@@ -19,6 +19,7 @@ package controllers
19
19
import (
20
20
"context"
21
21
"fmt"
22
+
22
23
"sigs.k8s.io/controller-runtime/pkg/controller"
23
24
24
25
"github.com/pkg/errors"
@@ -50,7 +51,6 @@ import (
50
51
"github.com/aws/aws-application-networking-k8s/pkg/k8s"
51
52
"github.com/aws/aws-application-networking-k8s/pkg/model/core"
52
53
lattice_runtime "github.com/aws/aws-application-networking-k8s/pkg/runtime"
53
- "github.com/aws/aws-application-networking-k8s/pkg/utils"
54
54
k8sutils "github.com/aws/aws-application-networking-k8s/pkg/utils"
55
55
"github.com/aws/aws-application-networking-k8s/pkg/utils/gwlog"
56
56
)
@@ -216,67 +216,58 @@ func (r *routeReconciler) getRoute(ctx context.Context, req ctrl.Request) (core.
216
216
}
217
217
218
218
func updateRouteListenerStatus (ctx context.Context , k8sClient client.Client , route core.Route ) error {
219
- gw := & gwv1.Gateway {}
220
-
221
- gwNamespace := route .Namespace ()
222
- if route .Spec ().ParentRefs ()[0 ].Namespace != nil {
223
- gwNamespace = string (* route .Spec ().ParentRefs ()[0 ].Namespace )
224
- }
225
- gwName := types.NamespacedName {
226
- Namespace : gwNamespace ,
227
- // TODO assume one parent for now and point to service network
228
- Name : string (route .Spec ().ParentRefs ()[0 ].Name ),
219
+ gws , err := findControlledParents (ctx , k8sClient , route )
220
+ if len (gws ) <= 0 {
221
+ return fmt .Errorf ("failed to get gateway for route %s: %w" , route .Name (), err )
229
222
}
230
-
231
- if err := k8sClient .Get (ctx , gwName , gw ); err != nil {
232
- return fmt .Errorf ("update route listener: gw not found, gw: %s, err: %w" , gwName , err )
233
- }
234
-
223
+ // TODO assume one parent for now and point to service network
224
+ gw := gws [0 ]
235
225
return UpdateGWListenerStatus (ctx , k8sClient , gw )
226
+
236
227
}
237
228
238
229
func (r * routeReconciler ) isRouteRelevant (ctx context.Context , route core.Route ) bool {
239
230
if len (route .Spec ().ParentRefs ()) == 0 {
240
231
r .log .Infof (ctx , "Ignore Route which has no ParentRefs gateway %s " , route .Name ())
241
232
return false
242
233
}
234
+ // if route has gateway parentRef that is controlled by lattice gateway controller,
235
+ // then it is relevant
236
+ gws , _ := findControlledParents (ctx , r .client , route )
237
+ return len (gws ) > 0
238
+ }
243
239
244
- gw := & gwv1.Gateway {}
245
-
240
+ // findControlledParents returns parent gateways that are controlled by lattice gateway controller
241
+ func findControlledParents (
242
+ ctx context.Context ,
243
+ client client.Client ,
244
+ route core.Route ,
245
+ ) ([]* gwv1.Gateway , error ) {
246
+ var result []* gwv1.Gateway
246
247
gwNamespace := route .Namespace ()
247
- if route .Spec ().ParentRefs ()[0 ].Namespace != nil {
248
- gwNamespace = string (* route .Spec ().ParentRefs ()[0 ].Namespace )
249
- }
250
- gwName := types.NamespacedName {
251
- Namespace : gwNamespace ,
252
- Name : string (route .Spec ().ParentRefs ()[0 ].Name ),
253
- }
254
-
255
- if err := r .client .Get (ctx , gwName , gw ); err != nil {
256
- r .log .Infof (ctx , "Could not find gateway %s with err %s. Ignoring route %+v whose ParentRef gateway object" +
257
- " is not defined." , gwName .String (), err , route .Spec ())
258
- return false
259
- }
260
-
261
- // make sure gateway is an aws-vpc-lattice
262
- gwClass := & gwv1.GatewayClass {}
263
- gwClassName := types.NamespacedName {
264
- Namespace : defaultNamespace ,
265
- Name : string (gw .Spec .GatewayClassName ),
248
+ misses := []string {}
249
+ for _ , parentRef := range route .Spec ().ParentRefs () {
250
+ gw := & gwv1.Gateway {}
251
+ if parentRef .Namespace != nil {
252
+ gwNamespace = string (* parentRef .Namespace )
253
+ }
254
+ gwName := types.NamespacedName {
255
+ Namespace : gwNamespace ,
256
+ Name : string (parentRef .Name ),
257
+ }
258
+ if err := client .Get (ctx , gwName , gw ); err != nil {
259
+ misses = append (misses , gwName .String ())
260
+ continue
261
+ }
262
+ if k8s .IsControlledByLatticeGatewayController (ctx , client , gw ) {
263
+ result = append (result , gw )
264
+ }
266
265
}
267
-
268
- if err := r .client .Get (ctx , gwClassName , gwClass ); err != nil {
269
- r .log .Infof (ctx , "Ignore Route not controlled by any GatewayClass %s, %s" , route .Name (), route .Namespace ())
270
- return false
266
+ var err error
267
+ if len (misses ) > 0 {
268
+ err = fmt .Errorf ("failed to get gateway, name %s" , misses )
271
269
}
272
-
273
- if gwClass .Spec .ControllerName == config .LatticeGatewayControllerName {
274
- r .log .Infof (ctx , "Found aws-vpc-lattice for Route for %s, %s" , route .Name (), route .Namespace ())
275
- return true
276
- }
277
-
278
- r .log .Infof (ctx , "Ignore non aws-vpc-lattice Route %s, %s" , route .Name (), route .Namespace ())
279
- return false
270
+ return result , err
280
271
}
281
272
282
273
func (r * routeReconciler ) buildAndDeployModel (
@@ -316,6 +307,21 @@ func (r *routeReconciler) buildAndDeployModel(
316
307
return stack , err
317
308
}
318
309
310
+ func (r * routeReconciler ) findControlledParentRef (ctx context.Context , route core.Route ) (gwv1.ParentReference , error ) {
311
+ gws , err := findControlledParents (ctx , r .client , route )
312
+ if len (gws ) <= 0 {
313
+ return gwv1.ParentReference {}, fmt .Errorf ("failed to get gateway for route %s: %w" , route .Name (), err )
314
+ }
315
+ // TODO assume one parent for now and point to service network
316
+ gw := gws [0 ]
317
+ for _ , parentRef := range route .Spec ().ParentRefs () {
318
+ if string (parentRef .Name ) == gw .Name {
319
+ return parentRef , nil
320
+ }
321
+ }
322
+ return gwv1.ParentReference {}, fmt .Errorf ("parentRef not found for route %s" , route .Name ())
323
+ }
324
+
319
325
func (r * routeReconciler ) reconcileUpsert (ctx context.Context , req ctrl.Request , route core.Route ) error {
320
326
r .log .Infow (ctx , "reconcile, adding or updating" , "name" , req .Name )
321
327
r .eventRecorder .Event (route .K8sObject (), corev1 .EventTypeNormal ,
@@ -337,10 +343,13 @@ func (r *routeReconciler) reconcileUpsert(ctx context.Context, req ctrl.Request,
337
343
338
344
if backendRefIPFamiliesErr != nil {
339
345
httpRouteOld := route .DeepCopy ()
346
+ parentRef , err := r .findControlledParentRef (ctx , route )
347
+ if err != nil {
348
+ return err
349
+ }
340
350
341
- route .Status ().UpdateParentRefs (route .Spec ().ParentRefs ()[0 ], config .LatticeGatewayControllerName )
342
-
343
- route .Status ().UpdateRouteCondition (metav1.Condition {
351
+ route .Status ().UpdateParentRefs (parentRef , config .LatticeGatewayControllerName )
352
+ route .Status ().UpdateRouteCondition (parentRef , metav1.Condition {
344
353
Type : string (gwv1 .RouteConditionAccepted ),
345
354
Status : metav1 .ConditionFalse ,
346
355
ObservedGeneration : route .K8sObject ().GetGeneration (),
@@ -358,8 +367,13 @@ func (r *routeReconciler) reconcileUpsert(ctx context.Context, req ctrl.Request,
358
367
if _ , err := r .buildAndDeployModel (ctx , route ); err != nil {
359
368
if services .IsConflictError (err ) {
360
369
// Stop reconciliation of this route if the route cannot be owned / has conflict
361
- route .Status ().UpdateParentRefs (route .Spec ().ParentRefs ()[0 ], config .LatticeGatewayControllerName )
362
- route .Status ().UpdateRouteCondition (metav1.Condition {
370
+ parentRef , parentRefErr := r .findControlledParentRef (ctx , route )
371
+ if parentRefErr != nil {
372
+ // if parentRef not found, we cannot update route status
373
+ return parentRefErr
374
+ }
375
+ route .Status ().UpdateParentRefs (parentRef , config .LatticeGatewayControllerName )
376
+ route .Status ().UpdateRouteCondition (parentRef , metav1.Condition {
363
377
Type : string (gwv1 .RouteConditionAccepted ),
364
378
Status : metav1 .ConditionFalse ,
365
379
ObservedGeneration : route .K8sObject ().GetGeneration (),
@@ -499,24 +513,6 @@ func (r *routeReconciler) hasNotAcceptedCondition(route core.Route) bool {
499
513
return false
500
514
}
501
515
502
- // find Gateway by Route and parentRef, returns nil if not found
503
- func (r * routeReconciler ) findRouteParentGw (ctx context.Context , route core.Route , parentRef gwv1.ParentReference ) (* gwv1.Gateway , error ) {
504
- ns := route .Namespace ()
505
- if parentRef .Namespace != nil && * parentRef .Namespace != "" {
506
- ns = string (* parentRef .Namespace )
507
- }
508
- gwName := types.NamespacedName {
509
- Namespace : ns ,
510
- Name : string (parentRef .Name ),
511
- }
512
- gw := & gwv1.Gateway {}
513
- err := r .client .Get (ctx , gwName , gw )
514
- if err != nil {
515
- return nil , client .IgnoreNotFound (err )
516
- }
517
- return gw , nil
518
- }
519
-
520
516
// Validation rules for route parentRefs
521
517
//
522
518
// Will ignore status update when:
@@ -532,15 +528,13 @@ func (r *routeReconciler) validateRouteParentRefs(ctx context.Context, route cor
532
528
}
533
529
534
530
parentStatuses := []gwv1.RouteParentStatus {}
531
+ gws , err := findControlledParents (ctx , r .client , route )
532
+ if len (gws ) <= 0 {
533
+ return nil , fmt .Errorf ("failed to get gateway for route %s: %w" , route .Name (), err )
534
+ }
535
+ // TODO assume one parent for now and point to service network
536
+ gw := gws [0 ]
535
537
for _ , parentRef := range route .Spec ().ParentRefs () {
536
- gw , err := r .findRouteParentGw (ctx , route , parentRef )
537
- if err != nil {
538
- return nil , err
539
- }
540
- if gw == nil {
541
- continue // ignore status update if gw not found
542
- }
543
-
544
538
noMatchingParent := true
545
539
for _ , listener := range gw .Spec .Listeners {
546
540
if parentRef .Port != nil && * parentRef .Port != listener .Port {
@@ -554,7 +548,7 @@ func (r *routeReconciler) validateRouteParentRefs(ctx context.Context, route cor
554
548
555
549
parentStatus := gwv1.RouteParentStatus {
556
550
ParentRef : parentRef ,
557
- ControllerName : "application-networking.k8s.aws/gateway-api-controller" ,
551
+ ControllerName : config . LatticeGatewayControllerName ,
558
552
Conditions : []metav1.Condition {},
559
553
}
560
554
@@ -573,7 +567,7 @@ func (r *routeReconciler) validateRouteParentRefs(ctx context.Context, route cor
573
567
}
574
568
575
569
// set of valid Kinds for Route Backend References
576
- var validBackendKinds = utils .NewSet ("Service" , "ServiceImport" )
570
+ var validBackendKinds = k8sutils .NewSet ("Service" , "ServiceImport" )
577
571
578
572
// validate route's backed references, will return non-accepted
579
573
// condition if at least one backendRef not in a valid state
0 commit comments