mirror of
https://github.com/kubenetworks/kubevpn.git
synced 2025-10-24 07:43:17 +08:00
refactor: upgrade deploy image if client version is incompatibility with image tag (#470)
This commit is contained in:
@@ -4,6 +4,7 @@ import (
|
|||||||
"context"
|
"context"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
"net"
|
"net"
|
||||||
"net/url"
|
"net/url"
|
||||||
"reflect"
|
"reflect"
|
||||||
@@ -15,8 +16,6 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/containernetworking/cni/pkg/types"
|
"github.com/containernetworking/cni/pkg/types"
|
||||||
"github.com/distribution/reference"
|
|
||||||
goversion "github.com/hashicorp/go-version"
|
|
||||||
"github.com/libp2p/go-netroute"
|
"github.com/libp2p/go-netroute"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
log "github.com/sirupsen/logrus"
|
log "github.com/sirupsen/logrus"
|
||||||
@@ -29,6 +28,7 @@ import (
|
|||||||
"k8s.io/apimachinery/pkg/fields"
|
"k8s.io/apimachinery/pkg/fields"
|
||||||
"k8s.io/apimachinery/pkg/labels"
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
pkgruntime "k8s.io/apimachinery/pkg/runtime"
|
pkgruntime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
pkgtypes "k8s.io/apimachinery/pkg/types"
|
pkgtypes "k8s.io/apimachinery/pkg/types"
|
||||||
utilnet "k8s.io/apimachinery/pkg/util/net"
|
utilnet "k8s.io/apimachinery/pkg/util/net"
|
||||||
"k8s.io/apimachinery/pkg/util/runtime"
|
"k8s.io/apimachinery/pkg/util/runtime"
|
||||||
@@ -41,6 +41,7 @@ import (
|
|||||||
"k8s.io/kubectl/pkg/cmd/set"
|
"k8s.io/kubectl/pkg/cmd/set"
|
||||||
cmdutil "k8s.io/kubectl/pkg/cmd/util"
|
cmdutil "k8s.io/kubectl/pkg/cmd/util"
|
||||||
"k8s.io/kubectl/pkg/polymorphichelpers"
|
"k8s.io/kubectl/pkg/polymorphichelpers"
|
||||||
|
"k8s.io/kubectl/pkg/scale"
|
||||||
"k8s.io/kubectl/pkg/scheme"
|
"k8s.io/kubectl/pkg/scheme"
|
||||||
"k8s.io/kubectl/pkg/util/podutils"
|
"k8s.io/kubectl/pkg/util/podutils"
|
||||||
"k8s.io/utils/pointer"
|
"k8s.io/utils/pointer"
|
||||||
@@ -918,29 +919,45 @@ func (c *ConnectOptions) upgradeDeploy(ctx context.Context) error {
|
|||||||
return fmt.Errorf("can not found any container in deploy %s", deploy.Name)
|
return fmt.Errorf("can not found any container in deploy %s", deploy.Name)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
clientVer := config.Version
|
||||||
clientImg := config.Image
|
clientImg := config.Image
|
||||||
serverImg := deploy.Spec.Template.Spec.Containers[0].Image
|
serverImg := deploy.Spec.Template.Spec.Containers[0].Image
|
||||||
|
|
||||||
if clientImg == serverImg {
|
isNeedUpgrade, err := util.IsNewer(clientVer, clientImg, serverImg)
|
||||||
|
if !isNeedUpgrade {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
if err != nil {
|
||||||
isNeedUpgrade, _ := newer(config.Version, clientImg, serverImg)
|
return err
|
||||||
if deploy.Status.ReadyReplicas > 0 && !isNeedUpgrade {
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Infof("Set image %s --> %s...", serverImg, clientImg)
|
log.Infof("Set image %s --> %s...", serverImg, clientImg)
|
||||||
|
|
||||||
r := c.factory.NewBuilder().
|
err = upgradeDeploySpec(ctx, c.factory, c.Namespace, deploy.Name, clientImg)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
// because use webhook(kubevpn-traffic-manager container webhook) to assign ip,
|
||||||
|
// if create new pod use old webhook, ip will still change to old CIDR.
|
||||||
|
// so after patched, check again if env is newer or not,
|
||||||
|
// if env is still old, needs to re-patch using new webhook
|
||||||
|
err = restartDeploy(ctx, c.factory, c.clientset, c.Namespace, deploy.Name)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func upgradeDeploySpec(ctx context.Context, f cmdutil.Factory, ns, name string, targetImage string) error {
|
||||||
|
r := f.NewBuilder().
|
||||||
WithScheme(scheme.Scheme, scheme.Scheme.PrioritizedVersionsAllGroups()...).
|
WithScheme(scheme.Scheme, scheme.Scheme.PrioritizedVersionsAllGroups()...).
|
||||||
NamespaceParam(c.Namespace).DefaultNamespace().
|
NamespaceParam(ns).DefaultNamespace().
|
||||||
ResourceNames("deployments", deploy.Name).
|
ResourceNames("deployments", name).
|
||||||
ContinueOnError().
|
ContinueOnError().
|
||||||
Latest().
|
Latest().
|
||||||
Flatten().
|
Flatten().
