| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399 |
- // Copyright 2019 Yunion
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package k8s
- import (
- "fmt"
- "io/ioutil"
- "os"
- "path/filepath"
- "yunion.io/x/jsonutils"
- "yunion.io/x/log"
- "yunion.io/x/pkg/errors"
- "yunion.io/x/pkg/util/shellutils"
- "yunion.io/x/onecloud/cmd/climc/shell"
- "yunion.io/x/onecloud/pkg/mcclient"
- "yunion.io/x/onecloud/pkg/mcclient/modules/k8s"
- o "yunion.io/x/onecloud/pkg/mcclient/options/k8s"
- )
- func initKubeCluster() {
- cmdN := func(action string) string {
- return fmt.Sprintf("k8s-cluster-%s", action)
- }
- cmd := NewK8sResourceCmd(k8s.KubeClusters)
- cmd.SetKeyword("cluster")
- cmd.ShowEvent()
- cmd.List(new(o.ClusterListOptions))
- cmd.Show(new(o.IdentOptions))
- cmd.Create(new(o.K8SClusterCreateOptions))
- cmd.Perform("sync", new(o.ClusterSyncOptions))
- cmd.Perform("syncstatus", new(o.IdentOptions))
- cmd.Perform("deploy", new(o.ClusterDeployOptions))
- cmd.Get("components-status", new(o.IdentOptions))
- cmd.Get("api-resources", new(o.IdentOptions))
- cmd.Get("cluster-users", new(o.IdentOptions))
- cmd.Get("cluster-user-groups", new(o.IdentOptions))
- cmd.Perform("purge", new(o.ClusterPurgeOptions))
- cmd.Perform("delete-machines", new(o.KubeClusterDeleteMachinesOptions))
- cmd.Perform("add-machines", new(o.KubeClusterAddMachinesOptions))
- cmd.PerformClass("gc", new(o.ClusterGCOpts))
- cmd.Perform("set-extra-config", new(o.ClusterSetExtraConfigOpt))
- cmd.Get("extra-config", new(o.IdentOptions))
- R(&o.KubeClusterImportOptions{}, cmdN("import"), "Import k8s cluster", func(s *mcclient.ClientSession, args *o.KubeClusterImportOptions) error {
- params, err := args.Params()
- if err != nil {
- return err
- }
- cluster, err := k8s.KubeClusters.Create(s, params)
- if err != nil {
- return err
- }
- printObject(cluster)
- return nil
- })
- R(&o.ClusterDeleteOptions{}, cmdN("delete"), "Delete cluster", func(s *mcclient.ClientSession, args *o.ClusterDeleteOptions) error {
- ret := k8s.KubeClusters.BatchDeleteWithParam(s, args.ID, nil, nil)
- printBatchResults(ret, k8s.KubeClusters.GetColumns(s))
- return nil
- })
- R(&o.IdentOptions{}, cmdN("kubeconfig"), "Generate kubeconfig of a cluster", func(s *mcclient.ClientSession, args *o.IdentOptions) error {
- ret, err := k8s.KubeClusters.GetSpecific(s, args.ID, "kubeconfig", nil)
- if err != nil {
- return err
- }
- conf, err := ret.GetString("kubeconfig")
- if err != nil {
- return err
- }
- fmt.Println(conf)
- return nil
- })
- type SetKubeconfigOptions struct {
- o.IdentOptions
- FILE string `json:"filepath of kubeconfig"`
- }
- R(new(SetKubeconfigOptions), cmdN("set-kubeconfig"), "Set kubeconfig of a cluster", func(s *mcclient.ClientSession, args *SetKubeconfigOptions) error {
- content, err := ioutil.ReadFile(args.FILE)
- if err != nil {
- return errors.Wrapf(err, "read file content of %q", args.FILE)
- }
- input := map[string]string{
- "kubeconfig": string(content),
- }
- ret, err := k8s.KubeClusters.PerformAction(s, args.ID, "set-kubeconfig", jsonutils.Marshal(input))
- if err != nil {
- return err
- }
- printObject(ret)
- return nil
- })
- R(&o.ClusterGetAddonsOpt{}, cmdN("addons"), "Get addon manifest of a cluster", func(s *mcclient.ClientSession, args *o.ClusterGetAddonsOpt) error {
- params, err := args.Params()
- if err != nil {
- return err
- }
- ret, err := k8s.KubeClusters.GetSpecific(s, args.ID, "addons", params)
- if err != nil {
- return err
- }
- conf, err := ret.GetString("addons")
- if err != nil {
- return err
- }
- fmt.Println(conf)
- return nil
- })
- R(&o.ClusterK8sVersions{}, cmdN("k8s-versions"), "Get kubernetes deployable versions", func(s *mcclient.ClientSession, args *o.ClusterK8sVersions) error {
- params := jsonutils.NewDict()
- params.Add(jsonutils.NewString(args.PROVIDER), "provider")
- ret, err := k8s.KubeClusters.Get(s, "k8s-versions", params)
- if err != nil {
- return err
- }
- fmt.Println(ret.String())
- return nil
- })
- R(&o.ClusterK8sVersions{}, cmdN("usable-instances"), "Get deploy usable instance", func(s *mcclient.ClientSession, args *o.ClusterK8sVersions) error {
- params := jsonutils.NewDict()
- params.Add(jsonutils.NewString(args.PROVIDER), "provider")
- ret, err := k8s.KubeClusters.Get(s, "usable-instances", params)
- if err != nil {
- return err
- }
- fmt.Println(ret.String())
- return nil
- })
- R(&o.ClusterCheckOptions{}, cmdN("check-system-ready"), "Check system cluster status", func(s *mcclient.ClientSession, args *o.ClusterCheckOptions) error {
- ret, err := k8s.KubeClusters.PerformClassAction(s, "check-system-ready", nil)
- if err != nil {
- return err
- }
- fmt.Println(ret.String())
- return nil
- })
- R(&o.IdentOptions{}, cmdN("apply-addons"), "Apply base requirements addons", func(s *mcclient.ClientSession, args *o.IdentOptions) error {
- ret, err := k8s.KubeClusters.PerformAction(s, args.ID, "apply-addons", nil)
- if err != nil {
- return err
- }
- printObject(ret)
- return nil
- })
- getComponentSetting := func(s *mcclient.ClientSession, args *o.ClusterComponentType, asHelmValues bool) (jsonutils.JSONObject, error) {
- q := jsonutils.NewDict()
- q.Add(jsonutils.NewString(args.TYPE), "type")
- q.Add(jsonutils.JSONTrue, "system")
- q.Add(jsonutils.NewBool(asHelmValues), "as_helm_values")
- return k8s.KubeClusters.GetSpecific(s, args.ID, "component-setting", q)
- }
- R(&o.ClusterComponentTypeOptions{}, cmdN("component-setting"), "Get cluster component setting", func(s *mcclient.ClientSession, args *o.ClusterComponentTypeOptions) error {
- ret, err := getComponentSetting(s, &args.ClusterComponentType, args.AsHelmValues)
- if err != nil {
- return err
- }
- if args.AsHelmValues {
- printObjectYAML(ret)
- } else {
- printObject(ret)
- }
- return nil
- })
- R(&o.ClusterEnableComponentCephCSIOpt{}, cmdN("component-enable-ceph-csi"), "Enable cluster ceph csi component", func(s *mcclient.ClientSession, args *o.ClusterEnableComponentCephCSIOpt) error {
- params, err := args.Params()
- if err != nil {
- return err
- }
- ret, err := k8s.KubeClusters.PerformAction(s, args.ID, "enable-component", params)
- if err != nil {
- return err
- }
- printObject(ret)
- return nil
- })
- R(&o.ClusterEnableComponentMonitorOpt{}, cmdN("component-enable-monitor"), "Enable cluster monitor component", func(s *mcclient.ClientSession, args *o.ClusterEnableComponentMonitorOpt) error {
- params, err := args.Params()
- if err != nil {
- return err
- }
- ret, err := k8s.KubeClusters.PerformAction(s, args.ID, "enable-component", params)
- if err != nil {
- return err
- }
- printObject(ret)
- return nil
- })
- R(&o.ClusterEnableComponentFluentBitOpt{}, cmdN("component-enable-fluentbit"), "Enable cluster fluentbit component", func(s *mcclient.ClientSession, args *o.ClusterEnableComponentFluentBitOpt) error {
- params, err := args.Params()
- if err != nil {
- return err
- }
- ret, err := k8s.KubeClusters.PerformAction(s, args.ID, "enable-component", params)
- if err != nil {
- return err
- }
- printObject(ret)
- return nil
- })
- rEnableMinio := func(opt shell.IPerformOpt, cmd string, desc string) {
- R(opt, cmd, desc, func(s *mcclient.ClientSession, args shell.IPerformOpt) error {
- params, err := args.Params()
- if err != nil {
- return err
- }
- ret, err := k8s.KubeClusters.PerformAction(s, args.GetId(), "enable-component", params)
- if err != nil {
- return err
- }
- printObject(ret)
- return nil
- })
- }
- rEnableMinio(
- new(o.ClusterEnableComponentMinioOpt),
- cmdN("component-enable-minio"),
- "Enable cluster minio component",
- )
- rEnableMinio(
- new(o.ClusterEnableComponentMonitorMinioOpt),
- cmdN("component-enable-monitor-minio"),
- "Enable cluster monitor stack's minio component",
- )
- R(&o.ClusterEnableComponentThanosOpt{}, cmdN("component-enable-thanos"), "Enable cluster thanos component", func(s *mcclient.ClientSession, args *o.ClusterEnableComponentThanosOpt) error {
- params, err := args.Params()
- if err != nil {
- return err
- }
- ret, err := k8s.KubeClusters.PerformAction(s, args.ID, "enable-component", params)
- if err != nil {
- return err
- }
- printObject(ret)
- return nil
- })
- R(&o.ClusterDisableComponent{}, cmdN("component-disable"), "Enable cluster component", func(s *mcclient.ClientSession, args *o.ClusterDisableComponent) error {
- params := args.Params()
- ret, err := k8s.KubeClusters.PerformAction(s, args.ID, "disable-component", params)
- if err != nil {
- return err
- }
- printObject(ret)
- return nil
- })
- R(&o.ClusterDisableComponent{}, cmdN("component-delete"), "Delete cluster component", func(s *mcclient.ClientSession, args *o.ClusterDisableComponent) error {
- params := args.Params()
- ret, err := k8s.KubeClusters.PerformAction(s, args.ID, "delete-component", params)
- if err != nil {
- return err
- }
- printObject(ret)
- return nil
- })
- R(&o.ClusterUpdateComponentCephCSIOpt{}, cmdN("component-update-ceph-csi"), "Update cluster component ceph csi", func(s *mcclient.ClientSession, args *o.ClusterUpdateComponentCephCSIOpt) error {
- params, err := args.Params()
- if err != nil {
- return err
- }
- ret, err := k8s.KubeClusters.PerformAction(s, args.ID, "update-component", params)
- if err != nil {
- return err
- }
- printObject(ret)
- return nil
- })
- type ClusterComponentTypeUpdate struct {
- o.ClusterComponentType
- Force bool `help:"Force update"`
- }
- R(&ClusterComponentTypeUpdate{}, cmdN("component-update"), "Update cluster component", func(s *mcclient.ClientSession, args *ClusterComponentTypeUpdate) error {
- // 1. get current setting
- setting, err := getComponentSetting(s, &args.ClusterComponentType, false)
- if err != nil {
- return errors.Wrap(err, "get component setting")
- }
- // 2. edit yaml
- yaml, err := shellutils.Edit(setting.YAMLString())
- if len(yaml) == 0 {
- if !args.Force {
- log.Infof("Nothing to update")
- return nil
- }
- yaml = setting.YAMLString()
- }
- nowSetting, err := jsonutils.ParseYAML(yaml)
- if err != nil {
- return err
- }
- params := args.Params(args.TYPE)
- params.Update(nowSetting)
- params.Add(jsonutils.NewBool(args.Force), "force")
- // 3. call update api
- ret, err := k8s.KubeClusters.PerformAction(s, args.ID, "update-component", params)
- if err != nil {
- return err
- }
- printObject(ret)
- return nil
- })
- type GetKubesprayConfigOpt struct {
- o.IdentOptions
- OUTPUT string `help:"Output directory to store config files"`
- }
- R(&GetKubesprayConfigOpt{}, cmdN("kubespray-config"), "Get cluster kubespray config", func(s *mcclient.ClientSession, args *GetKubesprayConfigOpt) error {
- conf, err := k8s.KubeClusters.GetSpecific(s, args.ID, "kubespray-config", nil)
- if err != nil {
- return err
- }
- inventoryContent, err := conf.GetString("inventory_content")
- if err != nil {
- return errors.Wrap(err, "get inventory content")
- }
- vars, err := conf.Get("vars")
- if err != nil {
- return errors.Wrap(err, "get variables")
- }
- privateKey, err := conf.GetString("private_key")
- if err != nil {
- return errors.Wrap(err, "get private key")
- }
- if err := os.MkdirAll(args.OUTPUT, 0755); err != nil {
- return errors.Wrap(err, "mkdir")
- }
- writeFile := func(name, content string) error {
- fp := filepath.Join(args.OUTPUT, name)
- log.Infof("Write file: %s", fp)
- if err := ioutil.WriteFile(fp, []byte(content), 0644); err != nil {
- return errors.Wrap(err, "write file")
- }
- if err := os.Chmod(fp, 0600); err != nil {
- return errors.Wrap(err, "chmod")
- }
- return nil
- }
- iPath := filepath.Join(args.OUTPUT, "hosts.ini")
- vPath := filepath.Join(args.OUTPUT, "vars.json")
- kPath := filepath.Join(args.OUTPUT, "private_key")
- for fPath, content := range map[string]string{
- iPath: inventoryContent,
- vPath: vars.PrettyString(),
- kPath: privateKey,
- } {
- name := filepath.Base(fPath)
- if err := writeFile(name, content); err != nil {
- return errors.Wrapf(err, "write file %s", name)
- }
- }
- fmt.Printf("try cmd:\nansible-playbook -i %s cluster.yml -b -v --private-key %s --extra-vars @%s\n", iPath, kPath, vPath)
- return nil
- })
- }
|