forked from fybrik/fybrik
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Makefile
307 lines (271 loc) · 14.5 KB
/
Makefile
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
include Makefile.env
export DOCKER_TAGNAME ?= 0.0.0
export KUBE_NAMESPACE ?= fybrik-system
export DATA_DIR ?= /tmp
# the latest backward compatible CRD version
export LATEST_BACKWARD_SUPPORTED_CRD_VERSION ?= 0.7.0
export FYBRIK_CHARTS ?= https://fybrik.github.io/charts
# Install latest development version
export DEPLOY_FYBRIK_DEV_VERSION ?= 1
# Install tls certificates used for testing
export DEPLOY_TLS_TEST_CERTS ?= 0
# Copy CA certificate to the system certificates store in the control-plane pods.
# Used for testing tls connection between the control-plane componenets.
export COPY_TEST_CACERTS ?= 0
# If true, run a script to configure Vault. If set to False then
# Vault is configured in commands executed during Vault helm chart
# deployment.
export RUN_VAULT_CONFIGURATION_SCRIPT ?= 1
# if set, it contains the openmetadata asset name used for testing
export CATALOGED_ASSET ?= openmetadata-s3.default.bucket1."data.csv"
# If true, deploy openmetadata server
export DEPLOY_OPENMETADATA_SERVER ?= 1
# If true, use openmetadata as the catalog. Otherwise assume built-in catalog is used.
export USE_OPENMETADATA_CATALOG ?= 1
# If true, avoid creating a new cluster.
export USE_EXISTING_CLUSTER ?= 0
DOCKER_PUBLIC_HOSTNAME ?= ghcr.io
DOCKER_PUBLIC_NAMESPACE ?= fybrik
DOCKER_TAXONOMY_NAME_TAG ?= taxonomy-cli:$(TAXONOMY_CLI_VERSION)
.PHONY: all
all: generate manifests generate-docs verify
.PHONY: license
license: $(TOOLBIN)/license_finder
$(call license_go,.)
.PHONY: generate
generate: $(TOOLBIN)/controller-gen $(TOOLBIN)/json-schema-generator
$(TOOLBIN)/json-schema-generator -r ./manager/apis/app/v1beta1/ -r ./pkg/model/... -o charts/fybrik/files/taxonomy/
$(TOOLBIN)/controller-gen object:headerFile=./hack/boilerplate.go.txt,year=$(shell date +%Y) paths="./..."
cp charts/fybrik/files/taxonomy/taxonomy.json charts/fybrik/files/taxonomy/base_taxonomy.json
docker run --rm -u "$(id -u):$(id -g)" -v ${PWD}:/local -w /local/ \
$(DOCKER_PUBLIC_HOSTNAME)/$(DOCKER_PUBLIC_NAMESPACE)/$(DOCKER_TAXONOMY_NAME_TAG) compile \
-o charts/fybrik/files/taxonomy/taxonomy.json \
-b charts/fybrik/files/taxonomy/base_taxonomy.json $(shell find pkg/storage/layers -type f -name '*.yaml')
go fix ./...
.PHONY: generate-docs
generate-docs:
$(MAKE) -C site generate
.PHONY: reconcile-requirements
reconcile-requirements:
perl -i -pe 's/HELM_VERSION=.*/HELM_VERSION=$(HELM_VERSION)/' $(ROOT_DIR)/samples/OneClickDemo/OneClickDemo-OMD.sh $(ROOT_DIR)/samples/OneClickDemo/OneClickDemo-Katalog.sh
perl -i -pe 's/YQ_VERSION=.*/YQ_VERSION=$(YQ_VERSION)/' $(ROOT_DIR)/samples/OneClickDemo/OneClickDemo-OMD.sh $(ROOT_DIR)/samples/OneClickDemo/OneClickDemo-Katalog.sh
perl -i -pe 's/KUBE_VERSION=.*/KUBE_VERSION=$(KUBE_VERSION)/' $(ROOT_DIR)/samples/OneClickDemo/OneClickDemo-OMD.sh $(ROOT_DIR)/samples/OneClickDemo/OneClickDemo-Katalog.sh
perl -i -pe 's/KIND_VERSION=.*/KIND_VERSION=$(KIND_VERSION)/' $(ROOT_DIR)/samples/OneClickDemo/OneClickDemo-OMD.sh $(ROOT_DIR)/samples/OneClickDemo/OneClickDemo-Katalog.sh
perl -i -pe 's/AWSCLI_VERSION=.*/AWSCLI_VERSION=$(AWSCLI_VERSION)/' $(ROOT_DIR)/samples/OneClickDemo/OneClickDemo-OMD.sh $(ROOT_DIR)/samples/OneClickDemo/OneClickDemo-Katalog.sh
perl -i -pe 's/CERT_MANAGER_VERSION=.*/CERT_MANAGER_VERSION=$(CERT_MANAGER_VERSION)/' $(ROOT_DIR)/samples/OneClickDemo/OneClickDemo-OMD.sh $(ROOT_DIR)/samples/OneClickDemo/OneClickDemo-Katalog.sh
perl -i -pe 's/CertMangerVersion:.*/CertMangerVersion: $(CERT_MANAGER_VERSION)/' $(ROOT_DIR)/site/external.yaml
perl -i -pe 's/TaxonomyCliVersion:.*/TaxonomyCliVersion: $(TAXONOMY_CLI_VERSION)/' $(ROOT_DIR)/site/external.yaml
.PHONY: manifests
manifests: $(TOOLBIN)/controller-gen $(TOOLBIN)/yq
$(TOOLBIN)/controller-gen --version
$(TOOLBIN)/controller-gen crd output:crd:artifacts:config=charts/fybrik-crd/templates/ paths=./manager/apis/...
$(TOOLBIN)/yq -i eval 'del(.metadata.creationTimestamp)' charts/fybrik-crd/templates/app.fybrik.io_blueprints.yaml
$(TOOLBIN)/yq -i eval 'del(.metadata.creationTimestamp)' charts/fybrik-crd/templates/app.fybrik.io_fybrikapplications.yaml
$(TOOLBIN)/yq -i eval 'del(.metadata.creationTimestamp)' charts/fybrik-crd/templates/app.fybrik.io_fybrikmodules.yaml
$(TOOLBIN)/yq -i eval 'del(.metadata.creationTimestamp)' charts/fybrik-crd/templates/app.fybrik.io_fybrikstorageaccounts.yaml
$(TOOLBIN)/yq -i eval 'del(.metadata.creationTimestamp)' charts/fybrik-crd/templates/app.fybrik.io_plotters.yaml
$(TOOLBIN)/controller-gen crd output:crd:artifacts:config=charts/fybrik-crd/charts/asset-crd/templates/ paths=./connectors/katalog/pkg/apis/katalog/...
$(TOOLBIN)/yq -i eval 'del(.metadata.creationTimestamp)' charts/fybrik-crd/charts/asset-crd/templates/katalog.fybrik.io_assets.yaml
$(TOOLBIN)/controller-gen webhook paths=./manager/apis/... output:stdout | \
$(TOOLBIN)/yq eval 'del(.metadata.creationTimestamp)' - | \
$(TOOLBIN)/yq eval '.metadata.annotations."cert-manager.io/inject-ca-from" |= "{{ .Release.Namespace }}/serving-cert"' - | \
$(TOOLBIN)/yq eval '.metadata.annotations."certmanager.k8s.io/inject-ca-from" |= "{{ .Release.Namespace }}/serving-cert"' - | \
