From 137a088dba303dad53098656d48120acc5061b33 Mon Sep 17 00:00:00 2001 From: Michael Bolot Date: Tue, 3 Oct 2023 11:10:53 -0500 Subject: [PATCH] make charts --- .../rancher-webhook-103.0.0+up0.4.0-rc10.tgz | Bin 0 -> 3166 bytes .../103.0.0+up0.4.0-rc10/Chart.yaml | 18 ++++ .../charts/capi/Chart.yaml | 4 + .../charts/capi/templates/service.yaml | 13 +++ .../templates/_helpers.tpl | 22 ++++ .../templates/deployment.yaml | 102 ++++++++++++++++++ .../103.0.0+up0.4.0-rc10/templates/rbac.yaml | 12 +++ .../templates/secret.yaml | 11 ++ .../templates/service.yaml | 13 +++ .../templates/serviceaccount.yaml | 11 ++ .../templates/webhook.yaml | 9 ++ .../103.0.0+up0.4.0-rc10/tests/README.md | 16 +++ .../tests/capi-service_test.yaml | 20 ++++ .../tests/deployment_test.yaml | 94 ++++++++++++++++ .../tests/service_test.yaml | 18 ++++ .../103.0.0+up0.4.0-rc10/values.yaml | 34 ++++++ index.yaml | 10 +- 17 files changed, 402 insertions(+), 5 deletions(-) create mode 100644 assets/rancher-webhook/rancher-webhook-103.0.0+up0.4.0-rc10.tgz create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/Chart.yaml create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/charts/capi/Chart.yaml create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/charts/capi/templates/service.yaml create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/_helpers.tpl create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/deployment.yaml create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/rbac.yaml create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/secret.yaml create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/service.yaml create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/serviceaccount.yaml create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/webhook.yaml create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/README.md create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/capi-service_test.yaml create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/deployment_test.yaml create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/service_test.yaml create mode 100644 charts/rancher-webhook/103.0.0+up0.4.0-rc10/values.yaml diff --git a/assets/rancher-webhook/rancher-webhook-103.0.0+up0.4.0-rc10.tgz b/assets/rancher-webhook/rancher-webhook-103.0.0+up0.4.0-rc10.tgz new file mode 100644 index 0000000000000000000000000000000000000000..aaa7ae510a2252348b72816431a7f3824e6bfddf GIT binary patch literal 3166 zcmV-k459NMiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PH;PZ`-(%{j9%Y;M}1fu9D@%aa!T_0I!?fE6}7t5_IvfSY&Bw zY;#MKsz^EOP4mA$kd$OemhCk5bM`%Wz9go|;gFo)94R3@oM7VK<8UIxm-b*n66MXw zl)c&+_`dJ=x?S_v_x<|cPUraKRi}IEpZO=fle69{ztcTFJ$nWI?nqb-sZ=C+C!X*5|C7cgnqQiw z5AYpO*Z(uZQk1(j0GsrG&p)o~|I^Mv|L+Cpl#DT`sf>&%+I6`HP-GmytR(CJ2E$d# z*p*;3oCok>bSczTf)crMoG}wa!ZO>Un3)T}s_*wWA}LeXIHpo%x(Z+-q`E|PFOn|- zj0ltHI9jjik(s{B+W}&cr~uxcot-((G@MrYXj9}kN1z15#M(Hc;?x8oTM|SVGclhc zS03CT!bGW925n=k5{?R`R^^chWjho+#8}C;3?~?+jPkLIGa72dZAB#bOiA0Zw?m`-XOzJi6nrBN5?rjf~$mzgsS;~5h*Xp6oE)d#~dS2qD-z6 z*L#}%bB@fOWTPb9PiQ!?O-ev25$-3*AxSx>e7vOE?S8)Nc26{>E0T~YDopIgkyK5P zD;gT}VfN7&brMsF$qW zgzQX)bF&SDKE#Qb(Fh};yqMAwtqBe_>sWe-o*tvYrR9Q`mH)c_S2&FsQ7GGY6J#+a z(o^x4reK5q_s>r2`oGufbq@M}AMo(tLWCpA5n5I$-$hm{-zAw^Zh`yw=;)4g1m0)s zAXv4Yd%KP5yciZIl&cZ6{#&+N&q9DqV)3K3pa*%h^uJSHQH{GjMuy0wML^^%u5*acx9F~TvxmrX(B}~odzgqrFre;fTaD)8!I=)|%|Fe^`?m_{G7;?#5gxVi0LT$OksH*F6O z`P@>GY5e%uS{izO+5hq5`Q4y@^5*I^m-Z*M=I-(7vWzFkJM zz+%Fsg#y&!5PXBLsZdyK-V##1#EqEEGHd8{^tuN9W&h&*=Bht9ujBnG5!14S0*olK z=o&}W)~x-Cs7X-hORvbO7JVzqViBc415N#pA3yza{{C)od9%FQ*AEZyhoBr* zURP$UaAcNFusCu>zs585;PLU{p^yMG*juDB;PEk7daTH}LPWEbs?bwTZ?u*W*1ABM z@$^y4Wq~qjhSJUzl6Ym}@6r@atk`fMny=iaV_n6DCCu6{QfYjZh#{8wNl)@~)ieOa zhPPVn2@<9zf3>O)&Fn2hUG<3!Cus5(|9^XXbyI#eB9x^G-cAyf6TzYYdVc9~j0qLd z4Tge8GJw}~)|HGZog+G-lNzr2-& zdtoyoZT*Mxv1?KyrJ)Iu=o4r2it%1Y;p(-nc1NB>VbiehrmnPqm#BWEJi5^f53$@= zVwjrLo8SuntT0tbVlt$RDvGkoY$S@R4K7@s-`@TB;qv|6&H44`4@_T92^Tn<5{M-mSbw@uYbEMlI(|98cCb4BPlhDi%{|bj{9pH^Q_uf(jt}ww zUZ5P)n-kZ{StRr?6GwPo-kO9`5$F$CDitQzf}vK8l#ibf@F#*{=9H3{{+x(3UNe~k zur$}=e%rRWB$`t0$aMGzhRWQG+c7s4HMx=^+n!YvJUn>U_Nv~y%v)Eb%l_kFwfx(7 ze-|2Hll-3?pVsC7)IZ4oUf_H3e=GgBN-ayr$+ba9yfBM9mdE7ss+p`ohm?J}mDN9L z9%BHXV)8Xb=irn)2iD2IQKdUj02}4MSI__VdZ)dE{OC9lpH(=8gu@Vl zPGd}@;6&Miso^{(Qr4$|SyluqcW>R>o}i`v4u_mKc$R8I3bCG z!3RiE4);_|fS7ByJUQn$zyJRGkjRPSwXLa^Z8Ju;Lkjv~f$}(jTa-#;l0e2p&ui*w z?Hq!$IV{i}8M+8#rppA`6k?W+DTfhFqyo3nmiNsoy2n&a(xDfMXHTnX@~d6s#4h5c&u$mcEdS;y6FoO-PjYQf!#_>t# z-M&dTbMEr|o8^B|`@6mLZKkIc4_5XW;viz5-cxx)4RtxTIA@JWN6FC{4 z`L!rl)M8S|OQp(bS!CYj`Nr)h>uj9NsFr-Ptgn2=e8^|DIxgh3+NE^`jf=`iz53Qm zP}EcnxgbmLQ){gb&iSZG3D@-R-dU=o`TriLtO;7bo!UY@*`V!sLpO`fOKs?SCT-qT zE|l5Xa-kOt=eff3ns<=O%alE53u~ojjfc$ZwK6kj;FR3 zuS~N?qNw5QmP_PTok#XE28g6mGg&&CtxqPK;`u`@NsVVX=-Vpo?C=JC5V0-gCkg5v z^+T)Ns0X$8UQLx|xnt?2(^9!*^`+O+gFnPBPQSWe8$`0Hdb8<06xi@C%2pg&Ii@Yh zerC1mih9-k=)~rl{z4sAdF74fke7B|53n^f$A3FZ{TSGk|2aK5tH*zS?{NRK7kEPc zr;_Q}SLFAkY>53##q$z5+qk?hldAcbKwbXJ$-Z5E3vQGA`)Bpe6hN0%w;iXC~ju^Sb z1fZplA=-$o`CEwQ0|pJ{qV-p0pHn_+-mNy}qle= 1.23.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/rancher-version: '>= 2.8.0-0 < 2.9.0-0' + catalog.cattle.io/release-name: rancher-webhook +apiVersion: v2 +appVersion: 0.4.0-rc10 +dependencies: +- condition: capi.enabled + name: capi + repository: "" +description: ValidatingAdmissionWebhook for Rancher types +name: rancher-webhook +version: 103.0.0+up0.4.0-rc10 diff --git a/charts/rancher-webhook/103.0.0+up0.4.0-rc10/charts/capi/Chart.yaml b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/charts/capi/Chart.yaml new file mode 100644 index 000000000..388210bef --- /dev/null +++ b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/charts/capi/Chart.yaml @@ -0,0 +1,4 @@ +apiVersion: v2 +appVersion: 0.0.0 +name: capi +version: 0.0.0 diff --git a/charts/rancher-webhook/103.0.0+up0.4.0-rc10/charts/capi/templates/service.yaml b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/charts/capi/templates/service.yaml new file mode 100644 index 000000000..de7c255c4 --- /dev/null +++ b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/charts/capi/templates/service.yaml @@ -0,0 +1,13 @@ +kind: Service +apiVersion: v1 +metadata: + name: webhook-service + annotations: + need-a-cert.cattle.io/secret-name: rancher-webhook-tls +spec: + ports: + - name: https + port: 443 + targetPort: {{ .Values.port | default 8777 }} + selector: + app: rancher-webhook diff --git a/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/_helpers.tpl b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/_helpers.tpl new file mode 100644 index 000000000..c37a65c6f --- /dev/null +++ b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/_helpers.tpl @@ -0,0 +1,22 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{- define "rancher-webhook.labels" -}} +app: rancher-webhook +{{- end }} + +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} \ No newline at end of file diff --git a/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/deployment.yaml b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/deployment.yaml new file mode 100644 index 000000000..a0cc77c2d --- /dev/null +++ b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/deployment.yaml @@ -0,0 +1,102 @@ +{{- $auth := .Values.auth | default dict }} +apiVersion: apps/v1 +kind: Deployment +metadata: + name: rancher-webhook +spec: + selector: + matchLabels: + app: rancher-webhook + template: + metadata: + labels: + app: rancher-webhook + spec: + {{- if or .Values.capi.enabled $auth.clientCA }} + volumes: + {{- end }} + {{- if .Values.capi.enabled }} + - name: tls + secret: + secretName: rancher-webhook-tls + {{- end }} + {{- if $auth.clientCA }} + - name: client-ca + secret: + secretName: client-ca + {{- end }} + {{- if .Values.global.hostNetwork }} + hostNetwork: true + {{- end }} + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} + {{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} + {{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 6 }} + {{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 6 }} + {{- end }} + containers: + - env: + - name: STAMP + value: "{{.Values.stamp}}" + - name: ENABLE_CAPI + value: "{{.Values.capi.enabled}}" + - name: ENABLE_MCM + value: "{{.Values.mcm.enabled}}" + - name: CATTLE_PORT + value: {{.Values.port | default 9443 | quote}} + - name: CATTLE_CAPI_PORT + value: {{.Values.capi.port | default 8777 | quote}} + - name: NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + {{- if $auth.allowedCNs }} + - name: ALLOWED_CNS + value: '{{ join "," $auth.allowedCNs }}' + {{- end }} + image: '{{ template "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }}' + name: rancher-webhook + imagePullPolicy: "{{ .Values.image.imagePullPolicy }}" + ports: + - name: https + containerPort: {{ .Values.port | default 9443 }} + - name: capi-https + containerPort: {{ .Values.capi.port | default 8777}} + startupProbe: + httpGet: + path: "/healthz" + port: "https" + scheme: "HTTPS" + failureThreshold: 60 + periodSeconds: 5 + livenessProbe: + httpGet: + path: "/healthz" + port: "https" + scheme: "HTTPS" + periodSeconds: 5 + {{- if or .Values.capi.enabled $auth.clientCA }} + volumeMounts: + {{- end }} + {{- if .Values.capi.enabled }} + - name: tls + mountPath: /tmp/k8s-webhook-server/serving-certs + readOnly: true + {{- end }} + {{- if $auth.clientCA }} + - name: client-ca + mountPath: /tmp/k8s-webhook-server/client-ca + readOnly: true + {{- end }} + {{- if .Values.capNetBindService }} + securityContext: + capabilities: + add: + - NET_BIND_SERVICE + {{- end }} + serviceAccountName: rancher-webhook + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} diff --git a/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/rbac.yaml b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/rbac.yaml new file mode 100644 index 000000000..f4364995c --- /dev/null +++ b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/rbac.yaml @@ -0,0 +1,12 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: rancher-webhook +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: cluster-admin +subjects: +- kind: ServiceAccount + name: rancher-webhook + namespace: {{.Release.Namespace}} \ No newline at end of file diff --git a/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/secret.yaml b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/secret.yaml new file mode 100644 index 000000000..9fd331dc1 --- /dev/null +++ b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/secret.yaml @@ -0,0 +1,11 @@ +{{- $auth := .Values.auth | default dict }} +{{- if $auth.clientCA }} +apiVersion: v1 +data: + ca.crt: {{ $auth.clientCA }} +kind: Secret +metadata: + name: client-ca + namespace: cattle-system +type: Opaque +{{- end }} diff --git a/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/service.yaml b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/service.yaml new file mode 100644 index 000000000..220afebea --- /dev/null +++ b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/service.yaml @@ -0,0 +1,13 @@ +kind: Service +apiVersion: v1 +metadata: + name: rancher-webhook + namespace: cattle-system +spec: + ports: + - port: 443 + targetPort: {{ .Values.port | default 9443 }} + protocol: TCP + name: https + selector: + app: rancher-webhook diff --git a/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/serviceaccount.yaml b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/serviceaccount.yaml new file mode 100644 index 000000000..9e7ad7e1f --- /dev/null +++ b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/serviceaccount.yaml @@ -0,0 +1,11 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: rancher-webhook +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: rancher-webhook-sudo + annotations: + cattle.io/description: "SA which can be impersonated to bypass rancher-webhook validation" \ No newline at end of file diff --git a/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/webhook.yaml b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/webhook.yaml new file mode 100644 index 000000000..53a0687b6 --- /dev/null +++ b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/templates/webhook.yaml @@ -0,0 +1,9 @@ +apiVersion: admissionregistration.k8s.io/v1 +kind: ValidatingWebhookConfiguration +metadata: + name: rancher.cattle.io +--- +apiVersion: admissionregistration.k8s.io/v1 +kind: MutatingWebhookConfiguration +metadata: + name: rancher.cattle.io diff --git a/charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/README.md b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/README.md new file mode 100644 index 000000000..6d3059a00 --- /dev/null +++ b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/README.md @@ -0,0 +1,16 @@ + +## local dev testing instructions + +Option 1: Full chart CI run with a live cluster + +```bash +./scripts/charts/ci +``` + +Option 2: Test runs against the chart only + +```bash +# install the helm plugin first - helm plugin install https://github.com/helm-unittest/helm-unittest.git +bash dev-scripts/helm-unittest.sh +``` + diff --git a/charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/capi-service_test.yaml b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/capi-service_test.yaml new file mode 100644 index 000000000..4ee94a84a --- /dev/null +++ b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/capi-service_test.yaml @@ -0,0 +1,20 @@ +suite: Test Service +templates: + - charts/capi/templates/service.yaml +tests: + - it: should set webhook default port values + set: + capi.enabled: true + asserts: + - equal: + path: spec.ports[0].targetPort + value: 8777 + + - it: should set updated target port + set: + capi.port: 2319 + capi.enabled: true + asserts: + - equal: + path: spec.ports[0].targetPort + value: 2319 diff --git a/charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/deployment_test.yaml b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/deployment_test.yaml new file mode 100644 index 000000000..5f153461c --- /dev/null +++ b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/deployment_test.yaml @@ -0,0 +1,94 @@ +suite: Test Deployment +templates: + - deployment.yaml + +tests: + - it: should set webhook default port values + asserts: + - equal: + path: spec.template.spec.containers[0].ports[0].containerPort + value: 9443 + - equal: + path: spec.template.spec.containers[0].ports[1].containerPort + value: 8777 + - contains: + path: spec.template.spec.containers[0].env + content: + name: CATTLE_PORT + value: "9443" + - contains: + path: spec.template.spec.containers[0].env + content: + name: CATTLE_CAPI_PORT + value: "8777" + + - it: should set updated webhook port + set: + port: 2319 + asserts: + - equal: + path: spec.template.spec.containers[0].ports[0].containerPort + value: 2319 + - contains: + path: spec.template.spec.containers[0].env + content: + name: CATTLE_PORT + value: "2319" + + - it: should set updated capi port + set: + capi.port: 2319 + asserts: + - equal: + path: spec.template.spec.containers[0].ports[1].containerPort + value: 2319 + - contains: + path: spec.template.spec.containers[0].env + content: + name: CATTLE_CAPI_PORT + value: "2319" + + - it: should not set capabilities by default. + asserts: + - isNull: + path: spec.template.spec.containers[0].securityContext + + - it: should set net capabilities when capNetBindService is true. + set: + capNetBindService: true + asserts: + - contains: + path: spec.template.spec.containers[0].securityContext.capabilities.add + content: NET_BIND_SERVICE + + - it: should not set volumes or volumeMounts by default + asserts: + - isNull: + path: spec.template.spec.volumes + - isNull: + path: spec.template.spec.volumeMounts + + - it: should set CA fields when CA options are set + set: + auth.clientCA: base64-encoded-cert + auth.allowedCNs: + - kube-apiserver + - joe + asserts: + - contains: + path: spec.template.spec.volumes + content: + name: client-ca + secret: + secretName: client-ca + - contains: + path: spec.template.spec.containers[0].volumeMounts + content: + name: client-ca + mountPath: /tmp/k8s-webhook-server/client-ca + readOnly: true + - contains: + path: spec.template.spec.containers[0].env + content: + name: ALLOWED_CNS + value: kube-apiserver,joe diff --git a/charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/service_test.yaml b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/service_test.yaml new file mode 100644 index 000000000..03172ad03 --- /dev/null +++ b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/tests/service_test.yaml @@ -0,0 +1,18 @@ +suite: Test Service +templates: + - service.yaml + +tests: + - it: should set webhook default port values + asserts: + - equal: + path: spec.ports[0].targetPort + value: 9443 + + - it: should set updated target port + set: + port: 2319 + asserts: + - equal: + path: spec.ports[0].targetPort + value: 2319 diff --git a/charts/rancher-webhook/103.0.0+up0.4.0-rc10/values.yaml b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/values.yaml new file mode 100644 index 000000000..2978803ae --- /dev/null +++ b/charts/rancher-webhook/103.0.0+up0.4.0-rc10/values.yaml @@ -0,0 +1,34 @@ +image: + repository: rancher/rancher-webhook + tag: v0.4.0-rc10 + imagePullPolicy: IfNotPresent + +global: + cattle: + systemDefaultRegistry: "" + hostNetwork: false + +capi: + enabled: false + port: 8777 + +mcm: + enabled: true + +# tolerations for the webhook deployment. See https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/ for more info +tolerations: [] +nodeSelector: {} + +## PriorityClassName assigned to deployment. +priorityClassName: "" + +# port assigns which port to use when running rancher-webhook +port: 9443 + +# Parameters for authenticating the kube-apiserver. +auth: + # CA for authenticating kube-apiserver client certs. If empty, client connections will not be authenticated. + # Must be base64-encoded. + clientCA: "" + # Allowlist of CNs for kube-apiserver client certs. If empty, any cert signed by the CA provided in clientCA will be accepted. + allowedCNs: [] diff --git a/index.yaml b/index.yaml index a9689acbd..7f5a19a0b 100755 --- a/index.yaml +++ b/index.yaml @@ -16144,18 +16144,18 @@ entries: catalog.cattle.io/rancher-version: '>= 2.8.0-0 < 2.9.0-0' catalog.cattle.io/release-name: rancher-webhook apiVersion: v2 - appVersion: 0.4.0-rc9 - created: "2023-09-26T10:32:25.944066-04:00" + appVersion: 0.4.0-rc10 + created: "2023-10-03T11:10:38.834206702-05:00" dependencies: - condition: capi.enabled name: capi repository: "" description: ValidatingAdmissionWebhook for Rancher types - digest: 3fd5f39baee30c7737c8b55540ba2440f613169522cbbe8145cc1f0716d2d329 + digest: 8de0041c6c01685f7ad41148daca3d6da658e1e72686eaebf22d8f34d1d5dcf3 name: rancher-webhook urls: - - assets/rancher-webhook/rancher-webhook-103.0.0+up0.4.0-rc9.tgz - version: 103.0.0+up0.4.0-rc9 + - assets/rancher-webhook/rancher-webhook-103.0.0+up0.4.0-rc10.tgz + version: 103.0.0+up0.4.0-rc10 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true"