Olares/cli/pkg/plugins/dns/tasks.go

119 lines
3.7 KiB
Go

/*
Copyright 2021 The KubeSphere Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package dns
import (
"fmt"
"path/filepath"
"github.com/beclab/Olares/cli/pkg/common"
"github.com/beclab/Olares/cli/pkg/core/action"
"github.com/beclab/Olares/cli/pkg/core/connector"
"github.com/beclab/Olares/cli/pkg/core/logger"
"github.com/beclab/Olares/cli/pkg/core/util"
"github.com/beclab/Olares/cli/pkg/plugins/dns/templates"
"github.com/beclab/Olares/cli/pkg/utils"
"github.com/pkg/errors"
)
type SetProxyNameServer struct {
common.KubeAction
}
func (s *SetProxyNameServer) Execute(runtime connector.Runtime) error {
proxy, ok := s.PipelineCache.Get(common.CacheProxy)
if !ok || proxy == nil {
return nil
}
if addr := proxy.(string); len(addr) != 0 {
if !utils.IsValidIP(addr) {
// todo set nameserver
return nil
}
if _, err := runtime.GetRunner().SudoCmd("cat /etc/resolv.conf > /etc/resolv.conf.bak", false, false); err != nil {
logger.Errorf("backup /etc/resolv.conf failed: %v", err)
}
if _, err := runtime.GetRunner().SudoCmd(fmt.Sprintf("echo nameserver %s > /etc/resolv.conf", addr), false, true); err != nil {
logger.Errorf("set nameserver %s failed: %v", addr, err)
}
}
return nil
}
type ApplyCoreDNS struct {
common.KubeAction
}
func (o *ApplyCoreDNS) Execute(runtime connector.Runtime) error {
if _, err := runtime.GetRunner().SudoCmd(fmt.Sprintf("/usr/local/bin/kubectl apply -f %s", filepath.Join(common.KubeConfigDir, templates.CorednsService.Name())), false, true); err != nil {
return errors.Wrap(errors.WithStack(err), "apply coredns service failed")
}
return nil
}
type DeployNodeLocalDNS struct {
common.KubeAction
}
func (d *DeployNodeLocalDNS) Execute(runtime connector.Runtime) error {
if _, err := runtime.GetRunner().SudoCmd("/usr/local/bin/kubectl apply -f /etc/kubernetes/nodelocaldns.yaml", false, false); err != nil {
return errors.Wrap(errors.WithStack(err), "deploy nodelocaldns failed")
}
return nil
}
type GenerateNodeLocalDNSConfigMap struct {
common.KubeAction
}
func (g *GenerateNodeLocalDNSConfigMap) Execute(runtime connector.Runtime) error {
clusterIP, err := runtime.GetRunner().SudoCmd("/usr/local/bin/kubectl get svc -n kube-system coredns -o jsonpath='{.spec.clusterIP}'", false, false)
if err != nil {
return errors.Wrap(errors.WithStack(err), "get clusterIP failed")
}
if len(clusterIP) == 0 {
clusterIP = g.KubeConf.Cluster.CorednsClusterIP()
}
templateAction := action.Template{
Name: "GenerateNodeLocalDNSConfigMap",
Template: templates.NodeLocalDNSConfigMap,
Dst: filepath.Join(common.KubeConfigDir, templates.NodeLocalDNSConfigMap.Name()),
Data: util.Data{
"ForwardTarget": clusterIP,
},
}
templateAction.Init(nil, nil)
if err := templateAction.Execute(runtime); err != nil {
return err
}
return nil
}
type ApplyNodeLocalDNSConfigMap struct {
common.KubeAction
}
func (a *ApplyNodeLocalDNSConfigMap) Execute(runtime connector.Runtime) error {
if _, err := runtime.GetRunner().SudoCmd("/usr/local/bin/kubectl apply -f /etc/kubernetes/nodelocaldnsConfigmap.yaml", false, false); err != nil {
return errors.Wrap(errors.WithStack(err), "apply nodelocaldns configmap failed")
}
return nil
}