mirror of https://github.com/k3s-io/k3s
275 lines
8.2 KiB
Go
275 lines
8.2 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package podtolerationrestriction
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
|
|
"k8s.io/klog"
|
|
|
|
corev1 "k8s.io/api/core/v1"
|
|
"k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apiserver/pkg/admission"
|
|
genericadmissioninitializer "k8s.io/apiserver/pkg/admission/initializer"
|
|
"k8s.io/client-go/informers"
|
|
"k8s.io/client-go/kubernetes"
|
|
corev1listers "k8s.io/client-go/listers/core/v1"
|
|
api "k8s.io/kubernetes/pkg/apis/core"
|
|
qoshelper "k8s.io/kubernetes/pkg/apis/core/helper/qos"
|
|
k8s_api_v1 "k8s.io/kubernetes/pkg/apis/core/v1"
|
|
"k8s.io/kubernetes/pkg/util/tolerations"
|
|
pluginapi "k8s.io/kubernetes/plugin/pkg/admission/podtolerationrestriction/apis/podtolerationrestriction"
|
|
)
|
|
|
|
// PluginName is a string with the name of the plugin
|
|
const PluginName = "PodTolerationRestriction"
|
|
|
|
// Register registers a plugin
|
|
func Register(plugins *admission.Plugins) {
|
|
plugins.Register(PluginName, func(config io.Reader) (admission.Interface, error) {
|
|
pluginConfig, err := loadConfiguration(config)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return NewPodTolerationsPlugin(pluginConfig), nil
|
|
})
|
|
}
|
|
|
|
// The annotation keys for default and whitelist of tolerations
|
|
const (
|
|
NSDefaultTolerations string = "scheduler.alpha.kubernetes.io/defaultTolerations"
|
|
NSWLTolerations string = "scheduler.alpha.kubernetes.io/tolerationsWhitelist"
|
|
)
|
|
|
|
var _ admission.MutationInterface = &Plugin{}
|
|
var _ admission.ValidationInterface = &Plugin{}
|
|
var _ = genericadmissioninitializer.WantsExternalKubeInformerFactory(&Plugin{})
|
|
var _ = genericadmissioninitializer.WantsExternalKubeClientSet(&Plugin{})
|
|
|
|
// Plugin contains the client used by the admission controller
|
|
type Plugin struct {
|
|
*admission.Handler
|
|
client kubernetes.Interface
|
|
namespaceLister corev1listers.NamespaceLister
|
|
pluginConfig *pluginapi.Configuration
|
|
}
|
|
|
|
// Admit checks the admission policy and triggers corresponding actions
|
|
func (p *Plugin) Admit(ctx context.Context, a admission.Attributes, o admission.ObjectInterfaces) error {
|
|
if shouldIgnore(a) {
|
|
return nil
|
|
}
|
|
|
|
if !p.WaitForReady() {
|
|
return admission.NewForbidden(a, fmt.Errorf("not yet ready to handle request"))
|
|
}
|
|
|
|
pod := a.GetObject().(*api.Pod)
|
|
var extraTolerations []api.Toleration
|
|
if a.GetOperation() == admission.Create {
|
|
ts, err := p.getNamespaceDefaultTolerations(a.GetNamespace())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// If the namespace has not specified its default tolerations,
|
|
// fall back to cluster's default tolerations.
|
|
if ts == nil {
|
|
ts = p.pluginConfig.Default
|
|
}
|
|
|
|
extraTolerations = ts
|
|
}
|
|
|
|
if qoshelper.GetPodQOS(pod) != api.PodQOSBestEffort {
|
|
extraTolerations = append(extraTolerations, api.Toleration{
|
|
Key: corev1.TaintNodeMemoryPressure,
|
|
Operator: api.TolerationOpExists,
|
|
Effect: api.TaintEffectNoSchedule,
|
|
})
|
|
}
|
|
// Final merge of tolerations irrespective of pod type.
|
|
if len(extraTolerations) > 0 {
|
|
pod.Spec.Tolerations = tolerations.MergeTolerations(pod.Spec.Tolerations, extraTolerations)
|
|
}
|
|
return p.Validate(ctx, a, o)
|
|
}
|
|
|
|
// Validate we can obtain a whitelist of tolerations
|
|
func (p *Plugin) Validate(ctx context.Context, a admission.Attributes, o admission.ObjectInterfaces) error {
|
|
if shouldIgnore(a) {
|
|
return nil
|
|
}
|
|
|
|
if !p.WaitForReady() {
|
|
return admission.NewForbidden(a, fmt.Errorf("not yet ready to handle request"))
|
|
}
|
|
|
|
// whitelist verification.
|
|
pod := a.GetObject().(*api.Pod)
|
|
if len(pod.Spec.Tolerations) > 0 {
|
|
whitelist, err := p.getNamespaceTolerationsWhitelist(a.GetNamespace())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// If the namespace has not specified its tolerations whitelist,
|
|
// fall back to cluster's whitelist of tolerations.
|
|
if whitelist == nil {
|
|
whitelist = p.pluginConfig.Whitelist
|
|
}
|
|
|
|
if len(whitelist) > 0 {
|
|
// check if the merged pod tolerations satisfy its namespace whitelist
|
|
if !tolerations.VerifyAgainstWhitelist(pod.Spec.Tolerations, whitelist) {
|
|
return fmt.Errorf("pod tolerations (possibly merged with namespace default tolerations) conflict with its namespace whitelist")
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func shouldIgnore(a admission.Attributes) bool {
|
|
resource := a.GetResource().GroupResource()
|
|
if resource != api.Resource("pods") {
|
|
return true
|
|
}
|
|
if a.GetSubresource() != "" {
|
|
// only run the checks below on pods proper and not subresources
|
|
return true
|
|
}
|
|
|
|
obj := a.GetObject()
|
|
_, ok := obj.(*api.Pod)
|
|
if !ok {
|
|
klog.Errorf("expected pod but got %s", a.GetKind().Kind)
|
|
return true
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// NewPodTolerationsPlugin initializes a Plugin
|
|
func NewPodTolerationsPlugin(pluginConfig *pluginapi.Configuration) *Plugin {
|
|
return &Plugin{
|
|
Handler: admission.NewHandler(admission.Create, admission.Update),
|
|
pluginConfig: pluginConfig,
|
|
}
|
|
}
|
|
|
|
// SetExternalKubeClientSet sets th client
|
|
func (p *Plugin) SetExternalKubeClientSet(client kubernetes.Interface) {
|
|
p.client = client
|
|
}
|
|
|
|
// SetExternalKubeInformerFactory initializes the Informer Factory
|
|
func (p *Plugin) SetExternalKubeInformerFactory(f informers.SharedInformerFactory) {
|
|
namespaceInformer := f.Core().V1().Namespaces()
|
|
p.namespaceLister = namespaceInformer.Lister()
|
|
p.SetReadyFunc(namespaceInformer.Informer().HasSynced)
|
|
|
|
}
|
|
|
|
// ValidateInitialization checks the object is properly initialized
|
|
func (p *Plugin) ValidateInitialization() error {
|
|
if p.namespaceLister == nil {
|
|
return fmt.Errorf("missing namespaceLister")
|
|
}
|
|
if p.client == nil {
|
|
return fmt.Errorf("missing client")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// in exceptional cases, this can result in two live calls, but once the cache catches up, that will stop.
|
|
func (p *Plugin) getNamespace(nsName string) (*corev1.Namespace, error) {
|
|
namespace, err := p.namespaceLister.Get(nsName)
|
|
if errors.IsNotFound(err) {
|
|
// in case of latency in our caches, make a call direct to storage to verify that it truly exists or not
|
|
namespace, err = p.client.CoreV1().Namespaces().Get(context.TODO(), nsName, metav1.GetOptions{})
|
|
if err != nil {
|
|
if errors.IsNotFound(err) {
|
|
return nil, err
|
|
}
|
|
return nil, errors.NewInternalError(err)
|
|
}
|
|
} else if err != nil {
|
|
return nil, errors.NewInternalError(err)
|
|
}
|
|
|
|
return namespace, nil
|
|
}
|
|
|
|
func (p *Plugin) getNamespaceDefaultTolerations(nsName string) ([]api.Toleration, error) {
|
|
ns, err := p.getNamespace(nsName)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return extractNSTolerations(ns, NSDefaultTolerations)
|
|
}
|
|
|
|
func (p *Plugin) getNamespaceTolerationsWhitelist(nsName string) ([]api.Toleration, error) {
|
|
ns, err := p.getNamespace(nsName)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return extractNSTolerations(ns, NSWLTolerations)
|
|
}
|
|
|
|
// extractNSTolerations extracts default or whitelist of tolerations from
|
|
// following namespace annotations keys: "scheduler.alpha.kubernetes.io/defaultTolerations"
|
|
// and "scheduler.alpha.kubernetes.io/tolerationsWhitelist". If these keys are
|
|
// unset (nil), extractNSTolerations returns nil. If the value to these
|
|
// keys are set to empty, an empty toleration is returned, otherwise
|
|
// configured tolerations are returned.
|
|
func extractNSTolerations(ns *corev1.Namespace, key string) ([]api.Toleration, error) {
|
|
// if a namespace does not have any annotations
|
|
if len(ns.Annotations) == 0 {
|
|
return nil, nil
|
|
}
|
|
|
|
// if NSWLTolerations or NSDefaultTolerations does not exist
|
|
if _, ok := ns.Annotations[key]; !ok {
|
|
return nil, nil
|
|
}
|
|
|
|
// if value is set to empty
|
|
if len(ns.Annotations[key]) == 0 {
|
|
return []api.Toleration{}, nil
|
|
}
|
|
|
|
var v1Tolerations []corev1.Toleration
|
|
err := json.Unmarshal([]byte(ns.Annotations[key]), &v1Tolerations)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
ts := make([]api.Toleration, len(v1Tolerations))
|
|
for i := range v1Tolerations {
|
|
if err := k8s_api_v1.Convert_v1_Toleration_To_core_Toleration(&v1Tolerations[i], &ts[i], nil); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
return ts, nil
|
|
}
|