@@ -22,13 +22,29 @@ docker_build_with_restart(IMG, '.',
22
22
)
23
23
24
24
# Cilium CNI
25
- helm_remote ('cilium' ,
26
- version = "1.15.0-pre.1" ,
27
- namespace = "kube-system" ,
28
- repo_name = 'cilium' ,
29
- values = ['./test/cilium/helm-values.yaml' ],
30
- repo_url = 'https://helm.cilium.io' )
31
- k8s_yaml ('./test/cilium/dual-stack/crd-values.yaml' )
25
+ helm_remote (
26
+ 'cilium' ,
27
+ version = "1.15.0" ,
28
+ namespace = "kube-system" ,
29
+ repo_name = 'cilium' ,
30
+ values = ['./test/cilium/helm-values.yaml' ],
31
+ repo_url = 'https://helm.cilium.io'
32
+ )
33
+
34
+ # Create a local resource that waits for Cilium's deployment to be complete
35
+ local_resource (
36
+ 'cilium_wait' ,
37
+ cmd = 'echo "Waiting for Cilium..."' ,
38
+ resource_deps = ['cilium' ],
39
+ deps = ['./test/cilium/helm-values.yaml' ]
40
+ )
41
+
42
+ local_resource (
43
+ 'lb_crds' ,
44
+ cmd = 'kubectl apply -f ./test/cilium/dual-stack/crd-values.yaml' ,
45
+ resource_deps = ['cilium_wait' ],
46
+ deps = ['./test/cilium/dual-stack/crd-values.yaml' ]
47
+ )
32
48
33
49
# Cert-manager
34
50
helm_remote ('cert-manager' ,
@@ -37,13 +53,13 @@ helm_remote('cert-manager',
37
53
repo_name = 'jetstack' ,
38
54
set = ['crds.enabled=true' ],
39
55
repo_url = 'https://charts.jetstack.io' )
40
- k8s_yaml ('./test/cert-manager/clusterIssuer.yaml' )
41
56
42
- helm_remote ('cert-manager-webhook-pinax' ,
43
- version = "0.1.0" ,
44
- namespace = "kube-system" ,
45
- repo_name = 'oci://ghcr.io/pinax-network/charts' ,
46
- set = ['certManager.namespace=kube-system' ])
57
+ # helm_remote('cert-manager-webhook-pinax',
58
+ # version="0.1.0",
59
+ # namespace="kube-system",
60
+ # repo_name='oci://ghcr.io/pinax-network/charts',
61
+ # set=['certManager.namespace=kube-system'])
62
+ #
47
63
48
64
# CoreDNS with updated RBAC
49
65
k8s_yaml (helm (
@@ -54,46 +70,47 @@ k8s_yaml(helm(
54
70
)
55
71
)
56
72
57
- # Baremetal ingress controller (nodeport-based)
73
+ # # Baremetal ingress controller (nodeport-based)
58
74
helm_remote ('ingress-nginx' ,
59
75
version = "4.8.3" ,
60
76
repo_name = 'ingress-nginx' ,
61
77
set = ['controller.admissionWebhooks.enabled=false' ],
62
78
repo_url = 'https://kubernetes.github.io/ingress-nginx' )
63
-
64
- # Nginxinc kubernetes-ingress
65
- helm_remote ('nginx-ingress' ,
66
- version = "1.0.1" ,
67
- release_name = "nginxinc" ,
68
- repo_name = 'oci://ghcr.io/nginxinc/charts' ,
69
- values = ['./test/nginxinc-kubernetes-ingress/values.yaml' ]
70
- )
71
- k8s_kind ('VirtualServer' , api_version = 'k8s.nginx.org/v1' )
72
-
73
- helm_remote ('istiod' ,
74
- version = "1.19.3" ,
75
- repo_name = 'istio' ,
76
- set = ['global.istioNamespace=default' , 'base.enableIstioConfigCRDs=false' , 'telemetry.enabled=false' ],
77
- repo_url = 'https://istio-release.storage.googleapis.com/charts' )
78
- helm_remote ('gateway' ,
79
- version = "1.19.3" ,
80
- repo_name = 'istio' ,
81
- namespace = 'default' ,
82
- repo_url = 'https://istio-release.storage.googleapis.com/charts' )
79
+ #
80
+ # # Nginxinc kubernetes-ingress
81
+ # helm_remote('nginx-ingress',
82
+ # version="1.0.1",
83
+ # release_name="nginxinc",
84
+ # repo_name='oci://ghcr.io/nginxinc/charts',
85
+ # values=['./test/nginxinc-kubernetes-ingress/values.yaml']
86
+ # )
87
+ # k8s_kind('VirtualServer', api_version='k8s.nginx.org/v1')
88
+ #
89
+ # helm_remote('istiod',
90
+ # version="1.19.3",
91
+ # repo_name='istio',
92
+ # set=['global.istioNamespace=default', 'base.enableIstioConfigCRDs=false', 'telemetry.enabled=false'],
93
+ # repo_url='https://istio-release.storage.googleapis.com/charts')
94
+ # helm_remote('gateway',
95
+ # version="1.19.3",
96
+ # repo_name='istio',
97
+ # namespace='default',
98
+ # repo_url='https://istio-release.storage.googleapis.com/charts')
99
+ #
83
100
84
101
# Backend deployment for testing
85
102
k8s_yaml ('./test/backend.yml' )
86
103
87
- # gateway-apis
88
- k8s_yaml ('./test/gateway-api/crds.yml' )
89
-
90
- # Gateway API
91
- k8s_kind ('HTTPRoute' , api_version = 'gateway.networking.k8s.io/v1' )
92
- k8s_kind ('TLSRoute' , api_version = 'gateway.networking.k8s.io/v1alpha2' )
93
- k8s_kind ('GRPCRoute' , api_version = 'gateway.networking.k8s.io/v1alpha2' )
94
- k8s_kind ('Gateway' , api_version = 'gateway.networking.k8s.io/v1' )
95
- k8s_yaml ('./test/gateway-api/resources.yml' )
96
- k8s_yaml ('./test/gatewayclasses.yaml' )
104
+ # # gateway-apis
105
+ # k8s_yaml('./test/gateway-api/crds.yml')
106
+ #
107
+ # # Gateway API
108
+ # k8s_kind('HTTPRoute', api_version='gateway.networking.k8s.io/v1')
109
+ # k8s_kind('TLSRoute', api_version='gateway.networking.k8s.io/v1alpha2')
110
+ # k8s_kind('GRPCRoute', api_version='gateway.networking.k8s.io/v1alpha2')
111
+ # k8s_kind('Gateway', api_version='gateway.networking.k8s.io/v1')
112
+ # k8s_yaml('./test/gateway-api/resources.yml')
113
+ # k8s_yaml('./test/gatewayclasses.yaml')
97
114
k8s_yaml ('./test/dual-stack/service-annotation.yml' )
98
115
k8s_yaml ('./test/dual-stack/ingress-services.yml' )
99
- k8s_yaml ('./test/dual-stack/certificate.yaml' )
116
+ # k8s_yaml('./test/dual-stack/certificate.yaml')
0 commit comments