mirror of
https://github.com/intel/intel-device-plugins-for-kubernetes.git
synced 2025-06-03 03:59:37 +00:00

Since the webhook can operate in two modes, either `preprogrammed` or `orchestrated`, extend the deploying script to support these modes.
52 lines
1.4 KiB
Bash
Executable File
52 lines
1.4 KiB
Bash
Executable File
#!/bin/bash -e
|
|
|
|
# Check we've got all dependencies installed
|
|
which cfssl > /dev/null
|
|
which jq > /dev/null
|
|
|
|
srcroot="$(realpath $(dirname $0)/..)"
|
|
|
|
while [[ $# -gt 0 ]]; do
|
|
case ${1} in
|
|
--kubectl)
|
|
kubectl="$2"
|
|
shift
|
|
;;
|
|
--ca-bundle-path)
|
|
cabundlepath="$2"
|
|
shift
|
|
;;
|
|
--mode)
|
|
mode="$2"
|
|
shift
|
|
;;
|
|
esac
|
|
shift
|
|
done
|
|
|
|
[ -z ${kubectl} ] && kubectl="kubectl"
|
|
[ -z ${mode} ] && mode="preprogrammed"
|
|
|
|
if [ "x${mode}" != "xpreprogrammed" -a "x${mode}" != "xorchestrated" ]; then
|
|
echo "ERROR: supported modes are 'preprogrammed' and 'orchestrated'"
|
|
exit 1
|
|
fi
|
|
|
|
if [ -z ${cabundlepath} ]; then
|
|
CA_BUNDLE=$(${kubectl} get configmap -n kube-system extension-apiserver-authentication -o=jsonpath='{.data.client-ca-file}' | base64 -w 0)
|
|
else
|
|
CA_BUNDLE=$(cat ${cabundlepath} | base64 -w 0)
|
|
fi
|
|
|
|
echo "Create secret including signed key/cert pair for the webhook"
|
|
${srcroot}/scripts/webhook-create-signed-cert.sh --kubectl ${kubectl}
|
|
|
|
echo "Create webhook deployment"
|
|
cat ${srcroot}/deployments/fpga_admissionwebhook/deployment-tpl.yaml | sed -e "s/{MODE}/${mode}/g" | ${kubectl} create -f -
|
|
|
|
echo "Create webhook service"
|
|
kubectl create -f ${srcroot}/deployments/fpga_admissionwebhook/service.yaml
|
|
|
|
echo "Register webhook"
|
|
cat ${srcroot}/deployments/fpga_admissionwebhook/mutating-webhook-configuration-tpl.yaml | sed -e "s/{CA_BUNDLE}/${CA_BUNDLE}/g" | ${kubectl} create -f -
|