well-known/server/main.go

151 lines
3.6 KiB
Go
Raw Normal View History

2023-03-11 19:58:56 +00:00
package main
import (
"context"
"flag"
2023-03-11 23:06:42 +00:00
"net/http"
2023-03-11 19:58:56 +00:00
"os"
"os/signal"
"path/filepath"
"syscall"
"time"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/kubernetes"
"k8s.io/client-go/rest"
"k8s.io/client-go/tools/leaderelection"
"k8s.io/client-go/tools/leaderelection/resourcelock"
"k8s.io/client-go/util/homedir"
klog "k8s.io/klog/v2"
"k8s.io/client-go/tools/clientcmd"
)
var (
kubeconfig string
namespace string
cmName string
id string
leaseLockName string
2023-03-11 19:58:56 +00:00
serverPort string
healthPort string
)
func parseFlags() {
2023-06-01 10:40:19 +00:00
klog.InitFlags(nil)
2023-03-11 19:58:56 +00:00
if home := homedir.HomeDir(); home != "" {
flag.StringVar(&kubeconfig, "kubeconfig", filepath.Join(home, ".kube", "config"), "(optional) absolute path to the kubeconfig file")
} else {
flag.StringVar(&kubeconfig, "kubeconfig", "", "absolute path to the kubeconfig file")
}
flag.StringVar(&namespace, "namespace", "default", "namespace")
flag.StringVar(&cmName, "configmap", "well-known-generated", "")
2023-03-11 21:24:21 +00:00
flag.StringVar(&id, "id", os.Getenv("POD_NAME"), "the holder identity name")
2023-03-11 19:58:56 +00:00
flag.StringVar(&leaseLockName, "lease-lock-name", "well-known", "the lease lock resource name")
flag.StringVar(&serverPort, "server-port", "8080", "server port")
flag.StringVar(&healthPort, "health-port", "8081", "health port")
2023-03-11 19:58:56 +00:00
flag.Parse()
if id == "" {
klog.Fatal("id is required")
}
}
func getClientset() *kubernetes.Clientset {
2023-03-11 19:58:56 +00:00
config, err := rest.InClusterConfig()
if err != nil {
config, err = clientcmd.BuildConfigFromFlags("", kubeconfig)
if err != nil {
panic(err.Error())
}
}
clientset, err := kubernetes.NewForConfig(config)
if err != nil {
klog.Fatal(err)
}
return clientset
}
func main() {
// Parse flags
parseFlags()
2023-03-11 19:58:56 +00:00
// use a Go context so we can tell the leaderelection code when we
// want to step down
ctx, cancel := context.WithCancel(context.Background())
defer cancel()
// listen for interrupts or the Linux SIGTERM signal and cancel
// our context, which the leader election code will observe and
// step down
ch := make(chan os.Signal, 1)
signal.Notify(ch, os.Interrupt, syscall.SIGTERM)
go func() {
<-ch
klog.Info("Received termination, signaling shutdown")
cancel()
}()
// Connect to the cluster
clientset := getClientset()
wks := NewWellKnownService(clientset, namespace, cmName)
2023-03-11 19:58:56 +00:00
// Start the server
2023-03-11 23:06:42 +00:00
go func() {
klog.Infof("Running /.well-known/{id} endpoint on :%s", serverPort)
if err := http.ListenAndServe(":"+serverPort, GetServer(wks)); err != nil {
klog.Error(err)
os.Exit(1)
}
}()
2023-03-11 23:06:42 +00:00
// Start the health server
go func() {
klog.Infof("Running /healthz endpoint on :%s", healthPort)
if err := http.ListenAndServe(":"+healthPort, GetHealthServer()); err != nil {
2023-03-11 23:06:42 +00:00
klog.Error(err)
os.Exit(1)
}
}()
// Start the leader election code loop
2023-03-11 19:58:56 +00:00
leaderelection.RunOrDie(ctx, leaderelection.LeaderElectionConfig{
Lock: &resourcelock.LeaseLock{
LeaseMeta: metav1.ObjectMeta{
Name: leaseLockName,
Namespace: namespace,
},
Client: clientset.CoordinationV1(),
LockConfig: resourcelock.ResourceLockConfig{
Identity: id,
},
},
2023-03-11 19:58:56 +00:00
ReleaseOnCancel: true,
LeaseDuration: 60 * time.Second,
RenewDeadline: 15 * time.Second,
RetryPeriod: 5 * time.Second,
Callbacks: leaderelection.LeaderCallbacks{
OnStartedLeading: func(ctx context.Context) {
2023-04-27 07:56:31 +00:00
for {
// ensure that we keep observing
wks.DiscoveryLoop(ctx)
2023-04-27 07:56:31 +00:00
}
2023-03-11 19:58:56 +00:00
},
OnStoppedLeading: func() {
klog.Infof("leader lost: %s", id)
os.Exit(0)
},
OnNewLeader: func(identity string) {
if identity == id {
return
}
klog.Infof("new leader elected: %s", identity)
},
},
})
}