Merge pull request #30 from tg123/master
Decouple yaml file and KubernetesClientConfiguration object
This commit is contained in:
@@ -24,21 +24,24 @@ namespace k8s
|
||||
this.CaCert = config.SslCaCert;
|
||||
this.BaseUri = new Uri(config.Host);
|
||||
|
||||
// ssl cert validation
|
||||
Func<object, X509Certificate, X509Chain, SslPolicyErrors, bool> sslCertValidationFunc;
|
||||
if (config.SkipTlsVerify)
|
||||
{
|
||||
sslCertValidationFunc = (sender, certificate, chain, sslPolicyErrors) => true;
|
||||
}
|
||||
else
|
||||
{
|
||||
sslCertValidationFunc = this.CertificateValidationCallBack;
|
||||
}
|
||||
var handler = new HttpClientHandler();
|
||||
|
||||
var handler = new HttpClientHandler
|
||||
if (BaseUri.Scheme == "https")
|
||||
{
|
||||
ServerCertificateCustomValidationCallback = sslCertValidationFunc
|
||||
};
|
||||
if (config.SkipTlsVerify)
|
||||
{
|
||||
handler.ServerCertificateCustomValidationCallback = (sender, certificate, chain, sslPolicyErrors) => true;
|
||||
}
|
||||
else
|
||||
{
|
||||
if (CaCert == null)
|
||||
{
|
||||
throw new KubeConfigException("a CA must be set when SkipTlsVerify === false");
|
||||
}
|
||||
|
||||
handler.ServerCertificateCustomValidationCallback = CertificateValidationCallBack;
|
||||
}
|
||||
}
|
||||
|
||||
// set credentails for the kubernernet client
|
||||
this.SetCredentials(config, handler);
|
||||
@@ -58,11 +61,15 @@ namespace k8s
|
||||
// set the Credentails for token based auth
|
||||
if (!string.IsNullOrWhiteSpace(config.AccessToken))
|
||||
{
|
||||
this.Credentials = new KubernetesClientCredentials(config.AccessToken);
|
||||
Credentials = new TokenCredentials(config.AccessToken);
|
||||
}
|
||||
else if (!string.IsNullOrWhiteSpace(config.Username) && !string.IsNullOrWhiteSpace(config.Password))
|
||||
{
|
||||
this.Credentials = new KubernetesClientCredentials(config.Username, config.Password);
|
||||
Credentials = new BasicAuthenticationCredentials
|
||||
{
|
||||
UserName = config.Username,
|
||||
Password = config.Password
|
||||
};
|
||||
}
|
||||
// othwerwise set handler for clinet cert based auth
|
||||
else if ((!string.IsNullOrWhiteSpace(config.ClientCertificateData) ||
|
||||
@@ -73,10 +80,6 @@ namespace k8s
|
||||
var cert = Utils.GeneratePfx(config);
|
||||
handler.ClientCertificates.Add(cert);
|
||||
}
|
||||
else
|
||||
{
|
||||
throw new KubeConfigException("Configuration does not have appropriate auth credentials");
|
||||
}
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
|
||||
218
src/KubernetesClientConfiguration.ConfigFile.cs
Normal file
218
src/KubernetesClientConfiguration.ConfigFile.cs
Normal file
@@ -0,0 +1,218 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
using System.Linq;
|
||||
using System.Runtime.InteropServices;
|
||||
using System.Security.Cryptography.X509Certificates;
|
||||
using k8s.Exceptions;
|
||||
using k8s.KubeConfigModels;
|
||||
using YamlDotNet.Serialization;
|
||||
|
||||
namespace k8s
|
||||
{
|
||||
public partial class KubernetesClientConfiguration
|
||||
{
|
||||
/// <summary>
|
||||
/// Gets CurrentContext
|
||||
/// </summary>
|
||||
public string CurrentContext { get; private set; }
|
||||
|
||||
/// <summary>
|
||||
/// kubeconfig Default Location
|
||||
/// </summary>
|
||||
private static readonly string KubeConfigDefaultLocation =
|
||||
RuntimeInformation.IsOSPlatform(OSPlatform.Windows)
|
||||
? Path.Combine(Environment.GetEnvironmentVariable("USERPROFILE"), @".kube\config")
|
||||
: Path.Combine(Environment.GetEnvironmentVariable("HOME"), ".kube/config");
|
||||
|
||||
/// <summary>
|
||||
/// Initializes a new instance of the <see cref="KubernetesClientConfiguration"/> class.
