Merge pull request #438 from mythi/updates-20200901

.gitignore + kind + cert-manager v1.0.0
This commit is contained in:
Dmitry Rozhkov 2020-09-03 12:00:33 +03:00 committed by GitHub
commit 41e23dab3f
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
8 changed files with 15 additions and 15 deletions

3
.gitignore vendored
View File

@ -11,6 +11,9 @@ cmd/fpga_plugin/fpga_plugin
cmd/fpga_tool/fpga_tool cmd/fpga_tool/fpga_tool
cmd/gpu_plugin/gpu_plugin cmd/gpu_plugin/gpu_plugin
cmd/qat_plugin/qat_plugin cmd/qat_plugin/qat_plugin
cmd/sgx_plugin/sgx_plugin
cmd/sgx_epchook/sgx_epchook
cmd/vpu_plugin/vpu_plugin
cmd/operator/operator cmd/operator/operator
deployments/fpga_admissionwebhook/base/intel-fpga-webhook-certs-secret deployments/fpga_admissionwebhook/base/intel-fpga-webhook-certs-secret

View File

@ -44,8 +44,9 @@ test-with-kind:
@$(PODMAN) tag localhost/intel/intel-fpga-admissionwebhook:devel docker.io/intel/intel-fpga-admissionwebhook:devel @$(PODMAN) tag localhost/intel/intel-fpga-admissionwebhook:devel docker.io/intel/intel-fpga-admissionwebhook:devel
@mkdir -p $(e2e_tmp_dir) @mkdir -p $(e2e_tmp_dir)
@$(PODMAN) save "docker.io/intel/intel-fpga-admissionwebhook:devel" -o $(e2e_tmp_dir)/$(WEBHOOK_IMAGE_FILE) @$(PODMAN) save "docker.io/intel/intel-fpga-admissionwebhook:devel" -o $(e2e_tmp_dir)/$(WEBHOOK_IMAGE_FILE)
@$(KIND) create cluster --name "intel-device-plugins" --kubeconfig $(e2e_tmp_dir)/kubeconfig --image "kindest/node:v1.17.0" @$(KIND) create cluster --name "intel-device-plugins" --kubeconfig $(e2e_tmp_dir)/kubeconfig --image "kindest/node:v1.19.0"
@$(KIND) load image-archive --name "intel-device-plugins" $(e2e_tmp_dir)/$(WEBHOOK_IMAGE_FILE) @$(KIND) load image-archive --name "intel-device-plugins" $(e2e_tmp_dir)/$(WEBHOOK_IMAGE_FILE)
$(KUBECTL) --kubeconfig=$(e2e_tmp_dir)/kubeconfig apply -f https://github.com/jetstack/cert-manager/releases/download/v1.0.0/cert-manager.yaml
@$(GO) test -v ./test/e2e -args -kubeconfig $(e2e_tmp_dir)/kubeconfig -kubectl-path $(KUBECTL) -ginkgo.focus "Webhook" || rc=1; \ @$(GO) test -v ./test/e2e -args -kubeconfig $(e2e_tmp_dir)/kubeconfig -kubectl-path $(KUBECTL) -ginkgo.focus "Webhook" || rc=1; \
$(KIND) delete cluster --name "intel-device-plugins"; \ $(KIND) delete cluster --name "intel-device-plugins"; \
rm -rf $(e2e_tmp_dir); \ rm -rf $(e2e_tmp_dir); \

View File

@ -53,7 +53,7 @@ The webhook depends on having [cert-manager](https://cert-manager.io/)
installed: installed:
```bash ```bash
$ kubectl apply --validate=false -f https://github.com/jetstack/cert-manager/releases/download/v0.15.1/cert-manager.yaml $ kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.0.0/cert-manager.yaml
``` ```
Also if your cluster operates behind a corporate proxy make sure that the API Also if your cluster operates behind a corporate proxy make sure that the API

View File

@ -18,7 +18,7 @@ The operator depends on [cert-manager](https://cert-manager.io/) running in the
To install it run: To install it run:
``` ```
$ kubectl apply --validate=false -f https://github.com/jetstack/cert-manager/releases/download/v0.15.1/cert-manager.yaml $ kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.0.0/cert-manager.yaml
``` ```
Make sure all the pods in the `cert-manager` namespace are up and running: Make sure all the pods in the `cert-manager` namespace are up and running:

View File

@ -16,7 +16,7 @@ vars:
objref: objref:
kind: Certificate kind: Certificate
group: cert-manager.io group: cert-manager.io
version: v1alpha2 version: v1
name: serving-cert # this name should match the one in certificate.yaml name: serving-cert # this name should match the one in certificate.yaml
fieldref: fieldref:
fieldpath: metadata.namespace fieldpath: metadata.namespace
@ -24,7 +24,7 @@ vars:
objref: objref:
kind: Certificate kind: Certificate
group: cert-manager.io group: cert-manager.io
version: v1alpha2 version: v1
name: serving-cert # this name should match the one in certificate.yaml name: serving-cert # this name should match the one in certificate.yaml
- name: SERVICE_NAMESPACE # namespace of the service - name: SERVICE_NAMESPACE # namespace of the service
objref: objref:

View File

@ -1,8 +1,6 @@
# The following manifests contain a self-signed issuer CR and a certificate CR. # The following manifests contain a self-signed issuer CR and a certificate CR.
# More document can be found at https://docs.cert-manager.io # More document can be found at https://docs.cert-manager.io
# WARNING: Targets CertManager 0.15.1 check https://docs.cert-manager.io/en/latest/tasks/upgrading/index.html for apiVersion: cert-manager.io/v1
# breaking changes
apiVersion: cert-manager.io/v1alpha2
kind: Issuer kind: Issuer
metadata: metadata:
name: selfsigned-issuer name: selfsigned-issuer
@ -10,7 +8,7 @@ metadata:
spec: spec:
selfSigned: {} selfSigned: {}
--- ---
apiVersion: cert-manager.io/v1alpha2 apiVersion: cert-manager.io/v1
kind: Certificate kind: Certificate
metadata: metadata:
name: serving-cert # this name should match the one appeared in kustomizeconfig.yaml name: serving-cert # this name should match the one appeared in kustomizeconfig.yaml

View File

@ -1,8 +1,6 @@
# The following manifests contain a self-signed issuer CR and a certificate CR. # The following manifests contain a self-signed issuer CR and a certificate CR.
# More document can be found at https://docs.cert-manager.io # More document can be found at https://docs.cert-manager.io
# WARNING: Targets CertManager 0.11 check https://docs.cert-manager.io/en/latest/tasks/upgrading/index.html for apiVersion: cert-manager.io/v1
# breaking changes
apiVersion: cert-manager.io/v1alpha2
kind: Issuer kind: Issuer
metadata: metadata:
name: selfsigned-issuer name: selfsigned-issuer
@ -10,7 +8,7 @@ metadata:
spec: spec:
selfSigned: {} selfSigned: {}
--- ---
apiVersion: cert-manager.io/v1alpha2 apiVersion: cert-manager.io/v1
kind: Certificate kind: Certificate
metadata: metadata:
name: serving-cert # this name should match the one appeared in kustomizeconfig.yaml name: serving-cert # this name should match the one appeared in kustomizeconfig.yaml

View File

@ -34,7 +34,7 @@ vars:
objref: objref:
kind: Certificate kind: Certificate
group: cert-manager.io group: cert-manager.io
version: v1alpha2 version: v1
name: serving-cert # this name should match the one in certificate.yaml name: serving-cert # this name should match the one in certificate.yaml
fieldref: fieldref:
fieldpath: metadata.namespace fieldpath: metadata.namespace
@ -42,7 +42,7 @@ vars:
objref: objref:
kind: Certificate kind: Certificate
group: cert-manager.io group: cert-manager.io
version: v1alpha2 version: v1
name: serving-cert # this name should match the one in certificate.yaml name: serving-cert # this name should match the one in certificate.yaml
- name: SERVICE_NAMESPACE # namespace of the service - name: SERVICE_NAMESPACE # namespace of the service
objref: objref: