46 lines
2.1 KiB
Bash
Executable File
46 lines
2.1 KiB
Bash
Executable File
#!/bin/bash
|
|
#
|
|
# Copyright 2018 Google LLC
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
set -ex
|
|
|
|
# Tests work without these lines. TODO: Verify and remove these lines
|
|
kubectl config set-context $(kubectl config current-context) --namespace=default
|
|
echo "Add necessary cluster role bindings"
|
|
ACCOUNT=$(gcloud info --format='value(config.account)')
|
|
kubectl create clusterrolebinding PROW_BINDING --clusterrole=cluster-admin --user=$ACCOUNT --dry-run -o yaml | kubectl apply -f -
|
|
kubectl create clusterrolebinding DEFAULT_BINDING --clusterrole=cluster-admin --serviceaccount=default:default --dry-run -o yaml | kubectl apply -f -
|
|
|
|
ARGO_VERSION=v2.3.0
|
|
|
|
# if argo is not installed
|
|
if ! which argo; then
|
|
echo "install argo"
|
|
mkdir -p ~/bin/
|
|
export PATH=~/bin/:$PATH
|
|
curl -sSL -o ~/bin/argo https://github.com/argoproj/argo/releases/download/$ARGO_VERSION/argo-linux-amd64
|
|
chmod +x ~/bin/argo
|
|
fi
|
|
|
|
# No need to install here, it comes with kfp lite deployment
|
|
# kubectl create ns argo --dry-run -o yaml | kubectl apply -f -
|
|
# kubectl apply -n argo -f https://raw.githubusercontent.com/argoproj/argo/$ARGO_VERSION/manifests/install.yaml
|
|
|
|
# Some workflows are deployed to the non-default namespace where the GCP credential secret is stored
|
|
# In this case, the default service account in that namespace doesn't have enough permission
|
|
echo "add service account for running the test workflow"
|
|
kubectl create serviceaccount test-runner -n ${NAMESPACE} --dry-run -o yaml | kubectl apply -f -
|
|
kubectl create clusterrolebinding test-admin-binding --clusterrole=cluster-admin --serviceaccount=${NAMESPACE}:test-runner --dry-run -o yaml | kubectl apply -f -
|