File tree 2 files changed +11
-11
lines changed
2 files changed +11
-11
lines changed Original file line number Diff line number Diff line change @@ -122,6 +122,8 @@ internalTLS:
122
122
enabled: false
123
123
124
124
jobservice:
125
+ jobLoggers:
126
+ - stdout
125
127
podAnnotations:
126
128
policy.otomi.io/ignore: psp-allowed-users
127
129
resources:
Original file line number Diff line number Diff line change 8
8
{{- $hasKeycloak := $k | get "enabled" true }}
9
9
{{- $realm := $k | get "realm" "master" }}
10
10
{{- $keycloakIssuer := printf "https://keycloak.%s/realms/%s" $v.cluster.domainSuffix $realm }}
11
- {{- $hasHarbor := $h | get "enabled" false - }}
11
+ {{- $harborRepo := printf "harbor.%s" $v.cluster.domainSuffix }}
12
12
{{- $teams := keys $v.teamConfig.teams }}
13
- {{- $teamNames := list -}}
14
- {{- range $teams -}}
15
- {{- $teamNames = print "team-" . | append $teamNames -}}
16
- {{- end -}}
17
13
18
14
type: Job
19
15
enabled: true
@@ -22,20 +18,22 @@ description: Configure OIDC as a primary auhentication method and populate teams
22
18
name: harbor
23
19
image:
24
20
repository: otomi/tasks
25
- tag: v0.2.6
21
+ tag: v0.2.7
26
22
pullPolicy: IfNotPresent
27
23
nativeSecrets:
28
24
HARBOR_PASSWORD: {{ $h | get "adminPassword" $v.otomi.adminPassword }}
29
25
HARBOR_USER: admin
30
26
OIDC_CLIENT_ID: {{ $hasKeycloak | ternary $k.idp.clientID $o.clientID }}
31
27
OIDC_CLIENT_SECRET: {{ $hasKeycloak | ternary $k.idp.clientSecret $o.clientSecret }}
32
28
env:
33
- HARBOR_BASE_URL: "http://harbor-core.harbor/api/v2.0"
34
- TEAM_NAMES: '{{ $teamNames | sortAlpha | toJson }}'
29
+ DEBUG: '*'
30
+ HARBOR_BASE_URL: http://harbor-core.harbor/api/v2.0
31
+ HARBOR_BASE_REPO_URL: {{ $harborRepo }}
32
+ TEAM_IDS: '{{ $teams | sortAlpha | toJson }}'
35
33
OIDC_ENDPOINT: '{{ $hasKeycloak | ternary $keycloakIssuer $o.issuer }}'
36
- OIDC_GROUPS_CLAIM: ' groups'
37
- OIDC_NAME: ' keycloak'
38
- OIDC_SCOPE: ' openid'
34
+ OIDC_GROUPS_CLAIM: groups
35
+ OIDC_NAME: keycloak
36
+ OIDC_SCOPE: openid
39
37
OIDC_VERIFY_CERT: '{{ not $skipVerify }}'
40
38
script: {{ if $skipVerify }}NODE_TLS_REJECT_UNAUTHORIZED=0 {{ end }}npm run tasks:harbor
41
39
runPolicy: OnSpecChange
You can’t perform that action at this time.
0 commit comments