mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-30 21:30:16 +00:00 
			
		
		
		
	Automatic merge from submit-queue (batch tested with PRs 46913, 48910, 48858, 47160) federation: Stop using and remove federation internalclientset **What this PR does / why we need it**: This probably a left over job. We should not be using the internal clientset and instead be using versioned ones as described in #29934 **Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes # **Special notes for your reviewer**: ```release-note NONE ``` /assign @nikhiljindal /cc @kubernetes/sig-federation-misc
		
			
				
	
	
		
			334 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			334 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2016 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package kubefed
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"net/url"
 | |
| 	"strings"
 | |
| 
 | |
| 	"k8s.io/apimachinery/pkg/api/errors"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/apimachinery/pkg/runtime/schema"
 | |
| 	federationapi "k8s.io/kubernetes/federation/apis/federation/v1beta1"
 | |
| 	"k8s.io/kubernetes/federation/pkg/kubefed/util"
 | |
| 	"k8s.io/kubernetes/pkg/api"
 | |
| 	"k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
 | |
| 	"k8s.io/kubernetes/pkg/kubectl"
 | |
| 	"k8s.io/kubernetes/pkg/kubectl/cmd/templates"
 | |
| 	cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
 | |
| 	"k8s.io/kubernetes/pkg/kubectl/resource"
 | |
| 
 | |
| 	"github.com/spf13/cobra"
 | |
| 	"github.com/spf13/pflag"
 | |
| )
 | |
| 
 | |
| var (
 | |
| 	unjoin_long = templates.LongDesc(`
 | |
| 		Unjoin a cluster from a federation.
 | |
| 
 | |
|         Current context is assumed to be a federation endpoint.
 | |
|         Please use the --context flag otherwise.`)
 | |
| 	unjoin_example = templates.Examples(`
 | |
| 		# Unjoin the specified cluster from a federation.
 | |
| 		# Federation control plane's host cluster context name
 | |
| 		# must be specified via the --host-cluster-context flag
 | |
| 		# to properly cleanup the credentials.
 | |
| 		kubectl unjoin foo --host-cluster-context=bar --cluster-context=baz`)
 | |
| )
 | |
| 
 | |
| type unjoinFederation struct {
 | |
| 	commonOptions util.SubcommandOptions
 | |
| 	options       unjoinFederationOptions
 | |
| }
 | |
| 
 | |
| type unjoinFederationOptions struct {
 | |
| 	clusterContext string
 | |
| }
 | |
| 
 | |
| func (o *unjoinFederationOptions) Bind(flags *pflag.FlagSet) {
 | |
| 	flags.StringVar(&o.clusterContext, "cluster-context", "", "Name of the cluster's context in the local kubeconfig. Defaults to cluster name if unspecified.")
 | |
| }
 | |
| 
 | |
| // NewCmdUnjoin defines the `unjoin` command that removes a cluster
 | |
| // from a federation.
 | |
| func NewCmdUnjoin(f cmdutil.Factory, cmdOut, cmdErr io.Writer, config util.AdminConfig) *cobra.Command {
 | |
| 	opts := &unjoinFederation{}
 | |
| 
 | |
| 	cmd := &cobra.Command{
 | |
| 		Use:     "unjoin CLUSTER_NAME --host-cluster-context=HOST_CONTEXT",
 | |
| 		Short:   "Unjoin a cluster from a federation",
 | |
| 		Long:    unjoin_long,
 | |
| 		Example: unjoin_example,
 | |
| 		Run: func(cmd *cobra.Command, args []string) {
 | |
| 			cmdutil.CheckErr(opts.commonOptions.SetName(cmd, args))
 | |
| 			cmdutil.CheckErr(opts.Run(f, cmdOut, cmdErr, config))
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	flags := cmd.Flags()
 | |
| 	opts.commonOptions.Bind(flags)
 | |
| 	opts.options.Bind(flags)
 | |
| 
 | |
| 	return cmd
 | |
| }
 | |
| 
 | |
| // unjoinFederation is the implementation of the `unjoin` command.
 | |
| func (u *unjoinFederation) Run(f cmdutil.Factory, cmdOut, cmdErr io.Writer, config util.AdminConfig) error {
 | |
| 	if u.options.clusterContext == "" {
 | |
| 		u.options.clusterContext = u.commonOptions.Name
 | |
| 	}
 | |
| 
 | |
| 	cluster, err := popCluster(f, u.commonOptions.Name)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if cluster == nil {
 | |
| 		fmt.Fprintf(cmdErr, "WARNING: cluster %q not found in federation, so its credentials' secret couldn't be deleted", u.commonOptions.Name)
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// We want a separate client factory to communicate with the
 | |
| 	// federation host cluster. See join_federation.go for details.
 | |
| 	hostFactory := config.ClusterFactory(u.commonOptions.Host, u.commonOptions.Kubeconfig)
 | |
| 	hostClientset, err := hostFactory.ClientSet()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	secretName := cluster.Spec.SecretRef.Name
 | |
| 	secret, err := hostClientset.Core().Secrets(u.commonOptions.FederationSystemNamespace).Get(secretName, metav1.GetOptions{})
 | |
| 	if isNotFound(err) {
 | |
| 		// If this is the case, we cannot get the cluster clientset to delete the
 | |
| 		// config map from that cluster and obviously cannot delete the not existing secret.
 | |
| 		// We just publish the warning as cluster has already been removed from federation.
 | |
| 		fmt.Fprintf(cmdErr, "WARNING: secret %q not found in the host cluster, so it couldn't be deleted. Cluster has already been removed from the federation.", secretName)
 | |
| 		return nil
 | |
| 	} else if err != nil {
 | |
| 		fmt.Fprintf(cmdErr, "WARNING: Error retrieving secret from the base cluster")
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	unjoiningClusterFactory := config.ClusterFactory(u.options.clusterContext, u.commonOptions.Kubeconfig)
 | |
| 	unjoiningClusterClientset, err := unjoiningClusterFactory.ClientSet()
 | |
| 	outerErr := err
 | |
| 	if err != nil {
 | |
| 		// Attempt to get a clientset using information from the cluster.
 | |
| 		unjoiningClusterClientset, err = getClientsetFromCluster(secret, cluster)
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("unable to get clientset from kubeconfig or cluster: %v, %v", outerErr, err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	err = deleteSecret(hostClientset, cluster.Spec.SecretRef.Name, u.commonOptions.FederationSystemNamespace)
 | |
| 	if err != nil {
 | |
| 		fmt.Fprintf(cmdErr, "WARNING: secret %q could not be deleted: %v", secretName, err)
 | |
| 		// We anyways continue to try and delete the config map but with above warning
 | |
| 	}
 | |
| 
 | |
| 	// We need to ensure updating the config map created in the deregistered cluster
 | |
| 	// This configmap was created/updated when the cluster joined this federation to aid
 | |
| 	// the kube-dns of that cluster to aid service discovery.
 | |
| 	err = updateConfigMapFromCluster(hostClientset, unjoiningClusterClientset, u.commonOptions.FederationSystemNamespace)
 | |
| 	if err != nil {
 | |
| 		fmt.Fprintf(cmdErr, "WARNING: Encountered error in deleting kube-dns configmap: %v", err)
 | |
| 		// We anyways continue to print success message but with above warning
 | |
| 	}
 | |
| 
 | |
| 	// Delete the service account in the unjoining cluster.
 | |
| 	err = deleteServiceAccountFromCluster(unjoiningClusterClientset, cluster, u.commonOptions.FederationSystemNamespace)
 | |
| 	if err != nil {
 | |
| 		fmt.Fprintf(cmdErr, "WARNING: Encountered error in deleting service account: %v", err)
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// Delete the cluster role and role binding in the unjoining cluster.
 | |
| 	err = deleteClusterRoleBindingFromCluster(unjoiningClusterClientset, cluster)
 | |
| 	if err != nil {
 | |
| 		fmt.Fprintf(cmdErr, "WARNING: Encountered error in deleting cluster role bindings: %v", err)
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	_, err = fmt.Fprintf(cmdOut, "Successfully removed cluster %q from federation\n", u.commonOptions.Name)
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // popCluster fetches the cluster object with the given name, deletes
 | |
| // it and returns the deleted cluster object.
 | |
| func popCluster(f cmdutil.Factory, name string) (*federationapi.Cluster, error) {
 | |
| 	mapper, typer := f.Object()
 | |
| 	gvks, _, err := typer.ObjectKinds(&federationapi.Cluster{})
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	gvk := gvks[0]
 | |
| 	mapping, err := mapper.RESTMapping(schema.GroupKind{Group: gvk.Group, Kind: gvk.Kind}, gvk.Version)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	client, err := f.ClientForMapping(mapping)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	rh := resource.NewHelper(client, mapping)
 | |
| 	obj, err := rh.Get("", name, false)
 | |
| 
 | |
| 	if isNotFound(err) {
 | |
| 		// Cluster isn't registered, there isn't anything to be done here.
 | |
| 		return nil, nil
 | |
| 	} else if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	cluster, ok := obj.(*federationapi.Cluster)
 | |
| 	if !ok {
 | |
| 		return nil, fmt.Errorf("unexpected object type: expected \"federation/v1beta1.Cluster\", got %T: obj: %#v", obj, obj)
 | |
| 	}
 | |
| 
 | |
| 	// Remove the cluster resource in the federation API server by
 | |
| 	// calling rh.Delete()
 | |
| 	return cluster, rh.Delete("", name)
 | |
| }
 | |
| 
 | |
| func updateConfigMapFromCluster(hostClientset, unjoiningClusterClientset internalclientset.Interface, fedSystemNamespace string) error {
 | |
| 	cmDep, err := getCMDeployment(hostClientset, fedSystemNamespace)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	domainMap, ok := cmDep.Annotations[util.FedDomainMapKey]
 | |
| 	if !ok {
 | |
| 		return fmt.Errorf("kube-dns config map data missing from controller manager annotations")
 | |
| 	}
 | |
| 
 | |
| 	configMap, err := unjoiningClusterClientset.Core().ConfigMaps(metav1.NamespaceSystem).Get(util.KubeDnsConfigmapName, metav1.GetOptions{})
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	needUpdate := false
 | |
| 	if _, ok := configMap.Data[util.FedDomainMapKey]; ok {
 | |
| 		configMap.Data[util.FedDomainMapKey] = removeConfigMapString(configMap.Data[util.FedDomainMapKey], domainMap)
 | |
| 		needUpdate = true
 | |
| 	}
 | |
| 
 | |
| 	if _, ok := configMap.Data[util.KubeDnsStubDomains]; ok {
 | |
| 		delete(configMap.Data, util.KubeDnsStubDomains)
 | |
| 		needUpdate = true
 | |
| 	}
 | |
| 
 | |
| 	if needUpdate {
 | |
| 		_, err = unjoiningClusterClientset.Core().ConfigMaps(metav1.NamespaceSystem).Update(configMap)
 | |
| 	}
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // deleteSecret deletes the secret with the given name from the host
 | |
| // cluster.
 | |
| func deleteSecret(clientset internalclientset.Interface, name, namespace string) error {
 | |
| 	orphanDependents := false
 | |
| 	return clientset.Core().Secrets(namespace).Delete(name, &metav1.DeleteOptions{OrphanDependents: &orphanDependents})
 | |
| }
 | |
| 
 | |
| // isNotFound checks if the given error is a NotFound status error.
 | |
| func isNotFound(err error) bool {
 | |
| 	statusErr := err
 | |
| 	if urlErr, ok := err.(*url.Error); ok {
 | |
| 		statusErr = urlErr.Err
 | |
| 	}
 | |
| 	return errors.IsNotFound(statusErr)
 | |
| }
 | |
| 
 | |
| func getClientsetFromCluster(secret *api.Secret, cluster *federationapi.Cluster) (*internalclientset.Clientset, error) {
 | |
| 	serverAddress, err := util.GetServerAddress(cluster)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if serverAddress == "" {
 | |
| 		return nil, fmt.Errorf("failed to get server address for the cluster: %s", cluster.Name)
 | |
| 	}
 | |
| 
 | |
| 	clientset, err := util.GetClientsetFromSecret(secret, serverAddress)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if clientset == nil {
 | |
| 		// There is a possibility that the clientset is nil without any error reported
 | |
| 		return nil, fmt.Errorf("failed for get client to access cluster: %s", cluster.Name)
 | |
| 	}
 | |
| 
 | |
| 	return clientset, nil
 | |
| }
 | |
| 
 | |
| // removeConfigMapString returns an empty string if last value is removed
 | |
| // or returns the remaining comma separated strings minus the one to be removed
 | |
| func removeConfigMapString(str string, toRemove string) string {
 | |
| 	if str == "" {
 | |
| 		return ""
 | |
| 	}
 | |
| 
 | |
| 	values := strings.Split(str, ",")
 | |
| 	if len(values) == 1 {
 | |
| 		if values[0] == toRemove {
 | |
| 			return ""
 | |
| 		} else {
 | |
| 			// Somehow our federation string is not here
 | |
| 			// Dont do anything further
 | |
| 			return values[0]
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	for i, v := range values {
 | |
| 		if v == toRemove {
 | |
| 			values = append(values[:i], values[i+1:]...)
 | |
| 			break
 | |
| 		}
 | |
| 	}
 | |
| 	return strings.Join(values, ",")
 | |
| }
 | |
| 
 | |
| // deleteServiceAccountFromCluster removes the service account that the federation control plane uses
 | |
| // to access the cluster from the cluster that is leaving the federation.
 | |
| func deleteServiceAccountFromCluster(unjoiningClusterClientset internalclientset.Interface, cluster *federationapi.Cluster, fedSystemNamespace string) error {
 | |
| 	serviceAccountName, ok := cluster.ObjectMeta.Annotations[kubectl.ServiceAccountNameAnnotation]
 | |
| 	if !ok {
 | |
| 		// If there is no service account name annotation, assume that this cluster does not have a federation control plane service account.
 | |
| 		return nil
 | |
| 	}
 | |
| 	return unjoiningClusterClientset.Core().ServiceAccounts(fedSystemNamespace).Delete(serviceAccountName, &metav1.DeleteOptions{})
 | |
| }
 | |
| 
 | |
| // deleteClusterRoleBindingFromCluster deletes the ClusterRole and ClusterRoleBinding from the
 | |
| // cluster that is leaving the federation.
 | |
| func deleteClusterRoleBindingFromCluster(unjoiningClusterClientset internalclientset.Interface, cluster *federationapi.Cluster) error {
 | |
| 	clusterRoleName, ok := cluster.ObjectMeta.Annotations[kubectl.ClusterRoleNameAnnotation]
 | |
| 	if !ok {
 | |
| 		// If there is no cluster role name annotation, assume that this cluster does not have cluster role bindings.
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	err := unjoiningClusterClientset.Rbac().ClusterRoleBindings().Delete(clusterRoleName, &metav1.DeleteOptions{})
 | |
| 	if err != nil && !errors.IsMethodNotSupported(err) && !errors.IsNotFound(err) {
 | |
| 		return err
 | |
| 	}
 | |
| 	err = unjoiningClusterClientset.Rbac().ClusterRoles().Delete(clusterRoleName, &metav1.DeleteOptions{})
 | |
| 	if err != nil && !errors.IsMethodNotSupported(err) && !errors.IsNotFound(err) {
 | |
| 		return err
 | |
| 	}
 | |
| 	return nil
 | |
| }
 |