|
||||||
Do()
|
Do()
|
||||||
if err = r.Err(); err != nil {
|
if err := r.Err(); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
infos, err := r.Infos()
|
infos, err := r.Infos()
|
||||||
@@ -966,7 +983,7 @@ func (c *ConnectOptions) upgradeDeploy(ctx context.Context) error {
|
|||||||
patches := set.CalculatePatches(infos, scheme.DefaultJSONEncoder(), func(obj pkgruntime.Object) ([]byte, error) {
|
patches := set.CalculatePatches(infos, scheme.DefaultJSONEncoder(), func(obj pkgruntime.Object) ([]byte, error) {
|
||||||
_, err = polymorphichelpers.UpdatePodSpecForObjectFn(obj, func(spec *v1.PodSpec) error {
|
_, err = polymorphichelpers.UpdatePodSpecForObjectFn(obj, func(spec *v1.PodSpec) error {
|
||||||
for i := range spec.Containers {
|
for i := range spec.Containers {
|
||||||
spec.Containers[i].Image = clientImg
|
spec.Containers[i].Image = targetImage
|
||||||
|
|
||||||
// update tun cidr for vpn
|
// update tun cidr for vpn
|
||||||
if spec.Containers[i].Name == config.ContainerSidecarVPN {
|
if spec.Containers[i].Name == config.ContainerSidecarVPN {
|
||||||
@@ -1027,7 +1044,7 @@ func (c *ConnectOptions) upgradeDeploy(ctx context.Context) error {
|
|||||||
log.Errorf("Failed to patch image update to pod template: %v", err)
|
log.Errorf("Failed to patch image update to pod template: %v", err)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
err = util.RolloutStatus(ctx, c.factory, c.Namespace, fmt.Sprintf("%s/%s", p.Info.Mapping.Resource.GroupResource().String(), p.Info.Name), time.Minute*60)
|
err = util.RolloutStatus(ctx, f, ns, fmt.Sprintf("%s/%s", p.Info.Mapping.Resource.GroupResource().String(), p.Info.Name), time.Minute*60)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
@@ -1035,64 +1052,57 @@ func (c *ConnectOptions) upgradeDeploy(ctx context.Context) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func newer(clientCliVersionStr, clientImgStr, serverImgStr string) (bool, error) {
|
func restartDeploy(ctx context.Context, f cmdutil.Factory, clientset *kubernetes.Clientset, ns, name string) error {
|
||||||
clientImg, err := reference.ParseNormalizedNamed(clientImgStr)
|
label := fields.OneTermEqualSelector("app", config.ConfigMapPodTrafficManager).String()
|
||||||
|
list, err := util.GetRunningPodList(ctx, clientset, ns, label)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, err
|
return err
|
||||||
}
|
}
|
||||||
serverImg, err := reference.ParseNormalizedNamed(serverImgStr)
|
pod := list[0]
|
||||||
|
container, _ := util.FindContainerByName(&pod, config.ContainerSidecarVPN)
|
||||||
|
if container == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
envs := map[string]string{
|
||||||
|
"CIDR4": config.CIDR.String(),
|
||||||
|
"CIDR6": config.CIDR6.String(),
|
||||||
|
config.EnvInboundPodTunIPv4: (&net.IPNet{IP: config.RouterIP, Mask: config.CIDR.Mask}).String(),
|
||||||
|
config.EnvInboundPodTunIPv6: (&net.IPNet{IP: config.RouterIP6, Mask: config.CIDR6.Mask}).String(),
|
||||||
|
}
|
||||||
|
|
||||||
|
var mismatch bool
|
||||||
|
for _, existing := range container.Env {
|
||||||
|
if envs[existing.Name] != existing.Value {
|
||||||
|
mismatch = true
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if !mismatch {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
scalesGetter, err := cmdutil.ScaleClientFn(f)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, err
|
return err
|
||||||
}
|
}
|
||||||
clientImgTag, ok := clientImg.(reference.NamedTagged)
|
scaler := scale.NewScaler(scalesGetter)
|
||||||
if !ok {
|
retry := scale.NewRetryParams(1*time.Second, 5*time.Minute)
|
||||||
return false, fmt.Errorf("can not convert client image")
|
waitForReplicas := scale.NewRetryParams(1*time.Second, 1)
|
||||||
|
gvr := schema.GroupVersionResource{
|
||||||
|
Group: "apps",
|
||||||
|
Version: "v1",
|
||||||
|
Resource: "deployments",
|
||||||
}
|
}
|
||||||
|
err = scaler.Scale(ns, name, 0, nil, retry, waitForReplicas, gvr, false)
|
||||||
// 1. if client image version is same as client cli version, does not need to upgrade
|
|
||||||
// kubevpn connect --image=ghcr.io/kubenetworks/kubevpn:v2.3.0 or --kubevpnconfig
|
|
||||||
// the kubevpn version is v2.3.1
|
|
||||||
if clientImgTag.Tag() != clientCliVersionStr {
|
|
||||||
// TODO: is it necessary to exit the process?
|
|
||||||
log.Warnf("\033[33mCurrent kubevpn cli version is %s, please use the same version of kubevpn image with flag \"--image\"\033[0m", clientCliVersionStr)
|
|
||||||
return false, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
serverImgTag, ok := serverImg.(reference.NamedTagged)
|
|
||||||
if !ok {
|
|
||||||
return false, fmt.Errorf("can not convert server image")
|
|
||||||
}
|
|
||||||
|
|
||||||
// 2. if server image version is same as client cli version, does not need to upgrade
|
|
||||||
if serverImgTag.Tag() == clientCliVersionStr {
|
|
||||||
return false, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// 3. check custom server image registry
|
|
||||||
// if custom server image domain is not same as config.GHCR_IMAGE_REGISTRY
|
|
||||||
// and not same as config.DOCKER_IMAGE_REGISTRY
|
|
||||||
// and not same as client images(may be used --image)
|
|
||||||
// does not need to upgrade
|
|
||||||
serverImgDomain := reference.Domain(serverImg)
|
|
||||||
clientImgDomain := reference.Domain(clientImg)
|
|
||||||
if serverImgDomain != config.GHCR_IMAGE_REGISTRY && serverImgDomain != config.DOCKER_IMAGE_REGISTRY && serverImgDomain != clientImgDomain {
|
|
||||||
newImageStr := fmt.Sprintf("%s:%s", serverImg.Name(), clientCliVersionStr)
|
|
||||||
log.Warnf("\033[33mCurrent kubevpn cli version is %s, please manually upgrade 'kubevpn-traffic-manager' control plane pod container image to %s\033[0m", clientCliVersionStr, newImageStr)
|
|
||||||
return false, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
serverImgVersion, err := goversion.NewVersion(serverImgTag.Tag())
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, err
|
return err
|
