From 2f3e2beea845c8403fc33b5a75f57909bb63037a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Javier=20J=2E=20Salmer=C3=B3n-Garc=C3=ADa?= Date: Thu, 31 Dec 2020 15:53:06 +0100 Subject: [PATCH] [bitnami/*] Update ingress rules (batch 1) (#4870) --- bitnami/airflow/Chart.lock | 10 +- bitnami/airflow/Chart.yaml | 2 +- bitnami/airflow/README.md | 513 +++++++++++---------- bitnami/airflow/templates/web/ingress.yaml | 7 +- bitnami/airflow/values-production.yaml | 41 +- bitnami/airflow/values.yaml | 13 + bitnami/apache/Chart.lock | 6 +- bitnami/apache/Chart.yaml | 2 +- bitnami/apache/README.md | 4 + bitnami/apache/templates/ingress.yaml | 18 +- bitnami/apache/values.yaml | 19 + bitnami/aspnet-core/Chart.lock | 6 +- bitnami/aspnet-core/Chart.yaml | 2 +- bitnami/aspnet-core/README.md | 4 + bitnami/aspnet-core/templates/ingress.yaml | 11 +- bitnami/aspnet-core/values-production.yaml | 23 + bitnami/aspnet-core/values.yaml | 23 + bitnami/consul/Chart.lock | 6 +- bitnami/consul/Chart.yaml | 2 +- bitnami/consul/README.md | 265 +++++------ bitnami/consul/templates/ingress.yaml | 14 +- bitnami/consul/values-production.yaml | 16 +- bitnami/consul/values.yaml | 14 + bitnami/discourse/Chart.lock | 10 +- bitnami/discourse/Chart.yaml | 2 +- bitnami/discourse/README.md | 305 ++++++------ bitnami/discourse/templates/ingress.yaml | 16 +- bitnami/discourse/values-production.yaml | 44 +- bitnami/discourse/values.yaml | 21 + bitnami/wordpress/Chart.lock | 6 +- bitnami/wordpress/Chart.yaml | 2 +- 31 files changed, 803 insertions(+), 624 deletions(-) diff --git a/bitnami/airflow/Chart.lock b/bitnami/airflow/Chart.lock index a5a1bcf225..3883a38763 100644 --- a/bitnami/airflow/Chart.lock +++ b/bitnami/airflow/Chart.lock @@ -1,12 +1,12 @@ dependencies: - name: common repository: https://charts.bitnami.com/bitnami - version: 1.1.2 + version: 1.2.3 - name: postgresql repository: https://charts.bitnami.com/bitnami - version: 10.1.3 + version: 10.2.0 - name: redis repository: https://charts.bitnami.com/bitnami - version: 12.2.1 -digest: sha256:3e7dd5fd05ea6fad522bdea76e2ce8c89cd057b6f3156c6773ef8ef14484dca7 -generated: "2020-12-11T12:20:14.151485+01:00" + version: 12.2.4 +digest: sha256:1cc42d60ef7a1fc81a3f800870c5c3c4fe8aef167ab9d08015d8fbf2648b633a +generated: "2020-12-31T12:24:53.687093+01:00" diff --git a/bitnami/airflow/Chart.yaml b/bitnami/airflow/Chart.yaml index 9988de1e23..0cda0bb0f8 100644 --- a/bitnami/airflow/Chart.yaml +++ b/bitnami/airflow/Chart.yaml @@ -32,4 +32,4 @@ name: airflow sources: - https://github.com/bitnami/bitnami-docker-airflow - https://airflow.apache.org/ -version: 7.0.5 +version: 7.1.0 diff --git a/bitnami/airflow/README.md b/bitnami/airflow/README.md index 43299fb673..fa96ae5d4d 100644 --- a/bitnami/airflow/README.md +++ b/bitnami/airflow/README.md @@ -46,291 +46,294 @@ The command removes all the Kubernetes components associated with the chart and The following tables lists the configurable parameters of the Airflow chart and their default values. -| Parameter | Description | Default | -|----------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------| -| `global.imageRegistry` | Global Docker image registry | `nil` | -| `global.imagePullSecrets` | Global Docker registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | -| `global.storageClass` | Global storage class for dynamic provisioning | `nil` | +| Parameter | Description | Default | +|---------------------------|-------------------------------------------------|---------------------------------------------------------| +| `global.imageRegistry` | Global Docker image registry | `nil` | +| `global.imagePullSecrets` | Global Docker registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | +| `global.storageClass` | Global storage class for dynamic provisioning | `nil` | ### Common parameters -| Parameter | Description | Default | -|----------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------| -| `affinity` | Affinity for pod assignment (evaluated as a template) | `{}` | -| `commonAnnotations` | Annotations to add to all deployed objects | `{}` | -| `commonLabels` | Labels to add to all deployed objects | `{}` | -| `containerSecurityContext.enabled` | Enable container security context | `true` | -| `containerSecurityContext.runAsUser` | User ID for the container | `1001` | -| `extraDeploy` | A list of extra kubernetes resources to be deployed | `[]` | -| `extraEnvVars` | Extra environment variables to add to web, worker and scheduler pods | `nil` | -| `extraEnvVarsCM` | ConfigMap containing extra env vars to add to web, worker and scheduler pods | `nil` | -| `extraEnvVarsSecret` | Secret containing extra env vars to add to web, worker and scheduler pods | `nil` | -| `fullnameOverride` | String to fully override airflow.fullname template with a string | `nil` | -| `initContainers` | List of init containers to be added to the web, worker and scheduler pods | `nil` | -| `nameOverride` | String to partially override airflow.fullname template with a string (will prepend the release name) | `nil` | -| `networkPolicies.enabled` | Switch to enable network policies | `false` | -| `nodeAffinityPreset.key` | Node label key to match Ignored if `affinity` is set. | `""` | -| `nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set. | `[]` | -| `nodeSelector` | Node labels for pod assignment | `{}` (evaluated as a template) | -| `podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `podSecurityContext.enabled` | Enable pod security context | `true` | -| `podSecurityContext.fsGroup` | fsGroup ID for the pod | `1001` | -| `rbac.create` | If true, create & use RBAC resources | `false` | -| `serviceAccount.annotations` | Annotations for service account | `{}` | -| `serviceAccount.create` | If true, create a service account | `false` | -| `serviceAccount.name` | The name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `` | -| `sidecars` | List of sidecar containers to be adde to web, worker and scheduler pods | `nil` | -| `tolerations` | Tolerations for pod assignment | `[]` (evaluated as a template) | +| Parameter | Description | Default | +|--------------------------------------|-------------------------------------------------------------------------------------------------------------------------|--------------------------------| +| `affinity` | Affinity for pod assignment (evaluated as a template) | `{}` | +| `commonAnnotations` | Annotations to add to all deployed objects | `{}` | +| `commonLabels` | Labels to add to all deployed objects | `{}` | +| `containerSecurityContext.enabled` | Enable container security context | `true` | +| `containerSecurityContext.runAsUser` | User ID for the container | `1001` | +| `extraDeploy` | A list of extra kubernetes resources to be deployed | `[]` | +| `kubeVersion` | Force target Kubernetes version (using Helm capabilities if not set) | `nil` | +| `extraEnvVars` | Extra environment variables to add to web, worker and scheduler pods | `nil` | +| `extraEnvVarsCM` | ConfigMap containing extra env vars to add to web, worker and scheduler pods | `nil` | +| `extraEnvVarsSecret` | Secret containing extra env vars to add to web, worker and scheduler pods | `nil` | +| `fullnameOverride` | String to fully override airflow.fullname template with a string | `nil` | +| `initContainers` | List of init containers to be added to the web, worker and scheduler pods | `nil` | +| `nameOverride` | String to partially override airflow.fullname template with a string (will prepend the release name) | `nil` | +| `networkPolicies.enabled` | Switch to enable network policies | `false` | +| `nodeAffinityPreset.key` | Node label key to match Ignored if `affinity` is set. | `""` | +| `nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set. | `[]` | +| `nodeSelector` | Node labels for pod assignment | `{}` (evaluated as a template) | +| `podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `podSecurityContext.enabled` | Enable pod security context | `true` | +| `podSecurityContext.fsGroup` | fsGroup ID for the pod | `1001` | +| `rbac.create` | If true, create & use RBAC resources | `false` | +| `serviceAccount.annotations` | Annotations for service account | `{}` | +| `serviceAccount.create` | If true, create a service account | `false` | +| `serviceAccount.name` | The name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `` | +| `sidecars` | List of sidecar containers to be adde to web, worker and scheduler pods | `nil` | +| `tolerations` | Tolerations for pod assignment | `[]` (evaluated as a template) | ### Airflow common parameters -| Parameter | Description | Default | -|----------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------| -| `auth.existingSecret` | Name of an existing secret containing password and fernet key ('airflow-password and 'airflow-fernetKey' keys) | `nil` | -| `auth.fernetKey` | Fernet key to secure connections | `nil` | -| `auth.forcePassword` | Force users to specify a password | `false` | -| `auth.password` | Password to access web UI | `nil` | -| `auth.username` | Username to access web UI | `user` | -| `configurationConfigMap` | Name of an existing config map containing the Airflow config file | `nil` | -| `dagsConfigMap` | Name of an existing config map containing all the DAGs files you want to load in Airflow. | `nil` | -| `executor` | Airflow executor, it should be one of `SequentialExecutor`, `Local Executor`, `CeleryExecutor`, `KubernetesExecutor` | `"CeleryExecutor"` | -| `loadExamples` | Switch to load some Airflow examples | `false` | +| Parameter | Description | Default | +|--------------------------|----------------------------------------------------------------------------------------------------------------------|--------------------| +| `auth.existingSecret` | Name of an existing secret containing password and fernet key ('airflow-password and 'airflow-fernetKey' keys) | `nil` | +| `auth.fernetKey` | Fernet key to secure connections | `nil` | +| `auth.forcePassword` | Force users to specify a password | `false` | +| `auth.password` | Password to access web UI | `nil` | +| `auth.username` | Username to access web UI | `user` | +| `configurationConfigMap` | Name of an existing config map containing the Airflow config file | `nil` | +| `dagsConfigMap` | Name of an existing config map containing all the DAGs files you want to load in Airflow. | `nil` | +| `executor` | Airflow executor, it should be one of `SequentialExecutor`, `Local Executor`, `CeleryExecutor`, `KubernetesExecutor` | `"CeleryExecutor"` | +| `loadExamples` | Switch to load some Airflow examples | `false` | ## Airflow web parameters -| Parameter | Description | Default | -|----------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------| -| `web.args` | Override default container args (useful when using custom images) | `nil` | -| `web.baseUrl` | URL used to access to airflow web ui | `nil` | -| `web.command` | Override default container command (useful when using custom images) | `nil` | -| `web.configMap` | Config map name for ~/airflow/webserver_config.py | `nil` | -| `web.containerPort` | Container port to be used for exposing http server. | `8080` | -| `web.customLivenessProbe` | Custom liveness probe for the web component | `{}` | -| `web.customReadinessProbe` | Custom rediness probe for the web component | `{}` | -| `web.extraEnvVars` | Array containing extra env vars | `nil` | -| `web.extraEnvVarsCM` | ConfigMap containing extra env vars | `nil` | -| `web.extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `nil` | -| `web.extraVolumeMounts` | Array of extra volume mounts to be added (evaluated as template). Normally used with `extraVolumes`. | `nil` | -| `web.extraVolumes` | Array of extra volumes to be added (evaluated as template). | `nil` | -| `web.image.debug` | Specify if debug values should be set | `false` | -| `web.image.pullPolicy` | Airflow web image pull policy | `IfNotPresent` | -| `web.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | -| `web.image.registry` | Airflow web image registry | `docker.io` | -| `web.image.repository` | Airflow web image name | `bitnami/airflow` | -| `web.image.tag` | Airflow web image tag | `{TAG_NAME}` | -| `web.initContainers` | List of init containers to be added to the web's pods | `nil` | -| `web.livenessProbe.enabled` | Switch to enable livess probe | `true` | -| `web.livenessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | 6 | -| `web.livenessProbe.initialDelaySeconds` | Delay before liveness probe is initiated | 180 | -| `web.livenessProbe.periodSeconds` | How often to perform the probe | 20 | -| `web.livenessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed | 1 | -| `web.livenessProbe.timeoutSeconds` | When the probe times out | 5 | -| `web.podAnnotations` | Annotations to add to the web's pods | `nil` | -| `web.podDisruptionBudget.enabled` | Switch to enable Pod Disruption Budget for Airflow web component | `false` | -| `web.podDisruptionBudget.minAvailable` | Set the minimum amount of pods available | `1` | -| `web.podLabels` | Labels to add to the web's pods | `nil` | -| `web.priorityClassName` | Priority class name for the web's pods | `""` | -| `web.readinessProbe.enabled` | would you like a readinessProbe to be enabled | `true` | -| `web.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | 6 | -| `web.readinessProbe.initialDelaySeconds` | Delay before liveness probe is initiated | 30 | -| `web.readinessProbe.periodSeconds` | How often to perform the probe | 10 | -| `web.readinessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed | 1 | -| `web.readinessProbe.timeoutSeconds` | When the probe times out | 5 | -| `web.replicaCount` | Number of Airflow web replicas | `2` | -| `web.resources.limits` | The resources limits for the web containers | `{}` | -| `web.resources.requests` | The requested resources for the web containers | `{}` | -| `web.sidecars` | List of sidecar containers to be added to the web's pods | `nil` | -| `service.type` | Kubernetes Service type | `ClusterIP` | -| `service.port` | Airflow Web port | `8080` | -| `service.nodePort` | Kubernetes Service nodePort | `nil` | -| `service.loadBalancerIP` | loadBalancerIP for Airflow Service | `nil` | -| `service.annotations` | Service annotations | `` | +| Parameter | Description | Default | +|------------------------------------------|------------------------------------------------------------------------------------------------------|---------------------------------------------------------| +| `web.args` | Override default container args (useful when using custom images) | `nil` | +| `web.baseUrl` | URL used to access to airflow web ui | `nil` | +| `web.command` | Override default container command (useful when using custom images) | `nil` | +| `web.configMap` | Config map name for ~/airflow/webserver_config.py | `nil` | +| `web.containerPort` | Container port to be used for exposing http server. | `8080` | +| `web.customLivenessProbe` | Custom liveness probe for the web component | `{}` | +| `web.customReadinessProbe` | Custom rediness probe for the web component | `{}` | +| `web.extraEnvVars` | Array containing extra env vars | `nil` | +| `web.extraEnvVarsCM` | ConfigMap containing extra env vars | `nil` | +| `web.extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `nil` | +| `web.extraVolumeMounts` | Array of extra volume mounts to be added (evaluated as template). Normally used with `extraVolumes`. | `nil` | +| `web.extraVolumes` | Array of extra volumes to be added (evaluated as template). | `nil` | +| `web.image.debug` | Specify if debug values should be set | `false` | +| `web.image.pullPolicy` | Airflow web image pull policy | `IfNotPresent` | +| `web.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | +| `web.image.registry` | Airflow web image registry | `docker.io` | +| `web.image.repository` | Airflow web image name | `bitnami/airflow` | +| `web.image.tag` | Airflow web image tag | `{TAG_NAME}` | +| `web.initContainers` | List of init containers to be added to the web's pods | `nil` | +| `web.livenessProbe.enabled` | Switch to enable livess probe | `true` | +| `web.livenessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | 6 | +| `web.livenessProbe.initialDelaySeconds` | Delay before liveness probe is initiated | 180 | +| `web.livenessProbe.periodSeconds` | How often to perform the probe | 20 | +| `web.livenessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed | 1 | +| `web.livenessProbe.timeoutSeconds` | When the probe times out | 5 | +| `web.podAnnotations` | Annotations to add to the web's pods | `nil` | +| `web.podDisruptionBudget.enabled` | Switch to enable Pod Disruption Budget for Airflow web component | `false` | +| `web.podDisruptionBudget.minAvailable` | Set the minimum amount of pods available | `1` | +| `web.podLabels` | Labels to add to the web's pods | `nil` | +| `web.priorityClassName` | Priority class name for the web's pods | `""` | +| `web.readinessProbe.enabled` | would you like a readinessProbe to be enabled | `true` | +| `web.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | 6 | +| `web.readinessProbe.initialDelaySeconds` | Delay before liveness probe is initiated | 30 | +| `web.readinessProbe.periodSeconds` | How often to perform the probe | 10 | +| `web.readinessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed | 1 | +| `web.readinessProbe.timeoutSeconds` | When the probe times out | 5 | +| `web.replicaCount` | Number of Airflow web replicas | `2` | +| `web.resources.limits` | The resources limits for the web containers | `{}` | +| `web.resources.requests` | The requested resources for the web containers | `{}` | +| `web.sidecars` | List of sidecar containers to be added to the web's pods | `nil` | +| `service.type` | Kubernetes Service type | `ClusterIP` | +| `service.port` | Airflow Web port | `8080` | +| `service.nodePort` | Kubernetes Service nodePort | `nil` | +| `service.loadBalancerIP` | loadBalancerIP for Airflow Service | `nil` | +| `service.annotations` | Service annotations | `` | ### Airflow scheduler parameters -| Parameter | Description | Default | -|----------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------| -| `scheduler.args` | Override default container args (useful when using custom images) | `nil` | -| `scheduler.command` | Override default container command (useful when using custom images) | `nil` | -| `scheduler.customLivenessProbe` | Custom liveness probe for the Airflow scheduler component | `{}` | -| `scheduler.customReadinessProbe` | Custom rediness probe for the Airflow scheduler component | `{}` | -| `scheduler.extraEnvVars` | Array containing extra env vars | `nil` | -| `scheduler.extraEnvVarsCM` | ConfigMap containing extra env vars | `nil` | -| `scheduler.extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `nil` | -| `scheduler.extraVolumeMounts` | Array of extra volume mounts to be added (evaluated as template). Normally used with `extraVolumes`. | `nil` | -| `scheduler.extraVolumes` | Array of extra volumes to be added (evaluated as template). | `nil` | -| `scheduler.image.debug` | Specify if debug values should be set | `false` | -| `scheduler.image.pullPolicy` | Airflow Scheduler image pull policy | `IfNotPresent` | -| `scheduler.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | -| `scheduler.image.registry` | Airflow Scheduler image registry | `docker.io` | -| `scheduler.image.repository` | Airflow Scheduler image name | `bitnami/airflow-scheduler` | -| `scheduler.image.tag` | Airflow Scheduler image tag | `{TAG_NAME}` | -| `scheduler.initContainers` | List of init containers to be added to the scheduler's pods | `nil` | -| `scheduler.podAnnotations` | Annotations to add to the scheduler's pods | `nil` | -| `scheduler.podDisruptionBudget.enabled` | Switch to enable Pod Disruption Budget for Airflow scheduler component | `false` | -| `scheduler.podDisruptionBudget.minAvailable` | Set the minimum amount of pods available | `1` | -| `scheduler.podLabels` | Labels to add to the scheduler's pods | `nil` | -| `scheduler.priorityClassName` | Priority class name for the scheduler's pods | `""` | -| `scheduler.replicaCount` | Number of Airflow scheduler replicas | `2` | -| `scheduler.resources.limits` | The resources limits for the scheduler containers | `{}` | -| `scheduler.resources.requests` | The requested resources for the scheduler containers | `{}` | -| `scheduler.sidecars` | List of sidecar containers to be added to the scheduler's pods | `nil` | +| Parameter | Description | Default | +|----------------------------------------------|------------------------------------------------------------------------------------------------------|---------------------------------------------------------| +| `scheduler.args` | Override default container args (useful when using custom images) | `nil` | +| `scheduler.command` | Override default container command (useful when using custom images) | `nil` | +| `scheduler.customLivenessProbe` | Custom liveness probe for the Airflow scheduler component | `{}` | +| `scheduler.customReadinessProbe` | Custom rediness probe for the Airflow scheduler component | `{}` | +| `scheduler.extraEnvVars` | Array containing extra env vars | `nil` | +| `scheduler.extraEnvVarsCM` | ConfigMap containing extra env vars | `nil` | +| `scheduler.extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `nil` | +| `scheduler.extraVolumeMounts` | Array of extra volume mounts to be added (evaluated as template). Normally used with `extraVolumes`. | `nil` | +| `scheduler.extraVolumes` | Array of extra volumes to be added (evaluated as template). | `nil` | +| `scheduler.image.debug` | Specify if debug values should be set | `false` | +| `scheduler.image.pullPolicy` | Airflow Scheduler image pull policy | `IfNotPresent` | +| `scheduler.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | +| `scheduler.image.registry` | Airflow Scheduler image registry | `docker.io` | +| `scheduler.image.repository` | Airflow Scheduler image name | `bitnami/airflow-scheduler` | +| `scheduler.image.tag` | Airflow Scheduler image tag | `{TAG_NAME}` | +| `scheduler.initContainers` | List of init containers to be added to the scheduler's pods | `nil` | +| `scheduler.podAnnotations` | Annotations to add to the scheduler's pods | `nil` | +| `scheduler.podDisruptionBudget.enabled` | Switch to enable Pod Disruption Budget for Airflow scheduler component | `false` | +| `scheduler.podDisruptionBudget.minAvailable` | Set the minimum amount of pods available | `1` | +| `scheduler.podLabels` | Labels to add to the scheduler's pods | `nil` | +| `scheduler.priorityClassName` | Priority class name for the scheduler's pods | `""` | +| `scheduler.replicaCount` | Number of Airflow scheduler replicas | `2` | +| `scheduler.resources.limits` | The resources limits for the scheduler containers | `{}` | +| `scheduler.resources.requests` | The requested resources for the scheduler containers | `{}` | +| `scheduler.sidecars` | List of sidecar containers to be added to the scheduler's pods | `nil` | ### Airflow worker parameters -| Parameter | Description | Default | -|----------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------| -| `worker.args` | Override default container args (useful when using custom images) | `nil` | -| `worker.autoscaling.enabled` | Switch to enable Horizontal Pod Autoscaler for Airflow worker component (only when executor is `CeleryExecutor`). When enable you should also set `resources.requests` | `false` | -| `worker.autoscaling.replicas.max` | Maximum amount of replicas | `3` | -| `worker.autoscaling.replicas.min` | Minimum amount of replicas | `1` | -| `worker.autoscaling.targets.cpu` | Target cpu that will trigger an scaling action (unit: %) | `80` | -| `worker.autoscaling.targets.memory` | Target memory that will trigger an scaling action (unit: %) | `80` | -| `worker.command` | Override default container command (useful when using custom images) | `nil` | -| `worker.customLivenessProbe` | Custom liveness probe for the Airflow worker component | `{}` | -| `worker.customReadinessProbe` | Custom rediness probe for the Airflow worker component | `{}` | -| `worker.extraEnvVars` | Array containing extra env vars | `nil` | -| `worker.extraEnvVarsCM` | ConfigMap containing extra env vars | `nil` | -| `worker.extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `nil` | -| `worker.extraVolumeMounts` | Array of extra volume mounts to be added (evaluated as template). Normally used with `extraVolumes`. | `nil` | -| `worker.extraVolumes` | Array of extra volumes to be added (evaluated as template). | `nil` | -| `worker.image.debug` | Specify if debug values should be set | `false` | -| `worker.image.pullPolicy` | Airflow worker image pull policy | `IfNotPresent` | -| `worker.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | -| `worker.image.registry` | Airflow worker image registry | `docker.io` | -| `worker.image.repository` | Airflow worker image name | `bitnami/airflow-worker` | -| `worker.image.tag` | Airflow worker image tag | `{TAG_NAME}` | -| `worker.initContainers` | List of init containers to be added to the worker's pods | `nil` | -| `worker.livenessProbe.enabled` | Switch to enable livess probe | `true` | -| `worker.livenessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | 6 | -| `worker.livenessProbe.initialDelaySeconds` | Delay before liveness probe is initiated | 180 | -| `worker.livenessProbe.periodSeconds` | How often to perform the probe | 20 | -| `worker.livenessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed | 1 | -| `worker.livenessProbe.timeoutSeconds` | When the probe times out | 5 | -| `worker.podAnnotations` | Annotations to add to the worker's pods | `nil` | -| `worker.podDisruptionBudget.enabled` | Switch to enable Pod Disruption Budget for Airflow worker component | `false` | -| `worker.podDisruptionBudget.minAvailable` | Set the minimum amount of pods available | `1` | -| `worker.podLabels` | Labels to add to the worker's pods | `nil` | -| `worker.podManagementPolicy` | Pod management policy to manage scaling operation of worker pods | `nil` | -| `worker.port` | Port to bind Arflow workers | `8793` | -| `worker.priorityClassName` | Priority class name for the worker's pods | `""` | -| `worker.readinessProbe.enabled` | would you like a readinessProbe to be enabled | `true` | -| `worker.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | 6 | -| `worker.readinessProbe.initialDelaySeconds` | Delay before liveness probe is initiated | 30 | -| `worker.readinessProbe.periodSeconds` | How often to perform the probe | 10 | -| `worker.readinessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed | 1 | -| `worker.readinessProbe.timeoutSeconds` | When the probe times out | 5 | -| `worker.replicaCount` | Number of Airflow worker replicas | `2` | -| `worker.resources.limits` | The resources limits for the worker containers | `{}` | -| `worker.resources.requests` | The requested resources for the worker containers | `{}` | -| `worker.rollingUpdatePartition` | Partition update strategy | `nil` | -| `worker.sidecars` | List of sidecar containers to be added to the worker's pods | `nil` | -| `worker.updateStrategy` | pdate strategy for the statefulset | `"RollingUpdate"` | +| Parameter | Description | Default | +|---------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------| +| `worker.args` | Override default container args (useful when using custom images) | `nil` | +| `worker.autoscaling.enabled` | Switch to enable Horizontal Pod Autoscaler for Airflow worker component (only when executor is `CeleryExecutor`). When enable you should also set `resources.requests` | `false` | +| `worker.autoscaling.replicas.max` | Maximum amount of replicas | `3` | +| `worker.autoscaling.replicas.min` | Minimum amount of replicas | `1` | +| `worker.autoscaling.targets.cpu` | Target cpu that will trigger an scaling action (unit: %) | `80` | +| `worker.autoscaling.targets.memory` | Target memory that will trigger an scaling action (unit: %) | `80` | +| `worker.command` | Override default container command (useful when using custom images) | `nil` | +| `worker.customLivenessProbe` | Custom liveness probe for the Airflow worker component | `{}` | +| `worker.customReadinessProbe` | Custom rediness probe for the Airflow worker component | `{}` | +| `worker.extraEnvVars` | Array containing extra env vars | `nil` | +| `worker.extraEnvVarsCM` | ConfigMap containing extra env vars | `nil` | +| `worker.extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `nil` | +| `worker.extraVolumeMounts` | Array of extra volume mounts to be added (evaluated as template). Normally used with `extraVolumes`. | `nil` | +| `worker.extraVolumes` | Array of extra volumes to be added (evaluated as template). | `nil` | +| `worker.image.debug` | Specify if debug values should be set | `false` | +| `worker.image.pullPolicy` | Airflow worker image pull policy | `IfNotPresent` | +| `worker.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | +| `worker.image.registry` | Airflow worker image registry | `docker.io` | +| `worker.image.repository` | Airflow worker image name | `bitnami/airflow-worker` | +| `worker.image.tag` | Airflow worker image tag | `{TAG_NAME}` | +| `worker.initContainers` | List of init containers to be added to the worker's pods | `nil` | +| `worker.livenessProbe.enabled` | Switch to enable livess probe | `true` | +| `worker.livenessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | 6 | +| `worker.livenessProbe.initialDelaySeconds` | Delay before liveness probe is initiated | 180 | +| `worker.livenessProbe.periodSeconds` | How often to perform the probe | 20 | +| `worker.livenessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed | 1 | +| `worker.livenessProbe.timeoutSeconds` | When the probe times out | 5 | +| `worker.podAnnotations` | Annotations to add to the worker's pods | `nil` | +| `worker.podDisruptionBudget.enabled` | Switch to enable Pod Disruption Budget for Airflow worker component | `false` | +| `worker.podDisruptionBudget.minAvailable` | Set the minimum amount of pods available | `1` | +| `worker.podLabels` | Labels to add to the worker's pods | `nil` | +| `worker.podManagementPolicy` | Pod management policy to manage scaling operation of worker pods | `nil` | +| `worker.port` | Port to bind Arflow workers | `8793` | +| `worker.priorityClassName` | Priority class name for the worker's pods | `""` | +| `worker.readinessProbe.enabled` | would you like a readinessProbe to be enabled | `true` | +| `worker.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | 6 | +| `worker.readinessProbe.initialDelaySeconds` | Delay before liveness probe is initiated | 30 | +| `worker.readinessProbe.periodSeconds` | How often to perform the probe | 10 | +| `worker.readinessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed | 1 | +| `worker.readinessProbe.timeoutSeconds` | When the probe times out | 5 | +| `worker.replicaCount` | Number of Airflow worker replicas | `2` | +| `worker.resources.limits` | The resources limits for the worker containers | `{}` | +| `worker.resources.requests` | The requested resources for the worker containers | `{}` | +| `worker.rollingUpdatePartition` | Partition update strategy | `nil` | +| `worker.sidecars` | List of sidecar containers to be added to the worker's pods | `nil` | +| `worker.updateStrategy` | pdate strategy for the statefulset | `"RollingUpdate"` | ### Airflow database parameters -| Parameter | Description | Default | -|----------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------| -| `externalDatabase.database` | External PostgreSQL database name | `nil` | -| `externalDatabase.existingSecret` | Name of an existing secret containing the PostgreSQL password ('postgresql-password' key) | `nil` | -| `externalDatabase.host` | External PostgreSQL host | `nil` | -| `externalDatabase.password` | External PostgreSQL password | `nil` | -| `externalDatabase.port` | External PostgreSQL port | `nil` | -| `externalDatabase.user` | External PostgreSQL user | `nil` | -| `externalRedis.existingSecret` | Name of an existing secret containing the Redis password ('redis-password' key) | `nil` | -| `externalRedis.host` | External Redis host | `nil` | -| `externalRedis.password` | External Redis password | `nil` | -| `externalRedis.port` | External Redis port | `nil` | -| `externalRedis.username` | External Redis username (not required on most Redis implementations) | `nil` | -| `postgresql.enabled` | Switch to enable or disable the PostgreSQL helm chart | `true` | -| `postgresql.existingSecret` | Name of an existing secret containing the PostgreSQL password ('postgresql-password' key) . This secret is used in case of postgresql.enabled=true and we would like to specify password for newly created postgresql instance | `nil` | -| `postgresql.postgresqlDatabase` | Airflow Postgresql database | `bitnami_airflow` | -| `postgresql.postgresqlPassword` | Airflow Postgresql password | `nil` | -| `postgresql.postgresqlUsername` | Airflow Postgresql username | `bn_airflow` | -| `redis.cluster.enabled` | Switch to enable a clustered redis | `false` | -| `redis.enabled` | Switch to enable or disable the Redis helm chart | `true` | -| `redis.existingSecret` | Name of an existing secret containing the Redis password ('redis-password' key) . This secret is used in case of redis.enabled=true and we would like to specify password for newly created redis instance | `nil` | +| Parameter | Description | Default | +|-----------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------| +| `externalDatabase.database` | External PostgreSQL database name | `nil` | +| `externalDatabase.existingSecret` | Name of an existing secret containing the PostgreSQL password ('postgresql-password' key) | `nil` | +| `externalDatabase.host` | External PostgreSQL host | `nil` | +| `externalDatabase.password` | External PostgreSQL password | `nil` | +| `externalDatabase.port` | External PostgreSQL port | `nil` | +| `externalDatabase.user` | External PostgreSQL user | `nil` | +| `externalRedis.existingSecret` | Name of an existing secret containing the Redis password ('redis-password' key) | `nil` | +| `externalRedis.host` | External Redis host | `nil` | +| `externalRedis.password` | External Redis password | `nil` | +| `externalRedis.port` | External Redis port | `nil` | +| `externalRedis.username` | External Redis username (not required on most Redis implementations) | `nil` | +| `postgresql.enabled` | Switch to enable or disable the PostgreSQL helm chart | `true` | +| `postgresql.existingSecret` | Name of an existing secret containing the PostgreSQL password ('postgresql-password' key) . This secret is used in case of postgresql.enabled=true and we would like to specify password for newly created postgresql instance | `nil` | +| `postgresql.postgresqlDatabase` | Airflow Postgresql database | `bitnami_airflow` | +| `postgresql.postgresqlPassword` | Airflow Postgresql password | `nil` | +| `postgresql.postgresqlUsername` | Airflow Postgresql username | `bn_airflow` | +| `redis.cluster.enabled` | Switch to enable a clustered redis | `false` | +| `redis.enabled` | Switch to enable or disable the Redis helm chart | `true` | +| `redis.existingSecret` | Name of an existing secret containing the Redis password ('redis-password' key) . This secret is used in case of redis.enabled=true and we would like to specify password for newly created redis instance | `nil` | ### Airflow exposing parameters -| Parameter | Description | Default | -|----------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------| -| `ingress.annotations` | Ingress annotations | `[]` | -| `ingress.certManager` | Add annotations for cert-manager | `false` | -| `ingress.enabled` | Enable ingress controller resource | `false` | -| `ingress.hosts[0].name` | Hostname to your Airflow installation | `airflow.local` | -| `ingress.hosts[0].path` | Path within the url structure | `/` | -| `ingress.hosts[0].tls` | Utilize TLS backend in ingress | `false` | -| `ingress.hosts[0].tlsHosts` | Array of TLS hosts for ingress record (defaults to `ingress.hosts[0].name` if `nil`) | `nil` | -| `ingress.hosts[0].tlsSecret` | TLS Secret (certificates) | `airflow.local-tls` | -| `ingress.secrets[0].name` | TLS Secret Name | `nil` | -| `ingress.secrets[0].certificate` | TLS Secret Certificate | `nil` | -| `ingress.secrets[0].key` | TLS Secret Key | `nil` | +| Parameter | Description | Default | +|----------------------------------|--------------------------------------------------------------------------------------|--------------------------| +| `ingress.annotations` | Ingress annotations | `[]` | +| `ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `` | +| `ingress.pathType` | Ingress path type | `ImplementationSpecific` | +| `ingress.certManager` | Add annotations for cert-manager | `false` | +| `ingress.enabled` | Enable ingress controller resource | `false` | +| `ingress.hosts[0].name` | Hostname to your Airflow installation | `airflow.local` | +| `ingress.hosts[0].path` | Path within the url structure | `/` | +| `ingress.hosts[0].tls` | Utilize TLS backend in ingress | `false` | +| `ingress.hosts[0].tlsHosts` | Array of TLS hosts for ingress record (defaults to `ingress.hosts[0].name` if `nil`) | `nil` | +| `ingress.hosts[0].tlsSecret` | TLS Secret (certificates) | `airflow.local-tls` | +| `ingress.secrets[0].name` | TLS Secret Name | `nil` | +| `ingress.secrets[0].certificate` | TLS Secret Certificate | `nil` | +| `ingress.secrets[0].key` | TLS Secret Key | `nil` | ### Airflow metrics parameters -| Parameter | Description | Default | -|----------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------| -| `metrics.enabled` | Start a side-car prometheus exporter | `false` | -| `metrics.image.pullPolicy` | Image pull policy | `IfNotPresent` | -| `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | -| `metrics.image.registry` | Airflow exporter image registry | `docker.io` | -| `metrics.image.repository` | Airflow exporter image name | `bitnami/airflow-exporter` | -| `metrics.image.tag` | Airflow exporter image tag | `{TAG_NAME}` | -| `metrics.podAnnotations` | Annotations to add to the metrics's pods | `nil` | -| `metrics.podLabels` | Labels to add to the worker's pods | `{}` | -| `metrics.resources` | The resources for the metrics containers | `{}` | -| `metrics.tolerations` | The tolerations for the metrics pod | `[]` | +| Parameter | Description | Default | +|-----------------------------|--------------------------------------------------|---------------------------------------------------------| +| `metrics.enabled` | Start a side-car prometheus exporter | `false` | +| `metrics.image.pullPolicy` | Image pull policy | `IfNotPresent` | +| `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | +| `metrics.image.registry` | Airflow exporter image registry | `docker.io` | +| `metrics.image.repository` | Airflow exporter image name | `bitnami/airflow-exporter` | +| `metrics.image.tag` | Airflow exporter image tag | `{TAG_NAME}` | +| `metrics.podAnnotations` | Annotations to add to the metrics's pods | `nil` | +| `metrics.podLabels` | Labels to add to the worker's pods | `{}` | +| `metrics.resources` | The resources for the metrics containers | `{}` | +| `metrics.tolerations` | The tolerations for the metrics pod | `[]` | ### Airflow ldap parameters -| Parameter | Description | Default | -|----------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------| -| `ldap.base` | LDAP search base DN | `nil` | -| `ldap.binddn` | LDAP bind DN | `nil` | -| `ldap.bindpw` | LDAP bind password | `nil` | -| `ldap.enabled` | Enable LDAP support | `false` | -| `ldap.tls.enabled` | Enable LDAP over TLS (LDAPS) | `False` | -| `ldap.tls.allowSelfSigned` | Allow self signed certificates for LDAPS | `True` | -| `ldap.tls.CAcertificateSecret` | Name of the secret that contains the LDAPS CA cert file | `uid` | -| `ldap.tls.CAcertificateFilename` | LDAPS CA cert filename | `uid` | -| `ldap.uidField` | LDAP field used for uid | `uid` | -| `ldap.uri` | LDAP URL beginning in the form `ldap[s]://:` | `nil` | +| Parameter | Description | Default | +|----------------------------------|--------------------------------------------------------------|---------| +| `ldap.base` | LDAP search base DN | `nil` | +| `ldap.binddn` | LDAP bind DN | `nil` | +| `ldap.bindpw` | LDAP bind password | `nil` | +| `ldap.enabled` | Enable LDAP support | `false` | +| `ldap.tls.enabled` | Enable LDAP over TLS (LDAPS) | `False` | +| `ldap.tls.allowSelfSigned` | Allow self signed certificates for LDAPS | `True` | +| `ldap.tls.CAcertificateSecret` | Name of the secret that contains the LDAPS CA cert file | `uid` | +| `ldap.tls.CAcertificateFilename` | LDAPS CA cert filename | `uid` | +| `ldap.uidField` | LDAP field used for uid | `uid` | +| `ldap.uri` | LDAP URL beginning in the form `ldap[s]://:` | `nil` | ### Airflow git sync parameters -| Parameter | Description | Default | -|----------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------| -| `git.clone.args` | Override default container args (useful when using custom images) | `nil` | -| `git.clone.command` | Override default container command (useful when using custom images) | `nil` | -| `git.clone.extraEnvVars` | Array containing extra env vars | `nil` | -| `git.clone.extraEnvVarsCM` | ConfigMap containing extra env vars | `nil` | -| `git.clone.extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `nil` | -| `git.clone.extraVolumeMounts` | Array of extra volume mounts to be added (evaluated as template). Normally used with `extraVolumes`. | `nil` | -| `git.dags.enabled` | Enable in order to download DAG files from git repository. | `false` | -| `git.dags.repositories[0].branch` | Branch from repository to checkout | `nil` | -| `git.dags.repositories[0].name` | An unique identifier for repository, must be unique for each repository, by default: `[0].repository` in kebacase | `nil` | -| `git.dags.repositories[0].path` | Path to a folder in the repository containing the dags. | `nil` | -| `git.dags.repositories[0].repository` | Repository where download plugins from | `nil` | -| `git.image.pullPolicy` | Git image pull policy | `"IfNotPresent"` | -| `git.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | -| `git.image.registry` | Git image registry | `"docker.io"` | -| `git.image.repository` | Git image name | `"bitnami/git"` | -| `git.image.tag` | Git image tag | `"2.29.0-debian-10-r0"` | -| `git.plugins.enabled` | Enable in order to download plugins from git repository. | `false` | -| `git.plugins.repositories[0].branch` | Branch from repository to checkout | `nil` | -| `git.plugins.repositories[0].name` | An unique identifier for repository, must be unique for each repository, by default: `[0].repository` in kebacase | `nil` | -| `git.plugins.repositories[0].path` | Path to a folder in the repository containing the plugins. | `nil` | -| `git.plugins.repositories[0].repository` | Repository where download plugins from | `nil` | -| `git.sync.args` | Override default container args (useful when using custom images) | `nil` | -| `git.sync.command` | Override default container command (useful when using custom images) | `nil` | -| `git.sync.extraEnvVars` | Array containing extra env vars | `nil` | -| `git.sync.extraEnvVarsCM` | ConfigMap containing extra env vars | `nil` | -| `git.sync.extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `nil` | -| `git.sync.extraVolumeMounts` | Array of extra volume mounts to be added (evaluated as template). Normally used with `extraVolumes`. | `nil` | -| `git.sync.interval` | Interval (in seconds) to pull the git repository containing the plugins and/or DAG files | `60` | +| Parameter | Description | Default | +|------------------------------------------|-------------------------------------------------------------------------------------------------------------------|-------------------------| +| `git.clone.args` | Override default container args (useful when using custom images) | `nil` | +| `git.clone.command` | Override default container command (useful when using custom images) | `nil` | +| `git.clone.extraEnvVars` | Array containing extra env vars | `nil` | +| `git.clone.extraEnvVarsCM` | ConfigMap containing extra env vars | `nil` | +| `git.clone.extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `nil` | +| `git.clone.extraVolumeMounts` | Array of extra volume mounts to be added (evaluated as template). Normally used with `extraVolumes`. | `nil` | +| `git.dags.enabled` | Enable in order to download DAG files from git repository. | `false` | +| `git.dags.repositories[0].branch` | Branch from repository to checkout | `nil` | +| `git.dags.repositories[0].name` | An unique identifier for repository, must be unique for each repository, by default: `[0].repository` in kebacase | `nil` | +| `git.dags.repositories[0].path` | Path to a folder in the repository containing the dags. | `nil` | +| `git.dags.repositories[0].repository` | Repository where download plugins from | `nil` | +| `git.image.pullPolicy` | Git image pull policy | `"IfNotPresent"` | +| `git.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | +| `git.image.registry` | Git image registry | `"docker.io"` | +| `git.image.repository` | Git image name | `"bitnami/git"` | +| `git.image.tag` | Git image tag | `"2.29.0-debian-10-r0"` | +| `git.plugins.enabled` | Enable in order to download plugins from git repository. | `false` | +| `git.plugins.repositories[0].branch` | Branch from repository to checkout | `nil` | +| `git.plugins.repositories[0].name` | An unique identifier for repository, must be unique for each repository, by default: `[0].repository` in kebacase | `nil` | +| `git.plugins.repositories[0].path` | Path to a folder in the repository containing the plugins. | `nil` | +| `git.plugins.repositories[0].repository` | Repository where download plugins from | `nil` | +| `git.sync.args` | Override default container args (useful when using custom images) | `nil` | +| `git.sync.command` | Override default container command (useful when using custom images) | `nil` | +| `git.sync.extraEnvVars` | Array containing extra env vars | `nil` | +| `git.sync.extraEnvVarsCM` | ConfigMap containing extra env vars | `nil` | +| `git.sync.extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `nil` | +| `git.sync.extraVolumeMounts` | Array of extra volume mounts to be added (evaluated as template). Normally used with `extraVolumes`. | `nil` | +| `git.sync.interval` | Interval (in seconds) to pull the git repository containing the plugins and/or DAG files | `60` | Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`. For example, diff --git a/bitnami/airflow/templates/web/ingress.yaml b/bitnami/airflow/templates/web/ingress.yaml index fe7f192ded..952fbcf00f 100644 --- a/bitnami/airflow/templates/web/ingress.yaml +++ b/bitnami/airflow/templates/web/ingress.yaml @@ -24,9 +24,10 @@ spec: http: paths: - path: {{ default "/" .path }} - backend: - serviceName: {{ include "common.names.fullname" $ }} - servicePort: http + {{- if eq "true" (include "common.ingress.supportsPathType" $) }} + pathType: {{ default "ImplementationSpecific" .pathType }} + {{- end }} + backend: {{- include "common.ingress.backend" (dict "serviceName" (include "common.names.fullname" $) "servicePort" "http" "context" $) | nindent 14 }} {{- end }} tls: {{- range .Values.ingress.hosts }} diff --git a/bitnami/airflow/values-production.yaml b/bitnami/airflow/values-production.yaml index 243476e8b7..3b883f6c52 100644 --- a/bitnami/airflow/values-production.yaml +++ b/bitnami/airflow/values-production.yaml @@ -8,6 +8,10 @@ # - myRegistryKeySecretName # storageClass: myStorageClass +## Force target Kubernetes version (using Helm capabilites if not set) +## +kubeVersion: + ## String to partially override airflow.fullname template (will maintain the release name) ## nameOverride: @@ -18,7 +22,7 @@ fullnameOverride: ## ref: http://airflow.apache.org/docs/stable/executor/index.html ## valid values: ['SequentialExecutor', 'Local Executor', 'CeleryExecutor', 'KubernetesExecutor'] ## -executor: 'CeleryExecutor' +executor: "CeleryExecutor" ## Name of an existing config map containing the Airflow config file ## configurationConfigMap: @@ -186,7 +190,7 @@ web: ## Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## - priorityClassName: '' + priorityClassName: "" ## Scheculer component related properties ## @@ -296,7 +300,7 @@ scheduler: ## Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## - priorityClassName: '' + priorityClassName: "" ## Worker component related properties ## @@ -458,7 +462,7 @@ worker: ## Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## - priorityClassName: '' + priorityClassName: "" ## Add labels to all the deployed resources ## @@ -606,19 +610,19 @@ ldap: enabled: false ## Server URI, eg. ldap://ldap_server:389 ## - uri: 'ldap://ldap_server:389' + uri: "ldap://ldap_server:389" ## Base of the search, eg. ou=example,o=org ## - base: 'ou=example,o=org' + base: "ou=example,o=org" ## Bind DN ## - binddn: 'cn=user,ou=example,o=org' + binddn: "cn=user,ou=example,o=org" ## Bind Password ## - bindpw: '' + bindpw: "" ## Field used for uid ## - uidField: 'uid' + uidField: "uid" ## SSL/TLS parameters for LDAP ## tls: @@ -631,11 +635,11 @@ ldap: ## Name of the existing secret containing the certificate CA file that will be used by ldap client. ## Cloud be create with: kubectl create secret generic airflow-secret --from-file=./ca.pem ## - CAcertificateSecret: '' + CAcertificateSecret: "" ## LDAP CA cert filename ## eg. ca.pem ## - CAcertificateFilename: '' + CAcertificateFilename: "" ## Role Based Access ## Ref: https://kubernetes.io/docs/admin/authorization/rbac/ @@ -710,6 +714,10 @@ ingress: ## enabled: true + ## Override API Version (automatically detected if not set) + ## + apiVersion: + ## Set this to true in order to add the corresponding annotations for cert-manager ## certManager: false @@ -764,7 +772,7 @@ ingress: ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## Allowed values: soft, hard ## -podAffinityPreset: '' +podAffinityPreset: "" ## Pod anti-affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity @@ -779,12 +787,13 @@ podAntiAffinityPreset: soft nodeAffinityPreset: ## Node affinity type ## Allowed values: soft, hard - type: '' + ## + type: "" ## Node label key to match ## E.g. ## key: "kubernetes.io/e2e-az-name" ## - key: '' + key: "" ## Node label values to match ## E.g. ## values: @@ -911,8 +920,8 @@ metrics: podLabels: {} podAnnotations: - prometheus.io/scrape: 'true' - prometheus.io/port: '9112' + prometheus.io/scrape: "true" + prometheus.io/port: "9112" ## Array with extra yaml to deploy with the chart. Evaluated as a template ## diff --git a/bitnami/airflow/values.yaml b/bitnami/airflow/values.yaml index 3102cc7567..3785cd9817 100644 --- a/bitnami/airflow/values.yaml +++ b/bitnami/airflow/values.yaml @@ -8,6 +8,10 @@ # - myRegistryKeySecretName # storageClass: myStorageClass +## Force target Kubernetes version (using Helm capabilites if not set) +## +kubeVersion: + ## String to partially override airflow.fullname template (will maintain the release name) ## nameOverride: @@ -710,6 +714,14 @@ ingress: ## enabled: false + ## Override API Version (automatically detected if not set) + ## + apiVersion: + + ## Ingress Path type + ## + pathType: ImplementationSpecific + ## Set this to true in order to add the corresponding annotations for cert-manager ## certManager: false @@ -779,6 +791,7 @@ podAntiAffinityPreset: soft nodeAffinityPreset: ## Node affinity type ## Allowed values: soft, hard + ## type: '' ## Node label key to match ## E.g. diff --git a/bitnami/apache/Chart.lock b/bitnami/apache/Chart.lock index 22457726ad..b7bf6b33f1 100644 --- a/bitnami/apache/Chart.lock +++ b/bitnami/apache/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: https://charts.bitnami.com/bitnami - version: 1.1.2 -digest: sha256:e96477f37f86a4595dce9057f8d04f903f761f340440986129e53cc55f3d63ee -generated: "2020-12-11T12:20:14.894158+01:00" + version: 1.2.3 +digest: sha256:3fc1fbf3ae204e0121f1e202d6d57f9381f3a45d8821647d1dfe0a475644da0c +generated: "2020-12-31T12:24:27.802681+01:00" diff --git a/bitnami/apache/Chart.yaml b/bitnami/apache/Chart.yaml index 4d6206a80e..4bbeab231a 100644 --- a/bitnami/apache/Chart.yaml +++ b/bitnami/apache/Chart.yaml @@ -26,4 +26,4 @@ name: apache sources: - https://github.com/bitnami/bitnami-docker-apache - https://httpd.apache.org -version: 8.0.3 +version: 8.1.0 diff --git a/bitnami/apache/README.md b/bitnami/apache/README.md index 6e4cf37aa3..95e937de02 100644 --- a/bitnami/apache/README.md +++ b/bitnami/apache/README.md @@ -55,6 +55,7 @@ The following tables lists the configurable parameters of the Apache chart and t |----------------------------------|-------------------------------------------------------------------------------------------|--------------------------------------------------------------| | `global.imageRegistry` | Global Docker image registry | `nil` | | `global.imagePullSecrets` | Global Docker registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | +| `kubeVersion` | Force target Kubernetes version (using Helm capabilities if not set) | `nil` | | `image.registry` | Apache Docker image registry | `docker.io` | | `image.repository` | Apache Docker image name | `bitnami/apache` | | `image.tag` | Apache Docker image tag | `{TAG_NAME}` | @@ -89,6 +90,9 @@ The following tables lists the configurable parameters of the Apache chart and t | `readinessProbe.enabled` | Enable readiness probe | `true` | | `readinessProbe.path` | Path to access on the HTTP server | `/` | | `ingress.enabled` | Enable ingress controller resource | `false` | +| `ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `` | +| `ingress.path` | Ingress path | `/` | +| `ingress.pathType` | Ingress path type | `ImplementationSpecific` | | `ingress.hostname` | Default host for the ingress resource | `example.local` | | `ingress.certManager` | Add annotations for cert-manager | `false` | | `ingress.annotations` | Ingress annotations | `[]` | diff --git a/bitnami/apache/templates/ingress.yaml b/bitnami/apache/templates/ingress.yaml index d5ca0fa494..791d0d2caa 100644 --- a/bitnami/apache/templates/ingress.yaml +++ b/bitnami/apache/templates/ingress.yaml @@ -1,5 +1,5 @@ {{- if .Values.ingress.enabled }} -apiVersion: extensions/v1beta1 +apiVersion: {{ include "common.capabilities.ingress.apiVersion" . }} kind: Ingress metadata: name: {{ include "apache.fullname" . }} @@ -17,19 +17,21 @@ spec: - host: {{ .Values.ingress.hostname }} http: paths: - - path: / - backend: - serviceName: "{{ template "apache.fullname" $ }}" - servicePort: http + - path: {{ .Values.ingress.path }} + {{- if eq "true" (include "common.ingress.supportsPathType" .) }} + pathType: {{ .Values.ingress.pathType }} + {{- end }} + backend: {{- include "common.ingress.backend" (dict "serviceName" (include "common.names.fullname" .) "servicePort" "http" "context" $) | nindent 14 }} {{- end }} {{- range .Values.ingress.hosts }} - host: {{ .name }} http: paths: - path: {{ default "/" .path }} - backend: - serviceName: "{{ template "apache.fullname" $ }}" - servicePort: http + {{- if eq "true" (include "common.ingress.supportsPathType" $) }} + pathType: {{ default "ImplementationSpecific" .pathType }} + {{- end }} + backend: {{- include "common.ingress.backend" (dict "serviceName" (include "common.names.fullname" $) "servicePort" "http" "context" $) | nindent 14 }} {{- end }} {{- if .Values.ingress.tls }} tls: {{- toYaml .Values.ingress.tls | nindent 4 }} diff --git a/bitnami/apache/values.yaml b/bitnami/apache/values.yaml index ba2dabdbe4..644c602177 100644 --- a/bitnami/apache/values.yaml +++ b/bitnami/apache/values.yaml @@ -7,6 +7,10 @@ # imagePullSecrets: # - myRegistryKeySecretName +## Force target Kubernetes version (using Helm capabilites if not set) +## +kubeVersion: + ## Bitnami Apache image version ## ref: https://hub.docker.com/r/bitnami/apache/tags/ ## @@ -76,6 +80,7 @@ podAntiAffinityPreset: soft nodeAffinityPreset: ## Node affinity type ## Allowed values: soft, hard + ## type: "" ## Node label key to match ## E.g. @@ -180,6 +185,18 @@ ingress: ## enabled: false + ## Override API Version (automatically detected if not set) + ## + apiVersion: + + ## Ingress Path + ## + path: / + + ## Ingress Path type + ## + pathType: ImplementationSpecific + ## Set this to true in order to add the corresponding annotations for cert-manager ## certManager: false @@ -194,6 +211,7 @@ ingress: ## ## If tls is set to true, annotation ingress.kubernetes.io/secure-backends: "true" will automatically be set ## If certManager is set to true, annotation kubernetes.io/tls-acme: "true" will automatically be set + ## annotations: {} # kubernetes.io/ingress.class: nginx @@ -202,6 +220,7 @@ ingress: ## hosts: ## - name: example.local ## path: / + ## ## The tls configuration for the ingress ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls diff --git a/bitnami/aspnet-core/Chart.lock b/bitnami/aspnet-core/Chart.lock index 20b825e143..3b9b7ea1c5 100644 --- a/bitnami/aspnet-core/Chart.lock +++ b/bitnami/aspnet-core/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: https://charts.bitnami.com/bitnami - version: 1.1.2 -digest: sha256:e96477f37f86a4595dce9057f8d04f903f761f340440986129e53cc55f3d63ee -generated: "2020-12-11T12:20:15.050685+01:00" + version: 1.2.3 +digest: sha256:3fc1fbf3ae204e0121f1e202d6d57f9381f3a45d8821647d1dfe0a475644da0c +generated: "2020-12-31T12:24:41.072003+01:00" diff --git a/bitnami/aspnet-core/Chart.yaml b/bitnami/aspnet-core/Chart.yaml index b857c86ed2..28c3f837db 100644 --- a/bitnami/aspnet-core/Chart.yaml +++ b/bitnami/aspnet-core/Chart.yaml @@ -21,4 +21,4 @@ name: aspnet-core sources: - https://github.com/bitnami/bitnami-docker-aspnet-core - https://dotnet.microsoft.com/apps/aspnet -version: 1.0.2 +version: 1.1.0 diff --git a/bitnami/aspnet-core/README.md b/bitnami/aspnet-core/README.md index 1db001a30d..19dfb2af91 100644 --- a/bitnami/aspnet-core/README.md +++ b/bitnami/aspnet-core/README.md @@ -66,6 +66,7 @@ The following tables lists the configurable parameters of the ASP.NET Core chart | `commonLabels` | Labels to add to all deployed objects | `{}` | | `commonAnnotations` | Annotations to add to all deployed objects | `{}` | | `extraDeploy` | Array of extra objects to deploy with the release | `[]` (evaluated as a template) | +| `kubeVersion` | Force target Kubernetes version (using Helm capabilities if not set) | `nil` | ### ASP.NET Core parameters @@ -157,6 +158,9 @@ The following tables lists the configurable parameters of the ASP.NET Core chart | `service.loadBalancerSourceRanges` | Address that are allowed when service is LoadBalancer | `[]` | | `service.annotations` | Annotations for ASP.NET Core service | `{}` | | `ingress.enabled` | Enable ingress controller resource | `false` | +| `ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `` | +| `ingress.path` | Ingress path | `/` | +| `ingress.pathType` | Ingress path type | `ImplementationSpecific` | | `ingress.certManager` | Add annotations for cert-manager | `false` | | `ingress.hostname` | Default host for the ingress resource | `aspnet-core.local` | | `ingress.tls` | Enable TLS configuration for the hostname defined at `ingress.hostname` parameter | `false` | diff --git a/bitnami/aspnet-core/templates/ingress.yaml b/bitnami/aspnet-core/templates/ingress.yaml index a8f1524d36..432d094b71 100644 --- a/bitnami/aspnet-core/templates/ingress.yaml +++ b/bitnami/aspnet-core/templates/ingress.yaml @@ -1,5 +1,5 @@ {{- if .Values.ingress.enabled -}} -apiVersion: extensions/v1beta1 +apiVersion: {{ include "common.capabilities.ingress.apiVersion" . }} kind: Ingress metadata: name: {{ include "aspnet-core.fullname" . }} @@ -23,10 +23,11 @@ spec: - host: {{ .Values.ingress.hostname }} http: paths: - - path: / - backend: - serviceName: {{ include "aspnet-core.fullname" . }} - servicePort: http + - path: {{ .Values.ingress.path }} + {{- if eq "true" (include "common.ingress.supportsPathType" .) }} + pathType: {{ .Values.ingress.pathType }} + {{- end }} + backend: {{- include "common.ingress.backend" (dict "serviceName" (include "aspnet-core.fullname" .) "servicePort" "http" "context" $) | nindent 14 }} {{- end }} {{- range .Values.ingress.extraHosts }} - host: {{ .name }} diff --git a/bitnami/aspnet-core/values-production.yaml b/bitnami/aspnet-core/values-production.yaml index d1f84337e5..1875d3148f 100644 --- a/bitnami/aspnet-core/values-production.yaml +++ b/bitnami/aspnet-core/values-production.yaml @@ -7,6 +7,10 @@ # imagePullSecrets: # - myRegistryKeySecretName +## Force target Kubernetes version (using Helm capabilites if not set) +## +kubeVersion: + ## Bitnami ASP.NET Core image ## ref: https://hub.docker.com/r/bitnami/aspnet-core/tags/ ## @@ -167,6 +171,7 @@ podAntiAffinityPreset: soft nodeAffinityPreset: ## Node affinity type ## Allowed values: soft, hard + ## type: "" ## Node label key to match ## E.g. @@ -377,6 +382,18 @@ ingress: ## enabled: false + ## Override API Version (automatically detected if not set) + ## + apiVersion: + + ## Ingress Path type + ## + pathType: ImplementationSpecific + + ## Ingress Path + ## + path: / + ## Set this to true in order to add the corresponding annotations for cert-manager ## certManager: false @@ -405,6 +422,7 @@ ingress: ## extraHosts: ## - name: aspnet-core.local ## path: / + ## ## The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls @@ -412,6 +430,7 @@ ingress: ## - hosts: ## - aspnet-core.local ## secretName: aspnet-core.local-tls + ## ## If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or -----BEGIN RSA PRIVATE KEY----- @@ -426,6 +445,7 @@ ingress: ## - name: aspnet-core.local-tls ## key: ## certificate: + ## healthIngress: ## Set to true to enable heallth ingress record generation @@ -460,6 +480,7 @@ healthIngress: ## extraHosts: ## - name: aspnet-core.local ## path: / + ## ## The tls configuration for additional hostnames to be covered with this heallth ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls @@ -467,6 +488,7 @@ healthIngress: ## - hosts: ## - aspnet-core.local ## secretName: aspnet-core.local-tls + ## ## If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or -----BEGIN RSA PRIVATE KEY----- @@ -481,6 +503,7 @@ healthIngress: ## - name: aspnet-core.local-tls ## key: ## certificate: + ## ## K8s Service Account. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ diff --git a/bitnami/aspnet-core/values.yaml b/bitnami/aspnet-core/values.yaml index 45dcde0321..1da5eb8d41 100644 --- a/bitnami/aspnet-core/values.yaml +++ b/bitnami/aspnet-core/values.yaml @@ -7,6 +7,10 @@ # imagePullSecrets: # - myRegistryKeySecretName +## Force target Kubernetes version (using Helm capabilites if not set) +## +kubeVersion: + ## Bitnami ASP.NET Core image ## ref: https://hub.docker.com/r/bitnami/aspnet-core/tags/ ## @@ -168,6 +172,7 @@ podAntiAffinityPreset: soft nodeAffinityPreset: ## Node affinity type ## Allowed values: soft, hard + ## type: "" ## Node label key to match ## E.g. @@ -378,6 +383,18 @@ ingress: ## enabled: false + ## Override API Version (automatically detected if not set) + ## + apiVersion: + + ## Ingress Path + ## + path: / + + ## Ingress Path type + ## + pathType: ImplementationSpecific + ## Set this to true in order to add the corresponding annotations for cert-manager ## certManager: false @@ -406,6 +423,7 @@ ingress: ## extraHosts: ## - name: aspnet-core.local ## path: / + ## ## The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls @@ -413,6 +431,7 @@ ingress: ## - hosts: ## - aspnet-core.local ## secretName: aspnet-core.local-tls + ## ## If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or -----BEGIN RSA PRIVATE KEY----- @@ -427,6 +446,7 @@ ingress: ## - name: aspnet-core.local-tls ## key: ## certificate: + ## healthIngress: ## Set to true to enable heallth ingress record generation @@ -461,6 +481,7 @@ healthIngress: ## extraHosts: ## - name: aspnet-core.local ## path: / + ## ## The tls configuration for additional hostnames to be covered with this heallth ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls @@ -468,6 +489,7 @@ healthIngress: ## - hosts: ## - aspnet-core.local ## secretName: aspnet-core.local-tls + ## ## If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or -----BEGIN RSA PRIVATE KEY----- @@ -482,6 +504,7 @@ healthIngress: ## - name: aspnet-core.local-tls ## key: ## certificate: + ## ## K8s Service Account. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ diff --git a/bitnami/consul/Chart.lock b/bitnami/consul/Chart.lock index 4f8d06e020..fcb17d8349 100644 --- a/bitnami/consul/Chart.lock +++ b/bitnami/consul/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: https://charts.bitnami.com/bitnami - version: 1.1.2 -digest: sha256:e96477f37f86a4595dce9057f8d04f903f761f340440986129e53cc55f3d63ee -generated: "2020-12-11T12:20:22.928474+01:00" + version: 1.2.3 +digest: sha256:3fc1fbf3ae204e0121f1e202d6d57f9381f3a45d8821647d1dfe0a475644da0c +generated: "2020-12-31T12:34:23.039218+01:00" diff --git a/bitnami/consul/Chart.yaml b/bitnami/consul/Chart.yaml index 89421a92ca..75232d27ae 100644 --- a/bitnami/consul/Chart.yaml +++ b/bitnami/consul/Chart.yaml @@ -19,4 +19,4 @@ name: consul sources: - https://github.com/bitnami/bitnami-docker-consul - https://www.consul.io/ -version: 9.0.5 +version: 9.1.0 diff --git a/bitnami/consul/README.md b/bitnami/consul/README.md index 1547e422e3..95ea61b9f2 100644 --- a/bitnami/consul/README.md +++ b/bitnami/consul/README.md @@ -51,158 +51,161 @@ $ helm delete --purge my-release The following table lists the configurable parameters of the HashiCorp Consul chart and their default values. -| Parameter | Description | Default | -|-------------------------------------------|----------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `global.imageRegistry` | Global Docker Image registry | `nil` | -| `global.imagePullSecrets` | Global Docker registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | -| `global.storageClass` | Global storage class for dynamic provisioning | `nil` | +| Parameter | Description | Default | +|---------------------------|-------------------------------------------------|---------------------------------------------------------| +| `global.imageRegistry` | Global Docker Image registry | `nil` | +| `global.imagePullSecrets` | Global Docker registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | +| `global.storageClass` | Global storage class for dynamic provisioning | `nil` | ### Common parameters -| Parameter | Description | Default | -|-------------------------------------------|----------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `nameOverride` | String to partially override consul.fullname | `nil` | -| `fullnameOverride` | String to fully override consul.fullname | `nil` | -| `clusterDomain` | Default Kubernetes cluster domain | `cluster.local` | -| `commonLabels` | Labels to add to all deployed objects | `nil` | -| `commonAnnotations` | Annotations to add to all deployed objects | `[]` | -| `extraDeploy` | Array of extra objects to deploy with the release (evaluated as a template) | `nil` | +| Parameter | Description | Default | +|---------------------|-----------------------------------------------------------------------------|-----------------| +| `nameOverride` | String to partially override consul.fullname | `nil` | +| `fullnameOverride` | String to fully override consul.fullname | `nil` | +| `clusterDomain` | Default Kubernetes cluster domain | `cluster.local` | +| `commonLabels` | Labels to add to all deployed objects | `nil` | +| `commonAnnotations` | Annotations to add to all deployed objects | `[]` | +| `extraDeploy` | Array of extra objects to deploy with the release (evaluated as a template) | `nil` | +| `kubeVersion` | Force target Kubernetes version (using Helm capabilities if not set) | `nil` | ### HashiCorp Consul parameters -| Parameter | Description | Default | -|-------------------------------------------|----------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `image.registry` | HashiCorp Consul image registry | `docker.io` | -| `image.repository` | HashiCorp Consul image name | `bitnami/consul` | -| `image.tag` | HashiCorp Consul image tag | `{TAG_NAME}` | -| `image.pullPolicy` | Image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | -| `image.debug` | Specify if debug logs should be enabled | `false` | -| `datacenterName` | HashiCorp Consul datacenter name | `dc1` | -| `domain` | HashiCorp Consul domain | `consul` | -| `raftMultiplier` | Multiplier used to scale key Raft timing parameters | `1` | -| `gossipKey` | Gossip key for all members | `nil` | -| `tlsEncryptionSecretName` | Name of existing secret with TLS encryption data | `nil` | -| `configuration` | HashiCorp Consul configuration to be injected as ConfigMap | `{}` | -| `existingConfigmap` | Name of existing ConfigMap with HashiCorp Consul configuration | `nil` | -| `localConfig` | Extra configuration that will be added to the default one | `nil` | -| `command` | Override default container command (useful when using custom images) | `nil` | -| `args` | Override default container args (useful when using custom images) | `nil` | -| `extraEnvVars` | Extra environment variables to be set on HashiCorp Consul container | `{}` | -| `extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars | `nil` | -| `extraEnvVarsSecret` | Name of existing Secret containing extra env vars | `nil` | -| `containerPorts.http` | Port to open for HTTP in Consul | `8500` | -| `containerPorts.dns` | Port to open for DNS server in Consul | `8600` | -| `containerPorts.rcp` | Port to open for RCP in Consul | `8400` | -| `containerPorts.rpcServer` | Port to open for RCP Server in Consul | `8300` | -| `containerPorts.serfLAN` | Port to open for Serf LAN in Consul | `8301` | +| Parameter | Description | Default | +|----------------------------|----------------------------------------------------------------------|---------------------------------------------------------| +| `image.registry` | HashiCorp Consul image registry | `docker.io` | +| `image.repository` | HashiCorp Consul image name | `bitnami/consul` | +| `image.tag` | HashiCorp Consul image tag | `{TAG_NAME}` | +| `image.pullPolicy` | Image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | +| `image.debug` | Specify if debug logs should be enabled | `false` | +| `datacenterName` | HashiCorp Consul datacenter name | `dc1` | +| `domain` | HashiCorp Consul domain | `consul` | +| `raftMultiplier` | Multiplier used to scale key Raft timing parameters | `1` | +| `gossipKey` | Gossip key for all members | `nil` | +| `tlsEncryptionSecretName` | Name of existing secret with TLS encryption data | `nil` | +| `configuration` | HashiCorp Consul configuration to be injected as ConfigMap | `{}` | +| `existingConfigmap` | Name of existing ConfigMap with HashiCorp Consul configuration | `nil` | +| `localConfig` | Extra configuration that will be added to the default one | `nil` | +| `command` | Override default container command (useful when using custom images) | `nil` | +| `args` | Override default container args (useful when using custom images) | `nil` | +| `extraEnvVars` | Extra environment variables to be set on HashiCorp Consul container | `{}` | +| `extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars | `nil` | +| `extraEnvVarsSecret` | Name of existing Secret containing extra env vars | `nil` | +| `containerPorts.http` | Port to open for HTTP in Consul | `8500` | +| `containerPorts.dns` | Port to open for DNS server in Consul | `8600` | +| `containerPorts.rcp` | Port to open for RCP in Consul | `8400` | +| `containerPorts.rpcServer` | Port to open for RCP Server in Consul | `8300` | +| `containerPorts.serfLAN` | Port to open for Serf LAN in Consul | `8301` | ### Statefulset parameters -| Parameter | Description | Default | -|-------------------------------------------|----------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `replicaCount` | Number of HashiCorp Consul replicas | `3` | -| `updateStrategy` | Update strategy type for the statefulset | `RollingUpdate` | -| `rollingUpdatePartition` | Partition update strategy | `nil` | -| `priorityClassName` | HashiCorp Consul priorityClassName | `nil` | -| `podManagementPolicy` | StatefulSet pod management policy | `OrderedReady` | -| `podAnnotations` | Additional pod annotations | `{}` | -| `podLabels` | Additional pod labels | `{}` | -| `podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `nodeAffinityPreset.key` | Node label key to match Ignored if `affinity` is set. | `""` | -| `nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set. | `[]` | -| `affinity` | Affinity for pod assignment | `{}` (evaluated as a template) | -| `nodeSelector` | Node labels for pod assignment | `{}` (evaluated as a template) | -| `tolerations` | Tolerations for pod assignment | `[]` (evaluated as a template) | -| `podSecurityContext.enabled` | Enable security context for HashiCorp Consul pods | `true` | -| `podSecurityContext.fsGroup` | Group ID for the volumes of the pod | `1001` | -| `containerSecurityContext.enabled` | HashiCorp Consul Container securityContext | `true` | -| `containerSecurityContext.runAsUser` | User ID for the HashiCorp Consul container | `1001` | -| `resources.limits` | The resources limits for HashiCorp Consul containers | `{}` | -| `resources.requests` | The requested resources for HashiCorp Consul containers | `{}` | -| `livenessProbe` | Liveness probe configuration for HashiCorp Consul | Check `values.yaml` file | -| `readinessProbe` | Readiness probe configuration for HashiCorp Consul | Check `values.yaml` file | -| `customLivenessProbe` | Override default liveness probe | `nil` | -| `customReadinessProbe` | Override default readiness probe | `nil` | -| `extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for hashicorp consul container | `[]` | -| `extraVolumes` | Optionally specify extra list of additional volumes for hashicorp consul container | `[]` | -| `initContainers` | Add additional init containers to the hashicorp consul pods | `{}` (evaluated as a template) | -| `sidecars` | Add additional sidecar containers to the hashicorp consul pods | `{}` (evaluated as a template) | -| `pdb.create` | Enable/disable a Pod Disruption Budget creation | `false` | -| `pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | -| `pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `nil` | +| Parameter | Description | Default | +|--------------------------------------|-------------------------------------------------------------------------------------------|--------------------------------| +| `replicaCount` | Number of HashiCorp Consul replicas | `3` | +| `updateStrategy` | Update strategy type for the statefulset | `RollingUpdate` | +| `rollingUpdatePartition` | Partition update strategy | `nil` | +| `priorityClassName` | HashiCorp Consul priorityClassName | `nil` | +| `podManagementPolicy` | StatefulSet pod management policy | `OrderedReady` | +| `podAnnotations` | Additional pod annotations | `{}` | +| `podLabels` | Additional pod labels | `{}` | +| `podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `nodeAffinityPreset.key` | Node label key to match Ignored if `affinity` is set. | `""` | +| `nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set. | `[]` | +| `affinity` | Affinity for pod assignment | `{}` (evaluated as a template) | +| `nodeSelector` | Node labels for pod assignment | `{}` (evaluated as a template) | +| `tolerations` | Tolerations for pod assignment | `[]` (evaluated as a template) | +| `podSecurityContext.enabled` | Enable security context for HashiCorp Consul pods | `true` | +| `podSecurityContext.fsGroup` | Group ID for the volumes of the pod | `1001` | +| `containerSecurityContext.enabled` | HashiCorp Consul Container securityContext | `true` | +| `containerSecurityContext.runAsUser` | User ID for the HashiCorp Consul container | `1001` | +| `resources.limits` | The resources limits for HashiCorp Consul containers | `{}` | +| `resources.requests` | The requested resources for HashiCorp Consul containers | `{}` | +| `livenessProbe` | Liveness probe configuration for HashiCorp Consul | Check `values.yaml` file | +| `readinessProbe` | Readiness probe configuration for HashiCorp Consul | Check `values.yaml` file | +| `customLivenessProbe` | Override default liveness probe | `nil` | +| `customReadinessProbe` | Override default readiness probe | `nil` | +| `extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for hashicorp consul container | `[]` | +| `extraVolumes` | Optionally specify extra list of additional volumes for hashicorp consul container | `[]` | +| `initContainers` | Add additional init containers to the hashicorp consul pods | `{}` (evaluated as a template) | +| `sidecars` | Add additional sidecar containers to the hashicorp consul pods | `{}` (evaluated as a template) | +| `pdb.create` | Enable/disable a Pod Disruption Budget creation | `false` | +| `pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | +| `pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `nil` | ### Exposure parameters -| Parameter | Description | Default | -|-------------------------------------------|----------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `service.enabled` | Use a service to access HashiCorp Consul Ui | `true` | -| `service.port` | HashiCorp Consul UI svc port | `80` | -| `service.type` | Kubernetes Service Type | `ClusterIP` | -| `service.nodePort` | Kubernetes node port for HashiCorp Consul UI | `""` | -| `service.annotations` | Annotations for HashiCorp Consul UI service | `{}` (evaluated as a template) | -| `service.loadBalancerIP` | IP if HashiCorp Consul UI service type is `LoadBalancer` | `nil` | -| `ingress.enabled` | Enable ingress resource for Management console | `false` | -| `ingress.path` | Path for the default host | `/` | -| `ingress.certManager` | Add annotations for cert-manager | `false` | -| `ingress.hostname` | Default host for the ingress resource | `consul-ui.local` | -| `ingress.annotations` | Ingress annotations | `[]` | -| `ingress.tls` | Enable TLS configuration for the hostname defined at `ingress.hostname` parameter | `false` | -| `ingress.existingSecret` | Existing secret for the Ingress TLS certificate | `nil` | -| `ingress.extraHosts[0].name` | Additional hostnames to be covered | `nil` | -| `ingress.extraHosts[0].path` | Additional hostnames to be covered | `nil` | -| `ingress.extraTls[0].hosts[0]` | TLS configuration for additional hostnames to be covered | `nil` | -| `ingress.extraTls[0].secretName` | TLS configuration for additional hostnames to be covered | `nil` | -| `ingress.secrets[0].name` | TLS Secret Name | `nil` | -| `ingress.secrets[0].certificate` | TLS Secret Certificate | `nil` | -| `ingress.secrets[0].key` | TLS Secret Key | `nil` | +| Parameter | Description | Default | +|----------------------------------|-----------------------------------------------------------------------------------|--------------------------------| +| `service.enabled` | Use a service to access HashiCorp Consul Ui | `true` | +| `service.port` | HashiCorp Consul UI svc port | `80` | +| `service.type` | Kubernetes Service Type | `ClusterIP` | +| `service.nodePort` | Kubernetes node port for HashiCorp Consul UI | `""` | +| `service.annotations` | Annotations for HashiCorp Consul UI service | `{}` (evaluated as a template) | +| `service.loadBalancerIP` | IP if HashiCorp Consul UI service type is `LoadBalancer` | `nil` | +| `ingress.enabled` | Enable ingress resource for Management console | `false` | +| `ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `` | +| `ingress.path` | Ingress path | `/` | +| `ingress.pathType` | Ingress path type | `ImplementationSpecific` | +| `ingress.certManager` | Add annotations for cert-manager | `false` | +| `ingress.hostname` | Default host for the ingress resource | `consul-ui.local` | +| `ingress.annotations` | Ingress annotations | `[]` | +| `ingress.tls` | Enable TLS configuration for the hostname defined at `ingress.hostname` parameter | `false` | +| `ingress.existingSecret` | Existing secret for the Ingress TLS certificate | `nil` | +| `ingress.extraHosts[0].name` | Additional hostnames to be covered | `nil` | +| `ingress.extraHosts[0].path` | Additional hostnames to be covered | `nil` | +| `ingress.extraTls[0].hosts[0]` | TLS configuration for additional hostnames to be covered | `nil` | +| `ingress.extraTls[0].secretName` | TLS configuration for additional hostnames to be covered | `nil` | +| `ingress.secrets[0].name` | TLS Secret Name | `nil` | +| `ingress.secrets[0].certificate` | TLS Secret Certificate | `nil` | +| `ingress.secrets[0].key` | TLS Secret Key | `nil` | ### Persistence parameters -| Parameter | Description | Default | -|-------------------------------------------|----------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `persistence.enabled` | Enable HashiCorp Consul data persistence using PVC | `true` | -| `persistence.storageClass` | PVC Storage Class for HashiCorp Consul data volume | `nil` | -| `persistence.annotations` | Persistent Volume Claim annotations Annotations | `{}` (evaluated as a template) | -| `persistence.accessMode` | PVC Access Mode for HashiCorp Consul data volume | `[ReadWriteOnce]` | -| `persistence.size` | PVC Storage Request for HashiCorp Consul data volume | `8Gi` | +| Parameter | Description | Default | +|----------------------------|------------------------------------------------------|--------------------------------| +| `persistence.enabled` | Enable HashiCorp Consul data persistence using PVC | `true` | +| `persistence.storageClass` | PVC Storage Class for HashiCorp Consul data volume | `nil` | +| `persistence.annotations` | Persistent Volume Claim annotations Annotations | `{}` (evaluated as a template) | +| `persistence.accessMode` | PVC Access Mode for HashiCorp Consul data volume | `[ReadWriteOnce]` | +| `persistence.size` | PVC Storage Request for HashiCorp Consul data volume | `8Gi` | ### Volume Permissions parameters -| Parameter | Description | Default | -|-------------------------------------------|----------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup` | `false` | -| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | -| `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/minideb` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `buster` | -| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `Always` | -| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | -| `volumePermissions.resources.limits` | Init container volume-permissions resource limits | `{}` | -| `volumePermissions.resources.requests` | Init container volume-permissions resource requests | `{}` | +| Parameter | Description | Default | +|----------------------------------------|----------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------| +| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup` | `false` | +| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | +| `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/minideb` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `buster` | +| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `Always` | +| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | +| `volumePermissions.resources.limits` | Init container volume-permissions resource limits | `{}` | +| `volumePermissions.resources.requests` | Init container volume-permissions resource requests | `{}` | ### Metrics parameters -| Parameter | Description | Default | -|-------------------------------------------|----------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `metrics.enabled` | Start a side-car prometheus exporter | `false` | -| `metrics.image` | Exporter image | `bitnami/consul-exporter` | -| `metrics.imageTag` | Exporter image tag | `{TAG_NAME}` | -| `metrics.imagePullPolicy` | Exporter image pull policy | `IfNotPresent` | -| `metrics.resources` | Exporter resource requests/limit | `{}` | -| `metrics.podAnnotations` | Exporter annotations | `{}` | -| `metrics.service.type` | Kubernetes Service type (consul metrics) | `ClusterIP` | -| `metrics.service.annotations` | Annotations for the services to monitor | {} | -| `metrics.service.loadBalancerIP` | loadBalancerIP if redis metrics service type is `LoadBalancer` | `nil` | -| `metrics.serviceMonitor.enabled` | Create ServiceMonitor Resource for scraping metrics using PrometheusOperator | `false` | -| `metrics.serviceMonitor.namespace` | Namespace which Prometheus is running in | `monitoring` | -| `metrics.serviceMonitor.interval` | Interval at which metrics should be scraped | `30s` | -| `metrics.serviceMonitor.scrapeTimeout` | Specify the timeout after which the scrape is ended | `nil` | -| `metrics.serviceMonitor.relabellings` | Specify Metric Relabellings to add to the scrape endpoint | `nil` | -| `metrics.serviceMonitor.honorLabels` | honorLabels chooses the metric's labels on collisions with target labels. | `false` | -| `metrics.serviceMonitor.additionalLabels` | Used to pass Labels that are required by the Installed Prometheus Operator | `{}` | -| `metrics.serviceMonitor.release` | Used to pass Labels release that sometimes should be custom for Prometheus Operator | `nil` | +| Parameter | Description | Default | +|-------------------------------------------|-------------------------------------------------------------------------------------|---------------------------| +| `metrics.enabled` | Start a side-car prometheus exporter | `false` | +| `metrics.image` | Exporter image | `bitnami/consul-exporter` | +| `metrics.imageTag` | Exporter image tag | `{TAG_NAME}` | +| `metrics.imagePullPolicy` | Exporter image pull policy | `IfNotPresent` | +| `metrics.resources` | Exporter resource requests/limit | `{}` | +| `metrics.podAnnotations` | Exporter annotations | `{}` | +| `metrics.service.type` | Kubernetes Service type (consul metrics) | `ClusterIP` | +| `metrics.service.annotations` | Annotations for the services to monitor | {} | +| `metrics.service.loadBalancerIP` | loadBalancerIP if redis metrics service type is `LoadBalancer` | `nil` | +| `metrics.serviceMonitor.enabled` | Create ServiceMonitor Resource for scraping metrics using PrometheusOperator | `false` | +| `metrics.serviceMonitor.namespace` | Namespace which Prometheus is running in | `monitoring` | +| `metrics.serviceMonitor.interval` | Interval at which metrics should be scraped | `30s` | +| `metrics.serviceMonitor.scrapeTimeout` | Specify the timeout after which the scrape is ended | `nil` | +| `metrics.serviceMonitor.relabellings` | Specify Metric Relabellings to add to the scrape endpoint | `nil` | +| `metrics.serviceMonitor.honorLabels` | honorLabels chooses the metric's labels on collisions with target labels. | `false` | +| `metrics.serviceMonitor.additionalLabels` | Used to pass Labels that are required by the Installed Prometheus Operator | `{}` | +| `metrics.serviceMonitor.release` | Used to pass Labels release that sometimes should be custom for Prometheus Operator | `nil` | Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`. For example, diff --git a/bitnami/consul/templates/ingress.yaml b/bitnami/consul/templates/ingress.yaml index 0728465666..58edab7611 100644 --- a/bitnami/consul/templates/ingress.yaml +++ b/bitnami/consul/templates/ingress.yaml @@ -25,18 +25,20 @@ spec: http: paths: - path: {{ .Values.ingress.path }} - backend: - serviceName: {{ printf "%s-ui" (include "common.names.fullname" .) }} - servicePort: http + {{- if eq "true" (include "common.ingress.supportsPathType" .) }} + pathType: {{ .Values.ingress.pathType }} + {{- end }} + backend: {{- include "common.ingress.backend" (dict "serviceName" (printf "%s-ui" (include "common.names.fullname" .)) "servicePort" "http" "context" $) | nindent 14 }} {{- end }} {{- range .Values.ingress.extraHosts }} - host: {{ .name }} http: paths: - path: {{ default "/" .path }} - backend: - serviceName: {{ printf "%s-ui" (include "common.names.fullname" $) }} - servicePort: http + {{- if eq "true" (include "common.ingress.supportsPathType" $) }} + pathType: {{ default "ImplementationSpecific" .pathType }} + {{- end }} + backend: {{- include "common.ingress.backend" (dict "serviceName" (printf "%s-ui" (include "common.names.fullname" $)) "servicePort" "http" "context" $) | nindent 14 }} {{- end }} {{- if or .Values.ingress.tls .Values.ingress.extraTls }} tls: diff --git a/bitnami/consul/values-production.yaml b/bitnami/consul/values-production.yaml index 8971509033..c3e22bae2e 100644 --- a/bitnami/consul/values-production.yaml +++ b/bitnami/consul/values-production.yaml @@ -8,6 +8,10 @@ # - myRegistryKeySecretName # storageClass: myStorageClass +## Force target Kubernetes version (using Helm capabilites if not set) +## +kubeVersion: + ## Bitnami HashiCorp Consul image version ## ref: https://hub.docker.com/r/bitnami/consul/tags/ ## @@ -62,7 +66,7 @@ domain: consul ## Consul raft multiplier. ## -raftMultiplier: '1' +raftMultiplier: "1" ## Predefined value for gossip key. ## The key must be 16-bytes, can be generated with $(consul keygen) @@ -190,6 +194,7 @@ podAntiAffinityPreset: soft nodeAffinityPreset: ## Node affinity type ## Allowed values: soft, hard + ## type: "" ## Node label key to match ## E.g. @@ -392,6 +397,14 @@ ingress: ## path: / + ## Override API Version (automatically detected if not set) + ## + apiVersion: + + ## Ingress Path type + ## + pathType: ImplementationSpecific + ## Set this to true in order to add the corresponding annotations for cert-manager ## certManager: false @@ -415,6 +428,7 @@ ingress: ## tls: false ## existingSecret: name-of-existing-secret + ## ## The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array diff --git a/bitnami/consul/values.yaml b/bitnami/consul/values.yaml index c46c48745f..b3e7d0555d 100644 --- a/bitnami/consul/values.yaml +++ b/bitnami/consul/values.yaml @@ -8,6 +8,10 @@ # - myRegistryKeySecretName # storageClass: myStorageClass +## Force target Kubernetes version (using Helm capabilites if not set) +## +kubeVersion: + ## Bitnami HashiCorp Consul image version ## ref: https://hub.docker.com/r/bitnami/consul/tags/ ## @@ -190,6 +194,7 @@ podAntiAffinityPreset: soft nodeAffinityPreset: ## Node affinity type ## Allowed values: soft, hard + ## type: "" ## Node label key to match ## E.g. @@ -392,6 +397,14 @@ ingress: ## path: / + ## Override API Version (automatically detected if not set) + ## + apiVersion: + + ## Ingress Path type + ## + pathType: ImplementationSpecific + ## Set this to true in order to add the corresponding annotations for cert-manager ## certManager: false @@ -415,6 +428,7 @@ ingress: ## tls: false ## existingSecret: name-of-existing-secret + ## ## The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array diff --git a/bitnami/discourse/Chart.lock b/bitnami/discourse/Chart.lock index f5924092c3..5cdeb14f7e 100644 --- a/bitnami/discourse/Chart.lock +++ b/bitnami/discourse/Chart.lock @@ -1,12 +1,12 @@ dependencies: - name: common repository: https://charts.bitnami.com/bitnami - version: 1.1.2 + version: 1.2.3 - name: postgresql repository: https://charts.bitnami.com/bitnami - version: 10.1.3 + version: 10.2.0 - name: redis repository: https://charts.bitnami.com/bitnami - version: 12.2.1 -digest: sha256:fd82df504caf4cc291d647f53a85c37d9095323c4f92678f7303d5a4d67a0981 -generated: "2020-12-11T12:20:27.164777+01:00" + version: 12.2.4 +digest: sha256:beabe714932d267d78755ea31b8283ee2706840f9c77504b8413fbab1687cb13 +generated: "2020-12-31T12:23:32.715636+01:00" diff --git a/bitnami/discourse/Chart.yaml b/bitnami/discourse/Chart.yaml index 0a84fe7c54..d7a7091b71 100644 --- a/bitnami/discourse/Chart.yaml +++ b/bitnami/discourse/Chart.yaml @@ -32,4 +32,4 @@ sources: - https://github.com/bitnami/bitnami-docker-discourse - https://github.com/spinnaker - https://www.discourse.org/ -version: 2.0.3 +version: 2.1.0 diff --git a/bitnami/discourse/README.md b/bitnami/discourse/README.md index e45a86efbd..3a9d5382c4 100644 --- a/bitnami/discourse/README.md +++ b/bitnami/discourse/README.md @@ -50,178 +50,181 @@ The command removes all the Kubernetes components associated with the chart and The following table lists the configurable parameters of the Discourse chart and their default values. - Parameter | Description | Default | -|-------------------------------------------|---------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `global.imageRegistry` | Global Docker image registry | `nil` | -| `global.imagePullSecrets` | Global Docker registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | -| `global.storageClass` | Global storage class for dynamic provisioning | `nil` | +| Parameter | Description | Default | +|---------------------------|-------------------------------------------------|---------------------------------------------------------| +| `global.imageRegistry` | Global Docker image registry | `nil` | +| `global.imagePullSecrets` | Global Docker registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | +| `global.storageClass` | Global storage class for dynamic provisioning | `nil` | ### Common parameters -| Parameter | Description | Default | -|--------------------------------------|--------------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `replicaCount` | Number of Discourse & Sidekiq replicas | `1` | -| `image.registry` | Discourse image registry | `docker.io` | -| `image.repository` | Discourse image name | `bitnami/discouse` | -| `image.tag` | Discourse image tag | `{TAG_NAME}` | -| `image.pullPolicy` | Discourse image pull policy | `IfNotPresent` | -| `image.debug` | Specify if debug logs should be enabled | `false` | -| `imagePullSecrets` | Specify docker-registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | -| `nameOverride` | String to partially override discourse.fullname | `nil` | -| `fullnameOverride` | String to fully override discourse.fullname | `nil` | -| `extraVolumes` | Array of extra volumes to be added deployment. Requires setting `extraVolumeMounts` | `[]` (evaluated as a template) | -| `sidecars` | Attach additional sidecar containers to the pod | `[]` (evaluated as a template) | -| `initContainers` | Additional init containers to add to the pods | `[]` (evaluated as a template) | -| `serviceAccount.create` | Whether the service account should be created | `false` | -| `serviceAccount.annotations` | Annotations to add to the service account | `{}` | -| `serviceAccount.name` | Name to be used for the service account | `""` | -| `podSecurityContext` | Pod security context specification | `{}` | -| `persistence.enabled` | Whether to enable persistence based on Persistent Volume Claims | `true` | -| `persistence.storageClass` | PVC Storage Class | `nil` | -| `persistence.existingClaim` | Name of an existing PVC to reuse | `nil` | -| `persistence.accessMode` | PVC Access Mode (RWO, ROX, RWX) | `ReadWriteOnce` | -| `persistence.size` | Size of the PVC to request | `10Gi` | -| `updateStrategy` | Update strategy of deployment | `{type: "RollingUpdate"}` | -| `podAnnotations` | Additional pod annotations | `{}` | -| `podLabels` | Additional pod labels | `{}` (evaluated as a template) | -| `commonLabels` | Labels to be added to all deployed resources | `{}` (evaluated as a template) | -| `commonAnnotations` | Annotations to be added to all deployed resources | `{}` (evaluated as a template) | -| `podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `nodeAffinityPreset.key` | Node