forked from projectcontour/contour
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Makefile
364 lines (295 loc) · 13.9 KB
/
Makefile
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
ORG = projectcontour
PROJECT = contour
MODULE = github.com/$(ORG)/$(PROJECT)
REGISTRY ?= ghcr.io/projectcontour
IMAGE := $(REGISTRY)/$(PROJECT)
SRCDIRS := ./cmd ./internal ./apis
LOCAL_BOOTSTRAP_CONFIG = localenvoyconfig.yaml
SECURE_LOCAL_BOOTSTRAP_CONFIG = securelocalenvoyconfig.yaml
ENVOY_IMAGE = docker.io/envoyproxy/envoy:v1.22.2
GATEWAY_API_VERSION ?= $(shell grep "sigs.k8s.io/gateway-api" go.mod | awk '{print $$2}')
# Used to supply a local Envoy docker container an IP to connect to that is running
# 'contour serve'. On MacOS this will work, but may not on other OSes. Defining
# LOCALIP as an env var before running 'make local' will solve that.
LOCALIP ?= $(shell ifconfig | grep inet | grep -v '::' | grep -v 127.0.0.1 | head -n1 | awk '{print $$2}')
# Variables needed for running e2e tests.
CONTOUR_E2E_LOCAL_HOST ?= $(LOCALIP)
# Variables needed for running e2e and upgrade tests.
CONTOUR_UPGRADE_FROM_VERSION ?= $(shell ./test/scripts/get-contour-upgrade-from-version.sh)
CONTOUR_E2E_IMAGE ?= ghcr.io/projectcontour/contour:main
TAG_LATEST ?= false
ifeq ($(TAG_LATEST), true)
IMAGE_TAGS = \
--tag $(IMAGE):$(VERSION) \
--tag $(IMAGE):latest
else
IMAGE_TAGS = \
--tag $(IMAGE):$(VERSION)
endif
IMAGE_RESULT_FLAG = --output=type=oci,dest=$(shell pwd)/image/contour-$(VERSION).tar
ifeq ($(PUSH_IMAGE), true)
IMAGE_RESULT_FLAG = --push
endif
# Platforms to build the multi-arch image for.
IMAGE_PLATFORMS ?= linux/amd64,linux/arm64
# Base build image to use.
BUILD_BASE_IMAGE ?= golang:1.18.2
# Enable build with CGO.
BUILD_CGO_ENABLED ?= 0
# Go module mirror to use.
BUILD_GOPROXY ?= https://proxy.golang.org
# Sets GIT_REF to a tag if it's present, otherwise the short git sha will be used.
GIT_REF = $(shell git describe --tags --exact-match 2>/dev/null || git rev-parse --short=8 --verify HEAD)
# Used for Contour container image tag.
VERSION ?= $(GIT_REF)
# Stash the ISO 8601 date. Note that the GMT offset is missing the :
# separator, but there doesn't seem to be a way to do that without
# depending on GNU date.
ISO_8601_DATE = $(shell TZ=GMT date '+%Y-%m-%dT%R:%S%z')
# Sets the current Git sha.
BUILD_SHA = $(shell git rev-parse --verify HEAD)
# Sets the current branch. If we are on a detached header, filter it out so the
# branch will be empty. This is similar to --show-current.
BUILD_BRANCH = $(shell git branch | grep -v detached | awk '$$1=="*"{print $$2}')
# Sets the string output by "contour version" and labels on container image.
# Defaults to current tagged git version but can be overridden.
BUILD_VERSION ?= $(VERSION)
GO_BUILD_VARS = \
github.com/projectcontour/contour/internal/build.Version=${BUILD_VERSION} \
github.com/projectcontour/contour/internal/build.Sha=${BUILD_SHA} \
github.com/projectcontour/contour/internal/build.Branch=${BUILD_BRANCH}
GO_TAGS := -tags "oidc gcp osusergo netgo"
GO_LDFLAGS := -s -w $(patsubst %,-X %, $(GO_BUILD_VARS)) $(EXTRA_GO_LDFLAGS)
