mirror of
https://github.com/rancher/k3k.git
synced 2026-05-06 01:16:52 +00:00
124 lines
3.3 KiB
Go
124 lines
3.3 KiB
Go
package cmds
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
|
|
"github.com/rancher/k3k/pkg/apis/k3k.io/v1alpha1"
|
|
k3kcluster "github.com/rancher/k3k/pkg/controller/cluster"
|
|
"github.com/rancher/k3k/pkg/controller/cluster/agent"
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/urfave/cli/v2"
|
|
v1 "k8s.io/api/core/v1"
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
ctrlclient "sigs.k8s.io/controller-runtime/pkg/client"
|
|
"sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
|
|
)
|
|
|
|
var keepData bool
|
|
|
|
func NewClusterDeleteCmd(appCtx *AppContext) *cli.Command {
|
|
flags := CommonFlags(appCtx)
|
|
flags = append(flags, FlagNamespace(appCtx))
|
|
flags = append(flags,
|
|
&cli.BoolFlag{
|
|
Name: "keep-data",
|
|
Usage: "keeps persistence volumes created for the cluster after deletion",
|
|
Destination: &keepData,
|
|
},
|
|
)
|
|
|
|
return &cli.Command{
|
|
Name: "delete",
|
|
Usage: "Delete an existing cluster",
|
|
UsageText: "k3kcli cluster delete [command options] NAME",
|
|
Action: delete(appCtx),
|
|
Flags: flags,
|
|
HideHelpCommand: true,
|
|
}
|
|
}
|
|
|
|
func delete(appCtx *AppContext) cli.ActionFunc {
|
|
return func(clx *cli.Context) error {
|
|
ctx := context.Background()
|
|
client := appCtx.Client
|
|
|
|
if clx.NArg() != 1 {
|
|
return cli.ShowSubcommandHelp(clx)
|
|
}
|
|
|
|
name := clx.Args().First()
|
|
if name == k3kcluster.ClusterInvalidName {
|
|
return errors.New("invalid cluster name")
|
|
}
|
|
|
|
namespace := appCtx.Namespace(name)
|
|
|
|
logrus.Infof("Deleting [%s] cluster in namespace [%s]", name, namespace)
|
|
|
|
cluster := v1alpha1.Cluster{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: name,
|
|
Namespace: namespace,
|
|
},
|
|
}
|
|
// keep bootstrap secrets and tokens if --keep-data flag is passed
|
|
if keepData {
|
|
// skip removing tokenSecret
|
|
if err := RemoveOwnerReferenceFromSecret(ctx, k3kcluster.TokenSecretName(cluster.Name), client, cluster); err != nil {
|
|
return err
|
|
}
|
|
|
|
// skip removing webhook secret
|
|
if err := RemoveOwnerReferenceFromSecret(ctx, agent.WebhookSecretName(cluster.Name), client, cluster); err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
matchingLabels := ctrlclient.MatchingLabels(map[string]string{"cluster": cluster.Name, "role": "server"})
|
|
listOpts := ctrlclient.ListOptions{Namespace: cluster.Namespace}
|
|
matchingLabels.ApplyToList(&listOpts)
|
|
deleteOpts := &ctrlclient.DeleteAllOfOptions{ListOptions: listOpts}
|
|
|
|
if err := client.DeleteAllOf(ctx, &v1.PersistentVolumeClaim{}, deleteOpts); err != nil {
|
|
return ctrlclient.IgnoreNotFound(err)
|
|
}
|
|
}
|
|
|
|
if err := client.Delete(ctx, &cluster); err != nil {
|
|
return ctrlclient.IgnoreNotFound(err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func RemoveOwnerReferenceFromSecret(ctx context.Context, name string, cl ctrlclient.Client, cluster v1alpha1.Cluster) error {
|
|
var secret v1.Secret
|
|
|
|
key := types.NamespacedName{
|
|
Name: name,
|
|
Namespace: cluster.Namespace,
|
|
}
|
|
|
|
if err := cl.Get(ctx, key, &secret); err != nil {
|
|
if apierrors.IsNotFound(err) {
|
|
logrus.Warnf("%s secret is not found", name)
|
|
return nil
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
if controllerutil.HasControllerReference(&secret) {
|
|
if err := controllerutil.RemoveOwnerReference(&cluster, &secret, cl.Scheme()); err != nil {
|
|
return err
|
|
}
|
|
|
|
return cl.Update(ctx, &secret)
|
|
}
|
|
|
|
return nil
|
|
}
|