label key to match Ignored if `affinity` is set. | `""` | -| `nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set. | `[]` | -| `affinity` | Affinity for pod assignment | `{}` (evaluated as a template) | -| `nodeSelector` | Node labels for pod assignment. | `{}` (evaluated as a template) | -| `tolerations` | Tolerations for pod assignment. | `[]` (evaluated as a template) | +| Parameter | Description | Default | +|------------------------------|-------------------------------------------------------------------------------------------|---------------------------------------------------------| +| `replicaCount` | Number of Discourse & Sidekiq replicas | `1` | +| `image.registry` | Discourse image registry | `docker.io` | +| `image.repository` | Discourse image name | `bitnami/discouse` | +| `image.tag` | Discourse image tag | `{TAG_NAME}` | +| `image.pullPolicy` | Discourse image pull policy | `IfNotPresent` | +| `image.debug` | Specify if debug logs should be enabled | `false` | +| `imagePullSecrets` | Specify docker-registry secret names as an array | `[]` (does not add image pull secrets to deployed pods) | +| `nameOverride` | String to partially override discourse.fullname | `nil` | +| `fullnameOverride` | String to fully override discourse.fullname | `nil` | +| `extraVolumes` | Array of extra volumes to be added deployment. Requires setting `extraVolumeMounts` | `[]` (evaluated as a template) | +| `sidecars` | Attach additional sidecar containers to the pod | `[]` (evaluated as a template) | +| `initContainers` | Additional init containers to add to the pods | `[]` (evaluated as a template) | +| `serviceAccount.create` | Whether the service account should be created | `false` | +| `serviceAccount.annotations` | Annotations to add to the service account | `{}` | +| `serviceAccount.name` | Name to be used for the service account | `""` | +| `podSecurityContext` | Pod security context specification | `{}` | +| `persistence.enabled` | Whether to enable persistence based on Persistent Volume Claims | `true` | +| `persistence.storageClass` | PVC Storage Class | `nil` | +| `persistence.existingClaim` | Name of an existing PVC to reuse | `nil` | +| `persistence.accessMode` | PVC Access Mode (RWO, ROX, RWX) | `ReadWriteOnce` | +| `persistence.size` | Size of the PVC to request | `10Gi` | +| `updateStrategy` | Update strategy of deployment | `{type: "RollingUpdate"}` | +| `podAnnotations` | Additional pod annotations | `{}` | +| `podLabels` | Additional pod labels | `{}` (evaluated as a template) | +| `commonLabels` | Labels to be added to all deployed resources | `{}` (evaluated as a template) | +| `commonAnnotations` | Annotations to be added to all deployed resources | `{}` (evaluated as a template) | +| `podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `nodeAffinityPreset.key` | Node label key to match Ignored if `affinity` is set. | `""` | +| `nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set. | `[]` | +| `affinity` | Affinity for pod assignment | `{}` (evaluated as a template) | +| `nodeSelector` | Node labels for pod assignment. | `{}` (evaluated as a template) | +| `tolerations` | Tolerations for pod assignment. | `[]` (evaluated as a template) | ### Service parameters -| Parameter | Description | Default | -|-------------------------------------------|---------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `service.type` | Kubernetes Service type | `LoadBalancer` | -| `service.port` | Service HTTP port | `80` | -| `service.nodePort` | NodePort service IP address | `nil` | -| `service.loadBalancerIP` | LoadBalancer service IP address | `nil` | -| `service.externalTrafficPolicy` | Enable client source IP preservation | `Cluster` | -| `service.annotations` | Service annotations | `{}` (evaluated as a template) | -| `service.loadBalancerSourceRanges` | Restricts access for LoadBalancer (only with `service.type: LoadBalancer`) | `[]` | -| `service.extraPorts` | Extra ports to expose in the service (normally used with the `sidecar` value) | `nil` | -| `service.nodePorts.http` | Kubernetes http node port | `""` | +| Parameter | Description | Default | +|------------------------------------|-------------------------------------------------------------------------------|--------------------------------| +| `service.type` | Kubernetes Service type | `LoadBalancer` | +| `service.port` | Service HTTP port | `80` | +| `service.nodePort` | NodePort service IP address | `nil` | +| `service.loadBalancerIP` | LoadBalancer service IP address | `nil` | +| `service.externalTrafficPolicy` | Enable client source IP preservation | `Cluster` | +| `service.annotations` | Service annotations | `{}` (evaluated as a template) | +| `service.loadBalancerSourceRanges` | Restricts access for LoadBalancer (only with `service.type: LoadBalancer`) | `[]` | +| `service.extraPorts` | Extra ports to expose in the service (normally used with the `sidecar` value) | `nil` | +| `service.nodePorts.http` | Kubernetes http node port | `""` | ### Discourse parameters -| Parameter | Description | Default | -|-------------------------------------------|---------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `discourse.host` | Discourse host to create application URLs (include the port if =/= 80) | `""` | -| `discourse.siteName` | Discourse site name | `My Site!` | -| `discourse.username` | Admin user of the application | `user` | -| `discourse.password` | Application password (min length of 10 chars) - ignored if existingSecret is provided | _random 10 character long alphanumeric string_ | -| `discourse.existingSecret` | Name of an existing Kubernetes secret | `nil` | -| `discourse.email` | Admin user email of the application | `user@example.com` | -| `discourse.command` | Custom command to override image cmd | `nil` (evaluated as a template) | -| `discourse.args` | Custom args for the custom command | `nil` (evaluated as a template) | -| `discourse.containerSecurityContext` | Container security context specification | `{}` | -| `discourse.resources` | Discourse container's resource requests and limits | `{}` | -| `discourse.livenessProbe.enabled` | Enable/disable livenessProbe | `true` | -| `discourse.livenessProbe.initialDelaySeconds`| Delay before liveness probe is initiated | `500` | -| `discourse.livenessProbe.periodSeconds` | How often to perform the probe | `10` | -| `discourse.livenessProbe.timeoutSeconds` | When the probe times out | `5` | -| `discourse.livenessProbe.failureThreshold`| Minimum consecutive failures for the probe | `6` | -| `discourse.livenessProbe.successThreshold`| Minimum consecutive successes for the probe | `1` | -| `discourse.readinessProbe.enabled` | Enable/disable readinessProbe | `true` | -| `discourse.readinessProbe.initialDelaySeconds`| Delay before readiness probe is initiated | `30` | -| `discourse.readinessProbe.periodSeconds` | How often to perform the probe | `10` | -| `discourse.readinessProbe.timeoutSeconds` | When the probe times out | `5` | -| `discourse.readinessProbe.failureThreshold`| Minimum consecutive failures for the probe | `6` | -| `discourse.readinessProbe.successThreshold`| Minimum consecutive successes for the probe | `1` | -| `discourse.customLivenessProbe` | Custom liveness probe to execute (when the main one is disabled) | `{}` (evaluated as a template) | -| `discourse.customReadinessProbe` | Custom readiness probe to execute (when the main one is disabled) | `{}` (evaluated as a template) | -| `discourse.extraEnvVars` | An array to add extra env vars | `[]` (evaluated as a template) | -| `discourse.extraEnvVarsCM` | Array to add extra configmaps | `[]` | -| `discourse.extraEnvVarsSecret` | Array to add extra environment from a Secret | `nil` | -| `discourse.extraVolumeMounts` | Additional volume mounts (used along with `extraVolumes`) | `[]` (evaluated as a template) | -| `discourse.skipInstall` | Do not run the Discourse installation wizard | `false` | +| Parameter | Description | Default | +|------------------------------------------------|---------------------------------------------------------------------------------------|------------------------------------------------| +| `discourse.host` | Discourse host to create application URLs (include the port if =/= 80) | `""` | +| `discourse.siteName` | Discourse site name | `My Site!` | +| `discourse.username` | Admin user of the application | `user` | +| `discourse.password` | Application password (min length of 10 chars) - ignored if existingSecret is provided | _random 10 character long alphanumeric string_ | +| `discourse.existingSecret` | Name of an existing Kubernetes secret | `nil` | +| `discourse.email` | Admin user email of the application | `user@example.com` | +| `discourse.command` | Custom command to override image cmd | `nil` (evaluated as a template) | +| `discourse.args` | Custom args for the custom command | `nil` (evaluated as a template) | +| `discourse.containerSecurityContext` | Container security context specification | `{}` | +| `discourse.resources` | Discourse container's resource requests and limits | `{}` | +| `discourse.livenessProbe.enabled` | Enable/disable livenessProbe | `true` | +| `discourse.livenessProbe.initialDelaySeconds` | Delay before liveness probe is initiated | `500` | +| `discourse.livenessProbe.periodSeconds` | How often to perform the probe | `10` | +| `discourse.livenessProbe.timeoutSeconds` | When the probe times out | `5` | +| `discourse.livenessProbe.failureThreshold` | Minimum consecutive failures for the probe | `6` | +| `discourse.livenessProbe.successThreshold` | Minimum consecutive successes for the probe | `1` | +| `discourse.readinessProbe.enabled` | Enable/disable readinessProbe | `true` | +| `discourse.readinessProbe.initialDelaySeconds` | Delay before readiness probe is initiated | `30` | +| `discourse.readinessProbe.periodSeconds` | How often to perform the probe | `10` | +| `discourse.readinessProbe.timeoutSeconds` | When the probe times out | `5` | +| `discourse.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe | `6` | +| `discourse.readinessProbe.successThreshold` | Minimum consecutive successes for the probe | `1` | +| `discourse.customLivenessProbe` | Custom liveness probe to execute (when the main one is disabled) | `{}` (evaluated as a template) | +| `discourse.customReadinessProbe` | Custom readiness probe to execute (when the main one is disabled) | `{}` (evaluated as a template) | +| `discourse.extraEnvVars` | An array to add extra env vars | `[]` (evaluated as a template) | +| `discourse.extraEnvVarsCM` | Array to add extra configmaps | `[]` | +| `discourse.extraEnvVarsSecret` | Array to add extra environment from a Secret | `nil` | +| `discourse.extraVolumeMounts` | Additional volume mounts (used along with `extraVolumes`) | `[]` (evaluated as a template) | +| `discourse.skipInstall` | Do not run the Discourse installation wizard | `false` | ### Sidekiq parameters -| Parameter | Description | Default | -|-------------------------------------------|---------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `sidekiq.containerSecurityContext` | Container security context specification | `{}` | -| `sidekiq.command` | Custom command to override image cmd (evaluated as a template) | `["/app-entrypoint.sh"]` | -| `sidekiq.args` | Custom args for the custom command (evaluated as a template) | `["nami", "start", "--foreground", "discourse-sidekiq"` | -| `sidekiq.resources` | Sidekiq container's resource requests and limits | `{}` | -| `sidekiq.livenessProbe.enabled` | Enable/disable livenessProbe | `true` | -| `sidekiq.livenessProbe.initialDelaySeconds`| Delay before liveness probe is initiated | `500` | -| `sidekiq.livenessProbe.periodSeconds` | How often to perform the probe | `10` | -| `sidekiq.livenessProbe.timeoutSeconds` | When the probe times out | `5` | -| `sidekiq.livenessProbe.failureThreshold` | Minimum consecutive failures for the probe | `6` | -| `sidekiq.livenessProbe.successThreshold` | Minimum consecutive successes for the probe | `1` | -| `sidekiq.readinessProbe.enabled` | Enable/disable readinessProbe | `true` | -| `sidekiq.readinessProbe.initialDelaySeconds`| Delay before readiness probe is initiated | `30` | -| `sidekiq.readinessProbe.periodSeconds` | How often to perform the probe | `10` | -| `sidekiq.readinessProbe.timeoutSeconds` | When the probe times out | `5` | -| `sidekiq.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe | `6` | -| `sidekiq.readinessProbe.successThreshold` | Minimum consecutive successes for the probe | `1` | -| `sidekiq.customLivenessProbe` | Custom liveness probe to execute (when the main one is disabled) | `{}` (evaluated as a template) | -| `sidekiq.customReadinessProbe` | Custom readiness probe to execute (when the main one is disabled) | `{}` (evaluated as a template) | -| `sidekiq.extraEnvVars` | An array to add extra env vars | `[]` (evaluated as a template) | -| `sidekiq.extraEnvVarsCM` | Array to add extra configmaps | `[]` | -| `sidekiq.extraEnvVarsSecret` | Array to add extra environment from a Secret | `nil` | -| `discourse.extraVolumeMounts` | Additional volume mounts (used along with `extraVolumes`) | `[]` (evaluated as a template) | +| Parameter | Description | Default | +|----------------------------------------------|-------------------------------------------------------------------|---------------------------------------------------------| +| `sidekiq.containerSecurityContext` | Container security context specification | `{}` | +| `sidekiq.command` | Custom command to override image cmd (evaluated as a template) | `["/app-entrypoint.sh"]` | +| `sidekiq.args` | Custom args for the custom command (evaluated as a template) | `["nami", "start", "--foreground", "discourse-sidekiq"` | +| `sidekiq.resources` | Sidekiq container's resource requests and limits | `{}` | +| `sidekiq.livenessProbe.enabled` | Enable/disable livenessProbe | `true` | +| `sidekiq.livenessProbe.initialDelaySeconds` | Delay before liveness probe is initiated | `500` | +| `sidekiq.livenessProbe.periodSeconds` | How often to perform the probe | `10` | +| `sidekiq.livenessProbe.timeoutSeconds` | When the probe times out | `5` | +| `sidekiq.livenessProbe.failureThreshold` | Minimum consecutive failures for the probe | `6` | +| `sidekiq.livenessProbe.successThreshold` | Minimum consecutive successes for the probe | `1` | +| `sidekiq.readinessProbe.enabled` | Enable/disable readinessProbe | `true` | +| `sidekiq.readinessProbe.initialDelaySeconds` | Delay before readiness probe is initiated | `30` | +| `sidekiq.readinessProbe.periodSeconds` | How often to perform the probe | `10` | +| `sidekiq.readinessProbe.timeoutSeconds` | When the probe times out | `5` | +| `sidekiq.