mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			202 lines
		
	
	
		
			6.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			202 lines
		
	
	
		
			6.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2015 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package pod
 | 
						|
 | 
						|
import (
 | 
						|
	"encoding/json"
 | 
						|
	"fmt"
 | 
						|
 | 
						|
	"k8s.io/apimachinery/pkg/util/intstr"
 | 
						|
	"k8s.io/kubernetes/pkg/api/v1"
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	// TODO: to be deleted after v1.3 is released. PodSpec has a dedicated Hostname field.
 | 
						|
	// The annotation value is a string specifying the hostname to be used for the pod e.g 'my-webserver-1'
 | 
						|
	PodHostnameAnnotation = "pod.beta.kubernetes.io/hostname"
 | 
						|
 | 
						|
	// TODO: to be deleted after v1.3 is released. PodSpec has a dedicated Subdomain field.
 | 
						|
	// The annotation value is a string specifying the subdomain e.g. "my-web-service"
 | 
						|
	// If specified, on the pod itself, "<hostname>.my-web-service.<namespace>.svc.<cluster domain>" would resolve to
 | 
						|
	// the pod's IP.
 | 
						|
	// If there is a headless service named "my-web-service" in the same namespace as the pod, then,
 | 
						|
	// <hostname>.my-web-service.<namespace>.svc.<cluster domain>" would be resolved by the cluster DNS Server.
 | 
						|
	PodSubdomainAnnotation = "pod.beta.kubernetes.io/subdomain"
 | 
						|
)
 | 
						|
 | 
						|
// FindPort locates the container port for the given pod and portName.  If the
 | 
						|
// targetPort is a number, use that.  If the targetPort is a string, look that
 | 
						|
// string up in all named ports in all containers in the target pod.  If no
 | 
						|
// match is found, fail.
 | 
						|
func FindPort(pod *v1.Pod, svcPort *v1.ServicePort) (int, error) {
 | 
						|
	portName := svcPort.TargetPort
 | 
						|
	switch portName.Type {
 | 
						|
	case intstr.String:
 | 
						|
		name := portName.StrVal
 | 
						|
		for _, container := range pod.Spec.Containers {
 | 
						|
			for _, port := range container.Ports {
 | 
						|
				if port.Name == name && port.Protocol == svcPort.Protocol {
 | 
						|
					return int(port.ContainerPort), nil
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	case intstr.Int:
 | 
						|
		return portName.IntValue(), nil
 | 
						|
	}
 | 
						|
 | 
						|
	return 0, fmt.Errorf("no suitable port for manifest: %s", pod.UID)
 | 
						|
}
 | 
						|
 | 
						|
// TODO: remove this function when init containers becomes a stable feature
 | 
						|
func SetInitContainersAndStatuses(pod *v1.Pod) error {
 | 
						|
	var initContainersAnnotation string
 | 
						|
	initContainersAnnotation = pod.Annotations[v1.PodInitContainersAnnotationKey]
 | 
						|
	initContainersAnnotation = pod.Annotations[v1.PodInitContainersBetaAnnotationKey]
 | 
						|
	if len(initContainersAnnotation) > 0 {
 | 
						|
		var values []v1.Container
 | 
						|
		if err := json.Unmarshal([]byte(initContainersAnnotation), &values); err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		pod.Spec.InitContainers = values
 | 
						|
	}
 | 
						|
 | 
						|
	var initContainerStatusesAnnotation string
 | 
						|
	initContainerStatusesAnnotation = pod.Annotations[v1.PodInitContainerStatusesAnnotationKey]
 | 
						|
	initContainerStatusesAnnotation = pod.Annotations[v1.PodInitContainerStatusesBetaAnnotationKey]
 | 
						|
	if len(initContainerStatusesAnnotation) > 0 {
 | 
						|
		var values []v1.ContainerStatus
 | 
						|
		if err := json.Unmarshal([]byte(initContainerStatusesAnnotation), &values); err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		pod.Status.InitContainerStatuses = values
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// TODO: remove this function when init containers becomes a stable feature
 | 
						|
func SetInitContainersAnnotations(pod *v1.Pod) error {
 | 
						|
	if len(pod.Spec.InitContainers) > 0 {
 | 
						|
		value, err := json.Marshal(pod.Spec.InitContainers)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		if pod.Annotations == nil {
 | 
						|
			pod.Annotations = make(map[string]string)
