
Change-Id: Ifa8cc0e4abb798c63c9d4ac9297e3e32443125e4 Implements: blueprint auth-controller-framework Signed-off-by: mozhuli <21621232@zju.edu.cn>
345 lines
9.0 KiB
Go
345 lines
9.0 KiB
Go
package tenant
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
"time"
|
|
|
|
"git.openstack.org/openstack/stackube/pkg/apis/v1"
|
|
"git.openstack.org/openstack/stackube/pkg/auth-controller/client/auth"
|
|
"git.openstack.org/openstack/stackube/pkg/auth-controller/rbacmanager/rbac"
|
|
"git.openstack.org/openstack/stackube/pkg/openstack"
|
|
"git.openstack.org/openstack/stackube/pkg/util"
|
|
|
|
"github.com/golang/glog"
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
apimetav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
|
"k8s.io/client-go/kubernetes"
|
|
"k8s.io/client-go/pkg/api"
|
|
apiv1 "k8s.io/client-go/pkg/api/v1"
|
|
extensionsobj "k8s.io/client-go/pkg/apis/extensions/v1beta1"
|
|
"k8s.io/client-go/tools/cache"
|
|
"k8s.io/client-go/util/workqueue"
|
|
)
|
|
|
|
const (
|
|
tprTenant = "tenant." + auth.TPRGroup
|
|
|
|
resyncPeriod = 5 * time.Minute
|
|
)
|
|
|
|
// TenantController manages lify cycle of Tenant.
|
|
type TenantController struct {
|
|
kclient *kubernetes.Clientset
|
|
tclient *auth.AuthClient
|
|
osclient *openstack.Client
|
|
tenInf cache.SharedIndexInformer
|
|
queue workqueue.RateLimitingInterface
|
|
config Config
|
|
}
|
|
|
|
// Config defines configuration parameters for the TenantController.
|
|
type Config struct {
|
|
KubeConfig string
|
|
CloudConfig string
|
|
}
|
|
|
|
// New creates a new tenant controller.
|
|
func New(conf Config) (*TenantController, error) {
|
|
cfg, err := util.NewClusterConfig(conf.KubeConfig)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("init cluster config failed: %v", err)
|
|
}
|
|
client, err := kubernetes.NewForConfig(cfg)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("init kubernetes client failed: %v", err)
|
|
}
|
|
tclient, err := auth.NewForConfig(cfg)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("init restclient for tenant failed: %v", err)
|
|
}
|
|
|
|
openStackClient, err := openstack.NewClient(conf.CloudConfig)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("init openstack client failed: %v", err)
|
|
}
|
|
|
|
c := &TenantController{
|
|
kclient: client,
|
|
tclient: tclient,
|
|
osclient: openStackClient,
|
|
queue: workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), "tenant"),
|
|
config: conf,
|
|
}
|
|
|
|
c.tenInf = cache.NewSharedIndexInformer(
|
|
&cache.ListWatch{
|
|
ListFunc: tclient.Tenants(api.NamespaceAll).List,
|
|
WatchFunc: tclient.Tenants(api.NamespaceAll).Watch,
|
|
},
|
|
&v1.Tenant{}, resyncPeriod, cache.Indexers{},
|
|
)
|
|
c.tenInf.AddEventHandler(cache.ResourceEventHandlerFuncs{
|
|
AddFunc: c.handleAddTenant,
|
|
DeleteFunc: c.handleDeleteTenant,
|
|
UpdateFunc: c.handleUpdateTenant,
|
|
})
|
|
|
|
return c, nil
|
|
}
|
|
|
|
// Run the controller.
|
|
func (c *TenantController) Run(stopc <-chan struct{}) error {
|
|
defer c.queue.ShutDown()
|
|
|
|
errChan := make(chan error)
|
|
go func() {
|
|
v, err := c.kclient.Discovery().ServerVersion()
|
|
if err != nil {
|
|
errChan <- fmt.Errorf("communicating with server failed: %v", err)
|
|
return
|
|
}
|
|
glog.V(4).Infof("Established connection established, cluster-version: %s", v)
|
|
// Create TPRs
|
|
if err := c.createTPRs(); err != nil {
|
|
errChan <- fmt.Errorf("creating TPRs failed: %v", err)
|
|
return
|
|
}
|
|
// Create clusterRole
|
|
if err = c.createClusterRoles(); err != nil {
|
|
errChan <- fmt.Errorf("creating clusterrole failed: %v", err)
|
|
return
|
|
}
|
|
|
|
errChan <- nil
|
|
}()
|
|
|
|
select {
|
|
case err := <-errChan:
|
|
if err != nil {
|
|
return err
|
|
}
|
|
glog.V(4).Info("TPR API endpoints ready")
|
|
case <-stopc:
|
|
return nil
|
|
}
|
|
|
|
go c.worker()
|
|
|
|
go c.tenInf.Run(stopc)
|
|
|
|
<-stopc
|
|
return nil
|
|
}
|
|
|
|
func (c *TenantController) keyFunc(obj interface{}) (string, bool) {
|
|
k, err := cache.DeletionHandlingMetaNamespaceKeyFunc(obj)
|
|
if err != nil {
|
|
glog.V(4).Infof("Failed create key: %v", err)
|
|
return k, false
|
|
}
|
|
return k, true
|
|
}
|
|
|
|
func (c *TenantController) handleAddTenant(obj interface{}) {
|
|
key, ok := c.keyFunc(obj)
|
|
if !ok {
|
|
return
|
|
}
|
|
glog.V(4).Infof("Added tenant %s", key)
|
|
c.enqueue(key)
|
|
}
|
|
|
|
func (c *TenantController) handleDeleteTenant(obj interface{}) {
|
|
key, ok := c.keyFunc(obj)
|
|
if !ok {
|
|
return
|
|
}
|
|
glog.V(4).Infof("Deleted tenant %s", key)
|
|
c.enqueue(key)
|
|
}
|
|
|
|
func (c *TenantController) handleUpdateTenant(old, cur interface{}) {
|
|
key, ok := c.keyFunc(cur)
|
|
if !ok {
|
|
return
|
|
}
|
|
glog.V(4).Infof("Updated tenant %s", key)
|
|
c.enqueue(key)
|
|
}
|
|
|
|
// enqueue adds a key to the queue. If obj is a key already it gets added directly.
|
|
// Otherwise, the key is extracted via keyFunc.
|
|
func (c *TenantController) enqueue(obj interface{}) {
|
|
if obj == nil {
|
|
return
|
|
}
|
|
key, ok := obj.(string)
|
|
if !ok {
|
|
key, ok = c.keyFunc(obj)
|
|
if !ok {
|
|
return
|
|
}
|
|
}
|
|
c.queue.Add(key)
|
|
}
|
|
|
|
// worker runs a worker thread that just dequeues items, processes them, and marks them done.
|
|
// It enforces that the syncHandler is never invoked concurrently with the same key.
|
|
func (c *TenantController) worker() {
|
|
for c.processNextWorkItem() {
|
|
}
|
|
}
|
|
|
|
func (c *TenantController) processNextWorkItem() bool {
|
|
key, quit := c.queue.Get()
|
|
if quit {
|
|
return false
|
|
}
|
|
defer c.queue.Done(key)
|
|
|
|
err := c.sync(key.(string))
|
|
if err == nil {
|
|
c.queue.Forget(key)
|
|
return true
|
|
}
|
|
utilruntime.HandleError(fmt.Errorf("Sync %q failed: %v", key, err))
|
|
c.queue.AddRateLimited(key)
|
|
return true
|
|
}
|
|
|
|
func (c *TenantController) sync(key string) error {
|
|
obj, exists, err := c.tenInf.GetIndexer().GetByKey(key)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if !exists {
|
|
// Delete tenant related resources in k8s
|
|
tenant := strings.Split(key, "/")
|
|
deleteOptions := &apimetav1.DeleteOptions{
|
|
TypeMeta: apimetav1.TypeMeta{
|
|
Kind: "ClusterRoleBinding",
|
|
APIVersion: "rbac.authorization.k8s.io/v1beta1",
|
|
},
|
|
}
|
|
err = c.kclient.Rbac().ClusterRoleBindings().Delete(tenant[1]+"-namespace-creater", deleteOptions)
|
|
if err != nil && !apierrors.IsNotFound(err) {
|
|
glog.Errorf("Failed delete ClusterRoleBinding for tenant %s: %v", tenant[1], err)
|
|
return err
|
|
}
|
|
glog.V(4).Infof("Deleted ClusterRoleBinding %s", tenant[1])
|
|
// Delete all users on a tenant
|
|
err = c.osclient.DeleteAllUsersOnTenant(tenant[1])
|
|
if err != nil {
|
|
glog.Errorf("Failed delete all users in the tenant %s: %v", tenant[1], err)
|
|
return err
|
|
}
|
|
// Delete tenant in keystone
|
|
err = c.osclient.DeleteTenant(tenant[1])
|
|
if err != nil {
|
|
glog.Errorf("Failed delete tenant %s: %v", tenant[1], err)
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
t := obj.(*v1.Tenant)
|
|
glog.V(4).Infof("Sync tenant %s", key)
|
|
err = c.syncTenant(t)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (c *TenantController) createTPRs() error {
|
|
tprs := []*extensionsobj.ThirdPartyResource{
|
|
{
|
|
ObjectMeta: apimetav1.ObjectMeta{
|
|
Name: tprTenant,
|
|
},
|
|
Versions: []extensionsobj.APIVersion{
|
|
{Name: auth.TPRVersion},
|
|
},
|
|
Description: "Tpr for tenant",
|
|
},
|
|
}
|
|
tprClient := c.kclient.Extensions().ThirdPartyResources()
|
|
|
|
for _, tpr := range tprs {
|
|
if _, err := tprClient.Create(tpr); err != nil && !apierrors.IsAlreadyExists(err) {
|
|
return err
|
|
}
|
|
glog.V(4).Infof("Created TPR %s", tpr.Name)
|
|
}
|
|
|
|
// We have to wait for the TPRs to be ready. Otherwise the initial watch may fail.
|
|
err := util.WaitForTPRReady(c.kclient.CoreV1().RESTClient(), auth.TPRGroup, auth.TPRVersion, auth.TPRTenantName)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (c *TenantController) syncTenant(tenant *v1.Tenant) error {
|
|
roleBinding := rbac.GenerateClusterRoleBindingByTenant(tenant.Name)
|
|
_, err := c.kclient.Rbac().ClusterRoleBindings().Create(roleBinding)
|
|
if err != nil && !apierrors.IsAlreadyExists(err) {
|
|
glog.Errorf("Failed create ClusterRoleBinding for tenant %s: %v", tenant.Name, err)
|
|
return err
|
|
}
|
|
glog.V(4).Infof("Created ClusterRoleBindings %s-namespace-creater for tenant %s", tenant.Name, tenant.Name)
|
|
if tenant.Spec.TenantID != "" {
|
|
// Create user with the spec username and password in the given tenant
|
|
err = c.osclient.CreateUser(tenant.Spec.UserName, tenant.Spec.Password, tenant.Spec.TenantID)
|
|
if err != nil && !openstack.IsAlreadyExists(err) {
|
|
glog.Errorf("Failed create user %s: %v", tenant.Spec.UserName, err)
|
|
return err
|
|
}
|
|
} else {
|
|
// Create tenant if the tenant not exist in keystone
|
|
tenantID, err := c.osclient.CreateTenant(tenant.Name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
// Create user with the spec username and password in the created tenant
|
|
err = c.osclient.CreateUser(tenant.Spec.UserName, tenant.Spec.Password, tenantID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// Create namespace which name is the same as the tenant's name
|
|
err = c.createNamespce(tenant.Name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
glog.V(4).Infof("Created namespace %s for tenant %s", tenant.Name, tenant.Name)
|
|
return nil
|
|
}
|
|
|
|
func (c *TenantController) createClusterRoles() error {
|
|
nsCreater := rbac.GenerateClusterRole()
|
|
_, err := c.kclient.Rbac().ClusterRoles().Create(nsCreater)
|
|
if err != nil && !apierrors.IsAlreadyExists(err) {
|
|
glog.Errorf("Failed create ClusterRoles namespace-creater: %v", err)
|
|
return err
|
|
}
|
|
glog.V(4).Info("Created ClusterRoles namespace-creater")
|
|
return nil
|
|
}
|
|
|
|
func (c *TenantController) createNamespce(namespace string) error {
|
|
_, err := c.kclient.CoreV1().Namespaces().Create(&apiv1.Namespace{
|
|
ObjectMeta: apimetav1.ObjectMeta{
|
|
Name: namespace,
|
|
},
|
|
})
|
|
if err != nil && !apierrors.IsAlreadyExists(err) {
|
|
glog.Errorf("Failed create namespace %s: %v", namespace, err)
|
|
return err
|
|
}
|
|
return nil
|
|
}
|