2022-09-05 03:06:08 -04:00
|
|
|
/*
|
|
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
*/
|
|
|
|
|
2022-06-07 07:47:38 -04:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2022-07-05 04:27:12 -04:00
|
|
|
"context"
|
2022-06-07 07:47:38 -04:00
|
|
|
"flag"
|
|
|
|
"os"
|
2022-07-05 04:27:12 -04:00
|
|
|
"strings"
|
2022-06-07 07:47:38 -04:00
|
|
|
|
|
|
|
// Import all Kubernetes client auth plugins (e.g. Azure, GCP, OIDC, etc.)
|
|
|
|
// to ensure that exec-entrypoint and run can make use of them.
|
2023-01-06 06:08:25 -05:00
|
|
|
"k8s.io/client-go/discovery"
|
2022-06-07 07:47:38 -04:00
|
|
|
_ "k8s.io/client-go/plugin/pkg/client/auth"
|
|
|
|
|
|
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
|
|
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
|
|
|
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
|
|
|
|
ctrl "sigs.k8s.io/controller-runtime"
|
2022-07-18 10:39:48 -04:00
|
|
|
"sigs.k8s.io/controller-runtime/pkg/client"
|
2022-06-07 07:47:38 -04:00
|
|
|
"sigs.k8s.io/controller-runtime/pkg/healthz"
|
|
|
|
"sigs.k8s.io/controller-runtime/pkg/log/zap"
|
2022-06-27 04:58:09 -04:00
|
|
|
|
2023-01-04 13:04:28 -05:00
|
|
|
azureclient "github.com/edgelesssys/constellation/v2/operators/constellation-node-operator/v2/internal/cloud/azure/client"
|
|
|
|
cloudfake "github.com/edgelesssys/constellation/v2/operators/constellation-node-operator/v2/internal/cloud/fake/client"
|
|
|
|
gcpclient "github.com/edgelesssys/constellation/v2/operators/constellation-node-operator/v2/internal/cloud/gcp/client"
|
|
|
|
"github.com/edgelesssys/constellation/v2/operators/constellation-node-operator/v2/internal/deploy"
|
2023-01-06 06:08:25 -05:00
|
|
|
"github.com/edgelesssys/constellation/v2/operators/constellation-node-operator/v2/internal/upgrade"
|
2023-01-04 13:04:28 -05:00
|
|
|
|
|
|
|
updatev1alpha1 "github.com/edgelesssys/constellation/v2/operators/constellation-node-operator/v2/api/v1alpha1"
|
|
|
|
"github.com/edgelesssys/constellation/v2/operators/constellation-node-operator/v2/controllers"
|
|
|
|
"github.com/edgelesssys/constellation/v2/operators/constellation-node-operator/v2/internal/etcd"
|
2022-07-01 10:42:08 -04:00
|
|
|
nodemaintenancev1beta1 "github.com/medik8s/node-maintenance-operator/api/v1beta1"
|
2022-06-07 07:47:38 -04:00
|
|
|
//+kubebuilder:scaffold:imports
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
scheme = runtime.NewScheme()
|
|
|
|
setupLog = ctrl.Log.WithName("setup")
|
|
|
|
)
|
|
|
|
|
2022-07-22 10:28:09 -04:00
|
|
|
const (
|
|
|
|
defaultAzureCloudConfigPath = "/etc/azure/azure.json"
|
2022-07-29 09:00:15 -04:00
|
|
|
defaultGCPCloudConfigPath = "/etc/gce/gce.conf"
|
2022-07-26 04:32:01 -04:00
|
|
|
// constellationCSP is the environment variable stating which Cloud Service Provider Constellation is running on.
|
|
|
|
constellationCSP = "CONSTEL_CSP"
|
2022-07-29 09:00:15 -04:00
|
|
|
// constellationUID is the environment variable stating which uid is used to tag / label cloud provider resources belonging to one constellation.
|
|
|
|
constellationUID = "constellation-uid"
|
2022-07-22 10:28:09 -04:00
|
|
|
)
|
|
|
|
|
2022-06-07 07:47:38 -04:00
|
|
|
func init() {
|
|
|
|
utilruntime.Must(clientgoscheme.AddToScheme(scheme))
|
2022-07-01 10:42:08 -04:00
|
|
|
utilruntime.Must(nodemaintenancev1beta1.AddToScheme(scheme))
|
2022-06-27 04:58:09 -04:00
|
|
|
utilruntime.Must(updatev1alpha1.AddToScheme(scheme))
|
2022-06-07 07:47:38 -04:00
|
|
|
//+kubebuilder:scaffold:scheme
|
|
|
|
}
|
|
|
|
|
|
|
|
func main() {
|
2022-07-22 10:28:09 -04:00
|
|
|
var cloudConfigPath string
|
2022-06-07 07:47:38 -04:00
|
|
|
var metricsAddr string
|
|
|
|
var enableLeaderElection bool
|
|
|
|
var probeAddr string
|
2022-07-22 10:28:09 -04:00
|
|
|
flag.StringVar(&cloudConfigPath, "cloud-config", "", "Path to provider specific cloud config. Optional.")
|
2022-06-07 07:47:38 -04:00
|
|
|
flag.StringVar(&metricsAddr, "metrics-bind-address", ":8080", "The address the metric endpoint binds to.")
|
|
|
|
flag.StringVar(&probeAddr, "health-probe-bind-address", ":8081", "The address the probe endpoint binds to.")
|
|
|
|
flag.BoolVar(&enableLeaderElection, "leader-elect", false,
|
|
|
|
"Enable leader election for controller manager. "+
|
|
|
|
"Enabling this will ensure there is only one active controller manager.")
|
|
|
|
opts := zap.Options{
|
|
|
|
Development: true,
|
|
|
|
}
|
|
|
|
opts.BindFlags(flag.CommandLine)
|
|
|
|
flag.Parse()
|
|
|
|
|
|
|
|
ctrl.SetLogger(zap.New(zap.UseFlagOptions(&opts)))
|
|
|
|
|
2022-12-09 12:30:20 -05:00
|
|
|
// Create CSP client
|
2022-07-05 04:27:12 -04:00
|
|
|
var cspClient cspAPI
|
2022-07-05 08:39:17 -04:00
|
|
|
var clientErr error
|
2022-07-26 04:32:01 -04:00
|
|
|
csp := strings.ToLower(os.Getenv(constellationCSP))
|
|
|
|
switch csp {
|
2022-07-05 04:27:12 -04:00
|
|
|
case "azure":
|
2022-07-22 10:28:09 -04:00
|
|
|
if cloudConfigPath == "" {
|
|
|
|
cloudConfigPath = defaultAzureCloudConfigPath
|
|
|
|
}
|
|
|
|
cspClient, clientErr = azureclient.NewFromDefault(cloudConfigPath)
|
2022-07-18 04:19:12 -04:00
|
|
|
if clientErr != nil {
|
|
|
|
setupLog.Error(clientErr, "Unable to create Azure client")
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2022-07-05 04:27:12 -04:00
|
|
|
case "gcp":
|
2022-07-29 09:00:15 -04:00
|
|
|
if cloudConfigPath == "" {
|
|
|
|
cloudConfigPath = defaultGCPCloudConfigPath
|
|
|
|
}
|
|
|
|
cspClient, clientErr = gcpclient.New(context.Background(), cloudConfigPath)
|
2022-07-05 08:39:17 -04:00
|
|
|
if clientErr != nil {
|
|
|
|
setupLog.Error(clientErr, "unable to create GCP client")
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2022-07-05 04:27:12 -04:00
|
|
|
default:
|
2022-12-09 12:30:20 -05:00
|
|
|
setupLog.Info("CSP does not support upgrades", "csp", csp)
|
2023-01-04 10:44:47 -05:00
|
|
|
cspClient = &cloudfake.Client{}
|
2022-07-05 04:27:12 -04:00
|
|
|
}
|
|
|
|
|
2022-06-07 07:47:38 -04:00
|
|
|
mgr, err := ctrl.NewManager(ctrl.GetConfigOrDie(), ctrl.Options{
|
|
|
|
Scheme: scheme,
|
|
|
|
MetricsBindAddress: metricsAddr,
|
|
|
|
Port: 9443,
|
|
|
|
HealthProbeBindAddress: probeAddr,
|
|
|
|
LeaderElection: enableLeaderElection,
|
|
|
|
LeaderElectionID: "38cc1645.edgeless.systems",
|
|
|
|
})
|
|
|
|
if err != nil {
|
2022-07-07 08:14:16 -04:00
|
|
|
setupLog.Error(err, "Unable to start manager")
|
2022-06-07 07:47:38 -04:00
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
|
2022-07-18 10:39:48 -04:00
|
|
|
k8sClient, err := client.New(ctrl.GetConfigOrDie(), client.Options{Scheme: scheme})
|
|
|
|
if err != nil {
|
|
|
|
setupLog.Error(err, "Unable to create k8s client")
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2023-01-06 06:08:25 -05:00
|
|
|
discoveryClient, err := discovery.NewDiscoveryClientForConfig(ctrl.GetConfigOrDie())
|
|
|
|
if err != nil {
|
|
|
|
setupLog.Error(err, "Unable to create discovery client")
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2022-07-18 10:39:48 -04:00
|
|
|
etcdClient, err := etcd.New(k8sClient)
|
|
|
|
if err != nil {
|
|
|
|
setupLog.Error(err, "Unable to create etcd client")
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
defer etcdClient.Close()
|
2022-12-09 12:30:20 -05:00
|
|
|
|
2023-01-04 10:44:47 -05:00
|
|
|
imageInfo := deploy.NewImageInfo()
|
|
|
|
if err := deploy.InitialResources(context.Background(), k8sClient, imageInfo, cspClient, os.Getenv(constellationUID)); err != nil {
|
|
|
|
setupLog.Error(err, "Unable to deploy initial resources")
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2022-12-09 12:30:20 -05:00
|
|
|
// Create Controllers
|
|
|
|
if csp == "azure" || csp == "gcp" {
|
2023-01-03 06:09:53 -05:00
|
|
|
if err = controllers.NewNodeVersionReconciler(
|
2023-01-06 06:08:25 -05:00
|
|
|
cspClient, etcdClient, upgrade.NewClient(), discoveryClient, mgr.GetClient(), mgr.GetScheme(),
|
2022-12-09 12:30:20 -05:00
|
|
|
).SetupWithManager(mgr); err != nil {
|
2023-01-03 06:09:53 -05:00
|
|
|
setupLog.Error(err, "Unable to create controller", "controller", "NodeVersion")
|
2022-12-09 12:30:20 -05:00
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
if err = (&controllers.AutoscalingStrategyReconciler{
|
|
|
|
Client: mgr.GetClient(),
|
|
|
|
Scheme: mgr.GetScheme(),
|
|
|
|
}).SetupWithManager(mgr); err != nil {
|
|
|
|
setupLog.Error(err, "Unable to create controller", "controller", "AutoscalingStrategy")
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
if err = controllers.NewScalingGroupReconciler(
|
|
|
|
cspClient, mgr.GetClient(), mgr.GetScheme(),
|
|
|
|
).SetupWithManager(mgr); err != nil {
|
|
|
|
setupLog.Error(err, "Unable to create controller", "controller", "ScalingGroup")
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
if err = controllers.NewPendingNodeReconciler(
|
|
|
|
cspClient, mgr.GetClient(), mgr.GetScheme(),
|
|
|
|
).SetupWithManager(mgr); err != nil {
|
|
|
|
setupLog.Error(err, "Unable to create controller", "controller", "PendingNode")
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2022-07-29 09:00:15 -04:00
|
|
|
}
|
|
|
|
|
2022-12-09 12:30:20 -05:00
|
|
|
if err = controllers.NewJoiningNodesReconciler(
|
|
|
|
mgr.GetClient(),
|
|
|
|
mgr.GetScheme(),
|
2022-07-05 04:27:12 -04:00
|
|
|
).SetupWithManager(mgr); err != nil {
|
2022-12-06 12:48:01 -05:00
|
|
|
setupLog.Error(err, "Unable to create controller", "controller", "JoiningNode")
