diff --git a/PROJECT b/PROJECT index 73f9dbf6..77f12c04 100644 --- a/PROJECT +++ b/PROJECT @@ -53,4 +53,18 @@ resources: kind: HetznerNodeImageRelease path: github.com/syself/cluster-stack-operator/api/v1alpha1 version: v1alpha1 +- api: + crdVersion: v1 + namespaced: true + controller: true + domain: syself.io + group: infrastructure.cluster.x-k8s.io + kind: ClusterAddon + path: github.com/syself/cluster-stack-operator/api/v1alpha1 + version: v1alpha1 +- controller: true + domain: syself.io + group: infrastructure.cluster.x-k8s.io + kind: ClusterReconciler + version: v1alpha1 version: "3" diff --git a/api/v1alpha1/clusteraddon_types.go b/api/v1alpha1/clusteraddon_types.go new file mode 100644 index 00000000..46219913 --- /dev/null +++ b/api/v1alpha1/clusteraddon_types.go @@ -0,0 +1,64 @@ +/* +Copyright 2023. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package v1alpha1 + +import ( + corev1 "k8s.io/api/core/v1" + metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" +) + +// EDIT THIS FILE! THIS IS SCAFFOLDING FOR YOU TO OWN! +// NOTE: json tags are required. Any new fields you add must have json tags for the fields to be serialized. + +// ClusterAddonSpec defines the desired state of ClusterAddon +type ClusterAddonSpec struct { + ClusterStack string `json:"clusterStack,omitempty"` + ClusterAddonVersion string `json:"clusterAddonVersion,omitempty"` + ClusterRef *corev1.ObjectReference `json:"clusterRef,omitempty"` +} + +// ClusterAddonStatus defines the observed state of ClusterAddon +type ClusterAddonStatus struct { + // INSERT ADDITIONAL STATUS FIELD - define observed state of cluster + // Important: Run "make" to regenerate code after modifying this file +} + +//+kubebuilder:object:root=true +//+kubebuilder:subresource:status + +// ClusterAddon is the Schema for the clusteraddons API +type ClusterAddon struct { + metav1.TypeMeta `json:",inline"` + metav1.ObjectMeta `json:"metadata,omitempty"` + + OwnerReferences metav1.OwnerReference `json:"ownerReferences"` + Spec ClusterAddonSpec `json:"spec,omitempty"` + Status ClusterAddonStatus `json:"status,omitempty"` +} + +//+kubebuilder:object:root=true + +// ClusterAddonList contains a list of ClusterAddon +type ClusterAddonList struct { + metav1.TypeMeta `json:",inline"` + metav1.ListMeta `json:"metadata,omitempty"` + Items []ClusterAddon `json:"items"` +} + +func init() { + SchemeBuilder.Register(&ClusterAddon{}, &ClusterAddonList{}) +} diff --git a/api/v1alpha1/zz_generated.deepcopy.go b/api/v1alpha1/zz_generated.deepcopy.go index 7505dfe7..1b68a8c5 100644 --- a/api/v1alpha1/zz_generated.deepcopy.go +++ b/api/v1alpha1/zz_generated.deepcopy.go @@ -27,6 +27,101 @@ import ( runtime "k8s.io/apimachinery/pkg/runtime" ) +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *ClusterAddon) DeepCopyInto(out *ClusterAddon) { + *out = *in + out.TypeMeta = in.TypeMeta + in.ObjectMeta.DeepCopyInto(&out.ObjectMeta) + in.OwnerReferences.DeepCopyInto(&out.OwnerReferences) + in.Spec.DeepCopyInto(&out.Spec) + out.Status = in.Status +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ClusterAddon. +func (in *ClusterAddon) DeepCopy() *ClusterAddon { + if in == nil { + return nil + } + out := new(ClusterAddon) + in.DeepCopyInto(out) + return out +} + +// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object. +func (in *ClusterAddon) DeepCopyObject() runtime.Object { + if c := in.DeepCopy(); c != nil { + return c + } + return nil +} + +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *ClusterAddonList) DeepCopyInto(out *ClusterAddonList) { + *out = *in + out.TypeMeta = in.TypeMeta + in.ListMeta.DeepCopyInto(&out.ListMeta) + if in.Items != nil { + in, out := &in.Items, &out.Items + *out = make([]ClusterAddon, len(*in)) + for i := range *in { + (*in)[i].DeepCopyInto(&(*out)[i]) + } + } +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ClusterAddonList. +func (in *ClusterAddonList) DeepCopy() *ClusterAddonList { + if in == nil { + return nil + } + out := new(ClusterAddonList) + in.DeepCopyInto(out) + return out +} + +// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object. +func (in *ClusterAddonList) DeepCopyObject() runtime.Object { + if c := in.DeepCopy(); c != nil { + return c + } + return nil +} + +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *ClusterAddonSpec) DeepCopyInto(out *ClusterAddonSpec) { + *out = *in + if in.ClusterRef != nil { + in, out := &in.ClusterRef, &out.ClusterRef + *out = new(v1.ObjectReference) + **out = **in + } +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ClusterAddonSpec. +func (in *ClusterAddonSpec) DeepCopy() *ClusterAddonSpec { + if in == nil { + return nil + } + out := new(ClusterAddonSpec) + in.DeepCopyInto(out) + return out +} + +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *ClusterAddonStatus) DeepCopyInto(out *ClusterAddonStatus) { + *out = *in +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ClusterAddonStatus. +func (in *ClusterAddonStatus) DeepCopy() *ClusterAddonStatus { + if in == nil { + return nil + } + out := new(ClusterAddonStatus) + in.DeepCopyInto(out) + return out +} + // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *ClusterStack) DeepCopyInto(out *ClusterStack) { *out = *in diff --git a/cmd/main.go b/cmd/main.go index 4b08e495..942d74f2 100644 --- a/cmd/main.go +++ b/cmd/main.go @@ -25,8 +25,6 @@ import ( _ "k8s.io/client-go/plugin/pkg/client/auth" caph "github.com/syself/cluster-api-provider-hetzner/api/v1beta1" - csov1alpha1 "github.com/syself/cluster-stack-operator/api/v1alpha1" - "github.com/syself/cluster-stack-operator/internal/controller" "k8s.io/apimachinery/pkg/runtime" utilruntime "k8s.io/apimachinery/pkg/util/runtime" clientgoscheme "k8s.io/client-go/kubernetes/scheme" @@ -34,6 +32,9 @@ import ( ctrl "sigs.k8s.io/controller-runtime" "sigs.k8s.io/controller-runtime/pkg/healthz" "sigs.k8s.io/controller-runtime/pkg/log/zap" + + csov1alpha1 "github.com/syself/cluster-stack-operator/api/v1alpha1" + "github.com/syself/cluster-stack-operator/internal/controller" //+kubebuilder:scaffold:imports ) @@ -48,7 +49,6 @@ func init() { utilruntime.Must(csov1alpha1.AddToScheme(scheme)) utilruntime.Must(caph.AddToScheme(scheme)) - //+kubebuilder:scaffold:scheme } @@ -129,6 +129,20 @@ func main() { setupLog.Error(err, "unable to create controller", "controller", "HetznerNodeImageRelease") os.Exit(1) } + if err = (&controller.ClusterAddonReconciler{ + Client: mgr.GetClient(), + Scheme: mgr.GetScheme(), + }).SetupWithManager(mgr); err != nil { + setupLog.Error(err, "unable to create controller", "controller", "ClusterAddon") + os.Exit(1) + } + if err = (&controller.ClusterReconcilerReconciler{ + Client: mgr.GetClient(), + Scheme: mgr.GetScheme(), + }).SetupWithManager(mgr); err != nil { + setupLog.Error(err, "unable to create controller", "controller", "ClusterReconciler") + os.Exit(1) + } //+kubebuilder:scaffold:builder if err := mgr.AddHealthzCheck("healthz", healthz.Ping); err != nil { diff --git a/config/crd/bases/infrastructure.cluster.x-k8s.io.syself.io_clusteraddons.yaml b/config/crd/bases/infrastructure.cluster.x-k8s.io.syself.io_clusteraddons.yaml new file mode 100644 index 00000000..c5b73ca3 --- /dev/null +++ b/config/crd/bases/infrastructure.cluster.x-k8s.io.syself.io_clusteraddons.yaml @@ -0,0 +1,147 @@ +--- +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + controller-gen.kubebuilder.io/version: v0.12.0 + name: clusteraddons.infrastructure.cluster.x-k8s.io.syself.io +spec: + group: infrastructure.cluster.x-k8s.io.syself.io + names: + kind: ClusterAddon + listKind: ClusterAddonList + plural: clusteraddons + singular: clusteraddon + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: ClusterAddon is the Schema for the clusteraddons API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + ownerReferences: + description: OwnerReference contains enough information to let you identify + an owning object. An owning object must be in the same namespace as + the dependent, or be cluster-scoped, so there is no namespace field. + properties: + apiVersion: + description: API version of the referent. + type: string + blockOwnerDeletion: + description: If true, AND if the owner has the "foregroundDeletion" + finalizer, then the owner cannot be deleted from the key-value store + until this reference is removed. See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion + for how the garbage collector interacts with this field and enforces + the foreground deletion. Defaults to false. To set this field, a + user needs "delete" permission of the owner, otherwise 422 (Unprocessable + Entity) will be returned. + type: boolean + controller: + description: If true, this reference points to the managing controller. + type: boolean + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#names' + type: string + uid: + description: 'UID of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#uids' + type: string + required: + - apiVersion + - kind + - name + - uid + type: object + x-kubernetes-map-type: atomic + spec: + description: ClusterAddonSpec defines the desired state of ClusterAddon + properties: + clusterAddonVersion: + type: string + clusterRef: + description: "ObjectReference contains enough information to let you + inspect or modify the referred object. --- New uses of this type + are discouraged because of difficulty describing its usage when + embedded in APIs. 1. Ignored fields. It includes many fields which + are not generally honored. For instance, ResourceVersion and FieldPath + are both very rarely valid in actual usage. 2. Invalid usage help. + \ It is impossible to add specific help for individual usage. In + most embedded usages, there are particular restrictions like, \"must + refer only to types A and B\" or \"UID not honored\" or \"name must + be restricted\". Those cannot be well described when embedded. 3. + Inconsistent validation. Because the usages are different, the + validation rules are different by usage, which makes it hard for + users to predict what will happen. 4. The fields are both imprecise + and overly precise. Kind is not a precise mapping to a URL. This + can produce ambiguity during interpretation and require a REST mapping. + \ In most cases, the dependency is on the group,resource tuple and + the version of the actual struct is irrelevant. 5. We cannot easily + change it. Because this type is embedded in many locations, updates + to this type will affect numerous schemas. Don't make new APIs + embed an underspecified API type they do not control. \n Instead + of using this type, create a locally provided and used type that + is well-focused on your reference. For example, ServiceReferences + for admission registration: https://github.com/kubernetes/api/blob/release-1.17/admissionregistration/v1/types.go#L533 + ." + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an object instead of + an entire object, this string should contain a valid JSON/Go + field access statement, such as desiredState.manifest.containers[2]. + For example, if the object reference is to a container within + a pod, this would take on a value like: "spec.containers{name}" + (where "name" refers to the name of the container that triggered + the event) or if no container name is specified "spec.containers[2]" + (container with index 2 in this pod). This syntax is chosen + only to have some well-defined way of referencing a part of + an object. TODO: this design is not final and this field is + subject to change in the future.' + type: string + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to which this reference + is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + clusterStack: + type: string + type: object + status: + description: ClusterAddonStatus defines the observed state of ClusterAddon + type: object + required: + - ownerReferences + type: object + served: true + storage: true + subresources: + status: {} diff --git a/config/crd/kustomization.yaml b/config/crd/kustomization.yaml index 5af5eeb6..b31fe805 100644 --- a/config/crd/kustomization.yaml +++ b/config/crd/kustomization.yaml @@ -7,6 +7,7 @@ resources: - bases/infrastructure.cluster.x-k8s.io.syself.io_clusterstackreleases.yaml - bases/infrastructure.cluster.x-k8s.io.syself.io_hetznerclusterstackreleases.yaml - bases/infrastructure.cluster.x-k8s.io.syself.io_hetznernodeimagereleases.yaml +- bases/infrastructure.cluster.x-k8s.io.syself.io_clusteraddons.yaml #+kubebuilder:scaffold:crdkustomizeresource patchesStrategicMerge: @@ -17,6 +18,7 @@ patchesStrategicMerge: #- patches/webhook_in_clusterstackreleases.yaml #- patches/webhook_in_hetznerclusterstackreleases.yaml #- patches/webhook_in_hetznernodeimagereleases.yaml +#- patches/webhook_in_clusteraddons.yaml #+kubebuilder:scaffold:crdkustomizewebhookpatch # [CERTMANAGER] To enable cert-manager, uncomment all the sections with [CERTMANAGER] prefix. @@ -26,6 +28,7 @@ patchesStrategicMerge: #- patches/cainjection_in_clusterstackreleases.yaml #- patches/cainjection_in_hetznerclusterstackreleases.yaml #- patches/cainjection_in_hetznernodeimagereleases.yaml +#- patches/cainjection_in_clusteraddons.yaml #+kubebuilder:scaffold:crdkustomizecainjectionpatch # the following config is for teaching kustomize how to do kustomization for CRDs. diff --git a/config/crd/patches/cainjection_in_clusteraddons.yaml b/config/crd/patches/cainjection_in_clusteraddons.yaml new file mode 100644 index 00000000..46d7074e --- /dev/null +++ b/config/crd/patches/cainjection_in_clusteraddons.yaml @@ -0,0 +1,7 @@ +# The following patch adds a directive for certmanager to inject CA into the CRD +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + cert-manager.io/inject-ca-from: CERTIFICATE_NAMESPACE/CERTIFICATE_NAME + name: clusteraddons.infrastructure.cluster.x-k8s.io.syself.io diff --git a/config/crd/patches/webhook_in_clusteraddons.yaml b/config/crd/patches/webhook_in_clusteraddons.yaml new file mode 100644 index 00000000..3246bc41 --- /dev/null +++ b/config/crd/patches/webhook_in_clusteraddons.yaml @@ -0,0 +1,16 @@ +# The following patch enables a conversion webhook for the CRD +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: clusteraddons.infrastructure.cluster.x-k8s.io.syself.io +spec: + conversion: + strategy: Webhook + webhook: + clientConfig: + service: + namespace: system + name: webhook-service + path: /convert + conversionReviewVersions: + - v1 diff --git a/config/rbac/clusteraddon_editor_role.yaml b/config/rbac/clusteraddon_editor_role.yaml new file mode 100644 index 00000000..cb67bb67 --- /dev/null +++ b/config/rbac/clusteraddon_editor_role.yaml @@ -0,0 +1,31 @@ +# permissions for end users to edit clusteraddons. +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app.kubernetes.io/name: clusterrole + app.kubernetes.io/instance: clusteraddon-editor-role + app.kubernetes.io/component: rbac + app.kubernetes.io/created-by: cluster-stack-operator + app.kubernetes.io/part-of: cluster-stack-operator + app.kubernetes.io/managed-by: kustomize + name: clusteraddon-editor-role +rules: +- apiGroups: + - infrastructure.cluster.x-k8s.io.syself.io + resources: + - clusteraddons + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +- apiGroups: + - infrastructure.cluster.x-k8s.io.syself.io + resources: + - clusteraddons/status + verbs: + - get diff --git a/config/rbac/clusteraddon_viewer_role.yaml b/config/rbac/clusteraddon_viewer_role.yaml new file mode 100644 index 00000000..ae5ec501 --- /dev/null +++ b/config/rbac/clusteraddon_viewer_role.yaml @@ -0,0 +1,27 @@ +# permissions for end users to view clusteraddons. +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app.kubernetes.io/name: clusterrole + app.kubernetes.io/instance: clusteraddon-viewer-role + app.kubernetes.io/component: rbac + app.kubernetes.io/created-by: cluster-stack-operator + app.kubernetes.io/part-of: cluster-stack-operator + app.kubernetes.io/managed-by: kustomize + name: clusteraddon-viewer-role +rules: +- apiGroups: + - infrastructure.cluster.x-k8s.io.syself.io + resources: + - clusteraddons + verbs: + - get + - list + - watch +- apiGroups: + - infrastructure.cluster.x-k8s.io.syself.io + resources: + - clusteraddons/status + verbs: + - get diff --git a/config/rbac/role.yaml b/config/rbac/role.yaml index 272a5004..7cce30a0 100644 --- a/config/rbac/role.yaml +++ b/config/rbac/role.yaml @@ -2,9 +2,60 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - creationTimestamp: null name: manager-role rules: +- apiGroups: + - infrastructure.cluster.x-k8s.io.syself.io + resources: + - clusteraddons + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +- apiGroups: + - infrastructure.cluster.x-k8s.io.syself.io + resources: + - clusteraddons/finalizers + verbs: + - update +- apiGroups: + - infrastructure.cluster.x-k8s.io.syself.io + resources: + - clusteraddons/status + verbs: + - get + - patch + - update +- apiGroups: + - infrastructure.cluster.x-k8s.io.syself.io + resources: + - clusterreconcilers + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +- apiGroups: + - infrastructure.cluster.x-k8s.io.syself.io + resources: + - clusterreconcilers/finalizers + verbs: + - update +- apiGroups: + - infrastructure.cluster.x-k8s.io.syself.io + resources: + - clusterreconcilers/status + verbs: + - get + - patch + - update - apiGroups: - infrastructure.cluster.x-k8s.io.syself.io resources: diff --git a/config/samples/kustomization.yaml b/config/samples/kustomization.yaml index 1a0903f4..4c159f32 100644 --- a/config/samples/kustomization.yaml +++ b/config/samples/kustomization.yaml @@ -5,4 +5,5 @@ resources: - infrastructure.cluster.x-k8s.io_v1alpha1_clusterstackrelease.yaml - infrastructure.cluster.x-k8s.io_v1alpha1_hetznerclusterstackrelease.yaml - infrastructure.cluster.x-k8s.io_v1alpha1_hetznernodeimagerelease.yaml +- infrastructure.cluster.x-k8s.io_v1alpha1_clusteraddon.yaml #+kubebuilder:scaffold:manifestskustomizesamples diff --git a/internal/controller/clusteraddon_controller.go b/internal/controller/clusteraddon_controller.go new file mode 100644 index 00000000..80da3fcc --- /dev/null +++ b/internal/controller/clusteraddon_controller.go @@ -0,0 +1,62 @@ +/* +Copyright 2023. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package controller + +import ( + "context" + + "k8s.io/apimachinery/pkg/runtime" + ctrl "sigs.k8s.io/controller-runtime" + "sigs.k8s.io/controller-runtime/pkg/client" + "sigs.k8s.io/controller-runtime/pkg/log" + + csov1alpha1 "github.com/syself/cluster-stack-operator/api/v1alpha1" +) + +// ClusterAddonReconciler reconciles a ClusterAddon object +type ClusterAddonReconciler struct { + client.Client + Scheme *runtime.Scheme +} + +//+kubebuilder:rbac:groups=infrastructure.cluster.x-k8s.io.syself.io,resources=clusteraddons,verbs=get;list;watch;create;update;patch;delete +//+kubebuilder:rbac:groups=infrastructure.cluster.x-k8s.io.syself.io,resources=clusteraddons/status,verbs=get;update;patch +//+kubebuilder:rbac:groups=infrastructure.cluster.x-k8s.io.syself.io,resources=clusteraddons/finalizers,verbs=update + +// Reconcile is part of the main kubernetes reconciliation loop which aims to +// move the current state of the cluster closer to the desired state. +// TODO(user): Modify the Reconcile function to compare the state specified by +// the ClusterAddon object against the actual cluster state, and then +// perform operations to make the cluster state reflect the state specified by +// the user. +// +// For more details, check Reconcile and its Result here: +// - https://pkg.go.dev/sigs.k8s.io/controller-runtime@v0.14.4/pkg/reconcile +func (r *ClusterAddonReconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) { + _ = log.FromContext(ctx) + + // TODO(user): your logic here + + return ctrl.Result{}, nil +} + +// SetupWithManager sets up the controller with the Manager. +func (r *ClusterAddonReconciler) SetupWithManager(mgr ctrl.Manager) error { + return ctrl.NewControllerManagedBy(mgr). + For(&csov1alpha1.ClusterAddon{}). + Complete(r) +} diff --git a/internal/controller/clusterreconciler_controller.go b/internal/controller/clusterreconciler_controller.go new file mode 100644 index 00000000..2b1d4ce3 --- /dev/null +++ b/internal/controller/clusterreconciler_controller.go @@ -0,0 +1,100 @@ +/* +Copyright 2023. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package controller + +import ( + "context" + + csov1alpha1 "github.com/syself/cluster-stack-operator/api/v1alpha1" + metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" + "k8s.io/apimachinery/pkg/runtime" + clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1" + ctrl "sigs.k8s.io/controller-runtime" + "sigs.k8s.io/controller-runtime/pkg/client" + "sigs.k8s.io/controller-runtime/pkg/event" + "sigs.k8s.io/controller-runtime/pkg/log" + "sigs.k8s.io/controller-runtime/pkg/predicate" +) + +// ClusterReconcilerReconciler reconciles a ClusterReconciler object +type ClusterReconcilerReconciler struct { + client.Client + Scheme *runtime.Scheme +} + +//+kubebuilder:rbac:groups=infrastructure.cluster.x-k8s.io.syself.io,resources=clusterreconcilers,verbs=get;list;watch;create;update;patch;delete +//+kubebuilder:rbac:groups=infrastructure.cluster.x-k8s.io.syself.io,resources=clusterreconcilers/status,verbs=get;update;patch +//+kubebuilder:rbac:groups=infrastructure.cluster.x-k8s.io.syself.io,resources=clusterreconcilers/finalizers,verbs=update + +// Reconcile is part of the main kubernetes reconciliation loop which aims to +// move the current state of the cluster closer to the desired state. +// TODO(user): Modify the Reconcile function to compare the state specified by +// the ClusterReconciler object against the actual cluster state, and then +// perform operations to make the cluster state reflect the state specified by +// the user. +// +// For more details, check Reconcile and its Result here: +// - https://pkg.go.dev/sigs.k8s.io/controller-runtime@v0.14.4/pkg/reconcile +func (r *ClusterReconcilerReconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) { + logger := log.FromContext(ctx) + + clusterCR := &clusterv1.Cluster{} + if err := r.Get(ctx, req.NamespacedName, clusterCR); err != nil { + // if the cluster CR is not found, exit the reconciliation + return ctrl.Result{}, err + } + + // since we're filtering only the create event for Cluster object, we can safely create the ClusterAddon object + // without checking if it already exists + clusterAddon := &csov1alpha1.ClusterAddon{ + ObjectMeta: metav1.ObjectMeta{Name: clusterCR.Name, Namespace: clusterCR.Namespace}, + TypeMeta: metav1.TypeMeta{Kind: "ClusterAddon", APIVersion: "infrastructure.cluster.x-k8s.io.syself.io/v1alpha1"}, + OwnerReferences: metav1.OwnerReference{ + APIVersion: clusterCR.APIVersion, + Kind: clusterCR.Kind, + Name: clusterCR.Name, + UID: clusterCR.UID, + }, + } + + if err := r.Create(ctx, clusterAddon); err != nil { + // we exit the reconciliation if the ClusterAddon object cannot be created + logger.Error(err, "failed to create ClusterAddon object") + return ctrl.Result{}, err + } + + return ctrl.Result{}, nil +} + +// SetupWithManager sets up the controller with the Manager. +func (r *ClusterReconcilerReconciler) SetupWithManager(mgr ctrl.Manager) error { + return ctrl.NewControllerManagedBy(mgr). + For(&clusterv1.Cluster{}). + WithEventFilter(predicate.Funcs{ + // We're only interested in the create events for a cluster object + DeleteFunc: func(e event.DeleteEvent) bool { + return false + }, + GenericFunc: func(e event.GenericEvent) bool { + return false + }, + UpdateFunc: func(e event.UpdateEvent) bool { + return false + }, + }). + Complete(r) +}