# Docker labels to be applied to the Contour image. We don't transform
# this with make because it's not worth pulling the tricks needed to handle
# the embedded whitespace.
#
# See https://github.com/opencontainers/image-spec/blob/master/annotations.md
DOCKER_BUILD_LABELS = \
--label "org.opencontainers.image.created=${ISO_8601_DATE}" \
--label "org.opencontainers.image.url=https://projectcontour.io/" \
--label "org.opencontainers.image.documentation=https://projectcontour.io/" \
--label "org.opencontainers.image.source=https://github.com/projectcontour/contour/archive/${BUILD_VERSION}.tar.gz" \
--label "org.opencontainers.image.version=${BUILD_VERSION}" \
--label "org.opencontainers.image.revision=${BUILD_SHA}" \
--label "org.opencontainers.image.vendor=Project Contour" \
--label "org.opencontainers.image.licenses=Apache-2.0" \
--label "org.opencontainers.image.title=Contour" \
--label "org.opencontainers.image.description=High performance ingress controller for Kubernetes"
export GO111MODULE=on
.PHONY: check
check: install check-test check-test-race ## Install and run tests
.PHONY: checkall
checkall: check lint check-generate
build: ## Build the contour binary
go build -mod=readonly -v -ldflags="$(GO_LDFLAGS)" $(GO_TAGS) $(MODULE)/cmd/contour
install: ## Build and install the contour binary
go install -mod=readonly -v -ldflags="$(GO_LDFLAGS)" $(GO_TAGS) $(MODULE)/cmd/contour
race:
go install -mod=readonly -v -race $(GO_TAGS) $(MODULE)/cmd/contour
download: ## Download Go modules
go mod download
multiarch-build: ## Build and optionally push a multi-arch Contour container image to the Docker registry
@mkdir -p $(shell pwd)/image
docker buildx build $(IMAGE_RESULT_FLAG) \
--platform $(IMAGE_PLATFORMS) \
--build-arg "BUILD_GOPROXY=$(BUILD_GOPROXY)" \
--build-arg "BUILD_BASE_IMAGE=$(BUILD_BASE_IMAGE)" \
--build-arg "BUILD_VERSION=$(BUILD_VERSION)" \
--build-arg "BUILD_BRANCH=$(BUILD_BRANCH)" \
--build-arg "BUILD_SHA=$(BUILD_SHA)" \
--build-arg "BUILD_CGO_ENABLED=$(BUILD_CGO_ENABLED)" \
--build-arg "BUILD_EXTRA_GO_LDFLAGS=$(BUILD_EXTRA_GO_LDFLAGS)" \
$(DOCKER_BUILD_LABELS) \
$(IMAGE_TAGS) \
$(shell pwd)
container: ## Build the Contour container image
docker build \
--build-arg "BUILD_GOPROXY=$(BUILD_GOPROXY)" \
--build-arg "BUILD_BASE_IMAGE=$(BUILD_BASE_IMAGE)" \
--build-arg "BUILD_VERSION=$(BUILD_VERSION)" \
--build-arg "BUILD_BRANCH=$(BUILD_BRANCH)" \
--build-arg "BUILD_SHA=$(BUILD_SHA)" \
--build-arg "BUILD_CGO_ENABLED=$(BUILD_CGO_ENABLED)" \
--build-arg "BUILD_EXTRA_GO_LDFLAGS=$(BUILD_EXTRA_GO_LDFLAGS)" \
$(DOCKER_BUILD_LABELS) \
$(shell pwd) \
--tag $(IMAGE):$(VERSION)
push: ## Push the Contour container image to the Docker registry
push: container
docker push $(IMAGE):$(VERSION)
ifeq ($(TAG_LATEST), true)
docker tag $(IMAGE):$(VERSION) $(IMAGE):latest
docker push $(IMAGE):latest
endif
.PHONY: check-test
check-test:
go test $(GO_TAGS) -cover -mod=readonly $(MODULE)/...
.PHONY: check-test-race
check-test-race: | check-test
go test $(GO_TAGS) -race -mod=readonly $(MODULE)/...
.PHONY: check-coverage
check-coverage: ## Run tests to generate code coverage
@go test \
$(GO_TAGS) \
-race \
-mod=readonly \
-covermode=atomic \
-coverprofile=coverage.out \
-coverpkg=./cmd/...,./internal/...,./pkg/... \
$(MODULE)/...
@go tool cover -html=coverage.out -o coverage.html
.PHONY: lint
lint: ## Run lint checks
lint: lint-golint lint-yamllint lint-flags lint-codespell
.PHONY: lint-codespell
lint-codespell: CODESPELL_SKIP := $(shell cat .codespell.skip | tr \\n ',')
lint-codespell:
@./hack/codespell.sh --skip $(CODESPELL_SKIP) --ignore-words .codespell.ignorewords --check-filenames --check-hidden -q2
.PHONY: lint-golint
lint-golint:
@echo Running Go linter ...
