• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

zalando-incubator / stackset-controller / 8738031909

19 Mar 2024 06:41PM UTC coverage: 51.212% (-0.9%) from 52.101%
8738031909

Pull #593

github

linki
some labels
Pull Request #593: [2/3] Add Inline Solution for ConfigMaps

5 of 143 new or added lines in 5 files covered. (3.5%)

766 existing lines in 14 files now uncovered.

3084 of 6022 relevant lines covered (51.21%)

0.58 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

0.0
/cmd/stackset-controller/main.go
1
package main
2

3
import (
4
        "context"
5
        "fmt"
6
        "net"
7
        "net/http"
8
        "net/url"
9
        "os"
10
        "os/signal"
11
        "syscall"
12
        "time"
13

14
        "github.com/alecthomas/kingpin/v2"
15
        "github.com/prometheus/client_golang/prometheus"
16
        "github.com/prometheus/client_golang/prometheus/promhttp"
17
        log "github.com/sirupsen/logrus"
18
        "github.com/zalando-incubator/stackset-controller/controller"
19
        "github.com/zalando-incubator/stackset-controller/pkg/clientset"
20
        "github.com/zalando-incubator/stackset-controller/pkg/traffic"
21
        corev1 "k8s.io/api/core/v1"
22
        "k8s.io/client-go/rest"
23
        "k8s.io/client-go/transport"
24
)
25

26
const (
27
        defaultInterval               = "10s"
28
        defaultIngressSourceSwitchTTL = "5m"
29
        defaultMetricsAddress         = ":7979"
30
        defaultClientGOTimeout        = 30 * time.Second
31
        defaultReconcileWorkers       = "10"
32
)
33

34
var (
35
        config struct {
36
                Debug                       bool
37
                Interval                    time.Duration
38
                APIServer                   *url.URL
39
                Namespace                   string
40
                MetricsAddress              string
41
                ClusterDomains              []string
42
                NoTrafficScaledownTTL       time.Duration
43
                ControllerID                string
44
                BackendWeightsAnnotationKey string
45
                RouteGroupSupportEnabled    bool
46
                TrafficSegmentsEnabled      bool
47
                AnnotatedTrafficSegments    bool
48
                SyncIngressAnnotations      []string
49
                IngressSourceSwitchTTL      time.Duration
50
                ReconcileWorkers            int
51
                ConfigMapSupportEnabled     bool
52
                SecretSupportEnabled        bool
53
        }
54
)
55

56
func main() {
×
57
        kingpin.Flag("debug", "Enable debug logging.").BoolVar(&config.Debug)
×
58
        kingpin.Flag("interval", "Interval between syncing stacksets.").
×
59
                Default(defaultInterval).DurationVar(&config.Interval)
×
60
        kingpin.Flag("apiserver", "API server url.").URLVar(&config.APIServer)
×
61
        kingpin.Flag("namespace", "Limit scope to a particular namespace.").Default(corev1.NamespaceAll).StringVar(&config.Namespace)
×
62
        kingpin.Flag("metrics-address", "defines where to serve metrics").Default(defaultMetricsAddress).StringVar(&config.MetricsAddress)
×
63
        kingpin.Flag("controller-id", "ID of the controller used to determine ownership of StackSet resources").StringVar(&config.ControllerID)
×
64
        kingpin.Flag("reconcile-workers", "The amount of stacksets to reconcile in parallel at a time.").
×
65
                Default(defaultReconcileWorkers).IntVar(&config.ReconcileWorkers)
×
66
        kingpin.Flag("backend-weights-key", "Backend weights annotation key the controller will use to set current traffic values").Default(traffic.DefaultBackendWeightsAnnotationKey).StringVar(&config.BackendWeightsAnnotationKey)
×
67
        kingpin.Flag("cluster-domain", "Main domains of the cluster, used for generating Stack Ingress hostnames").Envar("CLUSTER_DOMAIN").Required().StringsVar(&config.ClusterDomains)
×
68
        kingpin.Flag("enable-routegroup-support", "Enable support for RouteGroups on StackSets.").Default("false").BoolVar(&config.RouteGroupSupportEnabled)
×
69
        kingpin.Flag(
×
70
                "enable-traffic-segments",
×
71
                "Support traffic segments by default. "+
×
72
                        "Ignored when also setting --annotated-traffic-segments.",
×
73
        ).Default("false").BoolVar(&config.TrafficSegmentsEnabled)
×
74
        kingpin.Flag(
×
75
                "annotated-traffic-segments",
×
76
                fmt.Sprintf(
×
77
                        "Support traffic segments annotated with %q.",
×
UNCOV
78
                        controller.TrafficSegmentsAnnotationKey,
×
79
                ),
×
80
        ).Default("false").BoolVar(&config.AnnotatedTrafficSegments)
×
81
        kingpin.Flag(
×
82
                "sync-ingress-annotation",
×
83
                "Ingress/RouteGroup annotation to propagate to all traffic segments.",
×
UNCOV
84
        ).StringsVar(&config.SyncIngressAnnotations)
×
85
        kingpin.Flag("ingress-source-switch-ttl", "The ttl before an ingress source is deleted when replaced with another one e.g. switching from RouteGroup to Ingress or vice versa.").
×
86
                Default(defaultIngressSourceSwitchTTL).DurationVar(&config.IngressSourceSwitchTTL)
×
87
        kingpin.Flag("enable-configmap-support", "Enable support for ConfigMaps on StackSets.").Default("false").BoolVar(&config.ConfigMapSupportEnabled)
×
88
        kingpin.Flag("enable-secret-support", "Enable support for Secrets on StackSets.").Default("false").BoolVar(&config.SecretSupportEnabled)
×
UNCOV
89
        kingpin.Parse()
×
90

