From 9da107cc74a53168aa14531d2cc3477008b63af9 Mon Sep 17 00:00:00 2001 From: Caleb Bron Date: Tue, 8 Dec 2020 16:41:31 -0700 Subject: [PATCH] removing for a rename --- assets/index.yaml | 110 ---------- .../rancher-externalip-webhook-0.1.100.tgz | Bin 6945 -> 0 bytes .../rancher-externalip-webhook-0.1.300.tgz | Bin 7222 -> 0 bytes .../rancher-externalip-webhook-0.1.400.tgz | Bin 7225 -> 0 bytes ...vue-rancher-externalip-webhook-0.1.401.tgz | Bin 7229 -> 0 bytes charts/rancher-externalip-webhook/Chart.yaml | 23 -- charts/rancher-externalip-webhook/README.md | 65 ------ .../rancher-externalip-webhook/app-README.md | 9 - .../rancher-externalip-webhook/questions.yaml | 7 - .../templates/NOTES.txt | 3 - .../templates/_helpers.tpl | 50 ----- .../templates/admissionregistration.yaml | 30 --- .../templates/clusterrole.yaml | 33 --- .../templates/clusterrolebinding.yaml | 31 --- .../templates/deployment.yaml | 107 ---------- .../templates/issuer.yaml | 52 ----- .../templates/service.yaml | 35 --- .../templates/serviceaccount.yaml | 7 - .../templates/servicemonitor.yaml | 16 -- .../tests/admissionregistration_test.yaml | 32 --- .../tests/clusterrole_test.yaml | 37 ---- .../tests/clusterrolebinding_test.yaml | 42 ---- .../tests/deployment_test.yaml | 202 ------------------ .../tests/issuer_test.yaml | 106 --------- .../tests/service_test.yaml | 69 ------ .../tests/serviceaccount_test.yaml | 9 - .../tests/servicemonitor_test.yaml | 20 -- charts/rancher-externalip-webhook/values.yaml | 67 ------ index.yaml | 110 ---------- .../rancher-externalip-webhook.sum | 2 - 30 files changed, 1274 deletions(-) delete mode 100644 assets/rancher-externalip-webhook/rancher-externalip-webhook-0.1.100.tgz delete mode 100644 assets/rancher-externalip-webhook/rancher-externalip-webhook-0.1.300.tgz delete mode 100644 assets/rancher-externalip-webhook/rancher-externalip-webhook-0.1.400.tgz delete mode 100644 assets/rancher-externalip-webhook/vue-rancher-externalip-webhook-0.1.401.tgz delete mode 100644 charts/rancher-externalip-webhook/Chart.yaml delete mode 100644 charts/rancher-externalip-webhook/README.md delete mode 100644 charts/rancher-externalip-webhook/app-README.md delete mode 100644 charts/rancher-externalip-webhook/questions.yaml delete mode 100644 charts/rancher-externalip-webhook/templates/NOTES.txt delete mode 100644 charts/rancher-externalip-webhook/templates/_helpers.tpl delete mode 100644 charts/rancher-externalip-webhook/templates/admissionregistration.yaml delete mode 100644 charts/rancher-externalip-webhook/templates/clusterrole.yaml delete mode 100644 charts/rancher-externalip-webhook/templates/clusterrolebinding.yaml delete mode 100644 charts/rancher-externalip-webhook/templates/deployment.yaml delete mode 100644 charts/rancher-externalip-webhook/templates/issuer.yaml delete mode 100644 charts/rancher-externalip-webhook/templates/service.yaml delete mode 100644 charts/rancher-externalip-webhook/templates/serviceaccount.yaml delete mode 100644 charts/rancher-externalip-webhook/templates/servicemonitor.yaml delete mode 100644 charts/rancher-externalip-webhook/tests/admissionregistration_test.yaml delete mode 100644 charts/rancher-externalip-webhook/tests/clusterrole_test.yaml delete mode 100644 charts/rancher-externalip-webhook/tests/clusterrolebinding_test.yaml delete mode 100644 charts/rancher-externalip-webhook/tests/deployment_test.yaml delete mode 100644 charts/rancher-externalip-webhook/tests/issuer_test.yaml delete mode 100644 charts/rancher-externalip-webhook/tests/service_test.yaml delete mode 100644 charts/rancher-externalip-webhook/tests/serviceaccount_test.yaml delete mode 100644 charts/rancher-externalip-webhook/tests/servicemonitor_test.yaml delete mode 100644 charts/rancher-externalip-webhook/values.yaml delete mode 100644 sha256sum/rancher-externalip-webhook/rancher-externalip-webhook.sum diff --git a/assets/index.yaml b/assets/index.yaml index 9473b0975..f854a516d 100644 --- a/assets/index.yaml +++ b/assets/index.yaml @@ -793,88 +793,6 @@ entries: urls: - assets/rancher-cis-benchmark/rancher-cis-benchmark-crd-1.0.100.tgz version: 1.0.100 - rancher-externalip-webhook: - - annotations: - catalog.cattle.io/certified: rancher - catalog.cattle.io/display-name: External IP Webhook - catalog.cattle.io/namespace: cattle-externalip-system - catalog.cattle.io/release-name: rancher-externalip-webhook - catalog.cattle.io/ui-component: rancher-externalip-webhook - apiVersion: v1 - appVersion: v0.1.4 - created: "2020-12-08T22:05:21.819947668Z" - description: | - Deploy the externalip-webhook to mitigate k8s CVE-2020-8554 - digest: abc86966d4a49e37ea0a7e90f38bc267a73cb9fc3a9ce96e407bae760eb9af95 - home: https://github.com/rancher/externalip-webhook - keywords: - - cve - - externalip - - webhook - - security - maintainers: - - email: raul@rancher.com - name: rawmind0 - name: rancher-externalip-webhook - sources: - - https://github.com/rancher/externalip-webhook - urls: - - assets/rancher-externalip-webhook/rancher-externalip-webhook-0.1.400.tgz - version: 0.1.400 - - annotations: - catalog.cattle.io/certified: rancher - catalog.cattle.io/display-name: External IP Webhook - catalog.cattle.io/namespace: cattle-externalip-system - catalog.cattle.io/release-name: rancher-externalip-webhook - catalog.cattle.io/ui-component: rancher-externalip-webhook - apiVersion: v1 - appVersion: v0.1.3 - created: "2020-12-08T14:39:13.286645836Z" - description: | - Deploy the externalip-webhook to mitigate k8s CVE-2020-8554 - digest: d722d79154bb56c1366dafcecc969cb5ef3da714444eff37631b28886d13e027 - home: https://github.com/rancher/externalip-webhook - keywords: - - cve - - embargo - - externalip - - webhook - - security - maintainers: - - email: raul@rancher.com - name: rawmind0 - name: rancher-externalip-webhook - sources: - - https://github.com/rancher/externalip-webhook - urls: - - assets/rancher-externalip-webhook/rancher-externalip-webhook-0.1.300.tgz - version: 0.1.300 - - annotations: - catalog.cattle.io/certified: rancher - catalog.cattle.io/display-name: Externalip webhook - catalog.cattle.io/hidden: "true" - catalog.cattle.io/namespace: cattle-externalip-system - catalog.cattle.io/release-name: rancher-externalip-webhook - apiVersion: v1 - appVersion: v0.1.1 - created: "2020-12-08T02:12:59.751279501Z" - description: | - Deploy rancher-externalip-webhook to mitigate k8s CVE-2020-8554 - digest: 4b0ef8f0d9cfeec170e3b1a06984152d4ac4ebc4b8c4326e1613bed314d99ddc - home: https://github.com/rancher/externalip-webhook - keywords: - - externalip - - webhook - - security - maintainers: - - email: raul@rancher.com - name: Raul Sanchez - name: rancher-externalip-webhook - sources: - - https://github.com/rancher/externalip-webhook - urls: - - assets/rancher-externalip-webhook/rancher-externalip-webhook-0.1.100.tgz - version: 0.1.100 rancher-gatekeeper: - annotations: catalog.cattle.io/auto-install: rancher-gatekeeper-crd=match @@ -2272,32 +2190,4 @@ entries: urls: - assets/rio/rio-0.8.000.tgz version: 0.8.000 - vue-rancher-externalip-webhook: - - annotations: - catalog.cattle.io/certified: rancher - catalog.cattle.io/display-name: External IP Webhook - catalog.cattle.io/namespace: cattle-externalip-system - catalog.cattle.io/release-name: vue-rancher-externalip-webhook - catalog.cattle.io/ui-component: vue-rancher-externalip-webhook - apiVersion: v1 - appVersion: v0.1.4 - created: "2020-12-08T23:25:12.849262513Z" - description: | - Deploy the externalip-webhook to mitigate k8s CVE-2020-8554 - digest: 51dff54b84f92ce75fef00baf8da86a635b71f92abdd7bfb01cba7169b4153e8 - home: https://github.com/rancher/externalip-webhook - keywords: - - cve - - externalip - - webhook - - security - maintainers: - - email: raul@rancher.com - name: rawmind0 - name: vue-rancher-externalip-webhook - sources: - - https://github.com/rancher/externalip-webhook - urls: - - assets/rancher-externalip-webhook/vue-rancher-externalip-webhook-0.1.401.tgz - version: 0.1.401 generated: "2020-12-08T23:25:12.847895211Z" diff --git a/assets/rancher-externalip-webhook/rancher-externalip-webhook-0.1.100.tgz b/assets/rancher-externalip-webhook/rancher-externalip-webhook-0.1.100.tgz deleted file mode 100644 index 72050c90464ad5c696e2dbf5ac53614aa755db4c..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 6945 zcmV++8{Xs}iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKB#bK5wwVE*Q(=#zKv;#^2kvTSEq=dH^o-hFv*l5yGD+1g5_ zB8Y?}j46^sfO5Qv-)Db?A0$DFq(n)U9gi?o8H)rP-Hk@0(P*G!6u46yoA@ikae#ah znKyVe4a4j1n<Hv(1Wa+xE#|ApURLcKQFk-s#b^-qGpF(ea5rI37H+dnbdV z(`R6B*zQUtp$x^(?2X$h6ZeA@6a*ndjD!Jo3;-7~MU45_B4O9XF(YGwJqMJm zR95o{jeK-#255#IIM1XBlr&X-G$o#g0|z=RPH?BP3WrA{NWc&Ya4f6O5b-$=6950J7I!sCnsh7e`+7^_5Uu)!2!JX{qP2R znOcE&7vK^vrUsI4Qf>b3;thZ7K&N9I9KahnGq{Lh3KJaQSj;0Z4&zKKxmq1Dzu=g? zM**7PnEwPgfb#&2d@SC;OuhmVFg%gqEYVK(hEBu8_h5tp`7uV`Es%gRK*=P)9=OPI zV+JIE5u*5Hz-gZ$CT66+CV}VU_H87QA0kgwrr;rl;JIw(B`}|g_E6x7zpwG_As{L! zrr3=!`+#Pcqr>@-O`Qg4Z=JMnOp4<va&qcD+-Br`O@d@dVdh!W0X z%Mj0a*YO7zp-DFT3@NjC2u zDA^#v1ZJ4U#HD}(FA7P(j05tpy*aghCjl^7C6l8K5~L zzG$3}K{WGD27qFBYJm9kf`920$3)s#Muq*#7C*C&7VqjiJAGa3a9*l9{W=+8Gaez= z6lAEHX|Eq!vh5gWR)(zL6W+<`FMt`I39v`@dy+kLqr`!pZO^jyg$Pu9*028T-~c{^ z9tIzcuulaKqtF9H`DmYUat{vR5|4A+jgu1xm|-ex;LxSrgyPtoB*eqrAoQ?Fv5#He zOI_pOz~GOr#FH>~;M<*m_}ABOz~D@AfcI31$UEPp+0M_)jju3B?|eaSG7N z#MV+03uj7X7eP4S;W0{l(M>-S${-vAXE<blf;<9e`S3Le>sDm zb#iE^T4GVe<++48mU6)dj8UNSCr;+X4@b!7T#?I@w-TvKJRy{ER(3j%$nW znOEc!BUsYWEJn5Ut8_Z>n!n6(91{=2cfN89TsS!rf0Ef%G9Ht!&@pphIPk>Z64f`{ zl*fRwHpYqX-@@++@`W!GP!tIwEaRV8LKpQJZ-Wy=VT4_jPz*GjVckX$q>l;qJqjqs z(yqduFfO=B{(N*R*z)$n6|c(|FEqmL;c6V>cow32BcC^Hdn| zJ_(Yq!e*r}!Qgd9*bi^ibImN};&v0p*M5jR3U2BXq3#rWiJyvNNU;ubQ3AzFQ>;@o z;IdmxxW?RC&3)=2?HB;UE$FCk`2##2W0yJ5`4C>I_W5JEcIL~R&N&}=opR?^qCwT- zNa9djUxn0>Czkt%*l$K1+};br@OCxi0*Kd}3~{rta+qI(;vyZQQ+7<}{I2s6|(u1VlI@GJ6( zhZqSaYGM2)48~-VjtnA82imgWr3miKpe20&?35(=JEjtmKY!!9#jWRBx- zCRBUn(xbaf=jZb+*ZT#RsHVpu^9_C^GfWwpMGgds?`L~xE!&xA>`QByZh?X7sn}+7 zeS!lf8JsaR2pK$Im8*x62;D2qIac|#s!^KB_{W;RhnIB-*FII7x^+F5dKM9zI?z@8 z!luH(02m|UCo#^vl9M2e@tXZ%)nQ@LxoZH#i7%aKCZLG?Jr0vd38pFC`?}XIdo%Be zKQbS3_TtUu`RkA8>c>AW-ljiFZcj7iIK9X5zmon}mP;J^c%ALQ<@*1my#6~K4EFke z7e%QPzOc*GN$Pyfw8z4m1-I;>FlqG3BpxAG)C*(s@4`%?sUBG=`-+cyIlsJ-5_cK; zSer~hng3#Zlfd;8ui5ms;5(4O!vTXqrUUu%Nh%&~C3Saa=1)>|zC(;7pR0n-|Ls8M zOGm<3OXZ9G4wDZdL#dOJGBL#-4GtLB#5uc+l3p-@h1WQU@toirYKYCuk$NL$DO?S> z+zpFxX)@xoDso*+X(N2o+;??DSF2HC#u#}x&bvDZgGhz1`6mw4>Rjas2( z8yIH*EGoGa4FOLnU7;Uj)vLnB=9)+ws~Oo_oBi+Z?r&CjTGEu;0ZNr_Q>50nNgiGf z}<+d5esLdrZG$7fk|cKULD*0Zw*G90zY zmD>Ir$RlY*1XBu&bEnW*nW)Lg!WH@^ zRb=UgLhe_{8i_*|x}opD$2S+*bIl9Hxf}iq&HM&3vg-Mm>)ARUF-9HcFv17mi8jWv?`;@yQ(T6cx2A@o^es zIt_iVfXxD?N4BO$w4Ii9wZK+JOZC_&MW4LRj>(n2Ycoa~M}!;BW+?FVG11M>3COaj z;nJ?-9eJiTrG@G0=#_RStIxZX6`-n>nan1MOmSXDZ*V!Ng+5x+jLY<>M+#}6lK+oTn&5ctli*AC|Bg@Wvj5LMwfFab?4-1f&ohN45`pRb zwTj96702M50no@N3_4b4IY4y=TLVbO5XSJ_dV?Y~B0gaRQ|tA`yELxK`VT~*Qw{~3 z_d190T-aq32G4yQlrgiu*oR;r!gKsPJSPFGeBV2S=M!A>zQ?~mgi?gdA|{4r7_Uo> zh_c)YN%j(wdMB&UB%?mJK$vg=_IE>BZxzZULhF&10?LA81+eY)o6p))SA&yLT&*3z z6=sYC6A-$crI#T9qS^V`)ude7H)=C7ALdVFpSEaGwQ=@)0Ts_>B+qsuQMU@uQjrao zAG*jl0OUNc_M+2$=6B+uc(4{DN&0l+tZ8h0w33F=Shg)oh2s ztlubz%6|HEfK==`EIQ&DiYJ&Y->)b}glr*><2J$$bX45nyNgcwa9+iJQ#q*fX^Kd; zZIvG{+lt8O+cLE>qurg5z zZ%wg3BjR3-&DvOI{~h;^%lE&Z?C<~FO*w!I#CX?>E5&4Qi(9f`ln~z|!2}}YUZV-7 zmT@3&ou)}7mb^fx*!N-Lha;(jNHBQ`G4>H7b1d|j_8bMCaR33H$V;}LM=>6guh@ed z!lv-Q4lVd4@NXdu#Frc;h_JX44O@ow_Ug+O3u9~?z?*P33j_G|%@uegriL{ktSkPN z=o{AP-*H#`n?9IMy8NH?C!Gh~9MA~4*GVMqKBUGAi{3=W3u}a~jTaW1MaGN&HV)ud z6q7Ka@b2w7HTd-R8+Mst5f7uTtQUvB{fNe6!}z~EfBp9Txi#}PZKHYo_j`k*UTORv zpPt(L@xP05P<3&*xOAM)_GwZ8!w>^sm6av{!qqE<%*mJ`VGmo8H~UjgO+WDw=eska3`4Yaf)Fa`hIvL zC>Iy~`-Czo=}jy1#}SIr3^N?l^qSTR)Fg-0ovtL#&Uh$P48!;i7bzfUDBt02o+GKL z;(Zj}xWv27N5*$BmlgqidA0j0Yc(!N8&)4b8I~AVoB0JOj<^Uh?7`?3hA)TP@3mp4 z(-x{At@66MVHtX>lrB>o<5lvy?3T2}=*yviexC_*mXpTfq|EINiBmxalDGoyY4`yP zA)&Zsqpi!9`YjJ(8Wy2%GXv27Zj=8&^cU-NOau4V?y~aP!zv)(%UM4Zk^C!&EMX{;3aurU`W}28fbR>bywU_hTflxPmN0xZ7#wXzT*=`- zEWlS?m*+K8$<8eJn^>;EC;6KMlPuI?9L8o2_4D&IrPe46uf;_n!v7@W3S&IRF%Ddu zI>oIioB0RJfFAM@kfvRmE@ougO1CeZ?j2TeCQsZZuKC}IjBlB`Me)vsS|e{)a?OR> zer0coxJ7HAlDJ*X|Ly1gwq&Np!BR4%IY94?%3?`@evPF{cQ-qUYc zs5e-fGofyQhz2ZS`0Z{j(n{CK)~qxxN63ZO7w>lLUxHL`_SWmS1`Vmfzr0_)*ofsu zqpm?iYAsyeuU>4#awDDDpdqyuF7H<_He$J@-doU+S_|dg+aZOU>CB2?{RKFSi~KaR z_zo6Cn=JAxPOmf&r~FPkq>U4|A#K{lJBwhxZ!s_RI<$4v#_M{bsoh0X`~CNg@?p28 zX@SB|pVuO-Ng#9RHL1Bb#CkO>VffQpl4)E;*d^mzz{s8EyY-OJG^k-{niMm*#AZ2y?Eik zzrsXN!>v4ybQm&LoBPL&I)l3iqk#J0eO&VNxRuCy36>O z96gHMgs0w~>aQg)Z*(Gc}M6*V-|^fNk~e4s%+ zoSM-%Mf7dxie)s-GrS}Lb3opVoF%?lB)>{Otw1x^)^NBw447`!phcWz_R&&U>}$B{|-*~^Z!mt-TV(K>uS9npl5<^TKiQ(ZJsT3rBk7%>4$%Q|v3HQ)S_yNn( z`9DA3z3%dVS^nRnlaqz~zo#er`=54F^!Y!}_*&=ZnkkuTzz%eJFZ-Pp6bX&6Yo%nHoOh2jbQ)cagiGfn9MdoTMd z@hsKAQ5dtAgmrWeT{D&=*SocJ~4%~lVhwXkcrLmG?{oj#x8T9^C7%) zr`St;oWBes-ewp(&^hN=c3L2;i(L)6g>23tbwJ?OTEvBxLbXHYYmGkf!Rea~Irkvjo&OgZD)DiBjh;TtXea?_!FkWJfl%+7~9;NiKcp8ps_Uf{mCm+5GP>_nHOY;LJb+RSPB z5$~97uxQ>`zUo%lKZd|OwmG5-yRz|Lhuy1s?8=#&+l!r2Y>!>)@;CA-+gEZV?uBvZ z!dR~YHy6e&>%cXGs&?XN+^S@n91nRYd`CjMwoY0Lz1}VcYHwEqbzQZ*#O{3bL!w59 zZ_Sjg!eJ2zf7e)9fE5GkAxz|L4CM-InL~ASqIRMr)}1RJwUW4>wMcvIv))={yZ-;B z`#&<_;o5sY&sNF*etcTq|LOJj@gF-W`u>kh)LGj5(Q^MU3;L8**9f{6g1%-N3*J4jGOHt1^zl-L$9@M`%(k*t~D>KAyN>$+&RdGhywrq8D z*45JU8c_JDwgn@i0va+$ekGDmj7PTBJJ~Xm((KO<$*B~Fdtg^@%k0WhNZFme$^+b-Yv`O@wiXTl^wiaiQah{Q7Aw>RYkQXPb7>dt&`U0Oz+`1(_Z`dn9=jV zjc+5?N(HUWo}YHfo%V`m>-PWB^`E*DXOjislJ(zF|G1q0vDe?{f80&c*MBN0V`%}X zC;xAX{44q{viqS5>kvK1dHvS=N&)37`SdCsGAsIAgpWpd5HDushEis3;ZJVM8|5h8 zB5SJsv5%5r9JLh~h61nbcubi{>m^KgrOQ~#TDSYw_RSwc;`l>Pc@f?P9{ws_AKO84 z!Oy$6d$b(QS2bu>pSfw>`4vNG%YEN!=i^ZdN{a9!7nB+_|Hwx)?zOCH|Eb*nYng#d z>_5AIQuhD%PkN_&`)?Pe!u|tw{bjWss03lDIamU=!RfxLh98=3Po}Io{#9=C`xyT{ z`=osSyMHp+kN=&Ns`0O~@>h?4B?v2R2$le@c+j|Dc zVQyr3R8em|NM&qo0PKBxbK5wQ`25XJ(LZ_jw@EIfDEW~L>#}v(#JiijNycSoXKO2! ziXak_Fs29&0Lt+uzR!Mz2T72ksE1`a@d#6uu}HAd-Dor#jRu;bB%EO8;?DxJ1jQtE zukdg}>1FrT1To=VqiOuZ?TYXF{>jmi`oHh{_5b(!hbKSu4xgPIKI{2@zxRXRJ2~q2 ze*piM?XFZZE)e^{zja%6;=YrDl7tE*2u*n40E9@On2x;=2@zwD&~AvCAR~gK0F10O zR*MKvV|48%Xo>?kHPQrc&fuR~oEpE9wRws{9Dsgk%OSt!0#6&iV>rf$W7FDV8E*VI zBW_5iDNS%9T0cf9`2{mhXcEAz=b$t#fBIg}J9HwT*B~Ys<^h7B zFeQSFk-%{IoWrYMPTjuW_uc2m$4AbDN@6BLq&(<$$3#rBp%>C=*Pz&KK=Be^Ur`qE zz;Pj*VaEkL9U?ZS@~@)0<3j#{3mk_TBjVbbB9aJ163o=+c#23Y`H{u{Wm=T2I{-PC zucjo4d}k@sIn7vz70~slndR(N-1U9uzDLKyFD?3ihT;tKEldDQ^#9@U$x&VZpPZcR z_5Uu)!2!ICV|s<7LSIOw9g>J~2kAGtHh**WNkLL@MUF-|a3^9YP6 zE7VPB)lu^cX5uYM&=@oM6W{<&6EuvmdIMAa3P>XGScCIaJH;D5p;;Wk5Ce)CM$t8p zgbNhMI07V;;+2{;j599OR0V)l15p5iWmr8a^h~GYNEF_TRP$~_^FTO6gewS70YwpT z9FKsLae^ZVkry%nB!MB~_~b~^K1D)JJAcWND8}ozk)<(3k*drgLIS}f-ON)EF<0%O zBvOB0;_JtNxT2WjkYVu-O|e8r@}Zbq9kAX8dEdAkvl(WtY)E$JYb+3nIiMlUG$Y9r zjj^1xh8WUJveY3;;=aAx|R|bIIJ4G7-S@ zqoYH|66k!=FHrw1>q&N=F*?O!f-^2ZE`FST)_`)bC5br*l!=M_;PbTy?_DA zHRA%%43SthF2^96MkhyrSU7P&eR?Lp460)yZ>*rgf9|WFMMtZ5i#t1iUF~pLnmYY5 z8)BCYQRpf%OwGL4k3HQs!-WZVct8;n^^l zDonH)ILADjaaE?xF|4d=Mvbgz#PiG^1_lfLOg=g&#o2uNGE{?8DkTs8Tgq?7aRg+P z1M~`^^^Cm23nQ@eAOeW+2xYPAq@M^EKt~|i4bsLHTn;=zV>zBNJd$J*hB^FC(Sz{k z7tr%g9y_L%S`tZVu3?U~RLJ4tRH*z>k~xm)5XF)!dinBNBXy3)gbT^aPUoAlYFq3- zfv0IKC+_aMpWmNec;d6ztc@l1pWlCWT($rDey_i`|8`Q|Q)vy6kzBJP(X?otAP$m8 zLK-J5O9ICMkcux9F}QAFWxV+E1-x^;F!$c&PvPbU##qQ9!@-TAgVI#i%!La&^G$jZ zW(PdDxp`_<`g6eH=H}ZPNZ)B$Y5aeh;5fyMdm`OrDY#_(_fP!#`0x3>{rKNW`SPXv z1ZHF!0LKDGB*x-8#V@9kE#U+Q@T7ZlE~1}Jj~KU&ad+CP`Qa6Q_q#tFiG0R zwOdw{QzLlV(X2+b_ltHq$eKUTFk>Xb@Kvtdk`PV~)t_W~k&Q;=Gj!Y%7)~Pfw?_4q zH03d%qK#1&$Jg*%hGON*1eB(V2+#Q^*3eabA={7yaTwwdWgG*iQ*2uaiu4h|al`>J ztSu`XDf2>_+Jza%3_u=&2KJM$VT zBZ(M6=a1a|Bk$BI=?_=peaxF+cGdx5x^J#4;cwcpfaMCCgt=|L3NLll4&2;0C`|)c zeb#X%m=Ph@Kk(&C!IcZMPQ1Bs%&b&-ZDyr{ghCkqNs@?O6+Q{LB5|xd33-ny167&v zF-fw|%4+3L!I5=_IHp(Txn-D2al4}IGNvfv5avD+9!_wS#kn|Aj%|?h5~yCfYMo*M z*WKd6C6@MT={Tpn;{YhPU|_zL5AbM&LlHpd9lbE^%g1`{ESEW*Q#tTD_0DZXgPX;X z#-X~tqCC*#EQX|w?oWoZpO`VbJNBT+2aPt>y+%8|L7cmt^}ei(icYJj-=qFtY5qsi zlyJEwHT=|$xs@Hm%l7|Hj_ULOk?$Yv=l@+4+uzXK&6m&B;G6Y^SfHMBNs=glUrvGhr$h!J7RRI zRD0vnqq|J!m-DUE`xTd{rN^Q04ZbH+%mtdJ0VG)*7n@^iwlgc(m)CH^3Iokky{{J& zoCwX}f}sf&@Mu-8KGsCoUTMj(#;;9{+Ds-twmd$vY(lv8soC~j)N{FK5s66vUBfTz z8XO#e5h8KMaN(64CzRn0`@>s=g~w;11HiIayU|=gDft_tS!x8+)$V=UZ&$pT_0%7Q z54m{p>iqQO`&0AdA7`)gA2qk9n{%As;rL%k{~ODN(HL*C9k^WopVZfX&-%~y`hOS2 zs1v!cE7VEuel4`e+?zSa>|Qm z2^jNVjc<~KaTc|k{vLbeF9G$Pga2iWh(D{!JbUt-7 zjEz*j+V61X5ORzu8t6o&LHaA4tS+Nos8^cz ztq*^1Wu^H)Qc=xQoNRU+pnd-D`Tnzhef@WQc)XwgcTp<-zcl6DS?=O{U37Xy^UnF^ zI1WQPO}#v>+(U6XL0;8$pVBA*mL-BraW@at`Ht22ih7NwSVeWoc1ehM#qX9s)Zp@s z4-uwptEl#2*6_M(W+&R@=6^!(z14o9tWW#ML@ ze3xl`$^Lez9@;R=0|E3$k; zq4X;hjW8-`NaFzBzd9?PTV5c^UHUIHja$els+VJ~=i7KNj3Sa?&d(Sf;=pQOgy{th zFR`#6=7GnH(IyEI1jVm$jIJ+mNRx;MaBS0s8KF_}%95Ix%&4H%e;omyH0lG z3#%zBP}fGUwmaE;-leVpO|8OYc1h~0^D=gW%R$Zc`5Zd6iKIH%7u1~(nXX}~ zf3cqKuC=ZL9NM6-F|jOUNA1xXdU8RR*VUxn@?EMWSDWZ7yRwUC`^Qzb?M~M>aCAoF zY>MB?HGYM$x&eDbyaYa#wa@g{teB?V%jev!^0TY9E|anP(#A{94nHUHwRIW`mQ6x; zJ>|@az+I{N+fGP3L$r2G#j?U1L$##+oy;5HH5Fw8)lQ#!M^|bzne=n=TRE$-0MANf zn~mzpB24W-yGBIq3QdcyIXs)rt86s4>)~3A)V6V|&-~f)WG3;qG{ONK^=(P84+t)b z4Y7_G-rVei?;k{2$^S<<&oJBgB>0m3zvC0X?*H>op6&1d*hyJ8KF?K}NCl?L*CrLbMNKZn>?<{`#a*$sfPm2dY#Ac zNZDm$0gqyw)G_lu`H#VW43F?{@Q5U$@qO#ahWMrbqAazI6JtOB;Zev8HW)Gfftsjk)z-~tOl zk})XVF7nF|0P*4k?P^l4?HjWhSq}3DvQJyJsMc}zM+sNYbtKPrBT=^s&ohw?UQ9z2 zI{Ri%l1R%i=%%XGe4Azx)1v{kMx!yKklv`t>k|?3!b>*kN!N zZxp0;KYczx8ulFK9q|IOF&4}BE22%tD#5ZckcUX6E;Yb|WWu5Uqr3n#q{e7Ti=YM;LbL0PLZ~yP6Y!<*;zqEAz_^*)_ zl8n8OGEBL;`@61T-s)NpL&La+<~6Oy{7T#6)W5m&pc>Po%|~_b=rfP$1slRQ0pL)jGqF-F%o2kl^(O6qa<<;Ai-mO$@Zg^;Su?aBe)`B z0{`!^2R|qAHPA$TDN%wHt1Hp4=XkF#K3xdPuyX*f=yXaG_~q3FM1*n28xzr0|7!Fd zZ}@N4RsZG>CgZOBC;!Q3Nw)+vMB!zYs=E)l^Tgvgsxo{`x%{k1gZ>{PgAPx2N7Tx@{Zn>Ynn0pCQaj0 z^5Bj569;o6chsIF$5Xhy(J3FKauO4)QFWa6G|vT5-b<>Li~MP>Y}EI64i=03AaI<) zU@$~{;`{;R6j(rA{1I>=P34B12KEif3v(QSI|3`)ifmu^LFG;`=lul3h{iF!Qk1KU z{$s)g*YxI<<>M4FG{pilo?p}2fSTrzxzm-f;*5tu#c`akaFzptmhu%|mx++tD&9qr zjcdHu`N;VS?$V;5FRyl2WuwLwX@lnDCxaT}F0cU9kp1P=o7d+YIF?c*a0J6^K>9$= z7JF^b=?vEWNRrlgUEQD#eXW!(6U^``d0lo(+I;loKtaFDggMJe6D+H9`Hz-(End2|BoiEA?;5KwTiB`du|5>U1wPwLqx+% zNz+uW6kx>Yv^fFBCLPnl{f)boj`%ckefqlLBD+h zjT^8`hPj-snm@U*ele}pGktBDgk~&ZpwbF$B$oCb{2~Bf=Tdp)DTKCw{ZcGp@ciiL z@OH%29R7m}eA9JhUNe*I%!9wGN zr&B8qmXbHM(>`vMyhHyj**Z&_Guu(oGH-2xFUSi<1T%|@ivu9ID`(l{TY5MG|W*|C2Ka=qExtlwHRqy_){ zZuMd-mbV&pEgI5l;rwp(Vk?%n(wQw9(rV%SZuMd-mRst*ISpyGQ187RQg}O^*$}Kh z2WNhfpJx`|!Gh>Ei~NSuD=owsztawBlf>PUHtXV@c`#qMn3;ML+B#bI4hY1P;J4j*RInK*i`JM%t;rRL~Ao$nIw?C=)CY|J& ztF{T&aRYj{U)gx_rxiI6q6CImnzS<#;RvoK5(KFRU+DC&@K=?D9!=92KmA4mDEdFgeIMRV*D(XL+;clgN_p#%gTJa{i1}7X4 zl(`YrzILt#t|mlkN`_}x&RuzGJiXPd)h0tpM5lHn3-|IUGnL#j(OE4iS}CxG+PENCPccRK=Xz3gBf!JYi_6L}ip{utD%)aU7isMv}1uFxJVEbm;4S zv+}zvt>-_vSdjbslYFLtV2YQhn+HvUbwPkF~#eYslK zDaTz4-;1Q_rhiuHmmKD@j#bSgnAv9p`m-c^M72*r#rWW}be`hEonSSPW;u zXq+Januf}a%F7I2St0_^H{%zH&*sT*(oZYUEVZ@LQ*AUGmA;tdB6CIy#ZB`<3&H){ z6Rb|!<&IT0M4_C#i!JtVkR5B78;f(<&YI1P2G)cb7j*iqat5FlI}w03qwa`n67+rR zzI|D5{x=DW*ER!|&HqRKaXtV0(eZx%-$_|C|AWc8z1R*g(y(;x*9f(Jwy>32gIc;T zMP9>xfkIz`{2lAml`OKH5EHHV-I-^-#nwtiDp&8&7DjxJHrs|=_`RBN_pOBQu`Hec z%lkbxUH&i2|9*IKGME4T+3|k=e<#JB|I3W;wOPNG|G#avFJWkHvT$=85F4wT2b&Y6 z5-!!n1`gFi$ut8FpwoNW@2sFmc#1(u6 z_C8gL72O`dkG`)r9qI>}tzF0BevkknJaf(S?_H0Xuh?4Em~!N9|H5O%@Ix5)s6o}*gap2T|IOE`eJ7k+qW)tNZ!e5n)`1%aRqe#lxK+t?B_8@xkR1u>#yV*u^m@A(sJ&ec)J@g$61(%89})|6 z_|{C>CLHF0$ak%k6<9T(?!!dh#!zmsmL=4{CTb^2V$-?en^qEcvldxj`)sxr*{=V8 z>Hd#Sc)Ri5&kxJvKaNk1pVjw&dj3BCV<*Ml|Ivw>YkNPs|5pn7)KxbKx>ka|VNCTJ zQJgj@O;h+<_}BNeHw)EYV|#xg_8f~G^>XvOYL44M{kKPYja~P~4B@w>s&b3Ax}(DP zd~*gkw9>OXQ2A-L1yf=I8VW~#Ba#n{N50oP*)o&z?Em-4sT_wpU{`O;>{1!``}fSR z0*S3M>_4}|uN>1NE=OUzdl6fV$6ac!;;w*|=$+*eg$l$&Ra6`DM8kN{I%#vx^zM%{ z>uaAF3x1k}>^c=|si2M7^W!eLv%aF)y8XX&{b%kZxy=G_$@=fGe_YT1+w1S||JhBk z*MBA{Z*2jX-wwDe@~`T_0HqA2-{9Mi7>ogEe5cINjIO@O`uG z!IV|U|CA;~(9QM%myG|Oe^NjH-9I_pkN=&Nrt$w)_jU95H-fOzhF}fgiU*DBx#l)J zXIuw!`~AZv4y>U1c6xAjp6WHX9T#Zd3eop1wEMCz`?4?la_jPc0RRC1|B%)QAOP+F E0Gd~W4*&oF diff --git a/assets/rancher-externalip-webhook/rancher-externalip-webhook-0.1.400.tgz b/assets/rancher-externalip-webhook/rancher-externalip-webhook-0.1.400.tgz deleted file mode 100644 index 903c5d654cccc858bc538fd0043312a4faeda390..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 7225 zcmV-99LD1xiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKD3a@#nv==|nW^p$t-jdMfl!?K-W-E7@#;@!yxw_|Q}`eWQWW)JS2#|9@Ai8ApSnkS~26URx7{{XVW0a70m~ld5A7)(#B}wtK<8{5h6Jj1Pk_h$eiv#cyClS2? zF~Kn3AP5RmBFGpC3|CJ%ym)u!_By?e`}Fv@?@XvfW+Ftw{dRjy#3UVh0iCuDi0v8> zukg(^Wg+(+7lIjfT&r8hg{+zj90w^Q;>MXG5(`9P%+yDCiby1>kVgOC^dtLp05aNM zPe~khoTa4ZG-Ux+jjo5oEF-F-X{X~n^qlySN`w5Lp(w?C3kqO~{69KAnUnvgo#Vay z-$gk%fag&}uW^`54k@$)5;E=}{U(#9oTvK9-|z`dqY#D|P{c3_Z-B&H zpeVv2AfW`Wl&nFNa-mce09GA@J_wd#^(2=#t(GG}cr{YpyEWYd;Sdt8T6h8|41wcl z1e}ax972G+fC(Tm3=zjCeTn-N38i-aoW@~<*Y6`uB8oy)nL~&Kf=9ZWCm#SFR3NZ~bg+T#nfcGgo#bhw~*Ch(sLFkfxfDWQxXE zDy<=gB$Xug9Q8~NoqTXkBNE*B@M`piigSiJj)i%3sXF97y#L?;Fq}|M1Z6k53aQfs z00ND3<$7RvgT!N)V!=qj0morNNi3X$%&q`DC4$4iwDEC-NQA?W4F8^DEN45R!6iMgj~0!+JOSsRC>fPeO&R&-XT$Z{)ze|z=QD;!5>3J|hkwsU5dQQG zy57m5V``}-k>utI2e{nzVs`+NIuC*>`b)({!VH7gQzi`EI^AZa9| zal+ErcN_pI_yQ4u>*iL*v(KNwyU+`B?@jg;Zf{|Xg`6@R+z47INo388xu7-Qr6=2L zfd{v@Ps~bxu5q}%{kkU7H(FMj{~sqfN-*P|NH$ptE}8$mlTLO1cRNS>`M;C$`E&a* z%*fOSjs=WJgvCvQpG_rMf(iEFar^exk+qz&Pl;N1n5Bi(uk!CexrrT9&y{MJ#7*jD#4z$dy|hz{!#NlT0tu(TIG4mRmH2<52yrL46@j zc?>A;W0XeG4g8*>Ncl1WC5b}9bN+#K>#DwxeMp2j3~_)`j)BuDwygw(`iS5txYd->*4)|HDFp5WkcH3~^M%T)S<>d=3-I=Qkh$p~U>zAwwptVY5} zEJo1!BX|GETa`-s!oj48Z*C~zuiCMIo^n4h>+_a`20Di%B5K+-rhP!E0tawt(2pXGvhx<9MbFDCjr+aij*fI8&PGTDlr&x{a zVR7LKOMA6&oKxO%0F+zMH{Z$!cr?O+@S*jFUYh>pW4(5k%beDkoOrG3;MRh{&EiPI zP+nhA?rU@wx1^2kkA|`znK8Rt_N2%rjW*T2T06alo!hPTzAVj(RwJuFp!{D+|D$k9 zxLlJOdTPhq%8ub>`+q0>s{ZeHdPjTxzl&n~8|sJo>ZzK1v+fWJ)OD^%9QyDMMI=Om z#ACBGenI0A8K;G}424J_zdGk^f3RmcgYyOc?X3e)*_4Em=Trhi;@@x}+yJ>FMyE=& z*DgKU%Vd6`Z>8KXxkN2F4!LjeEtz62&@}NOPNOK_CR?+gSx&yJh8vU!XrAhQy@=pg zXaeU1jj4b~t5Wq)BVl``CB}mOnz*6d}P@KaqCmF?Yn5?GS4Cs6Cc`!Uf4A- zH~=F=qLks>D>;rS!yAr=w+IT4&jJU4rIB`{xquS#S4PvsFs7^B`?lXMe>3ZNz9J7bYq_LF=8=^qfqm2Bkq)9B%qbucK$$78!%L~nM7c|0_G67@$ ztNBghAWFk#)8B(HK;jU`0{XcOl*=bAc&wGw?X6op$-wyn3@4Ek1+D+vg4V~DZet^n zul74!IfWb}PAbC0ReLlz7E%%y!BqqG#RZ@4-P^X>9< zD77jI0?c`1`>wkm>V}~g_sq?9n<*2ko@l#zZjafP3vbyf|EPDem;XB{_cD+FteNCHna+m$T`3S9IR`HA$ZXXrA=^MW2Vh>v zWnifGjL=o`L07#jZEbD{w6mI#y*2HBdwYLc;rrsI!VWN^bek--xlQu$e5hBN4=oRW zw6c=^4^>q26vvw#2Uw#2Pft&ds_Vbw)9zmX@1m6ae@VjIv&_Z!G9UDkh z62asbO&#M3TXzo&@|syJS22jHz3M>Tbud++-o^v^v~c=uV^9Gy+N<_xapplk*{0>A zTXZ+m!LrFxFeCtCV{1rUa9uSV*o_DmICfDOGR*n2j;H?fEuP8%RiUO9L1iOp!Ue-< z`fMUZ;g?t0S+|ov&~csb2$g3A~uG_KUU>JoY#+;usI>f%!zX*~`8eCyv zKg=SA7lTb=A_$6J;t1Vb;(*2>_u<&a3o}B){FTKu5t-qgf?~E4-cA_i6B>mjXyzb2 z>R4jL+9KIh3T$Pz)X$Ad*vRwz5L@NDb>>Lpj0os-isI0o6YV0vUzd3amkpg9$Y)kp zR)nn$US(Uc{-8=#0Ge94t?QD+RR>+{4wpAIH|BHTR1`^hvM;DRAM0F!KJzL{>Hlm! z*5(zokPK3*an;q}iaJ zEP~XIkgEmMu8_ld(g0`OL6ePiyPmH3Ol_K{`mmnOPezHqrXlvB-?KTvKH0Y@sKYuN zczaupnqSHPLpV<{+xR5#693QfNvBsm|8d&g`+s&)){W0{6+^4QWck{}WWB=-{AY5_ z9T5R7ueH2Ea|YLHkc@ybc;vl62^x}!2!gry{QOlGSL6K+acEUT!DijoAv{v*eJtQn zgySk?-p9@%bPnMW{v95XSk%7n9>SwBUhuvvzdwXZgu^@}j%8nMij9i0+X_mZB`9@I zR>4U}{cQm;EW^}N}O z%=Q^ysfX&pMua5U_v>3KuIuh~!(KP+b;CEU8;k(?KGZ@k&DPNf97m%|bz_XW^PzNl z>46V1ueAO%i{MQcfXm|lI!FEa^S}G^KRYRv`$kHkKi|icU30GHj%s(Yzd5P8d$S2r zl;*#5ssun#R0C-&;RRXvPVvrSPA;`=^XBH!&OjuUN#MQm^W zLLRYh%UPR8=C>8@he`Iact1*6NB<-31Yg?>Sfc+s{ki!6UVnf8<8Dfmu+Kt&zYCea zqKtp&@z`})XZ}xVOaxtjA86V6&rYv9H~;tdfA6Mj76)0qv~vFVr{NV6kG+60Ou4!R zx+-B_>ssH3gmDedYg&`pm8SWrZ*%6o92%m{Np_bS}2 zk7f4Xard}-|M$uM{>R;v12{)Q4!yckN{_a>B^ib(i9!;OAwj_v8e{G`2m01wo+fGu z419v42*wc|Y8gc0@e^P;LW0b&l4I6$6o<|M#CWVPS$>o-JR+ZP2-ieR;C~%@@M|31 z0FBj`5+q2lx)KX}j`#BNB#b-Wn25IeSA*|(!+){1`Zs$p z8Moy>*-t);+eJe|6kMf=y8Dhhk3D{!IFG#{x^fMCe42FnLoIik6 zfqAQoKLReKsa$iXy?sOO!W=i?j=;*cA^X>3P`VS!c{{-{qESSz73S)q_lR)8HNIJ8 z`8YugO|ig?XV-MrfTk&A?(`%qKPq5AaUAChoM#O|L-_(Pi$pk074M_S&NbZYeB^uq zcWF_rFRylAWuwj&YJ>Vy41)^cF0lYqll|kxtCtrXIF?)_a0tU2K>A$A7DsK+Y7N%? zNTODIUD=@8`dTSHCYa$>@_OtRwfX4FfolCe6Q(RjO|Y~|?K>i8f($frCD^m@13@9> zc+F1NE?XM6B7|vBZhe~>VE*?y`Cl|@HECZOuvK_9-E%s~@j6eV2tpcMNt~u~r2r#F zr}YUCHW`=(>Tf(`)gx?mjeM!*eK1JMuOQJU-|nqQ)a+C%%h9ahWfHQ~eAbAU=A(N; zY70YFoNrub$aE^B;@d4DQ|)}vTAbae5orrSfyNCrn-LUf44FBk7WCUk(D+Y_WQfc0 zs`!&@>*s2%n(1lFDAYp<1C>^0Bet~n-c>S04ODEmz>Z{!QX>9(pmN%q?2|@F+{EG^F%O-8Z59PdcuU;Spvy4shla z_av zoh>0ZZw=HUw=4a>zV2Ta&CEDhil#OP_`RXIUDRyjpb52mHwPqY<3I^7OO{pB-_;?% z6%Mtmf%_>EKb^2|TLYM%758+mIxk4lLDpFfrdfRmlGG%{+ctvTPG@>==;_pYgQe(A z?X-VeMenHdnrt7vEP-G?ezoXb+oLCi9GjsnIuGw}^m6pF@mp#1wv3@fueb5&*@yKP z8?4QlFt>n21C%iMe7g~9mFq+otTZl$D1hhZuXgNTf=q69HygJG32C)|aldl05z0Hw zx&{ep^>A^&a=x4l%r&%&ZCCpKE7+k)LIj z-ob+CE{pt{(<=?g8NbsGag)g15jX4pmicDBY%w$OCb+fC#_MLRX zwIBcfN&e@D0U$O`l^rH14D29Ya9 z{F9~%8)@Z9ptDGa_tr-r9$7yQzr|RtO-e)j7fKR$D=}b8L$NTuNos|0c zFFV=`aTDxS4$XRBipwhe_t)3gUNFO<4jfZa|G^BmOSRjFj&o+kn`9E4a6nMx##8&+ znHad95Gg4co?)rGveamLt67UphT@P;?MN2xWl?4-xnZoc8dAm`DGj)h!I9C8I_xD2 zh!Io@Kc)B)FNMbpZ?aEiuY-lxiVg~4>Vb;h%8?;a1T>CrbZ-SV8cR&XL~ZTG|NWo; zB~)f+tN$lJ8Cobbmf3%&{p$J8es7=uc{hcpL|`A@VlLo$Hq>xojkS}X16C<3 z7p4Mt6u-ziMEF_QDZ_Dy*`k&K5a&3*OauR(qR200{w;j@*)_U4`}|6&s#k}^N`|81 z;bSWDT**Lm+-BposL!%nvCT09-?}ev@f6D|nX{sjg6edq@IfDBUD9uU8TT?eW(RCN zE9*;%qQ&+7OHyr17~6|cs@$9C0^x7cr~*xv-THm!gJ);A&cnIa8M=I&vVpV4aFPZ;K<-e8tb3LhFlqK@N*FCM?|JCd6 z^FQyV*z!MHDqqkD^Rn2lW&p1h_Hy!>xms$+U|gpc8W8T? z9bt9SE_1B1Aqu4O&bQdVLUOEOZY<7aI;%G`YDg2LT+r#)N*RDk?1T^6jJhYP$)+D# z_U+4h`rjn1UE2&;rvLk$<7)oz{^?%-@1!i!|6sB%FSY~hOz=%>zuH!twS_IzYQ)k* z3Gxc`3k3QS;O|+cu4IvAh?r=_Z_YgHF1A)mT)FyyHW1=lwAnVK!jEdgJ+u&hz_L{T z7x#N?y8K_F|GP&gC)NB<-P4oPz5d@tvGsqE@w=k+EBW7>w0+TrmL>}~#{sdix_PiZ z-zMQwTx{S_&4o;T!#=dSPkOBt1PM=Y;ALd+)UP6q^!v^S53w2CHtUs_8tPI=ahVGs^EL=MOSDZGgKg0$gIxZ%Llizqk2*6^Ua6OfGQr z5!r_nDOPm54?lN0defnLklEUG%fVxo3;HBmPe%S-IeuYO7_ zkl|Z1W$R#=Z$!RptgM<<6Y3#Mf1=|L`ZC^E52$WaX)L3^`*~dYmx2x z|CjFn=!CZ$@BRF=JpSYO$4(h)<&};0v*JcR6D^{gjwACFI z9j{}~00&ljb_Ys7vlOYs1T^H1{8}KtGa7Zg?#Y&klx6>aNJ?ce+yl9~TPByvxZitV zdgVZDm04u=T!DK>12Oy;_INiari&jz{axq(vNNyV7+m+L|p2usbuN@I68-B;J~ zLzC^hDXY%^DUFGso9zQGng89+N%j19@8ozt|94XA=KpIw*7ft>Fv3b3f|UkWJZN0a zHMik8<7zW^-#@IQzzU*orw3=}v0iiAae?$LA^p%yyD$5)FZ;4DcP{@E00960Q1>D? H0PFw&w2xJ6 diff --git a/assets/rancher-externalip-webhook/vue-rancher-externalip-webhook-0.1.401.tgz b/assets/rancher-externalip-webhook/vue-rancher-externalip-webhook-0.1.401.tgz deleted file mode 100644 index 742c77c0d9407a29ed713af052346ebff08ec1ac..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 7229 zcmV-D9Kz!tiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKD3a@#nTX#eI@oGZ`Vo8*QRC4Z$^H&Zv0cxJNONxSS!Pfev# z5kx`~+7!VCKslboTl*UOdix|>_#g>V)CXl*PSQeGr7aQ!&KC|24i0c;8Fm>;!U<+B z{vlOFn&3pNYyhR?7tA=JNdU8+gVMD8>3coz$cZoy8A*kD_Qe5sh0~bc zfS6#IZx959DG_9h1cs|;9A5r%=Jx%*?>;*|K5`~hA~g{r;I#Z z)4l%RML9Tt7jaClaa3pwskB29G43G!CfDY#&tJ;N0dzXf!2!I~Ged|3<}k(yW@;XR z5oLwK39UM6e!)zIVun$4 z10>-B#W9Wm38iqQMh)YP3pG^%VAVksfM6L`PYNy5={ORE*CW-v+t57_4iVw1g{Od` z2sn;Mz{xnl5roJKnE;Z&5OI8RBypc2p{ATaXGs*}_I+e&Oi`pNbBK^Y@JM&_6hzEb ze<+F6-&gqNF(9rm<~U?nyhT$i!I5+*CRYcnw?WPumt!`=%#|HUcD}*_k(dJ-(o7SQ zOwkz2$!drp%_NCEM?I6QlMl{mOv0N0UXR{Van3Nui7>A&Rfjx)_a7VphEvLkpzNlw zBAT>6fI#D7Qav!TL6R{{v0x2RiLNS-bO(_!r zJUco%bS#0+C;I~QPqLmQ=Q*QOEG9VP^5f#i*(cpl-fW3t-UQ0TM1Jt;#)Eeg!hxo_ z{QR160ceIutU8xt5KW_#BS0*iIG{c~mtO|eF_CvxVBtUW)z5;_>fK^y=dY^_m!*m6 zSJ@D|Y=}ZvpjVOz!Xnavxoj0QalXPEP$TxPmBJQ2sC`w zZ~pAy0N&CFLyU$v=8A?XjR0{u+NToTg9Et0qtZB&=&%F}%#{sHL*C6eX6`s65$+~5 z!Y;=#4keem&cT5rA6=>^lm+nlR<-!&7cU)26A5U|)|6`Y{O@YOzfr(zQm6+8KLuyQ zV5$(&Cg2?LY{FHEHb=0ssu?x1o)OP;dl(of^fUSBpcH5G>5EVePN|eU_%|uP8OITj zQQn|e2(4%26`mV`oo^z52#-(}D<=I!xBxl=Np6r0vdi&Me!M~UV*rb84x+u-~RmW?9vmTMEgEg*nfWi^tfvO_5IWS-u~N3c}Jx+L`HJ0ibT_5b%HoZ z8VPBfuq+822S6&mP{iQ6g_ZIA^Jnlb^upYGn?HryTNq;@hYSZdh7L+oSu+LS!R_r+v(ley9ByyFu7UK8mbJ(K#|e&8%(y4gwoAbk;QSJSr9S*YQ&oj&zi7e2k@{PM z`cj(m7*Ns2D2wA8_$@=R@?`=_Q-y@*`~&OORed4*kO*-Y;t*vV1E*7LTL}vF5y5f9 z0WqvCD;z2FLYm}{hT84->g}bhD;F<3#o^=iC?w&mQt1z>!{GV)kn11#{JEgYrCBH5-a2Mhs=PL{Qh`DtjQ=1>M6U~<1YDCiR-S~Mqsl;4 zW_(PN?31!u`BQLYogt3twRvtCrc&IlDZ7d(ia3P1PlSgP9A$AXj+A4&$$1G>FI}}x zu^QKGap4L}d$n|$Q{Hg^luIx$-^vGgG{T_>p!1eqn*QZuy>^z%oX(jXc%3?P8^Pda zain3WuCFK$G&+l0(nj}3L)nkanB5(FP~?L~o9bSpo!%hM-A=nNE2E;bRMa0(|F1p& zqi9OFT$dV}YUkWqj^S1NeHKoOm3qJ861DU=6u!ZCWQw^!(=>o2i{oN@tYts5f_!-mH>?oQJk|So zF~Nz@1TF}gPyvtDrRrmigzc4<6l?t2)Tqs5@?*>6Bg-a;Tc4V3-$k6uJ&Q<80_Ylg zVb{Rm0E`fcGlmPVz8W`VGY z{vVPgBFT8|X<(KAuiy9U_P>9;*Z(^y_cD(EtOevd8O}!XU8xWqDgPIEWVULRl3hYL z2Vh>wKLL!{}q^VsB9!l zxnLMgpHGBHgKoFiKUEF%ni?oEHBEIZZN+pfC>IfC?0FGZoxhwt@A<_89YfyN+(%M<0jWPsQg&yT?N$OOXRfw7n3S5IXxdzI2 z0!oKK(Fvo1hBOY~-OKahx#hl*)TRGK(|8FQMfGyb^?Vx+hEYTk%=tN^LmXKBi!i;U z;T0D4!#rYmG1w#_f}r>nj?v8}4rvnc0FG_EFe5Z7URhETlNsJAC}un1-GpI2p>b4! zW)9Lr-%=yi7RjbsU@N1gd2H0eMqU($*J|Ij86!(aL`bJoltlKJ=#~Ngy3A|1oOP0s z&#kVk2wNMx+O}fzL6y1!G_?vl*CnZ|4!YPKu5N0M=X2oHCX(u4Ur={G*0~0K?p2i9 z|9LyzUF%&%CM;{c#l*6Z9JNO+^yC7T*VUxnt6ixj*PG}o+o_9Z`^QzX?M~M>P;^G) zY>MB=#d(FWx&wPByKH|IVNNEr45&y9ez&Y8|xSqteS-G zd&-#;f%{VPcb$-S259YkiDiX1##l-FJDE4YYbwfaRC{acjIPvZGU?~!w{pm00i2bP zG#k{DMUdJNa*cr66$&^{mcZF`&}5^zT@Tk{q%Iq$`mmlYPi7K-Ln9o(QQwvX`()pu zpbqP7;O%WSYJP4158*t+Y@?IFEBrslCw{*k|9y12_y6pqw2jYll|ZY&Wck{}Wc`8} z1kdG~J0=1;UT1ZK<_xaYAQ=H=@W^|KQZytn5d?GZ#rf+zuEzTt;?Svwg3WrJ$M8r^ z?_&XvVw}_=^FI2I!G8>o@Ne*lB%<+s?=d_Y;|1?~^83e7i*T5S#IfwFO|el?c3VNo zUx8BZWF4Gz)ZZ2mQ=X*$ZZPYugP8_sGt}~iir`4q*!K7qi}u(pfXS&E{ReP~g&@fo zlwKG4VR%5iI6=9dlqoV`)P)pH%mvE4|-t+wZxooz3sA&MOU zJ;$59$b6siwR)%?Y(z+sf8X9xab0&mH|*zz{oL?P&kaU_d>_+7q0QRN2pq?wOLb$6 zy7QrOdg*}=F|WP;GYjEO7J#eb|NO(F`SZW~^FKQ&wfjaYp+DcpkZn0u3rDrP*x#Ji z-M#tXXmDN6`*Q_iV=Pv?y{i!c8*KmIq&R?%i4%K$-l-qPYS^Zz2l0KMB2nyil*fs- zA|kdof1!+6x8<~!k@;w4MKvc7(Sw16Iuc{?T0g|6y-`|Ko1TGG(8K z{(cuae@z|#(EQkSX*>R>G$Dev+Xq^8{?qUG>f^uP-=F{4N!ct8vVLjh{P9mCCnOnr zA!V3yb@Ovw!