123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185 |
- /*
- Copyright 2014 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package config
- import (
- "errors"
- "fmt"
- "io"
- "io/ioutil"
- "path/filepath"
- "github.com/renstrom/dedent"
- "github.com/spf13/cobra"
- "k8s.io/kubernetes/pkg/client/unversioned/clientcmd"
- clientcmdapi "k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api"
- "k8s.io/kubernetes/pkg/util"
- "k8s.io/kubernetes/pkg/util/flag"
- )
- type createClusterOptions struct {
- configAccess clientcmd.ConfigAccess
- name string
- server util.StringFlag
- apiVersion util.StringFlag
- insecureSkipTLSVerify flag.Tristate
- certificateAuthority util.StringFlag
- embedCAData flag.Tristate
- }
- var (
- create_cluster_long = dedent.Dedent(`
- Sets a cluster entry in kubeconfig.
- Specifying a name that already exists will merge new fields on top of existing values for those fields.`)
- create_cluster_example = dedent.Dedent(`
- # Set only the server field on the e2e cluster entry without touching other values.
- kubectl config set-cluster e2e --server=https://1.2.3.4
- # Embed certificate authority data for the e2e cluster entry
- kubectl config set-cluster e2e --certificate-authority=~/.kube/e2e/kubernetes.ca.crt
- # Disable cert checking for the dev cluster entry
- kubectl config set-cluster e2e --insecure-skip-tls-verify=true`)
- )
- func NewCmdConfigSetCluster(out io.Writer, configAccess clientcmd.ConfigAccess) *cobra.Command {
- options := &createClusterOptions{configAccess: configAccess}
- cmd := &cobra.Command{
- Use: fmt.Sprintf("set-cluster NAME [--%v=server] [--%v=path/to/certificate/authority] [--%v=true]", clientcmd.FlagAPIServer, clientcmd.FlagCAFile, clientcmd.FlagInsecure),
- Short: "Sets a cluster entry in kubeconfig",
- Long: create_cluster_long,
- Example: create_cluster_example,
- Run: func(cmd *cobra.Command, args []string) {
- if !options.complete(cmd) {
- return
- }
- err := options.run()
- if err != nil {
- fmt.Fprintf(out, "%v\n", err)
- } else {
- fmt.Fprintf(out, "cluster %q set.\n", options.name)
- }
- },
- }
- options.insecureSkipTLSVerify.Default(false)
- cmd.Flags().Var(&options.server, clientcmd.FlagAPIServer, clientcmd.FlagAPIServer+" for the cluster entry in kubeconfig")
- cmd.Flags().Var(&options.apiVersion, clientcmd.FlagAPIVersion, clientcmd.FlagAPIVersion+" for the cluster entry in kubeconfig")
- f := cmd.Flags().VarPF(&options.insecureSkipTLSVerify, clientcmd.FlagInsecure, "", clientcmd.FlagInsecure+" for the cluster entry in kubeconfig")
- f.NoOptDefVal = "true"
- cmd.Flags().Var(&options.certificateAuthority, clientcmd.FlagCAFile, "path to "+clientcmd.FlagCAFile+" file for the cluster entry in kubeconfig")
- cmd.MarkFlagFilename(clientcmd.FlagCAFile)
- f = cmd.Flags().VarPF(&options.embedCAData, clientcmd.FlagEmbedCerts, "", clientcmd.FlagEmbedCerts+" for the cluster entry in kubeconfig")
- f.NoOptDefVal = "true"
- return cmd
- }
- func (o createClusterOptions) run() error {
- err := o.validate()
- if err != nil {
- return err
- }
- config, err := o.configAccess.GetStartingConfig()
- if err != nil {
- return err
- }
- startingStanza, exists := config.Clusters[o.name]
- if !exists {
- startingStanza = clientcmdapi.NewCluster()
- }
- cluster := o.modifyCluster(*startingStanza)
- config.Clusters[o.name] = &cluster
- if err := clientcmd.ModifyConfig(o.configAccess, *config, true); err != nil {
- return err
- }
- return nil
- }
- // cluster builds a Cluster object from the options
- func (o *createClusterOptions) modifyCluster(existingCluster clientcmdapi.Cluster) clientcmdapi.Cluster {
- modifiedCluster := existingCluster
- if o.server.Provided() {
- modifiedCluster.Server = o.server.Value()
- }
- if o.insecureSkipTLSVerify.Provided() {
- modifiedCluster.InsecureSkipTLSVerify = o.insecureSkipTLSVerify.Value()
- // Specifying insecure mode clears any certificate authority
- if modifiedCluster.InsecureSkipTLSVerify {
- modifiedCluster.CertificateAuthority = ""
- modifiedCluster.CertificateAuthorityData = nil
- }
- }
- if o.certificateAuthority.Provided() {
- caPath := o.certificateAuthority.Value()
- if o.embedCAData.Value() {
- modifiedCluster.CertificateAuthorityData, _ = ioutil.ReadFile(caPath)
- modifiedCluster.InsecureSkipTLSVerify = false
- modifiedCluster.CertificateAuthority = ""
- } else {
- caPath, _ = filepath.Abs(caPath)
- modifiedCluster.CertificateAuthority = caPath
- // Specifying a certificate authority file clears certificate authority data and insecure mode
- if caPath != "" {
- modifiedCluster.InsecureSkipTLSVerify = false
- modifiedCluster.CertificateAuthorityData = nil
- }
- }
- }
- return modifiedCluster
- }
- func (o *createClusterOptions) complete(cmd *cobra.Command) bool {
- args := cmd.Flags().Args()
- if len(args) != 1 {
- cmd.Help()
- return false
- }
- o.name = args[0]
- return true
- }
- func (o createClusterOptions) validate() error {
- if len(o.name) == 0 {
- return errors.New("you must specify a non-empty cluster name")
- }
- if o.insecureSkipTLSVerify.Value() && o.certificateAuthority.Value() != "" {
- return errors.New("you cannot specify a certificate authority and insecure mode at the same time")
- }
- if o.embedCAData.Value() {
- caPath := o.certificateAuthority.Value()
- if caPath == "" {
- return fmt.Errorf("you must specify a --%s to embed", clientcmd.FlagCAFile)
- }
- if _, err := ioutil.ReadFile(caPath); err != nil {
- return fmt.Errorf("could not read %s data from %s: %v", clientcmd.FlagCAFile, caPath, err)
- }
- }
- return nil
- }
|