forked from redhat-developer/observability-operator
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Makefile
224 lines (190 loc) · 8.45 KB
/
Makefile
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
# Current Operator version
VERSION ?= 4.0.4
# Previous Operator version
PREV_VERSION ?= 3.0.16
# Options for 'bundle-build'
ifneq ($(origin CHANNELS), undefined)
BUNDLE_CHANNELS := --channels=$(CHANNELS)
endif
ifneq ($(origin DEFAULT_CHANNEL), undefined)
BUNDLE_DEFAULT_CHANNEL := --default-channel=$(DEFAULT_CHANNEL)
endif
BUNDLE_METADATA_OPTS ?= $(BUNDLE_CHANNELS) $(BUNDLE_DEFAULT_CHANNEL)
# Default image registry
REG ?= rhoas
# Image URL to use all building/pushing image targets
IMG ?= quay.io/$(REG)/observability-operator:v$(VERSION)
# Default bundle image tag
export BUNDLE_IMG ?= quay.io/$(REG)/observability-operator-bundle:v$(VERSION)
# Default index image tag
export INDEX_IMG ?= quay.io/$(REG)/observability-operator-index:v$(VERSION)
# Produce CRDs that work back to Kubernetes 1.11 (no version conversion)
CRD_OPTIONS ?= "crd:crdVersions=v1"
# Get the currently used golang install path (in GOPATH/bin, unless GOBIN is set)
ifeq (,$(shell go env GOBIN))
GOBIN=$(shell go env GOPATH)/bin
else
GOBIN=$(shell go env GOBIN)
endif
all: manager
# Run tests
ENVTEST_ASSETS_DIR = $(shell pwd)/testbin
test: generate fmt vet manifests
mkdir -p $(ENVTEST_ASSETS_DIR)
test -f $(ENVTEST_ASSETS_DIR)/setup-envtest.sh || curl -sSLo $(ENVTEST_ASSETS_DIR)/setup-envtest.sh https://raw.githubusercontent.com/kubernetes-sigs/controller-runtime/v0.6.3/hack/setup-envtest.sh
source $(ENVTEST_ASSETS_DIR)/setup-envtest.sh; fetch_envtest_tools $(ENVTEST_ASSETS_DIR); setup_envtest_env $(ENVTEST_ASSETS_DIR); go test ./... -coverprofile cover.out
pkgs = $(shell go list ./...)
# Run unit tests
# Individual packages can be specified for testing by using the PKG argument
# For example make test/unit PKG=api/v1
.PHONY: test/unit
test/unit: generate fmt vet manifests
@if [ $(PKG) ]; then go test -coverprofile cover.out.tmp -tags unit ./$(PKG); else go test -coverprofile cover.out.tmp -tags unit $(pkgs); fi;
grep -v -e "zz_generated" \
-e "priorityclass_resources.go" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/reconcilers/configuration/alertmanager.go" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/reconcilers/configuration/grafana.go" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/reconcilers/configuration/promtail.go" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/reconcilers/configuration/prometheus.go" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/reconcilers/token/token_reconciler.go" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/reconcilers/alertmanager_installation/" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/reconcilers/csv/" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/reconcilers/grafana_configuration/" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/reconcilers/grafana_installation/" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/reconcilers/prometheus_configuration/" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/reconcilers/promtail_installation/" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/token/token_fetcher.go" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/reconcilers/reconciler.go" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/observability_controller.go" \
-e "github.com/redhat-developer/observability-operator/v4/controllers/suite_test.go" \
-e "github.com/redhat-developer/observability-operator/v4/runners" \
-e "github.com/redhat-developer/observability-operator/v4/main.go" \
cover.out.tmp > cover.out
rm cover.out.tmp
# Check coverage of unit tests and display by HTML
.PHONY: test/coverage/html
test/coverage/html:
@if [ -f cover.out ]; then go tool cover -html=cover.out; else echo "cover.out file not found"; fi;
#Check coverage of unit tests and display by standard output
.PHONY: test/coverage/output
test/coverage/output:
@if [ -f cover.out ]; then go tool cover -func=cover.out; else echo "cover.out file not found"; fi;
# Build manager binary
manager: generate fmt vet
go build -o bin/manager main.go
# Run against the configured Kubernetes cluster in ~/.kube/config
run: generate fmt vet manifests
go run ./main.go
# Install CRDs into a cluster
install: manifests kustomize
$(KUSTOMIZE) build config/crd | kubectl apply -f -
# Uninstall CRDs from a cluster
uninstall: manifests kustomize
$(KUSTOMIZE) build config/crd | kubectl delete -f -
# Deploy controller in the configured Kubernetes cluster in ~/.kube/config
deploy: manifests kustomize
cd config/manager && $(KUSTOMIZE) edit set image controller=${IMG}
$(KUSTOMIZE) build config/default | kubectl apply -f -
# Generate manifests e.g. CRD, RBAC etc.
manifests: controller-gen
$(CONTROLLER_GEN) $(CRD_OPTIONS) rbac:roleName=manager-role webhook paths="./..." output:crd:artifacts:config=config/crd/bases
# Run go fmt against code
fmt:
go fmt ./...
# Run go vet against code
vet:
go vet ./...
# Generate code
generate: controller-gen
$(CONTROLLER_GEN) object:headerFile="hack/boilerplate.go.txt" paths="./..."
# find or download controller-gen
# download controller-gen if necessary
controller-gen:
ifeq (, $(shell which controller-gen))
@{ \
set -e ;\
CONTROLLER_GEN_TMP_DIR=$$(mktemp -d) ;\
cd $$CONTROLLER_GEN_TMP_DIR ;\
go mod init tmp ;\
go install sigs.k8s.io/controller-tools/cmd/[email protected] ;\
rm -rf $$CONTROLLER_GEN_TMP_DIR ;\
}
CONTROLLER_GEN=$(GOBIN)/controller-gen
else
CONTROLLER_GEN=$(shell which controller-gen)
endif
kustomize:
ifeq (, $(shell which kustomize))
@{ \
set -e ;\
KUSTOMIZE_GEN_TMP_DIR=$$(mktemp -d) ;\
cd $$KUSTOMIZE_GEN_TMP_DIR ;\
go mod init tmp ;\
go install sigs.k8s.io/kustomize/kustomize/[email protected] ;\
rm -rf $$KUSTOMIZE_GEN_TMP_DIR ;\
}
KUSTOMIZE=$(GOBIN)/kustomize
else
KUSTOMIZE=$(shell which kustomize)
endif
# Generate bundle manifests and metadata, then validate generated files.
.PHONY: bundle
bundle: manifests
operator-sdk generate kustomize manifests -q
cd config/manager && $(KUSTOMIZE) edit set image controller=$(IMG)
$(KUSTOMIZE) build config/manifests | operator-sdk generate bundle -q --overwrite --version $(VERSION) $(BUNDLE_METADATA_OPTS)
operator-sdk bundle validate ./bundle
# Build the docker image
.PHONY: docker-build
docker-build:
docker build . -t ${IMG}
# Login to the registry
.PHONY: docker-login
docker-login:
echo "$(QUAY_TOKEN)" | docker --config="${DOCKER_CONFIG}" login -u "${QUAY_USER}" quay.io --password-stdin
# Push the docker image
.PHONY: docker-push
docker-push:
docker push ${IMG}
# Build the bundle image.
.PHONY: bundle-build
bundle-build:
docker build -f bundle.Dockerfile -t $(BUNDLE_IMG) .
.PHONY: bundle-push
bundle-push:
docker push $(BUNDLE_IMG)
# Update index.db in build_deploy script
.PHONY: index-add
index-add:
$(OPM) index add --build-tool=docker --bundles $(BUNDLE_IMG) --tag ${INDEX_IMG} -f quay.io/${REG}/observability-operator-index:v${PREV_VERSION} --generate
.PHONY: index-build
index-build:
docker build -t $(INDEX_IMG) -f index.Dockerfile .
.PHONY: index-push
index-push:
docker push $(INDEX_IMG)
# deploy required secrets to cluster
NAMESPACE ?= "$(shell oc project | sed -e 's/Using project \"\([^"]*\)\".*/\1/g')"
OBSERVATORIUM_TENANT ?= "managedKafka"
OBSERVATORIUM_GATEWAY ?= "https://observatorium-mst.api.stage.openshift.com"
OBSERVATORIUM_AUTH_TYPE ?= "redhat"
OBSERVATORIUM_RHSSO_URL ?= "https://sso.redhat.com/auth/"
OBSERVATORIUM_RHSSO_REALM ?= "redhat-external"
.PHONY: deploy/secrets
deploy/secrets:
@oc process -f ./templates/secrets-template.yml \
-p OBSERVATORIUM_TENANT="${OBSERVATORIUM_TENANT}" \
-p OBSERVATORIUM_GATEWAY="${OBSERVATORIUM_GATEWAY}" \
-p OBSERVATORIUM_AUTH_TYPE="${OBSERVATORIUM_AUTH_TYPE}" \
-p OBSERVATORIUM_RHSSO_URL="${OBSERVATORIUM_RHSSO_URL}" \
-p OBSERVATORIUM_RHSSO_REALM="${OBSERVATORIUM_RHSSO_REALM}" \
-p OBSERVATORIUM_RHSSO_METRICS_CLIENT_ID="${OBSERVATORIUM_RHSSO_METRICS_CLIENT_ID}" \
-p OBSERVATORIUM_RHSSO_METRICS_SECRET="${OBSERVATORIUM_RHSSO_METRICS_SECRET}" \
-p OBSERVATORIUM_RHSSO_LOGS_CLIENT_ID="${OBSERVATORIUM_RHSSO_LOGS_CLIENT_ID}" \
-p OBSERVATORIUM_RHSSO_LOGS_SECRET="${OBSERVATORIUM_RHSSO_LOGS_SECRET}" \
-p GITHUB_ACCESS_TOKEN="${GITHUB_ACCESS_TOKEN}" \
| oc apply -f - -n $(NAMESPACE)
# deploy grafana-datasource secret required for CRC cluster
.PHONY: deploy/crc/secret
deploy/crc/secret:
@oc process -f ./templates/crc-secret-template.yml | oc apply -f - -n openshift-monitoring