@@ -5,9 +5,10 @@ import (
5
5
"fmt"
6
6
"io"
7
7
8
+ kerrs "k8s.io/apimachinery/pkg/api/errors"
8
9
"k8s.io/apimachinery/pkg/apis/meta/v1"
9
- "k8s.io/apimachinery/pkg/runtime "
10
- utilerrors "k8s.io/apimachinery /pkg/util/errors "
10
+ "k8s.io/client-go/util/flowcontrol "
11
+ "k8s.io/kubernetes /pkg/apis/rbac/v1beta1 "
11
12
rbacinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/rbac/internalversion"
12
13
"k8s.io/kubernetes/pkg/kubectl/cmd/templates"
13
14
kcmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
39
40
40
41
No resources are mutated.` )
41
42
42
- errOutOfSync = errors .New ("is not in sync with RBAC" )
43
+ // errOutOfSync is retriable since it could be caused by the controller lagging behind
44
+ errOutOfSync = migrate.ErrRetriable {errors .New ("is not in sync with RBAC" )}
43
45
)
44
46
45
47
type MigrateAuthorizationOptions struct {
@@ -54,6 +56,7 @@ func NewCmdMigrateAuthorization(name, fullName string, f *clientcmd.Factory, in
54
56
Out : out ,
55
57
ErrOut : errout ,
56
58
AllNamespaces : true ,
59
+ Confirm : true , // force our save function to always run (it is read only)
57
60
Include : []string {
58
61
"clusterroles.authorization.openshift.io" ,
59
62
"roles.authorization.openshift.io" ,
@@ -81,20 +84,40 @@ func (o *MigrateAuthorizationOptions) Complete(name string, f *clientcmd.Factory
81
84
return fmt .Errorf ("%s takes no positional arguments" , name )
82
85
}
83
86
87
+ o .ResourceOptions .SaveFn = o .checkParity
84
88
if err := o .ResourceOptions .Complete (f , c ); err != nil {
85
89
return err
86
90
}
87
91
88
- kclient , err := f .ClientSet ()
92
+ discovery , err := f .DiscoveryClient ()
89
93
if err != nil {
90
94
return err
91
95
}
92
96
93
- if err := clientcmd .LegacyPolicyResourceGate (kclient . Discovery () ); err != nil {
97
+ if err := clientcmd .LegacyPolicyResourceGate (discovery ); err != nil {
94
98
return err
95
99
}
96
100
97
- o .rbac = kclient .Rbac ()
101
+ config , err := f .ClientConfig ()
102
+ if err != nil {
103
+ return err
104
+ }
105
+
106
+ // do not rate limit this client because it has to scan all RBAC data across the cluster
107
+ // this is safe because only a cluster admin will have the ability to read these objects
108
+ configShallowCopy := * config
109
+ configShallowCopy .RateLimiter = flowcontrol .NewFakeAlwaysRateLimiter ()
110
+
111
+ // This command is only compatible with a 3.6 server, which only supported RBAC v1beta1
112
+ // Thus we must force that GV otherwise the client will default to v1
113
+ gv := v1beta1 .SchemeGroupVersion
114
+ configShallowCopy .GroupVersion = & gv
115
+
116
+ rbac , err := rbacinternalversion .NewForConfig (& configShallowCopy )
117
+ if err != nil {
118
+ return err
119
+ }
120
+ o .rbac = rbac
98
121
99
122
return nil
100
123
}
@@ -104,130 +127,159 @@ func (o MigrateAuthorizationOptions) Validate() error {
104
127
}
105
128
106
129
func (o MigrateAuthorizationOptions ) Run () error {
107
- return o .ResourceOptions .Visitor ().Visit (func (info * resource.Info ) (migrate.Reporter , error ) {
108
- return o .checkParity (info .Object )
109
- })
130
+ // we lie and say this object has changed so our save function will run
131
+ return o .ResourceOptions .Visitor ().Visit (migrate .AlwaysRequiresMigration )
110
132
}
111
133
112
134
// checkParity confirms that Openshift authorization objects are in sync with Kubernetes RBAC
113
135
// and returns an error if they are out of sync or if it encounters a conversion error
114
- func (o * MigrateAuthorizationOptions ) checkParity (obj runtime.Object ) (migrate.Reporter , error ) {
115
- var errlist []error
116
- switch t := obj .(type ) {
136
+ func (o * MigrateAuthorizationOptions ) checkParity (info * resource.Info , _ migrate.Reporter ) error {
137
+ var err migrate.TemporaryError
138
+
139
+ switch t := info .Object .(type ) {
117
140
case * authorizationapi.ClusterRole :
118
- errlist = append ( errlist , o .checkClusterRole (t ) ... )
141
+ err = o .checkClusterRole (t )
119
142
case * authorizationapi.Role :
120
- errlist = append ( errlist , o .checkRole (t ) ... )
143
+ err = o .checkRole (t )
121
144
case * authorizationapi.ClusterRoleBinding :
122
- errlist = append ( errlist , o .checkClusterRoleBinding (t ) ... )
145
+ err = o .checkClusterRoleBinding (t )
123
146
case * authorizationapi.RoleBinding :
124
- errlist = append ( errlist , o .checkRoleBinding (t ) ... )
147
+ err = o .checkRoleBinding (t )
125
148
default :
126
- return nil , nil // indicate that we ignored the object
149
+ // this should never happen unless o.Include or the server is broken
150
+ return fmt .Errorf ("impossible type %T for checkParity info=%#v object=%#v" , t , info , t )
151
+ }
152
+
153
+ // We encountered no error, so this object is in sync.
154
+ if err == nil {
155
+ // we only perform read operations so we return this error to signal that we did not change anything
156
+ return migrate .ErrUnchanged
157
+ }
158
+
159
+ // At this point we know that we have some non-nil TemporaryError.
160
+ // If it has the possibility of being transient, we need to sync ourselves with the current state of the object.
161
+ if err .Temporary () {
162
+ // The most likely cause is that an authorization object was deleted after we initially fetched it,
163
+ // and the controller deleted the associated RBAC object, which caused our RBAC GET to fail.
164
+ // We can confirm this by refetching the authorization object.
165
+ refreshErr := info .Get ()
166
+ if refreshErr != nil {
167
+ // Our refresh GET for this authorization object failed.
168
+ // The default logic for migration errors is appropriate in this case (refreshErr is most likely a NotFound).
169
+ return migrate .DefaultRetriable (info , refreshErr )
170
+ }
171
+ // We had no refreshErr, but encountered some other possibly transient error.
172
+ // No special handling is required in this case, we just pass it through below.
127
173
}
128
- return migrate .NotChanged , utilerrors .NewAggregate (errlist ) // we only perform read operations
174
+
175
+ // All of the check* funcs return an appropriate TemporaryError based on the failure,
176
+ // so we can pass that through to the default migration logic which will retry as needed.
177
+ return err
129
178
}
130
179
131
- func (o * MigrateAuthorizationOptions ) checkClusterRole (originClusterRole * authorizationapi.ClusterRole ) []error {
132
- var errlist []error
180
+ // handleRBACGetError signals for a retry on NotFound (handles deletion and sync lag)
181
+ // and ServerTimeout (handles heavy load against the server).
182
+ func handleRBACGetError (err error ) migrate.TemporaryError {
183
+ switch {
184
+ case kerrs .IsNotFound (err ), kerrs .IsServerTimeout (err ):
185
+ return migrate.ErrRetriable {err }
186
+ default :
187
+ return migrate.ErrNotRetriable {err }
188
+ }
189
+ }
133
190
191
+ func (o * MigrateAuthorizationOptions ) checkClusterRole (originClusterRole * authorizationapi.ClusterRole ) migrate.TemporaryError {
134
192
// convert the origin role to a rbac role
135
193
convertedClusterRole , err := util .ConvertToRBACClusterRole (originClusterRole )
136
194
if err != nil {
137
- errlist = append (errlist , err )
195
+ // conversion errors should basically never happen, so we do not attempt to retry on those
196
+ return migrate.ErrNotRetriable {err }
138
197
}
139
198
140
199
// try to get the equivalent rbac role from the api
141
200
rbacClusterRole , err := o .rbac .ClusterRoles ().Get (originClusterRole .Name , v1.GetOptions {})
142
201
if err != nil {
143
- errlist = append (errlist , err )
202
+ // it is possible that the controller has not synced this yet
203
+ return handleRBACGetError (err )
144
204
}
145
205
146
- // compare the results if there have been no errors so far
147
- if len (errlist ) == 0 {
148
- // if they are not equal, something has gone wrong and the two objects are not in sync
149
- if util .PrepareForUpdateClusterRole (convertedClusterRole , rbacClusterRole ) {
150
- errlist = append (errlist , errOutOfSync )
151
- }
206
+ // if they are not equal, something has gone wrong and the two objects are not in sync
207
+ if util .PrepareForUpdateClusterRole (convertedClusterRole , rbacClusterRole ) {
208
+ // we retry on this since it could be caused by the controller lagging behind
209
+ return errOutOfSync
152
210
}
153
211
154
- return errlist
212
+ return nil
155
213
}
156
214
157
- func (o * MigrateAuthorizationOptions ) checkRole (originRole * authorizationapi.Role ) []error {
158
- var errlist []error
159
-
215
+ func (o * MigrateAuthorizationOptions ) checkRole (originRole * authorizationapi.Role ) migrate.TemporaryError {
160
216
// convert the origin role to a rbac role
161
217
convertedRole , err := util .ConvertToRBACRole (originRole )
162
218
if err != nil {
163
- errlist = append (errlist , err )
219
+ // conversion errors should basically never happen, so we do not attempt to retry on those
220
+ return migrate.ErrNotRetriable {err }
164
221
}
165
222
166
223
// try to get the equivalent rbac role from the api
167
224
rbacRole , err := o .rbac .Roles (originRole .Namespace ).Get (originRole .Name , v1.GetOptions {})
168
