| // Licensed to the Apache Software Foundation (ASF) under one |
| // or more contributor license agreements. See the NOTICE file |
| // distributed with this work for additional information |
| // regarding copyright ownership. The ASF licenses this file |
| // to you under the Apache License, Version 2.0 (the |
| // "License"); you may not use this file except in compliance |
| // with the License. You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, |
| // software distributed under the License is distributed on an |
| // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| // KIND, either express or implied. See the License for the |
| // specific language governing permissions and limitations |
| // under the License. |
| |
| package manager |
| |
| import ( |
| "context" |
| |
| "github.com/go-logr/logr" |
| netv1 "k8s.io/api/networking/v1" |
| "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" |
| "k8s.io/apimachinery/pkg/runtime" |
| "k8s.io/apimachinery/pkg/runtime/schema" |
| ctrl "sigs.k8s.io/controller-runtime" |
| "sigs.k8s.io/controller-runtime/pkg/client" |
| "sigs.k8s.io/controller-runtime/pkg/manager" |
| gatewayv1 "sigs.k8s.io/gateway-api/apis/v1" |
| gatewayv1alpha2 "sigs.k8s.io/gateway-api/apis/v1alpha2" |
| |
| "github.com/apache/apisix-ingress-controller/api/v1alpha1" |
| apiv2 "github.com/apache/apisix-ingress-controller/api/v2" |
| "github.com/apache/apisix-ingress-controller/internal/controller" |
| "github.com/apache/apisix-ingress-controller/internal/controller/config" |
| "github.com/apache/apisix-ingress-controller/internal/controller/indexer" |
| "github.com/apache/apisix-ingress-controller/internal/controller/status" |
| "github.com/apache/apisix-ingress-controller/internal/manager/readiness" |
| "github.com/apache/apisix-ingress-controller/internal/provider" |
| types "github.com/apache/apisix-ingress-controller/internal/types" |
| "github.com/apache/apisix-ingress-controller/pkg/utils" |
| ) |
| |
| // K8s |
| // +kubebuilder:rbac:groups="",resources=events,verbs=create;patch |
| // +kubebuilder:rbac:groups=coordination.k8s.io,resources=leases,verbs=get;list;watch;create;update;patch;delete |
| // +kubebuilder:rbac:groups="discovery.k8s.io",resources=endpointslices,verbs=get;list;watch |
| // +kubebuilder:rbac:groups="",resources=services,verbs=get;list;watch |
| // +kubebuilder:rbac:groups="",resources=pods,verbs=get;list;watch |
| // +kubebuilder:rbac:groups="",resources=secrets,verbs=get;list;watch |
| // +kubebuilder:rbac:groups="",resources=namespaces,verbs=get;list;watch |
| |
| // CustomResourceDefinition v2 |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=apisixconsumers,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=apisixglobalrules,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=apisixpluginconfigs,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=apisixroutes,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=apisixtlses,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=apisixupstreams,verbs=get;list;watch |
| |
| // CustomResourceDefinition v2 status |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=apisixconsumers/status,verbs=get;update |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=apisixglobalrules/status,verbs=get;update |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=apisixpluginconfigs/status,verbs=get;update |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=apisixroutes/status,verbs=get;update |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=apisixtlses/status,verbs=get;update |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=apisixupstreams/status,verbs=get;update |
| |
| // CustomResourceDefinition |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=pluginconfigs,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=gatewayproxies,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=consumers,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=consumers/status,verbs=get;update |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=backendtrafficpolicies,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=backendtrafficpolicies/status,verbs=get;update |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=httproutepolicies,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=apisix.apache.org,resources=httproutepolicies/status,verbs=get;update |
| |
| // GatewayAPI |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=gatewayclasses,verbs=get;list;watch;update |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=gatewayclasses/status,verbs=get;update |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=gateways,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=gateways/status,verbs=get;update |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=httproutes,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=httproutes/status,verbs=get;update |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=tcproutes,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=tcproutes/status,verbs=get;update |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=udproutes,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=udproutes/status,verbs=get;update |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=referencegrants,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=referencegrants/status,verbs=get;update |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=grpcroutes,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=grpcroutes/status,verbs=get;update |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=tlsroutes,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=gateway.networking.k8s.io,resources=tlsroutes/status,verbs=get;update |
| |
| // Networking |
| // +kubebuilder:rbac:groups=networking.k8s.io,resources=ingresses,verbs=get;list;watch |
| // +kubebuilder:rbac:groups=networking.k8s.io,resources=ingresses/status,verbs=get;update |
| // +kubebuilder:rbac:groups=networking.k8s.io,resources=ingressclasses,verbs=get;list;watch |
| |
| type Controller interface { |
| SetupWithManager(mgr manager.Manager) error |
| } |
| |
| func setupControllers(ctx context.Context, mgr manager.Manager, pro provider.Provider, updater status.Updater, readier readiness.ReadinessManager) ([]Controller, error) { |
| setupLog := ctrl.LoggerFrom(ctx).WithName("setup") |
| |
| if err := indexer.SetupAPIv1alpha1Indexer(mgr); err != nil { |
| setupLog.Error(err, "failed to setup v1alpha1 indexer") |
| return nil, err |
| } |
| |
| runnables := []Controller{} |
| if controllers, err := setupGatewayAPIControllers(ctx, mgr, pro, updater, readier); err != nil { |
| setupLog.Error(err, "failed to setup Gateway API controllers") |
| return nil, err |
| } else { |
| runnables = append(runnables, controllers...) |
| } |
| |
| if controllers, err := setupAPIv2Controllers(ctx, mgr, pro, updater, readier); err != nil { |
| setupLog.Error(err, "failed to setup API v2 controllers") |
| return nil, err |
| } else { |
| runnables = append(runnables, controllers...) |
| } |
| |
| // required controller |
| runnables = append(runnables, &controller.GatewayProxyController{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindGatewayProxy), |
| Provider: pro, |
| }) |
| return runnables, nil |
| } |
| |
| func setupGatewayAPIControllers(ctx context.Context, mgr manager.Manager, pro provider.Provider, updater status.Updater, readier readiness.ReadinessManager) ([]Controller, error) { |
| if err := indexer.SetupGatewayAPIIndexer(mgr); err != nil { |
| return nil, err |
| } |
| |
| setupLog := ctrl.LoggerFrom(ctx).WithName("setup").WithName("gatewayapi") |
| runnables := []Controller{} |
| for resource, controller := range map[client.Object]Controller{ |
| &gatewayv1.GatewayClass{}: &controller.GatewayClassReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindGatewayClass), |
| Updater: updater, |
| }, |
| &gatewayv1.Gateway{}: &controller.GatewayReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindGateway), |
| Provider: pro, |
| Updater: updater, |
| }, |
| &gatewayv1.HTTPRoute{}: &controller.HTTPRouteReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindHTTPRoute), |
| Provider: pro, |
| Updater: updater, |
| Readier: readier, |
| }, |
| &gatewayv1.GRPCRoute{}: &controller.GRPCRouteReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindGRPCRoute), |
| Provider: pro, |
| Updater: updater, |
| Readier: readier, |
| }, |
| &gatewayv1alpha2.TCPRoute{}: &controller.TCPRouteReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindTCPRoute), |
| Provider: pro, |
| Updater: updater, |
| Readier: readier, |
| }, |
| &gatewayv1alpha2.UDPRoute{}: &controller.UDPRouteReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindUDPRoute), |
| Provider: pro, |
| Updater: updater, |
| Readier: readier, |
| }, |
| &gatewayv1alpha2.TLSRoute{}: &controller.TLSRouteReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindTLSRoute), |
| Provider: pro, |
| Updater: updater, |
| Readier: readier, |
| }, |
| &v1alpha1.Consumer{}: &controller.ConsumerReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindConsumer), |
| Provider: pro, |
| Updater: updater, |
| Readier: readier, |
| }, |
| } { |
| if utils.HasAPIResource(mgr, resource) { |
| runnables = append(runnables, controller) |
| } else { |
| setupLog.Info("Skipping indexer setup, API not found in cluster", "api", utils.FormatGVK(resource)) |
| } |
| } |
| return runnables, nil |
| } |
| |
| func setupAPIv2Controllers(ctx context.Context, mgr manager.Manager, pro provider.Provider, updater status.Updater, readier readiness.ReadinessManager) ([]Controller, error) { |
| if err := indexer.SetupAPIv2Indexer(mgr); err != nil { |
| return nil, err |
| } |
| |
| setupLog := ctrl.LoggerFrom(ctx).WithName("setup").WithName("apiv2") |
| |
| runnables := []Controller{} |
| for resource, controller := range map[client.Object]Controller{ |
| &netv1.IngressClass{}: &controller.IngressClassReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindIngressClass), |
| Provider: pro, |
| }, |
| &netv1.Ingress{}: &controller.IngressReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindIngress), |
| Provider: pro, |
| Updater: updater, |
| Readier: readier, |
| }, |
| &apiv2.ApisixGlobalRule{}: &controller.ApisixGlobalRuleReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindApisixGlobalRule), |
| Provider: pro, |
| Updater: updater, |
| Readier: readier, |
| }, |
| &apiv2.ApisixRoute{}: &controller.ApisixRouteReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindApisixRoute), |
| Provider: pro, |
| Updater: updater, |
| Readier: readier, |
| }, |
| &apiv2.ApisixConsumer{}: &controller.ApisixConsumerReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindApisixConsumer), |
| Provider: pro, |
| Updater: updater, |
| Readier: readier, |
| }, |
| &apiv2.ApisixPluginConfig{}: &controller.ApisixPluginConfigReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindApisixPluginConfig), |
| Updater: updater, |
| }, |
| &apiv2.ApisixTls{}: &controller.ApisixTlsReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindApisixTls), |
| Provider: pro, |
| Updater: updater, |
| Readier: readier, |
| }, |
| &apiv2.ApisixUpstream{}: &controller.ApisixUpstreamReconciler{ |
| Client: mgr.GetClient(), |
| Scheme: mgr.GetScheme(), |
| Log: ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindApisixUpstream), |
| Updater: updater, |
| }, |
| } { |
| if utils.HasAPIResource(mgr, resource) { |
| runnables = append(runnables, controller) |
| } else { |
| setupLog.Info("Skipping indexer setup, API not found in cluster", "api", utils.FormatGVK(resource)) |
| } |
| } |
| return runnables, nil |
| } |
| |
| func registerReadiness(mgr manager.Manager, readier readiness.ReadinessManager) { |
| log := ctrl.LoggerFrom(context.Background()).WithName("readiness") |
| |
| registerAPIv2ForReadiness(mgr, log, readier) |
| if !config.ControllerConfig.DisableGatewayAPI { |
| registerGatewayAPIForReadiness(mgr, log, readier) |
| } |
| registerAPIv1alpha1ForReadiness(mgr, log, readier) |
| } |
| |
| func registerGatewayAPIForReadiness( |
| mgr manager.Manager, |
| log logr.Logger, |
| readier readiness.ReadinessManager, |
| ) { |
| var installed []schema.GroupVersionKind |
| for _, resource := range []client.Object{ |
| &gatewayv1.HTTPRoute{}, |
| &gatewayv1.GRPCRoute{}, |
| &gatewayv1alpha2.TCPRoute{}, |
| &gatewayv1alpha2.UDPRoute{}, |
| &gatewayv1alpha2.TLSRoute{}, |
| } { |
| gvk := types.GvkOf(resource) |
| if utils.HasAPIResource(mgr, resource) { |
| installed = append(installed, gvk) |
| } else { |
| log.Info("Skipping readiness registration, API not found", "gvk", gvk) |
| } |
| } |
| if len(installed) == 0 { |
| return |
| } |
| |
| readier.RegisterGVK(readiness.GVKConfig{GVKs: installed}) |
| } |
| |
| func registerAPIv2ForReadiness( |
| mgr manager.Manager, |
| log logr.Logger, |
| readier readiness.ReadinessManager, |
| ) { |
| var installed []schema.GroupVersionKind |
| for _, resource := range []client.Object{ |
| &netv1.Ingress{}, |
| &apiv2.ApisixRoute{}, |
| &apiv2.ApisixGlobalRule{}, |
| &apiv2.ApisixPluginConfig{}, |
| &apiv2.ApisixTls{}, |
| &apiv2.ApisixConsumer{}, |
| &apiv2.ApisixUpstream{}, |
| } { |
| gvk := types.GvkOf(resource) |
| if utils.HasAPIResource(mgr, resource) { |
| installed = append(installed, gvk) |
| } else { |
| log.Info("Skipping readiness registration, API not found", "gvk", gvk) |
| } |
| } |
| |
| if len(installed) == 0 { |
| return |
| } |
| |
| readier.RegisterGVK(readiness.GVKConfig{ |
| GVKs: installed, |
| Filter: readiness.GVKFilter(func(obj *unstructured.Unstructured) bool { |
| icName, _, _ := unstructured.NestedString(obj.Object, "spec", "ingressClassName") |
| ingressClass, _ := controller.FindMatchingIngressClassByName(context.Background(), mgr.GetClient(), log, icName) |
| return ingressClass != nil |
| }), |
| }) |
| } |
| |
| func registerAPIv1alpha1ForReadiness( |
| mgr manager.Manager, |
| log logr.Logger, |
| readier readiness.ReadinessManager, |
| ) { |
| var installed []schema.GroupVersionKind |
| for _, resource := range []client.Object{ |
| &v1alpha1.Consumer{}, |
| } { |
| gvk := types.GvkOf(resource) |
| if utils.HasAPIResource(mgr, resource) { |
| installed = append(installed, gvk) |
| } else { |
| log.Info("Skipping readiness registration, API not found", "gvk", gvk) |
| } |
| } |
| if len(installed) == 0 { |
| return |
| } |
| |
| readier.RegisterGVK(readiness.GVKConfig{ |
| GVKs: installed, |
| Filter: readiness.GVKFilter(func(obj *unstructured.Unstructured) bool { |
| consumer := &v1alpha1.Consumer{} |
| if err := runtime.DefaultUnstructuredConverter.FromUnstructured(obj.Object, consumer); err != nil { |
| return false |
| } |
| return controller.MatchConsumerGatewayRef(context.Background(), mgr.GetClient(), log, consumer) |
| }), |
| }) |
| } |