|
||||
/// </summary>
|
||||
/// <param name="kubeconfig">kubeconfig file info</param>
|
||||
/// <param name="currentContext">Context to use from kube config</param>
|
||||
public KubernetesClientConfiguration(FileInfo kubeconfig = null, string currentContext = null)
|
||||
{
|
||||
var k8SConfig = LoadKubeConfig(kubeconfig ?? new FileInfo(KubeConfigDefaultLocation));
|
||||
this.Initialize(k8SConfig, currentContext);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Initializes a new instance of the <see cref="KubernetesClientConfiguration"/> from config file
|
||||
/// </summary>
|
||||
/// <param name="masterUrl">kube api server endpoint</param>
|
||||
/// <param name="kubeconfigPath">kubeconfig filepath</param>
|
||||
public static KubernetesClientConfiguration BuildConfigFromConfigFile(string masterUrl = null, string kubeconfigPath = null)
|
||||
{
|
||||
return BuildConfigFromConfigFile(new FileInfo(kubeconfigPath ?? KubeConfigDefaultLocation), null, masterUrl);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
///
|
||||
/// </summary>
|
||||
/// <param name="kubeconfig">Fileinfo of the kubeconfig, cannot be null</param>
|
||||
/// <param name="currentContext">override the context in config file, set null if do not want to override</param>
|
||||
/// <param name="masterUrl">overrider kube api server endpoint, set null if do not want to override</param>
|
||||
public static KubernetesClientConfiguration BuildConfigFromConfigFile(FileInfo kubeconfig, string currentContext = null, string masterUrl = null)
|
||||
{
|
||||
if (kubeconfig == null)
|
||||
{
|
||||
throw new NullReferenceException(nameof(kubeconfig));
|
||||
}
|
||||
|
||||
var k8SConfig = LoadKubeConfig(kubeconfig);
|
||||
var k8SConfiguration = new KubernetesClientConfiguration();
|
||||
k8SConfiguration.Initialize(k8SConfig);
|
||||
|
||||
if (!string.IsNullOrWhiteSpace(masterUrl))
|
||||
{
|
||||
k8SConfiguration.Host = masterUrl;
|
||||
}
|
||||
return k8SConfiguration;
|
||||
}
|
||||
|
||||
|
||||
/// <summary>
|
||||
/// Validates and Intializes Client Configuration
|
||||
/// </summary>
|
||||
/// <param name="k8SConfig">Kubernetes Configuration</param>
|
||||
/// <param name="currentContext">Current Context</param>
|
||||
private void Initialize(K8SConfiguration k8SConfig, string currentContext = null)
|
||||
{
|
||||
if (k8SConfig.Contexts == null)
|
||||
{
|
||||
throw new KubeConfigException("No contexts found in kubeconfig");
|
||||
}
|
||||
|
||||
if (k8SConfig.Clusters == null)
|
||||
{
|
||||
throw new KubeConfigException($"No clusters found in kubeconfig");
|
||||
}
|
||||
|
||||
if (k8SConfig.Users == null)
|
||||
{
|
||||
throw new KubeConfigException($"No users found in kubeconfig");
|
||||
}
|
||||
|
||||
// current context
|
||||
currentContext = currentContext ?? k8SConfig.CurrentContext;
|
||||
Context activeContext =
|
||||
k8SConfig.Contexts.FirstOrDefault(
|
||||
c => c.Name.Equals(currentContext, StringComparison.OrdinalIgnoreCase));
|
||||
if (activeContext == null)
|
||||
{
|
||||
throw new KubeConfigException($"CurrentContext: {currentContext} not found in contexts in kubeconfig");
|
||||
}
|
||||
|
||||
this.CurrentContext = activeContext.Name;
|
||||
|
||||
// cluster
|
||||
var clusterDetails =
|
||||
k8SConfig.Clusters.FirstOrDefault(c => c.Name.Equals(activeContext.ContextDetails.Cluster,
|
||||
StringComparison.OrdinalIgnoreCase));
|
||||
if (clusterDetails?.ClusterEndpoint == null)
|
||||
{
|
||||
throw new KubeConfigException($"Cluster not found for context {activeContext} in kubeconfig");
|
||||
}
|
||||
|
||||
if (string.IsNullOrWhiteSpace(clusterDetails.ClusterEndpoint.Server))
|
||||
{
|
||||
throw new KubeConfigException($"Server not found for current-context {activeContext} in kubeconfig");
|
||||
}
|
||||
|
||||
if (!clusterDetails.ClusterEndpoint.SkipTlsVerify &&
|
||||
string.IsNullOrWhiteSpace(clusterDetails.ClusterEndpoint.CertificateAuthorityData) &&
|
||||
string.IsNullOrWhiteSpace(clusterDetails.ClusterEndpoint.CertificateAuthority))
|
||||
{
|
||||
throw new KubeConfigException(
|
||||
$"neither certificate-authority-data nor certificate-authority not found for current-context :{activeContext} in kubeconfig");
|
||||
}
|
||||
|
||||
this.Host = clusterDetails.ClusterEndpoint.Server;
|
||||
if (!string.IsNullOrEmpty(clusterDetails.ClusterEndpoint.CertificateAuthorityData))
|
||||
{
|
||||
string data = clusterDetails.ClusterEndpoint.CertificateAuthorityData;
|
||||
this.SslCaCert = new X509Certificate2(System.Text.Encoding.UTF8.GetBytes(Utils.Base64Decode(data)));
|
||||
}
|
||||
else if (!string.IsNullOrEmpty(clusterDetails.ClusterEndpoint.CertificateAuthority))
|
||||
{
|
||||
this.SslCaCert = new X509Certificate2(clusterDetails.ClusterEndpoint.CertificateAuthority);
|
||||
}
|
||||
this.SkipTlsVerify = clusterDetails.ClusterEndpoint.SkipTlsVerify;
|
||||
|
||||
// user
|
||||
this.SetUserDetails(k8SConfig, activeContext);
|
||||
}
|
||||
|
||||
private void SetUserDetails(K8SConfiguration k8SConfig, Context activeContext)
|
||||
{
|
||||
var userDetails = k8SConfig.Users.FirstOrDefault(c => c.Name.Equals(activeContext.ContextDetails.User,
|
||||
StringComparison.OrdinalIgnoreCase));
|
||||
|
||||
if (userDetails == null)
|
||||
{
|
||||
throw new KubeConfigException("User not found for context {activeContext.Name} in kubeconfig");
|
||||
}
|
||||
|
||||
if (userDetails.UserCredentials == null)
|
||||
{
|
||||
throw new KubeConfigException($"User credentials not found for user: {userDetails.Name} in kubeconfig");
|
||||
}
|
||||
|
||||
var userCredentialsFound = false;
|
||||
|
||||
// Basic and bearer tokens are mutually exclusive
|
||||
if (!string.IsNullOrWhiteSpace(userDetails.UserCredentials.Token))
|
||||
{
|
||||
this.AccessToken = userDetails.UserCredentials.Token;
|
||||
userCredentialsFound = true;
|
||||
}
|
||||
else if (!string.IsNullOrWhiteSpace(userDetails.UserCredentials.UserName) &&
|
||||
!string.IsNullOrWhiteSpace(userDetails.UserCredentials.Password))
|
||||
{
|
||||
this.Username = userDetails.UserCredentials.UserName;
|
||||
this.Password = userDetails.UserCredentials.Password;
|
||||
userCredentialsFound = true;
|
||||
}
|
||||
|
||||
// Token and cert based auth can co-exist
|
||||
if (!string.IsNullOrWhiteSpace(userDetails.UserCredentials.ClientCertificateData) &&
|
||||
!string.IsNullOrWhiteSpace(userDetails.UserCredentials.ClientKeyData))
|
||||
{
|
||||
this.ClientCertificateData = userDetails.UserCredentials.ClientCertificateData;
|
||||
this.ClientCertificateKey = userDetails.UserCredentials.ClientKeyData;
|
||||
