mirror of
https://github.com/portainer/portainer.git
synced 2025-07-19 13:29:41 +02:00
* feat(dockerhub): introduce local status endpoint * feat(proxy): rewrite request with dockerhub credentials * feat(endpoint): check env type * feat(endpoint): check for local endpoint * feat(docker): introduce client side service to get limits * feat(container): add info about rate limits in container * feat(dockerhub): load rate limits just for specific endpoints * feat(images): show specific dockerhub messages for admin * feat(service-create): show docker rate limits * feat(service-edit): show rate limit messages * fix(images): fix loading of page * refactor(images): move rate limits check to container * feat(kubernetes): proxy agent requests * feat(kubernetes/apps): show pull limits in application creation * refactor(image-registry): move warning to end of field * fix(image-registry): show right message for admin * fix(images): silently fail when loading rate limits * fix(kube/apps): use new rate limits comp * fix(images): move rate warning to end * fix(registry): move search to right place * fix(service): remove service warning * fix(endpoints): check if kube endpoint is local
81 lines
2.9 KiB
Go
81 lines
2.9 KiB
Go
package endpointproxy
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"strings"
|
|
"time"
|
|
|
|
httperror "github.com/portainer/libhttp/error"
|
|
"github.com/portainer/libhttp/request"
|
|
portainer "github.com/portainer/portainer/api"
|
|
bolterrors "github.com/portainer/portainer/api/bolt/errors"
|
|
|
|
"net/http"
|
|
)
|
|
|
|
func (handler *Handler) proxyRequestsToKubernetesAPI(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
|
endpointID, err := request.RetrieveNumericRouteVariableValue(r, "id")
|
|
if err != nil {
|
|
return &httperror.HandlerError{http.StatusBadRequest, "Invalid endpoint identifier route variable", err}
|
|
}
|
|
|
|
endpoint, err := handler.DataStore.Endpoint().Endpoint(portainer.EndpointID(endpointID))
|
|
if err == bolterrors.ErrObjectNotFound {
|
|
return &httperror.HandlerError{http.StatusNotFound, "Unable to find an endpoint with the specified identifier inside the database", err}
|
|
} else if err != nil {
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to find an endpoint with the specified identifier inside the database", err}
|
|
}
|
|
|
|
err = handler.requestBouncer.AuthorizedEndpointOperation(r, endpoint)
|
|
if err != nil {
|
|
return &httperror.HandlerError{http.StatusForbidden, "Permission denied to access endpoint", err}
|
|
}
|
|
|
|
if endpoint.Type == portainer.EdgeAgentOnKubernetesEnvironment {
|
|
if endpoint.EdgeID == "" {
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "No Edge agent registered with the endpoint", errors.New("No agent available")}
|
|
}
|
|
|
|
tunnel := handler.ReverseTunnelService.GetTunnelDetails(endpoint.ID)
|
|
if tunnel.Status == portainer.EdgeAgentIdle {
|
|
handler.ProxyManager.DeleteEndpointProxy(endpoint)
|
|
|
|
err := handler.ReverseTunnelService.SetTunnelStatusToRequired(endpoint.ID)
|
|
if err != nil {
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to update tunnel status", err}
|
|
}
|
|
|
|
settings, err := handler.DataStore.Settings().Settings()
|
|
if err != nil {
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to retrieve settings from the database", err}
|
|
}
|
|
|
|
waitForAgentToConnect := time.Duration(settings.EdgeAgentCheckinInterval) * time.Second
|
|
time.Sleep(waitForAgentToConnect * 2)
|
|
}
|
|
}
|
|
|
|
var proxy http.Handler
|
|
proxy = handler.ProxyManager.GetEndpointProxy(endpoint)
|
|
if proxy == nil {
|
|
proxy, err = handler.ProxyManager.CreateAndRegisterEndpointProxy(endpoint)
|
|
if err != nil {
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to create proxy", err}
|
|
}
|
|
}
|
|
|
|
requestPrefix := fmt.Sprintf("/%d/kubernetes", endpointID)
|
|
if endpoint.Type == portainer.AgentOnKubernetesEnvironment || endpoint.Type == portainer.EdgeAgentOnKubernetesEnvironment {
|
|
if isKubernetesRequest(strings.TrimPrefix(r.URL.String(), requestPrefix)) {
|
|
requestPrefix = fmt.Sprintf("/%d", endpointID)
|
|
}
|
|
}
|
|
|
|
http.StripPrefix(requestPrefix, proxy).ServeHTTP(w, r)
|
|
return nil
|
|
}
|
|
|
|
func isKubernetesRequest(requestURL string) bool {
|
|
return strings.HasPrefix(requestURL, "/api")
|
|
}
|