This repository has been archived by the owner on Jun 19, 2022. It is now read-only.
/
controller.go
102 lines (84 loc) · 3.4 KB
/
controller.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
/*
Copyright 2020 Google LLC
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package deployment
import (
"context"
"os"
"k8s.io/apimachinery/pkg/types"
"k8s.io/apimachinery/pkg/util/clock"
"k8s.io/client-go/tools/cache"
"knative.dev/pkg/client/injection/kube/informers/apps/v1/deployment"
"knative.dev/pkg/configmap"
"knative.dev/pkg/controller"
"knative.dev/pkg/injection"
systemnamespacesecretinformer "knative.dev/pkg/injection/clients/namespacedkube/informers/core/v1/secret"
"github.com/google/knative-gcp/pkg/apis/duck"
"github.com/google/knative-gcp/pkg/reconciler"
)
const (
// ReconcilerName is the name of the reconciler
ReconcilerName = "Deployment"
// controllerAgentName is the string used by this controller to identify
// itself when creating events.
controllerAgentName = "events-system-deployment-controller"
namespace = "events-system"
secretName = duck.DefaultSecretName
deploymentName = "controller"
envKey = "GOOGLE_APPLICATION_CREDENTIALS"
)
type Constructor injection.ControllerConstructor
// NewConstructor creates a constructor to make a Deployment controller.
func NewConstructor() Constructor {
return func(ctx context.Context, cmw configmap.Watcher) *controller.Impl {
return NewController(ctx, cmw)
}
}
// NewController initializes the controller and is called by the generated code
// Registers event handlers to enqueue events.
// When the secret `google-cloud-key` of namespace `events-system` gets updated, we will enqueue the deployment `controller` of namespace `events-system`.
func NewController(
ctx context.Context,
cmw configmap.Watcher,
) *controller.Impl {
deploymentInformer := deployment.Get(ctx)
secretInformer := systemnamespacesecretinformer.Get(ctx)
r := &Reconciler{
Base: reconciler.NewBase(ctx, controllerAgentName, cmw),
deploymentLister: deploymentInformer.Lister(),
clock: clock.RealClock{},
}
impl := controller.NewImpl(r, r.Logger, ReconcilerName)
r.Logger.Info("Setting up event handlers")
sentinel := impl.EnqueueSentinel(types.NamespacedName{Namespace: namespace, Name: deploymentName})
secretInformer.Informer().AddEventHandler(cache.FilteringResourceEventHandler{
FilterFunc: controller.FilterWithNameAndNamespace(namespace, secretName),
Handler: handler(sentinel),
})
return impl
}
func handler(h func(interface{})) cache.ResourceEventHandler {
return cache.ResourceEventHandlerFuncs{
// For AddFunc, only enqueue deployment key when envKey is not set.
// In such case, the controller pod hasn't restarted before.
// This helps to avoid infinite loop for restarting controller pod.
AddFunc: func(obj interface{}) {
if _, ok := os.LookupEnv(envKey); !ok {
h(obj)
}
},
UpdateFunc: controller.PassNew(h),
// If secret is deleted, the controller pod will restart, in order to unset the envKey.
// This is needed when changing authentication configuration from k8s Secret to Workload Identity.
DeleteFunc: h,
}
}