From 96e94fc11f8d21eae47852895db55c6dc60ce040 Mon Sep 17 00:00:00 2001 From: Steven Crespo Date: Mon, 30 Oct 2023 12:04:52 -0700 Subject: [PATCH] Make remove rancher-backup v4.0.0-rc2 --- ...rancher-backup-crd-103.0.0+up4.0.0-rc2.tgz | Bin 1778 -> 0 bytes .../rancher-backup-103.0.0+up4.0.0-rc2.tgz | Bin 11560 -> 0 bytes .../103.0.0+up4.0.0-rc2/Chart.yaml | 11 - .../103.0.0+up4.0.0-rc2/README.md | 3 - .../103.0.0+up4.0.0-rc2/templates/backup.yaml | 141 ------------ .../templates/resourceset.yaml | 118 ---------- .../templates/restore.yaml | 122 ---------- .../103.0.0+up4.0.0-rc2/Chart.yaml | 26 --- .../103.0.0+up4.0.0-rc2/README.md | 79 ------- .../103.0.0+up4.0.0-rc2/app-readme.md | 33 --- .../default-resourceset-contents/aks.yaml | 25 -- .../default-resourceset-contents/eks.yaml | 17 -- .../elemental.yaml | 49 ---- .../default-resourceset-contents/fleet.yaml | 53 ----- .../default-resourceset-contents/gke.yaml | 17 -- .../provisioningv2.yaml | 23 -- .../rancher-operator.yaml | 28 --- .../default-resourceset-contents/rancher.yaml | 65 ------ .../templates/_helpers.tpl | 87 ------- .../templates/clusterrolebinding.yaml | 14 -- .../templates/deployment.yaml | 79 ------- .../templates/hardened.yaml | 124 ---------- .../103.0.0+up4.0.0-rc2/templates/psp.yaml | 31 --- .../103.0.0+up4.0.0-rc2/templates/pvc.yaml | 27 --- .../templates/rancher-resourceset.yaml | 13 -- .../templates/s3-secret.yaml | 31 --- .../templates/serviceaccount.yaml | 11 - .../templates/validate-install-crd.yaml | 16 -- .../templates/validate-psp-install.yaml | 7 - .../tests/deployment_test.yaml | 216 ------------------ .../103.0.0+up4.0.0-rc2/tests/pvc_test.yaml | 102 --------- .../tests/s3-secret_test.yaml | 141 ------------ .../103.0.0+up4.0.0-rc2/values.yaml | 81 ------- index.yaml | 45 ---- 34 files changed, 1835 deletions(-) delete mode 100644 assets/rancher-backup-crd/rancher-backup-crd-103.0.0+up4.0.0-rc2.tgz delete mode 100644 assets/rancher-backup/rancher-backup-103.0.0+up4.0.0-rc2.tgz delete mode 100644 charts/rancher-backup-crd/103.0.0+up4.0.0-rc2/Chart.yaml delete mode 100644 charts/rancher-backup-crd/103.0.0+up4.0.0-rc2/README.md delete mode 100644 charts/rancher-backup-crd/103.0.0+up4.0.0-rc2/templates/backup.yaml delete mode 100644 charts/rancher-backup-crd/103.0.0+up4.0.0-rc2/templates/resourceset.yaml delete mode 100644 charts/rancher-backup-crd/103.0.0+up4.0.0-rc2/templates/restore.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/Chart.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/README.md delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/app-readme.md delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/aks.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/eks.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/elemental.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/fleet.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/gke.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/provisioningv2.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/rancher-operator.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/rancher.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/_helpers.tpl delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/clusterrolebinding.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/deployment.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/hardened.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/psp.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/pvc.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/rancher-resourceset.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/s3-secret.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/serviceaccount.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/validate-install-crd.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/validate-psp-install.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/tests/deployment_test.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/tests/pvc_test.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/tests/s3-secret_test.yaml delete mode 100644 charts/rancher-backup/103.0.0+up4.0.0-rc2/values.yaml diff --git a/assets/rancher-backup-crd/rancher-backup-crd-103.0.0+up4.0.0-rc2.tgz b/assets/rancher-backup-crd/rancher-backup-crd-103.0.0+up4.0.0-rc2.tgz deleted file mode 100644 index 9cab6f689cfabaa9fb1deaee3a402736fae8b3db..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1778 zcmVDc zVQyr3R8em|NM&qo0PI`cZ`(K$&$IsuBKOeyfK@rp$H72x%{l3zxZa_#vwc}CP?{Rc zY$#GoQbCNx{_hKlvMtNhhaK6Q0Gd7&p{U;shclevXe==&3y}R8CXY$nCo*_HUSO%c zC63rxJLLPme|>qG{_p#K@qhp7a(Fhlyc*p27dOM<@XQ}vUJr+7$Zv^%B_&E@dFH>E zS8;J~gfQnqV@(BDqaH#8Ys^IG5v(->kBavMq^5HU!3brx;+(diK>&P&&b3V7+&P8g z2vm#-jF27dOHd+_1XN!wm4?Xqngj+|LEpT-mLX@aJsi_-AQcsSgq|*XIF8qUUV6Ug z_a(XL1)zweu}+6SbEPq33h4!)@#IdSxsU~DuUE=YFJl-X9LJ23RCT?l6~lo)G%Wv- z#2eOs_7+!?!~ZozF~b_v`%DurJqoJ*f8Y=O>w^E^_?`cshVssXV+zk2xcN(YkN;H0 z{hkKBN6Lc{8YfDNXp*_?9n2}Gsqsgkaey^8=ZEzfYd6YU`}fA3dnyKEW`dd$8` z$~DNbU`fO?rhW873H}x9#Rz#yW1T2ZX(4e4Uqt5fC?&h#!k|4Ml$Ml-rFd4-hh+>~ zP`QCdFmuYlytyrpabMlfX{{D52D09-Dd_(fAt#$>jR03x;SmX`ZXRd^O5-Trg1rs5 zR~ujrrE4XE+g(#X|LdF5U9JekvQ2aqR>;TeMwGLd@c@s5f%RIrXcWX;(Q8c&cGC{d8c z+*#g2+YwR&x2jFJ-jy+;oJL7BLW2@ia~Oo_fsrR;8$rVA7Cn}NujksN0!Si_oLlEr zp5Pfru?rcYy9`@MHA3$`Ml|3wTsZ))4fMtM)G!`*S4N{Gek9_oZ^RGo67f!-m z$!nm?JtIXQx<+e3>wyi;67pDPzI!l2)e2e>kq{Vb#H`B2Ps7({-X~xVJctE#`QGt( zjc-rEZ7x^<@)VpXSLWP+hcDCVBQ^IKI$xGEwumz!7+_v9OG4=M)wYGV6U6KX5M6Sp zI37y)HK7uMZTb4enA2+jW^;w6v3Qe(?R|_@sA7|-?4nW)k@I}2JG~fI`axo@=qjBm z+s#IMS-X>l-%qhg$d1n|OWlskL;_ajF3=7Sm-V&HLp!atJr0#F+{h`glz3Tqwz{aa z>1W17ryR#>A@qYo>xUzAcwQslI%3)3$YQ2IK0)vw;2=v9sLE9Ih1pkCVwXe_mX1Jk zD5TSpb_T6Ja@g4t^CQV@T`5?Jm$@4H?f2JRVtdt8S^rzB9A5N2pr-zReSKA^|6TZl z%j>TGcM3X6{V!)XZ59EGC8$*;Fwf4O7VC0g?ooYBu)S&!5nM~b7|03CK>{bmq|TWI zR%L*>jdFzS+OS_4^4(#%4b;+G=gXiaq~Bhgc~({I+!V3emZ>ynssMH8N}DSW1Co}0 zUa#T6Ghs;p|D`-|?nUWcr%|F>lcqKl-Ia^3C0`vW=5jfK5T4`qmGt=bw3CW_EPXIM z16E?)4e{%)$`RINasM1kP|AG^w^XqMP1sm^go@HkqvdRPdvL7dm0If;;}xZP%YUw{x5@Sjk$bGKR8Q6AgjJGo ztkY)A;Ef%@@&u77&*M$0=a6ixti-&@k7|>%U5Nf}y7so}9Ci19EhN0O0jTEwf8!6Y ziv2$qSKa;pBy_C%zpdQSWjaCfz0pFW|(*FZxq zB-~5syo^g)oka|F?y(C>*MMtld9QB{c{q5cV?!72zi$~q>KL-~##ovDp zuDjoVorL~^Ce{M7f&&^)?s~o3^(a|jsgYh_ZBoa=uO<@(0h%q*_iZcs?sX?eM;&$4 U(QBta0ssL2|Dt)=)Br*N00`V@8UO$Q diff --git a/assets/rancher-backup/rancher-backup-103.0.0+up4.0.0-rc2.tgz b/assets/rancher-backup/rancher-backup-103.0.0+up4.0.0-rc2.tgz deleted file mode 100644 index 4306edab2b8a193454fbcd02a5d3d7aaad389125..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 11560 zcmV+@E!WZ?iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYKbKAIklWlE|o!dzu z5|S8E1Vezb<+!Wn`~1uKB~M}DPHM3oC4I-Ju8u_l2L}f@E5HK>TG|LXN*`)t*WRp+ zphF8YI5Ge6bVXHFb!Tgf|EsEM{NIvVRR2-j+Ai*@rQLG5_z$(XrEZu00n{hNA+xxI zLgydqqx*^v?r&0{Wnl`bfh|(W0iZz&O*|}UkWv#B47>?liWS2m6q;rQM3;-AIr={* zkZPmUrW$gnF))zsw@a<28^ku@OtIhuRX|JB1be&(lG-Lqs7nLeV6(8738A8kT#T`qoCy#Gpj+ zYi-;ZmX2@Iv9}#OHFQLj;nb-Bzx$v@!GDJ6=Cqg!#G8l+6-tG-k_e^3yKEXb$V8AJ zN$}{DrZylNwowI4paq9$f-IU^i_Taj&2$MxjzTduQ>(d#qTz{+Eo9N9dUtI?9Rw%A zSWAUsp_qfV(es{6OF3xU{?Dy~T2K{7E9G=VG{>+he|#<}4`AOg4LSo91J*HcZ2&Eu z%>~5{0(6A@bqHoU?5Xx3M&PT3drX(UPji`!pVBbzQkjxux&9WiT$ z7=$8=DpPE_6GS!{fWras-)IOJ#G8~2;7t~|F-%iVEP&v=R|7W&9f1jUEqV^=2y9NF zvuPTAxwJ?w1Ttlw#Y`LyfQ|-+#kyjv0}fHmgoFrM{T_bwhu?zF69#!DpVla!-vBow zLmL6zAgoIQ^qB=Gh6cEK#uTN{^a7e|NesX%wuW@E)L#R(z(q%vYnmIt!imlRv5^K0 zB47crJhc(Vgsr_0w4i6?6aaWNv`fs+s9v_&2%x1yM+eyQ;2a#+H~7;1|G}A!tTu(( z__bWSEi^!mZ-k^ww}veZ*_3QbY||$Fg~o=U6gkKohzzX42pde#47=b4TAUD)psDm^ z%uW!c?9VVbIa2`k@f2+cu*@LyU{dG|5d{#~(4mIrn$Q8~y$v8u=?H(zx?&VLAph|B zN&r8z%o$+*2{bIw4q?KKL({}J%oa567@p@n@_*(Mv~S|!W=So+-Bfosi=|DkrIMtn z;<8Csg7%w?uErgzfYO1H%e??qT?Zx}0uxP<2?iz{63 z`H}p|h;z%x?M#saY&JGM00lJDV21n)QOy?(zcWF=$oa?r{hhU8w&)*~-(AQ2qw>3r z9r_3BLc@~@1O(a8;WFGb2xauw@dO$cVQgX80P4DfI7#UUQXw2HOu1NPGsSz(S@>LF zP%P~-eNs?2-)EgI3pXNiKfWe0EdGnrsobKVui~&=K~Wpb1|qDkQXoVoG51;E;Ipj z95`d-@#_mkPQvDc?HE%=Do3uVur0C7tWikDTp|yQq3a;U#=0WGBWKfgO;h3BE3zZS z>u56sO{-)V_kto_W#y)-2UI$+If!ut)+bbu1Mnw z+35qj2Dn=_l@%S7cjm z{|^R8W6nSmw`KqAv1f=^K)(LXg=RiZnp8B1R0@%aCTKE6P7P0N=pc~)y;vx2DQX@R zYS0$pGXs&raS($l92ivo$>H=7g@vfN3!)R z8-|74B?8oOEsfWwV5bbU5p)RXBMmZRgy0DZ>o;yra{rD1HhR;T7}T3!gMe4kXWehM zSzT_;+DLm{NY1v9t1TJeV<V z!Im_G7U3ys2}DQ8oD|4NL|iN2`*&bin(69UgDZ&cvub%faU#1YfRGFngRc4kXZ8-- zc5Jo#@z(F(Q<~g^Z!V@NMua335p>s;{!9RBiQs*qEsU#FB6?Qdl4OjJRY^re#FVos z7Od?;`bhXD67%yTb@JH{d9}!le7z zrrHlFnfAZ5oE&VTzG3NxHGJ@{zykYU-6@x%_J2v;Ek4Kp*HXrYrB^^rOm+*KXirRb zWOvo+L#+T^I>L@|$L-a^_^r@!#oPo@s6z^wf4`!R08&ATfC(22>FrEk3*Q6Fu$XrZ zwipEB_P-*H^4(G~ly*dRFM(5$w)%z>ZxBD;Zd`zLOmgoO^YZNlV>;HrIpIX+I{ zEW^@IAeL;TvDThtEgCW!x?Pyi297e0}LFj*pQ>{m>LZhZiN;wv~YvtitW=rZv7l}wb1NFvZ4 z)J%!NGuBw#Fwv(Uwf0A&1RNUnV?y&Q4j}Mh%Xyp=h-8Eg;l|q*f{hmN*I$*yYYK;n z{=$*}@8A6hlD7$vB)!~x2*H8QkW}JPQNAx1uBCvyqVT8rxLXlw#&_@%&G^$uGw(IB zrj<}#LE_r`YOC|PSv{?{&#Se%|K5)t&XIQ!5iv;91QFy!hx_$LwR_U}+%A9KtJaRY z=bzi1vsU$>{`usrR_z>~HB)iO;;V=+Tu9;-qe03F$G5XIJl}UZ=bz78XCJQ8X|hcF z_G17v&z5K{w?Q8;?sVOpHCyNPR{OBssW)r&&-G??@1(w;#48^Hsz{)DznXBkPnrB9 z;dSUA^QeG){GdlZ)QLdIo+|PPKrRfHBv*E#CM&__dXKlOnb4S2LKOhe*rP@A+>cFU zE;%5d#`aG`5L0962^|`nw=g&vi;M~WNDW`;zm3^U0lNIGjn~-QiVbORZ*w+c5qN#3 zYy3n%kuBd08br1=7Lg&m!IDaaaD_}F{A@G&Z(B0`zY%nFWFh?t&VnxR|8}=Z#rXd3 z_U_iR|F@13_PF}YKM7o}Biw(4ucg=wnnK{JPS>0sGX1R-*Cg+42#qiv=PSU*gnHkx zY=~d3J#?UslGPO*nTR6A=2l<60{BDXY8pa1(l;io;^_sFKOfTg+IQpXlWw=@v*j%!s(6I(5eX$4TnMbTGXf}9E{s;VlVJBTp_ z^(=!pd)eykg}yGUP(ANxA{@eC(`&WE#1r$DYWMa%eXD|M!38p-VBhNTU(q z4jv=xUwL`D@2~uyIYm*T-x7HOFcwOFmW9j9!Z=Om?jR)N=1)WFzdI2f*A(uM;%^ub z#yj~xmlOIAz0|o`G>h|VtbAxr$nrGIffJ*Y^-}ah*vUD z3=dX5=3Rnft@+{)LPo34wG_60{q@L&=WTvHuRp&2f~~D(Hmv4tfUQoxU}ujliHyCy z$IQ-hqL{6x6}Tn5^aQatr^P;^&|7ThSZ_-n5z6v;twoGy+cBnwiH6~Cy+)YOCZadk z8Al%;p4Xxe&JXv42Z3!XgpF&W3i$2RCA1YXh=1eTG$+hJjMU?Gs@9CZcWql7{)eU% zgsC8Z6HlQv42!dgVF@=tlnK18fSv8_@^%h@0TFEVMBp3*^)t(yv4J%V6A42wAW0;| zrhwnX9?WlZ}%D_+>1uH-&$A!~VadndGk-##5p18UR2;2N8dm{E=9W zotYgB|Ip&qdR6N)4e&syh4Yn{}so8K~Y5?^>fn@j$EOSb%%Cn%nvkA?DI z-A>4V^*R2(ma^b9c9!(_jllCXUS3J+$2VZtdqN9p8Y1Kr>w$b~A*f$E21RF<#wEHR z;}GI6vDF$*iy-5o4*KRI5^Rsl{cABKV%(wl_a96LN4|&;p1(rh_(}fA``4nUw9E#< z5%`QM9EWgU>EEKHoL7k+wU2&V&!C3hF9q{?_x5L(O!@D<2<0Mss6JS9{(pNXCjU!C zRo#7-|LZ7`SZT^9SiYcd$(L=Ewi6OxEeb(2r(uga*ff#D(`PXG7=*L^Ui0#xZ$1(d zu7G@S0$rXS5?$qGU-@_pPkuEk)A;56FUq{wfIP0pEnD!?hIF(6UVa9Ze}V$HS_=mz z?t?tfPPFO8Btpxdf0WO#*?c3;mU68q^ubFH1fl|TNZ*taAF%%HNe`7w{*Ru}eN-O{ z_`g(Ex8mnNcAoQpt*2z4_{=o<#5v8CY`oONo$E35L{`c(8-8<9j!?(2hWirhgds=D zz~^X2l++AkyheJ`FE)&fHeh}_un{c%oaQVt>S}BVK}BGY zpxyvG{wF3LCGfI;LOG;lCX(qUP3lDPWe20 zoI%32xuf)|{m3!;eWZ>sNF^tiX*jnW8)~9L>Vim3KqsnXHG8~bYQAqqck(L@j`gtodf_P)c1;uph6 z>HKdcl`{FCt0_p4x9zWJ&O^_FFW&##O8Eb!=lox5DK8|u3@LbJA`84SF=l2&e%`^U zJjjO*`Q$;K{rCDcP`T6aLU_aj>{>eWu60ABp%;X?$l_%_J>sw_a{uRL0>+h^hQbsN zZO_C@vaJXkM6+L2&kv>WB%zwd0E{3xMl-LkR}{Co;{gh2nwGUBbrRW6dpuI$pI!1(d zHiA=;E-V2CRL>9nIJ7VJytLNm?Q;SQDdS&)^q%KJ>^C0!lhiU6D(}|Y3|F(zAdMa%ZbeD9~nFS`O3?Z zJT&OY?H4pW*<5fJ#p_U>ZJ8U|J2b^n&=G}(Nea1~!b&dp;>8PafGB7o8-qh@fOB8I zeCb0n;u$14G@dBdV+=uw%=>&otz4VwO9n2|*`c(Tc>0TIXPzmQyj3gO{bou9#mc(C z3Mk@OwYcDkyVmo%o7>f#ZW05n$%v&m(9LA;0GlSh;pQKgohCOwh2bdcvd1=b-~>_R z5HD?G3<)s@Y{k(LG8{kTDQ>H&sk_PrL<@w+q%Q2!K*J6sX4Gu^0T!R4o+w1uI3~EVMau?^7GaqQf3- z;&I>tsJV`VEb1qSC9Z8_hY|*W(e~7^4$lNe!ugSXrtWCmgXY{jRiYad1;C|>K>)O5 z)^=!$47&x;9vgP(N)@JDv7;kLChPQXU;)e;VF0}Wb%LJxu7>PByzFi;7^4~40AIvG zpJO!p!Uy|BY;N-3e8~CyyzzRUBL;u3HgXMGppUo|^qH~{@7UivX^B6)F3Mm}+^6%Z z72Y9emp8a2BQ_M+6F!5l<6t9O9N}4$P-E5oosB(a_Q+p11|4yu$8Yt@o5nTJ;Qn@(1d9rn_DpABstU`8 z3E`U&vSe1>v}F)!$-~STmMn0H-XlFcozXB~i^f^Dc2Ot0BefX(w zo^UiCOx`K9sG)>?O;8Q}qL`b>vw*$zM5byVYPS2#os87%n#();Ye|C1Z;@^L4Z9jkiv7RzF{v#xMB>ba6oATVg(sYvMP+IgS z93dJwc)}_Yzoq9G@s6Z>#!Q8_z6cgBT#l#zhFdFD0*(~&$UxPvr2Mb7MXAwqjk*9gpfkJi6Bn^bZ+1$@lVEe{H%@uS(Dun#bT zmd+LcYr%SVZGMkyh{(QZ<gRic_ZEmnh}37aBs-;=ZU#QL&#hqB9}@4ygviq zT;$9=-ywuS_54s?a<~C(sEv6S-Uej=A?!&}==52Qfnkd4E(n|=0u1U~PM&Y4XC136 zB#9*#ai}d7w}A%SVpyPERzlGl%#&P*S_BZ68C8Ve>KP8oZ16t~E0pxo`>3)2_Qe^& zz`Eby1{uRfi(ioxAH@dfyUfBt4tEeCPk$@jK+gok-c5Y-{8?e#A*hYySOsLylM7v- zB)lRxj}U^khZNWj;xj8zy0OAv67Z-p)BN5PZ-5d11Z%>a18F+x$VQfqEX`nx2+{+NjjhbM9qS51W$s@Mx6a4MJT#9LFL%a8d| zcZnPqVJ>T^znBruxXB>CY?M~^#}Eh9gSL$G5TOD4XWlo+uOcwG1d*R@>DbfS^9F?*K;3HdQL~{^vO}YWzypfCEoj1}q zZ@??;aHa(V2a%D#9bvFX3Bq`4;q?Y*HgOgO-P%Z#g2YA+Q|3&R7?vU~MDqL;Zk70| zl*^_snSS&a?+WKH+)@4li~&;xBS-{UYzIvZ>=JY4SEP=Mz7%r*^I!kXD3bdFym`~a z6jk25$^8KiBb&qWR;3Ld`}IJ{NVm8a7ZLyo!J5J2032CXmwCy7TuIK7VSxdhGLjAe z1Wc-$NCpc8_{zL77yP-5Auld-_6Rv+7Es94N=}oUdyW;qE}8lKQv(7BzJz_pFW?oL zGM*G2OrYiRu%KolXfeaWAM0zjqztJ%Oyup;zZV;A-XSCaLEpiQ%L!#lE)=2m@a5{1 z(|F)IJjBXj2w~3yG5(drH`p12S6`w|<(G}v5Hg78I`>)K2&$&0k-t!(dd;*C%whYwn; zqLhUu>} zu=N=620b8~ue}SKrGw$0=*XOpf#)vB&ExO{`9c3+=KU%1cXs@%LW7u>g>FFlC`F)) zhXW%O+VaYGQuvXPikSbu#K(_tOjbMxw($IKF_!sgkR>v-x&DW z9O7REr)Hg0I9`h2Zr>qJ;4$}1ToSp^6?y`@?4Ex>m-5!W2lt!`KbB_n;WSV5{<9h3 ze`#4={-dXs|LX46ZbJT-pX0x4DKVx;KU6xWOChv`ohC$Q-JjuzT>LCrOrc0aV^WrV=u z{-40id(w#zn?(HH*^nYCrywc99*h!?qrmb#Lfep(N%Xkd@=vMceb$n}YCiQtOF>Y7 zU?N17`%mKE$F482qVGQ?78w8DI+RKYco&-1Z*2$hNQO`KF`8uzQqbDJOD?$JKYwU> z59O(D@G(yvS6mhF;L&HSZXQZ|d7rw@|0V-{BKg0%{^tm+_bjwpgv{Df;CN_4cLh%?`tMPHb$$X1BxT-S5wM|R|#tpOX z2$>Ukok;*k@JOaK$dCsq65-Lx`mt1%q9Ccl(ybHj#!aBTDi%LTX{`%^WvsF|tK5GY z8uTmfKV|33Fld&gB(V7ro_CBJUfzqY<{3zF2AUS3X^%3kBe{f+*&BaAeb>@W6v-kP z>m`oIj|)dH!G=#fYgs5tY4JGxlKuZ|J@#B4R#vzFhGVpb_-{#lw*S^qo?hCs^)W}X zM_#Wf!aN+KpR~8fdj2_~pJ>mS^S?U(hd*SSmX;9(i}wGwwqy7Il(u%ap5wo3DNoP; z;q?(V`kXORCQut0mdA`4Z)1a=0h7niw z%~R*sBam%EOUxTT=JxX5dlCDoJH`|_GMRYr*q^AE_n$`4nIbj}LG)y_S&<%rcU9bj zywP+y8D21oiHBKcu`+qOpxZB0R+s-?3s1Q$)&L9TfBgRc(st?j{MUL)Tm*SvGOgJ{ zi!Z8-4X1cDf5YhsH?=bRcxa^Thnjgw!mY)wUD)jt7!rxKxMUD=PPlrBS^n7!x#sd< z`M*L8V1fMKDsRXA|8jZvIse;Q%9HK?$hhJCCtJDyq$&5GT!I|-&z#^P|NiqSw~T_` zIp~)$EY`gxG*@5rF{Xq%(DqH^PktsgVk=OGHbu_;r_c{YgW3o!DF#>D7Fs~Lr8Hma z03Nw>lzFCj?K?(~p->84*1P58k0IGixtAwt_!psy9MsV1D=w?=tZjoToz7uNa{tM8 z@K>Z!j+jVsC?Kv%{p6T}EI@O|Vmk(Q3_8BMa_7iCq9Amc@5c^q_`rfN$*p@gwp6Qt#0Nj=)#)^Pfr@s z!dzYbJjKs8w|=>j$p20#v;RGx{WE*;*c$-n+yBLKsTjZiZ+A<5zW-w_g}4Sq70^M1 zf_;D5bN)R5m7EevEy7nqP65%&A#)1wZVS&T;PVKXHgZUT+GdW5OOO>{(2DmRE0mZpXjkyOq&dvn4UX`AdCJ0s;@Gj zC@LwF(07Nx#6uHJkr^Hpe^cSt%B(U1i5ppQ5YQPC*+RyQDj=^Y9ElXPMb6SRwE3H# zjW$Ojm3Q&&3?OT2IN0Lp45rXAc)GMG7vo#DjJ!k!#nNs;EvSWJrCcn%U1>o*a9qfm z#)jovN8&EG_npr9=kwOthpVXBG#Be1i%$C&!l!wbfsBWQy7_jas0M%TmI}ok{-aph zD86IA-in_)8wE1eHVWRJtsnkcer<__5)-V8yi*qDbyr()09g23)(YcS+WIBdV>ZEK zxF+cqWN*&k#$+b%waJ%-$=kt22ec0~Qo3;Aqdb7HBQr}OIA~X<14&+f> zAd<UdR=A4hWu#S@x^}|Woqb=HUOTC_+bQjgJFkaBS-*N(ueO!*Ui=jFF2>jgos>R8 z-g%ZyA4cM5$HM2*1R&o+P``8xiq5Rm zpg1w^)csS5jV6EF9H(7x^!UtKwMdo5tO3JdU|T~1=LhiBobkITB>JSD4{+x z_W{F^sI{$!aHlEzm)U0gQ)A0lL^KvBe=3@{dHWP2iUG|U-qS7;jzBmtDSq&)hL;{# z1f}qhBEbHwBdzs?k=D=zJ*_~Q*ZqSRVM%$EG^QU>1w8b?=LHkuCsp0=jv4kvY$iwk*wp=n-a zT}$K>EBTij6e|KLzJo3PTycTL=G~qulNu?Om(p@kN)~myK(? zS-1E4>d|(mTfb?k&5qX9JMGKEyH=yoxEMFfy>6pow}dUTO5TGcJC+_%Ld=>f>Uk z*RoJ|yW8#bKEQFK)9D@U={I)$x@gvWW~0@rxAw00_uyrH>!#Dt&tRR6+T81QMthyEd2}&uT5a~b+uN&st#0X7uY6IuQrqUna=UqUpsJlx%WjvoyY>OO(~C{>tZRO_7~jl#cURk&``5R~+8Z@X zho#eUw{)UzPfo4zaof7SZ0`5Ip%1p%YV7Uw8%Hzkt7-S^_9g6H7n_adw@b6}RX=$5 z^>Wgv!CsS`sJHw5dShQ7H(=MinjYUZ)lQ?=xo(r<_5PK5abaI--O>Jqd41OJZr`4k z>t)!xQakk`Z1?PzR&MSbtBqUOEw**lK0EF8jxRdbJ3WW%N4@Y+Q>)zJom>R9_*7ixU zd)HTsMbzyb_upU7wDG&EcIn#f?ssqcsr5TcROu*b#1k#7e#%$YmJV( zlf!MT(d@LU_VLA6bJDFh=*eC4T5H&+rw6U$s}i|w6-VWEx3$;pHfsI5W>YUUyBC+O z+O@iU*>2R;R`=TK_PX26_uZ|_59X;psh3VWM^>k3&uWvctqaR+T$Gxw)@yv#iw*0t z+q&$2-TQViZr$nXyX%XLw*9Z88tV4;uS(mu-OCWx;r_O5x+ z*?WIcY~HqR>^KkZHR~o@>-ARgsC8XzQTWw}r9<<-vZvVqkS?~5vYF`^pXWTn#-Z4J8DW2ACw_SQyyHd@sz5Qk#9bA+< z2l`>Z)2y}X+ml{zRDxF3XSKJL{|Z<}|$ zS+ho4XN~b4GPPpMYnF$R+v!!=KI$Bdwvq9!4Bxl*yJlm2QF>>#i~5J_al`1( z-rneHuZ_N5-!;dhaj$W7*SxXcYnSFh^YWTr9@sl=)jZQWdtXoAw`SMsErn+DSTBxl z+E!P+wwecLb!~Rt9c}eX_Sx~Besoc6xb5+9TRUhSwt9B=qD#+CO153I4yS0MZney7 zsu#yoy|ZWO^=k`V_Aai9*O&bdd*50UwS1*spS8!@)>Y~HN>?xLw0h&F_jS}eJ7{99 zbA5msd+$5r-t@9@ZE5D|@l~}$kbkp^^OioA= 1.23.0-0 < 1.28.0-0' - catalog.cattle.io/namespace: cattle-resources-system - catalog.cattle.io/os: linux - catalog.cattle.io/permits-os: linux,windows - catalog.cattle.io/provides-gvr: resources.cattle.io.resourceset/v1 - catalog.cattle.io/rancher-version: '>= 2.8.0-0 < 2.9.0-0' - catalog.cattle.io/release-name: rancher-backup - catalog.cattle.io/scope: management - catalog.cattle.io/type: cluster-tool - catalog.cattle.io/ui-component: rancher-backup - catalog.cattle.io/upstream-version: 2.1.1 -apiVersion: v2 -appVersion: 4.0.0-rc2 -description: Provides ability to back up and restore the Rancher application running - on any Kubernetes cluster -icon: https://charts.rancher.io/assets/logos/backup-restore.svg -keywords: -- applications -- infrastructure -kubeVersion: '>= 1.23.0-0' -name: rancher-backup -version: 103.0.0+up4.0.0-rc2 diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/README.md b/charts/rancher-backup/103.0.0+up4.0.0-rc2/README.md deleted file mode 100644 index 59bff4425..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/README.md +++ /dev/null @@ -1,79 +0,0 @@ -# Rancher Backup - -This chart provides ability to back up and restore the Rancher application running on any Kubernetes cluster. - -Refer [this](https://github.com/rancher/backup-restore-operator) repository for implementation details. - ------ - -### Get Repo Info -```bash -helm repo add rancher-chart https://charts.rancher.io -helm repo update -``` - ------ - -### Install Chart -```bash -helm install rancher-backup-crd rancher-chart/rancher-backup-crd -n cattle-resources-system --create-namespace -helm install rancher-backup rancher-chart/rancher-backup -n cattle-resources-system -``` - ------ - -### Configuration -The following table lists the configurable parameters of the rancher-backup chart and their default values: - -| Parameter | Description | Default | -|----------|---------------|-------| -| image.repository | Container image repository | rancher/backup-restore-operator | -| image.tag | Container image tag | v0.1.0-rc1 | -| s3.enabled | Configure S3 compatible default storage location. Current version supports S3 and MinIO | false | -| s3.credentialSecretName | Name of the Secret containing S3 credentials. This is an optional field. Skip this field in order to use IAM Role authentication. The Secret must contain following two keys, `accessKey` and `secretKey` | "" | -| s3.credentialSecretNamespace | Namespace of the Secret containing S3 credentials. This can be any namespace. | "" | -| s3.region | Region of the S3 Bucket (Required for S3, not valid for MinIO) | "" | -| s3.bucketName | Name of the Bucket | "" | -| s3.folder | Base folder within the Bucket (optional) | "" | -| s3.endpoint | Endpoint for the S3 storage provider | "" | -| s3.endpointCA | Base64 encoded CA cert for the S3 storage provider (optional) | "" | -| s3.insecureTLSSkipVerify | Skip SSL verification | false | -| persistence.enabled | Configure a Persistent Volume as the default storage location. It accepts either a StorageClass name to create a PVC, or directly accepts the PV to use. The Persistent Volume is mounted at `/var/lib/backups` in the operator pod | false | -| persistence.storageClass | StorageClass to use for dynamically provisioning the Persistent Volume, which will be used for storing backups | "" | -| persistence.volumeName | Persistent Volume to use for storing backups | "" | -| persistence.size | Requested size of the Persistent Volume (Applicable when using dynamic provisioning) | "" | -| debug | Set debug flag for backup-restore deployment | false | -| trace | Set trace flag for backup-restore deployment | false | -| nodeSelector | https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector | {} | -| tolerations | https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration | [] | -| affinity | https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity | {} | -| serviceAccount.annotations | Annotations to apply to created service account | {} | -| global.cattle.psp.enabled | Enable or disable PSPs in the chart | false | - ------ - -### PSPs - -We have added a configuration to the chart `values.yaml` which allows you to enable or disable PSPs to align with the PSP deprecation in Kubernetes `v1.25` and above. - ------ - -### CRDs - -Refer [this](https://github.com/rancher/backup-restore-operator#crds) section for information on CRDs that this chart installs. Also refer [this](https://github.com/rancher/backup-restore-operator/tree/master/examples) folder containing sample manifests for the CRDs. - ------ -### Upgrading Chart -```bash -helm upgrade rancher-backup-crd -n cattle-resources-system -helm upgrade rancher-backup -n cattle-resources-system -``` - ------ -### Uninstall Chart - -```bash -helm uninstall rancher-backup -n cattle-resources-system -helm uninstall rancher-backup-crd -n cattle-resources-system -``` - diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/app-readme.md b/charts/rancher-backup/103.0.0+up4.0.0-rc2/app-readme.md deleted file mode 100644 index b1406d5ee..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/app-readme.md +++ /dev/null @@ -1,33 +0,0 @@ -# Rancher Backup - -This chart enables ability to capture backups of the Rancher application and restore from these backups. This chart can be used to migrate Rancher from one Kubernetes cluster to a different Kubernetes cluster. - -For more information on how to use the feature, refer to our [docs](https://ranchermanager.docs.rancher.com/pages-for-subheaders/backup-restore-and-disaster-recovery). - -This chart installs the following components: - -- [backup-restore-operator](https://github.com/rancher/backup-restore-operator) - - The operator handles backing up all Kubernetes resources and CRDs that Rancher creates and manages from the local cluster. It gathers these resources by querying the Kubernetes API server, packages all the resources to create a tarball file and saves it in the configured backup storage location. - - The operator can be configured to store backups in S3-compatible object stores such as AWS S3 and MinIO, and in persistent volumes. During deployment, you can create a default storage location, but there is always the option to override the default storage location with each backup, but will be limited to using an S3-compatible object store. - - It preserves the ownerReferences on all resources, hence maintaining dependencies between objects. - - This operator provides encryption support, to encrypt user specified resources before saving them in the backup file. It uses the same encryption configuration that is used to enable [Kubernetes Encryption at Rest](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/). -- Backup - A backup is a CRD (`Backup`) that defines when to take backups, where to store the backup and what encryption to use (optional). Backups can be taken ad hoc or scheduled to be taken in intervals. -- Restore - A restore is a CRD (`Restore`) that defines which backup to use to restore the Rancher application to. - -## Upgrading to Kubernetes v1.25+ - ​ -Starting in Kubernetes v1.25, [Pod Security Policies](https://kubernetes.io/docs/concepts/security/pod-security-policy/) have been removed from the Kubernetes API. - ​ -As a result, **before upgrading to Kubernetes v1.25** (or on a fresh install in a Kubernetes v1.25+ cluster), users are expected to perform an in-place upgrade of this chart with `global.cattle.psp.enabled` set to `false` if it has been previously set to `true`. -​ -> **Note:** -> In this chart release, any previous field that was associated with any PSP resources have been removed in favor of a single global field: `global.cattle.psp.enabled`. - ​ -> **Note:** -> If you upgrade your cluster to Kubernetes v1.25+ before removing PSPs via a `helm upgrade` (even if you manually clean up resources), **it will leave the Helm release in a broken state within the cluster such that further Helm operations will not work (`helm uninstall`, `helm upgrade`, etc.).** -> -> If your charts get stuck in this state, please consult the Rancher docs on how to clean up your Helm release secrets. -​ -Upon setting `global.cattle.psp.enabled` to false, the chart will remove any PSP resources deployed on its behalf from the cluster. This is the default setting for this chart. -​ -As a replacement for PSPs, [Pod Security Admission](https://kubernetes.io/docs/concepts/security/pod-security-admission/) should be used. Please consult the Rancher docs for more details on how to configure your chart release namespaces to work with the new Pod Security Admission and apply Pod Security Standards. diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/aks.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/aks.yaml deleted file mode 100644 index 779742058..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/aks.yaml +++ /dev/null @@ -1,25 +0,0 @@ -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "aks.cattle.io$" -- apiVersion: "aks.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "apps/v1" - kindsRegexp: "^deployments$" - namespaces: - - "cattle-system" - resourceNames: - - "aks-config-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterroles$" - resourceNames: - - "aks-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterrolebindings$" - resourceNames: - - "aks-operator" -- apiVersion: "v1" - kindsRegexp: "^serviceaccounts$" - namespaces: - - "cattle-system" - resourceNames: - - "aks-operator" diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/eks.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/eks.yaml deleted file mode 100644 index ae57baddf..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/eks.yaml +++ /dev/null @@ -1,17 +0,0 @@ -- apiVersion: "eks.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "apps/v1" - kindsRegexp: "^deployments$" - resourceNames: - - "eks-config-operator" -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "eks.cattle.io$" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterroles$" - resourceNames: - - "eks-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterrolebindings$" - resourceNames: - - "eks-operator" diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/elemental.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/elemental.yaml deleted file mode 100644 index 1d38b1229..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/elemental.yaml +++ /dev/null @@ -1,49 +0,0 @@ -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "elemental.cattle.io$" -- apiVersion: "apps/v1" - kindsRegexp: "^deployments$" - namespaces: - - "cattle-elemental-system" - resourceNames: - - "elemental-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterroles$" - resourceNames: - - "elemental-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterrolebindings$" - resourceNames: - - "elemental-operator" -- apiVersion: "v1" - kindsRegexp: "^serviceaccounts$" - namespaces: - - "cattle-elemental-system" - resourceNames: - - "elemental-operator" -- apiVersion: "management.cattle.io/v3" - kindsRegexp: "^globalrole$" - resourceNames: - - "elemental-operator" -- apiVersion: "management.cattle.io/v3" - kindsRegexp: "^apiservice$" - resourceNameRegexp: "elemental.cattle.io$" -- apiVersion: "elemental.cattle.io/v1beta1" - kindsRegexp: "." - namespaceRegexp: "^cattle-fleet-|^fleet-" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^roles$|^rolebindings$" - labelSelectors: - matchExpressions: - - key: "elemental.cattle.io/managed" - operator: "In" - values: ["true"] - namespaceRegexp: "^cattle-fleet-|^fleet-" -- apiVersion: "v1" - kindsRegexp: "^secrets$|^serviceaccounts$" - labelSelectors: - matchExpressions: - - key: "elemental.cattle.io/managed" - operator: "In" - values: ["true"] - namespaceRegexp: "^cattle-fleet-|^fleet-" diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/fleet.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/fleet.yaml deleted file mode 100644 index a14125fec..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/fleet.yaml +++ /dev/null @@ -1,53 +0,0 @@ -- apiVersion: "v1" - kindsRegexp: "^namespaces$" - resourceNameRegexp: "^fleet-" -- apiVersion: "v1" - kindsRegexp: "^secrets$" - namespaceRegexp: "^cattle-fleet-|^fleet-" - excludeResourceNameRegexp: "^import-token" - labelSelectors: - matchExpressions: - - key: "owner" - operator: "NotIn" - values: ["helm"] - - key: "fleet.cattle.io/managed" - operator: "In" - values: ["true"] -- apiVersion: "v1" - kindsRegexp: "^serviceaccounts$" - namespaceRegexp: "^cattle-fleet-|^fleet-" - excludeResourceNameRegexp: "^default$" -- apiVersion: "v1" - kindsRegexp: "^configmaps$" - namespaceRegexp: "^cattle-fleet-|^fleet-" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^roles$|^rolebindings$" - namespaceRegexp: "^cattle-fleet-|^fleet-" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterrolebindings$" - resourceNameRegexp: "^fleet-|^gitjob-" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterroles$" - resourceNameRegexp: "^fleet-" - resourceNames: - - "gitjob" -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "fleet.cattle.io$|gitjob.cattle.io$" -- apiVersion: "fleet.cattle.io/v1alpha1" - kindsRegexp: "." - excludeKinds: - - "bundledeployments" -- apiVersion: "gitjob.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "apps/v1" - kindsRegexp: "^deployments$" - namespaceRegexp: "^cattle-fleet-|^fleet-" - resourceNameRegexp: "^fleet-" - resourceNames: - - "gitjob" -- apiVersion: "apps/v1" - kindsRegexp: "^services$" - namespaceRegexp: "^cattle-fleet-|^fleet-" - resourceNames: - - "gitjob" diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/gke.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/gke.yaml deleted file mode 100644 index a87eef364..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/gke.yaml +++ /dev/null @@ -1,17 +0,0 @@ -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "gke.cattle.io$" -- apiVersion: "gke.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "apps/v1" - kindsRegexp: "^deployments$" - resourceNames: - - "gke-config-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterroles$" - resourceNames: - - "gke-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterrolebindings$" - resourceNames: - - "gke-operator" diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/provisioningv2.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/provisioningv2.yaml deleted file mode 100644 index 50a7f906b..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/provisioningv2.yaml +++ /dev/null @@ -1,23 +0,0 @@ -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "provisioning.cattle.io$|rke-machine-config.cattle.io$|rke-machine.cattle.io$|rke.cattle.io$|cluster.x-k8s.io$" -- apiVersion: "provisioning.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "rke-machine-config.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "rke-machine.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "rke.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "cluster.x-k8s.io/v1beta1" - kindsRegexp: "." -- apiVersion: "v1" - kindsRegexp: "^secrets$" - resourceNameRegexp: "machine-plan$|rke-state$|machine-state$|machine-driver-secret$|machine-provision$|^harvesterconfig" - namespaces: - - "fleet-default" -- apiVersion: "v1" - kindsRegexp: "^configmaps$" - resourceNames: - - "provisioning-log" - namespaceRegexp: "^c-m-" diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/rancher-operator.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/rancher-operator.yaml deleted file mode 100644 index f30c2fd96..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/rancher-operator.yaml +++ /dev/null @@ -1,28 +0,0 @@ -- apiVersion: "rancher.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "apps/v1" - kindsRegexp: "^deployments$" - resourceNames: - - "rancher-operator" - namespaces: - - "rancher-operator-system" -- apiVersion: "v1" - kindsRegexp: "^serviceaccounts$" - namespaces: - - "rancher-operator-system" - excludeResourceNameRegexp: "^default$" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterrolebindings$" - resourceNames: - - "rancher-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterroles$" - resourceNames: - - "rancher-operator" -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "rancher.cattle.io$" -- apiVersion: "v1" - kindsRegexp: "^namespaces$" - resourceNames: - - "rancher-operator-system" diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/rancher.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/rancher.yaml deleted file mode 100644 index 47fa2e02f..