Skip to content
This repository was archived by the owner on May 17, 2024. It is now read-only.

Commit 1d1bfa8

Browse files
authored
Merge pull request #118 from JoshVanL/update-demo-components
Update demo components
2 parents 10f249a + 8516ba9 commit 1d1bfa8

File tree

8 files changed

+1112
-2473
lines changed

8 files changed

+1112
-2473
lines changed

demo/Makefile

Lines changed: 14 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -13,16 +13,18 @@ EXT_VARS := --tla-str cloud=$(CLOUD)
1313
UNAME_S := $(shell uname -s)
1414
ifeq ($(UNAME_S),Linux)
1515
SHASUM := sha256sum -c
16-
KUBECFG_URL := https://github.com/ksonnet/kubecfg/releases/download/v0.9.1/kubecfg-linux-amd64
17-
KUBECFG_HASH := c972b52893794ccd49adfc9d7b69e2d388c0c91c4837e194de7cdf0d67b2baf8
16+
KUBECFG_URL := https://github.com/ksonnet/kubecfg/releases/download/v0.14.0/kubecfg-linux-amd64
17+
KUBECFG_HASH := bb1455ec70f93d6f0fd344becec2f1617837a879e8363272d3216bf44c04cb2c
18+
JSONNET_URL := https://github.com/google/jsonnet/releases/download/v0.14.0/jsonnet-bin-v0.14.0-linux.tar.gz
19+
JSONNET_HASH := 30ba7b243ddb24231882ae3aa1930e76b6050bb76b5ccd0d97410b21fb784039
1820
endif
1921
ifeq ($(UNAME_S),Darwin)
2022
SHASUM := shasum -a 256 -c
21-
KUBECFG_URL := https://github.com/ksonnet/kubecfg/releases/download/v0.9.1/kubecfg-darwin-amd64
22-
KUBECFG_HASH := 9b6772abc3e2da5add51aa57a2944f77f4c05be49df56087056837aa640fb9c9
23+
KUBECFG_URL := https://github.com/ksonnet/kubecfg/releases/download/v0.14.0/kubecfg-darwin-amd64
24+
KUBECFG_HASH := d448ae2888a28692a20d5ddb29ddae0574f74327611bd5b933092312f8c18fcf
25+
JSONNET_URL := https://github.com/google/jsonnet/releases/download/v0.14.0/jsonnet-bin-v0.14.0-osx.tar.gz
26+
JSONNET_HASH := e056c7305e8f86c0e2441085d5cdfd29b219ef09d8daae54e9f6d2647dd18d3e
2327
endif
24-
JSONNET_URL := https://github.com/google/jsonnet/archive/v0.12.1.tar.gz
25-
JSONNET_HASH := 257c6de988f746cc90486d9d0fbd49826832b7a2f0dbdb60a515cc8a2596c950
2628

2729
export KUBECONFIG
2830

@@ -63,27 +65,27 @@ manifests_validate: depend manifests/$(CLOUD)-config.json ## Use kubecfg to vali
6365

6466
.PHONY: manifests_validate
6567
jsonnet_fmt: depend ## validate formatting of jsonnet files
66-
$(BINDIR)/jsonnet fmt --test $(shell find manifests/components/. manifests/main.jsonnet -name "*.jsonnet")
68+
$(BINDIR)/jsonnetfmt --test $(shell find manifests/components/. manifests/main.jsonnet -name "*.jsonnet")
6769

6870
.PHONY: manifests_destroy
6971
manifests_destroy: depend manifests/$(CLOUD)-config.json ## Use kubecfg to delete manifests
7072
$(BINDIR)/kubecfg $(EXT_VARS) show config.jsonnet | kubectl delete -f - --ignore-not-found
7173

7274
.PHONY: manifests_backup_certificates
73-
manifests_backup_certificates:
74-
kubectl get secrets --all-namespaces -l certmanager.k8s.io/certificate-name -o yaml > .backup-certificates-$(CLOUD).yaml.tmp
75+
manifests_backup_certificates: ## backup tls secrets
76+
kubectl get -n auth -o yaml $(shell kubectl get secrets -n auth -oname) > .backup-certificates-$(CLOUD).yaml.tmp
7577
mv .backup-certificates-$(CLOUD).yaml.tmp .backup-certificates-$(CLOUD).yaml
7678

7779
.PHONY: manifests_restore_certificates
78-
manifests_restore_certificates:
80+
manifests_restore_certificates: ## restore tls secrets
7981
kubectl create ns auth --dry-run -o yaml | kubectl apply -f -
8082
kubectl apply -f .backup-certificates-$(CLOUD).yaml
8183

8284
.PHONY: verify
8385
verify: jsonnet_fmt ## verify code and vendor
8486

8587
.PHONY: depend
86-
depend: $(BINDIR)/kubecfg $(BINDIR)/jsonnet
88+
depend: $(BINDIR)/kubecfg $(BINDIR)/jsonnet $(BINDIR)/jsonnetfmt
8789

8890
.PHONY: clean
8991
clean: ## clean up created files
@@ -99,7 +101,4 @@ $(BINDIR)/jsonnet:
99101
mkdir -p $(BINDIR)
100102
curl -sL -o $@.tar.gz $(JSONNET_URL)
101103
echo "$(JSONNET_HASH) $@.tar.gz" | $(SHASUM)
102-
cd $(BINDIR) && tar xf jsonnet.tar.gz && rm jsonnet.tar.gz
103-
make -C $(BINDIR)/jsonnet-0.12.1
104-
mv $(BINDIR)/jsonnet-0.12.1/jsonnet $(BINDIR)/jsonnet
105-
rm -rf $(BINDIR)/jsonnet-0.12.1
104+
cd $(BINDIR) && tar xvf jsonnet.tar.gz && rm jsonnet.tar.gz

demo/infrastructure/digitalocean/providers.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ variable "digitalocean_region" {
55
}
66

77
variable "cluster_version" {
8-
default = "1.15.5-do.0"
8+
default = "1.16.2-do.1"
99
}
1010

1111
module "cluster" {

demo/infrastructure/modules/amazon-cluster/cluster.tf

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,8 +83,7 @@ module "vpc" {
8383
}
8484

8585
module "eks" {
86-
#source = "terraform-aws-modules/eks/aws"
87-
source = "[email protected]:terraform-aws-modules/terraform-aws-eks.git?ref=6c3e4ec510f658f53508623a6192df064e7a4786"
86+
source = "terraform-aws-modules/eks/aws"
8887
cluster_name = "${local.cluster_name}"
8988
subnets = "${module.vpc.private_subnets}"
9089

demo/manifests/components/cert-manager.jsonnet

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
local kube = import '../vendor/kube-prod-runtime/lib/kube.libsonnet';
22
local cert_manager_manifests = import './cert-manager/cert-manager.json';
33

4-
local CERT_MANAGER_IMAGE = '';
5-
64
{
75
ca_secret_name:: 'ca-key-pair',
86

@@ -38,13 +36,13 @@ local CERT_MANAGER_IMAGE = '';
3836
// Letsencrypt environment (defaults to the production one)
3937
letsencrypt_environment:: 'prod',
4038

41-
Issuer(name):: kube._Object('certmanager.k8s.io/v1alpha1', 'Issuer', name) {
39+
Issuer(name):: kube._Object('cert-manager.io/v1alpha2', 'Issuer', name) {
4240
},
4341

44-
ClusterIssuer(name):: kube._Object('certmanager.k8s.io/v1alpha1', 'ClusterIssuer', name) {
42+
ClusterIssuer(name):: kube._Object('cert-manager.io/v1alpha2', 'ClusterIssuer', name) {
4543
},
4644

47-
certCRD: kube.CustomResourceDefinition('certmanager.k8s.io', 'v1alpha1', 'Certificate') {
45+
certCRD: kube.CustomResourceDefinition('cert-manager.io', 'v1alpha2', 'Certificate') {
4846
spec+: { names+: { shortNames+: ['cert', 'certs'] } },
4947
},
5048

demo/manifests/components/cert-manager/cert-manager.json

Lines changed: 1087 additions & 2447 deletions
Large diffs are not rendered by default.

demo/manifests/components/kube-oidc-proxy.jsonnet

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,8 +58,8 @@ local READINESS_PORT = 8080;
5858
},
5959
{
6060
apiGroups: ['authentication.k8s.io'],
61-
resources: ['userextras/scopes'],
62-
verbs: ['impersonate'],
61+
resources: ['userextras/scopes', 'tokenreviews'],
62+
verbs: ['impersonate', 'create'],
6363
},
6464
],
6565
},
@@ -117,6 +117,7 @@ local READINESS_PORT = 8080;
117117
'--oidc-groups-claim=' + $.config.oidc.groupsClaim,
118118
'--oidc-client-id=$(OIDC_CLIENT_ID)',
119119
'--oidc-issuer-url=$(OIDC_ISSUER_URL)',
120+
'--token-passthrough',
120121
] + if std.objectHas($.config.oidc, 'caFile') then
121122
['--oidc-ca-file=' + $.config.oidc.caFile]
122123
else

demo/manifests/main.jsonnet

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,8 @@ local apply_ca_issuer(ca_crt, ca_key, obj) =
6767
{};
6868

6969
local apply_google_secret(cert_manager) =
70-
if std.objectHas(cert_manager, 'service_account_credentials') then
70+
if std.objectHas(cert_manager, 'service_account_credentials') &&
71+
std.objectHas(cert_manager, 'metadata') then
7172
kube.Secret(cert_manager.p + 'clouddns-google-credentials') + cert_manager.metadata {
7273
data_+: {
7374
'credentials.json': cert_manager.service_account_credentials,

hack/boilerplate/boilerplate.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -142,6 +142,7 @@ def file_extension(filename):
142142
"hack",
143143
"pkg/mocks",
144144
"bin",
145+
"demo/infrastructure",
145146
]
146147

147148

0 commit comments

Comments
 (0)