Azure Red Hat OpenShift RP
Перейти к файлу
Jonathan CHang 32c15b1a3f
[ARO-4637] Migrate keyvault to track2 SDK (#3275)
* create client and vendor for armkeyvault

* fix cluster

* remove old keyvault

* change input option to environment option

* add credit

* fix mix import

* fix lint

* fix import in valut

* reoreder valut impoty

* fix vulnerability

* remobe package lock

* fix audit

* audit force

* fix audit

* ufix audit

* run npm update then fix

* fix nit

* bump version

* bump version

* bump

* bump

* match with master

* remove

* lint

* remove package-lock.json

* change to arm option

* mod vendor

* fix lint

* fix lint

---------

Co-authored-by: jonachang <jonachang@microsoft.com>
2024-04-25 11:40:15 +02:00
.config suppress false positives for passwords found in tests 2022-07-29 13:52:36 -05:00
.gdn Remove portal v1 (#3465) 2024-04-05 12:06:22 +11:00
.github remove dofinn from codeowners (#3527) 2024-04-19 23:09:14 +05:30
.pipelines Load the app/SP from the environment instead of automatically creating it (#3498) 2024-04-08 08:06:53 +10:00
cmd/aro Sync go-toolset 1.20.12 (#3495) 2024-04-16 11:40:15 +10:00
docs Update dbtoken-service.md 2024-04-11 11:23:35 -07:00
hack Load the app/SP from the environment instead of automatically creating it (#3498) 2024-04-08 08:06:53 +10:00
pkg [ARO-4637] Migrate keyvault to track2 SDK (#3275) 2024-04-25 11:40:15 +02:00
portal/v2 Remove portal v1 (#3465) 2024-04-05 12:06:22 +11:00
python Add new initial fields to v20240812preview (#3478) 2024-04-08 09:26:41 -04:00
swagger Add new initial fields to v20240812preview (#3478) 2024-04-08 09:26:41 -04:00
test Add the GinkgoHelper (#3452) 2024-03-12 17:46:42 +01:00
vendor [ARO-4637] Migrate keyvault to track2 SDK (#3275) 2024-04-25 11:40:15 +02:00
.dockerignore dockerignore: remove /env* files since they're in the git repo 2023-01-13 08:35:57 -05:00
.env Implement ARO extension 2019-12-15 22:06:27 -06:00
.gitignore Load the app/SP from the environment instead of automatically creating it (#3498) 2024-04-08 08:06:53 +10:00
.golangci.yml Update to Go 1.20 (#3429) 2024-03-05 18:18:36 +11:00
.mega-linter.yml update the mega linter because deprecations (#2877) 2023-05-19 15:08:22 +10:00
.prettierignore Run prettier on the pipeline yaml files (#2979) 2023-08-01 21:41:31 +10:00
.prettierrc.yaml Run prettier on the pipeline yaml files (#2979) 2023-08-01 21:41:31 +10:00
.sha256sum Add new initial fields to v20240812preview (#3478) 2024-04-08 09:26:41 -04:00
.yaml-lint.yml exclude autogenerated from yaml lint 2024-02-20 14:10:44 +11:00
CONTRIBUTING.md add CONTRIBUTING.md 2019-12-16 19:16:53 -06:00
Dockerfile.aro-e2e Update to Go 1.20 (#3429) 2024-03-05 18:18:36 +11:00
Dockerfile.aro-multistage Update to Go 1.20 (#3429) 2024-03-05 18:18:36 +11:00
Dockerfile.autorest Fix client generation (#2867) 2023-05-02 13:36:41 +10:00
Dockerfile.ci-portal Add CI containerfile for portal javascript build (#3397) 2024-03-20 07:24:18 -04:00
Dockerfile.fluentbit Add libzstd.so.1 to fluentbit container build 2023-12-01 11:13:15 -05:00
Dockerfile.gatekeeper Update to Go 1.20 (#3429) 2024-03-05 18:18:36 +11:00
Dockerfile.portal_lint Remove all reported CVE issues with npm packages, create fallbacks for polyfills, use absolute path to eslint with formatter, upgrade all packages 2022-09-12 15:36:22 +10:00
Dockerfile.proxy Update to Go 1.20 (#3429) 2024-03-05 18:18:36 +11:00
LICENSE Initial commit 2019-10-15 22:43:52 -05:00
Makefile Remove portal v1 (#3465) 2024-04-05 12:06:22 +11:00
README.md Add git hooks for branch name validation (#3479) 2024-03-25 13:48:08 -06:00
SECURITY.md add SECURITY.md 2019-12-16 19:16:53 -06:00
deps.go Move CI/dev tool usage to use go run pkg@version to reduce the number of vendored dependencies (#2789) 2023-03-24 10:01:05 +11:00
env-int.example Better documentation support for multiple envs (#1932) 2022-03-15 15:24:59 -04:00
env.example Add CI containerfile for portal javascript build (#3397) 2024-03-20 07:24:18 -04:00
go.mod [ARO-4637] Migrate keyvault to track2 SDK (#3275) 2024-04-25 11:40:15 +02:00
go.sum [ARO-4637] Migrate keyvault to track2 SDK (#3275) 2024-04-25 11:40:15 +02:00
requirements.txt pin python versions using requirements.txt. 2022-08-10 16:57:18 +01:00

README.md

Azure Red Hat OpenShift Resource Provider

Welcome!

For information relating to the generally available Azure Red Hat OpenShift v4 service, please see the following links:

Quickstarts

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.microsoft.com.

Before you start development, please set up your local git hooks to conform to our development standards:

make init-contrib

When you submit a pull request, a CLA-bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., label, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repositories using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

Repository map

  • .pipelines: CI workflows using Azure pipelines.

  • cmd/aro: RP entrypoint.

  • deploy: ARM templates to deploy RP in development and production.

  • docs: Documentation.

  • hack: Build scripts and utilities.

  • pkg: RP source code:

    • pkg/api: RP internal and external API definitions.

    • pkg/backend: RP backend workers.

    • pkg/bootstraplogging: Bootstrap logging configuration

    • pkg/client: Autogenerated ARO service Go client.

    • pkg/cluster: Cluster create/update/delete operations wrapper for OCP installer.

    • pkg/database: RP CosmosDB wrapper layer.

    • pkg/deploy: /deploy ARM template generation code.

    • pkg/env: RP environment-specific shims for running in production, development or test

    • pkg/frontend: RP frontend webserver.

    • pkg/metrics: Handles RP metrics via statsd.

    • pkg/mirror: OpenShift release mirror tooling.

    • pkg/monitor: Monitors running clusters.

    • pkg/operator/controllers: A list of controllers instantiated by the operator component.

      • alertwebhook: Ensures that the receiver endpoint defined in the alertmanager-main secret matches the webserver endpoint at aro-operator-master.openshift-azure-operator:8080, to avoid the AlertmanagerReceiversNotConfigured warning.

      • checker: Watches the Cluster resource for changes and updates conditions of the resource based on checks mentioned below

        • internetchecker: validate outbound internet connectivity to the nodes

        • serviceprincipalchecker: validate cluster service principal has the correct role/permissions

      • clusteroperatoraro: Ensures that the ARO cluster object is consistent and immutable

      • dnsmasq: Ensures that a dnsmasq systemd service is defined as a machineconfig for all nodes. The dnsmasq config contains records for azure load balancers such as api, api-int and *.apps domains so they will resolve even if custom DNS on the VNET is set.

      • genevalogging: Ensures all the Geneva logging resources in the openshift-azure-logging namespace matches the pre-defined specification found in pkg/operator/controllers/genevalogging/genevalogging.go.

      • imageconfig: Ensures that required registries are not blocked in image.config

      • machine: validate machine objects have the correct provider spec, vm type, vm image, disk size, three master nodes exist, and the number of worker nodes match the desired worker replicas

      • machineset: Ensures that a minimum of two worker replicas are met.

      • machinehealthcheck: Ensures the MachineHealthCheck resource is running as configured. See machinehealthcheck/doc.go

      • monitoring: Ensures that the OpenShift monitoring configuration in the openshift-monitoring namespace is consistent and immutable.

      • node: Force deletes pods when a node fails to drain for 1 hour. It should clear up any pods that refuse to be evicted on a drain due to violating a pod disruption budget.

      • pullsecret: Ensures that the ACR credentials in the openshift-config/pull-secret secret match those in the openshift/azure-operator/cluster secret.

      • rbac: Ensures that the aro-sre clusterrole and clusterrolebinding exist and are consistent.

      • routefix: Ensures all the routefix resources in the namespace openshift-azure-routefix remain on the cluster.

      • subnets: Ensures that the Network Security Groups (NSGs) are correct, and updates the Azure Machine Provider spec with subnet, vnet, and Network Resource Group.

      • workaround: Applies a set of temporary workarounds to the ARO cluster.

      • previewfeature: Allows toggling certain features that are not yet enabled by default.

    • pkg/portal: Portal for running promql queries against a cluster or requesting a kubeconfig for a cluster.

    • pkg/proxy: Proxy service for portal kubeconfig cluster access.

    • pkg/swagger: Swagger specification generation code.

    • pkg/util: Utility libraries.

  • python: Autogenerated ARO service Python client and az aro client extension.

  • swagger: Autogenerated ARO service Swagger specification.

  • test: End-to-end tests.

  • vendor: Vendored Go libraries.

Basic architecture

  • pkg/frontend is intended to become a spec-compliant RP web server. It is backed by CosmosDB. Incoming PUT/DELETE requests are written to the database with an non-terminal (Updating/Deleting) provisioningState.

  • pkg/backend reads documents with non-terminal provisioningStates, asynchronously updates them and finally updates document with a terminal provisioningState (Succeeded/Failed). The backend updates the document with a heartbeat - if this fails, the document will be picked up by a different worker.

  • As CosmosDB does not support document patch, care is taken to correctly pass through any fields in the internal model which the reader is unaware of (see github.com/ugorji/go/codec.MissingFielder). This is intended to help in upgrade cases and (in the future) with multiple microservices reading from the database in parallel.

  • Care is taken to correctly use optimistic concurrency to avoid document corruption through concurrent writes (see RetryOnPreconditionFailed).

  • The pkg/api architecture differs somewhat from github.com/openshift/openshift-azure: the intention is to fix the broken merge semantics and try pushing validation into the versioned APIs to improve error reporting.

  • Everything is intended to be crash/restart/upgrade-safe, horizontally scaleable, upgradeable...