Compare commits

...

6 Commits

Author SHA1 Message Date
KubeSphere CI Bot
60e58964a6 Merge pull request #3350 from benyp/release-3.0
fix duplicate args error
2021-02-18 10:47:26 +08:00
zhouyue
ccd7a306de fix duplicate args error
Signed-off-by: Zhou Yue <zhouyue@fin-shine.com>
2021-02-07 15:43:37 +08:00
KubeSphere CI Bot
e8505c12c6 Merge pull request #2967 from imjoey/release-3.0/backport/2931+2934
[release-3.0] Backport 2931 2934 from master branch
2020-09-10 10:46:12 +08:00
zryfish
d06c55a221 Update build.yml
Add release branch to pull request ci
2020-09-08 17:32:26 +08:00
shaowenchen
56ebafcfd5 fix: scm choices
Signed-off-by: shaowenchen <mail@chenshaowen.com>
(cherry picked from commit 018a18e784)
2020-09-08 16:59:30 +08:00
shaowenchen
1adb9b4aba fix crendential sync
Signed-off-by: shaowenchen <mail@chenshaowen.com>
(cherry picked from commit 2dcabb0bdb)
2020-09-08 16:59:30 +08:00
9 changed files with 100 additions and 18 deletions

View File

@@ -10,6 +10,7 @@ on:
pull_request: pull_request:
branches: branches:
- 'master' - 'master'
- 'release*'
jobs: jobs:
build: build:

View File

@@ -48,7 +48,7 @@ const (
// SSHAuthPrivateKey is the key of the passphrase for SecretTypeSSHAuth secrets // SSHAuthPrivateKey is the key of the passphrase for SecretTypeSSHAuth secrets
SSHAuthPassphraseKey = "passphrase" SSHAuthPassphraseKey = "passphrase"
// SSHAuthPrivateKey is the key of the privatekey for SecretTypeSSHAuth secrets // SSHAuthPrivateKey is the key of the privatekey for SecretTypeSSHAuth secrets
SSHAuthPrivateKey = "privatekey" SSHAuthPrivateKey = "private_key"
// SecretTypeSecretText contains data. // SecretTypeSecretText contains data.
// //

View File

@@ -239,8 +239,8 @@ func (c *Controller) syncHandler(key string) error {
} }
// Check secret config exists, otherwise we will create it. // Check secret config exists, otherwise we will create it.
// if secret exists, update config // if secret exists, update config
_, err := c.devopsClient.CreateCredentialInProject(nsName, copySecret) _, err := c.devopsClient.GetCredentialInProject(nsName, copySecret.Name)
if err != nil { if err == nil {
if _, ok := copySecret.Annotations[devopsv1alpha3.CredentialAutoSyncAnnoKey]; ok { if _, ok := copySecret.Annotations[devopsv1alpha3.CredentialAutoSyncAnnoKey]; ok {
_, err := c.devopsClient.UpdateCredentialInProject(nsName, copySecret) _, err := c.devopsClient.UpdateCredentialInProject(nsName, copySecret)
if err != nil { if err != nil {
@@ -248,8 +248,13 @@ func (c *Controller) syncHandler(key string) error {
return err return err
} }
} }
} else {
_, err = c.devopsClient.CreateCredentialInProject(nsName, copySecret)
if err != nil {
klog.V(8).Info(err, fmt.Sprintf("failed to create secret %s ", key))
return err
}
} }
} else { } else {
// Finalizers processing logic // Finalizers processing logic
if sliceutil.HasString(copySecret.ObjectMeta.Finalizers, devopsv1alpha3.CredentialFinalizerName) { if sliceutil.HasString(copySecret.ObjectMeta.Finalizers, devopsv1alpha3.CredentialFinalizerName) {

