2020-10-21 05:49:41 +00:00
|
|
|
/*
|
|
|
|
Copyright 2018 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package leaderelection
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
|
|
|
|
"k8s.io/apimachinery/pkg/util/uuid"
|
|
|
|
"k8s.io/client-go/kubernetes"
|
|
|
|
"k8s.io/client-go/rest"
|
|
|
|
"k8s.io/client-go/tools/leaderelection/resourcelock"
|
|
|
|
"sigs.k8s.io/controller-runtime/pkg/recorder"
|
|
|
|
)
|
|
|
|
|
|
|
|
const inClusterNamespacePath = "/var/run/secrets/kubernetes.io/serviceaccount/namespace"
|
|
|
|
|
2021-06-25 05:02:01 +00:00
|
|
|
// Options provides the required configuration to create a new resource lock.
|
2020-10-21 05:49:41 +00:00
|
|
|
type Options struct {
|
|
|
|
// LeaderElection determines whether or not to use leader election when
|
|
|
|
// starting the manager.
|
|
|
|
LeaderElection bool
|
|
|
|
|
2021-06-25 05:02:01 +00:00
|
|
|
// LeaderElectionResourceLock determines which resource lock to use for leader election,
|
|
|
|
// defaults to "configmapsleases".
|
|
|
|
LeaderElectionResourceLock string
|
|
|
|
|
2020-10-21 05:49:41 +00:00
|
|
|
// LeaderElectionNamespace determines the namespace in which the leader
|
2021-06-25 05:02:01 +00:00
|
|
|
// election resource will be created.
|
2020-10-21 05:49:41 +00:00
|
|
|
LeaderElectionNamespace string
|
|
|
|
|
2021-06-25 05:02:01 +00:00
|
|
|
// LeaderElectionID determines the name of the resource that leader election
|
2020-10-21 05:49:41 +00:00
|
|
|
// will use for holding the leader lock.
|
|
|
|
LeaderElectionID string
|
|
|
|
}
|
|
|
|
|
2021-06-25 05:02:01 +00:00
|
|
|
// NewResourceLock creates a new resource lock for use in a leader election loop.
|
2020-10-21 05:49:41 +00:00
|
|
|
func NewResourceLock(config *rest.Config, recorderProvider recorder.Provider, options Options) (resourcelock.Interface, error) {
|
|
|
|
if !options.LeaderElection {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2021-06-25 05:02:01 +00:00
|
|
|
// Default resource lock to "configmapsleases". We must keep this default until we are sure all controller-runtime
|
|
|
|
// users have upgraded from the original default ConfigMap lock to a controller-runtime version that has this new
|
|
|
|
// default. Many users of controller-runtime skip versions, so we should be extremely conservative here.
|
|
|
|
if options.LeaderElectionResourceLock == "" {
|
|
|
|
options.LeaderElectionResourceLock = resourcelock.ConfigMapsLeasesResourceLock
|
|
|
|
}
|
|
|
|
|
2020-10-21 05:49:41 +00:00
|
|
|
// LeaderElectionID must be provided to prevent clashes
|
|
|
|
if options.LeaderElectionID == "" {
|
|
|
|
return nil, errors.New("LeaderElectionID must be configured")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Default the namespace (if running in cluster)
|
|
|
|
if options.LeaderElectionNamespace == "" {
|
|
|
|
var err error
|
|
|
|
options.LeaderElectionNamespace, err = getInClusterNamespace()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to find leader election namespace: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Leader id, needs to be unique
|
|
|
|
id, err := os.Hostname()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
id = id + "_" + string(uuid.NewUUID())
|
|
|
|
|
|
|
|
// Construct client for leader election
|
2021-06-25 05:02:01 +00:00
|
|
|
client, err := kubernetes.NewForConfig(rest.AddUserAgent(config, "leader-election"))
|
2020-10-21 05:49:41 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2021-06-25 05:02:01 +00:00
|
|
|
return resourcelock.New(options.LeaderElectionResourceLock,
|
2020-10-21 05:49:41 +00:00
|
|
|
options.LeaderElectionNamespace,
|
|
|
|
options.LeaderElectionID,
|
|
|
|
client.CoreV1(),
|
|
|
|
client.CoordinationV1(),
|
|
|
|
resourcelock.ResourceLockConfig{
|
|
|
|
Identity: id,
|
|
|
|
EventRecorder: recorderProvider.GetEventRecorderFor(id),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func getInClusterNamespace() (string, error) {
|
|
|
|
// Check whether the namespace file exists.
|
|
|
|
// If not, we are not running in cluster so can't guess the namespace.
|
2021-06-25 05:02:01 +00:00
|
|
|
if _, err := os.Stat(inClusterNamespacePath); os.IsNotExist(err) {
|
2020-10-21 05:49:41 +00:00
|
|
|
return "", fmt.Errorf("not running in-cluster, please specify LeaderElectionNamespace")
|
|
|
|
} else if err != nil {
|
|
|
|
return "", fmt.Errorf("error checking namespace file: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load the namespace file and return its content
|
|
|
|
namespace, err := ioutil.ReadFile(inClusterNamespacePath)
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("error reading namespace file: %w", err)
|
|
|
|
}
|
|
|
|
return string(namespace), nil
|
|
|
|
}
|