-
Notifications
You must be signed in to change notification settings - Fork 1.6k
/
Copy pathcgroups.go
85 lines (73 loc) · 2.8 KB
/
cgroups.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
/*
Copyright 2021 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package common
import (
"bufio"
"context"
"os"
"regexp"
"sync"
"sigs.k8s.io/kind/pkg/errors"
"sigs.k8s.io/kind/pkg/exec"
)
var nodeReachedCgroupsReadyRegexp *regexp.Regexp
var nodeReachedCgroupsReadyRegexpCompileOnce sync.Once
// NodeReachedCgroupsReadyRegexp returns a regexp for use with WaitUntilLogRegexpMatches
//
// This is used to avoid "ERROR: this script needs /sys/fs/cgroup/cgroup.procs to be empty (for writing the top-level cgroup.subtree_control)"
// See https://github.com/kubernetes-sigs/kind/issues/2409
//
// This pattern matches either "detected cgroupv1" from the kind node image's entrypoint logs
// or "Multi-User System" target if is using cgroups v2,
// so that `docker exec` can be executed safely without breaking cgroup v2 hierarchy.
func NodeReachedCgroupsReadyRegexp() *regexp.Regexp {
nodeReachedCgroupsReadyRegexpCompileOnce.Do(func() {
// This is an approximation, see: https://github.com/kubernetes-sigs/kind/pull/2421
nodeReachedCgroupsReadyRegexp = regexp.MustCompile("Reached target .*Multi-User System.*|detected cgroup v1")
})
return nodeReachedCgroupsReadyRegexp
}
// WaitUntilLogRegexpMatches waits until logCmd output produces a line matching re.
// It will use logCtx to determine if the logCmd deadline was exceeded for producing
// the most useful error message in failure cases, logCtx should be the context
// supplied to create logCmd with CommandContext
func WaitUntilLogRegexpMatches(logCtx context.Context, logCmd exec.Cmd, re *regexp.Regexp) error {
pr, pw, err := os.Pipe()
if err != nil {
return err
}
logCmd.SetStdout(pw)
logCmd.SetStderr(pw)
defer pr.Close()
cmdErrC := make(chan error, 1)
go func() {
defer pw.Close()
cmdErrC <- logCmd.Run()
}()
sc := bufio.NewScanner(pr)
for sc.Scan() {
line := sc.Text()
if re.MatchString(line) {
return nil
}
}
// when we timeout the process will have been killed due to the timeout, which is not interesting
// in other cases if the command errored this may be a useful error
if ctxErr := logCtx.Err(); ctxErr != context.DeadlineExceeded {
if cmdErr := <-cmdErrC; cmdErr != nil {
return errors.Wrap(cmdErr, "failed to read logs")
}
}
// otherwise generic error
return errors.Errorf("could not find a log line that matches %q", re.String())
}