2 # Copyright 2021 Canonical Ltd.
4 # Licensed under the Apache License, Version 2.0 (the "License"); you may
5 # not use this file except in compliance with the License. You may obtain
6 # a copy of the License at
8 # http://www.apache.org/licenses/LICENSE-2.0
10 # Unless required by applicable law or agreed to in writing, software
11 # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12 # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13 # License for the specific language governing permissions and limitations
16 # For those usages not covered by the Apache License, Version 2.0 please
17 # contact: legal@canonical.com
19 # To get in touch with the maintainers, please contact:
20 # osm-charmers@lists.launchpad.net
23 # pylint: disable=E0213
26 from ipaddress
import ip_network
28 from pathlib
import Path
29 from string
import Template
30 from typing
import NoReturn
, Optional
31 from urllib
.parse
import urlparse
33 from ops
.main
import main
34 from opslib
.osm
.charm
import CharmedOsmBase
, RelationsMissing
35 from opslib
.osm
.interfaces
.http
import HttpClient
36 from opslib
.osm
.pod
import (
39 IngressResourceV3Builder
,
42 from opslib
.osm
.validator
import ModelValidator
, validator
45 logger
= logging
.getLogger(__name__
)
48 class ConfigModel(ModelValidator
):
52 site_url
: Optional
[str]
53 cluster_issuer
: Optional
[str]
54 ingress_whitelist_source_range
: Optional
[str]
55 tls_secret_name
: Optional
[str]
58 def validate_port(cls
, v
):
60 raise ValueError("value must be greater than 0")
63 @validator("max_file_size")
64 def validate_max_file_size(cls
, v
):
66 raise ValueError("value must be equal or greater than 0")
69 @validator("site_url")
70 def validate_site_url(cls
, v
):
73 if not parsed
.scheme
.startswith("http"):
74 raise ValueError("value must start with http")
77 @validator("ingress_whitelist_source_range")
78 def validate_ingress_whitelist_source_range(cls
, v
):
84 class NgUiCharm(CharmedOsmBase
):
85 def __init__(self
, *args
) -> NoReturn
:
86 super().__init
__(*args
, oci_image
="image")
88 self
.nbi_client
= HttpClient(self
, "nbi")
89 self
.framework
.observe(self
.on
["nbi"].relation_changed
, self
.configure_pod
)
90 self
.framework
.observe(self
.on
["nbi"].relation_broken
, self
.configure_pod
)
92 def _check_missing_dependencies(self
, config
: ConfigModel
):
93 missing_relations
= []
95 if self
.nbi_client
.is_missing_data_in_app():
96 missing_relations
.append("nbi")
99 raise RelationsMissing(missing_relations
)
101 def _build_files(self
, config
: ConfigModel
):
102 files_builder
= FilesV3Builder()
103 files_builder
.add_file(
105 Template(Path("files/default").read_text()).substitute(
107 server_name
=config
.server_name
,
108 max_file_size
=config
.max_file_size
,
109 nbi_host
=self
.nbi_client
.host
,
110 nbi_port
=self
.nbi_client
.port
,
113 return files_builder
.build()
115 def build_pod_spec(self
, image_info
):
117 config
= ConfigModel(**dict(self
.config
))
119 self
._check
_missing
_dependencies
(config
)
120 # Create Builder for the PodSpec
121 pod_spec_builder
= PodSpecV3Builder()
123 container_builder
= ContainerV3Builder(self
.app
.name
, image_info
)
124 container_builder
.add_port(name
=self
.app
.name
, port
=config
.port
)
125 container
= container_builder
.build()
126 container_builder
.add_tcpsocket_readiness_probe(
128 initial_delay_seconds
=45,
131 container_builder
.add_tcpsocket_liveness_probe(
133 initial_delay_seconds
=45,
136 container_builder
.add_volume_config(
138 "/etc/nginx/sites-available/",
139 self
._build
_files
(config
),
141 # Add container to pod spec
142 pod_spec_builder
.add_container(container
)
143 # Add ingress resources to pod spec if site url exists
145 parsed
= urlparse(config
.site_url
)
147 "nginx.ingress.kubernetes.io/proxy-body-size": "{}".format(
148 str(config
.max_file_size
) + "m"
149 if config
.max_file_size
> 0
150 else config
.max_file_size
153 ingress_resource_builder
= IngressResourceV3Builder(
154 f
"{self.app.name}-ingress", annotations
157 if config
.ingress_whitelist_source_range
:
159 "nginx.ingress.kubernetes.io/whitelist-source-range"
160 ] = config
.ingress_whitelist_source_range
162 if config
.cluster_issuer
:
163 annotations
["cert-manager.io/cluster-issuer"] = config
.cluster_issuer
165 if parsed
.scheme
== "https":
166 ingress_resource_builder
.add_tls(
167 [parsed
.hostname
], config
.tls_secret_name
170 annotations
["nginx.ingress.kubernetes.io/ssl-redirect"] = "false"
172 ingress_resource_builder
.add_rule(
173 parsed
.hostname
, self
.app
.name
, config
.port
175 ingress_resource
= ingress_resource_builder
.build()
176 pod_spec_builder
.add_ingress_resource(ingress_resource
)
177 return pod_spec_builder
.build()
180 if __name__
== "__main__":