kubeconfig.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529
  1. package connect
  2. import (
  3. "context"
  4. "encoding/base64"
  5. "errors"
  6. "fmt"
  7. "io/ioutil"
  8. "os"
  9. "strings"
  10. "github.com/fatih/color"
  11. awsLocal "github.com/porter-dev/porter/cli/cmd/providers/aws/local"
  12. gcpLocal "github.com/porter-dev/porter/cli/cmd/providers/gcp/local"
  13. "github.com/porter-dev/porter/cli/cmd/utils"
  14. "github.com/porter-dev/porter/internal/kubernetes/local"
  15. api "github.com/porter-dev/porter/api/client"
  16. "github.com/porter-dev/porter/api/types"
  17. )
  18. // Kubeconfig creates a service account for a project by parsing the local
  19. // kubeconfig and resolving actions that must be performed.
  20. func Kubeconfig(
  21. client *api.Client,
  22. kubeconfigPath string,
  23. contexts []string,
  24. projectID uint,
  25. isLocal bool,
  26. ) (uint, error) {
  27. // if project ID is 0, ask the user to set the project ID or create a project
  28. if projectID == 0 {
  29. return 0, fmt.Errorf("no project set, please run porter project set [id]")
  30. }
  31. // get the kubeconfig
  32. rawBytes, err := local.GetKubeconfigFromHost(kubeconfigPath, contexts)
  33. if err != nil {
  34. return 0, err
  35. }
  36. // send kubeconfig to client
  37. resp, err := client.CreateProjectCandidates(
  38. context.Background(),
  39. projectID,
  40. &types.CreateClusterCandidateRequest{
  41. Kubeconfig: string(rawBytes),
  42. IsLocal: isLocal,
  43. },
  44. )
  45. if err != nil {
  46. return 0, err
  47. }
  48. ccs := *resp
  49. var lastClusterID uint
  50. for _, cc := range ccs {
  51. var cluster *types.Cluster
  52. if len(cc.Resolvers) > 0 {
  53. allResolver := &types.ClusterResolverAll{}
  54. for _, resolver := range cc.Resolvers {
  55. switch resolver.Name {
  56. case types.ClusterCAData:
  57. absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
  58. if err != nil {
  59. return 0, err
  60. }
  61. filename, err := utils.GetFileReferenceFromKubeconfig(
  62. resolver.Data["filename"],
  63. absKubeconfigPath,
  64. )
  65. if err != nil {
  66. return 0, err
  67. }
  68. err = resolveClusterCAAction(filename, allResolver)
  69. if err != nil {
  70. return 0, err
  71. }
  72. case types.ClusterLocalhost:
  73. err := resolveLocalhostAction(allResolver)
  74. if err != nil {
  75. return 0, err
  76. }
  77. case types.ClientCertData:
  78. absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
  79. if err != nil {
  80. return 0, err
  81. }
  82. filename, err := utils.GetFileReferenceFromKubeconfig(
  83. resolver.Data["filename"],
  84. absKubeconfigPath,
  85. )
  86. if err != nil {
  87. return 0, err
  88. }
  89. err = resolveClientCertAction(filename, allResolver)
  90. if err != nil {
  91. return 0, err
  92. }
  93. case types.ClientKeyData:
  94. absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
  95. if err != nil {
  96. return 0, err
  97. }
  98. filename, err := utils.GetFileReferenceFromKubeconfig(
  99. resolver.Data["filename"],
  100. absKubeconfigPath,
  101. )
  102. if err != nil {
  103. return 0, err
  104. }
  105. err = resolveClientKeyAction(filename, allResolver)
  106. if err != nil {
  107. return 0, err
  108. }
  109. case types.OIDCIssuerData:
  110. absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
  111. if err != nil {
  112. return 0, err
  113. }
  114. filename, err := utils.GetFileReferenceFromKubeconfig(
  115. resolver.Data["filename"],
  116. absKubeconfigPath,
  117. )
  118. if err != nil {
  119. return 0, err
  120. }
  121. err = resolveOIDCIssuerAction(filename, allResolver)
  122. if err != nil {
  123. return 0, err
  124. }
  125. case types.TokenData:
  126. absKubeconfigPath, err := local.ResolveKubeconfigPath(kubeconfigPath)
  127. if err != nil {
  128. return 0, err
  129. }
  130. filename, err := utils.GetFileReferenceFromKubeconfig(
  131. resolver.Data["filename"],
  132. absKubeconfigPath,
  133. )
  134. if err != nil {
  135. return 0, err
  136. }
  137. err = resolveTokenDataAction(filename, allResolver)
  138. if err != nil {
  139. return 0, err
  140. }
  141. case types.GCPKeyData:
  142. err := resolveGCPKeyAction(
  143. cc.Server,
  144. cc.Name,
  145. allResolver,
  146. )
  147. if err != nil {
  148. return 0, err
  149. }
  150. case types.AWSData:
  151. err := resolveAWSAction(
  152. cc.Server,
  153. cc.Name,
  154. cc.AWSClusterIDGuess,
  155. kubeconfigPath,
  156. cc.ContextName,
  157. allResolver,
  158. )
  159. if err != nil {
  160. return 0, err
  161. }
  162. }
  163. }
  164. resp, err := client.CreateProjectCluster(
  165. context.Background(),
  166. projectID,
  167. cc.ID,
  168. allResolver,
  169. )
  170. if err != nil {
  171. return 0, err
  172. }
  173. clExt := types.Cluster(*resp)
  174. cluster = &clExt
  175. } else {
  176. resp, err := client.GetProjectCluster(
  177. context.Background(),
  178. projectID,
  179. cc.CreatedClusterID,
  180. )
