blob: 9d62fe2fcbc4082430bb1d37658b5c72f92eaece [file] [log] [blame]
#!/usr/bin/env python3
# Copyright 2021 Canonical Ltd.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# For those usages not covered by the Apache License, Version 2.0 please
# contact: legal@canonical.com
#
# To get in touch with the maintainers, please contact:
# osm-charmers@lists.launchpad.net
##
# pylint: disable=E0213
import logging
from typing import Optional, NoReturn
from ipaddress import ip_network
from urllib.parse import urlparse
from ops.main import main
from opslib.osm.charm import CharmedOsmBase, RelationsMissing
from opslib.osm.pod import (
ContainerV3Builder,
PodSpecV3Builder,
IngressResourceV3Builder,
)
from opslib.osm.validator import (
ModelValidator,
validator,
)
from opslib.osm.interfaces.kafka import KafkaClient
from opslib.osm.interfaces.mongo import MongoClient
from opslib.osm.interfaces.prometheus import PrometheusClient
from opslib.osm.interfaces.keystone import KeystoneClient
from opslib.osm.interfaces.http import HttpServer
logger = logging.getLogger(__name__)
PORT = 9999
class ConfigModel(ModelValidator):
enable_test: bool
auth_backend: str
database_commonkey: str
log_level: str
max_file_size: int
site_url: Optional[str]
ingress_whitelist_source_range: Optional[str]
tls_secret_name: Optional[str]
@validator("auth_backend")
def validate_auth_backend(cls, v):
if v not in {"internal", "keystone"}:
raise ValueError("value must be 'internal' or 'keystone'")
return v
@validator("log_level")
def validate_log_level(cls, v):
if v not in {"INFO", "DEBUG"}:
raise ValueError("value must be INFO or DEBUG")
return v
@validator("max_file_size")
def validate_max_file_size(cls, v):
if v < 0:
raise ValueError("value must be equal or greater than 0")
return v
@validator("site_url")
def validate_site_url(cls, v):
if v:
parsed = urlparse(v)
if not parsed.scheme.startswith("http"):
raise ValueError("value must start with http")
return v
@validator("ingress_whitelist_source_range")
def validate_ingress_whitelist_source_range(cls, v):
if v:
ip_network(v)
return v
class NbiCharm(CharmedOsmBase):
def __init__(self, *args) -> NoReturn:
super().__init__(*args, oci_image="image")
self.kafka_client = KafkaClient(self, "kafka")
self.framework.observe(self.on["kafka"].relation_changed, self.configure_pod)
self.framework.observe(self.on["kafka"].relation_broken, self.configure_pod)
self.mongodb_client = MongoClient(self, "mongodb")
self.framework.observe(self.on["mongodb"].relation_changed, self.configure_pod)
self.framework.observe(self.on["mongodb"].relation_broken, self.configure_pod)
self.prometheus_client = PrometheusClient(self, "prometheus")
self.framework.observe(
self.on["prometheus"].relation_changed, self.configure_pod
)
self.framework.observe(
self.on["prometheus"].relation_broken, self.configure_pod
)
self.keystone_client = KeystoneClient(self, "keystone")
self.framework.observe(self.on["keystone"].relation_changed, self.configure_pod)
self.framework.observe(self.on["keystone"].relation_broken, self.configure_pod)
self.http_server = HttpServer(self, "nbi")
self.framework.observe(self.on["nbi"].relation_joined, self._publish_nbi_info)
def _publish_nbi_info(self, event):
"""Publishes NBI information.
Args:
event (EventBase): RO relation event.
"""
if self.unit.is_leader():
self.http_server.publish_info(self.app.name, PORT)
def _check_missing_dependencies(self, config: ConfigModel):
missing_relations = []
if self.kafka_client.is_missing_data_in_unit():
missing_relations.append("kafka")
if self.mongodb_client.is_missing_data_in_unit():
missing_relations.append("mongodb")
if self.prometheus_client.is_missing_data_in_app():
missing_relations.append("prometheus")
if config.auth_backend == "keystone":
if self.keystone_client.is_missing_data_in_app():
missing_relations.append("keystone")
if missing_relations:
raise RelationsMissing(missing_relations)
def build_pod_spec(self, image_info):
# Validate config
config = ConfigModel(**dict(self.config))
# Check relations
self._check_missing_dependencies(config)
# Create Builder for the PodSpec
pod_spec_builder = PodSpecV3Builder()
# Build Init Container
pod_spec_builder.add_init_container(
{
"name": "init-check",
"image": "alpine:latest",
"command": [
"sh",
"-c",
f"until (nc -zvw1 {self.kafka_client.host} {self.kafka_client.port} ); do sleep 3; done; exit 0",
],
}
)
# Build Container
container_builder = ContainerV3Builder(self.app.name, image_info)
container_builder.add_port(name=self.app.name, port=PORT)
container_builder.add_tcpsocket_readiness_probe(
PORT,
initial_delay_seconds=5,
timeout_seconds=5,
)
container_builder.add_tcpsocket_liveness_probe(
PORT,
initial_delay_seconds=45,
timeout_seconds=10,
)
container_builder.add_envs(
{
# General configuration
"ALLOW_ANONYMOUS_LOGIN": "yes",
"OSMNBI_SERVER_ENABLE_TEST": config.enable_test,
"OSMNBI_STATIC_DIR": "/app/osm_nbi/html_public",
# Kafka configuration
"OSMNBI_MESSAGE_HOST": self.kafka_client.host,
"OSMNBI_MESSAGE_DRIVER": "kafka",
"OSMNBI_MESSAGE_PORT": self.kafka_client.port,
# Database configuration
"OSMNBI_DATABASE_DRIVER": "mongo",
"OSMNBI_DATABASE_URI": self.mongodb_client.connection_string,
"OSMNBI_DATABASE_COMMONKEY": config.database_commonkey,
# Storage configuration
"OSMNBI_STORAGE_DRIVER": "mongo",
"OSMNBI_STORAGE_PATH": "/app/storage",
"OSMNBI_STORAGE_COLLECTION": "files",
"OSMNBI_STORAGE_URI": self.mongodb_client.connection_string,
# Prometheus configuration
"OSMNBI_PROMETHEUS_HOST": self.prometheus_client.hostname,
"OSMNBI_PROMETHEUS_PORT": self.prometheus_client.port,
# Log configuration
"OSMNBI_LOG_LEVEL": config.log_level,
}
)
if config.auth_backend == "internal":
container_builder.add_env("OSMNBI_AUTHENTICATION_BACKEND", "internal")
elif config.auth_backend == "keystone":
container_builder.add_envs(
{
"OSMNBI_AUTHENTICATION_BACKEND": "keystone",
"OSMNBI_AUTHENTICATION_AUTH_URL": self.keystone_client.host,
"OSMNBI_AUTHENTICATION_AUTH_PORT": self.keystone_client.port,
"OSMNBI_AUTHENTICATION_USER_DOMAIN_NAME": self.keystone_client.user_domain_name,
"OSMNBI_AUTHENTICATION_PROJECT_DOMAIN_NAME": self.keystone_client.project_domain_name,
"OSMNBI_AUTHENTICATION_SERVICE_USERNAME": self.keystone_client.username,
"OSMNBI_AUTHENTICATION_SERVICE_PASSWORD": self.keystone_client.password,
"OSMNBI_AUTHENTICATION_SERVICE_PROJECT": self.keystone_client.service,
}
)
container = container_builder.build()
# Add container to pod spec
pod_spec_builder.add_container(container)
# Add ingress resources to pod spec if site url exists
if config.site_url:
parsed = urlparse(config.site_url)
annotations = {
"nginx.ingress.kubernetes.io/proxy-body-size": "{}".format(
str(config.max_file_size) + "m"
if config.max_file_size > 0
else config.max_file_size
),
"nginx.ingress.kubernetes.io/backend-protocol": "HTTPS",
}
ingress_resource_builder = IngressResourceV3Builder(
f"{self.app.name}-ingress", annotations
)
if config.ingress_whitelist_source_range:
annotations[
"nginx.ingress.kubernetes.io/whitelist-source-range"
] = config.ingress_whitelist_source_range
if parsed.scheme == "https":
ingress_resource_builder.add_tls(
[parsed.hostname], config.tls_secret_name
)
else:
annotations["nginx.ingress.kubernetes.io/ssl-redirect"] = "false"
ingress_resource_builder.add_rule(parsed.hostname, self.app.name, PORT)
ingress_resource = ingress_resource_builder.build()
pod_spec_builder.add_ingress_resource(ingress_resource)
logger.debug(pod_spec_builder.build())
return pod_spec_builder.build()
if __name__ == "__main__":
main(NbiCharm)