mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			511 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			511 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2014 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package helper
 | 
						|
 | 
						|
import (
 | 
						|
	"encoding/json"
 | 
						|
	"fmt"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"k8s.io/api/core/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						|
	"k8s.io/apimachinery/pkg/fields"
 | 
						|
	"k8s.io/apimachinery/pkg/labels"
 | 
						|
	"k8s.io/apimachinery/pkg/selection"
 | 
						|
	"k8s.io/apimachinery/pkg/util/validation"
 | 
						|
	"k8s.io/kubernetes/pkg/apis/core/helper"
 | 
						|
)
 | 
						|
 | 
						|
// IsExtendedResourceName returns true if:
 | 
						|
// 1. the resource name is not in the default namespace;
 | 
						|
// 2. resource name does not have "requests." prefix,
 | 
						|
// to avoid confusion with the convention in quota
 | 
						|
// 3. it satisfies the rules in IsQualifiedName() after converted into quota resource name
 | 
						|
func IsExtendedResourceName(name v1.ResourceName) bool {
 | 
						|
	if IsNativeResource(name) || strings.HasPrefix(string(name), v1.DefaultResourceRequestsPrefix) {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	// Ensure it satisfies the rules in IsQualifiedName() after converted into quota resource name
 | 
						|
	nameForQuota := fmt.Sprintf("%s%s", v1.DefaultResourceRequestsPrefix, string(name))
 | 
						|
	if errs := validation.IsQualifiedName(string(nameForQuota)); len(errs) != 0 {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	return true
 | 
						|
}
 | 
						|
 | 
						|
// IsPrefixedNativeResource returns true if the resource name is in the
 | 
						|
// *kubernetes.io/ namespace.
 | 
						|
func IsPrefixedNativeResource(name v1.ResourceName) bool {
 | 
						|
	return strings.Contains(string(name), v1.ResourceDefaultNamespacePrefix)
 | 
						|
}
 | 
						|
 | 
						|
// IsNativeResource returns true if the resource name is in the
 | 
						|
// *kubernetes.io/ namespace. Partially-qualified (unprefixed) names are
 | 
						|
// implicitly in the kubernetes.io/ namespace.
 | 
						|
func IsNativeResource(name v1.ResourceName) bool {
 | 
						|
	return !strings.Contains(string(name), "/") ||
 | 
						|
		IsPrefixedNativeResource(name)
 | 
						|
}
 | 
						|
 | 
						|
// IsHugePageResourceName returns true if the resource name has the huge page
 | 
						|
// resource prefix.
 | 
						|
func IsHugePageResourceName(name v1.ResourceName) bool {
 | 
						|
	return strings.HasPrefix(string(name), v1.ResourceHugePagesPrefix)
 | 
						|
}
 | 
						|
 | 
						|
// HugePageResourceName returns a ResourceName with the canonical hugepage
 | 
						|
// prefix prepended for the specified page size.  The page size is converted
 | 
						|
// to its canonical representation.
 | 
						|
func HugePageResourceName(pageSize resource.Quantity) v1.ResourceName {
 | 
						|
	return v1.ResourceName(fmt.Sprintf("%s%s", v1.ResourceHugePagesPrefix, pageSize.String()))
 | 
						|
}
 | 
						|
 | 
						|
// HugePageSizeFromResourceName returns the page size for the specified huge page
 | 
						|
// resource name.  If the specified input is not a valid huge page resource name
 | 
						|
// an error is returned.
 | 
						|
func HugePageSizeFromResourceName(name v1.ResourceName) (resource.Quantity, error) {
 | 
						|
	if !IsHugePageResourceName(name) {
 | 
						|
		return resource.Quantity{}, fmt.Errorf("resource name: %s is an invalid hugepage name", name)
 | 
						|
	}
 | 
						|
	pageSize := strings.TrimPrefix(string(name), v1.ResourceHugePagesPrefix)
 | 
						|
	return resource.ParseQuantity(pageSize)
 | 
						|
}
 | 
						|
 | 
						|
// IsOvercommitAllowed returns true if the resource is in the default
 | 
						|
// namespace and is not hugepages.
 | 
						|
func IsOvercommitAllowed(name v1.ResourceName) bool {
 | 
						|
	return IsNativeResource(name) &&
 | 
						|
		!IsHugePageResourceName(name)
 | 
						|
}
 | 
						|
 | 
						|
func IsAttachableVolumeResourceName(name v1.ResourceName) bool {
 | 
						|
	return strings.HasPrefix(string(name), v1.ResourceAttachableVolumesPrefix)
 | 
						|
}
 | 
						|
 | 
						|
// Extended and Hugepages resources
 | 
						|
func IsScalarResourceName(name v1.ResourceName) bool {
 | 
						|
	return IsExtendedResourceName(name) || IsHugePageResourceName(name) ||
 | 
						|
		IsPrefixedNativeResource(name) || IsAttachableVolumeResourceName(name)
 | 
						|
}
 | 
						|
 | 
						|
// this function aims to check if the service's ClusterIP is set or not
 | 
						|
// the objective is not to perform validation here
 | 
						|
func IsServiceIPSet(service *v1.Service) bool {
 | 
						|
	return service.Spec.ClusterIP != v1.ClusterIPNone && service.Spec.ClusterIP != ""
 | 
						|
}
 | 
						|
 | 
						|
// TODO: make method on LoadBalancerStatus?
 | 
						|
func LoadBalancerStatusEqual(l, r *v1.LoadBalancerStatus) bool {
 | 
						|
	return ingressSliceEqual(l.Ingress, r.Ingress)
 | 
						|
}
 | 
						|
 | 
						|
func ingressSliceEqual(lhs, rhs []v1.LoadBalancerIngress) bool {
 | 
						|
	if len(lhs) != len(rhs) {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	for i := range lhs {
 | 
						|
		if !ingressEqual(&lhs[i], &rhs[i]) {
 | 
						|
			return false
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return true
 | 
						|
}
 | 
						|
 | 
						|
func ingressEqual(lhs, rhs *v1.LoadBalancerIngress) bool {
 | 
						|
	if lhs.IP != rhs.IP {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	if lhs.Hostname != rhs.Hostname {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	return true
 | 
						|
}
 | 
						|
 | 
						|
// TODO: make method on LoadBalancerStatus?
 | 
						|
func LoadBalancerStatusDeepCopy(lb *v1.LoadBalancerStatus) *v1.LoadBalancerStatus {
 | 
						|
	c := &v1.LoadBalancerStatus{}
 | 
						|
	c.Ingress = make([]v1.LoadBalancerIngress, len(lb.Ingress))
 | 
						|
	for i := range lb.Ingress {
 | 
						|
		c.Ingress[i] = lb.Ingress[i]
 | 
						|
	}
 | 
						|
	return c
 | 
						|
}
 | 
						|
 | 
						|
// GetAccessModesAsString returns a string representation of an array of access modes.
 | 
						|
// modes, when present, are always in the same order: RWO,ROX,RWX.
 | 
						|
func GetAccessModesAsString(modes []v1.PersistentVolumeAccessMode) string {
 | 
						|
	modes = removeDuplicateAccessModes(modes)
 | 
						|
	modesStr := []string{}
 | 
						|
	if containsAccessMode(modes, v1.ReadWriteOnce) {
 | 
						|
		modesStr = append(modesStr, "RWO")
 | 
						|
	}
 | 
						|
	if containsAccessMode(modes, v1.ReadOnlyMany) {
 | 
						|
		modesStr = append(modesStr, "ROX")
 | 
						|
	}
 | 
						|
	if containsAccessMode(modes, v1.ReadWriteMany) {
 | 
						|
		modesStr = append(modesStr, "RWX")
 | 
						|
	}
 | 
						|
	return strings.Join(modesStr, ",")
 | 
						|
}
 | 
						|
 | 
						|
// GetAccessModesAsString returns an array of AccessModes from a string created by GetAccessModesAsString
 | 
						|
func GetAccessModesFromString(modes string) []v1.PersistentVolumeAccessMode {
 | 
						|
	strmodes := strings.Split(modes, ",")
 | 
						|
	accessModes := []v1.PersistentVolumeAccessMode{}
 | 
						|
	for _, s := range strmodes {
 | 
						|
		s = strings.Trim(s, " ")
 | 
						|
		switch {
 | 
						|
		case s == "RWO":
 | 
						|
			accessModes = append(accessModes, v1.ReadWriteOnce)
 | 
						|
		case s == "ROX":
 | 
						|
			accessModes = append(accessModes, v1.ReadOnlyMany)
 | 
						|
		case s == "RWX":
 | 
						|
			accessModes = append(accessModes, v1.ReadWriteMany)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return accessModes
 | 
						|
}
 | 
						|
 | 
						|
// removeDuplicateAccessModes returns an array of access modes without any duplicates
 | 
						|
func removeDuplicateAccessModes(modes []v1.PersistentVolumeAccessMode) []v1.PersistentVolumeAccessMode {
 | 
						|
	accessModes := []v1.PersistentVolumeAccessMode{}
 | 
						|
	for _, m := range modes {
 | 
						|
		if !containsAccessMode(accessModes, m) {
 | 
						|
			accessModes = append(accessModes, m)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return accessModes
 | 
						|
}
 | 
						|
 | 
						|
func containsAccessMode(modes []v1.PersistentVolumeAccessMode, mode v1.PersistentVolumeAccessMode) bool {
 | 
						|
	for _, m := range modes {
 | 
						|
		if m == mode {
 | 
						|
			return true
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return false
 | 
						|
}
 | 
						|
 | 
						|
// NodeSelectorRequirementsAsSelector converts the []NodeSelectorRequirement api type into a struct that implements
 | 
						|
// labels.Selector.
 | 
						|
func NodeSelectorRequirementsAsSelector(nsm []v1.NodeSelectorRequirement) (labels.Selector, error) {
 | 
						|
	if len(nsm) == 0 {
 | 
						|
		return labels.Nothing(), nil
 | 
						|
	}
 | 
						|
	selector := labels.NewSelector()
 | 
						|
	for _, expr := range nsm {
 | 
						|
		var op selection.Operator
 | 
						|
		switch expr.Operator {
 | 
						|
		case v1.NodeSelectorOpIn:
 | 
						|
			op = selection.In
 | 
						|
		case v1.NodeSelectorOpNotIn:
 | 
						|
			op = selection.NotIn
 | 
						|
		case v1.NodeSelectorOpExists:
 | 
						|
			op = selection.Exists
 | 
						|
		case v1.NodeSelectorOpDoesNotExist:
 | 
						|
			op = selection.DoesNotExist
 | 
						|
		case v1.NodeSelectorOpGt:
 | 
						|
			op = selection.GreaterThan
 | 
						|
		case v1.NodeSelectorOpLt:
 | 
						|
			op = selection.LessThan
 | 
						|
		default:
 | 
						|
			return nil, fmt.Errorf("%q is not a valid node selector operator", expr.Operator)
 | 
						|
		}
 | 
						|
		r, err := labels.NewRequirement(expr.Key, op, expr.Values)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		selector = selector.Add(*r)
 | 
						|
	}
 | 
						|
	return selector, nil
 | 
						|
}
 | 
						|
 | 
						|
// NodeSelectorRequirementsAsFieldSelector converts the []NodeSelectorRequirement core type into a struct that implements
 | 
						|
// fields.Selector.
 | 
						|
func NodeSelectorRequirementsAsFieldSelector(nsm []v1.NodeSelectorRequirement) (fields.Selector, error) {
 | 
						|
	if len(nsm) == 0 {
 | 
						|
		return fields.Nothing(), nil
 | 
						|
	}
 | 
						|
 | 
						|
	selectors := []fields.Selector{}
 | 
						|
	for _, expr := range nsm {
 | 
						|
		switch expr.Operator {
 | 
						|
		case v1.NodeSelectorOpIn:
 | 
						|
			if len(expr.Values) != 1 {
 | 
						|
				return nil, fmt.Errorf("unexpected number of value (%d) for node field selector operator %q",
 | 
						|
					len(expr.Values), expr.Operator)
 | 
						|
			}
 | 
						|
			selectors = append(selectors, fields.OneTermEqualSelector(expr.Key, expr.Values[0]))
 | 
						|
 | 
						|
		case v1.NodeSelectorOpNotIn:
 | 
						|
			if len(expr.Values) != 1 {
 | 
						|
				return nil, fmt.Errorf("unexpected number of value (%d) for node field selector operator %q",
 | 
						|
					len(expr.Values), expr.Operator)
 | 
						|
			}
 | 
						|
			selectors = append(selectors, fields.OneTermNotEqualSelector(expr.Key, expr.Values[0]))
 | 
						|
 | 
						|
		default:
 | 
						|
			return nil, fmt.Errorf("%q is not a valid node field selector operator", expr.Operator)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return fields.AndSelectors(selectors...), nil
 | 
						|
}
 | 
						|
 | 
						|
// NodeSelectorRequirementKeysExistInNodeSelectorTerms checks if a NodeSelectorTerm with key is already specified in terms
 | 
						|
func NodeSelectorRequirementKeysExistInNodeSelectorTerms(reqs []v1.NodeSelectorRequirement, terms []v1.NodeSelectorTerm) bool {
 | 
						|
	for _, req := range reqs {
 | 
						|
		for _, term := range terms {
 | 
						|
			for _, r := range term.MatchExpressions {
 | 
						|
				if r.Key == req.Key {
 | 
						|
					return true
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return false
 | 
						|
}
 | 
						|
 | 
						|
// MatchNodeSelectorTerms checks whether the node labels and fields match node selector terms in ORed;
 | 
						|
// nil or empty term matches no objects.
 | 
						|
func MatchNodeSelectorTerms(
 | 
						|
	nodeSelectorTerms []v1.NodeSelectorTerm,
 | 
						|
	nodeLabels labels.Set,
 | 
						|
	nodeFields fields.Set,
 | 
						|
) bool {
 | 
						|
	for _, req := range nodeSelectorTerms {
 | 
						|
		// nil or empty term selects no objects
 | 
						|
		if len(req.MatchExpressions) == 0 && len(req.MatchFields) == 0 {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		if len(req.MatchExpressions) != 0 {
 | 
						|
			labelSelector, err := NodeSelectorRequirementsAsSelector(req.MatchExpressions)
 | 
						|
			if err != nil || !labelSelector.Matches(nodeLabels) {
 | 
						|
				continue
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		if len(req.MatchFields) != 0 {
 | 
						|
			fieldSelector, err := NodeSelectorRequirementsAsFieldSelector(req.MatchFields)
 | 
						|
			if err != nil || !fieldSelector.Matches(nodeFields) {
 | 
						|
				continue
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		return true
 | 
						|
	}
 | 
						|
 | 
						|
	return false
 | 
						|
}
 | 
						|
 | 
						|
// TopologySelectorRequirementsAsSelector converts the []TopologySelectorLabelRequirement api type into a struct
 | 
						|
// that implements labels.Selector.
 | 
						|
func TopologySelectorRequirementsAsSelector(tsm []v1.TopologySelectorLabelRequirement) (labels.Selector, error) {
 | 
						|
	if len(tsm) == 0 {
 | 
						|
		return labels.Nothing(), nil
 | 
						|
	}
 | 
						|
 | 
						|
	selector := labels.NewSelector()
 | 
						|
	for _, expr := range tsm {
 | 
						|
		r, err := labels.NewRequirement(expr.Key, selection.In, expr.Values)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		selector = selector.Add(*r)
 | 
						|
	}
 | 
						|
 | 
						|
	return selector, nil
 | 
						|
}
 | 
						|
 | 
						|
// MatchTopologySelectorTerms checks whether given labels match topology selector terms in ORed;
 | 
						|
// nil or empty term matches no objects; while empty term list matches all objects.
 | 
						|
func MatchTopologySelectorTerms(topologySelectorTerms []v1.TopologySelectorTerm, lbls labels.Set) bool {
 | 
						|
	if len(topologySelectorTerms) == 0 {
 | 
						|
		// empty term list matches all objects
 | 
						|
		return true
 | 
						|
	}
 | 
						|
 | 
						|
	for _, req := range topologySelectorTerms {
 | 
						|
		// nil or empty term selects no objects
 | 
						|
		if len(req.MatchLabelExpressions) == 0 {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		labelSelector, err := TopologySelectorRequirementsAsSelector(req.MatchLabelExpressions)
 | 
						|
		if err != nil || !labelSelector.Matches(lbls) {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		return true
 | 
						|
	}
 | 
						|
 | 
						|
	return false
 | 
						|
}
 | 
						|
 | 
						|
// AddOrUpdateTolerationInPodSpec tries to add a toleration to the toleration list in PodSpec.
 | 
						|
// Returns true if something was updated, false otherwise.
 | 
						|
func AddOrUpdateTolerationInPodSpec(spec *v1.PodSpec, toleration *v1.Toleration) bool {
 | 
						|
	podTolerations := spec.Tolerations
 | 
						|
 | 
						|
	var newTolerations []v1.Toleration
 | 
						|
	updated := false
 | 
						|
	for i := range podTolerations {
 | 
						|
		if toleration.MatchToleration(&podTolerations[i]) {
 | 
						|
			if helper.Semantic.DeepEqual(toleration, podTolerations[i]) {
 | 
						|
				return false
 | 
						|
			}
 | 
						|
			newTolerations = append(newTolerations, *toleration)
 | 
						|
			updated = true
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		newTolerations = append(newTolerations, podTolerations[i])
 | 
						|
	}
 | 
						|
 | 
						|
	if !updated {
 | 
						|
		newTolerations = append(newTolerations, *toleration)
 | 
						|
	}
 | 
						|
 | 
						|
	spec.Tolerations = newTolerations
 | 
						|
	return true
 | 
						|
}
 | 
						|
 | 
						|
// AddOrUpdateTolerationInPod tries to add a toleration to the pod's toleration list.
 | 
						|
// Returns true if something was updated, false otherwise.
 | 
						|
func AddOrUpdateTolerationInPod(pod *v1.Pod, toleration *v1.Toleration) bool {
 | 
						|
	return AddOrUpdateTolerationInPodSpec(&pod.Spec, toleration)
 | 
						|
}
 | 
						|
 | 
						|
// TolerationsTolerateTaint checks if taint is tolerated by any of the tolerations.
 | 
						|
func TolerationsTolerateTaint(tolerations []v1.Toleration, taint *v1.Taint) bool {
 | 
						|
	for i := range tolerations {
 | 
						|
		if tolerations[i].ToleratesTaint(taint) {
 | 
						|
			return true
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return false
 | 
						|
}
 | 
						|
 | 
						|
type taintsFilterFunc func(*v1.Taint) bool
 | 
						|
 | 
						|
// TolerationsTolerateTaintsWithFilter checks if given tolerations tolerates
 | 
						|
// all the taints that apply to the filter in given taint list.
 | 
						|
func TolerationsTolerateTaintsWithFilter(tolerations []v1.Toleration, taints []v1.Taint, applyFilter taintsFilterFunc) bool {
 | 
						|
	if len(taints) == 0 {
 | 
						|
		return true
 | 
						|
	}
 | 
						|
 | 
						|
	for i := range taints {
 | 
						|
		if applyFilter != nil && !applyFilter(&taints[i]) {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		if !TolerationsTolerateTaint(tolerations, &taints[i]) {
 | 
						|
			return false
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return true
 | 
						|
}
 | 
						|
 | 
						|
// Returns true and list of Tolerations matching all Taints if all are tolerated, or false otherwise.
 | 
						|
func GetMatchingTolerations(taints []v1.Taint, tolerations []v1.Toleration) (bool, []v1.Toleration) {
 | 
						|
	if len(taints) == 0 {
 | 
						|
		return true, []v1.Toleration{}
 | 
						|
	}
 | 
						|
	if len(tolerations) == 0 && len(taints) > 0 {
 | 
						|
		return false, []v1.Toleration{}
 | 
						|
	}
 | 
						|
	result := []v1.Toleration{}
 | 
						|
	for i := range taints {
 | 
						|
		tolerated := false
 | 
						|
		for j := range tolerations {
 | 
						|
			if tolerations[j].ToleratesTaint(&taints[i]) {
 | 
						|
				result = append(result, tolerations[j])
 | 
						|
				tolerated = true
 | 
						|
				break
 | 
						|
			}
 | 
						|
		}
 | 
						|
		if !tolerated {
 | 
						|
			return false, []v1.Toleration{}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return true, result
 | 
						|
}
 | 
						|
 | 
						|
func GetAvoidPodsFromNodeAnnotations(annotations map[string]string) (v1.AvoidPods, error) {
 | 
						|
	var avoidPods v1.AvoidPods
 | 
						|
	if len(annotations) > 0 && annotations[v1.PreferAvoidPodsAnnotationKey] != "" {
 | 
						|
		err := json.Unmarshal([]byte(annotations[v1.PreferAvoidPodsAnnotationKey]), &avoidPods)
 | 
						|
		if err != nil {
 | 
						|
			return avoidPods, err
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return avoidPods, nil
 | 
						|
}
 | 
						|
 | 
						|
// GetPersistentVolumeClass returns StorageClassName.
 | 
						|
func GetPersistentVolumeClass(volume *v1.PersistentVolume) string {
 | 
						|
	// Use beta annotation first
 | 
						|
	if class, found := volume.Annotations[v1.BetaStorageClassAnnotation]; found {
 | 
						|
		return class
 | 
						|
	}
 | 
						|
 | 
						|
	return volume.Spec.StorageClassName
 | 
						|
}
 | 
						|
 | 
						|
// GetPersistentVolumeClaimClass returns StorageClassName. If no storage class was
 | 
						|
// requested, it returns "".
 | 
						|
func GetPersistentVolumeClaimClass(claim *v1.PersistentVolumeClaim) string {
 | 
						|
	// Use beta annotation first
 | 
						|
	if class, found := claim.Annotations[v1.BetaStorageClassAnnotation]; found {
 | 
						|
		return class
 | 
						|
	}
 | 
						|
 | 
						|
	if claim.Spec.StorageClassName != nil {
 | 
						|
		return *claim.Spec.StorageClassName
 | 
						|
	}
 | 
						|
 | 
						|
	return ""
 | 
						|
}
 | 
						|
 | 
						|
// ScopedResourceSelectorRequirementsAsSelector converts the ScopedResourceSelectorRequirement api type into a struct that implements
 | 
						|
// labels.Selector.
 | 
						|
func ScopedResourceSelectorRequirementsAsSelector(ssr v1.ScopedResourceSelectorRequirement) (labels.Selector, error) {
 | 
						|
	selector := labels.NewSelector()
 | 
						|
	var op selection.Operator
 | 
						|
	switch ssr.Operator {
 | 
						|
	case v1.ScopeSelectorOpIn:
 | 
						|
		op = selection.In
 | 
						|
	case v1.ScopeSelectorOpNotIn:
 | 
						|
		op = selection.NotIn
 | 
						|
	case v1.ScopeSelectorOpExists:
 | 
						|
		op = selection.Exists
 | 
						|
	case v1.ScopeSelectorOpDoesNotExist:
 | 
						|
		op = selection.DoesNotExist
 | 
						|
	default:
 | 
						|
		return nil, fmt.Errorf("%q is not a valid scope selector operator", ssr.Operator)
 | 
						|
	}
 | 
						|
	r, err := labels.NewRequirement(string(ssr.ScopeName), op, ssr.Values)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	selector = selector.Add(*r)
 | 
						|
	return selector, nil
 | 
						|
}
 |