-
Notifications
You must be signed in to change notification settings - Fork 458
/
node_cordoned_spec.go
105 lines (89 loc) · 2.87 KB
/
node_cordoned_spec.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
// This Source Code Form is subject to the terms of the Mozilla Public
// License, v. 2.0. If a copy of the MPL was not distributed with this
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
package k8s
import (
"context"
"fmt"
"github.com/cosi-project/runtime/pkg/controller"
"github.com/cosi-project/runtime/pkg/safe"
"github.com/cosi-project/runtime/pkg/state"
"github.com/siderolabs/gen/optional"
"go.uber.org/zap"
"github.com/siderolabs/talos/pkg/machinery/resources/k8s"
"github.com/siderolabs/talos/pkg/machinery/resources/runtime"
)
// NodeCordonedSpecController manages node cordoned status based on configuration.
type NodeCordonedSpecController struct{}
// Name implements controller.Controller interface.
func (ctrl *NodeCordonedSpecController) Name() string {
return "k8s.NodeCordonedSpecController"
}
// Inputs implements controller.Controller interface.
func (ctrl *NodeCordonedSpecController) Inputs() []controller.Input {
return []controller.Input{
{
Namespace: runtime.NamespaceName,
Type: runtime.MachineStatusType,
ID: optional.Some(runtime.MachineStatusID),
Kind: controller.InputWeak,
},
}
}
// Outputs implements controller.Controller interface.
func (ctrl *NodeCordonedSpecController) Outputs() []controller.Output {
return []controller.Output{
{
Type: k8s.NodeCordonedSpecType,
Kind: controller.OutputExclusive,
},
}
}
// Run implements controller.Controller interface.
//
//nolint:gocyclo
func (ctrl *NodeCordonedSpecController) Run(ctx context.Context, r controller.Runtime, logger *zap.Logger) error {
for {
select {
case <-ctx.Done():
return nil
case <-r.EventCh():
}
status, err := safe.ReaderGetByID[*runtime.MachineStatus](ctx, r, runtime.MachineStatusID)
if err != nil {
if state.IsNotFoundError(err) {
continue
}
return fmt.Errorf("error getting config: %w", err)
}
var shouldCordon bool
switch status.TypedSpec().Stage { //nolint:exhaustive
case runtime.MachineStageShuttingDown, runtime.MachineStageUpgrading, runtime.MachineStageResetting:
shouldCordon = true
case runtime.MachineStageBooting, runtime.MachineStageRunning:
shouldCordon = false
default:
// don't change cordoned status
continue
}
if shouldCordon {
if err = safe.WriterModify(ctx, r, k8s.NewNodeCordonedSpec(k8s.NodeCordonedID),
func(k *k8s.NodeCordonedSpec) error {
return nil
}); err != nil {
return fmt.Errorf("error updating node cordoned spec: %w", err)
}
} else {
nodeCordoned, err := safe.ReaderListAll[*k8s.NodeCordonedSpec](ctx, r)
if err != nil {
return fmt.Errorf("error getting node cordoned specs: %w", err)
}
for iter := nodeCordoned.Iterator(); iter.Next(); {
if err = r.Destroy(ctx, iter.Value().Metadata()); err != nil {
return fmt.Errorf("error destroying node cordoned spec: %w", err)
}
}
}
r.ResetRestartBackoff()
}
}