@SY8z7GxK8k}2NllhgV#i?&|=DivkqRmNl@8o?13-67--)UK)|Gf#0 zr$pVYuz4S=?7!pQ@!b92`}-evQx4!93CVVKrIhBhx+NKg8Hpp3j3Gtg6&hpiIS2aI zVV8YxgorTicw-{E>R%1M;|>4C zy6WHj!DQT(|KvaUEa{dF4N-WNrRwfG?mY4Mb?Q9vhUm(9;)!YMJoyjj0DeJ?(2T?D zS7+Rj)8DT+6plwCjJmoWqrZNO#^Z|de{uHW)tfVK8r`Lj<>SBKJ36e{f4!6Aof z-$glSx;k22J1xzm{8D(wQ3GGuRr>zAu)JY0KPCor1cUk325Nwl1a4@??3)yg&&h+= z;{R|kH!?@dlcRVFw%7W~f2o|r1Zz+o=N-*+0hISrYULt-nk)PC{f&dgB0mTmXD}EH z5uZ4J06F~?tuFouxR9oD!=3i_4Y><*+<-d*E7OMTU-O`HCzSJUf?-7Cm|iQ))kW_y z;eu;?^UCsZiWr(=ff>)Q>1+T^Q^?%uNmy}Iz<}a7&KEe(8-gX}3%n{5;4G_nA4PVq z;coMh^99_MMYX=V+I^LcI#;L-noltdYJ|JQ0#HNtkC(4sU2x!7N|C@33~vDGa~)gc z+Mv@JwEak;)_7gnpx%0`lpYhz@H%-tc8l74^yNUcexC_bR--0ZR;TtIkuyOC8o3JW zdH8{#ka66y)7E86d@Dnk2G!QLnE~d1x5@vaQEN#1vIJX&*Rp#~2L)c|SsX(|!z+o? zRIU_Y#OSm+0m3GXSwj7dSyn&7*3`(Cdfo?vr2Gm}ee&(zibTy$wXzz`8eS$LOT%YN z@zQd1Pe^TnW##$CHZ0SrjLL7fgiO8jL1%Gxqoqh&2nsY_Qgbw8*#h({p@hM+qoc#S zAy;$w4=U{&)|Gj!OtLEv{-TyE@LvBW$+!r;7*Xbyt$uivr&JnJdZq50Q2r+!SIF=P zGn|AtcZz!xF^vyaHTqbNfIRKiWIiL;R@gpwNOaIZnKE&gy5@Z+GQMT(=Eb`dY74zx z$+Z+}|CzrfSOO&sKHqMHTJ1W~1uKngly}mZOEjd_!^QpT#idYgiF&BE`$ z+$ke+YnZq#Aso(|^KWR1$JDO=JA@D+!?Z6FhnH zj-*eX1n^IqDQu*bCxOl*9o}0XeRyR3c>FEKa&1yp#DAeQb?+Plwle;|p8vaddU&{x z|Jq4uj{mZwy%0CSUe(a7_m#M;(tm$_eeH!a9O=L@74;v^aJN#s``B^Ltay`LgA)!2 z%G`KrUprR=*ApT&CBri;=dL_8n%-*GYLlTPqEkDPg?o9FnM!V$=&Xj6aYt$cZgg;L z=0+X%k_W^HDwUs__z|y!#|&@sPi3!zh1ZG>N@ePSiry-aA#n^eiEngoB{mvMOvFTO z?Ir*HpZ_IPW@fAZr$8B8tK_aWswx|?3AIxJZzvh#Lf5Mx9{IRJ2hVY&;+|3_^|}sn zAvAdkI{lOS;BQicYaO6t$#T)~elI%mdoC;Vzgo(v>rFPf_|KG8@&AYY`u%@?-`~go z@1ztA4!}8p=CDD>g&AT*8fd|yD(2i)052Ni2}4sQDx*Y$4T2Ag6l8haIu}+p# ziIaV3ihf&V<@rx87UX{ZDBrE67FOARr$_bkpU3__|MPAN&xpVQyu)0;i=54HVe#21 z&H$^Fl?&5=J4#k$9U_7}?3Cdo!fa8?0Ely3T&974%TOFtGXIvo{QMeSoqc|-RMqQ4 zVkJXS@$d;1MXqEZI&O36wW!bYTd~bCgTT5kZ}IRdDw(sQl7i}VrwBkFWL?p3aT)h2 zI_3v#JuB-=g`(y4{VP&!OBlP0QL5dW=mOzyv$zILp56Mr|G~4fTNmNnZCF?EDQBF; z%k@~N9Cu6TUL?&n{8@)Dd7G;kvzinYxi=6rleLk_E5`p?`rpd^xxUsf%L@J9@154~ z|LULa^FQyV*!n+TDqqkT^QzjfXa8;sJu)Rl_eqoeZhK>KWiTSCjGPq&Qe<|J+%yHqtX|nTqIyvf^pNl zums`$-4RwN?Q+K|8=_E7-o+OCS4fT)=EmY&rn6=F_UpZ`tL+E!-3s`>xOKd$Hh?w{=E|DBXY^FNrZ%Zu#*I}7}>wO?ba%V!H) zsWqsjhf?G<=ocvT6~N!KPF>3)%Mmfrir<`h)>~|?RHSl!hAtt*w`j9%NQK|43HQ)S z_yNmW^M85A$0p1F74v`Z@Z_Yv|I&usPo*;Zj{};7~1;Omo8lbb3$woi!8*PjTqwWbo9lGL7_m|AU9vn7{9RsH&M| zSw?$L`)koG*T5-d;%OzNpT4Zc%3-%;>RzRk^GUZYf$vN=*+)$`FY9l!PSgcu@BJEg zN-uXcbLWpoM~B6`rD;a%S9PxooyD{|R7KlY_$Gjkj&YL{6Xl%}VuOLsk632g#iJ1p zMF5?*^fH{_D2s9VlBQUNc?8folTdbA0Bnoh0&puy;VBP5!PZ*Dm82SD`fC&RLYvt6 zD$PBeb#_UuSTL-ST}znN#HxBaPp66Qve%sQ`@#7;8Jsr2y)^-@i08MYPnzG`a=(to zF$$(oIQod}L#h-jx;=m&eP3@n)DJRSyN<>EAOS>p=9=f<#*kOA&+lah79u;*B{`W} z>XJ5dT6x6>6L(lN-&wvEt+Kxjf%)3zh$iUj#{VMdo-Ky1o&dhR*crw4wM$+3Mqg$A zOpnC9Fz#F!7puU#3*(k`;D$j}J8?8_RWe-(hrSeKM?$)>PTB~(-Yy1eZ&w3#Q?V9!~z|@HB+_;hWSS1yQP&?vuZ#+go(V3q1<3C%T@y$shuc^P3MZQT1ni`TBN=9 z*=#McUH|`D`#(DA?M8b)Kdg@bI6gT(t>=F|?d{_~c2ey9ADyVVw)dlXzgEzvuDU_c zwG#9VW2#$3aoVUfP2sKJukUGZ7OLN3dw(JH9E%+Ea`U@tj@v=~cL%z~u6tvK@VjDF zxkX#uQQ>>OIRhM8>De8q{LE9N5);r+IPx2T{LX0Pd%cq_6DiOB|B#f*VYml!^|nkd zm2toS!1OAB*eb#P-*)JgLt4b;C}?*tVvFIpPt8@_6|fe*vpk|uHSxVFstswP+xV_^ z(&m)uJsf4)Yo8bkewKvnCKatz(8lEXahKF-uV}Vz|F5?3{@AaQU=p-72!@iV?s&BBOj;yiwkuu7QZ976Z*AZF zAtX*djEooIbrRuE+V!y=Am{wN^Sei@!F;v=%;qyUt(o62gtpB4Ry!YGrJ&>hf8~O* z0L5siB-ZR|g!uf=U`2ClIG{QgPZ|9^PoAMWkHU6cm<56tz)&32#>f|cfAt+6|t z?rZA!p~?2$ls4mkN)sYz`+dL_z3P&3$$+q>4z5Dec6|N*_VB}bNQbD00960 L>A26e0PFw&NY{9* diff --git a/charts/rancher-externalip-webhook/Chart.yaml b/charts/rancher-externalip-webhook/Chart.yaml deleted file mode 100644 index ec9be7e1a..000000000 --- a/charts/rancher-externalip-webhook/Chart.yaml +++ /dev/null @@ -1,23 +0,0 @@ -annotations: - catalog.cattle.io/certified: rancher - catalog.cattle.io/display-name: External IP Webhook - catalog.cattle.io/namespace: cattle-externalip-system - catalog.cattle.io/release-name: vue-rancher-externalip-webhook - catalog.cattle.io/ui-component: vue-rancher-externalip-webhook -apiVersion: v1 -appVersion: v0.1.4 -description: | - Deploy the externalip-webhook to mitigate k8s CVE-2020-8554 -home: https://github.com/rancher/externalip-webhook -keywords: -- cve -- externalip -- webhook -- security -maintainers: -- email: raul@rancher.com - name: rawmind0 -name: vue-rancher-externalip-webhook -sources: -- https://github.com/rancher/externalip-webhook -version: 0.1.401 diff --git a/charts/rancher-externalip-webhook/README.md b/charts/rancher-externalip-webhook/README.md deleted file mode 100644 index fe3305025..000000000 --- a/charts/rancher-externalip-webhook/README.md +++ /dev/null @@ -1,65 +0,0 @@ -# externalip-webhook - -## Chart Details - -This chart will create a deployment of `externalip-webhook` within your Kubernetes Cluster. It's required to mitigate k8s CVE-2020-8554. - -## Installing the Chart - -To install the chart with the release name `rancher-externalip-webhook`: - -```bash -$ helm install rancher-externalip-webhook stable/externalip-webhook --namespace cattle-externalip-system -f values.yaml -``` - -## Configuration - -The following table lists the configurable parameters of the externalip-webhook chart and their default values. - - -| Parameter | Description | Default | -| ---------------------------------- | -------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------- | -| `allowedExternalIPCidrs` | Set allowed external IP CIDRs separated by a comma | `""` | -| `certificates.caBundle` | If cert-manager integration is disabled, add here self signed ca.crt in base64 format | `""` | -| `certificates.certManager.enabled` | Enable cert manager integration. Cert manager should be already installed at the k8s cluster | `true` | -| `certificates.certManager.version` | Cert manager version to use | `""` | -| `certificates.secretName` | If cert-manager integration is disabled, upload certs data (ca.crt, tls.crt & tls.key) as k8s secretName in the namespace | `"webhook-server-cert"` | -| `global.systemDefaultRegistry` | Pull docker images from systemDefaultRegistry | `""` | -| `image.pullPolicy` | Webhook server docker pull policy | `"IfNotPresent"` | -| `image.pullSecrets` | Webhook server docker pull secret | `""` | -| `image.repository` | Webhook server docker image repository | `"rancher/externalip-webhook"` | -| `image.tag` | Webhook server docker image tag Defaults to | `".Chart.appVersion"` | -| `metrics.enabled` | Enable metrics endpoint | `false` | -| `metrics.port` | Webhook metrics pod port | `8443` | -| `metrics.prometheusExport` | Enable Prometheus export. Follow [exporting-metrics-for-prometheus](https://book.kubebuilder.io/reference/metrics.html#exporting-metrics-for-prometheus) to export the webhook metrics | `false` | -| `metrics.authProxy.enabled` | Enable auth proxy for metrics endpoint | `false` | -| `metrics.authProxy.port` | Webhook auth proxy pod port | `8080` | -| `metrics.authProxy.image.pullPolicy` | Webhook auth proxy docker pull policy | `"IfNotPresent"` | -| `metrics.authProxy.image.pullSecrets`| Webhook auth proxy docker pull secrets | `""` | -| `metrics.authProxy.image.repository` | Webhook auth proxy docker image repository | `"gcr.io/kubebuilder/kube-rbac-proxy"` | -| `metrics.authProxy.image.pullPolicy` | Webhook auth proxy docker image tag | `"v0.5.0"` | -| `metrics.authProxy.resources.limits.cpu` | Webhook auth proxy resource cpu limit | `"100m"` | -| `metrics.authProxy.resources.limits.memory` | Webhook auth proxy resource memory limit | `"30Mi"` | -| `metrics.authProxy.resources.requests.cpu` | Webhook auth proxy wesource cpu reservation | `"100m"` | -| `metrics.authProxy.resources.requests.memory` | Webhook auth proxy resource memory reservation | `"20Mi"` | -| `nodeSelector` | Node labels for pod assignment | `{}` | -| `rbac.apiVersion` | Rbac API version to use | `"v1"` | -| `resources.limits.cpu` | Resource cpu limit | `"100m"` | -| `resources.limits.memory` | Resource memory limit | `"30Mi"` | -| `resources.requests.cpu` | Resource cpu reservation | `"100m"` | -| `resources.requests.memory` | Resource memory reservation | `"20Mi"` | -| `service.metricsPort` | Webhook metrics service port | `8443` | -| `service.webhookPort` | Webhook server service port | `443` | -| `serviceAccountName` | Webhook serviceAccountName. Just used if metrics.authProxy.enabled = false | `"default"` | -| `tolerations` | List of node taints to tolerate (requires Kubernetes >= 1.6) | `[]` | -| `webhookPort` | Webhook server pod port | `9443` | - -Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`. - -Alternatively, a YAML file that specifies the values for the parameters can be provided while installing the chart. For example, - -```bash -$ helm install rancher-externalip-webhook stable/externalip-webhook --namespace cattle-externalip-system -f values.yaml -``` - -> **Tip**: You can use the default [values.yaml](values.yaml) diff --git a/charts/rancher-externalip-webhook/app-README.md b/charts/rancher-externalip-webhook/app-README.md deleted file mode 100644 index 38c317119..000000000 --- a/charts/rancher-externalip-webhook/app-README.md +++ /dev/null @@ -1,9 +0,0 @@ -# externalip-webhook - -This chart was created to mitigate [CVE-2020-8554](https://www.cvedetails.com/cve/CVE-2020-8554/) - -External IP Webhook is a validating k8s webhook which prevents services from using random external IPs. Cluster administrators -can specify list of CIDRs allowed to be used as external IP by specifying `allowed-external-ip-cidrs` parameter. -The webhook will only allow services which either don’t set external IP, or whose external IPs are within the range specified by the administrator. - -For more information, review the Helm README of this chart. diff --git a/charts/rancher-externalip-webhook/questions.yaml b/charts/rancher-externalip-webhook/questions.yaml deleted file mode 100644 index 8b0e19040..000000000 --- a/charts/rancher-externalip-webhook/questions.yaml +++ /dev/null @@ -1,7 +0,0 @@ -questions: -# allowedExternalIPCidrs -- variable: allowedExternalIPCidrs - label: Allowed external IP cidrs - description: Set allowed external IP CIDRs separated by a comma - type: string - group: Configuration \ No newline at end of file diff --git a/charts/rancher-externalip-webhook/templates/NOTES.txt b/charts/rancher-externalip-webhook/templates/NOTES.txt deleted file mode 100644 index 74271bdd5..000000000 --- a/charts/rancher-externalip-webhook/templates/NOTES.txt +++ /dev/null @@ -1,3 +0,0 @@ -To verify that externalip-webhook has started, run: - - kubectl --namespace={{ .Release.Namespace }} get pods -l "app={{ template "externalip-webhook.name" . }},release={{ .Release.Name }}" diff --git a/charts/rancher-externalip-webhook/templates/_helpers.tpl b/charts/rancher-externalip-webhook/templates/_helpers.tpl deleted file mode 100644 index cc8a9a0d3..000000000 --- a/charts/rancher-externalip-webhook/templates/_helpers.tpl +++ /dev/null @@ -1,50 +0,0 @@ -{{/* vim: set filetype=mustache: */}} -{{/* -Expand the name of the chart. -*/}} -{{- define "externalip-webhook.name" -}} -{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} -{{- end -}} - -{{/* -Create a default fully qualified app name. -We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). -*/}} -{{- define "externalip-webhook.fullname" -}} -{{- $name := default .Chart.Name .Values.nameOverride -}} -{{- if ne $name .Release.Name -}} -{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} -{{- else -}} -{{- printf "%s" $name | trunc 63 | trimSuffix "-" -}} -{{- end -}} -{{- end -}} - -{{/* Generate basic labels */}} -{{- define "externalip-webhook.labels" }} -app: {{ template "externalip-webhook.name" . }} -heritage: {{.Release.Service }} -release: {{.Release.Name }} -{{- end }} - -{{/* -Windows cluster will add default taint for linux nodes, -add below linux tolerations to workloads could be scheduled to those linux nodes -*/}} -{{- define "linux-node-tolerations" -}} -- key: "cattle.io/os" - value: "linux" - effect: "NoSchedule" - operator: "Equal" -{{- end -}} - -{{- define "linux-node-selector" -}} -kubernetes.io/os: linux -{{- end -}} - -{{- define "system_default_registry" -}} -{{- if .Values.global.systemDefaultRegistry -}} -{{- printf "%s/" .Values.global.systemDefaultRegistry -}} -{{- else -}} -{{- "" -}} -{{- end -}} -{{- end -}} \ No newline at end of file diff --git a/charts/rancher-externalip-webhook/templates/admissionregistration.yaml b/charts/rancher-externalip-webhook/templates/admissionregistration.yaml deleted file mode 100644 index d8152faa5..000000000 --- a/charts/rancher-externalip-webhook/templates/admissionregistration.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: -{{- if .Values.certificates.certManager.enabled }} - annotations: - cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ template "externalip-webhook.fullname" . }}-server-cert -{{- end }} - creationTimestamp: null - name: {{ template "externalip-webhook.fullname" . }}-validating-webhook-configuration -webhooks: -- clientConfig: -{{- if not (.Values.certificates.certManager.enabled) }} - caBundle: {{ .Values.certificates.caBundle }} -{{- end }} - service: - name: {{ template "externalip-webhook.fullname" . }} - namespace: {{ .Release.Namespace }} - path: /validate-service - failurePolicy: Ignore - name: {{ template "externalip-webhook.fullname" . }}.{{ .Release.Namespace }}.svc - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - services \ No newline at end of file diff --git a/charts/rancher-externalip-webhook/templates/clusterrole.yaml b/charts/rancher-externalip-webhook/templates/clusterrole.yaml deleted file mode 100644 index 46e18bf00..000000000 --- a/charts/rancher-externalip-webhook/templates/clusterrole.yaml +++ /dev/null @@ -1,33 +0,0 @@ -{{- if and (.Values.metrics.enabled) (.Values.metrics.authProxy.enabled) -}} -apiVersion: rbac.authorization.k8s.io/{{ .Values.rbac.apiVersion }} -kind: ClusterRole -metadata: - labels: {{ include "externalip-webhook.labels" . | indent 4 }} - chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} - name: {{ template "externalip-webhook.fullname" . }}-proxy-role -rules: -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create ---- -apiVersion: rbac.authorization.k8s.io/{{ .Values.rbac.apiVersion }} -kind: ClusterRole -metadata: - labels: {{ include "externalip-webhook.labels" . | indent 4 }} - chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} - name: {{ template "externalip-webhook.fullname" . }}-metrics-reader -rules: -- nonResourceURLs: - - /metrics - verbs: - - get -{{- end -}} \ No newline at end of file diff --git a/charts/rancher-externalip-webhook/templates/clusterrolebinding.yaml b/charts/rancher-externalip-webhook/templates/clusterrolebinding.yaml deleted file mode 100644 index 2fa40817f..000000000 --- a/charts/rancher-externalip-webhook/templates/clusterrolebinding.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/{{ .Values.rbac.apiVersion }} -kind: ClusterRoleBinding -metadata: - labels: {{ include "externalip-webhook.labels" . | indent 4 }} - chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} - name: {{ template "externalip-webhook.fullname" . }}-cluster-view -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: view -subjects: -- kind: ServiceAccount - name: {{ template "externalip-webhook.fullname" . }} - namespace: {{ .Release.Namespace }} -{{- if and (.Values.metrics.enabled) (.Values.metrics.authProxy.enabled) }} ---- -apiVersion: rbac.authorization.k8s.io/{{ .Values.rbac.apiVersion }} -kind: ClusterRoleBinding -metadata: - labels: {{ include "externalip-webhook.labels" . | indent 4 }} - chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} - name: {{ template "externalip-webhook.fullname" . }}-proxy-rolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: {{ template "externalip-webhook.fullname" . }}-proxy-role -subjects: -- kind: ServiceAccount - name: {{ template "externalip-webhook.fullname" . }} - namespace: {{ .Release.Namespace }} -{{- end }} \ No newline at end of file diff --git a/charts/rancher-externalip-webhook/templates/deployment.yaml b/charts/rancher-externalip-webhook/templates/deployment.yaml deleted file mode 100644 index c82754deb..000000000 --- a/charts/rancher-externalip-webhook/templates/deployment.yaml +++ /dev/null @@ -1,107 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - seccomp.security.alpha.kubernetes.io/pod: runtime/default - labels: {{ include "externalip-webhook.labels" . | indent 4 }} - chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} - name: {{ template "externalip-webhook.fullname" . }} - namespace: {{ .Release.Namespace }} -spec: - replicas: {{ .Values.replicas }} - selector: - matchLabels: - app: {{ template "externalip-webhook.name" . }} - template: - metadata: - annotations: - seccomp.security.alpha.kubernetes.io/pod: runtime/default - labels: {{ include "externalip-webhook.labels" . | indent 8 }} - chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} - spec: - containers: - {{- if and (.Values.metrics.enabled) (.Values.metrics.authProxy.enabled) }} - - name: {{ template "externalip-webhook.fullname" . }}-auth-proxy - args: - - --secure-listen-address=0.0.0.0:{{ .Values.metrics.port }} - - --upstream=http://127.0.0.1:{{ .Values.metrics.authProxy.port }}/ - - --logtostderr=true - - --v=10 - image: {{ template "system_default_registry" . }}{{ .Values.metrics.authProxy.image.repository}}:{{ .Values.metrics.authProxy.image.tag }} - imagePullPolicy: "{{ .Values.metrics.authProxy.image.pullPolicy }}" - ports: - - containerPort: {{ .Values.metrics.port }} - name: webhook-metrics - protocol: TCP - resources: -{{ toYaml .Values.metrics.authProxy.resources | indent 10 }} - readinessProbe: - tcpSocket: - port: webhook-metrics - initialDelaySeconds: 5 - periodSeconds: 10 - livenessProbe: - tcpSocket: - port: webhook-metrics - initialDelaySeconds: 5 - failureThreshold: 10 - periodSeconds: 30 - {{- end }} - - name: {{ template "externalip-webhook.fullname" . }} - image: {{ template "system_default_registry" . }}{{ .Values.image.repository}}:{{ default .Chart.AppVersion .Values.image.tag }} - imagePullPolicy: "{{ .Values.image.pullPolicy }}" - command: - - /webhook - args: - - --webhook-port={{ .Values.webhookPort }} - {{- if .Values.allowedExternalIPCidrs }} - - --allowed-external-ip-cidrs={{ .Values.allowedExternalIPCidrs }} - {{- end }} - {{- if .Values.metrics.enabled }} - {{- if .Values.metrics.authProxy.enabled }} - - --metrics-addr=127.0.0.1:{{ .Values.metrics.authProxy.port }} - {{- else }} - - --metrics-addr=0.0.0.0:{{ .Values.metrics.port }} - {{- end }} - {{- end }} - ports: - - containerPort: {{ .Values.webhookPort }} - name: webhook-server - protocol: TCP - {{- if and (.Values.metrics.enabled) (not (.Values.metrics.authProxy.enabled)) }} - - containerPort: {{ .Values.metrics.port }} - name: webhook-metrics - protocol: TCP - {{- end }} - volumeMounts: - - name: server-cert - mountPath: /tmp/k8s-webhook-server/serving-certs - readOnly: true - resources: -{{ toYaml .Values.resources | indent 10 }} - readinessProbe: - tcpSocket: - port: webhook-server - initialDelaySeconds: 5 - failureThreshold: 10 - periodSeconds: 30 - livenessProbe: - tcpSocket: - port: webhook-server - initialDelaySeconds: 5 - failureThreshold: 10 - periodSeconds: 30 - nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} - {{- if .Values.nodeSelector }} -{{ toYaml .Values.nodeSelector | indent 8 }} - {{- end }} - tolerations: {{ include "linux-node-tolerations" . | nindent 6}} - {{- if .Values.tolerations }} -{{ toYaml .Values.tolerations | indent 