You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Hardcoded here, as we want to upgrade everywhere together
104
-
# Ideally this would be a subchart of our support chart,
105
-
# but helm has made some unfortunate architectural choices
106
-
# with respect to CRDs and they seem super unreliable when
107
-
# used as subcharts. So we install it here directly from the
108
-
# manifests.
109
-
# We unconditionally install this on all AWS clusters - however,
110
-
# that doesn't actually turn NetworkPolicy enforcement on. That
111
-
# requires setting `calico.enabled` to True in `support` so a
112
-
# calico `Installation` object can be set up.
113
-
# I deeply loathe the operator *singleton* pattern.
114
-
tigera_operator_version="v3.29.3"
78
+
print_colour("Provisioning cert-manager...")
115
79
subprocess.check_call(
116
80
[
117
81
"kubectl",
118
82
"apply",
119
-
"--force-conflicts", # This gives ownership to the resource, back to kubectl https://kubernetes.io/docs/reference/using-api/server-side-apply/#conflicts
"cert-manager", # given release name (aka. installation name)
92
+
"cert-manager", # helm chart to install
93
+
f"--repo={cert_manager_url}",
94
+
"--install",
95
+
"--create-namespace",
96
+
"--namespace=cert-manager",
97
+
f"--version={cert_manager_version}",
123
98
]
124
99
)
125
100
print_colour("Done!")
126
101
127
-
# Patch the tigera operator to remove the NoSchedule toleration
128
-
# otherwise it will schedule on tainted nodes
129
-
print_colour("Patching tigera operator...")
130
-
patch_tolerations= {
131
-
"spec": {
132
-
"template": {
133
-
"spec": {
134
-
"tolerations": [
135
-
{"effect": "NoExecute", "operator": "Exists"},
136
-
],
102
+
ifself.spec["provider"] =="aws":
103
+
print_colour("Provisioning tigera operator...")
104
+
# Hardcoded here, as we want to upgrade everywhere together
105
+
# Ideally this would be a subchart of our support chart,
106
+
# but helm has made some unfortunate architectural choices
107
+
# with respect to CRDs and they seem super unreliable when
108
+
# used as subcharts. So we install it here directly from the
109
+
# manifests.
110
+
# We unconditionally install this on all AWS clusters - however,
111
+
# that doesn't actually turn NetworkPolicy enforcement on. That
112
+
# requires setting `calico.enabled` to True in `support` so a
113
+
# calico `Installation` object can be set up.
114
+
# I deeply loathe the operator *singleton* pattern.
115
+
tigera_operator_version="v3.29.3"
116
+
subprocess.check_call(
117
+
[
118
+
"kubectl",
119
+
"apply",
120
+
"--force-conflicts", # This gives ownership to the resource, back to kubectl https://kubernetes.io/docs/reference/using-api/server-side-apply/#conflicts
0 commit comments