elemental-operator/controllers/machineregistration_control...

347 lines
12 KiB
Go

/*
Copyright © 2022 - 2025 SUSE LLC
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package controllers
import (
"context"
"errors"
"fmt"
"github.com/google/go-cmp/cmp"
managementv3 "github.com/rancher/rancher/pkg/apis/management.cattle.io/v3"
"github.com/rancher/wrangler/v2/pkg/randomtoken"
corev1 "k8s.io/api/core/v1"
rbacv1 "k8s.io/api/rbac/v1"
apierrors "k8s.io/apimachinery/pkg/api/errors"
"k8s.io/apimachinery/pkg/api/meta"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
errorutils "k8s.io/apimachinery/pkg/util/errors"
"k8s.io/utils/ptr"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
"sigs.k8s.io/controller-runtime/pkg/event"
"sigs.k8s.io/controller-runtime/pkg/predicate"
"sigs.k8s.io/controller-runtime/pkg/reconcile"
elementalv1 "github.com/rancher/elemental-operator/api/v1beta1"
"github.com/rancher/elemental-operator/pkg/log"
"github.com/rancher/elemental-operator/pkg/util"
)
// MachineRegistrationReconciler reconciles a MachineRegistration object.
type MachineRegistrationReconciler struct {
client.Client
}
// +kubebuilder:rbac:groups=elemental.cattle.io,resources=machineregistrations,verbs=get;list;watch;create;update;patch;delete
// +kubebuilder:rbac:groups=elemental.cattle.io,resources=machineregistrations/status,verbs=get;update;patch
// +kubebuilder:rbac:groups="rbac.authorization.k8s.io",resources=rolebindings;roles,verbs=create;delete;list;watch
// +kubebuilder:rbac:groups="management.cattle.io",resources=settings,verbs=get;list;watch
// +kubebuilder:rbac:groups="",resources=serviceaccounts,verbs=create;delete;get;list;watch
// +kubebuilder:rbac:groups="",resources=secrets,verbs=create;delete;list;watch;update
func (r *MachineRegistrationReconciler) SetupWithManager(mgr ctrl.Manager) error {
return ctrl.NewControllerManagedBy(mgr).
For(&elementalv1.MachineRegistration{}).
Owns(&corev1.ServiceAccount{}).
WithEventFilter(r.ignoreIncrementalStatusUpdate()).
Complete(r)
}
func (r *MachineRegistrationReconciler) Reconcile(ctx context.Context, req reconcile.Request) (ctrl.Result, error) { //nolint:dupl
logger := ctrl.LoggerFrom(ctx)
mRegistration := &elementalv1.MachineRegistration{}
err := r.Get(ctx, req.NamespacedName, mRegistration)
if err != nil {
if apierrors.IsNotFound(err) {
logger.V(log.DebugDepth).Info("Object was not found, not an error")
return reconcile.Result{}, nil
}
return reconcile.Result{}, fmt.Errorf("failed to get machine registration object: %w", err)
}
// Ensure we patch the latest version otherwise we could erratically overlap with other controllers (e.g. backup and restore)
patchBase := client.MergeFromWithOptions(mRegistration.DeepCopy(), client.MergeFromWithOptimisticLock{})
// We have to sanitize the conditions because old API definitions didn't have proper validation.
mRegistration.Status.Conditions = util.RemoveInvalidConditions(mRegistration.Status.Conditions)
// Collect errors as an aggregate to return together after all patches have been performed.
var errs []error
result, err := r.reconcile(ctx, mRegistration)
if err != nil {
errs = append(errs, fmt.Errorf("error reconciling machine registration object: %w", err))
}
machineRegistrationStatusCopy := mRegistration.Status.DeepCopy() // Patch call will erase the status
if err := r.Patch(ctx, mRegistration, patchBase); err != nil && !apierrors.IsNotFound(err) {
errs = append(errs, fmt.Errorf("failed to patch machine registration object: %w", err))
}
mRegistration.Status = *machineRegistrationStatusCopy
if err := r.Status().Patch(ctx, mRegistration, patchBase); err != nil && !apierrors.IsNotFound(err) {
errs = append(errs, fmt.Errorf("failed to patch status for machine registration object: %w", err))
}
if len(errs) > 0 {
return ctrl.Result{}, errorutils.NewAggregate(errs)
}
return result, nil
}
func (r *MachineRegistrationReconciler) reconcile(ctx context.Context, mRegistration *elementalv1.MachineRegistration) (ctrl.Result, error) {
logger := ctrl.LoggerFrom(ctx)
logger.Info("Reconciling machineregistration object")
if mRegistration.GetDeletionTimestamp() != nil {
controllerutil.RemoveFinalizer(mRegistration, elementalv1.MachineRegistrationFinalizer)
return ctrl.Result{}, nil
}
if r.isReady(ctx, mRegistration) {
logger.Info("Machine registration is ready, no need to reconcile it")
return ctrl.Result{}, nil
}
if err := r.setRegistrationTokenAndURL(ctx, mRegistration); err != nil {
meta.SetStatusCondition(&mRegistration.Status.Conditions, metav1.Condition{
Type: elementalv1.ReadyCondition,
Status: metav1.ConditionFalse,
Reason: elementalv1.MissingTokenOrServerURLReason,
Message: err.Error(),
})
return ctrl.Result{}, fmt.Errorf("failed to set registration token and url: %w", err)
}
if err := r.createRBACObjects(ctx, mRegistration); err != nil {
meta.SetStatusCondition(&mRegistration.Status.Conditions, metav1.Condition{
Type: elementalv1.ReadyCondition,
Status: metav1.ConditionFalse,
Reason: elementalv1.RbacCreationFailureReason,
Message: err.Error(),
})
return ctrl.Result{}, fmt.Errorf("failed to create RBAC objects: %w", err)
}
meta.SetStatusCondition(&mRegistration.Status.Conditions, metav1.Condition{
Type: elementalv1.ReadyCondition,
Reason: elementalv1.SuccessfullyCreatedReason,
Status: metav1.ConditionTrue,
})
return ctrl.Result{}, nil
}
func (r *MachineRegistrationReconciler) isReady(ctx context.Context, mRegistration *elementalv1.MachineRegistration) bool {
if meta.IsStatusConditionTrue(mRegistration.Status.Conditions, elementalv1.ReadyCondition) {
// Despite being on ready state we check if the serviceaccount token is still available as it can be deleted
// by the control plane during backup & restore operations see: rancher/elemental#776
if err := r.Get(ctx, types.NamespacedName{
Namespace: mRegistration.Namespace,
Name: mRegistration.Name,
}, &corev1.Secret{}); err != nil {
return false
}
return true
}
return false
}
func (r *MachineRegistrationReconciler) setRegistrationTokenAndURL(ctx context.Context, mRegistration *elementalv1.MachineRegistration) error {
var err error
var serverURL string
logger := ctrl.LoggerFrom(ctx)
logger.Info("Setting registration token and url")
if mRegistration.Status.RegistrationToken == "" {
mRegistration.Status.RegistrationToken, err = randomtoken.Generate()
if err != nil {
return fmt.Errorf("failed to generate registration token: %w", err)
}
}
if mRegistration.Status.RegistrationURL == "" {
serverURL, err = r.getRancherServerURL(ctx)
if err != nil {
return fmt.Errorf("failed to get the server url: %w", err)
}
mRegistration.Status.RegistrationURL = fmt.Sprintf("%s/elemental/registration/%s", serverURL, mRegistration.Status.RegistrationToken)
}
return nil
}
func (r *MachineRegistrationReconciler) getRancherServerURL(ctx context.Context) (string, error) {
logger := ctrl.LoggerFrom(ctx)
setting := &managementv3.Setting{}
if err := r.Get(ctx, types.NamespacedName{Name: "server-url"}, setting); err != nil {
return "", fmt.Errorf("failed to get server url setting: %w", err)
}
if setting.Value == "" {
err := errors.New("server-url is not set")
logger.Error(err, "can't get server-url")
return "", err
}
return setting.Value, nil
}
func (r *MachineRegistrationReconciler) createRBACObjects(ctx context.Context, mRegistration *elementalv1.MachineRegistration) error {
logger := ctrl.LoggerFrom(ctx)
logger.Info("Reconciling RBAC resources")
ownerReferences := []metav1.OwnerReference{
{
APIVersion: elementalv1.GroupVersion.String(),
Kind: "MachineRegistration",
Name: mRegistration.Name,
UID: mRegistration.UID,
Controller: ptr.To(true),
},
}
logger.Info("Creating role")
if err := r.Create(ctx, &rbacv1.Role{
ObjectMeta: metav1.ObjectMeta{
Name: mRegistration.Name,
Namespace: mRegistration.Namespace,
OwnerReferences: ownerReferences,
Labels: map[string]string{
elementalv1.ElementalManagedLabel: "true",
},
},
Rules: []rbacv1.PolicyRule{{
APIGroups: []string{""},
Verbs: []string{"get", "watch", "list", "update", "patch"}, // TODO: Review permissions, does it need update, patch?
Resources: []string{"secrets"},
}, {
APIGroups: []string{"management.cattle.io"},
Verbs: []string{"get", "watch", "list"},
Resources: []string{"settings"},
},
},
}); err != nil && !apierrors.IsAlreadyExists(err) {
return fmt.Errorf("failed to create role: %w", err)
}
logger.Info("Creating service account")
if err := r.Create(ctx, &corev1.ServiceAccount{
ObjectMeta: metav1.ObjectMeta{
Name: mRegistration.Name,
Namespace: mRegistration.Namespace,
OwnerReferences: ownerReferences,
Labels: map[string]string{
elementalv1.ElementalManagedLabel: "true",
},
},
}); err != nil && !apierrors.IsAlreadyExists(err) {
return fmt.Errorf("Failed to create service account: %w", err)
}
logger.Info("Creating token secret for the service account")
if err := r.Create(ctx, &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: mRegistration.Name + elementalv1.SASecretSuffix,
Namespace: mRegistration.Namespace,
OwnerReferences: ownerReferences,
Annotations: map[string]string{
"kubernetes.io/service-account.name": mRegistration.Name,
},
},
Type: corev1.SecretTypeServiceAccountToken,
}); err != nil && !apierrors.IsAlreadyExists(err) {
return fmt.Errorf("failed to create secret: %w", err)
}
logger.Info("Creating role binding")
if err := r.Create(ctx, &rbacv1.RoleBinding{
ObjectMeta: metav1.ObjectMeta{
Namespace: mRegistration.Namespace,
Name: mRegistration.Name,
OwnerReferences: ownerReferences,
Labels: map[string]string{
elementalv1.ElementalManagedLabel: "true",
},
},
Subjects: []rbacv1.Subject{{
Kind: "ServiceAccount",
Name: mRegistration.Name,
Namespace: mRegistration.Namespace,
}},
RoleRef: rbacv1.RoleRef{
Kind: "Role",
Name: mRegistration.Name,
APIGroup: "rbac.authorization.k8s.io",
},
}); err != nil && !apierrors.IsAlreadyExists(err) {
return fmt.Errorf("failed to create service account: %w", err)
}
logger.Info("Setting service account ref")
mRegistration.Status.ServiceAccountRef = &corev1.ObjectReference{
Kind: "ServiceAccount",
Namespace: mRegistration.Namespace,
Name: mRegistration.Name,
}
return nil
}
func (r *MachineRegistrationReconciler) ignoreIncrementalStatusUpdate() predicate.Funcs {
return predicate.Funcs{
// Avoid reconciling if the event triggering the reconciliation is related to incremental status updates
// for MachineRegistration resources only
UpdateFunc: func(e event.UpdateEvent) bool {
logger := ctrl.LoggerFrom(context.Background())
if oldMRegistration, ok := e.ObjectOld.(*elementalv1.MachineRegistration); ok {
oldMRegistration = oldMRegistration.DeepCopy()
newMregistration := e.ObjectNew.(*elementalv1.MachineRegistration).DeepCopy()
// Ignore all fields that might be updated on a status update
oldMRegistration.Status = elementalv1.MachineRegistrationStatus{}
newMregistration.Status = elementalv1.MachineRegistrationStatus{}
oldMRegistration.ObjectMeta.ResourceVersion = ""
newMregistration.ObjectMeta.ResourceVersion = ""
oldMRegistration.ManagedFields = []metav1.ManagedFieldsEntry{}
newMregistration.ManagedFields = []metav1.ManagedFieldsEntry{}
update := !cmp.Equal(oldMRegistration, newMregistration)
if !update {
logger.V(log.DebugDepth).Info("Ignoring status update", "MRegistration", oldMRegistration.Name)
}
return !cmp.Equal(oldMRegistration, newMregistration)
}
// Return true in case it watches other resources
return true
},
}
}