Skip to content

Commit

Permalink
Update the jupyter web app image to gcr.io/kubeflow-images-public/jup…
Browse files Browse the repository at this point in the history
…yter-web-app:9419d4d7 (kubeflow#320)
  • Loading branch information
jlewi authored and k8s-ci-robot committed Aug 26, 2019
1 parent b4ac8ec commit 69ea974
Show file tree
Hide file tree
Showing 22 changed files with 175 additions and 234 deletions.
58 changes: 29 additions & 29 deletions jupyter/jupyter-web-app/base/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,56 +15,56 @@ commonLabels:
app: jupyter-web-app
kustomize.component: jupyter-web-app
images:
- name: gcr.io/kubeflow-images-public/jupyter-web-app
newName: gcr.io/kubeflow-images-public/jupyter-web-app
newTag: 9419d4d
- name: gcr.io/kubeflow-images-public/jupyter-web-app
newName: gcr.io/kubeflow-images-public/jupyter-web-app
newTag: 9419d4d7
configMapGenerator:
- name: parameters
env: params.env
- env: params.env
name: parameters
generatorOptions:
disableNameSuffixHash: true
vars:
- name: policy
- fieldref:
fieldPath: data.policy
name: policy
objref:
apiVersion: v1
kind: ConfigMap
name: parameters
apiVersion: v1
fieldref:
fieldpath: data.policy
- name: prefix
- fieldref:
fieldPath: data.prefix
name: prefix
objref:
apiVersion: v1
kind: ConfigMap
name: parameters
apiVersion: v1
fieldref:
fieldpath: data.prefix
- name: clusterDomain
- fieldref:
fieldPath: data.clusterDomain
name: clusterDomain
objref:
apiVersion: v1
kind: ConfigMap
name: parameters
apiVersion: v1
fieldref:
fieldpath: data.clusterDomain
- name: namespace
- fieldref:
fieldPath: metadata.namespace
name: namespace
objref:
apiVersion: v1
kind: Service
name: service
apiVersion: v1
fieldref:
fieldpath: metadata.namespace
- name: userid-header
- fieldref:
fieldPath: data.userid-header
name: userid-header
objref:
apiVersion: v1
kind: ConfigMap
name: parameters
apiVersion: v1
fieldref:
fieldpath: data.userid-header
- name: userid-prefix
- fieldref:
fieldPath: data.userid-prefix
name: userid-prefix
objref:
apiVersion: v1
kind: ConfigMap
name: parameters
apiVersion: v1
fieldref:
fieldpath: data.userid-prefix
configurations:
- params.yaml
15 changes: 5 additions & 10 deletions tests/aws-alb-ingress-controller-base_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -47,8 +47,7 @@ rules:
verbs:
- get
- list
- watch
`)
- watch`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/base/cluster-role-binding.yaml", `
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand All @@ -60,8 +59,7 @@ roleRef:
name: alb-ingress-controller
subjects:
- kind: ServiceAccount
name: alb-ingress-controller
`)
name: alb-ingress-controller`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/base/deployment.yaml", `
# Application Load Balancer (ALB) Ingress Controller Deployment Manifest.
# This manifest details sensible defaults for deploying an ALB Ingress Controller.
Expand Down Expand Up @@ -113,17 +111,14 @@ spec:
# Repository location of the ALB Ingress Controller.
image: docker.io/amazon/aws-alb-ingress-controller:v1.1.2
imagePullPolicy: Always
serviceAccountName: alb-ingress-controller
`)
serviceAccountName: alb-ingress-controller`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/base/service-account.yaml", `
apiVersion: v1
kind: ServiceAccount
metadata:
name: alb-ingress-controller
`)
name: alb-ingress-controller`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/base/params.env", `
clusterName=
`)
clusterName=`)
th.writeK("/manifests/aws/aws-alb-ingress-controller/base", `
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
Expand Down
18 changes: 6 additions & 12 deletions tests/aws-alb-ingress-controller-overlays-vpc_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -34,8 +34,7 @@ spec:
`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/overlays/vpc/params.env", `
vpcId=
region=us-west-2
`)
region=us-west-2`)
th.writeK("/manifests/aws/aws-alb-ingress-controller/overlays/vpc", `
bases:
- ../../base
Expand Down Expand Up @@ -96,8 +95,7 @@ rules:
verbs:
- get
- list
- watch
`)
- watch`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/base/cluster-role-binding.yaml", `
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand All @@ -109,8 +107,7 @@ roleRef:
name: alb-ingress-controller
subjects:
- kind: ServiceAccount
name: alb-ingress-controller
`)
name: alb-ingress-controller`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/base/deployment.yaml", `
# Application Load Balancer (ALB) Ingress Controller Deployment Manifest.
# This manifest details sensible defaults for deploying an ALB Ingress Controller.
Expand Down Expand Up @@ -162,17 +159,14 @@ spec:
# Repository location of the ALB Ingress Controller.
image: docker.io/amazon/aws-alb-ingress-controller:v1.1.2
imagePullPolicy: Always
serviceAccountName: alb-ingress-controller
`)
serviceAccountName: alb-ingress-controller`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/base/service-account.yaml", `
apiVersion: v1
kind: ServiceAccount
metadata:
name: alb-ingress-controller
`)
name: alb-ingress-controller`)
th.writeF("/manifests/aws/aws-alb-ingress-controller/base/params.env", `
clusterName=
`)
clusterName=`)
th.writeK("/manifests/aws/aws-alb-ingress-controller/base", `
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
Expand Down
24 changes: 8 additions & 16 deletions tests/aws-efs-csi-driver-base_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -58,8 +58,7 @@ spec:
mountPath: /var/lib/csi/sockets/pluginproxy/
volumes:
- name: socket-dir
emptyDir: {}
`)
emptyDir: {}`)
th.writeF("/manifests/aws/aws-efs-csi-driver/base/csi-attacher-cluster-role.yaml", `
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -74,8 +73,7 @@ rules:
verbs: ["get", "list", "watch"]
- apiGroups: ["storage.k8s.io"]
resources: ["volumeattachments"]
verbs: ["get", "list", "watch", "update"]
`)
verbs: ["get", "list", "watch", "update"]`)
th.writeF("/manifests/aws/aws-efs-csi-driver/base/csi-attacher-cluster-role-binding.yaml", `
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -88,14 +86,12 @@ subjects:
roleRef:
kind: ClusterRole
name: efs-csi-external-attacher-clusterrole
apiGroup: rbac.authorization.k8s.io
`)
apiGroup: rbac.authorization.k8s.io`)
th.writeF("/manifests/aws/aws-efs-csi-driver/base/csi-controller-sa.yaml", `
apiVersion: v1
kind: ServiceAccount
metadata:
name: efs-csi-controller-sa
`)
name: efs-csi-controller-sa`)
th.writeF("/manifests/aws/aws-efs-csi-driver/base/csi-node-cluster-role.yaml", `
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -119,8 +115,7 @@ rules:
verbs: ["get", "list", "watch", "update"]
- apiGroups: ["csi.storage.k8s.io"]
resources: ["csinodeinfos"]
verbs: ["get", "list", "watch", "update"]
`)
verbs: ["get", "list", "watch", "update"]`)
th.writeF("/manifests/aws/aws-efs-csi-driver/base/csi-node-cluster-role-binding.yaml", `
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -133,8 +128,7 @@ subjects:
roleRef:
kind: ClusterRole
name: efs-csi-node-clusterrole
apiGroup: rbac.authorization.k8s.io
`)
apiGroup: rbac.authorization.k8s.io`)
th.writeF("/manifests/aws/aws-efs-csi-driver/base/csi-node-daemon-set.yaml", `
kind: DaemonSet
apiVersion: apps/v1beta2
Expand Down Expand Up @@ -218,15 +212,13 @@ spec:
apiVersion: v1
kind: ServiceAccount
metadata:
name: efs-csi-node-sa
`)
name: efs-csi-node-sa`)
th.writeF("/manifests/aws/aws-efs-csi-driver/base/csi-default-storage.yaml", `
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: efs-default
provisioner: efs.csi.aws.com
`)
provisioner: efs.csi.aws.com`)
th.writeK("/manifests/aws/aws-efs-csi-driver/base", `
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
Expand Down
27 changes: 9 additions & 18 deletions tests/aws-fsx-csi-driver-base_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -69,8 +69,7 @@ spec:
mountPath: /var/lib/csi/sockets/pluginproxy/
volumes:
- name: socket-dir
emptyDir: {}
`)
emptyDir: {}`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-attacher-cluster-role.yaml", `
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -85,8 +84,7 @@ rules:
verbs: ["get", "list", "watch"]
- apiGroups: ["storage.k8s.io"]
resources: ["volumeattachments"]
