2019-04-07 17:07:55 +00:00
|
|
|
/*
|
|
|
|
Copyright 2019 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package scheduler
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"reflect"
|
|
|
|
|
2019-09-27 21:51:53 +00:00
|
|
|
"k8s.io/klog"
|
|
|
|
|
|
|
|
v1 "k8s.io/api/core/v1"
|
2019-04-07 17:07:55 +00:00
|
|
|
storagev1 "k8s.io/api/storage/v1"
|
|
|
|
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
2019-09-27 21:51:53 +00:00
|
|
|
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
2019-12-12 01:27:03 +00:00
|
|
|
"k8s.io/client-go/informers"
|
2019-04-07 17:07:55 +00:00
|
|
|
coreinformers "k8s.io/client-go/informers/core/v1"
|
|
|
|
"k8s.io/client-go/tools/cache"
|
2019-09-27 21:51:53 +00:00
|
|
|
"k8s.io/kubernetes/pkg/features"
|
2019-12-12 01:27:03 +00:00
|
|
|
"k8s.io/kubernetes/pkg/scheduler/internal/queue"
|
2019-04-07 17:07:55 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func (sched *Scheduler) onPvAdd(obj interface{}) {
|
|
|
|
// Pods created when there are no PVs available will be stuck in
|
|
|
|
// unschedulable queue. But unbound PVs created for static provisioning and
|
|
|
|
// delay binding storage class are skipped in PV controller dynamic
|
|
|
|
// provisioning and binding process, will not trigger events to schedule pod
|
|
|
|
// again. So we need to move pods to active queue on PV add for this
|
|
|
|
// scenario.
|
2019-12-12 01:27:03 +00:00
|
|
|
sched.SchedulingQueue.MoveAllToActiveOrBackoffQueue(queue.PvAdd)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) onPvUpdate(old, new interface{}) {
|
|
|
|
// Scheduler.bindVolumesWorker may fail to update assumed pod volume
|
|
|
|
// bindings due to conflicts if PVs are updated by PV controller or other
|
|
|
|
// parties, then scheduler will add pod back to unschedulable queue. We
|
|
|
|
// need to move pods to active queue on PV update for this scenario.
|
2019-12-12 01:27:03 +00:00
|
|
|
sched.SchedulingQueue.MoveAllToActiveOrBackoffQueue(queue.PvUpdate)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) onPvcAdd(obj interface{}) {
|
2019-12-12 01:27:03 +00:00
|
|
|
sched.SchedulingQueue.MoveAllToActiveOrBackoffQueue(queue.PvcAdd)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) onPvcUpdate(old, new interface{}) {
|
2019-12-12 01:27:03 +00:00
|
|
|
sched.SchedulingQueue.MoveAllToActiveOrBackoffQueue(queue.PvcUpdate)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) onStorageClassAdd(obj interface{}) {
|
|
|
|
sc, ok := obj.(*storagev1.StorageClass)
|
|
|
|
if !ok {
|
|
|
|
klog.Errorf("cannot convert to *storagev1.StorageClass: %v", obj)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// CheckVolumeBindingPred fails if pod has unbound immediate PVCs. If these
|
|
|
|
// PVCs have specified StorageClass name, creating StorageClass objects
|
|
|
|
// with late binding will cause predicates to pass, so we need to move pods
|
|
|
|
// to active queue.
|
|
|
|
// We don't need to invalidate cached results because results will not be
|
|
|
|
// cached for pod that has unbound immediate PVCs.
