52baf68d50
Signed-off-by: Michał Żyłowski <michal.zylowski@intel.com>
185 lines
6.4 KiB
Go
185 lines
6.4 KiB
Go
/*
|
|
Copyright 2015 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package node
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"net"
|
|
"os"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/golang/glog"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
"k8s.io/kubernetes/pkg/api"
|
|
"k8s.io/kubernetes/pkg/api/v1"
|
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
|
"k8s.io/kubernetes/pkg/util/strategicpatch"
|
|
)
|
|
|
|
const (
|
|
// The reason and message set on a pod when its state cannot be confirmed as kubelet is unresponsive
|
|
// on the node it is (was) running.
|
|
NodeUnreachablePodReason = "NodeLost"
|
|
NodeUnreachablePodMessage = "Node %v which was running pod %v is unresponsive"
|
|
)
|
|
|
|
func GetHostname(hostnameOverride string) string {
|
|
var hostname string = hostnameOverride
|
|
if hostname == "" {
|
|
nodename, err := os.Hostname()
|
|
if err != nil {
|
|
glog.Fatalf("Couldn't determine hostname: %v", err)
|
|
}
|
|
hostname = nodename
|
|
}
|
|
return strings.ToLower(strings.TrimSpace(hostname))
|
|
}
|
|
|
|
// GetPreferredNodeAddress returns the address of the provided node, using the provided preference order.
|
|
// If none of the preferred address types are found, an error is returned.
|
|
func GetPreferredNodeAddress(node *v1.Node, preferredAddressTypes []v1.NodeAddressType) (string, error) {
|
|
for _, addressType := range preferredAddressTypes {
|
|
for _, address := range node.Status.Addresses {
|
|
if address.Type == addressType {
|
|
return address.Address, nil
|
|
}
|
|
}
|
|
// If hostname was requested and no Hostname address was registered...
|
|
if addressType == v1.NodeHostName {
|
|
// ...fall back to the kubernetes.io/hostname label for compatibility with kubelets before 1.5
|
|
if hostname, ok := node.Labels[metav1.LabelHostname]; ok && len(hostname) > 0 {
|
|
return hostname, nil
|
|
}
|
|
}
|
|
}
|
|
return "", fmt.Errorf("no preferred addresses found; known addresses: %v", node.Status.Addresses)
|
|
}
|
|
|
|
// GetNodeHostIP returns the provided node's IP, based on the priority:
|
|
// 1. NodeInternalIP
|
|
// 2. NodeExternalIP
|
|
// 3. NodeLegacyHostIP
|
|
func GetNodeHostIP(node *v1.Node) (net.IP, error) {
|
|
addresses := node.Status.Addresses
|
|
addressMap := make(map[v1.NodeAddressType][]v1.NodeAddress)
|
|
for i := range addresses {
|
|
addressMap[addresses[i].Type] = append(addressMap[addresses[i].Type], addresses[i])
|
|
}
|
|
if addresses, ok := addressMap[v1.NodeInternalIP]; ok {
|
|
return net.ParseIP(addresses[0].Address), nil
|
|
}
|
|
if addresses, ok := addressMap[v1.NodeExternalIP]; ok {
|
|
return net.ParseIP(addresses[0].Address), nil
|
|
}
|
|
if addresses, ok := addressMap[v1.NodeLegacyHostIP]; ok {
|
|
return net.ParseIP(addresses[0].Address), nil
|
|
}
|
|
return nil, fmt.Errorf("host IP unknown; known addresses: %v", addresses)
|
|
}
|
|
|
|
// InternalGetNodeHostIP returns the provided node's IP, based on the priority:
|
|
// 1. NodeInternalIP
|
|
// 2. NodeExternalIP
|
|
// 3. NodeLegacyHostIP
|
|
func InternalGetNodeHostIP(node *api.Node) (net.IP, error) {
|
|
addresses := node.Status.Addresses
|
|
addressMap := make(map[api.NodeAddressType][]api.NodeAddress)
|
|
for i := range addresses {
|
|
addressMap[addresses[i].Type] = append(addressMap[addresses[i].Type], addresses[i])
|
|
}
|
|
if addresses, ok := addressMap[api.NodeInternalIP]; ok {
|
|
return net.ParseIP(addresses[0].Address), nil
|
|
}
|
|
if addresses, ok := addressMap[api.NodeExternalIP]; ok {
|
|
return net.ParseIP(addresses[0].Address), nil
|
|
}
|
|
if addresses, ok := addressMap[api.NodeLegacyHostIP]; ok {
|
|
return net.ParseIP(addresses[0].Address), nil
|
|
}
|
|
return nil, fmt.Errorf("host IP unknown; known addresses: %v", addresses)
|
|
}
|
|
|
|
// Helper function that builds a string identifier that is unique per failure-zone
|
|
// Returns empty-string for no zone
|
|
func GetZoneKey(node *v1.Node) string {
|
|
labels := node.Labels
|
|
if labels == nil {
|
|
return ""
|
|
}
|
|
|
|
region, _ := labels[metav1.LabelZoneRegion]
|
|
failureDomain, _ := labels[metav1.LabelZoneFailureDomain]
|
|
|
|
if region == "" && failureDomain == "" {
|
|
return ""
|
|
}
|
|
|
|
// We include the null character just in case region or failureDomain has a colon
|
|
// (We do assume there's no null characters in a region or failureDomain)
|
|
// As a nice side-benefit, the null character is not printed by fmt.Print or glog
|
|
return region + ":\x00:" + failureDomain
|
|
}
|
|
|
|
// SetNodeCondition updates specific node condition with patch operation.
|
|
func SetNodeCondition(c clientset.Interface, node types.NodeName, condition v1.NodeCondition) error {
|
|
generatePatch := func(condition v1.NodeCondition) ([]byte, error) {
|
|
raw, err := json.Marshal(&[]v1.NodeCondition{condition})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return []byte(fmt.Sprintf(`{"status":{"conditions":%s}}`, raw)), nil
|
|
}
|
|
condition.LastHeartbeatTime = metav1.NewTime(time.Now())
|
|
patch, err := generatePatch(condition)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
_, err = c.Core().Nodes().PatchStatus(string(node), patch)
|
|
return err
|
|
}
|
|
|
|
// PatchNodeStatus patches node status.
|
|
func PatchNodeStatus(c clientset.Interface, nodeName types.NodeName, oldNode *v1.Node, newNode *v1.Node) (*v1.Node, error) {
|
|
oldData, err := json.Marshal(oldNode)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to marshal old node %#v for node %q: %v", oldNode, nodeName, err)
|
|
}
|
|
|
|
// Reset spec to make sure only patch for Status or ObjectMeta is generated.
|
|
// Note that we don't reset ObjectMeta here, because:
|
|
// 1. This aligns with Nodes().UpdateStatus().
|
|
// 2. Some component does use this to update node annotations.
|
|
newNode.Spec = oldNode.Spec
|
|
newData, err := json.Marshal(newNode)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to marshal new node %#v for node %q: %v", newNode, nodeName, err)
|
|
}
|
|
|
|
patchBytes, err := strategicpatch.CreateTwoWayMergePatch(oldData, newData, v1.Node{})
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to create patch for node %q: %v", nodeName, err)
|
|
}
|
|
|
|
updatedNode, err := c.Core().Nodes().Patch(string(nodeName), types.StrategicMergePatchType, patchBytes, "status")
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to patch status %q for node %q: %v", patchBytes, nodeName, err)
|
|
}
|
|
return updatedNode, nil
|
|
}
|