-
Notifications
You must be signed in to change notification settings - Fork 90
/
configmap.go
99 lines (80 loc) · 3.02 KB
/
configmap.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
package kurl
import (
"context"
"time"
"github.com/pkg/errors"
"github.com/replicatedhq/kots/pkg/k8sutil"
"github.com/replicatedhq/kots/pkg/util"
corev1 "k8s.io/api/core/v1"
kuberneteserrors "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/kubernetes"
)
const configMapName = "kurl-config"
const configMapNamespace = "kube-system"
const bootstrapTokenKey = "bootstrap_token"
const bootstrapTokenExpirationKey = "bootstrap_token_expiration"
const certKey = "cert_key"
const certsExpirationKey = "upload_certs_expiration"
func IsKurl(clientset kubernetes.Interface) (bool, error) {
if clientset == nil {
return false, errors.New("clientset is nil")
}
configMapExists := false
_, err := ReadConfigMap(clientset)
if err == nil {
configMapExists = true
} else if kuberneteserrors.IsNotFound(err) {
configMapExists = false
} else if kuberneteserrors.IsUnauthorized(err) {
configMapExists = false
} else if kuberneteserrors.IsForbidden(err) {
configMapExists = false
} else if err != nil {
return false, errors.Wrap(err, "failed to get kurl configmap")
}
return configMapExists, nil
}
// ReadConfigMap will read the Kurl config from a configmap
func ReadConfigMap(client kubernetes.Interface) (*corev1.ConfigMap, error) {
return client.CoreV1().ConfigMaps(configMapNamespace).Get(context.TODO(), configMapName, metav1.GetOptions{})
}
// UpdateConfigMap will save the Kurl config in a configmap
func UpdateConfigMap(client kubernetes.Interface, generateBootstrapToken, uploadCerts bool) (*corev1.ConfigMap, error) {
cm, err := client.CoreV1().ConfigMaps(configMapNamespace).Get(context.TODO(), configMapName, metav1.GetOptions{})
if err != nil {
return nil, errors.Wrap(err, "get configmap")
}
// To be backwards compatible with kotsadm 1.1.0 and 1.2.0, if neither the bootstrap token nor
// the upload certs flags are set then generate a token for a worker node
if !uploadCerts {
generateBootstrapToken = true
}
if generateBootstrapToken {
bootstrapTokenDuration := time.Hour * 24
bootstrapTokenExpiration := time.Now().Add(bootstrapTokenDuration)
bootstrapToken, err := k8sutil.GenerateBootstrapToken(client, bootstrapTokenDuration)
if err != nil {
return nil, errors.Wrap(err, "generate bootstrap token")
}
cm.Data[bootstrapTokenKey] = bootstrapToken
cm.Data[bootstrapTokenExpirationKey] = bootstrapTokenExpiration.Format(time.RFC3339)
}
if uploadCerts {
certsDuration := time.Hour * 2
certsExpiration := time.Now().Add(certsDuration)
ctx, cancel := context.WithTimeout(context.TODO(), 60*time.Second)
defer cancel()
key, err := createCertAndKey(ctx, client, util.PodNamespace)
if err != nil {
return nil, errors.Wrap(err, "upload certs with new key")
}
cm.Data[certKey] = key
cm.Data[certsExpirationKey] = certsExpiration.Format(time.RFC3339)
}
cm, err = client.CoreV1().ConfigMaps(configMapNamespace).Update(context.TODO(), cm, metav1.UpdateOptions{})
if err != nil {
return nil, errors.Wrap(err, "update configmap")
}
return cm, nil
}