||||||
}
|
}
|
||||||
|
err = scaler.Scale(ns, name, 1, nil, retry, waitForReplicas, gvr, false)
|
||||||
clientImgVersion, err := goversion.NewVersion(clientImgTag.Tag())
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, err
|
return err
|
||||||
}
|
}
|
||||||
|
err = util.RolloutStatus(ctx, f, ns, fmt.Sprintf("%s/%s", "deployments", name), time.Minute*60)
|
||||||
// 4. check client image version is greater than server image version
|
return err
|
||||||
return clientImgVersion.GreaterThan(serverImgVersion), nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *ConnectOptions) Equal(a *ConnectOptions) bool {
|
func (c *ConnectOptions) Equal(a *ConnectOptions) bool {
|
||||||
|
|||||||
@@ -149,178 +149,3 @@ func TestRemoveCIDRsContainingIPs(t *testing.T) {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func Test_newer(t *testing.T) {
|
|
||||||
type args struct {
|
|
||||||
clientVersionStr string
|
|
||||||
clientImgStr string
|
|
||||||
serverImgStr string
|
|
||||||
}
|
|
||||||
tests := []struct {
|
|
||||||
name string
|
|
||||||
args args
|
|
||||||
want bool
|
|
||||||
wantErr bool
|
|
||||||
}{
|
|
||||||
// client version: v1.2.1
|
|
||||||
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
|
||||||
// server image: naison/kubevpn:v1.0.0
|
|
||||||
{
|
|
||||||
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) newer than server(naison/kubevpn:v1.0.0)",
|
|
||||||
args: args{
|
|
||||||
clientVersionStr: "v1.2.1",
|
|
||||||
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
|
||||||
serverImgStr: "naison/kubevpn:v1.0.0",
|
|
||||||
},
|
|
||||||
want: true,
|
|
||||||
wantErr: false,
|
|
||||||
},
|
|
||||||
// client version: v1.2.1
|
|
||||||
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
|
||||||
// server image: docker.io/naison/kubevpn:v1.0.0
|
|
||||||
{
|
|
||||||
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) newer than server(docker.io/naison/kubevpn:v1.0.0)",
|
|
||||||
args: args{
|
|
||||||
clientVersionStr: "v1.2.1",
|
|
||||||
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
|
||||||
serverImgStr: "docker.io/naison/kubevpn:v1.0.0",
|
|
||||||
},
|
|
||||||
want: true,
|
|
||||||
wantErr: false,
|
|
||||||
},
|
|
||||||
// client version: v1.2.1
|
|
||||||
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
|
||||||
// server image: naison/kubevpn:v1.2.1
|
|
||||||
{
|
|
||||||
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) same as server(naison/kubevpn:v1.2.1)",
|
|
||||||
args: args{
|
|
||||||
clientVersionStr: "v1.2.1",
|
|
||||||
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
|
||||||
serverImgStr: "naison/kubevpn:v1.2.1",
|
|
||||||
},
|
|
||||||
want: false,
|
|
||||||
wantErr: false,
|
|
||||||
},
|
|
||||||
// client version: v1.2.1
|
|
||||||
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
|
||||||
// server image: docker.io/naison/kubevpn:v1.2.1
|
|
||||||
{
|
|
||||||
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) same as server(docker.io/naison/kubevpn:v1.2.1)",
|
|
||||||
args: args{
|
|
||||||
clientVersionStr: "v1.2.1",
|
|
||||||
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
|
||||||
serverImgStr: "docker.io/naison/kubevpn:v1.2.1",
|
|
||||||
},
|
|
||||||
want: false,
|
|
||||||
wantErr: false,
|
|
||||||
},
|
|
||||||
// client version: v1.2.1
|
|
||||||
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
|
||||||
// server image: docker.io/naison/kubevpn:v1.3.1
|
|
||||||
{
|
|
||||||
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) older as server(docker.io/naison/kubevpn:v1.3.1)",
|
|
||||||
args: args{
|
|
||||||
clientVersionStr: "v1.2.1",
|
|
||||||
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
|
||||||
serverImgStr: "docker.io/naison/kubevpn:v1.3.1",
|
|
||||||
},
|
|
||||||
want: false,
|
|
||||||
wantErr: false,
|
|
||||||
},
|
|
||||||
// client version: v1.3.1
|
|
||||||
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1 (not same as client version, --image=xxx)
|
|
||||||
// server image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
|
||||||
{
|
|
||||||
name: "Valid case - client cli version(v1.3.1) not same as client image(ghcr.io/kubenetworks/kubevpn:v1.2.1)",
|
|
||||||
args: args{
|
|
||||||
clientVersionStr: "v1.3.1",
|
|
||||||
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
|
||||||
serverImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
|
||||||
},
|
|
||||||
want: false,
|
|
||||||
wantErr: false,
|
|
||||||
},
|
|
||||||
// client version: v1.2.1
|
|
||||||
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
|
||||||
// server image: ghcr.io/kubenetworks/kubevpn:v1.0.1
|
|
||||||
{
|
|
||||||
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) newer than server(ghcr.io/kubenetworks/kubevpn:v1.0.1)",
|
|
||||||
args: args{
|
|
||||||
clientVersionStr: "v1.2.1",
|
|
||||||
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
|
||||||
serverImgStr: "ghcr.io/kubenetworks/kubevpn:v1.0.1",
|
|
||||||
},
|
|
||||||
want: true,
|
|
||||||
wantErr: false,
|
|
||||||
},
|
|
||||||
// client version: v1.2.1
|
|
||||||
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
|
||||||
// server image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
|
||||||
{
|
|
||||||
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) same as server(ghcr.io/kubenetworks/kubevpn:v1.2.1)",
|
|
||||||
args: args{
|
|
||||||
clientVersionStr: "v1.2.1",
|
|
||||||
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
|
||||||
serverImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
|
||||||
},
|
|
||||||
want: false,
|
|
||||||
wantErr: false,
|
|
||||||
},
|
|
||||||
// client version: v1.2.1
|
|
||||||
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
|
||||||
// server image: ghcr.io/kubenetworks/kubevpn:v1.3.1
|
|
||||||
{
|
|
||||||
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) older as server(ghcr.io/kubenetworks/kubevpn:v1.3.1)",
|
|
||||||
args: args{
|
|
||||||
clientVersionStr: "v1.2.1",
|
|
||||||
