2017-10-29 09:45:21 +00:00
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
|
|
|
|
"github.com/Sirupsen/logrus"
|
2017-11-02 10:07:10 +00:00
|
|
|
"github.com/rancher/rke/cluster"
|
2017-10-31 13:55:35 +00:00
|
|
|
"github.com/rancher/rke/pki"
|
2017-10-29 09:45:21 +00:00
|
|
|
"github.com/urfave/cli"
|
2017-11-02 10:07:10 +00:00
|
|
|
"k8s.io/client-go/util/cert"
|
2017-10-29 09:45:21 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func ClusterCommand() cli.Command {
|
|
|
|
clusterUpFlags := []cli.Flag{
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "cluster-file",
|
2017-11-02 10:07:10 +00:00
|
|
|
Usage: "Specify an alternate cluster YAML file",
|
2017-10-31 13:55:35 +00:00
|
|
|
Value: "cluster.yml",
|
2017-10-29 09:45:21 +00:00
|
|
|
EnvVar: "CLUSTER_FILE",
|
|
|
|
},
|
2017-11-02 10:07:10 +00:00
|
|
|
cli.StringFlag{
|
|
|
|
Name: "auth-type",
|
|
|
|
Usage: "Specify authentication type",
|
|
|
|
Value: "x509",
|
|
|
|
EnvVar: "AUTH_TYPE",
|
2017-10-31 13:55:35 +00:00
|
|
|
},
|
2017-10-29 09:45:21 +00:00
|
|
|
}
|
|
|
|
return cli.Command{
|
|
|
|
Name: "cluster",
|
|
|
|
ShortName: "cluster",
|
|
|
|
Usage: "Operations on the cluster",
|
|
|
|
Flags: clusterUpFlags,
|
|
|
|
Subcommands: []cli.Command{
|
|
|
|
cli.Command{
|
|
|
|
Name: "up",
|
|
|
|
Usage: "Bring the cluster up",
|
2017-11-02 10:07:10 +00:00
|
|
|
Action: clusterUpFromCli,
|
2017-10-29 09:45:21 +00:00
|
|
|
Flags: clusterUpFlags,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-02 10:07:10 +00:00
|
|
|
func ClusterUp(clusterFile, authType string) (string, string, string, string, error) {
|
|
|
|
logrus.Infof("Building Kubernetes cluster")
|
2017-11-07 15:44:17 +00:00
|
|
|
var APIURL, caCrt, clientCert, clientKey string
|
2017-11-02 10:07:10 +00:00
|
|
|
kubeCluster, err := cluster.ParseConfig(clusterFile)
|
2017-10-29 09:45:21 +00:00
|
|
|
if err != nil {
|
2017-11-07 15:44:17 +00:00
|
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
2017-10-29 09:45:21 +00:00
|
|
|
}
|
2017-11-02 10:07:10 +00:00
|
|
|
|
|
|
|
err = kubeCluster.TunnelHosts()
|
2017-10-29 09:45:21 +00:00
|
|
|
if err != nil {
|
2017-11-07 15:44:17 +00:00
|
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
2017-10-29 09:45:21 +00:00
|
|
|
}
|
2017-11-02 10:07:10 +00:00
|
|
|
|
|
|
|
currentCluster, err := kubeCluster.GetClusterState()
|
|
|
|
if err != nil {
|
2017-11-07 15:44:17 +00:00
|
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
2017-10-29 09:45:21 +00:00
|
|
|
}
|
2017-11-02 10:07:10 +00:00
|
|
|
|
|
|
|
err = cluster.SetUpAuthentication(kubeCluster, currentCluster, authType)
|
2017-10-29 09:45:21 +00:00
|
|
|
if err != nil {
|
2017-11-07 15:44:17 +00:00
|
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
2017-10-29 09:45:21 +00:00
|
|
|
}
|
2017-11-02 10:07:10 +00:00
|
|
|
|
|
|
|
err = kubeCluster.SetUpHosts(authType)
|
2017-10-31 13:55:35 +00:00
|
|
|
if err != nil {
|
2017-11-07 15:44:17 +00:00
|
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
2017-10-31 13:55:35 +00:00
|
|
|
}
|
2017-11-02 10:07:10 +00:00
|
|
|
|
|
|
|
err = kubeCluster.DeployClusterPlanes()
|
2017-10-31 13:55:35 +00:00
|
|
|
if err != nil {
|
2017-11-07 15:44:17 +00:00
|
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
2017-10-31 13:55:35 +00:00
|
|
|
}
|
2017-11-02 10:07:10 +00:00
|
|
|
|
2017-11-06 20:50:41 +00:00
|
|
|
err = kubeCluster.DeployNetworkPlugin()
|
|
|
|
if err != nil {
|
2017-11-08 00:32:55 +00:00
|
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
2017-11-06 20:50:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
err = kubeCluster.DeployK8sAddOns()
|
|
|
|
if err != nil {
|
2017-11-08 00:32:55 +00:00
|
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
2017-11-06 20:50:41 +00:00
|
|
|
}
|
|
|
|
|
2017-11-02 10:07:10 +00:00
|
|
|
err = kubeCluster.SaveClusterState(clusterFile)
|
2017-10-29 09:45:21 +00:00
|
|
|
if err != nil {
|
2017-11-07 15:44:17 +00:00
|
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
2017-10-29 09:45:21 +00:00
|
|
|
}
|
2017-11-07 15:44:17 +00:00
|
|
|
APIURL = fmt.Sprintf("https://" + kubeCluster.ControlPlaneHosts[0].IP + ":6443")
|
2017-11-02 10:07:10 +00:00
|
|
|
caCrt = string(cert.EncodeCertPEM(kubeCluster.Certificates[pki.CACertName].Certificate))
|
|
|
|
clientCert = string(cert.EncodeCertPEM(kubeCluster.Certificates[pki.KubeAdminCommonName].Certificate))
|
|
|
|
clientKey = string(cert.EncodePrivateKeyPEM(kubeCluster.Certificates[pki.KubeAdminCommonName].Key))
|
2017-11-07 15:44:17 +00:00
|
|
|
return APIURL, caCrt, clientCert, clientKey, nil
|
2017-11-02 10:07:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func clusterUpFromCli(ctx *cli.Context) error {
|
|
|
|
authType := ctx.String("auth-type")
|
|
|
|
clusterFile, err := resolveClusterFile(ctx)
|
2017-10-29 09:45:21 +00:00
|
|
|
if err != nil {
|
2017-11-02 10:07:10 +00:00
|
|
|
return fmt.Errorf("Failed to resolve cluster file: %v", err)
|
2017-10-29 09:45:21 +00:00
|
|
|
}
|
2017-11-02 10:07:10 +00:00
|
|
|
_, _, _, _, err = ClusterUp(clusterFile, authType)
|
|
|
|
return err
|
2017-10-29 09:45:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func resolveClusterFile(ctx *cli.Context) (string, error) {
|
|
|
|
clusterFile := ctx.String("cluster-file")
|
|
|
|
fp, err := filepath.Abs(clusterFile)
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("failed to lookup current directory name: %v", err)
|
|
|
|
}
|
|
|
|
file, err := os.Open(fp)
|
|
|
|
if err != nil {
|
2017-10-31 13:55:35 +00:00
|
|
|
return "", fmt.Errorf("Can not find cluster configuration file: %v", err)
|
2017-10-29 09:45:21 +00:00
|
|
|
}
|
|
|
|
defer file.Close()
|
|
|
|
buf, err := ioutil.ReadAll(file)
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("failed to read file: %v", err)
|
|
|
|
}
|
|
|
|
clusterFile = string(buf)
|
|
|
|
|
|
|
|
return clusterFile, nil
|
|
|
|
}
|