-
Notifications
You must be signed in to change notification settings - Fork 7
/
kube_nerd_compliant.go
152 lines (136 loc) · 5.31 KB
/
kube_nerd_compliant.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
package svc
import (
"context"
"fmt"
"io/ioutil"
"net/http"
"time"
"github.com/nerdalize/nerd/pkg/kubevisor"
appsv1 "k8s.io/api/apps/v1"
rbacv1 "k8s.io/api/rbac/v1"
crdbeta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1"
extscheme "k8s.io/apiextensions-apiserver/pkg/client/clientset/internalclientset/scheme"
"k8s.io/client-go/kubernetes/scheme"
)
var (
files = map[string]string{
"custom-dataset-controller": "https://raw.githubusercontent.com/nerdalize/catalog/master/templates/custom-dataset-controller.yaml",
"kube-system-cluster-role": "https://raw.githubusercontent.com/nerdalize/catalog/master/templates/kube-system-default.yaml",
"kube-system-clusterrolebinding": "https://raw.githubusercontent.com/nerdalize/catalog/master/templates/kube-system-default-clusterrolebinding.yaml",
"custom-dataset-definition": "https://raw.githubusercontent.com/nerdalize/catalog/master/templates/custom-dataset-definition.yaml",
"flexvolume-clusterrole": "https://raw.githubusercontent.com/nerdalize/catalog/master/templates/flexvolume-clusterrole.yaml",
"flexvolume-clusterrolebinding": "https://raw.githubusercontent.com/nerdalize/catalog/master/templates/flexvolume-clusterrolebinding.yml",
"flexvolume-daemonset": "https://raw.githubusercontent.com/nerdalize/catalog/master/templates/flexvolume-daemonset.yaml",
}
)
// AddNerdDependenciesInput is used to configure the resource creation
type AddNerdDependenciesInput struct {
Dependencies []string
// could be also used to specify a flexvolume version,
// and to propagate s3 credentials so that people can use by default their own private s3 bucket.
}
// IsNerdCompliant checks if the nlz-utils are running on the current cluster
func (k *Kube) IsNerdCompliant(ctx context.Context) (ok bool, dependencies []string, err error) {
var netClient = &http.Client{
Timeout: time.Second * 10,
}
for resource, url := range files {
resp, err := netClient.Get(url)
if err != nil {
return false, nil, err
}
defer resp.Body.Close()
data, err := ioutil.ReadAll(resp.Body)
if err != nil {
return false, nil, err
}
var obj interface{}
if resource == "custom-dataset-definition" {
decode := extscheme.Codecs.UniversalDeserializer().Decode
obj, _, err = decode(data, nil, nil)
} else {
decode := scheme.Codecs.UniversalDeserializer().Decode
obj, _, err = decode(data, nil, nil)
}
if err != nil {
return false, []string{}, fmt.Errorf("Error while decoding YAML object. Err was: %s", err)
}
switch o := obj.(type) {
case *appsv1.Deployment:
err = k.visor.GetResource(ctx, kubevisor.ResourceTypeDeployments, &appsv1.Deployment{}, o.Name)
case *appsv1.DaemonSet:
o.Namespace = "default"
err = k.visor.GetResource(ctx, kubevisor.ResourceTypeDaemonsets, &appsv1.DaemonSet{}, o.Name)
case *rbacv1.ClusterRole:
err = k.visor.GetClusterResource(ctx, kubevisor.ResourceTypeClusterRoles, &rbacv1.ClusterRole{}, o.Name)
case *rbacv1.ClusterRoleBinding:
err = k.visor.GetClusterResource(ctx, kubevisor.ResourceTypeClusterRoleBindings, &rbacv1.ClusterRoleBinding{}, o.Name)
case *crdbeta1.CustomResourceDefinition:
err = k.visor.GetClusterResource(ctx, kubevisor.ResourceTypeCustomResourceDefinition, &crdbeta1.CustomResourceDefinition{}, o.Name)
default:
//o is unknown for us
}
if err != nil {
if kubevisor.IsNotExistsErr(err) {
dependencies = append(dependencies, resource)
} else {
return false, []string{}, err
}
}
}
if len(dependencies) == 0 {
return true, dependencies, nil
}
return false, dependencies, nil
}
// AddNerdDependencies will deploy necessary daemonsets, controllers and roles so that a private cluster can be used by the cli
func (k *Kube) AddNerdDependencies(ctx context.Context, in *AddNerdDependenciesInput) (err error) {
var netClient = &http.Client{
Timeout: time.Second * 10,
}
for _, dependency := range in.Dependencies {
// Get the data
resp, err := netClient.Get(files[dependency])
if err != nil {
return err
}
defer resp.Body.Close()
// data to yaml
// pass config to kubernetes
data, err := ioutil.ReadAll(resp.Body)
if err != nil {
return err
}
var obj interface{}
if dependency == "custom-dataset-definition" {
decode := extscheme.Codecs.UniversalDeserializer().Decode
obj, _, err = decode(data, nil, nil)
} else {
decode := scheme.Codecs.UniversalDeserializer().Decode
obj, _, err = decode(data, nil, nil)
}
if err != nil {
return fmt.Errorf("Error while decoding YAML object. Err was: %s", err)
}
// now use switch over the type of the object
// and match each type-case
switch o := obj.(type) {
case *appsv1.Deployment:
err = k.visor.CreateResource(ctx, kubevisor.ResourceTypeDeployments, o, o.Name)
case *appsv1.DaemonSet:
err = k.visor.CreateResource(ctx, kubevisor.ResourceTypeDaemonsets, o, o.Name)
case *rbacv1.ClusterRole:
err = k.visor.CreateClusterResource(ctx, kubevisor.ResourceTypeClusterRoles, o, o.Name)
case *rbacv1.ClusterRoleBinding:
err = k.visor.CreateClusterResource(ctx, kubevisor.ResourceTypeClusterRoleBindings, o, o.Name)
case *crdbeta1.CustomResourceDefinition:
err = k.visor.CreateClusterResource(ctx, kubevisor.ResourceTypeCustomResourceDefinition, o, o.Name)
default:
//o is unknown for us
}
if err != nil {
return err
}
}
return err
}