This doc explains how to setup a development environment so you can get started contributing to the VMware Sources for Knative. As much as possible we aim to mirror the standard Knative development workflow.
- Create a GitHub account
- Setup GitHub access via SSH
- Install requirements
- Set up your shell environment
- Create and checkout a repo fork
git
(hub) to contribute to an
open source project, please see this blog post: Git rebase, squash...oh
my!
You must install these tools:
go
: The language Knative is built ingit
: For source control.ko
: The primary Knative development tool.kubectl
: For managing your Kubernetes development environments.bash
v4 or later.
Note: On MacOS the default bash is too old, you can use Homebrew to install a later version.
To get started you'll need to set these environment variables (we recommend
adding them to your .bashrc
):
-
GOPATH
: If you don't have one, simply pick a directory and addexport GOPATH=...
-
$GOPATH/bin
onPATH
: This is so that tooling installed viago get
will work properly. -
KO_DOCKER_REPO
: This should be set to an authenticated Docker repo where you can publish container images during development, e.g.docker.io/${USER}
orkind.local
when developing withkind
.bashrc
example:
export GOPATH="$HOME/go"
export PATH="${PATH}:${GOPATH}/bin"
export KO_DOCKER_REPO="docker.io/${USER}"
The Go tools require that you clone the repository to the
src/github.con/vmware-tanzu/sources-for-knative
directory in your
GOPATH
.
To check out this repository:
-
Create your own fork of this repo
-
Clone it to your machine:
mkdir -p ${GOPATH}/src/github.com/vmware-tanzu
cd ${GOPATH}/src/github.com/vmware-tanzu
git clone [email protected]:${USER}/sources-for-knative.git
cd sources-for-knative
git remote add upstream https://github.com/vmware-tanzu/sources-for-knative.git
git remote set-url --push upstream no_push
Note: Adding the
upstream
remote sets you up nicely for regularly syncing your fork.
Once you reach this point you are ready to do a full build and deploy as described below.
To deploy to the active kubectl
context, run the following:
ko apply -BRf config
This will build all of the Go binaries into containers, publish them to your
KO_DOCKER_REPO
and deploy them to the active kubectl
context.
Note: The dependency on an external container registry can be avoided if you run
ko
in akind
environment, as described here.
As you make changes to the code-base, there are two special cases to be aware of:
- If you change a type definition (pkg/apis/), then you must
run
./hack/update-codegen.sh
. - If you change a package's deps (including adding external dep), then you
must run
./hack/update-deps.sh
.
These are both idempotent, and we expect that running these at HEAD
to have no
diffs.
All *.go
and *.sh
files, excluding vendor
and third_party
, must have the
required boilerplate headers, e.g. copyrights.
Contributors can use the add-boilerplate.sh
script in
hack/boilerplate
to update newly added files
accordingly.
Sometimes you might want to develop against a VMware vSphere environment that is not accessible from your development cluster. You can run the receive adapter (the data plane for the events) locally in such cases (as opposed to running it within a Kubernetes environment).
ConfigMap
-based bookmarking
(issue).
Store the credentials on the filesystem in a custom path:
export VC_SECRET_PATH=var/bindings/vsphere
mkdir -p $VC_SECRET_PATH
echo -n '[email protected]' > $VC_SECRET_PATH/username
echo -n 'mysuper$ecretPassword' > $VC_SECRET_PATH/password
Point at a configmap to use on your active kubectl
context and namespace for
bookmarking (event replay):
export NAMESPACE=default
export VSPHERE_KVSTORE_CONFIGMAP=vsphere-test
Then set up the necessary env variables:
export K_METRICS_CONFIG={}
export K_LOGGING_CONFIG={}
export VC_URL=<your vsphere url>
export VC_INSECURE=true
Then specify where the source should send events to
export K_SINK=http://localhost:8080
If you are using GKE for your bookmarking configmap, uncomment the following
line in cmd/adapter/main.go
:
// Uncomment if you want to run locally against remote GKE cluster.
// _ "k8s.io/client-go/plugin/pkg/client/auth/gcp"
And then finally run the receive adapter, which will use the settings from your
.kubeconfig
file:
go run ./cmd/sources-for-knative-adapter/main.go
This section describes how to develop with KinD as your Kubernetes cluster (requires Docker).
First install KinD, and create a cluster:
GO111MODULE="on" go install sigs.k8s.io/kind@latest && kind create cluster
Make sure the KinD cluster is your active kubectl
context:
kubectl config use-context kind-kind
Then install Knative Serving/Eventing on it following the standard instructions.
Spec.ServiceAccountName
parameter.
You can also grant the default
ServiceAccount access to your private repository. For GKE you would
do it like so:
SA_EMAIL=$(gcloud iam service-accounts --format='value(email)' create k8s-gcr-auth-ro)
gcloud iam service-accounts keys create k8s-gcr-auth-ro.json --iam-account=$SA_EMAIL
PROJECT=$(gcloud config list core/project --format='value(core.project)')
gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$SA_EMAIL --role roles/storage.objectViewer
kubectl --context kind-kind -n vmware-sources create secret docker-registry image-secrets --docker-server=https://gcr.io --docker-username=_json_key [email protected] --docker-password="$(cat k8s-gcr-auth-ro.json)"
kubectl --context kind-kind -n vmware-sources patch serviceaccount controller -p "{\"imagePullSecrets\": [{\"name\": \"image-secrets\"}]}"
You can then iterate using the standard workflow as described above:
ko apply -BRf ./config