203 lines
		
	
	
		
			6.8 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			203 lines
		
	
	
		
			6.8 KiB
		
	
	
	
		
			Go
		
	
	
	
package pods
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"net"
 | 
						|
	"os"
 | 
						|
 | 
						|
	"github.com/containers/common/pkg/auth"
 | 
						|
	"github.com/containers/common/pkg/completion"
 | 
						|
	"github.com/containers/image/v5/types"
 | 
						|
	"github.com/containers/podman/v3/cmd/podman/common"
 | 
						|
	"github.com/containers/podman/v3/cmd/podman/registry"
 | 
						|
	"github.com/containers/podman/v3/cmd/podman/utils"
 | 
						|
	"github.com/containers/podman/v3/pkg/domain/entities"
 | 
						|
	"github.com/containers/podman/v3/pkg/util"
 | 
						|
	"github.com/pkg/errors"
 | 
						|
	"github.com/spf13/cobra"
 | 
						|
)
 | 
						|
 | 
						|
// playKubeOptionsWrapper allows for separating CLI-only fields from API-only
 | 
						|
// fields.
 | 
						|
type playKubeOptionsWrapper struct {
 | 
						|
	entities.PlayKubeOptions
 | 
						|
 | 
						|
	TLSVerifyCLI   bool
 | 
						|
	CredentialsCLI string
 | 
						|
	StartCLI       bool
 | 
						|
}
 | 
						|
 | 
						|
var (
 | 
						|
	macs []string
 | 
						|
	// https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/
 | 
						|
	defaultSeccompRoot = "/var/lib/kubelet/seccomp"
 | 
						|
	kubeOptions        = playKubeOptionsWrapper{}
 | 
						|
	kubeDescription    = `Command reads in a structured file of Kubernetes YAML.
 | 
						|
 | 
						|
  It creates pods or volumes based on the Kubernetes kind described in the YAML. Supported kinds are Pods, Deployments and PersistentVolumeClaims.`
 | 
						|
 | 
						|
	kubeCmd = &cobra.Command{
 | 
						|
		Use:               "kube [options] KUBEFILE|-",
 | 
						|
		Short:             "Play a pod or volume based on Kubernetes YAML.",
 | 
						|
		Long:              kubeDescription,
 | 
						|
		RunE:              kube,
 | 
						|
		Args:              cobra.ExactArgs(1),
 | 
						|
		ValidArgsFunction: common.AutocompleteDefaultOneArg,
 | 
						|
		Example: `podman play kube nginx.yml
 | 
						|
  cat nginx.yml | podman play kube -
 | 
						|
  podman play kube --creds user:password --seccomp-profile-root /custom/path apache.yml`,
 | 
						|
	}
 | 
						|
)
 | 
						|
 | 
						|
func init() {
 | 
						|
	registry.Commands = append(registry.Commands, registry.CliCommand{
 | 
						|
		Command: kubeCmd,
 | 
						|
		Parent:  playCmd,
 | 
						|
	})
 | 
						|
 | 
						|
	flags := kubeCmd.Flags()
 | 
						|
	flags.SetNormalizeFunc(utils.AliasFlags)
 | 
						|
 | 
						|
	credsFlagName := "creds"
 | 
						|
	flags.StringVar(&kubeOptions.CredentialsCLI, credsFlagName, "", "`Credentials` (USERNAME:PASSWORD) to use for authenticating to a registry")
 | 
						|
	_ = kubeCmd.RegisterFlagCompletionFunc(credsFlagName, completion.AutocompleteNone)
 | 
						|
 | 
						|
	staticMACFlagName := "mac-address"
 | 
						|
	flags.StringSliceVar(&macs, staticMACFlagName, nil, "Static MAC addresses to assign to the pods")
 | 
						|
	_ = kubeCmd.RegisterFlagCompletionFunc(staticMACFlagName, completion.AutocompleteNone)
 | 
						|
 | 
						|
	networkFlagName := "network"
 | 
						|
	flags.StringVar(&kubeOptions.Network, networkFlagName, "", "Connect pod to CNI network(s)")
 | 
						|
	_ = kubeCmd.RegisterFlagCompletionFunc(networkFlagName, common.AutocompleteNetworkFlag)
 | 
						|
 | 
						|
	staticIPFlagName := "ip"
 | 
						|
	flags.IPSliceVar(&kubeOptions.StaticIPs, staticIPFlagName, nil, "Static IP addresses to assign to the pods")
 | 
						|
	_ = kubeCmd.RegisterFlagCompletionFunc(staticIPFlagName, completion.AutocompleteNone)
 | 
						|
 | 
						|
	logDriverFlagName := "log-driver"
 | 
						|
	flags.StringVar(&kubeOptions.LogDriver, logDriverFlagName, "", "Logging driver for the container")
 | 
						|
	_ = kubeCmd.RegisterFlagCompletionFunc(logDriverFlagName, common.AutocompleteLogDriver)
 | 
						|
 | 
						|
	flags.BoolVarP(&kubeOptions.Quiet, "quiet", "q", false, "Suppress output information when pulling images")
 | 
						|
	flags.BoolVar(&kubeOptions.TLSVerifyCLI, "tls-verify", true, "Require HTTPS and verify certificates when contacting registries")
 | 
						|
	flags.BoolVar(&kubeOptions.StartCLI, "start", true, "Start the pod after creating it")
 | 
						|
 | 
						|
	authfileFlagName := "authfile"
 | 
						|
	flags.StringVar(&kubeOptions.Authfile, authfileFlagName, auth.GetDefaultAuthFile(), "Path of the authentication file. Use REGISTRY_AUTH_FILE environment variable to override")
 | 
						|
	_ = kubeCmd.RegisterFlagCompletionFunc(authfileFlagName, completion.AutocompleteDefault)
 | 
						|
 | 
						|
	if !registry.IsRemote() {
 | 
						|
		certDirFlagName := "cert-dir"
 | 
						|
		flags.StringVar(&kubeOptions.CertDir, certDirFlagName, "", "`Pathname` of a directory containing TLS certificates and keys")
 | 
						|
		_ = kubeCmd.RegisterFlagCompletionFunc(certDirFlagName, completion.AutocompleteDefault)
 | 
						|
 | 
						|
		flags.StringVar(&kubeOptions.SignaturePolicy, "signature-policy", "", "`Pathname` of signature policy file (not usually used)")
 | 
						|
 | 
						|
		seccompProfileRootFlagName := "seccomp-profile-root"
 | 
						|
		flags.StringVar(&kubeOptions.SeccompProfileRoot, seccompProfileRootFlagName, defaultSeccompRoot, "Directory path for seccomp profiles")
 | 
						|
		_ = kubeCmd.RegisterFlagCompletionFunc(seccompProfileRootFlagName, completion.AutocompleteDefault)
 | 
						|
 | 
						|
		configmapFlagName := "configmap"
 | 
						|
		flags.StringSliceVar(&kubeOptions.ConfigMaps, configmapFlagName, []string{}, "`Pathname` of a YAML file containing a kubernetes configmap")
 | 
						|
		_ = kubeCmd.RegisterFlagCompletionFunc(configmapFlagName, completion.AutocompleteDefault)
 | 
						|
 | 
						|
		buildFlagName := "build"
 | 
						|
		flags.BoolVar(&kubeOptions.Build, buildFlagName, false, "Build all images in a YAML (given Containerfiles exist)")
 | 
						|
	}
 | 
						|
	_ = flags.MarkHidden("signature-policy")
 | 
						|
}
 | 
						|
 | 
						|
func kube(cmd *cobra.Command, args []string) error {
 | 
						|
	// TLS verification in c/image is controlled via a `types.OptionalBool`
 | 
						|
	// which allows for distinguishing among set-true, set-false, unspecified
 | 
						|
	// which is important to implement a sane way of dealing with defaults of
 | 
						|
	// boolean CLI flags.
 | 
						|
	if cmd.Flags().Changed("tls-verify") {
 | 
						|
		kubeOptions.SkipTLSVerify = types.NewOptionalBool(!kubeOptions.TLSVerifyCLI)
 | 
						|
	}
 | 
						|
	if cmd.Flags().Changed("start") {
 | 
						|
		kubeOptions.Start = types.NewOptionalBool(kubeOptions.StartCLI)
 | 
						|
	}
 | 
						|
	if kubeOptions.Authfile != "" {
 | 
						|
		if _, err := os.Stat(kubeOptions.Authfile); err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if kubeOptions.CredentialsCLI != "" {
 | 
						|
		creds, err := util.ParseRegistryCreds(kubeOptions.CredentialsCLI)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		kubeOptions.Username = creds.Username
 | 
						|
		kubeOptions.Password = creds.Password
 | 
						|
	}
 | 
						|
 | 
						|
	yamlfile := args[0]
 | 
						|
	if yamlfile == "-" {
 | 
						|
		yamlfile = "/dev/stdin"
 | 
						|
	}
 | 
						|
 | 
						|
	for _, mac := range macs {
 | 
						|
		m, err := net.ParseMAC(mac)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		kubeOptions.StaticMACs = append(kubeOptions.StaticMACs, m)
 | 
						|
	}
 | 
						|
 | 
						|
	report, err := registry.ContainerEngine().PlayKube(registry.GetContext(), yamlfile, kubeOptions.PlayKubeOptions)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	// Print volumes report
 | 
						|
	for i, volume := range report.Volumes {
 | 
						|
		if i == 0 {
 | 
						|
			fmt.Println("Volumes:")
 | 
						|
		}
 | 
						|
		fmt.Println(volume.Name)
 | 
						|
	}
 | 
						|
 | 
						|
	// Print pods report
 | 
						|
	for _, pod := range report.Pods {
 | 
						|
		for _, l := range pod.Logs {
 | 
						|
			fmt.Fprint(os.Stderr, l)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	ctrsFailed := 0
 | 
						|
 | 
						|
	for _, pod := range report.Pods {
 | 
						|
		fmt.Println("Pod:")
 | 
						|
		fmt.Println(pod.ID)
 | 
						|
 | 
						|
		switch len(pod.Containers) {
 | 
						|
		case 0:
 | 
						|
			continue
 | 
						|
		case 1:
 | 
						|
			fmt.Println("Container:")
 | 
						|
		default:
 | 
						|
			fmt.Println("Containers:")
 | 
						|
		}
 | 
						|
		for _, ctr := range pod.Containers {
 | 
						|
			fmt.Println(ctr)
 | 
						|
		}
 | 
						|
		ctrsFailed += len(pod.ContainerErrors)
 | 
						|
		// If We have errors, add a newline
 | 
						|
		if len(pod.ContainerErrors) > 0 {
 | 
						|
			fmt.Println()
 | 
						|
		}
 | 
						|
		for _, err := range pod.ContainerErrors {
 | 
						|
			fmt.Fprintln(os.Stderr, err)
 | 
						|
		}
 | 
						|
		// Empty line for space for next block
 | 
						|
		fmt.Println()
 | 
						|
	}
 | 
						|
 | 
						|
	if ctrsFailed > 0 {
 | 
						|
		return errors.Errorf("failed to start %d containers", ctrsFailed)
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 |