205 lines
6.7 KiB
Go
205 lines
6.7 KiB
Go
/*
|
|
Copyright 2015 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package pod
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
|
|
"k8s.io/apimachinery/pkg/util/intstr"
|
|
"k8s.io/kubernetes/pkg/api/v1"
|
|
)
|
|
|
|
const (
|
|
// TODO: to be deleted after v1.3 is released. PodSpec has a dedicated Hostname field.
|
|
// The annotation value is a string specifying the hostname to be used for the pod e.g 'my-webserver-1'
|
|
PodHostnameAnnotation = "pod.beta.kubernetes.io/hostname"
|
|
|
|
// TODO: to be deleted after v1.3 is released. PodSpec has a dedicated Subdomain field.
|
|
// The annotation value is a string specifying the subdomain e.g. "my-web-service"
|
|
// If specified, on the pod itself, "<hostname>.my-web-service.<namespace>.svc.<cluster domain>" would resolve to
|
|
// the pod's IP.
|
|
// If there is a headless service named "my-web-service" in the same namespace as the pod, then,
|
|
// <hostname>.my-web-service.<namespace>.svc.<cluster domain>" would be resolved by the cluster DNS Server.
|
|
PodSubdomainAnnotation = "pod.beta.kubernetes.io/subdomain"
|
|
)
|
|
|
|
// FindPort locates the container port for the given pod and portName. If the
|
|
// targetPort is a number, use that. If the targetPort is a string, look that
|
|
// string up in all named ports in all containers in the target pod. If no
|
|
// match is found, fail.
|
|
func FindPort(pod *v1.Pod, svcPort *v1.ServicePort) (int, error) {
|
|
portName := svcPort.TargetPort
|
|
switch portName.Type {
|
|
case intstr.String:
|
|
name := portName.StrVal
|
|
for _, container := range pod.Spec.Containers {
|
|
for _, port := range container.Ports {
|
|
if port.Name == name && port.Protocol == svcPort.Protocol {
|
|
return int(port.ContainerPort), nil
|
|
}
|
|
}
|
|
}
|
|
case intstr.Int:
|
|
return portName.IntValue(), nil
|
|
}
|
|
|
|
return 0, fmt.Errorf("no suitable port for manifest: %s", pod.UID)
|
|
}
|
|
|
|
// TODO: remove this function when init containers becomes a stable feature
|
|
func SetInitContainersAndStatuses(pod *v1.Pod) error {
|
|
var initContainersAnnotation string
|
|
initContainersAnnotation = pod.Annotations[v1.PodInitContainersAnnotationKey]
|
|
initContainersAnnotation = pod.Annotations[v1.PodInitContainersBetaAnnotationKey]
|
|
if len(initContainersAnnotation) > 0 {
|
|
var values []v1.Container
|
|
if err := json.Unmarshal([]byte(initContainersAnnotation), &values); err != nil {
|
|
return err
|
|
}
|
|
pod.Spec.InitContainers = values
|
|
}
|
|
|
|
var initContainerStatusesAnnotation string
|
|
initContainerStatusesAnnotation = pod.Annotations[v1.PodInitContainerStatusesAnnotationKey]
|
|
initContainerStatusesAnnotation = pod.Annotations[v1.PodInitContainerStatusesBetaAnnotationKey]
|
|
if len(initContainerStatusesAnnotation) > 0 {
|
|
var values []v1.ContainerStatus
|
|
if err := json.Unmarshal([]byte(initContainerStatusesAnnotation), &values); err != nil {
|
|
return err
|
|
}
|
|
pod.Status.InitContainerStatuses = values
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// TODO: remove this function when init containers becomes a stable feature
|
|
func SetInitContainersAnnotations(pod *v1.Pod) error {
|
|
if len(pod.Spec.InitContainers) > 0 {
|
|
value, err := json.Marshal(pod.Spec.InitContainers)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if pod.Annotations == nil {
|
|
pod.Annotations = make(map[string]string)
|
|
}
|
|
pod.Annotations[v1.PodInitContainersAnnotationKey] = string(value)
|
|
pod.Annotations[v1.PodInitContainersBetaAnnotationKey] = string(value)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// TODO: remove this function when init containers becomes a stable feature
|
|
func SetInitContainersStatusesAnnotations(pod *v1.Pod) error {
|
|
if len(pod.Status.InitContainerStatuses) > 0 {
|
|
value, err := json.Marshal(pod.Status.InitContainerStatuses)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if pod.Annotations == nil {
|
|
pod.Annotations = make(map[string]string)
|
|
}
|
|
pod.Annotations[v1.PodInitContainerStatusesAnnotationKey] = string(value)
|
|
pod.Annotations[v1.PodInitContainerStatusesBetaAnnotationKey] = string(value)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// VisitPodSecretNames invokes the visitor function with the name of every secret
|
|
// referenced by the pod spec. If visitor returns false, visiting is short-circuited.
