@@ -36,10 +36,12 @@ CLUSTER_BOOTSTRAP_IMAGE=$(podman run --rm ${release} image cluster-bootstrap)
36
36
37
37
mkdir --parents ./{bootstrap-manifests,manifests}
38
38
39
- if [ ! -d cvo-bootstrap ]
39
+ if [ ! -f cvo-bootstrap.done ]
40
40
then
41
41
echo " Rendering Cluster Version Operator Manifests..."
42
42
43
+ rm -rf cvo-bootstrap
44
+
43
45
# shellcheck disable=SC2154
44
46
podman run \
45
47
--volume " $PWD :/assets:z" \
52
54
cp cvo-bootstrap/manifests/* manifests/
53
55
# # FIXME: CVO should use `/etc/kubernetes/bootstrap-secrets/kubeconfig` instead
54
56
cp auth/kubeconfig /etc/kubernetes/kubeconfig
57
+
58
+ touch cvo-bootstrap.done
55
59
fi
56
60
57
- if [ ! -d config-bootstrap ]
61
+ if [ ! -f config-bootstrap.done ]
58
62
then
59
63
echo " Rendering cluster config manifests..."
60
64
65
+ rm -rf config-bootstrap
66
+
61
67
# shellcheck disable=SC2154
62
68
podman run \
63
69
--volume " $PWD :/assets:z" \
68
74
--asset-output-dir=/assets/config-bootstrap
69
75
70
76
cp config-bootstrap/manifests/* manifests/
77
+
78
+ touch config-bootstrap.done
71
79
fi
72
80
73
- if [ ! -d kube-apiserver-bootstrap ]
81
+ if [ ! -f kube-apiserver-bootstrap.done ]
74
82
then
75
83
echo " Rendering Kubernetes API server core manifests..."
76
84
85
+ rm -rf kube-apiserver-bootstrap
86
+
77
87
# shellcheck disable=SC2154
78
88
podman run \
79
89
--volume " $PWD :/assets:z" \
@@ -90,12 +100,16 @@ then
90
100
cp kube-apiserver-bootstrap/config /etc/kubernetes/bootstrap-configs/kube-apiserver-config.yaml
91
101
cp kube-apiserver-bootstrap/bootstrap-manifests/* bootstrap-manifests/
92
102
cp kube-apiserver-bootstrap/manifests/* manifests/
103
+
104
+ touch kube-apiserver-bootstrap.done
93
105
fi
94
106
95
- if [ ! -d kube-controller-manager-bootstrap ]
107
+ if [ ! -f kube-controller-manager-bootstrap.done ]
96
108
then
97
109
echo " Rendering Kubernetes Controller Manager core manifests..."
98
110
111
+ rm -rf kube-controller-manager-bootstrap
112
+
99
113
# shellcheck disable=SC2154
100
114
podman run \
101
115
--volume " $PWD :/assets:z" \
@@ -110,12 +124,16 @@ then
110
124
cp kube-controller-manager-bootstrap/config /etc/kubernetes/bootstrap-configs/kube-controller-manager-config.yaml
111
125
cp kube-controller-manager-bootstrap/bootstrap-manifests/* bootstrap-manifests/
112
126
cp kube-controller-manager-bootstrap/manifests/* manifests/
127
+
128
+ touch kube-controller-manager-bootstrap.done
113
129
fi
114
130
115
- if [ ! -d kube-scheduler-bootstrap ]
131
+ if [ ! -f kube-scheduler-bootstrap.done ]
116
132
then
117
133
echo " Rendering Kubernetes Scheduler core manifests..."
118
134
135
+ rm -rf kube-scheduler-bootstrap
136
+
119
137
# shellcheck disable=SC2154
120
138
podman run \
121
139
--volume " $PWD :/assets:z" \
@@ -129,12 +147,16 @@ then
129
147
cp kube-scheduler-bootstrap/config /etc/kubernetes/bootstrap-configs/kube-scheduler-config.yaml
130
148
cp kube-scheduler-bootstrap/bootstrap-manifests/* bootstrap-manifests/
131
149
cp kube-scheduler-bootstrap/manifests/* manifests/
150
+
151
+ touch kube-scheduler-bootstrap.done
132
152
fi
133
153
134
- if [ ! -d mco-bootstrap ]
154
+ if [ ! -f mco-bootstrap.done ]
135
155
then
136
156
echo " Rendering MCO manifests..."
137
157
158
+ rm -rf mco-bootstrap
159
+
138
160
# shellcheck disable=SC2154
139
161
podman run \
140
162
--user 0 \
168
190
mkdir --parents /etc/ssl/mcs/
169
191
cp tls/machine-config-server.crt /etc/ssl/mcs/tls.crt
170
192
cp tls/machine-config-server.key /etc/ssl/mcs/tls.key
193
+
194
+ touch mco-bootstrap.done
171
195
fi
172
196
173
197
# We originally wanted to run the etcd cert signer as
0 commit comments