kops/cmd/kops-controller/main.go

275 lines
7.2 KiB
Go

/*
Copyright 2019 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package main
import (
"flag"
"fmt"
"os"
coordinationv1 "k8s.io/api/coordination/v1"
corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/types"
_ "k8s.io/client-go/plugin/pkg/client/auth/gcp"
"k8s.io/klog/v2"
"k8s.io/klog/v2/klogr"
"k8s.io/kops/cmd/kops-controller/controllers"
"k8s.io/kops/cmd/kops-controller/pkg/config"
"k8s.io/kops/cmd/kops-controller/pkg/server"
"k8s.io/kops/pkg/bootstrap"
"k8s.io/kops/pkg/nodeidentity"
nodeidentityaws "k8s.io/kops/pkg/nodeidentity/aws"
nodeidentityazure "k8s.io/kops/pkg/nodeidentity/azure"
nodeidentitydo "k8s.io/kops/pkg/nodeidentity/do"
nodeidentitygce "k8s.io/kops/pkg/nodeidentity/gce"
nodeidentityhetzner "k8s.io/kops/pkg/nodeidentity/hetzner"
nodeidentityos "k8s.io/kops/pkg/nodeidentity/openstack"
"k8s.io/kops/upup/pkg/fi/cloudup/awsup"
"k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmverifier"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/manager"
"sigs.k8s.io/yaml"
// +kubebuilder:scaffold:imports
)
var (
scheme = runtime.NewScheme()
setupLog = ctrl.Log.WithName("setup")
)
func init() {
// +kubebuilder:scaffold:scheme
}
func main() {
klog.InitFlags(nil)
// Disable metrics by default (avoid port conflicts, also risky because we are host network)
metricsAddress := ":0"
// flag.StringVar(&metricsAddr, "metrics-addr", metricsAddress, "The address the metric endpoint binds to.")
configPath := "/etc/kubernetes/kops-controller/config.yaml"
flag.StringVar(&configPath, "conf", configPath, "Location of yaml configuration file")
flag.Parse()
if configPath == "" {
klog.Fatalf("must specify --conf")
}
var opt config.Options
opt.PopulateDefaults()
{
b, err := os.ReadFile(configPath)
if err != nil {
klog.Fatalf("failed to read configuration file %q: %v", configPath, err)
}
if err := yaml.Unmarshal(b, &opt); err != nil {
klog.Fatalf("failed to parse configuration file %q: %v", configPath, err)
}
}
ctrl.SetLogger(klogr.New())
if err := buildScheme(); err != nil {
setupLog.Error(err, "error building scheme")
os.Exit(1)
}
mgr, err := ctrl.NewManager(ctrl.GetConfigOrDie(), ctrl.Options{
Scheme: scheme,
MetricsBindAddress: metricsAddress,
LeaderElection: true,
LeaderElectionID: "kops-controller-leader",
})
if err != nil {
setupLog.Error(err, "unable to start manager")
os.Exit(1)
}
if opt.Server != nil {
var verifier bootstrap.Verifier
var err error
if opt.Server.Provider.AWS != nil {
verifier, err = awsup.NewAWSVerifier(opt.Server.Provider.AWS)
if err != nil {
setupLog.Error(err, "unable to create verifier")
os.Exit(1)
}
} else if opt.Server.Provider.GCE != nil {
verifier, err = gcetpmverifier.NewTPMVerifier(opt.Server.Provider.GCE)
if err != nil {
setupLog.Error(err, "unable to create verifier")
os.Exit(1)
}
} else {
klog.Fatalf("server cloud provider config not provided")
}
srv, err := server.NewServer(&opt, verifier)
if err != nil {
setupLog.Error(err, "unable to create server")
os.Exit(1)
}
mgr.Add(srv)
}
if opt.EnableCloudIPAM {
setupLog.Info("enabling IPAM controller")
if opt.Cloud != "aws" {
klog.Error("IPAM controller only supported by aws")
os.Exit(1)
}
ipamController, err := controllers.NewAWSIPAMReconciler(mgr)
if err != nil {
setupLog.Error(err, "unable to create controller", "controller", "IPAMController")
os.Exit(1)
}
if err := ipamController.SetupWithManager(mgr); err != nil {
setupLog.Error(err, "unable to create controller", "controller", "IPAMController")
os.Exit(1)
}
}
if err := addNodeController(mgr, &opt); err != nil {
setupLog.Error(err, "unable to create controller", "controller", "NodeController")
os.Exit(1)
}
if err := addGossipController(mgr, &opt); err != nil {
setupLog.Error(err, "unable to create controller", "controller", "GossipController")
os.Exit(1)
}
// +kubebuilder:scaffold:builder
setupLog.Info("starting manager")
if err := mgr.Start(ctrl.SetupSignalHandler()); err != nil {
setupLog.Error(err, "problem running manager")
os.Exit(1)
}
}
func buildScheme() error {
if err := corev1.AddToScheme(scheme); err != nil {
return fmt.Errorf("error registering corev1: %v", err)
}
// Needed so that the leader-election system can post events
if err := coordinationv1.AddToScheme(scheme); err != nil {
return fmt.Errorf("error registering coordinationv1: %v", err)
}
return nil
}
func addNodeController(mgr manager.Manager, opt *config.Options) error {
var legacyIdentifier nodeidentity.LegacyIdentifier
var identifier nodeidentity.Identifier
var err error
switch opt.Cloud {
case "aws":
identifier, err = nodeidentityaws.New(opt.CacheNodeidentityInfo)
if err != nil {
return fmt.Errorf("error building identifier: %v", err)
}
case "gce":
legacyIdentifier, err = nodeidentitygce.New()
if err != nil {
return fmt.Errorf("error building identifier: %v", err)
}
case "openstack":
legacyIdentifier, err = nodeidentityos.New()
if err != nil {
return fmt.Errorf("error building identifier: %v", err)
}
case "digitalocean":
legacyIdentifier, err = nodeidentitydo.New()
if err != nil {
return fmt.Errorf("error building identifier: %v", err)
}
case "hetzner":
identifier, err = nodeidentityhetzner.New(opt.CacheNodeidentityInfo)
if err != nil {
return fmt.Errorf("error building identifier: %w", err)
}
case "azure":
identifier, err = nodeidentityazure.New(opt.CacheNodeidentityInfo)
if err != nil {
return fmt.Errorf("error building identifier: %v", err)
}
case "":
return fmt.Errorf("must specify cloud")
default:
return fmt.Errorf("identifier for cloud %q not implemented", opt.Cloud)
}
if identifier != nil {
nodeController, err := controllers.NewNodeReconciler(mgr, identifier)
if err != nil {
return err
}
if err := nodeController.SetupWithManager(mgr); err != nil {
return err
}
} else {
if opt.ConfigBase == "" {
return fmt.Errorf("must specify configBase")
}
nodeController, err := controllers.NewLegacyNodeReconciler(mgr, opt.ConfigBase, legacyIdentifier)
if err != nil {
return err
}
if err := nodeController.SetupWithManager(mgr); err != nil {
return err
}
}
return nil
}
func addGossipController(mgr manager.Manager, opt *config.Options) error {
if opt.Discovery == nil || !opt.Discovery.Enabled {
return nil
}
configMapID := types.NamespacedName{
Namespace: "kube-system",
Name: "coredns",
}
controller, err := controllers.NewHostsReconciler(mgr, configMapID)
if err != nil {
return err
}
if err := controller.SetupWithManager(mgr); err != nil {
return err
}
return nil
}