package dao import ( "context" "errors" "fmt" "strings" "github.com/derailed/k9s/internal" "github.com/derailed/k9s/internal/client" "github.com/derailed/k9s/internal/watch" "github.com/rs/zerolog/log" appsv1 "k8s.io/api/apps/v1" v1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" "k8s.io/apimachinery/pkg/labels" "k8s.io/apimachinery/pkg/runtime" "k8s.io/apimachinery/pkg/types" "k8s.io/apimachinery/pkg/util/strategicpatch" "k8s.io/kubectl/pkg/polymorphichelpers" "k8s.io/kubectl/pkg/scheme" ) var ( _ Accessor = (*DaemonSet)(nil) _ Nuker = (*DaemonSet)(nil) _ Loggable = (*DaemonSet)(nil) _ Restartable = (*DaemonSet)(nil) _ Controller = (*DaemonSet)(nil) _ ContainsPodSpec = (*DaemonSet)(nil) ) // DaemonSet represents a K8s daemonset. type DaemonSet struct { Resource } // IsHappy check for happy deployments. func (d *DaemonSet) IsHappy(ds appsv1.DaemonSet) bool { return ds.Status.DesiredNumberScheduled == ds.Status.CurrentNumberScheduled } // Restart a DaemonSet rollout. func (d *DaemonSet) Restart(ctx context.Context, path string) error { o, err := d.Factory.Get("apps/v1/daemonsets", path, true, labels.Everything()) if err != nil { return err } var ds appsv1.DaemonSet err = runtime.DefaultUnstructuredConverter.FromUnstructured(o.(*unstructured.Unstructured).Object, &ds) if err != nil { return err } auth, err := d.Client().CanI(ds.Namespace, "apps/v1/daemonsets", []string{client.PatchVerb}) if err != nil { return err } if !auth { return fmt.Errorf("user is not authorized to restart a daemonset") } dial, err := d.Client().Dial() if err != nil { return err } before, err := runtime.Encode(scheme.Codecs.LegacyCodec(appsv1.SchemeGroupVersion), &ds) if err != nil { return err } after, err := polymorphichelpers.ObjectRestarterFn(&ds) if err != nil { return err } diff, err := strategicpatch.CreateTwoWayMergePatch(before, after, ds) if err != nil { return err } _, err = dial.AppsV1().DaemonSets(ds.Namespace).Patch( ctx, ds.Name, types.StrategicMergePatchType, diff, metav1.PatchOptions{}, ) return err } // TailLogs tail logs for all pods represented by this DaemonSet. func (d *DaemonSet) TailLogs(ctx context.Context, c LogChan, opts *LogOptions) error { ds, err := d.GetInstance(opts.Path) if err != nil { return err } if ds.Spec.Selector == nil || len(ds.Spec.Selector.MatchLabels) == 0 { return fmt.Errorf("no valid selector found on daemonset %q", opts.Path) } return podLogs(ctx, c, ds.Spec.Selector.MatchLabels, opts) } func podLogs(ctx context.Context, out LogChan, sel map[string]string, opts *LogOptions) error { f, ok := ctx.Value(internal.KeyFactory).(*watch.Factory) if !ok { return errors.New("expecting a context factory") } ls, err := metav1.ParseToLabelSelector(toSelector(sel)) if err != nil { return err } lsel, err := metav1.LabelSelectorAsSelector(ls) if err != nil { return err } ns, _ := client.Namespaced(opts.Path) oo, err := f.List("v1/pods", ns, true, lsel) if err != nil { return err } opts.MultiPods = true po := Pod{} po.Init(f, client.NewGVR("v1/pods")) for _, o := range oo { u, ok := o.(*unstructured.Unstructured) if !ok { return fmt.Errorf("expected unstructured got %t", o) } opts = opts.Clone() opts.Path = client.FQN(u.GetNamespace(), u.GetName()) if err := po.TailLogs(ctx, out, opts); err != nil { return err } } return nil } // Pod returns a pod victim by name. func (d *DaemonSet) Pod(fqn string) (string, error) { ds, err := d.GetInstance(fqn) if err != nil { return "", err } return podFromSelector(d.Factory, ds.Namespace, ds.Spec.Selector.MatchLabels) } // GetInstance returns a daemonset instance. func (d *DaemonSet) GetInstance(fqn string) (*appsv1.DaemonSet, error) { o, err := d.Factory.Get(d.gvr.String(), fqn, true, labels.Everything()) if err != nil { return nil, err } var ds appsv1.DaemonSet err = runtime.DefaultUnstructuredConverter.FromUnstructured(o.(*unstructured.Unstructured).Object, &ds) if err != nil { return nil, errors.New("expecting DaemonSet resource") } return &ds, nil } // ScanSA scans for serviceaccount refs. func (d *DaemonSet) ScanSA(ctx context.Context, fqn string, wait bool) (Refs, error) { ns, n := client.Namespaced(fqn) oo, err := d.Factory.List(d.GVR(), ns, wait, labels.Everything()) if err != nil { return nil, err } refs := make(Refs, 0, len(oo)) for _, o := range oo { var ds appsv1.DaemonSet err = runtime.DefaultUnstructuredConverter.FromUnstructured(o.(*unstructured.Unstructured).Object, &ds) if err != nil { return nil, errors.New("expecting DaemonSet resource") } if ds.Spec.Template.Spec.ServiceAccountName == n { refs = append(refs, Ref{ GVR: d.GVR(), FQN: client.FQN(ds.Namespace, ds.Name), }) } } return refs, nil } // Scan scans for cluster refs. func (d *DaemonSet) Scan(ctx context.Context, gvr, fqn string, wait bool) (Refs, error) { ns, n := client.Namespaced(fqn) oo, err := d.Factory.List(d.GVR(), ns, wait, labels.Everything()) if err != nil { return nil, err } refs := make(Refs, 0, len(oo)) for _, o := range oo { var ds appsv1.DaemonSet err = runtime.DefaultUnstructuredConverter.FromUnstructured(o.(*unstructured.Unstructured).Object, &ds) if err != nil { return nil, errors.New("expecting StatefulSet resource") } switch gvr { case "v1/configmaps": if !hasConfigMap(&ds.Spec.Template.Spec, n) { continue } refs = append(refs, Ref{ GVR: d.GVR(), FQN: client.FQN(ds.Namespace, ds.Name), }) case "v1/secrets": found, err := hasSecret(d.Factory, &ds.Spec.Template.Spec, ds.Namespace, n, wait) if err != nil { log.Warn().Err(err).Msgf("locate secret %q", fqn) continue } if !found { continue } refs = append(refs, Ref{ GVR: d.GVR(), FQN: client.FQN(ds.Namespace, ds.Name), }) case "v1/persistentvolumeclaims": if !hasPVC(&ds.Spec.Template.Spec, n) { continue } refs = append(refs, Ref{ GVR: d.GVR(), FQN: client.FQN(ds.Namespace, ds.Name), }) } } return refs, nil } // GetPodSpec returns a pod spec given a resource. func (d *DaemonSet) GetPodSpec(path string) (*v1.PodSpec, error) { ds, err := d.GetInstance(path) if err != nil { return nil, err } podSpec := ds.Spec.Template.Spec return &podSpec, nil } // SetImages sets container images. func (d *DaemonSet) SetImages(ctx context.Context, path string, imageSpecs ImageSpecs) error { ns, n := client.Namespaced(path) auth, err := d.Client().CanI(ns, "apps/v1/daemonset", []string{client.PatchVerb}) if err != nil { return err } if !auth { return fmt.Errorf("user is not authorized to patch a daemonset") } jsonPatch, err := GetTemplateJsonPatch(imageSpecs) if err != nil { return err } dial, err := d.Client().Dial() if err != nil { return err } _, err = dial.AppsV1().DaemonSets(ns).Patch( ctx, n, types.StrategicMergePatchType, jsonPatch, metav1.PatchOptions{}, ) return err } // ---------------------------------------------------------------------------- // Helpers... func toSelector(m map[string]string) string { s := make([]string, 0, len(m)) for k, v := range m { s = append(s, k+"="+v) } return strings.Join(s, ",") }