This repository has been archived by the owner on Nov 20, 2021. It is now read-only.
/
cluster.go
148 lines (134 loc) · 3.51 KB
/
cluster.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
// Package cluster contains the functions for bootstrapping a Kubernetes
// cluster node.
package cluster
import (
"context"
"path/filepath"
"time"
"github.com/pkg/errors"
"go.uber.org/zap"
"k8s.io/client-go/kubernetes"
"k8s.io/client-go/rest"
"k8s.io/client-go/tools/clientcmd"
"github.com/criticalstack/crit/internal/config"
"github.com/criticalstack/crit/internal/feature"
"github.com/criticalstack/crit/pkg/log"
)
type RuntimeConfig struct {
KubeletTimeout time.Duration
Verbose bool
}
type Cluster struct {
kubeConfigFile string
rc *RuntimeConfig
fns []interface{}
}
func New(kubeConfigFile string, rc *RuntimeConfig) *Cluster {
return &Cluster{
kubeConfigFile: kubeConfigFile,
rc: rc,
fns: make([]interface{}, 0),
}
}
func (c *Cluster) Add(fns ...interface{}) {
c.fns = append(c.fns, fns...)
}
func (c *Cluster) Config() *rest.Config {
config, err := clientcmd.BuildConfigFromFlags("", c.kubeConfigFile)
if err != nil {
log.Debug("Cluster.Config", zap.Error(err))
}
return config
}
func (c *Cluster) Client() *kubernetes.Clientset {
client, err := kubernetes.NewForConfig(c.Config())
if err != nil {
log.Debug("Cluster.Client", zap.Error(err))
}
return client
}
type (
controlPlaneFunc = func(context.Context, *config.ControlPlaneConfiguration) error
workerFunc = func(context.Context, *config.WorkerConfiguration) error
nodeFunc = func(context.Context, *config.NodeConfiguration) error
)
// RunControlPlane creates a new control plane node.
func RunControlPlane(ctx context.Context, rc *RuntimeConfig, cfg *config.ControlPlaneConfiguration) error {
c := New(filepath.Join(cfg.NodeConfiguration.KubeDir, "admin.conf"), rc)
// set crit feature gates
if err := feature.MutableGates.SetFromMap(cfg.FeatureGates); err != nil {
return err
}
c.Add(
c.ControlPlanePreCheck,
c.CreateOrDownloadCerts,
c.CreateNodeCerts,
c.StopKubelet,
c.WriteKubeConfigs,
c.WriteKubeletConfigs,
c.StartKubelet,
c.WriteKubeManifests,
c.WaitClusterAvailable,
)
if feature.Gates.Enabled(feature.BootstrapServer) {
c.Add(c.WriteBootstrapServerManifest)
}
c.Add(
c.DeployCoreDNS,
c.DeployKubeProxy,
c.EnableCSRApprover,
c.MarkControlPlane,
c.UploadInfo,
)
if feature.Gates.Enabled(feature.AuthProxyCA) {
c.Add(c.UploadAuthProxyCA)
}
if feature.Gates.Enabled(feature.UploadETCDSecrets) {
c.Add(c.UploadETCDSecrets)
}
for _, fn := range c.fns {
switch fn := fn.(type) {
case controlPlaneFunc:
if err := fn(ctx, cfg); err != nil {
return err
}
case nodeFunc:
if err := fn(ctx, &cfg.NodeConfiguration); err != nil {
return err
}
default:
panic(errors.Errorf("invalid cluster workflow function: %T", fn))
}
}
return nil
}
// RunWorkerNode creates a new worker node.
func RunWorkerNode(ctx context.Context, rc *RuntimeConfig, cfg *config.WorkerConfiguration) error {
c := New(filepath.Join(cfg.NodeConfiguration.KubeDir, "kubelet.conf"), rc)
// set crit feature gates
if err := feature.MutableGates.SetFromMap(cfg.FeatureGates); err != nil {
return err
}
c.Add(
c.WorkerPreCheck,
c.StopKubelet,
c.WriteBootstrapKubeletConfig,
c.WriteKubeletConfigs,
c.StartKubelet,
)
for _, fn := range c.fns {
switch fn := fn.(type) {
case workerFunc:
if err := fn(ctx, cfg); err != nil {
return err
}
case nodeFunc:
if err := fn(ctx, &cfg.NodeConfiguration); err != nil {
return err
}
default:
panic(errors.Errorf("invalid cluster workflow function: %T", fn))
}
}
return nil
}