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/files/default-resourceset-contents/rancher.yaml +++ /dev/null @@ -1,65 +0,0 @@ -- apiVersion: "v1" - kindsRegexp: "^namespaces$" - resourceNameRegexp: "^cattle-|^p-|^c-|^user-|^u-" - resourceNames: - - "local" -- apiVersion: "v1" - kindsRegexp: "^secrets$" - namespaceRegexp: "^cattle-|^p-|^c-|^local$|^user-|^u-" - labelSelectors: - matchExpressions: - - key: "owner" - operator: "NotIn" - values: ["helm"] - excludeResourceNameRegexp: "^bootstrap-secret$|^rancher-csp-adapter|^csp-adapter-cache$" -- apiVersion: "v1" - kindsRegexp: "^serviceaccounts$" - namespaceRegexp: "^cattle-|^p-|^c-|^local$|^user-|^u-" - excludeResourceNameRegexp: "^default$|^rancher-csp-adapter$" -- apiVersion: "v1" - kindsRegexp: "^configmaps$" - namespaces: - - "cattle-system" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^roles$|^rolebindings$" - namespaceRegexp: "^cattle-|^p-|^c-|^local$|^user-|^u-" - excludeResourceNameRegexp: "^rancher-csp-adapter" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterrolebindings$" - resourceNameRegexp: "^cattle-|^clusterrolebinding-|^globaladmin-user-|^grb-u-|^crb-" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterroles$" - resourceNameRegexp: "^cattle-|^p-|^c-|^local-|^user-|^u-|^project-|^create-ns$" - excludeResourceNameRegexp: "^rancher-csp-adapter-" -- apiVersion: "scheduling.k8s.io/v1" - kindsRegexp: "^priorityclasses$" - resourceNameRegexp: "^rancher-critical$" -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "management.cattle.io$|project.cattle.io$|catalog.cattle.io$|resources.cattle.io$" -- apiVersion: "management.cattle.io/v3" - kindsRegexp: "." - excludeKinds: - - "tokens" - - "rancherusernotifications" -- apiVersion: "management.cattle.io/v3" - kindsRegexp: "^tokens$" - labelSelectors: - matchExpressions: - - key: "authn.management.cattle.io/kind" - operator: "NotIn" - values: [ "provisioning" ] -- apiVersion: "project.cattle.io/v3" - kindsRegexp: "." -- apiVersion: "catalog.cattle.io/v1" - kindsRegexp: "^clusterrepos$" -- apiVersion: "resources.cattle.io/v1" - kindsRegexp: "^ResourceSet$" -- apiVersion: "v1" - kindsRegexp: "^secrets$" - namespaceRegexp: "^.*$" - labelSelectors: - matchExpressions: - - key: "resources.cattle.io/backup" - operator: "In" - values: ["true"] diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/_helpers.tpl b/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/_helpers.tpl deleted file mode 100644 index a5e485243..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/_helpers.tpl +++ /dev/null @@ -1,87 +0,0 @@ -{{- define "system_default_registry" -}} -{{- if .Values.global.cattle.systemDefaultRegistry -}} -{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} -{{- else -}} -{{- "" -}} -{{- end -}} -{{- end -}} - -{{/* -Windows cluster will add default taint for linux nodes, -add below linux tolerations to workloads could be scheduled to those linux nodes -*/}} -{{- define "linux-node-tolerations" -}} -- key: "cattle.io/os" - value: "linux" - effect: "NoSchedule" - operator: "Equal" -{{- end -}} - -{{- define "linux-node-selector" -}} -{{- if semverCompare "<1.14-0" .Capabilities.KubeVersion.GitVersion -}} -beta.kubernetes.io/os: linux -{{- else -}} -kubernetes.io/os: linux -{{- end -}} -{{- end -}} - -{{/* -Create a default fully qualified app name. -We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). -*/}} -{{- define "backupRestore.fullname" -}} -{{- .Chart.Name | trunc 63 | trimSuffix "-" }} -{{- end }} - -{{/* -Create chart name and version as used by the chart label. -*/}} -{{- define "backupRestore.chart" -}} -{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }} -{{- end }} - -{{/* -Common labels -*/}} -{{- define "backupRestore.labels" -}} -helm.sh/chart: {{ include "backupRestore.chart" . }} -{{ include "backupRestore.selectorLabels" . }} -{{- if .Chart.AppVersion }} -app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} -{{- end }} -app.kubernetes.io/managed-by: {{ .Release.Service }} -{{- end }} - -{{/* -Selector labels -*/}} -{{- define "backupRestore.selectorLabels" -}} -app.kubernetes.io/name: {{ include "backupRestore.fullname" . }} -app.kubernetes.io/instance: {{ .Release.Name }} -resources.cattle.io/operator: backup-restore -{{- end }} - - -{{/* -Create the name of the service account to use -*/}} -{{- define "backupRestore.serviceAccountName" -}} -{{ include "backupRestore.fullname" . }} -{{- end }} - - -{{- define "backupRestore.s3SecretName" -}} -{{- printf "%s-%s" .Chart.Name "s3" | replace "+" "_" | trunc 63 | trimSuffix "-" }} -{{- end }} - -{{/* -Create PVC name using release and revision number, unless a volumeName is given. -*/}} -{{- define "backupRestore.pvcName" -}} -{{- if and .Values.persistence.volumeName }} -{{- printf "%s" .Values.persistence.volumeName }} -{{- else -}} -{{- printf "%s-%d" .Release.Name .Release.Revision }} -{{- end }} -{{- end }} - diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/clusterrolebinding.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/clusterrolebinding.yaml deleted file mode 100644 index cf4abf670..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/clusterrolebinding.yaml +++ /dev/null @@ -1,14 +0,0 @@ -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ include "backupRestore.fullname" . }} - labels: - {{- include "backupRestore.labels" . | nindent 4 }} -subjects: -- kind: ServiceAccount - name: {{ include "backupRestore.serviceAccountName" . }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: cluster-admin - apiGroup: rbac.authorization.k8s.io diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/deployment.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/deployment.yaml deleted file mode 100644 index 631fa458b..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/deployment.yaml +++ /dev/null @@ -1,79 +0,0 @@ -{{- if and .Values.s3.enabled .Values.persistence.enabled }} -{{- fail "\n\nCannot configure both s3 and PV for storing backups" }} -{{- end }} -apiVersion: apps/v1 -kind: Deployment -metadata: - name: {{ include "backupRestore.fullname" . }} - namespace: {{ .Release.Namespace }} - labels: - {{- include "backupRestore.labels" . | nindent 4 }} -spec: - selector: - matchLabels: - {{- include "backupRestore.selectorLabels" . | nindent 6 }} - template: - metadata: - labels: - {{- include "backupRestore.selectorLabels" . | nindent 8 }} - annotations: - checksum/s3: {{ include (print $.Template.BasePath "/s3-secret.yaml") . | sha256sum }} - checksum/pvc: {{ include (print $.Template.BasePath "/pvc.yaml") . | sha256sum }} - spec: - serviceAccountName: {{ include "backupRestore.serviceAccountName" . }} - {{- if .Values.imagePullSecrets }} - imagePullSecrets: - {{ toYaml .Values.imagePullSecrets | indent 6 }} - {{- end }} - {{- if .Values.priorityClassName }} - priorityClassName: {{ .Values.priorityClassName }} - {{- end }} - containers: - - name: {{ .Chart.Name }} - image: {{ template "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }} - imagePullPolicy: {{ default "Always" .Values.imagePullPolicy }} - args: -{{- if .Values.debug }} - - "--debug" -{{- end }} -{{- if .Values.trace }} - - "--trace" -{{- end }} - env: - - name: CHART_NAMESPACE - value: {{ .Release.Namespace }} - {{- if .Values.s3.enabled }} - - name: DEFAULT_S3_BACKUP_STORAGE_LOCATION - value: {{ include "backupRestore.s3SecretName" . }} - {{- end }} - {{- if .Values.proxy }} - - name: HTTP_PROXY - value: {{ .Values.proxy }} - - name: HTTPS_PROXY - value: {{ .Values.proxy }} - - name: NO_PROXY - value: {{ .Values.noProxy }} - {{- end }} - {{- if .Values.persistence.enabled }} - - name: DEFAULT_PERSISTENCE_ENABLED - value: "persistence-enabled" - volumeMounts: - - mountPath: "/var/lib/backups" - name: pv-storage - volumes: - - name: pv-storage - persistentVolumeClaim: - claimName: {{ include "backupRestore.pvcName" . }} - {{- end }} - nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} -{{- if .Values.nodeSelector }} -{{ toYaml .Values.nodeSelector | indent 8 }} -{{- end }} - {{- with .Values.affinity }} - affinity: - {{- toYaml . | nindent 8 }} - {{- end }} - tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} -{{- if .Values.tolerations }} -{{ toYaml .Values.tolerations | indent 8 }} -{{- end }} diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/hardened.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/hardened.yaml deleted file mode 100644 index bf8492ce0..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/hardened.yaml +++ /dev/null @@ -1,124 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - name: {{ include "backupRestore.fullname" . }}-patch-sa - namespace: {{ .Release.Namespace }} - labels: {{ include "backupRestore.labels" . | nindent 4 }} - annotations: - "helm.sh/hook": post-install, post-upgrade - "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation -spec: - backoffLimit: 1 - template: - spec: - serviceAccountName: {{ include "backupRestore.fullname" . }}-patch-sa - securityContext: - runAsNonRoot: true - runAsUser: 1000 - restartPolicy: Never - nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} -{{- if .Values.nodeSelector }} -{{ toYaml .Values.nodeSelector | indent 8 }} -{{- end }} - tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} -{{- if .Values.tolerations }} -{{ toYaml .Values.tolerations | indent 8 }} -{{- end }} - containers: - - name: {{ include "backupRestore.fullname" . }}-patch-sa - image: {{ include "system_default_registry" . }}{{ .Values.global.kubectl.repository }}:{{ .Values.global.kubectl.tag }} - imagePullPolicy: IfNotPresent - command: ["kubectl", "-n", {{ .Release.Namespace | quote }}, "patch", "serviceaccount", "default", "-p", "{\"automountServiceAccountToken\": false}"] ---- -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ include "backupRestore.fullname" . }}-patch-sa - namespace: {{ .Release.Namespace }} - labels: {{ include "backupRestore.labels" . | nindent 4 }} - annotations: - "helm.sh/hook": post-install, post-upgrade - "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: {{ include "backupRestore.fullname" . }}-patch-sa - labels: {{ include "backupRestore.labels" . | nindent 4 }} - annotations: - "helm.sh/hook": post-install, post-upgrade - "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation -rules: - - apiGroups: [""] - resources: ["serviceaccounts"] - verbs: ["get", "patch"] -{{- if .Values.global.cattle.psp.enabled}} - - apiGroups: ["policy"] - resources: ["podsecuritypolicies"] - verbs: ["use"] - resourceNames: - - {{ include "backupRestore.fullname" . }}-patch-sa -{{- end}} ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - name: {{ include "backupRestore.fullname" . }}-patch-sa - labels: {{ include "backupRestore.labels" . | nindent 4 }} - annotations: - "helm.sh/hook": post-install, post-upgrade - "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: {{ include "backupRestore.fullname" . }}-patch-sa -subjects: - - kind: ServiceAccount - name: {{ include "backupRestore.fullname" . }}-patch-sa - namespace: {{ .Release.Namespace }} ---- -{{- if .Values.global.cattle.psp.enabled}} -apiVersion: policy/v1beta1 -kind: PodSecurityPolicy -metadata: - name: {{ include "backupRestore.fullname" . }}-patch-sa - labels: {{ include "backupRestore.labels" . | nindent 4 }} - annotations: - "helm.sh/hook": post-install, post-upgrade - "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation -spec: - privileged: false - hostNetwork: false - hostIPC: false - hostPID: false - runAsUser: - rule: 'MustRunAsNonRoot' - seLinux: - rule: 'RunAsAny' - supplementalGroups: - rule: 'MustRunAs' - ranges: - - min: 1 - max: 65535 - fsGroup: - rule: 'MustRunAs' - ranges: - - min: 1 - max: 65535 - readOnlyRootFilesystem: false - volumes: - - 'secret' -{{- end}} ---- -apiVersion: networking.k8s.io/v1 -kind: NetworkPolicy -metadata: - name: {{ include "backupRestore.fullname" . }}-default-allow-all - namespace: {{ .Release.Namespace }} -spec: - podSelector: {} - egress: - - {} - policyTypes: - - Ingress - - Egress diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/psp.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/psp.yaml deleted file mode 100644 index 34bc96ee7..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/psp.yaml +++ /dev/null @@ -1,31 +0,0 @@ -{{- if .Values.global.cattle.psp.enabled -}} -apiVersion: policy/v1beta1 -kind: PodSecurityPolicy -metadata: - name: {{ include "backupRestore.fullname" . }}-psp - labels: {{ include "backupRestore.labels" . | nindent 4 }} -spec: - privileged: false - allowPrivilegeEscalation: false - hostNetwork: false - hostIPC: false - hostPID: false - runAsUser: - rule: 'MustRunAsNonRoot' - seLinux: - rule: 'RunAsAny' - supplementalGroups: - rule: 'MustRunAs' - ranges: - - min: 1 - max: 65535 - fsGroup: - rule: 'MustRunAs' - ranges: - - min: 1 - max: 65535 - readOnlyRootFilesystem: false - volumes: - - 'persistentVolumeClaim' - - 'secret' -{{- end -}} diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/pvc.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/pvc.yaml deleted file mode 100644 index ff57e4dab..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/pvc.yaml +++ /dev/null @@ -1,27 +0,0 @@ -{{- if and .Values.persistence.enabled -}} -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - name: {{ include "backupRestore.pvcName" . }} - namespace: {{ .Release.Namespace }} - labels: - {{- include "backupRestore.labels" . | nindent 4 }} -spec: - accessModes: - - ReadWriteOnce - resources: - {{- with .Values.persistence }} - requests: - storage: {{ .size | quote }} -{{- if .storageClass }} -{{- if (eq "-" .storageClass) }} - storageClassName: "" -{{- else }} - storageClassName: {{ .storageClass | quote }} -{{- end }} -{{- end }} -{{- if .volumeName }} - volumeName: {{ .volumeName | quote }} -{{- end }} -{{- end }} -{{- end }} diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/rancher-resourceset.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/rancher-resourceset.yaml deleted file mode 100644 index 05add8824..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/rancher-resourceset.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: resources.cattle.io/v1 -kind: ResourceSet -metadata: - name: rancher-resource-set -controllerReferences: - - apiVersion: "apps/v1" - resource: "deployments" - name: "rancher" - namespace: "cattle-system" -resourceSelectors: -{{- range $path, $_ := .Files.Glob "files/default-resourceset-contents/*.yaml" -}} - {{- $.Files.Get $path | nindent 2 -}} -{{- end -}} diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/s3-secret.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/s3-secret.yaml deleted file mode 100644 index 726509730..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/s3-secret.yaml +++ /dev/null @@ -1,31 +0,0 @@ -{{- if .Values.s3.enabled -}} -apiVersion: v1 -kind: Secret -metadata: - name: {{ include "backupRestore.s3SecretName" . }} - namespace: {{ .Release.Namespace }} - labels: - {{- include "backupRestore.labels" . | nindent 4 }} -type: Opaque -stringData: - {{- with .Values.s3 }} - {{- if .credentialSecretName }} - credentialSecretName: {{ .credentialSecretName }} - credentialSecretNamespace: {{ required "When providing a Secret containing S3 credentials, a valid .Values.credentialSecretNamespace must be provided" .credentialSecretNamespace }} - {{- end }} - {{- if .region }} - region: {{ .region | quote }} - {{- end }} - bucketName: {{ required "A valid .Values.bucketName is required for configuring S3 compatible storage as the default backup storage location" .bucketName | quote }} - {{- if .folder }} - folder: {{ .folder | quote }} - {{- end }} - endpoint: {{ required "A valid .Values.endpoint is required for configuring S3 compatible storage as the default backup storage location" .endpoint | quote }} - {{- if .endpointCA }} - endpointCA: {{ .endpointCA }} - {{- end }} - {{- if .insecureTLSSkipVerify }} - insecureTLSSkipVerify: {{ .insecureTLSSkipVerify | quote }} - {{- end }} - {{- end }} -{{ end }} diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/serviceaccount.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/serviceaccount.yaml deleted file mode 100644 index 754e1fe89..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/serviceaccount.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ include "backupRestore.serviceAccountName" . }} - namespace: {{ .Release.Namespace }} - labels: - {{- include "backupRestore.labels" . | nindent 4 }} -{{- if .Values.serviceAccount.annotations }} - annotations: - {{- toYaml .Values.serviceAccount.annotations | nindent 4 }} -{{- end }} diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/validate-install-crd.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/validate-install-crd.yaml deleted file mode 100644 index f63fd2e2e..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/validate-install-crd.yaml +++ /dev/null @@ -1,16 +0,0 @@ -#{{- if gt (len (lookup "rbac.authorization.k8s.io/v1" "ClusterRole" "" "")) 0 -}} -# {{- $found := dict -}} -# {{- set $found "resources.cattle.io/v1/Backup" false -}} -# {{- set $found "resources.cattle.io/v1/ResourceSet" false -}} -# {{- set $found "resources.cattle.io/v1/Restore" false -}} -# {{- range .Capabilities.APIVersions -}} -# {{- if hasKey $found (toString .) -}} -# {{- set $found (toString .) true -}} -# {{- end -}} -# {{- end -}} -# {{- range $_, $exists := $found -}} -# {{- if (eq $exists false) -}} -# {{- required "Required CRDs are missing. Please install the corresponding CRD chart before installing this chart." "" -}} -# {{- end -}} -# {{- end -}} -#{{- end -}} \ No newline at end of file diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/validate-psp-install.