2014-11-22 23:44:38 +00:00
|
|
|
/*
|
2015-05-01 16:19:44 +00:00
|
|
|
Copyright 2014 The Kubernetes Authors All rights reserved.
|
2014-11-22 23:44:38 +00:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package v1beta1
|
|
|
|
|
|
|
|
import (
|
2015-03-20 21:24:43 +00:00
|
|
|
"net"
|
|
|
|
"strconv"
|
2015-01-26 17:52:50 +00:00
|
|
|
"strings"
|
|
|
|
|
2014-11-22 23:44:38 +00:00
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/api"
|
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/util"
|
2015-03-20 21:24:43 +00:00
|
|
|
"github.com/golang/glog"
|
2014-11-22 23:44:38 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
api.Scheme.AddDefaultingFuncs(
|
2015-04-09 05:13:59 +00:00
|
|
|
func(obj *ReplicationController) {
|
|
|
|
if len(obj.DesiredState.ReplicaSelector) == 0 {
|
|
|
|
obj.DesiredState.ReplicaSelector = obj.DesiredState.PodTemplate.Labels
|
|
|
|
}
|
|
|
|
if len(obj.Labels) == 0 {
|
|
|
|
obj.Labels = obj.DesiredState.PodTemplate.Labels
|
|
|
|
}
|
|
|
|
},
|
2014-11-22 23:44:38 +00:00
|
|
|
func(obj *Volume) {
|
2015-01-26 17:52:50 +00:00
|
|
|
if util.AllPtrFieldsNil(&obj.Source) {
|
|
|
|
obj.Source = VolumeSource{
|
2015-02-20 06:27:27 +00:00
|
|
|
EmptyDir: &EmptyDirVolumeSource{},
|
2014-11-22 23:44:38 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
2015-02-23 22:25:56 +00:00
|
|
|
func(obj *ContainerPort) {
|
2014-11-22 23:44:38 +00:00
|
|
|
if obj.Protocol == "" {
|
|
|
|
obj.Protocol = ProtocolTCP
|
|
|
|
}
|
|
|
|
},
|
|
|
|
func(obj *Container) {
|
|
|
|
if obj.ImagePullPolicy == "" {
|
2015-01-26 17:52:50 +00:00
|
|
|
// TODO(dchen1107): Move ParseImageName code to pkg/util
|
|
|
|
parts := strings.Split(obj.Image, ":")
|
|
|
|
// Check image tag
|
|
|
|
if parts[len(parts)-1] == "latest" {
|
|
|
|
obj.ImagePullPolicy = PullAlways
|
|
|
|
} else {
|
|
|
|
obj.ImagePullPolicy = PullIfNotPresent
|
|
|
|
}
|
2014-11-22 23:44:38 +00:00
|
|
|
}
|
|
|
|
if obj.TerminationMessagePath == "" {
|
2015-01-26 17:52:50 +00:00
|
|
|
obj.TerminationMessagePath = TerminationMessagePathDefault
|
2014-11-22 23:44:38 +00:00
|
|
|
}
|
2015-05-05 23:02:13 +00:00
|
|
|
defaultSecurityContext(obj)
|
2014-11-22 23:44:38 +00:00
|
|
|
},
|
|
|
|
func(obj *RestartPolicy) {
|
|
|
|
if util.AllPtrFieldsNil(obj) {
|
|
|
|
obj.Always = &RestartPolicyAlways{}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
func(obj *Service) {
|
|
|
|
if obj.Protocol == "" {
|
|
|
|
obj.Protocol = ProtocolTCP
|
|
|
|
}
|
2015-01-26 17:52:50 +00:00
|
|
|
if obj.SessionAffinity == "" {
|
|
|
|
obj.SessionAffinity = AffinityTypeNone
|
|
|
|
}
|
2015-03-30 21:01:46 +00:00
|
|
|
for i := range obj.Ports {
|
|
|
|
sp := &obj.Ports[i]
|
|
|
|
if sp.Protocol == "" {
|
|
|
|
sp.Protocol = ProtocolTCP
|
|
|
|
}
|
|
|
|
if sp.ContainerPort == util.NewIntOrStringFromInt(0) || sp.ContainerPort == util.NewIntOrStringFromString("") {
|
|
|
|
sp.ContainerPort = util.NewIntOrStringFromInt(sp.Port)
|
|
|
|
}
|
2015-03-13 15:16:41 +00:00
|
|
|
}
|
|
|
|
},
|
2015-01-26 17:52:50 +00:00
|
|
|
func(obj *PodSpec) {
|
|
|
|
if obj.DNSPolicy == "" {
|
|
|
|
obj.DNSPolicy = DNSClusterFirst
|
|
|
|
}
|
2015-03-23 23:34:35 +00:00
|
|
|
if obj.HostNetwork {
|
|
|
|
defaultHostNetworkPorts(&obj.Containers)
|
|
|
|
}
|
2015-01-26 17:52:50 +00:00
|
|
|
},
|
|
|
|
func(obj *ContainerManifest) {
|
|
|
|
if obj.DNSPolicy == "" {
|
|
|
|
obj.DNSPolicy = DNSClusterFirst
|
|
|
|
}
|
2015-03-23 23:34:35 +00:00
|
|
|
if obj.HostNetwork {
|
|
|
|
defaultHostNetworkPorts(&obj.Containers)
|
|
|
|
}
|
2014-11-22 23:44:38 +00:00
|
|
|
},
|
2015-02-16 07:44:55 +00:00
|
|
|
func(obj *LivenessProbe) {
|
|
|
|
if obj.TimeoutSeconds == 0 {
|
|
|
|
obj.TimeoutSeconds = 1
|
|
|
|
}
|
|
|
|
},
|
2015-02-18 01:24:50 +00:00
|
|
|
func(obj *Secret) {
|
|
|
|
if obj.Type == "" {
|
|
|
|
obj.Type = SecretTypeOpaque
|
|
|
|
}
|
|
|
|
},
|
2015-04-21 15:05:15 +00:00
|
|
|
func(obj *PersistentVolume) {
|
|
|
|
if obj.Status.Phase == "" {
|
|
|
|
obj.Status.Phase = VolumePending
|
|
|
|
}
|
|
|
|
},
|
|
|
|
func(obj *PersistentVolumeClaim) {
|
|
|
|
if obj.Status.Phase == "" {
|
|
|
|
obj.Status.Phase = ClaimPending
|
|
|
|
}
|
|
|
|
},
|
2015-02-18 22:43:37 +00:00
|
|
|
func(obj *Endpoints) {
|
2015-02-23 21:53:21 +00:00
|
|
|
if obj.Protocol == "" {
|
2015-03-20 21:24:43 +00:00
|
|
|
obj.Protocol = ProtocolTCP
|
|
|
|
}
|
|
|
|
if len(obj.Subsets) == 0 && len(obj.Endpoints) > 0 {
|
|
|
|
// Must be a legacy-style object - populate
|
|
|
|
// Subsets from the older fields. Do this the
|
|
|
|
// simplest way, which is dumb (but valid).
|
|
|
|
for i := range obj.Endpoints {
|
|
|
|
host, portStr, err := net.SplitHostPort(obj.Endpoints[i])
|
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("failed to SplitHostPort(%q)", obj.Endpoints[i])
|
|
|
|
}
|
|
|
|
var tgtRef *ObjectReference
|
|
|
|
for j := range obj.TargetRefs {
|
|
|
|
if obj.TargetRefs[j].Endpoint == obj.Endpoints[i] {
|
|
|
|
tgtRef = &ObjectReference{}
|
|
|
|
*tgtRef = obj.TargetRefs[j].ObjectReference
|
|
|
|
}
|
|
|
|
}
|
|
|
|
port, err := strconv.Atoi(portStr)
|
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("failed to Atoi(%q)", portStr)
|
|
|
|
}
|
|
|
|
obj.Subsets = append(obj.Subsets, EndpointSubset{
|
|
|
|
Addresses: []EndpointAddress{{IP: host, TargetRef: tgtRef}},
|
|
|
|
Ports: []EndpointPort{{Protocol: obj.Protocol, Port: port}},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for i := range obj.Subsets {
|
|
|
|
ss := &obj.Subsets[i]
|
|
|
|
for i := range ss.Ports {
|
|
|
|
ep := &ss.Ports[i]
|
|
|
|
if ep.Protocol == "" {
|
|
|
|
ep.Protocol = ProtocolTCP
|
|
|
|
}
|
|
|
|
}
|
2015-02-18 22:43:37 +00:00
|
|
|
}
|
|
|
|
},
|
2015-02-28 01:33:58 +00:00
|
|
|
func(obj *HTTPGetAction) {
|
|
|
|
if obj.Path == "" {
|
|
|
|
obj.Path = "/"
|
|
|
|
}
|
|
|
|
},
|
2015-03-10 15:21:09 +00:00
|
|
|
func(obj *NamespaceStatus) {
|
|
|
|
if obj.Phase == "" {
|
|
|
|
obj.Phase = NamespaceActive
|
|
|
|
}
|
|
|
|
},
|
2015-04-01 23:11:33 +00:00
|
|
|
func(obj *Minion) {
|
|
|
|
if obj.ExternalID == "" {
|
|
|
|
obj.ExternalID = obj.ID
|
|
|
|
}
|
|
|
|
},
|
2015-04-23 20:57:30 +00:00
|
|
|
func(obj *ObjectFieldSelector) {
|
|
|
|
if obj.APIVersion == "" {
|
|
|
|
obj.APIVersion = "v1beta1"
|
|
|
|
}
|
|
|
|
},
|
2014-11-22 23:44:38 +00:00
|
|
|
)
|
|
|
|
}
|
2015-03-23 23:34:35 +00:00
|
|
|
|
|
|
|
// With host networking default all host ports to container ports.
|
|
|
|
func defaultHostNetworkPorts(containers *[]Container) {
|
|
|
|
for i := range *containers {
|
|
|
|
for j := range (*containers)[i].Ports {
|
|
|
|
if (*containers)[i].Ports[j].HostPort == 0 {
|
|
|
|
(*containers)[i].Ports[j].HostPort = (*containers)[i].Ports[j].ContainerPort
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-05-05 23:02:13 +00:00
|
|
|
|
|
|
|
// defaultSecurityContext performs the downward and upward merges of a pod definition
|
|
|
|
func defaultSecurityContext(container *Container) {
|
|
|
|
if container.SecurityContext == nil {
|
|
|
|
glog.V(4).Infof("creating security context for container %s", container.Name)
|
|
|
|
container.SecurityContext = &SecurityContext{}
|
|
|
|
}
|
|
|
|
// if there are no capabilities defined on the SecurityContext then copy the container settings
|
|
|
|
if container.SecurityContext.Capabilities == nil {
|
|
|
|
glog.V(4).Infof("downward merge of container.Capabilities for container %s", container.Name)
|
|
|
|
container.SecurityContext.Capabilities = &container.Capabilities
|
|
|
|
} else {
|
|
|
|
// if there are capabilities defined on the security context and the container setting is
|
|
|
|
// empty then assume that it was left off the pod definition and ensure that the container
|
|
|
|
// settings match the security context settings (checked by the convert functions). If
|
|
|
|
// there are settings in both then don't touch it, the converter will error if they don't
|
|
|
|
// match
|
|
|
|
if len(container.Capabilities.Add) == 0 {
|
|
|
|
glog.V(4).Infof("upward merge of container.Capabilities.Add for container %s", container.Name)
|
|
|
|
container.Capabilities.Add = container.SecurityContext.Capabilities.Add
|
|
|
|
}
|
|
|
|
if len(container.Capabilities.Drop) == 0 {
|
|
|
|
glog.V(4).Infof("upward merge of container.Capabilities.Drop for container %s", container.Name)
|
|
|
|
container.Capabilities.Drop = container.SecurityContext.Capabilities.Drop
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// if there are no privileged settings on the security context then copy the container settings
|
|
|
|
if container.SecurityContext.Privileged == nil {
|
|
|
|
glog.V(4).Infof("downward merge of container.Privileged for container %s", container.Name)
|
|
|
|
container.SecurityContext.Privileged = &container.Privileged
|
|
|
|
} else {
|
|
|
|
// we don't have a good way to know if container.Privileged was set or just defaulted to false
|
|
|
|
// so the best we can do here is check if the securityContext is set to true and the
|
|
|
|
// container is set to false and assume that the Privileged field was left off the container
|
|
|
|
// definition and not an intentional mismatch
|
|
|
|
if *container.SecurityContext.Privileged && !container.Privileged {
|
|
|
|
glog.V(4).Infof("upward merge of container.Privileged for container %s", container.Name)
|
|
|
|
container.Privileged = *container.SecurityContext.Privileged
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|