mirror of
https://github.com/kubesphere/kubekey.git
synced 2025-12-27 02:42:48 +00:00
189 lines
6.3 KiB
Go
189 lines
6.3 KiB
Go
/*
|
|
Copyright 2020 The KubeSphere Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package config
|
|
|
|
import (
|
|
"bufio"
|
|
"fmt"
|
|
kubekeyapiv1alpha1 "github.com/kubesphere/kubekey/api/v1alpha1"
|
|
"github.com/kubesphere/kubekey/pkg/kubesphere"
|
|
"github.com/kubesphere/kubekey/pkg/util"
|
|
"github.com/pkg/errors"
|
|
log "github.com/sirupsen/logrus"
|
|
"gopkg.in/yaml.v2"
|
|
k8syaml "k8s.io/apimachinery/pkg/util/yaml"
|
|
"os"
|
|
"os/exec"
|
|
"os/user"
|
|
"path/filepath"
|
|
"runtime"
|
|
"strings"
|
|
)
|
|
|
|
func ParseClusterCfg(clusterCfgPath, k8sVersion, ksVersion string, ksEnabled bool, logger *log.Logger) (*kubekeyapiv1alpha1.Cluster, error) {
|
|
var clusterCfg *kubekeyapiv1alpha1.Cluster
|
|
if len(clusterCfgPath) == 0 {
|
|
user, _ := user.Current()
|
|
if user.Username != "root" {
|
|
return nil, errors.New(fmt.Sprintf("Current user is %s. Please use root!", user.Username))
|
|
}
|
|
clusterCfg = AllinoneCfg(user, k8sVersion, ksVersion, ksEnabled, logger)
|
|
} else {
|
|
cfg, err := ParseCfg(clusterCfgPath, k8sVersion, ksVersion, ksEnabled)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
clusterCfg = cfg
|
|
}
|
|
|
|
return clusterCfg, nil
|
|
}
|
|
|
|
func ParseCfg(clusterCfgPath, k8sVersion, ksVersion string, ksEnabled bool) (*kubekeyapiv1alpha1.Cluster, error) {
|
|
clusterCfg := kubekeyapiv1alpha1.Cluster{}
|
|
fp, err := filepath.Abs(clusterCfgPath)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "Failed to look up current directory")
|
|
}
|
|
if len(k8sVersion) != 0 {
|
|
_ = exec.Command("/bin/sh", "-c", fmt.Sprintf("sed -i \"/version/s/\\:.*/\\: %s/g\" %s", k8sVersion, fp)).Run()
|
|
}
|
|
file, err := os.Open(fp)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "Unable to open the given cluster configuration file")
|
|
}
|
|
defer file.Close()
|
|
b1 := bufio.NewReader(file)
|
|
for {
|
|
result := make(map[string]interface{})
|
|
content, err := k8syaml.NewYAMLReader(b1).Read()
|
|
if len(content) == 0 {
|
|
break
|
|
}
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "Unable to read the given cluster configuration file")
|
|
}
|
|
err = yaml.Unmarshal(content, &result)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "Unable to unmarshal the given cluster configuration file")
|
|
}
|
|
if result["kind"] == "Cluster" {
|
|
if err := yaml.Unmarshal(content, &clusterCfg); err != nil {
|
|
return nil, errors.Wrap(err, "Unable to convert file to yaml")
|
|
}
|
|
}
|
|
|
|
if result["kind"] == "ConfigMap" || result["kind"] == "ClusterConfiguration" {
|
|
metadata := result["metadata"].(map[interface{}]interface{})
|
|
labels := metadata["labels"].(map[interface{}]interface{})
|
|
clusterCfg.Spec.KubeSphere.Enabled = true
|
|
_, ok := labels["version"]
|
|
if ok {
|
|
switch labels["version"] {
|
|
case "v3.0.0":
|
|
clusterCfg.Spec.KubeSphere.Configurations = "---\n" + string(content)
|
|
clusterCfg.Spec.KubeSphere.Version = "v3.0.0"
|
|
case "v2.1.1":
|
|
clusterCfg.Spec.KubeSphere.Configurations = "---\n" + string(content)
|
|
clusterCfg.Spec.KubeSphere.Version = "v2.1.1"
|
|
default:
|
|
return nil, errors.Wrap(err, fmt.Sprintf("Unsupported versions: %s", labels["version"]))
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if ksEnabled {
|
|
clusterCfg.Spec.KubeSphere.Enabled = true
|
|
switch strings.TrimSpace(ksVersion) {
|
|
case "":
|
|
clusterCfg.Spec.KubeSphere.Version = "v3.0.0"
|
|
clusterCfg.Spec.KubeSphere.Configurations = kubesphere.V3_0_0
|
|
case "v3.0.0":
|
|
clusterCfg.Spec.KubeSphere.Version = "v3.0.0"
|
|
clusterCfg.Spec.KubeSphere.Configurations = kubesphere.V3_0_0
|
|
case "v2.1.1":
|
|
clusterCfg.Spec.KubeSphere.Version = "v2.1.1"
|
|
clusterCfg.Spec.KubeSphere.Configurations = kubesphere.V2_1_1
|
|
default:
|
|
return nil, errors.New(fmt.Sprintf("Unsupported version: %s", strings.TrimSpace(ksVersion)))
|
|
}
|
|
}
|
|
|
|
return &clusterCfg, nil
|
|
}
|
|
|
|
func AllinoneCfg(user *user.User, k8sVersion, ksVersion string, ksEnabled bool, logger *log.Logger) *kubekeyapiv1alpha1.Cluster {
|
|
allinoneCfg := kubekeyapiv1alpha1.Cluster{}
|
|
if output, err := exec.Command("/bin/sh", "-c", "if [ ! -f \"$HOME/.ssh/id_rsa\" ]; then ssh-keygen -t rsa -P \"\" -f $HOME/.ssh/id_rsa && ls $HOME/.ssh;fi;").CombinedOutput(); err != nil {
|
|
log.Fatalf("Failed to generate public key: %v\n%s", err, string(output))
|
|
}
|
|
if output, err := exec.Command("/bin/sh", "-c", "echo \"\n$(cat $HOME/.ssh/id_rsa.pub)\" >> $HOME/.ssh/authorized_keys && awk ' !x[$0]++{print > \"'$HOME'/.ssh/authorized_keys\"}' $HOME/.ssh/authorized_keys").CombinedOutput(); err != nil {
|
|
log.Fatalf("Failed to copy public key to authorized_keys: %v\n%s", err, string(output))
|
|
}
|
|
|
|
hostname, err := os.Hostname()
|
|
if err != nil {
|
|
log.Fatalf("Failed to get hostname: %v\n", err)
|
|
}
|
|
|
|
allinoneCfg.Spec.Hosts = append(allinoneCfg.Spec.Hosts, kubekeyapiv1alpha1.HostCfg{
|
|
Name: hostname,
|
|
Address: util.LocalIP(),
|
|
InternalAddress: util.LocalIP(),
|
|
Port: "",
|
|
User: user.Name,
|
|
Password: "",
|
|
PrivateKeyPath: fmt.Sprintf("%s/.ssh/id_rsa", user.HomeDir),
|
|
Arch: runtime.GOARCH,
|
|
})
|
|
|
|
allinoneCfg.Spec.RoleGroups = kubekeyapiv1alpha1.RoleGroups{
|
|
Etcd: []string{hostname},
|
|
Master: []string{hostname},
|
|
Worker: []string{hostname},
|
|
}
|
|
if k8sVersion != "" {
|
|
allinoneCfg.Spec.Kubernetes = kubekeyapiv1alpha1.Kubernetes{
|
|
Version: k8sVersion,
|
|
}
|
|
} else {
|
|
allinoneCfg.Spec.Kubernetes = kubekeyapiv1alpha1.Kubernetes{
|
|
Version: kubekeyapiv1alpha1.DefaultKubeVersion,
|
|
}
|
|
}
|
|
|
|
if ksEnabled {
|
|
allinoneCfg.Spec.KubeSphere.Enabled = true
|
|
switch strings.TrimSpace(ksVersion) {
|
|
case "":
|
|
allinoneCfg.Spec.KubeSphere.Version = "v3.0.0"
|
|
allinoneCfg.Spec.KubeSphere.Configurations = kubesphere.V3_0_0
|
|
case "v3.0.0":
|
|
allinoneCfg.Spec.KubeSphere.Version = "v3.0.0"
|
|
allinoneCfg.Spec.KubeSphere.Configurations = kubesphere.V3_0_0
|
|
case "v2.1.1":
|
|
allinoneCfg.Spec.KubeSphere.Version = "v2.1.1"
|
|
allinoneCfg.Spec.KubeSphere.Configurations = kubesphere.V2_1_1
|
|
default:
|
|
logger.Fatalf("Unsupported version: %s", strings.TrimSpace(ksVersion))
|
|
}
|
|
}
|
|
|
|
return &allinoneCfg
|
|
}
|