Skip to content

Commit ff1a11f

Browse files
Merge pull request #18709 from sosiouxme/20180221-diagnostic-reorg
Automatic merge from submit-queue (batch tested with PRs 18778, 18709, 18876, 18897, 18652). diagnostic reorg and NetworkCheck fix The leading commits of this PR change nothing visible to the user. Internally, they remove a direct dependency on docker and reorganize the two diagnostics that currently run diagnostics in a pod, PodDiagnostic and NetworkCheck. The reorg brings files for each under one directory so it's easier to find and understand them. The final two commits address #16596 by making NetworkCheck a cluster diagnostic and constructing the pod kubeconfig from the (now guaranteed to be an admin) config. Commits can be squashed or split out into separate PRs if preferable. I would expect it to be rather confusing to review as a whole, especially since a lot of the changes are just stuff moving around; easier to to grasp one commit at a time.
2 parents c5e69d1 + 4213489 commit ff1a11f

23 files changed

+198
-173
lines changed

pkg/oc/admin/diagnostics/client.go

+5-16
Original file line numberDiff line numberDiff line change
@@ -7,24 +7,23 @@ import (
77
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
88

99
clientdiags "github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/client"
10-
networkdiags "github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/network"
10+
"github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/client/pod"
1111
"github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/types"
1212
)
1313

1414
// availableClientDiagnostics returns definitions of client diagnostics that can be executed
1515
// during a single run of diagnostics. Add more diagnostics to the list as they are defined.
1616
func availableClientDiagnostics() types.DiagnosticList {
17-
return types.DiagnosticList{clientdiags.ConfigContext{}, &clientdiags.DiagnosticPod{}, &networkdiags.NetworkDiagnostic{}}
17+
return types.DiagnosticList{clientdiags.ConfigContext{}, &pod.DiagnosticPod{}}
1818
}
1919

2020
// buildClientDiagnostics builds client Diagnostic objects based on the rawConfig passed in.
2121
// Returns the Diagnostics built, and any fatal errors encountered during the building of diagnostics.
2222
func (o DiagnosticsOptions) buildClientDiagnostics(rawConfig *clientcmdapi.Config) ([]types.Diagnostic, error) {
2323
available := availableClientDiagnostics().Names()
2424

25-
networkClient, err := o.Factory.OpenshiftInternalNetworkClient()
2625
kubeClient, clientErr := o.Factory.ClientSet()
27-
if clientErr != nil || err != nil {
26+
if clientErr != nil {
2827
o.Logger().Notice("CED0001", "Could not configure a client, so client diagnostics are limited to testing configuration and connection")
2928
available = sets.NewString(clientdiags.ConfigContextsName)
3029
}
@@ -45,24 +44,14 @@ func (o DiagnosticsOptions) buildClientDiagnostics(rawConfig *clientcmdapi.Confi
4544
diagnostics = append(diagnostics, diagnostic)
4645
}
4746
}
48-
case clientdiags.DiagnosticPodName:
49-
dp := o.ParameterizedDiagnostics[diagnosticName].(*clientdiags.DiagnosticPod)
47+
case pod.DiagnosticPodName:
48+
dp := o.ParameterizedDiagnostics[diagnosticName].(*pod.DiagnosticPod)
5049
dp.KubeClient = kubeClient
5150
dp.Namespace = rawConfig.Contexts[rawConfig.CurrentContext].Namespace
5251
dp.Level = o.LogOptions.Level
5352
dp.Factory = o.Factory
5453
dp.PreventModification = dp.PreventModification || o.PreventModification
5554
diagnostics = append(diagnostics, dp)
56-
case networkdiags.NetworkDiagnosticName:
57-
nd := o.ParameterizedDiagnostics[diagnosticName].(*networkdiags.NetworkDiagnostic)
58-
nd.KubeClient = kubeClient
59-
nd.NetNamespacesClient = networkClient.Network()
60-
nd.ClusterNetworkClient = networkClient.Network()
61-
nd.ClientFlags = o.ClientFlags
62-
nd.Level = o.LogOptions.Level
63-
nd.Factory = o.Factory
64-
nd.PreventModification = o.PreventModification
65-
diagnostics = append(diagnostics, nd)
6655
default:
6756
return nil, fmt.Errorf("unknown diagnostic: %v", diagnosticName)
6857
}

