Skip to content

Commit c4f3376

Browse files
Merge pull request #1228 from benluddy/helm-template-v3
Update release script to require version 3 of helm.
2 parents 366ed26 + 1390043 commit c4f3376

13 files changed

+74
-90
lines changed
Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,20 @@
11
apiVersion: v1
22
kind: Namespace
33
metadata:
4-
name: openshift-operator-lifecycle-manager
4+
name: openshift-operators
55

66
annotations:
77
openshift.io/node-selector: ""
88
labels:
99
openshift.io/run-level: "1"
10-
openshift.io/cluster-monitoring: "true"
11-
1210
---
1311
apiVersion: v1
1412
kind: Namespace
1513
metadata:
16-
name: openshift-operators
14+
name: openshift-operator-lifecycle-manager
1715

1816
annotations:
1917
openshift.io/node-selector: ""
2018
labels:
2119
openshift.io/run-level: "1"
22-
20+
openshift.io/cluster-monitoring: "true"

manifests/0000_50_olm_01-olm-operator.serviceaccount.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,9 @@
1+
kind: ServiceAccount
2+
apiVersion: v1
3+
metadata:
4+
name: olm-operator-serviceaccount
5+
namespace: openshift-operator-lifecycle-manager
6+
---
17
apiVersion: rbac.authorization.k8s.io/v1
28
kind: ClusterRole
39
metadata:
@@ -9,12 +15,6 @@ rules:
915
- nonResourceURLs: ["*"]
1016
verbs: ["*"]
1117
---
12-
kind: ServiceAccount
13-
apiVersion: v1
14-
metadata:
15-
name: olm-operator-serviceaccount
16-
namespace: openshift-operator-lifecycle-manager
17-
---
1818
apiVersion: rbac.authorization.k8s.io/v1
1919
kind: ClusterRoleBinding
2020
metadata:

manifests/0000_50_olm_02-services.yaml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
21
apiVersion: v1
32
kind: Service
43
metadata:
@@ -36,4 +35,3 @@ spec:
3635
targetPort: metrics
3736
selector:
3837
app: catalog-operator
39-

manifests/0000_50_olm_03-clusterserviceversion.crd.yaml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,6 @@ spec:
4242
scope: Namespaced
4343
preserveUnknownFields: false
4444
subresources:
45-
# status enables the status subresource.
4645
status: {}
4746
validation:
4847
openAPIV3Schema:
@@ -824,7 +823,6 @@ spec:
824823
description: 'Standard object''s metadata. More
825824
info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata'
826825
type: object
827-
# TODO: Autogen this...
828826
x-kubernetes-preserve-unknown-fields: true
829827
spec:
830828
description: 'Specification of the desired behavior

manifests/0000_50_olm_07-olm-operator.deployment.yaml

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,6 @@ spec:
6565
requests:
6666
cpu: 10m
6767
memory: 160Mi
68-
6968

7069
volumeMounts:
7170
- mountPath: /var/run/secrets/serving-cert
@@ -80,7 +79,6 @@ spec:
8079
nodeSelector:
8180
beta.kubernetes.io/os: linux
8281
node-role.kubernetes.io/master: ""
83-
8482
tolerations:
8583
- effect: NoSchedule
8684
key: node-role.kubernetes.io/master
@@ -93,4 +91,3 @@ spec:
9391
key: node.kubernetes.io/not-ready
9492
operator: Exists
9593
tolerationSeconds: 120
96-

manifests/0000_50_olm_08-catalog-operator.deployment.yaml

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,6 @@ spec:
5858
requests:
5959
cpu: 10m
6060
memory: 80Mi
61-
6261

6362
volumeMounts:
6463
- mountPath: /var/run/secrets/serving-cert
@@ -73,7 +72,6 @@ spec:
7372
nodeSelector:
7473
beta.kubernetes.io/os: linux
7574
node-role.kubernetes.io/master: ""
76-
7775
tolerations:
7876
- effect: NoSchedule
7977
key: node-role.kubernetes.io/master
@@ -86,4 +84,3 @@ spec:
8684
key: node.kubernetes.io/not-ready
8785
operator: Exists
8886
tolerationSeconds: 120
89-
Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,32 +1,32 @@
11
kind: ClusterRole
22
apiVersion: rbac.authorization.k8s.io/v1
33
metadata:
4-
name: aggregate-olm-edit
4+
name: aggregate-olm-view
55
labels:
6-
# Add these permissions to the "admin" and "edit" default roles.
6+
# Add these permissions to the "admin", "edit" and "view" default roles
77
rbac.authorization.k8s.io/aggregate-to-admin: "true"
88
rbac.authorization.k8s.io/aggregate-to-edit: "true"
9+
rbac.authorization.k8s.io/aggregate-to-view: "true"
910
rules:
1011
- apiGroups: ["operators.coreos.com"]
11-
resources: ["subscriptions"]
12-
verbs: ["create", "update", "patch", "delete"]
13-
- apiGroups: ["operators.coreos.com"]
14-
resources: ["clusterserviceversions", "catalogsources", "installplans", "subscriptions"]
15-
verbs: ["delete"]
12+
resources: ["clusterserviceversions", "catalogsources", "installplans", "subscriptions", "operatorgroups"]
13+
verbs: ["get", "list", "watch"]
14+
- apiGroups: ["packages.operators.coreos.com"]
15+
resources: ["packagemanifests", "packagemanifests/icon"]
16+
verbs: ["get", "list", "watch"]
1617
---
1718
kind: ClusterRole
1819
apiVersion: rbac.authorization.k8s.io/v1
1920
metadata:
20-
name: aggregate-olm-view
21+
name: aggregate-olm-edit
2122
labels:
22-
# Add these permissions to the "admin", "edit" and "view" default roles
23+
# Add these permissions to the "admin" and "edit" default roles.
2324
rbac.authorization.k8s.io/aggregate-to-admin: "true"
2425
rbac.authorization.k8s.io/aggregate-to-edit: "true"
25-
rbac.authorization.k8s.io/aggregate-to-view: "true"
2626
rules:
2727
- apiGroups: ["operators.coreos.com"]
28-
resources: ["clusterserviceversions", "catalogsources", "installplans", "subscriptions", "operatorgroups"]
29-
verbs: ["get", "list", "watch"]
30-
- apiGroups: ["packages.operators.coreos.com"]
31-
resources: ["packagemanifests", "packagemanifests/icon"]
32-
verbs: ["get", "list", "watch"]
28+
resources: ["subscriptions"]
29+
verbs: ["create", "update", "patch", "delete"]
30+
- apiGroups: ["operators.coreos.com"]
31+
resources: ["clusterserviceversions", "catalogsources", "installplans", "subscriptions"]
32+
verbs: ["delete"]

manifests/0000_50_olm_15-packageserver.clusterserviceversion.yaml

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,6 @@ spec:
8383
nodeSelector:
8484
beta.kubernetes.io/os: linux
8585
node-role.kubernetes.io/master: ""
86-
8786
tolerations:
8887
- effect: NoSchedule
8988
key: node-role.kubernetes.io/master
@@ -96,7 +95,6 @@ spec:
9695
key: node.kubernetes.io/not-ready
9796
operator: Exists
9897
tolerationSeconds: 120
99-
10098
containers:
10199
- name: packageserver
102100
command:
@@ -125,7 +123,6 @@ spec:
125123
requests:
126124
cpu: 10m
127125
memory: 50Mi
128-
129126
maturity: alpha
130127
version: 0.13.0
131128
apiservicedefinitions:

