forked from Azure/AgentBaker
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathkube.go
More file actions
72 lines (59 loc) · 2.08 KB
/
kube.go
File metadata and controls
72 lines (59 loc) · 2.08 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
package e2e_test
import (
"context"
"fmt"
"k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/apimachinery/pkg/runtime/serializer"
"k8s.io/client-go/kubernetes"
"k8s.io/client-go/kubernetes/scheme"
"k8s.io/client-go/rest"
"k8s.io/client-go/tools/clientcmd"
"sigs.k8s.io/controller-runtime/pkg/client"
)
type kubeclient struct {
dynamic client.Client
typed kubernetes.Interface
rest *rest.Config
}
func newKubeclient(config *rest.Config) (*kubeclient, error) {
dynamic, err := client.New(config, client.Options{})
if err != nil {
return nil, fmt.Errorf("failed to create dynamic kubeclient: %w", err)
}
restClient, err := rest.RESTClientFor(config)
if err != nil {
return nil, fmt.Errorf("failed to create rest kube client: %w", err)
}
typed := kubernetes.New(restClient)
return &kubeclient{
dynamic: dynamic,
typed: typed,
rest: config,
}, nil
}
func getClusterKubeClient(ctx context.Context, cloud *azureClient, resourceGroupName, clusterName string) (*kubeclient, error) {
data, err := getClusterKubeconfigBytes(ctx, cloud, resourceGroupName, clusterName)
if err != nil {
return nil, fmt.Errorf("failed to get cluster kubeconfig bytes: %w", err)
}
restConfig, err := clientcmd.RESTConfigFromKubeConfig(data)
if err != nil {
return nil, fmt.Errorf("failed to convert kubeconfig bytes to rest config: %w", err)
}
restConfig.NegotiatedSerializer = serializer.WithoutConversionCodecFactory{CodecFactory: scheme.Codecs}
restConfig.APIPath = "/api"
restConfig.GroupVersion = &schema.GroupVersion{
Version: "v1",
}
return newKubeclient(restConfig)
}
func getClusterKubeconfigBytes(ctx context.Context, cloud *azureClient, resourceGroupName, clusterName string) ([]byte, error) {
credentialList, err := cloud.aksClient.ListClusterAdminCredentials(ctx, resourceGroupName, clusterName, nil)
if err != nil {
return nil, fmt.Errorf("failed to list cluster admin credentials: %w", err)
}
if len(credentialList.Kubeconfigs) < 1 {
return nil, fmt.Errorf("no kubeconfigs available for the managed cluster cluster")
}
return credentialList.Kubeconfigs[0].Value, nil
}