pkg/oc/admin/diagnostics/cluster.go

+80-49
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,12 @@ import (
1414
appsclient "github.com/openshift/origin/pkg/apps/generated/internalclientset"
1515
oauthorizationclient "github.com/openshift/origin/pkg/authorization/generated/internalclientset"
1616
imageclient "github.com/openshift/origin/pkg/image/generated/internalclientset"
17+
networkclient "github.com/openshift/origin/pkg/network/generated/internalclientset"
1718
oauthclient "github.com/openshift/origin/pkg/oauth/generated/internalclientset"
1819
clustdiags "github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster"
1920
agldiags "github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/aggregated_logging"
2021
appcreate "github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/app_create"
22+
networkdiags "github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/network"
2123
"github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/types"
2224
osclientcmd "github.com/openshift/origin/pkg/oc/cli/util/clientcmd"
2325
projectclient "github.com/openshift/origin/pkg/project/generated/internalclientset"
@@ -41,6 +43,7 @@ func availableClusterDiagnostics() types.DiagnosticList {
4143
&clustdiags.NodeDefinitions{},
4244
&clustdiags.RouteCertificateValidation{},
4345
&clustdiags.ServiceExternalIPs{},
46+
&networkdiags.NetworkDiagnostic{},
4447
}
4548
}
4649

@@ -54,14 +57,14 @@ func (o DiagnosticsOptions) buildClusterDiagnostics(rawConfig *clientcmdapi.Conf
5457

5558
var kclusterClient kclientset.Interface
5659

57-
config, kclusterClient, serverUrl, err := o.findClusterClients(rawConfig)
60+
config, kclusterClient, rawAdminConfig, err := o.findClusterClients(rawConfig)
61+
if err != nil {
62+
return nil, err
63+
}
5864
if config == nil {
5965
o.Logger().Notice("CED1002", "Could not configure a client with cluster-admin permissions for the current server, so cluster diagnostics will be skipped")
6066
return nil, nil
6167
}
62-
if err != nil {
63-
return nil, err
64-
}
6568
imageClient, err := imageclient.NewForConfig(config)
6669
if err != nil {
6770
return nil, err
@@ -90,6 +93,10 @@ func (o DiagnosticsOptions) buildClusterDiagnostics(rawConfig *clientcmdapi.Conf
9093
if err != nil {
9194
return nil, err
9295
}
96+
networkClient, err := networkclient.NewForConfig(config)
97+
if err != nil {
98+
return nil, err
99+
}
93100

94101
diagnostics := []types.Diagnostic{}
95102
for _, diagnosticName := range requestedDiagnostics {
@@ -111,6 +118,7 @@ func (o DiagnosticsOptions) buildClusterDiagnostics(rawConfig *clientcmdapi.Conf
111118
case clustdiags.NodeDefinitionsName:
112119
d = &clustdiags.NodeDefinitions{KubeClient: kclusterClient}
113120
case clustdiags.MasterNodeName:
121+
serverUrl := rawAdminConfig.Clusters[rawAdminConfig.Contexts[rawAdminConfig.CurrentContext].Cluster].Server
114122
d = &clustdiags.MasterNode{KubeClient: kclusterClient, ServerUrl: serverUrl, MasterConfigFile: o.MasterConfigLocation}
115123
case clustdiags.ClusterRegistryName:
116124
d = &clustdiags.ClusterRegistry{KubeClient: kclusterClient, ImageStreamClient: imageClient.Image(), PreventModification: o.PreventModification}
@@ -126,6 +134,17 @@ func (o DiagnosticsOptions) buildClusterDiagnostics(rawConfig *clientcmdapi.Conf
126134
d = &clustdiags.ServiceExternalIPs{MasterConfigFile: o.MasterConfigLocation, KclusterClient: kclusterClient}
127135
case clustdiags.RouteCertificateValidationName:
128136
d = &clustdiags.RouteCertificateValidation{SARClient: kclusterClient.Authorization(), RESTConfig: config}
137+
case networkdiags.NetworkDiagnosticName:
138+
nd := o.ParameterizedDiagnostics[diagnosticName].(*networkdiags.NetworkDiagnostic)
139+
nd.KubeClient = kclusterClient
140+
nd.NetNamespacesClient = networkClient.Network()
141+
nd.ClusterNetworkClient = networkClient.Network()
142+
nd.ClientFlags = o.ClientFlags
143+
nd.Level = o.LogOptions.Level
144+
nd.Factory = o.Factory
145+
nd.RawConfig = rawAdminConfig
146+
nd.PreventModification = o.PreventModification
147+
d = nd
129148
default:
130149
return nil, fmt.Errorf("unknown diagnostic: %v", diagnosticName)
131150
}
@@ -135,84 +154,96 @@ func (o DiagnosticsOptions) buildClusterDiagnostics(rawConfig *clientcmdapi.Conf
135154
}
136155

