Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Egress Lockdown: Enable and Toggle #1973

Merged
merged 1 commit into from
Feb 23, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 0 additions & 4 deletions pkg/api/admin/openshiftcluster_validatestatic.go
Original file line number Diff line number Diff line change
Expand Up @@ -33,9 +33,5 @@ func (sv *openShiftClusterStaticValidator) validateDelta(oc, current *OpenShiftC
return api.NewCloudError(http.StatusBadRequest, api.CloudErrorCodeInvalidParameter, "properties.maintenanceTask", "Invalid enum parameter.")
}

if current.Properties.FeatureProfile.GatewayEnabled && !oc.Properties.FeatureProfile.GatewayEnabled {
return api.NewCloudError(http.StatusBadRequest, api.CloudErrorCodePropertyChangeNotAllowed, "properties.featureProfile.gatewayEnabled", "Changing property 'properties.featureProfile.gatewayEnabled' is not allowed.")
}

return nil
}
19 changes: 12 additions & 7 deletions pkg/api/admin/openshiftcluster_validatestatic_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -129,29 +129,34 @@ func TestOpenShiftClusterStaticValidateDelta(t *testing.T) {
wantErr: "400: PropertyChangeNotAllowed: properties.lastAdminUpdateError: Changing property 'properties.lastAdminUpdateError' is not allowed.",
},
{
name: "valid gatewayEnabled change",
name: "disable gatewayEnabled on enabled clusters is allowed",
oc: func() *OpenShiftCluster {
return &OpenShiftCluster{}
return &OpenShiftCluster{
Properties: OpenShiftClusterProperties{
FeatureProfile: FeatureProfile{
GatewayEnabled: true,
},
},
}
},
modify: func(oc *OpenShiftCluster) {
oc.Properties.FeatureProfile.GatewayEnabled = true
oc.Properties.FeatureProfile.GatewayEnabled = false
},
},
{
name: "valid gatewayEnabled change",
name: "enable gatewayEnabled on disabled clusters is allowed",
oc: func() *OpenShiftCluster {
return &OpenShiftCluster{
Properties: OpenShiftClusterProperties{
FeatureProfile: FeatureProfile{
GatewayEnabled: true,
GatewayEnabled: false,
},
},
}
},
modify: func(oc *OpenShiftCluster) {
oc.Properties.FeatureProfile.GatewayEnabled = false
oc.Properties.FeatureProfile.GatewayEnabled = true
},
wantErr: "400: PropertyChangeNotAllowed: properties.featureProfile.gatewayEnabled: Changing property 'properties.featureProfile.gatewayEnabled' is not allowed.",
},
{
name: "console url change is not allowed",
Expand Down
7 changes: 3 additions & 4 deletions pkg/frontend/openshiftcluster_putorpatch.go
Original file line number Diff line number Diff line change
Expand Up @@ -84,10 +84,9 @@ func (f *frontend) _putOrPatchOpenShiftCluster(ctx context.Context, log *logrus.
},
},
}
// TODO (BV): reenable gateway on create once we fix bugs
// if !f.env.IsLocalDevelopmentMode() /* not local dev or CI */ {
// doc.OpenShiftCluster.Properties.FeatureProfile.GatewayEnabled = true
// }
if !f.env.IsLocalDevelopmentMode() /* not local dev or CI */ {
doc.OpenShiftCluster.Properties.FeatureProfile.GatewayEnabled = true
}
}

doc.CorrelationData = correlationData
Expand Down
2 changes: 1 addition & 1 deletion pkg/frontend/openshiftcluster_putorpatch_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -719,7 +719,7 @@ func TestPutOrPatchOpenShiftCluster(t *testing.T) {
EncryptionAtHost: api.EncryptionAtHostDisabled,
},
FeatureProfile: api.FeatureProfile{
GatewayEnabled: false,
GatewayEnabled: true,
},
OperatorFlags: api.DefaultOperatorFlags.Copy(),
},
Expand Down
10 changes: 6 additions & 4 deletions pkg/operator/deploy/deploy.go
Original file line number Diff line number Diff line change
Expand Up @@ -175,10 +175,12 @@ func (o *operator) resources() ([]kruntime.Object, error) {
},
}

// TODO (BV): reenable gateway once we fix bugs
// if o.oc.Properties.NetworkProfile.GatewayPrivateEndpointIP != "" {
// cluster.Spec.GatewayDomains = append(o.env.GatewayDomains(), o.oc.Properties.ImageRegistryStorageAccountName+".blob."+o.env.Environment().StorageEndpointSuffix)
// }
if o.oc.Properties.FeatureProfile.GatewayEnabled && o.oc.Properties.NetworkProfile.GatewayPrivateEndpointIP != "" {
cluster.Spec.GatewayDomains = append(o.env.GatewayDomains(), o.oc.Properties.ImageRegistryStorageAccountName+".blob."+o.env.Environment().StorageEndpointSuffix)
SudoBrendan marked this conversation as resolved.
Show resolved Hide resolved
} else {
// covers the case of an admin-disable, we need to update dnsmasq on each node
cluster.Spec.GatewayDomains = make([]string, 0)
}

// create a secret here for genevalogging, later we will copy it to
// the genevalogging namespace.
Expand Down
49 changes: 49 additions & 0 deletions test/e2e/cluster.go
Original file line number Diff line number Diff line change
Expand Up @@ -83,6 +83,18 @@ var _ = Describe("Cluster smoke test", func() {
return ready.ServiceIsReady(svc)
}, 5*time.Minute, 10*time.Second).Should(BeTrue())
})

// mainly we want to test the gateway/egress functionality - this request for the image will travel from
// node > gateway > storage account of the registry.
Specify("Can access and use the internal container registry", func() {
ctx := context.Background()
deployName := "internal-registry-deploy"
err := createContainerFromInternalContainerRegistryImage(ctx, clients.Kubernetes, deployName)
Expect(err).NotTo(HaveOccurred())

err = wait.PollImmediate(10*time.Second, 5*time.Minute, ready.CheckDeploymentIsReady(ctx, clients.Kubernetes.AppsV1().Deployments(testNamespace), deployName))
Expect(err).NotTo(HaveOccurred())
})
})

func createStatefulSet(ctx context.Context, cli kubernetes.Interface) error {
Expand Down Expand Up @@ -167,3 +179,40 @@ func createLoadBalancerService(ctx context.Context, cli kubernetes.Interface, na
_, err := cli.CoreV1().Services(testNamespace).Create(context.Background(), svc, metav1.CreateOptions{})
return err
}

func createContainerFromInternalContainerRegistryImage(ctx context.Context, cli kubernetes.Interface, name string) error {
deploy := &appsv1.Deployment{
ObjectMeta: metav1.ObjectMeta{
Name: name,
Namespace: testNamespace,
},
Spec: appsv1.DeploymentSpec{
Replicas: to.Int32Ptr(1),
Selector: &metav1.LabelSelector{
MatchLabels: map[string]string{
"app": name,
},
},
Template: corev1.PodTemplateSpec{
ObjectMeta: metav1.ObjectMeta{
Labels: map[string]string{"app": name},
},
Spec: corev1.PodSpec{
Containers: []corev1.Container{
{
Name: "cli",
Image: "image-registry.openshift-image-registry.svc:5000/openshift/cli",
Command: []string{
"/bin/sh",
"-c",
"while true; do sleep 1; done",
},
},
},
},
},
},
}
_, err := cli.AppsV1().Deployments(testNamespace).Create(context.Background(), deploy, metav1.CreateOptions{})
return err
}