k3s/pkg/cloudprovider/providers/azure/azure_wrap.go

254 lines
6.5 KiB
Go
Raw Normal View History

2016-05-29 03:54:26 +00:00
/*
Copyright 2016 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package azure
import (
2018-02-07 13:57:11 +00:00
"fmt"
2016-05-29 03:54:26 +00:00
"net/http"
"strings"
"time"
2016-05-29 03:54:26 +00:00
"github.com/Azure/azure-sdk-for-go/arm/compute"
"github.com/Azure/azure-sdk-for-go/arm/network"
"github.com/Azure/go-autorest/autorest"
"k8s.io/apimachinery/pkg/types"
"k8s.io/kubernetes/pkg/cloudprovider"
)
2018-02-07 09:06:16 +00:00
var (
2018-02-07 13:57:11 +00:00
vmCacheTTL = time.Minute
lbCacheTTL = 2 * time.Minute
nsgCacheTTL = 2 * time.Minute
2018-02-07 14:26:03 +00:00
rtCacheTTL = 2 * time.Minute
2018-02-07 09:06:16 +00:00
)
2016-05-29 03:54:26 +00:00
// checkExistsFromError inspects an error and returns a true if err is nil,
// false if error is an autorest.Error with StatusCode=404 and will return the
// error back if error is another status code or another type of error.
func checkResourceExistsFromError(err error) (bool, error) {
if err == nil {
return true, nil
}
v, ok := err.(autorest.DetailedError)
if !ok {
return false, err
}
if v.StatusCode == http.StatusNotFound {
2016-05-29 03:54:26 +00:00
return false, nil
}
return false, v
}
// If it is StatusNotFound return nil,
// Otherwise, return what it is
func ignoreStatusNotFoundFromError(err error) error {
if err == nil {
return nil
}
v, ok := err.(autorest.DetailedError)
if ok && v.StatusCode == http.StatusNotFound {
return nil
}
return err
}
/// getVirtualMachine calls 'VirtualMachinesClient.Get' with a timed cache
/// The service side has throttling control that delays responses if there're multiple requests onto certain vm
/// resource request in short period.
func (az *Cloud) getVirtualMachine(nodeName types.NodeName) (vm compute.VirtualMachine, err error) {
vmName := string(nodeName)
2018-02-07 09:06:16 +00:00
cachedVM, err := az.vmCache.Get(vmName)
if err != nil {
2018-02-07 09:06:16 +00:00
return vm, err
}
if cachedVM == nil {
return vm, cloudprovider.InstanceNotFound
2016-05-29 03:54:26 +00:00
}
2018-02-07 09:06:16 +00:00
return *(cachedVM.(*compute.VirtualMachine)), nil
2016-05-29 03:54:26 +00:00
}
func (az *Cloud) getRouteTable() (routeTable network.RouteTable, exists bool, err error) {
2018-02-07 14:26:03 +00:00
cachedRt, err := az.rtCache.Get(az.RouteTableName)
if err != nil {
return routeTable, false, err
2016-05-29 03:54:26 +00:00
}
2018-02-07 14:26:03 +00:00
if cachedRt == nil {
2016-05-29 03:54:26 +00:00
return routeTable, false, nil
}
2018-02-07 14:26:03 +00:00
return *(cachedRt.(*network.RouteTable)), true, nil
2016-05-29 03:54:26 +00:00
}
2017-12-03 19:24:38 +00:00
func (az *Cloud) getPublicIPAddress(pipResourceGroup string, pipName string) (pip network.PublicIPAddress, exists bool, err error) {
resourceGroup := az.ResourceGroup
if pipResourceGroup != "" {
resourceGroup = pipResourceGroup
}
2016-05-29 03:54:26 +00:00
var realErr error
pip, err = az.PublicIPAddressesClient.Get(resourceGroup, pipName, "")
2016-05-29 03:54:26 +00:00
exists, realErr = checkResourceExistsFromError(err)
if realErr != nil {
return pip, false, realErr
}
if !exists {
return pip, false, nil
}
return pip, exists, err
}
func (az *Cloud) getSubnet(virtualNetworkName string, subnetName string) (subnet network.Subnet, exists bool, err error) {
var realErr error
var rg string
if len(az.VnetResourceGroup) > 0 {
rg = az.VnetResourceGroup
} else {
rg = az.ResourceGroup
}
subnet, err = az.SubnetsClient.Get(rg, virtualNetworkName, subnetName, "")
exists, realErr = checkResourceExistsFromError(err)
if realErr != nil {
return subnet, false, realErr
}
if !exists {
return subnet, false, nil
}
return subnet, exists, err
}
func (az *Cloud) getAzureLoadBalancer(name string) (lb network.LoadBalancer, exists bool, err error) {
2018-02-07 09:19:34 +00:00
cachedLB, err := az.lbCache.Get(name)
if err != nil {
return lb, false, err
}
2018-02-07 09:19:34 +00:00
if cachedLB == nil {
return lb, false, nil
}
2018-02-07 09:19:34 +00:00
return *(cachedLB.(*network.LoadBalancer)), true, nil
}
2018-02-07 09:06:16 +00:00
2018-02-07 13:57:11 +00:00
func (az *Cloud) getSecurityGroup() (nsg network.SecurityGroup, err error) {
securityGroup, err := az.nsgCache.Get(az.SecurityGroupName)
if err != nil {
return nsg, err
}
if securityGroup == nil {
return nsg, fmt.Errorf("nsg %q not found", az.SecurityGroupName)
}
return *(securityGroup.(*network.SecurityGroup)), nil
}
2018-02-07 09:06:16 +00:00
func (az *Cloud) newVMCache() (*timedCache, error) {
getter := func(key string) (interface{}, error) {
2018-02-09 12:38:29 +00:00
// Currently InstanceView request are used by azure_zones, while the calls come after non-InstanceView
// request. If we first send an InstanceView request and then a non InstanceView request, the second
// request will still hit throttling. This is what happens now for cloud controller manager: In this
// case we do get instance view every time to fulfill the azure_zones requirement without hitting
// throttling.
// Consider adding separate parameter for controlling 'InstanceView' once node update issue #56276 is fixed
2018-02-07 09:06:16 +00:00
vm, err := az.VirtualMachinesClient.Get(az.ResourceGroup, key, compute.InstanceView)
exists, realErr := checkResourceExistsFromError(err)
if realErr != nil {
return nil, realErr
}
if !exists {
return nil, nil
}
return &vm, nil
}
return newTimedcache(vmCacheTTL, getter)
}
2018-02-07 09:19:34 +00:00
func (az *Cloud) newLBCache() (*timedCache, error) {
getter := func(key string) (interface{}, error) {
lb, err := az.LoadBalancerClient.Get(az.ResourceGroup, key, "")
exists, realErr := checkResourceExistsFromError(err)
if realErr != nil {
return nil, realErr
}
if !exists {
return nil, nil
}
return &lb, nil
}
return newTimedcache(lbCacheTTL, getter)
}
2018-02-07 13:57:11 +00:00
func (az *Cloud) newNSGCache() (*timedCache, error) {
getter := func(key string) (interface{}, error) {
nsg, err := az.SecurityGroupsClient.Get(az.ResourceGroup, key, "")
exists, realErr := checkResourceExistsFromError(err)
if realErr != nil {
return nil, realErr
}
if !exists {
return nil, nil
}
return &nsg, nil
}
return newTimedcache(nsgCacheTTL, getter)
}
2018-02-07 14:26:03 +00:00
func (az *Cloud) newRouteTableCache() (*timedCache, error) {
getter := func(key string) (interface{}, error) {
rt, err := az.RouteTablesClient.Get(az.ResourceGroup, key, "")
exists, realErr := checkResourceExistsFromError(err)
if realErr != nil {
return nil, realErr
}
if !exists {
return nil, nil
}
return &rt, nil
}
return newTimedcache(rtCacheTTL, getter)
}
func (az *Cloud) useStandardLoadBalancer() bool {
return strings.EqualFold(az.LoadBalancerSku, loadBalancerSkuStandard)
}
func (az *Cloud) excludeMasterNodesFromStandardLB() bool {
return az.ExcludeMasterFromStandardLB != nil && *az.ExcludeMasterFromStandardLB
}