-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add initContainers support #308
Conversation
Signed-off-by: ShlomiTubul <[email protected]>
example in GCP GAR:
|
I Assume its working for u, |
it works for me. |
Since the creds expire after 12 hours. |
I don't mount static creds, I only instruct helm to use cred helper, then each time kubecheck run, then |
This looks quite reasonable, and likely is useful for other reasons as well (network sidecars, secret providers, etc). You might also try out the image from the multisource apps PR, as that shifts responsibility for manifest generation back to argocd's repo server. It might resolve your issue in more straightforward way (as I would imagine argocd has already been configured correctly). Be aware that this also requires direct access to the backend repo service, generally located in the image: ghcr.io/zapier/kubechecks:0.0.0-pr298 |
Signed-off-by: ShlomiTubul <[email protected]>
Mergecat's ReviewClick to read mergecats review!😼 Mergecat review of charts/kubechecks/Chart.yaml@@ -1,7 +1,7 @@
apiVersion: v2
name: kubechecks
description: A Helm chart for kubechecks
-version: 0.4.5
+version: 0.4.6
type: application
maintainers:
- name: zapier Feedback & Suggestions: The version bump from 0.4.5 to 0.4.6 is appropriate if there are backward-compatible bug fixes or minor improvements. Ensure that the changes in the codebase reflect this version update. Additionally, consider updating the changelog or release notes to document what changes have been made in this new version. 📈 😼 Mergecat review of charts/kubechecks/templates/deployment.yaml@@ -32,6 +32,10 @@ spec:
{{- end }}
securityContext:
{{- toYaml .Values.deployment.podSecurityContext | nindent 8 }}
+ {{- with .Values.deployment.initContainers }}
+ initContainers:
+ {{- toYaml . | nindent 8 }}
+ {{- end }}
containers:
- name: {{ .Chart.Name }}
{{- with .Values.deployment.image }}
@@ -101,4 +105,4 @@ spec:
{{- end }}
{{- with .Values.deployment.volumes }}
volumes: {{ . | toYaml | nindent 8 }}
- {{- end }}
+ {{- end }}
\ No newline at end of file Feedback & Suggestions:
😼 Mergecat review of charts/kubechecks/templates/service.yaml@@ -3,6 +3,8 @@ apiVersion: v1
kind: Service
metadata:
name: {{ include "kubechecks.fullname" . }}
+ annotations:
+ {{ .Values.service.annotations | toYaml | nindent 4 }}
labels:
{{- include "kubechecks.labels" . | nindent 4 }}
spec: Feedback & Suggestions:
😼 Mergecat review of charts/kubechecks/values.schema.json@@ -102,6 +102,9 @@
"securityContext": {
"type": "object"
},
+ "initContainers": {
+ "type": "array"
+ },
"startupProbe": {
"type": "object"
},
@@ -192,6 +195,9 @@
},
"name": {
"type": "string"
+ },
+ "annotations": {
+ "$ref": "#/$defs/key-value-map"
}
}
}, Feedback & Suggestions:
Dependency ReviewClick to read mergecats review!No suggestions found |
@djeebus, I reviewed the multi-source PR, and aside from all re-factoring, now we call new |
@djeebus can we merge this please ? we really like to start using this great tool ( : |
Currently, there is no option to configure Kubecheck to authenticate against OCI registries like GCR/GAR. By adding support for initContainers, users can set up credential helpers such as docker-credential-gcr to generate a config.json for Docker authentication, the initContainer can also copies the docker-credential-gcr binary into the main Kubecheck container, allowing it to successfully fetch tokens and authenticate