Fix k8s build (#278)

This commit is contained in:
Manuel Alejandro de Brito Fontes 2016-09-21 16:05:18 -03:00 committed by Miek Gieben
parent 5301c5af5f
commit d250742d9e
4 changed files with 20 additions and 31 deletions

View file

@ -5,7 +5,7 @@ set -e
# Based on instructions at: http://kubernetes.io/docs/getting-started-guides/docker/ # Based on instructions at: http://kubernetes.io/docs/getting-started-guides/docker/
#K8S_VERSION=$(curl -sS https://storage.googleapis.com/kubernetes-release/release/latest.txt) #K8S_VERSION=$(curl -sS https://storage.googleapis.com/kubernetes-release/release/latest.txt)
K8S_VERSION="v1.2.4" K8S_VERSION="v1.3.7"
ARCH="amd64" ARCH="amd64"

View file

@ -10,7 +10,7 @@ cd ${BASEDIR}
echo "Setting up kubectl..." echo "Setting up kubectl..."
if [ ! -e kubectl ]; then if [ ! -e kubectl ]; then
curl -O http://storage.googleapis.com/kubernetes-release/release/v1.2.4/bin/linux/amd64/kubectl curl -O http://storage.googleapis.com/kubernetes-release/release/v1.3.7/bin/linux/amd64/kubectl
chmod u+x kubectl chmod u+x kubectl
fi fi

View file

@ -55,12 +55,15 @@ func newdnsController(kubeClient *client.Client, resyncPeriod time.Duration, lse
}, },
&api.Endpoints{}, resyncPeriod, cache.ResourceEventHandlerFuncs{}) &api.Endpoints{}, resyncPeriod, cache.ResourceEventHandlerFuncs{})
dns.svcLister.Store, dns.svcController = cache.NewInformer( dns.svcLister.Indexer, dns.svcController = cache.NewIndexerInformer(
&cache.ListWatch{ &cache.ListWatch{
ListFunc: serviceListFunc(dns.client, namespace, dns.selector), ListFunc: serviceListFunc(dns.client, namespace, dns.selector),
WatchFunc: serviceWatchFunc(dns.client, namespace, dns.selector), WatchFunc: serviceWatchFunc(dns.client, namespace, dns.selector),
}, },
&api.Service{}, resyncPeriod, cache.ResourceEventHandlerFuncs{}) &api.Service{},
resyncPeriod,
cache.ResourceEventHandlerFuncs{},
cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc})
dns.nsLister.Store, dns.nsController = cache.NewInformer( dns.nsLister.Store, dns.nsController = cache.NewInformer(
&cache.ListWatch{ &cache.ListWatch{
@ -163,47 +166,34 @@ func (dns *dnsController) GetNamespaceList() *api.NamespaceList {
return &nsList return &nsList
} }
func (dns *dnsController) GetServiceList() *api.ServiceList { func (dns *dnsController) GetServiceList() []*api.Service {
svcList, err := dns.svcLister.List() svcs, err := dns.svcLister.List(labels.Everything())
if err != nil { if err != nil {
return &api.ServiceList{} return []*api.Service{}
} }
return svcs
return &svcList
} }
// GetServicesByNamespace returns a map of // GetServicesByNamespace returns a map of
// namespacename :: [ kubernetesService ] // namespacename :: [ kubernetesService ]
func (dns *dnsController) GetServicesByNamespace() map[string][]api.Service { func (dns *dnsController) GetServicesByNamespace() map[string][]api.Service {
k8sServiceList := dns.GetServiceList() k8sServiceList := dns.GetServiceList()
if k8sServiceList == nil { items := make(map[string][]api.Service, len(k8sServiceList))
return nil for _, i := range k8sServiceList {
}
items := make(map[string][]api.Service, len(k8sServiceList.Items))
for _, i := range k8sServiceList.Items {
namespace := i.Namespace namespace := i.Namespace
items[namespace] = append(items[namespace], i) items[namespace] = append(items[namespace], *i)
} }
return items return items
} }
// GetServiceInNamespace returns the Service that matches // GetServiceInNamespace returns the Service that matches
// servicename in the namespace // servicename in the namespace
func (dns *dnsController) GetServiceInNamespace(namespace string, servicename string) *api.Service { func (dns *dnsController) GetServiceInNamespace(namespace string, servicename string) *api.Service {
svcKey := fmt.Sprintf("%v/%v", namespace, servicename) svcObj, err := dns.svcLister.Services(namespace).Get(servicename)
svcObj, svcExists, err := dns.svcLister.Store.GetByKey(svcKey)
if err != nil { if err != nil {
// TODO(...): should return err here // TODO(...): should return err here
return nil return nil
} }
if !svcExists { return svcObj
// TODO(...): should return err here
return nil
}
return svcObj.(*api.Service)
} }

View file

@ -183,14 +183,14 @@ func (k *Kubernetes) Get(namespace string, nsWildcard bool, servicename string,
var resultItems []api.Service var resultItems []api.Service
for _, item := range serviceList.Items { for _, item := range serviceList {
if symbolMatches(namespace, item.Namespace, nsWildcard) && symbolMatches(servicename, item.Name, serviceWildcard) { if symbolMatches(namespace, item.Namespace, nsWildcard) && symbolMatches(servicename, item.Name, serviceWildcard) {
// If namespace has a wildcard, filter results against Corefile namespace list. // If namespace has a wildcard, filter results against Corefile namespace list.
// (Namespaces without a wildcard were filtered before the call to this function.) // (Namespaces without a wildcard were filtered before the call to this function.)
if nsWildcard && (len(k.Namespaces) > 0) && (!util.StringInSlice(item.Namespace, k.Namespaces)) { if nsWildcard && (len(k.Namespaces) > 0) && (!util.StringInSlice(item.Namespace, k.Namespaces)) {
continue continue
} }
resultItems = append(resultItems, item) resultItems = append(resultItems, *item)
} }
} }
@ -216,12 +216,11 @@ func isKubernetesNameError(err error) bool {
} }
func (k *Kubernetes) getServiceRecordForIP(ip, name string) []msg.Service { func (k *Kubernetes) getServiceRecordForIP(ip, name string) []msg.Service {
svcList, err := k.APIConn.svcLister.List() svcList, err := k.APIConn.svcLister.List(labels.Everything())
if err != nil { if err != nil {
return nil return nil
} }
for _, service := range svcList {
for _, service := range svcList.Items {
if service.Spec.ClusterIP == ip { if service.Spec.ClusterIP == ip {
return []msg.Service{msg.Service{Host: ip}} return []msg.Service{msg.Service{Host: ip}}
} }