2016-08-07 12:26:20 +00:00
|
|
|
/*
|
|
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2016-08-12 15:32:14 +00:00
|
|
|
package namespace
|
2016-08-07 12:26:20 +00:00
|
|
|
|
|
|
|
import (
|
2016-08-29 21:23:47 +00:00
|
|
|
"fmt"
|
2016-08-07 12:26:20 +00:00
|
|
|
"time"
|
|
|
|
|
|
|
|
federation_api "k8s.io/kubernetes/federation/apis/federation/v1beta1"
|
2016-09-07 23:07:53 +00:00
|
|
|
federationclientset "k8s.io/kubernetes/federation/client/clientset_generated/federation_release_1_5"
|
2016-08-07 12:26:20 +00:00
|
|
|
"k8s.io/kubernetes/federation/pkg/federation-controller/util"
|
2016-10-11 19:48:38 +00:00
|
|
|
"k8s.io/kubernetes/federation/pkg/federation-controller/util/deletionhelper"
|
2016-08-29 21:23:47 +00:00
|
|
|
"k8s.io/kubernetes/federation/pkg/federation-controller/util/eventsink"
|
2016-08-07 12:26:20 +00:00
|
|
|
"k8s.io/kubernetes/pkg/api"
|
2016-09-01 22:21:50 +00:00
|
|
|
"k8s.io/kubernetes/pkg/api/errors"
|
2016-08-07 12:26:20 +00:00
|
|
|
api_v1 "k8s.io/kubernetes/pkg/api/v1"
|
|
|
|
"k8s.io/kubernetes/pkg/client/cache"
|
2016-09-07 23:07:53 +00:00
|
|
|
kubeclientset "k8s.io/kubernetes/pkg/client/clientset_generated/release_1_5"
|
2016-08-29 21:23:47 +00:00
|
|
|
"k8s.io/kubernetes/pkg/client/record"
|
2016-08-07 12:26:20 +00:00
|
|
|
"k8s.io/kubernetes/pkg/controller"
|
2016-10-11 19:48:38 +00:00
|
|
|
"k8s.io/kubernetes/pkg/runtime"
|
2016-08-16 14:30:19 +00:00
|
|
|
"k8s.io/kubernetes/pkg/util/flowcontrol"
|
2016-08-07 12:26:20 +00:00
|
|
|
"k8s.io/kubernetes/pkg/watch"
|
|
|
|
|
|
|
|
"github.com/golang/glog"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
allClustersKey = "ALL_CLUSTERS"
|
|
|
|
)
|
|
|
|
|
|
|
|
type NamespaceController struct {
|
2016-09-08 11:45:31 +00:00
|
|
|
// For triggering single namespace reconciliation. This is used when there is an
|
2016-08-07 12:26:20 +00:00
|
|
|
// add/update/delete operation on a namespace in either federated API server or
|
|
|
|
// in some member of the federation.
|
|
|
|
namespaceDeliverer *util.DelayingDeliverer
|
|
|
|
|
2016-09-08 11:45:31 +00:00
|
|
|
// For triggering all namespaces reconciliation. This is used when
|
2016-08-07 12:26:20 +00:00
|
|
|
// a new cluster becomes available.
|
|
|
|
clusterDeliverer *util.DelayingDeliverer
|
|
|
|
|
|
|
|
// Contains namespaces present in members of federation.
|
|
|
|
namespaceFederatedInformer util.FederatedInformer
|
|
|
|
// For updating members of federation.
|
|
|
|
federatedUpdater util.FederatedUpdater
|
|
|
|
// Definitions of namespaces that should be federated.
|
|
|
|
namespaceInformerStore cache.Store
|
|
|
|
// Informer controller for namespaces that should be federated.
|
2016-09-14 18:35:38 +00:00
|
|
|
namespaceInformerController cache.ControllerInterface
|
2016-08-07 12:26:20 +00:00
|
|
|
|
|
|
|
// Client to federated api server.
|
2016-09-07 23:07:53 +00:00
|
|
|
federatedApiClient federationclientset.Interface
|
2016-08-07 12:26:20 +00:00
|
|
|
|
2016-08-16 14:30:19 +00:00
|
|
|
// Backoff manager for namespaces
|
|
|
|
namespaceBackoff *flowcontrol.Backoff
|
2016-08-12 15:32:14 +00:00
|
|
|
|
2016-08-29 21:23:47 +00:00
|
|
|
// For events
|
|
|
|
eventRecorder record.EventRecorder
|
|
|
|
|
2016-10-11 19:48:38 +00:00
|
|
|
deletionHelper *deletionhelper.DeletionHelper
|
|
|
|
|
2016-08-12 15:32:14 +00:00
|
|
|
namespaceReviewDelay time.Duration
|
|
|
|
clusterAvailableDelay time.Duration
|
|
|
|
smallDelay time.Duration
|
|
|
|
updateTimeout time.Duration
|
2016-08-07 12:26:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewNamespaceController returns a new namespace controller
|
2016-09-07 23:07:53 +00:00
|
|
|
func NewNamespaceController(client federationclientset.Interface) *NamespaceController {
|
2016-08-29 21:23:47 +00:00
|
|
|
broadcaster := record.NewBroadcaster()
|
|
|
|
broadcaster.StartRecordingToSink(eventsink.NewFederatedEventSink(client))
|
|
|
|
recorder := broadcaster.NewRecorder(api.EventSource{Component: "federated-namespace-controller"})
|
|
|
|
|
2016-08-07 12:26:20 +00:00
|
|
|
nc := &NamespaceController{
|
2016-08-12 15:32:14 +00:00
|
|
|
federatedApiClient: client,
|
|
|
|
namespaceReviewDelay: time.Second * 10,
|
|
|
|
clusterAvailableDelay: time.Second * 20,
|
|
|
|
smallDelay: time.Second * 3,
|
|
|
|
updateTimeout: time.Second * 30,
|
2016-08-16 14:30:19 +00:00
|
|
|
namespaceBackoff: flowcontrol.NewBackOff(5*time.Second, time.Minute),
|
2016-08-29 21:23:47 +00:00
|
|
|
eventRecorder: recorder,
|
2016-08-07 12:26:20 +00:00
|
|
|
}
|
|
|
|
|
2016-09-08 11:45:31 +00:00
|
|
|
// Build delivereres for triggering reconciliations.
|
2016-08-07 12:26:20 +00:00
|
|
|
nc.namespaceDeliverer = util.NewDelayingDeliverer()
|
|
|
|
nc.clusterDeliverer = util.NewDelayingDeliverer()
|
|
|
|
|
|
|
|
// Start informer in federated API servers on namespaces that should be federated.
|
2016-09-14 18:35:38 +00:00
|
|
|
nc.namespaceInformerStore, nc.namespaceInformerController = cache.NewInformer(
|
2016-08-07 12:26:20 +00:00
|
|
|
&cache.ListWatch{
|
2016-10-11 19:48:38 +00:00
|
|
|
ListFunc: func(options api.ListOptions) (runtime.Object, error) {
|
2016-09-02 18:57:44 +00:00
|
|
|
versionedOptions := util.VersionizeV1ListOptions(options)
|
|
|
|
return client.Core().Namespaces().List(versionedOptions)
|
2016-08-07 12:26:20 +00:00
|
|
|
},
|
|
|
|
WatchFunc: func(options api.ListOptions) (watch.Interface, error) {
|
2016-09-02 18:57:44 +00:00
|
|
|
versionedOptions := util.VersionizeV1ListOptions(options)
|
|
|
|
return client.Core().Namespaces().Watch(versionedOptions)
|
2016-08-07 12:26:20 +00:00
|
|
|
},
|
|
|
|
},
|
2016-08-12 15:32:14 +00:00
|
|
|
&api_v1.Namespace{},
|
2016-08-07 12:26:20 +00:00
|
|
|
controller.NoResyncPeriodFunc(),
|
2016-10-11 19:48:38 +00:00
|
|
|
util.NewTriggerOnAllChanges(func(obj runtime.Object) { nc.deliverNamespaceObj(obj, 0, false) }))
|
2016-08-07 12:26:20 +00:00
|
|
|
|
|
|
|
// Federated informer on namespaces in members of federation.
|
|
|
|
nc.namespaceFederatedInformer = util.NewFederatedInformer(
|
|
|
|
client,
|
2016-09-07 23:07:53 +00:00
|
|
|
func(cluster *federation_api.Cluster, targetClient kubeclientset.Interface) (cache.Store, cache.ControllerInterface) {
|
2016-09-14 18:35:38 +00:00
|
|
|
return cache.NewInformer(
|
2016-08-07 12:26:20 +00:00
|
|
|
&cache.ListWatch{
|
2016-10-11 19:48:38 +00:00
|
|
|
ListFunc: func(options api.ListOptions) (runtime.Object, error) {
|
2016-09-02 18:57:44 +00:00
|
|
|
versionedOptions := util.VersionizeV1ListOptions(options)
|
|
|
|
return targetClient.Core().Namespaces().List(versionedOptions)
|
2016-08-07 12:26:20 +00:00
|
|
|
},
|
|
|
|
WatchFunc: func(options api.ListOptions) (watch.Interface, error) {
|
2016-09-02 18:57:44 +00:00
|
|
|
versionedOptions := util.VersionizeV1ListOptions(options)
|
|
|
|
return targetClient.Core().Namespaces().Watch(versionedOptions)
|
2016-08-07 12:26:20 +00:00
|
|
|
},
|
|
|
|
},
|
2016-08-12 15:32:14 +00:00
|
|
|
&api_v1.Namespace{},
|
2016-08-07 12:26:20 +00:00
|
|
|
controller.NoResyncPeriodFunc(),
|
2016-09-08 11:45:31 +00:00
|
|
|
// Trigger reconciliation whenever something in federated cluster is changed. In most cases it
|
|
|
|
// would be just confirmation that some namespace opration succeeded.
|
2016-08-16 18:43:43 +00:00
|
|
|
util.NewTriggerOnMetaAndSpecChanges(
|
2016-10-11 19:48:38 +00:00
|
|
|
func(obj runtime.Object) { nc.deliverNamespaceObj(obj, nc.namespaceReviewDelay, false) },
|
2016-08-07 12:26:20 +00:00
|
|
|
))
|
|
|
|
},
|
|
|
|
&util.ClusterLifecycleHandlerFuncs{
|
|
|
|
ClusterAvailable: func(cluster *federation_api.Cluster) {
|
|
|
|
// When new cluster becomes available process all the namespaces again.
|
2016-08-16 14:30:19 +00:00
|
|
|
nc.clusterDeliverer.DeliverAfter(allClustersKey, nil, nc.clusterAvailableDelay)
|
2016-08-07 12:26:20 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
// Federated updeater along with Create/Update/Delete operations.
|
|
|
|
nc.federatedUpdater = util.NewFederatedUpdater(nc.namespaceFederatedInformer,
|
2016-10-11 19:48:38 +00:00
|
|
|
func(client kubeclientset.Interface, obj runtime.Object) error {
|
2016-08-07 12:26:20 +00:00
|
|
|
namespace := obj.(*api_v1.Namespace)
|
|
|
|
_, err := client.Core().Namespaces().Create(namespace)
|
|
|
|
return err
|
|
|
|
},
|
2016-10-11 19:48:38 +00:00
|
|
|
func(client kubeclientset.Interface, obj runtime.Object) error {
|
2016-08-07 12:26:20 +00:00
|
|
|
namespace := obj.(*api_v1.Namespace)
|
|
|
|
_, err := client.Core().Namespaces().Update(namespace)
|
|
|
|
return err
|
|
|
|
},
|
2016-10-11 19:48:38 +00:00
|
|
|
func(client kubeclientset.Interface, obj runtime.Object) error {
|
2016-08-07 12:26:20 +00:00
|
|
|
namespace := obj.(*api_v1.Namespace)
|
2016-09-02 18:57:44 +00:00
|
|
|
err := client.Core().Namespaces().Delete(namespace.Name, &api_v1.DeleteOptions{})
|
2016-10-11 19:48:38 +00:00
|
|
|
// IsNotFound error is fine since that means the object is deleted already.
|
|
|
|
if errors.IsNotFound(err) {
|
|
|
|
return nil
|
|
|
|
}
|
2016-08-07 12:26:20 +00:00
|
|
|
return err
|
|
|
|
})
|
2016-10-11 19:48:38 +00:00
|
|
|
|
|
|
|
nc.deletionHelper = deletionhelper.NewDeletionHelper(
|
|
|
|
nc.hasFinalizerFunc,
|
|
|
|
nc.removeFinalizerFunc,
|
|
|
|
nc.addFinalizerFunc,
|
|
|
|
// objNameFunc
|
|
|
|
func(obj runtime.Object) string {
|
|
|
|
namespace := obj.(*api_v1.Namespace)
|
|
|
|
return namespace.Name
|
|
|
|
},
|
|
|
|
nc.updateTimeout,
|
|
|
|
nc.eventRecorder,
|
|
|
|
nc.namespaceFederatedInformer,
|
|
|
|
nc.federatedUpdater,
|
|
|
|
)
|
2016-08-07 12:26:20 +00:00
|
|
|
return nc
|
|
|
|
}
|
|
|
|
|
2016-10-11 19:48:38 +00:00
|
|
|
// Returns true if the given object has the given finalizer in its ObjectMeta.
|
|
|
|
func (nc *NamespaceController) hasFinalizerFunc(obj runtime.Object, finalizer string) bool {
|
|
|
|
namespace := obj.(*api_v1.Namespace)
|
|
|
|
for i := range namespace.ObjectMeta.Finalizers {
|
|
|
|
if string(namespace.ObjectMeta.Finalizers[i]) == finalizer {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Removes the finalizer from the given objects ObjectMeta.
