mirror of
https://github.com/bitnami/charts.git
synced 2026-02-19 11:37:23 +08:00
[bitnami/*] Unify k8s directives separators (#10185)
* [bitnami/*] Unify k8s directives separators Signed-off-by: Carlos Rodriguez Hernandez <carlosrh@vmware.com> * [skip ci] Update README.md with readme-generator-for-helm Signed-off-by: Bitnami Containers <containers@bitnami.com> Co-authored-by: Bitnami Containers <containers@bitnami.com>
This commit is contained in:
committed by
GitHub
parent
b42600d139
commit
26502141d1
@@ -32,4 +32,4 @@ name: airflow
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-airflow
|
||||
- https://airflow.apache.org/
|
||||
version: 12.2.3
|
||||
version: 12.2.4
|
||||
|
||||
@@ -40,6 +40,5 @@ data:
|
||||
tls.crt: {{ $cert.Cert | b64enc | quote }}
|
||||
tls.key: {{ $cert.Key | b64enc | quote }}
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -30,4 +30,4 @@ sources:
|
||||
- https://github.com/argoproj/argo-cd/
|
||||
- https://github.com/bitnami/bitnami-docker-dex
|
||||
- https://github.com/dexidp/dex
|
||||
version: 3.2.2
|
||||
version: 3.2.3
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- range .Values.config.clusterCredentials }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
@@ -23,4 +22,5 @@ stringData:
|
||||
namespaces: {{ .namespaces }}
|
||||
config: |
|
||||
{{- .config | toPrettyJson | nindent 4 }}
|
||||
---
|
||||
{{- end }}
|
||||
|
||||
@@ -786,7 +786,7 @@ server:
|
||||
|
||||
## Enable TLS configuration for the hostname defined at ingress.hostname parameter
|
||||
## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }}
|
||||
## You can use the ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it
|
||||
## You can use the ingress.secrets parameter to create this TLS secret or rely on cert-manager to create it
|
||||
##
|
||||
tls: false
|
||||
|
||||
|
||||
@@ -35,4 +35,4 @@ sources:
|
||||
- https://github.com/bitnami/bitnami-docker-argo-workflow-controller
|
||||
- https://github.com/bitnami/bitnami-docker-argo-workflow-exec
|
||||
- https://argoproj.github.io/workflows/
|
||||
version: 2.0.0
|
||||
version: 2.0.1
|
||||
|
||||
@@ -65,4 +65,4 @@ subjects:
|
||||
name: {{ include "argo-workflows.controller.serviceAccountName" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -4,7 +4,6 @@
|
||||
{{- $namespaces := .Values.controller.workflowNamespaces }}
|
||||
{{- end }}
|
||||
{{- range $namespaces }}
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
@@ -27,5 +26,6 @@ subjects:
|
||||
- kind: ServiceAccount
|
||||
name: {{ include "argo-workflows.workflows.serviceAccountName" $ }}
|
||||
namespace: {{ . }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -23,4 +23,4 @@ name: cassandra
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-cassandra
|
||||
- http://cassandra.apache.org
|
||||
version: 9.1.19
|
||||
version: 9.1.20
|
||||
|
||||
@@ -79,39 +79,39 @@ The command removes all the Kubernetes components associated with the chart and
|
||||
|
||||
### Cassandra parameters
|
||||
|
||||
| Name | Description | Value |
|
||||
| ----------------------------- | ---------------------------------------------------------------------------------------------------------------------- | ---------------------- |
|
||||
| `image.registry` | Cassandra image registry | `docker.io` |
|
||||
| `image.repository` | Cassandra image repository | `bitnami/cassandra` |
|
||||
| `image.tag` | Cassandra image tag (immutable tags are recommended) | `4.0.1-debian-10-r109` |
|
||||
| `image.pullPolicy` | image pull policy | `IfNotPresent` |
|
||||
| `image.pullSecrets` | Cassandra image pull secrets | `[]` |
|
||||
| `image.debug` | Enable image debug mode | `false` |
|
||||
| `dbUser.user` | Cassandra admin user | `cassandra` |
|
||||
| `dbUser.forcePassword` | Force the user to provide a non | `false` |
|
||||
| `dbUser.password` | Password for `dbUser.user`. Randomly generated if empty | `""` |
|
||||
| `dbUser.existingSecret` | Use an existing secret object for `dbUser.user` password (will ignore `dbUser.password`) | `""` |
|
||||
| `initDBConfigMap` | ConfigMap with cql scripts. Useful for creating a keyspace and pre-populating data | `""` |
|
||||
| `initDBSecret` | Secret with cql script (with sensitive data). Useful for creating a keyspace and pre-populating data | `""` |
|
||||
| `existingConfiguration` | ConfigMap with custom cassandra configuration files. This overrides any other Cassandra configuration set in the chart | `""` |
|
||||
| `cluster.name` | Cassandra cluster name | `cassandra` |
|
||||
| `cluster.seedCount` | Number of seed nodes | `1` |
|
||||
| `cluster.numTokens` | Number of tokens for each node | `256` |
|
||||
| `cluster.datacenter` | Datacenter name | `dc1` |
|
||||
| `cluster.rack` | Rack name | `rack1` |
|
||||
| `cluster.endpointSnitch` | Endpoint Snitch | `SimpleSnitch` |
|
||||
| `cluster.internodeEncryption` | DEPRECATED: use tls.internode and tls.client instead. Encryption values. | `none` |
|
||||
| `cluster.clientEncryption` | Client Encryption | `false` |
|
||||
| `cluster.extraSeeds` | For an external/second cassandra ring. | `[]` |
|
||||
| `cluster.enableUDF` | Enable User defined functions | `false` |
|
||||
| `jvm.extraOpts` | Set the value for Java Virtual Machine extra options | `""` |
|
||||
| `jvm.maxHeapSize` | Set Java Virtual Machine maximum heap size (MAX_HEAP_SIZE). Calculated automatically if `nil` | `""` |
|
||||
| `jvm.newHeapSize` | Set Java Virtual Machine new heap size (HEAP_NEWSIZE). Calculated automatically if `nil` | `""` |
|
||||
| `command` | Command for running the container (set to default if not set). Use array form | `[]` |
|
||||