137156
// attempts to find which context in the config might be a cluster-admin for the server in the current context.
138-
// returns config for the context chosen, kclusterClient for same, serverUrl of same, and any fatal error
139-
func (o DiagnosticsOptions) findClusterClients(rawConfig *clientcmdapi.Config) (*rest.Config, kclientset.Interface, string, error) {
157+
// returns openshift client config for the context chosen, kclusterClient and raw config of same, and any fatal error
158+
func (o DiagnosticsOptions) findClusterClients(rawConfig *clientcmdapi.Config) (*rest.Config, kclientset.Interface, *clientcmdapi.Config, error) {
140159
if o.ClientClusterContext != "" { // user has specified cluster context to use
141160
context, exists := rawConfig.Contexts[o.ClientClusterContext]
142161
if !exists {
143162
configErr := fmt.Errorf("Specified '%s' as cluster-admin context, but it was not found in your client configuration.", o.ClientClusterContext)
144163
o.Logger().Error("CED1003", configErr.Error())
145-
return nil, nil, "", configErr
164+
return nil, nil, nil, configErr
146165
}
147-
config, kube, serverUrl, err := o.makeClusterClients(rawConfig, o.ClientClusterContext, context)
148-
if err != nil || config == nil {
149-
return nil, nil, "", err
150-
}
151-
return config, kube, serverUrl, nil
166+
return o.makeClusterClients(rawConfig, o.ClientClusterContext, context)
152167
}
153168
currentContext, exists := rawConfig.Contexts[rawConfig.CurrentContext]
154169
if !exists { // config specified cluster admin context that doesn't exist; complain and quit
155170
configErr := fmt.Errorf("Current context '%s' not found in client configuration; will not attempt cluster diagnostics.", rawConfig.CurrentContext)
156171
o.Logger().Error("CED1004", configErr.Error())
157-
return nil, nil, "", configErr
172+
return nil, nil, nil, configErr
158173
}
174+
159175
// check if current context is already cluster admin
160-
config, kube, serverUrl, err := o.makeClusterClients(rawConfig, rawConfig.CurrentContext, currentContext)
176+
config, kube, rawAdminConfig, err := o.makeClusterClients(rawConfig, rawConfig.CurrentContext, currentContext)
161177
if err == nil && config != nil {
162-
return config, kube, serverUrl, nil
178+
return config, kube, rawAdminConfig, nil
163179
}
180+
164181
// otherwise, for convenience, search for a context with the same server but with the system:admin user
165182
for name, context := range rawConfig.Contexts {
166183
if context.Cluster == currentContext.Cluster && name != rawConfig.CurrentContext && strings.HasPrefix(context.AuthInfo, "system:admin/") {
167-
config, kube, serverUrl, err := o.makeClusterClients(rawConfig, name, context)
184+
config, kube, rawAdminConfig, err := o.makeClusterClients(rawConfig, name, context)
168185
if err != nil || config == nil {
169186
break // don't try more than one such context, they'll probably fail the same
170187
}
171-
return config, kube, serverUrl, nil
188+
return config, kube, rawAdminConfig, nil
172189
}
173190
}
174-
return nil, nil, "", nil
191+
return nil, nil, nil, nil
175192
}
176193

