mirror of
https://github.com/tailscale/tailscale.git
synced 2025-04-03 06:45:49 +00:00

Also capitalises the start of all ShortHelp, allows subcommands to be hidden with a "HIDDEN: " prefix in their ShortHelp, and adds a TS_DUMP_HELP envknob to look at all --help messages together. Fixes #11664 Signed-off-by: Paul Scott <paul@tailscale.com>
202 lines
5.4 KiB
Go
202 lines
5.4 KiB
Go
// Copyright (c) Tailscale Inc & AUTHORS
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
|
//go:build !ts_omit_kube
|
|
|
|
package cli
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"flag"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"slices"
|
|
"strings"
|
|
|
|
"github.com/peterbourgon/ff/v3/ffcli"
|
|
"k8s.io/client-go/util/homedir"
|
|
"sigs.k8s.io/yaml"
|
|
"tailscale.com/version"
|
|
)
|
|
|
|
func init() {
|
|
configureCmd.Subcommands = append(configureCmd.Subcommands, configureKubeconfigCmd)
|
|
}
|
|
|
|
var configureKubeconfigCmd = &ffcli.Command{
|
|
Name: "kubeconfig",
|
|
ShortHelp: "[ALPHA] Connect to a Kubernetes cluster using a Tailscale Auth Proxy",
|
|
ShortUsage: "tailscale configure kubeconfig <hostname-or-fqdn>",
|
|
LongHelp: strings.TrimSpace(`
|
|
Run this command to configure kubectl to connect to a Kubernetes cluster over Tailscale.
|
|
|
|
The hostname argument should be set to the Tailscale hostname of the peer running as an auth proxy in the cluster.
|
|
|
|
See: https://tailscale.com/s/k8s-auth-proxy
|
|
`),
|
|
FlagSet: (func() *flag.FlagSet {
|
|
fs := newFlagSet("kubeconfig")
|
|
return fs
|
|
})(),
|
|
Exec: runConfigureKubeconfig,
|
|
}
|
|
|
|
// kubeconfigPath returns the path to the kubeconfig file for the current user.
|
|
func kubeconfigPath() (string, error) {
|
|
if kubeconfig := os.Getenv("KUBECONFIG"); kubeconfig != "" {
|
|
if version.IsSandboxedMacOS() {
|
|
return "", errors.New("$KUBECONFIG is incompatible with the App Store version")
|
|
}
|
|
var out string
|
|
for _, out = range filepath.SplitList(kubeconfig) {
|
|
if info, err := os.Stat(out); !os.IsNotExist(err) && !info.IsDir() {
|
|
break
|
|
}
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
var dir string
|
|
if version.IsSandboxedMacOS() {
|
|
// The HOME environment variable in macOS sandboxed apps is set to
|
|
// ~/Library/Containers/<app-id>/Data, but the kubeconfig file is
|
|
// located in ~/.kube/config. We rely on the "com.apple.security.temporary-exception.files.home-relative-path.read-write"
|
|
// entitlement to access the file.
|
|
containerHome := os.Getenv("HOME")
|
|
dir, _, _ = strings.Cut(containerHome, "/Library/Containers/")
|
|
} else {
|
|
dir = homedir.HomeDir()
|
|
}
|
|
return filepath.Join(dir, ".kube", "config"), nil
|
|
}
|
|
|
|
func runConfigureKubeconfig(ctx context.Context, args []string) error {
|
|
if len(args) != 1 {
|
|
return errors.New("unknown arguments")
|
|
}
|
|
hostOrFQDN := args[0]
|
|
|
|
st, err := localClient.Status(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if st.BackendState != "Running" {
|
|
return errors.New("Tailscale is not running")
|
|
}
|
|
targetFQDN, ok := nodeDNSNameFromArg(st, hostOrFQDN)
|
|
if !ok {
|
|
return fmt.Errorf("no peer found with hostname %q", hostOrFQDN)
|
|
}
|
|
targetFQDN = strings.TrimSuffix(targetFQDN, ".")