|
|
|
|
// Assumes that the given object is a namespace.
|
|
|
|
func (nc *NamespaceController) removeFinalizerFunc(obj runtime.Object, finalizer string) (runtime.Object, error) {
|
|
|
|
namespace := obj.(*api_v1.Namespace)
|
|
|
|
newFinalizers := []string{}
|
|
|
|
hasFinalizer := false
|
|
|
|
for i := range namespace.ObjectMeta.Finalizers {
|
|
|
|
if string(namespace.ObjectMeta.Finalizers[i]) != finalizer {
|
|
|
|
newFinalizers = append(newFinalizers, namespace.ObjectMeta.Finalizers[i])
|
|
|
|
} else {
|
|
|
|
hasFinalizer = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !hasFinalizer {
|
|
|
|
// Nothing to do.
|
|
|
|
return obj, nil
|
|
|
|
}
|
|
|
|
namespace.ObjectMeta.Finalizers = newFinalizers
|
|
|
|
namespace, err := nc.federatedApiClient.Core().Namespaces().Update(namespace)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to remove finalizer %s from namespace %s: %v", finalizer, namespace.Name, err)
|
|
|
|
}
|
|
|
|
return namespace, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Adds the given finalizer to the given objects ObjectMeta.
|
|
|
|
// Assumes that the given object is a namespace.
|
|
|
|
func (nc *NamespaceController) addFinalizerFunc(obj runtime.Object, finalizer string) (runtime.Object, error) {
|
|
|
|
namespace := obj.(*api_v1.Namespace)
|
|
|
|
namespace.ObjectMeta.Finalizers = append(namespace.ObjectMeta.Finalizers, finalizer)
|
|
|
|
namespace, err := nc.federatedApiClient.Core().Namespaces().Finalize(namespace)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to add finalizer %s to namespace %s: %v", finalizer, namespace.Name, err)
|
|
|
|
}
|
|
|
|
return namespace, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Returns true if the given object has the given finalizer in its NamespaceSpec.
|
|
|
|
func (nc *NamespaceController) hasFinalizerFuncInSpec(obj runtime.Object, finalizer api_v1.FinalizerName) bool {
|
|
|
|
namespace := obj.(*api_v1.Namespace)
|
|
|
|
for i := range namespace.Spec.Finalizers {
|
|
|
|
if namespace.Spec.Finalizers[i] == finalizer {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Removes the finalizer from the given objects NamespaceSpec.
|
|
|
|
func (nc *NamespaceController) removeFinalizerFromSpec(namespace *api_v1.Namespace, finalizer api_v1.FinalizerName) (*api_v1.Namespace, error) {
|
|
|
|
updatedFinalizers := []api_v1.FinalizerName{}
|
|
|
|
for i := range namespace.Spec.Finalizers {
|
|
|
|
if namespace.Spec.Finalizers[i] != finalizer {
|
|
|
|
updatedFinalizers = append(updatedFinalizers, namespace.Spec.Finalizers[i])
|
|
|
|
}
|
|
|
|
}
|
|
|
|
namespace.Spec.Finalizers = updatedFinalizers
|
|
|
|
updatedNamespace, err := nc.federatedApiClient.Core().Namespaces().Finalize(namespace)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to remove finalizer %s from namespace %s: %v", string(finalizer), namespace.Name, err)
|
|
|
|
}
|
|
|
|
return updatedNamespace, nil
|
|
|
|
}
|
|
|
|
|
2016-08-16 14:30:19 +00:00
|
|
|
func (nc *NamespaceController) Run(stopChan <-chan struct{}) {
|
|
|
|
go nc.namespaceInformerController.Run(stopChan)
|
2016-08-07 12:26:20 +00:00
|
|
|
nc.namespaceFederatedInformer.Start()
|
2016-08-16 14:30:19 +00:00
|
|
|
go func() {
|
|
|
|
<-stopChan
|
|
|
|
nc.namespaceFederatedInformer.Stop()
|
|
|
|
}()
|
2016-08-07 12:26:20 +00:00
|
|
|
nc.namespaceDeliverer.StartWithHandler(func(item *util.DelayingDelivererItem) {
|
2016-08-16 14:30:19 +00:00
|
|
|
namespace := item.Value.(string)
|
|
|
|
nc.reconcileNamespace(namespace)
|
2016-08-07 12:26:20 +00:00
|
|
|
})
|
|
|
|
nc.clusterDeliverer.StartWithHandler(func(_ *util.DelayingDelivererItem) {
|
|
|
|
nc.reconcileNamespacesOnClusterChange()
|
|
|
|
})
|
2016-10-10 14:53:15 +00:00
|
|
|
util.StartBackoffGC(nc.namespaceBackoff, stopChan)
|
2016-08-07 12:26:20 +00:00
|
|
|
}
|
|
|
|
|
2016-08-16 14:30:19 +00:00
|
|
|
func (nc *NamespaceController) deliverNamespaceObj(obj interface{}, delay time.Duration, failed bool) {
|
2016-08-12 15:32:14 +00:00
|
|
|
namespace := obj.(*api_v1.Namespace)
|
2016-08-16 14:30:19 +00:00
|
|
|
nc.deliverNamespace(namespace.Name, delay, failed)
|
2016-08-07 12:26:20 +00:00
|
|
|
}
|
|
|
|
|
2016-08-16 14:30:19 +00:00
|
|
|
// Adds backoff to delay if this delivery is related to some failure. Resets backoff if there was no failure.
|
|
|
|
func (nc *NamespaceController) deliverNamespace(namespace string, delay time.Duration, failed bool) {
|
|
|
|
if failed {
|
|
|
|
nc.namespaceBackoff.Next(namespace, time.Now())
|
|
|
|
delay = delay + nc.namespaceBackoff.Get(namespace)
|
|
|
|
} else {
|
|
|
|
nc.namespaceBackoff.Reset(namespace)
|
|
|
|
}
|
|
|
|
nc.namespaceDeliverer.DeliverAfter(namespace, namespace, delay)
|
2016-08-07 12:26:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check whether all data stores are in sync. False is returned if any of the informer/stores is not yet
|
2016-09-08 11:45:31 +00:00
|
|
|
// synced with the corresponding api server.
|
2016-08-07 12:26:20 +00:00
|
|
|
func (nc *NamespaceController) isSynced() bool {
|
|
|
|
if !nc.namespaceFederatedInformer.ClustersSynced() {
|
|
|
|
glog.V(2).Infof("Cluster list not synced")
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
clusters, err := nc.namespaceFederatedInformer.GetReadyClusters()
|
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("Failed to get ready clusters: %v", err)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if !nc.namespaceFederatedInformer.GetTargetStore().ClustersSynced(clusters) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2016-09-08 11:45:31 +00:00
|
|
|
// The function triggers reconciliation of all federated namespaces.
|
2016-08-07 12:26:20 +00:00
|
|
|
func (nc *NamespaceController) reconcileNamespacesOnClusterChange() {
|
|
|
|
if !nc.isSynced() {
|
2016-08-16 14:30:19 +00:00
|
|
|
nc.clusterDeliverer.DeliverAfter(allClustersKey, nil, nc.clusterAvailableDelay)
|
2016-08-07 12:26:20 +00:00
|
|
|
}
|
|
|
|
for _, obj := range nc.namespaceInformerStore.List() {
|
|
|
|
namespace := obj.(*api_v1.Namespace)
|
2016-08-16 14:30:19 +00:00
|
|
|
nc.deliverNamespace(namespace.Name, nc.smallDelay, false)
|
2016-08-07 12:26:20 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-16 14:30:19 +00:00
|
|
|
func (nc *NamespaceController) reconcileNamespace(namespace string) {
|
2016-08-07 12:26:20 +00:00
|
|
|
if !nc.isSynced() {
|
2016-08-16 14:30:19 +00:00
|
|
|
nc.deliverNamespace(namespace, nc.clusterAvailableDelay, false)
|
2016-08-18 12:48:38 +00:00
|
|
|
return
|
2016-08-07 12:26:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
baseNamespaceObj, exist, err := nc.namespaceInformerStore.GetByKey(namespace)
|
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("Failed to query main namespace store for %v: %v", namespace, err)
|
2016-08-16 14:30:19 +00:00
|
|
|
nc.deliverNamespace(namespace, 0, true)
|
2016-08-07 12:26:20 +00:00
|
|
|
return
|
|
|
|
}
|
2016-08-12 15:32:14 +00:00
|
|
|
|
2016-08-07 12:26:20 +00:00
|
|
|
if !exist {
|
|
|
|
// Not federated namespace, ignoring.
|
|
|
|
return
|
|
|
|
}
|
|
|
|
baseNamespace := baseNamespaceObj.(*api_v1.Namespace)
|
2016-08-25 16:11:21 +00:00
|
|
|
if baseNamespace.DeletionTimestamp != nil {
|
2016-09-07 17:59:56 +00:00
|
|
|
if err := nc.delete(baseNamespace); err != nil {
|
|
|
|
glog.Errorf("Failed to delete %s: %v", namespace, err)
|
|
|
|
nc.eventRecorder.Eventf(baseNamespace, api.EventTypeNormal, "DeleteFailed",
|
|
|
|
"Namespace delete failed: %v", err)
|
|
|
|
nc.deliverNamespace(namespace, 0, true)
|
|
|
|
}
|
2016-08-07 12:26:20 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2016-10-11 19:48:38 +00:00
|
|
|
glog.V(3).Infof("Ensuring delete object from underlying clusters finalizer for namespace: %s",
|
|
|
|
baseNamespace.Name)
|
|
|
|
// Add the DeleteFromUnderlyingClusters finalizer before creating a namespace in
|
|
|
|
// underlying clusters.
|
|
|
|
// This ensures that the dependent namespaces are deleted in underlying
|
|
|
|
// clusters when the federated namespace is deleted.
|
|
|
|
updatedNamespaceObj, err := nc.deletionHelper.EnsureDeleteFromUnderlyingClustersFinalizer(baseNamespace)
|
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("Failed to ensure delete object from underlying clusters finalizer in namespace %s: %v",
|
|
|
|
baseNamespace.Name, err)
|
|
|
|
nc.deliverNamespace(namespace, 0, false)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
baseNamespace = updatedNamespaceObj.(*api_v1.Namespace)
|
|
|
|
|
|
|
|
glog.V(3).Infof("Syncing namespace %s in underlying clusters", baseNamespace.Name)
|
|
|
|
// Sync the namespace in all underlying clusters.
|
2016-08-07 12:26:20 +00:00
|
|
|
clusters, err := nc.namespaceFederatedInformer.GetReadyClusters()
|
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("Failed to get cluster list: %v", err)
|
2016-08-16 14:30:19 +00:00
|
|
|
nc.deliverNamespace(namespace, nc.clusterAvailableDelay, false)
|
2016-08-07 12:26:20 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
operations := make([]util.FederatedOperation, 0)
|
|
|
|
for _, cluster := range clusters {
|
|
|
|
clusterNamespaceObj, found, err := nc.namespaceFederatedInformer.GetTargetStore().GetByKey(cluster.Name, namespace)
|
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("Failed to get %s from %s: %v", namespace, cluster.Name, err)
|
2016-08-16 14:30:19 +00:00
|
|
|
nc.deliverNamespace(namespace, 0, true)
|
2016-08-07 12:26:20 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
desiredNamespace := &api_v1.Namespace{
|
2016-08-21 11:02:55 +00:00
|
|
|
ObjectMeta: util.CopyObjectMeta(baseNamespace.ObjectMeta),
|
2016-08-07 12:26:20 +00:00
|
|
|
Spec: baseNamespace.Spec,
|
|
|
|
}
|
2016-10-11 19:48:38 +00:00
|
|
|
glog.V(5).Infof("Desired namespace in underlying clusters: %+v", desiredNamespace)
|
2016-08-07 12:26:20 +00:00
|
|
|
|
|
|
|
if !found {
|
2016-08-29 21:23:47 +00:00
|
|
|
nc.eventRecorder.Eventf(baseNamespace, api.EventTypeNormal, "CreateInCluster",
|
|
|
|
"Creating namespace in cluster %s", cluster.Name)
|
|
|
|
|
2016-08-07 12:26:20 +00:00
|
|
|
operations = append(operations, util.FederatedOperation{
|
2016-08-16 18:43:43 +00:00
|
|
|
Type: util.OperationTypeAdd,
|
|
|
|
Obj: desiredNamespace,
|
|
|
|
ClusterName: cluster.Name,
|
2016-08-07 12:26:20 +00:00
|
|
|
})
|
|
|
|
} else {
|
|
|
|
clusterNamespace := clusterNamespaceObj.(*api_v1.Namespace)
|
2016-08-12 15:32:14 +00:00
|
|
|
|
2016-08-07 12:26:20 +00:00
|
|
|
// Update existing namespace, if needed.
