-
Notifications
You must be signed in to change notification settings - Fork 55
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
add initial CSI leader election library
- Loading branch information
1 parent
5f02458
commit 3feeece
Showing
2 changed files
with
243 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,187 @@ | ||
/* | ||
Copyright 2019 The Kubernetes Authors. | ||
Licensed under the Apache License, Version 2.0 (the "License"); | ||
you may not use this file except in compliance with the License. | ||
You may obtain a copy of the License at | ||
http://www.apache.org/licenses/LICENSE-2.0 | ||
Unless required by applicable law or agreed to in writing, software | ||
distributed under the License is distributed on an "AS IS" BASIS, | ||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
See the License for the specific language governing permissions and | ||
limitations under the License. | ||
*/ | ||
|
||
package leaderelection | ||
|
||
import ( | ||
"context" | ||
"fmt" | ||
"os" | ||
"regexp" | ||
"time" | ||
|
||
"k8s.io/api/core/v1" | ||
"k8s.io/client-go/kubernetes" | ||
"k8s.io/client-go/kubernetes/scheme" | ||
corev1 "k8s.io/client-go/kubernetes/typed/core/v1" | ||
"k8s.io/client-go/tools/leaderelection" | ||
"k8s.io/client-go/tools/leaderelection/resourcelock" | ||
"k8s.io/client-go/tools/record" | ||
"k8s.io/klog" | ||
) | ||
|
||
const ( | ||
defaultLeaseDuration = 15 * time.Second | ||
defaultRenewDeadline = 10 * time.Second | ||
defaultRetryPeriod = 5 * time.Second | ||
) | ||
|
||
// leaderElection is a convenience wrapper around client-go's leader election library. | ||
type leaderElection struct { | ||
runFunc func(ctx context.Context) | ||
|
||
// the lockName identifies the leader election config and should be shared across all members | ||
lockName string | ||
// the identity is the unique identity of the currently running member | ||
identity string | ||
// the namespace to store the lock resource | ||
namespace string | ||
// resourceLock defines the type of leaderelection that should be used | ||
// valid options are resourcelock.LeasesResourceLock, resourcelock.EndpointsResourceLock, | ||
// and resourcelock.ConfigMapsResourceLock | ||
resourceLock string | ||
|
||
leaseDuration time.Duration | ||
renewDeadline time.Duration | ||
retryPeriod time.Duration | ||
|
||
clientset kubernetes.Interface | ||
} | ||
|
||
// NewLeaderElection returns the default & preferred leader election type | ||
func NewLeaderElection(clientset kubernetes.Interface, lockName, lockNamespace string, runFunc func(ctx context.Context)) *leaderElection { | ||
return NewLeaderElectionWithLeases(clientset, lockName, lockNamespace, runFunc) | ||
} | ||
|
||
// NewLeaderElectionWithLeases returns an implementation of leader election using Leases | ||
func NewLeaderElectionWithLeases(clientset kubernetes.Interface, lockName, lockNamespace string, runFunc func(ctx context.Context)) *leaderElection { | ||
return &leaderElection{ | ||
runFunc: runFunc, | ||
lockName: lockName, | ||
namespace: lockNamespace, | ||
resourceLock: resourcelock.LeasesResourceLock, | ||
leaseDuration: defaultLeaseDuration, | ||
renewDeadline: defaultRenewDeadline, | ||
retryPeriod: defaultRetryPeriod, | ||
clientset: clientset, | ||
} | ||
} | ||
|
||
// NewLeaderElectionWithEndpoints returns an implementation of leader election using Endpoints | ||
func NewLeaderElectionWithEndpoints(clientset kubernetes.Interface, lockName, lockNamespace string, runFunc func(ctx context.Context)) *leaderElection { | ||
return &leaderElection{ | ||
runFunc: runFunc, | ||
lockName: lockName, | ||
namespace: lockNamespace, | ||
resourceLock: resourcelock.EndpointsResourceLock, | ||
leaseDuration: defaultLeaseDuration, | ||
renewDeadline: defaultRenewDeadline, | ||
retryPeriod: defaultRetryPeriod, | ||
clientset: clientset, | ||
} | ||
} | ||
|
||
// NewLeaderElectionWithConfigMaps returns an implementation of leader election using ConfigMaps | ||
func NewLeaderElectionWithConfigMaps(clientset kubernetes.Interface, lockName, lockNamespace string, runFunc func(ctx context.Context)) *leaderElection { | ||
return &leaderElection{ | ||
runFunc: runFunc, | ||
lockName: lockName, | ||
namespace: lockNamespace, | ||
resourceLock: resourcelock.ConfigMapsResourceLock, | ||
leaseDuration: defaultLeaseDuration, | ||
renewDeadline: defaultRenewDeadline, | ||
retryPeriod: defaultRetryPeriod, | ||
clientset: clientset, | ||
} | ||
} | ||
|
||
func (l *leaderElection) WithIdentity(identity string) { | ||
l.identity = identity | ||
} | ||
|
||
func (l *leaderElection) WithLeaseDuration(leaseDuration time.Duration) { | ||
l.leaseDuration = leaseDuration | ||
} | ||
|
||
func (l *leaderElection) WithRenewDeadline(renewDeadline time.Duration) { | ||
l.renewDeadline = renewDeadline | ||
} | ||
|
||
func (l *leaderElection) WithRetryPeriod(retryPeriod time.Duration) { | ||
l.retryPeriod = retryPeriod | ||
} | ||
|
||
func (l *leaderElection) Run() error { | ||
if l.identity == "" { | ||
id, err := defaultLeaderElectionIdentity() | ||
if err != nil { | ||
return fmt.Errorf("error getting the default leader identity: %v", err) | ||
} | ||
|
||
l.identity = id | ||
} | ||
|
||
broadcaster := record.NewBroadcaster() | ||
broadcaster.StartRecordingToSink(&corev1.EventSinkImpl{Interface: l.clientset.CoreV1().Events(l.namespace)}) | ||
eventRecorder := broadcaster.NewRecorder(scheme.Scheme, v1.EventSource{Component: fmt.Sprintf("%s/%s", l.lockName, string(l.identity))}) | ||
|
||
rlConfig := resourcelock.ResourceLockConfig{ | ||
Identity: sanitizeName(l.identity), | ||
EventRecorder: eventRecorder, | ||
} | ||
|
||
lock, err := resourcelock.New(l.resourceLock, l.namespace, sanitizeName(l.lockName), l.clientset.CoreV1(), l.clientset.CoordinationV1(), rlConfig) | ||
if err != nil { | ||
return err | ||
} | ||
|
||
leaderConfig := leaderelection.LeaderElectionConfig{ | ||
Lock: lock, | ||
LeaseDuration: l.leaseDuration, | ||
RenewDeadline: l.renewDeadline, | ||
RetryPeriod: l.retryPeriod, | ||
Callbacks: leaderelection.LeaderCallbacks{ | ||
OnStartedLeading: func(ctx context.Context) { | ||
klog.V(2).Info("became leader, starting") | ||
l.runFunc(ctx) | ||
}, | ||
OnStoppedLeading: func() { | ||
klog.Fatal("stopped leading") | ||
}, | ||
OnNewLeader: func(identity string) { | ||
klog.V(3).Infof("new leader detected, current leader: %s", identity) | ||
}, | ||
}, | ||
} | ||
|
||
leaderelection.RunOrDie(context.TODO(), leaderConfig) | ||
return nil // should never reach here | ||
} | ||
|
||
func defaultLeaderElectionIdentity() (string, error) { | ||
return os.Hostname() | ||
} | ||
|
||
// sanitizeName sanitizes the provided string so it can be consumed by leader election library | ||
func sanitizeName(name string) string { | ||
re := regexp.MustCompile("[^a-zA-Z0-9-]") | ||
name = re.ReplaceAllString(name, "-") | ||
if name[len(name)-1] == '-' { | ||
// name must not end with '-' | ||
name = name + "X" | ||
} | ||
return name | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,56 @@ | ||
/* | ||
Copyright 2019 The Kubernetes Authors. | ||
Licensed under the Apache License, Version 2.0 (the "License"); | ||
you may not use this file except in compliance with the License. | ||
You may obtain a copy of the License at | ||
http://www.apache.org/licenses/LICENSE-2.0 | ||
Unless required by applicable law or agreed to in writing, software | ||
distributed under the License is distributed on an "AS IS" BASIS, | ||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
See the License for the specific language governing permissions and | ||
limitations under the License. | ||
*/ | ||
|
||
package leaderelection | ||
|
||
import ( | ||
"testing" | ||
) | ||
|
||
func Test_sanitizeName(t *testing.T) { | ||
tests := []struct { | ||
name string | ||
input string | ||
output string | ||
}{ | ||
{ | ||
"requires no change", | ||
"test-driver", | ||
"test-driver", | ||
}, | ||
{ | ||
"has characters that should be replaced", | ||
"test!driver/foo", | ||
"test-driver-foo", | ||
}, | ||
{ | ||
"has trailing space", | ||
"driver\\", | ||
"driver-X", | ||
}, | ||
} | ||
|
||
for _, test := range tests { | ||
t.Run(test.name, func(t *testing.T) { | ||
output := sanitizeName(test.input) | ||
if output != test.output { | ||
t.Logf("expected name: %q", test.output) | ||
t.Logf("actual name: %q", output) | ||
t.Errorf("unexpected santized name") | ||
} | ||
}) | ||
} | ||
} |