KubeStellar Architecture#
KubeStellar provides multi-cluster deployment of Kubernetes objects, controlled by simple BindingPolicy
objects, where Kubernetes objects are expressed in their native format with no wrapping or bundling. The high-level architecture for KubeStellar is illustrated in Figure 1.
KubeStellar relies on the concept of spaces.
A Space is an abstraction to represent an API service that
behaves like a Kubernetes kube-apiserver (including the persistent storage behind it)
and the subset of controllers in the kube-controller-manager that are concerned with
API machinery generalities (not management of containerized workloads).
A KubeFlex ControlPlane
is an example. A regular Kubernetes cluster is another example.
Users can use spaces to perform these tasks:
- Create Workload Definition Spaces (WDSes) to store the definitions of their workloads. A Kubernetes workload is an application that runs on Kubernetes. A workload can be made by a single Kubernetes object or several objects that work together.
- Create Inventory and Transport Spaces (ITSes) to manage the inventory of clusters and the transport of workloads.
- Register and label Workload Execution Clusters (WECs) with the Inventory and Transport Space, to keep track of the available clusters and their characteristics.
- Define
BindingPolicy
to specify what objects and where should be deployed on the WECs. - Submit objects in the native Kubernetes format to the WDSes,
and let the
BindingPolicy
govern which WECs should receive them. - Check the status of submitted objects from the WDS.
In KubeStellar, users can assume a variety of roles and responsibilities. These roles could range from system administrators and application owners to CISOs and DevOps Engineers. However, for the purpose of this document, we will not differentiate between these roles. Instead we will use the term 'user' broadly, without attempting to make distinctions among roles.
Examples of user interactions with KubeStellar are illustrated in the KubeStellar Usage Example Scenarios document.
The KubeStellar architecture has the following main modules.
-
KubeFlex. KubeStellar builds on the services of KubeFlex, using it to keep track of, and possibly provide, the Inventory and Transport spaces and the Workload Description spaces. Each of those appears as a
ControlPlane
object in the KubeFlex hosting cluster. -
KubeStellar Controller Manager: this module is instantiated once per WDS and is responsible for watching
BindingPolicy
objects and create from it a matchingBinding
object that contains list of references to the concrete objects and list of references to the concrete clusters, and for returning reported state from the ITS into the WDS. -
Pluggable Transport Controller: this module is instantiated once per WDS and is responsible for projecting KubeStellar workload and control objects of the WDS into OCM workload/control objects in the ITS.
-
Space Manager: This module manages the lifecycle of spaces.
-
OCM Cluster Manager: This module is instantiated once per ITS and syncs objects from that ITS to the Workload Execution Clusters (WECs). In the ITS, each mailbox namespace is associated with one WEC. Objects that are put in a mailbox namespace are delivered to the matching WEC.
-
OCM Agent: This module registers the WEC to the OCM Hub, watches for ManifestWork.v1.work.open-cluster-management.io objects and unwraps and syncs the objects into the WEC.
-
OCM Status Add-On Controller: This module is instantiated once per ITS and uses the OCM Add-on Framework to get the OCM Status Add-On Agent installed in each WEC along with supporting RBAC objects.
-
OCM Status Add-On Agent: This module watches AppliedManifestWork.v1.work.open-cluster-management.io objects to find objects that are synced by the OCM agent, gets their status and updates
WorkStatus
objects in the ITS namespace associated with the WEC.
KubeStellar Controller Manager#
This module manages the binding controller and the status controller.
-
The binding controller watches
BindingPolicy
and workload objects on the Workload Definition Space (WDS), and maintains aBinding
object for eachBindingPolicy
in the WDS. ABinding
object contains (a) the concrete list of references to workload objects (and associated modulations on downsync behavior) and (b) the concrete list of clusters that were selected by theBindingPolicy
selectors. -
The status controller watches for WorkStatus objects on the ITS and, based on the instructions in the
BindingPolicy
andStatusCollector
objects, returns reported state into the WDS in the two defined ways.
There is one instance of a KubeStellar Controller Manager for each WDS. Currently this controller-manager runs in the KubeFlex hosting cluster and is responsible for installing the required CRDs in the associated WDS. More details on the internals of this module are provided in KubeStellar Controllers Architecture.
Pluggable Transport Controller#
This controller's job is to (possibly through delegating some
responsibilities): (a) get workload objects from WDS to WECs as
prescribed by the Binding
objects and their referenced
CustomTransform
objects and inventory objects and (b) get
corresponding reported state back into WorkStatus
objects in the
ITS.
Different implementations of this controller are possible; it would be possible to enable even more different implementations by taking a more general approach to inventory.
The implementations need not be in this Git repository. Currently there is one implementation, and it is in this repository. This implementation uses Open Cluster Management. The OCM Status Add-On Controller and Agent are part of the way this transport controller gets its job done.
The OCM (based) Transport Controller maintains, in the ITS, a set of
ManifestWork
objects that constitute an OCM representation of what
is requested by the KubeStellar workload and control objects in the
WDS. Based on the associations in the Binding
objects, this
transport controller bundles workload objects from the WDS into
ManifestWork
objects in the ITS. The bundling is controllable, with
configured limits on both the number of objects in a bundle and the
size of the ManifestWorkSpec
.
There is one instance of the pluggable transport controller for each
WDS, managed according to a Deployment
object in the KubeFlex
hosting cluster. More details on the internals of this module are
provided in KubeStellar Controllers
Architecture.
Space Manager#
The Space Manager handles the lifecycle of spaces.
KubeStellar uses the KubeFlex project
for space management. In KubeFlex, a space is named a ControlPlane
, and we will use
both terms in this document. KubeStellar currently prereqs KubeFlex to
provide one or more spaces. We plan to make this optional in the near future.
KubeFlex is a flexible framework that supports various kinds of control planes, such as k8s, a basic Kubernetes API Server with a subset of kube controllers, and vcluster: a virtual cluster that runs on the hosting cluster based on the vCluster Project. More detailed information on the different types of control planes and architecture are described in the KubeFlex Architecture.
There are currently two roles for spaces managed by KubeFlex: Inventory and Transport Space (ITS) and Workload Description Space (WDS). The former runs the OCM Cluster Manager on a vcluster-type control plane, and the latter runs on a k8s-type control plane.
An ITS holds the inventory and the mailbox namespaces. The inventory is anchored by ManagedCluster.v1.cluster.open-cluster-management.io objects that describe the WECs. For each WEC there may also be a ConfigMap
object (in the customization-properties
namespace) that carries additional properties of that WEC; this ConfigMap
is used in customizing the workload to the WEC. The mailbox namespaces and their contents are transport implementation details that users do not need to deal with. Each mailbox namespace corresponds 1:1 with a WEC and holds ManifestWork
objects managed by the central KubeStellar controllers.
A WDS holds user workload objects and the user's objects that form the interface to KubeStellar control.
Currently, the user control objects are BindingPolicy
and Binding
objects.
Future development may define more kinds of control objects hosted in the WDS.
KubeFlex provides the ability to start controllers connected to a
Control Plane API Server or to deploy Helm Charts into a Control Plane
API server with post-create
hooks.
This feature is currently adopted for KubeStellar modules startup, as it allows to
create a Workload Description Space (WDS) and start the KubeStellar Controller Manager, and create an Inventory and Transport Space (ITS) in a
vcluster
and install the Open Cluster Management
Hub there.
OCM Cluster Manager#
This module is based on the Open Cluster Management Project, a community-driven project that focuses on multicluster and multicloud scenarios for Kubernetes apps. It provides APIs for cluster registration, work distribution and much more. The project is based on a hub-spoke architecture, where a single hub cluster handles the distribution of workloads through manifests, and one or more spoke clusters receive and apply the workload objects from the manifests. In Open Cluster Management, spoke clusters are called managed clusters, and the component running on the hub cluster is the cluster manager. Manifests provide a summary for the status of each object, however in some use cases this might not be sufficient as the full status for objects may be required. OCM provides an add-on framework that allows to automatically install additional agents on the managed clusters to provide specific features. This framework is used to install the status add-on on all managed clusters. KubeStellar currently exposes users directly to OCM inventory management and WEC registration.
OCM Agent#
The OCM Agent Module (a.k.a klusterlet) has two main controllers: the registration agent and the work agent.
The registration agent is responsible for registering
a new cluster into OCM. The agent creates an unaccepted ManagedCluster into
the hub cluster along with a temporary CertificateSigningRequest.v1.certificates (CSR) object.
The cluster will be accepted by the hub control plane if the CSR is approved and
signed by any certificate provider setting filling .status.certificate
with legit
X.509 certificates, and the ManagedCluster resource is approved by setting
.spec.hubAcceptsClient
to true in the spec. Upon approval, the registration
agent observes the signed certificate and persists them as a local secret
named hub-kubeconfig-secret
(by default in the open-cluster-management-agent
namespace)
which will be mounted to the other fundamental components of klusterlet such as
the work agent. The registration process in OCM is called double opt-in mechanism,
which means that a successful cluster registration requires both sides of approval
and commitment from the hub cluster and the managed cluster.
The work agent monitors the ManifestWork
resource in the cluster namespace
on the hub cluster. The work agent tracks all the resources defined in ManifestWork
and updates its status. There are two types of status in ManifestWork: the resourceStatus
tracks the status of each manifest in the ManifestWork, and conditions reflects the overall
status of the ManifestWork. The work agent checks whether a resource is Available,
meaning the resource exists on the managed cluster, and Applied, meaning the resource
defined in ManifestWork has been applied to the managed cluster. To ensure the resources
applied by ManifestWork are reliably recorded, the work agent creates an AppliedManifestWork
on the managed cluster for each ManifestWork as an anchor for resources relating to ManifestWork.
When ManifestWork is deleted, the work agent runs a Foreground deletion, and that ManifestWork
will stay in deleting state until all its related resources have been fully cleaned in the managed
cluster.
OCM Status Add-On Controller#
This module automates the installation of the OCM status add-on agent
on all managed clusters. It is based on the
OCM Add-on Framework,
which is a framework that helps developers to develop extensions
for working with multiple clusters in custom cases. A module based on
the add-on framework has two components: a controller and an
agent. The controller interacts with the add-on manager to register
the add-on, manage the distribution of the add-on to all clusters, and set
up the RBAC permissions required by the add-on agent to interact with the mailbox
namespace associated with the managed cluster. More specifically, the status
add-on controller sets up RBAC permissions to allow the add-on agent to
list and get ManifestWork
objects and create and update WorkStatus objects.
OCM Status Add-On Agent#
The OCM Status Add-On Agent is a controller that runs alongside the OCM Agent
in the managed cluster. Its primary function is to track objects delivered
by the work agent and report the full status of those objects back to the ITS.
Other KubeStellar controller(s) then propagate and/or summarize that status information into the WDS. The OCM Status Add-On Agent watches AppliedManifestWork.v1.work.open-cluster-management.io objects in the WEC to observe the status reported there by the OCM Agent. Each AppliedManifestWork
object is specific to one workload object, and holds both the local (in the WEC) status from that object and a reference to that object. For each AppliedManifest
, the OCM Status Add-On Agent maintains a corresponding WorkStatus
object in the relevant mailbox namespace in the ITS. Such a WorkStatus
object also is about exactly one workload object, so that status updates for one object do not require updates of a whole bundle. A WorkStatus
object holds the status of a workload object and a reference to that object.
Installing the Status Add-On Agent in the WEC causes status to be returned to WorkStatus
objects for all downsynced objects.
