Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

helm: fix a memory leak resulting from too many k8s client instantiations #6026

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 7 additions & 1 deletion internal/cmd/helm-operator/run/cmd.go
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,7 @@ import (
"sigs.k8s.io/controller-runtime/pkg/manager/signals"
crmetrics "sigs.k8s.io/controller-runtime/pkg/metrics"

helmClient "github.com/operator-framework/operator-sdk/internal/helm/client"
"github.com/operator-framework/operator-sdk/internal/helm/controller"
"github.com/operator-framework/operator-sdk/internal/helm/flags"
"github.com/operator-framework/operator-sdk/internal/helm/metrics"
Expand Down Expand Up @@ -193,6 +194,11 @@ func run(cmd *cobra.Command, f *flags.Flags) {
log.Error(err, "Failed to create new manager factories.")
os.Exit(1)
}
acg, err := helmClient.NewActionConfigGetter(mgr.GetConfig(), mgr.GetRESTMapper(), mgr.GetLogger())
if err != nil {
log.Error(err, "Failed to create Helm action config getter")
os.Exit(1)
}
for _, w := range ws {
// Register the controller with the factory.
reconcilePeriod := f.ReconcilePeriod
Expand All @@ -203,7 +209,7 @@ func run(cmd *cobra.Command, f *flags.Flags) {
err := controller.Add(mgr, controller.WatchOptions{
Namespace: namespace,
GVK: w.GroupVersionKind,
ManagerFactory: release.NewManagerFactory(mgr, w.ChartDir),
ManagerFactory: release.NewManagerFactory(mgr, acg, w.ChartDir),
ReconcilePeriod: reconcilePeriod,
WatchDependentResources: *w.WatchDependentResources,
OverrideValues: w.OverrideValues,
Expand Down
120 changes: 120 additions & 0 deletions internal/helm/client/actionconfig.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,120 @@
/*
Copyright 2020 The Operator-SDK Authors.

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

package client

import (
"context"
"fmt"

"k8s.io/client-go/kubernetes"

"github.com/go-logr/logr"
"helm.sh/helm/v3/pkg/action"
"helm.sh/helm/v3/pkg/kube"
"helm.sh/helm/v3/pkg/storage"
"helm.sh/helm/v3/pkg/storage/driver"
corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/meta"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
v1 "k8s.io/client-go/kubernetes/typed/core/v1"
"k8s.io/client-go/rest"
"sigs.k8s.io/controller-runtime/pkg/client"
)

type ActionConfigGetter interface {
ActionConfigFor(obj client.Object) (*action.Configuration, error)
}

func NewActionConfigGetter(cfg *rest.Config, rm meta.RESTMapper, log logr.Logger) (ActionConfigGetter, error) {
rcg := newRESTClientGetter(cfg, rm, "")
// Setup the debug log function that Helm will use
debugLog := func(format string, v ...interface{}) {
if log.Enabled() {
log.V(1).Info(fmt.Sprintf(format, v...))
}
}

kc := kube.New(rcg)
kc.Log = debugLog

kcs, err := kc.Factory.KubernetesClientSet()
if err != nil {
return nil, fmt.Errorf("creating kubernetes client set: %w", err)
}

return &actionConfigGetter{
kubeClient: kc,
kubeClientSet: kcs,
debugLog: debugLog,
restClientGetter: rcg.restClientGetter,
}, nil
}

var _ ActionConfigGetter = &actionConfigGetter{}

type actionConfigGetter struct {
kubeClient *kube.Client
kubeClientSet kubernetes.Interface
debugLog func(string, ...interface{})
restClientGetter *restClientGetter
}

func (acg *actionConfigGetter) ActionConfigFor(obj client.Object) (*action.Configuration, error) {
ownerRef := metav1.NewControllerRef(obj, obj.GetObjectKind().GroupVersionKind())
d := driver.NewSecrets(&ownerRefSecretClient{
SecretInterface: acg.kubeClientSet.CoreV1().Secrets(obj.GetNamespace()),
refs: []metav1.OwnerReference{*ownerRef},
})

// Also, use the debug log for the storage driver
d.Log = acg.debugLog

// Initialize the storage backend
s := storage.Init(d)

kubeClient := *acg.kubeClient
kubeClient.Namespace = obj.GetNamespace()

ownerRefClient, err := NewOwnerRefInjectingClient(&kubeClient, acg.restClientGetter.restMapper, obj)
if err != nil {
return nil, fmt.Errorf("could not create owner reference injecting client: %w", err)
}

return &action.Configuration{
RESTClientGetter: acg.restClientGetter.ForNamespace(obj.GetNamespace()),
Releases: s,
KubeClient: ownerRefClient,
Log: acg.debugLog,
}, nil
}

var _ v1.SecretInterface = &ownerRefSecretClient{}

type ownerRefSecretClient struct {
v1.SecretInterface
refs []metav1.OwnerReference
}

func (c *ownerRefSecretClient) Create(ctx context.Context, in *corev1.Secret, opts metav1.CreateOptions) (*corev1.Secret, error) {
in.OwnerReferences = append(in.OwnerReferences, c.refs...)
return c.SecretInterface.Create(ctx, in, opts)
}

func (c *ownerRefSecretClient) Update(ctx context.Context, in *corev1.Secret, opts metav1.UpdateOptions) (*corev1.Secret, error) {
in.OwnerReferences = append(in.OwnerReferences, c.refs...)
return c.SecretInterface.Update(ctx, in, opts)
}
98 changes: 15 additions & 83 deletions internal/helm/client/client.go
Original file line number Diff line number Diff line change
Expand Up @@ -26,106 +26,38 @@ import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/cli-runtime/pkg/genericclioptions"
"k8s.io/cli-runtime/pkg/resource"
"k8s.io/client-go/discovery"
cached "k8s.io/client-go/discovery/cached"
"k8s.io/client-go/rest"
"k8s.io/client-go/tools/clientcmd"
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
"sigs.k8s.io/controller-runtime/pkg/manager"
"sigs.k8s.io/controller-runtime/pkg/client"
)

var _ genericclioptions.RESTClientGetter = &restClientGetter{}

type restClientGetter struct {
restConfig *rest.Config
discoveryClient discovery.CachedDiscoveryInterface
restMapper meta.RESTMapper
namespaceConfig clientcmd.ClientConfig
}

func (c *restClientGetter) ToRESTConfig() (*rest.Config, error) {
return c.restConfig, nil
}

func (c *restClientGetter) ToDiscoveryClient() (discovery.CachedDiscoveryInterface, error) {
return c.discoveryClient, nil
}

func (c *restClientGetter) ToRESTMapper() (meta.RESTMapper, error) {
return c.restMapper, nil
}

func (c *restClientGetter) ToRawKubeConfigLoader() clientcmd.ClientConfig {
return c.namespaceConfig
}

var _ clientcmd.ClientConfig = &namespaceClientConfig{}

type namespaceClientConfig struct {
namespace string
}

func (c namespaceClientConfig) RawConfig() (clientcmdapi.Config, error) {
return clientcmdapi.Config{}, nil
}

func (c namespaceClientConfig) ClientConfig() (*rest.Config, error) {
return nil, nil
}

func (c namespaceClientConfig) Namespace() (string, bool, error) {
return c.namespace, false, nil
}

func (c namespaceClientConfig) ConfigAccess() clientcmd.ConfigAccess {
return nil
}

func NewRESTClientGetter(mgr manager.Manager, ns string) (genericclioptions.RESTClientGetter, error) {
cfg := mgr.GetConfig()
dc, err := discovery.NewDiscoveryClientForConfig(cfg)
if err != nil {
return nil, err
}
cdc := cached.NewMemCacheClient(dc)
rm := mgr.GetRESTMapper()

return &restClientGetter{
restConfig: cfg,
discoveryClient: cdc,
restMapper: rm,
namespaceConfig: &namespaceClientConfig{ns},
}, nil
}

var _ kube.Interface = &ownerRefInjectingClient{}

func NewOwnerRefInjectingClient(base kube.Client, restMapper meta.RESTMapper,
cr *unstructured.Unstructured) (kube.Interface, error) {
func NewOwnerRefInjectingClient(base kube.Interface, restMapper meta.RESTMapper,
obj client.Object) (kube.Interface, error) {

if cr != nil {
if cr.GetObjectKind().GroupVersionKind().Empty() || cr.GetName() == "" || cr.GetUID() == "" {
var err = errors.New("owner resource is invalid")
return nil, err
if obj != nil {
if obj.GetObjectKind() != nil {
if obj.GetObjectKind().GroupVersionKind().Empty() || obj.GetName() == "" || obj.GetUID() == "" {
var err = errors.New("owner resource is invalid")
return nil, err
}
}
}
return &ownerRefInjectingClient{
Client: base,
Interface: base,
restMapper: restMapper,
owner: cr,
owner: obj,
}, nil
}

type ownerRefInjectingClient struct {
kube.Client
kube.Interface
restMapper meta.RESTMapper
owner *unstructured.Unstructured
owner client.Object
}

func (c *ownerRefInjectingClient) Build(reader io.Reader, validate bool) (kube.ResourceList, error) {
resourceList, err := c.Client.Build(reader, validate)
resourceList, err := c.Interface.Build(reader, validate)
if err != nil {
return resourceList, err
}
Expand All @@ -146,7 +78,7 @@ func (c *ownerRefInjectingClient) Build(reader io.Reader, validate bool) (kube.R
// If the resource contains the Helm resource-policy keep annotation, then do not add
// the owner reference. So when the CR is deleted, Kubernetes won't GCs the resource.
if useOwnerRef && !containsResourcePolicyKeep(u.GetAnnotations()) {
ownerRef := metav1.NewControllerRef(c.owner, c.owner.GroupVersionKind())
ownerRef := metav1.NewControllerRef(c.owner, c.owner.GetObjectKind().GroupVersionKind())
u.SetOwnerReferences([]metav1.OwnerReference{*ownerRef})
} else {
err := handler.SetOwnerAnnotations(u, c.owner)
Expand Down
113 changes: 113 additions & 0 deletions internal/helm/client/restclientgetter.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,113 @@
/*
Copyright 2020 The Operator-SDK Authors.

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

package client

import (
"sync"

"k8s.io/apimachinery/pkg/api/meta"
"k8s.io/cli-runtime/pkg/genericclioptions"
"k8s.io/client-go/discovery"
cached "k8s.io/client-go/discovery/cached"
"k8s.io/client-go/rest"
"k8s.io/client-go/tools/clientcmd"
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
)

func newRESTClientGetter(cfg *rest.Config, rm meta.RESTMapper, ns string) *namespacedRCG {
return &namespacedRCG{
restClientGetter: &restClientGetter{
restConfig: cfg,
restMapper: rm,
},
namespaceConfig: namespaceClientConfig{ns},
}
}

type restClientGetter struct {
restConfig *rest.Config
restMapper meta.RESTMapper

setupDiscoveryClient sync.Once
cachedDiscoveryClient discovery.CachedDiscoveryInterface
}

func (c *restClientGetter) ToRESTConfig() (*rest.Config, error) {
return rest.CopyConfig(c.restConfig), nil
}

func (c *restClientGetter) ToDiscoveryClient() (discovery.CachedDiscoveryInterface, error) {
var (
dc discovery.DiscoveryInterface
err error
)
c.setupDiscoveryClient.Do(func() {
dc, err = discovery.NewDiscoveryClientForConfig(c.restConfig)
if err != nil {
return
}
c.cachedDiscoveryClient = cached.NewMemCacheClient(dc)
})
if err != nil {
return nil, err
}
return c.cachedDiscoveryClient, nil
}

func (c *restClientGetter) ToRESTMapper() (meta.RESTMapper, error) {
return c.restMapper, nil
}

func (c *restClientGetter) ForNamespace(ns string) genericclioptions.RESTClientGetter {
return &namespacedRCG{
restClientGetter: c,
namespaceConfig: namespaceClientConfig{namespace: ns},
}
}

var _ genericclioptions.RESTClientGetter = &namespacedRCG{}

type namespacedRCG struct {
*restClientGetter
namespaceConfig namespaceClientConfig
}

func (c *namespacedRCG) ToRawKubeConfigLoader() clientcmd.ClientConfig {
return c.namespaceConfig
}

var _ clientcmd.ClientConfig = &namespaceClientConfig{}

type namespaceClientConfig struct {
namespace string
}

func (c namespaceClientConfig) RawConfig() (clientcmdapi.Config, error) {
return clientcmdapi.Config{}, nil
}

func (c namespaceClientConfig) ClientConfig() (*rest.Config, error) {
return nil, nil
}

func (c namespaceClientConfig) Namespace() (string, bool, error) {
return c.namespace, false, nil
}

func (c namespaceClientConfig) ConfigAccess() clientcmd.ConfigAccess {
return nil
}
Loading