241 lines
9.8 KiB
Go
241 lines
9.8 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package apiclient
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
|
|
apps "k8s.io/api/apps/v1"
|
|
"k8s.io/api/core/v1"
|
|
rbac "k8s.io/api/rbac/v1"
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
"k8s.io/apimachinery/pkg/util/strategicpatch"
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
clientset "k8s.io/client-go/kubernetes"
|
|
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
|
kubeletapis "k8s.io/kubernetes/pkg/kubelet/apis"
|
|
)
|
|
|
|
// TODO: We should invent a dynamic mechanism for this using the dynamic client instead of hard-coding these functions per-type
|
|
// TODO: We may want to retry if .Update() fails on 409 Conflict
|
|
|
|
// CreateOrUpdateConfigMap creates a ConfigMap if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateConfigMap(client clientset.Interface, cm *v1.ConfigMap) error {
|
|
if _, err := client.CoreV1().ConfigMaps(cm.ObjectMeta.Namespace).Create(cm); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return fmt.Errorf("unable to create configmap: %v", err)
|
|
}
|
|
|
|
if _, err := client.CoreV1().ConfigMaps(cm.ObjectMeta.Namespace).Update(cm); err != nil {
|
|
return fmt.Errorf("unable to update configmap: %v", err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrRetainConfigMap creates a ConfigMap if the target resource doesn't exist. If the resource exists already, this function will retain the resource instead.
|
|
func CreateOrRetainConfigMap(client clientset.Interface, cm *v1.ConfigMap, configMapName string) error {
|
|
if _, err := client.CoreV1().ConfigMaps(cm.ObjectMeta.Namespace).Get(configMapName, metav1.GetOptions{}); err != nil {
|
|
if !apierrors.IsNotFound(err) {
|
|
return nil
|
|
}
|
|
if _, err := client.CoreV1().ConfigMaps(cm.ObjectMeta.Namespace).Create(cm); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return fmt.Errorf("unable to create configmap: %v", err)
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrUpdateSecret creates a Secret if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateSecret(client clientset.Interface, secret *v1.Secret) error {
|
|
if _, err := client.CoreV1().Secrets(secret.ObjectMeta.Namespace).Create(secret); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return fmt.Errorf("unable to create secret: %v", err)
|
|
}
|
|
|
|
if _, err := client.CoreV1().Secrets(secret.ObjectMeta.Namespace).Update(secret); err != nil {
|
|
return fmt.Errorf("unable to update secret: %v", err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrUpdateServiceAccount creates a ServiceAccount if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateServiceAccount(client clientset.Interface, sa *v1.ServiceAccount) error {
|
|
if _, err := client.CoreV1().ServiceAccounts(sa.ObjectMeta.Namespace).Create(sa); err != nil {
|
|
// Note: We don't run .Update here afterwards as that's probably not required
|
|
// Only thing that could be updated is annotations/labels in .metadata, but we don't use that currently
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return fmt.Errorf("unable to create serviceaccount: %v", err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrUpdateDeployment creates a Deployment if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateDeployment(client clientset.Interface, deploy *apps.Deployment) error {
|
|
if _, err := client.AppsV1().Deployments(deploy.ObjectMeta.Namespace).Create(deploy); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return fmt.Errorf("unable to create deployment: %v", err)
|
|
}
|
|
|
|
if _, err := client.AppsV1().Deployments(deploy.ObjectMeta.Namespace).Update(deploy); err != nil {
|
|
return fmt.Errorf("unable to update deployment: %v", err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrUpdateDaemonSet creates a DaemonSet if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateDaemonSet(client clientset.Interface, ds *apps.DaemonSet) error {
|
|
if _, err := client.AppsV1().DaemonSets(ds.ObjectMeta.Namespace).Create(ds); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return fmt.Errorf("unable to create daemonset: %v", err)
|
|
}
|
|
|
|
if _, err := client.AppsV1().DaemonSets(ds.ObjectMeta.Namespace).Update(ds); err != nil {
|
|
return fmt.Errorf("unable to update daemonset: %v", err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// DeleteDaemonSetForeground deletes the specified DaemonSet in foreground mode; i.e. it blocks until/makes sure all the managed Pods are deleted
|
|
func DeleteDaemonSetForeground(client clientset.Interface, namespace, name string) error {
|
|
