mirror of
https://github.com/goharbor/harbor.git
synced 2024-11-18 16:25:16 +01:00
9178ba1138
Signed-off-by: Yang Jiao <jiaoya@vmware.com>
683 lines
32 KiB
Python
683 lines
32 KiB
Python
import os
|
|
import sys
|
|
import json
|
|
import time
|
|
import argparse
|
|
import requests
|
|
import urllib
|
|
from functools import wraps
|
|
from requests.packages.urllib3.exceptions import InsecureRequestWarning
|
|
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
|
|
|
|
parser = argparse.ArgumentParser(description='The script to generate data for harbor v1.4.0')
|
|
parser.add_argument('--endpoint', '-e', dest='endpoint', required=True, help='The endpoint to harbor')
|
|
parser.add_argument('--version', '-v', dest='version', required=False, help='The version to harbor')
|
|
parser.add_argument('--libpath', '-l', dest='libpath', required=False, help='e2e library')
|
|
parser.add_argument('--src-registry', '-g', dest='LOCAL_REGISTRY', required=False, help='Sample images registry')
|
|
parser.add_argument('--src-repo', '-p', dest='LOCAL_REGISTRY_NAMESPACE', required=False, help='Sample images repo')
|
|
|
|
args = parser.parse_args()
|
|
|
|
from os import path
|
|
sys.path.append(args.libpath)
|
|
sys.path.append(args.libpath + "/library")
|
|
from library.docker_api import docker_manifest_push_to_harbor
|
|
from library.repository import Repository
|
|
from library.repository import push_self_build_image_to_project
|
|
|
|
url = "https://"+args.endpoint+"/api/"
|
|
endpoint_url = "https://"+args.endpoint
|
|
print(url)
|
|
|
|
with open("feature_map.json") as f:
|
|
feature_map = json.load(f)
|
|
|
|
def get_branch(func_name, version):
|
|
has_feature = False
|
|
for node in feature_map[func_name]:
|
|
has_feature = True
|
|
if node["version"] == version:
|
|
return node["branch"]
|
|
if has_feature is False:
|
|
return "No Restriction"
|
|
else:
|
|
return "Not Supported"
|
|
|
|
def get_feature_branch(func):
|
|
@wraps(func)
|
|
def inner_func(*args,**kwargs):
|
|
branch=get_branch(inner_func.__name__, kwargs.get("version"))
|
|
if branch == "No Restriction":
|
|
func(*args,**kwargs)
|
|
elif branch == "Not Supported":
|
|
print("Feature {} is not supported in version {}".format(inner_func.__name__, kwargs.get("version")))
|
|
else:
|
|
kwargs["branch"] = branch
|
|
func(*args,**kwargs)
|
|
return
|
|
return inner_func
|
|
|
|
class HarborAPI:
|
|
@get_feature_branch
|
|
def populate_projects(self, key_name, create_project_only = False, **kwargs):
|
|
for project in data[key_name]:
|
|
if kwargs["branch"] in [1,2]:
|
|
if "registry_name" in project:
|
|
print("Populate proxy project...")
|
|
# continue
|
|
elif kwargs["branch"] == 3:
|
|
print("Populate all projects...")
|
|
else:
|
|
raise Exception(r"Error: Feature {} has no branch {}.".format(sys._getframe().f_code.co_name, branch))
|
|
self.create_project(project, version=args.version)
|
|
if create_project_only:
|
|
continue
|
|
for member in project["member"]:
|
|
self.add_member(project["name"], member["name"], member["role"], version=args.version)
|
|
for robot_account in project["robot_account"]:
|
|
self.add_project_robot_account(project["name"], robot_account, version=args.version)
|
|
self.add_p2p_preheat_policy(project, version=args.version)
|
|
self.add_webhook(project["name"], project["webhook"], version=args.version)
|
|
if project["tag_retention_rule"] is not None:
|
|
self.add_tag_retention_rule(project["name"], project["tag_retention_rule"], version=args.version)
|
|
self.add_tag_immutability_rule(project["name"], project["tag_immutability_rule"], version=args.version)
|
|
self.update_project_setting_metadata(project["name"],
|
|
project["configuration"]["public"],
|
|
project["configuration"]["enable_content_trust"],
|
|
project["configuration"]["prevent_vul"],
|
|
project["configuration"]["severity"],
|
|
project["configuration"]["auto_scan"])
|
|
self.update_project_setting_allowlist(project["name"],
|
|
project["configuration"]["reuse_sys_cve_allowlist"],
|
|
project["configuration"]["deployment_security"], version=args.version)
|
|
time.sleep(30)
|
|
|
|
@get_feature_branch
|
|
def populate_quotas(self, **kwargs):
|
|
for quotas in data["quotas"]:
|
|
self.create_project(quotas, version=args.version)
|
|
push_self_build_image_to_project(quotas["name"], args.endpoint, 'admin', 'Harbor12345', quotas["name"], "latest", size=quotas["size"])
|
|
|
|
@get_feature_branch
|
|
def create_project(self, project, **kwargs):
|
|
if kwargs["branch"] == 1:
|
|
body=dict(body={"project_name": project["name"], "metadata": {"public": "true"}})
|
|
request(url+"projects", 'post', **body)
|
|
elif kwargs["branch"] == 2:
|
|
body=dict(body={"project_name": project["name"], "metadata": {"public": "true"},"count_limit":project["count_limit"],"storage_limit":project["storage_limit"]})
|
|
request(url+"projects", 'post', **body)
|
|
elif kwargs["branch"] == 3:
|
|
if project.get("registry_name") is not None:
|
|
r = request(url+"registries?name="+project["registry_name"]+"", 'get')
|
|
registry_id = int(str(r.json()[0]['id']))
|
|
else:
|
|
registry_id = None
|
|
body=dict(body={"project_name": project["name"], "registry_id":registry_id, "metadata": {"public": "true"},"storage_limit":project["storage_limit"]})
|
|
request(url+"projects", 'post', **body)
|
|
|
|
#Project with registry_name is a proxy project, there should be images can be pulled.
|
|
if project.get("registry_name") is not None:
|
|
USER_ADMIN=dict(endpoint = "https://"+args.endpoint+"/api/v2.0" , username = "admin", password = "Harbor12345")
|
|
repo = Repository()
|
|
for _repo in project["repo"]:
|
|
pull_image(args.endpoint+"/"+ project["name"]+"/"+_repo["cache_image_namespace"]+"/"+_repo["cache_image"])
|
|
time.sleep(180)
|
|
repo_name = urllib.parse.quote(_repo["cache_image_namespace"]+"/"+_repo["cache_image"],'utf-8')
|
|
repo_data = repo.get_repository(project["name"], repo_name, **USER_ADMIN)
|
|
return
|
|
else:
|
|
raise Exception(r"Error: Feature {} has no branch {}.".format(sys._getframe().f_code.co_name, branch))
|
|
|
|
def create_user(self, username):
|
|
payload = {"username":username, "email":username+"@harbortest.com", "password":"Harbor12345", "realname":username, "comment":"string"}
|
|
body=dict(body=payload)
|
|
request(url+"users", 'post', **body)
|
|
|
|
@get_feature_branch
|
|
def set_user_admin(self, user, **kwargs):
|
|
r = request(url+"users?username="+user+"", 'get')
|
|
userid = str(r.json()[0]['user_id'])
|
|
|
|
if kwargs["branch"] == 1:
|
|
body=dict(body={"has_admin_role": 1})
|
|
elif kwargs["branch"] == 2:
|
|
body=dict(body={"has_admin_role": True})
|
|
elif kwargs["branch"] == 3:
|
|
body=dict(body={"sysadmin_flag": True, "user_id":int(userid)})
|
|
else:
|
|
raise Exception(r"Error: Feature {} has no branch {}.".format(sys._getframe().f_code.co_name, branch))
|
|
request(url+"users/"+userid+"/sysadmin", 'put', **body)
|
|
|
|
@get_feature_branch
|
|
def add_member(self, project, user, role, **kwargs):
|
|
r = request(url+"projects?name="+project+"", 'get')
|
|
projectid = str(r.json()[0]['project_id'])
|
|
|
|
if kwargs["branch"] == 1:
|
|
payload = {"roles": [role], "username":""+user+""}
|
|
elif kwargs["branch"] == 2:
|
|
payload = {"member_user":{ "username": ""+user+""},"role_id": role}
|
|
else:
|
|
raise Exception(r"Error: Feature {} has no branch {}.".format(sys._getframe().f_code.co_name, branch))
|
|
body=dict(body=payload)
|
|
request(url+"projects/"+projectid+"/members", 'post', **body)
|
|
|
|
@get_feature_branch
|
|
def add_p2p_preheat_policy(self, project, **kwargs):
|
|
r = request(url+"projects?name="+project["name"]+"", 'get')
|
|
projectid = int(str(r.json()[0]['project_id']))
|
|
if kwargs["branch"] == 1:
|
|
if project["p2p_preheat_policy"] is not None:
|
|
instances = request(url+"p2p/preheat/instances", 'get')
|
|
if len(instances.json()) == 0:
|
|
raise Exception(r"Please add p2p preheat instances first.")
|
|
for instance in instances.json():
|
|
print("instance:", instance)
|
|
for policy in project["p2p_preheat_policy"]:
|
|
instance_str = [str(item) for item in instances]
|
|
if policy["provider_name"] in ''.join(instance_str):
|
|
print("policy:", policy)
|
|
if instance['name'] == policy["provider_name"]:
|
|
payload = {
|
|
"provider_id":int(instance['id']),
|
|
"name":policy["name"],
|
|
"filters":policy["filters"],
|
|
"trigger":policy["trigger"],
|
|
"project_id":projectid,
|
|
"enabled":policy["enabled"]
|
|
}
|
|
body=dict(body=payload)
|
|
print(body)
|
|
request(url+"projects/"+project["name"]+"/preheat/policies", 'post', **body)
|
|
else:
|
|
raise Exception(r"Please verify if distribution {} has beed created.".format(policy["provider_name"]))
|
|
else:
|
|
raise Exception(r"Error: Feature {} has no branch {}.".format(sys._getframe().f_code.co_name, branch))
|
|
|
|
@get_feature_branch
|
|
def add_endpoint(self, endpointurl, endpointname, username, password, insecure, registry_type, **kwargs):
|
|
if kwargs["branch"] == 1:
|
|
payload = {"endpoint": ""+endpointurl+"", "name": ""+endpointname+"", "username": ""+username+"", "password": ""+password+"", "insecure": insecure}
|
|
body=dict(body=payload)
|
|
request(url+"targets", 'post', **body)
|
|
elif kwargs["branch"] == 2:
|
|
payload = {
|
|
"credential":{
|
|
"access_key":""+username+"",
|
|
"access_secret":""+password+"",
|
|
"type":"basic"
|
|
},
|
|
"insecure":insecure,
|
|
"name":""+endpointname+"",
|
|
"type":""+registry_type+"",
|
|
"url":""+endpointurl+""
|
|
}
|
|
body=dict(body=payload)
|
|
print(body)
|
|
request(url+"registries", 'post', **body)
|
|
else:
|
|
raise Exception(r"Error: Feature {} has no branch {}.".format(sys._getframe().f_code.co_name, branch))
|
|
|
|
@get_feature_branch
|
|
def add_replication_rule(self, replicationrule, **kwargs):
|
|
if kwargs["branch"] == 1:
|
|
r = request(url+"projects?name="+replicationrule["project"]+"", 'get')
|
|
projectid = r.json()[0]['project_id']
|
|
r = request(url+"targets?name="+replicationrule["endpoint"]+"", 'get')
|
|
targetid = r.json()[0]['id']
|
|
payload = {"name": ""+replicationrule["rulename"]+"", "description": "string", "projects": [{"project_id": projectid,}], "targets": [{"id": targetid,}], "trigger": {"kind": ""+replicationrule["trigger"]+"", "schedule_param": {"type": "weekly", "weekday": 1, "offtime": 0}}}
|
|
body=dict(body=payload)
|
|
request(url+"policies/replication", 'post', **body)
|
|
elif kwargs["branch"] == 2:
|
|
r = request(url+"registries?name="+replicationrule["endpoint"]+"", 'get')
|
|
print("response:", r)
|
|
targetid = r.json()[0]['id']
|
|
if replicationrule["is_src_registry"] is True:
|
|
registry = r'"src_registry": { "id": '+str(targetid)+r'},'
|
|
else:
|
|
registry = r'"dest_registry": { "id": '+str(targetid)+r'},'
|
|
|
|
body=dict(body=json.loads(r'{"name":"'+replicationrule["rulename"]+r'","dest_namespace":"'+replicationrule["dest_namespace"]+r'","deletion": '+str(replicationrule["deletion"]).lower()+r',"enabled": '+str(replicationrule["enabled"]).lower()+r',"override": '+str(replicationrule["override"]).lower()+r',"description": "string",'+ registry + r'"trigger":{"type": "'+replicationrule["trigger_type"]+r'", "trigger_settings":{"cron":"'+replicationrule["cron"]+r'"}},"filters":[ {"type":"name","value":"'+replicationrule["name_filters"]+r'"},{"type":"tag","value":"'+replicationrule["tag_filters"]+r'"}]}'))
|
|
print(body)
|
|
request(url+"replication/policies", 'post', **body)
|
|
else:
|
|
raise Exception(r"Error: Feature {} has no branch {}.".format(sys._getframe().f_code.co_name, branch))
|
|
|
|
#@get_feature_branch
|
|
def update_project_setting_metadata(self, project, public, contenttrust, preventrunning, preventseverity, scanonpush):
|
|
r = request(url+"projects?name="+project+"", 'get')
|
|
projectid = str(r.json()[0]['project_id'])
|
|
payload = {
|
|
"metadata": {
|
|
"public": public,
|
|
"enable_content_trust": contenttrust,
|
|
"prevent_vul": preventrunning,
|
|
"severity": preventseverity,
|
|
"auto_scan": scanonpush
|
|
}
|
|
}
|
|
body=dict(body=payload)
|
|
print(body)
|
|
request(url+"projects/"+projectid+"", 'put', **body)
|
|
|
|
@get_feature_branch
|
|
def add_sys_allowlist(self, cve_id_list, **kwargs):
|
|
cve_id_str = ""
|
|
if kwargs["branch"] == 1:
|
|
for index, cve_id in enumerate(cve_id_list["cve"]):
|
|
cve_id_str = cve_id_str + '{"cve_id":"' +cve_id["id"] + '"}'
|
|
if index != len(cve_id_list["cve"]) - 1:
|
|
cve_id_str = cve_id_str + ","
|
|
body=dict(body=json.loads(r'{"items":['+cve_id_str+r'],"expires_at":'+cve_id_list["expires_at"]+'}'))
|
|
request(url+"system/CVEWhitelist", 'put', **body)
|
|
elif kwargs["branch"] == 2:
|
|
for index, cve_id in enumerate(cve_id_list["cve"]):
|
|
cve_id_str = cve_id_str + '{"cve_id":"' +cve_id["id"] + '"}'
|
|
if index != len(cve_id_list["cve"]) - 1:
|
|
cve_id_str = cve_id_str + ","
|
|
body=dict(body=json.loads(r'{"items":['+cve_id_str+r'],"expires_at":'+cve_id_list["expires_at"]+'}'))
|
|
request(url+"system/CVEAllowlist", 'put', **body)
|
|
else:
|
|
raise Exception(r"Error: Feature {} has no branch {}.".format(sys._getframe().f_code.co_name, branch))
|
|
|
|
@get_feature_branch
|
|
def update_project_setting_allowlist(self, project, reuse_sys_cve_whitelist, cve_id_list, **kwargs):
|
|
r = request(url+"projects?name="+project+"", 'get')
|
|
projectid = str(r.json()[0]['project_id'])
|
|
cve_id_str = ""
|
|
if kwargs["branch"] == 1:
|
|
for index, cve_id in enumerate(cve_id_list["cve"]):
|
|
cve_id_str = cve_id_str + '{"cve_id":"' +cve_id["id"] + '"}'
|
|
if index != len(cve_id_list["cve"]) - 1:
|
|
cve_id_str = cve_id_str + ","
|
|
print(cve_id_str)
|
|
if reuse_sys_cve_whitelist == "true":
|
|
payload = r'{"metadata":{"reuse_sys_cve_whitelist":"true"}}'
|
|
else:
|
|
payload = r'{"metadata":{"reuse_sys_cve_whitelist":"false"},"cve_whitelist":{"project_id":'+projectid+',"items":['+cve_id_str+r'],"expires_at":'+cve_id_list["expires_at"]+'}}'
|
|
print(payload)
|
|
body=dict(body=json.loads(payload))
|
|
request(url+"projects/"+projectid+"", 'put', **body)
|
|
elif kwargs["branch"] == 2:
|
|
for index, cve_id in enumerate(cve_id_list["cve"]):
|
|
cve_id_str = cve_id_str + '{"cve_id":"' +cve_id["id"] + '"}'
|
|
if index != len(cve_id_list["cve"]) - 1:
|
|
cve_id_str = cve_id_str + ","
|
|
print(cve_id_str)
|
|
if reuse_sys_cve_whitelist == "true":
|
|
payload = r'{"metadata":{"reuse_sys_cve_allowlist":"true"}}'
|
|
else:
|
|
payload = r'{"metadata":{"reuse_sys_cve_allowlist":"false"},"cve_whitelist":{"project_id":'+projectid+',"items":['+cve_id_str+r'],"expires_at":'+cve_id_list["expires_at"]+'}}'
|
|
print(payload)
|
|
body=dict(body=json.loads(payload))
|
|
request(url+"projects/"+projectid+"", 'put', **body)
|
|
else:
|
|
raise Exception(r"Error: Feature {} has no branch {}.".format(sys._getframe().f_code.co_name, branch))
|
|
|
|
@get_feature_branch
|
|
def update_interrogation_services(self, cron, **kwargs):
|
|
payload = {"schedule":{"type":"Custom","cron": cron}}
|
|
print(payload)
|
|
body=dict(body=payload)
|
|
request(url+"system/scanAll/schedule", 'post', **body)
|
|
|
|
@get_feature_branch
|
|
def update_systemsetting(self, emailfrom, emailhost, emailport, emailuser, creation, selfreg, token, robot_token, **kwargs):
|
|
if kwargs["branch"] == 1:
|
|
robot_token = float(robot_token)*60*24
|
|
payload = {
|
|
"auth_mode": "db_auth",
|
|
"email_from": emailfrom,
|
|
"email_host": emailhost,
|
|
"email_port": emailport,
|
|
"email_identity": "string",
|
|
"email_username": emailuser,
|
|
"email_ssl": True,
|
|
"email_insecure": True,
|
|
"project_creation_restriction": creation,
|
|
"read_only": False,
|
|
"self_registration": selfreg,
|
|
"token_expiration": token,
|
|
"robot_token_duration":robot_token,
|
|
"scan_all_policy": {
|
|
"type": "none",
|
|
"parameter": {
|
|
"daily_time": 0
|
|
}
|
|
}
|
|
}
|
|
print(payload)
|
|
body=dict(body=payload)
|
|
request(url+"configurations", 'put', **body)
|
|
|
|
@get_feature_branch
|
|
def add_project_robot_account(self, project, robot_account, **kwargs):
|
|
r = request(url+"projects?name="+project+"", 'get')
|
|
projectid = str(r.json()[0]['project_id'])
|
|
|
|
if kwargs["branch"] == 1:
|
|
if len(robot_account["access"]) == 1:
|
|
robot_account_ac = robot_account["access"][0]
|
|
payload = {
|
|
"name": robot_account["name"],
|
|
"access": [
|
|
{
|
|
"resource": "/project/"+projectid+"/repository",
|
|
"action": robot_account_ac["action"]
|
|
}
|
|
]
|
|
}
|
|
elif len(robot_account["access"]) == 2:
|
|
payload = {
|
|
"name": robot_account["name"],
|
|
"access": [
|
|
{
|
|
"resource": "/project/"+projectid+"/repository",
|
|
"action": "pull"
|
|
},
|
|
{
|
|
"resource": "/project/"+projectid+"/repository",
|
|
"action": "push"
|
|
}
|
|
]
|
|
}
|
|
else:
|
|
raise Exception(r"Error: Robot account count {} is not legal!".format(len(robot_account["access"])))
|
|
else:
|
|
raise Exception(r"Error: Feature {} has no branch {}.".format(sys._getframe().f_code.co_name, branch))
|
|
body=dict(body=payload)
|
|
request(url+"projects/"+projectid+"/robots", 'post', **body)
|
|
|
|
@get_feature_branch
|
|
def add_tag_retention_rule(self, project, tag_retention_rule, **kwargs):
|
|
if tag_retention_rule is None:
|
|
print(r"No tag retention rule to be populated for project {}.".format(project))
|
|
r = request(url+"projects?name="+project+"", 'get')
|
|
projectid = str(r.json()[0]['project_id'])
|
|
if kwargs["branch"] == 1:
|
|
payload = {
|
|
"algorithm":"or",
|
|
"rules":
|
|
[
|
|
{
|
|
"disabled":False,
|
|
"action":"retain",
|
|
"scope_selectors":
|
|
{
|
|
"repository":
|
|
[
|
|
{
|
|
"kind":"doublestar",
|
|
"decoration":"repoMatches",
|
|
"pattern":tag_retention_rule["repository_patten"]
|
|
}
|
|
]
|
|
},
|
|
"tag_selectors":
|
|
[
|
|
{
|
|
"kind":"doublestar",
|
|
"decoration":"matches","pattern":tag_retention_rule["tag_decoration"]
|
|
}
|
|
],
|
|
"params":{"latestPushedK":tag_retention_rule["latestPushedK"]},
|
|
"template":"latestPushedK"
|
|
}
|
|
],
|
|
"trigger":
|
|
{
|
|
"kind":"Schedule",
|
|
"references":{},
|
|
"settings":{"cron":tag_retention_rule["cron"]}
|
|
},
|
|
"scope":
|
|
{
|
|
"level":"project",
|
|
"ref":int(projectid)
|
|
}
|
|
}
|
|
print(payload)
|
|
body=dict(body=payload)
|
|
action = "post"
|
|
request(url+"retentions", action, **body)
|
|
else:
|
|
raise Exception(r"Error: Feature {} has no branch {}.".format(sys._getframe().f_code.co_name, kwargs["branch"]))
|
|
|
|
@get_feature_branch
|
|
def add_tag_immutability_rule(self, project, tag_immutability_rule, **kwargs):
|
|
r = request(url+"projects?name="+project+"", 'get')
|
|
projectid = str(r.json()[0]['project_id'])
|
|
if kwargs["branch"] == 1:
|
|
payload = {
|
|
"disabled":False,
|
|
"action":"immutable",
|
|
"scope_selectors":
|
|
{
|
|
"repository":
|
|
[
|
|
{
|
|
"kind":"doublestar",
|
|
"decoration":tag_immutability_rule["repo_decoration"],
|
|
"pattern":tag_immutability_rule["repo_pattern"]
|
|
}
|
|
]
|
|
},
|
|
"tag_selectors":
|
|
[
|
|
{
|
|
"kind":"doublestar",
|
|
"decoration":tag_immutability_rule["tag_decoration"],
|
|
"pattern":tag_immutability_rule["tag_pattern"]
|
|
}
|
|
],
|
|
"project_id":int(projectid),
|
|
"priority":0,
|
|
"template":"immutable_template"
|
|
}
|
|
print(payload)
|
|
body=dict(body=payload)
|
|
request(url+"projects/"+projectid+"/immutabletagrules", 'post', **body)
|
|
else:
|
|
raise Exception(r"Error: Feature {} has no branch {}.".format(sys._getframe().f_code.co_name, kwargs["branch"]))
|
|
|
|
@get_feature_branch
|
|
def add_webhook(self, project, webhook, **kwargs):
|
|
r = request(url+"projects?name="+project+"", 'get')
|
|
projectid = str(r.json()[0]['project_id'])
|
|
if kwargs["branch"] == 1:
|
|
payload = {
|
|
"targets":[
|
|
{
|
|
"type":webhook["notify_type"],
|
|
"address":webhook["address"],
|
|
"skip_cert_verify":webhook["skip_cert_verify"],
|
|
"auth_header":webhook["auth_header"]
|
|
}
|
|
],
|
|
"event_types":[
|
|
"downloadChart",
|
|
"deleteChart",
|
|
"uploadChart",
|
|
"deleteImage",
|
|
"pullImage",
|
|
"pushImage",
|
|
"scanningFailed",
|
|
"scanningCompleted"
|
|
],
|
|
"enabled":webhook["enabled"]
|
|
}
|
|
body=dict(body=payload)
|
|
request(url+"projects/"+projectid+"/webhook/policies", 'post', **body)
|
|
elif kwargs["branch"] == 2:
|
|
payload = {
|
|
"targets":[
|
|
{
|
|
"type":webhook["notify_type"],
|
|
"address":webhook["address"],
|
|
"skip_cert_verify":webhook["skip_cert_verify"],
|
|
"auth_header":webhook["auth_header"]
|
|
}
|
|
],
|
|
"event_types":[
|
|
"DELETE_ARTIFACT",
|
|
"PULL_ARTIFACT",
|
|
"PUSH_ARTIFACT",
|
|
"DELETE_CHART",
|
|
"DOWNLOAD_CHART",
|
|
"UPLOAD_CHART",
|
|
"QUOTA_EXCEED",
|
|
"QUOTA_WARNING",
|
|
"REPLICATION",
|
|
"SCANNING_FAILED",
|
|
"SCANNING_COMPLETED"
|
|
],
|
|
"enabled":webhook["enabled"],
|
|
"name":webhook["name"]
|
|
}
|
|
body=dict(body=payload)
|
|
request(url+"projects/"+projectid+"/webhook/policies", 'post', **body)
|
|
else:
|
|
raise Exception(r"Error: Feature {} has no branch {}.".format(sys._getframe().f_code.co_name, kwargs["branch"]))
|
|
|
|
def update_repoinfo(self, reponame):
|
|
payload = {"description": "testdescription"}
|
|
print(payload)
|
|
body=dict(body=payload)
|
|
request(url+"repositories/"+reponame+"", 'put', **body)
|
|
|
|
@get_feature_branch
|
|
def add_distribution(self, distribution, **kwargs):
|
|
if kwargs["branch"] == 1:
|
|
payload = {
|
|
"name":distribution["name"],
|
|
"endpoint":distribution["endpoint"],
|
|
"enabled":distribution["enabled"],
|
|
"vendor":distribution["vendor"],
|
|
"auth_mode":distribution["auth_mode"],
|
|
"insecure":distribution["insecure"]
|
|
}
|
|
print(payload)
|
|
body=dict(body=payload)
|
|
request(url+"p2p/preheat/instances", 'post', **body)
|
|
else:
|
|
raise Exception(r"Error: Feature {} has no branch {}.".format(sys._getframe().f_code.co_name, kwargs["branch"]))
|
|
|
|
@get_feature_branch
|
|
def get_ca(self, target='/harbor/ca/ca.crt', **kwargs):
|
|
if kwargs["branch"] == 1:
|
|
url = "https://" + args.endpoint + "/api/systeminfo/getcert"
|
|
elif kwargs["branch"] == 2:
|
|
url = "https://" + args.endpoint + "/api/v2.0/systeminfo/getcert"
|
|
resp = request(url, 'get')
|
|
try:
|
|
ca_content = json.loads(resp.text)
|
|
except ValueError:
|
|
ca_content = resp.text
|
|
ca_path = '/harbor/ca'
|
|
if not os.path.exists(ca_path):
|
|
try:
|
|
os.makedirs(ca_path)
|
|
except Exception as e:
|
|
print(str(e))
|
|
pass
|
|
open(target, 'wb').write(str(ca_content).encode('utf-8'))
|
|
|
|
@get_feature_branch
|
|
def push_artifact_index(self, project, name, tag, **kwargs):
|
|
image_a = "alpine"
|
|
image_b = "busybox"
|
|
repo_name_a, tag_a = push_self_build_image_to_project(project, args.endpoint, 'admin', 'Harbor12345', image_a, "latest")
|
|
repo_name_b, tag_b = push_self_build_image_to_project(project, args.endpoint, 'admin', 'Harbor12345', image_b, "latest")
|
|
manifests = [args.endpoint+"/"+repo_name_a+":"+tag_a, args.endpoint+"/"+repo_name_b+":"+tag_b]
|
|
index = args.endpoint+"/"+project+"/"+name+":"+tag
|
|
docker_manifest_push_to_harbor(index, manifests, args.endpoint, 'admin', 'Harbor12345', cfg_file = args.libpath + "/update_docker_cfg.sh")
|
|
|
|
def request(url, method, user = None, userp = None, **kwargs):
|
|
if user is None:
|
|
user = "admin"
|
|
if userp is None:
|
|
userp = "Harbor12345"
|
|
kwargs.setdefault('headers', kwargs.get('headers', {}))
|
|
#kwargs['headers']['Accept'] = 'application/json'
|
|
if 'body' in kwargs:
|
|
kwargs['headers']['Content-Type'] = 'application/json'
|
|
kwargs['data'] = json.dumps(kwargs['body'])
|
|
del kwargs['body']
|
|
resp = requests.request(method, url, verify=False, auth=(user, userp), **kwargs)
|
|
if resp.status_code >= 400:
|
|
raise Exception("[Exception Message] - {}".format(resp.text))
|
|
return resp
|
|
|
|
with open("data.json") as f:
|
|
data = json.load(f)
|
|
|
|
def pull_image(*image):
|
|
