Merge pull request #805 from nflondo/main-source

Charts CI
pull/807/head
alex-isv 2023-06-26 10:00:39 -06:00 committed by GitHub
commit 1866a3537b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
206 changed files with 2929 additions and 1101 deletions

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

BIN
assets/kuma/kuma-2.3.0.tgz Normal file

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

View File

@ -1,9 +1,7 @@
annotations: annotations:
artifacthub.io/changes: | artifacthub.io/changes: |
- kind: changed - kind: added
description: Upgrade Argo CD to v2.7.6 description: Add `ARGOCD_NOTIFICATIONS_CONTROLLER_LOGLEVEL` and `ARGOCD_NOTIFICATIONS_CONTROLLER_LOGFORMAT` env vars to argo-notifications Deployment
- kind: changed
description: applicationSet.containerPorts.metrics to 8085
artifacthub.io/signKey: | artifacthub.io/signKey: |
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252 fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
url: https://argoproj.github.io/argo-helm/pgp_keys.asc url: https://argoproj.github.io/argo-helm/pgp_keys.asc
@ -34,4 +32,4 @@ name: argo-cd
sources: sources:
- https://github.com/argoproj/argo-helm/tree/main/charts/argo-cd - https://github.com/argoproj/argo-helm/tree/main/charts/argo-cd
- https://github.com/argoproj/argo-cd - https://github.com/argoproj/argo-cd
version: 5.36.6 version: 5.36.10

View File

@ -464,6 +464,7 @@ NAME: my-release
| configs.params."server.staticassets" | string | `"/shared/app"` | Directory path that contains additional static assets | | configs.params."server.staticassets" | string | `"/shared/app"` | Directory path that contains additional static assets |
| configs.params."server.x.frame.options" | string | `"sameorigin"` | Set X-Frame-Options header in HTTP responses to value. To disable, set to "". | | configs.params."server.x.frame.options" | string | `"sameorigin"` | Set X-Frame-Options header in HTTP responses to value. To disable, set to "". |
| configs.params.annotations | object | `{}` | Annotations to be added to the argocd-cmd-params-cm ConfigMap | | configs.params.annotations | object | `{}` | Annotations to be added to the argocd-cmd-params-cm ConfigMap |
| configs.params.create | bool | `true` | Create the argocd-cmd-params-cm configmap If false, it is expected the configmap will be created by something else. |
| configs.rbac."policy.csv" | string | `''` (See [values.yaml]) | File containing user-defined policies and role definitions. | | configs.rbac."policy.csv" | string | `''` (See [values.yaml]) | File containing user-defined policies and role definitions. |
| configs.rbac."policy.default" | string | `""` | The name of the default role which Argo CD will falls back to, when authorizing API requests (optional). If omitted or empty, users may be still be able to login, but will see no apps, projects, etc... | | configs.rbac."policy.default" | string | `""` | The name of the default role which Argo CD will falls back to, when authorizing API requests (optional). If omitted or empty, users may be still be able to login, but will see no apps, projects, etc... |
| configs.rbac.annotations | object | `{}` | Annotations to be added to argocd-rbac-cm configmap | | configs.rbac.annotations | object | `{}` | Annotations to be added to argocd-rbac-cm configmap |
@ -1044,7 +1045,7 @@ If you want to use an existing Redis (eg. a managed service from a cloud provide
| applicationSet.certificate.privateKey.size | int | `2048` | Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored. | | applicationSet.certificate.privateKey.size | int | `2048` | Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored. |
| applicationSet.certificate.renewBefore | string | `""` (defaults to 360h = 15d if not specified) | How long before the expiry a certificate should be renewed. | | applicationSet.certificate.renewBefore | string | `""` (defaults to 360h = 15d if not specified) | How long before the expiry a certificate should be renewed. |
| applicationSet.certificate.secretName | string | `"argocd-application-controller-tls"` | The name of the Secret that will be automatically created and managed by this Certificate resource | | applicationSet.certificate.secretName | string | `"argocd-application-controller-tls"` | The name of the Secret that will be automatically created and managed by this Certificate resource |
| applicationSet.containerPorts.metrics | int | `8085` | Metrics container port | | applicationSet.containerPorts.metrics | int | `8080` | Metrics container port |
| applicationSet.containerPorts.probe | int | `8081` | Probe container port | | applicationSet.containerPorts.probe | int | `8081` | Probe container port |
| applicationSet.containerPorts.webhook | int | `7000` | Webhook container port | | applicationSet.containerPorts.webhook | int | `7000` | Webhook container port |
| applicationSet.containerSecurityContext | object | See [values.yaml] | ApplicationSet controller container-level security context | | applicationSet.containerSecurityContext | object | See [values.yaml] | ApplicationSet controller container-level security context |
@ -1075,7 +1076,7 @@ If you want to use an existing Redis (eg. a managed service from a cloud provide
| applicationSet.metrics.service.clusterIP | string | `""` | Metrics service clusterIP. `None` makes a "headless service" (no virtual IP) | | applicationSet.metrics.service.clusterIP | string | `""` | Metrics service clusterIP. `None` makes a "headless service" (no virtual IP) |
| applicationSet.metrics.service.labels | object | `{}` | Metrics service labels | | applicationSet.metrics.service.labels | object | `{}` | Metrics service labels |
| applicationSet.metrics.service.portName | string | `"http-metrics"` | Metrics service port name | | applicationSet.metrics.service.portName | string | `"http-metrics"` | Metrics service port name |
| applicationSet.metrics.service.servicePort | int | `8085` | Metrics service port | | applicationSet.metrics.service.servicePort | int | `8080` | Metrics service port |
| applicationSet.metrics.service.type | string | `"ClusterIP"` | Metrics service type | | applicationSet.metrics.service.type | string | `"ClusterIP"` | Metrics service type |
| applicationSet.metrics.serviceMonitor.additionalLabels | object | `{}` | Prometheus ServiceMonitor labels | | applicationSet.metrics.serviceMonitor.additionalLabels | object | `{}` | Prometheus ServiceMonitor labels |
| applicationSet.metrics.serviceMonitor.annotations | object | `{}` | Prometheus ServiceMonitor annotations | | applicationSet.metrics.serviceMonitor.annotations | object | `{}` | Prometheus ServiceMonitor annotations |

View File

@ -1,3 +1,4 @@
{{- if .Values.configs.params.create }}
apiVersion: v1 apiVersion: v1
kind: ConfigMap kind: ConfigMap
metadata: metadata:
@ -13,3 +14,4 @@ metadata:
{{- end }} {{- end }}
data: data:
{{- include "argo-cd.config.params" . | trim | nindent 2 }} {{- include "argo-cd.config.params" . | trim | nindent 2 }}
{{- end }}

View File

@ -66,10 +66,22 @@ spec:
{{- range .Values.notifications.extraArgs }} {{- range .Values.notifications.extraArgs }}
- {{ . | squote }} - {{ . | squote }}
{{- end }} {{- end }}
{{- with (concat .Values.global.env .Values.notifications.extraEnv) }}
env: env:
{{- toYaml . | nindent 12 }} {{- with (concat .Values.global.env .Values.notifications.extraEnv) }}
{{- end }} {{- toYaml . | nindent 12 }}
{{- end }}
- name: ARGOCD_NOTIFICATIONS_CONTROLLER_LOGLEVEL
valueFrom:
configMapKeyRef:
key: notificationscontroller.log.level
name: argocd-cmd-params-cm
optional: true
- name: ARGOCD_NOTIFICATIONS_CONTROLLER_LOGFORMAT
valueFrom:
configMapKeyRef:
key: notificationscontroller.log.format
name: argocd-cmd-params-cm
optional: true
{{- with .Values.notifications.extraEnvFrom }} {{- with .Values.notifications.extraEnvFrom }}
envFrom: envFrom:
{{- toYaml . | nindent 12 }} {{- toYaml . | nindent 12 }}

View File

@ -217,6 +217,10 @@ configs:
# Argo CD configuration parameters # Argo CD configuration parameters
## Ref: https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/argocd-cmd-params-cm.yaml ## Ref: https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/argocd-cmd-params-cm.yaml
params: params:
# -- Create the argocd-cmd-params-cm configmap
# If false, it is expected the configmap will be created by something else.
create: true
# -- Annotations to be added to the argocd-cmd-params-cm ConfigMap # -- Annotations to be added to the argocd-cmd-params-cm ConfigMap
annotations: {} annotations: {}
@ -2433,7 +2437,7 @@ applicationSet:
# -- Metrics service labels # -- Metrics service labels
labels: {} labels: {}
# -- Metrics service port # -- Metrics service port
servicePort: 8085 servicePort: 8080
# -- Metrics service port name # -- Metrics service port name
portName: http-metrics portName: http-metrics
serviceMonitor: serviceMonitor:
@ -2506,7 +2510,7 @@ applicationSet:
# ApplicationSet controller container ports # ApplicationSet controller container ports
containerPorts: containerPorts:
# -- Metrics container port # -- Metrics container port
metrics: 8085 metrics: 8080
# -- Probe container port # -- Probe container port
probe: 8081 probe: 8081
# -- Webhook container port # -- Webhook container port

View File

@ -6,7 +6,7 @@ annotations:
category: Infrastructure category: Infrastructure
licenses: Apache-2.0 licenses: Apache-2.0
apiVersion: v2 apiVersion: v2
appVersion: 3.4.0 appVersion: 3.4.1
dependencies: dependencies:
- name: common - name: common
repository: file://./charts/common repository: file://./charts/common
@ -27,4 +27,4 @@ maintainers:
name: spark name: spark
sources: sources:
- https://github.com/bitnami/charts/tree/main/bitnami/spark - https://github.com/bitnami/charts/tree/main/bitnami/spark
version: 7.0.1 version: 7.0.2

View File

@ -22,6 +22,8 @@ Apache Spark includes APIs for Java, Python, Scala and R.
Bitnami charts can be used with [Kubeapps](https://kubeapps.dev/) for deployment and management of Helm Charts in clusters. Bitnami charts can be used with [Kubeapps](https://kubeapps.dev/) for deployment and management of Helm Charts in clusters.
Looking to use Apache Spark in production? Try [VMware Application Catalog](https://bitnami.com/enterprise), the enterprise edition of Bitnami Application Catalog.
## Prerequisites ## Prerequisites
- Kubernetes 1.19+ - Kubernetes 1.19+
@ -84,7 +86,7 @@ The command removes all the Kubernetes components associated with the chart and
| ------------------- | ----------------------------------------------------------------------------------------------------- | -------------------- | | ------------------- | ----------------------------------------------------------------------------------------------------- | -------------------- |
| `image.registry` | Spark image registry | `docker.io` | | `image.registry` | Spark image registry | `docker.io` |
| `image.repository` | Spark image repository | `bitnami/spark` | | `image.repository` | Spark image repository | `bitnami/spark` |
| `image.tag` | Spark image tag (immutable tags are recommended) | `3.4.0-debian-11-r2` | | `image.tag` | Spark image tag (immutable tags are recommended) | `3.4.1-debian-11-r0` |
| `image.digest` | Spark image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.digest` | Spark image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `image.pullPolicy` | Spark image pull policy | `IfNotPresent` | | `image.pullPolicy` | Spark image pull policy | `IfNotPresent` |
| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
@ -464,7 +466,7 @@ This version standardizes the way of defining Ingress rules. When configuring a
## License ## License
Copyright © 2023 VMware Inc Copyright © 2023 VMware, Inc.
Licensed under the Apache License, Version 2.0 (the "License"); Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License. you may not use this file except in compliance with the License.

View File

@ -92,7 +92,7 @@ diagnosticMode:
image: image:
registry: docker.io registry: docker.io
repository: bitnami/spark repository: bitnami/spark
tag: 3.4.0-debian-11-r2 tag: 3.4.1-debian-11-r0
digest: "" digest: ""
## Specify a imagePullPolicy ## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'

View File

@ -40,4 +40,4 @@ maintainers:
name: wordpress name: wordpress
sources: sources:
- https://github.com/bitnami/charts/tree/main/bitnami/wordpress - https://github.com/bitnami/charts/tree/main/bitnami/wordpress
version: 16.1.18 version: 16.1.19

View File

@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and
| ------------------- | --------------------------------------------------------------------------------------------------------- | --------------------- | | ------------------- | --------------------------------------------------------------------------------------------------------- | --------------------- |
| `image.registry` | WordPress image registry | `docker.io` | | `image.registry` | WordPress image registry | `docker.io` |
| `image.repository` | WordPress image repository | `bitnami/wordpress` | | `image.repository` | WordPress image repository | `bitnami/wordpress` |
| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.2.2-debian-11-r18` | | `image.tag` | WordPress image tag (immutable tags are recommended) | `6.2.2-debian-11-r19` |
| `image.digest` | WordPress image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.digest` | WordPress image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `image.pullPolicy` | WordPress image pull policy | `IfNotPresent` | | `image.pullPolicy` | WordPress image pull policy | `IfNotPresent` |
| `image.pullSecrets` | WordPress image pull secrets | `[]` | | `image.pullSecrets` | WordPress image pull secrets | `[]` |
@ -281,7 +281,7 @@ The command removes all the Kubernetes components associated with the chart and
| `metrics.enabled` | Start a sidecar prometheus exporter to expose metrics | `false` | | `metrics.enabled` | Start a sidecar prometheus exporter to expose metrics | `false` |
| `metrics.image.registry` | Apache exporter image registry | `docker.io` | | `metrics.image.registry` | Apache exporter image registry | `docker.io` |
| `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` | | `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` |
| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `0.13.4-debian-11-r7` | | `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `0.13.4-debian-11-r8` |
| `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `metrics.image.pullPolicy` | Apache exporter image pull policy | `IfNotPresent` | | `metrics.image.pullPolicy` | Apache exporter image pull policy | `IfNotPresent` |
| `metrics.image.pullSecrets` | Apache exporter image pull secrets | `[]` | | `metrics.image.pullSecrets` | Apache exporter image pull secrets | `[]` |

View File

@ -73,7 +73,7 @@ diagnosticMode:
image: image:
registry: docker.io registry: docker.io
repository: bitnami/wordpress repository: bitnami/wordpress
tag: 6.2.2-debian-11-r18 tag: 6.2.2-debian-11-r19
digest: "" digest: ""
## Specify a imagePullPolicy ## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
@ -857,7 +857,7 @@ metrics:
image: image:
registry: docker.io registry: docker.io
repository: bitnami/apache-exporter repository: bitnami/apache-exporter
tag: 0.13.4-debian-11-r7 tag: 0.13.4-debian-11-r8
digest: "" digest: ""
pullPolicy: IfNotPresent pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets. ## Optionally specify an array of imagePullSecrets.

