2023-01-20 23:53:27 +08:00
package main
import (
"context"
"errors"
"flag"
"os"
"strings"
"sync"
"time"
"github.com/go-logr/logr"
"github.com/kyverno/kyverno/cmd/internal"
"github.com/kyverno/kyverno/pkg/background"
"github.com/kyverno/kyverno/pkg/client/clientset/versioned"
kyvernoinformer "github.com/kyverno/kyverno/pkg/client/informers/externalversions"
"github.com/kyverno/kyverno/pkg/clients/dclient"
dynamicclient "github.com/kyverno/kyverno/pkg/clients/dynamic"
kubeclient "github.com/kyverno/kyverno/pkg/clients/kube"
kyvernoclient "github.com/kyverno/kyverno/pkg/clients/kyverno"
"github.com/kyverno/kyverno/pkg/config"
policymetricscontroller "github.com/kyverno/kyverno/pkg/controllers/metrics/policy"
"github.com/kyverno/kyverno/pkg/cosign"
"github.com/kyverno/kyverno/pkg/engine/context/resolvers"
"github.com/kyverno/kyverno/pkg/event"
"github.com/kyverno/kyverno/pkg/leaderelection"
"github.com/kyverno/kyverno/pkg/logging"
"github.com/kyverno/kyverno/pkg/metrics"
"github.com/kyverno/kyverno/pkg/policy"
"github.com/kyverno/kyverno/pkg/registryclient"
kubeinformers "k8s.io/client-go/informers"
corev1listers "k8s.io/client-go/listers/core/v1"
kyamlopenapi "sigs.k8s.io/kustomize/kyaml/openapi"
)
const (
resyncPeriod = 15 * time . Minute
)
func setupRegistryClient ( ctx context . Context , logger logr . Logger , lister corev1listers . SecretNamespaceLister , imagePullSecrets string , allowInsecureRegistry bool ) ( registryclient . Client , error ) {
logger = logger . WithName ( "registry-client" )
logger . Info ( "setup registry client..." , "secrets" , imagePullSecrets , "insecure" , allowInsecureRegistry )
registryOptions := [ ] registryclient . Option {
registryclient . WithTracing ( ) ,
}
secrets := strings . Split ( imagePullSecrets , "," )
if imagePullSecrets != "" && len ( secrets ) > 0 {
registryOptions = append ( registryOptions , registryclient . WithKeychainPullSecrets ( ctx , lister , secrets ... ) )
}
if allowInsecureRegistry {
registryOptions = append ( registryOptions , registryclient . WithAllowInsecureRegistry ( ) )
}
return registryclient . New ( registryOptions ... )
}
func setupCosign ( logger logr . Logger , imageSignatureRepository string ) {
logger = logger . WithName ( "cosign" )
logger . Info ( "setup cosign..." , "repository" , imageSignatureRepository )
if imageSignatureRepository != "" {
cosign . ImageSignatureRepository = imageSignatureRepository
}
}
func createNonLeaderControllers (
genWorkers int ,
kubeInformer kubeinformers . SharedInformerFactory ,
kubeKyvernoInformer kubeinformers . SharedInformerFactory ,
kyvernoInformer kyvernoinformer . SharedInformerFactory ,
kyvernoClient versioned . Interface ,
dynamicClient dclient . Interface ,
rclient registryclient . Client ,
configuration config . Configuration ,
eventGenerator event . Interface ,
informerCacheResolvers resolvers . ConfigmapResolver ,
) [ ] internal . Controller {
updateRequestController := background . NewController (
kyvernoClient ,
dynamicClient ,
rclient ,
kyvernoInformer . Kyverno ( ) . V1 ( ) . ClusterPolicies ( ) ,
kyvernoInformer . Kyverno ( ) . V1 ( ) . Policies ( ) ,
kyvernoInformer . Kyverno ( ) . V1beta1 ( ) . UpdateRequests ( ) ,
kubeInformer . Core ( ) . V1 ( ) . Namespaces ( ) ,
kubeKyvernoInformer . Core ( ) . V1 ( ) . Pods ( ) ,
eventGenerator ,
configuration ,
informerCacheResolvers ,
)
return [ ] internal . Controller { internal . NewController ( "updaterequest-controller" , updateRequestController , genWorkers ) }
}
func createrLeaderControllers (
kubeInformer kubeinformers . SharedInformerFactory ,
kyvernoInformer kyvernoinformer . SharedInformerFactory ,
kyvernoClient versioned . Interface ,
dynamicClient dclient . Interface ,
rclient registryclient . Client ,
configuration config . Configuration ,
metricsConfig metrics . MetricsConfigManager ,
eventGenerator event . Interface ,
configMapResolver resolvers . ConfigmapResolver ,
) ( [ ] internal . Controller , error ) {
policyCtrl , err := policy . NewPolicyController (
kyvernoClient ,
dynamicClient ,
rclient ,
kyvernoInformer . Kyverno ( ) . V1 ( ) . ClusterPolicies ( ) ,
kyvernoInformer . Kyverno ( ) . V1 ( ) . Policies ( ) ,
kyvernoInformer . Kyverno ( ) . V1beta1 ( ) . UpdateRequests ( ) ,
configuration ,
eventGenerator ,
kubeInformer . Core ( ) . V1 ( ) . Namespaces ( ) ,
configMapResolver ,
logging . WithName ( "PolicyController" ) ,
time . Hour ,
metricsConfig ,
)
if err != nil {
return nil , err
}
return [ ] internal . Controller {
internal . NewController ( "policy-controller" , policyCtrl , 2 ) ,
} , err
}
func main ( ) {
var (
genWorkers int
maxQueuedEvents int
imagePullSecrets string
imageSignatureRepository string
allowInsecureRegistry bool
leaderElectionRetryPeriod time . Duration
)
flagset := flag . NewFlagSet ( "updaterequest-controller" , flag . ExitOnError )
flagset . IntVar ( & genWorkers , "genWorkers" , 10 , "Workers for generate controller." )
flagset . StringVar ( & imagePullSecrets , "imagePullSecrets" , "" , "Secret resource names for image registry access credentials." )
flagset . StringVar ( & imageSignatureRepository , "imageSignatureRepository" , "" , "Alternate repository for image signatures. Can be overridden per rule via `verifyImages.Repository`." )
flagset . BoolVar ( & allowInsecureRegistry , "allowInsecureRegistry" , false , "Whether to allow insecure connections to registries. Don't use this for anything but testing." )
flagset . IntVar ( & maxQueuedEvents , "maxQueuedEvents" , 1000 , "Maximum events to be queued." )
flagset . DurationVar ( & leaderElectionRetryPeriod , "leaderElectionRetryPeriod" , leaderelection . DefaultRetryPeriod , "Configure leader election retry period." )
// config
appConfig := internal . NewConfiguration (
internal . WithProfiling ( ) ,
internal . WithMetrics ( ) ,
internal . WithTracing ( ) ,
internal . WithKubeconfig ( ) ,
internal . WithFlagSets ( flagset ) ,
)
// parse flags
internal . ParseFlags ( appConfig )
// setup logger
// show version
// start profiling
// setup signals
// setup maxprocs
// setup metrics
2023-01-26 10:39:52 +01:00
signalCtx , logger , metricsConfig , sdown := internal . Setup ( "kyverno-updaterequest-controller" )
2023-01-20 23:53:27 +08:00
defer sdown ( )
// create instrumented clients
kubeClient := internal . CreateKubernetesClient ( logger , kubeclient . WithMetrics ( metricsConfig , metrics . KubeClient ) , kubeclient . WithTracing ( ) )
leaderElectionClient := internal . CreateKubernetesClient ( logger , kubeclient . WithMetrics ( metricsConfig , metrics . KubeClient ) , kubeclient . WithTracing ( ) )
kyvernoClient := internal . CreateKyvernoClient ( logger , kyvernoclient . WithMetrics ( metricsConfig , metrics . KyvernoClient ) , kyvernoclient . WithTracing ( ) )
dynamicClient := internal . CreateDynamicClient ( logger , dynamicclient . WithMetrics ( metricsConfig , metrics . KyvernoClient ) , dynamicclient . WithTracing ( ) )
dClient , err := dclient . NewClient ( signalCtx , dynamicClient , kubeClient , 15 * time . Minute )
if err != nil {
logger . Error ( err , "failed to create dynamic client" )
os . Exit ( 1 )
}
// THIS IS AN UGLY FIX
// ELSE KYAML IS NOT THREAD SAFE
kyamlopenapi . Schema ( )
// informer factories
kubeInformer := kubeinformers . NewSharedInformerFactory ( kubeClient , resyncPeriod )
kubeKyvernoInformer := kubeinformers . NewSharedInformerFactoryWithOptions ( kubeClient , resyncPeriod , kubeinformers . WithNamespace ( config . KyvernoNamespace ( ) ) )
kyvernoInformer := kyvernoinformer . NewSharedInformerFactory ( kyvernoClient , resyncPeriod )
cacheInformer , err := resolvers . GetCacheInformerFactory ( kubeClient , resyncPeriod )
if err != nil {
logger . Error ( err , "failed to create cache informer factory" )
os . Exit ( 1 )
}
secretLister := kubeKyvernoInformer . Core ( ) . V1 ( ) . Secrets ( ) . Lister ( ) . Secrets ( config . KyvernoNamespace ( ) )
// setup registry client
rclient , err := setupRegistryClient ( signalCtx , logger , secretLister , imagePullSecrets , allowInsecureRegistry )
if err != nil {
logger . Error ( err , "failed to setup registry client" )
os . Exit ( 1 )
}
// setup cosign
setupCosign ( logger , imageSignatureRepository )
informerBasedResolver , err := resolvers . NewInformerBasedResolver ( cacheInformer . Core ( ) . V1 ( ) . ConfigMaps ( ) . Lister ( ) )
if err != nil {
logger . Error ( err , "failed to create informer based resolver" )
os . Exit ( 1 )
}
clientBasedResolver , err := resolvers . NewClientBasedResolver ( kubeClient )
if err != nil {
logger . Error ( err , "failed to create client based resolver" )
os . Exit ( 1 )
}
configMapResolver , err := resolvers . NewResolverChain ( informerBasedResolver , clientBasedResolver )
if err != nil {
logger . Error ( err , "failed to create config map resolver" )
os . Exit ( 1 )
}
configuration , err := config . NewConfiguration ( kubeClient )
if err != nil {
logger . Error ( err , "failed to initialize configuration" )
os . Exit ( 1 )
}
eventGenerator := event . NewEventGenerator (
dClient ,
kyvernoInformer . Kyverno ( ) . V1 ( ) . ClusterPolicies ( ) ,
kyvernoInformer . Kyverno ( ) . V1 ( ) . Policies ( ) ,
maxQueuedEvents ,
logging . WithName ( "EventGenerator" ) ,
)
// this controller only subscribe to events, nothing is returned...
policymetricscontroller . NewController (
metricsConfig ,
kyvernoInformer . Kyverno ( ) . V1 ( ) . ClusterPolicies ( ) ,
kyvernoInformer . Kyverno ( ) . V1 ( ) . Policies ( ) ,
)
// create non leader controllers
nonLeaderControllers := createNonLeaderControllers (
genWorkers ,
kubeInformer ,
kubeKyvernoInformer ,
kyvernoInformer ,
kyvernoClient ,
dClient ,
rclient ,
configuration ,
eventGenerator ,
configMapResolver ,
)
// start informers and wait for cache sync
if ! internal . StartInformersAndWaitForCacheSync ( signalCtx , kyvernoInformer , kubeInformer , kubeKyvernoInformer , cacheInformer ) {
logger . Error ( errors . New ( "failed to wait for cache sync" ) , "failed to wait for cache sync" )
os . Exit ( 1 )
}
// start event generator
go eventGenerator . Run ( signalCtx , 3 )
// setup leader election
le , err := leaderelection . New (
logger . WithName ( "leader-election" ) ,
"kyverno-updaterequest-controller" ,
config . KyvernoNamespace ( ) ,
leaderElectionClient ,
config . KyvernoPodName ( ) ,
leaderElectionRetryPeriod ,
func ( ctx context . Context ) {
logger := logger . WithName ( "leader" )
// create leader factories
kubeInformer := kubeinformers . NewSharedInformerFactory ( kubeClient , resyncPeriod )
kyvernoInformer := kyvernoinformer . NewSharedInformerFactory ( kyvernoClient , resyncPeriod )
// create leader controllers
leaderControllers , err := createrLeaderControllers (
kubeInformer ,
kyvernoInformer ,
kyvernoClient ,
dClient ,
rclient ,
configuration ,
metricsConfig ,
eventGenerator ,
configMapResolver ,
)
if err != nil {
logger . Error ( err , "failed to create leader controllers" )
os . Exit ( 1 )
}
// start informers and wait for cache sync
if ! internal . StartInformersAndWaitForCacheSync ( signalCtx , kyvernoInformer , kubeInformer ) {
logger . Error ( errors . New ( "failed to wait for cache sync" ) , "failed to wait for cache sync" )
os . Exit ( 1 )
}
// start leader controllers
var wg sync . WaitGroup
for _ , controller := range leaderControllers {
controller . Run ( signalCtx , logger . WithName ( "controllers" ) , & wg )
}
// wait all controllers shut down
wg . Wait ( )
} ,
nil ,
)
if err != nil {
logger . Error ( err , "failed to initialize leader election" )
os . Exit ( 1 )
}
// start non leader controllers
var wg sync . WaitGroup
for _ , controller := range nonLeaderControllers {
controller . Run ( signalCtx , logger . WithName ( "controllers" ) , & wg )
}
// start leader election
go func ( ) {
select {
case <- signalCtx . Done ( ) :
return
default :
le . Run ( signalCtx )
}
} ( )
wg . Wait ( )
}