PK œqhYî¶J‚ßF ßF ) nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/
Dir : /proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/salt/modules/ |
Server: Linux ngx353.inmotionhosting.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64 IP: 209.182.202.254 |
Dir : //proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/salt/modules/k8s.py |
""" Salt module to manage Kubernetes cluster .. versionadded:: 2016.3.0 Roadmap: * Add creation of K8S objects (pod, rc, service, ...) * Add replace of K8S objects (pod, rc, service, ...) * Add deletion of K8S objects (pod, rc, service, ...) * Add rolling update * Add (auto)scalling """ import base64 import logging import os import re import urllib.parse import salt.utils.files import salt.utils.http as http import salt.utils.json __deprecated__ = ( 3009, "kubernetes", "https://github.com/salt-extensions/saltext-kubernetes", ) __virtualname__ = "k8s" # Setup the logger log = logging.getLogger(__name__) def __virtual__(): """Load load if python-requests is installed.""" return __virtualname__ def _guess_apiserver(apiserver_url=None): """Try to guees the kubemaster url from environ, then from `/etc/kubernetes/config` file """ default_config = "/etc/kubernetes/config" if apiserver_url is not None: return apiserver_url if "KUBERNETES_MASTER" in os.environ: apiserver_url = os.environ.get("KUBERNETES_MASTER") elif __salt__["config.get"]("k8s:master"): apiserver_url = __salt__["config.get"]("k8s:master") elif os.path.exists(default_config) or __salt__["config.get"]("k8s:config", ""): config = __salt__["config.get"]("k8s:config", default_config) kubeapi_regex = re.compile( """KUBE_MASTER=['"]--master=(.*)['"]""", re.MULTILINE ) with salt.utils.files.fopen(config) as fh_k8s: for line in fh_k8s.readlines(): match_line = kubeapi_regex.match(line) if match_line: apiserver_url = match_line.group(1) else: # we failed to discover, lets use k8s default address apiserver_url = "http://127.0.0.1:8080" log.debug("Discoverd k8s API server address: %s", apiserver_url) return apiserver_url def _kpost(url, data): """create any object in kubernetes based on URL""" # Prepare headers headers = {"Content-Type": "application/json"} # Make request log.trace("url is: %s, data is: %s", url, data) ret = http.query( url, method="POST", header_dict=headers, data=salt.utils.json.dumps(data) ) # Check requests status if ret.get("error"): return ret else: return salt.utils.json.loads(ret.get("body")) def _kput(url, data): """put any object in kubernetes based on URL""" # Prepare headers headers = {"Content-Type": "application/json"} # Make request ret = http.query( url, method="PUT", header_dict=headers, data=salt.utils.json.dumps(data) ) # Check requests status if ret.get("error"): return ret else: return salt.utils.json.loads(ret.get("body")) def _kpatch(url, data): """patch any object in kubernetes based on URL""" # Prepare headers headers = {"Content-Type": "application/json-patch+json"} # Make request ret = http.query( url, method="PATCH", header_dict=headers, data=salt.utils.json.dumps(data) ) # Check requests status if ret.get("error"): log.error("Got an error: %s", ret.get("error")) return ret else: return salt.utils.json.loads(ret.get("body")) def _kname(obj): """Get name or names out of json result from API server""" if isinstance(obj, dict): return [obj.get("metadata", {}).get("name", "")] elif isinstance(obj, (list, tuple)): names = [] for i in obj: names.append(i.get("metadata", {}).get("name", "")) return names else: return "Unknown type" def _is_dns_subdomain(name): """Check that name is DNS subdomain: One or more lowercase rfc1035/rfc1123 labels separated by '.' with a maximum length of 253 characters""" dns_subdomain = re.compile(r"""^[a-z0-9\.-]{1,253}$""") if dns_subdomain.match(name): log.debug("Name: %s is valid DNS subdomain", name) return True else: log.debug("Name: %s is not valid DNS subdomain", name) return False def _is_port_name(name): """Check that name is IANA service: An alphanumeric (a-z, and 0-9) string, with a maximum length of 15 characters, with the '-' character allowed anywhere except the first or the last character or adjacent to another '-' character, it must contain at least a (a-z) character""" port_name = re.compile("""^[a-z0-9]{1,15}$""") if port_name.match(name): return True else: return False def _is_dns_label(name): """Check that name is DNS label: An alphanumeric (a-z, and 0-9) string, with a maximum length of 63 characters, with the '-' character allowed anywhere except the first or last character, suitable for use as a hostname or segment in a domain name""" dns_label = re.compile(r"""^[a-z0-9][a-z0-9\.-]{1,62}$""") if dns_label.match(name): return True else: return False def _guess_node_id(node): """Try to guess kube node ID using salt minion ID""" if node is None: return __salt__["grains.get"]("id") return node def _get_labels(node, apiserver_url): """Get all labels from a kube node.""" # Prepare URL url = f"{apiserver_url}/api/v1/nodes/{node}" # Make request ret = http.query(url) # Check requests status if "body" in ret: ret = salt.utils.json.loads(ret.get("body")) elif ret.get("status", 0) == 404: return f"Node {node} doesn't exist" else: return ret # Get and return labels return ret.get("metadata", {}).get("labels", {}) def _set_labels(node, apiserver_url, labels): """Replace labels dict by a new one""" # Prepare URL url = f"{apiserver_url}/api/v1/nodes/{node}" # Prepare data data = [{"op": "replace", "path": "/metadata/labels", "value": labels}] # Make request ret = _kpatch(url, data) if ret.get("status") == 404: return f"Node {node} doesn't exist" return ret def get_labels(node=None, apiserver_url=None): """ .. versionadded:: 2016.3.0 Get labels from the current node CLI Example: .. code-block:: bash salt '*' k8s.get_labels salt '*' k8s.get_labels kube-node.cluster.local http://kube-master.cluster.local """ # Get salt minion ID node = _guess_node_id(node) # Try to get kubernetes master apiserver_url = _guess_apiserver(apiserver_url) if apiserver_url is None: return False # Get data ret = _get_labels(node, apiserver_url) return {"labels": ret} def label_present(name, value, node=None, apiserver_url=None): """ .. versionadded:: 2016.3.0 Set label to the current node CLI Example: .. code-block:: bash salt '*' k8s.label_present hw/disktype ssd salt '*' k8s.label_present hw/disktype ssd kube-node.cluster.local http://kube-master.cluster.local """ ret = {"name": name, "result": True, "comment": "", "changes": {}} # Get salt minion ID node = _guess_node_id(node) # Try to get kubernetes master apiserver_url = _guess_apiserver(apiserver_url) if apiserver_url is None: return False # Get all labels labels = _get_labels(node, apiserver_url) if name not in labels: # This is a new label ret["changes"] = {name: value} labels[name] = str(value) res = _set_labels(node, apiserver_url, labels) if res.get("status") == 409: # there is an update during operation, need to retry log.debug("Got 409, will try later") ret["changes"] = {} ret["comment"] = f"Could not create label {name}, please retry" else: ret["comment"] = f"Label {name} created" elif labels.get(name) != str(value): # This is a old label and we are going to edit it ret["changes"] = {name: str(value)} labels[name] = str(value) res = _set_labels(node, apiserver_url, labels) if res.get("status") == 409: # there is an update during operation, need to retry log.debug("Got 409, will try later") ret["changes"] = {} ret["comment"] = f"Could not update label {name}, please retry" else: ret["comment"] = f"Label {name} updated" else: # This is a old label and it has already the wanted value ret["comment"] = f"Label {name} already set" return ret def label_absent(name, node=None, apiserver_url=None): """ .. versionadded:: 2016.3.0 Delete label to the current node CLI Example: .. code-block:: bash salt '*' k8s.label_absent hw/disktype salt '*' k8s.label_absent hw/disktype kube-node.cluster.local http://kube-master.cluster.local """ ret = {"name": name, "result": True, "comment": "", "changes": {}} # Get salt minion ID node = _guess_node_id(node) # Try to get kubernetes master apiserver_url = _guess_apiserver(apiserver_url) if apiserver_url is None: return False # Get all labels old_labels = _get_labels(node, apiserver_url) # Prepare a temp labels dict labels = {key: value for key, value in old_labels.items() if key != name} # Compare old labels and what we want if labels == old_labels: # Label already absent ret["comment"] = f"Label {name} already absent" else: # Label needs to be delete res = _set_labels(node, apiserver_url, labels) if res.get("status") == 409: # there is an update during operation, need to retry log.debug("Got 409, will try later") ret["changes"] = {} ret["comment"] = f"Could not delete label {name}, please retry" else: ret["changes"] = {"deleted": name} ret["comment"] = f"Label {name} absent" return ret def label_folder_absent(name, node=None, apiserver_url=None): """ .. versionadded:: 2016.3.0 Delete label folder to the current node CLI Example: .. code-block:: bash salt '*' k8s.label_folder_absent hw salt '*' k8s.label_folder_absent hw/ kube-node.cluster.local http://kube-master.cluster.local """ folder = name.strip("/") + "/" ret = {"name": folder, "result": True, "comment": "", "changes": {}} # Get salt minion ID node = _guess_node_id(node) # Try to get kubernetes master apiserver_url = _guess_apiserver(apiserver_url) if apiserver_url is None: return False # Get all labels old_labels = _get_labels(node, apiserver_url) # Prepare a temp labels dict labels = { key: value for key, value in old_labels.items() if not key.startswith(folder) } # Prepare a temp labels dict if labels == old_labels: # Label already absent ret["comment"] = f"Label folder {folder} already absent" else: # Label needs to be delete res = _set_labels(node, apiserver_url, labels) if res.get("status") == 409: log.debug("Got 409, will try later") ret["changes"] = {} ret["comment"] = "Could not delete label folder {}, please retry".format( folder ) else: ret["changes"] = {"deleted": folder} ret["comment"] = f"Label folder {folder} absent" return ret # Namespaces def _get_namespaces(apiserver_url, name=""): """Get namespace is namespace is defined otherwise return all namespaces""" # Prepare URL url = f"{apiserver_url}/api/v1/namespaces/{name}" # Make request ret = http.query(url) if ret.get("body"): return salt.utils.json.loads(ret.get("body")) else: return None def _create_namespace(namespace, apiserver_url): """create namespace on the defined k8s cluster""" # Prepare URL url = f"{apiserver_url}/api/v1/namespaces" # Prepare data data = {"kind": "Namespace", "apiVersion": "v1", "metadata": {"name": namespace}} log.trace("namespace creation requests: %s", data) # Make request ret = _kpost(url, data) log.trace("result is: %s", ret) # Check requests status return ret def create_namespace(name, apiserver_url=None): """ .. versionadded:: 2016.3.0 Create kubernetes namespace from the name, similar to the functionality added to kubectl since v.1.2.0: .. code-block:: bash kubectl create namespaces namespace-name CLI Example: .. code-block:: bash salt '*' k8s.create_namespace namespace_name salt '*' k8s.create_namespace namespace_name http://kube-master.cluster.local """ ret = {"name": name, "result": True, "comment": "", "changes": {}} # Try to get kubernetes master apiserver_url = _guess_apiserver(apiserver_url) if apiserver_url is None: return False if not _get_namespaces(apiserver_url, name): # This is a new namespace _create_namespace(name, apiserver_url) ret["changes"] = name ret["comment"] = f"Namespace {name} created" else: ret["comment"] = f"Namespace {name} already present" return ret def get_namespaces(namespace="", apiserver_url=None): """ .. versionadded:: 2016.3.0 Get one or all kubernetes namespaces. If namespace parameter is omitted, all namespaces will be returned back to user, similar to following kubectl example: .. code-block:: bash kubectl get namespaces -o json In case namespace is set by user, the output will be similar to the one from kubectl: .. code-block:: bash kubectl get namespaces namespace_name -o json CLI Example: .. code-block:: bash salt '*' k8s.get_namespaces salt '*' k8s.get_namespaces namespace_name http://kube-master.cluster.local """ # Try to get kubernetes master apiserver_url = _guess_apiserver(apiserver_url) if apiserver_url is None: return False # Get data ret = _get_namespaces(apiserver_url, namespace) return ret # Secrets def _get_secrets(namespace, name, apiserver_url): """Get secrets of the namespace.""" # Prepare URL url = f"{apiserver_url}/api/v1/namespaces/{namespace}/secrets/{name}" # Make request ret = http.query(url) if ret.get("body"): return salt.utils.json.loads(ret.get("body")) else: return None def _update_secret(namespace, name, data, apiserver_url): """Replace secrets data by a new one""" # Prepare URL url = f"{apiserver_url}/api/v1/namespaces/{namespace}/secrets/{name}" # Prepare data data = [{"op": "replace", "path": "/data", "value": data}] # Make request ret = _kpatch(url, data) if ret.get("status") == 404: return f"Node {url} doesn't exist" return ret def _create_secret(namespace, name, data, apiserver_url): """create namespace on the defined k8s cluster""" # Prepare URL url = f"{apiserver_url}/api/v1/namespaces/{namespace}/secrets" # Prepare data request = { "apiVersion": "v1", "kind": "Secret", "metadata": {"name": name, "namespace": namespace}, "data": data, } # Make request ret = _kpost(url, request) return ret def _is_valid_secret_file(filename): if os.path.exists(filename) and os.path.isfile(filename): log.debug("File: %s is valid secret file", filename) return True log.warning("File: %s does not exists or not file", filename) return False def _file_encode(filename): log.trace("Encoding secret file: %s", filename) with salt.utils.files.fopen(filename, "rb") as f: data = f.read() return base64.b64encode(data) def _decode_secrets(secrets): items = secrets.get("items", []) if items: for i, secret in enumerate(items): log.trace(i, secret) for k, v in secret.get("data", {}).items(): items[i]["data"][k] = base64.b64decode(v) secrets["items"] = items return secrets else: for k, v in secrets.get("data", {}).items(): secrets["data"][k] = base64.b64decode(v) return secrets def get_secrets(namespace, name="", apiserver_url=None, decode=False, brief=False): """ Get k8s namespaces CLI Example: .. code-block:: bash salt '*' k8s.get_secrets namespace_name salt '*' k8s.get_secrets namespace_name secret_name http://kube-master.cluster.local """ # Try to get kubernetes master apiserver_url = _guess_apiserver(apiserver_url) if apiserver_url is None: return False # Get data if not decode: ret = _get_secrets(namespace, name, apiserver_url) else: ret = _decode_secrets(_get_secrets(namespace, name, apiserver_url)) return ret def _source_encode(source, saltenv): try: source_url = urllib.parse.urlparse(source) except TypeError: return "", {} protos = ("salt", "http", "https", "ftp", "swift", "s3", "file") log.trace("parsed source looks like: %s", source_url) if not source_url.scheme or source_url.scheme == "file": # just a regular file filename = os.path.abspath(source_url.path) sname = os.path.basename(filename) log.debug("Source is a regular local file: %s", source_url.path) if _is_dns_subdomain(sname) and _is_valid_secret_file(filename): return sname, _file_encode(filename) else: if source_url.scheme in protos: # The source is a file on a server filename = __salt__["cp.cache_file"](source, saltenv) if not filename: log.warning("Source file: %s can not be retrieved", source) return "", "" return os.path.basename(filename), _file_encode(filename) return "", "" def update_secret( namespace, name, sources, apiserver_url=None, force=True, saltenv="base" ): """ .. versionadded:: 2016.3.0 alias to k8s.create_secret with update=true CLI Example: .. code-block:: bash salt '*' k8s.update_secret namespace_name secret_name sources [apiserver_url] [force=true] [update=false] [saltenv='base'] sources are either dictionary of {name: path, name1: path} pairs or array of strings defining paths. Example of paths array: .. code-block:: bash ['/full/path/filename', "file:///full/path/filename", "salt://secret/storage/file.txt", "http://user:password@securesite.com/secret-file.json"] Example of dictionaries: .. code-block:: bash {"nameit": '/full/path/fiename', name2: "salt://secret/storage/file.txt"} optional parameters accepted: force=[true] default value is true if the to False, secret will not be created in case one of the files is not valid kubernetes secret. e.g. capital letters in secret name or _ in case force is set to True, wrong files will be skipped but secret will be created any way. saltenv=['base'] default value is base in case 'salt://' path is used, this parameter can change the visibility of files """ apiserver_url = _guess_apiserver(apiserver_url) ret = create_secret( namespace, name, sources, apiserver_url=apiserver_url, force=force, update=True, saltenv=saltenv, ) return ret def create_secret( namespace, name, sources, apiserver_url=None, force=False, update=False, saltenv="base", ): """ .. versionadded:: 2016.3.0 Create k8s secrets in the defined namespace from the list of files CLI Example: .. code-block:: bash salt '*' k8s.create_secret namespace_name secret_name sources salt '*' k8s.create_secret namespace_name secret_name sources http://kube-master.cluster.local sources are either dictionary of {name: path, name1: path} pairs or array of strings defining paths. Example of paths array: .. code-block:: bash ['/full/path/filename', "file:///full/path/filename", "salt://secret/storage/file.txt", "http://user:password@securesite.com/secret-file.json"] Example of dictionaries: .. code-block:: bash {"nameit": '/full/path/fiename', name2: "salt://secret/storage/file.txt"} optional parameters accepted: update=[false] default value is false if set to false, and secret is already present on the cluster - warning will be returned and no changes to the secret will be done. In case it is set to "true" and secret is present but data is differ - secret will be updated. force=[true] default value is true if the to False, secret will not be created in case one of the files is not valid kubernetes secret. e.g. capital letters in secret name or _ in case force is set to True, wrong files will be skipped but secret will be created any way. saltenv=['base'] default value is base in case 'salt://' path is used, this parameter can change the visibility of files """ ret = {"name": name, "result": True, "comment": "", "changes": {}} if not sources: return { "name": name, "result": False, "comment": "No source available", "changes": {}, } apiserver_url = _guess_apiserver(apiserver_url) # we need namespace to create secret in it if not _get_namespaces(apiserver_url, namespace): if force: _create_namespace(namespace, apiserver_url) else: return { "name": name, "result": False, "comment": "Namespace doesn't exists", "changes": {}, } secret = _get_secrets(namespace, name, apiserver_url) if secret and not update: log.info("Secret %s is already present on %s", name, namespace) return { "name": name, "result": False, "comment": f"Secret {name} is already present", "changes": {}, } data = {} for source in sources: log.debug("source is: %s", source) if isinstance(source, dict): # format is array of dictionaries: # [{public_auth: salt://public_key}, {test: "/tmp/test"}] log.trace("source is dictionary: %s", source) for k, v in source.items(): sname, encoded = _source_encode(v, saltenv) if sname == encoded == "": ret[ "comment" ] += f"Source file {v} is missing or name is incorrect\n" if force: continue else: return ret data[k] = encoded elif isinstance(source, str): # expected format is array of filenames sname, encoded = _source_encode(source, saltenv) if sname == encoded == "": if force: ret[ "comment" ] += "Source file {} is missing or name is incorrect\n".format( source ) continue else: return ret data[sname] = encoded log.trace("secret data is: %s", data) if secret and update: if not data: ret["comment"] += "Could not find source files or your sources are empty" ret["result"] = False elif secret.get("data") and data != secret.get("data"): res = _update_secret(namespace, name, data, apiserver_url) ret["comment"] = "Updated secret" ret["changes"] = "Updated secret" else: log.debug("Secret has not been changed on cluster, skipping it") ret["comment"] = "Has not been changed on cluster, skipping it" else: res = _create_secret(namespace, name, data, apiserver_url) return ret def delete_secret(namespace, name, apiserver_url=None, force=True): """ .. versionadded:: 2016.3.0 Delete kubernetes secret in the defined namespace. Namespace is the mandatory parameter as well as name. CLI Example: .. code-block:: bash salt '*' k8s.delete_secret namespace_name secret_name salt '*' k8s.delete_secret namespace_name secret_name http://kube-master.cluster.local """ ret = {"name": name, "result": True, "comment": "", "changes": {}} # Try to get kubernetes master apiserver_url = _guess_apiserver(apiserver_url) if apiserver_url is None: return False # we need namespace to delete secret in it if not _get_namespaces(apiserver_url, namespace): return { "name": name, "result": False, "comment": "Namespace doesn't exists, can't delete anything there", "changes": {}, } url = f"{apiserver_url}/api/v1/namespaces/{namespace}/secrets/{name}" res = http.query(url, method="DELETE") if res.get("body"): ret["comment"] = f"Removed secret {name} in {namespace} namespace" return ret