194 lines
6.6 KiB
Go
194 lines
6.6 KiB
Go
|
/*
|
||
|
Copyright 2023 ycyxuehan.
|
||
|
|
||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
you may not use this file except in compliance with the License.
|
||
|
You may obtain a copy of the License at
|
||
|
|
||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||
|
|
||
|
Unless required by applicable law or agreed to in writing, software
|
||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
See the License for the specific language governing permissions and
|
||
|
limitations under the License.
|
||
|
*/
|
||
|
|
||
|
package main
|
||
|
|
||
|
import (
|
||
|
"flag"
|
||
|
"os"
|
||
|
"time"
|
||
|
|
||
|
// Import all Kubernetes client auth plugins (e.g. Azure, GCP, OIDC, etc.)
|
||
|
// to ensure that exec-entrypoint and run can make use of them.
|
||
|
_ "k8s.io/client-go/plugin/pkg/client/auth"
|
||
|
|
||
|
"k8s.io/apimachinery/pkg/runtime"
|
||
|
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
||
|
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
|
||
|
ctrl "sigs.k8s.io/controller-runtime"
|
||
|
"sigs.k8s.io/controller-runtime/pkg/healthz"
|
||
|
"sigs.k8s.io/controller-runtime/pkg/log/zap"
|
||
|
metricsserver "sigs.k8s.io/controller-runtime/pkg/metrics/server"
|
||
|
|
||
|
zeldaiov1alpha1 "github.com/ycyxuehan/zelda/api/v1alpha1"
|
||
|
"github.com/ycyxuehan/zelda/apiserver"
|
||
|
"github.com/ycyxuehan/zelda/apiserver/auth/jwt"
|
||
|
"github.com/ycyxuehan/zelda/apiserver/proxy/kubeapi"
|
||
|
"github.com/ycyxuehan/zelda/internal/controller"
|
||
|
//+kubebuilder:scaffold:imports
|
||
|
)
|
||
|
|
||
|
var (
|
||
|
scheme = runtime.NewScheme()
|
||
|
setupLog = ctrl.Log.WithName("setup")
|
||
|
)
|
||
|
|
||
|
func init() {
|
||
|
utilruntime.Must(clientgoscheme.AddToScheme(scheme))
|
||
|
|
||
|
utilruntime.Must(zeldaiov1alpha1.AddToScheme(scheme))
|
||
|
//+kubebuilder:scaffold:scheme
|
||
|
}
|
||
|
|
||
|
func main() {
|
||
|
var metricsAddr string
|
||
|
var enableLeaderElection bool
|
||
|
var probeAddr string
|
||
|
var apiAddr, authSecret string
|
||
|
var authTTL int64
|
||
|
flag.StringVar(&metricsAddr, "metrics-bind-address", ":8080", "The address the metric endpoint binds to.")
|
||
|
flag.StringVar(&probeAddr, "health-probe-bind-address", ":8081", "The address the probe endpoint binds to.")
|
||
|
flag.BoolVar(&enableLeaderElection, "leader-elect", false,
|
||
|
"Enable leader election for controller manager. "+
|
||
|
"Enabling this will ensure there is only one active controller manager.")
|
||
|
flag.StringVar(&apiAddr, "api-address", ":80", "api addr to listen")
|
||
|
flag.StringVar(&authSecret, "auth-secret", "abcdefghigklmnop1234", "auth token encrypt secret")
|
||
|
flag.Int64Var(&authTTL, "auth-ttl", 86400, "token invalid time, default 86400 second")
|
||
|
|
||
|
opts := zap.Options{
|
||
|
Development: true,
|
||
|
}
|
||
|
opts.BindFlags(flag.CommandLine)
|
||
|
flag.Parse()
|
||
|
|
||
|
ctrl.SetLogger(zap.New(zap.UseFlagOptions(&opts)))
|
||
|
|
||
|
mgr, err := ctrl.NewManager(ctrl.GetConfigOrDie(), ctrl.Options{
|
||
|
Scheme: scheme,
|
||
|
Metrics: metricsserver.Options{BindAddress: metricsAddr},
|
||
|
HealthProbeBindAddress: probeAddr,
|
||
|
LeaderElection: enableLeaderElection,
|
||
|
LeaderElectionID: "4a7792b3.zelda.io",
|
||
|
// LeaderElectionReleaseOnCancel defines if the leader should step down voluntarily
|
||
|
// when the Manager ends. This requires the binary to immediately end when the
|
||
|
// Manager is stopped, otherwise, this setting is unsafe. Setting this significantly
|
||
|
// speeds up voluntary leader transitions as the new leader don't have to wait
|
||
|
// LeaseDuration time first.
