1
0
mirror of https://github.com/rancher/rke.git synced 2025-04-27 19:25:44 +00:00
rke/hosts/hosts.go

500 lines
14 KiB
Go
Raw Normal View History

2017-10-29 09:45:21 +00:00
package hosts
import (
"context"
"fmt"
"path"
2018-06-25 22:50:45 +00:00
"strings"
"github.com/docker/docker/api/types"
"github.com/docker/docker/api/types/container"
"github.com/sirupsen/logrus"
"github.com/docker/docker/client"
"github.com/rancher/rke/docker"
"github.com/rancher/rke/k8s"
"github.com/rancher/rke/log"
2020-07-11 16:24:19 +00:00
v3 "github.com/rancher/rke/types"
apierrors "k8s.io/apimachinery/pkg/api/errors"
"k8s.io/client-go/kubernetes"
)
2017-10-29 09:45:21 +00:00
type Host struct {
2017-12-05 16:55:58 +00:00
v3.RKEConfigNode
2018-01-22 19:31:03 +00:00
DClient *client.Client
LocalConnPort int
IsControl bool
IsWorker bool
IsEtcd bool
IgnoreDockerVersion bool
ToAddEtcdMember bool
ExistingEtcdCluster bool
SavedKeyPhrase string
ToAddLabels map[string]string
ToDelLabels map[string]string
ToAddTaints []string
ToDelTaints []string
DockerInfo types.Info
UpdateWorker bool
PrefixPath string
2018-05-08 22:30:50 +00:00
BastionHost v3.BastionHost
2017-10-29 09:45:21 +00:00
}
const (
ToCleanEtcdDir = "/var/lib/etcd/"
ToCleanSSLDir = "/etc/kubernetes/"
ToCleanCNIConf = "/etc/cni/"
ToCleanCNIBin = "/opt/cni/"
ToCleanCNILib = "/var/lib/cni/"
ToCleanCalicoRun = "/var/run/calico/"
ToCleanTempCertPath = "/etc/kubernetes/.tmp/"
CleanerContainerName = "kube-cleaner"
LogCleanerContainerName = "rke-log-cleaner"
RKELogsPath = "/var/lib/rancher/rke/log"
2018-06-25 22:50:45 +00:00
B2DOS = "Boot2Docker"
B2DPrefixPath = "/mnt/sda1/rke"
ROS = "RancherOS"
ROSPrefixPath = "/opt/rke"
CoreOS = "CoreOS"
CoreOSPrefixPath = "/opt/rke"
FlatcarOS = "Flatcar"
FlatcarOSPrefixPath = "/opt/rke"
WindowsOS = "Windows"
WindowsPrefixPath = "c:/"
)
2018-02-14 20:58:35 +00:00
func (h *Host) CleanUpAll(ctx context.Context, cleanerImage string, prsMap map[string]v3.PrivateRegistry, externalEtcd bool) error {
log.Infof(ctx, "[hosts] Cleaning up host [%s]", h.Address)
toCleanPaths := []string{
path.Join(h.PrefixPath, ToCleanSSLDir),
ToCleanCNIConf,
ToCleanCNIBin,
ToCleanCalicoRun,
path.Join(h.PrefixPath, ToCleanTempCertPath),
path.Join(h.PrefixPath, ToCleanCNILib),
}
2018-05-09 17:39:19 +00:00
2018-02-17 03:14:12 +00:00
if !externalEtcd {
toCleanPaths = append(toCleanPaths, path.Join(h.PrefixPath, ToCleanEtcdDir))
2018-02-14 20:58:35 +00:00
}
return h.CleanUp(ctx, toCleanPaths, cleanerImage, prsMap)
}
func (h *Host) CleanUpWorkerHost(ctx context.Context, cleanerImage string, prsMap map[string]v3.PrivateRegistry) error {
2018-02-15 03:25:36 +00:00
if h.IsControl || h.IsEtcd {
log.Infof(ctx, "[hosts] Host [%s] is already a controlplane or etcd host, skipping cleanup.", h.Address)
return nil
}
toCleanPaths := []string{
path.Join(h.PrefixPath, ToCleanSSLDir),
ToCleanCNIConf,
ToCleanCNIBin,
ToCleanCalicoRun,
path.Join(h.PrefixPath, ToCleanCNILib),
}
return h.CleanUp(ctx, toCleanPaths, cleanerImage, prsMap)
}
func (h *Host) CleanUpControlHost(ctx context.Context, cleanerImage string, prsMap map[string]v3.PrivateRegistry) error {
2018-02-15 03:25:36 +00:00
if h.IsWorker || h.IsEtcd {
log.Infof(ctx, "[hosts] Host [%s] is already a worker or etcd host, skipping cleanup.", h.Address)
return nil
}
toCleanPaths := []string{
path.Join(h.PrefixPath, ToCleanSSLDir),
ToCleanCNIConf,
ToCleanCNIBin,
ToCleanCalicoRun,
path.Join(h.PrefixPath, ToCleanCNILib),
}
return h.CleanUp(ctx, toCleanPaths, cleanerImage, prsMap)
}
func (h *Host) CleanUpEtcdHost(ctx context.Context, cleanerImage string, prsMap map[string]v3.PrivateRegistry) error {
toCleanPaths := []string{
path.Join(h.PrefixPath, ToCleanEtcdDir),
path.Join(h.PrefixPath, ToCleanSSLDir),
}
if h.IsWorker || h.IsControl {
log.Infof(ctx, "[hosts] Host [%s] is already a worker or control host, skipping cleanup certs.", h.Address)
toCleanPaths = []string{
path.Join(h.PrefixPath, ToCleanEtcdDir),
}
}
return h.CleanUp(ctx, toCleanPaths, cleanerImage, prsMap)
}
func (h *Host) CleanUp(ctx context.Context, toCleanPaths []string, cleanerImage string, prsMap map[string]v3.PrivateRegistry) error {
log.Infof(ctx, "[hosts] Cleaning up host [%s]", h.Address)
imageCfg, hostCfg := buildCleanerConfig(h, toCleanPaths, cleanerImage)
log.Infof(ctx, "[hosts] Running cleaner container on host [%s]", h.Address)
if err := docker.DoRunContainer(ctx, h.DClient, imageCfg, hostCfg, CleanerContainerName, h.Address, CleanerContainerName, prsMap); err != nil {
return err
}
2018-05-09 17:39:19 +00:00
if _, err := docker.WaitForContainer(ctx, h.DClient, h.Address, CleanerContainerName); err != nil {
return err
}
log.Infof(ctx, "[hosts] Removing cleaner container on host [%s]", h.Address)
if err := docker.RemoveContainer(ctx, h.DClient, h.Address, CleanerContainerName); err != nil {
return err
}
log.Infof(ctx, "[hosts] Removing dead container logs on host [%s]", h.Address)
if err := DoRunLogCleaner(ctx, h, cleanerImage, prsMap); err != nil {
return err
}
log.Infof(ctx, "[hosts] Successfully cleaned up host [%s]", h.Address)
return nil
}
func (h *Host) OS() string {
return h.DockerInfo.OSType
}
func (h *Host) IsWindows() bool {
return h.DockerInfo.OSType == "windows"
}
func (h *Host) IsLinux() bool {
return h.DockerInfo.OSType == "linux"
}
func (h *Host) ProcessFilter(processes map[string]v3.Process) map[string]v3.Process {
if h.IsWindows() {
for name, process := range processes {
// doesn't support host network on windows
if process.NetworkMode == "host" {
process.NetworkMode = ""
}
// doesn't support PID on windows
if process.PidMode != "" {
process.PidMode = ""
}
// doesn't support privileged mode on windows
if process.Privileged {
process.Privileged = false
}
// doesn't execute health check
process.HealthCheck = v3.HealthCheck{}
processes[name] = process
}
}
return processes
}
2018-04-02 22:15:34 +00:00
func DeleteNode(ctx context.Context, toDeleteHost *Host, kubeClient *kubernetes.Clientset, hasAnotherRole bool, cloudProvider string) error {
if hasAnotherRole {
log.Infof(ctx, "[hosts] host [%s] has another role, skipping delete from kubernetes cluster", toDeleteHost.Address)
return nil
}
log.Infof(ctx, "[hosts] Cordoning host [%s]", toDeleteHost.Address)
if _, err := k8s.GetNode(kubeClient, toDeleteHost.HostnameOverride); err != nil {
if apierrors.IsNotFound(err) {
log.Warnf(ctx, "[hosts] Can't find node by name [%s]", toDeleteHost.Address)
return nil
}
return err
}
if err := k8s.CordonUncordon(kubeClient, toDeleteHost.HostnameOverride, true); err != nil {
return err
}
log.Infof(ctx, "[hosts] Deleting host [%s] from the cluster", toDeleteHost.Address)
2018-04-02 22:15:34 +00:00
if err := k8s.DeleteNode(kubeClient, toDeleteHost.HostnameOverride, cloudProvider); err != nil {
return err
}
log.Infof(ctx, "[hosts] Successfully deleted host [%s] from the cluster", toDeleteHost.Address)
return nil
}
func RemoveTaintFromHost(ctx context.Context, host *Host, taintKey string, kubeClient *kubernetes.Clientset) error {
log.Infof(ctx, "[hosts] removing taint [%s] from host [%s]", taintKey, host.Address)
if err := k8s.RemoveTaintFromNodeByKey(kubeClient, host.HostnameOverride, taintKey); err != nil {
return err
}
log.Infof(ctx, "[hosts] Successfully deleted taint [%s] from host [%s]", taintKey, host.Address)
return nil
}
2019-03-04 16:59:43 +00:00
func GetToDeleteHosts(currentHosts, configHosts, inactiveHosts []*Host, includeInactive bool) []*Host {
toDeleteHosts := []*Host{}
for _, currentHost := range currentHosts {
found := false
for _, newHost := range configHosts {
2017-11-28 17:45:24 +00:00
if currentHost.Address == newHost.Address {
found = true
2017-10-29 09:45:21 +00:00
}
}
if !found {
2018-02-21 23:13:08 +00:00
inactive := false
for _, inactiveHost := range inactiveHosts {
if inactiveHost.Address == currentHost.Address {
inactive = true
break
}
}
2019-03-04 16:59:43 +00:00
if (inactive && includeInactive) || !inactive {
2018-02-21 23:13:08 +00:00
toDeleteHosts = append(toDeleteHosts, currentHost)
}
2017-10-29 09:45:21 +00:00
}
}
return toDeleteHosts
}
func GetToAddHosts(currentHosts, configHosts []*Host) []*Host {
toAddHosts := []*Host{}
for _, configHost := range configHosts {
found := false
for _, currentHost := range currentHosts {
if currentHost.Address == configHost.Address {
found = true
break
}
}
if !found {
toAddHosts = append(toAddHosts, configHost)
}
}
return toAddHosts
}
func IsHostListChanged(currentHosts, configHosts []*Host) bool {
changed := false
for _, host := range currentHosts {
found := false
for _, configHost := range configHosts {
2017-11-28 17:45:24 +00:00
if host.Address == configHost.Address {
found = true
2017-11-28 17:45:24 +00:00
break
}
}
if !found {
return true
}
}
for _, host := range configHosts {
found := false
for _, currentHost := range currentHosts {
2017-11-28 17:45:24 +00:00
if host.Address == currentHost.Address {
found = true
2017-11-28 17:45:24 +00:00
break
}
}
if !found {
return true
}
}
return changed
2017-10-29 09:45:21 +00:00
}
func buildCleanerConfig(host *Host, toCleanDirs []string, cleanerImage string) (*container.Config, *container.HostConfig) {
cmd := []string{
"sh",
"-c",
fmt.Sprintf("find %s -mindepth 1 -delete", strings.Join(toCleanDirs, " ")),
}
imageCfg := &container.Config{
Image: cleanerImage,
Cmd: cmd,
}
bindMounts := []string{}
for _, vol := range toCleanDirs {
bindMounts = append(bindMounts, fmt.Sprintf("%s:%s:z", vol, vol))
}
hostCfg := &container.HostConfig{
Binds: bindMounts,
}
return imageCfg, hostCfg
}
func NodesToHosts(rkeNodes []v3.RKEConfigNode, nodeRole string) []*Host {
hostList := make([]*Host, 0)
// Return all nodes if there is no noderole passed to the function
if nodeRole == "" {
for _, node := range rkeNodes {
newHost := Host{
RKEConfigNode: node,
}
hostList = append(hostList, &newHost)
}
return hostList
}
for _, node := range rkeNodes {
for _, role := range node.Role {
if role == nodeRole {
newHost := Host{
RKEConfigNode: node,
}
hostList = append(hostList, &newHost)
break
}
}
}
return hostList
}
func GetUniqueHostList(etcdHosts, cpHosts, workerHosts []*Host) []*Host {
hostList := []*Host{}
hostList = append(hostList, etcdHosts...)
hostList = append(hostList, cpHosts...)
hostList = append(hostList, workerHosts...)
// little trick to get a unique host list
uniqHostMap := make(map[*Host]bool)
for _, host := range hostList {
uniqHostMap[host] = true
}
uniqHostList := []*Host{}
for host := range uniqHostMap {
uniqHostList = append(uniqHostList, host)
}
return uniqHostList
}
2018-06-25 22:50:45 +00:00
func (h *Host) SetPrefixPath(clusterPrefixPath string) {
2018-06-25 22:50:45 +00:00
var prefixPath string
switch {
case clusterPrefixPath != "/":
prefixPath = clusterPrefixPath
case strings.Contains(h.DockerInfo.OperatingSystem, B2DOS):
2018-06-25 22:50:45 +00:00
prefixPath = B2DPrefixPath
case strings.Contains(h.DockerInfo.OperatingSystem, ROS):
2018-06-25 22:50:45 +00:00
prefixPath = ROSPrefixPath
case strings.Contains(h.DockerInfo.OperatingSystem, CoreOS):
2018-06-25 22:50:45 +00:00
prefixPath = CoreOSPrefixPath
case strings.Contains(h.DockerInfo.OperatingSystem, FlatcarOS):
prefixPath = FlatcarOSPrefixPath
case strings.Contains(h.DockerInfo.OperatingSystem, WindowsOS):
prefixPath = WindowsPrefixPath
2018-06-25 22:50:45 +00:00
default:
prefixPath = clusterPrefixPath
}
h.PrefixPath = prefixPath
}
func (h *Host) GetExtraBinds(service v3.BaseService) []string {
switch {
case h.OS() == "windows" && len(service.WindowsExtraBinds) > 0:
return service.WindowsExtraBinds
default:
return service.ExtraBinds
}
}
func (h *Host) GetExtraEnv(service v3.BaseService) []string {
switch {
case h.OS() == "windows" && len(service.WindowsExtraEnv) > 0:
return service.WindowsExtraEnv
default:
return service.ExtraEnv
}
}
func (h *Host) GetExtraArgs(service v3.BaseService) map[string]string {
switch {
case h.OS() == "windows" && len(service.WindowsExtraArgs) > 0:
return service.WindowsExtraArgs
default:
return service.ExtraArgs
2018-06-25 22:50:45 +00:00
}
}
func DoRunLogCleaner(ctx context.Context, host *Host, alpineImage string, prsMap map[string]v3.PrivateRegistry) error {
logrus.Debugf("[cleanup] Starting log link cleanup on host [%s]", host.Address)
imageCfg := &container.Config{
Image: alpineImage,
Tty: true,
Cmd: []string{
"sh",
"-c",
fmt.Sprintf("find %s -type l ! -exec test -e {} \\; -print -delete", RKELogsPath),
},
}
hostCfg := &container.HostConfig{
Binds: []string{
2019-09-10 19:14:18 +00:00
host.DockerInfo.DockerRootDir + ":" + host.DockerInfo.DockerRootDir,
"/var/lib:/var/lib",
},
Privileged: true,
}
if err := docker.DoRemoveContainer(ctx, host.DClient, LogCleanerContainerName, host.Address); err != nil {
return err
}
if err := docker.DoRunContainer(ctx, host.DClient, imageCfg, hostCfg, LogCleanerContainerName, host.Address, "cleanup", prsMap); err != nil {
return err
}
if err := docker.DoRemoveContainer(ctx, host.DClient, LogCleanerContainerName, host.Address); err != nil {
return err
}
logrus.Debugf("[cleanup] Successfully cleaned up log links on host [%s]", host.Address)
return nil
}
2018-10-04 06:21:43 +00:00
func IsNodeInList(host *Host, hostList []*Host) bool {
for _, h := range hostList {
if h.HostnameOverride == host.HostnameOverride {
return true
}
}
return false
}
2019-03-04 16:59:43 +00:00
func GetHostListIntersect(a []*Host, b []*Host) []*Host {
s := []*Host{}
hash := map[string]*Host{}
for _, h := range a {
hash[h.Address] = h
}
for _, h := range b {
if _, ok := hash[h.Address]; ok {
s = append(s, h)
}
}
return s
}
2020-03-08 09:07:56 +00:00
func GetInternalAddressForHosts(hostList []*Host) []string {
hostAddresses := []string{}
for _, host := range hostList {
hostAddresses = append(hostAddresses, host.InternalAddress)
}
return hostAddresses
}
func IsDockerSELinuxEnabled(host *Host) bool {
for _, securityOpt := range host.DockerInfo.SecurityOptions {
logrus.Tracef("IsDockerSELinuxEnabled: securityOpt found: [%s]", securityOpt)
// name=selinux was the value returned after removing statically set Docker API version 1.24
if securityOpt == "selinux" || securityOpt == "name=selinux" {
logrus.Debugf("Host [%s] has SELinux enabled in Docker", host.Address)
return true
}
}
return false
}
func IsEnterpriseLinuxHost(host *Host) bool {
operatingSystem := strings.ToLower(host.DockerInfo.OperatingSystem)
if strings.Contains(operatingSystem, "centos") || strings.Contains(operatingSystem, "enterprise linux") || strings.Contains(operatingSystem, "oracle linux") {
logrus.Debugf("Host [%s] with OperatingSystem [%s] is Enterprise Linux", host.Address, operatingSystem)
return true
}
return false
}
func IsEnterpriseLinuxDocker(host *Host) bool {
dockerInitBinary := host.DockerInfo.InitBinary
// Init binary for Enterprise Linux Docker (not upstream) is /usr/libexec/docker/docker-init-current
// Init binary for upstream Docker is docker-init
if strings.EqualFold(dockerInitBinary, "/usr/libexec/docker/docker-init-current") {
return true
}
return false
}