Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
88 commits
Select commit Hold shift + click to select a range
1ffa845
Restart when SystemCertPool should change (#2175)
tmshort Sep 9, 2025
67098e7
🐛 retract v1.5.0; exclude hack/kind-config/containerd/certs.d from ro…
joelanford Sep 9, 2025
46e1163
:warning: OPRUN-4075: Move to a helm-based configuration (#2145)
tmshort Sep 9, 2025
c8dff76
Rename opcon manager CRB when boxcutter is enabled (#2209)
tmshort Sep 10, 2025
1821160
:seedling: Bump actions/setup-go from 5 to 6 (#2205)
dependabot[bot] Sep 11, 2025
6957436
:seedling: Bump pkg.package-operator.run/boxcutter from 0.6.0 to 0.7.…
dependabot[bot] Sep 11, 2025
3f782fd
:seedling: Bump golang.org/x/tools from 0.36.0 to 0.37.0 (#2212)
dependabot[bot] Sep 11, 2025
febdb59
migrate containers libs to new mono-repo (#2195)
anik120 Sep 11, 2025
6e22e2b
Use old and new pod selectors during kustomize-to-helm transition (#2…
tmshort Sep 11, 2025
f512e1e
CER: centralize status updates into big-R Reconcile method (#2200)
joelanford Sep 12, 2025
8c42457
CRE Previous Limit (#2204)
dtfranz Sep 12, 2025
d0c7c0c
Revert "migrate containers libs to new mono-repo" (#2215)
tmshort Sep 12, 2025
ed3bdcf
:seedling: OPRUN-4101: Move helm converter to applier package (#2207)
perdasilva Sep 12, 2025
e0a2e17
Use control-plane selectors in network-policies and tests for now (#2…
tmshort Sep 12, 2025
527f0f7
Merge branch 'main' into synchronize
tmshort Sep 12, 2025
d8e9727
UPSTREAM: <carry>: Add OpenShift specific files
dtfranz Oct 26, 2023
dbd436a
UPSTREAM: <carry>: Fix catalogd.Dockerfile to use new paths
tmshort Feb 26, 2025
292c014
UPSTREAM: <carry>: Update DOWNSTREAM_OWNERS_ALIASES
tmshort Mar 6, 2025
6fc5adc
UPSTREAM: <carry>: Add openshift node selector annotation
oceanc80 Mar 26, 2025
fc81f7f
UPSTREAM: <carry>: Add caalogd-cas-dir option to op-con
tmshort Apr 15, 2025
bab69e9
UPSTREAM: <carry>: set the SElinux type
jianzhangbjz Apr 27, 2025
c0e1c84
UPSTREAM: <carry>: Add initial stack to run tests to validate the cat…
camilamacedo86 Apr 17, 2025
7801d0c
UPSTREAM: <carry>: Add vendor files for the catalog-sync tests
camilamacedo86 Apr 17, 2025
fab15ce
UPSTREAM: <carry>: Bump catalog versions to 4.19
tmshort Apr 24, 2025
0a7a5b6
UPSTREAM: <carry>: revert "Bump catalog versions to 4.19"
tmshort May 15, 2025
a037cbb
UPSTREAM: <carry>: Update HOWTO-origin-tests
tmshort May 14, 2025
8de06a4
UPSTREAM: <carry>: [DefaultCatalogTests]: Allow to pass auth path for…
camilamacedo86 May 16, 2025
8b1903d
UPSTREAM: <carry>: fix: set NoLchown=true to allow image unpack on OCPci
camilamacedo86 May 19, 2025
a6cd4d7
UPSTREAM: <carry>: [DefaultCatalogTests]: Moving parse of ENVVAR to t…
camilamacedo86 May 17, 2025
5fadad0
UPSTREAM: <carry>: [Default Catalog]: Create tmp dir to extract layer…
camilamacedo86 May 20, 2025
2859467
UPSTREAM: <carry>: [Default Catalog](cleanp) Remove hack directory wh…
camilamacedo86 May 19, 2025
20d2870
UPSTREAM: <carry>: Change code implementation to extract layers in OC…
camilamacedo86 May 21, 2025
d67a0e7
UPSTREAM: <carry>: Add vendor files for change in the extract code im…
camilamacedo86 May 21, 2025
737bb74
UPSTREAM: <carry>: [Default Catalog Tests]: Final cleanups and enhanc…
camilamacedo86 May 22, 2025
fdfab28
UPSTREAM: <carry>: SELinux type for operator-controller
jianzhangbjz May 22, 2025
6a5c636
UPSTREAM: <carry>: Bump catalog versions to 4.19
tmshort Apr 24, 2025
7982650
UPSTREAM: <carry>: [Default Catalog Consistency Test] (feat) add chec…
camilamacedo86 May 28, 2025
6f706c3
UPSTREAM: <carry>: [Default Catalog Consistency Test]: fix junit outp…
camilamacedo86 Jun 2, 2025
0c98d17
UPSTREAM: <carry>: [Default Catalog Consistency Test] (feat) add chec…
camilamacedo86 May 29, 2025
09fd60a
UPSTREAM: <carry>: [Default Catalog Consistency Test]: Enable Catalog…
camilamacedo86 Jun 4, 2025
7d65f52
UPSTREAM: <carry>: [Default Catalog Consistency Test]: Rename Tests s…
camilamacedo86 Jun 4, 2025
35e0d33
UPSTREAM: <carry>: Updating ose-olm-operator-controller-container ima…
Jun 18, 2025
34a3071
UPSTREAM: <carry>: Updating ose-olm-catalogd-container image to be co…
Jun 18, 2025
31ddddf
UPSTREAM: <carry>: Update e2e registry to use 1.24/4.20
tmshort Jun 30, 2025
ce47fb1
UPSTREAM: <carry>: [Catalog Default Tests]: Upgrade go version to 1.2…
camilamacedo86 Jul 1, 2025
6a818d3
UPSTREAM: <carry>: Add structure to allow move the orgin tests using OTE
camilamacedo86 Jun 13, 2025
a48889e
UPSTREAM: <carry>: Add support for experimental manifests
tmshort Jul 2, 2025
cc443de
UPSTREAM: <carry>: [OTE] - chore: follow up #383 – remove unreachable…
camilamacedo86 Jul 10, 2025
4dc4241
UPSTREAM: <carry>: Remove build of test image registry
tmshort Jul 9, 2025
388d137
UPSTREAM: <carry>: Add test-experimental-e2e target to openshift Make…
tmshort Jul 15, 2025
b0d5486
UPSTREAM: <carry>: [OTE]: Add binary in the operator controller image…
camilamacedo86 Jul 11, 2025
93fb83a
UPSTREAM: <carry>: Fix experimental manifest copying
tmshort Jul 17, 2025
524852b
UPSTREAM: <carry>: Update manifest generation for upstream rbac/webhooks
tmshort Jul 17, 2025
9790dcd
UPSTREAM: <carry>: [OTE] - Add tracking mechanism
camilamacedo86 Jul 17, 2025
97cbdfa
UPSTREAM: <carry>: Update OTE dep to get fix
camilamacedo86 Jul 22, 2025
a64c59c
UPSTREAM: <carry>: [OTE] Add Readme
camilamacedo86 Jul 24, 2025
0e160bd
UPSTREAM: <carry>: set GIT_COMMIT env from SOURCE_GIT_COMMIT in Docke…
rashmigottipati Jun 6, 2025
41d2652
UPSTREAM: <carry>: add openshift specific build target to pass commit…
ankitathomas Jun 11, 2025
72117db
UPSTREAM: <carry>: add source commit into binaries when linking
bentito Jul 9, 2025
37c8ca7
UPSTREAM: <carry>: OTE add first test from openshift/origin olmv1.go
camilamacedo86 Jul 19, 2025
21071c0
UPSTREAM: <carry>: Migrate tasks from openshift/origin olm v1.go file…
