@@ -437,36 +437,82 @@ That is, for most helm charts, you'll need to set an individual value.
437
437
438
438
# ## Proper test
439
439
440
- * Start cluster:
440
+ ** Some hints before getting started**
441
+
442
+ * Follow these steps in order
443
+ * Important: Harbor has to be set up after initializing the cluster, but before installing GOP.
444
+ Otherwise GOP deploys its own registry, leading to port conflicts:
445
+ ` Service " harbor" is invalid: spec.ports[0].nodePort: Invalid value: 30000: provided port is already allocated`
446
+ * By default, ` docker run` relies on the ` gitops-playground:dev` image.
447
+ See [here](# Local-development) how to build it, or change `GOP_IMAGE` bellow to e.g. `ghcr.io/cloudogu/gitops-playground`
448
+
449
+ ** Setup**
450
+
451
+ * Start cluster and deploy harbor (same setup as [above](# external-registry-for-development), but with Port `30000`)
452
+
441
453
` ` ` shell
442
454
scripts/init-cluster.sh
455
+ helm repo add harbor https://helm.goharbor.io
456
+ helm upgrade -i my-harbor harbor/harbor --version 1.14.2 --namespace harbor --create-namespace --values - << EOF
457
+ expose:
458
+ type: nodePort
459
+ nodePort:
460
+ ports:
461
+ http:
462
+ nodePort: 30000
463
+ tls:
464
+ enabled: false
465
+ externalURL: http://localhost:30000
466
+ internalTLS:
467
+ enabled: false
468
+ chartMuseum:
469
+ enabled: false
470
+ clair:
471
+ enabled: false
472
+ trivy:
473
+ enabled: false
474
+ notary:
475
+ enabled: false
476
+ EOF
443
477
` ` `
444
- * Setup harbor as stated [above](# external-registry-for-development), but with Port `30000`.
445
- Wait for harbor to startup: ` kubectl get pod -n harbor`
446
- Don' t care about crashing harbor `jobservice`
478
+
447
479
* Create registries and base image:
448
480
449
481
` ` ` bash
482
+ # Hit the API to see when harbor is ready
483
+ until curl -s -o /dev/null -w " %{http_code}" http://localhost:30000/api/v2.0/projects | grep -q " 200" ; do
484
+ echo " Waiting for harbor"
485
+ sleep 1
486
+ done
487
+
488
+ declare -A roles
489
+ roles[' maintainer' ]=' 4'
490
+ roles[' limited-guest' ]=' 5'
491
+
450
492
operations=(" Proxy" " Registry" )
493
+ readOnlyUser=' RegistryRead'
451
494
452
495
for operation in " ${operations[@]} " ; do
453
496
454
497
# Convert the operation to lowercase for the project name and email
455
498
lower_operation=$( echo " $operation " | tr ' [:upper:]' ' [:lower:]' )
456
499
457
- echo creating project $lower_operation
458
- projectId=$(curl -is --fail ' http://localhost:30000/api/v2.0/projects' -X POST -u admin:Harbor12345 -H ' Content-Type: application/json' --data-raw "{\"project_name\":\"$lower_operation\",\"metadata\":{\"public\":\"false\"},\"storage_limit\":-1,\"registry_id\":null}" | grep -i ' Location:' | awk ' {print $2 }' | awk -F ' /' ' {print $NF }' | tr -d ' [:space:]' )
500
+ echo " creating project ${ lower_operation} "
501
+ projectId=$( curl -is --fail ' http://localhost:30000/api/v2.0/projects' -X POST -u admin:Harbor12345 -H ' Content-Type: application/json' --data-raw " {\" project_name\" :\" $lower_operation \" ,\" metadata\" :{\" public\" :\" false\" },\" storage_limit\" :-1,\" registry_id\" :null}" | grep -i ' Location:' | awk ' {print $2}' | awk -F ' /' ' {print $NF}' | tr -d ' [:space:]' )
459
502
460
- echo creating user $operation with PW ${operation}12345
503
+ echo creating user ${ operation} with PW ${operation} 12345
461
504
curl -s --fail ' http://localhost:30000/api/v2.0/users' -X POST -u admin:Harbor12345 -H ' Content-Type: application/json' --data-raw " {\" username\" :\" $operation \" ,\" email\" :\" $operation @example.com\" ,\" realname\" :\" $operation example\" ,\" password\" :\" ${operation} 12345\" ,\" comment\" :null}"
462
505
463
- echo "Adding member $operation to project $lower_operation; ID=${projectId}"
464
-
465
- curl --fail "http://localhost:30000/api/v2.0/projects/${projectId}/members" -X POST -u admin:Harbor12345 -H ' Content-Type: application/json' --data-raw "{\"role_id\":4,\"member_user\":{\"username\":\"$operation\"}}"
506
+ echo " Adding member ${operation} to project ${lower_operation} ; ID=${projectId} "
507
+ curl --fail " http://localhost:30000/api/v2.0/projects/${projectId} /members" -X POST -u admin:Harbor12345 -H ' Content-Type: application/json' --data-raw " {\" role_id\" :${roles['maintainer']} ,\" member_user\" :{\" username\" :\" $operation \" }}"
466
508
done
467
509
510
+ echo " creating user ${readOnlyUser} with PW ${readOnlyUser} 12345"
511
+ curl -s --fail ' http://localhost:30000/api/v2.0/users' -X POST -u admin:Harbor12345 -H ' Content-Type: application/json' --data-raw " {\" username\" :\" $readOnlyUser \" ,\" email\" :\" $readOnlyUser @example.com\" ,\" realname\" :\" $readOnlyUser example\" ,\" password\" :\" ${readOnlyUser} 12345\" ,\" comment\" :null}"
512
+ echo " Adding member ${readOnlyUser} to project proxy; ID=${projectId} "
513
+ curl --fail " http://localhost:30000/api/v2.0/projects/${projectId} /members" -X POST -u admin:Harbor12345 -H ' Content-Type: application/json' --data-raw " {\" role_id\" :${roles['limited-guest']} ,\" member_user\" :{\" username\" :\" ${readOnlyUser} \" }}"
514
+
468
515
# When updating the container image versions note that all images of a chart are listed at artifact hub on the right hand side under "Containers Images"
469
- skopeo copy docker://eclipse-temurin:11-jre-alpine --dest-creds Proxy:Proxy12345 --dest-tls-verify=false docker://localhost:30000/proxy/eclipse-temurin:11-jre-alpine
470
516
skopeo copy docker://ghcr.io/cloudogu/mailhog:v1.0.1 --dest-creds Proxy:Proxy12345 --dest-tls-verify=false docker://localhost:30000/proxy/mailhog
471
517
skopeo copy docker://ghcr.io/external-secrets/external-secrets:v0.9.16 --dest-creds Proxy:Proxy12345 --dest-tls-verify=false docker://localhost:30000/proxy/external-secrets
472
518
skopeo copy docker://hashicorp/vault:1.14.0 --dest-creds Proxy:Proxy12345 --dest-tls-verify=false docker://localhost:30000/proxy/vault
@@ -484,26 +530,35 @@ skopeo copy docker://quay.io/kiwigrid/k8s-sidecar:1.27.4 --dest-creds Proxy:Prox
484
530
skopeo copy docker://quay.io/jetstack/cert-manager-controller:v1.16.1 --dest-creds Proxy:Proxy12345 --dest-tls-verify=false docker://localhost:30000/proxy/cert-manager-controller
485
531
skopeo copy docker://quay.io/jetstack/cert-manager-cainjector:v1.16.1 --dest-creds Proxy:Proxy12345 --dest-tls-verify=false docker://localhost:30000/proxy/cert-manager-cainjector
486
532
skopeo copy docker://quay.io/jetstack/cert-manager-webhook:v1.16.1 --dest-creds Proxy:Proxy12345 --dest-tls-verify=false docker://localhost:30000/proxy/cert-manager-webhook
487
-
533
+ # Needed for the builds to work with proxy-registry
534
+ skopeo copy docker://bitnami/kubectl:1.29 --dest-creds Proxy:Proxy12345 --dest-tls-verify=false docker://localhost:30000/proxy/bitnami/kubectl:1.29
535
+ skopeo copy docker://eclipse-temurin:11-jre-alpine --dest-creds Proxy:Proxy12345 --dest-tls-verify=false docker://localhost:30000/proxy/eclipse-temurin:11-jre-alpine
536
+ skopeo copy docker://ghcr.io/cloudogu/helm:3.16.1-1 --dest-creds Proxy:Proxy12345 --dest-tls-verify=false docker://localhost:30000/proxy/helm:latest
488
537
` ` `
489
538
490
539
* Deploy playground:
491
540
492
541
` ` ` bash
493
- docker run --rm -t -u $(id -u) \
494
- -v ~/.config/k3d/kubeconfig-gitops-playground.yaml:/home/.kube/config \
495
- --net=host \
496
- gitops-playground:dev -x \
542
+ GOP_IMAGE=gitops-playground:dev # Non-local alternative: ghcr.io/cloudogu/gitops-playground
543
+
544
+ docker run --rm -t -u $(id -u) \
545
+ -v ~/.config/k3d/kubeconfig-gitops-playground.yaml:/home/.kube/config \
546
+ --net=host \
547
+ ${GOP_IMAGE} -x \
497
548
--yes --argocd --ingress-nginx --base-url=http://localhost \
498
- --vault=dev --monitoring --mailhog \
549
+ --vault=dev --monitoring --mailhog --cert-manager \
499
550
--create-image-pull-secrets \
500
551
--registry-url=localhost:30000 \
501
552
--registry-path=registry \
502
- --registry-username=Registry \
553
+ --registry-username=Registry \
503
554
--registry-password=Registry12345 \
504
555
--registry-proxy-url=localhost:30000 \
505
556
--registry-proxy-username=Proxy \
506
557
--registry-proxy-password=Proxy12345 \
558
+ --registry-username-read-only=RegistryRead \
559
+ --registry-password-read-only=RegistryRead12345 \
560
+ --kubectl-image=localhost:30000/proxy/bitnami/kubectl:1.29 \
561
+ --helm-image=localhost:30000/proxy/helm:latest \
507
562
--petclinic-image=localhost:30000/proxy/eclipse-temurin:11-jre-alpine \
508
563
--mailhog-image=localhost:30000/proxy/mailhog:latest \
509
564
--vault-image=localhost:30000/proxy/vault:latest \
@@ -512,11 +567,14 @@ docker run --rm -t -u $(id -u) \
512
567
--external-secrets-webhook-image=localhost:30000/proxy/external-secrets:latest \
513
568
--nginx-image=localhost:30000/proxy/nginx:latest \
514
569
--ingress-nginx-image=localhost:30000/proxy/ingress-nginx:latest \
570
+ --cert-manager-image=localhost:30000/proxy/cert-manager-controller:latest \
571
+ --cert-manager-webhook-image=localhost:30000/proxy/cert-manager-webhook:latest \
572
+ --cert-manager-cainjector-image=localhost:30000/proxy/cert-manager-cainjector:latest \
515
573
--prometheus-image=localhost:30000/proxy/prometheus:v2.51.2 \
516
574
--prometheus-operator-image=localhost:30000/proxy/prometheus-operator:latest \
517
575
--prometheus-config-reloader-image=localhost:30000/proxy/prometheus-config-reloader:latest \
518
576
--grafana-image=localhost:30000/proxy/grafana:latest \
519
- --grafana-sidecar-image=localhost:30000/proxy/k8s-sidecar:latest
577
+ --grafana-sidecar-image=localhost:30000/proxy/k8s-sidecar:latest \
520
578
# Or with config file --config-file=/config/gitops-playground.yaml
521
579
` ` `
522
580
@@ -531,7 +589,8 @@ That's why we need to initialize our local cluster with some netpols for everyth
531
589
After the cluster is initialized and before GOP is applied, do the following:
532
590
533
591
```bash
534
- k apply --namespace " $ns " -f- << EOF
592
+ # When using harbor, do the same for namespace harbor
593
+ k apply -f- <<EOF
535
594
kind: NetworkPolicy
536
595
apiVersion: networking.k8s.io/v1
537
596
metadata:
0 commit comments