/* Copyright 2017 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package webhook import ( "io/ioutil" "net" "strings" "time" "fmt" "k8s.io/client-go/rest" "k8s.io/client-go/tools/clientcmd" clientcmdapi "k8s.io/client-go/tools/clientcmd/api" ) type AuthenticationInfoResolver interface { ClientConfigFor(server string) (*rest.Config, error) } type defaultAuthenticationInfoResolver struct { kubeconfig clientcmdapi.Config } func newDefaultAuthenticationInfoResolver(kubeconfigFile string) (AuthenticationInfoResolver, error) { if len(kubeconfigFile) == 0 { return &defaultAuthenticationInfoResolver{}, nil } loadingRules := clientcmd.NewDefaultClientConfigLoadingRules() loadingRules.ExplicitPath = kubeconfigFile loader := clientcmd.NewNonInteractiveDeferredLoadingClientConfig(loadingRules, &clientcmd.ConfigOverrides{}) clientConfig, err := loader.RawConfig() if err != nil { return nil, err } return &defaultAuthenticationInfoResolver{kubeconfig: clientConfig}, nil } func (c *defaultAuthenticationInfoResolver) ClientConfigFor(server string) (*rest.Config, error) { // exact match if authConfig, ok := c.kubeconfig.AuthInfos[server]; ok { return restConfigFromKubeconfig(authConfig) } // star prefixed match serverSteps := strings.Split(server, ".") for i := 1; i < len(serverSteps); i++ { nickName := "*." + strings.Join(serverSteps[i:], ".") if authConfig, ok := c.kubeconfig.AuthInfos[nickName]; ok { return restConfigFromKubeconfig(authConfig) } } // if we're trying to hit the kube-apiserver and there wasn't an explicit config, use the in-cluster config if server == "kubernetes.default.svc" { // if we can find an in-cluster-config use that. If we can't, fall through. inClusterConfig, err := rest.InClusterConfig() if err == nil { return setGlobalDefaults(inClusterConfig), nil } } // star (default) match if authConfig, ok := c.kubeconfig.AuthInfos["*"]; ok { return restConfigFromKubeconfig(authConfig) } // use the current context from the kubeconfig if possible if len(c.kubeconfig.CurrentContext) > 0 { if currContext, ok := c.kubeconfig.Contexts[c.kubeconfig.CurrentContext]; ok { if len(currContext.AuthInfo) > 0 { if currAuth, ok := c.kubeconfig.AuthInfos[currContext.AuthInfo]; ok { return restConfigFromKubeconfig(currAuth) } } } } // anonymous return setGlobalDefaults(&rest.Config{}), nil } func restConfigFromKubeconfig(configAuthInfo *clientcmdapi.AuthInfo) (*rest.Config, error) { config := &rest.Config{} // blindly overwrite existing values based on precedence if len(configAuthInfo.Token) > 0 { config.BearerToken = configAuthInfo.Token } else if len(configAuthInfo.TokenFile) > 0 { tokenBytes, err := ioutil.ReadFile(configAuthInfo.TokenFile) if err != nil { return nil, err } config.BearerToken = string(tokenBytes) } if len(configAuthInfo.Impersonate) > 0 { config.Impersonate = rest.ImpersonationConfig{ UserName: configAuthInfo.Impersonate, Groups: configAuthInfo.ImpersonateGroups, Extra: configAuthInfo.ImpersonateUserExtra, } } if len(configAuthInfo.ClientCertificate) > 0 || len(configAuthInfo.ClientCertificateData) > 0 { config.CertFile = configAuthInfo.ClientCertificate config.CertData = configAuthInfo.ClientCertificateData config.KeyFile = configAuthInfo.ClientKey config.KeyData = configAuthInfo.ClientKeyData } if len(configAuthInfo.Username) > 0 || len(configAuthInfo.Password) > 0 { config.Username = configAuthInfo.Username config.Password = configAuthInfo.Password } if configAuthInfo.AuthProvider != nil { return nil, fmt.Errorf("auth provider not supported") } return setGlobalDefaults(config), nil } func setGlobalDefaults(config *rest.Config) *rest.Config { config.UserAgent = "kube-apiserver-admission" config.Timeout = 30 * time.Second return config } type dialOverridingAuthenticationInfoResolver struct { dialFn func(network, addr string) (net.Conn, error) delegate AuthenticationInfoResolver } func (c *dialOverridingAuthenticationInfoResolver) ClientConfigFor(server string) (*rest.Config, error) { cfg, err := c.delegate.ClientConfigFor(server) if err != nil { return nil, err } cfg.Dial = c.dialFn return cfg, nil }