Skip to content
This repository has been archived by the owner on Jun 19, 2022. It is now read-only.

Add configuration for data residency #1681

Merged
merged 17 commits into from
Sep 19, 2020
Merged
Show file tree
Hide file tree
Changes from 12 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions cmd/controller/wire.go
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ package main
import (
"context"

"github.com/google/knative-gcp/pkg/apis/configs/dataresidency"
"github.com/google/knative-gcp/pkg/apis/configs/gcpauth"
"github.com/google/knative-gcp/pkg/reconciler/events/auditlogs"
"github.com/google/knative-gcp/pkg/reconciler/events/build"
Expand All @@ -39,6 +40,7 @@ func InitializeControllers(ctx context.Context) ([]injection.ControllerConstruct
ClientOptions,
iam.PolicyManagerSet,
wire.Struct(new(gcpauth.StoreSingleton)),
wire.Struct(new(dataresidency.StoreSingleton)),
auditlogs.NewConstructor,
storage.NewConstructor,
scheduler.NewConstructor,
Expand Down
4 changes: 3 additions & 1 deletion cmd/controller/wire_gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

1 change: 1 addition & 0 deletions config/config-data-residency.yaml
56 changes: 56 additions & 0 deletions config/core/configmaps/data-residency.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
# Copyright 2020 The Knative Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

apiVersion: v1
kind: ConfigMap
metadata:
name: config-dataresidency
namespace: cloud-run-events
annotations:
knative.dev/example-checksum: "5e76f9d5"
data:
default-dataresidency-config: |
clusterDefaults:
messagestoragepolicy.allowedpersistenceregions: []
_example: |
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm fine with creating such a placeholder since it does nothing. But I'm looking for more details on how this will be used.

  1. How this configmap will be read? Volume mount? Watch?
  2. Do you allow finer grained control? Like per broker? How it would impact the configmap structure?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I will add the actual code for this configuration to this PR too. For your question:

  1. This is still being discussed, but watch seems better since our system already uses watch for other config maps, also, it provides easier interface for reacting to the change.

  2. Personally I think even if we allow per broker configuration, this will still serve as a default and same configuration will be added to per broker and get reconciled by the broker controller instead.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This PR has been extended to have the full implementation, so to answer this original question:

  1. The configmap is read through watch from Store object.
  2. For now, we only support cluster wide, but we can for sure add per namespace or broker in the future. Note that triggers also create new topics, but topics for retry should be same as the main broker topic.

################################
# #
# EXAMPLE CONFIGURATION #
# #
################################

# This block is not actually functional configuration,
# but serves to illustrate the available configuration
# options and document them in a way that is accessible
# to users that `kubectl edit` this config map.
#
# These sample configuration options may be copied out of
# this example block and unindented to be in the data block
# to actually change the configuration.

# default-dataresidency-config is the configuration for determining the default
# data residency to apply to all objects that require data residency but,
# do not specify it. This is expected to be Channels and Sources.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Remove but, do not specify it. That is already implied by "default data residency".

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fix as suggested.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it's Channels, Sources, and Brokers

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fixed as suggested.

#
# We only support cluster scoped now
default-dataresidency-config: |
# clusterDefaults are the defaults to apply to every namespace in the
# cluster
clusterDefaults:
# messagestoragepolicy.allowedpersistenceregions field specifies
# all the allowed regions for data residency. The default or an empty value will
# mean no data residency requirement.
messagestoragepolicy.allowedpersistenceregions:
- us-east1
- us-west1
1 change: 1 addition & 0 deletions hack/update-codegen.sh
Original file line number Diff line number Diff line change
Expand Up @@ -77,6 +77,7 @@ ${GOPATH}/bin/deepcopy-gen \
--go-header-file ${REPO_ROOT_DIR}/hack/boilerplate/boilerplate.go.txt \
-i github.com/google/knative-gcp/pkg/apis/configs/gcpauth \
-i github.com/google/knative-gcp/pkg/apis/configs/broker \
-i github.com/google/knative-gcp/pkg/apis/configs/dataresidency \

# TODO(yolocs): generate autoscaling v2beta2 in knative/pkg.
OUTPUT_PKG="github.com/google/knative-gcp/pkg/client/injection/kube" \
Expand Down
70 changes: 70 additions & 0 deletions pkg/apis/configs/dataresidency/dataresidency_defaults.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,70 @@
/*
Copyright 2020 Google LLC.

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

https://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

package dataresidency

import (
"encoding/json"
"fmt"

corev1 "k8s.io/api/core/v1"
"sigs.k8s.io/yaml"
)

const (
// configName is the name of config map for the default data residency that
// Sources and brokers should use.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe clearer to say "the default data residency that GCP resources should use"

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fixed as suggested.

configName = "config-dataresidency"

// defaulterKey is the key in the ConfigMap to get the name of the default
// DataResidency setting.
defaulterKey = "default-dataresidency-config"
)

// ConfigMapName returns the name of the configmap to read for default data residency settings.
func ConfigMapName() string {
return configName
}

// NewDefaultsConfigFromConfigMap creates a Defaults from the supplied configMap.
func NewDefaultsConfigFromConfigMap(config *corev1.ConfigMap) (*Defaults, error) {
return NewDefaultsConfigFromMap(config.Data)
}

// NewDefaultsConfigFromMap creates a Defaults from the supplied Map.
func NewDefaultsConfigFromMap(data map[string]string) (*Defaults, error) {
nc := &Defaults{}

// Parse out the data residency configuration.
value, present := data[defaulterKey]
// Data residency configuration is not required, in which case it will mean
// allow all regions, so we simply use an empty one
if !present || value == "" {
return nc, nil
}
if err := parseEntry(value, nc); err != nil {
return nil, fmt.Errorf("failed to parse the entry: %s", err)
}
return nc, nil
}

func parseEntry(entry string, out interface{}) error {
j, err := yaml.YAMLToJSON([]byte(entry))
if err != nil {
return fmt.Errorf("ConfigMap's value could not be converted to JSON: %s : %v", err, entry)
}
return json.Unmarshal(j, &out)
}
160 changes: 160 additions & 0 deletions pkg/apis/configs/dataresidency/dataresidency_defaults_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,160 @@
/*
Copyright 2020 Google LLC.

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

package dataresidency

import (
"testing"

"cloud.google.com/go/pubsub"

"github.com/google/go-cmp/cmp"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"

. "knative.dev/pkg/configmap/testing"
_ "knative.dev/pkg/system/testing"
)

func TestDefaultsConfigurationFromFile(t *testing.T) {
_, example := ConfigMapsFromTestFile(t, configName, defaulterKey)
if _, err := NewDefaultsConfigFromConfigMap(example); err != nil {
t.Errorf("NewDefaultsConfigFromConfigMap(example) = %v", err)
}
}

func TestNewDefaultsConfigFromConfigMap(t *testing.T) {
_, example := ConfigMapsFromTestFile(t, configName, defaulterKey)
defaults, err := NewDefaultsConfigFromConfigMap(example)
if err != nil {
t.Fatalf("NewDefaultsConfigFromConfigMap(example) = %v", err)
}

// Only cluster wide configuration is supported now, but we use the namespace
// as the test name and for future extension.
testCases := []struct {
ns string
regions []string
}{
{
ns: "cluster-wide",
regions: []string{"us-east1", "us-west1"},
},
}

for _, tc := range testCases {
t.Run(tc.ns, func(t *testing.T) {
if diff := cmp.Diff(tc.regions, defaults.AllowedPersistenceRegions()); diff != "" {
t.Errorf("Unexpected value (-want +got): %s", diff)
}
})
}
}

func TestComputeAllowedPersistenceRegions(t *testing.T) {
// Only cluster wide configuration is supported now, but we use the namespace
// as the test name and for future extension.
testCases := []struct {
ns string
topicConfigRegions []string
dsRegions []string
expectedRegions []string
}{
{
ns: "subset",
topicConfigRegions: []string{"us-east1", "us-west1"},
dsRegions: []string{"us-west1"},
expectedRegions: []string{"us-west1"},
},
{
ns: "conflict",
topicConfigRegions: []string{"us-east1"},
dsRegions: []string{"us-west1"},
expectedRegions: []string{"us-west1"},
},
{
ns: "topic-nil",
topicConfigRegions: nil,
dsRegions: []string{"us-west1"},
expectedRegions: []string{"us-west1"},
},
{
ns: "topic-nil-ds-empty",
topicConfigRegions: nil,
dsRegions: []string{},
expectedRegions: nil,
},
{
ns: "ds-empty",
topicConfigRegions: []string{"us-east1"},
dsRegions: []string{},
expectedRegions: []string{"us-east1"},
},
}

