@@ -14,10 +14,12 @@ import (
14
14
appsclient "github.com/openshift/origin/pkg/apps/generated/internalclientset"
15
15
oauthorizationclient "github.com/openshift/origin/pkg/authorization/generated/internalclientset"
16
16
imageclient "github.com/openshift/origin/pkg/image/generated/internalclientset"
17
+ networkclient "github.com/openshift/origin/pkg/network/generated/internalclientset"
17
18
oauthclient "github.com/openshift/origin/pkg/oauth/generated/internalclientset"
18
19
clustdiags "github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster"
19
20
agldiags "github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/aggregated_logging"
20
21
appcreate "github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/app_create"
22
+ networkdiags "github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/network"
21
23
"github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/types"
22
24
osclientcmd "github.com/openshift/origin/pkg/oc/cli/util/clientcmd"
23
25
projectclient "github.com/openshift/origin/pkg/project/generated/internalclientset"
@@ -41,6 +43,7 @@ func availableClusterDiagnostics() types.DiagnosticList {
41
43
& clustdiags.NodeDefinitions {},
42
44
& clustdiags.RouteCertificateValidation {},
43
45
& clustdiags.ServiceExternalIPs {},
46
+ & networkdiags.NetworkDiagnostic {},
44
47
}
45
48
}
46
49
@@ -54,14 +57,14 @@ func (o DiagnosticsOptions) buildClusterDiagnostics(rawConfig *clientcmdapi.Conf
54
57
55
58
var kclusterClient kclientset.Interface
56
59
57
- config , kclusterClient , serverUrl , err := o .findClusterClients (rawConfig )
60
+ config , kclusterClient , rawAdminConfig , err := o .findClusterClients (rawConfig )
61
+ if err != nil {
62
+ return nil , err
63
+ }
58
64
if config == nil {
59
65
o .Logger ().Notice ("CED1002" , "Could not configure a client with cluster-admin permissions for the current server, so cluster diagnostics will be skipped" )
60
66
return nil , nil
61
67
}
62
- if err != nil {
63
- return nil , err
64
- }
65
68
imageClient , err := imageclient .NewForConfig (config )
66
69
if err != nil {
67
70
return nil , err
@@ -90,6 +93,10 @@ func (o DiagnosticsOptions) buildClusterDiagnostics(rawConfig *clientcmdapi.Conf
90
93
if err != nil {
91
94
return nil , err
92
95
}
96
+ networkClient , err := networkclient .NewForConfig (config )
97
+ if err != nil {
98
+ return nil , err
99
+ }
93
100
94
101
diagnostics := []types.Diagnostic {}
95
102
for _ , diagnosticName := range requestedDiagnostics {
@@ -111,6 +118,7 @@ func (o DiagnosticsOptions) buildClusterDiagnostics(rawConfig *clientcmdapi.Conf
111
118
case clustdiags .NodeDefinitionsName :
112
119
d = & clustdiags.NodeDefinitions {KubeClient : kclusterClient }
113
120
case clustdiags .MasterNodeName :
121
+ serverUrl := rawAdminConfig .Clusters [rawAdminConfig .Contexts [rawAdminConfig .CurrentContext ].Cluster ].Server
114
122
d = & clustdiags.MasterNode {KubeClient : kclusterClient , ServerUrl : serverUrl , MasterConfigFile : o .MasterConfigLocation }
115
123
case clustdiags .ClusterRegistryName :
116
124
d = & clustdiags.ClusterRegistry {KubeClient : kclusterClient , ImageStreamClient : imageClient .Image (), PreventModification : o .PreventModification }
@@ -126,6 +134,17 @@ func (o DiagnosticsOptions) buildClusterDiagnostics(rawConfig *clientcmdapi.Conf
126
134
d = & clustdiags.ServiceExternalIPs {MasterConfigFile : o .MasterConfigLocation , KclusterClient : kclusterClient }
127
135
case clustdiags .RouteCertificateValidationName :
128
136
d = & clustdiags.RouteCertificateValidation {SARClient : kclusterClient .Authorization (), RESTConfig : config }
137
+ case networkdiags .NetworkDiagnosticName :
138
+ nd := o .ParameterizedDiagnostics [diagnosticName ].(* networkdiags.NetworkDiagnostic )
139
+ nd .KubeClient = kclusterClient
140
+ nd .NetNamespacesClient = networkClient .Network ()
141
+ nd .ClusterNetworkClient = networkClient .Network ()
142
+ nd .ClientFlags = o .ClientFlags
143
+ nd .Level = o .LogOptions .Level
144
+ nd .Factory = o .Factory
145
+ nd .RawConfig = rawAdminConfig
146
+ nd .PreventModification = o .PreventModification
147
+ d = nd
129
148
default :
130
149
return nil , fmt .Errorf ("unknown diagnostic: %v" , diagnosticName )
131
150
}
@@ -135,84 +154,96 @@ func (o DiagnosticsOptions) buildClusterDiagnostics(rawConfig *clientcmdapi.Conf
135
154
}
136
155
137
156
// attempts to find which context in the config might be a cluster-admin for the server in the current context.
138
- // returns config for the context chosen, kclusterClient for same, serverUrl of same, and any fatal error
139
- func (o DiagnosticsOptions ) findClusterClients (rawConfig * clientcmdapi.Config ) (* rest.Config , kclientset.Interface , string , error ) {
157
+ // returns openshift client config for the context chosen, kclusterClient and raw config of same, and any fatal error
158
+ func (o DiagnosticsOptions ) findClusterClients (rawConfig * clientcmdapi.Config ) (* rest.Config , kclientset.Interface , * clientcmdapi. Config , error ) {
140
159
if o .ClientClusterContext != "" { // user has specified cluster context to use
141
160
context , exists := rawConfig .Contexts [o .ClientClusterContext ]
142
161
if ! exists {
143
162
configErr := fmt .Errorf ("Specified '%s' as cluster-admin context, but it was not found in your client configuration." , o .ClientClusterContext )
144
163
o .Logger ().Error ("CED1003" , configErr .Error ())
145
- return nil , nil , "" , configErr
164
+ return nil , nil , nil , configErr
146
165
}
147
- config , kube , serverUrl , err := o .makeClusterClients (rawConfig , o .ClientClusterContext , context )
148
- if err != nil || config == nil {
149
- return nil , nil , "" , err
150
- }
151
- return config , kube , serverUrl , nil
166
+ return o .makeClusterClients (rawConfig , o .ClientClusterContext , context )
152
167
}
153
168
currentContext , exists := rawConfig .Contexts [rawConfig .CurrentContext ]
154
169
if ! exists { // config specified cluster admin context that doesn't exist; complain and quit
155
170
configErr := fmt .Errorf ("Current context '%s' not found in client configuration; will not attempt cluster diagnostics." , rawConfig .CurrentContext )
156
171
o .Logger ().Error ("CED1004" , configErr .Error ())
157
- return nil , nil , "" , configErr
172
+ return nil , nil , nil , configErr
158
173
}
174
+
159
175
// check if current context is already cluster admin
160
- config , kube , serverUrl , err := o .makeClusterClients (rawConfig , rawConfig .CurrentContext , currentContext )
176
+ config , kube , rawAdminConfig , err := o .makeClusterClients (rawConfig , rawConfig .CurrentContext , currentContext )
161
177
if err == nil && config != nil {
162
- return config , kube , serverUrl , nil
178
+ return config , kube , rawAdminConfig , nil
163
179
}
180
+
164
181
// otherwise, for convenience, search for a context with the same server but with the system:admin user
165
182
for name , context := range rawConfig .Contexts {
166
183
if context .Cluster == currentContext .Cluster && name != rawConfig .CurrentContext && strings .HasPrefix (context .AuthInfo , "system:admin/" ) {
167
- config , kube , serverUrl , err := o .makeClusterClients (rawConfig , name , context )
184
+ config , kube , rawAdminConfig , err := o .makeClusterClients (rawConfig , name , context )
168
185
if err != nil || config == nil {
169
186
break // don't try more than one such context, they'll probably fail the same
170
187
}
171
- return config , kube , serverUrl , nil
188
+ return config , kube , rawAdminConfig , nil
172
189
}
173
190
}
174
- return nil , nil , "" , nil
191
+ return nil , nil , nil , nil
175
192
}
176
193
177
194
// makes the client from the specified context and determines whether it is a cluster-admin.
178
- func (o DiagnosticsOptions ) makeClusterClients (rawConfig * clientcmdapi.Config , contextName string , context * clientcmdapi.Context ) (* rest.Config , kclientset.Interface , string , error ) {
195
+ func (o DiagnosticsOptions ) makeClusterClients (rawConfig * clientcmdapi.Config , contextName string , context * clientcmdapi.Context ) (* rest.Config , kclientset.Interface , * clientcmdapi. Config , error ) {
179
196
overrides := & clientcmd.ConfigOverrides {Context : * context }
180
197
clientConfig := clientcmd .NewDefaultClientConfig (* rawConfig , overrides )
181
- serverUrl := rawConfig .Clusters [context .Cluster ].Server
182
198
factory := osclientcmd .NewFactory (clientConfig )
199
+
200
+ // create a config for making openshift clients
183
201
config , err := factory .ClientConfig ()
184
202
if err != nil {
185
- o .Logger ().Debug ("CED1006" , fmt .Sprintf ("Error creating client for context '%s':\n %v" , contextName , err ))
186
- return nil , nil , "" , nil
203
+ o .Logger ().Debug ("CED1006" , fmt .Sprintf ("Error creating client config for context '%s':\n %v" , contextName , err ))
204
+ return nil , nil , nil , nil
187
205
}
206
+
207
+ // create a kube client
208
+ kubeClient , err := factory .ClientSet ()
209
+ if err != nil {
210
+ o .Logger ().Debug ("CED1006" , fmt .Sprintf ("Error creating kube client for context '%s':\n %v" , contextName , err ))
211
+ return nil , nil , nil , nil
212
+ }
213
+
188
214
o .Logger ().Debug ("CED1005" , fmt .Sprintf ("Checking if context is cluster-admin: '%s'" , contextName ))
189
- if kubeClient , err := factory .ClientSet (); err != nil {
190
- o .Logger ().Debug ("CED1006" , fmt .Sprintf ("Error creating client for context '%s':\n %v" , contextName , err ))
191
- return nil , nil , "" , nil
192
- } else {
193
- subjectAccessReview := & authorization.SelfSubjectAccessReview {
194
- Spec : authorization.SelfSubjectAccessReviewSpec {
195
- ResourceAttributes : & authorization.ResourceAttributes {
196
- // if you can do everything, you're the cluster admin.
197
- Verb : "*" ,
198
- Group : "*" ,
199
- Resource : "*" ,
200
- },
215
+ subjectAccessReview := & authorization.SelfSubjectAccessReview {
216
+ Spec : authorization.SelfSubjectAccessReviewSpec {
217
+ ResourceAttributes : & authorization.ResourceAttributes {
218
+ // if you can do everything, you're the cluster admin.
219
+ Verb : "*" ,
220
+ Group : "*" ,
221
+ Resource : "*" ,
201
222
},
202
- }
203
- if resp , err := kubeClient .Authorization ().SelfSubjectAccessReviews ().Create (subjectAccessReview ); err != nil {
204
- if regexp .MustCompile (`User "[\w:]+" cannot create \w+ at the cluster scope` ).MatchString (err .Error ()) {
205
- o .Logger ().Debug ("CED1007" , fmt .Sprintf ("Context '%s' does not have cluster-admin access:\n %v" , contextName , err ))
206
- return nil , nil , "" , nil
207
- } else {
208
- o .Logger ().Error ("CED1008" , fmt .Sprintf ("Unknown error testing cluster-admin access for context '%s':\n %v" , contextName , err ))
209
- return nil , nil , "" , err
210
- }
211
- } else if resp .Status .Allowed {
212
- o .Logger ().Info ("CED1009" , fmt .Sprintf ("Using context for cluster-admin access: '%s'" , contextName ))
213
- return config , kubeClient , serverUrl , nil
214
- }
223
+ },
224
+ }
225
+ resp , err := kubeClient .Authorization ().SelfSubjectAccessReviews ().Create (subjectAccessReview )
226
+ if err != nil && regexp .MustCompile (`User "[\w:]+" cannot create \w+ at the cluster scope` ).MatchString (err .Error ()) {
227
+ o .Logger ().Debug ("CED1007" , fmt .Sprintf ("Context '%s' does not have cluster-admin access:\n %v" , contextName , err ))
228
+ return nil , nil , nil , nil
229
+ }
230
+ if err != nil {
231
+ o .Logger ().Error ("CED1008" , fmt .Sprintf ("Unknown error testing cluster-admin access for context '%s':\n %v" , contextName , err ))
232
+ return nil , nil , nil , err
233
+ }
234
+ if ! resp .Status .Allowed {
235
+ o .Logger ().Debug ("CED1010" , fmt .Sprintf ("Context does not have cluster-admin access: '%s'" , contextName ))
236
+ return nil , nil , nil , nil
237
+ }
238
+
239
+ o .Logger ().Info ("CED1009" , fmt .Sprintf ("Using context for cluster-admin access: '%s'" , contextName ))
240
+ adminConfig := rawConfig .DeepCopy ()
241
+ adminConfig .CurrentContext = contextName
242
+ if err := clientcmdapi .MinifyConfig (adminConfig ); err != nil {
243
+ return nil , nil , nil , err
244
+ }
245
+ if err := clientcmdapi .FlattenConfig (adminConfig ); err != nil {
246
+ return nil , nil , nil , err
215
247
}
216
- o .Logger ().Debug ("CED1010" , fmt .Sprintf ("Context does not have cluster-admin access: '%s'" , contextName ))
217
- return nil , nil , "" , nil
248
+ return config , kubeClient , adminConfig , nil
218
249
}
0 commit comments