|
|
|
|
if sc.VolumeBindingMode != nil && *sc.VolumeBindingMode == storagev1.VolumeBindingWaitForFirstConsumer {
|
2019-12-12 01:27:03 +00:00
|
|
|
sched.SchedulingQueue.MoveAllToActiveOrBackoffQueue(queue.StorageClassAdd)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) onServiceAdd(obj interface{}) {
|
2019-12-12 01:27:03 +00:00
|
|
|
sched.SchedulingQueue.MoveAllToActiveOrBackoffQueue(queue.ServiceAdd)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) onServiceUpdate(oldObj interface{}, newObj interface{}) {
|
2019-12-12 01:27:03 +00:00
|
|
|
sched.SchedulingQueue.MoveAllToActiveOrBackoffQueue(queue.ServiceUpdate)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) onServiceDelete(obj interface{}) {
|
2019-12-12 01:27:03 +00:00
|
|
|
sched.SchedulingQueue.MoveAllToActiveOrBackoffQueue(queue.ServiceDelete)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) addNodeToCache(obj interface{}) {
|
|
|
|
node, ok := obj.(*v1.Node)
|
|
|
|
if !ok {
|
|
|
|
klog.Errorf("cannot convert to *v1.Node: %v", obj)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-09-27 21:51:53 +00:00
|
|
|
if err := sched.SchedulerCache.AddNode(node); err != nil {
|
2019-04-07 17:07:55 +00:00
|
|
|
klog.Errorf("scheduler cache AddNode failed: %v", err)
|
|
|
|
}
|
|
|
|
|
2019-12-12 01:27:03 +00:00
|
|
|
sched.SchedulingQueue.MoveAllToActiveOrBackoffQueue(queue.NodeAdd)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) updateNodeInCache(oldObj, newObj interface{}) {
|
|
|
|
oldNode, ok := oldObj.(*v1.Node)
|
|
|
|
if !ok {
|
|
|
|
klog.Errorf("cannot convert oldObj to *v1.Node: %v", oldObj)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
newNode, ok := newObj.(*v1.Node)
|
|
|
|
if !ok {
|
|
|
|
klog.Errorf("cannot convert newObj to *v1.Node: %v", newObj)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-09-27 21:51:53 +00:00
|
|
|
if err := sched.SchedulerCache.UpdateNode(oldNode, newNode); err != nil {
|
2019-04-07 17:07:55 +00:00
|
|
|
klog.Errorf("scheduler cache UpdateNode failed: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Only activate unschedulable pods if the node became more schedulable.
|
|
|
|
// We skip the node property comparison when there is no unschedulable pods in the queue
|
|
|
|
// to save processing cycles. We still trigger a move to active queue to cover the case
|
|
|
|
// that a pod being processed by the scheduler is determined unschedulable. We want this
|
|
|
|
// pod to be reevaluated when a change in the cluster happens.
|
2019-12-12 01:27:03 +00:00
|
|
|
if sched.SchedulingQueue.NumUnschedulablePods() == 0 {
|
|
|
|
sched.SchedulingQueue.MoveAllToActiveOrBackoffQueue(queue.Unknown)
|
|
|
|
} else if event := nodeSchedulingPropertiesChange(newNode, oldNode); event != "" {
|
|
|
|
sched.SchedulingQueue.MoveAllToActiveOrBackoffQueue(event)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) deleteNodeFromCache(obj interface{}) {
|
|
|
|
var node *v1.Node
|
|
|
|
switch t := obj.(type) {
|
|
|
|
case *v1.Node:
|
|
|
|
node = t
|
|
|
|
case cache.DeletedFinalStateUnknown:
|
|
|
|
var ok bool
|
|
|
|
node, ok = t.Obj.(*v1.Node)
|
|
|
|
if !ok {
|
|
|
|
klog.Errorf("cannot convert to *v1.Node: %v", t.Obj)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
klog.Errorf("cannot convert to *v1.Node: %v", t)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// NOTE: Updates must be written to scheduler cache before invalidating
|
|
|
|
// equivalence cache, because we could snapshot equivalence cache after the
|
|
|
|
// invalidation and then snapshot the cache itself. If the cache is
|
|
|
|
// snapshotted before updates are written, we would update equivalence
|
|
|
|
// cache with stale information which is based on snapshot of old cache.
|
2019-09-27 21:51:53 +00:00
|
|
|
if err := sched.SchedulerCache.RemoveNode(node); err != nil {
|
2019-04-07 17:07:55 +00:00
|
|
|
klog.Errorf("scheduler cache RemoveNode failed: %v", err)
|
|
|
|
}
|
|
|
|
}
|
2019-09-27 21:51:53 +00:00
|
|
|
|
|
|
|
func (sched *Scheduler) onCSINodeAdd(obj interface{}) {
|
2019-12-12 01:27:03 +00:00
|
|
|
sched.SchedulingQueue.MoveAllToActiveOrBackoffQueue(queue.CSINodeAdd)
|
2019-09-27 21:51:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) onCSINodeUpdate(oldObj, newObj interface{}) {
|
2019-12-12 01:27:03 +00:00
|
|
|
sched.SchedulingQueue.MoveAllToActiveOrBackoffQueue(queue.CSINodeUpdate)
|
2019-09-27 21:51:53 +00:00
|
|
|
}
|
|
|
|
|
2019-04-07 17:07:55 +00:00
|
|
|
func (sched *Scheduler) addPodToSchedulingQueue(obj interface{}) {
|
2019-09-27 21:51:53 +00:00
|
|
|
if err := sched.SchedulingQueue.Add(obj.(*v1.Pod)); err != nil {
|
2019-04-07 17:07:55 +00:00
|
|
|
utilruntime.HandleError(fmt.Errorf("unable to queue %T: %v", obj, err))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) updatePodInSchedulingQueue(oldObj, newObj interface{}) {
|
|
|
|
pod := newObj.(*v1.Pod)
|
|
|
|
if sched.skipPodUpdate(pod) {
|
|
|
|
return
|
|
|
|
}
|
2019-09-27 21:51:53 +00:00
|
|
|
if err := sched.SchedulingQueue.Update(oldObj.(*v1.Pod), pod); err != nil {
|
2019-04-07 17:07:55 +00:00
|
|
|
utilruntime.HandleError(fmt.Errorf("unable to update %T: %v", newObj, err))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) deletePodFromSchedulingQueue(obj interface{}) {
|
|
|
|
var pod *v1.Pod
|
|
|
|
switch t := obj.(type) {
|
|
|
|
case *v1.Pod:
|
|
|
|
pod = obj.(*v1.Pod)
|
|
|
|
case cache.DeletedFinalStateUnknown:
|
|
|
|
var ok bool
|
|
|
|
pod, ok = t.Obj.(*v1.Pod)
|
|
|
|
if !ok {
|
|
|
|
utilruntime.HandleError(fmt.Errorf("unable to convert object %T to *v1.Pod in %T", obj, sched))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
utilruntime.HandleError(fmt.Errorf("unable to handle object in %T: %T", sched, obj))
|
|
|
|
return
|
|
|
|
}
|
2019-09-27 21:51:53 +00:00
|
|
|
if err := sched.SchedulingQueue.Delete(pod); err != nil {
|
2019-04-07 17:07:55 +00:00
|
|
|
utilruntime.HandleError(fmt.Errorf("unable to dequeue %T: %v", obj, err))
|
|
|
|
}
|
2019-09-27 21:51:53 +00:00
|
|
|
if sched.VolumeBinder != nil {
|
2019-04-07 17:07:55 +00:00
|
|
|
// Volume binder only wants to keep unassigned pods
|
2019-09-27 21:51:53 +00:00
|
|
|
sched.VolumeBinder.DeletePodBindings(pod)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
2019-12-12 01:27:03 +00:00
|
|
|
sched.Framework.RejectWaitingPod(pod.UID)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) addPodToCache(obj interface{}) {
|
|
|
|
pod, ok := obj.(*v1.Pod)
|
|
|
|
if !ok {
|
|
|
|
klog.Errorf("cannot convert to *v1.Pod: %v", obj)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-09-27 21:51:53 +00:00
|
|
|
if err := sched.SchedulerCache.AddPod(pod); err != nil {
|
2019-04-07 17:07:55 +00:00
|
|
|
klog.Errorf("scheduler cache AddPod failed: %v", err)
|
|
|
|
}
|
|
|
|
|
2019-09-27 21:51:53 +00:00
|
|
|
sched.SchedulingQueue.AssignedPodAdded(pod)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) updatePodInCache(oldObj, newObj interface{}) {
|
|
|
|
oldPod, ok := oldObj.(*v1.Pod)
|
|
|
|
if !ok {
|
|
|
|
klog.Errorf("cannot convert oldObj to *v1.Pod: %v", oldObj)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
newPod, ok := newObj.(*v1.Pod)
|
|
|
|
if !ok {
|
|
|
|
klog.Errorf("cannot convert newObj to *v1.Pod: %v", newObj)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// NOTE: Updates must be written to scheduler cache before invalidating
|
|
|
|
// equivalence cache, because we could snapshot equivalence cache after the
|
|
|
|
// invalidation and then snapshot the cache itself. If the cache is
|
|
|
|
// snapshotted before updates are written, we would update equivalence
|
|
|
|
// cache with stale information which is based on snapshot of old cache.
|
2019-09-27 21:51:53 +00:00
|
|
|
if err := sched.SchedulerCache.UpdatePod(oldPod, newPod); err != nil {
|
2019-04-07 17:07:55 +00:00
|
|
|
klog.Errorf("scheduler cache UpdatePod failed: %v", err)
|
|
|
|
}
|
|
|
|
|
2019-09-27 21:51:53 +00:00
|
|
|
sched.SchedulingQueue.AssignedPodUpdated(newPod)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sched *Scheduler) deletePodFromCache(obj interface{}) {
|
|
|
|
var pod *v1.Pod
|
|
|
|
switch t := obj.(type) {
|
|
|
|
case *v1.Pod:
|
|
|
|
pod = t
|
|
|
|
case cache.DeletedFinalStateUnknown:
|
|
|
|
var ok bool
|
|
|
|
pod, ok = t.Obj.(*v1.Pod)
|
|
|
|
if !ok {
|
|
|
|
klog.Errorf("cannot convert to *v1.Pod: %v", t.Obj)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
klog.Errorf("cannot convert to *v1.Pod: %v", t)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// NOTE: Updates must be written to scheduler cache before invalidating
|
|
|
|
// equivalence cache, because we could snapshot equivalence cache after the
|
|
|
|
// invalidation and then snapshot the cache itself. If the cache is
|
|
|
|
// snapshotted before updates are written, we would update equivalence
|
|
|
|
// cache with stale information which is based on snapshot of old cache.
|
2019-09-27 21:51:53 +00:00
|
|
|
if err := sched.SchedulerCache.RemovePod(pod); err != nil {
|
2019-04-07 17:07:55 +00:00
|
|
|
klog.Errorf("scheduler cache RemovePod failed: %v", err)
|
|
|
|
}
|
|
|
|
|
2019-12-12 01:27:03 +00:00
|
|
|
sched.SchedulingQueue.MoveAllToActiveOrBackoffQueue(queue.AssignedPodDelete)
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// assignedPod selects pods that are assigned (scheduled and running).
|
|
|
|
func assignedPod(pod *v1.Pod) bool {
|
|
|
|
return len(pod.Spec.NodeName) != 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// responsibleForPod returns true if the pod has asked to be scheduled by the given scheduler.
|
|
|
|
func responsibleForPod(pod *v1.Pod, schedulerName string) bool {
|
|
|
|
return schedulerName == pod.Spec.SchedulerName
|
|
|
|
}
|
|
|
|
|
|
|
|
// skipPodUpdate checks whether the specified pod update should be ignored.
|
|
|
|
// This function will return true if
|
|
|
|
// - The pod has already been assumed, AND
|
|
|
|
// - The pod has only its ResourceVersion, Spec.NodeName and/or Annotations
|
|
|
|
// updated.
|
|
|
|
func (sched *Scheduler) skipPodUpdate(pod *v1.Pod) bool {
|
|
|
|
// Non-assumed pods should never be skipped.
|
2019-09-27 21:51:53 +00:00
|
|
|
isAssumed, err := sched.SchedulerCache.IsAssumedPod(pod)
|
2019-04-07 17:07:55 +00:00
|
|
|
if err != nil {
|
|
|
|
utilruntime.HandleError(fmt.Errorf("failed to check whether pod %s/%s is assumed: %v", pod.Namespace, pod.Name, err))
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if !isAssumed {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Gets the assumed pod from the cache.
|
2019-09-27 21:51:53 +00:00
|
|
|
assumedPod, err := sched.SchedulerCache.GetPod(pod)
|
2019-04-07 17:07:55 +00:00
|
|
|
if err != nil {
|
|
|
|
utilruntime.HandleError(fmt.Errorf("failed to get assumed pod %s/%s from cache: %v", pod.Namespace, pod.Name, err))
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Compares the assumed pod in the cache with the pod update. If they are
|
|
|
|
// equal (with certain fields excluded), this pod update will be skipped.
|
|
|
|
f := func(pod *v1.Pod) *v1.Pod {
|
|
|
|
p := pod.DeepCopy()
|
|
|
|
// ResourceVersion must be excluded because each object update will
|
|
|
|
// have a new resource version.
|
|
|
|
p.ResourceVersion = ""
|
|
|
|
// Spec.NodeName must be excluded because the pod assumed in the cache
|
|
|
|
// is expected to have a node assigned while the pod update may nor may
|
|
|
|
// not have this field set.
|
|
|
|
p.Spec.NodeName = ""
|
|
|
|
// Annotations must be excluded for the reasons described in
|
|
|
|
// https://github.com/kubernetes/kubernetes/issues/52914.
|
|
|
|
p.Annotations = nil
|
|
|
|
return p
|
|
|
|
}
|
|
|
|
assumedPodCopy, podCopy := f(assumedPod), f(pod)
|
|
|
|
if !reflect.DeepEqual(assumedPodCopy, podCopy) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
klog.V(3).Infof("Skipping pod %s/%s update", pod.Namespace, pod.Name)
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// AddAllEventHandlers is a helper function used in tests and in Scheduler
|
|
|
|
// to add event handlers for various informers.
|
|
|
|
func AddAllEventHandlers(
|
|
|
|
sched *Scheduler,
|
|
|
|
schedulerName string,
|
2019-12-12 01:27:03 +00:00
|
|
|
informerFactory informers.SharedInformerFactory,
|
2019-04-07 17:07:55 +00:00
|
|
|
podInformer coreinformers.PodInformer,
|
|
|
|
) {
|
|
|
|
// scheduled pod cache
|
|
|
|
podInformer.Informer().AddEventHandler(
|
|
|
|
cache.FilteringResourceEventHandler{
|
|
|
|
FilterFunc: func(obj interface{}) bool {
|
|
|
|
switch t := obj.(type) {
|
|
|
|
case *v1.Pod:
|
|
|
|
return assignedPod(t)
|
|
|
|
case cache.DeletedFinalStateUnknown:
|
|
|
|
if pod, ok := t.Obj.(*v1.Pod); ok {
|
|
|
|
return assignedPod(pod)
|
|
|
|
}
|
|
|
|
utilruntime.HandleError(fmt.Errorf("unable to convert object %T to *v1.Pod in %T", obj, sched))
|
|
|
|
return false
|
|
|
|
default:
|
|
|
|
utilruntime.HandleError(fmt.Errorf("unable to handle object in %T: %T", sched, obj))
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
},
|
|
|
|
Handler: cache.ResourceEventHandlerFuncs{
|
|
|
|
AddFunc: sched.addPodToCache,
|
|
|
|
