blob: 76648a4a22f74c72e72863194267aeb442b00646 [file] [log] [blame]
// Licensed to the Apache Software Foundation (ASF) under one
// or more contributor license agreements. See the NOTICE file
// distributed with this work for additional information
// regarding copyright ownership. The ASF licenses this file
// to you under the Apache License, Version 2.0 (the
// "License"); you may not use this file except in compliance
// with the License. You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing,
// software distributed under the License is distributed on an
// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
// KIND, either express or implied. See the License for the
// specific language governing permissions and limitations
// under the License.
package controller
import (
"context"
"errors"
"fmt"
"reflect"
"github.com/go-logr/logr"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/types"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/builder"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/handler"
"sigs.k8s.io/controller-runtime/pkg/predicate"
"sigs.k8s.io/controller-runtime/pkg/reconcile"
gatewayv1 "sigs.k8s.io/gateway-api/apis/v1"
"sigs.k8s.io/gateway-api/apis/v1beta1"
"github.com/apache/apisix-ingress-controller/api/v1alpha1"
"github.com/apache/apisix-ingress-controller/internal/controller/indexer"
"github.com/apache/apisix-ingress-controller/internal/controller/status"
"github.com/apache/apisix-ingress-controller/internal/provider"
internaltypes "github.com/apache/apisix-ingress-controller/internal/types"
"github.com/apache/apisix-ingress-controller/internal/utils"
)
// GatewayReconciler reconciles a Gateway object.
type GatewayReconciler struct { //nolint:revive
client.Client
Scheme *runtime.Scheme
Log logr.Logger
Provider provider.Provider
Updater status.Updater
}
// SetupWithManager sets up the controller with the Manager.
func (r *GatewayReconciler) SetupWithManager(mgr ctrl.Manager) error {
bdr := ctrl.NewControllerManagedBy(mgr).
For(
&gatewayv1.Gateway{},
builder.WithPredicates(
predicate.NewPredicateFuncs(r.checkGatewayClass),
),
).
WithEventFilter(
predicate.Or(
predicate.GenerationChangedPredicate{},
predicate.NewPredicateFuncs(TypePredicate[*corev1.Secret]()),
),
).
Watches(
&gatewayv1.GatewayClass{},
handler.EnqueueRequestsFromMapFunc(r.listGatewayForGatewayClass),
builder.WithPredicates(
predicate.NewPredicateFuncs(r.matchesGatewayClass),
),
).
Watches(
&gatewayv1.HTTPRoute{},
handler.EnqueueRequestsFromMapFunc(r.listGatewaysForHTTPRoute),
).
Watches(
&v1alpha1.GatewayProxy{},
handler.EnqueueRequestsFromMapFunc(r.listGatewaysForGatewayProxy),
).
Watches(
&corev1.Secret{},
handler.EnqueueRequestsFromMapFunc(r.listGatewaysForSecret),
)
if GetEnableReferenceGrant() {
bdr.Watches(&v1beta1.ReferenceGrant{},
handler.EnqueueRequestsFromMapFunc(r.listReferenceGrantsForGateway),
builder.WithPredicates(referenceGrantPredicates(KindGateway)),
)
}
return bdr.Complete(r)
}
func (r *GatewayReconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) {
gateway := new(gatewayv1.Gateway)
if err := r.Get(ctx, req.NamespacedName, gateway); err != nil {
if client.IgnoreNotFound(err) == nil {
gateway.Namespace = req.Namespace
gateway.Name = req.Name
gateway.TypeMeta = metav1.TypeMeta{
Kind: KindGateway,
APIVersion: gatewayv1.GroupVersion.String(),
}
if err := r.Provider.Delete(ctx, gateway); err != nil {
return ctrl.Result{}, err
}
return ctrl.Result{}, nil
}
return ctrl.Result{}, err
}
conditionProgrammedStatus, conditionProgrammedMsg := true, "Programmed"
r.Log.Info("gateway has been accepted", "gateway", gateway.GetName())
type conditionStatus struct {
status bool
msg string
}
acceptStatus := conditionStatus{
status: true,
msg: acceptedMessage("gateway"),
}
// create a translation context
tctx := provider.NewDefaultTranslateContext(ctx)
r.processListenerConfig(tctx, gateway)
if err := r.processInfrastructure(tctx, gateway); err != nil {
acceptStatus = conditionStatus{
status: false,
msg: err.Error(),
}
}
var addrs []gatewayv1.GatewayStatusAddress
rk := utils.NamespacedNameKind(gateway)
gatewayProxy, ok := tctx.GatewayProxies[rk]
if !ok {
acceptStatus = conditionStatus{
status: false,
msg: "gateway proxy not found",
