wip: nats multi cluster, fixing helm command to follow multiple k8s config by providing the helm command from the topology itself, fix cli_logger that can now be initialized multiple times, some more stuff
This commit is contained in:
@@ -3,15 +3,27 @@ use std::str::FromStr;
|
|||||||
use harmony::{
|
use harmony::{
|
||||||
inventory::Inventory,
|
inventory::Inventory,
|
||||||
modules::helm::chart::{HelmChartScore, HelmRepository, NonBlankString},
|
modules::helm::chart::{HelmChartScore, HelmRepository, NonBlankString},
|
||||||
topology::K8sAnywhereTopology,
|
topology::{HelmCommand, K8sAnywhereConfig, K8sAnywhereTopology, TlsRouter, Topology},
|
||||||
};
|
};
|
||||||
use harmony_macros::hurl;
|
use harmony_macros::hurl;
|
||||||
use log::info;
|
use log::info;
|
||||||
|
|
||||||
#[tokio::main]
|
#[tokio::main]
|
||||||
async fn main() {
|
async fn main() {
|
||||||
// env_logger::init();
|
deploy_nats(K8sAnywhereTopology::with_config(
|
||||||
let values_yaml = Some(
|
K8sAnywhereConfig::remote_k8s_from_env_var("HARMONY_NATS_SITE_1"),
|
||||||
|
))
|
||||||
|
.await;
|
||||||
|
deploy_nats(K8sAnywhereTopology::with_config(
|
||||||
|
K8sAnywhereConfig::remote_k8s_from_env_var("HARMONY_NATS_SITE_2"),
|
||||||
|
))
|
||||||
|
.await;
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn deploy_nats<T: Topology + HelmCommand + TlsRouter + 'static>(topology: T) {
|
||||||
|
topology.ensure_ready().await.unwrap();
|
||||||
|
|
||||||
|
let values_yaml = Some(format!(
|
||||||
r#"config:
|
r#"config:
|
||||||
cluster:
|
cluster:
|
||||||
enabled: true
|
enabled: true
|
||||||
@@ -27,10 +39,12 @@ async fn main() {
|
|||||||
# port: 7422
|
# port: 7422
|
||||||
websocket:
|
websocket:
|
||||||
enabled: true
|
enabled: true
|
||||||
ingress:
|
ingress:
|
||||||
enabled: true
|
enabled: true
|
||||||
hosts:
|
className: openshift-default
|
||||||
- nats-demo.sto1.nationtech.io
|
pathType: Prefix
|
||||||
|
hosts:
|
||||||
|
- nats-ws.{}
|
||||||
gateway:
|
gateway:
|
||||||
enabled: false
|
enabled: false
|
||||||
# name: my-gateway
|
# name: my-gateway
|
||||||
@@ -38,9 +52,9 @@ async fn main() {
|
|||||||
natsBox:
|
natsBox:
|
||||||
container:
|
container:
|
||||||
image:
|
image:
|
||||||
tag: nonroot"#
|
tag: nonroot"#,
|
||||||
.to_string(),
|
topology.get_internal_domain().await.unwrap().unwrap(),
|
||||||
);
|
));
|
||||||
let namespace = "nats";
|
let namespace = "nats";
|
||||||
let nats = HelmChartScore {
|
let nats = HelmChartScore {
|
||||||
namespace: Some(NonBlankString::from_str(namespace).unwrap()),
|
namespace: Some(NonBlankString::from_str(namespace).unwrap()),
|
||||||
@@ -58,14 +72,9 @@ natsBox:
|
|||||||
)),
|
)),
|
||||||
};
|
};
|
||||||
|
|
||||||
harmony_cli::run(
|
harmony_cli::run(Inventory::autoload(), topology, vec![Box::new(nats)], None)
|
||||||
Inventory::autoload(),
|
.await
|
||||||
K8sAnywhereTopology::from_env(),
|
.unwrap();
|
||||||
vec![Box::new(nats)],
|
|
||||||
None,
|
|
||||||
)
|
|
||||||
.await
|
|
||||||
.unwrap();
|
|
||||||
|
|
||||||
info!(
|
info!(
|
||||||
"Enjoy! You can test your nats cluster by running : `kubectl exec -n {namespace} -it deployment/nats-box -- nats pub test hi`"
|
"Enjoy! You can test your nats cluster by running : `kubectl exec -n {namespace} -it deployment/nats-box -- nats pub test hi`"
|
||||||
|
|||||||
@@ -1 +1,5 @@
|
|||||||
pub trait HelmCommand {}
|
use std::process::Command;
|
||||||
|
|
||||||
|
pub trait HelmCommand {
|
||||||
|
fn get_helm_command(&self) -> Command;
|
||||||
|
}
|
||||||
|
|||||||
@@ -35,6 +35,7 @@ use crate::{
|
|||||||
service_monitor::ServiceMonitor,
|
service_monitor::ServiceMonitor,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
okd::crd::ingresses_config::Ingress as IngressResource,
|
||||||
okd::route::OKDTlsPassthroughScore,
|
okd::route::OKDTlsPassthroughScore,
|
||||||
prometheus::{
|
prometheus::{
|
||||||
k8s_prometheus_alerting_score::K8sPrometheusCRDAlertingScore,
|
k8s_prometheus_alerting_score::K8sPrometheusCRDAlertingScore,
|
||||||
@@ -107,8 +108,32 @@ impl K8sclient for K8sAnywhereTopology {
|
|||||||
|
|
||||||
#[async_trait]
|
#[async_trait]
|
||||||
impl TlsRouter for K8sAnywhereTopology {
|
impl TlsRouter for K8sAnywhereTopology {
|
||||||
async fn get_wildcard_domain(&self) -> Result<Option<String>, String> {
|
async fn get_internal_domain(&self) -> Result<Option<String>, String> {
|
||||||
todo!()
|
match self.get_k8s_distribution().await.map_err(|e| {
|
||||||
|
format!(
|
||||||
|
"Could not get internal domain, error getting k8s distribution : {}",
|
||||||
|
e.to_string()
|
||||||
|
)
|
||||||
|
})? {
|
||||||
|
KubernetesDistribution::OpenshiftFamily => {
|
||||||
|
let client = self.k8s_client().await?;
|
||||||
|
if let Some(ingress_config) = client
|
||||||
|
.get_resource::<IngressResource>("cluster", None)
|
||||||
|
.await
|
||||||
|
.map_err(|e| {
|
||||||
|
format!("Error attempting to get ingress config : {}", e.to_string())
|
||||||
|
})?
|
||||||
|
{
|
||||||
|
debug!("Found ingress config {:?}", ingress_config.spec);
|
||||||
|
Ok(ingress_config.spec.domain.clone())
|
||||||
|
} else {
|
||||||
|
warn!("Could not find a domain configured in this cluster");
|
||||||
|
Ok(None)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
KubernetesDistribution::K3sFamily => todo!(),
|
||||||
|
KubernetesDistribution::Default => todo!(),
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Returns the port that this router exposes externally.
|
/// Returns the port that this router exposes externally.
|
||||||
|
|||||||
@@ -112,12 +112,13 @@ pub trait TlsRouter: Send + Sync {
|
|||||||
/// HAProxy frontend→backend \"postgres-upstream\".
|
/// HAProxy frontend→backend \"postgres-upstream\".
|
||||||
async fn install_route(&self, config: TlsRoute) -> Result<(), String>;
|
async fn install_route(&self, config: TlsRoute) -> Result<(), String>;
|
||||||
|
|
||||||
/// Gets the base domain that can be used to deploy applications that will be automatically
|
/// Gets the base domain of this cluster. On openshift family clusters, this is the domain
|
||||||
/// routed to this cluster.
|
/// used by default for all components, including the default ingress controller that
|
||||||
|
/// transforms ingress to routes.
|
||||||
///
|
///
|
||||||
/// For example, if we have *.apps.nationtech.io pointing to a public load balancer, then this
|
/// For example, get_internal_domain on a cluster that has `console-openshift-console.apps.mycluster.something`
|
||||||
/// function would install route apps.nationtech.io
|
/// will return `apps.mycluster.something`
|
||||||
async fn get_wildcard_domain(&self) -> Result<Option<String>, String>;
|
async fn get_internal_domain(&self) -> Result<Option<String>, String>;
|
||||||
|
|
||||||
/// Returns the port that this router exposes externally.
|
/// Returns the port that this router exposes externally.