for _, tc := range testCases {
t.Run(tc.ns, func(t *testing.T) {
defaults, err := NewDefaultsConfigFromMap(map[string]string{})
if err != nil {
t.Fatalf("NewDefaultsConfigFromConfigMap(empty) = %v", err)
}
defaults.ClusterDefaults.AllowedPersistenceRegions = tc.dsRegions
topicConfig := &pubsub.TopicConfig{}
topicConfig.MessageStoragePolicy.AllowedPersistenceRegions = tc.topicConfigRegions
defaults.ComputeAllowedPersistenceRegions(topicConfig)
if diff := cmp.Diff(tc.expectedRegions, topicConfig.MessageStoragePolicy.AllowedPersistenceRegions); diff != "" {
t.Errorf("Unexpected value (-want +got): %s", diff)
}
})
}
}

func TestNewDefaultsConfigFromConfigMapEmpty(t *testing.T) {
testCases := map[string]struct {
name string
config *corev1.ConfigMap
}{
"empty data": {
config: &corev1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Namespace: "cloud-run-events",
Name: configName,
},
Data: map[string]string{},
},
},
"missing key": {
config: &corev1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Namespace: "cloud-run-events",
Name: configName,
},
Data: map[string]string{
"other-keys": "are-present",
},
},
},
}

for n, tc := range testCases {
t.Run(n, func(t *testing.T) {
_, err := NewDefaultsConfigFromConfigMap(tc.config)
if err != nil {
t.Errorf("Empty value or no key should pass")
}
})
}
}
65 changes: 65 additions & 0 deletions pkg/apis/configs/dataresidency/defaults.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,65 @@
/*
Copyright 2020 Google LLC.

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

package dataresidency

import (
"cloud.google.com/go/pubsub"
)

// Defaults includes the default values to be populated by the Webhook.
type Defaults struct {
// ClusterDefaults are the data residency defaults to use for all namepaces
ClusterDefaults ScopedDefaults `json:"clusterDefaults,omitempty"`
}

// ScopedDefaults are the data residency setting defaults.
type ScopedDefaults struct {
// AllowedPersistenceRegions specifies the regions allowed for data
// storage. Eg "us-east1". An empty configuration means no data residency
// constraints.
AllowedPersistenceRegions []string `json:"messagestoragepolicy.allowedpersistenceregions,omitempty"`
}

// scoped gets the scoped data residency defaults, for now we only have
// cluster scope.
func (d *Defaults) scoped() *ScopedDefaults {
scopedDefaults := &d.ClusterDefaults
// currently we don't support namespace, but if we do, we should check
// namespace default here.
return scopedDefaults
}

// AllowedPersistenceRegions gets the AllowedPersistenceRegions setting in the default.
func (d *Defaults) AllowedPersistenceRegions() []string {
return d.scoped().AllowedPersistenceRegions
}

// ComputeAllowedPersistenceRegions computes the final message storage policy in
// topicConfig. Return true if the topicConfig is updated.
func (d *Defaults) ComputeAllowedPersistenceRegions(topicConfig *pubsub.TopicConfig) bool {
// We can do subset of both in the future, but for now, we just overwrite the
// configuration as the relationship between region and zones are not clear to handle,
// eg. us-east1 vs us-east1-a. Important note: setting the AllowedPersistenceRegions
// to empty string slice is an error, should set it to nil for all regions.
grantr marked this conversation as resolved.
Show resolved Hide resolved
allowedRegions := d.AllowedPersistenceRegions()
if allowedRegions == nil || len(allowedRegions) == 0 {
return false
}

topicConfig.MessageStoragePolicy.AllowedPersistenceRegions = allowedRegions
return true
}
Loading