Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WIP: Helm migration #205

Merged
merged 81 commits into from
Dec 22, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
81 commits
Select commit Hold shift + click to select a range
5b1e0f6
Start of migration to Helm
sabre1041 Oct 17, 2021
b0db5c1
Updates to common chart
sabre1041 Oct 18, 2021
c1d165f
Update .gitignore, Fix Typo in catalogsources Chart (#147)
nasx Oct 21, 2021
22d5917
Corrected items for Nexus resources
sabre1041 Oct 21, 2021
c157808
Application manager
sabre1041 Oct 22, 2021
0bf7e9f
Merge pull request #148 from sabre1041/nexus-resources
nasx Oct 22, 2021
801a1ad
Merge pull request #149 from sabre1041/application-manager
nasx Oct 22, 2021
1b025f7
Adding ansible-rfe-runner Helm Chart. (#150)
nasx Oct 25, 2021
8be7630
Fix for catalogsource chart. Adding variables files for testing opera…
nasx Oct 25, 2021
24c14d8
Adding cnv Helm Chart. (#156)
nasx Oct 27, 2021
ee7a23d
Adding odf Helm Chart. (#153)
nasx Oct 27, 2021
ffabbea
Adding rbac Helm Chart. (#152)
nasx Oct 27, 2021
c3e8528
Adding namespaces Helm Chart. (#154)
nasx Oct 27, 2021
de0e738
Added sealed-secrets helm application (#157)
jordigilh Oct 29, 2021
c20f8d6
Added user-workload-monitoring-config Helm Chart (#160)
jordigilh Nov 4, 2021
efcdd9c
Moving to RHEL 8.5. (#162) (#163)
sabre1041 Nov 10, 2021
e027bff
Adding quay Helm Chart. (#155)
nasx Nov 10, 2021
b2d9892
Adding CNV chart with CR and Operator (#164)
jordigilh Nov 12, 2021
3118d46
Adding Quay chart with subscription (#165)
jordigilh Nov 13, 2021
1588add
Fixes wrong target namespace for CNV operatorGroup (#168)
jordigilh Nov 15, 2021
9f805d0
Fixes quay subscription deletion (#173)
jordigilh Nov 18, 2021
d4f026d
Extract git repo info in quay setup job (#174)
jordigilh Nov 18, 2021
89f4444
Adds RBAC application chart values (#170)
jordigilh Nov 19, 2021
9bb9b8f
Fix/quay namespace mismatch (#179)
jordigilh Nov 21, 2021
0c9f4fa
Add post-install hook delete for nexus job (#176)
jordigilh Nov 21, 2021
5e705d2
Adding RFE Pipelines Helm Chart (#159)
jordigilh Nov 22, 2021
340115f
Fix namespace spelling in User Workload Monitoring (#180)
sabre1041 Nov 24, 2021
bb10edd
adding machineset chart (#166)
jordigilh Nov 24, 2021
e957e9f
Adding HTTPD chart (#167)
jordigilh Nov 24, 2021
79cf3da
Adding Group Sync operator helm chart (#172)
jordigilh Nov 25, 2021
b2bc83d
Added gitops-oauth Helm Chart (#161)
jordigilh Nov 25, 2021
a80b8e8
Updated namespace chart to supprt bootstrapping
sabre1041 Nov 8, 2021
15dbf8f
Updates to application-manager
sabre1041 Nov 21, 2021
12f1997
Values management
sabre1041 Nov 21, 2021
38a7af8
Updates to application-manager
sabre1041 Nov 22, 2021
70471e2
Added bootstrap chart
sabre1041 Nov 22, 2021
3c9f98c
Updated boostrap rbac key name
sabre1041 Nov 22, 2021
b6c5a7f
Updated bootstrap values with operators
sabre1041 Nov 23, 2021
94468fb
Fix operator chart path
sabre1041 Nov 24, 2021
cf0e873
Changes to support breaking out operators
sabre1041 Nov 24, 2021
bfbd4f2
Fixed Nexus parsing issue
sabre1041 Nov 24, 2021
a68157e
Updated Application Manager default retries
sabre1041 Nov 25, 2021
