mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-12-19 03:20:20 +00:00
4024 lines
138 KiB
Go
4024 lines
138 KiB
Go
/*
|
|
Copyright 2014 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package internalversion
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/x509"
|
|
"fmt"
|
|
"io"
|
|
"net"
|
|
"net/url"
|
|
"reflect"
|
|
"sort"
|
|
"strconv"
|
|
"strings"
|
|
"text/tabwriter"
|
|
"time"
|
|
|
|
"github.com/golang/glog"
|
|
|
|
"github.com/fatih/camelcase"
|
|
|
|
appsv1 "k8s.io/api/apps/v1"
|
|
rbacv1 "k8s.io/api/rbac/v1"
|
|
"k8s.io/apimachinery/pkg/api/errors"
|
|
"k8s.io/apimachinery/pkg/api/meta"
|
|
"k8s.io/apimachinery/pkg/api/resource"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/fields"
|
|
"k8s.io/apimachinery/pkg/labels"
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
"k8s.io/apimachinery/pkg/util/intstr"
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
|
"k8s.io/client-go/dynamic"
|
|
externalclient "k8s.io/client-go/kubernetes"
|
|
"k8s.io/client-go/rest"
|
|
"k8s.io/kubernetes/pkg/api/events"
|
|
"k8s.io/kubernetes/pkg/api/legacyscheme"
|
|
"k8s.io/kubernetes/pkg/api/ref"
|
|
resourcehelper "k8s.io/kubernetes/pkg/api/resource"
|
|
"k8s.io/kubernetes/pkg/apis/apps"
|
|
"k8s.io/kubernetes/pkg/apis/autoscaling"
|
|
"k8s.io/kubernetes/pkg/apis/batch"
|
|
"k8s.io/kubernetes/pkg/apis/certificates"
|
|
api "k8s.io/kubernetes/pkg/apis/core"
|
|
"k8s.io/kubernetes/pkg/apis/core/helper"
|
|
"k8s.io/kubernetes/pkg/apis/core/helper/qos"
|
|
"k8s.io/kubernetes/pkg/apis/extensions"
|
|
"k8s.io/kubernetes/pkg/apis/networking"
|
|
"k8s.io/kubernetes/pkg/apis/policy"
|
|
"k8s.io/kubernetes/pkg/apis/rbac"
|
|
rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1"
|
|
"k8s.io/kubernetes/pkg/apis/scheduling"
|
|
"k8s.io/kubernetes/pkg/apis/storage"
|
|
storageutil "k8s.io/kubernetes/pkg/apis/storage/util"
|
|
clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
|
|
coreclient "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/core/internalversion"
|
|
deploymentutil "k8s.io/kubernetes/pkg/controller/deployment/util"
|
|
"k8s.io/kubernetes/pkg/fieldpath"
|
|
"k8s.io/kubernetes/pkg/printers"
|
|
"k8s.io/kubernetes/pkg/registry/rbac/validation"
|
|
"k8s.io/kubernetes/pkg/util/slice"
|
|
)
|
|
|
|
// Each level has 2 spaces for PrefixWriter
|
|
const (
|
|
LEVEL_0 = iota
|
|
LEVEL_1
|
|
LEVEL_2
|
|
LEVEL_3
|
|
)
|
|
|
|
// PrefixWriter can write text at various indentation levels.
|
|
type PrefixWriter interface {
|
|
// Write writes text with the specified indentation level.
|
|
Write(level int, format string, a ...interface{})
|
|
// WriteLine writes an entire line with no indentation level.
|
|
WriteLine(a ...interface{})
|
|
// Flush forces indentation to be reset.
|
|
Flush()
|
|
}
|
|
|
|
// prefixWriter implements PrefixWriter
|
|
type prefixWriter struct {
|
|
out io.Writer
|
|
}
|
|
|
|
var _ PrefixWriter = &prefixWriter{}
|
|
|
|
// NewPrefixWriter creates a new PrefixWriter.
|
|
func NewPrefixWriter(out io.Writer) PrefixWriter {
|
|
return &prefixWriter{out: out}
|
|
}
|
|
|
|
func (pw *prefixWriter) Write(level int, format string, a ...interface{}) {
|
|
levelSpace := " "
|
|
prefix := ""
|
|
for i := 0; i < level; i++ {
|
|
prefix += levelSpace
|
|
}
|
|
fmt.Fprintf(pw.out, prefix+format, a...)
|
|
}
|
|
|
|
func (pw *prefixWriter) WriteLine(a ...interface{}) {
|
|
fmt.Fprintln(pw.out, a...)
|
|
}
|
|
|
|
func (pw *prefixWriter) Flush() {
|
|
if f, ok := pw.out.(flusher); ok {
|
|
f.Flush()
|
|
}
|
|
}
|
|
|
|
func describerMap(clientConfig *rest.Config) (map[schema.GroupKind]printers.Describer, error) {
|
|
c, err := clientset.NewForConfig(clientConfig)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
externalclient, err := externalclient.NewForConfig(clientConfig)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
m := map[schema.GroupKind]printers.Describer{
|
|
api.Kind("Pod"): &PodDescriber{c},
|
|
api.Kind("ReplicationController"): &ReplicationControllerDescriber{c},
|
|
api.Kind("Secret"): &SecretDescriber{c},
|
|
api.Kind("Service"): &ServiceDescriber{c},
|
|
api.Kind("ServiceAccount"): &ServiceAccountDescriber{c},
|
|
api.Kind("Node"): &NodeDescriber{c},
|
|
api.Kind("LimitRange"): &LimitRangeDescriber{c},
|
|
api.Kind("ResourceQuota"): &ResourceQuotaDescriber{c},
|
|
api.Kind("PersistentVolume"): &PersistentVolumeDescriber{c},
|
|
api.Kind("PersistentVolumeClaim"): &PersistentVolumeClaimDescriber{c},
|
|
api.Kind("Namespace"): &NamespaceDescriber{c},
|
|
api.Kind("Endpoints"): &EndpointsDescriber{c},
|
|
api.Kind("ConfigMap"): &ConfigMapDescriber{c},
|
|
api.Kind("PriorityClass"): &PriorityClassDescriber{c},
|
|
|
|
extensions.Kind("ReplicaSet"): &ReplicaSetDescriber{c},
|
|
extensions.Kind("NetworkPolicy"): &NetworkPolicyDescriber{c},
|
|
extensions.Kind("PodSecurityPolicy"): &PodSecurityPolicyDescriber{c},
|
|
autoscaling.Kind("HorizontalPodAutoscaler"): &HorizontalPodAutoscalerDescriber{c},
|
|
extensions.Kind("DaemonSet"): &DaemonSetDescriber{c},
|
|
extensions.Kind("Deployment"): &DeploymentDescriber{c, externalclient},
|
|
extensions.Kind("Ingress"): &IngressDescriber{c},
|
|
batch.Kind("Job"): &JobDescriber{c},
|
|
batch.Kind("CronJob"): &CronJobDescriber{c, externalclient},
|
|
apps.Kind("StatefulSet"): &StatefulSetDescriber{c},
|
|
apps.Kind("Deployment"): &DeploymentDescriber{c, externalclient},
|
|
apps.Kind("DaemonSet"): &DaemonSetDescriber{c},
|
|
apps.Kind("ReplicaSet"): &ReplicaSetDescriber{c},
|
|
certificates.Kind("CertificateSigningRequest"): &CertificateSigningRequestDescriber{c},
|
|
storage.Kind("StorageClass"): &StorageClassDescriber{c},
|
|
policy.Kind("PodDisruptionBudget"): &PodDisruptionBudgetDescriber{c},
|
|
rbac.Kind("Role"): &RoleDescriber{externalclient},
|
|
rbac.Kind("ClusterRole"): &ClusterRoleDescriber{externalclient},
|
|
rbac.Kind("RoleBinding"): &RoleBindingDescriber{externalclient},
|
|
rbac.Kind("ClusterRoleBinding"): &ClusterRoleBindingDescriber{externalclient},
|
|
networking.Kind("NetworkPolicy"): &NetworkPolicyDescriber{c},
|
|
scheduling.Kind("PriorityClass"): &PriorityClassDescriber{c},
|
|
}
|
|
|
|
return m, nil
|
|
}
|
|
|
|
// DescriberFor returns the default describe functions for each of the standard
|
|
// Kubernetes types.
|
|
func DescriberFor(kind schema.GroupKind, clientConfig *rest.Config) (printers.Describer, bool) {
|
|
describers, err := describerMap(clientConfig)
|
|
if err != nil {
|
|
glog.V(1).Info(err)
|
|
return nil, false
|
|
}
|
|
|
|
f, ok := describers[kind]
|
|
return f, ok
|
|
}
|
|
|
|
// GenericDescriberFor returns a generic describer for the specified mapping
|
|
// that uses only information available from runtime.Unstructured
|
|
func GenericDescriberFor(mapping *meta.RESTMapping, dynamic dynamic.Interface, events coreclient.EventsGetter) printers.Describer {
|
|
return &genericDescriber{mapping, dynamic, events}
|
|
}
|
|
|
|
type genericDescriber struct {
|
|
mapping *meta.RESTMapping
|
|
dynamic dynamic.Interface
|
|
events coreclient.EventsGetter
|
|
}
|
|
|
|
func (g *genericDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (output string, err error) {
|
|
obj, err := g.dynamic.Resource(g.mapping.Resource).Namespace(namespace).Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = g.events.Events(namespace).Search(legacyscheme.Scheme, obj)
|
|
}
|
|
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", obj.GetName())
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", obj.GetNamespace())
|
|
printLabelsMultiline(w, "Labels", obj.GetLabels())
|
|
printAnnotationsMultiline(w, "Annotations", obj.GetAnnotations())
|
|
printUnstructuredContent(w, LEVEL_0, obj.UnstructuredContent(), "", ".metadata.name", ".metadata.namespace", ".metadata.labels", ".metadata.annotations")
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func printUnstructuredContent(w PrefixWriter, level int, content map[string]interface{}, skipPrefix string, skip ...string) {
|
|
fields := []string{}
|
|
for field := range content {
|
|
fields = append(fields, field)
|
|
}
|
|
sort.Strings(fields)
|
|
|
|
for _, field := range fields {
|
|
value := content[field]
|
|
switch typedValue := value.(type) {
|
|
case map[string]interface{}:
|
|
skipExpr := fmt.Sprintf("%s.%s", skipPrefix, field)
|
|
if slice.ContainsString(skip, skipExpr, nil) {
|
|
continue
|
|
}
|
|
w.Write(level, "%s:\n", smartLabelFor(field))
|
|
printUnstructuredContent(w, level+1, typedValue, skipExpr, skip...)
|
|
|
|
case []interface{}:
|
|
skipExpr := fmt.Sprintf("%s.%s", skipPrefix, field)
|
|
if slice.ContainsString(skip, skipExpr, nil) {
|
|
continue
|
|
}
|
|
w.Write(level, "%s:\n", smartLabelFor(field))
|
|
for _, child := range typedValue {
|
|
switch typedChild := child.(type) {
|
|
case map[string]interface{}:
|
|
printUnstructuredContent(w, level+1, typedChild, skipExpr, skip...)
|
|
default:
|
|
w.Write(level+1, "%v\n", typedChild)
|
|
}
|
|
}
|
|
|
|
default:
|
|
skipExpr := fmt.Sprintf("%s.%s", skipPrefix, field)
|
|
if slice.ContainsString(skip, skipExpr, nil) {
|
|
continue
|
|
}
|
|
w.Write(level, "%s:\t%v\n", smartLabelFor(field), typedValue)
|
|
}
|
|
}
|
|
}
|
|
|
|
func smartLabelFor(field string) string {
|
|
commonAcronyms := []string{"API", "URL", "UID", "OSB", "GUID"}
|
|
|
|
splitted := camelcase.Split(field)
|
|
for i := 0; i < len(splitted); i++ {
|
|
part := splitted[i]
|
|
|
|
if slice.ContainsString(commonAcronyms, strings.ToUpper(part), nil) {
|
|
part = strings.ToUpper(part)
|
|
} else {
|
|
part = strings.Title(part)
|
|
}
|
|
splitted[i] = part
|
|
}
|
|
|
|
return strings.Join(splitted, " ")
|
|
}
|
|
|
|
// DefaultObjectDescriber can describe the default Kubernetes objects.
|
|
var DefaultObjectDescriber printers.ObjectDescriber
|
|
|
|
func init() {
|
|
d := &Describers{}
|
|
err := d.Add(
|
|
describeLimitRange,
|
|
describeQuota,
|
|
describePod,
|
|
describeService,
|
|
describeReplicationController,
|
|
describeDaemonSet,
|
|
describeNode,
|
|
describeNamespace,
|
|
)
|
|
if err != nil {
|
|
glog.Fatalf("Cannot register describers: %v", err)
|
|
}
|
|
DefaultObjectDescriber = d
|
|
}
|
|
|
|
// NamespaceDescriber generates information about a namespace
|
|
type NamespaceDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *NamespaceDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
ns, err := d.Core().Namespaces().Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
resourceQuotaList, err := d.Core().ResourceQuotas(name).List(metav1.ListOptions{})
|
|
if err != nil {
|
|
if errors.IsNotFound(err) {
|
|
// Server does not support resource quotas.
|
|
// Not an error, will not show resource quotas information.
|
|
resourceQuotaList = nil
|
|
} else {
|
|
return "", err
|
|
}
|
|
}
|
|
limitRangeList, err := d.Core().LimitRanges(name).List(metav1.ListOptions{})
|
|
if err != nil {
|
|
if errors.IsNotFound(err) {
|
|
// Server does not support limit ranges.
|
|
// Not an error, will not show limit ranges information.
|
|
limitRangeList = nil
|
|
} else {
|
|
return "", err
|
|
}
|
|
}
|
|
return describeNamespace(ns, resourceQuotaList, limitRangeList)
|
|
}
|
|
|
|
func describeNamespace(namespace *api.Namespace, resourceQuotaList *api.ResourceQuotaList, limitRangeList *api.LimitRangeList) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", namespace.Name)
|
|
printLabelsMultiline(w, "Labels", namespace.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", namespace.Annotations)
|
|
w.Write(LEVEL_0, "Status:\t%s\n", string(namespace.Status.Phase))
|
|
if resourceQuotaList != nil {
|
|
w.Write(LEVEL_0, "\n")
|
|
DescribeResourceQuotas(resourceQuotaList, w)
|
|
}
|
|
if limitRangeList != nil {
|
|
w.Write(LEVEL_0, "\n")
|
|
DescribeLimitRanges(limitRangeList, w)
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func describeLimitRangeSpec(spec api.LimitRangeSpec, prefix string, w PrefixWriter) {
|
|
for i := range spec.Limits {
|
|
item := spec.Limits[i]
|
|
maxResources := item.Max
|
|
minResources := item.Min
|
|
defaultLimitResources := item.Default
|
|
defaultRequestResources := item.DefaultRequest
|
|
ratio := item.MaxLimitRequestRatio
|
|
|
|
set := map[api.ResourceName]bool{}
|
|
for k := range maxResources {
|
|
set[k] = true
|
|
}
|
|
for k := range minResources {
|
|
set[k] = true
|
|
}
|
|
for k := range defaultLimitResources {
|
|
set[k] = true
|
|
}
|
|
for k := range defaultRequestResources {
|
|
set[k] = true
|
|
}
|
|
for k := range ratio {
|
|
set[k] = true
|
|
}
|
|
|
|
for k := range set {
|
|
// if no value is set, we output -
|
|
maxValue := "-"
|
|
minValue := "-"
|
|
defaultLimitValue := "-"
|
|
defaultRequestValue := "-"
|
|
ratioValue := "-"
|
|
|
|
maxQuantity, maxQuantityFound := maxResources[k]
|
|
if maxQuantityFound {
|
|
maxValue = maxQuantity.String()
|
|
}
|
|
|
|
minQuantity, minQuantityFound := minResources[k]
|
|
if minQuantityFound {
|
|
minValue = minQuantity.String()
|
|
}
|
|
|
|
defaultLimitQuantity, defaultLimitQuantityFound := defaultLimitResources[k]
|
|
if defaultLimitQuantityFound {
|
|
defaultLimitValue = defaultLimitQuantity.String()
|
|
}
|
|
|
|
defaultRequestQuantity, defaultRequestQuantityFound := defaultRequestResources[k]
|
|
if defaultRequestQuantityFound {
|
|
defaultRequestValue = defaultRequestQuantity.String()
|
|
}
|
|
|
|
ratioQuantity, ratioQuantityFound := ratio[k]
|
|
if ratioQuantityFound {
|
|
ratioValue = ratioQuantity.String()
|
|
}
|
|
|
|
msg := "%s%s\t%v\t%v\t%v\t%v\t%v\t%v\n"
|
|
w.Write(LEVEL_0, msg, prefix, item.Type, k, minValue, maxValue, defaultRequestValue, defaultLimitValue, ratioValue)
|
|
}
|
|
}
|
|
}
|
|
|
|
// DescribeLimitRanges merges a set of limit range items into a single tabular description
|
|
func DescribeLimitRanges(limitRanges *api.LimitRangeList, w PrefixWriter) {
|
|
if len(limitRanges.Items) == 0 {
|
|
w.Write(LEVEL_0, "No resource limits.\n")
|
|
return
|
|
}
|
|
w.Write(LEVEL_0, "Resource Limits\n Type\tResource\tMin\tMax\tDefault Request\tDefault Limit\tMax Limit/Request Ratio\n")
|
|
w.Write(LEVEL_0, " ----\t--------\t---\t---\t---------------\t-------------\t-----------------------\n")
|
|
for _, limitRange := range limitRanges.Items {
|
|
describeLimitRangeSpec(limitRange.Spec, " ", w)
|
|
}
|
|
}
|
|
|
|
// DescribeResourceQuotas merges a set of quota items into a single tabular description of all quotas
|
|
func DescribeResourceQuotas(quotas *api.ResourceQuotaList, w PrefixWriter) {
|
|
if len(quotas.Items) == 0 {
|
|
w.Write(LEVEL_0, "No resource quota.\n")
|
|
return
|
|
}
|
|
sort.Sort(SortableResourceQuotas(quotas.Items))
|
|
|
|
w.Write(LEVEL_0, "Resource Quotas")
|
|
for _, q := range quotas.Items {
|
|
w.Write(LEVEL_0, "\n Name:\t%s\n", q.Name)
|
|
if len(q.Spec.Scopes) > 0 {
|
|
scopes := make([]string, 0, len(q.Spec.Scopes))
|
|
for _, scope := range q.Spec.Scopes {
|
|
scopes = append(scopes, string(scope))
|
|
}
|
|
sort.Strings(scopes)
|
|
w.Write(LEVEL_0, " Scopes:\t%s\n", strings.Join(scopes, ", "))
|
|
for _, scope := range scopes {
|
|
helpText := helpTextForResourceQuotaScope(api.ResourceQuotaScope(scope))
|
|
if len(helpText) > 0 {
|
|
w.Write(LEVEL_0, " * %s\n", helpText)
|
|
}
|
|
}
|
|
}
|
|
|
|
w.Write(LEVEL_0, " Resource\tUsed\tHard\n")
|
|
w.Write(LEVEL_0, " --------\t---\t---\n")
|
|
|
|
resources := make([]api.ResourceName, 0, len(q.Status.Hard))
|
|
for resource := range q.Status.Hard {
|
|
resources = append(resources, resource)
|
|
}
|
|
sort.Sort(SortableResourceNames(resources))
|
|
|
|
for _, resource := range resources {
|
|
hardQuantity := q.Status.Hard[resource]
|
|
usedQuantity := q.Status.Used[resource]
|
|
w.Write(LEVEL_0, " %s\t%s\t%s\n", string(resource), usedQuantity.String(), hardQuantity.String())
|
|
}
|
|
}
|
|
}
|
|
|
|
// LimitRangeDescriber generates information about a limit range
|
|
type LimitRangeDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *LimitRangeDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
lr := d.Core().LimitRanges(namespace)
|
|
|
|
limitRange, err := lr.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return describeLimitRange(limitRange)
|
|
}
|
|
|
|
func describeLimitRange(limitRange *api.LimitRange) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", limitRange.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", limitRange.Namespace)
|
|
w.Write(LEVEL_0, "Type\tResource\tMin\tMax\tDefault Request\tDefault Limit\tMax Limit/Request Ratio\n")
|
|
w.Write(LEVEL_0, "----\t--------\t---\t---\t---------------\t-------------\t-----------------------\n")
|
|
describeLimitRangeSpec(limitRange.Spec, "", w)
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// ResourceQuotaDescriber generates information about a resource quota
|
|
type ResourceQuotaDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *ResourceQuotaDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
rq := d.Core().ResourceQuotas(namespace)
|
|
|
|
resourceQuota, err := rq.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return describeQuota(resourceQuota)
|
|
}
|
|
|
|
func helpTextForResourceQuotaScope(scope api.ResourceQuotaScope) string {
|
|
switch scope {
|
|
case api.ResourceQuotaScopeTerminating:
|
|
return "Matches all pods that have an active deadline. These pods have a limited lifespan on a node before being actively terminated by the system."
|
|
case api.ResourceQuotaScopeNotTerminating:
|
|
return "Matches all pods that do not have an active deadline. These pods usually include long running pods whose container command is not expected to terminate."
|
|
case api.ResourceQuotaScopeBestEffort:
|
|
return "Matches all pods that do not have resource requirements set. These pods have a best effort quality of service."
|
|
case api.ResourceQuotaScopeNotBestEffort:
|
|
return "Matches all pods that have at least one resource requirement set. These pods have a burstable or guaranteed quality of service."
|
|
default:
|
|
return ""
|
|
}
|
|
}
|
|
func describeQuota(resourceQuota *api.ResourceQuota) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", resourceQuota.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", resourceQuota.Namespace)
|
|
if len(resourceQuota.Spec.Scopes) > 0 {
|
|
scopes := make([]string, 0, len(resourceQuota.Spec.Scopes))
|
|
for _, scope := range resourceQuota.Spec.Scopes {
|
|
scopes = append(scopes, string(scope))
|
|
}
|
|
sort.Strings(scopes)
|
|
w.Write(LEVEL_0, "Scopes:\t%s\n", strings.Join(scopes, ", "))
|
|
for _, scope := range scopes {
|
|
helpText := helpTextForResourceQuotaScope(api.ResourceQuotaScope(scope))
|
|
if len(helpText) > 0 {
|
|
w.Write(LEVEL_0, " * %s\n", helpText)
|
|
}
|
|
}
|
|
}
|
|
w.Write(LEVEL_0, "Resource\tUsed\tHard\n")
|
|
w.Write(LEVEL_0, "--------\t----\t----\n")
|
|
|
|
resources := make([]api.ResourceName, 0, len(resourceQuota.Status.Hard))
|
|
for resource := range resourceQuota.Status.Hard {
|
|
resources = append(resources, resource)
|
|
}
|
|
sort.Sort(SortableResourceNames(resources))
|
|
|
|
msg := "%v\t%v\t%v\n"
|
|
for i := range resources {
|
|
resource := resources[i]
|
|
hardQuantity := resourceQuota.Status.Hard[resource]
|
|
usedQuantity := resourceQuota.Status.Used[resource]
|
|
w.Write(LEVEL_0, msg, resource, usedQuantity.String(), hardQuantity.String())
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// PodDescriber generates information about a pod and the replication controllers that
|
|
// create it.
|
|
type PodDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *PodDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
pod, err := d.Core().Pods(namespace).Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
if describerSettings.ShowEvents {
|
|
eventsInterface := d.Core().Events(namespace)
|
|
selector := eventsInterface.GetFieldSelector(&name, &namespace, nil, nil)
|
|
options := metav1.ListOptions{FieldSelector: selector.String()}
|
|
events, err2 := eventsInterface.List(options)
|
|
if describerSettings.ShowEvents && err2 == nil && len(events.Items) > 0 {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Pod '%v': error '%v', but found events.\n", name, err)
|
|
DescribeEvents(events, w)
|
|
return nil
|
|
})
|
|
}
|
|
}
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
if ref, err := ref.GetReference(legacyscheme.Scheme, pod); err != nil {
|
|
glog.Errorf("Unable to construct reference to '%#v': %v", pod, err)
|
|
} else {
|
|
ref.Kind = ""
|
|
events, _ = d.Core().Events(namespace).Search(legacyscheme.Scheme, ref)
|
|
}
|
|
}
|
|
|
|
return describePod(pod, events)
|
|
}
|
|
|
|
func describePod(pod *api.Pod, events *api.EventList) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", pod.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", pod.Namespace)
|
|
if pod.Spec.Priority != nil {
|
|
w.Write(LEVEL_0, "Priority:\t%d\n", *pod.Spec.Priority)
|
|
w.Write(LEVEL_0, "PriorityClassName:\t%s\n", stringOrNone(pod.Spec.PriorityClassName))
|
|
}
|
|
if pod.Spec.NodeName == "" {
|
|
w.Write(LEVEL_0, "Node:\t<none>\n")
|
|
} else {
|
|
w.Write(LEVEL_0, "Node:\t%s\n", pod.Spec.NodeName+"/"+pod.Status.HostIP)
|
|
}
|
|
if pod.Status.StartTime != nil {
|
|
w.Write(LEVEL_0, "Start Time:\t%s\n", pod.Status.StartTime.Time.Format(time.RFC1123Z))
|
|
}
|
|
printLabelsMultiline(w, "Labels", pod.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", pod.Annotations)
|
|
if pod.DeletionTimestamp != nil {
|
|
w.Write(LEVEL_0, "Status:\tTerminating (lasts %s)\n", translateTimestamp(*pod.DeletionTimestamp))
|
|
w.Write(LEVEL_0, "Termination Grace Period:\t%ds\n", *pod.DeletionGracePeriodSeconds)
|
|
} else {
|
|
w.Write(LEVEL_0, "Status:\t%s\n", string(pod.Status.Phase))
|
|
}
|
|
if len(pod.Status.Reason) > 0 {
|
|
w.Write(LEVEL_0, "Reason:\t%s\n", pod.Status.Reason)
|
|
}
|
|
if len(pod.Status.Message) > 0 {
|
|
w.Write(LEVEL_0, "Message:\t%s\n", pod.Status.Message)
|
|
}
|
|
w.Write(LEVEL_0, "IP:\t%s\n", pod.Status.PodIP)
|
|
if controlledBy := printController(pod); len(controlledBy) > 0 {
|
|
w.Write(LEVEL_0, "Controlled By:\t%s\n", controlledBy)
|
|
}
|
|
if len(pod.Status.NominatedNodeName) > 0 {
|
|
w.Write(LEVEL_0, "NominatedNodeName:\t%s\n", pod.Status.NominatedNodeName)
|
|
}
|
|
|
|
if len(pod.Spec.InitContainers) > 0 {
|
|
describeContainers("Init Containers", pod.Spec.InitContainers, pod.Status.InitContainerStatuses, EnvValueRetriever(pod), w, "")
|
|
}
|
|
describeContainers("Containers", pod.Spec.Containers, pod.Status.ContainerStatuses, EnvValueRetriever(pod), w, "")
|
|
if len(pod.Status.Conditions) > 0 {
|
|
w.Write(LEVEL_0, "Conditions:\n Type\tStatus\n")
|
|
for _, c := range pod.Status.Conditions {
|
|
w.Write(LEVEL_1, "%v \t%v \n",
|
|
c.Type,
|
|
c.Status)
|
|
}
|
|
}
|
|
describeVolumes(pod.Spec.Volumes, w, "")
|
|
if pod.Status.QOSClass != "" {
|
|
w.Write(LEVEL_0, "QoS Class:\t%s\n", pod.Status.QOSClass)
|
|
} else {
|
|
w.Write(LEVEL_0, "QoS Class:\t%s\n", qos.GetPodQOS(pod))
|
|
}
|
|
printLabelsMultiline(w, "Node-Selectors", pod.Spec.NodeSelector)
|
|
printPodTolerationsMultiline(w, "Tolerations", pod.Spec.Tolerations)
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func printController(controllee metav1.Object) string {
|
|
if controllerRef := metav1.GetControllerOf(controllee); controllerRef != nil {
|
|
return fmt.Sprintf("%s/%s", controllerRef.Kind, controllerRef.Name)
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func describeVolumes(volumes []api.Volume, w PrefixWriter, space string) {
|
|
if volumes == nil || len(volumes) == 0 {
|
|
w.Write(LEVEL_0, "%sVolumes:\t<none>\n", space)
|
|
return
|
|
}
|
|
w.Write(LEVEL_0, "%sVolumes:\n", space)
|
|
for _, volume := range volumes {
|
|
nameIndent := ""
|
|
if len(space) > 0 {
|
|
nameIndent = " "
|
|
}
|
|
w.Write(LEVEL_1, "%s%v:\n", nameIndent, volume.Name)
|
|
switch {
|
|
case volume.VolumeSource.HostPath != nil:
|
|
printHostPathVolumeSource(volume.VolumeSource.HostPath, w)
|
|
case volume.VolumeSource.EmptyDir != nil:
|
|
printEmptyDirVolumeSource(volume.VolumeSource.EmptyDir, w)
|
|
case volume.VolumeSource.GCEPersistentDisk != nil:
|
|
printGCEPersistentDiskVolumeSource(volume.VolumeSource.GCEPersistentDisk, w)
|
|
case volume.VolumeSource.AWSElasticBlockStore != nil:
|
|
printAWSElasticBlockStoreVolumeSource(volume.VolumeSource.AWSElasticBlockStore, w)
|
|
case volume.VolumeSource.GitRepo != nil:
|
|
printGitRepoVolumeSource(volume.VolumeSource.GitRepo, w)
|
|
case volume.VolumeSource.Secret != nil:
|
|
printSecretVolumeSource(volume.VolumeSource.Secret, w)
|
|
case volume.VolumeSource.ConfigMap != nil:
|
|
printConfigMapVolumeSource(volume.VolumeSource.ConfigMap, w)
|
|
case volume.VolumeSource.NFS != nil:
|
|
printNFSVolumeSource(volume.VolumeSource.NFS, w)
|
|
case volume.VolumeSource.ISCSI != nil:
|
|
printISCSIVolumeSource(volume.VolumeSource.ISCSI, w)
|
|
case volume.VolumeSource.Glusterfs != nil:
|
|
printGlusterfsVolumeSource(volume.VolumeSource.Glusterfs, w)
|
|
case volume.VolumeSource.PersistentVolumeClaim != nil:
|
|
printPersistentVolumeClaimVolumeSource(volume.VolumeSource.PersistentVolumeClaim, w)
|
|
case volume.VolumeSource.RBD != nil:
|
|
printRBDVolumeSource(volume.VolumeSource.RBD, w)
|
|
case volume.VolumeSource.Quobyte != nil:
|
|
printQuobyteVolumeSource(volume.VolumeSource.Quobyte, w)
|
|
case volume.VolumeSource.DownwardAPI != nil:
|
|
printDownwardAPIVolumeSource(volume.VolumeSource.DownwardAPI, w)
|
|
case volume.VolumeSource.AzureDisk != nil:
|
|
printAzureDiskVolumeSource(volume.VolumeSource.AzureDisk, w)
|
|
case volume.VolumeSource.VsphereVolume != nil:
|
|
printVsphereVolumeSource(volume.VolumeSource.VsphereVolume, w)
|
|
case volume.VolumeSource.Cinder != nil:
|
|
printCinderVolumeSource(volume.VolumeSource.Cinder, w)
|
|
case volume.VolumeSource.PhotonPersistentDisk != nil:
|
|
printPhotonPersistentDiskVolumeSource(volume.VolumeSource.PhotonPersistentDisk, w)
|
|
case volume.VolumeSource.PortworxVolume != nil:
|
|
printPortworxVolumeSource(volume.VolumeSource.PortworxVolume, w)
|
|
case volume.VolumeSource.ScaleIO != nil:
|
|
printScaleIOVolumeSource(volume.VolumeSource.ScaleIO, w)
|
|
case volume.VolumeSource.CephFS != nil:
|
|
printCephFSVolumeSource(volume.VolumeSource.CephFS, w)
|
|
case volume.VolumeSource.StorageOS != nil:
|
|
printStorageOSVolumeSource(volume.VolumeSource.StorageOS, w)
|
|
case volume.VolumeSource.FC != nil:
|
|
printFCVolumeSource(volume.VolumeSource.FC, w)
|
|
case volume.VolumeSource.AzureFile != nil:
|
|
printAzureFileVolumeSource(volume.VolumeSource.AzureFile, w)
|
|
case volume.VolumeSource.FlexVolume != nil:
|
|
printFlexVolumeSource(volume.VolumeSource.FlexVolume, w)
|
|
case volume.VolumeSource.Flocker != nil:
|
|
printFlockerVolumeSource(volume.VolumeSource.Flocker, w)
|
|
default:
|
|
w.Write(LEVEL_1, "<unknown>\n")
|
|
}
|
|
}
|
|
}
|
|
|
|
func printHostPathVolumeSource(hostPath *api.HostPathVolumeSource, w PrefixWriter) {
|
|
hostPathType := "<none>"
|
|
if hostPath.Type != nil {
|
|
hostPathType = string(*hostPath.Type)
|
|
}
|
|
w.Write(LEVEL_2, "Type:\tHostPath (bare host directory volume)\n"+
|
|
" Path:\t%v\n"+
|
|
" HostPathType:\t%v\n",
|
|
hostPath.Path, hostPathType)
|
|
}
|
|
|
|
func printEmptyDirVolumeSource(emptyDir *api.EmptyDirVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tEmptyDir (a temporary directory that shares a pod's lifetime)\n"+
|
|
" Medium:\t%v\n", emptyDir.Medium)
|
|
}
|
|
|
|
func printGCEPersistentDiskVolumeSource(gce *api.GCEPersistentDiskVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tGCEPersistentDisk (a Persistent Disk resource in Google Compute Engine)\n"+
|
|
" PDName:\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" Partition:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
gce.PDName, gce.FSType, gce.Partition, gce.ReadOnly)
|
|
}
|
|
|
|
func printAWSElasticBlockStoreVolumeSource(aws *api.AWSElasticBlockStoreVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tAWSElasticBlockStore (a Persistent Disk resource in AWS)\n"+
|
|
" VolumeID:\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" Partition:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
aws.VolumeID, aws.FSType, aws.Partition, aws.ReadOnly)
|
|
}
|
|
|
|
func printGitRepoVolumeSource(git *api.GitRepoVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tGitRepo (a volume that is pulled from git when the pod is created)\n"+
|
|
" Repository:\t%v\n"+
|
|
" Revision:\t%v\n",
|
|
git.Repository, git.Revision)
|
|
}
|
|
|
|
func printSecretVolumeSource(secret *api.SecretVolumeSource, w PrefixWriter) {
|
|
optional := secret.Optional != nil && *secret.Optional
|
|
w.Write(LEVEL_2, "Type:\tSecret (a volume populated by a Secret)\n"+
|
|
" SecretName:\t%v\n"+
|
|
" Optional:\t%v\n",
|
|
secret.SecretName, optional)
|
|
}
|
|
|
|
func printConfigMapVolumeSource(configMap *api.ConfigMapVolumeSource, w PrefixWriter) {
|
|
optional := configMap.Optional != nil && *configMap.Optional
|
|
w.Write(LEVEL_2, "Type:\tConfigMap (a volume populated by a ConfigMap)\n"+
|
|
" Name:\t%v\n"+
|
|
" Optional:\t%v\n",
|
|
configMap.Name, optional)
|
|
}
|
|
|
|
func printNFSVolumeSource(nfs *api.NFSVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tNFS (an NFS mount that lasts the lifetime of a pod)\n"+
|
|
" Server:\t%v\n"+
|
|
" Path:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
nfs.Server, nfs.Path, nfs.ReadOnly)
|
|
}
|
|
|
|
func printQuobyteVolumeSource(quobyte *api.QuobyteVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tQuobyte (a Quobyte mount on the host that shares a pod's lifetime)\n"+
|
|
" Registry:\t%v\n"+
|
|
" Volume:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
quobyte.Registry, quobyte.Volume, quobyte.ReadOnly)
|
|
}
|
|
|
|
func printPortworxVolumeSource(pwxVolume *api.PortworxVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tPortworxVolume (a Portworx Volume resource)\n"+
|
|
" VolumeID:\t%v\n",
|
|
pwxVolume.VolumeID)
|
|
}
|
|
|
|
func printISCSIVolumeSource(iscsi *api.ISCSIVolumeSource, w PrefixWriter) {
|
|
initiator := "<none>"
|
|
if iscsi.InitiatorName != nil {
|
|
initiator = *iscsi.InitiatorName
|
|
}
|
|
w.Write(LEVEL_2, "Type:\tISCSI (an ISCSI Disk resource that is attached to a kubelet's host machine and then exposed to the pod)\n"+
|
|
" TargetPortal:\t%v\n"+
|
|
" IQN:\t%v\n"+
|
|
" Lun:\t%v\n"+
|
|
" ISCSIInterface\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" ReadOnly:\t%v\n"+
|
|
" Portals:\t%v\n"+
|
|
" DiscoveryCHAPAuth:\t%v\n"+
|
|
" SessionCHAPAuth:\t%v\n"+
|
|
" SecretRef:\t%v\n"+
|
|
" InitiatorName:\t%v\n",
|
|
iscsi.TargetPortal, iscsi.IQN, iscsi.Lun, iscsi.ISCSIInterface, iscsi.FSType, iscsi.ReadOnly, iscsi.Portals, iscsi.DiscoveryCHAPAuth, iscsi.SessionCHAPAuth, iscsi.SecretRef, initiator)
|
|
}
|
|
|
|
func printISCSIPersistentVolumeSource(iscsi *api.ISCSIPersistentVolumeSource, w PrefixWriter) {
|
|
initiatorName := "<none>"
|
|
if iscsi.InitiatorName != nil {
|
|
initiatorName = *iscsi.InitiatorName
|
|
}
|
|
w.Write(LEVEL_2, "Type:\tISCSI (an ISCSI Disk resource that is attached to a kubelet's host machine and then exposed to the pod)\n"+
|
|
" TargetPortal:\t%v\n"+
|
|
" IQN:\t%v\n"+
|
|
" Lun:\t%v\n"+
|
|
" ISCSIInterface\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" ReadOnly:\t%v\n"+
|
|
" Portals:\t%v\n"+
|
|
" DiscoveryCHAPAuth:\t%v\n"+
|
|
" SessionCHAPAuth:\t%v\n"+
|
|
" SecretRef:\t%v\n"+
|
|
" InitiatorName:\t%v\n",
|
|
iscsi.TargetPortal, iscsi.IQN, iscsi.Lun, iscsi.ISCSIInterface, iscsi.FSType, iscsi.ReadOnly, iscsi.Portals, iscsi.DiscoveryCHAPAuth, iscsi.SessionCHAPAuth, iscsi.SecretRef, initiatorName)
|
|
}
|
|
|
|
func printGlusterfsVolumeSource(glusterfs *api.GlusterfsVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tGlusterfs (a Glusterfs mount on the host that shares a pod's lifetime)\n"+
|
|
" EndpointsName:\t%v\n"+
|
|
" Path:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
glusterfs.EndpointsName, glusterfs.Path, glusterfs.ReadOnly)
|
|
}
|
|
|
|
func printPersistentVolumeClaimVolumeSource(claim *api.PersistentVolumeClaimVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tPersistentVolumeClaim (a reference to a PersistentVolumeClaim in the same namespace)\n"+
|
|
" ClaimName:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
claim.ClaimName, claim.ReadOnly)
|
|
}
|
|
|
|
func printRBDVolumeSource(rbd *api.RBDVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tRBD (a Rados Block Device mount on the host that shares a pod's lifetime)\n"+
|
|
" CephMonitors:\t%v\n"+
|
|
" RBDImage:\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" RBDPool:\t%v\n"+
|
|
" RadosUser:\t%v\n"+
|
|
" Keyring:\t%v\n"+
|
|
" SecretRef:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
rbd.CephMonitors, rbd.RBDImage, rbd.FSType, rbd.RBDPool, rbd.RadosUser, rbd.Keyring, rbd.SecretRef, rbd.ReadOnly)
|
|
}
|
|
|
|
func printRBDPersistentVolumeSource(rbd *api.RBDPersistentVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tRBD (a Rados Block Device mount on the host that shares a pod's lifetime)\n"+
|
|
" CephMonitors:\t%v\n"+
|
|
" RBDImage:\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" RBDPool:\t%v\n"+
|
|
" RadosUser:\t%v\n"+
|
|
" Keyring:\t%v\n"+
|
|
" SecretRef:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
rbd.CephMonitors, rbd.RBDImage, rbd.FSType, rbd.RBDPool, rbd.RadosUser, rbd.Keyring, rbd.SecretRef, rbd.ReadOnly)
|
|
}
|
|
|
|
func printDownwardAPIVolumeSource(d *api.DownwardAPIVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tDownwardAPI (a volume populated by information about the pod)\n Items:\n")
|
|
for _, mapping := range d.Items {
|
|
if mapping.FieldRef != nil {
|
|
w.Write(LEVEL_3, "%v -> %v\n", mapping.FieldRef.FieldPath, mapping.Path)
|
|
}
|
|
if mapping.ResourceFieldRef != nil {
|
|
w.Write(LEVEL_3, "%v -> %v\n", mapping.ResourceFieldRef.Resource, mapping.Path)
|
|
}
|
|
}
|
|
}
|
|
|
|
func printAzureDiskVolumeSource(d *api.AzureDiskVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tAzureDisk (an Azure Data Disk mount on the host and bind mount to the pod)\n"+
|
|
" DiskName:\t%v\n"+
|
|
" DiskURI:\t%v\n"+
|
|
" Kind: \t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" CachingMode:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
d.DiskName, d.DataDiskURI, *d.Kind, *d.FSType, *d.CachingMode, *d.ReadOnly)
|
|
}
|
|
|
|
func printVsphereVolumeSource(vsphere *api.VsphereVirtualDiskVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tvSphereVolume (a Persistent Disk resource in vSphere)\n"+
|
|
" VolumePath:\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" StoragePolicyName:\t%v\n",
|
|
vsphere.VolumePath, vsphere.FSType, vsphere.StoragePolicyName)
|
|
}
|
|
|
|
func printPhotonPersistentDiskVolumeSource(photon *api.PhotonPersistentDiskVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tPhotonPersistentDisk (a Persistent Disk resource in photon platform)\n"+
|
|
" PdID:\t%v\n"+
|
|
" FSType:\t%v\n",
|
|
photon.PdID, photon.FSType)
|
|
}
|
|
|
|
func printCinderVolumeSource(cinder *api.CinderVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tCinder (a Persistent Disk resource in OpenStack)\n"+
|
|
" VolumeID:\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
" SecretRef:\t%v\n"+
|
|
cinder.VolumeID, cinder.FSType, cinder.ReadOnly, cinder.SecretRef)
|
|
}
|
|
|
|
func printCinderPersistentVolumeSource(cinder *api.CinderPersistentVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tCinder (a Persistent Disk resource in OpenStack)\n"+
|
|
" VolumeID:\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
" SecretRef:\t%v\n"+
|
|
cinder.VolumeID, cinder.SecretRef, cinder.FSType, cinder.ReadOnly, cinder.SecretRef)
|
|
}
|
|
|
|
func printScaleIOVolumeSource(sio *api.ScaleIOVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tScaleIO (a persistent volume backed by a block device in ScaleIO)\n"+
|
|
" Gateway:\t%v\n"+
|
|
" System:\t%v\n"+
|
|
" Protection Domain:\t%v\n"+
|
|
" Storage Pool:\t%v\n"+
|
|
" Storage Mode:\t%v\n"+
|
|
" VolumeName:\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
sio.Gateway, sio.System, sio.ProtectionDomain, sio.StoragePool, sio.StorageMode, sio.VolumeName, sio.FSType, sio.ReadOnly)
|
|
}
|
|
|
|
func printScaleIOPersistentVolumeSource(sio *api.ScaleIOPersistentVolumeSource, w PrefixWriter) {
|
|
var secretNS, secretName string
|
|
if sio.SecretRef != nil {
|
|
secretName = sio.SecretRef.Name
|
|
secretNS = sio.SecretRef.Namespace
|
|
}
|
|
w.Write(LEVEL_2, "Type:\tScaleIO (a persistent volume backed by a block device in ScaleIO)\n"+
|
|
" Gateway:\t%v\n"+
|
|
" System:\t%v\n"+
|
|
" Protection Domain:\t%v\n"+
|
|
" Storage Pool:\t%v\n"+
|
|
" Storage Mode:\t%v\n"+
|
|
" VolumeName:\t%v\n"+
|
|
" SecretName:\t%v\n"+
|
|
" SecretNamespace:\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
sio.Gateway, sio.System, sio.ProtectionDomain, sio.StoragePool, sio.StorageMode, sio.VolumeName, secretName, secretNS, sio.FSType, sio.ReadOnly)
|
|
}
|
|
|
|
func printLocalVolumeSource(ls *api.LocalVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tLocalVolume (a persistent volume backed by local storage on a node)\n"+
|
|
" Path:\t%v\n",
|
|
ls.Path)
|
|
}
|
|
|
|
func printCephFSVolumeSource(cephfs *api.CephFSVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tCephFS (a CephFS mount on the host that shares a pod's lifetime)\n"+
|
|
" Monitors:\t%v\n"+
|
|
" Path:\t%v\n"+
|
|
" User:\t%v\n"+
|
|
" SecretFile:\t%v\n"+
|
|
" SecretRef:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
cephfs.Monitors, cephfs.Path, cephfs.User, cephfs.SecretFile, cephfs.SecretRef, cephfs.ReadOnly)
|
|
}
|
|
|
|
func printCephFSPersistentVolumeSource(cephfs *api.CephFSPersistentVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tCephFS (a CephFS mount on the host that shares a pod's lifetime)\n"+
|
|
" Monitors:\t%v\n"+
|
|
" Path:\t%v\n"+
|
|
" User:\t%v\n"+
|
|
" SecretFile:\t%v\n"+
|
|
" SecretRef:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
cephfs.Monitors, cephfs.Path, cephfs.User, cephfs.SecretFile, cephfs.SecretRef, cephfs.ReadOnly)
|
|
}
|
|
|
|
func printStorageOSVolumeSource(storageos *api.StorageOSVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tStorageOS (a StorageOS Persistent Disk resource)\n"+
|
|
" VolumeName:\t%v\n"+
|
|
" VolumeNamespace:\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
storageos.VolumeName, storageos.VolumeNamespace, storageos.FSType, storageos.ReadOnly)
|
|
}
|
|
|
|
func printStorageOSPersistentVolumeSource(storageos *api.StorageOSPersistentVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tStorageOS (a StorageOS Persistent Disk resource)\n"+
|
|
" VolumeName:\t%v\n"+
|
|
" VolumeNamespace:\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
storageos.VolumeName, storageos.VolumeNamespace, storageos.FSType, storageos.ReadOnly)
|
|
}
|
|
|
|
func printFCVolumeSource(fc *api.FCVolumeSource, w PrefixWriter) {
|
|
lun := "<none>"
|
|
if fc.Lun != nil {
|
|
lun = strconv.Itoa(int(*fc.Lun))
|
|
}
|
|
w.Write(LEVEL_2, "Type:\tFC (a Fibre Channel disk)\n"+
|
|
" TargetWWNs:\t%v\n"+
|
|
" LUN:\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
strings.Join(fc.TargetWWNs, ", "), lun, fc.FSType, fc.ReadOnly)
|
|
}
|
|
|
|
func printAzureFileVolumeSource(azureFile *api.AzureFileVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tAzureFile (an Azure File Service mount on the host and bind mount to the pod)\n"+
|
|
" SecretName:\t%v\n"+
|
|
" ShareName:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
azureFile.SecretName, azureFile.ShareName, azureFile.ReadOnly)
|
|
}
|
|
|
|
func printAzureFilePersistentVolumeSource(azureFile *api.AzureFilePersistentVolumeSource, w PrefixWriter) {
|
|
ns := ""
|
|
if azureFile.SecretNamespace != nil {
|
|
ns = *azureFile.SecretNamespace
|
|
}
|
|
w.Write(LEVEL_2, "Type:\tAzureFile (an Azure File Service mount on the host and bind mount to the pod)\n"+
|
|
" SecretName:\t%v\n"+
|
|
" SecretNamespace:\t%v\n"+
|
|
" ShareName:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
azureFile.SecretName, ns, azureFile.ShareName, azureFile.ReadOnly)
|
|
}
|
|
|
|
func printFlexPersistentVolumeSource(flex *api.FlexPersistentVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tFlexVolume (a generic volume resource that is provisioned/attached using an exec based plugin)\n"+
|
|
" Driver:\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" SecretRef:\t%v\n"+
|
|
" ReadOnly:\t%v\n"+
|
|
" Options:\t%v\n",
|
|
flex.Driver, flex.FSType, flex.SecretRef, flex.ReadOnly, flex.Options)
|
|
}
|
|
|
|
func printFlexVolumeSource(flex *api.FlexVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tFlexVolume (a generic volume resource that is provisioned/attached using an exec based plugin)\n"+
|
|
" Driver:\t%v\n"+
|
|
" FSType:\t%v\n"+
|
|
" SecretRef:\t%v\n"+
|
|
" ReadOnly:\t%v\n"+
|
|
" Options:\t%v\n",
|
|
flex.Driver, flex.FSType, flex.SecretRef, flex.ReadOnly, flex.Options)
|
|
}
|
|
|
|
func printFlockerVolumeSource(flocker *api.FlockerVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tFlocker (a Flocker volume mounted by the Flocker agent)\n"+
|
|
" DatasetName:\t%v\n"+
|
|
" DatasetUUID:\t%v\n",
|
|
flocker.DatasetName, flocker.DatasetUUID)
|
|
}
|
|
|
|
func printCSIPersistentVolumeSource(csi *api.CSIPersistentVolumeSource, w PrefixWriter) {
|
|
w.Write(LEVEL_2, "Type:\tCSI (a Container Storage Interface (CSI) volume source)\n"+
|
|
" Driver:\t%v\n"+
|
|
" VolumeHandle:\t%v\n"+
|
|
" ReadOnly:\t%v\n",
|
|
csi.Driver, csi.VolumeHandle, csi.ReadOnly)
|
|
}
|
|
|
|
type PersistentVolumeDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *PersistentVolumeDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
c := d.Core().PersistentVolumes()
|
|
|
|
pv, err := c.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = d.Core().Events(namespace).Search(legacyscheme.Scheme, pv)
|
|
}
|
|
|
|
return describePersistentVolume(pv, events)
|
|
}
|
|
|
|
func printVolumeNodeAffinity(w PrefixWriter, affinity *api.VolumeNodeAffinity) {
|
|
w.Write(LEVEL_0, "Node Affinity:\t")
|
|
if affinity == nil || affinity.Required == nil {
|
|
w.WriteLine("<none>")
|
|
return
|
|
}
|
|
w.WriteLine("")
|
|
|
|
if affinity.Required != nil {
|
|
w.Write(LEVEL_1, "Required Terms:\t")
|
|
if len(affinity.Required.NodeSelectorTerms) == 0 {
|
|
w.WriteLine("<none>")
|
|
} else {
|
|
w.WriteLine("")
|
|
for i, term := range affinity.Required.NodeSelectorTerms {
|
|
printNodeSelectorTermsMultilineWithIndent(w, LEVEL_2, fmt.Sprintf("Term %v", i), "\t", term.MatchExpressions)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// printLabelsMultiline prints multiple labels with a user-defined alignment.
|
|
func printNodeSelectorTermsMultilineWithIndent(w PrefixWriter, indentLevel int, title, innerIndent string, reqs []api.NodeSelectorRequirement) {
|
|
w.Write(indentLevel, "%s:%s", title, innerIndent)
|
|
|
|
if len(reqs) == 0 {
|
|
w.WriteLine("<none>")
|
|
return
|
|
}
|
|
|
|
for i, req := range reqs {
|
|
if i != 0 {
|
|
w.Write(indentLevel, "%s", innerIndent)
|
|
}
|
|
exprStr := fmt.Sprintf("%s %s", req.Key, strings.ToLower(string(req.Operator)))
|
|
if len(req.Values) > 0 {
|
|
exprStr = fmt.Sprintf("%s [%s]", exprStr, strings.Join(req.Values, ", "))
|
|
}
|
|
w.Write(LEVEL_0, "%s\n", exprStr)
|
|
}
|
|
}
|
|
|
|
func describePersistentVolume(pv *api.PersistentVolume, events *api.EventList) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", pv.Name)
|
|
printLabelsMultiline(w, "Labels", pv.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", pv.Annotations)
|
|
w.Write(LEVEL_0, "Finalizers:\t%v\n", pv.ObjectMeta.Finalizers)
|
|
w.Write(LEVEL_0, "StorageClass:\t%s\n", helper.GetPersistentVolumeClass(pv))
|
|
if pv.ObjectMeta.DeletionTimestamp != nil {
|
|
w.Write(LEVEL_0, "Status:\tTerminating (lasts %s)\n", translateTimestamp(*pv.ObjectMeta.DeletionTimestamp))
|
|
} else {
|
|
w.Write(LEVEL_0, "Status:\t%v\n", pv.Status.Phase)
|
|
}
|
|
if pv.Spec.ClaimRef != nil {
|
|
w.Write(LEVEL_0, "Claim:\t%s\n", pv.Spec.ClaimRef.Namespace+"/"+pv.Spec.ClaimRef.Name)
|
|
} else {
|
|
w.Write(LEVEL_0, "Claim:\t%s\n", "")
|
|
}
|
|
w.Write(LEVEL_0, "Reclaim Policy:\t%v\n", pv.Spec.PersistentVolumeReclaimPolicy)
|
|
w.Write(LEVEL_0, "Access Modes:\t%s\n", helper.GetAccessModesAsString(pv.Spec.AccessModes))
|
|
if pv.Spec.VolumeMode != nil {
|
|
w.Write(LEVEL_0, "VolumeMode:\t%v\n", *pv.Spec.VolumeMode)
|
|
}
|
|
storage := pv.Spec.Capacity[api.ResourceStorage]
|
|
w.Write(LEVEL_0, "Capacity:\t%s\n", storage.String())
|
|
printVolumeNodeAffinity(w, pv.Spec.NodeAffinity)
|
|
w.Write(LEVEL_0, "Message:\t%s\n", pv.Status.Message)
|
|
w.Write(LEVEL_0, "Source:\n")
|
|
|
|
switch {
|
|
case pv.Spec.HostPath != nil:
|
|
printHostPathVolumeSource(pv.Spec.HostPath, w)
|
|
case pv.Spec.GCEPersistentDisk != nil:
|
|
printGCEPersistentDiskVolumeSource(pv.Spec.GCEPersistentDisk, w)
|
|
case pv.Spec.AWSElasticBlockStore != nil:
|
|
printAWSElasticBlockStoreVolumeSource(pv.Spec.AWSElasticBlockStore, w)
|
|
case pv.Spec.NFS != nil:
|
|
printNFSVolumeSource(pv.Spec.NFS, w)
|
|
case pv.Spec.ISCSI != nil:
|
|
printISCSIPersistentVolumeSource(pv.Spec.ISCSI, w)
|
|
case pv.Spec.Glusterfs != nil:
|
|
printGlusterfsVolumeSource(pv.Spec.Glusterfs, w)
|
|
case pv.Spec.RBD != nil:
|
|
printRBDPersistentVolumeSource(pv.Spec.RBD, w)
|
|
case pv.Spec.Quobyte != nil:
|
|
printQuobyteVolumeSource(pv.Spec.Quobyte, w)
|
|
case pv.Spec.VsphereVolume != nil:
|
|
printVsphereVolumeSource(pv.Spec.VsphereVolume, w)
|
|
case pv.Spec.Cinder != nil:
|
|
printCinderPersistentVolumeSource(pv.Spec.Cinder, w)
|
|
case pv.Spec.AzureDisk != nil:
|
|
printAzureDiskVolumeSource(pv.Spec.AzureDisk, w)
|
|
case pv.Spec.PhotonPersistentDisk != nil:
|
|
printPhotonPersistentDiskVolumeSource(pv.Spec.PhotonPersistentDisk, w)
|
|
case pv.Spec.PortworxVolume != nil:
|
|
printPortworxVolumeSource(pv.Spec.PortworxVolume, w)
|
|
case pv.Spec.ScaleIO != nil:
|
|
printScaleIOPersistentVolumeSource(pv.Spec.ScaleIO, w)
|
|
case pv.Spec.Local != nil:
|
|
printLocalVolumeSource(pv.Spec.Local, w)
|
|
case pv.Spec.CephFS != nil:
|
|
printCephFSPersistentVolumeSource(pv.Spec.CephFS, w)
|
|
case pv.Spec.StorageOS != nil:
|
|
printStorageOSPersistentVolumeSource(pv.Spec.StorageOS, w)
|
|
case pv.Spec.FC != nil:
|
|
printFCVolumeSource(pv.Spec.FC, w)
|
|
case pv.Spec.AzureFile != nil:
|
|
printAzureFilePersistentVolumeSource(pv.Spec.AzureFile, w)
|
|
case pv.Spec.FlexVolume != nil:
|
|
printFlexPersistentVolumeSource(pv.Spec.FlexVolume, w)
|
|
case pv.Spec.Flocker != nil:
|
|
printFlockerVolumeSource(pv.Spec.Flocker, w)
|
|
case pv.Spec.CSI != nil:
|
|
printCSIPersistentVolumeSource(pv.Spec.CSI, w)
|
|
default:
|
|
w.Write(LEVEL_1, "<unknown>\n")
|
|
}
|
|
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
type PersistentVolumeClaimDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *PersistentVolumeClaimDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
c := d.Core().PersistentVolumeClaims(namespace)
|
|
|
|
pvc, err := c.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
events, _ := d.Core().Events(namespace).Search(legacyscheme.Scheme, pvc)
|
|
|
|
return describePersistentVolumeClaim(pvc, events)
|
|
}
|
|
|
|
func describePersistentVolumeClaim(pvc *api.PersistentVolumeClaim, events *api.EventList) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", pvc.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", pvc.Namespace)
|
|
w.Write(LEVEL_0, "StorageClass:\t%s\n", helper.GetPersistentVolumeClaimClass(pvc))
|
|
if pvc.ObjectMeta.DeletionTimestamp != nil {
|
|
w.Write(LEVEL_0, "Status:\tTerminating (lasts %s)\n", translateTimestamp(*pvc.ObjectMeta.DeletionTimestamp))
|
|
} else {
|
|
w.Write(LEVEL_0, "Status:\t%v\n", pvc.Status.Phase)
|
|
}
|
|
w.Write(LEVEL_0, "Volume:\t%s\n", pvc.Spec.VolumeName)
|
|
printLabelsMultiline(w, "Labels", pvc.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", pvc.Annotations)
|
|
w.Write(LEVEL_0, "Finalizers:\t%v\n", pvc.ObjectMeta.Finalizers)
|
|
storage := pvc.Spec.Resources.Requests[api.ResourceStorage]
|
|
capacity := ""
|
|
accessModes := ""
|
|
if pvc.Spec.VolumeName != "" {
|
|
accessModes = helper.GetAccessModesAsString(pvc.Status.AccessModes)
|
|
storage = pvc.Status.Capacity[api.ResourceStorage]
|
|
capacity = storage.String()
|
|
}
|
|
w.Write(LEVEL_0, "Capacity:\t%s\n", capacity)
|
|
w.Write(LEVEL_0, "Access Modes:\t%s\n", accessModes)
|
|
if pvc.Spec.VolumeMode != nil {
|
|
w.Write(LEVEL_0, "VolumeMode:\t%v\n", *pvc.Spec.VolumeMode)
|
|
}
|
|
if len(pvc.Status.Conditions) > 0 {
|
|
w.Write(LEVEL_0, "Conditions:\n")
|
|
w.Write(LEVEL_1, "Type\tStatus\tLastProbeTime\tLastTransitionTime\tReason\tMessage\n")
|
|
w.Write(LEVEL_1, "----\t------\t-----------------\t------------------\t------\t-------\n")
|
|
for _, c := range pvc.Status.Conditions {
|
|
w.Write(LEVEL_1, "%v \t%v \t%s \t%s \t%v \t%v\n",
|
|
c.Type,
|
|
c.Status,
|
|
c.LastProbeTime.Time.Format(time.RFC1123Z),
|
|
c.LastTransitionTime.Time.Format(time.RFC1123Z),
|
|
c.Reason,
|
|
c.Message)
|
|
}
|
|
}
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func describeContainers(label string, containers []api.Container, containerStatuses []api.ContainerStatus,
|
|
resolverFn EnvVarResolverFunc, w PrefixWriter, space string) {
|
|
statuses := map[string]api.ContainerStatus{}
|
|
for _, status := range containerStatuses {
|
|
statuses[status.Name] = status
|
|
}
|
|
|
|
describeContainersLabel(containers, label, space, w)
|
|
|
|
for _, container := range containers {
|
|
status, ok := statuses[container.Name]
|
|
describeContainerBasicInfo(container, status, ok, space, w)
|
|
describeContainerCommand(container, w)
|
|
if ok {
|
|
describeContainerState(status, w)
|
|
}
|
|
describeContainerResource(container, w)
|
|
describeContainerProbe(container, w)
|
|
if len(container.EnvFrom) > 0 {
|
|
describeContainerEnvFrom(container, resolverFn, w)
|
|
}
|
|
describeContainerEnvVars(container, resolverFn, w)
|
|
describeContainerVolumes(container, w)
|
|
}
|
|
}
|
|
|
|
func describeContainersLabel(containers []api.Container, label, space string, w PrefixWriter) {
|
|
none := ""
|
|
if len(containers) == 0 {
|
|
none = " <none>"
|
|
}
|
|
w.Write(LEVEL_0, "%s%s:%s\n", space, label, none)
|
|
}
|
|
|
|
func describeContainerBasicInfo(container api.Container, status api.ContainerStatus, ok bool, space string, w PrefixWriter) {
|
|
nameIndent := ""
|
|
if len(space) > 0 {
|
|
nameIndent = " "
|
|
}
|
|
w.Write(LEVEL_1, "%s%v:\n", nameIndent, container.Name)
|
|
if ok {
|
|
w.Write(LEVEL_2, "Container ID:\t%s\n", status.ContainerID)
|
|
}
|
|
w.Write(LEVEL_2, "Image:\t%s\n", container.Image)
|
|
if ok {
|
|
w.Write(LEVEL_2, "Image ID:\t%s\n", status.ImageID)
|
|
}
|
|
portString := describeContainerPorts(container.Ports)
|
|
if strings.Contains(portString, ",") {
|
|
w.Write(LEVEL_2, "Ports:\t%s\n", portString)
|
|
} else {
|
|
w.Write(LEVEL_2, "Port:\t%s\n", stringOrNone(portString))
|
|
}
|
|
hostPortString := describeContainerHostPorts(container.Ports)
|
|
if strings.Contains(hostPortString, ",") {
|
|
w.Write(LEVEL_2, "Host Ports:\t%s\n", hostPortString)
|
|
} else {
|
|
w.Write(LEVEL_2, "Host Port:\t%s\n", stringOrNone(hostPortString))
|
|
}
|
|
}
|
|
|
|
func describeContainerPorts(cPorts []api.ContainerPort) string {
|
|
ports := make([]string, 0, len(cPorts))
|
|
for _, cPort := range cPorts {
|
|
ports = append(ports, fmt.Sprintf("%d/%s", cPort.ContainerPort, cPort.Protocol))
|
|
}
|
|
return strings.Join(ports, ", ")
|
|
}
|
|
|
|
func describeContainerHostPorts(cPorts []api.ContainerPort) string {
|
|
ports := make([]string, 0, len(cPorts))
|
|
for _, cPort := range cPorts {
|
|
ports = append(ports, fmt.Sprintf("%d/%s", cPort.HostPort, cPort.Protocol))
|
|
}
|
|
return strings.Join(ports, ", ")
|
|
}
|
|
|
|
func describeContainerCommand(container api.Container, w PrefixWriter) {
|
|
if len(container.Command) > 0 {
|
|
w.Write(LEVEL_2, "Command:\n")
|
|
for _, c := range container.Command {
|
|
w.Write(LEVEL_3, "%s\n", c)
|
|
}
|
|
}
|
|
if len(container.Args) > 0 {
|
|
w.Write(LEVEL_2, "Args:\n")
|
|
for _, arg := range container.Args {
|
|
w.Write(LEVEL_3, "%s\n", arg)
|
|
}
|
|
}
|
|
}
|
|
|
|
func describeContainerResource(container api.Container, w PrefixWriter) {
|
|
resources := container.Resources
|
|
if len(resources.Limits) > 0 {
|
|
w.Write(LEVEL_2, "Limits:\n")
|
|
}
|
|
for _, name := range SortedResourceNames(resources.Limits) {
|
|
quantity := resources.Limits[name]
|
|
w.Write(LEVEL_3, "%s:\t%s\n", name, quantity.String())
|
|
}
|
|
|
|
if len(resources.Requests) > 0 {
|
|
w.Write(LEVEL_2, "Requests:\n")
|
|
}
|
|
for _, name := range SortedResourceNames(resources.Requests) {
|
|
quantity := resources.Requests[name]
|
|
w.Write(LEVEL_3, "%s:\t%s\n", name, quantity.String())
|
|
}
|
|
}
|
|
|
|
func describeContainerState(status api.ContainerStatus, w PrefixWriter) {
|
|
describeStatus("State", status.State, w)
|
|
if status.LastTerminationState.Terminated != nil {
|
|
describeStatus("Last State", status.LastTerminationState, w)
|
|
}
|
|
w.Write(LEVEL_2, "Ready:\t%v\n", printBool(status.Ready))
|
|
w.Write(LEVEL_2, "Restart Count:\t%d\n", status.RestartCount)
|
|
}
|
|
|
|
func describeContainerProbe(container api.Container, w PrefixWriter) {
|
|
if container.LivenessProbe != nil {
|
|
probe := DescribeProbe(container.LivenessProbe)
|
|
w.Write(LEVEL_2, "Liveness:\t%s\n", probe)
|
|
}
|
|
if container.ReadinessProbe != nil {
|
|
probe := DescribeProbe(container.ReadinessProbe)
|
|
w.Write(LEVEL_2, "Readiness:\t%s\n", probe)
|
|
}
|
|
}
|
|
|
|
func describeContainerVolumes(container api.Container, w PrefixWriter) {
|
|
// Show volumeMounts
|
|
none := ""
|
|
if len(container.VolumeMounts) == 0 {
|
|
none = "\t<none>"
|
|
}
|
|
w.Write(LEVEL_2, "Mounts:%s\n", none)
|
|
sort.Sort(SortableVolumeMounts(container.VolumeMounts))
|
|
for _, mount := range container.VolumeMounts {
|
|
flags := []string{}
|
|
switch {
|
|
case mount.ReadOnly:
|
|
flags = append(flags, "ro")
|
|
case !mount.ReadOnly:
|
|
flags = append(flags, "rw")
|
|
case len(mount.SubPath) > 0:
|
|
flags = append(flags, fmt.Sprintf("path=%q", mount.SubPath))
|
|
}
|
|
w.Write(LEVEL_3, "%s from %s (%s)\n", mount.MountPath, mount.Name, strings.Join(flags, ","))
|
|
}
|
|
// Show volumeDevices if exists
|
|
if len(container.VolumeDevices) > 0 {
|
|
w.Write(LEVEL_2, "Devices:%s\n", none)
|
|
sort.Sort(SortableVolumeDevices(container.VolumeDevices))
|
|
for _, device := range container.VolumeDevices {
|
|
w.Write(LEVEL_3, "%s from %s\n", device.DevicePath, device.Name)
|
|
}
|
|
}
|
|
}
|
|
|
|
func describeContainerEnvVars(container api.Container, resolverFn EnvVarResolverFunc, w PrefixWriter) {
|
|
none := ""
|
|
if len(container.Env) == 0 {
|
|
none = "\t<none>"
|
|
}
|
|
w.Write(LEVEL_2, "Environment:%s\n", none)
|
|
|
|
for _, e := range container.Env {
|
|
if e.ValueFrom == nil {
|
|
w.Write(LEVEL_3, "%s:\t%s\n", e.Name, e.Value)
|
|
continue
|
|
}
|
|
|
|
switch {
|
|
case e.ValueFrom.FieldRef != nil:
|
|
var valueFrom string
|
|
if resolverFn != nil {
|
|
valueFrom = resolverFn(e)
|
|
}
|
|
w.Write(LEVEL_3, "%s:\t%s (%s:%s)\n", e.Name, valueFrom, e.ValueFrom.FieldRef.APIVersion, e.ValueFrom.FieldRef.FieldPath)
|
|
case e.ValueFrom.ResourceFieldRef != nil:
|
|
valueFrom, err := resourcehelper.ExtractContainerResourceValue(e.ValueFrom.ResourceFieldRef, &container)
|
|
if err != nil {
|
|
valueFrom = ""
|
|
}
|
|
resource := e.ValueFrom.ResourceFieldRef.Resource
|
|
if valueFrom == "0" && (resource == "limits.cpu" || resource == "limits.memory") {
|
|
valueFrom = "node allocatable"
|
|
}
|
|
w.Write(LEVEL_3, "%s:\t%s (%s)\n", e.Name, valueFrom, resource)
|
|
case e.ValueFrom.SecretKeyRef != nil:
|
|
optional := e.ValueFrom.SecretKeyRef.Optional != nil && *e.ValueFrom.SecretKeyRef.Optional
|
|
w.Write(LEVEL_3, "%s:\t<set to the key '%s' in secret '%s'>\tOptional: %t\n", e.Name, e.ValueFrom.SecretKeyRef.Key, e.ValueFrom.SecretKeyRef.Name, optional)
|
|
case e.ValueFrom.ConfigMapKeyRef != nil:
|
|
optional := e.ValueFrom.ConfigMapKeyRef.Optional != nil && *e.ValueFrom.ConfigMapKeyRef.Optional
|
|
w.Write(LEVEL_3, "%s:\t<set to the key '%s' of config map '%s'>\tOptional: %t\n", e.Name, e.ValueFrom.ConfigMapKeyRef.Key, e.ValueFrom.ConfigMapKeyRef.Name, optional)
|
|
}
|
|
}
|
|
}
|
|
|
|
func describeContainerEnvFrom(container api.Container, resolverFn EnvVarResolverFunc, w PrefixWriter) {
|
|
none := ""
|
|
if len(container.EnvFrom) == 0 {
|
|
none = "\t<none>"
|
|
}
|
|
w.Write(LEVEL_2, "Environment Variables from:%s\n", none)
|
|
|
|
for _, e := range container.EnvFrom {
|
|
from := ""
|
|
name := ""
|
|
optional := false
|
|
if e.ConfigMapRef != nil {
|
|
from = "ConfigMap"
|
|
name = e.ConfigMapRef.Name
|
|
optional = e.ConfigMapRef.Optional != nil && *e.ConfigMapRef.Optional
|
|
} else if e.SecretRef != nil {
|
|
from = "Secret"
|
|
name = e.SecretRef.Name
|
|
optional = e.SecretRef.Optional != nil && *e.SecretRef.Optional
|
|
}
|
|
if len(e.Prefix) == 0 {
|
|
w.Write(LEVEL_3, "%s\t%s\tOptional: %t\n", name, from, optional)
|
|
} else {
|
|
w.Write(LEVEL_3, "%s\t%s with prefix '%s'\tOptional: %t\n", name, from, e.Prefix, optional)
|
|
}
|
|
}
|
|
}
|
|
|
|
// DescribeProbe is exported for consumers in other API groups that have probes
|
|
func DescribeProbe(probe *api.Probe) string {
|
|
attrs := fmt.Sprintf("delay=%ds timeout=%ds period=%ds #success=%d #failure=%d", probe.InitialDelaySeconds, probe.TimeoutSeconds, probe.PeriodSeconds, probe.SuccessThreshold, probe.FailureThreshold)
|
|
switch {
|
|
case probe.Exec != nil:
|
|
return fmt.Sprintf("exec %v %s", probe.Exec.Command, attrs)
|
|
case probe.HTTPGet != nil:
|
|
url := &url.URL{}
|
|
url.Scheme = strings.ToLower(string(probe.HTTPGet.Scheme))
|
|
if len(probe.HTTPGet.Port.String()) > 0 {
|
|
url.Host = net.JoinHostPort(probe.HTTPGet.Host, probe.HTTPGet.Port.String())
|
|
} else {
|
|
url.Host = probe.HTTPGet.Host
|
|
}
|
|
url.Path = probe.HTTPGet.Path
|
|
return fmt.Sprintf("http-get %s %s", url.String(), attrs)
|
|
case probe.TCPSocket != nil:
|
|
return fmt.Sprintf("tcp-socket %s:%s %s", probe.TCPSocket.Host, probe.TCPSocket.Port.String(), attrs)
|
|
}
|
|
return fmt.Sprintf("unknown %s", attrs)
|
|
}
|
|
|
|
type EnvVarResolverFunc func(e api.EnvVar) string
|
|
|
|
// EnvValueFrom is exported for use by describers in other packages
|
|
func EnvValueRetriever(pod *api.Pod) EnvVarResolverFunc {
|
|
return func(e api.EnvVar) string {
|
|
internalFieldPath, _, err := legacyscheme.Scheme.ConvertFieldLabel(e.ValueFrom.FieldRef.APIVersion, "Pod", e.ValueFrom.FieldRef.FieldPath, "")
|
|
if err != nil {
|
|
return "" // pod validation should catch this on create
|
|
}
|
|
|
|
valueFrom, err := fieldpath.ExtractFieldPathAsString(pod, internalFieldPath)
|
|
if err != nil {
|
|
return "" // pod validation should catch this on create
|
|
}
|
|
|
|
return valueFrom
|
|
}
|
|
}
|
|
|
|
func describeStatus(stateName string, state api.ContainerState, w PrefixWriter) {
|
|
switch {
|
|
case state.Running != nil:
|
|
w.Write(LEVEL_2, "%s:\tRunning\n", stateName)
|
|
w.Write(LEVEL_3, "Started:\t%v\n", state.Running.StartedAt.Time.Format(time.RFC1123Z))
|
|
case state.Waiting != nil:
|
|
w.Write(LEVEL_2, "%s:\tWaiting\n", stateName)
|
|
if state.Waiting.Reason != "" {
|
|
w.Write(LEVEL_3, "Reason:\t%s\n", state.Waiting.Reason)
|
|
}
|
|
case state.Terminated != nil:
|
|
w.Write(LEVEL_2, "%s:\tTerminated\n", stateName)
|
|
if state.Terminated.Reason != "" {
|
|
w.Write(LEVEL_3, "Reason:\t%s\n", state.Terminated.Reason)
|
|
}
|
|
if state.Terminated.Message != "" {
|
|
w.Write(LEVEL_3, "Message:\t%s\n", state.Terminated.Message)
|
|
}
|
|
w.Write(LEVEL_3, "Exit Code:\t%d\n", state.Terminated.ExitCode)
|
|
if state.Terminated.Signal > 0 {
|
|
w.Write(LEVEL_3, "Signal:\t%d\n", state.Terminated.Signal)
|
|
}
|
|
w.Write(LEVEL_3, "Started:\t%s\n", state.Terminated.StartedAt.Time.Format(time.RFC1123Z))
|
|
w.Write(LEVEL_3, "Finished:\t%s\n", state.Terminated.FinishedAt.Time.Format(time.RFC1123Z))
|
|
default:
|
|
w.Write(LEVEL_2, "%s:\tWaiting\n", stateName)
|
|
}
|
|
}
|
|
|
|
func describeVolumeClaimTemplates(templates []api.PersistentVolumeClaim, w PrefixWriter) {
|
|
if len(templates) == 0 {
|
|
w.Write(LEVEL_0, "Volume Claims:\t<none>\n")
|
|
return
|
|
}
|
|
w.Write(LEVEL_0, "Volume Claims:\n")
|
|
for _, pvc := range templates {
|
|
w.Write(LEVEL_1, "Name:\t%s\n", pvc.Name)
|
|
w.Write(LEVEL_1, "StorageClass:\t%s\n", helper.GetPersistentVolumeClaimClass(&pvc))
|
|
printLabelsMultilineWithIndent(w, " ", "Labels", "\t", pvc.Labels, sets.NewString())
|
|
printLabelsMultilineWithIndent(w, " ", "Annotations", "\t", pvc.Annotations, sets.NewString())
|
|
if capacity, ok := pvc.Spec.Resources.Requests[api.ResourceStorage]; ok {
|
|
w.Write(LEVEL_1, "Capacity:\t%s\n", capacity.String())
|
|
} else {
|
|
w.Write(LEVEL_1, "Capacity:\t%s\n", "<default>")
|
|
}
|
|
w.Write(LEVEL_1, "Access Modes:\t%s\n", pvc.Spec.AccessModes)
|
|
}
|
|
}
|
|
|
|
func printBoolPtr(value *bool) string {
|
|
if value != nil {
|
|
return printBool(*value)
|
|
}
|
|
|
|
return "<unset>"
|
|
}
|
|
|
|
func printBool(value bool) string {
|
|
if value {
|
|
return "True"
|
|
}
|
|
|
|
return "False"
|
|
}
|
|
|
|
// ReplicationControllerDescriber generates information about a replication controller
|
|
// and the pods it has created.
|
|
type ReplicationControllerDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *ReplicationControllerDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
rc := d.Core().ReplicationControllers(namespace)
|
|
pc := d.Core().Pods(namespace)
|
|
|
|
controller, err := rc.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
running, waiting, succeeded, failed, err := getPodStatusForController(pc, labels.SelectorFromSet(controller.Spec.Selector), controller.UID)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = d.Core().Events(namespace).Search(legacyscheme.Scheme, controller)
|
|
}
|
|
|
|
return describeReplicationController(controller, events, running, waiting, succeeded, failed)
|
|
}
|
|
|
|
func describeReplicationController(controller *api.ReplicationController, events *api.EventList, running, waiting, succeeded, failed int) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", controller.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", controller.Namespace)
|
|
w.Write(LEVEL_0, "Selector:\t%s\n", labels.FormatLabels(controller.Spec.Selector))
|
|
printLabelsMultiline(w, "Labels", controller.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", controller.Annotations)
|
|
w.Write(LEVEL_0, "Replicas:\t%d current / %d desired\n", controller.Status.Replicas, controller.Spec.Replicas)
|
|
w.Write(LEVEL_0, "Pods Status:\t%d Running / %d Waiting / %d Succeeded / %d Failed\n", running, waiting, succeeded, failed)
|
|
DescribePodTemplate(controller.Spec.Template, w)
|
|
if len(controller.Status.Conditions) > 0 {
|
|
w.Write(LEVEL_0, "Conditions:\n Type\tStatus\tReason\n")
|
|
w.Write(LEVEL_1, "----\t------\t------\n")
|
|
for _, c := range controller.Status.Conditions {
|
|
w.Write(LEVEL_1, "%v \t%v\t%v\n", c.Type, c.Status, c.Reason)
|
|
}
|
|
}
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func DescribePodTemplate(template *api.PodTemplateSpec, w PrefixWriter) {
|
|
w.Write(LEVEL_0, "Pod Template:\n")
|
|
if template == nil {
|
|
w.Write(LEVEL_1, "<unset>")
|
|
return
|
|
}
|
|
printLabelsMultiline(w, " Labels", template.Labels)
|
|
if len(template.Annotations) > 0 {
|
|
printAnnotationsMultiline(w, " Annotations", template.Annotations)
|
|
}
|
|
if len(template.Spec.ServiceAccountName) > 0 {
|
|
w.Write(LEVEL_1, "Service Account:\t%s\n", template.Spec.ServiceAccountName)
|
|
}
|
|
if len(template.Spec.InitContainers) > 0 {
|
|
describeContainers("Init Containers", template.Spec.InitContainers, nil, nil, w, " ")
|
|
}
|
|
describeContainers("Containers", template.Spec.Containers, nil, nil, w, " ")
|
|
describeVolumes(template.Spec.Volumes, w, " ")
|
|
}
|
|
|
|
// ReplicaSetDescriber generates information about a ReplicaSet and the pods it has created.
|
|
type ReplicaSetDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *ReplicaSetDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
rsc := d.Extensions().ReplicaSets(namespace)
|
|
pc := d.Core().Pods(namespace)
|
|
|
|
rs, err := rsc.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
selector, err := metav1.LabelSelectorAsSelector(rs.Spec.Selector)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
running, waiting, succeeded, failed, getPodErr := getPodStatusForController(pc, selector, rs.UID)
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = d.Core().Events(namespace).Search(legacyscheme.Scheme, rs)
|
|
}
|
|
|
|
return describeReplicaSet(rs, events, running, waiting, succeeded, failed, getPodErr)
|
|
}
|
|
|
|
func describeReplicaSet(rs *extensions.ReplicaSet, events *api.EventList, running, waiting, succeeded, failed int, getPodErr error) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", rs.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", rs.Namespace)
|
|
w.Write(LEVEL_0, "Selector:\t%s\n", metav1.FormatLabelSelector(rs.Spec.Selector))
|
|
printLabelsMultiline(w, "Labels", rs.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", rs.Annotations)
|
|
if controlledBy := printController(rs); len(controlledBy) > 0 {
|
|
w.Write(LEVEL_0, "Controlled By:\t%s\n", controlledBy)
|
|
}
|
|
w.Write(LEVEL_0, "Replicas:\t%d current / %d desired\n", rs.Status.Replicas, rs.Spec.Replicas)
|
|
w.Write(LEVEL_0, "Pods Status:\t")
|
|
if getPodErr != nil {
|
|
w.Write(LEVEL_0, "error in fetching pods: %s\n", getPodErr)
|
|
} else {
|
|
w.Write(LEVEL_0, "%d Running / %d Waiting / %d Succeeded / %d Failed\n", running, waiting, succeeded, failed)
|
|
}
|
|
DescribePodTemplate(&rs.Spec.Template, w)
|
|
if len(rs.Status.Conditions) > 0 {
|
|
w.Write(LEVEL_0, "Conditions:\n Type\tStatus\tReason\n")
|
|
w.Write(LEVEL_1, "----\t------\t------\n")
|
|
for _, c := range rs.Status.Conditions {
|
|
w.Write(LEVEL_1, "%v \t%v\t%v\n", c.Type, c.Status, c.Reason)
|
|
}
|
|
}
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// JobDescriber generates information about a job and the pods it has created.
|
|
type JobDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *JobDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
job, err := d.Batch().Jobs(namespace).Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = d.Core().Events(namespace).Search(legacyscheme.Scheme, job)
|
|
}
|
|
|
|
return describeJob(job, events)
|
|
}
|
|
|
|
func describeJob(job *batch.Job, events *api.EventList) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", job.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", job.Namespace)
|
|
selector, _ := metav1.LabelSelectorAsSelector(job.Spec.Selector)
|
|
w.Write(LEVEL_0, "Selector:\t%s\n", selector)
|
|
printLabelsMultiline(w, "Labels", job.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", job.Annotations)
|
|
if controlledBy := printController(job); len(controlledBy) > 0 {
|
|
w.Write(LEVEL_0, "Controlled By:\t%s\n", controlledBy)
|
|
}
|
|
w.Write(LEVEL_0, "Parallelism:\t%d\n", *job.Spec.Parallelism)
|
|
if job.Spec.Completions != nil {
|
|
w.Write(LEVEL_0, "Completions:\t%d\n", *job.Spec.Completions)
|
|
} else {
|
|
w.Write(LEVEL_0, "Completions:\t<unset>\n")
|
|
}
|
|
if job.Status.StartTime != nil {
|
|
w.Write(LEVEL_0, "Start Time:\t%s\n", job.Status.StartTime.Time.Format(time.RFC1123Z))
|
|
}
|
|
if job.Spec.ActiveDeadlineSeconds != nil {
|
|
w.Write(LEVEL_0, "Active Deadline Seconds:\t%ds\n", *job.Spec.ActiveDeadlineSeconds)
|
|
}
|
|
w.Write(LEVEL_0, "Pods Statuses:\t%d Running / %d Succeeded / %d Failed\n", job.Status.Active, job.Status.Succeeded, job.Status.Failed)
|
|
DescribePodTemplate(&job.Spec.Template, w)
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// CronJobDescriber generates information about a cron job and the jobs it has created.
|
|
type CronJobDescriber struct {
|
|
clientset.Interface
|
|
external externalclient.Interface
|
|
}
|
|
|
|
func (d *CronJobDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
cronJob, err := d.external.BatchV1beta1().CronJobs(namespace).Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = d.Core().Events(namespace).Search(legacyscheme.Scheme, cronJob)
|
|
}
|
|
|
|
internalCronJob := &batch.CronJob{}
|
|
if err := legacyscheme.Scheme.Convert(cronJob, internalCronJob, nil); err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return describeCronJob(internalCronJob, events)
|
|
}
|
|
|
|
func describeCronJob(cronJob *batch.CronJob, events *api.EventList) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", cronJob.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", cronJob.Namespace)
|
|
printLabelsMultiline(w, "Labels", cronJob.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", cronJob.Annotations)
|
|
w.Write(LEVEL_0, "Schedule:\t%s\n", cronJob.Spec.Schedule)
|
|
w.Write(LEVEL_0, "Concurrency Policy:\t%s\n", cronJob.Spec.ConcurrencyPolicy)
|
|
w.Write(LEVEL_0, "Suspend:\t%s\n", printBoolPtr(cronJob.Spec.Suspend))
|
|
if cronJob.Spec.StartingDeadlineSeconds != nil {
|
|
w.Write(LEVEL_0, "Starting Deadline Seconds:\t%ds\n", *cronJob.Spec.StartingDeadlineSeconds)
|
|
} else {
|
|
w.Write(LEVEL_0, "Starting Deadline Seconds:\t<unset>\n")
|
|
}
|
|
describeJobTemplate(cronJob.Spec.JobTemplate, w)
|
|
if cronJob.Status.LastScheduleTime != nil {
|
|
w.Write(LEVEL_0, "Last Schedule Time:\t%s\n", cronJob.Status.LastScheduleTime.Time.Format(time.RFC1123Z))
|
|
} else {
|
|
w.Write(LEVEL_0, "Last Schedule Time:\t<unset>\n")
|
|
}
|
|
printActiveJobs(w, "Active Jobs", cronJob.Status.Active)
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func describeJobTemplate(jobTemplate batch.JobTemplateSpec, w PrefixWriter) {
|
|
if jobTemplate.Spec.Selector != nil {
|
|
selector, _ := metav1.LabelSelectorAsSelector(jobTemplate.Spec.Selector)
|
|
w.Write(LEVEL_0, "Selector:\t%s\n", selector)
|
|
} else {
|
|
w.Write(LEVEL_0, "Selector:\t<unset>\n")
|
|
}
|
|
if jobTemplate.Spec.Parallelism != nil {
|
|
w.Write(LEVEL_0, "Parallelism:\t%d\n", *jobTemplate.Spec.Parallelism)
|
|
} else {
|
|
w.Write(LEVEL_0, "Parallelism:\t<unset>\n")
|
|
}
|
|
if jobTemplate.Spec.Completions != nil {
|
|
w.Write(LEVEL_0, "Completions:\t%d\n", *jobTemplate.Spec.Completions)
|
|
} else {
|
|
w.Write(LEVEL_0, "Completions:\t<unset>\n")
|
|
}
|
|
if jobTemplate.Spec.ActiveDeadlineSeconds != nil {
|
|
w.Write(LEVEL_0, "Active Deadline Seconds:\t%ds\n", *jobTemplate.Spec.ActiveDeadlineSeconds)
|
|
}
|
|
DescribePodTemplate(&jobTemplate.Spec.Template, w)
|
|
}
|
|
|
|
func printActiveJobs(w PrefixWriter, title string, jobs []api.ObjectReference) {
|
|
w.Write(LEVEL_0, "%s:\t", title)
|
|
if len(jobs) == 0 {
|
|
w.WriteLine("<none>")
|
|
return
|
|
}
|
|
|
|
for i, job := range jobs {
|
|
if i != 0 {
|
|
w.Write(LEVEL_0, ", ")
|
|
}
|
|
w.Write(LEVEL_0, "%s", job.Name)
|
|
}
|
|
w.WriteLine("")
|
|
}
|
|
|
|
// DaemonSetDescriber generates information about a daemon set and the pods it has created.
