mirror of
https://github.com/rocky-linux/peridot.git
synced 2024-11-23 05:31:30 +00:00
Support changing local domain
This commit is contained in:
parent
d62a16923f
commit
26ab9cbdb2
@ -109,11 +109,12 @@ local manifestYamlStream = function (value, indent_array_in_object=false, c_docu
|
|||||||
image: image,
|
image: image,
|
||||||
tag: tag,
|
tag: tag,
|
||||||
};
|
};
|
||||||
|
local istio_mode = if helm_mode then false else if utils.local_image then false else true;
|
||||||
|
|
||||||
{
|
{
|
||||||
[nssa]: (if helm_mode then '{{ if not .Values.serviceAccountName }}\n' else '') + manifestYamlStream([
|
[nssa]: (if helm_mode then '{{ if not .Values.serviceAccountName }}\n' else '') + manifestYamlStream([
|
||||||
// disable namespace creation in helm mode
|
// disable namespace creation in helm mode
|
||||||
if !helm_mode then kubernetes.define_namespace(metadata.namespace, infolabels),
|
if !helm_mode then kubernetes.define_namespace(metadata.namespace, infolabels + { annotations: { 'linkerd.io/inject': 'enabled' } }),
|
||||||
kubernetes.define_service_account(
|
kubernetes.define_service_account(
|
||||||
metadata {
|
metadata {
|
||||||
name: fixed.name,
|
name: fixed.name,
|
||||||
@ -285,22 +286,22 @@ local manifestYamlStream = function (value, indent_array_in_object=false, c_docu
|
|||||||
selector=metadata.name,
|
selector=metadata.name,
|
||||||
env=mappings.get_env_from_svc(srv.name)
|
env=mappings.get_env_from_svc(srv.name)
|
||||||
) for srv in services] +
|
) for srv in services] +
|
||||||
if !helm_mode then [] else [if std.objectHas(srv, 'expose') && srv.expose then kubernetes.define_ingress(
|
if istio_mode then [] else [if std.objectHas(srv, 'expose') && srv.expose then kubernetes.define_ingress(
|
||||||
metadata {
|
metadata {
|
||||||
name: srv.name,
|
name: srv.name,
|
||||||
annotations: ingress_annotations + {
|
annotations: ingress_annotations + {
|
||||||
'kubernetes.io/ingress.class': '{{ .Values.ingressClass | default !"!" }}',
|
'kubernetes.io/ingress.class': if helm_mode then '{{ .Values.ingressClass | default !"!" }}' else 'kong',
|
||||||
// Secure only by default
|
// Secure only by default
|
||||||
// This produces https, grpcs, etc.
|
// This produces https, grpcs, etc.
|
||||||
// todo(mustafa): check if we need to add an exemption to a protocol (TCP comes to mind)
|
// todo(mustafa): check if we need to add an exemption to a protocol (TCP comes to mind)
|
||||||
'konghq.com/protocols': '{{ .Values.kongProtocols | default !"%ss!"' % std.strReplace(std.strReplace(std.strReplace(srv.name, metadata.name, ''), stage, ''), '-', ''),
|
'konghq.com/protocols': (if helm_mode then '{{ .Values.kongProtocols | default !"%ss!" }}' else '%ss') % std.strReplace(std.strReplace(std.strReplace(srv.name, metadata.name, ''), stage, ''), '-', ''),
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
host=if helm_mode then '{{ .Values.%s.ingressHost }}' % srv.portName else mappings.get(srv.name, user),
|
host=if helm_mode then '{{ .Values.%s.ingressHost }}' % srv.portName else mappings.get(srv.name, user),
|
||||||
port=srv.port,
|
port=srv.port,
|
||||||
srvName=srv.name + '-service',
|
srvName=srv.name + '-service',
|
||||||
) else null for srv in services] +
|
) else null for srv in services] +
|
||||||
if helm_mode then [] else [kubernetes.define_virtual_service(metadata { name: srv.name + '-internal' }, {
|
if !istio_mode then [] else [kubernetes.define_virtual_service(metadata { name: srv.name + '-internal' }, {
|
||||||
hosts: [vshost(srv)],
|
hosts: [vshost(srv)],
|
||||||
gateways: [],
|
gateways: [],
|
||||||
http: [
|
http: [
|
||||||
@ -317,7 +318,7 @@ local manifestYamlStream = function (value, indent_array_in_object=false, c_docu
|
|||||||
},
|
},
|
||||||
],
|
],
|
||||||
},) for srv in services] +
|
},) for srv in services] +
|
||||||
if helm_mode then [] else [if std.objectHas(srv, 'expose') && srv.expose then kubernetes.define_virtual_service(
|
if !istio_mode then [] else [if std.objectHas(srv, 'expose') && srv.expose then kubernetes.define_virtual_service(
|
||||||
metadata {
|
metadata {
|
||||||
name: srv.name,
|
name: srv.name,
|
||||||
annotations: {
|
annotations: {
|
||||||
@ -342,7 +343,7 @@ local manifestYamlStream = function (value, indent_array_in_object=false, c_docu
|
|||||||
],
|
],
|
||||||
}
|
}
|
||||||
) else null for srv in services] +
|
) else null for srv in services] +
|
||||||
if helm_mode then [] else [{
|
if !istio_mode then [] else [{
|
||||||
apiVersion: 'security.istio.io/v1beta1',
|
apiVersion: 'security.istio.io/v1beta1',
|
||||||
kind: 'RequestAuthentication',
|
kind: 'RequestAuthentication',
|
||||||
metadata: metadata {
|
metadata: metadata {
|
||||||
@ -363,7 +364,7 @@ local manifestYamlStream = function (value, indent_array_in_object=false, c_docu
|
|||||||
}] else [],
|
}] else [],
|
||||||
},
|
},
|
||||||
} for srv in services] +
|
} for srv in services] +
|
||||||
if helm_mode then [] else [{
|
if !istio_mode then [] else [{
|
||||||
apiVersion: 'security.istio.io/v1beta1',
|
apiVersion: 'security.istio.io/v1beta1',
|
||||||
kind: 'AuthorizationPolicy',
|
kind: 'AuthorizationPolicy',
|
||||||
metadata: metadata {
|
metadata: metadata {
|
||||||
@ -388,7 +389,7 @@ local manifestYamlStream = function (value, indent_array_in_object=false, c_docu
|
|||||||
}],
|
}],
|
||||||
},
|
},
|
||||||
} for srv in services] +
|
} for srv in services] +
|
||||||
if helm_mode then [] else [kubernetes.define_destination_rule(metadata { name: srv.name }, {
|
if !istio_mode then [] else [kubernetes.define_destination_rule(metadata { name: srv.name }, {
|
||||||
host: vshost(srv),
|
host: vshost(srv),
|
||||||
trafficPolicy: {
|
trafficPolicy: {
|
||||||
tls: {
|
tls: {
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
# sync-ignore-file: true
|
local local_domain = std.extVar("local_domain");
|
||||||
|
|
||||||
{
|
{
|
||||||
local_domain: '.pdev.resf.localhost',
|
local_domain: local_domain,
|
||||||
default_domain: '.build.resf.org',
|
default_domain: '.build.resf.org',
|
||||||
service_mappings: {
|
service_mappings: {
|
||||||
'peridotserver-http': {
|
'peridotserver-http': {
|
||||||
|
@ -53,6 +53,7 @@ def gen_from_jsonnet(name, src, outs, tags, force_normal_tags, helm_mode, **kwar
|
|||||||
"domain_user": "{STABLE_DOMAIN_USER}",
|
"domain_user": "{STABLE_DOMAIN_USER}",
|
||||||
"registry_secret": "{STABLE_REGISTRY_SECRET}",
|
"registry_secret": "{STABLE_REGISTRY_SECRET}",
|
||||||
"site": "{STABLE_SITE}",
|
"site": "{STABLE_SITE}",
|
||||||
|
"local_domain": "{STABLE_LOCAL_DOMAIN}",
|
||||||
"helm_mode": "false",
|
"helm_mode": "false",
|
||||||
}
|
}
|
||||||
if helm_mode:
|
if helm_mode:
|
||||||
@ -84,6 +85,7 @@ def gen_from_jsonnet(name, src, outs, tags, force_normal_tags, helm_mode, **kwar
|
|||||||
"domain_user",
|
"domain_user",
|
||||||
"registry_secret",
|
"registry_secret",
|
||||||
"site",
|
"site",
|
||||||
|
"local_domain",
|
||||||
],
|
],
|
||||||
multiple_outputs = True,
|
multiple_outputs = True,
|
||||||
extra_args = ["-S"],
|
extra_args = ["-S"],
|
||||||
|
@ -41,4 +41,5 @@ STABLE_OCI_REGISTRY_DOCKER ${STABLE_OCI_REGISTRY_DOCKER:-docker.io}
|
|||||||
STABLE_REGISTRY_SECRET ${STABLE_REGISTRY_SECRET:-none}
|
STABLE_REGISTRY_SECRET ${STABLE_REGISTRY_SECRET:-none}
|
||||||
STABLE_OCI_REGISTRY_NO_NESTED_SUPPORT_IN_2022_SHAME_ON_YOU_AWS ${STABLE_OCI_REGISTRY_NO_NESTED_SUPPORT_IN_2022_SHAME_ON_YOU_AWS:-false}
|
STABLE_OCI_REGISTRY_NO_NESTED_SUPPORT_IN_2022_SHAME_ON_YOU_AWS ${STABLE_OCI_REGISTRY_NO_NESTED_SUPPORT_IN_2022_SHAME_ON_YOU_AWS:-false}
|
||||||
STABLE_SITE ${STABLE_SITE:-normal}
|
STABLE_SITE ${STABLE_SITE:-normal}
|
||||||
|
STABLE_LOCAL_DOMAIN ${STABLE_LOCAL_DOMAIN:-.pdev.resf.localhost}
|
||||||
EOF
|
EOF
|
||||||
|
Loading…
Reference in New Issue
Block a user