forked from openshift/origin
-
Notifications
You must be signed in to change notification settings - Fork 0
/
controllers.go
104 lines (97 loc) · 5.53 KB
/
controllers.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
package start
import (
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/client-go/rest"
cmapp "k8s.io/kubernetes/cmd/kube-controller-manager/app"
cmappoptions "k8s.io/kubernetes/cmd/kube-controller-manager/app/options"
kexternalinformers "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions"
"k8s.io/kubernetes/pkg/controller"
configapi "github.com/openshift/origin/pkg/cmd/server/api"
"github.com/openshift/origin/pkg/cmd/server/bootstrappolicy"
origincontrollers "github.com/openshift/origin/pkg/cmd/server/origin/controller"
)
func getControllerContext(options configapi.MasterConfig, controllerManagerOptions *cmappoptions.CMServer, informers *informers, stopCh <-chan struct{}) (origincontrollers.ControllerContext, error) {
loopbackConfig, _, kubeExternal, _, err := getAllClients(options)
if err != nil {
return origincontrollers.ControllerContext{}, err
}
rootClientBuilder := controller.SimpleControllerClientBuilder{
ClientConfig: loopbackConfig,
}
availableResources, err := cmapp.GetAvailableResources(rootClientBuilder)
if err != nil {
return origincontrollers.ControllerContext{}, err
}
openshiftControllerContext := origincontrollers.ControllerContext{
KubeControllerContext: cmapp.ControllerContext{
ClientBuilder: controller.SAControllerClientBuilder{
ClientConfig: rest.AnonymousClientConfig(loopbackConfig),
CoreClient: kubeExternal.Core(),
AuthenticationClient: kubeExternal.Authentication(),
Namespace: "kube-system",
},
InformerFactory: genericInformers{
SharedInformerFactory: informers.GetExternalKubeInformers(),
generic: []GenericResourceInformer{
// use our existing internal informers to satisfy the generic informer requests (which don't require strong
// types).
genericInternalResourceInformerFunc(func(resource schema.GroupVersionResource) (kexternalinformers.GenericInformer, error) {
return informers.appInformers.ForResource(resource)
}),
genericInternalResourceInformerFunc(func(resource schema.GroupVersionResource) (kexternalinformers.GenericInformer, error) {
return informers.authorizationInformers.ForResource(resource)
}),
genericInternalResourceInformerFunc(func(resource schema.GroupVersionResource) (kexternalinformers.GenericInformer, error) {
return informers.buildInformers.ForResource(resource)
}),
genericInternalResourceInformerFunc(func(resource schema.GroupVersionResource) (kexternalinformers.GenericInformer, error) {
return informers.imageInformers.ForResource(resource)
}),
genericInternalResourceInformerFunc(func(resource schema.GroupVersionResource) (kexternalinformers.GenericInformer, error) {
return informers.quotaInformers.ForResource(resource)
}),
genericInternalResourceInformerFunc(func(resource schema.GroupVersionResource) (kexternalinformers.GenericInformer, error) {
return informers.securityInformers.ForResource(resource)
}),
genericInternalResourceInformerFunc(func(resource schema.GroupVersionResource) (kexternalinformers.GenericInformer, error) {
return informers.templateInformers.ForResource(resource)
}),
informers.externalKubeInformers,
genericInternalResourceInformerFunc(func(resource schema.GroupVersionResource) (kexternalinformers.GenericInformer, error) {
return informers.internalKubeInformers.ForResource(resource)
}),
},
bias: map[schema.GroupVersionResource]schema.GroupVersionResource{
{Group: "rbac.authorization.k8s.io", Resource: "rolebindings", Version: "v1beta1"}: {Group: "rbac.authorization.k8s.io", Resource: "rolebindings", Version: runtime.APIVersionInternal},
{Group: "rbac.authorization.k8s.io", Resource: "clusterrolebindings", Version: "v1beta1"}: {Group: "rbac.authorization.k8s.io", Resource: "clusterrolebindings", Version: runtime.APIVersionInternal},
{Group: "rbac.authorization.k8s.io", Resource: "roles", Version: "v1beta1"}: {Group: "rbac.authorization.k8s.io", Resource: "roles", Version: runtime.APIVersionInternal},
{Group: "rbac.authorization.k8s.io", Resource: "clusterroles", Version: "v1beta1"}: {Group: "rbac.authorization.k8s.io", Resource: "clusterroles", Version: runtime.APIVersionInternal},
{Group: "", Resource: "securitycontextconstraints", Version: "v1"}: {Group: "", Resource: "securitycontextconstraints", Version: runtime.APIVersionInternal},
},
},
Options: *controllerManagerOptions,
AvailableResources: availableResources,
Stop: stopCh,
},
ClientBuilder: origincontrollers.OpenshiftControllerClientBuilder{
ControllerClientBuilder: controller.SAControllerClientBuilder{
ClientConfig: rest.AnonymousClientConfig(loopbackConfig),
CoreClient: kubeExternal.Core(),
AuthenticationClient: kubeExternal.Authentication(),
Namespace: bootstrappolicy.DefaultOpenShiftInfraNamespace,
},
},
InternalKubeInformers: informers.internalKubeInformers,
ExternalKubeInformers: informers.externalKubeInformers,
AppInformers: informers.appInformers,
AuthorizationInformers: informers.authorizationInformers,
BuildInformers: informers.buildInformers,
ImageInformers: informers.imageInformers,
QuotaInformers: informers.quotaInformers,
SecurityInformers: informers.securityInformers,
TemplateInformers: informers.templateInformers,
Stop: stopCh,
}
return openshiftControllerContext, nil
}