2017-10-31 13:55:35 +00:00
|
|
|
package services
|
|
|
|
|
|
|
|
import (
|
2018-01-09 22:10:56 +00:00
|
|
|
"context"
|
|
|
|
|
2017-10-31 13:55:35 +00:00
|
|
|
"github.com/rancher/rke/hosts"
|
2018-01-09 22:10:56 +00:00
|
|
|
"github.com/rancher/rke/log"
|
2018-03-12 19:04:28 +00:00
|
|
|
"github.com/rancher/rke/pki"
|
2018-10-17 22:26:54 +00:00
|
|
|
"github.com/rancher/rke/util"
|
2017-12-05 16:55:58 +00:00
|
|
|
"github.com/rancher/types/apis/management.cattle.io/v3"
|
2017-12-29 03:33:20 +00:00
|
|
|
"golang.org/x/sync/errgroup"
|
2017-10-31 13:55:35 +00:00
|
|
|
)
|
|
|
|
|
2018-02-01 21:28:31 +00:00
|
|
|
const (
|
2018-05-31 21:06:59 +00:00
|
|
|
unschedulableEtcdTaint = "node-role.kubernetes.io/etcd=true:NoExecute"
|
2018-06-22 04:04:07 +00:00
|
|
|
unschedulableControlTaint = "node-role.kubernetes.io/controlplane=true:NoSchedule"
|
2018-02-01 21:28:31 +00:00
|
|
|
)
|
|
|
|
|
2018-04-11 22:54:47 +00:00
|
|
|
func RunWorkerPlane(ctx context.Context, allHosts []*hosts.Host, localConnDialerFactory hosts.DialerFactory, prsMap map[string]v3.PrivateRegistry, workerNodePlanMap map[string]v3.RKEConfigNodePlan, certMap map[string]pki.CertificatePKI, updateWorkersOnly bool, alpineImage string) error {
|
2018-01-09 22:10:56 +00:00
|
|
|
log.Infof(ctx, "[%s] Building up Worker Plane..", WorkerRole)
|
2017-12-29 03:33:20 +00:00
|
|
|
var errgrp errgroup.Group
|
2018-10-17 22:26:54 +00:00
|
|
|
|
|
|
|
hostsQueue := util.GetObjectQueue(allHosts)
|
|
|
|
for w := 0; w < WorkerThreads; w++ {
|
2017-12-29 03:33:20 +00:00
|
|
|
errgrp.Go(func() error {
|
2018-10-17 22:26:54 +00:00
|
|
|
var errList []error
|
|
|
|
for host := range hostsQueue {
|
|
|
|
runHost := host.(*hosts.Host)
|
|
|
|
err := doDeployWorkerPlaneHost(ctx, runHost, localConnDialerFactory, prsMap, workerNodePlanMap[runHost.Address].Processes, certMap, updateWorkersOnly, alpineImage)
|
|
|
|
if err != nil {
|
|
|
|
errList = append(errList, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return util.ErrList(errList)
|
2017-12-29 03:33:20 +00:00
|
|
|
})
|
|
|
|
}
|
2018-10-17 22:26:54 +00:00
|
|
|
|
2017-12-29 03:33:20 +00:00
|
|
|
if err := errgrp.Wait(); err != nil {
|
|
|
|
return err
|
2017-10-31 13:55:35 +00:00
|
|
|
}
|
2018-01-09 22:10:56 +00:00
|
|
|
log.Infof(ctx, "[%s] Successfully started Worker Plane..", WorkerRole)
|
2017-10-31 13:55:35 +00:00
|
|
|
return nil
|
|
|
|
}
|
2017-11-15 02:54:26 +00:00
|
|
|
|
2018-10-17 22:26:54 +00:00
|
|
|
func doDeployWorkerPlaneHost(ctx context.Context, host *hosts.Host, localConnDialerFactory hosts.DialerFactory, prsMap map[string]v3.PrivateRegistry, processMap map[string]v3.Process, certMap map[string]pki.CertificatePKI, updateWorkersOnly bool, alpineImage string) error {
|
|
|
|
if updateWorkersOnly {
|
|
|
|
if !host.UpdateWorker {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !host.IsWorker {
|
|
|
|
if host.IsEtcd {
|
|
|
|
// Add unschedulable taint
|
|
|
|
host.ToAddTaints = append(host.ToAddTaints, unschedulableEtcdTaint)
|
|
|
|
}
|
|
|
|
if host.IsControl {
|
|
|
|
// Add unschedulable taint
|
|
|
|
host.ToAddTaints = append(host.ToAddTaints, unschedulableControlTaint)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return doDeployWorkerPlane(ctx, host, localConnDialerFactory, prsMap, processMap, certMap, alpineImage)
|
|
|
|
}
|
|
|
|
|
2018-01-09 22:10:56 +00:00
|
|
|
func RemoveWorkerPlane(ctx context.Context, workerHosts []*hosts.Host, force bool) error {
|
|
|
|
log.Infof(ctx, "[%s] Tearing down Worker Plane..", WorkerRole)
|
2018-10-23 23:38:00 +00:00
|
|
|
var errgrp errgroup.Group
|
|
|
|
hostsQueue := util.GetObjectQueue(workerHosts)
|
|
|
|
for w := 0; w < WorkerThreads; w++ {
|
|
|
|
errgrp.Go(func() error {
|
|
|
|
var errList []error
|
|
|
|
for host := range hostsQueue {
|
|
|
|
runHost := host.(*hosts.Host)
|
|
|
|
if runHost.IsControl && !force {
|
|
|
|
log.Infof(ctx, "[%s] Host [%s] is already a controlplane host, nothing to do.", WorkerRole, runHost.Address)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if err := removeKubelet(ctx, runHost); err != nil {
|
|
|
|
errList = append(errList, err)
|
|
|
|
}
|
|
|
|
if err := removeKubeproxy(ctx, runHost); err != nil {
|
|
|
|
errList = append(errList, err)
|
|
|
|
}
|
|
|
|
if err := removeNginxProxy(ctx, runHost); err != nil {
|
|
|
|
errList = append(errList, err)
|
|
|
|
}
|
|
|
|
if err := removeSidekick(ctx, runHost); err != nil {
|
|
|
|
errList = append(errList, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return util.ErrList(errList)
|
|
|
|
})
|
|
|
|
}
|
2017-11-20 18:08:50 +00:00
|
|
|
|
2018-10-23 23:38:00 +00:00
|
|
|
if err := errgrp.Wait(); err != nil {
|
|
|
|
return err
|
2017-11-20 18:08:50 +00:00
|
|
|
}
|
2018-10-23 23:38:00 +00:00
|
|
|
log.Infof(ctx, "[%s] Successfully tore down Worker Plane..", WorkerRole)
|
2018-08-20 04:37:04 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func RestartWorkerPlane(ctx context.Context, workerHosts []*hosts.Host) error {
|
|
|
|
log.Infof(ctx, "[%s] Restarting Worker Plane..", WorkerRole)
|
|
|
|
var errgrp errgroup.Group
|
|
|
|
|
|
|
|
hostsQueue := util.GetObjectQueue(workerHosts)
|
|
|
|
for w := 0; w < WorkerThreads; w++ {
|
|
|
|
errgrp.Go(func() error {
|
|
|
|
var errList []error
|
|
|
|
for host := range hostsQueue {
|
|
|
|
runHost := host.(*hosts.Host)
|
2019-01-14 17:51:20 +00:00
|
|
|
if err := RestartKubelet(ctx, runHost); err != nil {
|
2018-08-20 04:37:04 +00:00
|
|
|
errList = append(errList, err)
|
|
|
|
}
|
2019-01-14 17:51:20 +00:00
|
|
|
if err := RestartKubeproxy(ctx, runHost); err != nil {
|
2018-08-20 04:37:04 +00:00
|
|
|
errList = append(errList, err)
|
|
|
|
}
|
2019-01-14 17:51:20 +00:00
|
|
|
if err := RestartNginxProxy(ctx, runHost); err != nil {
|
2018-08-20 04:37:04 +00:00
|
|
|
errList = append(errList, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return util.ErrList(errList)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
if err := errgrp.Wait(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
log.Infof(ctx, "[%s] Successfully restarted Worker Plane..", WorkerRole)
|
2017-11-30 23:16:45 +00:00
|
|
|
|
2017-11-20 18:08:50 +00:00
|
|
|
return nil
|
|
|
|
}
|
2017-12-29 03:33:20 +00:00
|
|
|
|
2018-01-09 22:10:56 +00:00
|
|
|
func doDeployWorkerPlane(ctx context.Context, host *hosts.Host,
|
2018-01-11 01:00:14 +00:00
|
|
|
localConnDialerFactory hosts.DialerFactory,
|
2018-03-21 17:20:58 +00:00
|
|
|
prsMap map[string]v3.PrivateRegistry, processMap map[string]v3.Process, certMap map[string]pki.CertificatePKI, alpineImage string) error {
|
2017-12-29 03:33:20 +00:00
|
|
|
// run nginx proxy
|
|
|
|
if !host.IsControl {
|
2018-03-21 17:20:58 +00:00
|
|
|
if err := runNginxProxy(ctx, host, prsMap, processMap[NginxProxyContainerName], alpineImage); err != nil {
|
2017-12-29 03:33:20 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// run sidekick
|
2018-02-13 00:47:56 +00:00
|
|
|
if err := runSidekick(ctx, host, prsMap, processMap[SidekickContainerName]); err != nil {
|
2017-12-29 03:33:20 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
// run kubelet
|
2018-03-21 17:20:58 +00:00
|
|
|
if err := runKubelet(ctx, host, localConnDialerFactory, prsMap, processMap[KubeletContainerName], certMap, alpineImage); err != nil {
|
2017-12-29 03:33:20 +00:00
|
|
|
return err
|
|
|
|
}
|
2018-03-21 17:20:58 +00:00
|
|
|
return runKubeproxy(ctx, host, localConnDialerFactory, prsMap, processMap[KubeproxyContainerName], alpineImage)
|
2018-02-13 00:47:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func copyProcessMap(m map[string]v3.Process) map[string]v3.Process {
|
|
|
|
c := make(map[string]v3.Process)
|
|
|
|
for k, v := range m {
|
|
|
|
c[k] = v
|
|
|
|
}
|
|
|
|
return c
|
2017-12-29 03:33:20 +00:00
|
|
|
}
|