Skip to content

Latest commit

 

History

History
222 lines (158 loc) · 7.42 KB

DEVELOPMENT.md

File metadata and controls

222 lines (158 loc) · 7.42 KB

Development

This doc explains how to setup a development environment so you can get started contributing to the VMware Sources for Knative. As much as possible we aim to mirror the standard Knative development workflow.

Getting started

  1. Create a GitHub account
  2. Setup GitHub access via SSH
  3. Install requirements
  4. Set up your shell environment
  5. Create and checkout a repo fork

⚠️ Note: For general instructions how to use git(hub) to contribute to an open source project, please see this blog post: Git rebase, squash...oh my!

Requirements

You must install these tools:

  1. go: The language Knative is built in
  2. git: For source control.
  3. ko: The primary Knative development tool.
  4. kubectl: For managing your Kubernetes development environments.
  5. bash v4 or later.

Note: On MacOS the default bash is too old, you can use Homebrew to install a later version.

Environment setup

To get started you'll need to set these environment variables (we recommend adding them to your .bashrc):

  1. GOPATH: If you don't have one, simply pick a directory and add export GOPATH=...

  2. $GOPATH/bin on PATH: This is so that tooling installed via go get will work properly.

  3. KO_DOCKER_REPO: This should be set to an authenticated Docker repo where you can publish container images during development, e.g. docker.io/${USER} or kind.local when developing with kind

.bashrc example:

export GOPATH="$HOME/go"
export PATH="${PATH}:${GOPATH}/bin"
export KO_DOCKER_REPO="docker.io/${USER}"

Checkout your fork

The Go tools require that you clone the repository to the src/github.con/vmware-tanzu/sources-for-knative directory in your GOPATH.

To check out this repository:

  1. Create your own fork of this repo

  2. Clone it to your machine:

mkdir -p ${GOPATH}/src/github.com/vmware-tanzu
cd ${GOPATH}/src/github.com/vmware-tanzu
git clone [email protected]:${USER}/sources-for-knative.git
cd sources-for-knative
git remote add upstream https://github.com/vmware-tanzu/sources-for-knative.git
git remote set-url --push upstream no_push

Note: Adding the upstream remote sets you up nicely for regularly syncing your fork.

Once you reach this point you are ready to do a full build and deploy as described below.

Deploy sources-for-knative to a Kubernetes cluster

To deploy to the active kubectl context, run the following:

ko apply -BRf config

This will build all of the Go binaries into containers, publish them to your KO_DOCKER_REPO and deploy them to the active kubectl context.

Note: The dependency on an external container registry can be avoided if you run ko in a kind environment, as described here.

Code Generation

As you make changes to the code-base, there are two special cases to be aware of:

These are both idempotent, and we expect that running these at HEAD to have no diffs.

Boilerplate

All *.go and *.sh files, excluding vendor and third_party, must have the required boilerplate headers, e.g. copyrights.

Contributors can use the add-boilerplate.sh script in hack/boilerplate to update newly added files accordingly.

Running the adapter on your local machine

Sometimes you might want to develop against a VMware vSphere environment that is not accessible from your development cluster. You can run the receive adapter (the data plane for the events) locally in such cases (as opposed to running it within a Kubernetes environment).

⚠️ Note that you will still need a Kubernetes cluster to use for the ConfigMap-based bookmarking (issue).

Store the credentials on the filesystem in a custom path:

export VC_SECRET_PATH=var/bindings/vsphere
mkdir -p $VC_SECRET_PATH
echo -n '[email protected]' > $VC_SECRET_PATH/username
echo -n 'mysuper$ecretPassword' > $VC_SECRET_PATH/password

Point at a configmap to use on your active kubectl context and namespace for bookmarking (event replay):

export NAMESPACE=default
export VSPHERE_KVSTORE_CONFIGMAP=vsphere-test

Then set up the necessary env variables:

export K_METRICS_CONFIG={}
export K_LOGGING_CONFIG={}
export VC_URL=<your vsphere url>
export VC_INSECURE=true

Then specify where the source should send events to

export K_SINK=http://localhost:8080

If you are using GKE for your bookmarking configmap, uncomment the following line in cmd/adapter/main.go:

// Uncomment if you want to run locally against remote GKE cluster.
// _ "k8s.io/client-go/plugin/pkg/client/auth/gcp"

And then finally run the receive adapter, which will use the settings from your .kubeconfig file:

go run ./cmd/sources-for-knative-adapter/main.go

Local development notes with KinD

This section describes how to develop with KinD as your Kubernetes cluster (requires Docker).

First install KinD, and create a cluster:

GO111MODULE="on" go install sigs.k8s.io/kind@latest && kind create cluster

Make sure the KinD cluster is your active kubectl context:

kubectl config use-context kind-kind

Then install Knative Serving/Eventing on it following the standard instructions.

⚠️ Note: If you are using a private registry for development you will need to pre create a ServiceAccount that have the required info and set the Spec.ServiceAccountName parameter.

You can also grant the default ServiceAccount access to your private repository. For GKE you would do it like so:

SA_EMAIL=$(gcloud iam service-accounts --format='value(email)' create k8s-gcr-auth-ro)
gcloud iam service-accounts keys create k8s-gcr-auth-ro.json --iam-account=$SA_EMAIL

PROJECT=$(gcloud config list core/project --format='value(core.project)')
gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$SA_EMAIL --role roles/storage.objectViewer

kubectl --context kind-kind -n vmware-sources create secret docker-registry image-secrets --docker-server=https://gcr.io   --docker-username=_json_key [email protected] --docker-password="$(cat k8s-gcr-auth-ro.json)"
kubectl --context kind-kind -n vmware-sources patch serviceaccount controller -p "{\"imagePullSecrets\": [{\"name\": \"image-secrets\"}]}"

You can then iterate using the standard workflow as described above:

ko apply -BRf ./config