userCredentialsFound = true;
|
||||
}
|
||||
|
||||
if (!string.IsNullOrWhiteSpace(userDetails.UserCredentials.ClientCertificate) &&
|
||||
!string.IsNullOrWhiteSpace(userDetails.UserCredentials.ClientKey))
|
||||
{
|
||||
this.ClientCertificate = userDetails.UserCredentials.ClientCertificate;
|
||||
this.ClientKey = userDetails.UserCredentials.ClientKey;
|
||||
userCredentialsFound = true;
|
||||
}
|
||||
|
||||
if (!userCredentialsFound)
|
||||
{
|
||||
throw new KubeConfigException(
|
||||
$"User: {userDetails.Name} does not have appropriate auth credentials in kubeconfig");
|
||||
}
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Loads Kube Config
|
||||
/// </summary>
|
||||
/// <param name="config">Kube config file contents</param>
|
||||
/// <returns>Instance of the <see cref="K8SConfiguration"/> class</returns>
|
||||
private static K8SConfiguration LoadKubeConfig(FileInfo kubeconfig)
|
||||
{
|
||||
if (!kubeconfig.Exists)
|
||||
{
|
||||
throw new KubeConfigException($"kubeconfig file not found at {kubeconfig.FullName}");
|
||||
}
|
||||
var kubeconfigContent = File.ReadAllText(kubeconfig.FullName);
|
||||
|
||||
var deserializeBuilder = new DeserializerBuilder();
|
||||
var deserializer = deserializeBuilder.Build();
|
||||
return deserializer.Deserialize<K8SConfiguration>(kubeconfigContent);
|
||||
}
|
||||
}
|
||||
}
|
||||
35
src/KubernetesClientConfiguration.InCluster.cs
Normal file
35
src/KubernetesClientConfiguration.InCluster.cs
Normal file
@@ -0,0 +1,35 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
using k8s.Exceptions;
|
||||
|
||||
namespace k8s
|
||||
{
|
||||
public partial class KubernetesClientConfiguration
|
||||
{
|
||||
private const string ServiceaccountPath = "/var/run/secrets/kubernetes.io/serviceaccount/";
|
||||
private const string ServiceAccountTokenKeyFileName = "token";
|
||||
private const string ServiceAccountRootCAKeyFileName = "ca.crt";
|
||||
|
||||
public static KubernetesClientConfiguration InClusterConfig()
|
||||
{
|
||||
var host = Environment.GetEnvironmentVariable("KUBERNETES_SERVICE_HOST");
|
||||
var port = Environment.GetEnvironmentVariable("KUBERNETES_SERVICE_PORT");
|
||||
|
||||
if (string.IsNullOrWhiteSpace(host) || string.IsNullOrWhiteSpace(port))
|
||||
{
|
||||
throw new KubeConfigException(
|
||||
"unable to load in-cluster configuration, KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT must be defined");
|
||||
}
|
||||
|
||||
var token = File.ReadAllText(Path.Combine(ServiceaccountPath, ServiceAccountTokenKeyFileName));
|
||||
var rootCAFile = Path.Combine(ServiceaccountPath, ServiceAccountRootCAKeyFileName);
|
||||
|
||||
return new KubernetesClientConfiguration
|
||||
{
|
||||
Host = new UriBuilder("https", host, Convert.ToInt32(port)).ToString(),
|
||||
AccessToken = token,
|
||||
SslCaCert = Utils.LoadPemFileCert(rootCAFile)
|
||||
};
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -12,65 +12,46 @@ namespace k8s
|
||||
/// <summary>
|
||||
/// Represents a set of kubernetes client configuration settings
|
||||
/// </summary>
|
||||
public class KubernetesClientConfiguration
|
||||
public partial class KubernetesClientConfiguration
|
||||
{
|
||||
/// <summary>
|
||||
/// Initializes a new instance of the <see cref="KubernetesClientConfiguration"/> class.
