mirror of https://github.com/kubernetes/kops.git
189 lines
5.6 KiB
Go
189 lines
5.6 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package model
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"k8s.io/kops/pkg/apis/kops"
|
|
"k8s.io/kops/pkg/systemd"
|
|
"k8s.io/kops/upup/pkg/fi"
|
|
"k8s.io/kops/upup/pkg/fi/nodeup/nodetasks"
|
|
|
|
"k8s.io/klog/v2"
|
|
)
|
|
|
|
// HookBuilder configures the hooks
|
|
type HookBuilder struct {
|
|
*NodeupModelContext
|
|
}
|
|
|
|
var _ fi.NodeupModelBuilder = &HookBuilder{}
|
|
|
|
// Build is responsible for implementing the cluster hook
|
|
func (h *HookBuilder) Build(c *fi.NodeupModelBuilderContext) error {
|
|
// we keep a list of hooks name so we can allow local instanceGroup hooks override the cluster ones
|
|
hookNames := make(map[string]bool)
|
|
for i, spec := range h.NodeupConfig.Hooks {
|
|
for j, hook := range spec {
|
|
isInstanceGroup := i == 0
|
|
|
|
// I don't want to affect those whom are already using the hooks, so I'm going to try to keep the name for now
|
|
// i.e. use the default naming convention - kops-hook-<index>, only those using the Name or hooks in IG should alter
|
|
var name string
|
|
switch hook.Name {
|
|
case "":
|
|
name = fmt.Sprintf("kops-hook-%d", j)
|
|
if isInstanceGroup {
|
|
name += "-ig"
|
|
}
|
|
default:
|
|
name = hook.Name
|
|
}
|
|
|
|
if _, found := hookNames[name]; found {
|
|
klog.V(2).Infof("Skipping the hook: %v as we've already processed a similar service name", name)
|
|
continue
|
|
}
|
|
hookNames[name] = true
|
|
|
|
// are we disabling the service?
|
|
if hook.Enabled != nil && !*hook.Enabled {
|
|
enabled := false
|
|
managed := true
|
|
c.AddTask(&nodetasks.Service{
|
|
Name: h.EnsureSystemdSuffix(name),
|
|
ManageState: &managed,
|
|
Enabled: &enabled,
|
|
Running: &enabled,
|
|
})
|
|
continue
|
|
}
|
|
|
|
service, err := h.buildSystemdService(name, &hook)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if service != nil {
|
|
c.AddTask(service)
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// buildSystemdService is responsible for generating the service
|
|
func (h *HookBuilder) buildSystemdService(name string, hook *kops.HookSpec) (*nodetasks.Service, error) {
|
|
// perform some basic validation
|
|
if hook.ExecContainer == nil && hook.Manifest == "" {
|
|
klog.Warningf("hook: %s has neither a raw unit or exec image configured", name)
|
|
return nil, nil
|
|
}
|
|
if hook.ExecContainer != nil {
|
|
if err := isValidExecContainerAction(hook.ExecContainer); err != nil {
|
|
klog.Warningf("invalid hook action, name: %s, error: %v", name, err)
|
|
return nil, nil
|
|
}
|
|
}
|
|
// build the base unit file
|
|
var definition *string
|
|
if hook.UseRawManifest {
|
|
definition = s(hook.Manifest)
|
|
} else {
|
|
unit := &systemd.Manifest{}
|
|
unit.Set("Unit", "Description", "Kops Hook "+name)
|
|
|
|
// add any service dependencies to the unit
|
|
for _, x := range hook.Requires {
|
|
unit.Set("Unit", "Requires", x)
|
|
}
|
|
for _, x := range hook.Before {
|
|
unit.Set("Unit", "Before", x)
|
|
}
|
|
|
|
// are we a raw unit file or a docker exec?
|
|
switch hook.ExecContainer {
|
|
case nil:
|
|
unit.SetSection("Service", hook.Manifest)
|
|
default:
|
|
if err := h.buildContainerdService(unit, hook, name); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
definition = s(unit.Render())
|
|
}
|
|
|
|
service := &nodetasks.Service{
|
|
Name: h.EnsureSystemdSuffix(name),
|
|
Definition: definition,
|
|
}
|
|
|
|
service.InitDefaults()
|
|
|
|
return service, nil
|
|
}
|
|
|
|
// buildContainerdService is responsible for generating a containerd exec unit file
|
|
func (h *HookBuilder) buildContainerdService(unit *systemd.Manifest, hook *kops.HookSpec, name string) error {
|
|
containerdImage := hook.ExecContainer.Image
|
|
if !strings.Contains(containerdImage, "/") {
|
|
containerdImage = "docker.io/library/" + containerdImage
|
|
}
|
|
if !strings.Contains(containerdImage, ":") {
|
|
containerdImage = containerdImage + ":latest"
|
|
}
|
|
|
|
containerdArgs := []string{
|
|
"/usr/bin/ctr", "--namespace", "k8s.io", "run", "--rm",
|
|
"--mount", "type=bind,src=/,dst=/rootfs,options=rbind:rslave",
|
|
"--mount", "type=bind,src=/var/run/dbus,dst=/var/run/dbus,options=rbind:rprivate",
|
|
"--mount", "type=bind,src=/run/systemd,dst=/run/systemd,options=rbind:rprivate",
|
|
"--net-host",
|
|
"--privileged",
|
|
}
|
|
containerdArgs = append(containerdArgs, buildContainerRuntimeEnvironmentVars(hook.ExecContainer.Environment)...)
|
|
containerdArgs = append(containerdArgs, containerdImage)
|
|
containerdArgs = append(containerdArgs, name)
|
|
containerdArgs = append(containerdArgs, hook.ExecContainer.Command...)
|
|
|
|
containerdRunCommand := systemd.EscapeCommand(containerdArgs)
|
|
containerdPullCommand := systemd.EscapeCommand([]string{"/usr/bin/ctr", "--namespace", "k8s.io", "image", "pull", containerdImage})
|
|
|
|
unit.Set("Unit", "Requires", "containerd.service")
|
|
unit.Set("Service", "ExecStartPre", containerdPullCommand)
|
|
unit.Set("Service", "ExecStart", containerdRunCommand)
|
|
unit.Set("Service", "Type", "oneshot")
|
|
unit.Set("Install", "WantedBy", "multi-user.target")
|
|
|
|
return nil
|
|
}
|
|
|
|
// isValidExecContainerAction checks the validity of the execContainer - personally i think this validation
|
|
// should be done high up the chain, but
|
|
func isValidExecContainerAction(action *kops.ExecContainerAction) error {
|
|
action.Image = strings.TrimSpace(action.Image)
|
|
if action.Image == "" {
|
|
return errors.New("the image for the hook exec action not set")
|
|
}
|
|
|
|
return nil
|
|
}
|