kubernetes-operator/internal/controller/operator/instance/dapr_instance_controller.go

221 lines
7.3 KiB
Go

/*
Copyright 2023.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package instance
import (
"context"
"fmt"
helme "github.com/lburgazzoli/k8s-manifests-renderer-helm/engine"
"k8s.io/client-go/tools/record"
"sigs.k8s.io/controller-runtime/pkg/handler"
"sigs.k8s.io/controller-runtime/pkg/log"
"sigs.k8s.io/controller-runtime/pkg/reconcile"
"sigs.k8s.io/controller-runtime/pkg/source"
"k8s.io/apimachinery/pkg/runtime"
"sigs.k8s.io/controller-runtime/pkg/builder"
"sigs.k8s.io/controller-runtime/pkg/predicate"
daprApi "github.com/dapr/kubernetes-operator/api/operator/v1alpha1"
"github.com/dapr/kubernetes-operator/pkg/controller"
"github.com/dapr/kubernetes-operator/pkg/controller/client"
"github.com/dapr/kubernetes-operator/pkg/controller/reconciler"
"github.com/dapr/kubernetes-operator/pkg/helm"
"github.com/dapr/kubernetes-operator/pkg/openshift"
"github.com/go-logr/logr"
ctrlRt "sigs.k8s.io/controller-runtime"
ctrlCli "sigs.k8s.io/controller-runtime/pkg/client"
ctrl "sigs.k8s.io/controller-runtime/pkg/controller"
)
func NewReconciler(ctx context.Context, manager ctrlRt.Manager, o helm.Options) (*Reconciler, error) {
c, err := client.NewClient(manager.GetConfig(), manager.GetScheme(), manager.GetClient())
if err != nil {
//nolint:wrapcheck
return nil, err
}
rec := Reconciler{}
rec.l = ctrlRt.Log.WithName("dapr-instance-controller")
rec.client = c
rec.Scheme = manager.GetScheme()
rec.ClusterType = controller.ClusterTypeVanilla
rec.manager = manager
rec.recorder = manager.GetEventRecorderFor(controller.FieldManager)
rec.helmOptions = o
rec.helmEngine = helme.New()
isOpenshift, err := openshift.IsOpenShift(c.Discovery)
if err != nil {
//nolint:wrapcheck
return nil, err
}
if isOpenshift {
rec.ClusterType = controller.ClusterTypeOpenShift
}
rec.actions = append(rec.actions, NewChartAction(rec.l))
rec.actions = append(rec.actions, NewApplyCRDsAction(rec.l))
rec.actions = append(rec.actions, NewApplyResourcesAction(rec.l))
rec.actions = append(rec.actions, NewConditionsAction(rec.l))
rec.actions = append(rec.actions, NewGCAction(rec.l))
err = rec.init(ctx)
if err != nil {
return nil, err
}
return &rec, nil
}
// +kubebuilder:rbac:groups=apiextensions.k8s.io,resources=customresourcedefinitions,verbs=get;list;create;update;patch
// +kubebuilder:rbac:groups=admissionregistration.k8s.io,resources=mutatingwebhookconfigurations,verbs=*
// +kubebuilder:rbac:groups=operator.dapr.io,resources=daprinstances,verbs=get;list;watch;create;update;patch;delete
// +kubebuilder:rbac:groups=operator.dapr.io,resources=daprinstances/status,verbs=get;update;patch
// +kubebuilder:rbac:groups=operator.dapr.io,resources=daprinstances/finalizers,verbs=update
// +kubebuilder:rbac:groups=rbac.authorization.k8s.io,resources=clusterrolebindings,verbs=*
// +kubebuilder:rbac:groups=rbac.authorization.k8s.io,resources=clusterroles,verbs=*
// +kubebuilder:rbac:groups=rbac.authorization.k8s.io,resources=rolebindings,verbs=*
// +kubebuilder:rbac:groups=rbac.authorization.k8s.io,resources=roles,verbs=*
// +kubebuilder:rbac:groups=rbac.authorization.k8s.io,resources=roles,verbs=*
// +kubebuilder:rbac:groups="",resources=events,verbs=*
// +kubebuilder:rbac:groups="",resources=serviceaccounts,verbs=*
// +kubebuilder:rbac:groups="",resources=secrets,verbs=*
// +kubebuilder:rbac:groups="",resources=services,verbs=*
// +kubebuilder:rbac:groups="",resources=configmaps,verbs=*
// +kubebuilder:rbac:groups=apps,resources=deployments,verbs=*
// +kubebuilder:rbac:groups=apps,resources=statefulsets,verbs=*
// +kubebuilder:rbac:groups=policy,resources=poddisruptionbudgets,verbs=*
// +kubebuilder:rbac:groups=dapr.io,resources=components,verbs=*
// +kubebuilder:rbac:groups=dapr.io,resources=components/status,verbs=*
// +kubebuilder:rbac:groups=dapr.io,resources=components/finalizers,verbs=*
// +kubebuilder:rbac:groups=dapr.io,resources=configurations,verbs=*
// +kubebuilder:rbac:groups=dapr.io,resources=configurations/status,verbs=*
// +kubebuilder:rbac:groups=dapr.io,resources=configurations/finalizers,verbs=*
// +kubebuilder:rbac:groups=dapr.io,resources=resiliencies,verbs=*
// +kubebuilder:rbac:groups=dapr.io,resources=resiliencies/status,verbs=*
// +kubebuilder:rbac:groups=dapr.io,resources=resiliencies/finalizers,verbs=*
// +kubebuilder:rbac:groups=dapr.io,resources=subscriptions,verbs=*
// +kubebuilder:rbac:groups=dapr.io,resources=subscriptions/status,verbs=*
// +kubebuilder:rbac:groups=dapr.io,resources=subscriptions/finalizers,verbs=*
type Reconciler struct {
client *client.Client
Scheme *runtime.Scheme
ClusterType controller.ClusterType
actions []Action
l logr.Logger
helmEngine *helme.Instance
helmOptions helm.Options
manager ctrlRt.Manager
controller ctrl.Controller
recorder record.EventRecorder
}
func (r *Reconciler) Client() *client.Client {
return r.client
}
func (r *Reconciler) init(ctx context.Context) error {
c := ctrlRt.NewControllerManagedBy(r.manager)
c = c.For(&daprApi.DaprInstance{}, builder.WithPredicates(
predicate.Or(
predicate.GenerationChangedPredicate{},
)))
for i := range r.actions {
b, err := r.actions[i].Configure(ctx, r.Client(), c)
if err != nil {
//nolint:wrapcheck
return err
}
c = b
}
// by default, the controller expect the DaprControlPlane resource to be created
// in the same namespace where it runs, if not fallback to the default namespace
rec := reconciler.BaseReconciler[*daprApi.DaprInstance]{
Delegate: r,
Client: r.client,
Log: log.FromContext(ctx),
Name: DaprInstanceResourceName,
Namespace: controller.OperatorNamespace(),
FinalizerName: DaprInstanceFinalizerName,
FinalizerAction: r.Cleanup,
}
ct, err := c.Build(&rec)
if err != nil {
return fmt.Errorf("failure building the application controller for DaprInstance resource: %w", err)
}
r.controller = ct
return nil
}
func (r *Reconciler) Watch(obj ctrlCli.Object, eh handler.EventHandler, predicates ...predicate.Predicate) error {
err := r.controller.Watch(
source.Kind(
r.manager.GetCache(),
obj,
eh,
predicates...,
),
)
if err != nil {
return fmt.Errorf(
"error configuring watcher for resource %s:%s, reson: %w",
obj.GetObjectKind().GroupVersionKind().String(),
obj.GetName(),
err)
}
return nil
}
func (r *Reconciler) EnqueueRequestForOwner(owner ctrlCli.Object, opts ...handler.OwnerOption) handler.EventHandler {
return handler.EnqueueRequestForOwner(
r.manager.GetScheme(),
r.manager.GetRESTMapper(),
owner,
opts...,
)
}
func (r *Reconciler) EnqueueRequestsFromMapFunc(fn func(context.Context, ctrlCli.Object) []reconcile.Request) handler.EventHandler {
return handler.EnqueueRequestsFromMapFunc(fn)
}
func (r *Reconciler) Event(object runtime.Object, eventType string, reason string, message string) {
r.recorder.Event(
object,
eventType,
reason,
message,
)
}