-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add internal and external URL handling for the docker pull secret #19838
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -1504,6 +1504,7 @@ type OpenshiftControllerConfig struct { | |
Deployer DeployerControllerConfig | ||
Build BuildControllerConfig | ||
ServiceAccount ServiceAccountControllerConfig | ||
DockerPullSecret DockerPullSecretControllerConfig | ||
Network NetworkControllerConfig | ||
Ingress IngressControllerConfig | ||
ImageImport ImageImportControllerConfig | ||
|
@@ -1555,6 +1556,11 @@ type ServiceAccountControllerConfig struct { | |
ManagedNames []string | ||
} | ||
|
||
type DockerPullSecretControllerConfig struct { | ||
// RegistryURLs is a list of urls that the docker pull secrets should be valid for. | ||
RegistryURLs []string | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. nit: optional: can we call this AdditionalRegistryURLs to match the controller field? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
I think from the config side, the user see this as his spot to specify the registry urls, not to set extra ones. From his point of view, we're the ones adding extras. The API is for them, not us. |
||
} | ||
|
||
type ImageImportControllerConfig struct { | ||
// MaxScheduledImageImportsPerMinute is the maximum number of image streams that will be imported in the background per minute. | ||
// The default value is 60. Set to -1 for unlimited. | ||
|
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -34,6 +34,9 @@ type DockerRegistryServiceControllerOptions struct { | |
|
||
DockercfgController *DockercfgController | ||
|
||
// AdditionalRegistryURLs is a list of URLs that are always included | ||
AdditionalRegistryURLs []string | ||
|
||
// DockerURLsInitialized is used to send a signal to the DockercfgController that it has the correct set of docker urls | ||
DockerURLsInitialized chan struct{} | ||
} | ||
|
@@ -51,12 +54,13 @@ var serviceLocations = []serviceLocation{ | |
// NewDockerRegistryServiceController returns a new *DockerRegistryServiceController. | ||
func NewDockerRegistryServiceController(secrets informers.SecretInformer, serviceInformer informers.ServiceInformer, cl kclientset.Interface, options DockerRegistryServiceControllerOptions) *DockerRegistryServiceController { | ||
e := &DockerRegistryServiceController{ | ||
client: cl, | ||
clusterDNSSuffix: options.ClusterDNSSuffix, | ||
dockercfgController: options.DockercfgController, | ||
registryLocationQueue: workqueue.NewRateLimitingQueue(workqueue.DefaultControllerRateLimiter()), | ||
secretsToUpdate: workqueue.NewRateLimitingQueue(workqueue.DefaultControllerRateLimiter()), | ||
dockerURLsInitialized: options.DockerURLsInitialized, | ||
client: cl, | ||
additionalRegistryURLs: options.AdditionalRegistryURLs, | ||
clusterDNSSuffix: options.ClusterDNSSuffix, | ||
dockercfgController: options.DockercfgController, | ||
registryLocationQueue: workqueue.NewRateLimitingQueue(workqueue.DefaultControllerRateLimiter()), | ||
secretsToUpdate: workqueue.NewRateLimitingQueue(workqueue.DefaultControllerRateLimiter()), | ||
dockerURLsInitialized: options.DockerURLsInitialized, | ||
} | ||
|
||
// we're only watching two of these, but we already watch all services for the service serving cert signer | ||
|
@@ -104,6 +108,8 @@ type DockerRegistryServiceController struct { | |
|
||
// clusterDNSSuffix is the suffix for in cluster DNS that can be added to service names | ||
clusterDNSSuffix string | ||
// additionalRegistryURLs is a list of URLs that are always included | ||
additionalRegistryURLs []string | ||
|
||
dockercfgController *DockercfgController | ||
|
||
|
@@ -134,6 +140,9 @@ func (e *DockerRegistryServiceController) Run(workers int, stopCh <-chan struct{ | |
defer utilruntime.HandleCrash() | ||
defer e.registryLocationQueue.ShutDown() | ||
|
||
glog.Infof("Starting DockerRegistryServiceController controller") | ||
defer glog.Infof("Shutting down DockerRegistryServiceController controller") | ||
|
||
// Wait for the store to sync before starting any work in this controller. | ||
ready := make(chan struct{}) | ||
go e.waitForDockerURLs(ready, stopCh) | ||
|
@@ -142,14 +151,13 @@ func (e *DockerRegistryServiceController) Run(workers int, stopCh <-chan struct{ | |
case <-stopCh: | ||
return | ||
} | ||
glog.V(1).Infof("caches synced") | ||
|
||
glog.V(5).Infof("Starting workers") | ||
go wait.Until(e.watchForDockerURLChanges, time.Second, stopCh) | ||
for i := 0; i < workers; i++ { | ||
go wait.Until(e.watchForDockercfgSecretUpdates, time.Second, stopCh) | ||
} | ||
<-stopCh | ||
glog.V(1).Infof("Shutting down") | ||
} | ||
|
||
// enqueue adds to our queue. We only have one entry, but we never have to check it since we already know the things | ||
|
@@ -225,10 +233,11 @@ func (e *DockerRegistryServiceController) watchForDockerURLChanges() { | |
|
||
// getDockerRegistryLocations returns the dns form and the ip form of the secret | ||
func (e *DockerRegistryServiceController) getDockerRegistryLocations() []string { | ||
ret := []string{} | ||
ret := append([]string{}, e.additionalRegistryURLs...) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. why not start with ret := e.additionalRegistryURLs ? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
fear of accidental mutation. |
||
for _, location := range serviceLocations { | ||
ret = append(ret, getDockerRegistryLocations(e.serviceLister, location, e.clusterDNSSuffix)...) | ||
} | ||
glog.V(4).Infof("found docker registry urls: %v", ret) | ||
return ret | ||
} | ||
|
||
|
@@ -260,9 +269,10 @@ func (e *DockerRegistryServiceController) syncRegistryLocationChange() error { | |
newDockerRegistryLocations := sets.NewString(newLocations...) | ||
existingURLs := e.getRegistryURLs() | ||
if existingURLs.Equal(newDockerRegistryLocations) && e.initialSecretsCheckDone { | ||
glog.V(4).Infof("No effective update: %v", newDockerRegistryLocations) | ||
glog.V(3).Infof("No effective update: %v", newDockerRegistryLocations) | ||
return nil | ||
} | ||
glog.V(1).Infof("Updating registry URLs from %v to %v", existingURLs, newDockerRegistryLocations) | ||
|
||
// make sure that new dockercfg secrets get the correct locations | ||
e.dockercfgController.SetDockerURLs(newDockerRegistryLocations.List()...) | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should this also check
OPENSHIFT_DEFAULT_REGISTRY
since that is also a valid (if deprecated?) way to set the url on the master?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(that's an env var, sorry i wasn't clearer)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
no, we should never use it again. That's supposed to be set up front. Ansible forcibly upgrades you away.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
k
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
i think OPENSHIFT_DEFAULT_REGISTRY is handled by the logic that sets the ImagePolicyConfig already if I remember correctly