2017-11-06 20:50:41 +00:00
|
|
|
package cluster
|
|
|
|
|
|
|
|
import (
|
2018-01-16 18:29:09 +00:00
|
|
|
"bufio"
|
2018-01-09 22:10:56 +00:00
|
|
|
"context"
|
2017-11-21 23:49:30 +00:00
|
|
|
"fmt"
|
2018-01-16 18:29:09 +00:00
|
|
|
"io"
|
|
|
|
"net"
|
|
|
|
"strings"
|
2017-11-21 23:49:30 +00:00
|
|
|
|
2018-01-16 18:29:09 +00:00
|
|
|
"github.com/docker/docker/api/types/container"
|
|
|
|
"github.com/docker/go-connections/nat"
|
|
|
|
"github.com/rancher/rke/docker"
|
|
|
|
"github.com/rancher/rke/hosts"
|
2018-01-09 22:10:56 +00:00
|
|
|
"github.com/rancher/rke/log"
|
2017-11-21 23:49:30 +00:00
|
|
|
"github.com/rancher/rke/pki"
|
|
|
|
"github.com/rancher/rke/services"
|
2017-12-16 03:37:45 +00:00
|
|
|
"github.com/rancher/rke/templates"
|
2018-01-16 18:29:09 +00:00
|
|
|
"github.com/sirupsen/logrus"
|
|
|
|
"golang.org/x/sync/errgroup"
|
2017-11-06 20:50:41 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2017-11-30 14:49:00 +00:00
|
|
|
NetworkPluginResourceName = "rke-network-plugin"
|
2017-12-05 01:29:29 +00:00
|
|
|
|
2018-01-18 20:41:04 +00:00
|
|
|
PortCheckContainer = "rke-port-checker"
|
|
|
|
EtcdPortListenContainer = "rke-etcd-port-listener"
|
|
|
|
CPPortListenContainer = "rke-cp-port-listener"
|
|
|
|
WorkerPortListenContainer = "rke-worker-port-listener"
|
2018-01-16 18:29:09 +00:00
|
|
|
|
|
|
|
KubeAPIPort = "6443"
|
|
|
|
EtcdPort1 = "2379"
|
|
|
|
EtcdPort2 = "2380"
|
|
|
|
ScedulerPort = "10251"
|
|
|
|
ControllerPort = "10252"
|
|
|
|
KubeletPort = "10250"
|
|
|
|
KubeProxyPort = "10256"
|
|
|
|
FlannetVXLANPortUDP = "8472"
|
|
|
|
|
2017-12-05 01:29:29 +00:00
|
|
|
FlannelNetworkPlugin = "flannel"
|
|
|
|
FlannelImage = "flannel_image"
|
|
|
|
FlannelCNIImage = "flannel_cni_image"
|
2017-12-12 16:14:18 +00:00
|
|
|
FlannelIface = "flannel_iface"
|
2017-12-05 01:29:29 +00:00
|
|
|
|
2017-12-16 03:37:45 +00:00
|
|
|
CalicoNetworkPlugin = "calico"
|
|
|
|
CalicoNodeImage = "calico_node_image"
|
|
|
|
CalicoCNIImage = "calico_cni_image"
|
|
|
|
CalicoControllersImage = "calico_controllers_image"
|
|
|
|
CalicoctlImage = "calicoctl_image"
|
|
|
|
CalicoCloudProvider = "calico_cloud_provider"
|
2017-12-05 01:29:29 +00:00
|
|
|
|
|
|
|
CanalNetworkPlugin = "canal"
|
|
|
|
CanalNodeImage = "canal_node_image"
|
|
|
|
CanalCNIImage = "canal_cni_image"
|
|
|
|
CanalFlannelImage = "canal_flannel_image"
|
2017-12-06 03:53:51 +00:00
|
|
|
|
|
|
|
WeaveNetworkPlugin = "weave"
|
|
|
|
WeaveImage = "weave_node_image"
|
|
|
|
WeaveCNIImage = "weave_cni_image"
|
2017-12-16 03:37:45 +00:00
|
|
|
|
|
|
|
// List of map keys to be used with network templates
|
|
|
|
|
|
|
|
// EtcdEndpoints is the server address for Etcd, used by calico
|
|
|
|
EtcdEndpoints = "EtcdEndpoints"
|
|
|
|
// APIRoot is the kubernetes API address
|
|
|
|
APIRoot = "APIRoot"
|
|
|
|
// kubernetes client certificates and kubeconfig paths
|
|
|
|
|
|
|
|
ClientCert = "ClientCert"
|
|
|
|
ClientKey = "ClientKey"
|
|
|
|
ClientCA = "ClientCA"
|
|
|
|
KubeCfg = "KubeCfg"
|
|
|
|
|
|
|
|
ClusterCIDR = "ClusterCIDR"
|
|
|
|
// Images key names
|
|
|
|
|
|
|
|
Image = "Image"
|
|
|
|
CNIImage = "CNIImage"
|
|
|
|
NodeImage = "NodeImage"
|
|
|
|
ControllersImage = "ControllersImage"
|
|
|
|
CanalFlannelImg = "CanalFlannelImg"
|
|
|
|
|
|
|
|
Calicoctl = "Calicoctl"
|
|
|
|
|
|
|
|
FlannelInterface = "FlannelInterface"
|
|
|
|
CloudProvider = "CloudProvider"
|
|
|
|
AWSCloudProvider = "aws"
|
|
|
|
RBACConfig = "RBACConfig"
|
2017-11-06 20:50:41 +00:00
|
|
|
)
|
|
|
|
|
2018-01-09 22:10:56 +00:00
|
|
|
func (c *Cluster) DeployNetworkPlugin(ctx context.Context) error {
|
|
|
|
log.Infof(ctx, "[network] Setting up network plugin: %s", c.Network.Plugin)
|
2017-11-21 23:49:30 +00:00
|
|
|
switch c.Network.Plugin {
|
2017-11-28 17:45:24 +00:00
|
|
|
case FlannelNetworkPlugin:
|
2018-01-09 22:10:56 +00:00
|
|
|
return c.doFlannelDeploy(ctx)
|
2017-11-28 17:45:24 +00:00
|
|
|
case CalicoNetworkPlugin:
|
2018-01-09 22:10:56 +00:00
|
|
|
return c.doCalicoDeploy(ctx)
|
2017-11-28 17:45:24 +00:00
|
|
|
case CanalNetworkPlugin:
|
2018-01-09 22:10:56 +00:00
|
|
|
return c.doCanalDeploy(ctx)
|
2017-11-30 11:35:31 +00:00
|
|
|
case WeaveNetworkPlugin:
|
2018-01-09 22:10:56 +00:00
|
|
|
return c.doWeaveDeploy(ctx)
|
2017-11-21 23:49:30 +00:00
|
|
|
default:
|
|
|
|
return fmt.Errorf("[network] Unsupported network plugin: %s", c.Network.Plugin)
|
|
|
|
}
|
|
|
|
}
|
2017-11-08 17:45:51 +00:00
|
|
|
|
2018-01-09 22:10:56 +00:00
|
|
|
func (c *Cluster) doFlannelDeploy(ctx context.Context) error {
|
2017-12-12 16:14:18 +00:00
|
|
|
flannelConfig := map[string]string{
|
2017-12-16 03:37:45 +00:00
|
|
|
ClusterCIDR: c.ClusterCIDR,
|
|
|
|
Image: c.Network.Options[FlannelImage],
|
|
|
|
CNIImage: c.Network.Options[FlannelCNIImage],
|
|
|
|
FlannelInterface: c.Network.Options[FlannelIface],
|
|
|
|
RBACConfig: c.Authorization.Mode,
|
|
|
|
}
|
|
|
|
pluginYaml, err := c.getNetworkPluginManifest(flannelConfig)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2017-12-12 16:14:18 +00:00
|
|
|
}
|
2018-01-09 22:10:56 +00:00
|
|
|
return c.doAddonDeploy(ctx, pluginYaml, NetworkPluginResourceName)
|
2017-11-21 23:49:30 +00:00
|
|
|
}
|
2017-11-18 12:51:28 +00:00
|
|
|
|
2018-01-09 22:10:56 +00:00
|
|
|
func (c *Cluster) doCalicoDeploy(ctx context.Context) error {
|
2017-12-05 01:29:29 +00:00
|
|
|
calicoConfig := map[string]string{
|
2017-12-16 03:37:45 +00:00
|
|
|
EtcdEndpoints: services.GetEtcdConnString(c.EtcdHosts),
|
|
|
|
APIRoot: "https://127.0.0.1:6443",
|
|
|
|
ClientCert: pki.KubeNodeCertPath,
|
|
|
|
ClientKey: pki.KubeNodeKeyPath,
|
|
|
|
ClientCA: pki.CACertPath,
|
|
|
|
KubeCfg: pki.KubeNodeConfigPath,
|
|
|
|
ClusterCIDR: c.ClusterCIDR,
|
|
|
|
CNIImage: c.Network.Options[CalicoCNIImage],
|
|
|
|
NodeImage: c.Network.Options[CalicoNodeImage],
|
|
|
|
ControllersImage: c.Network.Options[CalicoControllersImage],
|
|
|
|
Calicoctl: c.Network.Options[CalicoctlImage],
|
|
|
|
CloudProvider: c.Network.Options[CalicoCloudProvider],
|
|
|
|
RBACConfig: c.Authorization.Mode,
|
|
|
|
}
|
|
|
|
pluginYaml, err := c.getNetworkPluginManifest(calicoConfig)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2017-12-05 01:29:29 +00:00
|
|
|
}
|
2018-01-09 22:10:56 +00:00
|
|
|
return c.doAddonDeploy(ctx, pluginYaml, NetworkPluginResourceName)
|
2017-11-21 23:49:30 +00:00
|
|
|
}
|
|
|
|
|
2018-01-09 22:10:56 +00:00
|
|
|
func (c *Cluster) doCanalDeploy(ctx context.Context) error {
|
2017-12-05 01:29:29 +00:00
|
|
|
canalConfig := map[string]string{
|
2017-12-16 03:37:45 +00:00
|
|
|
ClientCert: pki.KubeNodeCertPath,
|
|
|
|
APIRoot: "https://127.0.0.1:6443",
|
|
|
|
ClientKey: pki.KubeNodeKeyPath,
|
|
|
|
ClientCA: pki.CACertPath,
|
|
|
|
KubeCfg: pki.KubeNodeConfigPath,
|
|
|
|
ClusterCIDR: c.ClusterCIDR,
|
|
|
|
NodeImage: c.Network.Options[CanalNodeImage],
|
|
|
|
CNIImage: c.Network.Options[CanalCNIImage],
|
|
|
|
CanalFlannelImg: c.Network.Options[CanalFlannelImage],
|
|
|
|
RBACConfig: c.Authorization.Mode,
|
|
|
|
}
|
|
|
|
pluginYaml, err := c.getNetworkPluginManifest(canalConfig)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2017-12-05 01:29:29 +00:00
|
|
|
}
|
2018-01-09 22:10:56 +00:00
|
|
|
return c.doAddonDeploy(ctx, pluginYaml, NetworkPluginResourceName)
|
2017-11-06 20:50:41 +00:00
|
|
|
}
|
2017-12-05 01:29:29 +00:00
|
|
|
|
2018-01-09 22:10:56 +00:00
|
|
|
func (c *Cluster) doWeaveDeploy(ctx context.Context) error {
|
2017-12-14 21:56:19 +00:00
|
|
|
weaveConfig := map[string]string{
|
2017-12-16 03:37:45 +00:00
|
|
|
ClusterCIDR: c.ClusterCIDR,
|
|
|
|
Image: c.Network.Options[WeaveImage],
|
|
|
|
CNIImage: c.Network.Options[WeaveCNIImage],
|
|
|
|
RBACConfig: c.Authorization.Mode,
|
|
|
|
}
|
|
|
|
pluginYaml, err := c.getNetworkPluginManifest(weaveConfig)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2017-12-14 21:56:19 +00:00
|
|
|
}
|
2018-01-09 22:10:56 +00:00
|
|
|
return c.doAddonDeploy(ctx, pluginYaml, NetworkPluginResourceName)
|
2017-11-30 11:35:31 +00:00
|
|
|
}
|
|
|
|
|
2017-12-05 01:29:29 +00:00
|
|
|
func (c *Cluster) setClusterNetworkDefaults() {
|
|
|
|
setDefaultIfEmpty(&c.Network.Plugin, DefaultNetworkPlugin)
|
|
|
|
|
|
|
|
if c.Network.Options == nil {
|
|
|
|
// don't break if the user didn't define options
|
|
|
|
c.Network.Options = make(map[string]string)
|
|
|
|
}
|
2017-12-07 18:07:23 +00:00
|
|
|
networkPluginConfigDefaultsMap := make(map[string]string)
|
2017-12-16 03:37:45 +00:00
|
|
|
switch c.Network.Plugin {
|
|
|
|
case FlannelNetworkPlugin:
|
2017-12-07 18:07:23 +00:00
|
|
|
networkPluginConfigDefaultsMap = map[string]string{
|
|
|
|
FlannelImage: DefaultFlannelImage,
|
|
|
|
FlannelCNIImage: DefaultFlannelCNIImage,
|
|
|
|
}
|
2017-12-05 01:29:29 +00:00
|
|
|
|
2017-12-16 03:37:45 +00:00
|
|
|
case CalicoNetworkPlugin:
|
2017-12-07 18:07:23 +00:00
|
|
|
networkPluginConfigDefaultsMap = map[string]string{
|
2017-12-16 03:37:45 +00:00
|
|
|
CalicoCNIImage: DefaultCalicoCNIImage,
|
|
|
|
CalicoNodeImage: DefaultCalicoNodeImage,
|
|
|
|
CalicoControllersImage: DefaultCalicoControllersImage,
|
|
|
|
CalicoCloudProvider: DefaultNetworkCloudProvider,
|
|
|
|
CalicoctlImage: DefaultCalicoctlImage,
|
2017-12-07 18:07:23 +00:00
|
|
|
}
|
2017-12-05 01:29:29 +00:00
|
|
|
|
2017-12-16 03:37:45 +00:00
|
|
|
case CanalNetworkPlugin:
|
2017-12-07 18:07:23 +00:00
|
|
|
networkPluginConfigDefaultsMap = map[string]string{
|
|
|
|
CanalCNIImage: DefaultCanalCNIImage,
|
|
|
|
CanalNodeImage: DefaultCanalNodeImage,
|
|
|
|
CanalFlannelImage: DefaultCanalFlannelImage,
|
|
|
|
}
|
2017-12-06 03:53:51 +00:00
|
|
|
|
2017-12-16 03:37:45 +00:00
|
|
|
case WeaveNetworkPlugin:
|
2017-12-07 18:07:23 +00:00
|
|
|
networkPluginConfigDefaultsMap = map[string]string{
|
|
|
|
WeaveImage: DefaultWeaveImage,
|
|
|
|
WeaveCNIImage: DefaultWeaveCNIImage,
|
|
|
|
}
|
2017-12-05 01:29:29 +00:00
|
|
|
}
|
2017-12-07 18:07:23 +00:00
|
|
|
for k, v := range networkPluginConfigDefaultsMap {
|
|
|
|
setDefaultIfEmptyMapValue(c.Network.Options, k, v)
|
|
|
|
}
|
|
|
|
|
2017-12-05 01:29:29 +00:00
|
|
|
}
|
2017-12-16 03:37:45 +00:00
|
|
|
|
|
|
|
func (c *Cluster) getNetworkPluginManifest(pluginConfig map[string]string) (string, error) {
|
|
|
|
switch c.Network.Plugin {
|
|
|
|
case FlannelNetworkPlugin:
|
|
|
|
return templates.CompileTemplateFromMap(templates.FlannelTemplate, pluginConfig)
|
|
|
|
case CalicoNetworkPlugin:
|
|
|
|
return templates.CompileTemplateFromMap(templates.CalicoTemplate, pluginConfig)
|
|
|
|
case CanalNetworkPlugin:
|
|
|
|
return templates.CompileTemplateFromMap(templates.CanalTemplate, pluginConfig)
|
|
|
|
case WeaveNetworkPlugin:
|
|
|
|
return templates.CompileTemplateFromMap(templates.WeaveTemplate, pluginConfig)
|
|
|
|
default:
|
|
|
|
return "", fmt.Errorf("[network] Unsupported network plugin: %s", c.Network.Plugin)
|
|
|
|
}
|
|
|
|
}
|
2018-01-16 18:29:09 +00:00
|
|
|
|
2018-01-18 20:41:04 +00:00
|
|
|
func (c *Cluster) CheckClusterPorts(ctx context.Context, currentCluster *Cluster) error {
|
|
|
|
if currentCluster != nil {
|
|
|
|
newEtcdHost := hosts.GetToAddHosts(currentCluster.EtcdHosts, c.EtcdHosts)
|
|
|
|
newControlPlanHosts := hosts.GetToAddHosts(currentCluster.ControlPlaneHosts, c.ControlPlaneHosts)
|
|
|
|
newWorkerHosts := hosts.GetToAddHosts(currentCluster.WorkerHosts, c.WorkerHosts)
|
|
|
|
|
|
|
|
if len(newEtcdHost) == 0 &&
|
|
|
|
len(newWorkerHosts) == 0 &&
|
|
|
|
len(newControlPlanHosts) == 0 {
|
|
|
|
log.Infof(ctx, "[network] No hosts added existing cluster, skipping port check")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if err := c.deployTCPPortListeners(ctx, currentCluster); err != nil {
|
2018-01-16 18:29:09 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := c.runServicePortChecks(ctx); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := c.checkKubeAPIPort(ctx); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return c.removeTCPPortListeners(ctx)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Cluster) checkKubeAPIPort(ctx context.Context) error {
|
|
|
|
log.Infof(ctx, "[network] Checking KubeAPI port Control Plane hosts")
|
|
|
|
for _, host := range c.ControlPlaneHosts {
|
|
|
|
logrus.Debugf("[network] Checking KubeAPI port [%s] on host: %s", KubeAPIPort, host.Address)
|
|
|
|
address := fmt.Sprintf("%s:%s", host.Address, KubeAPIPort)
|
|
|
|
conn, err := net.Dial("tcp", address)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("[network] Can't access KubeAPI port [%s] on Control Plane host: %s", KubeAPIPort, host.Address)
|
|
|
|
}
|
|
|
|
conn.Close()
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-01-18 20:41:04 +00:00
|
|
|
func (c *Cluster) deployTCPPortListeners(ctx context.Context, currentCluster *Cluster) error {
|
2018-01-16 18:29:09 +00:00
|
|
|
log.Infof(ctx, "[network] Deploying port listener containers")
|
|
|
|
|
2018-01-18 20:41:04 +00:00
|
|
|
etcdHosts := []*hosts.Host{}
|
|
|
|
cpHosts := []*hosts.Host{}
|
|
|
|
workerHosts := []*hosts.Host{}
|
|
|
|
if currentCluster != nil {
|
|
|
|
etcdHosts = hosts.GetToAddHosts(currentCluster.EtcdHosts, c.EtcdHosts)
|
|
|
|
cpHosts = hosts.GetToAddHosts(currentCluster.ControlPlaneHosts, c.ControlPlaneHosts)
|
|
|
|
workerHosts = hosts.GetToAddHosts(currentCluster.WorkerHosts, c.WorkerHosts)
|
|
|
|
} else {
|
|
|
|
etcdHosts = c.EtcdHosts
|
|
|
|
cpHosts = c.ControlPlaneHosts
|
|
|
|
workerHosts = c.WorkerHosts
|
|
|
|
}
|
|
|
|
// deploy ectd listeners
|
|
|
|
etcdPortList := []string{
|
2018-01-16 18:29:09 +00:00
|
|
|
EtcdPort1,
|
|
|
|
EtcdPort2,
|
2018-01-18 20:41:04 +00:00
|
|
|
}
|
|
|
|
if err := c.deployListenerOnPlane(ctx, etcdPortList, etcdHosts, EtcdPortListenContainer); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// deploy controlplane listeners
|
|
|
|
controlPlanePortList := []string{
|
|
|
|
KubeAPIPort,
|
|
|
|
}
|
|
|
|
if err := c.deployListenerOnPlane(ctx, controlPlanePortList, cpHosts, CPPortListenContainer); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// deploy worker listeners
|
|
|
|
workerPortList := []string{
|
2018-01-16 18:29:09 +00:00
|
|
|
KubeletPort,
|
|
|
|
}
|
2018-01-18 20:41:04 +00:00
|
|
|
if err := c.deployListenerOnPlane(ctx, workerPortList, workerHosts, WorkerPortListenContainer); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
log.Infof(ctx, "[network] Port listener containers deployed successfully")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Cluster) deployListenerOnPlane(ctx context.Context, portList []string, holstPlane []*hosts.Host, containerName string) error {
|
2018-01-16 18:29:09 +00:00
|
|
|
portBindingList := []nat.PortBinding{}
|
|
|
|
for _, portNumber := range portList {
|
|
|
|
rawPort := fmt.Sprintf("0.0.0.0:%s:1337/tcp", portNumber)
|
|
|
|
portMapping, _ := nat.ParsePortSpec(rawPort)
|
|
|
|
portBindingList = append(portBindingList, portMapping[0].Binding)
|
|
|
|
}
|
|
|
|
|
|
|
|
imageCfg := &container.Config{
|
|
|
|
Image: c.SystemImages[AplineImage],
|
|
|
|
Cmd: []string{
|
|
|
|
"nc",
|
|
|
|
"-kl",
|
|
|
|
"-p",
|
|
|
|
"1337",
|
|
|
|
"-e",
|
|
|
|
"echo",
|
|
|
|
},
|
|
|
|
ExposedPorts: nat.PortSet{
|
|
|
|
"1337/tcp": {},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
hostCfg := &container.HostConfig{
|
|
|
|
PortBindings: nat.PortMap{
|
|
|
|
"1337/tcp": portBindingList,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2018-01-18 20:41:04 +00:00
|
|
|
var errgrp errgroup.Group
|
|
|
|
for _, host := range holstPlane {
|
2018-01-16 18:29:09 +00:00
|
|
|
runHost := host
|
|
|
|
errgrp.Go(func() error {
|
2018-01-18 20:41:04 +00:00
|
|
|
logrus.Debugf("[network] Starting deployListener [%s] on host [%s]", containerName, runHost.Address)
|
|
|
|
return docker.DoRunContainer(ctx, runHost.DClient, imageCfg, hostCfg, containerName, runHost.Address, "network")
|
2018-01-16 18:29:09 +00:00
|
|
|
})
|
|
|
|
}
|
2018-01-18 20:41:04 +00:00
|
|
|
return errgrp.Wait()
|
2018-01-16 18:29:09 +00:00
|
|
|
}
|
2018-01-18 20:41:04 +00:00
|
|
|
|
2018-01-16 18:29:09 +00:00
|
|
|
func (c *Cluster) removeTCPPortListeners(ctx context.Context) error {
|
|
|
|
log.Infof(ctx, "[network] Removing port listener containers")
|
|
|
|
|
2018-01-18 20:41:04 +00:00
|
|
|
if err := removeListenerFromPlane(ctx, c.EtcdHosts, EtcdPortListenContainer); err != nil {
|
|
|
|
return err
|
2018-01-16 18:29:09 +00:00
|
|
|
}
|
2018-01-18 20:41:04 +00:00
|
|
|
if err := removeListenerFromPlane(ctx, c.ControlPlaneHosts, CPPortListenContainer); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := removeListenerFromPlane(ctx, c.WorkerHosts, WorkerPortListenContainer); err != nil {
|
2018-01-16 18:29:09 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
log.Infof(ctx, "[network] Port listener containers removed successfully")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-01-18 20:41:04 +00:00
|
|
|
func removeListenerFromPlane(ctx context.Context, hostPlane []*hosts.Host, containerName string) error {
|
|
|
|
var errgrp errgroup.Group
|
|
|
|
for _, host := range hostPlane {
|
|
|
|
runHost := host
|
|
|
|
errgrp.Go(func() error {
|
|
|
|
return docker.DoRemoveContainer(ctx, runHost.DClient, containerName, runHost.Address)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
return errgrp.Wait()
|
|
|
|
}
|
2018-01-16 18:29:09 +00:00
|
|
|
func (c *Cluster) runServicePortChecks(ctx context.Context) error {
|
|
|
|
var errgrp errgroup.Group
|
|
|
|
// check etcd <-> etcd
|
|
|
|
etcdPortList := []string{
|
|
|
|
EtcdPort1,
|
|
|
|
EtcdPort2,
|
|
|
|
}
|
|
|
|
// one etcd host is a pass
|
|
|
|
if len(c.EtcdHosts) > 1 {
|
|
|
|
log.Infof(ctx, "[network] Running etcd <-> etcd port checks")
|
|
|
|
for _, host := range c.EtcdHosts {
|
|
|
|
runHost := host
|
|
|
|
errgrp.Go(func() error {
|
|
|
|
return checkPlaneTCPPortsFromHost(ctx, runHost, etcdPortList, c.EtcdHosts, c.SystemImages[AplineImage])
|
|
|
|
})
|
|
|
|
}
|
|
|
|
if err := errgrp.Wait(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// check all -> etcd connectivity
|
|
|
|
log.Infof(ctx, "[network] Running all -> etcd port checks")
|
|
|
|
for _, host := range c.ControlPlaneHosts {
|
|
|
|
runHost := host
|
|
|
|
errgrp.Go(func() error {
|
|
|
|
return checkPlaneTCPPortsFromHost(ctx, runHost, etcdPortList, c.EtcdHosts, c.SystemImages[AplineImage])
|
|
|
|
})
|
|
|
|
}
|
|
|
|
if err := errgrp.Wait(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// Workers need to talk to etcd for calico
|
|
|
|
for _, host := range c.WorkerHosts {
|
|
|
|
runHost := host
|
|
|
|
errgrp.Go(func() error {
|
|
|
|
return checkPlaneTCPPortsFromHost(ctx, runHost, etcdPortList, c.EtcdHosts, c.SystemImages[AplineImage])
|
|
|
|
})
|
|
|
|
}
|
|
|
|
if err := errgrp.Wait(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// check controle plane -> Workers
|
|
|
|
log.Infof(ctx, "[network] Running control plane -> etcd port checks")
|
|
|
|
workerPortList := []string{
|
|
|
|
KubeletPort,
|
|
|
|
}
|
|
|
|
for _, host := range c.ControlPlaneHosts {
|
|
|
|
runHost := host
|
|
|
|
errgrp.Go(func() error {
|
|
|
|
return checkPlaneTCPPortsFromHost(ctx, runHost, workerPortList, c.WorkerHosts, c.SystemImages[AplineImage])
|
|
|
|
})
|
|
|
|
}
|
|
|
|
if err := errgrp.Wait(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// check workers -> control plane
|
|
|
|
log.Infof(ctx, "[network] Running workers -> control plane port checks")
|
|
|
|
controlPlanePortList := []string{
|
|
|
|
KubeAPIPort,
|
|
|
|
}
|
|
|
|
for _, host := range c.WorkerHosts {
|
|
|
|
runHost := host
|
|
|
|
errgrp.Go(func() error {
|
|
|
|
return checkPlaneTCPPortsFromHost(ctx, runHost, controlPlanePortList, c.ControlPlaneHosts, c.SystemImages[AplineImage])
|
|
|
|
})
|
|
|
|
}
|
|
|
|
return errgrp.Wait()
|
|
|
|
}
|
|
|
|
|
|
|
|
func checkPlaneTCPPortsFromHost(ctx context.Context, host *hosts.Host, portList []string, planeHosts []*hosts.Host, image string) error {
|
|
|
|
hosts := []string{}
|
|
|
|
for _, host := range planeHosts {
|
2018-01-18 20:41:04 +00:00
|
|
|
hosts = append(hosts, host.InternalAddress)
|
2018-01-16 18:29:09 +00:00
|
|
|
}
|
|
|
|
imageCfg := &container.Config{
|
|
|
|
Image: image,
|
|
|
|
Tty: true,
|
|
|
|
Env: []string{
|
|
|
|
fmt.Sprintf("HOSTS=%s", strings.Join(hosts, " ")),
|
|
|
|
fmt.Sprintf("PORTS=%s", strings.Join(portList, " ")),
|
|
|
|
},
|
|
|
|
Cmd: []string{
|
|
|
|
"sh",
|
|
|
|
"-c",
|
|
|
|
"for host in $HOSTS; do for port in $PORTS ; do nc -z $host $port > /dev/null || echo $host $port ; done; done",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if err := docker.DoRemoveContainer(ctx, host.DClient, PortCheckContainer, host.Address); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := docker.DoRunContainer(ctx, host.DClient, imageCfg, nil, PortCheckContainer, host.Address, "network"); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := docker.WaitForContainer(ctx, host.DClient, PortCheckContainer); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
logs, err := docker.ReadContainerLogs(ctx, host.DClient, PortCheckContainer)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer logs.Close()
|
|
|
|
if err := docker.RemoveContainer(ctx, host.DClient, host.Address, PortCheckContainer); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
portCheckLogs, err := getPortCheckLogs(logs)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if len(portCheckLogs) > 0 {
|
|
|
|
|
|
|
|
return fmt.Errorf("[netwok] Port check for ports: [%s] failed on host: [%s]", strings.Join(portCheckLogs, ", "), host.Address)
|
|
|
|
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func getPortCheckLogs(reader io.ReadCloser) ([]string, error) {
|
|
|
|
logLines := bufio.NewScanner(reader)
|
|
|
|
hostPortLines := []string{}
|
|
|
|
for logLines.Scan() {
|
|
|
|
logLine := strings.Split(logLines.Text(), " ")
|
|
|
|
hostPortLines = append(hostPortLines, fmt.Sprintf("%s:%s", logLine[0], logLine[1]))
|
|
|
|
}
|
|
|
|
if err := logLines.Err(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return hostPortLines, nil
|
|
|
|
}
|