Skip to content

Commit a319d43

Browse files
authored
Fix controller generating cilium manifests with registry mirror (#7170)
* generate helm from a factory to load registry mirror configuration from management cluster * move helmfactory to helm package (no other changes) * decoupled executables from helm factory, renamed helm tyoes and got rid of client under pkg/cluster/helm * changes to other files due to change executable builder signature to implement helm executable builder * add helm env client factory implementation for cilium.HelmClientFactory * remove helm.ClientFactory dependency on ops it doesn't need * rename GetClientForCluster -> Get and addressed other PR comments * move WithHelmClientFactory to controller factory and build cilium Templater there and added comments * add generated files * dropping registry client and executableclient interfaces in favor of just client * re-build client only when registry changes * fix linting error * moved WithEnv implementaton details back to executable helm * add new helm executeable unit test * always return new client in helm client factory and add comment to ProxyConfig * refactored ExecutableBuilder -> ClientBuilder * extract code from poluted pkg/helm/factory.go file into client.go and config.go * remove helmClient from struct. not needed to store * referencing implementation instead of interface in factory dependencies * change joinEnv to mergeMap
1 parent 04863f7 commit a319d43

39 files changed

+1355
-239
lines changed

.gitignore

+1
Original file line numberDiff line numberDiff line change
@@ -26,3 +26,4 @@ docs/.hugo_build.lock
2626
*.log
2727
pkg/executables/TestDeployTemplate*
2828
pkg/files/config
29+
config/crd/bases/_.yaml

Makefile

+2
Original file line numberDiff line numberDiff line change
@@ -567,6 +567,8 @@ mocks: ## Generate mocks
567567
${MOCKGEN} -destination=cmd/eksctl-anywhere/cmd/internal/commands/artifacts/mocks/import.go -package=mocks -source "cmd/eksctl-anywhere/cmd/internal/commands/artifacts/import.go"
568568
${MOCKGEN} -destination=cmd/eksctl-anywhere/cmd/internal/commands/artifacts/mocks/import_tools_image.go -package=mocks -source "cmd/eksctl-anywhere/cmd/internal/commands/artifacts/import_tools_image.go"
569569
${MOCKGEN} -destination=pkg/helm/mocks/download.go -package=mocks -source "pkg/helm/download.go"
570+
${MOCKGEN} -destination=pkg/helm/mocks/factory.go -package=mocks -source "pkg/helm/factory.go"
571+
${MOCKGEN} -destination=pkg/helm/mocks/client.go -package=mocks -source "pkg/helm/client.go"
570572
${MOCKGEN} -destination=pkg/aws/mocks/ec2.go -package=mocks -source "pkg/aws/ec2.go"
571573
${MOCKGEN} -destination=pkg/aws/mocks/imds.go -package=mocks -source "pkg/aws/imds.go"
572574
${MOCKGEN} -destination=pkg/aws/mocks/snowballdevice.go -package=mocks -source "pkg/aws/snowballdevice.go"

cmd/eksctl-anywhere/cmd/common.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ import (
55

66
"github.com/aws/eks-anywhere/pkg/cluster"
77
"github.com/aws/eks-anywhere/pkg/dependencies"
8-
"github.com/aws/eks-anywhere/pkg/executables"
98
"github.com/aws/eks-anywhere/pkg/files"
9+
"github.com/aws/eks-anywhere/pkg/helm"
1010
"github.com/aws/eks-anywhere/pkg/kubeconfig"
1111
"github.com/aws/eks-anywhere/pkg/manifests/bundles"
1212
"github.com/aws/eks-anywhere/pkg/version"
@@ -56,7 +56,7 @@ func NewDependenciesForPackages(ctx context.Context, opts ...PackageOpt) (*depen
5656
WithExecutableBuilder().
5757
WithManifestReader().
5858
WithKubectl().
59-
WithHelm(executables.WithInsecure()).
59+
WithHelm(helm.WithInsecure()).
6060
WithCuratedPackagesRegistry(config.registryName, config.kubeVersion, version.Get()).
6161
WithPackageControllerClient(config.spec, config.kubeConfig).
6262
WithLogger().

