mirror of https://github.com/kubernetes/kops.git
				
				
				
			
		
			
				
	
	
		
			128 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			128 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Go
		
	
	
	
| /*
 | |
| Copyright 2018 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package leaderelection
 | |
| 
 | |
| import (
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 
 | |
| 	"k8s.io/apimachinery/pkg/util/uuid"
 | |
| 	coordinationv1client "k8s.io/client-go/kubernetes/typed/coordination/v1"
 | |
| 	corev1client "k8s.io/client-go/kubernetes/typed/core/v1"
 | |
| 	"k8s.io/client-go/rest"
 | |
| 	"k8s.io/client-go/tools/leaderelection/resourcelock"
 | |
| 
 | |
| 	"sigs.k8s.io/controller-runtime/pkg/recorder"
 | |
| )
 | |
| 
 | |
| const inClusterNamespacePath = "/var/run/secrets/kubernetes.io/serviceaccount/namespace"
 | |
| 
 | |
| // Options provides the required configuration to create a new resource lock.
 | |
| type Options struct {
 | |
| 	// LeaderElection determines whether or not to use leader election when
 | |
| 	// starting the manager.
 | |
| 	LeaderElection bool
 | |
| 
 | |
| 	// LeaderElectionResourceLock determines which resource lock to use for leader election,
 | |
| 	// defaults to "leases".
 | |
| 	LeaderElectionResourceLock string
 | |
| 
 | |
| 	// LeaderElectionNamespace determines the namespace in which the leader
 | |
| 	// election resource will be created.
 | |
| 	LeaderElectionNamespace string
 | |
| 
 | |
| 	// LeaderElectionID determines the name of the resource that leader election
 | |
| 	// will use for holding the leader lock.
 | |
| 	LeaderElectionID string
 | |
| }
 | |
| 
 | |
| // NewResourceLock creates a new resource lock for use in a leader election loop.
 | |
| func NewResourceLock(config *rest.Config, recorderProvider recorder.Provider, options Options) (resourcelock.Interface, error) {
 | |
| 	if !options.LeaderElection {
 | |
| 		return nil, nil
 | |
| 	}
 | |
| 
 | |
| 	// Default resource lock to "leases". The previous default (from v0.7.0 to v0.11.x) was configmapsleases, which was
 | |
| 	// used to migrate from configmaps to leases. Since the default was "configmapsleases" for over a year, spanning
 | |
| 	// five minor releases, any actively maintained operators are very likely to have a released version that uses
 | |
| 	// "configmapsleases". Therefore defaulting to "leases" should be safe.
 | |
| 	if options.LeaderElectionResourceLock == "" {
 | |
| 		options.LeaderElectionResourceLock = resourcelock.LeasesResourceLock
 | |
| 	}
 | |
| 
 | |
| 	// LeaderElectionID must be provided to prevent clashes
 | |
| 	if options.LeaderElectionID == "" {
 | |
| 		return nil, errors.New("LeaderElectionID must be configured")
 | |
| 	}
 | |
| 
 | |
| 	// Default the namespace (if running in cluster)
 | |
| 	if options.LeaderElectionNamespace == "" {
 | |
| 		var err error
 | |
| 		options.LeaderElectionNamespace, err = getInClusterNamespace()
 | |
| 		if err != nil {
 | |
| 			return nil, fmt.Errorf("unable to find leader election namespace: %w", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Leader id, needs to be unique
 | |
| 	id, err := os.Hostname()
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	id = id + "_" + string(uuid.NewUUID())
 | |
| 
 | |
| 	// Construct clients for leader election
 | |
| 	rest.AddUserAgent(config, "leader-election")
 | |
| 	corev1Client, err := corev1client.NewForConfig(config)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	coordinationClient, err := coordinationv1client.NewForConfig(config)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	return resourcelock.New(options.LeaderElectionResourceLock,
 | |
| 		options.LeaderElectionNamespace,
 | |
| 		options.LeaderElectionID,
 | |
| 		corev1Client,
 | |
| 		coordinationClient,
 | |
| 		resourcelock.ResourceLockConfig{
 | |
| 			Identity:      id,
 | |
| 			EventRecorder: recorderProvider.GetEventRecorderFor(id),
 | |
| 		})
 | |
| }
 | |
| 
 | |
| func getInClusterNamespace() (string, error) {
 | |
| 	// Check whether the namespace file exists.
 | |
| 	// If not, we are not running in cluster so can't guess the namespace.
 | |
| 	if _, err := os.Stat(inClusterNamespacePath); os.IsNotExist(err) {
 | |
| 		return "", fmt.Errorf("not running in-cluster, please specify LeaderElectionNamespace")
 | |
| 	} else if err != nil {
 | |
| 		return "", fmt.Errorf("error checking namespace file: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	// Load the namespace file and return its content
 | |
| 	namespace, err := os.ReadFile(inClusterNamespacePath)
 | |
| 	if err != nil {
 | |
| 		return "", fmt.Errorf("error reading namespace file: %w", err)
 | |
| 	}
 | |
| 	return string(namespace), nil
 | |
| }
 |