mirror of
https://github.com/open-cluster-management-io/ocm.git
synced 2026-02-14 10:00:11 +00:00
relocate to staging: registration-operator
Signed-off-by: xuezhaojun <zxue@redhat.com>
This commit is contained in:
273
Makefile
273
Makefile
@@ -1,273 +0,0 @@
|
||||
SHELL :=/bin/bash
|
||||
|
||||
all: build
|
||||
.PHONY: all
|
||||
|
||||
# Include the library makefile
|
||||
include $(addprefix ./vendor/github.com/openshift/build-machinery-go/make/, \
|
||||
golang.mk \
|
||||
targets/openshift/deps.mk \
|
||||
targets/openshift/images.mk \
|
||||
targets/openshift/yaml-patch.mk\
|
||||
lib/tmp.mk\
|
||||
)
|
||||
|
||||
# IMAGE_NAME can be set in the env to override calculated value for registration-operator image
|
||||
IMAGE_REGISTRY?=quay.io/open-cluster-management
|
||||
IMAGE_TAG?=latest
|
||||
IMAGE_NAME?=$(IMAGE_REGISTRY)/registration-operator:$(IMAGE_TAG)
|
||||
|
||||
# CSV_VERSION is used to generate new CSV manifests
|
||||
CSV_VERSION?=0.12.0
|
||||
|
||||
# WORK_IMAGE can be set in the env to override calculated value
|
||||
WORK_TAG?=latest
|
||||
WORK_IMAGE?=$(IMAGE_REGISTRY)/work:$(WORK_TAG)
|
||||
|
||||
# REGISTRATION_IMAGE can be set in the env to override calculated value
|
||||
REGISTRATION_TAG?=latest
|
||||
REGISTRATION_IMAGE?=$(IMAGE_REGISTRY)/registration:$(REGISTRATION_TAG)
|
||||
|
||||
# PLACEMENT_IMAGE can be set in the env to override calculated value
|
||||
PLACEMENT_TAG?=latest
|
||||
PLACEMENT_IMAGE?=$(IMAGE_REGISTRY)/placement:$(PLACEMENT_TAG)
|
||||
|
||||
# ADDON_MANAGER_IMAGE can be set in the env to override calculated value
|
||||
ADDON_MANAGER_TAG?=latest
|
||||
ADDON_MANAGER_IMAGE?=$(IMAGE_REGISTRY)/addon-manager:$(ADDON_MANAGER_TAG)
|
||||
|
||||
OPERATOR_SDK?=$(PERMANENT_TMP_GOPATH)/bin/operator-sdk
|
||||
OPERATOR_SDK_VERSION?=v1.1.0
|
||||
operatorsdk_gen_dir:=$(dir $(OPERATOR_SDK))
|
||||
# On openshift, OLM is installed into openshift-operator-lifecycle-manager
|
||||
OLM_NAMESPACE?=olm
|
||||
OLM_VERSION?=0.16.1
|
||||
|
||||
PWD=$(shell pwd)
|
||||
KUSTOMIZE?=$(PWD)/$(PERMANENT_TMP_GOPATH)/bin/kustomize
|
||||
KUSTOMIZE_VERSION?=v3.5.4
|
||||
KUSTOMIZE_ARCHIVE_NAME?=kustomize_$(KUSTOMIZE_VERSION)_$(GOHOSTOS)_$(GOHOSTARCH).tar.gz
|
||||
kustomize_dir:=$(dir $(KUSTOMIZE))
|
||||
|
||||
KUBECTL?=kubectl
|
||||
KUBECONFIG?=./.kubeconfig
|
||||
HUB_KUBECONFIG?=./.hub-kubeconfig
|
||||
HOSTED_CLUSTER_MANAGER_NAME?=cluster-manager
|
||||
EXTERNAL_HUB_KUBECONFIG?=./.external-hub-kubeconfig
|
||||
EXTERNAL_MANAGED_KUBECONFIG?=./.external-managed-kubeconfig
|
||||
MANAGED_CLUSTER_NAME ?= cluster1
|
||||
KLUSTERLET_NAME ?= klusterlet
|
||||
|
||||
OPERATOR_SDK_ARCHOS:=x86_64-linux-gnu
|
||||
ifeq ($(GOHOSTOS),darwin)
|
||||
ifeq ($(GOHOSTARCH),amd64)
|
||||
OPERATOR_SDK_ARCHOS:=x86_64-apple-darwin
|
||||
endif
|
||||
endif
|
||||
|
||||
SED_CMD:=sed
|
||||
ifeq ($(GOHOSTOS),darwin)
|
||||
ifeq ($(GOHOSTARCH),amd64)
|
||||
SED_CMD:=gsed
|
||||
endif
|
||||
endif
|
||||
|
||||
copy-crd:
|
||||
bash -x hack/copy-crds.sh
|
||||
|
||||
patch-crd: ensure-yaml-patch
|
||||
bash hack/patch/patch-crd.sh $(YAML_PATCH)
|
||||
|
||||
update: patch-crd copy-crd
|
||||
|
||||
verify-crds: patch-crd
|
||||
bash -x hack/verify-crds.sh
|
||||
|
||||
verify-gocilint:
|
||||
go install github.com/golangci/golangci-lint/cmd/golangci-lint@v1.45.2
|
||||
golangci-lint run --timeout=3m --modules-download-mode vendor ./...
|
||||
|
||||
verify-gosec:
|
||||
go install github.com/securego/gosec/v2/cmd/gosec@v2.15.0
|
||||
gosec -exclude-dir=test ./...
|
||||
|
||||
verify: verify-crds verify-gocilint verify-gosec
|
||||
|
||||
update-csv: ensure-operator-sdk
|
||||
cd deploy/cluster-manager && ../../$(OPERATOR_SDK) generate bundle --manifests --deploy-dir config/ --crds-dir config/crds/ --output-dir olm-catalog/cluster-manager/ --version $(CSV_VERSION)
|
||||
cd deploy/klusterlet && ../../$(OPERATOR_SDK) generate bundle --manifests --deploy-dir config/ --crds-dir config/crds/ --output-dir olm-catalog/klusterlet/ --version=$(CSV_VERSION)
|
||||
|
||||
# delete useless serviceaccounts in manifests although they are copied from config by operator-sdk.
|
||||
rm ./deploy/cluster-manager/olm-catalog/cluster-manager/manifests/cluster-manager_v1_serviceaccount.yaml
|
||||
rm ./deploy/klusterlet/olm-catalog/klusterlet/manifests/klusterlet_v1_serviceaccount.yaml
|
||||
|
||||
deploy: deploy-hub cluster-ip deploy-spoke
|
||||
|
||||
hub-kubeconfig:
|
||||
$(KUBECTL) config view --minify --flatten > $(HUB_KUBECONFIG)
|
||||
|
||||
# In hosted mode, hub-kubeconfig used in managedcluster should be the same as the external-hub-kubeconfig
|
||||
hub-kubeconfig-hosted:
|
||||
cat $(EXTERNAL_HUB_KUBECONFIG) > $(HUB_KUBECONFIG)
|
||||
|
||||
clean-deploy: clean-spoke-cr clean-hub-cr clean-spoke-operator clean-hub-operator
|
||||
|
||||
deploy-hub: deploy-hub-operator apply-hub-cr hub-kubeconfig
|
||||
|
||||
deploy-hub-hosted: deploy-hub-operator apply-hub-cr-hosted hub-kubeconfig-hosted
|
||||
|
||||
deploy-spoke: deploy-spoke-operator apply-spoke-cr
|
||||
|
||||
deploy-spoke-hosted: deploy-spoke-operator apply-spoke-cr-hosted
|
||||
|
||||
deploy-hub-operator: ensure-kustomize
|
||||
cp deploy/cluster-manager/config/kustomization.yaml deploy/cluster-manager/config/kustomization.yaml.tmp
|
||||
cd deploy/cluster-manager/config && $(KUSTOMIZE) edit set image quay.io/open-cluster-management/registration-operator:latest=$(IMAGE_NAME)
|
||||
$(KUSTOMIZE) build deploy/cluster-manager/config | $(KUBECTL) apply -f -
|
||||
mv deploy/cluster-manager/config/kustomization.yaml.tmp deploy/cluster-manager/config/kustomization.yaml
|
||||
|
||||
apply-hub-cr:
|
||||
$(SED_CMD) -e "s,quay.io/open-cluster-management/registration,$(REGISTRATION_IMAGE)," -e "s,quay.io/open-cluster-management/work,$(WORK_IMAGE)," -e "s,quay.io/open-cluster-management/placement,$(PLACEMENT_IMAGE)," -e "s,quay.io/open-cluster-management/addon-manager,$(ADDON_MANAGER_IMAGE)," deploy/cluster-manager/config/samples/operator_open-cluster-management_clustermanagers.cr.yaml | $(KUBECTL) apply -f -
|
||||
|
||||
apply-hub-cr-hosted: external-hub-secret
|
||||
$(SED_CMD) -e "s,quay.io/open-cluster-management/registration,$(REGISTRATION_IMAGE)," -e "s,quay.io/open-cluster-management/work,$(WORK_IMAGE)," -e "s,quay.io/open-cluster-management/placement,$(PLACEMENT_IMAGE)," -e "s,quay.io/open-cluster-management/addon-manager,$(ADDON_MANAGER_IMAGE)," deploy/cluster-manager/config/samples/operator_open-cluster-management_clustermanagers_hosted.cr.yaml | $(KUBECTL) apply -f -
|
||||
|
||||
clean-hub: clean-hub-cr clean-hub-operator
|
||||
|
||||
clean-spoke: clean-spoke-cr clean-spoke-operator
|
||||
|
||||
clean-spoke-hosted: clean-spoke-cr-hosted clean-spoke-operator
|
||||
|
||||
cluster-ip:
|
||||
$(eval HUB_CONTEXT := $(shell $(KUBECTL) config current-context --kubeconfig $(HUB_KUBECONFIG)))
|
||||
$(eval HUB_CLUSTER_IP := $(shell $(KUBECTL) get svc kubernetes -n default -o jsonpath="{.spec.clusterIP}" --kubeconfig $(HUB_KUBECONFIG)))
|
||||
$(KUBECTL) config set clusters.$(HUB_CONTEXT).server https://$(HUB_CLUSTER_IP) --kubeconfig $(HUB_KUBECONFIG)
|
||||
|
||||
bootstrap-secret:
|
||||
cp $(HUB_KUBECONFIG) deploy/klusterlet/config/samples/bootstrap/hub-kubeconfig
|
||||
$(KUBECTL) get ns open-cluster-management-agent; if [ $$? -ne 0 ] ; then $(KUBECTL) create ns open-cluster-management-agent; fi
|
||||
$(KUSTOMIZE) build deploy/klusterlet/config/samples/bootstrap | $(KUBECTL) apply -f -
|
||||
|
||||
bootstrap-secret-hosted:
|
||||
cp $(HUB_KUBECONFIG) deploy/klusterlet/config/samples/bootstrap/hub-kubeconfig
|
||||
$(KUBECTL) get ns $(KLUSTERLET_NAME); if [ $$? -ne 0 ] ; then $(KUBECTL) create ns $(KLUSTERLET_NAME); fi
|
||||
$(KUSTOMIZE) build deploy/klusterlet/config/samples/bootstrap | $(SED_CMD) -e "s,namespace: open-cluster-management-agent,namespace: $(KLUSTERLET_NAME)," | $(KUBECTL) apply -f -
|
||||
|
||||
external-hub-secret:
|
||||
cp $(EXTERNAL_HUB_KUBECONFIG) deploy/cluster-manager/config/samples/cluster-manager/external-hub-kubeconfig
|
||||
$(KUBECTL) get ns $(HOSTED_CLUSTER_MANAGER_NAME); if [ $$? -ne 0 ] ; then $(KUBECTL) create ns $(HOSTED_CLUSTER_MANAGER_NAME); fi
|
||||
$(KUSTOMIZE) build deploy/cluster-manager/config/samples/cluster-manager | $(SED_CMD) -e "s,cluster-manager,$(HOSTED_CLUSTER_MANAGER_NAME)," | $(KUBECTL) apply -f -
|
||||
|
||||
external-managed-secret:
|
||||
cp $(EXTERNAL_MANAGED_KUBECONFIG) deploy/klusterlet/config/samples/managedcluster/external-managed-kubeconfig
|
||||
$(KUBECTL) get ns $(KLUSTERLET_NAME); if [ $$? -ne 0 ] ; then $(KUBECTL) create ns $(KLUSTERLET_NAME); fi
|
||||
$(KUSTOMIZE) build deploy/klusterlet/config/samples/managedcluster | $(SED_CMD) -e "s,namespace: klusterlet,namespace: $(KLUSTERLET_NAME)," | $(KUBECTL) apply -f -
|
||||
|
||||
deploy-spoke-operator: ensure-kustomize
|
||||
cp deploy/klusterlet/config/kustomization.yaml deploy/klusterlet/config/kustomization.yaml.tmp
|
||||
cd deploy/klusterlet/config && $(KUSTOMIZE) edit set image quay.io/open-cluster-management/registration-operator:latest=$(IMAGE_NAME)
|
||||
$(KUSTOMIZE) build deploy/klusterlet/config | $(KUBECTL) apply -f -
|
||||
mv deploy/klusterlet/config/kustomization.yaml.tmp deploy/klusterlet/config/kustomization.yaml
|
||||
|
||||
apply-spoke-cr: bootstrap-secret
|
||||
$(KUSTOMIZE) build deploy/klusterlet/config/samples \
|
||||
| $(SED_CMD) -e "s,quay.io/open-cluster-management/registration,$(REGISTRATION_IMAGE)," -e "s,quay.io/open-cluster-management/work,$(WORK_IMAGE)," -e "s,cluster1,$(MANAGED_CLUSTER_NAME)," \
|
||||
| $(KUBECTL) apply -f -
|
||||
|
||||
apply-spoke-cr-hosted: bootstrap-secret-hosted external-managed-secret
|
||||
$(KUSTOMIZE) build deploy/klusterlet/config/samples | $(SED_CMD) -e "s,mode: Default,mode: Hosted," -e "s,quay.io/open-cluster-management/registration,$(REGISTRATION_IMAGE)," -e "s,quay.io/open-cluster-management/work,$(WORK_IMAGE)," -e "s,cluster1,$(MANAGED_CLUSTER_NAME)," -e "s,name: klusterlet,name: $(KLUSTERLET_NAME)," -r | $(KUBECTL) apply -f -
|
||||
|
||||
clean-hub-cr:
|
||||
$(KUBECTL) delete managedcluster --all --ignore-not-found
|
||||
$(KUSTOMIZE) build deploy/cluster-manager/config/samples | $(KUBECTL) delete --ignore-not-found -f -
|
||||
|
||||
clean-hub-cr-hosted:
|
||||
$(KUBECTL) delete managedcluster --all --ignore-not-found
|
||||
$(KUSTOMIZE) build deploy/cluster-manager/config/samples | $(SED_CMD) -e "s,cluster-manager,$(HOSTED_CLUSTER_MANAGER_NAME)," | $(KUBECTL) delete --ignore-not-found -f -
|
||||
$(KUSTOMIZE) build deploy/cluster-manager/config/samples/cluster-manager | $(SED_CMD) -e "s,cluster-manager,$(HOSTED_CLUSTER_MANAGER_NAME)," | $(KUBECTL) delete --ignore-not-found -f -
|
||||
|
||||
clean-hub-operator:
|
||||
$(KUSTOMIZE) build deploy/cluster-manager/config | $(KUBECTL) delete --ignore-not-found -f -
|
||||
|
||||
clean-spoke-cr:
|
||||
$(KUSTOMIZE) build deploy/klusterlet/config/samples | $(KUBECTL) delete --ignore-not-found -f -
|
||||
$(KUSTOMIZE) build deploy/klusterlet/config/samples/bootstrap | $(KUBECTL) delete --ignore-not-found -f -
|
||||
|
||||
clean-spoke-cr-hosted:
|
||||
$(KUSTOMIZE) build deploy/klusterlet/config/samples | $(KUBECTL) delete --ignore-not-found -f -
|
||||
$(KUSTOMIZE) build deploy/klusterlet/config/samples/bootstrap | $(SED_CMD) -e "s,namespace: open-cluster-management-agent,namespace: $(KLUSTERLET_NAME)," | $(KUBECTL) delete --ignore-not-found -f -
|
||||
$(KUSTOMIZE) build deploy/klusterlet/config/samples/managedcluster | $(KUBECTL) delete --ignore-not-found -f -
|
||||
|
||||
clean-spoke-operator:
|
||||
$(KUSTOMIZE) build deploy/klusterlet/config | $(KUBECTL) delete --ignore-not-found -f -
|
||||
$(KUBECTL) delete ns open-cluster-management-agent --ignore-not-found
|
||||
|
||||
# Registration e2e expects to read bootstrap secret from open-cluster-management/e2e-bootstrap-secret
|
||||
# TODO: think about how to factor this
|
||||
e2e-bootstrap-secret: cluster-ip
|
||||
$(KUBECTL) delete secret e2e-bootstrap-secret -n open-cluster-management --ignore-not-found
|
||||
$(KUBECTL) create secret generic e2e-bootstrap-secret --from-file=kubeconfig=$(HUB_KUBECONFIG) -n open-cluster-management
|
||||
|
||||
install-olm: ensure-operator-sdk
|
||||
$(KUBECTL) get crds | grep clusterserviceversion ; if [ $$? -ne 0 ] ; then $(OPERATOR_SDK) olm install --version $(OLM_VERSION); fi
|
||||
$(KUBECTL) get ns open-cluster-management ; if [ $$? -ne 0 ] ; then $(KUBECTL) create ns open-cluster-management ; fi
|
||||
|
||||
