Crossplane provider for managing resources on exoscale.com.
Documentation: https://vshn.github.io/provider-exoscale/
dockergohelmkubectlyqsed(orgsedfor Mac)
Some other requirements (e.g. kind) will be compiled on-the-fly and put in the local cache dir .kind as needed.
make buildto build the binary and docker imagemake generateto (re)generate additional code artifactsmake testrun test suitemake local-installto install the operator in local clustermake install-samplesto run the provider in local cluster and apply sample manifestsmake run-operatorto run the code in operator mode against your current kubecontext
See all targets with make help
- Get an API token exoscale.com
export EXOSCALE_API_KEY=<the-key>export EXOSCALE_API_SECRET=<the-secret>make local-install
The provider comes with mutating and validation admission webhook server.
-
make local-debug -
Set the right host ip:
HOSTIP=$(docker inspect kindev-control-plane | jq '.[0].NetworkSettings.Networks.kind.Gateway') # On kind MacOS/Windows HOSTIP=host.docker.internal # On Docker Desktop distributions HOSTIP=host.lima.internal # On Lima backed Docker distributions For Linux users: `ip -4 addr show dev docker0 | grep inet | awk -F' ' '{print $2}' | awk -F'/' '{print $1}'`
-
Get an Exoscale API secret and key and create the following secret:
EXOSCALE_API_KEY=<your api key> EXOSCALE_API_SECRET=<your api secret> kubectl -n crossplane-system create secret generic api-secret-1 --from-literal=EXOSCALE_API_KEY="$EXOSCALE_API_KEY" --from-literal=EXOSCALE_API_SECRET="$EXOSCALE_API_SECRET"
-
Run the debug target:
make webhook-debug -e webhook_service_name=$HOSTIP -
Run the operator from IDE in debug mode with env variable:
WEBHOOK_TLS_CERT_DIR=.kind # or full path if does not work
For detailed information on how Crossplane Provider works from a development perspective check provider mechanics documentation page.
Some scenarios are tested with the Kubernetes E2E testing tool Kuttl.
Kuttl is basically comparing the installed manifests (usually files named ##-install*.yaml) with observed objects and compares the desired output (files named ##-assert*.yaml).
To execute tests, run make test-e2e from the root dir.
If a test fails, kuttl leaves the resources in the kind-cluster intact, so you can inspect the resources and events if necessary.
Please note that Kubernetes Events from cluster-scoped resources appear in the default namespace only, but kubectl describe ... should show you the events.
If tests succeed, the relevant resources are deleted to not use up costs on the cloud providers.
Usually make clean ensures that buckets and users are deleted before deleting the kind cluster, provided the operator is running in kind cluster.
Alternatively, make .e2e-test-clean also removes all buckets and iamkeys.
To cleanup manually on portal.exoscale.com, search for resources that begin with or contain e2e in the name.