camilamacedo86 Jul 31, 2025
1bb17d0
UPSTREAM: <carry>: OTE - How to test locally with OCP instances
camilamacedo86 Aug 6, 2025
d2620ac
UPSTREAM: <carry>: [OTE] Refac: refac helper and olmv1 test to create…
camilamacedo86 Aug 8, 2025
37941bb
UPSTREAM: <carry>: [OTE] add webhook tests
camilamacedo86 Jul 31, 2025
8054641
UPSTREAM: <carry>: OTE: rewrite the upgrade incompatible operator test
tmshort Aug 11, 2025
dad6b4c
UPSTREAM: <carry>: Handle service-ca cert availability/rotation
tmshort Aug 15, 2025
5b58a7d
UPSTREAM: <carry>: [OTE] add webhook tests
sosiouxme Aug 14, 2025
43e46bd
UPSTREAM: <carry>: Upgrade OCP Catalog images from 4.19 to 4.20
camilamacedo86 Aug 13, 2025
2f9167f
UPSTREAM: <carry>: Remove bindata generation from build
tmshort Aug 15, 2025
ae1a803
UPSTREAM: <carry>: [OTE] Add webhook tests
camilamacedo86 Aug 13, 2025
1e5692f
UPSTREAM: <carry>: OTE add logs and dumps for olmv1 test and fix help…
camilamacedo86 Aug 15, 2025
6d00078
UPSTREAM: <carry>: [OTE] Migrate preflight checks from openshift/origin
camilamacedo86 Jul 31, 2025
212508f
UPSTREAM: <carry>: [OTE] Add webhook to validate openshift-service-ca…
camilamacedo86 Aug 13, 2025
b853c96
UPSTREAM: <carry>: Adds ResourceVersion checks to the tls secret dele…
camilamacedo86 Aug 21, 2025
7219879
UPSTREAM: <carry>: [OTE] - Readme:Add info to help use payload-aggreg…
camilamacedo86 Aug 20, 2025
153b414
UPSTREAM: <carry>: remove obsolete owners
grokspawn Aug 21, 2025
1fc53c2
UPSTREAM: <carry>: [OTE] add catalog tests from openshift/origin
camilamacedo86 Jul 31, 2025
493c761
UPSTREAM: <carry>: Migrate single/own namespace tests
camilamacedo86 Aug 8, 2025
b34035c
UPSTREAM: <carry>: Adds ResourceVersion checks to the tls secret dele…
neisw Aug 25, 2025
0405408
UPSTREAM: <carry>: Ensure unique name for bad-catalog tests
camilamacedo86 Aug 27, 2025
5e0a53d
UPSTREAM: <carry>: Revert "Handle service-ca cert availability/rotation"
tmshort Aug 29, 2025
0c38855
UPSTREAM: <carry>: grant QE approver permission for OTE
jianzhangbjz Aug 27, 2025
6909edf
UPSTREAM: <carry>: Update webhook ote tests to use latest webhook-ope…
Sep 4, 2025
762bf39
UPSTREAM: <carry>: update operator-controller to v1.5.1
anik120 Sep 11, 2025
7c5c543
UPSTREAM: <carry>: configure watchnamespace using spec.config for OTE…
anik120 Sep 11, 2025
8a9dfc4
UPSTREAM: <drop>: go mod vendor
tmshort Sep 12, 2025
2f6f5e3
UPSTREAM: <drop>: remove upstream GitHub configuration
tmshort Sep 12, 2025
659f1a9
UPSTREAM: <drop>: configure the commit-checker
tmshort Sep 12, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 6 additions & 0 deletions .bingo/Variables.mk
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,12 @@ $(GORELEASER): $(BINGO_DIR)/goreleaser.mod
@echo "(re)installing $(GOBIN)/goreleaser-v1.26.2"
@cd $(BINGO_DIR) && GOWORK=off $(GO) build -mod=mod -modfile=goreleaser.mod -o=$(GOBIN)/goreleaser-v1.26.2 "github.com/goreleaser/goreleaser"

