Skip to content

Commit

Permalink
manifest and workflow changes
Browse files Browse the repository at this point in the history
  • Loading branch information
YashwantGohokar committed Oct 4, 2023
1 parent 149c88a commit 83f4085
Show file tree
Hide file tree
Showing 287 changed files with 28,647 additions and 30 deletions.
4 changes: 2 additions & 2 deletions .github/workflows/release.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ jobs:
run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${GITHUB_ACTOR,,} --password-stdin

- name: Build Image
run: OSS_REGISTRY="ghcr.io/oracle" VERSION="${{ github.ref_name }}" make image
run: OSS_REGISTRY="ghcr.io/${GITHUB_ACTOR,,}" VERSION="${{ github.ref_name }}" make image

- name: Push Image
run: OSS_REGISTRY="ghcr.io/oracle" VERSION="${{ github.ref_name }}" make docker-push-all
run: OSS_REGISTRY="ghcr.io/${GITHUB_ACTOR,,}" VERSION="${{ github.ref_name }}" make docker-push-all
30 changes: 16 additions & 14 deletions hack/existing-standalone-cluster-env-template.sh
Original file line number Diff line number Diff line change
Expand Up @@ -14,41 +14,45 @@
##################################################################################################

# The test suites to run (can replace or add tags)
export FOCUS="\[cloudprovider\]"
export FOCUS="\[ccm\]"

#Architecture to run tests on
export ARCHITECTURE_AMD="AMD"
export ARCHITECTURE_ARM="ARM"

# Scope can be ARM / AMD / BOTH
# Mandatory
export SCOPE="BOTH"
export SCOPE="AMD"

# A Reserved IP in your compartment for testing LB creation with Reserved IP
# Create a public reserved IP in your compartment using the following link:
# https://docs.oracle.com/en-us/iaas/Content/Network/Tasks/managingpublicIPs.htm#console-reserved
# Set the public reserved IP in the following env-variable:
# Mandatory
export RESERVED_IP=""
export RESERVED_IP="169.155.149.109"

# Set path to kubeconfig of existing cluster if it does not exist in default path. Defaults to $HOME/.kube/config.
# Mandatory
export CLUSTER_KUBECONFIG=$HOME/.kube/config
export CLUSTER_KUBECONFIG=/Users/ypgohoka/.e2e_ccm_csi/oss-testing-1.kubeconfig

# Set path to cloud_config of existing cluster if it does not exist in default path. Defaults to $HOME/cloudconfig.
# Mandatory
export CLOUD_CONFIG=$HOME/cloudconfig
export CLOUD_CONFIG=/Users/ypgohoka/go/src/github.com/oracle/oci-cloud-controller-manager/hack/provider-config-example.yaml

# ADLOCATION example is IqDk:US-ASHBURN-AD-1
# Mandatory
export ADLOCATION=""
export ADLOCATION="Ddfp:US-ASHBURN-AD-2"

# KMS key for CMEK testing
# CMEK KEY example "ocid1.key.relm.region.bb..cc.aaa...aa"
# Mandatory
export CMEK_KMS_KEY=""
export CMEK_KMS_KEY="ocid1.key.oc1.iad.b5r7iu5xaagy2.abuwcljsizwczmdfnitnxaruykluz3p6kwprasd2l7ebfvbkxbytvuumg4cq"

# NSG Network security group created in cluster's VCN
# CCM E2E tests require two NSGs to run successfully. Please create two NSGs in the cluster's VCN and set NSG_OCIDS
# NSG_OCIDS example ocid1.networksecuritygroup.relm.region.aa...aa,ocid1.networksecuritygroup.relm.region.aa...aa
# Mandatory
export NSG_OCIDS=""
export NSG_OCIDS="ocid1.networksecuritygroup.oc1.iad.aaaaaaaadmbnpdgorxe26epwelmapmxmooiouq5p65jkpeut5tamrovfh2va,ocid1.networksecuritygroup.oc1.iad.aaaaaaaaietpqjjzct2aehnoyvqyc4g5zfcpe52givqgew3bzmubrgcqbuyq"

# FSS VOLUME HANDLE in the format filesystem_ocid:mountTargetIP:export_path
# Make sure fss volume handle is in the same subnet as your nodes
Expand All @@ -57,7 +61,7 @@ export NSG_OCIDS=""
# And setup your network for the file system by following:
# https://docs.oracle.com/en-us/iaas/Content/File/Tasks/securitylistsfilestorage.htm
# Mandatory
export FSS_VOLUME_HANDLE=""
export FSS_VOLUME_HANDLE="ocid1.filesystem.oc1.iad.aaaaaaaaaacdndlxnfqwillqojxwiotjmfsc2ylefuyqaaaa:10.0.73.199:/oss-test"

# For debugging the tests in existing cluster, do not turn it off by default.
# Optional
Expand All @@ -67,8 +71,6 @@ export FSS_VOLUME_HANDLE=""
# Optional
# export IMAGE_PULL_REPO="accessiblerepo.com/repo/path/"

export MNT_TARGET_ID=""
export MNT_TARGET_SUBNET_ID=""
export MNT_TARGET_COMPARTMENT_ID=""

export STATIC_SNAPSHOT_COMPARTMENT_ID=""
export MNT_TARGET_ID="ocid1.mounttarget.oc1.iad.aaaaacvippzjdfiynfqwillqojxwiotjmfsc2ylefuyqaaaa"
export MNT_TARGET_SUBNET_ID="ocid1.subnet.oc1.iad.aaaaaaaafujcpvwdn3s2liqwrilolm7jmxkwq35zieo7zk4medjtqxjac7cq"
export MNT_TARGET_COMPARTMENT_ID="ocid1.compartment.oc1..aaaaaaaaee2fxlf36idmiqlyvnyhkh2oquz5loogbmzat73hnnqhu2c3352a"
3 changes: 0 additions & 3 deletions hack/run_e2e_test.sh
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,6 @@ check-env "FSS_VOLUME_HANDLE" $FSS_VOLUME_HANDLE
check-env "MNT_TARGET_ID" $MNT_TARGET_ID
check-env "MNT_TARGET_SUBNET_ID" $MNT_TARGET_SUBNET_ID
check-env "MNT_TARGET_COMPARTMENT_ID" $MNT_TARGET_COMPARTMENT_ID
check-env "CLUSTER_TYPE" $CLUSTER_TYPE

function set_image_pull_repo_and_delete_namespace_flag () {
if [ -z "$IMAGE_PULL_REPO" ]; then
Expand All @@ -56,7 +55,6 @@ function run_e2e_tests_existing_cluster() {
--architecture=${ARCHITECTURE} \
--volume-handle=${FSS_VOLUME_HANDLE} \
--static-snapshot-compartment-id=${STATIC_SNAPSHOT_COMPARTMENT_ID}
--cluster-type=${CLUSTER_TYPE}
retval=$?
return $retval
}
Expand Down Expand Up @@ -97,7 +95,6 @@ echo "CLOUD_CONFIG is ${CLOUD_CONFIG}"
echo "MNT_TARGET_ID is ${MNT_TARGET_ID}"
echo "MNT_TARGET_SUBNET_ID is ${MNT_TARGET_SUBNET_ID}"
echo "MNT_TARGET_COMPARTMENT_ID is ${MNT_TARGET_COMPARTMENT_ID}"
echo "CLUSTER_TYPE is ${CLUSTER_TYPE}"

function run_tests () {
set_image_pull_repo_and_delete_namespace_flag
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,7 @@ rules:
- list
- watch
- patch
- get

- apiGroups:
- ""
Expand Down Expand Up @@ -130,6 +131,9 @@ rules:
- serviceaccounts
verbs:
- create
- list
- get
- watch
- apiGroups:
- ""
resources:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ spec:
path: /etc/kubernetes
containers:
- name: oci-cloud-controller-manager
image: ghcr.io/oracle/cloud-provider-oci:latest
image: ghcr.io/yashwantgohokar/cloud-provider-oci:v1.26.1
command: ["/usr/local/bin/oci-cloud-controller-manager"]
args:
- --cloud-config=/etc/oci/cloud-provider.yaml
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ spec:
- mountPath: /var/run/shared-tmpfs
name: shared-tmpfs
- name: csi-attacher
image: k8s.gcr.io/sig-storage/csi-attacher:v4.2.0
image: registry.k8s.io/sig-storage/csi-attacher:v4.2.0
args:
- --csi-address=/var/run/shared-tmpfs/csi.sock
- --timeout=120s
Expand All @@ -65,7 +65,7 @@ spec:
- mountPath: /var/run/shared-tmpfs
name: shared-tmpfs
- name: csi-resizer
image: k8s.gcr.io/sig-storage/csi-resizer:v1.7.0
image: registry.k8s.io/sig-storage/csi-resizer:v1.7.0
args:
- --csi-address=/var/run/shared-tmpfs/csi.sock
- --leader-election
Expand Down Expand Up @@ -96,7 +96,7 @@ spec:
- --fss-csi-endpoint=unix://var/run/shared-tmpfs/csi-fss.sock
command:
- /usr/local/bin/oci-csi-controller-driver
image: ghcr.io/oracle/cloud-provider-oci:latest
image: ghcr.io/yashwantgohokar/cloud-provider-oci:v1.26.1
imagePullPolicy: IfNotPresent
volumeMounts:
- name: config
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -117,7 +117,7 @@ spec:
fieldPath: spec.nodeName
- name: PATH
value: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/host/usr/bin:/host/sbin
image: ghcr.io/oracle/cloud-provider-oci:latest
image: ghcr.io/yashwantgohokar/cloud-provider-oci:v1.26.1
securityContext:
privileged: true
volumeMounts:
Expand Down Expand Up @@ -151,7 +151,7 @@ spec:
args:
- --csi-address=/csi/csi.sock
- --kubelet-registration-path=/var/lib/kubelet/plugins/blockvolume.csi.oraclecloud.com/csi.sock
image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.5.1
image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.5.1
securityContext:
privileged: true
lifecycle:
Expand All @@ -170,7 +170,7 @@ spec:
args:
- --csi-address=/fss/csi.sock
- --kubelet-registration-path=/var/lib/kubelet/plugins/fss.csi.oraclecloud.com/csi.sock
image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.5.0
image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.5.0
securityContext:
privileged: true
lifecycle:
Expand Down
4 changes: 2 additions & 2 deletions manifests/flexvolume-driver/oci-flexvolume-driver.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ spec:
secretName: oci-flexvolume-driver
containers:
- name: oci-flexvolume-driver
image: ghcr.io/oracle/cloud-provider-oci:latest
image: ghcr.io/yashwantgohokar/cloud-provider-oci:v1.26.1
command: ["/usr/local/bin/install.py", "-c", "/tmp/config.yaml"]
securityContext:
privileged: true
Expand Down Expand Up @@ -76,7 +76,7 @@ spec:
type: DirectoryOrCreate
containers:
- name: oci-flexvolume-driver
image: ghcr.io/oracle/cloud-provider-oci:latest
image: ghcr.io/yashwantgohokar/cloud-provider-oci:v1.26.1
command: ["/usr/local/bin/install.py"]
securityContext:
privileged: true
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ spec:
secretName: oci-volume-provisioner
containers:
- name: oci-volume-provisioner
image: ghcr.io/oracle/cloud-provider-oci:latest
image: ghcr.io/yashwantgohokar/cloud-provider-oci:v1.26.1
command: ["/usr/local/bin/oci-volume-provisioner"]
env:
- name: NODE_NAME
Expand Down
2 changes: 1 addition & 1 deletion manifests/volume-provisioner/oci-volume-provisioner.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ spec:
secretName: oci-volume-provisioner
containers:
- name: oci-volume-provisioner
image: ghcr.io/oracle/cloud-provider-oci:latest
image: ghcr.io/yashwantgohokar/cloud-provider-oci:v1.26.1
command: ["/usr/local/bin/oci-volume-provisioner"]
env:
- name: NODE_NAME
Expand Down

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading

0 comments on commit 83f4085

Please sign in to comment.