v1.6.1

    • Create the file config/default/manager_config_patch.yaml.
    • Create the file .
    • Update the config/default/kustomization.yaml by adding the following to resources:

    • Update the config/manager/kustomization.yaml by adding:

    1. generatorOptions:
    2. disableNameSuffixHash: true
    3. configMapGenerator:
    4. - files:
    5. - controller_manager_config.yaml
    6. name: manager-config
    7. apiVersion: kustomize.config.k8s.io/v1beta1
    8. kind: Kustomization
    9. images:
    10. - name: controller
    11. newName: quay.io/example/memcached-operator
    12. newTag: v0.0.1

    See #4701 for more details.

    (ansible/v1, helm/v1) Add Role rules for leader election.

    Add the rule for the apiGroups coordination.k8s.io and the resource leases in config/rbac/leader_election_role.yaml:

    1. rules:
    2. - apiGroups:
    3. - ""
    4. resources:
    5. - configmaps
    6. - leases

    See #4701 for more details.

    (ansible/v1) Update Ansible collections

    In your requirements.yml, change the version field for community.kubernetes to 1.2.1, and the version field for operator_sdk.util to 0.2.0.

    See #4734 for more details.

    (helm/v1) Replace deprecated leader election and metrics address flags

    Replace deprecated flags --enable-leader-election and --metrics-addr with --leader-elect and , respectively.

    See #4654 for more details.

    Add the arg --health-probe-bind-address=:8081 to the config/default/manager_auth_proxy_patch.yaml:

    1. spec:
    2. template:
    3. spec:
    4. containers:
    5. - name: manager
    6. args:
    7. - "--health-probe-bind-address=:8081"
    8. ...

    (ansible/v1) Explicitly set --health-probe-bind-address in the manager’s auth proxy patch.

    Add the arg --health-probe-bind-address=:6789 to the config/default/manager_auth_proxy_patch.yaml:

    See #4654 for more details.

    (helm/v1, ansible/v1) Add help target to Makefile.

    Ansible/Helm projects now provide a Makefile help target, similar to a --help flag. You can copy and paste this target from the relevant sample’s Makefile (helm, ).

    See #4660 for more details.

    (ansible/v1, helm/v1) Add securityContext‘s to your manager’s Deployment.

    In config/manager/manager.yaml, add the following security contexts:

    1. spec:
    2. ...
    3. template:
    4. ...
    5. spec:
    6. securityContext:
    7. runAsNonRoot: true
    8. containers:
    9. - name: manager
    10. securityContext:
    11. allowPrivilegeEscalation: false

    See #4655 for more details.

    OLM does , so a JSON patch was added to remove this volume and mount such that OLM can itself create and manage certs for your Operator. In config/manifests/kustomization.yaml, add the following:

    1. #patchesJson6902:
    2. #- target:
    3. # group: apps
    4. # version: v1
    5. # kind: Deployment
    6. # name: controller-manager
    7. # namespace: system
    8. # patch: |-
    9. # # Remove the manager container's "cert" volumeMount, since OLM will create and mount a set of certs.
    10. # # Update the indices in this path if adding or removing containers/volumeMounts in the manager's Deployment.
    11. # - op: remove
    12. # # Remove the "cert" volume, since OLM will create and mount a set of certs.
    13. # # Update the indices in this path if adding or removing volumes in the manager's Deployment.
    14. # - op: remove
    15. # path: /spec/template/spec/volumes/0

    If you have configured your operator to use webhooks, add this YAML block uncommented.

    See #4623 for more details.

    (go/v2, go/v3, ansible/v1, helm/v1) Add scheme, token, and TLS config to the Prometheus metrics endpoint.

    The /metrics endpoint, while specifying the https port on the manager Pod, was not actually configured to serve over https because no tlsConfig was set. Since kube-rbac-proxy secures this endpoint as a manager sidecar, using the service account token mounted into the Pod by default corrects this problem. The changes should look like:

    1. # config/prometheus/monitor.yaml
    2. spec:
    3. endpoints:
    4. - path: /metrics
    5. port: https
    6. + scheme: https
    7. + bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token
    8. + tlsConfig:
    9. + insecureSkipVerify: true
    10. selector:
    11. matchLabels:
    12. control-plane: controller-manager

    See #4680 for more details.

    (go/v2, go/v3, ansible/v1, helm/v1) Add opm and catalog-build Makefile targets

    The opm and catalog-build Makefile targets were added so operator developers who want to create their own catalogs for their operator or add their operator’s bundle(s) to an existing catalog can do so. If this sounds like you, add the following lines to the bottom of your Makefile:

    If updating a Go operator project, additionally add the following Makefile variables:

    1. OS = $(shell go env GOOS)
    2. ARCH = $(shell go env GOARCH)

    See #4406 for more details.

    (go/v2, go/v3, ansible/v1, helm/v1) Changed BUNDLE_IMG and added IMAGE_TAG_BASE Makefile variables

    The following Makefile changes were made to allow make bundle-build bundle-push catalog-build catalog-push and encode image repo/namespace information in the Makefile by default:

    1. +IMAGE_TAG_BASE ?= <registry>/<operator name>
    2. +
    3. -BUNDLE_IMG ?= controller-bundle:$(VERSION)
    4. +BUNDLE_IMG ?= $(IMAGE_TAG_BASE)-bundle:v$(VERSION)

    For example, if IMAGE_TAG_BASE ?= foo/bar-operator then running make bundle-build bundle-push catalog-build catalog-push would build foo/bar-operator-bundle:v0.0.1 and foo/bar-operator-catalog:v0.0.1 then push them to the docker.io/foo namespaced registry.

    See #4406 for more details.

    A non-default ServiceAccount controller-manager is scaffolded on operator-sdk init, to improve security for operators installed in shared namespaces. To add this ServiceAccount to your project, do the following:

    1. # Create the ServiceAccount.
    2. cat <<EOF > config/rbac/service_account.yaml apiVersion: v1
    3. kind: ServiceAccount
    4. metadata:
    5. name: controller-manager
    6. namespace: system
    7. EOF
    8. # Add it to the list of RBAC resources.
    9. echo "- service_account.yaml" >> config/rbac/kustomization.yaml
    10. # Update all RoleBinding and ClusterRoleBinding subjects that reference the operator's ServiceAccount.
    11. find config/rbac -name *_binding.yaml -exec sed -i -E 's/ name: default/ name: controller-manager/g' {} \;
    12. sed -i -E 's/([ ]+)(terminationGracePeriodSeconds:)/\1serviceAccountName: controller-manager\n\1\2/g' config/manager/manager.yaml

    The changes should look like:

    See for more details.