Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

## Description #1080

Closed
wants to merge 29 commits into from
Closed

## Description #1080

wants to merge 29 commits into from

Conversation

amuraru
Copy link
Contributor

@amuraru amuraru commented Apr 8, 2024

Please provide a meaningful description of what this change will do, or is for. Bonus points for including links to
related issues, other PRs, or technical references.

Note that by not including a description, you are asking reviewers to do extra work to understand the context of this
change, which may lead to your PR taking much longer to review, or result in it not being reviewed at all.

Type of Change

  • Bug Fix
  • New Feature
  • Breaking Change
  • Refactor
  • Documentation
  • Other (please describe)

Checklist

  • I have read the contributing guidelines
  • Existing issues have been referenced (where applicable)
  • I have verified this change is not present in other open pull requests
  • Functionality is documented
  • All code style checks pass
  • New code contribution is covered by automated tests
  • All new and existing tests pass

alungu and others added 25 commits December 12, 2023 05:15
As part of banzaicloud#929, the local
replacement for sub-modules was removed in favor of using valid tags.
Adobe Koperator fork has some internal changes in the api sub-module,
so we need to use the local version of the sub-module instead of
the upstream version, so we are  forced to revert the changes from banzaicloud#929.
…adobe/kafka docker hub repos

- build the koperator docker image
- build Apache kafka docker image
When `kafka-*` tags are created a github action is triggered
to build and push a new adobe/kafka docker image version
Allow broker libs injector to copy jars into KAFKA_HOME
We made some chnages for spinnaker annotations and `preserveUnknownFields` that would be overriden by `make manifests`
…ised.listeners configuration

This is needed for old clients connecting to kafka through Zookeeper that does not have a way
to infer the right listener.
In this case, the first listener in the advertised.listener config is used to connect to brokers.
This patch ensures the external listeners (those reachable from outside) are listed before internal ones
…and clients

1/ Kafka broker defines connections.max.idle.ms=600s
To ensure envoy as a client for kafka broker is terminating
the connection first to avoid network disconnects
this patch is setting the idleTimeout to value slightly less
than that

2/ Enable tcp-keep alive for all TCP connections established by envoy to kafka
and to client (or fronting Load Balancer)
Added explicit typeconfig for envoy.filters.http.router

```
[2022-06-16 13:27:58.425][1][info][main] [source/server/server.cc:939] exiting
Didn't find a registered implementation for 'envoy.filters.http.router' with type URL: ''
```
* Implement disk removal feature

---------

Co-authored-by: Alex Necula <[email protected]>
* Handle the case when the request to CC STATE endpoint returns the async task instead of the result

When the request on /state endpoint of CC takes longer than webserver.request.maxBlockTimeMs,
then CC will convert the request into an async task and will respond with the taskID instead
of the result. The Koperator should handle this case by waiting for CC to complete the task.
Co-authored-by: Petruț™ <[email protected]>
* Added arm64 to docker build platforms

* Regenerated headers for 2024
@amuraru amuraru requested a review from a team as a code owner April 8, 2024 13:02
@CLAassistant
Copy link

CLAassistant commented Apr 8, 2024

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you all sign our Contributor License Agreement before we can accept your contribution.
6 out of 7 committers have signed the CLA.

✅ aguzovatii
✅ alungu
✅ amuraru
✅ dobrerazvan
✅ azun
✅ ctrlaltluc
❌ cristianpetrache
You have signed the CLA already but the status is still pending? Let us recheck it.

exposedPorts = append(exposedPorts, corev1.ContainerPort{
Name: fmt.Sprintf("broker-%d", brokerId),
ContainerPort: extListener.ExternalStartingPort + int32(brokerId),
ContainerPort: extListener.GetBrokerPort(int32(brokerId)),

Check failure

Code scanning / CodeQL

Incorrect conversion between integer types High

Incorrect conversion of an integer with architecture-dependent bit size from
strconv.Atoi
to a lower bit size type int32 without an upper bound check.
return ""

if elistener.TLSEnabled() {
filterChain, err = GenerateEnvoyTLSFilterChain(tcpProxy, ingressConfig.EnvoyConfig.GetBrokerHostname(int32(brokerId)), log)

Check failure

Code scanning / CodeQL

Incorrect conversion between integer types High

Incorrect conversion of an integer with architecture-dependent bit size from
strconv.Atoi
to a lower bit size type int32 without an upper bound check.
},
})

brokerPort := elistener.GetBrokerPort(int32(brokerId))

Check failure

Code scanning / CodeQL

Incorrect conversion between integer types High

Incorrect conversion of an integer with architecture-dependent bit size from
strconv.Atoi
to a lower bit size type int32 without an upper bound check.
if util.ShouldIncludeBroker(brokerConfig, kafkaCluster.Status, brokerId, defaultIngressConfigName, ingressConfigName) {
exposedPorts = append(exposedPorts, corev1.ServicePort{
Name: fmt.Sprintf("broker-%d", brokerId),
Port: extListener.GetBrokerPort(int32(brokerId)),

Check failure

Code scanning / CodeQL

Incorrect conversion between integer types High

Incorrect conversion of an integer with architecture-dependent bit size from
strconv.Atoi
to a lower bit size type int32 without an upper bound check.
exposedPorts = append(exposedPorts, corev1.ServicePort{
Name: fmt.Sprintf("broker-%d", brokerId),
Port: extListener.GetBrokerPort(int32(brokerId)),
TargetPort: intstr.FromInt(int(extListener.GetBrokerPort(int32(brokerId)))),

Check failure

Code scanning / CodeQL

Incorrect conversion between integer types High

Incorrect conversion of an integer with architecture-dependent bit size from
strconv.Atoi
to a lower bit size type int32 without an upper bound check.
@@ -70,7 +70,7 @@
if util.ShouldIncludeBroker(brokerConfig, kc.Status, brokerId, defaultIngressConfigName, ingressConfigName) {
servers = append(servers, istioclientv1beta1.Server{
Port: &istioclientv1beta1.Port{
Number: int(externalListenerConfig.ExternalStartingPort) + brokerId,
Number: int(externalListenerConfig.GetBrokerPort(int32(brokerId))),

Check failure

Code scanning / CodeQL

Incorrect conversion between integer types High

Incorrect conversion of an integer with architecture-dependent bit size from
strconv.Atoi
to a lower bit size type int32 without an upper bound check.
@@ -103,8 +103,8 @@
generatedPorts = append(generatedPorts, &istioOperatorApi.ServicePort{
Name: fmt.Sprintf("tcp-broker-%d", brokerId),
Protocol: string(corev1.ProtocolTCP),
Port: externalListenerConfig.ExternalStartingPort + int32(brokerId),
TargetPort: &istioOperatorApi.IntOrString{IntOrString: intstr.FromInt(int(externalListenerConfig.ExternalStartingPort) + brokerId)},
Port: externalListenerConfig.GetBrokerPort(int32(brokerId)),

Check failure

Code scanning / CodeQL

Incorrect conversion between integer types High

Incorrect conversion of an integer with architecture-dependent bit size from
strconv.Atoi
to a lower bit size type int32 without an upper bound check.
Port: externalListenerConfig.ExternalStartingPort + int32(brokerId),
TargetPort: &istioOperatorApi.IntOrString{IntOrString: intstr.FromInt(int(externalListenerConfig.ExternalStartingPort) + brokerId)},
Port: externalListenerConfig.GetBrokerPort(int32(brokerId)),
TargetPort: &istioOperatorApi.IntOrString{IntOrString: intstr.FromInt(int(externalListenerConfig.GetBrokerPort(int32(brokerId))))},

Check failure

Code scanning / CodeQL

Incorrect conversion between integer types High

Incorrect conversion of an integer with architecture-dependent bit size from
strconv.Atoi
to a lower bit size type int32 without an upper bound check.
@@ -79,7 +79,7 @@
tlsRoutes = append(tlsRoutes, istioclientv1beta1.TLSRoute{
Match: []istioclientv1beta1.TLSMatchAttributes{
{
Port: util.IntPointer(int(externalListenerConfig.ExternalStartingPort) + brokerId),
Port: util.IntPointer(int(externalListenerConfig.GetBrokerPort(int32(brokerId)))),

Check failure

Code scanning / CodeQL

Incorrect conversion between integer types High

Incorrect conversion of an integer with architecture-dependent bit size from
strconv.Atoi
to a lower bit size type int32 without an upper bound check.
@@ -132,7 +132,7 @@
tcpRoutes = append(tcpRoutes, istioclientv1beta1.TCPRoute{
Match: []istioclientv1beta1.L4MatchAttributes{
{
Port: util.IntPointer(int(externalListenerConfig.ExternalStartingPort) + brokerId),
Port: util.IntPointer(int(externalListenerConfig.GetBrokerPort(int32(brokerId)))),

Check failure

Code scanning / CodeQL

Incorrect conversion between integer types High

Incorrect conversion of an integer with architecture-dependent bit size from
strconv.Atoi
to a lower bit size type int32 without an upper bound check.
@amuraru amuraru closed this May 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

8 participants