-
Notifications
You must be signed in to change notification settings - Fork 359
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sealer Application definition #1658
Sealer Application definition #1658
Conversation
64afa51
to
c3d0026
Compare
Codecov ReportBase: 18.37% // Head: 19.89% // Increases project coverage by
Additional details and impacted files@@ Coverage Diff @@
## main #1658 +/- ##
==========================================
+ Coverage 18.37% 19.89% +1.52%
==========================================
Files 66 69 +3
Lines 5372 6478 +1106
==========================================
+ Hits 987 1289 +302
- Misses 4258 5012 +754
- Partials 127 177 +50
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. ☔ View full report at Codecov. |
b8ba2e3
to
578eb2b
Compare
func (kp *KubefileParser) ParseKubefile(rwc io.Reader) (*KubefileResult, error) { | ||
result, err := parse(rwc) | ||
if err != nil { | ||
return nil, fmt.Errorf("failed to parse dockerfile: %v", err) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
s/dockerfile/Kubefile
I still wish to see more illustration in the pull request description. Actually this is a quite large pr, more design info could help review a lot. @justadogistaken |
578eb2b
to
3a63902
Compare
ce0d0a0
to
d74a47b
Compare
build/buildimage/differ.go
Outdated
@@ -84,6 +86,112 @@ func NewRegistryDiffer(platform v1.Platform) Differ { | |||
} | |||
} | |||
|
|||
func parseApplicationImages(srcPath string) ([]string, error) { | |||
// TODO this should be global | |||
applicationPath := filepath.Join(srcPath, "application/apps") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actually, we need to have a rootfs
pkg or manager to provide the application path relative to rootfs.(Make it TODO?)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In runtime and it sub module, It provide by private func such as: getRootfs or something. It duplicate with other module in runtime. I think have a public pkg to manage path is a good suggestion!
Thanks for your providing more details in pull request description. While, I think we should pay more energy on APPLICATION related primitives definition. And we already see the detailed implementation of your way. Design comes first, and then the implementation. Back to your design in the picture, I feel a little bit more complicated than Dockerfile's primitives. Taking
Wish to get more feedback. @justadogistaken |
Here are my considerations for current design:
|
I could understand your concern. While I insist on simplify as much as possible for the user-facing interface. With my principle, I think it is a mind-consuming way to add flag thing in APP command. @justadogistaken |
@allencloud I'm just afraid that this will need us to do application type detection, which may have potential problems. Currently our cases are not complicated. But I can't think of any issus for now. We can remove the flag in the first version. When the use cases become more complicated, we may need to propose some limitations. |
d74a47b
to
1ac4567
Compare
b7b07c3
to
761aa01
Compare
@sealerio/sealer-maintainers kube-installer:
app-installer:
The type attribute will be inherited. |
nice,It's clear to distinguish the different image types, i have a little confusion about this:
|
@kakaZhou719 |
// See the License for the specific language governing permissions and | ||
// limitations under the License. | ||
|
||
package command |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am afraid that in the future we could replace command with instruction. WDYT?
build/kubefile/parser/utils.go
Outdated
) | ||
|
||
const ( | ||
schemaLocal = "local://" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
scheme, rather than schema.
https://datacadamia.com/web/resource/scheme
build/kubefile/parser/utils.go
Outdated
} | ||
|
||
chartInTargetsRoot := 0 | ||
oneOfChatsArtifact := func(str string) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
s/Chats/Charts/ ?
if len(strs) < 2 { | ||
return listFlag{}, errors.New("flags should be like --flag=[value] or --flag=value") | ||
} | ||
key, values := strs[0], strs[1] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
When setting flags, I think there will be some possibility that a char =
exists in the item value. If that, there will be strs[2] and so on. Then the code here seems to be incorrect.
How about adding an unit test for this function?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I added the ut.
And I think there is no need to cover all cases.
If there is =
exists in value, let it be. It will be error in the next process.
7f07cfa
to
35cf7bd
Compare
@sealerio/sealer-maintainers PTAL. |
There can be only one `LAUNCH` or `CMDS` instruction in a `Kubefile`. | ||
|
||
### CMDS |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How about just naming as CMD
instead of CMDS
? Here is my reasons:
- Telling users that Kubefile only allows users to input one command. One command could be quite strict for users to understand;
- Command format seems to be shell scripts. If end users wish to let command play several roles, users could use
&&
to combine commands; - It is explicit that what is the running/exit status of command. If there are serveral commands, I think it becomes harder to explain what is the status of commands running.
In addition, is the CMD only allowed to execute towards k8s/k3s/k0s APIServer? Or CMD is allowed to run towards Linux Kernel, which seems weird? After all we are cluster application oriented.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm ok with CMD
or CMDS
.
I think it's fine to define several cmds in CMD
like CMD ["kubectl ...", "kubectl ..."]
. And of course user can do like CMD ["kubectl xxx && kubectl xxxxx"]
.
CMD
will exec over master0 machine, so it can be executed towards apiserver and Linux kernel both. IMO, CMD
is just an reserved instruction, which is not recommended.
if err != nil { | ||
return "", errors.Wrapf(err, "error creating file to target %s for %s", target, src) | ||
} | ||
defer func() { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
defer f.Close()
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Our ci check will give a warning here, which make it fail to pass ci.
Signed-off-by: david.bao <[email protected]>
Signed-off-by: David Bao <[email protected]>
35cf7bd
to
e58e643
Compare
e58e643
to
51913ef
Compare
LGTM |
Design
Overview
Implementation
KubefileParser
kubefileParser has the three major attributions
appRootPathFunc
,appConfigRootPathFunc
,imageEngine
.appRootPathFunc and appConfigRootPathFunc will return the path relative to the
sealer rootfs
. Currently they will be$ROOTFS/application/apps/[helm|kube]/$appname/
and$ROOTFS/application/configs/[helm|kube]/$appname/
respectively.As for
imageEngine
, we need this to pull theFROM image
(name it fromImage). Because there are some definitions of application stored in the fromImage, we need to merge the definitions of application from fromImage and current definitions of application (the merge strategy is overwrite the existing application, and reserve the other applications).We implement the Kubefile based on Dockerfile.
There are some special operations:
ADD https://xxx application/apps/[helm|kube]/$appname/
COPY xxx application/apps/[helm|kube]/$appname/
APP could specify multiple sources, so if there are two types of sources for
APP
, it will generate two instructions(COPY and ADD)TODOs:
Note
I put configurations of a app into a
application/configs/[kube|helm]/[appname]
and other app artifact intoapplication/apps[kube|helm]/[appname]
.I didn't complete the env or config for applications in the work. Currently the
helm -f env.yaml
will be rendered. I will have a detailed design forenv/config
. In that work, it will distinguish app-env, scripts-env and so on...Additional
application
cmd, to support checking info of application.Example
dockerfile
andapplication&launch cmds
dockerfile:
application: {configurations, name, type}
launch cmds: [
kubectl apply -f mysql/,
]
application&launch cmds
will be stored into annotation of image.