×
91
        if config.Debug {
×
92
                log.SetLevel(log.DebugLevel)
×
93
        }
×
94

95
        ctx, cancel := context.WithCancel(context.Background())
×
96
        kubeConfig, err := configureKubeConfig(config.APIServer, defaultClientGOTimeout, ctx.Done())
×
97
        if err != nil {
×
98
                log.Fatalf("Failed to setup Kubernetes config: %v", err)
×
99
        }
×
100

101
        client, err := clientset.NewForConfig(kubeConfig)
×
102
        if err != nil {
×
103
                log.Fatalf("Failed to initialize Kubernetes client: %v", err)
×
104
        }
×
105

106
        controller, err := controller.NewStackSetController(
×
107
                client,
×
UNCOV
108
                config.Namespace,
×
109
                config.ControllerID,
×
110
                config.ReconcileWorkers,
×
111
                config.BackendWeightsAnnotationKey,
×
112
                config.ClusterDomains,
×
113
                prometheus.DefaultRegisterer,
×
114
                config.Interval,
×
115
                config.RouteGroupSupportEnabled,
×
UNCOV
116
                config.TrafficSegmentsEnabled,
×
UNCOV
117
                config.AnnotatedTrafficSegments,
×
UNCOV
118
                config.SyncIngressAnnotations,
×
119
                config.ConfigMapSupportEnabled,
×
120
                config.SecretSupportEnabled,
×
121
                config.IngressSourceSwitchTTL,
×
122
        )
×
123
        if err != nil {
×
124
                log.Fatalf("Failed to create Stackset controller: %v", err)
×
125
        }
×
126

UNCOV
127
        go handleSigterm(cancel)
×
128
        go serveMetrics(config.MetricsAddress)
×
129
        controller.Run(ctx)
×
130
}
131

132
// handleSigterm handles SIGTERM signal sent to the process.
133
func handleSigterm(cancelFunc func()) {
×
134
        signals := make(chan os.Signal, 1)
×
135
        signal.Notify(signals, syscall.SIGTERM)
×
136
        <-signals
×
137
        log.Info("Received Term signal. Terminating...")
×
138
        cancelFunc()
×
139
}
×
140

141
// configureKubeConfig configures a kubeconfig.
142
func configureKubeConfig(apiServerURL *url.URL, timeout time.Duration, stopCh <-chan struct{}) (*rest.Config, error) {
×
143
        tr := &http.Transport{
×
144
                DialContext: (&net.Dialer{
×
145
                        Timeout:   timeout,
×
146
                        KeepAlive: 30 * time.Second,
×
147
                        DualStack: false, // K8s do not work well with IPv6
×
148
                }).DialContext,
×
149
                TLSHandshakeTimeout:   timeout,
×
150
                ResponseHeaderTimeout: 10 * time.Second,
×
151
                MaxIdleConns:          10,
×
UNCOV
152
                MaxIdleConnsPerHost:   2,
×
UNCOV
153
                IdleConnTimeout:       20 * time.Second,
×
UNCOV
154
        }
×
UNCOV
155

×
156
        // We need this to reliably fade on DNS change, which is right
×
157
        // now not fixed with IdleConnTimeout in the http.Transport.
×
158
        // https://github.com/golang/go/issues/23427
×
159
        go func(d time.Duration) {
×
160
                for {
×
161
                        select {
×
162
                        case <-time.After(d):
×
163
                                tr.CloseIdleConnections()
×
164
                        case <-stopCh:
×
UNCOV
165
                                return
×
166
                        }
167
                }
168
        }(20 * time.Second)
169

UNCOV
170
        if apiServerURL != nil {
×
UNCOV
171
                return &rest.Config{
×
172
                        Host:      apiServerURL.String(),
×
173
                        Timeout:   timeout,
×
174
                        Transport: tr,
×
175
                        QPS:       100.0,
×
176
                        Burst:     500,
×
177
                }, nil
×
178
        }
×
179

180
        config, err := rest.InClusterConfig()
×
181
        if err != nil {
×
182
                return nil, err
×
183
        }
×
184

185
        // patch TLS config
186
        restTransportConfig, err := config.TransportConfig()
×
187
        if err != nil {
×
188
                return nil, err
×
UNCOV
189
        }
×
UNCOV
190
        restTLSConfig, err := transport.TLSConfigFor(restTransportConfig)
×
UNCOV
191
        if err != nil {
×
192
                return nil, err
×
193
        }
×
194
        tr.TLSClientConfig = restTLSConfig
×
195

×
UNCOV
196
        config.Timeout = timeout
×
UNCOV
197
        config.Transport = tr
×
UNCOV
198
        config.QPS = 100.0
×
UNCOV
199
        config.Burst = 500
×
UNCOV
200
        // disable TLSClientConfig to make the custom Transport work
×
UNCOV
201
        config.TLSClientConfig = rest.TLSClientConfig{}
×
UNCOV
202
        return config, nil
×
203
}
204

205
// gather go metrics
UNCOV
206
func serveMetrics(address string) {
×
UNCOV
207
        http.Handle("/metrics", promhttp.Handler())
×
UNCOV
208
        log.Fatal(http.ListenAndServe(address, nil))
×
UNCOV
209
}
×
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc