summaryrefslogtreecommitdiff
path: root/vendor/k8s.io/kubernetes/pkg/api
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/k8s.io/kubernetes/pkg/api')
-rw-r--r--vendor/k8s.io/kubernetes/pkg/api/legacyscheme/scheme.go46
-rw-r--r--vendor/k8s.io/kubernetes/pkg/api/service/util.go85
-rw-r--r--vendor/k8s.io/kubernetes/pkg/api/v1/pod/util.go296
3 files changed, 0 insertions, 427 deletions
diff --git a/vendor/k8s.io/kubernetes/pkg/api/legacyscheme/scheme.go b/vendor/k8s.io/kubernetes/pkg/api/legacyscheme/scheme.go
deleted file mode 100644
index 64c63a360..000000000
--- a/vendor/k8s.io/kubernetes/pkg/api/legacyscheme/scheme.go
+++ /dev/null
@@ -1,46 +0,0 @@
-/*
-Copyright 2014 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package legacyscheme
-
-import (
- "os"
-
- "k8s.io/apimachinery/pkg/apimachinery/announced"
- "k8s.io/apimachinery/pkg/apimachinery/registered"
- "k8s.io/apimachinery/pkg/runtime"
- "k8s.io/apimachinery/pkg/runtime/serializer"
-)
-
-// GroupFactoryRegistry is the APIGroupFactoryRegistry (overlaps a bit with Registry, see comments in package for details)
-var GroupFactoryRegistry = make(announced.APIGroupFactoryRegistry)
-
-// Registry is an instance of an API registry. This is an interim step to start removing the idea of a global
-// API registry.
-var Registry = registered.NewOrDie(os.Getenv("KUBE_API_VERSIONS"))
-
-// Scheme is the default instance of runtime.Scheme to which types in the Kubernetes API are already registered.
-// NOTE: If you are copying this file to start a new api group, STOP! Copy the
-// extensions group instead. This Scheme is special and should appear ONLY in
-// the api group, unless you really know what you're doing.
-// TODO(lavalamp): make the above error impossible.
-var Scheme = runtime.NewScheme()
-
-// Codecs provides access to encoding and decoding for the scheme
-var Codecs = serializer.NewCodecFactory(Scheme)
-
-// ParameterCodec handles versioning of objects that are converted to query parameters.
-var ParameterCodec = runtime.NewParameterCodec(Scheme)
diff --git a/vendor/k8s.io/kubernetes/pkg/api/service/util.go b/vendor/k8s.io/kubernetes/pkg/api/service/util.go
deleted file mode 100644
index 5de5f2765..000000000
--- a/vendor/k8s.io/kubernetes/pkg/api/service/util.go
+++ /dev/null
@@ -1,85 +0,0 @@
-/*
-Copyright 2016 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package service
-
-import (
- "fmt"
- api "k8s.io/kubernetes/pkg/apis/core"
- netsets "k8s.io/kubernetes/pkg/util/net/sets"
- "strings"
-)
-
-const (
- defaultLoadBalancerSourceRanges = "0.0.0.0/0"
-)
-
-// IsAllowAll checks whether the netsets.IPNet allows traffic from 0.0.0.0/0
-func IsAllowAll(ipnets netsets.IPNet) bool {
- for _, s := range ipnets.StringSlice() {
- if s == "0.0.0.0/0" {
- return true
- }
- }
- return false
-}
-
-// GetLoadBalancerSourceRanges first try to parse and verify LoadBalancerSourceRanges field from a service.
-// If the field is not specified, turn to parse and verify the AnnotationLoadBalancerSourceRangesKey annotation from a service,
-// extracting the source ranges to allow, and if not present returns a default (allow-all) value.
-func GetLoadBalancerSourceRanges(service *api.Service) (netsets.IPNet, error) {
- var ipnets netsets.IPNet
- var err error
- // if SourceRange field is specified, ignore sourceRange annotation
- if len(service.Spec.LoadBalancerSourceRanges) > 0 {
- specs := service.Spec.LoadBalancerSourceRanges
- ipnets, err = netsets.ParseIPNets(specs...)
-
- if err != nil {
- return nil, fmt.Errorf("service.Spec.LoadBalancerSourceRanges: %v is not valid. Expecting a list of IP ranges. For example, 10.0.0.0/24. Error msg: %v", specs, err)
- }
- } else {
- val := service.Annotations[api.AnnotationLoadBalancerSourceRangesKey]
- val = strings.TrimSpace(val)
- if val == "" {
- val = defaultLoadBalancerSourceRanges
- }
- specs := strings.Split(val, ",")
- ipnets, err = netsets.ParseIPNets(specs...)
- if err != nil {
- return nil, fmt.Errorf("%s: %s is not valid. Expecting a comma-separated list of source IP ranges. For example, 10.0.0.0/24,192.168.2.0/24", api.AnnotationLoadBalancerSourceRangesKey, val)
- }
- }
- return ipnets, nil
-}
-
-// RequestsOnlyLocalTraffic checks if service requests OnlyLocal traffic.
-func RequestsOnlyLocalTraffic(service *api.Service) bool {
- if service.Spec.Type != api.ServiceTypeLoadBalancer &&
- service.Spec.Type != api.ServiceTypeNodePort {
- return false
- }
-
- return service.Spec.ExternalTrafficPolicy == api.ServiceExternalTrafficPolicyTypeLocal
-}
-
-// NeedsHealthCheck checks if service needs health check.
-func NeedsHealthCheck(service *api.Service) bool {
- if service.Spec.Type != api.ServiceTypeLoadBalancer {
- return false
- }
- return RequestsOnlyLocalTraffic(service)
-}
diff --git a/vendor/k8s.io/kubernetes/pkg/api/v1/pod/util.go b/vendor/k8s.io/kubernetes/pkg/api/v1/pod/util.go
deleted file mode 100644
index aa79c7250..000000000
--- a/vendor/k8s.io/kubernetes/pkg/api/v1/pod/util.go
+++ /dev/null
@@ -1,296 +0,0 @@
-/*
-Copyright 2015 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package pod
-
-import (
- "fmt"
- "time"
-
- "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/util/intstr"
-)
-
-// FindPort locates the container port for the given pod and portName. If the
-// targetPort is a number, use that. If the targetPort is a string, look that
-// string up in all named ports in all containers in the target pod. If no
-// match is found, fail.
-func FindPort(pod *v1.Pod, svcPort *v1.ServicePort) (int, error) {
- portName := svcPort.TargetPort
- switch portName.Type {
- case intstr.String:
- name := portName.StrVal
- for _, container := range pod.Spec.Containers {
- for _, port := range container.Ports {
- if port.Name == name && port.Protocol == svcPort.Protocol {
- return int(port.ContainerPort), nil
- }
- }
- }
- case intstr.Int:
- return portName.IntValue(), nil
- }
-
- return 0, fmt.Errorf("no suitable port for manifest: %s", pod.UID)
-}
-
-// Visitor is called with each object name, and returns true if visiting should continue
-type Visitor func(name string) (shouldContinue bool)
-
-// VisitPodSecretNames invokes the visitor function with the name of every secret
-// referenced by the pod spec. If visitor returns false, visiting is short-circuited.
-// Transitive references (e.g. pod -> pvc -> pv -> secret) are not visited.
-// Returns true if visiting completed, false if visiting was short-circuited.
