-
Notifications
You must be signed in to change notification settings - Fork 93
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Helm chart updated for ExternalDNS, rfc2136 provider, in order to support GSS-TSIG authentication configuration. #1064
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
hi @v-esteves , thanks a lot for this contribution!
Could you please extend documentation briefly describing this functionality?
Please follow the steps described in https://github.com/k8gb-io/k8gb/blob/master/CONTRIBUTING.md#documentation
Was this change tested end-to-end? If yes, please describe how in the commit message
Please also comply with DCO by signing your commits with git commit -s
Thanks a ton!
name: kerberos-config-volume | ||
subPath: krb5.conf | ||
{{- end }} | ||
{{- if .Values.rfc2136.rfc2136auth.gssTsig.enabled }} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can't this be simplified to one block? The condition is the same as the previous one, is there an issue with indentation?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Agree. I was leaving room for future updates, that are not only related with the required configuration for GSS-TSIG, but for the moment we can simplify and set everything in one block.
I'll do that right away.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
these changes are also part of your other pr #1065 right?
Please name the pull request better. 1061 fix
is very cryptic :D
…ation for ExternalDNS Signed-off-by: vestevesaws@gmail.com <x191116@MacBook-Pro-de-Vitor.local>
… for kerberos configuration file from config-map Signed-off-by: vestevesaws@gmail.com <x191116@MacBook-Pro-de-Vitor.local>
…he ConfigMap with a krb5.conf configuration for Kerberos authentication (GSS-TSIG). Also updated the values.schema.json and values.yaml for this new input. README.md was updated with the correct description of the values.yaml structure with the new inputs for the rfc2136 provider configuration Signed-off-by: vestevesaws@gmail.com <x191116@MBP-de-Vitor.home> Signed-off-by: vestevesaws@gmail.com <x191116@MacBook-Pro-de-Vitor.local>
Changed to allow the configuration of the provider RFC2136 with GSS-TSIG Fixes k8gb-io#1061 Signed-off-by: vestevesaws@gmail.com <x191116@MacBook-Pro-de-Vitor.local>
✅ Deploy Preview for k8gb-preview ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
You have successfully added a new terrascan configuration |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
left minor doc comments, thanks a lot for the contribution
docs/provider_rfc2136.md
Outdated
| rfc2136.rfc2136auth.gssTsig.kerberosConfigMap | string | `"kerberos-configmap"` | When using GSS-TSIG, a ConfigMap with a valid krb5.conf configuration should be provided | | ||
| rfc2136.rfc2136auth.gssTsig.gssTsigCreds[0].kerberos-username | string | `"ad-user-account"` | AD user account with permissions for DNS updates | | ||
| rfc2136.rfc2136auth.gssTsig.gssTsigCreds[1].kerberos-password | string | `"ad-user-account-password"` | Passowrd of the AD user account | | ||
| rfc2136.rfc2136auth.gssTsig.gssTsigCreds[2].kerberos-realm | string | `"REALM.DOMAIN"` | Kerberos REALM that should be used for authentication | |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks like helm values are duplicated with the main README https://github.com/k8gb-io/k8gb/pull/1064/files#diff-a9751a1d587556fed5161a73d263258bfeb7b5c4632430d9ec0d853529539aa9R98. ? Should we avoid duplication to keep it at the same place?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've removed those duplicated values and added a reference to the readme with the Helm values description. This way there isn't duplicated text and updates are only in one place.
…ed duplicaded Helm Values from RFC2136 provider tutorial. Signed-off-by: vestevesaws@gmail.com <x191116@MacBook-Pro-de-Vitor.local>
@v-esteves thanks a lot for the consolidation, it really helps! Can you please resolve the conflict in README.md? |
…lues. Signed-off-by: vestevesaws@gmail.com <x191116@MBP-de-Vitor.lan>
Signed-off-by: Vitor Esteves <64093608+v-esteves@users.noreply.github.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@v-esteves last bit before the merge I believe :)
Please also check the golic output https://github.com/k8gb-io/k8gb/actions/runs/5819518828/job/15780744306?pr=1064#step:5:84 |
Signed-off-by: Yury Tsarev <yury@upbound.io>
Signed-off-by: vestevesaws@gmail.com <x191116@MBP-de-Vitor.home>
Signed-off-by: Vitor Esteves <64093608+v-esteves@users.noreply.github.com>
@ytsarev I've added the link in main Readme.md has requested. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
unfortunately all terratest pipelines are still failing :( we need to investigate
@ytsarev can I help with something regarding those falling tests? Let me know what can I do from our end. |
@v-esteves it looks like terratest is failing for the reason, we need to debug the test pipeline. If you can try to validate the local terratest run it will be great. |
Signed-off-by: Vitor Esteves <64093608+v-esteves@users.noreply.github.com>
…cted. This will ensure that current running workloads using TSIG authentication for BIND will not break due to change on the helm values list for provider 2136. Added validations to _helpers template, in order to ensure that provider2136 options are not added to the external DNS deployment configuration, when provider2136 isn't enabled. Signed-off-by: Vitor Esteves <x191116@MacBook-Pro-de-Vitor.local>
@ytsarev like we have discussed before, the problem was regarding the new values that should be added to the helm statement, in order to deploy correctly External DNS. |
@v-esteves great solution with the backward compatibility 👍 Thank you so much! |
* Release `v0.12.0` with Cloudflare(k8gb-io#1278) and GSS-TSIG support(k8gb-io#1064) * Inline maintainer list update to be aligned with https://github.com/k8gb-io/k8gb/blob/master/CODEOWNERS Signed-off-by: Yury Tsarev <yury@upbound.io>
* Release `v0.12.0` with Cloudflare(k8gb-io#1278) and GSS-TSIG support(k8gb-io#1064) * Inline maintainer list update to be aligned with https://github.com/k8gb-io/k8gb/blob/master/CODEOWNERS Signed-off-by: Yury Tsarev <yury@upbound.io>
* Release `v0.12.0` with Cloudflare(#1278) and GSS-TSIG support(#1064) * Inline maintainer list update to be aligned with https://github.com/k8gb-io/k8gb/blob/master/CODEOWNERS Signed-off-by: Yury Tsarev <yury@upbound.io>
Changed helm template for external-dns as well as the values.yaml and values.schema.json to support several authentication types in the provider RFC2136.
The previous version only supported RFC2136 configuration for TSIG, which doesn't work with Windows DNS.
Fixes #1061
Fixes #929