|
|
// Transitive references (e.g. pod -> pvc -> pv -> secret) are not visited.
|
|
// Returns true if visiting completed, false if visiting was short-circuited.
|
|
func VisitPodSecretNames(pod *v1.Pod, visitor func(string) bool) bool {
|
|
for _, reference := range pod.Spec.ImagePullSecrets {
|
|
if !visitor(reference.Name) {
|
|
return false
|
|
}
|
|
}
|
|
for i := range pod.Spec.InitContainers {
|
|
if !visitContainerSecretNames(&pod.Spec.InitContainers[i], visitor) {
|
|
return false
|
|
}
|
|
}
|
|
for i := range pod.Spec.Containers {
|
|
if !visitContainerSecretNames(&pod.Spec.Containers[i], visitor) {
|
|
return false
|
|
}
|
|
}
|
|
var source *v1.VolumeSource
|
|
|
|
for i := range pod.Spec.Volumes {
|
|
source = &pod.Spec.Volumes[i].VolumeSource
|
|
switch {
|
|
case source.AzureFile != nil:
|
|
if len(source.AzureFile.SecretName) > 0 && !visitor(source.AzureFile.SecretName) {
|
|
return false
|
|
}
|
|
case source.CephFS != nil:
|
|
if source.CephFS.SecretRef != nil && !visitor(source.CephFS.SecretRef.Name) {
|
|
return false
|
|
}
|
|
case source.FlexVolume != nil:
|
|
if source.FlexVolume.SecretRef != nil && !visitor(source.FlexVolume.SecretRef.Name) {
|
|
return false
|
|
}
|
|
case source.Projected != nil:
|
|
for j := range source.Projected.Sources {
|
|
if source.Projected.Sources[j].Secret != nil {
|
|
if !visitor(source.Projected.Sources[j].Secret.Name) {
|
|
return false
|
|
}
|
|
}
|
|
}
|
|
case source.RBD != nil:
|
|
if source.RBD.SecretRef != nil && !visitor(source.RBD.SecretRef.Name) {
|
|
return false
|
|
}
|
|
case source.Secret != nil:
|
|
if !visitor(source.Secret.SecretName) {
|
|
return false
|
|
}
|
|
case source.ScaleIO != nil:
|
|
if source.ScaleIO.SecretRef != nil && !visitor(source.ScaleIO.SecretRef.Name) {
|
|
return false
|
|
}
|
|
case source.ISCSI != nil:
|
|
if source.ISCSI.SecretRef != nil && !visitor(source.ISCSI.SecretRef.Name) {
|
|
return false
|
|
}
|
|
}
|
|
}
|
|
return true
|
|
}
|
|
|
|
func visitContainerSecretNames(container *v1.Container, visitor func(string) bool) bool {
|
|
for _, env := range container.EnvFrom {
|
|
if env.SecretRef != nil {
|
|
if !visitor(env.SecretRef.Name) {
|
|
return false
|
|
}
|
|
}
|
|
}
|
|
for _, envVar := range container.Env {
|
|
if envVar.ValueFrom != nil && envVar.ValueFrom.SecretKeyRef != nil {
|
|
if !visitor(envVar.ValueFrom.SecretKeyRef.Name) {
|
|
return false
|
|
}
|
|
}
|
|
}
|
|
return true
|
|
}
|