}
} else {
if len(gateway.Status.Addresses) != len(gatewayProxy.Spec.StatusAddress) {
for _, addr := range gatewayProxy.Spec.StatusAddress {
if addr == "" {
continue
}
addrs = append(addrs,
gatewayv1.GatewayStatusAddress{
Value: addr,
},
)
}
}
}
listenerStatuses, err := getListenerStatus(ctx, r.Client, gateway)
if err != nil {
r.Log.Error(err, "failed to get listener status", "gateway", req.NamespacedName)
return ctrl.Result{}, err
}
if err := r.Provider.Update(ctx, tctx, gateway); err != nil {
acceptStatus = conditionStatus{
status: false,
msg: err.Error(),
}
}
accepted := SetGatewayConditionAccepted(gateway, acceptStatus.status, acceptStatus.msg)
programmed := SetGatewayConditionProgrammed(gateway, conditionProgrammedStatus, conditionProgrammedMsg)
if accepted || programmed || len(addrs) > 0 || len(listenerStatuses) > 0 {
if len(addrs) > 0 {
gateway.Status.Addresses = addrs
}
if len(listenerStatuses) > 0 {
gateway.Status.Listeners = listenerStatuses
}
r.Updater.Update(status.Update{
NamespacedName: utils.NamespacedName(gateway),
Resource: &gatewayv1.Gateway{},
Mutator: status.MutatorFunc(func(obj client.Object) client.Object {
t, ok := obj.(*gatewayv1.Gateway)
if !ok {
err := fmt.Errorf("unsupported object type %T", obj)
panic(err)
}
tCopy := t.DeepCopy()
tCopy.Status = gateway.Status
return tCopy
}),
})
return ctrl.Result{}, nil
}
return ctrl.Result{}, nil
}
func (r *GatewayReconciler) matchesGatewayClass(obj client.Object) bool {
gateway, ok := obj.(*gatewayv1.GatewayClass)
if !ok {
r.Log.Error(fmt.Errorf("unexpected object type"), "failed to convert object to Gateway")
return false
}
return matchesController(string(gateway.Spec.ControllerName))
}
/*
func (r *GatewayReconciler) matchesGatewayForControlPlaneConfig(obj client.Object) bool {
gateway, ok := obj.(*gatewayv1.Gateway)
if !ok {
r.Log.Error(fmt.Errorf("unexpected object type"), "failed to convert object to Gateway")
return false
}
cfg := config.GetControlPlaneConfigByGatewatName(gateway.GetName())
ok = true
if cfg == nil {
ok = false
}
return ok
}
*/
func (r *GatewayReconciler) listGatewayForGatewayClass(ctx context.Context, gatewayClass client.Object) []reconcile.Request {
gatewayList := &gatewayv1.GatewayList{}
if err := r.List(context.Background(), gatewayList); err != nil {
r.Log.Error(err, "failed to list gateways for gateway class",
"gatewayclass", gatewayClass.GetName(),
)
return nil
}
/*
gateways := []gatewayv1.Gateway{}
for _, gateway := range gatewayList.Items {
if cp := config.GetControlPlaneConfigByGatewatName(gateway.GetName()); cp != nil {
gateways = append(gateways, gateway)
}
}
*/
return reconcileGatewaysMatchGatewayClass(gatewayClass, gatewayList.Items)
}
func (r *GatewayReconciler) checkGatewayClass(obj client.Object) bool {
gateway := obj.(*gatewayv1.Gateway)
gatewayClass := &gatewayv1.GatewayClass{}
if err := r.Get(context.Background(), client.ObjectKey{Name: string(gateway.Spec.GatewayClassName)}, gatewayClass); err != nil {
r.Log.Error(err, "failed to get gateway class", "gateway", gateway.GetName(), "gatewayclass", gateway.Spec.GatewayClassName)
return false
}
return matchesController(string(gatewayClass.Spec.ControllerName))
}
func (r *GatewayReconciler) listGatewaysForGatewayProxy(ctx context.Context, obj client.Object) []reconcile.Request {
gatewayProxy, ok := obj.(*v1alpha1.GatewayProxy)
if !ok {
r.Log.Error(fmt.Errorf("unexpected object type"), "failed to convert object to GatewayProxy")
return nil
}
namespace := gatewayProxy.GetNamespace()
name := gatewayProxy.GetName()
gatewayList := &gatewayv1.GatewayList{}
if err := r.List(ctx, gatewayList, client.MatchingFields{
indexer.ParametersRef: indexer.GenIndexKey(namespace, name),
}); err != nil {
r.Log.Error(err, "failed to list gateways for gateway proxy", "gatewayproxy", gatewayProxy.GetName())
return nil
}
recs := make([]reconcile.Request, 0, len(gatewayList.Items))
for _, gateway := range gatewayList.Items {
if !r.checkGatewayClass(&gateway) {
continue
}
recs = append(recs, reconcile.Request{
NamespacedName: client.ObjectKey{
Namespace: gateway.GetNamespace(),
Name: gateway.GetName(),
},
})
}
return recs
}
func (r *GatewayReconciler) listGatewaysForHTTPRoute(ctx context.Context, obj client.Object) []reconcile.Request {
