Teststand
Some checks failed
Deploy KubeViz / deploy (push) Has been cancelled

This commit is contained in:
2026-03-01 07:40:49 +01:00
commit 1a0bbe9dfd
58 changed files with 7756 additions and 0 deletions

5
.dockerignore Normal file
View File

@@ -0,0 +1,5 @@
.git
.gocache
.gomodcache
server
README.md

View File

@@ -0,0 +1,24 @@
name: Deploy KubeViz
on:
push:
branches:
- main
workflow_dispatch:
jobs:
deploy:
runs-on: [self-hosted, linux]
env:
IMAGE_REPO: localhost/kubeviz
IMAGE_TAG: prod
SERVICE_NAME: kubeviz.service
steps:
- name: Checkout
uses: actions/checkout@v4
- name: Build and deploy via Podman + Quadlet service
run: |
chmod +x scripts/deploy-with-podman.sh
scripts/deploy-with-podman.sh

4
.gitignore vendored Normal file
View File

@@ -0,0 +1,4 @@
.gocache/
.gomodcache/
server
.DS_Store

28
Dockerfile Normal file
View File

@@ -0,0 +1,28 @@
FROM dhi.io/golang:1.26-dev AS builder
ARG HELM_VERSION=v3.16.4
ARG TARGETOS=linux
ARG TARGETARCH=amd64
WORKDIR /src
COPY go.mod .
COPY . .
RUN --mount=type=cache,target=/root/.cache/go-build \
CGO_ENABLED=0 GOOS=${TARGETOS} GOARCH=${TARGETARCH} go build -o /out/kubeviz ./cmd/server
FROM alpine:3.20 AS helm
ARG HELM_VERSION=v3.16.4
ARG TARGETARCH=amd64
RUN apk add --no-cache ca-certificates wget tar
RUN wget -qO /tmp/helm.tgz "https://get.helm.sh/helm-${HELM_VERSION}-linux-${TARGETARCH}.tar.gz"
RUN set -eux; \
tar -xzf /tmp/helm.tgz -C /tmp; \
cp /tmp/linux-${TARGETARCH}/helm /out-helm; \
chmod +x /out-helm; \
rm -rf /tmp/helm.tgz /tmp/linux-${TARGETARCH}
FROM dhi.io/golang:1.26
WORKDIR /app
COPY --from=builder /out/kubeviz /app/kubeviz
COPY --from=helm /out-helm /usr/local/bin/helm
USER 65532:65532
EXPOSE 8080
ENTRYPOINT ["/app/kubeviz"]

125
README.md Normal file
View File

@@ -0,0 +1,125 @@
# KubeViz
No-Node Kubernetes manifest visualizer built with Go + server-rendered HTML (HTMX + Alpine.js).
## Features
- Upload one or more Kubernetes manifest files, or paste YAML/JSON text
- Import manifests directly from a Git repository path
- Render Helm charts directly from Git repositories (`helm template`) and visualize output
- Parse multi-document manifests and `List.items`
- Visual graph with resource relationships and details panel
- Grouping/collapsing by namespace or kind
- Security and validation checks (privileged containers, missing limits/requests, unresolved refs, selector mismatch, duplicates)
- Configurable checks in UI (enable/disable individual rules)
- Manifest diff between base and target states
- Supported first-class resources:
- Deployment, StatefulSet, DaemonSet
- Service, Ingress
- ConfigMap, Secret
- PersistentVolumeClaim
- HorizontalPodAutoscaler
- Generic CRD/custom resource nodes
- Secret redaction (never exposes decoded secret values)
- Session-scoped in-memory dataset storage (no DB)
- SVG and PNG graph export endpoints
## Run locally
```bash
go run ./cmd/server
```
Open [http://localhost:8080](http://localhost:8080).
## Run locally with Docker
Build and run directly:
```bash
docker build -t kubeviz:local .
docker run --rm -p 8080:8080 \
-e ADDR=:8080 \
-e SESSION_TTL=30m \
-e MAX_UPLOAD_SIZE=5242880 \
-e COOKIE_SECURE=false \
-e LOG_LEVEL=info \
kubeviz:local
```
Optional Helm version override during build:
```bash
docker build --build-arg HELM_VERSION=v3.16.4 -t kubeviz:local .
```
Or with Compose:
```bash
docker compose up --build
```
Then open [http://localhost:8080](http://localhost:8080).
## Environment variables
- `ADDR` (default `:8080`)
- `SESSION_TTL` (default `30m`)
- `MAX_UPLOAD_SIZE` (bytes, default `5242880`)
- `COOKIE_SECURE` (`true`/`false`, default `true`)
- `GIT_ALLOWED_HOSTS` (CSV allowlist, default `github.com,gitlab.com,bitbucket.org`)
- `LOG_LEVEL` (default `info`)
## API endpoints
- `POST /api/manifests/parse`
- `POST /api/git/import`
- `POST /api/helm/render`
- `GET /api/graph`
- `POST /api/diff`
- `GET /api/resources/{id}`
- `GET /api/export/svg`
- `GET /api/export/png`
- `POST /api/session/clear`
## Test
```bash
GOCACHE=$(pwd)/.gocache go test ./...
```
## Deploy to Kubernetes
Manifests are in `deploy/k8s/`:
```bash
kubectl apply -f deploy/k8s/namespace.yaml
kubectl apply -f deploy/k8s/configmap.yaml
kubectl apply -f deploy/k8s/deployment.yaml
kubectl apply -f deploy/k8s/service.yaml
kubectl apply -f deploy/k8s/ingress.yaml
```
## Notes
- The built-in YAML parser is dependency-free and optimized for common Kubernetes manifest structures.
- v1 scope is visualization only (no apply/edit back to cluster).
- Container images use `dhi.io/golang:1.26` (builder and runtime) with a non-root runtime user.
- Runtime image includes `git` and `helm` for Git/Helm import endpoints.
## Deploy via Gitea (Podman + Quadlet on same VM)
- Workflow: `.gitea/workflows/deploy-kubeviz.yml`
- Script: `scripts/deploy-with-podman.sh`
Pipeline flow:
1. Build image locally on server with Podman
2. Tag as `localhost/kubeviz:prod`
3. Restart `kubeviz.service`
Use this in your Quadlet:
```ini
Image=localhost/kubeviz:prod
Pull=never
```

12
deploy/k8s/configmap.yaml Normal file
View File

@@ -0,0 +1,12 @@
apiVersion: v1
kind: ConfigMap
metadata:
name: kubeviz-config
namespace: kubeviz
data:
ADDR: ":8080"
SESSION_TTL: "30m"
MAX_UPLOAD_SIZE: "5242880"
COOKIE_SECURE: "true"
LOG_LEVEL: "info"
GIT_ALLOWED_HOSTS: "github.com,gitlab.com,bitbucket.org"

View File

@@ -0,0 +1,60 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: kubeviz
namespace: kubeviz
spec:
replicas: 1
selector:
matchLabels:
app: kubeviz
template:
metadata:
labels:
app: kubeviz
spec:
automountServiceAccountToken: false
securityContext:
seccompProfile:
type: RuntimeDefault
containers:
- name: kubeviz
image: kubeviz:latest
imagePullPolicy: IfNotPresent
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
runAsNonRoot: true
capabilities:
drop: ["ALL"]
ports:
- containerPort: 8080
name: http
envFrom:
- configMapRef:
name: kubeviz-config
volumeMounts:
- name: tmp
mountPath: /tmp
resources:
requests:
cpu: 100m
memory: 128Mi
limits:
cpu: 500m
memory: 512Mi
readinessProbe:
httpGet:
path: /
port: http
initialDelaySeconds: 3
periodSeconds: 10
livenessProbe:
httpGet:
path: /
port: http
initialDelaySeconds: 10
periodSeconds: 20
volumes:
- name: tmp
emptyDir: {}

24
deploy/k8s/ingress.yaml Normal file
View File

@@ -0,0 +1,24 @@
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: kubeviz
namespace: kubeviz
annotations:
nginx.ingress.kubernetes.io/proxy-body-size: "10m"
nginx.ingress.kubernetes.io/ssl-redirect: "true"
spec:
tls:
- hosts:
- kubeviz.local
secretName: kubeviz-tls
rules:
- host: kubeviz.local
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: kubeviz
port:
number: 80

View File

@@ -0,0 +1,4 @@
apiVersion: v1
kind: Namespace
metadata:
name: kubeviz

13
deploy/k8s/service.yaml Normal file
View File

@@ -0,0 +1,13 @@
apiVersion: v1
kind: Service
metadata:
name: kubeviz
namespace: kubeviz
spec:
selector:
app: kubeviz
ports:
- port: 80
targetPort: http
protocol: TCP
name: http

102
deploy/quadlet/README.md Normal file
View File

@@ -0,0 +1,102 @@
# Quadlet Templates (AlmaLinux + Podman)
Files:
- `kubeviz.container`: system-level Quadlet unit template
- `kubeviz-traefik.container`: direct Traefik-label variant (shared Podman network)
- `traefik.network`: optional shared network Quadlet
- `kubeviz.env.example`: optional external environment file
## 1. Install template
```bash
sudo mkdir -p /etc/containers/systemd
sudo cp deploy/quadlet/kubeviz.container /etc/containers/systemd/kubeviz.container
```
Alternative (Traefik-label mode):
```bash
sudo cp deploy/quadlet/traefik.network /etc/containers/systemd/traefik.network
sudo cp deploy/quadlet/kubeviz-traefik.container /etc/containers/systemd/kubeviz.container
```
Optional env file:
```bash
sudo mkdir -p /etc/kubeviz
sudo cp deploy/quadlet/kubeviz.env.example /etc/kubeviz/kubeviz.env
# then uncomment EnvironmentFile in kubeviz.container
```
## 2. Set real image
Edit `/etc/containers/systemd/kubeviz.container` and replace:
- `ghcr.io/REPLACE_ME/kubeviz:v0.1.0`
For Gitea CI/CD without external registry, use a stable local tag:
```ini
Image=localhost/kubeviz:prod
Pull=never
```
## 3. Start service
```bash
sudo systemctl daemon-reload
sudo systemctl enable --now kubeviz.service
sudo systemctl status kubeviz.service
sudo journalctl -u kubeviz.service -f
```
## 4. Update rollout
```bash
sudo systemctl restart kubeviz.service
```
Because `Pull=always` is set, Podman will pull the latest image for the configured tag on restart.
## 5. Traefik integration
Route `kubeviz.valtrix.systems` to `http://127.0.0.1:18080`.
Keep `COOKIE_SECURE=true` in production.
If you use `kubeviz-traefik.container`, Traefik discovers KubeViz via labels and the shared `traefik` network instead of localhost port mapping.
## 6. Gitea pipeline (direct deploy on server)
Workflow template is included at:
- `.gitea/workflows/deploy-kubeviz.yml`
- `scripts/deploy-with-podman.sh`
The deploy script builds with Podman, tags `localhost/kubeviz:prod`, and restarts `kubeviz.service`.
Required sudo permissions for the Gitea runner user (example):
```text
gitea-runner ALL=(root) NOPASSWD:/usr/bin/podman build *,/usr/bin/podman tag *,/usr/bin/systemctl restart kubeviz.service,/usr/bin/systemctl is-active kubeviz.service
```
The user must be the one that executes the Gitea Actions runner service (often `gitea-runner`).
Check it with:
```bash
systemctl cat gitea-runner | grep -E '^User='
```
For BasicAuth labels, use htpasswd hashes (not plain passwords), for example:
```bash
htpasswd -nB smb
```
Then set the generated value in:
- `traefik.http.middlewares.kubeviz-auth.basicauth.users=smb:<hash>`
After updating sudoers:
```bash
sudo systemctl daemon-reload
sudo systemctl restart gitea-runner
```

View File

@@ -0,0 +1,47 @@
[Unit]
Description=KubeViz behind Traefik (Podman network)
After=network-online.target
Wants=network-online.target
[Container]
ContainerName=kubeviz
Image=localhost/kubeviz:prod
Pull=always
# Attach to the same user-defined network as Traefik.
Network=traefik.network
Environment=TZ=Europe/Berlin
Environment=ADDR=:8080
Environment=SESSION_TTL=30m
Environment=MAX_UPLOAD_SIZE=5242880
Environment=COOKIE_SECURE=true
Environment=LOG_LEVEL=info
Environment=GIT_ALLOWED_HOSTS=github.com,gitlab.com,gitea.smb-corp.de
NoNewPrivileges=true
ReadOnly=true
Tmpfs=/tmp:rw,size=128m,mode=1777
User=65532
Group=65532
# Traefik labels (Podman provider)
Label=traefik.enable=true
Label=traefik.http.routers.kubeviz.rule=Host(`kubeviz.valtrix.systems`)
Label=traefik.http.routers.kubeviz.entrypoints=websecure
Label=traefik.http.routers.kubeviz.tls=true
Label=traefik.http.routers.kubeviz.tls.certresolver=letsencrypt
Label=traefik.http.routers.kubeviz.middlewares=kubeviz-sec-headers,kubeviz-auth
Label=traefik.http.services.kubeviz.loadbalancer.server.port=8080
Label=traefik.docker.network=traefik
Label=traefik.http.middlewares.kubeviz-sec-headers.headers.customResponseHeaders.Content-Security-Policy=default-src 'self'; base-uri 'self'; object-src 'none'; frame-ancestors 'self'; img-src 'self' data:; style-src 'self' 'unsafe-inline'; script-src 'self'; script-src-elem 'self' 'unsafe-inline'; connect-src 'self' wss: https:; font-src 'self' data:; worker-src 'self' blob:;
Label=traefik.http.middlewares.kubeviz-auth.basicauth.users=smb:REPLACE_WITH_HTPASSWD_HASH
[Service]
Restart=always
RestartSec=3
TimeoutStartSec=90
TimeoutStopSec=20
[Install]
WantedBy=multi-user.target

View File

@@ -0,0 +1,45 @@
[Unit]
Description=KubeViz (Go Kubernetes manifest visualizer)
After=network-online.target
Wants=network-online.target
[Container]
ContainerName=kubeviz
Image=localhost/kubeviz:prod
Pull=always
# Bind only on localhost; Traefik handles public ingress.
PublishPort=127.0.0.1:18080:8080
# Runtime config
Environment=ADDR=:8080
Environment=SESSION_TTL=30m
Environment=MAX_UPLOAD_SIZE=5242880
Environment=COOKIE_SECURE=true
Environment=LOG_LEVEL=info
Environment=GIT_ALLOWED_HOSTS=github.com,gitlab.com,bitbucket.org
# Optional: keep env values in a separate file
# EnvironmentFile=/etc/kubeviz/kubeviz.env
# Security hardening
NoNewPrivileges=true
ReadOnly=true
Tmpfs=/tmp:rw,size=128m,mode=1777
User=65532
Group=65532
# Process / service behavior
HealthCmd=/app/kubeviz --help
HealthInterval=30s
HealthTimeout=5s
HealthRetries=3
[Service]
Restart=always
RestartSec=3
TimeoutStartSec=90
TimeoutStopSec=20
[Install]
WantedBy=multi-user.target

View File

@@ -0,0 +1,7 @@
# Copy to /etc/kubeviz/kubeviz.env and reference via EnvironmentFile in kubeviz.container
ADDR=:8080
SESSION_TTL=30m
MAX_UPLOAD_SIZE=5242880
COOKIE_SECURE=true
LOG_LEVEL=info
GIT_ALLOWED_HOSTS=github.com,gitlab.com,bitbucket.org

View File

@@ -0,0 +1,6 @@
[Unit]
Description=Shared network for Traefik-routed containers
[Network]
NetworkName=traefik
Driver=bridge

14
docker-compose.yml Normal file
View File

@@ -0,0 +1,14 @@
services:
kubeviz:
build:
context: .
dockerfile: Dockerfile
image: kubeviz:local
ports:
- "8080:8080"
environment:
ADDR: ":8080"
SESSION_TTL: "30m"
MAX_UPLOAD_SIZE: "5242880"
COOKIE_SECURE: "false"
LOG_LEVEL: "info"

3
go.mod Normal file
View File

@@ -0,0 +1,3 @@
module kubeviz
go 1.26.0

334
internal/analyze/analyze.go Normal file
View File

@@ -0,0 +1,334 @@
package analyze
import (
"encoding/json"
"fmt"
"sort"
"strings"
"kubeviz/internal/model"
"kubeviz/internal/parser"
)
const (
RulePrivilegedContainer = "privileged_container"
RuleRunAsNonRootFalse = "run_as_non_root_false"
RuleMissingReq = "missing_resource_requests"
RuleMissingLimits = "missing_resource_limits"
RuleIngressWildcardHost = "ingress_wildcard_host"
RuleUnresolvedReference = "unresolved_reference"
RuleServiceSelectorMatch = "selector_mismatch"
RuleDuplicateResourceID = "duplicate_resource_id"
)
var allRules = []string{
RulePrivilegedContainer,
RuleRunAsNonRootFalse,
RuleMissingReq,
RuleMissingLimits,
RuleIngressWildcardHost,
RuleUnresolvedReference,
RuleServiceSelectorMatch,
RuleDuplicateResourceID,
}
type Config struct {
enabled map[string]bool
}
func DefaultConfig() Config {
enabled := map[string]bool{}
for _, rule := range allRules {
enabled[rule] = true
}
return Config{enabled: enabled}
}
func ConfigFromEnabled(enabledRules map[string]bool) Config {
cfg := Config{enabled: map[string]bool{}}
for _, rule := range allRules {
cfg.enabled[rule] = enabledRules[rule]
}
return cfg
}
func (c Config) EnabledRules() []string {
out := make([]string, 0, len(allRules))
for _, rule := range allRules {
if c.enabled[rule] {
out = append(out, rule)
}
}
return out
}
func (c Config) isEnabled(rule string) bool {
return c.enabled[rule]
}
func AnalyzeDataset(ds *model.Dataset, cfg Config) ([]model.Finding, map[string]string) {
if ds == nil {
return nil, map[string]string{}
}
findings := make([]model.Finding, 0)
findings = append(findings, securityFindings(ds, cfg)...)
findings = append(findings, validationFindings(ds, cfg)...)
findings = append(findings, duplicateFindings(ds, cfg)...)
health := map[string]string{}
for id := range ds.Resources {
health[id] = "healthy"
}
for _, f := range findings {
if f.ResourceID == "" {
continue
}
if f.Severity == "error" || f.Severity == "warning" {
health[f.ResourceID] = "warning"
}
}
sort.Slice(findings, func(i, j int) bool {
if findings[i].Severity != findings[j].Severity {
return findings[i].Severity > findings[j].Severity
}
if findings[i].Category != findings[j].Category {
return findings[i].Category < findings[j].Category
}
return findings[i].Message < findings[j].Message
})
return findings, health
}
func securityFindings(ds *model.Dataset, cfg Config) []model.Finding {
out := make([]model.Finding, 0)
for _, r := range ds.Resources {
spec := extractPodSpec(r.Raw)
if spec != nil {
containers, ok := spec["containers"].([]any)
if ok {
for _, c := range containers {
cm, ok := c.(map[string]any)
if !ok {
continue
}
name, _ := cm["name"].(string)
securityCtx, _ := cm["securityContext"].(map[string]any)
if securityCtx != nil {
if cfg.isEnabled(RulePrivilegedContainer) {
if priv, ok := securityCtx["privileged"].(bool); ok && priv {
out = append(out, finding("security", RulePrivilegedContainer, "error", r.ID, fmt.Sprintf("container %q runs privileged", name)))
}
}
if cfg.isEnabled(RuleRunAsNonRootFalse) {
if runAsNonRoot, ok := securityCtx["runAsNonRoot"].(bool); ok && !runAsNonRoot {
out = append(out, finding("security", RuleRunAsNonRootFalse, "warning", r.ID, fmt.Sprintf("container %q has runAsNonRoot=false", name)))
}
}
}
resources, _ := cm["resources"].(map[string]any)
if resources == nil {
if cfg.isEnabled(RuleMissingReq) {
out = append(out, finding("security", RuleMissingReq, "warning", r.ID, fmt.Sprintf("container %q has no resources.requests", name)))
}
if cfg.isEnabled(RuleMissingLimits) {
out = append(out, finding("security", RuleMissingLimits, "warning", r.ID, fmt.Sprintf("container %q has no resources.limits", name)))
}
continue
}
if cfg.isEnabled(RuleMissingReq) {
if _, ok := resources["requests"].(map[string]any); !ok {
out = append(out, finding("security", RuleMissingReq, "warning", r.ID, fmt.Sprintf("container %q missing resource requests", name)))
}
}
if cfg.isEnabled(RuleMissingLimits) {
if _, ok := resources["limits"].(map[string]any); !ok {
out = append(out, finding("security", RuleMissingLimits, "warning", r.ID, fmt.Sprintf("container %q missing resource limits", name)))
}
}
}
}
}
if cfg.isEnabled(RuleIngressWildcardHost) && r.Kind == "Ingress" {
spec, _ := r.Raw["spec"].(map[string]any)
rules, _ := spec["rules"].([]any)
for _, rr := range rules {
rm, ok := rr.(map[string]any)
if !ok {
continue
}
host, _ := rm["host"].(string)
if host == "" || strings.Contains(host, "*") {
out = append(out, finding("security", RuleIngressWildcardHost, "warning", r.ID, "ingress has wildcard or empty host"))
break
}
}
}
}
return out
}
func validationFindings(ds *model.Dataset, cfg Config) []model.Finding {
out := make([]model.Finding, 0)
if cfg.isEnabled(RuleUnresolvedReference) {
for _, r := range ds.Resources {
for _, ref := range r.References {
target := resolveReferenceTarget(ds, ref)
if target == "" {
out = append(out, finding("validation", RuleUnresolvedReference, "error", r.ID, fmt.Sprintf("unresolved reference: %s %s", ref.Kind, ref.Name)))
}
}
}
}
if cfg.isEnabled(RuleServiceSelectorMatch) {
services := make([]*model.Resource, 0)
workloads := make([]*model.Resource, 0)
for _, r := range ds.Resources {
switch r.Kind {
case "Service":
services = append(services, r)
case "Deployment", "StatefulSet", "DaemonSet":
workloads = append(workloads, r)
}
}
for _, svc := range services {
if svc.WorkloadMeta == nil || len(svc.WorkloadMeta.ServiceSelectors) == 0 {
continue
}
matched := false
for _, wl := range workloads {
if wl.Namespace != svc.Namespace || wl.WorkloadMeta == nil {
continue
}
if selectorsMatch(svc.WorkloadMeta.ServiceSelectors, wl.WorkloadMeta.PodTemplateLabels) {
matched = true
break
}
}
if !matched {
out = append(out, finding("validation", RuleServiceSelectorMatch, "warning", svc.ID, "service selector does not match any workload in namespace"))
}
}
}
return out
}
func duplicateFindings(ds *model.Dataset, cfg Config) []model.Finding {
if !cfg.isEnabled(RuleDuplicateResourceID) {
return nil
}
out := make([]model.Finding, 0, len(ds.Duplicates))
for _, id := range ds.Duplicates {
out = append(out, finding("validation", RuleDuplicateResourceID, "warning", id, "duplicate resource id found in input; last document wins"))
}
return out
}
func DiffDatasets(base, target *model.Dataset) model.DiffResponse {
resp := model.DiffResponse{
Added: []model.DiffItem{},
Removed: []model.DiffItem{},
Changed: []model.DiffItem{},
}
if base == nil || target == nil {
return resp
}
for id, t := range target.Resources {
b, ok := base.Resources[id]
if !ok {
resp.Added = append(resp.Added, toDiffItem(t))
continue
}
if !rawEqual(b.Raw, t.Raw) {
resp.Changed = append(resp.Changed, toDiffItem(t))
}
}
for id, b := range base.Resources {
if _, ok := target.Resources[id]; !ok {
resp.Removed = append(resp.Removed, toDiffItem(b))
}
}
sort.Slice(resp.Added, func(i, j int) bool { return resp.Added[i].ID < resp.Added[j].ID })
sort.Slice(resp.Removed, func(i, j int) bool { return resp.Removed[i].ID < resp.Removed[j].ID })
sort.Slice(resp.Changed, func(i, j int) bool { return resp.Changed[i].ID < resp.Changed[j].ID })
return resp
}
func toDiffItem(r *model.Resource) model.DiffItem {
return model.DiffItem{ID: r.ID, Kind: r.Kind, Name: r.Name, Namespace: r.Namespace}
}
func rawEqual(a, b map[string]any) bool {
aj, err := json.Marshal(a)
if err != nil {
return false
}
bj, err := json.Marshal(b)
if err != nil {
return false
}
return string(aj) == string(bj)
}
func resolveReferenceTarget(dataset *model.Dataset, ref model.ResourceReference) string {
ns := ref.Namespace
if ns == "" {
ns = "default"
}
candidate := parser.ResourceID(ns, ref.Kind, ref.Name)
if _, ok := dataset.Resources[candidate]; ok {
return candidate
}
candidate = parser.ResourceID("", ref.Kind, ref.Name)
if _, ok := dataset.Resources[candidate]; ok {
return candidate
}
for _, r := range dataset.Resources {
if r.Kind == ref.Kind && r.Name == ref.Name {
return r.ID
}
}
return ""
}
func finding(category, rule, severity, resourceID, message string) model.Finding {
return model.Finding{
ID: category + ":" + rule + ":" + severity + ":" + resourceID + ":" + message,
Category: category,
Rule: rule,
Severity: severity,
ResourceID: resourceID,
Message: message,
}
}
func extractPodSpec(raw map[string]any) map[string]any {
spec, _ := raw["spec"].(map[string]any)
if spec == nil {
return nil
}
if template, ok := spec["template"].(map[string]any); ok {
if tplSpec, ok := template["spec"].(map[string]any); ok {
return tplSpec
}
}
return nil
}
func selectorsMatch(selector, labels map[string]string) bool {
for k, v := range selector {
if labels[k] != v {
return false
}
}
return true
}

