From 0a7982bc9924c1c639451d4ba02de9c6419100e5 Mon Sep 17 00:00:00 2001 From: Venkata Krishna Rohit Sakala <rohitsakala@gmail.com> Date: Thu, 21 Sep 2023 15:15:32 -0700 Subject: [PATCH] make forward-port rancher-eks 102.1.4+up1.2.2 --- ...ncher-eks-operator-crd-102.1.4+up1.2.2.tgz | Bin 0 -> 1210 bytes .../rancher-eks-operator-102.1.4+up1.2.2.tgz | Bin 0 -> 2036 bytes .../102.1.4+up1.2.2/Chart.yaml | 12 + .../102.1.4+up1.2.2/templates/crds.yaml | 226 ++++++++++++++++++ .../102.1.4+up1.2.2/Chart.yaml | 20 ++ .../102.1.4+up1.2.2/templates/NOTES.txt | 4 + .../102.1.4+up1.2.2/templates/_helpers.tpl | 25 ++ .../templates/clusterrole.yaml | 15 ++ .../templates/clusterrolebinding.yaml | 13 + .../102.1.4+up1.2.2/templates/deployment.yaml | 61 +++++ .../templates/serviceaccount.yaml | 5 + .../102.1.4+up1.2.2/values.yaml | 22 ++ index.yaml | 40 ++++ release.yaml | 2 + 14 files changed, 445 insertions(+) create mode 100644 assets/rancher-eks-operator-crd/rancher-eks-operator-crd-102.1.4+up1.2.2.tgz create mode 100644 assets/rancher-eks-operator/rancher-eks-operator-102.1.4+up1.2.2.tgz create mode 100644 charts/rancher-eks-operator-crd/102.1.4+up1.2.2/Chart.yaml create mode 100644 charts/rancher-eks-operator-crd/102.1.4+up1.2.2/templates/crds.yaml create mode 100644 charts/rancher-eks-operator/102.1.4+up1.2.2/Chart.yaml create mode 100644 charts/rancher-eks-operator/102.1.4+up1.2.2/templates/NOTES.txt create mode 100644 charts/rancher-eks-operator/102.1.4+up1.2.2/templates/_helpers.tpl create mode 100644 charts/rancher-eks-operator/102.1.4+up1.2.2/templates/clusterrole.yaml create mode 100644 charts/rancher-eks-operator/102.1.4+up1.2.2/templates/clusterrolebinding.yaml create mode 100644 charts/rancher-eks-operator/102.1.4+up1.2.2/templates/deployment.yaml create mode 100644 charts/rancher-eks-operator/102.1.4+up1.2.2/templates/serviceaccount.yaml create mode 100644 charts/rancher-eks-operator/102.1.4+up1.2.2/values.yaml diff --git a/assets/rancher-eks-operator-crd/rancher-eks-operator-crd-102.1.4+up1.2.2.tgz b/assets/rancher-eks-operator-crd/rancher-eks-operator-crd-102.1.4+up1.2.2.tgz new file mode 100644 index 0000000000000000000000000000000000000000..1398866740486c979ca1f68bc35e49197e8cd05e GIT binary patch literal 1210 zcmV;r1V#HFiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PI;`QzJJF=XpPc=U&@{O$bLPZ#UuEVXmb&7kclCS8UvPZCA3x z<vRWDo&6IC$u0!4<bXjh43<|vNh|$Ub_k4|B6V=a9qW+5Tk1$k4o6cU-(5ha4|bI} zj^p=(LGd?^<MqGs`=j`vH#m;t_~>MCbbJu^j!#bd2O{1Xc?${bfezxGvDSloAp*u& z4_;Zr!$=4T9<)un61>;gRrXLKd3C8U8H%b_YPU^QlAsxicb)>itKDKCLv|o>D9XhS zFW6&NyV>$kXl25;TCGFMl;_U%uAi@zN$eHZ?k3a-jGf$p>nJuVJ_4t{BC)b&DCYeL zoV)(F*X?)vQGzT<IbSS&{4^GSR*#EOU~jW8$TpC~Q@m706*-OW!JJ<s#QkosJNPNM z5^G=Yzp?*4W=?}gK9rR3PDF5b|M!juy}?@lpS(Yb-}-+avRd@u6n^t)^8dIy`-Su7 znfIcZGRd&9#-j{9B;X<Ek2N|GVv0KJ^7N3Z=Q_@6B^N_6Lv)c4Wq;s|r4H<oq&1f+ z<u1<nrh_APD06!$+2D%pE6UPHg;)Ce@zZ!z+8Y)23YF7=K-Yj3TAo_+=QoBr#Xec; zlu3gI+I%(=!Vxmk9RD&iW3SAw3U$ImaS56+5`v|5I27kg@=GEis;)1PI#mkhy%I`J zF@w?tA*@65;q%$oqw%ff95ioMua@4HvP{#B)bGm$GWc%Ih%iCp73eWaLchLC2oto1 ziN>MGnSDd;7kPB-Nttv_nJ9J|7J1}tn#Bo^#%HIb=17mUJF!+Hm^H1+oF$LRrqR2e znq~Y67i|VO3lk)R9(mcBEgIK0O_fP67H+d7gis!