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe | `6` | +| `sidekiq.readinessProbe.successThreshold` | Minimum consecutive successes for the probe | `1` | +| `sidekiq.customLivenessProbe` | Custom liveness probe to execute (when the main one is disabled) | `{}` (evaluated as a template) | +| `sidekiq.customReadinessProbe` | Custom readiness probe to execute (when the main one is disabled) | `{}` (evaluated as a template) | +| `sidekiq.extraEnvVars` | An array to add extra env vars | `[]` (evaluated as a template) | +| `sidekiq.extraEnvVarsCM` | Array to add extra configmaps | `[]` | +| `sidekiq.extraEnvVarsSecret` | Array to add extra environment from a Secret | `nil` | +| `discourse.extraVolumeMounts` | Additional volume mounts (used along with `extraVolumes`) | `[]` (evaluated as a template) | ### Ingress parameters -| Parameter | Description | Default | -|-------------------------------------------|---------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `ingress.enabled` | Enable ingress controller resource | `false` | -| `ingress.certManager` | Add annotations for cert-manager | `false` | -| `ingress.hostname` | Default host for the ingress resource | `discourse.local` | -| `ingress.tls` | Create TLS Secret | `false` | -| `ingress.annotations` | Ingress annotations | `{}` (evaluated as a template) | -| `ingress.extraHosts[0].name` | Additional hostnames to be covered | `nil` | -| `ingress.extraHosts[0].path` | Additional hostnames to be covered | `nil` | -| `ingress.extraTls[0].hosts[0]` | TLS configuration for additional hostnames to be covered | `nil` | -| `ingress.extraTls[0].secretName` | TLS configuration for additional hostnames to be covered | `nil` | -| `ingress.secrets[0].name` | TLS Secret Name | `nil` | -| `ingress.secrets[0].certificate` | TLS Secret Certificate | `nil` | -| `ingress.secrets[0].key` | TLS Secret Key | `nil` | +| Parameter | Description | Default | +|----------------------------------|---------------------------------------------------------------|--------------------------------| +| `ingress.enabled` | Enable ingress controller resource | `false` | +| `ingress.certManager` | Add annotations for cert-manager | `false` | +| `ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `` | +| `ingress.path` | Ingress path | `/` | +| `ingress.pathType` | Ingress path type | `ImplementationSpecific` | +| `ingress.hostname` | Default host for the ingress resource | `discourse.local` | +| `ingress.tls` | Create TLS Secret | `false` | +| `ingress.annotations` | Ingress annotations | `{}` (evaluated as a template) | +| `ingress.extraHosts[0].name` | Additional hostnames to be covered | `nil` | +| `ingress.extraHosts[0].path` | Additional hostnames to be covered | `nil` | +| `ingress.extraTls[0].hosts[0]` | TLS configuration for additional hostnames to be covered | `nil` | +| `ingress.extraTls[0].secretName` | TLS configuration for additional hostnames to be covered | `nil` | +| `ingress.secrets[0].name` | TLS Secret Name | `nil` | +| `ingress.secrets[0].certificate` | TLS Secret Certificate | `nil` | +| `ingress.secrets[0].key` | TLS Secret Key | `nil` | ### Database parameters -| Parameter | Description | Default | -|----------------------------------------------|---------------------------------------------------------------------------------------|-----------------------------------------------------------| -| `postgresql.enabled` | Deploy PostgreSQL container(s) | `true` | -| `postgresql.postgresqlUsername` | PostgreSQL user to create (used by Discourse) | `bn_discourse` | -| `postgresql.postgresqlPassword` | Password for the Dicourse user - ignored if existingSecret is provided | _random 10 character long alphanumeric string_ | -| `postgresql.postgresqlPostgresPassword` | Password for the admin user ("postgres") - ignored if existingSecret is provided | `bitnami` | -| `postgresql.existingSecret` | Name of an existing Kubernetes secret. The secret must have the following keys configured: `postgresql-postgres-password`, `postgresql-password` | `nil` | -| `postgresql.postgresqlDatabase` | Name of the database to create | `bitnami_application` | -| `postgresql.persistence.enabled` | Enable database persistence using PVC | `true` | -| `externalDatabase.host` | Host of the external database | `""` | -| `externalDatabase.port` | Database port number (when using an external db) | `5432` | -| `externalDatabase.user` | PostgreSQL username (when using an external db) | `bn_discourse` | -| `externalDatabase.password` | Password for the above username (when using an external db) | `""` | -| `externalDatabase.postgresqlPostgresUser` | PostgreSQL admin user, used during the installation stage (when using an external db) | `""` | -| `externalDatabase.postgresqlPostgresPassword`| Password for PostgreSQL admin user (when using an external db) | `""` | -| `externalDatabase.existingSecret` | Name of an existing Kubernetes secret. The secret must have the following keys configured: `postgresql-postgres-password`, `postgresql-password` | `nil` | -| `externalDatabase.database` | Name of the existing database (when using an external db) | `bitnami_application` | +| Parameter | Description | Default | +|-----------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------| +| `postgresql.enabled` | Deploy PostgreSQL container(s) | `true` | +| `postgresql.postgresqlUsername` | PostgreSQL user to create (used by Discourse) | `bn_discourse` | +| `postgresql.postgresqlPassword` | Password for the Dicourse user - ignored if existingSecret is provided | _random 10 character long alphanumeric string_ | +| `postgresql.postgresqlPostgresPassword` | Password for the admin user ("postgres") - ignored if existingSecret is provided | `bitnami` | +| `postgresql.existingSecret` | Name of an existing Kubernetes secret. The secret must have the following keys configured: `postgresql-postgres-password`, `postgresql-password` | `nil` | +| `postgresql.postgresqlDatabase` | Name of the database to create | `bitnami_application` | +| `postgresql.persistence.enabled` | Enable database persistence using PVC | `true` | +| `externalDatabase.host` | Host of the external database | `""` | +| `externalDatabase.port` | Database port number (when using an external db) | `5432` | +| `externalDatabase.user` | PostgreSQL username (when using an external db) | `bn_discourse` | +| `externalDatabase.password` | Password for the above username (when using an external db) | `""` | +| `externalDatabase.postgresqlPostgresUser` | PostgreSQL admin user, used during the installation stage (when using an external db) | `""` | +| `externalDatabase.postgresqlPostgresPassword` | Password for PostgreSQL admin user (when using an external db) | `""` | +| `externalDatabase.existingSecret` | Name of an existing Kubernetes secret. The secret must have the following keys configured: `postgresql-postgres-password`, `postgresql-password` | `nil` | +| `externalDatabase.database` | Name of the existing database (when using an external db) | `bitnami_application` | ### Redis parameters -| Parameter | Description | Default | -|-------------------------------------------|---------------------------------------------------------------------------------------|--------------------------------------------------------------| -| `redis.enabled` | Deploy Redis container(s) | `true` | -| `redis.usePassword` | Use password authentication | `false` | -| `redis.password` | Password for Redis authentication - ignored if existingSecret is provided | `nil` | -| `redis.existingSecret` | Name of an existing Kubernetes secret | `nil` | -| `redis.existingSecretPasswordKey` | Name of the key pointing to the password in your Kubernetes secret | `redis-password` | -| `redis.cluster.enabled` | Whether to use cluster replication | `false` | -| `redis.master.persistence.enabled` | Enable database persistence using PVC | `true` | -| `externalRedis.host` | Host of the external database | `""` | -| `externalRedis.port` | Database port number | `6379` | -| `externalRedis.password` | Password for the external Redis | `nil` | -| `externalRedis.existingSecret` | Name of an existing Kubernetes secret | `nil` | -| `externalRedis.existingSecretPasswordKey` | Name of the key pointing to the password in your Kubernetes secret | `redis-password` | +| Parameter | Description | Default | +|-------------------------------------------|----------------------------------------------------------------------------|------------------| +| `redis.enabled` | Deploy Redis container(s) | `true` | +| `redis.usePassword` | Use password authentication | `false` | +| `redis.password` | Password for Redis authentication - ignored if existingSecret is provided | `nil` | +| `redis.existingSecret` | Name of an existing Kubernetes secret | `nil` | +| `redis.existingSecretPasswordKey` | Name of the key pointing to the password in your Kubernetes secret | `redis-password` | +| `redis.cluster.enabled` | Whether to use cluster replication | `false` | +| `redis.master.persistence.enabled` | Enable database persistence using PVC | `true` | +| `externalRedis.host` | Host of the external database | `""` | +| `externalRedis.port` | Database port number | `6379` | +| `externalRedis.password` | Password for the external Redis | `nil` | +| `externalRedis.existingSecret` | Name of an existing Kubernetes secret | `nil` | +| `externalRedis.existingSecretPasswordKey` | Name of the key pointing to the password in your Kubernetes secret | `redis-password` | The above parameters map to the env variables defined in [bitnami/discourse](http://github.com/bitnami/bitnami-docker-discourse). For more information please refer to the [bitnami/discourse](http://github.com/bitnami/bitnami-docker-discourse) image documentation. diff --git a/bitnami/discourse/templates/ingress.yaml b/bitnami/discourse/templates/ingress.yaml index 2d2b5a6027..f266f581ce 100644 --- a/bitnami/discourse/templates/ingress.yaml +++ b/bitnami/discourse/templates/ingress.yaml @@ -36,18 +36,20 @@ spec: - host: {{ .Values.ingress.hostname }} http: paths: - - path: / - backend: - serviceName: {{ template "common.names.fullname" . }} - servicePort: http + - path: {{ .Values.ingress.path }} + {{- if eq "true" (include "common.ingress.supportsPathType" .) }} + pathType: {{ .Values.ingress.pathType }} + {{- end }} + backend: {{- include "common.ingress.backend" (dict "serviceName" (include "common.names.fullname" .) "servicePort" "http" "context" $) | nindent 14 }} {{- end }} {{- range .Values.ingress.extraHosts }} - host: {{ .name }} http: paths: - path: {{ default "/" .path }} - backend: - serviceName: {{ template "common.names.fullname" $ }} - servicePort: http + {{- if eq "true" (include "common.ingress.supportsPathType" $) }} + pathType: {{ default "ImplementationSpecific" .pathType }} + {{- end }} + backend: {{- include "common.ingress.backend" (dict "serviceName" (include "common.names.fullname" $) "servicePort" "http" "context" $) | nindent 14 }} {{- end }} {{- end }} diff --git a/bitnami/discourse/values-production.yaml b/bitnami/discourse/values-production.yaml index c1403495ce..103b10d93e 100644 --- a/bitnami/discourse/values-production.yaml +++ b/bitnami/discourse/values-production.yaml @@ -49,11 +49,11 @@ discourse: ## Discourse host to create application URLs. The port will be automatilly included. ## ref: https://github.com/bitnami/bitnami-docker-discourse#configuration ## - host: '' + host: "" ## Discourse site name ## ref: https://github.com/bitnami/bitnami-docker-discourse#environment-variables ## - siteName: 'My Site!' + siteName: "My Site!" ## User of the application ## ref: https://github.com/bitnami/bitnami-docker-discourse#environment-variables ## @@ -172,11 +172,11 @@ sidekiq: ## Custom command to override image cmd ## - command: ['/app-entrypoint.sh'] + command: ["/app-entrypoint.sh"] ## Custom args for the custom command: ## - args: ['nami', 'start', '--foreground', 'discourse-sidekiq'] + args: ["nami", "start", "--foreground", "discourse-sidekiq"] ## Sidekiq resource requests and limits ## ref: http://kubernetes.io/docs/user-guide/compute-resources/ @@ -349,7 +349,7 @@ service: ## http: ## nodePorts: - http: '' + http: "" ## Ingress parameters ## @@ -363,6 +363,19 @@ ingress: ## When the ingress is enabled, a host pointing to this will be created ## hostname: discourse.local + + ## Override API Version (automatically detected if not set) + ## + apiVersion: + + ## Ingress Path + ## + path: / + + ## Ingress Path type + ## + pathType: ImplementationSpecific + ## Ingress annotations done as key:value pairs ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md @@ -454,6 +467,7 @@ podAntiAffinityPreset: soft nodeAffinityPreset: ## Node affinity type ## Allowed values: soft, hard + ## type: "" ## Node label key to match ## E.g. @@ -505,7 +519,7 @@ postgresql: ## PostgreSQL admin password (used when `postgresqlUsername` is not `postgres`) ## ref: https://github.com/bitnami/bitnami-docker-postgresql/blob/master/README.md#creating-a-database-user-on-first-run (see note!) ## - postgresqlPostgresPassword: 'bitnami' + postgresqlPostgresPassword: "bitnami" ## Name of existing secret object ## The secret should contain the following keys: ## postgresql-postgres-password (for the unprivileged user) @@ -528,7 +542,7 @@ postgresql: externalDatabase: ## Database host ## - host: '' + host: "" ## Database port ## port: 5432 @@ -537,13 +551,13 @@ externalDatabase: user: bn_discourse ## Database password ## - password: '' + password: "" ## PostgreSQL admin user (used in the installation stage) ## postgresqlPostgresUser: postgres ## PostgreSQL admin password (used in the installation stage) ## - postgresqlPostgresPassword: '' + postgresqlPostgresPassword: "" ## Name of existing secret object ## The secret should contain the following keys: ## postgresql-postgres-password (for the unprivileged user) @@ -573,10 +587,12 @@ redis: # password: ## ## Name of existing secret object containing the password + ## existingSecret: ## ## Password key to be retrieved from Redis secret - existingSecretPasswordKey: 'redis-password' + ## + existingSecretPasswordKey: "redis-password" ## ## Cluster settings ## @@ -595,17 +611,19 @@ redis: externalRedis: ## Redis host ## - host: '' + host: "" ## Redis port ## port: 6379 ## Redis password for authentication ## Ignored if existingSecret is set ## - password: '' + password: "" ## ## Name of existing secret object containing the password + ## existingSecret: ## ## Password key to be retrieved from Redis secret - existingSecretPasswordKey: 'redis-password' + ## + existingSecretPasswordKey: "redis-password" diff --git a/bitnami/discourse/values.yaml b/bitnami/discourse/values.yaml index 993e0765a4..d9eba96861 100644 --- a/bitnami/discourse/values.yaml +++ b/bitnami/discourse/values.yaml @@ -8,6 +8,10 @@ # - myRegistryKeySecretName # storageClass: myStorageClass +## Force target Kubernetes version (using Helm capabilites if not set) +## +kubeVersion: + ## Number of Discourse & Sidekiq replicas ## (Note that you will need ReadWriteMany PVCs for this to work properly) ## @@ -359,6 +363,18 @@ ingress: ## When the ingress is enabled, a host pointing to this will be created ## hostname: discourse.local + ## Override API Version (automatically detected if not set) + ## + apiVersion: + + ## Ingress Path + ## + path: / + + ## Ingress Path type + ## + pathType: ImplementationSpecific + ## Ingress annotations done as key:value pairs ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md @@ -450,6 +466,7 @@ podAntiAffinityPreset: soft nodeAffinityPreset: ## Node affinity type ## Allowed values: soft, hard + ## type: "" ## Node label key to match ## E.g. @@ -568,9 +585,11 @@ redis: # password: ## ## Name of existing secret object containing the password + ## existingSecret: ## ## Password key to be retrieved from Redis secret + ## existingSecretPasswordKey: 'redis-password' ## ## Cluster settings @@ -601,7 +620,9 @@ externalRedis: password: '' ## ## Name of existing secret object containing the password + ## existingSecret: ## ## Password key to be retrieved from Redis secret + ## existingSecretPasswordKey: 'redis-password' diff --git a/bitnami/wordpress/Chart.lock b/bitnami/wordpress/Chart.lock index 956662f1f2..70f0f9548e 100644 --- a/bitnami/wordpress/Chart.lock +++ b/bitnami/wordpress/Chart.lock @@ -4,6 +4,6 @@ dependencies: version: 9.2.0 - name: common repository: https://charts.bitnami.com/bitnami - version: 1.2.2 -digest: sha256:fd87a28d1cf45bd6dad3803730b92dfda8737ceb16cdd8b6b1c21a82cec6db7a -generated: "2020-12-30T15:24:56.894285+01:00" + version: 1.2.3 +digest: sha256:549a524c7d9b4d6491346179242bcaf7182a0b21546e234155e5bffd1b71b6a4 +generated: "2020-12-31T12:35:40.096506+01:00" diff --git a/bitnami/wordpress/Chart.yaml b/bitnami/wordpress/Chart.yaml index e125134ee5..dcb8c85642 100755 --- a/bitnami/wordpress/Chart.yaml +++ b/bitnami/wordpress/Chart.yaml @@ -31,4 +31,4 @@ name: wordpress sources: - https://github.com/bitnami/bitnami-docker-wordpress - http://www.wordpress.com/ -version: 10.2.0 +version: 10.2.1