forked from projectcontour/contour
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathMakefile
251 lines (209 loc) · 8.3 KB
/
Makefile
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
ORG = projectcontour
PROJECT = contour
MODULE = github.com/$(ORG)/$(PROJECT)
REGISTRY ?= projectcontour
IMAGE := $(REGISTRY)/$(PROJECT)
SRCDIRS := ./cmd ./internal ./apis
LOCAL_BOOTSTRAP_CONFIG = localenvoyconfig.yaml
SECURE_LOCAL_BOOTSTRAP_CONFIG = securelocalenvoyconfig.yaml
PHONY = gencerts
# The version of Jekyll is pinned in site/Gemfile.lock.
# https://docs.netlify.com/configure-builds/common-configurations/#jekyll
JEKYLL_IMAGE ?= jekyll/jekyll:3.8.5
JEKYLL_PORT := 4000
JEKYLL_LIVERELOAD_PORT := 35729
TAG_LATEST ?= false
# Used to supply a local Envoy docker container an IP to connect to that is running
# 'contour serve'. On MacOS this will work, but may not on other OSes. Defining
# LOCALIP as an env var before running 'make local' will solve that.
LOCALIP ?= $(shell ifconfig | grep inet | grep -v '::' | grep -v 127.0.0.1 | head -n1 | awk '{print $$2}')
# Sets GIT_REF to a tag if it's present, otherwise the short rev.
GIT_REF = $(shell git describe --tags || git rev-parse --short=8 --verify HEAD)
VERSION ?= $(GIT_REF)
# Used for the tag-latest action.
# The tag-latest action will be a noop unless this is explicitly
# set outside this Makefile, as a safety valve.
LATEST_VERSION ?= NOLATEST
GO_TAGS := -tags "oidc gcp"
export GO111MODULE=on
.PHONY: check
check: install check-test check-test-race ## Install and run tests
install: ## Build and install the contour binary
go install -mod=readonly -v $(GO_TAGS) $(MODULE)/cmd/contour
race:
go install -mod=readonly -v -race $(GO_TAGS) $(MODULE)/cmd/contour
download: ## Download Go modules
go mod download
container: ## Build the Contour container image
docker build . -t $(IMAGE):$(VERSION)
push: ## Push the Contour container image to the Docker registry
push: container
docker push $(IMAGE):$(VERSION)
ifeq ($(TAG_LATEST), true)
docker tag $(IMAGE):$(VERSION) $(IMAGE):latest
docker push $(IMAGE):latest
endif
tag-latest: ## Tag the Docker registry container image at $LATEST_VERSION as :latest
ifeq ($(LATEST_VERSION), NOLATEST)
@echo "LATEST_VERSION not set, not proceeding"
else
docker pull $(IMAGE):$(LATEST_VERSION)
docker tag $(IMAGE):$(LATEST_VERSION) $(IMAGE):latest
docker push $(IMAGE):latest
endif
.PHONY: check-test
check-test:
go test $(GO_TAGS) -cover -mod=readonly $(MODULE)/...
.PHONY: check-test-race
check-test-race: | check-test
go test $(GO_TAGS) -race -mod=readonly $(MODULE)/...
.PHONY: check-coverage
check-coverage: ## Run tests to generate code coverage
@go test \
$(GO_TAGS) \
-race \
-mod=readonly \
-covermode=atomic \
-coverprofile=coverage.out \
-coverpkg=./cmd/...,./internal/... \
$(MODULE)/...
@go tool cover -html=coverage.out -o coverage.html
.PHONY: lint
lint: ## Run lint checks
lint: check-golint check-yamllint check-flags check-misspell
.PHONY: check-misspell
check-misspell:
@echo Running spell checker ...
@go run github.com/client9/misspell/cmd/misspell \
-locale US \
-error \
design/* site/*.md site/_{guides,posts,resources} site/docs/**/* *.md
.PHONY: check-golint
check-golint:
@echo Running Go linter ...
@./hack/golangci-lint run
.PHONY: check-yamllint
check-yamllint:
@echo Running YAML linter ...
@docker run --rm -ti -v $(CURDIR):/workdir giantswarm/yamllint examples/ site/examples/
# Check that CLI flags are formatted consistently. We are checking
# for calls to Kingping Flags() and Command() APIs where the 2nd
# argument (the help text) either doesn't start with a capital letter
# or doesn't end with a period. "xDS" and "gRPC" are exceptions to
# the first rule.
.PHONY: check-flags
check-flags:
@if git --no-pager grep --extended-regexp '[.]Flag\("[^"]+", "([^A-Zxg][^"]+|[^"]+[^.])"' cmd/contour; then \
echo "ERROR: CLI flag help strings must start with a capital and end with a period."; \
exit 2; \
fi
@if git --no-pager grep --extended-regexp '[.]Command\("[^"]+", "([^A-Z][^"]+|[^"]+[^.])"' cmd/contour; then \
echo "ERROR: CLI flag help strings must start with a capital and end with a period."; \
exit 2; \
fi
.PHONY: generate
generate: ## Re-generate generated code and documentation
generate: generate-deployment generate-crd-yaml generate-crd-clients generate-api-docs generate-metrics-docs
.PHONY: generate-deployment
generate-deployment:
@echo Generating example deployment files ...
@./hack/generate-deployment.sh
.PHONY: generate-crd-yaml
generate-crd-yaml:
@echo Generating CRD YAML documents ...
@./hack/generate-crd-yaml.sh
.PHONY: generate-crd-clients
generate-crd-clients:
@echo Updating generated CRD client API code ...
@./hack/generate-crd-clients.sh
.PHONY: generate-api-docs
generate-api-docs:
@echo Generating API documentation ...
@./hack/generate-api-docs.sh
.PHONY: generate-metrics-docs
generate-metrics-docs:
@echo Generating metrics documentation ...
@cd site/_metrics && rm -f *.md && go run ../../hack/generate-metrics-doc.go
# TODO(youngnick): Move these local bootstrap config files out of the repo root dir.
$(LOCAL_BOOTSTRAP_CONFIG): install
contour bootstrap --xds-address $(LOCALIP) --xds-port=8001 $@
$(SECURE_LOCAL_BOOTSTRAP_CONFIG): install
contour bootstrap --xds-address $(LOCALIP) --xds-port=8001 --envoy-cafile /config/certs/CAcert.pem --envoy-cert-file /config/certs/envoycert.pem --envoy-key-file /config/certs/envoykey.pem $@
secure-local: $(SECURE_LOCAL_BOOTSTRAP_CONFIG)
docker run \
-it \
--mount type=bind,source=$(CURDIR),target=/config \
--net bridge \
docker.io/envoyproxy/envoy:v1.12.2 \
envoy \
--config-path /config/$< \
--service-node node0 \
--service-cluster cluster0
local: $(LOCAL_BOOTSTRAP_CONFIG)
docker run \
-it \
--mount type=bind,source=$(CURDIR),target=/config \
--net bridge \
docker.io/envoyproxy/envoy:v1.12.2 \
envoy \
--config-path /config/$< \
--service-node node0 \
--service-cluster cluster0
gencerts: certs/contourcert.pem certs/envoycert.pem
@echo "certs are generated."
applycerts: gencerts
@kubectl create secret -n projectcontour generic cacert --from-file=./certs/CAcert.pem
@kubectl create secret -n projectcontour tls contourcert --key=./certs/contourkey.pem --cert=./certs/contourcert.pem
@kubectl create secret -n projectcontour tls envoycert --key=./certs/envoykey.pem --cert=./certs/envoycert.pem
cleancerts:
@kubectl delete secret -n projectcontour cacert contourcert envoycert
certs:
@mkdir -p certs
certs/CAkey.pem: | certs
@echo No CA keypair present, generating
openssl req -x509 -new -nodes -keyout certs/CAkey.pem \
-sha256 -days 1825 -out certs/CAcert.pem \
-subj "/O=Project Contour/CN=Contour CA"
certs/contourkey.pem:
@echo Generating new contour key
openssl genrsa -out certs/contourkey.pem 2048
certs/contourcert.pem: certs/CAkey.pem certs/contourkey.pem
@echo Generating new contour cert
openssl req -new -key certs/contourkey.pem \
-out certs/contour.csr \
-subj "/O=Project Contour/CN=contour"
openssl x509 -req -in certs/contour.csr \
-CA certs/CAcert.pem \
-CAkey certs/CAkey.pem \
-CAcreateserial \
-out certs/contourcert.pem \
-days 1825 -sha256 \
-extfile _integration/cert-contour.ext
certs/envoykey.pem:
@echo Generating new Envoy key
openssl genrsa -out certs/envoykey.pem 2048
certs/envoycert.pem: certs/CAkey.pem certs/envoykey.pem
@echo generating new Envoy Cert
openssl req -new -key certs/envoykey.pem \
-out certs/envoy.csr \
-subj "/O=Project Contour/CN=envoy"
openssl x509 -req -in certs/envoy.csr \
-CA certs/CAcert.pem \
-CAkey certs/CAkey.pem \
-CAcreateserial \
-out certs/envoycert.pem \
-days 1825 -sha256 \
-extfile _integration/cert-envoy.ext
.PHONY: site-devel
site-devel: ## Launch the website in a Docker container
docker run --rm -p $(JEKYLL_PORT):$(JEKYLL_PORT) -p $(JEKYLL_LIVERELOAD_PORT):$(JEKYLL_LIVERELOAD_PORT) -v $$(pwd)/site:/site -it $(JEKYLL_IMAGE) \
bash -c "cd /site && bundle install --path bundler/cache && bundle exec jekyll serve --host 0.0.0.0 --port $(JEKYLL_PORT) --livereload_port $(JEKYLL_LIVERELOAD_PORT) --livereload"
.PHONY: site-check
site-check: ## Test the site's links
docker run --rm -v $$(pwd)/site:/site -it $(JEKYLL_IMAGE) \
bash -c "cd /site && bundle install --path bundler/cache && bundle exec jekyll build && htmlproofer --assume-extension /site/_site"
help: ## Display this help
@echo Contour high performance Ingress controller for Kubernetes
@echo
@echo Targets:
@awk 'BEGIN {FS = ":.*?## "} /^[a-zA-Z0-9._-]+:.*?## / {printf " %-20s %s\n", $$1, $$2}' $(MAKEFILE_LIST) | sort