Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

✨ Add fake K8s API server #1610

Merged
merged 1 commit into from
Oct 17, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ updates:
- "/"
- "/api"
- "/hack/tools"
- "/hack/fake-apiserver"
- "/test"
schedule:
interval: "weekly"
Expand Down
25 changes: 25 additions & 0 deletions .github/workflows/build-fkas-images-action.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
name: build-fkas-images-action

on:
push:
branches:
- 'main'
paths:
- 'hack/fake-apiserver/**'

permissions:
contents: read

jobs:
build_FKAS:
name: Build Metal3-FKAS image
if: github.repository == 'metal3-io/cluster-api-provider-metal3'
uses: metal3-io/project-infra/.github/workflows/container-image-build.yml@main
with:
image-name: "metal3-fkas"
pushImage: true
dockerfile-directory: hack/fake-apiserver
secrets:
QUAY_USERNAME: ${{ secrets.QUAY_USERNAME }}
QUAY_PASSWORD: ${{ secrets.QUAY_PASSWORD }}
SLACK_WEBHOOK: ${{ secrets.SLACK_WEBHOOK }}
14 changes: 13 additions & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,7 @@ APIS_DIR := api
TEST_DIR := test
BIN_DIR := bin
TOOLS_BIN_DIR := $(abspath $(TOOLS_DIR)/$(BIN_DIR))
FAKE_APISERVER_DIR := hack/fake-apiserver

# Set --output-base for conversion-gen if we are not within GOPATH
ifneq ($(abspath $(ROOT_DIR)),$(shell $(GO) env GOPATH)/src/github.com/metal3-io/cluster-api-provider-metal3)
Expand Down Expand Up @@ -349,6 +350,8 @@ modules: ## Runs go mod to ensure proper vendoring.
cd $(APIS_DIR) && $(GO) mod verify
cd $(TEST_DIR) && $(GO) mod tidy
cd $(TEST_DIR) && $(GO) mod verify
cd $(FAKE_APISERVER_DIR) && $(GO) mod tidy
cd $(FAKE_APISERVER_DIR) && $(GO) mod verify
mquhuy marked this conversation as resolved.
Show resolved Hide resolved

.PHONY: generate
generate: ## Generate code
Expand Down Expand Up @@ -449,6 +452,14 @@ docker-build: ## Build the docker image for controller-manager
docker-push: ## Push the docker image
docker push $(CONTROLLER_IMG)-$(ARCH):$(TAG)

.PHONY: build-fkas
# Allow overriding this by setting CONTAINER_RUNTIME var
CONTAINER_RUNTIME := $(if $(CONTAINER_RUNTIME),$(CONTAINER_RUNTIME),docker)
export CONTAINER_RUNTIME

build-fkas:
cd $(FAKE_APISERVER_DIR) && $(CONTAINER_RUNTIME) build --build-arg ARCH=$(ARCH) -t "quay.io/metal3-io/metal3-fkas:latest" .

## --------------------------------------
## Docker — All ARCH
## --------------------------------------
Expand Down Expand Up @@ -656,7 +667,8 @@ verify-boilerplate:

.PHONY: verify-modules
verify-modules: modules
@if !(git diff --quiet HEAD -- go.sum go.mod hack/tools/go.mod hack/tools/go.sum); then \
@if !(git diff --quiet HEAD -- go.sum go.mod hack/tools/go.mod hack/tools/go.sum \
hack/fake-apiserver/go.mod hack/fake-apiserver/go.sum); then \
echo "go module files are out of date"; exit 1; \
fi

Expand Down
4 changes: 2 additions & 2 deletions docs/releasing.md
Original file line number Diff line number Diff line change
Expand Up @@ -98,8 +98,8 @@ This triggers two things:

We also need to create one or more tags for the Go modules ecosystem:

- For any subdirectory with `go.mod` in it (excluding `hack/tools`), create
another Git tag with directory prefix, ie.
- For any subdirectory with `go.mod` in it (excluding `hack/tools` and
`hack/fake-apiserver`), create another Git tag with directory prefix, ie.
`git tag api/v1.x.y` and `git tag test/v1.x.y`. This enables the
tags to be used as a Go module version for any downstream users.

Expand Down
65 changes: 65 additions & 0 deletions hack/fake-apiserver/Dockerfile
Original file line number Diff line number Diff line change
@@ -0,0 +1,65 @@
# Copyright 2024 The Kubernetes Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

# Support FROM override
ARG BUILD_IMAGE=docker.io/golang:1.22.7@sha256:192683db8982323952988c7b86c098ee7ecc6cbeb202bf7c113ff9be5358367c
ARG BASE_IMAGE=gcr.io/distroless/static:nonroot@sha256:9ecc53c269509f63c69a266168e4a687c7eb8c0cfd753bd8bfcaa4f58a90876f

# Build the fkas binary on golang image
FROM $BUILD_IMAGE AS base
WORKDIR /workspace

# Run this with docker build --build_arg $(go env GOPROXY) to override the goproxy
ARG goproxy=https://proxy.golang.org
ENV GOPROXY=$goproxy

# Copy the Go Modules manifests
COPY go.mod go.sum ./

# Cache deps before building and copying source so that we don't need to re-download as much
# and so that source changes don't invalidate our downloaded layer
RUN go mod download

# Build Fkas
FROM base AS build-fkas

# Copy the sources
COPY cmd/metal3-fkas/*.go ./

# Build
ARG ARCH=amd64
RUN CGO_ENABLED=0 GOOS=linux GOARCH=${ARCH} \
go build -a -ldflags '-extldflags "-static"' \
-o fkas .

# Build fkas-reconciler
FROM base AS build-fkas-reconciler

# Copy the sources
COPY cmd/metal3-fkas-reconciler/*.go ./

# Build
ARG ARCH=amd64
RUN CGO_ENABLED=0 GOOS=linux GOARCH=${ARCH} \
go build -a -ldflags '-extldflags "-static"' \
-o reconciler .

# Copy the controller-manager into a thin image
FROM $BASE_IMAGE
WORKDIR /
# Use uid of nonroot user (65532) because kubernetes expects numeric user when applying pod security policies
COPY --from=build-fkas /workspace/fkas .
COPY --from=build-fkas-reconciler /workspace/reconciler .
USER 65532
ENTRYPOINT ["/fkas"]
183 changes: 183 additions & 0 deletions hack/fake-apiserver/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,183 @@
# Metal3 Fake Kubernetes API server system (Metal3-FKAS)

## FKAS

Metal3-FKAS is a tool for testing CAPI-related projects.
When being asked, it generates new fake kubernetes api endpoint, that responds
mboukhalfa marked this conversation as resolved.
Show resolved Hide resolved
to all typical requests that CAPI sends to a newly provisioned cluster.

Despite being developed for Metal3 ecosystem, FKAS is provider-free. It can be adopted
mboukhalfa marked this conversation as resolved.
Show resolved Hide resolved
and used by any CAPI provider with intention to test the provider provisioning ability,
without using real nodes.

### Purpose

After a CAPI Infrastructure provisions a new cluster, CAPI will send queries
towards the newly launched cluster's API server to verify that the cluster is
fully up and running.

In a simulated provisioning process, there are no real nodes, hence we cannot
have an actual API server running inside the node. Booting up a real kubelet
and etcd servers elsewhere is possible, but these processes are likely to consume
a lot of resources.

FKAS is useful in this situation. When a request is sent towards `/register` endpoint,
it will spawn a new simulated kubernetes API server with *unique* a host and
port pair.
User can, then, inject the address into cluster template consumed by
CAPI with any infra provider.

### How to use

You can build the `metal3-fkas` image that is suitable for
your local environment with

```shell
make build-fkas
```

The result is an image with label `quay.io/metal3-io/metal3-fkas:<your-arch-name>`

Alternatively, you can also build a custom image with

```shell
cd hack/fake-apiserver
docker build -t <custom tag> .
```

For local tests, it's normally needed to load the image into the cluster.
For e.g. with `minikube`

```shell
minikube image load quay.io/metal3-io/metal3-fkas:latest
```

Now you can deploy this container to the cluster, for e.g. with the deployment
if k8s/metal3-fkas.yaml

```shell
kubectl apply -f metal3-fkas.yaml
```

After building the container image and deploy it to the bootstrap kubernetes cluster,
you need to create a tunnel to send request to it and get response, by using
a LoadBalancer, or a simple port-forward

```shell
fkas_pod_name=$(kubectl get pods -n default -l app=metal3-fkas-system -o jsonpath='{.items[0].metadata.name}')
kubectl port-forward pod/${fkas_pod_name} 3333:3333 2>/dev/null&
```

Now, you can generate a fake API server endpoint by sending
a POST request to the fake API server.

```shell
namespace=<cluster-namespace>
cluster_name=<cluster-name>

cluster_endpoint=$(curl -X POST "localhost:3333/register" \
-H "Content-Type: application/json" -d '{
"cluster": "'$cluster_name'",
"namespace": "'$namespace'"
}')
```

The fake API server will return a response with the ip and port of the newly
generated api server. For example:

```json
{
"Resource": "metal3/test1",
"Host": "10.244.0.83",
"Port": 20000
}
```

A new cluster can be provisioned by injecting the host and port we
got from FKAS to the cluster template provided by a CAPI infrastructure
provider. For e.g., with CAPM3 that can be done as followed:

```shell
host=$(echo ${cluster_endpoints} | jq -r ".Host")
port=$(echo ${cluster_endpoints} | jq -r ".Port")

# Injecting the new api address into the cluster template by
# exporting these env vars
export CLUSTER_APIENDPOINT_HOST="${host}"
export CLUSTER_APIENDPOINT_PORT="${port}"

clusterctl generate cluster "${cluster}" \
--from "${CLUSTER_TEMPLATE}" \
--target-namespace "${namespace}" > /tmp/${cluster}-cluster.yaml
kubectl apply -f /tmp/${cluster}-cluster.yaml
```

After the cluster is created, CAPI will expect that information like node name
and provider ID is registered in the API server. Since our API server doesn't
live inside the node, we will need to feed the info to it, by sending a
PUT request to `/updateNode` endpoint:

```shell
curl -X PUT "localhost:3333/updateNode" -H "Content-Type: application/json" -d '{
"cluster": "<cluster-name>",
"namespace": "<namespace>",
"nodeName": "<machine-object-name>",
"providerID": "<provider-id>",
"uuid": "<node-uuid>",
"labels": "<node-labels>",
"k8sversion": "<k8s-version-of-workload-cluster>"
}'
```

### Acknowledgements

This was developed thanks to the implementation of
[Cluster API Provider In Memory (CAPIM)](https://github.com/kubernetes-sigs/cluster-api/tree/main/test/infrastructure/inmemory).

## Metal3 FKAS System

### FKAS in Metal3

In metal3 ecosystem, currently we have two ways of simulating a workflow without
using any baremetal or virtual machines:

- [FakeIPA container](https://github.com/metal3-io/utility-images/tree/main/fake-ipa)
- BMO simulation mode

In both of these cases, the "nodes" are not able to boot up any kubernetes api server,
hence the needs of having mock API servers on-demands.

Similar to the general case, after having BMHs provisioned to `available` state,
the user can send a request towards the Fake API server endpoint `/register`,
which will spawn a new API server, with an unique `Host` and `Port` pair.

User can, then, use this IP address to feed the cluster template, by exporting
`CLUSTER_APIENDPOINT_HOST` and `CLUSTER_APIENDPOINT_PORT` variables.

There is no need of manually check and send node info to `/updateNode`, as we have
another tool to automate that part.

### Metal3-FKAS-Reconciler

This tool runs as a side-car container alongside FKAS, and works specifically
for Metal3. It eliminates the needs of user to manually fetch the nodes information
and send to `/updateNode` (as described earlier), by constantly watch the changes
in BMH objects, notice if a BMH is being provisioned to a kubernetes node, and
send request to `/updateNode` with appropriate information.

If you want to use *Metal3-FKAS* with another CAPI provider, you can also implement
your own reconciler, based on implementation of *metal3-fkas-reconciler*.

### Deployment

The `metal3-fkas-system` deployment (including `metal3-fkas` and `metal3-fkas-reconciler`)
can be deployed with the `k8s/metal3-fkas-system.yaml` file.

```shell
kubectl apply -f k8s/metal3-fkas-system.yaml
```

## Disclaimer

This is intended for development environments only.
Do **NOT** use it in production.
Loading
Loading