Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Using registry.k8s.io instead of k8s.gcr.io #78

Merged
merged 1 commit into from
Jun 6, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions RELEASE.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,9 +28,9 @@ The Kubernetes Windows GMSA project is released on an as-needed basis. The proce
```bash
K8S_GMSA_DEPLOY_DOWNLOAD_REV='$VERSION' \
./deploy-gmsa-webhook.sh --file ./gmsa-manifests \
--image k8s.gcr.io/gmsa-webhook/k8s-gmsa-webhook:$VERSION
--image registry.k8s.io/gmsa-webhook/k8s-gmsa-webhook:$VERSION
```

1. Clicking on `Publish Release`
1. The release issue is closed
1. An announcement email is sent to `[email protected]` with the subject `[ANNOUNCE] Kubernetes SIG-Windows GMSA Webhook $VERSION is Released`
Expand Down
2 changes: 1 addition & 1 deletion admission-webhook/deploy/deploy-gmsa-webhook.sh
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,7 @@ write_manifests_file() {
ENVS=`env | grep -E 'NAME|NAMESPACE|TLS|RBAC|TOLERATIONS|IMAGE|CA' | sed -n '/^[^\t]/s/=.*//p' | sed '/^$/d' | sed 's/^/-e /g' | tr '\n' ' '`

# envsubst is installed in the nginx images which we already maintain
docker run --rm -v "$TEMPLATE_PATH:$TEMPLATE_PATH" $ENVS k8s.gcr.io/e2e-test-images/nginx:1.15-1 sh -c "cat $TEMPLATE_PATH | envsubst" > $MANIFESTS_FILE
docker run --rm -v "$TEMPLATE_PATH:$TEMPLATE_PATH" $ENVS registry.k8s.io/e2e-test-images/nginx:1.15-1 sh -c "cat $TEMPLATE_PATH | envsubst" > $MANIFESTS_FILE
else
fatal_error "Unable to run envsubst"
fi
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,14 +22,14 @@ spec:
windowsOptions:
gmsaCredentialSpecName: {{ index .CredSpecNames 1 }}
containers:
- image: k8s.gcr.io/pause
- image: registry.k8s.io/pause
name: nginx0
securityContext:
windowsOptions:
gmsaCredentialSpecName: {{ index .CredSpecNames 0 }}
- image: k8s.gcr.io/pause
- image: registry.k8s.io/pause
name: nginx1
- image: k8s.gcr.io/pause
- image: registry.k8s.io/pause
name: nginx2
securityContext:
windowsOptions:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ spec:
spec:
serviceAccountName: {{ .ServiceAccountName }}
containers:
- image: k8s.gcr.io/pause
- image: registry.k8s.io/pause
name: nginx
securityContext:
windowsOptions:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ spec:
windowsOptions:
gmsaCredentialSpecName: {{ index .CredSpecNames 0 }}
containers:
- image: k8s.gcr.io/pause
- image: registry.k8s.io/pause
name: nginx
{{- range $line := .ExtraSpecLines }}
{{ $line }}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ spec:
gmsaCredentialSpecName: {{ index .CredSpecNames 0 }}
gmsaCredentialSpec: '{"CmsPlugins":["ActiveDirectory"], "ActiveDirectoryConfig":{"GroupManagedServiceAccounts":[{"Name":"WebApplication0","Scope":"CONTOSO"},{"Name":"WebApplication0","Scope":"contoso.com"}]},"DomainJoinConfig":{"Sid":"S-1-5-21-2126729477-2524075714-3094792973", "DnsName":"contoso.com","DnsTreeName":"contoso.com","Guid":"244818ae-87ca-4fcd-92ec-e79e5252348a","MachineAccountName":"WebApplication0","NetBiosName":"CONTOSO"}}'
containers:
- image: k8s.gcr.io/pause
- image: registry.k8s.io/pause
name: nginx
{{- range $line := .ExtraSpecLines }}
{{ $line }}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ spec:
gmsaCredentialSpecName: {{ index .CredSpecNames 0 }}
gmsaCredentialSpec: '{"ActiveDirectoryConfig":{"GroupManagedServiceAccounts":[{"Name":"WebApplication1","Scope":"CONTOSO"},{"Name":"WebApplication1","Scope":"contoso.com"}]},"CmsPlugins":["ActiveDirectory"],"DomainJoinConfig":{"DnsName":"contoso.com","DnsTreeName":"contoso.com","Guid":"244818ae-87ca-4fcd-92ec-e79e5252348a","MachineAccountName":"WebApplication1","NetBiosName":"CONTOSO","Sid":"S-1-5-21-2126729477-2524175714-3194792973"}}'
containers:
- image: k8s.gcr.io/pause
- image: registry.k8s.io/pause
name: nginx
{{- range $line := .ExtraSpecLines }}
{{ $line }}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ spec:
spec:
serviceAccountName: {{ .ServiceAccountName }}
containers:
- image: k8s.gcr.io/pause
- image: registry.k8s.io/pause
name: nginx
securityContext:
windowsOptions:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ spec:
windowsOptions:
gmsaCredentialSpec: '{"ActiveDirectoryConfig":{"GroupManagedServiceAccounts":[{"Name":"WebApplication0","Scope":"CONTOSO"},{"Name":"WebApplication0","Scope":"contoso.com"}]},"CmsPlugins":["ActiveDirectory"],"DomainJoinConfig":{"DnsName":"contoso.com","DnsTreeName":"contoso.com","Guid":"244818ae-87ca-4fcd-92ec-e79e5252348a","MachineAccountName":"WebApplication0","NetBiosName":"CONTOSO","Sid":"S-1-5-21-2126729477-2524075714-3094792973"}}'
containers:
- image: k8s.gcr.io/pause
- image: registry.k8s.io/pause
name: nginx
{{- range $line := .ExtraSpecLines }}
{{ $line }}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ spec:
windowsOptions:
gmsaCredentialSpecName: i-sure-dont-exist
containers:
- image: k8s.gcr.io/pause
- image: registry.k8s.io/pause
name: nginx
{{- range $line := .ExtraSpecLines }}
{{ $line }}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ spec:
serviceAccountName: {{ .ServiceAccountName }}
containers:
- name: {{ .TestName }}
image: k8s.gcr.io/pause
image: registry.k8s.io/pause
securityContext:
windowsOptions:
gmsaCredentialSpecName: {{ index .CredSpecNames 0 }}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ spec:
{{- if .Image }}
image: {{ .Image }}
{{- else }}
image: k8s.gcr.io/pause
image: registry.k8s.io/pause
{{- end }}
dnsPolicy: ClusterFirst
restartPolicy: Never
Expand Down
12 changes: 8 additions & 4 deletions charts/README.md
Original file line number Diff line number Diff line change
@@ -1,23 +1,26 @@
# Install Windows GMSA with Helm 3

## Prerequisites

- [install Helm](https://helm.sh/docs/intro/quickstart/#install-helm)

### Tips


### install a specific version

```console
helm repo add windows-gmsa https://raw.githubusercontent.com/kubernetes-sigs/windows-gmsa/master/charts/repo
helm install windows-gmsa/gmsa --namespace kube-system --version v0.4.2
```

### search for all available chart versions

```console
helm search repo -l gmsa
```

## uninstall Windows GMSA

```console
helm uninstall gmsa -n kube-system
```
Expand All @@ -32,19 +35,20 @@ The following table lists the configurable parameters of the latest GMSA chart a
| `certificates.certManager.version` | version of cert manager | |
| `certificates.caBundle` | cert-manager disabled, add self-signed ca.crt in base64 format | |
| `certificates.secretName` | cert-manager disabled, upload certs data as k8s secretName | `gmsa-server-cert` |
| `credential.enabled ` | enable creation of GMSA Credential | `true` |
| `credential.enabled` | enable creation of GMSA Credential | `true` |
| `credential.domainJoinConfig.dnsName` | DNS Domain Name | |
| `credential.domainJoinConfig.dnsTreeName` | DNS Domain Name Root | |
| `credential.domainJoinConfig.guid` | GUID | |
| `credential.domainJoinConfig.machineAccountName` | username of the GMSA account | |
| `credential.domainJoinConfig.netBiosName` | NETBIOS Domain Name | |
| `credential.domainJoinConfig.sid` | SID | |
| `image.repository` | image repository | `k8s.gcr.io/gmsa-webhook/k8s-gmsa-webhook` |
| `image.repository` | image repository | `registry.k8s.io/gmsa-webhook/k8s-gmsa-webhook` |
| `image.tag` | image tag | `v0.4.0` |
| `image.imagePullPolicy` | image pull policy | `IfNotPresent` |
| `global.systemDefaultRegistry ` | container registry | |
| `global.systemDefaultRegistry` | container registry | |
| `tolerations` | tolerations | [] |

## troubleshooting

- Add `--wait -v=5 --debug` in `helm install` command to get detailed error
- Use `kubectl describe` to acquire more info
Binary file added charts/gmsa-0.4.3.tgz
Binary file not shown.
2 changes: 1 addition & 1 deletion charts/gmsa/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -10,4 +10,4 @@ name: gmsa
sources:
- https://github.com/kubernetes-sigs/windows-gmsa
type: application
version: 0.4.2
version: 0.4.3
2 changes: 1 addition & 1 deletion charts/gmsa/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ credential:
containerPort: "443"

image:
repository: k8s.gcr.io/gmsa-webhook/k8s-gmsa-webhook
repository: registry.k8s.io/gmsa-webhook/k8s-gmsa-webhook
tag: v0.4.0
imagePullPolicy: IfNotPresent

Expand Down