| `args` | Args for running the container (set to default if not set). Use array form | `[]` |
|
||||
| `extraEnvVars` | Extra environment variables to be set on cassandra container | `[]` |
|
||||
| `extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars | `""` |
|
||||
| `extraEnvVarsSecret` | Name of existing Secret containing extra env vars | `""` |
|
||||
| Name | Description | Value |
|
||||
| ----------------------------- | ---------------------------------------------------------------------------------------------------------------------- | --------------------- |
|
||||
| `image.registry` | Cassandra image registry | `docker.io` |
|
||||
| `image.repository` | Cassandra image repository | `bitnami/cassandra` |
|
||||
| `image.tag` | Cassandra image tag (immutable tags are recommended) | `4.0.3-debian-10-r59` |
|
||||
| `image.pullPolicy` | image pull policy | `IfNotPresent` |
|
||||
| `image.pullSecrets` | Cassandra image pull secrets | `[]` |
|
||||
| `image.debug` | Enable image debug mode | `false` |
|
||||
| `dbUser.user` | Cassandra admin user | `cassandra` |
|
||||
| `dbUser.forcePassword` | Force the user to provide a non | `false` |
|
||||
| `dbUser.password` | Password for `dbUser.user`. Randomly generated if empty | `""` |
|
||||
| `dbUser.existingSecret` | Use an existing secret object for `dbUser.user` password (will ignore `dbUser.password`) | `""` |
|
||||
| `initDBConfigMap` | ConfigMap with cql scripts. Useful for creating a keyspace and pre-populating data | `""` |
|
||||
| `initDBSecret` | Secret with cql script (with sensitive data). Useful for creating a keyspace and pre-populating data | `""` |
|
||||
| `existingConfiguration` | ConfigMap with custom cassandra configuration files. This overrides any other Cassandra configuration set in the chart | `""` |
|
||||
| `cluster.name` | Cassandra cluster name | `cassandra` |
|
||||
| `cluster.seedCount` | Number of seed nodes | `1` |
|
||||
| `cluster.numTokens` | Number of tokens for each node | `256` |
|
||||
| `cluster.datacenter` | Datacenter name | `dc1` |
|
||||
| `cluster.rack` | Rack name | `rack1` |
|
||||
| `cluster.endpointSnitch` | Endpoint Snitch | `SimpleSnitch` |
|
||||
| `cluster.internodeEncryption` | DEPRECATED: use tls.internode and tls.client instead. Encryption values. | `none` |
|
||||
| `cluster.clientEncryption` | Client Encryption | `false` |
|
||||
| `cluster.extraSeeds` | For an external/second cassandra ring. | `[]` |
|
||||
| `cluster.enableUDF` | Enable User defined functions | `false` |
|
||||
| `jvm.extraOpts` | Set the value for Java Virtual Machine extra options | `""` |
|
||||
| `jvm.maxHeapSize` | Set Java Virtual Machine maximum heap size (MAX_HEAP_SIZE). Calculated automatically if `nil` | `""` |
|
||||
| `jvm.newHeapSize` | Set Java Virtual Machine new heap size (HEAP_NEWSIZE). Calculated automatically if `nil` | `""` |
|
||||
| `command` | Command for running the container (set to default if not set). Use array form | `[]` |
|
||||
| `args` | Args for running the container (set to default if not set). Use array form | `[]` |
|
||||
| `extraEnvVars` | Extra environment variables to be set on cassandra container | `[]` |
|
||||
| `extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars | `""` |
|
||||
| `extraEnvVarsSecret` | Name of existing Secret containing extra env vars | `""` |
|
||||
|
||||
|
||||
### Statefulset parameters
|
||||
@@ -227,7 +227,7 @@ The command removes all the Kubernetes components associated with the chart and
|
||||
| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` |
|
||||
| `volumePermissions.image.registry` | Init container volume | `docker.io` |
|
||||
| `volumePermissions.image.repository` | Init container volume | `bitnami/bitnami-shell` |
|
||||
| `volumePermissions.image.tag` | Init container volume | `10-debian-10-r294` |
|
||||
| `volumePermissions.image.tag` | Init container volume | `10-debian-10-r400` |
|
||||
| `volumePermissions.image.pullPolicy` | Init container volume | `IfNotPresent` |
|
||||
| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
| `volumePermissions.resources.limits` | The resources limits for the container | `{}` |
|
||||
@@ -242,7 +242,7 @@ The command removes all the Kubernetes components associated with the chart and
|
||||
| `metrics.enabled` | Start a side-car prometheus exporter | `false` |
|
||||
| `metrics.image.registry` | Cassandra exporter image registry | `docker.io` |
|
||||
| `metrics.image.repository` | Cassandra exporter image name | `bitnami/cassandra-exporter` |
|
||||
| `metrics.image.tag` | Cassandra exporter image tag | `2.3.4-debian-10-r619` |
|
||||
| `metrics.image.tag` | Cassandra exporter image tag | `2.3.8-debian-10-r23` |
|
||||
| `metrics.image.pullPolicy` | image pull policy | `IfNotPresent` |
|
||||
| `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
| `metrics.resources.limits` | The resources limits for the container | `{}` |
|
||||
|
||||
@@ -14,9 +14,9 @@ metadata:
|
||||
type: Opaque
|
||||
data:
|
||||
cassandra-password: {{ include "cassandra.password" . | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- if and (or .Values.tls.keystorePassword .Values.tls.truststorePassword .Values.tls.autoGenerated) (not .Values.tls.passwordsSecret) (not .Values.tls.tlsEncryptionSecretName) -}}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
|
||||
@@ -26,4 +26,4 @@ sources:
|
||||
- https://github.com/bitnami/bitnami-docker-cert-manager-webhook
|
||||
- https://github.com/bitnami/bitnami-docker-cainjector
|
||||
- https://github.com/jetstack/cert-manager
|
||||
version: 0.5.0
|
||||
version: 0.5.1
|
||||
|
||||
@@ -85,13 +85,13 @@ The command removes all the Kubernetes components associated with the chart and
|
||||
| `controller.replicaCount` | Number of Controller replicas | `1` |
|
||||
| `controller.image.registry` | Controller image registry | `docker.io` |
|
||||
| `controller.image.repository` | Controller image repository | `bitnami/cert-manager` |
|
||||
| `controller.image.tag` | Controller image tag (immutable tags are recommended) | `1.6.1-debian-10-r72` |
|
||||
| `controller.image.tag` | Controller image tag (immutable tags are recommended) | `1.8.0-debian-10-r21` |
|
||||
| `controller.image.pullPolicy` | Controller image pull policy | `IfNotPresent` |
|
||||
| `controller.image.pullSecrets` | Controller image pull secrets | `[]` |
|
||||
| `controller.image.debug` | Controller image debug mode | `false` |
|
||||
| `controller.acmesolver.image.registry` | Controller image registry | `docker.io` |
|
||||
| `controller.acmesolver.image.repository` | Controller image repository | `bitnami/acmesolver` |
|
||||
| `controller.acmesolver.image.tag` | Controller image tag (immutable tags are recommended) | `1.6.1-debian-10-r73` |
|
||||
| `controller.acmesolver.image.tag` | Controller image tag (immutable tags are recommended) | `1.8.0-debian-10-r21` |
|
||||
| `controller.acmesolver.image.pullPolicy` | Controller image pull policy | `IfNotPresent` |
|
||||
| `controller.acmesolver.image.pullSecrets` | Controller image pull secrets | `[]` |
|
||||
| `controller.acmesolver.image.debug` | Controller image debug mode | `false` |
|
||||
@@ -144,7 +144,7 @@ The command removes all the Kubernetes components associated with the chart and
|
||||
| `webhook.replicaCount` | Number of Webhook replicas | `1` |
|
||||
| `webhook.image.registry` | Webhook image registry | `docker.io` |
|
||||
| `webhook.image.repository` | Webhook image repository | `bitnami/cert-manager-webhook` |
|
||||
| `webhook.image.tag` | Webhook image tag (immutable tags are recommended) | `1.6.1-debian-10-r73` |
|
||||
| `webhook.image.tag` | Webhook image tag (immutable tags are recommended) | `1.8.0-debian-10-r21` |
|
||||
| `webhook.image.pullPolicy` | Webhook image pull policy | `IfNotPresent` |
|
||||
| `webhook.image.pullSecrets` | Webhook image pull secrets | `[]` |
|
||||
| `webhook.image.debug` | Webhook image debug mode | `false` |
|
||||
@@ -213,7 +213,7 @@ The command removes all the Kubernetes components associated with the chart and
|
||||
| `cainjector.replicaCount` | Number of CAInjector replicas | `1` |
|
||||
| `cainjector.image.registry` | CAInjector image registry | `docker.io` |
|
||||
| `cainjector.image.repository` | CAInjector image repository | `bitnami/cainjector` |
|
||||
| `cainjector.image.tag` | CAInjector image tag (immutable tags are recommended) | `1.6.1-debian-10-r72` |
|
||||
| `cainjector.image.tag` | CAInjector image tag (immutable tags are recommended) | `1.8.0-debian-10-r22` |
|
||||
| `cainjector.image.pullPolicy` | CAInjector image pull policy | `IfNotPresent` |
|
||||
| `cainjector.image.pullSecrets` | CAInjector image pull secrets | `[]` |
|
||||
| `cainjector.image.debug` | CAInjector image debug mode | `false` |
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if .Values.rbac.create }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
|
||||
kind: Role
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if .Values.rbac.create }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
|
||||
kind: Role
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if .Values.rbac.create }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
|
||||
kind: Role
|
||||
metadata:
|
||||
|
||||
@@ -30,4 +30,4 @@ name: concourse
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-concourse
|
||||
- https://github.com/concourse/concourse
|
||||
version: 1.0.19
|
||||
version: 1.0.20
|
||||
|
||||
@@ -20,10 +20,10 @@ rules:
|
||||
{{- if .Values.web.rbac.rules }}
|
||||
{{- include "common.tplvalues.render" ( dict "value" .Values.web.rbac.rules "context" $ ) | nindent 2 }}
|
||||
{{- end }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) }}
|
||||
{{- if and $pspAvailable .Values.web.psp.create }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
@@ -42,6 +42,5 @@ rules:
|
||||
verbs: ['use']
|
||||
resourceNames:
|
||||
- {{ include "concourse.web.fullname" . }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -21,10 +21,10 @@ subjects:
|
||||
- kind: ServiceAccount
|
||||
name: {{ include "concourse.web.serviceAccountName" . }}
|
||||
namespace: {{ .Release.Namespace | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) }}
|
||||
{{- if and $pspAvailable .Values.web.psp.create }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
@@ -46,6 +46,5 @@ subjects:
|
||||
- kind: ServiceAccount
|
||||
name: {{ include "concourse.web.serviceAccountName" . }}
|
||||
namespace: {{ .Release.Namespace | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -40,6 +40,5 @@ data:
|
||||
tls.crt: {{ $cert.Cert | b64enc | quote }}
|
||||
tls.key: {{ $cert.Key | b64enc | quote }}
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -20,10 +20,10 @@ rules:
|
||||
{{- if .Values.worker.rbac.rules }}
|
||||
{{- include "common.tplvalues.render" ( dict "value" .Values.worker.rbac.rules "context" $ ) | nindent 2 }}
|
||||
{{- end }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) }}
|
||||
{{- if and $pspAvailable .Values.worker.psp.create }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
@@ -42,6 +42,5 @@ rules:
|
||||
verbs: ['use']
|
||||
resourceNames:
|
||||
- {{ include "concourse.worker.fullname" . }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -21,10 +21,10 @@ subjects:
|
||||
- kind: ServiceAccount