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
|
||||||
serverImgStr: "ghcr.io/kubenetworks/kubevpn:v1.3.1",
|
|
||||||
},
|
|
||||||
want: false,
|
|
||||||
wantErr: false,
|
|
||||||
},
|
|
||||||
|
|
||||||
// custom server image registry, but client image is not same as client version, does not upgrade
|
|
||||||
// client version: v1.2.1
|
|
||||||
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
|
||||||
// server image: mykubevpn.io/kubenetworks/kubevpn:v1.1.1
|
|
||||||
{
|
|
||||||
name: "custom server image registry, but client image is not same as client version, does not upgrade",
|
|
||||||
args: args{
|
|
||||||
clientVersionStr: "v1.2.1",
|
|
||||||
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
|
||||||
serverImgStr: "mykubevpn.io/kubenetworks/kubevpn:v1.1.1",
|
|
||||||
},
|
|
||||||
want: false,
|
|
||||||
wantErr: false,
|
|
||||||
},
|
|
||||||
|
|
||||||
// custom server image registry, client image is same as client version, upgrade
|
|
||||||
// client version: v1.2.1
|
|
||||||
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
|
||||||
// server image: mykubevpn.io/kubenetworks/kubevpn:v1.1.1
|
|
||||||
{
|
|
||||||
name: "custom server image registry, client image is same as client version, upgrade",
|
|
||||||
args: args{
|
|
||||||
clientVersionStr: "v1.2.1",
|
|
||||||
clientImgStr: "mykubevpn.io/kubenetworks/kubevpn:v1.2.1",
|
|
||||||
serverImgStr: "mykubevpn.io/kubenetworks/kubevpn:v1.1.1",
|
|
||||||
},
|
|
||||||
want: true,
|
|
||||||
wantErr: false,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, tt := range tests {
|
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
|
||||||
got, err := newer(tt.args.clientVersionStr, tt.args.clientImgStr, tt.args.serverImgStr)
|
|
||||||
if (err != nil) != tt.wantErr {
|
|
||||||
t.Errorf("newer() error = %v, wantErr %v", err, tt.wantErr)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if got != tt.want {
|
|
||||||
t.Errorf("newer() got = %v, want %v", got, tt.want)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -8,7 +8,6 @@ import (
|
|||||||
"os/exec"
|
"os/exec"
|
||||||
"reflect"
|
"reflect"
|
||||||
"runtime"
|
"runtime"
|
||||||
"strings"
|
|
||||||
"sync"
|
"sync"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
@@ -324,11 +323,7 @@ func server(port int) {
|
|||||||
func kubevpnConnect(t *testing.T) {
|
func kubevpnConnect(t *testing.T) {
|
||||||
cmd := exec.Command("kubevpn", "proxy", "--debug", "deployments/reviews")
|
cmd := exec.Command("kubevpn", "proxy", "--debug", "deployments/reviews")
|
||||||
check := func(log string) bool {
|
check := func(log string) bool {
|
||||||
line := "+" + strings.Repeat("-", len(log)-2) + "+"
|
t.Log(util.PrintStr(log))
|
||||||
t.Log(line)
|
|
||||||
t.Log(log)
|
|
||||||
t.Log(line)
|
|
||||||
t.Log("\n")
|
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
stdout, stderr, err := util.RunWithRollingOutWithChecker(cmd, check)
|
stdout, stderr, err := util.RunWithRollingOutWithChecker(cmd, check)
|
||||||
|
|||||||
@@ -1,6 +1,7 @@
|
|||||||
package util
|
package util
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bufio"
|
||||||
"bytes"
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
"errors"
|
"errors"
|
||||||
@@ -295,21 +296,35 @@ func CleanExtensionLib() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func Print(writer io.Writer, slogan string) {
|
func Print(writer io.Writer, slogan string) {
|
||||||
length := len(slogan) + 1 + 1
|
str := PrintStr(slogan)
|
||||||
|
_, _ = writer.Write([]byte(str))
|
||||||
|
}
|
||||||
|
|
||||||
|
func PrintStr(slogan string) string {
|
||||||
|
scanner := bufio.NewScanner(strings.NewReader(slogan))
|
||||||
|
var length int
|
||||||
|
var lines []string
|
||||||
|
for scanner.Scan() {
|
||||||
|
line := scanner.Text()
|
||||||
|
length = max(length, len(line))
|
||||||
|
lines = append(lines, line)
|
||||||
|
}
|
||||||
|
length = length + 1 + 1
|
||||||
var sb strings.Builder
|
var sb strings.Builder
|
||||||
|
|
||||||
sb.WriteString("+" + strings.Repeat("-", length) + "+")
|
sb.WriteString("+" + strings.Repeat("-", length) + "+")
|
||||||
|
for _, line := range lines {
|
||||||
sb.WriteByte('\n')
|
sb.WriteByte('\n')
|
||||||
sb.WriteString("|")
|
sb.WriteString("|")
|
||||||
sb.WriteString(strings.Repeat(" ", 1))
|
sb.WriteString(strings.Repeat(" ", 1))
|
||||||
sb.WriteString(slogan)
|
sb.WriteString(line)
|
||||||
sb.WriteString(strings.Repeat(" ", 1))
|
sb.WriteString(strings.Repeat(" ", length-1-len(line)))
|
||||||
sb.WriteString("|")
|
sb.WriteString("|")
|
||||||
|
}
|
||||||
sb.WriteByte('\n')
|
sb.WriteByte('\n')
|
||||||
sb.WriteString("+" + strings.Repeat("-", length) + "+")
|
sb.WriteString("+" + strings.Repeat("-", length) + "+")
|
||||||
sb.WriteByte('\n')
|
|
||||||
|
|
||||||
_, _ = writer.Write([]byte(sb.String()))
|
return sb.String()
|
||||||
}
|
}
|
||||||
|
|
||||||
func StartupPProf(port int) {
|
func StartupPProf(port int) {
|
||||||
|
|||||||
@@ -130,3 +130,34 @@ func TestConvertUidToWorkload(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestPrintStr(t *testing.T) {
|
||||||
|
type args struct {
|
||||||
|
slogan string
|
||||||
|
}
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
args args
|
||||||
|
wantWriter string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "",
|
||||||
|
args: args{
|
||||||
|
slogan: "ab\nabc\n\na",
|
||||||
|
},
|
||||||
|
wantWriter: `+-----+
|
||||||
|
| ab |
|
||||||
|
| abc |
|
||||||
|
| |
|
||||||
|
| a |
|
||||||
|
+-----+`,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
if gotWriter := PrintStr(tt.args.slogan); gotWriter != tt.wantWriter {
|
||||||
|
t.Errorf("Print() = %v, want %v", gotWriter, tt.wantWriter)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|||||||
111
pkg/util/version.go
Normal file
111
pkg/util/version.go
Normal file
@@ -0,0 +1,111 @@
|
|||||||
|
package util
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/distribution/reference"
|
||||||
|
"github.com/hashicorp/go-version"
|
||||||
|
"github.com/pkg/errors"
|
||||||
|
)
|
||||||
|
|
||||||
|
// CmpClientVersionAndClientImage
|
||||||
|
/**
|
||||||
|
version: MAJOR.MINOR.PATCH
|
||||||
|
|
||||||
|
client version should match client image
|
||||||
|
MAJOR and MINOR different should be same, otherwise just exit let use to special matched image with options --image
|
||||||
|
*/
|
||||||
|
func CmpClientVersionAndClientImage(clientVersion, clientImgStr string) (bool, error) {
|
||||||
|
clientImg, err := reference.ParseNormalizedNamed(clientImgStr)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
clientImgTag, ok := clientImg.(reference.NamedTagged)
|
||||||
|
if !ok {
|
||||||
|
return false, fmt.Errorf("can not convert client image")
|
||||||
|
}
|
||||||
|
|
||||||
|
// 1. if client image version is match client cli version, does not need to upgrade
|
||||||
|
// kubevpn connect --image=ghcr.io/kubenetworks/kubevpn:v2.3.0 or --kubevpnconfig
|
||||||
|
// the kubevpn version is v2.3.1
|
||||||
|
if IsVersionMajorOrMinorDiff(clientVersion, clientImgTag.Tag()) {
|
||||||
|
// exit the process
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// CmpClientVersionAndPodImageTag version MAJOR.MINOR.PATCH
|
||||||
|
// if MAJOR or MINOR different, needs to upgrade
|
||||||
|
// otherwise not need upgrade
|
||||||
|
func CmpClientVersionAndPodImageTag(clientVersion string, serverImgStr string) bool {
|
||||||
|
serverImg, err := reference.ParseNormalizedNamed(serverImgStr)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
serverImgTag, ok := serverImg.(reference.NamedTagged)
|
||||||
|
if !ok {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
return IsVersionMajorOrMinorDiff(clientVersion, serverImgTag.Tag())
|
||||||
|
}
|
||||||
|
|
||||||
|
func IsVersionMajorOrMinorDiff(v1 string, v2 string) bool {
|
||||||
|
version1, err := version.NewVersion(v1)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
version2, err := version.NewVersion(v2)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if len(version1.Segments64()) != 3 {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if len(version2.Segments64()) != 3 {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if version1.Segments64()[0] != version2.Segments64()[0] {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
if version1.Segments64()[1] != version2.Segments64()[1] {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
func GetTargetImage(version string, image string) string {
|
||||||
|
serverImg, err := reference.ParseNormalizedNamed(image)
|
||||||
|
if err != nil {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
serverImgTag, ok := serverImg.(reference.NamedTagged)
|
||||||
|
if !ok {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
tag, err := reference.WithTag(serverImgTag, version)
|
||||||
|
if err != nil {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
return tag.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
// IsNewer
|
||||||
|
/**
|
||||||
|
version: MAJOR.MINOR.PATCH
|
||||||
|
|
||||||
|
MAJOR and MINOR different should be same, otherwise needs upgrade
|
||||||
|
*/
|
||||||
|
func IsNewer(clientVer string, clientImg string, serverImg string) (bool, error) {
|
||||||
|
isNeedUpgrade, _ := CmpClientVersionAndClientImage(clientVer, clientImg)
|
||||||
|
if isNeedUpgrade {
|
||||||
|
err := errors.New("\n" + PrintStr(fmt.Sprintf("Current kubevpn cli version is %s, image is: %s, please use the same version of kubevpn image with flag \"--image\"", clientVer, clientImg)))
|
||||||
|
return true, err
|
||||||
|
}
|
||||||
|
if CmpClientVersionAndPodImageTag(clientVer, serverImg) {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
250
pkg/util/version_test.go
Normal file
250
pkg/util/version_test.go
Normal file
@@ -0,0 +1,250 @@
|
|||||||
|
package util
|
||||||
|
|
||||||
|
import "testing"
|
||||||
|
|
||||||
|
func Test_newer(t *testing.T) {
|
||||||
|
type args struct {
|
||||||
|
clientVersionStr string
|
||||||
|
clientImgStr string
|
||||||
|
serverImgStr string
|
||||||
|
}
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
args args
|
||||||
|
want bool
|
||||||
|
wantErr bool
|
||||||
|
}{
|
||||||
|
// client version: v1.2.1
|
||||||
|
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
||||||
|
// server image: naison/kubevpn:v1.0.0
|
||||||
|
{
|
||||||
|
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) newer than server(naison/kubevpn:v1.0.0)",
|
||||||
|
args: args{
|
||||||
|
clientVersionStr: "v1.2.1",
|
||||||
|
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
||||||
|
serverImgStr: "naison/kubevpn:v1.0.0",
|
||||||
|
},
|
||||||
|
want: true,
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
// client version: v1.2.1
|
||||||
|
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
||||||
|
// server image: docker.io/naison/kubevpn:v1.0.0
|
||||||
|
{
|
||||||
|
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) newer than server(docker.io/naison/kubevpn:v1.0.0)",
|
||||||
|
args: args{
|
||||||
|
clientVersionStr: "v1.2.1",
|
||||||
|
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
||||||
|
serverImgStr: "docker.io/naison/kubevpn:v1.0.0",
|
||||||
|
},
|
||||||
|
want: true,
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
// client version: v1.2.1
|
||||||
|
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
||||||
|
// server image: naison/kubevpn:v1.2.1
|
||||||
|
{
|
||||||
|
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) same as server(naison/kubevpn:v1.2.1)",
|
||||||
|
args: args{
|
||||||
|
clientVersionStr: "v1.2.1",
|
||||||
|
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
||||||
|
serverImgStr: "naison/kubevpn:v1.2.1",
|
||||||
|
},
|
||||||
|
want: false,
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
// client version: v1.2.1
|
||||||
|
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
||||||
|
// server image: docker.io/naison/kubevpn:v1.2.1
|
||||||
|
{
|
||||||
|
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) same as server(docker.io/naison/kubevpn:v1.2.1)",
|
||||||
|
args: args{
|
||||||
|
clientVersionStr: "v1.2.1",
|
||||||
|
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
||||||
|
serverImgStr: "docker.io/naison/kubevpn:v1.2.1",
|
||||||
|
},
|
||||||
|
want: false,
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
// client version: v1.2.1
|
||||||
|
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
||||||
|
// server image: docker.io/naison/kubevpn:v1.3.1
|
||||||
|
{
|
||||||
|
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) older as server(docker.io/naison/kubevpn:v1.3.1)",
|
||||||
|
args: args{
|
||||||
|
clientVersionStr: "v1.2.1",
|
||||||
|
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
||||||
|
serverImgStr: "docker.io/naison/kubevpn:v1.3.1",
|
||||||
|
},
|
||||||
|
want: true,
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
// client version: v1.3.1
|
||||||
|
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1 (not same as client version, --image=xxx)
|
||||||
|
// server image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
||||||
|
{
|
||||||
|
name: "Valid case - client cli version(v1.3.1) not same as client image(ghcr.io/kubenetworks/kubevpn:v1.2.1)",
|
||||||
|
args: args{
|
||||||
|
clientVersionStr: "v1.3.1",
|
||||||
|
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
||||||
|
serverImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
||||||
|
},
|
||||||
|
want: true,
|
||||||
|
wantErr: true,
|
||||||
|
},
|
||||||
|
// client version: v1.2.1
|
||||||
|
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
||||||
|
// server image: ghcr.io/kubenetworks/kubevpn:v1.0.1
|
||||||
|
{
|
||||||
|
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) newer than server(ghcr.io/kubenetworks/kubevpn:v1.0.1)",
|
||||||
|
args: args{
|
||||||
|
clientVersionStr: "v1.2.1",
|
||||||
|
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
||||||
|
serverImgStr: "ghcr.io/kubenetworks/kubevpn:v1.0.1",
|
||||||
|
},
|
||||||
|
want: true,
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
// client version: v1.2.1
|
||||||
|
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
||||||
|
// server image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
||||||
|
{
|
||||||
|
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) same as server(ghcr.io/kubenetworks/kubevpn:v1.2.1)",
|
||||||
|
args: args{
|
||||||
|
clientVersionStr: "v1.2.1",
|
||||||
|
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
||||||
|
serverImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
||||||
|
},
|
||||||
|
want: false,
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
// client version: v1.2.1
|
||||||
|
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
||||||
|
// server image: ghcr.io/kubenetworks/kubevpn:v1.3.1
|
||||||
|
{
|
||||||
|
name: "Valid case - client(ghcr.io/kubenetworks/kubevpn:v1.2.1) older as server(ghcr.io/kubenetworks/kubevpn:v1.3.1)",
|
||||||
|
args: args{
|
||||||
|
clientVersionStr: "v1.2.1",
|
||||||
|
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
||||||
|
serverImgStr: "ghcr.io/kubenetworks/kubevpn:v1.3.1",
|
||||||
|
},
|
||||||
|
want: true,
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
|
||||||
|
// custom server image registry, but client image is not same as client version, does not upgrade
|
||||||
|
// client version: v1.2.1
|
||||||
|
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
||||||
|
// server image: mykubevpn.io/kubenetworks/kubevpn:v1.1.1
|
||||||
|
{
|
||||||
|
name: "custom server image registry, but client image is not same as client version, does not upgrade",
|
||||||
|
args: args{
|
||||||
|
clientVersionStr: "v1.2.1",
|
||||||
|
clientImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.1",
|
||||||
|
serverImgStr: "mykubevpn.io/kubenetworks/kubevpn:v1.1.1",
|
||||||
|
},
|
||||||
|
want: true,
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
|
||||||
|
// custom server image registry, client image is same as client version, upgrade
|
||||||
|
// client version: v1.2.1
|
||||||
|
// client image: ghcr.io/kubenetworks/kubevpn:v1.2.1
|
||||||
|
// server image: mykubevpn.io/kubenetworks/kubevpn:v1.1.1
|
||||||
|
{
|
||||||
|
name: "custom server image registry, client image is same as client version, upgrade",
|
||||||
|
args: args{
|
||||||
|
clientVersionStr: "v1.2.1",
|
||||||
|
clientImgStr: "mykubevpn.io/kubenetworks/kubevpn:v1.2.1",
|
||||||
|
serverImgStr: "mykubevpn.io/kubenetworks/kubevpn:v1.1.1",
|
||||||
|
},
|
||||||
|
want: true,
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
got, err := IsNewer(tt.args.clientVersionStr, tt.args.clientImgStr, tt.args.serverImgStr)
|
||||||
|
if (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("newer() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if got != tt.want {
|
||||||
|
t.Errorf("newer() got = %v, want %v", got, tt.want)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestGetTargetImage(t *testing.T) {
|
||||||
|
type args struct {
|
||||||
|
version string
|
||||||
|
image string
|
||||||
|
}
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
args args
|
||||||
|
want string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "replace version",
|
||||||
|
args: args{
|
||||||
|
version: "v1.2.3",
|
||||||
|
image: "ghcr.io/kubenetworks/kubevpn:v1.0.0",
|
||||||
|
},
|
||||||
|
want: "ghcr.io/kubenetworks/kubevpn:v1.2.3",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
if got := GetTargetImage(tt.args.version, tt.args.image); got != tt.want {
|
||||||
|
t.Errorf("GetTargetImage() = %v, want %v", got, tt.want)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIsVersionMajorOrMinorDiff(t *testing.T) {
|
||||||
|
type args struct {
|
||||||
|
clientVersionStr string
|
||||||
|
serverImgStr string
|
||||||
|
}
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
args args
|
||||||
|
want bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Major version is diff",
|
||||||
|
args: args{
|
||||||
|
clientVersionStr: "v2.2.3",
|
||||||
|
serverImgStr: "ghcr.io/kubenetworks/kubevpn:v1.2.0",
|
||||||
|
},
|
||||||
|
want: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Minor version is diff",
|
||||||
|
args: args{
|
||||||
|
clientVersionStr: "v1.2.3",
|
||||||
|
serverImgStr: "ghcr.io/kubenetworks/kubevpn:v1.0.0",
|
||||||
|
},
|
||||||
|
want: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "PATCH version is diff",
|
||||||
|
args: args{
|
||||||
|
clientVersionStr: "v2.2.3",
|
||||||
|
serverImgStr: "ghcr.io/kubenetworks/kubevpn:v2.2.0",
|
||||||
|
},
|
||||||
|
want: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
if got := CmpClientVersionAndPodImageTag(tt.args.clientVersionStr, tt.args.serverImgStr); got != tt.want {
|
||||||
|
t.Errorf("CmpClientVersionAndPodImageTag() = %v, want %v", got, tt.want)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
214
vendor/k8s.io/kubectl/pkg/scale/scale.go
generated
vendored
Normal file
214
vendor/k8s.io/kubectl/pkg/scale/scale.go
generated
vendored
Normal file
@@ -0,0 +1,214 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2014 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package scale
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"strconv"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
autoscalingv1 "k8s.io/api/autoscaling/v1"
|
||||||
|
"k8s.io/apimachinery/pkg/api/errors"
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
"k8s.io/apimachinery/pkg/types"
|
||||||
|
"k8s.io/apimachinery/pkg/util/json"
|
||||||
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
|
scaleclient "k8s.io/client-go/scale"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Scaler provides an interface for resources that can be scaled.
|
||||||
|
type Scaler interface {
|
||||||
|
// Scale scales the named resource after checking preconditions. It optionally
|
||||||
|
// retries in the event of resource version mismatch (if retry is not nil),
|
||||||
|
// and optionally waits until the status of the resource matches newSize (if wait is not nil)
|
||||||
|
// TODO: Make the implementation of this watch-based (#56075) once #31345 is fixed.
|
||||||
|
Scale(namespace, name string, newSize uint, preconditions *ScalePrecondition, retry, wait *RetryParams, gvr schema.GroupVersionResource, dryRun bool) error
|
||||||
|
// ScaleSimple does a simple one-shot attempt at scaling - not useful on its own, but
|
||||||
|
// a necessary building block for Scale
|
||||||
|
ScaleSimple(namespace, name string, preconditions *ScalePrecondition, newSize uint, gvr schema.GroupVersionResource, dryRun bool) (updatedResourceVersion string, err error)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewScaler get a scaler for a given resource
|
||||||
|
func NewScaler(scalesGetter scaleclient.ScalesGetter) Scaler {
|
||||||
|
return &genericScaler{scalesGetter}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ScalePrecondition describes a condition that must be true for the scale to take place
|
||||||
|
// If CurrentSize == -1, it is ignored.
|
||||||
|
// If CurrentResourceVersion is the empty string, it is ignored.
|
||||||
|
// Otherwise they must equal the values in the resource for it to be valid.
|
||||||
|
type ScalePrecondition struct {
|
||||||
|
Size int
|
||||||
|
ResourceVersion string
|
||||||
|
}
|
||||||
|
|
||||||
|
// A PreconditionError is returned when a resource fails to match
|
||||||
|
// the scale preconditions passed to kubectl.
|
||||||
|
type PreconditionError struct {
|
||||||
|
Precondition string
|
||||||
|
ExpectedValue string
|
||||||
|
ActualValue string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (pe PreconditionError) Error() string {
|
||||||
|
return fmt.Sprintf("Expected %s to be %s, was %s", pe.Precondition, pe.ExpectedValue, pe.ActualValue)
|
||||||
|
}
|
||||||
|
|
||||||
|
// RetryParams encapsulates the retry parameters used by kubectl's scaler.
|
||||||
|
type RetryParams struct {
|
||||||
|
Interval, Timeout time.Duration
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewRetryParams(interval, timeout time.Duration) *RetryParams {
|
||||||
|
return &RetryParams{interval, timeout}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ScaleCondition is a closure around Scale that facilitates retries via util.wait
|
||||||
|
func ScaleCondition(r Scaler, precondition *ScalePrecondition, namespace, name string, count uint, updatedResourceVersion *string, gvr schema.GroupVersionResource, dryRun bool) wait.ConditionFunc {
|
||||||
|
return func() (bool, error) {
|
||||||
|
rv, err := r.ScaleSimple(namespace, name, precondition, count, gvr, dryRun)
|
||||||
|
if updatedResourceVersion != nil {
|
||||||
|
*updatedResourceVersion = rv
|
||||||
|
}
|
||||||
|
// Retry only on update conflicts.
|
||||||
|
if errors.IsConflict(err) {
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// validateGeneric ensures that the preconditions match. Returns nil if they are valid, otherwise an error
|
||||||
|
func (precondition *ScalePrecondition) validate(scale *autoscalingv1.Scale) error {
|
||||||
|
if precondition.Size != -1 && int(scale.Spec.Replicas) != precondition.Size {
|
||||||
|
return PreconditionError{"replicas", strconv.Itoa(precondition.Size), strconv.Itoa(int(scale.Spec.Replicas))}
|
||||||
|
}
|
||||||
|
if len(precondition.ResourceVersion) > 0 && scale.ResourceVersion != precondition.ResourceVersion {
|
||||||
|
return PreconditionError{"resource version", precondition.ResourceVersion, scale.ResourceVersion}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// genericScaler can update scales for resources in a particular namespace
|
||||||
|
type genericScaler struct {
|
||||||
|
scaleNamespacer scaleclient.ScalesGetter
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ Scaler = &genericScaler{}
|
||||||
|
|
||||||
|
// ScaleSimple updates a scale of a given resource. It returns the resourceVersion of the scale if the update was successful.
|
||||||
|
func (s *genericScaler) ScaleSimple(namespace, name string, preconditions *ScalePrecondition, newSize uint, gvr schema.GroupVersionResource, dryRun bool) (updatedResourceVersion string, err error) {
|
||||||
|
if preconditions != nil {
|
||||||
|
scale, err := s.scaleNamespacer.Scales(namespace).Get(context.TODO(), gvr.GroupResource(), name, metav1.GetOptions{})
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
if err = preconditions.validate(scale); err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
scale.Spec.Replicas = int32(newSize)
|
||||||
|
updateOptions := metav1.UpdateOptions{}
|
||||||
|
if dryRun {
|
||||||
|
updateOptions.DryRun = []string{metav1.DryRunAll}
|
||||||
|
}
|
||||||
|
updatedScale, err := s.scaleNamespacer.Scales(namespace).Update(context.TODO(), gvr.GroupResource(), scale, updateOptions)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
return updatedScale.ResourceVersion, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// objectForReplicas is used for encoding scale patch
|
||||||
|
type objectForReplicas struct {
|
||||||
|
Replicas uint `json:"replicas"`
|
||||||
|
}
|
||||||
|
// objectForSpec is used for encoding scale patch
|
||||||
|
type objectForSpec struct {
|
||||||
|
Spec objectForReplicas `json:"spec"`
|
||||||
|
}
|
||||||
|
spec := objectForSpec{
|
||||||
|
Spec: objectForReplicas{Replicas: newSize},
|
||||||
|
}
|
||||||
|
patch, err := json.Marshal(&spec)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
patchOptions := metav1.PatchOptions{}
|
||||||
|
if dryRun {
|
||||||
|
patchOptions.DryRun = []string{metav1.DryRunAll}
|
||||||
|
}
|
||||||
|
updatedScale, err := s.scaleNamespacer.Scales(namespace).Patch(context.TODO(), gvr, name, types.MergePatchType, patch, patchOptions)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
return updatedScale.ResourceVersion, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Scale updates a scale of a given resource to a new size, with optional precondition check (if preconditions is not nil),
|
||||||
|
// optional retries (if retry is not nil), and then optionally waits for the status to reach desired count.
|
||||||
|
func (s *genericScaler) Scale(namespace, resourceName string, newSize uint, preconditions *ScalePrecondition, retry, waitForReplicas *RetryParams, gvr schema.GroupVersionResource, dryRun bool) error {
|
||||||
|
if retry == nil {
|
||||||
|
// make it try only once, immediately
|
||||||
|
retry = &RetryParams{Interval: time.Millisecond, Timeout: time.Millisecond}
|
||||||
|
}
|
||||||
|
cond := ScaleCondition(s, preconditions, namespace, resourceName, newSize, nil, gvr, dryRun)
|
||||||
|
if err := wait.PollImmediate(retry.Interval, retry.Timeout, cond); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if waitForReplicas != nil {
|
||||||
|
return WaitForScaleHasDesiredReplicas(s.scaleNamespacer, gvr.GroupResource(), resourceName, namespace, newSize, waitForReplicas)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// scaleHasDesiredReplicas returns a condition that will be true if and only if the desired replica
|
||||||
|
// count for a scale (Spec) equals its updated replicas count (Status)
|
||||||
|
func scaleHasDesiredReplicas(sClient scaleclient.ScalesGetter, gr schema.GroupResource, resourceName string, namespace string, desiredReplicas int32) wait.ConditionFunc {
|
||||||
|
return func() (bool, error) {
|
||||||
|
actualScale, err := sClient.Scales(namespace).Get(context.TODO(), gr, resourceName, metav1.GetOptions{})
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
// this means the desired scale target has been reset by something else
|
||||||
|
if actualScale.Spec.Replicas != desiredReplicas {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
return actualScale.Spec.Replicas == actualScale.Status.Replicas &&
|
||||||
|
desiredReplicas == actualScale.Status.Replicas, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// WaitForScaleHasDesiredReplicas waits until condition scaleHasDesiredReplicas is satisfied
|
||||||
|
// or returns error when timeout happens
|
||||||
|
func WaitForScaleHasDesiredReplicas(sClient scaleclient.ScalesGetter, gr schema.GroupResource, resourceName string, namespace string, newSize uint, waitForReplicas *RetryParams) error {
|
||||||
|
if waitForReplicas == nil {
|
||||||
|
return fmt.Errorf("waitForReplicas parameter cannot be nil")
|
||||||
|
}
|
||||||
|
err := wait.PollImmediate(
|
||||||
|
waitForReplicas.Interval,
|
||||||
|
waitForReplicas.Timeout,
|
||||||
|
scaleHasDesiredReplicas(sClient, gr, resourceName, namespace, int32(newSize)))
|
||||||
|
if err == wait.ErrWaitTimeout {
|
||||||
|
return fmt.Errorf("timed out waiting for %q to be synced", resourceName)
|
||||||
|
}
|
||||||
|
return err
|
||||||
|
}
|
||||||
1
vendor/modules.txt
vendored
1
vendor/modules.txt
vendored
@@ -2358,6 +2358,7 @@ k8s.io/kubectl/pkg/generate
|
|||||||
k8s.io/kubectl/pkg/generate/versioned
|
k8s.io/kubectl/pkg/generate/versioned
|
||||||
k8s.io/kubectl/pkg/polymorphichelpers
|
k8s.io/kubectl/pkg/polymorphichelpers
|
||||||
k8s.io/kubectl/pkg/rawhttp
|
k8s.io/kubectl/pkg/rawhttp
|
||||||
|
k8s.io/kubectl/pkg/scale
|
||||||
k8s.io/kubectl/pkg/scheme
|
k8s.io/kubectl/pkg/scheme
|
||||||
k8s.io/kubectl/pkg/util/certificate
|
k8s.io/kubectl/pkg/util/certificate
|
||||||
k8s.io/kubectl/pkg/util/completion
|
k8s.io/kubectl/pkg/util/completion
|
||||||
|
|||||||
Reference in New Issue
Block a user