|
2016-10-12 12:08:35 +00:00
|
|
|
if !util.ObjectMetaAndSpecEquivalent(desiredNamespace, clusterNamespace) {
|
2016-08-31 21:13:18 +00:00
|
|
|
nc.eventRecorder.Eventf(baseNamespace, api.EventTypeNormal, "UpdateInCluster",
|
2016-10-11 19:48:38 +00:00
|
|
|
"Updating namespace in cluster %s. Desired: %+v\n Actual: %+v\n", cluster.Name, desiredNamespace, clusterNamespace)
|
2016-08-29 21:23:47 +00:00
|
|
|
|
2016-08-07 12:26:20 +00:00
|
|
|
operations = append(operations, util.FederatedOperation{
|
2016-08-16 18:43:43 +00:00
|
|
|
Type: util.OperationTypeUpdate,
|
|
|
|
Obj: desiredNamespace,
|
|
|
|
ClusterName: cluster.Name,
|
2016-08-07 12:26:20 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(operations) == 0 {
|
|
|
|
// Everything is in order
|
|
|
|
return
|
|
|
|
}
|
2016-10-11 19:48:38 +00:00
|
|
|
glog.V(2).Infof("Updating namespace %s in underlying clusters. Operations: %d", baseNamespace.Name, len(operations))
|
|
|
|
|
2016-08-29 21:23:47 +00:00
|
|
|
err = nc.federatedUpdater.UpdateWithOnError(operations, nc.updateTimeout, func(op util.FederatedOperation, operror error) {
|
2016-08-31 21:13:18 +00:00
|
|
|
nc.eventRecorder.Eventf(baseNamespace, api.EventTypeNormal, "UpdateInClusterFailed",
|
|
|
|
"Namespace update in cluster %s failed: %v", op.ClusterName, operror)
|
2016-08-29 21:23:47 +00:00
|
|
|
})
|
2016-08-07 12:26:20 +00:00
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("Failed to execute updates for %s: %v", namespace, err)
|
2016-08-16 14:30:19 +00:00
|
|
|
nc.deliverNamespace(namespace, 0, true)
|
2016-08-07 12:26:20 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Evertyhing is in order but lets be double sure
|
2016-08-16 14:30:19 +00:00
|
|
|
nc.deliverNamespace(namespace, nc.namespaceReviewDelay, false)
|
2016-08-07 12:26:20 +00:00
|
|
|
}
|
2016-08-25 16:11:21 +00:00
|
|
|
|
2016-09-07 17:59:56 +00:00
|
|
|
// delete deletes the given namespace or returns error if the deletion was not complete.
|
|
|
|
func (nc *NamespaceController) delete(namespace *api_v1.Namespace) error {
|
2016-08-25 16:11:21 +00:00
|
|
|
// Set Terminating status.
|
|
|
|
updatedNamespace := &api_v1.Namespace{
|
|
|
|
ObjectMeta: namespace.ObjectMeta,
|
|
|
|
Spec: namespace.Spec,
|
|
|
|
Status: api_v1.NamespaceStatus{
|
|
|
|
Phase: api_v1.NamespaceTerminating,
|
|
|
|
},
|
|
|
|
}
|
2016-10-11 19:48:38 +00:00
|
|
|
var err error
|
2016-08-25 16:11:21 +00:00
|
|
|
if namespace.Status.Phase != api_v1.NamespaceTerminating {
|
2016-08-29 21:23:47 +00:00
|
|
|
nc.eventRecorder.Event(namespace, api.EventTypeNormal, "DeleteNamespace", fmt.Sprintf("Marking for deletion"))
|
2016-10-11 19:48:38 +00:00
|
|
|
_, err = nc.federatedApiClient.Core().Namespaces().Update(updatedNamespace)
|
2016-08-25 16:11:21 +00:00
|
|
|
if err != nil {
|
2016-09-07 17:59:56 +00:00
|
|
|
return fmt.Errorf("failed to update namespace: %v", err)
|
2016-08-25 16:11:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-11 19:48:38 +00:00
|
|
|
if nc.hasFinalizerFuncInSpec(updatedNamespace, api_v1.FinalizerKubernetes) {
|
|
|
|
// Delete resources in this namespace.
|
|
|
|
updatedNamespace, err = nc.removeKubernetesFinalizer(updatedNamespace)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error in deleting resources in namespace %s: %v", namespace.Name, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete the namespace from all underlying clusters.
|
|
|
|
_, err = nc.deletionHelper.HandleObjectInUnderlyingClusters(updatedNamespace)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = nc.federatedApiClient.Core().Namespaces().Delete(namespace.Name, nil)
|
|
|
|
if err != nil {
|
|
|
|
// Its all good if the error is not found error. That means it is deleted already and we do not have to do anything.
|
|
|
|
// This is expected when we are processing an update as a result of namespace finalizer deletion.
|
|
|
|
// The process that deleted the last finalizer is also going to delete the namespace and we do not have to do anything.
|
|
|
|
if !errors.IsNotFound(err) {
|
|
|
|
return fmt.Errorf("failed to delete namespace: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensures that all resources in this namespace are deleted and then removes the kubernetes finalizer.