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/validate-psp-install.yaml deleted file mode 100644 index a30c59d3b..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/templates/validate-psp-install.yaml +++ /dev/null @@ -1,7 +0,0 @@ -#{{- if gt (len (lookup "rbac.authorization.k8s.io/v1" "ClusterRole" "" "")) 0 -}} -#{{- if .Values.global.cattle.psp.enabled }} -#{{- if not (.Capabilities.APIVersions.Has "policy/v1beta1/PodSecurityPolicy") }} -#{{- fail "The target cluster does not have the PodSecurityPolicy API resource. Please disable PSPs in this chart before proceeding." -}} -#{{- end }} -#{{- end }} -#{{- end }} diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/tests/deployment_test.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/tests/deployment_test.yaml deleted file mode 100644 index 671d415db..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/tests/deployment_test.yaml +++ /dev/null @@ -1,216 +0,0 @@ -suite: Test Deployment -templates: -- deployment.yaml -- s3-secret.yaml -- pvc.yaml -- _helpers.tpl -tests: -- it: should set name - template: deployment.yaml - asserts: - - equal: - path: metadata.name - value: "rancher-backup" -- it: should set namespace - template: deployment.yaml - asserts: - - equal: - path: metadata.namespace - value: "NAMESPACE" -- it: should set priorityClassName - set: - priorityClassName: "testClass" - template: deployment.yaml - asserts: - - equal: - path: spec.template.spec.priorityClassName - value: "testClass" -- it: should set default imagePullPolicy - template: deployment.yaml - asserts: - - equal: - path: spec.template.spec.containers[0].imagePullPolicy - value: "Always" -- it: should set imagePullPolicy - set: - imagePullPolicy: "IfNotPresent" - template: deployment.yaml - asserts: - - equal: - path: spec.template.spec.containers[0].imagePullPolicy - value: "IfNotPresent" -- it: should set debug loglevel - set: - debug: true - template: deployment.yaml - asserts: - - contains: - path: spec.template.spec.containers[0].args - content: "--debug" -- it: should set trace loglevel - set: - trace: true - template: deployment.yaml - asserts: - - contains: - path: spec.template.spec.containers[0].args - content: "--trace" -- it: should set proxy environment variables - set: - proxy: "https://127.0.0.1:3128" - template: deployment.yaml - asserts: - - contains: - path: spec.template.spec.containers[0].env - content: - name: HTTP_PROXY - value: "https://127.0.0.1:3128" - - contains: - path: spec.template.spec.containers[0].env - content: - name: HTTPS_PROXY - value: "https://127.0.0.1:3128" - - contains: - path: spec.template.spec.containers[0].env - content: - name: NO_PROXY - value: "127.0.0.0/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,.svc,.cluster.local" -- it: should set proxy environment variables with modified noproxy - set: - proxy: "https://127.0.0.1:3128" - noProxy: "192.168.0.0/24" - template: deployment.yaml - asserts: - - contains: - path: spec.template.spec.containers[0].env - content: - name: NO_PROXY - value: "192.168.0.0/24" -- it: should set persistence variables - set: - persistence.enabled: true - template: deployment.yaml - asserts: - - contains: - path: spec.template.spec.containers[0].env - content: - name: DEFAULT_PERSISTENCE_ENABLED - value: "persistence-enabled" - - contains: - path: spec.template.spec.containers[0].volumeMounts - content: - mountPath: "/var/lib/backups" - name: "pv-storage" - - equal: - path: spec.template.spec.volumes[0].name - value: "pv-storage" - - equal: - path: spec.template.spec.volumes[0].persistentVolumeClaim - value: - claimName: RELEASE-NAME-0 -- it: should set claim from custom static volumeName - set: - persistence.enabled: true - persistence.volumeName: "PREDEFINED-VOLUME" - persistence.storageClass: "PREDEFINED-STORAGECLASS" - persistence.size: "PREDIFINED-SAMEAS-PVSIZE" - template: deployment.yaml - asserts: - - contains: - path: spec.template.spec.containers[0].env - content: - name: DEFAULT_PERSISTENCE_ENABLED - value: "persistence-enabled" - - equal: - path: spec.template.spec.volumes[0].persistentVolumeClaim - value: - claimName: PREDEFINED-VOLUME -- it: should set private registry - template: deployment.yaml - set: - global.cattle.systemDefaultRegistry: "my.registry.local:3000" - asserts: - - matchRegex: - path: spec.template.spec.containers[0].image - pattern: ^my.registry.local:3000/rancher/backup-restore-operator:.*$ -- it: should set nodeselector - template: deployment.yaml - asserts: - - equal: - path: spec.template.spec.nodeSelector - value: - kubernetes.io/os: linux -- it: should not set default affinity - template: deployment.yaml - asserts: - - isNull: - path: spec.template.spec.affinity -- it: should set custom affinity - template: deployment.yaml - set: - affinity: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: disktype - operator: In - values: - - ssd - asserts: - - equal: - path: spec.template.spec.affinity - value: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: disktype - operator: In - values: - - ssd -- it: should set tolerations - template: deployment.yaml - asserts: - - equal: - path: spec.template.spec.tolerations[0] - value: - key: "cattle.io/os" - value: "linux" - effect: "NoSchedule" - operator: "Equal" -- it: should set custom tolerations - template: deployment.yaml - set: - tolerations: - - key: "example-key" - operator: "Exists" - effect: "NoSchedule" - asserts: - - equal: - path: spec.template.spec.tolerations[0] - value: - key: "cattle.io/os" - value: "linux" - effect: "NoSchedule" - operator: "Equal" - - equal: - path: spec.template.spec.tolerations[1] - value: - key: "example-key" - operator: "Exists" - effect: "NoSchedule" -- it: should not set default imagePullSecrets - template: deployment.yaml - asserts: - - isNull: - path: spec.template.spec.imagePullSecrets -- it: should set imagePullSecrets - set: - imagePullSecrets: - - name: "pull-secret" - template: deployment.yaml - asserts: - - equal: - path: spec.template.spec.imagePullSecrets[0].name - value: "pull-secret" diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/tests/pvc_test.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/tests/pvc_test.yaml deleted file mode 100644 index 3a1c40698..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/tests/pvc_test.yaml +++ /dev/null @@ -1,102 +0,0 @@ -suite: Test PVC -templates: -- pvc.yaml -- _helpers.tpl -tests: -- it: should set name - template: pvc.yaml - set: - persistence: - enabled: true - asserts: - - equal: - path: metadata.name - value: "RELEASE-NAME-0" -- it: should set namespace - template: pvc.yaml - set: - persistence: - enabled: true - asserts: - - equal: - path: metadata.namespace - value: "NAMESPACE" -- it: should set accessModes - template: pvc.yaml - set: - persistence: - enabled: true - asserts: - - equal: - path: spec.accessModes[0] - value: "ReadWriteOnce" -- it: should set size - template: pvc.yaml - set: - persistence: - enabled: true - asserts: - - equal: - path: spec.resources.requests.storage - value: "2Gi" -- it: should set size - template: pvc.yaml - set: - persistence: - enabled: true - size: "10Gi" - asserts: - - equal: - path: spec.resources.requests.storage - value: "10Gi" -- it: should not set volumeName - template: pvc.yaml - set: - persistence: - enabled: true - asserts: - - isNull: - path: spec.volumeName -- it: should set default storageClass - template: pvc.yaml - set: - persistence: - enabled: true - asserts: - - equal: - path: spec.storageClassName - value: "" -- it: should set custom storageClass - template: pvc.yaml - set: - persistence: - enabled: true - storageClass: "storage-class" - asserts: - - equal: - path: spec.storageClassName - value: "storage-class" -- it: should set custom volumeName - template: pvc.yaml - set: - persistence: - enabled: true - volumeName: "volume-name" - asserts: - - equal: - path: spec.volumeName - value: "volume-name" -- it: should set claim from custom static volumeName - set: - persistence.enabled: true - persistence.volumeName: "PREDEFINED-VOLUME" - persistence.storageClass: "PREDEFINED-STORAGECLASS" - persistence.size: "PREDEFINED-SAMEAS-PVSIZE" - template: pvc.yaml - asserts: - - equal: - path: spec.resources.requests.storage - value: "PREDEFINED-SAMEAS-PVSIZE" - - equal: - path: spec.storageClassName - value: "PREDEFINED-STORAGECLASS" diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/tests/s3-secret_test.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/tests/s3-secret_test.yaml deleted file mode 100644 index af130dd29..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/tests/s3-secret_test.yaml +++ /dev/null @@ -1,141 +0,0 @@ -suite: Test S3 Secret -templates: -- s3-secret.yaml -- _helpers.tpl -tests: -- it: should set name - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - asserts: - - equal: - path: metadata.name - value: "rancher-backup-s3" -- it: should set namespace - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - asserts: - - equal: - path: metadata.namespace - value: "NAMESPACE" -- it: should not set credentialSecretName - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - asserts: - - isNull: - path: stringData.credentialSecretName -- it: should set credentialSecretName - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - credentialSecretName: "credential-secret-name" - credentialSecretNamespace: "credential-secret-namespace" - asserts: - - equal: - path: stringData.credentialSecretName - value: "credential-secret-name" - - equal: - path: stringData.credentialSecretNamespace - value: "credential-secret-namespace" -- it: should not set folder - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - asserts: - - isNull: - path: stringData.folder -- it: should set folder - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - folder: "myfolder" - asserts: - - equal: - path: stringData.folder - value: "myfolder" -- it: should not set region - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - asserts: - - isNull: - path: stringData.region -- it: should set region - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - region: "us-west-1" - asserts: - - equal: - path: stringData.region - value: "us-west-1" -- it: should not set endpointCA - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - asserts: - - isNull: - path: stringData.endpointCA -- it: should set endpointCA - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - endpointCA: "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" - asserts: - - equal: - path: stringData.endpointCA - value: "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" -- it: should not set insecureTLSSkipVerify - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - asserts: - - isNull: - path: stringData.insecureTLSSkipVerify -- it: should set insecureTLSSkipVerify - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - insecureTLSSkipVerify: "true" - asserts: - - equal: - path: stringData.insecureTLSSkipVerify - value: "true" diff --git a/charts/rancher-backup/103.0.0+up4.0.0-rc2/values.yaml b/charts/rancher-backup/103.0.0+up4.0.0-rc2/values.yaml deleted file mode 100644 index b5e3b610f..000000000 --- a/charts/rancher-backup/103.0.0+up4.0.0-rc2/values.yaml +++ /dev/null @@ -1,81 +0,0 @@ -image: - repository: rancher/backup-restore-operator - tag: v4.0.0-rc2 - -## Default s3 bucket for storing all backup files created by the backup-restore-operator -s3: - enabled: false - ## credentialSecretName if set, should be the name of the Secret containing AWS credentials. - ## To use IAM Role, don't set this field - credentialSecretName: "" - credentialSecretNamespace: "" - region: "" - bucketName: "" - folder: "" - endpoint: "" - endpointCA: "" - insecureTLSSkipVerify: false - -## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ -## If persistence is enabled, operator will create a PVC with mountPath /var/lib/backups -persistence: - enabled: false - - ## If defined, storageClassName: - ## If set to "-", storageClassName: "", which disables dynamic provisioning - ## If undefined (the default) or set to null, no storageClassName spec is - ## set, choosing the default provisioner. (gp2 on AWS, standard on - ## GKE, AWS & OpenStack). - ## Refer https://kubernetes.io/docs/concepts/storage/persistent-volumes/#class-1 - ## - storageClass: "-" - - ## If you want to disable dynamic provisioning by setting storageClass to "-" above, - ## and want to target a particular PV, provide name of the target volume - volumeName: "" - - ## Only certain StorageClasses allow resizing PVs; Refer https://kubernetes.io/blog/2018/07/12/resizing-persistent-volumes-using-kubernetes/ - size: 2Gi - -# Add log level flags to backup-restore -debug: false -trace: false - -# http[s] proxy server passed to backup client -# proxy: http://@:: - -# comma separated list of domains or ip addresses that will not use the proxy -noProxy: 127.0.0.0/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,.svc,.cluster.local - -global: - cattle: - systemDefaultRegistry: "" - psp: - enabled: false # PSP enablement should default to false - kubectl: - repository: rancher/kubectl - tag: v1.21.9 - -## Node labels for pod assignment -## Ref: https://kubernetes.io/docs/user-guide/node-selection/ -## -nodeSelector: {} - -## List of node taints to tolerate (requires Kubernetes >= 1.6) -tolerations: [] - -affinity: {} - -serviceAccount: - annotations: {} - -priorityClassName: "" - -# Override imagePullPolicy for image -# options: Always, Never, IfNotPresent -# Defaults to Always -imagePullPolicy: "Always" - -## Optional array of imagePullSecrets containing private registry credentials -## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ -imagePullSecrets: [] diff --git a/index.yaml b/index.yaml index a1226720f..23c3b9de7 100755 --- a/index.yaml +++ b/index.yaml @@ -6527,36 +6527,6 @@ entries: - assets/rancher-alerting-drivers/rancher-alerting-drivers-1.0.100.tgz version: 1.0.100 rancher-backup: - - annotations: - catalog.cattle.io/auto-install: rancher-backup-crd=match - catalog.cattle.io/certified: rancher - catalog.cattle.io/display-name: Rancher Backups - catalog.cattle.io/kube-version: '>= 1.23.0-0 < 1.28.0-0' - catalog.cattle.io/namespace: cattle-resources-system - catalog.cattle.io/os: linux - catalog.cattle.io/permits-os: linux,windows - catalog.cattle.io/provides-gvr: resources.cattle.io.resourceset/v1 - catalog.cattle.io/rancher-version: '>= 2.8.0-0 < 2.9.0-0' - catalog.cattle.io/release-name: rancher-backup - catalog.cattle.io/scope: management - catalog.cattle.io/type: cluster-tool - catalog.cattle.io/ui-component: rancher-backup - catalog.cattle.io/upstream-version: 2.1.1 - apiVersion: v2 - appVersion: 4.0.0-rc2 - created: "2023-10-27T15:09:43.15051-07:00" - description: Provides ability to back up and restore the Rancher application running - on any Kubernetes cluster - digest: 1945636db982e2a7f119eef314050fd35207b512b677cd4641df8bef6d6c5772 - icon: https://charts.rancher.io/assets/logos/backup-restore.svg - keywords: - - applications - - infrastructure - kubeVersion: '>= 1.23.0-0' - name: rancher-backup - urls: - - assets/rancher-backup/rancher-backup-103.0.0+up4.0.0-rc2.tgz - version: 103.0.0+up4.0.0-rc2 - annotations: catalog.cattle.io/auto-install: rancher-backup-crd=match catalog.cattle.io/certified: rancher @@ -7085,21 +7055,6 @@ entries: - assets/rancher-backup/rancher-backup-1.0.200.tgz version: 1.0.200 rancher-backup-crd: - - annotations: - catalog.cattle.io/certified: rancher - catalog.cattle.io/hidden: "true" - catalog.cattle.io/namespace: cattle-resources-system - catalog.cattle.io/release-name: rancher-backup-crd - apiVersion: v2 - appVersion: 4.0.0-rc2 - created: "2023-10-27T15:09:49.772564-07:00" - description: Installs the CRDs for rancher-backup. - digest: 65146112b6670fdd6a525ac96554586a06081b7dc22334311ed38c5f7d99563d - name: rancher-backup-crd - type: application - urls: - - assets/rancher-backup-crd/rancher-backup-crd-103.0.0+up4.0.0-rc2.tgz - version: 103.0.0+up4.0.0-rc2 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true"