Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Agent gradual #8

Open
wants to merge 34 commits into
base: tmp
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
34 commits
Select commit Hold shift + click to select a range
c162d42
Fix nl monitoring manager
chdxD1 Jul 8, 2024
43288d5
Add show bgp summary and some fixes to monitoring
chdxD1 Jul 10, 2024
ae3762d
Merge pull request #131 from telekom/fix/monitoring-fixes
chdxD1 Jul 10, 2024
28b7eff
Allow import deny for mgmt VRF
chdxD1 Nov 28, 2023
ed43736
Fix missing config
chdxD1 Nov 28, 2023
c61763e
Fix lint
chdxD1 Nov 28, 2023
3053df0
Add permit as last entry to mgmt vrf import route-maps
chdxD1 Jul 8, 2024
c661430
Only pass mgmtVrfName and fix tests
chdxD1 Jul 10, 2024
e5251a4
remove left-over file
chdxD1 Jul 10, 2024
12bdb03
Stable Sort slices that might get populated in a random order
chdxD1 Jul 10, 2024
c1e070d
add fix for route-target in nwop
chdxD1 Jul 10, 2024
eb4cc8f
move complexity to function
chdxD1 Jul 10, 2024
a06b5c6
use 1 for comparison, return original string when only one (or less) …
chdxD1 Jul 10, 2024
f4dfbc2
only swap for mgmt VRF
chdxD1 Jul 11, 2024
1ccefec
Merge pull request #132 from telekom/fix/reload-fixes
chdxD1 Jul 16, 2024
8e730f4
Merge pull request #79 from telekom/feature/mgmt-vrf-imports
chdxD1 Jul 16, 2024
42592e8
Update frr version
Cellebyte Aug 7, 2024
0601e65
Merge pull request #137 from telekom/update/frr
Cellebyte Aug 7, 2024
d195ea7
Make MTU optional for VRFrouteconfiguration
watzkuh Aug 13, 2024
0018df2
Use linkMTU instead of just MTU
watzkuh Aug 15, 2024
9281253
Merge pull request #138 from telekom/optional-mtu
chdxD1 Aug 15, 2024
8e0d22f
FRR introduced a local host-route protocol which is installed by kern…
Cellebyte Sep 9, 2024
ecd86ad
Add config hot-replace feature
chdxD1 Sep 19, 2024
789bcef
pass by pointer instead of by value
chdxD1 Sep 19, 2024
0fd15af
fix shadowing
chdxD1 Sep 19, 2024
480d519
fix shadowing in a different func
chdxD1 Sep 19, 2024
c8f1de6
fix import ordering
chdxD1 Sep 19, 2024
73fdf33
allow regex replace
chdxD1 Sep 20, 2024
1f5aecc
rename fixCfgReplacements to applyCfgReplacements
chdxD1 Sep 20, 2024
28a37d8
Merge pull request #140 from telekom/feature/cfg-hot-replace
chdxD1 Sep 20, 2024
cb8f65a
Added support for gradual rollout
p-strusiewiczsurmacki-mobica Mar 25, 2024
7155b2e
Changed timeout value for not yet provisioned configs and added 0-che…
p-strusiewiczsurmacki-mobica Sep 19, 2024
6ed1c53
Configurable timeout values
p-strusiewiczsurmacki-mobica Sep 19, 2024
3a02edb
Split agent into agent and worker
p-strusiewiczsurmacki-mobica Oct 1, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .golangci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -138,6 +138,9 @@ linters-settings:
disabled: true
funlen:
lines: 65
gosec:
excludes:
- G115

issues:
exclude-rules:
Expand Down
19 changes: 5 additions & 14 deletions Dockerfile
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
# Build the manager binary
FROM docker.io/library/golang:1.21-alpine as builder
FROM docker.io/library/golang:1.21-alpine AS builder


WORKDIR /workspace
Expand All @@ -10,28 +10,19 @@ COPY go.sum go.sum
# and so that source changes don't invalidate our downloaded layer
RUN go mod download

# Build router
RUN apk add llvm clang linux-headers libbpf-dev musl-dev

# Copy the go source
COPY cmd/manager/main.go main.go
COPY cmd/operator/main.go main.go
COPY api/ api/
COPY controllers/ controllers/
COPY pkg/ pkg/

# Build router
COPY bpf/ bpf/
RUN cd pkg/bpf/ && go generate

# Build
RUN CGO_ENABLED=0 GOOS=linux GOARCH=amd64 go build -a -o manager main.go
RUN CGO_ENABLED=0 GOOS=linux GOARCH=amd64 go build -a -o operator main.go

FROM alpine:latest

RUN apk add --no-cache iptables ip6tables

WORKDIR /
COPY --from=builder /workspace/manager .
COPY --from=builder /workspace/operator .
USER 65532:65532

ENTRYPOINT ["/manager"]
ENTRYPOINT ["/operator"]
81 changes: 69 additions & 12 deletions Makefile
Original file line number Diff line number Diff line change
@@ -1,8 +1,12 @@

# Image URL to use all building/pushing image targets
IMG ?= ghcr.io/telekom/das-schiff-network-operator:latest
# Agent image URL to use all building/pushing image targets
AGENT_IMG ?= ghcr.io/telekom/das-schiff-network-operator-agent:latest
# Sidecar image URL to use all building/pushing image targets
SIDECAR_IMG ?= ghcr.io/telekom/frr-exporter:latest
# Operator image URL to use all building/pushing image targets
OPERATOR_IMG ?= ghcr.io/telekom/das-schiff-network-opeator:latest
# Worker image URL to use all building/pushing image targets
WORKER_IMG ?= ghcr.io/telekom/worker:latest
# ENVTEST_K8S_VERSION refers to the version of kubebuilder assets to be downloaded by envtest binary.
ENVTEST_K8S_VERSION = 1.25

Expand Down Expand Up @@ -50,8 +54,13 @@ manifests: controller-gen ## Generate WebhookConfiguration, ClusterRole and Cust
$(CONTROLLER_GEN) rbac:roleName=manager-role crd webhook paths="./..." output:crd:artifacts:config=config/crd/bases

.PHONY: generate
generate: controller-gen bpf-generate ## Generate code containing DeepCopy, DeepCopyInto, and DeepCopyObject method implementations.
generate: controller-gen bpf-generate ## Generate code containing DeepCopy, DeepCopyInto and DeepCopyObject method implementations and GRPC code.
$(CONTROLLER_GEN) object:headerFile="hack/boilerplate.go.txt" paths="./..."
PATH=$(PATH):$(shell pwd)/bin $(PROTOC) --go_out=. --go_opt=paths=source_relative --go-grpc_out=. --go-grpc_opt=paths=source_relative pkg/worker/pb/worker.proto

.PHONY: generate-protobuff
generate-protobuff: protoc ## Generate code containing DeepCopy, DeepCopyInto and DeepCopyObject method implementations.
PATH=$(PATH):$(shell pwd)/bin $(PROTOC) --go_out=. --go_opt=paths=source_relative --go-grpc_out=. --go-grpc_opt=paths=source_relative pkg/worker/pb/worker.proto

.PHONY: fmt
fmt: ## Run go fmt against code.
Expand All @@ -68,33 +77,72 @@ test: manifests generate fmt vet envtest ## Run tests.
##@ Build

.PHONY: build
build: generate fmt vet ## Build manager binary.
go build -o bin/manager cmd/manager/main.go
build: generate fmt vet ## Build agent binary.
go build -o bin/operator cmd/operator/main.go
go build -o bin/agent cmd/agent/main.go
go build -o bin/frr-exporter cmd/frr-exporter/main.go

.PHONY: operator-build
operator-build: generate fmt vet ## Build agent binary.
go build -o bin/operator cmd/operator/main.go

.PHONY: sidecar-build
.PHONY: agent-build
agent-build: generate fmt vet ## Build agent binary.
go build -o bin/agent cmd/agent/main.go

.PHONY: sidecar-build ## Build sidecar (frr-exporter) binary.
sidecar-build: build
go build -o bin/frr-exporter cmd/frr-exporter/main.go