{n&o=|?}XgaT_A$Rn$Fk+f6IIR zA-*=(d?^XCB232Wdre(#8SahS%6LqRp{NE)@oWz;DEnic)>h$zaT?xWE~yJG0MvI; zDJp{$&uSX5%`lW<4@P3%0#A#iVS>7$2!((oDZZbeKi^ZZTYI#HPY;UCPX0#e8)6Ga zPA{q<ai=`q*RQ###-i97Mr@a!Y9!ek+PsP59}RdHRc!HQGx)X#&dQY814{n=_+s@F z_j!&|Os4gtPMc7K{{&<|cGjO&Jl5DXEs^qaa=(D|m2w%cWV2x~Dy4Dc_<?cNjZIZp zVPep~l3@I+t-ioWr`7R!N0d9fz2`I221w3L`Cwg#(YZ~MjR%N^JU#jV;YiKF;|D2` zYieSL)1nI#t>hCM9v95}0uE|~Y0C#yF76}vqmi^IuUy+qGNTNn{Nllf%O8|qMw%<x zFw5+a<fc!=bBn*8{<kImJvd!MTn!5L-~(@aO?L@O2f{y)8PZnYeToJNJSOLjL-ON| zXJ8=3<o8>r#Iw^Uhxod3vwB;ecdZCv&|g`amDk55@3)yPHwA8&I$j!sz8I=oE9DD& ziW=+gSe~2bb45OYJ})b|y<)5FnvKQcN0?;AHhW7sXRfS-$?`ONowtgP#lQdU?Kjsq Yd6PGJljk7+2LJ&7|7gpVhX5u30IuFpi~s-t literal 0 HcmV?d00001 diff --git a/assets/rancher-eks-operator/rancher-eks-operator-102.1.4+up1.2.2.tgz b/assets/rancher-eks-operator/rancher-eks-operator-102.1.4+up1.2.2.tgz new file mode 100644 index 0000000000000000000000000000000000000000..b04fc986962b8fbdaca7eaef00a7fa5f1707ed37 GIT binary patch literal 2036 zcmV<Q2MhQgiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PH$#Z`;Vx`OIH2knzAzuOUUriX0G4fz%0l#ogJ4on9Lpf?%~A ziCe9>yq%>SRj2=6?2@8Lnznqt)NWDD7g5XEdE?G2saeVs)IQG1R~c$%l<uD;Oq*cE z7V^c{fG`Zh@o40J!!T_B4n`;8i^1qs7=|aOqmz>t;o#M9ICuf!SK+<~axzT62!AuL zwsQX^z|vG1W`s&9@&Gt9OsZMHnK2Rrq53R0$`>gaCS?R&$HnJ5ezRbPC!GX1Y9pos z<7#&&S|Z{Y(+GM-=h*8+ndcMqm#9goG=k$lzJWn741>@Q;ScumwY@y<+?uilQpPw& zP%QeiB7=)gWJM83k>+1I?`EhM!jNBKy}S`=tZt|qTdSprk^I?GM}TwUGADzYt8^-6 z6yTg{*vmmDk*(Dmx(|cXVCYmI2KQ*LQ6eMstp&QDU*|UBD#HjCEM+rXU}`*;i66K8 zmqU+bS@m}i41=K;BXKP<<CfmSw<s6DZ6txI(%=kX(M39g_upMZX$bNXWhG0D$tddg zXTl`;B;abXRlDC1_8vV*<(eZ!p8sHKl|={PFc<`*-{)DO%yawYQ$c6^Uox2^eYFIz zC;o@0gJC=VkH&}i|0FPzYQkh0`i(?;1yBUXcQ|FaG*>tiWb`V6UeEJzP8a1lvAANv zX5}W0nId77#q4x8i)7d=f@R@jp7qj8t-chbozL$6rfPT1;#k<Y!sG{Sqegu8mLixk zN$4FN!MTbNB%7e5BG#xF7?GHzE^-|m!4*z-A;#trouWaqkuFx8`Z=NYXSs;6pQ;#r zLW$gR?0ZK?o?W_jD@sSO-dKv?3o@XlVDEupA~gg?fl<<Gi}3#%f6j$Qg6}GJ;8NE3 zcV3C*vM&7e$+HA6wNP4^)tO{O=WKzc3K(0uF=kS&tU7_0wK1KI9{2n^{omjslguFX z&o4f_zYfe7^IOi?KK~z{wEcg4IvgJS|0&?3${}G(EDxAHYze|uaVlJ%uH3gu_v<wT zMT_vZDgt1$@!r)7fDehFYVR)lQ#1EZwOZJfvtr@QRYh=iMZy0}27X@H<Nu!%lo@IY zO!oLvU|;_?IC<6b|I_hceDMFLfc3in4J^eX0zv~*A<?Wde6z4-;R#0YO@FiTy!G0L z7^fmd=oQ7m=eVd2KI^hP=z+i4I7Bgp;K!nbEXs>*U(s1sRNFEwQZt3#|53m9C;})6 zt3SP+JebC}u05-`_qU>R+r}ff5mEw+V<?p?61%G@T&w4@J-xK`2ux6_n{v69&uy~4 zQF<;FiwU^Or9}ne3C6iBlDSC~VV$DqtXwy;yXm`Hq(;2Z$%i@Gx~Sf<+K$<k?NPbc zF5q;E+(ghjSJx$fyS(-D2zu{-&YA4BEz>Cml?6~CL$ik3b<7P)&waQLuow2k|I#tE zlKA*`a9{m59=GOy!|>Jc)gk^r1<XYnM^KhuS4v`I&Z8%c2P`*<(&C>k1O@ZgR8FcE zXjse)v)x}Ym1%W*cMjcjF42t}ePEgRvsQU#`=I0FPh}&yo#enz$Any?q4L%e^~5dD z&>X*nV=2h}a*fQOy}DtBCl0$syfJC(;&f{`w})q*#b2LipA0kkE!HKkPhUNxKHUE& zB8^2ldqf!6=l`S8xaI%DaD3?ho&+B3?Y9EOpNjL)5e6O}2b9DsoZ6jRx4B0O58!sR z>I^-UPyT`2xJhua<r?);aD2<T%2V^J1J-jtrGFpn@&DS`>G9LxJ^nu$42SLfe{ynq z@c*ZPy8p8*qn)e2s~-IwnZC$a5Aq+%klW1~GbuQu2nHU&wxcM<$L<Z{_il(=EC9^0 z{#LH)T5wJt!1j=qyK5p^kPSk6NC9jGw9uONu0f<+=J8$KPyoL`D$*EJ1FzwB3tT5x z+y<jQvW4u%_yyXuY&*5tl)^P8$9KrqXc+g2S8rWArK=<C5sn&B_Pi^^T4+gdYn;6! z*fr^1ukYNr+4O2GTB7mX;i}Z&7qdGUQ!4Y$APi5dRh_4A>92&kvCdU$m`G7q2g~nH zBn1@jM(k7Cp4EGXCjo3W>vd(6+H01;(Fu01S75V=?nO0hw$r?n<1&}>Qc1yA5&UI( zuFR!ILYE5*z;wB@%2uy$KYY0Se0g>8_m9=BYR*s-p?Z;1XIrOn{XimgCzbPy2aqV= z8Fd`<t~W?^Hb;#|2n&0F$<4xdJHhS|DVQ4tnPePm@nxxGzQ7;cwx}kfrR+xGvCz)J zS0D(~O^Pv0R*pe~aZad#6!6a)6Gn-fB@ra3F{qLC3kffoNh0W@;nnMHBH8E6-$@;0 z?lXrS6!tWd{05$1sL(*Ad{VHupQ1(<U!-ysfzdhc)m|%Q{K5ovO=E?W9vi2zQ}|_z z(j+&|U>vovbS#d29-I+E(IHut$`4MsEnqAfXHsJ99$bPj%}uTml-`>E;`)BWW^>Uu z_RRFHg_WlN4D%M`=(fu~fOFAPH;-u<k$zAyMi7p|uqmnAao)|qYsA~<u4oSMYhX|P zUuJYxWb{Y&0Q>s?!AZOS9}G?p^S>v7##de2(!bR$x6A)KKBViYgq~Zw103K02ROi8 S@UH*>0RR8EG^gtTFaQAR-~*EY literal 0 HcmV?d00001 diff --git a/charts/rancher-eks-operator-crd/102.1.4+up1.2.2/Chart.yaml b/charts/rancher-eks-operator-crd/102.1.4+up1.2.2/Chart.yaml new file mode 100644 index 000000000..424c0551d --- /dev/null +++ b/charts/rancher-eks-operator-crd/102.1.4+up1.2.2/Chart.yaml @@ -0,0 +1,12 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-eks-operator-crd +apiVersion: v2 +appVersion: 1.2.2 +description: EKS Operator CustomResourceDefinitions +name: rancher-eks-operator-crd +version: 102.1.4+up1.2.2 diff --git a/charts/rancher-eks-operator-crd/102.1.4+up1.2.2/templates/crds.yaml b/charts/rancher-eks-operator-crd/102.1.4+up1.2.2/templates/crds.yaml new file mode 100644 index 000000000..f1c453421 --- /dev/null +++ b/charts/rancher-eks-operator-crd/102.1.4+up1.2.2/templates/crds.yaml @@ -0,0 +1,226 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + helm.sh/resource-policy: keep + name: eksclusterconfigs.eks.cattle.io +spec: + group: eks.cattle.io + names: + kind: EKSClusterConfig + plural: eksclusterconfigs + shortNames: + - ekscc + singular: eksclusterconfig + preserveUnknownFields: false + scope: Namespaced + versions: + - name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + amazonCredentialSecret: + nullable: true + type: string + displayName: + nullable: true + type: string + ebsCSIDriver: + nullable: true + type: boolean + imported: + type: boolean + kmsKey: + nullable: true + type: string + kubernetesVersion: + nullable: true + type: string + loggingTypes: + items: + nullable: true + type: string + nullable: true + type: array + nodeGroups: + items: + properties: + desiredSize: + nullable: true + type: integer + diskSize: + nullable: true + type: integer + ec2SshKey: + nullable: true + type: string + gpu: + nullable: true + type: boolean + imageId: + nullable: true + type: string + instanceType: + nullable: true + type: string + labels: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + launchTemplate: + nullable: true + properties: + id: + nullable: true + type: string + name: + nullable: true + type: string + version: + nullable: true + type: integer + type: object + maxSize: + nullable: true + type: integer + minSize: + nullable: true + type: integer + nodeRole: + nullable: true + type: string + nodegroupName: + nullable: true + type: string + requestSpotInstances: + nullable: true + type: boolean + resourceTags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + spotInstanceTypes: + items: + nullable: true + type: string + nullable: true + type: array + subnets: + items: + nullable: true + type: string + nullable: true + type: array + tags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + userData: + nullable: true + type: string + version: + nullable: true + type: string + required: + - nodegroupName + type: object + nullable: true + type: array + privateAccess: + nullable: true + type: boolean + publicAccess: + nullable: true + type: boolean + publicAccessSources: + items: + nullable: true + type: string + nullable: true + type: array + region: + nullable: true + type: string + secretsEncryption: + nullable: true + type: boolean + securityGroups: + items: + nullable: true + type: string + nullable: true + type: array + serviceRole: + nullable: true + type: string + subnets: + items: + nullable: true + type: string + nullable: true + type: array + tags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + type: object + status: + properties: + failureMessage: + nullable: true + type: string + generatedNodeRole: + nullable: true + type: string + managedLaunchTemplateID: + nullable: true + type: string + managedLaunchTemplateVersions: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + networkFieldsSource: + nullable: true + type: string + phase: + nullable: true + type: string + securityGroups: + items: + nullable: true + type: string + nullable: true + type: array + subnets: + items: + nullable: true + type: string + nullable: true + type: array + templateVersionsToDelete: + items: + nullable: true + type: string + nullable: true + type: array + virtualNetwork: + nullable: true + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/charts/rancher-eks-operator/102.1.4+up1.2.2/Chart.yaml b/charts/rancher-eks-operator/102.1.4+up1.2.2/Chart.yaml new file mode 100644 index 000000000..dd0a13148 --- /dev/null +++ b/charts/rancher-eks-operator/102.1.4+up1.2.2/Chart.yaml @@ -0,0 +1,20 @@ +annotations: + catalog.cattle.io/auto-install: rancher-eks-operator-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.20.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: eksclusterconfigs.eks.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.7.2-0 < 2.8.0-0' + catalog.cattle.io/release-name: rancher-eks-operator + catalog.cattle.io/scope: management +apiVersion: v2 +appVersion: 1.2.2 +description: A Helm chart for provisioning EKS clusters +home: https://github.com/rancher/eks-operator +name: rancher-eks-operator +sources: +- https://github.com/rancher/eks-operator +version: 102.1.4+up1.2.2 diff --git a/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/NOTES.txt b/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/NOTES.txt new file mode 100644 index 000000000..23a1b4a8b --- /dev/null +++ b/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/NOTES.txt @@ -0,0 +1,4 @@ +You have deployed the Rancher EKS operator +Version: {{ .Chart.AppVersion }} +Description: This operator provisions EKS clusters +from EKSClusterConfig CRs. diff --git a/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/_helpers.tpl b/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/_helpers.tpl new file mode 100644 index 000000000..de3b332f6 --- /dev/null +++ b/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/_helpers.tpl @@ -0,0 +1,25 @@ +{{/* vim: set filetype=mustache: */}} + +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} + diff --git a/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/clusterrole.yaml b/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/clusterrole.yaml new file mode 100644 index 000000000..d0d561b6e --- /dev/null +++ b/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/clusterrole.yaml @@ -0,0 +1,15 @@ +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: eks-operator + namespace: cattle-system +rules: + - apiGroups: [''] + resources: ['secrets'] + verbs: ['get', 'list', 'create', 'watch'] + - apiGroups: ['eks.cattle.io'] + resources: ['eksclusterconfigs'] + verbs: ['get', 'list', 'update', 'watch'] + - apiGroups: ['eks.cattle.io'] + resources: ['eksclusterconfigs/status'] + verbs: ['update'] diff --git a/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/clusterrolebinding.yaml b/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/clusterrolebinding.yaml new file mode 100644 index 000000000..2b1846353 --- /dev/null +++ b/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/clusterrolebinding.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: eks-operator + namespace: cattle-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: eks-operator +subjects: +- kind: ServiceAccount + name: eks-operator + namespace: cattle-system diff --git a/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/deployment.yaml b/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/deployment.yaml new file mode 100644 index 000000000..f63054b2e --- /dev/null +++ b/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/deployment.yaml @@ -0,0 +1,61 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: eks-config-operator + namespace: cattle-system +spec: + replicas: 1 + selector: + matchLabels: + ke.cattle.io/operator: eks + template: + metadata: + labels: + ke.cattle.io/operator: eks + spec: + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + serviceAccountName: eks-operator + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} + securityContext: + fsGroup: 1007 + runAsUser: 1007 + containers: + - name: eks-operator + image: {{ template "system_default_registry" . }}{{ .Values.eksOperator.image.repository }}:{{ .Values.eksOperator.image.tag }} + imagePullPolicy: IfNotPresent + env: + - name: HTTP_PROXY + value: {{ .Values.httpProxy }} + - name: HTTPS_PROXY + value: {{ .Values.httpsProxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} +{{- if .Values.additionalTrustedCAs }} + # eks-operator mounts the additional CAs in two places: + volumeMounts: + # This directory is owned by the eks-operator user so c_rehash works here. + - mountPath: /etc/rancher/ssl/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + # This directory is root-owned so c_rehash doesn't work here, + # but the cert is here in case update-ca-certificates is called in the future or by the OS. + - mountPath: /etc/pki/trust/anchors/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + volumes: + - name: tls-ca-additional-volume + secret: + defaultMode: 0400 + secretName: tls-ca-additional + {{- end }} diff --git a/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/serviceaccount.yaml b/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/serviceaccount.yaml new file mode 100644 index 000000000..934de07e0 --- /dev/null +++ b/charts/rancher-eks-operator/102.1.4+up1.2.2/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + namespace: cattle-system + name: eks-operator diff --git a/charts/rancher-eks-operator/102.1.4+up1.2.2/values.yaml b/charts/rancher-eks-operator/102.1.4+up1.2.2/values.yaml new file mode 100644 index 000000000..a3d64496c --- /dev/null +++ b/charts/rancher-eks-operator/102.1.4+up1.2.2/values.yaml @@ -0,0 +1,22 @@ +global: + cattle: + systemDefaultRegistry: "" + +eksOperator: + image: + repository: rancher/eks-operator + tag: v1.2.2 + +httpProxy: "" +httpsProxy: "" +noProxy: "" +additionalTrustedCAs: false +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +## PriorityClassName assigned to deployment. +priorityClassName: "" diff --git a/index.yaml b/index.yaml index 88becc332..cd4142b43 100755 --- a/index.yaml +++ b/index.yaml @@ -7790,6 +7790,30 @@ entries: urls: - assets/rancher-eks-operator/rancher-eks-operator-103.0.0+up1.3.0-rc3.tgz version: 103.0.0+up1.3.0-rc3 + - annotations: + catalog.cattle.io/auto-install: rancher-eks-operator-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.20.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: eksclusterconfigs.eks.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.7.2-0 < 2.8.0-0' + catalog.cattle.io/release-name: rancher-eks-operator + catalog.cattle.io/scope: management + apiVersion: v2 + appVersion: 1.2.2 + created: "2023-09-21T15:15:17.096651-07:00" + description: A Helm chart for provisioning EKS clusters + digest: fdb9dc9d66034b3251149a7d4c74092111f956a145a6e892fc7b2cb58f0a413e + home: https://github.com/rancher/eks-operator + name: rancher-eks-operator + sources: + - https://github.com/rancher/eks-operator + urls: + - assets/rancher-eks-operator/rancher-eks-operator-102.1.4+up1.2.2.tgz + version: 102.1.4+up1.2.2 - annotations: catalog.cattle.io/auto-install: rancher-eks-operator-crd=match catalog.cattle.io/certified: rancher @@ -8069,6 +8093,22 @@ entries: urls: - assets/rancher-eks-operator-crd/rancher-eks-operator-crd-103.0.0+up1.3.0-rc3.tgz version: 103.0.0+up1.3.0-rc3 + - annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-eks-operator-crd + apiVersion: v2 + appVersion: 1.2.2 + created: "2023-09-21T15:15:38.116777-07:00" + description: EKS Operator CustomResourceDefinitions + digest: df10203e489165ea909181287952ef6c1f5fe5774e593fa999cb56a9388fd811 + name: rancher-eks-operator-crd + urls: + - assets/rancher-eks-operator-crd/rancher-eks-operator-crd-102.1.4+up1.2.2.tgz + version: 102.1.4+up1.2.2 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true" diff --git a/release.yaml b/release.yaml index d627ee534..23902bc5e 100644 --- a/release.yaml +++ b/release.yaml @@ -38,8 +38,10 @@ rancher-gke-operator-crd: - 103.0.1+up1.2.0-rc2 rancher-eks-operator: - 103.0.0+up1.3.0-rc3 + - 102.1.4+up1.2.2 rancher-eks-operator-crd: - 103.0.0+up1.3.0-rc3 + - 102.1.4+up1.2.2 rancher-gatekeeper: - 103.1.0+up3.13.0 rancher-gatekeeper-crd: