You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
returnfmt.Errorf("unable to refresh the service IP block: %v", err)
110
125
}
111
126
112
-
r:=ipallocator.NewCIDRRange(c.network)
127
+
rebuilt:=ipallocator.NewCIDRRange(c.network)
128
+
// Check every Service's ClusterIP, and rebuild the state as we think it should be.
113
129
for_, svc:=rangelist.Items {
114
130
if!api.IsServiceIPSet(&svc) {
131
+
// didn't need a cluster IP
115
132
continue
116
133
}
117
134
ip:=net.ParseIP(svc.Spec.ClusterIP)
118
135
ifip==nil {
119
-
// cluster IP is broken, reallocate
136
+
// cluster IP is corrupt
120
137
runtime.HandleError(fmt.Errorf("the cluster IP %s for service %s/%s is not a valid IP; please recreate", svc.Spec.ClusterIP, svc.Name, svc.Namespace))
121
138
continue
122
139
}
123
-
switcherr:=r.Allocate(ip); err {
140
+
// mark it as in-use
141
+
switcherr:=rebuilt.Allocate(ip); err {
124
142
casenil:
143
+
ifstored.Has(ip) {
144
+
// remove it from the old set, so we can find leaks
145
+
stored.Release(ip)
146
+
} else {
147
+
// cluster IP doesn't seem to be allocated
148
+
runtime.HandleError(fmt.Errorf("the cluster IP %s for service %s/%s is not allocated; repairing", svc.Spec.ClusterIP, svc.Name, svc.Namespace))
149
+
}
150
+
delete(c.leaks, ip.String()) // it is used, so it can't be leaked
125
151
caseipallocator.ErrAllocated:
126
152
// TODO: send event
127
-
// cluster IP is broken, reallocate
153
+
// cluster IP is duplicate
128
154
runtime.HandleError(fmt.Errorf("the cluster IP %s for service %s/%s was assigned to multiple services; please recreate", ip, svc.Name, svc.Namespace))
129
155
caseipallocator.ErrNotInRange:
130
156
// TODO: send event
131
-
// cluster IP is broken, reallocate
157
+
// cluster IP is out of range
132
158
runtime.HandleError(fmt.Errorf("the cluster IP %s for service %s/%s is not within the service CIDR %s; please recreate", ip, svc.Name, svc.Namespace, c.network))
133
159
caseipallocator.ErrFull:
134
160
// TODO: send event
135
-
returnfmt.Errorf("the service CIDR %v is full; you must widen the CIDR in order to create new services", r)
161
+
// somehow we are out of IPs
162
+
returnfmt.Errorf("the service CIDR %v is full; you must widen the CIDR in order to create new services", rebuilt)
136
163
default:
137
164
returnfmt.Errorf("unable to allocate cluster IP %s for service %s/%s due to an unknown error, exiting: %v", ip, svc.Name, svc.Namespace, err)
138
165
}
139
166
}
140
167
141
-
iferr:=r.Snapshot(latest); err!=nil {
168
+
// Check for IPs that are left in the old set. They appear to have been leaked.
169
+
stored.ForEach(func(ip net.IP) {
170
+
count, found:=c.leaks[ip.String()]
171
+
switch {
172
+
case!found:
173
+
// flag it to be cleaned up after any races (hopefully) are gone
174
+
runtime.HandleError(fmt.Errorf("the cluster IP %s may have leaked: flagging for later clean up", ip))
175
+
count=numRepairsBeforeLeakCleanup-1
176
+
fallthrough
177
+
casecount>0:
178
+
// pretend it is still in use until count expires
179
+
c.leaks[ip.String()] =count-1
180
+
iferr:=rebuilt.Allocate(ip); err!=nil {
181
+
runtime.HandleError(fmt.Errorf("the cluster IP %s may have leaked, but can not be allocated: %v", ip, err))
182
+
}
183
+
default:
184
+
// do not add it to the rebuilt set, which means it will be available for reuse
185
+
runtime.HandleError(fmt.Errorf("the cluster IP %s appears to have leaked: cleaning up", ip))
186
+
}
187
+
})
188
+
189
+
// Blast the rebuilt state into storage.
190
+
iferr:=rebuilt.Snapshot(snapshot); err!=nil {
142
191
returnfmt.Errorf("unable to snapshot the updated service IP allocations: %v", err)
0 commit comments