11NAME ?= $(shell basename "`pwd`")
2+
23ifneq ($(origin TARGET_SITE ) , undefined)
34 TARGET_SITE_OPT =--set main.clusterGroupName=$(TARGET_SITE )
45endif
@@ -55,11 +56,12 @@ help: ## This help message
5556show : # # show the starting template without installing it
5657 helm template common/operator-install/ --name-template $(NAME ) $(HELM_OPTS )
5758
58- preview-all :
59+ preview-all : # # (EXPERIMENTAL) Previews all applications on hub and managed clusters
60+ @echo " NOTE: This is just a tentative approximation of rendering all hub and managed clusters templates"
5961 @common/scripts/preview-all.sh $(TARGET_REPO ) $(TARGET_BRANCH )
6062
6163preview-% :
62- CLUSTERGROUP? = $(shell yq ".main.clusterGroupName" values-global.yaml)
64+ $( eval CLUSTERGROUP ?= $(shell yq ".main.clusterGroupName" values-global.yaml) )
6365 @common/scripts/preview.sh $(CLUSTERGROUP ) $* $(TARGET_REPO ) $(TARGET_BRANCH )
6466
6567.PHONY : operator-deploy
@@ -77,15 +79,41 @@ uninstall: ## runs helm uninstall
7779 @oc delete csv -n openshift-operators $(CSV )
7880
7981.PHONY : load-secrets
80- load-secrets : # # loads the secrets into the vault
82+ load-secrets : # # loads the secrets into the backend determined by values-global setting
83+ common/scripts/process-secrets.sh $(NAME )
84+
85+ .PHONY : legacy-load-secrets
86+ legacy-load-secrets : # # loads the secrets into vault (only)
8187 common/scripts/vault-utils.sh push_secrets $(NAME )
8288
89+ .PHONY : secrets-backend-vault
90+ secrets-backend-vault : # # Edits values files to use default Vault+ESO secrets config
91+ common/scripts/set-secret-backend.sh vault
92+ common/scripts/manage-secret-app.sh vault present
93+ common/scripts/manage-secret-app.sh golang-external-secrets present
94+ common/scripts/manage-secret-namespace.sh validated-patterns-secrets absent
95+ @git diff --exit-code || echo " Secrets backend set to vault, please review changes, commit, and push to activate in the pattern"
96+
97+ .PHONY : secrets-backend-kubernetes
98+ secrets-backend-kubernetes : # # Edits values file to use Kubernetes+ESO secrets config
99+ common/scripts/set-secret-backend.sh kubernetes
100+ common/scripts/manage-secret-namespace.sh validated-patterns-secrets present
101+ common/scripts/manage-secret-app.sh vault absent
102+ common/scripts/manage-secret-app.sh golang-external-secrets present
103+ @git diff --exit-code || echo " Secrets backend set to kubernetes, please review changes, commit, and push to activate in the pattern"
104+
105+ .PHONY : secrets-backend-none
106+ secrets-backend-none : # # Edits values files to remove secrets manager + ESO
107+ common/scripts/set-secret-backend.sh none
108+ common/scripts/manage-secret-app.sh vault absent
109+ common/scripts/manage-secret-app.sh golang-external-secrets absent
110+ common/scripts/manage-secret-namespace.sh validated-patterns-secrets absent
111+ @git diff --exit-code || echo " Secrets backend set to none, please review changes, commit, and push to activate in the pattern"
112+
83113.PHONY : load-iib
84114load-iib : # # CI target to install Index Image Bundles
85115 @set -e; if [ x$( INDEX_IMAGES) != x ]; then \
86- for IIB in $( shell echo $( INDEX_IMAGES) | tr ' ,' ' \n' ) ; do \
87- INDEX_IMAGE=" $$ {IIB}" ansible-playbook common/ansible/playbooks/iib-ci/iib-ci.yaml; \
88- done ; \
116+ ansible-playbook common/ansible/playbooks/iib-ci/iib-ci.yaml; \
89117 else \
90118 echo " No INDEX_IMAGES defined. Bailing out" ; \
91119 exit 1; \
@@ -99,14 +127,9 @@ load-iib: ## CI target to install Index Image Bundles
99127.PHONY : validate-origin
100128validate-origin : # # verify the git origin is available
101129 @echo " Checking repository:"
102- @echo -n " $( TARGET_REPO) - branch $( TARGET_BRANCH) : "
103- @if [ ! -f /run/.containerenv ]; then\
104- git ls-remote --exit-code --heads $(TARGET_REPO ) $(TARGET_BRANCH ) > /dev/null && \
105- echo " OK" || \
106- (echo " NOT FOUND" ; exit 1); \
107- else\
108- echo " Running inside a container: Skipping git ssh checks" ; \
109- fi
130+ @echo -n " $( TARGET_REPO) - branch '$( TARGET_BRANCH) ': "
131+ @git ls-remote --exit-code --heads $(TARGET_REPO ) $(TARGET_BRANCH ) > /dev/null && \
132+ echo " OK" || (echo " NOT FOUND" ; exit 1)
110133
111134.PHONY : validate-cluster
112135validate-cluster : # # Do some cluster validations before installing
@@ -130,15 +153,19 @@ validate-schema: ## validates values files against schema in common/clustergroup
130153
131154.PHONY : validate-prereq
132155validate-prereq : # # verify pre-requisites
133- @echo " Checking prerequisites:"
134- @for t in $(EXECUTABLES ) ; do if ! which $$ t > /dev/null 2>&1 ; then echo " No $$ t in PATH" ; exit 1; fi ; done
135- @echo " Check for '$( EXECUTABLES) ': OK"
136- @echo -n " Check for python-kubernetes: "
137- @if ! ansible -m ansible.builtin.command -a " {{ ansible_python_interpreter }} -c 'import kubernetes'" localhost > /dev/null 2>&1 ; then echo " Not found" ; exit 1; fi
138- @echo " OK"
139- @echo -n " Check for kubernetes.core collection: "
140- @if ! ansible-galaxy collection list | grep kubernetes.core > /dev/null 2>&1 ; then echo " Not found" ; exit 1; fi
141- @echo " OK"
156+ @if [ ! -f /run/.containerenv ]; then\
157+ echo " Checking prerequisites:" ; \
158+ for t in $( EXECUTABLES) ; do if ! which $$ t > /dev/null 2>&1 ; then echo " No $$ t in PATH" ; exit 1; fi ; done ; \
159+ echo " Check for '$( EXECUTABLES) ': OK" ; \
160+ echo -n " Check for python-kubernetes: " ; \
161+ if ! ansible -m ansible.builtin.command -a " {{ ansible_python_interpreter }} -c 'import kubernetes'" localhost > /dev/null 2>&1 ; then echo " Not found" ; exit 1; fi ; \
162+ echo " OK" ; \
163+ echo -n " Check for kubernetes.core collection: " ; \
164+ if ! ansible-galaxy collection list | grep kubernetes.core > /dev/null 2>&1 ; then echo " Not found" ; exit 1; fi ; \
165+ echo " OK" ; \
166+ else\
167+ echo " Skipping prerequisites check as we're running inside a container" ; \
168+ fi
142169
143170.PHONY : argo-healthcheck
144171argo-healthcheck : # # Checks if all argo applications are synced
0 commit comments