cmd/eksctl-anywhere/cmd/deprecated_importimages.go

+4-3
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ import (
2222

2323
"github.com/aws/eks-anywhere/pkg/constants"
2424
"github.com/aws/eks-anywhere/pkg/executables"
25+
"github.com/aws/eks-anywhere/pkg/helm"
2526
"github.com/aws/eks-anywhere/pkg/logger"
2627
"github.com/aws/eks-anywhere/pkg/networkutils"
2728
"github.com/aws/eks-anywhere/pkg/registrymirror"
@@ -82,7 +83,7 @@ func importImages(ctx context.Context, clusterSpecPath string) error {
8283
return fmt.Errorf("unable to initialize executables: %v", err)
8384
}
8485
defer closer.CheckErr(ctx)
85-
helmExecutable := executableBuilder.BuildHelmExecutable(executables.WithInsecure())
86+
helmExecutable := executableBuilder.BuildHelmExecutable(helm.WithInsecure())
8687

8788
if clusterSpec.Cluster.Spec.RegistryMirrorConfiguration == nil || clusterSpec.Cluster.Spec.RegistryMirrorConfiguration.Endpoint == "" {
8889
return fmt.Errorf("endpoint not set. It is necessary to define a valid endpoint in your spec (registryMirrorConfiguration.endpoint)")
@@ -123,7 +124,7 @@ func importImage(ctx context.Context, docker *executables.Docker, image string,
123124
return docker.PushImage(ctx, image, endpoint)
124125
}
125126

126-
func importCharts(ctx context.Context, helm *executables.Helm, charts map[string]*v1alpha1.Image, endpoint, username, password string) error {
127+
func importCharts(ctx context.Context, helm helm.Client, charts map[string]*v1alpha1.Image, endpoint, username, password string) error {
127128
if err := helm.RegistryLogin(ctx, endpoint, username, password); err != nil {
128129
return err
129130
}
@@ -135,7 +136,7 @@ func importCharts(ctx context.Context, helm *executables.Helm, charts map[string
135136
return nil
136137
}
137138

138-
func importChart(ctx context.Context, helm *executables.Helm, chart v1alpha1.Image, endpoint string) error {
139+
func importChart(ctx context.Context, helm helm.Client, chart v1alpha1.Image, endpoint string) error {
139140
uri, chartVersion := getChartUriAndVersion(chart)
140141
if err := helm.PullChart(ctx, uri, chartVersion); err != nil {
141142
return err

cmd/eksctl-anywhere/cmd/downloadimages.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -58,9 +58,9 @@ type downloadImagesCommand struct {
5858

5959
func (c downloadImagesCommand) Run(ctx context.Context) error {
6060
factory := dependencies.NewFactory()
61-
helmOpts := []executables.HelmOpt{}
61+
helmOpts := []helm.Opt{}
6262
if c.insecure {
63-
helmOpts = append(helmOpts, executables.WithInsecure())
63+
helmOpts = append(helmOpts, helm.WithInsecure())
6464
}
6565
deps, err := factory.
6666
WithFileReader().

cmd/eksctl-anywhere/cmd/import_images.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -108,9 +108,9 @@ func (c ImportImagesCommand) Call(ctx context.Context) error {
108108
return err
109109
}
110110

111-
helmOpts := []executables.HelmOpt{}
111+
helmOpts := []helm.Opt{}
112112
if c.insecure {
113-
helmOpts = append(helmOpts, executables.WithInsecure())
113+
helmOpts = append(helmOpts, helm.WithInsecure())
114114
}
115115

116116
deps, err = factory.

config/crd/bases/anywhere.eks.amazonaws.com_clusters.yaml

+4
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,8 @@ spec:
6666
in the cluster
6767
properties:
6868
cilium:
69+
description: CiliumConfig contains configuration specific
70+
to the Cilium CNI.
6971
properties:
7072
egressMasqueradeInterfaces:
7173
description: EgressMasquaradeInterfaces determines which
@@ -107,6 +109,8 @@ spec:
107109
type: boolean
108110
type: object
109111
kindnetd:
112+
description: KindnetdConfig contains configuration specific
113+
to the Kindnetd CNI.
110114
type: object
111115
type: object
112116
dns:

config/crd/bases/anywhere.eks.amazonaws.com_nodeupgrades.yaml

+2
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,8 @@ spec:
4646
nodes and ignored for worker nodes.
4747
type: boolean
4848
kubernetesVersion:
49+
description: 'TODO(in-place): Determine if there''s a way to get these
50+
dynamically instead of expecting it from the CRD.'
4951
type: string
5052
machine:
5153
description: Machine is a reference to the CAPI Machine that needs