KubeStellar Controllers Architecture#
The KubeStellar controllers architecture is based on common patterns and best practices for Kubernetes controllers, such as the Kubernetes Sample Controller. A Kubernetes controller uses informers to watch for changes in Kubernetes objects, caches to store the objects, event handlers to react to events, work queues for parallel processing of tasks, and a reconciler to ensure the actual state matches the desired state. However, that pattern has been extended to provide the following features:
- Using dynamic informers for workload objects
- Starting informers on all API Resources (except some that do not need watching)
- Workload Informers and Listers are maintained in a hash map that is indexed by GVR (Group, Version, Resource) of the watched objects.
- Using a common work queue and set of workers, multiplexing multiple types of object references into that queue.
- A reference to a workload object carries its API Group, Version, Resource, and Kind. No need for a
RESMapper
, the "Kind" and "Resource" are learned together from the API discovery process.
- A reference to a workload object carries its API Group, Version, Resource, and Kind. No need for a
- Starting & stopping informers dynamically based on creation or deletion of CRDs (which add/remove APIs on the WDS).
- One client connected to the WDS space and one (or more in the future)
to connect to one or more OCM shards.
- The WDS-connected client is used to start the dynamic informers/listers for workload and control objects in the WDS
- The OCM-connected client is used to start informers/listers for OCM ManagedClusters and to copy/update/remove the wrapped objects into/from the OCM mailbox namespaces.
There are two controllers in the KubeStellar controller manager:
-
Binding Controller - one client connected to the WDS and one (or more in the future) to connect to one or more ITS shards.
-
The WDS-connected client is used to start the dynamic informers/listers for workload objects and KubeStellar control objects in the WDS.
-
The OCM-connected client is used to start informers/listers for OCM ManagedClusters. This is a temporary state until cluster inventory abstraction is implemented and decoupled from OCM (and then this client should be removed and we would need to use client to inventory space).
-
This controller maintains an internal data structure called the
BindingPolicyResover
that tracks whatBinding
should correspond to eachBindingPolicy
, and uses it to make that so.
-
-
Status controller - one client connected to the WDS and one connected to the ITS; also uses informer-like services from the Binding Controller, regarding workload objects and BindingPolicies. The Status Controller gets reported state from the ITS back to the WDS, in the two supported ways: combining reported state from multiple WECs to a query result object, and copying status from a single WEC to the original workload object.
There is also a separate Transport Controller. This also has a
WDS-connected client, used to monitor workload and control objects,
and an ITS-connected-client, used to monitor and create/update/delete
ManifestWork
objects.
Binding Controller#
The Binding controller is responsible for watching workload objects
and BindingPolicy
objects, and maintains for each of the latter a
matching Binding
object in the WDS. A Binding
object is mapped
1:1 to a BindingPolicy
object and contains the concrete list of
references to workload objects and the concrete list of references to
inventory objects that were selected by the policy.
The Binding Controller is centered on its workqueue and an internal
data structure, called a BindingPolicyResover
, that represents the
set of Binding
objects that should exist based on the controller's
inputs. The controller has informers for all of its inputs: a static
collection for the control objects (BindingPolicy
and inventory
objects) and a dynamic collection (based on continual API discovery)
for the workload objects. The controller also has informers for its
output objects (i.e., Binding
objects). Every notification from an
informer is handled by putting a relevant object reference into the
work queue. Working on a reference to an input involves updating the
BindingPolicyResover
and enqueuing a reference to any output object
(Binding
) that might need a change. Working on a reference to a
Binding
involves comparing what is actually in that Binding
with
what the BindingPolicyResover
says should be there, and
creating/updating/deleting the Binding
if there is a difference.
The Binding Controller also provides two informer-like services that the Status Controller uses. One is notifying about any change to that internal data structure, and the ability to read from it. The other is notifying about workload object events.
The architecture and the event flow of the code for create/update object events is illustrated in Figure 3 (some details are omitted to make the flow easier to understand).
At startup, the controller code sets up the dynamic informers, the event handler and the work queue as follows:
- lists all API preferred resources (using discovery client's
ServerPreferredResources()
to return only one preferred storage version for API group) - Filters out some resources
- For each resource:
- Creates GVR key
- Registers Event Handler
- Starts Informer
- Stores informer and lister in a map indexed by GVR
- Waits for all caches to sync
- Gets the list of all
BindingPolicy
objects and, for each one, invokes theBindingPolicyResover
method for the presence of theBindingPolicy
. - Starts N workers to process work queue
The informer and watches specific resources on the WDS API Server; on
create/update/delete object events it puts a copy of the object into
the informer's local cache, which is what the lister reads. The
informer invokes the event handler. The handler implements the event
handling functions (AddFunc
, UpdateFunc
, DeleteFunc
)
Sync BindingPolicy#
For a BindingPolicy
that is deleted or being deleted, sync consists of the following steps.
- Ensure the absence of the KubeStellar finalizer on the
BindingPolicy
. - Invoke the
BindingPolicyResover
method for the absence of theBindingPolicy
.
For a BindingPolicy
that is neither deleted nor being deleted, sync consists of the following steps.
- Ensure the presence of the KubeStellar finalizer on the
BindingPolicy
. - Invoke the
BindingPolicyResover
method for the presence of theBindingPolicy
. - Find all the WECs (which are represented by inventory objects) that match the
BindingPolicy
. - Invoke the
BindingPolicyResover
method that associates a BindingPolicy's name with its current set of matching WECs. - Enqueue a reference to every workload object.
Sync Workload Object#
If the workload object is a CRD then, in addition to the steps below, the controller makes the corresponding change in the results of API discovery.
If the workload object is being deleted then the controller invokes
the BindingPolicyResolver
method that handles with the non-existence
of an object; this completes sync in this case.
Otherwise the controller proceeds as follows, independently for each
BindingPolicy
that exists in the informer's local cache and the
BindingPolicyResolver
is aware of.
-
The workload object is tested against the downsync policy clauses of the
BindingPolicy
and results accumulated. -
The controller calls the
BindingPolicyResolver
method that copes with the accumulated results. -
If the resolver reported that this made a difference then the controller enqueues a reference to the corresponding
Binding
object.
Sync Binding#
If the BindingPolicyResover
is unaware of the existence of a
corresponding BindingPolicy
then almost nothing needs to be done:
the BindingPolicy
is either being created or deleted and there will
be more syncing done due to other events. All that need be done here
and now is have the resolver notify its registered handlers (which are
from the Status Controller) for BindingPolicy
events.
If the corresponding BindingPolicy
object does not exist, then
nothing more is done.
In the remaining cases, the controller takes the following steps.
-
The controller generates the proper
BindingSpec
from the information in theBindingPolicyResover
. The controller compares that with theBindingSpec
(if any) from theBinding
lister. If there is a difference then the controller updates theBinding
object and has the resolver notify the registered handlers forBindingPolicy
events. When creating aBinding
object, the controller sets the correspondingBindingPolicyObject
as a controlling owner in the object metadata. -
The controller writes the
.status
of the correspondingBindingPolicy
. This includes propagating the errors from the.status.errors
of theBinding
and adding reports of invalid requests for singleton reported state return (requests where the object is not distributed to exactly 1 WEC).
Status Controller#
The status controller implements the last stage of reported state
propagation, from the ITS into the WDS. This includes both singleton
reported state return into the .status
section of workload objects
and programmed aggregation into CombinedStatus
objects.
The WorkStatus
objects are created, updated, and deleted in the ITS
by the chosen transport. For the OCM transport, that is the OCM Status
Add-On Agent described above.
The status controller has informers for its unique inputs, which are
StatusCollector
objects in the WDS and WorkStatus
objects in the
ITS. The status controller also gets informer-like services from the
binding controller: getting notified of and being able to read the
current state resulting from (a) workload object create/update/delete,
(b) change in an intended Binding
, and (c) change in whether
singleton reported state return is requested for a workload
object. The status controller also has informers for its unique
outputs, which are the CombinedStatus
objects.
The high-level flow for the singleton status update is described in Figure 4.
Transport Controller#
The transport controller is pluggable and allows the option to plug different
implementations of the transport interface. The interface between the plugin and the generic code is a Go language interface (in pkg/transport/transport.go
) that the plugin has to implement. This interface requires the following from the plugin.
- Upon registration of a new WEC, plugin should create a namespace for the WEC in the ITS and delete the namespace once the WEC registration goes away (mailbox namespace per WEC);
- Plugin must be able to wrap any number of objects into a single wrapped object;
- Have an agent that can be used to pull the wrapped objects from the mailbox namespace and apply them to the WEC. A single example for such an agent is an agent that runs on the WEC and watches the wrapped object in the corresponding namespace in the central hub and is able to unwrap it and apply the objects to the WEC.
- Have inventory representation for the clusters.
The above list is required in order to comply with SIG Multi-Cluster Work API.
Each plugin has an executable with a main
function that calls the generic code (in pkg/transport/cmd/generic-main.go
), passing the plugin object that implements the plugin interface. The generic code does the rule-based customization; the plugin is given customized objects. The generic code also ensures that the namespace named "customization-properties" exists in the ITS.
KubeStellar currently has one transport plugin implementation which is based on CNCF Sandbox project Open Cluster Management. OCM transport plugin implements the above interface and supplies a function to start the transport controller using the specific OCM implementation. Code is available here.
We expect to have more transport plugin options in the future.
The following section describes how transport controller works, while the described behavior remains the same no matter which transport plugin is selected. The high level flow for the transport controller is described in Figure 5.
The transport controller is driven by Binding
objects in the WDS. There is a 1:1 correspondence between Binding
objects and BindingPolicy
objects, but the transport controller does not care about the latter. A Binding
object contains (a) a list of references to workload objects that are selected for distribution and (b) a list of references to the destinations for those workload objects.
The transport controller watches for Binding
objects on the WDS, using an informer. Upon every add, update, and delete event from that informer, the controller puts a reference to that Binding
object in its work queue. The transport controller also has informers on the inventory objects (both ManagedCluster
and their associated ConfigMap
) and on the wrapped objects (ManifestWork
). Forked goroutines process items from the work queue. For a reference to a control or workload object, that processing starts with retrieving the informer's cached copy of that object.
The transport controller also maintains a finalizer on each Binding object. When processing a reference to a Binding
object that no longer exists, the transport controller has nothing more to do (because it processes the deletion before removing its finalizer).
When processing a reference to a Binding
object that still exists, the transport controller looks at whether that Binding
is in the process of being deleted. If so then the controller ensures that the corresponding wrapped object (ManifestWork
) in the ITS no longer exists and then removes the finalizer from the Binding
.
When processing a Binding
object that is not being deleted, the transport controller first ensures that the finalizer is on that object. Then the controller constructs an internal function from destination to the customized wrapped object for that destination. The controller then iterates over the Binding
's list of destinations and propagates the corresponding wrapped object (reported by the function just described) to the corresponding mailbox namespace. Once the wrapped object is in the mailbox namespace of a cluster on the ITS, it's the agent responsibility to pull the wrapped object from there and apply/update/delete the workload objects on the WEC.
To construct the function from destination to customized wrapped object, the transport controller reads the Binding
's list of references to workload objects. The controller reads those objects from the WDS using a Kubernetes "dynamic" client. Immediately upon reading each workload object, the controller applies the WEC-independent transforms (from the CustomTransform
objects). After doing that for all the listed workload objects, the controller goes through those objects one-by-one and applies template expansion for each destination if the object requests template expansion. If any of those objects requests template expansion and has a string that actually involves template expansion: the controller accumulates a map from destination to slice of customized objects and then invokes the transport plugin on each of those slices, to ultimately produce the function from destination to wrapped object. If none of the selected workload objects actually involved any template expansion then the controller wraps the slice of workload objects to get one wrapped object and produces a constant function from destination to that one wrapped object.
Transport controller is based on the controller design pattern and aims to bring the current state to the desired state. If a WEC was removed from the Binding
, the transport controller will also make sure to remove the matching wrapped object(s) from the WEC's mailbox namespace.
Custom transform cache#
To support efficient application of the CustomTransform
objects, the transport controller maintains a cache of the results of internalizing what the users are asking for. In relational algebra terms, that cache consists of the following relations.
Relation "USES": has a row whenever the Binding
's list of workload objects uses the GroupResource
.
column name | type | in key |
---|---|---|
bindingName |
string | yes |
gr |
metav1.GroupResource | yes |
Relation "INSTRUCTIONS": has a row saying what to do for each GroupResource
.
column name | type | in key |
---|---|---|
gr |
metav1.GroupResource | yes |
removes |
SET(jsonpath.Query) | no |
Relation "SPECS": remembers the specs of CustomTransform
objects.
column name | type | in key |
---|---|---|
ctName |
string | yes |
gr |
metav1.GroupResource | no |
removes |
SET(string) | no |
The cache maintains the following invariants on those relations. Note how these invariants require removal of data that is no longer interesting.
- INSTRUCTIONS has a row for a given
GroupResource
if and only if USES has one or more rows for thatGroupResource
. - SPECS has a row for a given
CustomTransform
name if and only if thatCustomTransform
contributed to an existing row in INSTRUCTIONS.
Whenever it removes a row from INSTRUCTIONS due to loss of confidence in that row, the cache has the controller enqueue a reference to every related Binding
from USES, so that eventually a revised row will be derived and applied to every dependent Binding
.
The interface to the cache is customTransformCollection
and the implementation is in a *customTransformCollectionImpl
. This represents those relations as follows.
- USES is represented by two indices, each a map from one column value to the set of related other column values. The two indices are in
bindingNameToGroupResources
andgrToTransformData/bindingsThatCare
. - INSTRUCTIONS is represented by
grToTransformData/removes
. - SPECS is represented by
ctNameToSpec
and an index,grToTransformData/ctNames
.
The cache interface has the following methods.
-
getCustomTransformChanges
ensures that the cache has an entry for a given usage (a (Binding
,GroupResource
) pair) and returns the corresponding instructions (i.e., set of JSONPath to remove) for thatGroupResource
. This method sets the status of eachCustomTransform
API object that it processes.Of course this method maintains the cache's invariants. That means adding rows to SPECS as necessary. It also means removing a row from INSTRUCTIONS upon discovery that a
CustomTransform
's Spec has changed itsGroupResource
. Note that the cache's invariants require this removal by this method, not relying on an eventual call toNoteCustomTransform
(because the cache records at most the latest Spec for eachCustomTransform
, a later cache operation will not know about the previousGroupResource
).Removing a row from INSTRUCTIONS also entails removing the corresponding rows from SPECS, to maintain the cache's invariants.
-
noteCustomTransform
reacts to a create/update/delete of aCustomTransform
object. In the update case, if theCustomResourceSpec
changed itsGroupResource
then this method removes two rows from INSTRUCTIONS (if they were present): the one for the oldGroupResource
and the one for the new. In case of create, delete, or other change in Spec, this method removes the one relevant row (if present) in INSTRUCTIONS. -
setBindingGroupResources
reacts to knowing the full set ofGroupResource
that a givenBinding
uses. This removes outdated rows from USES (updates the two indices that represent it) and removes rows from INSTRUCTIONS that are no longer allowed.
Customization properties cache#
The transport controller maintains a cached set of customization properties for each destination, and an association between Binding
and the set of destinations that it references. When a relevant informer delivers an event about an inventory object (either a ManagedCluster
object or a ConfigMap
object that adds properties for that destination) the controller enqueues a work item of type recollectProperties
. This work item carries the name of the inventory object. Processing that work item starts by re-computing the full map of properties for that destination. If the cache has an entry for that destination and the cached properties differ from the ones freshly computed, the controller updates that cache entry and enqueues a reference to every Binding
object that depends on the properties of that destination.