|
|
type DaemonSetDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *DaemonSetDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
dc := d.Extensions().DaemonSets(namespace)
|
|
pc := d.Core().Pods(namespace)
|
|
|
|
daemon, err := dc.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
selector, err := metav1.LabelSelectorAsSelector(daemon.Spec.Selector)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
running, waiting, succeeded, failed, err := getPodStatusForController(pc, selector, daemon.UID)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = d.Core().Events(namespace).Search(legacyscheme.Scheme, daemon)
|
|
}
|
|
|
|
return describeDaemonSet(daemon, events, running, waiting, succeeded, failed)
|
|
}
|
|
|
|
func describeDaemonSet(daemon *extensions.DaemonSet, events *api.EventList, running, waiting, succeeded, failed int) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", daemon.Name)
|
|
selector, err := metav1.LabelSelectorAsSelector(daemon.Spec.Selector)
|
|
if err != nil {
|
|
// this shouldn't happen if LabelSelector passed validation
|
|
return err
|
|
}
|
|
w.Write(LEVEL_0, "Selector:\t%s\n", selector)
|
|
w.Write(LEVEL_0, "Node-Selector:\t%s\n", labels.FormatLabels(daemon.Spec.Template.Spec.NodeSelector))
|
|
printLabelsMultiline(w, "Labels", daemon.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", daemon.Annotations)
|
|
w.Write(LEVEL_0, "Desired Number of Nodes Scheduled: %d\n", daemon.Status.DesiredNumberScheduled)
|
|
w.Write(LEVEL_0, "Current Number of Nodes Scheduled: %d\n", daemon.Status.CurrentNumberScheduled)
|
|
w.Write(LEVEL_0, "Number of Nodes Scheduled with Up-to-date Pods: %d\n", daemon.Status.UpdatedNumberScheduled)
|
|
w.Write(LEVEL_0, "Number of Nodes Scheduled with Available Pods: %d\n", daemon.Status.NumberAvailable)
|
|
w.Write(LEVEL_0, "Number of Nodes Misscheduled: %d\n", daemon.Status.NumberMisscheduled)
|
|
w.Write(LEVEL_0, "Pods Status:\t%d Running / %d Waiting / %d Succeeded / %d Failed\n", running, waiting, succeeded, failed)
|
|
DescribePodTemplate(&daemon.Spec.Template, w)
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// SecretDescriber generates information about a secret
|
|
type SecretDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *SecretDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
c := d.Core().Secrets(namespace)
|
|
|
|
secret, err := c.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return describeSecret(secret)
|
|
}
|
|
|
|
func describeSecret(secret *api.Secret) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", secret.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", secret.Namespace)
|
|
printLabelsMultiline(w, "Labels", secret.Labels)
|
|
skipAnnotations := sets.NewString(api.LastAppliedConfigAnnotation)
|
|
printAnnotationsMultilineWithFilter(w, "Annotations", secret.Annotations, skipAnnotations)
|
|
|
|
w.Write(LEVEL_0, "\nType:\t%s\n", secret.Type)
|
|
|
|
w.Write(LEVEL_0, "\nData\n====\n")
|
|
for k, v := range secret.Data {
|
|
switch {
|
|
case k == api.ServiceAccountTokenKey && secret.Type == api.SecretTypeServiceAccountToken:
|
|
w.Write(LEVEL_0, "%s:\t%s\n", k, string(v))
|
|
default:
|
|
w.Write(LEVEL_0, "%s:\t%d bytes\n", k, len(v))
|
|
}
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
type IngressDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (i *IngressDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
c := i.Extensions().Ingresses(namespace)
|
|
ing, err := c.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return i.describeIngress(ing, describerSettings)
|
|
}
|
|
|
|
func (i *IngressDescriber) describeBackend(ns string, backend *extensions.IngressBackend) string {
|
|
endpoints, _ := i.Core().Endpoints(ns).Get(backend.ServiceName, metav1.GetOptions{})
|
|
service, _ := i.Core().Services(ns).Get(backend.ServiceName, metav1.GetOptions{})
|
|
spName := ""
|
|
for i := range service.Spec.Ports {
|
|
sp := &service.Spec.Ports[i]
|
|
switch backend.ServicePort.Type {
|
|
case intstr.String:
|
|
if backend.ServicePort.StrVal == sp.Name {
|
|
spName = sp.Name
|
|
}
|
|
case intstr.Int:
|
|
if int32(backend.ServicePort.IntVal) == sp.Port {
|
|
spName = sp.Name
|
|
}
|
|
}
|
|
}
|
|
return formatEndpoints(endpoints, sets.NewString(spName))
|
|
}
|
|
|
|
func (i *IngressDescriber) describeIngress(ing *extensions.Ingress, describerSettings printers.DescriberSettings) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%v\n", ing.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%v\n", ing.Namespace)
|
|
w.Write(LEVEL_0, "Address:\t%v\n", loadBalancerStatusStringer(ing.Status.LoadBalancer, true))
|
|
def := ing.Spec.Backend
|
|
ns := ing.Namespace
|
|
if def == nil {
|
|
// Ingresses that don't specify a default backend inherit the
|
|
// default backend in the kube-system namespace.
|
|
def = &extensions.IngressBackend{
|
|
ServiceName: "default-http-backend",
|
|
ServicePort: intstr.IntOrString{Type: intstr.Int, IntVal: 80},
|
|
}
|
|
ns = metav1.NamespaceSystem
|
|
}
|
|
w.Write(LEVEL_0, "Default backend:\t%s (%s)\n", backendStringer(def), i.describeBackend(ns, def))
|
|
if len(ing.Spec.TLS) != 0 {
|
|
describeIngressTLS(w, ing.Spec.TLS)
|
|
}
|
|
w.Write(LEVEL_0, "Rules:\n Host\tPath\tBackends\n")
|
|
w.Write(LEVEL_1, "----\t----\t--------\n")
|
|
count := 0
|
|
for _, rules := range ing.Spec.Rules {
|
|
if rules.HTTP == nil {
|
|
continue
|
|
}
|
|
count++
|
|
host := rules.Host
|
|
if len(host) == 0 {
|
|
host = "*"
|
|
}
|
|
w.Write(LEVEL_1, "%s\t\n", host)
|
|
for _, path := range rules.HTTP.Paths {
|
|
w.Write(LEVEL_2, "\t%s \t%s (%s)\n", path.Path, backendStringer(&path.Backend), i.describeBackend(ns, &path.Backend))
|
|
}
|
|
}
|
|
if count == 0 {
|
|
w.Write(LEVEL_1, "%s\t%s \t%s (%s)\n", "*", "*", backendStringer(def), i.describeBackend(ns, def))
|
|
}
|
|
describeIngressAnnotations(w, ing.Annotations)
|
|
|
|
if describerSettings.ShowEvents {
|
|
events, _ := i.Core().Events(ing.Namespace).Search(legacyscheme.Scheme, ing)
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func describeIngressTLS(w PrefixWriter, ingTLS []extensions.IngressTLS) {
|
|
w.Write(LEVEL_0, "TLS:\n")
|
|
for _, t := range ingTLS {
|
|
if t.SecretName == "" {
|
|
w.Write(LEVEL_1, "SNI routes %v\n", strings.Join(t.Hosts, ","))
|
|
} else {
|
|
w.Write(LEVEL_1, "%v terminates %v\n", t.SecretName, strings.Join(t.Hosts, ","))
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
// TODO: Move from annotations into Ingress status.
|
|
func describeIngressAnnotations(w PrefixWriter, annotations map[string]string) {
|
|
w.Write(LEVEL_0, "Annotations:\n")
|
|
for k, v := range annotations {
|
|
w.Write(LEVEL_1, "%v:\t%s\n", k, v)
|
|
}
|
|
return
|
|
}
|
|
|
|
// ServiceDescriber generates information about a service.
|
|
type ServiceDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *ServiceDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
c := d.Core().Services(namespace)
|
|
|
|
service, err := c.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
endpoints, _ := d.Core().Endpoints(namespace).Get(name, metav1.GetOptions{})
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = d.Core().Events(namespace).Search(legacyscheme.Scheme, service)
|
|
}
|
|
return describeService(service, endpoints, events)
|
|
}
|
|
|
|
func buildIngressString(ingress []api.LoadBalancerIngress) string {
|
|
var buffer bytes.Buffer
|
|
|
|
for i := range ingress {
|
|
if i != 0 {
|
|
buffer.WriteString(", ")
|
|
}
|
|
if ingress[i].IP != "" {
|
|
buffer.WriteString(ingress[i].IP)
|
|
} else {
|
|
buffer.WriteString(ingress[i].Hostname)
|
|
}
|
|
}
|
|
return buffer.String()
|
|
}
|
|
|
|
func describeService(service *api.Service, endpoints *api.Endpoints, events *api.EventList) (string, error) {
|
|
if endpoints == nil {
|
|
endpoints = &api.Endpoints{}
|
|
}
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", service.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", service.Namespace)
|
|
printLabelsMultiline(w, "Labels", service.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", service.Annotations)
|
|
w.Write(LEVEL_0, "Selector:\t%s\n", labels.FormatLabels(service.Spec.Selector))
|
|
w.Write(LEVEL_0, "Type:\t%s\n", service.Spec.Type)
|
|
w.Write(LEVEL_0, "IP:\t%s\n", service.Spec.ClusterIP)
|
|
if len(service.Spec.ExternalIPs) > 0 {
|
|
w.Write(LEVEL_0, "External IPs:\t%v\n", strings.Join(service.Spec.ExternalIPs, ","))
|
|
}
|
|
if service.Spec.LoadBalancerIP != "" {
|
|
w.Write(LEVEL_0, "IP:\t%s\n", service.Spec.LoadBalancerIP)
|
|
}
|
|
if service.Spec.ExternalName != "" {
|
|
w.Write(LEVEL_0, "External Name:\t%s\n", service.Spec.ExternalName)
|
|
}
|
|
if len(service.Status.LoadBalancer.Ingress) > 0 {
|
|
list := buildIngressString(service.Status.LoadBalancer.Ingress)
|
|
w.Write(LEVEL_0, "LoadBalancer Ingress:\t%s\n", list)
|
|
}
|
|
for i := range service.Spec.Ports {
|
|
sp := &service.Spec.Ports[i]
|
|
|
|
name := sp.Name
|
|
if name == "" {
|
|
name = "<unset>"
|
|
}
|
|
w.Write(LEVEL_0, "Port:\t%s\t%d/%s\n", name, sp.Port, sp.Protocol)
|
|
if sp.TargetPort.Type == intstr.Type(intstr.Int) {
|
|
w.Write(LEVEL_0, "TargetPort:\t%d/%s\n", sp.TargetPort.IntVal, sp.Protocol)
|
|
} else {
|
|
w.Write(LEVEL_0, "TargetPort:\t%s/%s\n", sp.TargetPort.StrVal, sp.Protocol)
|
|
}
|
|
if sp.NodePort != 0 {
|
|
w.Write(LEVEL_0, "NodePort:\t%s\t%d/%s\n", name, sp.NodePort, sp.Protocol)
|
|
}
|
|
w.Write(LEVEL_0, "Endpoints:\t%s\n", formatEndpoints(endpoints, sets.NewString(sp.Name)))
|
|
}
|
|
w.Write(LEVEL_0, "Session Affinity:\t%s\n", service.Spec.SessionAffinity)
|
|
if service.Spec.ExternalTrafficPolicy != "" {
|
|
w.Write(LEVEL_0, "External Traffic Policy:\t%s\n", service.Spec.ExternalTrafficPolicy)
|
|
}
|
|
if service.Spec.HealthCheckNodePort != 0 {
|
|
w.Write(LEVEL_0, "HealthCheck NodePort:\t%d\n", service.Spec.HealthCheckNodePort)
|
|
}
|
|
if len(service.Spec.LoadBalancerSourceRanges) > 0 {
|
|
w.Write(LEVEL_0, "LoadBalancer Source Ranges:\t%v\n", strings.Join(service.Spec.LoadBalancerSourceRanges, ","))
|
|
}
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// EndpointsDescriber generates information about an Endpoint.
|
|
type EndpointsDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *EndpointsDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
c := d.Core().Endpoints(namespace)
|
|
|
|
ep, err := c.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = d.Core().Events(namespace).Search(legacyscheme.Scheme, ep)
|
|
}
|
|
|
|
return describeEndpoints(ep, events)
|
|
}
|
|
|
|
func describeEndpoints(ep *api.Endpoints, events *api.EventList) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", ep.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", ep.Namespace)
|
|
printLabelsMultiline(w, "Labels", ep.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", ep.Annotations)
|
|
|
|
w.Write(LEVEL_0, "Subsets:\n")
|
|
for i := range ep.Subsets {
|
|
subset := &ep.Subsets[i]
|
|
|
|
addresses := make([]string, 0, len(subset.Addresses))
|
|
for _, addr := range subset.Addresses {
|
|
addresses = append(addresses, addr.IP)
|
|
}
|
|
addressesString := strings.Join(addresses, ",")
|
|
if len(addressesString) == 0 {
|
|
addressesString = "<none>"
|
|
}
|
|
w.Write(LEVEL_1, "Addresses:\t%s\n", addressesString)
|
|
|
|
notReadyAddresses := make([]string, 0, len(subset.NotReadyAddresses))
|
|
for _, addr := range subset.NotReadyAddresses {
|
|
notReadyAddresses = append(notReadyAddresses, addr.IP)
|
|
}
|
|
notReadyAddressesString := strings.Join(notReadyAddresses, ",")
|
|
if len(notReadyAddressesString) == 0 {
|
|
notReadyAddressesString = "<none>"
|
|
}
|
|
w.Write(LEVEL_1, "NotReadyAddresses:\t%s\n", notReadyAddressesString)
|
|
|
|
if len(subset.Ports) > 0 {
|
|
w.Write(LEVEL_1, "Ports:\n")
|
|
w.Write(LEVEL_2, "Name\tPort\tProtocol\n")
|
|
w.Write(LEVEL_2, "----\t----\t--------\n")
|
|
for _, port := range subset.Ports {
|
|
name := port.Name
|
|
if len(name) == 0 {
|
|
name = "<unset>"
|
|
}
|
|
w.Write(LEVEL_2, "%s\t%d\t%s\n", name, port.Port, port.Protocol)
|
|
}
|
|
}
|
|
w.Write(LEVEL_0, "\n")
|
|
}
|
|
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// ServiceAccountDescriber generates information about a service.
|
|
type ServiceAccountDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *ServiceAccountDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
c := d.Core().ServiceAccounts(namespace)
|
|
|
|
serviceAccount, err := c.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
tokens := []api.Secret{}
|
|
|
|
// missingSecrets is the set of all secrets present in the
|
|
// serviceAccount but not present in the set of existing secrets.
|
|
missingSecrets := sets.NewString()
|
|
secrets, err := d.Core().Secrets(namespace).List(metav1.ListOptions{})
|
|
|
|
// errors are tolerated here in order to describe the serviceAccount with all
|
|
// of the secrets that it references, even if those secrets cannot be fetched.
|
|
if err == nil {
|
|
// existingSecrets is the set of all secrets remaining on a
|
|
// service account that are not present in the "tokens" slice.
|
|
existingSecrets := sets.NewString()
|
|
|
|
for _, s := range secrets.Items {
|
|
if s.Type == api.SecretTypeServiceAccountToken {
|
|
name, _ := s.Annotations[api.ServiceAccountNameKey]
|
|
uid, _ := s.Annotations[api.ServiceAccountUIDKey]
|
|
if name == serviceAccount.Name && uid == string(serviceAccount.UID) {
|
|
tokens = append(tokens, s)
|
|
}
|
|
}
|
|
existingSecrets.Insert(s.Name)
|
|
}
|
|
|
|
for _, s := range serviceAccount.Secrets {
|
|
if !existingSecrets.Has(s.Name) {
|
|
missingSecrets.Insert(s.Name)
|
|
}
|
|
}
|
|
for _, s := range serviceAccount.ImagePullSecrets {
|
|
if !existingSecrets.Has(s.Name) {
|
|
missingSecrets.Insert(s.Name)
|
|
}
|
|
}
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = d.Core().Events(namespace).Search(legacyscheme.Scheme, serviceAccount)
|
|
}
|
|
|
|
return describeServiceAccount(serviceAccount, tokens, missingSecrets, events)
|
|
}
|
|
|
|
func describeServiceAccount(serviceAccount *api.ServiceAccount, tokens []api.Secret, missingSecrets sets.String, events *api.EventList) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", serviceAccount.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", serviceAccount.Namespace)
|
|
printLabelsMultiline(w, "Labels", serviceAccount.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", serviceAccount.Annotations)
|
|
|
|
var (
|
|
emptyHeader = " "
|
|
pullHeader = "Image pull secrets:"
|
|
mountHeader = "Mountable secrets: "
|
|
tokenHeader = "Tokens: "
|
|
|
|
pullSecretNames = []string{}
|
|
mountSecretNames = []string{}
|
|
tokenSecretNames = []string{}
|
|
)
|
|
|
|
for _, s := range serviceAccount.ImagePullSecrets {
|
|
pullSecretNames = append(pullSecretNames, s.Name)
|
|
}
|
|
for _, s := range serviceAccount.Secrets {
|
|
mountSecretNames = append(mountSecretNames, s.Name)
|
|
}
|
|
for _, s := range tokens {
|
|
tokenSecretNames = append(tokenSecretNames, s.Name)
|
|
}
|
|
|
|
types := map[string][]string{
|
|
pullHeader: pullSecretNames,
|
|
mountHeader: mountSecretNames,
|
|
tokenHeader: tokenSecretNames,
|
|
}
|
|
for _, header := range sets.StringKeySet(types).List() {
|
|
names := types[header]
|
|
if len(names) == 0 {
|
|
w.Write(LEVEL_0, "%s\t<none>\n", header)
|
|
} else {
|
|
prefix := header
|
|
for _, name := range names {
|
|
if missingSecrets.Has(name) {
|
|
w.Write(LEVEL_0, "%s\t%s (not found)\n", prefix, name)
|
|
} else {
|
|
w.Write(LEVEL_0, "%s\t%s\n", prefix, name)
|
|
}
|
|
prefix = emptyHeader
|
|
}
|
|
}
|
|
}
|
|
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// RoleDescriber generates information about a node.
|
|
type RoleDescriber struct {
|
|
externalclient.Interface
|
|
}
|
|
|
|
func (d *RoleDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
role, err := d.Rbac().Roles(namespace).Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
breakdownRules := []rbacv1.PolicyRule{}
|
|
for _, rule := range role.Rules {
|
|
breakdownRules = append(breakdownRules, validation.BreakdownRule(rule)...)
|
|
}
|
|
|
|
compactRules, err := validation.CompactRules(breakdownRules)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
sort.Stable(rbacv1helpers.SortableRuleSlice(compactRules))
|
|
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", role.Name)
|
|
printLabelsMultiline(w, "Labels", role.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", role.Annotations)
|
|
|
|
w.Write(LEVEL_0, "PolicyRule:\n")
|
|
w.Write(LEVEL_1, "Resources\tNon-Resource URLs\tResource Names\tVerbs\n")
|
|
w.Write(LEVEL_1, "---------\t-----------------\t--------------\t-----\n")
|
|
for _, r := range compactRules {
|
|
w.Write(LEVEL_1, "%s\t%v\t%v\t%v\n", combineResourceGroup(r.Resources, r.APIGroups), r.NonResourceURLs, r.ResourceNames, r.Verbs)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// ClusterRoleDescriber generates information about a node.
|
|
type ClusterRoleDescriber struct {
|
|
externalclient.Interface
|
|
}
|
|
|
|
func (d *ClusterRoleDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
role, err := d.Rbac().ClusterRoles().Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
breakdownRules := []rbacv1.PolicyRule{}
|
|
for _, rule := range role.Rules {
|
|
breakdownRules = append(breakdownRules, validation.BreakdownRule(rule)...)
|
|
}
|
|
|
|
compactRules, err := validation.CompactRules(breakdownRules)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
sort.Stable(rbacv1helpers.SortableRuleSlice(compactRules))
|
|
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", role.Name)
|
|
printLabelsMultiline(w, "Labels", role.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", role.Annotations)
|
|
|
|
w.Write(LEVEL_0, "PolicyRule:\n")
|
|
w.Write(LEVEL_1, "Resources\tNon-Resource URLs\tResource Names\tVerbs\n")
|
|
w.Write(LEVEL_1, "---------\t-----------------\t--------------\t-----\n")
|
|
for _, r := range compactRules {
|
|
w.Write(LEVEL_1, "%s\t%v\t%v\t%v\n", combineResourceGroup(r.Resources, r.APIGroups), r.NonResourceURLs, r.ResourceNames, r.Verbs)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func combineResourceGroup(resource, group []string) string {
|
|
if len(resource) == 0 {
|
|
return ""
|
|
}
|
|
parts := strings.SplitN(resource[0], "/", 2)
|
|
combine := parts[0]
|
|
|
|
if len(group) > 0 && group[0] != "" {
|
|
combine = combine + "." + group[0]
|
|
}
|
|
|
|
if len(parts) == 2 {
|
|
combine = combine + "/" + parts[1]
|
|
}
|
|
return combine
|
|
}
|
|
|
|
// RoleBindingDescriber generates information about a node.
|
|
type RoleBindingDescriber struct {
|
|
externalclient.Interface
|
|
}
|
|
|
|
func (d *RoleBindingDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
binding, err := d.Rbac().RoleBindings(namespace).Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", binding.Name)
|
|
printLabelsMultiline(w, "Labels", binding.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", binding.Annotations)
|
|
|
|
w.Write(LEVEL_0, "Role:\n")
|
|
w.Write(LEVEL_1, "Kind:\t%s\n", binding.RoleRef.Kind)
|
|
w.Write(LEVEL_1, "Name:\t%s\n", binding.RoleRef.Name)
|
|
|
|
w.Write(LEVEL_0, "Subjects:\n")
|
|
w.Write(LEVEL_1, "Kind\tName\tNamespace\n")
|
|
w.Write(LEVEL_1, "----\t----\t---------\n")
|
|
for _, s := range binding.Subjects {
|
|
w.Write(LEVEL_1, "%s\t%s\t%s\n", s.Kind, s.Name, s.Namespace)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// ClusterRoleBindingDescriber generates information about a node.
|
|
type ClusterRoleBindingDescriber struct {
|
|
externalclient.Interface
|
|
}
|
|
|
|
func (d *ClusterRoleBindingDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
binding, err := d.Rbac().ClusterRoleBindings().Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", binding.Name)
|
|
printLabelsMultiline(w, "Labels", binding.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", binding.Annotations)
|
|
|
|
w.Write(LEVEL_0, "Role:\n")
|
|
w.Write(LEVEL_1, "Kind:\t%s\n", binding.RoleRef.Kind)
|
|
w.Write(LEVEL_1, "Name:\t%s\n", binding.RoleRef.Name)
|
|
|
|
w.Write(LEVEL_0, "Subjects:\n")
|
|
w.Write(LEVEL_1, "Kind\tName\tNamespace\n")
|
|
w.Write(LEVEL_1, "----\t----\t---------\n")
|
|
for _, s := range binding.Subjects {
|
|
w.Write(LEVEL_1, "%s\t%s\t%s\n", s.Kind, s.Name, s.Namespace)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// NodeDescriber generates information about a node.
|
|
type NodeDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *NodeDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
mc := d.Core().Nodes()
|
|
node, err := mc.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
fieldSelector, err := fields.ParseSelector("spec.nodeName=" + name + ",status.phase!=" + string(api.PodSucceeded) + ",status.phase!=" + string(api.PodFailed))
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
// in a policy aware setting, users may have access to a node, but not all pods
|
|
// in that case, we note that the user does not have access to the pods
|
|
canViewPods := true
|
|
nodeNonTerminatedPodsList, err := d.Core().Pods(namespace).List(metav1.ListOptions{FieldSelector: fieldSelector.String()})
|
|
if err != nil {
|
|
if !errors.IsForbidden(err) {
|
|
return "", err
|
|
}
|
|
canViewPods = false
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
if ref, err := ref.GetReference(legacyscheme.Scheme, node); err != nil {
|
|
glog.Errorf("Unable to construct reference to '%#v': %v", node, err)
|
|
} else {
|
|
// TODO: We haven't decided the namespace for Node object yet.
|
|
ref.UID = types.UID(ref.Name)
|
|
events, _ = d.Core().Events("").Search(legacyscheme.Scheme, ref)
|
|
}
|
|
}
|
|
|
|
return describeNode(node, nodeNonTerminatedPodsList, events, canViewPods)
|
|
}
|
|
|
|
func describeNode(node *api.Node, nodeNonTerminatedPodsList *api.PodList, events *api.EventList, canViewPods bool) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", node.Name)
|
|
if roles := findNodeRoles(node); len(roles) > 0 {
|
|
w.Write(LEVEL_0, "Roles:\t%s\n", strings.Join(roles, ","))
|
|
} else {
|
|
w.Write(LEVEL_0, "Roles:\t%s\n", "<none>")
|
|
}
|
|
printLabelsMultiline(w, "Labels", node.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", node.Annotations)
|
|
w.Write(LEVEL_0, "CreationTimestamp:\t%s\n", node.CreationTimestamp.Time.Format(time.RFC1123Z))
|
|
printNodeTaintsMultiline(w, "Taints", node.Spec.Taints)
|
|
w.Write(LEVEL_0, "Unschedulable:\t%v\n", node.Spec.Unschedulable)
|
|
if len(node.Status.Conditions) > 0 {
|
|
w.Write(LEVEL_0, "Conditions:\n Type\tStatus\tLastHeartbeatTime\tLastTransitionTime\tReason\tMessage\n")
|
|
w.Write(LEVEL_1, "----\t------\t-----------------\t------------------\t------\t-------\n")
|
|
for _, c := range node.Status.Conditions {
|
|
w.Write(LEVEL_1, "%v \t%v \t%s \t%s \t%v \t%v\n",
|
|
c.Type,
|
|
c.Status,
|
|
c.LastHeartbeatTime.Time.Format(time.RFC1123Z),
|
|
c.LastTransitionTime.Time.Format(time.RFC1123Z),
|
|
c.Reason,
|
|
c.Message)
|
|
}
|
|
}
|
|
|
|
w.Write(LEVEL_0, "Addresses:\n")
|
|
for _, address := range node.Status.Addresses {
|
|
w.Write(LEVEL_1, "%s:\t%s\n", address.Type, address.Address)
|
|
}
|
|
|
|
printResourceList := func(resourceList api.ResourceList) {
|
|
resources := make([]api.ResourceName, 0, len(resourceList))
|
|
for resource := range resourceList {
|
|
resources = append(resources, resource)
|
|
}
|
|
sort.Sort(SortableResourceNames(resources))
|
|
for _, resource := range resources {
|
|
value := resourceList[resource]
|
|
w.Write(LEVEL_0, " %s:\t%s\n", resource, value.String())
|
|
}
|
|
}
|
|
|
|
if len(node.Status.Capacity) > 0 {
|
|
w.Write(LEVEL_0, "Capacity:\n")
|
|
printResourceList(node.Status.Capacity)
|
|
}
|
|
if len(node.Status.Allocatable) > 0 {
|
|
w.Write(LEVEL_0, "Allocatable:\n")
|
|
printResourceList(node.Status.Allocatable)
|
|
}
|
|
|
|
w.Write(LEVEL_0, "System Info:\n")
|
|
w.Write(LEVEL_0, " Machine ID:\t%s\n", node.Status.NodeInfo.MachineID)
|
|
w.Write(LEVEL_0, " System UUID:\t%s\n", node.Status.NodeInfo.SystemUUID)
|
|
w.Write(LEVEL_0, " Boot ID:\t%s\n", node.Status.NodeInfo.BootID)
|
|
w.Write(LEVEL_0, " Kernel Version:\t%s\n", node.Status.NodeInfo.KernelVersion)
|
|
w.Write(LEVEL_0, " OS Image:\t%s\n", node.Status.NodeInfo.OSImage)
|
|
w.Write(LEVEL_0, " Operating System:\t%s\n", node.Status.NodeInfo.OperatingSystem)
|
|
w.Write(LEVEL_0, " Architecture:\t%s\n", node.Status.NodeInfo.Architecture)
|
|
w.Write(LEVEL_0, " Container Runtime Version:\t%s\n", node.Status.NodeInfo.ContainerRuntimeVersion)
|
|
w.Write(LEVEL_0, " Kubelet Version:\t%s\n", node.Status.NodeInfo.KubeletVersion)
|
|
w.Write(LEVEL_0, " Kube-Proxy Version:\t%s\n", node.Status.NodeInfo.KubeProxyVersion)
|
|
|
|
if len(node.Spec.PodCIDR) > 0 {
|
|
w.Write(LEVEL_0, "PodCIDR:\t%s\n", node.Spec.PodCIDR)
|
|
}
|
|
if len(node.Spec.ProviderID) > 0 {
|
|
w.Write(LEVEL_0, "ProviderID:\t%s\n", node.Spec.ProviderID)
|
|
}
|
|
if canViewPods && nodeNonTerminatedPodsList != nil {
|
|
describeNodeResource(nodeNonTerminatedPodsList, node, w)
|
|
} else {
|
|
w.Write(LEVEL_0, "Pods:\tnot authorized\n")
|
|
}
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
type StatefulSetDescriber struct {
|
|
client clientset.Interface
|
|
}
|
|
|
|
func (p *StatefulSetDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
ps, err := p.client.Apps().StatefulSets(namespace).Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
pc := p.client.Core().Pods(namespace)
|
|
|
|
selector, err := metav1.LabelSelectorAsSelector(ps.Spec.Selector)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
running, waiting, succeeded, failed, err := getPodStatusForController(pc, selector, ps.UID)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = p.client.Core().Events(namespace).Search(legacyscheme.Scheme, ps)
|
|
}
|
|
|
|
return describeStatefulSet(ps, selector, events, running, waiting, succeeded, failed)
|
|
}
|
|
|
|
func describeStatefulSet(ps *apps.StatefulSet, selector labels.Selector, events *api.EventList, running, waiting, succeeded, failed int) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", ps.ObjectMeta.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", ps.ObjectMeta.Namespace)
|
|
w.Write(LEVEL_0, "CreationTimestamp:\t%s\n", ps.CreationTimestamp.Time.Format(time.RFC1123Z))
|
|
w.Write(LEVEL_0, "Selector:\t%s\n", selector)
|
|
printLabelsMultiline(w, "Labels", ps.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", ps.Annotations)
|
|
w.Write(LEVEL_0, "Replicas:\t%d desired | %d total\n", ps.Spec.Replicas, ps.Status.Replicas)
|
|
w.Write(LEVEL_0, "Update Strategy:\t%s\n", ps.Spec.UpdateStrategy.Type)
|
|
if ps.Spec.UpdateStrategy.RollingUpdate != nil {
|
|
ru := ps.Spec.UpdateStrategy.RollingUpdate
|
|
if ru.Partition != 0 {
|
|
w.Write(LEVEL_1, "Partition:\t%d\n", ru.Partition)
|
|
}
|
|
}
|
|
|
|
w.Write(LEVEL_0, "Pods Status:\t%d Running / %d Waiting / %d Succeeded / %d Failed\n", running, waiting, succeeded, failed)
|
|
DescribePodTemplate(&ps.Spec.Template, w)
|
|
describeVolumeClaimTemplates(ps.Spec.VolumeClaimTemplates, w)
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
type CertificateSigningRequestDescriber struct {
|
|
client clientset.Interface
|
|
}
|
|
|
|
func (p *CertificateSigningRequestDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
csr, err := p.client.Certificates().CertificateSigningRequests().Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
cr, err := certificates.ParseCSR(csr)
|
|
if err != nil {
|
|
return "", fmt.Errorf("Error parsing CSR: %v", err)
|
|
}
|
|
status, err := extractCSRStatus(csr)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = p.client.Core().Events(namespace).Search(legacyscheme.Scheme, csr)
|
|
}
|
|
|
|
return describeCertificateSigningRequest(csr, cr, status, events)
|
|
}
|
|
|
|
func describeCertificateSigningRequest(csr *certificates.CertificateSigningRequest, cr *x509.CertificateRequest, status string, events *api.EventList) (string, error) {
|
|
printListHelper := func(w PrefixWriter, prefix, name string, values []string) {
|
|
if len(values) == 0 {
|
|
return
|
|
}
|
|
w.Write(LEVEL_0, prefix+name+":\t")
|
|
w.Write(LEVEL_0, strings.Join(values, "\n"+prefix+"\t"))
|
|
w.Write(LEVEL_0, "\n")
|
|
}
|
|
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", csr.Name)
|
|
w.Write(LEVEL_0, "Labels:\t%s\n", labels.FormatLabels(csr.Labels))
|
|
w.Write(LEVEL_0, "Annotations:\t%s\n", labels.FormatLabels(csr.Annotations))
|
|
w.Write(LEVEL_0, "CreationTimestamp:\t%s\n", csr.CreationTimestamp.Time.Format(time.RFC1123Z))
|
|
w.Write(LEVEL_0, "Requesting User:\t%s\n", csr.Spec.Username)
|
|
w.Write(LEVEL_0, "Status:\t%s\n", status)
|
|
|
|
w.Write(LEVEL_0, "Subject:\n")
|
|
w.Write(LEVEL_0, "\tCommon Name:\t%s\n", cr.Subject.CommonName)
|
|
w.Write(LEVEL_0, "\tSerial Number:\t%s\n", cr.Subject.SerialNumber)
|
|
printListHelper(w, "\t", "Organization", cr.Subject.Organization)
|
|
printListHelper(w, "\t", "Organizational Unit", cr.Subject.OrganizationalUnit)
|
|
printListHelper(w, "\t", "Country", cr.Subject.Country)
|
|
printListHelper(w, "\t", "Locality", cr.Subject.Locality)
|
|
printListHelper(w, "\t", "Province", cr.Subject.Province)
|
|
printListHelper(w, "\t", "StreetAddress", cr.Subject.StreetAddress)
|
|
printListHelper(w, "\t", "PostalCode", cr.Subject.PostalCode)
|
|
|
|
if len(cr.DNSNames)+len(cr.EmailAddresses)+len(cr.IPAddresses) > 0 {
|
|
w.Write(LEVEL_0, "Subject Alternative Names:\n")
|
|
printListHelper(w, "\t", "DNS Names", cr.DNSNames)
|
|
printListHelper(w, "\t", "Email Addresses", cr.EmailAddresses)
|
|
var ipaddrs []string
|
|
for _, ipaddr := range cr.IPAddresses {
|
|
ipaddrs = append(ipaddrs, ipaddr.String())
|
|
}
|
|
printListHelper(w, "\t", "IP Addresses", ipaddrs)
|
|
}
|
|
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// HorizontalPodAutoscalerDescriber generates information about a horizontal pod autoscaler.
|
|
type HorizontalPodAutoscalerDescriber struct {
|
|
client clientset.Interface
|
|
}
|
|
|
|
func (d *HorizontalPodAutoscalerDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
hpa, err := d.client.Autoscaling().HorizontalPodAutoscalers(namespace).Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = d.client.Core().Events(namespace).Search(legacyscheme.Scheme, hpa)
|
|
}
|
|
|
|
return describeHorizontalPodAutoscaler(hpa, events, d)
|
|
}
|
|
|
|
func describeHorizontalPodAutoscaler(hpa *autoscaling.HorizontalPodAutoscaler, events *api.EventList, d *HorizontalPodAutoscalerDescriber) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", hpa.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", hpa.Namespace)
|
|
printLabelsMultiline(w, "Labels", hpa.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", hpa.Annotations)
|
|
w.Write(LEVEL_0, "CreationTimestamp:\t%s\n", hpa.CreationTimestamp.Time.Format(time.RFC1123Z))
|
|
w.Write(LEVEL_0, "Reference:\t%s/%s\n",
|
|
hpa.Spec.ScaleTargetRef.Kind,
|
|
hpa.Spec.ScaleTargetRef.Name)
|
|
w.Write(LEVEL_0, "Metrics:\t( current / target )\n")
|
|
for i, metric := range hpa.Spec.Metrics {
|
|
switch metric.Type {
|
|
case autoscaling.ExternalMetricSourceType:
|
|
if metric.External.TargetAverageValue != nil {
|
|
current := "<unknown>"
|
|
if len(hpa.Status.CurrentMetrics) > i && hpa.Status.CurrentMetrics[i].External != nil &&
|
|
hpa.Status.CurrentMetrics[i].External.CurrentAverageValue != nil {
|
|
current = hpa.Status.CurrentMetrics[i].External.CurrentAverageValue.String()
|
|
}
|
|
w.Write(LEVEL_1, "%q (target average value):\t%s / %s\n", metric.External.MetricName, current, metric.External.TargetAverageValue.String())
|
|
} else {
|
|
current := "<unknown>"
|
|
if len(hpa.Status.CurrentMetrics) > i && hpa.Status.CurrentMetrics[i].External != nil {
|
|
current = hpa.Status.CurrentMetrics[i].External.CurrentValue.String()
|
|
}
|
|
w.Write(LEVEL_1, "%q (target value):\t%s / %s\n", metric.External.MetricName, current, metric.External.TargetValue.String())
|
|
|
|
}
|
|
case autoscaling.PodsMetricSourceType:
|
|
current := "<unknown>"
|
|
if len(hpa.Status.CurrentMetrics) > i && hpa.Status.CurrentMetrics[i].Pods != nil {
|
|
current = hpa.Status.CurrentMetrics[i].Pods.CurrentAverageValue.String()
|
|
}
|
|
w.Write(LEVEL_1, "%q on pods:\t%s / %s\n", metric.Pods.MetricName, current, metric.Pods.TargetAverageValue.String())
|
|
case autoscaling.ObjectMetricSourceType:
|
|
current := "<unknown>"
|
|
if len(hpa.Status.CurrentMetrics) > i && hpa.Status.CurrentMetrics[i].Object != nil {
|
|
current = hpa.Status.CurrentMetrics[i].Object.CurrentValue.String()
|
|
}
|
|
w.Write(LEVEL_1, "%q on %s/%s:\t%s / %s\n", metric.Object.MetricName, metric.Object.Target.Kind, metric.Object.Target.Name, current, metric.Object.TargetValue.String())
|
|
case autoscaling.ResourceMetricSourceType:
|
|
w.Write(LEVEL_1, "resource %s on pods", string(metric.Resource.Name))
|
|
if metric.Resource.TargetAverageValue != nil {
|
|
current := "<unknown>"
|
|
if len(hpa.Status.CurrentMetrics) > i && hpa.Status.CurrentMetrics[i].Resource != nil {
|
|
current = hpa.Status.CurrentMetrics[i].Resource.CurrentAverageValue.String()
|
|
}
|
|
w.Write(LEVEL_0, ":\t%s / %s\n", current, metric.Resource.TargetAverageValue.String())
|
|
} else {
|
|
current := "<unknown>"
|
|
if len(hpa.Status.CurrentMetrics) > i && hpa.Status.CurrentMetrics[i].Resource != nil && hpa.Status.CurrentMetrics[i].Resource.CurrentAverageUtilization != nil {
|
|
current = fmt.Sprintf("%d%% (%s)", *hpa.Status.CurrentMetrics[i].Resource.CurrentAverageUtilization, hpa.Status.CurrentMetrics[i].Resource.CurrentAverageValue.String())
|
|
}
|
|
|
|
target := "<auto>"
|
|
if metric.Resource.TargetAverageUtilization != nil {
|
|
target = fmt.Sprintf("%d%%", *metric.Resource.TargetAverageUtilization)
|
|
}
|
|
w.Write(LEVEL_1, "(as a percentage of request):\t%s / %s\n", current, target)
|
|
}
|
|
default:
|
|
w.Write(LEVEL_1, "<unknown metric type %q>", string(metric.Type))
|
|
}
|
|
}
|
|
minReplicas := "<unset>"
|
|
if hpa.Spec.MinReplicas != nil {
|
|
minReplicas = fmt.Sprintf("%d", *hpa.Spec.MinReplicas)
|
|
}
|
|
w.Write(LEVEL_0, "Min replicas:\t%s\n", minReplicas)
|
|
w.Write(LEVEL_0, "Max replicas:\t%d\n", hpa.Spec.MaxReplicas)
|
|
w.Write(LEVEL_0, "%s pods:\t", hpa.Spec.ScaleTargetRef.Kind)
|
|
w.Write(LEVEL_0, "%d current / %d desired\n", hpa.Status.CurrentReplicas, hpa.Status.DesiredReplicas)
|
|
|
|
if len(hpa.Status.Conditions) > 0 {
|
|
w.Write(LEVEL_0, "Conditions:\n")
|
|
w.Write(LEVEL_1, "Type\tStatus\tReason\tMessage\n")
|
|
w.Write(LEVEL_1, "----\t------\t------\t-------\n")
|
|
for _, c := range hpa.Status.Conditions {
|
|
w.Write(LEVEL_1, "%v\t%v\t%v\t%v\n", c.Type, c.Status, c.Reason, c.Message)
|
|
}
|
|
}
|
|
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func describeNodeResource(nodeNonTerminatedPodsList *api.PodList, node *api.Node, w PrefixWriter) {
|
|
w.Write(LEVEL_0, "Non-terminated Pods:\t(%d in total)\n", len(nodeNonTerminatedPodsList.Items))
|
|
w.Write(LEVEL_1, "Namespace\tName\t\tCPU Requests\tCPU Limits\tMemory Requests\tMemory Limits\n")
|
|
w.Write(LEVEL_1, "---------\t----\t\t------------\t----------\t---------------\t-------------\n")
|
|
allocatable := node.Status.Capacity
|
|
if len(node.Status.Allocatable) > 0 {
|
|
allocatable = node.Status.Allocatable
|
|
}
|
|
|
|
for _, pod := range nodeNonTerminatedPodsList.Items {
|
|
req, limit := resourcehelper.PodRequestsAndLimits(&pod)
|
|
cpuReq, cpuLimit, memoryReq, memoryLimit := req[api.ResourceCPU], limit[api.ResourceCPU], req[api.ResourceMemory], limit[api.ResourceMemory]
|
|
fractionCpuReq := float64(cpuReq.MilliValue()) / float64(allocatable.Cpu().MilliValue()) * 100
|
|
fractionCpuLimit := float64(cpuLimit.MilliValue()) / float64(allocatable.Cpu().MilliValue()) * 100
|
|
fractionMemoryReq := float64(memoryReq.Value()) / float64(allocatable.Memory().Value()) * 100
|
|
fractionMemoryLimit := float64(memoryLimit.Value()) / float64(allocatable.Memory().Value()) * 100
|
|
w.Write(LEVEL_1, "%s\t%s\t\t%s (%d%%)\t%s (%d%%)\t%s (%d%%)\t%s (%d%%)\n", pod.Namespace, pod.Name,
|
|
cpuReq.String(), int64(fractionCpuReq), cpuLimit.String(), int64(fractionCpuLimit),
|
|
memoryReq.String(), int64(fractionMemoryReq), memoryLimit.String(), int64(fractionMemoryLimit))
|
|
}
|
|
|
|
w.Write(LEVEL_0, "Allocated resources:\n (Total limits may be over 100 percent, i.e., overcommitted.)\n")
|
|
w.Write(LEVEL_1, "Resource\tRequests\tLimits\n")
|
|
w.Write(LEVEL_1, "--------\t--------\t------\n")
|
|
reqs, limits := getPodsTotalRequestsAndLimits(nodeNonTerminatedPodsList)
|
|
cpuReqs, cpuLimits, memoryReqs, memoryLimits := reqs[api.ResourceCPU], limits[api.ResourceCPU], reqs[api.ResourceMemory], limits[api.ResourceMemory]
|
|
fractionCpuReqs := float64(0)
|
|
fractionCpuLimits := float64(0)
|
|
if allocatable.Cpu().MilliValue() != 0 {
|
|
fractionCpuReqs = float64(cpuReqs.MilliValue()) / float64(allocatable.Cpu().MilliValue()) * 100
|
|
fractionCpuLimits = float64(cpuLimits.MilliValue()) / float64(allocatable.Cpu().MilliValue()) * 100
|
|
}
|
|
fractionMemoryReqs := float64(0)
|
|
fractionMemoryLimits := float64(0)
|
|
if allocatable.Memory().Value() != 0 {
|
|
fractionMemoryReqs = float64(memoryReqs.Value()) / float64(allocatable.Memory().Value()) * 100
|
|
fractionMemoryLimits = float64(memoryLimits.Value()) / float64(allocatable.Memory().Value()) * 100
|
|
}
|
|
w.Write(LEVEL_1, "%s\t%s (%d%%)\t%s (%d%%)\n",
|
|
api.ResourceCPU, cpuReqs.String(), int64(fractionCpuReqs), cpuLimits.String(), int64(fractionCpuLimits))
|
|
w.Write(LEVEL_1, "%s\t%s (%d%%)\t%s (%d%%)\n",
|
|
api.ResourceMemory, memoryReqs.String(), int64(fractionMemoryReqs), memoryLimits.String(), int64(fractionMemoryLimits))
|
|
extResources := make([]string, 0, len(allocatable))
|
|
for resource := range allocatable {
|
|
if !helper.IsStandardContainerResourceName(string(resource)) && resource != api.ResourcePods {
|
|
extResources = append(extResources, string(resource))
|
|
}
|
|
}
|
|
sort.Strings(extResources)
|
|
for _, ext := range extResources {
|
|
extRequests, extLimits := reqs[api.ResourceName(ext)], limits[api.ResourceName(ext)]
|
|
w.Write(LEVEL_1, "%s\t%s\t%s\n", ext, extRequests.String(), extLimits.String())
|
|
}
|
|
}
|
|
|
|
func getPodsTotalRequestsAndLimits(podList *api.PodList) (reqs map[api.ResourceName]resource.Quantity, limits map[api.ResourceName]resource.Quantity) {
|
|
reqs, limits = map[api.ResourceName]resource.Quantity{}, map[api.ResourceName]resource.Quantity{}
|
|
for _, pod := range podList.Items {
|
|
podReqs, podLimits := resourcehelper.PodRequestsAndLimits(&pod)
|
|
for podReqName, podReqValue := range podReqs {
|
|
if value, ok := reqs[podReqName]; !ok {
|
|
reqs[podReqName] = *podReqValue.Copy()
|
|
} else {
|
|
value.Add(podReqValue)
|
|
reqs[podReqName] = value
|
|
}
|
|
}
|
|
for podLimitName, podLimitValue := range podLimits {
|
|
if value, ok := limits[podLimitName]; !ok {
|
|
limits[podLimitName] = *podLimitValue.Copy()
|
|
} else {
|
|
value.Add(podLimitValue)
|
|
limits[podLimitName] = value
|
|
}
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
func DescribeEvents(el *api.EventList, w PrefixWriter) {
|
|
if len(el.Items) == 0 {
|
|
w.Write(LEVEL_0, "Events:\t<none>\n")
|
|
return
|
|
}
|
|
w.Flush()
|
|
sort.Sort(events.SortableEvents(el.Items))
|
|
w.Write(LEVEL_0, "Events:\n Type\tReason\tAge\tFrom\tMessage\n")
|
|
w.Write(LEVEL_1, "----\t------\t----\t----\t-------\n")
|
|
for _, e := range el.Items {
|
|
var interval string
|
|
if e.Count > 1 {
|
|
interval = fmt.Sprintf("%s (x%d over %s)", translateTimestamp(e.LastTimestamp), e.Count, translateTimestamp(e.FirstTimestamp))
|
|
} else {
|
|
interval = translateTimestamp(e.FirstTimestamp)
|
|
}
|
|
w.Write(LEVEL_1, "%v\t%v\t%s\t%v\t%v\n",
|
|
e.Type,
|
|
e.Reason,
|
|
interval,
|
|
formatEventSource(e.Source),
|
|
strings.TrimSpace(e.Message),
|
|
)
|
|
}
|
|
}
|
|
|
|
// DeploymentDescriber generates information about a deployment.
|
|
type DeploymentDescriber struct {
|
|
clientset.Interface
|
|
external externalclient.Interface
|
|
}
|
|
|
|
func (dd *DeploymentDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
d, err := dd.external.AppsV1().Deployments(namespace).Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
selector, err := metav1.LabelSelectorAsSelector(d.Spec.Selector)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
internalDeployment := &extensions.Deployment{}
|
|
if err := legacyscheme.Scheme.Convert(d, internalDeployment, extensions.SchemeGroupVersion); err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = dd.Core().Events(namespace).Search(legacyscheme.Scheme, d)
|
|
}
|
|
|
|
return describeDeployment(d, selector, internalDeployment, events, dd)
|
|
}
|
|
|
|
func describeDeployment(d *appsv1.Deployment, selector labels.Selector, internalDeployment *extensions.Deployment, events *api.EventList, dd *DeploymentDescriber) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", d.ObjectMeta.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", d.ObjectMeta.Namespace)
|
|
w.Write(LEVEL_0, "CreationTimestamp:\t%s\n", d.CreationTimestamp.Time.Format(time.RFC1123Z))
|
|
printLabelsMultiline(w, "Labels", d.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", d.Annotations)
|
|
w.Write(LEVEL_0, "Selector:\t%s\n", selector)
|
|
w.Write(LEVEL_0, "Replicas:\t%d desired | %d updated | %d total | %d available | %d unavailable\n", *(d.Spec.Replicas), d.Status.UpdatedReplicas, d.Status.Replicas, d.Status.AvailableReplicas, d.Status.UnavailableReplicas)
|
|
w.Write(LEVEL_0, "StrategyType:\t%s\n", d.Spec.Strategy.Type)
|
|
w.Write(LEVEL_0, "MinReadySeconds:\t%d\n", d.Spec.MinReadySeconds)
|
|
if d.Spec.Strategy.RollingUpdate != nil {
|
|
ru := d.Spec.Strategy.RollingUpdate
|
|
w.Write(LEVEL_0, "RollingUpdateStrategy:\t%s max unavailable, %s max surge\n", ru.MaxUnavailable.String(), ru.MaxSurge.String())
|
|
}
|
|
DescribePodTemplate(&internalDeployment.Spec.Template, w)
|
|
if len(d.Status.Conditions) > 0 {
|
|
w.Write(LEVEL_0, "Conditions:\n Type\tStatus\tReason\n")
|
|
w.Write(LEVEL_1, "----\t------\t------\n")
|
|
for _, c := range d.Status.Conditions {
|
|
w.Write(LEVEL_1, "%v \t%v\t%v\n", c.Type, c.Status, c.Reason)
|
|
}
|
|
}
|
|
oldRSs, _, newRS, err := deploymentutil.GetAllReplicaSets(d, dd.external.AppsV1())
|
|
if err == nil {
|
|
w.Write(LEVEL_0, "OldReplicaSets:\t%s\n", printReplicaSetsByLabels(oldRSs))
|
|
var newRSs []*appsv1.ReplicaSet
|
|
if newRS != nil {
|
|
newRSs = append(newRSs, newRS)
|
|
}
|
|
w.Write(LEVEL_0, "NewReplicaSet:\t%s\n", printReplicaSetsByLabels(newRSs))
|
|
}
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func printReplicaSetsByLabels(matchingRSs []*appsv1.ReplicaSet) string {
|
|
// Format the matching ReplicaSets into strings.
|
|
rsStrings := make([]string, 0, len(matchingRSs))
|
|
for _, rs := range matchingRSs {
|
|
rsStrings = append(rsStrings, fmt.Sprintf("%s (%d/%d replicas created)", rs.Name, rs.Status.Replicas, *rs.Spec.Replicas))
|
|
}
|
|
|
|
list := strings.Join(rsStrings, ", ")
|
|
if list == "" {
|
|
return "<none>"
|
|
}
|
|
return list
|
|
}
|
|
|
|
func getPodStatusForController(c coreclient.PodInterface, selector labels.Selector, uid types.UID) (running, waiting, succeeded, failed int, err error) {
|
|
options := metav1.ListOptions{LabelSelector: selector.String()}
|
|
rcPods, err := c.List(options)
|
|
if err != nil {
|
|
return
|
|
}
|
|
for _, pod := range rcPods.Items {
|
|
controllerRef := metav1.GetControllerOf(&pod)
|
|
// Skip pods that are orphans or owned by other controllers.
|
|
if controllerRef == nil || controllerRef.UID != uid {
|
|
continue
|
|
}
|
|
switch pod.Status.Phase {
|
|
case api.PodRunning:
|
|
running++
|
|
case api.PodPending:
|
|
waiting++
|
|
case api.PodSucceeded:
|
|
succeeded++
|
|
case api.PodFailed:
|
|
failed++
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
// ConfigMapDescriber generates information about a ConfigMap
|
|
type ConfigMapDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *ConfigMapDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
c := d.Core().ConfigMaps(namespace)
|
|
|
|
configMap, err := c.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", configMap.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", configMap.Namespace)
|
|
printLabelsMultiline(w, "Labels", configMap.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", configMap.Annotations)
|
|
|
|
w.Write(LEVEL_0, "\nData\n====\n")
|
|
for k, v := range configMap.Data {
|
|
w.Write(LEVEL_0, "%s:\n----\n", k)
|
|
w.Write(LEVEL_0, "%s\n", string(v))
|
|
}
|
|
if describerSettings.ShowEvents {
|
|
events, err := d.Core().Events(namespace).Search(legacyscheme.Scheme, configMap)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// NetworkPolicyDescriber generates information about a networking.NetworkPolicy
|
|
type NetworkPolicyDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *NetworkPolicyDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
c := d.Networking().NetworkPolicies(namespace)
|
|
|
|
networkPolicy, err := c.Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return describeNetworkPolicy(networkPolicy)
|
|
}
|
|
|
|
func describeNetworkPolicy(networkPolicy *networking.NetworkPolicy) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", networkPolicy.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", networkPolicy.Namespace)
|
|
w.Write(LEVEL_0, "Created on:\t%s\n", networkPolicy.CreationTimestamp)
|
|
printLabelsMultiline(w, "Labels", networkPolicy.Labels)
|
|
printAnnotationsMultiline(w, "Annotations", networkPolicy.Annotations)
|
|
describeNetworkPolicySpec(networkPolicy.Spec, w)
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func describeNetworkPolicySpec(nps networking.NetworkPolicySpec, w PrefixWriter) {
|
|
w.Write(LEVEL_0, "Spec:\n")
|
|
w.Write(LEVEL_1, "PodSelector: ")
|
|
if len(nps.PodSelector.MatchLabels) == 0 && len(nps.PodSelector.MatchExpressions) == 0 {
|
|
w.Write(LEVEL_2, "<none> (Allowing the specific traffic to all pods in this namespace)\n")
|
|
} else {
|
|
w.Write(LEVEL_2, "%s\n", metav1.FormatLabelSelector(&nps.PodSelector))
|
|
}
|
|
w.Write(LEVEL_1, "Allowing ingress traffic:\n")
|
|
printNetworkPolicySpecIngressFrom(nps.Ingress, " ", w)
|
|
w.Write(LEVEL_1, "Allowing egress traffic:\n")
|
|
printNetworkPolicySpecEgressTo(nps.Egress, " ", w)
|
|
w.Write(LEVEL_1, "Policy Types: %v\n", policyTypesToString(nps.PolicyTypes))
|
|
}
|
|
|
|
func printNetworkPolicySpecIngressFrom(npirs []networking.NetworkPolicyIngressRule, initialIndent string, w PrefixWriter) {
|
|
if len(npirs) == 0 {
|
|
w.Write(LEVEL_0, "%s%s\n", initialIndent, "<none> (Selected pods are isolated for ingress connectivity)")
|
|
return
|
|
}
|
|
for i, npir := range npirs {
|
|
if len(npir.Ports) == 0 {
|
|
w.Write(LEVEL_0, "%s%s\n", initialIndent, "To Port: <any> (traffic allowed to all ports)")
|
|
} else {
|
|
for _, port := range npir.Ports {
|
|
var proto api.Protocol
|
|
if port.Protocol != nil {
|
|
proto = *port.Protocol
|
|
} else {
|
|
proto = api.ProtocolTCP
|
|
}
|
|
w.Write(LEVEL_0, "%s%s: %s/%s\n", initialIndent, "To Port", port.Port, proto)
|
|
}
|
|
}
|
|
if len(npir.From) == 0 {
|
|
w.Write(LEVEL_0, "%s%s\n", initialIndent, "From: <any> (traffic not restricted by source)")
|
|
} else {
|
|
for _, from := range npir.From {
|
|
w.Write(LEVEL_0, "%s%s\n", initialIndent, "From:")
|
|
if from.PodSelector != nil && from.NamespaceSelector != nil {
|
|
w.Write(LEVEL_1, "%s%s: %s\n", initialIndent, "NamespaceSelector", metav1.FormatLabelSelector(from.NamespaceSelector))
|
|
w.Write(LEVEL_1, "%s%s: %s\n", initialIndent, "PodSelector", metav1.FormatLabelSelector(from.PodSelector))
|
|
} else if from.PodSelector != nil {
|
|
w.Write(LEVEL_1, "%s%s: %s\n", initialIndent, "PodSelector", metav1.FormatLabelSelector(from.PodSelector))
|
|
} else if from.NamespaceSelector != nil {
|
|
w.Write(LEVEL_1, "%s%s: %s\n", initialIndent, "NamespaceSelector", metav1.FormatLabelSelector(from.NamespaceSelector))
|
|
} else if from.IPBlock != nil {
|
|
w.Write(LEVEL_1, "%sIPBlock:\n", initialIndent)
|
|
w.Write(LEVEL_2, "%sCIDR: %s\n", initialIndent, from.IPBlock.CIDR)
|
|
w.Write(LEVEL_2, "%sExcept: %v\n", initialIndent, strings.Join(from.IPBlock.Except, ", "))
|
|
}
|
|
}
|
|
}
|
|
if i != len(npirs)-1 {
|
|
w.Write(LEVEL_0, "%s%s\n", initialIndent, "----------")
|
|
}
|
|
}
|
|
}
|
|
|
|
func printNetworkPolicySpecEgressTo(npers []networking.NetworkPolicyEgressRule, initialIndent string, w PrefixWriter) {
|
|
if len(npers) == 0 {
|
|
w.Write(LEVEL_0, "%s%s\n", initialIndent, "<none> (Selected pods are isolated for egress connectivity)")
|
|
return
|
|
}
|
|
for i, nper := range npers {
|
|
if len(nper.Ports) == 0 {
|
|
w.Write(LEVEL_0, "%s%s\n", initialIndent, "To Port: <any> (traffic allowed to all ports)")
|
|
} else {
|
|
for _, port := range nper.Ports {
|
|
var proto api.Protocol
|
|
if port.Protocol != nil {
|
|
proto = *port.Protocol
|
|
} else {
|
|
proto = api.ProtocolTCP
|
|
}
|
|
w.Write(LEVEL_0, "%s%s: %s/%s\n", initialIndent, "To Port", port.Port, proto)
|
|
}
|
|
}
|
|
if len(nper.To) == 0 {
|
|
w.Write(LEVEL_0, "%s%s\n", initialIndent, "To: <any> (traffic not restricted by source)")
|
|
} else {
|
|
for _, to := range nper.To {
|
|
w.Write(LEVEL_0, "%s%s\n", initialIndent, "To:")
|
|
if to.PodSelector != nil && to.NamespaceSelector != nil {
|
|
w.Write(LEVEL_1, "%s%s: %s\n", initialIndent, "NamespaceSelector", metav1.FormatLabelSelector(to.NamespaceSelector))
|
|
w.Write(LEVEL_1, "%s%s: %s\n", initialIndent, "PodSelector", metav1.FormatLabelSelector(to.PodSelector))
|
|
} else if to.PodSelector != nil {
|
|
w.Write(LEVEL_1, "%s%s: %s\n", initialIndent, "PodSelector", metav1.FormatLabelSelector(to.PodSelector))
|
|
} else if to.NamespaceSelector != nil {
|
|
w.Write(LEVEL_1, "%s%s: %s\n", initialIndent, "NamespaceSelector", metav1.FormatLabelSelector(to.NamespaceSelector))
|
|
} else if to.IPBlock != nil {
|
|
w.Write(LEVEL_1, "%sIPBlock:\n", initialIndent)
|
|
w.Write(LEVEL_2, "%sCIDR: %s\n", initialIndent, to.IPBlock.CIDR)
|
|
w.Write(LEVEL_2, "%sExcept: %v\n", initialIndent, strings.Join(to.IPBlock.Except, ", "))
|
|
}
|
|
}
|
|
}
|
|
if i != len(npers)-1 {
|
|
w.Write(LEVEL_0, "%s%s\n", initialIndent, "----------")
|
|
}
|
|
}
|
|
}
|
|
|
|
type StorageClassDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (s *StorageClassDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
sc, err := s.Storage().StorageClasses().Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = s.Core().Events(namespace).Search(legacyscheme.Scheme, sc)
|
|
}
|
|
|
|
return describeStorageClass(sc, events)
|
|
}
|
|
|
|
func describeStorageClass(sc *storage.StorageClass, events *api.EventList) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", sc.Name)
|
|
w.Write(LEVEL_0, "IsDefaultClass:\t%s\n", storageutil.IsDefaultAnnotationText(sc.ObjectMeta))
|
|
w.Write(LEVEL_0, "Annotations:\t%s\n", labels.FormatLabels(sc.Annotations))
|
|
w.Write(LEVEL_0, "Provisioner:\t%s\n", sc.Provisioner)
|
|
w.Write(LEVEL_0, "Parameters:\t%s\n", labels.FormatLabels(sc.Parameters))
|
|
w.Write(LEVEL_0, "AllowVolumeExpansion:\t%s\n", printBoolPtr(sc.AllowVolumeExpansion))
|
|
if len(sc.MountOptions) == 0 {
|
|
w.Write(LEVEL_0, "MountOptions:\t<none>\n")
|
|
} else {
|
|
w.Write(LEVEL_0, "MountOptions:\n")
|
|
for _, option := range sc.MountOptions {
|
|
w.Write(LEVEL_1, "%s\n", option)
|
|
}
|
|
}
|
|
if sc.ReclaimPolicy != nil {
|
|
w.Write(LEVEL_0, "ReclaimPolicy:\t%s\n", *sc.ReclaimPolicy)
|
|
}
|
|
if sc.VolumeBindingMode != nil {
|
|
w.Write(LEVEL_0, "VolumeBindingMode:\t%s\n", *sc.VolumeBindingMode)
|
|
}
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
type PodDisruptionBudgetDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (p *PodDisruptionBudgetDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
pdb, err := p.Policy().PodDisruptionBudgets(namespace).Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = p.Core().Events(namespace).Search(legacyscheme.Scheme, pdb)
|
|
}
|
|
|
|
return describePodDisruptionBudget(pdb, events)
|
|
}
|
|
|
|
func describePodDisruptionBudget(pdb *policy.PodDisruptionBudget, events *api.EventList) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", pdb.Name)
|
|
w.Write(LEVEL_0, "Namespace:\t%s\n", pdb.Namespace)
|
|
|
|
if pdb.Spec.MinAvailable != nil {
|
|
w.Write(LEVEL_0, "Min available:\t%s\n", pdb.Spec.MinAvailable.String())
|
|
} else if pdb.Spec.MaxUnavailable != nil {
|
|
w.Write(LEVEL_0, "Max unavailable:\t%s\n", pdb.Spec.MaxUnavailable.String())
|
|
}
|
|
|
|
if pdb.Spec.Selector != nil {
|
|
w.Write(LEVEL_0, "Selector:\t%s\n", metav1.FormatLabelSelector(pdb.Spec.Selector))
|
|
} else {
|
|
w.Write(LEVEL_0, "Selector:\t<unset>\n")
|
|
}
|
|
w.Write(LEVEL_0, "Status:\n")
|
|
w.Write(LEVEL_2, "Allowed disruptions:\t%d\n", pdb.Status.PodDisruptionsAllowed)
|
|
w.Write(LEVEL_2, "Current:\t%d\n", pdb.Status.CurrentHealthy)
|
|
w.Write(LEVEL_2, "Desired:\t%d\n", pdb.Status.DesiredHealthy)
|
|
w.Write(LEVEL_2, "Total:\t%d\n", pdb.Status.ExpectedPods)
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// PriorityClassDescriber generates information about a PriorityClass.
|
|
type PriorityClassDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (s *PriorityClassDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
pc, err := s.Scheduling().PriorityClasses().Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var events *api.EventList
|
|
if describerSettings.ShowEvents {
|
|
events, _ = s.Core().Events(namespace).Search(legacyscheme.Scheme, pc)
|
|
}
|
|
|
|
return describePriorityClass(pc, events)
|
|
}
|
|
|
|
func describePriorityClass(pc *scheduling.PriorityClass, events *api.EventList) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", pc.Name)
|
|
w.Write(LEVEL_0, "Value:\t%v\n", pc.Value)
|
|
w.Write(LEVEL_0, "GlobalDefault:\t%v\n", pc.GlobalDefault)
|
|
w.Write(LEVEL_0, "Description:\t%s\n", pc.Description)
|
|
|
|
w.Write(LEVEL_0, "Annotations:\t%s\n", labels.FormatLabels(pc.Annotations))
|
|
if events != nil {
|
|
DescribeEvents(events, w)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// PodSecurityPolicyDescriber generates information about a PodSecurityPolicy.
