mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			499 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			499 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2014 The Kubernetes Authors All rights reserved.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package api
 | 
						|
 | 
						|
import (
 | 
						|
	"crypto/md5"
 | 
						|
	"encoding/json"
 | 
						|
	"fmt"
 | 
						|
	"reflect"
 | 
						|
	"strings"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"k8s.io/kubernetes/pkg/api/resource"
 | 
						|
	"k8s.io/kubernetes/pkg/api/unversioned"
 | 
						|
	"k8s.io/kubernetes/pkg/conversion"
 | 
						|
	"k8s.io/kubernetes/pkg/fields"
 | 
						|
	"k8s.io/kubernetes/pkg/labels"
 | 
						|
	"k8s.io/kubernetes/pkg/runtime"
 | 
						|
	"k8s.io/kubernetes/pkg/types"
 | 
						|
	"k8s.io/kubernetes/pkg/util/sets"
 | 
						|
 | 
						|
	"github.com/davecgh/go-spew/spew"
 | 
						|
)
 | 
						|
 | 
						|
// Conversion error conveniently packages up errors in conversions.
 | 
						|
type ConversionError struct {
 | 
						|
	In, Out interface{}
 | 
						|
	Message string
 | 
						|
}
 | 
						|
 | 
						|
// Return a helpful string about the error
 | 
						|
func (c *ConversionError) Error() string {
 | 
						|
	return spew.Sprintf(
 | 
						|
		"Conversion error: %s. (in: %v(%+v) out: %v)",
 | 
						|
		c.Message, reflect.TypeOf(c.In), c.In, reflect.TypeOf(c.Out),
 | 
						|
	)
 | 
						|
}
 | 
						|
 | 
						|
// Semantic can do semantic deep equality checks for api objects.
 | 
						|
// Example: api.Semantic.DeepEqual(aPod, aPodWithNonNilButEmptyMaps) == true
 | 
						|
var Semantic = conversion.EqualitiesOrDie(
 | 
						|
	func(a, b resource.Quantity) bool {
 | 
						|
		// Ignore formatting, only care that numeric value stayed the same.
 | 
						|
		// TODO: if we decide it's important, it should be safe to start comparing the format.
 | 
						|
		//
 | 
						|
		// Uninitialized quantities are equivalent to 0 quantities.
 | 
						|
		return a.Cmp(b) == 0
 | 
						|
	},
 | 
						|
	func(a, b unversioned.Time) bool {
 | 
						|
		return a.UTC() == b.UTC()
 | 
						|
	},
 | 
						|
	func(a, b labels.Selector) bool {
 | 
						|
		return a.String() == b.String()
 | 
						|
	},
 | 
						|
	func(a, b fields.Selector) bool {
 | 
						|
		return a.String() == b.String()
 | 
						|
	},
 | 
						|
)
 | 
						|
 | 
						|
var standardResourceQuotaScopes = sets.NewString(
 | 
						|
	string(ResourceQuotaScopeTerminating),
 | 
						|
	string(ResourceQuotaScopeNotTerminating),
 | 
						|
	string(ResourceQuotaScopeBestEffort),
 | 
						|
	string(ResourceQuotaScopeNotBestEffort),
 | 
						|
)
 | 
						|
 | 
						|
// IsStandardResourceQuotaScope returns true if the scope is a standard value
 | 
						|
func IsStandardResourceQuotaScope(str string) bool {
 | 
						|
	return standardResourceQuotaScopes.Has(str)
 | 
						|
}
 | 
						|
 | 
						|
var podObjectCountQuotaResources = sets.NewString(
 | 
						|
	string(ResourcePods),
 | 
						|
)
 | 
						|
 | 
						|
var podComputeQuotaResources = sets.NewString(
 | 
						|
	string(ResourceCPU),
 | 
						|
	string(ResourceMemory),
 | 
						|
	string(ResourceLimitsCPU),
 | 
						|
	string(ResourceLimitsMemory),
 | 
						|
	string(ResourceRequestsCPU),
 | 
						|
	string(ResourceRequestsMemory),
 | 
						|
)
 | 
						|
 | 
						|
// IsResourceQuotaScopeValidForResource returns true if the resource applies to the specified scope
 | 
						|
