/
devicetoken_rest.go
104 lines (96 loc) · 3.23 KB
/
devicetoken_rest.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
package rest
import (
"context"
"fmt"
deviceapi "github.com/mgoltzsche/kubemate/pkg/apis/devices/v1alpha1"
"github.com/mgoltzsche/kubemate/pkg/storage"
"github.com/mgoltzsche/kubemate/pkg/tokengen"
"k8s.io/apimachinery/pkg/api/errors"
"k8s.io/apimachinery/pkg/api/meta"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
registryrest "k8s.io/apiserver/pkg/registry/rest"
)
type deviceTokenREST struct {
*REST
deviceName string
}
func NewDeviceTokenREST(dir string, scheme *runtime.Scheme, deviceName string) (*deviceTokenREST, error) {
store, err := storage.FileStore(dir, &deviceapi.DeviceToken{}, scheme)
if err != nil {
return nil, err
}
r := &deviceTokenREST{
REST: NewREST(&deviceapi.DeviceToken{}, store),
deviceName: deviceName,
}
// Generate new cluster join token for this device if not exist
token := &deviceapi.DeviceToken{}
err = store.Get(deviceName, token)
if err != nil || token.Data.Token == "" {
if err != nil && !errors.IsNotFound(err) {
return nil, err
}
_, err = r.regenerateClusterJoinToken()
if err != nil {
return nil, fmt.Errorf("generate cluster join token: %w", err)
}
}
return r, nil
}
func (r *deviceTokenREST) Update(ctx context.Context, key string, objInfo registryrest.UpdatedObjectInfo, createValidation registryrest.ValidateObjectFunc, updateValidation registryrest.ValidateObjectUpdateFunc, forceAllowCreate bool, options *metav1.UpdateOptions) (runtime.Object, bool, error) {
if key == r.deviceName {
return nil, false, fmt.Errorf("refusing to update cluster join token on the server manually. please delete it to force regeneration")
}
return r.REST.Update(ctx, key, objInfo, createValidation, updateValidation, forceAllowCreate, options)
}
func (r *deviceTokenREST) Create(ctx context.Context, obj runtime.Object, createValidation registryrest.ValidateObjectFunc, options *metav1.CreateOptions) (runtime.Object, error) {
m, err := meta.Accessor(obj)
if err != nil {
return nil, err
}
if m.GetName() == r.deviceName {
return nil, fmt.Errorf("refusing to create cluster join token on the server manually. please delete it to force regeneration")
}
return r.REST.Create(ctx, obj, createValidation, options)
}
func (r *deviceTokenREST) Delete(ctx context.Context, key string, deleteValidation registryrest.ValidateObjectFunc, options *metav1.DeleteOptions) (runtime.Object, bool, error) {
if key == r.deviceName {
t := &deviceapi.DeviceToken{}
err := r.Store().Get(r.deviceName, t)
if err != nil {
return nil, false, err
}
r.regenerateClusterJoinToken()
return nil, false, nil
}
return r.REST.Delete(ctx, key, deleteValidation, options)
}
func (r *deviceTokenREST) regenerateClusterJoinToken() (*deviceapi.DeviceToken, error) {
token, err := tokengen.GenerateRandomString(32)
if err != nil {
return nil, err
}
t := &deviceapi.DeviceToken{}
err = r.Store().Get(r.deviceName, t)
if err != nil {
if !errors.IsNotFound(err) {
return nil, err
}
t.Data.Token = token
err = r.Store().Create(r.deviceName, t)
if err != nil {
return nil, err
}
return t, nil
}
err = r.Store().Update(r.deviceName, t, func() error {
t.Data.Token = token
t.Status.JoinToken = ""
return nil
})
if err != nil {
return nil, err
}
return t, nil
}