Skip to content

Commit

Permalink
OpenStack: Cleanup ServiceAccount
Browse files Browse the repository at this point in the history
For an unknown reason OpenStack was different in CCCMO and had its
OpenStack-specific `kube-system` ServiceAccount defined in manifests/.
This commit attempts to clean up this situation by moving these
manifests to pkg/cloud/openstack/assets.
  • Loading branch information
dulek committed Apr 23, 2024
1 parent f8e0afd commit d59800a
Show file tree
Hide file tree
Showing 9 changed files with 38 additions and 57 deletions.

This file was deleted.

8 changes: 6 additions & 2 deletions pkg/cloud/cloud_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -141,18 +141,22 @@ func TestGetResources(t *testing.T) {
}, {
name: "OpenStack resources returned as expected",
testPlatform: platformsMap[string(configv1.OpenStackPlatformType)],
expectedResourceCount: 2,
expectedResourceCount: 4,
expectedResourcesKindName: []string{
"Deployment/openstack-cloud-controller-manager",
"PodDisruptionBudget/openstack-cloud-controller-manager",
"ClusterRole/openstack-cloud-controller-manager",
"ClusterRoleBinding/cloud-controller-manager:openstack-cloud-controller-manager",
},
}, {
name: "OpenStack resources returned as expected with signle node cluster",
testPlatform: platformsMap[string(configv1.OpenStackPlatformType)],
expectedResourceCount: 1,
expectedResourceCount: 3,
singleReplica: true,
expectedResourcesKindName: []string{
"Deployment/openstack-cloud-controller-manager",
"ClusterRole/openstack-cloud-controller-manager",
"ClusterRoleBinding/cloud-controller-manager:openstack-cloud-controller-manager",
},
}, {
name: "GCP resources returned as expected",
Expand Down
2 changes: 1 addition & 1 deletion pkg/cloud/openstack/assets/deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ spec:
infrastructure.openshift.io/cloud-controller-manager: {{ .cloudproviderName }}
spec:
hostNetwork: true
serviceAccount: cloud-controller-manager
serviceAccountName: cloud-controller-manager
priorityClassName: system-cluster-critical
nodeSelector:
node-role.kubernetes.io/master: ""
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: openstack-cloud-controller-manager
annotations:
include.release.openshift.io/self-managed-high-availability: "true"
include.release.openshift.io/single-node-developer: "true"
rules:
- apiGroups:
- ""
resources:
- services
- services/status
verbs:
- patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: cloud-controller-manager:openstack-cloud-controller-manager
roleRef:
kind: ClusterRole
name: openstack-cloud-controller-manager
apiGroup: rbac.authorization.k8s.io
subjects:
- kind: ServiceAccount
namespace: kube-system
name: cloud-controller-manager
3 changes: 3 additions & 0 deletions pkg/cloud/openstack/openstack.go
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ import (
configv1 "github.com/openshift/api/config/v1"
ini "gopkg.in/ini.v1"
appsv1 "k8s.io/api/apps/v1"
rbacv1 "k8s.io/api/rbac/v1"
"k8s.io/klog/v2"
"sigs.k8s.io/controller-runtime/pkg/client"

Expand All @@ -24,6 +25,8 @@ var (

templates = []common.TemplateSource{
{ReferenceObject: &appsv1.Deployment{}, EmbedFsPath: "assets/deployment.yaml"},
{ReferenceObject: &rbacv1.ClusterRole{}, EmbedFsPath: "assets/openstack-cloud-controller-manager-clusterrole.yaml"},
{ReferenceObject: &rbacv1.ClusterRoleBinding{}, EmbedFsPath: "assets/openstack-cloud-controller-manager-clusterrolebinding.yaml"},
}
)

Expand Down
2 changes: 1 addition & 1 deletion pkg/cloud/openstack/openstack_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ func TestResourcesRenderingSmoke(t *testing.T) {
}

resources := assets.GetRenderedResources()
g.Expect(resources).Should(HaveLen(1))
g.Expect(resources).Should(HaveLen(3))
})
}
}
Expand Down

0 comments on commit d59800a

Please sign in to comment.