HELM := $(GOBIN)/helm-v3.18.4
$(HELM): $(BINGO_DIR)/helm.mod
@# Install binary/ries using Go 1.14+ build command. This is using bwplotka/bingo-controlled, separate go module with pinned dependencies.
@echo "(re)installing $(GOBIN)/helm-v3.18.4"
@cd $(BINGO_DIR) && GOWORK=off $(GO) build -mod=mod -modfile=helm.mod -o=$(GOBIN)/helm-v3.18.4 "helm.sh/helm/v3/cmd/helm"

KIND := $(GOBIN)/kind-v0.29.0
$(KIND): $(BINGO_DIR)/kind.mod
@# Install binary/ries using Go 1.14+ build command. This is using bwplotka/bingo-controlled, separate go module with pinned dependencies.
Expand Down
5 changes: 5 additions & 0 deletions .bingo/helm.mod
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
module _ // Auto generated by https://github.com/bwplotka/bingo. DO NOT EDIT

go 1.24.3

require helm.sh/helm/v3 v3.18.4 // cmd/helm
303 changes: 303 additions & 0 deletions .bingo/helm.sum

Large diffs are not rendered by default.

2 changes: 2 additions & 0 deletions .bingo/variables.env
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,8 @@ GOLANGCI_LINT="${GOBIN}/golangci-lint-v2.1.6"

GORELEASER="${GOBIN}/goreleaser-v1.26.2"

HELM="${GOBIN}/helm-v3.18.4"

KIND="${GOBIN}/kind-v0.29.0"

KUSTOMIZE="${GOBIN}/kustomize-v5.6.0"
Expand Down
2 changes: 1 addition & 1 deletion .tilt-support
Original file line number Diff line number Diff line change
Expand Up @@ -150,4 +150,4 @@ def deploy_repo(data, tags="", debug=True):
local_port = repo['starting_debug_port']
build_binary(reponame, repo['binary'], repo['deps'], repo['image'], tags, debug)
k8s_resource(repo['deployment'], port_forwards=['{}:30000'.format(local_port)])
process_yaml(kustomize(data['yaml']))
process_yaml(helm('helm/olmv1', name="olmv1", values=[data['yaml']]))
72 changes: 42 additions & 30 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -83,12 +83,12 @@ export EXPERIMENTAL_RELEASE_INSTALL := install-experimental.sh
export RELEASE_CATALOGS := default-catalogs.yaml

# List of manifests that are checked in
MANIFEST_HOME := ./manifests
STANDARD_MANIFEST := ./manifests/standard.yaml
STANDARD_E2E_MANIFEST := ./manifests/standard-e2e.yaml
EXPERIMENTAL_MANIFEST := ./manifests/experimental.yaml
EXPERIMENTAL_E2E_MANIFEST := ./manifests/experimental-e2e.yaml
CATALOGS_MANIFEST := ./manifests/default-catalogs.yaml
MANIFEST_HOME := manifests
STANDARD_MANIFEST := $(MANIFEST_HOME)/standard.yaml
STANDARD_E2E_MANIFEST := $(MANIFEST_HOME)/standard-e2e.yaml
EXPERIMENTAL_MANIFEST := $(MANIFEST_HOME)/experimental.yaml
EXPERIMENTAL_E2E_MANIFEST := $(MANIFEST_HOME)/experimental-e2e.yaml
CATALOGS_MANIFEST := $(MANIFEST_HOME)/default-catalogs.yaml

# Disable -j flag for make
.NOTPARALLEL:
Expand Down Expand Up @@ -123,6 +123,10 @@ help-extended: #HELP Display extended help.
lint: lint-custom $(GOLANGCI_LINT) #HELP Run golangci linter.
$(GOLANGCI_LINT) run --build-tags $(GO_BUILD_TAGS) $(GOLANGCI_LINT_ARGS)

lint-helm: $(HELM) #HELP Run helm linter
helm lint helm/olmv1
helm lint helm/prometheus

.PHONY: custom-linter-build
custom-linter-build: #EXHELP Build custom linter
go build -tags $(GO_BUILD_TAGS) -o ./bin/custom-linter ./hack/ci/custom-linters/cmd
Expand All @@ -139,31 +143,39 @@ k8s-pin: #EXHELP Pin k8s staging modules based on k8s.io/kubernetes version (in
tidy:
go mod tidy

.PHONY: manifests
KUSTOMIZE_CATD_RBAC_DIR := config/base/catalogd/rbac
KUSTOMIZE_CATD_WEBHOOKS_DIR := config/base/catalogd/webhook
KUSTOMIZE_OPCON_RBAC_DIR := config/base/operator-controller/rbac
# Due to https://github.com/kubernetes-sigs/controller-tools/issues/837 we can't specify individual files
# So we have to generate them together and then move them into place
manifests: $(CONTROLLER_GEN) $(KUSTOMIZE) #EXHELP Generate WebhookConfiguration, ClusterRole, and CustomResourceDefinition objects.
# Generate CRDs via our own generator
.PHONY: update-crds
update-crds:
hack/tools/update-crds.sh
# Generate the remaining operator-controller standard manifests
$(CONTROLLER_GEN) --load-build-tags=$(GO_BUILD_TAGS),standard rbac:roleName=manager-role paths="./internal/operator-controller/..." output:rbac:artifacts:config=$(KUSTOMIZE_OPCON_RBAC_DIR)/standard
# Generate the remaining operator-controller experimental manifests
$(CONTROLLER_GEN) --load-build-tags=$(GO_BUILD_TAGS) rbac:roleName=manager-role paths="./internal/operator-controller/..." output:rbac:artifacts:config=$(KUSTOMIZE_OPCON_RBAC_DIR)/experimental
# Generate the remaining catalogd standard manifests
$(CONTROLLER_GEN) --load-build-tags=$(GO_BUILD_TAGS),standard rbac:roleName=manager-role paths="./internal/catalogd/..." output:rbac:artifacts:config=$(KUSTOMIZE_CATD_RBAC_DIR)/standard
$(CONTROLLER_GEN) --load-build-tags=$(GO_BUILD_TAGS),standard webhook paths="./internal/catalogd/..." output:webhook:artifacts:config=$(KUSTOMIZE_CATD_WEBHOOKS_DIR)/standard
# Generate the remaining catalogd experimental manifests
$(CONTROLLER_GEN) --load-build-tags=$(GO_BUILD_TAGS) rbac:roleName=manager-role paths="./internal/catalogd/..." output:rbac:artifacts:config=$(KUSTOMIZE_CATD_RBAC_DIR)/experimental
$(CONTROLLER_GEN) --load-build-tags=$(GO_BUILD_TAGS) webhook paths="./internal/catalogd/..." output:webhook:artifacts:config=$(KUSTOMIZE_CATD_WEBHOOKS_DIR)/experimental
# Generate manifests stored in source-control
mkdir -p $(MANIFEST_HOME)
$(KUSTOMIZE) build $(KUSTOMIZE_STANDARD_OVERLAY) > $(STANDARD_MANIFEST)
$(KUSTOMIZE) build $(KUSTOMIZE_STANDARD_E2E_OVERLAY) > $(STANDARD_E2E_MANIFEST)
$(KUSTOMIZE) build $(KUSTOMIZE_EXPERIMENTAL_OVERLAY) > $(EXPERIMENTAL_MANIFEST)
$(KUSTOMIZE) build $(KUSTOMIZE_EXPERIMENTAL_E2E_OVERLAY) > $(EXPERIMENTAL_E2E_MANIFEST)

# The filename variables can be overridden on the command line if you want to change the set of values files:
# e.g. make "manifests/standard.yaml=helm/cert-manager.yaml my-values-file.yaml" manifests
#
# The set of MANIFESTS to be generated can be changed; you can generate your own custom manifest
# e.g. make MANIFESTS=test.yaml "test.yaml=helm/e2e.yaml" manifests
#
# Override HELM_SETTINGS on the command line to include additional Helm settings
# e.g. make HELM_SETTINGS="options.openshift.enabled=true" manifests
# e.g. make HELM_SETTINGS="operatorControllerFeatures={WebhookProviderCertManager}" manifests
#
MANIFESTS ?= $(STANDARD_MANIFEST) $(STANDARD_E2E_MANIFEST) $(EXPERIMENTAL_MANIFEST) $(EXPERIMENTAL_E2E_MANIFEST)
$(STANDARD_MANIFEST) ?= helm/cert-manager.yaml
$(STANDARD_E2E_MANIFEST) ?= helm/cert-manager.yaml helm/e2e.yaml
$(EXPERIMENTAL_MANIFEST) ?= helm/cert-manager.yaml helm/experimental.yaml
$(EXPERIMENTAL_E2E_MANIFEST) ?= helm/cert-manager.yaml helm/experimental.yaml helm/e2e.yaml
HELM_SETTINGS ?=
.PHONY: $(MANIFESTS)
$(MANIFESTS): $(HELM)
@mkdir -p $(MANIFEST_HOME)
$(HELM) template olmv1 helm/olmv1 $(addprefix --values ,$($@)) $(addprefix --set ,$(HELM_SETTINGS)) > $@

# Generate manifests stored in source-control
.PHONY: manifests
manifests: update-crds $(MANIFESTS) $(HELM) #EXHELP Generate OLMv1 manifests
# These are testing existing manifest options without saving the results
$(HELM) template olmv1 helm/olmv1 --values helm/tilt.yaml $(addprefix --set ,$(HELM_SETTINGS)) > /dev/null
$(HELM) template olmv1 helm/olmv1 --set "options.openshift.enabled=true" > /dev/null

.PHONY: generate
generate: $(CONTROLLER_GEN) #EXHELP Generate code containing DeepCopy, DeepCopyInto, and DeepCopyObject method implementations.
Expand Down Expand Up @@ -288,8 +300,8 @@ test-experimental-e2e: run-internal image-registry prometheus experimental-e2e e
.PHONY: prometheus
prometheus: PROMETHEUS_NAMESPACE := olmv1-system
prometheus: PROMETHEUS_VERSION := v0.83.0
prometheus: #EXHELP Deploy Prometheus into specified namespace
./hack/test/install-prometheus.sh $(PROMETHEUS_NAMESPACE) $(PROMETHEUS_VERSION) $(KUSTOMIZE) $(VERSION)
prometheus: $(KUSTOMIZE) #EXHELP Deploy Prometheus into specified namespace
./hack/test/install-prometheus.sh $(PROMETHEUS_NAMESPACE) $(PROMETHEUS_VERSION) $(VERSION)

.PHONY: test-extension-developer-e2e
test-extension-developer-e2e: SOURCE_MANIFEST := $(STANDARD_E2E_MANIFEST)
Expand Down
2 changes: 1 addition & 1 deletion Tiltfile
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ olmv1 = {
'starting_debug_port': 30000,
},
},
'yaml': 'config/overlays/tilt-local-dev',
'yaml': 'helm/tilt.yaml',
}

deploy_repo(olmv1, '-tags containers_image_openpgp')
13 changes: 13 additions & 0 deletions cmd/catalogd/main.go
Original file line number Diff line number Diff line change
Expand Up @@ -60,6 +60,7 @@ import (
"github.com/operator-framework/operator-controller/internal/catalogd/webhook"
sharedcontrollers "github.com/operator-framework/operator-controller/internal/shared/controllers"
fsutil "github.com/operator-framework/operator-controller/internal/shared/util/fs"
httputil "github.com/operator-framework/operator-controller/internal/shared/util/http"
imageutil "github.com/operator-framework/operator-controller/internal/shared/util/image"
"github.com/operator-framework/operator-controller/internal/shared/util/pullsecretcache"
sautil "github.com/operator-framework/operator-controller/internal/shared/util/sa"
Expand Down Expand Up @@ -291,6 +292,18 @@ func run(ctx context.Context) error {
return err
}

// This watches the pullCasDir and the SSL_CERT_DIR, and SSL_CERT_FILE for changes
cpwPull, err := httputil.NewCertPoolWatcher(cfg.pullCasDir, ctrl.Log.WithName("pull-ca-pool"))
if err != nil {
setupLog.Error(err, "unable to create pull-ca-pool watcher")
return err
}
cpwPull.Restart(os.Exit)
if err = mgr.Add(cpwPull); err != nil {
setupLog.Error(err, "unable to add pull-ca-pool watcher to manager")
return err
}

if cfg.systemNamespace == "" {
cfg.systemNamespace = podNamespace()
}
Expand Down
26 changes: 21 additions & 5 deletions cmd/operator-controller/main.go
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,6 @@ import (
"github.com/operator-framework/operator-controller/internal/operator-controller/features"
"github.com/operator-framework/operator-controller/internal/operator-controller/finalizers"
"github.com/operator-framework/operator-controller/internal/operator-controller/resolve"
"github.com/operator-framework/operator-controller/internal/operator-controller/rukpak/convert"
"github.com/operator-framework/operator-controller/internal/operator-controller/rukpak/preflights/crdupgradesafety"
"github.com/operator-framework/operator-controller/internal/operator-controller/rukpak/render"
"github.com/operator-framework/operator-controller/internal/operator-controller/rukpak/render/certproviders"
Expand Down Expand Up @@ -319,9 +318,26 @@ func run() error {
return err
}

certPoolWatcher, err := httputil.NewCertPoolWatcher(cfg.catalogdCasDir, ctrl.Log.WithName("cert-pool"))
cpwCatalogd, err := httputil.NewCertPoolWatcher(cfg.catalogdCasDir, ctrl.Log.WithName("catalogd-ca-pool"))
if err != nil {
setupLog.Error(err, "unable to create CA certificate pool")
setupLog.Error(err, "unable to create catalogd-ca-pool watcher")
return err
}
cpwCatalogd.Restart(os.Exit)
if err = mgr.Add(cpwCatalogd); err != nil {
setupLog.Error(err, "unable to add catalogd-ca-pool watcher to manager")
return err
}

