che-operator/pkg/deploy/dashboard/deployment_dashboard.go

263 lines
8.2 KiB
Go

//
// Copyright (c) 2019-2023 Red Hat, Inc.
// This program and the accompanying materials are made
// available under the terms of the Eclipse Public License 2.0
// which is available at https://www.eclipse.org/legal/epl-2.0/
//
// SPDX-License-Identifier: EPL-2.0
//
// Contributors:
// Red Hat, Inc. - initial API and implementation
//
package dashboard
import (
"context"
"fmt"
"github.com/eclipse-che/che-operator/pkg/common/chetypes"
"github.com/eclipse-che/che-operator/pkg/common/constants"
defaults "github.com/eclipse-che/che-operator/pkg/common/operator-defaults"
"github.com/eclipse-che/che-operator/pkg/common/utils"
"github.com/eclipse-che/che-operator/pkg/deploy"
"github.com/eclipse-che/che-operator/pkg/deploy/tls"
configv1 "github.com/openshift/api/config/v1"
appsv1 "k8s.io/api/apps/v1"
corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/resource"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
"k8s.io/apimachinery/pkg/util/intstr"
)
const (
CHE_SELF_SIGNED_MOUNT_PATH = "/public-certs/che-self-signed"
CHE_CUSTOM_CERTS_MOUNT_PATH = "/public-certs/custom"
ConsoleLinksResourceName = "consolelinks"
)
func (d *DashboardReconciler) getDashboardDeploymentSpec(ctx *chetypes.DeployContext) (*appsv1.Deployment, error) {
var volumes []corev1.Volume
var volumeMounts []corev1.VolumeMount
var envVars []corev1.EnvVar
volumes, volumeMounts = d.provisionCustomPublicCA(volumes, volumeMounts)
selfSignedCertSecretExist, err := tls.IsSelfSignedCASecretExists(ctx)
if err != nil {
return nil, err
}
if selfSignedCertSecretExist {
volumes, volumeMounts = d.provisionCheSelfSignedCA(volumes, volumeMounts)
}
envVars = append(envVars,
// todo handle HTTP_PROXY related env vars
// CHE_HOST is here for backward compatibility. Replaced with CHE_URL
corev1.EnvVar{
Name: "CHE_HOST",
Value: "https://" + ctx.CheHost},
corev1.EnvVar{
Name: "CHE_URL",
Value: "https://" + ctx.CheHost},
corev1.EnvVar{
Name: "CHECLUSTER_CR_NAMESPACE",
Value: ctx.CheCluster.Namespace},
corev1.EnvVar{
Name: "CHECLUSTER_CR_NAME",
Value: ctx.CheCluster.Name},
)
envVars = append(envVars,
corev1.EnvVar{
Name: "CHE_INTERNAL_URL",
Value: fmt.Sprintf("http://%s.%s.svc:8080/api", deploy.CheServiceName, ctx.CheCluster.Namespace)},
)
if !ctx.CheCluster.Spec.Components.DevfileRegistry.DisableInternalRegistry {
envVars = append(envVars,
corev1.EnvVar{
Name: "CHE_WORKSPACE_DEVFILE__REGISTRY__INTERNAL__URL",
Value: fmt.Sprintf("http://%s.%s.svc:8080", constants.DevfileRegistryName, ctx.CheCluster.Namespace)},
)
}
if !ctx.CheCluster.Spec.Components.PluginRegistry.DisableInternalRegistry {
envVars = append(envVars,
corev1.EnvVar{
Name: "CHE_WORKSPACE_PLUGIN__REGISTRY__INTERNAL__URL",
Value: fmt.Sprintf("http://%s.%s.svc:8080/v3", constants.PluginRegistryName, ctx.CheCluster.Namespace)},
)
}
// Mount CheCluster default values
envVars = append(envVars, utils.GetEnvsByRegExp("^CHE_DEFAULT_SPEC.*")...)
if utils.IsK8SResourceServed(ctx.ClusterAPI.DiscoveryClient, ConsoleLinksResourceName) {
envVars = append(envVars,
corev1.EnvVar{
Name: "OPENSHIFT_CONSOLE_URL",
Value: d.evaluateOpenShiftConsoleURL(ctx)})
}
terminationGracePeriodSeconds := int64(30)
labels, labelsSelector := deploy.GetLabelsAndSelector(d.getComponentName(ctx))
image := defaults.GetDashboardImage(ctx.CheCluster)
pullPolicy := corev1.PullPolicy(utils.GetPullPolicyFromDockerImage(image))
deployment := &appsv1.Deployment{
TypeMeta: metav1.TypeMeta{
Kind: "Deployment",
APIVersion: "apps/v1",
},
ObjectMeta: metav1.ObjectMeta{
Name: d.getComponentName(ctx),
Namespace: ctx.CheCluster.Namespace,
Labels: labels,
},
Spec: appsv1.DeploymentSpec{
Selector: &metav1.LabelSelector{MatchLabels: labelsSelector},
Strategy: appsv1.DeploymentStrategy{
Type: appsv1.RollingUpdateDeploymentStrategyType,
},
Template: corev1.PodTemplateSpec{
ObjectMeta: metav1.ObjectMeta{
Labels: labels,
},
Spec: corev1.PodSpec{
ServiceAccountName: DashboardSA,
Containers: []corev1.Container{
{
Name: d.getComponentName(ctx),
ImagePullPolicy: pullPolicy,
Image: image,
Ports: []corev1.ContainerPort{
{
Name: "http",
ContainerPort: 8080,
Protocol: "TCP",
},
},
Resources: corev1.ResourceRequirements{
Requests: corev1.ResourceList{
corev1.ResourceMemory: resource.MustParse(constants.DefaultDashboardMemoryRequest),
corev1.ResourceCPU: resource.MustParse(constants.DefaultDashboardCpuRequest),
},
Limits: corev1.ResourceList{
corev1.ResourceMemory: resource.MustParse(constants.DefaultDashboardMemoryLimit),
corev1.ResourceCPU: resource.MustParse(constants.DefaultDashboardCpuLimit),
},
},
ReadinessProbe: &corev1.Probe{
ProbeHandler: corev1.ProbeHandler{
HTTPGet: &corev1.HTTPGetAction{
Path: "/",
Port: intstr.IntOrString{
Type: intstr.Int,
IntVal: int32(8080),
},
Scheme: corev1.URISchemeHTTP,
},
},
InitialDelaySeconds: 3,
FailureThreshold: 10,
TimeoutSeconds: 3,
SuccessThreshold: 1,
PeriodSeconds: 10,
},
LivenessProbe: &corev1.Probe{
ProbeHandler: corev1.ProbeHandler{
HTTPGet: &corev1.HTTPGetAction{
Path: "/",
Port: intstr.IntOrString{
Type: intstr.Int,
IntVal: int32(8080),
},
Scheme: corev1.URISchemeHTTP,
},
},
InitialDelaySeconds: 30,
FailureThreshold: 10,
TimeoutSeconds: 3,
SuccessThreshold: 1,
PeriodSeconds: 10,
},
Env: envVars,
VolumeMounts: volumeMounts,
},
},
Volumes: volumes,
RestartPolicy: "Always",
TerminationGracePeriodSeconds: &terminationGracePeriodSeconds,
},
},
},
}
deploy.EnsurePodSecurityStandards(deployment, constants.DefaultSecurityContextRunAsUser, constants.DefaultSecurityContextFsGroup)
if err := deploy.OverrideDeployment(ctx, deployment, ctx.CheCluster.Spec.Components.Dashboard.Deployment); err != nil {
return nil, err
}
return deployment, nil
}
func (d *DashboardReconciler) evaluateOpenShiftConsoleURL(ctx *chetypes.DeployContext) string {
console := &configv1.Console{}
err := ctx.ClusterAPI.NonCachingClient.Get(context.TODO(), types.NamespacedName{
Name: "cluster",
Namespace: "openshift-console",
}, console)
if err != nil {
// if error happen don't fail deployment but try again on the next reconcile loop
log.Error(err, "failed to get OpenShift Console Custom Resource to evaluate URL")
return ""
}
return console.Status.ConsoleURL
}
func (d *DashboardReconciler) provisionCheSelfSignedCA(volumes []corev1.Volume, volumeMounts []corev1.VolumeMount) ([]corev1.Volume, []corev1.VolumeMount) {
cheSelfSigned := corev1.Volume{
Name: "che-self-signed-ca",
VolumeSource: corev1.VolumeSource{
Secret: &corev1.SecretVolumeSource{
SecretName: constants.DefaultSelfSignedCertificateSecretName,
Items: []corev1.KeyToPath{
{
Key: "ca.crt",
Path: "ca.crt",
},
},
},
},
}
volumes = append(volumes, cheSelfSigned)
volumeMounts = append(volumeMounts, corev1.VolumeMount{
Name: cheSelfSigned.Name,
MountPath: CHE_SELF_SIGNED_MOUNT_PATH,
})
return volumes, volumeMounts
}
func (d *DashboardReconciler) provisionCustomPublicCA(volumes []corev1.Volume, volumeMounts []corev1.VolumeMount) ([]corev1.Volume, []corev1.VolumeMount) {
customPublicCertsVolume := corev1.Volume{
Name: "che-custom-ca",
VolumeSource: corev1.VolumeSource{
ConfigMap: &corev1.ConfigMapVolumeSource{
LocalObjectReference: corev1.LocalObjectReference{
Name: tls.CheAllCACertsConfigMapName,
},
},
},
}
volumes = append(volumes, customPublicCertsVolume)
volumeMounts = append(volumeMounts, corev1.VolumeMount{
Name: customPublicCertsVolume.Name,
MountPath: CHE_CUSTOM_CERTS_MOUNT_PATH,
})
return volumes, volumeMounts
}