-
Notifications
You must be signed in to change notification settings - Fork 564
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add capkk #2478
base: feature-gitops
Are you sure you want to change the base?
feat: add capkk #2478
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: redscholar The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
47b297e
to
c6b8087
Compare
app: capkk-controller-manager | ||
spec: | ||
containers: | ||
- args: |
Check warning
Code scanning / SonarCloud
Memory limits should be enforced Medium
periodSeconds: 10 | ||
securityContext: | ||
allowPrivilegeEscalation: false | ||
serviceAccountName: capkk |
Check warning
Code scanning / SonarCloud
Service account permissions should be restricted Medium
6abb2fb
to
c21d36c
Compare
app: kk-controller-manager | ||
spec: | ||
containers: | ||
- args: |
Check warning
Code scanning / SonarCloud
Memory limits should be enforced Medium
periodSeconds: 10 | ||
securityContext: | ||
allowPrivilegeEscalation: false | ||
serviceAccountName: capkk |
Check warning
Code scanning / SonarCloud
Service account permissions should be restricted Medium
resources: | ||
- jobs | ||
- cronjobs | ||
- '*' |
Check warning
Code scanning / SonarCloud
Wildcards should not be used to define RBAC permissions Medium
c7c6c0b
to
0eaa5d8
Compare
- controlplane.cluster.x-k8s.io | ||
- infrastructure.cluster.x-k8s.io | ||
resources: | ||
- '*' |
Check warning
Code scanning / SonarCloud
Wildcards should not be used to define RBAC permissions Medium
- apiGroups: | ||
- kubekey.kubesphere.io | ||
resources: | ||
- '*' |
Check warning
Code scanning / SonarCloud
Wildcards should not be used to define RBAC permissions Medium
Quality Gate failedFailed conditions See analysis details on SonarQube Cloud Catch issues before they fail your Quality Gate with our IDE extension SonarQube for IDE |
What type of PR is this?
/kind feature
What this PR does / why we need it:
build image
use command
REGISTRY=xxxx make docker-push
Deploying CAPKK
REGISTRY=xxxx make generate
The generated file will be located at:
config/capkk/infrastructure-components.yaml (This will be included in the release package).
clusterctl init -i kubekey
Starting from release 4.x, you can deploy CAPKK inline with a simplified command:
clusterctl init -i kubekey
Which issue(s) this PR fixes:
Fixes #
#2456 (comment)
Special notes for reviewers:
Does this PR introduced a user-facing change?
Additional documentation, usage docs, etc.: