
Kube-proxy must atleast wait for some duration for the node to defined so that it can fetch the node IP. This node IP is currently used in ipvs proxier for the node-port services.
229 lines
7.6 KiB
Go
229 lines
7.6 KiB
Go
/*
|
|
Copyright 2015 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package node
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"net"
|
|
"os"
|
|
"strings"
|
|
"time"
|
|
|
|
"k8s.io/klog"
|
|
|
|
"k8s.io/api/core/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
"k8s.io/apimachinery/pkg/util/strategicpatch"
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
clientset "k8s.io/client-go/kubernetes"
|
|
v1core "k8s.io/client-go/kubernetes/typed/core/v1"
|
|
)
|
|
|
|
const (
|
|
// NodeUnreachablePodReason is the reason on a pod when its state cannot be confirmed as kubelet is unresponsive
|
|
// on the node it is (was) running.
|
|
NodeUnreachablePodReason = "NodeLost"
|
|
// NodeUnreachablePodMessage is the message on a pod when its state cannot be confirmed as kubelet is unresponsive
|
|
// on the node it is (was) running.
|
|
NodeUnreachablePodMessage = "Node %v which was running pod %v is unresponsive"
|
|
)
|
|
|
|
// GetHostname returns OS's hostname if 'hostnameOverride' is empty; otherwise, return 'hostnameOverride'.
|
|
func GetHostname(hostnameOverride string) (string, error) {
|
|
hostName := hostnameOverride
|
|
if len(hostName) == 0 {
|
|
nodeName, err := os.Hostname()
|
|
if err != nil {
|
|
return "", fmt.Errorf("couldn't determine hostname: %v", err)
|
|
}
|
|
hostName = nodeName
|
|
}
|
|
|
|
// Trim whitespaces first to avoid getting an empty hostname
|
|
// For linux, the hostname is read from file /proc/sys/kernel/hostname directly
|
|
hostName = strings.TrimSpace(hostName)
|
|
if len(hostName) == 0 {
|
|
return "", fmt.Errorf("empty hostname is invalid")
|
|
}
|
|
return strings.ToLower(hostName), nil
|
|
}
|
|
|
|
// NoMatchError is a typed implementation of the error interface. It indicates a failure to get a matching Node.
|
|
type NoMatchError struct {
|
|
addresses []v1.NodeAddress
|
|
}
|
|
|
|
// Error is the implementation of the conventional interface for
|
|
// representing an error condition, with the nil value representing no error.
|
|
func (e *NoMatchError) Error() string {
|
|
return fmt.Sprintf("no preferred addresses found; known addresses: %v", e.addresses)
|
|
}
|
|
|
|
// GetPreferredNodeAddress returns the address of the provided node, using the provided preference order.
|
|
// If none of the preferred address types are found, an error is returned.
|
|
func GetPreferredNodeAddress(node *v1.Node, preferredAddressTypes []v1.NodeAddressType) (string, error) {
|
|
for _, addressType := range preferredAddressTypes {
|
|
for _, address := range node.Status.Addresses {
|
|
if address.Type == addressType {
|
|
return address.Address, nil
|
|
}
|
|
}
|
|
}
|
|
return "", &NoMatchError{addresses: node.Status.Addresses}
|
|
}
|
|
|
|
// GetNodeHostIP returns the provided node's IP, based on the priority:
|
|
// 1. NodeInternalIP
|
|
// 2. NodeExternalIP
|
|
func GetNodeHostIP(node *v1.Node) (net.IP, error) {
|
|
addresses := node.Status.Addresses
|
|
addressMap := make(map[v1.NodeAddressType][]v1.NodeAddress)
|
|
for i := range addresses {
|
|
addressMap[addresses[i].Type] = append(addressMap[addresses[i].Type], addresses[i])
|
|
}
|
|
if addresses, ok := addressMap[v1.NodeInternalIP]; ok {
|
|
return net.ParseIP(addresses[0].Address), nil
|
|
}
|
|
if addresses, ok := addressMap[v1.NodeExternalIP]; ok {
|
|
return net.ParseIP(addresses[0].Address), nil
|
|
}
|
|
return nil, fmt.Errorf("host IP unknown; known addresses: %v", addresses)
|
|
}
|
|
|
|
// GetNodeIP returns the ip of node with the provided hostname
|
|
// If required, wait for the node to be defined.
|
|
func GetNodeIP(client clientset.Interface, hostname string) net.IP {
|
|
var nodeIP net.IP
|
|
backoff := wait.Backoff {
|
|
Steps: 5,
|
|
Duration: 1 * time.Second,
|
|
Factor: 2.0,
|
|
Jitter: 0.2,
|
|
}
|
|
|
|
err := wait.ExponentialBackoff(backoff, func() (bool, error) {
|
|
node, err := client.CoreV1().Nodes().Get(hostname, metav1.GetOptions{})
|
|
if err != nil {
|
|
klog.Errorf("Failed to retrieve node info: %v", err)
|
|
return false, nil
|
|
}
|
|
nodeIP, err = GetNodeHostIP(node)
|
|
if err != nil {
|
|
klog.Errorf("Failed to retrieve node IP: %v", err)
|
|
return false, err
|
|
}
|
|
return true, nil
|
|
})
|
|
if err == nil {
|
|
klog.Infof("Successfully retrieved node IP: %v", nodeIP)
|
|
}
|
|
return nodeIP
|
|
}
|
|
|
|
// GetZoneKey is a helper function that builds a string identifier that is unique per failure-zone;
|
|
// it returns empty-string for no zone.
|
|
func GetZoneKey(node *v1.Node) string {
|
|
labels := node.Labels
|
|
if labels == nil {
|
|
return ""
|
|
}
|
|
|
|
region, _ := labels[v1.LabelZoneRegion]
|
|
failureDomain, _ := labels[v1.LabelZoneFailureDomain]
|
|
|
|
if region == "" && failureDomain == "" {
|
|
return ""
|
|
}
|
|
|
|
// We include the null character just in case region or failureDomain has a colon
|
|
// (We do assume there's no null characters in a region or failureDomain)
|
|
// As a nice side-benefit, the null character is not printed by fmt.Print or glog
|
|
return region + ":\x00:" + failureDomain
|
|
}
|
|
|
|
// SetNodeCondition updates specific node condition with patch operation.
|
|
func SetNodeCondition(c clientset.Interface, node types.NodeName, condition v1.NodeCondition) error {
|
|
generatePatch := func(condition v1.NodeCondition) ([]byte, error) {
|
|
raw, err := json.Marshal(&[]v1.NodeCondition{condition})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return []byte(fmt.Sprintf(`{"status":{"conditions":%s}}`, raw)), nil
|
|
}
|
|
condition.LastHeartbeatTime = metav1.NewTime(time.Now())
|
|
patch, err := generatePatch(condition)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
_, err = c.CoreV1().Nodes().PatchStatus(string(node), patch)
|
|
return err
|
|
}
|
|
|
|
// PatchNodeCIDR patches the specified node's CIDR to the given value.
|
|
func PatchNodeCIDR(c clientset.Interface, node types.NodeName, cidr string) error {
|
|
raw, err := json.Marshal(cidr)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to json.Marshal CIDR: %v", err)
|
|
}
|
|
|
|
patchBytes := []byte(fmt.Sprintf(`{"spec":{"podCIDR":%s}}`, raw))
|
|
|
|
if _, err := c.CoreV1().Nodes().Patch(string(node), types.StrategicMergePatchType, patchBytes); err != nil {
|
|
return fmt.Errorf("failed to patch node CIDR: %v", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// PatchNodeStatus patches node status.
|
|
func PatchNodeStatus(c v1core.CoreV1Interface, nodeName types.NodeName, oldNode *v1.Node, newNode *v1.Node) (*v1.Node, []byte, error) {
|
|
patchBytes, err := preparePatchBytesforNodeStatus(nodeName, oldNode, newNode)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
updatedNode, err := c.Nodes().Patch(string(nodeName), types.StrategicMergePatchType, patchBytes, "status")
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("failed to patch status %q for node %q: %v", patchBytes, nodeName, err)
|
|
}
|
|
return updatedNode, patchBytes, nil
|
|
}
|
|
|
|
func preparePatchBytesforNodeStatus(nodeName types.NodeName, oldNode *v1.Node, newNode *v1.Node) ([]byte, error) {
|
|
oldData, err := json.Marshal(oldNode)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to Marshal oldData for node %q: %v", nodeName, err)
|
|
}
|
|
|
|
// Reset spec to make sure only patch for Status or ObjectMeta is generated.
|
|
// Note that we don't reset ObjectMeta here, because:
|
|
// 1. This aligns with Nodes().UpdateStatus().
|
|
// 2. Some component does use this to update node annotations.
|
|
newNode.Spec = oldNode.Spec
|
|
newData, err := json.Marshal(newNode)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to Marshal newData for node %q: %v", nodeName, err)
|
|
}
|
|
|
|
patchBytes, err := strategicpatch.CreateTwoWayMergePatch(oldData, newData, v1.Node{})
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to CreateTwoWayMergePatch for node %q: %v", nodeName, err)
|
|
}
|
|
return patchBytes, nil
|
|
}
|