69771c6
Large swath of changes including byo
sabre1041 Nov 26, 2021
0c9e4df
Fixed groups in byo overlay
sabre1041 Nov 26, 2021
6815a3d
Adding image-builder-vm chart
jordigilh Nov 16, 2021
9683375
Fixed mix of labels/annotations
sabre1041 Dec 6, 2021
e3e12d3
Added ImageStream health checking
sabre1041 Dec 7, 2021
d50a7c7
Added updateStrategy to CatalogSource
sabre1041 Dec 7, 2021
1386bc1
Prevent pipelineRuns from being pruned
jordigilh Dec 8, 2021
aada7a9
Merge pull request #181 from sabre1041/bootstrap
nasx Dec 9, 2021
c3c051c
Merge pull request #185 from sabre1041/catalogsource-update
nasx Dec 9, 2021
1329ef7
Merge pull request #171 from jordigilh/image-builder
nasx Dec 9, 2021
095c235
Image Builder VM Updates (#186)
nasx Dec 9, 2021
38c18e9
Merge pull request #187 from jordigilh/fix/prune_pipelineruns
nasx Dec 9, 2021
474d6a1
Image Builder/Nexus Chart Updates (#189)
nasx Dec 10, 2021
cb3834f
Disable manifests & sync waves (#191)
jordigilh Dec 11, 2021
89f6ed1
Enabled linting of charts
sabre1041 Dec 12, 2021
5a374fc
Merge pull request #195 from sabre1041/helm-lint
nasx Dec 12, 2021
3393789
Changed the name of the linting job
sabre1041 Dec 12, 2021
bb4090f
Merge pull request #196 from sabre1041/helm-lint-job-name
nasx Dec 13, 2021
aed5c5c
Added installplan and build to argocd status
jordigilh Dec 13, 2021
cc0a95e
Replaced HCO with Kubevirt+CDI
jordigilh Dec 13, 2021
d4ec7fe
Reorder sync waves
jordigilh Dec 13, 2021
2b2e751
Merge pull request #197 from jordigilh/fix/wave_order
nasx Dec 13, 2021
b6b29d1
Dependency management corrections for init script
sabre1041 Dec 16, 2021
e1be246
Merge pull request #199 from sabre1041/fix-init-script-dependency
nasx Dec 16, 2021
a62664b
Fix typo in installplan and build health status
jordigilh Dec 16, 2021
f3b220b
Merge pull request #200 from jordigilh/fix/argocd_installplan_typo
nasx Dec 16, 2021
5e7fe5d
Added types to all pipeline parameters
sabre1041 Dec 17, 2021
1a6c3c9
Merge pull request #201 from sabre1041/pipeline-types
nasx Dec 17, 2021
f513175
Pipeline Enhancements and Changes for Image Builder 8.5 (#198)
nasx Dec 17, 2021
b7aaaca
Adding httpd-prepare/rpm-file-permissions commands to Dockerfile. (#202)
nasx Dec 19, 2021
1da5711
Removal of Kustomize provisioning
sabre1041 Dec 20, 2021
e5338ad
Merge pull request #204 from sabre1041/helm-migration-remove-kustomize
nasx Dec 20, 2021
b7ab4c6
Removed references to openshift/ in .gitignore
jordigilh Dec 21, 2021
a4dd1a9
Merge pull request #207 from jordigilh/remove_openshift_gitignore
nasx Dec 21, 2021
081cd90
Changed path for volumeclaimtemplate.yaml file
jordigilh Dec 22, 2021
323bace
Merge pull request #208 from jordigilh/fix/basic_walkthrough_doc
nasx Dec 22, 2021
c7fcf40
Removed references to sealed-secrets
jordigilh Dec 22, 2021
dbaaba7
Merge pull request #209 from jordigilh/fix/remove_sealed_secrets_role
nasx Dec 22, 2021
4f36421
Documentation Updates for Helm Migration (#206)
nasx Dec 22, 2021
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
30 changes: 30 additions & 0 deletions .github/workflows/lint.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
name: Lint Charts

on:
pull_request:
paths:
- "charts/**"

jobs:
lint:
runs-on: ubuntu-latest
steps:
- name: Checkout
uses: actions/checkout@v2
with:
fetch-depth: 0

- name: Set up Helm
uses: azure/setup-helm@v1
with:
version: v3.7.2

- uses: actions/setup-python@v2
with:
python-version: 3.7

- name: Set up chart-testing
uses: helm/[email protected]

- name: Run chart-testing (lint)
run: ct lint --config ct.yaml
8 changes: 5 additions & 3 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -1,5 +1,7 @@
local/
openshift/gitops/clusters/overlays/byo/bootstrap/redhat-portal-credentials
openshift/gitops/clusters/overlays/byo/bootstrap/image-builder-ssh-private-key
openshift/gitops/clusters/overlays/byo/bootstrap/image-builder-ssh-public-key
charts/bootstrap/files/ssh/image-builder-ssh-private-key
charts/bootstrap/files/ssh/image-builder-ssh-public-key
.DS_Store
charts/*/charts
charts/*/Chart.lock
examples/values/local
153 changes: 125 additions & 28 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Introduction

RHEL for Edge (RFE) introduces a new model for building and deploying RHEL. This repository (very much a work in progress) will contain necessary documentation and automation to support a GitOps approach to building and delivering RFE content at scale.
RHEL for Edge (RFE) introduces a new model for building and deploying RHEL. This repository contains necessary documentation and automation to support a GitOps approach to building and delivering RFE content at scale.

## Areas of Focus

Expand All @@ -13,7 +13,7 @@ Our design will focus on the following topics:
* Building RFE Images
* Managing/Hosting RFE Artifacts
* Kickstarts
* RFE Tarballs
* RFE OSTree Content
* CI/CD Tooling/Process
* End to End Installation/Update of RFE Deployments
* Managing RFE Deployments at Scale
Expand All @@ -26,72 +26,169 @@ The overall architecture is still being defined. We have split out "Above Site"

![Overall Architecture](/images/overall-architecture.png)

## Deploying Above Site Components
## Above Site Components

All of the Above Site components (see [architecture](#architecture)) will be deployed on OpenShift. Most of these components will be deployed/configured by tools like [Argo CD](https://argoproj.github.io/argo-cd/).
We also chose to use [Sealed Secrets](https://github.com/bitnami-labs/sealed-secrets) to support our GitOps workflow. We leverage an "app of apps" methodology to deploy all of the components and two overlays are provided. The `shared` overylay is used to provision a shared development environment, but most users will want to leverage the `byo` overlay.
OpenShift is used to host all of the above site components. These components include:

### Deploying BYO Overlay
* Helm/Argo CD for GitOps based deployment and configuration
* OpenShift Virtualization for RHEL Image Builder
* OpenShift Pipelines driving Ansible playbooks
* Nexus for artifact storage
* OpenShift Data Foundation (NooBaa only) for general object storage
* Red Hat Quay to host RFE OSTree content

To deploy the above site components we first need to deploy Argo CD. Argo CD is installed using the GitOps operator in OpenShift. If Argo CD is already installed, you can skip to the next [section](#bootstrapping-environment)
## Deploying Above Site Components

#### Argo CD
[Helm](https://helm.sh) and [Argo CD](https://argoproj.github.io/argo-cd/) are used to deploy and manage project components. Helm is used to dynamically generate an app of apps pattern in Argo CD, which in turn will pull in all the necessary Helm charts to deploy the specific components needed in the target environment.

From the root of the repository, run the following command to install the operator:
Before beginning, make sure you have the latest versions of `oc`/`kubectl`, `git`, `tkn` and `helm` clients installed. You will also need to generate SSH key pairs (example using `ssh-keygen` documented below).

```shell
oc apply -k openshift/gitops/manifests/bootstrap/argocd-operator/base
```
### Bootstrapping Environment

Then run the following to deploy an instance of Argo CD.
First clone the repository by running the following command:

```shell
until oc apply -k openshift/gitops/manifests/bootstrap/argocd/base; do sleep 2; done
git clone https://github.com/redhat-cop/rhel-edge-automation-arch.git
```