|
||
|
//
|
||
|
// In the default scaffold provided, the program ends immediately after
|
||
|
// the manager stops, so would be fine to enable this option. However,
|
||
|
// if you are doing or is intended to do any operation such as perform cleanups
|
||
|
// after the manager stops then its usage might be unsafe.
|
||
|
// LeaderElectionReleaseOnCancel: true,
|
||
|
})
|
||
|
if err != nil {
|
||
|
setupLog.Error(err, "unable to start manager")
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
|
||
|
if err = (&controller.ZProjectReconciler{
|
||
|
Client: mgr.GetClient(),
|
||
|
Scheme: mgr.GetScheme(),
|
||
|
}).SetupWithManager(mgr); err != nil {
|
||
|
setupLog.Error(err, "unable to create controller", "controller", "ZProject")
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
if err = (&controller.ZServiceReconciler{
|
||
|
Client: mgr.GetClient(),
|
||
|
Scheme: mgr.GetScheme(),
|
||
|
}).SetupWithManager(mgr); err != nil {
|
||
|
setupLog.Error(err, "unable to create controller", "controller", "ZService")
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
if err = (&controller.ZUserReconciler{
|
||
|
Client: mgr.GetClient(),
|
||
|
Scheme: mgr.GetScheme(),
|
||
|
}).SetupWithManager(mgr); err != nil {
|
||
|
setupLog.Error(err, "unable to create controller", "controller", "ZUser")
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
if err = (&controller.ZGroupReconciler{
|
||
|
Client: mgr.GetClient(),
|
||
|
Scheme: mgr.GetScheme(),
|
||
|
}).SetupWithManager(mgr); err != nil {
|
||
|
setupLog.Error(err, "unable to create controller", "controller", "ZGroup")
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
if err = (&controller.ZRegistryReconciler{
|
||
|
Client: mgr.GetClient(),
|
||
|
Scheme: mgr.GetScheme(),
|
||
|
}).SetupWithManager(mgr); err != nil {
|
||
|
setupLog.Error(err, "unable to create controller", "controller", "ZRegistry")
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
if err = (&controller.ZScriptReconciler{
|
||
|
Client: mgr.GetClient(),
|
||
|
Scheme: mgr.GetScheme(),
|
||
|
}).SetupWithManager(mgr); err != nil {
|
||
|
setupLog.Error(err, "unable to create controller", "controller", "ZScript")
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
if err = (&controller.ZBuildTemplateReconciler{
|
||
|
Client: mgr.GetClient(),
|
||
|
Scheme: mgr.GetScheme(),
|
||
|
}).SetupWithManager(mgr); err != nil {
|
||
|
setupLog.Error(err, "unable to create controller", "controller", "ZBuildTemplate")
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
if err = (&controller.ZRunTemplateReconciler{
|
||
|
Client: mgr.GetClient(),
|
||
|
Scheme: mgr.GetScheme(),
|
||
|
}).SetupWithManager(mgr); err != nil {
|
||
|
setupLog.Error(err, "unable to create controller", "controller", "ZRunTemplate")
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
if err = (&controller.ZBuilderReconciler{
|
||
|
Client: mgr.GetClient(),
|
||
|
Scheme: mgr.GetScheme(),
|
||
|
}).SetupWithManager(mgr); err != nil {
|
||
|
setupLog.Error(err, "unable to create controller", "controller", "ZBuilder")
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
if err = (&controller.ZCustomHostReconciler{
|
||
|
Client: mgr.GetClient(),
|
||
|
Scheme: mgr.GetScheme(),
|
||
|
}).SetupWithManager(mgr); err != nil {
|
||
|
setupLog.Error(err, "unable to create controller", "controller", "ZCustomHost")
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
//+kubebuilder:scaffold:builder
|
||
|
|
||
|
if err := mgr.AddHealthzCheck("healthz", healthz.Ping); err != nil {
|
||
|
setupLog.Error(err, "unable to set up health check")
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
if err := mgr.AddReadyzCheck("readyz", healthz.Ping); err != nil {
|
||
|
setupLog.Error(err, "unable to set up ready check")
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
//
|
||
|
setupLog.Info("starting webserver")
|
||
|
am := jwt.NewManager(authSecret, time.Duration(authTTL) * time.Second)
|
||
|
svr := apiserver.NewAPIServer(mgr.GetClient(), am)
|
||
|
svr.UseProxies(kubeapi.NewKubeAPI("kubernetes.default.svc", "/kubernetes"))
|
||
|
go svr.Run(apiAddr)
|
||
|
setupLog.Info("starting manager")
|
||
|
if err := mgr.Start(ctrl.SetupSignalHandler()); err != nil {
|
||
|
setupLog.Error(err, "problem running manager")
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
}
|