for i in image:
|
|
print("docker pulling image: ", i)
|
|
os.system("docker pull "+i)
|
|
|
|
def push_image(image, project):
|
|
os.system("docker tag "+image+" "+args.endpoint+"/"+project+"/"+image)
|
|
os.system("docker login "+args.endpoint+" -u admin"+" -p Harbor12345")
|
|
os.system("docker push "+args.endpoint+"/"+project+"/library/"+image)
|
|
|
|
def push_signed_image(image, project, tag):
|
|
print("LOCAL_REGISTRY:{} LOCAL_REGISTRY_NAMESPACE:{}".format(args.LOCAL_REGISTRY, args.LOCAL_REGISTRY_NAMESPACE))
|
|
os.system("./sign_image.sh" + " " + args.endpoint + " " + project + " " + image + " " + tag + " " + args.LOCAL_REGISTRY + " " + args.LOCAL_REGISTRY_NAMESPACE)
|
|
|
|
@get_feature_branch
|
|
def set_url(**kwargs):
|
|
global url
|
|
if kwargs["branch"] == 1:
|
|
url = "https://"+args.endpoint+"/api/"
|
|
elif kwargs["branch"] == 2:
|
|
url = "https://"+args.endpoint+"/api/v2.0/"
|
|
|
|
def do_data_creation():
|
|
harborAPI = HarborAPI()
|
|
set_url(version=args.version)
|
|
harborAPI.get_ca(version=args.version)
|
|
|
|
for user in data["users"]:
|
|
harborAPI.create_user(user["name"])
|
|
|
|
for user in data["admin"]:
|
|
harborAPI.set_user_admin(user["name"], version=args.version)
|
|
|
|
# Make sure to create endpoint first, it's for proxy cache project creation.
|
|
for endpoint in data["endpoint"]:
|
|
print("endpoint:", endpoint)
|
|
harborAPI.add_endpoint(endpoint["url"], endpoint["name"], endpoint["user"], endpoint["pass"], endpoint["insecure"], endpoint["type"], version=args.version)
|
|
|
|
for distribution in data["distributions"]:
|
|
harborAPI.add_distribution(distribution, version=args.version)
|
|
|
|
harborAPI.populate_projects("projects", version=args.version)
|
|
harborAPI.populate_projects("notary_projects", create_project_only=True, version=args.version)
|
|
harborAPI.populate_quotas(version=args.version)
|
|
|
|
harborAPI.push_artifact_index(data["projects"][0]["name"], data["projects"][0]["artifact_index"]["name"], data["projects"][0]["artifact_index"]["tag"], version=args.version)
|
|
#pull_image("busybox", "redis", "haproxy", "alpine", "httpd:2")
|
|
push_self_build_image_to_project(data["projects"][0]["name"], args.endpoint, 'admin', 'Harbor12345', "busybox", "latest")
|
|
for project in data["notary_projects"]:
|
|
push_signed_image("alpine", project["name"], "latest")
|
|
|
|
for replicationrule in data["replicationrule"]:
|
|
harborAPI.add_replication_rule(replicationrule, version=args.version)
|
|
|
|
|
|
harborAPI.update_interrogation_services(data["interrogation_services"]["cron"], version=args.version)
|
|
|
|
harborAPI.update_systemsetting(data["configuration"]["emailsetting"]["emailfrom"],
|
|
data["configuration"]["emailsetting"]["emailserver"],
|
|
int(data["configuration"]["emailsetting"]["emailport"]),
|
|
data["configuration"]["emailsetting"]["emailuser"],
|
|
data["configuration"]["projectcreation"],
|
|
data["configuration"]["selfreg"],
|
|
int(data["configuration"]["token"]),
|
|
int(data["configuration"]["robot_token"]), version=args.version)
|
|
|
|
harborAPI.add_sys_allowlist(data["configuration"]["deployment_security"], version=args.version)
|
|
|
|
do_data_creation()
|