mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-31 05:40:42 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			312 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			312 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2016 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package cmd
 | |
| 
 | |
| import (
 | |
| 	"encoding/json"
 | |
| 	"fmt"
 | |
| 	"strings"
 | |
| 
 | |
| 	"github.com/golang/glog"
 | |
| 	"github.com/spf13/cobra"
 | |
| 
 | |
| 	"k8s.io/api/core/v1"
 | |
| 	"k8s.io/apimachinery/pkg/api/meta"
 | |
| 	"k8s.io/apimachinery/pkg/runtime"
 | |
| 	"k8s.io/apimachinery/pkg/types"
 | |
| 	"k8s.io/apimachinery/pkg/util/strategicpatch"
 | |
| 	"k8s.io/apimachinery/pkg/util/validation"
 | |
| 	"k8s.io/kubernetes/pkg/kubectl/cmd/templates"
 | |
| 	cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
 | |
| 	"k8s.io/kubernetes/pkg/kubectl/genericclioptions"
 | |
| 	"k8s.io/kubernetes/pkg/kubectl/genericclioptions/printers"
 | |
| 	"k8s.io/kubernetes/pkg/kubectl/genericclioptions/resource"
 | |
| 	"k8s.io/kubernetes/pkg/kubectl/scheme"
 | |
| 	"k8s.io/kubernetes/pkg/kubectl/util/i18n"
 | |
| 	taintutils "k8s.io/kubernetes/pkg/util/taints"
 | |
| )
 | |
| 
 | |
| // TaintOptions have the data required to perform the taint operation
 | |
| type TaintOptions struct {
 | |
| 	PrintFlags *genericclioptions.PrintFlags
 | |
| 	ToPrinter  func(string) (printers.ResourcePrinter, error)
 | |
| 
 | |
| 	resources      []string
 | |
| 	taintsToAdd    []v1.Taint
 | |
| 	taintsToRemove []v1.Taint
 | |
| 	builder        *resource.Builder
 | |
| 	selector       string
 | |
| 	overwrite      bool
 | |
| 	all            bool
 | |
| 
 | |
| 	ClientForMapping func(*meta.RESTMapping) (resource.RESTClient, error)
 | |
| 
 | |
| 	genericclioptions.IOStreams
 | |
| }
 | |
| 
 | |
| var (
 | |
| 	taintLong = templates.LongDesc(i18n.T(`
 | |
| 		Update the taints on one or more nodes.
 | |
| 
 | |
| 		* A taint consists of a key, value, and effect. As an argument here, it is expressed as key=value:effect.
 | |
| 		* The key must begin with a letter or number, and may contain letters, numbers, hyphens, dots, and underscores, up to %[1]d characters.
 | |
| 		* Optionally, the key can begin with a DNS subdomain prefix and a single '/', like example.com/my-app
 | |
| 		* The value must begin with a letter or number, and may contain letters, numbers, hyphens, dots, and underscores, up to %[2]d characters.
 | |
| 		* The effect must be NoSchedule, PreferNoSchedule or NoExecute.
 | |
| 		* Currently taint can only apply to node.`))
 | |
| 
 | |
| 	taintExample = templates.Examples(i18n.T(`
 | |
| 		# Update node 'foo' with a taint with key 'dedicated' and value 'special-user' and effect 'NoSchedule'.
 | |
| 		# If a taint with that key and effect already exists, its value is replaced as specified.
 | |
| 		kubectl taint nodes foo dedicated=special-user:NoSchedule
 | |
| 
 | |
| 		# Remove from node 'foo' the taint with key 'dedicated' and effect 'NoSchedule' if one exists.
