generated from cloudnative-pg/cnpg-template
-
Notifications
You must be signed in to change notification settings - Fork 24
Expand file tree
/
Copy pathTaskfile.yml
More file actions
462 lines (435 loc) · 18.1 KB
/
Taskfile.yml
File metadata and controls
462 lines (435 loc) · 18.1 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
version: 3
output: prefixed
vars:
GREEN: \033[0;32m
BLUE: \033[0;34m
RED: \033[0;31m
NC: \033[0m
E2E_NETWORK: pg-extensions-e2e
DAGGER_ENGINE_NAME: dagger-engine-pg-extensions
REGISTRY_NAME: registry.pg-extensions
REGISTRY_HOST_NAME: localhost
REGISTRY_HOST_PORT: 5000
# Internal port exposed by the registry container image (always 5000)
REGISTRY_INTERNAL_PORT: 5000
# renovate: datasource=git-refs depName=kind lookupName=https://github.com/aweris/daggerverse currentValue=main
DAGGER_KIND_SHA: dadbc09a1e0790ccbf1d88f796308b26a12f0488
# renovate: datasource=docker depName=kindest/node versioning=docker
KIND_NODE_VERSION: v1.35.1@sha256:05d7bcdefbda08b4e038f644c4df690cdac3fba8b06f8289f30e10026720a1ab
K8S_VERSION: '{{ regexReplaceAll "^v([0-9.]+).*" .KIND_NODE_VERSION "$1" }}'
KIND_CLUSTER_NAME: pg-extensions-{{ .K8S_VERSION }}
tasks:
default:
desc: Build all targets (default)
cmds:
- task: bake:all
prereqs:
desc: Ensure prerequisites are met
run: once
silent: true
cmds:
- echo -e "{{.BLUE}}Checking prerequisites...{{.NC}}"
- command -v dagger >/dev/null 2>&1 || { echo -e "{{.RED}}Dagger is not installed.{{.NC}}"; exit 1; }
- command -v docker >/dev/null 2>&1 || { echo -e "{{.RED}}Docker is not installed.{{.NC}}"; exit 1; }
- docker --version >/dev/null 2>&1 || { echo -e "{{.RED}}Cannot run docker command.{{.NC}}"; exit 1; }
- docker buildx version >/dev/null 2>&1 || { echo -e "{{.RED}}Docker Buildx not available.{{.NC}}"; exit 1; }
- docker context inspect >/dev/null 2>&1 || { echo -e "{{.RED}}Docker context not configured.{{.NC}}"; exit 1; }
- echo -e "{{.GREEN}}All prerequisites satisfied!{{.NC}}"
checks:
desc: Run checks for the specified target
deps:
- prereqs
prefix: 'checks-{{.TARGET}}'
silent: true
env:
registry: '{{ .REGISTRY_HOST_NAME }}:{{ .REGISTRY_HOST_PORT }}'
preconditions:
- sh: test -f "{{.TARGET}}/metadata.hcl"
msg: 'Not a valid target, metadata.hcl file is missing. Target: {{.TARGET}}'
cmds:
- echo -e "{{.BLUE}}Checking target {{.TARGET}}...{{.NC}}"
- docker buildx bake -f {{.TARGET}}/metadata.hcl -f docker-bake.hcl --check
requires:
vars:
- name: TARGET
checks:all:
desc: Run checks for all the available targets
vars:
TARGETS:
sh: dagger call -sm ./dagger/maintenance/ get-targets | tr -d '[]"' | tr ',' '\n'
cmds:
- for:
var: TARGETS
vars:
TARGET: "{{.ITEM}}"
task: checks
bake:
desc: Bake the specified target
deps:
- prereqs
prefix: 'bake-{{.TARGET}}'
silent: true
env:
registry: '{{ .REGISTRY_HOST_NAME }}:{{ .REGISTRY_HOST_PORT }}'
vars:
PUSH: '{{.PUSH | default "false"}}'
DRY_RUN: '{{.DRY_RUN | default "false"}}'
METADATA_FILE: '{{.METADATA_FILE | default ""}}'
preconditions:
- sh: test -f "{{.TARGET}}/metadata.hcl"
msg: 'Not a valid target, metadata.hcl file is missing. Target: {{.TARGET}}'
cmds:
- echo -e "{{.BLUE}}Baking target {{.TARGET}} (push={{.PUSH}})...{{.NC}}"
- |
if [ "{{.DRY_RUN}}" = "true" ]; then
echo -e "{{.GREEN}}[DRY RUN] docker buildx bake -f {{.TARGET}}/metadata.hcl -f docker-bake.hcl --metadata-file="{{.METADATA_FILE}}" --push={{.PUSH}}{{.NC}}"
else
docker buildx bake -f {{.TARGET}}/metadata.hcl -f docker-bake.hcl --metadata-file="{{.METADATA_FILE}}" --push={{.PUSH}}
fi
- echo -e "{{.GREEN}}--- Successfully baked {{.TARGET}} ---{{.NC}}"
requires:
vars:
- name: TARGET
bake:all:
desc: Bake all the available targets
vars:
TARGETS:
sh: dagger call -sm ./dagger/maintenance/ get-targets | tr -d '[]"' | tr ',' '\n'
cmds:
- for:
var: TARGETS
vars:
TARGET: "{{.ITEM}}"
task: bake
update-os-libs:
desc: Update OS libs on the specified target
deps:
- prereqs
prefix: 'update-os-libs-{{.TARGET}}'
silent: true
cmds:
- echo -e "{{.BLUE}}Updating OS libs for {{.TARGET}}...{{.NC}}"
- dagger call -sm ./dagger/maintenance/ update-oslibs --source . --target {{.TARGET}} export --path .
requires:
vars:
- name: TARGET
update-os-libs:all:
desc: Update OS libs for all the available targets
vars:
TARGETS:
sh: dagger call -sm ./dagger/maintenance/ get-oslibs-targets | tr -d '[]"' | tr ',' '\n'
cmds:
- for:
var: TARGETS
vars:
TARGET: "{{.ITEM}}"
task: update-os-libs
create-extension:
desc: Scaffold a new extension directory. Usage - task create-extension NAME=myextension
cmds:
- dagger call -sm ./dagger/maintenance/ create --name {{.NAME}} export --path ./{{.NAME}}
preconditions:
- sh: test -n "{{.NAME}}"
msg: 'NAME variable is required. Usage - task create-extension NAME=myextension'
- sh: test ! -d {{.NAME}}
msg: 'Extension directory already exists at ./{{.NAME}}. Please choose a different name or remove the existing directory.'
requires:
vars:
- name: NAME
desc: The name of the extension to create (lowercase alphanumeric, hyphens, and underscores only)
generate-values:
desc: Generate Chainsaw testing values for the specified target
deps:
- prereqs
prefix: 'generate-values-{{.TARGET}}'
vars:
EXTENSION_IMAGE: '{{ .EXTENSION_IMAGE| default "" }}'
REGISTRY_USERNAME: '{{ .REGISTRY_USERNAME| default "" }}'
env:
_EXPERIMENTAL_DAGGER_RUNNER_HOST: '{{ ._EXPERIMENTAL_DAGGER_RUNNER_HOST | default "" }}'
REGISTRY_PASSWORD: '{{ .REGISTRY_PASSWORD | default "" }}'
cmds:
- echo -e "{{.BLUE}}Generating values for target {{.TARGET}}...{{.NC}}"
- >
dagger call -sm ./dagger/maintenance/ generate-testing-values
--target {{ .TARGET }} --extension-image="{{ .EXTENSION_IMAGE }}"
--registry-username="{{ .REGISTRY_USERNAME }}" --registry-password="env://REGISTRY_PASSWORD"
export --path {{.TARGET}}/values.yaml
requires:
vars:
- name: TARGET
e2e:create-docker-network:
desc: Create Docker network to connect all the services, such as the Registry, Kind nodes, Chainsaw, etc.
run: once
internal: true
cmds:
- docker network create {{ .E2E_NETWORK }}
status:
- docker network inspect {{ .E2E_NETWORK }}
e2e:start-container-registry:
desc: Start a local Docker registry to push the built images for E2E tests
deps:
- e2e:create-docker-network
internal: true
run: once
vars:
# renovate: datasource=docker depName=registry versioning=docker
REGISTRY_VERSION: 3.0.0@sha256:6c5666b861f3505b116bb9aa9b25175e71210414bd010d92035ff64018f9457e
cmds:
- >
docker run -d --name {{ .REGISTRY_NAME }} --rm -p {{ .REGISTRY_HOST_PORT }}:{{ .REGISTRY_INTERNAL_PORT }}
--network {{ .E2E_NETWORK }} registry:{{ .REGISTRY_VERSION }}
status:
- test "$(docker inspect -f {{`'{{json .State.Running}}'`}} {{ .REGISTRY_NAME }})" == "true"
e2e:start-dagger-engine:
desc: Start a custom Dagger engine so we can connect it to the E2E Docker network
deps:
- e2e:create-docker-network
internal: true
run: once
vars:
# renovate: datasource=github-tags depName=dagger/dagger versioning=semver
DAGGER_ENGINE_VERSION: v0.20.1
cmds:
- >
docker run -d -v /var/lib/dagger --name {{ .DAGGER_ENGINE_NAME }} --restart always --network {{ .E2E_NETWORK }}
--privileged registry.dagger.io/engine:{{ .DAGGER_ENGINE_VERSION }}
status:
- test "$(docker inspect -f {{`'{{json .State.Running}}'`}} {{ .DAGGER_ENGINE_NAME }})" == "true"
e2e:setup-kind:
desc: Setup Kind cluster for E2E tests
deps:
- e2e:start-container-registry
- e2e:start-dagger-engine
internal: true
run: once
vars:
REGISTRY_DIR: /etc/containerd/certs.d/{{ .REGISTRY_NAME }}:{{ .REGISTRY_INTERNAL_PORT }}
REGISTRY_HOST: '{{ .REGISTRY_HOST | default "" }}'
REGISTRY_USERNAME: '{{ .REGISTRY_USERNAME | default "" }}'
DOCKER_SOCKET:
sh: docker context inspect -f {{`'{{json .Endpoints.docker.Host}}'`}} $(docker context show)
env:
_EXPERIMENTAL_DAGGER_RUNNER_HOST: container://{{ .DAGGER_ENGINE_NAME }}
cmds:
- >
dagger call -m github.com/aweris/daggerverse/kind@{{ .DAGGER_KIND_SHA }} --socket {{ .DOCKER_SOCKET }}
container with-env-variable --name=KIND_EXPERIMENTAL_DOCKER_NETWORK --value={{ .E2E_NETWORK }} with-env-variable --name=CACHE_BUSTER --value="$(date)"
with-file --source=kind-config.yaml --path=/root/kind-config.yaml
with-exec --args="kind","create","cluster","--name","{{ .KIND_CLUSTER_NAME }}","--image","kindest/node:{{ .KIND_NODE_VERSION }}","--config","/root/kind-config.yaml" sync
- docker exec "{{ .KIND_CLUSTER_NAME }}-control-plane" mkdir -p "{{ .REGISTRY_DIR }}"
- |
cat <<EOF | docker exec -i "{{ .KIND_CLUSTER_NAME }}-control-plane" cp /dev/stdin "{{ .REGISTRY_DIR }}/hosts.toml"
[host."http://{{ .REGISTRY_NAME }}:{{ .REGISTRY_INTERNAL_PORT }}"]
EOF
- |
if [ -n "{{ .REGISTRY_HOST }}" ] && [ -n "{{ .REGISTRY_USERNAME }}" ] && [ -n "${REGISTRY_PASSWORD}" ]; then
AUTH=$(echo -n "{{ .REGISTRY_USERNAME }}:${REGISTRY_PASSWORD}" | base64 -w0)
docker exec "{{ .KIND_CLUSTER_NAME }}-control-plane" mkdir -p /var/lib/kubelet
cat <<EOF | docker exec -i "{{ .KIND_CLUSTER_NAME }}-control-plane" cp /dev/stdin /var/lib/kubelet/config.json
{
"auths": {
"{{ .REGISTRY_HOST }}": {
"auth": "${AUTH}"
}
}
}
EOF
fi
status:
- >
test "$(dagger call -m github.com/aweris/daggerverse/kind@{{ .DAGGER_KIND_SHA }}
--socket {{ .DOCKER_SOCKET }} cluster --name {{ .KIND_CLUSTER_NAME }} exist)" == "true"
e2e:install-cnpg:
desc: Install CloudNativePG operator in the Kind cluster
deps:
- task: e2e:setup-kind
vars:
REGISTRY_HOST: '{{ .REGISTRY_HOST }}'
REGISTRY_USERNAME: '{{ .REGISTRY_USERNAME }}'
internal: true
vars:
# renovate: datasource=github-tags depName=cloudnative-pg/cloudnative-pg versioning=semver extractVersion=^v(?<version>\d+\.\d+)\.\d+$
CNPG_RELEASE: 1.28
# renovate: datasource=docker depName=alpine/kubectl versioning=docker
KUBECTL_VERSION: 1.35.2@sha256:03af05fba112b17a604c833610c728e94172f5d1395125c16a0fdd6ba2fdf884
DOCKER_SOCKET:
sh: docker context inspect -f {{`'{{json .Endpoints.docker.Host}}'`}} $(docker context show)
CNPG_MANIFEST:
sh: |
if [ "{{ .CNPG_RELEASE }}" = "main" ]; then
echo "https://raw.githubusercontent.com/cloudnative-pg/artifacts/main/manifests/operator-manifest.yaml"
else
echo "https://raw.githubusercontent.com/cloudnative-pg/artifacts/release-{{ .CNPG_RELEASE }}/manifests/operator-manifest.yaml"
fi
env:
_EXPERIMENTAL_DAGGER_RUNNER_HOST: container://{{ .DAGGER_ENGINE_NAME }}
cmds:
- |
KUBECONFIG=$(dagger call -m github.com/aweris/daggerverse/kind@{{ .DAGGER_KIND_SHA }} \
--socket {{ .DOCKER_SOCKET }} container \
with-exec --args "kind","get","kubeconfig","--internal","--name","{{ .KIND_CLUSTER_NAME }}" stdout)
dagger core container from --address=alpine/kubectl:{{ .KUBECTL_VERSION }} \
with-new-file --contents "${KUBECONFIG}" --path /root/.kube/config --expand \
with-env-variable --name=CACHEBUSTER --value="$(date)" \
with-exec --args="apply","--server-side","-f","{{ .CNPG_MANIFEST }}" --use-entrypoint sync
dagger core container from --address=alpine/kubectl:{{ .KUBECTL_VERSION }} \
with-new-file --contents "${KUBECONFIG}" --path /root/.kube/config --expand \
with-env-variable --name=CACHEBUSTER --value="$(date)" \
with-exec \
--args="wait","--for=condition=Available","--timeout=2m","-n","cnpg-system","deployments","cnpg-controller-manager" \
--use-entrypoint sync
status:
- |
KUBECONFIG=$(dagger call -m github.com/aweris/daggerverse/kind@{{ .DAGGER_KIND_SHA }} \
--socket {{ .DOCKER_SOCKET }} container \
with-exec --args "kind","get","kubeconfig","--internal","--name","{{ .KIND_CLUSTER_NAME }}" stdout)
dagger core container from --address=alpine/kubectl:{{ .KUBECTL_VERSION }} \
with-new-file --contents "${KUBECONFIG}" --path /root/.kube/config --expand \
with-env-variable --name=CACHEBUSTER --value="$(date)" \
with-exec \
--args="get","--namespace=cnpg-system","deployments.apps","cnpg-controller-manager" \
--use-entrypoint sync
e2e:export-kubeconfig:
desc: Export Kind cluster kubeconfig at path defined by KUBECONFIG_PATH var (default ~/.kube/config)
deps:
- e2e:setup-kind
vars:
KUBECONFIG_PATH: '{{.KUBECONFIG_PATH| default "~/.kube/config"}}'
INTERNAL: '{{.INTERNAL| default "false"}}'
DOCKER_SOCKET:
sh: docker context inspect -f {{`'{{json .Endpoints.docker.Host}}'`}} $(docker context show)
env:
_EXPERIMENTAL_DAGGER_RUNNER_HOST: container://{{ .DAGGER_ENGINE_NAME }}
cmds:
- |
CONFIG=$(dagger call -m github.com/aweris/daggerverse/kind@{{ .DAGGER_KIND_SHA }} \
--socket {{ .DOCKER_SOCKET }} container \
with-exec --args "kind","get","kubeconfig","--name","{{ .KIND_CLUSTER_NAME }}","--internal={{ .INTERNAL }}" stdout)
mkdir -p $(dirname {{ .KUBECONFIG_PATH }})
echo "${CONFIG}" > {{ .KUBECONFIG_PATH }}
e2e:setup-env:
desc: Setup E2E environment
silent: true
vars:
REGISTRY_HOST: '{{ .REGISTRY_HOST | default "" }}'
REGISTRY_USERNAME: '{{ .REGISTRY_USERNAME | default "" }}'
deps:
- e2e:start-container-registry
- e2e:start-dagger-engine
- task: e2e:install-cnpg
vars:
REGISTRY_HOST: '{{ .REGISTRY_HOST }}'
REGISTRY_USERNAME: '{{ .REGISTRY_USERNAME }}'
cmds:
- echo -e "{{.GREEN}}--- E2E environment setup complete ---{{.NC}}"
e2e:generate-values:
desc: Generate Chainsaw testing values for the specified target in e2e environment
deps:
- e2e:start-dagger-engine
- e2e:start-container-registry
prefix: 'e2e:generate-values-{{ .TARGET }}'
silent: true
vars:
EXTENSION_IMAGE: '{{ .EXTENSION_IMAGE| default "" }}'
REGISTRY_USERNAME: '{{ .REGISTRY_USERNAME| default "" }}'
env:
REGISTRY_PASSWORD: '{{ .REGISTRY_PASSWORD | default "" }}'
cmds:
- task: generate-values
vars:
_EXPERIMENTAL_DAGGER_RUNNER_HOST: container://{{ .DAGGER_ENGINE_NAME }}
TARGET: '{{ .TARGET }}'
REGISTRY_USERNAME: '{{ .REGISTRY_USERNAME }}'
EXTENSION_IMAGE:
# Rewrite host:port to the internal registry name and port used
# within the Docker network.
sh: sed -E 's/^{{ .REGISTRY_HOST_NAME }}:{{ .REGISTRY_HOST_PORT }}/{{ .REGISTRY_NAME }}:{{ .REGISTRY_INTERNAL_PORT }}/;t' <<< "{{ .EXTENSION_IMAGE }}"
requires:
vars:
- name: TARGET
e2e:test:
desc: Test target extension using Chainsaw
deps:
- e2e:start-dagger-engine
prefix: 'e2e:test-{{ .TARGET }}'
silent: true
vars:
KUBECONFIG_PATH: '{{ .KUBECONFIG_PATH | default "~/.kube/config" }}'
EXTRA_ARGS: '{{ .EXTRA_ARGS | default "" }}'
env:
_EXPERIMENTAL_DAGGER_RUNNER_HOST: container://{{ .DAGGER_ENGINE_NAME }}
cmds:
- echo -e "{{ .BLUE }}Testing {{ .TARGET }}...{{ .NC }}"
- dagger call -m ./dagger/maintenance/ test --source . --target {{ .TARGET }} --kubeconfig {{ .KUBECONFIG_PATH }} --extra-args "{{ .EXTRA_ARGS }}"
requires:
vars:
- name: TARGET
e2e:test:all:
desc: Test all the available targets using Chainsaw
vars:
TARGETS:
sh: dagger call -sm ./dagger/maintenance/ get-targets | tr -d '[]"' | tr ',' '\n'
cmds:
- for:
var: TARGETS
vars:
TARGET: "{{ .ITEM }}"
task: e2e:test
e2e:test:full:
desc: "Run full E2E tests: setup env, generate values, run tests"
vars:
METADATA_FILE: "{{ .TARGET }}/bake-metadata.json"
KUBECONFIG_PATH: "./kubeconfig"
DISTRO: '{{ .DISTRO | default "trixie" }}'
REGISTRY_HOST: '{{ .REGISTRY_HOST | default "" }}'
REGISTRY_USERNAME: '{{ .REGISTRY_USERNAME | default "" }}'
cmds:
- task: e2e:setup-env
vars:
REGISTRY_HOST: '{{ .REGISTRY_HOST }}'
REGISTRY_USERNAME: '{{ .REGISTRY_USERNAME }}'
- task: bake
vars:
PUSH: "true"
TARGET: "{{ .TARGET }}"
METADATA_FILE: "{{ .METADATA_FILE }}"
- defer: rm -f "{{ .METADATA_FILE }}"
- task: e2e:generate-values
vars:
TARGET: "{{ .TARGET }}"
REGISTRY_USERNAME: '{{ .REGISTRY_USERNAME }}'
EXTENSION_IMAGE:
sh: >
jq -r --arg distro "{{ .DISTRO }}"
'to_entries | .[] | select(.key | endswith("-" + $distro)) | .value["image.name"] | split(",")[0]'
"{{ .METADATA_FILE }}"
- defer: rm -f "{{ .TARGET }}/values.yaml"
- task: e2e:export-kubeconfig
vars:
KUBECONFIG_PATH: "{{ .KUBECONFIG_PATH }}"
INTERNAL: "true"
- defer: rm -f "{{ .KUBECONFIG_PATH }}"
- task: e2e:test
vars:
TARGET: "{{ .TARGET }}"
KUBECONFIG_PATH: "{{ .KUBECONFIG_PATH }}"
requires:
vars:
- name: TARGET
e2e:cleanup:
desc: Cleanup E2E resources
deps:
- e2e:start-dagger-engine
vars:
DOCKER_SOCKET:
sh: docker context inspect -f {{`'{{json .Endpoints.docker.Host}}'`}} $(docker context show)
env:
_EXPERIMENTAL_DAGGER_RUNNER_HOST: container://{{ .DAGGER_ENGINE_NAME }}
cmds:
- >
dagger call -m github.com/aweris/daggerverse/kind@{{ .DAGGER_KIND_SHA }}
--socket {{ .DOCKER_SOCKET }} cluster --name {{ .KIND_CLUSTER_NAME }} delete || true
- docker rm -fv {{ .DAGGER_ENGINE_NAME }} || true
- docker rm -fv {{ .REGISTRY_NAME }} || true
- docker network rm {{ .E2E_NETWORK }} || true