|
| 1 | +package cmd |
| 2 | + |
| 3 | +import ( |
| 4 | + "context" |
| 5 | + "crypto/tls" |
| 6 | + "errors" |
| 7 | + "net/url" |
| 8 | + "os" |
| 9 | + |
| 10 | + kcpapis "github.com/kcp-dev/kcp/sdk/apis/apis/v1alpha1" |
| 11 | + kcpcore "github.com/kcp-dev/kcp/sdk/apis/core/v1alpha1" |
| 12 | + kcptenancy "github.com/kcp-dev/kcp/sdk/apis/tenancy/v1alpha1" |
| 13 | + "github.com/openmfp/crd-gql-gateway/listener/flags" |
| 14 | + "github.com/rs/zerolog/log" |
| 15 | + "github.com/spf13/cobra" |
| 16 | + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions" |
| 17 | + "k8s.io/apimachinery/pkg/runtime" |
| 18 | + utilruntime "k8s.io/apimachinery/pkg/util/runtime" |
| 19 | + kcpctrl "sigs.k8s.io/controller-runtime/pkg/kcp" |
| 20 | + |
| 21 | + clientgoscheme "k8s.io/client-go/kubernetes/scheme" |
| 22 | + "k8s.io/client-go/rest" |
| 23 | + ctrl "sigs.k8s.io/controller-runtime" |
| 24 | + "sigs.k8s.io/controller-runtime/pkg/client" |
| 25 | + "sigs.k8s.io/controller-runtime/pkg/healthz" |
| 26 | + "sigs.k8s.io/controller-runtime/pkg/log/zap" |
| 27 | + "sigs.k8s.io/controller-runtime/pkg/metrics/filters" |
| 28 | + metricsserver "sigs.k8s.io/controller-runtime/pkg/metrics/server" |
| 29 | + "sigs.k8s.io/controller-runtime/pkg/webhook" |
| 30 | + |
| 31 | + "github.com/openmfp/crd-gql-gateway/listener/apischema" |
| 32 | + "github.com/openmfp/crd-gql-gateway/listener/controller" |
| 33 | + "github.com/openmfp/crd-gql-gateway/listener/discoveryclient" |
| 34 | + "github.com/openmfp/crd-gql-gateway/listener/workspacefile" |
| 35 | + // +kubebuilder:scaffold:imports |
| 36 | +) |
| 37 | + |
| 38 | +func init() { |
| 39 | + rootCmd.AddCommand(listenCmd) |
| 40 | +} |
| 41 | + |
| 42 | +var ( |
| 43 | + scheme = runtime.NewScheme() |
| 44 | + setupLog = ctrl.Log.WithName("setup") |
| 45 | + webhookServer webhook.Server |
| 46 | + metricsServerOptions metricsserver.Options |
| 47 | + opFlags *flags.Flags |
| 48 | +) |
| 49 | + |
| 50 | +var listenCmd = &cobra.Command{ |
| 51 | + Use: "listen", |
| 52 | + Example: "KUBECONFIG=.kcp/admin.kubeconfig go run . listen", |
| 53 | + PreRun: func(cmd *cobra.Command, args []string) { |
| 54 | + utilruntime.Must(clientgoscheme.AddToScheme(scheme)) |
| 55 | + |
| 56 | + utilruntime.Must(kcpapis.AddToScheme(scheme)) |
| 57 | + utilruntime.Must(kcpcore.AddToScheme(scheme)) |
| 58 | + utilruntime.Must(kcptenancy.AddToScheme(scheme)) |
| 59 | + utilruntime.Must(apiextensions.AddToScheme(scheme)) |
| 60 | + // +kubebuilder:scaffold:scheme |
| 61 | + |
| 62 | + var err error |
| 63 | + opFlags, err = flags.NewFromEnv() |
| 64 | + if err != nil { |
| 65 | + log.Fatal().Err(err).Msg("Error getting app restCfg, exiting") |
| 66 | + } |
| 67 | + opts := zap.Options{ |
| 68 | + Development: true, |
| 69 | + } |
| 70 | + |
| 71 | + ctrl.SetLogger(zap.New(zap.UseFlagOptions(&opts))) |
| 72 | + |
| 73 | + disableHTTP2 := func(c *tls.Config) { |
| 74 | + setupLog.Info("disabling http/2") |
| 75 | + c.NextProtos = []string{"http/1.1"} |
| 76 | + } |
| 77 | + |
| 78 | + var tlsOpts []func(*tls.Config) |
| 79 | + if !opFlags.EnableHTTP2 { |
| 80 | + tlsOpts = []func(c *tls.Config){disableHTTP2} |
| 81 | + } |
| 82 | + |
| 83 | + webhookServer = webhook.NewServer(webhook.Options{ |
| 84 | + TLSOpts: tlsOpts, |
| 85 | + }) |
| 86 | + |
| 87 | + metricsServerOptions = metricsserver.Options{ |
| 88 | + BindAddress: opFlags.MetricsAddr, |
| 89 | + SecureServing: opFlags.SecureMetrics, |
| 90 | + TLSOpts: tlsOpts, |
| 91 | + } |
| 92 | + |
| 93 | + if opFlags.SecureMetrics { |
| 94 | + metricsServerOptions.FilterProvider = filters.WithAuthenticationAndAuthorization |
| 95 | + } |
| 96 | + }, |
| 97 | + Run: func(cmd *cobra.Command, args []string) { |
| 98 | + cfg := ctrl.GetConfigOrDie() |
| 99 | + cfgURL, err := url.Parse(cfg.Host) |
| 100 | + if err != nil { |
| 101 | + setupLog.Error(err, "failed to parse config Host") |
| 102 | + os.Exit(1) |
| 103 | + } |
| 104 | + clt, err := client.New(cfg, client.Options{ |
| 105 | + Scheme: scheme, |
| 106 | + }) |
| 107 | + if err != nil { |
| 108 | + setupLog.Error(err, "failed to create client from config") |
| 109 | + os.Exit(1) |
| 110 | + } |
| 111 | + tenancyAPIExport := &kcpapis.APIExport{} |
| 112 | + err = clt.Get(context.TODO(), client.ObjectKey{Name: kcptenancy.SchemeGroupVersion.Group}, tenancyAPIExport) |
| 113 | + if err != nil { |
| 114 | + setupLog.Error(err, "failed to get tenancy APIExport") |
| 115 | + os.Exit(1) |
| 116 | + } |
| 117 | + virtualWorkspaces := tenancyAPIExport.Status.VirtualWorkspaces // nolint: staticcheck |
| 118 | + if len(virtualWorkspaces) == 0 { |
| 119 | + err := errors.New("empty virtual workspace list") |
| 120 | + setupLog.Error(err, "failed to get at least one virtual workspace") |
| 121 | + os.Exit(1) |
| 122 | + } |
| 123 | + vwCFGURL, err := url.Parse(virtualWorkspaces[0].URL) |
| 124 | + if err != nil { |
| 125 | + setupLog.Error(err, "failed to parse virtual workspace config URL") |
| 126 | + os.Exit(1) |
| 127 | + } |
| 128 | + cfgURL.Path = vwCFGURL.Path |
| 129 | + virtualWorkspaceCfg := rest.CopyConfig(cfg) |
| 130 | + virtualWorkspaceCfg.Host = cfgURL.String() |
| 131 | + |
| 132 | + mgr, err := kcpctrl.NewClusterAwareManager(virtualWorkspaceCfg, ctrl.Options{ |
| 133 | + Scheme: scheme, |
| 134 | + Metrics: metricsServerOptions, |
| 135 | + WebhookServer: webhookServer, |
| 136 | + HealthProbeBindAddress: opFlags.ProbeAddr, |
| 137 | + LeaderElection: opFlags.EnableLeaderElection, |
| 138 | + LeaderElectionID: "72231e1f.openmfp.io", |
| 139 | + }) |
| 140 | + if err != nil { |
| 141 | + setupLog.Error(err, "unable to start manager") |
| 142 | + os.Exit(1) |
| 143 | + } |
| 144 | + |
| 145 | + ioHandler, err := workspacefile.NewIOHandler(opFlags.OpenAPIdefinitionsPath) |
| 146 | + if err != nil { |
| 147 | + setupLog.Error(err, "failed to create IO Handler") |
| 148 | + os.Exit(1) |
| 149 | + } |
| 150 | + |
| 151 | + df, err := discoveryclient.NewFactory(virtualWorkspaceCfg) |
| 152 | + if err != nil { |
| 153 | + setupLog.Error(err, "failed to create Discovery client factory") |
| 154 | + os.Exit(1) |
| 155 | + } |
| 156 | + |
| 157 | + reconciler := controller.NewAPIBindingReconciler( |
| 158 | + ioHandler, df, apischema.NewResolver(), |
| 159 | + ) |
| 160 | + |
| 161 | + err = reconciler.SetupWithManager(mgr) |
| 162 | + if err != nil { |
| 163 | + setupLog.Error(err, "unable to create controller", "controller", "Workspace") |
| 164 | + os.Exit(1) |
| 165 | + } |
| 166 | + // +kubebuilder:scaffold:builder |
| 167 | + |
| 168 | + if err := mgr.AddHealthzCheck("healthz", healthz.Ping); err != nil { |
| 169 | + setupLog.Error(err, "unable to set up health check") |
| 170 | + os.Exit(1) |
| 171 | + } |
| 172 | + if err := mgr.AddReadyzCheck("readyz", healthz.Ping); err != nil { |
| 173 | + setupLog.Error(err, "unable to set up ready check") |
| 174 | + os.Exit(1) |
| 175 | + } |
| 176 | + |
| 177 | + setupLog.Info("starting manager") |
| 178 | + signalHandler := ctrl.SetupSignalHandler() |
| 179 | + err = mgr.Start(signalHandler) |
| 180 | + if err != nil { |
| 181 | + setupLog.Error(err, "problem running manager") |
| 182 | + os.Exit(1) |
| 183 | + } |
| 184 | + }, |
| 185 | +} |
0 commit comments