Use kube-webhook-certgen image from quay.io

Allows to avoid docker pull limit issue.

Change-Id: Ic3cb4be1945f95962a185bdfd8d50c6e7746d2e4
Signed-off-by: Ruslan Aliev <raliev@mirantis.com>
This commit is contained in:
Ruslan Aliev 2021-06-28 19:47:49 -05:00
parent 2219c810b8
commit 38849e63d1
5 changed files with 19 additions and 2 deletions

View File

@ -169,3 +169,6 @@ spec:
controlplane:
name: kubeadm-clusterConfiguration
repository: k8s.gcr.io
kube-webhook-certgen:
name: kube-webhook-certgen
repository: quay.io/airshipit/kube-webhook-certgen

View File

@ -15,6 +15,10 @@ spec:
defaultBackend:
enabled: true
controller:
admissionWebhooks:
patch:
image:
repository: quay.io/airshipit/kube-webhook-certgen
service:
type: NodePort
nodePorts:

View File

@ -37,3 +37,13 @@ replacements:
kind: HelmRelease
name: ingress
fieldrefs: ["spec.chart.spec.version"]
- source:
objref:
kind: VersionsCatalogue
name: versions-airshipctl
fieldref: spec.image_repositories.kube-webhook-certgen.repository
target:
objref:
kind: HelmRelease
name: ingress
fieldrefs: ["spec.values.controller.admissionWebhooks.patch.image.repository"]

View File

@ -165,7 +165,7 @@ type VersionsCatalogueSpec struct {
Kubernetes string `json:"kubernetes,omitempty"`
// Allows for the specification of the image repositories
ImageRepositories map[string]ImageRepositorySpec `json:"image_repositories,omitempty"`
ImageRepositories AirshipctlFunctionImageComponentMap `json:"image_repositories,omitempty"`
}
// +kubebuilder:object:root=true

View File

@ -1893,7 +1893,7 @@ func (in *VersionsCatalogueSpec) DeepCopyInto(out *VersionsCatalogueSpec) {
}
if in.ImageRepositories != nil {
in, out := &in.ImageRepositories, &out.ImageRepositories
*out = make(map[string]ImageRepositorySpec, len(*in))
*out = make(AirshipctlFunctionImageComponentMap, len(*in))
for key, val := range *in {
(*out)[key] = val
}