forked from openshift/origin
-
Notifications
You must be signed in to change notification settings - Fork 0
/
route.go
103 lines (91 loc) · 2.84 KB
/
route.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
package util
import (
"fmt"
"strconv"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/util/intstr"
kapi "k8s.io/kubernetes/pkg/api"
kclientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
routeapi "github.com/openshift/origin/pkg/route/apis/route"
)
// UnsecuredRoute will return a route with enough info so that it can direct traffic to
// the service provided by --service. Callers of this helper are responsible for providing
// tls configuration, path, and the hostname of the route.
// forcePort always sets a port, even when there is only one and it has no name.
// The kubernetes generator, when no port is present incorrectly selects the service Port
// instead of the service TargetPort for the route TargetPort.
func UnsecuredRoute(kc kclientset.Interface, namespace, routeName, serviceName, portString string, forcePort bool) (*routeapi.Route, error) {
if len(routeName) == 0 {
routeName = serviceName
}
svc, err := kc.Core().Services(namespace).Get(serviceName, metav1.GetOptions{})
if err != nil {
if len(portString) == 0 {
return nil, fmt.Errorf("you need to provide a route port via --port when exposing a non-existent service")
}
return &routeapi.Route{
ObjectMeta: metav1.ObjectMeta{
Name: routeName,
},
Spec: routeapi.RouteSpec{
To: routeapi.RouteTargetReference{
Name: serviceName,
},
Port: resolveRoutePort(portString),
},
}, nil
}
ok, port := supportsTCP(svc)
if !ok {
return nil, fmt.Errorf("service %q doesn't support TCP", svc.Name)
}
route := &routeapi.Route{
ObjectMeta: metav1.ObjectMeta{
Name: routeName,
Labels: svc.Labels,
},
Spec: routeapi.RouteSpec{
To: routeapi.RouteTargetReference{
Name: serviceName,
},
},
}
// When route.Spec.Port is not set, the generator will pick a service port.
// If the user didn't specify --port, and either the service has a port.Name
// or forcePort is set, set route.Spec.Port
if (len(port.Name) > 0 || forcePort) && len(portString) == 0 {
if len(port.Name) == 0 {
route.Spec.Port = resolveRoutePort(svc.Spec.Ports[0].TargetPort.String())
} else {
route.Spec.Port = resolveRoutePort(port.Name)
}
}
// --port uber alles
if len(portString) > 0 {
route.Spec.Port = resolveRoutePort(portString)
}
return route, nil
}
func resolveRoutePort(portString string) *routeapi.RoutePort {
if len(portString) == 0 {
return nil
}
var routePort intstr.IntOrString
integer, err := strconv.Atoi(portString)
if err != nil {
routePort = intstr.FromString(portString)
} else {
routePort = intstr.FromInt(integer)
}
return &routeapi.RoutePort{
TargetPort: routePort,
}
}
func supportsTCP(svc *kapi.Service) (bool, kapi.ServicePort) {
for _, port := range svc.Spec.Ports {
if port.Protocol == kapi.ProtocolTCP {
return true, port
}
}
return false, kapi.ServicePort{}
}