.PHONY: worker-build ## Build worker binary.
agent-build: generate fmt vet
go build -o bin/worker cmd/worker/main.go

.PHONY: run
run: manifests generate fmt vet ## Run a controller from your host.
go run ./cmd/manager/main.go
go run ./cmd/agent/main.go

.PHONY: docker-build
docker-build: test ## Build docker image with the manager.
docker build -t ${IMG} .
docker build -t ${OPERATOR_IMG} .
docker build -t ${AGENT_IMG} -f agent.Dockerfile .
docker build -t ${SIDECAR_IMG} -f frr-exporter.Dockerfile .
docker build -t ${WORKER_IMG} -f worker.Dockerfile .

.PHONY: docker-build-agent
docker-build-agent: test ## Build docker image with the manager.
docker build -t ${AGENT_IMG} -f agent.Dockerfile .

.PHONY: docker-build-sidecar
docker-build-sidecar: test ## Build docker image with the manager.
docker build -t ${SIDECAR_IMG} -f frr-exporter.Dockerfile .

.PHONY: docker-build-operator
docker-build-operator: test ## Build docker image with the manager.
docker build -t ${OPERATOR_IMG} .

.PHONY: docker-build-worker
docker-build-worker: test ## Build docker image with the manager.
docker build -t ${WORKER_IMG} -f worker.Dockerfile .

.PHONY: docker-push
docker-push: ## Push docker image with the manager.
docker push ${IMG}
docker-push: docker-push-agent docker-push-sidecar docker-push-operator

.PHONY: docker-push-agent
docker-push-agent: ## Push docker image with the manager.
docker push ${AGENT_IMG}

.PHONY: docker-push-sidecar
docker-push-sidecar: ## Push docker image with the manager.
docker push ${SIDECAR_IMG}

.PHONY: docker-push-operator
docker-push-operator: ## Push docker image with the manager.
docker push ${OPERATOR_IMG}

.PHONY: docker-push-worker
docker-push-worker: ## Push docker image with the manager.
docker push ${WORKER_IMG}

##@ Release

Expand Down Expand Up @@ -133,8 +181,10 @@ uninstall-certs: manifests kustomize ## Uninstall certs

.PHONY: deploy
deploy: manifests kustomize ## Deploy controller to the K8s cluster specified in ~/.kube/config.
cd config/manager && $(KUSTOMIZE) edit set image controller=${IMG}
cd config/manager && $(KUSTOMIZE) edit set image frr-exporter=${SIDECAR_IMG}
cd config/agent && $(KUSTOMIZE) edit set image agent=${AGENT_IMG}
cd config/agent && $(KUSTOMIZE) edit set image frr-exporter=${SIDECAR_IMG}
cd config/operator && $(KUSTOMIZE) edit set image operator=${OPERATOR_IMG}
cd config/worker && $(KUSTOMIZE) edit set image worker=${WORKER_IMG}
$(KUSTOMIZE) build config/default | kubectl apply -f -

.PHONY: undeploy
Expand Down Expand Up @@ -174,3 +224,10 @@ GOBIN=$(PROJECT_DIR)/bin go install $(2) ;\
rm -rf $$TMP_DIR ;\
}
endef

PROTOC_DIR = $(shell pwd)/bin/protoc
PROTOC = $(shell pwd)/bin/protoc/bin/protoc
.PHONY: protoc
protoc: ## Download controller-gen locally if necessary.
mkdir -p $(PROTOC_DIR) && cd $(PROTOC_DIR) && wget -nc https://github.com/protocolbuffers/protobuf/releases/download/v27.0/protoc-27.0-linux-x86_64.zip 2> /dev/null && unzip -nqq protoc-27.0-linux-x86_64.zip
$(call go-get-tool,$(PROTOC_DIR),google.golang.org/protobuf/cmd/[email protected])
37 changes: 37 additions & 0 deletions agent.Dockerfile
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
# Build the manager binary
FROM docker.io/library/golang:1.21-alpine AS builder


WORKDIR /workspace
# Copy the Go Modules manifests
COPY go.mod go.mod
COPY go.sum go.sum
# cache deps before building and copying source so that we don't need to re-download as much
# and so that source changes don't invalidate our downloaded layer
RUN go mod download

# Build router
RUN apk add llvm clang linux-headers libbpf-dev musl-dev

# Copy the go source
COPY cmd/agent/main.go main.go
COPY api/ api/
COPY controllers/ controllers/
COPY pkg/ pkg/

# Build router
COPY bpf/ bpf/
RUN cd pkg/bpf/ && go generate

# Build
RUN CGO_ENABLED=0 GOOS=linux GOARCH=amd64 go build -a -o agent main.go

FROM alpine:latest

RUN apk add --no-cache iptables ip6tables

WORKDIR /
COPY --from=builder /workspace/agent .
USER 65532:65532

ENTRYPOINT ["/agent"]
102 changes: 102 additions & 0 deletions api/v1alpha1/networkconfigrevision_types.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,102 @@
/*
Copyright 2024.

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

package v1alpha1

import (
"crypto/sha256"
"encoding/hex"
"encoding/json"
"fmt"

metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
)

// NetworkConfigSpec defines the desired state of NetworkConfig.
type NetworkConfigRevisionSpec struct {
// Config stores global configuration of the nodes.
Config NodeNetworkConfigSpec `json:"config"`
// Revision is a hash of the NetworkConfigRevision object that is used to identify the particular revision.
Revision string `json:"revision"`
}

type NetworkConfigRevisionStatus struct {
// IsInvalid determines if NetworkConfigRevision results in misconfigured nodes (invalid configuration).
IsInvalid bool `json:"isInvalid"`
// Ready informs about how many nodes were already provisioned with a config derived from the revision.
Ready int `json:"ready"`
// Ongoing informs about how many nodes are currently provisioned with a config derived from the revision.
Ongoing int `json:"ongoing"`
// Queued informs about how many nodes are currently waiting to be provisiined with a config derived from the revision.
Queued int `json:"queued"`
// Total informs about how many nodes in total can be provisiined with a config derived from the revision.
Total int `json:"total"`
}

//+kubebuilder:object:root=true
//+kubebuilder:subresource:status
//+kubebuilder:resource:shortName=ncr,scope=Cluster
//+kubebuilder:printcolumn:name="Invalid",type=string,JSONPath=`.status.isInvalid`
//+kubebuilder:printcolumn:name="Queued",type="integer",JSONPath=".status.queued"
//+kubebuilder:printcolumn:name="Ongoing",type="integer",JSONPath=".status.ongoing"
//+kubebuilder:printcolumn:name="Ready",type="integer",JSONPath=".status.ready"
//+kubebuilder:printcolumn:name="Total",type="integer",JSONPath=".status.total"
//+kubebuilder:printcolumn:name="Age",type="date",JSONPath=".metadata.creationTimestamp"

// NetworkConfigRevision is the Schema for the node configuration.
type NetworkConfigRevision struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`

Spec NetworkConfigRevisionSpec `json:"spec,omitempty"`
Status NetworkConfigRevisionStatus `json:"status,omitempty"`
}

//+kubebuilder:object:root=true

// NetworkConfigRevisionList contains a list of NetworkConfigRevision.
type NetworkConfigRevisionList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []NetworkConfigRevision `json:"items"`
}

func NewRevision(config *NodeNetworkConfig) (*NetworkConfigRevision, error) {
data, err := json.Marshal(config.Spec)
if err != nil {
return nil, fmt.Errorf("error marshalling data: %w", err)
}

h := sha256.New()
if _, err := h.Write(data); err != nil {
return nil, fmt.Errorf("failed hashing network config: %w", err)
}
hash := h.Sum(nil)
hashHex := hex.EncodeToString(hash)

return &NetworkConfigRevision{
ObjectMeta: metav1.ObjectMeta{Name: hashHex[:10]},
Spec: NetworkConfigRevisionSpec{
Config: config.Spec,
Revision: hashHex,
},
Status: NetworkConfigRevisionStatus{},
}, nil
}

func init() {
SchemeBuilder.Register(&NetworkConfigRevision{}, &NetworkConfigRevisionList{})
}
Loading