k3d/pkg/cluster/kubeconfig.go

242 lines
8.0 KiB
Go

/*
Copyright © 2020 The k3d Author(s)
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
*/
package cluster
import (
"bytes"
"fmt"
"io/ioutil"
"os"
"strings"
"time"
"github.com/rancher/k3d/pkg/runtimes"
k3d "github.com/rancher/k3d/pkg/types"
"github.com/rancher/k3d/pkg/util"
log "github.com/sirupsen/logrus"
"k8s.io/client-go/tools/clientcmd"
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
)
// GetKubeconfig grabs the kubeconfig file from /output from a master node container,
// modifies it by updating some fields with cluster-specific information
// and returns a Config object for further processing
func GetKubeconfig(runtime runtimes.Runtime, cluster *k3d.Cluster) (*clientcmdapi.Config, error) {
// get all master nodes for the selected cluster
// TODO: getKubeconfig: we should make sure, that the master node we're trying to fetch from is actually running
masterNodes, err := runtime.GetNodesByLabel(map[string]string{"k3d.cluster": cluster.Name, "k3d.role": string(k3d.MasterRole)})
if err != nil {
log.Errorln("Failed to get master nodes")
return nil, err
}
if len(masterNodes) == 0 {
return nil, fmt.Errorf("Didn't find any master node")
}
// prefer a master node, which actually has the port exposed
var chosenMaster *k3d.Node
chosenMaster = nil
APIPort := k3d.DefaultAPIPort
APIHost := k3d.DefaultAPIHost
for _, master := range masterNodes {
if _, ok := master.Labels["k3d.master.api.port"]; ok {
chosenMaster = master
APIPort = master.Labels["k3d.master.api.port"]
if _, ok := master.Labels["k3d.master.api.host"]; ok {
APIHost = master.Labels["k3d.master.api.host"]
}
break
}
}
if chosenMaster == nil {
chosenMaster = masterNodes[0]
}
// get the kubeconfig from the first master node
reader, err := runtime.GetKubeconfig(chosenMaster)
if err != nil {
log.Errorf("Failed to get kubeconfig from node '%s'", chosenMaster.Name)
return nil, err
}
defer reader.Close()
readBytes, err := ioutil.ReadAll(reader)
if err != nil {
log.Errorln("Couldn't read kubeconfig file")
return nil, err
}
// drop the first 512 bytes which contain file metadata/control characters
// and trim any NULL characters
trimBytes := bytes.Trim(readBytes[512:], "\x00")
/*
* Modify the kubeconfig
*/
kc, err := clientcmd.Load(trimBytes)
if err != nil {
log.Errorln("Failed to parse the KubeConfig")
return nil, err
}
// update the server URL
kc.Clusters["default"].Server = fmt.Sprintf("https://%s:%s", APIHost, APIPort)
// rename user from default to admin
newAuthInfoName := fmt.Sprintf("admin@%s-%s", k3d.DefaultObjectNamePrefix, cluster.Name)
kc.AuthInfos[newAuthInfoName] = kc.AuthInfos["default"]
delete(kc.AuthInfos, "default")
// rename cluster from default to clustername
newClusterName := fmt.Sprintf("%s-%s", k3d.DefaultObjectNamePrefix, cluster.Name)
kc.Clusters[newClusterName] = kc.Clusters["default"]
delete(kc.Clusters, "default")
// rename context from default to admin@clustername
newContextName := fmt.Sprintf("admin@%s-%s", k3d.DefaultObjectNamePrefix, cluster.Name)
kc.Contexts[newContextName] = kc.Contexts["default"]
delete(kc.Contexts, "default")
// update context with new values for cluster and user
kc.Contexts[newContextName].AuthInfo = newAuthInfoName
kc.Contexts[newContextName].Cluster = newClusterName
// set current-context to new context name
kc.CurrentContext = newContextName
log.Debugf("Modified Kubeconfig: %+v", kc)
return kc, nil
}
// GetKubeconfigPath uses GetKubeConfig to grab the kubeconfig from the cluster master node, writes it to a file and outputs the path
func GetKubeconfigPath(runtime runtimes.Runtime, cluster *k3d.Cluster, path string) (string, error) {
var output *os.File
defer output.Close()
var err error
kubeconfig, err := GetKubeconfig(runtime, cluster)
if err != nil {
log.Errorln("Failed to get kubeconfig")
return "", err
}
if path == "-" {
output = os.Stdout
} else {
if path == "" {
basepath, err := util.GetConfigDirOrCreate()
if err != nil {
log.Errorln("Failed to create kubeconfig")
return "", err
}
path = fmt.Sprintf("%s/%s-%s.yaml", basepath, k3d.DefaultKubeconfigPrefix, cluster.Name)
} else if !(strings.HasSuffix(path, ".yaml") || strings.HasSuffix(path, ".yml")) {
log.Warnf("Supplied path '%s' for kubeconfig does not have .yaml or .yml extension", path)
}
output, err = os.Create(path)
if err != nil {
log.Errorf("Failed to create file '%s'", path)
return "", err
}
defer output.Close()
}
kubeconfigBytes, err := clientcmd.Write(*kubeconfig)
if err != nil {
log.Errorln("Failed to write KubeConfig")
return "", err
}
_, err = output.Write(kubeconfigBytes)
if err != nil {
log.Errorf("Failed to write to file '%s'", output.Name())
return "", err
}
return output.Name(), nil
}
// UpdateDefaultKubeConfig will merge the new KubeConfig into the default kubeconfig and overwrite it
func UpdateDefaultKubeConfig(newKubeConfig *clientcmdapi.Config) error {
// load default kubeconfig
existingKubeConfigPath := clientcmd.NewDefaultPathOptions().GetDefaultFilename()
log.Debugf("Loading existing KubeConfig from '%s'", existingKubeConfigPath)
loadingRules := clientcmd.NewDefaultClientConfigLoadingRules()
existingKubeConfig, err := loadingRules.Load()
if err != nil {
log.Errorln("Failed to load default kubeconfig")
return err
}
return MergeKubeConfig(newKubeConfig, existingKubeConfig, existingKubeConfigPath)
}
// MergeKubeConfig merges a new kubeconfig into the existing default kubeconfig
func MergeKubeConfig(newKubeConfig *clientcmdapi.Config, existingKubeConfig *clientcmdapi.Config, outPath string) error {
log.Debugf("Merging new KubeConfig:\n%+v\n>>> into existing KubeConfig:\n%+v", newKubeConfig, existingKubeConfig)
// Overwrite values in existing kubeconfig
for k, v := range newKubeConfig.Clusters {
if _, ok := existingKubeConfig.Clusters[k]; ok {
log.Warnf("Cluster '%s' already exists in KubeConfig. Overwriting...", k)
}
existingKubeConfig.Clusters[k] = v
}
for k, v := range newKubeConfig.AuthInfos {
if _, ok := existingKubeConfig.AuthInfos[k]; ok {
log.Warnf("AuthInfo '%s' already exists in KubeConfig. Overwriting...", k)
}
existingKubeConfig.AuthInfos[k] = v
}
for k, v := range newKubeConfig.Contexts {
if _, ok := existingKubeConfig.Clusters[k]; ok {
log.Warnf("Context '%s' already exists in KubeConfig. Overwriting...", k)
}
existingKubeConfig.Contexts[k] = v
}
existingKubeConfig.CurrentContext = newKubeConfig.CurrentContext
log.Debugf("Merged KubeConfig:\n%+v", existingKubeConfig)
// Write updated/merged KubeConfig to new temporary file
mergedConfigPath := fmt.Sprintf("%s.k3d_%s", outPath, time.Now().Format("20060102_150405.000000"))
if err := clientcmd.WriteToFile(*existingKubeConfig, mergedConfigPath); err != nil {
log.Errorf("Failed to write merged kubeconfig to temporary file '%s'", mergedConfigPath)
return err
}
// Move temporary file over existing KubeConfig
if err := os.Rename(mergedConfigPath, outPath); err != nil {
log.Errorf("Failed to overwrite existing KubeConfig '%s' with new KubeConfig '%s'", outPath, mergedConfigPath)
return err
}
return nil
}