mirror of
https://github.com/projectcapsule/capsule.git
synced 2026-02-14 18:09:58 +00:00
* chore(deps): update dependency golangci/golangci-lint to v2.8.0 * chore(deps): update dependency golangci/golangci-lint to v2.8.0 Signed-off-by: Hristo Hristov <me@hhristov.info> * chore(deps): update dependency golangci/golangci-lint to v2.8.0 Signed-off-by: Hristo Hristov <me@hhristov.info> * chore(deps): update dependency golangci/golangci-lint to v2.8.0 Signed-off-by: Hristo Hristov <me@hhristov.info> --------- Signed-off-by: Hristo Hristov <me@hhristov.info> Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com> Co-authored-by: Hristo Hristov <me@hhristov.info>
411 lines
15 KiB
Go
411 lines
15 KiB
Go
// Copyright 2020-2026 Project Capsule Authors
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package main
|
|
|
|
import (
|
|
goflag "flag"
|
|
"fmt"
|
|
"os"
|
|
goRuntime "runtime"
|
|
|
|
flag "github.com/spf13/pflag"
|
|
_ "go.uber.org/automaxprocs"
|
|
"go.uber.org/zap/zapcore"
|
|
corev1 "k8s.io/api/core/v1"
|
|
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
|
utilVersion "k8s.io/apimachinery/pkg/util/version"
|
|
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
|
|
_ "k8s.io/client-go/plugin/pkg/client/auth/gcp"
|
|
"k8s.io/client-go/rest"
|
|
ctrl "sigs.k8s.io/controller-runtime"
|
|
"sigs.k8s.io/controller-runtime/pkg/client"
|
|
"sigs.k8s.io/controller-runtime/pkg/healthz"
|
|
"sigs.k8s.io/controller-runtime/pkg/log/zap"
|
|
metricsserver "sigs.k8s.io/controller-runtime/pkg/metrics/server"
|
|
ctrlwebhook "sigs.k8s.io/controller-runtime/pkg/webhook"
|
|
gatewayv1 "sigs.k8s.io/gateway-api/apis/v1"
|
|
|
|
capsulev1beta1 "github.com/projectcapsule/capsule/api/v1beta1"
|
|
capsulev1beta2 "github.com/projectcapsule/capsule/api/v1beta2"
|
|
configcontroller "github.com/projectcapsule/capsule/internal/controllers/cfg"
|
|
podlabelscontroller "github.com/projectcapsule/capsule/internal/controllers/pod"
|
|
"github.com/projectcapsule/capsule/internal/controllers/pv"
|
|
rbaccontroller "github.com/projectcapsule/capsule/internal/controllers/rbac"
|
|
"github.com/projectcapsule/capsule/internal/controllers/resourcepools"
|
|
"github.com/projectcapsule/capsule/internal/controllers/resources"
|
|
servicelabelscontroller "github.com/projectcapsule/capsule/internal/controllers/servicelabels"
|
|
tenantcontroller "github.com/projectcapsule/capsule/internal/controllers/tenant"
|
|
tlscontroller "github.com/projectcapsule/capsule/internal/controllers/tls"
|
|
utilscontroller "github.com/projectcapsule/capsule/internal/controllers/utils"
|
|
"github.com/projectcapsule/capsule/internal/metrics"
|
|
"github.com/projectcapsule/capsule/internal/webhook"
|
|
cfgvalidation "github.com/projectcapsule/capsule/internal/webhook/cfg"
|
|
"github.com/projectcapsule/capsule/internal/webhook/defaults"
|
|
"github.com/projectcapsule/capsule/internal/webhook/dra"
|
|
"github.com/projectcapsule/capsule/internal/webhook/gateway"
|
|
"github.com/projectcapsule/capsule/internal/webhook/ingress"
|
|
"github.com/projectcapsule/capsule/internal/webhook/misc"
|
|
namespacemutation "github.com/projectcapsule/capsule/internal/webhook/namespace/mutation"
|
|
namespacevalidation "github.com/projectcapsule/capsule/internal/webhook/namespace/validation"
|
|
"github.com/projectcapsule/capsule/internal/webhook/networkpolicy"
|
|
"github.com/projectcapsule/capsule/internal/webhook/node"
|
|
"github.com/projectcapsule/capsule/internal/webhook/pod"
|
|
"github.com/projectcapsule/capsule/internal/webhook/pvc"
|
|
"github.com/projectcapsule/capsule/internal/webhook/resourcepool"
|
|
"github.com/projectcapsule/capsule/internal/webhook/route"
|
|
"github.com/projectcapsule/capsule/internal/webhook/service"
|
|
"github.com/projectcapsule/capsule/internal/webhook/serviceaccounts"
|
|
tenantmutation "github.com/projectcapsule/capsule/internal/webhook/tenant/mutation"
|
|
tenantvalidation "github.com/projectcapsule/capsule/internal/webhook/tenant/validation"
|
|
tntresource "github.com/projectcapsule/capsule/internal/webhook/tenantresource"
|
|
"github.com/projectcapsule/capsule/internal/webhook/utils"
|
|
"github.com/projectcapsule/capsule/pkg/configuration"
|
|
"github.com/projectcapsule/capsule/pkg/indexer"
|
|
)
|
|
|
|
var (
|
|
scheme = runtime.NewScheme()
|
|
setupLog = ctrl.Log.WithName("setup")
|
|
)
|
|
|
|
func init() {
|
|
utilruntime.Must(clientgoscheme.AddToScheme(scheme))
|
|
|
|
utilruntime.Must(capsulev1beta1.AddToScheme(scheme))
|
|
utilruntime.Must(capsulev1beta2.AddToScheme(scheme))
|
|
utilruntime.Must(apiextensionsv1.AddToScheme(scheme))
|
|
utilruntime.Must(gatewayv1.Install(scheme))
|
|
}
|
|
|
|
func printVersion() {
|
|
setupLog.Info(fmt.Sprintf("Capsule Version %s %s%s", GitTag, GitCommit, GitDirty))
|
|
setupLog.Info(fmt.Sprintf("Build from: %s", GitRepo))
|
|
setupLog.Info(fmt.Sprintf("Build date: %s", BuildTime))
|
|
setupLog.Info(fmt.Sprintf("Go Version: %s", goRuntime.Version()))
|
|
setupLog.Info(fmt.Sprintf("Go OS/Arch: %s/%s", goRuntime.GOOS, goRuntime.GOARCH))
|
|
}
|
|
|
|
//nolint:maintidx,cyclop
|
|
func main() {
|
|
controllerConfig := utilscontroller.ControllerOptions{}
|
|
|
|
var enableLeaderElection, enablePprof, version bool
|
|
|
|
var metricsAddr, ns string
|
|
|
|
var webhookPort int
|
|
|
|
var goFlagSet goflag.FlagSet
|
|
|
|
flag.IntVar(&controllerConfig.MaxConcurrentReconciles, "workers", 1, "MaxConcurrentReconciles is the maximum number of concurrent Reconciles which can be run.")
|
|
flag.IntVar(&webhookPort, "webhook-port", 9443, "The port the webhook server binds to.")
|
|
flag.StringVar(&metricsAddr, "metrics-addr", ":8080", "The address the metric endpoint binds to.")
|
|
flag.BoolVar(&enableLeaderElection, "enable-leader-election", false,
|
|
"Enable leader election for controller manager. "+
|
|
"Enabling this will ensure there is only one active controller manager.")
|
|
flag.BoolVar(&version, "version", false, "Print the Capsule version and exit")
|
|
flag.StringVar(&controllerConfig.ConfigurationName, "configuration-name", "default", "The CapsuleConfiguration resource name to use")
|
|
flag.BoolVar(&enablePprof, "enable-pprof", false, "Enables Pprof endpoint for profiling (not recommend in production)")
|
|
|
|
opts := zap.Options{
|
|
EncoderConfigOptions: append([]zap.EncoderConfigOption{}, func(config *zapcore.EncoderConfig) {
|
|
config.EncodeTime = zapcore.ISO8601TimeEncoder
|
|
}),
|
|
}
|
|
|
|
opts.BindFlags(&goFlagSet)
|
|
flag.CommandLine.AddGoFlagSet(&goFlagSet)
|
|
flag.Parse()
|
|
|
|
ctrl.SetLogger(zap.New(zap.UseFlagOptions(&opts)))
|
|
|
|
printVersion()
|
|
|
|
if version {
|
|
os.Exit(0)
|
|
}
|
|
|
|
setupLog.V(5).Info("Controller", "Options", controllerConfig)
|
|
|
|
if ns = os.Getenv("NAMESPACE"); len(ns) == 0 {
|
|
setupLog.Error(fmt.Errorf("unable to determinate the Namespace Capsule is running on"), "unable to start manager")
|
|
os.Exit(1)
|
|
}
|
|
|
|
if len(controllerConfig.ConfigurationName) == 0 {
|
|
setupLog.Error(fmt.Errorf("missing CapsuleConfiguration resource name"), "unable to start manager")
|
|
os.Exit(1)
|
|
}
|
|
|
|
ctrlOpts := ctrl.Options{
|
|
Scheme: scheme,
|
|
Metrics: metricsserver.Options{
|
|
BindAddress: metricsAddr,
|
|
},
|
|
WebhookServer: ctrlwebhook.NewServer(ctrlwebhook.Options{
|
|
Port: webhookPort,
|
|
}),
|
|
LeaderElection: enableLeaderElection,
|
|
LeaderElectionID: "42c733ea.clastix.capsule.io",
|
|
HealthProbeBindAddress: ":10080",
|
|
NewClient: func(config *rest.Config, options client.Options) (client.Client, error) {
|
|
options.Cache.Unstructured = true
|
|
|
|
return client.New(config, options)
|
|
},
|
|
}
|
|
|
|
if enablePprof {
|
|
ctrlOpts.PprofBindAddress = ":8082"
|
|
}
|
|
|
|
manager, err := ctrl.NewManager(ctrl.GetConfigOrDie(), ctrlOpts)
|
|
if err != nil {
|
|
setupLog.Error(err, "unable to start manager")
|
|
os.Exit(1)
|
|
}
|
|
|
|
_ = manager.AddReadyzCheck("ping", healthz.Ping)
|
|
_ = manager.AddHealthzCheck("ping", healthz.Ping)
|
|
|
|
ctx := ctrl.SetupSignalHandler()
|
|
|
|
cfg := configuration.NewCapsuleConfiguration(ctx, manager.GetClient(), controllerConfig.ConfigurationName)
|
|
|
|
directClient, err := client.New(ctrl.GetConfigOrDie(), client.Options{
|
|
Scheme: manager.GetScheme(),
|
|
Mapper: manager.GetRESTMapper(),
|
|
})
|
|
if err != nil {
|
|
setupLog.Error(err, "unable to create the direct client")
|
|
os.Exit(1)
|
|
}
|
|
|
|
directCfg := configuration.NewCapsuleConfiguration(ctx, directClient, controllerConfig.ConfigurationName)
|
|
|
|
if directCfg.EnableTLSConfiguration() {
|
|
tlsReconciler := &tlscontroller.Reconciler{
|
|
Client: directClient,
|
|
Log: ctrl.Log.WithName("controllers").WithName("TLS"),
|
|
Namespace: ns,
|
|
Configuration: directCfg,
|
|
}
|
|
|
|
if err = tlsReconciler.SetupWithManager(manager); err != nil {
|
|
setupLog.Error(err, "unable to create controller", "controller", "Namespace")
|
|
os.Exit(1)
|
|
}
|
|
|
|
tlsCert := &corev1.Secret{}
|
|
|
|
if err = directClient.Get(ctx, types.NamespacedName{Namespace: ns, Name: directCfg.TLSSecretName()}, tlsCert); err != nil {
|
|
setupLog.Error(err, "unable to get Capsule TLS secret")
|
|
os.Exit(1)
|
|
}
|
|
// Reconcile TLS certificates before starting controllers and webhooks
|
|
if err = tlsReconciler.ReconcileCertificates(ctx, tlsCert); err != nil {
|
|
setupLog.Error(err, "unable to reconcile Capsule TLS secret")
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
|
|
if err = (&tenantcontroller.Manager{
|
|
RESTConfig: manager.GetConfig(),
|
|
Client: manager.GetClient(),
|
|
Metrics: metrics.MustMakeTenantRecorder(),
|
|
Log: ctrl.Log.WithName("controllers").WithName("Tenant"),
|
|
Recorder: manager.GetEventRecorderFor("tenant-controller"),
|
|
Configuration: cfg,
|
|
}).SetupWithManager(manager, controllerConfig); err != nil {
|
|
setupLog.Error(err, "unable to create controller", "controller", "Tenant")
|
|
os.Exit(1)
|
|
}
|
|
|
|
if err = (&capsulev1beta1.Tenant{}).SetupWebhookWithManager(manager); err != nil {
|
|
setupLog.Error(err, "unable to create conversion webhook", "webhook", "capsulev1beta1.Tenant")
|
|
os.Exit(1)
|
|
}
|
|
|
|
if err = indexer.AddToManager(ctx, setupLog, manager); err != nil {
|
|
setupLog.Error(err, "unable to setup indexers")
|
|
os.Exit(1)
|
|
}
|
|
|
|
var kubeVersion *utilVersion.Version
|
|
|
|
if kubeVersion, err = utils.GetK8sVersion(); err != nil {
|
|
setupLog.Error(err, "unable to get kubernetes version")
|
|
os.Exit(1)
|
|
}
|
|
|
|
// webhooks: the order matters, don't change it and just append
|
|
webhooksList := append(
|
|
make([]webhook.Webhook, 0),
|
|
route.Pod(
|
|
pod.Handler(
|
|
pod.ImagePullPolicy(),
|
|
pod.ContainerRegistry(cfg),
|
|
pod.PriorityClass(),
|
|
pod.RuntimeClass(),
|
|
),
|
|
),
|
|
route.Ingress(ingress.Class(cfg, kubeVersion), ingress.Hostnames(cfg), ingress.Collision(cfg), ingress.Wildcard()),
|
|
route.PVC(
|
|
pvc.Handler(
|
|
pvc.Validating(),
|
|
pvc.PersistentVolumeReuse(),
|
|
),
|
|
),
|
|
route.Service(
|
|
service.Handler(
|
|
service.Validating(),
|
|
),
|
|
),
|
|
route.TenantResourceObjects(utils.InCapsuleGroups(cfg, tntresource.WriteOpsHandler())),
|
|
route.NetworkPolicy(utils.InCapsuleGroups(cfg, networkpolicy.Handler())),
|
|
route.Cordoning(tenantvalidation.CordoningHandler(cfg)),
|
|
route.Node(utils.InCapsuleGroups(cfg, node.UserMetadataHandler(cfg, kubeVersion))),
|
|
route.ServiceAccounts(
|
|
serviceaccounts.Handler(
|
|
serviceaccounts.Validating(cfg),
|
|
),
|
|
),
|
|
route.CustomResources(tenantvalidation.ResourceCounterHandler(manager.GetClient())),
|
|
route.Gateway(gateway.Class(cfg)),
|
|
route.DeviceClass(dra.DeviceClass()),
|
|
route.Defaults(defaults.Handler(cfg, kubeVersion)),
|
|
route.TenantMutation(
|
|
tenantmutation.MetaHandler(),
|
|
),
|
|
route.TenantValidation(
|
|
tenantvalidation.NameHandler(),
|
|
tenantvalidation.RoleBindingRegexHandler(),
|
|
tenantvalidation.IngressClassRegexHandler(),
|
|
tenantvalidation.StorageClassRegexHandler(),
|
|
tenantvalidation.ContainerRegistryRegexHandler(),
|
|
tenantvalidation.HostnameRegexHandler(),
|
|
tenantvalidation.FreezedEmitter(),
|
|
tenantvalidation.ServiceAccountNameHandler(),
|
|
tenantvalidation.ForbiddenAnnotationsRegexHandler(),
|
|
tenantvalidation.ProtectedHandler(),
|
|
tenantvalidation.WarningHandler(cfg),
|
|
),
|
|
route.NamespaceValidation(
|
|
namespacevalidation.NamespaceHandler(
|
|
cfg,
|
|
namespacevalidation.PatchHandler(cfg),
|
|
namespacevalidation.FreezeHandler(cfg),
|
|
namespacevalidation.QuotaHandler(),
|
|
namespacevalidation.PrefixHandler(cfg),
|
|
namespacevalidation.UserMetadataHandler(),
|
|
),
|
|
),
|
|
route.NamespaceMutation(
|
|
namespacemutation.NamespaceHandler(
|
|
cfg,
|
|
namespacemutation.OwnerReferenceHandler(cfg),
|
|
namespacemutation.MetadataHandler(cfg),
|
|
namespacemutation.CordoningLabelHandler(cfg),
|
|
),
|
|
),
|
|
route.ResourcePoolMutation((resourcepool.PoolMutationHandler(ctrl.Log.WithName("webhooks").WithName("resourcepool")))),
|
|
route.ResourcePoolValidation((resourcepool.PoolValidationHandler(ctrl.Log.WithName("webhooks").WithName("resourcepool")))),
|
|
route.ResourcePoolClaimMutation((resourcepool.ClaimMutationHandler(ctrl.Log.WithName("webhooks").WithName("resourcepoolclaims")))),
|
|
route.ResourcePoolClaimValidation((resourcepool.ClaimValidationHandler(ctrl.Log.WithName("webhooks").WithName("resourcepoolclaims")))),
|
|
route.TenantAssignment(
|
|
misc.TenantAssignmentHandler(),
|
|
),
|
|
route.ConfigValidation(
|
|
cfgvalidation.WarningHandler(),
|
|
),
|
|
)
|
|
|
|
nodeWebhookSupported, _ := utils.NodeWebhookSupported(kubeVersion)
|
|
if !nodeWebhookSupported {
|
|
setupLog.Info("Disabling node labels verification webhook as current Kubernetes version doesn't have fix for CVE-2021-25735")
|
|
}
|
|
|
|
if err = webhook.Register(manager, webhooksList...); err != nil {
|
|
setupLog.Error(err, "unable to setup webhooks")
|
|
os.Exit(1)
|
|
}
|
|
|
|
rbacManager := &rbaccontroller.Manager{
|
|
Log: ctrl.Log.WithName("controllers").WithName("Rbac"),
|
|
Client: manager.GetClient(),
|
|
Configuration: cfg,
|
|
}
|
|
|
|
if err = manager.Add(rbacManager); err != nil {
|
|
setupLog.Error(err, "unable to create cluster roles")
|
|
os.Exit(1)
|
|
}
|
|
|
|
if err = rbacManager.SetupWithManager(ctx, manager, controllerConfig); err != nil {
|
|
setupLog.Error(err, "unable to create controller", "controller", "Rbac")
|
|
os.Exit(1)
|
|
}
|
|
|
|
if err = (&servicelabelscontroller.ServicesLabelsReconciler{
|
|
Log: ctrl.Log.WithName("controllers").WithName("ServiceLabels"),
|
|
}).SetupWithManager(ctx, manager); err != nil {
|
|
setupLog.Error(err, "unable to create controller", "controller", "ServiceLabels")
|
|
os.Exit(1)
|
|
}
|
|
|
|
if err = (&servicelabelscontroller.EndpointSlicesLabelsReconciler{
|
|
Log: ctrl.Log.WithName("controllers").WithName("EndpointSliceLabels"),
|
|
}).SetupWithManager(ctx, manager); err != nil {
|
|
setupLog.Error(err, "unable to create controller", "controller", "EndpointSliceLabels")
|
|
}
|
|
|
|
if err = (&podlabelscontroller.MetadataReconciler{Client: manager.GetClient()}).SetupWithManager(ctx, manager); err != nil {
|
|
setupLog.Error(err, "unable to create controller", "controller", "PodLabels")
|
|
os.Exit(1)
|
|
}
|
|
|
|
if err = (&pv.Controller{}).SetupWithManager(manager, controllerConfig); err != nil {
|
|
setupLog.Error(err, "unable to create controller", "controller", "PersistentVolume")
|
|
os.Exit(1)
|
|
}
|
|
|
|
if err = (&configcontroller.Manager{
|
|
Client: manager.GetClient(),
|
|
Log: ctrl.Log.WithName("controllers").WithName("CapsuleConfiguration"),
|
|
}).SetupWithManager(manager, controllerConfig); err != nil {
|
|
setupLog.Error(err, "unable to create controller", "controller", "CapsuleConfiguration")
|
|
os.Exit(1)
|
|
}
|
|
|
|
if err = (&resources.Global{}).SetupWithManager(manager, controllerConfig); err != nil {
|
|
setupLog.Error(err, "unable to create controller", "controller", "resources.Global")
|
|
os.Exit(1)
|
|
}
|
|
|
|
if err = (&resources.Namespaced{}).SetupWithManager(manager, controllerConfig); err != nil {
|
|
setupLog.Error(err, "unable to create controller", "controller", "resources.Namespaced")
|
|
os.Exit(1)
|
|
}
|
|
|
|
if err := resourcepools.Add(
|
|
ctrl.Log.WithName("controllers").WithName("ResourcePools"),
|
|
manager,
|
|
manager.GetEventRecorderFor("pools-ctrl"),
|
|
controllerConfig,
|
|
); err != nil {
|
|
setupLog.Error(err, "unable to create controller", "controller", "resourcepools")
|
|
os.Exit(1)
|
|
}
|
|
|
|
setupLog.Info("starting manager")
|
|
|
|
if err = manager.Start(ctx); err != nil {
|
|
setupLog.Error(err, "problem running manager")
|
|
os.Exit(1)
|
|
}
|
|
}
|