manifests/0000_50_olm_99-operatorstatus.yaml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,7 @@
1-
21
apiVersion: config.openshift.io/v1
32
kind: ClusterOperator
43
metadata:
5-
name: operator-lifecycle-manager
4+
name: operator-lifecycle-manager-catalog
65
status:
76
versions:
87
- name: operator
@@ -11,7 +10,7 @@ status:
1110
apiVersion: config.openshift.io/v1
1211
kind: ClusterOperator
1312
metadata:
14-
name: operator-lifecycle-manager-catalog
13+
name: operator-lifecycle-manager
1514
status:
1615
versions:
1716
- name: operator
Lines changed: 40 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,43 @@
1-
1+
apiVersion: rbac.authorization.k8s.io/v1
2+
kind: Role
3+
metadata:
4+
name: operator-lifecycle-manager-metrics
5+
namespace: openshift-operator-lifecycle-manager
6+
rules:
7+
- apiGroups:
8+
- ""
9+
resources:
10+
- services
11+
- endpoints
12+
- pods
13+
verbs:
14+
- get
15+
- list
16+
- watch
17+
---
18+
apiVersion: rbac.authorization.k8s.io/v1
19+
kind: RoleBinding
20+
metadata:
21+
name: operator-lifecycle-manager-metrics
22+
namespace: openshift-operator-lifecycle-manager
23+
roleRef:
24+
apiGroup: rbac.authorization.k8s.io
25+
kind: Role
26+
name: operator-lifecycle-manager-metrics
27+
subjects:
28+
- kind: ServiceAccount
29+
name: prometheus-k8s
30+
namespace: openshift-monitoring
31+
---
232
apiVersion: monitoring.coreos.com/v1
333
kind: ServiceMonitor
434
metadata:
5-
name: olm-operator
35+
name: catalog-operator
636
namespace: openshift-operator-lifecycle-manager
737
labels:
8-
app: olm-operator
38+
app: catalog-operator
939
spec:
40+
jobLabel: k8s-app
1041
endpoints:
1142
- bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token
1243
interval: 30s
@@ -19,24 +50,23 @@ spec:
1950
scheme: https
2051
tlsConfig:
2152
caFile: /etc/prometheus/configmaps/serving-certs-ca-bundle/service-ca.crt
22-
serverName: olm-operator-metrics.openshift-operator-lifecycle-manager.svc
53+
serverName: catalog-operator-metrics.openshift-operator-lifecycle-manager.svc
2354
jobLabel: component
2455
namespaceSelector:
2556
matchNames:
2657
- openshift-operator-lifecycle-manager
2758
selector:
2859
matchLabels:
29-
app: olm-operator
60+
app: catalog-operator
3061
---
3162
apiVersion: monitoring.coreos.com/v1
3263
kind: ServiceMonitor
3364
metadata:
34-
name: catalog-operator
65+
name: olm-operator
3566
namespace: openshift-operator-lifecycle-manager
3667
labels:
37-
app: catalog-operator
68+
app: olm-operator
3869
spec:
39-
jobLabel: k8s-app
4070
endpoints:
4171
- bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token
4272
interval: 30s
@@ -49,43 +79,11 @@ spec:
4979
scheme: https
5080
tlsConfig:
5181
caFile: /etc/prometheus/configmaps/serving-certs-ca-bundle/service-ca.crt
52-
serverName: catalog-operator-metrics.openshift-operator-lifecycle-manager.svc
82+
serverName: olm-operator-metrics.openshift-operator-lifecycle-manager.svc
5383
jobLabel: component
5484
namespaceSelector:
5585
matchNames:
5686
- openshift-operator-lifecycle-manager
5787
selector:
5888
matchLabels:
59-
app: catalog-operator
60-
---
61-
apiVersion: rbac.authorization.k8s.io/v1
62-
kind: RoleBinding
63-
metadata:
64-
name: operator-lifecycle-manager-metrics
65-
namespace: openshift-operator-lifecycle-manager
66-
roleRef:
67-
apiGroup: rbac.authorization.k8s.io
68-
kind: Role
69-
name: operator-lifecycle-manager-metrics
70-
subjects:
71-
- kind: ServiceAccount
72-
name: prometheus-k8s
73-
namespace: openshift-monitoring
74-
---
75-
apiVersion: rbac.authorization.k8s.io/v1
76-
kind: Role
77-
metadata:
78-
name: operator-lifecycle-manager-metrics
79-
namespace: openshift-operator-lifecycle-manager
80-
rules:
81-
- apiGroups:
82-
- ""
83-
resources:
84-
- services
85-
- endpoints
86-
- pods
87-
verbs:
88-
- get
89-
- list
90-
- watch
91-
89+
app: olm-operator

0 commit comments

Comments
 (0)