Skip to content

Commit 8a25e4d

Browse files
committed
Update Tiltfile
1 parent c263b55 commit 8a25e4d

File tree

4 files changed

+64
-56
lines changed

4 files changed

+64
-56
lines changed

Tiltfile

Lines changed: 62 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,29 @@ docker_build_with_restart(IMG, '.',
2222
)
2323

2424
# Cilium CNI
25-
helm_remote('cilium',
26-
version="1.15.0-pre.1",
27-
namespace="kube-system",
28-
repo_name='cilium',
29-
values=['./test/cilium/helm-values.yaml'],
30-
repo_url='https://helm.cilium.io')
31-
k8s_yaml('./test/cilium/dual-stack/crd-values.yaml')
25+
helm_remote(
26+
'cilium',
27+
version="1.15.0",
28+
namespace="kube-system",
29+
repo_name='cilium',
30+
values=['./test/cilium/helm-values.yaml'],
31+
repo_url='https://helm.cilium.io'
32+
)
33+
34+
# Create a local resource that waits for Cilium's deployment to be complete
35+
local_resource(
36+
'cilium_wait',
37+
cmd='echo "Waiting for Cilium..."',
38+
resource_deps=['cilium'],
39+
deps=['./test/cilium/helm-values.yaml']
40+
)
41+
42+
local_resource(
43+
'lb_crds',
44+
cmd='kubectl apply -f ./test/cilium/dual-stack/crd-values.yaml',
45+
resource_deps=['cilium_wait'],
46+
deps=['./test/cilium/dual-stack/crd-values.yaml']
47+
)
3248

3349
# Cert-manager
3450
helm_remote('cert-manager',
@@ -37,13 +53,13 @@ helm_remote('cert-manager',
3753
repo_name='jetstack',
3854
set=['crds.enabled=true'],
3955
repo_url='https://charts.jetstack.io')
40-
k8s_yaml('./test/cert-manager/clusterIssuer.yaml')
4156

42-
helm_remote('cert-manager-webhook-pinax',
43-
version="0.1.0",
44-
namespace="kube-system",
45-
repo_name='oci://ghcr.io/pinax-network/charts',
46-
set=['certManager.namespace=kube-system'])
57+
# helm_remote('cert-manager-webhook-pinax',
58+
# version="0.1.0",
59+
# namespace="kube-system",
60+
# repo_name='oci://ghcr.io/pinax-network/charts',
61+
# set=['certManager.namespace=kube-system'])
62+
#
4763

4864
# CoreDNS with updated RBAC
4965
k8s_yaml(helm(
@@ -54,46 +70,47 @@ k8s_yaml(helm(
5470
)
5571
)
5672

57-
# Baremetal ingress controller (nodeport-based)
73+
# # Baremetal ingress controller (nodeport-based)
5874
helm_remote('ingress-nginx',
5975
version="4.8.3",
6076
repo_name='ingress-nginx',
6177
set=['controller.admissionWebhooks.enabled=false'],
6278
repo_url='https://kubernetes.github.io/ingress-nginx')
63-
64-
# Nginxinc kubernetes-ingress
65-
helm_remote('nginx-ingress',
66-
version="1.0.1",
67-
release_name="nginxinc",
68-
repo_name='oci://ghcr.io/nginxinc/charts',
69-
values=['./test/nginxinc-kubernetes-ingress/values.yaml']
70-
)
71-
k8s_kind('VirtualServer', api_version='k8s.nginx.org/v1')
72-
73-
helm_remote('istiod',
74-
version="1.19.3",
75-
repo_name='istio',
76-
set=['global.istioNamespace=default', 'base.enableIstioConfigCRDs=false', 'telemetry.enabled=false'],
77-
repo_url='https://istio-release.storage.googleapis.com/charts')
78-
helm_remote('gateway',
79-
version="1.19.3",
80-
repo_name='istio',
81-
namespace='default',
82-
repo_url='https://istio-release.storage.googleapis.com/charts')
79+
#
80+
# # Nginxinc kubernetes-ingress
81+
# helm_remote('nginx-ingress',
82+
# version="1.0.1",
83+
# release_name="nginxinc",
84+
# repo_name='oci://ghcr.io/nginxinc/charts',
85+
# values=['./test/nginxinc-kubernetes-ingress/values.yaml']
86+
# )
87+
# k8s_kind('VirtualServer', api_version='k8s.nginx.org/v1')
88+
#
89+
# helm_remote('istiod',
90+
# version="1.19.3",
91+
# repo_name='istio',
92+
# set=['global.istioNamespace=default', 'base.enableIstioConfigCRDs=false', 'telemetry.enabled=false'],
93+
# repo_url='https://istio-release.storage.googleapis.com/charts')
94+
# helm_remote('gateway',
95+
# version="1.19.3",
96+
# repo_name='istio',
97+
# namespace='default',
98+
# repo_url='https://istio-release.storage.googleapis.com/charts')
99+
#
83100

