mirror of
https://github.com/lensapp/lens.git
synced 2025-05-20 05:10:56 +00:00
* Ignore clusters with invalid kubeconfig Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> * Improve error message Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> * Mark cluster as dead if kubeconfig loading fails Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> * Fix tests Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> * Validate cluster object in kubeconfig when constructing cluster Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> * Add unit tests for validateKubeConfig Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> * Refactor validateKubeconfig unit tests Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> * Extract ValidationOpts type Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> * Add default value to validationOpts param Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> * Change isDead to property Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> * Fix lint issues Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> * Add missing new line Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> * Update validateKubeConfig in-code documentation Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> * Remove isDead property Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> * Display warning notification if invalid kubeconfig detected (#2233) * Display warning notification if invalid kubeconfig detected Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com>
200 lines
5.9 KiB
TypeScript
200 lines
5.9 KiB
TypeScript
import { KubeConfig, V1Node, V1Pod } from "@kubernetes/client-node";
|
|
import fse from "fs-extra";
|
|
import path from "path";
|
|
import os from "os";
|
|
import yaml from "js-yaml";
|
|
import logger from "../main/logger";
|
|
import commandExists from "command-exists";
|
|
import { ExecValidationNotFoundError } from "./custom-errors";
|
|
|
|
export type KubeConfigValidationOpts = {
|
|
validateCluster?: boolean;
|
|
validateUser?: boolean;
|
|
validateExec?: boolean;
|
|
};
|
|
|
|
export const kubeConfigDefaultPath = path.join(os.homedir(), ".kube", "config");
|
|
|
|
function resolveTilde(filePath: string) {
|
|
if (filePath[0] === "~" && (filePath[1] === "/" || filePath.length === 1)) {
|
|
return filePath.replace("~", os.homedir());
|
|
}
|
|
|
|
return filePath;
|
|
}
|
|
|
|
export function loadConfig(pathOrContent?: string): KubeConfig {
|
|
const kc = new KubeConfig();
|
|
|
|
if (fse.pathExistsSync(pathOrContent)) {
|
|
kc.loadFromFile(path.resolve(resolveTilde(pathOrContent)));
|
|
} else {
|
|
kc.loadFromString(pathOrContent);
|
|
}
|
|
|
|
return kc;
|
|
}
|
|
|
|
/**
|
|
* KubeConfig is valid when there's at least one of each defined:
|
|
* - User
|
|
* - Cluster
|
|
* - Context
|
|
* @param config KubeConfig to check
|
|
*/
|
|
export function validateConfig(config: KubeConfig | string): KubeConfig {
|
|
if (typeof config == "string") {
|
|
config = loadConfig(config);
|
|
}
|
|
logger.debug(`validating kube config: ${JSON.stringify(config)}`);
|
|
|
|
if (!config.users || config.users.length == 0) {
|
|
throw new Error("No users provided in config");
|
|
}
|
|
|
|
if (!config.clusters || config.clusters.length == 0) {
|
|
throw new Error("No clusters provided in config");
|
|
}
|
|
|
|
if (!config.contexts || config.contexts.length == 0) {
|
|
throw new Error("No contexts provided in config");
|
|
}
|
|
|
|
return config;
|
|
}
|
|
|
|
/**
|
|
* Breaks kube config into several configs. Each context as it own KubeConfig object
|
|
*/
|
|
export function splitConfig(kubeConfig: KubeConfig): KubeConfig[] {
|
|
const configs: KubeConfig[] = [];
|
|
|
|
if (!kubeConfig.contexts) {
|
|
return configs;
|
|
}
|
|
kubeConfig.contexts.forEach(ctx => {
|
|
const kc = new KubeConfig();
|
|
|
|
kc.clusters = [kubeConfig.getCluster(ctx.cluster)].filter(n => n);
|
|
kc.users = [kubeConfig.getUser(ctx.user)].filter(n => n);
|
|
kc.contexts = [kubeConfig.getContextObject(ctx.name)].filter(n => n);
|
|
kc.setCurrentContext(ctx.name);
|
|
|
|
configs.push(kc);
|
|
});
|
|
|
|
return configs;
|
|
}
|
|
|
|
export function dumpConfigYaml(kubeConfig: Partial<KubeConfig>): string {
|
|
const config = {
|
|
apiVersion: "v1",
|
|
kind: "Config",
|
|
preferences: {},
|
|
"current-context": kubeConfig.currentContext,
|
|
clusters: kubeConfig.clusters.map(cluster => {
|
|
return {
|
|
name: cluster.name,
|
|
cluster: {
|
|
"certificate-authority-data": cluster.caData,
|
|
"certificate-authority": cluster.caFile,
|
|
server: cluster.server,
|
|
"insecure-skip-tls-verify": cluster.skipTLSVerify
|
|
}
|
|
};
|
|
}),
|
|
contexts: kubeConfig.contexts.map(context => {
|
|
return {
|
|
name: context.name,
|
|
context: {
|
|
cluster: context.cluster,
|
|
user: context.user,
|
|
namespace: context.namespace
|
|
}
|
|
};
|
|
}),
|
|
users: kubeConfig.users.map(user => {
|
|
return {
|
|
name: user.name,
|
|
user: {
|
|
"client-certificate-data": user.certData,
|
|
"client-certificate": user.certFile,
|
|
"client-key-data": user.keyData,
|
|
"client-key": user.keyFile,
|
|
"auth-provider": user.authProvider,
|
|
exec: user.exec,
|
|
token: user.token,
|
|
username: user.username,
|
|
password: user.password
|
|
}
|
|
};
|
|
})
|
|
};
|
|
|
|
logger.debug("Dumping KubeConfig:", config);
|
|
|
|
// skipInvalid: true makes dump ignore undefined values
|
|
return yaml.safeDump(config, { skipInvalid: true });
|
|
}
|
|
|
|
export function podHasIssues(pod: V1Pod) {
|
|
// Logic adapted from dashboard
|
|
const notReady = !!pod.status.conditions.find(condition => {
|
|
return condition.type == "Ready" && condition.status !== "True";
|
|
});
|
|
|
|
return (
|
|
notReady ||
|
|
pod.status.phase !== "Running" ||
|
|
pod.spec.priority > 500000 // We're interested in high prio pods events regardless of their running status
|
|
);
|
|
}
|
|
|
|
export function getNodeWarningConditions(node: V1Node) {
|
|
return node.status.conditions.filter(c =>
|
|
c.status.toLowerCase() === "true" && c.type !== "Ready" && c.type !== "HostUpgrades"
|
|
);
|
|
}
|
|
|
|
/**
|
|
* Checks if `config` has valid `Context`, `User`, `Cluster`, and `exec` fields (if present when required)
|
|
*/
|
|
export function validateKubeConfig (config: KubeConfig, contextName: string, validationOpts: KubeConfigValidationOpts = {}) {
|
|
// we only receive a single context, cluster & user object here so lets validate them as this
|
|
// will be called when we add a new cluster to Lens
|
|
|
|
const { validateUser = true, validateCluster = true, validateExec = true } = validationOpts;
|
|
|
|
const contextObject = config.getContextObject(contextName);
|
|
|
|
// Validate the Context Object
|
|
if (!contextObject) {
|
|
throw new Error(`No valid context object provided in kubeconfig for context '${contextName}'`);
|
|
}
|
|
|
|
// Validate the Cluster Object
|
|
if (validateCluster && !config.getCluster(contextObject.cluster)) {
|
|
throw new Error(`No valid cluster object provided in kubeconfig for context '${contextName}'`);
|
|
}
|
|
|
|
const user = config.getUser(contextObject.user);
|
|
|
|
// Validate the User Object
|
|
if (validateUser && !user) {
|
|
throw new Error(`No valid user object provided in kubeconfig for context '${contextName}'`);
|
|
}
|
|
|
|
// Validate exec command if present
|
|
if (validateExec && user?.exec) {
|
|
const execCommand = user.exec["command"];
|
|
// check if the command is absolute or not
|
|
const isAbsolute = path.isAbsolute(execCommand);
|
|
|
|
// validate the exec struct in the user object, start with the command field
|
|
if (!commandExists.sync(execCommand)) {
|
|
logger.debug(`validateKubeConfig: exec command ${String(execCommand)} in kubeconfig ${contextName} not found`);
|
|
throw new ExecValidationNotFoundError(execCommand, isAbsolute);
|
|
}
|
|
}
|
|
}
|