deploy-hub-operator-olm: install-olm
|
||||
$(OPERATOR_SDK) run packagemanifests deploy/cluster-manager/olm-catalog/cluster-manager/ --namespace open-cluster-management --version $(CSV_VERSION) --install-mode OwnNamespace --timeout=10m
|
||||
|
||||
clean-hub-olm: ensure-operator-sdk
|
||||
$(KUBECTL) delete -f deploy/cluster-manager/config/samples/operator_open-cluster-management_clustermanagers.cr.yaml --ignore-not-found
|
||||
$(OPERATOR_SDK) cleanup cluster-manager --namespace open-cluster-management --timeout 10m
|
||||
|
||||
deploy-spoke-operator-olm: install-olm bootstrap-secret
|
||||
$(OPERATOR_SDK) run packagemanifests deploy/klusterlet/olm-catalog/klusterlet/ --namespace open-cluster-management --version $(CSV_VERSION) --install-mode OwnNamespace --timeout=10m
|
||||
|
||||
clean-spoke-olm: ensure-operator-sdk
|
||||
$(KUBECTL) delete -f deploy/klusterlet/config/samples/operator_open-cluster-management_klusterlets.cr.yaml --ignore-not-found
|
||||
$(OPERATOR_SDK) cleanup klusterlet --namespace open-cluster-management --timeout 10m
|
||||
|
||||
test-e2e: deploy-hub deploy-spoke-operator run-e2e
|
||||
|
||||
run-e2e: cluster-ip bootstrap-secret
|
||||
go test -c ./test/e2e
|
||||
./e2e.test -test.v -ginkgo.v
|
||||
|
||||
clean-e2e:
|
||||
$(RM) ./e2e.test
|
||||
|
||||
ensure-operator-sdk:
|
||||
ifeq "" "$(wildcard $(OPERATOR_SDK))"
|
||||
$(info Installing operator-sdk into '$(OPERATOR_SDK)')
|
||||
mkdir -p '$(operatorsdk_gen_dir)'
|
||||
curl -s -f -L https://github.com/operator-framework/operator-sdk/releases/download/$(OPERATOR_SDK_VERSION)/operator-sdk-$(OPERATOR_SDK_VERSION)-$(OPERATOR_SDK_ARCHOS) -o '$(OPERATOR_SDK)'
|
||||
chmod +x '$(OPERATOR_SDK)';
|
||||
else
|
||||
$(info Using existing operator-sdk from "$(OPERATOR_SDK)")
|
||||
endif
|
||||
|
||||
ensure-kustomize:
|
||||
ifeq "" "$(wildcard $(KUSTOMIZE))"
|
||||
$(info Installing kustomize into '$(KUSTOMIZE)')
|
||||
mkdir -p '$(kustomize_dir)'
|
||||
curl -s -f -L https://github.com/kubernetes-sigs/kustomize/releases/download/kustomize%2F$(KUSTOMIZE_VERSION)/$(KUSTOMIZE_ARCHIVE_NAME) -o '$(kustomize_dir)$(KUSTOMIZE_ARCHIVE_NAME)'
|
||||
tar -C '$(kustomize_dir)' -zvxf '$(kustomize_dir)$(KUSTOMIZE_ARCHIVE_NAME)'
|
||||
chmod +x '$(KUSTOMIZE)';
|
||||
else
|
||||
$(info Using existing kustomize from "$(KUSTOMIZE)")
|
||||
endif
|
||||
|
||||
# This will call a macro called "build-image" which will generate image specific targets based on the parameters:
|
||||
# $0 - macro name
|
||||
# $1 - target suffix
|
||||
# $2 - Dockerfile path
|
||||
# $3 - context directory for image build
|
||||
# It will generate target "image-$(1)" for building the image an binding it as a prerequisite to target "images".
|
||||
$(call build-image,registration-operator,$(IMAGE_REGISTRY)/registration-operator:$(IMAGE_TAG),./Dockerfile,.)
|
||||
|
||||
clean:
|
||||
$(RM) ./registration-operator
|
||||
.PHONY: clean
|
||||
|
||||
GO_TEST_PACKAGES :=./pkg/... ./cmd/...
|
||||
|
||||
include ./test/integration-test.mk
|
||||
Reference in New Issue
Block a user