-func VisitPodSecretNames(pod *v1.Pod, visitor Visitor) bool {
- for _, reference := range pod.Spec.ImagePullSecrets {
- if !visitor(reference.Name) {
- return false
- }
- }
- for i := range pod.Spec.InitContainers {
- if !visitContainerSecretNames(&pod.Spec.InitContainers[i], visitor) {
- return false
- }
- }
- for i := range pod.Spec.Containers {
- if !visitContainerSecretNames(&pod.Spec.Containers[i], visitor) {
- return false
- }
- }
- var source *v1.VolumeSource
-
- for i := range pod.Spec.Volumes {
- source = &pod.Spec.Volumes[i].VolumeSource
- switch {
- case source.AzureFile != nil:
- if len(source.AzureFile.SecretName) > 0 && !visitor(source.AzureFile.SecretName) {
- return false
- }
- case source.CephFS != nil:
- if source.CephFS.SecretRef != nil && !visitor(source.CephFS.SecretRef.Name) {
- return false
- }
- case source.FlexVolume != nil:
- if source.FlexVolume.SecretRef != nil && !visitor(source.FlexVolume.SecretRef.Name) {
- return false
- }
- case source.Projected != nil:
- for j := range source.Projected.Sources {
- if source.Projected.Sources[j].Secret != nil {
- if !visitor(source.Projected.Sources[j].Secret.Name) {
- return false
- }
- }
- }
- case source.RBD != nil:
- if source.RBD.SecretRef != nil && !visitor(source.RBD.SecretRef.Name) {
- return false
- }
- case source.Secret != nil:
- if !visitor(source.Secret.SecretName) {
- return false
- }
- case source.ScaleIO != nil:
- if source.ScaleIO.SecretRef != nil && !visitor(source.ScaleIO.SecretRef.Name) {
- return false
- }
- case source.ISCSI != nil:
- if source.ISCSI.SecretRef != nil && !visitor(source.ISCSI.SecretRef.Name) {
- return false
- }
- case source.StorageOS != nil:
- if source.StorageOS.SecretRef != nil && !visitor(source.StorageOS.SecretRef.Name) {
- return false
- }
- }
- }
- return true
-}
-
-func visitContainerSecretNames(container *v1.Container, visitor Visitor) bool {
- for _, env := range container.EnvFrom {
- if env.SecretRef != nil {
- if !visitor(env.SecretRef.Name) {
- return false
- }
- }
- }
- for _, envVar := range container.Env {
- if envVar.ValueFrom != nil && envVar.ValueFrom.SecretKeyRef != nil {
- if !visitor(envVar.ValueFrom.SecretKeyRef.Name) {
- return false
- }
- }
- }
- return true
-}
-
-// VisitPodConfigmapNames invokes the visitor function with the name of every configmap
-// referenced by the pod spec. If visitor returns false, visiting is short-circuited.
-// Transitive references (e.g. pod -> pvc -> pv -> secret) are not visited.
-// Returns true if visiting completed, false if visiting was short-circuited.
-func VisitPodConfigmapNames(pod *v1.Pod, visitor Visitor) bool {
- for i := range pod.Spec.InitContainers {
- if !visitContainerConfigmapNames(&pod.Spec.InitContainers[i], visitor) {
- return false
- }
- }
- for i := range pod.Spec.Containers {
- if !visitContainerConfigmapNames(&pod.Spec.Containers[i], visitor) {
- return false
- }
- }
- var source *v1.VolumeSource
- for i := range pod.Spec.Volumes {
- source = &pod.Spec.Volumes[i].VolumeSource
- switch {
- case source.Projected != nil:
- for j := range source.Projected.Sources {
- if source.Projected.Sources[j].ConfigMap != nil {
- if !visitor(source.Projected.Sources[j].ConfigMap.Name) {
- return false
- }
- }
- }
- case source.ConfigMap != nil:
- if !visitor(source.ConfigMap.Name) {
- return false
- }
- }
- }
- return true
-}
-
-func visitContainerConfigmapNames(container *v1.Container, visitor Visitor) bool {
- for _, env := range container.EnvFrom {
- if env.ConfigMapRef != nil {
- if !visitor(env.ConfigMapRef.Name) {
- return false
- }
- }
- }
- for _, envVar := range container.Env {
- if envVar.ValueFrom != nil && envVar.ValueFrom.ConfigMapKeyRef != nil {
- if !visitor(envVar.ValueFrom.ConfigMapKeyRef.Name) {
- return false
- }
- }
- }
- return true
-}
-
-// GetContainerStatus extracts the status of container "name" from "statuses".
-// It also returns if "name" exists.
-func GetContainerStatus(statuses []v1.ContainerStatus, name string) (v1.ContainerStatus, bool) {
- for i := range statuses {
- if statuses[i].Name == name {
- return statuses[i], true
- }
- }
- return v1.ContainerStatus{}, false
-}
-
-// GetExistingContainerStatus extracts the status of container "name" from "statuses",
-// and returns empty status if "name" does not exist.
-func GetExistingContainerStatus(statuses []v1.ContainerStatus, name string) v1.ContainerStatus {
- for i := range statuses {
- if statuses[i].Name == name {
- return statuses[i]
- }
- }
- return v1.ContainerStatus{}
-}
-
-// IsPodAvailable returns true if a pod is available; false otherwise.
-// Precondition for an available pod is that it must be ready. On top
-// of that, there are two cases when a pod can be considered available:
-// 1. minReadySeconds == 0, or
-// 2. LastTransitionTime (is set) + minReadySeconds < current time
-func IsPodAvailable(pod *v1.Pod, minReadySeconds int32, now metav1.Time) bool {
- if !IsPodReady(pod) {
- return false
- }
-
- c := GetPodReadyCondition(pod.Status)
- minReadySecondsDuration := time.Duration(minReadySeconds) * time.Second
- if minReadySeconds == 0 || !c.LastTransitionTime.IsZero() && c.LastTransitionTime.Add(minReadySecondsDuration).Before(now.Time) {
- return true
- }
- return false
-}
-
-// IsPodReady returns true if a pod is ready; false otherwise.
-func IsPodReady(pod *v1.Pod) bool {
- return IsPodReadyConditionTrue(pod.Status)
-}
-
-// IsPodReady returns true if a pod is ready; false otherwise.
-func IsPodReadyConditionTrue(status v1.PodStatus) bool {
- condition := GetPodReadyCondition(status)
- return condition != nil && condition.Status == v1.ConditionTrue
-}
-
-// Extracts the pod ready condition from the given status and returns that.
-// Returns nil if the condition is not present.
-func GetPodReadyCondition(status v1.PodStatus) *v1.PodCondition {
- _, condition := GetPodCondition(&status, v1.PodReady)
- return condition
-}
-
-// GetPodCondition extracts the provided condition from the given status and returns that.
-// Returns nil and -1 if the condition is not present, and the index of the located condition.
-func GetPodCondition(status *v1.PodStatus, conditionType v1.PodConditionType) (int, *v1.PodCondition) {
- if status == nil {
- return -1, nil
- }
- for i := range status.Conditions {
- if status.Conditions[i].Type == conditionType {
- return i, &status.Conditions[i]
- }
- }
- return -1, nil
-}
-
-// Updates existing pod condition or creates a new one. Sets LastTransitionTime to now if the
-// status has changed.
-// Returns true if pod condition has changed or has been added.
-func UpdatePodCondition(status *v1.PodStatus, condition *v1.PodCondition) bool {
- condition.LastTransitionTime = metav1.Now()
- // Try to find this pod condition.
- conditionIndex, oldCondition := GetPodCondition(status, condition.Type)
-
- if oldCondition == nil {
- // We are adding new pod condition.
- status.Conditions = append(status.Conditions, *condition)
- return true
- } else {
- // We are updating an existing condition, so we need to check if it has changed.
- if condition.Status == oldCondition.Status {
- condition.LastTransitionTime = oldCondition.LastTransitionTime
- }
-
- isEqual := condition.Status == oldCondition.Status &&
- condition.Reason == oldCondition.Reason &&
- condition.Message == oldCondition.Message &&
- condition.LastProbeTime.Equal(&oldCondition.LastProbeTime) &&
- condition.LastTransitionTime.Equal(&oldCondition.LastTransitionTime)
-
- status.Conditions[conditionIndex] = *condition
- // Return true if one of the fields have changed.
- return !isEqual
- }
-}