mirror of
https://github.com/ysoftdevs/imagepullsecret-injector.git
synced 2026-01-19 10:07:26 +01:00
Compare commits
20 Commits
imagepulls
...
imagepulls
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
f098c48dcf | ||
|
|
6e67d5b87c | ||
|
|
eb5fe7944b | ||
|
|
c41499b934 | ||
|
|
bc86f0e9ab | ||
|
|
c22716b470 | ||
|
|
ea8755766c | ||
|
|
ec9cd60d14 | ||
|
|
6234301c85 | ||
|
|
af35fd73f0 | ||
|
|
c97fc465e8 | ||
|
|
1523ba232b | ||
|
|
42be5e1041 | ||
|
|
5d9930238a | ||
|
|
ed1b29e8b5 | ||
|
|
761a43ed1f | ||
|
|
4e360ac34f | ||
|
|
ee0e41ff32 | ||
|
|
6c4db7d4d1 | ||
|
|
c7708d06e5 |
2
.github/workflows/release-chart.yaml
vendored
2
.github/workflows/release-chart.yaml
vendored
@@ -52,4 +52,4 @@ jobs:
|
|||||||
with:
|
with:
|
||||||
charts_dir: 'helm'
|
charts_dir: 'helm'
|
||||||
env:
|
env:
|
||||||
CR_TOKEN: '${{ secrets.CR_TOKEN }}'
|
CR_TOKEN: '${{ secrets.GITHUB_TOKEN }}'
|
||||||
7
.github/workflows/release-docker.yaml
vendored
7
.github/workflows/release-docker.yaml
vendored
@@ -4,6 +4,7 @@ on:
|
|||||||
push:
|
push:
|
||||||
branches:
|
branches:
|
||||||
- main
|
- main
|
||||||
|
- devel
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
release:
|
release:
|
||||||
@@ -12,7 +13,7 @@ jobs:
|
|||||||
- name: Checkout
|
- name: Checkout
|
||||||
uses: actions/checkout@v1
|
uses: actions/checkout@v1
|
||||||
with:
|
with:
|
||||||
ref: main
|
ref: ${{ github.ref }}
|
||||||
|
|
||||||
- name: Configure Git
|
- name: Configure Git
|
||||||
run: |
|
run: |
|
||||||
@@ -22,8 +23,8 @@ jobs:
|
|||||||
- name: Build and push docker images (make image)
|
- name: Build and push docker images (make image)
|
||||||
run: make image
|
run: make image
|
||||||
env:
|
env:
|
||||||
DOCKER_USER: '${{ secrets.DOCKER_USER }}'
|
DOCKER_USER: ${GITHUB_ACTOR}
|
||||||
DOCKER_TOKEN: '${{ secrets.DOCKER_TOKEN }}'
|
DOCKER_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
|
||||||
- name: Logout from dockerhub (make docker-logout)
|
- name: Logout from dockerhub (make docker-logout)
|
||||||
run: make docker-logout
|
run: make docker-logout
|
||||||
5
Makefile
5
Makefile
@@ -1,7 +1,8 @@
|
|||||||
# Image URL to use all building/pushing image targets;
|
# Image URL to use all building/pushing image targets;
|
||||||
# Use your own docker registry and image name for dev/test by overridding the
|
# Use your own docker registry and image name for dev/test by overridding the
|
||||||
# IMAGE_REPO, IMAGE_NAME and IMAGE_TAG environment variable.
|
# IMAGE_REPO, IMAGE_NAME and IMAGE_TAG environment variable.
|
||||||
IMAGE_REPO ?= marshallmarshall
|
REPOSITORY_BASE ?= ghcr.io
|
||||||
|
IMAGE_REPO ?= $(REPOSITORY_BASE)/ysoftdevs/imagepullsecret-injector
|
||||||
IMAGE_NAME ?= imagepullsecret-injector
|
IMAGE_NAME ?= imagepullsecret-injector
|
||||||
GENERATOR_IMAGE_NAME ?= webhook-cert-generator
|
GENERATOR_IMAGE_NAME ?= webhook-cert-generator
|
||||||
|
|
||||||
@@ -81,7 +82,7 @@ build-linux:
|
|||||||
image: docker-login build-image push-image
|
image: docker-login build-image push-image
|
||||||
|
|
||||||
docker-login:
|
docker-login:
|
||||||
@echo ${DOCKER_TOKEN} | docker login -u ${DOCKER_USER} --password-stdin
|
@echo "$(DOCKER_TOKEN)" | docker login -u "$(DOCKER_USER)" --password-stdin "$(REPOSITORY_BASE)"
|
||||||
|
|
||||||
docker-logout:
|
docker-logout:
|
||||||
@docker logout
|
@docker logout
|
||||||
|
|||||||
52
README.md
52
README.md
@@ -2,6 +2,10 @@
|
|||||||
|
|
||||||
The responsibility of this webhook is to patch all newly created/updated service account and make sure they all contained proper imagepullsecret configuration.
|
The responsibility of this webhook is to patch all newly created/updated service account and make sure they all contained proper imagepullsecret configuration.
|
||||||
|
|
||||||
|
This repo produces one helm chart available via helm repository https://ysoftdevs.github.io/imagepullsecret-injector. There are also 2 docker images:
|
||||||
|
- `ghcr.io/ysoftdevs/imagepullsecret-injector/imagepullsecret-injector` - the image containing the webhook itself
|
||||||
|
- `ghcr.io/ysoftdevs/imagepullsecret-injector/webhook-cert-generator` - helper image responsible for (re)generating the certificates
|
||||||
|
|
||||||
## Helm description
|
## Helm description
|
||||||
The helm chart consists of 2 parts: the certificate generator and the webhook configuration itself.
|
The helm chart consists of 2 parts: the certificate generator and the webhook configuration itself.
|
||||||
|
|
||||||
@@ -21,22 +25,38 @@ The main part is the deployment and the web hook configuration. The flow is as f
|
|||||||
Of note is also a fact that the chart runs a lookup to the connected cluster to fetch the CA bundle for the MutatingWebhook. This means `helm template` won't work.
|
Of note is also a fact that the chart runs a lookup to the connected cluster to fetch the CA bundle for the MutatingWebhook. This means `helm template` won't work.
|
||||||
|
|
||||||
## Running locally
|
## Running locally
|
||||||
```bash
|
1. Create the prerequisite resources:
|
||||||
kubectl create ns imagepullsecret-injector
|
```bash
|
||||||
|
kubectl create ns imagepullsecret-injector
|
||||||
|
|
||||||
kubectl create secret -n imagepullsecret-injector \
|
kubectl create secret -n imagepullsecret-injector \
|
||||||
generic my-cool-secret-source \
|
generic acr-dockerconfigjson-source \
|
||||||
--from-literal=.dockerconfigjson='<your .dockerconfigjson configuration file>'
|
--type=kubernetes.io/dockerconfigjson \
|
||||||
|
--from-literal=.dockerconfigjson='<your .dockerconfigjson configuration file>'
|
||||||
|
```
|
||||||
|
|
||||||
make build-image
|
1. Build the images and run the chart
|
||||||
helm upgrade -i imagepullsecret-injector \
|
``` bash
|
||||||
--create-namespace -n imagepullsecret-injector \
|
make build-image
|
||||||
helm/imagepullsecret-injector
|
helm upgrade -i imagepullsecret-injector \
|
||||||
```
|
-n imagepullsecret-injector \
|
||||||
|
helm/imagepullsecret-injector
|
||||||
|
```
|
||||||
|
Alternatively, you can use the pre-built, publicly available helm chart and docker images:
|
||||||
|
```bash
|
||||||
|
helm repo add imagepullsecret-injector https://ysoftdevs.github.io/imagepullsecret-injector
|
||||||
|
helm repo update
|
||||||
|
helm upgrade -i imagepullsecret-injector \
|
||||||
|
-n imagepullsecret-injector \
|
||||||
|
magepullsecret-injector/imagepullsecret-injector
|
||||||
|
```
|
||||||
|
|
||||||
To test whether everything works, you can run
|
1. To test whether everything works, you can run
|
||||||
```bash
|
```bash
|
||||||
kubectl create ns yolo
|
kubectl create ns yolo
|
||||||
kubectl get sa -n yolo default -ojsonpath='{.imagePullSecrets}'
|
kubectl get sa -n yolo default -ojsonpath='{.imagePullSecrets}'
|
||||||
```
|
```
|
||||||
The get command should display _some_ non-empty result.
|
The `get` command should display _some_ non-empty result.
|
||||||
|
|
||||||
|
## Releasing locally
|
||||||
|
To authenticate to the docker registry to push the images manually, you will need your own Github Personal Access Token. For more information follow this guide https://docs.github.com/en/packages/guides/migrating-to-github-container-registry-for-docker-images#authenticating-with-the-container-registry
|
||||||
@@ -60,9 +60,9 @@ func main() {
|
|||||||
|
|
||||||
glog.Infof("Running with config: %+v", parameters)
|
glog.Infof("Running with config: %+v", parameters)
|
||||||
|
|
||||||
whsvr := &WebhookServer{
|
whsvr, err := NewWebhookServer(
|
||||||
config: ¶meters,
|
¶meters,
|
||||||
server: &http.Server{
|
&http.Server{
|
||||||
Addr: fmt.Sprintf(":%v", parameters.port),
|
Addr: fmt.Sprintf(":%v", parameters.port),
|
||||||
// This is quite inefficient as it loads file contents on every TLS ClientHello, but ¯\_(ツ)_/¯
|
// This is quite inefficient as it loads file contents on every TLS ClientHello, but ¯\_(ツ)_/¯
|
||||||
TLSConfig: &tls.Config{GetCertificate: func(info *tls.ClientHelloInfo) (*tls.Certificate, error) {
|
TLSConfig: &tls.Config{GetCertificate: func(info *tls.ClientHelloInfo) (*tls.Certificate, error) {
|
||||||
@@ -71,6 +71,9 @@ func main() {
|
|||||||
return &cert, err
|
return &cert, err
|
||||||
}},
|
}},
|
||||||
},
|
},
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
glog.Exitf("Could not create the Webhook server: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// define http server and server handler
|
// define http server and server handler
|
||||||
|
|||||||
@@ -30,6 +30,7 @@ var (
|
|||||||
type WebhookServer struct {
|
type WebhookServer struct {
|
||||||
server *http.Server
|
server *http.Server
|
||||||
config *WhSvrParameters
|
config *WhSvrParameters
|
||||||
|
client *kubernetes.Clientset
|
||||||
}
|
}
|
||||||
|
|
||||||
// Webhook Server parameters
|
// Webhook Server parameters
|
||||||
@@ -57,6 +58,26 @@ var (
|
|||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func NewWebhookServer(parameters *WhSvrParameters, server *http.Server) (*WebhookServer, error) {
|
||||||
|
config, err := rest.InClusterConfig()
|
||||||
|
if err != nil {
|
||||||
|
glog.Errorf("Could not create k8s client: %v", err)
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
clientset, err := kubernetes.NewForConfig(config)
|
||||||
|
if err != nil {
|
||||||
|
glog.Errorf("Could not create k8s clientset: %v", err)
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &WebhookServer{
|
||||||
|
config: parameters,
|
||||||
|
server: server,
|
||||||
|
client: clientset,
|
||||||
|
}, nil
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
func DefaultParametersObject() WhSvrParameters {
|
func DefaultParametersObject() WhSvrParameters {
|
||||||
return WhSvrParameters{
|
return WhSvrParameters{
|
||||||
port: 8443,
|
port: 8443,
|
||||||
@@ -126,46 +147,41 @@ func getCurrentNamespace() string {
|
|||||||
|
|
||||||
func (whsvr *WebhookServer) ensureSecrets(ar *v1beta1.AdmissionReview) error {
|
func (whsvr *WebhookServer) ensureSecrets(ar *v1beta1.AdmissionReview) error {
|
||||||
glog.Infof("Ensuring existing secrets")
|
glog.Infof("Ensuring existing secrets")
|
||||||
namespace := ar.Request.Namespace
|
targetNamespace := ar.Request.Namespace
|
||||||
|
|
||||||
config, err := rest.InClusterConfig()
|
|
||||||
if err != nil {
|
|
||||||
glog.Errorf("Could not create k8s client: %v", err)
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
clientset, err := kubernetes.NewForConfig(config)
|
|
||||||
if err != nil {
|
|
||||||
glog.Errorf("Could not create k8s clientset: %v", err)
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
currentNamespace := getCurrentNamespace()
|
currentNamespace := getCurrentNamespace()
|
||||||
|
|
||||||
glog.Infof("Looking for the source secret")
|
glog.Infof("Looking for the source secret")
|
||||||
