Skip to content

Commit e251173

Browse files
committed
Merge branch 'main' into edit-configuring-helmchart-v2
2 parents fb1c1f8 + 87eb215 commit e251173

16 files changed

+147
-113
lines changed

.github/workflows/app-manager-release-notes.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ jobs:
5555
echo "Pull Request URL - ${{ steps.cpr.outputs.pull-request-url }}"
5656
5757
- name: Slack Notification
58-
uses: slackapi/[email protected].0
58+
uses: slackapi/[email protected].1
5959
with:
6060
webhook: ${{ secrets.KOTS_RELEASE_NOTES_SLACK_WEBHOOK }}
6161
webhook-type: webhook-trigger

.github/workflows/embedded-cluster-release-notes.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ jobs:
8686
echo "Pull Request URL - ${{ steps.cpr.outputs.pull-request-url }}"
8787
8888
- name: Slack Notification
89-
uses: slackapi/[email protected].0
89+
uses: slackapi/[email protected].1
9090
with:
9191
webhook: ${{ secrets.EMBEDDED_CLUSTER_RELEASE_NOTES_SLACK_WEBHOOK }}
9292
webhook-type: webhook-trigger

.github/workflows/kubernetes-installer-release-notes.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ jobs:
5555
echo "Pull Request URL - ${{ steps.cpr.outputs.pull-request-url }}"
5656
5757
- name: Slack Notification
58-
uses: slackapi/[email protected].0
58+
uses: slackapi/[email protected].1
5959
with:
6060
webhook: ${{ secrets.KURL_RELEASE_NOTES_SLACK_WEBHOOK }}
6161
webhook-type: webhook-trigger

.github/workflows/replicated-sdk-release-notes.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ jobs:
5959
echo "Pull Request URL - ${{ steps.cpr.outputs.pull-request-url }}"
6060
6161
- name: Slack Notification
62-
uses: slackapi/[email protected].0
62+
uses: slackapi/[email protected].1
6363
with:
6464
webhook: ${{ secrets.REPLICATED_SDK_RELEASE_NOTES_SLACK_WEBHOOK }}
6565
webhook-type: webhook-trigger

.github/workflows/vendor-portal-release-notes.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ jobs:
6262
echo "Pull Request URL - ${{ steps.cpr.outputs.pull-request-url }}"
6363
6464
- name: Slack Notification
65-
uses: slackapi/[email protected].0
65+
uses: slackapi/[email protected].1
6666
with:
6767
webhook: ${{ secrets.VENDOR_PORTAL_RELEASE_NOTES_SLACK_WEBHOOK }}
6868
webhook-type: webhook-trigger

docs/partials/helm/_helm-install-prereqs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,6 @@
22

33
* The customer used to install must have the **Existing Cluster (Helm CLI)** install type enabled. If installing into an air gap environment, additionally enable the **Helm CLI Air Gap Instructions** option for the customer. For more information about enabling install types for customers in the Vendor Portal, see [Manage Install Types for a License](licenses-install-types).
44

5-
* To ensure that the Replicated proxy registry can be used to grant proxy access to your application images during Helm installations, you must create an image pull secret for the proxy registry and add it to your Helm chart. To do so, follow the steps in [Using the Proxy Registry with Helm Installations](/vendor/helm-image-registry).
5+
* To ensure that the Replicated proxy registry can be used to grant proxy access to your application images during Helm installations, you must create an image pull secret for the proxy registry and add it to your Helm chart. To do so, follow the steps in [Use the Proxy Registry with Helm CLI Installations](/vendor/helm-image-registry).
66

77
* Declare the SDK as a dependency in your Helm chart. For more information, see [Install the SDK as a Subchart](replicated-sdk-installing#install-the-sdk-as-a-subchart) in _Installing the Replicated SDK_.
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
If you are deploying Pods to namespaces other than the application namespace, add the namespace to the `additionalNamespaces` attribute of the KOTS Application custom resource. This ensures that KOTS can provision the `imagePullSecret` in the namespace to allow the Pod to pull the image. For instructions, see [Define Additional Namespaces](operator-defining-additional-namespaces).

