167 lines
5.8 KiB
Go
167 lines
5.8 KiB
Go
package cluster
|
|
|
|
import (
|
|
"fmt"
|
|
"github.com/pkg/errors"
|
|
"k8s.io/apimachinery/pkg/api/meta"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
pkgruntime "k8s.io/apimachinery/pkg/runtime"
|
|
kubeclient "k8s.io/client-go/kubernetes"
|
|
"k8s.io/client-go/rest"
|
|
"k8s.io/client-go/tools/clientcmd"
|
|
"strings"
|
|
)
|
|
|
|
// Default values for the federated group and version used by
|
|
// the enable and disable subcommands of `kubefedctl`.
|
|
const (
|
|
DefaultFederatedGroup = "types.kubefed.io"
|
|
DefaultFederatedVersion = "v1beta1"
|
|
|
|
FederatedKindPrefix = "Federated"
|
|
)
|
|
|
|
// FedConfig provides a rest config based on the filesystem kubeconfig (via
|
|
// pathOptions) and context in order to talk to the host kubernetes cluster
|
|
// and the joining kubernetes cluster.
|
|
type FedConfig interface {
|
|
HostConfig(context, kubeconfigPath string) (*rest.Config, error)
|
|
ClusterConfig(context, kubeconfigPath string) (*rest.Config, error)
|
|
GetClientConfig(ontext, kubeconfigPath string) clientcmd.ClientConfig
|
|
}
|
|
|
|
// fedConfig implements the FedConfig interface.
|
|
type fedConfig struct {
|
|
pathOptions *clientcmd.PathOptions
|
|
}
|
|
|
|
// NewFedConfig creates a fedConfig for `kubefedctl` commands.
|
|
func NewFedConfig(pathOptions *clientcmd.PathOptions) FedConfig {
|
|
return &fedConfig{
|
|
pathOptions: pathOptions,
|
|
}
|
|
}
|
|
|
|
// HostConfig provides a rest config to talk to the host kubernetes cluster
|
|
// based on the context and kubeconfig passed in.
|
|
func (a *fedConfig) HostConfig(context, kubeconfigPath string) (*rest.Config, error) {
|
|
hostConfig := a.GetClientConfig(context, kubeconfigPath)
|
|
hostClientConfig, err := hostConfig.ClientConfig()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return hostClientConfig, nil
|
|
}
|
|
|
|
// ClusterConfig provides a rest config to talk to the joining kubernetes
|
|
// cluster based on the context and kubeconfig passed in.
|
|
func (a *fedConfig) ClusterConfig(context, kubeconfigPath string) (*rest.Config, error) {
|
|
clusterConfig := a.GetClientConfig(context, kubeconfigPath)
|
|
clusterClientConfig, err := clusterConfig.ClientConfig()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return clusterClientConfig, nil
|
|
}
|
|
|
|
// getClientConfig is a helper method to create a client config from the
|
|
// context and kubeconfig passed as arguments.
|
|
func (a *fedConfig) GetClientConfig(context, kubeconfigPath string) clientcmd.ClientConfig {
|
|
loadingRules := *a.pathOptions.LoadingRules
|
|
loadingRules.Precedence = a.pathOptions.GetLoadingPrecedence()
|
|
loadingRules.ExplicitPath = kubeconfigPath
|
|
overrides := &clientcmd.ConfigOverrides{
|
|
CurrentContext: context,
|
|
}
|
|
|
|
return clientcmd.NewNonInteractiveDeferredLoadingClientConfig(&loadingRules, overrides)
|
|
}
|
|
|
|
// HostClientset provides a kubernetes API compliant clientset to
|
|
// communicate with the host cluster's kubernetes API server.
|
|
func HostClientset(config *rest.Config) (*kubeclient.Clientset, error) {
|
|
return kubeclient.NewForConfig(config)
|
|
}
|
|
|
|
// ClusterClientset provides a kubernetes API compliant clientset to
|
|
// communicate with the joining cluster's kubernetes API server.
|
|
func ClusterClientset(config *rest.Config) (*kubeclient.Clientset, error) {
|
|
return kubeclient.NewForConfig(config)
|
|
}
|
|
|
|
// ClusterServiceAccountName returns the name of a service account whose
|
|
// credentials are used by the host cluster to access the client cluster.
|
|
func ClusterServiceAccountName(joiningClusterName, hostClusterName string) string {
|
|
return fmt.Sprintf("%s-%s", joiningClusterName, hostClusterName)
|
|
}
|
|
|
|
// RoleName returns the name of a Role or ClusterRole and its
|
|
// associated RoleBinding or ClusterRoleBinding that are used to allow
|
|
// the service account to access necessary resources on the cluster.
|
|
func RoleName(serviceAccountName string) string {
|
|
return fmt.Sprintf("kubefed-controller-manager:%s", serviceAccountName)
|
|
}
|
|
|
|
// HealthCheckRoleName returns the name of a ClusterRole and its
|
|
// associated ClusterRoleBinding that is used to allow the service
|
|
// account to check the health of the cluster and list nodes.
|
|
func HealthCheckRoleName(serviceAccountName, namespace string) string {
|
|
return fmt.Sprintf("kubefed-controller-manager:%s:healthcheck-%s", namespace, serviceAccountName)
|
|
}
|
|
|
|
// IsFederatedAPIResource checks if a resource with the given Kind and group is a Federated one
|
|
func IsFederatedAPIResource(kind, group string) bool {
|
|
return strings.HasPrefix(kind, FederatedKindPrefix) && group == DefaultFederatedGroup
|
|
}
|
|
|
|
// GetNamespace returns namespace of the current context
|
|
func GetNamespace(hostClusterContext string, kubeconfig string, config FedConfig) (string, error) {
|
|
clientConfig := config.GetClientConfig(hostClusterContext, kubeconfig)
|
|
currentContext, err := CurrentContext(clientConfig)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
ns, _, err := clientConfig.Namespace()
|
|
if err != nil {
|
|
return "", errors.Wrapf(err, "Failed to get ClientConfig for host cluster context %q and kubeconfig %q",
|
|
currentContext, kubeconfig)
|
|
}
|
|
|
|
if len(ns) == 0 {
|
|
ns = "default"
|
|
}
|
|
return ns, nil
|
|
}
|
|
|
|
// CurrentContext retrieves the current context from the provided config.
|
|
func CurrentContext(config clientcmd.ClientConfig) (string, error) {
|
|
rawConfig, err := config.RawConfig()
|
|
if err != nil {
|
|
return "", errors.Wrap(err, "Failed to get current context from config")
|
|
}
|
|
return rawConfig.CurrentContext, nil
|
|
}
|
|
|
|
// IsPrimaryCluster checks if the caller is working with objects for the
|
|
// primary cluster by checking if the UIDs match for both ObjectMetas passed
|
|
// in.
|
|
// TODO (font): Need to revisit this when cluster ID is available.
|
|
func IsPrimaryCluster(obj, clusterObj pkgruntime.Object) bool {
|
|
meta := MetaAccessor(obj)
|
|
clusterMeta := MetaAccessor(clusterObj)
|
|
return meta.GetUID() == clusterMeta.GetUID()
|
|
}
|
|
|
|
func MetaAccessor(obj pkgruntime.Object) metav1.Object {
|
|
accessor, err := meta.Accessor(obj)
|
|
if err != nil {
|
|
// This should always succeed if obj is not nil. Also,
|
|
// adapters are slated for replacement by unstructured.
|
|
return nil
|
|
}
|
|
return accessor
|
|
}
|