sourceSecret, err := clientset.CoreV1().Secrets(whsvr.config.sourceImagePullSecretNamespace).Get(whsvr.config.sourceImagePullSecretName, metav1.GetOptions{})
|
sourceSecret, err := whsvr.client.CoreV1().Secrets(whsvr.config.sourceImagePullSecretNamespace).Get(whsvr.config.sourceImagePullSecretName, metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Errorf("Could not fetch source secret %s in namespace %s: %v", whsvr.config.sourceImagePullSecretName, currentNamespace, err)
|
glog.Errorf("Could not fetch source secret %s in namespace %s: %v", whsvr.config.sourceImagePullSecretName, currentNamespace, err)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
if sourceSecret.Type != corev1.SecretTypeDockerConfigJson {
|
||||||
|
err := fmt.Errorf("source secret %s in namespace %s exists, but has incorrect type (is %s, should be %s)", whsvr.config.sourceImagePullSecretName, currentNamespace, sourceSecret.Type, corev1.SecretTypeDockerConfigJson)
|
||||||
|
glog.Errorf("%v", err)
|
||||||
|
return err
|
||||||
|
}
|
||||||
glog.Infof("Source secret found")
|
glog.Infof("Source secret found")
|
||||||
|
|
||||||
glog.Infof("Looking for the existing target secret")
|
glog.Infof("Looking for the existing target secret")
|
||||||
secret, err := clientset.CoreV1().Secrets(namespace).Get(whsvr.config.targetImagePullSecretName, metav1.GetOptions{})
|
secret, err := whsvr.client.CoreV1().Secrets(targetNamespace).Get(whsvr.config.targetImagePullSecretName, metav1.GetOptions{})
|
||||||
if err != nil && !errors.IsNotFound(err) {
|
if err != nil && !errors.IsNotFound(err) {
|
||||||
glog.Errorf("Could not fetch secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, namespace, err)
|
glog.Errorf("Could not fetch secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, targetNamespace, err)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
if err != nil && errors.IsNotFound(err) {
|
if err != nil && errors.IsNotFound(err) {
|
||||||
glog.Infof("Target secret not found, creating a new one")
|
glog.Infof("Target secret not found, creating a new one")
|
||||||
if _, createErr := clientset.CoreV1().Secrets(namespace).Create(&corev1.Secret{
|
if _, createErr := whsvr.client.CoreV1().Secrets(targetNamespace).Create(&corev1.Secret{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: whsvr.config.targetImagePullSecretName,
|
Name: whsvr.config.targetImagePullSecretName,
|
||||||
Namespace: namespace,
|
Namespace: targetNamespace,
|
||||||
},
|
},
|
||||||
Data: sourceSecret.Data,
|
Data: sourceSecret.Data,
|
||||||
Type: sourceSecret.Type,
|
Type: sourceSecret.Type,
|
||||||
}); createErr != nil {
|
}); createErr != nil {
|
||||||
glog.Errorf("Could not create secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, namespace, err)
|
glog.Errorf("Could not create secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, targetNamespace, err)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
glog.Infof("Target secret created successfully")
|
glog.Infof("Target secret created successfully")
|
||||||
@@ -174,8 +190,8 @@ func (whsvr *WebhookServer) ensureSecrets(ar *v1beta1.AdmissionReview) error {
|
|||||||
|
|
||||||
glog.Infof("Target secret found, updating")
|
glog.Infof("Target secret found, updating")
|
||||||
secret.Data = sourceSecret.Data
|
secret.Data = sourceSecret.Data
|
||||||
if _, err := clientset.CoreV1().Secrets(namespace).Update(secret); err != nil {
|
if _, err := whsvr.client.CoreV1().Secrets(targetNamespace).Update(secret); err != nil {
|
||||||
glog.Errorf("Could not update secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, namespace, err)
|
glog.Errorf("Could not update secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, targetNamespace, err)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
glog.Infof("Target secret updated successfully")
|
glog.Infof("Target secret updated successfully")
|
||||||
|
|||||||
@@ -15,9 +15,9 @@ type: application
|
|||||||
# This is the chart version. This version number should be incremented each time you make changes
|
# This is the chart version. This version number should be incremented each time you make changes
|
||||||
# to the chart and its templates, including the app version.
|
# to the chart and its templates, including the app version.
|
||||||
# Versions are expected to follow Semantic Versioning (https://semver.org/)
|
# Versions are expected to follow Semantic Versioning (https://semver.org/)
|
||||||
version: 0.0.6
|
version: 0.0.18
|
||||||
|
|
||||||
# This is the version number of the application being deployed. This version number should be
|
# This is the version number of the application being deployed. This version number should be
|
||||||
# incremented each time you make changes to the application. Versions are not expected to
|
# incremented each time you make changes to the application. Versions are not expected to
|
||||||
# follow Semantic Versioning. They should reflect the version the application is using.
|
# follow Semantic Versioning. They should reflect the version the application is using.
|
||||||
appVersion: v0.0.8
|
appVersion: 0.0.10
|
||||||
|
|||||||
@@ -89,6 +89,7 @@ apiVersion: certificates.k8s.io/v1
|
|||||||
kind: CertificateSigningRequest
|
kind: CertificateSigningRequest
|
||||||
metadata:
|
metadata:
|
||||||
name: ${csrName}
|
name: ${csrName}
|
||||||
|
namespace: ${namespace}
|
||||||
spec:
|
spec:
|
||||||
signerName: kubernetes.io/kubelet-serving
|
signerName: kubernetes.io/kubelet-serving
|
||||||
groups:
|
groups:
|
||||||
|
|||||||
@@ -5,13 +5,14 @@ metadata:
|
|||||||
labels:
|
labels:
|
||||||
{{- include "imagepullsecret-injector.labels" . | nindent 4 }}
|
{{- include "imagepullsecret-injector.labels" . | nindent 4 }}
|
||||||
spec:
|
spec:
|
||||||
schedule: '* * * * *'
|
schedule: '* * * * 0'
|
||||||
jobTemplate:
|
jobTemplate:
|
||||||
metadata:
|
metadata:
|
||||||
name: "{{ .Release.Name }}"
|
name: "{{ .Release.Name }}"
|
||||||
labels:
|
labels:
|
||||||
{{- include "imagepullsecret-injector.labels" . | nindent 8 }}
|
{{- include "imagepullsecret-injector.labels" . | nindent 8 }}
|
||||||
spec:
|
spec:
|
||||||
|
ttlSecondsAfterFinished: 30
|
||||||
template:
|
template:
|
||||||
spec:
|
spec:
|
||||||
serviceAccountName: imagepullsecret-injector-cert-gen
|
serviceAccountName: imagepullsecret-injector-cert-gen
|
||||||
@@ -21,9 +22,12 @@ spec:
|
|||||||
image: "{{ .Values.certificateGeneratorImage.registry }}/{{ .Values.certificateGeneratorImage.repository }}:{{ .Values.certificateGeneratorImage.tag | default .Chart.AppVersion }}"
|
image: "{{ .Values.certificateGeneratorImage.registry }}/{{ .Values.certificateGeneratorImage.repository }}:{{ .Values.certificateGeneratorImage.tag | default .Chart.AppVersion }}"
|
||||||
command: ["/entrypoint/entrypoint.sh"]
|
command: ["/entrypoint/entrypoint.sh"]
|
||||||
args:
|
args:
|
||||||
- --service="{{ include "imagepullsecret-injector.serviceName" . }}"
|
- --service
|
||||||
- --namespace="{{ .Release.Namespace }}"
|
- "{{ include "imagepullsecret-injector.serviceName" . }}"
|
||||||
- --secret="{{ include "imagepullsecret-injector.certificateSecretName" . }}"
|
- --namespace
|
||||||
|
- "{{ .Release.Namespace }}"
|
||||||
|
- --secret
|
||||||
|
- "{{ include "imagepullsecret-injector.certificateSecretName" . }}"
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: "/entrypoint"
|
- mountPath: "/entrypoint"
|
||||||
name: entrypoint
|
name: entrypoint
|
||||||
|
|||||||
@@ -5,6 +5,7 @@ metadata:
|
|||||||
labels:
|
labels:
|
||||||
{{- include "imagepullsecret-injector.labels" . | nindent 4 }}
|
{{- include "imagepullsecret-injector.labels" . | nindent 4 }}
|
||||||
spec:
|
spec:
|
||||||
|
ttlSecondsAfterFinished: 30
|
||||||
template:
|
template:
|
||||||
spec:
|
spec:
|
||||||
serviceAccountName: imagepullsecret-injector-cert-gen
|
serviceAccountName: imagepullsecret-injector-cert-gen
|
||||||
@@ -14,9 +15,12 @@ spec:
|
|||||||
image: "{{ .Values.certificateGeneratorImage.registry }}/{{ .Values.certificateGeneratorImage.repository }}:{{ .Values.certificateGeneratorImage.tag | default .Chart.AppVersion }}"
|
image: "{{ .Values.certificateGeneratorImage.registry }}/{{ .Values.certificateGeneratorImage.repository }}:{{ .Values.certificateGeneratorImage.tag | default .Chart.AppVersion }}"
|
||||||
command: ["/entrypoint/entrypoint.sh"]
|
command: ["/entrypoint/entrypoint.sh"]
|
||||||
args:
|
args:
|
||||||
- --service="{{ include "imagepullsecret-injector.serviceName" . }}"
|
- --service
|
||||||
- --namespace="{{ .Release.Namespace }}"
|
- "{{ include "imagepullsecret-injector.serviceName" . }}"
|
||||||
- --secret="{{ include "imagepullsecret-injector.certificateSecretName" . }}"
|
- --namespace
|
||||||
|
- "{{ .Release.Namespace }}"
|
||||||
|
- --secret
|
||||||
|
- "{{ include "imagepullsecret-injector.certificateSecretName" . }}"
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: "/entrypoint"
|
- mountPath: "/entrypoint"
|
||||||
name: entrypoint
|
name: entrypoint
|
||||||
|
|||||||
@@ -30,15 +30,16 @@ rules:
|
|||||||
- list
|
- list
|
||||||
- get
|
- get
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- "certificates.k8s.io/v1"
|
- certificates.k8s.io
|
||||||
resources:
|
resources:
|
||||||
- certificatesigningrequests
|
- certificatesigningrequests
|
||||||
verbs:
|
verbs:
|
||||||
- create
|
- create
|
||||||
- list
|
- list
|
||||||
- get
|
- get
|
||||||
|
- delete
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- "certificates.k8s.io/v1"
|
- certificates.k8s.io
|
||||||
resources:
|
resources:
|
||||||
- certificatesigningrequests/approval
|
- certificatesigningrequests/approval
|
||||||
verbs:
|
verbs:
|
||||||
|
|||||||
@@ -21,3 +21,5 @@ webhooks:
|
|||||||
resources: ["serviceaccounts"]
|
resources: ["serviceaccounts"]
|
||||||
admissionReviewVersions: ["v1", "v1beta1"]
|
admissionReviewVersions: ["v1", "v1beta1"]
|
||||||
sideEffects: None
|
sideEffects: None
|
||||||
|
# The default "Fail" option prevents Gardener cluster to be hibernated
|
||||||
|
failurePolicy: Ignore
|
||||||
|
|||||||
@@ -1,21 +1,21 @@
|
|||||||
image:
|
image:
|
||||||
registry: marshallmarshall
|
registry: ghcr.io/ysoftdevs/imagepullsecret-injector
|
||||||
repository: imagepullsecret-injector
|
repository: imagepullsecret-injector
|
||||||
pullPolicy: Always
|
pullPolicy: Always
|
||||||
# Overrides the image tag whose default is the chart appVersion.
|
# Overrides the image tag whose default is the chart appVersion.
|
||||||
tag: ""
|
tag: ""
|
||||||
|
|
||||||
certificateGeneratorImage:
|
certificateGeneratorImage:
|
||||||
registry: marshallmarshall
|
registry: ghcr.io/ysoftdevs/imagepullsecret-injector
|
||||||
repository: webhook-cert-generator
|
repository: webhook-cert-generator
|
||||||
tag: ""
|
tag: ""
|
||||||
|
|
||||||
imagepullsecretInjector:
|
imagepullsecretInjector:
|
||||||
dockerconfigjsonRef:
|
dockerconfigjsonRef:
|
||||||
secretName: my-cool-secret-source
|
secretName: acr-dockerconfigjson-source
|
||||||
secretNamespace: ""
|
secretNamespace: ""
|
||||||
|
|
||||||
targetSecretName: my-cool-secret
|
targetSecretName: acr-dockerconfigjson
|
||||||
ignoreSecretCreationError: false
|
ignoreSecretCreationError: false
|
||||||
allSaNames: false
|
allSaNames: false
|
||||||
saNames:
|
saNames:
|
||||||
|
|||||||
Reference in New Issue
Block a user