|
|
var kubeconfig string
|
|
if kubeconfig, err = kubeconfigPath(); err != nil {
|
|
return err
|
|
}
|
|
if err = setKubeconfigForPeer(targetFQDN, kubeconfig); err != nil {
|
|
return err
|
|
}
|
|
printf("kubeconfig configured for %q\n", hostOrFQDN)
|
|
return nil
|
|
}
|
|
|
|
// appendOrSetNamed finds a map with a "name" key matching name in dst, and
|
|
// replaces it with val. If no such map is found, val is appended to dst.
|
|
func appendOrSetNamed(dst []any, name string, val map[string]any) []any {
|
|
if got := slices.IndexFunc(dst, func(m any) bool {
|
|
if m, ok := m.(map[string]any); ok {
|
|
return m["name"] == name
|
|
}
|
|
return false
|
|
}); got != -1 {
|
|
dst[got] = val
|
|
} else {
|
|
dst = append(dst, val)
|
|
}
|
|
return dst
|
|
}
|
|
|
|
var errInvalidKubeconfig = errors.New("invalid kubeconfig")
|
|
|
|
func updateKubeconfig(cfgYaml []byte, fqdn string) ([]byte, error) {
|
|
var cfg map[string]any
|
|
if len(cfgYaml) > 0 {
|
|
if err := yaml.Unmarshal(cfgYaml, &cfg); err != nil {
|
|
return nil, errInvalidKubeconfig
|
|
}
|
|
}
|
|
if cfg == nil {
|
|
cfg = map[string]any{
|
|
"apiVersion": "v1",
|
|
"kind": "Config",
|
|
}
|
|
} else if cfg["apiVersion"] != "v1" || cfg["kind"] != "Config" {
|
|
return nil, errInvalidKubeconfig
|
|
}
|
|
|
|
var clusters []any
|
|
if cm, ok := cfg["clusters"]; ok {
|
|
clusters, _ = cm.([]any)
|
|
}
|
|
cfg["clusters"] = appendOrSetNamed(clusters, fqdn, map[string]any{
|
|
"name": fqdn,
|
|
"cluster": map[string]string{
|
|
"server": "https://" + fqdn,
|
|
},
|
|
})
|
|
|
|
var users []any
|
|
if um, ok := cfg["users"]; ok {
|
|
users, _ = um.([]any)
|
|
}
|
|
cfg["users"] = appendOrSetNamed(users, "tailscale-auth", map[string]any{
|
|
// We just need one of these, and can reuse it for all clusters.
|
|
"name": "tailscale-auth",
|
|
"user": map[string]string{
|
|
// We do not use the token, but if we do not set anything here
|
|
// kubectl will prompt for a username and password.
|
|
"token": "unused",
|
|
},
|
|
})
|
|
|
|
var contexts []any
|
|
if cm, ok := cfg["contexts"]; ok {
|
|
contexts, _ = cm.([]any)
|
|
}
|
|
cfg["contexts"] = appendOrSetNamed(contexts, fqdn, map[string]any{
|
|
"name": fqdn,
|
|
"context": map[string]string{
|
|
"cluster": fqdn,
|
|
"user": "tailscale-auth",
|
|
},
|
|
})
|
|
cfg["current-context"] = fqdn
|
|
return yaml.Marshal(cfg)
|
|
}
|
|
|
|
func setKubeconfigForPeer(fqdn, filePath string) error {
|
|
dir := filepath.Dir(filePath)
|
|
if _, err := os.Stat(dir); err != nil {
|
|
if !os.IsNotExist(err) {
|
|
return err
|
|
}
|
|
if err := os.Mkdir(dir, 0755); err != nil {
|
|
if version.IsSandboxedMacOS() && errors.Is(err, os.ErrPermission) {
|
|
// macOS sandboxing prevents us from creating the .kube directory
|
|
// in the home directory.
|
|
return errors.New("unable to create .kube directory in home directory, please create it manually (e.g. mkdir ~/.kube")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
b, err := os.ReadFile(filePath)
|
|
if err != nil && !os.IsNotExist(err) {
|
|
return fmt.Errorf("reading kubeconfig: %w", err)
|
|
}
|
|
b, err = updateKubeconfig(b, fqdn)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return os.WriteFile(filePath, b, 0600)
|
|
}
|