controllers/factory.go

+38-2
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ import (
2020
"github.com/aws/eks-anywhere/pkg/dependencies"
2121
"github.com/aws/eks-anywhere/pkg/executables"
2222
"github.com/aws/eks-anywhere/pkg/executables/cmk"
23+
"github.com/aws/eks-anywhere/pkg/helm"
24+
"github.com/aws/eks-anywhere/pkg/networking/cilium"
2325
ciliumreconciler "github.com/aws/eks-anywhere/pkg/networking/cilium/reconciler"
2426
cnireconciler "github.com/aws/eks-anywhere/pkg/networking/reconciler"
2527
"github.com/aws/eks-anywhere/pkg/providers/cloudstack"
@@ -56,6 +58,8 @@ type Factory struct {
5658
deps *dependencies.Dependencies
5759
packageControllerClient *curatedpackages.PackageControllerClient
5860
cloudStackValidatorRegistry cloudstack.ValidatorRegistry
61+
ciliumTemplater *cilium.Templater
62+
helmClientFactory cilium.HelmClientFactory
5963
}
6064

6165
type Reconcilers struct {
@@ -465,15 +469,47 @@ func (f *Factory) withCloudStackValidatorRegistry() *Factory {
465469
return f
466470
}
467471

472+
// withHelmClientFactory configures the HelmClientFactory dependency with a helm.ClientFactory.
473+
func (f *Factory) withHelmClientFactory() *Factory {
474+
f.dependencyFactory.WithExecutableBuilder()
475+
476+
f.buildSteps = append(f.buildSteps, func(ctx context.Context) error {
477+
if f.helmClientFactory != nil {
478+
return nil
479+
}
480+
481+
f.helmClientFactory = helm.NewClientForClusterFactory(f.manager.GetClient(), f.deps.ExecutableBuilder)
482+
return nil
483+
})
484+
485+
return f
486+
}
487+
488+
func (f *Factory) withCiliumTemplater() *Factory {
489+
f.withHelmClientFactory()
490+
491+
f.buildSteps = append(f.buildSteps, func(ctx context.Context) error {
492+
if f.ciliumTemplater != nil {
493+
return nil
494+
}
495+
496+
f.ciliumTemplater = cilium.NewTemplater(f.helmClientFactory)
497+
498+
return nil
499+
})
500+
501+
return f
502+
}
503+
468504
func (f *Factory) withCNIReconciler() *Factory {
469-
f.dependencyFactory.WithCiliumTemplater()
505+
f.withCiliumTemplater()
470506

471507
f.buildSteps = append(f.buildSteps, func(ctx context.Context) error {
472508
if f.cniReconciler != nil {
473509
return nil
474510
}
475511

476-
f.cniReconciler = cnireconciler.New(ciliumreconciler.New(f.deps.CiliumTemplater))
512+
f.cniReconciler = cnireconciler.New(ciliumreconciler.New(f.ciliumTemplater))
477513

478514
return nil
479515
})

internal/test/cluster.go

+9
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ package test
33
import (
44
"embed"
55
"fmt"
6+
"net"
67
"path/filepath"
78
"runtime"
89
"testing"
@@ -145,3 +146,11 @@ func EksdReleaseFromTestData(t *testing.T) *eksdv1alpha1.Release {
145146
func SetTag(image *releasev1alpha1.Image, tag string) {
146147
image.URI = fmt.Sprintf("%s:%s", image.Image(), tag)
147148
}
149+
150+
// RegistryMirrorEndpoint returns the address of the registry mirror configured on the Cluster if any. Just the host and the port.
151+
func RegistryMirrorEndpoint(cluster *v1alpha1.Cluster) string {
152+
if cluster.Spec.RegistryMirrorConfiguration != nil {
153+
return net.JoinHostPort(cluster.Spec.RegistryMirrorConfiguration.Endpoint, cluster.Spec.RegistryMirrorConfiguration.Port)
154+
}
155+
return ""
156+
}

pkg/cluster/mocks/helm.go

+64
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

pkg/curatedpackages/customregistry.go

+5-4
Original file line numberDiff line numberDiff line change
@@ -4,17 +4,18 @@ import (
44
"context"
55
"fmt"
66

7-
"github.com/aws/eks-anywhere/pkg/executables"
7+
"github.com/aws/eks-anywhere/pkg/helm"
88
)
99

1010
type CustomRegistry struct {
11-
*executables.Helm
11+
helm.Client
1212
registry string
1313
}
1414

15-
func NewCustomRegistry(helm *executables.Helm, registry string) *CustomRegistry {
15+
// NewCustomRegistry returns a new CustomRegistry.
16+
func NewCustomRegistry(helm helm.Client, registry string) *CustomRegistry {
1617
return &CustomRegistry{
17-
Helm: helm,
18+
Client: helm,
1819
registry: registry,
1920
}
2021
}

0 commit comments

Comments
 (0)