cluster/tools/kartongips: init
This forks bitnami/kubecfg into kartongips. The rationale is that we
want to implement hscloud-specific functionality that wouldn't really be
upstreamable into kubecfg (like secret support, mulit-cluster support).
We forked off from github.com/q3k/kubecfg at commit b6817a94492c561ed61a44eeea2d92dcf2e6b8c0.
Change-Id: If5ba513905e0a86f971576fe7061a471c1d8b398
diff --git a/cluster/tools/kartongips/pkg/kubecfg/validate.go b/cluster/tools/kartongips/pkg/kubecfg/validate.go
new file mode 100644
index 0000000..88a1ace
--- /dev/null
+++ b/cluster/tools/kartongips/pkg/kubecfg/validate.go
@@ -0,0 +1,101 @@
+// Copyright 2017 The kubecfg authors
+//
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+
+package kubecfg
+
+import (
+ "fmt"
+ "io"
+ "strings"
+
+ log "github.com/sirupsen/logrus"
+ "k8s.io/apimachinery/pkg/api/errors"
+ "k8s.io/apimachinery/pkg/api/meta"
+ "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
+ "k8s.io/apimachinery/pkg/runtime/schema"
+ "k8s.io/apimachinery/pkg/util/sets"
+ "k8s.io/client-go/discovery"
+
+ "code.hackerspace.pl/hscloud/cluster/tools/kartongips/utils"
+)
+
+// ValidateCmd represents the validate subcommand
+type ValidateCmd struct {
+ Mapper meta.RESTMapper
+ Discovery discovery.DiscoveryInterface
+ IgnoreUnknown bool
+}
+
+func (c ValidateCmd) Run(apiObjects []*unstructured.Unstructured, out io.Writer) error {
+ knownGVKs := sets.NewString()
+ gvkExists := func(gvk schema.GroupVersionKind) bool {
+ if knownGVKs.Has(gvk.String()) {
+ return true
+ }
+ gv := gvk.GroupVersion()
+ rls, err := c.Discovery.ServerResourcesForGroupVersion(gv.String())
+ if err != nil {
+ if !errors.IsNotFound(err) {
+ log.Debugf("ServerResourcesForGroupVersion(%q) returned unexpected error %v", gv, err)
+ }
+ return false
+ }
+ for _, rl := range rls.APIResources {
+ knownGVKs.Insert(gv.WithKind(rl.Kind).String())
+ }
+ return knownGVKs.Has(gvk.String())
+ }
+
+ hasError := false
+
+ for _, obj := range apiObjects {
+ desc := fmt.Sprintf("%s %s", utils.ResourceNameFor(c.Mapper, obj), utils.FqName(obj))
+ log.Info("Validating ", desc)
+
+ gvk := obj.GroupVersionKind()
+
+ var allErrs []error
+
+ schema, err := utils.NewOpenAPISchemaFor(c.Discovery, gvk)
+ if err != nil {
+ isNotFound := errors.IsNotFound(err) ||
+ strings.Contains(err.Error(), "is not supported by the server")
+ if isNotFound && (c.IgnoreUnknown || gvkExists(gvk)) {
+ log.Infof(" No schema found for %s, skipping validation", gvk)
+ continue
+ }
+ allErrs = append(allErrs, fmt.Errorf("Unable to fetch schema: %v", err))
+ } else {
+ // Validate obj
+ for _, err := range schema.Validate(obj) {
+ allErrs = append(allErrs, err)
+ }
+ if obj.GetName() == "" {
+ allErrs = append(allErrs, fmt.Errorf("An Object does not have a name set"))
+ }
+ }
+
+ for _, err := range allErrs {
+ log.Errorf("Error in %s: %v", desc, err)
+ hasError = true
+ }
+ }
+
+ if hasError {
+ return fmt.Errorf("Validation failed")
+ }
+
+ return nil
+}