foregroundDelete := metav1.DeletePropagationForeground
|
|
deleteOptions := &metav1.DeleteOptions{
|
|
PropagationPolicy: &foregroundDelete,
|
|
}
|
|
return client.AppsV1().DaemonSets(namespace).Delete(name, deleteOptions)
|
|
}
|
|
|
|
// DeleteDeploymentForeground deletes the specified Deployment in foreground mode; i.e. it blocks until/makes sure all the managed Pods are deleted
|
|
func DeleteDeploymentForeground(client clientset.Interface, namespace, name string) error {
|
|
foregroundDelete := metav1.DeletePropagationForeground
|
|
deleteOptions := &metav1.DeleteOptions{
|
|
PropagationPolicy: &foregroundDelete,
|
|
}
|
|
return client.AppsV1().Deployments(namespace).Delete(name, deleteOptions)
|
|
}
|
|
|
|
// CreateOrUpdateRole creates a Role if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateRole(client clientset.Interface, role *rbac.Role) error {
|
|
if _, err := client.RbacV1().Roles(role.ObjectMeta.Namespace).Create(role); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return fmt.Errorf("unable to create RBAC role: %v", err)
|
|
}
|
|
|
|
if _, err := client.RbacV1().Roles(role.ObjectMeta.Namespace).Update(role); err != nil {
|
|
return fmt.Errorf("unable to update RBAC role: %v", err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrUpdateRoleBinding creates a RoleBinding if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateRoleBinding(client clientset.Interface, roleBinding *rbac.RoleBinding) error {
|
|
if _, err := client.RbacV1().RoleBindings(roleBinding.ObjectMeta.Namespace).Create(roleBinding); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return fmt.Errorf("unable to create RBAC rolebinding: %v", err)
|
|
}
|
|
|
|
if _, err := client.RbacV1().RoleBindings(roleBinding.ObjectMeta.Namespace).Update(roleBinding); err != nil {
|
|
return fmt.Errorf("unable to update RBAC rolebinding: %v", err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrUpdateClusterRole creates a ClusterRole if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateClusterRole(client clientset.Interface, clusterRole *rbac.ClusterRole) error {
|
|
if _, err := client.RbacV1().ClusterRoles().Create(clusterRole); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return fmt.Errorf("unable to create RBAC clusterrole: %v", err)
|
|
}
|
|
|
|
if _, err := client.RbacV1().ClusterRoles().Update(clusterRole); err != nil {
|
|
return fmt.Errorf("unable to update RBAC clusterrole: %v", err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CreateOrUpdateClusterRoleBinding creates a ClusterRoleBinding if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
|
|
func CreateOrUpdateClusterRoleBinding(client clientset.Interface, clusterRoleBinding *rbac.ClusterRoleBinding) error {
|
|
if _, err := client.RbacV1().ClusterRoleBindings().Create(clusterRoleBinding); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return fmt.Errorf("unable to create RBAC clusterrolebinding: %v", err)
|
|
}
|
|
|
|
if _, err := client.RbacV1().ClusterRoleBindings().Update(clusterRoleBinding); err != nil {
|
|
return fmt.Errorf("unable to update RBAC clusterrolebinding: %v", err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// PatchNode tries to patch a node using the following client, executing patchFn for the actual mutating logic
|
|
func PatchNode(client clientset.Interface, nodeName string, patchFn func(*v1.Node)) error {
|
|
// Loop on every false return. Return with an error if raised. Exit successfully if true is returned.
|
|
return wait.Poll(constants.APICallRetryInterval, constants.PatchNodeTimeout, func() (bool, error) {
|
|
// First get the node object
|
|
n, err := client.CoreV1().Nodes().Get(nodeName, metav1.GetOptions{})
|
|
if err != nil {
|
|
return false, nil
|
|
}
|
|
|
|
// The node may appear to have no labels at first,
|
|
// so we wait for it to get hostname label.
|
|
if _, found := n.ObjectMeta.Labels[kubeletapis.LabelHostname]; !found {
|
|
return false, nil
|
|
}
|
|
|
|
oldData, err := json.Marshal(n)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
// Execute the mutating function
|
|
patchFn(n)
|
|
|
|
newData, err := json.Marshal(n)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
patchBytes, err := strategicpatch.CreateTwoWayMergePatch(oldData, newData, v1.Node{})
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
if _, err := client.CoreV1().Nodes().Patch(n.Name, types.StrategicMergePatchType, patchBytes); err != nil {
|
|
if apierrors.IsConflict(err) {
|
|
fmt.Println("[patchnode] Temporarily unable to update node metadata due to conflict (will retry)")
|
|
return false, nil
|
|
}
|
|
return false, err
|
|
}
|
|
|
|
return true, nil
|
|
})
|
|
}
|