@@ -15,46 +15,46 @@ curl -L https://istio.io/downloadIstio | sh -
15
15
function_check_external_ip_assigned () {
16
16
while : ; do
17
17
ip=$( kubectl --context=" $1 " get svc istio-eastwestgateway -n istio-system --output jsonpath=' {.status.loadBalancer.ingress[0].ip}' )
18
- if [ -n " $ip " ]
18
+ if [ -n " ${ip} " ]
19
19
then
20
- echo " external ip assigned $ip "
20
+ echo " external ip assigned ${ip} "
21
21
break
22
22
else
23
23
echo " waiting for external ip to be assigned"
24
24
fi
25
25
done
26
26
}
27
27
28
- cd istio-${ISTIO_VERSION}
28
+ cd " istio-${ISTIO_VERSION} "
29
29
mkdir -p certs
30
30
pushd certs
31
31
32
32
# create root trust for the clusters
33
33
make -f ../tools/certs/Makefile.selfsigned.mk root-ca
34
- make -f ../tools/certs/Makefile.selfsigned.mk ${CTX_CLUSTER1} -cacerts
35
- make -f ../tools/certs/Makefile.selfsigned.mk ${CTX_CLUSTER2} -cacerts
36
- make -f ../tools/certs/Makefile.selfsigned.mk ${CTX_CLUSTER3} -cacerts
34
+ make -f ../tools/certs/Makefile.selfsigned.mk " ${CTX_CLUSTER1} -cacerts"
35
+ make -f ../tools/certs/Makefile.selfsigned.mk " ${CTX_CLUSTER2} -cacerts"
36
+ make -f ../tools/certs/Makefile.selfsigned.mk " ${CTX_CLUSTER3} -cacerts"
37
37
38
38
kubectl --context=" ${CTX_CLUSTER1} " create ns istio-system
39
39
kubectl --context=" ${CTX_CLUSTER1} " create secret generic cacerts -n istio-system \
40
- --from-file=${CTX_CLUSTER1} /ca-cert.pem \
41
- --from-file=${CTX_CLUSTER1} /ca-key.pem \
42
- --from-file=${CTX_CLUSTER1} /root-cert.pem \
43
- --from-file=${CTX_CLUSTER1} /cert-chain.pem
40
+ --from-file=" ${CTX_CLUSTER1} /ca-cert.pem" \
41
+ --from-file=" ${CTX_CLUSTER1} /ca-key.pem" \
42
+ --from-file=" ${CTX_CLUSTER1} /root-cert.pem" \
43
+ --from-file=" ${CTX_CLUSTER1} /cert-chain.pem"
44
44
45
45
kubectl --context=" ${CTX_CLUSTER2} " create ns istio-system
46
46
kubectl --context=" ${CTX_CLUSTER2} " create secret generic cacerts -n istio-system \
47
- --from-file=${CTX_CLUSTER2} /ca-cert.pem \
48
- --from-file=${CTX_CLUSTER2} /ca-key.pem \
49
- --from-file=${CTX_CLUSTER2} /root-cert.pem \
50
- --from-file=${CTX_CLUSTER2} /cert-chain.pem
47
+ --from-file=" ${CTX_CLUSTER2} /ca-cert.pem" \
48
+ --from-file=" ${CTX_CLUSTER2} /ca-key.pem" \
49
+ --from-file=" ${CTX_CLUSTER2} /root-cert.pem" \
50
+ --from-file=" ${CTX_CLUSTER2} /cert-chain.pem"
51
51
52
52
kubectl --context=" ${CTX_CLUSTER3} " create ns istio-system
53
53
kubectl --context=" ${CTX_CLUSTER3} " create secret generic cacerts -n istio-system \
54
- --from-file=${CTX_CLUSTER3} /ca-cert.pem \
55
- --from-file=${CTX_CLUSTER3} /ca-key.pem \
56
- --from-file=${CTX_CLUSTER3} /root-cert.pem \
57
- --from-file=${CTX_CLUSTER3} /cert-chain.pem
54
+ --from-file=" ${CTX_CLUSTER3} /ca-cert.pem" \
55
+ --from-file=" ${CTX_CLUSTER3} /ca-key.pem" \
56
+ --from-file=" ${CTX_CLUSTER3} /root-cert.pem" \
57
+ --from-file=" ${CTX_CLUSTER3} /cert-chain.pem"
58
58
popd
59
59
60
60
# label namespace in cluster1
@@ -184,5 +184,5 @@ bin/istioctl x create-remote-secret \
184
184
185
185
# cleanup: delete the istio repo at the end
186
186
cd ..
187
- rm -r istio-${ISTIO_VERSION}
187
+ rm -r " istio-${ISTIO_VERSION} "
188
188
rm -f cluster1.yaml cluster2.yaml cluster3.yaml
0 commit comments