grpc-xds/control-plane-java/skaffold.yaml (67 lines of code) (raw):
# Copyright 2023 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: skaffold/v3
kind: Config
metadata:
name: control-plane
annotations:
config.kubernetes.io/local-config: "true"
build:
artifacts:
# https://skaffold.dev/docs/builders/builder-types/jib/#gradle
- image: control-plane
context: ..
jib:
project: control-plane
# Using a base image with a shell (`debug`) to enable exec-ing to containers,
# since this is a sample implementation created for learning purposes.
fromImage: gcr.io/distroless/java17-debian12:debug-nonroot
tagPolicy:
inputDigest: {}
deploy:
kubectl: {}
manifests:
kustomize:
buildArgs: ["--load-restrictor=LoadRestrictionsNone"]
paths: ["k8s/base"]
portForward:
- resourceType: Service
resourceName: control-plane
namespace: xds # kpt-set: ${control-plane-namespace}
localPort: 50053
port: 50051 # serving port
profiles:
# Alter the Skaffold config when running `skaffold debug`.
- name: debug # the name is not important
activation:
- command: debug
patches:
# Use a different base image when debugging.
- op: replace
path: /build/artifacts/0/jib/fromImage
value: gcr.io/distroless/java17-debian12:debug
# Add port forwarding to the debug port.
- op: add
path: /portForward/-
value:
resourceType: Deployment
resourceName: control-plane
namespace: xds # kpt-set: ${control-plane-namespace}
localPort: 5006
port: 5005 # JDWP port
# Multi-cluster, and GKE workload TLS certificates.
- name: multi-cluster-gke
manifests:
kustomize:
buildArgs: ["--load-restrictor=LoadRestrictionsNone"]
paths: ["k8s/overlays/tls-gke-workload-certs-multi-cluster"]
# Multi-cluster, and workload TLS certificates from cert-manager CA.
- name: multi-cluster-kind
manifests:
kustomize:
buildArgs: ["--load-restrictor=LoadRestrictionsNone"]
paths: ["k8s/overlays/tls-cert-manager-multi-cluster"]
# Add workload TLS certificates from cert-manager CA.
- name: tls-cert-manager
activation:
- kubeContext: kind.*
manifests:
kustomize:
buildArgs: ["--load-restrictor=LoadRestrictionsNone"]
paths: ["k8s/overlays/tls-cert-manager"]
# Add GKE workload TLS certificates.
- name: tls-gke-workload-certs
activation:
- kubeContext: gke.*
manifests:
kustomize:
buildArgs: ["--load-restrictor=LoadRestrictionsNone"]
paths: ["k8s/overlays/tls-gke-workload-certs"]