|
||||
name: {{ include "concourse.worker.serviceAccountName" . }}
|
||||
namespace: {{ .Release.Namespace | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) }}
|
||||
{{- if and $pspAvailable .Values.worker.psp.create }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
@@ -46,6 +46,5 @@ subjects:
|
||||
- kind: ServiceAccount
|
||||
name: {{ include "concourse.worker.serviceAccountName" . }}
|
||||
namespace: {{ .Release.Namespace | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -27,4 +27,4 @@ sources:
|
||||
- https://github.com/envoyproxy/envoy
|
||||
- https://github.com/bitnami/bitnami-docker-contour
|
||||
- https://projectcontour.io
|
||||
version: 7.8.0
|
||||
version: 7.8.1
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if and .Values.contour.enabled (include "contour.contour-certgen.enabled" .) }}
|
||||
---
|
||||
apiVersion: batch/v1
|
||||
kind: Job
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if and .Values.rbac.create .Values.contour.enabled (include "contour.contour-certgen.enabled" .) }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
|
||||
kind: Role
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if and .Values.contour.certgen.serviceAccount.create (include "contour.contour-certgen.enabled" .) }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if .Values.configInline }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if .Values.contour.enabled }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.deployment.apiVersion" . }}
|
||||
kind: Deployment
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if and .Values.rbac.create .Values.contour.enabled }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if .Values.contour.enabled }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if and .Values.contour.serviceAccount.create .Values.contour.enabled }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if and .Values.metrics.serviceMonitor.enabled .Values.contour.enabled }}
|
||||
---
|
||||
apiVersion: monitoring.coreos.com/v1
|
||||
kind: ServiceMonitor
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if .Values.envoy.enabled }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if and .Values.envoy.serviceAccount.create .Values.envoy.enabled }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if and .Values.metrics.serviceMonitor.enabled .Values.envoy.enabled }}
|
||||
---
|
||||
apiVersion: monitoring.coreos.com/v1
|
||||
kind: ServiceMonitor
|
||||
metadata:
|
||||
|
||||
@@ -35,4 +35,4 @@ sources:
|
||||
- https://github.com/bitnami/bitnami-docker-discourse
|
||||
- https://github.com/spinnaker
|
||||
- https://www.discourse.org/
|
||||
version: 7.0.17
|
||||
version: 7.0.18
|
||||
|
||||
@@ -21,8 +21,8 @@ spec:
|
||||
- podSelector:
|
||||
matchLabels: {{- include "common.labels.matchLabels" . | nindent 14 }}
|
||||
{{- end }}
|
||||
---
|
||||
{{- if and .Values.networkPolicy.enabled .Values.redis.enabled .Values.networkPolicy.ingressRules.backendOnlyAccessibleByFrontend }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.networkPolicy.apiVersion" . }}
|
||||
kind: NetworkPolicy
|
||||
metadata:
|
||||
@@ -49,8 +49,8 @@ spec:
|
||||
- podSelector:
|
||||
matchLabels: {{- include "common.labels.matchLabels" . | nindent 14 }}
|
||||
{{- end }}
|
||||
---
|
||||
{{- if and .Values.networkPolicy.enabled .Values.networkPolicy.ingressRules.customBackendSelector .Values.networkPolicy.ingressRules.backendOnlyAccessibleByFrontend }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.networkPolicy.apiVersion" . }}
|
||||
kind: NetworkPolicy
|
||||
metadata:
|
||||
|
||||
@@ -40,6 +40,5 @@ data:
|
||||
tls.crt: {{ $cert.Cert | b64enc | quote }}
|
||||
tls.key: {{ $cert.Key | b64enc | quote }}
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -25,4 +25,4 @@ name: elasticsearch
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-elasticsearch
|
||||
- https://www.elastic.co/products/elasticsearch
|
||||
version: 18.0.2
|
||||
version: 18.0.3
|
||||
|
||||
@@ -14,9 +14,9 @@ metadata:
|
||||
type: Opaque
|
||||
data:
|
||||
elasticsearch-password: {{ include "common.secrets.passwords.manage" (dict "secret" (include "common.names.fullname" .) "key" "elasticsearch-password" "length" 16 "providedValues" (list "security.elasticPassword") "context" $) }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- if (include "elasticsearch.createTlsPasswordsSecret" . ) }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
|
||||
@@ -26,13 +26,13 @@ data:
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
tls.crt: {{ $crt.Cert | b64enc | quote }}
|
||||
tls.key: {{ $crt.Key | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- if and (include "elasticsearch.data.enabled" .) (not .Values.security.tls.data.existingSecret) }}
|
||||
{{- $fullname := include "elasticsearch.data.fullname" . }}
|
||||
{{- $serviceName := printf "%s-hl" (include "elasticsearch.data.fullname" .) | trunc 63 | trimSuffix "-" }}
|
||||
{{- $altNames := list (printf "*.%s.%s.svc.%s" $serviceName $releaseNamespace $clusterDomain) (printf "%s.%s.svc.%s" $serviceName $releaseNamespace $clusterDomain) $fullname "127.0.0.1" "localhost" }}
|
||||
{{- $crt := genSignedCert $fullname nil $altNames 365 $ca }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
@@ -51,13 +51,13 @@ data:
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
tls.crt: {{ $crt.Cert | b64enc | quote }}
|
||||
tls.key: {{ $crt.Key | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- if and (include "elasticsearch.coordinating.enabled" .) (not .Values.security.tls.coordinating.existingSecret) }}
|
||||
{{- $fullname := include "elasticsearch.coordinating.fullname" . }}
|
||||
{{- $serviceName := printf "%s-hl" (include "elasticsearch.coordinating.fullname" .) | trunc 63 | trimSuffix "-" }}
|
||||
{{- $altNames := list (printf "*.%s.%s.svc.%s" $serviceName $releaseNamespace $clusterDomain) (printf "%s.%s.svc.%s" $serviceName $releaseNamespace $clusterDomain) $fullname "127.0.0.1" "localhost" }}
|
||||
{{- $crt := genSignedCert $fullname nil $altNames 365 $ca }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
@@ -76,13 +76,13 @@ data:
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
tls.crt: {{ $crt.Cert | b64enc | quote }}
|
||||
tls.key: {{ $crt.Key | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- if and (include "elasticsearch.ingest.enabled" .) (not .Values.security.tls.ingest.existingSecret) }}
|
||||
{{- $fullname := include "elasticsearch.ingest.fullname" . }}
|
||||
{{- $serviceName := printf "%s-hl" (include "elasticsearch.ingest.fullname" .) | trunc 63 | trimSuffix "-" }}
|
||||
{{- $altNames := list (printf "*.%s.%s.svc.%s" $serviceName $releaseNamespace $clusterDomain) (printf "%s.%s.svc.%s" $serviceName $releaseNamespace $clusterDomain) $fullname "127.0.0.1" "localhost" }}
|
||||
{{- $crt := genSignedCert $fullname nil $altNames 365 $ca }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
@@ -101,6 +101,5 @@ data:
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
tls.crt: {{ $crt.Cert | b64enc | quote }}
|
||||
tls.key: {{ $crt.Key | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -25,4 +25,4 @@ name: fluentd
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-fluentd
|
||||
- https://www.fluentd.org/
|
||||
version: 5.0.19
|
||||
version: 5.0.20
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if and .Values.forwarder.serviceAccount.create .Values.forwarder.enabled }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
|
||||
@@ -46,12 +46,12 @@ data:
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
tls.crt: {{ $crt.Cert | b64enc | quote }}
|
||||
tls.key: {{ $crt.Key | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- if .Values.forwarder.enabled }}
|
||||
{{- $forwarderServiceName := printf "%s-forwarder" ( include "common.names.fullname" . ) }}
|
||||
{{- $altNames := list (printf "*.%s.%s.svc.%s" $forwarderServiceName $releaseNamespace $clusterDomain) (printf "%s.%s.svc.%s" $forwarderServiceName $releaseNamespace $clusterDomain) $fullname }}
|
||||
{{- $crt := genSignedCert $fullname nil $altNames 365 $ca }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
|
||||
@@ -861,7 +861,7 @@ aggregator:
|
||||
annotations: {}
|
||||
## @param aggregator.ingress.tls Enable TLS configuration for the hostname defined at ingress.hostname parameter
|
||||
## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.aggregator.ingress.hostname }}
|
||||
## You can use the ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it
|
||||
## You can use the ingress.secrets parameter to create this TLS secret or rely on cert-manager to create it
|
||||
##
|
||||
tls: false
|
||||
## @param aggregator.ingress.extraHosts The list of additional hostnames to be covered with this ingress record.
|
||||
|
||||
@@ -22,4 +22,4 @@ name: geode
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-geode
|
||||
- https://github.com/apache/geode
|
||||
version: 0.4.20
|
||||
version: 0.4.21
|
||||
|
||||
@@ -40,6 +40,5 @@ data:
|
||||
tls.crt: {{ $cert.Cert | b64enc | quote }}
|
||||
tls.key: {{ $cert.Key | b64enc | quote }}
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -24,4 +24,4 @@ name: grafana-operator
|
||||
sources:
|
||||
- https://github.com/grafana-operator/grafana-operator
|
||||
- https://github.com/bitnami/bitnami-docker-grafana-operator
|
||||
version: 2.5.3
|
||||
version: 2.5.4
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
{{- if and .Values.operator.rbac.create .Values.operator.enabled }}
|
||||
{{- if .Values.operator.leaderElect }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
|
||||
kind: Role
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if and .Values.operator.prometheus.serviceMonitor.enabled .Values.operator.enabled }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
|
||||
@@ -34,4 +34,4 @@ sources:
|
||||
- https://github.com/bitnami/bitnami-docker-harbor-registry
|
||||
- https://github.com/bitnami/bitnami-docker-harbor-registryctl
|
||||
- https://goharbor.io/
|
||||
version: 12.3.7
|
||||
version: 12.3.8
|
||||
|
||||
@@ -79,7 +79,6 @@ data:
|
||||
tls.crt: {{ $cert.Cert | b64enc | quote }}
|
||||
tls.key: {{ $cert.Key | b64enc | quote }}
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -2,7 +2,6 @@
|
||||
{{- $ca := genCA "harbor-internal-ca" 365 }}
|
||||
|
||||
{{- if not .Values.core.tls.existingSecret }}
|
||||
---
|
||||
{{- $coreCN := include "harbor.core" . }}
|
||||
{{- $coreCrt := genSignedCert $coreCN (list "127.0.0.1") (list "localhost" $coreCN) 365 $ca }}
|
||||
apiVersion: v1
|
||||
@@ -22,9 +21,9 @@ data:
|
||||
tls.key: {{ $coreCrt.Key | b64enc | quote }}
|
||||
{{- end }}
|
||||
{{- if not .Values.jobservice.tls.existingSecret }}
|
||||
---
|
||||
{{- $jsCN := include "harbor.jobservice" . }}
|
||||
{{- $jsCrt := genSignedCert $jsCN nil (list $jsCN) 365 $ca }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
@@ -41,10 +40,10 @@ data:
|
||||
tls.crt: {{ $jsCrt.Cert | b64enc | quote }}
|
||||
tls.key: {{ $jsCrt.Key | b64enc | quote }}
|
||||
{{- end }}
|
||||
---
|
||||
{{- if not .Values.registry.tls.existingSecret }}
|
||||
{{- $regCN := include "harbor.registry" . }}
|
||||
{{- $regCrt := genSignedCert $regCN nil (list $regCN) 365 $ca }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
@@ -61,10 +60,10 @@ data:
|
||||
tls.crt: {{ $regCrt.Cert | b64enc | quote }}
|
||||
tls.key: {{ $regCrt.Key | b64enc | quote }}
|
||||
{{- end }}
|
||||
---
|
||||
{{- if not .Values.portal.tls.existingSecret }}
|
||||
{{- $portalCN := include "harbor.portal" . }}
|
||||
{{- $portalCrt := genSignedCert $portalCN nil (list $portalCN) 365 $ca }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
@@ -82,9 +81,9 @@ data:
|
||||
tls.key: {{ $portalCrt.Key | b64enc | quote }}
|
||||
{{- end }}
|
||||
{{- if and .Values.chartmuseum.enabled (not .Values.chartmuseum.tls.existingSecret) }}
|
||||
---
|
||||
{{- $chartCN := include "harbor.chartmuseum" . }}
|
||||
{{- $chartCrt := genSignedCert $chartCN nil (list $chartCN) 365 $ca }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
@@ -103,9 +102,9 @@ data:
|
||||
{{- end }}
|
||||
|
||||
{{- if and .Values.clair.enabled (not .Values.clair.tls.existingSecret) }}
|
||||
---
|
||||
{{- $clairCN := include "harbor.clair" . }}
|
||||
{{- $clairCrt := genSignedCert $clairCN nil (list $clairCN) 365 $ca }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
@@ -124,9 +123,9 @@ data:
|
||||
{{- end }}
|
||||
|
||||
{{- if and .Values.trivy.enabled (not .Values.trivy.tls.existingSecret) }}
|
||||
---
|
||||
{{- $trivyCN := include "harbor.trivy" . }}
|
||||
{{- $trivyCrt := genSignedCert $trivyCN nil (list $trivyCN) 365 $ca }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
|
||||
@@ -24,4 +24,4 @@ name: influxdb
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-influxdb
|
||||
- https://www.influxdata.com/products/influxdb-overview/
|
||||
version: 5.1.1
|
||||
version: 5.1.2
|
||||
|
||||
@@ -17,8 +17,8 @@ type: Opaque
|
||||
data:
|
||||
{{ .Values.backup.uploadProviders.google.secretKey }}: {{ .Values.backup.uploadProviders.google.secret | b64enc | quote }}
|
||||
{{- end }}
|
||||
---
|
||||
{{ if and (.Values.backup.uploadProviders.azure.enabled) (not .Values.backup.uploadProviders.azure.existingSecret) -}}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
@@ -30,8 +30,8 @@ type: Opaque
|
||||
data:
|
||||
{{ .Values.backup.uploadProviders.azure.secretKey }}: {{ .Values.backup.uploadProviders.azure.secret | b64enc | quote }}
|
||||
{{- end }}
|
||||
---
|
||||
{{ if and (.Values.backup.uploadProviders.aws.enabled) (not .Values.backup.uploadProviders.aws.existingSecret) -}}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
|
||||
@@ -26,4 +26,4 @@ name: jupyterhub
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-jupyterhub
|
||||
- https://github.com/jupyterhub/jupyterhub
|
||||
version: 1.1.13
|
||||
version: 1.1.14
|
||||
|
||||
@@ -41,6 +41,5 @@ data:
|
||||
tls.crt: {{ $cert.Cert | b64enc | quote }}
|
||||
tls.key: {{ $cert.Key | b64enc | quote }}
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -29,4 +29,4 @@ name: kafka
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-kafka
|
||||
- https://kafka.apache.org/
|
||||
version: 16.2.11
|
||||
version: 16.2.12
|
||||
|
||||
@@ -6,7 +6,6 @@
|
||||
{{- range $i, $e := until $replicaCount }}
|
||||
{{- $targetPod := printf "%s-%d" (printf "%s" $fullName) $i }}
|
||||
{{- $_ := set $ "targetPod" $targetPod }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
|
||||
@@ -26,4 +26,4 @@ name: keycloak
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-keycloak
|
||||
- https://github.com/keycloak/keycloak
|
||||
version: 8.0.1
|
||||
version: 8.0.2
|
||||
|
||||
@@ -40,7 +40,6 @@ data:
|
||||
tls.crt: {{ $cert.Cert | b64enc | quote }}
|
||||
tls.key: {{ $cert.Key | b64enc | quote }}
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if (include "keycloak.createTlsSecret" $) }}
|
||||
@@ -48,6 +47,7 @@ data:
|
||||
{{- $releaseNamespace := .Release.Namespace }}
|
||||
{{- $clusterDomain := .Values.clusterDomain }}
|
||||
{{- $fullname := include "keycloak.fullname" . }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
|
||||
@@ -25,4 +25,4 @@ name: kibana
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-kibana
|
||||
- https://www.elastic.co/products/kibana
|
||||
version: 10.0.7
|
||||
version: 10.0.8
|
||||
|
||||
@@ -42,7 +42,6 @@ data:
|
||||
tls.crt: {{ $cert.Cert | b64enc | quote }}
|
||||
tls.key: {{ $cert.Key | b64enc | quote }}
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if (include "kibana.createTlsSecret" .) }}
|
||||
@@ -52,6 +51,7 @@ data:
|
||||
{{- $serviceName := include "common.names.fullname" . }}
|
||||
{{- $altNames := list (printf "*.%s.%s.svc.%s" $serviceName $releaseNamespace $clusterDomain) (printf "%s.%s.svc.%s" $serviceName $releaseNamespace $clusterDomain) $serviceName }}
|
||||
{{- $crt := genSignedCert $serviceName nil $altNames 365 $ca }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
|
||||
@@ -409,7 +409,7 @@ ingress:
|
||||
annotations: {}
|
||||
## @param ingress.tls Enable TLS configuration for the hostname defined at ingress.hostname parameter
|
||||
## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }}
|
||||
## You can use the ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it
|
||||
## You can use the ingress.secrets parameter to create this TLS secret or rely on cert-manager to create it
|
||||
##
|
||||
tls: false
|
||||
## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm
|
||||
|
||||
@@ -34,4 +34,4 @@ name: kong
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-kong
|
||||
- https://konghq.com/
|
||||
version: 6.1.21
|
||||
version: 6.1.22
|
||||
|
||||
@@ -410,5 +410,4 @@ subjects:
|
||||
- kind: ServiceAccount
|
||||
name: {{ include "kong.ingressController.serviceAccountName" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
---
|
||||
{{- end }}
|
||||
|
||||
@@ -30,4 +30,4 @@ maintainers:
|
||||
name: kubeapps
|
||||
sources:
|
||||
- https://github.com/vmware-tanzu/kubeapps
|
||||
version: 8.0.18
|
||||
version: 8.0.19
|
||||
|
||||
@@ -16,5 +16,4 @@ data:
|
||||
clientID: {{ required "You must fill \".Values.authProxy.clientID\" with the Client ID of the provider" .Values.authProxy.clientID | b64enc }}
|
||||
clientSecret: {{ required "You must fill \".Values.authProxy.clientSecret\" with the Client Secret of the provider" .Values.authProxy.clientSecret | b64enc }}
|
||||
cookieSecret: {{ required "You must fill \".Values.authProxy.cookieSecret\". More info at https://oauth2-proxy.github.io/oauth2-proxy/docs/configuration/overview/#generating-a-cookie-secret" .Values.authProxy.cookieSecret | b64enc }}
|
||||
---
|
||||
{{- end }}
|
||||
|
||||
@@ -3,5 +3,4 @@ apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
name: {{ include "kubeapps.globalReposNamespace" . | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
|
||||
@@ -35,4 +35,4 @@ name: magento
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-magento
|
||||
- https://magento.com/
|
||||
version: 20.0.1
|
||||
version: 20.0.2
|
||||
|
||||
@@ -26,8 +26,8 @@ spec:
|
||||
matchLabels:
|
||||
{{- include "common.labels.matchLabels" . | nindent 14 }}
|
||||
{{- end }}
|
||||
---
|
||||
{{- if and .Values.networkPolicy.enabled .Values.networkPolicy.ingressRules.backendOnlyAccessibleByFrontend }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.networkPolicy.apiVersion" . }}
|
||||
kind: NetworkPolicy
|
||||
metadata:
|
||||
@@ -54,8 +54,8 @@ spec:
|
||||
matchLabels:
|
||||
{{- include "common.labels.matchLabels" . | nindent 14 }}
|
||||
{{- end }}
|
||||
---
|
||||
{{- if and .Values.networkPolicy.enabled .Values.networkPolicy.ingressRules.backendOnlyAccessibleByFrontend }}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.networkPolicy.apiVersion" . }}
|
||||
kind: NetworkPolicy
|
||||
metadata:
|
||||
|
||||
@@ -813,7 +813,7 @@ ingress:
|
||||
annotations: {}
|
||||
## @param ingress.tls Enable TLS for `ingress.hostname` parameter
|
||||
## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }}
|
||||
## You can use the ingress.secrets parameter to create this TLS secret, relay on cert-manager to create it, or
|
||||
## You can use the ingress.secrets parameter to create this TLS secret, rely on cert-manager to create it, or
|
||||
## let the chart create self-signed certificates for you
|
||||
##
|
||||
tls: false
|
||||
|
||||
@@ -30,4 +30,4 @@ sources:
|
||||
- https://github.com/metallb/metallb
|
||||
- https://github.com/bitnami/bitnami-docker-metallb
|
||||
- https://metallb.universe.tf
|
||||
version: 3.0.1
|
||||
version: 3.0.2
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if and .Values.rbac.create .Values.controller.rbac.create -}}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if and .Values.rbac.create (or .Values.controller.rbac.create .Values.speaker.rbac.create ) -}}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
|
||||
kind: Role
|
||||
metadata:
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
{{- if and .Values.rbac.create .Values.speaker.rbac.create -}}
|
||||
---
|
||||
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
|
||||
@@ -25,4 +25,4 @@ name: minio
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-minio
|
||||
- https://min.io
|
||||
version: 11.3.4
|
||||
version: 11.3.5
|
||||
|
||||
@@ -40,7 +40,6 @@ data:
|
||||
tls.crt: {{ $cert.Cert | b64enc | quote }}
|
||||
tls.key: {{ $cert.Key | b64enc | quote }}
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if (include "minio.createTlsSecret" .) }}
|
||||
@@ -52,6 +51,7 @@ data:
|
||||
{{- $headlessServiceName := printf "%s-headless" (include "common.names.fullname" .) }}
|
||||
{{- $altNames := list (printf "*.%s.%s.svc.%s" $serviceName $releaseNamespace $clusterDomain) (printf "%s.%s.svc.%s" $serviceName $releaseNamespace $clusterDomain) (printf "*.%s.%s.svc.%s" $headlessServiceName $releaseNamespace $clusterDomain) (printf "%s.%s.svc.%s" $headlessServiceName $releaseNamespace $clusterDomain) "127.0.0.1" "localhost" $fullname }}
|
||||
{{- $crt := genSignedCert $fullname nil $altNames 365 $ca }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
|
||||
@@ -26,4 +26,4 @@ name: mongodb-sharded
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-mongodb-sharded
|
||||
- https://mongodb.org
|
||||
version: 5.0.1
|
||||
version: 5.0.2
|
||||
|
||||
@@ -1,7 +1,6 @@
|
||||
{{- if and .Values.mongos.useStatefulSet .Values.mongos.servicePerReplica.enabled }}
|
||||
{{- range $i := until (.Values.mongos.replicaCount | int) }}
|
||||
{{- $context := deepCopy $ | merge (dict "index" $i) }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
@@ -60,5 +59,6 @@ spec:
|
||||
selector: {{ include "common.labels.matchLabels" $ | nindent 4 }}
|
||||
app.kubernetes.io/component: mongos
|
||||
statefulset.kubernetes.io/pod-name: {{ printf "%s-mongos-%d" (include "common.names.fullname" $) $i }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -26,4 +26,4 @@ name: mongodb
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-mongodb
|
||||
- https://mongodb.org
|
||||
version: 12.1.3
|
||||
version: 12.1.4
|
||||
|
||||
@@ -6,7 +6,6 @@
|
||||
{{- range $i, $e := until $replicaCount }}
|
||||
{{- $targetPod := printf "%s-hidden-%d" (printf "%s" $fullName) $i }}
|
||||
{{- $_ := set $ "targetPod" $targetPod }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
|
||||
@@ -6,7 +6,6 @@
|
||||
{{- range $i, $e := until $replicaCount }}
|
||||
{{- $targetPod := printf "%s-%d" (printf "%s" $fullName) $i }}
|
||||
{{- $_ := set $ "targetPod" $targetPod }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
|
||||
@@ -7,7 +7,6 @@
|
||||
{{- range $i, $e := until $replicaCount }}
|
||||
{{- $targetPod := printf "%s-%d" (printf "%s" $fullName) $i }}
|
||||
{{- $_ := set $ "targetPod" $targetPod }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
|
||||
@@ -28,4 +28,4 @@ name: node
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-node
|
||||
- http://nodejs.org/
|
||||
version: 18.0.0
|
||||
version: 18.0.1
|
||||
|
||||
@@ -40,6 +40,5 @@ data:
|
||||
tls.crt: {{ $cert.Cert | b64enc | quote }}
|
||||
tls.key: {{ $cert.Key | b64enc | quote }}
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -631,7 +631,7 @@ ingress:
|
||||
annotations: {}
|
||||
## @param ingress.tls Enable TLS configuration for the hostname defined at ingress.hostname parameter
|
||||
## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }}
|
||||
## You can use the ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it
|
||||
## You can use the ingress.secrets parameter to create this TLS secret or rely on cert-manager to create it
|
||||
##
|
||||
tls: false
|
||||
## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm
|
||||
|
||||
@@ -23,4 +23,4 @@ name: rabbitmq
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-rabbitmq
|
||||
- https://www.rabbitmq.com
|
||||
version: 9.0.7
|
||||
version: 9.0.8
|
||||
|
||||
@@ -40,10 +40,10 @@ data:
|
||||
tls.crt: {{ $cert.Cert | b64enc | quote }}
|
||||
tls.key: {{ $cert.Key | b64enc | quote }}
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if (include "rabbitmq.createTlsSecret" . ) }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
|
||||
@@ -23,4 +23,4 @@ name: redis-cluster
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-redis
|
||||
- http://redis.io/
|
||||
version: 7.5.2
|
||||
version: 7.5.3
|
||||
|
||||
@@ -6,8 +6,6 @@
|
||||
{{- range $i, $e := until $nodesCount }}
|
||||
{{- $targetPod := printf "%s-%d" (printf "%s" $fullName) $i }}
|
||||
{{- $_ := set $ "targetPod" $targetPod }}
|
||||
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
|
||||
@@ -24,4 +24,4 @@ maintainers:
|
||||
name: redis
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-redis
|
||||
version: 16.9.3
|
||||
version: 16.9.4
|
||||
|
||||
@@ -11,8 +11,6 @@
|
||||
{{ $redisport = index $portsmap (printf "%s-node-%s-%s" (include "common.names.fullname" $) (toString $i) "redis") }}
|
||||
{{- else }}
|
||||
{{- end }}
|
||||
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
@@ -67,5 +65,6 @@ spec:
|
||||
targetPort: {{ $.Values.replica.containerPorts.redis }}
|
||||
selector:
|
||||
statefulset.kubernetes.io/pod-name: {{ template "common.names.fullname" $ }}-node-{{ $i }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -1,6 +1,4 @@
|
||||
{{- if or .Release.IsUpgrade (ne .Values.sentinel.service.type "NodePort") .Values.sentinel.service.nodePorts.redis -}}
|
||||
|
||||
---
|
||||
{{- if and (eq .Values.architecture "replication") .Values.sentinel.enabled }}
|
||||
{{ $portsmap := (lookup "v1" "ConfigMap" $.Release.Namespace (printf "%s-%s" ( include "common.names.fullname" . ) "ports-configmap")).data }}
|
||||
|
||||
|
||||
@@ -27,4 +27,4 @@ name: solr
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-solr
|
||||
- https://lucene.apache.org/solr/
|
||||
version: 4.0.11
|
||||
version: 4.0.12
|
||||
|
||||
@@ -40,7 +40,6 @@ data:
|
||||
tls.crt: {{ $cert.Cert | b64enc | quote }}
|
||||
tls.key: {{ $cert.Key | b64enc | quote }}
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
|
||||
@@ -15,9 +15,9 @@ metadata:
|
||||
type: Opaque
|
||||
data:
|
||||
solr-password: {{ include "solr.password" . | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- if (include "solr.createTlsPasswordsSecret" .) }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
@@ -35,5 +35,4 @@ type: Opaque
|
||||
data:
|
||||
keystore-password: {{ default (randAlphaNum 10) .Values.tls.keystorePassword | b64enc | quote }}
|
||||
truststore-password: {{ default (randAlphaNum 10) .Values.tls.truststorePassword | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
|
||||
@@ -22,4 +22,4 @@ name: spark
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-spark
|
||||
- https://spark.apache.org/
|
||||
version: 6.0.1
|
||||
version: 6.0.2
|
||||
|
||||
@@ -40,7 +40,6 @@ data:
|
||||
tls.crt: {{ $cert.Cert | b64enc | quote }}
|
||||
tls.key: {{ $cert.Key | b64enc | quote }}
|
||||
ca.crt: {{ $ca.Cert | b64enc | quote }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if (include "spark.createTlsSecret" . ) }}
|
||||
@@ -52,6 +51,7 @@ data:
|
||||
{{- $masterServiceName := printf "%s-master-svc" (include "common.names.fullname" .) }}
|
||||
{{- $altNames := list (printf "*.%s.%s.svc.%s" $masterServiceName $releaseNamespace $clusterDomain) (printf "%s.%s.svc.%s" $masterServiceName $releaseNamespace $clusterDomain) (printf "*.%s.%s.svc.%s" $headlessServiceName $releaseNamespace $clusterDomain) (printf "%s.%s.svc.%s" $headlessServiceName $releaseNamespace $clusterDomain) $fullname }}
|
||||
{{- $crt := genSignedCert $fullname nil $altNames 365 $ca }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
|
||||
@@ -817,7 +817,7 @@ ingress:
|
||||
annotations: {}
|
||||
## @param ingress.tls Enable TLS configuration for the hostname defined at ingress.hostname parameter
|
||||
## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }}
|
||||
## You can use the ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it
|
||||
## You can use the ingress.secrets parameter to create this TLS secret or rely on cert-manager to create it
|
||||
##
|
||||
tls: false
|
||||
## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user