Skip to content

Commit

Permalink
add instance label to jupyter-web-app, selector to Application (kubef…
Browse files Browse the repository at this point in the history
  • Loading branch information
Kam Kasravi authored and k8s-ci-robot committed Oct 8, 2019
1 parent b312d0a commit 17a40e5
Show file tree
Hide file tree
Showing 41 changed files with 208 additions and 108 deletions.
8 changes: 5 additions & 3 deletions jupyter/jupyter-web-app/overlays/application/application.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,11 +6,11 @@ spec:
selector:
matchLabels:
app.kubernetes.io/name: jupyter-web-app
app.kubernetes.io/instance: jupyter-web-app
app.kubernetes.io/instance: jupyter-web-app-v0.6.2
app.kubernetes.io/managed-by: kfctl
app.kubernetes.io/component: jupyter
app.kubernetes.io/component: jupyter-web-app
app.kubernetes.io/part-of: kubeflow
app.kubernetes.io/version: v0.6
app.kubernetes.io/version: v0.6.2
componentKinds:
- group: core
kind: ConfigMap
Expand All @@ -22,6 +22,8 @@ spec:
kind: Role
- group: core
kind: ServiceAccount
- group: core
kind: Service
- group: networking.istio.io
kind: VirtualService
descriptor:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,8 @@ resources:
- application.yaml
commonLabels:
app.kubernetes.io/name: jupyter-web-app
app.kubernetes.io/instance: jupyter-web-app
app.kubernetes.io/instance: jupyter-web-app-v0.6.2
app.kubernetes.io/managed-by: kfctl
app.kubernetes.io/component: jupyter
app.kubernetes.io/component: jupyter-web-app
app.kubernetes.io/part-of: kubeflow
app.kubernetes.io/version: v0.6
app.kubernetes.io/version: v0.6.2
12 changes: 8 additions & 4 deletions tests/aws-alb-ingress-controller-base_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,8 @@ roleRef:
name: alb-ingress-controller
subjects:
- kind: ServiceAccount
name: alb-ingress-controller`)
name: alb-ingress-controller
`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/base/deployment.yaml", `
# Application Load Balancer (ALB) Ingress Controller Deployment Manifest.
# This manifest details sensible defaults for deploying an ALB Ingress Controller.
Expand Down Expand Up @@ -115,14 +116,17 @@ spec:
# Repository location of the ALB Ingress Controller.
image: docker.io/amazon/aws-alb-ingress-controller:v1.1.2
imagePullPolicy: Always
serviceAccountName: alb-ingress-controller`)
serviceAccountName: alb-ingress-controller
`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/base/service-account.yaml", `
apiVersion: v1
kind: ServiceAccount
metadata:
name: alb-ingress-controller`)
name: alb-ingress-controller
`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/base/params.env", `
clusterName=`)
clusterName=
`)
th.writeK("/manifests/aws/aws-alb-ingress-controller/base", `
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
Expand Down
15 changes: 10 additions & 5 deletions tests/aws-alb-ingress-controller-overlays-vpc_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,8 @@ spec:
`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/overlays/vpc/params.env", `
vpcId=
region=us-west-2`)
region=us-west-2
`)
th.writeK("/manifests/aws/aws-alb-ingress-controller/overlays/vpc", `
bases:
- ../../base
Expand Down Expand Up @@ -119,7 +120,8 @@ roleRef:
name: alb-ingress-controller
subjects:
- kind: ServiceAccount
name: alb-ingress-controller`)
name: alb-ingress-controller
`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/base/deployment.yaml", `
# Application Load Balancer (ALB) Ingress Controller Deployment Manifest.
# This manifest details sensible defaults for deploying an ALB Ingress Controller.
Expand Down Expand Up @@ -171,14 +173,17 @@ spec:
# Repository location of the ALB Ingress Controller.
image: docker.io/amazon/aws-alb-ingress-controller:v1.1.2
imagePullPolicy: Always
serviceAccountName: alb-ingress-controller`)
serviceAccountName: alb-ingress-controller
`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/base/service-account.yaml", `
apiVersion: v1
kind: ServiceAccount
metadata:
name: alb-ingress-controller`)
name: alb-ingress-controller
`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/base/params.env", `
clusterName=`)
clusterName=
`)
th.writeK("/manifests/aws/aws-alb-ingress-controller/base", `
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
Expand Down
21 changes: 14 additions & 7 deletions tests/aws-efs-csi-driver-base_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -79,7 +79,8 @@ rules:
verbs: ["get", "list", "watch"]
- apiGroups: ["storage.k8s.io"]
resources: ["volumeattachments"]
verbs: ["get", "list", "watch", "update"]`)
verbs: ["get", "list", "watch", "update"]
`)
th.writeF("/manifests/aws/aws-efs-csi-driver/base/csi-attacher-cluster-role-binding.yaml", `
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -92,12 +93,14 @@ subjects:
roleRef:
kind: ClusterRole
name: efs-csi-external-attacher-clusterrole
apiGroup: rbac.authorization.k8s.io`)
apiGroup: rbac.authorization.k8s.io
`)
th.writeF("/manifests/aws/aws-efs-csi-driver/base/csi-controller-sa.yaml", `
apiVersion: v1
kind: ServiceAccount
metadata:
name: efs-csi-controller-sa`)
name: efs-csi-controller-sa
`)
th.writeF("/manifests/aws/aws-efs-csi-driver/base/csi-node-cluster-role.yaml", `
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -121,7 +124,8 @@ rules:
verbs: ["get", "list", "watch", "update"]
- apiGroups: ["csi.storage.k8s.io"]
resources: ["csinodeinfos"]
verbs: ["get", "list", "watch", "update"]`)
verbs: ["get", "list", "watch", "update"]
`)
th.writeF("/manifests/aws/aws-efs-csi-driver/base/csi-node-cluster-role-binding.yaml", `
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -134,7 +138,8 @@ subjects:
roleRef:
kind: ClusterRole
name: efs-csi-node-clusterrole
apiGroup: rbac.authorization.k8s.io`)
apiGroup: rbac.authorization.k8s.io
`)
th.writeF("/manifests/aws/aws-efs-csi-driver/base/csi-node-daemon-set.yaml", `
kind: DaemonSet
apiVersion: apps/v1
Expand Down Expand Up @@ -218,13 +223,15 @@ spec:
apiVersion: v1
kind: ServiceAccount
metadata:
name: efs-csi-node-sa`)
name: efs-csi-node-sa
`)
th.writeF("/manifests/aws/aws-efs-csi-driver/base/csi-default-storage.yaml", `
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: efs-default
provisioner: efs.csi.aws.com`)
provisioner: efs.csi.aws.com
`)
th.writeK("/manifests/aws/aws-efs-csi-driver/base", `
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
Expand Down
24 changes: 16 additions & 8 deletions tests/aws-fsx-csi-driver-base_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -90,7 +90,8 @@ rules:
verbs: ["get", "list", "watch"]
- apiGroups: ["storage.k8s.io"]
resources: ["volumeattachments"]
verbs: ["get", "list", "watch", "update"]`)
verbs: ["get", "list", "watch", "update"]
`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-attacher-cluster-role-binding.yaml", `
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -103,7 +104,8 @@ subjects:
roleRef:
kind: ClusterRole
name: fsx-csi-external-attacher-clusterrole
apiGroup: rbac.authorization.k8s.io`)
apiGroup: rbac.authorization.k8s.io
`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-controller-cluster-role.yaml", `
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -121,7 +123,8 @@ rules:
verbs: ["get", "list", "watch"]
- apiGroups: [""]
resources: ["events"]
verbs: ["get", "list", "watch", "create", "update", "patch"]`)
verbs: ["get", "list", "watch", "create", "update", "patch"]
`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-controller-cluster-role-binding.yaml", `
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -134,7 +137,8 @@ subjects:
roleRef:
kind: ClusterRole
name: external-provisioner-role
apiGroup: rbac.authorization.k8s.io`)
apiGroup: rbac.authorization.k8s.io
`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-controller-sa.yaml", `
apiVersion: v1
kind: ServiceAccount
Expand Down Expand Up @@ -178,7 +182,8 @@ subjects:
roleRef:
kind: ClusterRole
name: fsx-csi-node-clusterrole
apiGroup: rbac.authorization.k8s.io`)
apiGroup: rbac.authorization.k8s.io
`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-node-daemonset.yaml", `
kind: DaemonSet
apiVersion: apps/v1
Expand Down Expand Up @@ -279,7 +284,8 @@ rules:
verbs: ["get", "list", "watch"]
- apiGroups: [""]
resources: ["events"]
verbs: ["get", "list", "watch", "create", "update", "patch"]`)
verbs: ["get", "list", "watch", "create", "update", "patch"]
`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-provisioner-cluster-role-binding.yaml", `
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -292,13 +298,15 @@ subjects:
roleRef:
kind: ClusterRole
name: fsx-external-provisioner-clusterrole
apiGroup: rbac.authorization.k8s.io`)
apiGroup: rbac.authorization.k8s.io
`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-default-storage.yaml", `
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: fsx-default
provisioner: fsx.csi.aws.com`)
provisioner: fsx.csi.aws.com
`)
th.writeK("/manifests/aws/aws-fsx-csi-driver/base", `
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
Expand Down
3 changes: 2 additions & 1 deletion tests/basic-auth-ingress-overlays-certmanager_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -77,7 +77,8 @@ resources:
- certificate.yaml
namespace: kubeflow
commonLabels:
kustomize.component: basic-auth-ingress`)
kustomize.component: basic-auth-ingress
`)
th.writeF("/manifests/gcp/basic-auth-ingress/base/cloud-endpoint.yaml", `
apiVersion: ctl.isla.solutions/v1
kind: CloudEndpoint
Expand Down
3 changes: 2 additions & 1 deletion tests/basic-auth-ingress-overlays-gcp-credentials_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,8 @@ kind: Kustomization
bases:
- ../../base
patchesStrategicMerge:
- gcp-credentials-patch.yaml`)
- gcp-credentials-patch.yaml
`)
th.writeF("/manifests/gcp/basic-auth-ingress/base/cloud-endpoint.yaml", `
apiVersion: ctl.isla.solutions/v1
kind: CloudEndpoint
Expand Down
6 changes: 4 additions & 2 deletions tests/basic-auth-ingress-overlays-managed-cert_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,8 @@ metadata:
name: gke-certificate
spec:
domains:
- $(hostname)`)
- $(hostname)
`)
th.writeK("/manifests/gcp/basic-auth-ingress/overlays/managed-cert", `
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
Expand All @@ -31,7 +32,8 @@ resources:
- cert.yaml
namespace: kubeflow
commonLabels:
kustomize.component: basic-auth-ingress`)
kustomize.component: basic-auth-ingress
`)
th.writeF("/manifests/gcp/basic-auth-ingress/base/cloud-endpoint.yaml", `
apiVersion: ctl.isla.solutions/v1
kind: CloudEndpoint
Expand Down
6 changes: 4 additions & 2 deletions tests/centraldashboard-base_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -166,11 +166,13 @@ varReference:
- path: spec/template/spec/containers/0/env/0/value
kind: Deployment
- path: spec/template/spec/containers/0/env/1/value
kind: Deployment`)
kind: Deployment
`)
th.writeF("/manifests/common/centraldashboard/base/params.env", `
clusterDomain=cluster.local
userid-header=
userid-prefix=`)
userid-prefix=
`)
th.writeK("/manifests/common/centraldashboard/base", `
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
Expand Down
6 changes: 4 additions & 2 deletions tests/centraldashboard-overlays-application_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -235,11 +235,13 @@ varReference:
- path: spec/template/spec/containers/0/env/0/value
kind: Deployment
- path: spec/template/spec/containers/0/env/1/value
kind: Deployment`)
kind: Deployment
`)
th.writeF("/manifests/common/centraldashboard/base/params.env", `
clusterDomain=cluster.local
userid-header=
userid-prefix=`)
userid-prefix=
`)
th.writeK("/manifests/common/centraldashboard/base", `
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
Expand Down
6 changes: 4 additions & 2 deletions tests/centraldashboard-overlays-istio_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -204,11 +204,13 @@ varReference:
- path: spec/template/spec/containers/0/env/0/value
kind: Deployment
- path: spec/template/spec/containers/0/env/1/value
kind: Deployment`)
kind: Deployment
`)
th.writeF("/manifests/common/centraldashboard/base/params.env", `
clusterDomain=cluster.local
userid-header=
userid-prefix=`)
userid-prefix=
`)
th.writeK("/manifests/common/centraldashboard/base", `
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
Expand Down
3 changes: 2 additions & 1 deletion tests/cloud-endpoints-overlays-gcp-credentials_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,8 @@ kind: Kustomization
bases:
- ../../base
patchesStrategicMerge:
- gcp-credentials-patch.yaml`)
- gcp-credentials-patch.yaml
`)
th.writeF("/manifests/gcp/cloud-endpoints/base/cluster-role-binding.yaml", `
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
Expand Down
12 changes: 8 additions & 4 deletions tests/fluentd-cloud-watch-base_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,8 @@ rules:
resources:
- namespaces
- pods
verbs: ["get", "list", "watch"]`)
verbs: ["get", "list", "watch"]
`)
th.writeF("/manifests/aws/fluentd-cloud-watch/base/cluster-role-binding.yaml", `
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
Expand All @@ -37,7 +38,8 @@ roleRef:
subjects:
- kind: ServiceAccount
name: fluentd
namespace: kube-system`)
namespace: kube-system
`)
th.writeF("/manifests/aws/fluentd-cloud-watch/base/configmap.yaml", `
apiVersion: v1
kind: ConfigMap
Expand Down Expand Up @@ -160,7 +162,8 @@ data:
retry_forever true
</buffer>
</match>
</label>`)
</label>
`)
th.writeF("/manifests/aws/fluentd-cloud-watch/base/daemonset.yaml", `
apiVersion: apps/v1
kind: DaemonSet
Expand Down Expand Up @@ -235,7 +238,8 @@ spec:
apiVersion: v1
kind: ServiceAccount
metadata:
name: fluentd`)
name: fluentd
`)
th.writeF("/manifests/aws/fluentd-cloud-watch/base/params.env", `
region=us-west-2
clusterName=
Expand Down
Loading

0 comments on commit 17a40e5

Please sign in to comment.