96
internal/config/config.go Normal file
View File

@@ -0,0 +1,96 @@
package config
import (
"log"
"os"
"strconv"
"strings"
"time"
)
type Config struct {
Addr string
SessionTTL time.Duration
MaxUploadSize int64
CookieSecure bool
LogLevel string
GitAllowedHosts []string
}
func Load() Config {
cfg := Config{
Addr: envOrDefault("ADDR", ":8080"),
SessionTTL: durationEnvOrDefault("SESSION_TTL", 30*time.Minute),
MaxUploadSize: int64(intEnvOrDefault("MAX_UPLOAD_SIZE", 5*1024*1024)),
CookieSecure: boolEnvOrDefault("COOKIE_SECURE", true),
LogLevel: envOrDefault("LOG_LEVEL", "info"),
GitAllowedHosts: csvEnvOrDefault("GIT_ALLOWED_HOSTS", []string{
"github.com",
"gitlab.com",
"bitbucket.org",
}),
}
return cfg
}
func envOrDefault(key, fallback string) string {
if value := os.Getenv(key); value != "" {
return value
}
return fallback
}
func intEnvOrDefault(key string, fallback int) int {
if value := os.Getenv(key); value != "" {
parsed, err := strconv.Atoi(value)
if err != nil {
log.Printf("invalid integer for %s: %v", key, err)
return fallback
}
return parsed
}
return fallback
}
func boolEnvOrDefault(key string, fallback bool) bool {
if value := os.Getenv(key); value != "" {
parsed, err := strconv.ParseBool(value)
if err != nil {
log.Printf("invalid boolean for %s: %v", key, err)
return fallback
}
return parsed
}
return fallback
}
func durationEnvOrDefault(key string, fallback time.Duration) time.Duration {
if value := os.Getenv(key); value != "" {
parsed, err := time.ParseDuration(value)
if err != nil {
log.Printf("invalid duration for %s: %v", key, err)
return fallback
}
return parsed
}
return fallback
}
func csvEnvOrDefault(key string, fallback []string) []string {
raw := strings.TrimSpace(os.Getenv(key))
if raw == "" {
return fallback
}
var out []string
for _, part := range strings.Split(raw, ",") {
host := strings.ToLower(strings.TrimSpace(part))
if host == "" {
continue
}
out = append(out, host)
}
if len(out) == 0 {
return fallback
}
return out
}

514
internal/graph/graph.go Normal file
View File

@@ -0,0 +1,514 @@
package graph
import (
"fmt"
"sort"
"strings"
"kubeviz/internal/model"
"kubeviz/internal/parser"
)
type Filters struct {
Namespace string
Kind string
Query string
FocusID string
Relations map[string]bool
GroupBy string
CollapsedGroups map[string]bool
}
func BuildGraph(dataset *model.Dataset, filters Filters, healthHints map[string]string) model.GraphResponse {
if dataset == nil {
return model.GraphResponse{Stats: model.GraphStats{Kinds: map[string]int{}}}
}
nodes := make([]model.GraphNode, 0, len(dataset.Resources))
edges := make([]model.GraphEdge, 0)
kindStats := map[string]int{}
for _, r := range dataset.Resources {
health := "unknown"
if h, ok := healthHints[r.ID]; ok {
health = h
}
node := model.GraphNode{
ID: r.ID,
Kind: r.Kind,
Name: r.Name,
Namespace: r.Namespace,
Labels: r.Labels,
HealthHint: health,
IsSensitive: r.IsSensitive,
}
if !matchesResourceFilters(node, filters) {
continue
}
nodes = append(nodes, node)
kindStats[node.Kind]++
}
nodeSet := make(map[string]struct{}, len(nodes))
for _, n := range nodes {
nodeSet[n.ID] = struct{}{}
}
for _, r := range dataset.Resources {
if _, ok := nodeSet[r.ID]; !ok {
continue
}
for _, ref := range r.References {
target := resolveReferenceTarget(dataset, ref)
if target == "" {
continue
}
if _, ok := nodeSet[target]; !ok {
continue
}
edges = append(edges, model.GraphEdge{
Source: r.ID,
Target: target,
RelationType: ref.Relation,
Label: edgeLabelForReference(r, ref),
})
}
for _, owner := range r.OwnerRefs {
target := resolveOwner(dataset, r.Namespace, owner)
if target == "" {
continue
}
if _, ok := nodeSet[target]; !ok {
continue
}
edges = append(edges, model.GraphEdge{Source: r.ID, Target: target, RelationType: "owns"})
}
}
edges = append(edges, inferServiceEdges(dataset, nodeSet)...)
edges = dedupeEdges(edges)
edges = filterEdges(edges, filters)
groups := []model.GraphGroup{}
if filters.GroupBy == "namespace" || filters.GroupBy == "kind" {
nodes, edges, groups = applyGrouping(nodes, edges, filters)
kindStats = recomputeKindStats(nodes)
}
if filters.FocusID != "" {
nodes, edges = applyFocus(nodes, edges, filters.FocusID)
kindStats = recomputeKindStats(nodes)
}
sort.Slice(nodes, func(i, j int) bool { return nodes[i].ID < nodes[j].ID })
sort.Slice(edges, func(i, j int) bool {
if edges[i].Source != edges[j].Source {
return edges[i].Source < edges[j].Source
}
if edges[i].Target != edges[j].Target {
return edges[i].Target < edges[j].Target
}
if edges[i].RelationType != edges[j].RelationType {
return edges[i].RelationType < edges[j].RelationType
}
return edges[i].Label < edges[j].Label
})
return model.GraphResponse{
Nodes: nodes,
Edges: edges,
Groups: groups,
Stats: model.GraphStats{
TotalNodes: len(nodes),
TotalEdges: len(edges),
Kinds: kindStats,
},
}
}
func applyGrouping(nodes []model.GraphNode, edges []model.GraphEdge, filters Filters) ([]model.GraphNode, []model.GraphEdge, []model.GraphGroup) {
groupMembers := map[string][]model.GraphNode{}
for _, n := range nodes {
key := groupKey(n, filters.GroupBy)
groupMembers[key] = append(groupMembers[key], n)
}
groups := make([]model.GraphGroup, 0, len(groupMembers))
for key, members := range groupMembers {
groups = append(groups, model.GraphGroup{
Key: key,
Label: key,
Mode: filters.GroupBy,
Count: len(members),
Collapsed: filters.CollapsedGroups[key],
})
}
sort.Slice(groups, func(i, j int) bool { return groups[i].Key < groups[j].Key })
visibleNodes := make(map[string]model.GraphNode)
nodeToVisible := map[string]string{}
for key, members := range groupMembers {
collapsed := filters.CollapsedGroups[key]
if collapsed {
groupID := groupNodeID(filters.GroupBy, key)
health := "healthy"
sensitive := false
for _, m := range members {
if m.HealthHint == "warning" {
health = "warning"
}
if m.IsSensitive {
sensitive = true
}
nodeToVisible[m.ID] = groupID
}
visibleNodes[groupID] = model.GraphNode{
ID: groupID,
Kind: strings.Title(filters.GroupBy) + "Group",
Name: key,
Namespace: "",
HealthHint: health,
IsSensitive: sensitive,
IsGroup: true,
GroupBy: filters.GroupBy,
GroupKey: key,
MemberCount: len(members),
}
continue
}
for _, m := range members {
nodeToVisible[m.ID] = m.ID
visibleNodes[m.ID] = m
}
}
outNodes := make([]model.GraphNode, 0, len(visibleNodes))
for _, n := range visibleNodes {
outNodes = append(outNodes, n)
}
outEdges := make([]model.GraphEdge, 0, len(edges))
for _, e := range edges {
src := nodeToVisible[e.Source]
tgt := nodeToVisible[e.Target]
if src == "" || tgt == "" || src == tgt {
continue
}
outEdges = append(outEdges, model.GraphEdge{
Source: src,
Target: tgt,
RelationType: e.RelationType,
Label: e.Label,
})
}
outEdges = dedupeEdges(outEdges)
return outNodes, outEdges, groups
}
func groupKey(node model.GraphNode, mode string) string {
switch mode {
case "namespace":
if node.Namespace == "" {
return "(cluster-scoped)"
}
return node.Namespace
case "kind":
return node.Kind
default:
return ""
}
}
func groupNodeID(mode, key string) string {
return "group/" + mode + "/" + key
}
func resolveReferenceTarget(dataset *model.Dataset, ref model.ResourceReference) string {
ns := ref.Namespace
if ns == "" {
ns = "default"
}
candidate := parser.ResourceID(ns, ref.Kind, ref.Name)
if _, ok := dataset.Resources[candidate]; ok {
return candidate
}
candidate = parser.ResourceID("", ref.Kind, ref.Name)
if _, ok := dataset.Resources[candidate]; ok {
return candidate
}
matches := make([]string, 0)
for _, r := range dataset.Resources {
if r.Kind == ref.Kind && r.Name == ref.Name {
matches = append(matches, r.ID)
}
}
if len(matches) == 1 {
return matches[0]
}
return ""
}
func resolveOwner(dataset *model.Dataset, namespace string, owner model.OwnerReference) string {
candidate := parser.ResourceID(namespace, owner.Kind, owner.Name)
if _, ok := dataset.Resources[candidate]; ok {
return candidate
}
candidate = parser.ResourceID("", owner.Kind, owner.Name)
if _, ok := dataset.Resources[candidate]; ok {
return candidate
}
return ""
}
func inferServiceEdges(dataset *model.Dataset, nodeSet map[string]struct{}) []model.GraphEdge {
edges := []model.GraphEdge{}
services := []*model.Resource{}
workloads := []*model.Resource{}
for _, r := range dataset.Resources {
switch r.Kind {
case "Service":
services = append(services, r)
case "Deployment", "StatefulSet", "DaemonSet":
workloads = append(workloads, r)
}
}
for _, svc := range services {
if _, ok := nodeSet[svc.ID]; !ok {
continue
}
if svc.WorkloadMeta == nil || len(svc.WorkloadMeta.ServiceSelectors) == 0 {
continue
}
for _, wl := range workloads {
if _, ok := nodeSet[wl.ID]; !ok {
continue
}
if wl.WorkloadMeta == nil || len(wl.WorkloadMeta.PodTemplateLabels) == 0 {
continue
}
if svc.Namespace != wl.Namespace {
continue
}
if selectorsMatch(svc.WorkloadMeta.ServiceSelectors, wl.WorkloadMeta.PodTemplateLabels) {
edges = append(edges, model.GraphEdge{
Source: svc.ID,
Target: wl.ID,
RelationType: "selects",
Label: servicePortsLabel(svc),
})
}
}
}
return edges
}
func selectorsMatch(selector, labels map[string]string) bool {
for k, v := range selector {
if labels[k] != v {
return false
}
}
return true
}
func matchesResourceFilters(node model.GraphNode, filters Filters) bool {
if filters.Namespace != "" && node.Namespace != filters.Namespace {
return false
}
if filters.Kind != "" && !strings.EqualFold(node.Kind, filters.Kind) {
return false
}
if filters.Query != "" {
needle := strings.ToLower(filters.Query)
hay := strings.ToLower(node.ID + " " + node.Kind + " " + node.Name + " " + node.Namespace)
if !strings.Contains(hay, needle) {
return false
}
}
return true
}
func dedupeEdges(edges []model.GraphEdge) []model.GraphEdge {
seen := map[string]struct{}{}
out := make([]model.GraphEdge, 0, len(edges))
for _, edge := range edges {
key := edge.Source + "|" + edge.Target + "|" + edge.RelationType + "|" + edge.Label
if _, ok := seen[key]; ok {
continue
}
seen[key] = struct{}{}
out = append(out, edge)
}
return out
}
func filterEdges(edges []model.GraphEdge, filters Filters) []model.GraphEdge {
if len(filters.Relations) == 0 {
return edges
}
out := make([]model.GraphEdge, 0, len(edges))
for _, edge := range edges {
if filters.Relations[edge.RelationType] {
out = append(out, edge)
}
}
return out
}
func applyFocus(nodes []model.GraphNode, edges []model.GraphEdge, focusID string) ([]model.GraphNode, []model.GraphEdge) {
neighbor := map[string]struct{}{focusID: {}}
for _, e := range edges {
if e.Source == focusID {
neighbor[e.Target] = struct{}{}
}
if e.Target == focusID {
neighbor[e.Source] = struct{}{}
}
}
fNodes := make([]model.GraphNode, 0, len(neighbor))
for _, n := range nodes {
if _, ok := neighbor[n.ID]; ok {
fNodes = append(fNodes, n)
}
}
fEdges := make([]model.GraphEdge, 0, len(edges))
for _, e := range edges {
_, src := neighbor[e.Source]
_, dst := neighbor[e.Target]
if src && dst {
fEdges = append(fEdges, e)
}
}
return fNodes, fEdges
}
func recomputeKindStats(nodes []model.GraphNode) map[string]int {
out := map[string]int{}
for _, n := range nodes {
out[n.Kind]++
}
return out
}
func edgeLabelForReference(source *model.Resource, ref model.ResourceReference) string {
if source == nil {
return ""
}
switch source.Kind {
case "Ingress":
if ref.Relation != "routesTo" {
return ""
}
return ingressBackendPortLabel(source, ref.Name)
default:
return ""
}
}
func ingressBackendPortLabel(ingress *model.Resource, serviceName string) string {
spec, _ := ingress.Raw["spec"].(map[string]any)
if spec == nil {
return ""
}
if backend, ok := spec["defaultBackend"].(map[string]any); ok {
if name, label := ingressBackendServiceAndPort(backend); name == serviceName {
return label
}
}
rules, _ := spec["rules"].([]any)
for _, r := range rules {
rule, ok := r.(map[string]any)
if !ok {
continue
}
httpSpec, _ := rule["http"].(map[string]any)
paths, _ := httpSpec["paths"].([]any)
for _, p := range paths {
pathEntry, ok := p.(map[string]any)
if !ok {
continue
}
backend, _ := pathEntry["backend"].(map[string]any)
if name, label := ingressBackendServiceAndPort(backend); name == serviceName {
return label
}
}
}
return ""
}
func ingressBackendServiceAndPort(backend map[string]any) (string, string) {
service, _ := backend["service"].(map[string]any)
if service == nil {
return "", ""
}
name, _ := service["name"].(string)
portMap, _ := service["port"].(map[string]any)
if portMap == nil {
return name, ""
}
if number, ok := portMap["number"]; ok {
return name, fmt.Sprintf(":%v", number)
}
if pname, ok := portMap["name"].(string); ok && pname != "" {
return name, ":" + pname
}
return name, ""
}
func servicePortsLabel(service *model.Resource) string {
spec, _ := service.Raw["spec"].(map[string]any)
if spec == nil {
return ""
}
ports, _ := spec["ports"].([]any)
if len(ports) == 0 {
return ""
}
parts := make([]string, 0, len(ports))
for _, p := range ports {
port, ok := p.(map[string]any)
if !ok {
continue
}
protocol, _ := port["protocol"].(string)
if protocol == "" {
protocol = "TCP"
}
external, hasPort := port["port"]
if !hasPort {
continue
}
target, hasTarget := port["targetPort"]
if hasTarget {
parts = append(parts, fmt.Sprintf("%s %v->%v", protocol, external, target))
continue
}
parts = append(parts, fmt.Sprintf("%s %v", protocol, external))
}
switch len(parts) {
case 0:
return ""
case 1:
return parts[0]
default:
return parts[0] + " +" + fmt.Sprintf("%d", len(parts)-1)
}
}

View File

@@ -0,0 +1,86 @@
package graph
import (
"testing"
"time"
"kubeviz/internal/model"
)
func TestBuildGraphIncludesServiceSelectorEdge(t *testing.T) {
ds := &model.Dataset{
Resources: map[string]*model.Resource{
"demo/Service/web": {
ID: "demo/Service/web",
Kind: "Service",
Name: "web",
Namespace: "demo",
Raw: map[string]any{
"spec": map[string]any{
"ports": []any{
map[string]any{"port": 80, "targetPort": 8080, "protocol": "TCP"},
},
},
},
WorkloadMeta: &model.WorkloadMetadata{
ServiceSelectors: map[string]string{"app": "web"},
},
CreatedAt: time.Now(),
},
"demo/Deployment/web": {
ID: "demo/Deployment/web",
Kind: "Deployment",
Name: "web",
Namespace: "demo",
WorkloadMeta: &model.WorkloadMetadata{
PodTemplateLabels: map[string]string{"app": "web"},
},
CreatedAt: time.Now(),
},
},
}
resp := BuildGraph(ds, Filters{}, map[string]string{})
if resp.Stats.TotalNodes != 2 {
t.Fatalf("expected 2 nodes, got %d", resp.Stats.TotalNodes)
}
found := false
for _, edge := range resp.Edges {
if edge.Source == "demo/Service/web" && edge.Target == "demo/Deployment/web" && edge.RelationType == "selects" {
if edge.Label == "" {
t.Fatalf("expected selects edge label with port/protocol")
}
found = true
}
}
if !found {
t.Fatalf("expected service selector edge not found")
}
}
func TestBuildGraphGroupingByNamespace(t *testing.T) {
ds := &model.Dataset{
Resources: map[string]*model.Resource{
"demo/Service/web": {ID: "demo/Service/web", Kind: "Service", Name: "web", Namespace: "demo", CreatedAt: time.Now()},
"demo/Deployment/web": {ID: "demo/Deployment/web", Kind: "Deployment", Name: "web", Namespace: "demo", CreatedAt: time.Now()},
"other/Deployment/other": {ID: "other/Deployment/other", Kind: "Deployment", Name: "other", Namespace: "other", CreatedAt: time.Now()},
},
}
resp := BuildGraph(ds, Filters{
GroupBy: "namespace",
CollapsedGroups: map[string]bool{
"demo": true,
},
}, map[string]string{})
hasDemoGroup := false
for _, n := range resp.Nodes {
if n.IsGroup && n.GroupBy == "namespace" && n.GroupKey == "demo" {
hasDemoGroup = true
}
}
if !hasDemoGroup {
t.Fatalf("expected collapsed namespace group node")
}
}

View File

@@ -0,0 +1,9 @@
package httpserver
import "embed"
//go:embed ui/templates/*.html
var templateFS embed.FS
//go:embed ui/static/*
var staticFS embed.FS

View File

@@ -0,0 +1,217 @@
package httpserver
import (
"fmt"
"image"
"image/color"
"image/draw"
"image/png"
"math"
"net/http"
"sort"
"strings"
"kubeviz/internal/analyze"
"kubeviz/internal/graph"
"kubeviz/internal/model"
)
type point struct {
X float64
Y float64
}
func (s *Server) handleExportSVG(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodGet {
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
return
}
resp, ok := s.exportGraph(w, r)
if !ok {
return
}
svg := renderSVG(resp)
w.Header().Set("Content-Type", "image/svg+xml")
w.Header().Set("Content-Disposition", "inline; filename=graph.svg")
_, _ = w.Write([]byte(svg))
}
func (s *Server) handleExportPNG(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodGet {
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
return
}
resp, ok := s.exportGraph(w, r)
if !ok {
return
}
img := renderPNG(resp)
w.Header().Set("Content-Type", "image/png")
w.Header().Set("Content-Disposition", "inline; filename=graph.png")
_ = png.Encode(w, img)
}
func (s *Server) exportGraph(w http.ResponseWriter, r *http.Request) (model.GraphResponse, bool) {
sid, err := s.sessionID(w, r)
if err != nil {
http.Error(w, "session error", http.StatusInternalServerError)
return model.GraphResponse{}, false
}
dataset := s.store.GetDataset(sid)
if dataset == nil {
http.Error(w, "no manifests uploaded", http.StatusNotFound)
return model.GraphResponse{}, false
}
filters := graph.Filters{
Namespace: r.URL.Query().Get("namespace"),
Kind: r.URL.Query().Get("kind"),
Query: r.URL.Query().Get("q"),
FocusID: r.URL.Query().Get("focus"),
Relations: parseRelations(r.URL.Query().Get("relations")),
GroupBy: r.URL.Query().Get("groupBy"),
CollapsedGroups: parseCSVSet(r.URL.Query().Get("collapsed")),
}
checkCfg := analyze.DefaultConfig()
if raw := r.URL.Query().Get("checkRules"); raw != "" {
checkCfg = analyze.ConfigFromEnabled(parseCSVSet(raw))
}
_, healthHints := analyze.AnalyzeDataset(dataset, checkCfg)
return graph.BuildGraph(dataset, filters, healthHints), true
}
func layout(nodes []model.GraphNode) map[string]point {
out := map[string]point{}
sorted := make([]model.GraphNode, len(nodes))
copy(sorted, nodes)
sort.Slice(sorted, func(i, j int) bool { return sorted[i].ID < sorted[j].ID })
n := len(sorted)
if n == 0 {
return out
}
centerX, centerY := 640.0, 360.0
radius := 220.0
if n > 40 {
radius = 280
}
for i, node := range sorted {
angle := 2 * math.Pi * float64(i) / float64(n)
out[node.ID] = point{
X: centerX + radius*math.Cos(angle),
Y: centerY + radius*math.Sin(angle),
}
}
return out
}
func renderSVG(resp model.GraphResponse) string {
coords := layout(resp.Nodes)
var b strings.Builder
b.WriteString(`<svg xmlns="http://www.w3.org/2000/svg" width="1280" height="720" viewBox="0 0 1280 720">`)
b.WriteString(`<rect width="100%" height="100%" fill="#f5f7fb"/>`)
for _, edge := range resp.Edges {
s, sok := coords[edge.Source]
t, tok := coords[edge.Target]
if !sok || !tok {
continue
}
b.WriteString(fmt.Sprintf(`<line x1="%.1f" y1="%.1f" x2="%.1f" y2="%.1f" stroke="#9ca3af" stroke-width="1.5"/>`, s.X, s.Y, t.X, t.Y))
}
for _, node := range resp.Nodes {
p := coords[node.ID]
fill := "#2563eb"
if node.IsSensitive {
fill = "#dc2626"
}
label := escapeXML(fmt.Sprintf("%s/%s", node.Kind, node.Name))
b.WriteString(fmt.Sprintf(`<circle cx="%.1f" cy="%.1f" r="20" fill="%s" opacity="0.9"/>`, p.X, p.Y, fill))
b.WriteString(fmt.Sprintf(`<text x="%.1f" y="%.1f" font-size="11" fill="#111827" text-anchor="middle">%s</text>`, p.X, p.Y+34, label))
}
b.WriteString(`</svg>`)
return b.String()
}
func renderPNG(resp model.GraphResponse) image.Image {
img := image.NewRGBA(image.Rect(0, 0, 1280, 720))
draw.Draw(img, img.Bounds(), &image.Uniform{C: color.RGBA{245, 247, 251, 255}}, image.Point{}, draw.Src)
coords := layout(resp.Nodes)
edgeColor := color.RGBA{156, 163, 175, 255}
for _, edge := range resp.Edges {
s, sok := coords[edge.Source]
t, tok := coords[edge.Target]
if !sok || !tok {
continue
}
drawLine(img, int(s.X), int(s.Y), int(t.X), int(t.Y), edgeColor)
}
for _, node := range resp.Nodes {
p := coords[node.ID]
fill := color.RGBA{37, 99, 235, 255}
if node.IsSensitive {
fill = color.RGBA{220, 38, 38, 255}
}
drawCircle(img, int(p.X), int(p.Y), 20, fill)
}
return img
}
func drawLine(img *image.RGBA, x0, y0, x1, y1 int, c color.Color) {
dx := abs(x1 - x0)
sx := -1
if x0 < x1 {
sx = 1
}
dy := -abs(y1 - y0)
sy := -1
if y0 < y1 {
sy = 1
}
err := dx + dy
for {
if image.Pt(x0, y0).In(img.Bounds()) {
img.Set(x0, y0, c)
}
if x0 == x1 && y0 == y1 {
break
}
e2 := 2 * err
if e2 >= dy {
err += dy
x0 += sx
}
if e2 <= dx {
err += dx
y0 += sy
}
}
}
func drawCircle(img *image.RGBA, cx, cy, r int, c color.Color) {
for y := -r; y <= r; y++ {
for x := -r; x <= r; x++ {
if x*x+y*y <= r*r {
px := cx + x
py := cy + y
if image.Pt(px, py).In(img.Bounds()) {
img.Set(px, py, c)
}
}
}
}
}
func abs(v int) int {
if v < 0 {
return -v
}
return v
}
func escapeXML(s string) string {
replacer := strings.NewReplacer("&", "&amp;", "<", "&lt;", ">", "&gt;", `"`, "&quot;")
return replacer.Replace(s)
}

View File

@@ -0,0 +1,783 @@
package httpserver
import (
"bytes"
"context"
"encoding/json"
"errors"
"fmt"
"io"
"io/fs"
"log"
"net/http"
"net/url"
"os"
"os/exec"
"path/filepath"
"slices"
"strings"
"time"
"kubeviz/internal/analyze"
"kubeviz/internal/graph"
"kubeviz/internal/model"
"kubeviz/internal/parser"
)
var manifestExts = []string{".yaml", ".yml", ".json"}
const (
maxValuesYAMLBytes = 256 * 1024
maxDiffFieldBytes = 2 * 1024 * 1024
maxManifestFiles = 2000
maxManifestBytes = 20 * 1024 * 1024
)
var defaultGitAllowedHosts = []string{"github.com", "gitlab.com", "bitbucket.org"}
type indexData struct {
Title string
Now string
}
func (s *Server) handleIndex(w http.ResponseWriter, r *http.Request) {
if r.URL.Path != "/" {
http.NotFound(w, r)
return
}
if _, err := s.sessionID(w, r); err != nil {
http.Error(w, "session initialization failed", http.StatusInternalServerError)
return
}
if err := s.templates.ExecuteTemplate(w, "index.html", indexData{Title: "KubeViz", Now: time.Now().Format(time.RFC3339)}); err != nil {
http.Error(w, "template render error", http.StatusInternalServerError)
}
}
func (s *Server) handleParseManifests(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodPost {
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
return
}
r.Body = http.MaxBytesReader(w, r.Body, s.cfg.MaxUploadSize)
sid, err := s.sessionID(w, r)
if err != nil {
http.Error(w, "session error", http.StatusInternalServerError)
return
}
var (
body []byte
dataset *model.Dataset
)
ct := r.Header.Get("Content-Type")
switch {
case strings.HasPrefix(ct, "multipart/form-data"):
if err := r.ParseMultipartForm(s.cfg.MaxUploadSize); err != nil {
http.Error(w, "invalid multipart form", http.StatusBadRequest)
return
}
dataset, err = parseMultipartManifestInput(r)
if err != nil {
http.Error(w, err.Error(), http.StatusBadRequest)
return
}
default:
var req struct {
Manifest string `json:"manifest"`
}
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
http.Error(w, "invalid request body", http.StatusBadRequest)
return
}
body = []byte(req.Manifest)
}
if dataset == nil {
if len(strings.TrimSpace(string(body))) == 0 {
http.Error(w, "manifest input is empty", http.StatusBadRequest)
return
}
dataset, err = parser.ParseManifests(body)
if err != nil {
http.Error(w, fmt.Sprintf("parse error: %v", err), http.StatusBadRequest)
return
}
}
s.store.SetDataset(sid, dataset)
writeJSON(w, http.StatusOK, map[string]any{
"datasetID": sid,
"summary": dataset.Summary,
})
}
type helmRenderRequest struct {
RepoURL string `json:"repoURL"`
Ref string `json:"ref"`
ChartPath string `json:"chartPath"`
ValuesYAML string `json:"valuesYAML"`
ReleaseName string `json:"releaseName"`
Namespace string `json:"namespace"`
}
type gitImportRequest struct {
RepoURL string `json:"repoURL"`
Ref string `json:"ref"`
Path string `json:"path"`
SourceType string `json:"sourceType"`
ValuesYAML string `json:"valuesYAML"`
ReleaseName string `json:"releaseName"`
Namespace string `json:"namespace"`
}
func (s *Server) handleHelmRender(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodPost {
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
return
}
r.Body = http.MaxBytesReader(w, r.Body, s.cfg.MaxUploadSize)
sid, err := s.sessionID(w, r)
if err != nil {
http.Error(w, "session error", http.StatusInternalServerError)
return
}
var req helmRenderRequest
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
http.Error(w, "invalid request body", http.StatusBadRequest)
return
}
if strings.TrimSpace(req.RepoURL) == "" {
http.Error(w, "repoURL is required", http.StatusBadRequest)
return
}
if err := validateRepoURL(req.RepoURL, s.cfg.GitAllowedHosts); err != nil {
http.Error(w, err.Error(), http.StatusBadRequest)
return
}
if len(req.ValuesYAML) > maxValuesYAMLBytes {
http.Error(w, "valuesYAML exceeds maximum allowed size", http.StatusBadRequest)
return
}
rendered, err := renderHelmFromGit(r.Context(), req.RepoURL, req.Ref, req.ChartPath, req.ValuesYAML, req.ReleaseName, req.Namespace)
if err != nil {
writeExecError(w, err)
return
}
dataset, err := parser.ParseManifests(rendered)
if err != nil {
http.Error(w, fmt.Sprintf("parse error: %v", err), http.StatusBadRequest)
return
}
s.store.SetDataset(sid, dataset)
writeJSON(w, http.StatusOK, map[string]any{
"datasetID": sid,
"mode": "helm",
"summary": dataset.Summary,
})
}
func (s *Server) handleGitImport(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodPost {
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
return
}
r.Body = http.MaxBytesReader(w, r.Body, s.cfg.MaxUploadSize)
sid, err := s.sessionID(w, r)
if err != nil {
http.Error(w, "session error", http.StatusInternalServerError)
return
}
var req gitImportRequest
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
http.Error(w, "invalid request body", http.StatusBadRequest)
return
}
if strings.TrimSpace(req.RepoURL) == "" {
http.Error(w, "repoURL is required", http.StatusBadRequest)
return
}
if err := validateRepoURL(req.RepoURL, s.cfg.GitAllowedHosts); err != nil {
http.Error(w, err.Error(), http.StatusBadRequest)
return
}
if len(req.ValuesYAML) > maxValuesYAMLBytes {
http.Error(w, "valuesYAML exceeds maximum allowed size", http.StatusBadRequest)
return
}
sourceType := strings.ToLower(strings.TrimSpace(req.SourceType))
if sourceType == "" {
sourceType = "manifests"
}
var body []byte
switch sourceType {
case "manifests":
body, err = importManifestsFromGit(r.Context(), req.RepoURL, req.Ref, req.Path)
case "helm":
body, err = renderHelmFromGit(r.Context(), req.RepoURL, req.Ref, req.Path, req.ValuesYAML, req.ReleaseName, req.Namespace)
default:
http.Error(w, "sourceType must be manifests or helm", http.StatusBadRequest)
return
}
if err != nil {
writeExecError(w, err)
return
}
dataset, err := parser.ParseManifests(body)
if err != nil {
http.Error(w, fmt.Sprintf("parse error: %v", err), http.StatusBadRequest)
return
}
s.store.SetDataset(sid, dataset)
writeJSON(w, http.StatusOK, map[string]any{
"datasetID": sid,
"mode": sourceType,
"summary": dataset.Summary,
})
}
func collectMultipartManifestInput(r *http.Request) ([]byte, error) {
var combined bytes.Buffer
appendDoc := func(doc []byte) {
trimmed := bytes.TrimSpace(doc)
if len(trimmed) == 0 {
return
}
if combined.Len() > 0 {
combined.WriteString("\n---\n")
}
combined.Write(trimmed)
combined.WriteByte('\n')
}
files := r.MultipartForm.File["manifestFile"]
for _, fh := range files {
f, err := fh.Open()
if err != nil {
return nil, fmt.Errorf("failed to open uploaded file %q", fh.Filename)
}
content, err := io.ReadAll(f)
_ = f.Close()
if err != nil {
return nil, fmt.Errorf("failed to read uploaded file %q", fh.Filename)
}
appendDoc(content)
}
appendDoc([]byte(r.FormValue("manifestText")))
if combined.Len() == 0 {
return nil, fmt.Errorf("manifest input is empty")
}
return combined.Bytes(), nil
}
func parseMultipartManifestInput(r *http.Request) (*model.Dataset, error) {
parts, err := collectMultipartManifestParts(r)
if err != nil {
return nil, err
}
if len(parts) == 0 {
return nil, fmt.Errorf("manifest input is empty")
}
merged := &model.Dataset{
Resources: make(map[string]*model.Resource),
CreatedAt: time.Now(),
}
for idx, part := range parts {
ds, parseErr := parser.ParseManifests(part.Content)
if parseErr != nil {
merged.Summary.Issues = append(merged.Summary.Issues, model.ParseIssue{
Document: idx + 1,
Message: fmt.Sprintf("%s: %s", part.Source, friendlyParseIssueMessage(part.Source, parseErr.Error(), part.Content)),
})
continue
}
for _, issue := range ds.Summary.Issues {
issue.Message = fmt.Sprintf("%s: %s", part.Source, friendlyParseIssueMessage(part.Source, issue.Message, part.Content))
merged.Summary.Issues = append(merged.Summary.Issues, issue)
}
for id, res := range ds.Resources {
if _, exists := merged.Resources[id]; exists {
merged.Duplicates = append(merged.Duplicates, id)
merged.Summary.Issues = append(merged.Summary.Issues, model.ParseIssue{
Document: idx + 1,
Message: fmt.Sprintf("%s: duplicate resource id %q detected", part.Source, id),
})
}
merged.Resources[id] = res
}
}
merged.Summary.Resources = len(merged.Resources)
merged.ModifiedAt = time.Now()
return merged, nil
}
func friendlyParseIssueMessage(source, raw string, content []byte) string {
msg := strings.TrimSpace(raw)
if msg == "" {
msg = "failed to parse input"
}
if looksLikeHelmSource(source, content) {
return fmt.Sprintf("%s (Helm source detected: upload rendered manifests or use Import From Git/Helm)", msg)
}
return msg
}
func looksLikeHelmSource(source string, content []byte) bool {
name := strings.ToLower(filepath.Base(strings.TrimSpace(source)))
if name == "chart.yaml" || name == "values.yaml" || name == "values.yml" {
return true
}
text := string(content)
return strings.Contains(text, "{{") && strings.Contains(text, "}}")
}
type manifestPart struct {
Source string
Content []byte
}
func collectMultipartManifestParts(r *http.Request) ([]manifestPart, error) {
parts := make([]manifestPart, 0)
for _, files := range r.MultipartForm.File {
for _, fh := range files {
f, err := fh.Open()
if err != nil {
return nil, fmt.Errorf("failed to open uploaded file %q", fh.Filename)
}
content, err := io.ReadAll(f)
_ = f.Close()
if err != nil {
return nil, fmt.Errorf("failed to read uploaded file %q", fh.Filename)
}
trimmed := bytes.TrimSpace(content)
if len(trimmed) == 0 {
continue
}
parts = append(parts, manifestPart{Source: fh.Filename, Content: append(trimmed, '\n')})
}
}
if inline := bytes.TrimSpace([]byte(r.FormValue("manifestText"))); len(inline) > 0 {
parts = append(parts, manifestPart{Source: "pasted manifest", Content: append(inline, '\n')})
}
return parts, nil
}
func importManifestsFromGit(ctx context.Context, repoURL, ref, manifestPath string) ([]byte, error) {
repoDir, cleanup, err := cloneRepo(ctx, repoURL, ref)
if err != nil {
return nil, err
}
defer cleanup()
root := repoDir
if manifestPath = strings.TrimSpace(manifestPath); manifestPath != "" {
safe, err := safeJoin(repoDir, manifestPath)
if err != nil {
return nil, err
}
root = safe
}
return collectManifestFiles(root)
}
func renderHelmFromGit(ctx context.Context, repoURL, ref, chartPath, valuesYAML, releaseName, namespace string) ([]byte, error) {
repoDir, cleanup, err := cloneRepo(ctx, repoURL, ref)
if err != nil {
return nil, err
}
defer cleanup()
if strings.TrimSpace(chartPath) == "" {
chartPath = "."
}
chartDir, err := safeJoin(repoDir, chartPath)
if err != nil {
return nil, err
}
return runHelmTemplate(ctx, chartDir, valuesYAML, releaseName, namespace)
}
func cloneRepo(ctx context.Context, repoURL, ref string) (string, func(), error) {
if _, err := exec.LookPath("git"); err != nil {
return "", nil, fmt.Errorf("git executable not found in runtime image")
}
tmpDir, err := os.MkdirTemp("", "kubeviz-git-*")
if err != nil {
return "", nil, fmt.Errorf("failed creating temp directory: %w", err)
}
cleanup := func() { _ = os.RemoveAll(tmpDir) }
args := []string{"clone", "--quiet", "--depth", "1", "--filter=blob:none", "--no-tags"}
ref = strings.TrimSpace(ref)
if ref != "" {
args = append(args, "--branch", ref, "--single-branch")
}
args = append(args, repoURL, tmpDir)
cloneCmd := exec.CommandContext(ctx, "git", args...)
cloneCmd.Env = append(os.Environ(),
"GIT_TERMINAL_PROMPT=0",
"GIT_ALLOW_PROTOCOL=https",
"GIT_CONFIG_GLOBAL=/dev/null",
"GIT_CONFIG_NOSYSTEM=1",
)
if out, err := cloneCmd.CombinedOutput(); err != nil {
cleanup()
log.Printf("git clone failed for %q: %s", repoURL, strings.TrimSpace(string(out)))
return "", nil, fmt.Errorf("git clone failed")
}
return tmpDir, cleanup, nil
}
func collectManifestFiles(root string) ([]byte, error) {
info, err := os.Stat(root)
if err != nil {
return nil, fmt.Errorf("path does not exist: %w", err)
}
if !info.IsDir() {
return nil, fmt.Errorf("path %q is not a directory", root)
}
var files []string
var totalBytes int64
err = filepath.WalkDir(root, func(path string, d fs.DirEntry, walkErr error) error {
if walkErr != nil {
return walkErr
}
if d.IsDir() {
base := strings.ToLower(d.Name())
if base == ".git" || base == "node_modules" || base == "vendor" {
return filepath.SkipDir
}
return nil
}
if isManifestFile(path) {
if len(files) >= maxManifestFiles {
return fmt.Errorf("too many manifest files (limit: %d)", maxManifestFiles)
}
info, err := d.Info()
if err != nil {
return err
}
totalBytes += info.Size()
if totalBytes > maxManifestBytes {
return fmt.Errorf("manifest file size budget exceeded (limit: %d bytes)", maxManifestBytes)
}
files = append(files, path)
}
return nil
})
if err != nil {
return nil, fmt.Errorf("failed to collect manifest files: %w", err)
}
if len(files) == 0 {
return nil, fmt.Errorf("no manifest files found in selected path")
}
slices.Sort(files)
var out bytes.Buffer
appendDoc := func(doc []byte) {
trimmed := bytes.TrimSpace(doc)
if len(trimmed) == 0 {
return
}
if out.Len() > 0 {
out.WriteString("\n---\n")
}
out.Write(trimmed)
out.WriteByte('\n')
}
for _, path := range files {
content, err := os.ReadFile(path)
if err != nil {
return nil, fmt.Errorf("failed to read %q: %w", path, err)
}
appendDoc(content)
}
if out.Len() == 0 {
return nil, fmt.Errorf("manifest files were empty")
}
return out.Bytes(), nil
}
func runHelmTemplate(ctx context.Context, chartDir, valuesYAML, releaseName, namespace string) ([]byte, error) {
if _, err := exec.LookPath("helm"); err != nil {
return nil, fmt.Errorf("helm executable not found in runtime image")
}
if releaseName = strings.TrimSpace(releaseName); releaseName == "" {
releaseName = "kubeviz"
}
if namespace = strings.TrimSpace(namespace); namespace == "" {
namespace = "default"
}
args := []string{"template", releaseName, chartDir, "--namespace", namespace}
var cleanupFiles []string
if trimmed := strings.TrimSpace(valuesYAML); trimmed != "" {
valuesFile, err := os.CreateTemp("", "kubeviz-values-*.yaml")
if err != nil {
return nil, fmt.Errorf("failed creating temp values file: %w", err)
}
if _, err := valuesFile.WriteString(trimmed); err != nil {
_ = valuesFile.Close()
_ = os.Remove(valuesFile.Name())
return nil, fmt.Errorf("failed writing values file: %w", err)
}
_ = valuesFile.Close()
args = append(args, "--values", valuesFile.Name())
cleanupFiles = append(cleanupFiles, valuesFile.Name())
}
defer func() {
for _, f := range cleanupFiles {
_ = os.Remove(f)
}
}()
cmd := exec.CommandContext(ctx, "helm", args...)
cmd.Env = append(os.Environ(),
"HELM_NO_PLUGINS=1",
"HELM_REGISTRY_CONFIG=/tmp/helm-registry.json",
)
out, err := cmd.CombinedOutput()
if err != nil {
log.Printf("helm template failed for chart %q: %s", chartDir, strings.TrimSpace(string(out)))
return nil, fmt.Errorf("helm template failed")
}
trimmed := bytes.TrimSpace(out)
if len(trimmed) == 0 {
return nil, fmt.Errorf("helm template produced no output")
}
return append(trimmed, '\n'), nil
}
func safeJoin(root, subpath string) (string, error) {
cleanRoot := filepath.Clean(root)
candidate := filepath.Join(cleanRoot, filepath.Clean(subpath))
rel, err := filepath.Rel(cleanRoot, candidate)
if err != nil {
return "", fmt.Errorf("invalid path: %w", err)
}
if rel == ".." || strings.HasPrefix(rel, ".."+string(filepath.Separator)) {
return "", fmt.Errorf("path escapes repository root")
}
return candidate, nil
}
func validateRepoURL(raw string, allowedHosts []string) error {
parsed, err := url.Parse(strings.TrimSpace(raw))
if err != nil {
return fmt.Errorf("repoURL is invalid")
}
if parsed.Scheme != "https" {
return fmt.Errorf("repoURL must use https")
}
if parsed.Host == "" {
return fmt.Errorf("repoURL host is required")
}
if parsed.User != nil {
return fmt.Errorf("repoURL must not contain credentials")
}
host := strings.ToLower(parsed.Hostname())
if len(allowedHosts) == 0 {
allowedHosts = defaultGitAllowedHosts
}
for _, allowed := range allowedHosts {
allowed = strings.ToLower(strings.TrimSpace(allowed))
if allowed == "" {
continue
}
if host == allowed || strings.HasSuffix(host, "."+allowed) {
return nil
}
}
return fmt.Errorf("repoURL host is not allowed")
}
func isManifestFile(path string) bool {
ext := strings.ToLower(filepath.Ext(path))
for _, allowed := range manifestExts {
if ext == allowed {
return true
}
}
return false
}
func writeExecError(w http.ResponseWriter, err error) {
if err == nil {
return
}
if errors.Is(err, context.DeadlineExceeded) {
http.Error(w, "operation timed out", http.StatusRequestTimeout)
return
}
log.Printf("external import/render error: %v", err)
msg := err.Error()
switch {
case strings.Contains(msg, "not found in runtime image"):
http.Error(w, msg, http.StatusNotImplemented)
case strings.Contains(msg, "path escapes repository root"):
http.Error(w, msg, http.StatusBadRequest)
case strings.Contains(msg, "repoURL is ") || strings.Contains(msg, "repoURL must"):
http.Error(w, msg, http.StatusBadRequest)
case strings.Contains(msg, "too many manifest files") || strings.Contains(msg, "size budget exceeded"):
http.Error(w, msg, http.StatusBadRequest)
default:
http.Error(w, "external import/render failed", http.StatusBadRequest)
}
}
func (s *Server) handleGraph(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodGet {
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
return
}
sid, err := s.sessionID(w, r)
if err != nil {
http.Error(w, "session error", http.StatusInternalServerError)
return
}
dataset := s.store.GetDataset(sid)
checkCfg := analyze.DefaultConfig()
if raw := r.URL.Query().Get("checkRules"); raw != "" {
checkCfg = analyze.ConfigFromEnabled(parseCSVSet(raw))
}
findings, healthHints := analyze.AnalyzeDataset(dataset, checkCfg)
filters := graph.Filters{
Namespace: r.URL.Query().Get("namespace"),
Kind: r.URL.Query().Get("kind"),
Query: r.URL.Query().Get("q"),
FocusID: r.URL.Query().Get("focus"),
Relations: parseRelations(r.URL.Query().Get("relations")),
GroupBy: r.URL.Query().Get("groupBy"),
CollapsedGroups: parseCSVSet(r.URL.Query().Get("collapsed")),
}
resp := graph.BuildGraph(dataset, filters, healthHints)
resp.Findings = findings
writeJSON(w, http.StatusOK, resp)
}
func (s *Server) handleDiff(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodPost {
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
return
}
r.Body = http.MaxBytesReader(w, r.Body, s.cfg.MaxUploadSize)
var req struct {
BaseManifest string `json:"baseManifest"`
TargetManifest string `json:"targetManifest"`
}
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
http.Error(w, "invalid request body", http.StatusBadRequest)
return
}
if strings.TrimSpace(req.BaseManifest) == "" || strings.TrimSpace(req.TargetManifest) == "" {
http.Error(w, "baseManifest and targetManifest are required", http.StatusBadRequest)
return
}
if len(req.BaseManifest) > maxDiffFieldBytes || len(req.TargetManifest) > maxDiffFieldBytes {
http.Error(w, "diff payload exceeds maximum allowed size", http.StatusBadRequest)
return
}
base, err := parser.ParseManifests([]byte(req.BaseManifest))
if err != nil {
http.Error(w, fmt.Sprintf("base parse error: %v", err), http.StatusBadRequest)
return
}
target, err := parser.ParseManifests([]byte(req.TargetManifest))
if err != nil {
http.Error(w, fmt.Sprintf("target parse error: %v", err), http.StatusBadRequest)
return
}
writeJSON(w, http.StatusOK, analyze.DiffDatasets(base, target))
}
func (s *Server) handleResource(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodGet {
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
return
}
sid, err := s.sessionID(w, r)
if err != nil {
http.Error(w, "session error", http.StatusInternalServerError)
return
}
dataset := s.store.GetDataset(sid)
if dataset == nil {
http.Error(w, "no manifests uploaded", http.StatusNotFound)
return
}
id := strings.TrimPrefix(r.URL.Path, "/api/resources/")
id = strings.TrimSpace(id)
if id == "" {
http.Error(w, "resource id required", http.StatusBadRequest)
return
}
res, ok := dataset.Resources[id]
if !ok {
http.Error(w, "resource not found", http.StatusNotFound)
return
}
payload := map[string]any{
"id": res.ID,
"apiVersion": res.APIVersion,
"kind": res.Kind,
"name": res.Name,
"namespace": res.Namespace,
"labels": res.Labels,
"isSensitive": res.IsSensitive,
"keyNames": res.KeyNames,
"references": res.References,
"ownerRefs": res.OwnerRefs,
"raw": sanitizeRawForResponse(res),
"clusterScoped": res.ClusterScoped,
}
writeJSON(w, http.StatusOK, payload)
}
func sanitizeRawForResponse(res *model.Resource) map[string]any {
raw := map[string]any{}
for k, v := range res.Raw {
raw[k] = v
}
if res.IsSensitive {
raw["data"] = "<redacted>"
raw["stringData"] = "<redacted>"
}
return raw
}
func (s *Server) handleClearSession(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodPost {
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
return
}
sid, err := s.sessionID(w, r)
if err != nil {
http.Error(w, "session error", http.StatusInternalServerError)
return
}
s.store.Clear(sid)
writeJSON(w, http.StatusOK, map[string]string{"status": "cleared"})
}

