package kubernetes import ( "bytes" "encoding/json" "errors" "fmt" "io/ioutil" "log" "net/http" "path" "regexp" "strconv" "strings" "github.com/portainer/portainer/api/http/security" "github.com/portainer/portainer/api/kubernetes/cli" portainer "github.com/portainer/portainer/api" ) type baseTransport struct { httpTransport *http.Transport tokenManager *tokenManager endpoint *portainer.Endpoint k8sClientFactory *cli.ClientFactory dataStore portainer.DataStore } func newBaseTransport(httpTransport *http.Transport, tokenManager *tokenManager, endpoint *portainer.Endpoint, k8sClientFactory *cli.ClientFactory, dataStore portainer.DataStore) *baseTransport { return &baseTransport{ httpTransport: httpTransport, tokenManager: tokenManager, endpoint: endpoint, k8sClientFactory: k8sClientFactory, dataStore: dataStore, } } // #region KUBERNETES PROXY // proxyKubernetesRequest intercepts a Kubernetes API request and apply logic based // on the requested operation. func (transport *baseTransport) proxyKubernetesRequest(request *http.Request) (*http.Response, error) { // URL path examples: // http://localhost:9000/api/endpoints/3/kubernetes/api/v1/namespaces // http://localhost:9000/api/endpoints/3/kubernetes/apis/apps/v1/namespaces/default/deployments apiVersionRe := regexp.MustCompile(`^(/kubernetes)?/(api|apis/apps)/v[0-9](\.[0-9])?`) requestPath := apiVersionRe.ReplaceAllString(request.URL.Path, "") switch { case strings.EqualFold(requestPath, "/namespaces"): return transport.executeKubernetesRequest(request) case strings.HasPrefix(requestPath, "/namespaces"): return transport.proxyNamespacedRequest(request, requestPath) default: return transport.executeKubernetesRequest(request) } } func (transport *baseTransport) proxyNamespacedRequest(request *http.Request, fullRequestPath string) (*http.Response, error) { requestPath := strings.TrimPrefix(fullRequestPath, "/namespaces/") split := strings.SplitN(requestPath, "/", 2) namespace := split[0] requestPath = "" if len(split) > 1 { requestPath = split[1] } switch { case strings.HasPrefix(requestPath, "pods"): return transport.proxyPodsRequest(request, namespace, requestPath) case strings.HasPrefix(requestPath, "deployments"): return transport.proxyDeploymentsRequest(request, namespace, requestPath) case requestPath == "" && request.Method == "DELETE": return transport.proxyNamespaceDeleteOperation(request, namespace) default: return transport.executeKubernetesRequest(request) } } func (transport *baseTransport) executeKubernetesRequest(request *http.Request) (*http.Response, error) { resp, err := transport.httpTransport.RoundTrip(request) // This fix was made to resolve a k8s e2e test, more detailed investigation should be done later. if err == nil && resp.StatusCode == http.StatusMovedPermanently { oldLocation := resp.Header.Get("Location") if oldLocation != "" { stripedPrefix := strings.TrimSuffix(request.RequestURI, request.URL.Path) // local proxy strips "/kubernetes" but agent proxy and edge agent proxy do not stripedPrefix = strings.TrimSuffix(stripedPrefix, "/kubernetes") newLocation := stripedPrefix + "/kubernetes" + oldLocation resp.Header.Set("Location", newLocation) } } return resp, err } // #endregion // #region ROUND TRIP func (transport *baseTransport) prepareRoundTrip(request *http.Request) (string, error) { token, err := transport.getRoundTripToken(request, transport.tokenManager) if err != nil { return "", err } request.Header.Set("Authorization", fmt.Sprintf("Bearer %s", token)) return token, nil } // RoundTrip is the implementation of the the http.RoundTripper interface func (transport *baseTransport) RoundTrip(request *http.Request) (*http.Response, error) { return transport.proxyKubernetesRequest(request) } func (transport *baseTransport) getRoundTripToken(request *http.Request, tokenManager *tokenManager) (string, error) { tokenData, err := security.RetrieveTokenData(request) if err != nil { return "", err } var token string if tokenData.Role == portainer.AdministratorRole { token = tokenManager.GetAdminServiceAccountToken() } else { token, err = tokenManager.GetUserServiceAccountToken(int(tokenData.ID), transport.endpoint.ID) if err != nil { log.Printf("Failed retrieving service account token: %v", err) return "", err } } return token, nil } // #endregion // #region DECORATE FUNCTIONS func decorateAgentRequest(r *http.Request, dataStore portainer.DataStore) error { requestPath := strings.TrimPrefix(r.URL.Path, "/v2") switch { case strings.HasPrefix(requestPath, "/dockerhub"): return decorateAgentDockerHubRequest(r, dataStore) } return nil } func decorateAgentDockerHubRequest(r *http.Request, dataStore portainer.DataStore) error { requestPath, registryIdString := path.Split(r.URL.Path) registryID, err := strconv.Atoi(registryIdString) if err != nil { return fmt.Errorf("missing registry id: %w", err) } r.URL.Path = strings.TrimSuffix(requestPath, "/") registry := &portainer.Registry{ Type: portainer.DockerHubRegistry, } if registryID != 0 { registry, err = dataStore.Registry().Registry(portainer.RegistryID(registryID)) if err != nil { return fmt.Errorf("failed fetching registry: %w", err) } } if registry.Type != portainer.DockerHubRegistry { return errors.New("invalid registry type") } newBody, err := json.Marshal(registry) if err != nil { return fmt.Errorf("failed marshaling registry: %w", err) } r.Method = http.MethodPost r.Body = ioutil.NopCloser(bytes.NewReader(newBody)) r.ContentLength = int64(len(newBody)) return nil } // #endregion