Skip to content

Conversation

kvaps
Copy link
Member

@kvaps kvaps commented Jul 25, 2025

Signed-off-by: Andrei Kvapil kvapss@gmail.com

What this PR does

Release note

[seaweedfs] Client mode refactoring and fix issues

- update cosi-driver
- add support exporting via nginx-ingress
- add support for whitelist

Summary by CodeRabbit

  • New Features

    • Added support for configuring external access to the SeaweedFS filer service via new parameters for gRPC host, port, and IP/CIDR whitelisting.
    • Introduced conditional creation of Ingress and Service resources for secure external filer access.
  • Bug Fixes

    • Improved validation and configuration logic for external filer connectivity in client topology.
  • Documentation

    • Updated README to reflect new configuration options and removed outdated parameters.
  • Chores

    • Updated image tags to specific versions for improved reliability.
    • Incremented Helm chart version and updated version mappings.
    • Cleaned up obsolete configuration parameters and templates.

@kvaps kvaps requested review from lllamnyp and klinch0 as code owners July 25, 2025 02:04
Copy link
Contributor

coderabbitai bot commented Jul 25, 2025

Caution

Review failed

The pull request is closed.

Walkthrough

This update refactors the SeaweedFS Helm chart's external filer service configuration. It replaces the previous filer.external boolean and remoteEndpoint with granular parameters (filer.grpcHost, filer.grpcPort, and filer.whitelist). It introduces a new Ingress template for external filer access, updates image references, and removes the legacy external service manifest.

Changes

File(s) Change Summary
Chart.yaml, versions_map Bumped chart version to 0.6.0; updated version mapping for SeaweedFS.
README.md Updated documentation for new filer parameters; table formatting revised.
values.yaml, values.schema.json Replaced filer.external and remoteEndpoint with filer.grpcHost, grpcPort, and whitelist.
images/objectstorage-sidecar.tag Pinned objectstorage-sidecar image to versioned tag and digest.
images/seaweedfs-cosi-driver.tag Added new file specifying seaweedfs-cosi-driver image version.
templates/client/cosi-deployment.yaml Updated image reference to dynamic tag; changed env var to use new filer host/port parameters.
templates/ingress.yaml Added new template for conditional Ingress and Service for external filer access.
templates/seaweedfs.yaml Validation now checks for filer.grpcHost instead of remoteEndpoint.
templates/svc-external.yaml Deleted legacy external service manifest for filer.

Sequence Diagram(s)

sequenceDiagram
    participant User
    participant Helm
    participant Kubernetes
    participant Filer Pod
    participant Ingress

    User->>Helm: Install/Upgrade SeaweedFS with new values
    Helm->>Kubernetes: Render templates (with grpcHost, grpcPort, whitelist)
    Kubernetes->>Filer Pod: Deploy filer with specified grpcHost/Port
    Kubernetes->>Ingress: (If enabled) Create Ingress for filer external access
    User->>Ingress: Connect to filer via GRPCS
    Ingress->>Filer Pod: Route traffic if source in whitelist
Loading

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~15–20 minutes

Suggested labels

enhancement, size:M, lgtm

Suggested reviewers

  • klinch0
  • lllamnyp

Poem

A whisk of YAML, a pinch of code,
The filer’s gates now finely bestowed.
Host and port, whitelist anew—
Ingress routes the traffic through!
With images pinned and docs in tow,
This bunny hops where SeaweedFS flows.
🐇✨

Note

⚡️ Unit Test Generation is now available in beta!

Learn more here, or try it out under "Finishing Touches" below.


📜 Recent review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 2f61798 and b1e4ebe.

📒 Files selected for processing (11)
  • packages/extra/seaweedfs/Chart.yaml (1 hunks)
  • packages/extra/seaweedfs/README.md (1 hunks)
  • packages/extra/seaweedfs/images/objectstorage-sidecar.tag (1 hunks)
  • packages/extra/seaweedfs/images/seaweedfs-cosi-driver.tag (1 hunks)
  • packages/extra/seaweedfs/templates/client/cosi-deployment.yaml (1 hunks)
  • packages/extra/seaweedfs/templates/ingress.yaml (1 hunks)
  • packages/extra/seaweedfs/templates/seaweedfs.yaml (1 hunks)
  • packages/extra/seaweedfs/templates/svc-external.yaml (0 hunks)
  • packages/extra/seaweedfs/values.schema.json (1 hunks)
  • packages/extra/seaweedfs/values.yaml (1 hunks)
  • packages/extra/versions_map (1 hunks)
✨ Finishing Touches
🧪 Generate unit tests
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch sw-client

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Explain this complex logic.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai explain this code block.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and explain its main purpose.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Support

Need help? Create a ticket on our support page for assistance with any issues or questions.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR.
  • @coderabbitai generate sequence diagram to generate a sequence diagram of the changes in this PR.
  • @coderabbitai generate unit tests to generate unit tests for this PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Summary of Changes

Hello @kvaps, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request introduces significant refactoring and enhancements to the SeaweedFS deployment, particularly for its client mode and external accessibility. It updates the COSI driver, streamlines configuration by replacing a single remoteEndpoint with more specific filer.grpcHost and filer.grpcPort parameters, and improves external exposure by implementing Nginx Ingress with GRPC passthrough and IP whitelisting. These changes aim to provide a more robust, secure, and configurable SeaweedFS setup.

Highlights

  • Client Mode Refactoring: The configuration for SeaweedFS's 'Client' topology has been refactored. The previous remoteEndpoint parameter has been replaced by more granular filer.grpcHost and filer.grpcPort settings, providing clearer separation and control over the GRPC service endpoint.
  • COSI Driver Update and Integration: The seaweedfs-cosi-driver has been updated to version v0.2.0. Its deployment configuration now dynamically pulls the image tag from a dedicated file and utilizes the new filer.grpcHost and filer.grpcPort parameters for connecting to the SeaweedFS filer.
  • Nginx Ingress for External Filer Access: External access to the SeaweedFS filer is now managed via a new Nginx Ingress resource. This ingress is configured for GRPC passthrough and includes support for IP whitelisting, replacing the previous LoadBalancer service for external exposure.
  • IP Whitelisting Capability: A new filer.whitelist parameter has been introduced, allowing users to specify a list of IP addresses or CIDR ranges. This whitelist is applied to the Nginx Ingress, enhancing security by restricting access to the filer service.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point in your pull request via creating an issue comment (i.e. comment on the pull request page) using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in issue comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments or fill out our survey to provide feedback.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

- update cosi-driver
- add support exporting via nginx-ingress
- add support for whitelist

Signed-off-by: Andrei Kvapil <kvapss@gmail.com>
Copy link

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request refactors the SeaweedFS client mode configuration by replacing remoteEndpoint with filer.grpcHost and filer.grpcPort, which improves clarity. It also introduces support for exporting the filer via nginx-ingress and a configurable IP whitelist.

The changes are well-structured, but I've identified a few issues:

  • There are some unused variables in the new ingress.yaml template.
  • A potential template rendering error exists in the whitelist-source-range annotation logic within ingress.yaml.
  • The JSON schema for the new whitelist value is incomplete.

I've provided suggestions to address these points. Overall, a good set of changes that will improve the chart's flexibility.

annotations:
nginx.ingress.kubernetes.io/backend-protocol: GRPCS
nginx.ingress.kubernetes.io/ssl-passthrough: "true"
nginx.ingress.kubernetes.io/whitelist-source-range: "{{ join "," (.Values.filer.whitelist | default "0.0.0.0/32") }}"

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

high

The expression for whitelist-source-range is susceptible to a template rendering error. If .Values.filer.whitelist is not set in a values file, it will be nil, and the default filter will return the string "0.0.0.0/32". The join function expects a list, not a string, which will cause a failure.

A safer approach is to default to an empty list, which will result in an empty string for the annotation value. This is generally interpreted by Ingress controllers as not applying any IP-based restriction.

Additionally, the default value "0.0.0.0/32" is highly restrictive and only allows traffic from the IP address 0.0.0.0, which is likely not the intended behavior.

    nginx.ingress.kubernetes.io/whitelist-source-range: "{{ join "," (.Values.filer.whitelist | default (list)) }}"

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

empty list is not working for nginx ingress

Comment on lines +1 to +6
{{- $cozyConfig := lookup "v1" "ConfigMap" "cozy-system" "cozystack" }}
{{- $issuerType := (index $cozyConfig.data "clusterissuer") | default "http01" }}

{{- $myNS := lookup "v1" "Namespace" "" .Release.Namespace }}
{{- $ingress := index $myNS.metadata.annotations "namespace.cozystack.io/ingress" }}
{{- $host := index $myNS.metadata.annotations "namespace.cozystack.io/host" }}

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The variables $cozyConfig and $issuerType are defined but not used within this template. Removing them would improve code clarity and maintainability.

Comment on lines +17 to +19
"description": "A list of IP addresses or CIDR ranges that are allowed to access the filer service.",
"items": {},
"type": "array"

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The schema for the whitelist array is incomplete. The items property should specify the type of elements in the array, which should be strings.

          "items": { "type": "string" },

@kvaps kvaps merged commit 8fac3bf into main Jul 25, 2025
5 checks passed
@kvaps kvaps deleted the sw-client branch July 25, 2025 02:06
kvaps added a commit that referenced this pull request Jul 25, 2025
- update cosi-driver
- add support exporting via nginx-ingress
- add support for whitelist

Signed-off-by: Andrei Kvapil <kvapss@gmail.com>

<!-- Thank you for making a contribution! Here are some tips for you:
- Start the PR title with the [label] of Cozystack component:
- For system components: [platform], [system], [linstor], [cilium],
[kube-ovn], [dashboard], [cluster-api], etc.
- For managed apps: [apps], [tenant], [kubernetes], [postgres],
[virtual-machine] etc.
- For development and maintenance: [tests], [ci], [docs], [maintenance].
- If it's a work in progress, consider creating this PR as a draft.
- Don't hesistate to ask for opinion and review in the community chats,
even if it's still a draft.
- Add the label `backport` if it's a bugfix that needs to be backported
to a previous version.
-->

<!--  Write a release note:
- Explain what has changed internally and for users.
- Start with the same [label] as in the PR title
- Follow the guidelines at
https://github.com/kubernetes/community/blob/master/contributors/guide/release-notes.md.
-->

```release-note
[seaweedfs] Client mode refactoring and fix issues

- update cosi-driver
- add support exporting via nginx-ingress
- add support for whitelist
```
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant