Andrey Smirnov c3e4182000
refactor: use COSI runtime with new controller runtime DB
See https://github.com/cosi-project/runtime/pull/336

Signed-off-by: Andrey Smirnov <andrey.smirnov@siderolabs.com>
2023-10-12 19:44:44 +04:00

306 lines
8.8 KiB
Go

// This Source Code Form is subject to the terms of the Mozilla Public
// License, v. 2.0. If a copy of the MPL was not distributed with this
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
package k8s
import (
"context"
"fmt"
"sort"
"github.com/cosi-project/runtime/pkg/controller"
"github.com/cosi-project/runtime/pkg/resource"
"github.com/cosi-project/runtime/pkg/state"
"github.com/hashicorp/go-multierror"
"github.com/siderolabs/gen/optional"
"github.com/siderolabs/gen/xslices"
"go.uber.org/zap"
"go.uber.org/zap/zapcore"
corev1 "k8s.io/api/core/v1"
apierrors "k8s.io/apimachinery/pkg/api/errors"
"k8s.io/apimachinery/pkg/api/meta"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
"k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/client-go/discovery"
memory "k8s.io/client-go/discovery/cached"
"k8s.io/client-go/dynamic"
"k8s.io/client-go/rest"
"k8s.io/client-go/restmapper"
"k8s.io/client-go/tools/clientcmd"
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
k8sadapter "github.com/siderolabs/talos/internal/app/machined/pkg/adapters/k8s"
"github.com/siderolabs/talos/internal/pkg/etcd"
"github.com/siderolabs/talos/pkg/logging"
"github.com/siderolabs/talos/pkg/machinery/constants"
"github.com/siderolabs/talos/pkg/machinery/resources/k8s"
"github.com/siderolabs/talos/pkg/machinery/resources/secrets"
"github.com/siderolabs/talos/pkg/machinery/resources/v1alpha1"
)
// ManifestApplyController applies manifests via control plane endpoint.
type ManifestApplyController struct{}
// Name implements controller.Controller interface.
func (ctrl *ManifestApplyController) Name() string {
return "k8s.ManifestApplyController"
}
// Inputs implements controller.Controller interface.
func (ctrl *ManifestApplyController) Inputs() []controller.Input {
return []controller.Input{
{
Namespace: secrets.NamespaceName,
Type: secrets.KubernetesType,
ID: optional.Some(secrets.KubernetesID),
Kind: controller.InputWeak,
},
{
Namespace: k8s.ControlPlaneNamespaceName,
Type: k8s.ManifestType,
Kind: controller.InputWeak,
},
{
Namespace: v1alpha1.NamespaceName,
Type: v1alpha1.ServiceType,
ID: optional.Some("etcd"),
Kind: controller.InputWeak,
},
}
}
// Outputs implements controller.Controller interface.
func (ctrl *ManifestApplyController) Outputs() []controller.Output {
return []controller.Output{
{
Type: k8s.ManifestStatusType,
Kind: controller.OutputExclusive,
},
}
}
// Run implements controller.Controller interface.
//
//nolint:gocyclo
func (ctrl *ManifestApplyController) Run(ctx context.Context, r controller.Runtime, logger *zap.Logger) error {
for {
select {
case <-ctx.Done():
return nil
case <-r.EventCh():
}
secretsResources, err := r.Get(ctx, resource.NewMetadata(secrets.NamespaceName, secrets.KubernetesType, secrets.KubernetesID, resource.VersionUndefined))
if err != nil {
if state.IsNotFoundError(err) {
continue
}
return err
}
secrets := secretsResources.(*secrets.Kubernetes).TypedSpec()
// wait for etcd to be healthy as controller relies on etcd for locking
etcdResource, err := r.Get(ctx, resource.NewMetadata(v1alpha1.NamespaceName, v1alpha1.ServiceType, "etcd", resource.VersionUndefined))
if err != nil {
if state.IsNotFoundError(err) {
continue
}
return err
}
if !etcdResource.(*v1alpha1.Service).TypedSpec().Healthy {
continue
}
manifests, err := r.List(ctx, resource.NewMetadata(k8s.ControlPlaneNamespaceName, k8s.ManifestType, "", resource.VersionUndefined))
if err != nil {
return fmt.Errorf("error listing manifests: %w", err)
}
sort.Slice(manifests.Items, func(i, j int) bool {
return manifests.Items[i].Metadata().ID() < manifests.Items[j].Metadata().ID()
})
if len(manifests.Items) > 0 {
var (
kubeconfig *rest.Config
dc *discovery.DiscoveryClient
dyn dynamic.Interface
)
kubeconfig, err = clientcmd.BuildConfigFromKubeconfigGetter("", func() (*clientcmdapi.Config, error) {
return clientcmd.Load([]byte(secrets.LocalhostAdminKubeconfig))
})
if err != nil {
return fmt.Errorf("error loading kubeconfig: %w", err)
}
kubeconfig.WarningHandler = rest.NewWarningWriter(logging.NewWriter(logger, zapcore.WarnLevel), rest.WarningWriterOptions{
Deduplicate: true,
})
dc, err = discovery.NewDiscoveryClientForConfig(kubeconfig)
if err != nil {
return fmt.Errorf("error building discovery client: %w", err)
}
mapper := restmapper.NewDeferredDiscoveryRESTMapper(memory.NewMemCacheClient(dc))
dyn, err = dynamic.NewForConfig(kubeconfig)
if err != nil {
return fmt.Errorf("error building dynamic client: %w", err)
}
if err = etcd.WithLock(ctx, constants.EtcdTalosManifestApplyMutex, logger, func() error {
return ctrl.apply(ctx, logger, mapper, dyn, manifests)
}); err != nil {
return err
}
}
if err = r.Modify(ctx, k8s.NewManifestStatus(k8s.ControlPlaneNamespaceName), func(r resource.Resource) error {
status := r.(*k8s.ManifestStatus).TypedSpec()
status.ManifestsApplied = xslices.Map(manifests.Items, func(m resource.Resource) string {
return m.Metadata().ID()
})
return nil
}); err != nil {
return fmt.Errorf("error updating manifest status: %w", err)
}
r.ResetRestartBackoff()
}
}
//nolint:gocyclo,cyclop
func (ctrl *ManifestApplyController) apply(ctx context.Context, logger *zap.Logger, mapper *restmapper.DeferredDiscoveryRESTMapper, dyn dynamic.Interface, manifests resource.List) error {
// flatten list of objects to be applied
objects := xslices.FlatMap(manifests.Items, func(m resource.Resource) []*unstructured.Unstructured {
return k8sadapter.Manifest(m.(*k8s.Manifest)).Objects()
})
// sort the list so that namespaces come first, followed by CRDs and everything else after that
sort.SliceStable(objects, func(i, j int) bool {
objL := objects[i]
objR := objects[j]
gvkL := objL.GroupVersionKind()
gvkR := objR.GroupVersionKind()
if isNamespace(gvkL) {
if !isNamespace(gvkR) {
return true
}
return objL.GetName() < objR.GetName()
}
if isNamespace(gvkR) {
return false
}
if isCRD(gvkL) {
if !isCRD(gvkR) {
return true
}
return objL.GetName() < objR.GetName()
}
if isCRD(gvkR) {
return false
}
return false
})
var multiErr *multierror.Error
for _, obj := range objects {
gvk := obj.GroupVersionKind()
objName := fmt.Sprintf("%s/%s/%s/%s", gvk.Group, gvk.Version, gvk.Kind, obj.GetName())
mapping, err := mapper.RESTMapping(obj.GroupVersionKind().GroupKind(), obj.GroupVersionKind().Version)
if err != nil {
switch {
case apierrors.IsNotFound(err):
fallthrough
case apierrors.IsInvalid(err):
fallthrough
case meta.IsNoMatchError(err):
// most probably a problem with the manifest, so we should continue with other manifests
multiErr = multierror.Append(multiErr, fmt.Errorf("error creating mapping for object %s: %w", objName, err))
continue
default:
// connection errors, etc.; it makes no sense to continue with other manifests
return fmt.Errorf("error creating mapping for object %s: %w", objName, err)
}
}
var dr dynamic.ResourceInterface
if mapping.Scope.Name() == meta.RESTScopeNameNamespace {
// default the namespace if it's not set in the manifest
if obj.GetNamespace() == "" {
obj.SetNamespace(corev1.NamespaceDefault)
}
// namespaced resources should specify the namespace
dr = dyn.Resource(mapping.Resource).Namespace(obj.GetNamespace())
} else {
// for cluster-wide resources
dr = dyn.Resource(mapping.Resource)
}
_, err = dr.Get(ctx, obj.GetName(), metav1.GetOptions{})
if err == nil {
// already exists
continue
}
if !apierrors.IsNotFound(err) {
return fmt.Errorf("error checking resource existence: %w", err)
}
_, err = dr.Create(ctx, obj, metav1.CreateOptions{
FieldManager: "talos",
})
if err != nil {
switch {
case apierrors.IsAlreadyExists(err):
// later on we might want to do something here, e.g. do server-side apply, for now do nothing
case apierrors.IsMethodNotSupported(err):
fallthrough
case apierrors.IsBadRequest(err):
fallthrough
case apierrors.IsInvalid(err):
// resource is malformed, continue with other manifests
multiErr = multierror.Append(multiErr, fmt.Errorf("error creating %s: %w", objName, err))
default:
// connection errors, etc.; it makes no sense to continue with other manifests
return fmt.Errorf("error creating %s: %w", objName, err)
}
} else {
logger.Sugar().Infof("created %s", objName)
}
}
return multiErr.ErrorOrNil()
}
func isNamespace(gvk schema.GroupVersionKind) bool {
return gvk.Kind == "Namespace" && gvk.Version == "v1"
}
func isCRD(gvk schema.GroupVersionKind) bool {
return gvk.Kind == "CustomResourceDefinition" && gvk.Group == "apiextensions.k8s.io"
}