 | |
| 		kubectl taint nodes foo dedicated:NoSchedule-
 | |
| 
 | |
| 		# Remove from node 'foo' all the taints with key 'dedicated'
 | |
| 		kubectl taint nodes foo dedicated-
 | |
| 
 | |
| 		# Add a taint with key 'dedicated' on nodes having label mylabel=X
 | |
| 		kubectl taint node -l myLabel=X  dedicated=foo:PreferNoSchedule`))
 | |
| )
 | |
| 
 | |
| func NewCmdTaint(f cmdutil.Factory, streams genericclioptions.IOStreams) *cobra.Command {
 | |
| 	options := &TaintOptions{
 | |
| 		PrintFlags: genericclioptions.NewPrintFlags("tainted").WithTypeSetter(scheme.Scheme),
 | |
| 		IOStreams:  streams,
 | |
| 	}
 | |
| 
 | |
| 	validArgs := []string{"node"}
 | |
| 
 | |
| 	cmd := &cobra.Command{
 | |
| 		Use: "taint NODE NAME KEY_1=VAL_1:TAINT_EFFECT_1 ... KEY_N=VAL_N:TAINT_EFFECT_N",
 | |
| 		DisableFlagsInUseLine: true,
 | |
| 		Short:   i18n.T("Update the taints on one or more nodes"),
 | |
| 		Long:    fmt.Sprintf(taintLong, validation.DNS1123SubdomainMaxLength, validation.LabelValueMaxLength),
 | |
| 		Example: taintExample,
 | |
| 		Run: func(cmd *cobra.Command, args []string) {
 | |
| 			if err := options.Complete(f, cmd, args); err != nil {
 | |
| 				cmdutil.CheckErr(err)
 | |
| 			}
 | |
| 			if err := options.Validate(); err != nil {
 | |
| 				cmdutil.CheckErr(cmdutil.UsageErrorf(cmd, err.Error()))
 | |
| 			}
 | |
| 			if err := options.RunTaint(); err != nil {
 | |
| 				cmdutil.CheckErr(err)
 | |
| 			}
 | |
| 		},
 | |
| 		ValidArgs: validArgs,
 | |
| 	}
 | |
| 
 | |
| 	options.PrintFlags.AddFlags(cmd)
 | |
| 
 | |
| 	cmdutil.AddValidateFlags(cmd)
 | |
| 	cmd.Flags().StringVarP(&options.selector, "selector", "l", options.selector, "Selector (label query) to filter on, supports '=', '==', and '!='.(e.g. -l key1=value1,key2=value2)")
 | |
| 	cmd.Flags().BoolVar(&options.overwrite, "overwrite", options.overwrite, "If true, allow taints to be overwritten, otherwise reject taint updates that overwrite existing taints.")
 | |
| 	cmd.Flags().BoolVar(&options.all, "all", options.all, "Select all nodes in the cluster")
 | |
| 	return cmd
 | |
| }
 | |
| 
 | |
| // Complete adapts from the command line args and factory to the data required.
 | |
| func (o *TaintOptions) Complete(f cmdutil.Factory, cmd *cobra.Command, args []string) (err error) {
 | |
| 	namespace, _, err := f.ToRawKubeConfigLoader().Namespace()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// retrieves resource and taint args from args
 | |
| 	// also checks args to verify that all resources are specified before taints
 | |
| 	taintArgs := []string{}
 | |
| 	metTaintArg := false
 | |
| 	for _, s := range args {
 | |
| 		isTaint := strings.Contains(s, "=") || strings.HasSuffix(s, "-")
 | |
| 		switch {
 | |
| 		case !metTaintArg && isTaint:
 | |
| 			metTaintArg = true
 | |
| 			fallthrough
 | |
| 		case metTaintArg && isTaint:
 | |
| 			taintArgs = append(taintArgs, s)
 | |
| 		case !metTaintArg && !isTaint:
 | |
| 			o.resources = append(o.resources, s)
 | |
| 		case metTaintArg && !isTaint:
 | |
| 			return fmt.Errorf("all resources must be specified before taint changes: %s", s)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	o.ToPrinter = func(operation string) (printers.ResourcePrinter, error) {
 | |
| 		o.PrintFlags.NamePrintFlags.Operation = operation
 | |
| 		return o.PrintFlags.ToPrinter()
 | |
| 	}
 | |
| 
 | |
| 	if len(o.resources) < 1 {
 | |
| 		return fmt.Errorf("one or more resources must be specified as <resource> <name>")
 | |
| 	}
 | |
| 	if len(taintArgs) < 1 {
 | |
| 		return fmt.Errorf("at least one taint update is required")
 | |
| 	}
 | |
| 
 | |
| 	if o.taintsToAdd, o.taintsToRemove, err = taintutils.ParseTaints(taintArgs); err != nil {
 | |
| 		return cmdutil.UsageErrorf(cmd, err.Error())
 | |
| 	}
 | |
| 	o.builder = f.NewBuilder().
 | |
| 		WithScheme(scheme.Scheme, scheme.Scheme.PrioritizedVersionsAllGroups()...).
 | |
| 		ContinueOnError().
 | |
| 		NamespaceParam(namespace).DefaultNamespace()
 | |
| 	if o.selector != "" {
 | |
| 		o.builder = o.builder.LabelSelectorParam(o.selector).ResourceTypes("node")
 | |
| 	}
 | |
| 	if o.all {
 | |
| 		o.builder = o.builder.SelectAllParam(o.all).ResourceTypes("node").Flatten().Latest()
 | |
| 	}
 | |
| 	if !o.all && o.selector == "" && len(o.resources) >= 2 {
 | |
| 		o.builder = o.builder.ResourceNames("node", o.resources[1:]...)
 | |
| 	}
 | |
| 	o.builder = o.builder.LabelSelectorParam(o.selector).
 | |
| 		Flatten().
 | |
| 		Latest()
 | |
| 
 | |
| 	o.ClientForMapping = f.ClientForMapping
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // validateFlags checks for the validation of flags for kubectl taints.
 | |
| func (o TaintOptions) validateFlags() error {
 | |
| 	// Cannot have a non-empty selector and all flag set. They are mutually exclusive.
