mirror of
https://github.com/fluxcd/flux2.git
synced 2025-11-02 02:35:49 +08:00
Add bootstrap git to install docs
Signed-off-by: Stefan Prodan <stefan.prodan@gmail.com>
This commit is contained in:
@ -42,32 +42,57 @@ flux check --pre
|
||||
Using the `flux bootstrap` command you can install Flux on a
|
||||
Kubernetes cluster and configure it to manage itself from a Git
|
||||
repository.
|
||||
|
||||
The bootstrap creates a Git repository if one doesn't exist and
|
||||
commits the Flux components manifests to the main branch. Then it
|
||||
configures the target cluster to synchronize with that repository by
|
||||
setting up SSH deploy keys.
|
||||
|
||||
If the Flux components are present on the cluster, the bootstrap
|
||||
command will perform an upgrade if needed. The bootstrap is
|
||||
idempotent, it's safe to run the command as many times as you want.
|
||||
|
||||
You can choose what components to install and for which cluster with:
|
||||
|
||||
```sh
|
||||
flux bootstrap <GIT-PROVIDER> \
|
||||
--components=source-controller,kustomize-controller,helm-controller,notification-controller \
|
||||
--components-extra=image-reflector-controller,image-automation-controller \
|
||||
--path=clusters/my-cluster
|
||||
```
|
||||
|
||||
!!! hint "Multi-arch images"
|
||||
The component images are published as [multi-arch container images](https://docs.docker.com/docker-for-mac/multi-arch/)
|
||||
with support for Linux `amd64`, `arm64` and `armv7` (e.g. 32bit Raspberry Pi)
|
||||
architectures.
|
||||
|
||||
### Generic Git Server
|
||||
|
||||
The `bootstrap git` command takes an existing Git repository, clones it and
|
||||
commits the Flux components manifests to the specified branch. Then it
|
||||
configures the target cluster to synchronize with that repository.
|
||||
|
||||
Run bootstrap for a Git repository and authenticate with your SSH agent:
|
||||
|
||||
```sh
|
||||
flux bootstrap git \
|
||||
--url=ssh://git@<host>/<org>/<repository> \
|
||||
--branch=<my-branch> \
|
||||
--path=clusters/my-cluster
|
||||
```
|
||||
|
||||
The above command will generate a SSH key (defaults to RSA 2048 but can be changed with `--ssh-key-algorithm`),
|
||||
and it will prompt you to add the SSH public key as a deploy key to your repository.
|
||||
|
||||
If SSH agent is not available on your machine, you can provide a **passwordless** private key using
|
||||
`--private-key-file=<path/to/private.key>`.
|
||||
|
||||
!!! hint "Bootstrap options"
|
||||
There are many options available when bootstrapping Flux, such as installing a subset of Flux components,
|
||||
setting the Kubernetes context, changing the Git author name and email, enabling Git submodules, and more.
|
||||
To list all the available options run `flux bootstrap git --help`.
|
||||
|
||||
If your Git server doesn't support SSH, you can run bootstrap for Git over HTTPS:
|
||||
|
||||
```sh
|
||||
flux bootstrap git \
|
||||
--url=https://<host>/<org>/<repository> \
|
||||
--username=<my-username> \
|
||||
--password=<my-password> \
|
||||
--token-auth=true \
|
||||
--path=clusters/my-cluster
|
||||
```
|
||||
|
||||
If your Git server uses a self-signed TLS certificate, you can specify the CA file with
|
||||
`--ca-file=<path/to/ca.crt>`.
|
||||
|
||||
If you wish to install a specific version, use the Flux
|
||||
[release tag](https://github.com/fluxcd/flux2/releases) e.g. `--version=v0.9.0`.
|
||||
[release tag](https://github.com/fluxcd/flux2/releases) e.g. `--version=v0.12.0`.
|
||||
|
||||
If you wish to deploy the Flux components onto
|
||||
[tainted Kubernetes nodes](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/),
|
||||
@ -84,17 +109,13 @@ cluster e.g. `clusters/staging` and `clusters/production`:
|
||||
│ ├── gotk-components.yaml
|
||||
│ ├── gotk-sync.yaml
|
||||
│ └── kustomization.yaml
|
||||
└── production-cluster # <- path=clusters/production
|
||||
└── production # <- path=clusters/production
|
||||
└── flux-system
|
||||
```
|
||||
|
||||
After running bootstrap you can place Kubernetes YAMLs inside a dir under path
|
||||
e.g. `clusters/staging/my-app`, and Flux will reconcile them on your cluster.
