/
manifestwork.go
250 lines (213 loc) · 8.48 KB
/
manifestwork.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
// Copyright (c) Red Hat, Inc.
// Copyright Contributors to the Open Cluster Management project
// TODO add unit test for the following functions, right now they are only covered in e2e
package helpers
import (
"context"
"fmt"
"strings"
"time"
"github.com/go-logr/logr"
"github.com/openshift/library-go/pkg/operator/events"
"github.com/openshift/library-go/pkg/operator/resource/resourcemerge"
"github.com/stolostron/managedcluster-import-controller/pkg/constants"
"k8s.io/apimachinery/pkg/api/errors"
"k8s.io/apimachinery/pkg/api/meta"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
"sigs.k8s.io/controller-runtime/pkg/client"
addonv1alpha1 "open-cluster-management.io/api/addon/v1alpha1"
workclient "open-cluster-management.io/api/client/work/clientset/versioned"
clusterv1 "open-cluster-management.io/api/cluster/v1"
workv1 "open-cluster-management.io/api/work/v1"
)
type WorkSelector func(string, workv1.ManifestWork) bool
// AssertManifestWorkFinalizer add/remove manifest finalizer for a managed cluster,
// this func will send request to api server to update managed cluster.
func AssertManifestWorkFinalizer(ctx context.Context, runtimeClient client.Client, recorder events.Recorder,
cluster *clusterv1.ManagedCluster, works int) error {
if works == 0 {
// there are no manifest works, remove the manifest work finalizer
err := RemoveManagedClusterFinalizer(ctx, runtimeClient, recorder, cluster, constants.ManifestWorkFinalizer)
if err != nil {
return err
}
return nil
}
if !cluster.DeletionTimestamp.IsZero() {
// cluster is deleting, do nothing
return nil
}
// there are manifest works in the managed cluster namespace, make sure the managed cluster has the manifest work finalizer
patch := client.MergeFrom(cluster.DeepCopy())
modified := resourcemerge.BoolPtr(false)
AddManagedClusterFinalizer(modified, cluster, constants.ManifestWorkFinalizer)
if !*modified {
return nil
}
if err := runtimeClient.Patch(ctx, cluster, patch); err != nil {
return err
}
recorder.Eventf("ManagedClusterFinalizerAdded",
"The managed cluster %s manifestwork finalizer is added", cluster.Name)
return nil
}
// ForceDeleteAllManifestWorks delete all manifestworks forcefully
func ForceDeleteAllManifestWorks(ctx context.Context, workClient workclient.Interface, recorder events.Recorder,
manifestWorks []workv1.ManifestWork) error {
for _, item := range manifestWorks {
if err := ForceDeleteManifestWork(ctx, workClient, recorder, item.Namespace, item.Name); err != nil {
return err
}
}
return nil
}
// ForceDeleteManifestWork will delete the manifestwork regardless of finalizers.
func ForceDeleteManifestWork(ctx context.Context, workClient workclient.Interface, recorder events.Recorder,
namespace, name string) error {
_, err := workClient.WorkV1().ManifestWorks(namespace).Get(ctx, name, metav1.GetOptions{})
if errors.IsNotFound(err) {
return nil
}
if err != nil {
return err
}
if err := workClient.WorkV1().ManifestWorks(namespace).Delete(ctx, name, metav1.DeleteOptions{}); err != nil {
return err
}
// reload the manifest work
manifestWork, err := workClient.WorkV1().ManifestWorks(namespace).Get(ctx, name, metav1.GetOptions{})
if errors.IsNotFound(err) {
return nil
}
if err != nil {
return err
}
// if the manifest work is not deleted, force remove its finalizers
if len(manifestWork.Finalizers) != 0 {
patch := "{\"metadata\": {\"finalizers\":[]}}"
if _, err := workClient.WorkV1().ManifestWorks(namespace).Patch(
ctx, name, types.MergePatchType, []byte(patch), metav1.PatchOptions{}); err != nil {
return err
}
}
recorder.Eventf("ManifestWorksForceDeleted",
fmt.Sprintf("The manifest work %s/%s is force deleted", manifestWork.Namespace, manifestWork.Name))
return nil
}
// DeleteManifestWork triggers the deletion action of the manifestwork
func DeleteManifestWork(ctx context.Context, workClient workclient.Interface, recorder events.Recorder,
namespace, name string) error {
manifestWork, err := workClient.WorkV1().ManifestWorks(namespace).Get(ctx, name, metav1.GetOptions{})
if errors.IsNotFound(err) {
return nil
}
if err != nil {
return err
}
if !manifestWork.DeletionTimestamp.IsZero() {
// the manifest work is deleting, do nothing
return nil
}
if err := workClient.WorkV1().ManifestWorks(namespace).Delete(ctx, name, metav1.DeleteOptions{}); err != nil {
return err
}
recorder.Eventf("ManifestWorksDeleted", fmt.Sprintf("The manifest work %s/%s is deleted", namespace, name))
return nil
}
// NoPendingManifestWorks checks whether there are pending manifestworks for the managed cluster
func NoPendingManifestWorks(ctx context.Context, log logr.Logger,
clusterName string, manifestWorks []workv1.ManifestWork,
ignoredSelector WorkSelector) (bool, error) {
manifestWorkNames := []string{}
ignoredManifestWorkNames := []string{}
for _, manifestWork := range manifestWorks {
if ignoredSelector(clusterName, manifestWork) {
ignoredManifestWorkNames = append(ignoredManifestWorkNames, manifestWork.GetName())
} else {
manifestWorkNames = append(manifestWorkNames, manifestWork.GetName())
}
}
if len(manifestWorkNames) != 0 {
log.Info(fmt.Sprintf("In addition to ignored manifest works %s, there are also have %s",
strings.Join(ignoredManifestWorkNames, ","), strings.Join(manifestWorkNames, ",")))
return false, nil
}
return true, nil
}
// ListManagedClusterAddons lists all managedclusteraddons for the managed cluster
func ListManagedClusterAddons(ctx context.Context, runtimeClient client.Client, clusterName string) (
*addonv1alpha1.ManagedClusterAddOnList, error) {
managedClusterAddons := &addonv1alpha1.ManagedClusterAddOnList{}
if err := runtimeClient.List(ctx, managedClusterAddons, client.InNamespace(clusterName)); err != nil {
return nil, err
}
return managedClusterAddons, nil
}
// NoManagedClusterAddons checks whether there are managedclusteraddons for the managed cluster
func NoManagedClusterAddons(ctx context.Context, runtimeClient client.Client, clusterName string) (bool, error) {
managedclusteraddons, err := ListManagedClusterAddons(ctx, runtimeClient, clusterName)
if err != nil {
return false, err
}
return len(managedclusteraddons.Items) == 0, nil
}
// DeleteManagedClusterAddons deletes all managedclusteraddons for the managed cluster
func DeleteManagedClusterAddons(
ctx context.Context,
runtimeClient client.Client,
recorder events.Recorder,
cluster *clusterv1.ManagedCluster) error {
if IsClusterUnavailable(cluster) {
// the managed cluster is offline, force delete all managed cluster addons
return ForceDeleteAllManagedClusterAddons(ctx, runtimeClient, recorder, cluster.GetName())
}
return runtimeClient.DeleteAllOf(ctx, &addonv1alpha1.ManagedClusterAddOn{}, client.InNamespace(cluster.GetName()))
}
// DeleteManifestWorkWithSelector deletes manifestworks but ignores the ignoredSelector selected manifestworks
func DeleteManifestWorkWithSelector(ctx context.Context, workClient workclient.Interface, recorder events.Recorder,
cluster *clusterv1.ManagedCluster, works []workv1.ManifestWork,
ignoredSelector func(clusterName string, manifestWork workv1.ManifestWork) bool) error {
for _, manifestWork := range works {
if ignoredSelector(cluster.GetName(), manifestWork) {
continue
}
annotations := manifestWork.GetAnnotations()
if _, ok := annotations[constants.PostponeDeletionAnnotation]; ok {
if time.Since(cluster.DeletionTimestamp.Time) < constants.ManifestWorkPostponeDeleteTime {
continue
}
}
if err := DeleteManifestWork(ctx, workClient, recorder, manifestWork.Namespace, manifestWork.Name); err != nil {
return err
}
}
return nil
}
// IsClusterUnavailable checks whether the cluster is unavilable
func IsClusterUnavailable(cluster *clusterv1.ManagedCluster) bool {
if meta.IsStatusConditionFalse(cluster.Status.Conditions, clusterv1.ManagedClusterConditionAvailable) {
return true
}
if meta.IsStatusConditionPresentAndEqual(
cluster.Status.Conditions, clusterv1.ManagedClusterConditionAvailable, metav1.ConditionUnknown) {
return true
}
return false
}
func IsManifestWorksAvailable(ctx context.Context, client workclient.Interface,
namespace string, names ...string) (bool, error) {
for _, name := range names {
work, err := client.WorkV1().ManifestWorks(namespace).Get(ctx, name, metav1.GetOptions{})
if errors.IsNotFound(err) {
return false, nil
}
if err != nil {
return false, err
}
if !meta.IsStatusConditionTrue(work.Status.Conditions, workv1.WorkAvailable) {
return false, nil
}
}
return true, nil
}