84101
# Backend deployment for testing
85102
k8s_yaml('./test/backend.yml')
86103

87-
# gateway-apis
88-
k8s_yaml('./test/gateway-api/crds.yml')
89-
90-
# Gateway API
91-
k8s_kind('HTTPRoute', api_version='gateway.networking.k8s.io/v1')
92-
k8s_kind('TLSRoute', api_version='gateway.networking.k8s.io/v1alpha2')
93-
k8s_kind('GRPCRoute', api_version='gateway.networking.k8s.io/v1alpha2')
94-
k8s_kind('Gateway', api_version='gateway.networking.k8s.io/v1')
95-
k8s_yaml('./test/gateway-api/resources.yml')
96-
k8s_yaml('./test/gatewayclasses.yaml')
104+
# # gateway-apis
105+
# k8s_yaml('./test/gateway-api/crds.yml')
106+
#
107+
# # Gateway API
108+
# k8s_kind('HTTPRoute', api_version='gateway.networking.k8s.io/v1')
109+
# k8s_kind('TLSRoute', api_version='gateway.networking.k8s.io/v1alpha2')
110+
# k8s_kind('GRPCRoute', api_version='gateway.networking.k8s.io/v1alpha2')
111+
# k8s_kind('Gateway', api_version='gateway.networking.k8s.io/v1')
112+
# k8s_yaml('./test/gateway-api/resources.yml')
113+
# k8s_yaml('./test/gatewayclasses.yaml')
97114
k8s_yaml('./test/dual-stack/service-annotation.yml')
98115
k8s_yaml('./test/dual-stack/ingress-services.yml')
99-
k8s_yaml('./test/dual-stack/certificate.yaml')
116+
# k8s_yaml('./test/dual-stack/certificate.yaml')

test/cilium/dual-stack/crd-values.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,9 @@ kind: CiliumLoadBalancerIPPool
44
metadata:
55
name: default
66
spec:
7-
cidrs:
7+
blocks:
88
- cidr: 198.51.100.0/24
99
- cidr: fd12:3456:789a:1::/64
10-
1110
---
1211
apiVersion: cilium.io/v2alpha1
1312
kind: CiliumL2AnnouncementPolicy

test/cilium/helm-values.yaml

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,5 @@
1-
bpf:
2-
masquerade: true
31
cluster:
42
name: local
5-
containerRuntime:
6-
integration: containerd
73
endpointRoutes:
84
enabled: true
95
enableCiliumEndpointSlice: true
@@ -22,9 +18,6 @@ ipam:
2218
clusterPoolIPv4PodCIDRList:
2319
- "10.43.0.0/16"
2420
clusterPoolIPv4MaskSize: 24
25-
# clusterPoolIPv6PodCIDRList:
26-
# - "fd00::/104"
27-
# clusterPoolIPv6MaskSize: 120
2821
kubeProxyReplacement: true
2922
kubeProxyReplacementHealthzBindAddr: 0.0.0.0:10256
3023
k8sServiceHost: 127.0.0.1
@@ -55,4 +48,3 @@ securityContext:
5548
- NET_ADMIN
5649
- SYS_ADMIN
5750
- SYS_RESOURCE
58-
tunnel: disabled

test/cilium/single-stack/crd-values.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ kind: CiliumLoadBalancerIPPool
44
metadata:
55
name: default
66
spec:
7-
cidrs:
7+
blocks:
88
- cidr: 198.51.100.0/24
99
---
1010
apiVersion: cilium.io/v2alpha1

0 commit comments

Comments
 (0)