1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
|
package policycontroller
import (
"context"
"fmt"
"k8s.io/apimachinery/pkg/runtime"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
"k8s.io/client-go/kubernetes/scheme"
"k8s.io/client-go/rest"
"k8s.io/klog/v2"
controllerruntime "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/manager"
policyv1alpha1 "github.com/kubeedge/api/apis/policy/v1alpha1"
"github.com/kubeedge/beehive/pkg/core"
beehiveContext "github.com/kubeedge/beehive/pkg/core/context"
"github.com/kubeedge/kubeedge/cloud/pkg/common/messagelayer"
"github.com/kubeedge/kubeedge/cloud/pkg/common/modules"
pm "github.com/kubeedge/kubeedge/cloud/pkg/policycontroller/manager"
kefeatures "github.com/kubeedge/kubeedge/pkg/features"
)
// policyController use beehive context message layer
type policyController struct {
manager manager.Manager
ctx context.Context
}
var _ core.Module = (*policyController)(nil)
var accessScheme = runtime.NewScheme()
func init() {
utilruntime.Must(scheme.AddToScheme(accessScheme))
utilruntime.Must(policyv1alpha1.AddToScheme(accessScheme))
}
func NewAccessRoleControllerManager(ctx context.Context, kubeCfg *rest.Config) (manager.Manager, error) {
controllerManager, err := controllerruntime.NewManager(kubeCfg, controllerruntime.Options{
Scheme: accessScheme,
MetricsBindAddress: "0", // disable metrics
// TODO: leader election
// TODO: /healthz
})
if err != nil {
return nil, fmt.Errorf("failed to create controller manager, %v", err)
}
if err := setupControllers(ctx, controllerManager); err != nil {
return nil, err
}
return controllerManager, nil
}
func setupControllers(ctx context.Context, mgr manager.Manager) error {
// This returned cli will directly acquire the unstructured objects from API Server which
// have not be registered in the accessScheme.
cli := mgr.GetClient()
pc := &pm.Controller{
Client: cli,
MessageLayer: messagelayer.PolicyControllerMessageLayer(),
}
klog.Info("setup policy controller")
if err := pc.SetupWithManager(ctx, mgr); err != nil {
return fmt.Errorf("failed to setup nodegroup controller, %v", err)
}
return nil
}
func Register(kubeCfg *rest.Config) {
var pc = &policyController{}
pc.ctx = beehiveContext.GetContext()
mgr, err := NewAccessRoleControllerManager(pc.ctx, kubeCfg)
if err != nil {
klog.Fatalf("failed to create controller manager, %v", err)
}
pc.manager = mgr
core.Register(pc)
}
// Name of controller
func (pc *policyController) Name() string {
return modules.PolicyControllerModuleName
}
// Group of controller
func (pc *policyController) Group() string {
return modules.PolicyControllerGroupName
}
// Enable indicates whether enable this module
func (pc *policyController) Enable() bool {
return kefeatures.DefaultFeatureGate.Enabled(kefeatures.RequireAuthorization)
}
// Start controller
func (pc *policyController) Start() {
// mgr.Start will block until the manager has stopped
if err := pc.manager.Start(pc.ctx); err != nil {
klog.Fatalf("failed to start controller manager, %v", err)
}
}
|