pkg/providers/apisix/apisix_consumer.go (417 lines of code) (raw):

// Licensed to the Apache Software Foundation (ASF) under one or more // contributor license agreements. See the NOTICE file distributed with // this work for additional information regarding copyright ownership. // The ASF licenses this file to You under the Apache License, Version 2.0 // (the "License"); you may not use this file except in compliance with // the License. You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package apisix import ( "context" "fmt" "reflect" "strconv" "time" "go.uber.org/zap" "gopkg.in/go-playground/pool.v3" corev1 "k8s.io/api/core/v1" k8serrors "k8s.io/apimachinery/pkg/api/errors" "k8s.io/apimachinery/pkg/api/meta" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime" "k8s.io/client-go/tools/cache" "k8s.io/client-go/util/workqueue" "github.com/apache/apisix-ingress-controller/pkg/config" "github.com/apache/apisix-ingress-controller/pkg/kube" configv2 "github.com/apache/apisix-ingress-controller/pkg/kube/apisix/apis/config/v2" "github.com/apache/apisix-ingress-controller/pkg/log" "github.com/apache/apisix-ingress-controller/pkg/providers/utils" "github.com/apache/apisix-ingress-controller/pkg/types" ) type apisixConsumerController struct { *apisixCommon workqueue workqueue.RateLimitingInterface workers int pool pool.Pool } func newApisixConsumerController(common *apisixCommon) *apisixConsumerController { c := &apisixConsumerController{ apisixCommon: common, workqueue: workqueue.NewNamedRateLimitingQueue(workqueue.NewItemFastSlowRateLimiter(1*time.Second, 60*time.Second, 5), "ApisixConsumer"), workers: 1, pool: pool.NewLimited(2), } c.ApisixConsumerInformer.AddEventHandler( cache.ResourceEventHandlerFuncs{ AddFunc: c.onAdd, UpdateFunc: c.onUpdate, DeleteFunc: c.onDelete, }, ) return c } func (c *apisixConsumerController) run(ctx context.Context) { log.Info("ApisixConsumer controller started") defer log.Info("ApisixConsumer controller exited") defer c.workqueue.ShutDown() defer c.pool.Close() for i := 0; i < c.workers; i++ { go c.runWorker(ctx) } <-ctx.Done() } func (c *apisixConsumerController) runWorker(ctx context.Context) { for { obj, quit := c.workqueue.Get() if quit { return } err := c.sync(ctx, obj.(*types.Event)) c.workqueue.Done(obj) c.handleSyncErr(obj, err) } } func (c *apisixConsumerController) sync(ctx context.Context, ev *types.Event) error { event := ev.Object.(kube.ApisixConsumerEvent) key := event.Key namespace, name, err := cache.SplitMetaNamespaceKey(key) if err != nil { log.Errorf("found ApisixConsumer resource with invalid meta namespace key %s: %s", key, err) return err } var multiVersioned kube.ApisixConsumer switch event.GroupVersion { case config.ApisixV2: multiVersioned, err = c.ApisixConsumerLister.V2(namespace, name) default: return fmt.Errorf("unsupported ApisixConsumer group version %s", event.GroupVersion) } if err != nil { if !k8serrors.IsNotFound(err) { log.Errorw("failed to get ApisixConsumer", zap.Error(err), zap.String("key", key), zap.String("version", event.GroupVersion), ) return err } if ev.Type == types.EventSync { // ignore not found error in delay sync return nil } if ev.Type != types.EventDelete { log.Warnw("ApisixConsumer was deleted before it can be delivered", zap.String("key", key), zap.String("version", event.GroupVersion), ) // Don't need to retry. return nil } } if ev.Type == types.EventDelete { if multiVersioned != nil { // We still find the resource while we are processing the DELETE event, // that means object with same namespace and name was created, discarding // this stale DELETE event. log.Warnf("discard the stale ApisixConsumer delete event since the %s exists", key) return nil } multiVersioned = ev.Tombstone.(kube.ApisixConsumer) } var errRecord error switch event.GroupVersion { case config.ApisixV2: ac := multiVersioned.V2() consumer, err := c.translator.TranslateApisixConsumerV2(ac) if err != nil { log.Errorw("failed to translate ApisixConsumer", zap.Error(err), zap.Any("ApisixConsumer", ac), ) errRecord = err goto updateStatus } log.Debugw("got consumer object from ApisixConsumer", zap.Any("consumer", consumer), zap.Any("ApisixConsumer", ac), ) if err := c.SyncConsumer(ctx, consumer, ev.Type); err != nil { log.Errorw("failed to sync Consumer to APISIX", zap.Error(err), zap.Any("consumer", consumer), ) errRecord = err goto updateStatus } } updateStatus: c.pool.Queue(func(wu pool.WorkUnit) (interface{}, error) { if wu.IsCancelled() { return nil, nil } c.updateStatus(multiVersioned, errRecord) return true, nil }) return errRecord } func (c *apisixConsumerController) handleSyncErr(obj interface{}, err error) { if err == nil { c.workqueue.Forget(obj) c.MetricsCollector.IncrSyncOperation("consumer", "success") return } event := obj.(*types.Event) if k8serrors.IsNotFound(err) && event.Type != types.EventDelete { log.Infow("sync ApisixConsumer but not found, ignore", zap.String("event_type", event.Type.String()), zap.Any("ApisixConsumer", event.Object.(kube.ApisixConsumerEvent)), ) c.workqueue.Forget(event) return } log.Warnw("sync ApisixConsumer failed, will retry", zap.Any("object", obj), zap.Error(err), ) c.workqueue.AddRateLimited(obj) c.MetricsCollector.IncrSyncOperation("consumer", "failure") } func (c *apisixConsumerController) onAdd(obj interface{}) { ac, err := kube.NewApisixConsumer(obj) if err != nil { log.Errorw("found ApisixConsumer resource with bad type", zap.Error(err)) return } key, err := cache.MetaNamespaceKeyFunc(obj) if err != nil { log.Errorf("found ApisixConsumer resource with bad meta namespace key: %s", err) return } if !c.namespaceProvider.IsWatchingNamespace(key) { return } if !c.isEffective(ac) { return } log.Debugw("ApisixConsumer add event arrived", zap.Any("object", obj), ) c.workqueue.Add(&types.Event{ Type: types.EventAdd, Object: kube.ApisixConsumerEvent{ Key: key, GroupVersion: ac.GroupVersion(), }, }) c.MetricsCollector.IncrEvents("consumer", "add") } func (c *apisixConsumerController) onUpdate(oldObj, newObj interface{}) { prev, err := kube.NewApisixConsumer(oldObj) if err != nil { log.Errorw("found ApisixConsumer resource with bad type", zap.Error(err)) return } curr, err := kube.NewApisixConsumer(newObj) if err != nil { log.Errorw("found ApisixConsumer resource with bad type", zap.Error(err)) return } oldRV, _ := strconv.ParseInt(prev.ResourceVersion(), 0, 64) newRV, _ := strconv.ParseInt(curr.ResourceVersion(), 0, 64) if oldRV >= newRV { return } // Updates triggered by status are ignored. if prev.GetGeneration() == curr.GetGeneration() && prev.GetUID() == curr.GetUID() { switch curr.GroupVersion() { case config.ApisixV2: if reflect.DeepEqual(prev.V2().Spec, curr.V2().Spec) && !reflect.DeepEqual(prev.V2().Status, curr.V2().Status) { return } } } key, err := cache.MetaNamespaceKeyFunc(newObj) if err != nil { log.Errorf("found ApisixConsumer resource with bad meta namespace key: %s", err) return } if !c.namespaceProvider.IsWatchingNamespace(key) { return } if !c.isEffective(curr) { return } log.Debugw("ApisixConsumer update event arrived", zap.Any("new object", curr), zap.Any("old object", prev), ) c.workqueue.Add(&types.Event{ Type: types.EventUpdate, Object: kube.ApisixConsumerEvent{ Key: key, OldObject: prev, GroupVersion: curr.GroupVersion(), }, }) c.MetricsCollector.IncrEvents("consumer", "update") } func (c *apisixConsumerController) onDelete(obj interface{}) { ac, err := kube.NewApisixConsumer(obj) if err != nil { tombstone, ok := obj.(cache.DeletedFinalStateUnknown) if !ok { return } ac, err = kube.NewApisixConsumer(tombstone.Obj) if err != nil { log.Errorw("found ApisixConsumer resource with bad type", zap.Error(err)) return } } key, err := cache.DeletionHandlingMetaNamespaceKeyFunc(obj) if err != nil { log.Errorf("found ApisixConsumer resource with bad meta namespace key: %s", err) return } if !c.namespaceProvider.IsWatchingNamespace(key) { return } if !c.isEffective(ac) { return } log.Debugw("ApisixConsumer delete event arrived", zap.Any("final state", ac), ) c.workqueue.Add(&types.Event{ Type: types.EventDelete, Object: kube.ApisixConsumerEvent{ Key: key, GroupVersion: ac.GroupVersion(), }, Tombstone: ac, }) c.MetricsCollector.IncrEvents("consumer", "delete") } // ResourceSync syncs ApisixConsumer resources within namespace to workqueue. // If namespace is "", it syncs all namespaces ApisixConsumer resources. func (c *apisixConsumerController) ResourceSync(interval time.Duration, namespace string) { objs := c.ApisixConsumerInformer.GetIndexer().List() delay := GetSyncDelay(interval, len(objs)) for i, obj := range objs { key, err := cache.MetaNamespaceKeyFunc(obj) if err != nil { log.Errorw("ApisixConsumer sync failed, found ApisixConsumer resource with bad meta namespace key", zap.String("error", err.Error())) continue } if !c.namespaceProvider.IsWatchingNamespace(key) { continue } ns, _, err := cache.SplitMetaNamespaceKey(key) if err != nil { log.Errorw("split ApisixRoute meta key failed", zap.Error(err), zap.String("key", key), ) continue } if namespace != "" && ns != namespace { continue } ac, err := kube.NewApisixConsumer(obj) if err != nil { log.Errorw("found ApisixConsumer resource with bad type", zap.String("error", err.Error())) continue } if !c.isEffective(ac) { continue } log.Debugw("ResourceSync", zap.String("resource", "ApisixConsumer"), zap.String("key", key), zap.Duration("calc_delay", delay), zap.Int("i", i), zap.Duration("delay", delay*time.Duration(i)), ) c.workqueue.AddAfter(&types.Event{ Type: types.EventSync, Object: kube.ApisixConsumerEvent{ Key: key, GroupVersion: ac.GroupVersion(), }, }, delay*time.Duration(i)) } } func (c *apisixConsumerController) updateStatus(obj kube.ApisixConsumer, statusErr error) { if obj == nil || c.Kubernetes.DisableStatusUpdates || !c.Elector.IsLeader() { return } var ( ac kube.ApisixConsumer err error namespace = obj.GetNamespace() name = obj.GetName() ) switch obj.GroupVersion() { case config.ApisixV2: ac, err = c.ApisixConsumerLister.V2(namespace, name) } if err != nil { if !k8serrors.IsNotFound(err) { log.Warnw("Failed to update status, unable to get ApisixConsumer", zap.Error(err), zap.String("name", name), zap.String("namespace", namespace), ) } return } if ac.ResourceVersion() != obj.ResourceVersion() { return } var ( reason = utils.ResourceSynced condition = metav1.ConditionTrue eventType = corev1.EventTypeNormal ) if statusErr != nil { reason = utils.ResourceSyncAborted condition = metav1.ConditionFalse eventType = corev1.EventTypeWarning } switch obj.GroupVersion() { case config.ApisixV2: c.RecordEvent(obj.V2(), eventType, reason, statusErr) c.recordStatus(obj.V2(), reason, statusErr, condition, ac.GetGeneration()) } } // recordStatus record resources status func (c *apisixConsumerController) recordStatus(at interface{}, reason string, err error, status metav1.ConditionStatus, generation int64) { if c.Kubernetes.DisableStatusUpdates { return } // build condition message := utils.CommonSuccessMessage if err != nil { message = err.Error() } condition := metav1.Condition{ Type: utils.ConditionType, Reason: reason, Status: status, Message: message, ObservedGeneration: generation, } apisixClient := c.KubeClient.APISIXClient if kubeObj, ok := at.(runtime.Object); ok { at = kubeObj.DeepCopyObject() } switch v := at.(type) { case *configv2.ApisixConsumer: // set to status if v.Status.Conditions == nil { conditions := make([]metav1.Condition, 0) v.Status.Conditions = conditions } if utils.VerifyGeneration(&v.Status.Conditions, condition) { meta.SetStatusCondition(&v.Status.Conditions, condition) if _, errRecord := apisixClient.ApisixV2().ApisixConsumers(v.Namespace). UpdateStatus(context.TODO(), v, metav1.UpdateOptions{}); errRecord != nil { log.Errorw("failed to record status change for ApisixConsumer", zap.Error(errRecord), zap.String("name", v.Name), zap.String("namespace", v.Namespace), ) } } default: // This should not be executed log.Errorf("unsupported resource record: %s", v) } } func (c *apisixConsumerController) isEffective(ac kube.ApisixConsumer) bool { if ac.GroupVersion() == config.ApisixV2 { return utils.MatchCRDsIngressClass(ac.V2().Spec.IngressClassName, c.Kubernetes.IngressClass) } // Compatible with legacy versions return true }