 | |
| 	if o.all && o.selector != "" {
 | |
| 		return fmt.Errorf("setting 'all' parameter with a non empty selector is prohibited.")
 | |
| 	}
 | |
| 	// If both selector and all are not set.
 | |
| 	if !o.all && o.selector == "" {
 | |
| 		if len(o.resources) < 2 {
 | |
| 			return fmt.Errorf("at least one resource name must be specified since 'all' parameter is not set")
 | |
| 		} else {
 | |
| 			return nil
 | |
| 		}
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Validate checks to the TaintOptions to see if there is sufficient information run the command.
 | |
| func (o TaintOptions) Validate() error {
 | |
| 	resourceType := strings.ToLower(o.resources[0])
 | |
| 	validResources, isValidResource := []string{"node", "nodes"}, false
 | |
| 	for _, validResource := range validResources {
 | |
| 		if resourceType == validResource {
 | |
| 			isValidResource = true
 | |
| 			break
 | |
| 		}
 | |
| 	}
 | |
| 	if !isValidResource {
 | |
| 		return fmt.Errorf("invalid resource type %s, only %q are supported", o.resources[0], validResources)
 | |
| 	}
 | |
| 
 | |
| 	// check the format of taint args and checks removed taints aren't in the new taints list
 | |
| 	var conflictTaints []string
 | |
| 	for _, taintAdd := range o.taintsToAdd {
 | |
| 		for _, taintRemove := range o.taintsToRemove {
 | |
| 			if taintAdd.Key != taintRemove.Key {
 | |
| 				continue
 | |
| 			}
 | |
| 			if len(taintRemove.Effect) == 0 || taintAdd.Effect == taintRemove.Effect {
 | |
| 				conflictTaint := fmt.Sprintf("{\"%s\":\"%s\"}", taintRemove.Key, taintRemove.Effect)
 | |
| 				conflictTaints = append(conflictTaints, conflictTaint)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	if len(conflictTaints) > 0 {
 | |
| 		return fmt.Errorf("can not both modify and remove the following taint(s) in the same command: %s", strings.Join(conflictTaints, ", "))
 | |
| 	}
 | |
| 	return o.validateFlags()
 | |
| }
 | |
| 
 | |
| // RunTaint does the work
 | |
| func (o TaintOptions) RunTaint() error {
 | |
| 	r := o.builder.Do()
 | |
| 	if err := r.Err(); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	return r.Visit(func(info *resource.Info, err error) error {
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		obj := info.Object
 | |
| 		name, namespace := info.Name, info.Namespace
 | |
| 		oldData, err := json.Marshal(obj)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		operation, err := o.updateTaints(obj)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		newData, err := json.Marshal(obj)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		patchBytes, err := strategicpatch.CreateTwoWayMergePatch(oldData, newData, obj)
 | |
| 		createdPatch := err == nil
 | |
| 		if err != nil {
 | |
| 			glog.V(2).Infof("couldn't compute patch: %v", err)
 | |
| 		}
 | |
| 
 | |
| 		mapping := info.ResourceMapping()
 | |
| 		client, err := o.ClientForMapping(mapping)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		helper := resource.NewHelper(client, mapping)
 | |
| 
 | |
| 		var outputObj runtime.Object
 | |
| 		if createdPatch {
 | |
| 			outputObj, err = helper.Patch(namespace, name, types.StrategicMergePatchType, patchBytes)
 | |
| 		} else {
 | |
| 			outputObj, err = helper.Replace(namespace, name, false, obj)
 | |
| 		}
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		outputObj = cmdutil.AsDefaultVersionedOrOriginal(outputObj, mapping)
 | |
| 
 | |
| 		printer, err := o.ToPrinter(operation)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		return printer.PrintObj(outputObj, o.Out)
 | |
| 	})
 | |
| }
 | |
| 
 | |
| // updateTaints applies a taint option(o) to a node in cluster after computing the net effect of operation(i.e. does it result in an overwrite?), it reports back the end result in a way that user can easily interpret.
 | |
| func (o TaintOptions) updateTaints(obj runtime.Object) (string, error) {
 | |
| 	node, ok := obj.(*v1.Node)
 | |
| 	if !ok {
 | |
| 		return "", fmt.Errorf("unexpected type %T, expected Node", obj)
 | |
| 	}
 | |
| 	if !o.overwrite {
 | |
| 		if exists := taintutils.CheckIfTaintsAlreadyExists(node.Spec.Taints, o.taintsToAdd); len(exists) != 0 {
 | |
| 			return "", fmt.Errorf("Node %s already has %v taint(s) with same effect(s) and --overwrite is false", node.Name, exists)
 | |
| 		}
 | |
| 	}
 | |
| 	operation, newTaints, err := taintutils.ReorganizeTaints(node, o.overwrite, o.taintsToAdd, o.taintsToRemove)
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 	node.Spec.Taints = newTaints
 | |
| 	return operation, nil
 | |
| }
 |