func IsResourceQuotaScopeValidForResource(scope ResourceQuotaScope, resource string) bool {
 | 
						|
	switch scope {
 | 
						|
	case ResourceQuotaScopeTerminating, ResourceQuotaScopeNotTerminating, ResourceQuotaScopeNotBestEffort:
 | 
						|
		return podObjectCountQuotaResources.Has(resource) || podComputeQuotaResources.Has(resource)
 | 
						|
	case ResourceQuotaScopeBestEffort:
 | 
						|
		return podObjectCountQuotaResources.Has(resource)
 | 
						|
	default:
 | 
						|
		return true
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
var standardContainerResources = sets.NewString(
 | 
						|
	string(ResourceCPU),
 | 
						|
	string(ResourceMemory),
 | 
						|
)
 | 
						|
 | 
						|
// IsStandardContainerResourceName returns true if the container can make a resource request
 | 
						|
// for the specified resource
 | 
						|
func IsStandardContainerResourceName(str string) bool {
 | 
						|
	return standardContainerResources.Has(str)
 | 
						|
}
 | 
						|
 | 
						|
var standardLimitRangeTypes = sets.NewString(
 | 
						|
	string(LimitTypePod),
 | 
						|
	string(LimitTypeContainer),
 | 
						|
)
 | 
						|
 | 
						|
// IsStandardLimitRangeType returns true if the type is Pod or Container
 | 
						|
func IsStandardLimitRangeType(str string) bool {
 | 
						|
	return standardLimitRangeTypes.Has(str)
 | 
						|
}
 | 
						|
 | 
						|
var standardQuotaResources = sets.NewString(
 | 
						|
	string(ResourceCPU),
 | 
						|
	string(ResourceMemory),
 | 
						|
	string(ResourceRequestsCPU),
 | 
						|
	string(ResourceRequestsMemory),
 | 
						|
	string(ResourceLimitsCPU),
 | 
						|
	string(ResourceLimitsMemory),
 | 
						|
	string(ResourcePods),
 | 
						|
	string(ResourceQuotas),
 | 
						|
	string(ResourceServices),
 | 
						|
	string(ResourceReplicationControllers),
 | 
						|
	string(ResourceSecrets),
 | 
						|
	string(ResourcePersistentVolumeClaims),
 | 
						|
	string(ResourceConfigMaps),
 | 
						|
	string(ResourceServicesNodePorts),
 | 
						|
	string(ResourceServicesLoadBalancers),
 | 
						|
)
 | 
						|
 | 
						|
// IsStandardQuotaResourceName returns true if the resource is known to
 | 
						|
// the quota tracking system
 | 
						|
func IsStandardQuotaResourceName(str string) bool {
 | 
						|
	return standardQuotaResources.Has(str)
 | 
						|
}
 | 
						|
 | 
						|
var standardResources = sets.NewString(
 | 
						|
	string(ResourceCPU),
 | 
						|
	string(ResourceMemory),
 | 
						|
	string(ResourceRequestsCPU),
 | 
						|
	string(ResourceRequestsMemory),
 | 
						|
	string(ResourceLimitsCPU),
 | 
						|
	string(ResourceLimitsMemory),
 | 
						|
	string(ResourcePods),
 | 
						|
	string(ResourceQuotas),
 | 
						|
	string(ResourceServices),
 | 
						|
	string(ResourceReplicationControllers),
 | 
						|
	string(ResourceSecrets),
 | 
						|
	string(ResourceConfigMaps),
 | 
						|
	string(ResourcePersistentVolumeClaims),
 | 
						|
	string(ResourceStorage),
 | 
						|
)
 | 
						|
 | 
						|
// IsStandardResourceName returns true if the resource is known to the system
 | 
						|
func IsStandardResourceName(str string) bool {
 | 
						|
	return standardResources.Has(str)
 | 
						|
}
 | 
						|
 | 
						|
var integerResources = sets.NewString(
 | 
						|
	string(ResourcePods),
 | 
						|
	string(ResourceQuotas),
 | 
						|
	string(ResourceServices),
 | 
						|
	string(ResourceReplicationControllers),
 | 
						|
	string(ResourceSecrets),
 | 
						|
	string(ResourceConfigMaps),
 | 
						|
	string(ResourcePersistentVolumeClaims),
 | 
						|
	string(ResourceServicesNodePorts),
 | 
						|
	string(ResourceServicesLoadBalancers),
 | 
						|
)
 | 
						|
 | 
						|
// IsIntegerResourceName returns true if the resource is measured in integer values
 | 
						|
func IsIntegerResourceName(str string) bool {
 | 
						|
	return integerResources.Has(str)
 | 
						|
}
 | 
						|
 | 
						|
// NewDeleteOptions returns a DeleteOptions indicating the resource should
 | 
						|
// be deleted within the specified grace period. Use zero to indicate
 | 
						|
// immediate deletion. If you would prefer to use the default grace period,
 | 
						|
// use &api.DeleteOptions{} directly.
 | 
						|
func NewDeleteOptions(grace int64) *DeleteOptions {
 | 
						|
	return &DeleteOptions{GracePeriodSeconds: &grace}
 | 
						|
}
 | 
						|
 | 
						|
// NewPreconditionDeleteOptions returns a DeleteOptions with a UID precondition set.
 | 
						|
func NewPreconditionDeleteOptions(uid string) *DeleteOptions {
 | 
						|
	u := types.UID(uid)
 | 
						|
	p := Preconditions{UID: &u}
 | 
						|
	return &DeleteOptions{Preconditions: &p}
 | 
						|
}
 | 
						|
 | 
						|
// NewUIDPreconditions returns a Preconditions with UID set.
 | 
						|
func NewUIDPreconditions(uid string) *Preconditions {
 | 
						|
	u := types.UID(uid)
 | 
						|
	return &Preconditions{UID: &u}
 | 
						|
}
 | 
						|
 | 
						|
// this function aims to check if the service's ClusterIP is set or not
 | 
						|
// the objective is not to perform validation here
 | 
						|
func IsServiceIPSet(service *Service) bool {
 | 
						|
	return service.Spec.ClusterIP != ClusterIPNone && service.Spec.ClusterIP != ""
 | 
						|
}
 | 
						|
 | 
						|
// this function aims to check if the service's cluster IP is requested or not
 | 
						|
func IsServiceIPRequested(service *Service) bool {
 | 
						|
	return service.Spec.ClusterIP == ""
 | 
						|
}
 | 
						|
 | 
						|
var standardFinalizers = sets.NewString(
 | 
						|
	string(FinalizerKubernetes),
 | 
						|
	FinalizerOrphan,
 | 
						|
)
 | 
						|
 | 
						|
func IsStandardFinalizerName(str string) bool {
 | 
						|
	return standardFinalizers.Has(str)
 | 
						|
}
 | 
						|
 | 
						|
// SingleObject returns a ListOptions for watching a single object.
 | 
						|
func SingleObject(meta ObjectMeta) ListOptions {
 | 
						|
	return ListOptions{
 | 
						|
		FieldSelector:   fields.OneTermEqualSelector("metadata.name", meta.Name),
 | 
						|
		ResourceVersion: meta.ResourceVersion,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// AddToNodeAddresses appends the NodeAddresses to the passed-by-pointer slice,
 | 
						|
// only if they do not already exist
 | 
						|
func AddToNodeAddresses(addresses *[]NodeAddress, addAddresses ...NodeAddress) {
 | 
						|
	for _, add := range addAddresses {
 | 
						|
		exists := false
 | 
						|
		for _, existing := range *addresses {
 | 
						|
			if existing.Address == add.Address && existing.Type == add.Type {
 | 
						|
				exists = true
 | 
						|
				break
 | 
						|
			}
 | 
						|
		}
 | 
						|
		if !exists {
 | 
						|
			*addresses = append(*addresses, add)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func HashObject(obj runtime.Object, codec runtime.Codec) (string, error) {
 | 
						|
	data, err := runtime.Encode(codec, obj)
 | 
						|
	if err != nil {
 | 
						|
		return "", err
 | 
						|
	}
 | 
						|
	return fmt.Sprintf("%x", md5.Sum(data)), nil
 | 
						|
}
 | 
						|
 | 
						|
// TODO: make method on LoadBalancerStatus?
 | 
						|
func LoadBalancerStatusEqual(l, r *LoadBalancerStatus) bool {
 | 
						|
	return ingressSliceEqual(l.Ingress, r.Ingress)
 | 
						|
}
 | 
						|
 | 
						|
func ingressSliceEqual(lhs, rhs []LoadBalancerIngress) bool {
 | 
						|
	if len(lhs) != len(rhs) {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	for i := range lhs {
 | 
						|
		if !ingressEqual(&lhs[i], &rhs[i]) {
 | 
						|
			return false
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return true
 | 
						|
}
 | 
						|
 | 
						|
func ingressEqual(lhs, rhs *LoadBalancerIngress) bool {
 | 
						|
	if lhs.IP != rhs.IP {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	if lhs.Hostname != rhs.Hostname {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	return true
 | 
						|
}
 | 
						|
 | 
						|
// TODO: make method on LoadBalancerStatus?
 | 
						|
func LoadBalancerStatusDeepCopy(lb *LoadBalancerStatus) *LoadBalancerStatus {
 | 
						|
	c := &LoadBalancerStatus{}
 | 
						|
	c.Ingress = make([]LoadBalancerIngress, len(lb.Ingress))
 | 
						|
	for i := range lb.Ingress {
 | 
						|
		c.Ingress[i] = lb.Ingress[i]
 | 
						|
	}
 | 
						|
	return c
 | 
						|
}
 | 
						|
 | 
						|
// GetAccessModesAsString returns a string representation of an array of access modes.
 | 
						|
// modes, when present, are always in the same order: RWO,ROX,RWX.
 | 
						|
func GetAccessModesAsString(modes []PersistentVolumeAccessMode) string {
 | 
						|
	modes = removeDuplicateAccessModes(modes)
 | 
						|
	modesStr := []string{}
 | 
						|
	if containsAccessMode(modes, ReadWriteOnce) {
 | 
						|
		modesStr = append(modesStr, "RWO")
 | 
						|
	}
 | 
						|
	if containsAccessMode(modes, ReadOnlyMany) {
 | 
						|
		modesStr = append(modesStr, "ROX")
 | 
						|
	}
 | 
						|
	if containsAccessMode(modes, ReadWriteMany) {
 | 
						|
		modesStr = append(modesStr, "RWX")
 | 
						|
	}
 | 
						|
	return strings.Join(modesStr, ",")
 | 
						|
}
 | 
						|
 | 
						|
// GetAccessModesAsString returns an array of AccessModes from a string created by GetAccessModesAsString
 | 
						|
func GetAccessModesFromString(modes string) []PersistentVolumeAccessMode {
 | 
						|
	strmodes := strings.Split(modes, ",")
 | 
						|
	accessModes := []PersistentVolumeAccessMode{}
 | 
						|
	for _, s := range strmodes {
 | 
						|
		s = strings.Trim(s, " ")
 | 
						|
		switch {
 | 
						|
		case s == "RWO":
 | 
						|
			accessModes = append(accessModes, ReadWriteOnce)
 | 
						|
		case s == "ROX":
 | 
						|
			accessModes = append(accessModes, ReadOnlyMany)
 | 
						|
		case s == "RWX":
 | 
						|
			accessModes = append(accessModes, ReadWriteMany)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return accessModes
 | 
						|
}
 | 
						|
 | 
						|
// removeDuplicateAccessModes returns an array of access modes without any duplicates
 | 
						|
func removeDuplicateAccessModes(modes []PersistentVolumeAccessMode) []PersistentVolumeAccessMode {
 | 
						|
	accessModes := []PersistentVolumeAccessMode{}
 | 
						|
	for _, m := range modes {
 | 
						|
		if !containsAccessMode(accessModes, m) {
 | 
						|
			accessModes = append(accessModes, m)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return accessModes
 | 
						|
}
 | 
						|
 | 
						|
func containsAccessMode(modes []PersistentVolumeAccessMode, mode PersistentVolumeAccessMode) bool {
 | 
						|
	for _, m := range modes {
 | 
						|
		if m == mode {
 | 
						|
			return true
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return false
 | 
						|
}
 | 
						|
 | 
						|
// ParseRFC3339 parses an RFC3339 date in either RFC3339Nano or RFC3339 format.
 | 
						|
func ParseRFC3339(s string, nowFn func() unversioned.Time) (unversioned.Time, error) {
 | 
						|
	if t, timeErr := time.Parse(time.RFC3339Nano, s); timeErr == nil {
 | 
						|
		return unversioned.Time{Time: t}, nil
 | 
						|
	}
 | 
						|
	t, err := time.Parse(time.RFC3339, s)
 | 
						|
	if err != nil {
 | 
						|
		return unversioned.Time{}, err
 | 
						|
	}
 | 
						|
	return unversioned.Time{Time: t}, nil
 | 
						|
}
 | 
						|
 | 
						|
// NodeSelectorRequirementsAsSelector converts the []NodeSelectorRequirement api type into a struct that implements
 | 
						|
// labels.Selector.
 | 
						|
func NodeSelectorRequirementsAsSelector(nsm []NodeSelectorRequirement) (labels.Selector, error) {
 | 
						|
	if len(nsm) == 0 {
 | 
						|
		return labels.Nothing(), nil
 | 
						|
	}
 | 
						|
	selector := labels.NewSelector()
 | 
						|
	for _, expr := range nsm {
 | 
						|
		var op labels.Operator
 | 
						|
		switch expr.Operator {
 | 
						|
		case NodeSelectorOpIn:
 | 
						|
			op = labels.InOperator
 | 
						|
		case NodeSelectorOpNotIn:
 | 
						|
			op = labels.NotInOperator
 | 
						|
		case NodeSelectorOpExists:
 | 
						|
			op = labels.ExistsOperator
 | 
						|
		case NodeSelectorOpDoesNotExist:
 | 
						|
			op = labels.DoesNotExistOperator
 | 
						|
		case NodeSelectorOpGt:
 | 
						|
			op = labels.GreaterThanOperator
 | 
						|
		case NodeSelectorOpLt:
 | 
						|
			op = labels.LessThanOperator
 | 
						|
		default:
 | 
						|
			return nil, fmt.Errorf("%q is not a valid node selector operator", expr.Operator)
 | 
						|
		}
 | 
						|
		r, err := labels.NewRequirement(expr.Key, op, sets.NewString(expr.Values...))
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		selector = selector.Add(*r)
 | 
						|
	}
 | 
						|
	return selector, nil
 | 
						|
}
 | 
						|
 | 
						|
const (
 | 
						|
	// AffinityAnnotationKey represents the key of affinity data (json serialized)
 | 
						|
	// in the Annotations of a Pod.
 | 
						|
	AffinityAnnotationKey string = "scheduler.alpha.kubernetes.io/affinity"
 | 
						|
 | 
						|
	// TolerationsAnnotationKey represents the key of tolerations data (json serialized)
 | 
						|
	// in the Annotations of a Pod.
 | 
						|
	TolerationsAnnotationKey string = "scheduler.alpha.kubernetes.io/tolerations"
 | 
						|
 | 
						|
	// TaintsAnnotationKey represents the key of taints data (json serialized)
 | 
						|
	// in the Annotations of a Node.
 | 
						|
	TaintsAnnotationKey string = "scheduler.alpha.kubernetes.io/taints"
 | 
						|
 | 
						|
	// SeccompPodAnnotationKey represents the key of a seccomp profile applied
 | 
						|
	// to all containers of a pod.
 | 
						|
	SeccompPodAnnotationKey string = "seccomp.security.alpha.kubernetes.io/pod"
 | 
						|
 | 
						|
	// SeccompContainerAnnotationKeyPrefix represents the key of a seccomp profile applied
 | 
						|
	// to one container of a pod.
 | 
						|
	SeccompContainerAnnotationKeyPrefix string = "container.seccomp.security.alpha.kubernetes.io/"
 | 
						|
)
 | 
						|
 | 
						|
// GetAffinityFromPod gets the json serialized affinity data from Pod.Annotations
 | 
						|
// and converts it to the Affinity type in api.
 | 
						|
func GetAffinityFromPodAnnotations(annotations map[string]string) (Affinity, error) {
 | 
						|
	var affinity Affinity
 | 
						|
	if len(annotations) > 0 && annotations[AffinityAnnotationKey] != "" {
 | 
						|
		err := json.Unmarshal([]byte(annotations[AffinityAnnotationKey]), &affinity)
 | 
						|
		if err != nil {
 | 
						|
			return affinity, err
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return affinity, nil
 | 
						|
}
 | 
						|
 | 
						|
// GetTolerationsFromPodAnnotations gets the json serialized tolerations data from Pod.Annotations
 | 
						|
// and converts it to the []Toleration type in api.
 | 
						|
func GetTolerationsFromPodAnnotations(annotations map[string]string) ([]Toleration, error) {
 | 
						|
	var tolerations []Toleration
 | 
						|
	if len(annotations) > 0 && annotations[TolerationsAnnotationKey] != "" {
 | 
						|
		err := json.Unmarshal([]byte(annotations[TolerationsAnnotationKey]), &tolerations)
 | 
						|
		if err != nil {
 | 
						|
			return tolerations, err
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return tolerations, nil
 | 
						|
}
 | 
						|
 | 
						|
// GetTaintsFromNodeAnnotations gets the json serialized taints data from Pod.Annotations
 | 
						|
// and converts it to the []Taint type in api.
 | 
						|
func GetTaintsFromNodeAnnotations(annotations map[string]string) ([]Taint, error) {
 | 
						|
	var taints []Taint
 | 
						|
	if len(annotations) > 0 && annotations[TaintsAnnotationKey] != "" {
 | 
						|
		err := json.Unmarshal([]byte(annotations[TaintsAnnotationKey]), &taints)
 | 
						|
		if err != nil {
 | 
						|
			return []Taint{}, err
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return taints, nil
 | 
						|
}
 | 
						|
 | 
						|
// TolerationToleratesTaint checks if the toleration tolerates the taint.
 | 
						|
func TolerationToleratesTaint(toleration Toleration, taint Taint) bool {
 | 
						|
	if len(toleration.Effect) != 0 && toleration.Effect != taint.Effect {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
 | 
						|
	if toleration.Key != taint.Key {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	// TODO: Use proper defaulting when Toleration becomes a field of PodSpec
 | 
						|
	if (len(toleration.Operator) == 0 || toleration.Operator == TolerationOpEqual) && toleration.Value == taint.Value {
 | 
						|
		return true
 | 
						|
	}
 | 
						|
	if toleration.Operator == TolerationOpExists {
 | 
						|
		return true
 | 
						|
	}
 | 
						|
	return false
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
// TaintToleratedByTolerations checks if taint is tolerated by any of the tolerations.
 | 
						|
func TaintToleratedByTolerations(taint Taint, tolerations []Toleration) bool {
 | 
						|
	tolerated := false
 | 
						|
	for _, toleration := range tolerations {
 | 
						|
		if TolerationToleratesTaint(toleration, taint) {
 | 
						|
			tolerated = true
 | 
						|
			break
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return tolerated
 | 
						|
}
 |