#### Bootstrapping Environment
#### Prepare Values File & SSH Keypair

Some secrets will need to be created to support the deployment. We will use the Kustomize Secrets Generator to source specific values from files. An SSH key will be needed as well as credentials for the Red Hat Portal. A table of the specific components are laid out below:
Several secrets are created during the deployment. We will need to provide values for those as part of the bootstrap process. A table of the specific components are laid out below:

| Component | Description |
|:-----------------------------|:------------------------------------------------------------------------|
| SSH Key | Use to support key based authentication to the Image Builder VM |
| Red Hat Portal Username | Username to subscribe Image Builder VM |
| Red Hat Portal Password | Password to subscribe Image Builder VM |
| Pool ID | Pool ID use to map the appropriate subscription to the Image Builder VM |
| Pool ID | Red Hat Subscription Manager Pool ID use to map the appropriate subscription to the Image Builder VM |
| Red Hat Portal Offline Token | Token used to access the Red Hat API and download RHEL images |

To generate an SSH key, run the following command:
To generate the SSH keypair, run the following command:

```shell
ssh-keygen -t rsa -b 4096 -C cloud-user@image-builder -f ~/.ssh/image-builder
```

Create symlinks to key you just created into the project:
From the root of the repository, create symlinks to the key pair you just created:

```shell
ln -s ~/.ssh/image-builder charts/bootstrap/files/ssh/image-builder-ssh-private-key
ln -s ~/.ssh/image-builder.pub charts/bootstrap/files/ssh/image-builder-ssh-public-key
```

The rest of the values will be defined in a Helm values file. In the root of the repository, create a file called `examples/values/local/bootstrap.yaml` and add the following:

```yaml
rhsm:
portal:
secretName: redhat-portal-credentials
offlineToken: "Opij2qw3eCf890ujjwec8j..."
password: "changeme"
poolId: "ssa77eke7ahs0123djsdf92340p9okjd"
username: "alice"
```

Be sure to change the values of `offlineToken`, `poolId`, `username`, and `password` to match the details for your account. If you are not sure how to generate an offline token for the Red Hat API, it is documented [here](https://access.redhat.com/articles/3626371#bgenerating-a-new-offline-tokenb-3).

#### Deploy OpenShift GitOps Operator and Argo CD

Once the SSH keypair and values file are in place, we can begin to deploy. Run the following script to install the OpenShift GitOps Operator and Argo CD.

```shell
./setup/init.sh
```


### Deploying

To deploy a reference environment in an empty OpenShift cluster, run the following command:

```shell
ln -s ~/.ssh/image-builder openshift/gitops/clusters/overlays/byo/bootstrap/image-builder-ssh-private-key
ln -s ~/.ssh/image-builder.pub openshift/gitops/clusters/overlays/byo/bootstrap/image-builder-ssh-public-key
helm upgrade -i -n rfe-gitops bootstrap charts/bootstrap/ -f examples/values/local/bootstrap.yaml -f examples/values/deployment/default.yaml
```

Next, modify `openshift/gitops/clusters/overlays/byo/bootstrap/redhat-portal-credentials` and add the Red Hat Portal Username, Password, Pool ID and Offline Token to the appropriate variables. More information about generating an Offline Token can be found [here](https://access.redhat.com/articles/3626371).
The default installation will deploy and configure all of the managed components on the cluster. An HTPasswd identity provider is configured for 5 users (`user{1-5}`) with `openshift` as the password.

You can track the progress of the deployment on the Argo CD dashboard. To get the URL run the following command:

```shell
oc get route argocd-server -n rfe-gitops -ojsonpath='https://{.spec.host}'
```

We are now ready to bootstrap the environment. To do this, run:
The parent application is `rfe-automation`. To verify everything is deployed, `rfe-automation` should show Sycned/Healthy:

```shell
kustomize build --load_restrictor=LoadRestrictionsNone openshift/gitops/clusters/overlays/byo/bootstrap/ | oc apply -f -
$ oc get application rfe-automation -n rfe-gitops
NAME SYNC STATUS HEALTH STATUS
rfe-automation Synced Healthy
```

#### Deploying
### Customizing the Deployment

Helm and Argo CD are used to deploy and manage all of the project components. From a high level, a Helm chart called [application-manager](https://github.com/redhat-cop/rhel-edge-automation-arch/main/helm-migration/charts/application-manager) is used to dynamically build a nested app of apps pattern in Argo CD. Each application in Argo CD is a pointer to a Helm chart that installs and configures a specific project component. When bootstrapping the deployment, a Helm values file is used to tell the application manager which components should be deployed and how they should be configured. Using this pattern gives us a significant amount of flexibility when tailoring deployments to specific environments.

#### Disabling Components

If you want to disable the deployment/management of certain components (for example, if you want to bring your own cluster that has ODF already installed), set `disabled: true` in the chart's values file. For example, to disable ODF, create the following file in `examples/values/local/disable-odf.yaml`:

```yaml
# Dynamically Generated Charts
application-manager:
charts:
# Top Level RFE App of App Chart
rfe-automation:
values:
charts:
# Cluster Configuration App of App Chart
cluster-configs:
values:
charts:
# OpenShift Data Foundations
odf:
disabled: true
```

Pass this values file to helm when deploying the project. For example:

```shell
helm upgrade -i -n rfe-gitops bootstrap charts/bootstrap/ -f examples/values/local/bootstrap.yaml -f examples/values/deployment/default.yaml -f examples/values/local/disable-odf.yaml
```

#### Customizing Components

Each chart in the `charts/` directory has a default values file. These values can be overwritten using the same pattern shown above in [Disabling Components](#disabling-components).

For example, to enable processor emulation for OpenShift Virtualization, set `useEmulation: true` in the chart's values file. Store the following file in `examples/values/local/cnv-processor-emulation.yaml`:

```yaml
---
# Dynamically Generated Charts
application-manager:
charts:
# Top Level RFE App of App Chart
rfe-automation:
values:
charts:
# Cluster Configuration App of App Chart
cluster-configs:
values:
charts:
# OpenShift Virtualization
cnv:
values:
cnv:
debug:
useEmulation: "true"
```

Finally, deploy all of the above site components by running the following:
Pass this values file to helm when deploying the project. For example:

```shell
kustomize build openshift/gitops/clusters/overlays/byo/argocd/manager | oc apply -f -
helm upgrade -i -n rfe-gitops bootstrap charts/bootstrap/ -f examples/values/local/bootstrap.yaml -f examples/values/deployment/default.yaml -f examples/values/local/cnv-processor-emulation.yaml
```

## Basic Walkthrough

A basic workthrough to demonstrate the end to end flow of building RHEL for Edge content and using it to create a RHEL for Edge instance can be found below:
A basic walkthrough to demonstrate the end to end flow of building RHEL for Edge content and using it to create a RHEL for Edge instance can be found below:

* [Basic Walkthrough](docs/basic-walkthrough.md)
6 changes: 0 additions & 6 deletions ansible/playbooks/deploy-sealed-secrets.yaml

This file was deleted.

3 changes: 2 additions & 1 deletion ansible/roles/image-builder/tasks/main.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -39,8 +39,9 @@

- name: Enable Firewall Ports for Cockpit/Composer/Apache
ansible.posix.firewalld:
service: "{{ item }}"
permanent: yes
immediate: yes
service: "{{ item }}"
state: enabled
loop:
- cockpit
Expand Down
6 changes: 3 additions & 3 deletions ansible/roles/iso-generator/defaults/main.yaml
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
iso_fetch_path: http://httpd:8080/images

iso_source_name: rhel-8.4-x86_64-boot.iso
iso_source_name: rhel-8.5-x86_64-boot.iso
iso_source_path: /tmp

iso_mount_base_path: /tmp/boot-iso

# Default name. Can override by passing
# -e "edge_iso_name=<name>" to ansible-playbook command.
edge_iso_name: rfe-8.4-x86_64-auto-kickstart.iso
edge_iso_name: rfe-8.5-x86_64-auto-kickstart.iso
edge_iso_path: /tmp
edge_iso_remote_path: /var/www/html/images

Expand All @@ -18,4 +18,4 @@ scratch_base_path: /tmp/boot-iso-scratch
kickstart_url: http://httpd:8080/kickstarts/hello-world/kickstart.ks

# Override with -e iso_storage_url=$(results.iso-storage-url.path)
iso_storage_url: /tmp/iso-storage-url
iso_storage_url: /tmp/iso-storage-url
5 changes: 3 additions & 2 deletions ansible/roles/nexus-upload/tasks/main.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -48,10 +48,11 @@
ansible.builtin.uri:
force_basic_auth: yes
headers:
Content-Type: application/octet-stream
Content-Type: application/x-iso9660-image
method: PUT
password: "{{ nexus_password }}"
remote_src: "{{ file_to_upload }}"
remote_src: yes
src: "{{ file_to_upload }}"
status_code:
- 201
url: "{{ nexus_http_scheme }}://{{ nexus_service_name }}:{{ nexus_service_port }}/{{ nexus_destination_path }}"
Expand Down
2 changes: 1 addition & 1 deletion ansible/roles/oci-build-auto-iso/tasks/main.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,7 @@
depth: 0
paths: "{{ iso_directory }}"
patterns:
- "{{ build_commit_id }}-.*-boot.iso"
- "{{ build_commit_id }}-installer.iso"
use_regex: yes
register: find_results
failed_when:
Expand Down
2 changes: 1 addition & 1 deletion ansible/roles/oci-publish-content/tasks/main.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@

- name: Wait for Stage Deployment
ansible.builtin.uri:
url: "http://{{ quay_image_path_basename }}-{{ quay_image_tag }}-httpd.rfe.svc.cluster.local/repo"
url: "http://{{ quay_image_path_basename }}-{{ quay_image_tag }}-httpd.rfe.svc.cluster.local/repo/config"
delay: 10
retries: 60

Expand Down
6 changes: 3 additions & 3 deletions ansible/roles/oci-push-image/tasks/main.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@
depth: 0
paths: "{{ tar_directory }}"
patterns:
- "{{ build_commit_id }}-.*-container.tar"
- "{{ build_commit_id }}-container.tar"
use_regex: yes
register: find_results
failed_when:
Expand Down Expand Up @@ -97,10 +97,10 @@
ansible.builtin.command:
argv:
- "skopeo"
- "copy"
- "--command-timeout=10m"
- "--dest-authfile=/var/secrets/publisher/.dockerconfigjson"
- "--dest-tls-verify=false"
- "copy"
- "oci-archive:{{ find_results.files[0].path | quote }}"
- "docker://{{ quay_image_path | quote }}:latest"
become: no
Expand All @@ -113,12 +113,12 @@
ansible.builtin.command:
argv:
- "skopeo"
- "copy"
- "--command-timeout=10m"
- "--src-authfile=/var/secrets/publisher/.dockerconfigjson"
- "--src-tls-verify=false"
- "--dest-authfile=/var/secrets/publisher/.dockerconfigjson"
- "--dest-tls-verify=false"
- "copy"
- "docker://{{ quay_image_path | quote }}:latest"
- "docker://{{ quay_image_path | quote }}:{{ blueprint_version | quote }}"
become: no
Expand Down
12 changes: 8 additions & 4 deletions ansible/roles/oci-stage-content/tasks/main.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -108,7 +108,7 @@
- image: " "
name: httpd
ports:
- containerPort: 80
- containerPort: 8080
protocol: TCP
resources:
requests:
Expand Down Expand Up @@ -138,10 +138,14 @@
namespace: rfe
spec:
ports:
- name: 80-tcp
- name: http-80
port: 80
protocol: TCP
targetPort: 80
targetPort: 8080
- name: http-8080
port: 8080
protocol: TCP
targetPort: 8080
selector:
deployment: "{{ quay_image_path_basename }}-{{ quay_image_tag }}-httpd"
sessionAffinity: None
Expand Down Expand Up @@ -171,7 +175,7 @@
name: "{{ quay_image_path_basename }}-{{ quay_image_tag }}-httpd"
weight: 100
port:
targetPort: 80-tcp
targetPort: http-80
host: "{{ route_host }}"
wildcardPolicy: None
state: present
Expand Down
Loading