kubeconfig.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529
  1. package connect
  2. import (
  3. "context"
  4. "encoding/base64"
  5. "errors"
  6. "fmt"
  7. "io/ioutil"
  8. "os"
  9. "strings"
  10. "github.com/fatih/color"
  11. awsLocal "github.com/porter-dev/porter/cli/cmd/providers/aws/local"
  12. gcpLocal "github.com/porter-dev/porter/cli/cmd/providers/gcp/local"
  13. "github.com/porter-dev/porter/cli/cmd/utils"
  14. "github.com/porter-dev/porter/internal/kubernetes/local"
  15. "github.com/porter-dev/porter/cli/cmd/api"
  16. "github.com/porter-dev/porter/internal/models"
  17. )
  18. // Kubeconfig creates a service account for a project by parsing the local
  19. // kubeconfig and resolving actions that must be performed.
  20. func Kubeconfig(
  21. client *api.Client,
  22. kubeconfigPath string,
  23. contexts []string,
  24. projectID uint,
  25. isLocal bool,
  26. ) (uint, error) {
  27. // if project ID is 0, ask the user to set the project ID or create a project
  28. if projectID == 0 {
  29. return 0, fmt.Errorf("no project set, please run porter project set [id]")
  30. }
  31. // get the kubeconfig
  32. rawBytes, err := local.GetKubeconfigFromHost(kubeconfigPath, contexts)
  33. if err != nil {
  34. return 0, err
  35. }
  36. // send kubeconfig to client
  37. ccs, err := client.CreateProjectCandidates(
  38. context.Background(),
  39. projectID,
  40. &api.CreateProjectCandidatesRequest{
  41. Kubeconfig: string(rawBytes),
  42. IsLocal: isLocal,
  43. },
  44. )
  45. if err != nil {
  46. return 0, err
  47. }
  48. var lastClusterID uint
  49. for _, cc := range ccs {
  50. var cluster *models.ClusterExternal
  51. if len(cc.Resolvers) > 0 {
  52. allResolver := &models.ClusterResolverAll{}
  53. for _, resolver := range cc.Resolvers {
  54. switch resolver.Name {
  55. case models.ClusterCAData:
  56. absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
  57. if err != nil {
  58. return 0, err
  59. }
  60. filename, err := utils.GetFileReferenceFromKubeconfig(
  61. resolver.Data["filename"],
  62. absKubeconfigPath,
  63. )
  64. if err != nil {
  65. return 0, err
  66. }
  67. err = resolveClusterCAAction(filename, allResolver)
  68. if err != nil {
  69. return 0, err
  70. }
  71. case models.ClusterLocalhost:
  72. err := resolveLocalhostAction(allResolver)
  73. if err != nil {
  74. return 0, err
  75. }
  76. case models.ClientCertData:
  77. absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
  78. if err != nil {
  79. return 0, err
  80. }
  81. filename, err := utils.GetFileReferenceFromKubeconfig(
  82. resolver.Data["filename"],
  83. absKubeconfigPath,
  84. )
  85. if err != nil {
  86. return 0, err
  87. }
  88. err = resolveClientCertAction(filename, allResolver)
  89. if err != nil {
  90. return 0, err
  91. }
  92. case models.ClientKeyData:
  93. absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
  94. if err != nil {
  95. return 0, err
  96. }
  97. filename, err := utils.GetFileReferenceFromKubeconfig(
  98. resolver.Data["filename"],
  99. absKubeconfigPath,
  100. )
  101. if err != nil {
  102. return 0, err
  103. }
  104. err = resolveClientKeyAction(filename, allResolver)
  105. if err != nil {
  106. return 0, err
  107. }
  108. case models.OIDCIssuerData:
  109. absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
  110. if err != nil {
  111. return 0, err
  112. }
  113. filename, err := utils.GetFileReferenceFromKubeconfig(
  114. resolver.Data["filename"],
  115. absKubeconfigPath,
  116. )
  117. if err != nil {
  118. return 0, err
  119. }
  120. err = resolveOIDCIssuerAction(filename, allResolver)
  121. if err != nil {
  122. return 0, err
  123. }
  124. case models.TokenData:
  125. absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
  126. if err != nil {
  127. return 0, err
  128. }
  129. filename, err := utils.GetFileReferenceFromKubeconfig(
  130. resolver.Data["filename"],
  131. absKubeconfigPath,
  132. )
  133. if err != nil {
  134. return 0, err
  135. }
  136. err = resolveTokenDataAction(filename, allResolver)
  137. if err != nil {
  138. return 0, err
  139. }
  140. case models.GCPKeyData:
  141. err := resolveGCPKeyAction(
  142. cc.Server,
  143. cc.Name,
  144. allResolver,
  145. )
  146. if err != nil {
  147. return 0, err
  148. }
  149. case models.AWSData:
  150. err := resolveAWSAction(
  151. cc.Server,
  152. cc.Name,
  153. cc.AWSClusterIDGuess,
  154. kubeconfigPath,
  155. cc.ContextName,
  156. allResolver,
  157. )
  158. if err != nil {
  159. return 0, err
  160. }
  161. }
  162. }
  163. resp, err := client.CreateProjectCluster(
  164. context.Background(),
  165. projectID,
  166. cc.ID,
  167. allResolver,
  168. )
  169. if err != nil {
  170. return 0, err
  171. }
  172. clExt := models.ClusterExternal(*resp)
  173. cluster = &clExt
  174. } else {
  175. resp, err := client.GetProjectCluster(
  176. context.Background(),
  177. projectID,
  178. cc.CreatedClusterID,
  179. )
  180. if err != nil {
  181. return 0, err
  182. }
  183. clExt := models.ClusterExternal(*resp)
  184. cluster = &clExt
  185. }
  186. color.New(color.FgGreen).Printf("created cluster %s with id %d\n", cluster.Name, cluster.ID)
  187. lastClusterID = cluster.ID
  188. }
  189. return lastClusterID, nil
  190. }
  191. // resolves a cluster ca data action
  192. func resolveClusterCAAction(
  193. filename string,
  194. resolver *models.ClusterResolverAll,
  195. ) error {
  196. fileBytes, err := ioutil.ReadFile(filename)
  197. if err != nil {
  198. return err
  199. }
  200. resolver.ClusterCAData = base64.StdEncoding.EncodeToString(fileBytes)
  201. return nil
  202. }
  203. func resolveLocalhostAction(
  204. resolver *models.ClusterResolverAll,
  205. ) error {
  206. resolver.ClusterHostname = "host.docker.internal"
  207. return nil
  208. }
  209. // resolves a client cert data action
  210. func resolveClientCertAction(
  211. filename string,
  212. resolver *models.ClusterResolverAll,
  213. ) error {
  214. fileBytes, err := ioutil.ReadFile(filename)
  215. if err != nil {
  216. return err
  217. }
  218. resolver.ClientCertData = base64.StdEncoding.EncodeToString(fileBytes)
  219. return nil
  220. }
  221. // resolves a client key data action
  222. func resolveClientKeyAction(
  223. filename string,
  224. resolver *models.ClusterResolverAll,
  225. ) error {
  226. fileBytes, err := ioutil.ReadFile(filename)
  227. if err != nil {
  228. return err
  229. }
  230. resolver.ClientKeyData = base64.StdEncoding.EncodeToString(fileBytes)
  231. return nil
  232. }
  233. // resolves an oidc issuer data action
  234. func resolveOIDCIssuerAction(
  235. filename string,
  236. resolver *models.ClusterResolverAll,
  237. ) error {
  238. fileBytes, err := ioutil.ReadFile(filename)
  239. if err != nil {
  240. return err
  241. }
  242. resolver.OIDCIssuerCAData = base64.StdEncoding.EncodeToString(fileBytes)
  243. return nil
  244. }
  245. // resolves a token data action
  246. func resolveTokenDataAction(
  247. filename string,
  248. resolver *models.ClusterResolverAll,
  249. ) error {
  250. fileBytes, err := ioutil.ReadFile(filename)
  251. if err != nil {
  252. return err
  253. }
  254. resolver.TokenData = string(fileBytes)
  255. return nil
  256. }
  257. // resolves a gcp key data action
  258. func resolveGCPKeyAction(
  259. endpoint string,
  260. clusterName string,
  261. resolver *models.ClusterResolverAll,
  262. ) error {
  263. userResp, err := utils.PromptPlaintext(
  264. fmt.Sprintf(
  265. `Detected GKE cluster in kubeconfig for the endpoint %s (%s).
  266. Porter can set up a service account in your GCP project to connect to this cluster automatically.
  267. Would you like to proceed? %s `,
  268. color.New(color.FgCyan).Sprintf("%s", endpoint),
  269. clusterName,
  270. color.New(color.FgCyan).Sprintf("[y/n]"),
  271. ),
  272. )
  273. if err != nil {
  274. return err
  275. }
  276. if userResp := strings.ToLower(userResp); userResp == "y" || userResp == "yes" {
  277. agent, err := gcpLocal.NewDefaultAgent()
  278. if err != nil {
  279. color.New(color.FgRed).Printf("Automatic creation failed, manual input required. Error was: %v\n", err)
  280. return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
  281. }
  282. projID, err := agent.GetProjectIDForGKECluster(endpoint)
  283. if err != nil {
  284. color.New(color.FgRed).Printf("Automatic creation failed, manual input required. Error was: %v\n", err)
  285. return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
  286. }
  287. agent.ProjectID = projID
  288. name := "porter-dashboard-" + utils.StringWithCharset(6, "abcdefghijklmnopqrstuvwxyz1234567890")
  289. // create the service account and give it the correct iam permissions
  290. resp, err := agent.CreateServiceAccount(name)
  291. if err != nil {
  292. color.New(color.FgRed).Printf("Automatic creation failed, manual input required. Error was: %v\n", err)
  293. return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
  294. }
  295. err = agent.SetServiceAccountIAMPolicy(resp)
  296. if err != nil {
  297. color.New(color.FgRed).Printf("Automatic creation failed, manual input required. Error was: %v\n", err)
  298. return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
  299. }
  300. // get the service account key data to send to the server
  301. bytes, err := agent.CreateServiceAccountKey(resp)
  302. if err != nil {
  303. color.New(color.FgRed).Printf("Automatic creation failed, manual input required. Error was: %v\n", err)
  304. return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
  305. }
  306. resolver.GCPKeyData = string(bytes)
  307. return nil
  308. }
  309. return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
  310. }
  311. func resolveGCPKeyActionManual(
  312. endpoint string,
  313. clusterName string,
  314. resolver *models.ClusterResolverAll,
  315. ) error {
  316. keyFileLocation, err := utils.PromptPlaintext(fmt.Sprintf(`Please provide the full path to a service account key file.
  317. Key file location: `))
  318. if err != nil {
  319. return err
  320. }
  321. // attempt to read the key file location
  322. if info, err := os.Stat(keyFileLocation); !os.IsNotExist(err) && !info.IsDir() {
  323. // read the file
  324. bytes, err := ioutil.ReadFile(keyFileLocation)
  325. if err != nil {
  326. return err
  327. }
  328. resolver.GCPKeyData = string(bytes)
  329. return nil
  330. }
  331. return errors.New("Key file not found")
  332. }
  333. // resolves an aws key data action
  334. func resolveAWSAction(
  335. endpoint string,
  336. clusterName string,
  337. awsClusterIDGuess string,
  338. kubeconfigPath string,
  339. contextName string,
  340. resolver *models.ClusterResolverAll,
  341. ) error {
  342. userResp, err := utils.PromptPlaintext(
  343. fmt.Sprintf(
  344. `Detected AWS cluster in kubeconfig for the endpoint %s (%s).
  345. Porter can set up an IAM user in your AWS account to connect to this cluster automatically.
  346. Would you like to proceed? %s `,
  347. color.New(color.FgCyan).Sprintf("%s", endpoint),
  348. clusterName,
  349. color.New(color.FgCyan).Sprintf("[y/n]"),
  350. ),
  351. )
  352. if err != nil {
  353. return err
  354. }
  355. if userResp := strings.ToLower(userResp); userResp == "y" || userResp == "yes" {
  356. agent, err := awsLocal.NewDefaultKubernetesAgent(kubeconfigPath, contextName)
  357. if err != nil {
  358. color.New(color.FgRed).Printf("Automatic creation failed, manual input required. Error was: %v\n", err)
  359. return resolveAWSActionManual(endpoint, clusterName, awsClusterIDGuess, resolver)
  360. }
  361. creds, err := agent.CreateIAMKubernetesMapping(awsClusterIDGuess)
  362. if err != nil {
  363. color.New(color.FgRed).Printf("Automatic creation failed, manual input required. Error was: %v\n", err)
  364. return resolveAWSActionManual(endpoint, clusterName, awsClusterIDGuess, resolver)
  365. }
  366. resolver.AWSAccessKeyID = creds.AWSAccessKeyID
  367. resolver.AWSSecretAccessKey = creds.AWSSecretAccessKey
  368. resolver.AWSClusterID = creds.AWSClusterID
  369. return nil
  370. }
  371. // fallback to manual
  372. return resolveAWSActionManual(endpoint, clusterName, awsClusterIDGuess, resolver)
  373. }
  374. func resolveAWSActionManual(
  375. endpoint string,
  376. clusterName string,
  377. awsClusterIDGuess string,
  378. resolver *models.ClusterResolverAll,
  379. ) error {
  380. // query to see if the AWS cluster ID guess is correct
  381. var clusterID string
  382. userResp, err := utils.PromptPlaintext(
  383. fmt.Sprintf(
  384. `Detected AWS cluster ID as %s. Is this correct? %s `,
  385. color.New(color.FgCyan).Sprintf(awsClusterIDGuess),
  386. color.New(color.FgCyan).Sprintf("[y/n]"),
  387. ),
  388. )
  389. if err != nil {
  390. return err
  391. }
  392. if userResp := strings.ToLower(userResp); userResp == "y" || userResp == "yes" {
  393. clusterID = awsClusterIDGuess
  394. } else {
  395. clusterID, err = utils.PromptPlaintext(fmt.Sprintf(`Cluster ID: `))
  396. if err != nil {
  397. return err
  398. }
  399. }
  400. // query for the access key id
  401. accessKeyID, err := utils.PromptPlaintext(fmt.Sprintf(`AWS Access Key ID: `))
  402. if err != nil {
  403. return err
  404. }
  405. // query for the secret access key
  406. secretKey, err := utils.PromptPlaintext(fmt.Sprintf(`AWS Secret Access Key: `))
  407. if err != nil {
  408. return err
  409. }
  410. resolver.AWSAccessKeyID = accessKeyID
  411. resolver.AWSSecretAccessKey = secretKey
  412. resolver.AWSClusterID = clusterID
  413. return nil
  414. }