|
||||||
async fn get_router_port(&self) -> u16;
|
async fn get_router_port(&self) -> u16;
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ use crate::topology::{FailoverTopology, TlsRoute, TlsRouter};
|
|||||||
|
|
||||||
#[async_trait]
|
#[async_trait]
|
||||||
impl<T: TlsRouter> TlsRouter for FailoverTopology<T> {
|
impl<T: TlsRouter> TlsRouter for FailoverTopology<T> {
|
||||||
async fn get_wildcard_domain(&self) -> Result<Option<String>, String> {
|
async fn get_internal_domain(&self) -> Result<Option<String>, String> {
|
||||||
todo!()
|
todo!()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
214
harmony/src/modules/okd/crd/ingresses_config.rs
Normal file
214
harmony/src/modules/okd/crd/ingresses_config.rs
Normal file
@@ -0,0 +1,214 @@
|
|||||||
|
use k8s_openapi::apimachinery::pkg::apis::meta::v1::{ListMeta, ObjectMeta};
|
||||||
|
use k8s_openapi::{ClusterResourceScope, Resource};
|
||||||
|
use serde::{Deserialize, Serialize};
|
||||||
|
|
||||||
|
#[derive(Deserialize, Serialize, Clone, Debug)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct Ingress {
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub api_version: Option<String>,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub kind: Option<String>,
|
||||||
|
pub metadata: ObjectMeta,
|
||||||
|
|
||||||
|
pub spec: IngressSpec,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub status: Option<IngressStatus>,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Resource for Ingress {
|
||||||
|
const API_VERSION: &'static str = "config.openshift.io/v1";
|
||||||
|
const GROUP: &'static str = "config.openshift.io";
|
||||||
|
const VERSION: &'static str = "v1";
|
||||||
|
const KIND: &'static str = "Ingress";
|
||||||
|
const URL_PATH_SEGMENT: &'static str = "ingresses";
|
||||||
|
type Scope = ClusterResourceScope;
|
||||||
|
}
|
||||||
|
|
||||||
|
impl k8s_openapi::Metadata for Ingress {
|
||||||
|
type Ty = ObjectMeta;
|
||||||
|
|
||||||
|
fn metadata(&self) -> &Self::Ty {
|
||||||
|
&self.metadata
|
||||||
|
}
|
||||||
|
|
||||||
|
fn metadata_mut(&mut self) -> &mut Self::Ty {
|
||||||
|
&mut self.metadata
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Default for Ingress {
|
||||||
|
fn default() -> Self {
|
||||||
|
Ingress {
|
||||||
|
api_version: Some("config.openshift.io/v1".to_string()),
|
||||||
|
kind: Some("Ingress".to_string()),
|
||||||
|
metadata: ObjectMeta::default(),
|
||||||
|
spec: IngressSpec::default(),
|
||||||
|
status: None,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Deserialize, Serialize, Clone, Debug)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct IngressList {
|
||||||
|
pub metadata: ListMeta,
|
||||||
|
pub items: Vec<Ingress>,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Default for IngressList {
|
||||||
|
fn default() -> Self {
|
||||||
|
Self {
|
||||||
|
metadata: ListMeta::default(),
|
||||||
|
items: Vec::new(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Resource for IngressList {
|
||||||
|
const API_VERSION: &'static str = "config.openshift.io/v1";
|
||||||
|
const GROUP: &'static str = "config.openshift.io";
|
||||||
|
const VERSION: &'static str = "v1";
|
||||||
|
const KIND: &'static str = "IngressList";
|
||||||
|
const URL_PATH_SEGMENT: &'static str = "ingresses";
|
||||||
|
type Scope = ClusterResourceScope;
|
||||||
|
}
|
||||||
|
|
||||||
|
impl k8s_openapi::Metadata for IngressList {
|
||||||
|
type Ty = ListMeta;
|
||||||
|
|
||||||
|
fn metadata(&self) -> &Self::Ty {
|
||||||
|
&self.metadata
|
||||||
|
}
|
||||||
|
|
||||||
|
fn metadata_mut(&mut self) -> &mut Self::Ty {
|
||||||
|
&mut self.metadata
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Deserialize, Serialize, Clone, Debug, Default)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct IngressSpec {
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub apps_domain: Option<String>,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub component_routes: Option<Vec<ComponentRouteSpec>>,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub domain: Option<String>,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub load_balancer: Option<LoadBalancer>,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub required_hsts_policies: Option<Vec<RequiredHSTSPolicy>>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Deserialize, Serialize, Clone, Debug)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct ComponentRouteSpec {
|
||||||
|
pub hostname: String,
|
||||||
|
pub name: String,
|
||||||
|
