You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: website/content/en/docs/upgrading-sdk-version/v1.6.0.md
+43-13Lines changed: 43 additions & 13 deletions
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ To add this option your project you will need to:
15
15
- manager_config_patch.yaml
16
16
```
17
17
- Update the `config/manager/kustomization.yaml` by adding:
18
-
```yaml
18
+
```yaml
19
19
generatorOptions:
20
20
disableNameSuffixHash: true
21
21
@@ -29,14 +29,15 @@ To add this option your project you will need to:
29
29
- name: controller
30
30
newName: quay.io/example/memcached-operator
31
31
newTag: v0.0.1
32
-
```
32
+
```
33
33
34
34
_See [#4701](https://github.com/operator-framework/operator-sdk/pull/4701) for more details._
35
35
36
36
## (ansible/v1, helm/v1) Add Role rules for leader election.
37
37
38
38
Add the rule for the `apiGroups` `coordination.k8s.io` and the resource `leases` in config/rbac/leader_election_role.yaml:
39
-
```yaml rules:
39
+
```yaml
40
+
rules:
40
41
- apiGroups:
41
42
- ""
42
43
- coordination.k8s.io
@@ -100,7 +101,8 @@ _See [#4660](https://github.com/operator-framework/operator-sdk/pull/4660) for m
100
101
## (ansible/v1, helm/v1) Add `securityContext`'s to your manager's Deployment.
101
102
102
103
In `config/manager/manager.yaml`, add the following security contexts:
103
-
```yaml spec:
104
+
```yaml
105
+
spec:
104
106
...
105
107
template:
106
108
...
@@ -119,7 +121,7 @@ _See [#4655](https://github.com/operator-framework/operator-sdk/pull/4655) for m
119
121
120
122
OLM does [not yet support cert-manager](https://olm.operatorframework.io/docs/advanced-tasks/adding-admission-and-conversion-webhooks/#certificate-authority-requirements), so a JSON patch was added to remove this volume and mount such that OLM can itself create and manage certs for your Operator.
121
123
In `config/manifests/kustomization.yaml`, add the following:
122
-
```yaml
124
+
```yaml
123
125
patchesJson6902:
124
126
- target:
125
127
group: apps
@@ -202,17 +204,36 @@ _See [#4406](https://github.com/operator-framework/operator-sdk/pull/4406) for m
The following Makefile changes were made to allow `make bundle-build bundle-push catalog-build catalog-push` and encode image repo/namespace information in the Makefile by default:
For example, if `IMAGE_TAG_BASE ?= foo/bar-operator` then running `make bundle-build bundle-push catalog-build catalog-push` would build `foo/bar-operator-bundle:v0.0.1` and `foo/bar-operator-catalog:v0.0.1` then push them to the `docker.io/foo` namespaced registry.
207
214
208
215
_See [#4406](https://github.com/operator-framework/operator-sdk/pull/4406) for more details._
209
216
210
-
## (ansible/v1, helm/v1) Add a `system:controller-manager` ServiceAccount to your project.
217
+
## (ansible/v1, helm/v1) Add the `controller-manager` ServiceAccount to your project.
211
218
212
-
A non-default ServiceAccount `controller-manager` is scaffolded on `operator-sdk init`, to improve security for operators installed in shared namespaces. To add this ServiceAccount to your project, do the following: ```sh # Create the ServiceAccount. cat <<EOF > config/rbac/service_account.yaml apiVersion: v1 kind: ServiceAccount metadata:
219
+
A non-default ServiceAccount `controller-manager` is scaffolded on `operator-sdk init`, to improve security for operators installed in shared namespaces. To add this ServiceAccount to your project, do the following: ```sh
EOF # Add it to the list of RBAC resources. echo "- service_account.yaml" >> config/rbac/kustomization.yaml # Update all RoleBinding and ClusterRoleBinding subjects that reference the operator's ServiceAccount. find config/rbac -name *_binding.yaml -exec sed -i -E 's/ name: default/ name: controller-manager/g' {} \; # Add the ServiceAccount name to the manager Deployment's spec.template.spec.serviceAccountName. sed -i -E 's/([ ]+)(terminationGracePeriodSeconds:)/\1serviceAccountName: controller-manager\n\1\2/g' config/manager/manager.yaml ```The changes should look like: ```diff # config/manager/manager.yaml
0 commit comments