$(TOOLBIN)/yq eval '(.metadata.name | select(. == "mutating-webhook-configuration")) = "{{ .Release.Namespace }}-mutating-webhook"' - | \
$(TOOLBIN)/yq eval '(.metadata.name | select(. == "validating-webhook-configuration")) = "{{ .Release.Namespace }}-validating-webhook"' - | \
$(TOOLBIN)/yq eval '(.webhooks.[].clientConfig.service.namespace) = "{{ .Release.Namespace }}"' - > charts/fybrik/files/webhook-configs.yaml
.PHONY: docker-mirror-read
docker-mirror-read:
$(TOOLS_DIR)/docker_mirror.sh $(TOOLS_DIR)/docker_mirror.conf
.PHONY: undeploy-fybrik
undeploy-fybrik:
$(TOOLBIN)/helm uninstall fybrik-crd --namespace $(KUBE_NAMESPACE)
$(TOOLBIN)/helm uninstall fybrik --namespace $(KUBE_NAMESPACE)
.PHONY: deploy-fybrik
deploy-fybrik: export VALUES_FILE?=charts/fybrik/values.yaml
deploy-fybrik: $(TOOLBIN)/kubectl $(TOOLBIN)/helm
deploy-fybrik:
$(TOOLBIN)/kubectl create namespace $(KUBE_NAMESPACE) || true
ifeq ($(DEPLOY_FYBRIK_DEV_VERSION),1)
$(TOOLBIN)/helm install fybrik-crd charts/fybrik-crd \
--namespace $(KUBE_NAMESPACE) --wait --timeout 120s
$(TOOLBIN)/helm install fybrik charts/fybrik --values $(VALUES_FILE) $(HELM_SETTINGS) \
--namespace $(KUBE_NAMESPACE) --wait --timeout 120s
else
$(TOOLBIN)/helm repo add fybrik-charts $(FYBRIK_CHARTS)
$(TOOLBIN)/helm repo update
$(TOOLBIN)/helm install fybrik-crd fybrik-charts/fybrik-crd \
--namespace $(KUBE_NAMESPACE) --version $(LATEST_BACKWARD_SUPPORTED_CRD_VERSION) --wait --timeout 120s
$(TOOLBIN)/helm install fybrik charts/fybrik --values $(VALUES_FILE) $(HELM_SETTINGS) \
--namespace $(KUBE_NAMESPACE) --wait --timeout 120s
endif
.PHONY: pre-test
pre-test: generate manifests $(TOOLBIN)/etcd $(TOOLBIN)/kube-apiserver $(TOOLBIN)/solver
mkdir -p $(DATA_DIR)/taxonomy
mkdir -p $(DATA_DIR)/adminconfig
cp charts/fybrik/files/taxonomy/*.json $(DATA_DIR)/taxonomy/
cp charts/fybrik/files/adminconfig/* $(DATA_DIR)/adminconfig/
cp samples/adminconfig/* $(DATA_DIR)/adminconfig/
mkdir -p manager/testdata/unittests/basetaxonomy
mkdir -p manager/testdata/unittests/sampletaxonomy
cp charts/fybrik/files/taxonomy/*.json manager/testdata/unittests/basetaxonomy
cp charts/fybrik/files/taxonomy/*.json manager/testdata/unittests/sampletaxonomy
docker run --rm -u "$(id -u):$(id -g)" -v ${PWD}:/local -w /local/ \
$(DOCKER_PUBLIC_HOSTNAME)/$(DOCKER_PUBLIC_NAMESPACE)/$(DOCKER_TAXONOMY_NAME_TAG) compile \
-o manager/testdata/unittests/sampletaxonomy/taxonomy.json \
-b charts/fybrik/files/taxonomy/base_taxonomy.json \
$(shell find samples/taxonomy/example -type f -name '*.yaml')
cp manager/testdata/unittests/sampletaxonomy/taxonomy.json $(DATA_DIR)/taxonomy/taxonomy.json
.PHONY: test
test: export MODULES_NAMESPACE?=fybrik-blueprints
test: export CONTROLLER_NAMESPACE?=fybrik-system
test: export CSP_PATH=$(ABSTOOLBIN)/solver
test: export CSP_ARGS=--logtostderr
test: pre-test
go test $(TEST_OPTIONS) ./...
