HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //snap/google-cloud-cli/394/lib/third_party/kubernetes/config/exec_provider.py
#!/usr/bin/env python

# Copyright 2018 The Kubernetes Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import json
import os
import subprocess
import sys

from .config_exception import ConfigException


class ExecProvider(object):
  """
    Implementation of the proposal for out-of-tree client
    authentication providers as described here --
    https://github.com/kubernetes/community/blob/master/contributors/design-proposals/auth/kubectl-exec-plugins.md

    Missing from implementation:

    * TLS cert support
    * caching
    """

  def __init__(self, exec_config):
    """
        exec_config must be of type ConfigNode because we depend on
        safe_get(self, key) to correctly handle optional exec provider
        config parameters.
        """
    for key in ['command', 'apiVersion']:
      if key not in exec_config:
        raise ConfigException('exec: malformed request. missing key \'%s\'' %
                              key)
    self.api_version = exec_config['apiVersion']
    self.args = [exec_config['command']]
    if exec_config.safe_get('args'):
      self.args.extend(exec_config['args'])
    self.env = os.environ.copy()
    if exec_config.safe_get('env'):
      additional_vars = {}
      for item in exec_config['env']:
        name = item['name']
        value = item['value']
        additional_vars[name] = value
      self.env.update(additional_vars)

  def run(self, previous_response=None):
    kubernetes_exec_info = {
        'apiVersion': self.api_version,
        'kind': 'ExecCredential',
        'spec': {
            'interactive': sys.stdout.isatty()
        }
    }
    if previous_response:
      kubernetes_exec_info['spec']['response'] = previous_response
    self.env['KUBERNETES_EXEC_INFO'] = json.dumps(kubernetes_exec_info)
    process = subprocess.Popen(
        self.args,
        stdout=subprocess.PIPE,
        stderr=subprocess.PIPE,
        env=self.env,
        universal_newlines=True)
    (stdout, stderr) = process.communicate()
    exit_code = process.wait()
    if exit_code != 0:
      msg = 'exec: process returned %d' % exit_code
      stderr = stderr.strip()
      if stderr:
        msg += '. %s' % stderr
      raise ConfigException(msg)
    try:
      data = json.loads(stdout)
    except ValueError as de:
      raise ConfigException('exec: failed to decode process output: %s' % de)
    for key in ('apiVersion', 'kind', 'status'):
      if key not in data:
        raise ConfigException('exec: malformed response. missing key \'%s\'' %
                              key)
    if data['apiVersion'] != self.api_version:
      raise ConfigException('exec: plugin api version %s does not match %s' %
                            (data['apiVersion'], self.api_version))
    return data['status']