The Radix API Server for accessing functionality on the Radix platform. Please see Development practices for more information on the release process.
You need Go and dep
installed. Make sure GOPATH
and GOROOT
are properly set up.
Also needed:
go-swagger
(on a Mac, you can install it with Homebrew:brew install go-swagger
)statik
(install withgo get github.com/rakyll/statik
)
Clone the repo into your GOPATH
and run dep ensure
.
Problem: panic: statik/fs: no zip data registered
Solution: make swagger
Radix API follows the standard procedure defined in how we work.
Radix API is installed as a Radix application in script when setting up a cluster. It will setup API environment with aliases, and a Webhook so that changes to this repository will be reflected in Radix platform.
The following env vars are needed. Useful default values in brackets.
server_cert_path
- (${workspaceFolder}/certs/cert.pem
)server_key_path
- (${workspaceFolder}/certs/key.pem
)RADIX_CONTAINER_REGISTRY
- (radixdev.azurecr.io
)PIPELINE_IMG_TAG
- (master-latest
)
You also probably want to start with the argument --useOutClusterClient=false
. If this is set to true
(the default) the program will connect to the K8S API host defined by the K8S_API_HOST
env var and will require auth tokens in all client requests. Set to false
, a service principal with superpowers is used to authorise the requests instead (you still need to send a bearer whatever
auth header with the requests, but its value is ignored).
When useOutClusterClient
is false
, the Radix API will connect to the currently-configured kubectl
context.
If you are using VSCode, there is a convenient launch configuration in .vscode
.
- Install draft (https://draft.sh/)
draft init
from project directory (insideradix-api
)draft config set registry radixdev.azurecr.io
az acr login --name radixdev
- Update version in header of swagger version in
main.go
so that you can see that the version in the environment corresponds with what you wanted - Execute
draft up
to install to dev environment of radix-api - Wait for pods to start
- Go to
https://server-radix-api-dev.<cluster name>.dev.radix.equinor.com/swaggerui/
to see if the version in the swagger corresponds with the version you set in the header.
The Radix API server is meant to be the single point of entry for platform users to the platform (through the web console or a command line interface). They should not be able to access the Kubernetes API directly. Therefore the Radix API will limit what platform users will be able to do. Authentication is done through a bearer token, which essentially is relayed to the Kubernetes API to ensure that users only can see what they should be able to see, and therefore rely on the k8s AAD integration for authentication 1.
1 Until the work referred to in this document is solved, listing applications, listing jobs and creating build job is done using the service account of the API server, and access is therefore verified inside the Radix API server rather than by the Kubernetes API using RBAC.