blob: af39a13ab3af568f993ab4d2c31a5c67bc00372f [file] [log] [blame]
beierlm794fa722023-08-25 23:01:16 +02001#!/usr/bin/env python3
2# Copyright 2021 Canonical Ltd.
3#
4# Licensed under the Apache License, Version 2.0 (the "License"); you may
5# not use this file except in compliance with the License. You may obtain
6# a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13# License for the specific language governing permissions and limitations
14# under the License.
15#
16# For those usages not covered by the Apache License, Version 2.0 please
17# contact: legal@canonical.com
18#
19# To get in touch with the maintainers, please contact:
20# osm-charmers@lists.launchpad.net
21##
22
23# pylint: disable=E0213
24
25import base64
26from ipaddress import ip_network
27import logging
28from typing import NoReturn, Optional
29from urllib.parse import urlparse
30
31import bcrypt
32from oci_image import OCIImageResource
33from ops.framework import EventBase
34from ops.main import main
35from opslib.osm.charm import CharmedOsmBase
36from opslib.osm.interfaces.prometheus import PrometheusServer
37from opslib.osm.pod import (
38 ContainerV3Builder,
39 FilesV3Builder,
40 IngressResourceV3Builder,
41 PodSpecV3Builder,
42)
43from opslib.osm.validator import (
44 ModelValidator,
45 validator,
46)
47import requests
48
49
50logger = logging.getLogger(__name__)
51
52PORT = 9090
53
54
55class ConfigModel(ModelValidator):
56 web_subpath: str
57 default_target: str
58 max_file_size: int
59 site_url: Optional[str]
60 cluster_issuer: Optional[str]
61 ingress_class: Optional[str]
62 ingress_whitelist_source_range: Optional[str]
63 tls_secret_name: Optional[str]
64 enable_web_admin_api: bool
65 image_pull_policy: str
66 security_context: bool
67 web_config_username: str
68 web_config_password: str
69
70 @validator("web_subpath")
71 def validate_web_subpath(cls, v):
72 if len(v) < 1:
73 raise ValueError("web-subpath must be a non-empty string")
74 return v
75
76 @validator("max_file_size")
77 def validate_max_file_size(cls, v):
78 if v < 0:
79 raise ValueError("value must be equal or greater than 0")
80 return v
81
82 @validator("site_url")
83 def validate_site_url(cls, v):
84 if v:
85 parsed = urlparse(v)
86 if not parsed.scheme.startswith("http"):
87 raise ValueError("value must start with http")
88 return v
89
90 @validator("ingress_whitelist_source_range")
91 def validate_ingress_whitelist_source_range(cls, v):
92 if v:
93 ip_network(v)
94 return v
95
96 @validator("image_pull_policy")
97 def validate_image_pull_policy(cls, v):
98 values = {
99 "always": "Always",
100 "ifnotpresent": "IfNotPresent",
101 "never": "Never",
102 }
103 v = v.lower()
104 if v not in values.keys():
105 raise ValueError("value must be always, ifnotpresent or never")
106 return values[v]
107
108
109class PrometheusCharm(CharmedOsmBase):
110
111 """Prometheus Charm."""
112
113 def __init__(self, *args) -> NoReturn:
114 """Prometheus Charm constructor."""
115 super().__init__(*args, oci_image="image")
116
117 # Registering provided relation events
118 self.prometheus = PrometheusServer(self, "prometheus")
119 self.framework.observe(
120 self.on.prometheus_relation_joined, # pylint: disable=E1101
121 self._publish_prometheus_info,
122 )
123
124 # Registering actions
125 self.framework.observe(
126 self.on.backup_action, # pylint: disable=E1101
127 self._on_backup_action,
128 )
129
130 def _publish_prometheus_info(self, event: EventBase) -> NoReturn:
131 config = ConfigModel(**dict(self.config))
132 self.prometheus.publish_info(
133 self.app.name,
134 PORT,
135 user=config.web_config_username,
136 password=config.web_config_password,
137 )
138
139 def _on_backup_action(self, event: EventBase) -> NoReturn:
140 url = f"http://{self.model.app.name}:{PORT}/api/v1/admin/tsdb/snapshot"
141 result = requests.post(url)
142
143 if result.status_code == 200:
144 event.set_results({"backup-name": result.json()["name"]})
145 else:
146 event.fail(f"status-code: {result.status_code}")
147
148 def _build_config_file(self, config: ConfigModel):
149 files_builder = FilesV3Builder()
150 files_builder.add_file(
151 "prometheus.yml",
152 (
153 "global:\n"
154 " scrape_interval: 15s\n"
155 " evaluation_interval: 15s\n"
156 "alerting:\n"
157 " alertmanagers:\n"
158 " - static_configs:\n"
159 " - targets:\n"
160 "rule_files:\n"
161 "scrape_configs:\n"
162 " - job_name: 'prometheus'\n"
163 " static_configs:\n"
164 f" - targets: [{config.default_target}]\n"
165 ),
166 )
167 return files_builder.build()
168
169 def _build_webconfig_file(self):
170 files_builder = FilesV3Builder()
171 files_builder.add_file("web.yml", "web-config-file", secret=True)
172 return files_builder.build()
173
174 def build_pod_spec(self, image_info):
175 # Validate config
176 config = ConfigModel(**dict(self.config))
177 # Create Builder for the PodSpec
178 pod_spec_builder = PodSpecV3Builder(
179 enable_security_context=config.security_context
180 )
181
182 # Build Backup Container
183 backup_image = OCIImageResource(self, "backup-image")
184 backup_image_info = backup_image.fetch()
185 backup_container_builder = ContainerV3Builder("prom-backup", backup_image_info)
186 backup_container = backup_container_builder.build()
187
188 # Add backup container to pod spec
189 pod_spec_builder.add_container(backup_container)
190
191 # Add pod secrets
192 prometheus_secret_name = f"{self.app.name}-secret"
193 pod_spec_builder.add_secret(
194 prometheus_secret_name,
195 {
196 "web-config-file": (
197 "basic_auth_users:\n"
198 f" {config.web_config_username}: {self._hash_password(config.web_config_password)}\n"
199 )
200 },
201 )
202
203 # Build Container
204 container_builder = ContainerV3Builder(
205 self.app.name,
206 image_info,
207 config.image_pull_policy,
208 run_as_non_root=config.security_context,
209 )
210 container_builder.add_port(name=self.app.name, port=PORT)
211 token = self._base64_encode(
212 f"{config.web_config_username}:{config.web_config_password}"
213 )
214 container_builder.add_http_readiness_probe(
215 "/-/ready",
216 PORT,
217 initial_delay_seconds=10,
218 timeout_seconds=30,
219 http_headers=[("Authorization", f"Basic {token}")],
220 )
221 container_builder.add_http_liveness_probe(
222 "/-/healthy",
223 PORT,
224 initial_delay_seconds=30,
225 period_seconds=30,
226 http_headers=[("Authorization", f"Basic {token}")],
227 )
228 command = [
229 "/bin/prometheus",
230 "--config.file=/etc/prometheus/prometheus.yml",
231 "--web.config.file=/etc/prometheus/web-config/web.yml",
232 "--storage.tsdb.path=/prometheus",
233 "--web.console.libraries=/usr/share/prometheus/console_libraries",
234 "--web.console.templates=/usr/share/prometheus/consoles",
235 f"--web.route-prefix={config.web_subpath}",
236 f"--web.external-url=http://localhost:{PORT}{config.web_subpath}",
237 ]
238 if config.enable_web_admin_api:
239 command.append("--web.enable-admin-api")
240 container_builder.add_command(command)
241 container_builder.add_volume_config(
242 "config", "/etc/prometheus", self._build_config_file(config)
243 )
244 container_builder.add_volume_config(
245 "web-config",
246 "/etc/prometheus/web-config",
247 self._build_webconfig_file(),
248 secret_name=prometheus_secret_name,
249 )
250 container = container_builder.build()
251 # Add container to pod spec
252 pod_spec_builder.add_container(container)
253 # Add ingress resources to pod spec if site url exists
254 if config.site_url:
255 parsed = urlparse(config.site_url)
256 annotations = {
257 "nginx.ingress.kubernetes.io/proxy-body-size": "{}".format(
258 str(config.max_file_size) + "m"
259 if config.max_file_size > 0
260 else config.max_file_size
261 )
262 }
263 if config.ingress_class:
264 annotations["kubernetes.io/ingress.class"] = config.ingress_class
265 ingress_resource_builder = IngressResourceV3Builder(
266 f"{self.app.name}-ingress", annotations
267 )
268
269 if config.ingress_whitelist_source_range:
270 annotations[
271 "nginx.ingress.kubernetes.io/whitelist-source-range"
272 ] = config.ingress_whitelist_source_range
273
274 if config.cluster_issuer:
275 annotations["cert-manager.io/cluster-issuer"] = config.cluster_issuer
276
277 if parsed.scheme == "https":
278 ingress_resource_builder.add_tls(
279 [parsed.hostname], config.tls_secret_name
280 )
281 else:
282 annotations["nginx.ingress.kubernetes.io/ssl-redirect"] = "false"
283
284 ingress_resource_builder.add_rule(parsed.hostname, self.app.name, PORT)
285 ingress_resource = ingress_resource_builder.build()
286 pod_spec_builder.add_ingress_resource(ingress_resource)
287 return pod_spec_builder.build()
288
289 def _hash_password(self, password):
290 hashed_password = bcrypt.hashpw(password.encode("utf-8"), bcrypt.gensalt())
291 return hashed_password.decode()
292
293 def _base64_encode(self, phrase: str) -> str:
294 return base64.b64encode(phrase.encode("utf-8")).decode("utf-8")
295
296
297if __name__ == "__main__":
298 main(PrometheusCharm)