blob: ec5b5cb160474821a87dd68d92a5dfcf4670daba [file] [log] [blame]
#!/usr/bin/env bash
# COPYRIGHT NOTICE STARTS HERE
#
# Copyright 2019 Samsung Electronics Co., Ltd.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
# COPYRIGHT NOTICE ENDS HERE
# Check all ports exposed by pods to internal network and look for
# open JDWP ports
#
# Dependencies:
# kubectl + config
# netcat
#
# Return value: Number of discovered JDWP ports
# Output: List of pods and exposing JDWP interface
#
usage() {
cat <<EOF
Usage: $(basename $0) <k8s-namespace> [-l <white list file>]
-l: jdpw white list ports file
EOF
exit ${1:-0}
}
if [ "$#" -lt 1 ]; then
usage
exit 1
fi
K8S_NAMESPACE=$1
LOCAL_PORT=12543
FILTERED_PORTS_LIST=$(mktemp jdpw_ports_XXXXXX)
WL_RAW_FILE_PATH=$(mktemp raw_filtered_ports_XXXXXX)
manage_white_list() {
# init filtered port list file
if [ ! -f $WL_FILE_PATH ];then
echo "File not found"
usage
fi
grep -o '^[^#]*' $WL_FILE_PATH > $WL_RAW_FILE_PATH
}
### getopts
while :
do
case $2 in
-h|--help|help) usage;;
-l) WL_FILE_PATH=$3;manage_white_list;shift;;
-*) usage 1 ;;
*) break ;;
esac
done
list_pods() {
kubectl get po --namespace=$K8S_NAMESPACE | grep Running | awk '{print $1}' | grep -v NAME
}
do_jdwp_handshake() {
local ip="127.0.0.1"
local port=$1
local jdwp_challenge="JDWP-Handshake\n"
local jdwp_response="JDWP-Handshake"
# 10s timeout to avoid hangs when service doesn't answer at all
local response=`nc -w 10 $ip $port <<<$jdwp_challenge | tr '\0' '\n'`
local n_response_lines=`echo "$response" | wc -l`
if [[ "$n_response_lines" -le 1 ]] && [[ $response == *"$jdwp_response"* ]]; then
return 0
fi
return 1
}
# get open ports from procfs as netstat is not always available
get_open_ports_on_pod() {
local pod=$1
local open_ports_hex=`kubectl exec --namespace=$K8S_NAMESPACE $pod cat /proc/net/tcp 2>/dev/null| grep -v "local_address" | awk '{ print $2" "$4 }' | grep '0A$' | tr ":" " " | awk '{ print $2 }' | sort | uniq`
for hex_port in $open_ports_hex; do
echo $((16#$hex_port))
done
}
echo "------------------------------------------------------------------------"
# Display the waivers
if [ -s $XL_FILE_PATH ]; then
echo "-------------------- *** WARNING XFail List *** ------------------------"
cat $WL_FILE_PATH
echo "------------------------------------------------------------------------"
fi
N_PORTS=0
# go through all pods
for pod in `list_pods`; do
open_ports=`get_open_ports_on_pod $pod`
# if there is no open ports just go to next pod
if [ -z "$open_ports" ]; then
continue
fi
# let's setup a proxy and check every open port
for port in $open_ports; do
# run proxy
kubectl port-forward --namespace=$K8S_NAMESPACE $pod $LOCAL_PORT:$port &>/dev/null &
sleep 1
proxy_pid=$!
do_jdwp_handshake $LOCAL_PORT
if [ $? -eq 0 ]; then
echo $pod $port | tee $FILTERED_PORTS_LIST
((++N_PORTS))
fi
kill $proxy_pid 2>/dev/null
wait $proxy_pid 2>/dev/null
done
done
while IFS= read -r line; do
# for each line we test if it is in the white list with a regular expression
while IFS= read -r wl_line; do
wl_name=$(echo $wl_line | awk {'print $1'})
wl_port=$(echo $wl_line | awk {'print $2'})
if grep -e $wl_name.*$wl_port <<< "$line";then
# Found in white list, exclude it
sed -i "/$line/d" $FILTERED_PORTS_LIST
fi
done < $WL_RAW_FILE_PATH
done < $FILTERED_PORTS_LIST
N_FILTERED_PORTS_LIST=$(cat $FILTERED_PORTS_LIST |wc -l)
echo "------------------------------------"
echo "Nb error pod(s): $N_FILTERED_PORTS_LIST"
cat $FILTERED_PORTS_LIST
exit $N_FILTERED_PORTS_LIST