|
||||
/// </summary>
|
||||
/// <param name="kubeconfig">kubeconfig file info</param>
|
||||
/// <param name="currentContext">Context to use from kube config</param>
|
||||
public KubernetesClientConfiguration(FileInfo kubeconfig = null, string currentContext = null)
|
||||
public KubernetesClientConfiguration()
|
||||
{
|
||||
var k8SConfig = this.LoadKubeConfig(kubeconfig ?? new FileInfo(KubeConfigDefaultLocation));
|
||||
this.Initialize(k8SConfig, currentContext);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// kubeconfig Default Location
|
||||
/// </summary>
|
||||
private static readonly string KubeConfigDefaultLocation = RuntimeInformation.IsOSPlatform(OSPlatform.Windows) ?
|
||||
Path.Combine(Environment.GetEnvironmentVariable("USERPROFILE"), @".kube\config") :
|
||||
Path.Combine(Environment.GetEnvironmentVariable("HOME"), ".kube/config");
|
||||
|
||||
/// <summary>
|
||||
/// Gets CurrentContext
|
||||
/// </summary>
|
||||
public string CurrentContext { get; private set; }
|
||||
|
||||
/// <summary>
|
||||
/// Gets Host
|
||||
/// </summary>
|
||||
public string Host { get; private set; }
|
||||
public string Host { get; set; }
|
||||
|
||||
/// <summary>
|
||||
/// Gets SslCaCert
|
||||
/// </summary>
|
||||
public X509Certificate2 SslCaCert { get; private set; }
|
||||
public X509Certificate2 SslCaCert { get; set; }
|
||||
|
||||
/// <summary>
|
||||
/// Gets ClientCertificateData
|
||||
/// </summary>
|
||||
public string ClientCertificateData { get; private set; }
|
||||
public string ClientCertificateData { get; set; }
|
||||
|
||||
/// <summary>
|
||||
/// Gets ClientCertificate Key
|
||||
/// </summary>
|
||||
public string ClientCertificateKey { get; private set; }
|
||||
public string ClientCertificateKey { get; set; }
|
||||
|
||||
/// <summary>
|
||||
/// Gets ClientCertificate filename
|
||||
/// </summary>
|
||||
public string ClientCertificate { get; private set; }
|
||||
public string ClientCertificate { get; set; }
|
||||
|
||||
/// <summary>
|
||||
/// Gets ClientCertificate Key filename
|
||||
/// </summary>
|
||||
public string ClientKey { get; private set; }
|
||||
public string ClientKey { get; set; }
|
||||
|
||||
/// <summary>
|
||||
/// Gets a value indicating whether to skip ssl server cert validation
|
||||
/// </summary>
|
||||
public bool SkipTlsVerify { get; private set; }
|
||||
public bool SkipTlsVerify { get; set; }
|
||||
|
||||
/// <summary>
|
||||
/// Gets or sets the HTTP user agent.
