/* Copyright 2016 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package statefulset import ( "crypto/md5" "fmt" "sort" "strings" "github.com/golang/glog" "k8s.io/apimachinery/pkg/util/sets" "k8s.io/kubernetes/pkg/api/v1" podapi "k8s.io/kubernetes/pkg/api/v1/pod" apps "k8s.io/kubernetes/pkg/apis/apps/v1beta1" ) // identityMapper is an interface for assigning identities to a pet. // All existing identity mappers just append "-(index)" to the statefulset name to // generate a unique identity. This is used in claims/DNS/hostname/petname // etc. There's a more elegant way to achieve this mapping, but we're // taking the simplest route till we have data on whether users will need // more customization. // Note that running a single identity mapper is not guaranteed to give // your pet a unique identity. You must run them all. Order doesn't matter. type identityMapper interface { // SetIdentity takes an id and assigns the given pet an identity based // on the stateful set spec. The is must be unique amongst members of the // stateful set. SetIdentity(id string, pet *v1.Pod) // Identity returns the identity of the pet. Identity(pod *v1.Pod) string } func newIdentityMappers(ps *apps.StatefulSet) []identityMapper { return []identityMapper{ &NameIdentityMapper{ps}, &NetworkIdentityMapper{ps}, &VolumeIdentityMapper{ps}, } } // NetworkIdentityMapper assigns network identity to pets. type NetworkIdentityMapper struct { ps *apps.StatefulSet } // SetIdentity sets network identity on the pet. func (n *NetworkIdentityMapper) SetIdentity(id string, pet *v1.Pod) { pet.Annotations[podapi.PodHostnameAnnotation] = fmt.Sprintf("%v-%v", n.ps.Name, id) pet.Annotations[podapi.PodSubdomainAnnotation] = n.ps.Spec.ServiceName return } // Identity returns the network identity of the pet. func (n *NetworkIdentityMapper) Identity(pet *v1.Pod) string { return n.String(pet) } // String is a string function for the network identity of the pet. func (n *NetworkIdentityMapper) String(pet *v1.Pod) string { hostname := pet.Annotations[podapi.PodHostnameAnnotation] subdomain := pet.Annotations[podapi.PodSubdomainAnnotation] return strings.Join([]string{hostname, subdomain, n.ps.Namespace}, ".") } // VolumeIdentityMapper assigns storage identity to pets. type VolumeIdentityMapper struct { ps *apps.StatefulSet } // SetIdentity sets storage identity on the pet. func (v *VolumeIdentityMapper) SetIdentity(id string, pet *v1.Pod) { petVolumes := []v1.Volume{} petClaims := v.GetClaims(id) // These volumes will all go down with the pod. If a name matches one of // the claims in the stateful set, it gets clobbered. podVolumes := map[string]v1.Volume{} for _, podVol := range pet.Spec.Volumes { podVolumes[podVol.Name] = podVol } // Insert claims for the idempotent statefulset volumes for name, claim := range petClaims { // Volumes on a pet for which there are no associated claims on the // statefulset are pod local, and die with the pod. podVol, ok := podVolumes[name] if ok { // TODO: Validate and reject this. glog.V(4).Infof("Overwriting existing volume source %v", podVol.Name) } newVol := v1.Volume{ Name: name, VolumeSource: v1.VolumeSource{ PersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{ ClaimName: claim.Name, // TODO: Use source definition to set this value when we have one. ReadOnly: false, }, }, } petVolumes = append(petVolumes, newVol) } // Transfer any ephemeral pod volumes for name, vol := range podVolumes { if _, ok := petClaims[name]; !ok { petVolumes = append(petVolumes, vol) } } pet.Spec.Volumes = petVolumes return } // Identity returns the storage identity of the pet. func (v *VolumeIdentityMapper) Identity(pet *v1.Pod) string { // TODO: Make this a hash? return v.String(pet) } // String is a string function for the network identity of the pet. func (v *VolumeIdentityMapper) String(pet *v1.Pod) string { ids := []string{} petVols := sets.NewString() for _, petVol := range v.ps.Spec.VolumeClaimTemplates { petVols.Insert(petVol.Name) } for _, podVol := range pet.Spec.Volumes { // Volumes on a pet for which there are no associated claims on the // statefulset are pod local, and die with the pod. if !petVols.Has(podVol.Name) { continue } if podVol.VolumeSource.PersistentVolumeClaim == nil { // TODO: Is this a part of the identity? ids = append(ids, fmt.Sprintf("%v:None", podVol.Name)) continue } ids = append(ids, fmt.Sprintf("%v:%v", podVol.Name, podVol.VolumeSource.PersistentVolumeClaim.ClaimName)) } sort.Strings(ids) return strings.Join(ids, "") } // GetClaims returns the volume claims associated with the given id. // The claims belong to the statefulset. The id should be unique within a statefulset. func (v *VolumeIdentityMapper) GetClaims(id string) map[string]v1.PersistentVolumeClaim { petClaims := map[string]v1.PersistentVolumeClaim{} for _, pvc := range v.ps.Spec.VolumeClaimTemplates { claim := pvc // TODO: Name length checking in validation. claim.Name = fmt.Sprintf("%v-%v-%v", claim.Name, v.ps.Name, id) claim.Namespace = v.ps.Namespace claim.Labels = v.ps.Spec.Selector.MatchLabels // TODO: We're assuming that the claim template has a volume QoS key, eg: // volume.alpha.kubernetes.io/storage-class: anything petClaims[pvc.Name] = claim } return petClaims } // GetClaimsForPet returns the pvcs for the given pet. func (v *VolumeIdentityMapper) GetClaimsForPet(pet *v1.Pod) []v1.PersistentVolumeClaim { // Strip out the "-(index)" from the pet name and use it to generate // claim names. id := strings.Split(pet.Name, "-") petID := id[len(id)-1] pvcs := []v1.PersistentVolumeClaim{} for _, pvc := range v.GetClaims(petID) { pvcs = append(pvcs, pvc) } return pvcs } // NameIdentityMapper assigns names to pets. // It also puts the pet in the same namespace as the parent. type NameIdentityMapper struct { ps *apps.StatefulSet } // SetIdentity sets the pet namespace and name. func (n *NameIdentityMapper) SetIdentity(id string, pet *v1.Pod) { pet.Name = fmt.Sprintf("%v-%v", n.ps.Name, id) pet.Namespace = n.ps.Namespace return } // Identity returns the name identity of the pet. func (n *NameIdentityMapper) Identity(pet *v1.Pod) string { return n.String(pet) } // String is a string function for the name identity of the pet. func (n *NameIdentityMapper) String(pet *v1.Pod) string { return fmt.Sprintf("%v/%v", pet.Namespace, pet.Name) } // identityHash computes a hash of the pet by running all the above identity // mappers. func identityHash(ps *apps.StatefulSet, pet *v1.Pod) string { id := "" for _, idMapper := range newIdentityMappers(ps) { id += idMapper.Identity(pet) } return fmt.Sprintf("%x", md5.Sum([]byte(id))) } // copyPetID gives the realPet the same identity as the expectedPet. // Note that this is *not* a literal copy, but a copy of the fields that // contribute to the pet's identity. The returned boolean 'needsUpdate' will // be false if the realPet already has the same identity as the expectedPet. func copyPetID(realPet, expectedPet *pcb) (pod v1.Pod, needsUpdate bool, err error) { if realPet.pod == nil || expectedPet.pod == nil { return pod, false, fmt.Errorf("Need a valid to and from pet for copy") } if realPet.parent.UID != expectedPet.parent.UID { return pod, false, fmt.Errorf("Cannot copy pets with different parents") } ps := realPet.parent if identityHash(ps, realPet.pod) == identityHash(ps, expectedPet.pod) { return *realPet.pod, false, nil } copyPod := *realPet.pod // This is the easiest way to give an identity to a pod. It won't work // when we stop using names for id. for _, idMapper := range newIdentityMappers(ps) { idMapper.SetIdentity(expectedPet.id, ©Pod) } return copyPod, true, nil }