mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-10-31 10:18:13 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			191 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			191 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2015 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package pod
 | |
| 
 | |
| import (
 | |
| 	"encoding/json"
 | |
| 	"fmt"
 | |
| 
 | |
| 	"k8s.io/apimachinery/pkg/util/intstr"
 | |
| 	"k8s.io/kubernetes/pkg/api/v1"
 | |
| )
 | |
| 
 | |
| // FindPort locates the container port for the given pod and portName.  If the
 | |
| // targetPort is a number, use that.  If the targetPort is a string, look that
 | |
| // string up in all named ports in all containers in the target pod.  If no
 | |
| // match is found, fail.
 | |
| func FindPort(pod *v1.Pod, svcPort *v1.ServicePort) (int, error) {
 | |
| 	portName := svcPort.TargetPort
 | |
| 	switch portName.Type {
 | |
| 	case intstr.String:
 | |
| 		name := portName.StrVal
 | |
| 		for _, container := range pod.Spec.Containers {
 | |
| 			for _, port := range container.Ports {
 | |
| 				if port.Name == name && port.Protocol == svcPort.Protocol {
 | |
| 					return int(port.ContainerPort), nil
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 	case intstr.Int:
 | |
| 		return portName.IntValue(), nil
 | |
| 	}
 | |
| 
 | |
| 	return 0, fmt.Errorf("no suitable port for manifest: %s", pod.UID)
 | |
| }
 | |
| 
 | |
| // TODO: remove this function when init containers becomes a stable feature
 | |
| func SetInitContainersAndStatuses(pod *v1.Pod) error {
 | |
| 	var initContainersAnnotation string
 | |
| 	initContainersAnnotation = pod.Annotations[v1.PodInitContainersAnnotationKey]
 | |
| 	initContainersAnnotation = pod.Annotations[v1.PodInitContainersBetaAnnotationKey]
 | |
| 	if len(initContainersAnnotation) > 0 {
 | |
| 		var values []v1.Container
 | |
| 		if err := json.Unmarshal([]byte(initContainersAnnotation), &values); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		pod.Spec.InitContainers = values
 | |
| 	}
 | |
| 
 | |
| 	var initContainerStatusesAnnotation string
 | |
| 	initContainerStatusesAnnotation = pod.Annotations[v1.PodInitContainerStatusesAnnotationKey]
 | |
| 	initContainerStatusesAnnotation = pod.Annotations[v1.PodInitContainerStatusesBetaAnnotationKey]
 | |
| 	if len(initContainerStatusesAnnotation) > 0 {
 | |
| 		var values []v1.ContainerStatus
 | |
| 		if err := json.Unmarshal([]byte(initContainerStatusesAnnotation), &values); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		pod.Status.InitContainerStatuses = values
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // TODO: remove this function when init containers becomes a stable feature
 | |
| func SetInitContainersAnnotations(pod *v1.Pod) error {
 | |
| 	if len(pod.Spec.InitContainers) > 0 {
 | |
| 		value, err := json.Marshal(pod.Spec.InitContainers)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		if pod.Annotations == nil {
 | |
| 			pod.Annotations = make(map[string]string)
 | |
| 		}
 | |
| 		pod.Annotations[v1.PodInitContainersAnnotationKey] = string(value)
 | |
| 		pod.Annotations[v1.PodInitContainersBetaAnnotationKey] = string(value)
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // TODO: remove this function when init containers becomes a stable feature
 | |
| func SetInitContainersStatusesAnnotations(pod *v1.Pod) error {
 | |
| 	if len(pod.Status.InitContainerStatuses) > 0 {
 | |
| 		value, err := json.Marshal(pod.Status.InitContainerStatuses)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		if pod.Annotations == nil {
 | |
| 			pod.Annotations = make(map[string]string)
 | |
| 		}
 | |
| 		pod.Annotations[v1.PodInitContainerStatusesAnnotationKey] = string(value)
 | |
| 		pod.Annotations[v1.PodInitContainerStatusesBetaAnnotationKey] = string(value)
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // VisitPodSecretNames invokes the visitor function with the name of every secret
 | |
| // referenced by the pod spec. If visitor returns false, visiting is short-circuited.
 | |
| // Transitive references (e.g. pod -> pvc -> pv -> secret) are not visited.
 | |
| // Returns true if visiting completed, false if visiting was short-circuited.
 | |
| func VisitPodSecretNames(pod *v1.Pod, visitor func(string) bool) bool {
 | |
| 	for _, reference := range pod.Spec.ImagePullSecrets {
 | |
| 		if !visitor(reference.Name) {
 | |
| 			return false
 | |
| 		}
 | |
| 	}
 | |
| 	for i := range pod.Spec.InitContainers {
 | |
| 		if !visitContainerSecretNames(&pod.Spec.InitContainers[i], visitor) {
 | |
| 			return false
 | |
| 		}
 | |
| 	}
 | |
| 	for i := range pod.Spec.Containers {
 | |
| 		if !visitContainerSecretNames(&pod.Spec.Containers[i], visitor) {
 | |
| 			return false
 | |
| 		}
 | |
| 	}
 | |
| 	var source *v1.VolumeSource
 | |
| 
 | |
| 	for i := range pod.Spec.Volumes {
 | |
| 		source = &pod.Spec.Volumes[i].VolumeSource
 | |
| 		switch {
 | |
| 		case source.AzureFile != nil:
 | |
| 			if len(source.AzureFile.SecretName) > 0 && !visitor(source.AzureFile.SecretName) {
 | |
| 				return false
 | |
| 			}
 | |
| 		case source.CephFS != nil:
 | |
| 			if source.CephFS.SecretRef != nil && !visitor(source.CephFS.SecretRef.Name) {
 | |
| 				return false
 | |
| 			}
 | |
| 		case source.FlexVolume != nil:
 | |
| 			if source.FlexVolume.SecretRef != nil && !visitor(source.FlexVolume.SecretRef.Name) {
 | |
| 				return false
 | |
| 			}
 | |
| 		case source.Projected != nil:
 | |
| 			for j := range source.Projected.Sources {
 | |
| 				if source.Projected.Sources[j].Secret != nil {
 | |
| 					if !visitor(source.Projected.Sources[j].Secret.Name) {
 | |
| 						return false
 | |
| 					}
 | |
| 				}
 | |
| 			}
 | |
| 		case source.RBD != nil:
 | |
| 			if source.RBD.SecretRef != nil && !visitor(source.RBD.SecretRef.Name) {
 | |
| 				return false
 | |
| 			}
 | |
| 		case source.Secret != nil:
 | |
| 			if !visitor(source.Secret.SecretName) {
 | |
| 				return false
 | |
| 			}
 | |
| 		case source.ScaleIO != nil:
 | |
| 			if source.ScaleIO.SecretRef != nil && !visitor(source.ScaleIO.SecretRef.Name) {
 | |
| 				return false
 | |
| 			}
 | |
| 		case source.ISCSI != nil:
 | |
| 			if source.ISCSI.SecretRef != nil && !visitor(source.ISCSI.SecretRef.Name) {
 | |
| 				return false
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	return true
 | |
| }
 | |
| 
 | |
| func visitContainerSecretNames(container *v1.Container, visitor func(string) bool) bool {
 | |
| 	for _, env := range container.EnvFrom {
 | |
| 		if env.SecretRef != nil {
 | |
| 			if !visitor(env.SecretRef.Name) {
 | |
| 				return false
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	for _, envVar := range container.Env {
 | |
| 		if envVar.ValueFrom != nil && envVar.ValueFrom.SecretKeyRef != nil {
 | |
| 			if !visitor(envVar.ValueFrom.SecretKeyRef.Name) {
 | |
| 				return false
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	return true
 | |
| }
 | 
