mirror of
https://github.com/kairos-io/entangle.git
synced 2025-09-23 09:47:34 +00:00
87
controllers/daemonset.go
Normal file
87
controllers/daemonset.go
Normal file
@@ -0,0 +1,87 @@
|
||||
package controllers
|
||||
|
||||
import (
|
||||
entanglev1alpha1 "github.com/kairos-io/entangle/api/v1alpha1"
|
||||
appsv1 "k8s.io/api/apps/v1"
|
||||
v1 "k8s.io/api/core/v1"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||
)
|
||||
|
||||
func genDaemonsetOwner(ent entanglev1alpha1.VPN) []metav1.OwnerReference {
|
||||
return []metav1.OwnerReference{
|
||||
*metav1.NewControllerRef(&ent.ObjectMeta, schema.GroupVersionKind{
|
||||
Group: entanglev1alpha1.GroupVersion.Group,
|
||||
Version: entanglev1alpha1.GroupVersion.Version,
|
||||
Kind: "VPN",
|
||||
}),
|
||||
}
|
||||
}
|
||||
|
||||
func (r *VPNReconciler) genDaemonset(ent entanglev1alpha1.VPN) (*appsv1.DaemonSet, error) {
|
||||
objMeta := metav1.ObjectMeta{
|
||||
Name: ent.Name,
|
||||
Namespace: ent.Namespace,
|
||||
OwnerReferences: genDaemonsetOwner(ent),
|
||||
}
|
||||
|
||||
privileged := true
|
||||
serviceAccount := false
|
||||
|
||||
v := ent.Spec.Env
|
||||
v = append(v, v1.EnvVar{
|
||||
Name: "EDGEVPNTOKEN",
|
||||
ValueFrom: &v1.EnvVarSource{
|
||||
SecretKeyRef: &v1.SecretKeySelector{
|
||||
Key: "network_token",
|
||||
LocalObjectReference: v1.LocalObjectReference{
|
||||
Name: *ent.Spec.SecretRef,
|
||||
},
|
||||
},
|
||||
},
|
||||
})
|
||||
|
||||
expose := v1.Container{
|
||||
SecurityContext: &v1.SecurityContext{
|
||||
Privileged: &privileged,
|
||||
Capabilities: &v1.Capabilities{
|
||||
Add: []v1.Capability{"NET_ADMIN"},
|
||||
},
|
||||
},
|
||||
ImagePullPolicy: v1.PullAlways,
|
||||
Name: "vpn",
|
||||
Image: r.EntangleServiceImage,
|
||||
Env: v,
|
||||
Command: []string{"/usr/bin/edgevpn"},
|
||||
VolumeMounts: []v1.VolumeMount{v1.VolumeMount{Name: "dev-net-tun", MountPath: "/dev/net/tun"}},
|
||||
}
|
||||
|
||||
pod := v1.PodSpec{
|
||||
Containers: []v1.Container{expose},
|
||||
AutomountServiceAccountToken: &serviceAccount,
|
||||
HostNetwork: true,
|
||||
Volumes: []v1.Volume{v1.Volume{Name: "dev-net-tun", VolumeSource: v1.VolumeSource{HostPath: &v1.HostPathVolumeSource{Path: "/dev/net/tun"}}}},
|
||||
}
|
||||
|
||||
deploymentLabels := getnDaemonsetLabel(ent.Name)
|
||||
|
||||
return &appsv1.DaemonSet{
|
||||
ObjectMeta: objMeta,
|
||||
|
||||
Spec: appsv1.DaemonSetSpec{
|
||||
Selector: &metav1.LabelSelector{MatchLabels: deploymentLabels},
|
||||
Template: v1.PodTemplateSpec{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Labels: deploymentLabels,
|
||||
},
|
||||
Spec: pod,
|
||||
},
|
||||
},
|
||||
}, nil
|
||||
}
|
||||
|
||||
func getnDaemonsetLabel(s string) map[string]string {
|
||||
return map[string]string{
|
||||
"vpn.kairos.io": s,
|
||||
}
|
||||
}
|
@@ -70,7 +70,7 @@ func (r *EntanglementReconciler) Reconcile(ctx context.Context, req ctrl.Request
|
||||
return ctrl.Result{}, err
|
||||
}
|
||||
|
||||
desiredDeployment, err := r.genDeployment(ent,r.LogLevel)
|
||||
desiredDeployment, err := r.genDeployment(ent, r.LogLevel)
|
||||
if err != nil {
|
||||
return ctrl.Result{}, err
|
||||
}
|
||||
|
114
controllers/vpn_controller.go
Normal file
114
controllers/vpn_controller.go
Normal file
@@ -0,0 +1,114 @@
|
||||
/*
|
||||
Copyright 2022.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
|
||||
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
||||
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/runtime"
|
||||
"k8s.io/client-go/kubernetes"
|
||||
ctrl "sigs.k8s.io/controller-runtime"
|
||||
"sigs.k8s.io/controller-runtime/pkg/client"
|
||||
"sigs.k8s.io/controller-runtime/pkg/log"
|
||||
|
||||
entanglev1alpha1 "github.com/kairos-io/entangle/api/v1alpha1"
|
||||
)
|
||||
|
||||
// VPNReconciler reconciles a VPN object
|
||||
type VPNReconciler struct {
|
||||
client.Client
|
||||
Scheme *runtime.Scheme
|
||||
|
||||
clientSet *kubernetes.Clientset
|
||||
EntangleServiceImage string
|
||||
}
|
||||
|
||||
//+kubebuilder:rbac:groups=entangle.kairos.io,resources=vpns,verbs=get;list;watch;create;update;patch;delete
|
||||
//+kubebuilder:rbac:groups=entangle.kairos.io,resources=vpns/status,verbs=get;update;patch
|
||||
//+kubebuilder:rbac:groups=entangle.kairos.io,resources=vpns/finalizers,verbs=update
|
||||
//+kubebuilder:rbac:groups=apps,resources=daemonsets,verbs=get;list;watch;create;update;patch;delete
|
||||
//+kubebuilder:rbac:groups="",resources=secrets,verbs=create;get;list;watch
|
||||
|
||||
// Reconcile is part of the main kubernetes reconciliation loop which aims to
|
||||
// move the current state of the cluster closer to the desired state.
|
||||
// TODO(user): Modify the Reconcile function to compare the state specified by
|
||||
// the VPN object against the actual cluster state, and then
|
||||
// perform operations to make the cluster state reflect the state specified by
|
||||
// the user.
|
||||
//
|
||||
// For more details, check Reconcile and its Result here:
|
||||
// - https://pkg.go.dev/sigs.k8s.io/controller-runtime@v0.13.0/pkg/reconcile
|
||||
func (r *VPNReconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) {
|
||||
logger := log.FromContext(ctx)
|
||||
|
||||
// Creates a deployment targeting a service
|
||||
// TODO(user): your logic here
|
||||
var ent entanglev1alpha1.VPN
|
||||
if err := r.Get(ctx, req.NamespacedName, &ent); err != nil {
|
||||
if apierrors.IsNotFound(err) {
|
||||
return ctrl.Result{}, nil
|
||||
}
|
||||
return ctrl.Result{}, err
|
||||
}
|
||||
|
||||
desiredDaemonset, err := r.genDaemonset(ent)
|
||||
if err != nil {
|
||||
return ctrl.Result{}, err
|
||||
}
|
||||
|
||||
daemonset, err := r.clientSet.AppsV1().DaemonSets(req.Namespace).Get(ctx, desiredDaemonset.Name, v1.GetOptions{})
|
||||
if daemonset == nil || apierrors.IsNotFound(err) {
|
||||
logger.Info(fmt.Sprintf("Creating Daemonset %v", daemonset))
|
||||
|
||||
daemonset, err = r.clientSet.AppsV1().DaemonSets(req.Namespace).Create(ctx, desiredDaemonset, v1.CreateOptions{})
|
||||
if err != nil {
|
||||
logger.Error(err, "Failed while creating daemonset")
|
||||
return ctrl.Result{}, nil
|
||||
}
|
||||
|
||||
return ctrl.Result{Requeue: true}, nil
|
||||
}
|
||||
if err != nil {
|
||||
return ctrl.Result{Requeue: true}, err
|
||||
}
|
||||
|
||||
// // If args or env are missing, update it
|
||||
// if desiredDaemonset.{
|
||||
// deployment, err = r.clientSet.AppsV1().Deployments(req.Namespace).Update(ctx, desiredDeployment, v1.UpdateOptions{})
|
||||
// if err != nil {
|
||||
// logger.Error(err, "Failed while updating deployment")
|
||||
// return ctrl.Result{}, nil
|
||||
// }
|
||||
// }
|
||||
|
||||
return ctrl.Result{}, nil
|
||||
}
|
||||
|
||||
// SetupWithManager sets up the controller with the Manager.
|
||||
func (r *VPNReconciler) SetupWithManager(mgr ctrl.Manager) error {
|
||||
clientset, err := kubernetes.NewForConfig(mgr.GetConfig())
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
r.clientSet = clientset
|
||||
return ctrl.NewControllerManagedBy(mgr).
|
||||
For(&entanglev1alpha1.VPN{}).
|
||||
Complete(r)
|
||||
}
|
Reference in New Issue
Block a user