-
Notifications
You must be signed in to change notification settings - Fork 46
/
Makefile.mk
427 lines (319 loc) · 15.8 KB
/
Makefile.mk
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
FETCH_DIR := build/base
TMP_TEMPLATE_DIR := build/tmp
OUTPUT_DIR := config-root
KUBEAPPLY ?= kubectl-apply
HELM_TMP_GENERATE ?= /tmp/generate
HELM_TMP_SECRETS ?= /tmp/secrets/jx-helm
# lets you define a post apply hook such as to run custom validation
POST_APPLY_HOOK ?=
# this target is only needed for development clusters
# for remote staging/production clusters try:
#
# export COPY_SOURCE=no-copy-source
COPY_SOURCE ?= copy-source
# this target is only needed for development clusters
# for remote staging/production clusters try:
#
# export GENERATE_SCHEDULER=no-gitops-scheduler
GENERATE_SCHEDULER ?= gitops-scheduler
# this target is only needed for development clusters
# for remote staging/production clusters try:
#
# export REPOSITORY_RESOLVE=no-repository-resolve
REPOSITORY_RESOLVE ?= repository-resolve
# this target is only needed for development clusters
# for remote staging/production clusters try:
#
# export GITOPS_WEBHOOK_UPDATE=no-gitops-webhook-update
GITOPS_WEBHOOK_UPDATE ?= gitops-webhook-update
# these values are only required for vault - you can ignore if you are using a cloud secret store
VAULT_ADDR ?= https://vault.jx-vault:8200
VAULT_NAMESPACE ?= jx-vault
VAULT_ROLE ?= jx-vault
VAULT_MOUNT_POINT ?= kubernetes
EXTERNAL_VAULT ?= false
# on the case we need to specify a different vault role between the jx secret convert and the jx secret populate commands
# VAULT_ROLE_POPULATE is a unique vault role just for the jx secret populate command
# VAULT_ROLE_EXTERNAL_SECRETS is a unique vault role just for the jx secret convert command
VAULT_ROLE_POPULATE ?= ${VAULT_ROLE}
VAULT_ROLE_EXTERNAL_SECRETS ?= ${VAULT_ROLE}
# on the case we need to specify a different vault mount point between the jx secret convert and the jx secret populate commands
# VAULT_MOUNT_POINT_POPULATE is a unique vault mount point just for the jx secret populate command
# VAULT_MOUNT_POINT_EXTERNAL_SECRETS is a unique vault mount point just for the jx secret convert command
VAULT_MOUNT_POINT_POPULATE ?= ${VAULT_MOUNT_POINT}
VAULT_MOUNT_POINT_EXTERNAL_SECRETS ?= ${VAULT_MOUNT_POINT}
GIT_SHA ?= $(shell git rev-parse HEAD)
# NEW_CLUSTER is set on command line by jx gitops apply for regen targets
NEW_CLUSTER ?= false
# You can disable force mode on kubectl apply by modifying this line:
KUBECTL_APPLY_FLAGS ?= --server-side=true --force-conflicts
KPT_LIVE_APPLY_FLAGS ?= --install-resource-group --inventory-policy=adopt --reconcile-timeout=15m
# When using kpt live apply on a development cluster you could set
# PR_LINT = kpt-apply-dry-run
# in the repository Makefile to get a linting of the manifests
PR_LINT ?=
SOURCE_DIR ?= /workspace/source
# NOTE to enable debug logging of 'helmfile template' to diagnose any issues with values.yaml templating
# you can run:
#
# export HELMFILE_TEMPLATE_FLAGS="--debug"
#
# or change the next line to:
# HELMFILE_TEMPLATE_FLAGS ?= --debug
HELMFILE_TEMPLATE_FLAGS ?=
# this option configure use of selector to regenerate only namespaces with changes
# by default, regenerate all. To regenerate only namespace try
# HELMFILE_USE_SELECTORS = true
HELMFILE_USE_SELECTORS ?= false
CLEAN_OUTPUT_DIR ?= $(if $(findstring true,$(HELMFILE_USE_SELECTORS)),,$(OUTPUT_DIR)/*/*/)
HELMFILE_GLOBAL_FLAGS += $(if $(findstring true,$(HELMFILE_USE_SELECTORS)),$(shell versionStream/src/get-selectors-and-clean.sh $(OUTPUT_DIR)),)
.PHONY: clean
clean:
@rm -rf build $(CLEAN_OUTPUT_DIR) $(HELM_TMP_SECRETS) $(HELM_TMP_GENERATE)
.PHONY: setup
setup:
.PHONY: copy-source
copy-source:
@cp -r versionStream/src/* build
.PHONY: no-copy-source
no-copy-source:
@echo "disabled the copy source as we are not a development cluster"
.PHONY: init
init: setup
@mkdir -p $(FETCH_DIR)
@mkdir -p $(TMP_TEMPLATE_DIR)
@mkdir -p $(OUTPUT_DIR)/namespaces/jx
@mkdir -p $(FETCH_DIR)/cluster/crds
.PHONY: repository-resolve
repository-resolve:
# lets create any missing SourceRepository defined in .jx/gitops/source-config.yaml which are not in: versionStream/src/base/namespaces/jx/source-repositories
jx gitops repository create
# lets configure the cluster gitops repository URL on the requirements if its missing
jx gitops repository resolve --source-dir $(OUTPUT_DIR)/namespaces
# lets generate any jenkins job-values.yaml files to import projects into Jenkins
jx gitops jenkins jobs
.PHONY: no-repository-resolve
no-repository-resolve:
@echo "disabled the repository resolve as we are not a development cluster"
.PHONY: gitops-scheduler
gitops-scheduler:
# lets generate the lighthouse configuration as we are in a development cluster
jx gitops scheduler
# lets force a rolling upgrade of lighthouse pods whenever we update the lighthouse config...
jx gitops hash --pod-spec --kind Deployment -s config-root/namespaces/jx/lighthouse-config/config-cm.yaml -s config-root/namespaces/jx/lighthouse-config/plugins-cm.yaml -d config-root/namespaces/jx/lighthouse
.PHONY: no-gitops-scheduler
no-gitops-scheduler:
@echo "disabled the lighthouse scheduler generation as we are not a development cluster"
.PHONY: fetch
fetch: init $(COPY_SOURCE) $(REPOSITORY_RESOLVE)
# set any missing defaults in the secrets mapping file
jx secret convert edit
# lets resolve chart versions and values from the version stream
jx gitops helmfile resolve
# lets make sure we are using the latest jx-cli in the git operator Job
jx gitops image -s .jx/git-operator
# generate the yaml from the charts in helmfile.yaml and moves them to the right directory tree (cluster or namespaces/foo)
helmfile $(HELMFILE_GLOBAL_FLAGS) --file helmfile.yaml template $(HELMFILE_TEMPLATE_FLAGS) --validate --include-crds --output-dir-template /tmp/generate/{{.Release.Namespace}}/{{.Release.Name}}
jx gitops split --dir /tmp/generate
jx gitops rename --dir /tmp/generate
jx gitops helmfile move --output-dir config-root --dir /tmp/generate --dir-includes-release-name
# convert k8s Secrets => ExternalSecret resources using secret mapping + schemas
# see: https://github.com/jenkins-x/jx-secret#mappings
jx secret convert --source-dir $(OUTPUT_DIR) -r $(VAULT_ROLE_EXTERNAL_SECRETS) -m ${VAULT_MOUNT_POINT_EXTERNAL_SECRETS} --selector secret.jenkins-x.io/convert-exclude=true --selector-target metadata.annotations --invert-selector
# replicate secrets to local staging/production namespaces
jx secret replicate --selector secret.jenkins-x.io/replica-source=true
# populate secrets from filesystem definitions
# -VAULT_ADDR=$(VAULT_ADDR) VAULT_NAMESPACE=$(VAULT_NAMESPACE) jx secret populate --source filesystem --secret-namespace $(VAULT_NAMESPACE)
# lets make sure all the namespaces exist for environments of the replicated secrets
jx gitops namespace --dir-mode --dir $(OUTPUT_DIR)/namespaces
.PHONY: build
# uncomment this line to enable kustomize
#build: build-kustomise
build: build-nokustomise
.PHONY: build-kustomise
build-kustomise: kustomize post-build
.PHONY: build-nokustomise
build-nokustomise: copy-resources post-build
.PHONY: pre-build
pre-build:
.PHONY: post-build
post-build: $(GENERATE_SCHEDULER)
# lets add the kubectl-apply prune annotations
#
# NOTE be very careful about these 3 labels as getting them wrong can remove stuff in you cluster!
jx gitops label --dir $(OUTPUT_DIR)/cluster gitops.jenkins-x.io/pipeline=cluster
jx gitops label --dir $(OUTPUT_DIR)/customresourcedefinitions gitops.jenkins-x.io/pipeline=customresourcedefinitions
jx gitops label --dir $(OUTPUT_DIR)/namespaces gitops.jenkins-x.io/pipeline=namespaces
# lets add kapp friendly change group identifiers to nginx-ingress and wave so we can write rules against them
jx gitops annotate --dir $(OUTPUT_DIR) --selector app=wave kapp.k14s.io/change-group=apps.jenkins-x.io/pusher-wave
jx gitops annotate --dir $(OUTPUT_DIR) --selector app.kubernetes.io/name=ingress-nginx kapp.k14s.io/change-group=apps.jenkins-x.io/ingress-nginx
# lets label all Namespace resources with the main namespace which creates them and contains the Environment resources
jx gitops label --dir $(OUTPUT_DIR)/cluster --kind=Namespace team=jx
# lets enable wave to perform rolling updates of any Deployment when its underlying Secrets get modified
# by modifying the underlying secret store (e.g. vault / GSM / ASM) which then causes External Secrets to modify the k8s Secrets
jx gitops annotate --dir $(OUTPUT_DIR)/namespaces --kind Deployment --selector app=wave --invert-selector wave.pusher.com/update-on-config-change=true
.PHONY: kustomize
kustomize: pre-build
kustomize build ./build -o $(OUTPUT_DIR)/namespaces
.PHONY: copy-resources
copy-resources: pre-build
@cp -r ./build/base/* $(OUTPUT_DIR)
@rm -rf $(OUTPUT_DIR)/kustomization.yaml
.PHONY: verify-ingress
verify-ingress:
jx verify ingress --ingress-service ingress-nginx-controller
.PHONY: verify-ingress-ignore
verify-ingress-ignore:
-jx verify ingress --ingress-service ingress-nginx-controller
.PHONY: verify-install
verify-install:
# TODO lets disable errors for now
# as some pods stick around even though they are failed causing errors
-jx verify install --pod-wait-time=2m
.PHONY: verify
verify: dev-ns verify-ingress $(GITOPS_WEBHOOK_UPDATE)
jx health status -A
.PHONY: gitops-webhook-update
gitops-webhook-update:
jx gitops webhook update --warn-on-fail --fast
.PHONY: no-gitops-webhook-update
no-gitops-webhook-update:
@echo "disabled 'jx gitops webhook update' as we are not a development cluster"
.PHONY: verify-ignore
verify-ignore: verify-ingress-ignore
.PHONY: secrets-populate
secrets-populate:
# lets populate any missing secrets we have a generator in `charts/repoName/chartName/secret-schema.yaml`
# they can be modified/regenerated at any time via `jx secret edit`
-JX_VAULT_ROLE=${VAULT_ROLE_POPULATE} JX_VAULT_MOUNT_POINT=${VAULT_MOUNT_POINT_POPULATE} VAULT_ADDR=$(VAULT_ADDR) VAULT_NAMESPACE=$(VAULT_NAMESPACE) EXTERNAL_VAULT=$(EXTERNAL_VAULT) jx secret populate --secret-namespace $(VAULT_NAMESPACE)