// This watches the pullCasDir and the SSL_CERT_DIR, and SSL_CERT_FILE for changes
cpwPull, err := httputil.NewCertPoolWatcher(cfg.pullCasDir, ctrl.Log.WithName("pull-ca-pool"))
if err != nil {
setupLog.Error(err, "unable to create pull-ca-pool watcher")
return err
}
cpwPull.Restart(os.Exit)
if err = mgr.Add(cpwPull); err != nil {
setupLog.Error(err, "unable to add pull-ca-pool watcher to manager")
return err
}

Expand Down Expand Up @@ -375,7 +391,7 @@ func run() error {
}
catalogClientBackend := cache.NewFilesystemCache(catalogsCachePath)
catalogClient := catalogclient.New(catalogClientBackend, func() (*http.Client, error) {
return httputil.BuildHTTPClient(certPoolWatcher)
return httputil.BuildHTTPClient(cpwCatalogd)
})

resolver := &resolve.CatalogResolver{
Expand Down Expand Up @@ -638,7 +654,7 @@ func setupHelm(
ceReconciler.Applier = &applier.Helm{
ActionClientGetter: acg,
Preflights: preflights,
BundleToHelmChartConverter: &convert.BundleToHelmChartConverter{
HelmChartProvider: &applier.RegistryV1HelmChartProvider{
BundleRenderer: registryv1.Renderer,
CertificateProvider: certProvider,
IsWebhookSupportEnabled: certProvider != nil,
Expand Down
2 changes: 1 addition & 1 deletion commitchecker.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
expectedMergeBase: 68610d0184c4f36bf993f7986dd9a31f0b72b48b
expectedMergeBase: e0a2e17332717dab9a16c1ff6d6ff80fd769ffe5
upstreamBranch: main
upstreamOrg: operator-framework
upstreamRepo: operator-controller
8 changes: 4 additions & 4 deletions docs/draft/api-reference/network-policies.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,8 +19,8 @@ NetworkPolicy is implemented for both catalogd and operator-controller component

Each component has a dedicated NetworkPolicy that applies to its respective pod through label selectors:

* For catalogd: `control-plane=catalogd-controller-manager`
* For operator-controller: `control-plane=operator-controller-controller-manager`
* For catalogd: `app.kubernetes.io/name=catalogd`
* For operator-controller: `app.kubernetes.io/name=operator-controller`

### Catalogd NetworkPolicy

Expand Down Expand Up @@ -78,10 +78,10 @@ If you encounter network connectivity issues after deploying OLMv1, consider the

```bash
# Verify catalogd pod labels
kubectl get pods -n olmv1-system --selector=control-plane=catalogd-controller-manager
kubectl get pods -n olmv1-system --selector=apps.kubernetes.io/name=catalogd

# Verify operator-controller pod labels
kubectl get pods -n olmv1-system --selector=control-plane=operator-controller-controller-manager
kubectl get pods -n olmv1-system --selector=apps.kubernetes.io/name=operator-controller

# Compare with actual pod names
kubectl get pods -n olmv1-system | grep -E 'catalogd|operator-controller'
Expand Down
8 changes: 4 additions & 4 deletions docs/draft/howto/consuming-metrics.md
Original file line number Diff line number Diff line change
Expand Up @@ -226,7 +226,7 @@ apiVersion: monitoring.coreos.com/v1
kind: ServiceMonitor
metadata:
labels:
control-plane: operator-controller-controller-manager
apps.kubernetes.io/name: operator-controller
name: controller-manager-metrics-monitor
namespace: olmv1-system
spec:
Expand All @@ -251,7 +251,7 @@ spec:
key: tls.key
selector:
matchLabels:
control-plane: operator-controller-controller-manager
apps.kubernetes.io/name: operator-controller
EOF
```