  181. if err != nil {
  182. return 0, err
  183. }
  184. cluster = resp.Cluster
  185. }
  186. color.New(color.FgGreen).Printf("created cluster %s with id %d\n", cluster.Name, cluster.ID)
  187. lastClusterID = cluster.ID
  188. }
  189. return lastClusterID, nil
  190. }
  191. // resolves a cluster ca data action
  192. func resolveClusterCAAction(
  193. filename string,
  194. resolver *types.ClusterResolverAll,
  195. ) error {
  196. fileBytes, err := ioutil.ReadFile(filename)
  197. if err != nil {
  198. return err
  199. }
  200. resolver.ClusterCAData = base64.StdEncoding.EncodeToString(fileBytes)
  201. return nil
  202. }
  203. func resolveLocalhostAction(
  204. resolver *types.ClusterResolverAll,
  205. ) error {
  206. resolver.ClusterHostname = "host.docker.internal"
  207. return nil
  208. }
  209. // resolves a client cert data action
  210. func resolveClientCertAction(
  211. filename string,
  212. resolver *types.ClusterResolverAll,
  213. ) error {
  214. fileBytes, err := ioutil.ReadFile(filename)
  215. if err != nil {
  216. return err
  217. }
  218. resolver.ClientCertData = base64.StdEncoding.EncodeToString(fileBytes)
  219. return nil
  220. }
  221. // resolves a client key data action
  222. func resolveClientKeyAction(
  223. filename string,
  224. resolver *types.ClusterResolverAll,
  225. ) error {
  226. fileBytes, err := ioutil.ReadFile(filename)
  227. if err != nil {
  228. return err
  229. }
  230. resolver.ClientKeyData = base64.StdEncoding.EncodeToString(fileBytes)
  231. return nil
  232. }
  233. // resolves an oidc issuer data action
  234. func resolveOIDCIssuerAction(
  235. filename string,
  236. resolver *types.ClusterResolverAll,
  237. ) error {
  238. fileBytes, err := ioutil.ReadFile(filename)
  239. if err != nil {
  240. return err
  241. }
  242. resolver.OIDCIssuerCAData = base64.StdEncoding.EncodeToString(fileBytes)
  243. return nil
  244. }
  245. // resolves a token data action
  246. func resolveTokenDataAction(
  247. filename string,
  248. resolver *types.ClusterResolverAll,
  249. ) error {
  250. fileBytes, err := ioutil.ReadFile(filename)
  251. if err != nil {
  252. return err
  253. }
  254. resolver.TokenData = string(fileBytes)
  255. return nil
  256. }
  257. // resolves a gcp key data action
  258. func resolveGCPKeyAction(
  259. endpoint string,
  260. clusterName string,
  261. resolver *types.ClusterResolverAll,
  262. ) error {
  263. userResp, err := utils.PromptPlaintext(
  264. fmt.Sprintf(
  265. `Detected GKE cluster in kubeconfig for the endpoint %s (%s).
  266. Porter can set up a service account in your GCP project to connect to this cluster automatically.
  267. Would you like to proceed? %s `,
  268. color.New(color.FgCyan).Sprintf("%s", endpoint),
  269. clusterName,
  270. color.New(color.FgCyan).Sprintf("[y/n]"),
  271. ),
  272. )
  273. if err != nil {
  274. return err
  275. }
  276. if userResp := strings.ToLower(userResp); userResp == "y" || userResp == "yes" {
  277. agent, err := gcpLocal.NewDefaultAgent()
  278. if err != nil {
  279. color.New(color.FgRed).Printf("Automatic creation failed, manual input required. Error was: %v\n", err)
  280. return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
  281. }
  282. projID, err := agent.GetProjectIDForGKECluster(endpoint)
  283. if err != nil {
  284. color.New(color.FgRed).Printf("Automatic creation failed, manual input required. Error was: %v\n", err)
  285. return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
  286. }
  287. agent.ProjectID = projID
  288. name := "porter-dashboard-" + utils.StringWithCharset(6, "abcdefghijklmnopqrstuvwxyz1234567890")
  289. // create the service account and give it the correct iam permissions
  290. resp, err := agent.CreateServiceAccount(name)
  291. if err != nil {
  292. color.New(color.FgRed).Printf("Automatic creation failed, manual input required. Error was: %v\n", err)
  293. return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
  294. }
  295. err = agent.SetServiceAccountIAMPolicy(resp)
  296. if err != nil {
  297. color.New(color.FgRed).Printf("Automatic creation failed, manual input required. Error was: %v\n", err)
  298. return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
  299. }
  300. // get the service account key data to send to the server
  301. bytes, err := agent.CreateServiceAccountKey(resp)
  302. if err != nil {
  303. color.New(color.FgRed).Printf("Automatic creation failed, manual input required. Error was: %v\n", err)
  304. return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
  305. }
  306. resolver.GCPKeyData = string(bytes)
  307. return nil
  308. }
  309. return resolveGCPKeyActionManual(endpoint, clusterName, resolver)
  310. }
  311. func resolveGCPKeyActionManual(
  312. endpoint string,
  313. clusterName string,
  314. resolver *types.ClusterResolverAll,
  315. ) error {
  316. keyFileLocation, err := utils.PromptPlaintext(fmt.Sprintf(`Please provide the full path to a service account key file.