verbs: ["get", "list", "watch", "update"]
`)
verbs: ["get", "list", "watch", "update"]`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-attacher-cluster-role-binding.yaml", `
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -99,8 +97,7 @@ subjects:
roleRef:
kind: ClusterRole
name: fsx-csi-external-attacher-clusterrole
apiGroup: rbac.authorization.k8s.io
`)
apiGroup: rbac.authorization.k8s.io`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-controller-cluster-role.yaml", `
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -118,8 +115,7 @@ rules:
verbs: ["get", "list", "watch"]
- apiGroups: [""]
resources: ["events"]
verbs: ["get", "list", "watch", "create", "update", "patch"]
`)
verbs: ["get", "list", "watch", "create", "update", "patch"]`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-controller-cluster-role-binding.yaml", `
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -132,8 +128,7 @@ subjects:
roleRef:
kind: ClusterRole
name: external-provisioner-role
apiGroup: rbac.authorization.k8s.io
`)
apiGroup: rbac.authorization.k8s.io`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-controller-sa.yaml", `
apiVersion: v1
kind: ServiceAccount
Expand Down Expand Up @@ -177,8 +172,7 @@ subjects:
roleRef:
kind: ClusterRole
name: fsx-csi-node-clusterrole
apiGroup: rbac.authorization.k8s.io
`)
apiGroup: rbac.authorization.k8s.io`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-node-daemonset.yaml", `
kind: DaemonSet
apiVersion: apps/v1beta2
Expand Down Expand Up @@ -279,8 +273,7 @@ rules:
verbs: ["get", "list", "watch"]
- apiGroups: [""]
resources: ["events"]
verbs: ["get", "list", "watch", "create", "update", "patch"]
`)
verbs: ["get", "list", "watch", "create", "update", "patch"]`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-provisioner-cluster-role-binding.yaml", `
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -293,15 +286,13 @@ subjects:
roleRef:
kind: ClusterRole
name: fsx-external-provisioner-clusterrole
apiGroup: rbac.authorization.k8s.io
`)
apiGroup: rbac.authorization.k8s.io`)
th.writeF("/manifests/aws/aws-fsx-csi-driver/base/csi-default-storage.yaml", `
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: fsx-default
provisioner: fsx.csi.aws.com
`)
provisioner: fsx.csi.aws.com`)
th.writeK("/manifests/aws/aws-fsx-csi-driver/base", `
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
Expand Down
15 changes: 5 additions & 10 deletions tests/fluentd-cloud-watch-base_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,8 +22,7 @@ rules:
resources:
- namespaces
- pods
verbs: ["get", "list", "watch"]
`)
verbs: ["get", "list", "watch"]`)
th.writeF("/manifests/aws/fluentd-cloud-watch/base/cluster-role-binding.yaml", `
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
Expand All @@ -36,8 +35,7 @@ roleRef:
subjects:
- kind: ServiceAccount
name: fluentd
namespace: kube-system
`)
namespace: kube-system`)
th.writeF("/manifests/aws/fluentd-cloud-watch/base/configmap.yaml", `
apiVersion: v1
kind: ConfigMap
Expand Down Expand Up @@ -160,8 +158,7 @@ data:
retry_forever true
</buffer>
</match>
</label>
`)
</label>`)
th.writeF("/manifests/aws/fluentd-cloud-watch/base/daemonset.yaml", `
apiVersion: extensions/v1beta1
kind: DaemonSet
Expand Down Expand Up @@ -230,14 +227,12 @@ spec:
path: /var/lib/docker/containers
- name: runlogjournal
hostPath:
path: /run/log/journal
`)
path: /run/log/journal`)
th.writeF("/manifests/aws/fluentd-cloud-watch/base/service-account.yaml", `
apiVersion: v1
kind: ServiceAccount
metadata:
name: fluentd
`)
name: fluentd`)
th.writeF("/manifests/aws/fluentd-cloud-watch/base/params.env", `
region=us-west-2
clusterName=
Expand Down
Loading

0 comments on commit 69ea974

Please sign in to comment.