From 1decda731ffbcfad955d9cf3a9e1142ae6064e1c Mon Sep 17 00:00:00 2001 From: Venkata Krishna Rohit Sakala Date: Fri, 2 Jun 2023 21:02:05 -0700 Subject: [PATCH] make charts --- ...ncher-eks-operator-crd-102.1.1+up1.2.0.tgz | Bin 0 -> 1198 bytes .../rancher-eks-operator-102.1.1+up1.2.0.tgz | Bin 0 -> 2037 bytes .../102.1.1+up1.2.0/Chart.yaml | 12 + .../102.1.1+up1.2.0/templates/crds.yaml | 223 ++++++++++++++++++ .../102.1.1+up1.2.0/Chart.yaml | 20 ++ .../102.1.1+up1.2.0/templates/NOTES.txt | 4 + .../102.1.1+up1.2.0/templates/_helpers.tpl | 25 ++ .../templates/clusterrole.yaml | 15 ++ .../templates/clusterrolebinding.yaml | 13 + .../102.1.1+up1.2.0/templates/deployment.yaml | 61 +++++ .../templates/serviceaccount.yaml | 5 + .../102.1.1+up1.2.0/values.yaml | 22 ++ index.yaml | 40 ++++ 13 files changed, 440 insertions(+) create mode 100644 assets/rancher-eks-operator-crd/rancher-eks-operator-crd-102.1.1+up1.2.0.tgz create mode 100644 assets/rancher-eks-operator/rancher-eks-operator-102.1.1+up1.2.0.tgz create mode 100644 charts/rancher-eks-operator-crd/102.1.1+up1.2.0/Chart.yaml create mode 100644 charts/rancher-eks-operator-crd/102.1.1+up1.2.0/templates/crds.yaml create mode 100644 charts/rancher-eks-operator/102.1.1+up1.2.0/Chart.yaml create mode 100644 charts/rancher-eks-operator/102.1.1+up1.2.0/templates/NOTES.txt create mode 100644 charts/rancher-eks-operator/102.1.1+up1.2.0/templates/_helpers.tpl create mode 100644 charts/rancher-eks-operator/102.1.1+up1.2.0/templates/clusterrole.yaml create mode 100644 charts/rancher-eks-operator/102.1.1+up1.2.0/templates/clusterrolebinding.yaml create mode 100644 charts/rancher-eks-operator/102.1.1+up1.2.0/templates/deployment.yaml create mode 100644 charts/rancher-eks-operator/102.1.1+up1.2.0/templates/serviceaccount.yaml create mode 100644 charts/rancher-eks-operator/102.1.1+up1.2.0/values.yaml diff --git a/assets/rancher-eks-operator-crd/rancher-eks-operator-crd-102.1.1+up1.2.0.tgz b/assets/rancher-eks-operator-crd/rancher-eks-operator-crd-102.1.1+up1.2.0.tgz new file mode 100644 index 0000000000000000000000000000000000000000..21e5762f6a65c8e874b253f850469dcbcc8af85d GIT binary patch literal 1198 zcmV;f1X24RiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PI;`Q{y%e=h>e^bFXcJlW<%oZ#Qu5FtqgMLV4fFi=#%CRP8E| z>-4*K{3j3+8v-#oVAz*TBzb?ktKFYhvIiq4=sP&2j&>o|Qb9WAz-rH8< zIF1hw4vOD6j#q!1ZIt0W%ng|R+kEsp{R1DcG*NF37Vn!z&_xI+9d`uBnJ|Qq8#kd zoEWp(#g>LbD-*73XC3-XF?DWM{d}cNVy~!nwMUIW*vSpJ@nS9GBXH^hJt=F3V%Cqq zxtqVeZoeBx36k{6aWVAebR_<)9v4S}*k<35Z156~@lqL8#58&Ub9RFe_q)Ar@2B8O ztX=JYWBoH`P6H$DOP|nIL~wuo_dfOy2P^ge>C=1t??#rB9-P8!Mw9=e?(`SRi)Yr0 zrphG4#vG3_WJrJ^=Z_US5n_Tm>(XT3SI>2v)k@BXVv6V@A$3(1ei?B(1}tI9rfk5(!aNeSy@eLNM!UaYJZ)|Rpe)2-C6%LOv{Zq1R$1Pv?DBa|L_b(Ih%XboeH zLyB?lH$Z448p0}x1WzKrWWL;Oul`2gX(ngQcyDUoV&Vk5ov^;71svz#YjIdZ${e;GNBA!@%+(;%O4b9LO)Zop_kbr$W5<^m*#&x z{clSAJ21M2xEdyifdg%Nn|29G2akUs5u~l|eToJ>FeYb>P4d%~XJ8=3BM6nM)&Kyg1F?#I2%Z@$Y{-`!xD4@A5A1@}}kg00030 M|8@Dc zVQyr3R8em|NM&qo0PH$#Z`;Vx`OIH2knzAzuOUUrvKyq%>SRj2=6?2@8LnznpC*KSeG7g5XEdE?G2saeVs)IQG0R~c$%lgaCS?R&$HnJ5emiG|C!GX1Y9l5B z<7#&&S|Z{Y(+GM-=h*8+ndM{j7pO_7G=jrFzJ)@Q;Scum)LtHTZcW)7DPtTX zC>DKMlEHZ=vZ4s2Nb|3qcQe#;VaTtrUf+l`RyWj*t<^%rNd9!8BfuGPnUg`yRXPz< z3UEd>?8Tsy$j0go-G{+xFm$R9gEx0;u2CW*^sNQDpI_%T;wr-k<}77XoMUP{mWdxX z{1-!yWm)xi5DbIRi;=h%nQ=?+;9Hb);5L%LL}_q_u;?P4!iVp!p)>?}iL#O<#$*)r z`%__(d>n8!->BVh2z!qnq;k!XBF}#?waTJ{a2O1N!SC~|Q0Arm^0}Zh{x6u!k)A98 z?1=y2>0sE7|D)4={C^ghN;PJ(4E;u;y#gqL<9nR2T$(GK3Nm^bL9gd|IHQa5oLF2j zXVY?%#!Qhg%3^jpn?*8g8o{FQG0%GGrB+`H(#~hMe^a%+W^pWRTw(H~woxNKdq)vW zm?ZQL4&YqH2$GFaQW0xZ42(!jQx~}o4&VwW+Yn>(h)&TU*+>^FPW_xv`_o*+*iTiA zKA}WzIrhDS1J5p9yA`D)SgkF^?*$o96R`KdFp(MpqrfO>wMF=UjX&o?Bf)nSJ8&uM zJN@6_Jd?~I z_0KOpez*?ISMyuW*e?Gc9<}}d`%?yKhbJ#SI&xsGglSC*%bxJNl<2} zDKOdNOMzYe-{9!D<^QKA!{fdGKL@N<{cm6)<`EDYm^HH49HLf^Yikwdbu? zKEyZ?DMGI(4!*=ib?`-(*k=;$-)gm?Gg-$-q(AGuuj@5R|u56FW zy>-nqIi`P=1>&uWgx5F{mtn3K^O;)V5=8PJ{BIZ@AC30$|2beL(l~;${JK&S8*?5#W;|fINt71Qg{Hj zqg7|HYs{qJj3O9#0Gp1Y7$3Vgh~K**Zm|F` z!}?pfs%ya+c>tS3TJEliXhAjz?H~oP5zsbwdIC0;x!2Obxt&+bwXN zTyYzW`o!k48{-#f)3WWl0BTccszC0@OC?Ub&LutPX%MA`GM5Nn|&!L4!j zmSESUd$qcA<9gkzv1p0LbBC)^gI~?|U`(jYJA*JhtyXoOzN5bq>c%=(sbL~TT^%gH zJCPJnyc@AkX>(TZ8J+~NUawY_QEIPQ0!JsK2#?rAk_IYqd2t|ivRVqI?;kJOWXq-ujv3qa{!X!7jMo@ZV{)_AT4V%qG z-`F$Lw-#2K{xi&5kfYl!`vA^GPu)DGWkmWx#TY?23d5$PZpV2y1FsQpU%H~%!>@rI z^?#YsS&`8n*#qqA{|86y{(mqG_w&DJfyP%|o6^74Ew{`6J3gfAsDxfxyFKh-4|~|d TUGT2}00960sV({@05AXmDlYh3 literal 0 HcmV?d00001 diff --git a/charts/rancher-eks-operator-crd/102.1.1+up1.2.0/Chart.yaml b/charts/rancher-eks-operator-crd/102.1.1+up1.2.0/Chart.yaml new file mode 100644 index 000000000..bc325e6e3 --- /dev/null +++ b/charts/rancher-eks-operator-crd/102.1.1+up1.2.0/Chart.yaml @@ -0,0 +1,12 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-eks-operator-crd +apiVersion: v2 +appVersion: 1.2.0 +description: EKS Operator CustomResourceDefinitions +name: rancher-eks-operator-crd +version: 102.1.1+up1.2.0 diff --git a/charts/rancher-eks-operator-crd/102.1.1+up1.2.0/templates/crds.yaml b/charts/rancher-eks-operator-crd/102.1.1+up1.2.0/templates/crds.yaml new file mode 100644 index 000000000..0e5c5804e --- /dev/null +++ b/charts/rancher-eks-operator-crd/102.1.1+up1.2.0/templates/crds.yaml @@ -0,0 +1,223 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + helm.sh/resource-policy: keep + name: eksclusterconfigs.eks.cattle.io +spec: + group: eks.cattle.io + names: + kind: EKSClusterConfig + plural: eksclusterconfigs + shortNames: + - ekscc + singular: eksclusterconfig + preserveUnknownFields: false + scope: Namespaced + versions: + - name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + amazonCredentialSecret: + nullable: true + type: string + displayName: + nullable: true + type: string + imported: + type: boolean + kmsKey: + nullable: true + type: string + kubernetesVersion: + nullable: true + type: string + loggingTypes: + items: + nullable: true + type: string + nullable: true + type: array + nodeGroups: + items: + properties: + desiredSize: + nullable: true + type: integer + diskSize: + nullable: true + type: integer + ec2SshKey: + nullable: true + type: string + gpu: + nullable: true + type: boolean + imageId: + nullable: true + type: string + instanceType: + nullable: true + type: string + labels: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + launchTemplate: + nullable: true + properties: + id: + nullable: true + type: string + name: + nullable: true + type: string + version: + nullable: true + type: integer + type: object + maxSize: + nullable: true + type: integer + minSize: + nullable: true + type: integer + nodeRole: + nullable: true + type: string + nodegroupName: + nullable: true + type: string + requestSpotInstances: + nullable: true + type: boolean + resourceTags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + spotInstanceTypes: + items: + nullable: true + type: string + nullable: true + type: array + subnets: + items: + nullable: true + type: string + nullable: true + type: array + tags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + userData: + nullable: true + type: string + version: + nullable: true + type: string + required: + - nodegroupName + type: object + nullable: true + type: array + privateAccess: + nullable: true + type: boolean + publicAccess: + nullable: true + type: boolean + publicAccessSources: + items: + nullable: true + type: string + nullable: true + type: array + region: + nullable: true + type: string + secretsEncryption: + nullable: true + type: boolean + securityGroups: + items: + nullable: true + type: string + nullable: true + type: array + serviceRole: + nullable: true + type: string + subnets: + items: + nullable: true + type: string + nullable: true + type: array + tags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + type: object + status: + properties: + failureMessage: + nullable: true + type: string + generatedNodeRole: + nullable: true + type: string + managedLaunchTemplateID: + nullable: true + type: string + managedLaunchTemplateVersions: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + networkFieldsSource: + nullable: true + type: string + phase: + nullable: true + type: string + securityGroups: + items: + nullable: true + type: string + nullable: true + type: array + subnets: + items: + nullable: true + type: string + nullable: true + type: array + templateVersionsToDelete: + items: + nullable: true + type: string + nullable: true + type: array + virtualNetwork: + nullable: true + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/charts/rancher-eks-operator/102.1.1+up1.2.0/Chart.yaml b/charts/rancher-eks-operator/102.1.1+up1.2.0/Chart.yaml new file mode 100644 index 000000000..248450009 --- /dev/null +++ b/charts/rancher-eks-operator/102.1.1+up1.2.0/Chart.yaml @@ -0,0 +1,20 @@ +annotations: + catalog.cattle.io/auto-install: rancher-eks-operator-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.20.0-0 < 1.27.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: eksclusterconfigs.eks.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.7.2-0 < 2.8.0-0' + catalog.cattle.io/release-name: rancher-eks-operator + catalog.cattle.io/scope: management +apiVersion: v2 +appVersion: 1.2.0 +description: A Helm chart for provisioning EKS clusters +home: https://github.com/rancher/eks-operator +name: rancher-eks-operator +sources: +- https://github.com/rancher/eks-operator +version: 102.1.1+up1.2.0 diff --git a/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/NOTES.txt b/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/NOTES.txt new file mode 100644 index 000000000..23a1b4a8b --- /dev/null +++ b/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/NOTES.txt @@ -0,0 +1,4 @@ +You have deployed the Rancher EKS operator +Version: {{ .Chart.AppVersion }} +Description: This operator provisions EKS clusters +from EKSClusterConfig CRs. diff --git a/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/_helpers.tpl b/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/_helpers.tpl new file mode 100644 index 000000000..de3b332f6 --- /dev/null +++ b/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/_helpers.tpl @@ -0,0 +1,25 @@ +{{/* vim: set filetype=mustache: */}} + +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} + diff --git a/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/clusterrole.yaml b/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/clusterrole.yaml new file mode 100644 index 000000000..d0d561b6e --- /dev/null +++ b/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/clusterrole.yaml @@ -0,0 +1,15 @@ +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: eks-operator + namespace: cattle-system +rules: + - apiGroups: [''] + resources: ['secrets'] + verbs: ['get', 'list', 'create', 'watch'] + - apiGroups: ['eks.cattle.io'] + resources: ['eksclusterconfigs'] + verbs: ['get', 'list', 'update', 'watch'] + - apiGroups: ['eks.cattle.io'] + resources: ['eksclusterconfigs/status'] + verbs: ['update'] diff --git a/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/clusterrolebinding.yaml b/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/clusterrolebinding.yaml new file mode 100644 index 000000000..2b1846353 --- /dev/null +++ b/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/clusterrolebinding.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: eks-operator + namespace: cattle-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: eks-operator +subjects: +- kind: ServiceAccount + name: eks-operator + namespace: cattle-system diff --git a/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/deployment.yaml b/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/deployment.yaml new file mode 100644 index 000000000..f63054b2e --- /dev/null +++ b/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/deployment.yaml @@ -0,0 +1,61 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: eks-config-operator + namespace: cattle-system +spec: + replicas: 1 + selector: + matchLabels: + ke.cattle.io/operator: eks + template: + metadata: + labels: + ke.cattle.io/operator: eks + spec: + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + serviceAccountName: eks-operator + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} + securityContext: + fsGroup: 1007 + runAsUser: 1007 + containers: + - name: eks-operator + image: {{ template "system_default_registry" . }}{{ .Values.eksOperator.image.repository }}:{{ .Values.eksOperator.image.tag }} + imagePullPolicy: IfNotPresent + env: + - name: HTTP_PROXY + value: {{ .Values.httpProxy }} + - name: HTTPS_PROXY + value: {{ .Values.httpsProxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} +{{- if .Values.additionalTrustedCAs }} + # eks-operator mounts the additional CAs in two places: + volumeMounts: + # This directory is owned by the eks-operator user so c_rehash works here. + - mountPath: /etc/rancher/ssl/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + # This directory is root-owned so c_rehash doesn't work here, + # but the cert is here in case update-ca-certificates is called in the future or by the OS. + - mountPath: /etc/pki/trust/anchors/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + volumes: + - name: tls-ca-additional-volume + secret: + defaultMode: 0400 + secretName: tls-ca-additional + {{- end }} diff --git a/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/serviceaccount.yaml b/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/serviceaccount.yaml new file mode 100644 index 000000000..934de07e0 --- /dev/null +++ b/charts/rancher-eks-operator/102.1.1+up1.2.0/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + namespace: cattle-system + name: eks-operator diff --git a/charts/rancher-eks-operator/102.1.1+up1.2.0/values.yaml b/charts/rancher-eks-operator/102.1.1+up1.2.0/values.yaml new file mode 100644 index 000000000..6ca083b09 --- /dev/null +++ b/charts/rancher-eks-operator/102.1.1+up1.2.0/values.yaml @@ -0,0 +1,22 @@ +global: + cattle: + systemDefaultRegistry: "" + +eksOperator: + image: + repository: rancher/eks-operator + tag: v1.2.0 + +httpProxy: "" +httpsProxy: "" +noProxy: "" +additionalTrustedCAs: false +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +## PriorityClassName assigned to deployment. +priorityClassName: "" diff --git a/index.yaml b/index.yaml index 61808b118..3e591969e 100755 --- a/index.yaml +++ b/index.yaml @@ -6115,6 +6115,30 @@ entries: - assets/rancher-csp-adapter/rancher-csp-adapter-1.0.0.tgz version: 1.0.0 rancher-eks-operator: + - annotations: + catalog.cattle.io/auto-install: rancher-eks-operator-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.20.0-0 < 1.27.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: eksclusterconfigs.eks.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.7.2-0 < 2.8.0-0' + catalog.cattle.io/release-name: rancher-eks-operator + catalog.cattle.io/scope: management + apiVersion: v2 + appVersion: 1.2.0 + created: "2023-06-02T21:01:14.025204-07:00" + description: A Helm chart for provisioning EKS clusters + digest: 4f99f24059f3edd583e83155edd614b7a3f4ad5852d73bd1b294315748731cfd + home: https://github.com/rancher/eks-operator + name: rancher-eks-operator + sources: + - https://github.com/rancher/eks-operator + urls: + - assets/rancher-eks-operator/rancher-eks-operator-102.1.1+up1.2.0.tgz + version: 102.1.1+up1.2.0 - annotations: catalog.cattle.io/auto-install: rancher-eks-operator-crd=match catalog.cattle.io/certified: rancher @@ -6306,6 +6330,22 @@ entries: - assets/rancher-eks-operator/rancher-eks-operator-100.0.0+up1.1.1.tgz version: 100.0.0+up1.1.1 rancher-eks-operator-crd: + - annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-eks-operator-crd + apiVersion: v2 + appVersion: 1.2.0 + created: "2023-06-02T21:01:24.433911-07:00" + description: EKS Operator CustomResourceDefinitions + digest: fd42e29f6eefa3b68b29f87298a558223708b458269924ce03b4f00dd5e7ef90 + name: rancher-eks-operator-crd + urls: + - assets/rancher-eks-operator-crd/rancher-eks-operator-crd-102.1.1+up1.2.0.tgz + version: 102.1.1+up1.2.0 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true"