| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494 |
- package connect
- import (
- "context"
- "encoding/base64"
- "errors"
- "fmt"
- "io/ioutil"
- "os"
- "strings"
- "github.com/fatih/color"
- awsLocal "github.com/porter-dev/porter/cli/cmd/providers/aws/local"
- gcpLocal "github.com/porter-dev/porter/cli/cmd/providers/gcp/local"
- "github.com/porter-dev/porter/cli/cmd/utils"
- "github.com/porter-dev/porter/internal/kubernetes/local"
- api "github.com/porter-dev/porter/api/client"
- "github.com/porter-dev/porter/api/types"
- )
- // Kubeconfig creates a service account for a project by parsing the local
- // kubeconfig and resolving actions that must be performed.
- func Kubeconfig(
- client *api.Client,
- kubeconfigPath string,
- contexts []string,
- projectID uint,
- isLocal bool,
- ) (uint, error) {
- // if project ID is 0, ask the user to set the project ID or create a project
- if projectID == 0 {
- return 0, fmt.Errorf("no project set, please run porter project set [id]")
- }
- // get the kubeconfig
- rawBytes, err := local.GetKubeconfigFromHost(kubeconfigPath, contexts)
- if err != nil {
- return 0, err
- }
- // send kubeconfig to client
- resp, err := client.CreateProjectCandidates(
- context.Background(),
- projectID,
- &types.CreateClusterCandidateRequest{
- Kubeconfig: string(rawBytes),
- IsLocal: isLocal,
- },
- )
- if err != nil {
- return 0, err
- }
- ccs := *resp
- var lastClusterID uint
- for _, cc := range ccs {
- var cluster *types.Cluster
- if len(cc.Resolvers) > 0 {
- allResolver := &types.ClusterResolverAll{}
- for _, resolver := range cc.Resolvers {
- switch resolver.Name {
- case types.ClusterCAData:
- absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
- if err != nil {
- return 0, err
- }
- filename, err := utils.GetFileReferenceFromKubeconfig(
- resolver.Data["filename"],
- absKubeconfigPath,
- )
- if err != nil {
- return 0, err
- }
- err = resolveClusterCAAction(filename, allResolver)
- if err != nil {
- return 0, err
- }
- case types.ClusterLocalhost:
- err := resolveLocalhostAction(allResolver)
- if err != nil {
- return 0, err
- }
- case types.ClientCertData:
- absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
- if err != nil {
- return 0, err
- }
- filename, err := utils.GetFileReferenceFromKubeconfig(
- resolver.Data["filename"],
- absKubeconfigPath,
- )
- if err != nil {
- return 0, err
- }
- err = resolveClientCertAction(filename, allResolver)
- if err != nil {
- return 0, err
- }
- case types.ClientKeyData:
- absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
- if err != nil {
- return 0, err
- }
- filename, err := utils.GetFileReferenceFromKubeconfig(
- resolver.Data["filename"],
- absKubeconfigPath,
- )
- if err != nil {
- return 0, err
- }
- err = resolveClientKeyAction(filename, allResolver)
- if err != nil {
- return 0, err
- }
- case types.OIDCIssuerData:
- absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
- if err != nil {
- return 0, err
- }
- filename, err := utils.GetFileReferenceFromKubeconfig(
- resolver.Data["filename"],
- absKubeconfigPath,
- )
- if err != nil {
- return 0, err
- }
- err = resolveOIDCIssuerAction(filename, allResolver)
- if err != nil {
- return 0, err
- }
- case types.TokenData:
- absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
- if err != nil {
- return 0, err
- }
- filename, err := utils.GetFileReferenceFromKubeconfig(
- resolver.Data["filename"],
- absKubeconfigPath,
- )
- if err != nil {
- return 0, err
- }
- err = resolveTokenDataAction(filename, allResolver)
- if err != nil {
- return 0, err
- }
- case types.GCPKeyData:
- err := resolveGCPKeyAction(
- cc.Server,
- cc.Name,
- allResolver,
- )
- if err != nil {
- return 0, err
- }
- case types.AWSData:
- err := resolveAWSAction(
- cc.Server,
- cc.Name,
- cc.AWSClusterIDGuess,
- kubeconfigPath,
- cc.ContextName,
- allResolver,
- )
- if err != nil {
- return 0, err
- }
- }
- }
- resp, err := client.CreateProjectCluster(
- context.Background(),
- projectID,
- cc.ID,
- allResolver,
- )
- if err != nil {
- return 0, err
- }
- clExt := types.Cluster(*resp)
- cluster = &clExt
- } else {
- resp, err := client.GetProjectCluster(
- context.Background(),
- projectID,
- cc.CreatedClusterID,
- )
- if err != nil {
- return 0, err
- }
- cluster = resp.Cluster
- }
- color.New(color.FgGreen).Printf("created cluster %s with id %d\n", cluster.Name, cluster.ID)
- lastClusterID = cluster.ID
- }
- return lastClusterID, nil
- }
- // resolves a cluster ca data action
- func resolveClusterCAAction(
- filename string,
- resolver *types.ClusterResolverAll,
- ) error {
- fileBytes, err := ioutil.ReadFile(filename)
- if err != nil {
- return err
- }
- resolver.ClusterCAData = base64.StdEncoding.EncodeToString(fileBytes)
- return nil
- }
- func resolveLocalhostAction(
- resolver *types.ClusterResolverAll,
- ) error {
- resolver.ClusterHostname = "host.docker.internal"
- return nil
- }
- // resolves a client cert data action
- func resolveClientCertAction(
- filename string,
- resolver *types.ClusterResolverAll,
- ) error {
- fileBytes, err := ioutil.ReadFile(filename)
- if err != nil {
- return err
- }
- resolver.ClientCertData = base64.StdEncoding.EncodeToString(fileBytes)
- return nil
- }
- // resolves a client key data action
- func resolveClientKeyAction(
- filename string,
- resolver *types.ClusterResolverAll,
- ) error {
- fileBytes, err := ioutil.ReadFile(filename)
- if err != nil {
- return err
- }
- resolver.ClientKeyData = base64.StdEncoding.EncodeToString(fileBytes)
- return nil
- }
- // resolves an oidc issuer data action
- func resolveOIDCIssuerAction(
- filename string,
- resolver *types.ClusterResolverAll,
- ) error {
- fileBytes, err := ioutil.ReadFile(filename)
- if err != nil {
- return err
- }
- resolver.OIDCIssuerCAData = base64.StdEncoding.EncodeToString(fileBytes)
- return nil
- }
- // resolves a token data action
- func resolveTokenDataAction(
- filename string,
- resolver *types.ClusterResolverAll,
- ) error {
- fileBytes, err := ioutil.ReadFile(filename)
- if err != nil {
- return err
- }
- resolver.TokenData = string(fileBytes)
- return nil
- }
- // resolves a gcp key data action
- func resolveGCPKeyAction(
- endpoint string,
- clusterName string,
- resolver *types.ClusterResolverAll,
- ) error {
- userResp, err := utils.PromptPlaintext(
- fmt.Sprintf(
- `Detected GKE cluster in kubeconfig for the endpoint %s (%s).
- Porter can set up a service account in your GCP project to connect to this cluster automatically.
- Would you like to proceed? %s `,
- color.New(color.FgCyan).Sprintf("%s", endpoint),
- clusterName,
- color.New(color.FgCyan).Sprintf("[y/n]"),
- ),
- )
- if err != nil {
- return err
- }
- if userResp := strings.ToLower(userResp); userResp == "y" || userResp == "yes" {
- agent, err := gcpLocal.NewDefaultAgent()
- if err != nil {
- color.New(color.FgRed).Fprintf(os.Stderr, "Automatic creation failed, manual input required. Error was: %v\n", err)
- return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
- }
- projID, err := agent.GetProjectIDForGKECluster(endpoint)
- if err != nil {
- color.New(color.FgRed).Fprintf(os.Stderr, "Automatic creation failed, manual input required. Error was: %v\n", err)
- return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
- }
- agent.ProjectID = projID
- name := "porter-dashboard-" + utils.StringWithCharset(6, "abcdefghijklmnopqrstuvwxyz1234567890")
- // create the service account and give it the correct iam permissions
- resp, err := agent.CreateServiceAccount(name)
- if err != nil {
- color.New(color.FgRed).Fprintf(os.Stderr, "Automatic creation failed, manual input required. Error was: %v\n", err)
- return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
- }
- err = agent.SetServiceAccountIAMPolicy(resp)
- if err != nil {
- color.New(color.FgRed).Fprintf(os.Stderr, "Automatic creation failed, manual input required. Error was: %v\n", err)
- return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
- }
- // get the service account key data to send to the server
- bytes, err := agent.CreateServiceAccountKey(resp)
- if err != nil {
- color.New(color.FgRed).Fprintf(os.Stderr, "Automatic creation failed, manual input required. Error was: %v\n", err)
- return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
- }
- resolver.GCPKeyData = string(bytes)
- return nil
- }
- return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
- }
- func resolveGCPKeyActionManual(
- endpoint string,
- clusterName string,
- resolver *types.ClusterResolverAll,
- ) error {
- keyFileLocation, err := utils.PromptPlaintext(fmt.Sprintf(`Please provide the full path to a service account key file.
- Key file location: `))
- if err != nil {
- return err
- }
- // attempt to read the key file location
- if info, err := os.Stat(keyFileLocation); !os.IsNotExist(err) && !info.IsDir() {
- // read the file
- bytes, err := ioutil.ReadFile(keyFileLocation)
- if err != nil {
- return err
- }
- resolver.GCPKeyData = string(bytes)
- return nil
- }
- return errors.New("Key file not found")
- }
- // resolves an aws key data action
- func resolveAWSAction(
- endpoint string,
- clusterName string,
- awsClusterIDGuess string,
- kubeconfigPath string,
- contextName string,
- resolver *types.ClusterResolverAll,
- ) error {
- userResp, err := utils.PromptPlaintext(
- fmt.Sprintf(
- `Detected AWS cluster in kubeconfig for the endpoint %s (%s).
- Porter can set up an IAM user in your AWS account to connect to this cluster automatically.
- Would you like to proceed? %s `,
- color.New(color.FgCyan).Sprintf("%s", endpoint),
- clusterName,
- color.New(color.FgCyan).Sprintf("[y/n]"),
- ),
- )
- if err != nil {
- return err
- }
- if userResp := strings.ToLower(userResp); userResp == "y" || userResp == "yes" {
- agent, err := awsLocal.NewDefaultKubernetesAgent(kubeconfigPath, contextName)
- if err != nil {
- color.New(color.FgRed).Fprintf(os.Stderr, "Automatic creation failed, manual input required. Error was: %v\n", err)
- return resolveAWSActionManual(endpoint, clusterName, awsClusterIDGuess, resolver)
- }
- creds, err := agent.CreateIAMKubernetesMapping(awsClusterIDGuess)
- if err != nil {
- color.New(color.FgRed).Fprintf(os.Stderr, "Automatic creation failed, manual input required. Error was: %v\n", err)
- return resolveAWSActionManual(endpoint, clusterName, awsClusterIDGuess, resolver)
- }
- resolver.AWSAccessKeyID = creds.AWSAccessKeyID
- resolver.AWSSecretAccessKey = creds.AWSSecretAccessKey
- resolver.AWSClusterID = creds.AWSClusterID
- return nil
- }
- // fallback to manual
- return resolveAWSActionManual(endpoint, clusterName, awsClusterIDGuess, resolver)
- }
- func resolveAWSActionManual(
- endpoint string,
- clusterName string,
- awsClusterIDGuess string,
- resolver *types.ClusterResolverAll,
- ) error {
- // query to see if the AWS cluster ID guess is correct
- var clusterID string
- userResp, err := utils.PromptPlaintext(
- fmt.Sprintf(
- `Detected AWS cluster ID as %s. Is this correct? %s `,
- color.New(color.FgCyan).Sprintf(awsClusterIDGuess),
- color.New(color.FgCyan).Sprintf("[y/n]"),
- ),
- )
- if err != nil {
- return err
- }
- if userResp := strings.ToLower(userResp); userResp == "y" || userResp == "yes" {
- clusterID = awsClusterIDGuess
- } else {
- clusterID, err = utils.PromptPlaintext(fmt.Sprintf(`Cluster ID: `))
- if err != nil {
- return err
- }
- }
- // query for the access key id
- accessKeyID, err := utils.PromptPlaintext(fmt.Sprintf(`AWS Access Key ID: `))
- if err != nil {
- return err
- }
- // query for the secret access key
- secretKey, err := utils.PromptPlaintext(fmt.Sprintf(`AWS Secret Access Key: `))
- if err != nil {
- return err
- }
- resolver.AWSAccessKeyID = accessKeyID
- resolver.AWSSecretAccessKey = secretKey
- resolver.AWSClusterID = clusterID
- return nil
- }
|