k3s/vendor/k8s.io/legacy-cloud-providers/azure/azure_wrap.go

356 lines
11 KiB
Go
Raw Normal View History

2019-09-27 21:51:53 +00:00
// +build !providerless
/*
Copyright 2016 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package azure
import (
"fmt"
"net/http"
"regexp"
"strings"
"time"
2020-08-10 17:43:49 +00:00
"github.com/Azure/azure-sdk-for-go/services/compute/mgmt/2019-12-01/compute"
2019-09-27 21:51:53 +00:00
"github.com/Azure/azure-sdk-for-go/services/network/mgmt/2019-06-01/network"
2020-03-26 21:07:15 +00:00
"github.com/Azure/go-autorest/autorest/to"
2019-09-27 21:51:53 +00:00
"k8s.io/apimachinery/pkg/types"
cloudprovider "k8s.io/cloud-provider"
2020-08-10 17:43:49 +00:00
"k8s.io/klog/v2"
2020-03-26 21:07:15 +00:00
azcache "k8s.io/legacy-cloud-providers/azure/cache"
"k8s.io/legacy-cloud-providers/azure/retry"
2019-09-27 21:51:53 +00:00
)
var (
2020-03-26 21:07:15 +00:00
vmCacheTTLDefaultInSeconds = 60
loadBalancerCacheTTLDefaultInSeconds = 120
nsgCacheTTLDefaultInSeconds = 120
routeTableCacheTTLDefaultInSeconds = 120
2019-09-27 21:51:53 +00:00
azureNodeProviderIDRE = regexp.MustCompile(`^azure:///subscriptions/(?:.*)/resourceGroups/(?:.*)/providers/Microsoft.Compute/(?:.*)`)
azureResourceGroupNameRE = regexp.MustCompile(`.*/subscriptions/(?:.*)/resourceGroups/(.+)/providers/(?:.*)`)
)
// checkExistsFromError inspects an error and returns a true if err is nil,
// false if error is an autorest.Error with StatusCode=404 and will return the
// error back if error is another status code or another type of error.
2020-03-26 21:07:15 +00:00
func checkResourceExistsFromError(err *retry.Error) (bool, *retry.Error) {
2019-09-27 21:51:53 +00:00
if err == nil {
2020-03-26 21:07:15 +00:00
return true, nil
2019-09-27 21:51:53 +00:00
}
2020-03-26 21:07:15 +00:00
if err.HTTPStatusCode == http.StatusNotFound {
return false, nil
2019-09-27 21:51:53 +00:00
}
2020-03-26 21:07:15 +00:00
return false, err
2019-09-27 21:51:53 +00:00
}
/// getVirtualMachine calls 'VirtualMachinesClient.Get' with a timed cache
/// The service side has throttling control that delays responses if there are multiple requests onto certain vm
2019-09-27 21:51:53 +00:00
/// resource request in short period.
2020-03-26 21:07:15 +00:00
func (az *Cloud) getVirtualMachine(nodeName types.NodeName, crt azcache.AzureCacheReadType) (vm compute.VirtualMachine, err error) {
2019-09-27 21:51:53 +00:00
vmName := string(nodeName)
2019-11-14 18:56:24 +00:00
cachedVM, err := az.vmCache.Get(vmName, crt)
2019-09-27 21:51:53 +00:00
if err != nil {
return vm, err
}
if cachedVM == nil {
return vm, cloudprovider.InstanceNotFound
}
return *(cachedVM.(*compute.VirtualMachine)), nil
}
2020-03-26 21:07:15 +00:00
func (az *Cloud) getRouteTable(crt azcache.AzureCacheReadType) (routeTable network.RouteTable, exists bool, err error) {
2019-11-14 18:56:24 +00:00
cachedRt, err := az.rtCache.Get(az.RouteTableName, crt)
2019-09-27 21:51:53 +00:00
if err != nil {
return routeTable, false, err
}
if cachedRt == nil {
return routeTable, false, nil
}
return *(cachedRt.(*network.RouteTable)), true, nil
}
2020-03-26 21:07:15 +00:00
func (az *Cloud) getPublicIPAddress(pipResourceGroup string, pipName string) (network.PublicIPAddress, bool, error) {
2019-09-27 21:51:53 +00:00
resourceGroup := az.ResourceGroup
if pipResourceGroup != "" {
resourceGroup = pipResourceGroup
}
ctx, cancel := getContextWithCancel()
defer cancel()
2020-03-26 21:07:15 +00:00
pip, err := az.PublicIPAddressesClient.Get(ctx, resourceGroup, pipName, "")
exists, rerr := checkResourceExistsFromError(err)
if rerr != nil {
return pip, false, rerr.Error()
2019-09-27 21:51:53 +00:00
}
if !exists {
2020-03-26 21:07:15 +00:00
klog.V(2).Infof("Public IP %q not found", pipName)
2019-09-27 21:51:53 +00:00
return pip, false, nil
}
2020-03-26 21:07:15 +00:00
return pip, exists, nil
2019-09-27 21:51:53 +00:00
}
2020-03-26 21:07:15 +00:00
func (az *Cloud) getSubnet(virtualNetworkName string, subnetName string) (network.Subnet, bool, error) {
2019-09-27 21:51:53 +00:00
var rg string
if len(az.VnetResourceGroup) > 0 {
rg = az.VnetResourceGroup
} else {
rg = az.ResourceGroup
}
ctx, cancel := getContextWithCancel()
defer cancel()
2020-03-26 21:07:15 +00:00
subnet, err := az.SubnetsClient.Get(ctx, rg, virtualNetworkName, subnetName, "")
exists, rerr := checkResourceExistsFromError(err)
if rerr != nil {
return subnet, false, rerr.Error()
2019-09-27 21:51:53 +00:00
}
if !exists {
2020-03-26 21:07:15 +00:00
klog.V(2).Infof("Subnet %q not found", subnetName)
2019-09-27 21:51:53 +00:00
return subnet, false, nil
}
2020-03-26 21:07:15 +00:00
return subnet, exists, nil
2019-09-27 21:51:53 +00:00
}
2020-03-26 21:07:15 +00:00
func (az *Cloud) getAzureLoadBalancer(name string, crt azcache.AzureCacheReadType) (lb network.LoadBalancer, exists bool, err error) {
2019-11-14 18:56:24 +00:00
cachedLB, err := az.lbCache.Get(name, crt)
2019-09-27 21:51:53 +00:00
if err != nil {
return lb, false, err
}
if cachedLB == nil {
return lb, false, nil
}
return *(cachedLB.(*network.LoadBalancer)), true, nil
}
2020-03-26 21:07:15 +00:00
func (az *Cloud) getSecurityGroup(crt azcache.AzureCacheReadType) (network.SecurityGroup, error) {
nsg := network.SecurityGroup{}
2019-09-27 21:51:53 +00:00
if az.SecurityGroupName == "" {
return nsg, fmt.Errorf("securityGroupName is not configured")
}
2019-11-14 18:56:24 +00:00
securityGroup, err := az.nsgCache.Get(az.SecurityGroupName, crt)
2019-09-27 21:51:53 +00:00
if err != nil {
return nsg, err
}
if securityGroup == nil {
return nsg, fmt.Errorf("nsg %q not found", az.SecurityGroupName)
}
return *(securityGroup.(*network.SecurityGroup)), nil
}
2020-03-26 21:07:15 +00:00
func (az *Cloud) newVMCache() (*azcache.TimedCache, error) {
2019-09-27 21:51:53 +00:00
getter := func(key string) (interface{}, error) {
// Currently InstanceView request are used by azure_zones, while the calls come after non-InstanceView
// request. If we first send an InstanceView request and then a non InstanceView request, the second
// request will still hit throttling. This is what happens now for cloud controller manager: In this
// case we do get instance view every time to fulfill the azure_zones requirement without hitting
// throttling.
// Consider adding separate parameter for controlling 'InstanceView' once node update issue #56276 is fixed
ctx, cancel := getContextWithCancel()
defer cancel()
resourceGroup, err := az.GetNodeResourceGroup(key)
if err != nil {
return nil, err
}
2020-03-26 21:07:15 +00:00
vm, verr := az.VirtualMachinesClient.Get(ctx, resourceGroup, key, compute.InstanceView)
exists, rerr := checkResourceExistsFromError(verr)
if rerr != nil {
return nil, rerr.Error()
2019-09-27 21:51:53 +00:00
}
if !exists {
2020-03-26 21:07:15 +00:00
klog.V(2).Infof("Virtual machine %q not found", key)
return nil, nil
}
if vm.VirtualMachineProperties != nil &&
strings.EqualFold(to.String(vm.VirtualMachineProperties.ProvisioningState), string(compute.ProvisioningStateDeleting)) {
klog.V(2).Infof("Virtual machine %q is under deleting", key)
2019-09-27 21:51:53 +00:00
return nil, nil
}
return &vm, nil
}
2020-03-26 21:07:15 +00:00
if az.VMCacheTTLInSeconds == 0 {
az.VMCacheTTLInSeconds = vmCacheTTLDefaultInSeconds
}
return azcache.NewTimedcache(time.Duration(az.VMCacheTTLInSeconds)*time.Second, getter)
2019-09-27 21:51:53 +00:00
}
2020-03-26 21:07:15 +00:00
func (az *Cloud) newLBCache() (*azcache.TimedCache, error) {
2019-09-27 21:51:53 +00:00
getter := func(key string) (interface{}, error) {
ctx, cancel := getContextWithCancel()
defer cancel()
lb, err := az.LoadBalancerClient.Get(ctx, az.getLoadBalancerResourceGroup(), key, "")
2020-03-26 21:07:15 +00:00
exists, rerr := checkResourceExistsFromError(err)
if rerr != nil {
return nil, rerr.Error()
2019-09-27 21:51:53 +00:00
}
if !exists {
2020-03-26 21:07:15 +00:00
klog.V(2).Infof("Load balancer %q not found", key)
2019-09-27 21:51:53 +00:00
return nil, nil
}
return &lb, nil
}
2020-03-26 21:07:15 +00:00
if az.LoadBalancerCacheTTLInSeconds == 0 {
az.LoadBalancerCacheTTLInSeconds = loadBalancerCacheTTLDefaultInSeconds
}
return azcache.NewTimedcache(time.Duration(az.LoadBalancerCacheTTLInSeconds)*time.Second, getter)
2019-09-27 21:51:53 +00:00
}
2020-03-26 21:07:15 +00:00
func (az *Cloud) newNSGCache() (*azcache.TimedCache, error) {
2019-09-27 21:51:53 +00:00
getter := func(key string) (interface{}, error) {
ctx, cancel := getContextWithCancel()
defer cancel()
2020-03-26 21:07:15 +00:00
nsg, err := az.SecurityGroupsClient.Get(ctx, az.SecurityGroupResourceGroup, key, "")
exists, rerr := checkResourceExistsFromError(err)
if rerr != nil {
return nil, rerr.Error()
2019-09-27 21:51:53 +00:00
}
if !exists {
2020-03-26 21:07:15 +00:00
klog.V(2).Infof("Security group %q not found", key)
2019-09-27 21:51:53 +00:00
return nil, nil
}
return &nsg, nil
}
2020-03-26 21:07:15 +00:00
if az.NsgCacheTTLInSeconds == 0 {
az.NsgCacheTTLInSeconds = nsgCacheTTLDefaultInSeconds
}
return azcache.NewTimedcache(time.Duration(az.NsgCacheTTLInSeconds)*time.Second, getter)
2019-09-27 21:51:53 +00:00
}
2020-03-26 21:07:15 +00:00
func (az *Cloud) newRouteTableCache() (*azcache.TimedCache, error) {
2019-09-27 21:51:53 +00:00
getter := func(key string) (interface{}, error) {
ctx, cancel := getContextWithCancel()
defer cancel()
rt, err := az.RouteTablesClient.Get(ctx, az.RouteTableResourceGroup, key, "")
2020-03-26 21:07:15 +00:00
exists, rerr := checkResourceExistsFromError(err)
if rerr != nil {
return nil, rerr.Error()
2019-09-27 21:51:53 +00:00
}
if !exists {
2020-03-26 21:07:15 +00:00
klog.V(2).Infof("Route table %q not found", key)
2019-09-27 21:51:53 +00:00
return nil, nil
}
return &rt, nil
}
2020-03-26 21:07:15 +00:00
if az.RouteTableCacheTTLInSeconds == 0 {
az.RouteTableCacheTTLInSeconds = routeTableCacheTTLDefaultInSeconds
}
return azcache.NewTimedcache(time.Duration(az.RouteTableCacheTTLInSeconds)*time.Second, getter)
2019-09-27 21:51:53 +00:00
}
func (az *Cloud) useStandardLoadBalancer() bool {
return strings.EqualFold(az.LoadBalancerSku, loadBalancerSkuStandard)
}
func (az *Cloud) excludeMasterNodesFromStandardLB() bool {
return az.ExcludeMasterFromStandardLB != nil && *az.ExcludeMasterFromStandardLB
}
func (az *Cloud) disableLoadBalancerOutboundSNAT() bool {
if !az.useStandardLoadBalancer() || az.DisableOutboundSNAT == nil {
return false
}
return *az.DisableOutboundSNAT
}
// IsNodeUnmanaged returns true if the node is not managed by Azure cloud provider.
// Those nodes includes on-prem or VMs from other clouds. They will not be added to load balancer
// backends. Azure routes and managed disks are also not supported for them.
func (az *Cloud) IsNodeUnmanaged(nodeName string) (bool, error) {
unmanagedNodes, err := az.GetUnmanagedNodes()
if err != nil {
return false, err
}
return unmanagedNodes.Has(nodeName), nil
}
// IsNodeUnmanagedByProviderID returns true if the node is not managed by Azure cloud provider.
// All managed node's providerIDs are in format 'azure:///subscriptions/<id>/resourceGroups/<rg>/providers/Microsoft.Compute/.*'
func (az *Cloud) IsNodeUnmanagedByProviderID(providerID string) bool {
return !azureNodeProviderIDRE.Match([]byte(providerID))
}
// convertResourceGroupNameToLower converts the resource group name in the resource ID to be lowered.
func convertResourceGroupNameToLower(resourceID string) (string, error) {
matches := azureResourceGroupNameRE.FindStringSubmatch(resourceID)
if len(matches) != 2 {
return "", fmt.Errorf("%q isn't in Azure resource ID format %q", resourceID, azureResourceGroupNameRE.String())
}
resourceGroup := matches[1]
return strings.Replace(resourceID, resourceGroup, strings.ToLower(resourceGroup), 1), nil
}
// isBackendPoolOnSameLB checks whether newBackendPoolID is on the same load balancer as existingBackendPools.
// Since both public and internal LBs are supported, lbName and lbName-internal are treated as same.
// If not same, the lbName for existingBackendPools would also be returned.
func isBackendPoolOnSameLB(newBackendPoolID string, existingBackendPools []string) (bool, string, error) {
matches := backendPoolIDRE.FindStringSubmatch(newBackendPoolID)
if len(matches) != 2 {
return false, "", fmt.Errorf("new backendPoolID %q is in wrong format", newBackendPoolID)
}
newLBName := matches[1]
2019-12-12 01:27:03 +00:00
newLBNameTrimmed := strings.TrimSuffix(newLBName, InternalLoadBalancerNameSuffix)
2019-09-27 21:51:53 +00:00
for _, backendPool := range existingBackendPools {
matches := backendPoolIDRE.FindStringSubmatch(backendPool)
if len(matches) != 2 {
return false, "", fmt.Errorf("existing backendPoolID %q is in wrong format", backendPool)
}
lbName := matches[1]
2019-12-12 01:27:03 +00:00
if !strings.EqualFold(strings.TrimSuffix(lbName, InternalLoadBalancerNameSuffix), newLBNameTrimmed) {
2019-09-27 21:51:53 +00:00
return false, lbName, nil
}
}
return true, "", nil
}