|
||||
@@ -95,142 +76,5 @@ namespace k8s
|
||||
/// </summary>
|
||||
/// <value>The access token.</value>
|
||||
public string AccessToken { get; set; }
|
||||
|
||||
/// <summary>
|
||||
/// Validates and Intializes Client Configuration
|
||||
/// </summary>
|
||||
/// <param name="k8SConfig">Kubernetes Configuration</param>
|
||||
/// <param name="currentContext">Current Context</param>
|
||||
private void Initialize(K8SConfiguration k8SConfig, string currentContext = null)
|
||||
{
|
||||
if (k8SConfig.Contexts == null)
|
||||
{
|
||||
throw new KubeConfigException("No contexts found in kubeconfig");
|
||||
}
|
||||
|
||||
if (k8SConfig.Clusters == null)
|
||||
{
|
||||
throw new KubeConfigException($"No clusters found in kubeconfig");
|
||||
}
|
||||
|
||||
if (k8SConfig.Users == null)
|
||||
{
|
||||
throw new KubeConfigException($"No users found in kubeconfig");
|
||||
}
|
||||
|
||||
// current context
|
||||
currentContext = currentContext ?? k8SConfig.CurrentContext;
|
||||
Context activeContext = k8SConfig.Contexts.FirstOrDefault(c => c.Name.Equals(currentContext, StringComparison.OrdinalIgnoreCase));
|
||||
if (activeContext == null)
|
||||
{
|
||||
throw new KubeConfigException($"CurrentContext: {currentContext} not found in contexts in kubeconfig");
|
||||
}
|
||||
|
||||
this.CurrentContext = activeContext.Name;
|
||||
|
||||
// cluster
|
||||
var clusterDetails = k8SConfig.Clusters.FirstOrDefault(c => c.Name.Equals(activeContext.ContextDetails.Cluster, StringComparison.OrdinalIgnoreCase));
|
||||
if (clusterDetails?.ClusterEndpoint == null)
|
||||
{
|
||||
throw new KubeConfigException($"Cluster not found for context {activeContext} in kubeconfig");
|
||||
}
|
||||
|
||||
if (string.IsNullOrWhiteSpace(clusterDetails.ClusterEndpoint.Server))
|
||||
{
|
||||
throw new KubeConfigException($"Server not found for current-context {activeContext} in kubeconfig");
|
||||
}
|
||||
|
||||
if (!clusterDetails.ClusterEndpoint.SkipTlsVerify &&
|
||||
string.IsNullOrWhiteSpace(clusterDetails.ClusterEndpoint.CertificateAuthorityData) &&
|
||||
string.IsNullOrWhiteSpace(clusterDetails.ClusterEndpoint.CertificateAuthority))
|
||||
{
|
||||
throw new KubeConfigException($"neither certificate-authority-data nor certificate-authority not found for current-context :{activeContext} in kubeconfig");
|
||||
}
|
||||
|
||||
this.Host = clusterDetails.ClusterEndpoint.Server;
|
||||
if (!string.IsNullOrEmpty(clusterDetails.ClusterEndpoint.CertificateAuthorityData))
|
||||
{
|
||||
string data = clusterDetails.ClusterEndpoint.CertificateAuthorityData;
|
||||
this.SslCaCert = new X509Certificate2(System.Text.Encoding.UTF8.GetBytes(Utils.Base64Decode(data)));
|
||||
}
|
||||
else if (!string.IsNullOrEmpty(clusterDetails.ClusterEndpoint.CertificateAuthority))
|
||||
{
|
||||
this.SslCaCert = new X509Certificate2(clusterDetails.ClusterEndpoint.CertificateAuthority);
|
||||
}
|
||||
this.SkipTlsVerify = clusterDetails.ClusterEndpoint.SkipTlsVerify;
|
||||
|
||||
// user
|
||||
this.SetUserDetails(k8SConfig, activeContext);
|
||||
}
|
||||
|
||||
private void SetUserDetails(K8SConfiguration k8SConfig, Context activeContext)
|
||||
{
|
||||
var userDetails = k8SConfig.Users.FirstOrDefault(c => c.Name.Equals(activeContext.ContextDetails.User, StringComparison.OrdinalIgnoreCase));
|
||||
|
||||
if (userDetails == null)
|
||||
{
|
||||
throw new KubeConfigException("User not found for context {activeContext.Name} in kubeconfig");
|
||||
}
|
||||
|
||||
if (userDetails.UserCredentials == null)
|
||||
{
|
||||
throw new KubeConfigException($"User credentials not found for user: {userDetails.Name} in kubeconfig");
|
||||
}
|
||||
|
||||
var userCredentialsFound = false;
|
||||
|
||||
// Basic and bearer tokens are mutually exclusive
|
||||
