-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Use the common create_cluster.sh in order to improve cooperation between teams
- Loading branch information
Showing
2 changed files
with
17 additions
and
139 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,139 +1,3 @@ | ||
#!/bin/sh | ||
set -o errexit | ||
#!/bin/bash | ||
|
||
CURRENT_DIR=$(pwd) | ||
|
||
echo "0. Create ca" | ||
# 0. Create ca | ||
mkcert -install | ||
cd /tmp | ||
mkcert "127.0.0.1.nip.io" "*.127.0.0.1.nip.io" | ||
cd $CURRENT_DIR | ||
|
||
echo "1. Create registry container unless it already exists" | ||
# 1. Create registry container unless it already exists | ||
reg_name='kind-registry' | ||
reg_port='5001' | ||
if [ "$(docker inspect -f '{{.State.Running}}' "${reg_name}" 2>/dev/null || true)" != 'true' ]; then | ||
docker run \ | ||
-d --restart=always -p "127.0.0.1:${reg_port}:5000" --network bridge --name "${reg_name}" \ | ||
registry:2 | ||
fi | ||
|
||
echo "2. Create kind cluster with containerd registry config dir enabled" | ||
# 2. Create kind cluster with containerd registry config dir enabled | ||
# TODO: kind will eventually enable this by default and this patch will | ||
# be unnecessary. | ||
# | ||
# See: | ||
# https://github.com/kubernetes-sigs/kind/issues/2875 | ||
# https://github.com/containerd/containerd/blob/main/docs/cri/config.md#registry-configuration | ||
# See: https://github.com/containerd/containerd/blob/main/docs/hosts.md | ||
cat <<EOF | kind create cluster --name visio --config=- | ||
kind: Cluster | ||
apiVersion: kind.x-k8s.io/v1alpha4 | ||
containerdConfigPatches: | ||
- |- | ||
[plugins."io.containerd.grpc.v1.cri".registry] | ||
config_path = "/etc/containerd/certs.d" | ||
nodes: | ||
- role: control-plane | ||
image: kindest/node:v1.27.3 | ||
kubeadmConfigPatches: | ||
- | | ||
kind: InitConfiguration | ||
nodeRegistration: | ||
kubeletExtraArgs: | ||
node-labels: "ingress-ready=true" | ||
extraPortMappings: | ||
- containerPort: 80 | ||
hostPort: 80 | ||
protocol: TCP | ||
- containerPort: 443 | ||
hostPort: 443 | ||
protocol: TCP | ||
EOF | ||
|
||
echo "3. Add the registry config to the nodes" | ||
# 3. Add the registry config to the nodes | ||
# | ||
# This is necessary because localhost resolves to loopback addresses that are | ||
# network-namespace local. | ||
# In other words: localhost in the container is not localhost on the host. | ||
# | ||
# We want a consistent name that works from both ends, so we tell containerd to | ||
# alias localhost:${reg_port} to the registry container when pulling images | ||
REGISTRY_DIR="/etc/containerd/certs.d/localhost:${reg_port}" | ||
for node in $(kind get nodes --name visio); do | ||
docker exec "${node}" mkdir -p "${REGISTRY_DIR}" | ||
cat <<EOF | docker exec -i "${node}" cp /dev/stdin "${REGISTRY_DIR}/hosts.toml" | ||
[host."http://${reg_name}:5000"] | ||
EOF | ||
done | ||
|
||
echo "4. Connect the registry to the cluster network if not already connected" | ||
# 4. Connect the registry to the cluster network if not already connected | ||
# This allows kind to bootstrap the network but ensures they're on the same network | ||
if [ "$(docker inspect -f='{{json .NetworkSettings.Networks.kind}}' "${reg_name}")" = 'null' ]; then | ||