View File

@ -1,5 +1,9 @@
# Changelog # Changelog
## 1.0.4
* Update Datadog Operator version to 1.0.3.
## 1.0.3 ## 1.0.3
* Add `list` and `watch` permissions of `customresourcedefinitions` for the KSM core check to collect CRD resources. * Add `list` and `watch` permissions of `customresourcedefinitions` for the KSM core check to collect CRD resources.

View File

@ -1,6 +1,6 @@
dependencies: dependencies:
- name: datadog-crds - name: datadog-crds
repository: https://helm.datadoghq.com repository: https://helm.datadoghq.com
version: 1.0.0 version: 1.0.1
digest: sha256:46c620716bf7ab9e1ffd7eaf39dfd44b5a8cab49a5acb70de071dcbad4c7ee86 digest: sha256:e882fa60c39302a3092cc43bcbf0a8412a2c63933efc9767740c4c6144c5b0b4
generated: "2023-04-03T15:45:41.953207-04:00" generated: "2023-06-22T11:55:54.905315-04:00"

View File

@ -3,7 +3,7 @@ annotations:
catalog.cattle.io/display-name: Datadog Operator catalog.cattle.io/display-name: Datadog Operator
catalog.cattle.io/release-name: datadog-operator catalog.cattle.io/release-name: datadog-operator
apiVersion: v2 apiVersion: v2
appVersion: 1.0.0 appVersion: 1.0.3
dependencies: dependencies:
- alias: datadogCRDs - alias: datadogCRDs
condition: installCRDs condition: installCRDs
@ -11,7 +11,7 @@ dependencies:
repository: file://./charts/datadog-crds repository: file://./charts/datadog-crds
tags: tags:
- install-crds - install-crds
version: =1.0.0 version: =1.0.1
description: Datadog Operator description: Datadog Operator
home: https://www.datadoghq.com home: https://www.datadoghq.com
icon: https://datadog-live.imgix.net/img/dd_logo_70x75.png icon: https://datadog-live.imgix.net/img/dd_logo_70x75.png
@ -26,4 +26,4 @@ name: datadog-operator
sources: sources:
- https://app.datadoghq.com/account/settings#agent/kubernetes - https://app.datadoghq.com/account/settings#agent/kubernetes
- https://github.com/DataDog/datadog-agent - https://github.com/DataDog/datadog-agent
version: 1.0.3 version: 1.0.4

View File

@ -1,6 +1,6 @@
# Datadog Operator # Datadog Operator
![Version: 1.0.3](https://img.shields.io/badge/Version-1.0.3-informational?style=flat-square) ![AppVersion: 1.0.0](https://img.shields.io/badge/AppVersion-1.0.0-informational?style=flat-square) ![Version: 1.0.4](https://img.shields.io/badge/Version-1.0.4-informational?style=flat-square) ![AppVersion: 1.0.3](https://img.shields.io/badge/AppVersion-1.0.3-informational?style=flat-square)
## Values ## Values
@ -28,7 +28,7 @@
| fullnameOverride | string | `""` | | | fullnameOverride | string | `""` | |
| image.pullPolicy | string | `"IfNotPresent"` | Define the pullPolicy for Datadog Operator image | | image.pullPolicy | string | `"IfNotPresent"` | Define the pullPolicy for Datadog Operator image |
| image.repository | string | `"gcr.io/datadoghq/operator"` | Repository to use for Datadog Operator image | | image.repository | string | `"gcr.io/datadoghq/operator"` | Repository to use for Datadog Operator image |
| image.tag | string | `"1.0.0"` | Define the Datadog Operator version to use | | image.tag | string | `"1.0.3"` | Define the Datadog Operator version to use |
| imagePullSecrets | list | `[]` | Datadog Operator repository pullSecret (ex: specify docker registry credentials) | | imagePullSecrets | list | `[]` | Datadog Operator repository pullSecret (ex: specify docker registry credentials) |
| installCRDs | bool | `true` | Set to true to deploy the Datadog's CRDs | | installCRDs | bool | `true` | Set to true to deploy the Datadog's CRDs |
| logLevel | string | `"info"` | Set Datadog Operator log level (debug, info, error, panic, fatal) | | logLevel | string | `"info"` | Set Datadog Operator log level (debug, info, error, panic, fatal) |
@ -93,7 +93,7 @@ and for the Datadog Operator chart:
``` ```
NAME CHART VERSION APP VERSION DESCRIPTION NAME CHART VERSION APP VERSION DESCRIPTION
datadog/datadog-operator 1.0.0 1.0.0 Datadog Operator datadog/datadog-operator 1.0.4 1.0.3 Datadog Operator
``` ```
Then you will need to install the cert manager if you don't have it already, add the chart: Then you will need to install the cert manager if you don't have it already, add the chart:
@ -115,7 +115,7 @@ You can update with the following:
``` ```
helm upgrade \ helm upgrade \
datadog-operator datadog/datadog-operator \ datadog-operator datadog/datadog-operator \
--set image.tag=1.0.0 \ --set image.tag=1.0.3 \
--set datadogCRDs.migration.datadogAgents.version=v2alpha1 \ --set datadogCRDs.migration.datadogAgents.version=v2alpha1 \
--set datadogCRDs.migration.datadogAgents.useCertManager=true \ --set datadogCRDs.migration.datadogAgents.useCertManager=true \
--set datadogCRDs.migration.datadogAgents.conversionWebhook.enabled=true --set datadogCRDs.migration.datadogAgents.conversionWebhook.enabled=true

View File

@ -46,7 +46,7 @@ and for the Datadog Operator chart:
``` ```
NAME CHART VERSION APP VERSION DESCRIPTION NAME CHART VERSION APP VERSION DESCRIPTION
datadog/datadog-operator 1.0.0 1.0.0 Datadog Operator datadog/datadog-operator 1.0.4 1.0.3 Datadog Operator
``` ```
Then you will need to install the cert manager if you don't have it already, add the chart: Then you will need to install the cert manager if you don't have it already, add the chart:
@ -68,7 +68,7 @@ You can update with the following:
``` ```
helm upgrade \ helm upgrade \
datadog-operator datadog/datadog-operator \ datadog-operator datadog/datadog-operator \
--set image.tag=1.0.0 \ --set image.tag=1.0.3 \
--set datadogCRDs.migration.datadogAgents.version=v2alpha1 \ --set datadogCRDs.migration.datadogAgents.version=v2alpha1 \
--set datadogCRDs.migration.datadogAgents.useCertManager=true \ --set datadogCRDs.migration.datadogAgents.useCertManager=true \
--set datadogCRDs.migration.datadogAgents.conversionWebhook.enabled=true --set datadogCRDs.migration.datadogAgents.conversionWebhook.enabled=true

View File

@ -1,5 +1,9 @@
# Changelog # Changelog
## 1.0.1
* Update CRDs from Datadog Operator v1.0.3.
## 1.0.0 ## 1.0.0
* Default DatadogAgent stored version is `v2alpha1` to align with the GA of the Datadog Operator. * Default DatadogAgent stored version is `v2alpha1` to align with the GA of the Datadog Operator.

View File

@ -15,4 +15,4 @@ sources:
- https://app.datadoghq.com/account/settings#agent/kubernetes - https://app.datadoghq.com/account/settings#agent/kubernetes
- https://github.com/DataDog/datadog-operator - https://github.com/DataDog/datadog-operator
- https://docs.datadoghq.com/agent/cluster_agent/external_metrics - https://docs.datadoghq.com/agent/cluster_agent/external_metrics
version: 1.0.0 version: 1.0.1

View File

@ -1,6 +1,6 @@
# Datadog CRDs # Datadog CRDs
![Version: 1.0.0](https://img.shields.io/badge/Version-1.0.0-informational?style=flat-square) ![AppVersion: 1](https://img.shields.io/badge/AppVersion-1-informational?style=flat-square) ![Version: 1.0.1](https://img.shields.io/badge/Version-1.0.1-informational?style=flat-square) ![AppVersion: 1](https://img.shields.io/badge/AppVersion-1-informational?style=flat-square)
This chart was designed to allow other "datadog" charts to share `CustomResourceDefinitions` such as the `DatadogMetric`. This chart was designed to allow other "datadog" charts to share `CustomResourceDefinitions` such as the `DatadogMetric`.

View File

@ -5852,9 +5852,6 @@ spec:
x-kubernetes-list-map-keys: x-kubernetes-list-map-keys:
- type - type
x-kubernetes-list-type: map x-kubernetes-list-type: map
defaultOverride:
type: object
x-kubernetes-preserve-unknown-fields: true
type: object type: object
type: object type: object
{{- if not (eq .Values.migration.datadogAgents.version "v2alpha1") }} {{- if not (eq .Values.migration.datadogAgents.version "v2alpha1") }}
@ -6407,6 +6404,10 @@ spec:
type: object type: object
logLevel: logLevel:
type: string type: string
namespaceLabelsAsTags:
additionalProperties:
type: string
type: object
networkPolicy: networkPolicy:
properties: properties:
create: create:
@ -6440,10 +6441,6 @@ spec:
flavor: flavor:
type: string type: string
type: object type: object
namespaceLabelsAsTags:
additionalProperties:
type: string
type: object
nodeLabelsAsTags: nodeLabelsAsTags:
additionalProperties: additionalProperties:
type: string type: string

View File

@ -1,4 +1,6 @@
{{- if and .Values.crds.datadogAgents (semverCompare "<=1.21-0" .Capabilities.KubeVersion.GitVersion ) }} {{- if and .Values.crds.datadogAgents (semverCompare "<=1.21-0" .Capabilities.KubeVersion.GitVersion ) }}
---
apiVersion: apiextensions.k8s.io/v1beta1 apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition kind: CustomResourceDefinition
metadata: metadata:
@ -6393,6 +6395,10 @@ spec:
type: object type: object
logLevel: logLevel:
type: string type: string
namespaceLabelsAsTags:
additionalProperties:
type: string
type: object
networkPolicy: networkPolicy:
properties: properties:
create: create:
@ -6426,6 +6432,10 @@ spec:
flavor: flavor:
type: string type: string
type: object type: object
nodeLabelsAsTags:
additionalProperties:
type: string
type: object
podAnnotationsAsTags: podAnnotationsAsTags:
additionalProperties: additionalProperties:
type: string type: string

View File

@ -1,4 +1,6 @@
{{- if and .Values.crds.datadogMetrics (semverCompare ">1.21-0" .Capabilities.KubeVersion.GitVersion ) }} {{- if and .Values.crds.datadogMetrics (semverCompare ">1.21-0" .Capabilities.KubeVersion.GitVersion ) }}
---
apiVersion: apiextensions.k8s.io/v1 apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition kind: CustomResourceDefinition
metadata: metadata:
@ -61,6 +63,9 @@ spec:
query: query:
description: Query is the raw datadog query description: Query is the raw datadog query
type: string type: string
timeWindow:
description: TimeWindow provides the time window for the metric query, defaults to MaxAge.
type: string
type: object type: object
status: status:
description: DatadogMetricStatus defines the observed state of DatadogMetric description: DatadogMetricStatus defines the observed state of DatadogMetric

View File

@ -1,4 +1,6 @@
{{- if and .Values.crds.datadogMetrics (semverCompare "<=1.21-0" .Capabilities.KubeVersion.GitVersion ) }} {{- if and .Values.crds.datadogMetrics (semverCompare "<=1.21-0" .Capabilities.KubeVersion.GitVersion ) }}
---
apiVersion: apiextensions.k8s.io/v1beta1 apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition kind: CustomResourceDefinition
metadata: metadata:
@ -61,6 +63,9 @@ spec:
query: query:
description: Query is the raw datadog query description: Query is the raw datadog query
type: string type: string
timeWindow:
description: TimeWindow provides the time window for the metric query, defaults to MaxAge.
type: string
type: object type: object
status: status:
description: DatadogMetricStatus defines the observed state of DatadogMetric description: DatadogMetricStatus defines the observed state of DatadogMetric
@ -98,6 +103,9 @@ spec:
- type - type
type: object type: object
type: array type: array
x-kubernetes-list-map-keys:
- type
x-kubernetes-list-type: map
currentValue: currentValue:
description: Value is the latest value of the metric description: Value is the latest value of the metric
type: string type: string

View File

@ -1,4 +1,6 @@
{{- if and .Values.crds.datadogMonitors (semverCompare ">1.21-0" .Capabilities.KubeVersion.GitVersion ) }} {{- if and .Values.crds.datadogMonitors (semverCompare ">1.21-0" .Capabilities.KubeVersion.GitVersion ) }}
---
apiVersion: apiextensions.k8s.io/v1 apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition kind: CustomResourceDefinition
metadata: metadata:

View File

@ -1,4 +1,6 @@
{{- if and .Values.crds.datadogMonitors (semverCompare "<=1.21-0" .Capabilities.KubeVersion.GitVersion ) }} {{- if and .Values.crds.datadogMonitors (semverCompare "<=1.21-0" .Capabilities.KubeVersion.GitVersion ) }}
---
apiVersion: apiextensions.k8s.io/v1beta1 apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition kind: CustomResourceDefinition
metadata: metadata:
@ -185,6 +187,9 @@ spec:
- type - type
type: object type: object
type: array type: array
x-kubernetes-list-map-keys:
- type
x-kubernetes-list-type: map
created: created:
description: Created is the time the monitor was created description: Created is the time the monitor was created
format: date-time format: date-time

View File

@ -42,7 +42,7 @@ image:
# image.repository -- Repository to use for Datadog Operator image # image.repository -- Repository to use for Datadog Operator image
repository: gcr.io/datadoghq/operator repository: gcr.io/datadoghq/operator
# image.tag -- Define the Datadog Operator version to use # image.tag -- Define the Datadog Operator version to use
tag: 1.0.0 tag: 1.0.3
# image.pullPolicy -- Define the pullPolicy for Datadog Operator image # image.pullPolicy -- Define the pullPolicy for Datadog Operator image
pullPolicy: IfNotPresent pullPolicy: IfNotPresent
# imagePullSecrets -- Datadog Operator repository pullSecret (ex: specify docker registry credentials) # imagePullSecrets -- Datadog Operator repository pullSecret (ex: specify docker registry credentials)

View File

@ -1,10 +1,10 @@
annotations: annotations:
catalog.cattle.io/certified: partner catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Dell CSI PowerScale catalog.cattle.io/display-name: Dell CSI PowerScale
catalog.cattle.io/kube-version: '>= 1.21.0 < 1.27.0' catalog.cattle.io/kube-version: '>= 1.21.0 < 1.28.0'
catalog.cattle.io/release-name: isilon catalog.cattle.io/release-name: isilon
apiVersion: v1 apiVersion: v2
appVersion: 2.6.1 appVersion: 2.7.0
description: 'PowerScale CSI (Container Storage Interface) driver Kubernetes integration. description: 'PowerScale CSI (Container Storage Interface) driver Kubernetes integration.
This chart includes everything required to provision via CSI as well as an Isilon This chart includes everything required to provision via CSI as well as an Isilon
StorageClass. ' StorageClass. '
@ -12,10 +12,10 @@ icon: https://partner-charts.rancher.io/assets/logos/dell.png
keywords: keywords:
- csi - csi
- storage - storage
kubeVersion: '>= 1.21.0 < 1.27.0' kubeVersion: '>= 1.21.0 < 1.28.0'
maintainers: maintainers:
- name: DellEMC - name: DellEMC
name: csi-isilon name: csi-isilon
sources: sources:
- https://github.com/dell/csi-isilon - https://github.com/dell/csi-isilon
version: 2.6.1 version: 2.7.0

View File

@ -3,48 +3,59 @@ Return the appropriate sidecar images based on k8s version
*/}} */}}
{{- define "csi-isilon.attacherImage" -}} {{- define "csi-isilon.attacherImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-attacher:v4.2.0" -}} {{- print "registry.k8s.io/sig-storage/csi-attacher:v4.3.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-isilon.provisionerImage" -}} {{- define "csi-isilon.provisionerImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-provisioner:v3.4.0" -}} {{- print "registry.k8s.io/sig-storage/csi-provisioner:v3.5.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-isilon.snapshotterImage" -}} {{- define "csi-isilon.snapshotterImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-snapshotter:v6.2.1" -}} {{- print "registry.k8s.io/sig-storage/csi-snapshotter:v6.2.2" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-isilon.resizerImage" -}} {{- define "csi-isilon.resizerImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-resizer:v1.7.0" -}} {{- print "registry.k8s.io/sig-storage/csi-resizer:v1.8.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-isilon.registrarImage" -}} {{- define "csi-isilon.registrarImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.6.3" -}} {{- print "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.8.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-isilon.healthmonitorImage" -}} {{- define "csi-isilon.healthmonitorImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "gcr.io/k8s-staging-sig-storage/csi-external-health-monitor-controller:v0.8.0" -}} {{- print "registry.k8s.io/sig-storage/csi-external-health-monitor-controller:v0.9.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{/*
Return true if storage capacity tracking is enabled and is supported based on k8s version
*/}}
{{- define "csi-isilon.isStorageCapacitySupported" -}}
{{- if eq .Values.storageCapacity.enabled true -}}
{{- if and (eq .Capabilities.KubeVersion.Major "1") (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "24") -}}
{{- true -}}
{{- end -}}
{{- end -}}
{{- end -}}

File diff suppressed because it is too large Load Diff

View File

@ -5,6 +5,7 @@ metadata:
spec: spec:
attachRequired: true attachRequired: true
podInfoOnMount: true podInfoOnMount: true
storageCapacity: {{ (include "csi-isilon.isStorageCapacitySupported" .) | default false }}
fsGroupPolicy: {{ .Values.fsGroupPolicy }} fsGroupPolicy: {{ .Values.fsGroupPolicy }}
volumeLifecycleModes: volumeLifecycleModes:
- Persistent - Persistent

View File

@ -2,7 +2,7 @@
######################## ########################
# version: version of this values file # version: version of this values file
# Note: Do not change this value # Note: Do not change this value
version: "v2.6.1" version: "v2.7.0"
# CSI driver log level # CSI driver log level
# Allowed values: "error", "warn"/"warning", "info", "debug" # Allowed values: "error", "warn"/"warning", "info", "debug"
@ -63,7 +63,7 @@ enableCustomTopology: false
# Allowed values: # Allowed values:
# ReadWriteOnceWithFSType: supports volume ownership and permissions change only if the fsType is defined # ReadWriteOnceWithFSType: supports volume ownership and permissions change only if the fsType is defined
# and the volume's accessModes contains ReadWriteOnce. # and the volume's accessModes contains ReadWriteOnce.
# File: kubernetes may use fsGroup to change permissions and ownership of the volume # File: kubernetes may use fsGroup to change permissions and ownership of the volume
# to match user requested fsGroup in the pod's security policy regardless of fstype or access mode. # to match user requested fsGroup in the pod's security policy regardless of fstype or access mode.
# None: volumes will be mounted with no modifications. # None: volumes will be mounted with no modifications.
# Default value: ReadWriteOnceWithFSType # Default value: ReadWriteOnceWithFSType
@ -110,6 +110,10 @@ controller:
# Default value: 5s # Default value: 5s
leaderElectionRetryPeriod: 5s leaderElectionRetryPeriod: 5s
# Image for csi-metadata-retriever
metadataretriever:
image: dellemc/csi-metadata-retriever:v1.4.0
# replication: allows to configure replication # replication: allows to configure replication
# Replication CRDs must be installed before installing driver # Replication CRDs must be installed before installing driver
replication: replication:
@ -123,11 +127,11 @@ controller:
# image: Image to use for dell-csi-replicator. This shouldn't be changed # image: Image to use for dell-csi-replicator. This shouldn't be changed
# Allowed values: string # Allowed values: string
# Default value: None # Default value: None
image: dellemc/dell-csi-replicator:v1.4.0 image: dellemc/dell-csi-replicator:v1.5.0
# replicationContextPrefix: prefix to use for naming of resources created by replication feature # replicationContextPrefix: prefix to use for naming of resources created by replication feature
# Allowed values: string # Allowed values: string
# Default value: powerstore # Default value: powerscale
replicationContextPrefix: "powerscale" replicationContextPrefix: "powerscale"
# replicationPrefix: prefix to prepend to storage classes parameters # replicationPrefix: prefix to prepend to storage classes parameters
@ -273,7 +277,6 @@ node:
# Default value: None # Default value: None
enabled: false enabled: false
## PLATFORM ATTRIBUTES ## PLATFORM ATTRIBUTES
###################### ######################
# endpointPort: Specify the HTTPs port number of the PowerScale OneFS API server # endpointPort: Specify the HTTPs port number of the PowerScale OneFS API server
@ -357,22 +360,36 @@ autoProbe: true
authorization: authorization:
enabled: false enabled: false
# sidecarProxyImage: the container image used for the csm-authorization-sidecar. # sidecarProxyImage: the container image used for the csm-authorization-sidecar.
# Default value: dellemc/csm-authorization-sidecar:v1.6.0 # Default value: dellemc/csm-authorization-sidecar:v1.7.0
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.6.0 sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.7.0
# proxyHost: hostname of the csm-authorization server # proxyHost: hostname of the csm-authorization server
# Default value: None # Default value: None
proxyHost: proxyHost:
# skipCertificateValidation: certificate validation of the csm-authorization server # skipCertificateValidation: certificate validation of the csm-authorization server
# Allowed Values: # Allowed Values:
# "true" - TLS certificate verification will be skipped # "true" - TLS certificate verification will be skipped
# "false" - TLS certificate will be verified # "false" - TLS certificate will be verified
# Default value: "true" # Default value: "true"
skipCertificateValidation: true skipCertificateValidation: true
# Storage Capacity Tracking
# Note: Capacity tracking is supported in kubernetes v1.24 and above, this feature will be automatically disabled in older versions.
storageCapacity:
# enabled : Enable/Disable storage capacity tracking
# Allowed values:
# true: enable storage capacity tracking
# false: disable storage capacity tracking
# Default value: true
enabled: true
# pollInterval : Configure how often external-provisioner polls the driver to detect changed capacity
# Allowed values: 1m,2m,3m,...,10m,...,60m etc
# Default value: 5m
pollInterval: 5m
# Enable this feature only after contact support for additional information # Enable this feature only after contact support for additional information
podmon: podmon:
enabled: false enabled: false
image: dellemc/podmon:v1.5.0 image: dellemc/podmon:v1.6.0
#controller: #controller:
# args: # args:
# - "--csisock=unix:/var/run/csi/csi.sock" # - "--csisock=unix:/var/run/csi/csi.sock"
@ -413,15 +430,15 @@ encryption:
# logLevel: Log level of the encryption driver. # logLevel: Log level of the encryption driver.
# Allowed values: "error", "warning", "info", "debug", "trace". # Allowed values: "error", "warning", "info", "debug", "trace".
logLevel: "error" logLevel: "error"
# livenessPort: HTTP liveness probe port number. # livenessPort: HTTP liveness probe port number.
# Leave empty to disable the liveness probe. # Leave empty to disable the liveness probe.
# Example: 8080 # Example: 8080
livenessPort: livenessPort:
# ocp: Enable when running on OpenShift Container Platform with CoreOS worker nodes. # ocp: Enable when running on OpenShift Container Platform with CoreOS worker nodes.
ocp: false ocp: false
# ocpCoreID: User ID and group ID of user core on CoreOS worker nodes. # ocpCoreID: User ID and group ID of user core on CoreOS worker nodes.
# Ignored when ocp is set to false. # Ignored when ocp is set to false.
ocpCoreID: "1000:1000" ocpCoreID: "1000:1000"

View File

@ -1,15 +1,15 @@
annotations: annotations:
catalog.cattle.io/certified: partner catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Dell CSI PowerMax catalog.cattle.io/display-name: Dell CSI PowerMax
catalog.cattle.io/kube-version: '>= 1.23.0 < 1.27.0' catalog.cattle.io/kube-version: '>= 1.23.0 < 1.28.0'
catalog.cattle.io/release-name: csi-powermax catalog.cattle.io/release-name: csi-powermax
apiVersion: v2 apiVersion: v2
appVersion: 2.6.0 appVersion: 2.7.0
dependencies: dependencies:
- condition: required - condition: required
name: csireverseproxy name: csireverseproxy
repository: file://./charts/csireverseproxy repository: file://./charts/csireverseproxy
version: 2.5.0 version: 2.6.0
description: 'PowerMax CSI (Container Storage Interface) driver Kubernetes integration. description: 'PowerMax CSI (Container Storage Interface) driver Kubernetes integration.
This chart includes everything required to provision via CSI as well as a PowerMax This chart includes everything required to provision via CSI as well as a PowerMax
StorageClass. ' StorageClass. '
@ -18,10 +18,11 @@ icon: https://partner-charts.rancher.io/assets/logos/dell.png
keywords: keywords:
- csi - csi
- storage - storage
kubeVersion: '>= 1.23.0 < 1.27.0' kubeVersion: '>= 1.23.0 < 1.28.0'
maintainers: maintainers:
- name: DellEMC - name: DellEMC
name: csi-powermax name: csi-powermax
sources: sources:
- https://github.com/dell/csi-powermax - https://github.com/dell/csi-powermax
version: 2.6.0 type: application
version: 2.7.0

View File

@ -1,6 +1,6 @@
apiVersion: v2 apiVersion: v2
appVersion: 2.5.0 appVersion: 2.6.0
description: A Helm chart for CSI PowerMax ReverseProxy description: A Helm chart for CSI PowerMax ReverseProxy
name: csireverseproxy name: csireverseproxy
type: application type: application
version: 2.5.0 version: 2.6.0

View File

@ -0,0 +1,70 @@
# If the csireverseproxy cert and key are provided, deploy a CA Issuer using the cert and key
{{- if ne .Values.certManager.selfSignedCert true }}
apiVersion: v1
data:
tls.crt: {{ .Values.certManager.certificateFile }}
tls.key: {{ .Values.certManager.privateKeyFile }}
kind: Secret
type: kubernetes.io/tls
metadata:
name: csirevproxy-tls-secret
namespace: {{ .Release.Namespace }}
---
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
name: csirevproxy-issuer
namespace: {{ .Release.Namespace }}
spec:
ca:
secretName: csirevproxy-tls-secret
---
{{- else }}
# deploy a selfsigned-issuer
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
name: selfsigned-issuer
namespace: {{ .Release.Namespace }}
spec:
selfSigned: {}
---
{{- end }}
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: csirevproxy-tls-cert
namespace: {{ .Release.Namespace }}
spec:
secretName: csirevproxy-tls-secret
commonName: powermax-reverseproxy
duration: 2160h # 90d
renewBefore: 360h # 15d
subject:
organizations:
- dellemc
isCA: false
privateKey:
algorithm: RSA
encoding: PKCS1
size: 2048
usages:
- server auth
- client auth
dnsNames:
- powermax-reverseproxy
- powermax-reverseproxy.powermax.svc.cluster.local
- reverseproxy
issuerRef:
{{- if ne .Values.certManager.selfSignedCert true }}
name: csirevproxy-issuer
{{- else }}
name: selfsigned-issuer
{{- end }}
kind: Issuer
group: cert-manager.io
---