|
|
type PodSecurityPolicyDescriber struct {
|
|
clientset.Interface
|
|
}
|
|
|
|
func (d *PodSecurityPolicyDescriber) Describe(namespace, name string, describerSettings printers.DescriberSettings) (string, error) {
|
|
psp, err := d.Policy().PodSecurityPolicies().Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return describePodSecurityPolicy(psp)
|
|
}
|
|
|
|
func describePodSecurityPolicy(psp *policy.PodSecurityPolicy) (string, error) {
|
|
return tabbedString(func(out io.Writer) error {
|
|
w := NewPrefixWriter(out)
|
|
w.Write(LEVEL_0, "Name:\t%s\n", psp.Name)
|
|
|
|
w.Write(LEVEL_0, "\nSettings:\n")
|
|
|
|
w.Write(LEVEL_1, "Allow Privileged:\t%t\n", psp.Spec.Privileged)
|
|
w.Write(LEVEL_1, "Allow Privilege Escalation:\t%v\n", psp.Spec.AllowPrivilegeEscalation)
|
|
w.Write(LEVEL_1, "Default Add Capabilities:\t%v\n", capsToString(psp.Spec.DefaultAddCapabilities))
|
|
w.Write(LEVEL_1, "Required Drop Capabilities:\t%s\n", capsToString(psp.Spec.RequiredDropCapabilities))
|
|
w.Write(LEVEL_1, "Allowed Capabilities:\t%s\n", capsToString(psp.Spec.AllowedCapabilities))
|
|
w.Write(LEVEL_1, "Allowed Volume Types:\t%s\n", fsTypeToString(psp.Spec.Volumes))
|
|
|
|
if len(psp.Spec.AllowedFlexVolumes) > 0 {
|
|
w.Write(LEVEL_1, "Allowed FlexVolume Types:\t%s\n", flexVolumesToString(psp.Spec.AllowedFlexVolumes))
|
|
}
|
|
w.Write(LEVEL_1, "Allow Host Network:\t%t\n", psp.Spec.HostNetwork)
|
|
w.Write(LEVEL_1, "Allow Host Ports:\t%s\n", hostPortRangeToString(psp.Spec.HostPorts))
|
|
w.Write(LEVEL_1, "Allow Host PID:\t%t\n", psp.Spec.HostPID)
|
|
w.Write(LEVEL_1, "Allow Host IPC:\t%t\n", psp.Spec.HostIPC)
|
|
w.Write(LEVEL_1, "Read Only Root Filesystem:\t%v\n", psp.Spec.ReadOnlyRootFilesystem)
|
|
|
|
w.Write(LEVEL_1, "SELinux Context Strategy: %s\t\n", string(psp.Spec.SELinux.Rule))
|
|
var user, role, seLinuxType, level string
|
|
if psp.Spec.SELinux.SELinuxOptions != nil {
|
|
user = psp.Spec.SELinux.SELinuxOptions.User
|
|
role = psp.Spec.SELinux.SELinuxOptions.Role
|
|
seLinuxType = psp.Spec.SELinux.SELinuxOptions.Type
|
|
level = psp.Spec.SELinux.SELinuxOptions.Level
|
|
}
|
|
w.Write(LEVEL_2, "User:\t%s\n", stringOrNone(user))
|
|
w.Write(LEVEL_2, "Role:\t%s\n", stringOrNone(role))
|
|
w.Write(LEVEL_2, "Type:\t%s\n", stringOrNone(seLinuxType))
|
|
w.Write(LEVEL_2, "Level:\t%s\n", stringOrNone(level))
|
|
|
|
w.Write(LEVEL_1, "Run As User Strategy: %s\t\n", string(psp.Spec.RunAsUser.Rule))
|
|
w.Write(LEVEL_2, "Ranges:\t%s\n", idRangeToString(psp.Spec.RunAsUser.Ranges))
|
|
|
|
w.Write(LEVEL_1, "FSGroup Strategy: %s\t\n", string(psp.Spec.FSGroup.Rule))
|
|
w.Write(LEVEL_2, "Ranges:\t%s\n", idRangeToString(psp.Spec.FSGroup.Ranges))
|
|
|
|
w.Write(LEVEL_1, "Supplemental Groups Strategy: %s\t\n", string(psp.Spec.SupplementalGroups.Rule))
|
|
w.Write(LEVEL_2, "Ranges:\t%s\n", idRangeToString(psp.Spec.SupplementalGroups.Ranges))
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func stringOrNone(s string) string {
|
|
return stringOrDefaultValue(s, "<none>")
|
|
}
|
|
|
|
func stringOrDefaultValue(s, defaultValue string) string {
|
|
if len(s) > 0 {
|
|
return s
|
|
}
|
|
return defaultValue
|
|
}
|
|
|
|
func fsTypeToString(volumes []policy.FSType) string {
|
|
strVolumes := []string{}
|
|
for _, v := range volumes {
|
|
strVolumes = append(strVolumes, string(v))
|
|
}
|
|
return stringOrNone(strings.Join(strVolumes, ","))
|
|
}
|
|
|
|
func flexVolumesToString(flexVolumes []policy.AllowedFlexVolume) string {
|
|
volumes := []string{}
|
|
for _, flexVolume := range flexVolumes {
|
|
volumes = append(volumes, "driver="+flexVolume.Driver)
|
|
}
|
|
return stringOrDefaultValue(strings.Join(volumes, ","), "<all>")
|
|
}
|
|
|
|
func hostPortRangeToString(ranges []policy.HostPortRange) string {
|
|
formattedString := ""
|
|
if ranges != nil {
|
|
strRanges := []string{}
|
|
for _, r := range ranges {
|
|
strRanges = append(strRanges, fmt.Sprintf("%d-%d", r.Min, r.Max))
|
|
}
|
|
formattedString = strings.Join(strRanges, ",")
|
|
}
|
|
return stringOrNone(formattedString)
|
|
}
|
|
|
|
func idRangeToString(ranges []policy.IDRange) string {
|
|
formattedString := ""
|
|
if ranges != nil {
|
|
strRanges := []string{}
|
|
for _, r := range ranges {
|
|
strRanges = append(strRanges, fmt.Sprintf("%d-%d", r.Min, r.Max))
|
|
}
|
|
formattedString = strings.Join(strRanges, ",")
|
|
}
|
|
return stringOrNone(formattedString)
|
|
}
|
|
|
|
func capsToString(caps []api.Capability) string {
|
|
formattedString := ""
|
|
if caps != nil {
|
|
strCaps := []string{}
|
|
for _, c := range caps {
|
|
strCaps = append(strCaps, string(c))
|
|
}
|
|
formattedString = strings.Join(strCaps, ",")
|
|
}
|
|
return stringOrNone(formattedString)
|
|
}
|
|
|
|
func policyTypesToString(pts []networking.PolicyType) string {
|
|
formattedString := ""
|
|
if pts != nil {
|
|
strPts := []string{}
|
|
for _, p := range pts {
|
|
strPts = append(strPts, string(p))
|
|
}
|
|
formattedString = strings.Join(strPts, ", ")
|
|
}
|
|
return stringOrNone(formattedString)
|
|
}
|
|
|
|
// newErrNoDescriber creates a new ErrNoDescriber with the names of the provided types.
|
|
func newErrNoDescriber(types ...reflect.Type) error {
|
|
names := make([]string, 0, len(types))
|
|
for _, t := range types {
|
|
names = append(names, t.String())
|
|
}
|
|
return printers.ErrNoDescriber{Types: names}
|
|
}
|
|
|
|
// Describers implements ObjectDescriber against functions registered via Add. Those functions can
|
|
// be strongly typed. Types are exactly matched (no conversion or assignable checks).
|
|
type Describers struct {
|
|
searchFns map[reflect.Type][]typeFunc
|
|
}
|
|
|
|
// DescribeObject implements ObjectDescriber and will attempt to print the provided object to a string,
|
|
// if at least one describer function has been registered with the exact types passed, or if any
|
|
// describer can print the exact object in its first argument (the remainder will be provided empty
|
|
// values). If no function registered with Add can satisfy the passed objects, an ErrNoDescriber will
|
|
// be returned
|
|
// TODO: reorder and partial match extra.
|
|
func (d *Describers) DescribeObject(exact interface{}, extra ...interface{}) (string, error) {
|
|
exactType := reflect.TypeOf(exact)
|
|
fns, ok := d.searchFns[exactType]
|
|
if !ok {
|
|
return "", newErrNoDescriber(exactType)
|
|
}
|
|
if len(extra) == 0 {
|
|
for _, typeFn := range fns {
|
|
if len(typeFn.Extra) == 0 {
|
|
return typeFn.Describe(exact, extra...)
|
|
}
|
|
}
|
|
typeFn := fns[0]
|
|
for _, t := range typeFn.Extra {
|
|
v := reflect.New(t).Elem()
|
|
extra = append(extra, v.Interface())
|
|
}
|
|
return fns[0].Describe(exact, extra...)
|
|
}
|
|
|
|
types := make([]reflect.Type, 0, len(extra))
|
|
for _, obj := range extra {
|
|
types = append(types, reflect.TypeOf(obj))
|
|
}
|
|
for _, typeFn := range fns {
|
|
if typeFn.Matches(types) {
|
|
return typeFn.Describe(exact, extra...)
|
|
}
|
|
}
|
|
return "", newErrNoDescriber(append([]reflect.Type{exactType}, types...)...)
|
|
}
|
|
|
|
// Add adds one or more describer functions to the printers.Describer. The passed function must
|
|
// match the signature:
|
|
//
|
|
// func(...) (string, error)
|
|
//
|
|
// Any number of arguments may be provided.
|
|
func (d *Describers) Add(fns ...interface{}) error {
|
|
for _, fn := range fns {
|
|
fv := reflect.ValueOf(fn)
|
|
ft := fv.Type()
|
|
if ft.Kind() != reflect.Func {
|
|
return fmt.Errorf("expected func, got: %v", ft)
|
|
}
|
|
numIn := ft.NumIn()
|
|
if numIn == 0 {
|
|
return fmt.Errorf("expected at least one 'in' params, got: %v", ft)
|
|
}
|
|
if ft.NumOut() != 2 {
|
|
return fmt.Errorf("expected two 'out' params - (string, error), got: %v", ft)
|
|
}
|
|
types := make([]reflect.Type, 0, numIn)
|
|
for i := 0; i < numIn; i++ {
|
|
types = append(types, ft.In(i))
|
|
}
|
|
if ft.Out(0) != reflect.TypeOf(string("")) {
|
|
return fmt.Errorf("expected string return, got: %v", ft)
|
|
}
|
|
var forErrorType error
|
|
// This convolution is necessary, otherwise TypeOf picks up on the fact
|
|
// that forErrorType is nil.
|
|
errorType := reflect.TypeOf(&forErrorType).Elem()
|
|
if ft.Out(1) != errorType {
|
|
return fmt.Errorf("expected error return, got: %v", ft)
|
|
}
|
|
|
|
exact := types[0]
|
|
extra := types[1:]
|
|
if d.searchFns == nil {
|
|
d.searchFns = make(map[reflect.Type][]typeFunc)
|
|
}
|
|
fns := d.searchFns[exact]
|
|
fn := typeFunc{Extra: extra, Fn: fv}
|
|
fns = append(fns, fn)
|
|
d.searchFns[exact] = fns
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// typeFunc holds information about a describer function and the types it accepts
|
|
type typeFunc struct {
|
|
Extra []reflect.Type
|
|
Fn reflect.Value
|
|
}
|
|
|
|
// Matches returns true when the passed types exactly match the Extra list.
|
|
func (fn typeFunc) Matches(types []reflect.Type) bool {
|
|
if len(fn.Extra) != len(types) {
|
|
return false
|
|
}
|
|
// reorder the items in array types and fn.Extra
|
|
// convert the type into string and sort them, check if they are matched
|
|
varMap := make(map[reflect.Type]bool)
|
|
for i := range fn.Extra {
|
|
varMap[fn.Extra[i]] = true
|
|
}
|
|
for i := range types {
|
|
if _, found := varMap[types[i]]; !found {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|
|
|
|
// Describe invokes the nested function with the exact number of arguments.
|
|
func (fn typeFunc) Describe(exact interface{}, extra ...interface{}) (string, error) {
|
|
values := []reflect.Value{reflect.ValueOf(exact)}
|
|
for _, obj := range extra {
|
|
values = append(values, reflect.ValueOf(obj))
|
|
}
|
|
out := fn.Fn.Call(values)
|
|
s := out[0].Interface().(string)
|
|
var err error
|
|
if !out[1].IsNil() {
|
|
err = out[1].Interface().(error)
|
|
}
|
|
return s, err
|
|
}
|
|
|
|
// printLabelsMultiline prints multiple labels with a proper alignment.
|
|
func printLabelsMultiline(w PrefixWriter, title string, labels map[string]string) {
|
|
printLabelsMultilineWithIndent(w, "", title, "\t", labels, sets.NewString())
|
|
}
|
|
|
|
// printLabelsMultiline prints multiple labels with a user-defined alignment.
|
|
func printLabelsMultilineWithIndent(w PrefixWriter, initialIndent, title, innerIndent string, labels map[string]string, skip sets.String) {
|
|
w.Write(LEVEL_0, "%s%s:%s", initialIndent, title, innerIndent)
|
|
|
|
if labels == nil || len(labels) == 0 {
|
|
w.WriteLine("<none>")
|
|
return
|
|
}
|
|
|
|
// to print labels in the sorted order
|
|
keys := make([]string, 0, len(labels))
|
|
for key := range labels {
|
|
if skip.Has(key) {
|
|
continue
|
|
}
|
|
keys = append(keys, key)
|
|
}
|
|
if len(keys) == 0 {
|
|
w.WriteLine("<none>")
|
|
return
|
|
}
|
|
sort.Strings(keys)
|
|
|
|
for i, key := range keys {
|
|
if i != 0 {
|
|
w.Write(LEVEL_0, "%s", initialIndent)
|
|
w.Write(LEVEL_0, "%s", innerIndent)
|
|
}
|
|
w.Write(LEVEL_0, "%s=%s\n", key, labels[key])
|
|
i++
|
|
}
|
|
}
|
|
|
|
// printTaintsMultiline prints multiple taints with a proper alignment.
|
|
func printNodeTaintsMultiline(w PrefixWriter, title string, taints []api.Taint) {
|
|
printTaintsMultilineWithIndent(w, "", title, "\t", taints)
|
|
}
|
|
|
|
// printTaintsMultilineWithIndent prints multiple taints with a user-defined alignment.
|
|
func printTaintsMultilineWithIndent(w PrefixWriter, initialIndent, title, innerIndent string, taints []api.Taint) {
|
|
w.Write(LEVEL_0, "%s%s:%s", initialIndent, title, innerIndent)
|
|
|
|
if taints == nil || len(taints) == 0 {
|
|
w.WriteLine("<none>")
|
|
return
|
|
}
|
|
|
|
// to print taints in the sorted order
|
|
sort.Slice(taints, func(i, j int) bool {
|
|
cmpKey := func(taint api.Taint) string {
|
|
return string(taint.Effect) + "," + taint.Key
|
|
}
|
|
return cmpKey(taints[i]) < cmpKey(taints[j])
|
|
})
|
|
|
|
for i, taint := range taints {
|
|
if i != 0 {
|
|
w.Write(LEVEL_0, "%s", initialIndent)
|
|
w.Write(LEVEL_0, "%s", innerIndent)
|
|
}
|
|
w.Write(LEVEL_0, "%s\n", taint.ToString())
|
|
}
|
|
}
|
|
|
|
// printPodTolerationsMultiline prints multiple tolerations with a proper alignment.
|
|
func printPodTolerationsMultiline(w PrefixWriter, title string, tolerations []api.Toleration) {
|
|
printTolerationsMultilineWithIndent(w, "", title, "\t", tolerations)
|
|
}
|
|
|
|
// printTolerationsMultilineWithIndent prints multiple tolerations with a user-defined alignment.
|
|
func printTolerationsMultilineWithIndent(w PrefixWriter, initialIndent, title, innerIndent string, tolerations []api.Toleration) {
|
|
w.Write(LEVEL_0, "%s%s:%s", initialIndent, title, innerIndent)
|
|
|
|
if tolerations == nil || len(tolerations) == 0 {
|
|
w.WriteLine("<none>")
|
|
return
|
|
}
|
|
|
|
// to print tolerations in the sorted order
|
|
sort.Slice(tolerations, func(i, j int) bool {
|
|
return tolerations[i].Key < tolerations[j].Key
|
|
})
|
|
|
|
for i, toleration := range tolerations {
|
|
if i != 0 {
|
|
w.Write(LEVEL_0, "%s", initialIndent)
|
|
w.Write(LEVEL_0, "%s", innerIndent)
|
|
}
|
|
w.Write(LEVEL_0, "%s", toleration.Key)
|
|
if len(toleration.Value) != 0 {
|
|
w.Write(LEVEL_0, "=%s", toleration.Value)
|
|
}
|
|
if len(toleration.Effect) != 0 {
|
|
w.Write(LEVEL_0, ":%s", toleration.Effect)
|
|
}
|
|
if toleration.TolerationSeconds != nil {
|
|
w.Write(LEVEL_0, " for %ds", *toleration.TolerationSeconds)
|
|
}
|
|
w.Write(LEVEL_0, "\n")
|
|
}
|
|
}
|
|
|
|
type flusher interface {
|
|
Flush()
|
|
}
|
|
|
|
func tabbedString(f func(io.Writer) error) (string, error) {
|
|
out := new(tabwriter.Writer)
|
|
buf := &bytes.Buffer{}
|
|
out.Init(buf, 0, 8, 2, ' ', 0)
|
|
|
|
err := f(out)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
out.Flush()
|
|
str := string(buf.String())
|
|
return str, nil
|
|
}
|
|
|
|
type SortableResourceNames []api.ResourceName
|
|
|
|
func (list SortableResourceNames) Len() int {
|
|
return len(list)
|
|
}
|
|
|
|
func (list SortableResourceNames) Swap(i, j int) {
|
|
list[i], list[j] = list[j], list[i]
|
|
}
|
|
|
|
func (list SortableResourceNames) Less(i, j int) bool {
|
|
return list[i] < list[j]
|
|
}
|
|
|
|
// SortedResourceNames returns the sorted resource names of a resource list.
|
|
func SortedResourceNames(list api.ResourceList) []api.ResourceName {
|
|
resources := make([]api.ResourceName, 0, len(list))
|
|
for res := range list {
|
|
resources = append(resources, res)
|
|
}
|
|
sort.Sort(SortableResourceNames(resources))
|
|
return resources
|
|
}
|
|
|
|
type SortableResourceQuotas []api.ResourceQuota
|
|
|
|
func (list SortableResourceQuotas) Len() int {
|
|
return len(list)
|
|
}
|
|
|
|
func (list SortableResourceQuotas) Swap(i, j int) {
|
|
list[i], list[j] = list[j], list[i]
|
|
}
|
|
|
|
func (list SortableResourceQuotas) Less(i, j int) bool {
|
|
return list[i].Name < list[j].Name
|
|
}
|
|
|
|
type SortableVolumeMounts []api.VolumeMount
|
|
|
|
func (list SortableVolumeMounts) Len() int {
|
|
return len(list)
|
|
}
|
|
|
|
func (list SortableVolumeMounts) Swap(i, j int) {
|
|
list[i], list[j] = list[j], list[i]
|
|
}
|
|
|
|
func (list SortableVolumeMounts) Less(i, j int) bool {
|
|
return list[i].MountPath < list[j].MountPath
|
|
}
|
|
|
|
type SortableVolumeDevices []api.VolumeDevice
|
|
|
|
func (list SortableVolumeDevices) Len() int {
|
|
return len(list)
|
|
}
|
|
|
|
func (list SortableVolumeDevices) Swap(i, j int) {
|
|
list[i], list[j] = list[j], list[i]
|
|
}
|
|
|
|
func (list SortableVolumeDevices) Less(i, j int) bool {
|
|
return list[i].DevicePath < list[j].DevicePath
|
|
}
|
|
|
|
var maxAnnotationLen = 200
|
|
|
|
// printAnnotationsMultilineWithFilter prints filtered multiple annotations with a proper alignment.
|
|
func printAnnotationsMultilineWithFilter(w PrefixWriter, title string, annotations map[string]string, skip sets.String) {
|
|
printAnnotationsMultilineWithIndent(w, "", title, "\t", annotations, skip)
|
|
}
|
|
|
|
// printAnnotationsMultiline prints multiple annotations with a proper alignment.
|
|
func printAnnotationsMultiline(w PrefixWriter, title string, annotations map[string]string) {
|
|
printAnnotationsMultilineWithIndent(w, "", title, "\t", annotations, sets.NewString())
|
|
}
|
|
|
|
// printAnnotationsMultilineWithIndent prints multiple annotations with a user-defined alignment.
|
|
// If annotation string is too long, we omit chars more than 200 length.
|
|
func printAnnotationsMultilineWithIndent(w PrefixWriter, initialIndent, title, innerIndent string, annotations map[string]string, skip sets.String) {
|
|
|
|
w.Write(LEVEL_0, "%s%s:%s", initialIndent, title, innerIndent)
|
|
|
|
if len(annotations) == 0 {
|
|
w.WriteLine("<none>")
|
|
return
|
|
}
|
|
|
|
// to print labels in the sorted order
|
|
keys := make([]string, 0, len(annotations))
|
|
for key := range annotations {
|
|
if skip.Has(key) {
|
|
continue
|
|
}
|
|
keys = append(keys, key)
|
|
}
|
|
if len(annotations) == 0 {
|
|
w.WriteLine("<none>")
|
|
return
|
|
}
|
|
sort.Strings(keys)
|
|
|
|
for i, key := range keys {
|
|
if i != 0 {
|
|
w.Write(LEVEL_0, initialIndent)
|
|
w.Write(LEVEL_0, innerIndent)
|
|
}
|
|
line := fmt.Sprintf("%s=%s", key, annotations[key])
|
|
if len(line) > maxAnnotationLen {
|
|
w.Write(LEVEL_0, "%s...\n", line[:maxAnnotationLen])
|
|
} else {
|
|
w.Write(LEVEL_0, "%s\n", line)
|
|
}
|
|
i++
|
|
}
|
|
}
|