mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-02 19:28:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			457 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			457 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2016 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package statefulset
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"reflect"
 | 
						|
	"time"
 | 
						|
 | 
						|
	apps "k8s.io/api/apps/v1"
 | 
						|
	"k8s.io/api/core/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/labels"
 | 
						|
	utilruntime "k8s.io/apimachinery/pkg/util/runtime"
 | 
						|
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						|
	appsinformers "k8s.io/client-go/informers/apps/v1"
 | 
						|
	coreinformers "k8s.io/client-go/informers/core/v1"
 | 
						|
	clientset "k8s.io/client-go/kubernetes"
 | 
						|
	"k8s.io/client-go/kubernetes/scheme"
 | 
						|
	v1core "k8s.io/client-go/kubernetes/typed/core/v1"
 | 
						|
	appslisters "k8s.io/client-go/listers/apps/v1"
 | 
						|
	corelisters "k8s.io/client-go/listers/core/v1"
 | 
						|
	"k8s.io/client-go/tools/cache"
 | 
						|
	"k8s.io/client-go/tools/record"
 | 
						|
	"k8s.io/client-go/util/workqueue"
 | 
						|
	"k8s.io/kubernetes/pkg/controller"
 | 
						|
	"k8s.io/kubernetes/pkg/controller/history"
 | 
						|
 | 
						|
	"k8s.io/klog"
 | 
						|
)
 | 
						|
 | 
						|
// controllerKind contains the schema.GroupVersionKind for this controller type.
 | 
						|
var controllerKind = apps.SchemeGroupVersion.WithKind("StatefulSet")
 | 
						|
 | 
						|
// StatefulSetController controls statefulsets.
 | 
						|
type StatefulSetController struct {
 | 
						|
	// client interface
 | 
						|
	kubeClient clientset.Interface
 | 
						|
	// control returns an interface capable of syncing a stateful set.
 | 
						|
	// Abstracted out for testing.
 | 
						|
	control StatefulSetControlInterface
 | 
						|
	// podControl is used for patching pods.
 | 
						|
	podControl controller.PodControlInterface
 | 
						|
	// podLister is able to list/get pods from a shared informer's store
 | 
						|
	podLister corelisters.PodLister
 | 
						|
	// podListerSynced returns true if the pod shared informer has synced at least once
 | 
						|
	podListerSynced cache.InformerSynced
 | 
						|
	// setLister is able to list/get stateful sets from a shared informer's store
 | 
						|
	setLister appslisters.StatefulSetLister
 | 
						|
	// setListerSynced returns true if the stateful set shared informer has synced at least once
 | 
						|
	setListerSynced cache.InformerSynced
 | 
						|
	// pvcListerSynced returns true if the pvc shared informer has synced at least once
 | 
						|
	pvcListerSynced cache.InformerSynced
 | 
						|
	// revListerSynced returns true if the rev shared informer has synced at least once
 | 
						|
	revListerSynced cache.InformerSynced
 | 
						|
	// StatefulSets that need to be synced.
 | 
						|
	queue workqueue.RateLimitingInterface
 | 
						|
}
 | 
						|
 | 
						|
// NewStatefulSetController creates a new statefulset controller.
 | 
						|
func NewStatefulSetController(
 | 
						|
	podInformer coreinformers.PodInformer,
 | 
						|
	setInformer appsinformers.StatefulSetInformer,
 | 
						|
	pvcInformer coreinformers.PersistentVolumeClaimInformer,
 | 
						|
	revInformer appsinformers.ControllerRevisionInformer,
 | 
						|
	kubeClient clientset.Interface,
 | 
						|
) *StatefulSetController {
 | 
						|
	eventBroadcaster := record.NewBroadcaster()
 | 
						|
	eventBroadcaster.StartLogging(klog.Infof)
 | 
						|
	eventBroadcaster.StartRecordingToSink(&v1core.EventSinkImpl{Interface: kubeClient.CoreV1().Events("")})
 | 
						|
	recorder := eventBroadcaster.NewRecorder(scheme.Scheme, v1.EventSource{Component: "statefulset-controller"})
 | 
						|
 | 
						|
	ssc := &StatefulSetController{
 | 
						|
		kubeClient: kubeClient,
 | 
						|
		control: NewDefaultStatefulSetControl(
 | 
						|
			NewRealStatefulPodControl(
 | 
						|
				kubeClient,
 | 
						|
				setInformer.Lister(),
 | 
						|
				podInformer.Lister(),
 | 
						|
				pvcInformer.Lister(),
 | 
						|
				recorder),
 | 
						|
			NewRealStatefulSetStatusUpdater(kubeClient, setInformer.Lister()),
 | 
						|
			history.NewHistory(kubeClient, revInformer.Lister()),
 | 
						|
			recorder,
 | 
						|
		),
 | 
						|
		pvcListerSynced: pvcInformer.Informer().HasSynced,
 | 
						|
		queue:           workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), "statefulset"),
 | 
						|
		podControl:      controller.RealPodControl{KubeClient: kubeClient, Recorder: recorder},
 | 
						|
 | 
						|
		revListerSynced: revInformer.Informer().HasSynced,
 | 
						|
	}
 | 
						|
 | 
						|
	podInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
 | 
						|
		// lookup the statefulset and enqueue
 | 
						|
		AddFunc: ssc.addPod,
 | 
						|
		// lookup current and old statefulset if labels changed
 | 
						|
		UpdateFunc: ssc.updatePod,
 | 
						|
		// lookup statefulset accounting for deletion tombstones
 | 
						|
		DeleteFunc: ssc.deletePod,
 | 
						|
	})
 | 
						|
	ssc.podLister = podInformer.Lister()
 | 
						|
	ssc.podListerSynced = podInformer.Informer().HasSynced
 | 
						|
 | 
						|
	setInformer.Informer().AddEventHandler(
 | 
						|
		cache.ResourceEventHandlerFuncs{
 | 
						|
			AddFunc: ssc.enqueueStatefulSet,
 | 
						|
			UpdateFunc: func(old, cur interface{}) {
 | 
						|
				oldPS := old.(*apps.StatefulSet)
 | 
						|
				curPS := cur.(*apps.StatefulSet)
 | 
						|
				if oldPS.Status.Replicas != curPS.Status.Replicas {
 | 
						|
					klog.V(4).Infof("Observed updated replica count for StatefulSet: %v, %d->%d", curPS.Name, oldPS.Status.Replicas, curPS.Status.Replicas)
 | 
						|
				}
 | 
						|
				ssc.enqueueStatefulSet(cur)
 | 
						|
			},
 | 
						|
			DeleteFunc: ssc.enqueueStatefulSet,
 | 
						|
		},
 | 
						|
	)
 | 
						|
	ssc.setLister = setInformer.Lister()
 | 
						|
	ssc.setListerSynced = setInformer.Informer().HasSynced
 | 
						|
 | 
						|
	// TODO: Watch volumes
 | 
						|
	return ssc
 | 
						|
}
 | 
						|
 | 
						|
// Run runs the statefulset controller.
 | 
						|
func (ssc *StatefulSetController) Run(workers int, stopCh <-chan struct{}) {
 | 
						|
	defer utilruntime.HandleCrash()
 | 
						|
	defer ssc.queue.ShutDown()
 | 
						|
 | 
						|
	klog.Infof("Starting stateful set controller")
 | 
						|
	defer klog.Infof("Shutting down statefulset controller")
 | 
						|
 | 
						|
	if !cache.WaitForNamedCacheSync("stateful set", stopCh, ssc.podListerSynced, ssc.setListerSynced, ssc.pvcListerSynced, ssc.revListerSynced) {
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	for i := 0; i < workers; i++ {
 | 
						|
		go wait.Until(ssc.worker, time.Second, stopCh)
 | 
						|
	}
 | 
						|
 | 
						|
	<-stopCh
 | 
						|
}
 | 
						|
 | 
						|
// addPod adds the statefulset for the pod to the sync queue
 | 
						|
func (ssc *StatefulSetController) addPod(obj interface{}) {
 | 
						|
	pod := obj.(*v1.Pod)
 | 
						|
 | 
						|
	if pod.DeletionTimestamp != nil {
 | 
						|
		// on a restart of the controller manager, it's possible a new pod shows up in a state that
 | 
						|
		// is already pending deletion. Prevent the pod from being a creation observation.
 | 
						|
		ssc.deletePod(pod)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	// If it has a ControllerRef, that's all that matters.
 | 
						|
	if controllerRef := metav1.GetControllerOf(pod); controllerRef != nil {
 | 
						|
		set := ssc.resolveControllerRef(pod.Namespace, controllerRef)
 | 
						|
		if set == nil {
 | 
						|
			return
 | 
						|
		}
 | 
						|
		klog.V(4).Infof("Pod %s created, labels: %+v", pod.Name, pod.Labels)
 | 
						|
		ssc.enqueueStatefulSet(set)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	// Otherwise, it's an orphan. Get a list of all matching controllers and sync
 | 
						|
	// them to see if anyone wants to adopt it.
 | 
						|
	sets := ssc.getStatefulSetsForPod(pod)
 | 
						|
	if len(sets) == 0 {
 | 
						|
		return
 | 
						|
	}
 | 
						|
	klog.V(4).Infof("Orphan Pod %s created, labels: %+v", pod.Name, pod.Labels)
 | 
						|
	for _, set := range sets {
 | 
						|
		ssc.enqueueStatefulSet(set)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// updatePod adds the statefulset for the current and old pods to the sync queue.
 | 
						|
func (ssc *StatefulSetController) updatePod(old, cur interface{}) {
 | 
						|
	curPod := cur.(*v1.Pod)
 | 
						|
	oldPod := old.(*v1.Pod)
 | 
						|
	if curPod.ResourceVersion == oldPod.ResourceVersion {
 | 
						|
		// In the event of a re-list we may receive update events for all known pods.
 | 
						|
		// Two different versions of the same pod will always have different RVs.
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	labelChanged := !reflect.DeepEqual(curPod.Labels, oldPod.Labels)
 | 
						|
 | 
						|
	curControllerRef := metav1.GetControllerOf(curPod)
 | 
						|
	oldControllerRef := metav1.GetControllerOf(oldPod)
 | 
						|
	controllerRefChanged := !reflect.DeepEqual(curControllerRef, oldControllerRef)
 | 
						|
	if controllerRefChanged && oldControllerRef != nil {
 | 
						|
		// The ControllerRef was changed. Sync the old controller, if any.
 | 
						|
		if set := ssc.resolveControllerRef(oldPod.Namespace, oldControllerRef); set != nil {
 | 
						|
			ssc.enqueueStatefulSet(set)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// If it has a ControllerRef, that's all that matters.
 | 
						|
	if curControllerRef != nil {
 | 
						|
		set := ssc.resolveControllerRef(curPod.Namespace, curControllerRef)
 | 
						|
		if set == nil {
 | 
						|
			return
 | 
						|
		}
 | 
						|
		klog.V(4).Infof("Pod %s updated, objectMeta %+v -> %+v.", curPod.Name, oldPod.ObjectMeta, curPod.ObjectMeta)
 | 
						|
		ssc.enqueueStatefulSet(set)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	// Otherwise, it's an orphan. If anything changed, sync matching controllers
 | 
						|
	// to see if anyone wants to adopt it now.
 | 
						|
	if labelChanged || controllerRefChanged {
 | 
						|
		sets := ssc.getStatefulSetsForPod(curPod)
 | 
						|
		if len(sets) == 0 {
 | 
						|
			return
 | 
						|
		}
 | 
						|
		klog.V(4).Infof("Orphan Pod %s updated, objectMeta %+v -> %+v.", curPod.Name, oldPod.ObjectMeta, curPod.ObjectMeta)
 | 
						|
		for _, set := range sets {
 | 
						|
			ssc.enqueueStatefulSet(set)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// deletePod enqueues the statefulset for the pod accounting for deletion tombstones.
 | 
						|
func (ssc *StatefulSetController) deletePod(obj interface{}) {
 | 
						|
	pod, ok := obj.(*v1.Pod)
 | 
						|
 | 
						|
	// When a delete is dropped, the relist will notice a pod in the store not
 | 
						|
	// in the list, leading to the insertion of a tombstone object which contains
 | 
						|
	// the deleted key/value. Note that this value might be stale.
 | 
						|
	if !ok {
 | 
						|
		tombstone, ok := obj.(cache.DeletedFinalStateUnknown)
 | 
						|
		if !ok {
 | 
						|
			utilruntime.HandleError(fmt.Errorf("couldn't get object from tombstone %+v", obj))
 | 
						|
			return
 | 
						|
		}
 | 
						|
		pod, ok = tombstone.Obj.(*v1.Pod)
 | 
						|
		if !ok {
 | 
						|
			utilruntime.HandleError(fmt.Errorf("tombstone contained object that is not a pod %+v", obj))
 | 
						|
			return
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	controllerRef := metav1.GetControllerOf(pod)
 | 
						|
	if controllerRef == nil {
 | 
						|
		// No controller should care about orphans being deleted.
 | 
						|
		return
 | 
						|
	}
 | 
						|
	set := ssc.resolveControllerRef(pod.Namespace, controllerRef)
 | 
						|
	if set == nil {
 | 
						|
		return
 | 
						|
	}
 | 
						|
	klog.V(4).Infof("Pod %s/%s deleted through %v.", pod.Namespace, pod.Name, utilruntime.GetCaller())
 | 
						|
	ssc.enqueueStatefulSet(set)
 | 
						|
}
 | 
						|
 | 
						|
// getPodsForStatefulSet returns the Pods that a given StatefulSet should manage.
 | 
						|
// It also reconciles ControllerRef by adopting/orphaning.
 | 
						|
//
 | 
						|
// NOTE: Returned Pods are pointers to objects from the cache.
 | 
						|
//       If you need to modify one, you need to copy it first.
 | 
						|
func (ssc *StatefulSetController) getPodsForStatefulSet(set *apps.StatefulSet, selector labels.Selector) ([]*v1.Pod, error) {
 | 
						|
	// List all pods to include the pods that don't match the selector anymore but
 | 
						|
	// has a ControllerRef pointing to this StatefulSet.
 | 
						|
	pods, err := ssc.podLister.Pods(set.Namespace).List(labels.Everything())
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	filter := func(pod *v1.Pod) bool {
 | 
						|
		// Only claim if it matches our StatefulSet name. Otherwise release/ignore.
 | 
						|
		return isMemberOf(set, pod)
 | 
						|
	}
 | 
						|
 | 
						|
	// If any adoptions are attempted, we should first recheck for deletion with
 | 
						|
	// an uncached quorum read sometime after listing Pods (see #42639).
 | 
						|
	canAdoptFunc := controller.RecheckDeletionTimestamp(func() (metav1.Object, error) {
 | 
						|
		fresh, err := ssc.kubeClient.AppsV1().StatefulSets(set.Namespace).Get(set.Name, metav1.GetOptions{})
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		if fresh.UID != set.UID {
 | 
						|
			return nil, fmt.Errorf("original StatefulSet %v/%v is gone: got uid %v, wanted %v", set.Namespace, set.Name, fresh.UID, set.UID)
 | 
						|
		}
 | 
						|
		return fresh, nil
 | 
						|
	})
 | 
						|
 | 
						|
	cm := controller.NewPodControllerRefManager(ssc.podControl, set, selector, controllerKind, canAdoptFunc)
 | 
						|
	return cm.ClaimPods(pods, filter)
 | 
						|
}
 | 
						|
 | 
						|
// adoptOrphanRevisions adopts any orphaned ControllerRevisions matched by set's Selector.
 | 
						|
func (ssc *StatefulSetController) adoptOrphanRevisions(set *apps.StatefulSet) error {
 | 
						|
	revisions, err := ssc.control.ListRevisions(set)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	hasOrphans := false
 | 
						|
	for i := range revisions {
 | 
						|
		if metav1.GetControllerOf(revisions[i]) == nil {
 | 
						|
			hasOrphans = true
 | 
						|
			break
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if hasOrphans {
 | 
						|
		fresh, err := ssc.kubeClient.AppsV1().StatefulSets(set.Namespace).Get(set.Name, metav1.GetOptions{})
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		if fresh.UID != set.UID {
 | 
						|
			return fmt.Errorf("original StatefulSet %v/%v is gone: got uid %v, wanted %v", set.Namespace, set.Name, fresh.UID, set.UID)
 | 
						|
		}
 | 
						|
		return ssc.control.AdoptOrphanRevisions(set, revisions)
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// getStatefulSetsForPod returns a list of StatefulSets that potentially match
 | 
						|
// a given pod.
 | 
						|
func (ssc *StatefulSetController) getStatefulSetsForPod(pod *v1.Pod) []*apps.StatefulSet {
 | 
						|
	sets, err := ssc.setLister.GetPodStatefulSets(pod)
 | 
						|
	if err != nil {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	// More than one set is selecting the same Pod
 | 
						|
	if len(sets) > 1 {
 | 
						|
		// ControllerRef will ensure we don't do anything crazy, but more than one
 | 
						|
		// item in this list nevertheless constitutes user error.
 | 
						|
		utilruntime.HandleError(
 | 
						|
			fmt.Errorf(
 | 
						|
				"user error: more than one StatefulSet is selecting pods with labels: %+v",
 | 
						|
				pod.Labels))
 | 
						|
	}
 | 
						|
	return sets
 | 
						|
}
 | 
						|
 | 
						|
// resolveControllerRef returns the controller referenced by a ControllerRef,
 | 
						|
// or nil if the ControllerRef could not be resolved to a matching controller
 | 
						|
// of the correct Kind.
 | 
						|
func (ssc *StatefulSetController) resolveControllerRef(namespace string, controllerRef *metav1.OwnerReference) *apps.StatefulSet {
 | 
						|
	// We can't look up by UID, so look up by Name and then verify UID.
 | 
						|
	// Don't even try to look up by Name if it's the wrong Kind.
 | 
						|
	if controllerRef.Kind != controllerKind.Kind {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	set, err := ssc.setLister.StatefulSets(namespace).Get(controllerRef.Name)
 | 
						|
	if err != nil {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	if set.UID != controllerRef.UID {
 | 
						|
		// The controller we found with this Name is not the same one that the
 | 
						|
		// ControllerRef points to.
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	return set
 | 
						|
}
 | 
						|
 | 
						|
// enqueueStatefulSet enqueues the given statefulset in the work queue.
 | 
						|
func (ssc *StatefulSetController) enqueueStatefulSet(obj interface{}) {
 | 
						|
	key, err := controller.KeyFunc(obj)
 | 
						|
	if err != nil {
 | 
						|
		utilruntime.HandleError(fmt.Errorf("Couldn't get key for object %+v: %v", obj, err))
 | 
						|
		return
 | 
						|
	}
 | 
						|
	ssc.queue.Add(key)
 | 
						|
}
 | 
						|
 | 
						|
// processNextWorkItem dequeues items, processes them, and marks them done. It enforces that the syncHandler is never
 | 
						|
// invoked concurrently with the same key.
 | 
						|
func (ssc *StatefulSetController) processNextWorkItem() bool {
 | 
						|
	key, quit := ssc.queue.Get()
 | 
						|
	if quit {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	defer ssc.queue.Done(key)
 | 
						|
	if err := ssc.sync(key.(string)); err != nil {
 | 
						|
		utilruntime.HandleError(fmt.Errorf("Error syncing StatefulSet %v, requeuing: %v", key.(string), err))
 | 
						|
		ssc.queue.AddRateLimited(key)
 | 
						|
	} else {
 | 
						|
		ssc.queue.Forget(key)
 | 
						|
	}
 | 
						|
	return true
 | 
						|
}
 | 
						|
 | 
						|
// worker runs a worker goroutine that invokes processNextWorkItem until the controller's queue is closed
 | 
						|
func (ssc *StatefulSetController) worker() {
 | 
						|
	for ssc.processNextWorkItem() {
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// sync syncs the given statefulset.
 | 
						|
func (ssc *StatefulSetController) sync(key string) error {
 | 
						|
	startTime := time.Now()
 | 
						|
	defer func() {
 | 
						|
		klog.V(4).Infof("Finished syncing statefulset %q (%v)", key, time.Since(startTime))
 | 
						|
	}()
 | 
						|
 | 
						|
	namespace, name, err := cache.SplitMetaNamespaceKey(key)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	set, err := ssc.setLister.StatefulSets(namespace).Get(name)
 | 
						|
	if errors.IsNotFound(err) {
 | 
						|
		klog.Infof("StatefulSet has been deleted %v", key)
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	if err != nil {
 | 
						|
		utilruntime.HandleError(fmt.Errorf("unable to retrieve StatefulSet %v from store: %v", key, err))
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	selector, err := metav1.LabelSelectorAsSelector(set.Spec.Selector)
 | 
						|
	if err != nil {
 | 
						|
		utilruntime.HandleError(fmt.Errorf("error converting StatefulSet %v selector: %v", key, err))
 | 
						|
		// This is a non-transient error, so don't retry.
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	if err := ssc.adoptOrphanRevisions(set); err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	pods, err := ssc.getPodsForStatefulSet(set, selector)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	return ssc.syncStatefulSet(set, pods)
 | 
						|
}
 | 
						|
 | 
						|
// syncStatefulSet syncs a tuple of (statefulset, []*v1.Pod).
 | 
						|
func (ssc *StatefulSetController) syncStatefulSet(set *apps.StatefulSet, pods []*v1.Pod) error {
 | 
						|
	klog.V(4).Infof("Syncing StatefulSet %v/%v with %d pods", set.Namespace, set.Name, len(pods))
 | 
						|
	// TODO: investigate where we mutate the set during the update as it is not obvious.
 | 
						|
	if err := ssc.control.UpdateStatefulSet(set.DeepCopy(), pods); err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	klog.V(4).Infof("Successfully synced StatefulSet %s/%s successful", set.Namespace, set.Name)
 | 
						|
	return nil
 | 
						|
}
 |