SHELL :=/bin/bash all: build .PHONY: all # Include the library makefile include $(addprefix ./vendor/github.com/openshift/build-machinery-go/make/, \ golang.mk \ targets/openshift/deps.mk \ targets/openshift/images.mk \ targets/openshift/kustomize.mk \ lib/tmp.mk \ ) IMAGE_REGISTRY?=quay.io/open-cluster-management IMAGE_TAG?=latest IMAGE_NAME?=$(IMAGE_REGISTRY)/registration:$(IMAGE_TAG) KUBECONFIG ?= ./.kubeconfig KUBECTL?=kubectl HUB_KUBECONFIG?=$(KUBECONFIG) HUB_KUBECONFIG_CONTEXT?=$(shell $(KUBECTL) --kubeconfig $(HUB_KUBECONFIG) config current-context) SPOKE_KUBECONFIG?=$(KUBECONFIG) SPOKE_KUBECONFIG_CONTEXT?=$(shell $(KUBECTL) --kubeconfig $(SPOKE_KUBECONFIG) config current-context) PWD=$(shell pwd) # This will call a macro called "build-image" which will generate image specific targets based on the parameters: # $0 - macro name # $1 - target suffix # $2 - Dockerfile path # $3 - context directory for image build # It will generate target "image-$(1)" for building the image and binding it as a prerequisite to target "images". $(call build-image,registration,$(IMAGE_REGISTRY)/registration:$(IMAGE_TAG),./Dockerfile,.) clean: $(RM) ./registration .PHONY: clean update-crds: bash -x hack/copy-crds.sh update: update-crds verify-crds: bash -x hack/verify-crds.sh verify: verify-crds deploy-hub: ensure-kustomize cp deploy/hub/kustomization.yaml deploy/hub/kustomization.yaml.tmp cd deploy/hub && ../../$(KUSTOMIZE) edit set image quay.io/open-cluster-management/registration:latest=$(IMAGE_NAME) $(KUBECTL) config use-context $(HUB_KUBECONFIG_CONTEXT) --kubeconfig $(HUB_KUBECONFIG) $(KUSTOMIZE) build deploy/hub | $(KUBECTL) --kubeconfig $(HUB_KUBECONFIG) apply -f - mv deploy/hub/kustomization.yaml.tmp deploy/hub/kustomization.yaml deploy-webhook: ensure-kustomize cp deploy/webhook/kustomization.yaml deploy/webhook/kustomization.yaml.tmp cd deploy/webhook && ../../$(KUSTOMIZE) edit set image quay.io/open-cluster-management/registration:latest=$(IMAGE_NAME) $(KUBECTL) config use-context $(HUB_KUBECONFIG_CONTEXT) --kubeconfig $(HUB_KUBECONFIG) $(KUSTOMIZE) build deploy/webhook | $(KUBECTL) --kubeconfig $(HUB_KUBECONFIG) apply -f - mv deploy/webhook/kustomization.yaml.tmp deploy/webhook/kustomization.yaml cluster-ip: $(KUBECTL) config use-context $(HUB_KUBECONFIG_CONTEXT) --kubeconfig $(HUB_KUBECONFIG) $(eval CLUSTER_IP?=$(shell $(KUBECTL) --kubeconfig $(HUB_KUBECONFIG) get svc kubernetes -n default -o jsonpath="{.spec.clusterIP}")) bootstrap-secret: cluster-ip cp $(KUBECONFIG) dev-kubeconfig $(KUBECTL) config set clusters.$(HUB_KUBECONFIG_CONTEXT).server https://$(CLUSTER_IP) --kubeconfig dev-kubeconfig $(KUBECTL) config use-context $(SPOKE_KUBECONFIG_CONTEXT) --kubeconfig $(SPOKE_KUBECONFIG) $(KUBECTL) get ns open-cluster-management-agent --kubeconfig $(SPOKE_KUBECONFIG); if [ $$? -ne 0 ] ; then $(KUBECTL) create ns open-cluster-management-agent --kubeconfig $(SPOKE_KUBECONFIG); fi $(KUBECTL) delete secret bootstrap-secret -n open-cluster-management-agent --ignore-not-found --kubeconfig $(SPOKE_KUBECONFIG) $(KUBECTL) create secret generic bootstrap-secret --from-file=kubeconfig=dev-kubeconfig -n open-cluster-management-agent --kubeconfig $(SPOKE_KUBECONFIG) e2e-bootstrap-secret: cluster-ip cp $(KUBECONFIG) e2e-kubeconfig $(KUBECTL) config set clusters.$(HUB_KUBECONFIG_CONTEXT).server https://$(CLUSTER_IP) --kubeconfig e2e-kubeconfig $(KUBECTL) config use-context $(SPOKE_KUBECONFIG_CONTEXT) --kubeconfig $(SPOKE_KUBECONFIG) $(KUBECTL) get ns open-cluster-management-agent --kubeconfig $(SPOKE_KUBECONFIG); if [ $$? -ne 0 ] ; then $(KUBECTL) create ns open-cluster-management-agent --kubeconfig $(SPOKE_KUBECONFIG); fi $(KUBECTL) delete secret e2e-bootstrap-secret -n open-cluster-management-agent --ignore-not-found --kubeconfig $(SPOKE_KUBECONFIG) $(KUBECTL) create secret generic e2e-bootstrap-secret --from-file=kubeconfig=e2e-kubeconfig -n open-cluster-management-agent --kubeconfig $(SPOKE_KUBECONFIG) deploy-spoke: ensure-kustomize cp deploy/spoke/kustomization.yaml deploy/spoke/kustomization.yaml.tmp cd deploy/spoke && ../../$(KUSTOMIZE) edit set image quay.io/open-cluster-management/registration:latest=$(IMAGE_NAME) $(KUBECTL) config use-context $(SPOKE_KUBECONFIG_CONTEXT) --kubeconfig $(SPOKE_KUBECONFIG) $(KUSTOMIZE) build deploy/spoke | $(KUBECTL) --kubeconfig $(SPOKE_KUBECONFIG) apply -f - mv deploy/spoke/kustomization.yaml.tmp deploy/spoke/kustomization.yaml clean-hub: $(KUBECTL) config use-context $(HUB_KUBECONFIG_CONTEXT) --kubeconfig $(HUB_KUBECONFIG) $(KUSTOMIZE) build deploy/hub | $(KUBECTL) --kubeconfig $(HUB_KUBECONFIG) delete --ignore-not-found -f - clean-webhook: $(KUBECTL) config use-context $(HUB_KUBECONFIG_CONTEXT) --kubeconfig $(HUB_KUBECONFIG) $(KUSTOMIZE) build deploy/webhook | $(KUBECTL) --kubeconfig $(HUB_KUBECONFIG) delete --ignore-not-found -f - clean-spoke: ensure-kustomize $(KUBECTL) config use-context $(SPOKE_KUBECONFIG_CONTEXT) --kubeconfig $(SPOKE_KUBECONFIG) $(KUSTOMIZE) build deploy/spoke | $(KUBECTL) --kubeconfig $(SPOKE_KUBECONFIG) delete --ignore-not-found -f - .PHONY: deploy deploy: deploy-hub deploy-webhook bootstrap-secret deploy-spoke .PHONY: undeploy undeploy: clean-spoke clean-webhook clean-hub build-e2e: go test -c ./test/e2e -mod=vendor test-e2e: build-e2e ensure-kustomize deploy-hub deploy-webhook e2e-bootstrap-secret ./e2e.test -test.v -ginkgo.v clean-e2e: $(RM) ./e2e.test GO_TEST_PACKAGES :=./pkg/... ./cmd/... include ./test/integration-test.mk