pub namespace: String,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub serving_cert_key_pair_secret: Option<SecretNameReference>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Deserialize, Serialize, Clone, Debug)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct SecretNameReference {
|
||||||
|
pub name: String,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Deserialize, Serialize, Clone, Debug, Default)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct LoadBalancer {
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub platform: Option<IngressPlatform>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Deserialize, Serialize, Clone, Debug, Default)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct IngressPlatform {
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub aws: Option<AWSPlatformLoadBalancer>,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub r#type: Option<String>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Deserialize, Serialize, Clone, Debug)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct AWSPlatformLoadBalancer {
|
||||||
|
pub r#type: String,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Deserialize, Serialize, Clone, Debug)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct RequiredHSTSPolicy {
|
||||||
|
pub domain_patterns: Vec<String>,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub include_sub_domains_policy: Option<String>,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub max_age: Option<MaxAgePolicy>,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub namespace_selector: Option<k8s_openapi::apimachinery::pkg::apis::meta::v1::LabelSelector>,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub preload_policy: Option<String>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Deserialize, Serialize, Clone, Debug, Default)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct MaxAgePolicy {
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub largest_max_age: Option<i32>,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub smallest_max_age: Option<i32>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Deserialize, Serialize, Clone, Debug, Default)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct IngressStatus {
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub component_routes: Option<Vec<ComponentRouteStatus>>,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub default_placement: Option<String>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Deserialize, Serialize, Clone, Debug)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct ComponentRouteStatus {
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub conditions: Option<Vec<k8s_openapi::apimachinery::pkg::apis::meta::v1::Condition>>,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub consuming_users: Option<Vec<String>>,
|
||||||
|
|
||||||
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
|
pub current_hostnames: Option<Vec<String>>,
|
||||||
|
|
||||||
|
pub default_hostname: String,
|
||||||
|
pub name: String,
|
||||||
|
pub namespace: String,
|
||||||
|
pub related_objects: Vec<ObjectReference>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Deserialize, Serialize, Clone, Debug)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct ObjectReference {
|
||||||
|
pub group: String,
|
||||||
|
pub name: String,
|
||||||
|
pub namespace: String,
|
||||||
|
pub resource: String,
|
||||||
|
}
|
||||||
|
|
||||||
@@ -1,2 +1,3 @@
|
|||||||
pub mod nmstate;
|
pub mod nmstate;
|
||||||
pub mod route;
|
pub mod route;
|
||||||
|
pub mod ingresses_config;
|
||||||
|
|||||||
@@ -1,5 +1,4 @@
|
|||||||
use k8s_openapi::apimachinery::pkg::apis::meta::v1::{ListMeta, ObjectMeta, Time};
|
use k8s_openapi::apimachinery::pkg::apis::meta::v1::{ListMeta, ObjectMeta, Time};
|
||||||
use k8s_openapi::apimachinery::pkg::util::intstr::IntOrString;
|
|
||||||
use k8s_openapi::{NamespaceResourceScope, Resource};
|
use k8s_openapi::{NamespaceResourceScope, Resource};
|
||||||
use serde::{Deserialize, Serialize};
|
use serde::{Deserialize, Serialize};
|
||||||
|
|
||||||
|
|||||||
@@ -7,11 +7,14 @@ use harmony::{
|
|||||||
};
|
};
|
||||||
use log::{error, info, log_enabled};
|
use log::{error, info, log_enabled};
|
||||||
use std::io::Write;
|
use std::io::Write;
|
||||||
use std::sync::Mutex;
|
use std::sync::{Mutex, OnceLock};
|
||||||
|
|
||||||
pub fn init() {
|
pub fn init() {
|
||||||
configure_logger();
|
static INITIALIZED: OnceLock<()> = OnceLock::new();
|
||||||
handle_events();
|
INITIALIZED.get_or_init(|| {
|
||||||
|
configure_logger();
|
||||||
|
handle_events();
|
||||||
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
fn configure_logger() {
|
fn configure_logger() {
|
||||||
|
|||||||
Reference in New Issue
Block a user