|
|
|
|
func (nc *NamespaceController) removeKubernetesFinalizer(namespace *api_v1.Namespace) (*api_v1.Namespace, error) {
|
|
|
|
// Right now there are just 7 types of objects: Deployments, DaemonSets, ReplicaSet, Secret, Ingress, Events and Service.
|
2016-09-07 17:59:56 +00:00
|
|
|
// Temporarly these items are simply deleted one by one to squeeze this code into 1.4.
|
|
|
|
// TODO: Make it generic (like in the regular namespace controller) and parallel.
|
2016-09-02 18:57:44 +00:00
|
|
|
err := nc.federatedApiClient.Core().Services(namespace.Name).DeleteCollection(&api_v1.DeleteOptions{}, api_v1.ListOptions{})
|
2016-09-07 17:59:56 +00:00
|
|
|
if err != nil {
|
2016-10-11 19:48:38 +00:00
|
|
|
return nil, fmt.Errorf("failed to delete service list: %v", err)
|
2016-09-07 17:59:56 +00:00
|
|
|
}
|
2016-09-02 18:57:44 +00:00
|
|
|
err = nc.federatedApiClient.Extensions().ReplicaSets(namespace.Name).DeleteCollection(&api_v1.DeleteOptions{}, api_v1.ListOptions{})
|
2016-09-07 17:59:56 +00:00
|
|
|
if err != nil {
|
2016-10-11 19:48:38 +00:00
|
|
|
return nil, fmt.Errorf("failed to delete replicaset list from namespace: %v", err)
|
2016-09-07 17:59:56 +00:00
|
|
|
}
|
2016-09-02 18:57:44 +00:00
|
|
|
err = nc.federatedApiClient.Core().Secrets(namespace.Name).DeleteCollection(&api_v1.DeleteOptions{}, api_v1.ListOptions{})
|
2016-09-07 17:59:56 +00:00
|
|
|
if err != nil {
|
2016-10-11 19:48:38 +00:00
|
|
|
return nil, fmt.Errorf("failed to delete secret list from namespace: %v", err)
|
2016-09-07 17:59:56 +00:00
|
|
|
}
|
2016-09-02 18:57:44 +00:00
|
|
|
err = nc.federatedApiClient.Extensions().Ingresses(namespace.Name).DeleteCollection(&api_v1.DeleteOptions{}, api_v1.ListOptions{})
|
2016-09-07 17:59:56 +00:00
|
|
|
if err != nil {
|
2016-10-11 19:48:38 +00:00
|
|
|
return nil, fmt.Errorf("failed to delete ingresses list from namespace: %v", err)
|
2016-09-07 17:59:56 +00:00
|
|
|
}
|
2016-10-07 15:04:19 +00:00
|
|
|
err = nc.federatedApiClient.Extensions().DaemonSets(namespace.Name).DeleteCollection(&api_v1.DeleteOptions{}, api_v1.ListOptions{})
|
|
|
|
if err != nil {
|
2016-10-11 19:48:38 +00:00
|
|
|
return nil, fmt.Errorf("failed to delete daemonsets list from namespace: %v", err)
|
2016-10-07 15:04:19 +00:00
|
|
|
}
|
|
|
|
err = nc.federatedApiClient.Extensions().Deployments(namespace.Name).DeleteCollection(&api_v1.DeleteOptions{}, api_v1.ListOptions{})
|
|
|
|
if err != nil {
|
2016-10-11 19:48:38 +00:00
|
|
|
return nil, fmt.Errorf("failed to delete deployments list from namespace: %v", err)
|
2016-10-07 15:04:19 +00:00
|
|
|
}
|
2016-09-02 18:57:44 +00:00
|
|
|
err = nc.federatedApiClient.Core().Events(namespace.Name).DeleteCollection(&api_v1.DeleteOptions{}, api_v1.ListOptions{})
|
2016-09-07 17:59:56 +00:00
|
|
|
if err != nil {
|
2016-10-11 19:48:38 +00:00
|
|
|
return nil, fmt.Errorf("failed to delete events list from namespace: %v", err)
|
2016-08-25 16:11:21 +00:00
|
|
|
}
|
|
|
|
|
2016-10-11 19:48:38 +00:00
|
|
|
// Remove kube_api.FinalizerKubernetes
|
|
|
|
if len(namespace.Spec.Finalizers) != 0 {
|
|
|
|
return nc.removeFinalizerFromSpec(namespace, api_v1.FinalizerKubernetes)
|
2016-08-25 16:11:21 +00:00
|
|
|
}
|
2016-10-11 19:48:38 +00:00
|
|
|
return namespace, nil
|
2016-08-25 16:11:21 +00:00
|
|
|
}
|