
"runtime"
|
|
"strings"
|
|
|
|
"github.com/pkg/errors"
|
|
"github.com/portainer/portainer/api/http/proxy"
|
|
"github.com/portainer/portainer/api/http/proxy/factory"
|
|
"github.com/portainer/portainer/api/http/proxy/factory/kubernetes"
|
|
"github.com/portainer/portainer/api/kubernetes/cli"
|
|
|
|
portainer "github.com/portainer/portainer/api"
|
|
)
|
|
|
|
// KubernetesDeployer represents a service to deploy resources inside a Kubernetes environment(endpoint).
|
|
type KubernetesDeployer struct {
|
|
binaryPath string
|
|
dataStore portainer.DataStore
|
|
reverseTunnelService portainer.ReverseTunnelService
|
|
signatureService portainer.DigitalSignatureService
|
|
kubernetesClientFactory *cli.ClientFactory
|
|
kubernetesTokenCacheManager *kubernetes.TokenCacheManager
|
|
proxyManager *proxy.Manager
|
|
}
|
|
|
|
// NewKubernetesDeployer initializes a new KubernetesDeployer service.
|
|
func NewKubernetesDeployer(kubernetesTokenCacheManager *kubernetes.TokenCacheManager, kubernetesClientFactory *cli.ClientFactory, datastore portainer.DataStore, reverseTunnelService portainer.ReverseTunnelService, signatureService portainer.DigitalSignatureService, proxyManager *proxy.Manager, binaryPath string) *KubernetesDeployer {
|
|
return &KubernetesDeployer{
|
|
binaryPath: binaryPath,
|
|
dataStore: datastore,
|
|
reverseTunnelService: reverseTunnelService,
|
|
signatureService: signatureService,
|
|
kubernetesClientFactory: kubernetesClientFactory,
|
|
kubernetesTokenCacheManager: kubernetesTokenCacheManager,
|
|
proxyManager: proxyManager,
|
|
}
|
|
}
|
|
|
|
func (deployer *KubernetesDeployer) getToken(userID portainer.UserID, endpoint *portainer.Endpoint, setLocalAdminToken bool) (string, error) {
|
|
kubeCLI, err := deployer.kubernetesClientFactory.GetKubeClient(endpoint)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
tokenCache := deployer.kubernetesTokenCacheManager.GetOrCreateTokenCache(int(endpoint.ID))
|
|
|
|
tokenManager, err := kubernetes.NewTokenManager(kubeCLI, deployer.dataStore, tokenCache, setLocalAdminToken)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
user, err := deployer.dataStore.User().User(userID)
|
|
if err != nil {
|
|
return "", errors.Wrap(err, "failed to fetch the user")
|
|
}
|
|
|
|
if user.Role == portainer.AdministratorRole {
|
|
return tokenManager.GetAdminServiceAccountToken(), nil
|
|
}
|
|
|
|
token, err := tokenManager.GetUserServiceAccountToken(int(user.ID), endpoint.ID)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
if token == "" {
|
|
return "", fmt.Errorf("can not get a valid user service account token")
|
|
}
|
|
return token, nil
|
|
}
|
|
|
|
// Deploy upserts Kubernetes resources defined in manifest(s)
|
|
func (deployer *KubernetesDeployer) Deploy(userID portainer.UserID, endpoint *portainer.Endpoint, manifestFiles []string, namespace string) (string, error) {
|
|
return deployer.command("apply", userID, endpoint, manifestFiles, namespace)
|
|
}
|
|
|
|
// Remove deletes Kubernetes resources defined in manifest(s)
|
|
func (deployer *KubernetesDeployer) Remove(userID portainer.UserID, endpoint *portainer.Endpoint, manifestFiles []string, namespace string) (string, error) {
|
|
return deployer.command("delete", userID, endpoint, manifestFiles, namespace)
|
|
}
|
|
|
|
func (deployer *KubernetesDeployer) command(operation string, userID portainer.UserID, endpoint *portainer.Endpoint, manifestFiles []string, namespace string) (string, error) {
|
|
token, err := deployer.getToken(userID, endpoint, endpoint.Type == portainer.KubernetesLocalEnvironment)
|
|
if err != nil {
|
|
return "", errors.Wrap(err, "failed generating a user token")
|
|
}
|
|
|
|
command := path.Join(deployer.binaryPath, "kubectl")
|
|
if runtime.GOOS == "windows" {
|
|
command = path.Join(deployer.binaryPath, "kubectl.exe")
|
|
}
|
|
|
|
args := []string{"--token", token}
|
|
if namespace != "" {
|
|
args = append(args, "--namespace", namespace)
|
|
}
|
|
|
|
if endpoint.Type == portainer.AgentOnKubernetesEnvironment || endpoint.Type == portainer.EdgeAgentOnKubernetesEnvironment {
|
|
url, proxy, err := deployer.getAgentURL(endpoint)
|
|
if err != nil {
|
|
return "", errors.WithMessage(err, "failed generating endpoint URL")
|
|
}
|
|
|
|
defer proxy.Close()
|
|
args = append(args, "--server", url)
|
|
args = append(args, "--insecure-skip-tls-verify")
|
|
}
|
|
|
|
if operation == "delete" {
|
|
args = append(args, "--ignore-not-found=true")
|
|
}
|
|
|
|
args = append(args, operation)
|
|
for _, path := range manifestFiles {
|
|
args = append(args, "-f", strings.TrimSpace(path))
|
|
}
|
|
|
|
var stderr bytes.Buffer
|
|
cmd := exec.Command(command, args...)
|
|
cmd.Stderr = &stderr
|
|
|
|
output, err := cmd.Output()
|
|
if err != nil {
|
|
return "", errors.Wrapf(err, "failed to execute kubectl command: %q", stderr.String())
|
|
}
|
|
|
|
return string(output), nil
|
|
}
|
|
|
|
// ConvertCompose leverages the kompose binary to deploy a compose compliant manifest.
|
|
func (deployer *KubernetesDeployer) ConvertCompose(data []byte) ([]byte, error) {
|
|
command := path.Join(deployer.binaryPath, "kompose")
|
|
if runtime.GOOS == "windows" {
|
|
command = path.Join(deployer.binaryPath, "kompose.exe")
|
|
}
|
|
|
|
args := make([]string, 0)
|
|
args = append(args, "convert", "-f", "-", "--stdout")
|
|
|
|
var stderr bytes.Buffer
|
|
cmd := exec.Command(command, args...)
|
|
cmd.Stderr = &stderr
|
|
cmd.Stdin = bytes.NewReader(data)
|
|
|
|
output, err := cmd.Output()
|
|
if err != nil {
|
|
return nil, errors.New(stderr.String())
|
|
}
|
|
|
|
return output, nil
|
|
}
|
|
|
|
func (deployer *KubernetesDeployer) getAgentURL(endpoint *portainer.Endpoint) (string, *factory.ProxyServer, error) {
|
|
proxy, err := deployer.proxyManager.CreateAgentProxyServer(endpoint)
|
|
if err != nil {
|
|
return "", nil, err
|
|
}
|
|
|
|
return fmt.Sprintf("http://127.0.0.1:%d/kubernetes", proxy.Port), proxy, nil
|
|
}
|