-
Notifications
You must be signed in to change notification settings - Fork 9
/
ingress.go
135 lines (115 loc) · 4.07 KB
/
ingress.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
// Copyright 2022 Namespace Labs Inc; All rights reserved.
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
package kubernetes
import (
"context"
"fmt"
"io"
"k8s.io/apimachinery/pkg/runtime/schema"
"namespacelabs.dev/foundation/framework/kubernetes/kubedef"
"namespacelabs.dev/foundation/internal/console"
"namespacelabs.dev/foundation/internal/networking/ingress"
"namespacelabs.dev/foundation/internal/planning/constants"
"namespacelabs.dev/foundation/internal/runtime"
"namespacelabs.dev/foundation/internal/runtime/kubernetes/kubeobserver"
fnschema "namespacelabs.dev/foundation/schema"
"namespacelabs.dev/foundation/std/execution/defs"
)
func IngressOwnedBy(allFragments []*fnschema.IngressFragment, srv fnschema.PackageName) []*fnschema.IngressFragment {
var frags []*fnschema.IngressFragment
for _, fr := range allFragments {
if srv.Equals(fr.Owner) {
frags = append(frags, fr)
}
}
return frags
}
func planIngress(ctx context.Context, ingressPlanner kubedef.IngressClass, r BoundNamespace, stack *fnschema.Stack, allFragments []*fnschema.IngressFragment) (*runtime.DeploymentPlan, error) {
var state runtime.DeploymentPlan
for _, srv := range stack.Entry {
frags := IngressOwnedBy(allFragments, srv.GetPackageName())
if len(frags) == 0 {
continue
}
defs, err := ingress.PlanIngress(ctx, ingressPlanner, r.namespace, r.env, srv, frags)
if err != nil {
return nil, err
}
for _, apply := range defs {
def, err := apply.ToDefinition(srv.GetPackageName())
if err != nil {
return nil, err
}
state.Definitions = append(state.Definitions, def)
}
}
// On ephemeral environments, e.g. tests, we don't wait for an
// ingress controller to be present, before installing ingress
// objects. This is because we sometimes run in environments where
// there's no controller installed (e.g. in ephemeral nscloud
// clusters). And tests don't (yet) exercise ingress objects.
if len(state.Definitions) > 0 && !r.env.Ephemeral {
var d defs.DefList
d.AddExt("Ensure Ingress Controller", &kubedef.OpEnsureIngressController{
IngressClass: ingressPlanner.Name(),
},
defs.Category(ingress.IngressControllerCat),
// Lets make sure that we verify the controller after deployments and services are in place.
defs.DependsOn(kubedef.MakeSchedCat(schema.GroupKind{Kind: "Service"})),
// OpEnsureIngressController was introduced in orchestrator 11.
defs.MinimumVersion(11))
if serialized, err := d.Serialize(); err != nil {
return nil, err
} else {
state.Definitions = append(state.Definitions, serialized...)
}
}
return &state, nil
}
func (r *Cluster) ForwardIngress(ctx context.Context, localAddrs []string, localPort int, notify runtime.PortForwardedFunc) (io.Closer, error) {
ingress, err := ClusterIngress(r)
if err != nil {
return nil, err
}
svc := ingress.Service()
if svc == nil || svc.InClusterController == nil {
return nil, nil
}
obj := svc.InClusterController
ctxWithCancel, cancel := context.WithCancel(ctx)
obs := kubeobserver.NewPodObserver(ctxWithCancel, r.cli, obj.GetNamespace(), svc.PodSelector)
go func() {
if err := r.StartAndBlockPortFwd(ctxWithCancel, StartAndBlockPortFwdArgs{
Namespace: obj.GetNamespace(),
Identifier: "ingress",
LocalAddrs: localAddrs,
LocalPort: localPort,
ContainerPort: svc.ContainerPort,
PodResolver: obs,
ReportPorts: func(p runtime.ForwardedPort) {
notify(runtime.ForwardedPortEvent{
Added: []runtime.ForwardedPort{{
LocalPort: p.LocalPort,
ContainerPort: p.ContainerPort,
}},
Endpoint: &fnschema.Endpoint{
ServiceName: constants.IngressServiceName,
ServiceMetadata: []*fnschema.ServiceMetadata{{
Protocol: "http",
Kind: constants.IngressServiceKind,
}},
},
})
},
}); err != nil {
fmt.Fprintf(console.Errors(ctx), "ingress forwarding failed: %v\n", err)
}
}()
return closerCallback(cancel), nil
}
type closerCallback func()
func (c closerCallback) Close() error {
c()
return nil
}