View File

@ -2,6 +2,6 @@ apiVersion: v1
kind: ConfigMap kind: ConfigMap
metadata: metadata:
name: {{ .Release.Name }}-reverseproxy-config name: {{ .Release.Name }}-reverseproxy-config
namespace: {{ include "custom.namespace" . }} namespace: {{ .Release.Namespace }}
data: data:
{{ tpl (.Files.Glob "conf/config.yaml").AsConfig . | indent 2 }} {{ tpl (.Files.Glob "conf/config.yaml").AsConfig . | indent 2 }}

View File

@ -3,7 +3,7 @@ kind: Role
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: {{ .Release.Name }}-reverseproxy name: {{ .Release.Name }}-reverseproxy
namespace: {{ include "custom.namespace" . }} namespace: {{ .Release.Namespace }}
rules: rules:
- apiGroups: [""] - apiGroups: [""]
resources: ["secrets"] resources: ["secrets"]
@ -13,11 +13,11 @@ kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: {{ .Release.Name }}-reverseproxy name: {{ .Release.Name }}-reverseproxy
namespace: {{ include "custom.namespace" . }} namespace: {{ .Release.Namespace }}
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: {{ .Release.Name }}-reverseproxy name: {{ .Release.Name }}-reverseproxy
namespace: {{ include "custom.namespace" . }} namespace: {{ .Release.Namespace }}
roleRef: roleRef:
kind: Role kind: Role
name: {{ .Release.Name }}-reverseproxy name: {{ .Release.Name }}-reverseproxy

View File

@ -3,7 +3,7 @@ apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: {{ .Release.Name }}-reverseproxy name: {{ .Release.Name }}-reverseproxy
namespace: {{ include "custom.namespace" . }} namespace: {{ .Release.Namespace }}
spec: spec:
replicas: 1 replicas: 1
selector: selector:
@ -29,7 +29,7 @@ spec:
- name: X_CSI_REVPROXY_TLS_CERT_DIR - name: X_CSI_REVPROXY_TLS_CERT_DIR
value: /app/tls value: /app/tls
- name: X_CSI_REVPROXY_WATCH_NAMESPACE - name: X_CSI_REVPROXY_WATCH_NAMESPACE
value: {{ include "custom.namespace" . }} value: {{ .Release.Namespace }}
volumeMounts: volumeMounts:
- name: configmap-volume - name: configmap-volume
mountPath: /etc/config/configmap mountPath: /etc/config/configmap

View File

@ -2,7 +2,7 @@ apiVersion: v1
kind: Service kind: Service
metadata: metadata:
name: {{ .Release.Name }}-reverseproxy name: {{ .Release.Name }}-reverseproxy
namespace: {{ include "custom.namespace" . }} namespace: {{ .Release.Namespace }}
spec: spec:
ports: ports:
- port: {{ .Values.port }} - port: {{ .Values.port }}

View File

@ -3,5 +3,5 @@ apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: {{ .Release.Name }}-reverseproxy name: {{ .Release.Name }}-reverseproxy
namespace: {{ include "custom.namespace" . }} namespace: {{ .Release.Namespace }}
{{- end }} {{- end }}

View File

@ -1,4 +1,4 @@
image: dellemc/csipowermax-reverseproxy:v2.5.0 image: dellemc/csipowermax-reverseproxy:v2.6.0
port: 2222 port: 2222
# TLS secret which is used for setting up the proxy HTTPS server # TLS secret which is used for setting up the proxy HTTPS server

View File

@ -3,58 +3,48 @@ Return the appropriate sidecar images based on k8s version
*/}} */}}
{{- define "csi-powermax.attacherImage" -}} {{- define "csi-powermax.attacherImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "23") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "23") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-attacher:v4.2.0" -}} {{- print "k8s.gcr.io/sig-storage/csi-attacher:v4.3.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-powermax.provisionerImage" -}} {{- define "csi-powermax.provisionerImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "23") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "23") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-provisioner:v3.4.0" -}} {{- print "k8s.gcr.io/sig-storage/csi-provisioner:v3.5.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-powermax.snapshotterImage" -}} {{- define "csi-powermax.snapshotterImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "23") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "23") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-snapshotter:v6.2.1" -}} {{- print "k8s.gcr.io/sig-storage/csi-snapshotter:v6.2.2" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-powermax.resizerImage" -}} {{- define "csi-powermax.resizerImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "23") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "23") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-resizer:v1.7.0" -}} {{- print "k8s.gcr.io/sig-storage/csi-resizer:v1.8.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-powermax.registrarImage" -}} {{- define "csi-powermax.registrarImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "23") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "23") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.6.3" -}} {{- print "k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.8.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-powermax.healthmonitorImage" -}} {{- define "csi-powermax.healthmonitorImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "23") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "23") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "gcr.io/k8s-staging-sig-storage/csi-external-health-monitor-controller:v0.8.0" -}} {{- print "registry.k8s.io/sig-storage/csi-external-health-monitor-controller:v0.9.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{/*
Namespace for all resources to be installed into
If not defined in values file then the helm release namespace is used
By default this is not set so the helm release namespace will be used
*/}}
{{- define "custom.namespace" -}}
{{ .Values.namespace | default .Release.Namespace }}
{{- end -}}

View File

@ -2,13 +2,13 @@ apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: {{.Release.Name}}-controller name: {{.Release.Name}}-controller
namespace: {{ include "custom.namespace" . }} namespace: {{ .Release.Namespace }}
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
{{- if eq .Values.customDriverName.enabled true}} {{- if eq .Values.customDriverName.enabled true}}
name: {{printf "%s-%s-controller" ( include "custom.namespace" . ) .Values.customDriverName.value}} name: {{printf "%s-%s-controller" .Release.Namespace .Values.customDriverName.value}}
{{- else }} {{- else }}
name: {{ .Release.Name }}-controller name: {{ .Release.Name }}-controller
{{- end }} {{- end }}
@ -97,18 +97,18 @@ kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
{{- if eq .Values.customDriverName.enabled true}} {{- if eq .Values.customDriverName.enabled true}}
name: {{ printf "%s-%s-controller" ( include "custom.namespace" . ) .Values.customDriverName.value }} name: {{ printf "%s-%s-controller" .Release.Namespace .Values.customDriverName.value }}
{{- else }} {{- else }}
name: {{ .Release.Name }}-controller name: {{ .Release.Name }}-controller
{{- end }} {{- end }}
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: {{ .Release.Name }}-controller name: {{ .Release.Name }}-controller
namespace: {{ include "custom.namespace" . }} namespace: {{ .Release.Namespace }}
roleRef: roleRef:
kind: ClusterRole kind: ClusterRole
{{- if eq .Values.customDriverName.enabled true}} {{- if eq .Values.customDriverName.enabled true}}
name: {{ printf "%s-%s-controller" ( include "custom.namespace" . ) .Values.customDriverName.value }} name: {{ printf "%s-%s-controller" .Release.Namespace .Values.customDriverName.value }}
{{- else }} {{- else }}
name: {{ .Release.Name }}-controller name: {{ .Release.Name }}-controller
{{- end }} {{- end }}
@ -118,7 +118,7 @@ apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: {{ .Release.Name }}-controller name: {{ .Release.Name }}-controller
namespace: {{ include "custom.namespace" . }} namespace: {{ .Release.Namespace }}
{{- if hasKey .Values "authorization" }} {{- if hasKey .Values "authorization" }}
{{- if eq .Values.authorization.enabled true }} {{- if eq .Values.authorization.enabled true }}
annotations: annotations:
@ -345,7 +345,7 @@ spec:
{{- end }} {{- end }}
- name: X_CSI_POWERMAX_DRIVER_NAME - name: X_CSI_POWERMAX_DRIVER_NAME
{{- if eq .Values.customDriverName.enabled true}} {{- if eq .Values.customDriverName.enabled true}}
value: {{ required "Must provide a driver name" (printf "%s.%s.dellemc.com" ( include "custom.namespace" . ) .Values.customDriverName.value) }} value: {{ required "Must provide a driver name" (printf "%s.%s.dellemc.com" .Release.Namespace .Values.customDriverName.value) }}
{{- else }} {{- else }}
value: csi-powermax.dellemc.com value: csi-powermax.dellemc.com
{{- end }} {{- end }}
@ -448,7 +448,7 @@ spec:
- name: X_CSI_REVPROXY_TLS_CERT_DIR - name: X_CSI_REVPROXY_TLS_CERT_DIR
value: /app/tls value: /app/tls
- name: X_CSI_REVPROXY_WATCH_NAMESPACE - name: X_CSI_REVPROXY_WATCH_NAMESPACE
value: {{ include "custom.namespace" . }} value: {{ .Release.Namespace }}
- name: X_CSI_REVPROXY_IS_LEADER_ENABLED - name: X_CSI_REVPROXY_IS_LEADER_ENABLED
value: "true" value: "true"
volumeMounts: volumeMounts:

View File

@ -2,7 +2,7 @@ apiVersion: storage.k8s.io/v1
kind: CSIDriver kind: CSIDriver
metadata: metadata:
{{- if eq .Values.customDriverName.enabled true}} {{- if eq .Values.customDriverName.enabled true}}
name: {{ printf "%s-%s" ( include "custom.namespace" . ) .Values.customDriverName.value }} name: {{ printf "%s-%s" .Release.Namespace .Values.customDriverName.value }}
{{- else }} {{- else }}
name: csi-powermax name: csi-powermax
{{- end }} {{- end }}

View File

@ -2,7 +2,7 @@ apiVersion: v1
kind: ConfigMap kind: ConfigMap
metadata: metadata:
name: {{ .Release.Name }}-config-params name: {{ .Release.Name }}-config-params
namespace: {{ include "custom.namespace" . }} namespace: {{ .Release.Namespace }}
data: data:
driver-config-params.yaml: | driver-config-params.yaml: |
CSI_LOG_LEVEL: {{ .Values.global.logLevel | default "debug" }} CSI_LOG_LEVEL: {{ .Values.global.logLevel | default "debug" }}

View File

@ -3,13 +3,13 @@ apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: {{ .Release.Name }}-node name: {{ .Release.Name }}-node
namespace: {{ include "custom.namespace" . }} namespace: {{ .Release.Namespace }}
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
{{- if eq .Values.customDriverName.enabled true}} {{- if eq .Values.customDriverName.enabled true}}
name: {{ printf "%s-%s-node" ( include "custom.namespace" . ) .Values.customDriverName.value }} name: {{ printf "%s-%s-node" .Release.Namespace .Values.customDriverName.value }}
{{- else }} {{- else }}
name: {{ .Release.Name }}-node name: {{ .Release.Name }}-node
{{- end }} {{- end }}
@ -43,18 +43,18 @@ kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
{{- if eq .Values.customDriverName.enabled true}} {{- if eq .Values.customDriverName.enabled true}}
name: {{ printf "%s-%s-node" ( include "custom.namespace" . ) .Values.customDriverName.value }} name: {{ printf "%s-%s-node" .Release.Namespace .Values.customDriverName.value }}
{{- else }} {{- else }}
name: {{ .Release.Name }}-node name: {{ .Release.Name }}-node
{{- end }} {{- end }}
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: {{ .Release.Name }}-node name: {{ .Release.Name }}-node
namespace: {{ include "custom.namespace" . }} namespace: {{ .Release.Namespace }}
roleRef: roleRef:
kind: ClusterRole kind: ClusterRole
{{- if eq .Values.customDriverName.enabled true}} {{- if eq .Values.customDriverName.enabled true}}
name: {{ printf "%s-%s-node" ( include "custom.namespace" . ) .Values.customDriverName.value }} name: {{ printf "%s-%s-node" .Release.Namespace .Values.customDriverName.value }}
{{- else }} {{- else }}
name: {{ .Release.Name }}-node name: {{ .Release.Name }}-node
{{- end }} {{- end }}
@ -65,7 +65,7 @@ kind: DaemonSet
apiVersion: apps/v1 apiVersion: apps/v1
metadata: metadata:
name: {{ .Release.Name }}-node name: {{ .Release.Name }}-node
namespace: {{ include "custom.namespace" . }} namespace: {{ .Release.Namespace }}
{{- if hasKey .Values "authorization" }} {{- if hasKey .Values "authorization" }}
{{- if eq .Values.authorization.enabled true }} {{- if eq .Values.authorization.enabled true }}
annotations: annotations:
@ -113,7 +113,7 @@ spec:
env: env:
- name: X_CSI_POWERMAX_DRIVER_NAME - name: X_CSI_POWERMAX_DRIVER_NAME
{{- if eq .Values.customDriverName.enabled true }} {{- if eq .Values.customDriverName.enabled true }}
value: {{ required "Must provide a driver name" (printf "%s.%s.dellemc.com" ( include "custom.namespace" . ) .Values.customDriverName.value) }} value: {{ required "Must provide a driver name" (printf "%s.%s.dellemc.com" .Release.Namespace .Values.customDriverName.value) }}
{{- else }} {{- else }}
value: csi-powermax.dellemc.com value: csi-powermax.dellemc.com
{{- end }} {{- end }}

View File

@ -49,7 +49,7 @@ global:
# Current version of the driver # Current version of the driver
# Don't modify this value as this value will be used by the install script # Don't modify this value as this value will be used by the install script
version: "v2.6.0" version: "v2.7.0"
images: images:
# "driver" defines the container image, used for the driver container. # "driver" defines the container image, used for the driver container.
@ -255,8 +255,8 @@ enableCHAP: false
csireverseproxy: csireverseproxy:
# image: Define the container images used for the reverse proxy # image: Define the container images used for the reverse proxy
# Default value: None # Default value: None
# Example: "csipowermax-reverseproxy:v2.5.0" # Example: "csipowermax-reverseproxy:v2.6.0"
image: dellemc/csipowermax-reverseproxy:v2.5.0 image: dellemc/csipowermax-reverseproxy:v2.6.0
# "tlsSecret" defines the TLS secret that is created with certificate # "tlsSecret" defines the TLS secret that is created with certificate
# and its associated key # and its associated key
# Default value: None # Default value: None
@ -277,9 +277,21 @@ csireverseproxy:
# Default value: None # Default value: None
# Example: "StandAlone" # Example: "StandAlone"
mode: StandAlone mode: StandAlone
# Optionally, uncomment and specify the name of the pre-created namespace to install the sidecar in it # Auto-create TLS certificate for csi-reverseproxy
# namespace: certManager:
# Set selfSignedCert to use a self-signed certificate
# Default value: true
selfSignedCert: true
# certificateFile has tls.key content in encoded format
# Allowed Values:
# - encoded base64 value of tls.crt: cat tls.crt | base64
# - comment the param, if selfsigned should be used
certificateFile: tls.crt.encoded64
# privateKeyFile has tls.key content in encoded format
# Allowed Values:
# - encoded base64 value of tls.key: cat tls.key | base64
# - comment the param, if selfsigned should be used
privateKeyFile: tls.key.encoded64
# clusterPrefix: Define a prefix that is appended onto # clusterPrefix: Define a prefix that is appended onto
# all resources created in the Array # all resources created in the Array
# This should be unique per K8s/CSI deployment # This should be unique per K8s/CSI deployment
@ -363,7 +375,7 @@ replication:
enabled: false enabled: false
# Change this to use any specific version of the dell-csi-replicator sidecar # Change this to use any specific version of the dell-csi-replicator sidecar
# Default value: None # Default value: None
image: dellemc/dell-csi-replicator:v1.4.0 image: dellemc/dell-csi-replicator:v1.5.0
# replicationContextPrefix enables side cars to read # replicationContextPrefix enables side cars to read
# required information from the volume context # required information from the volume context
# Default value: "powermax" # Default value: "powermax"
@ -384,10 +396,10 @@ migration:
enabled: false enabled: false
# Change this to use any specific version of the dell-csi-migrator sidecar # Change this to use any specific version of the dell-csi-migrator sidecar
# Default value: None # Default value: None
image: dellemc/dell-csi-migrator:v1.1.0 image: dellemc/dell-csi-migrator:v1.1.1
# Node rescan sidecar does a rescan on nodes for identifying new paths # Node rescan sidecar does a rescan on nodes for identifying new paths
# Default value: dellemc/dell-csi-node-rescanner:v1.0.0 # Default value: dellemc/dell-csi-node-rescanner:v1.0.1
nodeRescanSidecarImage: dellemc/dell-csi-node-rescanner:v1.0.0 nodeRescanSidecarImage: dellemc/dell-csi-node-rescanner:v1.0.1
# migrationPrefix: Determine if migration is enabled # migrationPrefix: Determine if migration is enabled
# Default value: "migration.storage.dell.com" # Default value: "migration.storage.dell.com"
# Examples: "migration.storage.dell.com" # Examples: "migration.storage.dell.com"
@ -403,8 +415,8 @@ migration:
authorization: authorization:
enabled: false enabled: false
# sidecarProxyImage: the container image used for the csm-authorization-sidecar. # sidecarProxyImage: the container image used for the csm-authorization-sidecar.
# Default value: dellemc/csm-authorization-sidecar:v1.6.0 # Default value: dellemc/csm-authorization-sidecar:v1.7.0
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.6.0 sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.7.0
# proxyHost: hostname of the csm-authorization server # proxyHost: hostname of the csm-authorization server
# Default value: None # Default value: None
proxyHost: proxyHost:
@ -435,6 +447,3 @@ vSphere:
vCenterHost: "00.000.000.00" vCenterHost: "00.000.000.00"
# vCenterCredSecret: secret name for the vCenter credentials # vCenterCredSecret: secret name for the vCenter credentials
vCenterCredSecret: vcenter-creds vCenterCredSecret: vcenter-creds
# Optionally, uncomment and specify the name of the pre-created namespace to install the driver in it
# namespace:

View File

@ -1,10 +1,10 @@
annotations: annotations:
catalog.cattle.io/certified: partner catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Dell CSI PowerStore catalog.cattle.io/display-name: Dell CSI PowerStore
catalog.cattle.io/kube-version: '>= 1.22.0 < 1.27.0' catalog.cattle.io/kube-version: '>= 1.22.0 < 1.28.0'
catalog.cattle.io/release-name: csi-powerstore catalog.cattle.io/release-name: powerstore
apiVersion: v2 apiVersion: v2
appVersion: 2.6.0 appVersion: 2.7.0
description: 'PowerStore CSI (Container Storage Interface) driver Kubernetes integration. description: 'PowerStore CSI (Container Storage Interface) driver Kubernetes integration.
This chart includes everything required to provision via CSI as well as a PowerStore This chart includes everything required to provision via CSI as well as a PowerStore
StorageClass. ' StorageClass. '
@ -13,10 +13,10 @@ icon: https://partner-charts.rancher.io/assets/logos/dell.png
keywords: keywords:
- csi - csi
- storage - storage
kubeVersion: '>= 1.22.0 < 1.27.0' kubeVersion: '>= 1.22.0 < 1.28.0'
maintainers: maintainers:
- name: DellEMC - name: DellEMC
name: csi-powerstore name: csi-powerstore
sources: sources:
- https://github.com/dell/csi-powerstore - https://github.com/dell/csi-powerstore
version: 2.6.0 version: 2.7.0

View File

@ -3,48 +3,48 @@ Return the appropriate sidecar images based on k8s version
*/}} */}}
{{- define "csi-powerstore.attacherImage" -}} {{- define "csi-powerstore.attacherImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-attacher:v4.2.0" -}} {{- print "registry.k8s.io/sig-storage/csi-attacher:v4.3.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-powerstore.provisionerImage" -}} {{- define "csi-powerstore.provisionerImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-provisioner:v3.4.0" -}} {{- print "registry.k8s.io/sig-storage/csi-provisioner:v3.5.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-powerstore.snapshotterImage" -}} {{- define "csi-powerstore.snapshotterImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-snapshotter:v6.2.1" -}} {{- print "registry.k8s.io/sig-storage/csi-snapshotter:v6.2.2" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-powerstore.resizerImage" -}} {{- define "csi-powerstore.resizerImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-resizer:v1.7.0" -}} {{- print "registry.k8s.io/sig-storage/csi-resizer:v1.8.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-powerstore.registrarImage" -}} {{- define "csi-powerstore.registrarImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.6.3" -}} {{- print "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.8.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-powerstore.healthmonitorImage" -}} {{- define "csi-powerstore.healthmonitorImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "gcr.io/k8s-staging-sig-storage/csi-external-health-monitor-controller:v0.8.0" -}} {{- print "registry.k8s.io/sig-storage/csi-external-health-monitor-controller:v0.9.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}

View File

@ -1,6 +1,6 @@
# #
# #
# Copyright © 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. # Copyright © 2020-2023 Dell Inc. or its subsidiaries. All Rights Reserved.
# #
# Licensed under the Apache License, Version 2.0 (the "License"); # Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License. # you may not use this file except in compliance with the License.

View File

@ -1,6 +1,6 @@
# #
# #
# Copyright © 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. # Copyright © 2020-2023 Dell Inc. or its subsidiaries. All Rights Reserved.
# #
# Licensed under the Apache License, Version 2.0 (the "License"); # Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License. # you may not use this file except in compliance with the License.
@ -105,7 +105,7 @@ spec:
tolerations: tolerations:
{{- toYaml .Values.node.tolerations | nindent 6 }} {{- toYaml .Values.node.tolerations | nindent 6 }}
{{ end }} {{ end }}
serviceAccount: {{ .Release.Name }}-node serviceAccountName: {{ .Release.Name }}-node
dnsPolicy: ClusterFirstWithHostNet dnsPolicy: ClusterFirstWithHostNet
hostNetwork: true hostNetwork: true
hostIPC: true hostIPC: true

View File

@ -1,6 +1,6 @@
# #
# #
# Copyright © 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. # Copyright © 2020-2023 Dell Inc. or its subsidiaries. All Rights Reserved.
# #
# Licensed under the Apache License, Version 2.0 (the "License"); # Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License. # you may not use this file except in compliance with the License.
@ -23,7 +23,7 @@
driverName: "csi-powerstore.dellemc.com" driverName: "csi-powerstore.dellemc.com"
# Driver version required to pull the latest driver image # Driver version required to pull the latest driver image
version: "v2.6.0" version: "v2.7.0"
# Specify kubelet config dir path. # Specify kubelet config dir path.
# Ensure that the config.yaml file is present at this path. # Ensure that the config.yaml file is present at this path.
@ -151,7 +151,7 @@ controller:
# image: Image to use for dell-csi-replicator. This shouldn't be changed # image: Image to use for dell-csi-replicator. This shouldn't be changed
# Allowed values: string # Allowed values: string
# Default value: None # Default value: None
image: dellemc/dell-csi-replicator:v1.4.0 image: dellemc/dell-csi-replicator:v1.5.0
# replicationContextPrefix: prefix to use for naming of resources created by replication feature # replicationContextPrefix: prefix to use for naming of resources created by replication feature
# Allowed values: string # Allowed values: string
@ -164,7 +164,7 @@ controller:
replicationPrefix: "replication.storage.dell.com" replicationPrefix: "replication.storage.dell.com"
# Image for csi-metadata-retriever # Image for csi-metadata-retriever
metadataretriever: dellemc/csi-metadata-retriever:v1.3.0 metadataretriever: dellemc/csi-metadata-retriever:v1.4.0
# nodeSelector: Define node selection constraints for controller pods. # nodeSelector: Define node selection constraints for controller pods.
# For the pod to be eligible to run on a node, the node must have each # For the pod to be eligible to run on a node, the node must have each
@ -311,7 +311,7 @@ storageCapacity:
# Enable this feature only after contact support for additional information # Enable this feature only after contact support for additional information
podmon: podmon:
enabled: false enabled: false
image: dellemc/podmon:v1.5.0 image: dellemc/podmon:v1.6.0
#controller: #controller:
# args: # args:
# - "--csisock=unix:/var/run/csi/csi.sock" # - "--csisock=unix:/var/run/csi/csi.sock"

View File

@ -1,11 +1,10 @@
annotations: annotations:
catalog.cattle.io/certified: partner catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Dell CSI Unity catalog.cattle.io/display-name: Dell CSI Unity
catalog.cattle.io/kube-version: '>= 1.24.0 < 1.27.0' catalog.cattle.io/kube-version: '>= 1.24.0 < 1.28.0'
catalog.cattle.io/namespace: unity catalog.cattle.io/release-name: unity
catalog.cattle.io/release-name: csi-unity
apiVersion: v1 apiVersion: v1
appVersion: 2.6.0 appVersion: 2.7.0
description: 'Unity XT CSI (Container Storage Interface) driver Kubernetes integration. description: 'Unity XT CSI (Container Storage Interface) driver Kubernetes integration.
This chart includes everything required to provision via CSI as well as a Unity This chart includes everything required to provision via CSI as well as a Unity
XT StorageClass. ' XT StorageClass. '
@ -13,10 +12,10 @@ icon: https://partner-charts.rancher.io/assets/logos/dell.png
keywords: keywords:
- csi - csi
- storage - storage
kubeVersion: '>= 1.24.0 < 1.27.0' kubeVersion: '>= 1.24.0 < 1.28.0'
maintainers: maintainers:
- name: DellEMC - name: DellEMC
name: csi-unity name: csi-unity
sources: sources:
- https://github.com/dell/csi-unity - https://github.com/dell/csi-unity
version: 2.6.0 version: 2.7.0

View File

@ -3,48 +3,48 @@ Return the appropriate sidecar images based on k8s version
*/}} */}}
{{- define "csi-unity.attacherImage" -}} {{- define "csi-unity.attacherImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "24") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-attacher:v4.2.0" -}} {{- print "registry.k8s.io/sig-storage/csi-attacher:v4.3.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-unity.provisionerImage" -}} {{- define "csi-unity.provisionerImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "24") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-provisioner:v3.4.0" -}} {{- print "registry.k8s.io/sig-storage/csi-provisioner:v3.5.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-unity.snapshotterImage" -}} {{- define "csi-unity.snapshotterImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "24") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-snapshotter:v6.2.1" -}} {{- print "registry.k8s.io/sig-storage/csi-snapshotter:v6.2.2" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-unity.resizerImage" -}} {{- define "csi-unity.resizerImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "24") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-resizer:v1.7.0" -}} {{- print "registry.k8s.io/sig-storage/csi-resizer:v1.8.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-unity.registrarImage" -}} {{- define "csi-unity.registrarImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "24") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.6.3" -}} {{- print "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.8.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-unity.healthmonitorImage" -}} {{- define "csi-unity.healthmonitorImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "22") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "24") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "gcr.io/k8s-staging-sig-storage/csi-external-health-monitor-controller:v0.8.0" -}} {{- print "registry.k8s.io/sig-storage/csi-external-health-monitor-controller:v0.9.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}

View File

@ -3,8 +3,8 @@
# version: version of this values file # version: version of this values file
# Note: Do not change this value # Note: Do not change this value
# Examples : "v2.6.0" , "nightly" # Examples : "v2.7.0" , "nightly"
version: "v2.6.0" version: "v2.7.0"
# LogLevel is used to set the logging level of the driver. # LogLevel is used to set the logging level of the driver.
# Allowed values: "error", "warn"/"warning", "info", "debug" # Allowed values: "error", "warn"/"warning", "info", "debug"
@ -181,6 +181,7 @@ node:
# - key: "isilon.podmon.storage.dell.com" # - key: "isilon.podmon.storage.dell.com"
# operator: "Exists" # operator: "Exists"
# effect: "NoSchedule" # effect: "NoSchedule"
# CSM module attributes # CSM module attributes
# service to monitor failing jobs and notify # service to monitor failing jobs and notify
podmon: podmon:
@ -193,27 +194,27 @@ podmon:
# allowed values - string # allowed values - string
# default value : None # default value : None
# Example : "podman:latest", "pod:latest" # Example : "podman:latest", "pod:latest"
image: dellemc/podmon:v1.5.0 image: dellemc/podmon:v1.6.0
# controller: controller:
# args: args:
# - "--csisock=unix:/var/run/csi/csi.sock" - "--csisock=unix:/var/run/csi/csi.sock"
# - "--labelvalue=csi-unity" - "--labelvalue=csi-unity"
# - "--driverPath=csi-unity.dellemc.com" - "--driverPath=csi-unity.dellemc.com"
# - "--mode=controller" - "--mode=controller"
# - "--skipArrayConnectionValidation=false" - "--skipArrayConnectionValidation=false"
# - "--driver-config-params=/unity-config/driver-config-params.yaml" - "--driver-config-params=/unity-config/driver-config-params.yaml"
# - "--driverPodLabelValue=dell-storage" - "--driverPodLabelValue=dell-storage"
# - "--ignoreVolumelessPods=false" - "--ignoreVolumelessPods=false"
# node: node:
# args: args:
# - "--csisock=unix:/var/lib/kubelet/plugins/unity.emc.dell.com/csi_sock" - "--csisock=unix:/var/lib/kubelet/plugins/unity.emc.dell.com/csi_sock"
# - "--labelvalue=csi-unity" - "--labelvalue=csi-unity"
# - "--driverPath=csi-unity.dellemc.com" - "--driverPath=csi-unity.dellemc.com"
# - "--mode=node" - "--mode=node"
# - "--leaderelection=false" - "--leaderelection=false"
# - "--driver-config-params=/unity-config/driver-config-params.yaml" - "--driver-config-params=/unity-config/driver-config-params.yaml"
# - "--driverPodLabelValue=dell-storage" - "--driverPodLabelValue=dell-storage"
# - "--ignoreVolumelessPods=false" - "--ignoreVolumelessPods=false"
### The below parameters have been discontinued for configuration from secret.yaml and will have to be configured only in values.yaml ### The below parameters have been discontinued for configuration from secret.yaml and will have to be configured only in values.yaml

View File

@ -1,11 +1,11 @@
annotations: annotations:
catalog.cattle.io/certified: partner catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Dell CSI PowerFlex catalog.cattle.io/display-name: Dell CSI PowerFlex
catalog.cattle.io/kube-version: '>= 1.21.0 < 1.27.0' catalog.cattle.io/kube-version: '>= 1.21.0 < 1.28.0'
catalog.cattle.io/namespace: vxflexos catalog.cattle.io/namespace: vxflexos
catalog.cattle.io/release-name: vxflexos catalog.cattle.io/release-name: vxflexos
apiVersion: v2 apiVersion: v2
appVersion: 2.6.0 appVersion: 2.7.0
description: 'VxFlex OS CSI (Container Storage Interface) driver Kubernetes integration. description: 'VxFlex OS CSI (Container Storage Interface) driver Kubernetes integration.
This chart includes everything required to provision via CSI as well as a VxFlex This chart includes everything required to provision via CSI as well as a VxFlex
OS StorageClass. ' OS StorageClass. '
@ -13,10 +13,10 @@ icon: https://partner-charts.rancher.io/assets/logos/dell.png
keywords: keywords:
- csi - csi
- storage - storage
kubeVersion: '>= 1.21.0 < 1.27.0' kubeVersion: '>= 1.21.0 < 1.28.0'
maintainers: maintainers:
- name: DellEMC - name: DellEMC
name: csi-vxflexos name: csi-vxflexos
sources: sources:
- https://github.com/dell/csi-vxflexos - https://github.com/dell/csi-vxflexos
version: 2.6.0 version: 2.7.0

View File

@ -3,48 +3,48 @@ Return the appropriate sidecar images based on k8s version
*/}} */}}
{{- define "csi-vxflexos.attacherImage" -}} {{- define "csi-vxflexos.attacherImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-attacher:v4.2.0" -}} {{- print "registry.k8s.io/sig-storage/csi-attacher:v4.3.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-vxflexos.provisionerImage" -}} {{- define "csi-vxflexos.provisionerImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-provisioner:v3.4.0" -}} {{- print "registry.k8s.io/sig-storage/csi-provisioner:v3.5.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-vxflexos.snapshotterImage" -}} {{- define "csi-vxflexos.snapshotterImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-snapshotter:v6.2.1" -}} {{- print "registry.k8s.io/sig-storage/csi-snapshotter:v6.2.2" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-vxflexos.resizerImage" -}} {{- define "csi-vxflexos.resizerImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-resizer:v1.7.0" -}} {{- print "registry.k8s.io/sig-storage/csi-resizer:v1.8.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-vxflexos.registrarImage" -}} {{- define "csi-vxflexos.registrarImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.6.3" -}} {{- print "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.8.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "csi-vxflexos.healthmonitorImage" -}} {{- define "csi-vxflexos.healthmonitorImage" -}}
{{- if eq .Capabilities.KubeVersion.Major "1" }} {{- if eq .Capabilities.KubeVersion.Major "1" }}
{{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "26") -}} {{- if and (ge (trimSuffix "+" .Capabilities.KubeVersion.Minor) "21") (le (trimSuffix "+" .Capabilities.KubeVersion.Minor) "27") -}}
{{- print "gcr.io/k8s-staging-sig-storage/csi-external-health-monitor-controller:v0.8.0" -}} {{- print "registry.k8s.io/sig-storage/csi-external-health-monitor-controller:v0.9.0" -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}

View File

@ -3,7 +3,7 @@
# "version" is used to verify the values file matches driver version # "version" is used to verify the values file matches driver version
# Not recommend to change # Not recommend to change
version: v2.6.0 version: v2.7.0
images: images:
# "driver" defines the container image, used for the driver container. # "driver" defines the container image, used for the driver container.
@ -95,7 +95,7 @@ controller:
# image: Image to use for dell-csi-replicator. This shouldn't be changed # image: Image to use for dell-csi-replicator. This shouldn't be changed
# Allowed values: string # Allowed values: string
# Default value: None # Default value: None
image: dellemc/dell-csi-replicator:v1.4.0 image: dellemc/dell-csi-replicator:v1.5.0
# replicationContextPrefix: prefix to use for naming of resources created by replication feature # replicationContextPrefix: prefix to use for naming of resources created by replication feature
# Allowed values: string # Allowed values: string
@ -277,7 +277,7 @@ vgsnapshotter:
# Enable this feature only after contact support for additional information # Enable this feature only after contact support for additional information
podmon: podmon:
enabled: false enabled: false
image: dellemc/podmon:v1.5.0 image: dellemc/podmon:v1.6.0
#controller: #controller:
# args: # args:
# - "--csisock=unix:/var/run/csi/csi.sock" # - "--csisock=unix:/var/run/csi/csi.sock"
@ -308,8 +308,8 @@ authorization:
enabled: false enabled: false
# sidecarProxyImage: the container image used for the csm-authorization-sidecar. # sidecarProxyImage: the container image used for the csm-authorization-sidecar.
# Default value: dellemc/csm-authorization-sidecar:v1.6.0 # Default value: dellemc/csm-authorization-sidecar:v1.7.0
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.6.0 sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.7.0
# proxyHost: hostname of the csm-authorization server # proxyHost: hostname of the csm-authorization server
# Default value: None # Default value: None

View File

@ -4,7 +4,7 @@ annotations:
catalog.cattle.io/kube-version: '>= 1.19.0-0' catalog.cattle.io/kube-version: '>= 1.19.0-0'
catalog.cattle.io/release-name: external-secrets catalog.cattle.io/release-name: external-secrets
apiVersion: v2 apiVersion: v2
appVersion: v0.8.3 appVersion: v0.9.0
description: External secret management for Kubernetes description: External secret management for Kubernetes
home: https://github.com/external-secrets/external-secrets home: https://github.com/external-secrets/external-secrets
icon: https://raw.githubusercontent.com/external-secrets/external-secrets/main/assets/eso-logo-large.png icon: https://raw.githubusercontent.com/external-secrets/external-secrets/main/assets/eso-logo-large.png
@ -17,4 +17,4 @@ maintainers:
name: mcavoyk name: mcavoyk
name: external-secrets name: external-secrets
type: application type: application
version: 0.8.3 version: 0.9.0

View File

@ -4,7 +4,7 @@
[//]: # (README.md generated by gotmpl. DO NOT EDIT.) [//]: # (README.md generated by gotmpl. DO NOT EDIT.)
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.8.3](https://img.shields.io/badge/Version-0.8.3-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.9.0](https://img.shields.io/badge/Version-0.9.0-informational?style=flat-square)
External secret management for Kubernetes External secret management for Kubernetes
@ -82,6 +82,7 @@ The command removes all the Kubernetes components associated with the chart and
| certController.serviceMonitor.scrapeTimeout | string | `"25s"` | Timeout if metrics can't be retrieved in given time interval | | certController.serviceMonitor.scrapeTimeout | string | `"25s"` | Timeout if metrics can't be retrieved in given time interval |
| certController.tolerations | list | `[]` | | | certController.tolerations | list | `[]` | |
| certController.topologySpreadConstraints | list | `[]` | | | certController.topologySpreadConstraints | list | `[]` | |
| commonLabels | object | `{}` | Additional labels added to all helm chart resources. |
| concurrent | int | `1` | Specifies the number of concurrent ExternalSecret Reconciles external-secret executes at a time. | | concurrent | int | `1` | Specifies the number of concurrent ExternalSecret Reconciles external-secret executes at a time. |
| controllerClass | string | `""` | If set external secrets will filter matching Secret Stores with the appropriate controller values. | | controllerClass | string | `""` | If set external secrets will filter matching Secret Stores with the appropriate controller values. |
| crds.annotations | object | `{}` | | | crds.annotations | object | `{}` | |
@ -151,6 +152,13 @@ The command removes all the Kubernetes components associated with the chart and
| webhook.affinity | object | `{}` | | | webhook.affinity | object | `{}` | |
| webhook.certCheckInterval | string | `"5m"` | Specifices the time to check if the cert is valid | | webhook.certCheckInterval | string | `"5m"` | Specifices the time to check if the cert is valid |
| webhook.certDir | string | `"/tmp/certs"` | | | webhook.certDir | string | `"/tmp/certs"` | |
| webhook.certManager.addInjectorAnnotations | bool | `true` | Automatically add the cert-manager.io/inject-ca-from annotation to the webhooks and CRDs. As long as you have the cert-manager CA Injector enabled, this will automatically setup your webhook's CA to the one used by cert-manager. See https://cert-manager.io/docs/concepts/ca-injector |
| webhook.certManager.cert.annotations | object | `{}` | Add extra annotations to the Certificate resource. |
| webhook.certManager.cert.create | bool | `true` | Create a certificate resource within this chart. See https://cert-manager.io/docs/usage/certificate/ |
| webhook.certManager.cert.duration | string | `""` | Set the requested duration (i.e. lifetime) of the Certificate. See https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec |
| webhook.certManager.cert.issuerRef | object | `{"group":"cert-manager.io","kind":"Issuer","name":"my-issuer"}` | For the Certificate created by this chart, setup the issuer. See https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.IssuerSpec |
| webhook.certManager.cert.renewBefore | string | `""` | How long before the currently issued certificates expiry cert-manager should renew the certificate. See https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec Note that renewBefore should be greater than .webhook.lookaheadInterval since the webhook will check this far in advance that the certificate is valid. |
| webhook.certManager.enabled | bool | `false` | Enabling cert-manager support will disable the built in secret and switch to using cert-manager (installed separately) to automatically issue and renew the webhook certificate. This chart does not install cert-manager for you, See https://cert-manager.io/docs/ |
| webhook.create | bool | `true` | Specifies whether a webhook deployment be created. | | webhook.create | bool | `true` | Specifies whether a webhook deployment be created. |
| webhook.deploymentAnnotations | object | `{}` | Annotations to add to Deployment | | webhook.deploymentAnnotations | object | `{}` | Annotations to add to Deployment |
| webhook.extraArgs | object | `{}` | | | webhook.extraArgs | object | `{}` | |

View File

@ -40,6 +40,9 @@ helm.sh/chart: {{ include "external-secrets.chart" . }}
app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
{{- end }} {{- end }}
app.kubernetes.io/managed-by: {{ .Release.Service }} app.kubernetes.io/managed-by: {{ .Release.Service }}
{{- with .Values.commonLabels }}
{{ toYaml . }}
{{- end }}
{{- end }} {{- end }}
{{- define "external-secrets-webhook.labels" -}} {{- define "external-secrets-webhook.labels" -}}
@ -49,11 +52,17 @@ helm.sh/chart: {{ include "external-secrets.chart" . }}
app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
{{- end }} {{- end }}
app.kubernetes.io/managed-by: {{ .Release.Service }} app.kubernetes.io/managed-by: {{ .Release.Service }}
{{- with .Values.commonLabels }}
{{ toYaml . }}
{{- end }}
{{- end }} {{- end }}
{{- define "external-secrets-webhook-metrics.labels" -}} {{- define "external-secrets-webhook-metrics.labels" -}}
{{ include "external-secrets-webhook.selectorLabels" . }} {{ include "external-secrets-webhook.selectorLabels" . }}
app.kubernetes.io/metrics: "webhook" app.kubernetes.io/metrics: "webhook"
{{- with .Values.commonLabels }}
{{ toYaml . }}
{{- end }}
{{- end }} {{- end }}
{{- define "external-secrets-cert-controller.labels" -}} {{- define "external-secrets-cert-controller.labels" -}}
@ -63,11 +72,17 @@ helm.sh/chart: {{ include "external-secrets.chart" . }}
app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
{{- end }} {{- end }}
app.kubernetes.io/managed-by: {{ .Release.Service }} app.kubernetes.io/managed-by: {{ .Release.Service }}
{{- with .Values.commonLabels }}
{{ toYaml . }}
{{- end }}
{{- end }} {{- end }}
{{- define "external-secrets-cert-controller-metrics.labels" -}} {{- define "external-secrets-cert-controller-metrics.labels" -}}
{{ include "external-secrets-cert-controller.selectorLabels" . }} {{ include "external-secrets-cert-controller.selectorLabels" . }}
app.kubernetes.io/metrics: "cert-controller" app.kubernetes.io/metrics: "cert-controller"
{{- with .Values.commonLabels }}
{{ toYaml . }}
{{- end }}
{{- end }} {{- end }}
{{/* {{/*

View File

@ -6,7 +6,10 @@ metadata:
{{- with .Values.crds.annotations }} {{- with .Values.crds.annotations }}
{{- toYaml . | nindent 4}} {{- toYaml . | nindent 4}}
{{- end }} {{- end }}
controller-gen.kubebuilder.io/version: v0.11.4 {{- if and .Values.crds.conversion.enabled .Values.webhook.certManager.enabled .Values.webhook.certManager.addInjectorAnnotations }}
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ include "external-secrets.fullname" . }}-webhook
{{- end }}
controller-gen.kubebuilder.io/version: v0.12.0
name: acraccesstokens.generators.external-secrets.io name: acraccesstokens.generators.external-secrets.io
spec: spec:
group: generators.external-secrets.io group: generators.external-secrets.io

View File

@ -6,7 +6,10 @@ metadata:
{{- with .Values.crds.annotations }} {{- with .Values.crds.annotations }}
{{- toYaml . | nindent 4}} {{- toYaml . | nindent 4}}
{{- end }} {{- end }}
controller-gen.kubebuilder.io/version: v0.11.4 {{- if and .Values.crds.conversion.enabled .Values.webhook.certManager.enabled .Values.webhook.certManager.addInjectorAnnotations }}
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ include "external-secrets.fullname" . }}-webhook
{{- end }}
controller-gen.kubebuilder.io/version: v0.12.0
name: clusterexternalsecrets.external-secrets.io name: clusterexternalsecrets.external-secrets.io
spec: spec:
group: external-secrets.io group: external-secrets.io
@ -50,6 +53,18 @@ spec:
spec: spec:
description: ClusterExternalSecretSpec defines the desired state of ClusterExternalSecret. description: ClusterExternalSecretSpec defines the desired state of ClusterExternalSecret.
properties: properties:
externalSecretMetadata:
description: The metadata of the external secrets to be created
properties:
annotations:
additionalProperties:
type: string
type: object
labels:
additionalProperties:
type: string
type: object
type: object
externalSecretName: externalSecretName:
description: The name of the external secrets to be created defaults to the name of the ClusterExternalSecret description: The name of the external secrets to be created defaults to the name of the ClusterExternalSecret
type: string type: string

View File

@ -6,7 +6,10 @@ metadata:
{{- with .Values.crds.annotations }} {{- with .Values.crds.annotations }}
{{- toYaml . | nindent 4}} {{- toYaml . | nindent 4}}
{{- end }} {{- end }}
controller-gen.kubebuilder.io/version: v0.11.4 {{- if and .Values.crds.conversion.enabled .Values.webhook.certManager.enabled .Values.webhook.certManager.addInjectorAnnotations }}
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ include "external-secrets.fullname" . }}-webhook
{{- end }}
controller-gen.kubebuilder.io/version: v0.12.0
name: clustersecretstores.external-secrets.io name: clustersecretstores.external-secrets.io
spec: spec:
group: external-secrets.io group: external-secrets.io
@ -1496,6 +1499,24 @@ spec:
- SecretsManager - SecretsManager
- ParameterStore - ParameterStore
type: string type: string
sessionTags:
description: AWS STS assume role session tags
items:
properties:
key:
type: string
value:
type: string
required:
- key
- value
type: object
type: array
transitiveTagKeys:
description: AWS STS assume role transitive session tags. Required when multiple rules are used with SecretStore
items:
type: string
type: array
required: required:
- region - region
- service - service
@ -1579,6 +1600,57 @@ spec:
required: required:
- vaultUrl - vaultUrl
type: object type: object
conjur:
description: Conjur configures this store to sync secrets using conjur provider
properties:
auth:
properties:
apikey:
properties:
account:
type: string
apiKeyRef:
description: A reference to a specific 'key' within a Secret resource, In some instances, `key` is a required field.
properties:
key:
description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
type: string
name:
description: The name of the Secret resource being referred to.
type: string
namespace:
description: Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults to the namespace of the referent.
type: string
type: object
userRef:
description: A reference to a specific 'key' within a Secret resource, In some instances, `key` is a required field.
properties:
key:
description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
type: string
name:
description: The name of the Secret resource being referred to.
type: string
namespace:
description: Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults to the namespace of the referent.
type: string
type: object
required:
- account
- apiKeyRef
- userRef
type: object
required:
- apikey
type: object
caBundle:
type: string
url:
type: string
required:
- auth
- url
type: object
doppler: doppler:
description: Doppler configures this store to sync secrets using the Doppler provider description: Doppler configures this store to sync secrets using the Doppler provider
properties: properties:
@ -1626,6 +1698,7 @@ spec:
- lower-snake - lower-snake
- tf-var - tf-var
- dotnet-env - dotnet-env
- lower-kebab
type: string type: string
project: project:
description: Doppler project (required if not using a Service Token) description: Doppler project (required if not using a Service Token)

View File

@ -6,7 +6,10 @@ metadata:
{{- with .Values.crds.annotations }} {{- with .Values.crds.annotations }}
{{- toYaml . | nindent 4}} {{- toYaml . | nindent 4}}
{{- end }} {{- end }}
controller-gen.kubebuilder.io/version: v0.11.4 {{- if and .Values.crds.conversion.enabled .Values.webhook.certManager.enabled .Values.webhook.certManager.addInjectorAnnotations }}
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ include "external-secrets.fullname" . }}-webhook
{{- end }}
controller-gen.kubebuilder.io/version: v0.12.0
name: ecrauthorizationtokens.generators.external-secrets.io name: ecrauthorizationtokens.generators.external-secrets.io
spec: spec:
group: generators.external-secrets.io group: generators.external-secrets.io

View File

@ -6,7 +6,10 @@ metadata:
{{- with .Values.crds.annotations }} {{- with .Values.crds.annotations }}
{{- toYaml . | nindent 4}} {{- toYaml . | nindent 4}}
{{- end }} {{- end }}
controller-gen.kubebuilder.io/version: v0.11.4 {{- if and .Values.crds.conversion.enabled .Values.webhook.certManager.enabled .Values.webhook.certManager.addInjectorAnnotations }}
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ include "external-secrets.fullname" . }}-webhook
{{- end }}
controller-gen.kubebuilder.io/version: v0.12.0
name: externalsecrets.external-secrets.io name: externalsecrets.external-secrets.io
spec: spec:
group: external-secrets.io group: external-secrets.io

View File

@ -6,7 +6,10 @@ metadata:
{{- with .Values.crds.annotations }} {{- with .Values.crds.annotations }}
{{- toYaml . | nindent 4}} {{- toYaml . | nindent 4}}
{{- end }} {{- end }}
controller-gen.kubebuilder.io/version: v0.11.4 {{- if and .Values.crds.conversion.enabled .Values.webhook.certManager.enabled .Values.webhook.certManager.addInjectorAnnotations }}
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ include "external-secrets.fullname" . }}-webhook
{{- end }}
controller-gen.kubebuilder.io/version: v0.12.0
name: fakes.generators.external-secrets.io name: fakes.generators.external-secrets.io
spec: spec:
group: generators.external-secrets.io group: generators.external-secrets.io

View File

@ -6,7 +6,10 @@ metadata:
{{- with .Values.crds.annotations }} {{- with .Values.crds.annotations }}
{{- toYaml . | nindent 4}} {{- toYaml . | nindent 4}}
{{- end }} {{- end }}
controller-gen.kubebuilder.io/version: v0.11.4 {{- if and .Values.crds.conversion.enabled .Values.webhook.certManager.enabled .Values.webhook.certManager.addInjectorAnnotations }}
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ include "external-secrets.fullname" . }}-webhook
{{- end }}
controller-gen.kubebuilder.io/version: v0.12.0
name: gcraccesstokens.generators.external-secrets.io name: gcraccesstokens.generators.external-secrets.io
spec: spec:
group: generators.external-secrets.io group: generators.external-secrets.io

View File

@ -6,7 +6,10 @@ metadata:
{{- with .Values.crds.annotations }} {{- with .Values.crds.annotations }}
{{- toYaml . | nindent 4}} {{- toYaml . | nindent 4}}
{{- end }} {{- end }}
controller-gen.kubebuilder.io/version: v0.11.4 {{- if and .Values.crds.conversion.enabled .Values.webhook.certManager.enabled .Values.webhook.certManager.addInjectorAnnotations }}
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ include "external-secrets.fullname" . }}-webhook
{{- end }}
controller-gen.kubebuilder.io/version: v0.12.0
name: passwords.generators.external-secrets.io name: passwords.generators.external-secrets.io
spec: spec:
group: generators.external-secrets.io group: generators.external-secrets.io

View File

@ -6,7 +6,10 @@ metadata:
{{- with .Values.crds.annotations }} {{- with .Values.crds.annotations }}
{{- toYaml . | nindent 4}} {{- toYaml . | nindent 4}}
{{- end }} {{- end }}
controller-gen.kubebuilder.io/version: v0.11.4 {{- if and .Values.crds.conversion.enabled .Values.webhook.certManager.enabled .Values.webhook.certManager.addInjectorAnnotations }}
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ include "external-secrets.fullname" . }}-webhook
{{- end }}
controller-gen.kubebuilder.io/version: v0.12.0
name: pushsecrets.external-secrets.io name: pushsecrets.external-secrets.io
spec: spec:
group: external-secrets.io group: external-secrets.io

View File

@ -6,7 +6,10 @@ metadata:
{{- with .Values.crds.annotations }} {{- with .Values.crds.annotations }}
{{- toYaml . | nindent 4}} {{- toYaml . | nindent 4}}
{{- end }} {{- end }}
controller-gen.kubebuilder.io/version: v0.11.4 {{- if and .Values.crds.conversion.enabled .Values.webhook.certManager.enabled .Values.webhook.certManager.addInjectorAnnotations }}
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ include "external-secrets.fullname" . }}-webhook
{{- end }}
controller-gen.kubebuilder.io/version: v0.12.0
name: secretstores.external-secrets.io name: secretstores.external-secrets.io
spec: spec:
group: external-secrets.io group: external-secrets.io
@ -1496,6 +1499,24 @@ spec:
- SecretsManager - SecretsManager
- ParameterStore - ParameterStore
type: string type: string
sessionTags:
description: AWS STS assume role session tags
items:
properties:
key:
type: string
value:
type: string
required:
- key
- value
type: object
type: array
transitiveTagKeys:
description: AWS STS assume role transitive session tags. Required when multiple rules are used with SecretStore
items:
type: string
type: array
required: required:
- region - region
- service - service
@ -1579,6 +1600,57 @@ spec:
required: required:
- vaultUrl - vaultUrl
type: object type: object
conjur:
description: Conjur configures this store to sync secrets using conjur provider
properties:
auth:
properties:
apikey:
properties:
account:
type: string
apiKeyRef:
description: A reference to a specific 'key' within a Secret resource, In some instances, `key` is a required field.
properties:
key:
description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
type: string
name:
description: The name of the Secret resource being referred to.
type: string
namespace:
description: Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults to the namespace of the referent.
type: string
type: object
userRef:
description: A reference to a specific 'key' within a Secret resource, In some instances, `key` is a required field.
properties:
key:
description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
type: string
name:
description: The name of the Secret resource being referred to.
type: string
namespace:
description: Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults to the namespace of the referent.
type: string
type: object
required:
- account
- apiKeyRef
- userRef
type: object
required:
- apikey
type: object
caBundle:
type: string
url:
type: string
required:
- auth
- url
type: object
doppler: doppler:
description: Doppler configures this store to sync secrets using the Doppler provider description: Doppler configures this store to sync secrets using the Doppler provider
properties: properties:
@ -1626,6 +1698,7 @@ spec:
- lower-snake - lower-snake
- tf-var - tf-var
- dotnet-env - dotnet-env
- lower-kebab
type: string type: string
project: project:
description: Doppler project (required if not using a Service Token) description: Doppler project (required if not using a Service Token)

View File

@ -6,7 +6,10 @@ metadata:
{{- with .Values.crds.annotations }} {{- with .Values.crds.annotations }}
{{- toYaml . | nindent 4}} {{- toYaml . | nindent 4}}
{{- end }} {{- end }}
controller-gen.kubebuilder.io/version: v0.11.4 {{- if and .Values.crds.conversion.enabled .Values.webhook.certManager.enabled .Values.webhook.certManager.addInjectorAnnotations }}
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ include "external-secrets.fullname" . }}-webhook
{{- end }}
controller-gen.kubebuilder.io/version: v0.12.0
name: vaultdynamicsecrets.generators.external-secrets.io name: vaultdynamicsecrets.generators.external-secrets.io
spec: spec:
group: generators.external-secrets.io group: generators.external-secrets.io

View File

@ -5,6 +5,13 @@ metadata:
name: secretstore-validate name: secretstore-validate
labels: labels:
external-secrets.io/component: webhook external-secrets.io/component: webhook
{{- with .Values.commonLabels }}
{{ toYaml . | nindent 4 }}
{{- end }}
{{- if and .Values.webhook.certManager.enabled .Values.webhook.certManager.addInjectorAnnotations }}
annotations:
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ include "external-secrets.fullname" . }}-webhook
{{- end }}
webhooks: webhooks:
- name: "validate.secretstore.external-secrets.io" - name: "validate.secretstore.external-secrets.io"
rules: rules:
@ -44,6 +51,13 @@ metadata:
name: externalsecret-validate name: externalsecret-validate
labels: labels:
external-secrets.io/component: webhook external-secrets.io/component: webhook
{{- with .Values.commonLabels }}
{{ toYaml . | nindent 4 }}
{{- end }}
{{- if and .Values.webhook.certManager.enabled .Values.webhook.certManager.addInjectorAnnotations }}
annotations:
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ include "external-secrets.fullname" . }}-webhook
{{- end }}
webhooks: webhooks:
- name: "validate.externalsecret.external-secrets.io" - name: "validate.externalsecret.external-secrets.io"
rules: rules:

View File

@ -0,0 +1,30 @@
{{- if and .Values.webhook.create .Values.webhook.certManager.enabled .Values.webhook.certManager.cert.create }}
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: {{ include "external-secrets.fullname" . }}-webhook
namespace: {{ .Release.Namespace | quote }}
labels:
{{- include "external-secrets-webhook.labels" . | nindent 4 }}
external-secrets.io/component: webhook
{{- with .Values.webhook.certManager.cert.annotations }}
annotations:
{{- toYaml . | nindent 4 }}
{{- end }}
spec:
commonName: {{ include "external-secrets.fullname" . }}-webhook
dnsNames:
- {{ include "external-secrets.fullname" . }}-webhook
- {{ include "external-secrets.fullname" . }}-webhook.{{ .Release.Namespace }}
- {{ include "external-secrets.fullname" . }}-webhook.{{ .Release.Namespace }}.svc
issuerRef:
{{- toYaml .Values.webhook.certManager.cert.issuerRef | nindent 4 }}
{{- with .Values.webhook.certManager.cert.duration }}
duration: {{ . | quote }}
{{- end }}
{{- with .Values.webhook.certManager.cert.renewBefore }}
renewBefore: {{ . | quote }}
{{- end }}
secretName: {{ include "external-secrets.fullname" . }}-webhook
{{- end }}

View File

@ -1,4 +1,4 @@
{{- if .Values.webhook.create }} {{- if and .Values.webhook.create (not .Values.webhook.certManager.enabled) }}
apiVersion: v1 apiVersion: v1
kind: Secret kind: Secret
metadata: metadata:

View File

@ -7,8 +7,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/version: v0.8.3 app.kubernetes.io/version: v0.9.0
helm.sh/chart: external-secrets-0.8.3 helm.sh/chart: external-secrets-0.9.0
name: RELEASE-NAME-external-secrets-cert-controller name: RELEASE-NAME-external-secrets-cert-controller
namespace: NAMESPACE namespace: NAMESPACE
spec: spec:
@ -33,7 +33,7 @@ should match snapshot of default values:
- --service-namespace=NAMESPACE - --service-namespace=NAMESPACE
- --secret-name=RELEASE-NAME-external-secrets-webhook - --secret-name=RELEASE-NAME-external-secrets-webhook
- --secret-namespace=NAMESPACE - --secret-namespace=NAMESPACE
image: ghcr.io/external-secrets/external-secrets:v0.8.3 image: ghcr.io/external-secrets/external-secrets:v0.9.0
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
name: cert-controller name: cert-controller
ports: ports:

View File

@ -7,8 +7,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets app.kubernetes.io/name: external-secrets
app.kubernetes.io/version: v0.8.3 app.kubernetes.io/version: v0.9.0
helm.sh/chart: external-secrets-0.8.3 helm.sh/chart: external-secrets-0.9.0
name: RELEASE-NAME-external-secrets name: RELEASE-NAME-external-secrets
namespace: NAMESPACE namespace: NAMESPACE
spec: spec:
@ -28,7 +28,7 @@ should match snapshot of default values:
containers: containers:
- args: - args:
- --concurrent=1 - --concurrent=1
image: ghcr.io/external-secrets/external-secrets:v0.8.3 image: ghcr.io/external-secrets/external-secrets:v0.9.0
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
name: external-secrets name: external-secrets
ports: ports:

View File

@ -4,7 +4,7 @@ should match snapshot of default values:
kind: CustomResourceDefinition kind: CustomResourceDefinition
metadata: metadata:
annotations: annotations:
controller-gen.kubebuilder.io/version: v0.11.4 controller-gen.kubebuilder.io/version: v0.12.0
name: secretstores.external-secrets.io name: secretstores.external-secrets.io
spec: spec:
conversion: conversion:
@ -1504,6 +1504,24 @@ should match snapshot of default values:
- SecretsManager - SecretsManager
- ParameterStore - ParameterStore
type: string type: string
sessionTags:
description: AWS STS assume role session tags
items:
properties:
key:
type: string
value:
type: string
required:
- key
- value
type: object
type: array
transitiveTagKeys:
description: AWS STS assume role transitive session tags. Required when multiple rules are used with SecretStore
items:
type: string
type: array
required: required:
- region - region
- service - service
@ -1587,6 +1605,57 @@ should match snapshot of default values:
required: required:
- vaultUrl - vaultUrl
type: object type: object
conjur:
description: Conjur configures this store to sync secrets using conjur provider
properties:
auth:
properties:
apikey:
properties:
account:
type: string
apiKeyRef:
description: A reference to a specific 'key' within a Secret resource, In some instances, `key` is a required field.
properties:
key:
description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
type: string
name:
description: The name of the Secret resource being referred to.
type: string
namespace:
description: Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults to the namespace of the referent.
type: string
type: object
userRef:
description: A reference to a specific 'key' within a Secret resource, In some instances, `key` is a required field.
properties:
key:
description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
type: string
name:
description: The name of the Secret resource being referred to.
type: string
namespace:
description: Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults to the namespace of the referent.
type: string
type: object
required:
- account
- apiKeyRef
- userRef
type: object
required:
- apikey
type: object
caBundle:
type: string
url:
type: string
required:
- auth
- url
type: object
doppler: doppler:
description: Doppler configures this store to sync secrets using the Doppler provider description: Doppler configures this store to sync secrets using the Doppler provider
properties: properties:
@ -1634,6 +1703,7 @@ should match snapshot of default values:
- lower-snake - lower-snake
- tf-var - tf-var
- dotnet-env - dotnet-env
- lower-kebab
type: string type: string
project: project:
description: Doppler project (required if not using a Service Token) description: Doppler project (required if not using a Service Token)

View File

@ -7,8 +7,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/version: v0.8.3 app.kubernetes.io/version: v0.9.0
helm.sh/chart: external-secrets-0.8.3 helm.sh/chart: external-secrets-0.9.0
name: RELEASE-NAME-external-secrets-webhook name: RELEASE-NAME-external-secrets-webhook
namespace: NAMESPACE namespace: NAMESPACE
spec: spec:
@ -34,7 +34,7 @@ should match snapshot of default values:
- --check-interval=5m - --check-interval=5m
- --metrics-addr=:8080 - --metrics-addr=:8080
- --healthz-addr=:8081 - --healthz-addr=:8081
image: ghcr.io/external-secrets/external-secrets:v0.8.3 image: ghcr.io/external-secrets/external-secrets:v0.9.0
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
name: webhook name: webhook
ports: ports:
@ -70,3 +70,16 @@ should match snapshot of default values:
- name: certs - name: certs
secret: secret:
secretName: RELEASE-NAME-external-secrets-webhook secretName: RELEASE-NAME-external-secrets-webhook
2: |
apiVersion: v1
kind: Secret
metadata:
labels:
app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/version: v0.9.0
external-secrets.io/component: webhook
helm.sh/chart: external-secrets-0.9.0
name: RELEASE-NAME-external-secrets-webhook
namespace: NAMESPACE

View File

@ -1,10 +1,18 @@
suite: test webhook deployment suite: test webhook deployment
templates: templates:
- webhook-deployment.yaml - webhook-deployment.yaml
- webhook-secret.yaml
- webhook-certificate.yaml
- validatingwebhook.yaml
- crds/externalsecret.yaml
tests: tests:
- it: should match snapshot of default values - it: should match snapshot of default values
asserts: asserts:
- matchSnapshot: {} - matchSnapshot: {}
templates:
- webhook-deployment.yaml
- webhook-secret.yaml
# webhook-certificate.yaml is not rendered by default
- it: should set imagePullPolicy to Always - it: should set imagePullPolicy to Always
set: set:
webhook.image.pullPolicy: Always webhook.image.pullPolicy: Always
@ -12,11 +20,13 @@ tests:
- equal: - equal:
path: spec.template.spec.containers[0].imagePullPolicy path: spec.template.spec.containers[0].imagePullPolicy
value: Always value: Always
template: webhook-deployment.yaml
- it: should imagePullPolicy to be default value IfNotPresent - it: should imagePullPolicy to be default value IfNotPresent
asserts: asserts:
- equal: - equal:
path: spec.template.spec.containers[0].imagePullPolicy path: spec.template.spec.containers[0].imagePullPolicy
value: IfNotPresent value: IfNotPresent
template: webhook-deployment.yaml
- it: should override securityContext - it: should override securityContext
set: set:
webhook.podSecurityContext: webhook.podSecurityContext:
@ -40,6 +50,7 @@ tests:
runAsUser: 3000 runAsUser: 3000
seccompProfile: seccompProfile:
type: RuntimeDefault type: RuntimeDefault
template: webhook-deployment.yaml
- it: should override hostNetwork - it: should override hostNetwork
set: set:
webhook.hostNetwork: true webhook.hostNetwork: true
@ -47,3 +58,106 @@ tests:
- equal: - equal:
path: spec.template.spec.hostNetwork path: spec.template.spec.hostNetwork
value: true value: true
template: webhook-deployment.yaml
- it: should create a certificate CRD
set:
webhook.certManager.enabled: true
webhook.certManager.cert.duration: "10d"
webhook.certManager.cert.renewBefore: "5d"
asserts:
- equal:
path: metadata.name
value: "RELEASE-NAME-external-secrets-webhook"
- equal:
path: spec.secretName
value: "RELEASE-NAME-external-secrets-webhook"
- equal:
path: spec.commonName
value: "RELEASE-NAME-external-secrets-webhook"
- equal:
path: spec.dnsNames[0]
value: "RELEASE-NAME-external-secrets-webhook"
- equal:
path: spec.issuerRef.group
value: "cert-manager.io"
- equal:
path: spec.issuerRef.kind
value: "Issuer"
- equal:
path: spec.issuerRef.name
value: "my-issuer"
- equal:
path: spec.duration
value: "10d"
- equal:
path: spec.renewBefore
value: "5d"
- hasDocuments:
count: 1
templates:
- webhook-certificate.yaml
- it: should not create the webhook secret
set:
webhook.certManager.enabled: true
asserts:
- hasDocuments:
count: 0
template: webhook-secret.yaml
- it: should not create the secret nor the certificate
set:
webhook.certManager.enabled: true
webhook.certManager.cert.create: false
asserts:
- hasDocuments:
count: 0
templates:
- webhook-secret.yaml
- webhook-certificate.yaml
- it: should
set:
webhook.certManager.enabled: true
asserts:
- equal:
path: metadata.name
value: "RELEASE-NAME-external-secrets-webhook"
- hasDocuments:
count: 1
template: webhook-certificate.yaml
- it: should allow using a cluster issuer
set:
webhook.certManager.enabled: true
webhook.certManager.cert.issuerRef.kind: ClusterIssuer
webhook.certManager.cert.issuerRef.name: my-other-issuer
asserts:
- equal:
path: spec.issuerRef.kind
value: "ClusterIssuer"
- equal:
path: spec.issuerRef.name
value: "my-other-issuer"
templates:
- webhook-certificate.yaml
- it: should add annotations to the webhook
set:
webhook.create: true
webhook.certManager.enabled: true
webhook.certManager.addInjectorAnnotations: true
asserts:
- equal:
path: metadata.annotations["cert-manager.io/inject-ca-from"]
value: "NAMESPACE/RELEASE-NAME-external-secrets-webhook"
templates:
- validatingwebhook.yaml
- crds/externalsecret.yaml
- it: should not add annotations to the webhook
set:
webhook.create: true
webhook.certManager.enabled: true
webhook.certManager.addInjectorAnnotations: false
asserts:
- isNull:
path: metadata.annotations["cert-manager.io/inject-ca-from"]
# value: "NAMESPACE/RELEASE-NAME-external-secrets-webhook"
templates:
- validatingwebhook.yaml
- crds/externalsecret.yaml

View File

@ -30,6 +30,9 @@ imagePullSecrets: []
nameOverride: "" nameOverride: ""
fullnameOverride: "" fullnameOverride: ""
# -- Additional labels added to all helm chart resources.
commonLabels: {}
# -- If true, external-secrets will perform leader election between instances to ensure no more # -- If true, external-secrets will perform leader election between instances to ensure no more
# than one instance of external-secrets operates at a time. # than one instance of external-secrets operates at a time.
leaderElect: false leaderElect: false
@ -245,6 +248,40 @@ webhook:
name: "" name: ""
nodeSelector: {} nodeSelector: {}
certManager:
# -- Enabling cert-manager support will disable the built in secret and
# switch to using cert-manager (installed separately) to automatically issue
# and renew the webhook certificate. This chart does not install
# cert-manager for you, See https://cert-manager.io/docs/
enabled: false
# -- Automatically add the cert-manager.io/inject-ca-from annotation to the
# webhooks and CRDs. As long as you have the cert-manager CA Injector
# enabled, this will automatically setup your webhook's CA to the one used
# by cert-manager. See https://cert-manager.io/docs/concepts/ca-injector
addInjectorAnnotations: true
cert:
# -- Create a certificate resource within this chart. See
# https://cert-manager.io/docs/usage/certificate/
create: true
# -- For the Certificate created by this chart, setup the issuer. See
# https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.IssuerSpec
issuerRef:
group: cert-manager.io
kind: "Issuer"
name: "my-issuer"
# -- Set the requested duration (i.e. lifetime) of the Certificate. See
# https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
duration: ""
# -- How long before the currently issued certificates expiry
# cert-manager should renew the certificate. See
# https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
# Note that renewBefore should be greater than .webhook.lookaheadInterval
# since the webhook will check this far in advance that the certificate is
# valid.
renewBefore: ""
# -- Add extra annotations to the Certificate resource.
annotations: {}
tolerations: [] tolerations: []
topologySpreadConstraints: [] topologySpreadConstraints: []

Some files were not shown because too many files have changed in this diff Show More