Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for ingress-configured router #12416

Merged
merged 2 commits into from
Jan 20, 2017

Conversation

marun
Copy link
Contributor

@marun marun commented Jan 8, 2017

  • The controller generates route events from ingress and secret events
  • ingresses are cached by the controller to enable:
    • route deletion when an ingress rule is removed
    • tracking of which secrets to cache
    • generation of routes in response to secrets events
  • secrets are cached by the controller to minimize the lookups required to generate routes from an ingress
  • only secrets referenced by an ingress seen by the router will be cached

TODO

  • ensure changes to the targeted namespace(s) apply to cached ingresses and secrets
  • make ingress support configurable and disable by default
  • fix integration testing of tls route
  • unit testing

cc: @openshift/networking @smarterclayton

Sorry, something went wrong.

@marun marun force-pushed the ingress-configured-router branch 15 times, most recently from 83bd1d9 to 54811f8 Compare January 13, 2017 21:18
@marun marun changed the title WIP Add support for router configured by ingress Add support for ingress-configured router Jan 13, 2017
@marun marun force-pushed the ingress-configured-router branch 4 times, most recently from fc7b3bd to 4e34553 Compare January 13, 2017 23:08
@marun
Copy link
Contributor Author

marun commented Jan 13, 2017

This is ready for review.

cc: @knobunc @JacobTanenbaum @ramr

@marun marun force-pushed the ingress-configured-router branch from 4e34553 to 277c406 Compare January 13, 2017 23:11
@marun
Copy link
Contributor Author

marun commented Jan 13, 2017

re-[test]

@@ -63,6 +77,8 @@ func (c *RouterController) Run() {
if c.WatchNodes {
go utilwait.Forever(c.HandleNode, 0)
}
go utilwait.Forever(c.HandleIngress, 0)
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Need to make starting these goroutines conditional on EnableIngress

@marun
Copy link
Contributor Author

marun commented Jan 14, 2017

Also need a unit test for hostname generation to validate that the same hostname will be generated for an ingress and route sharing a namespace and name.

Done

@marun
Copy link
Contributor Author

marun commented Jan 16, 2017

@marun marun force-pushed the ingress-configured-router branch 2 times, most recently from 0cf1aec to 7e79991 Compare January 16, 2017 16:34
@marun
Copy link
Contributor Author

marun commented Jan 16, 2017

It probably makes sense to ensure integration coverage of namespace filtering.

Done

@marun marun force-pushed the ingress-configured-router branch 2 times, most recently from 68cd11d to 35e12fd Compare January 16, 2017 17:01
Copy link
Contributor

@knobunc knobunc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice work Maru. @JacobTanenbaum @rajatchopra @ramr PTAL

@@ -225,7 +225,8 @@ func (o *F5RouterOptions) Run() error {

factory := o.RouterSelection.NewFactory(oc, kc)
watchNodes := (len(o.InternalAddress) != 0 && len(o.VxlanGateway) != 0)
controller := factory.Create(plugin, watchNodes)
// TODO should ingress be configurable for f5?
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can the existing plugin support it? We already set the --enable-ingress on the router, may as well use it here if the router is configured for f5.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ok, I'll enable it. The f5 and template router define their flags separately, so f5 will use --f5-enable-ingress

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done.

for _, tls := range ingressTLS {
// TODO what if a host is matched by more than one IngressTLS instance?

// TODO what if IngressTLS doesn't specify Hosts? There's mention of defaulting to a controller-specific
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should do the same as when a route has no host. i.e. use the run-time set one, or the default if that's not specified.

Copy link
Contributor Author

@marun marun Jan 16, 2017

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

By 'the default', do you mean the generated host name? Currently the host name is generated by the unique_host plugin, so its not currently available when the ingress events are being generated. Should the ingress translator be generating the host name?

I think this is problematic either way. If an ingress is created with rules that lack a host name and tls that requires a specific host name to be applied, the hostname template for a given router could mean the difference between tls being applied or not being applied. Not sure there's any way to solve this, maybe the best that can be done is logging when ingress paths will not have tls applied because no host matches.

Re-reading the code comment, my concern was that the code in its present form can't apply tls that doesn't specify hosts. If an ingress defined a single tls secret without hosts, maybe that tls should be applied to all routes generated from the ingress?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think that is a good solution. And only one blank host should be allowed? Or the first or last in the file is taken?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done. The first blank host is chosen.

// tlsForHost attempts to retrieve ingress tls configuration for the given host
func (it *IngressTranslator) tlsForHost(ingressTLS []extensions.IngressTLS, namespace, host string) *cachedTLS {
for _, tls := range ingressTLS {
// TODO what if a host is matched by more than one IngressTLS instance?
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Don't we claim it for a namespace?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Host claims are the same as for routes. The point here is that there is nothing stopping an ingress from defining tls entries with overlapping hosts:

apiVersion: extensions/v1beta1
kind: Ingress
metadata:
  name: foo
spec:
  tls:
    - apiVersion: extensions/v1beta1
kind: Ingress
metadata:
  name: no-rules-map
spec:
  tls:
    - secretName: secret1
      hosts:
      - foo
    - secretName: secret2
      hosts:
      - foo

In a case like this, which tls configuration should be applied to a generated route with host foo?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done.

// name submitted to the api, but generated routes are only intended to
// be used in the context of the router controller.
//
// TODO should the path be hashed or otherwise encoded for compatibility?
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Compatibility with what?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The name of the route (with - and / replaced with _) is used in haproxy configuration. I'm assuming there are other characters that would be legal in a path that would not be legal in haproxy configuration (e.g. ? & and other characters related to a path with query parameters).

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@knobunc This should be addressed before merge.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we map all but legal characters to _ and then append a hash of the whole thing to ensure uniqueness?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done.

@knobunc knobunc requested a review from ramr January 16, 2017 21:09
@marun marun force-pushed the ingress-configured-router branch 3 times, most recently from 3cd9f76 to 6a99d30 Compare January 17, 2017 03:19
@marun
Copy link
Contributor Author

marun commented Jan 17, 2017

The failing unit test is expecting consistent ordering when iterating over a map. Will fix.

Done

@marun marun force-pushed the ingress-configured-router branch from 37c978f to cee94b5 Compare January 17, 2017 19:35
@marun
Copy link
Contributor Author

marun commented Jan 17, 2017

@marun
Copy link
Contributor Author

marun commented Jan 17, 2017

re-[test]

Copy link
Contributor

@knobunc knobunc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks a lot @marun

Copy link
Contributor

@JacobTanenbaum JacobTanenbaum left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@marun marun force-pushed the ingress-configured-router branch from cee94b5 to aec6e82 Compare January 19, 2017 21:14
@marun marun force-pushed the ingress-configured-router branch from aec6e82 to 0e2fa74 Compare January 19, 2017 21:33
@openshift-bot
Copy link
Contributor

Evaluated for origin test up to 0e2fa74

@openshift-bot
Copy link
Contributor

continuous-integration/openshift-jenkins/test SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pr_origin/13050/) (Base Commit: 9e77cfe)

@knobunc
Copy link
Contributor

knobunc commented Jan 19, 2017

[merge]

@openshift-bot
Copy link
Contributor

openshift-bot commented Jan 19, 2017

continuous-integration/openshift-jenkins/merge SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pr_origin/13050/) (Image: devenv-rhel7_5730)

@openshift-bot
Copy link
Contributor

Evaluated for origin merge up to 0e2fa74

@openshift-bot openshift-bot merged commit 1ccbb6c into openshift:master Jan 20, 2017
@DanyC97
Copy link
Contributor

DanyC97 commented Jan 22, 2017

@marun will be good if we have few notes which describes how it can be used etc

@marun
Copy link
Contributor Author

marun commented Jan 25, 2017

@DanyC97 I'm not sure ingress in openshift is worth using over routes in the near term, since there are functional gaps. This is just the first step in reconciling the two. If you'd like to experiment anyway, you'll need to build a router from master (since it isn't yet released) and:

  • create ingress resources as per the kube docs: https://kubernetes.io/docs/user-guide/ingress/
  • deploy a router and enable ingress support on the dc (e.g. oc env dc/router ROUTER_ENABLE_INGRESS=true)
  • Ensure the router service account can read the cluster's secrets. Ingress relies on secrets to store tls configuration, so this only required for secure connections. This is problematic from a security perspective, though, and is not recommended for production clusters.
    • oadm policy add-cluster-role-to-user cluster-reader system:serviceaccount:default:router
    • oadm policy add-cluster-role-to-user system:service-serving-cert-controller system:serviceaccount:default:router

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants