From f0148427d042a2823e665daef0ceb9230a09e0cb Mon Sep 17 00:00:00 2001 From: Bitnami Bot Date: Mon, 21 Nov 2022 18:26:24 +0100 Subject: [PATCH] [bitnami/etcd] Release 8.5.10 (#13620) * [bitnami/etcd] Release 8.5.10 updating components versions Signed-off-by: Bitnami Containers * Update README.md with readme-generator-for-helm Signed-off-by: Bitnami Containers Signed-off-by: Bitnami Containers --- bitnami/etcd/Chart.yaml | 4 +- bitnami/etcd/README.md | 94 ++++++++++++++++++++-------------------- bitnami/etcd/values.yaml | 4 +- 3 files changed, 51 insertions(+), 51 deletions(-) diff --git a/bitnami/etcd/Chart.yaml b/bitnami/etcd/Chart.yaml index 49c2c7dfa9..b205a131ba 100644 --- a/bitnami/etcd/Chart.yaml +++ b/bitnami/etcd/Chart.yaml @@ -1,7 +1,7 @@ annotations: category: Database apiVersion: v2 -appVersion: 3.5.5 +appVersion: 3.5.6 dependencies: - name: common repository: https://charts.bitnami.com/bitnami @@ -24,4 +24,4 @@ name: etcd sources: - https://github.com/bitnami/containers/tree/main/bitnami/etcd - https://coreos.com/etcd/ -version: 8.5.9 +version: 8.5.10 diff --git a/bitnami/etcd/README.md b/bitnami/etcd/README.md index 74e12513f0..3371513047 100644 --- a/bitnami/etcd/README.md +++ b/bitnami/etcd/README.md @@ -79,52 +79,52 @@ The command removes all the Kubernetes components associated with the chart and ### etcd parameters -| Name | Description | Value | -| -------------------------------------- | ----------------------------------------------------------------------------------------------------------- | --------------------- | -| `image.registry` | etcd image registry | `docker.io` | -| `image.repository` | etcd image name | `bitnami/etcd` | -| `image.tag` | etcd image tag | `3.5.5-debian-11-r23` | -| `image.digest` | etcd image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | etcd image pull policy | `IfNotPresent` | -| `image.pullSecrets` | etcd image pull secrets | `[]` | -| `image.debug` | Enable image debug mode | `false` | -| `auth.rbac.create` | Switch to enable RBAC authentication | `true` | -| `auth.rbac.allowNoneAuthentication` | Allow to use etcd without configuring RBAC authentication | `true` | -| `auth.rbac.rootPassword` | Root user password. The root user is always `root` | `""` | -| `auth.rbac.existingSecret` | Name of the existing secret containing credentials for the root user | `""` | -| `auth.rbac.existingSecretPasswordKey` | Name of key containing password to be retrieved from the existing secret | `""` | -| `auth.token.type` | Authentication token type. Allowed values: 'simple' or 'jwt' | `jwt` | -| `auth.token.privateKey.filename` | Name of the file containing the private key for signing the JWT token | `jwt-token.pem` | -| `auth.token.privateKey.existingSecret` | Name of the existing secret containing the private key for signing the JWT token | `""` | -| `auth.token.signMethod` | JWT token sign method | `RS256` | -| `auth.token.ttl` | JWT token TTL | `10m` | -| `auth.client.secureTransport` | Switch to encrypt client-to-server communications using TLS certificates | `false` | -| `auth.client.useAutoTLS` | Switch to automatically create the TLS certificates | `false` | -| `auth.client.existingSecret` | Name of the existing secret containing the TLS certificates for client-to-server communications | `""` | -| `auth.client.enableAuthentication` | Switch to enable host authentication using TLS certificates. Requires existing secret | `false` | -| `auth.client.certFilename` | Name of the file containing the client certificate | `cert.pem` | -| `auth.client.certKeyFilename` | Name of the file containing the client certificate private key | `key.pem` | -| `auth.client.caFilename` | Name of the file containing the client CA certificate | `""` | -| `auth.peer.secureTransport` | Switch to encrypt server-to-server communications using TLS certificates | `false` | -| `auth.peer.useAutoTLS` | Switch to automatically create the TLS certificates | `false` | -| `auth.peer.existingSecret` | Name of the existing secret containing the TLS certificates for server-to-server communications | `""` | -| `auth.peer.enableAuthentication` | Switch to enable host authentication using TLS certificates. Requires existing secret | `false` | -| `auth.peer.certFilename` | Name of the file containing the peer certificate | `cert.pem` | -| `auth.peer.certKeyFilename` | Name of the file containing the peer certificate private key | `key.pem` | -| `auth.peer.caFilename` | Name of the file containing the peer CA certificate | `""` | -| `autoCompactionMode` | Auto compaction mode, by default periodic. Valid values: "periodic", "revision". | `""` | -| `autoCompactionRetention` | Auto compaction retention for mvcc key value store in hour, by default 0, means disabled | `""` | -| `initialClusterState` | Initial cluster state. Allowed values: 'new' or 'existing' | `""` | -| `logLevel` | Sets the log level for the etcd process. Allowed values: 'debug', 'info', 'warn', 'error', 'panic', 'fatal' | `info` | -| `maxProcs` | Limits the number of operating system threads that can execute user-level | `""` | -| `removeMemberOnContainerTermination` | Use a PreStop hook to remove the etcd members from the etcd cluster on container termination | `true` | -| `configuration` | etcd configuration. Specify content for etcd.conf.yml | `""` | -| `existingConfigmap` | Existing ConfigMap with etcd configuration | `""` | -| `extraEnvVars` | Extra environment variables to be set on etcd container | `[]` | -| `extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars | `""` | -| `extraEnvVarsSecret` | Name of existing Secret containing extra env vars | `""` | -| `command` | Default container command (useful when using custom images) | `[]` | -| `args` | Default container args (useful when using custom images) | `[]` | +| Name | Description | Value | +| -------------------------------------- | ----------------------------------------------------------------------------------------------------------- | -------------------- | +| `image.registry` | etcd image registry | `docker.io` | +| `image.repository` | etcd image name | `bitnami/etcd` | +| `image.tag` | etcd image tag | `3.5.6-debian-11-r0` | +| `image.digest` | etcd image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | etcd image pull policy | `IfNotPresent` | +| `image.pullSecrets` | etcd image pull secrets | `[]` | +| `image.debug` | Enable image debug mode | `false` | +| `auth.rbac.create` | Switch to enable RBAC authentication | `true` | +| `auth.rbac.allowNoneAuthentication` | Allow to use etcd without configuring RBAC authentication | `true` | +| `auth.rbac.rootPassword` | Root user password. The root user is always `root` | `""` | +| `auth.rbac.existingSecret` | Name of the existing secret containing credentials for the root user | `""` | +| `auth.rbac.existingSecretPasswordKey` | Name of key containing password to be retrieved from the existing secret | `""` | +| `auth.token.type` | Authentication token type. Allowed values: 'simple' or 'jwt' | `jwt` | +| `auth.token.privateKey.filename` | Name of the file containing the private key for signing the JWT token | `jwt-token.pem` | +| `auth.token.privateKey.existingSecret` | Name of the existing secret containing the private key for signing the JWT token | `""` | +| `auth.token.signMethod` | JWT token sign method | `RS256` | +| `auth.token.ttl` | JWT token TTL | `10m` | +| `auth.client.secureTransport` | Switch to encrypt client-to-server communications using TLS certificates | `false` | +| `auth.client.useAutoTLS` | Switch to automatically create the TLS certificates | `false` | +| `auth.client.existingSecret` | Name of the existing secret containing the TLS certificates for client-to-server communications | `""` | +| `auth.client.enableAuthentication` | Switch to enable host authentication using TLS certificates. Requires existing secret | `false` | +| `auth.client.certFilename` | Name of the file containing the client certificate | `cert.pem` | +| `auth.client.certKeyFilename` | Name of the file containing the client certificate private key | `key.pem` | +| `auth.client.caFilename` | Name of the file containing the client CA certificate | `""` | +| `auth.peer.secureTransport` | Switch to encrypt server-to-server communications using TLS certificates | `false` | +| `auth.peer.useAutoTLS` | Switch to automatically create the TLS certificates | `false` | +| `auth.peer.existingSecret` | Name of the existing secret containing the TLS certificates for server-to-server communications | `""` | +| `auth.peer.enableAuthentication` | Switch to enable host authentication using TLS certificates. Requires existing secret | `false` | +| `auth.peer.certFilename` | Name of the file containing the peer certificate | `cert.pem` | +| `auth.peer.certKeyFilename` | Name of the file containing the peer certificate private key | `key.pem` | +| `auth.peer.caFilename` | Name of the file containing the peer CA certificate | `""` | +| `autoCompactionMode` | Auto compaction mode, by default periodic. Valid values: "periodic", "revision". | `""` | +| `autoCompactionRetention` | Auto compaction retention for mvcc key value store in hour, by default 0, means disabled | `""` | +| `initialClusterState` | Initial cluster state. Allowed values: 'new' or 'existing' | `""` | +| `logLevel` | Sets the log level for the etcd process. Allowed values: 'debug', 'info', 'warn', 'error', 'panic', 'fatal' | `info` | +| `maxProcs` | Limits the number of operating system threads that can execute user-level | `""` | +| `removeMemberOnContainerTermination` | Use a PreStop hook to remove the etcd members from the etcd cluster on container termination | `true` | +| `configuration` | etcd configuration. Specify content for etcd.conf.yml | `""` | +| `existingConfigmap` | Existing ConfigMap with etcd configuration | `""` | +| `extraEnvVars` | Extra environment variables to be set on etcd container | `[]` | +| `extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars | `""` | +| `extraEnvVarsSecret` | Name of existing Secret containing extra env vars | `""` | +| `command` | Default container command (useful when using custom images) | `[]` | +| `args` | Default container args (useful when using custom images) | `[]` | ### etcd statefulset parameters @@ -233,7 +233,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/bitnami-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r53` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r54` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/etcd/values.yaml b/bitnami/etcd/values.yaml index 3e6d904dfc..a969a24cde 100644 --- a/bitnami/etcd/values.yaml +++ b/bitnami/etcd/values.yaml @@ -70,7 +70,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/etcd - tag: 3.5.5-debian-11-r23 + tag: 3.5.6-debian-11-r0 digest: "" ## @param image.pullPolicy etcd image pull policy ## Specify a imagePullPolicy @@ -601,7 +601,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/bitnami-shell - tag: 11-debian-11-r53 + tag: 11-debian-11-r54 digest: "" ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ##