mirror of
https://github.com/lucky-sideburn/kubeinvaders.git
synced 2026-04-07 02:46:52 +00:00
164 lines
4.8 KiB
Lua
164 lines
4.8 KiB
Lua
local https = require "ssl.https"
|
|
local ltn12 = require "ltn12"
|
|
local json = require 'lunajson'
|
|
local redis = require "resty.redis"
|
|
|
|
local k8s_url = ""
|
|
local kube_host = os.getenv("KUBERNETES_SERVICE_HOST")
|
|
local kube_port = os.getenv("KUBERNETES_SERVICE_PORT_HTTPS")
|
|
local endpoint = os.getenv("ENDPOINT")
|
|
|
|
if kube_host and kube_host ~= "" then
|
|
local port_suffix = ""
|
|
if kube_port and kube_port ~= "" then
|
|
port_suffix = ":" .. kube_port
|
|
end
|
|
k8s_url = "https://" .. kube_host .. port_suffix
|
|
else
|
|
k8s_url = endpoint or ""
|
|
end
|
|
|
|
local disable_tls_env = string.lower(tostring(os.getenv("DISABLE_TLS") or "false"))
|
|
local disable_tls = disable_tls_env == "true" or disable_tls_env == "1" or disable_tls_env == "yes"
|
|
local arg = ngx.req.get_uri_args()
|
|
local req_headers = ngx.req.get_headers()
|
|
local target = arg['target'] or req_headers["x-k8s-target"] or req_headers["X-K8S-Target"]
|
|
local header_token = req_headers["x-k8s-token"] or req_headers["X-K8S-Token"]
|
|
local token = ""
|
|
if header_token and header_token ~= "" then
|
|
token = header_token
|
|
else
|
|
token = tostring(os.getenv("TOKEN") or "")
|
|
end
|
|
if token == "" then
|
|
local f = io.open("/var/run/secrets/kubernetes.io/serviceaccount/token", "r")
|
|
if f then
|
|
token = f:read("*a") or ""
|
|
token = token:gsub("%s+$", "")
|
|
f:close()
|
|
end
|
|
end
|
|
local ca_cert_b64 = req_headers["x-k8s-ca-cert-b64"] or req_headers["X-K8S-CA-CERT-B64"]
|
|
local ca_cert = nil
|
|
if ca_cert_b64 and ca_cert_b64 ~= "" then
|
|
ca_cert = ngx.decode_base64(ca_cert_b64)
|
|
end
|
|
|
|
if target and target ~= "" then
|
|
if not string.match(target, "^https?://") then
|
|
target = "https://" .. target
|
|
end
|
|
k8s_url = string.gsub(target, "/+$", "")
|
|
end
|
|
|
|
if k8s_url == "" then
|
|
ngx.status = 500
|
|
ngx.say("Missing Kubernetes endpoint configuration. Set KUBERNETES_SERVICE_HOST or ENDPOINT.")
|
|
ngx.exit(ngx.OK)
|
|
end
|
|
|
|
if not string.match(k8s_url, "^https?://") then
|
|
k8s_url = "https://" .. k8s_url
|
|
end
|
|
|
|
k8s_url = string.gsub(k8s_url, "/+$", "")
|
|
|
|
if token == "" then
|
|
ngx.status = 500
|
|
ngx.say("Missing Kubernetes API token configuration.")
|
|
ngx.exit(ngx.OK)
|
|
end
|
|
|
|
local url = k8s_url.. "/api/v1/nodes"
|
|
local decoded = nil
|
|
local nodes = {}
|
|
|
|
if ngx.var.request_method == "GET" and string.match(ngx.var.request_uri, "^.*/chaos[-]node.*$") then
|
|
local red = redis:new()
|
|
local okredis, errredis = red:connect("unix:/tmp/redis.sock")
|
|
|
|
if okredis then
|
|
ngx.log(ngx.INFO, "Connection to Redis is ok")
|
|
else
|
|
ngx.log(ngx.INFO, "Connection to Redis is not ok")
|
|
ngx.log(ngx.INFO, errredis)
|
|
end
|
|
-- Count the total of chaos jobs launched against nodes
|
|
local chaos_node_res, err = red:get("chaos_node_jobs_total")
|
|
|
|
if chaos_node_res == ngx.null then
|
|
ngx.say(err)
|
|
red:set("chaos_node_jobs_total", 0)
|
|
else
|
|
local incr = chaos_node_res + 1
|
|
local res, err = red:set("chaos_node_jobs_total",incr)
|
|
end
|
|
|
|
-- Count the total of chaos jobs launched against nodes per node
|
|
local node_name = arg['node_name']
|
|
local chaos_node_res, err = red:get("chaos_node_jobs_total_on_" .. node_name)
|
|
if chaos_node_res == ngx.null then
|
|
ngx.say(err)
|
|
red:set("chaos_node_jobs_total_on_" .. node_name, 1)
|
|
else
|
|
local incr = chaos_node_res + 1
|
|
local res, err = red:set("chaos_node_jobs_total_on_" .. node_name,incr)
|
|
end
|
|
end
|
|
|
|
ngx.header['Access-Control-Allow-Origin'] = '*'
|
|
ngx.header['Access-Control-Allow-Methods'] = 'GET, POST, OPTIONS'
|
|
ngx.header['Access-Control-Allow-Headers'] = 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range'
|
|
ngx.header['Access-Control-Expose-Headers'] = 'Content-Length,Content-Range';
|
|
|
|
ngx.log(ngx.INFO, "Requesting nodes using this url: " .. url)
|
|
|
|
local headers = {
|
|
["Accept"] = "application/json",
|
|
["Content-Type"] = "application/json",
|
|
["Authorization"] = "Bearer " .. token,
|
|
}
|
|
|
|
local resp = {}
|
|
|
|
local request_opts = {
|
|
url = url,
|
|
headers = headers,
|
|
method = "GET",
|
|
verify = disable_tls and "none" or "peer",
|
|
sink = ltn12.sink.table(resp)
|
|
}
|
|
|
|
if not disable_tls and ca_cert and ca_cert ~= "" then
|
|
local ca_file_path = "/tmp/kubeinv-custom-ca.crt"
|
|
local ca_file = io.open(ca_file_path, "w")
|
|
if ca_file then
|
|
ca_file:write(ca_cert)
|
|
ca_file:close()
|
|
request_opts.cafile = ca_file_path
|
|
end
|
|
end
|
|
|
|
local ok, statusCode, headers, statusText = https.request(request_opts)
|
|
|
|
ngx.log(ngx.INFO, "REQUEST LOGS...")
|
|
ngx.log(ngx.INFO, ok)
|
|
ngx.log(ngx.INFO, statusCode)
|
|
ngx.log(ngx.INFO, statusText)
|
|
|
|
nodes["items"] = {}
|
|
for k,v in ipairs(resp) do
|
|
ngx.log(ngx.INFO, k)
|
|
decoded = json.decode(v)
|
|
if decoded["kind"] == "NodeList" then
|
|
for k2,v2 in ipairs(decoded["items"]) do
|
|
-- TODO: masters should be included?
|
|
-- if not v2["metadata"]["labels"]["node-role.kubernetes.io/master"] then
|
|
ngx.log(ngx.INFO, "found node " .. v2["metadata"]["name"])
|
|
table.insert(nodes["items"], { name = v2["metadata"]["name"], status = "ready" })
|
|
--end
|
|
end
|
|
end
|
|
end
|
|
ngx.say(json.encode(nodes))
|