Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
42 commits
Select commit Hold shift + click to select a range
293cd7f
Change from using prometheus operator to a custom test operator. (#1457)
dtfranz Nov 13, 2024
9c394f1
Fix docs: "Getting Started" and "Tutorials" (#1443)
m1kola Nov 14, 2024
a504d6f
Update wording in the developer docs (#1458)
m1kola Nov 14, 2024
0c2bfa1
Change formatting in the "Catalog queries" doc (#1461)
m1kola Nov 14, 2024
eb6b83d
Fix table formatting in the "Version ranges" doc (#1462)
m1kola Nov 14, 2024
9c5c3ca
📖 Simplify jq examples using olm.csv.metadata (#1464)
bentito Nov 14, 2024
5445800
cleanup manifest under config (#1465)
camilamacedo86 Nov 14, 2024
32316d3
:seedling: Bump helm.sh/helm/v3 from 3.16.2 to 3.16.3 (#1467)
dependabot[bot] Nov 14, 2024
dd2074b
Fix formatting in docs (#1466)
m1kola Nov 14, 2024
0931d5b
Fix docs: "How to" section (#1463)
m1kola Nov 14, 2024
10e870c
Fix go-verdiff check to handle new .mod files (#1468)
tmshort Nov 14, 2024
e16be6e
Update contributor docs (#1472)
m1kola Nov 15, 2024
f94182f
:seedling: Bump codecov/codecov-action from 4 to 5 (#1471)
dependabot[bot] Nov 15, 2024
39e7dd5
Fix docs: "Conceptual Guides" section (#1473)
m1kola Nov 15, 2024
63ef902
Update go version checker (#1474)
tmshort Nov 15, 2024
bc9bfc7
Merge branch 'main' into synchronize
Nov 15, 2024
86b1264
UPSTREAM: <carry>: Add OpenShift specific files
dtfranz Oct 26, 2023
016a0f6
UPSTREAM: <carry>: Drop commitchecker
awgreene Nov 3, 2023
c432c06
UPSTREAM: <carry>: Updating ose-olm-operator-controller-container ima…
Dec 16, 2023
f034902
UPSTREAM: <carry>: update owners
Mar 27, 2024
388115c
UPSTREAM: <carry>: Add pointer to tooling README
bentito Apr 1, 2024
471c8a0
UPSTREAM: <carry>: Disable Validating Admission Policy APIs downstream
Apr 26, 2024
fbfe6fa
UPSTREAM: <carry>: Updating ose-olm-operator-controller-container ima…
Mar 27, 2024
47c6689
UPSTREAM: <carry>: Enable Validating Admission Policy APIs downstream
Apr 30, 2024
d47a849
UPSTREAM: <carry>: manifests: set required-scc for openshift workloads
liouk May 2, 2024
7b26efb
UPSTREAM: <carry>: Updating ose-olm-operator-controller-container ima…
May 25, 2024
c69258a
UPSTREAM: <carry>: add everettraven to approvers+reviewers
everettraven Jun 24, 2024
2404f88
UPSTREAM: <carry>: add openshift kustomize overlay
everettraven Jul 9, 2024
6e6d1de
UPSTREAM: <carry>: Add tmshort to approvers
tmshort Sep 11, 2024
329c651
UPSTREAM: <carry>: Updating ose-olm-operator-controller-container ima…
Sep 18, 2024
85210ba
UPSTREAM: <carry>: Properly copy and call kustomize
tmshort Sep 23, 2024
95efca9
UPSTREAM: <carry>: manifests: add hostPath mount for /etc/containers
joelanford Sep 20, 2024
82b5358
UPSTREAM: <carry>: Add test-e2e target for downstream Makefile to be …
dtfranz Sep 26, 2024
3d3b996
UPSTREAM: <carry>: Add downstream verify makefile target
dtfranz Sep 27, 2024
514dffb
UPSTREAM: <carry>: openshift: template log verbosity to be managed by…
joelanford Sep 28, 2024
c7a0841
UPSTREAM: <carry>: Add global-pull-secret flag
Oct 8, 2024
608c4e5
UPSTREAM: <carry>: Update openshift CAs to operator-controller
tmshort Oct 28, 2024
6044b70
UPSTREAM: <carry>: Add HowTo for origin tests
tmshort Nov 1, 2024
18aee56
UPSTREAM: <drop>: go mod vendor
Nov 15, 2024
e977480
UPSTREAM: <drop>: remove upstream GitHub configuration
Nov 15, 2024
076016f
UPSTREAM: <drop>: configure the commit-checker
Nov 15, 2024
8d8a0d8
UPSTREAM: <drop>: rewrite go mod
Nov 15, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion CONTRIBUTING.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ you can follow the steps below to test your changes:
1. Create the cluster:

```sh
kind create cluster operator-controller
kind create cluster -n operator-controller
```

2. Build your changes:
Expand Down
2 changes: 1 addition & 1 deletion commitchecker.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
expectedMergeBase: 6d79092c8921f888b125e084b494576e87d5706e
expectedMergeBase: 63ef90209b014efab9e39caeb19923cbfd6f2cc2
upstreamBranch: main
upstreamOrg: operator-framework
upstreamRepo: operator-controller
114 changes: 0 additions & 114 deletions config/base/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,119 +18,5 @@ resources:
- crd
- rbac
- manager
# [WEBHOOK] To enable webhook, uncomment all the sections with [WEBHOOK] prefix including the one in
# crd/kustomization.yaml
#- ../webhook
# [CERTMANAGER] To enable cert-manager, uncomment all sections with 'CERTMANAGER'. 'WEBHOOK' components are required.
#- ../certmanager
# [PROMETHEUS] To enable prometheus monitor, uncomment all sections with 'PROMETHEUS'.
#- ../prometheus

# [WEBHOOK] To enable webhook, uncomment all the sections with [WEBHOOK] prefix including the one in
# crd/kustomization.yaml
#- manager_webhook_patch.yaml

# [CERTMANAGER] To enable cert-manager, uncomment all sections with 'CERTMANAGER'.
# Uncomment 'CERTMANAGER' sections in crd/kustomization.yaml to enable the CA injection in the admission webhooks.
# 'CERTMANAGER' needs to be enabled to use ca injection
#- webhookcainjection_patch.yaml

# [CERTMANAGER] To enable cert-manager, uncomment all sections with 'CERTMANAGER' prefix.
# Uncomment the following replacements to add the cert-manager CA injection annotations
#replacements:
# - source: # Add cert-manager annotation to ValidatingWebhookConfiguration, MutatingWebhookConfiguration and CRDs
# kind: Certificate
# group: cert-manager.io
# version: v1
# name: serving-cert # this name should match the one in certificate.yaml
# fieldPath: .metadata.namespace # namespace of the certificate CR
# targets:
# - select:
# kind: ValidatingWebhookConfiguration
# fieldPaths:
# - .metadata.annotations.[cert-manager.io/inject-ca-from]
# options:
# delimiter: '/'
# index: 0
# create: true
# - select:
# kind: MutatingWebhookConfiguration
# fieldPaths:
# - .metadata.annotations.[cert-manager.io/inject-ca-from]
# options:
# delimiter: '/'
# index: 0
# create: true
# - select:
# kind: CustomResourceDefinition
# fieldPaths:
# - .metadata.annotations.[cert-manager.io/inject-ca-from]
# options:
# delimiter: '/'
# index: 0
# create: true
# - source:
# kind: Certificate
# group: cert-manager.io
# version: v1
# name: serving-cert # this name should match the one in certificate.yaml
# fieldPath: .metadata.name
# targets:
# - select:
# kind: ValidatingWebhookConfiguration
# fieldPaths:
# - .metadata.annotations.[cert-manager.io/inject-ca-from]
# options:
# delimiter: '/'
# index: 1
# create: true
# - select:
# kind: MutatingWebhookConfiguration
# fieldPaths:
# - .metadata.annotations.[cert-manager.io/inject-ca-from]
# options:
# delimiter: '/'
# index: 1
# create: true
# - select:
# kind: CustomResourceDefinition
# fieldPaths:
# - .metadata.annotations.[cert-manager.io/inject-ca-from]
# options:
# delimiter: '/'
# index: 1
# create: true
# - source: # Add cert-manager annotation to the webhook Service
# kind: Service
# version: v1
# name: webhook-service
# fieldPath: .metadata.name # namespace of the service
# targets:
# - select:
# kind: Certificate
# group: cert-manager.io
# version: v1
# fieldPaths:
# - .spec.dnsNames.0
# - .spec.dnsNames.1
# options:
# delimiter: '.'
# index: 0
# create: true
# - source:
# kind: Service
# version: v1
# name: webhook-service
# fieldPath: .metadata.namespace # namespace of the service
# targets:
# - select:
# kind: Certificate
# group: cert-manager.io
# version: v1
# fieldPaths:
# - .spec.dnsNames.0
# - .spec.dnsNames.1
# options:
# delimiter: '.'
# index: 1
# create: true
1 change: 0 additions & 1 deletion config/base/prometheus/monitor.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,3 @@

# Prometheus Monitor Service (Metrics)
apiVersion: monitoring.coreos.com/v1
kind: ServiceMonitor
Expand Down
118 changes: 74 additions & 44 deletions docs/concepts/controlling-catalog-selection.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,16 +21,21 @@ To select a specific catalog by name, you can use the `matchLabels` field in you
apiVersion: olm.operatorframework.io/v1
kind: ClusterExtension
metadata:
name: my-extension
name: argocd
spec:
packageName: my-package
catalog:
selector:
matchLabels:
olm.operatorframework.io/metadata.name: my-content-management
namespace: argocd
serviceAccount:
name: argocd-installer
source:
sourceType: Catalog
catalog:
packageName: argocd-operator
selector:
matchLabels:
olm.operatorframework.io/metadata.name: operatorhubio
```
In this example, only the catalog named `my-catalog` will be considered when resolving `my-package`.
In this example, only the catalog named `operatorhubio` will be considered when resolving `argocd-operator`.

### Selecting Catalogs by Labels

Expand All @@ -42,13 +47,18 @@ If you have catalogs labeled with specific metadata, you can select them using `
apiVersion: olm.operatorframework.io/v1
kind: ClusterExtension
metadata:
name: my-extension
name: argocd
spec:
packageName: my-package
catalog:
selector:
matchLabels:
example.com/support: "true"
namespace: argocd
serviceAccount:
name: argocd-installer
source:
sourceType: Catalog
catalog:
packageName: argocd-operator
selector:
matchLabels:
example.com/support: "true"
```

This selects catalogs labeled with `example.com/support: "true"`.
Expand All @@ -59,17 +69,22 @@ This selects catalogs labeled with `example.com/support: "true"`.
apiVersion: olm.operatorframework.io/v1
kind: ClusterExtension
metadata:
name: my-extension
name: argocd
spec:
packageName: my-package
catalog:
selector:
matchExpressions:
- key: example.com/support
operator: In
values:
- "gold"
- "platinum"
namespace: argocd
serviceAccount:
name: argocd-installer
source:
sourceType: Catalog
catalog:
packageName: argocd-operator
selector:
matchExpressions:
- key: example.com/support
operator: In
values:
- "gold"
- "platinum"
```

This selects catalogs where the label `example.com/support` has the value `gold` or `platinum`.
Expand All @@ -84,16 +99,21 @@ You can exclude catalogs by using the `NotIn` or `DoesNotExist` operators in `ma
apiVersion: olm.operatorframework.io/v1
kind: ClusterExtension
metadata:
name: my-extension
name: argocd
spec:
packageName: my-package
catalog:
selector:
matchExpressions:
- key: olm.operatorframework.io/metadata.name
operator: NotIn
values:
- unwanted-content-management
namespace: argocd
serviceAccount:
name: argocd-installer
source:
sourceType: Catalog
catalog:
packageName: argocd-operator
selector:
matchExpressions:
- key: olm.operatorframework.io/metadata.name
operator: NotIn
values:
- unwanted-catalog
```

This excludes the catalog named `unwanted-catalog` from consideration.
Expand All @@ -104,14 +124,19 @@ This excludes the catalog named `unwanted-catalog` from consideration.
apiVersion: olm.operatorframework.io/v1
kind: ClusterExtension
metadata:
name: my-extension
name: argocd
spec:
packageName: my-package
catalog:
selector:
matchExpressions:
- key: example.com/support
operator: DoesNotExist
namespace: argocd
serviceAccount:
name: argocd-installer
source:
sourceType: Catalog
catalog:
packageName: argocd-operator
selector:
matchExpressions:
- key: example.com/support
operator: DoesNotExist
```

This selects catalogs that do not have the `example.com/support` label.
Expand Down Expand Up @@ -200,11 +225,16 @@ If the system cannot resolve to a single bundle due to ambiguity, it will genera
metadata:
name: install-my-operator
spec:
packageName: my-operator
catalog:
selector:
matchLabels:
example.com/support: "true"
namespace: my-operator-ns
serviceAccount:
name: my-operator-installer
source:
sourceType: Catalog
catalog:
packageName: my-operator
selector:
matchLabels:
example.com/support: "true"
```

3. **Apply the Resources**
Expand Down
28 changes: 14 additions & 14 deletions docs/concepts/crd-upgrade-safety.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,26 +53,26 @@ not cause the CRD Upgrade Safety preflight check to halt the upgrade:
## Disabling CRD Upgrade Safety

The CRD Upgrade Safety preflight check can be entirely disabled by adding the
`preflight.crdUpgradeSafety.disabled` field with a value of "true" to the ClusterExtension of the CRD.
`.spec.install.preflight.crdUpgradeSafety.enforcement` field with a value of `None` to the `ClusterExtension` of the CRD.

```yaml
apiVersion: olm.operatorframework.io/v1
kind: ClusterExtension
metadata:
name: clusterextension-sample
name: argocd
spec:
source:
sourceType: Catalog
catalog:
packageName: argocd-operator
version: 0.6.0
install:
namespace: default
serviceAccount:
name: argocd-installer
preflight:
crdUpgradeSafety:
disabled: true
namespace: argocd
serviceAccount:
name: argocd-installer
source:
sourceType: Catalog
catalog:
packageName: argocd-operator
version: 0.6.0
install:
preflight:
crdUpgradeSafety:
enforcement: None
```

You cannot disable individual field validators. If you disable the CRD Upgrade Safety preflight check, all field validators are disabled.
Expand Down
Loading