177194
// makes the client from the specified context and determines whether it is a cluster-admin.
178-
func (o DiagnosticsOptions) makeClusterClients(rawConfig *clientcmdapi.Config, contextName string, context *clientcmdapi.Context) (*rest.Config, kclientset.Interface, string, error) {
195+
func (o DiagnosticsOptions) makeClusterClients(rawConfig *clientcmdapi.Config, contextName string, context *clientcmdapi.Context) (*rest.Config, kclientset.Interface, *clientcmdapi.Config, error) {
179196
overrides := &clientcmd.ConfigOverrides{Context: *context}
180197
clientConfig := clientcmd.NewDefaultClientConfig(*rawConfig, overrides)
181-
serverUrl := rawConfig.Clusters[context.Cluster].Server
182198
factory := osclientcmd.NewFactory(clientConfig)
199+
200+
// create a config for making openshift clients
183201
config, err := factory.ClientConfig()
184202
if err != nil {
185-
o.Logger().Debug("CED1006", fmt.Sprintf("Error creating client for context '%s':\n%v", contextName, err))
186-
return nil, nil, "", nil
203+
o.Logger().Debug("CED1006", fmt.Sprintf("Error creating client config for context '%s':\n%v", contextName, err))
204+
return nil, nil, nil, nil
187205
}
206+
207+
// create a kube client
208+
kubeClient, err := factory.ClientSet()
209+
if err != nil {
210+
o.Logger().Debug("CED1006", fmt.Sprintf("Error creating kube client for context '%s':\n%v", contextName, err))
211+
return nil, nil, nil, nil
212+
}
213+
188214
o.Logger().Debug("CED1005", fmt.Sprintf("Checking if context is cluster-admin: '%s'", contextName))
189-
if kubeClient, err := factory.ClientSet(); err != nil {
190-
o.Logger().Debug("CED1006", fmt.Sprintf("Error creating client for context '%s':\n%v", contextName, err))
191-
return nil, nil, "", nil
192-
} else {
193-
subjectAccessReview := &authorization.SelfSubjectAccessReview{
194-
Spec: authorization.SelfSubjectAccessReviewSpec{
195-
ResourceAttributes: &authorization.ResourceAttributes{
196-
// if you can do everything, you're the cluster admin.
197-
Verb: "*",
198-
Group: "*",
199-
Resource: "*",
200-
},
215+
subjectAccessReview := &authorization.SelfSubjectAccessReview{
216+
Spec: authorization.SelfSubjectAccessReviewSpec{
217+
ResourceAttributes: &authorization.ResourceAttributes{
218+
// if you can do everything, you're the cluster admin.
219+
Verb: "*",
220+
Group: "*",
221+
Resource: "*",
201222
},
202-
}
203-
if resp, err := kubeClient.Authorization().SelfSubjectAccessReviews().Create(subjectAccessReview); err != nil {
204-
if regexp.MustCompile(`User "[\w:]+" cannot create \w+ at the cluster scope`).MatchString(err.Error()) {
205-
o.Logger().Debug("CED1007", fmt.Sprintf("Context '%s' does not have cluster-admin access:\n%v", contextName, err))
206-
return nil, nil, "", nil
207-
} else {
208-
o.Logger().Error("CED1008", fmt.Sprintf("Unknown error testing cluster-admin access for context '%s':\n%v", contextName, err))
209-
return nil, nil, "", err
210-
}
211-
} else if resp.Status.Allowed {
212-
o.Logger().Info("CED1009", fmt.Sprintf("Using context for cluster-admin access: '%s'", contextName))
213-
return config, kubeClient, serverUrl, nil
214-
}
223+
},
224+
}
225+
resp, err := kubeClient.Authorization().SelfSubjectAccessReviews().Create(subjectAccessReview)
226+
if err != nil && regexp.MustCompile(`User "[\w:]+" cannot create \w+ at the cluster scope`).MatchString(err.Error()) {
227+
o.Logger().Debug("CED1007", fmt.Sprintf("Context '%s' does not have cluster-admin access:\n%v", contextName, err))
228+
return nil, nil, nil, nil
229+
}
230+
if err != nil {
231+
o.Logger().Error("CED1008", fmt.Sprintf("Unknown error testing cluster-admin access for context '%s':\n%v", contextName, err))
232+
return nil, nil, nil, err
233+
}
234+
if !resp.Status.Allowed {
235+
o.Logger().Debug("CED1010", fmt.Sprintf("Context does not have cluster-admin access: '%s'", contextName))
236+
return nil, nil, nil, nil
237+
}
238+
239+
o.Logger().Info("CED1009", fmt.Sprintf("Using context for cluster-admin access: '%s'", contextName))
240+
adminConfig := rawConfig.DeepCopy()
241+
adminConfig.CurrentContext = contextName
242+
if err := clientcmdapi.MinifyConfig(adminConfig); err != nil {
243+
return nil, nil, nil, err
244+
}
245+
if err := clientcmdapi.FlattenConfig(adminConfig); err != nil {
246+
return nil, nil, nil, err
215247
}
216-
o.Logger().Debug("CED1010", fmt.Sprintf("Context does not have cluster-admin access: '%s'", contextName))
217-
return nil, nil, "", nil
248+
return config, kubeClient, adminConfig, nil
218249
}

pkg/oc/admin/diagnostics/diagnostics.go

+7-29
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,12 @@ import (
1313
kutilerrors "k8s.io/apimachinery/pkg/util/errors"
1414
"k8s.io/apimachinery/pkg/util/sets"
1515
"k8s.io/kubernetes/pkg/kubectl/cmd/templates"
16-
kcmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
1716

1817
"github.com/openshift/origin/pkg/client/config"
1918
"github.com/openshift/origin/pkg/cmd/flagtypes"
20-
clientdiag "github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/client"
19+
poddiag "github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/client/pod/in_pod"
20+
networkpoddiag "github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/network/in_pod"
2121
"github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/log"
22-
networkdiag "github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/network"
2322
"github.com/openshift/origin/pkg/oc/admin/diagnostics/diagnostics/types"
2423
"github.com/openshift/origin/pkg/oc/admin/diagnostics/options"
2524
"github.com/openshift/origin/pkg/oc/admin/diagnostics/util"
@@ -120,7 +119,7 @@ func NewCmdDiagnostics(name string, fullName string, out io.Writer) *cobra.Comma
120119
Use: name,
121120
Short: "Diagnose common cluster problems",
122121
Long: fmt.Sprintf(longDescription, fullName),
123-
Run: commandRunFunc(o),
122+
Run: util.CommandRunFunc(o),
124123
}
125124
cmd.SetOutput(out) // for output re: usage / help
126125
o.bindCommonFlags(cmd.Flags())
@@ -135,8 +134,8 @@ func NewCmdDiagnostics(name string, fullName string, out io.Writer) *cobra.Comma
135134
}
136135
// add hidden in-pod subcommands
137136
cmd.AddCommand(
138-
NewCommandPodDiagnostics(clientdiag.InPodDiagnosticRecommendedName, out),
139-
NewCommandNetworkPodDiagnostics(networkdiag.InPodNetworkCheckRecommendedName, out),
137+
poddiag.NewCommandPodDiagnostics(poddiag.InPodDiagnosticRecommendedName, out),
138+
networkpoddiag.NewCommandNetworkPodDiagnostics(networkpoddiag.InPodNetworkCheckRecommendedName, out),
140139
)
141140

142141
return cmd
@@ -154,7 +153,7 @@ func NewCmdDiagnosticsAll(name string, fullName string, out io.Writer, available
154153
Use: name,
155154
Short: "Diagnose common cluster problems",
156155
Long: fmt.Sprintf(longDescriptionAll, fullName),
157-
Run: commandRunFunc(o),
156+
Run: util.CommandRunFunc(o),
158157
}
159158
cmd.SetOutput(out) // for output re: usage / help
160159
o.bindCommonFlags(cmd.Flags())
@@ -176,7 +175,7 @@ func NewCmdDiagnosticsIndividual(name string, fullName string, out io.Writer, di
176175
Use: name,
177176
Short: diagnostic.Description(),
178177
Long: fmt.Sprintf(longDescriptionIndividual, diagnostic.Name(), diagnostic.Description()),
179-
Run: commandRunFunc(o),
178+
Run: util.CommandRunFunc(o),
180179
Aliases: []string{diagnostic.Name()},
181180
}
182181
cmd.SetOutput(out) // for output re: usage / help
@@ -194,27 +193,6 @@ func NewCmdDiagnosticsIndividual(name string, fullName string, out io.Writer, di
194193
return cmd
195194
}
196195

197-
type optionsRunner interface {
198-
Logger() *log.Logger
199-
Complete(*cobra.Command, []string) error
200-
RunDiagnostics() error
201-
}
202-
203-
// returns a shared function that runs when one of these Commands actually executes
204-
func commandRunFunc(o optionsRunner) func(c *cobra.Command, args []string) {
205-
return func(c *cobra.Command, args []string) {
206-
kcmdutil.CheckErr(o.Complete(c, args))
207-
208-
if err := o.RunDiagnostics(); err != nil {
209-
o.Logger().Error("CED3001", fmt.Sprintf("Encountered fatal error while building diagnostics: %s", err.Error()))
210-
}
211-
o.Logger().Summary()
212-
if o.Logger().ErrorsSeen() {
213-
os.Exit(1)
214-
}
215-
}
216-
}
217-
218196
// returns the logger built according to options (must be Complete()ed)
219197
func (o *DiagnosticsOptions) Logger() *log.Logger {
220198
return o.logger

pkg/oc/admin/diagnostics/diagnostics/pod/auth.go pkg/oc/admin/diagnostics/diagnostics/client/pod/in_pod/auth.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
package pod
1+
package in_pod
22

33
import (
44
"crypto/tls"

0 commit comments

Comments
 (0)