-
Notifications
You must be signed in to change notification settings - Fork 47
OCPBUGS-58102: Expose ExternalDNS operand metrics via kube-rbac-proxy sidecar #371
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
40d5e9e
5be458d
7dd3f1c
a3a9474
8848be6
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -77,6 +77,7 @@ var sourceStringTable = map[operatorv1beta1.ExternalDNSSourceType]string{ | |
| type deploymentConfig struct { | ||
| namespace string | ||
| image string | ||
| kubeRBACProxyImage string | ||
| serviceAccount *corev1.ServiceAccount | ||
| externalDNS *operatorv1beta1.ExternalDNS | ||
| isOpenShift bool | ||
|
|
@@ -89,7 +90,7 @@ type deploymentConfig struct { | |
|
|
||
| // ensureExternalDNSDeployment ensures that the externalDNS deployment exists. | ||
| // Returns a Boolean value indicating whether the deployment exists, a pointer to the deployment, and an error when relevant. | ||
| func (r *reconciler) ensureExternalDNSDeployment(ctx context.Context, namespace, image string, serviceAccount *corev1.ServiceAccount, credSecret *corev1.Secret, trustCAConfigMap *corev1.ConfigMap, externalDNS *operatorv1beta1.ExternalDNS) (bool, *appsv1.Deployment, error) { | ||
| func (r *reconciler) ensureExternalDNSDeployment(ctx context.Context, namespace, image, kubeRBACProxyImage string, serviceAccount *corev1.ServiceAccount, credSecret *corev1.Secret, trustCAConfigMap *corev1.ConfigMap, externalDNS *operatorv1beta1.ExternalDNS) (bool, *appsv1.Deployment, error) { | ||
| nsName := types.NamespacedName{Namespace: namespace, Name: controller.ExternalDNSResourceName(externalDNS)} | ||
|
|
||
| // build credentials secret's hash | ||
|
|
@@ -109,16 +110,17 @@ func (r *reconciler) ensureExternalDNSDeployment(ctx context.Context, namespace, | |
| } | ||
|
|
||
| desired, err := desiredExternalDNSDeployment(&deploymentConfig{ | ||
| namespace, | ||
| image, | ||
| serviceAccount, | ||
| externalDNS, | ||
| r.config.IsOpenShift, | ||
| r.config.PlatformStatus, | ||
| credSecret.Name, | ||
| credSecretHash, | ||
| trustCAConfigMapName, | ||
| trustCAConfigMapHash, | ||
| namespace: namespace, | ||
| image: image, | ||
| kubeRBACProxyImage: kubeRBACProxyImage, | ||
| serviceAccount: serviceAccount, | ||
| externalDNS: externalDNS, | ||
| isOpenShift: r.config.IsOpenShift, | ||
| platformStatus: r.config.PlatformStatus, | ||
| secret: credSecret.Name, | ||
| secretHash: credSecretHash, | ||
| trustedCAConfigMapName: trustCAConfigMapName, | ||
| trustedCAConfigMapHash: trustCAConfigMapHash, | ||
| }) | ||
| if err != nil { | ||
| return false, nil, fmt.Errorf("failed to build externalDNS deployment: %w", err) | ||
|
|
@@ -296,6 +298,15 @@ func desiredExternalDNSDeployment(cfg *deploymentConfig) (*appsv1.Deployment, er | |
| depl.Spec.Template.Spec.Containers = append(depl.Spec.Template.Spec.Containers, *container) | ||
| } | ||
| } | ||
| if cfg.kubeRBACProxyImage != "" { | ||
| for i := 0; i < cbld.counter; i++ { | ||
| proxyContainer := kubeRBACProxyContainer(cfg.kubeRBACProxyImage, i) | ||
| depl.Spec.Template.Spec.Containers = append(depl.Spec.Template.Spec.Containers, proxyContainer) | ||
| } | ||
| certVolume := metricsCertVolume(controller.ExternalDNSMetricsSecretName(cfg.externalDNS)) | ||
| depl.Spec.Template.Spec.Volumes = append(depl.Spec.Template.Spec.Volumes, certVolume) | ||
| } | ||
|
Comment on lines
+301
to
+308
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Fail fast when the proxy image is unset. Lines 301-307 silently skip the kube-rbac-proxy sidecars, but the reconcile path now always creates the metrics Proposed fix- if cfg.kubeRBACProxyImage != "" {
- for i := 0; i < cbld.counter; i++ {
- proxyContainer := kubeRBACProxyContainer(cfg.kubeRBACProxyImage, i)
- depl.Spec.Template.Spec.Containers = append(depl.Spec.Template.Spec.Containers, proxyContainer)
- }
- certVolume := metricsCertVolume(controller.ExternalDNSMetricsSecretName(cfg.externalDNS))
- depl.Spec.Template.Spec.Volumes = append(depl.Spec.Template.Spec.Volumes, certVolume)
- }
+ if cfg.kubeRBACProxyImage == "" {
+ return nil, fmt.Errorf("kube-rbac-proxy image must be configured")
+ }
+ for i := 0; i < cbld.counter; i++ {
+ proxyContainer := kubeRBACProxyContainer(cfg.kubeRBACProxyImage, i)
+ depl.Spec.Template.Spec.Containers = append(depl.Spec.Template.Spec.Containers, proxyContainer)
+ }
+ certVolume := metricsCertVolume(controller.ExternalDNSMetricsSecretName(cfg.externalDNS))
+ depl.Spec.Template.Spec.Volumes = append(depl.Spec.Template.Spec.Volumes, certVolume)🤖 Prompt for AI Agents |
||
|
|
||
| return depl, nil | ||
| } | ||
|
|
||
|
|
@@ -418,6 +429,10 @@ func externalDNSContainersChanged(current, expected, updated *appsv1.Deployment) | |
| updated.Spec.Template.Spec.Containers[currCont.Index].SecurityContext = updatedContext | ||
| changed = true | ||
| } | ||
| if !equalContainerPorts(currCont.Ports, expCont.Ports) { | ||
| updated.Spec.Template.Spec.Containers[currCont.Index].Ports = expCont.Ports | ||
| changed = true | ||
| } | ||
| } else { | ||
| // expected container is not present - add it | ||
| updated.Spec.Template.Spec.Containers = append(updated.Spec.Template.Spec.Containers, expCont.Container) | ||
|
|
@@ -701,6 +716,27 @@ func securityContextChanged(current, updated, desired *corev1.SecurityContext) ( | |
| return changed, updated | ||
| } | ||
|
|
||
| // equalContainerPorts returns true if 2 container port slices have the same content. | ||
| func equalContainerPorts(current, expected []corev1.ContainerPort) bool { | ||
| if len(current) != len(expected) { | ||
| return false | ||
| } | ||
| currentMap := map[string]corev1.ContainerPort{} | ||
| for _, p := range current { | ||
| currentMap[p.Name] = p | ||
| } | ||
| for _, ep := range expected { | ||
| cp, found := currentMap[ep.Name] | ||
| if !found { | ||
| return false | ||
| } | ||
| if cp.ContainerPort != ep.ContainerPort || cp.Protocol != ep.Protocol { | ||
| return false | ||
| } | ||
| } | ||
| return true | ||
| } | ||
|
|
||
| func equalBoolPtr(current, desired *bool) bool { | ||
| if desired == nil { | ||
| return true | ||
|
|
||
Uh oh!
There was an error while loading. Please reload this page.