6 }} - {{- end }} - serviceAccountName: {{ template "externalip-webhook.fullname" . }} - volumes: - - name: server-cert - secret: - defaultMode: 420 - secretName: {{ .Values.certificates.secretName }} diff --git a/charts/rancher-externalip-webhook/templates/issuer.yaml b/charts/rancher-externalip-webhook/templates/issuer.yaml deleted file mode 100644 index ff1c2de10..000000000 --- a/charts/rancher-externalip-webhook/templates/issuer.yaml +++ /dev/null @@ -1,52 +0,0 @@ -{{- if .Values.certificates.certManager.enabled -}} - {{- $certmanagerVer := split "." .Values.certificates.certManager.version -}} - {{- if or (.Capabilities.APIVersions.Has "cert-manager.io/v1") (and (gt (len $certmanagerVer._0) 0) (eq (int $certmanagerVer._0) 1) (ge (int $certmanagerVer._1) 0)) }} -apiVersion: cert-manager.io/v1 - {{- else if or (.Capabilities.APIVersions.Has "cert-manager.io/v1beta1") (and (gt (len $certmanagerVer._0) 0) (eq (int $certmanagerVer._0) 0) (ge (int $certmanagerVer._1) 16)) }} -apiVersion: cert-manager.io/v1beta1 - {{- else if or (.Capabilities.APIVersions.Has "cert-manager.io/v1alpha2") (and (gt (len $certmanagerVer._0) 0) (eq (int $certmanagerVer._0) 0) (ge (int $certmanagerVer._1) 11)) }} -apiVersion: cert-manager.io/v1alpha2 - {{- else if or (.Capabilities.APIVersions.Has "certmanager.k8s.io/v1alpha1") (and (gt (len $certmanagerVer._0) 0) (eq (int $certmanagerVer._0) 0) (lt (int $certmanagerVer._1) 11)) }} -apiVersion: certmanager.k8s.io/v1alpha1 - {{- else }} -# Setting latest version as default -apiVersion: cert-manager.io/v1 - {{- end }} -kind: Certificate -metadata: - labels: {{ include "externalip-webhook.labels" . | indent 4 }} - chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} - name: {{ template "externalip-webhook.fullname" . }}-server-cert - namespace: {{ .Release.Namespace }} -spec: - dnsNames: - - {{ template "externalip-webhook.fullname" . }}.{{ .Release.Namespace }}.svc - - {{ template "externalip-webhook.fullname" . }}.{{ .Release.Namespace }}.svc.cluster.local - issuerRef: - kind: Issuer - name: {{ template "externalip-webhook.fullname" . }}-issuer - secretName: {{ .Values.certificates.secretName }} ---- - {{- if or (.Capabilities.APIVersions.Has "cert-manager.io/v1") (and (gt (len $certmanagerVer._0) 0) (eq (int $certmanagerVer._0) 1) (ge (int $certmanagerVer._1) 0)) }} -apiVersion: cert-manager.io/v1 - {{- else if or (.Capabilities.APIVersions.Has "cert-manager.io/v1beta1") (and (gt (len $certmanagerVer._0) 0) (eq (int $certmanagerVer._0) 0) (ge (int $certmanagerVer._1) 16)) }} -apiVersion: cert-manager.io/v1beta1 - {{- else if or (.Capabilities.APIVersions.Has "cert-manager.io/v1alpha2") (and (gt (len $certmanagerVer._0) 0) (eq (int $certmanagerVer._0) 0) (ge (int $certmanagerVer._1) 11)) }} -apiVersion: cert-manager.io/v1alpha2 - {{- else if or (.Capabilities.APIVersions.Has "certmanager.k8s.io/v1alpha1") (and (gt (len $certmanagerVer._0) 0) (eq (int $certmanagerVer._0) 0) (lt (int $certmanagerVer._1) 11)) }} -apiVersion: certmanager.k8s.io/v1alpha1 - {{- else }} -# Setting latest version as default -apiVersion: cert-manager.io/v1 - {{- end }} -kind: Issuer -metadata: - labels: {{ include "externalip-webhook.labels" . | indent 4 }} - chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} - name: {{ template "externalip-webhook.fullname" . }}-issuer - namespace: {{ .Release.Namespace }} -spec: - selfSigned: {} -{{- end -}} - - diff --git a/charts/rancher-externalip-webhook/templates/service.yaml b/charts/rancher-externalip-webhook/templates/service.yaml deleted file mode 100644 index 256add3e4..000000000 --- a/charts/rancher-externalip-webhook/templates/service.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: {{ include "externalip-webhook.labels" . | indent 4 }} - chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} - name: {{ template "externalip-webhook.fullname" . }} - namespace: {{ .Release.Namespace }} -spec: - ports: - - name: webhook-server - port: {{ .Values.service.webhookPort }} - protocol: TCP - targetPort: {{ .Values.webhookPort }} - selector: - app: {{ template "externalip-webhook.name" . }} - type: "ClusterIP" -{{- if .Values.metrics.enabled }} ---- -apiVersion: v1 -kind: Service -metadata: - labels: {{ include "externalip-webhook.labels" . | indent 4 }} - chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} - name: {{ template "externalip-webhook.fullname" . }}-metrics-service - namespace: {{ .Release.Namespace }} -spec: - ports: - - name: webhook-metrics - port: {{ .Values.service.metricsPort }} - protocol: TCP - targetPort: {{ .Values.metrics.port }} - selector: - app: {{ template "externalip-webhook.name" . }} - type: "ClusterIP" -{{- end }} \ No newline at end of file diff --git a/charts/rancher-externalip-webhook/templates/serviceaccount.yaml b/charts/rancher-externalip-webhook/templates/serviceaccount.yaml deleted file mode 100644 index 895df4f5b..000000000 --- a/charts/rancher-externalip-webhook/templates/serviceaccount.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: {{ include "externalip-webhook.labels" . | indent 4 }} - chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} - name: {{ template "externalip-webhook.fullname" . }} - namespace: {{ .Release.Namespace }} diff --git a/charts/rancher-externalip-webhook/templates/servicemonitor.yaml b/charts/rancher-externalip-webhook/templates/servicemonitor.yaml deleted file mode 100644 index c481ea31d..000000000 --- a/charts/rancher-externalip-webhook/templates/servicemonitor.yaml +++ /dev/null @@ -1,16 +0,0 @@ -{{- if and (.Values.metrics.enabled) (.Values.metrics.prometheusExport) -}} -apiVersion: monitoring.coreos.com/v1 -kind: ServiceMonitor -metadata: - labels: {{ include "externalip-webhook.labels" . | indent 4 }} - chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} - name: {{ template "externalip-webhook.fullname" . }}-monitor - namespace: {{ .Release.Namespace }} -spec: - endpoints: - - path: /metrics - port: https - selector: - matchLabels: - app: {{ template "externalip-webhook.name" . }} -{{- end }} \ No newline at end of file diff --git a/charts/rancher-externalip-webhook/tests/admissionregistration_test.yaml b/charts/rancher-externalip-webhook/tests/admissionregistration_test.yaml deleted file mode 100644 index 0660aa6e8..000000000 --- a/charts/rancher-externalip-webhook/tests/admissionregistration_test.yaml +++ /dev/null @@ -1,32 +0,0 @@ -suite: Test Admission Registration -templates: -- admissionregistration.yaml -tests: -- it: should render Admission Registration - asserts: - - equal: - path: apiVersion - value: admissionregistration.k8s.io/v1beta1 -- it: should render Admission Registration annotation and not caBundle if certificates.certManager.enabled = true - release: - name: rancher-externalip-webhook - namespace: test - set: - certificates.certManager.enabled: true - asserts: - - equal: - path: metadata.annotations - value: - cert-manager.io/inject-ca-from: test/rancher-externalip-webhook-server-cert - - isNull: - path: webhooks[0].clientConfig.caBundle -- it: should render Admission Registration caBundle and not annotation if certificates.certManager.enabled = false - set: - certificates.caBundle: test - certificates.certManager.enabled: false - asserts: - - equal: - path: webhooks[0].clientConfig.caBundle - value: test - - isNull: - path: metadata.annotations diff --git a/charts/rancher-externalip-webhook/tests/clusterrole_test.yaml b/charts/rancher-externalip-webhook/tests/clusterrole_test.yaml deleted file mode 100644 index 9e563807b..000000000 --- a/charts/rancher-externalip-webhook/tests/clusterrole_test.yaml +++ /dev/null @@ -1,37 +0,0 @@ -suite: Test Cluster Roles -templates: -- clusterrole.yaml -tests: -- it: should not render Cluster Roles if metrics.enabled = false or metrics.authProxy.enabled = false - set: - metrics.enabled: false - metrics.authProxy.enabled: false - asserts: - - hasDocuments: - count: 0 - template: clusterrole.yaml -- it: should render Cluster Roles if metrics.enabled = true and metrics.authProxy.enabled = true - set: - metrics.enabled: true - metrics.authProxy.enabled: true - asserts: - - hasDocuments: - count: 2 - template: clusterrole.yaml -- it: should render Cluster Roles with default rbac api version if metrics.enabled = true and metrics.authProxy.enabled = true - set: - metrics.enabled: true - metrics.authProxy.enabled: true - asserts: - - equal: - path: apiVersion - value: rbac.authorization.k8s.io/v1 -- it: should render Cluster Roles with custom rbac api version if metrics.enabled = true and metrics.authProxy.enabled = true - set: - metrics.enabled: true - metrics.authProxy.enabled: true - rbac.apiVersion: v1beta - asserts: - - equal: - path: apiVersion - value: rbac.authorization.k8s.io/v1beta \ No newline at end of file diff --git a/charts/rancher-externalip-webhook/tests/clusterrolebinding_test.yaml b/charts/rancher-externalip-webhook/tests/clusterrolebinding_test.yaml deleted file mode 100644 index 2129573a3..000000000 --- a/charts/rancher-externalip-webhook/tests/clusterrolebinding_test.yaml +++ /dev/null @@ -1,42 +0,0 @@ -suite: Test Cluster Role Bindings -templates: -- clusterrolebinding.yaml -tests: -- it: should render Cluster Role Bindings with default rbac api version - set: - rbac.apiVersion: v1 - asserts: - - equal: - path: apiVersion - value: rbac.authorization.k8s.io/v1 -- it: should render Cluster Role Bindings with custom rbac api version - set: - rbac.apiVersion: v1beta - asserts: - - equal: - path: apiVersion - value: rbac.authorization.k8s.io/v1beta -- it: should not render Cluster Role Binding proxy if metrics.enabled = false or metrics.authProxy.enabled = false - set: - metrics.enabled: false - metrics.authProxy.enabled: false - asserts: - - hasDocuments: - count: 1 - template: clusterrolebinding.yaml -- it: should render Cluster Role Bindings proxy if metrics.enabled = true and metrics.authProxy.enabled = true - set: - metrics.enabled: true - metrics.authProxy.enabled: true - asserts: - - hasDocuments: - count: 2 - template: clusterrolebinding.yaml -- it: should render Cluster Role Bindings with default rbac api version if metrics.enabled = true and metrics.authProxy.enabled = true - set: - metrics.enabled: true - metrics.authProxy.enabled: true - asserts: - - equal: - path: apiVersion - value: rbac.authorization.k8s.io/v1 \ No newline at end of file diff --git a/charts/rancher-externalip-webhook/tests/deployment_test.yaml b/charts/rancher-externalip-webhook/tests/deployment_test.yaml deleted file mode 100644 index 50e3f9ec1..000000000 --- a/charts/rancher-externalip-webhook/tests/deployment_test.yaml +++ /dev/null @@ -1,202 +0,0 @@ -suite: Test Deployments -templates: -- deployment.yaml -tests: -- it: should render Deployment with allowed-external-ip-cidrs arg if allowedExternalIPCidrs is set - release: - name: rancher-externalip-webhook - set: - allowedExternalIPCidrs: "1,2" - asserts: - - equal: - path: spec.template.spec.containers[0].args[1] - value: --allowed-external-ip-cidrs=1,2 -- it: should render Deployment with default port, nodeSelector and tolerations if metrics.enabled = false and metrics.authProxy.enabled = false - release: - name: rancher-externalip-webhook - asserts: - - equal: - path: spec.template.spec.containers[0].name - value: rancher-externalip-webhook - - equal: - path: spec.template.spec.containers[0].ports[0] - value: - containerPort: 9443 - name: webhook-server - protocol: TCP - - equal: - path: spec.template.spec.tolerations[0] - value: - key: "cattle.io/os" - value: "linux" - effect: "NoSchedule" - operator: "Equal" - - equal: - path: spec.template.spec.nodeSelector - value: - kubernetes.io/os: linux -- it: should render Deployment with default port and custom nodeSelector and tolerations if metrics.enabled = false and metrics.authProxy.enabled = false - release: - name: rancher-externalip-webhook - set: - tolerations: - - key: "cattle.io/test" - value: "linux" - effect: "NoSchedule" - operator: "Equal" - nodeSelector: - kubernetes.io/test: linux - asserts: - - equal: - path: spec.template.spec.containers[0].name - value: rancher-externalip-webhook - - equal: - path: spec.template.spec.containers[0].ports[0] - value: - containerPort: 9443 - name: webhook-server - protocol: TCP - - equal: - path: spec.template.spec.tolerations[0] - value: - key: "cattle.io/os" - value: "linux" - effect: "NoSchedule" - operator: "Equal" - - equal: - path: spec.template.spec.tolerations[1] - value: - key: "cattle.io/test" - value: "linux" - effect: "NoSchedule" - operator: "Equal" - - equal: - path: spec.template.spec.nodeSelector - value: - kubernetes.io/os: linux - kubernetes.io/test: linux -- it: should render Deployment with custom port and image if metrics.enabled = false and metrics.authProxy.enabled = false - release: - name: rancher-externalip-webhook - set: - webhookPort: 9000 - image.repository: test - image.tag: dev-test - asserts: - - equal: - path: spec.template.spec.containers[0].name - value: rancher-externalip-webhook - - equal: - path: spec.template.spec.containers[0].image - value: test:dev-test - - equal: - path: spec.template.spec.containers[0].ports[0] - value: - containerPort: 9000 - name: webhook-server - protocol: TCP -- it: should render Deployment with default metrics port if metrics.enabled = true and metrics.authProxy.enabled = false - release: - name: rancher-externalip-webhook - set: - metrics.enabled: true - asserts: - - equal: - path: spec.template.spec.containers[0].name - value: rancher-externalip-webhook - - equal: - path: spec.template.spec.containers[0].ports[0] - value: - containerPort: 9443 - name: webhook-server - protocol: TCP - - equal: - path: spec.template.spec.containers[0].ports[1] - value: - containerPort: 8443 - name: webhook-metrics - protocol: TCP -- it: should render Deployment with custom metrics port if metrics.enabled = true and metrics.authProxy.enabled = false - release: - name: rancher-externalip-webhook - set: - metrics.enabled: true - metrics.port: 8000 - asserts: - - equal: - path: spec.template.spec.containers[0].name - value: rancher-externalip-webhook - - equal: - path: spec.template.spec.containers[0].ports[0] - value: - containerPort: 9443 - name: webhook-server - protocol: TCP - - equal: - path: spec.template.spec.containers[0].ports[1] - value: - containerPort: 8000 - name: webhook-metrics - protocol: TCP -- it: should render Deployment with default metrics port if metrics.enabled = true and metrics.authProxy.enabled = true - release: - name: rancher-externalip-webhook - set: - metrics.enabled: true - metrics.authProxy.enabled: true - asserts: - - equal: - path: spec.template.spec.containers[0].name - value: rancher-externalip-webhook-auth-proxy - - equal: - path: spec.template.spec.containers[0].ports[0] - value: - containerPort: 8443 - name: webhook-metrics - protocol: TCP - - equal: - path: spec.template.spec.containers[1].name - value: rancher-externalip-webhook - - equal: - path: spec.template.spec.containers[1].ports[0] - value: - containerPort: 9443 - name: webhook-server - protocol: TCP -- it: should render Deployment with custom metrics port and image if metrics.enabled = true and metrics.authProxy.enabled = true - release: - name: rancher-externalip-webhook - set: - metrics.enabled: true - metrics.authProxy.enabled: true - metrics.port: 8000 - webhookPort: 9000 - image.repository: test - image.tag: dev-test - metrics.authProxy.image.repository: auth - metrics.authProxy.image.tag: auth-test - asserts: - - equal: - path: spec.template.spec.containers[0].name - value: rancher-externalip-webhook-auth-proxy - - equal: - path: spec.template.spec.containers[0].image - value: auth:auth-test - - equal: - path: spec.template.spec.containers[0].ports[0] - value: - containerPort: 8000 - name: webhook-metrics - protocol: TCP - - equal: - path: spec.template.spec.containers[1].name - value: rancher-externalip-webhook - - equal: - path: spec.template.spec.containers[1].image - value: test:dev-test - - equal: - path: spec.template.spec.containers[1].ports[0] - value: - containerPort: 9000 - name: webhook-server - protocol: TCP \ No newline at end of file diff --git a/charts/rancher-externalip-webhook/tests/issuer_test.yaml b/charts/rancher-externalip-webhook/tests/issuer_test.yaml deleted file mode 100644 index eeeb660b2..000000000 --- a/charts/rancher-externalip-webhook/tests/issuer_test.yaml +++ /dev/null @@ -1,106 +0,0 @@ -suite: Test Issuers -templates: -- issuer.yaml -tests: -- it: should not render issuer if certificates.certManager.enabled = false - set: - certificates.certManager.enabled: false - asserts: - - hasDocuments: - count: 0 - template: issuer.yaml -- it: should render issuer if certificates.certManager.enabled = true - set: - certificates.certManager.enabled: true - asserts: - - hasDocuments: - count: 2 - template: issuer.yaml -- it: should set issuer apiVersion with default cert-manager - set: - certificates.certManager.enabled: true - asserts: - - equal: - path: apiVersion - value: cert-manager.io/v1 - template: issuer.yaml -- it: should set issuer apiVersion with cert-manager >= 1.0.0 using capabilities - capabilities: - apiversions: - - cert-manager.io/v1 - set: - certificates.certManager.enabled: true - asserts: - - equal: - path: apiVersion - value: cert-manager.io/v1 - template: issuer.yaml -- it: should set issuer apiVersion with cert-manager >= 0.16.0 using capabilities - capabilities: - apiversions: - - cert-manager.io/v1beta1 - set: - certificates.certManager.enabled: true - asserts: - - equal: - path: apiVersion - value: cert-manager.io/v1beta1 - template: issuer.yaml -- it: should set issuer apiVersion with cert-manager >= 0.11.0 using capabilities - capabilities: - apiversions: - - cert-manager.io/v1alpha2 - set: - certificates.certManager.enabled: true - asserts: - - equal: - path: apiVersion - value: cert-manager.io/v1alpha2 - template: issuer.yaml -- it: should set issuer apiVersion with cert-manager < 0.11.0 using capabilities - capabilities: - apiversions: - - certmanager.k8s.io/v1alpha1 - set: - certificates.certManager.enabled: true - asserts: - - equal: - path: apiVersion - value: certmanager.k8s.io/v1alpha1 - template: issuer.yaml -- it: should set issuer apiVersion with cert-manager >= 1.0.0 using parameter - set: - certificates.certManager.version: 1.0.0 - certificates.certManager.enabled: true - asserts: - - equal: - path: apiVersion - value: cert-manager.io/v1 - template: issuer.yaml -- it: should set issuer apiVersion with cert-manager >= 0.16.0 using parameter - set: - certificates.certManager.version: 0.16.0 - certificates.certManager.enabled: true - asserts: - - equal: - path: apiVersion - value: cert-manager.io/v1beta1 - template: issuer.yaml -- it: should set issuer apiVersion with cert-manager >= 0.11.0 using parameter - set: - certificates.certManager.version: 0.11.0 - certificates.certManager.enabled: true - asserts: - - equal: - path: apiVersion - value: cert-manager.io/v1alpha2 - template: issuer.yaml -- it: should set letsEncrypt apiVersion with cert-manager < 0.11.0 using parameter - set: - certificates.certManager.version: 0.9.0 - certificates.certManager.enabled: true - asserts: - - equal: - path: apiVersion - value: certmanager.k8s.io/v1alpha1 - template: issuer.yaml diff --git a/charts/rancher-externalip-webhook/tests/service_test.yaml b/charts/rancher-externalip-webhook/tests/service_test.yaml deleted file mode 100644 index a0ba4d352..000000000 --- a/charts/rancher-externalip-webhook/tests/service_test.yaml +++ /dev/null @@ -1,69 +0,0 @@ -suite: Test Services -templates: -- service.yaml -tests: -- it: should render webhook-server service with default webhookPort if metrics.enabled = false - set: - metrics.enabled: false - asserts: - - equal: - path: spec.ports[0] - value: - name: webhook-server - port: 443 - protocol: TCP - targetPort: 9443 -- it: should render webhook-server service with custom webhookPort if metrics.enabled = false - set: - metrics.enabled: false - webhookPort: 9000 - asserts: - - equal: - path: spec.ports[0] - value: - name: webhook-server - port: 443 - protocol: TCP - targetPort: 9000 -- it: should render webhook-server and webhook-metrics services with default webhookPort and metrics.port, if metrics.enabled = true - set: - metrics.enabled: true - asserts: - - equal: - path: spec.ports[0] - value: - name: webhook-server - port: 443 - protocol: TCP - targetPort: 9443 - documentIndex: 0 - - equal: - path: spec.ports[0] - value: - name: webhook-metrics - port: 8443 - protocol: TCP - targetPort: 8443 - documentIndex: 1 -- it: should render webhook-server and webhook-metrics services with custom webhookPort and metrics.port, if metrics.enabled = true - set: - metrics.enabled: true - metrics.port: 8000 - webhookPort: 9000 - asserts: - - equal: - path: spec.ports[0] - value: - name: webhook-server - port: 443 - protocol: TCP - targetPort: 9000 - documentIndex: 0 - - equal: - path: spec.ports[0] - value: - name: webhook-metrics - port: 8443 - protocol: TCP - targetPort: 8000 - documentIndex: 1 \ No newline at end of file diff --git a/charts/rancher-externalip-webhook/tests/serviceaccount_test.yaml b/charts/rancher-externalip-webhook/tests/serviceaccount_test.yaml deleted file mode 100644 index 5aebbc74b..000000000 --- a/charts/rancher-externalip-webhook/tests/serviceaccount_test.yaml +++ /dev/null @@ -1,9 +0,0 @@ -suite: Test Service Accounts -templates: -- serviceaccount.yaml -tests: -- it: should render Service Account - asserts: - - hasDocuments: - count: 1 - template: serviceaccount.yaml diff --git a/charts/rancher-externalip-webhook/tests/servicemonitor_test.yaml b/charts/rancher-externalip-webhook/tests/servicemonitor_test.yaml deleted file mode 100644 index 21989265e..000000000 --- a/charts/rancher-externalip-webhook/tests/servicemonitor_test.yaml +++ /dev/null @@ -1,20 +0,0 @@ -suite: Test Service Monitors -templates: -- servicemonitor.yaml -tests: -- it: should not render Service Monitor if metrics.enabled = false or metrics.prometheusExport = false - set: - metrics.enabled: false - metrics.prometheusExport: false - asserts: - - hasDocuments: - count: 0 - template: servicemonitor.yaml -- it: should render Service Account if metrics.enabled = true and metrics.authProxy.enabled = true - set: - metrics.enabled: true - metrics.prometheusExport: true - asserts: - - hasDocuments: - count: 1 - template: servicemonitor.yaml diff --git a/charts/rancher-externalip-webhook/values.yaml b/charts/rancher-externalip-webhook/values.yaml deleted file mode 100644 index dc17e9796..000000000 --- a/charts/rancher-externalip-webhook/values.yaml +++ /dev/null @@ -1,67 +0,0 @@ -## Allowed external IP cidrs -allowedExternalIPCidrs: "" -## Certificates generation for webhook -certificates: - certManager: - # Enable cert manager integration. Cert manager should be already installed at the k8s cluster - enabled: true - version: "" - # If cert-manager integration is disabled, add self signed ca.crt in base64 format - caBundle: "" - # If cert-manager integration is disabled, upload certs data (ca.crt, tls.crt and tls.key) as k8s secretName in the namespace - secretName: webhook-server-cert -## Details about the image to be pulled. -image: - pullPolicy: IfNotPresent - pullSecrets: [] - repository: rancher/externalip-webhook - tag: v0.1.4 -## Enabling metrics endpoint -# Webhook emits `webhook_failed_request_count` metrics whenever it rejects service creation or update operation -metrics: - enabled: false - port: 8443 - # Enable webhook metrics export to Prometheus - prometheusExport: false - # Webhook metrics auth proxy. This option is just available for amd64 arch - authProxy: - enabled: false - port: 8080 - image: - pullPolicy: IfNotPresent - pullSecrets: [] - repository: rancher/kube-rbac-proxy - tag: v0.5.0 - resources: - limits: - memory: 30Mi - cpu: 100m - requests: - memory: 20Mi - cpu: 100m -## Node labels for pod assignment -## Ref: https://kubernetes.io/docs/user-guide/node-selection/ -## -nodeSelector: {} -## RBAC -rbac: - apiVersion: v1 -## CPU and Memory limit and request for externalip-webhook -resources: - limits: - memory: 30Mi - cpu: 100m - requests: - memory: 20Mi - cpu: 100m -service: - metricsPort: 8443 - webhookPort: 443 -## Webhook serviceAccountName. Just used if metrics.authProxy.enabled = false -serviceAccountName: default -## List of node taints to tolerate (requires Kubernetes >= 1.6) -tolerations: [] -## Webhook server pod port -webhookPort: 9443 -global: - systemDefaultRegistry: "" diff --git a/index.yaml b/index.yaml index 9473b0975..f854a516d 100644 --- a/index.yaml +++ b/index.yaml @@ -793,88 +793,6 @@ entries: urls: - assets/rancher-cis-benchmark/rancher-cis-benchmark-crd-1.0.100.tgz version: 1.0.100 - rancher-externalip-webhook: - - annotations: - catalog.cattle.io/certified: rancher - catalog.cattle.io/display-name: External IP Webhook - catalog.cattle.io/namespace: cattle-externalip-system - catalog.cattle.io/release-name: rancher-externalip-webhook - catalog.cattle.io/ui-component: rancher-externalip-webhook - apiVersion: v1 - appVersion: v0.1.4 - created: "2020-12-08T22:05:21.819947668Z" - description: | - Deploy the externalip-webhook to mitigate k8s CVE-2020-8554 - digest: abc86966d4a49e37ea0a7e90f38bc267a73cb9fc3a9ce96e407bae760eb9af95 - home: https://github.com/rancher/externalip-webhook - keywords: - - cve - - externalip - - webhook - - security - maintainers: - - email: raul@rancher.com - name: rawmind0 - name: rancher-externalip-webhook - sources: - - https://github.com/rancher/externalip-webhook - urls: - - assets/rancher-externalip-webhook/rancher-externalip-webhook-0.1.400.tgz - version: 0.1.400 - - annotations: - catalog.cattle.io/certified: rancher - catalog.cattle.io/display-name: External IP Webhook - catalog.cattle.io/namespace: cattle-externalip-system - catalog.cattle.io/release-name: rancher-externalip-webhook - catalog.cattle.io/ui-component: rancher-externalip-webhook - apiVersion: v1 - appVersion: v0.1.3 - created: "2020-12-08T14:39:13.286645836Z" - description: | - Deploy the externalip-webhook to mitigate k8s CVE-2020-8554 - digest: d722d79154bb56c1366dafcecc969cb5ef3da714444eff37631b28886d13e027 - home: https://github.com/rancher/externalip-webhook - keywords: - - cve - - embargo - - externalip - - webhook - - security - maintainers: - - email: raul@rancher.com - name: rawmind0 - name: rancher-externalip-webhook - sources: - - https://github.com/rancher/externalip-webhook - urls: - - assets/rancher-externalip-webhook/rancher-externalip-webhook-0.1.300.tgz - version: 0.1.300 - - annotations: - catalog.cattle.io/certified: rancher - catalog.cattle.io/display-name: Externalip webhook - catalog.cattle.io/hidden: "true" - catalog.cattle.io/namespace: cattle-externalip-system - catalog.cattle.io/release-name: rancher-externalip-webhook - apiVersion: v1 - appVersion: v0.1.1 - created: "2020-12-08T02:12:59.751279501Z" - description: | - Deploy rancher-externalip-webhook to mitigate k8s CVE-2020-8554 - digest: 4b0ef8f0d9cfeec170e3b1a06984152d4ac4ebc4b8c4326e1613bed314d99ddc - home: https://github.com/rancher/externalip-webhook - keywords: - - externalip - - webhook - - security - maintainers: - - email: raul@rancher.com - name: Raul Sanchez - name: rancher-externalip-webhook - sources: - - https://github.com/rancher/externalip-webhook - urls: - - assets/rancher-externalip-webhook/rancher-externalip-webhook-0.1.100.tgz - version: 0.1.100 rancher-gatekeeper: - annotations: catalog.cattle.io/auto-install: rancher-gatekeeper-crd=match @@ -2272,32 +2190,4 @@ entries: urls: - assets/rio/rio-0.8.000.tgz version: 0.8.000 - vue-rancher-externalip-webhook: - - annotations: - catalog.cattle.io/certified: rancher - catalog.cattle.io/display-name: External IP Webhook - catalog.cattle.io/namespace: cattle-externalip-system - catalog.cattle.io/release-name: vue-rancher-externalip-webhook - catalog.cattle.io/ui-component: vue-rancher-externalip-webhook - apiVersion: v1 - appVersion: v0.1.4 - created: "2020-12-08T23:25:12.849262513Z" - description: | - Deploy the externalip-webhook to mitigate k8s CVE-2020-8554 - digest: 51dff54b84f92ce75fef00baf8da86a635b71f92abdd7bfb01cba7169b4153e8 - home: https://github.com/rancher/externalip-webhook - keywords: - - cve - - externalip - - webhook - - security - maintainers: - - email: raul@rancher.com - name: rawmind0 - name: vue-rancher-externalip-webhook - sources: - - https://github.com/rancher/externalip-webhook - urls: - - assets/rancher-externalip-webhook/vue-rancher-externalip-webhook-0.1.401.tgz - version: 0.1.401 generated: "2020-12-08T23:25:12.847895211Z" diff --git a/sha256sum/rancher-externalip-webhook/rancher-externalip-webhook.sum b/sha256sum/rancher-externalip-webhook/rancher-externalip-webhook.sum deleted file mode 100644 index afde132c5..000000000 --- a/sha256sum/rancher-externalip-webhook/rancher-externalip-webhook.sum +++ /dev/null @@ -1,2 +0,0 @@ -25d99c96f967d3760ad00b656505c9de2341c4fb4f8c3174365c195a90f6c6cf packages/rancher-externalip-webhook/package.yaml -4ca181e62518cb176b861a5f0983b78a2aff389eb95c268fd4cc467887c7564e packages/rancher-externalip-webhook/rancher-externalip-webhook.patch