.PHONY: secrets-wait
secrets-wait:
# lets wait for the ExternalSecrets service to populate the mandatory Secret resources
VAULT_ADDR=$(VAULT_ADDR) jx secret wait -n jx
.PHONY: git-setup
git-setup:
jx gitops git setup
@git pull
.PHONY: regen-check
regen-check:
jx gitops git setup
jx gitops apply
.PHONY: regen-phase-1
regen-phase-1: git-setup resolve-metadata all report commit $(KUBEAPPLY) verify-ingress-ignore
.PHONY: regen-phase-2
regen-phase-2: verify-ingress-ignore all verify-ignore commit
.PHONY: regen-phase-3
regen-phase-3: push secrets-populate secrets-wait
.PHONY: regen-none
regen-none:
# we just merged a PR so lets perform any extra checks after the merge but before the kubectl apply
.PHONY: apply
apply: regen-check report commit $(KUBEAPPLY) push gitops-postprocess verify annotate-resources apply-completed status
.PHONY: report
report:
# lets generate the markdown and yaml reports in the docs dir
# Prevent endless loop by verifying that the previous commit wasn't an update to the docs
if ! git log -1 --pretty=\%B | grep -q "/pipeline cancel"; then \
jx gitops helmfile report; \
fi
.PHONY: status
status:
# lets update the deployment status to your git repository (e.g. https://github.com)
jx gitops helmfile status
.PHONY: apply-completed
apply-completed: $(POST_APPLY_HOOK)
# copy any git operator secrets to the jx namespace
jx secret copy --ns jx-git-operator --ignore-missing-to --to jx --selector git-operator.jenkins.io/kind=git-operator
jx secret copy --ns jx-git-operator --ignore-missing-to --to tekton-pipelines --selector git-operator.jenkins.io/kind=git-operator
@echo "completed the boot Job"
.PHONY: failed
failed: apply-completed
@echo "boot Job failed"
exit 1
.PHONY: gitops-postprocess
gitops-postprocess:
# lets apply any infrastructure specific labels or annotations to enable IAM roles on ServiceAccounts etc
jx gitops postprocess
.PHONY: kubectl-apply
kubectl-apply:
@echo "using kubectl to apply resources"
# NOTE be very careful about these 2 labels as getting them wrong can remove stuff in you cluster!
if [ -d $(OUTPUT_DIR)/customresourcedefinitions ]; then \
kubectl apply $(KUBECTL_APPLY_FLAGS) --prune -l=gitops.jenkins-x.io/pipeline=customresourcedefinitions -R -f $(OUTPUT_DIR)/customresourcedefinitions; \
fi
kubectl apply $(KUBECTL_APPLY_FLAGS) --prune -l=gitops.jenkins-x.io/pipeline=cluster -R -f $(OUTPUT_DIR)/cluster
kubectl apply $(KUBECTL_APPLY_FLAGS) --prune -l=gitops.jenkins-x.io/pipeline=namespaces -R -f $(OUTPUT_DIR)/namespaces
.PHONY: kapp-apply
kapp-apply:
@echo "using kapp to apply resources"
kapp deploy -a jx -f $(OUTPUT_DIR) -y
# kpt live apply is very strict on the syntax of the manifest yaml files. Before switching to kpt-apply it might be good
# idea to use a yaml linter on the files in config-root.
.PHONY: kpt-apply
kpt-apply: kpt-apply-customresourcedefinitions kpt-apply-cluster kpt-apply-namespaces
.PHONY: kpt-apply-customresourcedefinitions
kpt-apply-customresourcedefinitions: $(OUTPUT_DIR)/customresourcedefinitions/Kptfile
@echo "using kpt to apply custom resource definitions"
[ ! -d $(OUTPUT_DIR)/customresourcedefinitions ] || ./versionStream/src/kpt-live-apply-wrapper.sh $(OUTPUT_DIR)/customresourcedefinitions crd 'Custom resource definitions applied' $(NEW_CLUSTER) $(KPT_LIVE_APPLY_FLAGS)
.PHONY: kpt-apply-cluster
kpt-apply-cluster: $(OUTPUT_DIR)/cluster/Kptfile
@echo "using kpt to apply cluster resources"
./versionStream/src/kpt-live-apply-wrapper.sh $(OUTPUT_DIR)/cluster cluster 'Cluster wide resources applied' $(NEW_CLUSTER) $(KPT_LIVE_APPLY_FLAGS)
.PHONY: kpt-apply-namespaces
kpt-apply-namespaces: $(OUTPUT_DIR)/namespaces/Kptfile
@echo "using kpt to apply namespaced resources"
./versionStream/src/kpt-live-apply-wrapper.sh $(OUTPUT_DIR)/namespaces ns 'Namespaced resources applied' $(NEW_CLUSTER) $(KPT_LIVE_APPLY_FLAGS)
.PHONY: kpt-apply-dry-run
kpt-apply-dry-run:
@echo "verifying changes with kpt"
-git diff
kpt live apply $(KPT_LIVE_APPLY_FLAGS) --dry-run $(OUTPUT_DIR)/customresourcedefinitions
kpt live apply $(KPT_LIVE_APPLY_FLAGS) --dry-run $(OUTPUT_DIR)/cluster
kpt live apply $(KPT_LIVE_APPLY_FLAGS) --dry-run $(OUTPUT_DIR)/namespaces
%/Kptfile:
@echo "initializing $@"
kpt pkg init --description "Jenkins-X $(notdir $(@D)) config" $(@D)
kpt live init --namespace=jx-git-operator --name $(notdir $(@D)) $(@D)
find $(@D) -maxdepth 1 -type f | xargs git add
make git-setup
git commit -m "chore: add kpt pkg $(notdir $(@D))" -m "/pipeline cancel"
make push
.PHONY: annotate-resources
annotate-resources:
@echo "annotating some deployments with the latest git SHA: $(GIT_SHA)"
jx gitops patch --selector git.jenkins-x.io/sha=annotate --data '{"spec":{"template":{"metadata":{"annotations":{"git.jenkins-x.io/sha": "$(GIT_SHA)"}}}}}'
.PHONY: resolve-metadata
resolve-metadata:
# lets merge in any output from Terraform in the ConfigMap default/terraform-jx-requirements if it exists
jx gitops requirements merge
# lets resolve any requirements
jx gitops requirements resolve -n
.PHONY: commit
commit:
# lets make sure the git user name and email are setup for the commit to ensure we don't attribute this commit to random user
jx gitops git setup
-git add --all
# lets ignore commit errors in case there's no changes and to stop pipelines failing
-git commit -m "chore: regenerated" -m "/pipeline cancel"
.PHONY: all
all: clean fetch build
.PHONY: pr
pr:
jx gitops apply --pull-request
.PHONY: pr-regen
pr-regen: all $(PR_LINT) commit push-pr-branch
.PHONY: push-pr-branch
push-pr-branch:
# lets push changes to the Pull Request branch
# we need to force push due to rebasing of PRs after new commits are merged to the main branch after the PR is created
jx gitops pr push --ignore-no-pr --force
# now lets label the Pull Request so that lighthouse keeper can auto merge it
jx gitops pr label --name updatebot --matches "env/.*" --ignore-no-pr
.PHONY: push
push:
@git pull
@git push --force-with-lease
.PHONY: dev-ns
dev-ns:
@echo changing to the jx namespace to verify
jx ns jx --quiet