Add kube config support

This commit is contained in:
mbohlool 2016-11-15 03:27:50 -08:00
parent 634a1b9d3f
commit 033e180ff3
5 changed files with 193 additions and 1 deletions

View File

@ -1,3 +1,5 @@
.gitignore
git_push.sh
test/*
requirements.txt
setup.py

15
k8sutil/__init__.py Normal file
View File

@ -0,0 +1,15 @@
# Copyright 2016 The Kubernetes Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
from .kube_config import load_kube_config

172
k8sutil/kube_config.py Normal file
View File

@ -0,0 +1,172 @@
# Copyright 2016 The Kubernetes Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import atexit
import base64
import os
import tempfile
import urllib3
import yaml
from k8sclient import configuration
from oauth2client.client import GoogleCredentials
_temp_files = []
def _cleanup_temp_files():
for f in _temp_files:
os.remove(f)
def _create_temp_file_with_content(content):
if len(_temp_files) == 0:
atexit.register(_cleanup_temp_files)
_, name = tempfile.mkstemp()
_temp_files.append(name)
if isinstance(content, str):
content = content.encode('utf8')
with open(name, 'wb') as fd:
fd.write(base64.decodestring(content))
return name
def _file_from_file_or_data(o, file_key_name, data_key_name=None):
if not data_key_name:
data_key_name = file_key_name + "-data"
if data_key_name in o:
return _create_temp_file_with_content(o[data_key_name])
if file_key_name in o:
return o[file_key_name]
def _data_from_file_or_data(o, file_key_name, data_key_name=None):
if not data_key_name:
data_key_name = file_key_name + "_data"
if data_key_name in o:
return o[data_key_name]
if file_key_name in o:
with open(o[file_key_name], 'r') as f:
data = f.read()
return data
def _load_gcp_token(user):
if 'auth-provider' not in user:
return
if 'name' not in user['auth-provider']:
return
if user['auth-provider']['name'] != 'gcp':
return
# Ignore configs in auth-provider and rely on GoogleCredentials
# caching and refresh mechanism.
# TODO: support gcp command based token ("cmd-path" config).
return (GoogleCredentials
.get_application_default()
.get_access_token()
.access_token)
def _load_authentication(user):
"""Read authentication from kube-config user section.
This function goes through various authetication methods in user section of
kubeconfig and stops if it founds a valid authentication method. The order
of authentication methods is:
1. GCP auth-provider
2. token_data
3. token field (point to a token file)
4. username/password
"""
# Read authentication
token = _load_gcp_token(user)
if not token:
token = _data_from_file_or_data(user, 'tokenFile', 'token')
if token:
configuration.api_key['authorization'] = "bearer " + token
else:
if 'username' in user and 'password' in user:
configuration.api_key['authorization'] = urllib3.util.make_headers(
basic_auth=user['username'] + ':' +
user['password']).get('authorization')
def _load_cluster_info(cluster, user):
"""Loads cluster information from kubeconfig such as host and SSL certs."""
if 'server' in cluster:
configuration.host = cluster['server']
if configuration.host.startswith("https"):
configuration.ssl_ca_cert = _file_from_file_or_data(
cluster, 'certificate-authority')
configuration.cert_file = _file_from_file_or_data(
user, 'client-certificate')
configuration.key_file = _file_from_file_or_data(
user, 'client-key')
class _node:
"""Remembers each key's path and construct a relevant exception message
in case of missing keys."""
def __init__(self, name, value):
self._name = name
self._value = value
def __contains__(self, key):
return key in self._value
def __getitem__(self, key):
if key in self._value:
v = self._value[key]
if isinstance(v, dict) or isinstance(v, list):
return _node('%s/%s' % (self._name, key), v)
else:
return v
raise Exception(
'Invalid kube-config file. Expected key %s in %s'
% (key, self._name))
def get_with_name(self, name):
if not isinstance(self._value, list):
raise Exception(
'Invalid kube-config file. Expected %s to be a list'
% self._name)
for v in self._value:
if 'name' not in v:
raise Exception(
'Invalid kube-config file. '
'Expected all values in %s list to have \'name\' key'
% self._name)
if v['name'] == name:
return _node('%s[name=%s]' % (self._name, name), v)
raise Exception(
"Cannot find object with name %s in %s list" % (name, self._name))
def load_kube_config(config_file):
"""Loads authentication and cluster information from kube-config file
and store them in k8sclient.configuration."""
with open(config_file) as f:
config = _node('kube-config', yaml.load(f))
current_context = config['contexts'].get_with_name(
config['current-context'])['context']
user = config['users'].get_with_name(current_context['user'])['user']
cluster = config['clusters'].get_with_name(
current_context['cluster'])['cluster']
_load_cluster_info(cluster, user)
_load_authentication(user)

View File

@ -3,3 +3,6 @@ six == 1.8.0
python_dateutil >= 2.5.3
setuptools >= 21.0.0
urllib3 >= 1.15.1
pyyaml >= 3.12
oauth2client >= 4.0.0

View File

@ -35,7 +35,7 @@ VERSION = "1.0.0"
# prerequisite: setuptools
# http://pypi.python.org/pypi/setuptools
REQUIRES = ["urllib3 >= 1.15", "six >= 1.10", "certifi", "python-dateutil"]
REQUIRES = ["urllib3 >= 1.15", "six >= 1.10", "certifi", "python-dateutil", "pyyaml", "oauth2client"]
setup(
name=NAME,