mirror of
https://github.com/fluxcd/flagger.git
synced 2026-02-14 18:10:00 +00:00
Fix #1386 Signed-off-by: jonny.langefeld <jonnylangefeld@gmail.com> Signed-off-by: Jonny Langefeld <jonnylangefeld@gmail.com> Signed-off-by: Sanskar Jaiswal <jaiswalsanskar078@gmail.com>
485 lines
14 KiB
Go
485 lines
14 KiB
Go
/*
|
|
Copyright 2020 The Flux authors
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package router
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/google/go-cmp/cmp"
|
|
"github.com/google/go-cmp/cmp/cmpopts"
|
|
"go.uber.org/zap"
|
|
"k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
"k8s.io/client-go/kubernetes"
|
|
|
|
flaggerv1 "github.com/fluxcd/flagger/pkg/apis/flagger/v1beta1"
|
|
contourv1 "github.com/fluxcd/flagger/pkg/apis/projectcontour/v1"
|
|
clientset "github.com/fluxcd/flagger/pkg/client/clientset/versioned"
|
|
)
|
|
|
|
// ContourRouter is managing HTTPProxy objects
|
|
type ContourRouter struct {
|
|
kubeClient kubernetes.Interface
|
|
contourClient clientset.Interface
|
|
flaggerClient clientset.Interface
|
|
logger *zap.SugaredLogger
|
|
ingressClass string
|
|
setOwnerRefs bool
|
|
}
|
|
|
|
// Reconcile creates or updates the HTTP proxy
|
|
func (cr *ContourRouter) Reconcile(canary *flaggerv1.Canary) error {
|
|
const annotation = "projectcontour.io/ingress.class"
|
|
|
|
apexName, primaryName, canaryName := canary.GetServiceNames()
|
|
|
|
newSpec := contourv1.HTTPProxySpec{
|
|
Routes: []contourv1.Route{
|
|
{
|
|
Conditions: []contourv1.MatchCondition{
|
|
{
|
|
Prefix: cr.makePrefix(canary),
|
|
},
|
|
},
|
|
TimeoutPolicy: cr.makeTimeoutPolicy(canary),
|
|
RetryPolicy: cr.makeRetryPolicy(canary),
|
|
Services: []contourv1.Service{
|
|
{
|
|
Name: primaryName,
|
|
Port: int(canary.Spec.Service.Port),
|
|
Weight: int64(100),
|
|
RequestHeadersPolicy: &contourv1.HeadersPolicy{
|
|
Set: []contourv1.HeaderValue{
|
|
cr.makeLinkerdHeaderValue(canary, primaryName),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: canaryName,
|
|
Port: int(canary.Spec.Service.Port),
|
|
Weight: int64(0),
|
|
RequestHeadersPolicy: &contourv1.HeadersPolicy{
|
|
Set: []contourv1.HeaderValue{
|
|
cr.makeLinkerdHeaderValue(canary, canaryName),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
if len(canary.GetAnalysis().Match) > 0 {
|
|
newSpec = contourv1.HTTPProxySpec{
|
|
Routes: []contourv1.Route{
|
|
{
|
|
Conditions: cr.makeConditions(canary),
|
|
TimeoutPolicy: cr.makeTimeoutPolicy(canary),
|
|
RetryPolicy: cr.makeRetryPolicy(canary),
|
|
Services: []contourv1.Service{
|
|
{
|
|
Name: primaryName,
|
|
Port: int(canary.Spec.Service.Port),
|
|
Weight: int64(100),
|
|
RequestHeadersPolicy: &contourv1.HeadersPolicy{
|
|
Set: []contourv1.HeaderValue{
|
|
cr.makeLinkerdHeaderValue(canary, primaryName),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: canaryName,
|
|
Port: int(canary.Spec.Service.Port),
|
|
Weight: int64(0),
|
|
RequestHeadersPolicy: &contourv1.HeadersPolicy{
|
|
Set: []contourv1.HeaderValue{
|
|
cr.makeLinkerdHeaderValue(canary, canaryName),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Conditions: []contourv1.MatchCondition{
|
|
{
|
|
Prefix: cr.makePrefix(canary),
|
|
},
|
|
},
|
|
TimeoutPolicy: cr.makeTimeoutPolicy(canary),
|
|
RetryPolicy: cr.makeRetryPolicy(canary),
|
|
Services: []contourv1.Service{
|
|
{
|
|
Name: primaryName,
|
|
Port: int(canary.Spec.Service.Port),
|
|
Weight: int64(100),
|
|
RequestHeadersPolicy: &contourv1.HeadersPolicy{
|
|
Set: []contourv1.HeaderValue{
|
|
cr.makeLinkerdHeaderValue(canary, primaryName),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: canaryName,
|
|
Port: int(canary.Spec.Service.Port),
|
|
Weight: int64(0),
|
|
RequestHeadersPolicy: &contourv1.HeadersPolicy{
|
|
Set: []contourv1.HeaderValue{
|
|
cr.makeLinkerdHeaderValue(canary, canaryName),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
newMetadata := canary.Spec.Service.Apex
|
|
if newMetadata == nil {
|
|
newMetadata = &flaggerv1.CustomMetadata{}
|
|
}
|
|
if newMetadata.Labels == nil {
|
|
newMetadata.Labels = make(map[string]string)
|
|
}
|
|
if newMetadata.Annotations == nil {
|
|
newMetadata.Annotations = make(map[string]string)
|
|
}
|
|
newMetadata.Annotations = filterMetadata(newMetadata.Annotations)
|
|
|
|
proxy, err := cr.contourClient.ProjectcontourV1().HTTPProxies(canary.Namespace).Get(context.TODO(), apexName, metav1.GetOptions{})
|
|
if errors.IsNotFound(err) {
|
|
proxy = &contourv1.HTTPProxy{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: apexName,
|
|
Namespace: canary.Namespace,
|
|
Labels: newMetadata.Labels,
|
|
Annotations: newMetadata.Annotations,
|
|
},
|
|
Spec: newSpec,
|
|
Status: contourv1.HTTPProxyStatus{
|
|
CurrentStatus: "valid",
|
|
Description: "valid HTTPProxy",
|
|
},
|
|
}
|
|
if cr.setOwnerRefs {
|
|
proxy.OwnerReferences = []metav1.OwnerReference{
|
|
*metav1.NewControllerRef(canary, schema.GroupVersionKind{
|
|
Group: flaggerv1.SchemeGroupVersion.Group,
|
|
Version: flaggerv1.SchemeGroupVersion.Version,
|
|
Kind: flaggerv1.CanaryKind,
|
|
}),
|
|
}
|
|
}
|
|
|
|
if cr.ingressClass != "" {
|
|
if proxy.Annotations == nil {
|
|
proxy.Annotations = make(map[string]string)
|
|
}
|
|
proxy.Annotations[annotation] = cr.ingressClass
|
|
}
|
|
|
|
_, err = cr.contourClient.ProjectcontourV1().HTTPProxies(canary.Namespace).Create(context.TODO(), proxy, metav1.CreateOptions{})
|
|
if err != nil {
|
|
return fmt.Errorf("HTTPProxy %s.%s create error: %w", apexName, canary.Namespace, err)
|
|
}
|
|
cr.logger.With("canary", fmt.Sprintf("%s.%s", canary.Name, canary.Namespace)).
|
|
Infof("HTTPProxy %s.%s created", proxy.GetName(), canary.Namespace)
|
|
return nil
|
|
} else if err != nil {
|
|
return fmt.Errorf("HTTPProxy %s.%s get query error: %w", apexName, canary.Namespace, err)
|
|
}
|
|
|
|
// update HTTPProxy but keep the original destination weights
|
|
if proxy != nil {
|
|
specDiff := cmp.Diff(
|
|
newSpec,
|
|
proxy.Spec,
|
|
cmpopts.IgnoreFields(contourv1.Service{}, "Weight"),
|
|
)
|
|
labelsDiff := cmp.Diff(newMetadata.Labels, proxy.Labels, cmpopts.EquateEmpty())
|
|
annotationsDiff := cmp.Diff(newMetadata.Annotations, proxy.Annotations, cmpopts.EquateEmpty())
|
|
if specDiff != "" || labelsDiff != "" || annotationsDiff != "" {
|
|
clone := proxy.DeepCopy()
|
|
clone.Spec = newSpec
|
|
clone.ObjectMeta.Annotations = newMetadata.Annotations
|
|
clone.ObjectMeta.Labels = newMetadata.Labels
|
|
|
|
_, err = cr.contourClient.ProjectcontourV1().HTTPProxies(canary.Namespace).Update(context.TODO(), clone, metav1.UpdateOptions{})
|
|
if err != nil {
|
|
return fmt.Errorf("HTTPProxy %s.%s update error: %w", apexName, canary.Namespace, err)
|
|
}
|
|
cr.logger.With("canary", fmt.Sprintf("%s.%s", canary.Name, canary.Namespace)).
|
|
Infof("HTTPProxy %s.%s updated", proxy.GetName(), canary.Namespace)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// GetRoutes returns the service weight for primary and canary
|
|
func (cr *ContourRouter) GetRoutes(canary *flaggerv1.Canary) (
|
|
primaryWeight int,
|
|
canaryWeight int,
|
|
mirrored bool,
|
|
err error,
|
|
) {
|
|
apexName, primaryName, _ := canary.GetServiceNames()
|
|
|
|
proxy, err := cr.contourClient.ProjectcontourV1().HTTPProxies(canary.Namespace).Get(context.TODO(), apexName, metav1.GetOptions{})
|
|
if err != nil {
|
|
err = fmt.Errorf("HTTPProxy %s.%s get query error %w", apexName, canary.Namespace, err)
|
|
return
|
|
}
|
|
|
|
if len(proxy.Spec.Routes) < 1 || len(proxy.Spec.Routes[0].Services) < 2 {
|
|
err = fmt.Errorf("HTTPProxy %s.%s services not found", apexName, canary.Namespace)
|
|
return
|
|
}
|
|
|
|
for _, dst := range proxy.Spec.Routes[0].Services {
|
|
if dst.Name == primaryName {
|
|
primaryWeight = int(dst.Weight)
|
|
canaryWeight = 100 - primaryWeight
|
|
return
|
|
}
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
// SetRoutes updates the service weight for primary and canary
|
|
func (cr *ContourRouter) SetRoutes(
|
|
canary *flaggerv1.Canary,
|
|
primaryWeight int,
|
|
canaryWeight int,
|
|
_ bool,
|
|
) error {
|
|
apexName, primaryName, canaryName := canary.GetServiceNames()
|
|
|
|
if primaryWeight == 0 && canaryWeight == 0 {
|
|
return fmt.Errorf("HTTPProxy %s.%s update failed: no valid weights", apexName, canary.Namespace)
|
|
}
|
|
|
|
proxy, err := cr.contourClient.ProjectcontourV1().HTTPProxies(canary.Namespace).Get(context.TODO(), apexName, metav1.GetOptions{})
|
|
if err != nil {
|
|
return fmt.Errorf("HTTPProxy %s.%s query error: %w", apexName, canary.Namespace, err)
|
|
}
|
|
|
|
proxy.Spec = contourv1.HTTPProxySpec{
|
|
Routes: []contourv1.Route{
|
|
{
|
|
Conditions: []contourv1.MatchCondition{
|
|
{
|
|
Prefix: cr.makePrefix(canary),
|
|
},
|
|
},
|
|
TimeoutPolicy: cr.makeTimeoutPolicy(canary),
|
|
RetryPolicy: cr.makeRetryPolicy(canary),
|
|
Services: []contourv1.Service{
|
|
{
|
|
Name: primaryName,
|
|
Port: int(canary.Spec.Service.Port),
|
|
Weight: int64(primaryWeight),
|
|
RequestHeadersPolicy: &contourv1.HeadersPolicy{
|
|
Set: []contourv1.HeaderValue{
|
|
cr.makeLinkerdHeaderValue(canary, primaryName),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: canaryName,
|
|
Port: int(canary.Spec.Service.Port),
|
|
Weight: int64(canaryWeight),
|
|
RequestHeadersPolicy: &contourv1.HeadersPolicy{
|
|
Set: []contourv1.HeaderValue{
|
|
cr.makeLinkerdHeaderValue(canary, canaryName),
|
|
},
|
|
},
|
|
},
|
|
}},
|
|
},
|
|
}
|
|
|
|
if len(canary.GetAnalysis().Match) > 0 {
|
|
proxy.Spec = contourv1.HTTPProxySpec{
|
|
Routes: []contourv1.Route{
|
|
{
|
|
Conditions: cr.makeConditions(canary),
|
|
TimeoutPolicy: cr.makeTimeoutPolicy(canary),
|
|
RetryPolicy: cr.makeRetryPolicy(canary),
|
|
Services: []contourv1.Service{
|
|
{
|
|
Name: primaryName,
|
|
Port: int(canary.Spec.Service.Port),
|
|
Weight: int64(primaryWeight),
|
|
RequestHeadersPolicy: &contourv1.HeadersPolicy{
|
|
Set: []contourv1.HeaderValue{
|
|
cr.makeLinkerdHeaderValue(canary, primaryName),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: canaryName,
|
|
Port: int(canary.Spec.Service.Port),
|
|
Weight: int64(canaryWeight),
|
|
RequestHeadersPolicy: &contourv1.HeadersPolicy{
|
|
Set: []contourv1.HeaderValue{
|
|
cr.makeLinkerdHeaderValue(canary, canaryName),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Conditions: []contourv1.MatchCondition{
|
|
{
|
|
Prefix: cr.makePrefix(canary),
|
|
},
|
|
},
|
|
TimeoutPolicy: cr.makeTimeoutPolicy(canary),
|
|
RetryPolicy: cr.makeRetryPolicy(canary),
|
|
Services: []contourv1.Service{
|
|
{
|
|
Name: primaryName,
|
|
Port: int(canary.Spec.Service.Port),
|
|
Weight: int64(100),
|
|
RequestHeadersPolicy: &contourv1.HeadersPolicy{
|
|
Set: []contourv1.HeaderValue{
|
|
cr.makeLinkerdHeaderValue(canary, primaryName),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: canaryName,
|
|
Port: int(canary.Spec.Service.Port),
|
|
Weight: int64(0),
|
|
RequestHeadersPolicy: &contourv1.HeadersPolicy{
|
|
Set: []contourv1.HeaderValue{
|
|
cr.makeLinkerdHeaderValue(canary, canaryName),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
_, err = cr.contourClient.ProjectcontourV1().HTTPProxies(canary.Namespace).Update(context.TODO(), proxy, metav1.UpdateOptions{})
|
|
if err != nil {
|
|
return fmt.Errorf("HTTPProxy %s.%s update error: %w", apexName, canary.Namespace, err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (cr *ContourRouter) makePrefix(canary *flaggerv1.Canary) string {
|
|
prefix := "/"
|
|
|
|
if len(canary.Spec.Service.Match) > 0 &&
|
|
canary.Spec.Service.Match[0].Uri != nil &&
|
|
canary.Spec.Service.Match[0].Uri.Prefix != "" {
|
|
prefix = canary.Spec.Service.Match[0].Uri.Prefix
|
|
}
|
|
|
|
return prefix
|
|
}
|
|
|
|
func (cr *ContourRouter) makeConditions(canary *flaggerv1.Canary) []contourv1.MatchCondition {
|
|
list := []contourv1.MatchCondition{}
|
|
|
|
if len(canary.GetAnalysis().Match) > 0 {
|
|
for _, match := range canary.GetAnalysis().Match {
|
|
for s, stringMatch := range match.Headers {
|
|
h := &contourv1.HeaderMatchCondition{
|
|
Name: s,
|
|
Exact: stringMatch.Exact,
|
|
}
|
|
if stringMatch.Suffix != "" {
|
|
h = &contourv1.HeaderMatchCondition{
|
|
Name: s,
|
|
Contains: stringMatch.Suffix,
|
|
}
|
|
}
|
|
if stringMatch.Prefix != "" {
|
|
h = &contourv1.HeaderMatchCondition{
|
|
Name: s,
|
|
Contains: stringMatch.Prefix,
|
|
}
|
|
}
|
|
list = append(list, contourv1.MatchCondition{
|
|
Prefix: cr.makePrefix(canary),
|
|
Header: h,
|
|
})
|
|
}
|
|
}
|
|
} else {
|
|
list = []contourv1.MatchCondition{
|
|
{
|
|
Prefix: cr.makePrefix(canary),
|
|
},
|
|
}
|
|
}
|
|
|
|
return list
|
|
}
|
|
|
|
func (cr *ContourRouter) makeTimeoutPolicy(canary *flaggerv1.Canary) *contourv1.TimeoutPolicy {
|
|
if canary.Spec.Service.Timeout != "" {
|
|
return &contourv1.TimeoutPolicy{
|
|
Response: canary.Spec.Service.Timeout,
|
|
Idle: "5m",
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (cr *ContourRouter) makeRetryPolicy(canary *flaggerv1.Canary) *contourv1.RetryPolicy {
|
|
if canary.Spec.Service.Retries != nil {
|
|
return &contourv1.RetryPolicy{
|
|
NumRetries: int64(canary.Spec.Service.Retries.Attempts),
|
|
PerTryTimeout: canary.Spec.Service.Retries.PerTryTimeout,
|
|
RetryOn: makeRetryOn(canary.Spec.Service.Retries.RetryOn),
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func makeRetryOn(retryOnString string) []contourv1.RetryOn {
|
|
retryOnSplit := strings.Split(retryOnString, ",")
|
|
|
|
retryOn := make([]contourv1.RetryOn, len(retryOnSplit))
|
|
for i, v := range retryOnSplit {
|
|
retryOn[i] = contourv1.RetryOn(v)
|
|
}
|
|
return retryOn
|
|
}
|
|
|
|
func (cr *ContourRouter) makeLinkerdHeaderValue(canary *flaggerv1.Canary, serviceName string) contourv1.HeaderValue {
|
|
return contourv1.HeaderValue{
|
|
Name: "l5d-dst-override",
|
|
Value: fmt.Sprintf("%s.%s.svc.cluster.local:%v", serviceName, canary.Namespace, canary.Spec.Service.Port),
|
|
}
|
|
|
|
}
|
|
|
|
func (cr *ContourRouter) Finalize(_ *flaggerv1.Canary) error {
|
|
return nil
|
|
}
|