if (!string.IsNullOrWhiteSpace(userDetails.UserCredentials.Token))
|
||||
{
|
||||
this.AccessToken = userDetails.UserCredentials.Token;
|
||||
userCredentialsFound = true;
|
||||
}
|
||||
else if (!string.IsNullOrWhiteSpace(userDetails.UserCredentials.UserName) &&
|
||||
!string.IsNullOrWhiteSpace(userDetails.UserCredentials.Password))
|
||||
{
|
||||
this.Username = userDetails.UserCredentials.UserName;
|
||||
this.Password = userDetails.UserCredentials.Password;
|
||||
userCredentialsFound = true;
|
||||
}
|
||||
|
||||
// Token and cert based auth can co-exist
|
||||
if (!string.IsNullOrWhiteSpace(userDetails.UserCredentials.ClientCertificateData) &&
|
||||
!string.IsNullOrWhiteSpace(userDetails.UserCredentials.ClientKeyData))
|
||||
{
|
||||
this.ClientCertificateData = userDetails.UserCredentials.ClientCertificateData;
|
||||
this.ClientCertificateKey = userDetails.UserCredentials.ClientKeyData;
|
||||
userCredentialsFound = true;
|
||||
}
|
||||
|
||||
if (!string.IsNullOrWhiteSpace(userDetails.UserCredentials.ClientCertificate) &&
|
||||
!string.IsNullOrWhiteSpace(userDetails.UserCredentials.ClientKey)) {
|
||||
this.ClientCertificate = userDetails.UserCredentials.ClientCertificate;
|
||||
this.ClientKey = userDetails.UserCredentials.ClientKey;
|
||||
userCredentialsFound = true;
|
||||
}
|
||||
|
||||
if (!userCredentialsFound)
|
||||
{
|
||||
throw new KubeConfigException($"User: {userDetails.Name} does not have appropriate auth credentials in kubeconfig");
|
||||
}
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Loads Kube Config
|
||||
/// </summary>
|
||||
/// <param name="config">Kube config file contents</param>
|
||||
/// <returns>Instance of the <see cref="K8SConfiguration"/> class</returns>
|
||||
private K8SConfiguration LoadKubeConfig(FileInfo kubeconfig)
|
||||
{
|
||||
if (!kubeconfig.Exists)
|
||||
{
|
||||
throw new KubeConfigException($"kubeconfig file not found at {kubeconfig.FullName}");
|
||||
}
|
||||
var kubeconfigContent = File.ReadAllText(kubeconfig.FullName);
|
||||
|
||||
var deserializeBuilder = new DeserializerBuilder();
|
||||
var deserializer = deserializeBuilder.Build();
|
||||
return deserializer.Deserialize<K8SConfiguration>(kubeconfigContent);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,70 +0,0 @@
|
||||
namespace k8s
|
||||
{
|
||||
using System;
|
||||
using System.Globalization;
|
||||
using System.Net.Http;
|
||||
using System.Net.Http.Headers;
|
||||
using System.Threading;
|
||||
using System.Threading.Tasks;
|
||||
using k8s.Exceptions;
|
||||
using Microsoft.Rest;
|
||||
|
||||
/// <summary>
|
||||
/// Class to set the Kubernetes Client Credentials for token based auth
|
||||
/// </summary>
|
||||
public class KubernetesClientCredentials : ServiceClientCredentials
|
||||
{
|
||||
public KubernetesClientCredentials(string token)
|
||||
{
|
||||
if (string.IsNullOrWhiteSpace(token))
|
||||
{
|
||||
throw new ArgumentNullException(nameof(token));
|
||||
}
|
||||
|
||||
this.AuthenticationToken = token;
|
||||
this.AuthenticationScheme = "Bearer";
|
||||
}
|
||||
|
||||
public KubernetesClientCredentials(string userName, string password)
|
||||
{
|
||||
if (string.IsNullOrWhiteSpace(userName))
|
||||
{
|
||||
throw new ArgumentNullException(nameof(userName));
|
||||
}
|
||||
|
||||
if (string.IsNullOrWhiteSpace(password))
|
||||
{
|
||||
throw new ArgumentNullException(nameof(password));
|
||||
}
|
||||
|
||||
this.AuthenticationToken = Utils.Base64Encode(string.Format(CultureInfo.InvariantCulture, "{0}:{1}", userName, password));
|
||||
this.AuthenticationScheme = "Basic";
|
||||
}
|
||||
|
||||
private string AuthenticationToken { get; }
|
||||
|
||||
private string AuthenticationScheme { get; }
|
||||
|
||||
public override async Task ProcessHttpRequestAsync(HttpRequestMessage request, CancellationToken cancellationToken)
|
||||
{
|
||||
if (request == null)
|
||||
{
|
||||
throw new ArgumentNullException(nameof(request));
|
||||
}
|
||||
|
||||
if (string.IsNullOrWhiteSpace(this.AuthenticationScheme))
|
||||
{
|
||||
throw new KubernetesClientException("AuthenticationScheme cannot be null. Please set the AuthenticationScheme to Basic/Bearer");
|
||||
}
|
||||
|
||||
if (string.IsNullOrWhiteSpace(this.AuthenticationToken))
|
||||
{
|
||||
throw new KubernetesClientException("AuthenticationToken cannot be null. Please set the authentication token");
|
||||
}
|
||||
|
||||
request.Headers.Authorization = new AuthenticationHeaderValue(this.AuthenticationScheme, this.AuthenticationToken);
|
||||
|
||||
await base.ProcessHttpRequestAsync(request, cancellationToken).ConfigureAwait(false);
|
||||
}
|
||||
}
|
||||
}
|
||||
18
src/Utils.cs
18
src/Utils.cs
@@ -35,7 +35,23 @@ namespace k8s
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Generates pfx from client configuration
|
||||
/// Load pem encoded cert file
|
||||
/// </summary>
|
||||
/// <param name="file">Path to pem encoded cert file</param>
|
||||
/// <returns>x509 instance.</returns>
|
||||
public static X509Certificate2 LoadPemFileCert(string file)
|
||||
{
|
||||
var certdata = File.ReadAllText(file)
|
||||
.Replace("-----BEGIN CERTIFICATE-----", "")
|
||||
.Replace("-----END CERTIFICATE-----", "")
|
||||
.Replace("\r", "")
|
||||
.Replace("\n", "");
|
||||
|
||||
return new X509Certificate2(Convert.FromBase64String(certdata));
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Generates pfx from client configuration
|
||||
/// </summary>
|
||||
/// <param name="config">Kuberentes Client Configuration</param>
|
||||
/// <returns>Generated Pfx Path</returns>
|
||||
|
||||
@@ -1,60 +0,0 @@
|
||||
using System;
|
||||
using Xunit;
|
||||
using k8s;
|
||||
using System.IO;
|
||||
|
||||
namespace k8s.Tests
|
||||
{
|
||||
public class KubernetesClientCredentialsTests
|
||||
{
|
||||
/// <summary>
|
||||
/// Checks that a ArgumentNullException is thrown when trying to create a KubernetesClientCredentials with null token
|
||||
/// </summary>
|
||||
[Fact]
|
||||
public void TokenNull()
|
||||
{
|
||||
Assert.Throws<ArgumentNullException>(() => new KubernetesClientCredentials(null));
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Checks that a ArgumentNullException is thrown when trying to create a KubernetesClientCredentials with null username
|
||||
/// </summary>
|
||||
[Fact]
|
||||
public void UsernameNull()
|
||||
{
|
||||
Assert.Throws<ArgumentNullException>(() => new KubernetesClientCredentials(null,"password"));
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Checks that a ArgumentNullException is thrown when trying to create a KubernetesClientCredentials with null password
|
||||
/// </summary>
|
||||
[Fact]
|
||||
public void PasswordNull()
|
||||
{
|
||||
Assert.Throws<ArgumentNullException>(() => new KubernetesClientCredentials("username", null));
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Checks that the Token is set with no exceptions
|
||||
/// </summary>
|
||||
[Fact]
|
||||
public void ValidTokenIsSet()
|
||||
{
|
||||
var token = "mytoken";
|
||||
var credentials = new KubernetesClientCredentials(token);
|
||||
Assert.NotNull(credentials);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Checks that the Username and Password is set with no exceptions
|
||||
/// </summary>
|
||||
[Fact]
|
||||
public void ValidUserPasswordIsSet()
|
||||
{
|
||||
var username = "myuser";
|
||||
var password = "mypassword";
|
||||
var credentials = new KubernetesClientCredentials(username, password);
|
||||
Assert.NotNull(credentials);
|
||||
}
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user