/* Copyright 2017 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package upgrade import ( "fmt" "time" "github.com/pkg/errors" apps "k8s.io/api/apps/v1" v1 "k8s.io/api/core/v1" apierrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" clientset "k8s.io/client-go/kubernetes" kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm" "k8s.io/kubernetes/cmd/kubeadm/app/constants" "k8s.io/kubernetes/cmd/kubeadm/app/images" "k8s.io/kubernetes/cmd/kubeadm/app/util/apiclient" utilpointer "k8s.io/utils/pointer" ) const ( prepullPrefix = "upgrade-prepull-" ) // Prepuller defines an interface for performing a prepull operation in a create-wait-delete fashion in parallel type Prepuller interface { CreateFunc(string) error WaitFunc(string) DeleteFunc(string) error } // DaemonSetPrepuller makes sure the control-plane images are available on all control-planes type DaemonSetPrepuller struct { client clientset.Interface cfg *kubeadmapi.ClusterConfiguration waiter apiclient.Waiter } // NewDaemonSetPrepuller creates a new instance of the DaemonSetPrepuller struct func NewDaemonSetPrepuller(client clientset.Interface, waiter apiclient.Waiter, cfg *kubeadmapi.ClusterConfiguration) *DaemonSetPrepuller { return &DaemonSetPrepuller{ client: client, cfg: cfg, waiter: waiter, } } // CreateFunc creates a DaemonSet for making the image available on every relevant node func (d *DaemonSetPrepuller) CreateFunc(component string) error { var image string if component == constants.Etcd { image = images.GetEtcdImage(d.cfg) } else { image = images.GetKubernetesImage(component, d.cfg) } ds := buildPrePullDaemonSet(component, image) // Create the DaemonSet in the API Server if err := apiclient.CreateOrUpdateDaemonSet(d.client, ds); err != nil { return errors.Wrapf(err, "unable to create a DaemonSet for prepulling the component %q", component) } return nil } // WaitFunc waits for all Pods in the specified DaemonSet to be in the Running state func (d *DaemonSetPrepuller) WaitFunc(component string) { fmt.Printf("[upgrade/prepull] Prepulling image for component %s.\n", component) d.waiter.WaitForPodsWithLabel("k8s-app=upgrade-prepull-" + component) } // DeleteFunc deletes the DaemonSet used for making the image available on every relevant node func (d *DaemonSetPrepuller) DeleteFunc(component string) error { dsName := addPrepullPrefix(component) // TODO: The IsNotFound() check is required in cases where the DaemonSet is missing. // Investigate why this happens: https://github.com/kubernetes/kubeadm/issues/1700 if err := apiclient.DeleteDaemonSetForeground(d.client, metav1.NamespaceSystem, dsName); err != nil && !apierrors.IsNotFound(err) { return errors.Wrapf(err, "unable to cleanup the DaemonSet used for prepulling %s", component) } fmt.Printf("[upgrade/prepull] Prepulled image for component %s.\n", component) return nil } // PrepullImagesInParallel creates DaemonSets synchronously but waits in parallel for the images to pull func PrepullImagesInParallel(kubePrepuller Prepuller, timeout time.Duration, componentsToPrepull []string) error { fmt.Printf("[upgrade/prepull] Will prepull images for components %v\n", componentsToPrepull) timeoutChan := time.After(timeout) // Synchronously create the DaemonSets for _, component := range componentsToPrepull { if err := kubePrepuller.CreateFunc(component); err != nil { return err } } // Create a channel for streaming data from goroutines that run in parallel to a blocking for loop that cleans up prePulledChan := make(chan string, len(componentsToPrepull)) for _, component := range componentsToPrepull { go func(c string) { // Wait as long as needed. This WaitFunc call should be blocking until completion kubePrepuller.WaitFunc(c) // When the task is done, go ahead and cleanup by sending the name to the channel prePulledChan <- c }(component) } // This call blocks until all expected messages are received from the channel or errors out if timeoutChan fires. // For every successful wait, kubePrepuller.DeleteFunc is executed if err := waitForItemsFromChan(timeoutChan, prePulledChan, len(componentsToPrepull), kubePrepuller.DeleteFunc); err != nil { return err } fmt.Println("[upgrade/prepull] Successfully prepulled the images for all the control plane components") return nil } // waitForItemsFromChan waits for n elements from stringChan with a timeout. For every item received from stringChan, cleanupFunc is executed func waitForItemsFromChan(timeoutChan <-chan time.Time, stringChan chan string, n int, cleanupFunc func(string) error) error { i := 0 for { select { case <-timeoutChan: return errors.New("the prepull operation timed out") case result := <-stringChan: i++ // If the cleanup function errors; error here as well if err := cleanupFunc(result); err != nil { return err } if i == n { return nil } } } } // addPrepullPrefix adds the prepull prefix for this functionality; can be used in names, labels, etc. func addPrepullPrefix(component string) string { return fmt.Sprintf("%s%s", prepullPrefix, component) } // buildPrePullDaemonSet builds the DaemonSet that ensures the control plane image is available func buildPrePullDaemonSet(component, image string) *apps.DaemonSet { var gracePeriodSecs int64 return &apps.DaemonSet{ ObjectMeta: metav1.ObjectMeta{ Name: addPrepullPrefix(component), Namespace: metav1.NamespaceSystem, }, Spec: apps.DaemonSetSpec{ Selector: &metav1.LabelSelector{ MatchLabels: map[string]string{ "k8s-app": addPrepullPrefix(component), }, }, Template: v1.PodTemplateSpec{ ObjectMeta: metav1.ObjectMeta{ Labels: map[string]string{ "k8s-app": addPrepullPrefix(component), }, }, Spec: v1.PodSpec{ Containers: []v1.Container{ { Name: component, Image: image, Command: []string{"/bin/sleep", "3600"}, }, }, NodeSelector: map[string]string{ constants.LabelNodeRoleMaster: "", }, Tolerations: []v1.Toleration{constants.ControlPlaneToleration}, TerminationGracePeriodSeconds: &gracePeriodSecs, // Explicitly add a PodSecurityContext to allow these Pods to run as non-root. // This prevents restrictive PSPs from blocking the Pod creation. SecurityContext: &v1.PodSecurityContext{ RunAsUser: utilpointer.Int64Ptr(999), }, }, }, }, } }