|
||||
|
||||
!!! hint "Change the default branch"
|
||||
If you wish to change the branch to something else than main, create the repository manually,
|
||||
push a branch to origin and then use `flux bootstrap <GIT-PROVIDER> --branch=your-branch`.
|
||||
|
||||
For examples on how you can structure your Git repository see:
|
||||
|
||||
* [flux2-kustomize-helm-example](https://github.com/fluxcd/flux2-kustomize-helm-example)
|
||||
@ -102,6 +123,11 @@ For examples on how you can structure your Git repository see:
|
||||
|
||||
### GitHub and GitHub Enterprise
|
||||
|
||||
The `bootstrap github` command creates a GitHub repository if one doesn't exist and
|
||||
commits the Flux components manifests to specified branch. Then it
|
||||
configures the target cluster to synchronize with that repository by
|
||||
setting up a SSH deploy key or by using token-based authentication.
|
||||
|
||||
Generate a [personal access token](https://help.github.com/en/github/authenticating-to-github/creating-a-personal-access-token-for-the-command-line)
|
||||
that can create repositories by checking all permissions under `repo`.
|
||||
|
||||
@ -166,6 +192,11 @@ flux bootstrap github \
|
||||
|
||||
### GitLab and GitLab Enterprise
|
||||
|
||||
The `bootstrap gitlab` command creates a GitLab repository if one doesn't exist and
|
||||
commits the Flux components manifests to specified branch. Then it
|
||||
configures the target cluster to synchronize with that repository by
|
||||
setting up a SSH deploy key or by using token-based authentication.
|
||||
|
||||
Generate a [personal access token](https://docs.gitlab.com/ee/user/profile/personal_access_tokens.html)
|
||||
that grants complete read/write access to the GitLab API.
|
||||
|
||||
@ -274,162 +305,6 @@ the CLI will use the manifests embedded in its binary instead of downloading
|
||||
them from GitHub. You can determine which version you'll be installing,
|
||||
with `flux --version`.
|
||||
|
||||
### Generic Git Server
|
||||
|
||||
For other Git providers such as Bitbucket, Gogs, Gitea, Azure DevOps, etc
|
||||
you can manually setup the repository and deploy key.
|
||||
|
||||
Create a Git repository and clone it locally:
|
||||
|
||||
```sh
|
||||
git clone ssh://<host>/<org>/my-repository
|
||||
cd my-repository
|
||||
```
|
||||
|
||||
Create a directory inside the repository:
|
||||
|
||||
```sh
|
||||
mkdir -p ./clusters/my-cluster/flux-system
|
||||
```
|
||||
|
||||
Generate the Flux manifests with:
|
||||
|
||||
```sh
|
||||
flux install \
|
||||
--export > ./clusters/my-cluster/flux-system/gotk-components.yaml
|
||||
```
|
||||
|
||||
Commit and push the manifest to the master branch:
|
||||
|
||||
```sh
|
||||
git add -A && git commit -m "add components" && git push
|
||||
```
|
||||
|
||||
Apply the manifests on your cluster:
|
||||
|
||||
```sh
|
||||
kubectl apply -f ./clusters/my-cluster/flux-system/gotk-components.yaml
|
||||
```
|
||||
|
||||
Verify that the controllers have started:
|
||||
|
||||
```sh
|
||||
flux check
|
||||
```
|
||||
|
||||
Create a `GitRepository` object on your cluster by specifying the SSH address of your repo:
|
||||
|
||||
```sh
|
||||
flux create source git flux-system \
|
||||
--url=ssh://git@<host>/<org>/<repository> \
|
||||
--ssh-key-algorithm=ecdsa \
|
||||
--ssh-ecdsa-curve=p521 \
|
||||
--branch=master \
|
||||
--interval=1m
|
||||
```
|
||||
|
||||
You will be prompted to add a deploy key to your repository.
|
||||
If you don't specify the SSH algorithm, then `flux` will generate an RSA 2048 bits key.
|
||||
|
||||
!!! hint "Azure DevOps"
|
||||
Azure DevOps requires a non-default Git implementation (`libgit2`) to be enabled, so that the Git v2 protocol is supported.
|
||||
Note that this implementation does not support shallow cloning, and it is therefore advised to only resort to this option if a
|
||||
connection fails with the default configuration.
|
||||
|
||||
Azure DevOps [only supports RSA SSH keys](https://developercommunity.visualstudio.com/t/support-non-rsa-keys-for-ssh-authentication/365980),
|
||||
you cannot use elliptic curve SSH keys like ecdsa or ed25519.
|
||||
|
||||
Here is how to specify the `libgit2` implementation and generate a proper RSA key:
|
||||
|
||||
```sh
|
||||
flux create source git flux-system \
|
||||
--git-implementation=libgit2 \
|
||||
--ssh-key-algorithm=rsa \
|
||||
--ssh-rsa-bits=4096 \
|
||||
--url=ssh://git@ssh.dev.azure.com/v3/<org>/<project>/<repository> \
|
||||
--branch=main \
|
||||
--interval=1m
|
||||
```
|
||||
|
||||
This config uses the `main` branch, but your repo may be older and need to specify `master` instead.
|
||||
|
||||
Note that unlike `git`, Flux does not support the
|
||||
["shorter" scp-like syntax for the SSH protocol](https://git-scm.com/book/en/v2/Git-on-the-Server-The-Protocols#_the_ssh_protocol)
|
||||
(e.g. `ssh.dev.azure.com:v3`).
|
||||
Use the [RFC 3986 compatible syntax](https://tools.ietf.org/html/rfc3986#section-3) instead: `ssh.dev.azure.com/v3`.
|
||||
|
||||
The `flux create source git` command will prompt you to add a deploy key to your repository, but Azure DevOps
|
||||
[does not support repository or org-specific deploy keys](https://developercommunity.visualstudio.com/t/allow-the-creation-of-ssh-deploy-keys-for-vsts-hos/365747).
|
||||
You may add the deploy key to a user's personal SSH keys being mindful that removing them from the repo may revoke Flux's access.
|
||||
As an alternative, create a machine-user whose sole purpose is to store credentials for automation.
|
||||
Using a machine-user also has the benefit of being able to be read-only or restricted to specific repositories if that is needed.
|
||||
|
||||
If you wish to use Git over HTTPS, then generate a personal access token and supply it as the password:
|
||||
|
||||
```sh
|
||||
flux create source git flux-system \
|
||||
--git-implementation=libgit2 \
|
||||
--url=https://dev.azure.com/<org>/<project>/_git/<repository> \
|
||||
--branch=master \
|
||||
--username=git \
|
||||
--password=${AZ_PAT_TOKEN} \
|
||||
--interval=1m
|
||||
```
|
||||
|
||||
Please consult the [Azure DevOps documentation](https://docs.microsoft.com/en-us/azure/devops/organizations/accounts/use-personal-access-tokens-to-authenticate?view=azure-devops&tabs=preview-page)
|
||||
on how to generate personal access tokens for Git repositories.
|
||||
Azure DevOps PAT's always have an expiration date, so be sure to have some process for renewing or updating these tokens.
|
||||
Similar to the lack of repo-specific deploy keys, a user needs to generate a user-specific PAT.
|
||||
If you are using a machine-user, you can generate a PAT or simply use the machine-user's password which does not expire.
|
||||
|
||||
If your Git server supports basic auth, you can set the URL to HTTPS and specify the credentials with:
|
||||
|
||||
```sh
|
||||
flux create source git flux-system \
|
||||
--url=https://<host>/<org>/my-repository \
|
||||
--username=my-username \
|
||||
--password=my-password \
|
||||
--branch=master \
|
||||
--interval=1m
|
||||
```
|
||||
|
||||
Create a `Kustomization` object on your cluster:
|
||||
|
||||
```sh
|
||||
flux create kustomization flux-system \
|
||||
--source=flux-system \
|
||||
--path="./clusters/my-cluster" \
|
||||
--prune=true \
|
||||
--interval=10m
|
||||
```
|
||||
|
||||
Export both objects, generate a `kustomization.yaml`, commit and push the manifests to Git:
|
||||
|
||||
```sh
|
||||
flux export source git flux-system \
|
||||
> ./clusters/my-cluster/flux-system/gotk-sync.yaml
|
||||
|
||||
flux export kustomization flux-system \
|
||||
>> ./clusters/my-cluster/flux-system/gotk-sync.yaml
|
||||
|
||||
cd ./clusters/my-cluster/flux-system && kustomize create --autodetect
|
||||
|
||||
git add -A && git commit -m "add sync manifests" && git push
|
||||
```
|
||||
|
||||
To upgrade the Flux components to a newer version, download the latest `flux` binary,
|
||||
run the install command and commit the changes:
|
||||
|
||||
```sh
|
||||
flux install \
|
||||
--export > ./clusters/my-cluster/flux-system/gotk-components.yaml
|
||||
|
||||
git add -A && git commit -m "update flux" && git push
|
||||
```
|
||||
|
||||
The source-controller will pull the changes on the cluster, then the kustomize-controller
|
||||
will perform a rolling update of all Flux components including itself.
|
||||
|
||||
## Bootstrap with Terraform
|
||||
|
||||
The bootstrap procedure can be implemented with Terraform using the Flux provider published on
|
||||
|
||||
@ -6,9 +6,10 @@ It's important to follow some guidelines when installing Flux on AKS.
|
||||
|
||||
### CNI and Network Policy
|
||||
|
||||
Previously, there has been an issue with Flux and Network Policy on AKS. ([Upstream Azure Issue](https://github.com/Azure/AKS/issues/2031)) ([Flux Issue](https://github.com/fluxcd/flux2/issues/703))
|
||||
If you ensure your AKS cluster is upgraded, and your Nodes have been restarted with the most recent Node images, this could
|
||||
resolve flux reconciliation failures where source-controller is unreachable.
|
||||
Previously, there has been an issue with Flux and Network Policy on AKS.
|
||||
([Upstream Azure Issue](https://github.com/Azure/AKS/issues/2031)) ([Flux Issue](https://github.com/fluxcd/flux2/issues/703))
|
||||
If you ensure your AKS cluster is upgraded, and your Nodes have been restarted with the most recent Node images,
|
||||
this could resolve flux reconciliation failures where source-controller is unreachable.
|
||||
Using `--network-plugin=azure --network-policy=calico` has been tested to work properly.
|
||||
This issue only affects you if you are using `--network-policy` on AKS, which is not a default option.
|
||||
|
||||
@ -21,24 +22,23 @@ Depending on the features you are interested in using with Flux, you may want to
|
||||
With [AAD Pod-Identity](https://azure.github.io/aad-pod-identity/docs/), we can create Pods that have their own
|
||||
cloud credentials for accessing Azure services like Azure Container Registry(ACR) and Azure Key Vault(AKV).
|
||||
|
||||
If you do not use AAD Pod-Identity, you'll need to manage and store Service Principal credentials in K8s Secrets, to integrate Flux
|
||||
with other Azure Services.
|
||||
If you do not use AAD Pod-Identity, you'll need to manage and store Service Principal credentials
|
||||
in K8s Secrets, to integrate Flux with other Azure Services.
|
||||
|
||||
As a pre-requisite, your cluster must have `--enable-managed-identity` configured.
|
||||
|
||||
This software can be [installed via Helm](https://azure.github.io/aad-pod-identity/docs/getting-started/installation/) (unmanaged by Azure).
|
||||
Use Flux's `HelmRepository` and `HelmRelease` object to manage the aad-pod-identity installation from a bootstrap repository and keep it up to date.
|
||||
This software can be [installed via Helm](https://azure.github.io/aad-pod-identity/docs/getting-started/installation/)
|
||||
(unmanaged by Azure).
|
||||
Use Flux's `HelmRepository` and `HelmRelease` object to manage the aad-pod-identity installation
|
||||
from a bootstrap repository and keep it up to date.
|
||||
|
||||
!!! note
|
||||
As an alternative to Helm, the `--enable-aad-pod-identity` flag for the `az aks create` is currently in Preview.
|
||||
Follow the Azure guide for [Creating an AKS cluster with AAD Pod Identity](https://docs.microsoft.com/en-us/azure/aks/use-azure-ad-pod-identity) if you would like to enable this feature with the Azure CLI.
|
||||
Follow the Azure guide for [Creating an AKS cluster with AAD Pod Identity](https://docs.microsoft.com/en-us/azure/aks/use-azure-ad-pod-identity)
|
||||
if you would like to enable this feature with the Azure CLI.
|
||||
|
||||
### Cluster Creation
|
||||
|
||||
!!! info
|
||||
When working with the Azure CLI, it can help to set a default `location`, `group`, and `acr`.
|
||||
See `az configure --help`, `az configure --list-defaults`, and `az configure --defaults key=value`
|
||||
|
||||
The following creates an AKS cluster with some minimal configuration that will work well with Flux:
|
||||
|
||||
```sh
|
||||
@ -50,10 +50,14 @@ az aks create \
|
||||
--name="my-cluster"
|
||||
```
|
||||
|
||||
!!! info
|
||||
When working with the Azure CLI, it can help to set a default `location`, `group`, and `acr`.
|
||||
See `az configure --help`, `az configure --list-defaults`, and `az configure --defaults key=value`.
|
||||
|
||||
## Flux Installation with Azure DevOps Repos
|
||||
|
||||
Ensure you can login to [dev.azure.com](https://dev.azure.com) for your proper organization,
|
||||
and create a new repo to hold your Flux install and other necessary config.
|
||||
and create a new repository to hold your Flux install and other Kubernetes resources.
|
||||
|
||||
Clone the Git repository locally:
|
||||
|
||||
@ -98,28 +102,27 @@ Create a `GitRepository` object on your cluster by specifying the SSH address of
|
||||
```sh
|
||||
flux create source git flux-system \
|
||||
--git-implementation=libgit2 \
|
||||
--url=ssh://git@ssh.dev.azure.com/v3/<org>/<project>/<repository> \
|
||||
--branch=<branch> \
|
||||
--ssh-key-algorithm=rsa \
|
||||
--ssh-rsa-bits=4096 \
|
||||
--url=ssh://git@ssh.dev.azure.com/v3/<org>/<project>/<repository> \
|
||||
--branch=main \
|
||||
--interval=1m
|
||||
```
|
||||
|
||||
This config uses the `main` branch, but your repo may be older and need to specify `master` instead.
|
||||
|
||||
Note that unlike `git`, Flux does not support the
|
||||
["shorter" scp-like syntax for the SSH protocol](https://git-scm.com/book/en/v2/Git-on-the-Server-The-Protocols#_the_ssh_protocol)
|
||||
(e.g. `ssh.dev.azure.com:v3`).
|
||||
Use the [RFC 3986 compatible syntax](https://tools.ietf.org/html/rfc3986#section-3) instead: `ssh.dev.azure.com/v3`.
|
||||
|
||||
You will be prompted to add a deploy key to your repository.
|
||||
If you don't specify the SSH algorithm, then `flux` will generate an RSA 2048 bits key.
|
||||
|
||||
The `flux create source git` command will prompt you to add a deploy key to your repository, but Azure DevOps
|
||||
The above command will prompt you to add a deploy key to your repository, but Azure DevOps
|
||||
[does not support repository or org-specific deploy keys](https://developercommunity.visualstudio.com/t/allow-the-creation-of-ssh-deploy-keys-for-vsts-hos/365747).
|
||||
You may add the deploy key to a user's personal SSH keys being mindful that removing them from the repo may revoke Flux's access.
|
||||
As an alternative, create a machine-user whose sole purpose is to store credentials for automation.
|
||||
Using a machine-user also has the benefit of being able to be read-only or restricted to specific repositories if that is needed.
|
||||
You may add the deploy key to a user's personal SSH keys, but take note that
|
||||
revoking the user's access to the repository will also revoke Flux's access.
|
||||
The better alternative is to create a machine-user whose sole purpose is
|
||||
to store credentials for automation.
|
||||
Using a machine-user also has the benefit of being able to be read-only or
|
||||
restricted to specific repositories if this is needed.
|
||||
|
||||
!!! note
|
||||
Unlike `git`, Flux does not support the
|
||||
["shorter" scp-like syntax for the SSH protocol](https://git-scm.com/book/en/v2/Git-on-the-Server-The-Protocols#_the_ssh_protocol)
|
||||
(e.g. `ssh.dev.azure.com:v3`).
|
||||
Use the [RFC 3986 compatible syntax](https://tools.ietf.org/html/rfc3986#section-3) instead: `ssh.dev.azure.com/v3`.
|
||||
|
||||
If you wish to use Git over HTTPS, then generate a personal access token and supply it as the password:
|
||||
|
||||
@ -127,7 +130,7 @@ If you wish to use Git over HTTPS, then generate a personal access token and sup
|
||||
flux create source git flux-system \
|
||||
--git-implementation=libgit2 \
|
||||
--url=https://dev.azure.com/<org>/<project>/_git/<repository> \
|
||||
--branch=master \
|
||||
--branch=main \
|
||||
--username=git \
|
||||
--password=${AZ_PAT_TOKEN} \
|
||||
--interval=1m
|
||||
@ -163,30 +166,35 @@ cd ./clusters/my-cluster/flux-system && kustomize create --autodetect
|
||||
git add -A && git commit -m "add sync manifests" && git push
|
||||
```
|
||||
|
||||
### Flux Upgrade
|
||||
|
||||
To upgrade the Flux components to a newer version, download the latest `flux` binary,
|
||||
run the install command and commit the changes:
|
||||
run the install command in your repository root, commit and push the changes:
|
||||
|
||||
```sh
|
||||
flux install \
|
||||
--export > ./clusters/my-cluster/flux-system/gotk-components.yaml
|
||||
|
||||
git add -A && git commit -m "update flux" && git push
|
||||
git add -A && git commit -m "Upgrade to $(flux -v)" && git push
|
||||
```
|
||||
|
||||
The source-controller will pull the changes on the cluster, then the kustomize-controller
|
||||
The [source-controller](../components/source/controller.md) will pull the changes on the cluster,
|
||||
then [kustomize-controller](../components/source/controller.md)
|
||||
will perform a rolling update of all Flux components including itself.
|
||||
|
||||
## Helm Repositories on Azure Container Registry
|
||||
|
||||
The Flux `HelmRepository` object currently supports [Chart Repositories](https://helm.sh/docs/topics/chart_repository/)
|
||||
The Flux `HelmRepository` object currently supports
|
||||
[Chart Repositories](https://helm.sh/docs/topics/chart_repository/)
|
||||
as well as fetching `HelmCharts` from paths in `GitRepository` sources.
|
||||
|
||||
Azure Container Registry has a sub-command ([`az acr helm`](https://docs.microsoft.com/en-us/cli/azure/acr/helm)) for working with
|
||||
ACR-Hosted Chart Repositories, but it is deprecated.
|
||||
If you are using these deprecated Azure Chart Repositories, you can use Flux `HelmRepository` objects with them.
|
||||
Azure Container Registry has a sub-command ([`az acr helm`](https://docs.microsoft.com/en-us/cli/azure/acr/helm))
|
||||
for working with ACR-Hosted Chart Repositories, but it is deprecated.
|
||||
If you are using these deprecated Azure Chart Repositories,
|
||||
you can use Flux `HelmRepository` objects with them.
|
||||
|
||||
[Newer ACR Helm documentation](https://docs.microsoft.com/en-us/azure/container-registry/container-registry-helm-repos) suggests
|
||||
using ACR as an experimental [Helm OCI Registry](https://helm.sh/docs/topics/registries/).
|
||||
[Newer ACR Helm documentation](https://docs.microsoft.com/en-us/azure/container-registry/container-registry-helm-repos)
|
||||
suggests using ACR as an experimental [Helm OCI Registry](https://helm.sh/docs/topics/registries/).
|
||||
This will not work with Flux, because using Charts from OCI Registries is not yet supported.
|
||||
|
||||
## Secrets Management with SOPS and Azure Key Vault
|
||||
@ -214,5 +222,6 @@ flux install \
|
||||
Follow the [Image Update Automation Guide](../guides/image-update.md) and see the
|
||||
[ACR specific section](../guides/image-update.md#azure-container-registry) for more details.
|
||||
|
||||
Your AKS cluster's configuration can also be updated to [allow the kubelets to pull images from ACR](https://docs.microsoft.com/en-us/azure/aks/cluster-container-registry-integration)
|
||||
Your AKS cluster's configuration can also be updated to
|
||||
[allow the kubelets to pull images from ACR](https://docs.microsoft.com/en-us/azure/aks/cluster-container-registry-integration)
|
||||
without ImagePullSecrets as an optional, complimentary step.
|
||||
|
||||
Reference in New Issue
Block a user