  317. Key file location: `))
  318. if err != nil {
  319. return err
  320. }
  321. // attempt to read the key file location
  322. if info, err := os.Stat(keyFileLocation); !os.IsNotExist(err) && !info.IsDir() {
  323. // read the file
  324. bytes, err := ioutil.ReadFile(keyFileLocation)
  325. if err != nil {
  326. return err
  327. }
  328. resolver.GCPKeyData = string(bytes)
  329. return nil
  330. }
  331. return errors.New("Key file not found")
  332. }
  333. // resolves an aws key data action
  334. func resolveAWSAction(
  335. endpoint string,
  336. clusterName string,
  337. awsClusterIDGuess string,
  338. kubeconfigPath string,
  339. contextName string,
  340. resolver *types.ClusterResolverAll,
  341. ) error {
  342. userResp, err := utils.PromptPlaintext(
  343. fmt.Sprintf(
  344. `Detected AWS cluster in kubeconfig for the endpoint %s (%s).
  345. Porter can set up an IAM user in your AWS account to connect to this cluster automatically.
  346. Would you like to proceed? %s `,
  347. color.New(color.FgCyan).Sprintf("%s", endpoint),
  348. clusterName,
  349. color.New(color.FgCyan).Sprintf("[y/n]"),
  350. ),
  351. )
  352. if err != nil {
  353. return err
  354. }
  355. if userResp := strings.ToLower(userResp); userResp == "y" || userResp == "yes" {
  356. agent, err := awsLocal.NewDefaultKubernetesAgent(kubeconfigPath, contextName)
  357. if err != nil {
  358. color.New(color.FgRed).Printf("Automatic creation failed, manual input required. Error was: %v\n", err)
  359. return resolveAWSActionManual(endpoint, clusterName, awsClusterIDGuess, resolver)
  360. }
  361. creds, err := agent.CreateIAMKubernetesMapping(awsClusterIDGuess)
  362. if err != nil {
  363. color.New(color.FgRed).Printf("Automatic creation failed, manual input required. Error was: %v\n", err)
  364. return resolveAWSActionManual(endpoint, clusterName, awsClusterIDGuess, resolver)
  365. }
  366. resolver.AWSAccessKeyID = creds.AWSAccessKeyID
  367. resolver.AWSSecretAccessKey = creds.AWSSecretAccessKey
  368. resolver.AWSClusterID = creds.AWSClusterID
  369. return nil
  370. }
  371. // fallback to manual
  372. return resolveAWSActionManual(endpoint, clusterName, awsClusterIDGuess, resolver)
  373. }
  374. func resolveAWSActionManual(
  375. endpoint string,
  376. clusterName string,
  377. awsClusterIDGuess string,
  378. resolver *types.ClusterResolverAll,
  379. ) error {
  380. // query to see if the AWS cluster ID guess is correct
  381. var clusterID string
  382. userResp, err := utils.PromptPlaintext(
  383. fmt.Sprintf(
  384. `Detected AWS cluster ID as %s. Is this correct? %s `,
  385. color.New(color.FgCyan).Sprintf(awsClusterIDGuess),
  386. color.New(color.FgCyan).Sprintf("[y/n]"),
  387. ),
  388. )
  389. if err != nil {
  390. return err
  391. }
  392. if userResp := strings.ToLower(userResp); userResp == "y" || userResp == "yes" {
  393. clusterID = awsClusterIDGuess
  394. } else {
  395. clusterID, err = utils.PromptPlaintext(fmt.Sprintf(`Cluster ID: `))
  396. if err != nil {
  397. return err
  398. }
  399. }
  400. // query for the access key id
  401. accessKeyID, err := utils.PromptPlaintext(fmt.Sprintf(`AWS Access Key ID: `))
  402. if err != nil {
  403. return err
  404. }
  405. // query for the secret access key
  406. secretKey, err := utils.PromptPlaintext(fmt.Sprintf(`AWS Secret Access Key: `))
  407. if err != nil {
  408. return err
  409. }
  410. resolver.AWSAccessKeyID = accessKeyID
  411. resolver.AWSSecretAccessKey = secretKey
  412. resolver.AWSClusterID = clusterID
  413. return nil
  414. }