View File

@@ -274,6 +274,7 @@ func (d devopsOperator) ListPipelineObj(projectName string, limit, offset int) (
//credentialobj in crd //credentialobj in crd
func (d devopsOperator) CreateCredentialObj(projectName string, secret *v1.Secret) (*v1.Secret, error) { func (d devopsOperator) CreateCredentialObj(projectName string, secret *v1.Secret) (*v1.Secret, error) {
projectObj, err := d.ksInformers.Devops().V1alpha3().DevOpsProjects().Lister().Get(projectName) projectObj, err := d.ksInformers.Devops().V1alpha3().DevOpsProjects().Lister().Get(projectName)
secret.Annotations[devopsv1alpha3.CredentialAutoSyncAnnoKey] = "true"
if err != nil { if err != nil {
return nil, err return nil, err
} }

View File

@@ -19,6 +19,9 @@ package routers
import ( import (
"fmt" "fmt"
"io/ioutil" "io/ioutil"
"sort"
"strings"
v1 "k8s.io/api/apps/v1" v1 "k8s.io/api/apps/v1"
corev1 "k8s.io/api/core/v1" corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/errors" "k8s.io/apimachinery/pkg/api/errors"
@@ -29,8 +32,7 @@ import (
"k8s.io/client-go/kubernetes" "k8s.io/client-go/kubernetes"
"k8s.io/client-go/kubernetes/scheme" "k8s.io/client-go/kubernetes/scheme"
"k8s.io/klog" "k8s.io/klog"
"sort" "kubesphere.io/kubesphere/pkg/utils/sliceutil"
"strings"
) )
// choose router node ip by labels, currently select master node // choose router node ip by labels, currently select master node
@@ -318,13 +320,13 @@ func (c *routerOperator) createOrUpdateRouterWorkload(namespace string, publishS
deployment.Spec.Template.Labels["project"] = namespace deployment.Spec.Template.Labels["project"] = namespace
// Add configmap // Add configmap
deployment.Spec.Template.Spec.Containers[0].Args = append(deployment.Spec.Template.Spec.Containers[0].Args, "--configmap=$(POD_NAMESPACE)/"+deployment.Name+configMapSuffix) deployment.Spec.Template.Spec.Containers[0].Args = sliceutil.AppendArg(deployment.Spec.Template.Spec.Containers[0].Args, "--configmap=$(POD_NAMESPACE)/"+deployment.Name+configMapSuffix)
// Isolate namespace // Isolate namespace
deployment.Spec.Template.Spec.Containers[0].Args = append(deployment.Spec.Template.Spec.Containers[0].Args, "--watch-namespace="+namespace) deployment.Spec.Template.Spec.Containers[0].Args = sliceutil.AppendArg(deployment.Spec.Template.Spec.Containers[0].Args, "--watch-namespace="+namespace)
// Choose self as master // Choose self as master
deployment.Spec.Template.Spec.Containers[0].Args = append(deployment.Spec.Template.Spec.Containers[0].Args, "--election-id="+deployment.Name) deployment.Spec.Template.Spec.Containers[0].Args = sliceutil.AppendArg(deployment.Spec.Template.Spec.Containers[0].Args, "--election-id="+deployment.Name)
} }
} else { } else {
@@ -340,7 +342,7 @@ func (c *routerOperator) createOrUpdateRouterWorkload(namespace string, publishS
strings.HasPrefix("--report-node-internal-ip-address", argument) { strings.HasPrefix("--report-node-internal-ip-address", argument) {
continue continue
} }
args = append(args, deployment.Spec.Template.Spec.Containers[i].Args[j]) args = sliceutil.AppendArg(args, deployment.Spec.Template.Spec.Containers[i].Args[j])
} }
deployment.Spec.Template.Spec.Containers[i].Args = args deployment.Spec.Template.Spec.Containers[i].Args = args
} }
@@ -357,9 +359,9 @@ func (c *routerOperator) createOrUpdateRouterWorkload(namespace string, publishS
} }
if publishService { if publishService {
deployment.Spec.Template.Spec.Containers[0].Args = append(deployment.Spec.Template.Spec.Containers[0].Args, "--publish-service="+ingressControllerNamespace+"/"+ingressControllerPrefix+namespace) deployment.Spec.Template.Spec.Containers[0].Args = sliceutil.AppendArg(deployment.Spec.Template.Spec.Containers[0].Args, "--publish-service="+ingressControllerNamespace+"/"+ingressControllerPrefix+namespace)
} else { } else {
deployment.Spec.Template.Spec.Containers[0].Args = append(deployment.Spec.Template.Spec.Containers[0].Args, "--report-node-internal-ip-address") deployment.Spec.Template.Spec.Containers[0].Args = sliceutil.AppendArg(deployment.Spec.Template.Spec.Containers[0].Args, "--report-node-internal-ip-address")
} }
if createDeployment { if createDeployment {

View File

@@ -67,9 +67,9 @@ func TestNewSshCredential(t *testing.T) {
Namespace: "test", Namespace: "test",
}, },
Data: map[string][]byte{ Data: map[string][]byte{
"username": []byte(username), "username": []byte(username),
"passphrase": []byte(passphrase), "passphrase": []byte(passphrase),
"privatekey": []byte(privatekey), "private_key": []byte(privatekey),
}, },
Type: "credential.devops.kubesphere.io/ssh-auth", Type: "credential.devops.kubesphere.io/ssh-auth",
} }

View File

@@ -894,9 +894,10 @@ type BranchPipeline struct {
Name string `json:"name,omitempty" description:"name"` Name string `json:"name,omitempty" description:"name"`
Value string `json:"value,omitempty" description:"value"` Value string `json:"value,omitempty" description:"value"`
} `json:"defaultParameterValue,omitempty" description:""` } `json:"defaultParameterValue,omitempty" description:""`
Description string `json:"description,omitempty" description:"description"` Description string `json:"description,omitempty" description:"description"`
Name string `json:"name,omitempty" description:"name"` Name string `json:"name,omitempty" description:"name"`
Type string `json:"type,omitempty" description:"type"` Type string `json:"type,omitempty" description:"type"`
Choices []interface{} `json:"choices,omitempty" description:"choices"`
} `json:"parameters,omitempty"` } `json:"parameters,omitempty"`
Permissions struct { Permissions struct {
Create bool `json:"create,omitempty" description:"create action"` Create bool `json:"create,omitempty" description:"create action"`

View File

@@ -0,0 +1,57 @@
/*
Copyright 2020 KubeSphere Authors
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package sliceutil
import (
"fmt"
"testing"
"github.com/google/go-cmp/cmp"
)
func TestAppendArg(t *testing.T) {
var tests = []struct {
args []string
arg string
expected []string
}{
{
args: []string{"--arg1=val1", "--arg2=val2", "--arg3=val3"},
arg: "--arg4=val4",
expected: []string{"--arg1=val1", "--arg2=val2", "--arg3=val3", "--arg4=val4"},
},
{
args: []string{"--arg1=val1", "--arg2=val2", "--arg3=val3"},
arg: " --arg2=val2 ",
expected: []string{"--arg1=val1", "--arg2=val2", "--arg3=val3"},
},
{
args: []string{" --arg1 = val1", " --arg2=val2 ", " --arg3"},
arg: " --arg2=val2 ",
expected: []string{" --arg1 = val1", " --arg2=val2 ", " --arg3"},
},
}
for i, test := range tests {
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
result := AppendArg(test.args, test.arg)
if diff := cmp.Diff(result, test.expected); diff != "" {
t.Fatalf("%T differ (-got, +want): %s", test.expected, diff)
}
})
}
}

View File

@@ -16,6 +16,10 @@ limitations under the License.
package sliceutil package sliceutil
import (
"strings"
)
func RemoveString(slice []string, remove func(item string) bool) []string { func RemoveString(slice []string, remove func(item string) bool) []string {
for i := 0; i < len(slice); i++ { for i := 0; i < len(slice); i++ {
if remove(slice[i]) { if remove(slice[i]) {
@@ -34,3 +38,14 @@ func HasString(slice []string, str string) bool {
} }
return false return false
} }
func AppendArg(args []string, arg string) []string {
n := strings.TrimSpace(strings.Split(arg, "=")[0])
for _, v := range args {
if strings.TrimSpace(strings.Split(v, "=")[0]) == n {
return args
}
}
return append(args, arg)
}