123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298 |
- /*
- Copyright 2014 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package clientcmd
- import (
- "errors"
- "fmt"
- "os"
- "reflect"
- "strings"
- utilerrors "k8s.io/apimachinery/pkg/util/errors"
- "k8s.io/apimachinery/pkg/util/validation"
- clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
- )
- var (
- ErrNoContext = errors.New("no context chosen")
- ErrEmptyConfig = errors.New("no configuration has been provided")
- // message is for consistency with old behavior
- ErrEmptyCluster = errors.New("cluster has no server defined")
- )
- type errContextNotFound struct {
- ContextName string
- }
- func (e *errContextNotFound) Error() string {
- return fmt.Sprintf("context was not found for specified context: %v", e.ContextName)
- }
- // IsContextNotFound returns a boolean indicating whether the error is known to
- // report that a context was not found
- func IsContextNotFound(err error) bool {
- if err == nil {
- return false
- }
- if _, ok := err.(*errContextNotFound); ok || err == ErrNoContext {
- return true
- }
- return strings.Contains(err.Error(), "context was not found for specified context")
- }
- // IsEmptyConfig returns true if the provided error indicates the provided configuration
- // is empty.
- func IsEmptyConfig(err error) bool {
- switch t := err.(type) {
- case errConfigurationInvalid:
- return len(t) == 1 && t[0] == ErrEmptyConfig
- }
- return err == ErrEmptyConfig
- }
- // errConfigurationInvalid is a set of errors indicating the configuration is invalid.
- type errConfigurationInvalid []error
- // errConfigurationInvalid implements error and Aggregate
- var _ error = errConfigurationInvalid{}
- var _ utilerrors.Aggregate = errConfigurationInvalid{}
- func newErrConfigurationInvalid(errs []error) error {
- switch len(errs) {
- case 0:
- return nil
- default:
- return errConfigurationInvalid(errs)
- }
- }
- // Error implements the error interface
- func (e errConfigurationInvalid) Error() string {
- return fmt.Sprintf("invalid configuration: %v", utilerrors.NewAggregate(e).Error())
- }
- // Errors implements the AggregateError interface
- func (e errConfigurationInvalid) Errors() []error {
- return e
- }
- // IsConfigurationInvalid returns true if the provided error indicates the configuration is invalid.
- func IsConfigurationInvalid(err error) bool {
- switch err.(type) {
- case *errContextNotFound, errConfigurationInvalid:
- return true
- }
- return IsContextNotFound(err)
- }
- // Validate checks for errors in the Config. It does not return early so that it can find as many errors as possible.
- func Validate(config clientcmdapi.Config) error {
- validationErrors := make([]error, 0)
- if clientcmdapi.IsConfigEmpty(&config) {
- return newErrConfigurationInvalid([]error{ErrEmptyConfig})
- }
- if len(config.CurrentContext) != 0 {
- if _, exists := config.Contexts[config.CurrentContext]; !exists {
- validationErrors = append(validationErrors, &errContextNotFound{config.CurrentContext})
- }
- }
- for contextName, context := range config.Contexts {
- validationErrors = append(validationErrors, validateContext(contextName, *context, config)...)
- }
- for authInfoName, authInfo := range config.AuthInfos {
- validationErrors = append(validationErrors, validateAuthInfo(authInfoName, *authInfo)...)
- }
- for clusterName, clusterInfo := range config.Clusters {
- validationErrors = append(validationErrors, validateClusterInfo(clusterName, *clusterInfo)...)
- }
- return newErrConfigurationInvalid(validationErrors)
- }
- // ConfirmUsable looks a particular context and determines if that particular part of the config is useable. There might still be errors in the config,
- // but no errors in the sections requested or referenced. It does not return early so that it can find as many errors as possible.
- func ConfirmUsable(config clientcmdapi.Config, passedContextName string) error {
- validationErrors := make([]error, 0)
- if clientcmdapi.IsConfigEmpty(&config) {
- return newErrConfigurationInvalid([]error{ErrEmptyConfig})
- }
- var contextName string
- if len(passedContextName) != 0 {
- contextName = passedContextName
- } else {
- contextName = config.CurrentContext
- }
- if len(contextName) == 0 {
- return ErrNoContext
- }
- context, exists := config.Contexts[contextName]
- if !exists {
- validationErrors = append(validationErrors, &errContextNotFound{contextName})
- }
- if exists {
- validationErrors = append(validationErrors, validateContext(contextName, *context, config)...)
- validationErrors = append(validationErrors, validateAuthInfo(context.AuthInfo, *config.AuthInfos[context.AuthInfo])...)
- validationErrors = append(validationErrors, validateClusterInfo(context.Cluster, *config.Clusters[context.Cluster])...)
- }
- return newErrConfigurationInvalid(validationErrors)
- }
- // validateClusterInfo looks for conflicts and errors in the cluster info
- func validateClusterInfo(clusterName string, clusterInfo clientcmdapi.Cluster) []error {
- validationErrors := make([]error, 0)
- emptyCluster := clientcmdapi.NewCluster()
- if reflect.DeepEqual(*emptyCluster, clusterInfo) {
- return []error{ErrEmptyCluster}
- }
- if len(clusterInfo.Server) == 0 {
- if len(clusterName) == 0 {
- validationErrors = append(validationErrors, fmt.Errorf("default cluster has no server defined"))
- } else {
- validationErrors = append(validationErrors, fmt.Errorf("no server found for cluster %q", clusterName))
- }
- }
- // Make sure CA data and CA file aren't both specified
- if len(clusterInfo.CertificateAuthority) != 0 && len(clusterInfo.CertificateAuthorityData) != 0 {
- validationErrors = append(validationErrors, fmt.Errorf("certificate-authority-data and certificate-authority are both specified for %v. certificate-authority-data will override.", clusterName))
- }
- if len(clusterInfo.CertificateAuthority) != 0 {
- clientCertCA, err := os.Open(clusterInfo.CertificateAuthority)
- defer clientCertCA.Close()
- if err != nil {
- validationErrors = append(validationErrors, fmt.Errorf("unable to read certificate-authority %v for %v due to %v", clusterInfo.CertificateAuthority, clusterName, err))
- }
- }
- return validationErrors
- }
- // validateAuthInfo looks for conflicts and errors in the auth info
- func validateAuthInfo(authInfoName string, authInfo clientcmdapi.AuthInfo) []error {
- validationErrors := make([]error, 0)
- usingAuthPath := false
- methods := make([]string, 0, 3)
- if len(authInfo.Token) != 0 {
- methods = append(methods, "token")
- }
- if len(authInfo.Username) != 0 || len(authInfo.Password) != 0 {
- methods = append(methods, "basicAuth")
- }
- if len(authInfo.ClientCertificate) != 0 || len(authInfo.ClientCertificateData) != 0 {
- // Make sure cert data and file aren't both specified
- if len(authInfo.ClientCertificate) != 0 && len(authInfo.ClientCertificateData) != 0 {
- validationErrors = append(validationErrors, fmt.Errorf("client-cert-data and client-cert are both specified for %v. client-cert-data will override.", authInfoName))
- }
- // Make sure key data and file aren't both specified
- if len(authInfo.ClientKey) != 0 && len(authInfo.ClientKeyData) != 0 {
- validationErrors = append(validationErrors, fmt.Errorf("client-key-data and client-key are both specified for %v; client-key-data will override", authInfoName))
- }
- // Make sure a key is specified
- if len(authInfo.ClientKey) == 0 && len(authInfo.ClientKeyData) == 0 {
- validationErrors = append(validationErrors, fmt.Errorf("client-key-data or client-key must be specified for %v to use the clientCert authentication method.", authInfoName))
- }
- if len(authInfo.ClientCertificate) != 0 {
- clientCertFile, err := os.Open(authInfo.ClientCertificate)
- defer clientCertFile.Close()
- if err != nil {
- validationErrors = append(validationErrors, fmt.Errorf("unable to read client-cert %v for %v due to %v", authInfo.ClientCertificate, authInfoName, err))
- }
- }
- if len(authInfo.ClientKey) != 0 {
- clientKeyFile, err := os.Open(authInfo.ClientKey)
- defer clientKeyFile.Close()
- if err != nil {
- validationErrors = append(validationErrors, fmt.Errorf("unable to read client-key %v for %v due to %v", authInfo.ClientKey, authInfoName, err))
- }
- }
- }
- if authInfo.Exec != nil {
- if authInfo.AuthProvider != nil {
- validationErrors = append(validationErrors, fmt.Errorf("authProvider cannot be provided in combination with an exec plugin for %s", authInfoName))
- }
- if len(authInfo.Exec.Command) == 0 {
- validationErrors = append(validationErrors, fmt.Errorf("command must be specified for %v to use exec authentication plugin", authInfoName))
- }
- if len(authInfo.Exec.APIVersion) == 0 {
- validationErrors = append(validationErrors, fmt.Errorf("apiVersion must be specified for %v to use exec authentication plugin", authInfoName))
- }
- for _, v := range authInfo.Exec.Env {
- if len(v.Name) == 0 {
- validationErrors = append(validationErrors, fmt.Errorf("env variable name must be specified for %v to use exec authentication plugin", authInfoName))
- } else if len(v.Value) == 0 {
- validationErrors = append(validationErrors, fmt.Errorf("env variable %s value must be specified for %v to use exec authentication plugin", v.Name, authInfoName))
- }
- }
- }
- // authPath also provides information for the client to identify the server, so allow multiple auth methods in that case
- if (len(methods) > 1) && (!usingAuthPath) {
- validationErrors = append(validationErrors, fmt.Errorf("more than one authentication method found for %v; found %v, only one is allowed", authInfoName, methods))
- }
- // ImpersonateGroups or ImpersonateUserExtra should be requested with a user
- if (len(authInfo.ImpersonateGroups) > 0 || len(authInfo.ImpersonateUserExtra) > 0) && (len(authInfo.Impersonate) == 0) {
- validationErrors = append(validationErrors, fmt.Errorf("requesting groups or user-extra for %v without impersonating a user", authInfoName))
- }
- return validationErrors
- }
- // validateContext looks for errors in the context. It is not transitive, so errors in the reference authInfo or cluster configs are not included in this return
- func validateContext(contextName string, context clientcmdapi.Context, config clientcmdapi.Config) []error {
- validationErrors := make([]error, 0)
- if len(contextName) == 0 {
- validationErrors = append(validationErrors, fmt.Errorf("empty context name for %#v is not allowed", context))
- }
- if len(context.AuthInfo) == 0 {
- validationErrors = append(validationErrors, fmt.Errorf("user was not specified for context %q", contextName))
- } else if _, exists := config.AuthInfos[context.AuthInfo]; !exists {
- validationErrors = append(validationErrors, fmt.Errorf("user %q was not found for context %q", context.AuthInfo, contextName))
- }
- if len(context.Cluster) == 0 {
- validationErrors = append(validationErrors, fmt.Errorf("cluster was not specified for context %q", contextName))
- } else if _, exists := config.Clusters[context.Cluster]; !exists {
- validationErrors = append(validationErrors, fmt.Errorf("cluster %q was not found for context %q", context.Cluster, contextName))
- }
- if len(context.Namespace) != 0 {
- if len(validation.IsDNS1123Label(context.Namespace)) != 0 {
- validationErrors = append(validationErrors, fmt.Errorf("namespace %q for context %q does not conform to the kubernetes DNS_LABEL rules", context.Namespace, contextName))
- }
- }
- return validationErrors
- }
|