UpdateFunc: sched.updatePodInCache,
|
|
|
|
DeleteFunc: sched.deletePodFromCache,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
|
|
|
// unscheduled pod queue
|
|
|
|
podInformer.Informer().AddEventHandler(
|
|
|
|
cache.FilteringResourceEventHandler{
|
|
|
|
FilterFunc: func(obj interface{}) bool {
|
|
|
|
switch t := obj.(type) {
|
|
|
|
case *v1.Pod:
|
|
|
|
return !assignedPod(t) && responsibleForPod(t, schedulerName)
|
|
|
|
case cache.DeletedFinalStateUnknown:
|
|
|
|
if pod, ok := t.Obj.(*v1.Pod); ok {
|
|
|
|
return !assignedPod(pod) && responsibleForPod(pod, schedulerName)
|
|
|
|
}
|
|
|
|
utilruntime.HandleError(fmt.Errorf("unable to convert object %T to *v1.Pod in %T", obj, sched))
|
|
|
|
return false
|
|
|
|
default:
|
|
|
|
utilruntime.HandleError(fmt.Errorf("unable to handle object in %T: %T", sched, obj))
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
},
|
|
|
|
Handler: cache.ResourceEventHandlerFuncs{
|
|
|
|
AddFunc: sched.addPodToSchedulingQueue,
|
|
|
|
UpdateFunc: sched.updatePodInSchedulingQueue,
|
|
|
|
DeleteFunc: sched.deletePodFromSchedulingQueue,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
2019-12-12 01:27:03 +00:00
|
|
|
informerFactory.Core().V1().Nodes().Informer().AddEventHandler(
|
2019-04-07 17:07:55 +00:00
|
|
|
cache.ResourceEventHandlerFuncs{
|
|
|
|
AddFunc: sched.addNodeToCache,
|
|
|
|
UpdateFunc: sched.updateNodeInCache,
|
|
|
|
DeleteFunc: sched.deleteNodeFromCache,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
2019-09-27 21:51:53 +00:00
|
|
|
if utilfeature.DefaultFeatureGate.Enabled(features.CSINodeInfo) {
|
2019-12-12 01:27:03 +00:00
|
|
|
informerFactory.Storage().V1().CSINodes().Informer().AddEventHandler(
|
2019-09-27 21:51:53 +00:00
|
|
|
cache.ResourceEventHandlerFuncs{
|
|
|
|
AddFunc: sched.onCSINodeAdd,
|
|
|
|
UpdateFunc: sched.onCSINodeUpdate,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2019-04-07 17:07:55 +00:00
|
|
|
// On add and delete of PVs, it will affect equivalence cache items
|
|
|
|
// related to persistent volume
|
2019-12-12 01:27:03 +00:00
|
|
|
informerFactory.Core().V1().PersistentVolumes().Informer().AddEventHandler(
|
2019-04-07 17:07:55 +00:00
|
|
|
cache.ResourceEventHandlerFuncs{
|
|
|
|
// MaxPDVolumeCountPredicate: since it relies on the counts of PV.
|
|
|
|
AddFunc: sched.onPvAdd,
|
|
|
|
UpdateFunc: sched.onPvUpdate,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
// This is for MaxPDVolumeCountPredicate: add/delete PVC will affect counts of PV when it is bound.
|
2019-12-12 01:27:03 +00:00
|
|
|
informerFactory.Core().V1().PersistentVolumeClaims().Informer().AddEventHandler(
|
2019-04-07 17:07:55 +00:00
|
|
|
cache.ResourceEventHandlerFuncs{
|
|
|
|
AddFunc: sched.onPvcAdd,
|
|
|
|
UpdateFunc: sched.onPvcUpdate,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
// This is for ServiceAffinity: affected by the selector of the service is updated.
|
|
|
|
// Also, if new service is added, equivalence cache will also become invalid since
|
|
|
|
// existing pods may be "captured" by this service and change this predicate result.
|
2019-12-12 01:27:03 +00:00
|
|
|
informerFactory.Core().V1().Services().Informer().AddEventHandler(
|
2019-04-07 17:07:55 +00:00
|
|
|
cache.ResourceEventHandlerFuncs{
|
|
|
|
AddFunc: sched.onServiceAdd,
|
|
|
|
UpdateFunc: sched.onServiceUpdate,
|
|
|
|
DeleteFunc: sched.onServiceDelete,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
2019-12-12 01:27:03 +00:00
|
|
|
informerFactory.Storage().V1().StorageClasses().Informer().AddEventHandler(
|
2019-04-07 17:07:55 +00:00
|
|
|
cache.ResourceEventHandlerFuncs{
|
|
|
|
AddFunc: sched.onStorageClassAdd,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2019-12-12 01:27:03 +00:00
|
|
|
func nodeSchedulingPropertiesChange(newNode *v1.Node, oldNode *v1.Node) string {
|
2019-04-07 17:07:55 +00:00
|
|
|
if nodeSpecUnschedulableChanged(newNode, oldNode) {
|
2019-12-12 01:27:03 +00:00
|
|
|
return queue.NodeSpecUnschedulableChange
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
if nodeAllocatableChanged(newNode, oldNode) {
|
2019-12-12 01:27:03 +00:00
|
|
|
return queue.NodeAllocatableChange
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
if nodeLabelsChanged(newNode, oldNode) {
|
2019-12-12 01:27:03 +00:00
|
|
|
return queue.NodeLabelChange
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
if nodeTaintsChanged(newNode, oldNode) {
|
2019-12-12 01:27:03 +00:00
|
|
|
return queue.NodeTaintChange
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
if nodeConditionsChanged(newNode, oldNode) {
|
2019-12-12 01:27:03 +00:00
|
|
|
return queue.NodeConditionChange
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
|
2019-12-12 01:27:03 +00:00
|
|
|
return ""
|
2019-04-07 17:07:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func nodeAllocatableChanged(newNode *v1.Node, oldNode *v1.Node) bool {
|
|
|
|
return !reflect.DeepEqual(oldNode.Status.Allocatable, newNode.Status.Allocatable)
|
|
|
|
}
|
|
|
|
|
|
|
|
func nodeLabelsChanged(newNode *v1.Node, oldNode *v1.Node) bool {
|
|
|
|
return !reflect.DeepEqual(oldNode.GetLabels(), newNode.GetLabels())
|
|
|
|
}
|
|
|
|
|
|
|
|
func nodeTaintsChanged(newNode *v1.Node, oldNode *v1.Node) bool {
|
|
|
|
return !reflect.DeepEqual(newNode.Spec.Taints, oldNode.Spec.Taints)
|
|
|
|
}
|
|
|
|
|
|
|
|
func nodeConditionsChanged(newNode *v1.Node, oldNode *v1.Node) bool {
|
|
|
|
strip := func(conditions []v1.NodeCondition) map[v1.NodeConditionType]v1.ConditionStatus {
|
|
|
|
conditionStatuses := make(map[v1.NodeConditionType]v1.ConditionStatus, len(conditions))
|
|
|
|
for i := range conditions {
|
|
|
|
conditionStatuses[conditions[i].Type] = conditions[i].Status
|
|
|
|
}
|
|
|
|
return conditionStatuses
|
|
|
|
}
|
|
|
|
return !reflect.DeepEqual(strip(oldNode.Status.Conditions), strip(newNode.Status.Conditions))
|
|
|
|
}
|
|
|
|
|
|
|
|
func nodeSpecUnschedulableChanged(newNode *v1.Node, oldNode *v1.Node) bool {
|
|
|
|
return newNode.Spec.Unschedulable != oldNode.Spec.Unschedulable && newNode.Spec.Unschedulable == false
|
|
|
|
}
|