Expand All @@ -268,7 +268,7 @@ apiVersion: monitoring.coreos.com/v1
kind: ServiceMonitor
metadata:
labels:
control-plane: catalogd-controller-manager
apps.kubernetes.io/name: catalogd
name: catalogd-metrics-monitor
namespace: olmv1-system
spec:
Expand Down Expand Up @@ -298,4 +298,4 @@ EOF
```

[prometheus-operator]: https://github.com/prometheus-operator/kube-prometheus
[rbac-k8s-docs]: https://kubernetes.io/docs/reference/access-authn-authz/rbac/
[rbac-k8s-docs]: https://kubernetes.io/docs/reference/access-authn-authz/rbac/
2 changes: 1 addition & 1 deletion docs/draft/howto/enable-helm-chart-support.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ To enable the Helm Chart support feature gate, you need to patch the `operator-c
2. **Wait for the controller manager pods to be ready:**

```bash
$ kubectl -n olmv1-system wait --for condition=ready pods -l control-plane=operator-controller-controller-manager
$ kubectl -n olmv1-system wait --for condition=ready pods -l apps.kubernetes.io/name=operator-controller
```

Once the above wait condition is met, the `HelmChartSupport` feature gate should be enabled in operator controller.
Expand Down
10 changes: 5 additions & 5 deletions docs/draft/howto/profiling_with_pprof.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ The following steps are examples to demonstrate the required changes to enable P
1. Run the following command to patch the Deployment and add the `--pprof-bind-address=:8082` flag:

```shell
kubectl patch deployment $(kubectl get deployments -n olmv1-system -l control-plane=operator-controller-controller-manager -o jsonpath='{.items[0].metadata.name}') \
kubectl patch deployment $(kubectl get deployments -n olmv1-system -l apps.kubernetes.io/name=operator-controller -o jsonpath='{.items[0].metadata.name}') \
-n olmv1-system --type='json' -p='[
{
"op": "add",
Expand Down Expand Up @@ -127,7 +127,7 @@ go tool pprof -http=:8080 ./operator-controller-profile.pprof
1. Run the following command to patch the Deployment and add the `--pprof-bind-address=:8083` flag:

```shell
kubectl patch deployment $(kubectl get deployments -n olmv1-system -l control-plane=catalogd-controller-manager -o jsonpath='{.items[0].metadata.name}') \
kubectl patch deployment $(kubectl get deployments -n olmv1-system -l apps.kubernetes.io/name=catalogd -o jsonpath='{.items[0].metadata.name}') \
-n olmv1-system --type='json' -p='[
{
"op": "add",
Expand Down Expand Up @@ -235,7 +235,7 @@ go tool pprof -http=:8080 ./catalogd-profile.pprof
1. Run the following command to bind to `--pprof-bind-address` the value `0` in order to disable the endpoint.

```shell
kubectl patch deployment $(kubectl get deployments -n olmv1-system -l control-plane=operator-controller-controller-manager -o jsonpath='{.items[0].metadata.name}') \
kubectl patch deployment $(kubectl get deployments -n olmv1-system -l apps.kubernetes.io/name=operator-controller -o jsonpath='{.items[0].metadata.name}') \
-n olmv1-system --type='json' -p='[
{
"op": "replace",
Expand Down Expand Up @@ -266,7 +266,7 @@ kubectl delete pod curl-oper-con-pprof -n olmv1-system

1. Run the following command to bind to `--pprof-bind-address` the value `0` in order to disable the endpoint.
```shell
kubectl patch deployment $(kubectl get deployments -n olmv1-system -l control-plane=catalogd-controller-manager -o jsonpath='{.items[0].metadata.name}') \
kubectl patch deployment $(kubectl get deployments -n olmv1-system -l apps.kubernetes.io/name=catalogd -o jsonpath='{.items[0].metadata.name}') \
-n olmv1-system --type='json' -p='[
{
"op": "replace",
Expand Down Expand Up @@ -294,4 +294,4 @@ re-start the deployment `kubectl rollout restart deployment -n olmv1-system cata
kubectl delete pod curl-catalogd-pprof -n olmv1-system
```

[pprof]: https://github.com/google/pprof/blob/main/doc/README.md
[pprof]: https://github.com/google/pprof/blob/main/doc/README.md
Loading