@@ -393,22 +393,22 @@ function kctf_cluster_ip_ranges {
393
393
set_cloud_armor_policy " ${RANGES} " || return
394
394
395
395
# stop the operator
396
- " ${KCTF_BIN} /yq" eval " select(.kind == \" Deployment\" )" " ${KCTF_CTF_DIR} /kctf/resources/operator .yaml" \
396
+ " ${KCTF_BIN} /yq" eval " select(.kind == \" Deployment\" )" " ${KCTF_CTF_DIR} /kctf/resources/install .yaml" \
397
397
| " ${KCTF_BIN} /kubectl" delete -f - || return
398
398
399
399
start_operator_gce || return
400
400
}
401
401
402
402
function start_operator_gce {
403
403
if [[ " ${DISABLE_SRC_RANGES} " == " 1" ]]; then
404
- " ${KCTF_BIN} /kubectl" apply -f " ${KCTF_CTF_DIR} /kctf/resources/operator .yaml" || return
404
+ " ${KCTF_BIN} /kubectl" apply --server-side - f " ${KCTF_CTF_DIR} /kctf/resources/install .yaml" || return
405
405
else
406
406
get_cloud_armor_policy || return
407
407
RANGES=$ret
408
408
SUFFIX=$( echo " ${PROJECT} -${CLUSTER_NAME} -${ZONE} " | sha1sum)
409
409
POLICY_NAME=" kctf-policy-${SUFFIX: 0: 16} "
410
410
# restart the operator with the new range
411
- " ${KCTF_BIN} /yq" eval " (select(.kind == \" Deployment\" ).spec.template.spec.containers[] | select(.name == \" manager\" ).env[] | select(.name == \" ALLOWED_IPS\" ).value) |= \" ${RANGES} \" " " ${KCTF_CTF_DIR} /kctf/resources/operator .yaml" \
411
+ " ${KCTF_BIN} /yq" eval " (select(.kind == \" Deployment\" ).spec.template.spec.containers[] | select(.name == \" manager\" ).env[] | select(.name == \" ALLOWED_IPS\" ).value) |= \" ${RANGES} \" " " ${KCTF_CTF_DIR} /kctf/resources/install .yaml" \
412
412
| " ${KCTF_BIN} /yq" eval " (select(.kind == \" Deployment\" ).spec.template.spec.containers[] | select(.name == \" manager\" ).env[] | select(.name == \" SECURITY_POLICY\" ).value) |= \" ${POLICY_NAME} \" " - \
413
413
| " ${KCTF_BIN} /kubectl" apply -f - || return
414
414
fi
@@ -441,17 +441,13 @@ function create_cloud_armor_policy {
441
441
}
442
442
443
443
function create_operator {
444
- # Creating CRD, rbac and operator
445
- " ${KCTF_BIN} /kubectl" apply -f " ${KCTF_CTF_DIR} /kctf/resources/kctf.dev_challenges.yaml" || return
446
- " ${KCTF_BIN} /kubectl" apply -f " ${KCTF_CTF_DIR} /kctf/resources/kctf-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml" || return
447
- " ${KCTF_BIN} /kubectl" apply -f " ${KCTF_CTF_DIR} /kctf/resources/kctf-operator-manager-config_v1_configmap.yaml" || return
448
- " ${KCTF_BIN} /kubectl" apply -f " ${KCTF_CTF_DIR} /kctf/resources/kctf-operator-controller-manager-metrics-service_v1_service.yaml" || return
444
+ # install.yaml is an unified file for creating CRD, rbac and operator
449
445
if [[ " $CLUSTER_TYPE " == " gce" ]]; then
450
446
start_operator_gce || return
451
447
else
452
- " ${KCTF_BIN} /kubectl" apply -f " ${KCTF_CTF_DIR} /kctf/resources/operator .yaml" || return
448
+ " ${KCTF_BIN} /kubectl" apply --server-side - f " ${KCTF_CTF_DIR} /kctf/resources/install .yaml" || return
453
449
fi
454
- OPERATOR_IMAGE=$( " ${KCTF_BIN} /yq" eval ' .spec.template.spec.containers[].image | select(.=="*kctf-operator*")' " ${KCTF_CTF_DIR} /kctf/resources/operator .yaml" )
450
+ OPERATOR_IMAGE=$( " ${KCTF_BIN} /yq" eval ' .spec.template.spec.containers[].image | select(.=="*kctf-operator*")' " ${KCTF_CTF_DIR} /kctf/resources/install .yaml" )
455
451
if [[ $? -ne 0 ]]; then
456
452
echo " Failed to find the operator image." >&2
457
453
return 1
0 commit comments