mirror of
https://github.com/containers/podman.git
synced 2025-05-21 17:16:22 +08:00

Adds a `--no-trunc` flag to `podman kube generate` preventing the annotations from being trimmed at 63 characters. However, due to the fact the annotations will not be trimmed, any annotation that is longer than 63 characters means this YAML will no longer be Kubernetes compatible. However, these YAML files can still be used with `podman kube play` due to the addition of the new flag below. Adds a `--no-trunc` flag to `podman kube play` supporting YAML files with annotations that were not truncated to the Kubernetes maximum length of 63 characters. Signed-off-by: Jake Correnti <jakecorrenti+github@proton.me>
135 lines
4.5 KiB
Go
135 lines
4.5 KiB
Go
package libpod
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
|
|
"github.com/containers/podman/v4/libpod"
|
|
"github.com/containers/podman/v4/pkg/api/handlers/utils"
|
|
api "github.com/containers/podman/v4/pkg/api/types"
|
|
"github.com/containers/podman/v4/pkg/domain/entities"
|
|
"github.com/containers/podman/v4/pkg/domain/infra/abi"
|
|
"github.com/containers/podman/v4/pkg/util"
|
|
"github.com/gorilla/schema"
|
|
)
|
|
|
|
func GenerateSystemd(w http.ResponseWriter, r *http.Request) {
|
|
runtime := r.Context().Value(api.RuntimeKey).(*libpod.Runtime)
|
|
decoder := r.Context().Value(api.DecoderKey).(*schema.Decoder)
|
|
query := struct {
|
|
Name bool `schema:"useName"`
|
|
New bool `schema:"new"`
|
|
NoHeader bool `schema:"noHeader"`
|
|
TemplateUnitFile bool `schema:"templateUnitFile"`
|
|
RestartPolicy *string `schema:"restartPolicy"`
|
|
RestartSec uint `schema:"restartSec"`
|
|
StopTimeout uint `schema:"stopTimeout"`
|
|
StartTimeout uint `schema:"startTimeout"`
|
|
ContainerPrefix *string `schema:"containerPrefix"`
|
|
PodPrefix *string `schema:"podPrefix"`
|
|
Separator *string `schema:"separator"`
|
|
Wants []string `schema:"wants"`
|
|
After []string `schema:"after"`
|
|
Requires []string `schema:"requires"`
|
|
AdditionalEnvVariables []string `schema:"additionalEnvVariables"`
|
|
}{
|
|
StartTimeout: 0,
|
|
StopTimeout: util.DefaultContainerConfig().Engine.StopTimeout,
|
|
}
|
|
|
|
if err := decoder.Decode(&query, r.URL.Query()); err != nil {
|
|
utils.Error(w, http.StatusBadRequest, fmt.Errorf("failed to parse parameters for %s: %w", r.URL.String(), err))
|
|
return
|
|
}
|
|
|
|
ContainerPrefix := "container"
|
|
if query.ContainerPrefix != nil {
|
|
ContainerPrefix = *query.ContainerPrefix
|
|
}
|
|
|
|
PodPrefix := "pod"
|
|
if query.PodPrefix != nil {
|
|
PodPrefix = *query.PodPrefix
|
|
}
|
|
|
|
Separator := "-"
|
|
if query.Separator != nil {
|
|
Separator = *query.Separator
|
|
}
|
|
|
|
containerEngine := abi.ContainerEngine{Libpod: runtime}
|
|
options := entities.GenerateSystemdOptions{
|
|
Name: query.Name,
|
|
New: query.New,
|
|
NoHeader: query.NoHeader,
|
|
TemplateUnitFile: query.TemplateUnitFile,
|
|
RestartPolicy: query.RestartPolicy,
|
|
StartTimeout: &query.StartTimeout,
|
|
StopTimeout: &query.StopTimeout,
|
|
ContainerPrefix: ContainerPrefix,
|
|
PodPrefix: PodPrefix,
|
|
Separator: Separator,
|
|
RestartSec: &query.RestartSec,
|
|
Wants: query.Wants,
|
|
After: query.After,
|
|
Requires: query.Requires,
|
|
AdditionalEnvVariables: query.AdditionalEnvVariables,
|
|
}
|
|
|
|
report, err := containerEngine.GenerateSystemd(r.Context(), utils.GetName(r), options)
|
|
if err != nil {
|
|
utils.Error(w, http.StatusInternalServerError, fmt.Errorf("generating systemd units: %w", err))
|
|
return
|
|
}
|
|
|
|
utils.WriteResponse(w, http.StatusOK, report.Units)
|
|
}
|
|
|
|
func GenerateKube(w http.ResponseWriter, r *http.Request) {
|
|
runtime := r.Context().Value(api.RuntimeKey).(*libpod.Runtime)
|
|
decoder := r.Context().Value(api.DecoderKey).(*schema.Decoder)
|
|
query := struct {
|
|
Names []string `schema:"names"`
|
|
Service bool `schema:"service"`
|
|
Type string `schema:"type"`
|
|
Replicas int32 `schema:"replicas"`
|
|
NoTrunc bool `schema:"noTrunc"`
|
|
}{
|
|
// Defaults would go here.
|
|
Replicas: 1,
|
|
}
|
|
|
|
if err := decoder.Decode(&query, r.URL.Query()); err != nil {
|
|
utils.Error(w, http.StatusBadRequest, fmt.Errorf("failed to parse parameters for %s: %w", r.URL.String(), err))
|
|
return
|
|
}
|
|
|
|
// Read the default kubeGenerateType from containers.conf it the user doesn't specify it
|
|
generateType := query.Type
|
|
if generateType == "" {
|
|
config, err := runtime.GetConfigNoCopy()
|
|
if err != nil {
|
|
utils.Error(w, http.StatusInternalServerError, err)
|
|
return
|
|
}
|
|
generateType = config.Engine.KubeGenerateType
|
|
}
|
|
|
|
containerEngine := abi.ContainerEngine{Libpod: runtime}
|
|
options := entities.GenerateKubeOptions{
|
|
Service: query.Service,
|
|
Type: generateType,
|
|
Replicas: query.Replicas,
|
|
UseLongAnnotations: query.NoTrunc,
|
|
}
|
|
report, err := containerEngine.GenerateKube(r.Context(), query.Names, options)
|
|
if err != nil {
|
|
utils.Error(w, http.StatusInternalServerError, fmt.Errorf("generating YAML: %w", err))
|
|
return
|
|
}
|
|
|
|
// FIXME: Content-Type is being set as application/x-tar NOT text/vnd.yaml
|
|
// https://mailarchive.ietf.org/arch/msg/media-types/e9ZNC0hDXKXeFlAVRWxLCCaG9GI/
|
|
utils.WriteResponse(w, http.StatusOK, report.Reader)
|
|
}
|