USE_CSP=true go test $(TEST_OPTIONS) ./manager/controllers/app -count 1
.PHONY: run-integration-tests
run-integration-tests: export VALUES_FILE=charts/fybrik/integration-tests.values.yaml
run-integration-tests: export HELM_SETTINGS=--set "manager.solver.enabled=true"
run-integration-tests: export DEPLOY_OPENMETADATA_SERVER=0
run-integration-tests: export USE_OPENMETADATA_CATALOG=0
run-integration-tests:
$(MAKE) setup-cluster
$(MAKE) -C modules helm
$(MAKE) -C modules helm-uninstall # Uninstalls the deployed tests from previous command
$(MAKE) -C pkg/helm test
$(MAKE) -C samples/rest-server test
$(MAKE) -C manager run-integration-tests
.PHONY: run-notebook-readflow-tests
run-notebook-readflow-tests: export VALUES_FILE=charts/fybrik/notebook-test-readflow.values.yaml
run-notebook-readflow-tests:
$(MAKE) setup-cluster
$(MAKE) -C manager run-notebook-readflow-tests
.PHONY: run-notebook-readflow-tests-katalog
run-notebook-readflow-tests-katalog: export HELM_SETTINGS=--set "coordinator.catalog=katalog"
run-notebook-readflow-tests-katalog: export VALUES_FILE=charts/fybrik/notebook-test-readflow.values.yaml
run-notebook-readflow-tests-katalog: export CATALOGED_ASSET=fybrik-notebook-sample/data-csv
run-notebook-readflow-tests-katalog: export DEPLOY_OPENMETADATA_SERVER=0
run-notebook-readflow-tests-katalog: export USE_OPENMETADATA_CATALOG=0
run-notebook-readflow-tests-katalog:
$(MAKE) setup-cluster
$(MAKE) -C manager run-notebook-readflow-tests
.PHONY: run-notebook-readflow-tls-tests
run-notebook-readflow-tls-tests: export VALUES_FILE=charts/fybrik/notebook-test-readflow.tls.values.yaml
run-notebook-readflow-tls-tests: export DEPLOY_TLS_TEST_CERTS=1
run-notebook-readflow-tls-tests: export VAULT_VALUES_FILE=charts/vault/env/ha/vault-single-cluster-values-tls.yaml
run-notebook-readflow-tls-tests: export RUN_VAULT_CONFIGURATION_SCRIPT=0
run-notebook-readflow-tls-tests: export PATCH_FYBRIK_MODULE=1
run-notebook-readflow-tls-tests:
$(MAKE) setup-cluster
$(MAKE) -C manager run-notebook-readflow-tests
.PHONY: run-notebook-readflow-tls-system-cacerts-tests
run-notebook-readflow-tls-system-cacerts-tests: export VALUES_FILE=charts/fybrik/notebook-test-readflow.tls-system-cacerts.yaml
run-notebook-readflow-tls-system-cacerts-tests: export FROM_IMAGE=registry.access.redhat.com/ubi8/ubi:8.7
run-notebook-readflow-tls-system-cacerts-tests: export DEPLOY_TLS_TEST_CERTS=1
run-notebook-readflow-tls-system-cacerts-tests: export COPY_TEST_CACERTS=1
run-notebook-readflow-tls-system-cacerts-tests:
$(MAKE) setup-cluster
$(MAKE) -C manager run-notebook-readflow-tests
.PHONY: run-notebook-readflow-bc-tests
run-notebook-readflow-bc-tests: export VALUES_FILE=charts/fybrik/notebook-test-readflow.values.yaml
run-notebook-readflow-bc-tests: export DEPLOY_FYBRIK_DEV_VERSION=0
run-notebook-readflow-bc-tests:
$(MAKE) setup-cluster
$(MAKE) -C manager run-notebook-readflow-tests
.PHONY: run-notebook-writeflow-tests
run-notebook-writeflow-tests: export VALUES_FILE=charts/fybrik/notebook-test-writeflow.values.yaml
run-notebook-writeflow-tests:
$(MAKE) setup-cluster
$(MAKE) -C manager run-notebook-writeflow-tests
.PHONY: run-namescope-integration-tests
run-namescope-integration-tests: export HELM_SETTINGS=--set "clusterScoped=false" --set "applicationNamespace=default"
