blob: af39a13ab3af568f993ab4d2c31a5c67bc00372f [file] [log] [blame]
#!/usr/bin/env python3
# Copyright 2021 Canonical Ltd.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# For those usages not covered by the Apache License, Version 2.0 please
# contact: legal@canonical.com
#
# To get in touch with the maintainers, please contact:
# osm-charmers@lists.launchpad.net
##
# pylint: disable=E0213
import base64
from ipaddress import ip_network
import logging
from typing import NoReturn, Optional
from urllib.parse import urlparse
import bcrypt
from oci_image import OCIImageResource
from ops.framework import EventBase
from ops.main import main
from opslib.osm.charm import CharmedOsmBase
from opslib.osm.interfaces.prometheus import PrometheusServer
from opslib.osm.pod import (
ContainerV3Builder,
FilesV3Builder,
IngressResourceV3Builder,
PodSpecV3Builder,
)
from opslib.osm.validator import (
ModelValidator,
validator,
)
import requests
logger = logging.getLogger(__name__)
PORT = 9090
class ConfigModel(ModelValidator):
web_subpath: str
default_target: str
max_file_size: int
site_url: Optional[str]
cluster_issuer: Optional[str]
ingress_class: Optional[str]
ingress_whitelist_source_range: Optional[str]
tls_secret_name: Optional[str]
enable_web_admin_api: bool
image_pull_policy: str
security_context: bool
web_config_username: str
web_config_password: str
@validator("web_subpath")
def validate_web_subpath(cls, v):
if len(v) < 1:
raise ValueError("web-subpath must be a non-empty string")
return v
@validator("max_file_size")
def validate_max_file_size(cls, v):
if v < 0:
raise ValueError("value must be equal or greater than 0")
return v
@validator("site_url")
def validate_site_url(cls, v):
if v:
parsed = urlparse(v)
if not parsed.scheme.startswith("http"):
raise ValueError("value must start with http")
return v
@validator("ingress_whitelist_source_range")
def validate_ingress_whitelist_source_range(cls, v):
if v:
ip_network(v)
return v
@validator("image_pull_policy")
def validate_image_pull_policy(cls, v):
values = {
"always": "Always",
"ifnotpresent": "IfNotPresent",
"never": "Never",
}
v = v.lower()
if v not in values.keys():
raise ValueError("value must be always, ifnotpresent or never")
return values[v]
class PrometheusCharm(CharmedOsmBase):
"""Prometheus Charm."""
def __init__(self, *args) -> NoReturn:
"""Prometheus Charm constructor."""
super().__init__(*args, oci_image="image")
# Registering provided relation events
self.prometheus = PrometheusServer(self, "prometheus")
self.framework.observe(
self.on.prometheus_relation_joined, # pylint: disable=E1101
self._publish_prometheus_info,
)
# Registering actions
self.framework.observe(
self.on.backup_action, # pylint: disable=E1101
self._on_backup_action,
)
def _publish_prometheus_info(self, event: EventBase) -> NoReturn:
config = ConfigModel(**dict(self.config))
self.prometheus.publish_info(
self.app.name,
PORT,
user=config.web_config_username,
password=config.web_config_password,
)
def _on_backup_action(self, event: EventBase) -> NoReturn:
url = f"http://{self.model.app.name}:{PORT}/api/v1/admin/tsdb/snapshot"
result = requests.post(url)
if result.status_code == 200:
event.set_results({"backup-name": result.json()["name"]})
else:
event.fail(f"status-code: {result.status_code}")
def _build_config_file(self, config: ConfigModel):
files_builder = FilesV3Builder()
files_builder.add_file(
"prometheus.yml",
(
"global:\n"
" scrape_interval: 15s\n"
" evaluation_interval: 15s\n"
"alerting:\n"
" alertmanagers:\n"
" - static_configs:\n"
" - targets:\n"
"rule_files:\n"
"scrape_configs:\n"
" - job_name: 'prometheus'\n"
" static_configs:\n"
f" - targets: [{config.default_target}]\n"
),
)
return files_builder.build()
def _build_webconfig_file(self):
files_builder = FilesV3Builder()
files_builder.add_file("web.yml", "web-config-file", secret=True)
return files_builder.build()
def build_pod_spec(self, image_info):
# Validate config
config = ConfigModel(**dict(self.config))
# Create Builder for the PodSpec
pod_spec_builder = PodSpecV3Builder(
enable_security_context=config.security_context
)
# Build Backup Container
backup_image = OCIImageResource(self, "backup-image")
backup_image_info = backup_image.fetch()
backup_container_builder = ContainerV3Builder("prom-backup", backup_image_info)
backup_container = backup_container_builder.build()
# Add backup container to pod spec
pod_spec_builder.add_container(backup_container)
# Add pod secrets
prometheus_secret_name = f"{self.app.name}-secret"
pod_spec_builder.add_secret(
prometheus_secret_name,
{
"web-config-file": (
"basic_auth_users:\n"
f" {config.web_config_username}: {self._hash_password(config.web_config_password)}\n"
)
},
)
# Build Container
container_builder = ContainerV3Builder(
self.app.name,
image_info,
config.image_pull_policy,
run_as_non_root=config.security_context,
)
container_builder.add_port(name=self.app.name, port=PORT)
token = self._base64_encode(
f"{config.web_config_username}:{config.web_config_password}"
)
container_builder.add_http_readiness_probe(
"/-/ready",
PORT,
initial_delay_seconds=10,
timeout_seconds=30,
http_headers=[("Authorization", f"Basic {token}")],
)
container_builder.add_http_liveness_probe(
"/-/healthy",
PORT,
initial_delay_seconds=30,
period_seconds=30,
http_headers=[("Authorization", f"Basic {token}")],
)
command = [
"/bin/prometheus",
"--config.file=/etc/prometheus/prometheus.yml",
"--web.config.file=/etc/prometheus/web-config/web.yml",
"--storage.tsdb.path=/prometheus",
"--web.console.libraries=/usr/share/prometheus/console_libraries",
"--web.console.templates=/usr/share/prometheus/consoles",
f"--web.route-prefix={config.web_subpath}",
f"--web.external-url=http://localhost:{PORT}{config.web_subpath}",
]
if config.enable_web_admin_api:
command.append("--web.enable-admin-api")
container_builder.add_command(command)
container_builder.add_volume_config(
"config", "/etc/prometheus", self._build_config_file(config)
)
container_builder.add_volume_config(
"web-config",
"/etc/prometheus/web-config",
self._build_webconfig_file(),
secret_name=prometheus_secret_name,
)
container = container_builder.build()
# Add container to pod spec
pod_spec_builder.add_container(container)
# Add ingress resources to pod spec if site url exists
if config.site_url:
parsed = urlparse(config.site_url)
annotations = {
"nginx.ingress.kubernetes.io/proxy-body-size": "{}".format(
str(config.max_file_size) + "m"
if config.max_file_size > 0
else config.max_file_size
)
}
if config.ingress_class:
annotations["kubernetes.io/ingress.class"] = config.ingress_class
ingress_resource_builder = IngressResourceV3Builder(
f"{self.app.name}-ingress", annotations
)
if config.ingress_whitelist_source_range:
annotations[
"nginx.ingress.kubernetes.io/whitelist-source-range"
] = config.ingress_whitelist_source_range
if config.cluster_issuer:
annotations["cert-manager.io/cluster-issuer"] = config.cluster_issuer
if parsed.scheme == "https":
ingress_resource_builder.add_tls(
[parsed.hostname], config.tls_secret_name
)
else:
annotations["nginx.ingress.kubernetes.io/ssl-redirect"] = "false"
ingress_resource_builder.add_rule(parsed.hostname, self.app.name, PORT)
ingress_resource = ingress_resource_builder.build()
pod_spec_builder.add_ingress_resource(ingress_resource)
return pod_spec_builder.build()
def _hash_password(self, password):
hashed_password = bcrypt.hashpw(password.encode("utf-8"), bcrypt.gensalt())
return hashed_password.decode()
def _base64_encode(self, phrase: str) -> str:
return base64.b64encode(phrase.encode("utf-8")).decode("utf-8")
if __name__ == "__main__":
main(PrometheusCharm)