mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 12:18:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			161 lines
		
	
	
		
			4.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			161 lines
		
	
	
		
			4.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2016 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package predicates
 | 
						|
 | 
						|
import (
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"k8s.io/api/core/v1"
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/labels"
 | 
						|
	schedutil "k8s.io/kubernetes/plugin/pkg/scheduler/util"
 | 
						|
)
 | 
						|
 | 
						|
// FindLabelsInSet gets as many key/value pairs as possible out of a label set.
 | 
						|
func FindLabelsInSet(labelsToKeep []string, selector labels.Set) map[string]string {
 | 
						|
	aL := make(map[string]string)
 | 
						|
	for _, l := range labelsToKeep {
 | 
						|
		if selector.Has(l) {
 | 
						|
			aL[l] = selector.Get(l)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return aL
 | 
						|
}
 | 
						|
 | 
						|
// AddUnsetLabelsToMap backfills missing values with values we find in a map.
 | 
						|
func AddUnsetLabelsToMap(aL map[string]string, labelsToAdd []string, labelSet labels.Set) {
 | 
						|
	for _, l := range labelsToAdd {
 | 
						|
		// if the label is already there, dont overwrite it.
 | 
						|
		if _, exists := aL[l]; exists {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		// otherwise, backfill this label.
 | 
						|
		if labelSet.Has(l) {
 | 
						|
			aL[l] = labelSet.Get(l)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// FilterPodsByNamespace filters pods outside a namespace from the given list.
 | 
						|
func FilterPodsByNamespace(pods []*v1.Pod, ns string) []*v1.Pod {
 | 
						|
	filtered := []*v1.Pod{}
 | 
						|
	for _, nsPod := range pods {
 | 
						|
		if nsPod.Namespace == ns {
 | 
						|
			filtered = append(filtered, nsPod)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return filtered
 | 
						|
}
 | 
						|
 | 
						|
// CreateSelectorFromLabels is used to define a selector that corresponds to the keys in a map.
 | 
						|
func CreateSelectorFromLabels(aL map[string]string) labels.Selector {
 | 
						|
	if aL == nil || len(aL) == 0 {
 | 
						|
		return labels.Everything()
 | 
						|
	}
 | 
						|
	return labels.Set(aL).AsSelector()
 | 
						|
}
 | 
						|
 | 
						|
// GetEquivalencePod returns a EquivalencePod which contains a group of pod attributes which can be reused.
 | 
						|
func GetEquivalencePod(pod *v1.Pod) interface{} {
 | 
						|
	// For now we only consider pods:
 | 
						|
	// 1. OwnerReferences is Controller
 | 
						|
	// 2. with same OwnerReferences
 | 
						|
	// to be equivalent
 | 
						|
	if len(pod.OwnerReferences) != 0 {
 | 
						|
		for _, ref := range pod.OwnerReferences {
 | 
						|
			if *ref.Controller {
 | 
						|
				// a pod can only belongs to one controller
 | 
						|
				return &EquivalencePod{
 | 
						|
					ControllerRef: ref,
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// EquivalencePod is a group of pod attributes which can be reused as equivalence to schedule other pods.
 | 
						|
type EquivalencePod struct {
 | 
						|
	ControllerRef metav1.OwnerReference
 | 
						|
}
 | 
						|
 | 
						|
type hostPortInfo struct {
 | 
						|
	protocol string
 | 
						|
	hostIP   string
 | 
						|
	hostPort string
 | 
						|
}
 | 
						|
 | 
						|
// decode decodes string ("protocol/hostIP/hostPort") to *hostPortInfo object.
 | 
						|
func decode(info string) *hostPortInfo {
 | 
						|
	hostPortInfoSlice := strings.Split(info, "/")
 | 
						|
 | 
						|
	protocol := hostPortInfoSlice[0]
 | 
						|
	hostIP := hostPortInfoSlice[1]
 | 
						|
	hostPort := hostPortInfoSlice[2]
 | 
						|
 | 
						|
	return &hostPortInfo{
 | 
						|
		protocol: protocol,
 | 
						|
		hostIP:   hostIP,
 | 
						|
		hostPort: hostPort,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// specialPortConflictCheck detects whether specailHostPort(whose hostIP is 0.0.0.0) is conflict with otherHostPorts.
 | 
						|
// return true if we have a conflict.
 | 
						|
func specialPortConflictCheck(specialHostPort string, otherHostPorts map[string]bool) bool {
 | 
						|
	specialHostPortInfo := decode(specialHostPort)
 | 
						|
 | 
						|
	if specialHostPortInfo.hostIP == schedutil.DefaultBindAllHostIP {
 | 
						|
		// loop through all the otherHostPorts to see if there exists a conflict
 | 
						|
		for hostPortItem := range otherHostPorts {
 | 
						|
			hostPortInfo := decode(hostPortItem)
 | 
						|
 | 
						|
			// if there exists one hostPortItem which has the same hostPort and protocol with the specialHostPort, that will cause a conflict
 | 
						|
			if specialHostPortInfo.hostPort == hostPortInfo.hostPort && specialHostPortInfo.protocol == hostPortInfo.protocol {
 | 
						|
				return true
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
	}
 | 
						|
 | 
						|
	return false
 | 
						|
}
 | 
						|
 | 
						|
// portsConflict check whether existingPorts and wantPorts conflict with each other
 | 
						|
// return true if we have a conflict
 | 
						|
func portsConflict(existingPorts, wantPorts map[string]bool) bool {
 | 
						|
 | 
						|
	for existingPort := range existingPorts {
 | 
						|
		if specialPortConflictCheck(existingPort, wantPorts) {
 | 
						|
			return true
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	for wantPort := range wantPorts {
 | 
						|
		if specialPortConflictCheck(wantPort, existingPorts) {
 | 
						|
			return true
 | 
						|
		}
 | 
						|
 | 
						|
		// general check hostPort conflict procedure for hostIP is not 0.0.0.0
 | 
						|
		if existingPorts[wantPort] {
 | 
						|
			return true
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return false
 | 
						|
}
 |