123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168 |
- /*
- Copyright 2016 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package images
- import (
- "fmt"
- dockerref "github.com/docker/distribution/reference"
- v1 "k8s.io/api/core/v1"
- "k8s.io/client-go/tools/record"
- "k8s.io/client-go/util/flowcontrol"
- "k8s.io/klog"
- runtimeapi "k8s.io/cri-api/pkg/apis/runtime/v1alpha2"
- kubecontainer "k8s.io/kubernetes/pkg/kubelet/container"
- "k8s.io/kubernetes/pkg/kubelet/events"
- "k8s.io/kubernetes/pkg/util/parsers"
- )
- // imageManager provides the functionalities for image pulling.
- type imageManager struct {
- recorder record.EventRecorder
- imageService kubecontainer.ImageService
- backOff *flowcontrol.Backoff
- // It will check the presence of the image, and report the 'image pulling', image pulled' events correspondingly.
- puller imagePuller
- }
- var _ ImageManager = &imageManager{}
- // NewImageManager instantiates a new ImageManager object.
- func NewImageManager(recorder record.EventRecorder, imageService kubecontainer.ImageService, imageBackOff *flowcontrol.Backoff, serialized bool, qps float32, burst int) ImageManager {
- imageService = throttleImagePulling(imageService, qps, burst)
- var puller imagePuller
- if serialized {
- puller = newSerialImagePuller(imageService)
- } else {
- puller = newParallelImagePuller(imageService)
- }
- return &imageManager{
- recorder: recorder,
- imageService: imageService,
- backOff: imageBackOff,
- puller: puller,
- }
- }
- // shouldPullImage returns whether we should pull an image according to
- // the presence and pull policy of the image.
- func shouldPullImage(container *v1.Container, imagePresent bool) bool {
- if container.ImagePullPolicy == v1.PullNever {
- return false
- }
- if container.ImagePullPolicy == v1.PullAlways ||
- (container.ImagePullPolicy == v1.PullIfNotPresent && (!imagePresent)) {
- return true
- }
- return false
- }
- // records an event using ref, event msg. log to glog using prefix, msg, logFn
- func (m *imageManager) logIt(ref *v1.ObjectReference, eventtype, event, prefix, msg string, logFn func(args ...interface{})) {
- if ref != nil {
- m.recorder.Event(ref, eventtype, event, msg)
- } else {
- logFn(fmt.Sprint(prefix, " ", msg))
- }
- }
- // EnsureImageExists pulls the image for the specified pod and container, and returns
- // (imageRef, error message, error).
- func (m *imageManager) EnsureImageExists(pod *v1.Pod, container *v1.Container, pullSecrets []v1.Secret, podSandboxConfig *runtimeapi.PodSandboxConfig) (string, string, error) {
- logPrefix := fmt.Sprintf("%s/%s", pod.Name, container.Image)
- ref, err := kubecontainer.GenerateContainerRef(pod, container)
- if err != nil {
- klog.Errorf("Couldn't make a ref to pod %v, container %v: '%v'", pod.Name, container.Name, err)
- }
- // If the image contains no tag or digest, a default tag should be applied.
- image, err := applyDefaultImageTag(container.Image)
- if err != nil {
- msg := fmt.Sprintf("Failed to apply default image tag %q: %v", container.Image, err)
- m.logIt(ref, v1.EventTypeWarning, events.FailedToInspectImage, logPrefix, msg, klog.Warning)
- return "", msg, ErrInvalidImageName
- }
- spec := kubecontainer.ImageSpec{Image: image}
- imageRef, err := m.imageService.GetImageRef(spec)
- if err != nil {
- msg := fmt.Sprintf("Failed to inspect image %q: %v", container.Image, err)
- m.logIt(ref, v1.EventTypeWarning, events.FailedToInspectImage, logPrefix, msg, klog.Warning)
- return "", msg, ErrImageInspect
- }
- present := imageRef != ""
- if !shouldPullImage(container, present) {
- if present {
- msg := fmt.Sprintf("Container image %q already present on machine", container.Image)
- m.logIt(ref, v1.EventTypeNormal, events.PulledImage, logPrefix, msg, klog.Info)
- return imageRef, "", nil
- }
- msg := fmt.Sprintf("Container image %q is not present with pull policy of Never", container.Image)
- m.logIt(ref, v1.EventTypeWarning, events.ErrImageNeverPullPolicy, logPrefix, msg, klog.Warning)
- return "", msg, ErrImageNeverPull
- }
- backOffKey := fmt.Sprintf("%s_%s", pod.UID, container.Image)
- if m.backOff.IsInBackOffSinceUpdate(backOffKey, m.backOff.Clock.Now()) {
- msg := fmt.Sprintf("Back-off pulling image %q", container.Image)
- m.logIt(ref, v1.EventTypeNormal, events.BackOffPullImage, logPrefix, msg, klog.Info)
- return "", msg, ErrImagePullBackOff
- }
- m.logIt(ref, v1.EventTypeNormal, events.PullingImage, logPrefix, fmt.Sprintf("Pulling image %q", container.Image), klog.Info)
- pullChan := make(chan pullResult)
- m.puller.pullImage(spec, pullSecrets, pullChan, podSandboxConfig)
- imagePullResult := <-pullChan
- if imagePullResult.err != nil {
- m.logIt(ref, v1.EventTypeWarning, events.FailedToPullImage, logPrefix, fmt.Sprintf("Failed to pull image %q: %v", container.Image, imagePullResult.err), klog.Warning)
- m.backOff.Next(backOffKey, m.backOff.Clock.Now())
- if imagePullResult.err == ErrRegistryUnavailable {
- msg := fmt.Sprintf("image pull failed for %s because the registry is unavailable.", container.Image)
- return "", msg, imagePullResult.err
- }
- return "", imagePullResult.err.Error(), ErrImagePull
- }
- m.logIt(ref, v1.EventTypeNormal, events.PulledImage, logPrefix, fmt.Sprintf("Successfully pulled image %q", container.Image), klog.Info)
- m.backOff.GC()
- return imagePullResult.imageRef, "", nil
- }
- // applyDefaultImageTag parses a docker image string, if it doesn't contain any tag or digest,
- // a default tag will be applied.
- func applyDefaultImageTag(image string) (string, error) {
- named, err := dockerref.ParseNormalizedNamed(image)
- if err != nil {
- return "", fmt.Errorf("couldn't parse image reference %q: %v", image, err)
- }
- _, isTagged := named.(dockerref.Tagged)
- _, isDigested := named.(dockerref.Digested)
- if !isTagged && !isDigested {
- // we just concatenate the image name with the default tag here instead
- // of using dockerref.WithTag(named, ...) because that would cause the
- // image to be fully qualified as docker.io/$name if it's a short name
- // (e.g. just busybox). We don't want that to happen to keep the CRI
- // agnostic wrt image names and default hostnames.
- image = image + ":" + parsers.DefaultImageTag
- }
- return image, nil
- }
|