Crossplane provider for managing resources on exoscale.com.
Documentation: https://vshn.github.io/provider-exoscale/
docker
go
helm
kubectl
yq
sed
(orgsed
for Mac)
Some other requirements (e.g. kind
) will be compiled on-the-fly and put in the local cache dir .kind
as needed.
make build
to build the binary and docker imagemake generate
to (re)generate additional code artifactsmake test
run test suitemake local-install
to install the operator in local clustermake install-samples
to run the provider in local cluster and apply sample manifestsmake run-operator
to run the code in operator mode against your current kubecontext
See all targets with make help
- Get an API token exoscale.com
export EXOSCALE_API_KEY=<the-key>
export EXOSCALE_API_SECRET=<the-secret>
make local-install
The provider comes with mutating and validation admission webhook server.
-
make local-debug
-
Set the right host ip:
HOSTIP=$(docker inspect kindev-control-plane | jq '.[0].NetworkSettings.Networks.kind.Gateway') # On kind MacOS/Windows HOSTIP=host.docker.internal # On Docker Desktop distributions HOSTIP=host.lima.internal # On Lima backed Docker distributions For Linux users: `ip -4 addr show dev docker0 | grep inet | awk -F' ' '{print $2}' | awk -F'/' '{print $1}'`
-
Get an Exoscale API secret and key and create the following secret:
EXOSCALE_API_KEY=<your api key> EXOSCALE_API_SECRET=<your api secret> kubectl -n crossplane-system create secret generic api-secret-1 --from-literal=EXOSCALE_API_KEY="$EXOSCALE_API_KEY" --from-literal=EXOSCALE_API_SECRET="$EXOSCALE_API_SECRET"
-
Run the debug target:
make webhook-debug -e webhook_service_name=$HOSTIP
-
Run the operator from IDE in debug mode with env variable:
WEBHOOK_TLS_CERT_DIR=.kind # or full path if does not work
For detailed information on how Crossplane Provider works from a development perspective check provider mechanics documentation page.
Some scenarios are tested with the Kubernetes E2E testing tool Kuttl.
Kuttl is basically comparing the installed manifests (usually files named ##-install*.yaml
) with observed objects and compares the desired output (files named ##-assert*.yaml
).
To execute tests, run make test-e2e
from the root dir.
If a test fails, kuttl leaves the resources in the kind-cluster intact, so you can inspect the resources and events if necessary.
Please note that Kubernetes Events from cluster-scoped resources appear in the default
namespace only, but kubectl describe ...
should show you the events.
If tests succeed, the relevant resources are deleted to not use up costs on the cloud providers.
Usually make clean
ensures that buckets and users are deleted before deleting the kind cluster, provided the operator is running in kind cluster.
Alternatively, make .e2e-test-clean
also removes all buckets
and iamkeys
.
To cleanup manually on portal.exoscale.com, search for resources that begin with or contain e2e
in the name.