mirror of https://github.com/k3s-io/k3s
255 lines
11 KiB
Go
255 lines
11 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package apiclient
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
apps "k8s.io/api/apps/v1"
|
|
"k8s.io/api/core/v1"
|
|
rbac "k8s.io/api/rbac/v1"
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
"k8s.io/apimachinery/pkg/util/strategicpatch"
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
clientset "k8s.io/client-go/kubernetes"
|
|
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
|
)
|
|
|
|
// TODO: We should invent a dynamic mechanism for this using the dynamic client instead of hard-coding these functions per-type
|
|
// TODO: We may want to retry if .Update() fails on 409 Conflict
|
|
|
|
// CreateOrUpdateConfigMap creates a ConfigMap if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateConfigMap(client clientset.Interface, cm *v1.ConfigMap) error {
|
|
if _, err := client.CoreV1().ConfigMaps(cm.ObjectMeta.Namespace).Create(cm); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return errors.Wrap(err, "unable to create configmap")
|
|
}
|
|
|
|
if _, err := client.CoreV1().ConfigMaps(cm.ObjectMeta.Namespace).Update(cm); err != nil {
|
|
return errors.Wrap(err, "unable to update configmap")
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrRetainConfigMap creates a ConfigMap if the target resource doesn't exist. If the resource exists already, this function will retain the resource instead.
|
|
func CreateOrRetainConfigMap(client clientset.Interface, cm *v1.ConfigMap, configMapName string) error {
|
|
if _, err := client.CoreV1().ConfigMaps(cm.ObjectMeta.Namespace).Get(configMapName, metav1.GetOptions{}); err != nil {
|
|
if !apierrors.IsNotFound(err) {
|
|
return nil
|
|
}
|
|
if _, err := client.CoreV1().ConfigMaps(cm.ObjectMeta.Namespace).Create(cm); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return errors.Wrap(err, "unable to create configmap")
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrUpdateSecret creates a Secret if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateSecret(client clientset.Interface, secret *v1.Secret) error {
|
|
if _, err := client.CoreV1().Secrets(secret.ObjectMeta.Namespace).Create(secret); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return errors.Wrap(err, "unable to create secret")
|
|
}
|
|
|
|
if _, err := client.CoreV1().Secrets(secret.ObjectMeta.Namespace).Update(secret); err != nil {
|
|
return errors.Wrap(err, "unable to update secret")
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrUpdateServiceAccount creates a ServiceAccount if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateServiceAccount(client clientset.Interface, sa *v1.ServiceAccount) error {
|
|
if _, err := client.CoreV1().ServiceAccounts(sa.ObjectMeta.Namespace).Create(sa); err != nil {
|
|
// Note: We don't run .Update here afterwards as that's probably not required
|
|
// Only thing that could be updated is annotations/labels in .metadata, but we don't use that currently
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return errors.Wrap(err, "unable to create serviceaccount")
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrUpdateDeployment creates a Deployment if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateDeployment(client clientset.Interface, deploy *apps.Deployment) error {
|
|
if _, err := client.AppsV1().Deployments(deploy.ObjectMeta.Namespace).Create(deploy); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return errors.Wrap(err, "unable to create deployment")
|
|
}
|
|
|
|
if _, err := client.AppsV1().Deployments(deploy.ObjectMeta.Namespace).Update(deploy); err != nil {
|
|
return errors.Wrap(err, "unable to update deployment")
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrUpdateDaemonSet creates a DaemonSet if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateDaemonSet(client clientset.Interface, ds *apps.DaemonSet) error {
|
|
if _, err := client.AppsV1().DaemonSets(ds.ObjectMeta.Namespace).Create(ds); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return errors.Wrap(err, "unable to create daemonset")
|
|
}
|
|
|
|
if _, err := client.AppsV1().DaemonSets(ds.ObjectMeta.Namespace).Update(ds); err != nil {
|
|
return errors.Wrap(err, "unable to update daemonset")
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// DeleteDaemonSetForeground deletes the specified DaemonSet in foreground mode; i.e. it blocks until/makes sure all the managed Pods are deleted
|
|
func DeleteDaemonSetForeground(client clientset.Interface, namespace, name string) error {
|
|
foregroundDelete := metav1.DeletePropagationForeground
|
|
deleteOptions := &metav1.DeleteOptions{
|
|
PropagationPolicy: &foregroundDelete,
|
|
}
|
|
return client.AppsV1().DaemonSets(namespace).Delete(name, deleteOptions)
|
|
}
|
|
|
|
// DeleteDeploymentForeground deletes the specified Deployment in foreground mode; i.e. it blocks until/makes sure all the managed Pods are deleted
|
|
func DeleteDeploymentForeground(client clientset.Interface, namespace, name string) error {
|
|
foregroundDelete := metav1.DeletePropagationForeground
|
|
deleteOptions := &metav1.DeleteOptions{
|
|
PropagationPolicy: &foregroundDelete,
|
|
}
|
|
return client.AppsV1().Deployments(namespace).Delete(name, deleteOptions)
|
|
}
|
|
|
|
// CreateOrUpdateRole creates a Role if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateRole(client clientset.Interface, role *rbac.Role) error {
|
|
if _, err := client.RbacV1().Roles(role.ObjectMeta.Namespace).Create(role); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return errors.Wrap(err, "unable to create RBAC role")
|
|
}
|
|
|
|
if _, err := client.RbacV1().Roles(role.ObjectMeta.Namespace).Update(role); err != nil {
|
|
return errors.Wrap(err, "unable to update RBAC role")
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrUpdateRoleBinding creates a RoleBinding if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateRoleBinding(client clientset.Interface, roleBinding *rbac.RoleBinding) error {
|
|
if _, err := client.RbacV1().RoleBindings(roleBinding.ObjectMeta.Namespace).Create(roleBinding); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return errors.Wrap(err, "unable to create RBAC rolebinding")
|
|
}
|
|
|
|
if _, err := client.RbacV1().RoleBindings(roleBinding.ObjectMeta.Namespace).Update(roleBinding); err != nil {
|
|
return errors.Wrap(err, "unable to update RBAC rolebinding")
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrUpdateClusterRole creates a ClusterRole if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateClusterRole(client clientset.Interface, clusterRole *rbac.ClusterRole) error {
|
|
if _, err := client.RbacV1().ClusterRoles().Create(clusterRole); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return errors.Wrap(err, "unable to create RBAC clusterrole")
|
|
}
|
|
|
|
if _, err := client.RbacV1().ClusterRoles().Update(clusterRole); err != nil {
|
|
return errors.Wrap(err, "unable to update RBAC clusterrole")
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrUpdateClusterRoleBinding creates a ClusterRoleBinding if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateClusterRoleBinding(client clientset.Interface, clusterRoleBinding *rbac.ClusterRoleBinding) error {
|
|
if _, err := client.RbacV1().ClusterRoleBindings().Create(clusterRoleBinding); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return errors.Wrap(err, "unable to create RBAC clusterrolebinding")
|
|
}
|
|
|
|
if _, err := client.RbacV1().ClusterRoleBindings().Update(clusterRoleBinding); err != nil {
|
|
return errors.Wrap(err, "unable to update RBAC clusterrolebinding")
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// PatchNodeOnce executes patchFn on the node object found by the node name.
|
|
// This is a condition function meant to be used with wait.Poll. false, nil
|
|
// implies it is safe to try again, an error indicates no more tries should be
|
|
// made and true indicates success.
|
|
func PatchNodeOnce(client clientset.Interface, nodeName string, patchFn func(*v1.Node)) func() (bool, error) {
|
|
return func() (bool, error) {
|
|
// First get the node object
|
|
n, err := client.CoreV1().Nodes().Get(nodeName, metav1.GetOptions{})
|
|
if err != nil {
|
|
// TODO this should only be for timeouts
|
|
return false, nil
|
|
}
|
|
|
|
// The node may appear to have no labels at first,
|
|
// so we wait for it to get hostname label.
|
|
if _, found := n.ObjectMeta.Labels[v1.LabelHostname]; !found {
|
|
return false, nil
|
|
}
|
|
|
|
oldData, err := json.Marshal(n)
|
|
if err != nil {
|
|
return false, errors.Wrapf(err, "failed to marshal unmodified node %q into JSON", n.Name)
|
|
}
|
|
|
|
// Execute the mutating function
|
|
patchFn(n)
|
|
|
|
newData, err := json.Marshal(n)
|
|
if err != nil {
|
|
return false, errors.Wrapf(err, "failed to marshal modified node %q into JSON", n.Name)
|
|
}
|
|
|
|
patchBytes, err := strategicpatch.CreateTwoWayMergePatch(oldData, newData, v1.Node{})
|
|
if err != nil {
|
|
return false, errors.Wrap(err, "failed to create two way merge patch")
|
|
}
|
|
|
|
if _, err := client.CoreV1().Nodes().Patch(n.Name, types.StrategicMergePatchType, patchBytes); err != nil {
|
|
// TODO also check for timeouts
|
|
if apierrors.IsConflict(err) {
|
|
fmt.Println("Temporarily unable to update node metadata due to conflict (will retry)")
|
|
return false, nil
|
|
}
|
|
return false, errors.Wrapf(err, "error patching node %q through apiserver", n.Name)
|
|
}
|
|
|
|
return true, nil
|
|
}
|
|
}
|
|
|
|
// PatchNode tries to patch a node using patchFn for the actual mutating logic.
|
|
// Retries are provided by the wait package.
|
|
func PatchNode(client clientset.Interface, nodeName string, patchFn func(*v1.Node)) error {
|
|
// wait.Poll will rerun the condition function every interval function if
|
|
// the function returns false. If the condition function returns an error
|
|
// then the retries end and the error is returned.
|
|
return wait.Poll(constants.APICallRetryInterval, constants.PatchNodeTimeout, PatchNodeOnce(client, nodeName, patchFn))
|
|
}
|