Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove dependency of the API onto the typed cluster-api client #2914

Merged
merged 30 commits into from
Mar 5, 2019

Conversation

alvaroaleman
Copy link
Contributor

What this PR does / why we need it:

Removes the dependency to the typed cluster api clientset from everywhere except the IPAM controller. The purpose of this effort is to reduce the transient dependency on the client-go version that is used by the cluster-api project.

IMHO the code also gets easier as we don't need a variety of typed clients but instead can use just one client for everything.

Which issue(s) this PR fixes (optional, in fixes #<issue number>(, fixes #<issue_number>, ...) format, will close the issue(s) when PR gets merged):
Fixes #

Special notes for your reviewer:

Documentation:

Release note:

none

@kubermatic-bot kubermatic-bot added release-note-none Denotes a PR that doesn't merit a release note. team/lifecycle size/L Denotes a PR that changes 100-499 lines, ignoring generated files. labels Mar 4, 2019
func findMachineAndNode(name string, machineClient clusterv1alpha1clientset.Interface, kubeClient kubernetes.Interface) (*clusterv1alpha1.Machine, *corev1.Node, error) {
machineList, err := machineClient.ClusterV1alpha1().Machines(metav1.NamespaceSystem).List(metav1.ListOptions{IncludeUninitialized: true})
if err != nil {
func findMachineAndNode(ctx context.Context, name string, client ctrlruntimeclient.Client) (*clusterv1alpha1.Machine, *corev1.Node, error) {
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What has to be noted here is that so far the machineClient was sometimes an impersoanted client and sometimes not, but the kubeClient has always been an admin client. I am not completely sure if its okay to change it like this but then again, why should one of the clients have more permissions than the user?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

only the legacy endpoints should use admin machineClient, the new endpoints must use impersonated version. kubeClient is only used (node_v1) by nodes endpoints to find corresponding machines and as we don't add RBAC Roles/Bindings to nodes we use the admin client.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I dont follow. So is it okay to use or not use the same impersonation for the kubeClient as for the machineClient?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

no, no impersonation for kubeClient - there are no RBAC Roles/Bindings in place for node resources.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Any objections against extending the existing roles to allow a get on node resources?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

sure go ahead, we were planing to add RBAC to more resources if not all in the future.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done

@alvaroaleman alvaroaleman changed the title Remove dependency cluster client mergede Remove dependency of the API onto the typed cluster-api client Mar 4, 2019
@alvaroaleman
Copy link
Contributor Author

/retest

1 similar comment
@alvaroaleman
Copy link
Contributor Author

/retest

@alvaroaleman
Copy link
Contributor Author

/retest

@alvaroaleman
Copy link
Contributor Author

/assign @zreigz

@zreigz
Copy link
Contributor

zreigz commented Mar 4, 2019

I think something is missing here. I have errors Error 500: failed to load machines from cluster: no kind is registered for the type v1alpha1.MachineList in scheme "k8s.io/client-go/kubernetes/scheme/register.go:61"

@zreigz
Copy link
Contributor

zreigz commented Mar 5, 2019

yes, it's my internal problem for @p0lyn0mial everything works fine. Also @maciaszczykm has the same problem with running our system locally. For him also usercluster-controller can not start. I will investigate it later.
/lgtm

@kubermatic-bot kubermatic-bot added the lgtm Indicates that a PR is ready to be merged. label Mar 5, 2019
@kubermatic-bot
Copy link
Contributor

LGTM label has been added.

Git tree hash: 48b7a70d0a197b3a3674f9b851b1a868f2e7be03

GetApiextensionsClient(*kubermaticv1.Cluster, ...ConfigOption) (apiextensionsclientset.Interface, error)
GetAdmissionRegistrationClient(*kubermaticv1.Cluster, ...ConfigOption) (admissionregistrationclientset.AdmissionregistrationV1beta1Interface, error)
GetKubeAggregatorClient(*kubermaticv1.Cluster, ...ConfigOption) (aggregationclientset.Interface, error)
GetDynamicClient(*kubermaticv1.Cluster, ...ConfigOption) (ctrlruntimeclient.Client, error)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this is really nice, the interface for interacting with API is clean :) What's the current status of the library (controller-runtime/pkg/client) ? Isn't in alpha ? Are there any known limitations ?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Isn't in alpha ?

No, where did you get that from?

We already use it in various places like e.G.:

  • User Cluster Controller and User Cluster RBAC controller
  • Openshift controller
  • Partly in the cluster controller (dynamic cache from controller-runtime)

We plan to eventually make all controllers controller-runtime based because it is a lot easier to use than direct client-go and also reduces the amount of boilerplate needed for controllers drastically, making the code faster to read and the actual business logic easier to find. So if there are actual issues I would vote to just fix them upstream.

It is also used by e.G. the cluster-api project. I can't find anything in the docs that says it was alpha.

Are there any known limitations ?

The fake client seems to be a bit more limited and there is no DeleteCollection although there is a open WIP PR for that. Other than that none that I am aware of.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Usually major number of 0 is used to indicate pre release versions, see https://github.com/kubernetes-sigs/controller-runtime/releases

other than that it looks really nice :)

@p0lyn0mial
Copy link
Contributor

yes, it's my internal problem for @p0lyn0mial everything works fine

ack, tested on my local machine and it actually works ! :)

@p0lyn0mial
Copy link
Contributor

/lgtm
/approve

@kron4eg
Copy link
Member

kron4eg commented Mar 5, 2019

/approve

@@ -114,9 +114,14 @@ func createInitProviders(options serverRunOptions) (providers, error) {
kubermaticSeedInformerFactory := kubermaticinformers.NewSharedInformerFactory(kubermaticSeedClient, informer.DefaultInformerResyncPeriod)
defaultImpersonationClientForSeed := kubernetesprovider.NewKubermaticImpersonationClient(cfg)

userClusterConnectionProvider, err := client.NewExternal(kubeInformerFactory.Core().V1().Secrets().Lister())
if err != nil {
glog.Fatalf("failed to get usreClusterConnectionProvider: %v", err)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

typo + return an error here. Only die with a fatal inside the main func

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

fixed

@kubermatic-bot kubermatic-bot removed the lgtm Indicates that a PR is ready to be merged. label Mar 5, 2019
@@ -25,6 +25,7 @@ type reconciler struct {

// Reconcile creates and updates ClusterRoles and ClusterRoleBinding to achieve the desired state
func (r *reconciler) Reconcile(resourceName string) error {
glog.Infof("Reconciling RBAC for %s", resourceName)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Updated

@mrIncompetent
Copy link
Contributor

/approve

@kubermatic-bot kubermatic-bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 5, 2019
@@ -58,6 +58,11 @@ func GenerateRBACClusterRole(resourceName string) (*rbacv1.ClusterRole, error) {
Resources: []string{machinedeployments, machines},
Verbs: verbs,
},
{
APIGroups: []string{""},
Resources: []string{"nodes"},
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i'm going to add an issue to our backlog to create different verbs for different groups as we do for other resources.

/cc @zreigz

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't follow. This is a per-resource setting, not a per-group one. And what's the advantage of factoring it out?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

no, this is per-group (this method will be called for each group we have - owners, editors, viewers), see: https://github.com/kubermatic/kubermatic/blob/master/api/pkg/controller/rbac-user-cluster/controller.go#L24

the advantage is a unified access to a cluster, for example readers can only view resources.

@kubermatic-bot kubermatic-bot requested a review from zreigz March 5, 2019 12:49
@p0lyn0mial
Copy link
Contributor

/lgtm
/approve

@kubermatic-bot kubermatic-bot added the lgtm Indicates that a PR is ready to be merged. label Mar 5, 2019
@kubermatic-bot
Copy link
Contributor

LGTM label has been added.

Git tree hash: 8969734a4c19f3390f0de534a91e8fa712c22c57

@kubermatic-bot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: kron4eg, mrIncompetent, p0lyn0mial

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@kubermatic-bot kubermatic-bot removed the lgtm Indicates that a PR is ready to be merged. label Mar 5, 2019
@mrIncompetent
Copy link
Contributor

Sorry for the delay!
/lgtm

@kubermatic-bot kubermatic-bot added the lgtm Indicates that a PR is ready to be merged. label Mar 5, 2019
@kubermatic-bot
Copy link
Contributor

LGTM label has been added.

Git tree hash: 6414cb692a3f710a22ddba9c73fe9c93fba08191

@kubermatic-bot kubermatic-bot merged commit 2916668 into master Mar 5, 2019
@kubermatic-bot kubermatic-bot deleted the remove-dependency-cluster-client-mergede branch March 5, 2019 14:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. release-note-none Denotes a PR that doesn't merit a release note. size/XL Denotes a PR that changes 500-999 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants