Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@ RUN make build

FROM registry.ci.openshift.org/ocp/4.9:base
COPY --from=builder /go/src/github.com/openshift/cluster-cloud-controller-manager-operator/bin/cluster-controller-manager-operator .
COPY --from=builder /go/src/github.com/openshift/cluster-cloud-controller-manager-operator/bin/cloud-config-sync-controller .
COPY --from=builder /go/src/github.com/openshift/cluster-cloud-controller-manager-operator/bin/render .
COPY --from=builder /go/src/github.com/openshift/cluster-cloud-controller-manager-operator/manifests manifests

Expand Down
7 changes: 5 additions & 2 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -21,12 +21,15 @@ test: generate verify manifests unit
unit:
hack/unit-tests.sh

# Build operator binary
build: verify operator render
# Build operator binaries
build: operator render cloud-config-sync-controller

operator:
go build -o bin/cluster-controller-manager-operator cmd/cluster-cloud-controller-manager-operator/main.go

cloud-config-sync-controller:
go build -o bin/cloud-config-sync-controller cmd/cloud-config-sync-controller/main.go

render:
go build -o bin/render cmd/render/main.go

Expand Down
151 changes: 151 additions & 0 deletions cmd/cloud-config-sync-controller/main.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,151 @@
/*
Copyright 2021.

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

package main

import (
"flag"
"os"
"time"

// Import all Kubernetes client auth plugins (e.g. Azure, GCP, OIDC, etc.)
// to ensure that exec-entrypoint and run can make use of them.

_ "k8s.io/client-go/plugin/pkg/client/auth"
"k8s.io/klog/klogr"
"k8s.io/klog/v2"

"k8s.io/apimachinery/pkg/runtime"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/cache"
"sigs.k8s.io/controller-runtime/pkg/healthz"

configv1 "github.com/openshift/api/config/v1"
"github.com/openshift/cluster-cloud-controller-manager-operator/pkg/controllers"
// +kubebuilder:scaffold:imports
)

var (
scheme = runtime.NewScheme()
setupLog = ctrl.Log.WithName("setup")

// The default durations for the leader electrion operations.
leaseDuration = 120 * time.Second
renewDealine = 110 * time.Second
retryPeriod = 90 * time.Second
)

func init() {
utilruntime.Must(clientgoscheme.AddToScheme(scheme))
utilruntime.Must(configv1.AddToScheme(scheme))

// +kubebuilder:scaffold:scheme
}

func main() {
klog.InitFlags(nil)

metricsAddr := flag.String(
"metrics-bind-address",
":8080",
"Address for hosting metrics",
)

healthAddr := flag.String(
"health-addr",
":9440",
"The address for health checking.",
)

leaderElectResourceNamespace := flag.String(
"leader-elect-resource-namespace",
"",
"The namespace of resource object that is used for locking during leader election. If unspecified and running in cluster, defaults to the service account namespace for the controller. Required for leader-election outside of a cluster.",
)

leaderElect := flag.Bool(
"leader-elect",
false,
"Start a leader election client and gain leadership before executing the main loop. Enable this when running replicated components for high availability.",
)

leaderElectLeaseDuration := flag.Duration(
"leader-elect-lease-duration",
leaseDuration,
"The duration that non-leader candidates will wait after observing a leadership renewal until attempting to acquire leadership of a led but unrenewed leader slot. This is effectively the maximum duration that a leader can be stopped before it is replaced by another candidate. This is only applicable if leader election is enabled.",
)

managedNamespace := flag.String(
"namespace",
controllers.DefaultManagedNamespace,
"The namespace for managed objects, target cloud-conf in particular.",
)

flag.Parse()

ctrl.SetLogger(klogr.New().WithName("CCMOCloudConfigSyncController"))

syncPeriod := 10 * time.Minute
cacheBuilder := cache.MultiNamespacedCacheBuilder([]string{
*managedNamespace, controllers.OpenshiftConfigNamespace, controllers.OpenshiftManagedConfigNamespace,
})
mgr, err := ctrl.NewManager(ctrl.GetConfigOrDie(), ctrl.Options{
Namespace: *managedNamespace,
Scheme: scheme,
SyncPeriod: &syncPeriod,
MetricsBindAddress: *metricsAddr,
HealthProbeBindAddress: *healthAddr,
LeaderElectionNamespace: *leaderElectResourceNamespace,
LeaderElection: *leaderElect,
LeaseDuration: leaderElectLeaseDuration,
LeaderElectionID: "cloud-config-sync-controller-leader",
RetryPeriod: &retryPeriod,
RenewDeadline: &renewDealine,
NewCache: cacheBuilder,
})
if err != nil {
setupLog.Error(err, "unable to start manager")
os.Exit(1)
}

if err = (&controllers.CloudConfigReconciler{
Client: mgr.GetClient(),
Scheme: mgr.GetScheme(),
Recorder: mgr.GetEventRecorderFor("cloud-controller-manager-operator-config-sync-controller"),
TargetNamespace: *managedNamespace,
}).SetupWithManager(mgr); err != nil {
setupLog.Error(err, "unable to create cloud-config sync controller", "controller", "ClusterOperator")
os.Exit(1)
}
// +kubebuilder:scaffold:builder

