
Before introducing the new dcagent several changes needed to be made to dcmanager-audit. That is: Refactor each individual audit (base audit, firmware, kubernetes, kube rootca and software) to separate all subcloud client calls in one single function (get_subcloud_audit_data, to be used by dcagent periodic info gather loop) and another function to get the subcloud sync status (get_subcloud_sync_status, to be used by dcagent to process the data in the subcloud and return the sync status to the system controller). NOTES: - As patch and load audits will be deprecated in the next major release, no effort was made to refactor both patch and load audit. - All tests described below were executed applying [1] and [2] as well, to avoid retesting. [1]: https://review.opendev.org/c/starlingx/distcloud/+/923350 [2]: https://review.opendev.org/c/starlingx/distcloud/+/923351 Test plan: - PASS: Run dcmanager audit with dcagent. Verify only one call is made to audit the subcloud and the response include the correct sync status. - PASS: Run dcmanager audit without dcagent. Verify the audit works as expected querying each individual endpoint. Story: 2011106 Task: 50558 Change-Id: Ib955ff0c4f2035af2f59b6873f5779b71a8710ce Signed-off-by: Victor Romano <victor.gluzromano@windriver.com>
264 lines
8.8 KiB
Python
264 lines
8.8 KiB
Python
# Copyright (c) 2020-2024 Wind River Systems, Inc.
|
|
#
|
|
# SPDX-License-Identifier: Apache-2.0
|
|
#
|
|
|
|
import http.client as httplib
|
|
|
|
from kubernetes import __version__ as K8S_MODULE_VERSION
|
|
from kubernetes import client
|
|
from kubernetes.client import Configuration
|
|
from kubernetes.client.rest import ApiException
|
|
from kubernetes import config
|
|
from oslo_log import log as logging
|
|
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
K8S_MODULE_MAJOR_VERSION = int(K8S_MODULE_VERSION.split(".", maxsplit=1)[0])
|
|
KUBE_CONFIG_PATH = "/etc/kubernetes/admin.conf"
|
|
|
|
CERT_MANAGER_GROUP = "cert-manager.io"
|
|
CERT_MANAGER_VERSION = "v1"
|
|
CERT_MANAGER_CERTIFICATE = "certificates"
|
|
|
|
|
|
class KubeOperator(object):
|
|
def __init__(self):
|
|
self._kube_client_batch = None
|
|
self._kube_client_core = None
|
|
self._kube_client_custom_objects = None
|
|
|
|
def _load_kube_config(self):
|
|
config.load_kube_config(KUBE_CONFIG_PATH)
|
|
if K8S_MODULE_MAJOR_VERSION < 12:
|
|
c = Configuration()
|
|
else:
|
|
c = Configuration().get_default_copy()
|
|
# Workaround: Turn off SSL/TLS verification
|
|
c.verify_ssl = False
|
|
Configuration.set_default(c)
|
|
|
|
def _get_kubernetesclient_batch(self):
|
|
if not self._kube_client_batch:
|
|
self._load_kube_config()
|
|
self._kube_client_batch = client.BatchV1Api()
|
|
return self._kube_client_batch
|
|
|
|
def _get_kubernetesclient_core(self):
|
|
if not self._kube_client_core:
|
|
self._load_kube_config()
|
|
self._kube_client_core = client.CoreV1Api()
|
|
return self._kube_client_core
|
|
|
|
def _get_kubernetesclient_custom_objects(self):
|
|
if not self._kube_client_custom_objects:
|
|
self._load_kube_config()
|
|
self._kube_client_custom_objects = client.CustomObjectsApi()
|
|
return self._kube_client_custom_objects
|
|
|
|
def kube_get_secret(self, name, namespace):
|
|
c = self._get_kubernetesclient_core()
|
|
try:
|
|
return c.read_namespaced_secret(name, namespace)
|
|
except ApiException as e:
|
|
if e.status == httplib.NOT_FOUND:
|
|
return None
|
|
else:
|
|
LOG.error(
|
|
"Failed to get Secret %s under Namespace %s: %s"
|
|
% (name, namespace, e.body)
|
|
)
|
|
raise
|
|
except Exception as e:
|
|
LOG.error("Kubernetes exception in kube_get_secret: %s" % e)
|
|
raise
|
|
|
|
def kube_delete_secret(self, name, namespace, **kwargs):
|
|
body = {}
|
|
|
|
if kwargs:
|
|
body.update(kwargs)
|
|
|
|
c = self._get_kubernetesclient_core()
|
|
try:
|
|
c.delete_namespaced_secret(name, namespace, body=body)
|
|
except ApiException as e:
|
|
if e.status == httplib.NOT_FOUND:
|
|
LOG.warn("Secret %s under Namespace %s not found." % (name, namespace))
|
|
else:
|
|
LOG.error(
|
|
"Failed to clean up Secret %s under Namespace %s: %s"
|
|
% (name, namespace, e.body)
|
|
)
|
|
raise
|
|
except Exception as e:
|
|
LOG.error("Kubernetes exception in kube_delete_secret: %s" % e)
|
|
raise
|
|
|
|
def get_cert_manager_certificate(self, namespace, name):
|
|
custom_object_api = self._get_kubernetesclient_custom_objects()
|
|
|
|
try:
|
|
cert = custom_object_api.get_namespaced_custom_object(
|
|
CERT_MANAGER_GROUP,
|
|
CERT_MANAGER_VERSION,
|
|
namespace,
|
|
CERT_MANAGER_CERTIFICATE,
|
|
name,
|
|
)
|
|
except ApiException as e:
|
|
if e.status == httplib.NOT_FOUND:
|
|
return None
|
|
else:
|
|
LOG.error("Fail to access %s:%s. %s" % (namespace, name, e))
|
|
raise
|
|
else:
|
|
return cert
|
|
|
|
def apply_cert_manager_certificate(self, namespace, name, body):
|
|
custom_object_api = self._get_kubernetesclient_custom_objects()
|
|
|
|
cert = self.get_cert_manager_certificate(namespace, name)
|
|
if cert:
|
|
custom_object_api.patch_namespaced_custom_object(
|
|
CERT_MANAGER_GROUP,
|
|
CERT_MANAGER_VERSION,
|
|
namespace,
|
|
CERT_MANAGER_CERTIFICATE,
|
|
name,
|
|
body,
|
|
)
|
|
else:
|
|
custom_object_api.create_namespaced_custom_object(
|
|
CERT_MANAGER_GROUP,
|
|
CERT_MANAGER_VERSION,
|
|
namespace,
|
|
CERT_MANAGER_CERTIFICATE,
|
|
body,
|
|
)
|
|
|
|
def delete_cert_manager_certificate(self, namespace, name):
|
|
custom_object_api = self._get_kubernetesclient_custom_objects()
|
|
|
|
try:
|
|
custom_object_api.delete_namespaced_custom_object(
|
|
CERT_MANAGER_GROUP,
|
|
CERT_MANAGER_VERSION,
|
|
namespace,
|
|
CERT_MANAGER_CERTIFICATE,
|
|
name,
|
|
body={},
|
|
)
|
|
except ApiException as e:
|
|
if e.status != httplib.NOT_FOUND:
|
|
LOG.error("Fail to delete %s:%s. %s" % (namespace, name, e))
|
|
raise
|
|
|
|
def get_pods_by_namespace(self, namespace):
|
|
c = self._get_kubernetesclient_core()
|
|
try:
|
|
pods = c.list_namespaced_pod(namespace)
|
|
return [pod.metadata.name for pod in pods.items]
|
|
except ApiException as e:
|
|
if e.status == httplib.NOT_FOUND:
|
|
return []
|
|
LOG.error("Failed to get pod name under Namespace %s." % (namespace))
|
|
raise
|
|
except Exception as e:
|
|
LOG.error("Kubernetes exception in get_pods_by_namespace: %s" % e)
|
|
raise
|
|
|
|
def pod_exists(self, pod, namespace):
|
|
pods = self.get_pods_by_namespace(namespace)
|
|
if pod in pods:
|
|
return True
|
|
return False
|
|
|
|
def kube_delete_job(self, name, namespace, **kwargs):
|
|
body = {}
|
|
if kwargs:
|
|
body.update(kwargs)
|
|
|
|
b = self._get_kubernetesclient_batch()
|
|
try:
|
|
b.delete_namespaced_job(name, namespace, body=body)
|
|
except ApiException as e:
|
|
if e.status != httplib.NOT_FOUND:
|
|
LOG.error(
|
|
"Failed to delete job %s under Namespace %s: %s"
|
|
% (name, namespace, e.body)
|
|
)
|
|
raise
|
|
except Exception as e:
|
|
LOG.error("Kubernetes exception in kube_delete_job: %s" % e)
|
|
raise
|
|
|
|
def kube_delete_pod(self, name, namespace, **kwargs):
|
|
body = {}
|
|
if kwargs:
|
|
body.update(kwargs)
|
|
|
|
c = self._get_kubernetesclient_core()
|
|
try:
|
|
c.delete_namespaced_pod(name, namespace, body=body)
|
|
except ApiException as e:
|
|
if e.status != httplib.NOT_FOUND:
|
|
LOG.error(
|
|
"Failed to delete pod %s under "
|
|
"Namespace %s: %s" % (name, namespace, e.body)
|
|
)
|
|
raise
|
|
except Exception as e:
|
|
LOG.error("Kubernetes exception in kube_delete_pod: %s" % e)
|
|
raise
|
|
|
|
def kube_get_namespace(self, namespace):
|
|
c = self._get_kubernetesclient_core()
|
|
try:
|
|
c.read_namespace(namespace)
|
|
return True
|
|
except ApiException as e:
|
|
if e.status == httplib.NOT_FOUND:
|
|
return False
|
|
else:
|
|
LOG.error("Failed to get Namespace %s: %s" % (namespace, e.body))
|
|
raise
|
|
except Exception as e:
|
|
LOG.error(
|
|
"Kubernetes exception in kube_get_namespace %s: %s" % (namespace, e)
|
|
)
|
|
raise
|
|
|
|
def kube_create_namespace(self, namespace):
|
|
body = {"metadata": {"name": namespace}}
|
|
|
|
c = self._get_kubernetesclient_core()
|
|
try:
|
|
c.create_namespace(body)
|
|
except ApiException as e:
|
|
if e.status == httplib.CONFLICT:
|
|
# Already exist
|
|
LOG.warn("Namespace %s already exist." % namespace)
|
|
else:
|
|
LOG.error("Failed to create Namespace %s: %s" % (namespace, e.body))
|
|
raise
|
|
except Exception as e:
|
|
LOG.error(
|
|
"Kubernetes exception in _kube_create_namespace %s: %s" % (namespace, e)
|
|
)
|
|
raise
|
|
|
|
def kube_copy_secret(self, name, src_namespace, dst_namespace):
|
|
c = self._get_kubernetesclient_core()
|
|
try:
|
|
body = c.read_namespaced_secret(name, src_namespace)
|
|
body.metadata.resource_version = None
|
|
body.metadata.namespace = dst_namespace
|
|
c.create_namespaced_secret(dst_namespace, body)
|
|
except Exception as e:
|
|
LOG.error(
|
|
"Failed to copy Secret %s from Namespace %s to Namespace %s: %s"
|
|
% (name, src_namespace, dst_namespace, e)
|
|
)
|
|
raise
|