225
if err != nil {
169
- errlist = append (errlist , err )
226
+ // it is possible that the controller has not synced this yet
227
+ return handleRBACGetError (err )
170
228
}
171
229
172
- // compare the results if there have been no errors so far
173
- if len (errlist ) == 0 {
174
- // if they are not equal, something has gone wrong and the two objects are not in sync
175
- if util .PrepareForUpdateRole (convertedRole , rbacRole ) {
176
- errlist = append (errlist , errOutOfSync )
177
- }
230
+ // if they are not equal, something has gone wrong and the two objects are not in sync
231
+ if util .PrepareForUpdateRole (convertedRole , rbacRole ) {
232
+ // we retry on this since it could be caused by the controller lagging behind
233
+ return errOutOfSync
178
234
}
179
235
180
- return errlist
236
+ return nil
181
237
}
182
238
183
- func (o * MigrateAuthorizationOptions ) checkClusterRoleBinding (originRoleBinding * authorizationapi.ClusterRoleBinding ) []error {
184
- var errlist []error
185
-
239
+ func (o * MigrateAuthorizationOptions ) checkClusterRoleBinding (originRoleBinding * authorizationapi.ClusterRoleBinding ) migrate.TemporaryError {
186
240
// convert the origin role binding to a rbac role binding
187
241
convertedRoleBinding , err := util .ConvertToRBACClusterRoleBinding (originRoleBinding )
188
242
if err != nil {
189
- errlist = append (errlist , err )
243
+ // conversion errors should basically never happen, so we do not attempt to retry on those
244
+ return migrate.ErrNotRetriable {err }
190
245
}
191
246
192
247
// try to get the equivalent rbac role binding from the api
193
248
rbacRoleBinding , err := o .rbac .ClusterRoleBindings ().Get (originRoleBinding .Name , v1.GetOptions {})
194
249
if err != nil {
195
- errlist = append (errlist , err )
250
+ // it is possible that the controller has not synced this yet
251
+ return handleRBACGetError (err )
196
252
}
197
253
198
- // compare the results if there have been no errors so far
199
- if len (errlist ) == 0 {
200
- // if they are not equal, something has gone wrong and the two objects are not in sync
201
- if util .PrepareForUpdateClusterRoleBinding (convertedRoleBinding , rbacRoleBinding ) {
202
- errlist = append (errlist , errOutOfSync )
203
- }
254
+ // if they are not equal, something has gone wrong and the two objects are not in sync
255
+ if util .PrepareForUpdateClusterRoleBinding (convertedRoleBinding , rbacRoleBinding ) {
256
+ // we retry on this since it could be caused by the controller lagging behind
257
+ return errOutOfSync
204
258
}
205
259
206
- return errlist
260
+ return nil
207
261
}
208
262
209
- func (o * MigrateAuthorizationOptions ) checkRoleBinding (originRoleBinding * authorizationapi.RoleBinding ) []error {
210
- var errlist []error
211
-
263
+ func (o * MigrateAuthorizationOptions ) checkRoleBinding (originRoleBinding * authorizationapi.RoleBinding ) migrate.TemporaryError {
212
264
// convert the origin role binding to a rbac role binding
213
265
convertedRoleBinding , err := util .ConvertToRBACRoleBinding (originRoleBinding )
214
266
if err != nil {
215
- errlist = append (errlist , err )
267
+ // conversion errors should basically never happen, so we do not attempt to retry on those
268
+ return migrate.ErrNotRetriable {err }
216
269
}
217
270
218
271
// try to get the equivalent rbac role binding from the api
219
272
rbacRoleBinding , err := o .rbac .RoleBindings (originRoleBinding .Namespace ).Get (originRoleBinding .Name , v1.GetOptions {})
220
273
if err != nil {
221
- errlist = append (errlist , err )
274
+ // it is possible that the controller has not synced this yet
275
+ return handleRBACGetError (err )
222
276
}
223
277
224
- // compare the results if there have been no errors so far
225
- if len (errlist ) == 0 {
226
- // if they are not equal, something has gone wrong and the two objects are not in sync
227
- if util .PrepareForUpdateRoleBinding (convertedRoleBinding , rbacRoleBinding ) {
228
- errlist = append (errlist , errOutOfSync )
229
- }
278
+ // if they are not equal, something has gone wrong and the two objects are not in sync
279
+ if util .PrepareForUpdateRoleBinding (convertedRoleBinding , rbacRoleBinding ) {
280
+ // we retry on this since it could be caused by the controller lagging behind
281
+ return errOutOfSync
230
282
}
231
283
232
- return errlist
284
+ return nil
233
285
}
0 commit comments