-
Notifications
You must be signed in to change notification settings - Fork 19
/
common.go
191 lines (166 loc) · 5.21 KB
/
common.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
package manifests
import (
"github.com/Azure/aks-app-routing-operator/pkg/util"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/util/intstr"
"sigs.k8s.io/controller-runtime/pkg/client"
"github.com/Azure/aks-app-routing-operator/pkg/config"
)
const operatorName = "aks-app-routing-operator"
// GetTopLevelLabels returns labels that every resource App Routing manages have
func GetTopLevelLabels() map[string]string { // this is a function to avoid any accidental mutation due to maps being reference types
return map[string]string{"app.kubernetes.io/managed-by": operatorName}
}
// HasTopLevelLabels returns true if the given labels match the top level labels
func HasTopLevelLabels(objLabels map[string]string) bool {
if len(objLabels) == 0 {
return false
}
for label, val := range GetTopLevelLabels() {
spcVal, ok := objLabels[label]
if !ok {
return false
}
if spcVal != val {
return false
}
}
return true
}
// GetOwnerRefs returns the owner references for the given object
func GetOwnerRefs(owner client.Object, controller bool) []metav1.OwnerReference {
gvk := owner.GetObjectKind().GroupVersionKind()
apiVersion := gvk.GroupVersion().String()
kind := gvk.Kind
name := owner.GetName()
uid := owner.GetUID()
return []metav1.OwnerReference{{
APIVersion: apiVersion,
Kind: kind,
Name: name,
UID: uid,
Controller: util.ToPtr(controller),
}}
}
func Namespace(conf *config.Config) *corev1.Namespace {
ns := &corev1.Namespace{
TypeMeta: metav1.TypeMeta{
Kind: "Namespace",
APIVersion: "v1",
},
ObjectMeta: metav1.ObjectMeta{
Name: conf.NS,
// don't set top-level labels,namespace is not managed by operator
Labels: map[string]string{},
Annotations: map[string]string{},
},
}
if !conf.DisableOSM {
ns.ObjectMeta.Labels["openservicemesh.io/monitored-by"] = "osm"
}
return ns
}
func withPodRefEnvVars(contain *corev1.Container) *corev1.Container {
copy := contain.DeepCopy()
copy.Env = append(copy.Env, corev1.EnvVar{
Name: "POD_NAME",
ValueFrom: &corev1.EnvVarSource{
FieldRef: &corev1.ObjectFieldSelector{
FieldPath: "metadata.name",
},
},
}, corev1.EnvVar{
Name: "POD_NAMESPACE",
ValueFrom: &corev1.EnvVarSource{
FieldRef: &corev1.ObjectFieldSelector{
FieldPath: "metadata.namespace",
},
},
})
return copy
}
func withTypicalReadinessProbe(port int, contain *corev1.Container) *corev1.Container {
copy := contain.DeepCopy()
copy.ReadinessProbe = &corev1.Probe{
FailureThreshold: 3,
InitialDelaySeconds: 10,
PeriodSeconds: 5,
SuccessThreshold: 1,
TimeoutSeconds: 1,
ProbeHandler: corev1.ProbeHandler{
HTTPGet: &corev1.HTTPGetAction{
Path: "/healthz",
Port: intstr.FromInt(port),
Scheme: corev1.URISchemeHTTP,
},
},
}
return copy
}
func withLivenessProbeMatchingReadinessNewFailureThresh(contain *corev1.Container, failureThresh int32) *corev1.Container {
copy := withLivenessProbeMatchingReadiness(contain)
if copy != nil && copy.LivenessProbe != nil {
copy.LivenessProbe.FailureThreshold = failureThresh
}
return copy
}
func withLivenessProbeMatchingReadiness(contain *corev1.Container) *corev1.Container {
copy := contain.DeepCopy()
copy.LivenessProbe = copy.ReadinessProbe.DeepCopy()
return copy
}
func WithPreferSystemNodes(spec *corev1.PodSpec) *corev1.PodSpec {
copy := spec.DeepCopy()
copy.PriorityClassName = "system-cluster-critical"
copy.Tolerations = append(copy.Tolerations, corev1.Toleration{
Key: "CriticalAddonsOnly",
Operator: corev1.TolerationOpExists,
})
if copy.Affinity == nil {
copy.Affinity = &corev1.Affinity{}
}
if copy.Affinity.NodeAffinity == nil {
copy.Affinity.NodeAffinity = &corev1.NodeAffinity{}
}
copy.Affinity.NodeAffinity.PreferredDuringSchedulingIgnoredDuringExecution = append(copy.Affinity.NodeAffinity.PreferredDuringSchedulingIgnoredDuringExecution, corev1.PreferredSchedulingTerm{
Weight: 100,
Preference: corev1.NodeSelectorTerm{
MatchExpressions: []corev1.NodeSelectorRequirement{{
Key: "kubernetes.azure.com/mode",
Operator: corev1.NodeSelectorOpIn,
Values: []string{"system"},
}},
},
})
if copy.Affinity.NodeAffinity.RequiredDuringSchedulingIgnoredDuringExecution == nil {
copy.Affinity.NodeAffinity.RequiredDuringSchedulingIgnoredDuringExecution = &corev1.NodeSelector{}
}
copy.Affinity.NodeAffinity.RequiredDuringSchedulingIgnoredDuringExecution.NodeSelectorTerms = append(copy.Affinity.NodeAffinity.RequiredDuringSchedulingIgnoredDuringExecution.NodeSelectorTerms, corev1.NodeSelectorTerm{
MatchExpressions: []corev1.NodeSelectorRequirement{
{
Key: "kubernetes.azure.com/cluster",
Operator: corev1.NodeSelectorOpExists,
},
{
Key: "type",
Operator: corev1.NodeSelectorOpNotIn,
Values: []string{"virtual-kubelet"},
},
{
Key: "kubernetes.io/os",
Operator: corev1.NodeSelectorOpIn,
Values: []string{"linux"},
},
},
})
return copy
}
func AddComponentLabel(originalLabels map[string]string, componentName string) map[string]string {
tr := make(map[string]string)
for k, v := range originalLabels {
tr[k] = v
}
tr["app.kubernetes.io/component"] = componentName
return tr
}