run-namescope-integration-tests: export VALUES_FILE=charts/fybrik/integration-tests.values.yaml
run-namescope-integration-tests: export DEPLOY_OPENMETADATA_SERVER=0
run-namescope-integration-tests: export USE_OPENMETADATA_CATALOG=0
run-namescope-integration-tests:
$(MAKE) setup-cluster
$(MAKE) -C manager run-integration-tests
.PHONY: setup-cluster
setup-cluster: export DOCKER_HOSTNAME?=localhost:5000
setup-cluster: export DOCKER_NAMESPACE?=fybrik-system
setup-cluster:
ifeq ($(USE_EXISTING_CLUSTER),0)
$(MAKE) kind
endif
$(MAKE) cluster-prepare
$(MAKE) docker-build docker-push
$(MAKE) -C test/services docker-build docker-push
$(MAKE) cluster-prepare-wait
$(MAKE) -C charts test
$(MAKE) deploy-fybrik
ifeq ($(COPY_TEST_CACERTS), 1)
cd manager/testdata/notebook/read-flow-tls && ./copy-cacert-to-pods.sh
endif
ifeq ($(RUN_VAULT_CONFIGURATION_SCRIPT),1)
$(MAKE) configure-vault
endif
.PHONY: cluster-prepare
cluster-prepare:
$(MAKE) -C third_party/cert-manager deploy
ifeq ($(DEPLOY_TLS_TEST_CERTS),1)
$(MAKE) -C third_party/kubernetes-reflector deploy
cd manager/testdata/notebook/read-flow-tls && ./setup-certs.sh
endif
ifeq ($(DEPLOY_OPENMETADATA_SERVER),1)
$(MAKE) -C third_party/openmetadata all
endif
$(MAKE) -C third_party/vault deploy
.PHONY: cluster-prepare-wait
cluster-prepare-wait:
ifeq ($(DEPLOY_TLS_TEST_CERTS),1)
$(MAKE) -C third_party/kubernetes-reflector deploy-wait
endif
$(MAKE) -C third_party/vault deploy-wait
.PHONY: clean-cluster-prepare
clean-cluster-prepare:
cd manager/testdata/notebook/read-flow-tls && ./clean-certs.sh || true
$(MAKE) -C third_party/cert-manager undeploy
$(MAKE) -C third_party/kubernetes-reflector undeploy || true
ifeq ($(DEPLOY_OPENMETADATA_SERVER),1)
$(MAKE) -C third_party/openmetadata undeploy
endif
$(MAKE) -C third_party/vault undeploy
# Build only the docker images needed for integration testing
.PHONY: docker-minimal-it
docker-minimal-it:
$(MAKE) -C manager docker-build docker-push
$(MAKE) -C test/services docker-build docker-push
.PHONY: docker-build
docker-build:
$(MAKE) -C manager docker-build
$(MAKE) -C connectors docker-build
.PHONY: docker-push
docker-push:
$(MAKE) -C manager docker-push
$(MAKE) -C connectors docker-push
DOCKER_PUBLIC_TAGNAME ?= master
DOCKER_PUBLIC_NAMES := \
manager \
katalog-connector \
opa-connector
define do-docker-retag-and-push-public
for name in ${DOCKER_PUBLIC_NAMES}; do \
docker tag ${DOCKER_HOSTNAME}/${DOCKER_NAMESPACE}/$$name:${DOCKER_TAGNAME} ${DOCKER_PUBLIC_HOSTNAME}/${DOCKER_PUBLIC_NAMESPACE}/$$name:${DOCKER_PUBLIC_TAGNAME}; \
done
DOCKER_HOSTNAME=${DOCKER_PUBLIC_HOSTNAME} DOCKER_NAMESPACE=${DOCKER_PUBLIC_NAMESPACE} DOCKER_TAGNAME=${DOCKER_PUBLIC_TAGNAME} $(MAKE) docker-push
endef
.PHONY: docker-retag-and-push-public
docker-retag-and-push-public:
$(call do-docker-retag-and-push-public)
.PHONY: helm-push-public
helm-push-public:
DOCKER_HOSTNAME=${DOCKER_PUBLIC_HOSTNAME} DOCKER_NAMESPACE=${DOCKER_PUBLIC_NAMESPACE} make -C modules helm-chart-push
.PHONY: save-images
save-images:
docker save -o images.tar ${DOCKER_HOSTNAME}/${DOCKER_NAMESPACE}/manager:${DOCKER_TAGNAME} \
${DOCKER_HOSTNAME}/${DOCKER_NAMESPACE}/katalog-connector:${DOCKER_TAGNAME} \
${DOCKER_HOSTNAME}/${DOCKER_NAMESPACE}/opa-connector:${DOCKER_TAGNAME}
include hack/make-rules/tools.mk
include hack/make-rules/verify.mk
include hack/make-rules/cluster.mk
include hack/make-rules/vault.mk