View File

@@ -0,0 +1,143 @@
package httpserver
import (
"context"
"embed"
"encoding/json"
"errors"
"html/template"
"io/fs"
"log"
"net/http"
"strings"
"time"
"kubeviz/internal/config"
"kubeviz/internal/session"
)
const sessionCookieName = "kubeviz_session"
type Server struct {
cfg config.Config
store *session.Store
templates *template.Template
mux *http.ServeMux
}
func New(cfg config.Config) (*Server, error) {
tpls, err := template.ParseFS(templateFS, "ui/templates/*.html")
if err != nil {
return nil, err
}
s := &Server{
cfg: cfg,
store: session.NewStore(cfg.SessionTTL),
templates: tpls,
mux: http.NewServeMux(),
}
s.routes()
return s, nil
}
func (s *Server) routes() {
s.mux.Handle("/", s.middleware(http.HandlerFunc(s.handleIndex)))
s.mux.Handle("/api/manifests/parse", s.middleware(http.HandlerFunc(s.handleParseManifests)))
s.mux.Handle("/api/helm/render", s.middleware(http.HandlerFunc(s.handleHelmRender)))
s.mux.Handle("/api/git/import", s.middleware(http.HandlerFunc(s.handleGitImport)))
s.mux.Handle("/api/graph", s.middleware(http.HandlerFunc(s.handleGraph)))
s.mux.Handle("/api/diff", s.middleware(http.HandlerFunc(s.handleDiff)))
s.mux.Handle("/api/resources/", s.middleware(http.HandlerFunc(s.handleResource)))
s.mux.Handle("/api/export/svg", s.middleware(http.HandlerFunc(s.handleExportSVG)))
s.mux.Handle("/api/export/png", s.middleware(http.HandlerFunc(s.handleExportPNG)))
s.mux.Handle("/api/session/clear", s.middleware(http.HandlerFunc(s.handleClearSession)))
staticSub, _ := fs.Sub(staticFS, "ui/static")
s.mux.Handle("/static/", http.StripPrefix("/static/", http.FileServer(http.FS(staticSub))))
}
func (s *Server) Handler() http.Handler {
return s.mux
}
func (s *Server) Shutdown(ctx context.Context) {
s.store.Stop()
_ = ctx
}
func (s *Server) middleware(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
ctx, cancel := context.WithTimeout(r.Context(), 20*time.Second)
defer cancel()
r = r.WithContext(ctx)
w.Header().Set("X-Content-Type-Options", "nosniff")
w.Header().Set("Referrer-Policy", "same-origin")
w.Header().Set("Content-Security-Policy", "default-src 'self'; script-src 'self' https://unpkg.com https://cdn.jsdelivr.net; style-src 'self' 'unsafe-inline'; img-src 'self' data:; connect-src 'self';")
if r.TLS != nil || strings.EqualFold(r.Header.Get("X-Forwarded-Proto"), "https") {
w.Header().Set("Strict-Transport-Security", "max-age=31536000; includeSubDomains")
}
next.ServeHTTP(w, r)
})
}
func (s *Server) sessionID(w http.ResponseWriter, r *http.Request) (string, error) {
cookie, err := r.Cookie(sessionCookieName)
if err == nil && cookie.Value != "" {
return cookie.Value, nil
}
if !errors.Is(err, http.ErrNoCookie) && err != nil {
return "", err
}
sid, err := s.store.NewSessionID()
if err != nil {
return "", err
}
http.SetCookie(w, &http.Cookie{
Name: sessionCookieName,
Value: sid,
Path: "/",
HttpOnly: true,
Secure: s.cfg.CookieSecure,
SameSite: http.SameSiteLaxMode,
MaxAge: int(s.cfg.SessionTTL.Seconds()),
})
return sid, nil
}
func parseRelations(raw string) map[string]bool {
return parseCSVSet(raw)
}
func parseCSVSet(raw string) map[string]bool {
if raw == "" {
return nil
}
out := map[string]bool{}
for _, item := range strings.Split(raw, ",") {
trimmed := strings.TrimSpace(item)
if trimmed == "" {
continue
}
out[trimmed] = true
}
return out
}
func writeJSON(w http.ResponseWriter, status int, payload any) {
w.Header().Set("Content-Type", "application/json")
w.WriteHeader(status)
if err := json.NewEncoder(w).Encode(payload); err != nil {
log.Printf("failed writing JSON: %v", err)
}
}
func subFS(fsys embed.FS, dir string) fs.FS {
sub, err := fs.Sub(fsys, dir)
if err != nil {
panic(err)
}
return sub
}

View File

@@ -0,0 +1,459 @@
package httpserver
import (
"bytes"
"encoding/json"
"mime/multipart"
"net/http"
"net/http/httptest"
"strings"
"testing"
"time"
"kubeviz/internal/config"
)
func TestParseGraphAndResourceFlow(t *testing.T) {
srv, err := New(config.Config{Addr: ":0", SessionTTL: 30 * time.Minute, MaxUploadSize: 1024 * 1024})
if err != nil {
t.Fatalf("server init failed: %v", err)
}
handler := srv.Handler()
manifest := `apiVersion: v1
kind: ConfigMap
metadata:
name: app-cfg
namespace: demo
`
body := map[string]string{"manifest": manifest}
payload, _ := json.Marshal(body)
req := httptest.NewRequest(http.MethodPost, "/api/manifests/parse", bytes.NewReader(payload))
req.Header.Set("Content-Type", "application/json")
w := httptest.NewRecorder()
handler.ServeHTTP(w, req)
if got := w.Result().StatusCode; got != http.StatusOK {
t.Fatalf("parse status: got %d body=%s", got, w.Body.String())
}
cookies := w.Result().Cookies()
if len(cookies) == 0 {
t.Fatalf("expected session cookie")
}
graphReq := httptest.NewRequest(http.MethodGet, "/api/graph", nil)
graphReq.AddCookie(cookies[0])
graphW := httptest.NewRecorder()
handler.ServeHTTP(graphW, graphReq)
if got := graphW.Result().StatusCode; got != http.StatusOK {
t.Fatalf("graph status: got %d", got)
}
var graph map[string]any
if err := json.NewDecoder(graphW.Result().Body).Decode(&graph); err != nil {
t.Fatalf("graph decode failed: %v", err)
}
nodes, _ := graph["nodes"].([]any)
if len(nodes) != 1 {
t.Fatalf("expected 1 node, got %d", len(nodes))
}
resReq := httptest.NewRequest(http.MethodGet, "/api/resources/demo/ConfigMap/app-cfg", nil)
resReq.AddCookie(cookies[0])
resW := httptest.NewRecorder()
handler.ServeHTTP(resW, resReq)
if got := resW.Result().StatusCode; got != http.StatusOK {
t.Fatalf("resource status: got %d", got)
}
}
func TestParseMultipleUploadedFiles(t *testing.T) {
srv, err := New(config.Config{Addr: ":0", SessionTTL: 30 * time.Minute, MaxUploadSize: 1024 * 1024})
if err != nil {
t.Fatalf("server init failed: %v", err)
}
handler := srv.Handler()
var body bytes.Buffer
writer := multipart.NewWriter(&body)
f1, err := writer.CreateFormFile("manifestFile", "deployment.yaml")
if err != nil {
t.Fatalf("failed creating file part 1: %v", err)
}
_, _ = f1.Write([]byte(`apiVersion: apps/v1
kind: Deployment
metadata:
name: kubeviz
namespace: kubeviz
`))
f2, err := writer.CreateFormFile("manifestFile", "service.yaml")
if err != nil {
t.Fatalf("failed creating file part 2: %v", err)
}
_, _ = f2.Write([]byte(`apiVersion: v1
kind: Service
metadata:
name: kubeviz
namespace: kubeviz
spec:
selector:
app: kubeviz
`))
if err := writer.Close(); err != nil {
t.Fatalf("failed to close multipart writer: %v", err)
}
req := httptest.NewRequest(http.MethodPost, "/api/manifests/parse", &body)
req.Header.Set("Content-Type", writer.FormDataContentType())
w := httptest.NewRecorder()
handler.ServeHTTP(w, req)
if got := w.Result().StatusCode; got != http.StatusOK {
t.Fatalf("parse status: got %d body=%s", got, w.Body.String())
}
cookies := w.Result().Cookies()
if len(cookies) == 0 {
t.Fatalf("expected session cookie")
}
graphReq := httptest.NewRequest(http.MethodGet, "/api/graph", nil)
graphReq.AddCookie(cookies[0])
graphW := httptest.NewRecorder()
handler.ServeHTTP(graphW, graphReq)
if got := graphW.Result().StatusCode; got != http.StatusOK {
t.Fatalf("graph status: got %d", got)
}
var graph map[string]any
if err := json.NewDecoder(graphW.Result().Body).Decode(&graph); err != nil {
t.Fatalf("graph decode failed: %v", err)
}
nodes, _ := graph["nodes"].([]any)
if len(nodes) != 2 {
t.Fatalf("expected 2 nodes from two files, got %d", len(nodes))
}
}
func TestParseMultipleUploadedFilesToleratesSingleInvalidFile(t *testing.T) {
srv, err := New(config.Config{Addr: ":0", SessionTTL: 30 * time.Minute, MaxUploadSize: 1024 * 1024})
if err != nil {
t.Fatalf("server init failed: %v", err)
}
handler := srv.Handler()
var body bytes.Buffer
writer := multipart.NewWriter(&body)
valid, err := writer.CreateFormFile("manifestFile", "service.yaml")
if err != nil {
t.Fatalf("failed creating valid file part: %v", err)
}
_, _ = valid.Write([]byte(`apiVersion: v1
kind: Service
metadata:
name: kubeviz
namespace: kubeviz
spec:
selector:
app: kubeviz
`))
invalid, err := writer.CreateFormFile("manifestFile", "broken.yaml")
if err != nil {
t.Fatalf("failed creating invalid file part: %v", err)
}
_, _ = invalid.Write([]byte(`apiVersion: v1
kind Service
metadata:
name: broken
`))
if err := writer.Close(); err != nil {
t.Fatalf("failed to close multipart writer: %v", err)
}
req := httptest.NewRequest(http.MethodPost, "/api/manifests/parse", &body)
req.Header.Set("Content-Type", writer.FormDataContentType())
w := httptest.NewRecorder()
handler.ServeHTTP(w, req)
if got := w.Result().StatusCode; got != http.StatusOK {
t.Fatalf("parse status: got %d", got)
}
var resp struct {
Summary struct {
Resources int `json:"resources"`
Issues []struct {
Message string `json:"message"`
} `json:"issues"`
} `json:"summary"`
}
if err := json.NewDecoder(w.Result().Body).Decode(&resp); err != nil {
t.Fatalf("parse response decode failed: %v", err)
}
if resp.Summary.Resources != 1 {
t.Fatalf("expected 1 parsed resource, got %d", resp.Summary.Resources)
}
if len(resp.Summary.Issues) == 0 {
t.Fatalf("expected parse issue for invalid file")
}
if !strings.Contains(resp.Summary.Issues[0].Message, "broken.yaml") {
t.Fatalf("expected issue message to include filename, got: %q", resp.Summary.Issues[0].Message)
}
}
func TestParseMultipleUploadedFilesAllInvalidReturnsIssues(t *testing.T) {
srv, err := New(config.Config{Addr: ":0", SessionTTL: 30 * time.Minute, MaxUploadSize: 1024 * 1024})
if err != nil {
t.Fatalf("server init failed: %v", err)
}
handler := srv.Handler()
var body bytes.Buffer
writer := multipart.NewWriter(&body)
f1, err := writer.CreateFormFile("manifestFile", "values.yaml")
if err != nil {
t.Fatalf("failed creating file part 1: %v", err)
}
_, _ = f1.Write([]byte(`replicaCount: 2
image:
repository: nginx
`))
f2, err := writer.CreateFormFile("manifestFile", "Chart.yaml")
if err != nil {
t.Fatalf("failed creating file part 2: %v", err)
}
_, _ = f2.Write([]byte(`apiVersion: v2
name: sample-chart
version: 0.1.0
`))
if err := writer.Close(); err != nil {
t.Fatalf("failed to close multipart writer: %v", err)
}
req := httptest.NewRequest(http.MethodPost, "/api/manifests/parse", &body)
req.Header.Set("Content-Type", writer.FormDataContentType())
w := httptest.NewRecorder()
handler.ServeHTTP(w, req)
if got := w.Result().StatusCode; got != http.StatusOK {
t.Fatalf("parse status: got %d body=%s", got, w.Body.String())
}
var resp struct {
Summary struct {
Resources int `json:"resources"`
Issues []struct {
Message string `json:"message"`
} `json:"issues"`
} `json:"summary"`
}
if err := json.NewDecoder(w.Result().Body).Decode(&resp); err != nil {
t.Fatalf("parse response decode failed: %v", err)
}
if resp.Summary.Resources != 0 {
t.Fatalf("expected 0 parsed resources, got %d", resp.Summary.Resources)
}
if len(resp.Summary.Issues) < 2 {
t.Fatalf("expected issues for all invalid files, got %d", len(resp.Summary.Issues))
}
}
func TestDiffEndpoint(t *testing.T) {
srv, err := New(config.Config{Addr: ":0", SessionTTL: 30 * time.Minute, MaxUploadSize: 1024 * 1024})
if err != nil {
t.Fatalf("server init failed: %v", err)
}
handler := srv.Handler()
body := map[string]string{
"baseManifest": `apiVersion: v1
kind: ConfigMap
metadata:
name: cfg
namespace: demo
data:
a: "1"
`,
"targetManifest": `apiVersion: v1
kind: ConfigMap
metadata:
name: cfg
namespace: demo
data:
a: "2"
---
apiVersion: v1
kind: Service
metadata:
name: svc
namespace: demo
`,
}
payload, _ := json.Marshal(body)
req := httptest.NewRequest(http.MethodPost, "/api/diff", bytes.NewReader(payload))
req.Header.Set("Content-Type", "application/json")
w := httptest.NewRecorder()
handler.ServeHTTP(w, req)
if got := w.Result().StatusCode; got != http.StatusOK {
t.Fatalf("diff status: got %d", got)
}
var diff map[string]any
if err := json.NewDecoder(w.Result().Body).Decode(&diff); err != nil {
t.Fatalf("diff decode failed: %v", err)
}
changed, _ := diff["changed"].([]any)
added, _ := diff["added"].([]any)
if len(changed) != 1 {
t.Fatalf("expected 1 changed item, got %d", len(changed))
}
if len(added) != 1 {
t.Fatalf("expected 1 added item, got %d", len(added))
}
}
func TestGraphEndpointProvidesFindingsAndGroups(t *testing.T) {
srv, err := New(config.Config{Addr: ":0", SessionTTL: 30 * time.Minute, MaxUploadSize: 1024 * 1024})
if err != nil {
t.Fatalf("server init failed: %v", err)
}
handler := srv.Handler()
manifest := `apiVersion: v1
kind: Service
metadata:
name: app
namespace: demo
spec:
selector:
app: no-match
`
body := map[string]string{"manifest": manifest}
payload, _ := json.Marshal(body)
parseReq := httptest.NewRequest(http.MethodPost, "/api/manifests/parse", bytes.NewReader(payload))
parseReq.Header.Set("Content-Type", "application/json")
parseW := httptest.NewRecorder()
handler.ServeHTTP(parseW, parseReq)
if got := parseW.Result().StatusCode; got != http.StatusOK {
t.Fatalf("parse status: got %d", got)
}
cookies := parseW.Result().Cookies()
if len(cookies) == 0 {
t.Fatalf("expected session cookie")
}
graphReq := httptest.NewRequest(http.MethodGet, "/api/graph?groupBy=namespace&collapsed=demo", nil)
graphReq.AddCookie(cookies[0])
graphW := httptest.NewRecorder()
handler.ServeHTTP(graphW, graphReq)
if got := graphW.Result().StatusCode; got != http.StatusOK {
t.Fatalf("graph status: got %d", got)
}
var graph map[string]any
if err := json.NewDecoder(graphW.Result().Body).Decode(&graph); err != nil {
t.Fatalf("graph decode failed: %v", err)
}
if findings, _ := graph["findings"].([]any); len(findings) == 0 {
t.Fatalf("expected findings in graph response")
}
if groups, _ := graph["groups"].([]any); len(groups) == 0 {
t.Fatalf("expected groups in graph response")
}
}
func TestGitImportValidation(t *testing.T) {
srv, err := New(config.Config{Addr: ":0", SessionTTL: 30 * time.Minute, MaxUploadSize: 1024 * 1024})
if err != nil {
t.Fatalf("server init failed: %v", err)
}
handler := srv.Handler()
req := httptest.NewRequest(http.MethodPost, "/api/git/import", bytes.NewBufferString(`{"sourceType":"manifests"}`))
req.Header.Set("Content-Type", "application/json")
w := httptest.NewRecorder()
handler.ServeHTTP(w, req)
if got := w.Result().StatusCode; got != http.StatusBadRequest {
t.Fatalf("expected 400 for missing repoURL, got %d", got)
}
}
func TestHelmRenderValidation(t *testing.T) {
srv, err := New(config.Config{Addr: ":0", SessionTTL: 30 * time.Minute, MaxUploadSize: 1024 * 1024})
if err != nil {
t.Fatalf("server init failed: %v", err)
}
handler := srv.Handler()
req := httptest.NewRequest(http.MethodPost, "/api/helm/render", bytes.NewBufferString(`{}`))
req.Header.Set("Content-Type", "application/json")
w := httptest.NewRecorder()
handler.ServeHTTP(w, req)
if got := w.Result().StatusCode; got != http.StatusBadRequest {
t.Fatalf("expected 400 for missing repoURL, got %d", got)
}
}
func TestGitImportRejectsNonHTTPSRepoURL(t *testing.T) {
srv, err := New(config.Config{Addr: ":0", SessionTTL: 30 * time.Minute, MaxUploadSize: 1024 * 1024})
if err != nil {
t.Fatalf("server init failed: %v", err)
}
handler := srv.Handler()
req := httptest.NewRequest(http.MethodPost, "/api/git/import", bytes.NewBufferString(`{"repoURL":"http://github.com/org/repo.git","sourceType":"manifests"}`))
req.Header.Set("Content-Type", "application/json")
w := httptest.NewRecorder()
handler.ServeHTTP(w, req)
if got := w.Result().StatusCode; got != http.StatusBadRequest {
t.Fatalf("expected 400 for non-https repoURL, got %d", got)
}
}
func TestGitImportRejectsDisallowedHost(t *testing.T) {
srv, err := New(config.Config{
Addr: ":0",
SessionTTL: 30 * time.Minute,
MaxUploadSize: 1024 * 1024,
GitAllowedHosts: []string{"github.com"},
})
if err != nil {
t.Fatalf("server init failed: %v", err)
}
handler := srv.Handler()
req := httptest.NewRequest(http.MethodPost, "/api/git/import", bytes.NewBufferString(`{"repoURL":"https://evil.example/repo.git","sourceType":"manifests"}`))
req.Header.Set("Content-Type", "application/json")
w := httptest.NewRecorder()
handler.ServeHTTP(w, req)
if got := w.Result().StatusCode; got != http.StatusBadRequest {
t.Fatalf("expected 400 for disallowed host, got %d", got)
}
}
func TestDiffRejectsTooLargePayload(t *testing.T) {
srv, err := New(config.Config{Addr: ":0", SessionTTL: 30 * time.Minute, MaxUploadSize: 8 * 1024 * 1024})
if err != nil {
t.Fatalf("server init failed: %v", err)
}
handler := srv.Handler()
tooLarge := strings.Repeat("a", maxDiffFieldBytes+1)
body := map[string]string{
"baseManifest": tooLarge,
"targetManifest": "apiVersion: v1\nkind: ConfigMap\nmetadata:\n name: demo\n",
}
payload, _ := json.Marshal(body)
req := httptest.NewRequest(http.MethodPost, "/api/diff", bytes.NewReader(payload))
req.Header.Set("Content-Type", "application/json")
w := httptest.NewRecorder()
handler.ServeHTTP(w, req)
if got := w.Result().StatusCode; got != http.StatusBadRequest {
t.Fatalf("expected 400 for oversized diff payload, got %d", got)
}
}

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,22 @@
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 96 96" role="img" aria-label="KubeViz Logo">
<defs>
<linearGradient id="bg" x1="0" y1="0" x2="1" y2="1">
<stop offset="0%" stop-color="#0f172a"/>
<stop offset="100%" stop-color="#1d4ed8"/>
</linearGradient>
<linearGradient id="node" x1="0" y1="0" x2="1" y2="1">
<stop offset="0%" stop-color="#22c3b7"/>
<stop offset="100%" stop-color="#0f766e"/>
</linearGradient>
</defs>
<rect x="4" y="4" width="88" height="88" rx="18" fill="url(#bg)"/>
<g fill="none" stroke="#93c5fd" stroke-width="4" stroke-linecap="round" opacity="0.95">
<path d="M24 66 L48 30 L72 66"/>
<path d="M24 66 L72 66"/>
</g>
<g fill="url(#node)">
<circle cx="24" cy="66" r="7"/>
<circle cx="48" cy="30" r="7"/>
<circle cx="72" cy="66" r="7"/>
</g>
</svg>

After

Width:  |  Height:  |  Size: 848 B

View File

@@ -0,0 +1,971 @@
:root {
color-scheme: light dark;
--font-sans: "IBM Plex Sans", "Inter", "Segoe UI", sans-serif;
--radius-xs: 8px;
--radius-sm: 10px;
--radius-md: 14px;
--shadow-sm: 0 2px 10px rgba(15, 23, 42, 0.06);
--shadow-md: 0 8px 24px rgba(15, 23, 42, 0.08);
--bg: #edf2fa;
--bg-elevated: #f7faff;
--panel: #ffffff;
--ink: #12213b;
--muted: #4d5d79;
--line: #c9d6e6;
--line-strong: #aebfd4;
--accent: #0f766e;
--accent-ink: #ffffff;
--chip: #eff5fd;
--canvas-top: #f8fbff;
--canvas-bottom: #edf3fb;
--tooltip-bg: #111827;
--tooltip-ink: #e5e7eb;
--code-bg: #0f172a;
--code-ink: #e2e8f0;
--danger: #b91c1c;
--overlay: rgba(15, 23, 42, 0.45);
--brand-start: #0f172a;
--brand-end: #1d4ed8;
}
@media (prefers-color-scheme: dark) {
:root {
--bg: #0b1220;
--bg-elevated: #101a2e;
--panel: #111c31;
--ink: #e2e8f0;
--muted: #b8c6da;
--line: #274160;
--line-strong: #3b5d87;
--accent: #22c3b7;
--accent-ink: #052323;
--chip: #13253f;
--canvas-top: #0d182b;
--canvas-bottom: #0a1426;
--tooltip-bg: #e2e8f0;
--tooltip-ink: #0b1220;
--code-bg: #0a1426;
--code-ink: #d6e2f4;
--danger: #f87171;
--overlay: rgba(2, 7, 17, 0.58);
--brand-start: #0a1120;
--brand-end: #12326d;
}
}
:root[data-theme="light"] {
--bg: #edf2fa;
--bg-elevated: #f7faff;
--panel: #ffffff;
--ink: #12213b;
--muted: #4d5d79;
--line: #c9d6e6;
--line-strong: #aebfd4;
--accent: #0f766e;
--accent-ink: #ffffff;
--chip: #eff5fd;
--canvas-top: #f8fbff;
--canvas-bottom: #edf3fb;
--tooltip-bg: #111827;
--tooltip-ink: #e5e7eb;
--code-bg: #0f172a;
--code-ink: #e2e8f0;
--danger: #b91c1c;
--overlay: rgba(15, 23, 42, 0.45);
--brand-start: #0f172a;
--brand-end: #1d4ed8;
}
:root[data-theme="dark"] {
--bg: #0b1220;
--bg-elevated: #101a2e;
--panel: #111c31;
--ink: #e2e8f0;
--muted: #b8c6da;
--line: #274160;
--line-strong: #3b5d87;
--accent: #22c3b7;
--accent-ink: #052323;
--chip: #13253f;
--canvas-top: #0d182b;
--canvas-bottom: #0a1426;
--tooltip-bg: #e2e8f0;
--tooltip-ink: #0b1220;
--code-bg: #0a1426;
--code-ink: #d6e2f4;
--danger: #f87171;
--overlay: rgba(2, 7, 17, 0.58);
--brand-start: #0a1120;
--brand-end: #12326d;
}
* {
box-sizing: border-box;
}
body {
margin: 0;
font-family: var(--font-sans);
background:
radial-gradient(1200px 500px at top right, color-mix(in srgb, var(--accent) 12%, transparent), transparent),
linear-gradient(180deg, var(--bg-elevated), var(--bg));
color: var(--ink);
}
.topbar {
padding: 0.85rem 1.2rem;
border-bottom: 1px solid color-mix(in srgb, var(--line) 60%, transparent);
background: linear-gradient(90deg, var(--brand-start), var(--brand-end));
color: #fff;
display: flex;
justify-content: space-between;
align-items: center;
gap: 0.8rem;
}
.brand {
display: flex;
align-items: center;
gap: 0.7rem;
}
.brand-logo {
width: 34px;
height: 34px;
border-radius: 8px;
box-shadow: 0 1px 4px rgba(0, 0, 0, 0.25);
}
.topbar h1 {
margin: 0;
font-size: 2rem;
line-height: 1;
letter-spacing: -0.03em;
}
.topbar p {
margin: 0.2rem 0 0;
color: #dbeafe;
font-size: 0.97rem;
}
.layout {
display: grid;
grid-template-columns: 330px 1fr 360px;
gap: 0.9rem;
padding: 0.9rem;
min-height: calc(100vh - 84px);
}
.left-panel,
.graph-panel,
.details-panel {
background: color-mix(in srgb, var(--panel) 96%, transparent);
border: 1px solid var(--line);
border-radius: var(--radius-md);
padding: 0.95rem;
box-shadow: var(--shadow-sm);
backdrop-filter: blur(2px);
}
.tabs {
display: grid;
grid-template-columns: repeat(3, 1fr);
gap: 0.35rem;
margin-bottom: 0.6rem;
}
.tab-btn {
display: inline-flex;
align-items: center;
justify-content: center;
gap: 0.35rem;
padding: 0.5rem 0.65rem;
border: 1px solid var(--line);
border-radius: var(--radius-sm);
background: color-mix(in srgb, var(--panel) 86%, var(--bg));
color: var(--muted);
cursor: pointer;
font-weight: 600;
}
.tab-btn.active {
border-color: color-mix(in srgb, var(--accent) 55%, var(--line));
color: var(--accent);
background: color-mix(in srgb, var(--accent) 12%, var(--panel));
}
.tab-icon {
width: 0.58rem;
height: 0.58rem;
border-radius: 999px;
border: 1.5px solid currentColor;
opacity: 0.72;
}
.tab-btn.active .tab-icon {
background: currentColor;
opacity: 0.95;
}
.tab-pane {
display: none;
}
.tab-pane.active {
display: block;
}
h2,
h3 {
margin: 0.15rem 0 0.65rem;
}
h2 {
font-size: 2.2rem;
letter-spacing: -0.02em;
}
h3 {
font-size: 1.02rem;
}
label,
legend,
summary {
display: block;
margin-top: 0.55rem;
font-weight: 600;
color: var(--muted);
font-size: 0.92rem;
}
.help-tip {
display: inline-flex;
align-items: center;
justify-content: center;
width: 1.05rem;
height: 1.05rem;
margin-left: 0.32rem;
border-radius: 999px;
background: #2563eb;
color: #ffffff;
font-size: 0.72rem;
font-weight: 700;
cursor: help;
position: relative;
vertical-align: middle;
outline: none;
}
.help-tip:focus {
box-shadow: 0 0 0 2px color-mix(in srgb, #2563eb 35%, transparent);
}
.help-tooltip {
position: absolute;
left: 1.45rem;
top: -0.25rem;
width: min(420px, 80vw);
padding: 0.5rem 0.6rem;
border: 1px solid color-mix(in srgb, var(--line) 75%, transparent);
border-radius: var(--radius-xs);
background: color-mix(in srgb, var(--panel) 96%, var(--bg));
color: var(--ink);
font-size: 0.79rem;
line-height: 1.35;
box-shadow: var(--shadow-sm);
opacity: 0;
pointer-events: none;
transform: translateY(4px);
transition: opacity 120ms ease, transform 120ms ease;
z-index: 20;
}
.help-tip:hover .help-tooltip,
.help-tip:focus .help-tooltip {
opacity: 1;
transform: translateY(0);
}
textarea,
input,
select {
width: 100%;
margin-top: 0.2rem;
padding: 0.54rem 0.58rem;
border: 1px solid var(--line-strong);
border-radius: var(--radius-sm);
background: color-mix(in srgb, var(--panel) 90%, var(--bg));
color: var(--ink);
font-size: 0.97rem;
}
textarea::placeholder,
input::placeholder {
color: color-mix(in srgb, var(--muted) 55%, transparent);
}
textarea {
resize: vertical;
}
textarea:focus,
input:focus,
select:focus,
button:focus,
a:focus {
outline: 2px solid color-mix(in srgb, var(--accent) 45%, transparent);
outline-offset: 1px;
}
.file-upload {
width: 100%;
margin-top: 0.2rem;
padding: 0.45rem;
border: 1px solid var(--line-strong);
border-radius: var(--radius-sm);
display: flex;
gap: 0.55rem;
align-items: center;
flex-wrap: wrap;
background: color-mix(in srgb, var(--panel) 88%, var(--bg));
}
#file-picker-btn {
background: color-mix(in srgb, var(--panel) 50%, var(--bg));
color: var(--ink);
border: 1px solid var(--line-strong);
}
#file-count {
color: var(--muted);
font-size: 0.95rem;
font-weight: 600;
}
.visually-hidden-file {
position: absolute;
width: 1px;
height: 1px;
padding: 0;
margin: -1px;
overflow: hidden;
clip: rect(0, 0, 0, 0);
white-space: nowrap;
border: 0;
}
fieldset {
margin: 0.65rem 0;
border: 1px solid var(--line);
border-radius: var(--radius-sm);
}
fieldset label {
font-weight: 500;
margin-top: 0.3rem;
}
.advanced-filters {
margin-top: 0.55rem;
padding: 0.2rem 0;
}
.advanced-filters > summary,
.check-help > summary {
list-style: none;
cursor: pointer;
display: flex;
align-items: center;
justify-content: space-between;
gap: 0.5rem;
}
.advanced-filters > summary::-webkit-details-marker,
.check-help > summary::-webkit-details-marker {
display: none;
}
.advanced-filters > summary::after,
.check-help > summary::after {
content: "";
width: 0.5rem;
height: 0.5rem;
border-right: 2px solid currentColor;
border-bottom: 2px solid currentColor;
transform: rotate(45deg);
transition: transform 140ms ease;
opacity: 0.75;
margin-top: -0.15rem;
}
.advanced-filters[open] > summary::after,
.check-help[open] > summary::after {
transform: rotate(225deg);
margin-top: 0.1rem;
}
.summary-title {
display: inline-flex;
align-items: center;
}
.row {
display: flex;
gap: 0.5rem;
align-items: center;
flex-wrap: wrap;
margin-top: 0.6rem;
}
.row.compact {
margin-top: 0.45rem;
}
button,
.exports a,
.chip {
padding: 0.42rem 0.72rem;
border-radius: var(--radius-sm);
text-decoration: none;
cursor: pointer;
font-weight: 600;
transition: background 120ms ease, border-color 120ms ease, color 120ms ease, transform 120ms ease;
}
button:hover,
.exports a:hover {
transform: translateY(-1px);
}
.btn-primary,
button[type="submit"] {
border: 1px solid var(--accent);
background: var(--accent);
color: var(--accent-ink);
}
.exports a {
border: 1px solid var(--accent);
background: var(--accent);
color: var(--accent-ink);
}
.btn-primary:hover,
button[type="submit"]:hover {
background: color-mix(in srgb, var(--accent) 90%, #000);
border-color: color-mix(in srgb, var(--accent) 90%, #000);
}
.btn-secondary,
button[type="button"],
#close-diff,
#close-checks {
border: 1px solid var(--line-strong);
background: color-mix(in srgb, var(--panel) 88%, var(--bg));
color: var(--accent);
}
.toggle-btn {
display: inline-flex;
align-items: center;
gap: 0.35rem;
}
.btn-icon {
width: 0.62rem;
height: 0.62rem;
border-radius: 2px;
border: 1.5px solid currentColor;
position: relative;
}
.btn-icon::after {
content: "";
position: absolute;
right: -0.26rem;
top: 0.14rem;
width: 0.26rem;
height: 0.26rem;
border-top: 1.5px solid currentColor;
border-right: 1.5px solid currentColor;
transform: rotate(45deg);
}
.btn-secondary:hover,
button[type="button"]:hover,
#close-diff:hover,
#close-checks:hover {
border-color: color-mix(in srgb, var(--accent) 25%, var(--line-strong));
background: color-mix(in srgb, var(--panel) 70%, var(--bg));
}
.theme-toggle {
min-width: 132px;
}
.status {
margin-top: 0.6rem;
font-size: 0.95rem;
border-radius: var(--radius-sm);
padding: 0.25rem 0.1rem;
}
.status-info {
color: var(--muted);
}
.status-ok {
color: color-mix(in srgb, var(--accent) 88%, var(--ink));
}
.status-warn {
color: #b45309;
}
.status-error {
color: var(--danger);
}
.parse-issues {
margin-top: 0.45rem;
padding: 0.5rem 0.55rem;
border: 1px solid color-mix(in srgb, var(--line) 70%, transparent);
border-radius: var(--radius-sm);
background: color-mix(in srgb, var(--panel) 84%, var(--bg));
}
.parse-issues strong {
display: block;
font-size: 0.86rem;
color: var(--muted);
}
#parse-issues-list {
margin: 0.35rem 0 0;
padding-left: 1rem;
}
#parse-issues-list li {
margin: 0.2rem 0;
font-size: 0.84rem;
color: var(--ink);
word-break: break-word;
}
.tool-actions {
display: flex;
gap: 0.5rem;
margin-top: 0.65rem;
}
.field-hint {
margin: 0.32rem 0 0;
color: var(--muted);
font-size: 0.82rem;
}
.path-result {
margin-top: 0.5rem;
border: 1px solid var(--line);
border-radius: var(--radius-sm);
padding: 0.45rem 0.55rem;
background: color-mix(in srgb, var(--panel) 88%, var(--bg));
color: var(--muted);
font-size: 0.84rem;
word-break: break-word;
}
.path-steps {
margin-top: 0.45rem;
display: flex;
flex-wrap: wrap;
gap: 0.35rem;
align-items: center;
}
.path-step {
border: 1px solid var(--line-strong);
background: color-mix(in srgb, var(--panel) 86%, var(--bg));
color: var(--ink);
border-radius: 999px;
padding: 0.2rem 0.48rem;
font-size: 0.78rem;
}
.path-step:hover {
border-color: color-mix(in srgb, var(--accent) 35%, var(--line-strong));
background: color-mix(in srgb, var(--accent) 12%, var(--panel));
}
.path-arrow {
color: var(--muted);
font-size: 0.8rem;
}
.graph-panel {
display: flex;
flex-direction: column;
position: relative;
}
.toolbar {
display: flex;
gap: 0.6rem;
align-items: center;
flex-wrap: wrap;
color: var(--muted);
margin-bottom: 0.4rem;
}
.kbd-hint {
margin-left: auto;
font-size: 0.78rem;
color: var(--muted);
}
.kbd-hint kbd {
border: 1px solid var(--line-strong);
border-bottom-width: 2px;
border-radius: 6px;
padding: 0.08rem 0.3rem;
background: color-mix(in srgb, var(--panel) 85%, var(--bg));
color: var(--ink);
font-family: var(--font-sans);
}
.toolbar select {
width: auto;
margin-top: 0;
padding: 0.25rem 0.4rem;
}
.toolbar button {
padding: 0.25rem 0.55rem;
font-size: 0.85rem;
}
.chips {
display: flex;
gap: 0.35rem;
flex-wrap: wrap;
margin-bottom: 0.45rem;
min-height: 1.7rem;
}
.chip {
background: var(--chip);
color: var(--muted);
border: 1px solid var(--line);
font-weight: 600;
padding: 0.22rem 0.5rem;
}
.legend {
display: flex;
gap: 0.7rem;
flex-wrap: wrap;
color: var(--muted);
font-size: 0.85rem;
margin-bottom: 0.45rem;
}
.dot {
width: 10px;
height: 10px;
display: inline-block;
border-radius: 50%;
margin-right: 0.3rem;
border: 1px solid rgba(15, 23, 42, 0.18);
}
.kind-workload {
background: #0f766e;
}
.kind-network {
background: #2563eb;
}
.kind-config {
background: #14b8a6;
}
.kind-secret {
background: #dc2626;
}
.kind-group {
background: #7c3aed;
}
.health-warning {
background: #f59e0b;
}
#graph-canvas {
width: 100%;
flex: 1;
min-height: 620px;
border: 1px dashed var(--line);
border-radius: var(--radius-sm);
background: linear-gradient(180deg, var(--canvas-top), var(--canvas-bottom));
}
.graph-overlay,
.no-match {
position: absolute;
top: 46%;
left: 50%;
transform: translate(-50%, -50%);
background: color-mix(in srgb, var(--panel) 94%, transparent);
border: 1px solid var(--line-strong);
border-radius: var(--radius-sm);
padding: 0.7rem 0.85rem;
min-width: min(420px, 85%);
display: flex;
flex-direction: column;
gap: 0.45rem;
align-items: flex-start;
box-shadow: var(--shadow-sm);
}
.graph-overlay span,
.no-match span {
color: var(--muted);
font-size: 0.9rem;
}
.details-panel pre {
max-height: 72vh;
overflow: auto;
background: var(--code-bg);
color: var(--code-ink);
padding: 0.7rem;
border-radius: var(--radius-sm);
font-size: 0.8rem;
box-shadow: inset 0 0 0 1px color-mix(in srgb, var(--line) 30%, transparent);
}
.sensitive {
color: var(--danger);
font-weight: 700;
}
.hidden {
display: none;
}
.edge-label {
font-size: 10px;
fill: var(--muted);
pointer-events: none;
user-select: none;
}
.findings-list {
list-style: none;
padding: 0;
margin: 0.5rem 0 0;
max-height: 55vh;
overflow: auto;
}
.findings-list li {
padding: 0.35rem 0.45rem;
margin-bottom: 0.35rem;
border: 1px solid var(--line);
border-radius: var(--radius-xs);
font-size: 0.85rem;
background: color-mix(in srgb, var(--panel) 90%, var(--bg));
}
.finding-error {
border-color: #ef4444;
}
.finding-warning {
border-color: #f59e0b;
}
.check-help {
margin-bottom: 0.55rem;
}
.check-help p {
margin: 0.35rem 0 0;
color: var(--muted);
font-size: 0.9rem;
}
.check-config {
max-height: 220px;
overflow: auto;
}
.collapse-controls {
margin-top: 0.5rem;
border: 1px solid var(--line);
border-radius: var(--radius-sm);
padding: 0.45rem;
background: color-mix(in srgb, var(--panel) 85%, var(--bg));
}
.collapse-controls label {
display: flex;
align-items: center;
gap: 0.4rem;
margin-top: 0.25rem;
}
.search-suggest {
margin-top: 0.35rem;
border: 1px solid var(--line);
border-radius: var(--radius-sm);
background: color-mix(in srgb, var(--panel) 94%, var(--bg));
padding: 0.25rem;
box-shadow: var(--shadow-sm);
}
.suggest-item {
width: 100%;
text-align: left;
border: 1px solid transparent;
background: transparent;
color: var(--ink);
padding: 0.38rem 0.45rem;
border-radius: var(--radius-xs);
cursor: pointer;
}
.suggest-item:hover,
.suggest-item.active {
border-color: var(--line);
background: color-mix(in srgb, var(--accent) 10%, var(--panel));
}
.edge-tooltip {
position: absolute;
pointer-events: none;
background: var(--tooltip-bg);
color: var(--tooltip-ink);
border: 1px solid color-mix(in srgb, var(--line) 70%, transparent);
border-radius: var(--radius-xs);
padding: 0.35rem 0.45rem;
font-size: 0.78rem;
max-width: 280px;
z-index: 20;
white-space: pre-line;
}
.minimap-wrap {
position: absolute;
right: 0.9rem;
bottom: 0.9rem;
width: 220px;
border: 1px solid var(--line);
border-radius: var(--radius-sm);
background: color-mix(in srgb, var(--panel) 92%, var(--bg));
box-shadow: var(--shadow-sm);
padding: 0.35rem;
}
.minimap-wrap strong {
font-size: 0.78rem;
color: var(--muted);
}
#minimap-canvas {
margin-top: 0.3rem;
width: 100%;
height: 132px;
border-radius: 6px;
border: 1px solid var(--line);
background: color-mix(in srgb, var(--canvas-top) 70%, var(--canvas-bottom));
cursor: crosshair;
}
.modal {
position: fixed;
inset: 0;
background: var(--overlay);
display: flex;
justify-content: center;
align-items: center;
z-index: 40;
}
.modal.hidden {
display: none;
}
.modal-card {
width: min(780px, 92vw);
max-height: 88vh;
overflow: auto;
background: var(--panel);
border: 1px solid var(--line);
border-radius: var(--radius-md);
padding: 0.8rem;
box-shadow: var(--shadow-md);
}
.modal-head {
display: flex;
justify-content: space-between;
align-items: center;
margin-bottom: 0.5rem;
}
.diff-output {
margin-top: 0.6rem;
border: 1px solid var(--line);
border-radius: var(--radius-sm);
padding: 0.5rem;
font-size: 0.85rem;
max-height: 220px;
overflow: auto;
background: color-mix(in srgb, var(--panel) 88%, var(--bg));
}
@media (max-width: 1280px) {
.layout {
grid-template-columns: 300px 1fr;
}
.details-panel {
grid-column: 1 / -1;
}
}
@media (max-width: 980px) {
.topbar {
flex-direction: column;
align-items: flex-start;
}
.theme-toggle {
align-self: flex-end;
}
.layout {
grid-template-columns: 1fr;
}
#graph-canvas {
min-height: 420px;
}
.kbd-hint {
width: 100%;
margin-left: 0;
}
.minimap-wrap {
position: static;
width: 100%;
margin-top: 0.5rem;
}
}

View File

@@ -0,0 +1,291 @@
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<title>{{ .Title }}</title>
<link rel="stylesheet" href="/static/styles.css">
<script defer src="https://unpkg.com/htmx.org@1.9.12"></script>
<script defer src="/static/app.js"></script>
</head>
<body>
<header class="topbar">
<div class="brand">
<img src="/static/logo.svg" alt="KubeViz logo" class="brand-logo">
<div>
<h1>KubeViz</h1>
<p>Kubernetes manifest relationship visualizer</p>
</div>
</div>
<button id="theme-toggle" class="btn-secondary theme-toggle" type="button" aria-label="Toggle theme">Theme: System</button>
</header>
<main class="layout">
<section class="left-panel">
<nav class="tabs" aria-label="Sidebar sections">
<button class="tab-btn active" data-tab="tab-data" type="button"><span class="tab-icon" aria-hidden="true"></span>Data</button>
<button class="tab-btn" data-tab="tab-filter" type="button"><span class="tab-icon" aria-hidden="true"></span>Filter</button>
</nav>
<section id="tab-data" class="tab-pane active">
<form id="manifest-form" hx-post="/api/manifests/parse" hx-encoding="multipart/form-data" hx-swap="none">
<label for="manifestText">Paste YAML</label>
<textarea id="manifestText" name="manifestText" rows="10" placeholder="apiVersion: apps/v1&#10;kind: Deployment&#10;..."></textarea>
<label for="manifestFile">
Or upload files
<span class="help-tip" tabindex="0" role="button" aria-label="Input format help">
?
<span class="help-tooltip" role="tooltip">
Expected input: rendered Kubernetes manifests with apiVersion, kind, and metadata.name.
Helm chart source files (Chart.yaml, values.yaml, templates/*.yaml) must be rendered first
(for example via helm template) or loaded via Import From Git / Helm.
</span>
</span>
</label>
<div class="file-upload">
<input id="manifestFile" class="visually-hidden-file" name="manifestFile" type="file" accept=".yaml,.yml,.json,text/yaml,application/x-yaml" multiple>
<button id="file-picker-btn" class="btn-secondary" type="button">Choose files</button>
<span id="file-count">No files selected</span>
</div>
<div class="row compact">
<button class="btn-primary" type="submit">Parse</button>
<button class="btn-secondary" type="button" id="clear-session">Clear</button>
</div>
</form>
<div class="status" id="parse-status"></div>
<div id="parse-issues" class="parse-issues hidden" aria-live="polite">
<strong>Parse Issues</strong>
<ul id="parse-issues-list"></ul>
</div>
<div class="status selected-summary">
<strong>Selected:</strong>
<span id="selected-kind-name">none</span>
</div>
<div class="tool-actions">
<button class="btn-secondary toggle-btn" id="open-checks" type="button"><span class="btn-icon" aria-hidden="true"></span>Checks</button>
<button class="btn-secondary toggle-btn" id="open-diff" type="button"><span class="btn-icon" aria-hidden="true"></span>Diff</button>
</div>
<div class="row exports compact">
<a id="export-svg" href="/api/export/svg" target="_blank" rel="noreferrer">Export SVG</a>
<a id="export-png" href="/api/export/png" target="_blank" rel="noreferrer">Export PNG</a>
</div>
<details class="advanced-filters">
<summary><span class="summary-title">Import From Git / Helm</span></summary>
<label for="git-repo-url">Git Repo URL</label>
<input id="git-repo-url" type="text" placeholder="https://github.com/org/repo.git">
<label for="git-ref">Git Ref (optional)</label>
<input id="git-ref" type="text" placeholder="main, tag, or commit">
<label for="git-path">Path In Repo (optional)</label>
<input id="git-path" type="text" placeholder="deploy/k8s or charts/my-app">
<label for="helm-values">Helm values YAML (optional)</label>
<textarea id="helm-values" rows="4" placeholder="replicaCount: 2"></textarea>
<div class="row compact">
<button class="btn-secondary" id="git-import-manifests" type="button">Import Manifests</button>
<button class="btn-secondary" id="git-import-helm" type="button">Render Helm</button>
</div>
</details>
</section>
<section id="tab-filter" class="tab-pane">
<form id="filter-form" hx-get="/api/graph" hx-swap="none">
<h3>Quick Filters</h3>
<label for="query">Search</label>
<input id="query" name="q" type="text" placeholder="name, kind, namespace or id">
<p class="field-hint">Search by name, kind, namespace, or full ID (for example: <code>default/Service/web</code>).</p>
<div id="search-suggest" class="search-suggest hidden" role="listbox" aria-label="Search suggestions"></div>
<div class="row compact">
<button class="btn-secondary" id="jump-to-search" type="button">Jump To Match</button>
</div>
<label for="groupBy">Group By</label>
<select id="groupBy" name="groupBy">
<option value="">None</option>
<option value="namespace">Namespace</option>
<option value="kind">Kind</option>
</select>
<fieldset>
<legend>Relations</legend>
<label><input type="checkbox" name="relations" value="selects" checked> selects</label>
<label><input type="checkbox" name="relations" value="mounts" checked> mounts</label>
<label><input type="checkbox" name="relations" value="references" checked> references</label>
<label><input type="checkbox" name="relations" value="owns" checked> owns</label>
<label><input type="checkbox" name="relations" value="routesTo" checked> routesTo</label>
<label><input type="checkbox" name="relations" value="scales" checked> scales</label>
</fieldset>
<details class="advanced-filters">
<summary><span class="summary-title">Advanced Filters</span></summary>
<label for="namespace">Namespace</label>
<input id="namespace" name="namespace" type="text" placeholder="default">
<label for="kind">Kind</label>
<input id="kind" name="kind" type="text" placeholder="Service">
<label for="focus">Focus Resource ID</label>
<input id="focus" name="focus" type="text" placeholder="default/Service/web">
<div id="collapse-controls" class="collapse-controls hidden">
<strong>Collapse Groups</strong>
<div id="collapse-list"></div>
</div>
</details>
<div class="row compact">
<button class="btn-secondary" type="button" id="reset-view">Reset Filters</button>
</div>
<h3>Saved Views</h3>
<label for="view-name">View Name</label>
<input id="view-name" type="text" placeholder="production-overview">
<div class="row compact">
<button class="btn-secondary" type="button" id="save-view">Save Current View</button>
</div>
<label for="saved-views">Saved</label>
<select id="saved-views">
<option value="">No saved views</option>
</select>
<div class="row compact">
<button class="btn-secondary" type="button" id="load-view">Load</button>
<button class="btn-secondary" type="button" id="delete-view">Delete</button>
</div>
<div class="row compact">
<button class="btn-secondary" type="button" id="export-views">Export JSON</button>
<button class="btn-secondary" type="button" id="import-views">Import JSON</button>
<input id="import-views-file" type="file" accept=".json,application/json" class="visually-hidden-file">
</div>
<h3>Path Finder</h3>
<label for="path-source">Source Node ID</label>
<input id="path-source" type="text" placeholder="default/Ingress/web">
<div id="path-source-suggest" class="search-suggest hidden" role="listbox" aria-label="Path source suggestions"></div>
<label for="path-target">Target Node ID</label>
<input id="path-target" type="text" placeholder="default/Secret/web-secret">
<div id="path-target-suggest" class="search-suggest hidden" role="listbox" aria-label="Path target suggestions"></div>
<label><input id="path-bidirectional" type="checkbox"> Allow reverse traversal</label>
<div class="row compact">
<button class="btn-secondary" type="button" id="run-path">Find Path</button>
<button class="btn-secondary" type="button" id="clear-path">Clear Path</button>
</div>
<div id="path-result" class="path-result">No path calculated.</div>
</form>
</section>
</section>
<section class="graph-panel">
<div class="toolbar">
<span>Total Nodes: <strong id="total-nodes">0</strong></span>
<span>Total Edges: <strong id="total-edges">0</strong></span>
<select id="layout-mode" title="Layout mode">
<option value="circular">Circular</option>
<option value="hierarchical">Hierarchical</option>
<option value="grid">Grid</option>
<option value="radial">Radial</option>
</select>
<button class="btn-secondary" id="zoom-out" type="button" title="Zoom out">-</button>
<button class="btn-secondary" id="zoom-in" type="button" title="Zoom in">+</button>
<button class="btn-secondary" id="zoom-reset" type="button" title="Reset zoom">Fit</button>
<span class="kbd-hint">Shortcuts: <kbd>/</kbd> Search, <kbd>d</kbd> Diff, <kbd>c</kbd> Checks</span>
</div>
<div id="active-filters" class="chips"></div>
<div class="legend" id="legend">
<span><i class="dot kind-workload"></i>Workload</span>
<span><i class="dot kind-network"></i>Network</span>
<span><i class="dot kind-config"></i>Config</span>
<span><i class="dot kind-secret"></i>Sensitive</span>
<span><i class="dot kind-group"></i>Group</span>
<span><i class="dot health-warning"></i>Warning</span>
</div>
<svg id="graph-canvas" viewBox="0 0 1200 720" aria-label="Resource graph"></svg>
<div id="graph-empty" class="graph-overlay hidden">
<strong>No manifests loaded yet.</strong>
<span>Paste YAML or upload files in <em>Data</em>, then click Parse.</span>
<button class="btn-secondary" id="open-data-tab" type="button">Go To Data</button>
</div>
<div id="no-match" class="no-match hidden">
<strong>No nodes match current filters.</strong>
<span>Try broader search terms or reset all filters.</span>
<button class="btn-secondary" id="open-filter-tab" type="button">Open Filters</button>
<button class="btn-secondary" id="clear-filters-inline" type="button">Reset Filters</button>
</div>
<div id="edge-tooltip" class="edge-tooltip hidden"></div>
<div class="minimap-wrap">
<strong>Minimap</strong>
<svg id="minimap-canvas" viewBox="0 0 1200 720" aria-label="Graph minimap"></svg>
</div>
</section>
<aside class="details-panel">
<h2>Resource Details</h2>
<p id="details-empty">Select a node to inspect details.</p>
<div id="details-content" class="hidden">
<p><strong id="details-kind"></strong> <span id="details-name"></span></p>
<p>Namespace: <span id="details-namespace"></span></p>
<p id="details-sensitive" class="sensitive hidden">Sensitive resource: values redacted</p>
<pre id="details-raw"></pre>
</div>
</aside>
</main>
<div id="diff-modal" class="modal hidden" role="dialog" aria-modal="true" aria-labelledby="diff-title">
<div class="modal-card">
<div class="modal-head">
<h3 id="diff-title">Manifest Diff</h3>
<button class="btn-secondary" id="close-diff" type="button">Close</button>
</div>
<label for="diff-base">Base manifests</label>
<textarea id="diff-base" rows="6" placeholder="Current state YAML"></textarea>
<label for="diff-target">Target manifests</label>
<textarea id="diff-target" rows="6" placeholder="New state YAML"></textarea>
<div class="row compact">
<button class="btn-primary" id="run-diff" type="button">Run Diff</button>
</div>
<div id="diff-output" class="diff-output">No diff executed.</div>
</div>
</div>
<div id="checks-modal" class="modal hidden" role="dialog" aria-modal="true" aria-labelledby="checks-title">
<div class="modal-card">
<div class="modal-head">
<h3 id="checks-title">Manifest Checks</h3>
<button class="btn-secondary" id="close-checks" type="button">Close</button>
</div>
<details class="check-help">
<summary><span class="summary-title">What is checked?</span></summary>
<p>Security and validation checks run on loaded manifests. Disable rules you do not want to evaluate.</p>
</details>
<fieldset class="check-config">
<legend>Enabled Rules</legend>
<label><input type="checkbox" name="checkRules" value="privileged_container" checked> Privileged container</label>
<label><input type="checkbox" name="checkRules" value="run_as_non_root_false" checked> runAsNonRoot=false</label>
<label><input type="checkbox" name="checkRules" value="missing_resource_requests" checked> Missing resource requests</label>
<label><input type="checkbox" name="checkRules" value="missing_resource_limits" checked> Missing resource limits</label>
<label><input type="checkbox" name="checkRules" value="ingress_wildcard_host" checked> Ingress wildcard/empty host</label>
<label><input type="checkbox" name="checkRules" value="unresolved_reference" checked> Unresolved references</label>
<label><input type="checkbox" name="checkRules" value="selector_mismatch" checked> Service selector mismatch</label>
<label><input type="checkbox" name="checkRules" value="duplicate_resource_id" checked> Duplicate resource IDs</label>
</fieldset>
<div class="row compact">
<button class="btn-secondary" id="reset-checks" type="button">Reset Check Defaults</button>
</div>
<div id="findings-summary">No checks yet.</div>
<ul id="findings-list" class="findings-list"></ul>
</div>
</div>
</body>
</html>

121
internal/model/model.go Normal file
View File

@@ -0,0 +1,121 @@
package model
import "time"
// Resource represents a normalized Kubernetes manifest.
type Resource struct {
ID string `json:"id"`
APIVersion string `json:"apiVersion"`
Kind string `json:"kind"`
Name string `json:"name"`
Namespace string `json:"namespace"`
ClusterScoped bool `json:"clusterScoped"`
Labels map[string]string `json:"labels,omitempty"`
Raw map[string]any `json:"raw"`
IsSensitive bool `json:"isSensitive"`
KeyNames []string `json:"keyNames,omitempty"`
References []ResourceReference `json:"references,omitempty"`
OwnerRefs []OwnerReference `json:"ownerReferences,omitempty"`
WorkloadMeta *WorkloadMetadata `json:"workloadMeta,omitempty"`
CreatedAt time.Time `json:"createdAt"`
}
type ResourceReference struct {
Kind string `json:"kind"`
Name string `json:"name"`
Namespace string `json:"namespace,omitempty"`
Relation string `json:"relation"`
}
type OwnerReference struct {
Kind string `json:"kind"`
Name string `json:"name"`
}
type WorkloadMetadata struct {
PodTemplateLabels map[string]string `json:"podTemplateLabels,omitempty"`
ServiceSelectors map[string]string `json:"serviceSelectors,omitempty"`
}
type ParseIssue struct {
Document int `json:"document"`
Message string `json:"message"`
}
type ParseSummary struct {
Resources int `json:"resources"`
Issues []ParseIssue `json:"issues"`
}
type Dataset struct {
Resources map[string]*Resource `json:"resources"`
Summary ParseSummary `json:"summary"`
Duplicates []string `json:"duplicates,omitempty"`
CreatedAt time.Time `json:"createdAt"`
ModifiedAt time.Time `json:"modifiedAt"`
}
type GraphNode struct {
ID string `json:"id"`
Kind string `json:"kind"`
Name string `json:"name"`
Namespace string `json:"namespace"`
Labels map[string]string `json:"labels,omitempty"`
HealthHint string `json:"healthHint,omitempty"`
IsSensitive bool `json:"isSensitive"`
IsGroup bool `json:"isGroup,omitempty"`
GroupBy string `json:"groupBy,omitempty"`
GroupKey string `json:"groupKey,omitempty"`
MemberCount int `json:"memberCount,omitempty"`
}
type GraphEdge struct {
Source string `json:"source"`
Target string `json:"target"`
RelationType string `json:"relationType"`
Label string `json:"label,omitempty"`
}
type GraphStats struct {
TotalNodes int `json:"totalNodes"`
TotalEdges int `json:"totalEdges"`
Kinds map[string]int `json:"kinds"`
}
type GraphResponse struct {
Nodes []GraphNode `json:"nodes"`
Edges []GraphEdge `json:"edges"`
Stats GraphStats `json:"stats"`
Groups []GraphGroup `json:"groups,omitempty"`
Findings []Finding `json:"findings,omitempty"`
}
type GraphGroup struct {
Key string `json:"key"`
Label string `json:"label"`
Mode string `json:"mode"`
Count int `json:"count"`
Collapsed bool `json:"collapsed"`
}
type Finding struct {
ID string `json:"id"`
Category string `json:"category"`
Rule string `json:"rule"`
Severity string `json:"severity"`
ResourceID string `json:"resourceId,omitempty"`
Message string `json:"message"`
}
type DiffItem struct {
ID string `json:"id"`
Kind string `json:"kind"`
Name string `json:"name"`
Namespace string `json:"namespace,omitempty"`
}
type DiffResponse struct {
Added []DiffItem `json:"added"`
Removed []DiffItem `json:"removed"`
Changed []DiffItem `json:"changed"`
}

524
internal/parser/parser.go Normal file
View File

@@ -0,0 +1,524 @@
package parser
import (
"fmt"
"sort"
"strings"
"time"
"kubeviz/internal/model"
)
var clusterScopedKinds = map[string]bool{
"Namespace": true,
"Node": true,
"PersistentVolume": true,
"CustomResourceDefinition": true,
"ClusterRole": true,
"ClusterRoleBinding": true,
"MutatingWebhookConfiguration": true,
"ValidatingWebhookConfiguration": true,
"StorageClass": true,
"PriorityClass": true,
"APIService": true,
}
func ParseManifests(input []byte) (*model.Dataset, error) {
dataset := &model.Dataset{
Resources: make(map[string]*model.Resource),
CreatedAt: time.Now(),
}
docs, err := parseYAMLDocuments(input)
if err != nil {
return nil, err
}
for docNum, doc := range docs {
if doc == nil {
continue
}
if err := parseDocument(doc, docNum+1, dataset); err != nil {
dataset.Summary.Issues = append(dataset.Summary.Issues, model.ParseIssue{
Document: docNum + 1,
Message: err.Error(),
})
}
}
dataset.Summary.Resources = len(dataset.Resources)
dataset.ModifiedAt = time.Now()
return dataset, nil
}
func parseDocument(doc any, docNum int, dataset *model.Dataset) error {
normalized, ok := normalizeMap(doc).(map[string]any)
if !ok {
return fmt.Errorf("document is not an object")
}
kind, _ := normalized["kind"].(string)
if kind == "List" {
items, _ := normalized["items"].([]any)
for idx, item := range items {
itemMap, ok := normalizeMap(item).(map[string]any)
if !ok {
dataset.Summary.Issues = append(dataset.Summary.Issues, model.ParseIssue{
Document: docNum,
Message: fmt.Sprintf("item %d is not an object", idx),
})
continue
}
res, err := normalizeResource(itemMap)
if err != nil {
dataset.Summary.Issues = append(dataset.Summary.Issues, model.ParseIssue{
Document: docNum,
Message: fmt.Sprintf("item %d: %v", idx, err),
})
continue
}
if _, exists := dataset.Resources[res.ID]; exists {
dataset.Duplicates = append(dataset.Duplicates, res.ID)
dataset.Summary.Issues = append(dataset.Summary.Issues, model.ParseIssue{
Document: docNum,
Message: fmt.Sprintf("duplicate resource id %q detected", res.ID),
})
}
dataset.Resources[res.ID] = res
}
return nil
}
res, err := normalizeResource(normalized)
if err != nil {
return err
}
if _, exists := dataset.Resources[res.ID]; exists {
dataset.Duplicates = append(dataset.Duplicates, res.ID)
}
dataset.Resources[res.ID] = res
return nil
}
func normalizeResource(raw map[string]any) (*model.Resource, error) {
apiVersion, _ := raw["apiVersion"].(string)
kind, _ := raw["kind"].(string)
meta, _ := raw["metadata"].(map[string]any)
name, _ := meta["name"].(string)
if apiVersion == "" {
return nil, fmt.Errorf("missing apiVersion")
}
if kind == "" {
return nil, fmt.Errorf("missing kind")
}
if name == "" {
return nil, fmt.Errorf("missing metadata.name")
}
namespace := "default"
clusterScoped := clusterScopedKinds[kind]
if ns, ok := meta["namespace"].(string); ok && ns != "" {
namespace = ns
}
if clusterScoped {
namespace = ""
}
labels := extractStringMap(meta["labels"])
id := resourceID(namespace, kind, name)
res := &model.Resource{
ID: id,
APIVersion: apiVersion,
Kind: kind,
Name: name,
Namespace: namespace,
ClusterScoped: clusterScoped,
Labels: labels,
Raw: deepCopy(raw),
IsSensitive: strings.EqualFold(kind, "Secret"),
CreatedAt: time.Now(),
}
if res.IsSensitive {
res.KeyNames = extractSecretKeyNames(raw)
redactSecretValues(res.Raw)
}
res.OwnerRefs = extractOwnerRefs(meta)
res.References = append(res.References, extractGenericRefs(raw, namespace)...)
res.References = append(res.References, extractTypedRefs(raw, kind, namespace)...)
res.WorkloadMeta = extractWorkloadMeta(raw, kind)
res.References = dedupeRefs(res.References)
return res, nil
}
func resourceID(namespace, kind, name string) string {
if namespace == "" {
return fmt.Sprintf("%s/%s", kind, name)
}
return fmt.Sprintf("%s/%s/%s", namespace, kind, name)
}
func ResourceID(namespace, kind, name string) string {
return resourceID(namespace, kind, name)
}
func normalizeMap(v any) any {
switch t := v.(type) {
case map[string]any:
m := map[string]any{}
for k, val := range t {
m[k] = normalizeMap(val)
}
return m
case map[any]any:
m := map[string]any{}
for k, val := range t {
m[fmt.Sprint(k)] = normalizeMap(val)
}
return m
case []any:
out := make([]any, 0, len(t))
for _, item := range t {
out = append(out, normalizeMap(item))
}
return out
default:
return t
}
}
func extractStringMap(v any) map[string]string {
src, ok := v.(map[string]any)
if !ok {
return nil
}
out := make(map[string]string)
for k, val := range src {
if s, ok := val.(string); ok {
out[k] = s
}
}
if len(out) == 0 {
return nil
}
return out
}
func extractOwnerRefs(meta map[string]any) []model.OwnerReference {
owners, _ := meta["ownerReferences"].([]any)
out := make([]model.OwnerReference, 0, len(owners))
for _, entry := range owners {
m, ok := entry.(map[string]any)
if !ok {
continue
}
kind, _ := m["kind"].(string)
name, _ := m["name"].(string)
if kind == "" || name == "" {
continue
}
out = append(out, model.OwnerReference{Kind: kind, Name: name})
}
return out
}
func extractSecretKeyNames(raw map[string]any) []string {
keys := map[string]struct{}{}
if data, ok := raw["data"].(map[string]any); ok {
for k := range data {
keys[k] = struct{}{}
}
}
if data, ok := raw["stringData"].(map[string]any); ok {
for k := range data {
keys[k] = struct{}{}
}
}
out := make([]string, 0, len(keys))
for k := range keys {
out = append(out, k)
}
sort.Strings(out)
return out
}
func redactSecretValues(raw map[string]any) {
for _, key := range []string{"data", "stringData"} {
data, ok := raw[key].(map[string]any)
if !ok {
continue
}
for k := range data {
data[k] = "<redacted>"
}
}
}
func extractWorkloadMeta(raw map[string]any, kind string) *model.WorkloadMetadata {
meta := &model.WorkloadMetadata{}
switch kind {
case "Deployment", "StatefulSet", "DaemonSet":
spec, _ := raw["spec"].(map[string]any)
tpl, _ := spec["template"].(map[string]any)
tplMeta, _ := tpl["metadata"].(map[string]any)
meta.PodTemplateLabels = extractStringMap(tplMeta["labels"])
case "Service":
spec, _ := raw["spec"].(map[string]any)
meta.ServiceSelectors = extractStringMap(spec["selector"])
}
if len(meta.PodTemplateLabels) == 0 && len(meta.ServiceSelectors) == 0 {
return nil
}
return meta
}
func extractTypedRefs(raw map[string]any, kind, defaultNamespace string) []model.ResourceReference {
refs := make([]model.ResourceReference, 0)
spec, _ := raw["spec"].(map[string]any)
if spec != nil {
refs = append(refs, extractRefsFromPodSpec(raw, defaultNamespace)...)
if kind == "Ingress" {
refs = append(refs, extractIngressRefs(spec, defaultNamespace)...)
}
if kind == "HorizontalPodAutoscaler" {
if target, ok := spec["scaleTargetRef"].(map[string]any); ok {
tKind, _ := target["kind"].(string)
tName, _ := target["name"].(string)
if tKind != "" && tName != "" {
refs = append(refs, model.ResourceReference{Kind: tKind, Name: tName, Namespace: defaultNamespace, Relation: "scales"})
}
}
}
}
return refs
}
func extractIngressRefs(spec map[string]any, namespace string) []model.ResourceReference {
refs := []model.ResourceReference{}
if backend, ok := spec["defaultBackend"].(map[string]any); ok {
if svc := serviceFromBackend(backend); svc != "" {
refs = append(refs, model.ResourceReference{Kind: "Service", Name: svc, Namespace: namespace, Relation: "routesTo"})
}
}
rules, _ := spec["rules"].([]any)
for _, r := range rules {
rule, ok := r.(map[string]any)
if !ok {
continue
}
http, _ := rule["http"].(map[string]any)
paths, _ := http["paths"].([]any)
for _, p := range paths {
path, ok := p.(map[string]any)
if !ok {
continue
}
backend, _ := path["backend"].(map[string]any)
if svc := serviceFromBackend(backend); svc != "" {
refs = append(refs, model.ResourceReference{Kind: "Service", Name: svc, Namespace: namespace, Relation: "routesTo"})
}
}
}
return refs
}
func serviceFromBackend(backend map[string]any) string {
svc, _ := backend["service"].(map[string]any)
name, _ := svc["name"].(string)
return name
}
func extractRefsFromPodSpec(raw map[string]any, namespace string) []model.ResourceReference {
podSpec := findPodSpec(raw)
if podSpec == nil {
return nil
}
refs := []model.ResourceReference{}
if vols, ok := podSpec["volumes"].([]any); ok {
for _, v := range vols {
vol, ok := v.(map[string]any)
if !ok {
continue
}
if cm, ok := vol["configMap"].(map[string]any); ok {
if name, _ := cm["name"].(string); name != "" {
refs = append(refs, model.ResourceReference{Kind: "ConfigMap", Name: name, Namespace: namespace, Relation: "mounts"})
}
}
if sec, ok := vol["secret"].(map[string]any); ok {
if name, _ := sec["secretName"].(string); name != "" {
refs = append(refs, model.ResourceReference{Kind: "Secret", Name: name, Namespace: namespace, Relation: "mounts"})
}
}
if pvc, ok := vol["persistentVolumeClaim"].(map[string]any); ok {
if name, _ := pvc["claimName"].(string); name != "" {
refs = append(refs, model.ResourceReference{Kind: "PersistentVolumeClaim", Name: name, Namespace: namespace, Relation: "mounts"})
}
}
}
}
for _, containerType := range []string{"containers", "initContainers"} {
containers, _ := podSpec[containerType].([]any)
for _, c := range containers {
container, ok := c.(map[string]any)
if !ok {
continue
}
env, _ := container["env"].([]any)
for _, e := range env {
envVar, ok := e.(map[string]any)
if !ok {
continue
}
valueFrom, _ := envVar["valueFrom"].(map[string]any)
if cmRef, ok := valueFrom["configMapKeyRef"].(map[string]any); ok {
if name, _ := cmRef["name"].(string); name != "" {
refs = append(refs, model.ResourceReference{Kind: "ConfigMap", Name: name, Namespace: namespace, Relation: "references"})
}
}
if secRef, ok := valueFrom["secretKeyRef"].(map[string]any); ok {
if name, _ := secRef["name"].(string); name != "" {
refs = append(refs, model.ResourceReference{Kind: "Secret", Name: name, Namespace: namespace, Relation: "references"})
}
}
}
envFrom, _ := container["envFrom"].([]any)
for _, ef := range envFrom {
entry, ok := ef.(map[string]any)
if !ok {
continue
}
if cmRef, ok := entry["configMapRef"].(map[string]any); ok {
if name, _ := cmRef["name"].(string); name != "" {
refs = append(refs, model.ResourceReference{Kind: "ConfigMap", Name: name, Namespace: namespace, Relation: "references"})
}
}
if secRef, ok := entry["secretRef"].(map[string]any); ok {
if name, _ := secRef["name"].(string); name != "" {
refs = append(refs, model.ResourceReference{Kind: "Secret", Name: name, Namespace: namespace, Relation: "references"})
}
}
}
}
}
return refs
}
func findPodSpec(raw map[string]any) map[string]any {
spec, _ := raw["spec"].(map[string]any)
if spec == nil {
return nil
}
if template, ok := spec["template"].(map[string]any); ok {
if tplSpec, ok := template["spec"].(map[string]any); ok {
return tplSpec
}
}
if containers, ok := spec["containers"]; ok {
if _, valid := containers.([]any); valid {
return spec
}
}
if jobTemplate, ok := spec["jobTemplate"].(map[string]any); ok {
if jtSpec, ok := jobTemplate["spec"].(map[string]any); ok {
if template, ok := jtSpec["template"].(map[string]any); ok {
if tplSpec, ok := template["spec"].(map[string]any); ok {
return tplSpec
}
}
}
}
return nil
}
func extractGenericRefs(raw map[string]any, namespace string) []model.ResourceReference {
refs := []model.ResourceReference{}
walkMap(raw, func(k string, v any) {
if strings.HasSuffix(k, "Name") {
if name, ok := v.(string); ok && name != "" {
kind := guessKindFromField(k)
if kind != "" {
refs = append(refs, model.ResourceReference{Kind: kind, Name: name, Namespace: namespace, Relation: "references"})
}
}
}
})
return refs
}
func walkMap(v any, fn func(string, any)) {
switch m := v.(type) {
case map[string]any:
for k, value := range m {
fn(k, value)
walkMap(value, fn)
}
case []any:
for _, item := range m {
walkMap(item, fn)
}
}
}
func guessKindFromField(field string) string {
lower := strings.ToLower(field)
switch {
case strings.Contains(lower, "secret"):
return "Secret"
case strings.Contains(lower, "configmap"):
return "ConfigMap"
case strings.Contains(lower, "service"):
return "Service"
case strings.Contains(lower, "claim"):
return "PersistentVolumeClaim"
default:
return ""
}
}
func deepCopy(src map[string]any) map[string]any {
out := make(map[string]any, len(src))
for k, v := range src {
switch typed := v.(type) {
case map[string]any:
out[k] = deepCopy(typed)
case []any:
copied := make([]any, len(typed))
for i := range typed {
if m, ok := typed[i].(map[string]any); ok {
copied[i] = deepCopy(m)
} else {
copied[i] = typed[i]
}
}
out[k] = copied
default:
out[k] = v
}
}
return out
}
func dedupeRefs(refs []model.ResourceReference) []model.ResourceReference {
seen := map[string]struct{}{}
out := make([]model.ResourceReference, 0, len(refs))
for _, ref := range refs {
key := fmt.Sprintf("%s|%s|%s|%s", ref.Kind, ref.Name, ref.Namespace, ref.Relation)
if _, ok := seen[key]; ok {
continue
}
seen[key] = struct{}{}
out = append(out, ref)
}
return out
}

View File

@@ -0,0 +1,145 @@
package parser
import (
"testing"
)
func TestParseManifestsMultiDocAndSecretRedaction(t *testing.T) {
input := []byte(`
apiVersion: apps/v1
kind: Deployment
metadata:
name: web
namespace: demo
spec:
template:
metadata:
labels:
app: web
spec:
containers:
- name: app
image: nginx
env:
- name: PASSWORD
valueFrom:
secretKeyRef:
name: app-secret
key: password
---
apiVersion: v1
kind: Service
metadata:
name: web
namespace: demo
spec:
selector:
app: web
---
apiVersion: v1
kind: Secret
metadata:
name: app-secret
namespace: demo
data:
password: c2VjcmV0
`)
ds, err := ParseManifests(input)
if err != nil {
t.Fatalf("ParseManifests returned error: %v", err)
}
if got, want := ds.Summary.Resources, 3; got != want {
t.Fatalf("resource count mismatch: got %d want %d", got, want)
}
sec := ds.Resources["demo/Secret/app-secret"]
if sec == nil {
t.Fatalf("secret not found")
}
if !sec.IsSensitive {
t.Fatalf("secret should be sensitive")
}
data, ok := sec.Raw["data"].(map[string]any)
if !ok {
t.Fatalf("secret data should exist")
}
if got := data["password"]; got != "<redacted>" {
t.Fatalf("secret value was not redacted: %v", got)
}
}
func TestParseManifestsInvalidYAML(t *testing.T) {
_, err := ParseManifests([]byte("apiVersion: v1\nkind"))
if err == nil {
t.Fatalf("expected parse error for invalid yaml")
}
}
func TestParseDeploymentWithEnvFromConfigMapRef(t *testing.T) {
input := []byte(`apiVersion: apps/v1
kind: Deployment
metadata:
name: kubeviz
namespace: kubeviz
spec:
selector:
matchLabels:
app: kubeviz
template:
metadata:
labels:
app: kubeviz
spec:
containers:
- name: kubeviz
image: kubeviz:latest
envFrom:
- configMapRef:
name: kubeviz-config
`)
ds, err := ParseManifests(input)
if err != nil {
t.Fatalf("ParseManifests returned error: %v", err)
}
if got, want := ds.Summary.Resources, 1; got != want {
t.Fatalf("resource count mismatch: got %d want %d", got, want)
}
}
func TestParseIngressTLSHostsAndSecretName(t *testing.T) {
input := []byte(`apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: kubeviz
namespace: kubeviz
spec:
tls:
- hosts:
- kubeviz.local
secretName: kubeviz-tls
rules:
- host: kubeviz.local
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: kubeviz
port:
number: 80
`)
ds, err := ParseManifests(input)
if err != nil {
t.Fatalf("ParseManifests returned error: %v", err)
}
if got, want := ds.Summary.Resources, 1; got != want {
t.Fatalf("resource count mismatch: got %d want %d", got, want)
}
if len(ds.Summary.Issues) != 0 {
t.Fatalf("expected no parse issues, got: %+v", ds.Summary.Issues)
}
}

304
internal/parser/yamlmini.go Normal file
View File

@@ -0,0 +1,304 @@
package parser
import (
"encoding/json"
"fmt"
"strconv"
"strings"
)
func parseYAMLDocuments(input []byte) ([]any, error) {
raw := string(input)
docsRaw := splitYAMLDocuments(raw)
docs := make([]any, 0, len(docsRaw))
for _, doc := range docsRaw {
trimmed := strings.TrimSpace(doc)
if trimmed == "" {
continue
}
if strings.HasPrefix(trimmed, "{") || strings.HasPrefix(trimmed, "[") {
var parsed any
if err := json.Unmarshal([]byte(trimmed), &parsed); err != nil {
return nil, fmt.Errorf("json parse failed: %w", err)
}
docs = append(docs, parsed)
continue
}
parsed, err := parseYAMLDoc(trimmed)
if err != nil {
return nil, err
}
docs = append(docs, parsed)
}
return docs, nil
}
func splitYAMLDocuments(input string) []string {
lines := strings.Split(input, "\n")
parts := []string{}
cur := []string{}
for _, line := range lines {
if strings.TrimSpace(line) == "---" {
parts = append(parts, strings.Join(cur, "\n"))
cur = cur[:0]
continue
}
cur = append(cur, line)
}
parts = append(parts, strings.Join(cur, "\n"))
return parts
}
func parseYAMLDoc(doc string) (any, error) {
lines := preprocessLines(doc)
if len(lines) == 0 {
return nil, nil
}
v, next, err := parseBlock(lines, 0, 0)
if err != nil {
return nil, err
}
if next < len(lines) {
return nil, fmt.Errorf("unexpected content near line %d", lines[next].num)
}
return v, nil
}
type yamlLine struct {
num int
indent int
text string
}
func preprocessLines(doc string) []yamlLine {
raw := strings.Split(doc, "\n")
out := make([]yamlLine, 0, len(raw))
for i, line := range raw {
if strings.TrimSpace(line) == "" {
continue
}
clean := stripInlineComment(line)
if strings.TrimSpace(clean) == "" {
continue
}
indent := countIndent(clean)
text := strings.TrimSpace(clean)
out = append(out, yamlLine{num: i + 1, indent: indent, text: text})
}
return out
}
func parseBlock(lines []yamlLine, idx int, indent int) (any, int, error) {
if idx >= len(lines) {
return nil, idx, nil
}
if lines[idx].indent < indent {
return nil, idx, nil
}
if strings.HasPrefix(lines[idx].text, "- ") || lines[idx].text == "-" {
return parseList(lines, idx, indent)
}
return parseMap(lines, idx, indent)
}
func parseMap(lines []yamlLine, idx int, indent int) (map[string]any, int, error) {
out := map[string]any{}
for idx < len(lines) {
line := lines[idx]
if line.indent < indent {
break
}
if line.indent > indent {
break
}
if strings.HasPrefix(line.text, "- ") || line.text == "-" {
break
}
key, value, valid, hasValue := splitKeyValue(line.text)
if !valid {
return nil, idx, fmt.Errorf("line %d: invalid mapping", line.num)
}
if hasValue {
out[key] = parseScalar(value)
idx++
continue
}
childIndent := indent + 2
if idx+1 < len(lines) && lines[idx+1].indent >= indent {
childIndent = lines[idx+1].indent
}
nested, next, err := parseBlock(lines, idx+1, childIndent)
if err != nil {
return nil, idx, err
}
out[key] = nested
idx = next
}
return out, idx, nil
}
func parseList(lines []yamlLine, idx int, indent int) ([]any, int, error) {
out := []any{}
for idx < len(lines) {
line := lines[idx]
if line.indent < indent {
break
}
if line.indent > indent {
break
}
if !strings.HasPrefix(line.text, "-") {
break
}
itemText := strings.TrimSpace(strings.TrimPrefix(line.text, "-"))
idx++
if itemText == "" {
nested, next, err := parseBlock(lines, idx, indent+2)
if err != nil {
return nil, idx, err
}
out = append(out, nested)
idx = next
continue
}
if k, v, valid, hasValue := splitKeyValue(itemText); valid {
m := map[string]any{}
if hasValue {
m[k] = parseScalar(v)
if idx < len(lines) && lines[idx].indent > indent {
nested, next, err := parseBlock(lines, idx, indent+2)
if err != nil {
return nil, idx, err
}
if nestedMap, ok := nested.(map[string]any); ok {
for nk, nv := range nestedMap {
m[nk] = nv
}
}
idx = next
}
} else {
childIndent := indent + 2
if idx < len(lines) && lines[idx].indent >= indent {
childIndent = lines[idx].indent
}
nested, next, err := parseBlock(lines, idx, childIndent)
if err != nil {
return nil, idx, err
}
m[k] = nested
idx = next
// YAML list items may continue with sibling keys after an inline key without value:
// - hosts:
// - example.local
// secretName: demo-tls
if idx < len(lines) && lines[idx].indent >= childIndent && !strings.HasPrefix(lines[idx].text, "-") {
extra, nextMap, err := parseMap(lines, idx, childIndent)
if err != nil {
return nil, idx, err
}
for ek, ev := range extra {
m[ek] = ev
}
idx = nextMap
}
}
out = append(out, m)
continue
}
out = append(out, parseScalar(itemText))
}
return out, idx, nil
}
func splitKeyValue(text string) (string, string, bool, bool) {
parts := strings.SplitN(text, ":", 2)
if len(parts) != 2 {
return "", "", false, false
}
key := strings.TrimSpace(parts[0])
value := strings.TrimSpace(parts[1])
if key == "" {
return "", "", false, false
}
if value == "" {
return key, "", true, false
}
return key, value, true, true
}
func parseScalar(s string) any {
s = strings.TrimSpace(s)
if s == "" {
return ""
}
if strings.HasPrefix(s, "\"") && strings.HasSuffix(s, "\"") && len(s) >= 2 {
return strings.Trim(s, "\"")
}
if strings.HasPrefix(s, "'") && strings.HasSuffix(s, "'") && len(s) >= 2 {
return strings.Trim(s, "'")
}
lower := strings.ToLower(s)
if lower == "true" {
return true
}
if lower == "false" {
return false
}
if lower == "null" || s == "~" {
return nil
}
if i, err := strconv.Atoi(s); err == nil {
return i
}
if f, err := strconv.ParseFloat(s, 64); err == nil {
return f
}
if strings.HasPrefix(s, "{") || strings.HasPrefix(s, "[") {
var out any
if err := json.Unmarshal([]byte(s), &out); err == nil {
return out
}
}
return s
}
func stripInlineComment(line string) string {
inSingle := false
inDouble := false
for i, r := range line {
switch r {
case '\'':
if !inDouble {
inSingle = !inSingle
}
case '"':
if !inSingle {
inDouble = !inDouble
}
case '#':
if !inSingle && !inDouble {
if i == 0 || line[i-1] == ' ' || line[i-1] == '\t' {
return strings.TrimRight(line[:i], " \t")
}
}
}
}
return line
}
func countIndent(line string) int {
count := 0
for _, r := range line {
if r == ' ' {
count++
continue
}
break
}
return count
}

95
internal/session/store.go Normal file
View File

@@ -0,0 +1,95 @@
package session
import (
"crypto/rand"
"encoding/hex"
"sync"
"time"
"kubeviz/internal/model"
)
type sessionData struct {
Dataset *model.Dataset
LastAccess time.Time
}
type Store struct {
mu sync.RWMutex
sessions map[string]*sessionData
ttl time.Duration
stopCh chan struct{}
}
func NewStore(ttl time.Duration) *Store {
s := &Store{
sessions: make(map[string]*sessionData),
ttl: ttl,
stopCh: make(chan struct{}),
}
go s.cleanupLoop()
return s
}
func (s *Store) Stop() {
close(s.stopCh)
}
func (s *Store) NewSessionID() (string, error) {
buf := make([]byte, 16)
if _, err := rand.Read(buf); err != nil {
return "", err
}
return hex.EncodeToString(buf), nil
}
func (s *Store) GetDataset(sessionID string) *model.Dataset {
s.mu.Lock()
defer s.mu.Unlock()
entry, ok := s.sessions[sessionID]
if !ok {
return nil
}
entry.LastAccess = time.Now()
return entry.Dataset
}
func (s *Store) SetDataset(sessionID string, ds *model.Dataset) {
s.mu.Lock()
defer s.mu.Unlock()
s.sessions[sessionID] = &sessionData{Dataset: ds, LastAccess: time.Now()}
}
func (s *Store) Clear(sessionID string) {
s.mu.Lock()
defer s.mu.Unlock()
delete(s.sessions, sessionID)
}
func (s *Store) cleanupLoop() {
ticker := time.NewTicker(1 * time.Minute)
defer ticker.Stop()
for {
select {
case <-s.stopCh:
return
case <-ticker.C:
s.cleanupExpired()
}
}
}
func (s *Store) cleanupExpired() {
if s.ttl <= 0 {
return
}
cutoff := time.Now().Add(-s.ttl)
s.mu.Lock()
defer s.mu.Unlock()
for id, sess := range s.sessions {
if sess.LastAccess.Before(cutoff) {
delete(s.sessions, id)
}
}
}

27
scripts/deploy-with-podman.sh Executable file
View File

@@ -0,0 +1,27 @@
#!/usr/bin/env bash
set -euo pipefail
IMAGE_REPO="${IMAGE_REPO:-localhost/kubeviz}"
IMAGE_TAG="${IMAGE_TAG:-prod}"
SERVICE_NAME="${SERVICE_NAME:-kubeviz.service}"
if git rev-parse --short=12 HEAD >/dev/null 2>&1; then
BUILD_ID="$(git rev-parse --short=12 HEAD)"
else
BUILD_ID="$(date +%s)"
fi
SOURCE_IMAGE="${IMAGE_REPO}:ci-${BUILD_ID}"
RELEASE_IMAGE="${IMAGE_REPO}:${IMAGE_TAG}"
echo "Building ${SOURCE_IMAGE}"
sudo podman build --pull=always -t "${SOURCE_IMAGE}" .
echo "Tagging ${RELEASE_IMAGE}"
sudo podman tag "${SOURCE_IMAGE}" "${RELEASE_IMAGE}"
echo "Restarting ${SERVICE_NAME}"
sudo systemctl restart "${SERVICE_NAME}"
sudo systemctl is-active --quiet "${SERVICE_NAME}"
echo "Deployment successful: ${RELEASE_IMAGE}"

20
testdata/README.md vendored Normal file
View File

@@ -0,0 +1,20 @@
# KubeViz Testdaten
Dieses Verzeichnis enthält sofort nutzbare Testdaten für:
- Multi-File Upload (`testdata/manifests/...`)
- Fehlertolerantes Parsing mit defekten Dateien (`testdata/manifests/partials`)
- Secret-Redaction (`testdata/manifests/sensitive`)
- Helm-Rendering (`testdata/helm/kubeviz-sample`)
## Empfohlene Tests
1. Upload `testdata/manifests/kube-stack/*.yaml`
2. Upload `testdata/manifests/partials/*.yaml` (enthält eine defekte Datei)
3. Upload `testdata/manifests/sensitive/*.yaml` und prüfe Secret-Redaction
4. Git/Helm: nutze das Chart unter `testdata/helm/kubeviz-sample`
## Helm lokal testen
```bash
helm template demo ./testdata/helm/kubeviz-sample --namespace demo
```

View File

@@ -0,0 +1,6 @@
apiVersion: v2
name: kubeviz-sample
description: Sample chart for KubeViz graph testing
type: application
version: 0.1.0
appVersion: "1.0.0"

View File

@@ -0,0 +1,24 @@
{{- define "kubeviz-sample.name" -}}
{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}}
{{- end -}}
{{- define "kubeviz-sample.fullname" -}}
{{- if .Values.fullnameOverride -}}
{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" -}}
{{- else -}}
{{- printf "%s-%s" .Release.Name (include "kubeviz-sample.name" .) | trunc 63 | trimSuffix "-" -}}
{{- end -}}
{{- end -}}
{{- define "kubeviz-sample.labels" -}}
app.kubernetes.io/name: {{ include "kubeviz-sample.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }}
{{- end -}}
{{- define "kubeviz-sample.namespace" -}}
{{- if .Values.namespaceOverride -}}
{{- .Values.namespaceOverride -}}
{{- else -}}
{{- .Release.Namespace -}}
{{- end -}}
{{- end -}}

View File

@@ -0,0 +1,9 @@
apiVersion: v1
kind: ConfigMap
metadata:
name: {{ include "kubeviz-sample.fullname" . }}-config
namespace: {{ include "kubeviz-sample.namespace" . }}
labels:
{{- include "kubeviz-sample.labels" . | nindent 4 }}
data:
APP_MODE: {{ .Values.config.appMode | quote }}

View File

@@ -0,0 +1,37 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: {{ include "kubeviz-sample.fullname" . }}
namespace: {{ include "kubeviz-sample.namespace" . }}
labels:
{{- include "kubeviz-sample.labels" . | nindent 4 }}
spec:
replicas: {{ .Values.replicaCount }}
selector:
matchLabels:
app.kubernetes.io/name: {{ include "kubeviz-sample.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }}
template:
metadata:
labels:
app.kubernetes.io/name: {{ include "kubeviz-sample.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }}
spec:
containers:
- name: app
image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}"
imagePullPolicy: {{ .Values.image.pullPolicy }}
ports:
- containerPort: {{ .Values.service.targetPort }}
name: http
env:
- name: APP_MODE
valueFrom:
configMapKeyRef:
name: {{ include "kubeviz-sample.fullname" . }}-config
key: APP_MODE
- name: API_TOKEN
valueFrom:
secretKeyRef:
name: {{ include "kubeviz-sample.fullname" . }}-secret
key: API_TOKEN

View File

@@ -0,0 +1,23 @@
{{- if .Values.hpa.enabled }}
apiVersion: autoscaling/v2
kind: HorizontalPodAutoscaler
metadata:
name: {{ include "kubeviz-sample.fullname" . }}
namespace: {{ include "kubeviz-sample.namespace" . }}
labels:
{{- include "kubeviz-sample.labels" . | nindent 4 }}
spec:
scaleTargetRef:
apiVersion: apps/v1
kind: Deployment
name: {{ include "kubeviz-sample.fullname" . }}
minReplicas: {{ .Values.hpa.minReplicas }}
maxReplicas: {{ .Values.hpa.maxReplicas }}
metrics:
- type: Resource
resource:
name: cpu
target:
type: Utilization
averageUtilization: {{ .Values.hpa.averageCPUUtilization }}
{{- end }}

View File

@@ -0,0 +1,24 @@
{{- if .Values.ingress.enabled }}
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: {{ include "kubeviz-sample.fullname" . }}
namespace: {{ include "kubeviz-sample.namespace" . }}
labels:
{{- include "kubeviz-sample.labels" . | nindent 4 }}
spec:
{{- if .Values.ingress.className }}
ingressClassName: {{ .Values.ingress.className }}
{{- end }}
rules:
- host: {{ .Values.ingress.host | quote }}
http:
paths:
- path: {{ .Values.ingress.path | quote }}
pathType: Prefix
backend:
service:
name: {{ include "kubeviz-sample.fullname" . }}
port:
number: {{ .Values.service.port }}
{{- end }}

View File

@@ -0,0 +1,10 @@
apiVersion: v1
kind: Secret
metadata:
name: {{ include "kubeviz-sample.fullname" . }}-secret
namespace: {{ include "kubeviz-sample.namespace" . }}
labels:
{{- include "kubeviz-sample.labels" . | nindent 4 }}
type: Opaque
stringData:
API_TOKEN: {{ .Values.secret.apiToken | quote }}

View File

@@ -0,0 +1,17 @@
apiVersion: v1
kind: Service
metadata:
name: {{ include "kubeviz-sample.fullname" . }}
namespace: {{ include "kubeviz-sample.namespace" . }}
labels:
{{- include "kubeviz-sample.labels" . | nindent 4 }}
spec:
type: {{ .Values.service.type }}
selector:
app.kubernetes.io/name: {{ include "kubeviz-sample.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }}
ports:
- name: http
port: {{ .Values.service.port }}
targetPort: {{ .Values.service.targetPort }}
protocol: {{ .Values.service.protocol }}

View File

@@ -0,0 +1,35 @@
nameOverride: ""
fullnameOverride: ""
namespaceOverride: ""
replicaCount: 2
image:
repository: nginx
tag: "1.27"
pullPolicy: IfNotPresent
service:
type: ClusterIP
port: 80
targetPort: 8080
protocol: TCP
ingress:
enabled: true
className: ""
host: chart.demo.local
path: /
config:
appMode: production
secret:
apiToken: change-me
hpa:
enabled: true
minReplicas: 2
maxReplicas: 5
averageCPUUtilization: 70

View File

@@ -0,0 +1,4 @@
apiVersion: v1
kind: Namespace
metadata:
name: demo

View File

@@ -0,0 +1,8 @@
apiVersion: v1
kind: ConfigMap
metadata:
name: web-config
namespace: demo
data:
APP_MODE: production
FEATURE_FLAG_X: "true"

View File

@@ -0,0 +1,9 @@
apiVersion: v1
kind: Secret
metadata:
name: web-secret
namespace: demo
type: Opaque
stringData:
DB_PASSWORD: super-secret
API_TOKEN: please-redact

View File

@@ -0,0 +1,11 @@
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: web-data
namespace: demo
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 1Gi

View File

@@ -0,0 +1,38 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: web
namespace: demo
spec:
replicas: 2
selector:
matchLabels:
app: web
template:
metadata:
labels:
app: web
spec:
containers:
- name: web
image: nginx:1.27
ports:
- containerPort: 8080
env:
- name: APP_MODE
valueFrom:
configMapKeyRef:
name: web-config
key: APP_MODE
- name: DB_PASSWORD
valueFrom:
secretKeyRef:
name: web-secret
key: DB_PASSWORD
volumeMounts:
- name: data
mountPath: /var/lib/data
volumes:
- name: data
persistentVolumeClaim:
claimName: web-data

View File

@@ -0,0 +1,13 @@
apiVersion: v1
kind: Service
metadata:
name: web
namespace: demo
spec:
selector:
app: web
ports:
- name: http
port: 80
targetPort: 8080
protocol: TCP

View File

@@ -0,0 +1,17 @@
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: web
namespace: demo
spec:
rules:
- host: web.demo.local
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: web
port:
number: 80

View File

@@ -0,0 +1,19 @@
apiVersion: autoscaling/v2
kind: HorizontalPodAutoscaler
metadata:
name: web
namespace: demo
spec:
scaleTargetRef:
apiVersion: apps/v1
kind: Deployment
name: web
minReplicas: 2
maxReplicas: 5
metrics:
- type: Resource
resource:
name: cpu
target:
type: Utilization
averageUtilization: 70

View File

@@ -0,0 +1,5 @@
apiVersion: v1
kind Service
metadata:
name: broken
namespace: partial

View File

@@ -0,0 +1,20 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: partial-ok
namespace: partial
spec:
replicas: 1
selector:
matchLabels:
app: partial-ok
template:
metadata:
labels:
app: partial-ok
spec:
containers:
- name: app
image: nginx:1.27
ports:
- containerPort: 8080

View File

@@ -0,0 +1,11 @@
apiVersion: v1
kind: Service
metadata:
name: partial-ok
namespace: partial
spec:
selector:
app: partial-ok
ports:
- port: 80
targetPort: 8080

View File

@@ -0,0 +1,9 @@
apiVersion: v1
kind: Secret
metadata:
name: only-secret
namespace: sensitive
type: Opaque
data:
password: c3VwZXJzZWNyZXQ=
token: c2hvdWxkLWJlLXJlZGFjdGVk