 | 
						|
		}
 | 
						|
		pod.Annotations[v1.PodInitContainersAnnotationKey] = string(value)
 | 
						|
		pod.Annotations[v1.PodInitContainersBetaAnnotationKey] = string(value)
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// TODO: remove this function when init containers becomes a stable feature
 | 
						|
func SetInitContainersStatusesAnnotations(pod *v1.Pod) error {
 | 
						|
	if len(pod.Status.InitContainerStatuses) > 0 {
 | 
						|
		value, err := json.Marshal(pod.Status.InitContainerStatuses)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		if pod.Annotations == nil {
 | 
						|
			pod.Annotations = make(map[string]string)
 | 
						|
		}
 | 
						|
		pod.Annotations[v1.PodInitContainerStatusesAnnotationKey] = string(value)
 | 
						|
		pod.Annotations[v1.PodInitContainerStatusesBetaAnnotationKey] = string(value)
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// VisitPodSecretNames invokes the visitor function with the name of every secret
 | 
						|
// referenced by the pod spec. If visitor returns false, visiting is short-circuited.
 | 
						|
// Transitive references (e.g. pod -> pvc -> pv -> secret) are not visited.
 | 
						|
// Returns true if visiting completed, false if visiting was short-circuited.
 | 
						|
func VisitPodSecretNames(pod *v1.Pod, visitor func(string) bool) bool {
 | 
						|
	for _, reference := range pod.Spec.ImagePullSecrets {
 | 
						|
		if !visitor(reference.Name) {
 | 
						|
			return false
 | 
						|
		}
 | 
						|
	}
 | 
						|
	for i := range pod.Spec.InitContainers {
 | 
						|
		if !visitContainerSecretNames(&pod.Spec.InitContainers[i], visitor) {
 | 
						|
			return false
 | 
						|
		}
 | 
						|
	}
 | 
						|
	for i := range pod.Spec.Containers {
 | 
						|
		if !visitContainerSecretNames(&pod.Spec.Containers[i], visitor) {
 | 
						|
			return false
 | 
						|
		}
 | 
						|
	}
 | 
						|
	var source *v1.VolumeSource
 | 
						|
 | 
						|
	for i := range pod.Spec.Volumes {
 | 
						|
		source = &pod.Spec.Volumes[i].VolumeSource
 | 
						|
		switch {
 | 
						|
		case source.AzureFile != nil:
 | 
						|
			if len(source.AzureFile.SecretName) > 0 && !visitor(source.AzureFile.SecretName) {
 | 
						|
				return false
 | 
						|
			}
 | 
						|
		case source.CephFS != nil:
 | 
						|
			if source.CephFS.SecretRef != nil && !visitor(source.CephFS.SecretRef.Name) {
 | 
						|
				return false
 | 
						|
			}
 | 
						|
		case source.FlexVolume != nil:
 | 
						|
			if source.FlexVolume.SecretRef != nil && !visitor(source.FlexVolume.SecretRef.Name) {
 | 
						|
				return false
 | 
						|
			}
 | 
						|
		case source.Projected != nil:
 | 
						|
			for j := range source.Projected.Sources {
 | 
						|
				if source.Projected.Sources[j].Secret != nil {
 | 
						|
					if !visitor(source.Projected.Sources[j].Secret.Name) {
 | 
						|
						return false
 | 
						|
					}
 | 
						|
				}
 | 
						|
			}
 | 
						|
		case source.RBD != nil:
 | 
						|
			if source.RBD.SecretRef != nil && !visitor(source.RBD.SecretRef.Name) {
 | 
						|
				return false
 | 
						|
			}
 | 
						|
		case source.Secret != nil:
 | 
						|
			if !visitor(source.Secret.SecretName) {
 | 
						|
				return false
 | 
						|
			}
 | 
						|
		case source.ScaleIO != nil:
 | 
						|
			if source.ScaleIO.SecretRef != nil && !visitor(source.ScaleIO.SecretRef.Name) {
 | 
						|
				return false
 | 
						|
			}
 | 
						|
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return true
 | 
						|
}
 | 
						|
 | 
						|
func visitContainerSecretNames(container *v1.Container, visitor func(string) bool) bool {
 | 
						|
	for _, env := range container.EnvFrom {
 | 
						|
		if env.SecretRef != nil {
 | 
						|
			if !visitor(env.SecretRef.Name) {
 | 
						|
				return false
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	for _, envVar := range container.Env {
 | 
						|
		if envVar.ValueFrom != nil && envVar.ValueFrom.SecretKeyRef != nil {
 | 
						|
			if !visitor(envVar.ValueFrom.SecretKeyRef.Name) {
 | 
						|
				return false
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return true
 | 
						|
}
 |