mirror of
https://github.com/rancher/rke.git
synced 2025-06-24 14:31:59 +00:00
206 lines
5.7 KiB
Go
206 lines
5.7 KiB
Go
package cmd
|
|
|
|
import (
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
|
|
"github.com/rancher/rke/cluster"
|
|
"github.com/rancher/rke/pki"
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/urfave/cli"
|
|
"k8s.io/client-go/util/cert"
|
|
)
|
|
|
|
func ClusterCommand() cli.Command {
|
|
clusterUpFlags := []cli.Flag{
|
|
cli.StringFlag{
|
|
Name: "cluster-file",
|
|
Usage: "Specify an alternate cluster YAML file",
|
|
Value: "cluster.yml",
|
|
EnvVar: "CLUSTER_FILE",
|
|
},
|
|
}
|
|
clusterUpgradeFlags := []cli.Flag{
|
|
cli.StringFlag{
|
|
Name: "cluster-file",
|
|
Usage: "Specify an upgraded cluster YAML file",
|
|
Value: "cluster.yml",
|
|
EnvVar: "CLUSTER_FILE",
|
|
},
|
|
}
|
|
return cli.Command{
|
|
Name: "cluster",
|
|
ShortName: "cluster",
|
|
Usage: "Operations on the cluster",
|
|
Flags: clusterUpFlags,
|
|
Subcommands: []cli.Command{
|
|
cli.Command{
|
|
Name: "up",
|
|
Usage: "Bring the cluster up",
|
|
Action: clusterUpFromCli,
|
|
Flags: clusterUpFlags,
|
|
},
|
|
cli.Command{
|
|
Name: "version",
|
|
Usage: "Show Cluster Kubernetes version",
|
|
Action: getClusterVersion,
|
|
Flags: []cli.Flag{},
|
|
},
|
|
cli.Command{
|
|
Name: "upgrade",
|
|
Usage: "Upgrade Cluster Kubernetes version",
|
|
Action: clusterUpgradeFromCli,
|
|
Flags: clusterUpgradeFlags,
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
func ClusterUp(clusterFile string) (string, string, string, string, error) {
|
|
logrus.Infof("Building Kubernetes cluster")
|
|
var APIURL, caCrt, clientCert, clientKey string
|
|
kubeCluster, err := cluster.ParseConfig(clusterFile)
|
|
if err != nil {
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
|
}
|
|
|
|
err = kubeCluster.TunnelHosts()
|
|
if err != nil {
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
|
}
|
|
|
|
currentCluster, err := kubeCluster.GetClusterState()
|
|
if err != nil {
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
|
}
|
|
|
|
err = cluster.SetUpAuthentication(kubeCluster, currentCluster)
|
|
if err != nil {
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
|
}
|
|
err = kubeCluster.SetUpHosts()
|
|
if err != nil {
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
|
}
|
|
|
|
err = kubeCluster.DeployClusterPlanes()
|
|
if err != nil {
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
|
}
|
|
|
|
err = kubeCluster.SaveClusterState(clusterFile)
|
|
if err != nil {
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
|
}
|
|
|
|
err = kubeCluster.DeployNetworkPlugin()
|
|
if err != nil {
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
|
}
|
|
|
|
err = kubeCluster.DeployK8sAddOns()
|
|
if err != nil {
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
|
}
|
|
|
|
APIURL = fmt.Sprintf("https://" + kubeCluster.ControlPlaneHosts[0].IP + ":6443")
|
|
caCrt = string(cert.EncodeCertPEM(kubeCluster.Certificates[pki.CACertName].Certificate))
|
|
clientCert = string(cert.EncodeCertPEM(kubeCluster.Certificates[pki.KubeAdminCommonName].Certificate))
|
|
clientKey = string(cert.EncodePrivateKeyPEM(kubeCluster.Certificates[pki.KubeAdminCommonName].Key))
|
|
return APIURL, caCrt, clientCert, clientKey, nil
|
|
}
|
|
|
|
func clusterUpFromCli(ctx *cli.Context) error {
|
|
clusterFile, err := resolveClusterFile(ctx)
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to resolve cluster file: %v", err)
|
|
}
|
|
_, _, _, _, err = ClusterUp(clusterFile)
|
|
return err
|
|
}
|
|
|
|
func resolveClusterFile(ctx *cli.Context) (string, error) {
|
|
clusterFile := ctx.String("cluster-file")
|
|
fp, err := filepath.Abs(clusterFile)
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed to lookup current directory name: %v", err)
|
|
}
|
|
file, err := os.Open(fp)
|
|
if err != nil {
|
|
return "", fmt.Errorf("Can not find cluster configuration file: %v", err)
|
|
}
|
|
defer file.Close()
|
|
buf, err := ioutil.ReadAll(file)
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed to read file: %v", err)
|
|
}
|
|
clusterFile = string(buf)
|
|
|
|
return clusterFile, nil
|
|
}
|
|
|
|
func getClusterVersion(ctx *cli.Context) error {
|
|
serverVersion, err := cluster.GetK8sVersion()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
fmt.Printf("Server Version: %s\n", serverVersion)
|
|
return nil
|
|
}
|
|
|
|
func clusterUpgradeFromCli(ctx *cli.Context) error {
|
|
clusterFile, err := resolveClusterFile(ctx)
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to resolve cluster file: %v", err)
|
|
}
|
|
_, _, _, _, err = ClusterUpgrade(clusterFile)
|
|
return err
|
|
}
|
|
|
|
func ClusterUpgrade(clusterFile string) (string, string, string, string, error) {
|
|
logrus.Infof("Upgrading Kubernetes cluster")
|
|
var APIURL, caCrt, clientCert, clientKey string
|
|
kubeCluster, err := cluster.ParseConfig(clusterFile)
|
|
if err != nil {
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
|
}
|
|
|
|
logrus.Debugf("Getting current cluster")
|
|
currentCluster, err := kubeCluster.GetClusterState()
|
|
if err != nil {
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
|
}
|
|
logrus.Debugf("Setting up upgrade tunnels")
|
|
/*
|
|
kubeCluster is the cluster.yaml definition. It should have updated configuration
|
|
currentCluster is the current state fetched from kubernetes
|
|
we add currentCluster certs to kubeCluster, kubeCluster would have the latest configuration from cluster.yaml and the certs to connect to k8s and apply the upgrade
|
|
*/
|
|
kubeCluster.Certificates = currentCluster.Certificates
|
|
err = kubeCluster.TunnelHosts()
|
|
if err != nil {
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
|
}
|
|
logrus.Debugf("Starting cluster upgrade")
|
|
err = kubeCluster.ClusterUpgrade()
|
|
if err != nil {
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
|
}
|
|
|
|
err = kubeCluster.SaveClusterState(clusterFile)
|
|
if err != nil {
|
|
return APIURL, caCrt, clientCert, clientKey, err
|
|
}
|
|
|
|
logrus.Infof("Cluster upgraded successfully")
|
|
|
|
APIURL = fmt.Sprintf("https://" + kubeCluster.ControlPlaneHosts[0].IP + ":6443")
|
|
caCrt = string(cert.EncodeCertPEM(kubeCluster.Certificates[pki.CACertName].Certificate))
|
|
clientCert = string(cert.EncodeCertPEM(kubeCluster.Certificates[pki.KubeAdminCommonName].Certificate))
|
|
clientKey = string(cert.EncodePrivateKeyPEM(kubeCluster.Certificates[pki.KubeAdminCommonName].Key))
|
|
return APIURL, caCrt, clientCert, clientKey, nil
|
|
|
|
}
|