httpRoute, ok := obj.(*gatewayv1.HTTPRoute)
if !ok {
r.Log.Error(
fmt.Errorf("unexpected object type"),
"HTTPRoute watch predicate received unexpected object type",
"expected", "*gatewayapi.HTTPRoute", "found", reflect.TypeOf(obj),
)
return nil
}
recs := []reconcile.Request{}
for _, routeParentStatus := range httpRoute.Status.Parents {
gatewayNamespace := httpRoute.GetNamespace()
parentRef := routeParentStatus.ParentRef
if parentRef.Group != nil && *parentRef.Group != gatewayv1.GroupName {
continue
}
if parentRef.Kind != nil && *parentRef.Kind != internaltypes.KindGateway {
continue
}
if parentRef.Namespace != nil {
gatewayNamespace = string(*parentRef.Namespace)
}
gateway := new(gatewayv1.Gateway)
if err := r.Get(ctx, client.ObjectKey{
Namespace: gatewayNamespace,
Name: string(parentRef.Name),
}, gateway); err != nil {
continue
}
if !r.checkGatewayClass(gateway) {
continue
}
recs = append(recs, reconcile.Request{
NamespacedName: client.ObjectKey{
Namespace: gatewayNamespace,
Name: string(parentRef.Name),
},
})
}
return recs
}
func (r *GatewayReconciler) listGatewaysForSecret(ctx context.Context, obj client.Object) (requests []reconcile.Request) {
secret, ok := obj.(*corev1.Secret)
if !ok {
r.Log.Error(
errors.New("unexpected object type"),
"Secret watch predicate received unexpected object type",
"expected", FullTypeName(new(corev1.Secret)), "found", FullTypeName(obj),
)
return nil
}
var gatewayList gatewayv1.GatewayList
if err := r.List(ctx, &gatewayList, client.MatchingFields{
indexer.SecretIndexRef: indexer.GenIndexKey(secret.GetNamespace(), secret.GetName()),
}); err != nil {
r.Log.Error(err, "failed to list gateways")
return nil
}
for _, gateway := range gatewayList.Items {
requests = append(requests, reconcile.Request{
NamespacedName: types.NamespacedName{
Namespace: gateway.GetNamespace(),
Name: gateway.GetName(),
},
})
}
return requests
}
func (r *GatewayReconciler) listReferenceGrantsForGateway(ctx context.Context, obj client.Object) (requests []reconcile.Request) {
grant, ok := obj.(*v1beta1.ReferenceGrant)
if !ok {
r.Log.Error(
errors.New("unexpected object type"),
"ReferenceGrant watch predicate received unexpected object type",
"expected", FullTypeName(new(v1beta1.ReferenceGrant)), "found", FullTypeName(obj),
)
return nil
}
var gatewayList gatewayv1.GatewayList
if err := r.List(ctx, &gatewayList); err != nil {
r.Log.Error(err, "failed to list gateways in watch predicate", "ReferenceGrant", grant.GetName())
return nil
}
for _, gateway := range gatewayList.Items {
gw := v1beta1.ReferenceGrantFrom{
Group: gatewayv1.GroupName,
Kind: KindGateway,
Namespace: v1beta1.Namespace(gateway.GetNamespace()),
}
for _, from := range grant.Spec.From {
if from == gw {
requests = append(requests, reconcile.Request{
NamespacedName: types.NamespacedName{
Namespace: gateway.GetNamespace(),
Name: gateway.GetName(),
},
})
}
}
}
return requests
}
func (r *GatewayReconciler) processInfrastructure(tctx *provider.TranslateContext, gateway *gatewayv1.Gateway) error {
return ProcessGatewayProxy(r.Client, r.Log, tctx, gateway, utils.NamespacedNameKind(gateway))
}
func (r *GatewayReconciler) processListenerConfig(tctx *provider.TranslateContext, gateway *gatewayv1.Gateway) {
listeners := gateway.Spec.Listeners
for _, listener := range listeners {
if listener.TLS == nil || listener.TLS.CertificateRefs == nil {
continue
}
secret := corev1.Secret{}
for _, ref := range listener.TLS.CertificateRefs {
ns := gateway.GetNamespace()
if ref.Namespace != nil {
ns = string(*ref.Namespace)
}
if ref.Kind != nil && *ref.Kind == KindSecret {
if err := r.Get(context.Background(), client.ObjectKey{
Namespace: ns,
Name: string(ref.Name),
}, &secret); err != nil {
r.Log.Error(err, "failed to get secret", "namespace", ns, "name", ref.Name)
SetGatewayListenerConditionProgrammed(gateway, string(listener.Name), false, err.Error())
SetGatewayListenerConditionResolvedRefs(gateway, string(listener.Name), false, err.Error())
break
}
r.Log.Info("Setting secret for listener", "listener", listener.Name, "secret", secret.Name, " namespace", ns)
tctx.Secrets[types.NamespacedName{Namespace: ns, Name: string(ref.Name)}] = &secret
}
}
}
}