linkerd2/cli/cmd/check.go

292 lines
9.8 KiB
Go

package cmd
import (
"bytes"
"context"
"errors"
"fmt"
"io"
"os"
"strings"
"time"
charts "github.com/linkerd/linkerd2/pkg/charts/linkerd2"
pkgcmd "github.com/linkerd/linkerd2/pkg/cmd"
"github.com/linkerd/linkerd2/pkg/healthcheck"
"github.com/linkerd/linkerd2/pkg/k8s"
"github.com/linkerd/linkerd2/pkg/version"
"github.com/spf13/cobra"
"github.com/spf13/pflag"
valuespkg "helm.sh/helm/v3/pkg/cli/values"
)
type checkOptions struct {
versionOverride string
preInstallOnly bool
crdsOnly bool
dataPlaneOnly bool
wait time.Duration
namespace string
cniEnabled bool
output string
cliVersionOverride string
}
func newCheckOptions() *checkOptions {
return &checkOptions{
versionOverride: "",
preInstallOnly: false,
crdsOnly: false,
dataPlaneOnly: false,
wait: 300 * time.Second,
namespace: "",
cniEnabled: false,
output: tableOutput,
cliVersionOverride: "",
}
}
// nonConfigFlagSet specifies flags not allowed with `linkerd check config`
func (options *checkOptions) nonConfigFlagSet() *pflag.FlagSet {
flags := pflag.NewFlagSet("non-config-check", pflag.ExitOnError)
flags.BoolVar(&options.cniEnabled, "linkerd-cni-enabled", options.cniEnabled, "When running pre-installation checks (--pre), assume the linkerd-cni plugin is already installed, and a NET_ADMIN check is not needed")
flags.StringVarP(&options.namespace, "namespace", "n", options.namespace, "Namespace to use for --proxy checks (default: all namespaces)")
flags.BoolVar(&options.preInstallOnly, "pre", options.preInstallOnly, "Only run pre-installation checks, to determine if the control plane can be installed")
flags.BoolVar(&options.crdsOnly, "crds", options.crdsOnly, "Only run checks which determine if the Linkerd CRDs have been installed")
flags.BoolVar(&options.dataPlaneOnly, "proxy", options.dataPlaneOnly, "Only run data-plane checks, to determine if the data plane is healthy")
return flags
}
// checkFlagSet specifies flags allowed with and without `config`
func (options *checkOptions) checkFlagSet() *pflag.FlagSet {
flags := pflag.NewFlagSet("check", pflag.ExitOnError)
flags.StringVar(&options.versionOverride, "expected-version", options.versionOverride, "Overrides the version used when checking if Linkerd is running the latest version (mostly for testing)")
flags.StringVar(&options.cliVersionOverride, "cli-version-override", "", "Used to override the version of the cli (mostly for testing)")
flags.StringVarP(&options.output, "output", "o", options.output, "Output format. One of: basic, json, short")
flags.DurationVar(&options.wait, "wait", options.wait, "Maximum allowed time for all tests to pass")
return flags
}
func (options *checkOptions) validate() error {
if options.preInstallOnly && options.dataPlaneOnly {
return errors.New("--pre and --proxy flags are mutually exclusive")
}
if options.preInstallOnly && options.crdsOnly {
return errors.New("--pre and --crds flags are mutually exclusive")
}
if !options.preInstallOnly && options.cniEnabled {
return errors.New("--linkerd-cni-enabled can only be used with --pre")
}
if options.output != tableOutput && options.output != jsonOutput && options.output != shortOutput {
return fmt.Errorf("Invalid output type '%s'. Supported output types are: %s, %s, %s", options.output, jsonOutput, tableOutput, shortOutput)
}
return nil
}
func newCmdCheck() *cobra.Command {
options := newCheckOptions()
checkFlags := options.checkFlagSet()
nonConfigFlags := options.nonConfigFlagSet()
cmd := &cobra.Command{
Use: "check [flags]",
Args: cobra.NoArgs,
Short: "Check the Linkerd installation for potential problems",
Long: `Check the Linkerd installation for potential problems.
The check command will perform a series of checks to validate that the linkerd
CLI and control plane are configured correctly. If the command encounters a
failure it will print additional information about the failure and exit with a
non-zero exit code.`,
Example: ` # Check that the Linkerd control plane is up and running
linkerd check
# Check that the Linkerd control plane can be installed in the "test" namespace
linkerd check --pre --linkerd-namespace test
# Check that the Linkerd data plane proxies in the "app" namespace are up and running
linkerd check --proxy --namespace app`,
RunE: func(cmd *cobra.Command, args []string) error {
return configureAndRunChecks(cmd, stdout, stderr, options)
},
}
cmd.PersistentFlags().AddFlagSet(checkFlags)
cmd.Flags().AddFlagSet(nonConfigFlags)
pkgcmd.ConfigureNamespaceFlagCompletion(cmd, []string{"namespace"},
kubeconfigPath, impersonate, impersonateGroup, kubeContext)
return cmd
}
func configureAndRunChecks(cmd *cobra.Command, wout io.Writer, werr io.Writer, options *checkOptions) error {
err := options.validate()
if err != nil {
return fmt.Errorf("Validation error when executing check command: %w", err)
}
if options.cliVersionOverride != "" {
version.Version = options.cliVersionOverride
}
checks := []healthcheck.CategoryID{
healthcheck.KubernetesAPIChecks,
healthcheck.KubernetesVersionChecks,
healthcheck.LinkerdVersionChecks,
}
crdManifest := bytes.Buffer{}
err = renderCRDs(&crdManifest, valuespkg.Options{})
if err != nil {
return err
}
var installManifest string
var values *charts.Values
if options.preInstallOnly {
checks = append(checks, healthcheck.LinkerdPreInstallChecks)
if options.cniEnabled {
checks = append(checks, healthcheck.LinkerdCNIPluginChecks)
}
values, installManifest, err = renderInstallManifest(cmd.Context())
if err != nil {
fmt.Fprintf(os.Stderr, "Error rendering install manifest: %s\n", err)
os.Exit(1)
}
} else if options.crdsOnly {
checks = append(checks, healthcheck.LinkerdCRDChecks)
} else {
checks = append(checks, healthcheck.LinkerdConfigChecks)
checks = append(checks, healthcheck.LinkerdControlPlaneExistenceChecks)
checks = append(checks, healthcheck.LinkerdIdentity)
checks = append(checks, healthcheck.LinkerdWebhooksAndAPISvcTLS)
checks = append(checks, healthcheck.LinkerdControlPlaneProxyChecks)
if options.dataPlaneOnly {
checks = append(checks, healthcheck.LinkerdDataPlaneChecks)
checks = append(checks, healthcheck.LinkerdIdentityDataPlane)
checks = append(checks, healthcheck.LinkerdOpaquePortsDefinitionChecks)
} else {
checks = append(checks, healthcheck.LinkerdControlPlaneVersionChecks)
}
checks = append(checks, healthcheck.LinkerdCNIPluginChecks)
checks = append(checks, healthcheck.LinkerdHAChecks)
}
hc := healthcheck.NewHealthChecker(checks, &healthcheck.Options{
IsMainCheckCommand: true,
ControlPlaneNamespace: controlPlaneNamespace,
CNINamespace: cniNamespace,
DataPlaneNamespace: options.namespace,
KubeConfig: kubeconfigPath,
KubeContext: kubeContext,
Impersonate: impersonate,
ImpersonateGroup: impersonateGroup,
APIAddr: apiAddr,
VersionOverride: options.versionOverride,
RetryDeadline: time.Now().Add(options.wait),
CNIEnabled: options.cniEnabled,
InstallManifest: installManifest,
CRDManifest: crdManifest.String(),
ChartValues: values,
})
if options.output == tableOutput {
healthcheck.PrintChecksHeader(wout, healthcheck.CoreHeader)
}
success, warning := healthcheck.RunChecks(wout, werr, hc, options.output)
if !options.preInstallOnly && !options.crdsOnly {
extensionSuccess, extensionWarning, err := runExtensionChecks(cmd, wout, werr, options)
if err != nil {
fmt.Fprintf(werr, "Failed to run extensions checks: %s\n", err)
os.Exit(1)
}
success = success && extensionSuccess
warning = warning || extensionWarning
}
healthcheck.PrintChecksResult(wout, options.output, success, warning)
if !success {
os.Exit(1)
}
return nil
}
func runExtensionChecks(cmd *cobra.Command, wout io.Writer, werr io.Writer, opts *checkOptions) (bool, bool, error) {
kubeAPI, err := k8s.NewAPI(kubeconfigPath, kubeContext, impersonate, impersonateGroup, 0)
if err != nil {
return false, false, err
}
namespaces, err := kubeAPI.GetAllNamespacesWithExtensionLabel(cmd.Context())
if err != nil {
return false, false, err
}
success := true
// no extensions to check
if len(namespaces) == 0 {
return success, false, nil
}
nsLabels := make([]string, len(namespaces))
for i, ns := range namespaces {
nsLabels[i] = ns.Labels[k8s.LinkerdExtensionLabel]
}
extensionSuccess, extensionWarning := healthcheck.RunExtensionsChecks(wout, werr, nsLabels, getExtensionCheckFlags(cmd.Flags()), opts.output)
return extensionSuccess, extensionWarning, nil
}
func getExtensionCheckFlags(lf *pflag.FlagSet) []string {
extensionFlags := []string{
"api-addr", "context", "as", "as-group", "kubeconfig", "linkerd-namespace", "verbose",
"namespace", "proxy", "wait",
}
cmdLineFlags := []string{}
for _, flag := range extensionFlags {
f := lf.Lookup(flag)
if f != nil {
val := f.Value.String()
if val != "" {
cmdLineFlags = append(cmdLineFlags, fmt.Sprintf("--%s=%s", f.Name, val))
}
}
}
cmdLineFlags = append(cmdLineFlags, "--output=json")
return cmdLineFlags
}
func renderInstallManifest(ctx context.Context) (*charts.Values, string, error) {
// Create the default values.
k8sAPI, err := k8s.NewAPI(kubeconfigPath, kubeContext, impersonate, impersonateGroup, 30*time.Second)
if err != nil {
return nil, "", err
}
values, err := charts.NewValues()
if err != nil {
return nil, "", err
}
err = initializeIssuerCredentials(ctx, k8sAPI, values)
if err != nil {
return nil, "", err
}
// Use empty valuesOverrides because there are no option values to merge.
var b strings.Builder
err = renderControlPlane(&b, values, map[string]interface{}{})
if err != nil {
return nil, "", err
}
return values, b.String(), nil
}