-
Notifications
You must be signed in to change notification settings - Fork 90
/
node_join.go
137 lines (114 loc) · 3.96 KB
/
node_join.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
package kurl
import (
"context"
"fmt"
"os"
"strconv"
"time"
"github.com/pkg/errors"
"github.com/replicatedhq/kots/pkg/logger"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/kubernetes"
)
var (
// ConfigExpirationRegeneratePeriod the expiry grace period to regenerate the bootstrap token
ConfigExpirationRegeneratePeriod = 10 * time.Minute
)
// GenerateAddNodeCommand will generate the Kurl node add command for a master or worker
func GenerateAddNodeCommand(client kubernetes.Interface, master bool) ([]string, *time.Time, error) {
versionInfo, err := client.Discovery().ServerVersion()
if err != nil {
return nil, nil, errors.Wrap(err, "get kubernetes server version")
}
cm, err := ReadConfigMap(client)
if err != nil {
return nil, nil, errors.Wrap(err, "read kurl configmap")
}
cm, err = UpdateConfigMap(client, shouldRegenerateBootstrapToken(cm.Data), shouldUploadCerts(cm.Data, master))
if err != nil {
return nil, nil, errors.Wrap(err, "update kurl configmap")
}
data := cm.Data
proxyAddr := os.Getenv("HTTP_PROXY")
noProxyAddrs := os.Getenv("NO_PROXY")
bootstrapTokenExpiration, err := time.Parse(time.RFC3339, data[bootstrapTokenExpirationKey])
if err != nil {
return nil, nil, errors.Wrap(err, "get bootstrap token expiration")
}
var command []string
if ok, _ := strconv.ParseBool(data["airgap"]); ok {
command = append(command, "cat join.sh | sudo bash -s airgap")
} else if proxyAddr != "" {
command = append(command, fmt.Sprintf("curl -sSL -x %s %s/%s/join.sh | sudo bash -s", proxyAddr, data["kurl_url"], data["installer_id"]))
} else {
command = append(command, fmt.Sprintf("curl -sSL %s/%s/join.sh | sudo bash -s", data["kurl_url"], data["installer_id"]))
}
command = append(command,
fmt.Sprintf("kubernetes-master-address=%s", data["kubernetes_api_address"]),
fmt.Sprintf("kubeadm-token=%s", data["bootstrap_token"]),
fmt.Sprintf("kubeadm-token-ca-hash=%s", data["ca_hash"]),
fmt.Sprintf("docker-registry-ip=%s", data["docker_registry_ip"]),
fmt.Sprintf("kubernetes-version=%s", versionInfo.GitVersion),
)
if proxyAddr != "" && noProxyAddrs != "" {
command = append(command, fmt.Sprintf("additional-no-proxy-addresses=%s", noProxyAddrs))
}
nodes, err := client.CoreV1().Nodes().List(context.TODO(), metav1.ListOptions{})
if err != nil {
return nil, nil, errors.Wrap(err, "list nodes")
}
for _, node := range nodes.Items {
if nodeIP := internalIP(node); nodeIP != "" {
if isPrimary(node) {
command = append(command, fmt.Sprintf("primary-host=%s", nodeIP))
} else {
command = append(command, fmt.Sprintf("secondary-host=%s", nodeIP))
}
}
}
if master {
command = append(command,
fmt.Sprintf("cert-key=%s", data["cert_key"]),
"control-plane",
)
}
if value := data["kurl_install_directory"]; value != "" {
command = append(command, fmt.Sprintf("kurl-install-directory=%s", value))
}
return command, &bootstrapTokenExpiration, nil
}
func shouldRegenerateBootstrapToken(data map[string]string) bool {
value, ok := data[bootstrapTokenExpirationKey]
if !ok {
return true
}
bootstrapTokenExpiration, err := time.Parse(time.RFC3339, value)
if err != nil {
logger.Debugf("Failed to parse bootstrap_token_expiration %q: %v", value, err)
return true
}
if time.Now().Add(ConfigExpirationRegeneratePeriod).After(bootstrapTokenExpiration) {
logger.Debugf("Bootstrap token expired %s, regenerating", bootstrapTokenExpiration)
return true
}
return false
}
func shouldUploadCerts(data map[string]string, master bool) bool {
if !master {
return false
}
value, ok := data[certsExpirationKey]
if !ok {
return true
}
uploadCertsExpiration, err := time.Parse(time.RFC3339, value)
if err != nil {
logger.Debugf("Failed to parse upload_certs_expiration %q: %v", value, err)
return true
}
if time.Now().Add(ConfigExpirationRegeneratePeriod).After(uploadCertsExpiration) {
logger.Debugf("Certs secret expired %s, regenerating", uploadCertsExpiration)
return true
}
return false
}