docs/release-notes/rn-embedded-cluster.md

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,32 @@ Additionally, these release notes list the versions of Kubernetes and Replicated
1212

1313
<!--RELEASE_NOTES_PLACEHOLDER-->
1414

15+
## 2.7.2
16+
17+
Released on July 11, 2025
18+
19+
<table>
20+
<tr>
21+
<th>Version</th>
22+
<td id="center">2.7.2+k8s-1.31</td>
23+
<td id="center">2.7.2+k8s-1.30</td>
24+
<td id="center">2.7.2+k8s-1.29</td>
25+
</tr>
26+
<tr>
27+
<th>Kubernetes Version</th>
28+
<td id="center">1.31.8</td>
29+
<td id="center">1.30.9</td>
30+
<td id="center">1.29.14</td>
31+
</tr>
32+
<tr>
33+
<th>KOTS Version</th>
34+
<td id="center" colspan="3">1.124.18</td>
35+
</tr>
36+
</table>
37+
38+
### Improvements {#improvements-2-7-2}
39+
* Addresses CVE-2025-53547, CVE-2025-22870, and CVE-2025-22872.
40+
1541
## 2.7.1
1642

1743
Released on July 2, 2025

docs/vendor/helm-image-registry.mdx

Lines changed: 13 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -1,64 +1,32 @@
11
import StepCreds from "../partials/proxy-service/_step-creds.mdx"
22
import StepCustomDomain from "../partials/proxy-service/_step-custom-domain.mdx"
3+
import RewriteHelmValues from "../partials/proxy-service/_step-rewrite-helm-values.mdx"
34

4-
# Use the Proxy Registry with Helm Installations
5+
# Use the Proxy Registry with Helm CLI Installations
56

6-
This topic describes how to use the Replicated proxy registry to proxy images for installations with the Helm CLI. For more information about the proxy registry, see [About the Replicated Proxy Registry](private-images-about).
7+
This topic describes how to configure your application to use the Replicated proxy registry with Helm CLI installations. For more information about the proxy registry, see [About the Replicated Proxy Registry](private-images-about). For more information about installing applications distributed with Replicated using Helm, see [About Helm Installations with Replicated](/vendor/helm-install-overview).
78

89
## Overview
910

10-
With the Replicated proxy registry, each customer's unique license can grant proxy access to images in an external private registry.
11+
During Helm CLI installations with Replicated, after customers provide their unique license ID, a `global.replicated.dockerconfigjson` field that contains a base64 encoded Docker configuration file is automatically injected in the Helm chart values.
1112

12-
During Helm installations, after customers provide their license ID, a `global.replicated.dockerconfigjson` field that contains a base64 encoded Docker configuration file is automatically injected in the Helm chart values. You can use this `global.replicated.dockerconfigjson` field to create the pull secret required to authenticate with the proxy registry, allowing you to use the proxy registry for images in your Helm charts.
13+
You can use this `global.replicated.dockerconfigjson` field to create the pull secret required to authenticate with the proxy registry. For more information about how Kubernetes uses the `kubernetes.io/dockerconfigjson` Secret type to provide authentication for a private registry, see [Pull an Image from a Private Registry](https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/) in the Kubernetes documentation.
1314

14-
Additionally, if you include the Replicated SDK as a dependency in your Helm chart, the image used by the Replicated SDK is automatically proxied through the proxy registry.
15+
:::note
16+
For Helm charts that include the Replicated SDK as a dependency, the image used by the Replicated SDK is automatically proxied through the proxy registry. No additional configuration is required. For more information, see [About the Replicated SDK](/vendor/replicated-sdk-overview).
17+
:::
1518

16-
## Pull Private Images Through the Proxy Registry in Helm Installations
19+
## Configure Your Application to Use the Proxy Registry
1720

18-
To use the Replicated proxy registry for applications installed with Helm:
21+
To configure your application to use the proxy registry with Helm CLI installations:
1922

2023
1. <StepCreds/>
2124

2225
1. <StepCustomDomain/>
2326

24-
1. In your Helm chart values file, set your image repository URL to the location of the image on the proxy registry. If you added a custom domain, use your custom domain. Otherwise, use `proxy.replicated.com`.
27+
1. <RewriteHelmValues/>
2528

26-
The proxy registry URL has the following format: `DOMAIN/proxy/APP_SLUG/EXTERNAL_REGISTRY_IMAGE_URL`
27-
28-
Where:
29-
* `DOMAIN` is either `proxy.replicated.com` or your custom domain.
30-
* `APP_SLUG` is the unique slug of your application.
31-
* `EXTERNAL_REGISTRY_IMAGE_URL` is the path to the private image on your external registry.
32-
33-
**Example:**
34-
35-
```yaml
36-
# values.yaml
37-
api:
38-
image:
39-
# proxy.replicated.com or your custom domain
40-
registry: proxy.replicated.com
41-
repository: proxy/your-app/ghcr.io/cloudnative-pg/cloudnative-pg
42-
tag: catalog-1.24.0
43-
```
44-
45-
1. Ensure that any references to the image in your Helm chart access the field from your values file.
46-
47-
**Example**:
48-
49-
```yaml
50-
apiVersion: v1
51-
kind: Pod
52-
spec:
53-
containers:
54-
- name: api
55-
# Access the registry, repository, and tag fields from the values file
56-
image: {{ .Values.images.api.registry }}/{{ .Values.images.api.repository }}:{{ .Values.images.api.tag }}
57-
```
58-
59-
1. In your Helm chart templates, create a Kubernetes Secret to evaluate if the `global.replicated.dockerconfigjson` value is set and then write the rendered value into a Secret on the cluster, as shown below.
60-
61-
This Secret is used to authenticate with the proxy registry. For information about how Kubernetes uses the `kubernetes.io/dockerconfigjson` Secret type to provide authentication for a private registry, see [Pull an Image from a Private Registry](https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/) in the Kubernetes documentation.
29+
1. In your Helm chart templates, add a YAML file that evaluates if the `global.replicated.dockerconfigjson` value is set, and then writes the rendered value into a Secret on the cluster, as shown below.
6230

6331
:::note
6432
Do not use `replicated` for the name of the image pull secret because the Replicated SDK automatically creates a Secret named `replicated`. Using the same name causes an error.
@@ -79,8 +47,7 @@ To use the Replicated proxy registry for applications installed with Helm:
7947
{{ end }}
8048
```
8149

82-
83-
1. Add the image pull secret that you created to any manifests that reference the image:
50+
1. Add the image pull secret that you created to any manifests that reference the image.
8451

8552
**Example:**
8653

docs/vendor/packaging-public-images.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ For more information about the Replicated proxy registry, see [About the Replica
66

77
## Pull Public Images Through the Replicated Proxy Registry
88

9-
You can use the Replicated proxy registry to pull both public and private images. Using the Replicated proxy registry for public images can simplify network access requirements for your customers, as they only need to whitelist a single domain (either `proxy.replicated.com` or your custom domain) instead of multiple registry domains. These are authenticated requests to avoid the proxy from hitting rate limits and preventing pulls. For more information about how to reference these in your values, see [Use the Proxy Registry with Helm Installations](/vendor/helm-image-registry).
9+
You can use the Replicated proxy registry to pull both public and private images. Using the Replicated proxy registry for public images can simplify network access requirements for your customers, as they only need to whitelist a single domain (either `proxy.replicated.com` or your custom domain) instead of multiple registry domains. These are authenticated requests to avoid the proxy from hitting rate limits and preventing pulls. For more information about how to reference these in your values, see [Use the Proxy Registry with Helm CLI Installations](/vendor/helm-image-registry).
1010

1111
> [!IMPORTANT]
1212
> For public images, you need to first configure registry credentials.

0 commit comments

Comments
 (0)