docker network connect "kind" "${reg_name}" | ||
fi | ||
|
||
echo "5. Document the local registry" | ||
# 5. Document the local registry | ||
# https://github.com/kubernetes/enhancements/tree/master/keps/sig-cluster-lifecycle/generic/1755-communicating-a-local-registry | ||
cat <<EOF | kubectl apply -f - | ||
apiVersion: v1 | ||
kind: ConfigMap | ||
metadata: | ||
name: local-registry-hosting | ||
namespace: kube-public | ||
data: | ||
localRegistryHosting.v1: | | ||
host: "localhost:${reg_port}" | ||
help: "https://kind.sigs.k8s.io/docs/user/local-registry/" | ||
EOF | ||
|
||
cat <<EOF | kubectl apply -f - | ||
apiVersion: v1 | ||
kind: ConfigMap | ||
metadata: | ||
name: coredns | ||
namespace: kube-system | ||
data: | ||
Corefile: | | ||
.:53 { | ||
errors | ||
health { | ||
lameduck 5s | ||
} | ||
ready | ||
kubernetes cluster.local in-addr.arpa ip6.arpa { | ||
pods insecure | ||
fallthrough in-addr.arpa ip6.arpa | ||
ttl 30 | ||
} | ||
prometheus :9153 | ||
forward . /etc/resolv.conf { | ||
max_concurrent 1000 | ||
} | ||
rewrite stop { | ||
name regex (.*).127.0.0.1.nip.io ingress-nginx-controller.ingress-nginx.svc.cluster.local answer auto | ||
} | ||
cache 30 | ||
loop | ||
reload | ||
loadbalance | ||
} | ||
EOF | ||
|
||
kubectl -n kube-system rollout restart deployments/coredns | ||
|
||
echo "6. Install ingress-nginx" | ||
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/deploy/static/provider/kind/deploy.yaml | ||
kubectl -n ingress-nginx create secret tls mkcert --key /tmp/127.0.0.1.nip.io+1-key.pem --cert /tmp/127.0.0.1.nip.io+1.pem | ||
kubectl -n ingress-nginx patch deployments.apps ingress-nginx-controller --type 'json' -p '[{"op": "add", "path": "/spec/template/spec/containers/0/args/-", "value":"--default-ssl-certificate=ingress-nginx/mkcert"}]' | ||
|
||
echo "7. Setup namespace" | ||
kubectl create ns meet | ||
kubectl config set-context --current --namespace=meet | ||
kubectl -n meet create secret generic mkcert --from-file=rootCA.pem="$(mkcert -CAROOT)/rootCA.pem" | ||
curl https://raw.githubusercontent.com/numerique-gouv/tools/refs/heads/main/kind/create_cluster.sh | bash -s -- meet |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -27,7 +27,6 @@ backend: | |
OIDC_RP_SCOPES: "openid email" | ||
OIDC_REDIRECT_ALLOWED_HOSTS: https://meet.127.0.0.1.nip.io | ||
OIDC_AUTH_REQUEST_EXTRA_PARAMS: "{'acr_values': 'eidas1'}" | ||
OIDC_VERIFY_SSL: False | ||
LOGIN_REDIRECT_URL: https://meet.127.0.0.1.nip.io | ||
LOGIN_REDIRECT_URL_FAILURE: https://meet.127.0.0.1.nip.io | ||
LOGOUT_REDIRECT_URL: https://meet.127.0.0.1.nip.io | ||
|
@@ -73,6 +72,21 @@ backend: | |
python manage.py createsuperuser --email [email protected] --password admin | ||
restartPolicy: Never | ||
|
||
# Exra volume to manage our local custom CA and avoid to set ssl_verify: false | ||
extraVolumeMounts: | ||
- name: certs | ||
mountPath: /usr/local/lib/python3.12/site-packages/certifi/cacert.pem | ||
subPath: cacert.pem | ||
|
||
# Exra volume to manage our local custom CA and avoid to set ssl_verify: false | ||
extraVolumes: | ||
- name: certs | ||
configMap: | ||
name: certifi | ||
items: | ||
- key: cacert.pem | ||
path: cacert.pem | ||
|
||
frontend: | ||
envVars: | ||
VITE_PORT: 8080 | ||
|