mirror of https://github.com/portainer/portainer
fix(more resources): fix porting and functionality [r8s-103] (#8)
Co-authored-by: testA113 <aliharriss1995@gmail.com> Co-authored-by: Anthony Lapenna <anthony.lapenna@portainer.io> Co-authored-by: Ali <83188384+testA113@users.noreply.github.com>release/2.24.0
parent
e6577ca269
commit
6d31f4876a
|
@ -3,7 +3,9 @@ package kubernetes
|
||||||
import (
|
import (
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
|
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
||||||
httperror "github.com/portainer/portainer/pkg/libhttp/error"
|
httperror "github.com/portainer/portainer/pkg/libhttp/error"
|
||||||
|
"github.com/portainer/portainer/pkg/libhttp/request"
|
||||||
"github.com/portainer/portainer/pkg/libhttp/response"
|
"github.com/portainer/portainer/pkg/libhttp/response"
|
||||||
"github.com/rs/zerolog/log"
|
"github.com/rs/zerolog/log"
|
||||||
)
|
)
|
||||||
|
@ -43,3 +45,39 @@ func (handler *Handler) getAllKubernetesClusterRoleBindings(w http.ResponseWrite
|
||||||
|
|
||||||
return response.JSON(w, clusterrolebindings)
|
return response.JSON(w, clusterrolebindings)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// @id DeleteClusterRoleBindings
|
||||||
|
// @summary Delete cluster role bindings
|
||||||
|
// @description Delete the provided list of cluster role bindings.
|
||||||
|
// @description **Access policy**: Authenticated user.
|
||||||
|
// @tags kubernetes
|
||||||
|
// @security ApiKeyAuth || jwt
|
||||||
|
// @accept json
|
||||||
|
// @param id path int true "Environment identifier"
|
||||||
|
// @param payload body models.K8sClusterRoleBindingDeleteRequests true "A list of cluster role bindings to delete"
|
||||||
|
// @success 204 "Success"
|
||||||
|
// @failure 400 "Invalid request payload, such as missing required fields or fields not meeting validation criteria."
|
||||||
|
// @failure 401 "Unauthorized access - the user is not authenticated or does not have the necessary permissions. Ensure that you have provided a valid API key or JWT token, and that you have the required permissions."
|
||||||
|
// @failure 403 "Permission denied - the user is authenticated but does not have the necessary permissions to access the requested resource or perform the specified operation. Check your user roles and permissions."
|
||||||
|
// @failure 404 "Unable to find an environment with the specified identifier or unable to find a specific cluster role binding."
|
||||||
|
// @failure 500 "Server error occurred while attempting to delete cluster role bindings."
|
||||||
|
// @router /kubernetes/{id}/cluster_role_bindings/delete [POST]
|
||||||
|
func (handler *Handler) deleteClusterRoleBindings(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
|
var payload models.K8sClusterRoleBindingDeleteRequests
|
||||||
|
err := request.DecodeAndValidateJSONPayload(r, &payload)
|
||||||
|
if err != nil {
|
||||||
|
return httperror.BadRequest("Invalid request payload", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cli, handlerErr := handler.getProxyKubeClient(r)
|
||||||
|
if handlerErr != nil {
|
||||||
|
return handlerErr
|
||||||
|
}
|
||||||
|
|
||||||
|
err = cli.DeleteClusterRoleBindings(payload)
|
||||||
|
if err != nil {
|
||||||
|
return httperror.InternalServerError("Failed to delete cluster role bindings", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return response.Empty(w)
|
||||||
|
}
|
||||||
|
|
|
@ -3,7 +3,9 @@ package kubernetes
|
||||||
import (
|
import (
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
|
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
||||||
httperror "github.com/portainer/portainer/pkg/libhttp/error"
|
httperror "github.com/portainer/portainer/pkg/libhttp/error"
|
||||||
|
"github.com/portainer/portainer/pkg/libhttp/request"
|
||||||
"github.com/portainer/portainer/pkg/libhttp/response"
|
"github.com/portainer/portainer/pkg/libhttp/response"
|
||||||
"github.com/rs/zerolog/log"
|
"github.com/rs/zerolog/log"
|
||||||
)
|
)
|
||||||
|
@ -43,3 +45,39 @@ func (handler *Handler) getAllKubernetesClusterRoles(w http.ResponseWriter, r *h
|
||||||
|
|
||||||
return response.JSON(w, clusterroles)
|
return response.JSON(w, clusterroles)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// @id DeleteClusterRoles
|
||||||
|
// @summary Delete cluster roles
|
||||||
|
// @description Delete the provided list of cluster roles.
|
||||||
|
// @description **Access policy**: Authenticated user.
|
||||||
|
// @tags kubernetes
|
||||||
|
// @security ApiKeyAuth || jwt
|
||||||
|
// @accept json
|
||||||
|
// @param id path int true "Environment identifier"
|
||||||
|
// @param payload body models.K8sClusterRoleDeleteRequests true "A list of cluster roles to delete"
|
||||||
|
// @success 204 "Success"
|
||||||
|
// @failure 400 "Invalid request payload, such as missing required fields or fields not meeting validation criteria."
|
||||||
|
// @failure 401 "Unauthorized access - the user is not authenticated or does not have the necessary permissions. Ensure that you have provided a valid API key or JWT token, and that you have the required permissions."
|
||||||
|
// @failure 403 "Permission denied - the user is authenticated but does not have the necessary permissions to access the requested resource or perform the specified operation. Check your user roles and permissions."
|
||||||
|
// @failure 404 "Unable to find an environment with the specified identifier or unable to find a specific cluster role."
|
||||||
|
// @failure 500 "Server error occurred while attempting to delete cluster roles."
|
||||||
|
// @router /kubernetes/{id}/cluster_roles/delete [POST]
|
||||||
|
func (handler *Handler) deleteClusterRoles(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
|
var payload models.K8sClusterRoleDeleteRequests
|
||||||
|
err := request.DecodeAndValidateJSONPayload(r, &payload)
|
||||||
|
if err != nil {
|
||||||
|
return httperror.BadRequest("Invalid request payload", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cli, handlerErr := handler.getProxyKubeClient(r)
|
||||||
|
if handlerErr != nil {
|
||||||
|
return handlerErr
|
||||||
|
}
|
||||||
|
|
||||||
|
err = cli.DeleteClusterRoles(payload)
|
||||||
|
if err != nil {
|
||||||
|
return httperror.InternalServerError("Failed to delete cluster roles", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return response.Empty(w)
|
||||||
|
}
|
||||||
|
|
|
@ -56,7 +56,9 @@ func NewHandler(bouncer security.BouncerService, authorizationService *authoriza
|
||||||
endpointRouter.Handle("/configmaps", httperror.LoggerHandler(h.GetAllKubernetesConfigMaps)).Methods(http.MethodGet)
|
endpointRouter.Handle("/configmaps", httperror.LoggerHandler(h.GetAllKubernetesConfigMaps)).Methods(http.MethodGet)
|
||||||
endpointRouter.Handle("/configmaps/count", httperror.LoggerHandler(h.getAllKubernetesConfigMapsCount)).Methods(http.MethodGet)
|
endpointRouter.Handle("/configmaps/count", httperror.LoggerHandler(h.getAllKubernetesConfigMapsCount)).Methods(http.MethodGet)
|
||||||
endpointRouter.Handle("/cluster_roles", httperror.LoggerHandler(h.getAllKubernetesClusterRoles)).Methods(http.MethodGet)
|
endpointRouter.Handle("/cluster_roles", httperror.LoggerHandler(h.getAllKubernetesClusterRoles)).Methods(http.MethodGet)
|
||||||
|
endpointRouter.Handle("/cluster_roles/delete", httperror.LoggerHandler(h.deleteClusterRoles)).Methods(http.MethodPost)
|
||||||
endpointRouter.Handle("/cluster_role_bindings", httperror.LoggerHandler(h.getAllKubernetesClusterRoleBindings)).Methods(http.MethodGet)
|
endpointRouter.Handle("/cluster_role_bindings", httperror.LoggerHandler(h.getAllKubernetesClusterRoleBindings)).Methods(http.MethodGet)
|
||||||
|
endpointRouter.Handle("/cluster_role_bindings/delete", httperror.LoggerHandler(h.deleteClusterRoleBindings)).Methods(http.MethodPost)
|
||||||
endpointRouter.Handle("/configmaps", httperror.LoggerHandler(h.GetAllKubernetesConfigMaps)).Methods(http.MethodGet)
|
endpointRouter.Handle("/configmaps", httperror.LoggerHandler(h.GetAllKubernetesConfigMaps)).Methods(http.MethodGet)
|
||||||
endpointRouter.Handle("/configmaps/count", httperror.LoggerHandler(h.getAllKubernetesConfigMapsCount)).Methods(http.MethodGet)
|
endpointRouter.Handle("/configmaps/count", httperror.LoggerHandler(h.getAllKubernetesConfigMapsCount)).Methods(http.MethodGet)
|
||||||
endpointRouter.Handle("/dashboard", httperror.LoggerHandler(h.getKubernetesDashboard)).Methods(http.MethodGet)
|
endpointRouter.Handle("/dashboard", httperror.LoggerHandler(h.getKubernetesDashboard)).Methods(http.MethodGet)
|
||||||
|
@ -72,15 +74,12 @@ func NewHandler(bouncer security.BouncerService, authorizationService *authoriza
|
||||||
endpointRouter.Handle("/ingresses/delete", httperror.LoggerHandler(h.deleteKubernetesIngresses)).Methods(http.MethodPost)
|
endpointRouter.Handle("/ingresses/delete", httperror.LoggerHandler(h.deleteKubernetesIngresses)).Methods(http.MethodPost)
|
||||||
endpointRouter.Handle("/ingresses", httperror.LoggerHandler(h.GetAllKubernetesClusterIngresses)).Methods(http.MethodGet)
|
endpointRouter.Handle("/ingresses", httperror.LoggerHandler(h.GetAllKubernetesClusterIngresses)).Methods(http.MethodGet)
|
||||||
endpointRouter.Handle("/ingresses/count", httperror.LoggerHandler(h.getAllKubernetesClusterIngressesCount)).Methods(http.MethodGet)
|
endpointRouter.Handle("/ingresses/count", httperror.LoggerHandler(h.getAllKubernetesClusterIngressesCount)).Methods(http.MethodGet)
|
||||||
endpointRouter.Handle("/service_accounts", httperror.LoggerHandler(h.getAllKubernetesServiceAccounts)).Methods(http.MethodGet)
|
|
||||||
endpointRouter.Handle("/services", httperror.LoggerHandler(h.GetAllKubernetesServices)).Methods(http.MethodGet)
|
endpointRouter.Handle("/services", httperror.LoggerHandler(h.GetAllKubernetesServices)).Methods(http.MethodGet)
|
||||||
endpointRouter.Handle("/services/count", httperror.LoggerHandler(h.getAllKubernetesServicesCount)).Methods(http.MethodGet)
|
endpointRouter.Handle("/services/count", httperror.LoggerHandler(h.getAllKubernetesServicesCount)).Methods(http.MethodGet)
|
||||||
endpointRouter.Handle("/secrets", httperror.LoggerHandler(h.GetAllKubernetesSecrets)).Methods(http.MethodGet)
|
endpointRouter.Handle("/secrets", httperror.LoggerHandler(h.GetAllKubernetesSecrets)).Methods(http.MethodGet)
|
||||||
endpointRouter.Handle("/secrets/count", httperror.LoggerHandler(h.getAllKubernetesSecretsCount)).Methods(http.MethodGet)
|
endpointRouter.Handle("/secrets/count", httperror.LoggerHandler(h.getAllKubernetesSecretsCount)).Methods(http.MethodGet)
|
||||||
endpointRouter.Handle("/services/delete", httperror.LoggerHandler(h.deleteKubernetesServices)).Methods(http.MethodPost)
|
endpointRouter.Handle("/services/delete", httperror.LoggerHandler(h.deleteKubernetesServices)).Methods(http.MethodPost)
|
||||||
endpointRouter.Handle("/rbac_enabled", httperror.LoggerHandler(h.getKubernetesRBACStatus)).Methods(http.MethodGet)
|
endpointRouter.Handle("/rbac_enabled", httperror.LoggerHandler(h.getKubernetesRBACStatus)).Methods(http.MethodGet)
|
||||||
endpointRouter.Handle("/roles", httperror.LoggerHandler(h.getAllKubernetesRoles)).Methods(http.MethodGet)
|
|
||||||
endpointRouter.Handle("/role_bindings", httperror.LoggerHandler(h.getAllKubernetesRoleBindings)).Methods(http.MethodGet)
|
|
||||||
endpointRouter.Handle("/namespaces", httperror.LoggerHandler(h.createKubernetesNamespace)).Methods(http.MethodPost)
|
endpointRouter.Handle("/namespaces", httperror.LoggerHandler(h.createKubernetesNamespace)).Methods(http.MethodPost)
|
||||||
endpointRouter.Handle("/namespaces", httperror.LoggerHandler(h.updateKubernetesNamespace)).Methods(http.MethodPut)
|
endpointRouter.Handle("/namespaces", httperror.LoggerHandler(h.updateKubernetesNamespace)).Methods(http.MethodPut)
|
||||||
endpointRouter.Handle("/namespaces", httperror.LoggerHandler(h.deleteKubernetesNamespace)).Methods(http.MethodDelete)
|
endpointRouter.Handle("/namespaces", httperror.LoggerHandler(h.deleteKubernetesNamespace)).Methods(http.MethodDelete)
|
||||||
|
@ -89,6 +88,16 @@ func NewHandler(bouncer security.BouncerService, authorizationService *authoriza
|
||||||
endpointRouter.Handle("/namespaces/{namespace}", httperror.LoggerHandler(h.getKubernetesNamespace)).Methods(http.MethodGet)
|
endpointRouter.Handle("/namespaces/{namespace}", httperror.LoggerHandler(h.getKubernetesNamespace)).Methods(http.MethodGet)
|
||||||
endpointRouter.Handle("/volumes", httperror.LoggerHandler(h.GetAllKubernetesVolumes)).Methods(http.MethodGet)
|
endpointRouter.Handle("/volumes", httperror.LoggerHandler(h.GetAllKubernetesVolumes)).Methods(http.MethodGet)
|
||||||
endpointRouter.Handle("/volumes/count", httperror.LoggerHandler(h.getAllKubernetesVolumesCount)).Methods(http.MethodGet)
|
endpointRouter.Handle("/volumes/count", httperror.LoggerHandler(h.getAllKubernetesVolumesCount)).Methods(http.MethodGet)
|
||||||
|
endpointRouter.Handle("/service_accounts", httperror.LoggerHandler(h.getAllKubernetesServiceAccounts)).Methods(http.MethodGet)
|
||||||
|
endpointRouter.Handle("/service_accounts/delete", httperror.LoggerHandler(h.deleteKubernetesServiceAccounts)).Methods(http.MethodPost)
|
||||||
|
endpointRouter.Handle("/roles", httperror.LoggerHandler(h.getAllKubernetesRoles)).Methods(http.MethodGet)
|
||||||
|
endpointRouter.Handle("/roles/delete", httperror.LoggerHandler(h.deleteRoles)).Methods(http.MethodPost)
|
||||||
|
endpointRouter.Handle("/role_bindings", httperror.LoggerHandler(h.getAllKubernetesRoleBindings)).Methods(http.MethodGet)
|
||||||
|
endpointRouter.Handle("/role_bindings/delete", httperror.LoggerHandler(h.deleteRoleBindings)).Methods(http.MethodPost)
|
||||||
|
endpointRouter.Handle("/cluster_roles", httperror.LoggerHandler(h.getAllKubernetesClusterRoles)).Methods(http.MethodGet)
|
||||||
|
endpointRouter.Handle("/cluster_roles/delete", httperror.LoggerHandler(h.deleteClusterRoles)).Methods(http.MethodPost)
|
||||||
|
endpointRouter.Handle("/cluster_role_bindings", httperror.LoggerHandler(h.getAllKubernetesClusterRoleBindings)).Methods(http.MethodGet)
|
||||||
|
endpointRouter.Handle("/cluster_role_bindings/delete", httperror.LoggerHandler(h.deleteClusterRoleBindings)).Methods(http.MethodPost)
|
||||||
|
|
||||||
// namespaces
|
// namespaces
|
||||||
// in the future this piece of code might be in another package (or a few different packages - namespaces/namespace?)
|
// in the future this piece of code might be in another package (or a few different packages - namespaces/namespace?)
|
||||||
|
|
|
@ -3,7 +3,9 @@ package kubernetes
|
||||||
import (
|
import (
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
|
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
||||||
httperror "github.com/portainer/portainer/pkg/libhttp/error"
|
httperror "github.com/portainer/portainer/pkg/libhttp/error"
|
||||||
|
"github.com/portainer/portainer/pkg/libhttp/request"
|
||||||
"github.com/portainer/portainer/pkg/libhttp/response"
|
"github.com/portainer/portainer/pkg/libhttp/response"
|
||||||
"github.com/rs/zerolog/log"
|
"github.com/rs/zerolog/log"
|
||||||
)
|
)
|
||||||
|
@ -38,3 +40,38 @@ func (handler *Handler) getAllKubernetesRoleBindings(w http.ResponseWriter, r *h
|
||||||
|
|
||||||
return response.JSON(w, rolebindings)
|
return response.JSON(w, rolebindings)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// @id DeleteRoleBindings
|
||||||
|
// @summary Delete role bindings
|
||||||
|
// @description Delete the provided list of role bindings.
|
||||||
|
// @description **Access policy**: Authenticated user.
|
||||||
|
// @tags kubernetes
|
||||||
|
// @security ApiKeyAuth || jwt
|
||||||
|
// @accept json
|
||||||
|
// @param id path int true "Environment identifier"
|
||||||
|
// @param payload body models.K8sRoleBindingDeleteRequests true "A map where the key is the namespace and the value is an array of role bindings to delete"
|
||||||
|
// @success 204 "Success"
|
||||||
|
// @failure 400 "Invalid request payload, such as missing required fields or fields not meeting validation criteria."
|
||||||
|
// @failure 401 "Unauthorized access - the user is not authenticated or does not have the necessary permissions. Ensure that you have provided a valid API key or JWT token, and that you have the required permissions."
|
||||||
|
// @failure 403 "Permission denied - the user is authenticated but does not have the necessary permissions to access the requested resource or perform the specified operation. Check your user roles and permissions."
|
||||||
|
// @failure 404 "Unable to find an environment with the specified identifier or unable to find a specific role binding."
|
||||||
|
// @failure 500 "Server error occurred while attempting to delete role bindings."
|
||||||
|
// @router /kubernetes/{id}/role_bindings/delete [POST]
|
||||||
|
func (h *Handler) deleteRoleBindings(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
|
var payload models.K8sRoleBindingDeleteRequests
|
||||||
|
|
||||||
|
if err := request.DecodeAndValidateJSONPayload(r, &payload); err != nil {
|
||||||
|
return httperror.BadRequest("Invalid request payload", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cli, handlerErr := h.getProxyKubeClient(r)
|
||||||
|
if handlerErr != nil {
|
||||||
|
return handlerErr
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := cli.DeleteRoleBindings(payload); err != nil {
|
||||||
|
return httperror.InternalServerError("Failed to delete role bindings", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return response.Empty(w)
|
||||||
|
}
|
||||||
|
|
|
@ -3,7 +3,9 @@ package kubernetes
|
||||||
import (
|
import (
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
|
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
||||||
httperror "github.com/portainer/portainer/pkg/libhttp/error"
|
httperror "github.com/portainer/portainer/pkg/libhttp/error"
|
||||||
|
"github.com/portainer/portainer/pkg/libhttp/request"
|
||||||
"github.com/portainer/portainer/pkg/libhttp/response"
|
"github.com/portainer/portainer/pkg/libhttp/response"
|
||||||
"github.com/rs/zerolog/log"
|
"github.com/rs/zerolog/log"
|
||||||
)
|
)
|
||||||
|
@ -38,3 +40,39 @@ func (handler *Handler) getAllKubernetesRoles(w http.ResponseWriter, r *http.Req
|
||||||
|
|
||||||
return response.JSON(w, roles)
|
return response.JSON(w, roles)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// @id DeleteRoles
|
||||||
|
// @summary Delete roles
|
||||||
|
// @description Delete the provided list of roles.
|
||||||
|
// @description **Access policy**: Authenticated user.
|
||||||
|
// @tags kubernetes
|
||||||
|
// @security ApiKeyAuth || jwt
|
||||||
|
// @accept json
|
||||||
|
// @param id path int true "Environment identifier"
|
||||||
|
// @param payload body models.K8sRoleDeleteRequests true "A map where the key is the namespace and the value is an array of roles to delete"
|
||||||
|
// @success 204 "Success"
|
||||||
|
// @failure 400 "Invalid request payload, such as missing required fields or fields not meeting validation criteria."
|
||||||
|
// @failure 401 "Unauthorized access - the user is not authenticated or does not have the necessary permissions. Ensure that you have provided a valid API key or JWT token, and that you have the required permissions."
|
||||||
|
// @failure 403 "Permission denied - the user is authenticated but does not have the necessary permissions to access the requested resource or perform the specified operation. Check your user roles and permissions."
|
||||||
|
// @failure 404 "Unable to find an environment with the specified identifier or unable to find a specific role."
|
||||||
|
// @failure 500 "Server error occurred while attempting to delete roles."
|
||||||
|
// @router /kubernetes/{id}/roles/delete [POST]
|
||||||
|
func (h *Handler) deleteRoles(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
|
var payload models.K8sRoleDeleteRequests
|
||||||
|
err := request.DecodeAndValidateJSONPayload(r, &payload)
|
||||||
|
if err != nil {
|
||||||
|
return httperror.BadRequest("Invalid request payload", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cli, handlerErr := h.getProxyKubeClient(r)
|
||||||
|
if handlerErr != nil {
|
||||||
|
return handlerErr
|
||||||
|
}
|
||||||
|
|
||||||
|
err = cli.DeleteRoles(payload)
|
||||||
|
if err != nil {
|
||||||
|
return httperror.InternalServerError("Failed to delete roles", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return response.Empty(w)
|
||||||
|
}
|
||||||
|
|
|
@ -3,7 +3,9 @@ package kubernetes
|
||||||
import (
|
import (
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
|
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
||||||
httperror "github.com/portainer/portainer/pkg/libhttp/error"
|
httperror "github.com/portainer/portainer/pkg/libhttp/error"
|
||||||
|
"github.com/portainer/portainer/pkg/libhttp/request"
|
||||||
"github.com/portainer/portainer/pkg/libhttp/response"
|
"github.com/portainer/portainer/pkg/libhttp/response"
|
||||||
"github.com/rs/zerolog/log"
|
"github.com/rs/zerolog/log"
|
||||||
)
|
)
|
||||||
|
@ -38,3 +40,39 @@ func (handler *Handler) getAllKubernetesServiceAccounts(w http.ResponseWriter, r
|
||||||
|
|
||||||
return response.JSON(w, serviceAccounts)
|
return response.JSON(w, serviceAccounts)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// @id DeleteServiceAccounts
|
||||||
|
// @summary Delete service accounts
|
||||||
|
// @description Delete the provided list of service accounts.
|
||||||
|
// @description **Access policy**: Authenticated user.
|
||||||
|
// @tags kubernetes
|
||||||
|
// @security ApiKeyAuth || jwt
|
||||||
|
// @accept json
|
||||||
|
// @param id path int true "Environment identifier"
|
||||||
|
// @param payload body models.K8sServiceAccountDeleteRequests true "A map where the key is the namespace and the value is an array of service accounts to delete"
|
||||||
|
// @success 204 "Success"
|
||||||
|
// @failure 400 "Invalid request payload, such as missing required fields or fields not meeting validation criteria."
|
||||||
|
// @failure 401 "Unauthorized access - the user is not authenticated or does not have the necessary permissions. Ensure that you have provided a valid API key or JWT token, and that you have the required permissions."
|
||||||
|
// @failure 403 "Permission denied - the user is authenticated but does not have the necessary permissions to access the requested resource or perform the specified operation. Check your user roles and permissions."
|
||||||
|
// @failure 404 "Unable to find an environment with the specified identifier or unable to find a specific service account."
|
||||||
|
// @failure 500 "Server error occurred while attempting to delete service accounts."
|
||||||
|
// @router /kubernetes/{id}/service_accounts/delete [POST]
|
||||||
|
func (handler *Handler) deleteKubernetesServiceAccounts(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
||||||
|
var payload models.K8sServiceAccountDeleteRequests
|
||||||
|
err := request.DecodeAndValidateJSONPayload(r, &payload)
|
||||||
|
if err != nil {
|
||||||
|
return httperror.BadRequest("Invalid request payload", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cli, handlerErr := handler.getProxyKubeClient(r)
|
||||||
|
if handlerErr != nil {
|
||||||
|
return handlerErr
|
||||||
|
}
|
||||||
|
|
||||||
|
err = cli.DeleteServiceAccounts(payload)
|
||||||
|
if err != nil {
|
||||||
|
return httperror.InternalServerError("Unable to delete service accounts", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return response.Empty(w)
|
||||||
|
}
|
||||||
|
|
|
@ -1,16 +1,33 @@
|
||||||
package kubernetes
|
package kubernetes
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"errors"
|
||||||
|
"net/http"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
rbacv1 "k8s.io/api/rbac/v1"
|
rbacv1 "k8s.io/api/rbac/v1"
|
||||||
|
"k8s.io/apimachinery/pkg/types"
|
||||||
)
|
)
|
||||||
|
|
||||||
type (
|
type (
|
||||||
K8sClusterRoleBinding struct {
|
K8sClusterRoleBinding struct {
|
||||||
Name string `json:"name"`
|
Name string `json:"name"`
|
||||||
|
UID types.UID `json:"uid"`
|
||||||
|
Namespace string `json:"namespace"`
|
||||||
RoleRef rbacv1.RoleRef `json:"roleRef"`
|
RoleRef rbacv1.RoleRef `json:"roleRef"`
|
||||||
Subjects []rbacv1.Subject `json:"subjects"`
|
Subjects []rbacv1.Subject `json:"subjects"`
|
||||||
CreationDate time.Time `json:"creationDate"`
|
CreationDate time.Time `json:"creationDate"`
|
||||||
|
IsSystem bool `json:"isSystem"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// K8sRoleBindingDeleteRequests slice of cluster role cluster bindings.
|
||||||
|
K8sClusterRoleBindingDeleteRequests []string
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func (r K8sClusterRoleBindingDeleteRequests) Validate(request *http.Request) error {
|
||||||
|
if len(r) == 0 {
|
||||||
|
return errors.New("missing deletion request list in payload")
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
|
@ -1,8 +1,28 @@
|
||||||
package kubernetes
|
package kubernetes
|
||||||
|
|
||||||
import "time"
|
import (
|
||||||
|
"errors"
|
||||||
|
"net/http"
|
||||||
|
"time"
|
||||||
|
|
||||||
type K8sClusterRole struct {
|
"k8s.io/apimachinery/pkg/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
type (
|
||||||
|
K8sClusterRole struct {
|
||||||
Name string `json:"name"`
|
Name string `json:"name"`
|
||||||
|
UID types.UID `json:"uid"`
|
||||||
CreationDate time.Time `json:"creationDate"`
|
CreationDate time.Time `json:"creationDate"`
|
||||||
|
IsSystem bool `json:"isSystem"`
|
||||||
|
}
|
||||||
|
|
||||||
|
K8sClusterRoleDeleteRequests []string
|
||||||
|
)
|
||||||
|
|
||||||
|
func (r K8sClusterRoleDeleteRequests) Validate(request *http.Request) error {
|
||||||
|
if len(r) == 0 {
|
||||||
|
return errors.New("missing deletion request list in payload")
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,17 +1,38 @@
|
||||||
package kubernetes
|
package kubernetes
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"errors"
|
||||||
|
"net/http"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
rbacv1 "k8s.io/api/rbac/v1"
|
rbacv1 "k8s.io/api/rbac/v1"
|
||||||
|
"k8s.io/apimachinery/pkg/types"
|
||||||
)
|
)
|
||||||
|
|
||||||
type (
|
type (
|
||||||
K8sRoleBinding struct {
|
K8sRoleBinding struct {
|
||||||
Name string `json:"name"`
|
Name string `json:"name"`
|
||||||
|
UID types.UID `json:"uid"`
|
||||||
Namespace string `json:"namespace"`
|
Namespace string `json:"namespace"`
|
||||||
RoleRef rbacv1.RoleRef `json:"roleRef"`
|
RoleRef rbacv1.RoleRef `json:"roleRef"`
|
||||||
Subjects []rbacv1.Subject `json:"subjects"`
|
Subjects []rbacv1.Subject `json:"subjects"`
|
||||||
CreationDate time.Time `json:"creationDate"`
|
CreationDate time.Time `json:"creationDate"`
|
||||||
|
IsSystem bool `json:"isSystem"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// K8sRoleBindingDeleteRequests is a mapping of namespace names to a slice of role bindings.
|
||||||
|
K8sRoleBindingDeleteRequests map[string][]string
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func (r K8sRoleBindingDeleteRequests) Validate(request *http.Request) error {
|
||||||
|
if len(r) == 0 {
|
||||||
|
return errors.New("missing deletion request list in payload")
|
||||||
|
}
|
||||||
|
|
||||||
|
for ns := range r {
|
||||||
|
if len(ns) == 0 {
|
||||||
|
return errors.New("deletion given with empty namespace")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
|
@ -1,9 +1,36 @@
|
||||||
package kubernetes
|
package kubernetes
|
||||||
|
|
||||||
import "time"
|
import (
|
||||||
|
"errors"
|
||||||
|
"net/http"
|
||||||
|
"time"
|
||||||
|
|
||||||
type K8sRole struct {
|
"k8s.io/apimachinery/pkg/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
type (
|
||||||
|
K8sRole struct {
|
||||||
Name string `json:"name"`
|
Name string `json:"name"`
|
||||||
|
UID types.UID `json:"uid"`
|
||||||
Namespace string `json:"namespace"`
|
Namespace string `json:"namespace"`
|
||||||
CreationDate time.Time `json:"creationDate"`
|
CreationDate time.Time `json:"creationDate"`
|
||||||
|
// isSystem is true if prefixed with "system:" or exists in the kube-system namespace
|
||||||
|
// or is one of the portainer roles
|
||||||
|
IsSystem bool `json:"isSystem"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// K8sRoleDeleteRequests is a mapping of namespace names to a slice of roles.
|
||||||
|
K8sRoleDeleteRequests map[string][]string
|
||||||
|
)
|
||||||
|
|
||||||
|
func (r K8sRoleDeleteRequests) Validate(request *http.Request) error {
|
||||||
|
if len(r) == 0 {
|
||||||
|
return errors.New("missing deletion request list in payload")
|
||||||
|
}
|
||||||
|
for ns := range r {
|
||||||
|
if len(ns) == 0 {
|
||||||
|
return errors.New("deletion given with empty namespace")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,9 +1,34 @@
|
||||||
package kubernetes
|
package kubernetes
|
||||||
|
|
||||||
import "time"
|
import (
|
||||||
|
"errors"
|
||||||
|
"net/http"
|
||||||
|
"time"
|
||||||
|
|
||||||
type K8sServiceAccount struct {
|
"k8s.io/apimachinery/pkg/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
type (
|
||||||
|
K8sServiceAccount struct {
|
||||||
Name string `json:"name"`
|
Name string `json:"name"`
|
||||||
|
UID types.UID `json:"uid"`
|
||||||
Namespace string `json:"namespace"`
|
Namespace string `json:"namespace"`
|
||||||
CreationDate time.Time `json:"creationDate"`
|
CreationDate time.Time `json:"creationDate"`
|
||||||
|
IsSystem bool `json:"isSystem"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// K8sServiceAcountDeleteRequests is a mapping of namespace names to a slice of service account names.
|
||||||
|
K8sServiceAccountDeleteRequests map[string][]string
|
||||||
|
)
|
||||||
|
|
||||||
|
func (r K8sServiceAccountDeleteRequests) Validate(request *http.Request) error {
|
||||||
|
if len(r) == 0 {
|
||||||
|
return errors.New("missing deletion request list in payload")
|
||||||
|
}
|
||||||
|
for ns := range r {
|
||||||
|
if len(ns) == 0 {
|
||||||
|
return errors.New("deletion given with empty namespace")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,18 @@
|
||||||
|
package errorlist
|
||||||
|
|
||||||
|
import "errors"
|
||||||
|
|
||||||
|
// Combine a slice of errors into a single error
|
||||||
|
// to use this, generate errors by appending to errorList in a loop, then return combine(errorList)
|
||||||
|
func Combine(errorList []error) error {
|
||||||
|
if len(errorList) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
errorMsg := "Multiple errors occurred:"
|
||||||
|
for _, err := range errorList {
|
||||||
|
errorMsg += "\n" + err.Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
return errors.New(errorMsg)
|
||||||
|
}
|
|
@ -3,10 +3,14 @@ package cli
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"errors"
|
"errors"
|
||||||
|
"strings"
|
||||||
|
|
||||||
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
||||||
|
"github.com/portainer/portainer/api/internal/errorlist"
|
||||||
|
"github.com/rs/zerolog/log"
|
||||||
rbacv1 "k8s.io/api/rbac/v1"
|
rbacv1 "k8s.io/api/rbac/v1"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
k8serrors "k8s.io/apimachinery/pkg/api/errors"
|
||||||
|
meta "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
// GetClusterRoles gets all the clusterRoles for at the cluster level in a k8s endpoint.
|
// GetClusterRoles gets all the clusterRoles for at the cluster level in a k8s endpoint.
|
||||||
|
@ -21,7 +25,7 @@ func (kcl *KubeClient) GetClusterRoles() ([]models.K8sClusterRole, error) {
|
||||||
|
|
||||||
// fetchClusterRoles returns a list of all Roles in the specified namespace.
|
// fetchClusterRoles returns a list of all Roles in the specified namespace.
|
||||||
func (kcl *KubeClient) fetchClusterRoles() ([]models.K8sClusterRole, error) {
|
func (kcl *KubeClient) fetchClusterRoles() ([]models.K8sClusterRole, error) {
|
||||||
clusterRoles, err := kcl.cli.RbacV1().ClusterRoles().List(context.TODO(), metav1.ListOptions{})
|
clusterRoles, err := kcl.cli.RbacV1().ClusterRoles().List(context.TODO(), meta.ListOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -39,5 +43,61 @@ func parseClusterRole(clusterRole rbacv1.ClusterRole) models.K8sClusterRole {
|
||||||
return models.K8sClusterRole{
|
return models.K8sClusterRole{
|
||||||
Name: clusterRole.Name,
|
Name: clusterRole.Name,
|
||||||
CreationDate: clusterRole.CreationTimestamp.Time,
|
CreationDate: clusterRole.CreationTimestamp.Time,
|
||||||
|
UID: clusterRole.UID,
|
||||||
|
IsSystem: isSystemClusterRole(&clusterRole),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (kcl *KubeClient) DeleteClusterRoles(req models.K8sClusterRoleDeleteRequests) error {
|
||||||
|
var errors []error
|
||||||
|
for _, name := range req {
|
||||||
|
client := kcl.cli.RbacV1().ClusterRoles()
|
||||||
|
|
||||||
|
clusterRole, err := client.Get(context.Background(), name, meta.GetOptions{})
|
||||||
|
if err != nil {
|
||||||
|
if k8serrors.IsNotFound(err) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
// this is a more serious error to do with the client so we return right away
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if isSystemClusterRole(clusterRole) {
|
||||||
|
log.Warn().Str("role_name", name).Msg("ignoring delete of 'system' cluster role, not allowed")
|
||||||
|
}
|
||||||
|
|
||||||
|
err = client.Delete(context.Background(), name, meta.DeleteOptions{})
|
||||||
|
if err != nil {
|
||||||
|
log.Err(err).Str("role_name", name).Msg("unable to delete the cluster role")
|
||||||
|
errors = append(errors, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return errorlist.Combine(errors)
|
||||||
|
}
|
||||||
|
|
||||||
|
func isSystemClusterRole(role *rbacv1.ClusterRole) bool {
|
||||||
|
if role.Namespace == "kube-system" || role.Namespace == "kube-public" ||
|
||||||
|
role.Namespace == "kube-node-lease" || role.Namespace == "portainer" {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
if strings.HasPrefix(role.Name, "system:") {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
if role.Labels != nil {
|
||||||
|
if role.Labels["kubernetes.io/bootstrapping"] == "rbac-defaults" {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
roles := getPortainerDefaultK8sRoleNames()
|
||||||
|
for i := range roles {
|
||||||
|
if role.Name == roles[i] {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
|
@ -3,9 +3,13 @@ package cli
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"errors"
|
"errors"
|
||||||
|
"strings"
|
||||||
|
|
||||||
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
||||||
|
"github.com/portainer/portainer/api/internal/errorlist"
|
||||||
|
"github.com/rs/zerolog/log"
|
||||||
rbacv1 "k8s.io/api/rbac/v1"
|
rbacv1 "k8s.io/api/rbac/v1"
|
||||||
|
k8serrors "k8s.io/apimachinery/pkg/api/errors"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -38,8 +42,70 @@ func (kcl *KubeClient) fetchClusterRoleBindings() ([]models.K8sClusterRoleBindin
|
||||||
func parseClusterRoleBinding(clusterRoleBinding rbacv1.ClusterRoleBinding) models.K8sClusterRoleBinding {
|
func parseClusterRoleBinding(clusterRoleBinding rbacv1.ClusterRoleBinding) models.K8sClusterRoleBinding {
|
||||||
return models.K8sClusterRoleBinding{
|
return models.K8sClusterRoleBinding{
|
||||||
Name: clusterRoleBinding.Name,
|
Name: clusterRoleBinding.Name,
|
||||||
|
UID: clusterRoleBinding.UID,
|
||||||
|
Namespace: clusterRoleBinding.Namespace,
|
||||||
RoleRef: clusterRoleBinding.RoleRef,
|
RoleRef: clusterRoleBinding.RoleRef,
|
||||||
Subjects: clusterRoleBinding.Subjects,
|
Subjects: clusterRoleBinding.Subjects,
|
||||||
CreationDate: clusterRoleBinding.CreationTimestamp.Time,
|
CreationDate: clusterRoleBinding.CreationTimestamp.Time,
|
||||||
|
IsSystem: isSystemClusterRoleBinding(&clusterRoleBinding),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// DeleteClusterRoleBindings processes a K8sClusterRoleBindingDeleteRequest
|
||||||
|
// by deleting each cluster role binding in its given namespace. If deleting a specific cluster role binding
|
||||||
|
// fails, the error is logged and we continue to delete the remaining cluster role bindings.
|
||||||
|
func (kcl *KubeClient) DeleteClusterRoleBindings(reqs models.K8sClusterRoleBindingDeleteRequests) error {
|
||||||
|
var errors []error
|
||||||
|
|
||||||
|
for _, name := range reqs {
|
||||||
|
client := kcl.cli.RbacV1().ClusterRoleBindings()
|
||||||
|
|
||||||
|
clusterRoleBinding, err := client.Get(context.Background(), name, metav1.GetOptions{})
|
||||||
|
if err != nil {
|
||||||
|
if k8serrors.IsNotFound(err) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// This is a more serious error to do with the client so we return right away
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if isSystemClusterRoleBinding(clusterRoleBinding) {
|
||||||
|
log.Warn().Str("role_name", name).Msg("ignoring delete of 'system' cluster role binding, not allowed")
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := client.Delete(context.Background(), name, metav1.DeleteOptions{}); err != nil {
|
||||||
|
log.Err(err).Str("role_name", name).Msg("unable to delete the cluster role binding")
|
||||||
|
errors = append(errors, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return errorlist.Combine(errors)
|
||||||
|
}
|
||||||
|
|
||||||
|
func isSystemClusterRoleBinding(binding *rbacv1.ClusterRoleBinding) bool {
|
||||||
|
if strings.HasPrefix(binding.Name, "system:") {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
if binding.Labels != nil {
|
||||||
|
if binding.Labels["kubernetes.io/bootstrapping"] == "rbac-defaults" {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, sub := range binding.Subjects {
|
||||||
|
if strings.HasPrefix(sub.Name, "system:") {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
if sub.Namespace == "kube-system" ||
|
||||||
|
sub.Namespace == "kube-public" ||
|
||||||
|
sub.Namespace == "kube-node-lease" ||
|
||||||
|
sub.Namespace == "portainer" {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
|
@ -94,7 +94,7 @@ func parseNamespace(namespace *corev1.Namespace) portainer.K8sNamespaceInfo {
|
||||||
Status: namespace.Status,
|
Status: namespace.Status,
|
||||||
CreationDate: namespace.CreationTimestamp.Format(time.RFC3339),
|
CreationDate: namespace.CreationTimestamp.Format(time.RFC3339),
|
||||||
NamespaceOwner: namespace.Labels[namespaceOwnerLabel],
|
NamespaceOwner: namespace.Labels[namespaceOwnerLabel],
|
||||||
IsSystem: isSystemNamespace(*namespace),
|
IsSystem: isSystemNamespace(namespace),
|
||||||
IsDefault: namespace.Name == defaultNamespace,
|
IsDefault: namespace.Name == defaultNamespace,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -171,7 +171,7 @@ func (kcl *KubeClient) CreateNamespace(info models.K8sNamespaceDetails) (*corev1
|
||||||
return namespace, nil
|
return namespace, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func isSystemNamespace(namespace corev1.Namespace) bool {
|
func isSystemNamespace(namespace *corev1.Namespace) bool {
|
||||||
systemLabelValue, hasSystemLabel := namespace.Labels[systemNamespaceLabel]
|
systemLabelValue, hasSystemLabel := namespace.Labels[systemNamespaceLabel]
|
||||||
if hasSystemLabel {
|
if hasSystemLabel {
|
||||||
return systemLabelValue == "true"
|
return systemLabelValue == "true"
|
||||||
|
@ -184,6 +184,15 @@ func isSystemNamespace(namespace corev1.Namespace) bool {
|
||||||
return isSystem
|
return isSystem
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (kcl *KubeClient) isSystemNamespace(namespace string) bool {
|
||||||
|
ns, err := kcl.cli.CoreV1().Namespaces().Get(context.TODO(), namespace, metav1.GetOptions{})
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
return isSystemNamespace(ns)
|
||||||
|
}
|
||||||
|
|
||||||
// ToggleSystemState will set a namespace as a system namespace, or remove this state
|
// ToggleSystemState will set a namespace as a system namespace, or remove this state
|
||||||
// if isSystem is true it will set `systemNamespaceLabel` to "true" and false otherwise
|
// if isSystem is true it will set `systemNamespaceLabel` to "true" and false otherwise
|
||||||
// this will skip if namespace is "default" or if the required state is already set
|
// this will skip if namespace is "default" or if the required state is already set
|
||||||
|
@ -199,7 +208,7 @@ func (kcl *KubeClient) ToggleSystemState(namespaceName string, isSystem bool) er
|
||||||
return errors.Wrap(err, "failed fetching namespace object")
|
return errors.Wrap(err, "failed fetching namespace object")
|
||||||
}
|
}
|
||||||
|
|
||||||
if isSystemNamespace(*namespace) == isSystem {
|
if isSystemNamespace(namespace) == isSystem {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -65,7 +65,7 @@ func Test_ToggleSystemState(t *testing.T) {
|
||||||
ns, err := kcl.cli.CoreV1().Namespaces().Get(context.Background(), nsName, metav1.GetOptions{})
|
ns, err := kcl.cli.CoreV1().Namespaces().Get(context.Background(), nsName, metav1.GetOptions{})
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
|
|
||||||
assert.Equal(t, test.isSystem, isSystemNamespace(*ns))
|
assert.Equal(t, test.isSystem, isSystemNamespace(ns))
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
|
@ -2,11 +2,15 @@ package cli
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"strings"
|
||||||
|
|
||||||
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
||||||
|
"github.com/portainer/portainer/api/internal/errorlist"
|
||||||
|
"github.com/rs/zerolog/log"
|
||||||
rbacv1 "k8s.io/api/rbac/v1"
|
rbacv1 "k8s.io/api/rbac/v1"
|
||||||
k8serrors "k8s.io/apimachinery/pkg/api/errors"
|
k8serrors "k8s.io/apimachinery/pkg/api/errors"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
// GetRoles gets all the roles for either at the cluster level or a given namespace in a k8s endpoint.
|
// GetRoles gets all the roles for either at the cluster level or a given namespace in a k8s endpoint.
|
||||||
|
@ -48,18 +52,20 @@ func (kcl *KubeClient) fetchRoles(namespace string) ([]models.K8sRole, error) {
|
||||||
|
|
||||||
results := make([]models.K8sRole, 0)
|
results := make([]models.K8sRole, 0)
|
||||||
for _, role := range roles.Items {
|
for _, role := range roles.Items {
|
||||||
results = append(results, parseRole(role))
|
results = append(results, kcl.parseRole(role))
|
||||||
}
|
}
|
||||||
|
|
||||||
return results, nil
|
return results, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// parseRole converts a rbacv1.Role object to a models.K8sRole object.
|
// parseRole converts a rbacv1.Role object to a models.K8sRole object.
|
||||||
func parseRole(role rbacv1.Role) models.K8sRole {
|
func (kcl *KubeClient) parseRole(role rbacv1.Role) models.K8sRole {
|
||||||
return models.K8sRole{
|
return models.K8sRole{
|
||||||
Name: role.Name,
|
Name: role.Name,
|
||||||
|
UID: role.UID,
|
||||||
Namespace: role.Namespace,
|
Namespace: role.Namespace,
|
||||||
CreationDate: role.CreationTimestamp.Time,
|
CreationDate: role.CreationTimestamp.Time,
|
||||||
|
IsSystem: kcl.isSystemRole(&role),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -108,3 +114,48 @@ func (kcl *KubeClient) upsertPortainerK8sClusterRoles() error {
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func getPortainerDefaultK8sRoleNames() []string {
|
||||||
|
return []string{
|
||||||
|
string(portainerUserCRName),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (kcl *KubeClient) isSystemRole(role *rbacv1.Role) bool {
|
||||||
|
if strings.HasPrefix(role.Name, "system:") {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
return kcl.isSystemNamespace(role.Namespace)
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteRoles processes a K8sServiceDeleteRequest by deleting each role
|
||||||
|
// in its given namespace.
|
||||||
|
func (kcl *KubeClient) DeleteRoles(reqs models.K8sRoleDeleteRequests) error {
|
||||||
|
var errors []error
|
||||||
|
for namespace := range reqs {
|
||||||
|
for _, name := range reqs[namespace] {
|
||||||
|
client := kcl.cli.RbacV1().Roles(namespace)
|
||||||
|
|
||||||
|
role, err := client.Get(context.Background(), name, v1.GetOptions{})
|
||||||
|
if err != nil {
|
||||||
|
if k8serrors.IsNotFound(err) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// This is a more serious error to do with the client so we return right away
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if kcl.isSystemRole(role) {
|
||||||
|
log.Error().Str("role_name", name).Msg("ignoring delete of 'system' role, not allowed")
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := client.Delete(context.TODO(), name, metav1.DeleteOptions{}); err != nil {
|
||||||
|
errors = append(errors, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return errorlist.Combine(errors)
|
||||||
|
}
|
||||||
|
|
|
@ -2,10 +2,16 @@ package cli
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"strings"
|
||||||
|
|
||||||
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
||||||
|
"github.com/portainer/portainer/api/internal/errorlist"
|
||||||
|
"github.com/rs/zerolog/log"
|
||||||
|
corev1 "k8s.io/api/rbac/v1"
|
||||||
rbacv1 "k8s.io/api/rbac/v1"
|
rbacv1 "k8s.io/api/rbac/v1"
|
||||||
|
k8serrors "k8s.io/apimachinery/pkg/api/errors"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
// GetRoleBindings gets all the roleBindings for either at the cluster level or a given namespace in a k8s endpoint.
|
// GetRoleBindings gets all the roleBindings for either at the cluster level or a given namespace in a k8s endpoint.
|
||||||
|
@ -47,19 +53,82 @@ func (kcl *KubeClient) fetchRoleBindings(namespace string) ([]models.K8sRoleBind
|
||||||
|
|
||||||
results := make([]models.K8sRoleBinding, 0)
|
results := make([]models.K8sRoleBinding, 0)
|
||||||
for _, roleBinding := range roleBindings.Items {
|
for _, roleBinding := range roleBindings.Items {
|
||||||
results = append(results, parseRoleBinding(roleBinding))
|
results = append(results, kcl.parseRoleBinding(roleBinding))
|
||||||
}
|
}
|
||||||
|
|
||||||
return results, nil
|
return results, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// parseRoleBinding converts a rbacv1.RoleBinding object to a models.K8sRoleBinding object.
|
// parseRoleBinding converts a rbacv1.RoleBinding object to a models.K8sRoleBinding object.
|
||||||
func parseRoleBinding(roleBinding rbacv1.RoleBinding) models.K8sRoleBinding {
|
func (kcl *KubeClient) parseRoleBinding(roleBinding rbacv1.RoleBinding) models.K8sRoleBinding {
|
||||||
return models.K8sRoleBinding{
|
return models.K8sRoleBinding{
|
||||||
Name: roleBinding.Name,
|
Name: roleBinding.Name,
|
||||||
|
UID: roleBinding.UID,
|
||||||
Namespace: roleBinding.Namespace,
|
Namespace: roleBinding.Namespace,
|
||||||
RoleRef: roleBinding.RoleRef,
|
RoleRef: roleBinding.RoleRef,
|
||||||
Subjects: roleBinding.Subjects,
|
Subjects: roleBinding.Subjects,
|
||||||
CreationDate: roleBinding.CreationTimestamp.Time,
|
CreationDate: roleBinding.CreationTimestamp.Time,
|
||||||
|
IsSystem: kcl.isSystemRoleBinding(&roleBinding),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (kcl *KubeClient) isSystemRoleBinding(rb *rbacv1.RoleBinding) bool {
|
||||||
|
if strings.HasPrefix(rb.Name, "system:") {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
if rb.Labels != nil {
|
||||||
|
if rb.Labels["kubernetes.io/bootstrapping"] == "rbac-defaults" {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if rb.RoleRef.Name != "" {
|
||||||
|
role, err := kcl.getRole(rb.Namespace, rb.RoleRef.Name)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// Linked to a role that is marked a system role
|
||||||
|
if kcl.isSystemRole(role) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
func (kcl *KubeClient) getRole(namespace, name string) (*corev1.Role, error) {
|
||||||
|
client := kcl.cli.RbacV1().Roles(namespace)
|
||||||
|
return client.Get(context.Background(), name, metav1.GetOptions{})
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteRoleBindings processes a K8sServiceDeleteRequest by deleting each service
|
||||||
|
// in its given namespace.
|
||||||
|
func (kcl *KubeClient) DeleteRoleBindings(reqs models.K8sRoleBindingDeleteRequests) error {
|
||||||
|
var errors []error
|
||||||
|
for namespace := range reqs {
|
||||||
|
for _, name := range reqs[namespace] {
|
||||||
|
client := kcl.cli.RbacV1().RoleBindings(namespace)
|
||||||
|
|
||||||
|
roleBinding, err := client.Get(context.Background(), name, v1.GetOptions{})
|
||||||
|
if err != nil {
|
||||||
|
if k8serrors.IsNotFound(err) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// This is a more serious error to do with the client so we return right away
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if kcl.isSystemRoleBinding(roleBinding) {
|
||||||
|
log.Error().Str("role_name", name).Msg("ignoring delete of 'system' role binding, not allowed")
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := client.Delete(context.Background(), name, v1.DeleteOptions{}); err != nil {
|
||||||
|
errors = append(errors, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return errorlist.Combine(errors)
|
||||||
|
}
|
||||||
|
|
|
@ -2,9 +2,12 @@ package cli
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
portainer "github.com/portainer/portainer/api"
|
portainer "github.com/portainer/portainer/api"
|
||||||
|
"github.com/portainer/portainer/api/http/models/kubernetes"
|
||||||
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
||||||
|
"github.com/portainer/portainer/api/internal/errorlist"
|
||||||
corev1 "k8s.io/api/core/v1"
|
corev1 "k8s.io/api/core/v1"
|
||||||
rbacv1 "k8s.io/api/rbac/v1"
|
rbacv1 "k8s.io/api/rbac/v1"
|
||||||
k8serrors "k8s.io/apimachinery/pkg/api/errors"
|
k8serrors "k8s.io/apimachinery/pkg/api/errors"
|
||||||
|
@ -50,18 +53,20 @@ func (kcl *KubeClient) fetchServiceAccounts(namespace string) ([]models.K8sServi
|
||||||
|
|
||||||
results := make([]models.K8sServiceAccount, 0)
|
results := make([]models.K8sServiceAccount, 0)
|
||||||
for _, serviceAccount := range serviceAccounts.Items {
|
for _, serviceAccount := range serviceAccounts.Items {
|
||||||
results = append(results, parseServiceAccount(serviceAccount))
|
results = append(results, kcl.parseServiceAccount(serviceAccount))
|
||||||
}
|
}
|
||||||
|
|
||||||
return results, nil
|
return results, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// parseServiceAccount converts a corev1.ServiceAccount object to a models.K8sServiceAccount object.
|
// parseServiceAccount converts a corev1.ServiceAccount object to a models.K8sServiceAccount object.
|
||||||
func parseServiceAccount(serviceAccount corev1.ServiceAccount) models.K8sServiceAccount {
|
func (kcl *KubeClient) parseServiceAccount(serviceAccount corev1.ServiceAccount) models.K8sServiceAccount {
|
||||||
return models.K8sServiceAccount{
|
return models.K8sServiceAccount{
|
||||||
Name: serviceAccount.Name,
|
Name: serviceAccount.Name,
|
||||||
|
UID: serviceAccount.UID,
|
||||||
Namespace: serviceAccount.Namespace,
|
Namespace: serviceAccount.Namespace,
|
||||||
CreationDate: serviceAccount.CreationTimestamp.Time,
|
CreationDate: serviceAccount.CreationTimestamp.Time,
|
||||||
|
IsSystem: kcl.isSystemServiceAccount(serviceAccount.Namespace),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -81,6 +86,40 @@ func (kcl *KubeClient) GetPortainerUserServiceAccount(tokenData *portainer.Token
|
||||||
return serviceAccount, nil
|
return serviceAccount, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (kcl *KubeClient) isSystemServiceAccount(namespace string) bool {
|
||||||
|
return kcl.isSystemNamespace(namespace)
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteServices processes a K8sServiceDeleteRequest by deleting each service
|
||||||
|
// in its given namespace.
|
||||||
|
func (kcl *KubeClient) DeleteServiceAccounts(reqs kubernetes.K8sServiceAccountDeleteRequests) error {
|
||||||
|
var errors []error
|
||||||
|
for namespace := range reqs {
|
||||||
|
for _, serviceName := range reqs[namespace] {
|
||||||
|
client := kcl.cli.CoreV1().ServiceAccounts(namespace)
|
||||||
|
|
||||||
|
sa, err := client.Get(context.Background(), serviceName, metav1.GetOptions{})
|
||||||
|
if err != nil {
|
||||||
|
if k8serrors.IsNotFound(err) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if kcl.isSystemServiceAccount(sa.Namespace) {
|
||||||
|
return fmt.Errorf("cannot delete system service account %q", namespace+"/"+serviceName)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := client.Delete(context.Background(), serviceName, metav1.DeleteOptions{}); err != nil {
|
||||||
|
errors = append(errors, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return errorlist.Combine(errors)
|
||||||
|
}
|
||||||
|
|
||||||
// GetServiceAccountBearerToken returns the ServiceAccountToken associated to the specified user.
|
// GetServiceAccountBearerToken returns the ServiceAccountToken associated to the specified user.
|
||||||
func (kcl *KubeClient) GetServiceAccountBearerToken(userID int) (string, error) {
|
func (kcl *KubeClient) GetServiceAccountBearerToken(userID int) (string, error) {
|
||||||
serviceAccountName := UserServiceAccountName(userID, kcl.instanceID)
|
serviceAccountName := UserServiceAccountName(userID, kcl.instanceID)
|
||||||
|
|
|
@ -1499,6 +1499,8 @@ type (
|
||||||
SetupUserServiceAccount(userID int, teamIDs []int, restrictDefaultNamespace bool) error
|
SetupUserServiceAccount(userID int, teamIDs []int, restrictDefaultNamespace bool) error
|
||||||
IsRBACEnabled() (bool, error)
|
IsRBACEnabled() (bool, error)
|
||||||
GetPortainerUserServiceAccount(tokendata *TokenData) (*corev1.ServiceAccount, error)
|
GetPortainerUserServiceAccount(tokendata *TokenData) (*corev1.ServiceAccount, error)
|
||||||
|
GetServiceAccounts(namespace string) ([]models.K8sServiceAccount, error)
|
||||||
|
DeleteServiceAccounts(reqs models.K8sServiceAccountDeleteRequests) error
|
||||||
GetServiceAccountBearerToken(userID int) (string, error)
|
GetServiceAccountBearerToken(userID int) (string, error)
|
||||||
CreateUserShellPod(ctx context.Context, serviceAccountName, shellPodImage string) (*KubernetesShellPod, error)
|
CreateUserShellPod(ctx context.Context, serviceAccountName, shellPodImage string) (*KubernetesShellPod, error)
|
||||||
StartExecProcess(token string, useAdminToken bool, namespace, podName, containerName string, command []string, stdin io.Reader, stdout io.Writer, errChan chan error)
|
StartExecProcess(token string, useAdminToken bool, namespace, podName, containerName string, command []string, stdin io.Reader, stdout io.Writer, errChan chan error)
|
||||||
|
@ -1532,6 +1534,16 @@ type (
|
||||||
CreateRegistrySecret(registry *Registry, namespace string) error
|
CreateRegistrySecret(registry *Registry, namespace string) error
|
||||||
IsRegistrySecret(namespace, secretName string) (bool, error)
|
IsRegistrySecret(namespace, secretName string) (bool, error)
|
||||||
ToggleSystemState(namespace string, isSystem bool) error
|
ToggleSystemState(namespace string, isSystem bool) error
|
||||||
|
|
||||||
|
GetClusterRoles() ([]models.K8sClusterRole, error)
|
||||||
|
DeleteClusterRoles(models.K8sClusterRoleDeleteRequests) error
|
||||||
|
GetClusterRoleBindings() ([]models.K8sClusterRoleBinding, error)
|
||||||
|
DeleteClusterRoleBindings(models.K8sClusterRoleBindingDeleteRequests) error
|
||||||
|
|
||||||
|
GetRoles(namespace string) ([]models.K8sRole, error)
|
||||||
|
DeleteRoles(models.K8sRoleDeleteRequests) error
|
||||||
|
GetRoleBindings(namespace string) ([]models.K8sRoleBinding, error)
|
||||||
|
DeleteRoleBindings(models.K8sRoleBindingDeleteRequests) error
|
||||||
}
|
}
|
||||||
|
|
||||||
// KubernetesDeployer represents a service to deploy a manifest inside a Kubernetes environment(endpoint)
|
// KubernetesDeployer represents a service to deploy a manifest inside a Kubernetes environment(endpoint)
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
import { Badge } from '@@/Badge';
|
import { Badge } from '@@/Badge';
|
||||||
|
|
||||||
export function SystemBadge() {
|
export function SystemBadge() {
|
||||||
return <Badge type="success">system</Badge>;
|
return <Badge type="success">System</Badge>;
|
||||||
}
|
}
|
||||||
|
|
|
@ -20,8 +20,8 @@ import { DefaultDatatableSettings } from '../../../datatables/DefaultDatatableSe
|
||||||
|
|
||||||
import { ClusterRoleBinding } from './types';
|
import { ClusterRoleBinding } from './types';
|
||||||
import { columns } from './columns';
|
import { columns } from './columns';
|
||||||
import { useGetClusterRoleBindingsQuery } from './queries/useGetClusterRoleBindingsQuery';
|
import { useClusterRoleBindings } from './queries/useClusterRoleBindings';
|
||||||
import { useDeleteClusterRoleBindingsMutation } from './queries/useDeleteClusterRoleBindingsMutation';
|
import { useDeleteClusterRoleBindings } from './queries/useDeleteClusterRoleBindings';
|
||||||
|
|
||||||
const storageKey = 'clusterRoleBindings';
|
const storageKey = 'clusterRoleBindings';
|
||||||
const settingsStore = createStore(storageKey);
|
const settingsStore = createStore(storageKey);
|
||||||
|
@ -29,12 +29,9 @@ const settingsStore = createStore(storageKey);
|
||||||
export function ClusterRoleBindingsDatatable() {
|
export function ClusterRoleBindingsDatatable() {
|
||||||
const environmentId = useEnvironmentId();
|
const environmentId = useEnvironmentId();
|
||||||
const tableState = useTableState(settingsStore, storageKey);
|
const tableState = useTableState(settingsStore, storageKey);
|
||||||
const clusterRoleBindingsQuery = useGetClusterRoleBindingsQuery(
|
const clusterRoleBindingsQuery = useClusterRoleBindings(environmentId, {
|
||||||
environmentId,
|
|
||||||
{
|
|
||||||
autoRefreshRate: tableState.autoRefreshRate * 1000,
|
autoRefreshRate: tableState.autoRefreshRate * 1000,
|
||||||
}
|
});
|
||||||
);
|
|
||||||
|
|
||||||
const filteredClusterRoleBindings = useMemo(
|
const filteredClusterRoleBindings = useMemo(
|
||||||
() =>
|
() =>
|
||||||
|
@ -102,7 +99,7 @@ type TableActionsProps = {
|
||||||
function TableActions({ selectedItems }: TableActionsProps) {
|
function TableActions({ selectedItems }: TableActionsProps) {
|
||||||
const environmentId = useEnvironmentId();
|
const environmentId = useEnvironmentId();
|
||||||
const deleteClusterRoleBindingsMutation =
|
const deleteClusterRoleBindingsMutation =
|
||||||
useDeleteClusterRoleBindingsMutation(environmentId);
|
useDeleteClusterRoleBindings(environmentId);
|
||||||
const router = useRouter();
|
const router = useRouter();
|
||||||
|
|
||||||
async function handleRemoveClick(roles: SelectedRole[]) {
|
async function handleRemoveClick(roles: SelectedRole[]) {
|
||||||
|
|
|
@ -9,7 +9,7 @@ import { ClusterRoleBinding } from '../types';
|
||||||
|
|
||||||
import { queryKeys } from './query-keys';
|
import { queryKeys } from './query-keys';
|
||||||
|
|
||||||
export function useGetClusterRoleBindingsQuery(
|
export function useClusterRoleBindings(
|
||||||
environmentId: EnvironmentId,
|
environmentId: EnvironmentId,
|
||||||
options?: { autoRefreshRate?: number }
|
options?: { autoRefreshRate?: number }
|
||||||
) {
|
) {
|
|
@ -6,9 +6,7 @@ import { EnvironmentId } from '@/react/portainer/environments/types';
|
||||||
|
|
||||||
import { queryKeys } from './query-keys';
|
import { queryKeys } from './query-keys';
|
||||||
|
|
||||||
export function useDeleteClusterRoleBindingsMutation(
|
export function useDeleteClusterRoleBindings(environmentId: EnvironmentId) {
|
||||||
environmentId: EnvironmentId
|
|
||||||
) {
|
|
||||||
const queryClient = useQueryClient();
|
const queryClient = useQueryClient();
|
||||||
return useMutation(deleteClusterRoleBindings, {
|
return useMutation(deleteClusterRoleBindings, {
|
||||||
...withInvalidate(queryClient, [queryKeys.list(environmentId)]),
|
...withInvalidate(queryClient, [queryKeys.list(environmentId)]),
|
|
@ -15,12 +15,8 @@ export type ClusterRoleBinding = {
|
||||||
name: string;
|
name: string;
|
||||||
uid: string;
|
uid: string;
|
||||||
namespace: string;
|
namespace: string;
|
||||||
resourceVersion: string;
|
|
||||||
creationDate: string;
|
|
||||||
annotations: Record<string, string> | null;
|
|
||||||
|
|
||||||
roleRef: ClusterRoleRef;
|
roleRef: ClusterRoleRef;
|
||||||
subjects: ClusterRoleSubject[] | null;
|
subjects: ClusterRoleSubject[] | null;
|
||||||
|
creationDate: string;
|
||||||
isSystem: boolean;
|
isSystem: boolean;
|
||||||
};
|
};
|
||||||
|
|
|
@ -15,11 +15,15 @@ import { LoadingButton } from '@@/buttons';
|
||||||
import { useTableState } from '@@/datatables/useTableState';
|
import { useTableState } from '@@/datatables/useTableState';
|
||||||
|
|
||||||
import { DefaultDatatableSettings } from '../../../datatables/DefaultDatatableSettings';
|
import { DefaultDatatableSettings } from '../../../datatables/DefaultDatatableSettings';
|
||||||
|
import { useClusterRoleBindings } from '../ClusterRoleBindingsDatatable/queries/useClusterRoleBindings';
|
||||||
|
import { useRoleBindings } from '../../RolesView/RoleBindingsDatatable/queries/useRoleBindings';
|
||||||
|
import { ClusterRoleBinding } from '../ClusterRoleBindingsDatatable/types';
|
||||||
|
import { RoleBinding } from '../../RolesView/RoleBindingsDatatable/types';
|
||||||
|
|
||||||
import { ClusterRole } from './types';
|
import { ClusterRole, ClusterRoleRowData } from './types';
|
||||||
import { columns } from './columns';
|
import { columns } from './columns';
|
||||||
import { useGetClusterRolesQuery } from './queries/useGetClusterRolesQuery';
|
import { useClusterRoles } from './queries/useClusterRoles';
|
||||||
import { useDeleteClusterRolesMutation } from './queries/useDeleteClusterRolesMutation';
|
import { useDeleteClusterRoles } from './queries/useDeleteClusterRoles';
|
||||||
|
|
||||||
const storageKey = 'clusterRoles';
|
const storageKey = 'clusterRoles';
|
||||||
const settingsStore = createStore(storageKey);
|
const settingsStore = createStore(storageKey);
|
||||||
|
@ -27,26 +31,41 @@ const settingsStore = createStore(storageKey);
|
||||||
export function ClusterRolesDatatable() {
|
export function ClusterRolesDatatable() {
|
||||||
const environmentId = useEnvironmentId();
|
const environmentId = useEnvironmentId();
|
||||||
const tableState = useTableState(settingsStore, storageKey);
|
const tableState = useTableState(settingsStore, storageKey);
|
||||||
const clusterRolesQuery = useGetClusterRolesQuery(environmentId, {
|
|
||||||
|
const clusterRolesQuery = useClusterRoles(environmentId, {
|
||||||
autoRefreshRate: tableState.autoRefreshRate * 1000,
|
autoRefreshRate: tableState.autoRefreshRate * 1000,
|
||||||
});
|
});
|
||||||
|
const clusterRoleBindingsQuery = useClusterRoleBindings(environmentId);
|
||||||
|
const roleBindingsQuery = useRoleBindings(environmentId);
|
||||||
|
|
||||||
|
const clusterRolesWithUnusedFlag = useClusterRolesWithUnusedFlag(
|
||||||
|
clusterRolesQuery.data,
|
||||||
|
clusterRoleBindingsQuery.data,
|
||||||
|
roleBindingsQuery.data
|
||||||
|
);
|
||||||
|
|
||||||
|
const filteredClusterRoles = useMemo(
|
||||||
|
() =>
|
||||||
|
clusterRolesWithUnusedFlag.filter(
|
||||||
|
(cr) => tableState.showSystemResources || !cr.isSystem
|
||||||
|
),
|
||||||
|
[clusterRolesWithUnusedFlag, tableState.showSystemResources]
|
||||||
|
);
|
||||||
|
|
||||||
|
const isLoading =
|
||||||
|
clusterRolesQuery.isLoading ||
|
||||||
|
clusterRoleBindingsQuery.isLoading ||
|
||||||
|
roleBindingsQuery.isLoading;
|
||||||
|
|
||||||
const { authorized: isAuthorizedToAddEdit } = useAuthorizations([
|
const { authorized: isAuthorizedToAddEdit } = useAuthorizations([
|
||||||
'K8sClusterRolesW',
|
'K8sClusterRolesW',
|
||||||
]);
|
]);
|
||||||
const filteredClusterRoles = useMemo(
|
|
||||||
() =>
|
|
||||||
clusterRolesQuery.data?.filter(
|
|
||||||
(cr) => tableState.showSystemResources || !cr.isSystem
|
|
||||||
),
|
|
||||||
[clusterRolesQuery.data, tableState.showSystemResources]
|
|
||||||
);
|
|
||||||
|
|
||||||
return (
|
return (
|
||||||
<Datatable
|
<Datatable
|
||||||
dataset={filteredClusterRoles || []}
|
dataset={filteredClusterRoles || []}
|
||||||
columns={columns}
|
columns={columns}
|
||||||
isLoading={clusterRolesQuery.isLoading}
|
isLoading={isLoading}
|
||||||
settingsManager={tableState}
|
settingsManager={tableState}
|
||||||
emptyContentLabel="No supported cluster roles found"
|
emptyContentLabel="No supported cluster roles found"
|
||||||
title="Cluster Roles"
|
title="Cluster Roles"
|
||||||
|
@ -82,8 +101,7 @@ type TableActionsProps = {
|
||||||
|
|
||||||
function TableActions({ selectedItems }: TableActionsProps) {
|
function TableActions({ selectedItems }: TableActionsProps) {
|
||||||
const environmentId = useEnvironmentId();
|
const environmentId = useEnvironmentId();
|
||||||
const deleteClusterRolesMutation =
|
const deleteClusterRolesMutation = useDeleteClusterRoles(environmentId);
|
||||||
useDeleteClusterRolesMutation(environmentId);
|
|
||||||
const router = useRouter();
|
const router = useRouter();
|
||||||
|
|
||||||
async function handleRemoveClick(roles: SelectedRole[]) {
|
async function handleRemoveClick(roles: SelectedRole[]) {
|
||||||
|
@ -150,3 +168,38 @@ function TableActions({ selectedItems }: TableActionsProps) {
|
||||||
</Authorized>
|
</Authorized>
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Updated custom hook
|
||||||
|
function useClusterRolesWithUnusedFlag(
|
||||||
|
clusterRoles?: ClusterRole[],
|
||||||
|
clusterRoleBindings?: ClusterRoleBinding[],
|
||||||
|
roleBindings?: RoleBinding[]
|
||||||
|
): ClusterRoleRowData[] {
|
||||||
|
return useMemo(() => {
|
||||||
|
if (!clusterRoles || !clusterRoleBindings || !roleBindings) {
|
||||||
|
return [];
|
||||||
|
}
|
||||||
|
|
||||||
|
const usedRoleNames = new Set<string>();
|
||||||
|
|
||||||
|
// Check ClusterRoleBindings
|
||||||
|
clusterRoleBindings.forEach((binding) => {
|
||||||
|
if (binding.roleRef.kind === 'ClusterRole') {
|
||||||
|
usedRoleNames.add(binding.roleRef.name);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
// Check RoleBindings
|
||||||
|
roleBindings.forEach((binding) => {
|
||||||
|
if (binding.roleRef.kind === 'ClusterRole') {
|
||||||
|
usedRoleNames.add(binding.roleRef.name);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
// Mark cluster roles as unused if they're not in the usedRoleNames set
|
||||||
|
return clusterRoles.map((clusterRole) => ({
|
||||||
|
...clusterRole,
|
||||||
|
isUnused: !usedRoleNames.has(clusterRole.name) && !clusterRole.isSystem,
|
||||||
|
}));
|
||||||
|
}, [clusterRoles, clusterRoleBindings, roleBindings]);
|
||||||
|
}
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
import { createColumnHelper } from '@tanstack/react-table';
|
import { createColumnHelper } from '@tanstack/react-table';
|
||||||
|
|
||||||
import { ClusterRole } from '../types';
|
import { ClusterRoleRowData } from '../types';
|
||||||
|
|
||||||
export const columnHelper = createColumnHelper<ClusterRole>();
|
export const columnHelper = createColumnHelper<ClusterRoleRowData>();
|
||||||
|
|
|
@ -9,9 +9,6 @@ export const name = columnHelper.accessor(
|
||||||
if (row.isSystem) {
|
if (row.isSystem) {
|
||||||
result += ' system';
|
result += ' system';
|
||||||
}
|
}
|
||||||
if (row.isUnused) {
|
|
||||||
result += ' unused';
|
|
||||||
}
|
|
||||||
return result;
|
return result;
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -9,7 +9,7 @@ import { ClusterRole } from '../types';
|
||||||
|
|
||||||
import { queryKeys } from './query-keys';
|
import { queryKeys } from './query-keys';
|
||||||
|
|
||||||
export function useGetClusterRolesQuery(
|
export function useClusterRoles(
|
||||||
environmentId: EnvironmentId,
|
environmentId: EnvironmentId,
|
||||||
options?: { autoRefreshRate?: number }
|
options?: { autoRefreshRate?: number }
|
||||||
) {
|
) {
|
|
@ -6,7 +6,7 @@ import { EnvironmentId } from '@/react/portainer/environments/types';
|
||||||
|
|
||||||
import { queryKeys } from './query-keys';
|
import { queryKeys } from './query-keys';
|
||||||
|
|
||||||
export function useDeleteClusterRolesMutation(environmentId: EnvironmentId) {
|
export function useDeleteClusterRoles(environmentId: EnvironmentId) {
|
||||||
const queryClient = useQueryClient();
|
const queryClient = useQueryClient();
|
||||||
return useMutation(deleteClusterRoles, {
|
return useMutation(deleteClusterRoles, {
|
||||||
onSuccess: () =>
|
onSuccess: () =>
|
|
@ -1,23 +1,14 @@
|
||||||
export type Rule = {
|
|
||||||
verbs: string[];
|
|
||||||
apiGroups: string[];
|
|
||||||
resources: string[];
|
|
||||||
};
|
|
||||||
|
|
||||||
export type ClusterRole = {
|
export type ClusterRole = {
|
||||||
name: string;
|
name: string;
|
||||||
uid: string;
|
|
||||||
namespace: string;
|
|
||||||
resourceVersion: string;
|
|
||||||
creationDate: string;
|
creationDate: string;
|
||||||
annotations?: Record<string, string>;
|
uid: string;
|
||||||
|
|
||||||
rules: Rule[];
|
|
||||||
|
|
||||||
isUnused: boolean;
|
|
||||||
isSystem: boolean;
|
isSystem: boolean;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export type ClusterRoleRowData = ClusterRole & {
|
||||||
|
isUnused: boolean;
|
||||||
|
};
|
||||||
|
|
||||||
export type DeleteRequestPayload = {
|
export type DeleteRequestPayload = {
|
||||||
clusterRoles: string[];
|
clusterRoles: string[];
|
||||||
};
|
};
|
||||||
|
|
|
@ -11,7 +11,10 @@ import { ClusterRoleBindingsDatatable } from './ClusterRoleBindingsDatatable/Clu
|
||||||
|
|
||||||
export function ClusterRolesView() {
|
export function ClusterRolesView() {
|
||||||
useUnauthorizedRedirect(
|
useUnauthorizedRedirect(
|
||||||
{ authorizations: ['K8sClusterRoleBindingsW', 'K8sClusterRolesW'] },
|
{
|
||||||
|
authorizations: ['K8sClusterRoleBindingsW', 'K8sClusterRolesW'],
|
||||||
|
adminOnlyCE: true,
|
||||||
|
},
|
||||||
{ to: 'kubernetes.dashboard' }
|
{ to: 'kubernetes.dashboard' }
|
||||||
);
|
);
|
||||||
|
|
||||||
|
|
|
@ -2,44 +2,55 @@ import { Trash2, Link as LinkIcon } from 'lucide-react';
|
||||||
import { useRouter } from '@uirouter/react';
|
import { useRouter } from '@uirouter/react';
|
||||||
import { Row } from '@tanstack/react-table';
|
import { Row } from '@tanstack/react-table';
|
||||||
import clsx from 'clsx';
|
import clsx from 'clsx';
|
||||||
|
import { useMemo } from 'react';
|
||||||
|
|
||||||
import { useEnvironmentId } from '@/react/hooks/useEnvironmentId';
|
import { useEnvironmentId } from '@/react/hooks/useEnvironmentId';
|
||||||
import { useAuthorizations, Authorized } from '@/react/hooks/useUser';
|
import { useAuthorizations, Authorized } from '@/react/hooks/useUser';
|
||||||
import { notifyError, notifySuccess } from '@/portainer/services/notifications';
|
import { notifyError, notifySuccess } from '@/portainer/services/notifications';
|
||||||
import { SystemResourceDescription } from '@/react/kubernetes/datatables/SystemResourceDescription';
|
import { SystemResourceDescription } from '@/react/kubernetes/datatables/SystemResourceDescription';
|
||||||
import { createStore } from '@/react/kubernetes/datatables/default-kube-datatable-store';
|
import {
|
||||||
import { useNamespacesQuery } from '@/react/kubernetes/namespaces/queries/useNamespacesQuery';
|
DefaultDatatableSettings,
|
||||||
|
TableSettings as KubeTableSettings,
|
||||||
|
} from '@/react/kubernetes/datatables/DefaultDatatableSettings';
|
||||||
import { CreateFromManifestButton } from '@/react/kubernetes/components/CreateFromManifestButton';
|
import { CreateFromManifestButton } from '@/react/kubernetes/components/CreateFromManifestButton';
|
||||||
import { isSystemNamespace } from '@/react/kubernetes/namespaces/queries/useIsSystemNamespace';
|
import { useKubeStore } from '@/react/kubernetes/datatables/default-kube-datatable-store';
|
||||||
|
|
||||||
import { confirmDelete } from '@@/modals/confirm';
|
import { confirmDelete } from '@@/modals/confirm';
|
||||||
import { Datatable, Table, TableSettingsMenu } from '@@/datatables';
|
import { Datatable, Table, TableSettingsMenu } from '@@/datatables';
|
||||||
import { LoadingButton } from '@@/buttons';
|
import { LoadingButton } from '@@/buttons';
|
||||||
import { useTableState } from '@@/datatables/useTableState';
|
import {
|
||||||
|
type FilteredColumnsTableSettings,
|
||||||
import { DefaultDatatableSettings } from '../../../datatables/DefaultDatatableSettings';
|
filteredColumnsSettings,
|
||||||
|
} from '@@/datatables/types';
|
||||||
|
|
||||||
import { RoleBinding } from './types';
|
import { RoleBinding } from './types';
|
||||||
import { columns } from './columns';
|
import { columns } from './columns';
|
||||||
import { useGetAllRoleBindingsQuery } from './queries/useGetAllRoleBindingsQuery';
|
import { useRoleBindings } from './queries/useRoleBindings';
|
||||||
import { useDeleteRoleBindingsMutation } from './queries/useDeleteRoleBindingsMutation';
|
import { useDeleteRoleBindings } from './queries/useDeleteRoleBindings';
|
||||||
|
|
||||||
const storageKey = 'roleBindings';
|
const storageKey = 'roleBindings';
|
||||||
const settingsStore = createStore(storageKey);
|
interface TableSettings
|
||||||
|
extends KubeTableSettings,
|
||||||
|
FilteredColumnsTableSettings {}
|
||||||
|
|
||||||
export function RoleBindingsDatatable() {
|
export function RoleBindingsDatatable() {
|
||||||
const environmentId = useEnvironmentId();
|
const environmentId = useEnvironmentId();
|
||||||
const tableState = useTableState(settingsStore, storageKey);
|
const tableState = useKubeStore<TableSettings>(
|
||||||
const namespacesQuery = useNamespacesQuery(environmentId);
|
storageKey,
|
||||||
const roleBindingsQuery = useGetAllRoleBindingsQuery(environmentId, {
|
undefined,
|
||||||
|
(set) => ({
|
||||||
|
...filteredColumnsSettings(set),
|
||||||
|
})
|
||||||
|
);
|
||||||
|
const roleBindingsQuery = useRoleBindings(environmentId, {
|
||||||
autoRefreshRate: tableState.autoRefreshRate * 1000,
|
autoRefreshRate: tableState.autoRefreshRate * 1000,
|
||||||
enabled: namespacesQuery.isSuccess,
|
|
||||||
});
|
});
|
||||||
|
const filteredRoleBindings = useMemo(
|
||||||
const filteredRoleBindings = tableState.showSystemResources
|
() =>
|
||||||
|
tableState.showSystemResources
|
||||||
? roleBindingsQuery.data
|
? roleBindingsQuery.data
|
||||||
: roleBindingsQuery.data?.filter(
|
: roleBindingsQuery.data?.filter((rb) => !rb.isSystem),
|
||||||
(rb) => !isSystemNamespace(rb.namespace, namespacesQuery.data)
|
[roleBindingsQuery.data, tableState.showSystemResources]
|
||||||
);
|
);
|
||||||
|
|
||||||
const { authorized: isAuthorisedToAddEdit } = useAuthorizations([
|
const { authorized: isAuthorisedToAddEdit } = useAuthorizations([
|
||||||
|
@ -100,8 +111,7 @@ type TableActionsProps = {
|
||||||
|
|
||||||
function TableActions({ selectedItems }: TableActionsProps) {
|
function TableActions({ selectedItems }: TableActionsProps) {
|
||||||
const environmentId = useEnvironmentId();
|
const environmentId = useEnvironmentId();
|
||||||
const deleteRoleBindingsMutation =
|
const deleteRoleBindingsMutation = useDeleteRoleBindings(environmentId);
|
||||||
useDeleteRoleBindingsMutation(environmentId);
|
|
||||||
const router = useRouter();
|
const router = useRouter();
|
||||||
|
|
||||||
async function handleRemoveClick(roles: SelectedRole[]) {
|
async function handleRemoveClick(roles: SelectedRole[]) {
|
||||||
|
|
|
@ -6,7 +6,7 @@ import { EnvironmentId } from '@/react/portainer/environments/types';
|
||||||
|
|
||||||
import { queryKeys } from './query-keys';
|
import { queryKeys } from './query-keys';
|
||||||
|
|
||||||
export function useDeleteRoleBindingsMutation(environmentId: EnvironmentId) {
|
export function useDeleteRoleBindings(environmentId: EnvironmentId) {
|
||||||
const queryClient = useQueryClient();
|
const queryClient = useQueryClient();
|
||||||
return useMutation(deleteRoleBindings, {
|
return useMutation(deleteRoleBindings, {
|
||||||
...withInvalidate(queryClient, [queryKeys.list(environmentId)]),
|
...withInvalidate(queryClient, [queryKeys.list(environmentId)]),
|
|
@ -8,7 +8,7 @@ import { RoleBinding } from '../types';
|
||||||
|
|
||||||
import { queryKeys } from './query-keys';
|
import { queryKeys } from './query-keys';
|
||||||
|
|
||||||
export function useGetAllRoleBindingsQuery(
|
export function useRoleBindings(
|
||||||
environmentId: EnvironmentId,
|
environmentId: EnvironmentId,
|
||||||
options?: { autoRefreshRate?: number; enabled?: boolean }
|
options?: { autoRefreshRate?: number; enabled?: boolean }
|
||||||
) {
|
) {
|
|
@ -15,12 +15,8 @@ export type RoleBinding = {
|
||||||
name: string;
|
name: string;
|
||||||
uid: string;
|
uid: string;
|
||||||
namespace: string;
|
namespace: string;
|
||||||
resourceVersion: string;
|
|
||||||
creationDate: string;
|
|
||||||
annotations: Record<string, string> | null;
|
|
||||||
|
|
||||||
roleRef: RoleRef;
|
roleRef: RoleRef;
|
||||||
subjects: RoleSubject[] | null;
|
subjects: RoleSubject[] | null;
|
||||||
|
creationDate: string;
|
||||||
isSystem: boolean;
|
isSystem: boolean;
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,48 +1,62 @@
|
||||||
import { Trash2, UserCheck } from 'lucide-react';
|
import { Trash2, UserCheck } from 'lucide-react';
|
||||||
import { useRouter } from '@uirouter/react';
|
import { useRouter } from '@uirouter/react';
|
||||||
|
import { useMemo } from 'react';
|
||||||
|
|
||||||
import { useEnvironmentId } from '@/react/hooks/useEnvironmentId';
|
import { useEnvironmentId } from '@/react/hooks/useEnvironmentId';
|
||||||
import { Authorized } from '@/react/hooks/useUser';
|
import { Authorized } from '@/react/hooks/useUser';
|
||||||
import { notifyError, notifySuccess } from '@/portainer/services/notifications';
|
import { notifyError, notifySuccess } from '@/portainer/services/notifications';
|
||||||
import { SystemResourceDescription } from '@/react/kubernetes/datatables/SystemResourceDescription';
|
import { SystemResourceDescription } from '@/react/kubernetes/datatables/SystemResourceDescription';
|
||||||
import { createStore } from '@/react/kubernetes/datatables/default-kube-datatable-store';
|
|
||||||
import { useNamespacesQuery } from '@/react/kubernetes/namespaces/queries/useNamespacesQuery';
|
|
||||||
import { CreateFromManifestButton } from '@/react/kubernetes/components/CreateFromManifestButton';
|
import { CreateFromManifestButton } from '@/react/kubernetes/components/CreateFromManifestButton';
|
||||||
import { useUnauthorizedRedirect } from '@/react/hooks/useUnauthorizedRedirect';
|
import {
|
||||||
import { isSystemNamespace } from '@/react/kubernetes/namespaces/queries/useIsSystemNamespace';
|
DefaultDatatableSettings,
|
||||||
|
TableSettings as KubeTableSettings,
|
||||||
|
} from '@/react/kubernetes/datatables/DefaultDatatableSettings';
|
||||||
|
import { useKubeStore } from '@/react/kubernetes/datatables/default-kube-datatable-store';
|
||||||
|
|
||||||
import { confirmDelete } from '@@/modals/confirm';
|
import { confirmDelete } from '@@/modals/confirm';
|
||||||
import { Datatable, TableSettingsMenu } from '@@/datatables';
|
import { Datatable, TableSettingsMenu } from '@@/datatables';
|
||||||
import { LoadingButton } from '@@/buttons';
|
import { LoadingButton } from '@@/buttons';
|
||||||
import { useTableState } from '@@/datatables/useTableState';
|
import {
|
||||||
|
type FilteredColumnsTableSettings,
|
||||||
|
filteredColumnsSettings,
|
||||||
|
} from '@@/datatables/types';
|
||||||
|
|
||||||
import { DefaultDatatableSettings } from '../../../datatables/DefaultDatatableSettings';
|
import { useRoleBindings } from '../RoleBindingsDatatable/queries/useRoleBindings';
|
||||||
|
import { RoleBinding } from '../RoleBindingsDatatable/types';
|
||||||
|
|
||||||
import { columns } from './columns';
|
import { columns } from './columns';
|
||||||
import { Role } from './types';
|
import { Role, RoleRowData } from './types';
|
||||||
import { useGetAllRolesQuery } from './queries/useGetAllRolesQuery';
|
import { useRoles } from './queries/useRoles';
|
||||||
import { useDeleteRolesMutation } from './queries/useDeleteRolesMutation';
|
import { useDeleteRoles } from './queries/useDeleteRoles';
|
||||||
|
|
||||||
const storageKey = 'roles';
|
const storageKey = 'roles';
|
||||||
const settingsStore = createStore(storageKey);
|
interface TableSettings
|
||||||
|
extends KubeTableSettings,
|
||||||
|
FilteredColumnsTableSettings {}
|
||||||
|
|
||||||
export function RolesDatatable() {
|
export function RolesDatatable() {
|
||||||
const environmentId = useEnvironmentId();
|
const environmentId = useEnvironmentId();
|
||||||
const tableState = useTableState(settingsStore, storageKey);
|
const tableState = useKubeStore<TableSettings>(
|
||||||
const namespacesQuery = useNamespacesQuery(environmentId);
|
storageKey,
|
||||||
const rolesQuery = useGetAllRolesQuery(environmentId, {
|
undefined,
|
||||||
autoRefreshRate: tableState.autoRefreshRate * 1000,
|
(set) => ({
|
||||||
enabled: namespacesQuery.isSuccess,
|
...filteredColumnsSettings(set),
|
||||||
});
|
})
|
||||||
useUnauthorizedRedirect(
|
|
||||||
{ authorizations: ['K8sRolesW'] },
|
|
||||||
{ to: 'kubernetes.dashboard' }
|
|
||||||
);
|
);
|
||||||
|
const rolesQuery = useRoles(environmentId, {
|
||||||
|
autoRefreshRate: tableState.autoRefreshRate * 1000,
|
||||||
|
});
|
||||||
|
const roleBindingsQuery = useRoleBindings(environmentId, {
|
||||||
|
autoRefreshRate: tableState.autoRefreshRate * 1000,
|
||||||
|
});
|
||||||
|
const roleRowData = useRoleRowData(rolesQuery.data, roleBindingsQuery.data);
|
||||||
|
|
||||||
const filteredRoles = tableState.showSystemResources
|
const filteredRoles = useMemo(
|
||||||
? rolesQuery.data
|
() =>
|
||||||
: rolesQuery.data?.filter(
|
tableState.showSystemResources
|
||||||
(role) => !isSystemNamespace(role.namespace, namespacesQuery.data)
|
? roleRowData
|
||||||
|
: roleRowData.filter((role) => !role.isSystem),
|
||||||
|
[roleRowData, tableState.showSystemResources]
|
||||||
);
|
);
|
||||||
|
|
||||||
return (
|
return (
|
||||||
|
@ -50,7 +64,7 @@ export function RolesDatatable() {
|
||||||
dataset={filteredRoles || []}
|
dataset={filteredRoles || []}
|
||||||
columns={columns}
|
columns={columns}
|
||||||
settingsManager={tableState}
|
settingsManager={tableState}
|
||||||
isLoading={rolesQuery.isLoading}
|
isLoading={rolesQuery.isLoading || roleBindingsQuery.isLoading}
|
||||||
emptyContentLabel="No roles found"
|
emptyContentLabel="No roles found"
|
||||||
title="Roles"
|
title="Roles"
|
||||||
titleIcon={UserCheck}
|
titleIcon={UserCheck}
|
||||||
|
@ -85,7 +99,7 @@ type TableActionsProps = {
|
||||||
|
|
||||||
function TableActions({ selectedItems }: TableActionsProps) {
|
function TableActions({ selectedItems }: TableActionsProps) {
|
||||||
const environmentId = useEnvironmentId();
|
const environmentId = useEnvironmentId();
|
||||||
const deleteRolesMutation = useDeleteRolesMutation(environmentId);
|
const deleteRolesMutation = useDeleteRoles(environmentId);
|
||||||
const router = useRouter();
|
const router = useRouter();
|
||||||
|
|
||||||
return (
|
return (
|
||||||
|
@ -155,3 +169,26 @@ function TableActions({ selectedItems }: TableActionsProps) {
|
||||||
return roles;
|
return roles;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Mark roles that are used by a role binding
|
||||||
|
|
||||||
|
// Mark roles that are used by a role binding
|
||||||
|
function useRoleRowData(
|
||||||
|
roles?: Role[],
|
||||||
|
roleBindings?: RoleBinding[]
|
||||||
|
): RoleRowData[] {
|
||||||
|
const roleRowData = useMemo(
|
||||||
|
() =>
|
||||||
|
roles?.map((role) => {
|
||||||
|
const isUsed = roleBindings?.some(
|
||||||
|
(roleBinding) =>
|
||||||
|
roleBinding.roleRef.name === role.name &&
|
||||||
|
roleBinding.namespace === role.namespace
|
||||||
|
);
|
||||||
|
return { ...role, isUnused: !isUsed };
|
||||||
|
}),
|
||||||
|
[roles, roleBindings]
|
||||||
|
);
|
||||||
|
|
||||||
|
return roleRowData ?? [];
|
||||||
|
}
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
import { createColumnHelper } from '@tanstack/react-table';
|
import { createColumnHelper } from '@tanstack/react-table';
|
||||||
|
|
||||||
import { Role } from '../types';
|
import { RoleRowData } from '../types';
|
||||||
|
|
||||||
export const columnHelper = createColumnHelper<Role>();
|
export const columnHelper = createColumnHelper<RoleRowData>();
|
||||||
|
|
|
@ -3,7 +3,7 @@ import { Row } from '@tanstack/react-table';
|
||||||
import { filterHOC } from '@@/datatables/Filter';
|
import { filterHOC } from '@@/datatables/Filter';
|
||||||
import { Link } from '@@/Link';
|
import { Link } from '@@/Link';
|
||||||
|
|
||||||
import { Role } from '../types';
|
import { RoleRowData } from '../types';
|
||||||
|
|
||||||
import { columnHelper } from './helper';
|
import { columnHelper } from './helper';
|
||||||
|
|
||||||
|
@ -26,7 +26,7 @@ export const namespace = columnHelper.accessor((row) => row.namespace, {
|
||||||
filter: filterHOC('Filter by namespace'),
|
filter: filterHOC('Filter by namespace'),
|
||||||
},
|
},
|
||||||
enableColumnFilter: true,
|
enableColumnFilter: true,
|
||||||
filterFn: (row: Row<Role>, _columnId: string, filterValue: string[]) =>
|
filterFn: (row: Row<RoleRowData>, _columnId: string, filterValue: string[]) =>
|
||||||
filterValue.length === 0 ||
|
filterValue.length === 0 ||
|
||||||
filterValue.includes(row.original.namespace ?? ''),
|
filterValue.includes(row.original.namespace ?? ''),
|
||||||
});
|
});
|
||||||
|
|
|
@ -6,7 +6,7 @@ import { EnvironmentId } from '@/react/portainer/environments/types';
|
||||||
|
|
||||||
import { queryKeys } from './query-keys';
|
import { queryKeys } from './query-keys';
|
||||||
|
|
||||||
export function useDeleteRolesMutation(environmentId: EnvironmentId) {
|
export function useDeleteRoles(environmentId: EnvironmentId) {
|
||||||
const queryClient = useQueryClient();
|
const queryClient = useQueryClient();
|
||||||
return useMutation(deleteRole, {
|
return useMutation(deleteRole, {
|
||||||
...withInvalidate(queryClient, [queryKeys.list(environmentId)]),
|
...withInvalidate(queryClient, [queryKeys.list(environmentId)]),
|
|
@ -11,7 +11,7 @@ const queryKeys = {
|
||||||
['environments', environmentId, 'kubernetes', 'roles'] as const,
|
['environments', environmentId, 'kubernetes', 'roles'] as const,
|
||||||
};
|
};
|
||||||
|
|
||||||
export function useGetAllRolesQuery(
|
export function useRoles(
|
||||||
environmentId: EnvironmentId,
|
environmentId: EnvironmentId,
|
||||||
options?: { autoRefreshRate?: number; enabled?: boolean }
|
options?: { autoRefreshRate?: number; enabled?: boolean }
|
||||||
) {
|
) {
|
|
@ -8,12 +8,10 @@ export type Role = {
|
||||||
name: string;
|
name: string;
|
||||||
uid: string;
|
uid: string;
|
||||||
namespace: string;
|
namespace: string;
|
||||||
resourceVersion: string;
|
|
||||||
creationDate: string;
|
creationDate: string;
|
||||||
annotations?: Record<string, string>;
|
|
||||||
|
|
||||||
rules: Rule[];
|
|
||||||
|
|
||||||
isSystem: boolean;
|
isSystem: boolean;
|
||||||
|
};
|
||||||
|
|
||||||
|
export type RoleRowData = Role & {
|
||||||
isUnused: boolean;
|
isUnused: boolean;
|
||||||
};
|
};
|
||||||
|
|
|
@ -11,7 +11,7 @@ import { RoleBindingsDatatable } from './RoleBindingsDatatable';
|
||||||
|
|
||||||
export function RolesView() {
|
export function RolesView() {
|
||||||
useUnauthorizedRedirect(
|
useUnauthorizedRedirect(
|
||||||
{ authorizations: ['K8sRoleBindingsW', 'K8sRolesW'] },
|
{ authorizations: ['K8sRoleBindingsW', 'K8sRolesW'], adminOnlyCE: true },
|
||||||
{ to: 'kubernetes.dashboard' }
|
{ to: 'kubernetes.dashboard' }
|
||||||
);
|
);
|
||||||
|
|
||||||
|
|
|
@ -1,50 +1,54 @@
|
||||||
import { User } from 'lucide-react';
|
import { User } from 'lucide-react';
|
||||||
import { useRouter } from '@uirouter/react';
|
import { useRouter } from '@uirouter/react';
|
||||||
|
import { useMemo } from 'react';
|
||||||
|
|
||||||
import { useEnvironmentId } from '@/react/hooks/useEnvironmentId';
|
import { useEnvironmentId } from '@/react/hooks/useEnvironmentId';
|
||||||
import { Authorized } from '@/react/hooks/useUser';
|
import { Authorized } from '@/react/hooks/useUser';
|
||||||
import { notifyError, notifySuccess } from '@/portainer/services/notifications';
|
import { notifyError, notifySuccess } from '@/portainer/services/notifications';
|
||||||
import { SystemResourceDescription } from '@/react/kubernetes/datatables/SystemResourceDescription';
|
import { SystemResourceDescription } from '@/react/kubernetes/datatables/SystemResourceDescription';
|
||||||
import { useNamespacesQuery } from '@/react/kubernetes/namespaces/queries/useNamespacesQuery';
|
import {
|
||||||
import { createStore } from '@/react/kubernetes/datatables/default-kube-datatable-store';
|
DefaultDatatableSettings,
|
||||||
|
TableSettings as KubeTableSettings,
|
||||||
|
} from '@/react/kubernetes/datatables/DefaultDatatableSettings';
|
||||||
import { CreateFromManifestButton } from '@/react/kubernetes/components/CreateFromManifestButton';
|
import { CreateFromManifestButton } from '@/react/kubernetes/components/CreateFromManifestButton';
|
||||||
import { useUnauthorizedRedirect } from '@/react/hooks/useUnauthorizedRedirect';
|
import { useKubeStore } from '@/react/kubernetes/datatables/default-kube-datatable-store';
|
||||||
import { isSystemNamespace } from '@/react/kubernetes/namespaces/queries/useIsSystemNamespace';
|
|
||||||
|
|
||||||
import { Datatable, TableSettingsMenu } from '@@/datatables';
|
import { Datatable, TableSettingsMenu } from '@@/datatables';
|
||||||
import { useTableState } from '@@/datatables/useTableState';
|
|
||||||
import { DeleteButton } from '@@/buttons/DeleteButton';
|
import { DeleteButton } from '@@/buttons/DeleteButton';
|
||||||
|
import {
|
||||||
|
type FilteredColumnsTableSettings,
|
||||||
|
filteredColumnsSettings,
|
||||||
|
} from '@@/datatables/types';
|
||||||
|
|
||||||
import { ServiceAccount } from '../types';
|
import { ServiceAccount } from '../types';
|
||||||
import { DefaultDatatableSettings } from '../../../datatables/DefaultDatatableSettings';
|
|
||||||
|
|
||||||
import { useColumns } from './columns';
|
import { columns } from './columns';
|
||||||
import { useDeleteServiceAccountsMutation } from './queries/useDeleteServiceAccountsMutation';
|
import { useDeleteServiceAccountsMutation } from './queries/useDeleteServiceAccountsMutation';
|
||||||
import { useGetAllServiceAccountsQuery } from './queries/useGetAllServiceAccountsQuery';
|
import { useGetAllServiceAccountsQuery } from './queries/useGetAllServiceAccountsQuery';
|
||||||
|
|
||||||
const storageKey = 'serviceAccounts';
|
const storageKey = 'serviceAccounts';
|
||||||
const settingsStore = createStore(storageKey);
|
interface TableSettings
|
||||||
|
extends KubeTableSettings,
|
||||||
|
FilteredColumnsTableSettings {}
|
||||||
|
|
||||||
export function ServiceAccountsDatatable() {
|
export function ServiceAccountsDatatable() {
|
||||||
useUnauthorizedRedirect(
|
|
||||||
{ authorizations: ['K8sServiceAccountsW'] },
|
|
||||||
{ to: 'kubernetes.dashboard' }
|
|
||||||
);
|
|
||||||
|
|
||||||
const environmentId = useEnvironmentId();
|
const environmentId = useEnvironmentId();
|
||||||
const tableState = useTableState(settingsStore, storageKey);
|
const tableState = useKubeStore<TableSettings>(
|
||||||
const namespacesQuery = useNamespacesQuery(environmentId);
|
storageKey,
|
||||||
|
undefined,
|
||||||
|
(set) => ({
|
||||||
|
...filteredColumnsSettings(set),
|
||||||
|
})
|
||||||
|
);
|
||||||
const serviceAccountsQuery = useGetAllServiceAccountsQuery(environmentId, {
|
const serviceAccountsQuery = useGetAllServiceAccountsQuery(environmentId, {
|
||||||
refetchInterval: tableState.autoRefreshRate * 1000,
|
refetchInterval: tableState.autoRefreshRate * 1000,
|
||||||
enabled: namespacesQuery.isSuccess,
|
|
||||||
});
|
});
|
||||||
|
const filteredServiceAccounts = useMemo(
|
||||||
const columns = useColumns();
|
() =>
|
||||||
|
tableState.showSystemResources
|
||||||
const filteredServiceAccounts = tableState.showSystemResources
|
|
||||||
? serviceAccountsQuery.data
|
? serviceAccountsQuery.data
|
||||||
: serviceAccountsQuery.data?.filter(
|
: serviceAccountsQuery.data?.filter((sa) => !sa.isSystem),
|
||||||
(sa) => !isSystemNamespace(sa.namespace, namespacesQuery.data)
|
[serviceAccountsQuery.data, tableState.showSystemResources]
|
||||||
);
|
);
|
||||||
|
|
||||||
return (
|
return (
|
||||||
|
|
|
@ -2,6 +2,4 @@ import { name } from './name';
|
||||||
import { namespace } from './namespace';
|
import { namespace } from './namespace';
|
||||||
import { created } from './created';
|
import { created } from './created';
|
||||||
|
|
||||||
export function useColumns() {
|
export const columns = [name, namespace, created];
|
||||||
return [name, namespace, created];
|
|
||||||
}
|
|
||||||
|
|
|
@ -1,5 +1,4 @@
|
||||||
import { SystemBadge } from '@@/Badge/SystemBadge';
|
import { SystemBadge } from '@@/Badge/SystemBadge';
|
||||||
import { UnusedBadge } from '@@/Badge/UnusedBadge';
|
|
||||||
|
|
||||||
import { columnHelper } from './helper';
|
import { columnHelper } from './helper';
|
||||||
|
|
||||||
|
@ -9,9 +8,6 @@ export const name = columnHelper.accessor(
|
||||||
if (row.isSystem) {
|
if (row.isSystem) {
|
||||||
result += ' system';
|
result += ' system';
|
||||||
}
|
}
|
||||||
if (row.isUnused) {
|
|
||||||
result += ' unused';
|
|
||||||
}
|
|
||||||
return result;
|
return result;
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -21,7 +17,6 @@ export const name = columnHelper.accessor(
|
||||||
<div className="flex gap-2">
|
<div className="flex gap-2">
|
||||||
<div>{row.original.name}</div>
|
<div>{row.original.name}</div>
|
||||||
{row.original.isSystem && <SystemBadge />}
|
{row.original.isSystem && <SystemBadge />}
|
||||||
{!row.original.isSystem && row.original.isUnused && <UnusedBadge />}
|
|
||||||
</div>
|
</div>
|
||||||
),
|
),
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,8 +1,14 @@
|
||||||
|
import { useUnauthorizedRedirect } from '@/react/hooks/useUnauthorizedRedirect';
|
||||||
|
|
||||||
import { PageHeader } from '@@/PageHeader';
|
import { PageHeader } from '@@/PageHeader';
|
||||||
|
|
||||||
import { ServiceAccountsDatatable } from './ServiceAccountsDatatable';
|
import { ServiceAccountsDatatable } from './ServiceAccountsDatatable';
|
||||||
|
|
||||||
export function ServiceAccountsView() {
|
export function ServiceAccountsView() {
|
||||||
|
useUnauthorizedRedirect(
|
||||||
|
{ authorizations: ['K8sServiceAccountsW'], adminOnlyCE: true },
|
||||||
|
{ to: 'kubernetes.dashboard' }
|
||||||
|
);
|
||||||
return (
|
return (
|
||||||
<>
|
<>
|
||||||
<PageHeader
|
<PageHeader
|
||||||
|
|
|
@ -1,10 +1,7 @@
|
||||||
export type ServiceAccount = {
|
export type ServiceAccount = {
|
||||||
name: string;
|
name: string;
|
||||||
namespace: string;
|
|
||||||
resourceVersion: string;
|
|
||||||
uid: string;
|
uid: string;
|
||||||
|
namespace: string;
|
||||||
creationDate: string;
|
creationDate: string;
|
||||||
|
|
||||||
isSystem: boolean;
|
isSystem: boolean;
|
||||||
isUnused: boolean;
|
|
||||||
};
|
};
|
||||||
|
|
Loading…
Reference in New Issue