mirror of
https://github.com/rancher/k3k.git
synced 2026-04-06 02:36:55 +00:00
* adding scripts for asciidoc cli generation * fix small typos to align to existing docs * added pandoc * pandoc check
184 lines
5.2 KiB
Go
184 lines
5.2 KiB
Go
package cmds
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/spf13/cobra"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
"sigs.k8s.io/controller-runtime/pkg/client"
|
|
|
|
v1 "k8s.io/api/core/v1"
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
|
|
"github.com/rancher/k3k/pkg/apis/k3k.io/v1beta1"
|
|
"github.com/rancher/k3k/pkg/controller/policy"
|
|
)
|
|
|
|
type VirtualClusterPolicyCreateConfig struct {
|
|
mode string
|
|
labels []string
|
|
annotations []string
|
|
namespaces []string
|
|
overwrite bool
|
|
}
|
|
|
|
func NewPolicyCreateCmd(appCtx *AppContext) *cobra.Command {
|
|
config := &VirtualClusterPolicyCreateConfig{}
|
|
|
|
cmd := &cobra.Command{
|
|
Use: "create",
|
|
Short: "Create a new policy.",
|
|
Example: "k3kcli policy create [command options] NAME",
|
|
PreRunE: func(cmd *cobra.Command, args []string) error {
|
|
switch config.mode {
|
|
case string(v1beta1.VirtualClusterMode), string(v1beta1.SharedClusterMode):
|
|
return nil
|
|
default:
|
|
return errors.New(`mode should be one of "shared" or "virtual"`)
|
|
}
|
|
},
|
|
RunE: policyCreateAction(appCtx, config),
|
|
Args: cobra.ExactArgs(1),
|
|
}
|
|
|
|
cmd.Flags().StringVar(&config.mode, "mode", "shared", "The allowed mode type of the policy")
|
|
cmd.Flags().StringArrayVar(&config.labels, "labels", []string{}, "Labels to add to the policy object (e.g. key=value)")
|
|
cmd.Flags().StringArrayVar(&config.annotations, "annotations", []string{}, "Annotations to add to the policy object (e.g. key=value)")
|
|
cmd.Flags().StringSliceVar(&config.namespaces, "namespace", []string{}, "The namespaces where to bind the policy")
|
|
cmd.Flags().BoolVar(&config.overwrite, "overwrite", false, "Overwrite namespace binding of existing policy")
|
|
|
|
return cmd
|
|
}
|
|
|
|
func policyCreateAction(appCtx *AppContext, config *VirtualClusterPolicyCreateConfig) func(cmd *cobra.Command, args []string) error {
|
|
return func(cmd *cobra.Command, args []string) error {
|
|
ctx := context.Background()
|
|
client := appCtx.Client
|
|
policyName := args[0]
|
|
|
|
_, err := createPolicy(ctx, client, config, policyName)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return bindPolicyToNamespaces(ctx, client, config, policyName)
|
|
}
|
|
}
|
|
|
|
func createNamespace(ctx context.Context, client client.Client, name, policyName string) error {
|
|
ns := &v1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: name}}
|
|
|
|
if policyName != "" {
|
|
ns.Labels = map[string]string{
|
|
policy.PolicyNameLabelKey: policyName,
|
|
}
|
|
}
|
|
|
|
if err := client.Get(ctx, types.NamespacedName{Name: name}, ns); err != nil {
|
|
if !apierrors.IsNotFound(err) {
|
|
return err
|
|
}
|
|
|
|
logrus.Infof(`Creating namespace '%s'`, name)
|
|
|
|
if err := client.Create(ctx, ns); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func createPolicy(ctx context.Context, client client.Client, config *VirtualClusterPolicyCreateConfig, policyName string) (*v1beta1.VirtualClusterPolicy, error) {
|
|
logrus.Infof("Creating policy '%s'", policyName)
|
|
|
|
policy := &v1beta1.VirtualClusterPolicy{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: policyName,
|
|
Labels: parseKeyValuePairs(config.labels, "label"),
|
|
Annotations: parseKeyValuePairs(config.annotations, "annotation"),
|
|
},
|
|
TypeMeta: metav1.TypeMeta{
|
|
Kind: "VirtualClusterPolicy",
|
|
APIVersion: "k3k.io/v1beta1",
|
|
},
|
|
Spec: v1beta1.VirtualClusterPolicySpec{
|
|
AllowedMode: v1beta1.ClusterMode(config.mode),
|
|
},
|
|
}
|
|
|
|
if err := client.Create(ctx, policy); err != nil {
|
|
if !apierrors.IsAlreadyExists(err) {
|
|
return nil, err
|
|
}
|
|
|
|
logrus.Infof("Policy '%s' already exists", policyName)
|
|
}
|
|
|
|
return policy, nil
|
|
}
|
|
|
|
func bindPolicyToNamespaces(ctx context.Context, client client.Client, config *VirtualClusterPolicyCreateConfig, policyName string) error {
|
|
var errs []error
|
|
|
|
for _, namespace := range config.namespaces {
|
|
var ns v1.Namespace
|
|
if err := client.Get(ctx, types.NamespacedName{Name: namespace}, &ns); err != nil {
|
|
if apierrors.IsNotFound(err) {
|
|
logrus.Warnf(`Namespace '%s' not found, skipping`, namespace)
|
|
} else {
|
|
errs = append(errs, err)
|
|
}
|
|
|
|
continue
|
|
}
|
|
|
|
if ns.Labels == nil {
|
|
ns.Labels = map[string]string{}
|
|
}
|
|
|
|
oldPolicy := ns.Labels[policy.PolicyNameLabelKey]
|
|
|
|
// same policy found, no need to update
|
|
if oldPolicy == policyName {
|
|
logrus.Debugf(`Policy '%s' already bound to namespace '%s'`, policyName, namespace)
|
|
continue
|
|
}
|
|
|
|
// no old policy, safe to update
|
|
if oldPolicy == "" {
|
|
ns.Labels[policy.PolicyNameLabelKey] = policyName
|
|
|
|
if err := client.Update(ctx, &ns); err != nil {
|
|
errs = append(errs, err)
|
|
} else {
|
|
logrus.Infof(`Added policy '%s' to namespace '%s'`, policyName, namespace)
|
|
}
|
|
|
|
continue
|
|
}
|
|
|
|
// different policy, warn or check for overwrite flag
|
|
if oldPolicy != policyName {
|
|
if config.overwrite {
|
|
logrus.Infof(`Found policy '%s' bound to namespace '%s'. Overwriting it with '%s'`, oldPolicy, namespace, policyName)
|
|
|
|
ns.Labels[policy.PolicyNameLabelKey] = policyName
|
|
|
|
if err := client.Update(ctx, &ns); err != nil {
|
|
errs = append(errs, err)
|
|
} else {
|
|
logrus.Infof(`Added policy '%s' to namespace '%s'`, policyName, namespace)
|
|
}
|
|
} else {
|
|
logrus.Warnf(`Found policy '%s' bound to namespace '%s'. Skipping. To overwrite it use the --overwrite flag`, oldPolicy, namespace)
|
|
}
|
|
}
|
|
}
|
|
|
|
return errors.Join(errs...)
|
|
}
|