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2022-12-09 12:30:20 -05:00
|
|
|
|
2022-06-07 07:47:38 -04:00
|
|
|
//+kubebuilder:scaffold:builder
|
|
|
|
|
|
|
|
if err := mgr.AddHealthzCheck("healthz", healthz.Ping); err != nil {
|
2022-07-07 08:14:16 -04:00
|
|
|
setupLog.Error(err, "Unable to set up health check")
|
2022-06-07 07:47:38 -04:00
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
if err := mgr.AddReadyzCheck("readyz", healthz.Ping); err != nil {
|
2022-07-07 08:14:16 -04:00
|
|
|
setupLog.Error(err, "Unable to set up ready check")
|
2022-06-07 07:47:38 -04:00
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
|
2022-07-07 08:14:16 -04:00
|
|
|
setupLog.Info("Starting manager")
|
2022-06-07 07:47:38 -04:00
|
|
|
if err := mgr.Start(ctrl.SetupSignalHandler()); err != nil {
|
2022-07-07 08:14:16 -04:00
|
|
|
setupLog.Error(err, "Problem running manager")
|
2022-06-07 07:47:38 -04:00
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
}
|
2022-07-05 04:27:12 -04:00
|
|
|
|
|
|
|
type cspAPI interface {
|
|
|
|
// GetNodeImage retrieves the image currently used by a node.
|
|
|
|
GetNodeImage(ctx context.Context, providerID string) (string, error)
|
|
|
|
// GetScalingGroupID retrieves the scaling group that a node is part of.
|
|
|
|
GetScalingGroupID(ctx context.Context, providerID string) (string, error)
|
|
|
|
// CreateNode creates a new node inside a specified scaling group at the CSP and returns its future name and provider id.
|
|
|
|
CreateNode(ctx context.Context, scalingGroupID string) (nodeName, providerID string, err error)
|
|
|
|
// DeleteNode starts the termination of the node at the CSP.
|
|
|
|
DeleteNode(ctx context.Context, providerID string) error
|
|
|
|
// GetNodeState retrieves the state of a pending node from a CSP.
|
|
|
|
GetNodeState(ctx context.Context, providerID string) (updatev1alpha1.CSPNodeState, error)
|
|
|
|
// GetScalingGroupImage retrieves the image currently used by a scaling group.
|
|
|
|
GetScalingGroupImage(ctx context.Context, scalingGroupID string) (string, error)
|
|
|
|
// SetScalingGroupImage sets the image to be used by newly created nodes in a scaling group.
|
|
|
|
SetScalingGroupImage(ctx context.Context, scalingGroupID, imageURI string) error
|
2022-07-29 09:00:15 -04:00
|
|
|
// GetScalingGroupName retrieves the name of a scaling group.
|
2022-09-15 10:48:32 -04:00
|
|
|
GetScalingGroupName(scalingGroupID string) (string, error)
|
2023-01-04 10:44:47 -05:00
|
|
|
// GetAutoscalingGroupName retrieves the name of a scaling group as needed by the cluster-autoscaler.
|
2022-09-15 10:48:32 -04:00
|
|
|
GetAutoscalingGroupName(scalingGroupID string) (string, error)
|
2022-07-29 09:00:15 -04:00
|
|
|
// ListScalingGroups retrieves a list of scaling groups for the cluster.
|
|
|
|
ListScalingGroups(ctx context.Context, uid string) (controlPlaneGroupIDs []string, workerGroupIDs []string, err error)
|
2022-09-15 10:48:32 -04:00
|
|
|
// AutoscalingCloudProvider returns the cloud-provider name as used by k8s cluster-autoscaler.
|
|
|
|
AutoscalingCloudProvider() string
|
2022-07-05 04:27:12 -04:00
|
|
|
}
|