@./hack/golangci-lint run --build-tags=e2e
# The inline config is needed to allow the Gateway API validating webhook YAML
# (which we import directly from the Gateway API repo) to pass.
.PHONY: lint-yamllint
lint-yamllint:
@echo Running YAML linter ...
@./hack/yamllint -d "{rules: {brackets: {max-spaces-inside: 1}, commas: {max-spaces-before: 1}}}" examples/ site/content/examples/ ./versions.yaml
# Check that CLI flags are formatted consistently. We are checking
# for calls to Kingpin Flags() and Command() APIs where the 2nd
# argument (the help text) either doesn't start with a capital letter
# or doesn't end with a period. "xDS" and "gRPC" are exceptions to
# the first rule.
.PHONY: check-flags
lint-flags:
@if git --no-pager grep --extended-regexp '[.]Flag\("[^"]+", "([^A-Zxg][^"]+|[^"]+[^.])"' cmd/contour; then \
echo "ERROR: CLI flag help strings must start with a capital and end with a period."; \
exit 2; \
fi
@if git --no-pager grep --extended-regexp '[.]Command\("[^"]+", "([^A-Z][^"]+|[^"]+[^.])"' cmd/contour; then \
echo "ERROR: CLI flag help strings must start with a capital and end with a period."; \
exit 2; \
fi
.PHONY: generate
generate: ## Re-generate generated code and documentation
generate: generate-rbac generate-crd-deepcopy generate-crd-yaml generate-gateway-yaml generate-deployment generate-api-docs generate-metrics-docs generate-uml generate-go
.PHONY: generate-rbac
generate-rbac:
@echo Updating generated RBAC policy...
@./hack/generate-rbac.sh
.PHONY: generate-crd-deepcopy
generate-crd-deepcopy:
@echo Updating generated CRD deep-copy API code ...
@./hack/generate-crd-deepcopy.sh
.PHONY: generate-deployment
generate-deployment:
@echo Generating example deployment files ...
@./hack/generate-deployment.sh deployment
@./hack/generate-deployment.sh daemonset
@./hack/generate-gateway-deployment.sh
@./hack/generate-provisioner-deployment.sh
.PHONY: generate-crd-yaml
generate-crd-yaml:
@echo "Generating Contour CRD YAML documents..."
@./hack/generate-crd-yaml.sh
.PHONY: generate-gateway-yaml
generate-gateway-yaml:
@echo "Generating Gateway API CRD YAML documents..."
@kubectl kustomize -o examples/gateway/00-crds.yaml "github.com/kubernetes-sigs/gateway-api/config/crd/experimental?ref=${GATEWAY_API_VERSION}"
@echo "---" >> examples/gateway/00-crds.yaml
@curl -s https://raw.githubusercontent.com/kubernetes-sigs/gateway-api/${GATEWAY_API_VERSION}/config/crd/experimental/gateway.networking.k8s.io_referencepolicies.yaml >> examples/gateway/00-crds.yaml
@echo "Generating Gateway API webhook documents..."
@curl -s -o examples/gateway/01-admission_webhook.yaml https://raw.githubusercontent.com/kubernetes-sigs/gateway-api/${GATEWAY_API_VERSION}/config/webhook/admission_webhook.yaml
@curl -s -o examples/gateway/02-certificate_config.yaml https://raw.githubusercontent.com/kubernetes-sigs/gateway-api/${GATEWAY_API_VERSION}/config/webhook/certificate_config.yaml
.PHONY: generate-api-docs
generate-api-docs:
@echo "Generating API documentation..."
@./hack/generate-api-docs.sh github.com/projectcontour/contour/apis/projectcontour
.PHONY: generate-metrics-docs
generate-metrics-docs:
@echo "Generating metrics documentation..."
@cd site/content/guides/metrics && rm -f *.md && go run ../../../../hack/generate-metrics-doc.go
.PHONY: generate-go
generate-go:
@echo "Generating mocks..."
@go generate ./...
.PHONY: check-generate
check-generate: generate
@./hack/actions/check-uncommitted-codegen.sh
# Site development targets
generate-uml: $(patsubst %.uml,%.png,$(wildcard site/img/uml/*.uml))
# Generate a PNG from a PlantUML specification. This rule should only
# trigger when someone updates the UML and that person needs to have
# PlantUML installed.
%.png: %.uml
cd `dirname $@` && plantuml `basename "$^"`
.PHONY: site-devel
site-devel: ## Launch the website
cd site && hugo serve
.PHONY: site-check
site-check: ## Test the site's links
# TODO: Clean up to use htmltest
# Tools for testing and troubleshooting
.PHONY: setup-kind-cluster
setup-kind-cluster: ## Make a kind cluster for testing
./test/scripts/make-kind-cluster.sh
.PHONY: install-contour-working
install-contour-working: | setup-kind-cluster ## Install the local working directory version of Contour into a kind cluster
./test/scripts/install-contour-working.sh
.PHONY: install-contour-release
install-contour-release: | setup-kind-cluster ## Install the release version of Contour in CONTOUR_UPGRADE_FROM_VERSION, defaults to latest
./test/scripts/install-contour-release.sh $(CONTOUR_UPGRADE_FROM_VERSION)
.PHONY: e2e
e2e: | setup-kind-cluster load-contour-image-kind run-e2e cleanup-kind ## Run E2E tests against a real k8s cluster
.PHONY: run-e2e
run-e2e:
CONTOUR_E2E_LOCAL_HOST=$(CONTOUR_E2E_LOCAL_HOST) \
CONTOUR_E2E_IMAGE=$(CONTOUR_E2E_IMAGE) \
ginkgo -tags=e2e -mod=readonly -skip-package=upgrade,bench -keep-going -randomize-suites -randomize-all -slow-spec-threshold=120s -r ./test/e2e
.PHONY: cleanup-kind
cleanup-kind:
./test/scripts/cleanup.sh
## Loads contour image into kind cluster specified by CLUSTERNAME (default
## contour-e2e). By default for local development will build the current
## working contour source and load into the cluster. If LOAD_PREBUILT_IMAGE
## is specified and set to true, it will load a pre-build image. This requires
## the multiarch-build target to have been run which puts the Contour docker
## image at <repo>/image/contour-version.tar.gz. This second option is chosen
## in CI to speed up builds.
.PHONY: load-contour-image-kind
load-contour-image-kind: ## Load Contour image from building working source or pre-built image into Kind.
./test/scripts/kind-load-contour-image.sh
.PHONY: upgrade
upgrade: | install-contour-release load-contour-image-kind run-upgrade cleanup-kind ## Run upgrade tests against a real k8s cluster
.PHONY: run-upgrade
run-upgrade:
CONTOUR_UPGRADE_FROM_VERSION=$(CONTOUR_UPGRADE_FROM_VERSION) \
CONTOUR_E2E_IMAGE=$(CONTOUR_E2E_IMAGE) \
ginkgo -tags=e2e -mod=readonly -randomize-all -slow-spec-threshold=300s -v ./test/e2e/upgrade
.PHONY: check-ingress-conformance
check-ingress-conformance: | install-contour-working run-ingress-conformance cleanup-kind ## Run Ingress controller conformance
.PHONY: run-ingress-conformance
run-ingress-conformance:
./test/scripts/run-ingress-conformance.sh
.PHONY: gateway-conformance
gateway-conformance: | setup-kind-cluster load-contour-image-kind run-gateway-conformance cleanup-kind ## Setup a kind cluster and run Gateway API conformance tests in it.
.PHONY: run-gatway-conformance
run-gateway-conformance: ## Run Gateway API conformance tests against the current cluster.
GATEWAY_API_VERSION=$(GATEWAY_API_VERSION) ./test/scripts/run-gateway-conformance.sh
.PHONY: deploy-gcp-bench-cluster
deploy-gcp-bench-cluster:
./test/scripts/gcp-bench-cluster.sh deploy
.PHONY: teardown-gcp-bench-cluster
teardown-gcp-bench-cluster:
./test/scripts/gcp-bench-cluster.sh teardown
.PHONY: run-bench
run-bench:
ginkgo -tags=e2e -mod=readonly -keep-going -randomize-suites -randomize-all -slow-spec-threshold=4h -timeout=5h -r -v ./test/e2e/bench
.PHONY: bench
bench: deploy-gcp-bench-cluster run-bench teardown-gcp-bench-cluster
help: ## Display this help
@echo Contour high performance Ingress controller for Kubernetes
@echo
@echo Targets:
@awk 'BEGIN {FS = ":.*?## "} /^[a-zA-Z0-9._-]+:.*?## / {printf " %-25s %s\n", $$1, $$2}' $(MAKEFILE_LIST) | sort