
Handle failure cases on startup gracefully to avoid causing cascading errors and poor initialization in other components. Initial errors from config load cause the initializer to pause and hold requests. Return typed errors to better communicate failures to clients. Add code to handle two specific cases - admin wants to bypass initialization defaulting, and mirror pods (which want to bypass initialization because the kubelet owns their lifecycle).
217 lines
6.8 KiB
Go
217 lines
6.8 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package admission
|
|
|
|
import (
|
|
"net/url"
|
|
|
|
"k8s.io/apimachinery/pkg/api/meta"
|
|
"k8s.io/apiserver/pkg/admission"
|
|
"k8s.io/apiserver/pkg/authorization/authorizer"
|
|
"k8s.io/kubernetes/pkg/apis/admissionregistration"
|
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
|
"k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
|
|
informers "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion"
|
|
"k8s.io/kubernetes/pkg/quota"
|
|
)
|
|
|
|
// TODO add a `WantsToRun` which takes a stopCh. Might make it generic.
|
|
|
|
// WantsInternalKubeClientSet defines a function which sets ClientSet for admission plugins that need it
|
|
type WantsInternalKubeClientSet interface {
|
|
SetInternalKubeClientSet(internalclientset.Interface)
|
|
admission.Validator
|
|
}
|
|
|
|
// WantsExternalKubeClientSet defines a function which sets ClientSet for admission plugins that need it
|
|
type WantsExternalKubeClientSet interface {
|
|
SetExternalKubeClientSet(clientset.Interface)
|
|
admission.Validator
|
|
}
|
|
|
|
// WantsInternalKubeInformerFactory defines a function which sets InformerFactory for admission plugins that need it
|
|
type WantsInternalKubeInformerFactory interface {
|
|
SetInternalKubeInformerFactory(informers.SharedInformerFactory)
|
|
admission.Validator
|
|
}
|
|
|
|
// WantsAuthorizer defines a function which sets Authorizer for admission plugins that need it.
|
|
type WantsAuthorizer interface {
|
|
SetAuthorizer(authorizer.Authorizer)
|
|
admission.Validator
|
|
}
|
|
|
|
// WantsCloudConfig defines a function which sets CloudConfig for admission plugins that need it.
|
|
type WantsCloudConfig interface {
|
|
SetCloudConfig([]byte)
|
|
}
|
|
|
|
// WantsRESTMapper defines a function which sets RESTMapper for admission plugins that need it.
|
|
type WantsRESTMapper interface {
|
|
SetRESTMapper(meta.RESTMapper)
|
|
}
|
|
|
|
// WantsQuotaRegistry defines a function which sets quota registry for admission plugins that need it.
|
|
type WantsQuotaRegistry interface {
|
|
SetQuotaRegistry(quota.Registry)
|
|
admission.Validator
|
|
}
|
|
|
|
// WantsServiceResolver defines a fuction that accepts a ServiceResolver for
|
|
// admission plugins that need to make calls to services.
|
|
type WantsServiceResolver interface {
|
|
SetServiceResolver(ServiceResolver)
|
|
}
|
|
|
|
// WantsClientCert defines a fuction that accepts a cert & key for admission
|
|
// plugins that need to make calls and prove their identity.
|
|
type WantsClientCert interface {
|
|
SetClientCert(cert, key []byte)
|
|
}
|
|
|
|
// WantsWebhookSource defines a function that accepts a webhook lister for the
|
|
// dynamic webhook plugin.
|
|
type WantsWebhookSource interface {
|
|
SetWebhookSource(WebhookSource)
|
|
}
|
|
|
|
// ServiceResolver knows how to convert a service reference into an actual
|
|
// location.
|
|
type ServiceResolver interface {
|
|
ResolveEndpoint(namespace, name string) (*url.URL, error)
|
|
}
|
|
|
|
// WebhookSource can list dynamic webhook plugins.
|
|
type WebhookSource interface {
|
|
List() ([]admissionregistration.ExternalAdmissionHook, error)
|
|
}
|
|
|
|
type PluginInitializer struct {
|
|
internalClient internalclientset.Interface
|
|
externalClient clientset.Interface
|
|
informers informers.SharedInformerFactory
|
|
authorizer authorizer.Authorizer
|
|
cloudConfig []byte
|
|
restMapper meta.RESTMapper
|
|
quotaRegistry quota.Registry
|
|
serviceResolver ServiceResolver
|
|
webhookSource WebhookSource
|
|
|
|
// for proving we are apiserver in call-outs
|
|
clientCert []byte
|
|
clientKey []byte
|
|
}
|
|
|
|
var _ admission.PluginInitializer = &PluginInitializer{}
|
|
|
|
// NewPluginInitializer constructs new instance of PluginInitializer
|
|
// TODO: switch these parameters to use the builder pattern or just make them
|
|
// all public, this construction method is pointless boilerplate.
|
|
func NewPluginInitializer(
|
|
internalClient internalclientset.Interface,
|
|
externalClient clientset.Interface,
|
|
sharedInformers informers.SharedInformerFactory,
|
|
authz authorizer.Authorizer,
|
|
cloudConfig []byte,
|
|
restMapper meta.RESTMapper,
|
|
quotaRegistry quota.Registry,
|
|
) *PluginInitializer {
|
|
return &PluginInitializer{
|
|
internalClient: internalClient,
|
|
externalClient: externalClient,
|
|
informers: sharedInformers,
|
|
authorizer: authz,
|
|
cloudConfig: cloudConfig,
|
|
restMapper: restMapper,
|
|
quotaRegistry: quotaRegistry,
|
|
}
|
|
}
|
|
|
|
// SetServiceResolver sets the service resolver which is needed by some plugins.
|
|
func (i *PluginInitializer) SetServiceResolver(s ServiceResolver) *PluginInitializer {
|
|
i.serviceResolver = s
|
|
return i
|
|
}
|
|
|
|
// SetClientCert sets the client cert & key (identity used for calling out to
|
|
// web hooks) which is needed by some plugins.
|
|
func (i *PluginInitializer) SetClientCert(cert, key []byte) *PluginInitializer {
|
|
i.clientCert = cert
|
|
i.clientKey = key
|
|
return i
|
|
}
|
|
|
|
// SetWebhookSource sets the webhook source-- admittedly this is probably
|
|
// specific to the external admission hook plugin.
|
|
func (i *PluginInitializer) SetWebhookSource(w WebhookSource) *PluginInitializer {
|
|
i.webhookSource = w
|
|
return i
|
|
}
|
|
|
|
// Initialize checks the initialization interfaces implemented by each plugin
|
|
// and provide the appropriate initialization data
|
|
func (i *PluginInitializer) Initialize(plugin admission.Interface) {
|
|
if wants, ok := plugin.(WantsInternalKubeClientSet); ok {
|
|
wants.SetInternalKubeClientSet(i.internalClient)
|
|
}
|
|
|
|
if wants, ok := plugin.(WantsExternalKubeClientSet); ok {
|
|
wants.SetExternalKubeClientSet(i.externalClient)
|
|
}
|
|
|
|
if wants, ok := plugin.(WantsInternalKubeInformerFactory); ok {
|
|
wants.SetInternalKubeInformerFactory(i.informers)
|
|
}
|
|
|
|
if wants, ok := plugin.(WantsAuthorizer); ok {
|
|
wants.SetAuthorizer(i.authorizer)
|
|
}
|
|
|
|
if wants, ok := plugin.(WantsCloudConfig); ok {
|
|
wants.SetCloudConfig(i.cloudConfig)
|
|
}
|
|
|
|
if wants, ok := plugin.(WantsRESTMapper); ok {
|
|
wants.SetRESTMapper(i.restMapper)
|
|
}
|
|
|
|
if wants, ok := plugin.(WantsQuotaRegistry); ok {
|
|
wants.SetQuotaRegistry(i.quotaRegistry)
|
|
}
|
|
|
|
if wants, ok := plugin.(WantsServiceResolver); ok {
|
|
if i.serviceResolver == nil {
|
|
panic("An admission plugin wants the service resolver, but it was not provided.")
|
|
}
|
|
wants.SetServiceResolver(i.serviceResolver)
|
|
}
|
|
|
|
if wants, ok := plugin.(WantsClientCert); ok {
|
|
if i.clientCert == nil || i.clientKey == nil {
|
|
panic("An admission plugin wants a client cert/key, but they were not provided.")
|
|
}
|
|
wants.SetClientCert(i.clientCert, i.clientKey)
|
|
}
|
|
|
|
if wants, ok := plugin.(WantsWebhookSource); ok {
|
|
if i.webhookSource == nil {
|
|
panic("An admission plugin wants a webhook source, but it was not provided.")
|
|
}
|
|
wants.SetWebhookSource(i.webhookSource)
|
|
}
|
|
}
|