Charts CI

```
Updated:
  dynatrace/dynatrace-operator:
    - 1.1.1
  hashicorp/consul:
    - 1.5.0
  jenkins/jenkins:
    - 5.2.2
  kong/kong:
    - 2.39.2
```
pull/1031/head
github-actions[bot] 2024-06-14 00:56:21 +00:00
parent bedafe46e3
commit 2f1ce3e2f8
77 changed files with 1274 additions and 1486 deletions

Binary file not shown.

Binary file not shown.

Binary file not shown.

BIN
assets/kong/kong-2.39.2.tgz Normal file

Binary file not shown.

View File

@ -4,7 +4,7 @@ annotations:
catalog.cattle.io/kube-version: '>=1.19.0-0'
catalog.cattle.io/release-name: dynatrace-operator
apiVersion: v2
appVersion: 1.1.0
appVersion: 1.1.1
description: The Dynatrace Operator Helm chart for Kubernetes and OpenShift
home: https://www.dynatrace.com/
icon: https://assets.dynatrace.com/global/resources/Signet_Logo_RGB_CP_512x512px.png
@ -20,4 +20,4 @@ name: dynatrace-operator
sources:
- https://github.com/Dynatrace/dynatrace-operator
type: application
version: 1.1.0
version: 1.1.1

View File

@ -24,6 +24,9 @@ spec:
kind: DynaKube
listKind: DynaKubeList
plural: dynakubes
shortNames:
- dk
- dks
singular: dynakube
preserveUnknownFields: false
scope: Namespaced

View File

@ -1,11 +1,11 @@
annotations:
artifacthub.io/images: |
- name: consul
image: hashicorp/consul:1.18.2
image: hashicorp/consul:1.19.0
- name: consul-k8s-control-plane
image: hashicorp/consul-k8s-control-plane:1.4.2
image: hashicorp/consul-k8s-control-plane:1.5.0
- name: consul-dataplane
image: hashicorp/consul-dataplane:1.4.2
image: hashicorp/consul-dataplane:1.5.0
- name: envoy
image: envoyproxy/envoy:v1.25.11
artifacthub.io/license: MPL-2.0
@ -25,7 +25,7 @@ annotations:
catalog.cattle.io/kube-version: '>=1.22.0-0'
catalog.cattle.io/release-name: consul
apiVersion: v2
appVersion: 1.18.2
appVersion: 1.19.0
description: Official HashiCorp Consul Chart
home: https://www.consul.io
icon: https://raw.githubusercontent.com/hashicorp/consul-k8s/main/assets/icon.png
@ -34,4 +34,4 @@ name: consul
sources:
- https://github.com/hashicorp/consul
- https://github.com/hashicorp/consul-k8s
version: 1.4.3
version: 1.5.0

View File

@ -19,6 +19,7 @@ as well as the global.name setting.
{{- if not .Values.global.enablePodSecurityPolicies -}}
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
capabilities:
drop:
- ALL
@ -245,6 +246,7 @@ This template is for an init container.
{{- define "consul.getAutoEncryptClientCA" -}}
- name: get-auto-encrypt-client-ca
image: {{ .Values.global.imageK8S }}
{{ template "consul.imagePullPolicy" . }}
command:
- "/bin/sh"
- "-ec"
@ -505,7 +507,6 @@ Fails if global.experiments.resourceAPIs is set along with any of these unsuppor
- meshGateway.enabled
- ingressGateways.enabled
- terminatingGateways.enabled
- apiGateway.enabled
Usage: {{ template "consul.validateResourceAPIs" . }}
@ -538,9 +539,6 @@ Usage: {{ template "consul.validateResourceAPIs" . }}
{{- if (and (mustHas "resource-apis" .Values.global.experiments) .Values.terminatingGateways.enabled ) }}
{{fail "When the value global.experiments.resourceAPIs is set, terminatingGateways.enabled is currently unsupported."}}
{{- end }}
{{- if (and (mustHas "resource-apis" .Values.global.experiments) .Values.apiGateway.enabled ) }}
{{fail "When the value global.experiments.resourceAPIs is set, apiGateway.enabled is currently unsupported."}}
{{- end }}
{{- end }}
{{/*
@ -684,5 +682,23 @@ Usage: {{ template "consul.versionInfo" }}
{{- else }}
{{- $sanitizedVersion = $versionInfo }}
{{- end -}}
{{- printf "%s" $sanitizedVersion | quote }}
{{- printf "%s" $sanitizedVersion | trunc 63 | quote }}
{{- end -}}
{{/*
Sets the imagePullPolicy for all Consul images (consul, consul-dataplane, consul-k8s, consul-telemetry-collector)
Valid values are:
IfNotPresent
Always
Never
In the case of empty, see https://kubernetes.io/docs/concepts/containers/images/#image-pull-policy for details
Usage: {{ template "consul.imagePullPolicy" . }} TODO: melisa should we name this differently ?
*/}}
{{- define "consul.imagePullPolicy" -}}
{{ if or (eq .Values.global.imagePullPolicy "IfNotPresent") (eq .Values.global.imagePullPolicy "Always") (eq .Values.global.imagePullPolicy "Never")}}imagePullPolicy: {{ .Values.global.imagePullPolicy }}
{{ else if eq .Values.global.imagePullPolicy "" }}
{{ else }}
{{fail "imagePullPolicy can only be IfNotPresent, Always, Never, or empty" }}
{{ end }}
{{- end -}}

View File

@ -1,265 +0,0 @@
{{- if .Values.apiGateway.enabled }}
# The ClusterRole to enable the API Gateway controller to access required api endpoints.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: {{ template "consul.fullname" . }}-api-gateway-controller
labels:
app: {{ template "consul.name" . }}
chart: {{ template "consul.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
component: api-gateway-controller
rules:
- apiGroups:
- api-gateway.consul.hashicorp.com
resources:
- gatewayclassconfigs
verbs:
- get
- list
- update
- watch
- apiGroups:
- api-gateway.consul.hashicorp.com
resources:
- gatewayclassconfigs/finalizers
verbs:
- update
- apiGroups:
- api-gateway.consul.hashicorp.com
resources:
- meshservices
verbs:
- get
- list
- watch
- apiGroups:
- apps
resources:
- deployments
verbs:
- create
- get
- list
- update
- watch
- apiGroups:
- coordination.k8s.io
resources:
- leases
verbs:
- create
- get
- list
- update
- apiGroups:
- ""
resources:
- configmaps
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- ""
resources:
- configmaps/status
verbs:
- get
- patch
- update
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch
- apiGroups:
- ""
resources:
- namespaces
verbs:
- get
- list
- watch
- apiGroups:
- ""
resources:
- pods
verbs:
- list
- watch
- apiGroups:
- ""
resources:
- secrets
verbs:
- create
- get
- list
- update
- watch
- apiGroups:
- ""
resources:
- services
verbs:
- create
- get
- list
- update
- watch
- apiGroups:
- ""
resources:
- serviceaccounts
verbs:
- create
- get
- list
- watch
- apiGroups:
- gateway.networking.k8s.io
resources:
- referencegrants
verbs:
- get
- list
- watch
- apiGroups:
- gateway.networking.k8s.io
resources:
- referencepolicies
verbs:
- get
- list
- watch
- apiGroups:
- gateway.networking.k8s.io
resources:
- gatewayclasses
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- gateway.networking.k8s.io
resources:
- gatewayclasses/finalizers
verbs:
- update
- apiGroups:
- gateway.networking.k8s.io
resources:
- gatewayclasses/status
verbs:
- get
- patch
- update
- apiGroups:
- gateway.networking.k8s.io
resources:
- gateways
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- gateway.networking.k8s.io
resources:
- gateways/finalizers
verbs:
- update
- apiGroups:
- gateway.networking.k8s.io
resources:
- gateways/status
verbs:
- get
- patch
- update
- apiGroups:
- gateway.networking.k8s.io
resources:
- httproutes
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- gateway.networking.k8s.io
resources:
- httproutes/finalizers
verbs:
- update
- apiGroups:
- gateway.networking.k8s.io
resources:
- httproutes/status
verbs:
- get
- patch
- update
- apiGroups:
- gateway.networking.k8s.io
resources:
- tcproutes
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- gateway.networking.k8s.io
resources:
- tcproutes/finalizers
verbs:
- update
- apiGroups:
- gateway.networking.k8s.io
resources:
- tcproutes/status
verbs:
- get
- patch
- update
{{- if .Values.global.enablePodSecurityPolicies }}
- apiGroups:
- policy
resources:
- podsecuritypolicies
verbs:
- use
- apiGroups:
- rbac.authorization.k8s.io
resources:
- roles
- rolebindings
verbs:
- create
- get
- list
- watch
{{- end }}
{{- end }}

View File

@ -1,20 +0,0 @@
{{- if .Values.apiGateway.enabled }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: {{ template "consul.fullname" . }}-api-gateway-controller
labels:
app: {{ template "consul.name" . }}
chart: {{ template "consul.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
component: api-gateway-controller
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: {{ template "consul.fullname" . }}-api-gateway-controller
subjects:
- kind: ServiceAccount
name: {{ template "consul.fullname" . }}-api-gateway-controller
namespace: {{ .Release.Namespace }}
{{- end }}

View File

@ -1,306 +0,0 @@
{{- if .Values.apiGateway.enabled }}
{{- if not .Values.client.grpc }}{{ fail "client.grpc must be true for api gateway" }}{{ end }}
{{- if not .Values.apiGateway.image}}{{ fail "apiGateway.image must be set to enable api gateway" }}{{ end }}
{{- if and .Values.global.adminPartitions.enabled (not .Values.global.enableConsulNamespaces) }}{{ fail "global.enableConsulNamespaces must be true if global.adminPartitions.enabled=true" }}{{ end }}
{{ template "consul.validateRequiredCloudSecretsExist" . }}
{{ template "consul.validateCloudSecretKeys" . }}
apiVersion: apps/v1
kind: Deployment
metadata:
name: {{ template "consul.fullname" . }}-api-gateway-controller
namespace: {{ .Release.Namespace }}
labels:
app: {{ template "consul.name" . }}
chart: {{ template "consul.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
component: api-gateway-controller
{{- if .Values.global.extraLabels }}
{{- toYaml .Values.global.extraLabels | nindent 4 }}
{{- end }}
spec:
replicas: {{ .Values.apiGateway.controller.replicas }}
selector:
matchLabels:
app: {{ template "consul.name" . }}
chart: {{ template "consul.chart" . }}
release: {{ .Release.Name }}
component: api-gateway-controller
template:
metadata:
annotations:
consul.hashicorp.com/connect-inject: "false"
consul.hashicorp.com/mesh-inject: "false"
{{- if (and .Values.global.secretsBackend.vault.enabled .Values.global.tls.enabled) }}
"vault.hashicorp.com/agent-init-first": "true"
"vault.hashicorp.com/agent-inject": "true"
"vault.hashicorp.com/role": {{ .Values.global.secretsBackend.vault.consulCARole }}
"vault.hashicorp.com/agent-inject-secret-serverca.crt": {{ .Values.global.tls.caCert.secretName }}
"vault.hashicorp.com/agent-inject-template-serverca.crt": {{ template "consul.serverTLSCATemplate" . }}
{{- if .Values.global.secretsBackend.vault.agentAnnotations }}
{{ tpl .Values.global.secretsBackend.vault.agentAnnotations . | nindent 8 | trim }}
{{ end }}
{{- if (and (.Values.global.secretsBackend.vault.vaultNamespace) (not (hasKey (default "" .Values.global.secretsBackend.vault.agentAnnotations | fromYaml) "vault.hashicorp.com/namespace")))}}
"vault.hashicorp.com/namespace": "{{ .Values.global.secretsBackend.vault.vaultNamespace }}"
{{- end }}
{{- if and .Values.global.secretsBackend.vault.ca.secretName .Values.global.secretsBackend.vault.ca.secretKey }}
"vault.hashicorp.com/agent-extra-secret": "{{ .Values.global.secretsBackend.vault.ca.secretName }}"
"vault.hashicorp.com/ca-cert": "/vault/custom/{{ .Values.global.secretsBackend.vault.ca.secretKey }}"
{{- end }}
{{- end }}
labels:
app: {{ template "consul.name" . }}
chart: {{ template "consul.chart" . }}
release: {{ .Release.Name }}
component: api-gateway-controller
{{- if .Values.global.extraLabels }}
{{- toYaml .Values.global.extraLabels | nindent 8 }}
{{- end }}
spec:
serviceAccountName: {{ template "consul.fullname" . }}-api-gateway-controller
containers:
- name: api-gateway-controller
image: {{ .Values.apiGateway.image }}
ports:
- containerPort: 9090
name: sds
protocol: TCP
env:
{{- if or (not (and .Values.externalServers.enabled .Values.externalServers.useSystemRoots)) .Values.client.enabled }}
{{- if .Values.global.tls.enabled }}
- name: CONSUL_CACERT
{{- /* When Vault is being used as a secrets backend, auto-encrypt must be enabled. Since clients use a separate
root CA from servers when auto-encrypt is enabled, and our controller communicates with the agent when clients are
enabled, we only use the Vault server CA if clients are disabled and our controller will be communicating w/ the server. */}}
{{- if and (not .Values.client.enabled) .Values.global.secretsBackend.vault.enabled }}
value: /vault/secrets/serverca.crt
{{- else }}
value: /consul/tls/ca/tls.crt
{{- end }}
{{- end }}
{{- end }}
- name: HOST_IP
valueFrom:
fieldRef:
fieldPath: status.hostIP
{{- if .Values.global.acls.manageSystemACLs }}
- name: CONSUL_HTTP_TOKEN_FILE
value: "/consul/login/acl-token"
# CONSUL_LOGIN_DATACENTER is passed to the gateway that gets created. The controller does not use this to log in
- name: CONSUL_LOGIN_DATACENTER
value: {{ .Values.global.datacenter }}
{{- end }}
- name: CONSUL_HTTP_ADDR
{{- if .Values.client.enabled }}
{{/*
We use client agent nodes if we have them to support backwards compatibility for Consul API Gateway
v0.4 and older, which requires connectivity between the registered Consul agent node and a
deployment for health checking (originating from the Consul node). Always leveraging the agents in
the case that they're explicitly opted into allows us to support users with agent node +
"externalServers" configuration upgrading a Helm chart without upgrading API gateways.
*/}}
{{- if .Values.global.tls.enabled }}
value: $(HOST_IP):8501
{{- else }}
value: $(HOST_IP):8500
{{- end }}
{{- else if .Values.externalServers.enabled }}
{{/*
"externalServers" specified and running in "agentless" mode, this will only work with
Consul API Gateway v0.5 or newer
*/}}
value: {{ first .Values.externalServers.hosts }}:{{ .Values.externalServers.httpsPort }}
{{- else }}
{{/*
We have local network connectivity between deployments and the internal cluster, this
should be supported in all versions of Consul API Gateway
*/}}
{{- if .Values.global.tls.enabled }}
value: {{ template "consul.fullname" . }}-server:8501
{{- else }}
value: {{ template "consul.fullname" . }}-server:8500
{{- end }}
{{- end }}
- name: CONSUL_HTTP_SSL
value: "{{ .Values.global.tls.enabled }}"
{{- if and (not .Values.client.enabled) .Values.externalServers.enabled .Values.externalServers.tlsServerName }}
- name: CONSUL_TLS_SERVER_NAME
value: {{ .Values.externalServers.tlsServerName }}
{{- end }}
{{- if .Values.global.adminPartitions.enabled }}
- name: CONSUL_PARTITION
value: {{ .Values.global.adminPartitions.name }}
{{- if .Values.global.acls.manageSystemACLs }}
- name: CONSUL_LOGIN_PARTITION
value: {{ .Values.global.adminPartitions.name }}
{{- end }}
{{- end }}
{{- if not .Values.client.enabled }}
- name: CONSUL_DYNAMIC_SERVER_DISCOVERY
value: "true"
{{- end }}
command:
- "/bin/sh"
- "-ec"
- |
exec consul-api-gateway server \
-sds-server-host {{ template "consul.fullname" . }}-api-gateway-controller.{{ .Release.Namespace }}.svc \
-k8s-namespace {{ .Release.Namespace }} \
{{- if .Values.global.enableConsulNamespaces }}
{{- if .Values.connectInject.consulNamespaces.consulDestinationNamespace }}
-consul-destination-namespace={{ .Values.connectInject.consulNamespaces.consulDestinationNamespace }} \
{{- end }}
{{- if .Values.connectInject.consulNamespaces.mirroringK8S }}
-mirroring-k8s=true \
{{- if .Values.connectInject.consulNamespaces.mirroringK8SPrefix }}
-mirroring-k8s-prefix={{ .Values.connectInject.consulNamespaces.mirroringK8SPrefix }} \
{{- end }}
{{- end }}
{{- end }}
{{- if and .Values.global.federation.enabled .Values.global.federation.primaryDatacenter }}
-primary-datacenter={{ .Values.global.federation.primaryDatacenter }} \
{{- end }}
-log-level {{ default .Values.global.logLevel .Values.apiGateway.logLevel }} \
-log-json={{ .Values.global.logJSON }}
volumeMounts:
{{- if .Values.global.acls.manageSystemACLs }}
- name: consul-bin
mountPath: /consul-bin
{{- end }}
{{- if or (not (or (and .Values.externalServers.enabled .Values.externalServers.useSystemRoots) .Values.global.secretsBackend.vault.enabled)) .Values.client.enabled }}
{{- if .Values.global.tls.enabled }}
{{- if and .Values.client.enabled .Values.global.tls.enableAutoEncrypt }}
- name: consul-auto-encrypt-ca-cert
{{- else }}
- name: consul-ca-cert
{{- end }}
mountPath: /consul/tls/ca
readOnly: true
{{- end }}
{{- end }}
- mountPath: /consul/login
name: consul-data
readOnly: true
{{- if .Values.apiGateway.resources }}
resources:
{{- toYaml .Values.apiGateway.resources | nindent 12 }}
{{- end }}
{{- if .Values.global.acls.manageSystemACLs }}
lifecycle:
preStop:
exec:
command: ["/consul-bin/consul", "logout" ]
{{- end }}
volumes:
{{- if .Values.global.acls.manageSystemACLs }}
- name: consul-bin
emptyDir: { }
{{- end }}
{{- if .Values.global.tls.enabled }}
{{- if not (or (and .Values.externalServers.enabled .Values.externalServers.useSystemRoots) .Values.global.secretsBackend.vault.enabled) }}
- name: consul-ca-cert
secret:
{{- if .Values.global.tls.caCert.secretName }}
secretName: {{ .Values.global.tls.caCert.secretName }}
{{- else }}
secretName: {{ template "consul.fullname" . }}-ca-cert
{{- end }}
items:
- key: {{ default "tls.crt" .Values.global.tls.caCert.secretKey }}
path: tls.crt
{{- end }}
{{- if .Values.global.tls.enableAutoEncrypt }}
- name: consul-auto-encrypt-ca-cert
emptyDir:
medium: "Memory"
{{- end }}
{{- end }}
- name: consul-data
emptyDir:
medium: "Memory"
{{- if or .Values.global.acls.manageSystemACLs (and .Values.global.tls.enabled .Values.global.tls.enableAutoEncrypt) }}
initContainers:
{{- if .Values.global.acls.manageSystemACLs }}
- name: copy-consul-bin
image: {{ .Values.global.image | quote }}
command:
- cp
- /bin/consul
- /consul-bin/consul
volumeMounts:
- name: consul-bin
mountPath: /consul-bin
{{- if .Values.apiGateway.initCopyConsulContainer }}
{{- if .Values.apiGateway.initCopyConsulContainer.resources }}
resources: {{ toYaml .Values.apiGateway.initCopyConsulContainer.resources | nindent 12 }}
{{- end }}
{{- end }}
{{- end }}
{{- if (and .Values.global.tls.enabled .Values.global.tls.enableAutoEncrypt) }}
{{- include "consul.getAutoEncryptClientCA" . | nindent 6 }}
{{- end }}
{{- if .Values.global.acls.manageSystemACLs }}
- name: api-gateway-controller-acl-init
env:
- name: NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: CONSUL_LOGIN_META
value: "component=api-gateway-controller,pod=$(NAMESPACE)/$(POD_NAME)"
- name: CONSUL_LOGIN_DATACENTER
{{- if and .Values.global.federation.enabled .Values.global.federation.primaryDatacenter }}
value: {{ .Values.global.federation.primaryDatacenter }}
{{- else }}
value: {{ .Values.global.datacenter }}
{{- end}}
{{- include "consul.consulK8sConsulServerEnvVars" . | nindent 8 }}
image: {{ .Values.global.imageK8S }}
volumeMounts:
- mountPath: /consul/login
name: consul-data
readOnly: false
{{- if not (or (and .Values.externalServers.enabled .Values.externalServers.useSystemRoots) .Values.global.secretsBackend.vault.enabled) }}
{{- if .Values.global.tls.enabled }}
- name: consul-ca-cert
mountPath: /consul/tls/ca
readOnly: true
{{- end }}
{{- end }}
command:
- "/bin/sh"
- "-ec"
- |
exec consul-k8s-control-plane acl-init \
{{- if and .Values.global.federation.enabled .Values.global.federation.primaryDatacenter }}
-auth-method-name={{ template "consul.fullname" . }}-k8s-component-auth-method-{{ .Values.global.datacenter }} \
{{- else }}
-auth-method-name={{ template "consul.fullname" . }}-k8s-component-auth-method \
{{- end }}
-log-level={{ default .Values.global.logLevel .Values.apiGateway.logLevel }} \
-log-json={{ .Values.global.logJSON }}
resources:
requests:
memory: "25Mi"
cpu: "50m"
limits:
memory: "25Mi"
cpu: "50m"
{{- end }}
{{- end }}
{{- if .Values.apiGateway.controller.priorityClassName }}
priorityClassName: {{ .Values.apiGateway.controller.priorityClassName | quote }}
{{- end }}
{{- if .Values.apiGateway.controller.nodeSelector }}
nodeSelector:
{{ tpl .Values.apiGateway.controller.nodeSelector . | indent 8 | trim }}
{{- end }}
{{- if .Values.apiGateway.controller.tolerations }}
tolerations:
{{ tpl .Values.apiGateway.controller.tolerations . | indent 8 | trim }}
{{- end }}
{{- end }}

View File

@ -1,40 +0,0 @@
{{- if and .Values.apiGateway.enabled .Values.global.enablePodSecurityPolicies }}
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: {{ template "consul.fullname" . }}-api-gateway-controller
namespace: {{ .Release.Namespace }}
labels:
app: {{ template "consul.name" . }}
chart: {{ template "consul.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
component: api-gateway-controller
spec:
privileged: false
# Required to prevent escalations to root.
allowPrivilegeEscalation: false
# This is redundant with non-root + disallow privilege escalation,
# but we can provide it for defense in depth.
requiredDropCapabilities:
- ALL
# Allow core volume types.
volumes:
- 'configMap'
- 'emptyDir'
- 'projected'
- 'secret'
- 'downwardAPI'
hostNetwork: false
hostIPC: false
hostPID: false
runAsUser:
rule: 'RunAsAny'
seLinux:
rule: 'RunAsAny'
supplementalGroups:
rule: 'RunAsAny'
fsGroup:
rule: 'RunAsAny'
readOnlyRootFilesystem: true
{{- end }}

View File

@ -1,27 +0,0 @@
{{- if .Values.apiGateway.enabled }}
apiVersion: v1
kind: Service
metadata:
name: {{ template "consul.fullname" . }}-api-gateway-controller
namespace: {{ .Release.Namespace }}
labels:
app: {{ template "consul.name" . }}
chart: {{ template "consul.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
component: api-gateway-controller
annotations:
{{- if .Values.apiGateway.controller.service.annotations }}
{{ tpl .Values.apiGateway.controller.service.annotations . | nindent 4 | trim }}
{{- end }}
spec:
ports:
- name: sds
port: 9090
protocol: TCP
targetPort: 9090
selector:
app: {{ template "consul.name" . }}
release: "{{ .Release.Name }}"
component: api-gateway-controller
{{- end }}

View File

@ -1,23 +0,0 @@
{{- if .Values.apiGateway.enabled }}
apiVersion: v1
kind: ServiceAccount
metadata:
name: {{ template "consul.fullname" . }}-api-gateway-controller
namespace: {{ .Release.Namespace }}
labels:
app: {{ template "consul.name" . }}
chart: {{ template "consul.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
component: api-gateway-controller
{{- if .Values.apiGateway.serviceAccount.annotations }}
annotations:
{{ tpl .Values.apiGateway.serviceAccount.annotations . | nindent 4 | trim }}
{{- end }}
{{- with .Values.global.imagePullSecrets }}
imagePullSecrets:
{{- range . }}
- name: {{ .name }}
{{- end }}
{{- end }}
{{- end }}

View File

@ -1,18 +0,0 @@
{{- if (and .Values.apiGateway.enabled .Values.apiGateway.managedGatewayClass.enabled) }}
apiVersion: gateway.networking.k8s.io/v1alpha2
kind: GatewayClass
metadata:
name: consul-api-gateway
labels:
app: {{ template "consul.name" . }}
chart: {{ template "consul.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
component: api-gateway-controller
spec:
controllerName: hashicorp.com/consul-api-gateway-controller
parametersRef:
group: api-gateway.consul.hashicorp.com
kind: GatewayClassConfig
name: consul-api-gateway
{{- end }}

View File

@ -1,84 +0,0 @@
{{- if (and .Values.apiGateway.enabled .Values.apiGateway.managedGatewayClass.enabled) }}
apiVersion: api-gateway.consul.hashicorp.com/v1alpha1
kind: GatewayClassConfig
metadata:
name: consul-api-gateway
labels:
app: {{ template "consul.name" . }}
chart: {{ template "consul.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
component: api-gateway
spec:
consul:
{{- if .Values.client.enabled }}
{{/*
We use client agent nodes if we have them to support backwards compatibility in <=0.4 releases which
require connectivity between the registered Consul agent node and a deployment for health checking
(originating from the Consul node). Always leveraging the agents in the case that they're explicitly
opted into allows us to support users with agent node + "externalServers" configuration upgrading a
helm chart without upgrading api gateways. Otherwise, using "externalServers" when provided
without local agents will break gateways <=0.4.
*/}}
address: $(HOST_IP)
{{- else if .Values.externalServers.enabled }}
{{/*
"externalServers" specified and running in "agentless" mode, this will only work 0.5+
*/}}
address: {{ first .Values.externalServers.hosts }}
{{- else }}
{{/*
We have local network connectivity between deployments and the internal cluster, this
should be supported in all versions of api-gateway
*/}}
address: {{ template "consul.fullname" . }}-server.{{ .Release.Namespace }}.svc
{{- end }}
authentication:
{{- if .Values.global.acls.manageSystemACLs }}
managed: true
method: {{ template "consul.fullname" . }}-k8s-auth-method
{{- if .Values.global.enablePodSecurityPolicies }}
podSecurityPolicy: {{ template "consul.fullname" . }}-api-gateway
{{- end }}
{{- end }}
{{- if .Values.global.tls.enabled }}
scheme: https
{{- else }}
scheme: http
{{- end }}
ports:
{{- if .Values.externalServers.enabled }}
grpc: {{ .Values.externalServers.grpcPort }}
http: {{ .Values.externalServers.httpsPort }}
{{- else }}
grpc: 8502
{{- if .Values.global.tls.enabled }}
http: 8501
{{- else }}
http: 8500
{{- end }}
{{- end }}
{{- with .Values.apiGateway.managedGatewayClass.deployment }}
deployment:
{{- toYaml . | nindent 4 }}
{{- end }}
image:
consulAPIGateway: {{ .Values.apiGateway.image }}
envoy: {{ .Values.apiGateway.imageEnvoy }}
{{- if .Values.apiGateway.managedGatewayClass.nodeSelector }}
nodeSelector:
{{ tpl .Values.apiGateway.managedGatewayClass.nodeSelector . | indent 4 | trim }}
{{- end }}
{{- if .Values.apiGateway.managedGatewayClass.tolerations }}
tolerations:
{{ tpl .Values.apiGateway.managedGatewayClass.tolerations . | indent 4 | trim }}
{{- end }}
{{- if .Values.apiGateway.managedGatewayClass.copyAnnotations.service }}
copyAnnotations:
service:
{{ tpl .Values.apiGateway.managedGatewayClass.copyAnnotations.service.annotations . | nindent 6 | trim }}
{{- end }}
serviceType: {{ .Values.apiGateway.managedGatewayClass.serviceType }}
useHostPorts: {{ .Values.apiGateway.managedGatewayClass.useHostPorts }}
logLevel: {{ default .Values.global.logLevel .Values.apiGateway.managedGatewayClass.logLevel }}
{{- end }}

View File

@ -1,45 +0,0 @@
{{- if and .Values.apiGateway.enabled .Values.global.enablePodSecurityPolicies }}
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: {{ template "consul.fullname" . }}-api-gateway
namespace: {{ .Release.Namespace }}
labels:
app: {{ template "consul.name" . }}
chart: {{ template "consul.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
component: api-gateway-controller
spec:
privileged: false
# Required to prevent escalations to root.
allowPrivilegeEscalation: false
# This is redundant with non-root + disallow privilege escalation,
# but we can provide it for defense in depth.
requiredDropCapabilities:
- ALL
# Allow core volume types.
volumes:
- 'configMap'
- 'emptyDir'
- 'projected'
- 'secret'
- 'downwardAPI'
allowedCapabilities:
- NET_BIND_SERVICE
hostNetwork: false
hostIPC: false
hostPID: false
hostPorts:
- max: 65535
min: 1025
runAsUser:
rule: 'RunAsAny'
seLinux:
rule: 'RunAsAny'
supplementalGroups:
rule: 'RunAsAny'
fsGroup:
rule: 'RunAsAny'
readOnlyRootFilesystem: true
{{- end }}

View File

@ -200,6 +200,7 @@ spec:
containers:
- name: consul
image: "{{ default .Values.global.image .Values.client.image }}"
{{ template "consul.imagePullPolicy" . }}
{{- if .Values.global.acls.manageSystemACLs }}
lifecycle:
preStop:
@ -502,6 +503,7 @@ spec:
{{- if .Values.global.acls.manageSystemACLs }}
- name: client-acl-init
image: {{ .Values.global.imageK8S }}
{{ template "consul.imagePullPolicy" . }}
env:
- name: NAMESPACE
valueFrom:
@ -554,6 +556,7 @@ spec:
{{- if and .Values.global.tls.enabled (not .Values.global.tls.enableAutoEncrypt) }}
- name: client-tls-init
image: "{{ default .Values.global.image .Values.client.image }}"
{{ template "consul.imagePullPolicy" . }}
env:
- name: HOST_IP
valueFrom:

View File

@ -62,6 +62,7 @@ spec:
# This container installs the consul CNI binaries and CNI network config file on each node
- name: install-cni
image: {{ .Values.global.imageK8S }}
{{ template "consul.imagePullPolicy" . }}
securityContext:
privileged: true
command:

View File

@ -32,6 +32,7 @@ rules:
- routetimeoutfilters
- routeauthfilters
- gatewaypolicies
- registrations
{{- if .Values.global.peering.enabled }}
- peeringacceptors
- peeringdialers
@ -61,6 +62,7 @@ rules:
- terminatinggateways/status
- samenessgroups/status
- controlplanerequestlimits/status
- registrations/status
{{- if .Values.global.peering.enabled }}
- peeringacceptors/status
- peeringdialers/status
@ -102,6 +104,7 @@ rules:
- grpcroutes
- httproutes
- meshgateways
- apigateways
- tcproutes
- proxyconfigurations
verbs:
@ -121,6 +124,7 @@ rules:
- grpcroutes/status
- httproutes/status
- meshgateways/status
- apigateways/status
- tcproutes/status
- proxyconfigurations/status
verbs:

View File

@ -98,6 +98,7 @@ spec:
containers:
- name: sidecar-injector
image: "{{ default .Values.global.imageK8S .Values.connectInject.image }}"
{{ template "consul.imagePullPolicy" . }}
ports:
- containerPort: 8080
name: webhook-server

View File

@ -28,4 +28,20 @@ webhooks:
name: {{ template "consul.fullname" . }}-connect-injector
namespace: {{ .Release.Namespace }}
path: /validate-v1alpha1-gatewaypolicy
- name: validate-registration.consul.hashicorp.com
matchPolicy: Equivalent
rules:
- operations: [ "CREATE" , "UPDATE" ]
apiGroups: [ "consul.hashicorp.com" ]
apiVersions: [ "v1alpha1" ]
resources: [ "registrations" ]
failurePolicy: Fail
sideEffects: None
admissionReviewVersions:
- v1
clientConfig:
service:
name: {{ template "consul.fullname" . }}-connect-injector
namespace: {{ .Release.Namespace }}
path: /validate-v1alpha1-registration
{{- end }}

View File

@ -114,13 +114,6 @@ spec:
provide the wildcard value \"*\" to list resources
across all partitions."
type: string
peerName:
description: "PeerName identifies which peer the
resource is imported from. https://developer.hashicorp.com/consul/docs/connect/cluster-peering
\n When using the List and WatchList endpoints,
provide the wildcard value \"*\" to list resources
across all peers."
type: string
type: object
type:
description: Type identifies the resource's type.
@ -196,41 +189,110 @@ spec:
type: object
status:
properties:
conditions:
description: Conditions indicate the latest available observations
of a resource's current state.
addresses:
items:
description: 'Conditions define a readiness condition for a Consul
resource. See: https://github.com/kubernetes/community/blob/master/contributors/devel/sig-architecture/api-conventions.md#typical-status-properties'
properties:
lastTransitionTime:
description: LastTransitionTime is the last time the condition
transitioned from one status to another.
format: date-time
type: string
message:
description: A human readable message indicating details about
the transition.
type: string
reason:
description: The reason for the condition's last transition.
type: string
status:
description: Status of the condition, one of True, False, Unknown.
type: string
type:
description: Type of condition.
default: IPAddress
type: string
value:
type: string
required:
- status
- type
- value
type: object
type: array
lastSyncedTime:
description: LastSyncedTime is the last time the resource successfully
synced with Consul.
format: date-time
type: string
listeners:
items:
properties:
attachedRoutes:
format: int32
type: integer
name:
type: string
status:
properties:
conditions:
description: Conditions indicate the latest available observations
of a resource's current state.
items:
description: 'Conditions define a readiness condition
for a Consul resource. See: https://github.com/kubernetes/community/blob/master/contributors/devel/sig-architecture/api-conventions.md#typical-status-properties'
properties:
lastTransitionTime:
description: LastTransitionTime is the last time the
condition transitioned from one status to another.
format: date-time
type: string
message:
description: A human readable message indicating details
about the transition.
type: string
reason:
description: The reason for the condition's last transition.
type: string
status:
description: Status of the condition, one of True,
False, Unknown.
type: string
type:
description: Type of condition.
type: string
required:
- status
- type
type: object
type: array
lastSyncedTime:
description: LastSyncedTime is the last time the resource
successfully synced with Consul.
format: date-time
type: string
type: object
required:
- attachedRoutes
- name
type: object
type: array
status:
properties:
conditions:
description: Conditions indicate the latest available observations
of a resource's current state.
items:
description: 'Conditions define a readiness condition for a
Consul resource. See: https://github.com/kubernetes/community/blob/master/contributors/devel/sig-architecture/api-conventions.md#typical-status-properties'
properties:
lastTransitionTime:
description: LastTransitionTime is the last time the condition
transitioned from one status to another.
format: date-time
type: string
message:
description: A human readable message indicating details
about the transition.
type: string
reason:
description: The reason for the condition's last transition.
type: string
status:
description: Status of the condition, one of True, False,
Unknown.
type: string
type:
description: Type of condition.
type: string
required:
- status
- type
type: object
type: array
lastSyncedTime:
description: LastSyncedTime is the last time the resource successfully
synced with Consul.
format: date-time
type: string
type: object
type: object
type: object
served: true

View File

@ -122,7 +122,8 @@ spec:
description: 'Requests describes the minimum amount of compute
resources required. If Requests is omitted for a container,
it defaults to Limits if that is explicitly specified, otherwise
to an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/'
to an implementation-defined value. Requests cannot exceed
Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/'
type: object
type: object
type: object

View File

@ -1035,7 +1035,7 @@ spec:
compute resources required. If Requests is omitted for
a container, it defaults to Limits if that is explicitly
specified, otherwise to an implementation-defined value.
More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/'
Requests cannot exceed Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/'
type: object
type: object
type: object
@ -1117,7 +1117,7 @@ spec:
compute resources required. If Requests is omitted for
a container, it defaults to Limits if that is explicitly
specified, otherwise to an implementation-defined value.
More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/'
Requests cannot exceed Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/'
type: object
type: object
type: object
@ -1269,7 +1269,8 @@ spec:
in a file on the node should be used. The profile must
be preconfigured on the node to work. Must be a descending
path, relative to the kubelet's configured seccomp profile
location. Must only be set if type is "Localhost".
location. Must be set if type is "Localhost". Must NOT
be set for any other type.
type: string
type:
description: "type indicates which kind of seccomp profile
@ -1334,15 +1335,12 @@ spec:
type: string
hostProcess:
description: HostProcess determines if a container should
be run as a 'Host Process' container. This field is
alpha-level and will only be honored by components that
enable the WindowsHostProcessContainers feature flag.
Setting this field without the feature flag will result
in errors when validating the Pod. All of a Pod's containers
must have the same effective HostProcess value (it is
not allowed to have a mix of HostProcess containers
and non-HostProcess containers). In addition, if HostProcess
is true then HostNetwork must also be set to true.
be run as a 'Host Process' container. All of a Pod's
containers must have the same effective HostProcess
value (it is not allowed to have a mix of HostProcess
containers and non-HostProcess containers). In addition,
if HostProcess is true then HostNetwork must also be
set to true.
type: boolean
runAsUserName:
description: The UserName in Windows to run the entrypoint
@ -1452,14 +1450,19 @@ spec:
type: object
x-kubernetes-map-type: atomic
matchLabelKeys:
description: MatchLabelKeys is a set of pod label keys to
select the pods over which spreading will be calculated.
description: "MatchLabelKeys is a set of pod label keys
to select the pods over which spreading will be calculated.
The keys are used to lookup values from the incoming pod
labels, those key-value labels are ANDed with labelSelector
to select the group of existing pods over which spreading
will be calculated for the incoming pod. Keys that don't
exist in the incoming pod labels will be ignored. A null
or empty list means only match against labelSelector.
will be calculated for the incoming pod. The same key
is forbidden to exist in both MatchLabelKeys and LabelSelector.
MatchLabelKeys cannot be set when LabelSelector isn't
set. Keys that don't exist in the incoming pod labels
will be ignored. A null or empty list means only match
against labelSelector. \n This is a beta field and requires
the MatchLabelKeysInPodTopologySpread feature gate to
be enabled (enabled by default)."
items:
type: string
type: array

View File

@ -72,9 +72,10 @@ spec:
description: 'NOTE: roughly equivalent to structs.ResourceReference'
properties:
port:
description: For east/west this is the name of the Consul Service
description: "For east/west this is the name of the Consul Service
port to direct traffic to or empty to imply all. For north/south
this is TBD.
this is TBD. \n For more details on potential values of this
field, see documentation for Service.ServicePort."
type: string
ref:
description: For east/west configuration, this should point
@ -106,13 +107,6 @@ spec:
the wildcard value \"*\" to list resources across
all partitions."
type: string
peerName:
description: "PeerName identifies which peer the resource
is imported from. https://developer.hashicorp.com/consul/docs/connect/cluster-peering
\n When using the List and WatchList endpoints, provide
the wildcard value \"*\" to list resources across
all peers."
type: string
type: object
type:
description: Type identifies the resource's type.
@ -166,7 +160,9 @@ spec:
description: "For east/west this is the name of the
Consul Service port to direct traffic to or empty
to imply using the same value as the parent ref.
\n For north/south this is TBD."
For north/south this is TBD. \n For more details
on potential values of this field, see documentation
for Service.ServicePort."
type: string
ref:
description: For east/west configuration, this should
@ -199,13 +195,6 @@ spec:
provide the wildcard value \"*\" to list
resources across all partitions."
type: string
peerName:
description: "PeerName identifies which peer
the resource is imported from. https://developer.hashicorp.com/consul/docs/connect/cluster-peering
\n When using the List and WatchList endpoints,
provide the wildcard value \"*\" to list
resources across all peers."
type: string
type: object
type:
description: Type identifies the resource's type.

View File

@ -72,9 +72,10 @@ spec:
description: 'NOTE: roughly equivalent to structs.ResourceReference'
properties:
port:
description: For east/west this is the name of the Consul Service
description: "For east/west this is the name of the Consul Service
port to direct traffic to or empty to imply all. For north/south
this is TBD.
this is TBD. \n For more details on potential values of this
field, see documentation for Service.ServicePort."
type: string
ref:
description: For east/west configuration, this should point
@ -106,13 +107,6 @@ spec:
the wildcard value \"*\" to list resources across
all partitions."
type: string
peerName:
description: "PeerName identifies which peer the resource
is imported from. https://developer.hashicorp.com/consul/docs/connect/cluster-peering
\n When using the List and WatchList endpoints, provide
the wildcard value \"*\" to list resources across
all peers."
type: string
type: object
type:
description: Type identifies the resource's type.
@ -169,7 +163,9 @@ spec:
description: "For east/west this is the name of the
Consul Service port to direct traffic to or empty
to imply using the same value as the parent ref.
\n For north/south this is TBD."
For north/south this is TBD. \n For more details
on potential values of this field, see documentation
for Service.ServicePort."
type: string
ref:
description: For east/west configuration, this should
@ -202,13 +198,6 @@ spec:
provide the wildcard value \"*\" to list
resources across all partitions."
type: string
peerName:
description: "PeerName identifies which peer
the resource is imported from. https://developer.hashicorp.com/consul/docs/connect/cluster-peering
\n When using the List and WatchList endpoints,
provide the wildcard value \"*\" to list
resources across all peers."
type: string
type: object
type:
description: Type identifies the resource's type.

View File

@ -0,0 +1,251 @@
{{- if .Values.connectInject.enabled }}
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.12.1
labels:
app: {{ template "consul.name" . }}
chart: {{ template "consul.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
component: crd
name: registrations.consul.hashicorp.com
spec:
group: consul.hashicorp.com
names:
kind: Registration
listKind: RegistrationList
plural: registrations
singular: registration
scope: Cluster
versions:
- name: v1alpha1
schema:
openAPIV3Schema:
description: Registration defines the resource for working with service registrations.
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: Spec defines the desired state of Registration.
properties:
address:
type: string
check:
description: HealthCheck is used to represent a single check.
properties:
checkId:
type: string
definition:
description: HealthCheckDefinition is used to store the details
about a health check's execution.
properties:
body:
type: string
deregisterCriticalServiceAfterDuration:
type: string
grpc:
type: string
grpcUseTLS:
type: boolean
header:
additionalProperties:
items:
type: string
type: array
type: object
http:
type: string
intervalDuration:
type: string
method:
type: string
osService:
type: string
tcp:
type: string
tcpUseTLS:
type: boolean
timeoutDuration:
type: string
tlsServerName:
type: string
tlsSkipVerify:
type: boolean
udp:
type: string
required:
- intervalDuration
type: object
exposedPort:
type: integer
name:
type: string
namespace:
type: string
node:
type: string
notes:
type: string
output:
type: string
partition:
type: string
serviceId:
type: string
serviceName:
type: string
status:
type: string
type:
type: string
required:
- checkId
- definition
- name
- serviceId
- serviceName
- status
type: object
datacenter:
type: string
id:
type: string
locality:
properties:
region:
type: string
zone:
type: string
type: object
node:
type: string
nodeMeta:
additionalProperties:
type: string
type: object
partition:
type: string
service:
properties:
address:
type: string
enableTagOverride:
type: boolean
id:
type: string
locality:
properties:
region:
type: string
zone:
type: string
type: object
meta:
additionalProperties:
type: string
type: object
name:
type: string
namespace:
type: string
partition:
type: string
port:
type: integer
socketPath:
type: string
taggedAddresses:
additionalProperties:
properties:
address:
type: string
port:
type: integer
required:
- address
- port
type: object
type: object
tags:
items:
type: string
type: array
weights:
properties:
passing:
type: integer
warning:
type: integer
required:
- passing
- warning
type: object
required:
- address
- name
- port
type: object
skipNodeUpdate:
type: boolean
taggedAddresses:
additionalProperties:
type: string
type: object
type: object
status:
description: RegistrationStatus defines the observed state of Registration.
properties:
conditions:
description: Conditions indicate the latest available observations
of a resource's current state.
items:
description: 'Conditions define a readiness condition for a Consul
resource. See: https://github.com/kubernetes/community/blob/master/contributors/devel/sig-architecture/api-conventions.md#typical-status-properties'
properties:
lastTransitionTime:
description: LastTransitionTime is the last time the condition
transitioned from one status to another.
format: date-time
type: string
message:
description: A human readable message indicating details about
the transition.
type: string
reason:
description: The reason for the condition's last transition.
type: string
status:
description: Status of the condition, one of True, False, Unknown.
type: string
type:
description: Type of condition.
type: string
required:
- status
- type
type: object
type: array
lastSyncedTime:
description: LastSyncedTime is the last time the resource successfully
synced with Consul.
format: date-time
type: string
type: object
type: object
served: true
storage: true
subresources:
status: {}
{{- end }}

View File

@ -66,9 +66,10 @@ spec:
description: 'NOTE: roughly equivalent to structs.ResourceReference'
properties:
port:
description: For east/west this is the name of the Consul Service
description: "For east/west this is the name of the Consul Service
port to direct traffic to or empty to imply all. For north/south
this is TBD.
this is TBD. \n For more details on potential values of this
field, see documentation for Service.ServicePort."
type: string
ref:
description: For east/west configuration, this should point
@ -100,13 +101,6 @@ spec:
the wildcard value \"*\" to list resources across
all partitions."
type: string
peerName:
description: "PeerName identifies which peer the resource
is imported from. https://developer.hashicorp.com/consul/docs/connect/cluster-peering
\n When using the List and WatchList endpoints, provide
the wildcard value \"*\" to list resources across
all peers."
type: string
type: object
type:
description: Type identifies the resource's type.
@ -151,7 +145,9 @@ spec:
description: "For east/west this is the name of the
Consul Service port to direct traffic to or empty
to imply using the same value as the parent ref.
\n For north/south this is TBD."
For north/south this is TBD. \n For more details
on potential values of this field, see documentation
for Service.ServicePort."
type: string
ref:
description: For east/west configuration, this should
@ -184,13 +180,6 @@ spec:
provide the wildcard value \"*\" to list
resources across all partitions."
type: string
peerName:
description: "PeerName identifies which peer
the resource is imported from. https://developer.hashicorp.com/consul/docs/connect/cluster-peering
\n When using the List and WatchList endpoints,
provide the wildcard value \"*\" to list
resources across all peers."
type: string
type: object
type:
description: Type identifies the resource's type.

View File

@ -101,23 +101,25 @@ spec:
when evaluating rules for the incoming connection.
items:
properties:
header:
properties:
exact:
type: string
invert:
type: boolean
name:
type: string
prefix:
type: string
present:
type: boolean
regex:
type: string
suffix:
type: string
type: object
headers:
items:
properties:
exact:
type: string
invert:
type: boolean
name:
type: string
prefix:
type: string
present:
type: boolean
regex:
type: string
suffix:
type: string
type: object
type: array
methods:
description: Methods is the list of HTTP methods.
items:
@ -138,23 +140,25 @@ spec:
type: array
type: object
type: array
header:
properties:
exact:
type: string
invert:
type: boolean
name:
type: string
prefix:
type: string
present:
type: boolean
regex:
type: string
suffix:
type: string
type: object
headers:
items:
properties:
exact:
type: string
invert:
type: boolean
name:
type: string
prefix:
type: string
present:
type: boolean
regex:
type: string
suffix:
type: string
type: object
type: array
methods:
description: Methods is the list of HTTP methods. If no
methods are specified, this rule will apply to all methods.

View File

@ -94,6 +94,7 @@ spec:
containers:
- name: create-federation-secret
image: "{{ .Values.global.imageK8S }}"
{{ template "consul.imagePullPolicy" . }}
{{- include "consul.restrictedSecurityContext" . | nindent 10 }}
env:
- name: NAMESPACE

View File

@ -59,6 +59,7 @@ spec:
containers:
- name: apply-enterprise-license
image: "{{ default .Values.global.image .Values.server.image }}"
{{ template "consul.imagePullPolicy" . }}
env:
- name: ENTERPRISE_LICENSE
{{- if .Values.global.secretsBackend.vault.enabled }}
@ -125,6 +126,7 @@ spec:
initContainers:
- name: ent-license-acl-init
image: {{ .Values.global.imageK8S }}
{{ template "consul.imagePullPolicy" . }}
command:
- "/bin/sh"
- "-ec"

View File

@ -38,6 +38,7 @@ spec:
containers:
- name: gateway-cleanup
image: {{ .Values.global.imageK8S }}
{{ template "consul.imagePullPolicy" . }}
{{- include "consul.restrictedSecurityContext" . | nindent 10 }}
command:
- consul-k8s-control-plane

View File

@ -21,9 +21,10 @@ data:
resources.json: |
{{ toJson .Values.connectInject.apiGateway.managedGatewayClass.resources }}
{{- end }}
{{- if and (mustHas "resource-apis" .Values.global.experiments) .Values.meshGateway.enabled }}
{{- if and (mustHas "resource-apis" .Values.global.experiments) (or .Values.meshGateway.enabled .Values.connectInject.apiGateway.managedGatewayClass) }}
config.yaml: |
gatewayClassConfigs:
{{- if .Values.meshGateway.enabled }}
- apiVersion: mesh.consul.hashicorp.com/v2beta1
metadata:
name: consul-mesh-gateway
@ -87,7 +88,8 @@ data:
min: {{ .Values.meshGateway.replicas }}
max: {{ .Values.meshGateway.replicas }}
{{- if .Values.meshGateway.tolerations }}
tolerations: {{ fromYamlArray .Values.meshGateway.tolerations | toJson }}
tolerations:
{{ fromYamlArray .Values.meshGateway.tolerations | toJson }}
{{- end }}
service:
{{- if .Values.meshGateway.service.annotations }}
@ -100,6 +102,67 @@ data:
annotations:
set: {{ toJson .Values.meshGateway.serviceAccount.annotations }}
{{- end }}
{{- end }}
{{- if .Values.connectInject.apiGateway.managedGatewayClass }}
- apiVersion: mesh.consul.hashicorp.com/v2beta1
metadata:
name: consul-api-gateway
kind: GatewayClassConfig
spec:
labels:
set:
app: {{ template "consul.name" . }}
chart: {{ template "consul.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
component: api-gateway
{{- if .Values.connectInject.apiGateway.managedGatewayClass.copyAnnotations }}
{{- if .Values.connectInject.apiGateway.managedGatewayClass.copyAnnotations.service }}
annotations:
service:
{{ fromYamlArray .Values.connectInject.apiGateway.managedGatewayClass.copyAnnotations.service.annotations | toYaml }}
{{- end}}
{{- end}}
deployment:
{{- if .Values.connectInject.apiGateway.managedGatewayClass.nodeSelector }}
nodeSelector:
{{ fromYamlArray .Values.connectInject.apiGateway.managedGatewayClass.nodeSelector | toYaml }}
{{- end }}
initContainer:
{{- if .Values.connectInject.apiGateway.managedGatewayClass.mapPrivilegedContainerPorts }}
portModifier: {{ .Values.connectInject.apiGateway.managedGatewayClass.mapPrivilegedContainerPorts }}
{{- end }}
consul:
logging:
level: {{ .Values.global.logLevel }}
container:
{{- if .Values.connectInject.apiGateway.managedGatewayClass.mapPrivilegedContainerPorts }}
portModifier: {{ .Values.connectInject.apiGateway.managedGatewayClass.mapPrivilegedContainerPorts }}
{{- end }}
consul:
logging:
level: {{ .Values.global.logLevel }}
replicas:
default: {{ .Values.connectInject.apiGateway.managedGatewayClass.deployment.defaultInstances }}
min: {{ .Values.connectInject.apiGateway.managedGatewayClass.deployment.minInstances }}
max: {{ .Values.connectInject.apiGateway.managedGatewayClass.deployment.maxInstances }}
{{- if .Values.connectInject.apiGateway.managedGatewayClass.tolerations }}
tolerations:
{{ fromYamlArray .Values.connectInject.apiGateway.managedGatewayClass.tolerations | toYaml }}
{{- end }}
{{- if .Values.connectInject.apiGateway.managedGatewayClass.service }}
service:
annotations:
set: {{ toYaml .Values.connectInject.apiGateway.managedGatewayClass.service.annotations }}
{{- end }}
type: {{ .Values.connectInject.apiGateway.managedGatewayClass.serviceType }}
{{- if .Values.connectInject.apiGateway.managedGatewayClass.serviceAccount }}
serviceAccount:
annotations:
set: {{ toYaml .Values.connectInject.apiGateway.managedGatewayClass.serviceAccount.annotations }}
{{- end }}
{{- end }}
{{- if .Values.meshGateway.enabled }}
meshGateways:
- apiVersion: mesh.consul.hashicorp.com/v2beta1
kind: MeshGateway
@ -107,7 +170,6 @@ data:
name: mesh-gateway
namespace: {{ .Release.Namespace }}
annotations:
# TODO are these annotations even necessary?
"consul.hashicorp.com/gateway-wan-address-source": {{ .Values.meshGateway.wanAddress.source | quote }}
"consul.hashicorp.com/gateway-wan-address-static": {{ .Values.meshGateway.wanAddress.static | quote }}
{{- if eq .Values.meshGateway.wanAddress.source "Service" }}
@ -128,5 +190,6 @@ data:
workloads:
prefixes:
- "mesh-gateway"
{{- end }}
{{- end }}
{{- end }}

View File

@ -1,3 +1,4 @@
{{- if .Values.apiGateway}}{{fail "[DEPRECATED and REMOVED] the apiGateway stanza is no longer supported as of Consul 1.19.0. Use connectInject.apiGateway instead."}}{{- end -}}
{{- if .Values.connectInject.enabled }}
apiVersion: batch/v1
kind: Job
@ -38,6 +39,7 @@ spec:
containers:
- name: gateway-resources
image: {{ .Values.global.imageK8S }}
{{ template "consul.imagePullPolicy" . }}
{{- include "consul.restrictedSecurityContext" . | nindent 10 }}
command:
- consul-k8s-control-plane
@ -51,29 +53,6 @@ spec:
- -heritage={{ .Release.Service }}
- -release-name={{ .Release.Name }}
- -component=api-gateway
{{- if .Values.apiGateway.enabled }} # Override values from the old stanza. To be removed after ~1.18 (t-eckert 2023-05-19) NET-6263
{{- if .Values.apiGateway.managedGatewayClass.deployment }}
{{- if .Values.apiGateway.managedGatewayClass.deployment.defaultInstances }}
- -deployment-default-instances={{ .Values.apiGateway.managedGatewayClass.deployment.defaultInstances }}
{{- end}}
{{- if .Values.apiGateway.managedGatewayClass.deployment.maxInstances }}
- -deployment-max-instances={{ .Values.apiGateway.managedGatewayClass.deployment.maxInstances }}
{{- end}}
{{- if .Values.apiGateway.managedGatewayClass.deployment.minInstances }}
- -deployment-min-instances={{ .Values.apiGateway.managedGatewayClass.deployment.minInstances }}
{{- end}}
{{- end}}
{{- if .Values.apiGateway.managedGatewayClass.nodeSelector }}
- -node-selector={{ .Values.apiGateway.managedGatewayClass.nodeSelector }}
{{- end }}
{{- if .Values.apiGateway.managedGatewayClass.tolerations }}
- -tolerations={{ .Values.apiGateway.managedGatewayClass.tolerations }}
{{- end }}
{{- if .Values.apiGateway.managedGatewayClass.copyAnnotations.service }}
- -service-annotations={{ .Values.apiGateway.managedGatewayClass.copyAnnotations.service.annotations }}
{{- end }}
- -service-type={{ .Values.apiGateway.managedGatewayClass.serviceType }}
{{- else }} # the new stanza
{{- if .Values.connectInject.apiGateway.managedGatewayClass.deployment }}
{{- if .Values.connectInject.apiGateway.managedGatewayClass.deployment.defaultInstances }}
- -deployment-default-instances={{ .Values.connectInject.apiGateway.managedGatewayClass.deployment.defaultInstances }}
@ -110,7 +89,6 @@ spec:
{{- if .Values.connectInject.apiGateway.managedGatewayClass.metrics.port }}
- -metrics-port={{ .Values.connectInject.apiGateway.managedGatewayClass.metrics.port }}
{{- end }}
{{- end }}
resources:
requests:
memory: "50Mi"

View File

@ -49,6 +49,7 @@ spec:
containers:
- name: gossip-encryption-autogen
image: "{{ .Values.global.imageK8S }}"
{{ template "consul.imagePullPolicy" . }}
{{- include "consul.restrictedSecurityContext" . | nindent 10 }}
command:
- "/bin/sh"

View File

@ -160,6 +160,9 @@ spec:
terminationGracePeriodSeconds: {{ default $defaults.terminationGracePeriodSeconds .terminationGracePeriodSeconds }}
serviceAccountName: {{ template "consul.fullname" $root }}-{{ .name }}
volumes:
- name: tmp
emptyDir:
medium: "Memory"
- name: consul-service
emptyDir:
medium: "Memory"
@ -181,6 +184,7 @@ spec:
# ingress-gateway-init registers the ingress gateway service with Consul.
- name: ingress-gateway-init
image: {{ $root.Values.global.imageK8S }}
{{ template "consul.imagePullPolicy" $root }}
{{- include "consul.restrictedSecurityContext" $ | nindent 8 }}
env:
- name: NAMESPACE
@ -221,6 +225,8 @@ spec:
-log-level={{ default $root.Values.global.logLevel $root.Values.ingressGateways.logLevel }} \
-log-json={{ $root.Values.global.logJSON }}
volumeMounts:
- name: tmp
mountPath: /tmp
- name: consul-service
mountPath: /consul/service
{{- if $root.Values.global.tls.enabled }}
@ -240,11 +246,14 @@ spec:
containers:
- name: ingress-gateway
image: {{ $root.Values.global.imageConsulDataplane | quote }}
{{ template "consul.imagePullPolicy" $root }}
{{- include "consul.restrictedSecurityContext" $ | nindent 8 }}
{{- if (default $defaults.resources .resources) }}
resources: {{ toYaml (default $defaults.resources .resources) | nindent 10 }}
{{- end }}
volumeMounts:
- name: tmp
mountPath: /tmp
- name: consul-service
mountPath: /consul/service
readOnly: true

View File

@ -128,6 +128,7 @@ spec:
initContainers:
- name: mesh-gateway-init
image: {{ .Values.global.imageK8S }}
{{ template "consul.imagePullPolicy" . }}
env:
- name: NAMESPACE
valueFrom:
@ -186,6 +187,7 @@ spec:
containers:
- name: mesh-gateway
image: {{ .Values.global.imageConsulDataplane | quote }}
{{ template "consul.imagePullPolicy" . }}
securityContext:
capabilities:
{{ if not .Values.meshGateway.hostNetwork}}

View File

@ -85,6 +85,7 @@ spec:
containers:
- name: partition-init-job
image: {{ .Values.global.imageK8S }}
{{ template "consul.imagePullPolicy" . }}
{{- include "consul.restrictedSecurityContext" . | nindent 10 }}
env:
{{- include "consul.consulK8sConsulServerEnvVars" . | nindent 10 }}

View File

@ -61,6 +61,7 @@ spec:
containers:
- name: server-acl-init-cleanup
image: {{ .Values.global.imageK8S }}
{{ template "consul.imagePullPolicy" . }}
{{- if not .Values.server.containerSecurityContext.aclInit }}
{{- include "consul.restrictedSecurityContext" . | nindent 10 }}
{{- end }}

View File

@ -137,6 +137,7 @@ spec:
containers:
- name: server-acl-init-job
image: {{ .Values.global.imageK8S }}
{{ template "consul.imagePullPolicy" . }}
{{- if not .Values.server.containerSecurityContext.aclInit }}
{{- include "consul.restrictedSecurityContext" . | nindent 8 }}
{{- end }}
@ -304,10 +305,6 @@ spec:
-partition-token-file=/vault/secrets/partition-token \
{{- end }}
{{- if .Values.apiGateway.enabled }}
-api-gateway-controller=true \
{{- end }}
{{- if .Values.global.enableConsulNamespaces }}
-enable-namespaces=true \
{{- /* syncCatalog must be enabled to set sync flags */}}

View File

@ -132,7 +132,7 @@ spec:
{{- tpl .Values.server.annotations . | nindent 8 }}
{{- end }}
{{- if (and .Values.global.metrics.enabled .Values.global.metrics.enableAgentMetrics) }}
{{- if not .Values.global.metrics.datadog.openMetricsPrometheus.enabled }}
{{- if (or (not .Values.global.metrics.datadog.enabled) (and .Values.global.metrics.datadog.enabled (.Values.global.metrics.datadog.dogstatsd.enabled))) }}
"prometheus.io/scrape": "true"
{{- if not (hasKey (default "" .Values.server.annotations | fromYaml) "prometheus.io/path")}}
"prometheus.io/path": "/v1/agent/metrics"
@ -156,12 +156,12 @@ spec:
"instances": [
{
{{- if .Values.global.tls.enabled }}
"openmetrics_endpoint": "https://consul-server.{{ .Release.Namespace }}.svc:8501/v1/agent/metrics?format=prometheus",
"openmetrics_endpoint": "https://{{ template "consul.fullname" . }}-server.{{ .Release.Namespace }}.svc:8501/v1/agent/metrics?format=prometheus",
"tls_cert": "/etc/datadog-agent/conf.d/consul.d/certs/tls.crt",
"tls_private_key": "/etc/datadog-agent/conf.d/consul.d/certs/tls.key",
"tls_ca_cert": "/etc/datadog-agent/conf.d/consul.d/ca/tls.crt",
{{- else }}
"openmetrics_endpoint": "http://consul-server.{{ .Release.Namespace }}.svc:8500/v1/agent/metrics?format=prometheus",
"openmetrics_endpoint": "http://{{ template "consul.fullname" . }}-server.{{ .Release.Namespace }}.svc:8500/v1/agent/metrics?format=prometheus",
{{- end }}
{{- if ( .Values.global.acls.manageSystemACLs) }}
"headers": {
@ -182,12 +182,12 @@ spec:
"instances": [
{
{{- if .Values.global.tls.enabled }}
"url": "https://consul-server.{{ .Release.Namespace }}.svc:8501",
"url": "https://{{ template "consul.fullname" . }}-server.{{ .Release.Namespace }}.svc:8501",
"tls_cert": "/etc/datadog-agent/conf.d/consul.d/certs/tls.crt",
"tls_private_key": "/etc/datadog-agent/conf.d/consul.d/certs/tls.key",
"tls_ca_cert": "/etc/datadog-agent/conf.d/consul.d/ca/tls.crt",
{{- else }}
"url": "http://consul-server.consul.svc:8500",
"url": "http://{{ template "consul.fullname" . }}-server.{{ .Release.Namespace }}.svc:8500",
{{- end }}
"use_prometheus_endpoint": true,
{{- if ( .Values.global.acls.manageSystemACLs) }}
@ -226,6 +226,8 @@ spec:
{{- toYaml .Values.server.securityContext | nindent 8 }}
{{- end }}
volumes:
- name: tmp
emptyDir: {}
- name: config
configMap:
name: {{ template "consul.fullname" . }}-server-config
@ -294,7 +296,7 @@ spec:
{{- if and .Values.global.metrics.datadog.enabled .Values.global.metrics.datadog.dogstatsd.enabled (eq .Values.global.metrics.datadog.dogstatsd.socketTransportType "UDS" ) }}
- name: dsdsocket
hostPath:
path: /var/run/datadog
path: {{ dir .Values.global.metrics.datadog.dogstatsd.dogstatsdAddr | trimAll "\"" }}
type: DirectoryOrCreate
{{- end }}
{{- range .Values.server.extraVolumes }}
@ -319,6 +321,7 @@ spec:
initContainers:
- name: locality-init
image: {{ .Values.global.imageK8S }}
{{ template "consul.imagePullPolicy" . }}
env:
- name: NODE_NAME
valueFrom:
@ -336,6 +339,7 @@ spec:
containers:
- name: consul
image: "{{ default .Values.global.image .Values.server.image | trimPrefix "\"" | trimSuffix "\"" }}"
{{ template "consul.imagePullPolicy" . }}
imagePullPolicy: {{ .Values.global.imagePullPolicy }}
env:
- name: ADVERTISE_IP
@ -544,7 +548,7 @@ spec:
{{- end }}
{{- if and .Values.global.metrics.datadog.enabled .Values.global.metrics.datadog.dogstatsd.enabled (eq .Values.global.metrics.datadog.dogstatsd.socketTransportType "UDS" ) }}
- name: dsdsocket
mountPath: /var/run/datadog
mountPath: {{ dir .Values.global.metrics.datadog.dogstatsd.dogstatsdAddr | trimAll "\"" }}
readOnly: true
{{- end }}
{{- range .Values.server.extraVolumes }}
@ -562,6 +566,9 @@ spec:
mountPath: /trusted-cas
readOnly: false
{{- end }}
- name: tmp
mountPath: /tmp
readOnly: false
ports:
{{- if (or (not .Values.global.tls.enabled) (not .Values.global.tls.httpsOnly)) }}
- name: http
@ -652,6 +659,7 @@ spec:
{{- if .Values.server.snapshotAgent.enabled }}
- name: consul-snapshot-agent
image: "{{ default .Values.global.image .Values.server.image }}"
{{ template "consul.imagePullPolicy" . }}
env:
{{- if .Values.server.snapshotAgent.caCert }}
- name: SSL_CERT_DIR

View File

@ -81,6 +81,7 @@ spec:
containers:
- name: sync-catalog
image: "{{ default .Values.global.imageK8S .Values.syncCatalog.image }}"
{{ template "consul.imagePullPolicy" . }}
{{- include "consul.restrictedSecurityContext" . | nindent 8 }}
env:
{{- include "consul.consulK8sConsulServerEnvVars" . | nindent 8 }}

View File

@ -143,7 +143,7 @@ spec:
-service-name=""
image: {{ .Values.global.imageK8S }}
imagePullPolicy: IfNotPresent
{{ template "consul.imagePullPolicy" . }}
{{- if .Values.telemetryCollector.initContainer.resources }}
resources:
{{- toYaml .Values.telemetryCollector.initContainer.resources | nindent 12 }}
@ -171,7 +171,7 @@ spec:
containers:
- name: consul-telemetry-collector
image: {{ .Values.telemetryCollector.image }}
imagePullPolicy: {{ .Values.global.imagePullPolicy }}
{{ template "consul.imagePullPolicy" . }}
ports:
- containerPort: 9090
name: metrics
@ -256,9 +256,13 @@ spec:
{{- if eq (.Values.global.metrics.datadog.otlp.protocol | lower ) "http" }}
- name: CO_OTEL_HTTP_ENDPOINT
value: "http://$(HOST_IP):4318"
- name: OTEL_EXPORTER_OTLP_ENDPOINT
value: "http://$(HOST_IP):4318"
{{- else if eq (.Values.global.metrics.datadog.otlp.protocol | lower) "grpc" }}
- name: CO_OTEL_HTTP_ENDPOINT
value: "grpc://$(HOST_IP):4317"
value: "http://$(HOST_IP):4317"
- name: OTEL_EXPORTER_OTLP_ENDPOINT
value: "http://$(HOST_IP):4317"
{{- end }}
{{- end }}
{{- include "consul.extraEnvironmentVars" .Values.telemetryCollector | nindent 12 }}
@ -295,7 +299,7 @@ spec:
# consul-dataplane container
- name: consul-dataplane
image: "{{ .Values.global.imageConsulDataplane }}"
imagePullPolicy: IfNotPresent
{{ template "consul.imagePullPolicy" . }}
command:
- consul-dataplane
args:

View File

@ -129,6 +129,9 @@ spec:
terminationGracePeriodSeconds: 10
serviceAccountName: {{ template "consul.fullname" $root }}-{{ .name }}
volumes:
- name: tmp
emptyDir:
medium: "Memory"
- name: consul-service
emptyDir:
medium: "Memory"
@ -166,6 +169,7 @@ spec:
# terminating-gateway-init registers the terminating gateway service with Consul.
- name: terminating-gateway-init
image: {{ $root.Values.global.imageK8S }}
{{ template "consul.imagePullPolicy" $root }}
{{- include "consul.restrictedSecurityContext" $ | nindent 10 }}
env:
- name: NAMESPACE
@ -206,6 +210,8 @@ spec:
-log-level={{ default $root.Values.global.logLevel $root.Values.terminatingGateways.logLevel }} \
-log-json={{ $root.Values.global.logJSON }}
volumeMounts:
- name: tmp
mountPath: /tmp
- name: consul-service
mountPath: /consul/service
{{- if $root.Values.global.tls.enabled }}
@ -225,8 +231,11 @@ spec:
containers:
- name: terminating-gateway
image: {{ $root.Values.global.imageConsulDataplane | quote }}
{{ template "consul.imagePullPolicy" $root }}
{{- include "consul.restrictedSecurityContext" $ | nindent 10 }}
volumeMounts:
- name: tmp
mountPath: /tmp
- name: consul-service
mountPath: /consul/service
readOnly: true

View File

@ -37,6 +37,7 @@ spec:
containers:
- name: consul-test
image: "{{ .Values.global.image }}"
{{ template "consul.imagePullPolicy" . }}
env:
- name: HOST_IP
valueFrom:

View File

@ -49,6 +49,7 @@ spec:
containers:
- name: tls-init-cleanup
image: "{{ .Values.global.image }}"
{{ template "consul.imagePullPolicy" . }}
{{- if not .Values.server.containerSecurityContext.tlsInit }}
{{- include "consul.restrictedSecurityContext" . | nindent 10 }}
{{- end }}

View File

@ -64,6 +64,7 @@ spec:
containers:
- name: tls-init
image: "{{ .Values.global.imageK8S }}"
{{ template "consul.imagePullPolicy" . }}
{{- if not .Values.server.containerSecurityContext.tlsInit }}
{{- include "consul.restrictedSecurityContext" . | nindent 10 }}
{{- end }}

View File

@ -51,6 +51,7 @@ spec:
-deployment-name={{ template "consul.fullname" . }}-webhook-cert-manager \
-deployment-namespace={{ .Release.Namespace }}
image: {{ .Values.global.imageK8S }}
{{ template "consul.imagePullPolicy" . }}
name: webhook-cert-manager
{{- include "consul.restrictedSecurityContext" . | nindent 8 }}
resources:

View File

@ -66,7 +66,7 @@ global:
# image: "hashicorp/consul-enterprise:1.10.0-ent"
# ```
# @default: hashicorp/consul:<latest version>
image: hashicorp/consul:1.18.2
image: hashicorp/consul:1.19.0
# Array of objects containing image pull secret names that will be applied to each service account.
# This can be used to reference image pull secrets if using a custom consul or consul-k8s-control-plane Docker image.
@ -86,7 +86,12 @@ global:
# image that is used for functionality such as catalog sync.
# This can be overridden per component.
# @default: hashicorp/consul-k8s-control-plane:<latest version>
imageK8S: hashicorp/consul-k8s-control-plane:1.4.3
imageK8S: hashicorp/consul-k8s-control-plane:1.5.0
# The image pull policy used globally for images controlled by Consul (consul, consul-dataplane, consul-k8s, consul-telemetry-collector).
# One of "IfNotPresent", "Always", "Never", and "". Refer to https://kubernetes.io/docs/concepts/containers/images/#image-pull-policy
# @default: ""
imagePullPolicy: ""
# The name of the datacenter that the agents should
# register as. This can't be changed once the Consul cluster is up and running
@ -788,7 +793,7 @@ global:
# The name (and tag) of the consul-dataplane Docker image used for the
# connect-injected sidecar proxies and mesh, terminating, and ingress gateways.
# @default: hashicorp/consul-dataplane:<latest supported version>
imageConsulDataplane: hashicorp/consul-dataplane:1.4.2
imageConsulDataplane: hashicorp/consul-dataplane:1.5.0
# Configuration for running this Helm chart on the Red Hat OpenShift platform.
# This Helm chart currently supports OpenShift v4.x+.
@ -3450,175 +3455,6 @@ terminatingGateways:
gateways:
- name: terminating-gateway
# [DEPRECATED] Use connectInject.apiGateway instead.
# Configuration settings for the Consul API Gateway integration
apiGateway:
# When true the helm chart will install the Consul API Gateway controller
enabled: false
# Image to use for the api-gateway-controller pods and gateway instances
#
# ~> **Note:** Using API Gateway <= 0.4 with external servers requires setting `client.enabled: true`.
# @type: string
image: null
# The name (and tag) of the Envoy Docker image used for the
# apiGateway. For other Consul compoenents, imageEnvoy has been replaced with Consul Dataplane.
# @default: envoyproxy/envoy:<latest supported version>
imageEnvoy: "envoyproxy/envoy:v1.25.11"
# Override global log verbosity level for api-gateway-controller pods. One of "debug", "info", "warn", or "error".
# @type: string
logLevel: info
# Configuration settings for the optional GatewayClass installed by consul-k8s (enabled by default)
managedGatewayClass:
# When true a GatewayClass is configured to automatically work with Consul as installed by helm.
enabled: true
# This value defines [`nodeSelector`](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector)
# labels for gateway pod assignment, formatted as a multi-line string.
#
# Example:
#
# ```yaml
# nodeSelector: |
# beta.kubernetes.io/arch: amd64
# ```
#
# @type: string
nodeSelector: null
# Toleration settings for gateway pods created with the managed gateway class.
# This should be a multi-line string matching the
# [Tolerations](https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/) array in a Pod spec.
#
# @type: string
tolerations: null
# This value defines the type of service created for gateways (e.g. LoadBalancer, ClusterIP)
serviceType: LoadBalancer
# This value toggles if the gateway ports should be mapped to host ports
useHostPorts: false
# Configuration settings for annotations to be copied from the Gateway to other child resources.
copyAnnotations:
# This value defines a list of annotations to be copied from the Gateway to the Service created, formatted as a multi-line string.
#
# Example:
#
# ```yaml
# service:
# annotations: |
# - external-dns.alpha.kubernetes.io/hostname
# ```
#
# @type: string
service: null
# This value defines the number of pods to deploy for each Gateway as well as a min and max number of pods for all Gateways
#
# Example:
#
# ```yaml
# deployment:
# defaultInstances: 3
# maxInstances: 8
# minInstances: 1
# ```
#
# @type: map
deployment: null
# Configuration for the ServiceAccount created for the api-gateway component
serviceAccount:
# This value defines additional annotations for the client service account. This should be formatted as a multi-line
# string.
#
# ```yaml
# annotations: |
# "sample/annotation1": "foo"
# "sample/annotation2": "bar"
# ```
#
# @type: string
annotations: null
# Configuration for the api-gateway controller component
controller:
# This value sets the number of controller replicas to deploy.
replicas: 1
# Annotations to apply to the api-gateway-controller pods.
#
# ```yaml
# annotations: |
# "annotation-key": "annotation-value"
# ```
#
# @type: string
annotations: null
# This value references an existing
# Kubernetes [`priorityClassName`](https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#pod-priority)
# that can be assigned to api-gateway-controller pods.
priorityClassName: ""
# This value defines [`nodeSelector`](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector)
# labels for api-gateway-controller pod assignment, formatted as a multi-line string.
#
# Example:
#
# ```yaml
# nodeSelector: |
# beta.kubernetes.io/arch: amd64
# ```
#
# @type: string
nodeSelector: null
# This value defines the tolerations for api-gateway-controller pod, this should be a multi-line string matching the
# [Tolerations](https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/) array in a Pod spec.
#
# @type: string
tolerations: null
# Configuration for the Service created for the api-gateway-controller
service:
# Annotations to apply to the api-gateway-controller service.
#
# ```yaml
# annotations: |
# "annotation-key": "annotation-value"
# ```
#
# @type: string
annotations: null
# The resource settings for api gateway pods.
# @recurse: false
# @type: map
resources:
requests:
memory: "100Mi"
cpu: "100m"
limits:
memory: "100Mi"
cpu: "100m"
# The resource settings for the `copy-consul-bin` init container.
# @recurse: false
# @type: map
initCopyConsulContainer:
resources:
requests:
memory: "25Mi"
cpu: "50m"
limits:
memory: "150Mi"
cpu: "50m"
# Configuration settings for the webhook-cert-manager
# `webhook-cert-manager` ensures that cert bundles are up to date for the mutating webhook.
webhookCertManager:

View File

@ -12,6 +12,10 @@ Use the following links to reference issues, PRs, and commits prior to v2.6.0.
The changelog until v1.5.7 was auto-generated based on git commits.
Those entries include a reference to the git commit to be able to get more details.
## 5.2.2
Update `kubernetes` to version `4246.v5a_12b_1fe120e`
## 5.2.1
Update `jenkins/jenkins` to version `2.452.2-jdk17`

View File

@ -1,7 +1,7 @@
annotations:
artifacthub.io/category: integration-delivery
artifacthub.io/changes: |
- Update `jenkins/jenkins` to version `2.452.2-jdk17`
- Update `kubernetes` to version `4246.v5a_12b_1fe120e`
artifacthub.io/images: |
- name: jenkins
image: docker.io/jenkins/jenkins:2.452.2-jdk17
@ -50,4 +50,4 @@ sources:
- https://github.com/maorfr/kube-tasks
- https://github.com/jenkinsci/configuration-as-code-plugin
type: application
version: 5.2.1
version: 5.2.2

View File

@ -157,7 +157,7 @@ The following tables list the configurable parameters of the Jenkins chart and t
| [controller.initializeOnce](./values.yaml#L414) | bool | Initialize only on first installation. Ensures plugins do not get updated inadvertently. Requires `persistence.enabled` to be set to `true` | `false` |
| [controller.installLatestPlugins](./values.yaml#L403) | bool | Download the minimum required version or latest version of all dependencies | `true` |
| [controller.installLatestSpecifiedPlugins](./values.yaml#L406) | bool | Set to true to download the latest version of any plugin that is requested to have the latest version | `false` |
| [controller.installPlugins](./values.yaml#L395) | list | List of Jenkins plugins to install. If you don't want to install plugins, set it to `false` | `["kubernetes:4245.vf5b_83f1fee6e","workflow-aggregator:596.v8c21c963d92d","git:5.2.2","configuration-as-code:1810.v9b_c30a_249a_4c"]` |
| [controller.installPlugins](./values.yaml#L395) | list | List of Jenkins plugins to install. If you don't want to install plugins, set it to `false` | `["kubernetes:4246.v5a_12b_1fe120e","workflow-aggregator:596.v8c21c963d92d","git:5.2.2","configuration-as-code:1810.v9b_c30a_249a_4c"]` |
| [controller.javaOpts](./values.yaml#L156) | string | Append to `JAVA_OPTS` env var | `nil` |
| [controller.jenkinsAdminEmail](./values.yaml#L96) | string | Email address for the administrator of the Jenkins instance | `nil` |
| [controller.jenkinsHome](./values.yaml#L101) | string | Custom Jenkins home path | `"/var/jenkins_home"` |

View File

@ -393,7 +393,7 @@ controller:
# Plugins will be installed during Jenkins controller start
# -- List of Jenkins plugins to install. If you don't want to install plugins, set it to `false`
installPlugins:
- kubernetes:4245.vf5b_83f1fee6e
- kubernetes:4246.v5a_12b_1fe120e
- workflow-aggregator:596.v8c21c963d92d
- git:5.2.2
- configuration-as-code:1810.v9b_c30a_249a_4c

View File

@ -1,5 +1,22 @@
# Changelog
## Unreleased
Nothing yet.
## 2.39.2
### Fixed
* Fixes `KongLicense` policy rules for Ingress controller when using `watchNamespaces`
[#1084](https://github.com/Kong/charts/pull/1084)
## 2.39.1
### Fixed
* Added missing `KongCustomEntity` CRD for KIC 3.2.
## 2.39.0
### Changes

View File

@ -18,4 +18,4 @@ maintainers:
name: kong
sources:
- https://github.com/Kong/charts/tree/main/charts/kong
version: 2.39.0
version: 2.39.2

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -28,7 +28,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-custom-dbless-config
namespace: default
---
@ -40,7 +40,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-admin
namespace: default
spec:
@ -63,7 +63,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -91,7 +91,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -119,7 +119,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -143,7 +143,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -21,7 +21,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-ca-keypair
namespace: default
type: kubernetes.io/tls
@ -37,7 +37,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-keypair
namespace: default
type: kubernetes.io/tls
@ -50,7 +50,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
rules:
- apiGroups:
@ -346,7 +346,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
roleRef:
apiGroup: rbac.authorization.k8s.io
@ -365,7 +365,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
rules:
@ -429,7 +429,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
roleRef:
@ -449,7 +449,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook
namespace: default
spec:
@ -464,7 +464,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
---
apiVersion: v1
kind: Service
@ -474,7 +474,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -502,7 +502,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -530,7 +530,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -553,7 +553,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -858,7 +858,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validations
namespace: default
webhooks:

View File

@ -7,7 +7,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -23,7 +23,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-ca-keypair
namespace: default
type: kubernetes.io/tls
@ -40,7 +40,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-keypair
namespace: default
type: kubernetes.io/tls
@ -54,7 +54,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
rules:
- apiGroups:
@ -351,7 +351,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
roleRef:
apiGroup: rbac.authorization.k8s.io
@ -371,7 +371,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
rules:
@ -436,7 +436,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
roleRef:
@ -457,7 +457,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook
namespace: default
spec:
@ -473,7 +473,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
---
apiVersion: v1
kind: Service
@ -484,7 +484,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -513,7 +513,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -542,7 +542,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -566,7 +566,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -866,7 +866,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validations
namespace: default
webhooks:

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -21,7 +21,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-ca-keypair
namespace: default
type: kubernetes.io/tls
@ -37,7 +37,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-keypair
namespace: default
type: kubernetes.io/tls
@ -50,7 +50,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
rules:
- apiGroups:
@ -346,7 +346,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
roleRef:
apiGroup: rbac.authorization.k8s.io
@ -365,7 +365,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
rules:
@ -429,7 +429,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
roleRef:
@ -449,7 +449,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook
namespace: default
spec:
@ -464,7 +464,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
---
apiVersion: v1
kind: Service
@ -474,7 +474,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -502,7 +502,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -530,7 +530,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -553,7 +553,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -858,7 +858,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validations
namespace: default
webhooks:

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -21,7 +21,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-ca-keypair
namespace: default
type: kubernetes.io/tls
@ -37,7 +37,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-keypair
namespace: default
type: kubernetes.io/tls
@ -59,7 +59,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
rules:
- apiGroups:
@ -355,7 +355,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
roleRef:
apiGroup: rbac.authorization.k8s.io
@ -374,7 +374,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
rules:
@ -438,7 +438,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
roleRef:
@ -458,7 +458,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook
namespace: default
spec:
@ -473,7 +473,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
---
apiVersion: v1
kind: Service
@ -483,7 +483,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -511,7 +511,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -539,7 +539,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -562,7 +562,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -861,7 +861,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -887,7 +887,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validations
namespace: default
webhooks:

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -21,7 +21,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-ca-keypair
namespace: default
type: kubernetes.io/tls
@ -37,7 +37,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-keypair
namespace: default
type: kubernetes.io/tls
@ -59,7 +59,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
rules:
- apiGroups:
@ -355,7 +355,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
roleRef:
apiGroup: rbac.authorization.k8s.io
@ -374,7 +374,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
rules:
@ -438,7 +438,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
roleRef:
@ -458,7 +458,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook
namespace: default
spec:
@ -473,7 +473,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
---
apiVersion: v1
kind: Service
@ -483,7 +483,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -511,7 +511,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -539,7 +539,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -562,7 +562,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -861,7 +861,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -889,7 +889,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validations
namespace: default
webhooks:

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -21,7 +21,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-ca-keypair
namespace: default
type: kubernetes.io/tls
@ -37,7 +37,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-keypair
namespace: default
type: kubernetes.io/tls
@ -50,7 +50,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
rules:
- apiGroups:
@ -346,7 +346,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
roleRef:
apiGroup: rbac.authorization.k8s.io
@ -365,7 +365,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
rules:
@ -429,7 +429,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
roleRef:
@ -449,7 +449,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook
namespace: default
spec:
@ -464,7 +464,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
---
apiVersion: v1
kind: Service
@ -474,7 +474,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -502,7 +502,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -530,7 +530,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -553,7 +553,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -852,7 +852,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -876,7 +876,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validations
namespace: default
webhooks:

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -21,7 +21,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-ca-keypair
namespace: default
type: kubernetes.io/tls
@ -37,7 +37,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-keypair
namespace: default
type: kubernetes.io/tls
@ -68,7 +68,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
rules:
- apiGroups:
@ -364,7 +364,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
roleRef:
apiGroup: rbac.authorization.k8s.io
@ -383,7 +383,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
rules:
@ -447,7 +447,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
roleRef:
@ -467,7 +467,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook
namespace: default
spec:
@ -482,7 +482,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
---
apiVersion: v1
kind: Service
@ -492,7 +492,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -520,7 +520,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -548,7 +548,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -571,7 +571,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -870,7 +870,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -929,7 +929,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validations
namespace: default
webhooks:

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -21,7 +21,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-ca-keypair
namespace: default
type: kubernetes.io/tls
@ -37,7 +37,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-keypair
namespace: default
type: kubernetes.io/tls
@ -50,7 +50,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
rules:
- apiGroups:
@ -330,7 +330,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
roleRef:
apiGroup: rbac.authorization.k8s.io
@ -349,7 +349,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
rules:
@ -413,7 +413,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
roleRef:
@ -433,7 +433,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook
namespace: default
spec:
@ -448,7 +448,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
---
apiVersion: v1
kind: Service
@ -458,7 +458,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -486,7 +486,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -514,7 +514,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -537,7 +537,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -842,7 +842,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validations
namespace: default
webhooks:

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -21,7 +21,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-ca-keypair
namespace: default
type: kubernetes.io/tls
@ -37,7 +37,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-keypair
namespace: default
type: kubernetes.io/tls
@ -50,7 +50,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
rules:
- apiGroups:
@ -346,7 +346,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
roleRef:
apiGroup: rbac.authorization.k8s.io
@ -365,7 +365,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
rules:
@ -429,7 +429,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
roleRef:
@ -449,7 +449,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook
namespace: default
spec:
@ -464,7 +464,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
---
apiVersion: v1
kind: Service
@ -474,7 +474,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -502,7 +502,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -532,7 +532,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -555,7 +555,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -854,7 +854,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validations
namespace: default
webhooks:

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: my-kong-sa
namespace: default
---
@ -21,7 +21,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-ca-keypair
namespace: default
type: kubernetes.io/tls
@ -37,7 +37,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-keypair
namespace: default
type: kubernetes.io/tls
@ -50,7 +50,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
rules:
- apiGroups:
@ -346,7 +346,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
roleRef:
apiGroup: rbac.authorization.k8s.io
@ -365,7 +365,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
rules:
@ -429,7 +429,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
roleRef:
@ -449,7 +449,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook
namespace: default
spec:
@ -464,7 +464,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
---
apiVersion: v1
kind: Service
@ -474,7 +474,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -502,7 +502,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -530,7 +530,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -553,7 +553,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -852,7 +852,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validations
namespace: default
webhooks:

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -21,7 +21,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-ca-keypair
namespace: default
type: kubernetes.io/tls
@ -37,7 +37,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-keypair
namespace: default
type: kubernetes.io/tls
@ -50,7 +50,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
rules:
- apiGroups:
@ -346,7 +346,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
roleRef:
apiGroup: rbac.authorization.k8s.io
@ -365,7 +365,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
rules:
@ -429,7 +429,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
roleRef:
@ -449,7 +449,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook
namespace: default
spec:
@ -464,7 +464,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
---
apiVersion: v1
kind: Service
@ -474,7 +474,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -502,7 +502,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -530,7 +530,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -553,7 +553,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -858,7 +858,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validations
namespace: default
webhooks:

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -18,7 +18,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -46,7 +46,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -74,7 +74,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -97,7 +97,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -21,7 +21,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-ca-keypair
namespace: default
type: kubernetes.io/tls
@ -37,7 +37,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-keypair
namespace: default
type: kubernetes.io/tls
@ -50,7 +50,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
rules:
- apiGroups:
@ -346,7 +346,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
roleRef:
apiGroup: rbac.authorization.k8s.io
@ -365,7 +365,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
rules:
@ -429,7 +429,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
roleRef:
@ -449,7 +449,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook
namespace: default
spec:
@ -464,7 +464,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
---
apiVersion: v1
kind: Service
@ -474,7 +474,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -502,7 +502,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -530,7 +530,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -553,7 +553,7 @@ spec:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
environment: test
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -895,7 +895,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -921,7 +921,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -945,7 +945,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validations
namespace: default
webhooks:

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -36,7 +36,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-ca-keypair
namespace: default
type: kubernetes.io/tls
@ -52,7 +52,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-keypair
namespace: default
type: kubernetes.io/tls
@ -78,7 +78,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-bash-wait-for-postgres
namespace: default
---
@ -90,9 +90,25 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
rules:
- apiGroups:
- configuration.konghq.com
resources:
- konglicenses
verbs:
- get
- list
- watch
- apiGroups:
- configuration.konghq.com
resources:
- konglicenses/status
verbs:
- get
- patch
- update
- apiGroups:
- configuration.konghq.com
resources:
@ -149,7 +165,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
roleRef:
apiGroup: rbac.authorization.k8s.io
@ -168,7 +184,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
rules:
@ -232,7 +248,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-default
namespace: default
rules:
@ -457,22 +473,6 @@ rules:
- get
- list
- watch
- apiGroups:
- configuration.konghq.com
resources:
- konglicenses
verbs:
- get
- list
- watch
- apiGroups:
- configuration.konghq.com
resources:
- konglicenses/status
verbs:
- get
- patch
- update
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
@ -482,7 +482,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
roleRef:
@ -502,7 +502,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-default
namespace: default
roleRef:
@ -572,7 +572,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook
namespace: default
spec:
@ -587,7 +587,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
---
apiVersion: v1
kind: Service
@ -597,7 +597,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -625,7 +625,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -661,7 +661,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -689,7 +689,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -1302,7 +1302,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-init-migrations
namespace: default
spec:
@ -1318,7 +1318,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: kong-init-migrations
spec:
automountServiceAccountToken: false
@ -1551,7 +1551,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -1575,7 +1575,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validations
namespace: default
webhooks:
@ -1704,7 +1704,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-post-upgrade-migrations
namespace: default
spec:
@ -1720,7 +1720,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: kong-post-upgrade-migrations
spec:
automountServiceAccountToken: false
@ -1959,7 +1959,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-pre-upgrade-migrations
namespace: default
spec:
@ -1975,7 +1975,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: kong-pre-upgrade-migrations
spec:
automountServiceAccountToken: false

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -28,7 +28,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-custom-dbless-config
namespace: default
---
@ -40,7 +40,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -68,7 +68,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -96,7 +96,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -120,7 +120,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -28,7 +28,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-custom-dbless-config
namespace: default
---
@ -40,7 +40,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -68,7 +68,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -104,7 +104,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -128,7 +128,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -366,7 +366,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:

View File

@ -6,7 +6,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
---
@ -36,7 +36,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-ca-keypair
namespace: default
type: kubernetes.io/tls
@ -52,7 +52,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook-keypair
namespace: default
type: kubernetes.io/tls
@ -71,7 +71,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-bash-wait-for-postgres
namespace: default
---
@ -83,7 +83,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
rules:
- apiGroups:
@ -379,7 +379,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
roleRef:
apiGroup: rbac.authorization.k8s.io
@ -398,7 +398,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
rules:
@ -462,7 +462,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
roleRef:
@ -532,7 +532,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validation-webhook
namespace: default
spec:
@ -547,7 +547,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
---
apiVersion: v1
kind: Service
@ -557,7 +557,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-manager
namespace: default
spec:
@ -585,7 +585,7 @@ metadata:
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
enable-metrics: "true"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -613,7 +613,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong
namespace: default
spec:
@ -641,7 +641,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
version: "3.6"
spec:
automountServiceAccountToken: false
@ -1225,7 +1225,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-init-migrations
namespace: default
spec:
@ -1241,7 +1241,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: kong-init-migrations
spec:
automountServiceAccountToken: false
@ -1459,7 +1459,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-proxy
namespace: default
spec:
@ -1483,7 +1483,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-validations
namespace: default
webhooks:
@ -1611,7 +1611,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-post-upgrade-migrations
namespace: default
spec:
@ -1627,7 +1627,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: kong-post-upgrade-migrations
spec:
automountServiceAccountToken: false
@ -1851,7 +1851,7 @@ metadata:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: chartsnap-kong-pre-upgrade-migrations
namespace: default
spec:
@ -1867,7 +1867,7 @@ spec:
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kong
app.kubernetes.io/version: "3.6"
helm.sh/chart: kong-2.39.0
helm.sh/chart: kong-2.39.2
name: kong-pre-upgrade-migrations
spec:
automountServiceAccountToken: false

View File

@ -1,9 +1,8 @@
# generated using: kubectl kustomize 'github.com/kong/kubernetes-ingress-controller/config/crd?ref=v3.1.0'
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
name: ingressclassparameterses.configuration.konghq.com
spec:
group: configuration.konghq.com
@ -60,7 +59,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
name: kongclusterplugins.configuration.konghq.com
spec:
group: configuration.konghq.com
@ -381,7 +380,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
name: kongconsumergroups.configuration.konghq.com
spec:
group: configuration.konghq.com
@ -528,7 +527,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
name: kongconsumers.configuration.konghq.com
spec:
group: configuration.konghq.com
@ -574,6 +573,7 @@ spec:
items:
type: string
type: array
x-kubernetes-list-type: set
credentials:
description: |-
Credentials are references to secrets containing a credential to be
@ -581,6 +581,7 @@ spec:
items:
type: string
type: array
x-kubernetes-list-type: set
custom_id:
description: |-
CustomID is a Kong cluster-unique existing ID for the consumer - useful for mapping
@ -704,7 +705,204 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
name: kongcustomentities.configuration.konghq.com
spec:
group: configuration.konghq.com
names:
categories:
- kong-ingress-controller
kind: KongCustomEntity
listKind: KongCustomEntityList
plural: kongcustomentities
shortNames:
- kce
singular: kongcustomentity
scope: Namespaced
versions:
- additionalPrinterColumns:
- description: type of the Kong entity
jsonPath: .spec.type
name: Entity Type
type: string
- description: Age
jsonPath: .metadata.creationTimestamp
name: Age
type: date
- jsonPath: .status.conditions[?(@.type=="Programmed")].status
name: Programmed
type: string
name: v1alpha1
schema:
openAPIV3Schema:
description: KongCustomEntity defines a "custom" Kong entity that KIC cannot
support the entity type directly.
properties:
apiVersion:
description: |-
APIVersion defines the versioned schema of this representation of an object.
Servers should convert recognized schemas to the latest internal value, and
may reject unrecognized values.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
type: string
kind:
description: |-
Kind is a string value representing the REST resource this object represents.
Servers may infer this from the endpoint the client submits requests to.
Cannot be updated.
In CamelCase.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
type: string
metadata:
type: object
spec:
properties:
controllerName:
description: ControllerName specifies the controller that should reconcile
it, like ingress class.
type: string
fields:
description: Fields defines the fields of the Kong entity itself.
x-kubernetes-preserve-unknown-fields: true
parentRef:
description: |-
ParentRef references the kubernetes resource it attached to when its scope is "attached".
Currently only KongPlugin/KongClusterPlugin allowed. This will make the custom entity to be attached
to the entity(service/route/consumer) where the plugin is attached.
properties:
group:
type: string
kind:
type: string
name:
type: string
namespace:
description: Empty namespace means the same namespace of the owning
object.
type: string
required:
- name
type: object
type:
description: EntityType is the type of the Kong entity. The type is
used in generating declarative configuration.
type: string
required:
- controllerName
- fields
- type
type: object
status:
description: Status stores the reconciling status of the resource.
properties:
conditions:
default:
- lastTransitionTime: "1970-01-01T00:00:00Z"
message: Waiting for controller
reason: Pending
status: Unknown
type: Programmed
description: |-
Conditions describe the current conditions of the KongCustomEntityStatus.
Known condition types are:
* "Programmed"
items:
description: "Condition contains details for one aspect of the current
state of this API Resource.\n---\nThis struct is intended for
direct use as an array at the field path .status.conditions. For
example,\n\n\n\ttype FooStatus struct{\n\t // Represents the
observations of a foo's current state.\n\t // Known .status.conditions.type
are: \"Available\", \"Progressing\", and \"Degraded\"\n\t //
+patchMergeKey=type\n\t // +patchStrategy=merge\n\t // +listType=map\n\t
\ // +listMapKey=type\n\t Conditions []metav1.Condition `json:\"conditions,omitempty\"
patchStrategy:\"merge\" patchMergeKey:\"type\" protobuf:\"bytes,1,rep,name=conditions\"`\n\n\n\t
\ // other fields\n\t}"
properties:
lastTransitionTime:
description: |-
lastTransitionTime is the last time the condition transitioned from one status to another.
This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable.
format: date-time
type: string
message:
description: |-
message is a human readable message indicating details about the transition.
This may be an empty string.
maxLength: 32768
type: string
observedGeneration:
description: |-
observedGeneration represents the .metadata.generation that the condition was set based upon.
For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
with respect to the current state of the instance.
format: int64
minimum: 0
type: integer
reason:
description: |-
reason contains a programmatic identifier indicating the reason for the condition's last transition.
Producers of specific condition types may define expected values and meanings for this field,
and whether the values are considered a guaranteed API.
The value should be a CamelCase string.
This field may not be empty.
maxLength: 1024
minLength: 1
pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$
type: string
status:
description: status of the condition, one of True, False, Unknown.
enum:
- "True"
- "False"
- Unknown
type: string
type:
description: |-
type of condition in CamelCase or in foo.example.com/CamelCase.
---
Many .condition.type values are consistent across resources like Available, but because arbitrary conditions can be
useful (see .node.status.conditions), the ability to deconflict is important.
The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt)
maxLength: 316
pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
type: string
required:
- lastTransitionTime
- message
- reason
- status
- type
type: object
maxItems: 8
type: array
x-kubernetes-list-map-keys:
- type
x-kubernetes-list-type: map
required:
- conditions
type: object
required:
- spec
type: object
x-kubernetes-validations:
- message: The spec.type field is immutable
rule: self.spec.type == oldSelf.spec.type
- message: The spec.type field cannot be known Kong entity types
rule: '!(self.spec.type in [''services'',''routes'',''upstreams'',''targets'',''plugins'',''consumers'',''consumer_groups''])'
served: true
storage: true
subresources:
status: {}
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.15.0
name: kongingresses.configuration.konghq.com
spec:
group: configuration.konghq.com
@ -1095,7 +1293,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
name: konglicenses.configuration.konghq.com
spec:
group: configuration.konghq.com
@ -1308,7 +1506,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
name: kongplugins.configuration.konghq.com
spec:
group: configuration.konghq.com
@ -1623,7 +1821,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
labels:
gateway.networking.k8s.io/policy: direct
name: kongupstreampolicies.configuration.konghq.com
@ -2070,7 +2268,7 @@ spec:
* Gateway (Gateway conformance profile)
* Service (Mesh conformance profile, experimental, ClusterIP Services only)
* Service (Mesh conformance profile, ClusterIP Services only)
Support for other resources is Implementation-Specific.
@ -2156,9 +2354,6 @@ spec:
Support: Extended
<gateway:experimental>
format: int32
maximum: 65535
minimum: 1
@ -2169,14 +2364,12 @@ spec:
following resources, SectionName is interpreted as the following:
* Gateway: Listener Name. When both Port (experimental) and SectionName
* Gateway: Listener name. When both Port (experimental) and SectionName
are specified, the name and port of the selected listener must match
both specified values.
* Service: Port Name. When both Port (experimental) and SectionName
* Service: Port name. When both Port (experimental) and SectionName
are specified, the name and port of the selected listener must match
both specified values. Note that attaching Routes to Services as Parents
is part of experimental Mesh support and is not supported for any other
purpose.
both specified values.
Implementations MAY choose to support attaching Routes to other resources.
@ -2366,7 +2559,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
name: kongvaults.configuration.konghq.com
spec:
group: configuration.konghq.com
@ -2563,7 +2756,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
name: tcpingresses.configuration.konghq.com
spec:
group: configuration.konghq.com
@ -2759,6 +2952,7 @@ spec:
x-kubernetes-list-type: atomic
type: object
type: array
x-kubernetes-list-type: atomic
type: object
type: object
type: object
@ -2771,7 +2965,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
name: udpingresses.configuration.konghq.com
spec:
group: configuration.konghq.com
@ -2931,6 +3125,7 @@ spec:
x-kubernetes-list-type: atomic
type: object
type: array
x-kubernetes-list-type: atomic
type: object
type: object
type: object

View File

@ -1671,6 +1671,14 @@ resource roles into their separate templates.
- get
- list
- watch
{{- end -}}
{{/*
kong.kubernetesRBACClusterRoles outputs a static list of RBAC rules (the "rules" block
of a Role or ClusterRole) that provide the ingress controller access to the
Kubernetes Cluster-scoped resources it uses to build Kong configuration.
*/}}
{{- define "kong.kubernetesRBACClusterRules" -}}
{{- if (semverCompare ">= 3.1.0" (include "kong.effectiveVersion" .Values.ingressController.image)) }}
- apiGroups:
- configuration.konghq.com
@ -1689,14 +1697,6 @@ resource roles into their separate templates.
- patch
- update
{{- end -}}
{{- end -}}
{{/*
kong.kubernetesRBACClusterRoles outputs a static list of RBAC rules (the "rules" block
of a Role or ClusterRole) that provide the ingress controller access to the
Kubernetes Cluster-scoped resources it uses to build Kong configuration.
*/}}
{{- define "kong.kubernetesRBACClusterRules" -}}
{{- if (semverCompare ">= 3.1.0" (include "kong.effectiveVersion" .Values.ingressController.image)) }}
- apiGroups:
- configuration.konghq.com

View File

@ -5079,6 +5079,47 @@ entries:
- assets/confluent/confluent-for-kubernetes-0.771.29.tgz
version: 0.771.29
consul:
- annotations:
artifacthub.io/images: |
- name: consul
image: hashicorp/consul:1.19.0
- name: consul-k8s-control-plane
image: hashicorp/consul-k8s-control-plane:1.5.0
- name: consul-dataplane
image: hashicorp/consul-dataplane:1.5.0
- name: envoy
image: envoyproxy/envoy:v1.25.11
artifacthub.io/license: MPL-2.0
artifacthub.io/links: |
- name: Documentation
url: https://www.consul.io/docs/k8s
- name: hashicorp/consul
url: https://github.com/hashicorp/consul
- name: hashicorp/consul-k8s
url: https://github.com/hashicorp/consul-k8s
artifacthub.io/prerelease: "false"
artifacthub.io/signKey: |
fingerprint: C874011F0AB405110D02105534365D9472D7468F
url: https://keybase.io/hashicorp/pgp_keys.asc
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Hashicorp Consul
catalog.cattle.io/kube-version: '>=1.22.0-0'
catalog.cattle.io/release-name: consul
apiVersion: v2
appVersion: 1.19.0
created: "2024-06-14T00:56:00.514749682Z"
description: Official HashiCorp Consul Chart
digest: 174b6ca5c638a6dfb64d7d041f31f55a374482ee4ec26aac92623b20b5f9803c
home: https://www.consul.io
icon: https://raw.githubusercontent.com/hashicorp/consul-k8s/main/assets/icon.png
kubeVersion: '>=1.22.0-0'
name: consul
sources:
- https://github.com/hashicorp/consul
- https://github.com/hashicorp/consul-k8s
urls:
- assets/hashicorp/consul-1.5.0.tgz
version: 1.5.0
- annotations:
artifacthub.io/images: |
- name: consul
@ -7976,6 +8017,33 @@ entries:
- assets/dh2i/dxoperator-1.0.1.tgz
version: 1.0.1
dynatrace-operator:
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Dynatrace Operator
catalog.cattle.io/kube-version: '>=1.19.0-0'
catalog.cattle.io/release-name: dynatrace-operator
apiVersion: v2
appVersion: 1.1.1
created: "2024-06-14T00:56:00.106345201Z"
description: The Dynatrace Operator Helm chart for Kubernetes and OpenShift
digest: df6aa2d78f73b3d206da44652333e8e5106bc46093ef244ca7f768fa4f1a3691
home: https://www.dynatrace.com/
icon: https://assets.dynatrace.com/global/resources/Signet_Logo_RGB_CP_512x512px.png
kubeVersion: '>=1.19.0-0'
maintainers:
- email: marcell.sevcsik@dynatrace.com
name: 0sewa0
- email: christoph.muellner@dynatrace.com
name: chrismuellner
- email: lukas.hinterreiter@dynatrace.com
name: luhi-DT
name: dynatrace-operator
sources:
- https://github.com/Dynatrace/dynatrace-operator
type: application
urls:
- assets/dynatrace/dynatrace-operator-1.1.1.tgz
version: 1.1.1
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Dynatrace Operator
@ -12894,6 +12962,63 @@ entries:
- assets/intel/intel-device-plugins-sgx-0.26.1.tgz
version: 0.26.1
jenkins:
- annotations:
artifacthub.io/category: integration-delivery
artifacthub.io/changes: |
- Update `kubernetes` to version `4246.v5a_12b_1fe120e`
artifacthub.io/images: |
- name: jenkins
image: docker.io/jenkins/jenkins:2.452.2-jdk17
- name: k8s-sidecar
image: docker.io/kiwigrid/k8s-sidecar:1.27.4
- name: inbound-agent
image: jenkins/inbound-agent:3248.v65ecb_254c298-1
artifacthub.io/license: Apache-2.0
artifacthub.io/links: |
- name: Chart Source
url: https://github.com/jenkinsci/helm-charts/tree/main/charts/jenkins
- name: Jenkins
url: https://www.jenkins.io/
- name: support
url: https://github.com/jenkinsci/helm-charts/issues
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Jenkins
catalog.cattle.io/kube-version: '>=1.14-0'
catalog.cattle.io/release-name: jenkins
apiVersion: v2
appVersion: 2.452.2
created: "2024-06-14T00:56:00.70165873Z"
description: 'Jenkins - Build great things at any scale! As the leading open source
automation server, Jenkins provides over 1800 plugins to support building, deploying
and automating any project. '
digest: 5cfc0862971d95fe5b901f5c8e162d58e21668d13c8144ca60c7c55efcb9ef45
home: https://www.jenkins.io/
icon: https://get.jenkins.io/art/jenkins-logo/logo.svg
keywords:
- jenkins
- ci
- devops
maintainers:
- email: maor.friedman@redhat.com
name: maorfr
- email: mail@torstenwalter.de
name: torstenwalter
- email: garridomota@gmail.com
name: mogaal
- email: wmcdona89@gmail.com
name: wmcdona89
- email: timjacomb1@gmail.com
name: timja
name: jenkins
sources:
- https://github.com/jenkinsci/jenkins
- https://github.com/jenkinsci/docker-inbound-agent
- https://github.com/maorfr/kube-tasks
- https://github.com/jenkinsci/configuration-as-code-plugin
type: application
urls:
- assets/jenkins/jenkins-5.2.2.tgz
version: 5.2.2
- annotations:
artifacthub.io/category: integration-delivery
artifacthub.io/changes: |
@ -16837,6 +16962,31 @@ entries:
- assets/clastix/kamaji-console-0.0.3.tgz
version: 0.0.3
kong:
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Kong Gateway
catalog.cattle.io/release-name: kong
apiVersion: v2
appVersion: "3.6"
created: "2024-06-14T00:56:01.617196409Z"
dependencies:
- condition: postgresql.enabled
name: postgresql
repository: file://./charts/postgresql
version: 11.9.13
description: The Cloud-Native Ingress and API-management
digest: 56a9bd8c70d4416ca663def309bc4ae0b13219e3dfd7577bde64f0114b2f549f
home: https://konghq.com/
icon: https://s3.amazonaws.com/downloads.kong/universe/assets/icon-kong-inc-large.png
maintainers:
- email: team-k8s@konghq.com
name: team-k8s-bot
name: kong
sources:
- https://github.com/Kong/charts/tree/main/charts/kong
urls:
- assets/kong/kong-2.39.2.tgz
version: 2.39.2
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Kong Gateway