package rbacmanager import ( "fmt" "time" "git.openstack.org/openstack/stackube/pkg/auth-controller/rbacmanager/rbac" "git.openstack.org/openstack/stackube/pkg/auth-controller/tenant" "git.openstack.org/openstack/stackube/pkg/util" "github.com/golang/glog" apierrors "k8s.io/apimachinery/pkg/api/errors" utilruntime "k8s.io/apimachinery/pkg/util/runtime" "k8s.io/client-go/kubernetes" "k8s.io/client-go/pkg/api" "k8s.io/client-go/pkg/api/v1" "k8s.io/client-go/tools/cache" "k8s.io/client-go/util/workqueue" ) const ( resyncPeriod = 5 * time.Minute ) type Controller struct { kclient *kubernetes.Clientset nsInf cache.SharedIndexInformer queue workqueue.RateLimitingInterface } // New creates a new RBAC controller. func New(conf tenant.Config) (*Controller, error) { cfg, err := util.NewClusterConfig(conf.KubeConfig) if err != nil { return nil, fmt.Errorf("init cluster config failed: %v", err) } client, err := kubernetes.NewForConfig(cfg) if err != nil { return nil, fmt.Errorf("init kubernetes client failed: %v", err) } o := &Controller{ kclient: client, queue: workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), "rbacmanager"), } o.nsInf = cache.NewSharedIndexInformer( cache.NewListWatchFromClient(o.kclient.Core().RESTClient(), "namespaces", api.NamespaceAll, nil), &v1.Namespace{}, resyncPeriod, cache.Indexers{}, ) o.nsInf.AddEventHandler(cache.ResourceEventHandlerFuncs{ AddFunc: o.handleNamespaceAdd, DeleteFunc: o.handleNamespaceDelete, UpdateFunc: o.handleNamespaceUpdate, }) return o, nil } // Run the controller. func (c *Controller) Run(stopc <-chan struct{}) error { defer c.queue.ShutDown() errChan := make(chan error) go func() { v, err := c.kclient.Discovery().ServerVersion() if err != nil { errChan <- fmt.Errorf("communicating with server failed: %v", err) return } glog.V(4).Infof("Established connection established, cluster-version: %s", v) errChan <- nil }() select { case err := <-errChan: if err != nil { return err } glog.V(4).Info("TPR API endpoints ready") case <-stopc: return nil } go c.worker() go c.nsInf.Run(stopc) <-stopc return nil } func (c *Controller) keyFunc(obj interface{}) (string, bool) { k, err := cache.DeletionHandlingMetaNamespaceKeyFunc(obj) if err != nil { glog.Errorf("Creating key failed: %v", err) return k, false } return k, true } // enqueue adds a key to the queue. If obj is a key already it gets added directly. // Otherwise, the key is extracted via keyFunc. func (c *Controller) enqueue(obj interface{}) { if obj == nil { return } key, ok := obj.(string) if !ok { key, ok = c.keyFunc(obj) if !ok { return } } c.queue.Add(key) } // worker runs a worker thread that just dequeues items, processes them, and marks them done. // It enforces that the syncHandler is never invoked concurrently with the same key. func (c *Controller) worker() { for c.processNextWorkItem() { } } func (c *Controller) processNextWorkItem() bool { key, quit := c.queue.Get() if quit { return false } defer c.queue.Done(key) err := c.sync(key.(string)) if err == nil { c.queue.Forget(key) return true } utilruntime.HandleError(fmt.Errorf("Sync %q failed: %v", key, err)) c.queue.AddRateLimited(key) return true } func (c *Controller) handleNamespaceAdd(obj interface{}) { key, ok := c.keyFunc(obj) if !ok { return } glog.V(4).Infof("Added namespace %s", key) c.enqueue(key) } func (c *Controller) handleNamespaceDelete(obj interface{}) { key, ok := c.keyFunc(obj) if !ok { return } glog.V(4).Infof("Deleted namespace %s", key) c.enqueue(key) } func (c *Controller) handleNamespaceUpdate(old, cur interface{}) { oldns := old.(*v1.Namespace) curns := cur.(*v1.Namespace) if oldns.ResourceVersion == curns.ResourceVersion { return } key, ok := c.keyFunc(cur) if !ok { return } glog.V(4).Infof("Updated namespace %s", key) c.enqueue(key) } func (c *Controller) sync(key string) error { obj, exists, err := c.nsInf.GetIndexer().GetByKey(key) if err != nil { return err } if !exists { return nil } ns := obj.(*v1.Namespace) glog.V(4).Infof("Sync RBAC %s", key) err = c.syncRbac(ns) if err != nil { return err } return nil } func (c *Controller) syncRbac(ns *v1.Namespace) error { if ns.DeletionTimestamp != nil { return nil } tenant, ok := ns.Labels["tenant"] if !ok { return nil } rbacClient := c.kclient.Rbac() // Create role for tenant role := rbac.GenerateRoleByNamespace(ns.Name) _, err := rbacClient.Roles(ns.Name).Create(role) if err != nil && !apierrors.IsAlreadyExists(err) { glog.Errorf("Failed create default-role in namespace %s for tenant %s: %v", ns.Name, tenant, err) return err } glog.V(4).Infof("Created default-role in namespace %s for tenant %s", ns.Name, tenant) // Create rolebinding for tenant roleBinding := rbac.GenerateRoleBinding(ns.Name, tenant) _, err = rbacClient.RoleBindings(ns.Name).Create(roleBinding) if err != nil && !apierrors.IsAlreadyExists(err) { glog.Errorf("Failed create %s-rolebindings in namespace %s for tenant %s: %v", tenant, ns.Name, tenant, err) return err } glog.V(4).Infof("Created %s-rolebindings in namespace %s for tenant %s", tenant, ns.Name, tenant) return nil }