Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[#301] Replace leader-for-life leader election with leader-for-lease #306

Merged
merged 2 commits into from
Apr 26, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions .github/workflows/go.yml
Original file line number Diff line number Diff line change
Expand Up @@ -24,10 +24,10 @@ jobs:
- name: Build
run: make build
- name: Set up Minikube
uses: manusa/actions-setup-minikube@v2.9.0
uses: manusa/actions-setup-minikube@v2.10.0
with:
minikube version: v1.31.2
kubernetes version: v1.24.0
kubernetes version: v1.25.0
driver: docker
- name: Load WildFly images used for testing
run: |-
Expand Down
2 changes: 1 addition & 1 deletion config/manager/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,5 +12,5 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
images:
- name: controller
newName: quay.io/wildfly/wildfly-operator
newName: localhost:5000/wildfly-operator
newTag: latest
4 changes: 2 additions & 2 deletions config/rbac/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@ resources:
- service_account.yaml
- role.yaml
- role_binding.yaml
#- leader_election_role.yaml
#- leader_election_role_binding.yaml
- leader_election_role.yaml
- leader_election_role_binding.yaml
# Comment the following 4 lines if you want to disable
# the auth proxy (https://github.com/brancz/kube-rbac-proxy)
# which protects your /metrics endpoint.
Expand Down
2 changes: 1 addition & 1 deletion config/rbac/leader_election_role.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: leader-election-role
name: wildfly-op-leader-role
rules:
- apiGroups:
- ""
Expand Down
8 changes: 4 additions & 4 deletions config/rbac/leader_election_role_binding.yaml
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: leader-election-rolebinding
name: wildfly-op-leader-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: leader-election-role
name: wildfly-op-leader-role
subjects:
- kind: ServiceAccount
name: default
namespace: system
name: wildfly-operator

18 changes: 8 additions & 10 deletions main.go
Original file line number Diff line number Diff line change
Expand Up @@ -17,19 +17,19 @@ limitations under the License.
package main

import (
"context"
"flag"
"fmt"
"github.com/RHsyseng/operator-utils/pkg/utils/openshift"
"go.uber.org/zap/zapcore"
"os"
goruntime "runtime"
"time"

// Import all Kubernetes client auth plugins (e.g. Azure, GCP, OIDC, etc.)
// to ensure that exec-entrypoint and run can make use of them.
_ "k8s.io/client-go/plugin/pkg/client/auth"

route "github.com/openshift/api/route/v1"
"github.com/operator-framework/operator-lib/leader"
monitoringv1 "github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring/v1"
wildflyv1alpha1 "github.com/wildfly/wildfly-operator/api/v1alpha1"
"github.com/wildfly/wildfly-operator/controllers"
Expand Down Expand Up @@ -90,13 +90,8 @@ func main() {
}
setupLog.Info("Watching namespace", "namespace", namespace)

if enableLeaderElection {
err = leader.Become(context.TODO(), "t3dv81741s.wildfly-operator-lock")
if err != nil {
setupLog.Error(err, "Failed to retry for leader lock")
os.Exit(1)
}
}
leaseDuration := 30 * time.Second
renewDeadline := 20 * time.Second

setupLog.Info("Starting the Manager")
mgr, err := ctrl.NewManager(ctrl.GetConfigOrDie(), ctrl.Options{
Expand All @@ -105,7 +100,10 @@ func main() {
Port: 9443,
Namespace: namespace,
HealthProbeBindAddress: probeAddr,
LeaderElection: false,
LeaderElection: enableLeaderElection,
LeaderElectionID: "8kr4rta7hq.wildfly-operator-lock",
LeaseDuration: &leaseDuration,
RenewDeadline: &renewDeadline,
Logger: ctrl.Log.WithName("manager"),
})
if err != nil {
Expand Down
29 changes: 19 additions & 10 deletions test/e2e/suite_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,6 @@ import (
wildflyv1alpha1 "github.com/wildfly/wildfly-operator/api/v1alpha1"
"github.com/wildfly/wildfly-operator/controllers"
"io"
"io/ioutil"
appsv1 "k8s.io/api/apps/v1"
corev1 "k8s.io/api/core/v1"
rbacv1 "k8s.io/api/rbac/v1"
Expand All @@ -37,14 +36,15 @@ import (
"k8s.io/apimachinery/pkg/types"
"k8s.io/client-go/kubernetes"
"k8s.io/client-go/kubernetes/scheme"
"k8s.io/utils/pointer"
"k8s.io/utils/ptr"
"log"
"os"
"path/filepath"
"regexp"
ctrl "sigs.k8s.io/controller-runtime"
logf "sigs.k8s.io/controller-runtime/pkg/log"
"sigs.k8s.io/controller-runtime/pkg/log/zap"
"sigs.k8s.io/yaml"
"strings"
"testing"
"time"
Expand All @@ -66,8 +66,8 @@ var (
testEnv *envtest.Environment
operator *appsv1.Deployment
serviceAccount *corev1.ServiceAccount
role *rbacv1.Role
roleBinding *rbacv1.RoleBinding
roles []*rbacv1.Role
roleBindings []*rbacv1.RoleBinding
)

const (
Expand All @@ -94,7 +94,7 @@ var _ = BeforeSuite(func() {

log.Printf("Start testing deploying the Operator")
testEnv = &envtest.Environment{
UseExistingCluster: pointer.BoolPtr(true),
UseExistingCluster: ptr.To(true),
CRDDirectoryPaths: []string{filepath.Join("..", "..", "config", "crd", "bases")},
CRDInstallOptions: envtest.CRDInstallOptions{CleanUpAfterUse: true},
ErrorIfCRDPathMissing: true,
Expand All @@ -104,7 +104,7 @@ var _ = BeforeSuite(func() {
cfg, k8sClient = initialSetup()

// load resources for tests generated by kustomize
data, err := ioutil.ReadFile("../../dry-run/test-resources.yaml")
data, err := os.ReadFile("../../dry-run/test-resources.yaml")
if err != nil {
log.Fatal(err)
}
Expand All @@ -118,20 +118,29 @@ var _ = BeforeSuite(func() {
case "ServiceAccount":
serviceAccount = obj.(*corev1.ServiceAccount)
case "Role":
role = obj.(*rbacv1.Role)
roles = append(roles, obj.(*rbacv1.Role))
case "RoleBinding":
roleBinding = obj.(*rbacv1.RoleBinding)
roleBindings = append(roleBindings, obj.(*rbacv1.RoleBinding))
default:
// unexpected type, ignore
}
}

// Print the deployment YAML to the console to helps debugging
deploymentYAML, err := yaml.Marshal(operator)
if err != nil {
fmt.Println("Error converting deployment to YAML:", err)
return
}

// Print the deployment YAML
fmt.Println(string(deploymentYAML))
} else {

// When we are running the test in local, we do not deploy the Operator
// web run the manager directly from the test suite
testEnv = &envtest.Environment{
UseExistingCluster: pointer.BoolPtr(true),
UseExistingCluster: ptr.To(true),
CRDDirectoryPaths: []string{
filepath.Join("..", "..", "config", "crd", "bases"),
},
Expand All @@ -146,7 +155,7 @@ var _ = BeforeSuite(func() {
os.Setenv("OPERATOR_NAME", "wildfly-operator")
os.Setenv("JBOSS_BOOTABLE_HOME", "/opt/jboss/container/wildfly-bootable-jar-server")

// start the manager and reconciler
// start the manager and reconcile
k8sManager, err := ctrl.NewManager(ctrl.GetConfigOrDie(), ctrl.Options{
Scheme: scheme.Scheme,
MetricsBindAddress: "0.0.0.0:8383",
Expand Down
20 changes: 13 additions & 7 deletions test/e2e/wildflyserver_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -46,14 +46,19 @@ var _ = Describe("WildFly Server tests", func() {
Expect(err).ToNot(HaveOccurred())

log.Printf("Creating the Role")
roleHolder := role.DeepCopy()
err = k8sClient.Create(ctx, roleHolder)
Expect(err).ToNot(HaveOccurred())
for _, role := range roles {
log.Printf("Creating the Role %s", role.Name)
roleHolder := role.DeepCopy()
err = k8sClient.Create(ctx, roleHolder)
Expect(err).ToNot(HaveOccurred())
}

log.Printf("Creating the Role Binding")
rbHolder := roleBinding.DeepCopy()
err = k8sClient.Create(ctx, rbHolder)
Expect(err).ToNot(HaveOccurred())
for _, roleBindings := range roleBindings {
log.Printf("Creating the Role Binding %s", roleBindings.Name)
rbHolder := roleBindings.DeepCopy()
err = k8sClient.Create(ctx, rbHolder)
Expect(err).ToNot(HaveOccurred())
}

log.Printf("Creating the operator")
opHolder := operator.DeepCopy()
Expand Down Expand Up @@ -97,6 +102,7 @@ var _ = Describe("WildFly Server tests", func() {

log.Printf("Creating %s resource", server.Name)
Expect(k8sClient.Create(ctx, server)).Should(Succeed())

WaitUntilReady(ctx, k8sClient, server)

log.Printf("Scalling the server to 2 replicas")
Expand Down
Loading
Loading