if err := mgr.AddHealthzCheck("health", healthz.Ping); err != nil {
setupLog.Error(err, "unable to set up health check")
os.Exit(1)
}
if err := mgr.AddReadyzCheck("check", healthz.Ping); err != nil {
setupLog.Error(err, "unable to set up ready check")
os.Exit(1)
}

setupLog.Info("starting manager")
if err := mgr.Start(ctrl.SetupSignalHandler()); err != nil {
setupLog.Error(err, "problem running manager")
os.Exit(1)
}
}
18 changes: 1 addition & 17 deletions cmd/cluster-cloud-controller-manager-operator/main.go
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,6 @@ import (
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/cache"
"sigs.k8s.io/controller-runtime/pkg/healthz"

configv1 "github.com/openshift/api/config/v1"
Expand All @@ -51,7 +50,6 @@ var (
)

const (
defaultManagedNamespace = "openshift-cloud-controller-manager"
defaultImagesLocation = "/etc/cloud-controller-manager-config/images.json"
releaseVersionEnvVariableName = "RELEASE_VERSION"
unknownVersionValue = "unknown"
Expand Down Expand Up @@ -100,7 +98,7 @@ func main() {

managedNamespace := flag.String(
"namespace",
defaultManagedNamespace,
controllers.DefaultManagedNamespace,
"The namespace for managed objects, where out-of-tree CCM binaries will run.",
)

Expand All @@ -115,9 +113,6 @@ func main() {
ctrl.SetLogger(klogr.New().WithName("CCMOperator"))

syncPeriod := 10 * time.Minute
cacheBuilder := cache.MultiNamespacedCacheBuilder([]string{
*managedNamespace, controllers.OpenshiftConfigNamespace, controllers.OpenshiftManagedConfigNamespace,
})
mgr, err := ctrl.NewManager(ctrl.GetConfigOrDie(), ctrl.Options{
Namespace: *managedNamespace,
Scheme: scheme,
Expand All @@ -131,7 +126,6 @@ func main() {
LeaderElectionID: "cluster-cloud-controller-manager-leader",
RetryPeriod: &retryPeriod,
RenewDeadline: &renewDealine,
NewCache: cacheBuilder,
})
if err != nil {
setupLog.Error(err, "unable to start manager")
Expand All @@ -149,16 +143,6 @@ func main() {
setupLog.Error(err, "unable to create controller", "controller", "ClusterOperator")
os.Exit(1)
}

if err = (&controllers.CloudConfigReconciler{
Client: mgr.GetClient(),
Scheme: mgr.GetScheme(),
Recorder: mgr.GetEventRecorderFor("cloud-controller-manager-operator"),
TargetNamespace: *managedNamespace,
}).SetupWithManager(mgr); err != nil {
setupLog.Error(err, "unable to create cloud-config sync controller", "controller", "ClusterOperator")
os.Exit(1)
}
// +kubebuilder:scaffold:builder

if err := mgr.AddHealthzCheck("health", healthz.Ping); err != nil {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -107,14 +107,6 @@ rules:
- get
- list
- watch
- apiGroups:
- apps
resources:
- deployments
verbs:
- get
- list
- watch

---
apiVersion: rbac.authorization.k8s.io/v1
Expand Down Expand Up @@ -152,14 +144,6 @@ rules:
- get
- list
- watch
- apiGroups:
- apps
resources:
- deployments
verbs:
- get
- list
- watch

---
apiVersion: rbac.authorization.k8s.io/v1
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,31 @@ spec:
- mountPath: /etc/kubernetes
name: host-etc-kube
readOnly: true
- name: cloud-config-sync-controller
image: quay.io/openshift/origin-cluster-cloud-controller-manager-operator
command:
- /bin/bash
- -c
- |
#!/bin/bash
set -o allexport
if [[ -f /etc/kubernetes/apiserver-url.env ]]; then
source /etc/kubernetes/apiserver-url.env
else
URL_ONLY_KUBECONFIG=/etc/kubernetes/kubeconfig
fi
exec /cloud-config-sync-controller \
--leader-elect \
--metrics-bind-address=:8081 \
--health-addr=:9441
resources:
requests:
cpu: 10m
memory: 25Mi
volumeMounts:
- mountPath: /etc/kubernetes
name: host-etc-kube
readOnly: true
hostNetwork: true
nodeSelector:
node-role.kubernetes.io/master: ""
Expand Down
2 changes: 2 additions & 0 deletions pkg/controllers/common_consts.go
Original file line number Diff line number Diff line change
@@ -1,6 +1,8 @@
package controllers

const (
DefaultManagedNamespace = "openshift-cloud-controller-manager"

infrastructureResourceName = "cluster"

OpenshiftConfigNamespace = "openshift-config"
Expand Down